mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-21 17:41:05 +00:00
Auto-Update: 2024-12-19T15:00:21.935449+00:00
This commit is contained in:
parent
6fe36d000d
commit
451c39b2bb
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2020-3359",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2020-09-24T18:15:17.417",
|
||||
"lastModified": "2024-11-21T05:30:52.443",
|
||||
"lastModified": "2024-12-19T13:52:35.190",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -118,8 +118,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:ios_xe:16.12.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "20F47E46-DD4F-46B8-8A67-24EFA6D6AE4E"
|
||||
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C98DED36-D4B5-48D6-964E-EEEE97936700"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2020-3390",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2020-09-24T18:15:17.510",
|
||||
"lastModified": "2024-11-21T05:30:56.207",
|
||||
"lastModified": "2024-12-19T13:52:35.190",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -118,8 +118,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:ios_xe:16.12.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "20F47E46-DD4F-46B8-8A67-24EFA6D6AE4E"
|
||||
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C98DED36-D4B5-48D6-964E-EEEE97936700"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2020-3393",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2020-09-24T18:15:17.587",
|
||||
"lastModified": "2024-11-21T05:30:56.567",
|
||||
"lastModified": "2024-12-19T13:52:35.190",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -116,8 +116,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:ios_xe:16.12.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "20F47E46-DD4F-46B8-8A67-24EFA6D6AE4E"
|
||||
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C98DED36-D4B5-48D6-964E-EEEE97936700"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2020-3503",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2020-09-24T18:15:20.887",
|
||||
"lastModified": "2024-11-21T05:31:12.317",
|
||||
"lastModified": "2024-12-19T13:52:35.190",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -116,8 +116,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:ios_xe:16.12.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "20F47E46-DD4F-46B8-8A67-24EFA6D6AE4E"
|
||||
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C98DED36-D4B5-48D6-964E-EEEE97936700"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
56
CVE-2021/CVE-2021-261xx/CVE-2021-26102.json
Normal file
56
CVE-2021/CVE-2021-261xx/CVE-2021-26102.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2021-26102",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2024-12-19T14:15:05.380",
|
||||
"lastModified": "2024-12-19T14:15:05.380",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A relative path traversal vulnerability (CWE-23) in FortiWAN version 4.5.7 and below, 4.4 all versions may allow a remote non-authenticated attacker to delete files on the system by sending a crafted POST request. In particular, deleting specific configuration files will reset the Admin password to its default value."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@fortinet.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@fortinet.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-305"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-21-048",
|
||||
"source": "psirt@fortinet.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2021/CVE-2021-325xx/CVE-2021-32589.json
Normal file
56
CVE-2021/CVE-2021-325xx/CVE-2021-32589.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2021-32589",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2024-12-19T13:15:05.707",
|
||||
"lastModified": "2024-12-19T13:15:05.707",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A use after free in Fortinet FortiManager, FortiAnalyzer allows attacker to execute unauthorized code or commands via <insert attack vector here>"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@fortinet.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@fortinet.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-21-067",
|
||||
"source": "psirt@fortinet.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-34398",
|
||||
"sourceIdentifier": "security_alert@emc.com",
|
||||
"published": "2023-02-01T06:15:08.710",
|
||||
"lastModified": "2024-11-21T07:09:26.153",
|
||||
"lastModified": "2024-12-19T14:25:44.370",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -1051,8 +1051,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:dell:dell_latitude_3480:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "304D3113-E0AD-4401-B1CD-2ED3A2C84E0E"
|
||||
"criteria": "cpe:2.3:h:dell:latitude_3480:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "04009AD7-3BE3-4C94-8DBE-FD72879BD916"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -1079,8 +1079,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:dell:dell_latitude_3580:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "449960AB-8265-4874-976B-110486955C84"
|
||||
"criteria": "cpe:2.3:h:dell:latitude_3580:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C3351403-5904-480C-B9E1-6A2DF39B7431"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
56
CVE-2024/CVE-2024-102xx/CVE-2024-10244.json
Normal file
56
CVE-2024/CVE-2024-102xx/CVE-2024-10244.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-10244",
|
||||
"sourceIdentifier": "iletisim@usom.gov.tr",
|
||||
"published": "2024-12-19T14:15:05.760",
|
||||
"lastModified": "2024-12-19T14:15:05.760",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in ISDO Software Web Software allows SQL Injection.This issue affects Web Software: before 3.6."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "iletisim@usom.gov.tr",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "iletisim@usom.gov.tr",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.usom.gov.tr/bildirim/tr-24-1893",
|
||||
"source": "iletisim@usom.gov.tr"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-12657",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-12-16T17:15:09.520",
|
||||
"lastModified": "2024-12-16T17:15:09.520",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-12-19T14:46:43.777",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability has been found in IObit Advanced SystemCare Utimate up to 17.0.0 and classified as problematic. This vulnerability affects the function 0x8001E000 in the library AscRegistryFilter.sys of the component IOCTL Handler. The manipulation leads to null pointer dereference. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha encontrado una vulnerabilidad en IObit Advanced SystemCare Ultimate hasta la versi\u00f3n 17.0.0 y se ha clasificado como problem\u00e1tica. Esta vulnerabilidad afecta a la funci\u00f3n 0x8001E000 en la librer\u00eda AscRegistryFilter.sys del componente IOCTL Handler. La manipulaci\u00f3n provoca la desreferenciaci\u00f3n de puntero nulo. El ataque debe realizarse de forma local. La vulnerabilidad se ha hecho p\u00fablica y puede utilizarse. Se contact\u00f3 al proveedor con antelaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -76,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -107,7 +131,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -118,24 +142,68 @@
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:iobit:advanced_systemcare_ultimate:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "17.0.0",
|
||||
"matchCriteriaId": "6B347268-396D-44DA-ABFD-9093A1989940"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://shareforall.notion.site/IOBit-Advanced-SystemCare-Utimate-AscRegistryFilter-0x8001E000-NPD-DOS-15160437bb1e8068a470ca1611fd7317",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.288526",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.288526",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.456035",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-12658",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-12-16T18:15:10.120",
|
||||
"lastModified": "2024-12-18T16:15:11.297",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-12-19T14:47:23.380",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -122,28 +142,76 @@
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:iobit:advanced_systemcare_ultimate:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "17.0.0",
|
||||
"matchCriteriaId": "6B347268-396D-44DA-ABFD-9093A1989940"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://shareforall.notion.site/IOBit-Advanced-SystemCare-Utimate-AscRegistryFilter-0x8001E01C-NPD-DOS-15160437bb1e800eb1cadd53b224d088",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.288527",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.288527",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.456036",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://shareforall.notion.site/IOBit-Advanced-SystemCare-Utimate-AscRegistryFilter-0x8001E01C-NPD-DOS-15160437bb1e800eb1cadd53b224d088",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-12659",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-12-16T18:15:10.320",
|
||||
"lastModified": "2024-12-18T16:15:11.500",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-12-19T14:49:24.747",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -122,28 +142,76 @@
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:iobit:advanced_systemcare_ultimate:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "17.0.0",
|
||||
"matchCriteriaId": "6B347268-396D-44DA-ABFD-9093A1989940"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://shareforall.notion.site/IOBit-Advanced-SystemCare-Utimate-AscRegistryFilter-0x8001E004-NPD-DOS-15160437bb1e804cbe8fd4d826f8564f",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.288528",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.288528",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.456038",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://shareforall.notion.site/IOBit-Advanced-SystemCare-Utimate-AscRegistryFilter-0x8001E004-NPD-DOS-15160437bb1e804cbe8fd4d826f8564f",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-12660",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-12-16T18:15:10.533",
|
||||
"lastModified": "2024-12-18T16:15:11.700",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-12-19T14:49:52.357",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -122,28 +142,76 @@
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:iobit:advanced_systemcare_ultimate:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "17.0.0",
|
||||
"matchCriteriaId": "6B347268-396D-44DA-ABFD-9093A1989940"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://shareforall.notion.site/IOBit-Advanced-SystemCare-Utimate-AscRegistryFilter-0x8001E018-NPD-DOS-15260437bb1e80c5ab28da895ed46227",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.288529",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.288529",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.456337",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://shareforall.notion.site/IOBit-Advanced-SystemCare-Utimate-AscRegistryFilter-0x8001E018-NPD-DOS-15260437bb1e80c5ab28da895ed46227",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-12662",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-12-16T19:15:07.027",
|
||||
"lastModified": "2024-12-16T19:15:07.027",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-12-19T14:45:43.547",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as problematic has been found in IObit Advanced SystemCare Utimate up to 17.0.0. This affects the function 0x8001E040 in the library AscRegistryFilter.sys of the component IOCTL Handler. The manipulation leads to null pointer dereference. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha encontrado una vulnerabilidad clasificada como problem\u00e1tica en IObit Advanced SystemCare Ultimate hasta la versi\u00f3n 17.0.0. Afecta a la funci\u00f3n 0x8001E040 en la librer\u00eda AscRegistryFilter.sys del componente IOCTL Handler. La manipulaci\u00f3n provoca la desreferenciaci\u00f3n de puntero nulo. El ataque debe realizarse de forma local. El exploit se ha hecho p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -76,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -107,7 +131,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -118,24 +142,68 @@
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:iobit:advanced_systemcare_ultimate:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "17.0.0",
|
||||
"matchCriteriaId": "6B347268-396D-44DA-ABFD-9093A1989940"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://shareforall.notion.site/IOBit-Advanced-SystemCare-Utimate-AscRegistryFilter-0x8001E040-NPD-DOS-15260437bb1e804e86b4e1de92ff0d09",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.288531",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.288531",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.457163",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-12664",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-12-16T20:15:09.090",
|
||||
"lastModified": "2024-12-16T20:15:09.090",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-12-19T14:55:00.460",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as problematic, has been found in ruifang-tech Rebuild 3.8.5. This issue affects some unknown processing of the component Project Task Comment Handler. The manipulation leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha encontrado una vulnerabilidad, que se ha clasificado como problem\u00e1tica, en ruifang-tech Rebuild 3.8.5. Este problema afecta a algunos procesos desconocidos del componente Project Task Comment Handler. La manipulaci\u00f3n conduce a cross site scripting. El ataque puede iniciarse de forma remota. El exploit se ha divulgado al p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -76,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -107,7 +131,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -118,24 +142,67 @@
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ruifang-tech:rebuild:3.8.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EECAB45E-27C6-4333-A377-F5427A328D3F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/cydtseng/Vulnerability-Research/blob/main/rebuild/StoredXSS-TaskComments.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.288533",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.288533",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.458622",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-12665",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-12-16T20:15:09.260",
|
||||
"lastModified": "2024-12-16T20:15:09.260",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-12-19T14:55:20.300",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as problematic, was found in ruifang-tech Rebuild 3.8.5. Affected is an unknown function of the component Task Comment Attachment Upload. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha encontrado una vulnerabilidad clasificada como problem\u00e1tica en ruifang-tech Rebuild 3.8.5. Se trata de una funci\u00f3n desconocida del componente Task Comment Attachment Upload. La manipulaci\u00f3n provoca cross site scripting. Es posible lanzar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -76,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -107,7 +131,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -118,24 +142,67 @@
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ruifang-tech:rebuild:3.8.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EECAB45E-27C6-4333-A377-F5427A328D3F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/cydtseng/Vulnerability-Research/blob/main/rebuild/StoredXSS-TaskCommentAttachments.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.288534",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.288534",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.458623",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
141
CVE-2024/CVE-2024-127xx/CVE-2024-12782.json
Normal file
141
CVE-2024/CVE-2024-127xx/CVE-2024-12782.json
Normal file
@ -0,0 +1,141 @@
|
||||
{
|
||||
"id": "CVE-2024-12782",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-12-19T13:15:05.900",
|
||||
"lastModified": "2024-12-19T13:15:05.900",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability has been found in Fujifilm Apeos C3070, Apeos C5570 and Apeos C6580 up to 24.8.28 and classified as critical. This vulnerability affects unknown code of the file /home/index.html#hashHome of the component Web Interface. The manipulation leads to improper authorization. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 6.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "LOW",
|
||||
"vulnerableSystemIntegrity": "LOW",
|
||||
"vulnerableSystemAvailability": "LOW",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||||
"baseScore": 7.5,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 10.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-266"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-285"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/dycccccccc/Fuji/blob/main/Fujifilm%20Business%20Innovation.docx",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.288958",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.288958",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.458897",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
145
CVE-2024/CVE-2024-127xx/CVE-2024-12783.json
Normal file
145
CVE-2024/CVE-2024-127xx/CVE-2024-12783.json
Normal file
@ -0,0 +1,145 @@
|
||||
{
|
||||
"id": "CVE-2024-12783",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-12-19T13:15:06.217",
|
||||
"lastModified": "2024-12-19T13:15:06.217",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in itsourcecode Vehicle Management System 1.0 and classified as problematic. This issue affects some unknown processing of the file /billaction.php. The manipulation of the argument extra-cost leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "NONE",
|
||||
"vulnerableSystemIntegrity": "LOW",
|
||||
"vulnerableSystemAvailability": "NONE",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 3.5,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
|
||||
"baseScore": 4.0,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/FinleyTang/Vehicle-Management-System/blob/main/Vehicle%20Management%20System%20billaction.php%20has%20Cross-site%20Scripting%20(XSS).pdf",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://itsourcecode.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.288959",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.288959",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.462628",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
145
CVE-2024/CVE-2024-127xx/CVE-2024-12784.json
Normal file
145
CVE-2024/CVE-2024-127xx/CVE-2024-12784.json
Normal file
@ -0,0 +1,145 @@
|
||||
{
|
||||
"id": "CVE-2024-12784",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-12-19T14:15:05.943",
|
||||
"lastModified": "2024-12-19T14:15:05.943",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in itsourcecode Vehicle Management System 1.0. It has been classified as critical. Affected is an unknown function of the file editbill.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "LOW",
|
||||
"vulnerableSystemIntegrity": "LOW",
|
||||
"vulnerableSystemAvailability": "LOW",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"baseScore": 6.5,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-74"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/FinleyTang/Vehicle-Management-System/blob/main/Vehicle%20Management%20System%20editbill.php%20has%20Sqlinjection.pdf",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://itsourcecode.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.288960",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.288960",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.462629",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-3516",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2024-04-10T19:15:49.717",
|
||||
"lastModified": "2024-11-21T09:29:45.757",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-12-19T14:59:57.403",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -39,46 +59,133 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "123.0.6312.122",
|
||||
"matchCriteriaId": "E8445CD7-B513-48C1-9EF0-4B57C9ED6654"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CA277A6C-83EC-4536-9125-97B84C4FAF59"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_10.html",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://issues.chromium.org/issues/328859176",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5EW66LXDACTB5FCHLUPZOGD2KA2J62Q2/",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EVEJEW7UCSUSK2J2FYQRZZPI74P2D3JP/",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NDHNEFD76ORM7WBWAEZT6HSYDMZVIED4/",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_10.html",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://issues.chromium.org/issues/328859176",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5EW66LXDACTB5FCHLUPZOGD2KA2J62Q2/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EVEJEW7UCSUSK2J2FYQRZZPI74P2D3JP/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NDHNEFD76ORM7WBWAEZT6HSYDMZVIED4/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-3832",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2024-04-17T08:15:10.190",
|
||||
"lastModified": "2024-11-21T09:30:29.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-12-19T14:53:34.190",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -39,46 +59,133 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "124.0.6367.60",
|
||||
"matchCriteriaId": "AFB90495-B48B-4020-A2CC-51D77CABEB72"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CA277A6C-83EC-4536-9125-97B84C4FAF59"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_16.html",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://issues.chromium.org/issues/331358160",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CWIVXXSVO5VB3NAZVFJ7CWVBN6W2735T/",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PCWPUBGTBNT4EW32YNZMRIPB3Y4R6XL6/",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WEP5NJUWMDRLDQUKU4LFDUHF5PCYAPIO/",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_16.html",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://issues.chromium.org/issues/331358160",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CWIVXXSVO5VB3NAZVFJ7CWVBN6W2735T/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PCWPUBGTBNT4EW32YNZMRIPB3Y4R6XL6/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WEP5NJUWMDRLDQUKU4LFDUHF5PCYAPIO/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-3833",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2024-04-17T08:15:10.243",
|
||||
"lastModified": "2024-11-21T09:30:29.563",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-12-19T14:46:01.697",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -51,70 +81,163 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "124.0.6367.60",
|
||||
"matchCriteriaId": "AFB90495-B48B-4020-A2CC-51D77CABEB72"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CA277A6C-83EC-4536-9125-97B84C4FAF59"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_16.html",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://issues.chromium.org/issues/331383939",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CWIVXXSVO5VB3NAZVFJ7CWVBN6W2735T/",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IDLUD644WEWGOFKMZWC2K7Z4CQOKQYR7/",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M4PCXKCOVBUUU6GOSN46DCPI4HMER3PJ/",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PCWPUBGTBNT4EW32YNZMRIPB3Y4R6XL6/",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOC3HLIZCGMIJLJ6LME5UWUUIFLXEGRN/",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WEP5NJUWMDRLDQUKU4LFDUHF5PCYAPIO/",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_16.html",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://issues.chromium.org/issues/331383939",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CWIVXXSVO5VB3NAZVFJ7CWVBN6W2735T/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IDLUD644WEWGOFKMZWC2K7Z4CQOKQYR7/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M4PCXKCOVBUUU6GOSN46DCPI4HMER3PJ/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PCWPUBGTBNT4EW32YNZMRIPB3Y4R6XL6/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOC3HLIZCGMIJLJ6LME5UWUUIFLXEGRN/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WEP5NJUWMDRLDQUKU4LFDUHF5PCYAPIO/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-3840",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2024-04-17T08:15:10.483",
|
||||
"lastModified": "2024-11-21T09:30:30.660",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-12-19T14:35:08.377",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -51,70 +81,163 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "124.0.6367.60",
|
||||
"matchCriteriaId": "AFB90495-B48B-4020-A2CC-51D77CABEB72"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CA277A6C-83EC-4536-9125-97B84C4FAF59"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_16.html",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://issues.chromium.org/issues/41493458",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CWIVXXSVO5VB3NAZVFJ7CWVBN6W2735T/",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IDLUD644WEWGOFKMZWC2K7Z4CQOKQYR7/",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M4PCXKCOVBUUU6GOSN46DCPI4HMER3PJ/",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PCWPUBGTBNT4EW32YNZMRIPB3Y4R6XL6/",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOC3HLIZCGMIJLJ6LME5UWUUIFLXEGRN/",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WEP5NJUWMDRLDQUKU4LFDUHF5PCYAPIO/",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_16.html",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://issues.chromium.org/issues/41493458",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CWIVXXSVO5VB3NAZVFJ7CWVBN6W2735T/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IDLUD644WEWGOFKMZWC2K7Z4CQOKQYR7/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M4PCXKCOVBUUU6GOSN46DCPI4HMER3PJ/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PCWPUBGTBNT4EW32YNZMRIPB3Y4R6XL6/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOC3HLIZCGMIJLJ6LME5UWUUIFLXEGRN/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WEP5NJUWMDRLDQUKU4LFDUHF5PCYAPIO/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-3841",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2024-04-17T08:15:10.530",
|
||||
"lastModified": "2024-11-21T09:30:30.860",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-12-19T14:23:44.970",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -51,70 +81,175 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "124.0.6367.60",
|
||||
"matchCriteriaId": "AFB90495-B48B-4020-A2CC-51D77CABEB72"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CA277A6C-83EC-4536-9125-97B84C4FAF59"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_16.html",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://issues.chromium.org/issues/330376742",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CWIVXXSVO5VB3NAZVFJ7CWVBN6W2735T/",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IDLUD644WEWGOFKMZWC2K7Z4CQOKQYR7/",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M4PCXKCOVBUUU6GOSN46DCPI4HMER3PJ/",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PCWPUBGTBNT4EW32YNZMRIPB3Y4R6XL6/",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOC3HLIZCGMIJLJ6LME5UWUUIFLXEGRN/",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WEP5NJUWMDRLDQUKU4LFDUHF5PCYAPIO/",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_16.html",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://issues.chromium.org/issues/330376742",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CWIVXXSVO5VB3NAZVFJ7CWVBN6W2735T/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IDLUD644WEWGOFKMZWC2K7Z4CQOKQYR7/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M4PCXKCOVBUUU6GOSN46DCPI4HMER3PJ/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PCWPUBGTBNT4EW32YNZMRIPB3Y4R6XL6/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOC3HLIZCGMIJLJ6LME5UWUUIFLXEGRN/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WEP5NJUWMDRLDQUKU4LFDUHF5PCYAPIO/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-3843",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2024-04-17T08:15:10.573",
|
||||
"lastModified": "2024-11-21T09:30:31.057",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-12-19T14:12:42.743",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -51,70 +81,163 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "124.0.6367.60",
|
||||
"matchCriteriaId": "AFB90495-B48B-4020-A2CC-51D77CABEB72"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CA277A6C-83EC-4536-9125-97B84C4FAF59"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_16.html",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://issues.chromium.org/issues/41486690",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CWIVXXSVO5VB3NAZVFJ7CWVBN6W2735T/",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IDLUD644WEWGOFKMZWC2K7Z4CQOKQYR7/",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M4PCXKCOVBUUU6GOSN46DCPI4HMER3PJ/",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PCWPUBGTBNT4EW32YNZMRIPB3Y4R6XL6/",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOC3HLIZCGMIJLJ6LME5UWUUIFLXEGRN/",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WEP5NJUWMDRLDQUKU4LFDUHF5PCYAPIO/",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_16.html",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://issues.chromium.org/issues/41486690",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CWIVXXSVO5VB3NAZVFJ7CWVBN6W2735T/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IDLUD644WEWGOFKMZWC2K7Z4CQOKQYR7/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M4PCXKCOVBUUU6GOSN46DCPI4HMER3PJ/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PCWPUBGTBNT4EW32YNZMRIPB3Y4R6XL6/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOC3HLIZCGMIJLJ6LME5UWUUIFLXEGRN/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WEP5NJUWMDRLDQUKU4LFDUHF5PCYAPIO/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-3844",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2024-04-17T08:15:10.620",
|
||||
"lastModified": "2024-11-21T09:30:31.250",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-12-19T13:59:12.247",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -51,70 +81,163 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "124.0.6367.60",
|
||||
"matchCriteriaId": "AFB90495-B48B-4020-A2CC-51D77CABEB72"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CA277A6C-83EC-4536-9125-97B84C4FAF59"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_16.html",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://issues.chromium.org/issues/40058873",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CWIVXXSVO5VB3NAZVFJ7CWVBN6W2735T/",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IDLUD644WEWGOFKMZWC2K7Z4CQOKQYR7/",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M4PCXKCOVBUUU6GOSN46DCPI4HMER3PJ/",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PCWPUBGTBNT4EW32YNZMRIPB3Y4R6XL6/",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOC3HLIZCGMIJLJ6LME5UWUUIFLXEGRN/",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WEP5NJUWMDRLDQUKU4LFDUHF5PCYAPIO/",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_16.html",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://issues.chromium.org/issues/40058873",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CWIVXXSVO5VB3NAZVFJ7CWVBN6W2735T/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IDLUD644WEWGOFKMZWC2K7Z4CQOKQYR7/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M4PCXKCOVBUUU6GOSN46DCPI4HMER3PJ/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PCWPUBGTBNT4EW32YNZMRIPB3Y4R6XL6/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOC3HLIZCGMIJLJ6LME5UWUUIFLXEGRN/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WEP5NJUWMDRLDQUKU4LFDUHF5PCYAPIO/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
90
CVE-2024/CVE-2024-91xx/CVE-2024-9101.json
Normal file
90
CVE-2024/CVE-2024-91xx/CVE-2024-9101.json
Normal file
@ -0,0 +1,90 @@
|
||||
{
|
||||
"id": "CVE-2024-9101",
|
||||
"sourceIdentifier": "vulnerability@ncsc.ch",
|
||||
"published": "2024-12-19T14:15:06.147",
|
||||
"lastModified": "2024-12-19T14:15:06.147",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A reflected cross-site scripting (XSS) vulnerability in the 'Entry Chooser' of phpLDAPadmin (version 1.2.1 through the latest version, 1.2.6.7) allows attackers to execute arbitrary JavaScript in the user's browser via the 'element' parameter, which is unsafely passed to the JavaScript 'eval' function. However, exploitation is limited to specific conditions where 'opener' is correctly set."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "vulnerability@ncsc.ch",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 2.1,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"attackRequirements": "PRESENT",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "ACTIVE",
|
||||
"vulnerableSystemConfidentiality": "LOW",
|
||||
"vulnerableSystemIntegrity": "LOW",
|
||||
"vulnerableSystemAvailability": "LOW",
|
||||
"subsequentSystemConfidentiality": "LOW",
|
||||
"subsequentSystemIntegrity": "LOW",
|
||||
"subsequentSystemAvailability": "LOW",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "vulnerability@ncsc.ch",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/leenooks/phpLDAPadmin/blob/master/htdocs/entry_chooser.php",
|
||||
"source": "vulnerability@ncsc.ch"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/leenooks/phpLDAPadmin/commit/f713afc8d164169516c91b0988531f2accb9bce6#diff-c2d6d7678ada004e704ee055169395a58227aaec86a6f75fa74ca18ff49bca44R27",
|
||||
"source": "vulnerability@ncsc.ch"
|
||||
},
|
||||
{
|
||||
"url": "https://sourceforge.net/projects/phpldapadmin/files/phpldapadmin-php5/1.2.1/",
|
||||
"source": "vulnerability@ncsc.ch"
|
||||
},
|
||||
{
|
||||
"url": "https://www.redguard.ch/blog/2024/12/19/security-advisory-phpldapadmin/",
|
||||
"source": "vulnerability@ncsc.ch"
|
||||
}
|
||||
]
|
||||
}
|
86
CVE-2024/CVE-2024-91xx/CVE-2024-9102.json
Normal file
86
CVE-2024/CVE-2024-91xx/CVE-2024-9102.json
Normal file
@ -0,0 +1,86 @@
|
||||
{
|
||||
"id": "CVE-2024-9102",
|
||||
"sourceIdentifier": "vulnerability@ncsc.ch",
|
||||
"published": "2024-12-19T14:15:06.327",
|
||||
"lastModified": "2024-12-19T14:15:06.327",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "phpLDAPadmin since at least version 1.2.0 through the latest version 1.2.6.7 allows users to export elements from the LDAP directory into a Comma-Separated Value (CSV) file, but it does not neutralize special elements that could be interpreted as a command when the file is opened by a spreadsheet product. Thus, this could lead to CSV Formula Injection."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "vulnerability@ncsc.ch",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:H/SI:H/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.0,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "PRESENT",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "LOW",
|
||||
"vulnerableSystemIntegrity": "LOW",
|
||||
"vulnerableSystemAvailability": "LOW",
|
||||
"subsequentSystemConfidentiality": "HIGH",
|
||||
"subsequentSystemIntegrity": "HIGH",
|
||||
"subsequentSystemAvailability": "LOW",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "vulnerability@ncsc.ch",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-1236"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/leenooks/phpLDAPadmin/commit/ea17aadef46fd29850160987fe7740ceed1381ad#diff-93b9f3e6d4c5bdacf469ea0ec74c1e9217ca6272da9be5a1bfd711f7da16f9e3R240",
|
||||
"source": "vulnerability@ncsc.ch"
|
||||
},
|
||||
{
|
||||
"url": "https://sourceforge.net/projects/phpldapadmin/files/phpldapadmin-php5/1.2.0",
|
||||
"source": "vulnerability@ncsc.ch"
|
||||
},
|
||||
{
|
||||
"url": "https://www.redguard.ch/blog/2024/12/19/security-advisory-phpldapadmin/",
|
||||
"source": "vulnerability@ncsc.ch"
|
||||
}
|
||||
]
|
||||
}
|
54
README.md
54
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-12-19T13:00:20.131768+00:00
|
||||
2024-12-19T15:00:21.935449+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-12-19T12:15:16.673000+00:00
|
||||
2024-12-19T14:59:57.403000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,38 +33,46 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
274361
|
||||
274369
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `8`
|
||||
|
||||
- [CVE-2020-12820](CVE-2020/CVE-2020-128xx/CVE-2020-12820.json) (`2024-12-19T11:15:05.700`)
|
||||
- [CVE-2020-15934](CVE-2020/CVE-2020-159xx/CVE-2020-15934.json) (`2024-12-19T11:15:06.930`)
|
||||
- [CVE-2021-26115](CVE-2021/CVE-2021-261xx/CVE-2021-26115.json) (`2024-12-19T11:15:07.103`)
|
||||
- [CVE-2024-12331](CVE-2024/CVE-2024-123xx/CVE-2024-12331.json) (`2024-12-19T12:15:05.330`)
|
||||
- [CVE-2024-12626](CVE-2024/CVE-2024-126xx/CVE-2024-12626.json) (`2024-12-19T12:15:06.160`)
|
||||
- [CVE-2024-37962](CVE-2024/CVE-2024-379xx/CVE-2024-37962.json) (`2024-12-19T12:15:06.737`)
|
||||
- [CVE-2024-45818](CVE-2024/CVE-2024-458xx/CVE-2024-45818.json) (`2024-12-19T12:15:16.540`)
|
||||
- [CVE-2024-45819](CVE-2024/CVE-2024-458xx/CVE-2024-45819.json) (`2024-12-19T12:15:16.673`)
|
||||
- [CVE-2021-26102](CVE-2021/CVE-2021-261xx/CVE-2021-26102.json) (`2024-12-19T14:15:05.380`)
|
||||
- [CVE-2021-32589](CVE-2021/CVE-2021-325xx/CVE-2021-32589.json) (`2024-12-19T13:15:05.707`)
|
||||
- [CVE-2024-10244](CVE-2024/CVE-2024-102xx/CVE-2024-10244.json) (`2024-12-19T14:15:05.760`)
|
||||
- [CVE-2024-12782](CVE-2024/CVE-2024-127xx/CVE-2024-12782.json) (`2024-12-19T13:15:05.900`)
|
||||
- [CVE-2024-12783](CVE-2024/CVE-2024-127xx/CVE-2024-12783.json) (`2024-12-19T13:15:06.217`)
|
||||
- [CVE-2024-12784](CVE-2024/CVE-2024-127xx/CVE-2024-12784.json) (`2024-12-19T14:15:05.943`)
|
||||
- [CVE-2024-9101](CVE-2024/CVE-2024-91xx/CVE-2024-9101.json) (`2024-12-19T14:15:06.147`)
|
||||
- [CVE-2024-9102](CVE-2024/CVE-2024-91xx/CVE-2024-9102.json) (`2024-12-19T14:15:06.327`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `11`
|
||||
Recently modified CVEs: `19`
|
||||
|
||||
- [CVE-2021-47615](CVE-2021/CVE-2021-476xx/CVE-2021-47615.json) (`2024-12-19T11:15:07.277`)
|
||||
- [CVE-2022-48700](CVE-2022/CVE-2022-487xx/CVE-2022-48700.json) (`2024-12-19T11:15:30.050`)
|
||||
- [CVE-2023-52759](CVE-2023/CVE-2023-527xx/CVE-2023-52759.json) (`2024-12-19T11:15:30.140`)
|
||||
- [CVE-2024-26713](CVE-2024/CVE-2024-267xx/CVE-2024-26713.json) (`2024-12-19T12:15:06.330`)
|
||||
- [CVE-2024-26720](CVE-2024/CVE-2024-267xx/CVE-2024-26720.json) (`2024-12-19T12:15:06.417`)
|
||||
- [CVE-2024-26972](CVE-2024/CVE-2024-269xx/CVE-2024-26972.json) (`2024-12-19T12:15:06.507`)
|
||||
- [CVE-2024-35928](CVE-2024/CVE-2024-359xx/CVE-2024-35928.json) (`2024-12-19T12:15:06.590`)
|
||||
- [CVE-2024-36885](CVE-2024/CVE-2024-368xx/CVE-2024-36885.json) (`2024-12-19T12:15:06.657`)
|
||||
- [CVE-2024-41024](CVE-2024/CVE-2024-410xx/CVE-2024-41024.json) (`2024-12-19T12:15:06.900`)
|
||||
- [CVE-2024-42116](CVE-2024/CVE-2024-421xx/CVE-2024-42116.json) (`2024-12-19T12:15:06.967`)
|
||||
- [CVE-2024-43903](CVE-2024/CVE-2024-439xx/CVE-2024-43903.json) (`2024-12-19T12:15:07.040`)
|
||||
- [CVE-2020-3359](CVE-2020/CVE-2020-33xx/CVE-2020-3359.json) (`2024-12-19T13:52:35.190`)
|
||||
- [CVE-2020-3390](CVE-2020/CVE-2020-33xx/CVE-2020-3390.json) (`2024-12-19T13:52:35.190`)
|
||||
- [CVE-2020-3393](CVE-2020/CVE-2020-33xx/CVE-2020-3393.json) (`2024-12-19T13:52:35.190`)
|
||||
- [CVE-2020-3503](CVE-2020/CVE-2020-35xx/CVE-2020-3503.json) (`2024-12-19T13:52:35.190`)
|
||||
- [CVE-2022-34398](CVE-2022/CVE-2022-343xx/CVE-2022-34398.json) (`2024-12-19T14:25:44.370`)
|
||||
- [CVE-2024-12657](CVE-2024/CVE-2024-126xx/CVE-2024-12657.json) (`2024-12-19T14:46:43.777`)
|
||||
- [CVE-2024-12658](CVE-2024/CVE-2024-126xx/CVE-2024-12658.json) (`2024-12-19T14:47:23.380`)
|
||||
- [CVE-2024-12659](CVE-2024/CVE-2024-126xx/CVE-2024-12659.json) (`2024-12-19T14:49:24.747`)
|
||||
- [CVE-2024-12660](CVE-2024/CVE-2024-126xx/CVE-2024-12660.json) (`2024-12-19T14:49:52.357`)
|
||||
- [CVE-2024-12662](CVE-2024/CVE-2024-126xx/CVE-2024-12662.json) (`2024-12-19T14:45:43.547`)
|
||||
- [CVE-2024-12664](CVE-2024/CVE-2024-126xx/CVE-2024-12664.json) (`2024-12-19T14:55:00.460`)
|
||||
- [CVE-2024-12665](CVE-2024/CVE-2024-126xx/CVE-2024-12665.json) (`2024-12-19T14:55:20.300`)
|
||||
- [CVE-2024-3516](CVE-2024/CVE-2024-35xx/CVE-2024-3516.json) (`2024-12-19T14:59:57.403`)
|
||||
- [CVE-2024-3832](CVE-2024/CVE-2024-38xx/CVE-2024-3832.json) (`2024-12-19T14:53:34.190`)
|
||||
- [CVE-2024-3833](CVE-2024/CVE-2024-38xx/CVE-2024-3833.json) (`2024-12-19T14:46:01.697`)
|
||||
- [CVE-2024-3840](CVE-2024/CVE-2024-38xx/CVE-2024-3840.json) (`2024-12-19T14:35:08.377`)
|
||||
- [CVE-2024-3841](CVE-2024/CVE-2024-38xx/CVE-2024-3841.json) (`2024-12-19T14:23:44.970`)
|
||||
- [CVE-2024-3843](CVE-2024/CVE-2024-38xx/CVE-2024-3843.json) (`2024-12-19T14:12:42.743`)
|
||||
- [CVE-2024-3844](CVE-2024/CVE-2024-38xx/CVE-2024-3844.json) (`2024-12-19T13:59:12.247`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
84
_state.csv
84
_state.csv
@ -147830,7 +147830,7 @@ CVE-2020-12817,0,0,e98d3763d551f764083135cad61bc60ac9df18241e9743a5cc7008fcd5839
|
||||
CVE-2020-12818,0,0,671fc9fbdbe3092c4779c13951027edfc290fea7c7ab7abd7d0208cd1bbcf899,2024-11-21T05:00:20.173000
|
||||
CVE-2020-12819,0,0,55808baac491aaae6a7eac880b91ce002ae30d34f239a61c87cf56ec2a23132d,2024-12-19T08:15:11.770000
|
||||
CVE-2020-1282,0,0,5dffd0f7490f04d4b38e703efd93f4aeaf53342feda449eb492337d8e143e58b,2024-11-21T05:10:09.537000
|
||||
CVE-2020-12820,1,1,fabc96fd5243491a6098701b35c35443cbca96908edad8182cb3f5358592a491,2024-12-19T11:15:05.700000
|
||||
CVE-2020-12820,0,0,fabc96fd5243491a6098701b35c35443cbca96908edad8182cb3f5358592a491,2024-12-19T11:15:05.700000
|
||||
CVE-2020-12821,0,0,80bcfaffcfb668796236a3e35b815e8ec4146df6282fdf2e3e6375b32fcb8032,2024-11-21T05:00:20.317000
|
||||
CVE-2020-12823,0,0,63ce9c2c4c1ef765c93695caf4139f7414cd4af512f7553968ad51b1ea50fa92,2024-11-21T05:00:20.483000
|
||||
CVE-2020-12824,0,0,6534202f520baa89c97b25b54d55668d51bf5fbe629e32fb97e834206f437857,2024-11-21T05:00:20.660000
|
||||
@ -150818,7 +150818,7 @@ CVE-2020-15930,0,0,ddf771fc6d87f6ced9204169d4acfef1c571c2a978ab816ce8b7fd853bc21
|
||||
CVE-2020-15931,0,0,a10cb49292305ec6a808df00d3348e0e4db90c3f72b0471a15de535201f79707,2024-11-21T05:06:28.807000
|
||||
CVE-2020-15932,0,0,753b5138d95055bc631356d86e2b858be1e912eb235704fc2a5dc0ad771b1951,2024-11-21T05:06:28.963000
|
||||
CVE-2020-15933,0,0,c58c28ead27a2edd586e93aea5954b30d5e719ba78be7f7d53fd2f414e7f619e,2024-11-21T05:06:29.110000
|
||||
CVE-2020-15934,1,1,fbf5e9e8c2d2db699f07d021deae47c1509d3770133d7f47c3aa618c468fb0ea,2024-12-19T11:15:06.930000
|
||||
CVE-2020-15934,0,0,fbf5e9e8c2d2db699f07d021deae47c1509d3770133d7f47c3aa618c468fb0ea,2024-12-19T11:15:06.930000
|
||||
CVE-2020-15935,0,0,3d44ad87ef52f836bf08b07849628b028d3f60cc6a3e7dd0c2e18d8d1ce440ee,2024-11-21T05:06:29.250000
|
||||
CVE-2020-15936,0,0,f67304764b7eed9af18135dc77461ba4954f24074f19be7d3c356ca681372042,2024-11-21T05:06:29.380000
|
||||
CVE-2020-15937,0,0,5c7d159a511897639fe925e50a3abb031ba9f39c82555f2dea6c23f4a0b2a723,2024-11-21T05:06:29.510000
|
||||
@ -158020,7 +158020,7 @@ CVE-2020-3355,0,0,0753cc2134594794c8f65c82be029cfb722c8dfa81e11c72169ce3697a2cb3
|
||||
CVE-2020-3356,0,0,7319a54cc68b40fe0ecd5645a3e8c1c3f3291a94c1f61b789be4a838f6db7611,2024-11-21T05:30:52.107000
|
||||
CVE-2020-3357,0,0,1972f6206ba8f62ff474707781510603f3cfc543660db035ff09c82e84fe3b74,2024-11-21T05:30:52.210000
|
||||
CVE-2020-3358,0,0,6baef50d36c1253be0a8f00a89a41f1ff404eac4d38c28eccb71dbdd3f10cb0e,2024-11-21T05:30:52.327000
|
||||
CVE-2020-3359,0,0,b59e6f4dc87e121e996d956702cbe158184d90b34f6becf795664b9a85b0db3f,2024-11-21T05:30:52.443000
|
||||
CVE-2020-3359,0,1,04b2e9a2324a69717c6edb79b0d64b5dccb33d20e03b5c74dfefbcb09e0a33ea,2024-12-19T13:52:35.190000
|
||||
CVE-2020-3360,0,0,65e5efe6205de98c605b1a094c1380e007443e11181b408c85d233eef079b248,2024-11-21T05:30:52.567000
|
||||
CVE-2020-3361,0,0,cf291cc66b5b534c117aba0c6ae1bad8fa2989964749318528b63dabe3d3e8c9,2024-11-21T05:30:52.717000
|
||||
CVE-2020-3362,0,0,169869772cb31e60f1275ca6d634785d1796231011d38370aace094a60812d37,2024-11-21T05:30:52.837000
|
||||
@ -158050,10 +158050,10 @@ CVE-2020-3386,0,0,f5692ae11f45d58264ddb8d6ff66a35a0ebddd3b52cc5f3d7919bdc835c0e3
|
||||
CVE-2020-3387,0,0,4b93ac6efae7c90dfe534abae09055c79cbff7b0a9c14dbfa8c64257ed0663a1,2024-11-21T05:30:55.833000
|
||||
CVE-2020-3388,0,0,22c32c10651ebf8b298fc898a7d40ab98e5099e6585996e8d220b1f59a9b2d39,2024-11-21T05:30:55.963000
|
||||
CVE-2020-3389,0,0,8c2e85e272ec460b2a3e5633519b2c431adb53b86419300321e14a4be1ee4e5e,2024-11-21T05:30:56.097000
|
||||
CVE-2020-3390,0,0,a11274fbcb4c4c3a5d77992236adf7e0dc4dcaf2c0c79ca035bfa3f9d48b1255,2024-11-21T05:30:56.207000
|
||||
CVE-2020-3390,0,1,0b651df5da9d0920f0852f1c6b6585fc8fbf4fd717e8187d493809d77237d484,2024-12-19T13:52:35.190000
|
||||
CVE-2020-3391,0,0,0b25594cf1c2d26768848273409cacbac6d254fcb4aafc3578041fe9774d8fe8,2024-11-21T05:30:56.340000
|
||||
CVE-2020-3392,0,0,104474d1564235600d45fffcf193a3c8d8155e82ebbbd48ddf734e8706729400,2024-11-21T05:30:56.453000
|
||||
CVE-2020-3393,0,0,cfe67e2d414cc7b40146629ba9e51b39ac5d185ee34cfacf17641fad21db99bb,2024-11-21T05:30:56.567000
|
||||
CVE-2020-3393,0,1,0d6f1230c2b196e5d24f7f8104e0e611d412ef68e42ea9fe9ae4b3ef2294c2d8,2024-12-19T13:52:35.190000
|
||||
CVE-2020-3394,0,0,25fca6a6684200fa0ada87cd25c0495147cfa85441051509526ced422c2ee69c,2024-11-21T05:30:56.723000
|
||||
CVE-2020-3396,0,0,ef719e7b808c4de9cf5e5a74f82ba105dc7f6a99959dc6dd7e1066ab8839e01f,2024-11-21T05:30:56.857000
|
||||
CVE-2020-3397,0,0,2d86635423b471e64bbae4a8d3d51f7fabbba054147e982523388d2abd06c28a,2024-11-21T05:30:57
|
||||
@ -158158,7 +158158,7 @@ CVE-2020-3500,0,0,a0a6129343211679a02d4486d3af9c47b578067f77ae2ba33b66af9f64e67c
|
||||
CVE-2020-3501,0,0,3b4f0fef4d8fe63611c421856606f5f9e75654123e2fb96e88425aea276769ff,2024-11-21T05:31:12.060000
|
||||
CVE-2020-35012,0,0,2eccd8b4634d38c79c4a049614e16d992339530a03c38cac69e25306cfc5d63f,2024-11-21T05:26:47.150000
|
||||
CVE-2020-3502,0,0,95b6b887a00506e85a7a00916e0619b18a4a2c381cd4cebbf37ed50740de376d,2024-11-21T05:31:12.200000
|
||||
CVE-2020-3503,0,0,87026910b7dea5e94fec01d9ffcb75680461833492150da4113b712a84a1be11,2024-11-21T05:31:12.317000
|
||||
CVE-2020-3503,0,1,ccc00cb5b034f9f32fa6d55d7071e827f3c092d5e6344b9f3f0a017192c4f51f,2024-12-19T13:52:35.190000
|
||||
CVE-2020-35037,0,0,50483bb65cf6f2d2b2e13d30f299f20950668cee0807f1510510e253a5d74731,2024-11-21T05:26:47.290000
|
||||
CVE-2020-3504,0,0,67103fe449687d9f3a9dbaaf8a97d5e0b6b547ad04a6c9ca0129467d674cc16e,2024-11-21T05:31:12.453000
|
||||
CVE-2020-3505,0,0,77099b5686a878796cf0b7c22a22d3279cf78369b1ebedcc62205bb91d340bdf,2024-11-21T05:31:12.597000
|
||||
@ -171890,6 +171890,7 @@ CVE-2021-26097,0,0,5492509e540c4b9490ee3ecc2fc9e19c927e8dd5d975d3f7f5bdd412c54ec
|
||||
CVE-2021-26098,0,0,3a78a7a98f4df60c6a00e525ff05b85d5d44ada2a807d7c7d95ffc04905c1637,2024-11-21T05:55:51.797000
|
||||
CVE-2021-26099,0,0,3e3b15c98ba7a020a9c3367c6e1c3eecdb1bbc4fd677e304269fa38f92e8ab14,2024-11-21T05:55:51.920000
|
||||
CVE-2021-26100,0,0,ed053018eaf23e6bce5ff1257543fd9b49a4ccbc5175f03e01d9b5ca5a66c918,2024-11-21T05:55:52.050000
|
||||
CVE-2021-26102,1,1,d0fe198b91edfd07b16c97f88e18675573b221290d85af27607022989b793bbf,2024-12-19T14:15:05.380000
|
||||
CVE-2021-26103,0,0,3e0d5f7e10ed3bb8c2f0e6e30419d3e890d688617b5f5b7d1465896c87e7af6f,2024-11-21T05:55:52.177000
|
||||
CVE-2021-26104,0,0,50ba7945ee1730d62d5768fd49dc86483435d5f7ffc0fd56b30e4dbdb152e85b,2024-11-21T05:55:52.310000
|
||||
CVE-2021-26106,0,0,1156db33903c97c6180bd2eb70f02894bdb10adaf97b8483a1abada00d94d3b1,2024-11-21T05:55:52.487000
|
||||
@ -171901,7 +171902,7 @@ CVE-2021-26111,0,0,65cfd7a7617da7e8096c4fc1d4834851a9a89795b381808a5ed837084e869
|
||||
CVE-2021-26112,0,0,ad04a90f399279c6cb54924592c27b54612f21ed4f64ef28078cb3c6ac8d4aab,2024-11-21T05:55:53.290000
|
||||
CVE-2021-26113,0,0,1239a1d8bfda55bded8d0633a9a803d0afe80a8d5a56bcca10ede0ba5a365e91,2024-11-21T05:55:53.423000
|
||||
CVE-2021-26114,0,0,4e26ac22bb1817e738cd9fdb3acbb9510f49ffdd0a44f0853a50532b15c1012d,2024-11-21T05:55:53.553000
|
||||
CVE-2021-26115,1,1,bd36fd5474004b24183f03ce0fd60d9f22ae13d2c0c06884aeddb3036ec610c4,2024-12-19T11:15:07.103000
|
||||
CVE-2021-26115,0,0,bd36fd5474004b24183f03ce0fd60d9f22ae13d2c0c06884aeddb3036ec610c4,2024-12-19T11:15:07.103000
|
||||
CVE-2021-26116,0,0,cce36364eeea643186b7df95f8898bc06762541228a4d98951c68bee64b93c3a,2024-11-21T05:55:53.683000
|
||||
CVE-2021-26117,0,0,4247253501c6b016c1398ba584d37347914d71bb3bacba1824a141ac6d048539,2024-11-21T05:55:53.820000
|
||||
CVE-2021-26118,0,0,28ea2534ddcf8aea0dfe0198838afbdd8bdfd393b7f85365babb96b975d0fa61,2024-11-21T05:55:54.040000
|
||||
@ -176437,6 +176438,7 @@ CVE-2021-32585,0,0,5768abccf57646b16f23da60be2ff4de982ce08fd70ce938bfb45c990c620
|
||||
CVE-2021-32586,0,0,34e4c2125f96b38865aef7ca62056093a6679c5b5fcdc8f412729682e6b6545a,2024-11-21T06:07:19.600000
|
||||
CVE-2021-32587,0,0,b3a3ebaa57939f1fce261725e56c8d4427307bf6a8feda4373094acc2be6caa8,2024-11-21T06:07:19.757000
|
||||
CVE-2021-32588,0,0,3d733168babd74fe035c8a4800ddc796e3529db9c0dd80e7995ce4a3f10c1c5b,2024-11-21T06:07:19.903000
|
||||
CVE-2021-32589,1,1,d6738550d4f8537f060f62ce579d533dbba2870b6224d15e29f681418ebcee4f,2024-12-19T13:15:05.707000
|
||||
CVE-2021-32590,0,0,31e2aa593ab42693b927463e7677935f8e51214decf73d40bca768acdc83bf1c,2024-11-21T06:07:20.043000
|
||||
CVE-2021-32591,0,0,a08df48a7b6fb917a33cfed960a11b4ba43aa20c94d83651237e38f63328427f,2024-11-21T06:07:20.180000
|
||||
CVE-2021-32592,0,0,9abaf52755247a09b55286334808bbc822bf005d261fea183303a194b08befe7,2024-11-21T06:07:20.310000
|
||||
@ -187772,7 +187774,7 @@ CVE-2021-47611,0,0,72fed461ca248513af7a725249d88365519d130d94049f54dcda50a4f2cff
|
||||
CVE-2021-47612,0,0,957ecdda3a8b98e1534a1b82e3aaa6c8f6122bd058e5113c51e195d118cea61c,2024-11-21T06:36:40.130000
|
||||
CVE-2021-47613,0,0,19a04fd1f0584a867ff6d6f3c118207ceb6d9be93705d6bcbc67864890c29837,2024-11-21T06:36:40.277000
|
||||
CVE-2021-47614,0,0,36e7357b7b81720992f860c50a94c0a0e767ab5f5631183c966cf01e7c962969,2024-11-21T06:36:40.410000
|
||||
CVE-2021-47615,0,1,4ae4c3237eabb37cbb4e66774127ecf3513adf8017103d7fc9055396dd915646,2024-12-19T11:15:07.277000
|
||||
CVE-2021-47615,0,0,4ae4c3237eabb37cbb4e66774127ecf3513adf8017103d7fc9055396dd915646,2024-12-19T11:15:07.277000
|
||||
CVE-2021-47616,0,0,844339b9257190d77ca0e068698a60ae9a32d03d73850d8c85270493a13952b2,2024-11-21T06:36:40.680000
|
||||
CVE-2021-47617,0,0,97ae21eefd31138fe6c12d734b67f4e215edd68910efec959cb47546cca1f752,2024-11-21T06:36:40.810000
|
||||
CVE-2021-47618,0,0,0fa0dd97d1fdb5f1da0fd7171dd10a5a040e00c10e2e413c2e56d2d12f7f666d,2024-11-21T06:36:40.970000
|
||||
@ -201893,7 +201895,7 @@ CVE-2022-34394,0,0,12529d5803139c324d92392a02b070380856c289b2e3cc8ba10436e2d18d9
|
||||
CVE-2022-34395,0,0,3e610450fa3e2ded1776e6ff21c56d87d784ddeb6a7d36f171e32441c341f76e,2023-11-07T03:48:35.580000
|
||||
CVE-2022-34396,0,0,43f4c66c05911687c5ca3f76d67da661b0a8c5a0ec572415bdbf2de54d73f09c,2024-11-21T07:09:25.880000
|
||||
CVE-2022-34397,0,0,e4de43f6ea892758f07db9463a69b4acd670c8350b03710d660a3af85a8350a1,2024-11-21T07:09:26.017000
|
||||
CVE-2022-34398,0,0,5e72d512b98ef8ad6bdda0c4dafa3587175838648a7491408056151028136f9a,2024-11-21T07:09:26.153000
|
||||
CVE-2022-34398,0,1,76aefc48fb05dc81bb12ac53e0d682c00d449730e8e8e053801abf2527dbc99a,2024-12-19T14:25:44.370000
|
||||
CVE-2022-34399,0,0,e78feacc06d4c1af740cf0ca8bfab1321193a36b66560e1bfd517614ebb4e10f,2024-11-21T07:09:26.500000
|
||||
CVE-2022-3440,0,0,bc1605c5df870bd1f7eaeaef03dfc3bae5d686b6d8f9461275a8186ec03d69bb,2024-11-21T07:19:31.413000
|
||||
CVE-2022-34400,0,0,e214ef06bb53710b8e350d276371d447129a03dfd452297ab3d24476c0a8d98f,2024-11-21T07:09:26.667000
|
||||
@ -212623,7 +212625,7 @@ CVE-2022-48697,0,0,929abd519afd2d70713936962bbdba23f04f5766bcb86e4b1c902e9047e46
|
||||
CVE-2022-48698,0,0,02c1690bff6c336e6ab17c3750cee520d0e856986dee5e0e93b475ff30ff2d27,2024-11-21T07:33:48.747000
|
||||
CVE-2022-48699,0,0,4a65b916873eacb0ff3e3e320e4042125dd7b4593e08989ea9e1bb3148422bc9,2024-11-21T07:33:48.920000
|
||||
CVE-2022-4870,0,0,0653c3f110427e600f4fff49760ee6f7023220e09583d1b4c2850e6f657116c1,2024-11-21T07:36:06.513000
|
||||
CVE-2022-48700,0,1,df92ed3f7cac2bfbad90002c2f19832292b50de0d525a7db006f3a2f0869ac18,2024-12-19T11:15:30.050000
|
||||
CVE-2022-48700,0,0,df92ed3f7cac2bfbad90002c2f19832292b50de0d525a7db006f3a2f0869ac18,2024-12-19T11:15:30.050000
|
||||
CVE-2022-48701,0,0,d1e9cf0eb78fc885e1142bd9aee72edcf01dbaa0c0a6bd96dd014e0378a994ad,2024-11-21T07:33:49.133000
|
||||
CVE-2022-48702,0,0,b296d534707e7559d5ae1f1c19f484a852ce125c5c24de9ff9fcec38fe00afd4,2024-11-21T07:33:49.250000
|
||||
CVE-2022-48703,0,0,491e5c1beaea1e9f327f45a2e23267af3034415f31d723eee0c88c8d2251bbf1,2024-11-21T07:33:49.380000
|
||||
@ -240143,7 +240145,7 @@ CVE-2023-52755,0,0,55709bd2f3dc1c87aa3471bddf97c6186d1e143b1093730a71b8875b73e2f
|
||||
CVE-2023-52756,0,0,8c8da8a3db6a91519a62adce02f570a443b14cd0510ad082cfeda6a8c8ebbec4,2024-06-08T12:15:09.513000
|
||||
CVE-2023-52757,0,0,d946e9b3acd074035e9e5dd8b5b179cc6e742e761c0a68d3271fc4b165eae453,2024-11-21T08:40:31.420000
|
||||
CVE-2023-52758,0,0,1dec77a3ad2d46363a8d440866791b91e3ba2419e4f6b349bb352575fcbf86ba,2024-05-24T16:15:09.010000
|
||||
CVE-2023-52759,0,1,d02de4f2e673632abe3697cddfe6669da6af361a999f03297379c860e218d9d0,2024-12-19T11:15:30.140000
|
||||
CVE-2023-52759,0,0,d02de4f2e673632abe3697cddfe6669da6af361a999f03297379c860e218d9d0,2024-12-19T11:15:30.140000
|
||||
CVE-2023-5276,0,0,0b7db42a0b69ca7893c46dd3bcba89bcdb20b2edc3fa2c1057d10c47dc3e90db,2024-11-21T08:41:26
|
||||
CVE-2023-52760,0,0,98d3d4c8bacf4c312879ef9527d08a9e77d7aad79d38c26f0713e99c5d9dd931,2024-11-21T08:40:31.687000
|
||||
CVE-2023-52761,0,0,2de2d44e86efe53326e55f7ec6f21c5145ed9df593be989838b4687490700a3c,2024-11-21T08:40:31.823000
|
||||
@ -243239,6 +243241,7 @@ CVE-2024-10234,0,0,0a07df80914e66d5d85b955c292b2b3cf0e6c594aacdd956ae88b148b50f2
|
||||
CVE-2024-1024,0,0,2ce6ea613c0f5fbd9eefb91502606b7a8afa5d8203c0988924a996fbe7be9c49,2024-11-21T08:49:37.560000
|
||||
CVE-2024-10240,0,0,276dba492b8757d4f6f0835618fd41c3d6de1d38b01e674953d2dce8a8014991,2024-12-13T01:37:16.177000
|
||||
CVE-2024-10241,0,0,fe3dcecfada7c3764490fec385526c423fea05ceb1d8cfae03a9be08ced791ff,2024-10-29T14:34:04.427000
|
||||
CVE-2024-10244,1,1,a4c9a5b4987296d06889f094e30c5af28840780e70b9cab372ccb2893a2b3d53,2024-12-19T14:15:05.760000
|
||||
CVE-2024-10245,0,0,5714c51fb85acb3984990d3d9b6159b31ef4484b309f1b36de23af150cc1fca1,2024-11-12T13:55:21.227000
|
||||
CVE-2024-10247,0,0,5430b5d913fdfe2b748a2d5ec29b0a58e233e1700f121852ac0b90135a42f8bc,2024-12-06T04:15:04.190000
|
||||
CVE-2024-10250,0,0,dce2ccadbd6e77d5f97f6e4ccb7b1ad74933eaf3de52e88abfac961c0db9fd4a,2024-10-25T16:37:32.777000
|
||||
@ -244776,7 +244779,7 @@ CVE-2024-12325,0,0,46c6dbf8ab48a9529900a473106f832e082cd9f7d718e64a5c9e5edd2c3d1
|
||||
CVE-2024-12326,0,0,528dcb8d7af4c778be7e7edffb51de59f5440438426b982c28bb8bdb99422951,2024-12-06T21:15:05.957000
|
||||
CVE-2024-12329,0,0,66dd2e3f2af8b0b1aca8274acaafc22644d93ff908c884984769d59605f22905,2024-12-12T07:15:10.607000
|
||||
CVE-2024-1233,0,0,9d758d75169c31056a2dd99a6ff761ac0a3c179827b3dc598c6fb0d83614dada,2024-11-21T08:50:07.317000
|
||||
CVE-2024-12331,1,1,54f37a23a367c9b0a6eaf80a6c0bdac5fcdc6f7334a0073064ce545a04a0abfe,2024-12-19T12:15:05.330000
|
||||
CVE-2024-12331,0,0,54f37a23a367c9b0a6eaf80a6c0bdac5fcdc6f7334a0073064ce545a04a0abfe,2024-12-19T12:15:05.330000
|
||||
CVE-2024-12333,0,0,f9b36bf24b65a5eadc34be133c8efc135d615c6b77b9af6e424c71705bac5515,2024-12-12T09:15:05.390000
|
||||
CVE-2024-12338,0,0,202a85d7d49dabb95d9680ff72787a60f1c4021e681feb9be8640c62beb774ef,2024-12-12T04:15:07.497000
|
||||
CVE-2024-1234,0,0,6b4d1ae0b8159c98fb379447cf95a21f71a7514cfa9af5f48616ab89e3a52cca,2024-11-21T08:50:07.567000
|
||||
@ -244900,7 +244903,7 @@ CVE-2024-12601,0,0,2ca4ea21e5bfaf124d19bbe4bee1a196aca18d8d864e8b042ec1fe94e0d48
|
||||
CVE-2024-12603,0,0,b77b6c9527bd0798c4124cb6a67b3eb0384daf1c81bc149052bbc09ab0e74875,2024-12-13T03:15:05.187000
|
||||
CVE-2024-1261,0,0,7451d11c24f2ac390a05020abbe5be1a7d1e877de58a9c0842a513a0e1790005,2024-11-21T08:50:11.030000
|
||||
CVE-2024-1262,0,0,b26d9641a8cbc2c5642fa36dfff4a6fef92b6772e7113385af431217d75dfe5b,2024-11-21T08:50:11.167000
|
||||
CVE-2024-12626,1,1,c507f48504ec07699c997cadd25d159f726e2c9fe718f1736d180501b3c257c9,2024-12-19T12:15:06.160000
|
||||
CVE-2024-12626,0,0,c507f48504ec07699c997cadd25d159f726e2c9fe718f1736d180501b3c257c9,2024-12-19T12:15:06.160000
|
||||
CVE-2024-12628,0,0,ac808889130fae56b4e45ff31e222138f9e55a8e7c6187e647f824762405f8ac,2024-12-14T07:15:07.213000
|
||||
CVE-2024-1263,0,0,1ded99eb7dd7c25043d30fb557b1a5799a79150045deb56dc782cc48f4b0c898,2024-11-21T08:50:11.303000
|
||||
CVE-2024-12632,0,0,b2981d9ae0d79f88557270498f7d8919df56f26fc08631dba371165f9d0f4233,2024-12-13T21:15:09.317000
|
||||
@ -244916,16 +244919,16 @@ CVE-2024-12653,0,0,0bdff4965d01bd6aa73fcbedd02b053581ebdedd8d7404b8f9233029d8912
|
||||
CVE-2024-12654,0,0,dd847f86178d706ec068f649f759ab2d8fa9222fd8627ac6c45d7d35cd5983cc,2024-12-18T13:42:22.853000
|
||||
CVE-2024-12655,0,0,7ceaaca6f02716eece2d7e73d7d09c21cdb7429363dd024bbff0d12b620fab5c,2024-12-16T17:15:09.147000
|
||||
CVE-2024-12656,0,0,d7ca036e72b675c7410eee2a09d0c8b1a09bf6f11bc270d361aec72d2859b2e9,2024-12-16T17:15:09.340000
|
||||
CVE-2024-12657,0,0,d62bb2296e60c72ad405696503588543100255cd21c67ed32539ab7099fc2c10,2024-12-16T17:15:09.520000
|
||||
CVE-2024-12658,0,0,d1603c6f162f68deb5fb3680f23894c8cd48abd18931637daa20165cc25f0652,2024-12-18T16:15:11.297000
|
||||
CVE-2024-12659,0,0,0f1a25a790c3a06fdcd98e8fc222bbba905ef6e5e8eab8586918a744a057e2b5,2024-12-18T16:15:11.500000
|
||||
CVE-2024-12657,0,1,59348b5485cc78202fc057085be62694153448bbd8102fd74b2dd0327231cf8c,2024-12-19T14:46:43.777000
|
||||
CVE-2024-12658,0,1,5b6b569577dedcdf0d4d7e104eb92c626d5eee1ccb9eaa3aa5667fb3b7c9d19b,2024-12-19T14:47:23.380000
|
||||
CVE-2024-12659,0,1,6c16300b58f1e5167184bcbd4880dc3e422630c66c66de4ab6a0cc9186836154,2024-12-19T14:49:24.747000
|
||||
CVE-2024-1266,0,0,2a4a1a9a97982898c100d9d9cb94e7da9ed50410ea3a8e686081520943168bc9,2024-11-21T08:50:11.767000
|
||||
CVE-2024-12660,0,0,9ebd9119d6a731311780c33f36a0848bab9bd76dae1d26fe89c7648d30991b8c,2024-12-18T16:15:11.700000
|
||||
CVE-2024-12660,0,1,8796c4dc87e42e3eff07e858443bea5e3fd80cd78c07c6ca3d8f7dbec30035d3,2024-12-19T14:49:52.357000
|
||||
CVE-2024-12661,0,0,b0a5ca69a8f43b38c9f7b899d0ebfd6b57a397e750bb735f317aa453d69aa5f4,2024-12-16T20:15:08.840000
|
||||
CVE-2024-12662,0,0,b07855f7b8c9ee6bdfd1cdccd03234059b510edc4b4a3a8c0a44fc18dfc722aa,2024-12-16T19:15:07.027000
|
||||
CVE-2024-12662,0,1,29cac34ce72f4480acb005697a648add46560bb84a61da6f86d8bf42debbf1b8,2024-12-19T14:45:43.547000
|
||||
CVE-2024-12663,0,0,cb1a586129069ffa13466f4c6b4784e75a597b36a82749fcb1b049602849dc70,2024-12-16T20:15:08.963000
|
||||
CVE-2024-12664,0,0,8b14bcf6274b4b1006a264a51c743fbc803a9a92a0774d499c88554da6e35aaa,2024-12-16T20:15:09.090000
|
||||
CVE-2024-12665,0,0,20c012aa44cf6efbaec36428e27712f8278e734a812c7dd5afcce74ec2d8d152,2024-12-16T20:15:09.260000
|
||||
CVE-2024-12664,0,1,54d187c1eeaa5b0463ec5d372870555679a8fdc47e615fb58e7e5dce84cd53e1,2024-12-19T14:55:00.460000
|
||||
CVE-2024-12665,0,1,3220ef21931044d081e07d6b4308f79cc6622e8130bf8cd7769065c704a3b096,2024-12-19T14:55:20.300000
|
||||
CVE-2024-12666,0,0,e6916594a0490686e8b3fa8e2eef1b08f1952d21ae56044d4a0b2592b3b950f1,2024-12-16T20:15:09.430000
|
||||
CVE-2024-12667,0,0,8326e32b687aca9c189f301c70ca8cd23c53ed4f34213ac25fd52d1fe1bec45d,2024-12-16T20:15:09.600000
|
||||
CVE-2024-12668,0,0,2d75ced822d853be6c6d0f513771edc99398324227c8582be01ec3a2f5a7e3b4,2024-12-16T17:15:09.700000
|
||||
@ -244951,6 +244954,9 @@ CVE-2024-1275,0,0,55e303d499b7cd70146b064f11442ebd0ad45cafbb26b305d69871c04faa25
|
||||
CVE-2024-1276,0,0,342e07ea1475f57185158b84be14279572eebbc1b91e4c07c491730599e6701d,2024-11-21T08:50:13.050000
|
||||
CVE-2024-1277,0,0,fdccc6e1d66b4b759fea691d8a9a7ad4f8cc0afd5b2fb224e654b3bd9de12942,2024-11-21T08:50:13.170000
|
||||
CVE-2024-1278,0,0,304f88731c9c2e93f283a152f19a1ac852d3cf0fda0d38c9b82c242ac4604519,2024-11-21T08:50:13.287000
|
||||
CVE-2024-12782,1,1,bc61a5ad6f30b948435381c8170b91d4f7a0de7c5aa6736826a6cbf390b49afa,2024-12-19T13:15:05.900000
|
||||
CVE-2024-12783,1,1,58bac48d696a0ad6888cceb5e4c2f18a8dca69de1015bafa9e7ec5c861f38063,2024-12-19T13:15:06.217000
|
||||
CVE-2024-12784,1,1,01c570031a8a1e6ad8356000972177a0e918fbccc207cb0ff470d63ebf279f33,2024-12-19T14:15:05.943000
|
||||
CVE-2024-1279,0,0,748039c92f5ca569335554a7f38080e94b49a821a92d564d52fc8ec18dfbf14a,2024-11-21T08:50:13.410000
|
||||
CVE-2024-1282,0,0,e6b07825f0f3597687613e3a6164d0e157f6f527c33c61eb8d90ec07193bdec2,2024-11-21T08:50:13.520000
|
||||
CVE-2024-1283,0,0,b1c9571efecc70819ed9018aef1b79e079809dddea59c76e732d84247ac1db52,2024-11-21T08:50:13.640000
|
||||
@ -250663,7 +250669,7 @@ CVE-2024-2671,0,0,7868b0c3d3bca338bc309b82ca1d0b8bd8df4ecbefb4e6a6f37eff750b8ed1
|
||||
CVE-2024-26710,0,0,6ac3ed3e058c9245f76455df758aa5822954706d5927ffde47193e09cb8d8b8c,2024-11-21T09:02:53.723000
|
||||
CVE-2024-26711,0,0,8dccb84b3c19a8be9b5c23386e56431114b107c936ab5d88e825fada25c33413,2024-11-21T09:02:53.837000
|
||||
CVE-2024-26712,0,0,fb8685ddd0683cdabb2327df61ff8cea2e7e86fcfa201af9434b63269c960077,2024-11-21T09:02:53.947000
|
||||
CVE-2024-26713,0,1,e7e300ec5bbfa68ba83e0a47cb90f58abff0db2ab2dd369821dd312aa798bced,2024-12-19T12:15:06.330000
|
||||
CVE-2024-26713,0,0,e7e300ec5bbfa68ba83e0a47cb90f58abff0db2ab2dd369821dd312aa798bced,2024-12-19T12:15:06.330000
|
||||
CVE-2024-26714,0,0,87db1e3510e7967d782bddedfcd8da69fbf9dd7de01e3acc10c009bc5f1ae976,2024-11-21T09:02:54.257000
|
||||
CVE-2024-26715,0,0,04aa2f77569d66ac66b00bd01b2bfd2b5bcfa7bc37259db7e45c22c543648779,2024-11-21T09:02:54.377000
|
||||
CVE-2024-26716,0,0,a4091ea8075b2b28902d3aa14725da458e5925fc8c8a163b005140f08fdc608e,2024-11-21T09:02:54.497000
|
||||
@ -250671,7 +250677,7 @@ CVE-2024-26717,0,0,7b0bca736d524de19c0e00e378dd20b4e516f8a07cee5fa2f3ccb3c887524
|
||||
CVE-2024-26718,0,0,b71c0a254c7aad42c306d673849eee87146b27e1c3e5db37335467c2a89b2d97,2024-11-21T09:02:54.723000
|
||||
CVE-2024-26719,0,0,49272ffb2292f3d85039eb80d999203cc47568c7ee88d8dd11d75770d1415067,2024-11-21T09:02:54.847000
|
||||
CVE-2024-2672,0,0,37c31eab6f5cd3fb8466d604392093c92b8e3eb9dce60eeef838946e4f379074,2024-11-21T09:10:15.560000
|
||||
CVE-2024-26720,0,1,1ca9f5c1cf45272d711bbb341b9a3a3e8a66cb323b330efba47b2d4d73910e9a,2024-12-19T12:15:06.417000
|
||||
CVE-2024-26720,0,0,1ca9f5c1cf45272d711bbb341b9a3a3e8a66cb323b330efba47b2d4d73910e9a,2024-12-19T12:15:06.417000
|
||||
CVE-2024-26721,0,0,ca9a0496ef9381a3510ada8cf6ba88673a4cc89acefb09f26c80679837546878,2024-11-21T09:02:55.100000
|
||||
CVE-2024-26722,0,0,fd9735c280802bb7daa832f4b82be89b1abda1eda19bc22cda9b7d5bdc48f305,2024-11-21T09:02:55.213000
|
||||
CVE-2024-26723,0,0,f35d3a0170fc204ff63f3cb0d2c569463d0cc7f7c48d6a9fa170a41519069565,2024-11-21T09:02:55.350000
|
||||
@ -250948,7 +250954,7 @@ CVE-2024-26969,0,0,e5f43935788ed4102251fcd0d628d5ccae7841fa16c09f7ad35d852b1e5f5
|
||||
CVE-2024-2697,0,0,75185752f94c46a8517aa2b7e60fa3a9d28d1b1692134edfaaeea70946ab0b18,2024-11-21T09:10:19.120000
|
||||
CVE-2024-26970,0,0,a672db4cc38f97538246e763011f8e043ad7cb6ea68c17c5902e1a5c00ecb7ca,2024-11-21T09:03:31.017000
|
||||
CVE-2024-26971,0,0,d1b4d011905ed844146859edf5ec32a3c1c9f5591baf6ff9f2e2a1701bba2994,2024-11-21T09:03:31.260000
|
||||
CVE-2024-26972,0,1,cb815d256c738176b35ac7d4b54a98540b3097e6a6f896002f385b4cd625ec4a,2024-12-19T12:15:06.507000
|
||||
CVE-2024-26972,0,0,cb815d256c738176b35ac7d4b54a98540b3097e6a6f896002f385b4cd625ec4a,2024-12-19T12:15:06.507000
|
||||
CVE-2024-26973,0,0,c8f1b7513166f4d8d868d293eabecb5dc618f18ae5a1c23488508504db0cd584,2024-11-21T09:03:31.523000
|
||||
CVE-2024-26974,0,0,0f591009ac759735d90b261c7f218f848e9c210ca5fdf67c29e52f8bb9da6e97,2024-11-21T09:03:31.677000
|
||||
CVE-2024-26975,0,0,ace6be83a19e827f3d1b2e6f8869ab3c870ead2fd02580bdd6ce004f1efbd2d8,2024-11-21T09:03:31.817000
|
||||
@ -257034,7 +257040,7 @@ CVE-2024-35153,0,0,72b7eff1e351197066dcedfe56c19ee4fca9d867b0c858ba84a516b5786df
|
||||
CVE-2024-35154,0,0,554b56dff004b88808df73c981811e239d11908d063d2af4082356f8429e1b4e,2024-11-21T09:19:50.140000
|
||||
CVE-2024-35155,0,0,b581d8098316c46e30a871576c4a4f4237d9a4779584711c4eaaa70d1b897fae,2024-11-21T09:19:50.290000
|
||||
CVE-2024-35156,0,0,b0df5a80c4a3b209661680ab79bf7ba83a331996691db2a5a3f19164eb81c71c,2024-11-21T09:19:50.443000
|
||||
CVE-2024-3516,0,0,3d3300430ea374cb14b9a0a64ea889b74690531ef86d36c3db6e25158ab19328,2024-11-21T09:29:45.757000
|
||||
CVE-2024-3516,0,1,a5df3ba320f02e10bec3a1c2b9e275212486e2abf989072d5e8f0437891203f6,2024-12-19T14:59:57.403000
|
||||
CVE-2024-35160,0,0,318ce523570aa2a281e98ab12c2ca421a0d155ef6ca7820b4c93b91389e32554,2024-11-26T19:08:22.473000
|
||||
CVE-2024-35161,0,0,74d1d58b7caf81c95e1ff919f262e1fd560e12cb383b56b749f45f557e6d48d2,2024-11-21T09:19:50.580000
|
||||
CVE-2024-35162,0,0,cc3a1e9ad17185933b2ccd6c60215dad31a11f8c95ac23e34980d635d83969d3,2024-11-21T09:19:50.790000
|
||||
@ -257651,7 +257657,7 @@ CVE-2024-35924,0,0,51a8e81a5087f6b00f86aef3df30b13903521527bd7c24804424b3f4f88b0
|
||||
CVE-2024-35925,0,0,527fefad4777ff7cb6251a7bffe472b80d43edd30c48c261e4833904b72dcd03,2024-11-21T09:21:12.953000
|
||||
CVE-2024-35926,0,0,c1b13d208fac57fe78f6933a263aa2f330043107ad1ad5de4da551ecec504628,2024-11-21T09:21:13.097000
|
||||
CVE-2024-35927,0,0,278ce2f015c27adcc7ff8c3c6be22b3e8c5bb291856afb164b072d0d8d61b636,2024-11-21T09:21:13.223000
|
||||
CVE-2024-35928,0,1,1c31dc8c665b8952880067e761bee324da2eee6fa320ed892680e88b3dd7b63e,2024-12-19T12:15:06.590000
|
||||
CVE-2024-35928,0,0,1c31dc8c665b8952880067e761bee324da2eee6fa320ed892680e88b3dd7b63e,2024-12-19T12:15:06.590000
|
||||
CVE-2024-35929,0,0,eb006570fe02d7ffc9e04d8f3f9763107832d753b0fe4a826e5c2d003f21ec4d,2024-11-21T09:21:13.567000
|
||||
CVE-2024-3593,0,0,7dfe1a06ca99b709e0966f80e5fa7243762a8725a5825da6ebc20a944f2ce167,2024-11-21T09:29:56.757000
|
||||
CVE-2024-35930,0,0,7e83c7b01877dbff724cb187134d16aa47e0859d84876cd4351e2229ddfcadf6,2024-11-21T09:21:13.707000
|
||||
@ -258330,7 +258336,7 @@ CVE-2024-36881,0,0,865b117aacccbfe6f687a7a3084b4b43e2681e536659c100c63b5a33a1027
|
||||
CVE-2024-36882,0,0,0f0f121d8fdb7782a4529834147427038a637e17603baf7ba025febdfe31fa89,2024-11-21T09:22:43.487000
|
||||
CVE-2024-36883,0,0,7a8c98819cff9aad35478db9de8d5f7f50773b3af47bc48d336d6709ddf1efb2,2024-11-21T09:22:43.597000
|
||||
CVE-2024-36884,0,0,687c65bbb2dd2f603c1ac47ebda44100b26697c1b7819311390c4f344eaf0a18,2024-11-21T09:22:43.727000
|
||||
CVE-2024-36885,0,1,e42429ca105987b3123d1dd2686d7aa54f4c4825ae074f67ad5efea854c755f1,2024-12-19T12:15:06.657000
|
||||
CVE-2024-36885,0,0,e42429ca105987b3123d1dd2686d7aa54f4c4825ae074f67ad5efea854c755f1,2024-12-19T12:15:06.657000
|
||||
CVE-2024-36886,0,0,ee9fdfbec95f1abe836cd3b0b5d78a461d1302ed6631e8ff9dc750e6e886f601,2024-11-21T09:22:44.007000
|
||||
CVE-2024-36887,0,0,a762f623af0796d1d3914ff021dbfc976ffe8e125e31079b0b5e027d7ee1ebf1,2024-11-21T09:22:44.220000
|
||||
CVE-2024-36888,0,0,970978d503b68ff5aee4c9ba46a5a7ee7c69234a87d3a271e73799c354725e06,2024-11-21T09:22:44.343000
|
||||
@ -259190,7 +259196,7 @@ CVE-2024-37959,0,0,2862307e6b6656e94395dac2d8ff6f12ad600e913a0f2b2e4ab9d9950e1d2
|
||||
CVE-2024-3796,0,0,5e13880a616d837f5f87d8ca618a02d49accff6c61baaf75a0f5a9c0334540f3,2024-11-21T09:30:25.163000
|
||||
CVE-2024-37960,0,0,88ecfceb39b7e0063b870ddb68c9129955f8d29f0184bea950ac004cc590cadd,2024-11-21T09:24:35.723000
|
||||
CVE-2024-37961,0,0,cf66c48c044de3bddb607a0cf3c90167369e2890a5e938294c10f20a360a5cca,2024-11-21T09:24:35.847000
|
||||
CVE-2024-37962,1,1,993324d3c9625881f8a97e806572df474c559c49a72b858e9a4eb814b17a913d,2024-12-19T12:15:06.737000
|
||||
CVE-2024-37962,0,0,993324d3c9625881f8a97e806572df474c559c49a72b858e9a4eb814b17a913d,2024-12-19T12:15:06.737000
|
||||
CVE-2024-37965,0,0,deadb6178df50344a99f4db0b1b0ac8cc220f77eb2f409ad573a3760355529c3,2024-09-10T17:43:14.410000
|
||||
CVE-2024-37966,0,0,85e576d8e77ff0998b4d648e3f23ec422e9ce18077a2bb9cb430cd43a937e43f,2024-09-10T17:43:14.410000
|
||||
CVE-2024-37968,0,0,54c65ab38f96c984d47f26d7973e70fed12b5bc92a49f3dcf7903784570e6447,2024-08-16T20:54:18.347000
|
||||
@ -259540,12 +259546,12 @@ CVE-2024-38313,0,0,b4fccf4bc32a428a2ed3da857e5610d03364deeda806c6ba074978d77fa69
|
||||
CVE-2024-38314,0,0,7f72becf752c493d63d9011af9e40e717b070fb953c18b5df93807710a713461,2024-10-25T12:56:07.750000
|
||||
CVE-2024-38315,0,0,7f80cda9dd8e03aa7f11a3ebca194914cfdb9ca994dcb1bc1568ef69817f8f68,2024-09-20T14:09:24.733000
|
||||
CVE-2024-38319,0,0,85d07cf6ac4c3d39aed41b78f9915ec0d57e1f4cef6712c4aaaab05d2f91be0b,2024-11-21T09:25:22.177000
|
||||
CVE-2024-3832,0,0,92a7ae8720ad26d3e305f078c135d59194029e87c5d697f23712ba3423f2faae,2024-11-21T09:30:29.353000
|
||||
CVE-2024-3832,0,1,54d7cd70608d6ebf4d58d321fb2c71a056073b40f73450ca63d747b8e4ec1006,2024-12-19T14:53:34.190000
|
||||
CVE-2024-38321,0,0,451e43fd7c3ce8a95a4f1d37398e013e2483fd40917c790d6dc74b359b1d32d9,2024-09-06T14:50:53.583000
|
||||
CVE-2024-38322,0,0,8e573827e3fa52cf97ec6d2ef345cd31ae55ff6b4c10220d85ef83b3ce3ac344,2024-11-21T09:25:22.520000
|
||||
CVE-2024-38324,0,0,6983d8cad1fd6c0c78413c4456f22354583612d01ccc038ac7f0199fa2c57812,2024-09-30T14:10:18.597000
|
||||
CVE-2024-38329,0,0,9da02cb1c1e6e0ee0df6910cf16cd32ad52cc4fe1d821c256d156fa9c41a4422,2024-11-21T09:25:22.867000
|
||||
CVE-2024-3833,0,0,e3094fa977b5b8af715274c21734c75e4d1f902958fa008fa88a736e550fbc57,2024-11-21T09:30:29.563000
|
||||
CVE-2024-3833,0,1,70f71fc362a5e7d48ef4a06bca848d6c2e550860bbb53e401c6074b0eadf1358,2024-12-19T14:46:01.697000
|
||||
CVE-2024-38330,0,0,f29c2fed4aa255682376d1bf1fe6f029c9aeaf29cb91e5ed615ddc69bd26c654,2024-11-21T09:25:23.523000
|
||||
CVE-2024-3834,0,0,947eb53652569d79e3c1cf44919e7a8749c280dc3486461656b1c499598740e9,2024-11-21T09:30:29.777000
|
||||
CVE-2024-38344,0,0,c3f614f414d62cde3a55726244e500e4dd08719f2cd9a8082171daa986ea9b20,2024-12-06T18:15:24.490000
|
||||
@ -259598,7 +259604,7 @@ CVE-2024-38395,0,0,46946bc80b6ec6d4325625e62e71814cc02619cf11adc6e28df221a54cc54
|
||||
CVE-2024-38396,0,0,d3997f564c8b2a9c3991e11a4c6e0bdd14d02ff7f10ce84e788ea83e320f1273,2024-11-21T09:25:36.147000
|
||||
CVE-2024-38397,0,0,d6dd613908370d993d9d8ecfa347a275bc14a2f13c3136f84e2570e346b335ce,2024-10-16T18:23:57.797000
|
||||
CVE-2024-38399,0,0,031e4fe9c82d3f3717aafd1300d875f223006ff986e2da0972e9d12069de224e,2024-10-16T18:17:09.577000
|
||||
CVE-2024-3840,0,0,1da0b9f0c7889bcc148bbaefcd5b56bb42145fc640b2809d7c7e7ea9c402e853,2024-11-21T09:30:30.660000
|
||||
CVE-2024-3840,0,1,1bb444ece2c50ee91be73b80e517896cecc7def61ec1acbc1eea08d4edd6fa92,2024-12-19T14:35:08.377000
|
||||
CVE-2024-38401,0,0,cd97ad2c7f4dcb03b183613d9efc2870df2773a08c367b61acfd1151e2e370f7,2024-09-04T17:05:39.320000
|
||||
CVE-2024-38402,0,0,70e57cc93873c9fbfbdbcce3867a4bb9f12c20a42736139133eef646aca70162,2024-09-05T21:43:22.677000
|
||||
CVE-2024-38403,0,0,b3d8cc87a0ad7dfa5dc1c4ed4fda1feb176588131411bccf16dd62b32f859d77,2024-11-07T20:06:51.473000
|
||||
@ -259607,7 +259613,7 @@ CVE-2024-38406,0,0,d9cf89755a65c41382de654fb761fce234cf800234cc2f02099c72606bf0d
|
||||
CVE-2024-38407,0,0,ffbfacdb380f854d1d6d65293346a1b0b1f4ec5f88ea83b6b3157c8e85519bef,2024-11-07T19:39:59.737000
|
||||
CVE-2024-38408,0,0,7e9fd5c12dce845f318d5db01306efd03eb1963e42b91f132e5d8a048e28afba,2024-11-08T15:07:00.903000
|
||||
CVE-2024-38409,0,0,d9dae6735755d290c1f3629055136085b4a823e2c26bf536b6e849810bb311a5,2024-11-07T19:40:46.783000
|
||||
CVE-2024-3841,0,0,4513bbea4978f31b4148aa5c1ac58bdbaac8e5dfeb1e1e829015d8edfe5f91b4,2024-11-21T09:30:30.860000
|
||||
CVE-2024-3841,0,1,24e639dfce9b2af431c3db13578b276fa338de6f3834f0d0ae09338f50f6a596,2024-12-19T14:23:44.970000
|
||||
CVE-2024-38410,0,0,28659510621383984cf9cc744098441c39f70944826bdc1d40947ec694e59f5a,2024-11-07T19:41:06.217000
|
||||
CVE-2024-38415,0,0,4f38aed727a81688c3012b9ffab939beddc13d0fb1a6fe95697008d97c5227cc,2024-11-07T19:41:31.973000
|
||||
CVE-2024-38419,0,0,afd3d247b1b3b9e5e15ea15c80f7e3e24bfc95ee5af17efd6288668038ddb6ab,2024-11-07T19:44:17.137000
|
||||
@ -259619,7 +259625,7 @@ CVE-2024-38425,0,0,e32a925c31eb52f678b53ceda419af6344b1d99e71a719366ec4341ee3e4c
|
||||
CVE-2024-38427,0,0,e03f18230b0965ff85c2447bdfa04160304b37189e7d46e85ccfd347184198b3,2024-11-21T09:25:48.097000
|
||||
CVE-2024-38428,0,0,ca429ab8620e857c2740a8b8cc185755a533a3afb8ba56ac4468e697f6bb9392,2024-11-21T09:25:48.560000
|
||||
CVE-2024-38429,0,0,b538fc48e96d9ea292e38fa094ab837d9c16ca39e46b7d2aa04f5879b36ef5a5,2024-11-21T09:25:48.997000
|
||||
CVE-2024-3843,0,0,110d2ab3c990e356be1d2b3f3cc98f3dbb9de4caea5034acc8307ae2fe664185,2024-11-21T09:30:31.057000
|
||||
CVE-2024-3843,0,1,24522d8c268e04ee96e1eb3267665f0aabade4b40e231c67983061452f1d7b9f,2024-12-19T14:12:42.743000
|
||||
CVE-2024-38430,0,0,06391b888b37c32bd396e288f10969027f9a85afbcf753d929198b114655413e,2024-11-21T09:25:49.360000
|
||||
CVE-2024-38431,0,0,e482828110fa6c946df61e8de1e5965c007c8990a0d8f5c2175c638dca01f855,2024-11-21T09:25:49.600000
|
||||
CVE-2024-38432,0,0,c6aafd8c739bb86c08fa2751a78bb38982b3adfb7939b207f67b631da000fa5b,2024-11-21T09:25:49.853000
|
||||
@ -259630,7 +259636,7 @@ CVE-2024-38436,0,0,0ac081ea028f81b0eec180140463dc18d318896b6ba50d5a0b85c6abcd962
|
||||
CVE-2024-38437,0,0,ccb22b800ca035bcc67eb76a0923d5bf4359b548903b49f1ee2f17d34af38d6e,2024-11-21T09:25:51.270000
|
||||
CVE-2024-38438,0,0,3dc83134267dd01a65062427d3ff01cdd33a7e0398dee4466f7b390caa0819dd,2024-11-21T09:25:51.540000
|
||||
CVE-2024-38439,0,0,e91372788a8b82b01307a76f45b0dbec1cb7a19a170d78cf3c93a9739cd3acc9,2024-11-21T09:25:51.770000
|
||||
CVE-2024-3844,0,0,143d9d6baf9464d1061a52ce5da7f8d3e1b26ca0c81e5645338983e20219a5fa,2024-11-21T09:30:31.250000
|
||||
CVE-2024-3844,0,1,411f44c7beffac7e4b6326ab389a4f30c5e05a5d7bd2c96e81023cefe43a60a4,2024-12-19T13:59:12.247000
|
||||
CVE-2024-38440,0,0,821d76770250f5bb74131e589677bd4a9512d8c9462d2d1db6397554f562cb8e,2024-11-21T09:25:52.217000
|
||||
CVE-2024-38441,0,0,876fb4ecab58feb1e8d0c7c50879f79f8314f2367e45e3ab08137414142234bd,2024-11-21T09:25:52.753000
|
||||
CVE-2024-38443,0,0,d7f45b6e4b42b6c6cc7b1e3ba8f6c3c008035f970b0fb09d2408d339165fa7ad,2024-11-21T09:25:53.177000
|
||||
@ -261362,7 +261368,7 @@ CVE-2024-41020,0,0,388363ca783b8ff606e303aa949ebe0fe44c028a3ba3d2711ef057fb8b92f
|
||||
CVE-2024-41021,0,0,66764aba5cc0a5c5056e989ff515d25782a6a55671c8611b91ac5c440b5402b4,2024-11-21T09:32:04.980000
|
||||
CVE-2024-41022,0,0,e5388dd233dedf6e0ea6968f1647488dbffbbbcd9bb61c2feac751c6fbb5d937,2024-11-21T09:32:05.103000
|
||||
CVE-2024-41023,0,0,61eb2391e2a00c097f085b8585ad4dbd2090f1ee8adf05e710b084a222a3f0f9,2024-11-21T09:32:05.223000
|
||||
CVE-2024-41024,0,1,9faa43cc5c0f4a4049a5bf7f7c881facd92c066a96211564626b0d84283451bf,2024-12-19T12:15:06.900000
|
||||
CVE-2024-41024,0,0,9faa43cc5c0f4a4049a5bf7f7c881facd92c066a96211564626b0d84283451bf,2024-12-19T12:15:06.900000
|
||||
CVE-2024-41025,0,0,e56722e33cb25bbb9a6ffefecbaf2bbf5b88e6631d6de37e35107f8d79d1611b,2024-11-21T09:32:05.460000
|
||||
CVE-2024-41026,0,0,8124be7ddcb0df6adead65670a9a1962058fdeb9eb9d2a9d4d19132c4a090025,2024-11-21T09:32:05.570000
|
||||
CVE-2024-41027,0,0,eaa63e74c3ce16129be48c23bd10b961f700b28c359c1860f0f1e79e575ef9f2,2024-11-21T09:32:05.680000
|
||||
@ -262121,7 +262127,7 @@ CVE-2024-42112,0,0,0fc1f9b654ad0839964ab7aafe2cc6752af40f1f0a816245e9804aef26def
|
||||
CVE-2024-42113,0,0,d8ca6887d800bc826aacec457ce652c9d411bc388658a8817ecc096a31aed08b,2024-11-21T09:33:37.777000
|
||||
CVE-2024-42114,0,0,102e562dccb449510b823260685c412c290eca225a4e0bf6b94e90e0aa21bba3,2024-11-21T09:33:37.897000
|
||||
CVE-2024-42115,0,0,318d7b0cf58f65c51c0305413ed9423fe143dba22d255432803d2cec6754f102,2024-11-21T09:33:38.053000
|
||||
CVE-2024-42116,0,1,c87ddeed9b58fce4f19771124b58a0205767a0ba132a7586c9453bcf4d38e4e6,2024-12-19T12:15:06.967000
|
||||
CVE-2024-42116,0,0,c87ddeed9b58fce4f19771124b58a0205767a0ba132a7586c9453bcf4d38e4e6,2024-12-19T12:15:06.967000
|
||||
CVE-2024-42117,0,0,806c7bbaa47a63c79c153148308d6c18cdc47e890955b3b9c1e9c60deecd59dd,2024-11-21T09:33:38.313000
|
||||
CVE-2024-42118,0,0,bfa5d9240584a5e4f4f49f97b36f2463fb85b4110cf08dde6942a6188e7d2aa3,2024-11-21T09:33:38.430000
|
||||
CVE-2024-42119,0,0,03ea2af429e4e38171757ef1550057411fe944ad3248dd0045fd7f062df6b832,2024-11-21T09:33:38.543000
|
||||
@ -263532,7 +263538,7 @@ CVE-2024-4390,0,0,80f0e9de9c052f246f99c6b6e366bafaa9499ded0b8e23a6609090d508a2d1
|
||||
CVE-2024-43900,0,0,d12cc6a11ab14fc66060cf2e99226d6025bc20d76aa42fa476ccfd8be8c9d873,2024-08-27T14:38:32.967000
|
||||
CVE-2024-43901,0,0,aee6dc17a3fdd24ed6674e068e6f33d7e8100d447298c857789b5a70f69d1c03,2024-08-27T14:38:44.187000
|
||||
CVE-2024-43902,0,0,20f91e552c9aac439c19be3c9593bcdff5ebe1714daeecf37d0afd0df952c1a9,2024-08-27T14:38:51.730000
|
||||
CVE-2024-43903,0,1,cde00aa7c69ceb3f916a026e976c1d8bacae9d239ed4d529bcd65af1769d4699,2024-12-19T12:15:07.040000
|
||||
CVE-2024-43903,0,0,cde00aa7c69ceb3f916a026e976c1d8bacae9d239ed4d529bcd65af1769d4699,2024-12-19T12:15:07.040000
|
||||
CVE-2024-43904,0,0,2f6c12de0a10f9886d1c0c4b0362667f7bad08735804a0c6129a2fea0c1ab7c5,2024-11-08T16:15:22.367000
|
||||
CVE-2024-43905,0,0,e64450fff6df28d2c512571396455eb44d63c126d4c72183fc5c9fe63608a623,2024-09-12T12:15:51.260000
|
||||
CVE-2024-43906,0,0,a11c19379737ca1150a8615b78ff271062afaa51010d3036c3045576af10ebfb,2024-08-27T13:41:30.093000
|
||||
@ -264781,8 +264787,8 @@ CVE-2024-45813,0,0,619ea264c0f4bf8105d5e60e8f340f4fd92c635a69072623ce613a02ad440
|
||||
CVE-2024-45815,0,0,c90f4ea2d8d874b28d9c98b77b7f4224aef95bd910a7a8e17372f74226fe05c1,2024-09-23T18:31:37.277000
|
||||
CVE-2024-45816,0,0,3b2db7eacb164fb9608249c78f97bf532fd821e2ac5209a34e58d8579d4ad3b1,2024-09-23T18:41:15.603000
|
||||
CVE-2024-45817,0,0,04338584e0c7a05d71a1be8997c9492e340dee2b5e7a9715004e750a41578782,2024-11-21T09:38:08.627000
|
||||
CVE-2024-45818,1,1,1a85d3e3faa9720321fd7c714703c69802c3fe81a15744846b7bf89d0d3decd7,2024-12-19T12:15:16.540000
|
||||
CVE-2024-45819,1,1,27b1734726e2b2f3b169ca082b86e86a5f53c7fb64a371c982f10c297a22d989,2024-12-19T12:15:16.673000
|
||||
CVE-2024-45818,0,0,1a85d3e3faa9720321fd7c714703c69802c3fe81a15744846b7bf89d0d3decd7,2024-12-19T12:15:16.540000
|
||||
CVE-2024-45819,0,0,27b1734726e2b2f3b169ca082b86e86a5f53c7fb64a371c982f10c297a22d989,2024-12-19T12:15:16.673000
|
||||
CVE-2024-4582,0,0,b605981ff01420a78a98fb5233b1dc8843a1625834328d15dc7b493f5dcff0b7,2024-11-21T09:43:09.183000
|
||||
CVE-2024-45823,0,0,cab38241202cd1b5f39ccc999566a0902486b77430bd0addb42cdbbc8510fbe3,2024-10-02T14:49:59.157000
|
||||
CVE-2024-45824,0,0,052af77f2938c71d885f8780c684340b3e8def2ae196f2e001be1da99675d7b0,2024-09-12T18:14:03.913000
|
||||
@ -273650,6 +273656,8 @@ CVE-2024-9092,0,0,6379751e1087929fe578fcc016fd8228ef68f77aece65ece28437d6dced0f0
|
||||
CVE-2024-9093,0,0,1493b614914735d95fbf32dde0a735a3d3c11c89a8289bb8180b4aae2b8e9b40,2024-09-27T16:26:27.163000
|
||||
CVE-2024-9094,0,0,88d2e32f26a5490c0327569b4a1e535a8d101ca5046b7d11e41b4bf6ab481342,2024-09-27T15:54:09.463000
|
||||
CVE-2024-9100,0,0,e58afa1cb97571d6bb26bb26cbb4a088cc8bda6f2bd9320274e7188c14487c93,2024-10-04T13:50:43.727000
|
||||
CVE-2024-9101,1,1,25e24918ed1f87cc319006085c88152515cf58c5f4e80d431301154ff719faa9,2024-12-19T14:15:06.147000
|
||||
CVE-2024-9102,1,1,4db262c2fbc093aaf43fe84a6b5c2165df97ab0250ceabe15c339ea5155f4be4,2024-12-19T14:15:06.327000
|
||||
CVE-2024-9104,0,0,d05aac963e970d19d86f09737afdb0f530aa8ac604a9cdf74eaaa2ae5408c2c5,2024-10-16T16:38:14.557000
|
||||
CVE-2024-9105,0,0,d08b07c8a29b964e96e936aa239ff144cd55c86ead27669c25ad1b91b570e809,2024-10-16T16:38:14.557000
|
||||
CVE-2024-9106,0,0,f3b7116df22e800ea9a25d9487e69f38b7cb25b646719ab1ed2832bc8f2af2fd,2024-10-04T13:51:25.567000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user