mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
Auto-Update: 2024-07-29T23:55:17.408919+00:00
This commit is contained in:
parent
064d78fdcf
commit
4389ef6f66
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-27952",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2023-05-08T20:15:18.157",
|
||||
"lastModified": "2023-07-27T04:15:19.543",
|
||||
"lastModified": "2024-07-29T22:15:02.630",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -72,6 +72,10 @@
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214119",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2023-38709",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-04-04T20:15:08.047",
|
||||
"lastModified": "2024-06-10T17:16:12.647",
|
||||
"lastModified": "2024-07-29T22:15:02.800",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Faulty input validation in the core of Apache allows malicious or exploitable backend/content generators to split HTTP responses.\n\nThis issue affects Apache HTTP Server: through 2.4.58.\n"
|
||||
"value": "Faulty input validation in the core of Apache allows malicious or exploitable backend/content generators to split HTTP responses.\n\nThis issue affects Apache HTTP Server: through 2.4.58."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -44,6 +44,10 @@
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240415-0013/",
|
||||
"source": "security@apache.org"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214119",
|
||||
"source": "security@apache.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-38823",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-11-20T20:15:07.357",
|
||||
"lastModified": "2023-11-28T22:02:33.013",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-07-29T22:15:03.200",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -190,12 +190,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/nhtri2003gmail/CVE_report/blob/master/CVE-2023-38823.md",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
"url": "https://github.com/johnathanhuutri/CVE_report/blob/master/CVE-2023-38823/README.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-45249",
|
||||
"sourceIdentifier": "security@acronis.com",
|
||||
"published": "2024-07-24T14:15:04.867",
|
||||
"lastModified": "2024-07-26T12:48:15.370",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-07-29T23:15:09.877",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -136,6 +136,10 @@
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.securityweek.com/acronis-product-vulnerability-exploited-in-the-wild/",
|
||||
"source": "security@acronis.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-52356",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-01-25T20:15:39.063",
|
||||
"lastModified": "2024-03-11T13:15:52.753",
|
||||
"lastModified": "2024-07-29T22:15:03.340",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -153,6 +153,38 @@
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00011.html",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214116",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214117",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214118",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214119",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214120",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214122",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214123",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214124",
|
||||
"source": "secalert@redhat.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-6277",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-11-24T19:15:07.643",
|
||||
"lastModified": "2024-01-19T16:15:11.057",
|
||||
"lastModified": "2024-07-29T22:15:03.530",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -186,6 +186,38 @@
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240119-0002/",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214116",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214117",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214118",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214119",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214120",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214122",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214123",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214124",
|
||||
"source": "secalert@redhat.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-2004",
|
||||
"sourceIdentifier": "2499f714-1537-4658-8207-48ae4bb9eae9",
|
||||
"published": "2024-03-27T08:15:41.173",
|
||||
"lastModified": "2024-07-03T01:52:57.560",
|
||||
"lastModified": "2024-07-29T22:15:04.373",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -67,6 +67,18 @@
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240524-0006/",
|
||||
"source": "2499f714-1537-4658-8207-48ae4bb9eae9"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214118",
|
||||
"source": "2499f714-1537-4658-8207-48ae4bb9eae9"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214119",
|
||||
"source": "2499f714-1537-4658-8207-48ae4bb9eae9"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214120",
|
||||
"source": "2499f714-1537-4658-8207-48ae4bb9eae9"
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2024/CVE-2024-232xx/CVE-2024-23261.json
Normal file
29
CVE-2024/CVE-2024-232xx/CVE-2024-23261.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2024-23261",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-07-29T23:15:10.037",
|
||||
"lastModified": "2024-07-29T23:15:10.037",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A logic issue was addressed with improved state management. This issue is fixed in macOS Monterey 12.7.6, macOS Sonoma 14.4, macOS Ventura 13.6.8. An attacker may be able to read information belonging to another user."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214084",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214118",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214120",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-23296",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-03-05T20:16:01.553",
|
||||
"lastModified": "2024-07-03T01:47:43.840",
|
||||
"lastModified": "2024-07-29T22:15:03.750",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"cisaExploitAdd": "2024-03-06",
|
||||
@ -225,6 +225,10 @@
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214107",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214118",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-2379",
|
||||
"sourceIdentifier": "2499f714-1537-4658-8207-48ae4bb9eae9",
|
||||
"published": "2024-03-27T08:15:41.230",
|
||||
"lastModified": "2024-06-10T16:15:13.173",
|
||||
"lastModified": "2024-07-29T22:15:04.493",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,18 @@
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240531-0001/",
|
||||
"source": "2499f714-1537-4658-8207-48ae4bb9eae9"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214118",
|
||||
"source": "2499f714-1537-4658-8207-48ae4bb9eae9"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214119",
|
||||
"source": "2499f714-1537-4658-8207-48ae4bb9eae9"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214120",
|
||||
"source": "2499f714-1537-4658-8207-48ae4bb9eae9"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-2398",
|
||||
"sourceIdentifier": "2499f714-1537-4658-8207-48ae4bb9eae9",
|
||||
"published": "2024-03-27T08:15:41.283",
|
||||
"lastModified": "2024-07-03T01:53:12.523",
|
||||
"lastModified": "2024-07-29T22:15:04.563",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -67,6 +67,18 @@
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240503-0009/",
|
||||
"source": "2499f714-1537-4658-8207-48ae4bb9eae9"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214118",
|
||||
"source": "2499f714-1537-4658-8207-48ae4bb9eae9"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214119",
|
||||
"source": "2499f714-1537-4658-8207-48ae4bb9eae9"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214120",
|
||||
"source": "2499f714-1537-4658-8207-48ae4bb9eae9"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-24795",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-04-04T20:15:08.663",
|
||||
"lastModified": "2024-06-10T18:15:27.003",
|
||||
"lastModified": "2024-07-29T22:15:04.000",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -48,6 +48,10 @@
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240415-0013/",
|
||||
"source": "security@apache.org"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214119",
|
||||
"source": "security@apache.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-2466",
|
||||
"sourceIdentifier": "2499f714-1537-4658-8207-48ae4bb9eae9",
|
||||
"published": "2024-03-27T08:15:41.343",
|
||||
"lastModified": "2024-05-03T13:15:21.893",
|
||||
"lastModified": "2024-07-29T22:15:04.697",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,18 @@
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240503-0010/",
|
||||
"source": "2499f714-1537-4658-8207-48ae4bb9eae9"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214118",
|
||||
"source": "2499f714-1537-4658-8207-48ae4bb9eae9"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214119",
|
||||
"source": "2499f714-1537-4658-8207-48ae4bb9eae9"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214120",
|
||||
"source": "2499f714-1537-4658-8207-48ae4bb9eae9"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-27316",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-04-04T20:15:08.720",
|
||||
"lastModified": "2024-07-22T09:15:04.603",
|
||||
"lastModified": "2024-07-29T22:15:04.113",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -136,6 +136,10 @@
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214119",
|
||||
"source": "security@apache.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.openwall.com/lists/oss-security/2024/04/03/16",
|
||||
"source": "security@apache.org"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-27804",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-05-14T15:13:04.033",
|
||||
"lastModified": "2024-07-03T01:50:51.930",
|
||||
"lastModified": "2024-07-29T22:15:04.233",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -99,6 +99,10 @@
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214106",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214123",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-278xx/CVE-2024-27809.json
Normal file
21
CVE-2024/CVE-2024-278xx/CVE-2024-27809.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-27809",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-07-29T23:15:10.110",
|
||||
"lastModified": "2024-07-29T23:15:10.110",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in macOS Sonoma 14.4. An app may be able to access user-sensitive data."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214084",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
49
CVE-2024/CVE-2024-278xx/CVE-2024-27823.json
Normal file
49
CVE-2024/CVE-2024-278xx/CVE-2024-27823.json
Normal file
@ -0,0 +1,49 @@
|
||||
{
|
||||
"id": "CVE-2024-27823",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-07-29T23:15:10.170",
|
||||
"lastModified": "2024-07-29T23:15:10.170",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A race condition was addressed with improved locking. This issue is fixed in macOS Sonoma 14.5, iOS 16.7.8 and iPadOS 16.7.8, macOS Ventura 13.6.7, watchOS 10.5, visionOS 1.3, tvOS 17.5, iOS 17.5 and iPadOS 17.5, macOS Monterey 12.7.5. An attacker in a privileged network position may be able to spoof network packets."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214100",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214101",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214102",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214104",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214105",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214106",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214107",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214123",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
45
CVE-2024/CVE-2024-278xx/CVE-2024-27826.json
Normal file
45
CVE-2024/CVE-2024-278xx/CVE-2024-27826.json
Normal file
@ -0,0 +1,45 @@
|
||||
{
|
||||
"id": "CVE-2024-27826",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-07-29T23:15:10.240",
|
||||
"lastModified": "2024-07-29T23:15:10.240",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.6.8, macOS Sonoma 14.5, macOS Monterey 12.7.6, watchOS 10.5, visionOS 1.3, tvOS 17.5, iOS 17.5 and iPadOS 17.5. An app may be able to execute arbitrary code with kernel privileges."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214101",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214102",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214104",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214106",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214118",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214120",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214123",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-278xx/CVE-2024-27853.json
Normal file
21
CVE-2024/CVE-2024-278xx/CVE-2024-27853.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-27853",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-07-29T23:15:10.297",
|
||||
"lastModified": "2024-07-29T23:15:10.297",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "This issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14.4. A maliciously crafted ZIP archive may bypass Gatekeeper checks."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214084",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-278xx/CVE-2024-27862.json
Normal file
21
CVE-2024/CVE-2024-278xx/CVE-2024-27862.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-27862",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-07-29T23:15:10.363",
|
||||
"lastModified": "2024-07-29T23:15:10.363",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A logic issue was addressed with improved state management. This issue is fixed in macOS Sonoma 14.6. Enabling Lockdown Mode while setting up a Mac may cause FileVault to become unexpectedly disabled."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214119",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
37
CVE-2024/CVE-2024-278xx/CVE-2024-27863.json
Normal file
37
CVE-2024/CVE-2024-278xx/CVE-2024-27863.json
Normal file
@ -0,0 +1,37 @@
|
||||
{
|
||||
"id": "CVE-2024-27863",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-07-29T23:15:10.423",
|
||||
"lastModified": "2024-07-29T23:15:10.423",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An information disclosure issue was addressed with improved private data redaction for log entries. This issue is fixed in iOS 17.6 and iPadOS 17.6, watchOS 10.6, tvOS 17.6, visionOS 1.3, macOS Sonoma 14.6. A local attacker may be able to determine kernel memory layout."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214117",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214119",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214122",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214123",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214124",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-278xx/CVE-2024-27871.json
Normal file
25
CVE-2024/CVE-2024-278xx/CVE-2024-27871.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-27871",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-07-29T23:15:10.490",
|
||||
"lastModified": "2024-07-29T23:15:10.490",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A path handling issue was addressed with improved validation. This issue is fixed in macOS Sonoma 14.6, iOS 17.6 and iPadOS 17.6. An app may be able to access protected user data."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214117",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214119",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-278xx/CVE-2024-27872.json
Normal file
21
CVE-2024/CVE-2024-278xx/CVE-2024-27872.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-27872",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-07-29T23:15:10.557",
|
||||
"lastModified": "2024-07-29T23:15:10.557",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "This issue was addressed with improved validation of symlinks. This issue is fixed in macOS Sonoma 14.6. An app may be able to access protected user data."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214119",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
37
CVE-2024/CVE-2024-278xx/CVE-2024-27873.json
Normal file
37
CVE-2024/CVE-2024-278xx/CVE-2024-27873.json
Normal file
@ -0,0 +1,37 @@
|
||||
{
|
||||
"id": "CVE-2024-27873",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-07-29T23:15:10.620",
|
||||
"lastModified": "2024-07-29T23:15:10.620",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An out-of-bounds write issue was addressed with improved input validation. This issue is fixed in iOS 16.7.9 and iPadOS 16.7.9, macOS Ventura 13.6.8, macOS Monterey 12.7.6, iOS 17.6 and iPadOS 17.6, macOS Sonoma 14.6. Processing a maliciously crafted video file may lead to unexpected app termination."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214116",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214117",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214118",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214119",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214120",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2024/CVE-2024-278xx/CVE-2024-27877.json
Normal file
29
CVE-2024/CVE-2024-278xx/CVE-2024-27877.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2024-27877",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-07-29T23:15:10.690",
|
||||
"lastModified": "2024-07-29T23:15:10.690",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The issue was addressed with improved memory handling. This issue is fixed in macOS Sonoma 14.6, macOS Monterey 12.7.6, macOS Ventura 13.6.8. Processing a maliciously crafted file may lead to a denial-of-service or potentially disclose memory contents."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214118",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214119",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214120",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-278xx/CVE-2024-27878.json
Normal file
21
CVE-2024/CVE-2024-278xx/CVE-2024-27878.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-27878",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-07-29T23:15:10.747",
|
||||
"lastModified": "2024-07-29T23:15:10.747",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A buffer overflow issue was addressed with improved memory handling. This issue is fixed in macOS Sonoma 14.6. An app with root privileges may be able to execute arbitrary code with kernel privileges."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214119",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2024/CVE-2024-278xx/CVE-2024-27881.json
Normal file
29
CVE-2024/CVE-2024-278xx/CVE-2024-27881.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2024-27881",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-07-29T23:15:10.807",
|
||||
"lastModified": "2024-07-29T23:15:10.807",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in macOS Sonoma 14.6, macOS Monterey 12.7.6, macOS Ventura 13.6.8. An app may be able to access information about a user\u2019s contacts."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214118",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214119",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214120",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2024/CVE-2024-278xx/CVE-2024-27882.json
Normal file
29
CVE-2024/CVE-2024-278xx/CVE-2024-27882.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2024-27882",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-07-29T23:15:10.877",
|
||||
"lastModified": "2024-07-29T23:15:10.877",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Sonoma 14.6, macOS Monterey 12.7.6, macOS Ventura 13.6.8. An app may be able to modify protected parts of the file system."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214118",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214119",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214120",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2024/CVE-2024-278xx/CVE-2024-27883.json
Normal file
29
CVE-2024/CVE-2024-278xx/CVE-2024-27883.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2024-27883",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-07-29T23:15:10.940",
|
||||
"lastModified": "2024-07-29T23:15:10.940",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Sonoma 14.6, macOS Monterey 12.7.6, macOS Ventura 13.6.8. An app may be able to modify protected parts of the file system."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214118",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214119",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214120",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
37
CVE-2024/CVE-2024-278xx/CVE-2024-27884.json
Normal file
37
CVE-2024/CVE-2024-278xx/CVE-2024-27884.json
Normal file
@ -0,0 +1,37 @@
|
||||
{
|
||||
"id": "CVE-2024-27884",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-07-29T23:15:11.010",
|
||||
"lastModified": "2024-07-29T23:15:11.010",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "This issue was addressed with a new entitlement. This issue is fixed in macOS Sonoma 14.5, watchOS 10.5, visionOS 1.2, tvOS 17.5, iOS 17.5 and iPadOS 17.5. An app may be able to access user-sensitive data."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214101",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214102",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214104",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214106",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214108",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-278xx/CVE-2024-27886.json
Normal file
21
CVE-2024/CVE-2024-278xx/CVE-2024-27886.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-27886",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-07-29T23:15:11.067",
|
||||
"lastModified": "2024-07-29T23:15:11.067",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A logic issue was addressed with improved restrictions. This issue is fixed in macOS Sonoma 14.4. An unprivileged app may be able to log keystrokes in other apps including those using secure input mode."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214084",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-278xx/CVE-2024-27887.json
Normal file
21
CVE-2024/CVE-2024-278xx/CVE-2024-27887.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-27887",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-07-29T23:15:11.127",
|
||||
"lastModified": "2024-07-29T23:15:11.127",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A path handling issue was addressed with improved validation. This issue is fixed in macOS Sonoma 14.4. An app may be able to access user-sensitive data."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214084",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-278xx/CVE-2024-27888.json
Normal file
21
CVE-2024/CVE-2024-278xx/CVE-2024-27888.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-27888",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-07-29T23:15:11.183",
|
||||
"lastModified": "2024-07-29T23:15:11.183",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A permissions issue was addressed by removing vulnerable code and adding additional checks. This issue is fixed in macOS Sonoma 14.4. An app may be able to modify protected parts of the file system."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214084",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2024/CVE-2024-32xx/CVE-2024-3219.json
Normal file
29
CVE-2024/CVE-2024-32xx/CVE-2024-3219.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2024-3219",
|
||||
"sourceIdentifier": "cna@python.org",
|
||||
"published": "2024-07-29T22:15:04.970",
|
||||
"lastModified": "2024-07-29T22:15:04.970",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "There is a MEDIUM severity vulnerability affecting CPython.\n\nThe\n \u201csocket\u201d module provides a pure-Python fallback to the \nsocket.socketpair() function for platforms that don\u2019t support AF_UNIX, \nsuch as Windows. This pure-Python implementation uses AF_INET or \nAF_INET6 to create a local connected pair of sockets. The connection \nbetween the two sockets was not verified before passing the two sockets \nback to the user, which leaves the server socket vulnerable to a \nconnection race from a malicious local peer.\n\nPlatforms that support AF_UNIX such as Linux and macOS are not affected by this vulnerability. Versions prior to CPython 3.5 are not affected due to the vulnerable API not being included."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/python/cpython/issues/122133",
|
||||
"source": "cna@python.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/python/cpython/pull/122134",
|
||||
"source": "cna@python.org"
|
||||
},
|
||||
{
|
||||
"url": "https://mail.python.org/archives/list/security-announce@python.org/thread/WYKDQWIERRE2ICIYMSVRZJO33GSCWU2B/",
|
||||
"source": "cna@python.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2024-38271",
|
||||
"sourceIdentifier": "cve-coordination@google.com",
|
||||
"published": "2024-06-26T16:15:11.560",
|
||||
"lastModified": "2024-06-27T12:47:19.847",
|
||||
"lastModified": "2024-07-29T22:15:04.757",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "There exists a vulnerability in Quickshare/Nearby where an attacker can force the a victim to stay connected to a temporary hotspot created for the share. As part of the sequence of packets in a QuickShare connection over Bluetooth, the attacker forces the victim to connect to the attacker\u2019s WiFi network and then sends an OfflineFrame that crashes Quick Share.\nThis makes the Wifi connection to the attacker\u2019s network last instead of returning to the old network when the Quick Share session is done allowing the attacker to be a MiTM. We recommend upgrading to version\u00a01.0.1724.0 of Quickshare or above"
|
||||
"value": "There exists a vulnerability in Quick Share/Nearby, where an attacker can force a victim to stay connected to a temporary hotspot created for the sharing. As part of the sequence of packets in a Quick Share connection over Bluetooth, the attacker forces the victim to connect to the attacker\u2019s WiFi network and then sends an OfflineFrame that crashes Quick Share.\nThis makes the Wifi connection to the attacker\u2019s network last, instead of returning to the old network when the Quick Share session completes, allowing the attacker to be a MiTM. We recommend upgrading to version\u00a01.0.1724.0 of Quick Share or above"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -74,6 +74,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/google/nearby/pull/2402",
|
||||
"source": "cve-coordination@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/google/nearby/pull/2433",
|
||||
"source": "cve-coordination@google.com"
|
||||
@ -81,6 +85,10 @@
|
||||
{
|
||||
"url": "https://github.com/google/nearby/pull/2435",
|
||||
"source": "cve-coordination@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/google/nearby/pull/2589",
|
||||
"source": "cve-coordination@google.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2024-38272",
|
||||
"sourceIdentifier": "cve-coordination@google.com",
|
||||
"published": "2024-06-26T16:15:11.733",
|
||||
"lastModified": "2024-06-27T12:47:19.847",
|
||||
"lastModified": "2024-07-29T22:15:04.883",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "There exists a vulnerability in Quickshare/Nearby where an attacker can bypass the accept file dialog on QuickShare Windows.\u00a0Normally in QuickShare Windows app we can't send a file without the user accept from the receiving device if the visibility is set to everyone mode or contacts mode.\u00a0We recommend upgrading to version 1.0.1724.0 of Quickshare or above"
|
||||
"value": "There exists a vulnerability in Quick Share/Nearby, where an attacker can bypass the accept file dialog on Quick Share Windows.\u00a0Normally in Quick Share Windows app we can't send a file without the user accept from the receiving device if the visibility is set to everyone mode or contacts mode.\u00a0We recommend upgrading to version 1.0.1724.0 of Quick Share or above"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
41
CVE-2024/CVE-2024-407xx/CVE-2024-40774.json
Normal file
41
CVE-2024/CVE-2024-407xx/CVE-2024-40774.json
Normal file
@ -0,0 +1,41 @@
|
||||
{
|
||||
"id": "CVE-2024-40774",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-07-29T23:15:11.250",
|
||||
"lastModified": "2024-07-29T23:15:11.250",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A downgrade issue was addressed with additional code-signing restrictions. This issue is fixed in macOS Ventura 13.6.8, macOS Monterey 12.7.6, iOS 17.6 and iPadOS 17.6, watchOS 10.6, tvOS 17.6, macOS Sonoma 14.6. An app may be able to bypass Privacy preferences."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214117",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214118",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214119",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214120",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214122",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214124",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2024/CVE-2024-407xx/CVE-2024-40775.json
Normal file
29
CVE-2024/CVE-2024-407xx/CVE-2024-40775.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2024-40775",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-07-29T23:15:11.317",
|
||||
"lastModified": "2024-07-29T23:15:11.317",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A downgrade issue was addressed with additional code-signing restrictions. This issue is fixed in macOS Sonoma 14.6, macOS Monterey 12.7.6, macOS Ventura 13.6.8. An app may be able to leak sensitive user information."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214118",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214119",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214120",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
45
CVE-2024/CVE-2024-407xx/CVE-2024-40776.json
Normal file
45
CVE-2024/CVE-2024-407xx/CVE-2024-40776.json
Normal file
@ -0,0 +1,45 @@
|
||||
{
|
||||
"id": "CVE-2024-40776",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-07-29T23:15:11.387",
|
||||
"lastModified": "2024-07-29T23:15:11.387",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A use-after-free issue was addressed with improved memory management. This issue is fixed in iOS 16.7.9 and iPadOS 16.7.9, Safari 17.6, iOS 17.6 and iPadOS 17.6, watchOS 10.6, tvOS 17.6, visionOS 1.3, macOS Sonoma 14.6. Processing maliciously crafted web content may lead to an unexpected process crash."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214116",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214117",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214119",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214121",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214122",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214123",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214124",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
37
CVE-2024/CVE-2024-407xx/CVE-2024-40777.json
Normal file
37
CVE-2024/CVE-2024-407xx/CVE-2024-40777.json
Normal file
@ -0,0 +1,37 @@
|
||||
{
|
||||
"id": "CVE-2024-40777",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-07-29T23:15:11.457",
|
||||
"lastModified": "2024-07-29T23:15:11.457",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An out-of-bounds access issue was addressed with improved bounds checking. This issue is fixed in iOS 17.6 and iPadOS 17.6, watchOS 10.6, tvOS 17.6, visionOS 1.3, macOS Sonoma 14.6. Processing a maliciously crafted file may lead to unexpected app termination."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214117",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214119",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214122",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214123",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214124",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2024/CVE-2024-407xx/CVE-2024-40778.json
Normal file
29
CVE-2024/CVE-2024-407xx/CVE-2024-40778.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2024-40778",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-07-29T23:15:11.527",
|
||||
"lastModified": "2024-07-29T23:15:11.527",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An authentication issue was addressed with improved state management. This issue is fixed in macOS Sonoma 14.6, iOS 17.6 and iPadOS 17.6, iOS 16.7.9 and iPadOS 16.7.9. Photos in the Hidden Photos Album may be viewed without authentication."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214116",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214117",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214119",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
45
CVE-2024/CVE-2024-407xx/CVE-2024-40779.json
Normal file
45
CVE-2024/CVE-2024-407xx/CVE-2024-40779.json
Normal file
@ -0,0 +1,45 @@
|
||||
{
|
||||
"id": "CVE-2024-40779",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-07-29T23:15:11.590",
|
||||
"lastModified": "2024-07-29T23:15:11.590",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in iOS 16.7.9 and iPadOS 16.7.9, Safari 17.6, iOS 17.6 and iPadOS 17.6, watchOS 10.6, tvOS 17.6, visionOS 1.3, macOS Sonoma 14.6. Processing maliciously crafted web content may lead to an unexpected process crash."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214116",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214117",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214119",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214121",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214122",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214123",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214124",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
45
CVE-2024/CVE-2024-407xx/CVE-2024-40780.json
Normal file
45
CVE-2024/CVE-2024-407xx/CVE-2024-40780.json
Normal file
@ -0,0 +1,45 @@
|
||||
{
|
||||
"id": "CVE-2024-40780",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-07-29T23:15:11.660",
|
||||
"lastModified": "2024-07-29T23:15:11.660",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in iOS 16.7.9 and iPadOS 16.7.9, Safari 17.6, iOS 17.6 and iPadOS 17.6, watchOS 10.6, tvOS 17.6, visionOS 1.3, macOS Sonoma 14.6. Processing maliciously crafted web content may lead to an unexpected process crash."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214116",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214117",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214119",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214121",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214122",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214123",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214124",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2024/CVE-2024-407xx/CVE-2024-40781.json
Normal file
29
CVE-2024/CVE-2024-407xx/CVE-2024-40781.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2024-40781",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-07-29T23:15:11.727",
|
||||
"lastModified": "2024-07-29T23:15:11.727",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14.6, macOS Monterey 12.7.6, macOS Ventura 13.6.8. A local attacker may be able to elevate their privileges."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214118",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214119",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214120",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
45
CVE-2024/CVE-2024-407xx/CVE-2024-40782.json
Normal file
45
CVE-2024/CVE-2024-407xx/CVE-2024-40782.json
Normal file
@ -0,0 +1,45 @@
|
||||
{
|
||||
"id": "CVE-2024-40782",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-07-29T23:15:11.790",
|
||||
"lastModified": "2024-07-29T23:15:11.790",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A use-after-free issue was addressed with improved memory management. This issue is fixed in iOS 16.7.9 and iPadOS 16.7.9, Safari 17.6, iOS 17.6 and iPadOS 17.6, watchOS 10.6, tvOS 17.6, visionOS 1.3, macOS Sonoma 14.6. Processing maliciously crafted web content may lead to an unexpected process crash."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214116",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214117",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214119",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214121",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214122",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214123",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214124",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2024/CVE-2024-407xx/CVE-2024-40783.json
Normal file
29
CVE-2024/CVE-2024-407xx/CVE-2024-40783.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2024-40783",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-07-29T23:15:11.853",
|
||||
"lastModified": "2024-07-29T23:15:11.853",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The issue was addressed with improved restriction of data container access. This issue is fixed in macOS Sonoma 14.6, macOS Monterey 12.7.6, macOS Ventura 13.6.8. A malicious application may be able to bypass Privacy preferences."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214118",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214119",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214120",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
45
CVE-2024/CVE-2024-407xx/CVE-2024-40784.json
Normal file
45
CVE-2024/CVE-2024-407xx/CVE-2024-40784.json
Normal file
@ -0,0 +1,45 @@
|
||||
{
|
||||
"id": "CVE-2024-40784",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-07-29T23:15:11.923",
|
||||
"lastModified": "2024-07-29T23:15:11.923",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An integer overflow was addressed with improved input validation. This issue is fixed in iOS 16.7.9 and iPadOS 16.7.9, macOS Ventura 13.6.8, iOS 17.6 and iPadOS 17.6, watchOS 10.6, tvOS 17.6, visionOS 1.3, macOS Sonoma 14.6. Processing a maliciously crafted file may lead to unexpected app termination."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214116",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214117",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214119",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214120",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214122",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214123",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214124",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
45
CVE-2024/CVE-2024-407xx/CVE-2024-40785.json
Normal file
45
CVE-2024/CVE-2024-407xx/CVE-2024-40785.json
Normal file
@ -0,0 +1,45 @@
|
||||
{
|
||||
"id": "CVE-2024-40785",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-07-29T23:15:11.997",
|
||||
"lastModified": "2024-07-29T23:15:11.997",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "This issue was addressed with improved checks. This issue is fixed in iOS 16.7.9 and iPadOS 16.7.9, Safari 17.6, iOS 17.6 and iPadOS 17.6, watchOS 10.6, tvOS 17.6, visionOS 1.3, macOS Sonoma 14.6. Processing maliciously crafted web content may lead to a cross site scripting attack."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214116",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214117",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214119",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214121",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214122",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214123",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214124",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2024/CVE-2024-407xx/CVE-2024-40786.json
Normal file
29
CVE-2024/CVE-2024-407xx/CVE-2024-40786.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2024-40786",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-07-29T23:15:12.070",
|
||||
"lastModified": "2024-07-29T23:15:12.070",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "This issue was addressed through improved state management. This issue is fixed in iOS 17.6 and iPadOS 17.6, iOS 16.7.9 and iPadOS 16.7.9, macOS Ventura 13.6.8. An attacker may be able to view sensitive user information."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214116",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214117",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214120",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
37
CVE-2024/CVE-2024-407xx/CVE-2024-40787.json
Normal file
37
CVE-2024/CVE-2024-407xx/CVE-2024-40787.json
Normal file
@ -0,0 +1,37 @@
|
||||
{
|
||||
"id": "CVE-2024-40787",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-07-29T23:15:12.133",
|
||||
"lastModified": "2024-07-29T23:15:12.133",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "This issue was addressed by adding an additional prompt for user consent. This issue is fixed in macOS Ventura 13.6.8, macOS Monterey 12.7.6, iOS 17.6 and iPadOS 17.6, watchOS 10.6, macOS Sonoma 14.6. A shortcut may be able to bypass Internet permission requirements."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214117",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214118",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214119",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214120",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214124",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
49
CVE-2024/CVE-2024-407xx/CVE-2024-40788.json
Normal file
49
CVE-2024/CVE-2024-407xx/CVE-2024-40788.json
Normal file
@ -0,0 +1,49 @@
|
||||
{
|
||||
"id": "CVE-2024-40788",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-07-29T23:15:12.200",
|
||||
"lastModified": "2024-07-29T23:15:12.200",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A type confusion issue was addressed with improved memory handling. This issue is fixed in iOS 16.7.9 and iPadOS 16.7.9, macOS Ventura 13.6.8, macOS Monterey 12.7.6, iOS 17.6 and iPadOS 17.6, watchOS 10.6, tvOS 17.6, visionOS 1.3, macOS Sonoma 14.6. A local attacker may be able to cause unexpected system shutdown."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214116",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214117",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214118",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214119",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214120",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214122",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214123",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214124",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
45
CVE-2024/CVE-2024-407xx/CVE-2024-40789.json
Normal file
45
CVE-2024/CVE-2024-407xx/CVE-2024-40789.json
Normal file
@ -0,0 +1,45 @@
|
||||
{
|
||||
"id": "CVE-2024-40789",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-07-29T23:15:12.270",
|
||||
"lastModified": "2024-07-29T23:15:12.270",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An out-of-bounds access issue was addressed with improved bounds checking. This issue is fixed in iOS 16.7.9 and iPadOS 16.7.9, Safari 17.6, iOS 17.6 and iPadOS 17.6, watchOS 10.6, tvOS 17.6, visionOS 1.3, macOS Sonoma 14.6. Processing maliciously crafted web content may lead to an unexpected process crash."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214116",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214117",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214119",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214121",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214122",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214123",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214124",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
41
CVE-2024/CVE-2024-407xx/CVE-2024-40793.json
Normal file
41
CVE-2024/CVE-2024-407xx/CVE-2024-40793.json
Normal file
@ -0,0 +1,41 @@
|
||||
{
|
||||
"id": "CVE-2024-40793",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-07-29T23:15:12.337",
|
||||
"lastModified": "2024-07-29T23:15:12.337",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "This issue was addressed by removing the vulnerable code. This issue is fixed in iOS 16.7.9 and iPadOS 16.7.9, macOS Ventura 13.6.8, macOS Monterey 12.7.6, iOS 17.6 and iPadOS 17.6, watchOS 10.6, macOS Sonoma 14.6. An app may be able to access user-sensitive data."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214116",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214117",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214118",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214119",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214120",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214124",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2024/CVE-2024-407xx/CVE-2024-40794.json
Normal file
29
CVE-2024/CVE-2024-407xx/CVE-2024-40794.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2024-40794",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-07-29T23:15:12.410",
|
||||
"lastModified": "2024-07-29T23:15:12.410",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "This issue was addressed through improved state management. This issue is fixed in macOS Sonoma 14.6, iOS 17.6 and iPadOS 17.6, Safari 17.6. Private Browsing tabs may be accessed without authentication."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214117",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214119",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214121",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
33
CVE-2024/CVE-2024-407xx/CVE-2024-40795.json
Normal file
33
CVE-2024/CVE-2024-407xx/CVE-2024-40795.json
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
"id": "CVE-2024-40795",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-07-29T23:15:12.477",
|
||||
"lastModified": "2024-07-29T23:15:12.477",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "This issue was addressed with improved data protection. This issue is fixed in watchOS 10.6, macOS Sonoma 14.6, iOS 17.6 and iPadOS 17.6, tvOS 17.6. An app may be able to read sensitive location information."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214117",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214119",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214122",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214124",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
33
CVE-2024/CVE-2024-407xx/CVE-2024-40796.json
Normal file
33
CVE-2024/CVE-2024-407xx/CVE-2024-40796.json
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
"id": "CVE-2024-40796",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-07-29T23:15:12.540",
|
||||
"lastModified": "2024-07-29T23:15:12.540",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in macOS Sonoma 14.6, iOS 16.7.9 and iPadOS 16.7.9, macOS Monterey 12.7.6, macOS Ventura 13.6.8. Private browsing may leak some browsing history."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214116",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214118",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214119",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214120",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
33
CVE-2024/CVE-2024-407xx/CVE-2024-40798.json
Normal file
33
CVE-2024/CVE-2024-407xx/CVE-2024-40798.json
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
"id": "CVE-2024-40798",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-07-29T23:15:12.600",
|
||||
"lastModified": "2024-07-29T23:15:12.600",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "This issue was addressed with improved redaction of sensitive information. This issue is fixed in macOS Sonoma 14.6, iOS 16.7.9 and iPadOS 16.7.9, macOS Monterey 12.7.6, macOS Ventura 13.6.8. An app may be able to read Safari's browsing history."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214116",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214118",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214119",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214120",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
49
CVE-2024/CVE-2024-407xx/CVE-2024-40799.json
Normal file
49
CVE-2024/CVE-2024-407xx/CVE-2024-40799.json
Normal file
@ -0,0 +1,49 @@
|
||||
{
|
||||
"id": "CVE-2024-40799",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-07-29T23:15:12.667",
|
||||
"lastModified": "2024-07-29T23:15:12.667",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An out-of-bounds read issue was addressed with improved input validation. This issue is fixed in iOS 16.7.9 and iPadOS 16.7.9, macOS Ventura 13.6.8, macOS Monterey 12.7.6, iOS 17.6 and iPadOS 17.6, watchOS 10.6, tvOS 17.6, visionOS 1.3, macOS Sonoma 14.6. Processing a maliciously crafted file may lead to unexpected app termination."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214116",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214117",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214118",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214119",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214120",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214122",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214123",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214124",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2024/CVE-2024-408xx/CVE-2024-40800.json
Normal file
29
CVE-2024/CVE-2024-408xx/CVE-2024-40800.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2024-40800",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-07-29T23:15:12.743",
|
||||
"lastModified": "2024-07-29T23:15:12.743",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An input validation issue was addressed with improved input validation. This issue is fixed in macOS Sonoma 14.6, macOS Monterey 12.7.6, macOS Ventura 13.6.8. An app may be able to modify protected parts of the file system."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214118",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214119",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214120",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2024/CVE-2024-408xx/CVE-2024-40802.json
Normal file
29
CVE-2024/CVE-2024-408xx/CVE-2024-40802.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2024-40802",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-07-29T23:15:12.810",
|
||||
"lastModified": "2024-07-29T23:15:12.810",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14.6, macOS Monterey 12.7.6, macOS Ventura 13.6.8. A local attacker may be able to elevate their privileges."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214118",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214119",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214120",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2024/CVE-2024-408xx/CVE-2024-40803.json
Normal file
29
CVE-2024/CVE-2024-408xx/CVE-2024-40803.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2024-40803",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-07-29T23:15:12.873",
|
||||
"lastModified": "2024-07-29T23:15:12.873",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A type confusion issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14.6, macOS Monterey 12.7.6, macOS Ventura 13.6.8. An attacker may be able to cause unexpected app termination."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214118",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214119",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214120",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-408xx/CVE-2024-40804.json
Normal file
21
CVE-2024/CVE-2024-408xx/CVE-2024-40804.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-40804",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-07-29T23:15:12.947",
|
||||
"lastModified": "2024-07-29T23:15:12.947",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14.6. A malicious application may be able to access private information."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214119",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
33
CVE-2024/CVE-2024-408xx/CVE-2024-40805.json
Normal file
33
CVE-2024/CVE-2024-408xx/CVE-2024-40805.json
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
"id": "CVE-2024-40805",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-07-29T23:15:13.017",
|
||||
"lastModified": "2024-07-29T23:15:13.017",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A permissions issue was addressed with additional restrictions. This issue is fixed in watchOS 10.6, macOS Sonoma 14.6, iOS 17.6 and iPadOS 17.6, tvOS 17.6. An app may be able to bypass Privacy preferences."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214117",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214119",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214122",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214124",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
49
CVE-2024/CVE-2024-408xx/CVE-2024-40806.json
Normal file
49
CVE-2024/CVE-2024-408xx/CVE-2024-40806.json
Normal file
@ -0,0 +1,49 @@
|
||||
{
|
||||
"id": "CVE-2024-40806",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-07-29T23:15:13.083",
|
||||
"lastModified": "2024-07-29T23:15:13.083",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An out-of-bounds read issue was addressed with improved input validation. This issue is fixed in iOS 16.7.9 and iPadOS 16.7.9, macOS Ventura 13.6.8, macOS Monterey 12.7.6, iOS 17.6 and iPadOS 17.6, watchOS 10.6, tvOS 17.6, visionOS 1.3, macOS Sonoma 14.6. Processing a maliciously crafted file may lead to unexpected app termination."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214116",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214117",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214118",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214119",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214120",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214122",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214123",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214124",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2024/CVE-2024-408xx/CVE-2024-40807.json
Normal file
29
CVE-2024/CVE-2024-408xx/CVE-2024-40807.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2024-40807",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-07-29T23:15:13.147",
|
||||
"lastModified": "2024-07-29T23:15:13.147",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A logic issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14.6, macOS Monterey 12.7.6, macOS Ventura 13.6.8. A shortcut may be able to use sensitive data with certain actions without prompting the user."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214118",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214119",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214120",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
45
CVE-2024/CVE-2024-408xx/CVE-2024-40809.json
Normal file
45
CVE-2024/CVE-2024-408xx/CVE-2024-40809.json
Normal file
@ -0,0 +1,45 @@
|
||||
{
|
||||
"id": "CVE-2024-40809",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-07-29T23:15:13.207",
|
||||
"lastModified": "2024-07-29T23:15:13.207",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A logic issue was addressed with improved checks. This issue is fixed in iOS 16.7.9 and iPadOS 16.7.9, macOS Ventura 13.6.8, macOS Monterey 12.7.6, iOS 17.6 and iPadOS 17.6, watchOS 10.6, visionOS 1.3, macOS Sonoma 14.6. A shortcut may be able to bypass Internet permission requirements."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214116",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214117",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214118",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214119",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214120",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214123",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214124",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-408xx/CVE-2024-40811.json
Normal file
21
CVE-2024/CVE-2024-408xx/CVE-2024-40811.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-40811",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-07-29T23:15:13.273",
|
||||
"lastModified": "2024-07-29T23:15:13.273",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14.6. An app may be able to modify protected parts of the file system."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214119",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
45
CVE-2024/CVE-2024-408xx/CVE-2024-40812.json
Normal file
45
CVE-2024/CVE-2024-408xx/CVE-2024-40812.json
Normal file
@ -0,0 +1,45 @@
|
||||
{
|
||||
"id": "CVE-2024-40812",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-07-29T23:15:13.330",
|
||||
"lastModified": "2024-07-29T23:15:13.330",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A logic issue was addressed with improved checks. This issue is fixed in iOS 16.7.9 and iPadOS 16.7.9, macOS Ventura 13.6.8, macOS Monterey 12.7.6, iOS 17.6 and iPadOS 17.6, watchOS 10.6, visionOS 1.3, macOS Sonoma 14.6. A shortcut may be able to bypass Internet permission requirements."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214116",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214117",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214118",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214119",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214120",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214123",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214124",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-408xx/CVE-2024-40813.json
Normal file
25
CVE-2024/CVE-2024-408xx/CVE-2024-40813.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-40813",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-07-29T23:15:13.397",
|
||||
"lastModified": "2024-07-29T23:15:13.397",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A lock screen issue was addressed with improved state management. This issue is fixed in watchOS 10.6, iOS 17.6 and iPadOS 17.6. An attacker with physical access may be able to use Siri to access sensitive user data."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214117",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214124",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-408xx/CVE-2024-40814.json
Normal file
21
CVE-2024/CVE-2024-408xx/CVE-2024-40814.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-40814",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-07-29T23:15:13.460",
|
||||
"lastModified": "2024-07-29T23:15:13.460",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A downgrade issue was addressed with additional code-signing restrictions. This issue is fixed in macOS Sonoma 14.6. An app may be able to bypass Privacy preferences."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214119",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
37
CVE-2024/CVE-2024-408xx/CVE-2024-40815.json
Normal file
37
CVE-2024/CVE-2024-408xx/CVE-2024-40815.json
Normal file
@ -0,0 +1,37 @@
|
||||
{
|
||||
"id": "CVE-2024-40815",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-07-29T23:15:13.523",
|
||||
"lastModified": "2024-07-29T23:15:13.523",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A race condition was addressed with additional validation. This issue is fixed in macOS Ventura 13.6.8, iOS 17.6 and iPadOS 17.6, watchOS 10.6, tvOS 17.6, macOS Sonoma 14.6. A malicious attacker with arbitrary read and write capability may be able to bypass Pointer Authentication."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214117",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214119",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214120",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214122",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214124",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2024/CVE-2024-408xx/CVE-2024-40816.json
Normal file
29
CVE-2024/CVE-2024-408xx/CVE-2024-40816.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2024-40816",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-07-29T23:15:13.583",
|
||||
"lastModified": "2024-07-29T23:15:13.583",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An out-of-bounds read was addressed with improved input validation. This issue is fixed in macOS Sonoma 14.6, macOS Monterey 12.7.6, macOS Ventura 13.6.8. A local attacker may be able to cause unexpected system shutdown."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214118",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214119",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214120",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
33
CVE-2024/CVE-2024-408xx/CVE-2024-40817.json
Normal file
33
CVE-2024/CVE-2024-408xx/CVE-2024-40817.json
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
"id": "CVE-2024-40817",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-07-29T23:15:13.647",
|
||||
"lastModified": "2024-07-29T23:15:13.647",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The issue was addressed with improved UI handling. This issue is fixed in macOS Sonoma 14.6, Safari 17.6, macOS Monterey 12.7.6, macOS Ventura 13.6.8. Visiting a website that frames malicious content may lead to UI spoofing."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214118",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214119",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214120",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214121",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
37
CVE-2024/CVE-2024-408xx/CVE-2024-40818.json
Normal file
37
CVE-2024/CVE-2024-408xx/CVE-2024-40818.json
Normal file
@ -0,0 +1,37 @@
|
||||
{
|
||||
"id": "CVE-2024-40818",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-07-29T23:15:13.703",
|
||||
"lastModified": "2024-07-29T23:15:13.703",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "This issue was addressed by restricting options offered on a locked device. This issue is fixed in iOS 16.7.9 and iPadOS 16.7.9, macOS Ventura 13.6.8, iOS 17.6 and iPadOS 17.6, watchOS 10.6, macOS Sonoma 14.6. An attacker with physical access may be able to use Siri to access sensitive user data."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214116",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214117",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214119",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214120",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214124",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2024/CVE-2024-408xx/CVE-2024-40821.json
Normal file
29
CVE-2024/CVE-2024-408xx/CVE-2024-40821.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2024-40821",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-07-29T23:15:13.770",
|
||||
"lastModified": "2024-07-29T23:15:13.770",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An access issue was addressed with additional sandbox restrictions. This issue is fixed in macOS Sonoma 14.6, macOS Monterey 12.7.6, macOS Ventura 13.6.8. Third party app extensions may not receive the correct sandbox restrictions."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214118",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214119",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214120",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
33
CVE-2024/CVE-2024-408xx/CVE-2024-40822.json
Normal file
33
CVE-2024/CVE-2024-408xx/CVE-2024-40822.json
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
"id": "CVE-2024-40822",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-07-29T23:15:13.840",
|
||||
"lastModified": "2024-07-29T23:15:13.840",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "This issue was addressed by restricting options offered on a locked device. This issue is fixed in watchOS 10.6, macOS Sonoma 14.6, iOS 17.6 and iPadOS 17.6, iOS 16.7.9 and iPadOS 16.7.9. An attacker with physical access to a device may be able to access contacts from the lock screen."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214116",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214117",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214119",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214124",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2024/CVE-2024-408xx/CVE-2024-40823.json
Normal file
29
CVE-2024/CVE-2024-408xx/CVE-2024-40823.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2024-40823",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-07-29T23:15:13.920",
|
||||
"lastModified": "2024-07-29T23:15:13.920",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14.6, macOS Monterey 12.7.6, macOS Ventura 13.6.8. An app may be able to access user-sensitive data."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214118",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214119",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214120",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
33
CVE-2024/CVE-2024-408xx/CVE-2024-40824.json
Normal file
33
CVE-2024/CVE-2024-408xx/CVE-2024-40824.json
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
"id": "CVE-2024-40824",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-07-29T23:15:13.990",
|
||||
"lastModified": "2024-07-29T23:15:13.990",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "This issue was addressed through improved state management. This issue is fixed in watchOS 10.6, macOS Sonoma 14.6, iOS 17.6 and iPadOS 17.6, tvOS 17.6. An app may be able to bypass Privacy preferences."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214117",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214119",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214122",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214124",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2024/CVE-2024-408xx/CVE-2024-40827.json
Normal file
29
CVE-2024/CVE-2024-408xx/CVE-2024-40827.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2024-40827",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-07-29T23:15:14.067",
|
||||
"lastModified": "2024-07-29T23:15:14.067",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14.6, macOS Monterey 12.7.6, macOS Ventura 13.6.8. An app may be able to overwrite arbitrary files."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214118",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214119",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214120",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2024/CVE-2024-408xx/CVE-2024-40828.json
Normal file
29
CVE-2024/CVE-2024-408xx/CVE-2024-40828.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2024-40828",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-07-29T23:15:14.130",
|
||||
"lastModified": "2024-07-29T23:15:14.130",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14.6, macOS Monterey 12.7.6, macOS Ventura 13.6.8. A malicious app may be able to gain root privileges."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214118",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214119",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214120",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
33
CVE-2024/CVE-2024-408xx/CVE-2024-40829.json
Normal file
33
CVE-2024/CVE-2024-408xx/CVE-2024-40829.json
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
"id": "CVE-2024-40829",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-07-29T23:15:14.193",
|
||||
"lastModified": "2024-07-29T23:15:14.193",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The issue was addressed with improved checks. This issue is fixed in watchOS 10.6, iOS 17.6 and iPadOS 17.6, iOS 16.7.9 and iPadOS 16.7.9, macOS Ventura 13.6.8. An attacker may be able to view restricted content from the lock screen."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214116",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214117",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214120",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214124",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-408xx/CVE-2024-40832.json
Normal file
21
CVE-2024/CVE-2024-408xx/CVE-2024-40832.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-40832",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-07-29T23:15:14.257",
|
||||
"lastModified": "2024-07-29T23:15:14.257",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14.6. An app may be able to view a contact's phone number in system logs."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214119",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
33
CVE-2024/CVE-2024-408xx/CVE-2024-40833.json
Normal file
33
CVE-2024/CVE-2024-408xx/CVE-2024-40833.json
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
"id": "CVE-2024-40833",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-07-29T23:15:14.333",
|
||||
"lastModified": "2024-07-29T23:15:14.333",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A logic issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14.6, iOS 16.7.9 and iPadOS 16.7.9, macOS Monterey 12.7.6, macOS Ventura 13.6.8. A shortcut may be able to use sensitive data with certain actions without prompting the user."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214116",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214118",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214119",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214120",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2024/CVE-2024-408xx/CVE-2024-40834.json
Normal file
29
CVE-2024/CVE-2024-408xx/CVE-2024-40834.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2024-40834",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-07-29T23:15:14.413",
|
||||
"lastModified": "2024-07-29T23:15:14.413",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "This issue was addressed by adding an additional prompt for user consent. This issue is fixed in macOS Sonoma 14.6, macOS Monterey 12.7.6, macOS Ventura 13.6.8. A shortcut may be able to bypass sensitive Shortcuts app settings."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214118",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214119",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214120",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
41
CVE-2024/CVE-2024-408xx/CVE-2024-40835.json
Normal file
41
CVE-2024/CVE-2024-408xx/CVE-2024-40835.json
Normal file
@ -0,0 +1,41 @@
|
||||
{
|
||||
"id": "CVE-2024-40835",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-07-29T23:15:14.487",
|
||||
"lastModified": "2024-07-29T23:15:14.487",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A logic issue was addressed with improved checks. This issue is fixed in iOS 16.7.9 and iPadOS 16.7.9, macOS Ventura 13.6.8, macOS Monterey 12.7.6, iOS 17.6 and iPadOS 17.6, watchOS 10.6, macOS Sonoma 14.6. A shortcut may be able to use sensitive data with certain actions without prompting the user."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214116",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214117",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214118",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214119",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214120",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214124",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
33
CVE-2024/CVE-2024-408xx/CVE-2024-40836.json
Normal file
33
CVE-2024/CVE-2024-408xx/CVE-2024-40836.json
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
"id": "CVE-2024-40836",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-07-29T23:15:14.570",
|
||||
"lastModified": "2024-07-29T23:15:14.570",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A logic issue was addressed with improved checks. This issue is fixed in watchOS 10.6, macOS Sonoma 14.6, iOS 17.6 and iPadOS 17.6, iOS 16.7.9 and iPadOS 16.7.9. A shortcut may be able to use sensitive data with certain actions without prompting the user."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214116",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214117",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214119",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214124",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-4879",
|
||||
"sourceIdentifier": "psirt@servicenow.com",
|
||||
"published": "2024-07-10T17:15:12.117",
|
||||
"lastModified": "2024-07-11T22:15:02.260",
|
||||
"lastModified": "2024-07-29T23:15:14.650",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -103,6 +103,10 @@
|
||||
{
|
||||
"url": "https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB1645154",
|
||||
"source": "psirt@servicenow.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.darkreading.com/cloud-security/patchnow-servicenow-critical-rce-bugs-active-exploit",
|
||||
"source": "psirt@servicenow.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-5217",
|
||||
"sourceIdentifier": "psirt@servicenow.com",
|
||||
"published": "2024-07-10T17:15:12.373",
|
||||
"lastModified": "2024-07-11T22:15:02.647",
|
||||
"lastModified": "2024-07-29T23:15:14.807",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -103,6 +103,10 @@
|
||||
{
|
||||
"url": "https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB1648313",
|
||||
"source": "psirt@servicenow.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.darkreading.com/cloud-security/patchnow-servicenow-critical-rce-bugs-active-exploit",
|
||||
"source": "psirt@servicenow.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-6387",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-07-01T13:15:06.467",
|
||||
"lastModified": "2024-07-29T09:15:02.853",
|
||||
"lastModified": "2024-07-29T22:15:05.043",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -896,6 +896,18 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214118",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214119",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214120",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://ubuntu.com/security/CVE-2024-6387",
|
||||
"source": "secalert@redhat.com",
|
||||
|
56
CVE-2024/CVE-2024-72xx/CVE-2024-7248.json
Normal file
56
CVE-2024/CVE-2024-72xx/CVE-2024-7248.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-7248",
|
||||
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||
"published": "2024-07-29T22:15:05.553",
|
||||
"lastModified": "2024-07-29T22:15:05.553",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Comodo Internet Security Pro Directory Traversal Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Comodo Internet Security Pro. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.\n\nThe specific flaw exists within the update mechanism. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-19055."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-953/",
|
||||
"source": "zdi-disclosures@trendmicro.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-72xx/CVE-2024-7249.json
Normal file
56
CVE-2024/CVE-2024-72xx/CVE-2024-7249.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-7249",
|
||||
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||
"published": "2024-07-29T22:15:05.817",
|
||||
"lastModified": "2024-07-29T22:15:05.817",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Comodo Firewall Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Comodo Firewall. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.\n\nThe specific flaw exists within the cmdagent executable. By creating a symbolic link, an attacker can abuse the application to delete a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-21794."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-59"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-954/",
|
||||
"source": "zdi-disclosures@trendmicro.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-72xx/CVE-2024-7250.json
Normal file
56
CVE-2024/CVE-2024-72xx/CVE-2024-7250.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-7250",
|
||||
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||
"published": "2024-07-29T22:15:06.100",
|
||||
"lastModified": "2024-07-29T22:15:06.100",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Comodo Internet Security Pro cmdagent Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Comodo Internet Security Pro. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.\n\nThe specific flaw exists within the cmdagent executable. By creating a symbolic link, an attacker can abuse the agent to delete a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-22829."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-59"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-955/",
|
||||
"source": "zdi-disclosures@trendmicro.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-72xx/CVE-2024-7251.json
Normal file
56
CVE-2024/CVE-2024-72xx/CVE-2024-7251.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-7251",
|
||||
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||
"published": "2024-07-29T22:15:06.283",
|
||||
"lastModified": "2024-07-29T22:15:06.283",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Comodo Internet Security Pro cmdagent Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Comodo Internet Security Pro. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.\n\nThe specific flaw exists within the cmdagent executable. By creating a symbolic link, an attacker can abuse the agent to create a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-22832."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-59"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-956/",
|
||||
"source": "zdi-disclosures@trendmicro.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-72xx/CVE-2024-7252.json
Normal file
56
CVE-2024/CVE-2024-72xx/CVE-2024-7252.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-7252",
|
||||
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||
"published": "2024-07-29T22:15:06.497",
|
||||
"lastModified": "2024-07-29T22:15:06.497",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Comodo Internet Security Pro cmdagent Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Comodo Internet Security Pro. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.\n\nThe specific flaw exists within the cmdagent executable. By creating a symbolic link, an attacker can abuse the agent to delete a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-22831."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-59"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-957/",
|
||||
"source": "zdi-disclosures@trendmicro.com"
|
||||
}
|
||||
]
|
||||
}
|
82
README.md
82
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-07-29T22:00:16.610489+00:00
|
||||
2024-07-29T23:55:17.408919+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-07-29T21:15:12.047000+00:00
|
||||
2024-07-29T23:15:14.807000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,47 +33,63 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
258335
|
||||
258410
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `23`
|
||||
Recently added CVEs: `75`
|
||||
|
||||
- [CVE-2017-3755](CVE-2017/CVE-2017-37xx/CVE-2017-3755.json) (`2024-07-29T21:15:10.993`)
|
||||
- [CVE-2017-3766](CVE-2017/CVE-2017-37xx/CVE-2017-3766.json) (`2024-07-29T21:15:11.060`)
|
||||
- [CVE-2017-3769](CVE-2017/CVE-2017-37xx/CVE-2017-3769.json) (`2024-07-29T21:15:11.107`)
|
||||
- [CVE-2019-19759](CVE-2019/CVE-2019-197xx/CVE-2019-19759.json) (`2024-07-29T20:15:02.963`)
|
||||
- [CVE-2019-19760](CVE-2019/CVE-2019-197xx/CVE-2019-19760.json) (`2024-07-29T20:15:03.067`)
|
||||
- [CVE-2019-19761](CVE-2019/CVE-2019-197xx/CVE-2019-19761.json) (`2024-07-29T20:15:03.143`)
|
||||
- [CVE-2019-6162](CVE-2019/CVE-2019-61xx/CVE-2019-6162.json) (`2024-07-29T21:15:11.167`)
|
||||
- [CVE-2019-6164](CVE-2019/CVE-2019-61xx/CVE-2019-6164.json) (`2024-07-29T21:15:11.227`)
|
||||
- [CVE-2019-6174](CVE-2019/CVE-2019-61xx/CVE-2019-6174.json) (`2024-07-29T21:15:11.280`)
|
||||
- [CVE-2019-6185](CVE-2019/CVE-2019-61xx/CVE-2019-6185.json) (`2024-07-29T21:15:11.337`)
|
||||
- [CVE-2022-4038](CVE-2022/CVE-2022-40xx/CVE-2022-4038.json) (`2024-07-29T20:15:03.317`)
|
||||
- [CVE-2022-48185](CVE-2022/CVE-2022-481xx/CVE-2022-48185.json) (`2024-07-29T20:15:03.250`)
|
||||
- [CVE-2023-40396](CVE-2023/CVE-2023-403xx/CVE-2023-40396.json) (`2024-07-29T21:15:11.453`)
|
||||
- [CVE-2023-40398](CVE-2023/CVE-2023-403xx/CVE-2023-40398.json) (`2024-07-29T21:15:11.537`)
|
||||
- [CVE-2023-42918](CVE-2023/CVE-2023-429xx/CVE-2023-42918.json) (`2024-07-29T21:15:11.610`)
|
||||
- [CVE-2023-42925](CVE-2023/CVE-2023-429xx/CVE-2023-42925.json) (`2024-07-29T21:15:11.670`)
|
||||
- [CVE-2023-42943](CVE-2023/CVE-2023-429xx/CVE-2023-42943.json) (`2024-07-29T21:15:11.740`)
|
||||
- [CVE-2023-42948](CVE-2023/CVE-2023-429xx/CVE-2023-42948.json) (`2024-07-29T21:15:11.803`)
|
||||
- [CVE-2023-42949](CVE-2023/CVE-2023-429xx/CVE-2023-42949.json) (`2024-07-29T21:15:11.867`)
|
||||
- [CVE-2023-42957](CVE-2023/CVE-2023-429xx/CVE-2023-42957.json) (`2024-07-29T21:15:11.930`)
|
||||
- [CVE-2023-42958](CVE-2023/CVE-2023-429xx/CVE-2023-42958.json) (`2024-07-29T21:15:11.983`)
|
||||
- [CVE-2023-42959](CVE-2023/CVE-2023-429xx/CVE-2023-42959.json) (`2024-07-29T21:15:12.047`)
|
||||
- [CVE-2024-6620](CVE-2024/CVE-2024-66xx/CVE-2024-6620.json) (`2024-07-29T20:15:03.910`)
|
||||
- [CVE-2024-40811](CVE-2024/CVE-2024-408xx/CVE-2024-40811.json) (`2024-07-29T23:15:13.273`)
|
||||
- [CVE-2024-40812](CVE-2024/CVE-2024-408xx/CVE-2024-40812.json) (`2024-07-29T23:15:13.330`)
|
||||
- [CVE-2024-40813](CVE-2024/CVE-2024-408xx/CVE-2024-40813.json) (`2024-07-29T23:15:13.397`)
|
||||
- [CVE-2024-40814](CVE-2024/CVE-2024-408xx/CVE-2024-40814.json) (`2024-07-29T23:15:13.460`)
|
||||
- [CVE-2024-40815](CVE-2024/CVE-2024-408xx/CVE-2024-40815.json) (`2024-07-29T23:15:13.523`)
|
||||
- [CVE-2024-40816](CVE-2024/CVE-2024-408xx/CVE-2024-40816.json) (`2024-07-29T23:15:13.583`)
|
||||
- [CVE-2024-40817](CVE-2024/CVE-2024-408xx/CVE-2024-40817.json) (`2024-07-29T23:15:13.647`)
|
||||
- [CVE-2024-40818](CVE-2024/CVE-2024-408xx/CVE-2024-40818.json) (`2024-07-29T23:15:13.703`)
|
||||
- [CVE-2024-40821](CVE-2024/CVE-2024-408xx/CVE-2024-40821.json) (`2024-07-29T23:15:13.770`)
|
||||
- [CVE-2024-40822](CVE-2024/CVE-2024-408xx/CVE-2024-40822.json) (`2024-07-29T23:15:13.840`)
|
||||
- [CVE-2024-40823](CVE-2024/CVE-2024-408xx/CVE-2024-40823.json) (`2024-07-29T23:15:13.920`)
|
||||
- [CVE-2024-40824](CVE-2024/CVE-2024-408xx/CVE-2024-40824.json) (`2024-07-29T23:15:13.990`)
|
||||
- [CVE-2024-40827](CVE-2024/CVE-2024-408xx/CVE-2024-40827.json) (`2024-07-29T23:15:14.067`)
|
||||
- [CVE-2024-40828](CVE-2024/CVE-2024-408xx/CVE-2024-40828.json) (`2024-07-29T23:15:14.130`)
|
||||
- [CVE-2024-40829](CVE-2024/CVE-2024-408xx/CVE-2024-40829.json) (`2024-07-29T23:15:14.193`)
|
||||
- [CVE-2024-40832](CVE-2024/CVE-2024-408xx/CVE-2024-40832.json) (`2024-07-29T23:15:14.257`)
|
||||
- [CVE-2024-40833](CVE-2024/CVE-2024-408xx/CVE-2024-40833.json) (`2024-07-29T23:15:14.333`)
|
||||
- [CVE-2024-40834](CVE-2024/CVE-2024-408xx/CVE-2024-40834.json) (`2024-07-29T23:15:14.413`)
|
||||
- [CVE-2024-40835](CVE-2024/CVE-2024-408xx/CVE-2024-40835.json) (`2024-07-29T23:15:14.487`)
|
||||
- [CVE-2024-40836](CVE-2024/CVE-2024-408xx/CVE-2024-40836.json) (`2024-07-29T23:15:14.570`)
|
||||
- [CVE-2024-7248](CVE-2024/CVE-2024-72xx/CVE-2024-7248.json) (`2024-07-29T22:15:05.553`)
|
||||
- [CVE-2024-7249](CVE-2024/CVE-2024-72xx/CVE-2024-7249.json) (`2024-07-29T22:15:05.817`)
|
||||
- [CVE-2024-7250](CVE-2024/CVE-2024-72xx/CVE-2024-7250.json) (`2024-07-29T22:15:06.100`)
|
||||
- [CVE-2024-7251](CVE-2024/CVE-2024-72xx/CVE-2024-7251.json) (`2024-07-29T22:15:06.283`)
|
||||
- [CVE-2024-7252](CVE-2024/CVE-2024-72xx/CVE-2024-7252.json) (`2024-07-29T22:15:06.497`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `5`
|
||||
Recently modified CVEs: `19`
|
||||
|
||||
- [CVE-2024-38773](CVE-2024/CVE-2024-387xx/CVE-2024-38773.json) (`2024-07-29T20:07:57.597`)
|
||||
- [CVE-2024-38788](CVE-2024/CVE-2024-387xx/CVE-2024-38788.json) (`2024-07-29T20:19:47.727`)
|
||||
- [CVE-2024-5861](CVE-2024/CVE-2024-58xx/CVE-2024-5861.json) (`2024-07-29T20:32:37.267`)
|
||||
- [CVE-2024-6094](CVE-2024/CVE-2024-60xx/CVE-2024-6094.json) (`2024-07-29T20:20:51.257`)
|
||||
- [CVE-2024-6836](CVE-2024/CVE-2024-68xx/CVE-2024-6836.json) (`2024-07-29T20:20:30.867`)
|
||||
- [CVE-2023-27952](CVE-2023/CVE-2023-279xx/CVE-2023-27952.json) (`2024-07-29T22:15:02.630`)
|
||||
- [CVE-2023-38709](CVE-2023/CVE-2023-387xx/CVE-2023-38709.json) (`2024-07-29T22:15:02.800`)
|
||||
- [CVE-2023-38823](CVE-2023/CVE-2023-388xx/CVE-2023-38823.json) (`2024-07-29T22:15:03.200`)
|
||||
- [CVE-2023-45249](CVE-2023/CVE-2023-452xx/CVE-2023-45249.json) (`2024-07-29T23:15:09.877`)
|
||||
- [CVE-2023-52356](CVE-2023/CVE-2023-523xx/CVE-2023-52356.json) (`2024-07-29T22:15:03.340`)
|
||||
- [CVE-2023-6277](CVE-2023/CVE-2023-62xx/CVE-2023-6277.json) (`2024-07-29T22:15:03.530`)
|
||||
- [CVE-2024-2004](CVE-2024/CVE-2024-20xx/CVE-2024-2004.json) (`2024-07-29T22:15:04.373`)
|
||||
- [CVE-2024-23296](CVE-2024/CVE-2024-232xx/CVE-2024-23296.json) (`2024-07-29T22:15:03.750`)
|
||||
- [CVE-2024-2379](CVE-2024/CVE-2024-23xx/CVE-2024-2379.json) (`2024-07-29T22:15:04.493`)
|
||||
- [CVE-2024-2398](CVE-2024/CVE-2024-23xx/CVE-2024-2398.json) (`2024-07-29T22:15:04.563`)
|
||||
- [CVE-2024-2466](CVE-2024/CVE-2024-24xx/CVE-2024-2466.json) (`2024-07-29T22:15:04.697`)
|
||||
- [CVE-2024-24795](CVE-2024/CVE-2024-247xx/CVE-2024-24795.json) (`2024-07-29T22:15:04.000`)
|
||||
- [CVE-2024-27316](CVE-2024/CVE-2024-273xx/CVE-2024-27316.json) (`2024-07-29T22:15:04.113`)
|
||||
- [CVE-2024-27804](CVE-2024/CVE-2024-278xx/CVE-2024-27804.json) (`2024-07-29T22:15:04.233`)
|
||||
- [CVE-2024-38271](CVE-2024/CVE-2024-382xx/CVE-2024-38271.json) (`2024-07-29T22:15:04.757`)
|
||||
- [CVE-2024-38272](CVE-2024/CVE-2024-382xx/CVE-2024-38272.json) (`2024-07-29T22:15:04.883`)
|
||||
- [CVE-2024-4879](CVE-2024/CVE-2024-48xx/CVE-2024-4879.json) (`2024-07-29T23:15:14.650`)
|
||||
- [CVE-2024-5217](CVE-2024/CVE-2024-52xx/CVE-2024-5217.json) (`2024-07-29T23:15:14.807`)
|
||||
- [CVE-2024-6387](CVE-2024/CVE-2024-63xx/CVE-2024-6387.json) (`2024-07-29T22:15:05.043`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
169
_state.csv
169
_state.csv
@ -104111,7 +104111,7 @@ CVE-2017-3751,0,0,c41c9d0e86cb64e759d93cc477214289fe4f49aa1fb4d96d5b11e273a0d5a9
|
||||
CVE-2017-3752,0,0,3f8236cbe38b0aa5ddeef3557b818069efd51cfec3aca7f0740129c9136463df,2017-08-30T17:50:54.717000
|
||||
CVE-2017-3753,0,0,6885f1fb74ae8e4a5761a0d1dac9baf06044d26293188d3a7506faf2627bd3ac,2017-08-29T15:38:35.337000
|
||||
CVE-2017-3754,0,0,96ae0f4004c362ccca5d02bf206696913af7be90df8bb274095b6a747517ebe2,2019-10-03T00:03:26.223000
|
||||
CVE-2017-3755,1,1,e92739d2a7219c4732dba5514b0832bafea85263e5ec5c98f04ab62c7f2f6e8b,2024-07-29T21:15:10.993000
|
||||
CVE-2017-3755,0,0,e92739d2a7219c4732dba5514b0832bafea85263e5ec5c98f04ab62c7f2f6e8b,2024-07-29T21:15:10.993000
|
||||
CVE-2017-3756,0,0,260d30c8c73fd74ac6c7e878306c58ec6720fd1a02c0a3bb5ba4e21abe2b5fbd,2019-10-03T00:03:26.223000
|
||||
CVE-2017-3757,0,0,b1839a940d6313d174f67a23644a4304ae3563ec749eb548651d4e4c81e64a19,2017-09-12T15:49:33.527000
|
||||
CVE-2017-3758,0,0,1122b61558482a3cbb7dffcb3376a228b976a0e8f123dfbb03559b1ff35a6226,2019-10-03T00:03:26.223000
|
||||
@ -104122,10 +104122,10 @@ CVE-2017-3762,0,0,9e624e8954d672f2c74c3a1e3cc86593e8c364116dbf2c699d6121b9ab5624
|
||||
CVE-2017-3763,0,0,3299e98e83030c603b72768fa88233a271c613693111b81aa4394bf009196fad,2019-10-03T00:03:26.223000
|
||||
CVE-2017-3764,0,0,b5fbb53cd08bdf79eef899db5db7f7a6fa5716c49e4a934cde05faa7e5baf089,2017-12-20T19:04:30.500000
|
||||
CVE-2017-3765,0,0,45535ba4753e25ac3e37eb008b8251d1ae19b1cc923835055b3c96a33a9bcb6b,2018-02-06T14:12:49.383000
|
||||
CVE-2017-3766,1,1,34268b66911223769008ab0475dc157a0bcbc37cd4878eb729c7230928f7b401,2024-07-29T21:15:11.060000
|
||||
CVE-2017-3766,0,0,34268b66911223769008ab0475dc157a0bcbc37cd4878eb729c7230928f7b401,2024-07-29T21:15:11.060000
|
||||
CVE-2017-3767,0,0,b5f484a650273b6f905d1434fd97edea273c36678fa198859a1da78cc31c4b2f,2019-10-03T00:03:26.223000
|
||||
CVE-2017-3768,0,0,a9d3cdbe35d4cbde354522677133c37182e14896a4a819ed3c4de775f8191c22,2018-02-15T18:06:48.340000
|
||||
CVE-2017-3769,1,1,ee7156f2282f60586259b2c2663b47e1500fe186456c5cbb66a732b073afad8f,2024-07-29T21:15:11.107000
|
||||
CVE-2017-3769,0,0,ee7156f2282f60586259b2c2663b47e1500fe186456c5cbb66a732b073afad8f,2024-07-29T21:15:11.107000
|
||||
CVE-2017-3770,0,0,50498b73d2e169a119c833acc8e6884b909fe57fd2f88c994b613d01d5b79a15,2019-10-03T00:03:26.223000
|
||||
CVE-2017-3771,0,0,842fbd922aa5ab87bb1b786a79feb9336c4c27a9ebf45517f79af44ded7b2be3,2019-10-03T00:03:26.223000
|
||||
CVE-2017-3773,0,0,4f1c640be58fc5f21d6a63a5a68a2536a425a7f8d15f531f4f700289ecfd7ff1,2023-11-07T02:44:13.170000
|
||||
@ -136728,10 +136728,10 @@ CVE-2019-19755,0,0,576757e2e80399dccbdae0a683a118ad6db6a7bb95bf0a7d9944e6ac94367
|
||||
CVE-2019-19756,0,0,1ac0bdab62e30eb5ab1a78699b860a548408938df444dc2031b32d44e57bf16c,2021-11-02T19:16:30.403000
|
||||
CVE-2019-19757,0,0,6c08333c002f3e1b918b084afd5e3199189401eb1cffc5772a8ec918e1cd505b,2020-02-24T17:53:03.400000
|
||||
CVE-2019-19758,0,0,f3cf0ee2a978417eaa68c2b04df4207f79bbea00f53f54a34da27466d93768b8,2020-02-27T14:16:50.720000
|
||||
CVE-2019-19759,1,1,c73fa57cf1d4a71b74e43b73ed6f6925ccd11f73aa7004387830396e6043feeb,2024-07-29T20:15:02.963000
|
||||
CVE-2019-19759,0,0,c73fa57cf1d4a71b74e43b73ed6f6925ccd11f73aa7004387830396e6043feeb,2024-07-29T20:15:02.963000
|
||||
CVE-2019-1976,0,0,b8d808fbb262d28f23598cf45a4449f191ba6525e2a71abe6997a7ac93fe18a3,2020-10-16T14:12:47.730000
|
||||
CVE-2019-19760,1,1,9e5c9bc5d0b432b348f73233e37e2b945549620e6b96e24780b4cfd1943709b2,2024-07-29T20:15:03.067000
|
||||
CVE-2019-19761,1,1,ff1e415d3a5c791dc91d45d4d9c8b0ef11b2af0c7ca0d18a257a76b67c42d319,2024-07-29T20:15:03.143000
|
||||
CVE-2019-19760,0,0,9e5c9bc5d0b432b348f73233e37e2b945549620e6b96e24780b4cfd1943709b2,2024-07-29T20:15:03.067000
|
||||
CVE-2019-19761,0,0,ff1e415d3a5c791dc91d45d4d9c8b0ef11b2af0c7ca0d18a257a76b67c42d319,2024-07-29T20:15:03.143000
|
||||
CVE-2019-19762,0,0,feb988600c3fc6ca7d1a933280b0be01b94e3ac7fbb425729dfcea7e6ffd9601,2023-11-07T03:07:46.650000
|
||||
CVE-2019-19763,0,0,a0500b6440b16a5a1c2f0654d7e76553a99823fe0d847fa5827465e146d7f844,2023-11-07T03:07:46.963000
|
||||
CVE-2019-19764,0,0,d1e9c742359c37d5db227c8fbac2d9d2e61d282573b32d622f1d5729fb94a9f7,2023-11-07T03:07:47.273000
|
||||
@ -141045,9 +141045,9 @@ CVE-2019-6158,0,0,db2e2781e7ba231fa64c0d6f7f3025dc91189c92e16915bb1280bbb7743bf3
|
||||
CVE-2019-6159,0,0,6716deec9a9a136fb16a0ffbe7846839072001c97cdee984781cc2f46d237ef6,2023-03-29T16:23:13.830000
|
||||
CVE-2019-6160,0,0,b2d5dce84b00aaa04fc07f413ed16929038155671fb4f39c51535abe6481cb4e,2020-08-24T17:37:01.140000
|
||||
CVE-2019-6161,0,0,99cd0266289724d21255d7e9cfa2cc87b5efa2a874b60905ffab2ffe6eaae87f,2019-10-01T13:38:44.840000
|
||||
CVE-2019-6162,1,1,12368a95f492eb49b6d04a584fe5786db39a16d95f89a27258238e3d5dc131fb,2024-07-29T21:15:11.167000
|
||||
CVE-2019-6162,0,0,12368a95f492eb49b6d04a584fe5786db39a16d95f89a27258238e3d5dc131fb,2024-07-29T21:15:11.167000
|
||||
CVE-2019-6163,0,0,027c0edcbb45ae583db40ecd12ff52e73eba13c1a8256f46f27e2daedabee719,2019-09-13T19:15:10.510000
|
||||
CVE-2019-6164,1,1,fb0be18f71c39ed585bba818da6aab0bba8f749f2c70054d5f51df9739125284,2024-07-29T21:15:11.227000
|
||||
CVE-2019-6164,0,0,fb0be18f71c39ed585bba818da6aab0bba8f749f2c70054d5f51df9739125284,2024-07-29T21:15:11.227000
|
||||
CVE-2019-6165,0,0,6d179b5ca377e0b83e665ebd6910f73c7607e8fea52be8824995fe22e6f9c9c6,2023-02-02T16:12:47.457000
|
||||
CVE-2019-6166,0,0,ab677c9ea5d642a1e2b8423dd4fda786f41249e744894f3277ae11cc48081cac,2022-10-14T03:16:01.347000
|
||||
CVE-2019-6167,0,0,4d4d8ba42a1778d05302e4fbddb18543a4d71facfdb5cb7f949562ec29734657,2022-10-14T03:17:14.353000
|
||||
@ -141057,7 +141057,7 @@ CVE-2019-6170,0,0,f9abca4baf6d34b7b752a733554d53bd433ea5cab38f61027cee433cace7e3
|
||||
CVE-2019-6171,0,0,1c0cedf99197e5615db52b5825e8bae7ceb0533aa9af9cbb22e375671bda923c,2022-10-19T13:31:18.703000
|
||||
CVE-2019-6172,0,0,4dd7d7bc92cca79ec52e34a3a066f06d73f86817e25dd9c29869df14fc4876c1,2020-12-08T19:34:24.080000
|
||||
CVE-2019-6173,0,0,c3a794edcfbfeae5a309816c65d1d4070e27e4fb48bf5b6f040044efbf93f698,2020-06-22T15:32:04.143000
|
||||
CVE-2019-6174,1,1,c1026a4a4003c1810f92ae8bed6a48066f3801813c1d105df30c12b536451215,2024-07-29T21:15:11.280000
|
||||
CVE-2019-6174,0,0,c1026a4a4003c1810f92ae8bed6a48066f3801813c1d105df30c12b536451215,2024-07-29T21:15:11.280000
|
||||
CVE-2019-6175,0,0,b9ae54d8304dd7132011bb36f0cb0ec94cb982ffedbe169a883be8f42d1b032a,2020-08-24T17:37:01.140000
|
||||
CVE-2019-6176,0,0,cd029beefa2dcb154fa2a100d442f4e79058bcc75fe1dda8d900168e016668e2,2019-11-21T20:46:23.820000
|
||||
CVE-2019-6177,0,0,f883c040825cd6f9e94c9e8135bf040fd81c03540fd62110d930a256667693d6,2022-10-14T03:29:20.130000
|
||||
@ -141068,7 +141068,7 @@ CVE-2019-6181,0,0,796ed2285282dcbef326f51c4b1c2159381b26f117857ec4ff64b9077806ac
|
||||
CVE-2019-6182,0,0,54abd660fc93f3a87156acd4c96296d180651b62e80d1c7700a14f69f4fc44c8,2022-10-14T03:20:44.237000
|
||||
CVE-2019-6183,0,0,471187a22fe315f5a24b60bcb7fbcfab43426e78197ac569598348df4396cdac,2020-08-24T17:37:01.140000
|
||||
CVE-2019-6184,0,0,67da7c21e09f9811494a2f3e524833f2ee4f2aace057241287d38b3d40a16302,2020-08-24T17:37:01.140000
|
||||
CVE-2019-6185,1,1,228dcda793b8f7680d98bbf05b5314c55adae6c96d48b324bdceeb0dd43677fb,2024-07-29T21:15:11.337000
|
||||
CVE-2019-6185,0,0,228dcda793b8f7680d98bbf05b5314c55adae6c96d48b324bdceeb0dd43677fb,2024-07-29T21:15:11.337000
|
||||
CVE-2019-6186,0,0,0c244d9d313587d3a55ff5ca86df7dbd7694be6aeaebb9499ed628aeba413ecc,2019-11-22T01:08:15.587000
|
||||
CVE-2019-6187,0,0,9f3daa3a701d124fdb7e13a5de8263f3e10947d984243be3b09d688e97c1c371,2020-08-24T17:37:01.140000
|
||||
CVE-2019-6188,0,0,8c194678f0f298b6aca4ed9e27b16d62a15a8bd2b4a937efd68fb69c71a5a8f7,2020-08-24T17:37:01.140000
|
||||
@ -206130,7 +206130,7 @@ CVE-2022-40363,0,0,6423f008d6342ae2cc78b421a216227fd5616496935395403c04363593fde
|
||||
CVE-2022-40365,0,0,cccb355bc930a63d76ccf4edda04284e6432e8bb2daddd5b67c972ab54a0dc37,2022-09-16T19:27:25.667000
|
||||
CVE-2022-4037,0,0,f9bfdcdd7a52fa2ba84a650512e429bbca1eb66830ef1e3d5ef723ccfa5f4768,2023-01-20T15:34:23.423000
|
||||
CVE-2022-40373,0,0,b40950a62f31c60645353599eed93c867e8b30ad31aeed9332d5b03847c87a1e,2022-12-19T16:24:55.247000
|
||||
CVE-2022-4038,1,1,658fb7af30700ae89494d993bb6c362c23f5ff6bc5f8e3e97e6116b51c14faf2,2024-07-29T20:15:03.317000
|
||||
CVE-2022-4038,0,0,658fb7af30700ae89494d993bb6c362c23f5ff6bc5f8e3e97e6116b51c14faf2,2024-07-29T20:15:03.317000
|
||||
CVE-2022-4039,0,0,06b2484bc7b98d5624dca70127d033f0293995e2c6bd62ddc46e10485416b22b,2023-11-07T03:56:46.790000
|
||||
CVE-2022-40402,0,0,07221e21cc3b86eaea1c2aa42f779291ec2c4027c37a9d13f512ed9b452e0cf5,2022-09-27T04:55:48.947000
|
||||
CVE-2022-40403,0,0,2e90a1a52eb04792ffb948ebc6c233ad8804fe02fb818b40ffe367c3c2b856d5,2022-09-27T04:48:12.660000
|
||||
@ -211718,7 +211718,7 @@ CVE-2022-4818,0,0,efda42f09829854104f88653d6fb0c138476703b4f95d3761b4e08c8297d3f
|
||||
CVE-2022-48181,0,0,8474c885691c667425c24561d8f78dae5439ab49cb7f311d56f40947c953be1e,2023-06-13T19:34:14.697000
|
||||
CVE-2022-48182,0,0,d6534c9d85a0a5705048242e38159eac056a9605d6b5d2af1acd18f1a63ce69a,2023-10-12T18:37:01.287000
|
||||
CVE-2022-48183,0,0,94faee17e8c16e496e7c5e93f974ef6ee83c64e3e512d3af5b7ecf56ec8ec9ec,2023-10-12T18:36:54.013000
|
||||
CVE-2022-48185,1,1,9451f4ac867155c4c8d32d4210d33c6d7b338c30a64c818a3837462f1bf550e7,2024-07-29T20:15:03.250000
|
||||
CVE-2022-48185,0,0,9451f4ac867155c4c8d32d4210d33c6d7b338c30a64c818a3837462f1bf550e7,2024-07-29T20:15:03.250000
|
||||
CVE-2022-48186,0,0,45597050fd15461922f8e20a35c354618461ad4684fd2b360fd9ec3fd80dbd81,2023-05-09T20:16:38.417000
|
||||
CVE-2022-48187,0,0,ff1590e9a690fb0ae260adde2c69973167f534b3795163c9e5f0527961fbe91f,2023-11-07T03:56:29.847000
|
||||
CVE-2022-48188,0,0,1e9d177db03926434670d4fa3d381984ab7fc2522bdcb986b41da06206088453,2023-06-13T21:19:19.467000
|
||||
@ -220766,7 +220766,7 @@ CVE-2023-27949,0,0,944faf80b76c50b74dc9f86e54418c3639db6dde85f7c8b3b133bec768bc1
|
||||
CVE-2023-2795,0,0,9ad05231de618cab902152898f9f0ae4ae98137a6dc5971cb73675b90e785ded,2023-11-07T04:13:20.667000
|
||||
CVE-2023-27950,0,0,feb689a552dec920776bdc5fd711a87a696d8738fa7aecc419d3821172950278,2023-09-08T15:48:43.720000
|
||||
CVE-2023-27951,0,0,07a8ad9c973513f5c325e744ef00500a0159b771326db5c192813f47eada229a,2023-07-27T04:15:19.403000
|
||||
CVE-2023-27952,0,0,667b31af1f5284a8224d57dd8528db25020aa768603ab7b2b81266a9b33dfacb,2023-07-27T04:15:19.543000
|
||||
CVE-2023-27952,0,1,c849c263ca6930acc9a6872a34912c54f9b71518a672fa0eaf54060adcd764fd,2024-07-29T22:15:02.630000
|
||||
CVE-2023-27953,0,0,db7677358cfada1374a2084252ff651805fd9c27cc8716e644cdc58ca7909025,2023-07-27T04:15:19.687000
|
||||
CVE-2023-27954,0,0,86ec702ff6bf2ca2eeaf185b6dc647ac5fa3bd57e022135f73fe1a29c5ca66a2,2023-07-27T04:15:19.933000
|
||||
CVE-2023-27955,0,0,197d65afc1fcce777628be2cabccd5c3e41f2fff9260001ce4394d261ba19db5,2023-07-27T04:15:20.063000
|
||||
@ -228997,7 +228997,7 @@ CVE-2023-38704,0,0,e8f61e669641b4541b9dead34f29bdaa6050ad5483b1650192a2a7fffecb7
|
||||
CVE-2023-38706,0,0,f3b7a28d99df82bfb4b65abf6b7ea5765da2d19f9dab4e40045ea292dfc87d75,2023-09-20T19:59:40.533000
|
||||
CVE-2023-38707,0,0,9347e60d24d7ba37513b78e42026dca258290cd85b3a3ac2815752767f123f99,2023-11-07T04:17:23.830000
|
||||
CVE-2023-38708,0,0,34b544bf48e1f9934c27a77b390dffc52ab8cd8bf31c3289afb5eb9e239abd11,2023-08-09T16:15:56.907000
|
||||
CVE-2023-38709,0,0,5fe10cdc0a92b04952b23a0dc4a6a25f0424e3048a272e021736b407505a8983,2024-06-10T17:16:12.647000
|
||||
CVE-2023-38709,0,1,f340467c92c022f961e84b4f91cf5aa415ed1b501bd2bfa8ac670b7def6e1b99,2024-07-29T22:15:02.800000
|
||||
CVE-2023-3871,0,0,b63a6f980224e42fe5cec7ad5cf482968e70b380f7a48c7c40b58a1e34ebf7b7,2024-05-17T02:27:54.960000
|
||||
CVE-2023-38710,0,0,1a53a43418ab06aa38abdb8383b4db665cd5dd79b4ddecbb9e27a105cfd1fc62,2023-12-11T19:34:38.997000
|
||||
CVE-2023-38711,0,0,d83687734955dc99b560e3e7b1db054c0db054a346c91e162d4f81a073993ace,2023-12-12T13:52:11.970000
|
||||
@ -229062,7 +229062,7 @@ CVE-2023-38814,0,0,9aac3e73f3dea67ff499610adc8aebc4b1bdfe7348e3a0c13ce93d8235db4
|
||||
CVE-2023-38815,0,0,64c2f1cafe170788d2dae17acd97f143483ea35d344d1c405785fd711091d743,2023-11-07T04:17:24.550000
|
||||
CVE-2023-38817,0,0,02f08d8764e58ddff92f8e71f36696396282f0c973dbc17473db3d1e17ca402b,2024-07-09T18:15:08.577000
|
||||
CVE-2023-3882,0,0,9718e1f58a19c190f2b6dde660ada479b6caee0f419bab2f92a01d8ef1d1c033,2024-05-17T02:27:56.237000
|
||||
CVE-2023-38823,0,0,26d29675a5e84bfb0c856c8d7f7d027ef66693c5118506098df2f708c99ee394,2023-11-28T22:02:33.013000
|
||||
CVE-2023-38823,0,1,12b5bce357005cd17e55ba4fde9aeb3463513dd0698d17dc4225732b578c45a9,2024-07-29T22:15:03.200000
|
||||
CVE-2023-38825,0,0,ac97f5cf8dd7bce10fc69be98839c094a86ce9979a52853cf9d5c403f72cab08,2024-03-21T12:58:51.093000
|
||||
CVE-2023-38826,0,0,8ff5f457fccec1f91d2c727b83fd1b215cb0cb1f56602e1deed062bd46c7f82e,2024-01-03T22:54:24.607000
|
||||
CVE-2023-38827,0,0,f54704191f2a7b8aca2114c6e95cb655be16715db44f89dbfa31fbeb928e6e0a,2024-01-16T18:57:56.167000
|
||||
@ -230273,9 +230273,9 @@ CVE-2023-40392,0,0,b54a0d5914b9186321a665f5b2009e1d4bda632c5b381d56f487e57d220d2
|
||||
CVE-2023-40393,0,0,e0720121847159abda778d2f646c0c7e848f8bc72fbac40185b3c98f6a69162e,2024-01-17T18:30:39.897000
|
||||
CVE-2023-40394,0,0,526da955586233b1a7b2dc9d999b1f0be86354cdad86453374676f9733b0041a,2024-01-18T14:31:24.653000
|
||||
CVE-2023-40395,0,0,8951a0da5934955ebf0f075ae9e557422fd4c66d3267f9876fe4bc4a0543d4dc,2023-11-07T04:20:13.073000
|
||||
CVE-2023-40396,1,1,d6752cd7a4f5887d72b9410a9baa5f59ca3a082ed6903a7d64ce47cde737412c,2024-07-29T21:15:11.453000
|
||||
CVE-2023-40396,0,0,d6752cd7a4f5887d72b9410a9baa5f59ca3a082ed6903a7d64ce47cde737412c,2024-07-29T21:15:11.453000
|
||||
CVE-2023-40397,0,0,48f5d35694eda11e063d524064bdc097e2aab2bd9e9d13544e89fbc0b53f0c7b,2024-01-05T14:15:47.920000
|
||||
CVE-2023-40398,1,1,a8b3b99a6c0f2bf3869bd949fe9b38fccdedf4ff103dc8f1b205b13e8bd91b85,2024-07-29T21:15:11.537000
|
||||
CVE-2023-40398,0,0,a8b3b99a6c0f2bf3869bd949fe9b38fccdedf4ff103dc8f1b205b13e8bd91b85,2024-07-29T21:15:11.537000
|
||||
CVE-2023-40399,0,0,091e5a2db15fd5f665ca444b78b62be5004d4abcf322f2dee4eb3017386c844e,2023-11-07T04:20:13.200000
|
||||
CVE-2023-4040,0,0,e11728f161945388107c8ae43690a4d8736e1afb7e958f898d615bcdea0c7a50,2023-11-07T04:22:04.223000
|
||||
CVE-2023-40400,0,0,40794a10c4c9163312504f098de9ecd9780321feca619f02675db3767c324753,2023-12-22T16:10:51.593000
|
||||
@ -232196,14 +232196,14 @@ CVE-2023-42914,0,0,f5f29cd9efb0b6e902e417bba37ba297b7c917356de5179adf80ab896d374
|
||||
CVE-2023-42915,0,0,a491c801967ea665e6a1e7894d12e52fc0e3bc74c17c4ea7b2e5a98e97053fd8,2024-02-14T03:15:13.210000
|
||||
CVE-2023-42916,0,0,fb420376f2574e0c95f9ff3cb36f6c359496786a1c3b0d46b831510c60b8804d,2024-07-03T01:41:31.913000
|
||||
CVE-2023-42917,0,0,15549d591e10c4a0f8e1ae1b9de5e6d4081ffb5c46b1b7c185d2789ea21a2acb,2024-06-26T20:01:23.280000
|
||||
CVE-2023-42918,1,1,ac21c0fcce55bc3ae0926ccfbebdf5bf10c71e98b0550ecae108153c2300a377,2024-07-29T21:15:11.610000
|
||||
CVE-2023-42918,0,0,ac21c0fcce55bc3ae0926ccfbebdf5bf10c71e98b0550ecae108153c2300a377,2024-07-29T21:15:11.610000
|
||||
CVE-2023-42919,0,0,f9a3b1dae89bc9cf392d1cf8dea65cc44606d99a0ff0603d430f6ace7681b3a7,2023-12-14T14:08:16.317000
|
||||
CVE-2023-4292,0,0,3ea59f0e5840e07b56bc2aae1b281e2ab80136b2b379398236c012d0899a4d88,2023-09-22T13:48:01.647000
|
||||
CVE-2023-42920,0,0,967029ebc9d2fa13e49b3b2a7e43266d0af79ef15d4513e03a7c68b3187f308f,2024-03-20T13:00:16.367000
|
||||
CVE-2023-42922,0,0,d462ec8a37d9ad76a8353a6b4d7d79094fede2b875e86ffc84e579e57a42a188,2023-12-14T14:05:30.140000
|
||||
CVE-2023-42923,0,0,2718c43e187a8424615b9f8de717d1e9605fa64e6eb699c03e6b09fc5d5d64d5,2023-12-13T21:19:46.137000
|
||||
CVE-2023-42924,0,0,ee67d224e135add0a3ebe533e99aadef1fb79612269a77d92db5afc056caa779,2023-12-13T21:17:10.803000
|
||||
CVE-2023-42925,1,1,7f5756665c935d986aa32de37edc3c48523a8f96d6401bb1bca180e48e9013ff,2024-07-29T21:15:11.670000
|
||||
CVE-2023-42925,0,0,7f5756665c935d986aa32de37edc3c48523a8f96d6401bb1bca180e48e9013ff,2024-07-29T21:15:11.670000
|
||||
CVE-2023-42926,0,0,10536a0e5d0896ff760b50cd54c1cef47c09b911f9aeabee54318eada99b22f1,2024-02-02T03:11:34.350000
|
||||
CVE-2023-42927,0,0,14031071501231274e24e297950a9bf2d187da6694c43ed89fc9fa105221fcbf,2023-12-20T17:15:08.377000
|
||||
CVE-2023-42928,0,0,0f96803af50c6bf772f0d2998c444df6f973590aa281ef5d0e5f7a9046ef4c87,2024-02-22T19:07:27.197000
|
||||
@ -232223,12 +232223,12 @@ CVE-2023-4294,0,0,38ff20ab6e7f39daf98662734eba5d7abaeaa55eac46be3d5953e77ce63f80
|
||||
CVE-2023-42940,0,0,d1747dccf9be170d7d2459f45012020f08d4eb5ce17698d439f59de70dd43655,2024-01-04T14:56:32.530000
|
||||
CVE-2023-42941,0,0,07ef4c50d699b2c4d697e69c7eba84c968b3abecdc0454485729209830f2d05b,2024-01-16T23:54:14.273000
|
||||
CVE-2023-42942,0,0,47b3808be894c1e814ff21abb00505dba924600cc2ad1b2661621841b4e6dcc5,2024-02-22T19:07:27.197000
|
||||
CVE-2023-42943,1,1,f6d5d7e883a22d5910d1e1d3956b5aff761b61d6b9d83a08708a57e110d1b88b,2024-07-29T21:15:11.740000
|
||||
CVE-2023-42943,0,0,f6d5d7e883a22d5910d1e1d3956b5aff761b61d6b9d83a08708a57e110d1b88b,2024-07-29T21:15:11.740000
|
||||
CVE-2023-42945,0,0,a06b1aec09c4d06c83c2ecc43e93c97ac1de84ec55101d5962c5f9ba2c7586a9,2024-02-22T19:07:27.197000
|
||||
CVE-2023-42946,0,0,cc0d621d8703ec59422ebc54c6cd13379fdeace179303d8f3bcd98bed0924a19,2024-02-22T19:07:27.197000
|
||||
CVE-2023-42947,0,0,463a7c288ca72ceb5a42872b2d94a5ff7e5b5024cc13eee6b8c843ca1541a18d,2024-04-08T22:47:21.010000
|
||||
CVE-2023-42948,1,1,096cc4f0f8df892a53138a76d1c11c3301eb9cb58b0b6660631b21d836e00f0f,2024-07-29T21:15:11.803000
|
||||
CVE-2023-42949,1,1,474e9d0b9f738b6e5107bf957a3b7c8719ccc30684a627c9c05cb8b4eb2a2179,2024-07-29T21:15:11.867000
|
||||
CVE-2023-42948,0,0,096cc4f0f8df892a53138a76d1c11c3301eb9cb58b0b6660631b21d836e00f0f,2024-07-29T21:15:11.803000
|
||||
CVE-2023-42949,0,0,474e9d0b9f738b6e5107bf957a3b7c8719ccc30684a627c9c05cb8b4eb2a2179,2024-07-29T21:15:11.867000
|
||||
CVE-2023-4295,0,0,ec334b74dcc01539baa3eed8300f24e0d43c22b250be6de255e7d71ca4f97cb4,2023-12-28T17:14:36.030000
|
||||
CVE-2023-42950,0,0,7d5905ff324fe033699a11a15d8566fd52354d2018009bfba134ef93fd3c72e7,2024-06-12T10:15:27.083000
|
||||
CVE-2023-42951,0,0,5599d72d1055314191c8db46df9d7c3c52edb7a93dbd3fb4d584b453f42b45e7,2024-02-22T19:07:27.197000
|
||||
@ -232237,9 +232237,9 @@ CVE-2023-42953,0,0,10e4b94939ee0a7c816d850e4e7befeb67bf5108acf30f852eb067399e688
|
||||
CVE-2023-42954,0,0,065c350829c9b241771d1bca2f08dbf3f9951aa86fb8dbf545b8b0f102b1a850,2024-03-22T12:45:36.130000
|
||||
CVE-2023-42955,0,0,048bd99f0ab58fd5fb77045b6c0168d4d4fb97b035ea28ad7d10928caea120b4,2024-07-03T01:41:33.800000
|
||||
CVE-2023-42956,0,0,66b0dda941d2a4925cbdb9e601d4277739f51c5e0165d598d707e4a6d9b3fb9b,2024-06-12T10:15:27.210000
|
||||
CVE-2023-42957,1,1,d24fbe1f9b92907f4a10436deb8f6c75bdc1c1ea674bb2720e77764ea20251b5,2024-07-29T21:15:11.930000
|
||||
CVE-2023-42958,1,1,4fc62e668da46c99991dded531c220534c006dab4b194ea4cf8d5e395788b722,2024-07-29T21:15:11.983000
|
||||
CVE-2023-42959,1,1,0f86f809cdd468ac9c734cb41f847ae78a24bbc25a6806b2d0e30fb9854064a3,2024-07-29T21:15:12.047000
|
||||
CVE-2023-42957,0,0,d24fbe1f9b92907f4a10436deb8f6c75bdc1c1ea674bb2720e77764ea20251b5,2024-07-29T21:15:11.930000
|
||||
CVE-2023-42958,0,0,4fc62e668da46c99991dded531c220534c006dab4b194ea4cf8d5e395788b722,2024-07-29T21:15:11.983000
|
||||
CVE-2023-42959,0,0,0f86f809cdd468ac9c734cb41f847ae78a24bbc25a6806b2d0e30fb9854064a3,2024-07-29T21:15:12.047000
|
||||
CVE-2023-4296,0,0,3d00ed163c8e5c949ecd1a08dbe73fb55471b00b7765a672fc6fbeae6eca925e,2023-11-07T04:22:26.050000
|
||||
CVE-2023-42962,0,0,35794e89578ee19a4b7d15e17dbc849654eef14cc3d488dadb444cc2c1961a1a,2024-04-08T22:47:42.510000
|
||||
CVE-2023-4297,0,0,047ed4f9023e2ddaed83a6b2684e12e7cb9df8581e91d1a9b5f1e7175f976ace,2024-07-12T16:11:19.193000
|
||||
@ -233642,7 +233642,7 @@ CVE-2023-45245,0,0,f71f5550bce318c5896855b0720ef3b014b7edad826762736cbbe2c3e48a3
|
||||
CVE-2023-45246,0,0,6799976449efb5e7dfbd39ca49c91e79edc135b105c217fc842128d098ea333b,2023-10-11T17:20:21.937000
|
||||
CVE-2023-45247,0,0,cf730bce8af4196d54c7fa8e0341f517de223cc02208e0ec0dd8e04054077116,2023-10-11T19:06:49.937000
|
||||
CVE-2023-45248,0,0,cde75e840aad96dac96b2f35c9e6f15ef3cf04deb0931c7f7ba39cfb3ca21688,2024-02-27T17:15:10.327000
|
||||
CVE-2023-45249,0,0,3cf14811a2b45b8e31cbb5e7cfa40d83d5d729bf0b0c56d3f2d80dc651a38108,2024-07-26T12:48:15.370000
|
||||
CVE-2023-45249,0,1,1bc9ce809ecf314861ecbfa8f85f135583f2993914971c1bf11334a02b51e3f3,2024-07-29T23:15:09.877000
|
||||
CVE-2023-4525,0,0,5bf42f67193da0102cbdfa0f5eae1107ad391f3088f5c3d8fcbbf1b1f9dc9ba6,2023-11-07T04:22:41.327000
|
||||
CVE-2023-45251,0,0,9301cd01cf0e1a09a624bf8b6813dd7dcd8b5641f21dfda46acef47990364d11,2023-12-26T18:15:08.030000
|
||||
CVE-2023-45252,0,0,307228454f587d0983793c9bfdd500c095874fad12af348d470cff72f1f8a6d2,2023-12-08T18:45:28.017000
|
||||
@ -238544,7 +238544,7 @@ CVE-2023-52352,0,0,5e107ecf2b7a6400f671cc5a9a0f89213e61b31027cc0ebaefad36aa04e25
|
||||
CVE-2023-52353,0,0,c85321a66aa40615f097e7c4b005042b61f142e80160f23edcb6164f859777c0,2024-01-29T15:53:20.917000
|
||||
CVE-2023-52354,0,0,b83a0ae26910aeb4d8be73792a9bb48b3e532279f0f31aeebd210df1fbcb691b,2024-01-29T16:56:40.830000
|
||||
CVE-2023-52355,0,0,461ea908f7dd6b61786b879539aa67641b818dbc1dc97626ddbece62684b7542,2024-05-17T17:37:57.793000
|
||||
CVE-2023-52356,0,0,c1a260f7f038d28c1e0dd6374157023869a940cc7b6d8bf5c486caa60203e908,2024-03-11T13:15:52.753000
|
||||
CVE-2023-52356,0,1,45849d7a53226b08b6d7c576627d21243ff7e01dedeeea45ce339b329398ce52,2024-07-29T22:15:03.340000
|
||||
CVE-2023-52357,0,0,26288d103cd637bbcda04e71a721251665a0c23a32b663f57db1b9fc577e9b50,2024-02-20T19:50:53.960000
|
||||
CVE-2023-52358,0,0,0a9b9b1ce599c5b6e28af28108c550a9307f5fa18440515cf987b65d0e1a3c4d,2024-02-20T19:50:53.960000
|
||||
CVE-2023-52359,0,0,c42a0504fa8d5279c90e2ecc0d752e3045b67971944e9a1090f1657f4d4452b1,2024-04-08T18:48:40.217000
|
||||
@ -240006,7 +240006,7 @@ CVE-2023-6273,0,0,bfe15761d0e2bb921ed3c0d0c2c36c03a1656966fe638d3401638d2cebdb26
|
||||
CVE-2023-6274,0,0,4f530dd28ac44051dca761bb89d18362b76653c5f1bd1f7f9a0b0b7fc6974e6b,2024-05-17T02:33:36.680000
|
||||
CVE-2023-6275,0,0,1df4a2d506677de951981566edaf40c947c0fb87ae017e4f3b204b0bc3f9bb45,2024-05-17T02:33:36.787000
|
||||
CVE-2023-6276,0,0,24c3dc4dd47e004cfc2d394ab4aa6804146bc09890750cb25a878e0ee9940b41,2024-05-17T02:33:36.890000
|
||||
CVE-2023-6277,0,0,e64598bc4845ef933a63cfce11b44a1186885c79098ccf9efb29eb3604a2126f,2024-01-19T16:15:11.057000
|
||||
CVE-2023-6277,0,1,33cbd357819d72228e36155bc3bfe5ff1303c021d43ad9d4ccf58c3dc2c4d083,2024-07-29T22:15:03.530000
|
||||
CVE-2023-6278,0,0,c78b8d879da1ce114b8d36c4602cd8be742dae98eec5ce3b7337c3170b6a2e43,2024-02-03T01:23:05.233000
|
||||
CVE-2023-6279,0,0,058b7b47599ec599cdb9a002a2c8fd40321be5fd43b36531af9da360a427c486,2024-02-03T01:22:07.893000
|
||||
CVE-2023-6280,0,0,87ee32c86b2c6404c104c84ee2fafd835c9be3dfccae6ec09e648330480cc30f,2024-05-17T02:33:37.093000
|
||||
@ -242694,7 +242694,7 @@ CVE-2024-20036,0,0,a842a455104cefb6335a12470cf3ea09e402c164144afb30609fd627a5d8a
|
||||
CVE-2024-20037,0,0,9c45a018c7c075a8a97c9a68674f13d53eed1650b73e588cabb51078922b13c9,2024-03-04T13:58:23.447000
|
||||
CVE-2024-20038,0,0,b24fd54a338c5bcd125b3ff0e1aa517302167214bb3333a900e600b4cd1318a8,2024-03-04T13:58:23.447000
|
||||
CVE-2024-20039,0,0,68d71d9533ee3a71787cbfe2ab34478818f0903af4255681b79317a3506c2dcd,2024-04-01T12:49:09.583000
|
||||
CVE-2024-2004,0,0,986b9069f0e16c9cad75d0af17c842c0acbddb79c7dfed57e096aa6b1b17c80f,2024-07-03T01:52:57.560000
|
||||
CVE-2024-2004,0,1,ed66cd00a62a4714c38518303868d9d029bdeae31c990354a09ca3981351c2e6,2024-07-29T22:15:04.373000
|
||||
CVE-2024-20040,0,0,7794263a0ff9ef7a9a293c11fabe2693e4a31f8e28a938c194a6c9b335ae777e,2024-04-01T12:49:09.583000
|
||||
CVE-2024-20041,0,0,797b0699213b143be2b5cc6707e3db6951b01d8acd1047588c4a44bd9a512123,2024-07-03T01:45:50.520000
|
||||
CVE-2024-20042,0,0,32382b46cafc275eb8cb8740c3ccddf6582487704ec09b63083a965b2c45f6dc,2024-07-03T01:45:51.343000
|
||||
@ -244760,6 +244760,7 @@ CVE-2024-23258,0,0,52aef1e9d6cc8d17d23b996b2711a0df58dc5d1ea500a1b8fa34d0615dc37
|
||||
CVE-2024-23259,0,0,32180f50b016e600303bef490f7c44972cd0819551854177dd2a129ee13314e5,2024-03-13T21:15:57.180000
|
||||
CVE-2024-2326,0,0,3c8b37146da325cce38aec51267ca4284760cd42c72a832b281add7789332b70,2024-03-25T01:51:01.223000
|
||||
CVE-2024-23260,0,0,cfbcfeb19854283a9e5066e6e8e5e90d2605569101e96973822703b992d8a487,2024-03-13T21:15:57.227000
|
||||
CVE-2024-23261,1,1,fbd4fb6f0575c693de6014b4bec875b5d16de5ef425017e845bbb2dbae55281e,2024-07-29T23:15:10.037000
|
||||
CVE-2024-23262,0,0,62d9ca66899810aa5c6562616e9cb31025a85566f240255b691a56f330edff70,2024-03-13T23:15:46.790000
|
||||
CVE-2024-23263,0,0,d226157fc33b45c7e307e7b0bb570cfcc69dc1555ae79726ac7dbaf98cfcacab,2024-07-03T01:47:42.140000
|
||||
CVE-2024-23264,0,0,e8679cdfb620ed4032710b82b0ab29602601551c60ac1c22de87e1638374eb53,2024-03-13T23:15:46.883000
|
||||
@ -244797,7 +244798,7 @@ CVE-2024-23292,0,0,f5276fc6b99c3fe604590c2b2122f4a436bc2bab6e0ae212225461a31d58c
|
||||
CVE-2024-23293,0,0,985096bd22ec764c85e903a49a99ed4147dd2d751c79968ad916db545194c1db,2024-03-13T22:15:11.390000
|
||||
CVE-2024-23294,0,0,100c10a3131c32be888e04553bed37c2d7a75d8b5d5a64c5c5fd47cdad6c9eab,2024-03-13T21:15:58.733000
|
||||
CVE-2024-23295,0,0,f60b5b481bcc709a0e07818ec60448a8b8255b454dac1f32e5ff0b3a390550bb,2024-03-13T23:15:47.630000
|
||||
CVE-2024-23296,0,0,12a1de3d62ca79ef989249cb1e691420221912e9533cad73e61bbc1dd756eb30,2024-07-03T01:47:43.840000
|
||||
CVE-2024-23296,0,1,98ad16ed19ceb98a774f2fcc724aad9a1d938302930707577ef753cfcbd775c5,2024-07-29T22:15:03.750000
|
||||
CVE-2024-23297,0,0,dfd56967bab57b4e450ebc4d5ffd5b8e085c43f2dc7ce30d6472eb920ff02a80,2024-03-13T22:15:11.520000
|
||||
CVE-2024-23298,0,0,a565b18965c275606ac8348acd9993cb8bd15ff52c9c70b79da019a948d277e6,2024-03-17T22:38:29.433000
|
||||
CVE-2024-23299,0,0,c511e81be43ab0bab76e86bc6db7a8fc5840f12996fc93f1ff034882f594ee51,2024-06-12T18:03:36.960000
|
||||
@ -245155,7 +245156,7 @@ CVE-2024-23786,0,0,a4843821edc7301dc3896b1dc41942f9a7cad1c9811616d65b63499b1903e
|
||||
CVE-2024-23787,0,0,1cebbe4231b42e35699eed5d7dba409232d884bafafb6cdea00ae172adf3e7de,2024-02-14T13:59:35.580000
|
||||
CVE-2024-23788,0,0,6c6993e63ac258c815c0d6f15d7560f4b8732b4638909b422908e0ecb34bd923,2024-02-14T13:59:35.580000
|
||||
CVE-2024-23789,0,0,eb24c8fd06c4dc0c79533f62c1520b9bd32813c0e2c7e43d74bbd067c1f01e08,2024-02-14T13:59:35.580000
|
||||
CVE-2024-2379,0,0,12e7ac3667f07b307742fd31fb389abc47f3b2c366b2df97007dd8bb9fef8142,2024-06-10T16:15:13.173000
|
||||
CVE-2024-2379,0,1,4ca7e42dfc5c22096910545f76bab2426f3be8f64dd8d351f8e628dcaa942948,2024-07-29T22:15:04.493000
|
||||
CVE-2024-23790,0,0,10fd61ba3db4d7c66d81b3afd519574867d168f5ef59d8caac21df5f30755ae0,2024-02-02T02:07:58.653000
|
||||
CVE-2024-23791,0,0,244621ff2d433005513b939ef7ab8ae44d25c483ec850474bc054b795de67574,2024-02-02T02:07:28.850000
|
||||
CVE-2024-23792,0,0,f34fcbde7640056d2156c42bbb24f1d1b396f26de8a742cdc375ac91a383f3c8,2024-02-02T02:07:40.577000
|
||||
@ -245300,7 +245301,7 @@ CVE-2024-23975,0,0,8574349dfa5f2a0fe4ae15f83d2f9c7c0823899e45c716a2ca2f4f60ae30f
|
||||
CVE-2024-23976,0,0,16acbea1fb543126c77bcb211c592f37e28d378e3cd2df50f24701a7caca7cb3,2024-02-14T18:04:45.380000
|
||||
CVE-2024-23978,0,0,5bee98426b560d02600c1690e08516003e9bd0e42643648505946247e075278a,2024-05-17T02:36:41.847000
|
||||
CVE-2024-23979,0,0,6fdd5509f38519be7582661a9525c018d02e080bbc0d3ec491dc3a617317722d,2024-02-14T18:04:45.380000
|
||||
CVE-2024-2398,0,0,0f4a48da0ead4f20c3af2704d87468d8abca50984f056bab845a2786b3e742c6,2024-07-03T01:53:12.523000
|
||||
CVE-2024-2398,0,1,2df48c721cfb060432be4d236c44ca083dd8ee77c5818324eaea9a325822973e,2024-07-29T22:15:04.563000
|
||||
CVE-2024-23980,0,0,bf2b71f939973eb2601ccef55cf253f9d61b06b906f33487d035e08b35f3546f,2024-05-17T18:36:05.263000
|
||||
CVE-2024-23982,0,0,e20dba7ecea0c7b0131ca1d7f8e3faacb630088896c2abfd0452f78392132abf,2024-02-14T18:04:45.380000
|
||||
CVE-2024-23985,0,0,8249d0d4805632d5c5b5c3e0e9d62d8a14497ce894e5db21c14ac796aaeb2e32,2024-02-01T17:33:41.777000
|
||||
@ -245588,7 +245589,7 @@ CVE-2024-24623,0,0,1416328fef44b3dca34f3b6ab49045c4173158618d91fb7f567b860695bb9
|
||||
CVE-2024-2463,0,0,24deeeee766ad4a5a7424dba127cb4cbbe9e946086a31f7db9b5902aa6111178,2024-03-21T15:24:35.093000
|
||||
CVE-2024-2464,0,0,5ff7c9aac18d394d4849e149117cdc80dedc6fee12e8baf9893132cc38ce131f,2024-03-21T15:24:35.093000
|
||||
CVE-2024-2465,0,0,6230da2d3a7d355f9109bcbe86ce790145cd318aa89b33fca16121fe02380d5a,2024-03-21T15:24:35.093000
|
||||
CVE-2024-2466,0,0,d02d057413d73b505fec664a2e7d80aa1c2fd4efc63e92bd5dbe2492eb6a6db9,2024-05-03T13:15:21.893000
|
||||
CVE-2024-2466,0,1,6b3dd9237aa20b4b2f20cb9811624ae879351b8bde3e76e921ba5d522e67c2d6,2024-07-29T22:15:04.697000
|
||||
CVE-2024-2467,0,0,9bcf217419e076743a229c7d9329553030b624f85cef7b05ba0694abd37301e6,2024-04-25T17:24:59.967000
|
||||
CVE-2024-2468,0,0,f5fa0f4e21305851a5ed43e2730a4e0c2e70e0ee8b201aed06c129c3eb28843c,2024-03-25T01:51:01.223000
|
||||
CVE-2024-24680,0,0,5e88d8a3de6deb02cd3bb72094ef29806d18a6b5b891345f7494f12256a199a7,2024-04-20T03:15:06.820000
|
||||
@ -245692,7 +245693,7 @@ CVE-2024-24791,0,0,47d95c50753471e151a6eea3dba3db3a2ed137995344fbfddcc8757be9c73
|
||||
CVE-2024-24792,0,0,f69bae6aeabc0bd1864687cbecc00a414d65f449f6042a0a0606e99652942d2a,2024-06-27T19:25:12.067000
|
||||
CVE-2024-24793,0,0,349151d270c21b594bab79bdfa0af81cee9b2c5e85b1f357f09ce5695483cbcc,2024-02-20T19:50:53.960000
|
||||
CVE-2024-24794,0,0,2ec7aaa5fb034c52f8b00845d9c4c8227ed450c5193d69bd944efff082e59c10,2024-02-20T19:50:53.960000
|
||||
CVE-2024-24795,0,0,df5b2f0124975b34046fdd165c37965a95f26001139b404a1152bec012a6fee9,2024-06-10T18:15:27.003000
|
||||
CVE-2024-24795,0,1,8b96800f98f97e666dc2b89bddc7d365031a992307d47d2b82e462dc83917a6b,2024-07-29T22:15:04
|
||||
CVE-2024-24796,0,0,292fd4a31399bba86c5730ef4bd877b625e772494a5146bfd46b725d130f455b,2024-02-12T14:19:54.330000
|
||||
CVE-2024-24797,0,0,40724d1d3e1a03ea7253bf27a8e4cea3180b132258b4b1bc361005ab1c0591b9,2024-02-12T14:19:54.330000
|
||||
CVE-2024-24798,0,0,cd85ec8a42d6d377caab8567c4fbee58fe370929d305cf392fd538d90722fe41,2024-02-22T19:07:27.197000
|
||||
@ -247656,7 +247657,7 @@ CVE-2024-27312,0,0,5679d7053fa0bd24d93903a7d36eae1bf666d1c510eebbb175d9510db4771
|
||||
CVE-2024-27313,0,0,f9f7791913eb1885e62d83245c35ccba6d007456c7c99efcf6385be05af20927,2024-06-07T09:15:11.917000
|
||||
CVE-2024-27314,0,0,507bfabf98c061d8de81cbc1d95b3b58842135d25b3a81edb36b7651b27ac69f,2024-07-03T01:50:30.720000
|
||||
CVE-2024-27315,0,0,e2c8341ce82caf348d52a9896be5ac15e43c9c9ebf18a27eb01146f06cf9a599,2024-02-28T15:15:09.670000
|
||||
CVE-2024-27316,0,0,47557bba568976b709ce61c7b3f2b56ae39595698680263b8f0bb7449bb3941e,2024-07-22T09:15:04.603000
|
||||
CVE-2024-27316,0,1,3bf6f13ee9dbcc947168c29dac2b12e27972894e222efd3444dea533d66430b8,2024-07-29T22:15:04.113000
|
||||
CVE-2024-27317,0,0,c4936bf6b1ea8eb440227e5af31c10ab09a9d8539bf9187002383935723d45e1,2024-05-01T18:15:16.097000
|
||||
CVE-2024-27318,0,0,bb1e039cfeff54678be2a3d7675b064a42975817bdfb0398be1540195f1fd295,2024-03-30T02:15:08.007000
|
||||
CVE-2024-27319,0,0,198bfb473ae5c4a00a4bf458aba8771a9487b41224f35d4388056e6f7ba27f15,2024-03-30T02:15:08.090000
|
||||
@ -247948,11 +247949,12 @@ CVE-2024-27800,0,0,1195d6c6d3bb4b4cbf9c635f7205b297262d647bbfd1f49970d42c77f812d
|
||||
CVE-2024-27801,0,0,4f37242e62570444393eedc0e6b0ad8e8ff66a897bd149ce4d1292d83e4fe3ae,2024-07-02T13:36:50.500000
|
||||
CVE-2024-27802,0,0,5fa4df8e0fa4e055c45d206bab7fd01f5c4103a30fc3e7d9373406c7aa7c6468,2024-07-02T13:37:19.690000
|
||||
CVE-2024-27803,0,0,d8c6c7c35a66fefd164ec7252ba7f65231664b1bd53cefc22f8eab515bc840d4,2024-06-10T18:15:28.727000
|
||||
CVE-2024-27804,0,0,cc0ff5a5b94c6780767cdc22ac5b7c683a356469ddaa3536697d5bd02fd071c5,2024-07-03T01:50:51.930000
|
||||
CVE-2024-27804,0,1,5a3a9d1fd3691a1b54b24866e69cee2f5e3a65aabf978c5b6b5c4365c9f4b2f7,2024-07-29T22:15:04.233000
|
||||
CVE-2024-27805,0,0,80bf48e5a18746668d82dbc585fcdc5e0dc3f16985a0a47b63c1fdbef2db8980,2024-07-02T13:29:10.397000
|
||||
CVE-2024-27806,0,0,28c67af34cc68b2a5a6c23ba0a23708c28b0ee7df3bcafd7c779ecd50c264c63,2024-07-02T13:29:21.613000
|
||||
CVE-2024-27807,0,0,a7b781fd7f96d6bc57a085fc734d11b31dcdd4417a6ae278ff1c40e2b1bf7128,2024-07-02T13:33:44.157000
|
||||
CVE-2024-27808,0,0,0e786fcdc7ac7f7247d972ac7ba3fbaa92c628a0afe531fe3d853f6df664bccf,2024-07-03T01:50:52.903000
|
||||
CVE-2024-27809,1,1,04d69a9f15d9275ea5e9f599e7bb9d5b08dd452bedb4560400b8bfe95c8cebee,2024-07-29T23:15:10.110000
|
||||
CVE-2024-2781,0,0,97e23bf2edd148fde295ed4a38d42212ed940660bc04c9822025b8526dedd073,2024-03-27T12:29:30.307000
|
||||
CVE-2024-27810,0,0,131d49a9ababc6e1b56ddd9789d941a01f074ae704d1acea7c3e5f91ec92a79f,2024-07-03T01:50:53.720000
|
||||
CVE-2024-27811,0,0,cf157c9c893021758020e95900f9b13420c68cf22fe15e38b0a93ed47fe613e0,2024-07-03T01:50:54.533000
|
||||
@ -247968,8 +247970,10 @@ CVE-2024-2782,0,0,680a3c329ce925b550d110698489929aa37484a831dec13218a370944105b9
|
||||
CVE-2024-27820,0,0,a1605198dcbf5219cf280b9649bff24b5d5f9453251b177f1725c884a033aed8,2024-07-03T01:50:58.540000
|
||||
CVE-2024-27821,0,0,997425452e8be4677f15c9b9aaa18f17147699f7e8dfe8b663210b670dcd8496,2024-06-10T18:15:29.097000
|
||||
CVE-2024-27822,0,0,00b8edec8aa3387668b84ecf0596531970e488898abd3e050f82e3809ca5cb58,2024-07-03T01:50:59.383000
|
||||
CVE-2024-27823,1,1,e1da5fe73742b4c013df4afed2b9533d08c1bfa73db827d260617648cb2aeaee,2024-07-29T23:15:10.170000
|
||||
CVE-2024-27824,0,0,79e08efd7f96e8899d7d8541d6c0e1e0a4f8d446eaa36c3c2ce9d69863460387,2024-06-11T08:15:49.830000
|
||||
CVE-2024-27825,0,0,56d745c63f5923700ccb89bf72b89b53d35743fee3115939c5b740b7e01f6df0,2024-07-03T01:51:00.263000
|
||||
CVE-2024-27826,1,1,048e46a2061e609bf38d953a60410e4e7eb20ff1f0495e29959b6f02580741b6,2024-07-29T23:15:10.240000
|
||||
CVE-2024-27827,0,0,cddbc1abcd04a5361aa0d1e9cd6f7e77fbe95d6c2f77829fa9afe90c486dfc2e,2024-07-03T01:51:01.090000
|
||||
CVE-2024-27828,0,0,ce24f26049ae95ba26226eb49c194da6cf3360ec68cebf954b176dbdf142d332,2024-07-03T01:51:01.887000
|
||||
CVE-2024-27829,0,0,29662b914240e4af6a8df4845b3cfc144c064fdea834172457246a33af580145,2024-07-03T01:51:02.723000
|
||||
@ -247997,13 +248001,28 @@ CVE-2024-2785,0,0,c80d6189c649f881f5582594daf56ace11d883766a2f87b2cab5fb27986794
|
||||
CVE-2024-27850,0,0,f6e043cb321f3091936e7d5f2f1f5aed96502ad82fd54bc04d66b8f060434e31,2024-07-03T16:14:52.247000
|
||||
CVE-2024-27851,0,0,c183a7efee06e381e2c9ea0fe349e0a169f6a96a6b8ec9dee046a92195e2d536,2024-07-03T16:13:40.273000
|
||||
CVE-2024-27852,0,0,9c516bed02a09c2aff2aa4b9ea5d528517ae4b8f02f5b13e3e44ea400df8e7a3,2024-06-10T18:15:29.900000
|
||||
CVE-2024-27853,1,1,58852b1c49daadf3eb721d9fec57a112a387a77f154df8d001dbb23df5fb1557,2024-07-29T23:15:10.297000
|
||||
CVE-2024-27855,0,0,88e90c75a89e49c8f0ad6b77cda4945339f0165265fec6e1ae2d913c345f3617,2024-07-03T16:12:55.173000
|
||||
CVE-2024-27857,0,0,b12d57be271aa438e5d4c668c7f18ead13afc3b08569565d9c95a215938e9ba2,2024-07-03T15:43:17.007000
|
||||
CVE-2024-2786,0,0,8ed89c394db0a4298af6ad355228ba4ef878fdf7e45e835968fbe7eb06ba76d1,2024-04-10T13:23:38.787000
|
||||
CVE-2024-27862,1,1,e1074f87e7442ac605245fa9d9c07b3a7668072e08ef1bd41f1661a683bca55a,2024-07-29T23:15:10.363000
|
||||
CVE-2024-27863,1,1,1196f189ac028a8c13a2b2399a50df84a9882a1282df70d07ccd25da9799d4f8,2024-07-29T23:15:10.423000
|
||||
CVE-2024-27867,0,0,c8c0bef10450917c014bb0f5b8c10be2f4bd90c5c93e6cf14274f5f577a33a76,2024-07-04T05:15:15.540000
|
||||
CVE-2024-2787,0,0,2d4ec32358f3e4fff4e28d01c0d898cc511d2c65fccc3f39ec557fb8f116ac98,2024-04-10T13:23:38.787000
|
||||
CVE-2024-27871,1,1,20c0ed501f922aade5238514c8fe0564a519e1368175f2c68cfd73b0aa73d960,2024-07-29T23:15:10.490000
|
||||
CVE-2024-27872,1,1,5b11feb487c7ac167ff50ccad0b6e9fe79e595a4ae3327adf51cf603d0ae7f9b,2024-07-29T23:15:10.557000
|
||||
CVE-2024-27873,1,1,6ac1b86ae3e000df5fa034f49e62d43ce367c98a14ef3892b9d586e4a5062a64,2024-07-29T23:15:10.620000
|
||||
CVE-2024-27877,1,1,5319a3ef50433183786e283de8252b3e9a8130945e9948fcc308f584ff5c5c54,2024-07-29T23:15:10.690000
|
||||
CVE-2024-27878,1,1,9a77834a5956c098be4d95f8c0f67872cb9a57fba088268573cb0735307ca1ae,2024-07-29T23:15:10.747000
|
||||
CVE-2024-2788,0,0,fae17eccf9cd9e59e0540a9ad532e11d3f58404c6459f605cc04b4c55f908408,2024-04-10T13:23:38.787000
|
||||
CVE-2024-27881,1,1,7ad8e556325aa06778118ac11e882460462c1565acf06446bba0ddd884bd11e8,2024-07-29T23:15:10.807000
|
||||
CVE-2024-27882,1,1,0ba7846f97ad521269a665cdf4a8ae2591286faeb255e2dad55a3b7319e0696b,2024-07-29T23:15:10.877000
|
||||
CVE-2024-27883,1,1,1e383cd32db13b5129923e521bf8d1ae67e437433a5f67b5096885db85429aaa,2024-07-29T23:15:10.940000
|
||||
CVE-2024-27884,1,1,58f140c86c751c1d006370d1b382cff8ce96aa13987c7a12cceefe129ef896fe,2024-07-29T23:15:11.010000
|
||||
CVE-2024-27885,0,0,e3765a253be02afcb43d4bff90a02eb9cc8683032aa7319a1325bda028b43ed5,2024-07-03T15:44:29.397000
|
||||
CVE-2024-27886,1,1,b9c10b0713ecceb64f6d0ee0382d80b2e23963dfcf9884061b6819e73ec8038d,2024-07-29T23:15:11.067000
|
||||
CVE-2024-27887,1,1,6f75ea8b69ff3ac4420432ff26b71b2c18ffe3d8188390513addf2d75be2cf58,2024-07-29T23:15:11.127000
|
||||
CVE-2024-27888,1,1,be829e5e2f7a9a324e9f28c352e77afa2aa91e3ee0900845899f816120ee07af,2024-07-29T23:15:11.183000
|
||||
CVE-2024-27889,0,0,7117aad45d32aeaef1ee1fabf03a8eb1a99ce1846aae926fc9cdd323c7a5b8ea,2024-03-05T13:41:01.900000
|
||||
CVE-2024-2789,0,0,34742259502804c5b95d3d9e3233d720754fd74f45f9568c62dc8f4e6bc9ffb3,2024-04-10T13:23:38.787000
|
||||
CVE-2024-27894,0,0,a037a624d2f95391d5ae19191b0926bbf6c393d1d253b2842dc172d91ee0ac42,2024-05-01T17:15:30.557000
|
||||
@ -250892,6 +250911,7 @@ CVE-2024-32166,0,0,0d336fd2663f53ad5073af796b0f13018ac3836e84a93337db7f44ece472c
|
||||
CVE-2024-32167,0,0,4748c69f7eec35b2beddc2dc94362f1e2e767018d85482f9559e46e4a468fd84,2024-06-12T18:00:30.120000
|
||||
CVE-2024-3217,0,0,dc86fb8c3829a8b9d2e0fd455ded6f7df193be42ecbfecd0ffd8ac89ef8aedfe,2024-04-05T12:40:52.763000
|
||||
CVE-2024-3218,0,0,cca321349f887cdf01c9c59558600fd5914c251177129598df483266ec0d6bf2,2024-05-17T02:39:47.357000
|
||||
CVE-2024-3219,1,1,9249843b8f2b4d97479f83df5e1511c116eb732df4bef87e522d211cc11d7539,2024-07-29T22:15:04.970000
|
||||
CVE-2024-32205,0,0,b515c22daf534e23184b3e43b254269995ffc71b09793c9a7a083a2ff7d807bb,2024-04-22T20:15:07.210000
|
||||
CVE-2024-32206,0,0,8cd9c34ce9f7db79af05faf1c051a80ce3416b7ab823e5294fc2704f3b904424,2024-07-03T01:55:51.200000
|
||||
CVE-2024-3221,0,0,bc74600907433c2d1f49c74b0b5cb8ca05b39c0ecdd1932ffaf2a011380efa9f,2024-05-17T02:39:47.450000
|
||||
@ -254689,8 +254709,8 @@ CVE-2024-3823,0,0,53ae63b27eb43a6740a92f1ff13f05ddd2a8941167fdfb2924cdfa6b561369
|
||||
CVE-2024-3824,0,0,e8430e8e74668eaaf1515aab02bbd50450b435f6ff0c9f12ee70566d9f9578b4,2024-05-15T16:40:19.330000
|
||||
CVE-2024-3825,0,0,0797baa725c3e17399d5d91a8de7a7a1a558d256247589a07a334c4f415b4b15,2024-04-17T15:31:50.160000
|
||||
CVE-2024-3826,0,0,121760e16d238bf81106004c4251c8d93e688e0e085277d4609f0e751627011d,2024-07-02T17:44:45.700000
|
||||
CVE-2024-38271,0,0,38702e993143f28dff98f8a009090e500c461857dbbfb4642cc6600e0270049f,2024-06-27T12:47:19.847000
|
||||
CVE-2024-38272,0,0,56b2095985e7f6c32ea69c0888f53e8cdc0431545419063cc54478b41f8371d3,2024-06-27T12:47:19.847000
|
||||
CVE-2024-38271,0,1,a55d517f1e451a20db301f87d88d99f6d0173df1fa03dd913b12a59d024f897d,2024-07-29T22:15:04.757000
|
||||
CVE-2024-38272,0,1,0d362d9df49b138200ab4f12d59df7df286d43127ca17e43b2d79b45065d1568,2024-07-29T22:15:04.883000
|
||||
CVE-2024-38273,0,0,98139fcc5d27706ddcb6f85d322a9c3ffe167225916ac0c861ab393656c9d382,2024-06-27T03:15:50.130000
|
||||
CVE-2024-38274,0,0,3f34dcdbcb04b3bd1c27e63f0c6c999c7639ff04bd1f29bc2ba555ae3687211a,2024-06-27T03:15:50.233000
|
||||
CVE-2024-38275,0,0,17a29176c9cd94911e6aad5a6dd293a641887c69fe54b6763e0075600fbe8757,2024-07-03T02:04:53.613000
|
||||
@ -255043,7 +255063,7 @@ CVE-2024-38759,0,0,b9fa7ce22eebb94e2617e669160f4e670eabfdcde229d0ec6de28ef0c8571
|
||||
CVE-2024-3876,0,0,fa4ed7cd6030846f7b483928213b8739ce66b301252f810372f8be541fb30194,2024-06-17T19:15:58.763000
|
||||
CVE-2024-38767,0,0,a9b15a0ff3a2a53c65d6a5d7f54955d34e929127b2676eac528e66287825a41e,2024-07-22T13:00:31.330000
|
||||
CVE-2024-3877,0,0,4a72fb3a60020d6583c10cb3aed384330279f0439794d97578698eb4f04c72aa,2024-06-04T19:20:25.903000
|
||||
CVE-2024-38773,0,1,5d394704183bf3113439eae0fcd28f045140d75f19cf8a77fe07b6f63944fbc7,2024-07-29T20:07:57.597000
|
||||
CVE-2024-38773,0,0,5d394704183bf3113439eae0fcd28f045140d75f19cf8a77fe07b6f63944fbc7,2024-07-29T20:07:57.597000
|
||||
CVE-2024-3878,0,0,5053df083f23b6f337fe4f8fdf53fe0df42d421dbd3425cfd92b488e4629a9db,2024-05-17T02:40:10.087000
|
||||
CVE-2024-38780,0,0,ae16337cc2f7b6345cfbc91dc7be992225f0e3cd48711d005c1594aad3b12d58,2024-07-15T07:15:14.603000
|
||||
CVE-2024-38781,0,0,ad20639ae5229215377edc21882efa4f51ee03e1681dfd2ff9bba433bb35e6ce,2024-07-25T15:50:29.157000
|
||||
@ -255051,7 +255071,7 @@ CVE-2024-38782,0,0,6a0be8e9b82da765a38c168f9379b39fb33153476e0513dd2ae6a8ab51f61
|
||||
CVE-2024-38784,0,0,68643de9ae936963f628fb861e48c54d8865838667917b2af37f3e4b54727ab7,2024-07-25T15:55:31.213000
|
||||
CVE-2024-38785,0,0,1449b2ac862365f3baee2eb77470d4db33740002d25748517f05870fff11903e,2024-07-25T15:54:37.577000
|
||||
CVE-2024-38786,0,0,23327703659ded3b4e2e8a097a9d1da3633ff8f92d32364fd6984503c0102bb5,2024-07-25T15:54:12.073000
|
||||
CVE-2024-38788,0,1,b3310eca77eefd3eefd5fbc91ad027ce188932d22ffd466513f5156f93253a02,2024-07-29T20:19:47.727000
|
||||
CVE-2024-38788,0,0,b3310eca77eefd3eefd5fbc91ad027ce188932d22ffd466513f5156f93253a02,2024-07-29T20:19:47.727000
|
||||
CVE-2024-3879,0,0,a6db760401fb215a79d8f48992cc838e1a5c23839a86defd39dd342ef1c5f8a8,2024-05-17T02:40:10.177000
|
||||
CVE-2024-3880,0,0,6dd5da57a8412b823038a64a32d07af4547e4dfdd637b54b90b4556bfd34431d,2024-06-04T19:20:26
|
||||
CVE-2024-38806,0,0,aa1ff0885d521aab036aaf6506258a484aa869322b524482869e0e1df3ac4a48,2024-07-19T13:01:44.567000
|
||||
@ -255747,12 +255767,62 @@ CVE-2024-4076,0,0,e0e2b007c1440dbf9672681a5eff521aa004949693c7d660a7d1e4ee3ddd47
|
||||
CVE-2024-40764,0,0,31190fa168623fbefe72005739844174b20afc4fdab83062110ac517be35c6d0,2024-07-18T12:28:43.707000
|
||||
CVE-2024-40767,0,0,01a151f22bd3f1cd8b44f314114a7bbe92f50d1e2d88d2bec8d0eaa4d4f7e2fb,2024-07-25T17:15:10.910000
|
||||
CVE-2024-4077,0,0,d4f08c4fa42913c8d00f3fecbe96233f1448e9383bf97ebcbeca4cc0f2c8ae2b,2024-04-25T13:18:02.660000
|
||||
CVE-2024-40774,1,1,038483d23bb2998316e588c9f4d57162f3e1389705e5d0280be486edb42825e7,2024-07-29T23:15:11.250000
|
||||
CVE-2024-40775,1,1,178d1ae486637928ebc8a58e3fc99bfbf31fd4d917c655e124ad7b68ddad1dc9,2024-07-29T23:15:11.317000
|
||||
CVE-2024-40776,1,1,be0866f437f31f9b403a9a240b02c79404035a8918a5cf44aa80d407abfc02a3,2024-07-29T23:15:11.387000
|
||||
CVE-2024-40777,1,1,760bcf9b4899f086ab2da86ba07619aed6ebe1f0122e1da20103034d7a71b0ed,2024-07-29T23:15:11.457000
|
||||
CVE-2024-40778,1,1,4131521b8a9786888d9b56825e090b708bbba950c7aeb4e940402d5f5a1f7d20,2024-07-29T23:15:11.527000
|
||||
CVE-2024-40779,1,1,a7c06b8c08d8b945e6a44e3af8132e34cb9b7bcf62dd7e42ca680bba1108f610,2024-07-29T23:15:11.590000
|
||||
CVE-2024-4078,0,0,4f6a573d2d42430a81000704c37318a2f1d7afadf71bcba45d97fec5f925233f,2024-05-16T13:03:05.353000
|
||||
CVE-2024-40780,1,1,951f08bd17fbe60aa6a9ce133aeaa5e9571e4dbfdf0101f4237092436fb279f9,2024-07-29T23:15:11.660000
|
||||
CVE-2024-40781,1,1,82536600101ac07df8ec671c79667a7efa9870f8e78cbc4fe6f6494a06e8525d,2024-07-29T23:15:11.727000
|
||||
CVE-2024-40782,1,1,a9dd57fa446bc079345a9584f2f47f2681679aadb6c513618fa540b51ae615ae,2024-07-29T23:15:11.790000
|
||||
CVE-2024-40783,1,1,11a16592e1f8587f380151ea90155837d7009f81ae2924d20e5859554c9e16d8,2024-07-29T23:15:11.853000
|
||||
CVE-2024-40784,1,1,ab7ab7768a72b0743ab1aa9a6c9363348a7346f946e97a5da7d8b5367fe5fb10,2024-07-29T23:15:11.923000
|
||||
CVE-2024-40785,1,1,be1282fdb4ce9702d300622af20280919009f2f6899e88f628bd3b6802bad330,2024-07-29T23:15:11.997000
|
||||
CVE-2024-40786,1,1,f1371cbf8f0fe2b670fb351bbca0e2a58919af3ab6d54bae4cde1d5c101fb006,2024-07-29T23:15:12.070000
|
||||
CVE-2024-40787,1,1,7d9c4623a4076f11e6e6cd510d01e19681ec41fbe76f83f92721f3ad82ab37da,2024-07-29T23:15:12.133000
|
||||
CVE-2024-40788,1,1,a01d9fec4cc0df6480f77d4a31626523be9d0926047632f470ff0add872263c1,2024-07-29T23:15:12.200000
|
||||
CVE-2024-40789,1,1,e905e285d44ad8c924ee962a522b126f8e9208694c91437fd8b5368404a61b83,2024-07-29T23:15:12.270000
|
||||
CVE-2024-4079,0,0,77480512c155cc1ba9c6d21d28dd3b07d5f78d0d04ff147411735ae27b258bce,2024-07-24T12:55:13.223000
|
||||
CVE-2024-40793,1,1,4b5566e87c1b49e9c6ae623f682ca7555e0faa9d214accfae047488698d0fe6b,2024-07-29T23:15:12.337000
|
||||
CVE-2024-40794,1,1,b8687b6d468e0c0c2c47cef98e51720b72e3e20fc4c8aa0515d263e02c3cfa84,2024-07-29T23:15:12.410000
|
||||
CVE-2024-40795,1,1,fcea860c2ec7812aafd69527d5e4075c40a2bc8d136ee197f3895523b83ed289,2024-07-29T23:15:12.477000
|
||||
CVE-2024-40796,1,1,757a069e62a9d4de1b1c62d828a0aeebceee945359afd3f7eb87748564ecd608,2024-07-29T23:15:12.540000
|
||||
CVE-2024-40798,1,1,77637969bf8fe3db0cd56c0fd204792490e998a905e24fed29360640d949c4d4,2024-07-29T23:15:12.600000
|
||||
CVE-2024-40799,1,1,1c67cb9faf60b0740689e6893ed3840c5fd677a8077230f760f07d8e539e554a,2024-07-29T23:15:12.667000
|
||||
CVE-2024-4080,0,0,6e71df6568bf77146867d1944749c9d0835b7b19c10d04222a53e49f387410f0,2024-07-24T12:55:13.223000
|
||||
CVE-2024-40800,1,1,1eb80ceeabb78ee7321a1f4910e11f186d854b3b77df7bb9e237e9f391b6bf18,2024-07-29T23:15:12.743000
|
||||
CVE-2024-40802,1,1,2e12a235d0ebf2e9a38e7e8888e28b3610a6fac3117833d6d5951a47ec86e485,2024-07-29T23:15:12.810000
|
||||
CVE-2024-40803,1,1,692628f0f346ba5085c1b09a72ee54b99e25bb960c6aef9b8d51f4bd6126f0e7,2024-07-29T23:15:12.873000
|
||||
CVE-2024-40804,1,1,c83775a5d61705b6393865ebbd0a1ce576be35645b1800885a04ed797d8d0498,2024-07-29T23:15:12.947000
|
||||
CVE-2024-40805,1,1,15fdd4d3a584843c6b1bf54e33b6e505db6d1c262311d7d909c79ca651979cb5,2024-07-29T23:15:13.017000
|
||||
CVE-2024-40806,1,1,a23d90ace0f8c121ed72b0be655db6d0abe655b722e668c9deba85ae1d9f03ac,2024-07-29T23:15:13.083000
|
||||
CVE-2024-40807,1,1,e3cc12f3129adf0c3c57559caafa91f71cd7cea1bcc8329daa2840611c173f83,2024-07-29T23:15:13.147000
|
||||
CVE-2024-40809,1,1,ffd9b17b4a63c6fc23b2a7356ece7dc8905c6aee41961ae019ab270a5c382702,2024-07-29T23:15:13.207000
|
||||
CVE-2024-4081,0,0,ec57e0133e64417322d14482f588518f8d5e70bfac2335ec1d22f99346ae0a79,2024-07-24T12:55:13.223000
|
||||
CVE-2024-40811,1,1,8d5b59fe6e9fb977b45dce0eba4212514ec064f0a8c02ca927951a1feedaa595,2024-07-29T23:15:13.273000
|
||||
CVE-2024-40812,1,1,72b5ea9f510350b495b2925da066424db0567fc311ad3f98843e0fdd25776f57,2024-07-29T23:15:13.330000
|
||||
CVE-2024-40813,1,1,2ac94ce6190328a172c8b8f496815d90c7485fca1fad9afc67d8184d7d507e0e,2024-07-29T23:15:13.397000
|
||||
CVE-2024-40814,1,1,cca56b21dddf051984a27101bebac088cdf7ec39621e20affb28a987cf4b5f22,2024-07-29T23:15:13.460000
|
||||
CVE-2024-40815,1,1,c673267933af03c692cea061b0bf8b806aeb212718e78b2e53da36e448b2820e,2024-07-29T23:15:13.523000
|
||||
CVE-2024-40816,1,1,68bd94f9456482cbd1c3f610a919a27cffab48785f807d5844c4c3fa2866dcc9,2024-07-29T23:15:13.583000
|
||||
CVE-2024-40817,1,1,b647788caa33fdf5af7d7443d5a6af64c83680ae0a1e5f283cb135b3bcc2787f,2024-07-29T23:15:13.647000
|
||||
CVE-2024-40818,1,1,eb3183d90e40772501eb43fa589ae5c7b2c820c288387d4aa4aa13ceba1fef8c,2024-07-29T23:15:13.703000
|
||||
CVE-2024-4082,0,0,02264cef46dbd3bc30b90eb0e358643df5f32c233cd928965c67d2a95fa3306a,2024-05-14T16:11:39.510000
|
||||
CVE-2024-40821,1,1,6e052d0aa504590857a329cf8fc449cb10ae9818bbe1f72232e212199dab6a18,2024-07-29T23:15:13.770000
|
||||
CVE-2024-40822,1,1,4495f5e697e3214503e6fccae0cc2b00f03d2e2b66c7fb9c6b1e7daf1a3b35d0,2024-07-29T23:15:13.840000
|
||||
CVE-2024-40823,1,1,9dc5249a3184db2fe1f3e09cfb71482c85eb28533a5845b08ab000711fa5990d,2024-07-29T23:15:13.920000
|
||||
CVE-2024-40824,1,1,c9c5611175e28c3d6c83706b6d62911fb5d46fa54b1763f08fb1089bb5b65eb8,2024-07-29T23:15:13.990000
|
||||
CVE-2024-40827,1,1,eed76fb81c5d6d730c4dc6a5cf5685a607b34ebf60ab42324ae6de9c30623d70,2024-07-29T23:15:14.067000
|
||||
CVE-2024-40828,1,1,3f70f0fa0be2593f0ee73515da54d4a0700be008ab4da51c082a90d1f23b7804,2024-07-29T23:15:14.130000
|
||||
CVE-2024-40829,1,1,630f68721a8f60f069dcb66f55b03ff3124d1f2a3d9e6f2ab47d4b1e3944995a,2024-07-29T23:15:14.193000
|
||||
CVE-2024-4083,0,0,1cd1c6384007aa9a5a8af9731386deec2b0818df508019e87115186ced7033b5,2024-05-02T18:00:37.360000
|
||||
CVE-2024-40832,1,1,61dde41120d247d3895c3b08dfed9ee6c04f15f3a0d664fcb3c8bb789da5265b,2024-07-29T23:15:14.257000
|
||||
CVE-2024-40833,1,1,b66d9eca4ea48c6a7ddceb91e12109daecb518e5080a98290bc3b25e6e5970da,2024-07-29T23:15:14.333000
|
||||
CVE-2024-40834,1,1,917f31cf67c8ca627e84cd5bd0ca9236d97a173c992cb480d28fd8b1c115a97a,2024-07-29T23:15:14.413000
|
||||
CVE-2024-40835,1,1,2dcffeb7534755d3171743b1999186ef0b2e67ad4edc23df4503da4372e2959e,2024-07-29T23:15:14.487000
|
||||
CVE-2024-40836,1,1,f8e29f638b0b6f8e26a3e2ab4cd1aafdd537a299a7ea18ea901de98586b0ea79,2024-07-29T23:15:14.570000
|
||||
CVE-2024-4084,0,0,aed2355093521159d48a9084a5a18f34499717e2daefb72a4c03148c5f7b9d24,2024-06-11T16:44:49.090000
|
||||
CVE-2024-4085,0,0,7aad6a4056b6c332cceb43166a488ef1c1b3002f44d4bee7dddba365a66e15ea,2024-05-02T18:00:37.360000
|
||||
CVE-2024-4086,0,0,4591112164bebe25a6e3755e5f7d7b3acd1442e1405281bbc9f49b1286c02b38,2024-05-02T18:00:37.360000
|
||||
@ -256811,7 +256881,7 @@ CVE-2024-4873,0,0,acc2d485a3cc66f2d361ddda92f62901a8108a4490dc81ea4acfb7f60771d8
|
||||
CVE-2024-4874,0,0,4b5967df7915507c9b0020b0ee4984332d2c23e37a57b9a262a2ae6c5b300f4b,2024-06-24T19:41:12.293000
|
||||
CVE-2024-4875,0,0,5a9bf10de46e2f944321ed00fa6d17c799716a219001f5797c9cce4abb6a2b7b,2024-05-21T12:37:59.687000
|
||||
CVE-2024-4876,0,0,6c7ef7cd93a9d659be2199330000de11a6027348fd6a9308e40ba12083e70d2c,2024-05-21T12:37:59.687000
|
||||
CVE-2024-4879,0,0,56229bd7ffd4a409de97013360aaa6ca4ee318c9286f43f7eac51db8f9d45e53,2024-07-11T22:15:02.260000
|
||||
CVE-2024-4879,0,1,aac607dfb1dd5f8e5400d9068a8a95b417c652d65a4ba884266aa1ba39b30390,2024-07-29T23:15:14.650000
|
||||
CVE-2024-4881,0,0,e010a6d611a1aff52f8425d30778d000b18cd2245ae12a3254f16e5b16421da7,2024-06-07T14:56:05.647000
|
||||
CVE-2024-4882,0,0,a4855f599041359b65e48a15f937a27e2ec2e91d9343d627eb58fe60c3b171c1,2024-07-09T18:19:14.047000
|
||||
CVE-2024-4883,0,0,2ff7450efd44772325cada3b845290dfe574175b9b5b8d8937e9a22721054fd1,2024-06-26T12:44:29.693000
|
||||
@ -257096,7 +257166,7 @@ CVE-2024-5213,0,0,d0914ed8289e640566cb58700956c5d2665253a06d0896526d4a9160af504e
|
||||
CVE-2024-5214,0,0,63d7572dfe3fc62d2b94f5bd6d323fcf441de42b521ffae91ecf8348de5e238f,2024-06-03T19:15:09.360000
|
||||
CVE-2024-5215,0,0,000fc07f4cc70899827567e140fa6ed8e48b521d55f3767b5621ab75b67abf1a,2024-06-26T12:44:29.693000
|
||||
CVE-2024-5216,0,0,fd1f829df1b42ba5feaed9e36309904905f430fd7293476e8efb99a6adc245e7,2024-06-25T12:24:17.873000
|
||||
CVE-2024-5217,0,0,6832bb457ac7885c3d529aa58eea84d54813c374c2860ed54ebbfa064b5a7e35,2024-07-11T22:15:02.647000
|
||||
CVE-2024-5217,0,1,d62fb791fdbb07b0b8870307225ce8097cab090bffae9c6698a1202201ccd2a3,2024-07-29T23:15:14.807000
|
||||
CVE-2024-5218,0,0,3f0f08ad7c2d51d3a67b7d7a45835724ecc9f070958f49b8f27381122972dec7,2024-05-28T12:39:42.673000
|
||||
CVE-2024-5219,0,0,0b0a07b717a73df9a54bac0edd6ba4c81b69c5ace946f2ea22a932d7a079095d,2024-07-03T17:59:37.967000
|
||||
CVE-2024-5220,0,0,c038ea6a169ab16726e3cd0d45ec2f73c131df5f0c00c638dfb0aa809792bfe5,2024-05-28T12:39:42.673000
|
||||
@ -257607,7 +257677,7 @@ CVE-2024-5856,0,0,6c7682487972a7913d7724c221dec1f8cbbbfbf7a2635cc868862316d948dc
|
||||
CVE-2024-5858,0,0,63cb7f6cd58686ca5ad3c57990888086a18b2814d4915e424991a00332eb64f9,2024-06-17T12:42:04.623000
|
||||
CVE-2024-5859,0,0,72e4b113c686d9a3109f00890cd02d7c66daeaf956171b1cfade7c196becbe2c,2024-06-24T19:21:07.943000
|
||||
CVE-2024-5860,0,0,56b79e1c6d22cf1e6319b4d2696b988928a56f1c09b2a292e92b44a530d0359a,2024-07-05T13:52:14.463000
|
||||
CVE-2024-5861,0,1,0f6737e71badb31ad995141819e3de68ee07520527361b4ba51682844c68ec2b,2024-07-29T20:32:37.267000
|
||||
CVE-2024-5861,0,0,0f6737e71badb31ad995141819e3de68ee07520527361b4ba51682844c68ec2b,2024-07-29T20:32:37.267000
|
||||
CVE-2024-5862,0,0,441ab26bc80ed7c87de8e4be62f6bf1c86b995270dbb376cc8e089e80e683161,2024-06-24T19:26:47.037000
|
||||
CVE-2024-5863,0,0,8eb388b46dfdca7ac79f7a3487053af7c103c168da16a20899b575731960eec2,2024-06-28T10:27:00.920000
|
||||
CVE-2024-5864,0,0,539f12905317a790a13c7190e3394133674affd0cb1690d81cb0d56c8ad41bb1,2024-06-28T10:27:00.920000
|
||||
@ -257759,7 +257829,7 @@ CVE-2024-6086,0,0,47215fd632ba621ffeef67af3acb9b5d4df100629d5a1e80c438d45f990f65
|
||||
CVE-2024-6088,0,0,ed650bb4582239ce54305f8b10efe45d50e8cb6f1aa2aa30a6eb4b92f9ce96ee,2024-07-02T18:08:38.550000
|
||||
CVE-2024-6089,0,0,2e36ec68c046c195b7c2f86ee35013ba223063fb476a7c2f6d245a7b85cc69f4,2024-07-16T18:00:02.110000
|
||||
CVE-2024-6090,0,0,97ec0efad50117bd537daa7e8cf0d79ae16e3a9835d40dc90b67ac25a55b7eab,2024-06-27T19:25:12.067000
|
||||
CVE-2024-6094,0,1,21e31087817484583e2492fdd4981c05277a9dbc98ecae783fc36b2e123caf96,2024-07-29T20:20:51.257000
|
||||
CVE-2024-6094,0,0,21e31087817484583e2492fdd4981c05277a9dbc98ecae783fc36b2e123caf96,2024-07-29T20:20:51.257000
|
||||
CVE-2024-6095,0,0,1bbfd7c9b87c44d08a43ff0a5e8179e2c5df6e66e4cde292cf2d451628bbb0a8,2024-07-09T17:41:10.523000
|
||||
CVE-2024-6096,0,0,6b5f1375532be5fbd8f0909be12e0ecac09c21eb2b2624e229274d814c555540,2024-07-26T12:57:36.633000
|
||||
CVE-2024-6099,0,0,122ce35d776bcd880891466a825515ec577be2ec80ec19c4510dcdd6af223974,2024-07-02T18:08:53.233000
|
||||
@ -257958,7 +258028,7 @@ CVE-2024-6381,0,0,2822fb12d769fe1cca32125b45cae52ba3e5807419213b6087c6db8de8d2b3
|
||||
CVE-2024-6382,0,0,9f140af24f460b4413fa844f95383cc153754360a136939b8743c2d8327ebf99,2024-07-03T12:53:24.977000
|
||||
CVE-2024-6383,0,0,4622f4fc90fbde51d6570a14e2ee494e3e71659c68201475e4e4eb659c036ac0,2024-07-05T12:55:51.367000
|
||||
CVE-2024-6385,0,0,13d2095bcd11ed43b6c47262c7b96c8a9e162b20cb975895bc98c3af67d39ff6,2024-07-12T16:49:14.047000
|
||||
CVE-2024-6387,0,0,18a0eee254c378cec8300ccfc21cb8052a8dc8829e64291b38d5c6284633aacb,2024-07-29T09:15:02.853000
|
||||
CVE-2024-6387,0,1,584848f90a0e6d6513a757b32b891aa914d62444b8c645ccd87c69765fbbd0d2,2024-07-29T22:15:05.043000
|
||||
CVE-2024-6388,0,0,0ce37f83493b5d79bb3fdc963327390bc09266ac17f5f1de660cf43d4cdce70d,2024-06-27T17:11:52.390000
|
||||
CVE-2024-6391,0,0,f39301e9680e09028795caddd1f0219ac421e8fbe3773aa2e024531728c8f9e1,2024-07-09T18:19:14.047000
|
||||
CVE-2024-6392,0,0,59a0778055c9ae4fa55c964a2a449c5eba0adacd372cf3ba0a728f148d4da23a,2024-07-12T12:49:07.030000
|
||||
@ -258090,7 +258160,7 @@ CVE-2024-6612,0,0,d34a2e10bc1c43655aa28f997fd8d7918b9d5919fcfded6bd9a7bc48a40520
|
||||
CVE-2024-6613,0,0,2c9248a7ca42e8738ab702e9dc188d19870d6e260e6ad7403e7b1f4010624eaa,2024-07-16T18:15:09.747000
|
||||
CVE-2024-6614,0,0,92c74753eb3da74f24a895083a8e9cff7c2fc2f9bf400831c94c14936544ed9b,2024-07-16T18:15:09.813000
|
||||
CVE-2024-6615,0,0,21e70ce6d005932fad51efb1cef43277a3ff57e367ed55aea5460b226c9f9ba8,2024-07-16T18:15:09.893000
|
||||
CVE-2024-6620,1,1,93c6de4b06b208771165f294569491243a3290d2098714e195918c0b85e0bd6d,2024-07-29T20:15:03.910000
|
||||
CVE-2024-6620,0,0,93c6de4b06b208771165f294569491243a3290d2098714e195918c0b85e0bd6d,2024-07-29T20:15:03.910000
|
||||
CVE-2024-6621,0,0,75f7ea9becaa66b3030f6b54d6ea12535b72220300e49d7375089d25edbe8b2f,2024-07-16T13:43:58.773000
|
||||
CVE-2024-6624,0,0,d641d0598d5f0d62f69b2f0bb30153f1263b9aa17a64dd7567b42517a1bc6027,2024-07-12T16:51:31.487000
|
||||
CVE-2024-6625,0,0,b913737eefce9f28c47dc537f0edd398b1eeb297cd2eb30c69b59c3401317130,2024-07-12T12:49:07.030000
|
||||
@ -258189,7 +258259,7 @@ CVE-2024-6828,0,0,5e3bce0050be5ef41f841daf735b80af46e729368278d26d6a7ddc5bbbdee6
|
||||
CVE-2024-6830,0,0,66325e33317c6fde8b929b285667c5104c4ae04492532b5067560968ff36e7fb,2024-07-18T12:28:43.707000
|
||||
CVE-2024-6833,0,0,b0ea48d29166f6347ac218b4f9f93d3f7fc599fd932b64c35cfa55e5a1a94672,2024-07-18T12:28:43.707000
|
||||
CVE-2024-6834,0,0,9b06026f568f95c4c2a4be9208340b1bc5ab27fea601ce9296ee0a0b671ec68d,2024-07-18T12:28:43.707000
|
||||
CVE-2024-6836,0,1,94c1bcaa18f7036265464de8eba36ccdaae9b63d5d20f60a8cc42904bb485160,2024-07-29T20:20:30.867000
|
||||
CVE-2024-6836,0,0,94c1bcaa18f7036265464de8eba36ccdaae9b63d5d20f60a8cc42904bb485160,2024-07-29T20:20:30.867000
|
||||
CVE-2024-6848,0,0,e171c12c58967922126feefb09977b436bb9e206684562a37899ca6ed3e35d20,2024-07-22T13:00:31.330000
|
||||
CVE-2024-6874,0,0,6fdb828244d0878bf4334f6c8b61a3ad657fa405006bc4b1bc91d03b240bfdb1,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6881,0,0,ae484b8b97ecbaca3d459a043a0b9e7c17dfa3db2ae41eab10b19174db4e67d5,2024-07-29T14:12:08.783000
|
||||
@ -258334,3 +258404,8 @@ CVE-2024-7199,0,0,1c38ae71600e9c4c0d209d192fce66196ad6d1d1454dfe95d9b268bf29c6a5
|
||||
CVE-2024-7200,0,0,d21a4dd541acbc0094d3b150aee5dc57732e3b43b8983d68802bfc40bea446f0,2024-07-29T14:12:08.783000
|
||||
CVE-2024-7201,0,0,ada84f4b903b0c95dc45be4013db2022612c9fdb66b840b2138f16a8a9061fa8,2024-07-29T14:12:08.783000
|
||||
CVE-2024-7202,0,0,47ee30ff0ebecde915aadd7cf1bd702d0bebf04cac4786411e427c0fde39b1f2,2024-07-29T14:12:08.783000
|
||||
CVE-2024-7248,1,1,a2ddbed55de01980f63d0b9718ce842c14c9c1b9e6cdca518c180966561a19d1,2024-07-29T22:15:05.553000
|
||||
CVE-2024-7249,1,1,c7fccf87c8ceb0c945e7a77936034d5c4e5006994b9df61388b67e431ddf2786,2024-07-29T22:15:05.817000
|
||||
CVE-2024-7250,1,1,47214a6631c5e0c15e01a9d48696651797894eba964a53c781b9db24f665f066,2024-07-29T22:15:06.100000
|
||||
CVE-2024-7251,1,1,2e9dec42abfd731f5e87da16a34d11bf2d0c37cf024df63f9ff50bc95cc7c004,2024-07-29T22:15:06.283000
|
||||
CVE-2024-7252,1,1,aab68971ce2840239d9a3f49898d569965202598c905827f10884e2704b76876,2024-07-29T22:15:06.497000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user