mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
Auto-Update: 2024-12-10T17:00:35.272907+00:00
This commit is contained in:
parent
882887b2ed
commit
3a02b676a1
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2020-21366",
|
"id": "CVE-2020-21366",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2023-06-20T15:15:11.253",
|
"published": "2023-06-20T15:15:11.253",
|
||||||
"lastModified": "2024-11-21T05:12:33.033",
|
"lastModified": "2024-12-10T16:15:19.160",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -32,6 +32,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 2.1,
|
"exploitabilityScore": 2.1,
|
||||||
"impactScore": 5.9
|
"impactScore": 5.9
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 8.0,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.1,
|
||||||
|
"impactScore": 5.9
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -45,6 +65,16 @@
|
|||||||
"value": "CWE-352"
|
"value": "CWE-352"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-352"
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"configurations": [
|
"configurations": [
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2020-21400",
|
"id": "CVE-2020-21400",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2023-06-20T15:15:11.297",
|
"published": "2023-06-20T15:15:11.297",
|
||||||
"lastModified": "2024-11-21T05:12:33.920",
|
"lastModified": "2024-12-10T16:15:21.420",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -32,6 +32,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 1.2,
|
"exploitabilityScore": 1.2,
|
||||||
"impactScore": 5.9
|
"impactScore": 5.9
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 7.2,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.2,
|
||||||
|
"impactScore": 5.9
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -45,6 +65,16 @@
|
|||||||
"value": "CWE-89"
|
"value": "CWE-89"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-89"
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"configurations": [
|
"configurations": [
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2020-21474",
|
"id": "CVE-2020-21474",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2023-06-20T15:15:11.337",
|
"published": "2023-06-20T15:15:11.337",
|
||||||
"lastModified": "2024-11-21T05:12:35.617",
|
"lastModified": "2024-12-10T16:15:21.577",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -32,6 +32,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 3.9,
|
"exploitabilityScore": 3.9,
|
||||||
"impactScore": 5.9
|
"impactScore": 5.9
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 9.8,
|
||||||
|
"baseSeverity": "CRITICAL",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 5.9
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -45,6 +65,16 @@
|
|||||||
"value": "CWE-434"
|
"value": "CWE-434"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-434"
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"configurations": [
|
"configurations": [
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2021-47059",
|
"id": "CVE-2021-47059",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2024-02-29T23:15:07.690",
|
"published": "2024-02-29T23:15:07.690",
|
||||||
"lastModified": "2024-11-21T06:35:17.157",
|
"lastModified": "2024-12-10T16:58:51.723",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -15,39 +15,131 @@
|
|||||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: crypto: sun8i-ss - resultado de correcci\u00f3n de p\u00e9rdida de memoria en una ruta de error Este parche corrige una p\u00e9rdida de memoria en una ruta de error."
|
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: crypto: sun8i-ss - resultado de correcci\u00f3n de p\u00e9rdida de memoria en una ruta de error Este parche corrige una p\u00e9rdida de memoria en una ruta de error."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"baseScore": 5.5,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-401"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "5.10",
|
||||||
|
"versionEndExcluding": "5.10.37",
|
||||||
|
"matchCriteriaId": "4E433B72-3E3A-435E-9A66-80D28868BDF2"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "5.11",
|
||||||
|
"versionEndExcluding": "5.11.21",
|
||||||
|
"matchCriteriaId": "8CBB94EC-EC33-4464-99C5-03E5542715F0"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "5.12",
|
||||||
|
"versionEndExcluding": "5.12.4",
|
||||||
|
"matchCriteriaId": "D8C7052F-1B7B-4327-9C2B-84EBF3243838"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/1dbc6a1e25be8575d6c4114d1d2b841a796507f7",
|
"url": "https://git.kernel.org/stable/c/1dbc6a1e25be8575d6c4114d1d2b841a796507f7",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/1f12aaf07f61122cf5074d29714ee26f8d44b0e7",
|
"url": "https://git.kernel.org/stable/c/1f12aaf07f61122cf5074d29714ee26f8d44b0e7",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/50e7b39b808430ad49a637dc6fb72ca93b451b13",
|
"url": "https://git.kernel.org/stable/c/50e7b39b808430ad49a637dc6fb72ca93b451b13",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/ca065a93699f8cf3f42c60eefed73086007e928e",
|
"url": "https://git.kernel.org/stable/c/ca065a93699f8cf3f42c60eefed73086007e928e",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/1dbc6a1e25be8575d6c4114d1d2b841a796507f7",
|
"url": "https://git.kernel.org/stable/c/1dbc6a1e25be8575d6c4114d1d2b841a796507f7",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/1f12aaf07f61122cf5074d29714ee26f8d44b0e7",
|
"url": "https://git.kernel.org/stable/c/1f12aaf07f61122cf5074d29714ee26f8d44b0e7",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/50e7b39b808430ad49a637dc6fb72ca93b451b13",
|
"url": "https://git.kernel.org/stable/c/50e7b39b808430ad49a637dc6fb72ca93b451b13",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/ca065a93699f8cf3f42c60eefed73086007e928e",
|
"url": "https://git.kernel.org/stable/c/ca065a93699f8cf3f42c60eefed73086007e928e",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2021-47061",
|
"id": "CVE-2021-47061",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2024-02-29T23:15:07.793",
|
"published": "2024-02-29T23:15:07.793",
|
||||||
"lastModified": "2024-11-21T06:35:17.487",
|
"lastModified": "2024-12-10T16:55:15.017",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -15,39 +15,131 @@
|
|||||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: KVM: Destruye los dispositivos del bus de E/S al cancelar el registro _despu\u00e9s_ de sincronizar SRCU Si falla la asignaci\u00f3n de una nueva instancia de un bus de E/S al cancelar el registro de un dispositivo, espere para destruir el dispositivo hasta que todos los lectores tengan la garant\u00eda de ver el nuevo bus nulo. Destruir dispositivos antes de que se anule el bus podr\u00eda dar lugar a un uso posterior a la liberaci\u00f3n, ya que los lectores esperan que los dispositivos en su referencia del bus sigan siendo v\u00e1lidos."
|
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: KVM: Destruye los dispositivos del bus de E/S al cancelar el registro _despu\u00e9s_ de sincronizar SRCU Si falla la asignaci\u00f3n de una nueva instancia de un bus de E/S al cancelar el registro de un dispositivo, espere para destruir el dispositivo hasta que todos los lectores tengan la garant\u00eda de ver el nuevo bus nulo. Destruir dispositivos antes de que se anule el bus podr\u00eda dar lugar a un uso posterior a la liberaci\u00f3n, ya que los lectores esperan que los dispositivos en su referencia del bus sigan siendo v\u00e1lidos."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 7.8,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-416"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "5.9",
|
||||||
|
"versionEndExcluding": "5.10.37",
|
||||||
|
"matchCriteriaId": "BFD29FB7-96E7-40B2-A1A7-AFA8D43EC498"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "5.11",
|
||||||
|
"versionEndExcluding": "5.11.21",
|
||||||
|
"matchCriteriaId": "8CBB94EC-EC33-4464-99C5-03E5542715F0"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "5.12",
|
||||||
|
"versionEndExcluding": "5.12.4",
|
||||||
|
"matchCriteriaId": "D8C7052F-1B7B-4327-9C2B-84EBF3243838"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/03c6cccedd3913006744faa252a4da5145299343",
|
"url": "https://git.kernel.org/stable/c/03c6cccedd3913006744faa252a4da5145299343",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/2ee3757424be7c1cd1d0bbfa6db29a7edd82a250",
|
"url": "https://git.kernel.org/stable/c/2ee3757424be7c1cd1d0bbfa6db29a7edd82a250",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/30f46c6993731efb2a690c9197c0fd9ed425da2d",
|
"url": "https://git.kernel.org/stable/c/30f46c6993731efb2a690c9197c0fd9ed425da2d",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/4e899ca848636b37e9ac124bc1723862a7d7d927",
|
"url": "https://git.kernel.org/stable/c/4e899ca848636b37e9ac124bc1723862a7d7d927",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/03c6cccedd3913006744faa252a4da5145299343",
|
"url": "https://git.kernel.org/stable/c/03c6cccedd3913006744faa252a4da5145299343",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/2ee3757424be7c1cd1d0bbfa6db29a7edd82a250",
|
"url": "https://git.kernel.org/stable/c/2ee3757424be7c1cd1d0bbfa6db29a7edd82a250",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/30f46c6993731efb2a690c9197c0fd9ed425da2d",
|
"url": "https://git.kernel.org/stable/c/30f46c6993731efb2a690c9197c0fd9ed425da2d",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/4e899ca848636b37e9ac124bc1723862a7d7d927",
|
"url": "https://git.kernel.org/stable/c/4e899ca848636b37e9ac124bc1723862a7d7d927",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2021-47062",
|
"id": "CVE-2021-47062",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2024-02-29T23:15:07.843",
|
"published": "2024-02-29T23:15:07.843",
|
||||||
"lastModified": "2024-11-21T06:35:17.600",
|
"lastModified": "2024-12-10T16:43:41.337",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -15,31 +15,110 @@
|
|||||||
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: KVM: SVM: use online_vcpus, no creado_vcpus, para iterar sobre vCPU. Use el asistente kvm_for_each_vcpu() para iterar sobre vCPU al cifrar VMSA para SEV, que efectivamente cambia para usar online_vcpus en lugar de creado_vcpus. Esto corrige una posible desreferencia de puntero nulo ya que create_vcpus no garantiza que exista una vCPU, ya que se actualiza al comienzo de KVM_CREATE_VCPU. create_vcpus existe para permitir que la mayor parte de la creaci\u00f3n de vCPU se ejecute en paralelo, al mismo tiempo que restringe correctamente la cantidad m\u00e1xima de vCPU m\u00e1ximas."
|
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: KVM: SVM: use online_vcpus, no creado_vcpus, para iterar sobre vCPU. Use el asistente kvm_for_each_vcpu() para iterar sobre vCPU al cifrar VMSA para SEV, que efectivamente cambia para usar online_vcpus en lugar de creado_vcpus. Esto corrige una posible desreferencia de puntero nulo ya que create_vcpus no garantiza que exista una vCPU, ya que se actualiza al comienzo de KVM_CREATE_VCPU. create_vcpus existe para permitir que la mayor parte de la creaci\u00f3n de vCPU se ejecute en paralelo, al mismo tiempo que restringe correctamente la cantidad m\u00e1xima de vCPU m\u00e1ximas."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"baseScore": 5.5,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-476"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "5.11",
|
||||||
|
"versionEndExcluding": "5.11.21",
|
||||||
|
"matchCriteriaId": "8CBB94EC-EC33-4464-99C5-03E5542715F0"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "5.12",
|
||||||
|
"versionEndExcluding": "5.12.4",
|
||||||
|
"matchCriteriaId": "D8C7052F-1B7B-4327-9C2B-84EBF3243838"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/ba7bf5d6336aa9c0d977b161bfa420c56d46ee40",
|
"url": "https://git.kernel.org/stable/c/ba7bf5d6336aa9c0d977b161bfa420c56d46ee40",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/bd0cced2ae93195668f983d443f7f17e8efd24d2",
|
"url": "https://git.kernel.org/stable/c/bd0cced2ae93195668f983d443f7f17e8efd24d2",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/c36b16d29f3af5f32fc1b2a3401bf48f71cabee1",
|
"url": "https://git.kernel.org/stable/c/c36b16d29f3af5f32fc1b2a3401bf48f71cabee1",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/ba7bf5d6336aa9c0d977b161bfa420c56d46ee40",
|
"url": "https://git.kernel.org/stable/c/ba7bf5d6336aa9c0d977b161bfa420c56d46ee40",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/bd0cced2ae93195668f983d443f7f17e8efd24d2",
|
"url": "https://git.kernel.org/stable/c/bd0cced2ae93195668f983d443f7f17e8efd24d2",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/c36b16d29f3af5f32fc1b2a3401bf48f71cabee1",
|
"url": "https://git.kernel.org/stable/c/c36b16d29f3af5f32fc1b2a3401bf48f71cabee1",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2021-47063",
|
"id": "CVE-2021-47063",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2024-02-29T23:15:07.893",
|
"published": "2024-02-29T23:15:07.893",
|
||||||
"lastModified": "2024-11-21T06:35:17.710",
|
"lastModified": "2024-12-10T16:43:29.307",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -15,39 +15,131 @@
|
|||||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm: bridge/panel: Limpiar conector en bridge detach Si no llamamos a drm_connector_cleanup() manualmente en panel_bridge_detach(), el conector se limpiar\u00e1 con los dem\u00e1s objetos DRM en la llamada a drm_mode_config_cleanup(). Sin embargo, dado que nuestro drm_connector est\u00e1 asignado por devm, para cuando se llame a drm_mode_config_cleanup(), nuestro conector ya no existir\u00e1. Por lo tanto, el conector debe limpiarse cuando se retira el puente para evitar condiciones de uso despu\u00e9s de su liberaci\u00f3n. v2: Limpiar el conector solo si fue creado v3: Agregar FIXME v4: (Usar conector->dev) directamente en el bloque if()"
|
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm: bridge/panel: Limpiar conector en bridge detach Si no llamamos a drm_connector_cleanup() manualmente en panel_bridge_detach(), el conector se limpiar\u00e1 con los dem\u00e1s objetos DRM en la llamada a drm_mode_config_cleanup(). Sin embargo, dado que nuestro drm_connector est\u00e1 asignado por devm, para cuando se llame a drm_mode_config_cleanup(), nuestro conector ya no existir\u00e1. Por lo tanto, el conector debe limpiarse cuando se retira el puente para evitar condiciones de uso despu\u00e9s de su liberaci\u00f3n. v2: Limpiar el conector solo si fue creado v3: Agregar FIXME v4: (Usar conector->dev) directamente en el bloque if()"
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 7.8,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-416"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "4.13",
|
||||||
|
"versionEndExcluding": "5.10.37",
|
||||||
|
"matchCriteriaId": "9CB65072-E0B1-4A32-82AA-951AFAA9B266"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "5.11",
|
||||||
|
"versionEndExcluding": "5.11.21",
|
||||||
|
"matchCriteriaId": "8CBB94EC-EC33-4464-99C5-03E5542715F0"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "5.12",
|
||||||
|
"versionEndExcluding": "5.12.4",
|
||||||
|
"matchCriteriaId": "D8C7052F-1B7B-4327-9C2B-84EBF3243838"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/18149b420c9bd93c443e8d1f48a063d71d9f6aa1",
|
"url": "https://git.kernel.org/stable/c/18149b420c9bd93c443e8d1f48a063d71d9f6aa1",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/4d906839d321c2efbf3fed4bc31ffd9ff55b75c0",
|
"url": "https://git.kernel.org/stable/c/4d906839d321c2efbf3fed4bc31ffd9ff55b75c0",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/98d7d76a74e48ec3ddf2e23950adff7edcab9327",
|
"url": "https://git.kernel.org/stable/c/98d7d76a74e48ec3ddf2e23950adff7edcab9327",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/ce450934a00cf896e648fde08d0bd1426653d7a2",
|
"url": "https://git.kernel.org/stable/c/ce450934a00cf896e648fde08d0bd1426653d7a2",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/18149b420c9bd93c443e8d1f48a063d71d9f6aa1",
|
"url": "https://git.kernel.org/stable/c/18149b420c9bd93c443e8d1f48a063d71d9f6aa1",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/4d906839d321c2efbf3fed4bc31ffd9ff55b75c0",
|
"url": "https://git.kernel.org/stable/c/4d906839d321c2efbf3fed4bc31ffd9ff55b75c0",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/98d7d76a74e48ec3ddf2e23950adff7edcab9327",
|
"url": "https://git.kernel.org/stable/c/98d7d76a74e48ec3ddf2e23950adff7edcab9327",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/ce450934a00cf896e648fde08d0bd1426653d7a2",
|
"url": "https://git.kernel.org/stable/c/ce450934a00cf896e648fde08d0bd1426653d7a2",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2023-29180",
|
"id": "CVE-2023-29180",
|
||||||
"sourceIdentifier": "psirt@fortinet.com",
|
"sourceIdentifier": "psirt@fortinet.com",
|
||||||
"published": "2024-02-22T10:15:07.947",
|
"published": "2024-02-22T10:15:07.947",
|
||||||
"lastModified": "2024-11-21T07:56:40.133",
|
"lastModified": "2024-12-10T16:58:41.603",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -36,6 +36,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 3.9,
|
"exploitabilityScore": 3.9,
|
||||||
"impactScore": 3.6
|
"impactScore": 3.6
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"baseScore": 7.5,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 3.6
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -51,14 +71,119 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "1.0.0",
|
||||||
|
"versionEndIncluding": "1.0.7",
|
||||||
|
"matchCriteriaId": "22936F53-4480-4011-9211-174D1C507E87"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "1.1.0",
|
||||||
|
"versionEndIncluding": "1.1.6",
|
||||||
|
"matchCriteriaId": "E6BBF05F-4967-4A2E-A8F8-C2086097148B"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "1.2.0",
|
||||||
|
"versionEndIncluding": "1.2.13",
|
||||||
|
"matchCriteriaId": "33B84D9A-55E3-4146-A55A-ACB507E61B05"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "2.0.0",
|
||||||
|
"versionEndExcluding": "2.0.13",
|
||||||
|
"matchCriteriaId": "A233FC6A-9ABE-46AC-8332-0DD0075C6DB6"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "7.0.0",
|
||||||
|
"versionEndExcluding": "7.0.11",
|
||||||
|
"matchCriteriaId": "A5D70694-BB02-43E2-8F74-D50D9D4C5E3C"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "7.2.0",
|
||||||
|
"versionEndExcluding": "7.2.4",
|
||||||
|
"matchCriteriaId": "9A0AB0B8-819F-46EE-A921-119B76A138B5"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.0.0",
|
||||||
|
"versionEndExcluding": "6.0.17",
|
||||||
|
"matchCriteriaId": "F15A3418-4EE7-402B-9711-4F577FC64397"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.2.0",
|
||||||
|
"versionEndExcluding": "6.2.15",
|
||||||
|
"matchCriteriaId": "05454D49-17D8-4A7D-92C8-B33B006A35DA"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.4.0",
|
||||||
|
"versionEndExcluding": "6.4.13",
|
||||||
|
"matchCriteriaId": "B153B056-24AE-41C4-B644-65E080C18360"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "7.0.0",
|
||||||
|
"versionEndExcluding": "7.0.12",
|
||||||
|
"matchCriteriaId": "39A6C2A7-21A4-4BB5-A3B6-9466E5CEA296"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "7.2.0",
|
||||||
|
"versionEndExcluding": "7.2.5",
|
||||||
|
"matchCriteriaId": "4562BDF7-D894-4CD8-95AC-9409FDEBE73F"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://fortiguard.com/psirt/FG-IR-23-111",
|
"url": "https://fortiguard.com/psirt/FG-IR-23-111",
|
||||||
"source": "psirt@fortinet.com"
|
"source": "psirt@fortinet.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://fortiguard.com/psirt/FG-IR-23-111",
|
"url": "https://fortiguard.com/psirt/FG-IR-23-111",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
100
CVE-2024/CVE-2024-104xx/CVE-2024-10494.json
Normal file
100
CVE-2024/CVE-2024-104xx/CVE-2024-10494.json
Normal file
@ -0,0 +1,100 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-10494",
|
||||||
|
"sourceIdentifier": "security@ni.com",
|
||||||
|
"published": "2024-12-10T16:15:21.930",
|
||||||
|
"lastModified": "2024-12-10T16:15:21.930",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "An out of bounds read due to improper input validation in HeapObjMapImpl.cpp in NI LabVIEW may disclose information or result in arbitrary code execution. Successful exploitation requires an attacker to provide a user with a specially crafted VI. This vulnerability affects LabVIEW 2024 Q3 and prior versions."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV40": [
|
||||||
|
{
|
||||||
|
"source": "security@ni.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "4.0",
|
||||||
|
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||||
|
"baseScore": 8.4,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"attackRequirements": "NONE",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "ACTIVE",
|
||||||
|
"vulnerableSystemConfidentiality": "HIGH",
|
||||||
|
"vulnerableSystemIntegrity": "HIGH",
|
||||||
|
"vulnerableSystemAvailability": "HIGH",
|
||||||
|
"subsequentSystemConfidentiality": "LOW",
|
||||||
|
"subsequentSystemIntegrity": "LOW",
|
||||||
|
"subsequentSystemAvailability": "NONE",
|
||||||
|
"exploitMaturity": "NOT_DEFINED",
|
||||||
|
"confidentialityRequirements": "NOT_DEFINED",
|
||||||
|
"integrityRequirements": "NOT_DEFINED",
|
||||||
|
"availabilityRequirements": "NOT_DEFINED",
|
||||||
|
"modifiedAttackVector": "NOT_DEFINED",
|
||||||
|
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||||
|
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||||
|
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||||
|
"modifiedUserInteraction": "NOT_DEFINED",
|
||||||
|
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||||
|
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||||
|
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||||
|
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||||
|
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||||
|
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||||
|
"safety": "NOT_DEFINED",
|
||||||
|
"automatable": "NOT_DEFINED",
|
||||||
|
"recovery": "NOT_DEFINED",
|
||||||
|
"valueDensity": "NOT_DEFINED",
|
||||||
|
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||||
|
"providerUrgency": "NOT_DEFINED"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security@ni.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 7.8,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security@ni.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-1285"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/out-of-bounds-read-vulnerabilities-in-ni-labview-.html",
|
||||||
|
"source": "security@ni.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
100
CVE-2024/CVE-2024-104xx/CVE-2024-10495.json
Normal file
100
CVE-2024/CVE-2024-104xx/CVE-2024-10495.json
Normal file
@ -0,0 +1,100 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-10495",
|
||||||
|
"sourceIdentifier": "security@ni.com",
|
||||||
|
"published": "2024-12-10T16:15:22.080",
|
||||||
|
"lastModified": "2024-12-10T16:15:22.080",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "An out of bounds read due to improper input validation when loading the font table in fontmgr.cpp in NI LabVIEW may disclose information or result in arbitrary code execution. Successful exploitation requires an attacker to provide a user with a specially crafted VI. This vulnerability affects LabVIEW 2024 Q3 and prior versions."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV40": [
|
||||||
|
{
|
||||||
|
"source": "security@ni.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "4.0",
|
||||||
|
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||||
|
"baseScore": 8.4,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"attackRequirements": "NONE",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "ACTIVE",
|
||||||
|
"vulnerableSystemConfidentiality": "HIGH",
|
||||||
|
"vulnerableSystemIntegrity": "HIGH",
|
||||||
|
"vulnerableSystemAvailability": "HIGH",
|
||||||
|
"subsequentSystemConfidentiality": "LOW",
|
||||||
|
"subsequentSystemIntegrity": "LOW",
|
||||||
|
"subsequentSystemAvailability": "NONE",
|
||||||
|
"exploitMaturity": "NOT_DEFINED",
|
||||||
|
"confidentialityRequirements": "NOT_DEFINED",
|
||||||
|
"integrityRequirements": "NOT_DEFINED",
|
||||||
|
"availabilityRequirements": "NOT_DEFINED",
|
||||||
|
"modifiedAttackVector": "NOT_DEFINED",
|
||||||
|
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||||
|
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||||
|
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||||
|
"modifiedUserInteraction": "NOT_DEFINED",
|
||||||
|
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||||
|
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||||
|
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||||
|
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||||
|
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||||
|
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||||
|
"safety": "NOT_DEFINED",
|
||||||
|
"automatable": "NOT_DEFINED",
|
||||||
|
"recovery": "NOT_DEFINED",
|
||||||
|
"valueDensity": "NOT_DEFINED",
|
||||||
|
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||||
|
"providerUrgency": "NOT_DEFINED"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security@ni.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 7.8,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security@ni.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-1285"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/out-of-bounds-read-vulnerabilities-in-ni-labview-.html",
|
||||||
|
"source": "security@ni.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
100
CVE-2024/CVE-2024-104xx/CVE-2024-10496.json
Normal file
100
CVE-2024/CVE-2024-104xx/CVE-2024-10496.json
Normal file
@ -0,0 +1,100 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-10496",
|
||||||
|
"sourceIdentifier": "security@ni.com",
|
||||||
|
"published": "2024-12-10T16:15:22.203",
|
||||||
|
"lastModified": "2024-12-10T16:15:22.203",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "An out of bounds read due to improper input validation in BuildFontMap in fontmgr.cpp in NI LabVIEW may disclose information or result in arbitrary code execution. Successful exploitation requires an attacker to provide a user with a specially crafted VI. This vulnerability affects LabVIEW 2024 Q3 and prior versions."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV40": [
|
||||||
|
{
|
||||||
|
"source": "security@ni.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "4.0",
|
||||||
|
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||||
|
"baseScore": 8.4,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"attackRequirements": "NONE",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "ACTIVE",
|
||||||
|
"vulnerableSystemConfidentiality": "HIGH",
|
||||||
|
"vulnerableSystemIntegrity": "HIGH",
|
||||||
|
"vulnerableSystemAvailability": "HIGH",
|
||||||
|
"subsequentSystemConfidentiality": "LOW",
|
||||||
|
"subsequentSystemIntegrity": "LOW",
|
||||||
|
"subsequentSystemAvailability": "NONE",
|
||||||
|
"exploitMaturity": "NOT_DEFINED",
|
||||||
|
"confidentialityRequirements": "NOT_DEFINED",
|
||||||
|
"integrityRequirements": "NOT_DEFINED",
|
||||||
|
"availabilityRequirements": "NOT_DEFINED",
|
||||||
|
"modifiedAttackVector": "NOT_DEFINED",
|
||||||
|
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||||
|
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||||
|
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||||
|
"modifiedUserInteraction": "NOT_DEFINED",
|
||||||
|
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||||
|
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||||
|
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||||
|
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||||
|
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||||
|
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||||
|
"safety": "NOT_DEFINED",
|
||||||
|
"automatable": "NOT_DEFINED",
|
||||||
|
"recovery": "NOT_DEFINED",
|
||||||
|
"valueDensity": "NOT_DEFINED",
|
||||||
|
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||||
|
"providerUrgency": "NOT_DEFINED"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security@ni.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 7.8,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security@ni.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-1285"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/out-of-bounds-read-vulnerabilities-in-ni-labview-.html",
|
||||||
|
"source": "security@ni.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-10708",
|
"id": "CVE-2024-10708",
|
||||||
"sourceIdentifier": "contact@wpscan.com",
|
"sourceIdentifier": "contact@wpscan.com",
|
||||||
"published": "2024-12-10T06:15:20.737",
|
"published": "2024-12-10T06:15:20.737",
|
||||||
"lastModified": "2024-12-10T06:15:20.737",
|
"lastModified": "2024-12-10T16:15:22.327",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Received",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -11,7 +11,30 @@
|
|||||||
"value": "The System Dashboard WordPress plugin before 2.8.15 does not validate user input used in a path, which could allow high privilege users such as admin to perform path traversal attacks an read arbitrary files on the server"
|
"value": "The System Dashboard WordPress plugin before 2.8.15 does not validate user input used in a path, which could allow high privilege users such as admin to perform path traversal attacks an read arbitrary files on the server"
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
|
||||||
|
"baseScore": 4.9,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.2,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://wpscan.com/vulnerability/61d750a5-8c2c-4c94-a1a9-6a254c2a0d03/",
|
"url": "https://wpscan.com/vulnerability/61d750a5-8c2c-4c94-a1a9-6a254c2a0d03/",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-11107",
|
"id": "CVE-2024-11107",
|
||||||
"sourceIdentifier": "contact@wpscan.com",
|
"sourceIdentifier": "contact@wpscan.com",
|
||||||
"published": "2024-12-10T06:15:20.883",
|
"published": "2024-12-10T06:15:20.883",
|
||||||
"lastModified": "2024-12-10T06:15:20.883",
|
"lastModified": "2024-12-10T16:15:22.450",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Received",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -11,7 +11,30 @@
|
|||||||
"value": "The System Dashboard WordPress plugin before 2.8.15 does not sanitise and escape some parameters when outputting them in the page, which could allow unauthenticated users to perform Cross-Site Scripting attacks."
|
"value": "The System Dashboard WordPress plugin before 2.8.15 does not sanitise and escape some parameters when outputting them in the page, which could allow unauthenticated users to perform Cross-Site Scripting attacks."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"baseScore": 6.1,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 2.7
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://wpscan.com/vulnerability/a89f1117-8df3-417b-b54f-6587545833ee/",
|
"url": "https://wpscan.com/vulnerability/a89f1117-8df3-417b-b54f-6587545833ee/",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-11591",
|
"id": "CVE-2024-11591",
|
||||||
"sourceIdentifier": "cna@vuldb.com",
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
"published": "2024-11-21T14:15:08.713",
|
"published": "2024-11-21T14:15:08.713",
|
||||||
"lastModified": "2024-11-21T14:15:08.713",
|
"lastModified": "2024-12-10T16:55:46.527",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -80,6 +80,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 3.9,
|
"exploitabilityScore": 3.9,
|
||||||
"impactScore": 3.4
|
"impactScore": 3.4
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 9.8,
|
||||||
|
"baseSeverity": "CRITICAL",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 5.9
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"cvssMetricV2": [
|
"cvssMetricV2": [
|
||||||
@ -122,28 +142,71 @@
|
|||||||
"value": "CWE-89"
|
"value": "CWE-89"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-89"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:1000projects:beauty_parlour_management_system:1.0:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "4CC5BB9B-86BF-4DDC-9A70-B48A4707A48E"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://1000projects.org/",
|
"url": "https://1000projects.org/",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Product"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://github.com/Hacker0xone/CVE/issues/14",
|
"url": "https://github.com/Hacker0xone/CVE/issues/14",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?ctiid.285663",
|
"url": "https://vuldb.com/?ctiid.285663",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Permissions Required"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?id.285663",
|
"url": "https://vuldb.com/?id.285663",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?submit.445718",
|
"url": "https://vuldb.com/?submit.445718",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-11592",
|
"id": "CVE-2024-11592",
|
||||||
"sourceIdentifier": "cna@vuldb.com",
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
"published": "2024-11-21T15:15:25.003",
|
"published": "2024-11-21T15:15:25.003",
|
||||||
"lastModified": "2024-11-21T15:15:25.003",
|
"lastModified": "2024-12-10T16:52:43.287",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -80,6 +80,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 3.9,
|
"exploitabilityScore": 3.9,
|
||||||
"impactScore": 3.4
|
"impactScore": 3.4
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 9.8,
|
||||||
|
"baseSeverity": "CRITICAL",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 5.9
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"cvssMetricV2": [
|
"cvssMetricV2": [
|
||||||
@ -122,28 +142,71 @@
|
|||||||
"value": "CWE-89"
|
"value": "CWE-89"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-89"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:1000projects:beauty_parlour_management_system:1.0:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "4CC5BB9B-86BF-4DDC-9A70-B48A4707A48E"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://1000projects.org/",
|
"url": "https://1000projects.org/",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Product"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://github.com/Hacker0xone/CVE/issues/15",
|
"url": "https://github.com/Hacker0xone/CVE/issues/15",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?ctiid.285664",
|
"url": "https://vuldb.com/?ctiid.285664",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Permissions Required"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?id.285664",
|
"url": "https://vuldb.com/?id.285664",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?submit.445719",
|
"url": "https://vuldb.com/?submit.445719",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-12180",
|
"id": "CVE-2024-12180",
|
||||||
"sourceIdentifier": "cna@vuldb.com",
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
"published": "2024-12-04T22:15:22.140",
|
"published": "2024-12-04T22:15:22.140",
|
||||||
"lastModified": "2024-12-04T22:15:22.140",
|
"lastModified": "2024-12-10T16:34:52.763",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -80,6 +80,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 2.1,
|
"exploitabilityScore": 2.1,
|
||||||
"impactScore": 1.4
|
"impactScore": 1.4
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"baseScore": 5.4,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.3,
|
||||||
|
"impactScore": 2.7
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"cvssMetricV2": [
|
"cvssMetricV2": [
|
||||||
@ -122,24 +142,65 @@
|
|||||||
"value": "CWE-94"
|
"value": "CWE-94"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:dedecms:dedecms:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "5.7.116",
|
||||||
|
"matchCriteriaId": "75A7C6F6-9828-495D-B2F4-55E6EDEB61A8"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/Hebing123/cve/issues/76",
|
"url": "https://github.com/Hebing123/cve/issues/76",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?ctiid.286902",
|
"url": "https://vuldb.com/?ctiid.286902",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Permissions Required"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?id.286902",
|
"url": "https://vuldb.com/?id.286902",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?submit.452969",
|
"url": "https://vuldb.com/?submit.452969",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-12181",
|
"id": "CVE-2024-12181",
|
||||||
"sourceIdentifier": "cna@vuldb.com",
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
"published": "2024-12-04T22:15:22.360",
|
"published": "2024-12-04T22:15:22.360",
|
||||||
"lastModified": "2024-12-04T22:15:22.360",
|
"lastModified": "2024-12-10T16:29:18.917",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -80,6 +80,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 2.1,
|
"exploitabilityScore": 2.1,
|
||||||
"impactScore": 1.4
|
"impactScore": 1.4
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"baseScore": 5.4,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.3,
|
||||||
|
"impactScore": 2.7
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"cvssMetricV2": [
|
"cvssMetricV2": [
|
||||||
@ -122,24 +142,65 @@
|
|||||||
"value": "CWE-94"
|
"value": "CWE-94"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:dedecms:dedecms:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "5.7.116",
|
||||||
|
"matchCriteriaId": "75A7C6F6-9828-495D-B2F4-55E6EDEB61A8"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/Hebing123/cve/issues/77",
|
"url": "https://github.com/Hebing123/cve/issues/77",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?ctiid.286903",
|
"url": "https://vuldb.com/?ctiid.286903",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Permissions Required"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?id.286903",
|
"url": "https://vuldb.com/?id.286903",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?submit.452983",
|
"url": "https://vuldb.com/?submit.452983",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,13 +2,17 @@
|
|||||||
"id": "CVE-2024-12182",
|
"id": "CVE-2024-12182",
|
||||||
"sourceIdentifier": "cna@vuldb.com",
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
"published": "2024-12-04T23:15:04.703",
|
"published": "2024-12-04T23:15:04.703",
|
||||||
"lastModified": "2024-12-04T23:15:04.703",
|
"lastModified": "2024-12-10T16:18:29.027",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "A vulnerability, which was classified as problematic, has been found in DedeCMS 5.7.116. Affected by this issue is some unknown functionality of the file /member/soft_add.php. The manipulation of the argument body leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
|
"value": "A vulnerability, which was classified as problematic, has been found in DedeCMS 5.7.116. Affected by this issue is some unknown functionality of the file /member/soft_add.php. The manipulation of the argument body leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Se ha encontrado una vulnerabilidad clasificada como problem\u00e1tica en DedeCMS 5.7.116. Este problema afecta a algunas funciones desconocidas del archivo /member/soft_add.php. La manipulaci\u00f3n del cuerpo del argumento provoca ataques de cross site scripting. El ataque puede ejecutarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
@ -76,6 +80,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 2.1,
|
"exploitabilityScore": 2.1,
|
||||||
"impactScore": 1.4
|
"impactScore": 1.4
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"baseScore": 5.4,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.3,
|
||||||
|
"impactScore": 2.7
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"cvssMetricV2": [
|
"cvssMetricV2": [
|
||||||
@ -118,24 +142,65 @@
|
|||||||
"value": "CWE-94"
|
"value": "CWE-94"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:dedecms:dedecms:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "5.7.116",
|
||||||
|
"matchCriteriaId": "75A7C6F6-9828-495D-B2F4-55E6EDEB61A8"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/Hebing123/cve/issues/78",
|
"url": "https://github.com/Hebing123/cve/issues/78",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?ctiid.286904",
|
"url": "https://vuldb.com/?ctiid.286904",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Permissions Required"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?id.286904",
|
"url": "https://vuldb.com/?id.286904",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?submit.453003",
|
"url": "https://vuldb.com/?submit.453003",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,13 +2,17 @@
|
|||||||
"id": "CVE-2024-12183",
|
"id": "CVE-2024-12183",
|
||||||
"sourceIdentifier": "cna@vuldb.com",
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
"published": "2024-12-04T23:15:05.760",
|
"published": "2024-12-04T23:15:05.760",
|
||||||
"lastModified": "2024-12-04T23:15:05.760",
|
"lastModified": "2024-12-10T16:05:39.010",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "A vulnerability, which was classified as problematic, was found in DedeCMS 5.7.116. This affects the function RemoveXSS of the file /plus/carbuyaction.php of the component HTTP POST Request Handler. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
|
"value": "A vulnerability, which was classified as problematic, was found in DedeCMS 5.7.116. This affects the function RemoveXSS of the file /plus/carbuyaction.php of the component HTTP POST Request Handler. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "En DedeCMS 5.7.116 se ha detectado una vulnerabilidad clasificada como problem\u00e1tica que afecta a la funci\u00f3n RemoveXSS del archivo /plus/carbuyaction.php del componente HTTP POST Request Handler. La manipulaci\u00f3n provoca ataques de cross site scripting. Es posible iniciar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
@ -76,6 +80,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 2.1,
|
"exploitabilityScore": 2.1,
|
||||||
"impactScore": 1.4
|
"impactScore": 1.4
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"baseScore": 5.4,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.3,
|
||||||
|
"impactScore": 2.7
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"cvssMetricV2": [
|
"cvssMetricV2": [
|
||||||
@ -118,24 +142,65 @@
|
|||||||
"value": "CWE-94"
|
"value": "CWE-94"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:dedecms:dedecms:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "5.7.116",
|
||||||
|
"matchCriteriaId": "75A7C6F6-9828-495D-B2F4-55E6EDEB61A8"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/Hebing123/cve/issues/79",
|
"url": "https://github.com/Hebing123/cve/issues/79",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?ctiid.286905",
|
"url": "https://vuldb.com/?ctiid.286905",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Permissions Required"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?id.286905",
|
"url": "https://vuldb.com/?id.286905",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?submit.453374",
|
"url": "https://vuldb.com/?submit.453374",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,13 +2,17 @@
|
|||||||
"id": "CVE-2024-12185",
|
"id": "CVE-2024-12185",
|
||||||
"sourceIdentifier": "cna@vuldb.com",
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
"published": "2024-12-05T00:15:18.677",
|
"published": "2024-12-05T00:15:18.677",
|
||||||
"lastModified": "2024-12-05T00:15:18.677",
|
"lastModified": "2024-12-10T15:57:03.543",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "A vulnerability has been found in code-projects Hotel Management System 1.0 and classified as problematic. This vulnerability affects unknown code of the component Administrator Login Password Handler. The manipulation of the argument Str2 leads to stack-based buffer overflow. An attack has to be approached locally. The exploit has been disclosed to the public and may be used."
|
"value": "A vulnerability has been found in code-projects Hotel Management System 1.0 and classified as problematic. This vulnerability affects unknown code of the component Administrator Login Password Handler. The manipulation of the argument Str2 leads to stack-based buffer overflow. An attack has to be approached locally. The exploit has been disclosed to the public and may be used."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Se ha encontrado una vulnerabilidad en code-projects Hotel Management System 1.0 y se ha clasificado como problem\u00e1tica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del componente Administrator Login Password Handler. La manipulaci\u00f3n del argumento Str2 provoca un desbordamiento del b\u00fafer basado en la pila. El ataque debe realizarse de forma local. El exploit se ha hecho p\u00fablico y puede utilizarse."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
@ -76,6 +80,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 1.8,
|
"exploitabilityScore": 1.8,
|
||||||
"impactScore": 3.4
|
"impactScore": 3.4
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 7.8,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 5.9
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"cvssMetricV2": [
|
"cvssMetricV2": [
|
||||||
@ -118,28 +142,71 @@
|
|||||||
"value": "CWE-121"
|
"value": "CWE-121"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-787"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:code-projects:hotel_management_system:1.0:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "FC0F4C77-47A0-4878-8F17-1694ED9DEE56"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://code-projects.org/",
|
"url": "https://code-projects.org/",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Product"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://github.com/1zzan/cve/blob/main/STACK-OVERFLOW1.md",
|
"url": "https://github.com/1zzan/cve/blob/main/STACK-OVERFLOW1.md",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?ctiid.286906",
|
"url": "https://vuldb.com/?ctiid.286906",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Permissions Required"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?id.286906",
|
"url": "https://vuldb.com/?id.286906",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?submit.454844",
|
"url": "https://vuldb.com/?submit.454844",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,13 +2,17 @@
|
|||||||
"id": "CVE-2024-12186",
|
"id": "CVE-2024-12186",
|
||||||
"sourceIdentifier": "cna@vuldb.com",
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
"published": "2024-12-05T00:15:18.887",
|
"published": "2024-12-05T00:15:18.887",
|
||||||
"lastModified": "2024-12-05T00:15:18.887",
|
"lastModified": "2024-12-10T15:52:39.487",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "A vulnerability was found in code-projects Hotel Management System 1.0 and classified as problematic. This issue affects some unknown processing of the file hotelnew.c of the component Available Room Handler. The manipulation of the argument admin_entry leads to stack-based buffer overflow. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used."
|
"value": "A vulnerability was found in code-projects Hotel Management System 1.0 and classified as problematic. This issue affects some unknown processing of the file hotelnew.c of the component Available Room Handler. The manipulation of the argument admin_entry leads to stack-based buffer overflow. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Se ha encontrado una vulnerabilidad en code-projects Hotel Management System 1.0 y se ha clasificado como problem\u00e1tica. Este problema afecta a algunos procesos desconocidos del archivo hotelnew.c del componente Available Room Handler. La manipulaci\u00f3n del argumento admin_entry provoca un desbordamiento del b\u00fafer basado en la pila. Se requiere acceso local para abordar este ataque. El exploit se ha hecho p\u00fablico y puede utilizarse."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
@ -76,6 +80,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 1.8,
|
"exploitabilityScore": 1.8,
|
||||||
"impactScore": 3.4
|
"impactScore": 3.4
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 7.8,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 5.9
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"cvssMetricV2": [
|
"cvssMetricV2": [
|
||||||
@ -118,28 +142,71 @@
|
|||||||
"value": "CWE-121"
|
"value": "CWE-121"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-787"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:code-projects:hotel_management_system:1.0:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "FC0F4C77-47A0-4878-8F17-1694ED9DEE56"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://code-projects.org/",
|
"url": "https://code-projects.org/",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Product"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://github.com/1zzan/cve/blob/main/STACK-OVERFLOW2.md",
|
"url": "https://github.com/1zzan/cve/blob/main/STACK-OVERFLOW2.md",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?ctiid.286907",
|
"url": "https://vuldb.com/?ctiid.286907",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Permissions Required"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?id.286907",
|
"url": "https://vuldb.com/?id.286907",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?submit.454846",
|
"url": "https://vuldb.com/?submit.454846",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,13 +2,17 @@
|
|||||||
"id": "CVE-2024-12187",
|
"id": "CVE-2024-12187",
|
||||||
"sourceIdentifier": "cna@vuldb.com",
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
"published": "2024-12-05T01:15:04.740",
|
"published": "2024-12-05T01:15:04.740",
|
||||||
"lastModified": "2024-12-05T01:15:04.740",
|
"lastModified": "2024-12-10T15:25:53.537",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "A vulnerability was found in 1000 Projects Library Management System 1.0. It has been classified as critical. Affected is an unknown function of the file /showbook.php. The manipulation of the argument q leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
|
"value": "A vulnerability was found in 1000 Projects Library Management System 1.0. It has been classified as critical. Affected is an unknown function of the file /showbook.php. The manipulation of the argument q leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Se ha encontrado una vulnerabilidad en 1000 Projects Library Management System 1.0. Se ha clasificado como cr\u00edtica. Se ve afectada una funci\u00f3n desconocida del archivo /showbook.php. La manipulaci\u00f3n del argumento q provoca una inyecci\u00f3n SQL. Es posible lanzar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
@ -76,6 +80,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 3.9,
|
"exploitabilityScore": 3.9,
|
||||||
"impactScore": 3.4
|
"impactScore": 3.4
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 9.8,
|
||||||
|
"baseSeverity": "CRITICAL",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 5.9
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"cvssMetricV2": [
|
"cvssMetricV2": [
|
||||||
@ -118,28 +142,71 @@
|
|||||||
"value": "CWE-89"
|
"value": "CWE-89"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-89"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:1000projects:library_management_system:1.0:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "F7B5BC36-12E9-4DE1-B238-C53C11EEAFB7"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://1000projects.org/",
|
"url": "https://1000projects.org/",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Product"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://github.com/PunyHunter/CVE/issues/1",
|
"url": "https://github.com/PunyHunter/CVE/issues/1",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?ctiid.286908",
|
"url": "https://vuldb.com/?ctiid.286908",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Permissions Required"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?id.286908",
|
"url": "https://vuldb.com/?id.286908",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Permissions Required"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?submit.455058",
|
"url": "https://vuldb.com/?submit.455058",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
78
CVE-2024/CVE-2024-122xx/CVE-2024-12236.json
Normal file
78
CVE-2024/CVE-2024-122xx/CVE-2024-12236.json
Normal file
@ -0,0 +1,78 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-12236",
|
||||||
|
"sourceIdentifier": "cve-coordination@google.com",
|
||||||
|
"published": "2024-12-10T15:15:07.147",
|
||||||
|
"lastModified": "2024-12-10T15:15:07.147",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A security issue exists in Vertex Gemini API for customers using VPC-SC. By utilizing a custom crafted file URI for image input, data exfiltration is possible due to requests being routed outside the VPC-SC security perimeter, circumventing the intended security restrictions of VPC-SC.\n\nNo further fix actions are needed. Google Cloud Platform implemented a fix to return an error message when a media file URL is specified in the fileUri parameter and VPC Service Controls is enabled. Other use cases are unaffected."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV40": [
|
||||||
|
{
|
||||||
|
"source": "cve-coordination@google.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "4.0",
|
||||||
|
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||||
|
"baseScore": 6.8,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"attackRequirements": "PRESENT",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"vulnerableSystemConfidentiality": "HIGH",
|
||||||
|
"vulnerableSystemIntegrity": "NONE",
|
||||||
|
"vulnerableSystemAvailability": "NONE",
|
||||||
|
"subsequentSystemConfidentiality": "HIGH",
|
||||||
|
"subsequentSystemIntegrity": "NONE",
|
||||||
|
"subsequentSystemAvailability": "NONE",
|
||||||
|
"exploitMaturity": "NOT_DEFINED",
|
||||||
|
"confidentialityRequirements": "NOT_DEFINED",
|
||||||
|
"integrityRequirements": "NOT_DEFINED",
|
||||||
|
"availabilityRequirements": "NOT_DEFINED",
|
||||||
|
"modifiedAttackVector": "NOT_DEFINED",
|
||||||
|
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||||
|
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||||
|
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||||
|
"modifiedUserInteraction": "NOT_DEFINED",
|
||||||
|
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||||
|
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||||
|
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||||
|
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||||
|
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||||
|
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||||
|
"safety": "NOT_DEFINED",
|
||||||
|
"automatable": "NOT_DEFINED",
|
||||||
|
"recovery": "NOT_DEFINED",
|
||||||
|
"valueDensity": "NOT_DEFINED",
|
||||||
|
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||||
|
"providerUrgency": "NOT_DEFINED"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "cve-coordination@google.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-755"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://cloud.google.com/vertex-ai/generative-ai/docs/security-bulletins#gcp-2024-063",
|
||||||
|
"source": "cve-coordination@google.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
64
CVE-2024/CVE-2024-123xx/CVE-2024-12323.json
Normal file
64
CVE-2024/CVE-2024-123xx/CVE-2024-12323.json
Normal file
@ -0,0 +1,64 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-12323",
|
||||||
|
"sourceIdentifier": "security@wordfence.com",
|
||||||
|
"published": "2024-12-10T15:15:07.300",
|
||||||
|
"lastModified": "2024-12-10T15:15:07.300",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "The turboSMTP plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the \u2018page\u2019 parameter in all versions up to, and including, 4.6 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link while logged in to turboSMTP."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security@wordfence.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"baseScore": 6.1,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 2.7
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security@wordfence.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://plugins.trac.wordpress.org/browser/turbosmtp/trunk/turbo-stats-section.php#L209",
|
||||||
|
"source": "security@wordfence.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://plugins.trac.wordpress.org/changeset/3205021/",
|
||||||
|
"source": "security@wordfence.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/cca9f71c-42e6-416f-94f2-cb79bbdfc69a?source=cve",
|
||||||
|
"source": "security@wordfence.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-1547",
|
"id": "CVE-2024-1547",
|
||||||
"sourceIdentifier": "security@mozilla.org",
|
"sourceIdentifier": "security@mozilla.org",
|
||||||
"published": "2024-02-20T14:15:08.547",
|
"published": "2024-02-20T14:15:08.547",
|
||||||
"lastModified": "2024-11-21T08:50:47.990",
|
"lastModified": "2024-12-10T15:22:44.033",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -15,55 +15,171 @@
|
|||||||
"value": "A trav\u00e9s de una serie de llamadas API y redireccionamientos, se podr\u00eda haber mostrado un cuadro de di\u00e1logo de alerta controlado por el atacante en otro sitio web (con la URL del sitio web de la v\u00edctima mostrada). Esta vulnerabilidad afecta a Firefox < 123, Firefox ESR < 115.8 y Thunderbird < 115.8."
|
"value": "A trav\u00e9s de una serie de llamadas API y redireccionamientos, se podr\u00eda haber mostrado un cuadro de di\u00e1logo de alerta controlado por el atacante en otro sitio web (con la URL del sitio web de la v\u00edctima mostrada). Esta vulnerabilidad afecta a Firefox < 123, Firefox ESR < 115.8 y Thunderbird < 115.8."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||||||
|
"baseScore": 6.5,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "NVD-CWE-noinfo"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*",
|
||||||
|
"versionEndExcluding": "115.8.0",
|
||||||
|
"matchCriteriaId": "355C0EEB-8EF2-4464-BDD4-7616AA6A65FA"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:-:*:*:*",
|
||||||
|
"versionEndExcluding": "123.0",
|
||||||
|
"matchCriteriaId": "DD7E737F-745F-4A07-B4E3-B51D2DB6C96F"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "115.8.0",
|
||||||
|
"matchCriteriaId": "7380CBFA-8328-4F35-AE4F-46482C77BEF6"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1877879",
|
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1877879",
|
||||||
"source": "security@mozilla.org"
|
"source": "security@mozilla.org",
|
||||||
|
"tags": [
|
||||||
|
"Issue Tracking"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00000.html",
|
"url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00000.html",
|
||||||
"source": "security@mozilla.org"
|
"source": "security@mozilla.org",
|
||||||
|
"tags": [
|
||||||
|
"Mailing List"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00001.html",
|
"url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00001.html",
|
||||||
"source": "security@mozilla.org"
|
"source": "security@mozilla.org",
|
||||||
|
"tags": [
|
||||||
|
"Mailing List"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-05/",
|
"url": "https://www.mozilla.org/security/advisories/mfsa2024-05/",
|
||||||
"source": "security@mozilla.org"
|
"source": "security@mozilla.org",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-06/",
|
"url": "https://www.mozilla.org/security/advisories/mfsa2024-06/",
|
||||||
"source": "security@mozilla.org"
|
"source": "security@mozilla.org",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-07/",
|
"url": "https://www.mozilla.org/security/advisories/mfsa2024-07/",
|
||||||
"source": "security@mozilla.org"
|
"source": "security@mozilla.org",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1877879",
|
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1877879",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Issue Tracking"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00000.html",
|
"url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00000.html",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Mailing List"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00001.html",
|
"url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00001.html",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Mailing List"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-05/",
|
"url": "https://www.mozilla.org/security/advisories/mfsa2024-05/",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-06/",
|
"url": "https://www.mozilla.org/security/advisories/mfsa2024-06/",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-07/",
|
"url": "https://www.mozilla.org/security/advisories/mfsa2024-07/",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-1550",
|
"id": "CVE-2024-1550",
|
||||||
"sourceIdentifier": "security@mozilla.org",
|
"sourceIdentifier": "security@mozilla.org",
|
||||||
"published": "2024-02-20T14:15:08.733",
|
"published": "2024-02-20T14:15:08.733",
|
||||||
"lastModified": "2024-11-21T08:50:48.480",
|
"lastModified": "2024-12-10T15:30:13.977",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -15,55 +15,171 @@
|
|||||||
"value": "Un sitio web malicioso podr\u00eda haber utilizado una combinaci\u00f3n de salir del modo de pantalla completa y `requestPointerLock` para provocar que el mouse del usuario se reposicionara inesperadamente, lo que podr\u00eda haber llevado a confusi\u00f3n al usuario y haber otorgado permisos sin darse cuenta que no ten\u00eda intenci\u00f3n de otorgar. Esta vulnerabilidad afecta a Firefox < 123, Firefox ESR < 115.8 y Thunderbird < 115.8."
|
"value": "Un sitio web malicioso podr\u00eda haber utilizado una combinaci\u00f3n de salir del modo de pantalla completa y `requestPointerLock` para provocar que el mouse del usuario se reposicionara inesperadamente, lo que podr\u00eda haber llevado a confusi\u00f3n al usuario y haber otorgado permisos sin darse cuenta que no ten\u00eda intenci\u00f3n de otorgar. Esta vulnerabilidad afecta a Firefox < 123, Firefox ESR < 115.8 y Thunderbird < 115.8."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"baseScore": 6.1,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 2.7
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-1021"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*",
|
||||||
|
"versionEndExcluding": "115.8.0",
|
||||||
|
"matchCriteriaId": "355C0EEB-8EF2-4464-BDD4-7616AA6A65FA"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:-:*:*:*",
|
||||||
|
"versionEndExcluding": "123.0",
|
||||||
|
"matchCriteriaId": "DD7E737F-745F-4A07-B4E3-B51D2DB6C96F"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "115.8.0",
|
||||||
|
"matchCriteriaId": "7380CBFA-8328-4F35-AE4F-46482C77BEF6"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1860065",
|
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1860065",
|
||||||
"source": "security@mozilla.org"
|
"source": "security@mozilla.org",
|
||||||
|
"tags": [
|
||||||
|
"Issue Tracking"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00000.html",
|
"url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00000.html",
|
||||||
"source": "security@mozilla.org"
|
"source": "security@mozilla.org",
|
||||||
|
"tags": [
|
||||||
|
"Mailing List"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00001.html",
|
"url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00001.html",
|
||||||
"source": "security@mozilla.org"
|
"source": "security@mozilla.org",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-05/",
|
"url": "https://www.mozilla.org/security/advisories/mfsa2024-05/",
|
||||||
"source": "security@mozilla.org"
|
"source": "security@mozilla.org",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-06/",
|
"url": "https://www.mozilla.org/security/advisories/mfsa2024-06/",
|
||||||
"source": "security@mozilla.org"
|
"source": "security@mozilla.org",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-07/",
|
"url": "https://www.mozilla.org/security/advisories/mfsa2024-07/",
|
||||||
"source": "security@mozilla.org"
|
"source": "security@mozilla.org",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1860065",
|
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1860065",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Issue Tracking"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00000.html",
|
"url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00000.html",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Mailing List"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00001.html",
|
"url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00001.html",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Mailing List"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-05/",
|
"url": "https://www.mozilla.org/security/advisories/mfsa2024-05/",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-06/",
|
"url": "https://www.mozilla.org/security/advisories/mfsa2024-06/",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-07/",
|
"url": "https://www.mozilla.org/security/advisories/mfsa2024-07/",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-22121",
|
"id": "CVE-2024-22121",
|
||||||
"sourceIdentifier": "security@zabbix.com",
|
"sourceIdentifier": "security@zabbix.com",
|
||||||
"published": "2024-08-12T13:38:16.070",
|
"published": "2024-08-12T13:38:16.070",
|
||||||
"lastModified": "2024-08-12T13:41:36.517",
|
"lastModified": "2024-12-10T16:19:19.810",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -36,6 +36,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 1.8,
|
"exploitabilityScore": 1.8,
|
||||||
"impactScore": 4.2
|
"impactScore": 4.2
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L",
|
||||||
|
"baseScore": 6.1,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "LOW"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 4.2
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -49,12 +69,128 @@
|
|||||||
"value": "CWE-281"
|
"value": "CWE-281"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-281"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "5.0.0",
|
||||||
|
"versionEndIncluding": "5.0.42",
|
||||||
|
"matchCriteriaId": "D5950D0D-9DFF-4B36-9AAF-43CBCEFE7101"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.0.0",
|
||||||
|
"versionEndIncluding": "6.0.30",
|
||||||
|
"matchCriteriaId": "D1D26F5C-A94F-4273-81D7-7DDF7541C3E7"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.4.0",
|
||||||
|
"versionEndIncluding": "6.4.15",
|
||||||
|
"matchCriteriaId": "E0DA6900-EB3E-4867-BD97-243686EECADD"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha1:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "93EB5757-7F98-4428-9616-C30A647A6612"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha2:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "DA00BDB5-433F-44E5-87AC-DA01C64B5DB3"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha3:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "98C46C92-9D86-45CD-88FE-DFBB5502BB88"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha4:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "B568E6DD-A6D1-4402-BB40-7DA2596A5BC8"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha5:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "B9C3673B-8459-4C63-8E90-724D1D42A8BB"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha6:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "7C9F6957-7526-4852-A579-DE556DBFAA97"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha7:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "81A7A191-93DE-4C5D-963E-E8890FF7AACA"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha8:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "AEE202D5-3C88-43A5-9328-FC78D0B9B8CF"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha9:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "F88BFB75-7951-47D5-941F-3839E9E31FFA"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:beta1:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "8216247E-C160-4D2C-906E-9D8CD731B5C2"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:beta2:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "06548219-0DC3-4B5B-85D1-B1EE0FA30CD2"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:beta3:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "4D23985B-2F4D-41F6-B9D6-7B184FC7E447"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:rc1:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "97964B9B-6A5E-4547-8886-E81B0849A876"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:rc2:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "40992B5F-0D83-4D5C-9188-E84C369FF92F"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://support.zabbix.com/browse/ZBX-25011",
|
"url": "https://support.zabbix.com/browse/ZBX-25011",
|
||||||
"source": "security@zabbix.com"
|
"source": "security@zabbix.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-22123",
|
"id": "CVE-2024-22123",
|
||||||
"sourceIdentifier": "security@zabbix.com",
|
"sourceIdentifier": "security@zabbix.com",
|
||||||
"published": "2024-08-12T13:38:16.520",
|
"published": "2024-08-12T13:38:16.520",
|
||||||
"lastModified": "2024-08-12T13:41:36.517",
|
"lastModified": "2024-12-10T16:32:45.670",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -36,6 +36,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 1.2,
|
"exploitabilityScore": 1.2,
|
||||||
"impactScore": 1.4
|
"impactScore": 1.4
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N",
|
||||||
|
"baseScore": 2.7,
|
||||||
|
"baseSeverity": "LOW",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.2,
|
||||||
|
"impactScore": 1.4
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -49,12 +69,128 @@
|
|||||||
"value": "CWE-94"
|
"value": "CWE-94"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-94"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "5.0.0",
|
||||||
|
"versionEndIncluding": "5.0.42",
|
||||||
|
"matchCriteriaId": "D5950D0D-9DFF-4B36-9AAF-43CBCEFE7101"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.0.0",
|
||||||
|
"versionEndIncluding": "6.0.30",
|
||||||
|
"matchCriteriaId": "D1D26F5C-A94F-4273-81D7-7DDF7541C3E7"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.4.0",
|
||||||
|
"versionEndIncluding": "6.4.15",
|
||||||
|
"matchCriteriaId": "E0DA6900-EB3E-4867-BD97-243686EECADD"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha1:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "93EB5757-7F98-4428-9616-C30A647A6612"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha2:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "DA00BDB5-433F-44E5-87AC-DA01C64B5DB3"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha3:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "98C46C92-9D86-45CD-88FE-DFBB5502BB88"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha4:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "B568E6DD-A6D1-4402-BB40-7DA2596A5BC8"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha5:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "B9C3673B-8459-4C63-8E90-724D1D42A8BB"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha6:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "7C9F6957-7526-4852-A579-DE556DBFAA97"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha7:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "81A7A191-93DE-4C5D-963E-E8890FF7AACA"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha8:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "AEE202D5-3C88-43A5-9328-FC78D0B9B8CF"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha9:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "F88BFB75-7951-47D5-941F-3839E9E31FFA"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:beta1:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "8216247E-C160-4D2C-906E-9D8CD731B5C2"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:beta2:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "06548219-0DC3-4B5B-85D1-B1EE0FA30CD2"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:beta3:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "4D23985B-2F4D-41F6-B9D6-7B184FC7E447"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:rc1:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "97964B9B-6A5E-4547-8886-E81B0849A876"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:rc2:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "40992B5F-0D83-4D5C-9188-E84C369FF92F"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://support.zabbix.com/browse/ZBX-25013",
|
"url": "https://support.zabbix.com/browse/ZBX-25013",
|
||||||
"source": "security@zabbix.com"
|
"source": "security@zabbix.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-25624",
|
"id": "CVE-2024-25624",
|
||||||
"sourceIdentifier": "security-advisories@github.com",
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
"published": "2024-04-25T17:15:48.813",
|
"published": "2024-04-25T17:15:48.813",
|
||||||
"lastModified": "2024-11-21T09:01:06.270",
|
"lastModified": "2024-12-10T15:06:18.390",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -36,6 +36,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 0.9,
|
"exploitabilityScore": 0.9,
|
||||||
"impactScore": 5.9
|
"impactScore": 5.9
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 6.8,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 0.9,
|
||||||
|
"impactScore": 5.9
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -49,16 +69,50 @@
|
|||||||
"value": "CWE-1336"
|
"value": "CWE-1336"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-94"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:dfir-iris:iris:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "2.4.6",
|
||||||
|
"matchCriteriaId": "79080556-99C4-4B41-8354-6169D24EE1EB"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/dfir-iris/iris-web/security/advisories/GHSA-m64w-f7fg-hpcr",
|
"url": "https://github.com/dfir-iris/iris-web/security/advisories/GHSA-m64w-f7fg-hpcr",
|
||||||
"source": "security-advisories@github.com"
|
"source": "security-advisories@github.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://github.com/dfir-iris/iris-web/security/advisories/GHSA-m64w-f7fg-hpcr",
|
"url": "https://github.com/dfir-iris/iris-web/security/advisories/GHSA-m64w-f7fg-hpcr",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-25640",
|
"id": "CVE-2024-25640",
|
||||||
"sourceIdentifier": "security-advisories@github.com",
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
"published": "2024-02-19T20:15:46.270",
|
"published": "2024-02-19T20:15:46.270",
|
||||||
"lastModified": "2024-11-21T09:01:08.217",
|
"lastModified": "2024-12-10T15:02:48.627",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -36,6 +36,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 2.1,
|
"exploitabilityScore": 2.1,
|
||||||
"impactScore": 2.5
|
"impactScore": 2.5
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"baseScore": 5.4,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.3,
|
||||||
|
"impactScore": 2.7
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -49,16 +69,50 @@
|
|||||||
"value": "CWE-87"
|
"value": "CWE-87"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:dfir-iris:iris:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "2.4.0",
|
||||||
|
"matchCriteriaId": "68F39E0F-CFD2-4344-8015-510427D062BC"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/dfir-iris/iris-web/security/advisories/GHSA-2xq6-qc74-w5vp",
|
"url": "https://github.com/dfir-iris/iris-web/security/advisories/GHSA-2xq6-qc74-w5vp",
|
||||||
"source": "security-advisories@github.com"
|
"source": "security-advisories@github.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://github.com/dfir-iris/iris-web/security/advisories/GHSA-2xq6-qc74-w5vp",
|
"url": "https://github.com/dfir-iris/iris-web/security/advisories/GHSA-2xq6-qc74-w5vp",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-27878",
|
"id": "CVE-2024-27878",
|
||||||
"sourceIdentifier": "product-security@apple.com",
|
"sourceIdentifier": "product-security@apple.com",
|
||||||
"published": "2024-07-29T23:15:10.747",
|
"published": "2024-07-29T23:15:10.747",
|
||||||
"lastModified": "2024-11-21T09:05:19.930",
|
"lastModified": "2024-12-10T15:14:11.670",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -17,6 +17,26 @@
|
|||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 6.7,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 0.8,
|
||||||
|
"impactScore": 5.9
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -39,22 +59,65 @@
|
|||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-120"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "14.0",
|
||||||
|
"versionEndExcluding": "14.6",
|
||||||
|
"matchCriteriaId": "51E2E93B-C5A3-4C83-B806-2EC555AD45FE"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "http://seclists.org/fulldisclosure/2024/Jul/18",
|
"url": "http://seclists.org/fulldisclosure/2024/Jul/18",
|
||||||
"source": "product-security@apple.com"
|
"source": "product-security@apple.com",
|
||||||
|
"tags": [
|
||||||
|
"Mailing List"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://support.apple.com/en-us/HT214119",
|
"url": "https://support.apple.com/en-us/HT214119",
|
||||||
"source": "product-security@apple.com"
|
"source": "product-security@apple.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "http://seclists.org/fulldisclosure/2024/Jul/18",
|
"url": "http://seclists.org/fulldisclosure/2024/Jul/18",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Mailing List"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://support.apple.com/en-us/HT214119",
|
"url": "https://support.apple.com/en-us/HT214119",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-33616",
|
"id": "CVE-2024-33616",
|
||||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||||
"published": "2024-11-26T08:15:05.987",
|
"published": "2024-11-26T08:15:05.987",
|
||||||
"lastModified": "2024-11-26T08:15:05.987",
|
"lastModified": "2024-12-10T16:15:23.160",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -39,6 +39,18 @@
|
|||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-306"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://global.sharp/products/copier/info/info_security_2024-05.html",
|
"url": "https://global.sharp/products/copier/info/info_security_2024-05.html",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-36460",
|
"id": "CVE-2024-36460",
|
||||||
"sourceIdentifier": "security@zabbix.com",
|
"sourceIdentifier": "security@zabbix.com",
|
||||||
"published": "2024-08-12T13:38:21.960",
|
"published": "2024-08-12T13:38:21.960",
|
||||||
"lastModified": "2024-08-12T13:41:36.517",
|
"lastModified": "2024-12-10T16:14:57.453",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -36,6 +36,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 2.8,
|
"exploitabilityScore": 2.8,
|
||||||
"impactScore": 5.2
|
"impactScore": 5.2
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
|
||||||
|
"baseScore": 8.1,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 5.2
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -49,12 +69,63 @@
|
|||||||
"value": "CWE-256"
|
"value": "CWE-256"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-522"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "5.0.0",
|
||||||
|
"versionEndIncluding": "5.0.42",
|
||||||
|
"matchCriteriaId": "D5950D0D-9DFF-4B36-9AAF-43CBCEFE7101"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.0.0",
|
||||||
|
"versionEndIncluding": "6.0.30",
|
||||||
|
"matchCriteriaId": "D1D26F5C-A94F-4273-81D7-7DDF7541C3E7"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.4.0",
|
||||||
|
"versionEndIncluding": "6.4.15",
|
||||||
|
"matchCriteriaId": "E0DA6900-EB3E-4867-BD97-243686EECADD"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "24103B6D-6CB0-4F86-BA59-426E24F9F72A"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://support.zabbix.com/browse/ZBX-25017",
|
"url": "https://support.zabbix.com/browse/ZBX-25017",
|
||||||
"source": "security@zabbix.com"
|
"source": "security@zabbix.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-36461",
|
"id": "CVE-2024-36461",
|
||||||
"sourceIdentifier": "security@zabbix.com",
|
"sourceIdentifier": "security@zabbix.com",
|
||||||
"published": "2024-08-12T13:38:22.180",
|
"published": "2024-08-12T13:38:22.180",
|
||||||
"lastModified": "2024-08-12T13:41:36.517",
|
"lastModified": "2024-12-10T16:15:23.177",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -36,6 +36,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 3.1,
|
"exploitabilityScore": 3.1,
|
||||||
"impactScore": 5.3
|
"impactScore": 5.3
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 8.8,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 5.9
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -49,12 +69,56 @@
|
|||||||
"value": "CWE-822"
|
"value": "CWE-822"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "NVD-CWE-Other"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.0.0",
|
||||||
|
"versionEndIncluding": "6.0.30",
|
||||||
|
"matchCriteriaId": "D1D26F5C-A94F-4273-81D7-7DDF7541C3E7"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.4.0",
|
||||||
|
"versionEndIncluding": "6.4.15",
|
||||||
|
"matchCriteriaId": "E0DA6900-EB3E-4867-BD97-243686EECADD"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "24103B6D-6CB0-4F86-BA59-426E24F9F72A"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://support.zabbix.com/browse/ZBX-25018",
|
"url": "https://support.zabbix.com/browse/ZBX-25018",
|
||||||
"source": "security@zabbix.com"
|
"source": "security@zabbix.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-36462",
|
"id": "CVE-2024-36462",
|
||||||
"sourceIdentifier": "security@zabbix.com",
|
"sourceIdentifier": "security@zabbix.com",
|
||||||
"published": "2024-08-12T13:38:22.400",
|
"published": "2024-08-12T13:38:22.400",
|
||||||
"lastModified": "2024-08-12T13:41:36.517",
|
"lastModified": "2024-12-10T16:15:37.193",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -36,6 +36,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 3.9,
|
"exploitabilityScore": 3.9,
|
||||||
"impactScore": 3.6
|
"impactScore": 3.6
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"baseScore": 7.5,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 3.6
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -49,12 +69,42 @@
|
|||||||
"value": "CWE-770"
|
"value": "CWE-770"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-770"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "24103B6D-6CB0-4F86-BA59-426E24F9F72A"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://support.zabbix.com/browse/ZBX-25019",
|
"url": "https://support.zabbix.com/browse/ZBX-25019",
|
||||||
"source": "security@zabbix.com"
|
"source": "security@zabbix.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,13 +2,13 @@
|
|||||||
"id": "CVE-2024-38829",
|
"id": "CVE-2024-38829",
|
||||||
"sourceIdentifier": "security@vmware.com",
|
"sourceIdentifier": "security@vmware.com",
|
||||||
"published": "2024-12-04T21:15:24.103",
|
"published": "2024-12-04T21:15:24.103",
|
||||||
"lastModified": "2024-12-04T21:15:24.103",
|
"lastModified": "2024-12-10T15:15:07.593",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "A vulnerability in VMware Tanzu Spring LDAP allows data exposure for case sensitive comparisons.This issue affects Spring LDAP: from 2.4.0 through 2.4.3, from 3.0.0 through 3.0.9, from 3.1.0 through 3.1.7, from 3.2.0 through 3.2.7, AND all versions prior to 2.4.0.\n\nThe usage of String.toLowerCase() and String.toUpperCase() has some Locale dependent exceptions that could potentially result in unintended columns from being queried\nRelated to CVE-2024-38820 https://spring.io/security/cve-2024-38820"
|
"value": "A vulnerability in Spring LDAP allows data exposure for case sensitive comparisons.This issue affects Spring LDAP: from 2.4.0 through 2.4.3, from 3.0.0 through 3.0.9, from 3.1.0 through 3.1.7, from 3.2.0 through 3.2.7, AND all versions prior to 2.4.0.\n\nThe usage of String.toLowerCase() and String.toUpperCase() has some Locale dependent exceptions that could potentially result in unintended columns from being queried\nRelated to CVE-2024-38820 https://spring.io/security/cve-2024-38820"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"lang": "es",
|
"lang": "es",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-53919",
|
"id": "CVE-2024-53919",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-12-10T02:15:17.350",
|
"published": "2024-12-10T02:15:17.350",
|
||||||
"lastModified": "2024-12-10T02:15:17.350",
|
"lastModified": "2024-12-10T16:15:23.817",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Received",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -35,6 +35,18 @@
|
|||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-77"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://cwe.mitre.org/data/definitions/78.html",
|
"url": "https://cwe.mitre.org/data/definitions/78.html",
|
||||||
|
82
CVE-2024/CVE-2024-541xx/CVE-2024-54152.json
Normal file
82
CVE-2024/CVE-2024-541xx/CVE-2024-54152.json
Normal file
@ -0,0 +1,82 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-54152",
|
||||||
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
|
"published": "2024-12-10T16:15:23.947",
|
||||||
|
"lastModified": "2024-12-10T16:15:23.947",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Angular Expressions provides expressions for the Angular.JS web framework as a standalone module. Prior to version 1.4.3, an attacker can write a malicious expression that escapes the sandbox to execute arbitrary code on the system. With a more complex (undisclosed) payload, one can get full access to Arbitrary code execution on the system. The problem has been patched in version 1.4.3 of Angular Expressions. Two possible workarounds are available. One may either disable access to `__proto__` globally or make sure that one uses the function with just one argument."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV40": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "4.0",
|
||||||
|
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||||
|
"baseScore": 9.3,
|
||||||
|
"baseSeverity": "CRITICAL",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"attackRequirements": "NONE",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"vulnerableSystemConfidentiality": "HIGH",
|
||||||
|
"vulnerableSystemIntegrity": "HIGH",
|
||||||
|
"vulnerableSystemAvailability": "HIGH",
|
||||||
|
"subsequentSystemConfidentiality": "NONE",
|
||||||
|
"subsequentSystemIntegrity": "NONE",
|
||||||
|
"subsequentSystemAvailability": "NONE",
|
||||||
|
"exploitMaturity": "NOT_DEFINED",
|
||||||
|
"confidentialityRequirements": "NOT_DEFINED",
|
||||||
|
"integrityRequirements": "NOT_DEFINED",
|
||||||
|
"availabilityRequirements": "NOT_DEFINED",
|
||||||
|
"modifiedAttackVector": "NOT_DEFINED",
|
||||||
|
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||||
|
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||||
|
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||||
|
"modifiedUserInteraction": "NOT_DEFINED",
|
||||||
|
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||||
|
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||||
|
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||||
|
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||||
|
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||||
|
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||||
|
"safety": "NOT_DEFINED",
|
||||||
|
"automatable": "NOT_DEFINED",
|
||||||
|
"recovery": "NOT_DEFINED",
|
||||||
|
"valueDensity": "NOT_DEFINED",
|
||||||
|
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||||
|
"providerUrgency": "NOT_DEFINED"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-94"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/peerigon/angular-expressions/commit/97f7ad94006156eeb97fc942332578b6cfbf8eef",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/peerigon/angular-expressions/security/advisories/GHSA-5462-4vcx-jh7j",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
21
CVE-2024/CVE-2024-547xx/CVE-2024-54751.json
Normal file
21
CVE-2024/CVE-2024-547xx/CVE-2024-54751.json
Normal file
@ -0,0 +1,21 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-54751",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2024-12-10T15:15:08.020",
|
||||||
|
"lastModified": "2024-12-10T15:15:08.020",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "COMFAST CF-WR630AX v2.7.0.2 was discovered to contain a hardcoded password vulnerability in /etc/shadow, which allows attackers to log in as root."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://colorful-meadow-5b9.notion.site/CF-WR630AX_HardCode_vuln-14bc216a1c3080968161ce15e35fa652?pvs=4",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
@ -2,20 +2,80 @@
|
|||||||
"id": "CVE-2024-54919",
|
"id": "CVE-2024-54919",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-12-09T15:15:21.580",
|
"published": "2024-12-09T15:15:21.580",
|
||||||
"lastModified": "2024-12-09T15:15:21.580",
|
"lastModified": "2024-12-10T15:50:05.360",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "A Stored Cross Site Scripting (XSS ) was found in /teacher_avatar.php of kashipara E-learning Management System v1.0. This vulnerability allows remote attackers to execute arbitrary java script via the filename parameter."
|
"value": "A Stored Cross Site Scripting (XSS ) was found in /teacher_avatar.php of kashipara E-learning Management System v1.0. This vulnerability allows remote attackers to execute arbitrary java script via the filename parameter."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Se encontr\u00f3 una vulnerabilidad de Cross Site Scripting (XSS) almacenado en /teacher_avatar.php de Kashipara E-learning Management System v1.0. Esta vulnerabilidad permite a atacantes remotos ejecutar scripts de Java arbitrarios a trav\u00e9s del par\u00e1metro filename."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"baseScore": 5.4,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.3,
|
||||||
|
"impactScore": 2.7
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:lopalopa:e-learning_management_system:1.0:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "BFD62B66-BEBB-4F0C-9F2F-66A7DC3E83E7"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/m14r41/Writeups/blob/main/CVE/Kashipara/E-learning%20Management%20System%20project/XSS%20by%20File%20Upload%20-%20Update%20Avatar.pdf",
|
"url": "https://github.com/m14r41/Writeups/blob/main/CVE/Kashipara/E-learning%20Management%20System%20project/XSS%20by%20File%20Upload%20-%20Update%20Avatar.pdf",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,20 +2,80 @@
|
|||||||
"id": "CVE-2024-54920",
|
"id": "CVE-2024-54920",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-12-09T15:15:21.717",
|
"published": "2024-12-09T15:15:21.717",
|
||||||
"lastModified": "2024-12-09T19:15:15.803",
|
"lastModified": "2024-12-10T15:41:01.480",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "A SQL Injection vulnerability was found in /teacher_signup.php of kashipara E-learning Management System v1.0, which allows remote attackers to execute arbitrary SQL command to get unauthorized database access via the firstname, lastname, and class_id parameters."
|
"value": "A SQL Injection vulnerability was found in /teacher_signup.php of kashipara E-learning Management System v1.0, which allows remote attackers to execute arbitrary SQL command to get unauthorized database access via the firstname, lastname, and class_id parameters."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Se encontr\u00f3 una vulnerabilidad de inyecci\u00f3n SQL en /teacher_signup.php de kashipara E-learning Management System v1.0, que permite a atacantes remotos ejecutar comandos SQL arbitrarios para obtener acceso no autorizado a la base de datos a trav\u00e9s de los par\u00e1metros firstname, lastname y class_id."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 9.8,
|
||||||
|
"baseSeverity": "CRITICAL",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-89"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:lopalopa:e-learning_management_system:1.0:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "BFD62B66-BEBB-4F0C-9F2F-66A7DC3E83E7"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/m14r41/Writeups/blob/main/CVE/Kashipara/E-learning%20Management%20System%20project/SQL%20Injection%20-%20Signup%20teacher.pdf",
|
"url": "https://github.com/m14r41/Writeups/blob/main/CVE/Kashipara/E-learning%20Management%20System%20project/SQL%20Injection%20-%20Signup%20teacher.pdf",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,20 +2,80 @@
|
|||||||
"id": "CVE-2024-54929",
|
"id": "CVE-2024-54929",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-12-09T14:15:12.957",
|
"published": "2024-12-09T14:15:12.957",
|
||||||
"lastModified": "2024-12-09T14:15:12.957",
|
"lastModified": "2024-12-10T15:47:10.800",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "KASHIPARA E-learning Management System v1.0 is vulnerable to SQL Injection in /admin/delete_subject.php."
|
"value": "KASHIPARA E-learning Management System v1.0 is vulnerable to SQL Injection in /admin/delete_subject.php."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "KASHIPARA E-learning Management System v1.0 es vulnerable a la inyecci\u00f3n SQL en /admin/delete_subject.php."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 7.2,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.2,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-89"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:lopalopa:e-learning_management_system:1.0:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "BFD62B66-BEBB-4F0C-9F2F-66A7DC3E83E7"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/m14r41/Writeups/blob/main/CVE/Kashipara/E-learning%20Management%20System%20project/SQL%20Injection%20-%20delete%20subject.pdf",
|
"url": "https://github.com/m14r41/Writeups/blob/main/CVE/Kashipara/E-learning%20Management%20System%20project/SQL%20Injection%20-%20delete%20subject.pdf",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,20 +2,80 @@
|
|||||||
"id": "CVE-2024-54936",
|
"id": "CVE-2024-54936",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-12-09T14:15:13.127",
|
"published": "2024-12-09T14:15:13.127",
|
||||||
"lastModified": "2024-12-09T19:15:16.993",
|
"lastModified": "2024-12-10T15:47:25.360",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "A Stored Cross-Site Scripting (XSS) vulnerability was found in /send_message.php of Kashipara E-learning Management System v1.0. This vulnerability allows remote attackers to execute arbitrary scripts via the my_message parameter."
|
"value": "A Stored Cross-Site Scripting (XSS) vulnerability was found in /send_message.php of Kashipara E-learning Management System v1.0. This vulnerability allows remote attackers to execute arbitrary scripts via the my_message parameter."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Se encontr\u00f3 una vulnerabilidad de Cross-Site Scripting (XSS) Almacenado en /send_message.php de Kashipara E-learning Management System v1.0. Esta vulnerabilidad permite a atacantes remotos ejecutar scriptss arbitrarias a trav\u00e9s del par\u00e1metro my_message."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"baseScore": 5.4,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.3,
|
||||||
|
"impactScore": 2.7
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:lopalopa:e-learning_management_system:1.0:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "BFD62B66-BEBB-4F0C-9F2F-66A7DC3E83E7"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/m14r41/Writeups/blob/main/CVE/Kashipara/E-learning%20Management%20System%20project/Stored%20XSS%20-%20teacher%20message.pdf",
|
"url": "https://github.com/m14r41/Writeups/blob/main/CVE/Kashipara/E-learning%20Management%20System%20project/Stored%20XSS%20-%20teacher%20message.pdf",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,20 +2,80 @@
|
|||||||
"id": "CVE-2024-54937",
|
"id": "CVE-2024-54937",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-12-09T14:15:13.303",
|
"published": "2024-12-09T14:15:13.303",
|
||||||
"lastModified": "2024-12-09T14:15:13.303",
|
"lastModified": "2024-12-10T15:50:13.957",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "A Directory Listing issue was found in Kashipara E-Learning Management System v1.0, which allows remote attackers to access sensitive files and directories via /admin/assets."
|
"value": "A Directory Listing issue was found in Kashipara E-Learning Management System v1.0, which allows remote attackers to access sensitive files and directories via /admin/assets."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Se encontr\u00f3 un problema de listado de directorios en Kashipara E-Learning Management System v1.0, que permite a atacantes remotos acceder a archivos y directorios confidenciales a trav\u00e9s de /admin/assets."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||||
|
"baseScore": 5.3,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "NVD-CWE-Other"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:lopalopa:e-learning_management_system:1.0:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "BFD62B66-BEBB-4F0C-9F2F-66A7DC3E83E7"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/m14r41/Writeups/blob/main/CVE/Kashipara/E-learning%20Management%20System%20project/Directory%20listing%20-%20admin-assets.pdf",
|
"url": "https://github.com/m14r41/Writeups/blob/main/CVE/Kashipara/E-learning%20Management%20System%20project/Directory%20listing%20-%20admin-assets.pdf",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
78
CVE-2024/CVE-2024-555xx/CVE-2024-55544.json
Normal file
78
CVE-2024/CVE-2024-555xx/CVE-2024-55544.json
Normal file
@ -0,0 +1,78 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-55544",
|
||||||
|
"sourceIdentifier": "office@cyberdanube.com",
|
||||||
|
"published": "2024-12-10T16:15:24.107",
|
||||||
|
"lastModified": "2024-12-10T16:15:24.107",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Missing input validation in the ORing IAP-420 web-interface allows stored Cross-Site Scripting (XSS).This issue affects IAP-420 version 2.01e and below."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV40": [
|
||||||
|
{
|
||||||
|
"source": "office@cyberdanube.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "4.0",
|
||||||
|
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||||
|
"baseScore": 8.7,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"attackRequirements": "NONE",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"vulnerableSystemConfidentiality": "HIGH",
|
||||||
|
"vulnerableSystemIntegrity": "HIGH",
|
||||||
|
"vulnerableSystemAvailability": "HIGH",
|
||||||
|
"subsequentSystemConfidentiality": "NONE",
|
||||||
|
"subsequentSystemIntegrity": "NONE",
|
||||||
|
"subsequentSystemAvailability": "NONE",
|
||||||
|
"exploitMaturity": "NOT_DEFINED",
|
||||||
|
"confidentialityRequirements": "NOT_DEFINED",
|
||||||
|
"integrityRequirements": "NOT_DEFINED",
|
||||||
|
"availabilityRequirements": "NOT_DEFINED",
|
||||||
|
"modifiedAttackVector": "NOT_DEFINED",
|
||||||
|
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||||
|
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||||
|
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||||
|
"modifiedUserInteraction": "NOT_DEFINED",
|
||||||
|
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||||
|
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||||
|
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||||
|
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||||
|
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||||
|
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||||
|
"safety": "NOT_DEFINED",
|
||||||
|
"automatable": "NOT_DEFINED",
|
||||||
|
"recovery": "NOT_DEFINED",
|
||||||
|
"valueDensity": "NOT_DEFINED",
|
||||||
|
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||||
|
"providerUrgency": "NOT_DEFINED"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "office@cyberdanube.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-77"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://cyberdanube.com/security-research/st-polten-uas-multiple-vulnerabilities-in-oring-iap/",
|
||||||
|
"source": "office@cyberdanube.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
@ -2,13 +2,17 @@
|
|||||||
"id": "CVE-2024-55579",
|
"id": "CVE-2024-55579",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-12-09T03:15:05.197",
|
"published": "2024-12-09T03:15:05.197",
|
||||||
"lastModified": "2024-12-09T03:15:05.197",
|
"lastModified": "2024-12-10T15:15:08.163",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "An issue was discovered in Qlik Sense Enterprise for Windows before November 2024 IR. An unprivileged user with network access may be able to create connection objects that trigger execution of arbitrary EXE files. This is fixed in November 2024 IR, May 2024 Patch 10, February 2024 Patch 14, November 2023 Patch 16, August 2023 Patch 16, May 2023 Patch 18, and February 2023 Patch 15."
|
"value": "An issue was discovered in Qlik Sense Enterprise for Windows before November 2024 IR. An unprivileged user with network access may be able to create connection objects that trigger execution of arbitrary EXE files. This is fixed in November 2024 IR, May 2024 Patch 10, February 2024 Patch 14, November 2023 Patch 16, August 2023 Patch 16, May 2023 Patch 18, and February 2023 Patch 15."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Se descubri\u00f3 un problema en Qlik Sense Enterprise para Windows antes de la revisi\u00f3n de implementaci\u00f3n de noviembre de 2024. Un usuario sin privilegios con acceso a la red podr\u00eda crear objetos de conexi\u00f3n que activen la ejecuci\u00f3n de archivos EXE arbitrarios. Esto se solucion\u00f3 en la revisi\u00f3n de implementaci\u00f3n de noviembre de 2024, el parche 10 de mayo de 2024, el parche 14 de febrero de 2024, el parche 16 de noviembre de 2023, el parche 16 de agosto de 2023, el parche 18 de mayo de 2023 y el parche 15 de febrero de 2023."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
@ -35,6 +39,18 @@
|
|||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-863"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://community.qlik.com/t5/Official-Support-Articles/High-Security-fixes-for-Qlik-Sense-Enterprise-for-Windows-CVEs/tac-p/2496004",
|
"url": "https://community.qlik.com/t5/Official-Support-Articles/High-Security-fixes-for-Qlik-Sense-Enterprise-for-Windows-CVEs/tac-p/2496004",
|
||||||
|
@ -2,13 +2,17 @@
|
|||||||
"id": "CVE-2024-55580",
|
"id": "CVE-2024-55580",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-12-09T03:15:05.400",
|
"published": "2024-12-09T03:15:05.400",
|
||||||
"lastModified": "2024-12-09T03:15:05.400",
|
"lastModified": "2024-12-10T15:15:08.300",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "An issue was discovered in Qlik Sense Enterprise for Windows before November 2024 IR. Unprivileged users with network access may be able to execute remote commands that could cause high availability damages, including high integrity and confidentiality risks. This is fixed in November 2024 IR, May 2024 Patch 10, February 2024 Patch 14, November 2023 Patch 16, August 2023 Patch 16, May 2023 Patch 18, and February 2023 Patch 15."
|
"value": "An issue was discovered in Qlik Sense Enterprise for Windows before November 2024 IR. Unprivileged users with network access may be able to execute remote commands that could cause high availability damages, including high integrity and confidentiality risks. This is fixed in November 2024 IR, May 2024 Patch 10, February 2024 Patch 14, November 2023 Patch 16, August 2023 Patch 16, May 2023 Patch 18, and February 2023 Patch 15."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Se detect\u00f3 un problema en Qlik Sense Enterprise para Windows antes de la revisi\u00f3n de riesgos de noviembre de 2024. Los usuarios sin privilegios con acceso a la red pueden ejecutar comandos remotos que podr\u00edan causar da\u00f1os de alta disponibilidad, incluidos riesgos de alta integridad y confidencialidad. Esto se solucion\u00f3 en la revisi\u00f3n de riesgos de noviembre de 2024, el parche 10 de mayo de 2024, el parche 14 de febrero de 2024, el parche 16 de noviembre de 2023, el parche 16 de agosto de 2023, el parche 18 de mayo de 2023 y el parche 15 de febrero de 2023."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
@ -35,6 +39,18 @@
|
|||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-94"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://community.qlik.com/t5/Official-Support-Articles/High-Security-fixes-for-Qlik-Sense-Enterprise-for-Windows-CVEs/tac-p/2496004",
|
"url": "https://community.qlik.com/t5/Official-Support-Articles/High-Security-fixes-for-Qlik-Sense-Enterprise-for-Windows-CVEs/tac-p/2496004",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-6871",
|
"id": "CVE-2024-6871",
|
||||||
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||||
"published": "2024-11-22T22:15:15.173",
|
"published": "2024-11-22T22:15:15.173",
|
||||||
"lastModified": "2024-11-22T22:15:15.173",
|
"lastModified": "2024-12-10T16:49:59.447",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -16,6 +16,28 @@
|
|||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 7.8,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
],
|
||||||
"cvssMetricV30": [
|
"cvssMetricV30": [
|
||||||
{
|
{
|
||||||
"source": "zdi-disclosures@trendmicro.com",
|
"source": "zdi-disclosures@trendmicro.com",
|
||||||
@ -51,10 +73,30 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:gdata-software:total_security:25.5.15.21:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "50083554-2878-4753-AB09-0372AD9C0793"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1486/",
|
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1486/",
|
||||||
"source": "zdi-disclosures@trendmicro.com"
|
"source": "zdi-disclosures@trendmicro.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
84
README.md
84
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
|||||||
### Last Repository Update
|
### Last Repository Update
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
2024-12-10T15:02:43.461611+00:00
|
2024-12-10T17:00:35.272907+00:00
|
||||||
```
|
```
|
||||||
|
|
||||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
2024-12-10T15:00:16.310000+00:00
|
2024-12-10T16:58:51.723000+00:00
|
||||||
```
|
```
|
||||||
|
|
||||||
### Last Data Feed Release
|
### Last Data Feed Release
|
||||||
@ -33,60 +33,52 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
|||||||
### Total Number of included CVEs
|
### Total Number of included CVEs
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
272939
|
272947
|
||||||
```
|
```
|
||||||
|
|
||||||
### CVEs added in the last Commit
|
### CVEs added in the last Commit
|
||||||
|
|
||||||
Recently added CVEs: `16`
|
Recently added CVEs: `8`
|
||||||
|
|
||||||
- [CVE-2020-28398](CVE-2020/CVE-2020-283xx/CVE-2020-28398.json) (`2024-12-10T14:15:18.320`)
|
- [CVE-2024-10494](CVE-2024/CVE-2024-104xx/CVE-2024-10494.json) (`2024-12-10T16:15:21.930`)
|
||||||
- [CVE-2024-11868](CVE-2024/CVE-2024-118xx/CVE-2024-11868.json) (`2024-12-10T13:15:15.973`)
|
- [CVE-2024-10495](CVE-2024/CVE-2024-104xx/CVE-2024-10495.json) (`2024-12-10T16:15:22.080`)
|
||||||
- [CVE-2024-47117](CVE-2024/CVE-2024-471xx/CVE-2024-47117.json) (`2024-12-10T14:30:44.400`)
|
- [CVE-2024-10496](CVE-2024/CVE-2024-104xx/CVE-2024-10496.json) (`2024-12-10T16:15:22.203`)
|
||||||
- [CVE-2024-49704](CVE-2024/CVE-2024-497xx/CVE-2024-49704.json) (`2024-12-10T14:30:44.573`)
|
- [CVE-2024-12236](CVE-2024/CVE-2024-122xx/CVE-2024-12236.json) (`2024-12-10T15:15:07.147`)
|
||||||
- [CVE-2024-49849](CVE-2024/CVE-2024-498xx/CVE-2024-49849.json) (`2024-12-10T14:30:44.780`)
|
- [CVE-2024-12323](CVE-2024/CVE-2024-123xx/CVE-2024-12323.json) (`2024-12-10T15:15:07.300`)
|
||||||
- [CVE-2024-52051](CVE-2024/CVE-2024-520xx/CVE-2024-52051.json) (`2024-12-10T14:30:44.957`)
|
- [CVE-2024-54152](CVE-2024/CVE-2024-541xx/CVE-2024-54152.json) (`2024-12-10T16:15:23.947`)
|
||||||
- [CVE-2024-53041](CVE-2024/CVE-2024-530xx/CVE-2024-53041.json) (`2024-12-10T14:30:46.507`)
|
- [CVE-2024-54751](CVE-2024/CVE-2024-547xx/CVE-2024-54751.json) (`2024-12-10T15:15:08.020`)
|
||||||
- [CVE-2024-53242](CVE-2024/CVE-2024-532xx/CVE-2024-53242.json) (`2024-12-10T14:30:46.700`)
|
- [CVE-2024-55544](CVE-2024/CVE-2024-555xx/CVE-2024-55544.json) (`2024-12-10T16:15:24.107`)
|
||||||
- [CVE-2024-53832](CVE-2024/CVE-2024-538xx/CVE-2024-53832.json) (`2024-12-10T14:30:46.853`)
|
|
||||||
- [CVE-2024-54005](CVE-2024/CVE-2024-540xx/CVE-2024-54005.json) (`2024-12-10T14:30:47.037`)
|
|
||||||
- [CVE-2024-54091](CVE-2024/CVE-2024-540xx/CVE-2024-54091.json) (`2024-12-10T14:30:47.193`)
|
|
||||||
- [CVE-2024-54093](CVE-2024/CVE-2024-540xx/CVE-2024-54093.json) (`2024-12-10T14:30:47.350`)
|
|
||||||
- [CVE-2024-54094](CVE-2024/CVE-2024-540xx/CVE-2024-54094.json) (`2024-12-10T14:30:47.507`)
|
|
||||||
- [CVE-2024-54095](CVE-2024/CVE-2024-540xx/CVE-2024-54095.json) (`2024-12-10T14:30:47.660`)
|
|
||||||
- [CVE-2024-55586](CVE-2024/CVE-2024-555xx/CVE-2024-55586.json) (`2024-12-10T14:30:47.813`)
|
|
||||||
- [CVE-2024-5660](CVE-2024/CVE-2024-56xx/CVE-2024-5660.json) (`2024-12-10T14:30:47.963`)
|
|
||||||
|
|
||||||
|
|
||||||
### CVEs modified in the last Commit
|
### CVEs modified in the last Commit
|
||||||
|
|
||||||
Recently modified CVEs: `48`
|
Recently modified CVEs: `40`
|
||||||
|
|
||||||
- [CVE-2024-45463](CVE-2024/CVE-2024-454xx/CVE-2024-45463.json) (`2024-12-10T14:30:40.500`)
|
- [CVE-2024-12183](CVE-2024/CVE-2024-121xx/CVE-2024-12183.json) (`2024-12-10T16:05:39.010`)
|
||||||
- [CVE-2024-45464](CVE-2024/CVE-2024-454xx/CVE-2024-45464.json) (`2024-12-10T14:30:41.117`)
|
- [CVE-2024-12185](CVE-2024/CVE-2024-121xx/CVE-2024-12185.json) (`2024-12-10T15:57:03.543`)
|
||||||
- [CVE-2024-45465](CVE-2024/CVE-2024-454xx/CVE-2024-45465.json) (`2024-12-10T14:30:41.517`)
|
- [CVE-2024-12186](CVE-2024/CVE-2024-121xx/CVE-2024-12186.json) (`2024-12-10T15:52:39.487`)
|
||||||
- [CVE-2024-45466](CVE-2024/CVE-2024-454xx/CVE-2024-45466.json) (`2024-12-10T14:30:41.893`)
|
- [CVE-2024-12187](CVE-2024/CVE-2024-121xx/CVE-2024-12187.json) (`2024-12-10T15:25:53.537`)
|
||||||
- [CVE-2024-45467](CVE-2024/CVE-2024-454xx/CVE-2024-45467.json) (`2024-12-10T14:30:42.243`)
|
- [CVE-2024-1547](CVE-2024/CVE-2024-15xx/CVE-2024-1547.json) (`2024-12-10T15:22:44.033`)
|
||||||
- [CVE-2024-45468](CVE-2024/CVE-2024-454xx/CVE-2024-45468.json) (`2024-12-10T14:30:42.633`)
|
- [CVE-2024-1550](CVE-2024/CVE-2024-15xx/CVE-2024-1550.json) (`2024-12-10T15:30:13.977`)
|
||||||
- [CVE-2024-45469](CVE-2024/CVE-2024-454xx/CVE-2024-45469.json) (`2024-12-10T14:30:42.847`)
|
- [CVE-2024-22121](CVE-2024/CVE-2024-221xx/CVE-2024-22121.json) (`2024-12-10T16:19:19.810`)
|
||||||
- [CVE-2024-45470](CVE-2024/CVE-2024-454xx/CVE-2024-45470.json) (`2024-12-10T14:30:42.990`)
|
- [CVE-2024-22123](CVE-2024/CVE-2024-221xx/CVE-2024-22123.json) (`2024-12-10T16:32:45.670`)
|
||||||
- [CVE-2024-45471](CVE-2024/CVE-2024-454xx/CVE-2024-45471.json) (`2024-12-10T14:30:43.137`)
|
- [CVE-2024-25624](CVE-2024/CVE-2024-256xx/CVE-2024-25624.json) (`2024-12-10T15:06:18.390`)
|
||||||
- [CVE-2024-45472](CVE-2024/CVE-2024-454xx/CVE-2024-45472.json) (`2024-12-10T14:30:43.263`)
|
- [CVE-2024-25640](CVE-2024/CVE-2024-256xx/CVE-2024-25640.json) (`2024-12-10T15:02:48.627`)
|
||||||
- [CVE-2024-45473](CVE-2024/CVE-2024-454xx/CVE-2024-45473.json) (`2024-12-10T14:30:43.400`)
|
- [CVE-2024-27878](CVE-2024/CVE-2024-278xx/CVE-2024-27878.json) (`2024-12-10T15:14:11.670`)
|
||||||
- [CVE-2024-45474](CVE-2024/CVE-2024-454xx/CVE-2024-45474.json) (`2024-12-10T14:30:43.543`)
|
- [CVE-2024-33616](CVE-2024/CVE-2024-336xx/CVE-2024-33616.json) (`2024-12-10T16:15:23.160`)
|
||||||
- [CVE-2024-45475](CVE-2024/CVE-2024-454xx/CVE-2024-45475.json) (`2024-12-10T14:30:43.673`)
|
- [CVE-2024-36460](CVE-2024/CVE-2024-364xx/CVE-2024-36460.json) (`2024-12-10T16:14:57.453`)
|
||||||
- [CVE-2024-45476](CVE-2024/CVE-2024-454xx/CVE-2024-45476.json) (`2024-12-10T14:30:43.853`)
|
- [CVE-2024-36461](CVE-2024/CVE-2024-364xx/CVE-2024-36461.json) (`2024-12-10T16:15:23.177`)
|
||||||
- [CVE-2024-47046](CVE-2024/CVE-2024-470xx/CVE-2024-47046.json) (`2024-12-10T14:30:44.280`)
|
- [CVE-2024-36462](CVE-2024/CVE-2024-364xx/CVE-2024-36462.json) (`2024-12-10T16:15:37.193`)
|
||||||
- [CVE-2024-52565](CVE-2024/CVE-2024-525xx/CVE-2024-52565.json) (`2024-12-10T14:30:45.133`)
|
- [CVE-2024-38829](CVE-2024/CVE-2024-388xx/CVE-2024-38829.json) (`2024-12-10T15:15:07.593`)
|
||||||
- [CVE-2024-52566](CVE-2024/CVE-2024-525xx/CVE-2024-52566.json) (`2024-12-10T14:30:45.280`)
|
- [CVE-2024-53919](CVE-2024/CVE-2024-539xx/CVE-2024-53919.json) (`2024-12-10T16:15:23.817`)
|
||||||
- [CVE-2024-52567](CVE-2024/CVE-2024-525xx/CVE-2024-52567.json) (`2024-12-10T14:30:45.413`)
|
- [CVE-2024-54919](CVE-2024/CVE-2024-549xx/CVE-2024-54919.json) (`2024-12-10T15:50:05.360`)
|
||||||
- [CVE-2024-52568](CVE-2024/CVE-2024-525xx/CVE-2024-52568.json) (`2024-12-10T14:30:45.557`)
|
- [CVE-2024-54920](CVE-2024/CVE-2024-549xx/CVE-2024-54920.json) (`2024-12-10T15:41:01.480`)
|
||||||
- [CVE-2024-52569](CVE-2024/CVE-2024-525xx/CVE-2024-52569.json) (`2024-12-10T14:30:45.690`)
|
- [CVE-2024-54929](CVE-2024/CVE-2024-549xx/CVE-2024-54929.json) (`2024-12-10T15:47:10.800`)
|
||||||
- [CVE-2024-52570](CVE-2024/CVE-2024-525xx/CVE-2024-52570.json) (`2024-12-10T14:30:45.837`)
|
- [CVE-2024-54936](CVE-2024/CVE-2024-549xx/CVE-2024-54936.json) (`2024-12-10T15:47:25.360`)
|
||||||
- [CVE-2024-52571](CVE-2024/CVE-2024-525xx/CVE-2024-52571.json) (`2024-12-10T14:30:45.963`)
|
- [CVE-2024-54937](CVE-2024/CVE-2024-549xx/CVE-2024-54937.json) (`2024-12-10T15:50:13.957`)
|
||||||
- [CVE-2024-52572](CVE-2024/CVE-2024-525xx/CVE-2024-52572.json) (`2024-12-10T14:30:46.097`)
|
- [CVE-2024-55579](CVE-2024/CVE-2024-555xx/CVE-2024-55579.json) (`2024-12-10T15:15:08.163`)
|
||||||
- [CVE-2024-52573](CVE-2024/CVE-2024-525xx/CVE-2024-52573.json) (`2024-12-10T14:30:46.227`)
|
- [CVE-2024-55580](CVE-2024/CVE-2024-555xx/CVE-2024-55580.json) (`2024-12-10T15:15:08.300`)
|
||||||
- [CVE-2024-52574](CVE-2024/CVE-2024-525xx/CVE-2024-52574.json) (`2024-12-10T14:30:46.367`)
|
- [CVE-2024-6871](CVE-2024/CVE-2024-68xx/CVE-2024-6871.json) (`2024-12-10T16:49:59.447`)
|
||||||
|
|
||||||
|
|
||||||
## Download and Usage
|
## Download and Usage
|
||||||
|
216
_state.csv
216
_state.csv
@ -153045,7 +153045,7 @@ CVE-2020-2136,0,0,aaa1bf0386b8ee49f52e7a3c77a23f241a858df878f062ad66a80ca7d4ff20
|
|||||||
CVE-2020-21362,0,0,8f8b3f9174f7aae90730c81dc4639ea0b97dab389007f459f6c5aa1391a124b6,2024-11-21T05:12:32.590000
|
CVE-2020-21362,0,0,8f8b3f9174f7aae90730c81dc4639ea0b97dab389007f459f6c5aa1391a124b6,2024-11-21T05:12:32.590000
|
||||||
CVE-2020-21363,0,0,20f8fe134b288dbb4ffe40f88c9adfc80a47111f819a2c51ee90186960a40e4c,2024-11-21T05:12:32.733000
|
CVE-2020-21363,0,0,20f8fe134b288dbb4ffe40f88c9adfc80a47111f819a2c51ee90186960a40e4c,2024-11-21T05:12:32.733000
|
||||||
CVE-2020-21365,0,0,cd5a174560b7d3c10d0c714e4f4a4747be95d3f9b4f1c41e7131750210424d3f,2024-11-21T05:12:32.877000
|
CVE-2020-21365,0,0,cd5a174560b7d3c10d0c714e4f4a4747be95d3f9b4f1c41e7131750210424d3f,2024-11-21T05:12:32.877000
|
||||||
CVE-2020-21366,0,0,0fe829b3a60b2597f1cd98792a87c8316dd5eeeec5b8d3aca08c18f1cf4748ef,2024-11-21T05:12:33.033000
|
CVE-2020-21366,0,1,c7e0075c8b78cbbcf5fd08b479afecb31dadf67937668d1d314c5a32c51e2f79,2024-12-10T16:15:19.160000
|
||||||
CVE-2020-2137,0,0,6c54a57ffd40e92a2d8ede4705a1cad5c26ca10467ed5a440f3f2138bbe2f7d8,2024-11-21T05:24:45.587000
|
CVE-2020-2137,0,0,6c54a57ffd40e92a2d8ede4705a1cad5c26ca10467ed5a440f3f2138bbe2f7d8,2024-11-21T05:24:45.587000
|
||||||
CVE-2020-21377,0,0,ea1eec086b9828aa5ace46aad0eff6e5ec175e2c80f546b0c9114e08f3db1b88,2024-11-21T05:12:33.177000
|
CVE-2020-21377,0,0,ea1eec086b9828aa5ace46aad0eff6e5ec175e2c80f546b0c9114e08f3db1b88,2024-11-21T05:12:33.177000
|
||||||
CVE-2020-21378,0,0,c17656184951b31f65c3f4039439107545022ac9fb8185c9e39b54daf8cc6254,2024-11-21T05:12:33.337000
|
CVE-2020-21378,0,0,c17656184951b31f65c3f4039439107545022ac9fb8185c9e39b54daf8cc6254,2024-11-21T05:12:33.337000
|
||||||
@ -153055,7 +153055,7 @@ CVE-2020-21387,0,0,b8888a78a358e5a4928a6da48b2111d7f7d3d5944a8e04decd7246dba8740
|
|||||||
CVE-2020-2139,0,0,87099cdde7c71a27057a740f182e0a864f3dddb42b6fe30ce835a7e6d20802c3,2024-11-21T05:24:45.940000
|
CVE-2020-2139,0,0,87099cdde7c71a27057a740f182e0a864f3dddb42b6fe30ce835a7e6d20802c3,2024-11-21T05:24:45.940000
|
||||||
CVE-2020-21394,0,0,d4461d14b3ddb6968ad043c09fabddf0c473e79ab30087e24777a1f68799be7f,2024-11-21T05:12:33.773000
|
CVE-2020-21394,0,0,d4461d14b3ddb6968ad043c09fabddf0c473e79ab30087e24777a1f68799be7f,2024-11-21T05:12:33.773000
|
||||||
CVE-2020-2140,0,0,811622246ece78b4b9742ea0e7bf050fdb4dbf2d27051c8e5adb04e51d884d34,2024-11-21T05:24:46.110000
|
CVE-2020-2140,0,0,811622246ece78b4b9742ea0e7bf050fdb4dbf2d27051c8e5adb04e51d884d34,2024-11-21T05:24:46.110000
|
||||||
CVE-2020-21400,0,0,12bfa5514fcf490b7510ed98bb2da7c4bcdcace3898ed1a7335a569d31482d6f,2024-11-21T05:12:33.920000
|
CVE-2020-21400,0,1,54504de497547546abc26550d6a9074b96fb40a13607c1c91a58b6552c03b463,2024-12-10T16:15:21.420000
|
||||||
CVE-2020-21405,0,0,7c2be08e4bb6ce8eb7f4850d9b7159d3d9796e07f7fa6794f05b0f74d6e5c04d,2024-11-21T05:12:34.060000
|
CVE-2020-21405,0,0,7c2be08e4bb6ce8eb7f4850d9b7159d3d9796e07f7fa6794f05b0f74d6e5c04d,2024-11-21T05:12:34.060000
|
||||||
CVE-2020-21406,0,0,ee0885dc1f9dbec0d5d7225eb6da0f0a8363f9ca6205e02a9aa9a154fc0f42c0,2024-11-21T05:12:34.223000
|
CVE-2020-21406,0,0,ee0885dc1f9dbec0d5d7225eb6da0f0a8363f9ca6205e02a9aa9a154fc0f42c0,2024-11-21T05:12:34.223000
|
||||||
CVE-2020-2141,0,0,a2ce4cfc8d83ff00e23f6c9719e321d7030412979b37981a1f5edd97ebc24719,2024-11-21T05:24:46.277000
|
CVE-2020-2141,0,0,a2ce4cfc8d83ff00e23f6c9719e321d7030412979b37981a1f5edd97ebc24719,2024-11-21T05:24:46.277000
|
||||||
@ -153073,7 +153073,7 @@ CVE-2020-2146,0,0,643feb86fd0c290d743cec53c88462667f5df123c2d0752fc814c6f6d3d09e
|
|||||||
CVE-2020-21468,0,0,7e82d44153623a76d5e30c089947cb6c0779efd36bcfc8ac8ecd70a7157d0b85,2024-11-21T05:12:35.280000
|
CVE-2020-21468,0,0,7e82d44153623a76d5e30c089947cb6c0779efd36bcfc8ac8ecd70a7157d0b85,2024-11-21T05:12:35.280000
|
||||||
CVE-2020-21469,0,0,5eb1462d7aff5223ad1fd85047e56d8979bc04aa18e48a4471883490d9037616,2024-11-21T05:12:35.457000
|
CVE-2020-21469,0,0,5eb1462d7aff5223ad1fd85047e56d8979bc04aa18e48a4471883490d9037616,2024-11-21T05:12:35.457000
|
||||||
CVE-2020-2147,0,0,fdbfd3899ab79447c4ee929a9393fe1a59be68f5b9f2e8d0dbff0cbd64e7dcd0,2024-11-21T05:24:47.347000
|
CVE-2020-2147,0,0,fdbfd3899ab79447c4ee929a9393fe1a59be68f5b9f2e8d0dbff0cbd64e7dcd0,2024-11-21T05:24:47.347000
|
||||||
CVE-2020-21474,0,0,eeeb2f47b54590df93e15c91fcc6a29cc4c212a0780f4dda59775d6089ec773b,2024-11-21T05:12:35.617000
|
CVE-2020-21474,0,1,e9e32f551d6c7bef8390742f424b7dc2f29e8b6cf64ee8a9b3b8535f9c072550,2024-12-10T16:15:21.577000
|
||||||
CVE-2020-2148,0,0,c54a5349fa30fbd9fc12099aeeedfca1256e61181a5f845e030188c11729c57b,2024-11-21T05:24:47.517000
|
CVE-2020-2148,0,0,c54a5349fa30fbd9fc12099aeeedfca1256e61181a5f845e030188c11729c57b,2024-11-21T05:24:47.517000
|
||||||
CVE-2020-21480,0,0,29295d1cedeef6b82c94f29cb304d43b6f7b395022fe0c08e686ebffb0c381e7,2024-11-21T05:12:35.763000
|
CVE-2020-21480,0,0,29295d1cedeef6b82c94f29cb304d43b6f7b395022fe0c08e686ebffb0c381e7,2024-11-21T05:12:35.763000
|
||||||
CVE-2020-21481,0,0,e376da50b049f372decada8227cb1588a9452d8e71325975d6a408e9f9285d8d,2024-11-21T05:12:35.913000
|
CVE-2020-21481,0,0,e376da50b049f372decada8227cb1588a9452d8e71325975d6a408e9f9285d8d,2024-11-21T05:12:35.913000
|
||||||
@ -157020,9 +157020,9 @@ CVE-2020-28394,0,0,a5392ef4bfd1b444d949fd2d46a2b00e900d3b6576570d08fa6d169f7fde1
|
|||||||
CVE-2020-28395,0,0,d78e70709b2f9f49d07d1c45d57c4007f2ca6782f3cc890a0d95b852ff79c35a,2024-11-21T05:22:42.987000
|
CVE-2020-28395,0,0,d78e70709b2f9f49d07d1c45d57c4007f2ca6782f3cc890a0d95b852ff79c35a,2024-11-21T05:22:42.987000
|
||||||
CVE-2020-28396,0,0,d465f4b428198b5b89457d982fcee4cc6e7c41ad9e4f7ae5abd54d9db2c39d91,2024-11-21T05:22:43.117000
|
CVE-2020-28396,0,0,d465f4b428198b5b89457d982fcee4cc6e7c41ad9e4f7ae5abd54d9db2c39d91,2024-11-21T05:22:43.117000
|
||||||
CVE-2020-28397,0,0,b075fbf093f72d16b08d4a7dc598caaa144ada868e250e1c47b616f82ba08349,2024-11-21T05:22:43.247000
|
CVE-2020-28397,0,0,b075fbf093f72d16b08d4a7dc598caaa144ada868e250e1c47b616f82ba08349,2024-11-21T05:22:43.247000
|
||||||
CVE-2020-28398,1,1,cbd9a625fba8337c757e54df5a0aa370576e7254f00131a7797d1a0b5e5ff478,2024-12-10T14:15:18.320000
|
CVE-2020-28398,0,0,cbd9a625fba8337c757e54df5a0aa370576e7254f00131a7797d1a0b5e5ff478,2024-12-10T14:15:18.320000
|
||||||
CVE-2020-2840,0,0,e44d7e29182007864686e5a5a81b6524b99a34280f1364e95eb6b5f7ceb4d8c8,2024-11-21T05:26:25.210000
|
CVE-2020-2840,0,0,e44d7e29182007864686e5a5a81b6524b99a34280f1364e95eb6b5f7ceb4d8c8,2024-11-21T05:26:25.210000
|
||||||
CVE-2020-28400,0,1,b26095477782dbcc54f47367a9635ef38410783f06916e98cb256a358abe0f13,2024-12-10T14:15:19.373000
|
CVE-2020-28400,0,0,b26095477782dbcc54f47367a9635ef38410783f06916e98cb256a358abe0f13,2024-12-10T14:15:19.373000
|
||||||
CVE-2020-28401,0,0,1b2504dfa7b563c907a092d9885ec26281e2377c6ab77d160067be8250513372,2024-11-21T05:22:43.843000
|
CVE-2020-28401,0,0,1b2504dfa7b563c907a092d9885ec26281e2377c6ab77d160067be8250513372,2024-11-21T05:22:43.843000
|
||||||
CVE-2020-28402,0,0,2e6ca6bb4b292d6bcc4a92467321b457f0da4553e21753626765215dac0055ef,2024-11-21T05:22:44.010000
|
CVE-2020-28402,0,0,2e6ca6bb4b292d6bcc4a92467321b457f0da4553e21753626765215dac0055ef,2024-11-21T05:22:44.010000
|
||||||
CVE-2020-28403,0,0,ef2cebf37607c95c1b53a6c5a0745bed7e831c109e77019861ffb143abb122ee,2024-11-21T05:22:44.167000
|
CVE-2020-28403,0,0,ef2cebf37607c95c1b53a6c5a0745bed7e831c109e77019861ffb143abb122ee,2024-11-21T05:22:44.167000
|
||||||
@ -187200,11 +187200,11 @@ CVE-2021-47055,0,0,b63a01999ed47f7311f9a8e2b96559bb8882e3841e9d395bedcdc4bf7697c
|
|||||||
CVE-2021-47056,0,0,b45b88e369390925ea8cc956d89a8046d78e16e4fea049a22946e0c390cb845b,2024-11-21T06:35:16.687000
|
CVE-2021-47056,0,0,b45b88e369390925ea8cc956d89a8046d78e16e4fea049a22946e0c390cb845b,2024-11-21T06:35:16.687000
|
||||||
CVE-2021-47057,0,0,a5f7156f2242c8fde6f47e7a17ad9e17535902be6f79887e10dee986d9fb0d57,2024-11-21T06:35:16.827000
|
CVE-2021-47057,0,0,a5f7156f2242c8fde6f47e7a17ad9e17535902be6f79887e10dee986d9fb0d57,2024-11-21T06:35:16.827000
|
||||||
CVE-2021-47058,0,0,7210c1b402eb68d57981cc39f38a981097ac57889cf3251db2103e51920a0851,2024-11-21T06:35:17.030000
|
CVE-2021-47058,0,0,7210c1b402eb68d57981cc39f38a981097ac57889cf3251db2103e51920a0851,2024-11-21T06:35:17.030000
|
||||||
CVE-2021-47059,0,0,dac50d53de6b66b03510a9c102754f52d974f789552e8d5616032245ab7a8a0d,2024-11-21T06:35:17.157000
|
CVE-2021-47059,0,1,a664ea42011c0452352bed32e885f8cb9c8cd1afe839c9a6c06920f303467b00,2024-12-10T16:58:51.723000
|
||||||
CVE-2021-47060,0,0,c7ff62be422cde5b0863c3bbdf0b69a1fbd68b8ce6c37a8f74637699d9d0b7ed,2024-11-21T06:35:17.280000
|
CVE-2021-47060,0,0,c7ff62be422cde5b0863c3bbdf0b69a1fbd68b8ce6c37a8f74637699d9d0b7ed,2024-11-21T06:35:17.280000
|
||||||
CVE-2021-47061,0,0,e243a5414a32c0dd6c89efa6d3177c0aebe227fe2b580c86cf3dd48377ed0785,2024-11-21T06:35:17.487000
|
CVE-2021-47061,0,1,53666218467a1d00b98ac61663e19c8dc4e0b9ea72d30e7f636b30732a04cbfa,2024-12-10T16:55:15.017000
|
||||||
CVE-2021-47062,0,0,67e0381006ffff0fab1d5d8cc79cffa219b0b86990b146d4104e8a09d53a27e0,2024-11-21T06:35:17.600000
|
CVE-2021-47062,0,1,f0b7e311d8422dbd8d0f94c9f5873b7807ac1a99ffea8e65bcb222c05c2cd4a1,2024-12-10T16:43:41.337000
|
||||||
CVE-2021-47063,0,0,01c431e917dc6fc8ef92276fcfb0fdb7b2fab56e33217f85fc0f2c7ceb45dc00,2024-11-21T06:35:17.710000
|
CVE-2021-47063,0,1,62517a898085ac87c1d4c363ee690679f3fd071c9bad633f6e658828ec25f8ea,2024-12-10T16:43:29.307000
|
||||||
CVE-2021-47064,0,0,3bd6a786c4077808029953bb049a9c471ffa608676a06c39506fb09e61ec99f9,2024-11-21T06:35:17.820000
|
CVE-2021-47064,0,0,3bd6a786c4077808029953bb049a9c471ffa608676a06c39506fb09e61ec99f9,2024-11-21T06:35:17.820000
|
||||||
CVE-2021-47065,0,0,ad5ef2a7ff227deabbf010ca736d336964528bba2eb009b6aa6238fb3aac37b7,2024-11-21T06:35:17.997000
|
CVE-2021-47065,0,0,ad5ef2a7ff227deabbf010ca736d336964528bba2eb009b6aa6238fb3aac37b7,2024-11-21T06:35:17.997000
|
||||||
CVE-2021-47066,0,0,63cb7a656e47c5eb34316a10892fb8a1eafc05b262d1637b4e3dab9d49fc6701,2024-11-21T06:35:18.120000
|
CVE-2021-47066,0,0,63cb7a656e47c5eb34316a10892fb8a1eafc05b262d1637b4e3dab9d49fc6701,2024-11-21T06:35:18.120000
|
||||||
@ -222645,7 +222645,7 @@ CVE-2023-29177,0,0,34e536b2dd6516017134ae202be208043d632e379b245de54d5f97456f708
|
|||||||
CVE-2023-29178,0,0,192b036255750951b2f948f3bccb436d9b8250da54d14e728cb678047e65557a,2024-11-21T07:56:39.910000
|
CVE-2023-29178,0,0,192b036255750951b2f948f3bccb436d9b8250da54d14e728cb678047e65557a,2024-11-21T07:56:39.910000
|
||||||
CVE-2023-29179,0,0,e4f04dc30fe2c9010e6d47822fa98ed8c493eb34bcf1929e876fe2df9fcd630b,2024-11-21T07:56:40.023000
|
CVE-2023-29179,0,0,e4f04dc30fe2c9010e6d47822fa98ed8c493eb34bcf1929e876fe2df9fcd630b,2024-11-21T07:56:40.023000
|
||||||
CVE-2023-2918,0,0,61c733d20500efcc82f9604ee077302f7b2e34c361148b54a33605771cee93dd,2023-11-07T04:13:32.830000
|
CVE-2023-2918,0,0,61c733d20500efcc82f9604ee077302f7b2e34c361148b54a33605771cee93dd,2023-11-07T04:13:32.830000
|
||||||
CVE-2023-29180,0,0,51c1ae5bcf5d91c9906ba92ed6510b9717a5f96588659cd3e735b9b431feb5bc,2024-11-21T07:56:40.133000
|
CVE-2023-29180,0,1,79507a70a6564ac33575d6bc0b5b0094aaa94b2cdb11c89a5577abe6a2ae3411,2024-12-10T16:58:41.603000
|
||||||
CVE-2023-29181,0,0,64144453323366f6013d78fe45fe5bd18df2acd8cd72209517ac1590d49d6ee6,2024-11-21T07:56:40.257000
|
CVE-2023-29181,0,0,64144453323366f6013d78fe45fe5bd18df2acd8cd72209517ac1590d49d6ee6,2024-11-21T07:56:40.257000
|
||||||
CVE-2023-29182,0,0,8e6f055a404b6bc97de586d6cde173cb4bec24f2991682f6b5f7fb8a67d03256,2024-11-21T07:56:40.370000
|
CVE-2023-29182,0,0,8e6f055a404b6bc97de586d6cde173cb4bec24f2991682f6b5f7fb8a67d03256,2024-11-21T07:56:40.370000
|
||||||
CVE-2023-29183,0,0,eb9482a74122ef99aa275848849976d909de5051785e444061c6a07addfb45e2,2024-11-21T07:56:40.483000
|
CVE-2023-29183,0,0,eb9482a74122ef99aa275848849976d909de5051785e444061c6a07addfb45e2,2024-11-21T07:56:40.483000
|
||||||
@ -223750,7 +223750,7 @@ CVE-2023-30753,0,0,287aa954aa1d02e9974a79a01d6b75193f12567dada34c8bf70f711cf4a07
|
|||||||
CVE-2023-30754,0,0,bf437989369da8a16a4c63935b7ceab2adb4e56f7f7f3238dffa9dacc75e52cb,2024-11-21T08:00:50.327000
|
CVE-2023-30754,0,0,bf437989369da8a16a4c63935b7ceab2adb4e56f7f7f3238dffa9dacc75e52cb,2024-11-21T08:00:50.327000
|
||||||
CVE-2023-30755,0,0,0da84c32e644b9ff47f71b6aa8c8a3157711a8ff8b1f941b968146b0ed950f89,2024-09-10T12:09:50.377000
|
CVE-2023-30755,0,0,0da84c32e644b9ff47f71b6aa8c8a3157711a8ff8b1f941b968146b0ed950f89,2024-09-10T12:09:50.377000
|
||||||
CVE-2023-30756,0,0,d3b979c5f0f9ea4ec3f2980feed339808bc75a3762f808c9e1822bd9b96ed90f,2024-09-10T12:09:50.377000
|
CVE-2023-30756,0,0,d3b979c5f0f9ea4ec3f2980feed339808bc75a3762f808c9e1822bd9b96ed90f,2024-09-10T12:09:50.377000
|
||||||
CVE-2023-30757,0,1,7a3139987a120b8bfbcf14769e62683750650826dc18d636318bfee1f5035a8c,2024-12-10T14:30:34.017000
|
CVE-2023-30757,0,0,7a3139987a120b8bfbcf14769e62683750650826dc18d636318bfee1f5035a8c,2024-12-10T14:30:34.017000
|
||||||
CVE-2023-30758,0,0,69789da5f8f59db8a057dbcc738c84dadc223d98fbb066bd2249c87113264f6b,2024-11-21T08:00:50.750000
|
CVE-2023-30758,0,0,69789da5f8f59db8a057dbcc738c84dadc223d98fbb066bd2249c87113264f6b,2024-11-21T08:00:50.750000
|
||||||
CVE-2023-30759,0,0,b613e052d7927c2b0a8fc61d0dbca17743c1f2bbebb807e29e8240e8fc65e385,2024-11-21T08:00:50.870000
|
CVE-2023-30759,0,0,b613e052d7927c2b0a8fc61d0dbca17743c1f2bbebb807e29e8240e8fc65e385,2024-11-21T08:00:50.870000
|
||||||
CVE-2023-3076,0,0,d008cda2cdfac6bbdcbeeb6338eac7a719e6e3a4220fd820508d02a6856e7e80,2024-11-21T08:16:23.437000
|
CVE-2023-3076,0,0,d008cda2cdfac6bbdcbeeb6338eac7a719e6e3a4220fd820508d02a6856e7e80,2024-11-21T08:16:23.437000
|
||||||
@ -231113,7 +231113,7 @@ CVE-2023-40392,0,0,880ee247aadeb018af145e0df44b4edfe7b5b13e8560f4782c834128453ad
|
|||||||
CVE-2023-40393,0,0,93f2bfd7cf2bad3350557754d5ab0450f55f19a0d214691c250663e386c78db0,2024-11-21T08:19:21.550000
|
CVE-2023-40393,0,0,93f2bfd7cf2bad3350557754d5ab0450f55f19a0d214691c250663e386c78db0,2024-11-21T08:19:21.550000
|
||||||
CVE-2023-40394,0,0,b41a708a5e65b971e3b57eb10533045232cabfd1cbd332daf6894e7e27501f44,2024-11-21T08:19:21.670000
|
CVE-2023-40394,0,0,b41a708a5e65b971e3b57eb10533045232cabfd1cbd332daf6894e7e27501f44,2024-11-21T08:19:21.670000
|
||||||
CVE-2023-40395,0,0,aeff2f6db145db6dac11e01042c4c90d44e1604b76bcc9f38b1bf83233133982,2024-11-21T08:19:21.787000
|
CVE-2023-40395,0,0,aeff2f6db145db6dac11e01042c4c90d44e1604b76bcc9f38b1bf83233133982,2024-11-21T08:19:21.787000
|
||||||
CVE-2023-40396,0,1,efc46849d26e6e261d17138b95722884121ac1fdff6308495b60ad47cec580b8,2024-12-10T14:46:06.510000
|
CVE-2023-40396,0,0,efc46849d26e6e261d17138b95722884121ac1fdff6308495b60ad47cec580b8,2024-12-10T14:46:06.510000
|
||||||
CVE-2023-40397,0,0,3c87aa0d926da24e7f784bcbfc50f85168b3141c21f32a13f0e0e4a7593a1434,2024-11-21T08:19:22.123000
|
CVE-2023-40397,0,0,3c87aa0d926da24e7f784bcbfc50f85168b3141c21f32a13f0e0e4a7593a1434,2024-11-21T08:19:22.123000
|
||||||
CVE-2023-40398,0,0,b336923cf7b29c25f06a85d0354d8ff336c2a72437ac50edfa49b08b0b536f18,2024-11-21T08:19:22.260000
|
CVE-2023-40398,0,0,b336923cf7b29c25f06a85d0354d8ff336c2a72437ac50edfa49b08b0b536f18,2024-11-21T08:19:22.260000
|
||||||
CVE-2023-40399,0,0,ed260e3a9a40ec807a59118509c0a714c4dade87088611351a04c295fa406397,2024-11-21T08:19:22.400000
|
CVE-2023-40399,0,0,ed260e3a9a40ec807a59118509c0a714c4dade87088611351a04c295fa406397,2024-11-21T08:19:22.400000
|
||||||
@ -235250,7 +235250,7 @@ CVE-2023-46277,0,0,e192ca50b4060017d85c73fc1706fd083f6c682d8478108f323ab6790e526
|
|||||||
CVE-2023-46278,0,0,46ac4ffdac079997c9016c6dbfffc7ffe6e42561a011802cecf40b1219ef36f9,2024-11-21T08:28:12.860000
|
CVE-2023-46278,0,0,46ac4ffdac079997c9016c6dbfffc7ffe6e42561a011802cecf40b1219ef36f9,2024-11-21T08:28:12.860000
|
||||||
CVE-2023-46279,0,0,3e7e36fd0e3ce2dbbcf5fcd2f863e6ff5e488def87e09e4ef2f6410e3e056628,2024-11-21T08:28:12.997000
|
CVE-2023-46279,0,0,3e7e36fd0e3ce2dbbcf5fcd2f863e6ff5e488def87e09e4ef2f6410e3e056628,2024-11-21T08:28:12.997000
|
||||||
CVE-2023-4628,0,0,c16a568e52b7f0c21793f5350ec12a7810b0c802c34a54836fb4944dcdc7dd35,2024-11-21T08:35:34.417000
|
CVE-2023-4628,0,0,c16a568e52b7f0c21793f5350ec12a7810b0c802c34a54836fb4944dcdc7dd35,2024-11-21T08:35:34.417000
|
||||||
CVE-2023-46280,0,1,bff165be69921e3630d0b45d862a2229e3ea0f0a60e54f9f7e07c513d439c5af,2024-12-10T14:30:35.147000
|
CVE-2023-46280,0,0,bff165be69921e3630d0b45d862a2229e3ea0f0a60e54f9f7e07c513d439c5af,2024-12-10T14:30:35.147000
|
||||||
CVE-2023-46281,0,0,06b7c611b32187d54370d76820e0490543e0a2ebd3d02644d9fb30f17c97bbc1,2024-11-21T08:28:13.317000
|
CVE-2023-46281,0,0,06b7c611b32187d54370d76820e0490543e0a2ebd3d02644d9fb30f17c97bbc1,2024-11-21T08:28:13.317000
|
||||||
CVE-2023-46282,0,0,53cfedd9ad579d9844b0595a7f2a9e1581d48c7c434ad7370ebf56c371690309,2024-11-21T08:28:13.473000
|
CVE-2023-46282,0,0,53cfedd9ad579d9844b0595a7f2a9e1581d48c7c434ad7370ebf56c371690309,2024-11-21T08:28:13.473000
|
||||||
CVE-2023-46283,0,0,81326b84f1af6d35b258acd2ae6858e958c94e1b20e368bfd6c50944f2502106,2024-11-21T08:28:13.617000
|
CVE-2023-46283,0,0,81326b84f1af6d35b258acd2ae6858e958c94e1b20e368bfd6c50944f2502106,2024-11-21T08:28:13.617000
|
||||||
@ -237305,7 +237305,7 @@ CVE-2023-49060,0,0,4c0d752f52234ac5b2c5afa73fa3bd5f4d490c81b175ad6b9dd8f7509e06e
|
|||||||
CVE-2023-49061,0,0,7af406d30b2caa1b6fd7c257680f774d6fb0a30f02df3c6d99ace0a0c64683ce,2024-11-21T08:32:45.193000
|
CVE-2023-49061,0,0,7af406d30b2caa1b6fd7c257680f774d6fb0a30f02df3c6d99ace0a0c64683ce,2024-11-21T08:32:45.193000
|
||||||
CVE-2023-49062,0,0,3f72bcc43e8d39618a32732cc6fdb32aa26187117eb8dbf2cde612d2322c6a42,2024-11-21T08:32:45.310000
|
CVE-2023-49062,0,0,3f72bcc43e8d39618a32732cc6fdb32aa26187117eb8dbf2cde612d2322c6a42,2024-11-21T08:32:45.310000
|
||||||
CVE-2023-49068,0,0,f934d451589c0486639c7452250c50f87bff70e169120c3b6e2d48b968d911f7,2024-11-21T08:32:45.430000
|
CVE-2023-49068,0,0,f934d451589c0486639c7452250c50f87bff70e169120c3b6e2d48b968d911f7,2024-11-21T08:32:45.430000
|
||||||
CVE-2023-49069,0,1,e77673261bbd774d10e127672f71f84c304f9e77431045eed106775d130e9272,2024-12-10T14:30:36.767000
|
CVE-2023-49069,0,0,e77673261bbd774d10e127672f71f84c304f9e77431045eed106775d130e9272,2024-12-10T14:30:36.767000
|
||||||
CVE-2023-4907,0,0,90be30672dd3ea93872990567976373933c812f92a368cb35abe26c70cc23ea6,2024-11-21T08:36:14.203000
|
CVE-2023-4907,0,0,90be30672dd3ea93872990567976373933c812f92a368cb35abe26c70cc23ea6,2024-11-21T08:36:14.203000
|
||||||
CVE-2023-49070,0,0,9c3d4a270f963f36dd20306a853b062b27d681d986a9a2c3bace9e52f7eaf712,2024-11-21T08:32:45.697000
|
CVE-2023-49070,0,0,9c3d4a270f963f36dd20306a853b062b27d681d986a9a2c3bace9e52f7eaf712,2024-11-21T08:32:45.697000
|
||||||
CVE-2023-49073,0,0,a59c7f971c52a4d5004cf2ba397f8b1bff7a40aa00abdd575b19a18ae50de0c5,2024-11-21T08:32:45.843000
|
CVE-2023-49073,0,0,a59c7f971c52a4d5004cf2ba397f8b1bff7a40aa00abdd575b19a18ae50de0c5,2024-11-21T08:32:45.843000
|
||||||
@ -243267,6 +243267,9 @@ CVE-2024-10490,0,0,f21b8c7becddbaa0ea56b7b67da3747213296c7bde0ad883c427ff8568155
|
|||||||
CVE-2024-10491,0,0,ab353cc469b92a224e9979b5f7442da134507528607335ef35cd761268862911,2024-11-06T23:08:49.780000
|
CVE-2024-10491,0,0,ab353cc469b92a224e9979b5f7442da134507528607335ef35cd761268862911,2024-11-06T23:08:49.780000
|
||||||
CVE-2024-10492,0,0,7f8940123504b47e7360ed943050a0eaf7d86e6d3f4447616bea276ef0817dfb,2024-11-25T08:15:08.453000
|
CVE-2024-10492,0,0,7f8940123504b47e7360ed943050a0eaf7d86e6d3f4447616bea276ef0817dfb,2024-11-25T08:15:08.453000
|
||||||
CVE-2024-10493,0,0,8b36ab5511eb3bbf88fe3b986fb9a2e12d56937db7b6e071f13b5eb806dc7131,2024-11-29T16:15:08.583000
|
CVE-2024-10493,0,0,8b36ab5511eb3bbf88fe3b986fb9a2e12d56937db7b6e071f13b5eb806dc7131,2024-11-29T16:15:08.583000
|
||||||
|
CVE-2024-10494,1,1,721e4932ce61c241801ae5c6b842ed702e883b578f578d2bb19b630072d61540,2024-12-10T16:15:21.930000
|
||||||
|
CVE-2024-10495,1,1,7513c32880c7ad0d2c27db3b36e895592d99dc7380bd3d757079aea084a61b36,2024-12-10T16:15:22.080000
|
||||||
|
CVE-2024-10496,1,1,52c8e2d3a1b1803f3496bfc721d91a64e4e9bd59119efec796a3346429e355a4,2024-12-10T16:15:22.203000
|
||||||
CVE-2024-1050,0,0,16f18f5c60fb64f5f6a6b201bdf68db704bc8fa10ab29a63c083d6c6dea0ac89,2024-11-21T08:49:41.043000
|
CVE-2024-1050,0,0,16f18f5c60fb64f5f6a6b201bdf68db704bc8fa10ab29a63c083d6c6dea0ac89,2024-11-21T08:49:41.043000
|
||||||
CVE-2024-10500,0,0,27a7ddb391c1f76d7f4b80036a1fcb6439be1b9838b240aef5e99d3421d3910a,2024-11-05T21:02:30.333000
|
CVE-2024-10500,0,0,27a7ddb391c1f76d7f4b80036a1fcb6439be1b9838b240aef5e99d3421d3910a,2024-11-05T21:02:30.333000
|
||||||
CVE-2024-10501,0,0,b29e6f1dfbbed0eef52ed13bdbe8cebb3c0d3f9838d0ccd39d859b35e2a06cee,2024-11-06T17:20:32.857000
|
CVE-2024-10501,0,0,b29e6f1dfbbed0eef52ed13bdbe8cebb3c0d3f9838d0ccd39d859b35e2a06cee,2024-11-06T17:20:32.857000
|
||||||
@ -243428,7 +243431,7 @@ CVE-2024-10700,0,0,47463adc515feae701fdd6df43b426f169c9e406b10e3ad8dd4832a0c6070
|
|||||||
CVE-2024-10701,0,0,641858d6153e165cc2c7dd6027743f3ae6b69eef2b92c96e3594e0be239333fa,2024-11-05T16:52:44.937000
|
CVE-2024-10701,0,0,641858d6153e165cc2c7dd6027743f3ae6b69eef2b92c96e3594e0be239333fa,2024-11-05T16:52:44.937000
|
||||||
CVE-2024-10702,0,0,694400dab46a9218fb3a1006ad113a17ad1c8c5f4f2232220945883eb4081eae,2024-11-05T16:52:11.193000
|
CVE-2024-10702,0,0,694400dab46a9218fb3a1006ad113a17ad1c8c5f4f2232220945883eb4081eae,2024-11-05T16:52:11.193000
|
||||||
CVE-2024-10704,0,0,ba32dc9400bcf601c7de3ed1f96e389b9876b8709121dc8baeae8e0502050909,2024-11-29T15:15:15.777000
|
CVE-2024-10704,0,0,ba32dc9400bcf601c7de3ed1f96e389b9876b8709121dc8baeae8e0502050909,2024-11-29T15:15:15.777000
|
||||||
CVE-2024-10708,0,0,915fc94c6de0496c38791426a8b6a993429b200041b827298838cab8bee39149,2024-12-10T06:15:20.737000
|
CVE-2024-10708,0,1,7e107a199c86d1471c45ac438e6e56e3bcf27081a711e850e983b7dca4db786b,2024-12-10T16:15:22.327000
|
||||||
CVE-2024-10709,0,0,41eadf98fd4f942149bd2d66f39b1d32e2fbc20d0415ec457a4d209de40f95b0,2024-11-25T21:15:08.837000
|
CVE-2024-10709,0,0,41eadf98fd4f942149bd2d66f39b1d32e2fbc20d0415ec457a4d209de40f95b0,2024-11-25T21:15:08.837000
|
||||||
CVE-2024-1071,0,0,511789b6fa5ad5f82a1b86953aeffe2ca3b5c7e6b5a99f94e7636c9edfe8a8b3,2024-11-21T08:49:43.920000
|
CVE-2024-1071,0,0,511789b6fa5ad5f82a1b86953aeffe2ca3b5c7e6b5a99f94e7636c9edfe8a8b3,2024-11-21T08:49:43.920000
|
||||||
CVE-2024-10710,0,0,e03984cb3009dc782d788c1b806be248c0ef7aa6de922ac24071c55d616e1630,2024-11-25T17:15:11.747000
|
CVE-2024-10710,0,0,e03984cb3009dc782d788c1b806be248c0ef7aa6de922ac24071c55d616e1630,2024-11-25T17:15:11.747000
|
||||||
@ -243738,7 +243741,7 @@ CVE-2024-11102,0,0,ec70fa86628f0582db7e97e83cef58a9123c92079aa9ea3641e1de155f8fc
|
|||||||
CVE-2024-11103,0,0,525c56d7b3f8fec3123e98bad3867c199a9a90e84f6b6962f9d506a460e4664c,2024-11-28T10:15:06.197000
|
CVE-2024-11103,0,0,525c56d7b3f8fec3123e98bad3867c199a9a90e84f6b6962f9d506a460e4664c,2024-11-28T10:15:06.197000
|
||||||
CVE-2024-11104,0,0,b75d8ded53ff668230e72c743fffcbea02289181c30609ae66856a5e9653031c,2024-11-22T06:15:19.093000
|
CVE-2024-11104,0,0,b75d8ded53ff668230e72c743fffcbea02289181c30609ae66856a5e9653031c,2024-11-22T06:15:19.093000
|
||||||
CVE-2024-11106,0,0,cb51760d779e6bcda9dbc9fa918b08dd376ad7e4ab8eca700349d476fc379343,2024-12-10T11:15:07.030000
|
CVE-2024-11106,0,0,cb51760d779e6bcda9dbc9fa918b08dd376ad7e4ab8eca700349d476fc379343,2024-12-10T11:15:07.030000
|
||||||
CVE-2024-11107,0,0,c5956665d8c7ce6fcd0a182467a15d9156b0276ffd181b7a1b3ebd79cb232eaf,2024-12-10T06:15:20.883000
|
CVE-2024-11107,0,1,e63c51a0013d57175f37cde043b0096a03b54bd5bdcb8e418ffa2ed410184713,2024-12-10T16:15:22.450000
|
||||||
CVE-2024-1111,0,0,1e2a4c53f023bbf8c3b556fe6d8a896ca169d10bbf6dcef8f8f730e5e086694a,2024-11-21T08:49:49.257000
|
CVE-2024-1111,0,0,1e2a4c53f023bbf8c3b556fe6d8a896ca169d10bbf6dcef8f8f730e5e086694a,2024-11-21T08:49:49.257000
|
||||||
CVE-2024-11110,0,0,d490bd60a369a1b46dbdb1050197f0676234294cb261b9f35d39066213c16bbc,2024-11-13T17:01:16.850000
|
CVE-2024-11110,0,0,d490bd60a369a1b46dbdb1050197f0676234294cb261b9f35d39066213c16bbc,2024-11-13T17:01:16.850000
|
||||||
CVE-2024-11111,0,0,da9ee8d75f19a39df28c4985a5537997054eaf20345ca454e34c488f64fe6a62,2024-11-13T17:01:16.850000
|
CVE-2024-11111,0,0,da9ee8d75f19a39df28c4985a5537997054eaf20345ca454e34c488f64fe6a62,2024-11-13T17:01:16.850000
|
||||||
@ -244092,8 +244095,8 @@ CVE-2024-11588,0,0,5c87d3de5e1737ff9700ad118d49a80ec81298df54ba83599a1b0981e7270
|
|||||||
CVE-2024-11589,0,0,d8f318f712bc26492f19cda890ece059dde07fa43d94e43c3cbb49f5796cfca3,2024-11-22T22:02:50.957000
|
CVE-2024-11589,0,0,d8f318f712bc26492f19cda890ece059dde07fa43d94e43c3cbb49f5796cfca3,2024-11-22T22:02:50.957000
|
||||||
CVE-2024-1159,0,0,eb3cea64f953819b25c713636566da1c2414aeeb8f257fad9b5566b88ad761a2,2024-11-21T08:49:55.853000
|
CVE-2024-1159,0,0,eb3cea64f953819b25c713636566da1c2414aeeb8f257fad9b5566b88ad761a2,2024-11-21T08:49:55.853000
|
||||||
CVE-2024-11590,0,0,e740ca3e60e754996a48f25e4ef9592f751b2e7e926db4d30ecdc643e2342b41,2024-11-22T22:00:59.297000
|
CVE-2024-11590,0,0,e740ca3e60e754996a48f25e4ef9592f751b2e7e926db4d30ecdc643e2342b41,2024-11-22T22:00:59.297000
|
||||||
CVE-2024-11591,0,0,7d078f628834ae7bd5713c3d9f79e04a0f86da057d69be602f456da03226f961,2024-11-21T14:15:08.713000
|
CVE-2024-11591,0,1,5eec80b1852a517df18be0f28e5d8878cb437694093f1b583289c41f3be6c5bd,2024-12-10T16:55:46.527000
|
||||||
CVE-2024-11592,0,0,a5629ee65e2b3653966abed7ce668c506fa468928903f25a059c4ccbae074d41,2024-11-21T15:15:25.003000
|
CVE-2024-11592,0,1,aa2ca9e49c0b66e2b9ddd982b5b002e43397f92095593f87db1ef37aa31469f9,2024-12-10T16:52:43.287000
|
||||||
CVE-2024-11595,0,0,a5112dbb9cb2e7f356d3cce7d0ed3c3ac245c3e9a2ca11df8391a68c97c97211,2024-11-21T13:57:24.187000
|
CVE-2024-11595,0,0,a5112dbb9cb2e7f356d3cce7d0ed3c3ac245c3e9a2ca11df8391a68c97c97211,2024-11-21T13:57:24.187000
|
||||||
CVE-2024-11596,0,0,6343cd2138cc057262127834530bb4e7d4aee6e59c66c3eb257ce4b183831bc4,2024-11-21T13:57:24.187000
|
CVE-2024-11596,0,0,6343cd2138cc057262127834530bb4e7d4aee6e59c66c3eb257ce4b183831bc4,2024-11-21T13:57:24.187000
|
||||||
CVE-2024-11599,0,0,a26c993827526d1af73bfe90f868b9bfb9a722b6b2267b567215827aef919d86,2024-11-28T10:15:06.657000
|
CVE-2024-11599,0,0,a26c993827526d1af73bfe90f868b9bfb9a722b6b2267b567215827aef919d86,2024-11-28T10:15:06.657000
|
||||||
@ -244239,7 +244242,7 @@ CVE-2024-1186,0,0,2e273a7149091b295fd44850226681809150a1697d95b70cddb9945c7f5d2c
|
|||||||
CVE-2024-11860,0,0,3a70209f793392595a3a51a4d60b0579da591107f99f2af8b8ca46fce7a60e47,2024-12-04T21:08:39.133000
|
CVE-2024-11860,0,0,3a70209f793392595a3a51a4d60b0579da591107f99f2af8b8ca46fce7a60e47,2024-12-04T21:08:39.133000
|
||||||
CVE-2024-11862,0,0,7712aab25e9f815f730578195e7a4831741702c7ef40dfbc871d5c94d52129b1,2024-11-27T15:15:25.393000
|
CVE-2024-11862,0,0,7712aab25e9f815f730578195e7a4831741702c7ef40dfbc871d5c94d52129b1,2024-11-27T15:15:25.393000
|
||||||
CVE-2024-11866,0,0,f98849df3d1b11c4a74b976ef8b2271c79a4b31b45f414582e51d5b7f2d3bff7,2024-12-03T09:15:05.487000
|
CVE-2024-11866,0,0,f98849df3d1b11c4a74b976ef8b2271c79a4b31b45f414582e51d5b7f2d3bff7,2024-12-03T09:15:05.487000
|
||||||
CVE-2024-11868,1,1,6562d73f3ac693485a95f5a10095f9315239583a70a12d5f33afc1f56bd78bd9,2024-12-10T13:15:15.973000
|
CVE-2024-11868,0,0,6562d73f3ac693485a95f5a10095f9315239583a70a12d5f33afc1f56bd78bd9,2024-12-10T13:15:15.973000
|
||||||
CVE-2024-1187,0,0,34bfab1d2868a509e17e58177c8ef1072428b9ace11ecd550f1c0daa57f2d37c,2024-11-21T08:49:59.543000
|
CVE-2024-1187,0,0,34bfab1d2868a509e17e58177c8ef1072428b9ace11ecd550f1c0daa57f2d37c,2024-11-21T08:49:59.543000
|
||||||
CVE-2024-1188,0,0,a65e9144328c7bf88ed9510065b2567c80bec907fa15019254b44a904bcf4c98,2024-11-21T08:49:59.690000
|
CVE-2024-1188,0,0,a65e9144328c7bf88ed9510065b2567c80bec907fa15019254b44a904bcf4c98,2024-11-21T08:49:59.690000
|
||||||
CVE-2024-11880,0,0,bc08b419001e69ecc8df6960919cacc77cc712a48473883e8526af3cf15bbb8b,2024-12-04T09:15:04.470000
|
CVE-2024-11880,0,0,bc08b419001e69ecc8df6960919cacc77cc712a48473883e8526af3cf15bbb8b,2024-12-04T09:15:04.470000
|
||||||
@ -244350,13 +244353,13 @@ CVE-2024-12167,0,0,f97c04ecc09e2484bf0b42b06ea0566a4d30b5ed150fed7a5c3244cf691bb
|
|||||||
CVE-2024-1217,0,0,3de4593a5f9b417a5fbd6236f528d532a8a6dfb588724578487cd5ad8c5d1072,2024-11-21T08:50:03.817000
|
CVE-2024-1217,0,0,3de4593a5f9b417a5fbd6236f528d532a8a6dfb588724578487cd5ad8c5d1072,2024-11-21T08:50:03.817000
|
||||||
CVE-2024-12174,0,0,7ce07ead21822d2f414578c1748f9c9f2791c2ee4ba5e20aeb979e5b04e08fdd,2024-12-09T22:15:22.237000
|
CVE-2024-12174,0,0,7ce07ead21822d2f414578c1748f9c9f2791c2ee4ba5e20aeb979e5b04e08fdd,2024-12-09T22:15:22.237000
|
||||||
CVE-2024-1218,0,0,ae65e02be37dbc9babfa45210656ff360cc199b16c8680945f92dd585fedfbc3,2024-11-21T08:50:04
|
CVE-2024-1218,0,0,ae65e02be37dbc9babfa45210656ff360cc199b16c8680945f92dd585fedfbc3,2024-11-21T08:50:04
|
||||||
CVE-2024-12180,0,0,7f084668c18d493fcdc70ffa31644b1f9385ab1838576755e66ba21ebc946e32,2024-12-04T22:15:22.140000
|
CVE-2024-12180,0,1,25613c8b94aac2cf24513985a7e8ce52f62a7fb91248d4df9e059f62149972d6,2024-12-10T16:34:52.763000
|
||||||
CVE-2024-12181,0,0,38759279e5ddb2a0f829a7f5ff6dad70b12a6dfcc04c1f013a3078b822c8c220,2024-12-04T22:15:22.360000
|
CVE-2024-12181,0,1,2f8ddb76759020891581c20b50823d1952e3d03370eabe8b27bca8702bd25159,2024-12-10T16:29:18.917000
|
||||||
CVE-2024-12182,0,0,11ed54e56307c355716895fe3a2d295067c3d099b4f6c52ca120775d586fc88d,2024-12-04T23:15:04.703000
|
CVE-2024-12182,0,1,99729c3af2a19c744d32ab48ea2f407c48703d1d78f2fc596c4a0dad8235db7f,2024-12-10T16:18:29.027000
|
||||||
CVE-2024-12183,0,0,e80bd9be2194875d59b4be9842251b28ac95c0dcff1d416dd6227f0f1d1ff5ea,2024-12-04T23:15:05.760000
|
CVE-2024-12183,0,1,82e7d00c0d43970561dcde149328e37153ec341d20500330a205d615cf7848af,2024-12-10T16:05:39.010000
|
||||||
CVE-2024-12185,0,0,7b6ad594afb9edd7dd5bc14dfcae167178d80f60c66772554718690a0e581450,2024-12-05T00:15:18.677000
|
CVE-2024-12185,0,1,2794475f4c291bccc75d891cf053c96f74c5bfa44bdb40ae143fb3a0b3833593,2024-12-10T15:57:03.543000
|
||||||
CVE-2024-12186,0,0,bb95376f2518569c84887f5bb02ed0416fd1e47dc66b3ac600c4847eaf5237e4,2024-12-05T00:15:18.887000
|
CVE-2024-12186,0,1,44e0fbeb8593926913663c90a8d76c7d9e63d8cea11901a6acafe7cca925b60d,2024-12-10T15:52:39.487000
|
||||||
CVE-2024-12187,0,0,9c3f4ffce46e9c35c64f4c7f34f77b7ea8473cc713403377a889122ddaf2af98,2024-12-05T01:15:04.740000
|
CVE-2024-12187,0,1,d5219bf8165d3b6d69ade284ac66cc01774c2830861f108855db8360e680b621,2024-12-10T15:25:53.537000
|
||||||
CVE-2024-12188,0,0,9630a0796baa9ec4e8782d005d486e4f8bf046eb1e553a6bbf9ee9e7d1813812,2024-12-05T01:15:04.943000
|
CVE-2024-12188,0,0,9630a0796baa9ec4e8782d005d486e4f8bf046eb1e553a6bbf9ee9e7d1813812,2024-12-05T01:15:04.943000
|
||||||
CVE-2024-1219,0,0,629287fb6c9fdb1db5a6b18292530d26bc4ea3297efdbbab51f719885479af95,2024-11-21T08:50:04.430000
|
CVE-2024-1219,0,0,629287fb6c9fdb1db5a6b18292530d26bc4ea3297efdbbab51f719885479af95,2024-11-21T08:50:04.430000
|
||||||
CVE-2024-12196,0,0,9fa580adf43e9cbf06e25fc8b96bbf2ae78be5e0921b9598efca40b2ec0f8630,2024-12-04T21:15:21.090000
|
CVE-2024-12196,0,0,9fa580adf43e9cbf06e25fc8b96bbf2ae78be5e0921b9598efca40b2ec0f8630,2024-12-04T21:15:21.090000
|
||||||
@ -244374,6 +244377,7 @@ CVE-2024-12232,0,0,8ac258fec8b1773cf95dd11c943fcd65f455678e8beaddd5071d54b1acd6e
|
|||||||
CVE-2024-12233,0,0,05b9925f1297f182adba9298e65b877490d4cb6f74e3cd9a5f7f5b2f5c9df9d4,2024-12-05T17:15:11.037000
|
CVE-2024-12233,0,0,05b9925f1297f182adba9298e65b877490d4cb6f74e3cd9a5f7f5b2f5c9df9d4,2024-12-05T17:15:11.037000
|
||||||
CVE-2024-12234,0,0,393ae01c764aca95a7ebbb32374a68fa6706a527e69981b016911f43ea345c05,2024-12-05T17:15:11.213000
|
CVE-2024-12234,0,0,393ae01c764aca95a7ebbb32374a68fa6706a527e69981b016911f43ea345c05,2024-12-05T17:15:11.213000
|
||||||
CVE-2024-12235,0,0,38f1b3feacaad948f40ac9e8f67e1ff40424da9b6b0097b46c94da1cb9b5c6b9,2024-12-05T18:15:21.660000
|
CVE-2024-12235,0,0,38f1b3feacaad948f40ac9e8f67e1ff40424da9b6b0097b46c94da1cb9b5c6b9,2024-12-05T18:15:21.660000
|
||||||
|
CVE-2024-12236,1,1,caa087d872ef2d26c670019d91aa1248a68a09c1bcd376af7384f31b991183a0,2024-12-10T15:15:07.147000
|
||||||
CVE-2024-1224,0,0,cbfbaa5b4f0e1c410530412d727d5bf58dfe126bd3d740f330bf5c6e93a0658e,2024-11-21T08:50:05.487000
|
CVE-2024-1224,0,0,cbfbaa5b4f0e1c410530412d727d5bf58dfe126bd3d740f330bf5c6e93a0658e,2024-11-21T08:50:05.487000
|
||||||
CVE-2024-12247,0,0,d5c2fdaf4ab27cb3f776fad80cd63211a094668755f28e461521a00bf1e54442,2024-12-05T16:15:25.243000
|
CVE-2024-12247,0,0,d5c2fdaf4ab27cb3f776fad80cd63211a094668755f28e461521a00bf1e54442,2024-12-05T16:15:25.243000
|
||||||
CVE-2024-1225,0,0,d56581e615392d12fcd235e8948b723b57d92c29183fcfd4176a14e94ac6d7a2,2024-11-21T08:50:05.673000
|
CVE-2024-1225,0,0,d56581e615392d12fcd235e8948b723b57d92c29183fcfd4176a14e94ac6d7a2,2024-11-21T08:50:05.673000
|
||||||
@ -244391,6 +244395,7 @@ CVE-2024-12306,0,0,7a6ad19881298b2491617643bd5219a8f3696a7257d332ef3f9d18eb332ee
|
|||||||
CVE-2024-12307,0,0,23aacf8c044133a030d70d78a0f87e6b3da2eadc1bf68e4a395d80d759eab88c,2024-12-09T09:15:05.433000
|
CVE-2024-12307,0,0,23aacf8c044133a030d70d78a0f87e6b3da2eadc1bf68e4a395d80d759eab88c,2024-12-09T09:15:05.433000
|
||||||
CVE-2024-1231,0,0,b14e8b0a07bc5ec367647c5978c3a1256f30a8a16700580e77b0e0e8d9654fdc,2024-11-21T08:50:06.870000
|
CVE-2024-1231,0,0,b14e8b0a07bc5ec367647c5978c3a1256f30a8a16700580e77b0e0e8d9654fdc,2024-11-21T08:50:06.870000
|
||||||
CVE-2024-1232,0,0,0724dcbb02c95ade7614aaa3e49113b53bf4da94f0e9ec3c91efd2f39f26e0e2,2024-11-21T08:50:07.030000
|
CVE-2024-1232,0,0,0724dcbb02c95ade7614aaa3e49113b53bf4da94f0e9ec3c91efd2f39f26e0e2,2024-11-21T08:50:07.030000
|
||||||
|
CVE-2024-12323,1,1,cda0016ec5c0b14f1438c5124cf1a1a11494fb26a27490c50b47e2260e80d4bf,2024-12-10T15:15:07.300000
|
||||||
CVE-2024-12326,0,0,f960296d4c7a80b2aa28fc7f84f75a77ad31211d0d7e9b5df25b051a57e66633,2024-12-06T21:15:05.957000
|
CVE-2024-12326,0,0,f960296d4c7a80b2aa28fc7f84f75a77ad31211d0d7e9b5df25b051a57e66633,2024-12-06T21:15:05.957000
|
||||||
CVE-2024-1233,0,0,9d758d75169c31056a2dd99a6ff761ac0a3c179827b3dc598c6fb0d83614dada,2024-11-21T08:50:07.317000
|
CVE-2024-1233,0,0,9d758d75169c31056a2dd99a6ff761ac0a3c179827b3dc598c6fb0d83614dada,2024-11-21T08:50:07.317000
|
||||||
CVE-2024-1234,0,0,6b4d1ae0b8159c98fb379447cf95a21f71a7514cfa9af5f48616ab89e3a52cca,2024-11-21T08:50:07.567000
|
CVE-2024-1234,0,0,6b4d1ae0b8159c98fb379447cf95a21f71a7514cfa9af5f48616ab89e3a52cca,2024-11-21T08:50:07.567000
|
||||||
@ -244707,10 +244712,10 @@ CVE-2024-1543,0,0,4a3f54efdb30bd1f479ccf7dde939a4f2178814d69c046c674cf435f75183c
|
|||||||
CVE-2024-1544,0,0,ec7bd5bfce6d8a5680209d840150f3a72ca82e6f0bdaceef95969f92f84b200a,2024-08-28T12:57:39.090000
|
CVE-2024-1544,0,0,ec7bd5bfce6d8a5680209d840150f3a72ca82e6f0bdaceef95969f92f84b200a,2024-08-28T12:57:39.090000
|
||||||
CVE-2024-1545,0,0,f430a88dd5a80c4e6d8114040bd38feb923ebb5ac9a499d79c766e0b6f3663d6,2024-09-04T14:27:08.060000
|
CVE-2024-1545,0,0,f430a88dd5a80c4e6d8114040bd38feb923ebb5ac9a499d79c766e0b6f3663d6,2024-09-04T14:27:08.060000
|
||||||
CVE-2024-1546,0,0,9212ef8fbd34b2c8818b252aa5644e12d17cd3f6aff18c19063f555b526c7431,2024-11-21T08:50:47.790000
|
CVE-2024-1546,0,0,9212ef8fbd34b2c8818b252aa5644e12d17cd3f6aff18c19063f555b526c7431,2024-11-21T08:50:47.790000
|
||||||
CVE-2024-1547,0,0,54246c613b856c3bb19c2d00f86cdfd23349981a4cb5e4c93fb3b584c1acf02e,2024-11-21T08:50:47.990000
|
CVE-2024-1547,0,1,3326f00a3c44c7c5bbdd8b0fa2e0164e2326f4a9489951bec76323437a1a6ddc,2024-12-10T15:22:44.033000
|
||||||
CVE-2024-1548,0,0,203f7716ef53ecfa347f3bdd4643533fcc22a71f8babd70885d3f7bc63df1f2e,2024-11-21T08:50:48.107000
|
CVE-2024-1548,0,0,203f7716ef53ecfa347f3bdd4643533fcc22a71f8babd70885d3f7bc63df1f2e,2024-11-21T08:50:48.107000
|
||||||
CVE-2024-1549,0,0,4d5167a73309f144c3ff33946095813a03d32753bee088e2970d72af46e3bebc,2024-11-21T08:50:48.297000
|
CVE-2024-1549,0,0,4d5167a73309f144c3ff33946095813a03d32753bee088e2970d72af46e3bebc,2024-11-21T08:50:48.297000
|
||||||
CVE-2024-1550,0,0,f885cd36a4a459a5e0491ade562ec1d07a86048aace30d65fc38ac11842cbd15,2024-11-21T08:50:48.480000
|
CVE-2024-1550,0,1,a55ef7c47110f2a16fba412d727714d2ec3ba661ff89032c132d21ef7d76d329,2024-12-10T15:30:13.977000
|
||||||
CVE-2024-1551,0,0,287dda421e1eaaa9cc09294bce356e9e64e9825417508ff13ee29c792f89d66f,2024-11-21T08:50:48.600000
|
CVE-2024-1551,0,0,287dda421e1eaaa9cc09294bce356e9e64e9825417508ff13ee29c792f89d66f,2024-11-21T08:50:48.600000
|
||||||
CVE-2024-1552,0,0,5451612cebcf1ecaac6f71e11c561451c1d707744a13867adc5e48360df90434,2024-11-21T08:50:48.813000
|
CVE-2024-1552,0,0,5451612cebcf1ecaac6f71e11c561451c1d707744a13867adc5e48360df90434,2024-11-21T08:50:48.813000
|
||||||
CVE-2024-1553,0,0,31524ffd32c6d5503318c6507795348d14b0ae538e98c3f1b0435b84a3f10491,2024-11-21T08:50:48.943000
|
CVE-2024-1553,0,0,31524ffd32c6d5503318c6507795348d14b0ae538e98c3f1b0435b84a3f10491,2024-11-21T08:50:48.943000
|
||||||
@ -246098,7 +246103,7 @@ CVE-2024-21123,0,0,dc0174ae4c90456c439e839553b2498d14c4f888bd590edaa8a8f7e67b3b0
|
|||||||
CVE-2024-21125,0,0,00117d0141d6804dde4b4597f14611c8e7044a0c5819feb38f51feecde07623b,2024-11-21T08:53:49.880000
|
CVE-2024-21125,0,0,00117d0141d6804dde4b4597f14611c8e7044a0c5819feb38f51feecde07623b,2024-11-21T08:53:49.880000
|
||||||
CVE-2024-21126,0,0,2e7907c63d6168d1c610803a0745eb9c11b0e8c0ad2ad693cbf9f27610e2768e,2024-11-21T08:53:50
|
CVE-2024-21126,0,0,2e7907c63d6168d1c610803a0745eb9c11b0e8c0ad2ad693cbf9f27610e2768e,2024-11-21T08:53:50
|
||||||
CVE-2024-21127,0,0,82211d53a8f04d5c481c561182096b582b45b38ffbe51d2d51ade2c558d5da56,2024-11-21T08:53:50.107000
|
CVE-2024-21127,0,0,82211d53a8f04d5c481c561182096b582b45b38ffbe51d2d51ade2c558d5da56,2024-11-21T08:53:50.107000
|
||||||
CVE-2024-21128,0,1,5afd183275b05006de5f597ebbf957c1781b10bb9cae433596a21e2e51a87fc1,2024-12-10T14:43:26.337000
|
CVE-2024-21128,0,0,5afd183275b05006de5f597ebbf957c1781b10bb9cae433596a21e2e51a87fc1,2024-12-10T14:43:26.337000
|
||||||
CVE-2024-21129,0,0,2c8e0b13d98477ae37358534ebfbe5e2257d99408b758e7e4434d44c0dbb5bfb,2024-11-21T08:53:50.347000
|
CVE-2024-21129,0,0,2c8e0b13d98477ae37358534ebfbe5e2257d99408b758e7e4434d44c0dbb5bfb,2024-11-21T08:53:50.347000
|
||||||
CVE-2024-2113,0,0,74934c55d707759b1d94ccef22382592d0461296223855372e0edb6efe4e722b,2024-11-21T09:09:03.530000
|
CVE-2024-2113,0,0,74934c55d707759b1d94ccef22382592d0461296223855372e0edb6efe4e722b,2024-11-21T09:09:03.530000
|
||||||
CVE-2024-21130,0,0,d7e5f2ba7a349a01871ed99811d8326f2c33202d853400289e668060d42f27d9,2024-11-21T08:53:50.470000
|
CVE-2024-21130,0,0,d7e5f2ba7a349a01871ed99811d8326f2c33202d853400289e668060d42f27d9,2024-11-21T08:53:50.470000
|
||||||
@ -246958,9 +246963,9 @@ CVE-2024-22117,0,0,7fc14c99bc14c7a825c70601bd00a916ed4cd735ca0a5ac830de2071ccb43
|
|||||||
CVE-2024-22119,0,0,4bd6f0e5973d39a2a0656293d459ca6ef306ff5763274518b9b5aa7967be8dfa,2024-11-21T08:55:37.150000
|
CVE-2024-22119,0,0,4bd6f0e5973d39a2a0656293d459ca6ef306ff5763274518b9b5aa7967be8dfa,2024-11-21T08:55:37.150000
|
||||||
CVE-2024-2212,0,0,e75e0f2b1f2450fa59e5cec8f477ac1cae4224adbc8f01ea7cf95009aa609f07,2024-11-21T09:09:16.010000
|
CVE-2024-2212,0,0,e75e0f2b1f2450fa59e5cec8f477ac1cae4224adbc8f01ea7cf95009aa609f07,2024-11-21T09:09:16.010000
|
||||||
CVE-2024-22120,0,0,8e56862446422e0e91455a2e1599414d6b8f9c030d42b3dcc7917f5cc5622a4c,2024-11-21T08:55:37.330000
|
CVE-2024-22120,0,0,8e56862446422e0e91455a2e1599414d6b8f9c030d42b3dcc7917f5cc5622a4c,2024-11-21T08:55:37.330000
|
||||||
CVE-2024-22121,0,0,9ea93d38e1368a83a95f3437fb73cf1ceccfc2ce80ad1f8e55a8681491b71019,2024-08-12T13:41:36.517000
|
CVE-2024-22121,0,1,04688fcf4ead04e75d87d970b502bc82bd60fd65218ebd0ae0a8a7c1417de80a,2024-12-10T16:19:19.810000
|
||||||
CVE-2024-22122,0,0,6ce5d8606930c81c3bafb914075045ad81836bbc4606f58827a3776bed02835b,2024-08-12T13:41:36.517000
|
CVE-2024-22122,0,0,6ce5d8606930c81c3bafb914075045ad81836bbc4606f58827a3776bed02835b,2024-08-12T13:41:36.517000
|
||||||
CVE-2024-22123,0,0,87794a97d3a19144e447af479cc138e4a0c0f9f7cf437abf71f4516bd99b43e1,2024-08-12T13:41:36.517000
|
CVE-2024-22123,0,1,9b287ee5cfa5ac853e927cdfbf96855c3d9966d71632c59d89f027e96d407185,2024-12-10T16:32:45.670000
|
||||||
CVE-2024-22124,0,0,d5a044bf5c1dde953a41a09beb3001b525fa50e194473fec9101161bc3275ab9,2024-11-21T08:55:37.677000
|
CVE-2024-22124,0,0,d5a044bf5c1dde953a41a09beb3001b525fa50e194473fec9101161bc3275ab9,2024-11-21T08:55:37.677000
|
||||||
CVE-2024-22125,0,0,0b92c8029608ce5d587636ba433cf4c1537d306a9d999b89c6b8f2c55a742714,2024-11-21T08:55:37.863000
|
CVE-2024-22125,0,0,0b92c8029608ce5d587636ba433cf4c1537d306a9d999b89c6b8f2c55a742714,2024-11-21T08:55:37.863000
|
||||||
CVE-2024-22126,0,0,fcc7483da7a4037594ad2a4a392334068f8d29d466d3003e0b1c5df4797dcf43,2024-11-21T08:55:38.007000
|
CVE-2024-22126,0,0,fcc7483da7a4037594ad2a4a392334068f8d29d466d3003e0b1c5df4797dcf43,2024-11-21T08:55:38.007000
|
||||||
@ -249322,7 +249327,7 @@ CVE-2024-2562,0,0,6acc014ac1c8f4275f46fe82a47eb5d09d436c296b92b3bb232858f0cdeed9
|
|||||||
CVE-2024-25620,0,0,b50e6d09af7ce768a716dc2ff7ffa7e76bd9a236ffa80ba663793968d8d53334,2024-11-21T09:01:05.923000
|
CVE-2024-25620,0,0,b50e6d09af7ce768a716dc2ff7ffa7e76bd9a236ffa80ba663793968d8d53334,2024-11-21T09:01:05.923000
|
||||||
CVE-2024-25622,0,0,19331e262c89ec2dfac0643941c141afaa588d6eeb88b76a48e16f43833fb161,2024-11-12T20:04:39.957000
|
CVE-2024-25622,0,0,19331e262c89ec2dfac0643941c141afaa588d6eeb88b76a48e16f43833fb161,2024-11-12T20:04:39.957000
|
||||||
CVE-2024-25623,0,0,4ea464b17d1d0d8df4343b0d15400a7b448cb44208b1d92d5e881adc6bc4ae76,2024-11-21T09:01:06.140000
|
CVE-2024-25623,0,0,4ea464b17d1d0d8df4343b0d15400a7b448cb44208b1d92d5e881adc6bc4ae76,2024-11-21T09:01:06.140000
|
||||||
CVE-2024-25624,0,0,b8ecd33535c9d86cd8bc6373ee68fb47fff7a9410ec441d72de1289aec8c7682,2024-11-21T09:01:06.270000
|
CVE-2024-25624,0,1,0ccfb4720ff7648aaed0e46c11a6d045e4a7fb375e62145035dd53d5d8cc5ee8,2024-12-10T15:06:18.390000
|
||||||
CVE-2024-25625,0,0,84707cd28e1bdaa9fde780703bf2a9a7e5d5981a505df8c5ad93f3b9fec8212d,2024-11-21T09:01:06.387000
|
CVE-2024-25625,0,0,84707cd28e1bdaa9fde780703bf2a9a7e5d5981a505df8c5ad93f3b9fec8212d,2024-11-21T09:01:06.387000
|
||||||
CVE-2024-25626,0,0,fd128277875e205dcfef22acbe212d50e94b3f10ad9e2e84a95cfbcc859efdc3,2024-11-21T09:01:06.513000
|
CVE-2024-25626,0,0,fd128277875e205dcfef22acbe212d50e94b3f10ad9e2e84a95cfbcc859efdc3,2024-11-21T09:01:06.513000
|
||||||
CVE-2024-25627,0,0,1f36f6b8a38e3514dadc663df7cfcf4bc4ceb575a559d6a5d2bb4d844ff52665,2024-11-21T09:01:06.650000
|
CVE-2024-25627,0,0,1f36f6b8a38e3514dadc663df7cfcf4bc4ceb575a559d6a5d2bb4d844ff52665,2024-11-21T09:01:06.650000
|
||||||
@ -249340,7 +249345,7 @@ CVE-2024-25637,0,0,06ab54f16a9bfc3926d7fec37f54306456527e6ebaa8507eee3adad16f6f2
|
|||||||
CVE-2024-25638,0,0,f12dc4ba0b2167f5ab84922cbb9e6b48a7d616ff2cf807d68c3c188f2278199b,2024-11-21T09:01:07.940000
|
CVE-2024-25638,0,0,f12dc4ba0b2167f5ab84922cbb9e6b48a7d616ff2cf807d68c3c188f2278199b,2024-11-21T09:01:07.940000
|
||||||
CVE-2024-25639,0,0,b164a4c57acf682cf3a49bbd3b094bc1e4a94b9eee7d9cb35fc315fcdda707e6,2024-11-21T09:01:08.070000
|
CVE-2024-25639,0,0,b164a4c57acf682cf3a49bbd3b094bc1e4a94b9eee7d9cb35fc315fcdda707e6,2024-11-21T09:01:08.070000
|
||||||
CVE-2024-2564,0,0,313459e72833e8e80484cf000b9739b791940f025a4358d79fd668a637827595,2024-11-21T09:10:01.293000
|
CVE-2024-2564,0,0,313459e72833e8e80484cf000b9739b791940f025a4358d79fd668a637827595,2024-11-21T09:10:01.293000
|
||||||
CVE-2024-25640,0,0,ad4d810c4861dc75c55c0b530d2457860e1f673844b4b5e30b3030e05c2d0eca,2024-11-21T09:01:08.217000
|
CVE-2024-25640,0,1,eca1a9dfeb497966580e78cbd95fea629a14b5d4a11a799afa1f6a8b14c7d9bc,2024-12-10T15:02:48.627000
|
||||||
CVE-2024-25641,0,0,225359e70f049838d11fd731d0641dd562d644a64b14c3ed1a1a9bf4e7e8cfb5,2024-11-21T09:01:08.333000
|
CVE-2024-25641,0,0,225359e70f049838d11fd731d0641dd562d644a64b14c3ed1a1a9bf4e7e8cfb5,2024-11-21T09:01:08.333000
|
||||||
CVE-2024-25642,0,0,68d39e6cf2695ae48b7919d02ba3e988aab884b616e0f5762655cf9e0f023341,2024-11-21T09:01:08.460000
|
CVE-2024-25642,0,0,68d39e6cf2695ae48b7919d02ba3e988aab884b616e0f5762655cf9e0f023341,2024-11-21T09:01:08.460000
|
||||||
CVE-2024-25643,0,0,7ff63852912b81236d444e8dfdf631097da2013167b8121f53de27a6581edac5,2024-11-21T09:01:08.590000
|
CVE-2024-25643,0,0,7ff63852912b81236d444e8dfdf631097da2013167b8121f53de27a6581edac5,2024-11-21T09:01:08.590000
|
||||||
@ -251127,7 +251132,7 @@ CVE-2024-27822,0,0,f8be55eb8bf86503cf81512385aa89b340f124c8a3f8c20fd852538813632
|
|||||||
CVE-2024-27823,0,0,78c75b2c22fe34bed862cefb90eaed8a187e580151d9a70d547054d573dd3f8b,2024-11-21T09:05:10.170000
|
CVE-2024-27823,0,0,78c75b2c22fe34bed862cefb90eaed8a187e580151d9a70d547054d573dd3f8b,2024-11-21T09:05:10.170000
|
||||||
CVE-2024-27824,0,0,2cc12ddd99599dd006872c0cf7b8d5ab63b8531da94587db60786c0ccab83ed8,2024-12-09T19:47:18.810000
|
CVE-2024-27824,0,0,2cc12ddd99599dd006872c0cf7b8d5ab63b8531da94587db60786c0ccab83ed8,2024-12-09T19:47:18.810000
|
||||||
CVE-2024-27825,0,0,29e89e5710bfb54d1d04d8a9fd3541852d70f76dfc5302ffc30489c883b11ff7,2024-12-09T20:14:22.540000
|
CVE-2024-27825,0,0,29e89e5710bfb54d1d04d8a9fd3541852d70f76dfc5302ffc30489c883b11ff7,2024-12-09T20:14:22.540000
|
||||||
CVE-2024-27826,0,1,45957ce20f2a01ddd88e91e0a33bb37bd420691b90dfe10df96403e6970a5865,2024-12-10T14:43:46.787000
|
CVE-2024-27826,0,0,45957ce20f2a01ddd88e91e0a33bb37bd420691b90dfe10df96403e6970a5865,2024-12-10T14:43:46.787000
|
||||||
CVE-2024-27827,0,0,bed63d634ffd1cbf24affc77bf979fa261e9adc7f3f174cc4bfced523c12d6a5,2024-12-09T19:37:57.937000
|
CVE-2024-27827,0,0,bed63d634ffd1cbf24affc77bf979fa261e9adc7f3f174cc4bfced523c12d6a5,2024-12-09T19:37:57.937000
|
||||||
CVE-2024-27828,0,0,290c13ac106a10f3e41ecd8a81554d379261693867413fea9d302c84a5fa930e,2024-11-21T09:05:11.540000
|
CVE-2024-27828,0,0,290c13ac106a10f3e41ecd8a81554d379261693867413fea9d302c84a5fa930e,2024-11-21T09:05:11.540000
|
||||||
CVE-2024-27829,0,0,9c466917970a7e1175bb391cf0ecae12e38a57520d20433719ce119d71b32455,2024-12-09T19:45:04.940000
|
CVE-2024-27829,0,0,9c466917970a7e1175bb391cf0ecae12e38a57520d20433719ce119d71b32455,2024-12-09T19:45:04.940000
|
||||||
@ -251163,9 +251168,9 @@ CVE-2024-27858,0,0,aa4ac34917fc25a3b363315db7cb3fffd219145d245e40c2d78d17a7bcb48
|
|||||||
CVE-2024-2786,0,0,610b8d9425d279ad1dc89b2b20968cbade000e4dda0124ac96ac2900c12ae5c9,2024-11-21T09:10:30.913000
|
CVE-2024-2786,0,0,610b8d9425d279ad1dc89b2b20968cbade000e4dda0124ac96ac2900c12ae5c9,2024-11-21T09:10:30.913000
|
||||||
CVE-2024-27860,0,0,573c398bb03b5382369ac69cc1d55fcdcd51ef33a018d7ec6bcd579bee759306,2024-09-23T19:10:07.350000
|
CVE-2024-27860,0,0,573c398bb03b5382369ac69cc1d55fcdcd51ef33a018d7ec6bcd579bee759306,2024-09-23T19:10:07.350000
|
||||||
CVE-2024-27861,0,0,44687bbf9414155e406d842a229f671ff45e5709268fc42f7e0846677b06e6c3,2024-10-10T13:13:53.450000
|
CVE-2024-27861,0,0,44687bbf9414155e406d842a229f671ff45e5709268fc42f7e0846677b06e6c3,2024-10-10T13:13:53.450000
|
||||||
CVE-2024-27862,0,1,1879dd3c7b86226e41db14689055cbd9455607ed315179a7b729f6913bf91dce,2024-12-10T15:00:16.310000
|
CVE-2024-27862,0,0,1879dd3c7b86226e41db14689055cbd9455607ed315179a7b729f6913bf91dce,2024-12-10T15:00:16.310000
|
||||||
CVE-2024-27863,0,0,bc20f934200c90ab71177ba452dea8ed95327208c78d45ff56560458c5cbbb31,2024-11-21T09:05:18.200000
|
CVE-2024-27863,0,0,bc20f934200c90ab71177ba452dea8ed95327208c78d45ff56560458c5cbbb31,2024-11-21T09:05:18.200000
|
||||||
CVE-2024-27867,0,1,9d8a031b2bac38a4828644f9e0ea14edefe724dd0e937c81c7aeb7d5722cc9e9,2024-12-10T14:42:58.173000
|
CVE-2024-27867,0,0,9d8a031b2bac38a4828644f9e0ea14edefe724dd0e937c81c7aeb7d5722cc9e9,2024-12-10T14:42:58.173000
|
||||||
CVE-2024-27869,0,0,6e32a9ffdaa128992a9fa73116ac1928876fc9fe0764d0f9da711d653ce9c617,2024-09-20T12:31:20.110000
|
CVE-2024-27869,0,0,6e32a9ffdaa128992a9fa73116ac1928876fc9fe0764d0f9da711d653ce9c617,2024-09-20T12:31:20.110000
|
||||||
CVE-2024-2787,0,0,0c477846917fd22b31e9c1d06001e4f39c193fa1a28a292429193d6118b3549f,2024-11-21T09:10:31.060000
|
CVE-2024-2787,0,0,0c477846917fd22b31e9c1d06001e4f39c193fa1a28a292429193d6118b3549f,2024-11-21T09:10:31.060000
|
||||||
CVE-2024-27871,0,0,970b05cbe9294bb0a3bb5c093d25c78edda1afa20430c21070839e14a02f2ee6,2024-11-21T09:05:18.840000
|
CVE-2024-27871,0,0,970b05cbe9294bb0a3bb5c093d25c78edda1afa20430c21070839e14a02f2ee6,2024-11-21T09:05:18.840000
|
||||||
@ -251175,7 +251180,7 @@ CVE-2024-27874,0,0,a3ae0816a446eb62ea47e1d8c747a6a199c7f1058068e6b70bf6c237aa417
|
|||||||
CVE-2024-27875,0,0,8df39e5d544a78e5c1413d584d661e6ffec101f654beecd0003b6e9a0719503d,2024-09-25T19:44:53.983000
|
CVE-2024-27875,0,0,8df39e5d544a78e5c1413d584d661e6ffec101f654beecd0003b6e9a0719503d,2024-09-25T19:44:53.983000
|
||||||
CVE-2024-27876,0,0,ad31911f06582c6f1a546b05a0484e8f1ed11f37f086efa558fc9a1a78c8461e,2024-09-20T12:31:20.110000
|
CVE-2024-27876,0,0,ad31911f06582c6f1a546b05a0484e8f1ed11f37f086efa558fc9a1a78c8461e,2024-09-20T12:31:20.110000
|
||||||
CVE-2024-27877,0,0,45be2b5613afa9ae468b6af267aa93bdc0afba5faea5f453002cf918f675cc6d,2024-11-21T09:05:19.787000
|
CVE-2024-27877,0,0,45be2b5613afa9ae468b6af267aa93bdc0afba5faea5f453002cf918f675cc6d,2024-11-21T09:05:19.787000
|
||||||
CVE-2024-27878,0,0,c2c0d70e681539869952e300112364d0de3d7b6301811bbe6fb0939885e95d89,2024-11-21T09:05:19.930000
|
CVE-2024-27878,0,1,fac979f4951af3bc569c5e2412a5795638ccc7a547e74adca11fe4da6c646d26,2024-12-10T15:14:11.670000
|
||||||
CVE-2024-27879,0,0,49bf223f494bb44906ac374292ba30f8e8efe58844dcd99e60f501fcc504cf24,2024-09-20T12:31:20.110000
|
CVE-2024-27879,0,0,49bf223f494bb44906ac374292ba30f8e8efe58844dcd99e60f501fcc504cf24,2024-09-20T12:31:20.110000
|
||||||
CVE-2024-2788,0,0,218c976e218a011d157128d1fc5bea1b692d725ea0f06577546c117df977d726,2024-11-21T09:10:31.203000
|
CVE-2024-2788,0,0,218c976e218a011d157128d1fc5bea1b692d725ea0f06577546c117df977d726,2024-11-21T09:10:31.203000
|
||||||
CVE-2024-27880,0,0,773a386792ad07328a7a0448d54c6ad89345135e04a61568c7b277c03fab901e,2024-09-24T16:34:04.597000
|
CVE-2024-27880,0,0,773a386792ad07328a7a0448d54c6ad89345135e04a61568c7b277c03fab901e,2024-09-24T16:34:04.597000
|
||||||
@ -251184,9 +251189,9 @@ CVE-2024-27882,0,0,de1636067606d8abea05b2d623862645d7430157a629cccf883a6c28832f5
|
|||||||
CVE-2024-27883,0,0,0d199213fd35f1e0f86a8cb34ff1863e819c339379b2bbf9841fef5f4ff3746f,2024-11-21T09:05:20.710000
|
CVE-2024-27883,0,0,0d199213fd35f1e0f86a8cb34ff1863e819c339379b2bbf9841fef5f4ff3746f,2024-11-21T09:05:20.710000
|
||||||
CVE-2024-27884,0,0,1c4fd438b4c1f81ae2dc47cb12eb9a0af1b36d21af3f71cda60b10dda4ed8165,2024-11-21T09:05:20.853000
|
CVE-2024-27884,0,0,1c4fd438b4c1f81ae2dc47cb12eb9a0af1b36d21af3f71cda60b10dda4ed8165,2024-11-21T09:05:20.853000
|
||||||
CVE-2024-27885,0,0,87f86d4faf4b2ee786765b1cbcfff093ef8ca9ea1a1718a912755ea3d0fa013b,2024-11-21T09:05:21.020000
|
CVE-2024-27885,0,0,87f86d4faf4b2ee786765b1cbcfff093ef8ca9ea1a1718a912755ea3d0fa013b,2024-11-21T09:05:21.020000
|
||||||
CVE-2024-27886,0,1,3c715f8c52f1864ddda85ca53b2b16f09102ef3c94476f9d4abb350858861418,2024-12-10T14:54:49.967000
|
CVE-2024-27886,0,0,3c715f8c52f1864ddda85ca53b2b16f09102ef3c94476f9d4abb350858861418,2024-12-10T14:54:49.967000
|
||||||
CVE-2024-27887,0,0,27c7d91a187938663d4a01d4c87033037d24e5ace0c9df0921f49ee73def6186,2024-11-21T09:05:21.357000
|
CVE-2024-27887,0,0,27c7d91a187938663d4a01d4c87033037d24e5ace0c9df0921f49ee73def6186,2024-11-21T09:05:21.357000
|
||||||
CVE-2024-27888,0,1,cd0431e20853cd52fac0840f748f121c2c1ffdab2233c1cee21b2fe50a5a00fd,2024-12-10T14:51:04.667000
|
CVE-2024-27888,0,0,cd0431e20853cd52fac0840f748f121c2c1ffdab2233c1cee21b2fe50a5a00fd,2024-12-10T14:51:04.667000
|
||||||
CVE-2024-27889,0,0,9baa87884a3e66fc5756c9ced2a8ef947001f8941593056f52c6dadb55724bf9,2024-11-21T09:05:21.780000
|
CVE-2024-27889,0,0,9baa87884a3e66fc5756c9ced2a8ef947001f8941593056f52c6dadb55724bf9,2024-11-21T09:05:21.780000
|
||||||
CVE-2024-2789,0,0,ea7cc59fd040ec8486f5414eb2adec79c9e64461c463ff35ba3f144bf7febd94,2024-11-21T09:10:31.330000
|
CVE-2024-2789,0,0,ea7cc59fd040ec8486f5414eb2adec79c9e64461c463ff35ba3f144bf7febd94,2024-11-21T09:10:31.330000
|
||||||
CVE-2024-27894,0,0,a529ce9447bf5cccdc79592c335a904880367559eca12c605a0c1c557584b199,2024-11-21T09:05:21.910000
|
CVE-2024-27894,0,0,a529ce9447bf5cccdc79592c335a904880367559eca12c605a0c1c557584b199,2024-11-21T09:05:21.910000
|
||||||
@ -255377,7 +255382,7 @@ CVE-2024-33610,0,0,d559843ab86fe84848331c81e0bccb00eec583cdd8c349293cb7cb385684e
|
|||||||
CVE-2024-33611,0,0,34a27be675d366d55129dfd8d472f6d3fb907c9ac625c371451f0af0ba865104,2024-11-15T14:00:09.720000
|
CVE-2024-33611,0,0,34a27be675d366d55129dfd8d472f6d3fb907c9ac625c371451f0af0ba865104,2024-11-15T14:00:09.720000
|
||||||
CVE-2024-33612,0,0,47d92bfefa792f77cf43fdfba0f6c0eb1aac54c9675613c29fbf0a4de7078a27,2024-11-21T09:17:15.097000
|
CVE-2024-33612,0,0,47d92bfefa792f77cf43fdfba0f6c0eb1aac54c9675613c29fbf0a4de7078a27,2024-11-21T09:17:15.097000
|
||||||
CVE-2024-33615,0,0,b0077641ba27b9f232ccc1928ba76be8582878949d0230dd977055112bfb6d07,2024-11-21T09:17:15.217000
|
CVE-2024-33615,0,0,b0077641ba27b9f232ccc1928ba76be8582878949d0230dd977055112bfb6d07,2024-11-21T09:17:15.217000
|
||||||
CVE-2024-33616,0,0,c77c96a2a38da5ac03e4b1fd252acdc19c289610cf3d7a64ed20c41cb6f8c52e,2024-11-26T08:15:05.987000
|
CVE-2024-33616,0,1,b2c1e64cf451f906f0bc4bead91b511950fec536d39d5a34a17b142a6a1901e1,2024-12-10T16:15:23.160000
|
||||||
CVE-2024-33617,0,0,b5a96128d1153051ad40ea4ba9baf38160cd56299edb1399c63220751b996ad9,2024-11-15T14:00:09.720000
|
CVE-2024-33617,0,0,b5a96128d1153051ad40ea4ba9baf38160cd56299edb1399c63220751b996ad9,2024-11-15T14:00:09.720000
|
||||||
CVE-2024-33619,0,0,036a7394ae355470d32ce8039a02c40299365dfa9d052a61c05e3242fc787132,2024-11-21T09:17:15.430000
|
CVE-2024-33619,0,0,036a7394ae355470d32ce8039a02c40299365dfa9d052a61c05e3242fc787132,2024-11-21T09:17:15.430000
|
||||||
CVE-2024-3362,0,0,f1202621c6b1e179090b7e7fbbf91c7066b33ec5498ea1d621e8407359df1365,2024-11-21T09:29:27.703000
|
CVE-2024-3362,0,0,f1202621c6b1e179090b7e7fbbf91c7066b33ec5498ea1d621e8407359df1365,2024-11-21T09:29:27.703000
|
||||||
@ -257579,9 +257584,9 @@ CVE-2024-36457,0,0,d4562f4e32fd047482c1de9819a5f4fcb2a008249e476f6bbf0ccd9182aa4
|
|||||||
CVE-2024-36458,0,0,4b68ab7c6066ecf1ea824c95a800f010c043e83e6487ff21231f5aec16ee8a84,2024-11-21T21:15:20.990000
|
CVE-2024-36458,0,0,4b68ab7c6066ecf1ea824c95a800f010c043e83e6487ff21231f5aec16ee8a84,2024-11-21T21:15:20.990000
|
||||||
CVE-2024-36459,0,0,9ecaa09a24904b55302cbc5eaa654b091c4278406a5c9b66fa0a49fac00a2e90,2024-11-21T09:22:13.967000
|
CVE-2024-36459,0,0,9ecaa09a24904b55302cbc5eaa654b091c4278406a5c9b66fa0a49fac00a2e90,2024-11-21T09:22:13.967000
|
||||||
CVE-2024-3646,0,0,051bf24273d552a83fc4e1a5e75bdc359f98f48af5f31996248ecbea14fabc2e,2024-11-21T09:30:04.473000
|
CVE-2024-3646,0,0,051bf24273d552a83fc4e1a5e75bdc359f98f48af5f31996248ecbea14fabc2e,2024-11-21T09:30:04.473000
|
||||||
CVE-2024-36460,0,0,b34a7020ea902917cb9f2f0044e7cfdf40c18e3cec286d15bc17d96a72c3b18e,2024-08-12T13:41:36.517000
|
CVE-2024-36460,0,1,878274595d9b9de4dc71c9ab56ba06c69bf806ca52a72d9a66ff6b56ff46fe95,2024-12-10T16:14:57.453000
|
||||||
CVE-2024-36461,0,0,7c67c80939bb337486b1f047094f256eb8eeeba3581e1a803369fa7156a5e43b,2024-08-12T13:41:36.517000
|
CVE-2024-36461,0,1,16950bef91730cef7ea58cca2f4e4f516c7975ea62bd448f68259d85f79644db,2024-12-10T16:15:23.177000
|
||||||
CVE-2024-36462,0,0,5b30f6b32a657098d1d8f0046acb2c993e6662ab30183dd981515ea3aebc35ab,2024-08-12T13:41:36.517000
|
CVE-2024-36462,0,1,8c4b5999bdee50b55b0e965906447a665c5901170419000f05417b55b2dd91b6,2024-12-10T16:15:37.193000
|
||||||
CVE-2024-36463,0,0,8fb33a20c45e94718b424cd59646a9b6b0ffa316e7dd62c60f1069c8f4c43e5f,2024-11-26T15:15:31.827000
|
CVE-2024-36463,0,0,8fb33a20c45e94718b424cd59646a9b6b0ffa316e7dd62c60f1069c8f4c43e5f,2024-11-26T15:15:31.827000
|
||||||
CVE-2024-36464,0,0,24cacab9f7d27b304eb6f6bdbe25e10a247232e8a99785c34e9f4b22e14f17be,2024-11-27T14:15:17.830000
|
CVE-2024-36464,0,0,24cacab9f7d27b304eb6f6bdbe25e10a247232e8a99785c34e9f4b22e14f17be,2024-11-27T14:15:17.830000
|
||||||
CVE-2024-36466,0,0,ac5c096e99aeeb0fa27711ca22d2ffac4f2b2cd27652a43880a2ca285ef1be53,2024-11-28T08:15:05.290000
|
CVE-2024-36466,0,0,ac5c096e99aeeb0fa27711ca22d2ffac4f2b2cd27652a43880a2ca285ef1be53,2024-11-28T08:15:05.290000
|
||||||
@ -259459,7 +259464,7 @@ CVE-2024-38821,0,0,0618f1513f6bbf25c713d315a6dad9b1bf80204f6b7dc5d1e77e053b31592
|
|||||||
CVE-2024-38826,0,0,aa0be29968eb435ec090127c9d271f3db29778a1347f10ec378a7a1554409ee7,2024-11-12T13:55:21.227000
|
CVE-2024-38826,0,0,aa0be29968eb435ec090127c9d271f3db29778a1347f10ec378a7a1554409ee7,2024-11-12T13:55:21.227000
|
||||||
CVE-2024-38827,0,0,f7285de9e12a479fca65242632f63f093d55c18ad767dacbf1d6e13c67480020,2024-12-02T15:15:11.270000
|
CVE-2024-38827,0,0,f7285de9e12a479fca65242632f63f093d55c18ad767dacbf1d6e13c67480020,2024-12-02T15:15:11.270000
|
||||||
CVE-2024-38828,0,0,2b01623940f343417ee92cfdb4f261afb5dfca65f597a90b4769cc03110fea56,2024-11-18T17:11:17.393000
|
CVE-2024-38828,0,0,2b01623940f343417ee92cfdb4f261afb5dfca65f597a90b4769cc03110fea56,2024-11-18T17:11:17.393000
|
||||||
CVE-2024-38829,0,0,895439237a2f5fd05d9f55fe5d5c129202eed50ca57e496c4dda3f0dbfa440cc,2024-12-04T21:15:24.103000
|
CVE-2024-38829,0,1,6e70b82cf4a08eca299f1ef01398ce598581c72dcb52145f07efeeba754e9484,2024-12-10T15:15:07.593000
|
||||||
CVE-2024-3883,0,0,c916445e546de0871526642978215546e67de3bd61061903009ac41fc512f75b,2024-11-21T09:30:37.683000
|
CVE-2024-3883,0,0,c916445e546de0871526642978215546e67de3bd61061903009ac41fc512f75b,2024-11-21T09:30:37.683000
|
||||||
CVE-2024-38830,0,0,e8b420777d2e30b087a73e69b065c501d17864d02afe330332d83c0cf0b2fca5,2024-11-26T12:15:18.413000
|
CVE-2024-38830,0,0,e8b420777d2e30b087a73e69b065c501d17864d02afe330332d83c0cf0b2fca5,2024-11-26T12:15:18.413000
|
||||||
CVE-2024-38831,0,0,4e296297b435627a62910eef33560dffee11758af4014daf7dacfd30a3846679,2024-11-26T15:15:31.957000
|
CVE-2024-38831,0,0,4e296297b435627a62910eef33560dffee11758af4014daf7dacfd30a3846679,2024-11-26T15:15:31.957000
|
||||||
@ -260570,15 +260575,15 @@ CVE-2024-40770,0,0,868a7712172f9193db04503bf4681e6456ac2c380ba489a77f29f0b183bde
|
|||||||
CVE-2024-40774,0,0,acf9484778c188d9655881f6296c67ea4d7b41e7dc81159e8bc4a6eb0bc45b07,2024-11-21T09:31:35.363000
|
CVE-2024-40774,0,0,acf9484778c188d9655881f6296c67ea4d7b41e7dc81159e8bc4a6eb0bc45b07,2024-11-21T09:31:35.363000
|
||||||
CVE-2024-40775,0,0,5a1c8ebb97a8c67c049206c150e713e1edac12079e5342341c02eb94b0a883fc,2024-11-21T09:31:35.600000
|
CVE-2024-40775,0,0,5a1c8ebb97a8c67c049206c150e713e1edac12079e5342341c02eb94b0a883fc,2024-11-21T09:31:35.600000
|
||||||
CVE-2024-40776,0,0,691f82117c272b7fd0cd01aff97f784b0cb450c83a62bf9d7355e7e0bac6f051,2024-11-21T09:31:35.730000
|
CVE-2024-40776,0,0,691f82117c272b7fd0cd01aff97f784b0cb450c83a62bf9d7355e7e0bac6f051,2024-11-21T09:31:35.730000
|
||||||
CVE-2024-40777,0,1,28ca9a7c241b3719fd673041c2bef99084a53ce2f03522e1b3740d4e69dc5d50,2024-12-10T14:46:05.797000
|
CVE-2024-40777,0,0,28ca9a7c241b3719fd673041c2bef99084a53ce2f03522e1b3740d4e69dc5d50,2024-12-10T14:46:05.797000
|
||||||
CVE-2024-40778,0,0,9f33a78120305618c4af695048e22760029d8fa22ae1c9b06ffb0fc260e027df,2024-11-21T09:31:36.180000
|
CVE-2024-40778,0,0,9f33a78120305618c4af695048e22760029d8fa22ae1c9b06ffb0fc260e027df,2024-11-21T09:31:36.180000
|
||||||
CVE-2024-40779,0,0,24f2c0026ed1b89a4192667befdfd5f2fa6437bd8b0b42b11ebaa2de52d85f2b,2024-11-21T09:31:36.320000
|
CVE-2024-40779,0,0,24f2c0026ed1b89a4192667befdfd5f2fa6437bd8b0b42b11ebaa2de52d85f2b,2024-11-21T09:31:36.320000
|
||||||
CVE-2024-4078,0,0,876c2d85ad15b40998fa1a091e99c40bdf3265b4dfc0dc2a74b816b191e7aeb1,2024-11-21T09:42:09.057000
|
CVE-2024-4078,0,0,876c2d85ad15b40998fa1a091e99c40bdf3265b4dfc0dc2a74b816b191e7aeb1,2024-11-21T09:42:09.057000
|
||||||
CVE-2024-40780,0,0,79bbd0100ae5fa04270605f8c0a68d5757f3644ba25f4a2aceaba1392b1c61b5,2024-11-21T09:31:36.483000
|
CVE-2024-40780,0,0,79bbd0100ae5fa04270605f8c0a68d5757f3644ba25f4a2aceaba1392b1c61b5,2024-11-21T09:31:36.483000
|
||||||
CVE-2024-40781,0,1,3363c39d91a7831bcb7aad563596ee907481d83bc7f28181f8d88d8b37be4d26,2024-12-10T14:44:30.447000
|
CVE-2024-40781,0,0,3363c39d91a7831bcb7aad563596ee907481d83bc7f28181f8d88d8b37be4d26,2024-12-10T14:44:30.447000
|
||||||
CVE-2024-40782,0,1,1681e3f74f0e893eb28a0176ca8743b201333cb23d7238959dbfcc2f2ea45bb3,2024-12-10T14:40:38.913000
|
CVE-2024-40782,0,0,1681e3f74f0e893eb28a0176ca8743b201333cb23d7238959dbfcc2f2ea45bb3,2024-12-10T14:40:38.913000
|
||||||
CVE-2024-40783,0,1,b214e53e5695093f1a97e3bda561eeb0d78bba15f089cc9486490e141f4469d2,2024-12-10T14:36:32.047000
|
CVE-2024-40783,0,0,b214e53e5695093f1a97e3bda561eeb0d78bba15f089cc9486490e141f4469d2,2024-12-10T14:36:32.047000
|
||||||
CVE-2024-40784,0,1,0614a9b6a289caa463057f8e765d30b829571138689ec9219bfeb4ece615b1b8,2024-12-10T14:35:11.197000
|
CVE-2024-40784,0,0,0614a9b6a289caa463057f8e765d30b829571138689ec9219bfeb4ece615b1b8,2024-12-10T14:35:11.197000
|
||||||
CVE-2024-40785,0,0,e7608cb4e789b0d57c87d46824a61398005e9bfcbb488fcf872b55b20c6fce13,2024-11-21T09:31:37.503000
|
CVE-2024-40785,0,0,e7608cb4e789b0d57c87d46824a61398005e9bfcbb488fcf872b55b20c6fce13,2024-11-21T09:31:37.503000
|
||||||
CVE-2024-40786,0,0,be7513464307331b0f21d95b97bef5d1d4b3b9ee1591c2069c1d9ce282f49c20,2024-11-21T09:31:37.657000
|
CVE-2024-40786,0,0,be7513464307331b0f21d95b97bef5d1d4b3b9ee1591c2069c1d9ce282f49c20,2024-11-21T09:31:37.657000
|
||||||
CVE-2024-40787,0,0,8aaa2fb548d87487ae48d48ddcc78e474fa9a3d00ea0d3c48c5c8d8f40bc1fb2,2024-11-21T09:31:37.787000
|
CVE-2024-40787,0,0,8aaa2fb548d87487ae48d48ddcc78e474fa9a3d00ea0d3c48c5c8d8f40bc1fb2,2024-11-21T09:31:37.787000
|
||||||
@ -260596,27 +260601,27 @@ CVE-2024-40797,0,0,f14a11d4a728c8a86d4bd1d32ea1c5f8ae14477eadc574999e9cef2e732ad
|
|||||||
CVE-2024-40798,0,0,2c5137a9186f5986d04c634015580da436877522b408214b3bc1e1d5405696be,2024-11-21T09:31:39.157000
|
CVE-2024-40798,0,0,2c5137a9186f5986d04c634015580da436877522b408214b3bc1e1d5405696be,2024-11-21T09:31:39.157000
|
||||||
CVE-2024-40799,0,0,a4df85e7704d4f140c3e000f12ab966153dd840f0d66cd762134297f5c5e0db9,2024-11-21T09:31:39.297000
|
CVE-2024-40799,0,0,a4df85e7704d4f140c3e000f12ab966153dd840f0d66cd762134297f5c5e0db9,2024-11-21T09:31:39.297000
|
||||||
CVE-2024-4080,0,0,d41249f04cf97bb237511db103188ee9975762edb7d49fc806aa36b0693fa467,2024-11-21T09:42:09.330000
|
CVE-2024-4080,0,0,d41249f04cf97bb237511db103188ee9975762edb7d49fc806aa36b0693fa467,2024-11-21T09:42:09.330000
|
||||||
CVE-2024-40800,0,1,b33e87d64e49134b44ed04be86797376921feed7b52a5f305540d69cf37d7a03,2024-12-10T14:26:15.710000
|
CVE-2024-40800,0,0,b33e87d64e49134b44ed04be86797376921feed7b52a5f305540d69cf37d7a03,2024-12-10T14:26:15.710000
|
||||||
CVE-2024-40801,0,0,2b8c684a418f10f47d5b29fe2c29a6e969ddbdf6c48e8dfab48caa92f171cb41,2024-09-24T15:43:37.490000
|
CVE-2024-40801,0,0,2b8c684a418f10f47d5b29fe2c29a6e969ddbdf6c48e8dfab48caa92f171cb41,2024-09-24T15:43:37.490000
|
||||||
CVE-2024-40802,0,1,563df9962a4864aa00b79cf61749de092984de9364c8f35a30e6b2bf2671981d,2024-12-10T14:57:57.143000
|
CVE-2024-40802,0,0,563df9962a4864aa00b79cf61749de092984de9364c8f35a30e6b2bf2671981d,2024-12-10T14:57:57.143000
|
||||||
CVE-2024-40803,0,0,7a79592f91c7f2e3cdc2d5ec518a069335aa6fa008f6b29e7d16e0e25c2c4197,2024-11-21T09:31:39.960000
|
CVE-2024-40803,0,0,7a79592f91c7f2e3cdc2d5ec518a069335aa6fa008f6b29e7d16e0e25c2c4197,2024-11-21T09:31:39.960000
|
||||||
CVE-2024-40804,0,0,7d7a8fea2356cdd68fe943122361e329e5dedaafdc6a8e5af8d36b46c78f89a4,2024-11-21T09:31:40.083000
|
CVE-2024-40804,0,0,7d7a8fea2356cdd68fe943122361e329e5dedaafdc6a8e5af8d36b46c78f89a4,2024-11-21T09:31:40.083000
|
||||||
CVE-2024-40805,0,1,13645725b1681fde7570b84efb1d6f8401eafd2a444e37e0fd8a3aa6c36514be,2024-12-10T14:57:17.887000
|
CVE-2024-40805,0,0,13645725b1681fde7570b84efb1d6f8401eafd2a444e37e0fd8a3aa6c36514be,2024-12-10T14:57:17.887000
|
||||||
CVE-2024-40806,0,0,06a52f7e92cfc73c5aa3085661b3b838fa52ff3bc438b157f87d61486bbe86a1,2024-11-21T09:31:40.377000
|
CVE-2024-40806,0,0,06a52f7e92cfc73c5aa3085661b3b838fa52ff3bc438b157f87d61486bbe86a1,2024-11-21T09:31:40.377000
|
||||||
CVE-2024-40807,0,0,aa52f240186fdc6e240bd4413bcab727fd8fcb753a192ab9dff172120f0f1672,2024-11-21T09:31:40.537000
|
CVE-2024-40807,0,0,aa52f240186fdc6e240bd4413bcab727fd8fcb753a192ab9dff172120f0f1672,2024-11-21T09:31:40.537000
|
||||||
CVE-2024-40809,0,0,e0ef73c9c3b8e6c198213d06d60b6635119e1372038dc2c5ad4de92adc24988d,2024-11-21T09:31:40.667000
|
CVE-2024-40809,0,0,e0ef73c9c3b8e6c198213d06d60b6635119e1372038dc2c5ad4de92adc24988d,2024-11-21T09:31:40.667000
|
||||||
CVE-2024-4081,0,0,a8cb52f748212831eb0f908c5358c01ba2440972e066efb74e3fc0403bf48916,2024-11-21T09:42:09.460000
|
CVE-2024-4081,0,0,a8cb52f748212831eb0f908c5358c01ba2440972e066efb74e3fc0403bf48916,2024-11-21T09:42:09.460000
|
||||||
CVE-2024-40810,0,0,0bdfce63164940e1cd12fb4417c4e2985d9d847d45267827b3342731bbd0c955,2024-10-29T21:35:09.467000
|
CVE-2024-40810,0,0,0bdfce63164940e1cd12fb4417c4e2985d9d847d45267827b3342731bbd0c955,2024-10-29T21:35:09.467000
|
||||||
CVE-2024-40811,0,1,e5e268291e19acf6f9af493524ffb184ab47831415c1a6be0a43a99a58f9f3ff,2024-12-10T14:53:16.287000
|
CVE-2024-40811,0,0,e5e268291e19acf6f9af493524ffb184ab47831415c1a6be0a43a99a58f9f3ff,2024-12-10T14:53:16.287000
|
||||||
CVE-2024-40812,0,0,4db8acce8a2970669bbc65deebee01d7a15fad29796b40ae5a2044599b05c2f7,2024-11-21T09:31:41.143000
|
CVE-2024-40812,0,0,4db8acce8a2970669bbc65deebee01d7a15fad29796b40ae5a2044599b05c2f7,2024-11-21T09:31:41.143000
|
||||||
CVE-2024-40813,0,0,45e9aae059d0233b7079e495d48b4acd4e744784498779eb74606b0d89c22634,2024-11-21T09:31:41.303000
|
CVE-2024-40813,0,0,45e9aae059d0233b7079e495d48b4acd4e744784498779eb74606b0d89c22634,2024-11-21T09:31:41.303000
|
||||||
CVE-2024-40814,0,1,57e725873392d3680f23714697504ec25c26f21a4b8f7f0f7705b5b733c10b5d,2024-12-10T14:49:34.477000
|
CVE-2024-40814,0,0,57e725873392d3680f23714697504ec25c26f21a4b8f7f0f7705b5b733c10b5d,2024-12-10T14:49:34.477000
|
||||||
CVE-2024-40815,0,0,0f1adcd1d2d10d9e07ecdf7b1b63fc2dc496053c65837cf0f3413f168ebf29ea,2024-11-21T09:31:41.690000
|
CVE-2024-40815,0,0,0f1adcd1d2d10d9e07ecdf7b1b63fc2dc496053c65837cf0f3413f168ebf29ea,2024-11-21T09:31:41.690000
|
||||||
CVE-2024-40816,0,0,bf41694c0849ddd8d44a836dd7dd0e12b9ef749afe75121f65ad453324956992,2024-11-21T09:31:41.843000
|
CVE-2024-40816,0,0,bf41694c0849ddd8d44a836dd7dd0e12b9ef749afe75121f65ad453324956992,2024-11-21T09:31:41.843000
|
||||||
CVE-2024-40817,0,0,5ea3e07efbab71e2d2607aeb6d91a11704b1fec81e28eafbfefcc5c61086892a,2024-11-21T09:31:41.983000
|
CVE-2024-40817,0,0,5ea3e07efbab71e2d2607aeb6d91a11704b1fec81e28eafbfefcc5c61086892a,2024-11-21T09:31:41.983000
|
||||||
CVE-2024-40818,0,0,498715ba251ac4a77d46f20c1f4583b3b89075e295b6483ab0f6ec91516f140d,2024-11-21T09:31:42.140000
|
CVE-2024-40818,0,0,498715ba251ac4a77d46f20c1f4583b3b89075e295b6483ab0f6ec91516f140d,2024-11-21T09:31:42.140000
|
||||||
CVE-2024-4082,0,0,884f744d4b6d6c38211069fff9472a771275afdc68ad46774024765c6d13755a,2024-11-21T09:42:09.593000
|
CVE-2024-4082,0,0,884f744d4b6d6c38211069fff9472a771275afdc68ad46774024765c6d13755a,2024-11-21T09:42:09.593000
|
||||||
CVE-2024-40821,0,1,a3b876952ec8ce255096f7c26040316035df8c47e37e23640e020f9cd5f7797f,2024-12-10T14:47:42.573000
|
CVE-2024-40821,0,0,a3b876952ec8ce255096f7c26040316035df8c47e37e23640e020f9cd5f7797f,2024-12-10T14:47:42.573000
|
||||||
CVE-2024-40822,0,0,f2e42c11a9194a009cec70add00bceafd93485fa2ccc44b94afc5a8685e89cd1,2024-11-21T09:31:42.490000
|
CVE-2024-40822,0,0,f2e42c11a9194a009cec70add00bceafd93485fa2ccc44b94afc5a8685e89cd1,2024-11-21T09:31:42.490000
|
||||||
CVE-2024-40823,0,0,ea5834191915fbf77537780befd2f8170562cc3e8f14a6bae616ecfbb3aa16eb,2024-11-21T09:31:42.633000
|
CVE-2024-40823,0,0,ea5834191915fbf77537780befd2f8170562cc3e8f14a6bae616ecfbb3aa16eb,2024-11-21T09:31:42.633000
|
||||||
CVE-2024-40824,0,0,f06a65634df701916688a4cb6ccf61904c2867fc9a521a8cf66bf5eb3a0571a0,2024-11-21T09:31:42.770000
|
CVE-2024-40824,0,0,f06a65634df701916688a4cb6ccf61904c2867fc9a521a8cf66bf5eb3a0571a0,2024-11-21T09:31:42.770000
|
||||||
@ -261439,7 +261444,7 @@ CVE-2024-41976,0,0,42caf5a007bee351e12b4a06ba3af81131c9ae6b389ae9fe7288af1ace49f
|
|||||||
CVE-2024-41977,0,0,d60c39a443c53177c83036712d2b2e0d10f24cd83e8f9256a5a4af7c2ffe4cf0,2024-08-23T18:39:13.990000
|
CVE-2024-41977,0,0,d60c39a443c53177c83036712d2b2e0d10f24cd83e8f9256a5a4af7c2ffe4cf0,2024-08-23T18:39:13.990000
|
||||||
CVE-2024-41978,0,0,a9db5f0ef1cf6f05f507a3d6b9c1eb78d64604fbf035ed5751c84ec7b7102df9,2024-08-23T18:34:36.283000
|
CVE-2024-41978,0,0,a9db5f0ef1cf6f05f507a3d6b9c1eb78d64604fbf035ed5751c84ec7b7102df9,2024-08-23T18:34:36.283000
|
||||||
CVE-2024-4198,0,0,ad8b63492508ea78a0b02d111682b485f5ca74ae0f1c300e2494392f9d51f1f9,2024-11-21T09:42:22.450000
|
CVE-2024-4198,0,0,ad8b63492508ea78a0b02d111682b485f5ca74ae0f1c300e2494392f9d51f1f9,2024-11-21T09:42:22.450000
|
||||||
CVE-2024-41981,0,1,595e887d6ea0c63397a9eccc9815f07337ad0496936250e7e5a33d36fd0a71a4,2024-12-10T14:30:39.670000
|
CVE-2024-41981,0,0,595e887d6ea0c63397a9eccc9815f07337ad0496936250e7e5a33d36fd0a71a4,2024-12-10T14:30:39.670000
|
||||||
CVE-2024-41987,0,0,60c106b47b761c2f190d94257b37a69d919ff7f89dae3c97c2987f690f8d24fd,2024-10-04T13:50:43.727000
|
CVE-2024-41987,0,0,60c106b47b761c2f190d94257b37a69d919ff7f89dae3c97c2987f690f8d24fd,2024-10-04T13:50:43.727000
|
||||||
CVE-2024-41988,0,0,6d2370eba472daacc149b3a07abe0a2bb04e0e3eba237b664cdb1309b28bc00f,2024-10-04T13:50:43.727000
|
CVE-2024-41988,0,0,6d2370eba472daacc149b3a07abe0a2bb04e0e3eba237b664cdb1309b28bc00f,2024-10-04T13:50:43.727000
|
||||||
CVE-2024-41989,0,0,e7df0286b5daeeda8268119adc22bceddab20fce25179a1516bbedb5a121beb7,2024-08-08T20:35:11.140000
|
CVE-2024-41989,0,0,e7df0286b5daeeda8268119adc22bceddab20fce25179a1516bbedb5a121beb7,2024-08-08T20:35:11.140000
|
||||||
@ -263936,21 +263941,21 @@ CVE-2024-4546,0,0,b7cdc4b543e15e201ed44f8fc6e4cf20dc32164dd66216ed33114a60691625
|
|||||||
CVE-2024-45460,0,0,001c0d271f13fdcf16be449aeee5552f7fdd01ce5de21517068cf8da4d5ecf67,2024-09-27T14:51:08.120000
|
CVE-2024-45460,0,0,001c0d271f13fdcf16be449aeee5552f7fdd01ce5de21517068cf8da4d5ecf67,2024-09-27T14:51:08.120000
|
||||||
CVE-2024-45461,0,0,84f3694fbb53484ea1b2f0e2bd825429789554960bc7428029266b0247d5f511,2024-11-21T09:37:48.267000
|
CVE-2024-45461,0,0,84f3694fbb53484ea1b2f0e2bd825429789554960bc7428029266b0247d5f511,2024-11-21T09:37:48.267000
|
||||||
CVE-2024-45462,0,0,5481d86379eb32e5cf042e4db1e116735f20241b10741a0b8240f20e66c496cf,2024-11-21T09:37:48.420000
|
CVE-2024-45462,0,0,5481d86379eb32e5cf042e4db1e116735f20241b10741a0b8240f20e66c496cf,2024-11-21T09:37:48.420000
|
||||||
CVE-2024-45463,0,1,d38fed6e54dbce5e6709708021ad95c43a414d68d02bbec9b1cf9943f8b040a5,2024-12-10T14:30:40.500000
|
CVE-2024-45463,0,0,d38fed6e54dbce5e6709708021ad95c43a414d68d02bbec9b1cf9943f8b040a5,2024-12-10T14:30:40.500000
|
||||||
CVE-2024-45464,0,1,4513fdc8e179736f0b1bc0763e1a273c7388bcb70a81c92b520cf65db74c6590,2024-12-10T14:30:41.117000
|
CVE-2024-45464,0,0,4513fdc8e179736f0b1bc0763e1a273c7388bcb70a81c92b520cf65db74c6590,2024-12-10T14:30:41.117000
|
||||||
CVE-2024-45465,0,1,6135802bc5ef6d924ba321022fdbfde87c90d246701e11519d982827b77e8ae5,2024-12-10T14:30:41.517000
|
CVE-2024-45465,0,0,6135802bc5ef6d924ba321022fdbfde87c90d246701e11519d982827b77e8ae5,2024-12-10T14:30:41.517000
|
||||||
CVE-2024-45466,0,1,4e53d3f76f99f33b36a8a61e373ad6110fbffeab9f7984b3af9578a705db3f9d,2024-12-10T14:30:41.893000
|
CVE-2024-45466,0,0,4e53d3f76f99f33b36a8a61e373ad6110fbffeab9f7984b3af9578a705db3f9d,2024-12-10T14:30:41.893000
|
||||||
CVE-2024-45467,0,1,036f4b00dddaf7495f845ff5d55493c58199249e0220ecd99d47da57b587495e,2024-12-10T14:30:42.243000
|
CVE-2024-45467,0,0,036f4b00dddaf7495f845ff5d55493c58199249e0220ecd99d47da57b587495e,2024-12-10T14:30:42.243000
|
||||||
CVE-2024-45468,0,1,6013cad63529efe366a03007776db329d6aed074775024fa5a55ec7322eb100c,2024-12-10T14:30:42.633000
|
CVE-2024-45468,0,0,6013cad63529efe366a03007776db329d6aed074775024fa5a55ec7322eb100c,2024-12-10T14:30:42.633000
|
||||||
CVE-2024-45469,0,1,656bb42013fb088290c0af17f77aafe6c30a5c41435f0f4d3bfee14789d94021,2024-12-10T14:30:42.847000
|
CVE-2024-45469,0,0,656bb42013fb088290c0af17f77aafe6c30a5c41435f0f4d3bfee14789d94021,2024-12-10T14:30:42.847000
|
||||||
CVE-2024-4547,0,0,e23ce5da78464c86a441e1808ff2ade62b176e4884e1390cb77e42d774dc4b51,2024-11-21T09:43:04.813000
|
CVE-2024-4547,0,0,e23ce5da78464c86a441e1808ff2ade62b176e4884e1390cb77e42d774dc4b51,2024-11-21T09:43:04.813000
|
||||||
CVE-2024-45470,0,1,6e746ef9f4624d1dd9828c4595b99ec1ae90de70766f1bc542a20bafcdaca68a,2024-12-10T14:30:42.990000
|
CVE-2024-45470,0,0,6e746ef9f4624d1dd9828c4595b99ec1ae90de70766f1bc542a20bafcdaca68a,2024-12-10T14:30:42.990000
|
||||||
CVE-2024-45471,0,1,c276977ef9e32e8dab7614c2bb2841752749cf302e8547cfab5a191904641f87,2024-12-10T14:30:43.137000
|
CVE-2024-45471,0,0,c276977ef9e32e8dab7614c2bb2841752749cf302e8547cfab5a191904641f87,2024-12-10T14:30:43.137000
|
||||||
CVE-2024-45472,0,1,81688a9ee970dc2034c3fbf2d6584fe291f2d9482da1d55c772e475c87552f19,2024-12-10T14:30:43.263000
|
CVE-2024-45472,0,0,81688a9ee970dc2034c3fbf2d6584fe291f2d9482da1d55c772e475c87552f19,2024-12-10T14:30:43.263000
|
||||||
CVE-2024-45473,0,1,8c8c37d1e5cb936fc204de0a8a68f21a22fae1c2c18ee129e5950084a6ba3891,2024-12-10T14:30:43.400000
|
CVE-2024-45473,0,0,8c8c37d1e5cb936fc204de0a8a68f21a22fae1c2c18ee129e5950084a6ba3891,2024-12-10T14:30:43.400000
|
||||||
CVE-2024-45474,0,1,8ec981c40c0865bd337e77c549e84217aecc724f40a2f4b66e26d178f60662ac,2024-12-10T14:30:43.543000
|
CVE-2024-45474,0,0,8ec981c40c0865bd337e77c549e84217aecc724f40a2f4b66e26d178f60662ac,2024-12-10T14:30:43.543000
|
||||||
CVE-2024-45475,0,1,68995e1629edebb8d3330a3b1d200226acbfabb2fa93e2ed19b4655f8a034f82,2024-12-10T14:30:43.673000
|
CVE-2024-45475,0,0,68995e1629edebb8d3330a3b1d200226acbfabb2fa93e2ed19b4655f8a034f82,2024-12-10T14:30:43.673000
|
||||||
CVE-2024-45476,0,1,5bd5dfc300a851ce550a6a7da70752b4d8e0106d29959b2ae06cd7e6a0e95953,2024-12-10T14:30:43.853000
|
CVE-2024-45476,0,0,5bd5dfc300a851ce550a6a7da70752b4d8e0106d29959b2ae06cd7e6a0e95953,2024-12-10T14:30:43.853000
|
||||||
CVE-2024-45477,0,0,da1780e6b64087f6d28ed8678f277554fcda2d35c2ea3e486b463eb0dcb01b5f,2024-11-21T09:37:50.293000
|
CVE-2024-45477,0,0,da1780e6b64087f6d28ed8678f277554fcda2d35c2ea3e486b463eb0dcb01b5f,2024-11-21T09:37:50.293000
|
||||||
CVE-2024-4548,0,0,c7401b17e35ff1b34998f05de06d9924efc8296217fd62d20718b595e94aba23,2024-11-21T09:43:04.937000
|
CVE-2024-4548,0,0,c7401b17e35ff1b34998f05de06d9924efc8296217fd62d20718b595e94aba23,2024-11-21T09:43:04.937000
|
||||||
CVE-2024-45488,0,0,ddcd8f59134f72a3b8f90701a24a7b63e03f1137fb0934f505028ece59a798e5,2024-08-30T19:35:06.870000
|
CVE-2024-45488,0,0,ddcd8f59134f72a3b8f90701a24a7b63e03f1137fb0934f505028ece59a798e5,2024-08-30T19:35:06.870000
|
||||||
@ -264824,7 +264829,7 @@ CVE-2024-47041,0,0,e951234436617afb0ea00c852a4b7fa67f944147a2a27719759ecff9c5d4d
|
|||||||
CVE-2024-47043,0,0,16003fbb50bd8180b78bb61a6ac620b79eafb4fbf16d6ca5aba9fd22bd118b54,2024-12-06T18:15:24.853000
|
CVE-2024-47043,0,0,16003fbb50bd8180b78bb61a6ac620b79eafb4fbf16d6ca5aba9fd22bd118b54,2024-12-06T18:15:24.853000
|
||||||
CVE-2024-47044,0,0,f5082c6425317782526cc321eb402e63d4e994b10a2cbcc319dbb6c80851bcb7,2024-10-17T02:15:02.840000
|
CVE-2024-47044,0,0,f5082c6425317782526cc321eb402e63d4e994b10a2cbcc319dbb6c80851bcb7,2024-10-17T02:15:02.840000
|
||||||
CVE-2024-47045,0,0,0657652e435463f24842c95bfd3794a2b4734328367fc4112685852a971c284b,2024-09-26T15:35:29.950000
|
CVE-2024-47045,0,0,0657652e435463f24842c95bfd3794a2b4734328367fc4112685852a971c284b,2024-09-26T15:35:29.950000
|
||||||
CVE-2024-47046,0,1,438bbbfb4564d762294987a696cb45c6577d9b59cf09833dfd022e224f8c8234,2024-12-10T14:30:44.280000
|
CVE-2024-47046,0,0,438bbbfb4564d762294987a696cb45c6577d9b59cf09833dfd022e224f8c8234,2024-12-10T14:30:44.280000
|
||||||
CVE-2024-47047,0,0,f47c9375ff4e3500f3e47f366e397f42b48ae882b1f697904f00fc82abd32028,2024-09-27T17:03:35.507000
|
CVE-2024-47047,0,0,f47c9375ff4e3500f3e47f366e397f42b48ae882b1f697904f00fc82abd32028,2024-09-27T17:03:35.507000
|
||||||
CVE-2024-47048,0,0,425cce79ac1ff694ab4c7cef97a6df0f5610cb2bf223796f917dc53ac24edec5,2024-09-26T17:12:07.440000
|
CVE-2024-47048,0,0,425cce79ac1ff694ab4c7cef97a6df0f5610cb2bf223796f917dc53ac24edec5,2024-09-26T17:12:07.440000
|
||||||
CVE-2024-47049,0,0,9435c3feeabad953f768be0dab3a8c5de1fda327c2cd4383c7019bbd8d92ff47,2024-09-27T17:09:46.980000
|
CVE-2024-47049,0,0,9435c3feeabad953f768be0dab3a8c5de1fda327c2cd4383c7019bbd8d92ff47,2024-09-27T17:09:46.980000
|
||||||
@ -264870,7 +264875,7 @@ CVE-2024-4710,0,0,9c507813f9fc80a7b0290c71ebb56c5cafbe3613f57bf93e1120a9c56f5290
|
|||||||
CVE-2024-47107,0,0,7b3fd642f04bb4907359468180c5e80a149cba368c15d7fcad27657fede29875,2024-12-07T15:15:04.123000
|
CVE-2024-47107,0,0,7b3fd642f04bb4907359468180c5e80a149cba368c15d7fcad27657fede29875,2024-12-07T15:15:04.123000
|
||||||
CVE-2024-4711,0,0,e4ef71037ebae75f1c7783581ae71eaf15c6142551362f95bff0adb8f63f9b15,2024-11-21T09:43:25.710000
|
CVE-2024-4711,0,0,e4ef71037ebae75f1c7783581ae71eaf15c6142551362f95bff0adb8f63f9b15,2024-11-21T09:43:25.710000
|
||||||
CVE-2024-47115,0,0,b16da535b3da0b89524d7833c7b765d32fe2f7dd304b564264470c1871bdf405,2024-12-07T13:19:14.783000
|
CVE-2024-47115,0,0,b16da535b3da0b89524d7833c7b765d32fe2f7dd304b564264470c1871bdf405,2024-12-07T13:19:14.783000
|
||||||
CVE-2024-47117,1,1,9a433d1ba1da14ac03eff92d4b9d962f2572bcd84811d0eba8292b9cf923d82f,2024-12-10T14:30:44.400000
|
CVE-2024-47117,0,0,9a433d1ba1da14ac03eff92d4b9d962f2572bcd84811d0eba8292b9cf923d82f,2024-12-10T14:30:44.400000
|
||||||
CVE-2024-4712,0,0,1fed59bb7e8ad0e60ff127714cca3b30ddf28383821e6801d32e14d7ddccef6e,2024-11-21T09:43:25.850000
|
CVE-2024-4712,0,0,1fed59bb7e8ad0e60ff127714cca3b30ddf28383821e6801d32e14d7ddccef6e,2024-11-21T09:43:25.850000
|
||||||
CVE-2024-47121,0,0,346648e20973f21c82fabd4a08a632a55356bf3264a158afc57ac406e96c43c4,2024-11-01T20:39:20.677000
|
CVE-2024-47121,0,0,346648e20973f21c82fabd4a08a632a55356bf3264a158afc57ac406e96c43c4,2024-11-01T20:39:20.677000
|
||||||
CVE-2024-47122,0,0,7ba55296c1246880ecd41488ae0cfca0580aa596752d1a2853d946be717d540c,2024-10-17T18:15:05.480000
|
CVE-2024-47122,0,0,7ba55296c1246880ecd41488ae0cfca0580aa596752d1a2853d946be717d540c,2024-10-17T18:15:05.480000
|
||||||
@ -266428,7 +266433,7 @@ CVE-2024-4970,0,0,ceae782189e36ea72b2794d871ba0e98c5d8d6d33670b120902bfb4e771c4a
|
|||||||
CVE-2024-49701,0,0,faa8cd67d7f87e8b700116e3ea01c26a0bace35a674e83df64e802c479757838,2024-10-25T12:56:36.827000
|
CVE-2024-49701,0,0,faa8cd67d7f87e8b700116e3ea01c26a0bace35a674e83df64e802c479757838,2024-10-25T12:56:36.827000
|
||||||
CVE-2024-49702,0,0,95504b65313eac7b0c032b66b56870b8b510aa5556c8e61dadfd6a9c41944713,2024-11-08T14:32:56.010000
|
CVE-2024-49702,0,0,95504b65313eac7b0c032b66b56870b8b510aa5556c8e61dadfd6a9c41944713,2024-11-08T14:32:56.010000
|
||||||
CVE-2024-49703,0,0,773f468dd20b89d6b077ffb05058547737a4c510a41e2a52930200811683b9b8,2024-10-25T12:56:07.750000
|
CVE-2024-49703,0,0,773f468dd20b89d6b077ffb05058547737a4c510a41e2a52930200811683b9b8,2024-10-25T12:56:07.750000
|
||||||
CVE-2024-49704,1,1,792d72be95c2e939aedb97abbd86d02c29dc7b2f79685bd8e5c6b05c8813f351,2024-12-10T14:30:44.573000
|
CVE-2024-49704,0,0,792d72be95c2e939aedb97abbd86d02c29dc7b2f79685bd8e5c6b05c8813f351,2024-12-10T14:30:44.573000
|
||||||
CVE-2024-4971,0,0,af7888c7a6b95d3e4defe90dd125614ce096832a5ff7e0a45c6fa9aa4416b987,2024-11-21T09:43:58.747000
|
CVE-2024-4971,0,0,af7888c7a6b95d3e4defe90dd125614ce096832a5ff7e0a45c6fa9aa4416b987,2024-11-21T09:43:58.747000
|
||||||
CVE-2024-4972,0,0,6d57573ddd08bf2299e1f6597809329f00babdc0f3ad1d5869880ad1a42cee17,2024-11-21T09:43:58.863000
|
CVE-2024-4972,0,0,6d57573ddd08bf2299e1f6597809329f00babdc0f3ad1d5869880ad1a42cee17,2024-11-21T09:43:58.863000
|
||||||
CVE-2024-4973,0,0,19ccbb7e67bd4c75d6b883a0abe41227afb09f5e151258438b28388488924a3a,2024-11-21T09:43:59.010000
|
CVE-2024-4973,0,0,19ccbb7e67bd4c75d6b883a0abe41227afb09f5e151258438b28388488924a3a,2024-11-21T09:43:59.010000
|
||||||
@ -266470,7 +266475,7 @@ CVE-2024-49805,0,0,7ffe3272417593fded7c1532e656178bffa9488f6e3f217560f596f3472e4
|
|||||||
CVE-2024-49806,0,0,482936de6637cf76dde54f51f1f52b121a6d4662a65fe5c43e3cc1abbc23e574,2024-11-29T17:15:08.627000
|
CVE-2024-49806,0,0,482936de6637cf76dde54f51f1f52b121a6d4662a65fe5c43e3cc1abbc23e574,2024-11-29T17:15:08.627000
|
||||||
CVE-2024-4983,0,0,eefedacb8523e31a6a187e2c5f1e853f41a668185e6ca18f1a2fa72cc91a9950,2024-11-21T09:44:00.070000
|
CVE-2024-4983,0,0,eefedacb8523e31a6a187e2c5f1e853f41a668185e6ca18f1a2fa72cc91a9950,2024-11-21T09:44:00.070000
|
||||||
CVE-2024-4984,0,0,40ebe34593a184b2b9329b2374e9578e3a0bebaa278e1231c45c34e446e4dc36,2024-11-21T09:44:00.193000
|
CVE-2024-4984,0,0,40ebe34593a184b2b9329b2374e9578e3a0bebaa278e1231c45c34e446e4dc36,2024-11-21T09:44:00.193000
|
||||||
CVE-2024-49849,1,1,a734f63b3c346e9305019614e5c9962cd96fa0fef40997474f61ddb0c157cb37,2024-12-10T14:30:44.780000
|
CVE-2024-49849,0,0,a734f63b3c346e9305019614e5c9962cd96fa0fef40997474f61ddb0c157cb37,2024-12-10T14:30:44.780000
|
||||||
CVE-2024-4985,0,0,24ca642ab1af582069f35187f63584eb56ac0072c100febf0fdf2dec3b3c9587,2024-11-21T09:44:00.330000
|
CVE-2024-4985,0,0,24ca642ab1af582069f35187f63584eb56ac0072c100febf0fdf2dec3b3c9587,2024-11-21T09:44:00.330000
|
||||||
CVE-2024-49850,0,0,b081475e1ca3af47ff915ab2d360bfee7d39229960d37f8c28496a17f22b8519,2024-10-22T16:12:14.193000
|
CVE-2024-49850,0,0,b081475e1ca3af47ff915ab2d360bfee7d39229960d37f8c28496a17f22b8519,2024-10-22T16:12:14.193000
|
||||||
CVE-2024-49851,0,0,70ac144994c89b2c32ac4cbb91bfa1b666a409fb43980ab032860a5d662dee07,2024-11-08T16:15:28.700000
|
CVE-2024-49851,0,0,70ac144994c89b2c32ac4cbb91bfa1b666a409fb43980ab032860a5d662dee07,2024-11-08T16:15:28.700000
|
||||||
@ -268059,7 +268064,7 @@ CVE-2024-52034,0,0,8072163119d29e3d7cc1af6d3ff22d184e9e2263ebc70094a6b8e6922599c
|
|||||||
CVE-2024-5204,0,0,861a03c6b8b38defa5d93991a4825262ae7b814b89fc2ffc1e32a59f04171e4e,2024-11-21T09:47:10.927000
|
CVE-2024-5204,0,0,861a03c6b8b38defa5d93991a4825262ae7b814b89fc2ffc1e32a59f04171e4e,2024-11-21T09:47:10.927000
|
||||||
CVE-2024-52043,0,0,e434d805f99fdc6c5e33568cd1a8288e62a5c6170cf35ff5cddabfded34908c6,2024-11-08T20:39:36.233000
|
CVE-2024-52043,0,0,e434d805f99fdc6c5e33568cd1a8288e62a5c6170cf35ff5cddabfded34908c6,2024-11-08T20:39:36.233000
|
||||||
CVE-2024-5205,0,0,23f687d8508f2ecb4f71db4183b652438c4bb3a68c03d14351c40e82c1576079,2024-11-21T09:47:11.033000
|
CVE-2024-5205,0,0,23f687d8508f2ecb4f71db4183b652438c4bb3a68c03d14351c40e82c1576079,2024-11-21T09:47:11.033000
|
||||||
CVE-2024-52051,1,1,8acceaf16f5843c2c444c19f98f27ef39bd722f58189359ba741e64a89cd171f,2024-12-10T14:30:44.957000
|
CVE-2024-52051,0,0,8acceaf16f5843c2c444c19f98f27ef39bd722f58189359ba741e64a89cd171f,2024-12-10T14:30:44.957000
|
||||||
CVE-2024-52052,0,0,5eeeac48f24ac467a2621d7950234ff504286fc9da5b2ff1ce8d348695057bf0,2024-11-21T23:15:04.520000
|
CVE-2024-52052,0,0,5eeeac48f24ac467a2621d7950234ff504286fc9da5b2ff1ce8d348695057bf0,2024-11-21T23:15:04.520000
|
||||||
CVE-2024-52053,0,0,634822104ec4d4af8aa9cf0854397b2e2ea6f5f55e9fc999886a29a44842f7b3,2024-11-21T23:15:05.387000
|
CVE-2024-52053,0,0,634822104ec4d4af8aa9cf0854397b2e2ea6f5f55e9fc999886a29a44842f7b3,2024-11-21T23:15:05.387000
|
||||||
CVE-2024-52054,0,0,9a2d2ec3a40a48770d9647f97127693cc6b0ef5932cb18c296471a466b60d1e3,2024-11-21T23:15:05.627000
|
CVE-2024-52054,0,0,9a2d2ec3a40a48770d9647f97127693cc6b0ef5932cb18c296471a466b60d1e3,2024-11-21T23:15:05.627000
|
||||||
@ -268361,17 +268366,17 @@ CVE-2024-52555,0,0,a3eb976a723323be3c4248982b8a2d466355a617b040f2b336f011db865bd
|
|||||||
CVE-2024-52558,0,0,2ada9f104f39fa7ff47b30d6f6d3023c890bde815409d4072ab82d26ecc71fbe,2024-12-06T18:15:26.007000
|
CVE-2024-52558,0,0,2ada9f104f39fa7ff47b30d6f6d3023c890bde815409d4072ab82d26ecc71fbe,2024-12-06T18:15:26.007000
|
||||||
CVE-2024-5256,0,0,351ec0133ebd6057956e3a32f156ca3c6d3a5e82f4f6d83d2ed56c2cf43e8b33,2024-11-21T09:47:17.300000
|
CVE-2024-5256,0,0,351ec0133ebd6057956e3a32f156ca3c6d3a5e82f4f6d83d2ed56c2cf43e8b33,2024-11-21T09:47:17.300000
|
||||||
CVE-2024-52564,0,0,18983955880ef907ed28cbb37a105d98746b8b276ab26ada4169cdb5d146ec41,2024-12-05T10:31:40.663000
|
CVE-2024-52564,0,0,18983955880ef907ed28cbb37a105d98746b8b276ab26ada4169cdb5d146ec41,2024-12-05T10:31:40.663000
|
||||||
CVE-2024-52565,0,1,b362c6e2c4d31b534af407257d8d3dfb1aa1554df898d59efa213d390e3fbbfe,2024-12-10T14:30:45.133000
|
CVE-2024-52565,0,0,b362c6e2c4d31b534af407257d8d3dfb1aa1554df898d59efa213d390e3fbbfe,2024-12-10T14:30:45.133000
|
||||||
CVE-2024-52566,0,1,17a84dc89ac3069d1f90787751ac58c5e2d97a5fd675d81c8b31ce27686cc0e2,2024-12-10T14:30:45.280000
|
CVE-2024-52566,0,0,17a84dc89ac3069d1f90787751ac58c5e2d97a5fd675d81c8b31ce27686cc0e2,2024-12-10T14:30:45.280000
|
||||||
CVE-2024-52567,0,1,fd381a3dddcbb62af32a2c67729f90a249582197f978211c7c707dbf4d33f8c9,2024-12-10T14:30:45.413000
|
CVE-2024-52567,0,0,fd381a3dddcbb62af32a2c67729f90a249582197f978211c7c707dbf4d33f8c9,2024-12-10T14:30:45.413000
|
||||||
CVE-2024-52568,0,1,fa1d7e5ab1453e8ce8fc6d74525cf759077c7cc45629bb0b94ce8e3e62e0c0b6,2024-12-10T14:30:45.557000
|
CVE-2024-52568,0,0,fa1d7e5ab1453e8ce8fc6d74525cf759077c7cc45629bb0b94ce8e3e62e0c0b6,2024-12-10T14:30:45.557000
|
||||||
CVE-2024-52569,0,1,4af82bc06f36fc89e632168ae15bbf2618bb6f0ed67e0b15f79e688eddd354f5,2024-12-10T14:30:45.690000
|
CVE-2024-52569,0,0,4af82bc06f36fc89e632168ae15bbf2618bb6f0ed67e0b15f79e688eddd354f5,2024-12-10T14:30:45.690000
|
||||||
CVE-2024-5257,0,0,63de8a02d92c9a92c70690e872ab84c98567821d29f750ce183ace844e1595c7,2024-11-21T09:47:17.443000
|
CVE-2024-5257,0,0,63de8a02d92c9a92c70690e872ab84c98567821d29f750ce183ace844e1595c7,2024-11-21T09:47:17.443000
|
||||||
CVE-2024-52570,0,1,feaa72db88252679f24425259a3a3e7391aee4d1ebf6c82602d1e496104872bb,2024-12-10T14:30:45.837000
|
CVE-2024-52570,0,0,feaa72db88252679f24425259a3a3e7391aee4d1ebf6c82602d1e496104872bb,2024-12-10T14:30:45.837000
|
||||||
CVE-2024-52571,0,1,26f20aea2cfcbc51472f8703de0c2a514740f60db1ffb8e995268a2d369c16e6,2024-12-10T14:30:45.963000
|
CVE-2024-52571,0,0,26f20aea2cfcbc51472f8703de0c2a514740f60db1ffb8e995268a2d369c16e6,2024-12-10T14:30:45.963000
|
||||||
CVE-2024-52572,0,1,6376707757e7137e4ed57cb6aa915c75f77a0c9d8f5dcf819a13dd807d60e570,2024-12-10T14:30:46.097000
|
CVE-2024-52572,0,0,6376707757e7137e4ed57cb6aa915c75f77a0c9d8f5dcf819a13dd807d60e570,2024-12-10T14:30:46.097000
|
||||||
CVE-2024-52573,0,1,8593682362497edb492d6ca4681e1b8433e1243c696d93c347c6182b3d337087,2024-12-10T14:30:46.227000
|
CVE-2024-52573,0,0,8593682362497edb492d6ca4681e1b8433e1243c696d93c347c6182b3d337087,2024-12-10T14:30:46.227000
|
||||||
CVE-2024-52574,0,1,4bf672ed2c2d31209cd79a7c8d6ac1ad4988a3958f507bd33b02c669bbaec7c0,2024-12-10T14:30:46.367000
|
CVE-2024-52574,0,0,4bf672ed2c2d31209cd79a7c8d6ac1ad4988a3958f507bd33b02c669bbaec7c0,2024-12-10T14:30:46.367000
|
||||||
CVE-2024-5258,0,0,0178fadd7e63b0945aad72105eff12425398bd2f163394358706186fe3bbed1b,2024-11-21T09:47:17.587000
|
CVE-2024-5258,0,0,0178fadd7e63b0945aad72105eff12425398bd2f163394358706186fe3bbed1b,2024-11-21T09:47:17.587000
|
||||||
CVE-2024-52581,0,0,332a882ee82bfce0a525dfee25d6489cb10f5c4433be26d4715ac553f5613d09,2024-11-25T14:15:07.077000
|
CVE-2024-52581,0,0,332a882ee82bfce0a525dfee25d6489cb10f5c4433be26d4715ac553f5613d09,2024-11-25T14:15:07.077000
|
||||||
CVE-2024-52582,0,0,1997f5832ca34e16f43886daed3491b2edf8ddc5e50506be9eb3832bdfaca64a,2024-11-19T21:57:32.967000
|
CVE-2024-52582,0,0,1997f5832ca34e16f43886daed3491b2edf8ddc5e50506be9eb3832bdfaca64a,2024-11-19T21:57:32.967000
|
||||||
@ -268514,7 +268519,7 @@ CVE-2024-5301,0,0,9944435231e4232deb9644b6756c62dd37aded32278d6910acfd86a9fca6bb
|
|||||||
CVE-2024-5302,0,0,82745a56882a5e93127da6843cc252c1f39f5e3b6031b0cf4b30203e7450051c,2024-11-21T09:47:23.453000
|
CVE-2024-5302,0,0,82745a56882a5e93127da6843cc252c1f39f5e3b6031b0cf4b30203e7450051c,2024-11-21T09:47:23.453000
|
||||||
CVE-2024-5303,0,0,3ed489db17064b2aff86e9a31b51d53d757813a529fdb6ed7379a772174cd7ec,2024-11-21T09:47:23.590000
|
CVE-2024-5303,0,0,3ed489db17064b2aff86e9a31b51d53d757813a529fdb6ed7379a772174cd7ec,2024-11-21T09:47:23.590000
|
||||||
CVE-2024-5304,0,0,220f673e6cb9d2e204d0cc75d5c684adf0f056bcbae146fb7d849c2cb8da986e,2024-11-21T09:47:23.727000
|
CVE-2024-5304,0,0,220f673e6cb9d2e204d0cc75d5c684adf0f056bcbae146fb7d849c2cb8da986e,2024-11-21T09:47:23.727000
|
||||||
CVE-2024-53041,1,1,1e0345d38b63f2a99c664fa5a3cbe81b1e56217ccfdfa008d8ceb0e237b3260e,2024-12-10T14:30:46.507000
|
CVE-2024-53041,0,0,1e0345d38b63f2a99c664fa5a3cbe81b1e56217ccfdfa008d8ceb0e237b3260e,2024-12-10T14:30:46.507000
|
||||||
CVE-2024-53042,0,0,d7e0d4c1a2c730be549db3ae70702c5a27a3ad932f1d5de3c69038d87b197c91,2024-11-27T21:09:40.700000
|
CVE-2024-53042,0,0,d7e0d4c1a2c730be549db3ae70702c5a27a3ad932f1d5de3c69038d87b197c91,2024-11-27T21:09:40.700000
|
||||||
CVE-2024-53043,0,0,61d4dd773e5eb447c74c7628c721835a8781adc0a67474dfa9134aae604c242f,2024-11-22T22:22:03.963000
|
CVE-2024-53043,0,0,61d4dd773e5eb447c74c7628c721835a8781adc0a67474dfa9134aae604c242f,2024-11-22T22:22:03.963000
|
||||||
CVE-2024-53044,0,0,13db87ec8352bc7d7a9e5edecc2ddf5bacb85c33a4ca911a96d3b6b927e39574,2024-11-27T16:40:06.963000
|
CVE-2024-53044,0,0,13db87ec8352bc7d7a9e5edecc2ddf5bacb85c33a4ca911a96d3b6b927e39574,2024-11-27T16:40:06.963000
|
||||||
@ -268632,7 +268637,7 @@ CVE-2024-5318,0,0,d3e6ab64f214a31e8be6483f947f606302a807960eeb0dcd1e3ac0fbb29dc9
|
|||||||
CVE-2024-5321,0,0,0f218b8b6fcc3fc0b4ccef7040ede5ee801dc8e00258e6450bd3f123b6e73ca4,2024-11-21T09:47:25.283000
|
CVE-2024-5321,0,0,0f218b8b6fcc3fc0b4ccef7040ede5ee801dc8e00258e6450bd3f123b6e73ca4,2024-11-21T09:47:25.283000
|
||||||
CVE-2024-5322,0,0,6e9032fa3deabc9be71dae1989b7f0a781e1608a9b8c8f048902e90e4caef6d4,2024-11-21T09:47:25.413000
|
CVE-2024-5322,0,0,6e9032fa3deabc9be71dae1989b7f0a781e1608a9b8c8f048902e90e4caef6d4,2024-11-21T09:47:25.413000
|
||||||
CVE-2024-5324,0,0,616d1ba80af339308061f2c79fb4da68886ab2b91b97eb35403d14df6efb4acc,2024-11-21T09:47:25.537000
|
CVE-2024-5324,0,0,616d1ba80af339308061f2c79fb4da68886ab2b91b97eb35403d14df6efb4acc,2024-11-21T09:47:25.537000
|
||||||
CVE-2024-53242,1,1,7b1d80eef3802b30008ebb8ee3eee2f52064342e6dc78ef74b31a36b1537b142,2024-12-10T14:30:46.700000
|
CVE-2024-53242,0,0,7b1d80eef3802b30008ebb8ee3eee2f52064342e6dc78ef74b31a36b1537b142,2024-12-10T14:30:46.700000
|
||||||
CVE-2024-5325,0,0,6fb157711d80f391f873772a3be62fe029a107c4c82e0f59ae798d9b15b764bd,2024-11-21T09:47:25.650000
|
CVE-2024-5325,0,0,6fb157711d80f391f873772a3be62fe029a107c4c82e0f59ae798d9b15b764bd,2024-11-21T09:47:25.650000
|
||||||
CVE-2024-53253,0,0,e465b741e355f1ce9ba45867c01a177432bba9be4e62dbf601e6676bd13fe6f1,2024-11-22T20:15:09.210000
|
CVE-2024-53253,0,0,e465b741e355f1ce9ba45867c01a177432bba9be4e62dbf601e6676bd13fe6f1,2024-11-22T20:15:09.210000
|
||||||
CVE-2024-53254,0,0,ee53e9b703f27318442647deb86c75e2def0aedf5170eb37f9fbf3bd5e2537ab,2024-11-27T18:15:18.060000
|
CVE-2024-53254,0,0,ee53e9b703f27318442647deb86c75e2def0aedf5170eb37f9fbf3bd5e2537ab,2024-11-27T18:15:18.060000
|
||||||
@ -268885,7 +268890,7 @@ CVE-2024-53824,0,0,cacff643e180235d604123615cc52f6b2ea1485fb2d03e2dfc7beecfeccda
|
|||||||
CVE-2024-53825,0,0,a935473ac9480ea7a4ce7e03aa3b09420e04eb2d14d6df25b05c05b7ca30b9d4,2024-12-06T14:15:24.937000
|
CVE-2024-53825,0,0,a935473ac9480ea7a4ce7e03aa3b09420e04eb2d14d6df25b05c05b7ca30b9d4,2024-12-06T14:15:24.937000
|
||||||
CVE-2024-53826,0,0,cbecbe1de7867711d8448c76cc0dadee1ddb6170f57b29bb3357f66e68cba06a,2024-12-06T14:15:25.077000
|
CVE-2024-53826,0,0,cbecbe1de7867711d8448c76cc0dadee1ddb6170f57b29bb3357f66e68cba06a,2024-12-06T14:15:25.077000
|
||||||
CVE-2024-5383,0,0,093acdd4201567d005275d52c1174349cc9fb95effb23b8b65de339d75e5f1d2,2024-11-21T09:47:32.963000
|
CVE-2024-5383,0,0,093acdd4201567d005275d52c1174349cc9fb95effb23b8b65de339d75e5f1d2,2024-11-21T09:47:32.963000
|
||||||
CVE-2024-53832,1,1,d5319c051d93938c512d53d904b1dbef4fa88b0e7db94b21b8cca1375be3ac12,2024-12-10T14:30:46.853000
|
CVE-2024-53832,0,0,d5319c051d93938c512d53d904b1dbef4fa88b0e7db94b21b8cca1375be3ac12,2024-12-10T14:30:46.853000
|
||||||
CVE-2024-5384,0,0,8d376a2ca7902f4602c393c8e22120c83f3a08831ccd742c2d440f44affa2cad,2024-11-21T09:47:33.103000
|
CVE-2024-5384,0,0,8d376a2ca7902f4602c393c8e22120c83f3a08831ccd742c2d440f44affa2cad,2024-11-21T09:47:33.103000
|
||||||
CVE-2024-53843,0,0,c44c99ef4402ecef78ac8c1b113f8d73cb64b635f31482723ce78cbb921e8259,2024-11-26T00:15:07.430000
|
CVE-2024-53843,0,0,c44c99ef4402ecef78ac8c1b113f8d73cb64b635f31482723ce78cbb921e8259,2024-11-26T00:15:07.430000
|
||||||
CVE-2024-53844,0,0,b0e1409716740a79089a588f0454ff38097ac555d54020c4c21a59c02d9d74a3,2024-11-26T19:15:31.463000
|
CVE-2024-53844,0,0,b0e1409716740a79089a588f0454ff38097ac555d54020c4c21a59c02d9d74a3,2024-11-26T19:15:31.463000
|
||||||
@ -268924,7 +268929,7 @@ CVE-2024-53913,0,0,f29eb48b3cfa8a7826d6fe7adbaf2bce87f89a85e25f58c699946a9277a37
|
|||||||
CVE-2024-53914,0,0,e050babf2e1b2fa263009de5875d826c83245812f4e7813c8d122d68332fd2a8,2024-11-29T20:55:35.293000
|
CVE-2024-53914,0,0,e050babf2e1b2fa263009de5875d826c83245812f4e7813c8d122d68332fd2a8,2024-11-29T20:55:35.293000
|
||||||
CVE-2024-53915,0,0,4605c52b83221ae0e3cdd10a9aad63d660542ba26783410343eed38f4ba2ed72,2024-11-29T20:55:43.810000
|
CVE-2024-53915,0,0,4605c52b83221ae0e3cdd10a9aad63d660542ba26783410343eed38f4ba2ed72,2024-11-29T20:55:43.810000
|
||||||
CVE-2024-53916,0,0,7468505b685e2683f2dc63bcafcc06191cbfc06c9d73791b1fbe8d39601d18c5,2024-12-04T22:15:22.840000
|
CVE-2024-53916,0,0,7468505b685e2683f2dc63bcafcc06191cbfc06c9d73791b1fbe8d39601d18c5,2024-12-04T22:15:22.840000
|
||||||
CVE-2024-53919,0,0,6cbcd518b1e1f9a5fb4869614bc06933366b57d9807437a88c8a97dc209fb0b6,2024-12-10T02:15:17.350000
|
CVE-2024-53919,0,1,f9d3ec2c62de8ce2db7f469160ee567deb8e836d389fc46743e420f3a3f8a241,2024-12-10T16:15:23.817000
|
||||||
CVE-2024-5392,0,0,6be8d0f4dc47d176328e011891583492739b095279f214844a12528377250390,2024-11-21T09:47:33.860000
|
CVE-2024-5392,0,0,6be8d0f4dc47d176328e011891583492739b095279f214844a12528377250390,2024-11-21T09:47:33.860000
|
||||||
CVE-2024-53920,0,0,a291ce56b664f688b2d6f36f512bf0b737cf558f95f0af0d70bd1b3310ba1ecf,2024-12-02T17:15:13.913000
|
CVE-2024-53920,0,0,a291ce56b664f688b2d6f36f512bf0b737cf558f95f0af0d70bd1b3310ba1ecf,2024-12-02T17:15:13.913000
|
||||||
CVE-2024-53921,0,0,80ba8805361036f43b4514262b685ccd25900644ea805da6dca5ed5b14f2db17,2024-12-03T20:15:16.153000
|
CVE-2024-53921,0,0,80ba8805361036f43b4514262b685ccd25900644ea805da6dca5ed5b14f2db17,2024-12-03T20:15:16.153000
|
||||||
@ -268966,7 +268971,7 @@ CVE-2024-54001,0,0,045e80f770794ebace72678238e7eba8e7d1da90cac59175504e695765cee
|
|||||||
CVE-2024-54002,0,0,7c5a00df1d470c32b9eac42d93309bb19614d9762fa0f049a771979bb98949b7,2024-12-04T16:15:26.537000
|
CVE-2024-54002,0,0,7c5a00df1d470c32b9eac42d93309bb19614d9762fa0f049a771979bb98949b7,2024-12-04T16:15:26.537000
|
||||||
CVE-2024-54003,0,0,b632b439005206974a2b4ec6ab08a78e134e0c09d892996aec7289d7221f0377,2024-11-27T20:15:26.133000
|
CVE-2024-54003,0,0,b632b439005206974a2b4ec6ab08a78e134e0c09d892996aec7289d7221f0377,2024-11-27T20:15:26.133000
|
||||||
CVE-2024-54004,0,0,5d94a9bc2fe383b10883d5f21fb711b04368ee28bef8377081c80a039d1c1dee,2024-11-27T19:15:33.723000
|
CVE-2024-54004,0,0,5d94a9bc2fe383b10883d5f21fb711b04368ee28bef8377081c80a039d1c1dee,2024-11-27T19:15:33.723000
|
||||||
CVE-2024-54005,1,1,78bbd546deba4e2b14f99ce80711c725e32521468135821d5bfe1062b9007f78,2024-12-10T14:30:47.037000
|
CVE-2024-54005,0,0,78bbd546deba4e2b14f99ce80711c725e32521468135821d5bfe1062b9007f78,2024-12-10T14:30:47.037000
|
||||||
CVE-2024-54014,0,0,9895136be901bda6024d3c86fc774e344b5ffa93f0cfe6e13e8990c6229717ed,2024-12-05T03:15:14.530000
|
CVE-2024-54014,0,0,9895136be901bda6024d3c86fc774e344b5ffa93f0cfe6e13e8990c6229717ed,2024-12-05T03:15:14.530000
|
||||||
CVE-2024-5402,0,0,ff0d9bb22ac0a71984c61b65bae28749f481f4dd7d54b4eb8642f168357fe194,2024-11-21T09:47:34.947000
|
CVE-2024-5402,0,0,ff0d9bb22ac0a71984c61b65bae28749f481f4dd7d54b4eb8642f168357fe194,2024-11-21T09:47:34.947000
|
||||||
CVE-2024-5403,0,0,f4e58d907f2a672c85e38960e3074ec1cb3261646ec2ccae3d1a32d0c95159be,2024-11-21T09:47:35.097000
|
CVE-2024-5403,0,0,f4e58d907f2a672c85e38960e3074ec1cb3261646ec2ccae3d1a32d0c95159be,2024-11-21T09:47:35.097000
|
||||||
@ -268976,10 +268981,10 @@ CVE-2024-5406,0,0,5db0f501f7c712d4bcce798425460b3472165eeef82fd225689429d234120e
|
|||||||
CVE-2024-5407,0,0,e082637321598f3dc8c3c9e1760b81a1e1197c4d13cd58fed3245c37f0bb71c9,2024-11-21T09:47:35.567000
|
CVE-2024-5407,0,0,e082637321598f3dc8c3c9e1760b81a1e1197c4d13cd58fed3245c37f0bb71c9,2024-11-21T09:47:35.567000
|
||||||
CVE-2024-5408,0,0,0b23a712a85d13fef48f02294d854672174790bd624dfee1416450ccef66434a,2024-11-21T09:47:35.690000
|
CVE-2024-5408,0,0,0b23a712a85d13fef48f02294d854672174790bd624dfee1416450ccef66434a,2024-11-21T09:47:35.690000
|
||||||
CVE-2024-5409,0,0,f7df79bf8c405f523130badde3800a80499e2a2f05cefac143617aad785ef5de,2024-11-21T09:47:35.810000
|
CVE-2024-5409,0,0,f7df79bf8c405f523130badde3800a80499e2a2f05cefac143617aad785ef5de,2024-11-21T09:47:35.810000
|
||||||
CVE-2024-54091,1,1,d3d3ef567bc07203eacd243364831a07a307a7b442281f775f6be9f7c62bf73c,2024-12-10T14:30:47.193000
|
CVE-2024-54091,0,0,d3d3ef567bc07203eacd243364831a07a307a7b442281f775f6be9f7c62bf73c,2024-12-10T14:30:47.193000
|
||||||
CVE-2024-54093,1,1,c9952f718b9dee5ade98198ba738919650786fa00e81e0f00fb78cc1b9473a29,2024-12-10T14:30:47.350000
|
CVE-2024-54093,0,0,c9952f718b9dee5ade98198ba738919650786fa00e81e0f00fb78cc1b9473a29,2024-12-10T14:30:47.350000
|
||||||
CVE-2024-54094,1,1,694ba54d9708cc1a645dcf1348a2fcb0fdf3ec8538eee26d6c1d91de386dfffb,2024-12-10T14:30:47.507000
|
CVE-2024-54094,0,0,694ba54d9708cc1a645dcf1348a2fcb0fdf3ec8538eee26d6c1d91de386dfffb,2024-12-10T14:30:47.507000
|
||||||
CVE-2024-54095,1,1,0fd9f2382bb077e34770785fba7450b0fb33d7127731375f559f57743667fedd,2024-12-10T14:30:47.660000
|
CVE-2024-54095,0,0,0fd9f2382bb077e34770785fba7450b0fb33d7127731375f559f57743667fedd,2024-12-10T14:30:47.660000
|
||||||
CVE-2024-5410,0,0,cce7b181ee3076dc24a31460b418b1921efa7dac4bb8604c266edd1c195e07b4,2024-11-21T09:47:35.930000
|
CVE-2024-5410,0,0,cce7b181ee3076dc24a31460b418b1921efa7dac4bb8604c266edd1c195e07b4,2024-11-21T09:47:35.930000
|
||||||
CVE-2024-5411,0,0,e795bc7b322ce716766b807c3b3b3802815a82a4cbe62ad72330624f242dbba1,2024-11-21T09:47:36.060000
|
CVE-2024-5411,0,0,e795bc7b322ce716766b807c3b3b3802815a82a4cbe62ad72330624f242dbba1,2024-11-21T09:47:36.060000
|
||||||
CVE-2024-5412,0,0,30cdd8d4ddc0c145e9e904e4cec9f4dfba9de81bde8e7e7c7fe70aa069b0dcac,2024-09-06T18:07:43.940000
|
CVE-2024-5412,0,0,30cdd8d4ddc0c145e9e904e4cec9f4dfba9de81bde8e7e7c7fe70aa069b0dcac,2024-09-06T18:07:43.940000
|
||||||
@ -269006,6 +269011,7 @@ CVE-2024-54147,0,0,fcfaafd8b20a2c5f3f6aecd79337dff48e6ae2e7181dc64fc904d2ab4ea1a
|
|||||||
CVE-2024-54149,0,0,dc5b23d9a4d416b4c98eac99c54034dcebad51081e31d0ade21547258dbae39b,2024-12-09T21:15:08.600000
|
CVE-2024-54149,0,0,dc5b23d9a4d416b4c98eac99c54034dcebad51081e31d0ade21547258dbae39b,2024-12-09T21:15:08.600000
|
||||||
CVE-2024-5415,0,0,74eb25978de9e4a46066392a5c5808fd8612c02bf2d68d6ca3b049d5a2727bf3,2024-11-21T09:47:36.587000
|
CVE-2024-5415,0,0,74eb25978de9e4a46066392a5c5808fd8612c02bf2d68d6ca3b049d5a2727bf3,2024-11-21T09:47:36.587000
|
||||||
CVE-2024-54151,0,0,98ab878ecad07d996dbd68e920a1e507c8deb8351fe6b759469ad368fa483462,2024-12-09T21:15:08.753000
|
CVE-2024-54151,0,0,98ab878ecad07d996dbd68e920a1e507c8deb8351fe6b759469ad368fa483462,2024-12-09T21:15:08.753000
|
||||||
|
CVE-2024-54152,1,1,4bcf76aea3431141fc5efccbe5a31af9fff73fd6b6d323d272d1f3ba7de921ad,2024-12-10T16:15:23.947000
|
||||||
CVE-2024-54153,0,0,c29012def2c5ac24434214b7603f1646c45a2cdd2239c37ce825446301614236,2024-12-04T12:15:19.853000
|
CVE-2024-54153,0,0,c29012def2c5ac24434214b7603f1646c45a2cdd2239c37ce825446301614236,2024-12-04T12:15:19.853000
|
||||||
CVE-2024-54154,0,0,76050c8799b790ecdccc98071593d36c99d7c13c97b41bc2ac908cace65d646b,2024-12-04T12:15:20.047000
|
CVE-2024-54154,0,0,76050c8799b790ecdccc98071593d36c99d7c13c97b41bc2ac908cace65d646b,2024-12-04T12:15:20.047000
|
||||||
CVE-2024-54155,0,0,16c7ad428747a68496c8d8073118d7a1fd49d9b325dffe11220faa0ccdf4be12,2024-12-04T12:15:20.190000
|
CVE-2024-54155,0,0,16c7ad428747a68496c8d8073118d7a1fd49d9b325dffe11220faa0ccdf4be12,2024-12-04T12:15:20.190000
|
||||||
@ -269110,6 +269116,7 @@ CVE-2024-54747,0,0,9f0fca61fa6eccf9336f8eaa6d72537b4bbb8d5e3fd08e6c628143c0e6117
|
|||||||
CVE-2024-54749,0,0,9843b013f360d8fb3ff95bfdcdfc0bf5c3f632d1d8b1b0bbd6fc777fe9950e5c,2024-12-07T23:15:34.810000
|
CVE-2024-54749,0,0,9843b013f360d8fb3ff95bfdcdfc0bf5c3f632d1d8b1b0bbd6fc777fe9950e5c,2024-12-07T23:15:34.810000
|
||||||
CVE-2024-5475,0,0,3f93fbbe9009c236ea2c6da72827f7bd871ace2e1ffd3b439453d8900914ef7f,2024-11-21T09:47:45.480000
|
CVE-2024-5475,0,0,3f93fbbe9009c236ea2c6da72827f7bd871ace2e1ffd3b439453d8900914ef7f,2024-11-21T09:47:45.480000
|
||||||
CVE-2024-54750,0,0,a2b9bd793ac60105835f796550f4eca54ad7139b40ad2fdf283a28d5ab7647fe,2024-12-09T23:15:34.020000
|
CVE-2024-54750,0,0,a2b9bd793ac60105835f796550f4eca54ad7139b40ad2fdf283a28d5ab7647fe,2024-12-09T23:15:34.020000
|
||||||
|
CVE-2024-54751,1,1,eafdc7b1014ea51ab8254f6cbe6e3e8f9681b4f56cd2e42b92a9bec5906eac49,2024-12-10T15:15:08.020000
|
||||||
CVE-2024-5478,0,0,ceb048e006a964dbf511019dec939d920d262ad6c1300b540d6e08688f53b8be,2024-11-21T09:47:45.637000
|
CVE-2024-5478,0,0,ceb048e006a964dbf511019dec939d920d262ad6c1300b540d6e08688f53b8be,2024-11-21T09:47:45.637000
|
||||||
CVE-2024-5479,0,0,f92bceb83a5a9014c15956c2e58b8be8249c2eaaa0c8984e346563da1cce7cef,2024-11-21T09:47:45.750000
|
CVE-2024-5479,0,0,f92bceb83a5a9014c15956c2e58b8be8249c2eaaa0c8984e346563da1cce7cef,2024-11-21T09:47:45.750000
|
||||||
CVE-2024-5480,0,0,dcddee05a122e48deec7dd054d03a98cfc3767234733af70ab63ade31364815f,2024-10-02T16:15:10.913000
|
CVE-2024-5480,0,0,dcddee05a122e48deec7dd054d03a98cfc3767234733af70ab63ade31364815f,2024-10-02T16:15:10.913000
|
||||||
@ -269125,9 +269132,9 @@ CVE-2024-5489,0,0,6c00a6a2badf83516471ea1d81b619bbe482cb4a54de89ffa7bd06f7fa1ffa
|
|||||||
CVE-2024-5490,0,0,7e66a0f19af78ba5ab311e474f6c7a834b406cb5857b42d263e55e1190767452,2024-08-27T14:36:10.033000
|
CVE-2024-5490,0,0,7e66a0f19af78ba5ab311e474f6c7a834b406cb5857b42d263e55e1190767452,2024-08-27T14:36:10.033000
|
||||||
CVE-2024-5491,0,0,e331b82e31ebdfe13500034914a1c37ca8ae8114dde41994ac12e59a5b4284ca,2024-11-21T09:47:47.017000
|
CVE-2024-5491,0,0,e331b82e31ebdfe13500034914a1c37ca8ae8114dde41994ac12e59a5b4284ca,2024-11-21T09:47:47.017000
|
||||||
CVE-2024-54918,0,0,6207e50428ffb71f4db4d780c6696f68398c7201661e4c4452376ecb0497a0fb,2024-12-09T19:15:15.707000
|
CVE-2024-54918,0,0,6207e50428ffb71f4db4d780c6696f68398c7201661e4c4452376ecb0497a0fb,2024-12-09T19:15:15.707000
|
||||||
CVE-2024-54919,0,0,bf5503c511b0bdeb0d2785fef49caf78c4e74e2df5225c68980b115d655f9c0f,2024-12-09T15:15:21.580000
|
CVE-2024-54919,0,1,3bc024e1a047082fdca7806b0ba5b2acc68c550bd19998b37204ca5025765138,2024-12-10T15:50:05.360000
|
||||||
CVE-2024-5492,0,0,bef41c141414e91a737f6b5c4fcaf83f2ee31e6e95a9e2405d6f4dc30a93092c,2024-11-21T09:47:47.140000
|
CVE-2024-5492,0,0,bef41c141414e91a737f6b5c4fcaf83f2ee31e6e95a9e2405d6f4dc30a93092c,2024-11-21T09:47:47.140000
|
||||||
CVE-2024-54920,0,0,304edbfed251a7f19279df5dea43c791a839cc38c1923ef46ef3af64699d1af6,2024-12-09T19:15:15.803000
|
CVE-2024-54920,0,1,e0ff812c1f95bed20dae279ccbe6840a2a70586b27f9b541b7f43952ea8bc2db,2024-12-10T15:41:01.480000
|
||||||
CVE-2024-54921,0,0,26331f94739652b96ec20d146cc4d21509a1a86a45117ca552a815bd9689e070,2024-12-09T19:15:15.940000
|
CVE-2024-54921,0,0,26331f94739652b96ec20d146cc4d21509a1a86a45117ca552a815bd9689e070,2024-12-09T19:15:15.940000
|
||||||
CVE-2024-54922,0,0,bf82f604b88736e7757768beab336f3a65d40416cac34cdcff67ae87398fb7dd,2024-12-09T19:15:16.050000
|
CVE-2024-54922,0,0,bf82f604b88736e7757768beab336f3a65d40416cac34cdcff67ae87398fb7dd,2024-12-09T19:15:16.050000
|
||||||
CVE-2024-54923,0,0,4f6445821868a967d7dd24ed0996dcc6370125b4f205ed519b93edd7522ce4a2,2024-12-09T19:15:16.137000
|
CVE-2024-54923,0,0,4f6445821868a967d7dd24ed0996dcc6370125b4f205ed519b93edd7522ce4a2,2024-12-09T19:15:16.137000
|
||||||
@ -269136,7 +269143,7 @@ CVE-2024-54925,0,0,e8fc0e673f76afd453f937fee588d6565e8390b5f63d2742f455c4e6fda77
|
|||||||
CVE-2024-54926,0,0,d207e0e4e1ea549cf8f234d7654c3876100ab3b038442c8d0dc74fd13d373f87,2024-12-09T17:15:09.810000
|
CVE-2024-54926,0,0,d207e0e4e1ea549cf8f234d7654c3876100ab3b038442c8d0dc74fd13d373f87,2024-12-09T17:15:09.810000
|
||||||
CVE-2024-54927,0,0,759b60e9f8f8dd1ecc31bf06a78046977a686288eb51ad9f6f01868104142d13,2024-12-09T19:15:16.463000
|
CVE-2024-54927,0,0,759b60e9f8f8dd1ecc31bf06a78046977a686288eb51ad9f6f01868104142d13,2024-12-09T19:15:16.463000
|
||||||
CVE-2024-54928,0,0,11c4f25e5ee144bd5092526b4d9c7d37e3576fc4b110a0276593844b83410ee6,2024-12-09T19:15:16.567000
|
CVE-2024-54928,0,0,11c4f25e5ee144bd5092526b4d9c7d37e3576fc4b110a0276593844b83410ee6,2024-12-09T19:15:16.567000
|
||||||
CVE-2024-54929,0,0,d94cf7eb96b8426121e4a80e08610af572f918c35c4473b2cc9e9b9437f4d3f3,2024-12-09T14:15:12.957000
|
CVE-2024-54929,0,1,028424391bfd0e6e1a80decba8ca8422fb184a112971073f186a5d0b3e71e96b,2024-12-10T15:47:10.800000
|
||||||
CVE-2024-5493,0,0,934df9c05abfa1e1b0f50d724dbce11e7e01bba7d9ae25f41fb3a41d6fcaa53b,2024-11-21T09:47:47.260000
|
CVE-2024-5493,0,0,934df9c05abfa1e1b0f50d724dbce11e7e01bba7d9ae25f41fb3a41d6fcaa53b,2024-11-21T09:47:47.260000
|
||||||
CVE-2024-54930,0,0,a6448590db82b15ece8ba1f5055d06c864c57d09b90a65b1cf9f6eac192d6ab5,2024-12-09T18:15:24.267000
|
CVE-2024-54930,0,0,a6448590db82b15ece8ba1f5055d06c864c57d09b90a65b1cf9f6eac192d6ab5,2024-12-09T18:15:24.267000
|
||||||
CVE-2024-54931,0,0,4bc2a80950e59cba6a1a96040fad30b45e8551ae5f4871e5bb58c4552553ce11,2024-12-09T19:15:16.677000
|
CVE-2024-54931,0,0,4bc2a80950e59cba6a1a96040fad30b45e8551ae5f4871e5bb58c4552553ce11,2024-12-09T19:15:16.677000
|
||||||
@ -269144,8 +269151,8 @@ CVE-2024-54932,0,0,3c73c5f584e1dd4a385e064a7bcd5eb3bdeabf421d3e900fc314c73bf0c97
|
|||||||
CVE-2024-54933,0,0,57c3f0caa0953bbad2cf65c9df51ab0a561a4ad7be49df764627846d55138e29,2024-12-09T18:15:24.387000
|
CVE-2024-54933,0,0,57c3f0caa0953bbad2cf65c9df51ab0a561a4ad7be49df764627846d55138e29,2024-12-09T18:15:24.387000
|
||||||
CVE-2024-54934,0,0,b305f5717c64529f287ec02c132f7990f3db15a40feac89298c6f232af77a9e1,2024-12-09T19:15:16.887000
|
CVE-2024-54934,0,0,b305f5717c64529f287ec02c132f7990f3db15a40feac89298c6f232af77a9e1,2024-12-09T19:15:16.887000
|
||||||
CVE-2024-54935,0,0,7ae3eac8389051a4549c9d290e35df66ff25da1e7eb7eb5c836dc18ddcabc0bc,2024-12-09T18:15:24.493000
|
CVE-2024-54935,0,0,7ae3eac8389051a4549c9d290e35df66ff25da1e7eb7eb5c836dc18ddcabc0bc,2024-12-09T18:15:24.493000
|
||||||
CVE-2024-54936,0,0,8af7bc3c9a149fe3250328b8257a5f4944cacfa3fbbc9907ae2b5acafd91ae77,2024-12-09T19:15:16.993000
|
CVE-2024-54936,0,1,36f7aa567b051a918bc8e0dc653ea84de962c61ac3cee07cfe24bf203371fa7f,2024-12-10T15:47:25.360000
|
||||||
CVE-2024-54937,0,0,312b4a37fa3077036ba5d69390e81c3676cc63d0ee2244761932e8c35d7b3985,2024-12-09T14:15:13.303000
|
CVE-2024-54937,0,1,c012c89188aeac66e520338a1b1dc00110f731715e45aee0d68c2e27bf5f871e,2024-12-10T15:50:13.957000
|
||||||
CVE-2024-54938,0,0,be878c2e9f1d408774f7225e6a40d037072cbddefb232c5ebf67c61bd6d37336,2024-12-09T19:15:17.137000
|
CVE-2024-54938,0,0,be878c2e9f1d408774f7225e6a40d037072cbddefb232c5ebf67c61bd6d37336,2024-12-09T19:15:17.137000
|
||||||
CVE-2024-5494,0,0,8cf1519a61ea4a6a4f006eea5f9156b6b849d9688fc3df3baf2171897301c8ac,2024-11-21T09:47:47.450000
|
CVE-2024-5494,0,0,8cf1519a61ea4a6a4f006eea5f9156b6b849d9688fc3df3baf2171897301c8ac,2024-11-21T09:47:47.450000
|
||||||
CVE-2024-5495,0,0,e8211ab29f4239a9e0c9017a1df13982e259112697e44dda84f6d2c28e9245ea,2024-11-21T09:47:48.493000
|
CVE-2024-5495,0,0,e8211ab29f4239a9e0c9017a1df13982e259112697e44dda84f6d2c28e9245ea,2024-11-21T09:47:48.493000
|
||||||
@ -269205,6 +269212,7 @@ CVE-2024-5551,0,0,7ca1b2f3592d8c197217d4f6bb2a217c73a396396bc14275921b16391f9719
|
|||||||
CVE-2024-5552,0,0,948d6d5339e40bf52a297a53b027f97cabc4938d9f426267efe19c3ca8d00dfb,2024-11-21T09:47:54.927000
|
CVE-2024-5552,0,0,948d6d5339e40bf52a297a53b027f97cabc4938d9f426267efe19c3ca8d00dfb,2024-11-21T09:47:54.927000
|
||||||
CVE-2024-5553,0,0,c6aeec952a2778be27c1792a1d1c97b8ff8c01ca6ed08226c6b506a6f771b767,2024-11-21T09:47:55.040000
|
CVE-2024-5553,0,0,c6aeec952a2778be27c1792a1d1c97b8ff8c01ca6ed08226c6b506a6f771b767,2024-11-21T09:47:55.040000
|
||||||
CVE-2024-5554,0,0,3fb8d13bac6e351fa1470fa96b8178263946ef86d2aae872feb00193d95f3ac4,2024-11-21T09:47:55.160000
|
CVE-2024-5554,0,0,3fb8d13bac6e351fa1470fa96b8178263946ef86d2aae872feb00193d95f3ac4,2024-11-21T09:47:55.160000
|
||||||
|
CVE-2024-55544,1,1,acc7da64e57f37b90ae9315fa762b1b3200291097afc74983a10abedec306089,2024-12-10T16:15:24.107000
|
||||||
CVE-2024-5555,0,0,742073dac4de00aad4cb6df58c8d366b01298901468c1f8f2b3d987b01395142,2024-11-21T09:47:55.300000
|
CVE-2024-5555,0,0,742073dac4de00aad4cb6df58c8d366b01298901468c1f8f2b3d987b01395142,2024-11-21T09:47:55.300000
|
||||||
CVE-2024-5556,0,0,f573f07f74091c9ef49ab63e55c790d8f661c071a22a95c82ecfdf6c6886287c,2024-08-27T14:36:53.273000
|
CVE-2024-5556,0,0,f573f07f74091c9ef49ab63e55c790d8f661c071a22a95c82ecfdf6c6886287c,2024-08-27T14:36:53.273000
|
||||||
CVE-2024-55560,0,0,8ded767c4c0f73c31717fdba1e26cc9c22e0d2990356bc72ffccdc44c7980958,2024-12-09T16:15:22.750000
|
CVE-2024-55560,0,0,8ded767c4c0f73c31717fdba1e26cc9c22e0d2990356bc72ffccdc44c7980958,2024-12-09T16:15:22.750000
|
||||||
@ -269214,11 +269222,11 @@ CVE-2024-55565,0,0,b2313ae44da999d8fc4520a410050c1fd6fff1d9541329ab2ea86f782d8cd
|
|||||||
CVE-2024-55566,0,0,cc8f9a9eac78b44e982dc79609c73b93636b40b02e823d798c83261284bf0a10,2024-12-09T02:15:19.720000
|
CVE-2024-55566,0,0,cc8f9a9eac78b44e982dc79609c73b93636b40b02e823d798c83261284bf0a10,2024-12-09T02:15:19.720000
|
||||||
CVE-2024-5557,0,0,09bbd8b47f01ef9851d897d35b7273fae6e6c153562df19beb41c55eeb7521a0,2024-11-21T09:47:55.560000
|
CVE-2024-5557,0,0,09bbd8b47f01ef9851d897d35b7273fae6e6c153562df19beb41c55eeb7521a0,2024-11-21T09:47:55.560000
|
||||||
CVE-2024-55578,0,0,20c731157c69055e7769ca27d0621e2d376edcf0d0159177c1cfedd63f521740,2024-12-09T03:15:04.530000
|
CVE-2024-55578,0,0,20c731157c69055e7769ca27d0621e2d376edcf0d0159177c1cfedd63f521740,2024-12-09T03:15:04.530000
|
||||||
CVE-2024-55579,0,0,d4dcd9ce953cd587b5da850c1ce43b8deb42005ab9d3feceb72cd5f7325507e2,2024-12-09T03:15:05.197000
|
CVE-2024-55579,0,1,eb7b97c3360bce570eb740843f88f428eb8ed07ac934bdc24aaa75a35aac660f,2024-12-10T15:15:08.163000
|
||||||
CVE-2024-5558,0,0,b9640ac59698561d1e2153bd708b9d8ca2d328fcb61a159842590b547b4c1a0f,2024-11-21T09:47:55.700000
|
CVE-2024-5558,0,0,b9640ac59698561d1e2153bd708b9d8ca2d328fcb61a159842590b547b4c1a0f,2024-11-21T09:47:55.700000
|
||||||
CVE-2024-55580,0,0,23d1d0ce78dee9055e27646456d6f5dae42c71f66b9dcde2db05efdab828343a,2024-12-09T03:15:05.400000
|
CVE-2024-55580,0,1,d0db8db8caa9064b5ccfd1ebfcb70a56a05a77720b165abb2a708efdd1b5b12c,2024-12-10T15:15:08.300000
|
||||||
CVE-2024-55582,0,0,3c23376685adf2edae29527c3668429e6b653ce512d692f8394663104b24d5b7,2024-12-09T03:15:05.550000
|
CVE-2024-55582,0,0,3c23376685adf2edae29527c3668429e6b653ce512d692f8394663104b24d5b7,2024-12-09T03:15:05.550000
|
||||||
CVE-2024-55586,1,1,860678fa3c0144fa42a7d6126c9d280c8ece9bce59d81dfc5db5a9d68f6ae04f,2024-12-10T14:30:47.813000
|
CVE-2024-55586,0,0,860678fa3c0144fa42a7d6126c9d280c8ece9bce59d81dfc5db5a9d68f6ae04f,2024-12-10T14:30:47.813000
|
||||||
CVE-2024-5559,0,0,da875044adc3709281edfed6e696b593f02a48923f7270d2350dbdeb9c3f0186,2024-11-21T09:47:55.840000
|
CVE-2024-5559,0,0,da875044adc3709281edfed6e696b593f02a48923f7270d2350dbdeb9c3f0186,2024-11-21T09:47:55.840000
|
||||||
CVE-2024-5560,0,0,5aa7f1759c9eb53992bc8fa45515cc25adc477b89cd6554f8c0736d42239dd24,2024-11-21T09:47:55.983000
|
CVE-2024-5560,0,0,5aa7f1759c9eb53992bc8fa45515cc25adc477b89cd6554f8c0736d42239dd24,2024-11-21T09:47:55.983000
|
||||||
CVE-2024-55601,0,0,89175adefd85ee52b8d0660bf5cffaad0818c3ee1a9c4ccd9c1b1dad82da5932,2024-12-09T22:15:23.100000
|
CVE-2024-55601,0,0,89175adefd85ee52b8d0660bf5cffaad0818c3ee1a9c4ccd9c1b1dad82da5932,2024-12-09T22:15:23.100000
|
||||||
@ -269312,7 +269320,7 @@ CVE-2024-5656,0,0,ba99339cfecc1c5fdb0f6d1bb26f06bfe70b58ff628ceb5bd66c459a2628a6
|
|||||||
CVE-2024-5657,0,0,322b989a97af9a632a310787c45ccef95cbff8f0006f11abe6348fcd1668034b,2024-11-21T09:48:06.280000
|
CVE-2024-5657,0,0,322b989a97af9a632a310787c45ccef95cbff8f0006f11abe6348fcd1668034b,2024-11-21T09:48:06.280000
|
||||||
CVE-2024-5658,0,0,7e7462fc3515e519516e2f809c98e13e2106352e6aac99c565fb770e189dd063,2024-11-21T09:48:06.413000
|
CVE-2024-5658,0,0,7e7462fc3515e519516e2f809c98e13e2106352e6aac99c565fb770e189dd063,2024-11-21T09:48:06.413000
|
||||||
CVE-2024-5659,0,0,83e7687f93b86419198f1683634dd14733df87a0c466715b2e7e79370f69ac01,2024-11-21T09:48:06.543000
|
CVE-2024-5659,0,0,83e7687f93b86419198f1683634dd14733df87a0c466715b2e7e79370f69ac01,2024-11-21T09:48:06.543000
|
||||||
CVE-2024-5660,1,1,eb5bbf2beb23a9bfa3f917607093cf8898bbcbcedddc583c8ef9cea625cd7c43,2024-12-10T14:30:47.963000
|
CVE-2024-5660,0,0,eb5bbf2beb23a9bfa3f917607093cf8898bbcbcedddc583c8ef9cea625cd7c43,2024-12-10T14:30:47.963000
|
||||||
CVE-2024-5661,0,0,7d090de96660a134ff2e3cb7262fde0b3d927ce5a88611486b37761a6a2d78a0,2024-11-21T09:48:06.673000
|
CVE-2024-5661,0,0,7d090de96660a134ff2e3cb7262fde0b3d927ce5a88611486b37761a6a2d78a0,2024-11-21T09:48:06.673000
|
||||||
CVE-2024-5662,0,0,a32230f368c985ce000177685318420ae12365dafb7b142a133da07f0e3fd986,2024-11-21T09:48:06.860000
|
CVE-2024-5662,0,0,a32230f368c985ce000177685318420ae12365dafb7b142a133da07f0e3fd986,2024-11-21T09:48:06.860000
|
||||||
CVE-2024-5663,0,0,3d93cfa6260123c05a0fe5dd837778ab353045f85b9b96941dd647b061b7390d,2024-11-21T09:48:06.970000
|
CVE-2024-5663,0,0,3d93cfa6260123c05a0fe5dd837778ab353045f85b9b96941dd647b061b7390d,2024-11-21T09:48:06.970000
|
||||||
@ -270389,7 +270397,7 @@ CVE-2024-6867,0,0,f84c10fb0b3e922a2d9607fbc73765047e3afa593511cbb933213d24229f89
|
|||||||
CVE-2024-6868,0,0,f210259d3543fcb593fccecbc0e6eb045a386b1a398b95f0ab9a8cd25681e2e5,2024-11-13T14:43:33.037000
|
CVE-2024-6868,0,0,f210259d3543fcb593fccecbc0e6eb045a386b1a398b95f0ab9a8cd25681e2e5,2024-11-13T14:43:33.037000
|
||||||
CVE-2024-6869,0,0,5da7f1d5a803e61570f3ccb266fb7a93615aba312077a4b51fa5d450f687e612,2024-08-08T13:04:18.753000
|
CVE-2024-6869,0,0,5da7f1d5a803e61570f3ccb266fb7a93615aba312077a4b51fa5d450f687e612,2024-08-08T13:04:18.753000
|
||||||
CVE-2024-6870,0,0,512ada6d68695bc85c4b69e712bcee3cd9620adf7839b3b0f80ef395f84fa386,2024-09-27T00:52:03.737000
|
CVE-2024-6870,0,0,512ada6d68695bc85c4b69e712bcee3cd9620adf7839b3b0f80ef395f84fa386,2024-09-27T00:52:03.737000
|
||||||
CVE-2024-6871,0,0,62b4f21149e2a8260cf63ed4f5503869967ec2da0c1e6e2115b3b198f0b9051f,2024-11-22T22:15:15.173000
|
CVE-2024-6871,0,1,b34e9f2b4a834bb6336a96d89d61d9ba62c1c9856c79f2aa9820786000fa4686,2024-12-10T16:49:59.447000
|
||||||
CVE-2024-6872,0,0,42063b50611098a5cf99f683451112033abc1a0b2fd0c82f1be0ad9c99565b9f,2024-08-05T12:41:45.957000
|
CVE-2024-6872,0,0,42063b50611098a5cf99f683451112033abc1a0b2fd0c82f1be0ad9c99565b9f,2024-08-05T12:41:45.957000
|
||||||
CVE-2024-6873,0,0,66032352187ac3102456222340c0088c415031356cb09efb45febbda4049aae7,2024-08-01T16:45:25.400000
|
CVE-2024-6873,0,0,66032352187ac3102456222340c0088c415031356cb09efb45febbda4049aae7,2024-08-01T16:45:25.400000
|
||||||
CVE-2024-6874,0,0,5916f64034c8308163a7dbd0c1ed58ecc18b2d29d1441e93e279e717e00b22b6,2024-11-21T09:50:26.493000
|
CVE-2024-6874,0,0,5916f64034c8308163a7dbd0c1ed58ecc18b2d29d1441e93e279e717e00b22b6,2024-11-21T09:50:26.493000
|
||||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user