mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-08 19:47:09 +00:00
Auto-Update: 2024-10-24T22:00:18.909139+00:00
This commit is contained in:
parent
fdb76a4aa0
commit
47316cb78f
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-48958",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-10-21T20:15:07.270",
|
||||
"lastModified": "2024-10-23T15:13:25.583",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-24T20:00:34.033",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,39 +15,199 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ethernet: aeroflex: se corrige una posible fuga de skb en greth_init_rings() La funci\u00f3n greth_init_rings() no liberar\u00e1 el skb reci\u00e9n asignado cuando dma_mapping_error() devuelva un error, por lo que se debe agregar dev_kfree_skb() para corregirlo. Solo se prob\u00f3 la compilaci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-401"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2.6.34",
|
||||
"versionEndExcluding": "4.9.336",
|
||||
"matchCriteriaId": "DE72942B-2F89-4BEA-A298-C2FA7DCC6DB5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.10",
|
||||
"versionEndExcluding": "4.14.302",
|
||||
"matchCriteriaId": "FB3E1F82-01A3-456E-9C83-D567B9A75815"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.15",
|
||||
"versionEndExcluding": "4.19.269",
|
||||
"matchCriteriaId": "1185B8E3-712E-4BFB-BD01-78D47F7EF1F2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.20",
|
||||
"versionEndExcluding": "5.4.227",
|
||||
"matchCriteriaId": "8C752145-904B-474A-A7F2-E9F29353B0FE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.5",
|
||||
"versionEndExcluding": "5.10.159",
|
||||
"matchCriteriaId": "7318B597-DFFD-4BBC-A947-539D6E30D82A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11",
|
||||
"versionEndExcluding": "5.15.83",
|
||||
"matchCriteriaId": "90897BD1-104D-4CFF-94F5-29F9041217FB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "6.0.13",
|
||||
"matchCriteriaId": "389392A7-81C4-4C26-884B-8C7CF0F53DA4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E7E331DA-1FB0-4DEC-91AC-7DA69D461C11"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "17F0B248-42CF-4AE6-A469-BB1BAE7F4705"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E2422816-0C14-4B5E-A1E6-A9D776E5C49B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1C6E00FE-5FB9-4D20-A1A1-5A32128F9B76"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "35B26BE4-43A6-4A36-A7F6-5B3F572D9186"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc6:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3FFFB0B3-930D-408A-91E2-BAE0C2715D80"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc7:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8535320E-A0DB-4277-800E-D0CE5BBA59E8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc8:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "21718AA4-4056-40F2-968E-BDAA465A7872"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/063a932b64db3317ec020c94466fe52923a15f60",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/223654e2e2c8d05347cd8e300f8d1ec6023103dd",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/87277bdf2c370ab2d07cfe77dfa9b37f82bbe1e5",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/99669d94ce145389f1d6f197e6e18ed50d43fb76",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/bfaa8f6c5b84b295dd73b0138b57c5555ca12b1c",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/c7adcbd0fd3fde1b19150c3e955fb4a30c5bd9b7",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/cb1e293f858e5e1152b8791047ed4bdaaf392189",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/dd62867a6383f78f75f07039394aac25924a3307",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-48961",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-10-21T20:15:07.887",
|
||||
"lastModified": "2024-10-23T15:13:25.583",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-24T20:02:22.347",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,19 +15,129 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: mdio: arregla el recuento de referencias de fwnode no balanceado en mdio_device_release() Hay un informe de advertencia sobre una fuga de recuento de referencias de of_node mientras se sondea el dispositivo mdio: OF: ERROR: fuga de memoria, se esperaba un recuento de referencias de 1 en lugar de 2, of_node_get()/of_node_put() no balanceado - destruye la entrada de cset: adjunta el nodo superpuesto /spi/soc@0/mdio@710700c0/ethernet@4 En of_mdiobus_register_device(), aumentamos el recuento de referencias de fwnode mediante fwnode_handle_get() antes de asociar el of_node con el dispositivo mdio, pero nunca se ha reducido en la ruta normal. Desde entonces, en mdio_device_release(), necesita llamar a fwnode_handle_put() adem\u00e1s en lugar de llamar a kfree() directamente. Despu\u00e9s de lo anterior, simplemente llamar a mdio_device_free() en la ruta del controlador de errores de of_mdiobus_register_device() es suficiente para mantener el recuento de referencias equilibrado."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.5",
|
||||
"versionEndExcluding": "5.15.83",
|
||||
"matchCriteriaId": "73BF1A37-67E4-474D-84C2-1BDDFC244D25"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "6.0.13",
|
||||
"matchCriteriaId": "389392A7-81C4-4C26-884B-8C7CF0F53DA4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E7E331DA-1FB0-4DEC-91AC-7DA69D461C11"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "17F0B248-42CF-4AE6-A469-BB1BAE7F4705"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E2422816-0C14-4B5E-A1E6-A9D776E5C49B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1C6E00FE-5FB9-4D20-A1A1-5A32128F9B76"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "35B26BE4-43A6-4A36-A7F6-5B3F572D9186"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc6:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3FFFB0B3-930D-408A-91E2-BAE0C2715D80"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc7:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8535320E-A0DB-4277-800E-D0CE5BBA59E8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc8:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "21718AA4-4056-40F2-968E-BDAA465A7872"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/16854177745a5648f8ec322353b432e18460f43a",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/a5c6de1a6656b8cc6bce7cb3d9874dd7df4968c3",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/cb37617687f2bfa5b675df7779f869147c9002bd",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-29929",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-21T18:15:09.173",
|
||||
"lastModified": "2024-08-22T21:15:15.840",
|
||||
"lastModified": "2024-10-24T20:35:02.040",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -46,7 +46,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-38334",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-07-20T18:15:12.170",
|
||||
"lastModified": "2023-07-31T18:42:53.743",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-24T21:35:02.113",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -45,6 +45,16 @@
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-276"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-38335",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-07-20T18:15:12.227",
|
||||
"lastModified": "2023-07-31T18:42:46.760",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-24T21:35:04.503",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -45,6 +45,16 @@
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-276"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-49233",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-03T17:15:14.400",
|
||||
"lastModified": "2024-09-03T21:35:04.420",
|
||||
"lastModified": "2024-10-24T20:35:03.457",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -46,7 +46,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
"value": "CWE-522"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-50809",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-12T13:38:11.923",
|
||||
"lastModified": "2024-08-13T14:35:00.967",
|
||||
"lastModified": "2024-10-24T20:35:04.223",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -39,18 +39,6 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.sonos.com/en-us/security-advisory-2024-0001",
|
||||
|
60
CVE-2024/CVE-2024-103xx/CVE-2024-10327.json
Normal file
60
CVE-2024/CVE-2024-103xx/CVE-2024-10327.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-10327",
|
||||
"sourceIdentifier": "psirt@okta.com",
|
||||
"published": "2024-10-24T21:15:11.730",
|
||||
"lastModified": "2024-10-24T21:15:11.730",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in Okta Verify for iOS versions 9.25.1 (beta) and 9.27.0 (including beta) allows push notification responses through the iOS ContextExtension feature allowing the authentication to proceed regardless of the user\u2019s selection. When a user long-presses the notification banner and selects an option, both options allow the authentication to succeed. \nThe ContextExtension feature is one of several push mechanisms available when using Okta Verify Push on iOS devices. The vulnerable flows include: \n* When a user is presented with a notification on a locked screen, the user presses on the notification directly and selects their reply without unlocking the device; \n* When a user is presented with a notification on the home screen and drags the notification down and selects their reply; \n* When an Apple Watch is used to reply directly to a notification. \n\n A pre-condition for this vulnerability is that the user must have enrolled in Okta Verify while the Okta customer was using Okta Classic. This applies irrespective of whether the organization has since upgraded to Okta Identity Engine."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@okta.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@okta.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-287"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://help.okta.com/en-us/content/topics/releasenotes/okta-verify-release-notes.htm#panel2",
|
||||
"source": "psirt@okta.com"
|
||||
},
|
||||
{
|
||||
"url": "https://trust.okta.com/security-advisories/okta-verify-for-ios-cve-2024-10327/",
|
||||
"source": "psirt@okta.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-21687",
|
||||
"sourceIdentifier": "security@atlassian.com",
|
||||
"published": "2024-07-16T21:15:10.257",
|
||||
"lastModified": "2024-08-01T13:46:48.050",
|
||||
"lastModified": "2024-10-24T20:35:05.307",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -39,18 +39,6 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-98"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://confluence.atlassian.com/pages/viewpage.action?pageId=1417150917",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-34734",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2024-08-15T22:15:06.337",
|
||||
"lastModified": "2024-08-19T13:00:23.117",
|
||||
"lastModified": "2024-10-24T20:35:05.433",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -46,7 +46,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-453"
|
||||
"value": "CWE-1188"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-36130",
|
||||
"sourceIdentifier": "support@hackerone.com",
|
||||
"published": "2024-08-07T04:17:17.967",
|
||||
"lastModified": "2024-08-12T18:52:50.947",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-24T20:35:06.217",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -71,16 +71,6 @@
|
||||
"value": "CWE-287"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-285"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-36877",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-12T16:15:15.300",
|
||||
"lastModified": "2024-08-15T16:15:19.160",
|
||||
"lastModified": "2024-10-24T20:35:06.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -39,18 +39,6 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-123"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://csr.msi.com/global/product-security-advisories",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-40531",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-05T16:15:36.800",
|
||||
"lastModified": "2024-08-28T19:15:08.797",
|
||||
"lastModified": "2024-10-24T20:35:06.753",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -39,18 +39,6 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://critical.lt/blog/authorization-bypass-and-mass-assignment-in-pantera-crm/",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-41250",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-07T17:15:51.837",
|
||||
"lastModified": "2024-08-08T21:35:16.680",
|
||||
"lastModified": "2024-10-24T20:35:06.947",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -69,16 +69,6 @@
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-41251",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-07T16:15:45.850",
|
||||
"lastModified": "2024-08-08T20:35:09.980",
|
||||
"lastModified": "2024-10-24T20:35:07.133",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -69,16 +69,6 @@
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-42815",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-19T20:15:07.193",
|
||||
"lastModified": "2024-09-03T21:15:16.197",
|
||||
"lastModified": "2024-10-24T20:35:07.330",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -46,7 +46,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-42966",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-15T17:15:20.130",
|
||||
"lastModified": "2024-08-19T19:35:09.913",
|
||||
"lastModified": "2024-10-24T20:35:08.087",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -76,7 +76,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-42977",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-15T17:15:20.860",
|
||||
"lastModified": "2024-08-19T20:35:17.330",
|
||||
"lastModified": "2024-10-24T20:35:08.860",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -76,7 +76,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-42986",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-15T17:15:21.717",
|
||||
"lastModified": "2024-08-19T21:35:07.937",
|
||||
"lastModified": "2024-10-24T20:35:09.653",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -76,7 +76,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
25
CVE-2024/CVE-2024-452xx/CVE-2024-45242.json
Normal file
25
CVE-2024/CVE-2024-452xx/CVE-2024-45242.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-45242",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-24T20:15:04.243",
|
||||
"lastModified": "2024-10-24T20:15:04.243",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "EnGenius ENH1350EXT A8J-ENH1350EXT devices through 3.9.3.2_c1.9.51 allow (blind) OS Command Injection via shell metacharacters to the Ping or Speed Test utility. During the time of initial setup, the device creates an open unsecured network whose admin panel is configured with the default credentials of admin/admin. An unauthorized attacker in proximity to the Wi-Fi network can exploit this window of time to execute arbitrary OS commands with root-level permissions."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/actuator/cve/blob/main/Engenius/CVE-2024-45242",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/actuator/cve/blob/main/Engenius/CVE-2024-45242_Extended_Report.pdf",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-452xx/CVE-2024-45259.json
Normal file
21
CVE-2024/CVE-2024-452xx/CVE-2024-45259.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-45259",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-24T20:15:04.323",
|
||||
"lastModified": "2024-10-24T20:15:04.323",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered on certain GL-iNet devices, including MT6000, MT3000, MT2500, AXT1800, and AX1800 4.6.2. By intercepting an HTTP request and changing the filename property in the download interface, any file on the device can be deleted."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/Delete%20Any%20File%20via%20Download%20Interface.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-452xx/CVE-2024-45260.json
Normal file
21
CVE-2024/CVE-2024-452xx/CVE-2024-45260.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-45260",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-24T21:15:11.977",
|
||||
"lastModified": "2024-10-24T21:15:11.977",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered on certain GL-iNet devices, including MT6000, MT3000, MT2500, AXT1800, and AX1800 4.6.2. Users who belong to unauthorized groups can invoke any interface of the device, thereby gaining complete control over it."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/Unauthorized%20Access%20to%20File%20Download%20and%20Upload%20Interfaces.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-452xx/CVE-2024-45261.json
Normal file
21
CVE-2024/CVE-2024-452xx/CVE-2024-45261.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-45261",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-24T21:15:12.057",
|
||||
"lastModified": "2024-10-24T21:15:12.057",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered on certain GL-iNet devices, including MT6000, MT3000, MT2500, AXT1800, and AX1800 4.6.2. The SID generated for a specific user is not tied to that user itself, which allows other users to potentially use it for authentication. Once an attacker bypasses the application's authentication procedures, they can generate a valid SID, escalate privileges, and gain full control."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/Bypassing%20Login%20Mechanism%20with%20Passwordless%20User%20Login.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-452xx/CVE-2024-45262.json
Normal file
21
CVE-2024/CVE-2024-452xx/CVE-2024-45262.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-45262",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-24T21:15:12.143",
|
||||
"lastModified": "2024-10-24T21:15:12.143",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered on certain GL-iNet devices, including MT6000, MT3000, MT2500, AXT1800, and AX1800 4.6.2. The params parameter in the call method of the /rpc endpoint is vulnerable to arbitrary directory traversal, which enables attackers to execute scripts under any path."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/Improper%20Pathname%20Restriction%20Leading%20to%20Path%20Traversal%20in%20Restricted%20Directories.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-452xx/CVE-2024-45263.json
Normal file
21
CVE-2024/CVE-2024-452xx/CVE-2024-45263.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-45263",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-24T21:15:12.217",
|
||||
"lastModified": "2024-10-24T21:15:12.217",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered on certain GL-iNet devices, including MT6000, MT3000, MT2500, AXT1800, and AX1800 4.6.2. The upload interface allows the uploading of arbitrary files to the device. Once the device executes the files, it can lead to information leakage, enabling complete control."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/Arbitrary%20File%20Upload%20to%20ovpn_upload%20via%20Upload%20Interface.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-478xx/CVE-2024-47878.json
Normal file
60
CVE-2024/CVE-2024-478xx/CVE-2024-47878.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-47878",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-10-24T21:15:12.293",
|
||||
"lastModified": "2024-10-24T21:15:12.293",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "OpenRefine is a free, open source tool for working with messy data. Prior to version 3.8.3, the `/extension/gdata/authorized` endpoint includes the `state` GET parameter verbatim in a `<script>` tag in the output, so without escaping. An attacker could lead or redirect a user to a crafted URL containing JavaScript code, which would then cause that code to be executed in the victim's browser as if it was part of OpenRefine. Version 3.8.3 fixes this issue."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/OpenRefine/OpenRefine/commit/10bf0874d67f1018a58b3732332d76b840192fea",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/OpenRefine/OpenRefine/security/advisories/GHSA-pw3x-c5vp-mfc3",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2024/CVE-2024-478xx/CVE-2024-47879.json
Normal file
64
CVE-2024/CVE-2024-478xx/CVE-2024-47879.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2024-47879",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-10-24T21:15:12.523",
|
||||
"lastModified": "2024-10-24T21:15:12.523",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "OpenRefine is a free, open source tool for working with messy data. Prior to version 3.8.3, lack of cross-site request forgery protection on the `preview-expression` command means that visiting a malicious website could cause an attacker-controlled expression to be executed. The expression can contain arbitrary Clojure or Python code. The attacker must know a valid project ID of a project that contains at least one row, and the attacker must convince the victim to open a malicious webpage. Version 3.8.3 fixes the issue."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.6,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 5.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/OpenRefine/OpenRefine/commit/090924ca923489b6c94397cf1f5df7f7f78f0126",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/OpenRefine/OpenRefine/security/advisories/GHSA-3jm4-c6qf-jrh3",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2024/CVE-2024-478xx/CVE-2024-47880.json
Normal file
64
CVE-2024/CVE-2024-478xx/CVE-2024-47880.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2024-47880",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-10-24T21:15:12.750",
|
||||
"lastModified": "2024-10-24T21:15:12.750",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "OpenRefine is a free, open source tool for working with messy data. Prior to version 3.8.3, the `export-rows` command can be used in such a way that it reflects part of the request verbatim, with a Content-Type header also taken from the request. An attacker could lead a user to a malicious page that submits a form POST that contains embedded JavaScript code. This code would then be included in the response, along with an attacker-controlled `Content-Type` header, and so potentially executed in the victim's browser as if it was part of OpenRefine. The attacker-provided code can do anything the user can do, including deleting projects, retrieving database passwords, or executing arbitrary Jython or Closure expressions, if those extensions are also present. The attacker must know a valid project ID of a project that contains at least one row. Version 3.8.3 fixes the issue."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-348"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/OpenRefine/OpenRefine/commit/8060477fa53842ebabf43b63e039745932fa629d",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/OpenRefine/OpenRefine/security/advisories/GHSA-79jv-5226-783f",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-478xx/CVE-2024-47881.json
Normal file
60
CVE-2024/CVE-2024-478xx/CVE-2024-47881.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-47881",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-10-24T21:15:12.957",
|
||||
"lastModified": "2024-10-24T21:15:12.957",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "OpenRefine is a free, open source tool for working with messy data. Starting in version 3.4-beta and prior to version 3.8.3, in the `database` extension, the \"enable_load_extension\" property can be set for the SQLite integration, enabling an attacker to load (local or remote) extension DLLs and so run arbitrary code on the server. The attacker needs to have network access to the OpenRefine instance. Version 3.8.3 fixes this issue."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/OpenRefine/OpenRefine/commit/853a1d91662e7dc278a9a94a38be58de04494056",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/OpenRefine/OpenRefine/security/advisories/GHSA-87cf-j763-vvh8",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
68
CVE-2024/CVE-2024-478xx/CVE-2024-47882.json
Normal file
68
CVE-2024/CVE-2024-478xx/CVE-2024-47882.json
Normal file
@ -0,0 +1,68 @@
|
||||
{
|
||||
"id": "CVE-2024-47882",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-10-24T21:15:13.160",
|
||||
"lastModified": "2024-10-24T21:15:13.160",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "OpenRefine is a free, open source tool for working with messy data. Prior to version 3.8.3, the built-in \"Something went wrong!\" error page includes the exception message and exception traceback without escaping HTML tags, enabling injection into the page if an attacker can reliably produce an error with an attacker-influenced message. It appears that the only way to reach this code in OpenRefine itself is for an attacker to somehow convince a victim to import a malicious file, which may be difficult. However, out-of-tree extensions may add their own calls to `respondWithErrorPage`. Version 3.8.3 has a fix for this issue."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 4.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-81"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/OpenRefine/OpenRefine/blob/master/main/webapp/modules/core/error.vt#L52-L53",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/OpenRefine/OpenRefine/commit/85594e75e7b36025f7b6a67dcd3ec253c5dff8c2",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/OpenRefine/OpenRefine/security/advisories/GHSA-j8hp-f2mj-586g",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2024/CVE-2024-478xx/CVE-2024-47883.json
Normal file
64
CVE-2024/CVE-2024-478xx/CVE-2024-47883.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2024-47883",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-10-24T21:15:13.430",
|
||||
"lastModified": "2024-10-24T21:15:13.430",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The OpenRefine fork of the MIT Simile Butterfly server is a modular web application framework. The Butterfly framework uses the `java.net.URL` class to refer to (what are expected to be) local resource files, like images or templates. This works: \"opening a connection\" to these URLs opens the local file. However, prior to version 1.2.6, if a `file:/` URL is directly given where a relative path (resource name) is expected, this is also accepted in some code paths; the app then fetches the file, from a remote machine if indicated, and uses it as if it was a trusted part of the app's codebase. This leads to multiple weaknesses and potential weaknesses. An attacker that has network access to the application could use it to gain access to files, either on the the server's filesystem (path traversal) or shared by nearby machines (server-side request forgery with e.g. SMB). An attacker that can lead or redirect a user to a crafted URL belonging to the app could cause arbitrary attacker-controlled JavaScript to be loaded in the victim's browser (cross-site scripting). If an app is written in such a way that an attacker can influence the resource name used for a template, that attacker could cause the app to fetch and execute an attacker-controlled template (remote code execution). Version 1.2.6 contains a patch."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 9.1,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-36"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-918"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/OpenRefine/simile-butterfly/commit/537f64bfa72746f8b21d4bda461fad843435319c",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/OpenRefine/simile-butterfly/security/advisories/GHSA-3p8v-w8mr-m3x8",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-482xx/CVE-2024-48208.json
Normal file
21
CVE-2024/CVE-2024-482xx/CVE-2024-48208.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-48208",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-24T21:15:14.040",
|
||||
"lastModified": "2024-10-24T21:15:14.040",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "pure-ftpd before 1.0.52 is vulnerable to Buffer Overflow. There is an out of bounds read in the domlsd() function of the ls.c file."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/jedisct1/pure-ftpd/pull/176",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-484xx/CVE-2024-48423.json
Normal file
21
CVE-2024/CVE-2024-484xx/CVE-2024-48423.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-48423",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-24T21:15:14.143",
|
||||
"lastModified": "2024-10-24T21:15:14.143",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in assimp v.5.4.3 allows a local attacker to execute arbitrary code via the CallbackToLogRedirector function within the Assimp library."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/assimp/assimp/issues/5788",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-484xx/CVE-2024-48424.json
Normal file
21
CVE-2024/CVE-2024-484xx/CVE-2024-48424.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-48424",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-24T21:15:14.223",
|
||||
"lastModified": "2024-10-24T21:15:14.223",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A heap-buffer-overflow vulnerability has been identified in the OpenDDLParser::parseStructure function within the Assimp library, specifically during the processing of OpenGEX files."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/assimp/assimp/issues/5787",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-484xx/CVE-2024-48425.json
Normal file
21
CVE-2024/CVE-2024-484xx/CVE-2024-48425.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-48425",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-24T21:15:14.303",
|
||||
"lastModified": "2024-10-24T21:15:14.303",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A segmentation fault (SEGV) was detected in the Assimp::SplitLargeMeshesProcess_Triangle::UpdateNode function within the Assimp library during fuzz testing using AddressSanitizer. The crash occurs due to a read access violation at address 0x000000000460, which points to the zero page, indicating a null or invalid pointer dereference."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/assimp/assimp/issues/5791",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-484xx/CVE-2024-48426.json
Normal file
21
CVE-2024/CVE-2024-484xx/CVE-2024-48426.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-48426",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-24T21:15:14.387",
|
||||
"lastModified": "2024-10-24T21:15:14.387",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A segmentation fault (SEGV) was detected in the SortByPTypeProcess::Execute function in the Assimp library during fuzz testing with AddressSanitizer. The crash occurred due to a read access to an invalid memory address (0x1000c9714971)."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/assimp/assimp/issues/5789",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-48454",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-24T19:15:15.803",
|
||||
"lastModified": "2024-10-24T19:15:15.803",
|
||||
"lastModified": "2024-10-24T21:35:05.410",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "An issue in SourceCodester Purchase Order Management System v1.0 allows a remote attacker to execute arbitrary code via the /admin?page=user component"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/N0zoM1z0/CVEs/blob/main/CVE-2024-48454.md",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-48538",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-24T16:15:05.210",
|
||||
"lastModified": "2024-10-24T16:15:05.210",
|
||||
"lastModified": "2024-10-24T20:35:10.890",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "Incorrect access control in the firmware update and download processes of Neye3C v4.5.2.0 allows attackers to access sensitive information by analyzing the code and data within the APK file."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://neye3c.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-48539",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-24T17:15:16.873",
|
||||
"lastModified": "2024-10-24T17:15:16.873",
|
||||
"lastModified": "2024-10-24T20:35:11.713",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "Neye3C v4.5.2.0 was discovered to contain a hardcoded encryption key in the firmware update mechanism."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-798"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://neye3c.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-48544",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-24T17:15:17.257",
|
||||
"lastModified": "2024-10-24T17:15:17.257",
|
||||
"lastModified": "2024-10-24T21:35:06.263",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "Incorrect access control in the firmware update and download processes of Sylvania Smart Home v3.0.3 allows attackers to access sensitive information by analyzing the code and data within the APK file."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.4,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://sylvania.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-48548",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-24T17:15:17.663",
|
||||
"lastModified": "2024-10-24T17:15:17.663",
|
||||
"lastModified": "2024-10-24T21:35:07.050",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "The APK file in Cloud Smart Lock v2.0.1 has a leaked a URL that can call an API for binding physical devices. This vulnerability allows attackers to arbitrarily construct a request to use the app to bind to unknown devices by finding a valid serial number via a bruteforce attack."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.3,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cloudsmartlock.com/m/app.html",
|
||||
|
60
CVE-2024/CVE-2024-489xx/CVE-2024-48931.json
Normal file
60
CVE-2024/CVE-2024-489xx/CVE-2024-48931.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-48931",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-10-24T21:15:14.580",
|
||||
"lastModified": "2024-10-24T21:15:14.580",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "ZimaOS is a fork of CasaOS, an operating system for Zima devices and x86-64 systems with UEFI. In version 1.2.4 and all prior versions, the ZimaOS API endpoint `http://<Zima_Server_IP:PORT>/v3/file?token=<token>&files=<file_path>` is vulnerable to arbitrary file reading due to improper input validation. By manipulating the `files` parameter, authenticated users can read sensitive system files, including `/etc/shadow`, which contains password hashes for all users. This vulnerability exposes critical system data and poses a high risk for privilege escalation or system compromise. The vulnerability occurs because the API endpoint does not validate or restrict file paths provided via the `files` parameter. An attacker can exploit this by manipulating the file path to access sensitive files outside the intended directory. As of time of publication, no known patched versions are available."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/IceWhaleTech/ZimaOS/security/advisories/GHSA-hjw2-9gq5-qgwj",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://youtu.be/FyIfcmCyDXs",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-489xx/CVE-2024-48932.json
Normal file
60
CVE-2024/CVE-2024-489xx/CVE-2024-48932.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-48932",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-10-24T21:15:14.790",
|
||||
"lastModified": "2024-10-24T21:15:14.790",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "ZimaOS is a fork of CasaOS, an operating system for Zima devices and x86-64 systems with UEFI. In version 1.2.4 and all prior versions, the API endpoint `http://<Server-ip>/v1/users/name` allows unauthenticated users to access sensitive information, such as usernames, without any authorization. This vulnerability could be exploited by an attacker to enumerate usernames and leverage them for further attacks, such as brute-force or phishing campaigns. As of time of publication, no known patched versions are available."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/IceWhaleTech/ZimaOS/security/advisories/GHSA-9mrr-px2c-w42c",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://youtu.be/wJFq8cuyFm4",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-49869",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-10-21T18:15:08.340",
|
||||
"lastModified": "2024-10-23T15:13:58.783",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-24T20:28:21.597",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,15 +15,75 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: btrfs: send: corrige la detecci\u00f3n de desbordamiento de b\u00fafer al copiar la ruta a la entrada de cach\u00e9 A partir de el commit c0247d289e73 (\"btrfs: send: annotate struct name_cache_entry with __counted_by()\"), anotamos la matriz de longitud variable \"name\" de la estructura name_cache_entry con __counted_by() para mejorar la detecci\u00f3n de desbordamiento. Sin embargo, eso solo no era correcto, porque la longitud de esa matriz no coincide con el campo \"name_len\" - coincide con eso m\u00e1s 1 para incluir el terminador de cadena NUL, por lo que hace que un kernel fortificado piense que hay un desbordamiento e informe un splat como este: strcpy: desbordamiento de b\u00fafer detectado: escritura de 20 bytes de tama\u00f1o de b\u00fafer 19 ADVERTENCIA: CPU: 3 PID: 3310 en __fortify_report+0x45/0x50 CPU: 3 UID: 0 PID: 3310 Comm: btrfs No contaminado 6.11.0-prnet #1 Nombre del hardware: CompuLab Ltd. sbc-ihsw/Intense-PC2 (IPC2), BIOS IPC2_3.330.7 X64 15/03/2018 RIP: 0010:__fortify_report+0x45/0x50 C\u00f3digo: 48 8b 34 (...) RSP: 0018:ffff97ebc0d6f650 EFLAGS: 00010246 RAX: 7749924ef60fa600 RBX: ffff8bf5446a521a RCX: 0000000000000027 RDX: 00000000ffffdfff RSI: ffff97ebc0d6f548 RDI: ffff8bf84e7a1cc8 RBP: ffff8bf548574080 R08: ffffffffa8c40e10 R09: 0000000000005ffd R10: 0000000000000004 R11: ffffffffa8c70e10 R12: ffff8bf551eef400 R13: 0000000000000000 R14: 0000000000000013 R15: 000000000000003a8 FS: 00007fae144de8c0(0000) GS:ffff8bf84e780000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fae14691690 CR3: 00000001027a2003 CR4: 00000000001706f0 Seguimiento de llamadas: ? __warn+0x12a/0x1d0 ? __fortify_report+0x45/0x50 ? report_bug+0x154/0x1c0 ? handle_bug+0x42/0x70 ? exc_invalid_op+0x1a/0x50 ? asm_exc_invalid_op+0x1a/0x20 ? __fortify_report+0x45/0x50 __fortify_panic+0x9/0x10 __get_cur_name_and_parent_+0x3bc/0x3c0 get_cur_path+0x207/0x3b0 send_extent_data+0x709/0x10d0 ? find_parent_nodes+0x22df/0x25d0 ? mas_nomem+0x13/0x90 ? mtree_insert_range+0xa5/0x110 ? btrfs_lru_cache_store+0x5f/0x1e0 ? iterate_extent_inodes+0x52d/0x5a0 process_extent+0xa96/0x11a0 ? __pfx_lookup_backref_cache+0x10/0x10 ? __pfx_store_backref_cache+0x10/0x10 ? __pfx_iterate_backrefs+0x10/0x10 ? __pfx_check_extent_item+0x10/0x10 changed_cb+0x6fa/0x930 ? tree_advance+0x362/0x390 ? __pfx___clone_root_cmp_sort+0x10/0x10 _btrfs_ioctl_send+0x1ac/0x240 btrfs_ioctl+0x75b/0x850 __se_sys_ioctl+0xca/0x150 do_syscall_64+0x85/0x160 ? __count_memcg_events+0x69/0x100 ? handle_mm_fault+0x1327/0x15c0 ? __se_sys_rt_sigprocmask+0xf1/0x180 ? syscall_exit_to_user_mode+0x75/0xa0 ? do_syscall_64+0x91/0x160 ? do_user_addr_fault+0x21d/0x630 entry_SYSCALL_64_after_hwframe+0x76/0x7e RIP: 0033:0x7fae145eeb4f C\u00f3digo: 00 48 89 (...) RSP: 002b:00007ffdf1cb09b0 EFLAGS: 00000246 ORIG_RAX: 000000000000010 RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 00007fae145eeb4f RDX: 00007ffdf1cb0ad0 RSI: 0000000040489426 RDI: 0000000000000004 RBP: 00000000000078fe R08: 00007fae144006c0 R09: 00007ffdf1cb0927 R10: 0000000000000008 R11: 0000000000000246 R12: 00007ffdf1cb1ce8 R13: 000000000000003 R14: 000055c499fab2e0 R15: 000000000000004 Solucione esto al no almacenar el terminador de cadena NUL ya que en realidad no lo necesitamos para las entradas de cach\u00e9 de nombres, de esta manera \"name_len\" corresponde al tama\u00f1o real de la matriz \"name\". Esto requiere marcar el campo de matriz \"nombre\" con __nonstring y usar memcpy() en lugar de strcpy() como lo recomiendan las pautas en: https://github.com/KSPP/linux/issues/90"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.11",
|
||||
"versionEndExcluding": "6.11.3",
|
||||
"matchCriteriaId": "54D9C704-D679-41A7-9C40-10A6B1E7FFE9"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/843738ede6cb8b959fb22591fcbabe8b456d7216",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/96c6ca71572a3556ed0c37237305657ff47174b7",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-49871",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-10-21T18:15:08.500",
|
||||
"lastModified": "2024-10-23T15:13:58.783",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-24T20:22:19.530",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,31 +15,136 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: Entrada: adp5589-keys - correcci\u00f3n de la desreferencia de puntero NULL Registramos una acci\u00f3n devm para llamar a adp5589_clear_config() y luego pasamos el cliente i2c como argumento para que podamos llamar a i2c_get_clientdata() para obtener nuestro objeto de dispositivo. Sin embargo, i2c_set_clientdata() solo se establece al final de la funci\u00f3n de sondeo, lo que significa que obtendremos una desreferencia de puntero NULL en caso de que la funci\u00f3n de sondeo falle antes."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11",
|
||||
"versionEndExcluding": "5.15.168",
|
||||
"matchCriteriaId": "4D51C05D-455B-4D8D-89E7-A58E140B864C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "6.1.113",
|
||||
"matchCriteriaId": "D01BD22E-ACD1-4618-9D01-6116570BE1EE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2",
|
||||
"versionEndExcluding": "6.6.55",
|
||||
"matchCriteriaId": "E90B9576-56C4-47BC-AAB0-C5B2D438F5D0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.10.14",
|
||||
"matchCriteriaId": "4C16BCE0-FFA0-4599-BE0A-1FD65101C021"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.11",
|
||||
"versionEndExcluding": "6.11.3",
|
||||
"matchCriteriaId": "54D9C704-D679-41A7-9C40-10A6B1E7FFE9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7F361E1D-580F-4A2D-A509-7615F73167A1"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/122b160561f6429701a0559a0f39b0ae309488c6",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/34e304cc53ae5d3c8e3f08b41dd11e0d4f3e01ed",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/4449fedb8a710043fc0925409eba844c192d4337",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/7c3f04223aaf82489472d614c6decee5a1ce8d7f",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/9a38791ee79bd17d225c15a6d1479448be127a59",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/fb5cc65f973661241e4a2b7390b429aa7b330c69",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-49873",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-10-21T18:15:08.763",
|
||||
"lastModified": "2024-10-23T15:13:58.783",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-24T20:22:42.387",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,15 +15,75 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mm/filemap: correcci\u00f3n de la serie de parches de p\u00e1nico de THP filemap_get_folios_contig \"memfd-pin huge page fixes\". Corrige varios errores que ocurren al usar memfd_pin_folios con p\u00e1ginas hugetlb y THP. Los errores de hugetlb solo afectan cuando la p\u00e1gina a\u00fan no tiene errores cuando se llama a memfd_pin_folios. El error de THP afecta cuando el desplazamiento inicial pasado a memfd_pin_folios no est\u00e1 alineado con la p\u00e1gina enorme. Consulte los mensajes de confirmaci\u00f3n para obtener m\u00e1s detalles. Este parche (de 5): memfd_pin_folios en la memoria respaldada por THP entra en p\u00e1nico si el desplazamiento de inicio solicitado no est\u00e1 alineado con una p\u00e1gina enorme: ERROR: desreferencia de puntero NULL del n\u00facleo, direcci\u00f3n: 0000000000000036 RIP: 0010:filemap_get_folios_contig+0xdf/0x290 RSP: 0018:ffffc9002092fbe8 EFLAGS: 00010202 RAX: 000000000000002 RBX: 0000000000000002 RCX: 0000000000000002 El error ocurre aqu\u00ed porque xas_load devuelve un folio con el valor 2: filemap_get_folios_contig() para (folio = xas_load(&xas); folio && xas.xa_index <= end; folio = xas_next(&xas)) { ... if (!folio_try_get(folio)) <-- BOOM \"2\" es una entrada hermana de xarray. Lo obtenemos porque memfd_pin_folios no redondea los \u00edndices pasados a filemap_get_folios_contig a los l\u00edmites de p\u00e1ginas enormes para THP, por lo que cargamos desde el medio de un rango de p\u00e1ginas enormes para ver un hermano. (S\u00ed redondea para hugetlbfs, en la prueba is_file_hugepages). Para solucionarlo, si el folio es un hermano, entonces devuelva el siguiente \u00edndice como punto de inicio para la siguiente llamada a filemap_get_folios_contig."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.11",
|
||||
"versionEndExcluding": "6.11.3",
|
||||
"matchCriteriaId": "54D9C704-D679-41A7-9C40-10A6B1E7FFE9"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/570dd14bfecf281fa467c80f8ec92b26370ee36a",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/c225c4f6056b46a8a5bf2ed35abf17a2d6887691",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-49874",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-10-21T18:15:08.983",
|
||||
"lastModified": "2024-10-23T15:13:58.783",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-24T20:27:51.700",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,23 +15,103 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: i3c: master: svc: Se corrige la vulnerabilidad de use after free en el controlador svc_i3c_master debido a la condici\u00f3n de ejecuci\u00f3n En la funci\u00f3n svc_i3c_master_probe, &master->hj_work est\u00e1 vinculado con svc_i3c_master_hj_work, &master->ibi_work est\u00e1 vinculado con svc_i3c_master_ibi_work. Y svc_i3c_master_ibi_work puede iniciar hj_work, svc_i3c_master_irq_handler puede iniciar ibi_work. Si eliminamos el m\u00f3dulo que llamar\u00e1 a svc_i3c_master_remove para realizar la limpieza, liberar\u00e1 master->base a trav\u00e9s de i3c_master_unregister mientras que el trabajo mencionado anteriormente se utilizar\u00e1. La secuencia de operaciones que pueden provocar un error de UAF es la siguiente: CPU0 CPU1 | Solucione el problema asegur\u00e1ndose de que el trabajo se cancele antes de continuar con la limpieza en svc_i3c_master_remove."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.0,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.0,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.4",
|
||||
"versionEndExcluding": "6.6.55",
|
||||
"matchCriteriaId": "56DA35BA-143D-4269-9914-273743A40222"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.10.14",
|
||||
"matchCriteriaId": "4C16BCE0-FFA0-4599-BE0A-1FD65101C021"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.11",
|
||||
"versionEndExcluding": "6.11.3",
|
||||
"matchCriteriaId": "54D9C704-D679-41A7-9C40-10A6B1E7FFE9"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/27b55724d3f781dd6e635e89dc6e2fd78fa81a00",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/4318998892bf8fe99f97bea18c37ae7b685af75a",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/4ac637122930cc4ab7e2c22e364cf3aaf96b05b1",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/61850725779709369c7e907ae8c7c75dc7cec4f3",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-49875",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-10-21T18:15:09.183",
|
||||
"lastModified": "2024-10-23T15:13:58.783",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-24T20:13:50.927",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,35 +15,144 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: nfsd: asignar EBADMSG a nfserr_io para evitar advertencias Ext4 arrojar\u00e1 -EBADMSG a trav\u00e9s de ext4_readdir cuando se produzca un error de suma de comprobaci\u00f3n, lo que dar\u00e1 como resultado la siguiente ADVERTENCIA. Solucione el problema asignando EBADMSG a nfserr_io. nfsd_buffered_readdir iterar_dir // -EBADMSG -74 ext4_readdir // .iterate_shared ext4_dx_readdir ext4_htree_fill_tree htree_dirblock_to_tree ext4_read_dirblock __ext4_read_dirblock ext4_dirblock_csum_verify advertir_sin_espacio_para_csum __ advertir_sin_espacio_para_csum return ERR_PTR(-EFSBADCRC) // -EBADMSG -74 nfserrno // ADVERTENCIA [ 161.115610] ------------[ cortar aqu\u00ed ]------------ [ 161.116465] nfsd: no est\u00e1ndar errno: -74 [ 161.117315] ADVERTENCIA: CPU: 1 PID: 780 en fs/nfsd/nfsproc.c:878 nfserrno+0x9d/0xd0 [ 161.118596] M\u00f3dulos vinculados en: [ 161.119243] CPU: 1 PID: 780 Comm: nfsd No contaminado 5.10.0-00014-g79679361fd5d #138 [ 161.120684] Nombre del hardware: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qe mu.org 04/01/2014 [ 161.123601] RIP: 0010:nfserrno+0x9d/0xd0 [ 161.124676] C\u00f3digo: 0f 87 da 30 dd 00 83 e3 01 b8 00 00 00 05 75 d7 44 89 ee 48 c7 c7 c0 57 24 98 89 44 24 04 c6 05 ce 2b 61 03 01 e8 99 20 d8 00 <0f> 0b 8b 44 24 04 eb b5 4c 89 e6 48 c7 c7 a0 6d a4 99 e8 cc 15 33 [ 161.127797] RSP: 0018:ffffc90000e2f9c0 EFLAGS: 00010286 [ 161.128794] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 [161.130089] RDX: 1ffff1103ee16f6d RSI: 0000000000000008 fffff52000 1c5f2a [ 161.131379] RBP: 0000000000000022 R08: 0000000000000001 R09: ffff8881f70c1827 [ 161.132664] R10: ffffed103ee18304 R11: 00000000000000001 R12: 0000000000000021 [ 161.133949] R13: 00000000ffffffb6 R14: ffff8881317c0000 R15: ffffc90000e2fbd8 [ 161.135244] FS: 000000000000000(0000) GS:ffff8881f7080000(0000) knlGS:0000000000000000 [ 161.136695] CS: 0010 DS: 0000 ES: 0000 CR0: 000000080050033 [ 161.137761] CR2: 00007fcaad70b348 CR3: 0000000144256006 CR4: 0000000000770ee0 [ 161.139041] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 000000000000000 [ 161.140291] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 161.141519] PKRU: 55555554 [ [161.142076] Rastreo de llamadas: [161.142575] ? __warn+0x9b/0x140 [161.143229] ? nfserrno+0x9d/0xd0 [161.143872] ? report_bug+0x125/0x150 [161.144595] ? handle_bug+0x41/0x90 [161.145284] ? exc_invalid_op+0x14/0x70 [161.146009] ? asm_exc_invalid_op+0x12/0x20 [161.146816] ? nfsd_buffered_filldir+0xf0/0xf0 [ 161.150093] ? esperar_escrituras_concurrentes+0x170/0x170 [ 161.151004] ? tama\u00f1o_de_archivo_gen\u00e9rico_llseek+0x48/0x160 [ 161.151895] nfsd_readdir+0x132/0x190 [ 161.152606] ? nfsd4_encode_dirent_fattr+0x380/0x380 [ 161.153516] ? nfsd_unlink+0x380/0x380 [ 161.154256] ? override_creds+0x45/0x60 [ 161.155006] nfsd4_encode_readdir+0x21a/0x3d0 [ 161.155850] ? nfsd4_encode_readlink+0x210/0x210 [ 161.156731] ? escritura_bytes_en_xdr_buf+0x97/0xe0 [ 161.157598] ? __escritura_bytes_en_xdr_buf+0xd0/0xd0 [ 161.158494] ? bloqueo_downgrade+0x90/0x90 [ 161.159232] ? nfsd_svc+0x380/0x380 [ 161.164137] ? svc_printk+0x160/0x160 [ 161.164846] ? svc_xprt_do_enqueue.part.0+0x365/0x380 [ 161.165808] ? nfsd_svc+0x380/0x380 [ 161.166523] ? rcu_is_watching+0x23/0x40 [ 161.167309] svc_process+0x1a5/0x200 [ 161.168019] nfsd+0x1f5/0x380 [ 161.168663] ? nfsd_shutdown_threads+0x260/0x260 [ 161.169554] kthread+0x1c4/0x210 [ 161.170224] ? kthread_insert_work_sanity_check+0x80/0x80 [ 161.171246] ret_from_fork+0x1f/0x30"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-354"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "5.10.227",
|
||||
"matchCriteriaId": "EB525A44-6338-4857-AD90-EA2860D1AD1F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11",
|
||||
"versionEndExcluding": "5.15.168",
|
||||
"matchCriteriaId": "4D51C05D-455B-4D8D-89E7-A58E140B864C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "6.1.113",
|
||||
"matchCriteriaId": "D01BD22E-ACD1-4618-9D01-6116570BE1EE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2",
|
||||
"versionEndExcluding": "6.6.55",
|
||||
"matchCriteriaId": "E90B9576-56C4-47BC-AAB0-C5B2D438F5D0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.10.14",
|
||||
"matchCriteriaId": "4C16BCE0-FFA0-4599-BE0A-1FD65101C021"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.11",
|
||||
"versionEndExcluding": "6.11.3",
|
||||
"matchCriteriaId": "54D9C704-D679-41A7-9C40-10A6B1E7FFE9"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/0ea4333c679f333e23956de743ad17387819d3f2",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/340e61e44c1d2a15c42ec72ade9195ad525fd048",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/6fe058502f8864649c3d614b06b2235223798f48",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/825789ca94602543101045ad3aad19b2b60c6b2a",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/c76005adfa93d1a027433331252422078750321f",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/e9cfecca22a36b927a440abc6307efb9e138fed5",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/f7d8ee9db94372b8235f5f22bb24381891594c42",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-50382",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-23T17:15:19.453",
|
||||
"lastModified": "2024-10-23T17:15:19.453",
|
||||
"lastModified": "2024-10-24T20:35:12.650",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Botan before 3.6.0, when certain LLVM versions are used, has compiler-induced secret-dependent control flow in lib/utils/ghash/ghash.cpp in GHASH in AES-GCM. There is a branch instead of an XOR with carry. This was observed for Clang in LLVM 15 on RISC-V."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En las versiones anteriores a la 3.6.0 de Botan, cuando se utilizan ciertas versiones de LLVM, el compilador genera un flujo de control dependiente del secreto en lib/utils/ghash/ghash.cpp en GHASH en AES-GCM. Hay una rama en lugar de un XOR con acarreo. Esto se observ\u00f3 para Clang en LLVM 15 en RISC-V."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-203"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://arxiv.org/pdf/2410.13489",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-50383",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-23T17:15:19.540",
|
||||
"lastModified": "2024-10-23T17:15:19.540",
|
||||
"lastModified": "2024-10-24T20:35:13.417",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Botan before 3.6.0, when certain GCC versions are used, has a compiler-induced secret-dependent operation in lib/utils/donna128.h in donna128 (used in Chacha-Poly1305 and x25519). An addition can be skipped if a carry is not set. This was observed for GCC 11.3.0 with -O2 on MIPS, and GCC on x86-i386. (Only 32-bit processors can be affected.)"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En las versiones anteriores a la 3.6.0 de Botan, cuando se utilizan ciertas versiones de GCC, se produce una operaci\u00f3n dependiente del secreto inducida por el compilador en lib/utils/donna128.h en donna128 (usada en Chacha-Poly1305 y x25519). Se puede omitir una adici\u00f3n si no se configura un acarreo. Esto se observ\u00f3 para GCC 11.3.0 con -O2 en MIPS y GCC en x86-i386. (Solo se pueden ver afectados los procesadores de 32 bits)."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-203"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://arxiv.org/pdf/2410.13489",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-7535",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2024-08-06T21:16:04.140",
|
||||
"lastModified": "2024-08-12T18:31:56.687",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-24T20:35:14.177",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -76,7 +76,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-122"
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
60
CVE-2024/CVE-2024-77xx/CVE-2024-7763.json
Normal file
60
CVE-2024/CVE-2024-77xx/CVE-2024-7763.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-7763",
|
||||
"sourceIdentifier": "security@progress.com",
|
||||
"published": "2024-10-24T21:15:15.033",
|
||||
"lastModified": "2024-10-24T21:15:15.033",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In WhatsUp Gold versions released before 2024.0.0,\u00a0\n\nan Authentication Bypass issue exists which allows an attacker to obtain encrypted user credentials."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@progress.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@progress.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-287"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://community.progress.com/s/article/WhatsUp-Gold-Security-Bulletin-August-2024",
|
||||
"source": "security@progress.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.progress.com/network-monitoring",
|
||||
"source": "security@progress.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-7973",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2024-08-21T21:15:09.407",
|
||||
"lastModified": "2024-08-26T15:13:04.650",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-24T20:35:14.967",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -86,7 +86,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-122"
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
105
README.md
105
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-10-24T20:00:26.666685+00:00
|
||||
2024-10-24T22:00:18.909139+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-10-24T19:59:47.737000+00:00
|
||||
2024-10-24T21:35:07.050000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,68 +33,65 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
266959
|
||||
266980
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `24`
|
||||
Recently added CVEs: `21`
|
||||
|
||||
- [CVE-2024-10295](CVE-2024/CVE-2024-102xx/CVE-2024-10295.json) (`2024-10-24T18:15:05.597`)
|
||||
- [CVE-2024-10313](CVE-2024/CVE-2024-103xx/CVE-2024-10313.json) (`2024-10-24T18:15:05.920`)
|
||||
- [CVE-2024-10337](CVE-2024/CVE-2024-103xx/CVE-2024-10337.json) (`2024-10-24T18:15:06.170`)
|
||||
- [CVE-2024-10338](CVE-2024/CVE-2024-103xx/CVE-2024-10338.json) (`2024-10-24T18:15:06.437`)
|
||||
- [CVE-2024-38314](CVE-2024/CVE-2024-383xx/CVE-2024-38314.json) (`2024-10-24T18:15:07.957`)
|
||||
- [CVE-2024-46478](CVE-2024/CVE-2024-464xx/CVE-2024-46478.json) (`2024-10-24T18:15:08.863`)
|
||||
- [CVE-2024-46994](CVE-2024/CVE-2024-469xx/CVE-2024-46994.json) (`2024-10-24T19:15:13.843`)
|
||||
- [CVE-2024-46995](CVE-2024/CVE-2024-469xx/CVE-2024-46995.json) (`2024-10-24T19:15:14.137`)
|
||||
- [CVE-2024-46996](CVE-2024/CVE-2024-469xx/CVE-2024-46996.json) (`2024-10-24T19:15:14.383`)
|
||||
- [CVE-2024-46998](CVE-2024/CVE-2024-469xx/CVE-2024-46998.json) (`2024-10-24T19:15:14.600`)
|
||||
- [CVE-2024-47173](CVE-2024/CVE-2024-471xx/CVE-2024-47173.json) (`2024-10-24T19:15:14.817`)
|
||||
- [CVE-2024-48139](CVE-2024/CVE-2024-481xx/CVE-2024-48139.json) (`2024-10-24T19:15:15.050`)
|
||||
- [CVE-2024-48140](CVE-2024/CVE-2024-481xx/CVE-2024-48140.json) (`2024-10-24T19:15:15.150`)
|
||||
- [CVE-2024-48141](CVE-2024/CVE-2024-481xx/CVE-2024-48141.json) (`2024-10-24T19:15:15.240`)
|
||||
- [CVE-2024-48142](CVE-2024/CVE-2024-481xx/CVE-2024-48142.json) (`2024-10-24T19:15:15.333`)
|
||||
- [CVE-2024-48143](CVE-2024/CVE-2024-481xx/CVE-2024-48143.json) (`2024-10-24T19:15:15.427`)
|
||||
- [CVE-2024-48144](CVE-2024/CVE-2024-481xx/CVE-2024-48144.json) (`2024-10-24T19:15:15.510`)
|
||||
- [CVE-2024-48145](CVE-2024/CVE-2024-481xx/CVE-2024-48145.json) (`2024-10-24T19:15:15.607`)
|
||||
- [CVE-2024-48427](CVE-2024/CVE-2024-484xx/CVE-2024-48427.json) (`2024-10-24T19:15:15.703`)
|
||||
- [CVE-2024-48440](CVE-2024/CVE-2024-484xx/CVE-2024-48440.json) (`2024-10-24T18:15:09.190`)
|
||||
- [CVE-2024-48441](CVE-2024/CVE-2024-484xx/CVE-2024-48441.json) (`2024-10-24T18:15:09.583`)
|
||||
- [CVE-2024-48442](CVE-2024/CVE-2024-484xx/CVE-2024-48442.json) (`2024-10-24T18:15:09.890`)
|
||||
- [CVE-2024-48454](CVE-2024/CVE-2024-484xx/CVE-2024-48454.json) (`2024-10-24T19:15:15.803`)
|
||||
- [CVE-2024-48514](CVE-2024/CVE-2024-485xx/CVE-2024-48514.json) (`2024-10-24T18:15:10.227`)
|
||||
- [CVE-2024-10327](CVE-2024/CVE-2024-103xx/CVE-2024-10327.json) (`2024-10-24T21:15:11.730`)
|
||||
- [CVE-2024-45242](CVE-2024/CVE-2024-452xx/CVE-2024-45242.json) (`2024-10-24T20:15:04.243`)
|
||||
- [CVE-2024-45259](CVE-2024/CVE-2024-452xx/CVE-2024-45259.json) (`2024-10-24T20:15:04.323`)
|
||||
- [CVE-2024-45260](CVE-2024/CVE-2024-452xx/CVE-2024-45260.json) (`2024-10-24T21:15:11.977`)
|
||||
- [CVE-2024-45261](CVE-2024/CVE-2024-452xx/CVE-2024-45261.json) (`2024-10-24T21:15:12.057`)
|
||||
- [CVE-2024-45262](CVE-2024/CVE-2024-452xx/CVE-2024-45262.json) (`2024-10-24T21:15:12.143`)
|
||||
- [CVE-2024-45263](CVE-2024/CVE-2024-452xx/CVE-2024-45263.json) (`2024-10-24T21:15:12.217`)
|
||||
- [CVE-2024-47878](CVE-2024/CVE-2024-478xx/CVE-2024-47878.json) (`2024-10-24T21:15:12.293`)
|
||||
- [CVE-2024-47879](CVE-2024/CVE-2024-478xx/CVE-2024-47879.json) (`2024-10-24T21:15:12.523`)
|
||||
- [CVE-2024-47880](CVE-2024/CVE-2024-478xx/CVE-2024-47880.json) (`2024-10-24T21:15:12.750`)
|
||||
- [CVE-2024-47881](CVE-2024/CVE-2024-478xx/CVE-2024-47881.json) (`2024-10-24T21:15:12.957`)
|
||||
- [CVE-2024-47882](CVE-2024/CVE-2024-478xx/CVE-2024-47882.json) (`2024-10-24T21:15:13.160`)
|
||||
- [CVE-2024-47883](CVE-2024/CVE-2024-478xx/CVE-2024-47883.json) (`2024-10-24T21:15:13.430`)
|
||||
- [CVE-2024-48208](CVE-2024/CVE-2024-482xx/CVE-2024-48208.json) (`2024-10-24T21:15:14.040`)
|
||||
- [CVE-2024-48423](CVE-2024/CVE-2024-484xx/CVE-2024-48423.json) (`2024-10-24T21:15:14.143`)
|
||||
- [CVE-2024-48424](CVE-2024/CVE-2024-484xx/CVE-2024-48424.json) (`2024-10-24T21:15:14.223`)
|
||||
- [CVE-2024-48425](CVE-2024/CVE-2024-484xx/CVE-2024-48425.json) (`2024-10-24T21:15:14.303`)
|
||||
- [CVE-2024-48426](CVE-2024/CVE-2024-484xx/CVE-2024-48426.json) (`2024-10-24T21:15:14.387`)
|
||||
- [CVE-2024-48931](CVE-2024/CVE-2024-489xx/CVE-2024-48931.json) (`2024-10-24T21:15:14.580`)
|
||||
- [CVE-2024-48932](CVE-2024/CVE-2024-489xx/CVE-2024-48932.json) (`2024-10-24T21:15:14.790`)
|
||||
- [CVE-2024-7763](CVE-2024/CVE-2024-77xx/CVE-2024-7763.json) (`2024-10-24T21:15:15.033`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `63`
|
||||
Recently modified CVEs: `32`
|
||||
|
||||
- [CVE-2024-3727](CVE-2024/CVE-2024-37xx/CVE-2024-3727.json) (`2024-10-24T18:15:08.177`)
|
||||
- [CVE-2024-40431](CVE-2024/CVE-2024-404xx/CVE-2024-40431.json) (`2024-10-24T18:35:07.010`)
|
||||
- [CVE-2024-44141](CVE-2024/CVE-2024-441xx/CVE-2024-44141.json) (`2024-10-24T18:35:07.340`)
|
||||
- [CVE-2024-46257](CVE-2024/CVE-2024-462xx/CVE-2024-46257.json) (`2024-10-24T18:15:08.617`)
|
||||
- [CVE-2024-47575](CVE-2024/CVE-2024-475xx/CVE-2024-47575.json) (`2024-10-24T18:56:47.930`)
|
||||
- [CVE-2024-48541](CVE-2024/CVE-2024-485xx/CVE-2024-48541.json) (`2024-10-24T19:35:04.263`)
|
||||
- [CVE-2024-48542](CVE-2024/CVE-2024-485xx/CVE-2024-48542.json) (`2024-10-24T19:35:05.013`)
|
||||
- [CVE-2024-48545](CVE-2024/CVE-2024-485xx/CVE-2024-48545.json) (`2024-10-24T19:35:05.767`)
|
||||
- [CVE-2024-48546](CVE-2024/CVE-2024-485xx/CVE-2024-48546.json) (`2024-10-24T19:35:06.563`)
|
||||
- [CVE-2024-48547](CVE-2024/CVE-2024-485xx/CVE-2024-48547.json) (`2024-10-24T19:35:07.320`)
|
||||
- [CVE-2024-49863](CVE-2024/CVE-2024-498xx/CVE-2024-49863.json) (`2024-10-24T19:43:56.103`)
|
||||
- [CVE-2024-49876](CVE-2024/CVE-2024-498xx/CVE-2024-49876.json) (`2024-10-24T19:57:06.843`)
|
||||
- [CVE-2024-49877](CVE-2024/CVE-2024-498xx/CVE-2024-49877.json) (`2024-10-24T19:58:55.383`)
|
||||
- [CVE-2024-49879](CVE-2024/CVE-2024-498xx/CVE-2024-49879.json) (`2024-10-24T19:59:12.897`)
|
||||
- [CVE-2024-49923](CVE-2024/CVE-2024-499xx/CVE-2024-49923.json) (`2024-10-24T19:43:27.327`)
|
||||
- [CVE-2024-50033](CVE-2024/CVE-2024-500xx/CVE-2024-50033.json) (`2024-10-24T19:56:04.097`)
|
||||
- [CVE-2024-50034](CVE-2024/CVE-2024-500xx/CVE-2024-50034.json) (`2024-10-24T19:56:29.170`)
|
||||
- [CVE-2024-50035](CVE-2024/CVE-2024-500xx/CVE-2024-50035.json) (`2024-10-24T19:54:01.987`)
|
||||
- [CVE-2024-50041](CVE-2024/CVE-2024-500xx/CVE-2024-50041.json) (`2024-10-24T19:31:39.373`)
|
||||
- [CVE-2024-50043](CVE-2024/CVE-2024-500xx/CVE-2024-50043.json) (`2024-10-24T19:32:21.480`)
|
||||
- [CVE-2024-50044](CVE-2024/CVE-2024-500xx/CVE-2024-50044.json) (`2024-10-24T19:36:12.717`)
|
||||
- [CVE-2024-50045](CVE-2024/CVE-2024-500xx/CVE-2024-50045.json) (`2024-10-24T19:38:03.343`)
|
||||
- [CVE-2024-50046](CVE-2024/CVE-2024-500xx/CVE-2024-50046.json) (`2024-10-24T18:59:55.950`)
|
||||
- [CVE-2024-50050](CVE-2024/CVE-2024-500xx/CVE-2024-50050.json) (`2024-10-24T19:35:08.107`)
|
||||
- [CVE-2024-5206](CVE-2024/CVE-2024-52xx/CVE-2024-5206.json) (`2024-10-24T19:48:31.637`)
|
||||
- [CVE-2024-21687](CVE-2024/CVE-2024-216xx/CVE-2024-21687.json) (`2024-10-24T20:35:05.307`)
|
||||
- [CVE-2024-34734](CVE-2024/CVE-2024-347xx/CVE-2024-34734.json) (`2024-10-24T20:35:05.433`)
|
||||
- [CVE-2024-36130](CVE-2024/CVE-2024-361xx/CVE-2024-36130.json) (`2024-10-24T20:35:06.217`)
|
||||
- [CVE-2024-36877](CVE-2024/CVE-2024-368xx/CVE-2024-36877.json) (`2024-10-24T20:35:06.353`)
|
||||
- [CVE-2024-40531](CVE-2024/CVE-2024-405xx/CVE-2024-40531.json) (`2024-10-24T20:35:06.753`)
|
||||
- [CVE-2024-41250](CVE-2024/CVE-2024-412xx/CVE-2024-41250.json) (`2024-10-24T20:35:06.947`)
|
||||
- [CVE-2024-41251](CVE-2024/CVE-2024-412xx/CVE-2024-41251.json) (`2024-10-24T20:35:07.133`)
|
||||
- [CVE-2024-42815](CVE-2024/CVE-2024-428xx/CVE-2024-42815.json) (`2024-10-24T20:35:07.330`)
|
||||
- [CVE-2024-42966](CVE-2024/CVE-2024-429xx/CVE-2024-42966.json) (`2024-10-24T20:35:08.087`)
|
||||
- [CVE-2024-42977](CVE-2024/CVE-2024-429xx/CVE-2024-42977.json) (`2024-10-24T20:35:08.860`)
|
||||
- [CVE-2024-42986](CVE-2024/CVE-2024-429xx/CVE-2024-42986.json) (`2024-10-24T20:35:09.653`)
|
||||
- [CVE-2024-48454](CVE-2024/CVE-2024-484xx/CVE-2024-48454.json) (`2024-10-24T21:35:05.410`)
|
||||
- [CVE-2024-48538](CVE-2024/CVE-2024-485xx/CVE-2024-48538.json) (`2024-10-24T20:35:10.890`)
|
||||
- [CVE-2024-48539](CVE-2024/CVE-2024-485xx/CVE-2024-48539.json) (`2024-10-24T20:35:11.713`)
|
||||
- [CVE-2024-48544](CVE-2024/CVE-2024-485xx/CVE-2024-48544.json) (`2024-10-24T21:35:06.263`)
|
||||
- [CVE-2024-48548](CVE-2024/CVE-2024-485xx/CVE-2024-48548.json) (`2024-10-24T21:35:07.050`)
|
||||
- [CVE-2024-49869](CVE-2024/CVE-2024-498xx/CVE-2024-49869.json) (`2024-10-24T20:28:21.597`)
|
||||
- [CVE-2024-49871](CVE-2024/CVE-2024-498xx/CVE-2024-49871.json) (`2024-10-24T20:22:19.530`)
|
||||
- [CVE-2024-49873](CVE-2024/CVE-2024-498xx/CVE-2024-49873.json) (`2024-10-24T20:22:42.387`)
|
||||
- [CVE-2024-49874](CVE-2024/CVE-2024-498xx/CVE-2024-49874.json) (`2024-10-24T20:27:51.700`)
|
||||
- [CVE-2024-49875](CVE-2024/CVE-2024-498xx/CVE-2024-49875.json) (`2024-10-24T20:13:50.927`)
|
||||
- [CVE-2024-50382](CVE-2024/CVE-2024-503xx/CVE-2024-50382.json) (`2024-10-24T20:35:12.650`)
|
||||
- [CVE-2024-50383](CVE-2024/CVE-2024-503xx/CVE-2024-50383.json) (`2024-10-24T20:35:13.417`)
|
||||
- [CVE-2024-7535](CVE-2024/CVE-2024-75xx/CVE-2024-7535.json) (`2024-10-24T20:35:14.177`)
|
||||
- [CVE-2024-7973](CVE-2024/CVE-2024-79xx/CVE-2024-7973.json) (`2024-10-24T20:35:14.967`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
257
_state.csv
257
_state.csv
@ -166543,7 +166543,7 @@ CVE-2021-2019,0,0,c2fe290beda99097f5af950e201b3cf3c32a2eafc405e8b574e7ef8ffeede0
|
||||
CVE-2021-20190,0,0,d2a8ac28104325dedcd0c87eded18a9574d175e48753331ead04a44d2bda47d0,2023-11-07T03:28:59.363000
|
||||
CVE-2021-20191,0,0,8658ab2c479f565f855ecc101f68d9f5292be58ee1512085fe01387f35c89d78,2023-12-28T19:15:12.460000
|
||||
CVE-2021-20192,0,0,3dd8be816a8dc6c137adf1504c8646a23863e79bd887c70954eb2bc7f2280695,2023-11-07T03:28:59.460000
|
||||
CVE-2021-20193,0,1,3e3cf18e7000b6cb7f5439046326d8cb2606b66a11db2d415c8beefc917a97b0,2024-10-24T18:15:14.167000
|
||||
CVE-2021-20193,0,0,3e3cf18e7000b6cb7f5439046326d8cb2606b66a11db2d415c8beefc917a97b0,2024-10-24T18:15:14.167000
|
||||
CVE-2021-20194,0,0,76270653c30089eb381a4aad399b3282136badba7d5b2c69bb6e812746cd2765,2023-02-12T22:15:16.563000
|
||||
CVE-2021-20195,0,0,4ee77b9328d95dff9be6e18003cc5fceadbdb127bccc3a2835319150f0cc6bf8,2022-08-05T15:21:13.307000
|
||||
CVE-2021-20196,0,0,db1eae87c55f404199c52b091d78744dd8b805a4d21844de7a0eb80d7b2d633d,2023-02-12T22:15:16.717000
|
||||
@ -208929,7 +208929,7 @@ CVE-2022-43697,0,0,686896906763250874b16d5ab0c4c6c9de8102038fc6500dd580314ffa3b4
|
||||
CVE-2022-43698,0,0,86648de9a3b9cddadd560e0414759c5c112333ec5a9b33030e1cfeeeda7cfaf5,2023-05-15T19:27:09.167000
|
||||
CVE-2022-43699,0,0,a3e68481c8e86891832fdc60b1fc21c2f076950a8075ae1b88211a1d0c48ffc1,2023-04-24T19:46:49.317000
|
||||
CVE-2022-4370,0,0,21e2b08860aeacd5f81650f3feefc307848c743c02a091180993201ae7aeaafc,2023-11-07T03:57:40.473000
|
||||
CVE-2022-43701,0,1,ff7eb56d7ec8625eb0aac7c8283a7142763321b82a88c440976e64f53685f693,2024-10-24T18:35:01.700000
|
||||
CVE-2022-43701,0,0,ff7eb56d7ec8625eb0aac7c8283a7142763321b82a88c440976e64f53685f693,2024-10-24T18:35:01.700000
|
||||
CVE-2022-43702,0,0,9c868191de040381101d2f471e797f332c090e7c70bd985613d0f3d2b84d56fc,2024-02-13T20:15:51.373000
|
||||
CVE-2022-43703,0,0,298ecbf048f181c8ab59c3a4fa8a669dfea7813a0f682c5d610b3cec4bfbe5a8,2024-02-13T20:15:51.457000
|
||||
CVE-2022-43704,0,0,4b8a50994e6868c3dec07c015a4af22d97eae7e777cfe2c1b8ae11b7877b17c3,2023-01-27T15:05:28.433000
|
||||
@ -212565,18 +212565,18 @@ CVE-2022-48950,0,0,df7cdcc43adc0fe4790bfeee6795f91b28a4c15b10566f630a78891552ade
|
||||
CVE-2022-48951,0,0,ba9d8cef5379b0ff4a935922614acdd38174cd969734d165c8703c7601b1f6a8,2024-10-23T15:13:25.583000
|
||||
CVE-2022-48952,0,0,cf21a0255246b5b3ab6d95e6ea99d72bc42c2b56c4888d478133ad8ae4632324,2024-10-23T15:13:25.583000
|
||||
CVE-2022-48953,0,0,037e26b090bc3b5c06ab9dffbf7de850a858e5fc3604925c0be082d71471c418,2024-10-23T15:13:25.583000
|
||||
CVE-2022-48954,0,1,739575e3093a499b0052cdcdfb603ce436f9aa9028374fc974a8acd1648a7210,2024-10-24T19:57:39
|
||||
CVE-2022-48955,0,1,86162b259bd0edabf491f8d7ac9901887414111ced735b0c7ce8d9a40e920beb,2024-10-24T19:58:17.230000
|
||||
CVE-2022-48956,0,1,7b71de397ebb97c317a78adf75e7c6d21e7a987b6ee245bfd5c45d538640e7d3,2024-10-24T19:59:47.737000
|
||||
CVE-2022-48954,0,0,739575e3093a499b0052cdcdfb603ce436f9aa9028374fc974a8acd1648a7210,2024-10-24T19:57:39
|
||||
CVE-2022-48955,0,0,86162b259bd0edabf491f8d7ac9901887414111ced735b0c7ce8d9a40e920beb,2024-10-24T19:58:17.230000
|
||||
CVE-2022-48956,0,0,7b71de397ebb97c317a78adf75e7c6d21e7a987b6ee245bfd5c45d538640e7d3,2024-10-24T19:59:47.737000
|
||||
CVE-2022-48957,0,0,b7e09cd0df5d0a3d101f25f751f05c8c173e31e135a7f732ca112404e9035b67,2024-10-24T14:41:15.423000
|
||||
CVE-2022-48958,0,0,64a1b4825cb7fe46a7f91cfb2ea852904955b0ccb818b0aff987ae8d6445afa5,2024-10-23T15:13:25.583000
|
||||
CVE-2022-48959,0,1,88128a4f0643312be4e2e4a9aa6240bb58f1815b805dfae61f1720ba8689fdcb,2024-10-24T19:23:49.373000
|
||||
CVE-2022-48958,0,1,4182df9899f38a81befcfb4c79a73d7adc9622574acd654f938dddef6cf02389,2024-10-24T20:00:34.033000
|
||||
CVE-2022-48959,0,0,88128a4f0643312be4e2e4a9aa6240bb58f1815b805dfae61f1720ba8689fdcb,2024-10-24T19:23:49.373000
|
||||
CVE-2022-4896,0,0,04cb60ab8732a1bfba8bf7d8a4df08b8371cdecc380fd455d1b928e8213822e1,2023-09-15T15:18:10.843000
|
||||
CVE-2022-48960,0,1,306ba4d096a9e7e54cbf14e13ef7e723aedf0c00b16364be4ce75c8355664d3f,2024-10-24T19:24:43.627000
|
||||
CVE-2022-48961,0,0,9079782a53ac6f878f46ee5a7bd8c6d64ab25ec3e859504aac9ecda2b190e0a9,2024-10-23T15:13:25.583000
|
||||
CVE-2022-48962,0,1,3e9352cb14da09460dabd4c4ed0ebf1fe375e3760484bb430b88096f74fb87ff,2024-10-24T19:27:13.900000
|
||||
CVE-2022-48963,0,1,2cc67ac27a70e3eaf4305fbb0c71925d0a7c77e13764203ad9a8a86e3f22ee89,2024-10-24T19:27:58.603000
|
||||
CVE-2022-48964,0,1,13bd5cdda7ac4f5878a520e8c12bce36b9b8e913c0c74c77b4e8a6c22e52198f,2024-10-24T19:28:48.867000
|
||||
CVE-2022-48960,0,0,306ba4d096a9e7e54cbf14e13ef7e723aedf0c00b16364be4ce75c8355664d3f,2024-10-24T19:24:43.627000
|
||||
CVE-2022-48961,0,1,74d18016dfde0cb8a0047a37ab2c07bf8c19a292b832e4231d1a582e5692395c,2024-10-24T20:02:22.347000
|
||||
CVE-2022-48962,0,0,3e9352cb14da09460dabd4c4ed0ebf1fe375e3760484bb430b88096f74fb87ff,2024-10-24T19:27:13.900000
|
||||
CVE-2022-48963,0,0,2cc67ac27a70e3eaf4305fbb0c71925d0a7c77e13764203ad9a8a86e3f22ee89,2024-10-24T19:27:58.603000
|
||||
CVE-2022-48964,0,0,13bd5cdda7ac4f5878a520e8c12bce36b9b8e913c0c74c77b4e8a6c22e52198f,2024-10-24T19:28:48.867000
|
||||
CVE-2022-48965,0,0,5c2d1d54d8b3c46630fcded2c16f38c7fffd2383699aeb72a69572ed1749a87e,2024-10-23T15:13:25.583000
|
||||
CVE-2022-48966,0,0,7b5ea2cdb27342c6837b1d63b8ed702b4c34ea924734529cc736266041c3d692,2024-10-23T15:13:25.583000
|
||||
CVE-2022-48967,0,0,9a4dff8791ae44e4087bbdddb5fbc68f8736e971375d2e967fe26661594f6b57,2024-10-23T15:13:25.583000
|
||||
@ -212625,22 +212625,22 @@ CVE-2022-49005,0,0,996bcc00649f5f4d6806dab3ae223e12d9b68c5372e06c85334c63daf1a1a
|
||||
CVE-2022-49006,0,0,11e74bb0eed70588405216f8164bddc6145e3f7d92995a8a649678fb341b062c,2024-10-23T15:13:25.583000
|
||||
CVE-2022-49007,0,0,d8181ccdf2d774c95472fe77412f5c5f6b4c10d6c0a508bc04c802e0d59cc425,2024-10-23T15:13:25.583000
|
||||
CVE-2022-49008,0,0,858dc4a8a05732b95c403be0591a3fe4ca899c97593a1ac4eca126dfe89df3b4,2024-10-23T15:13:25.583000
|
||||
CVE-2022-49009,0,1,bd4572466d1414f52fbe7936b1a0c728ae05c93f9a35a8642cb3c09affa0841c,2024-10-24T18:59:25.877000
|
||||
CVE-2022-49009,0,0,bd4572466d1414f52fbe7936b1a0c728ae05c93f9a35a8642cb3c09affa0841c,2024-10-24T18:59:25.877000
|
||||
CVE-2022-4901,0,0,b216b364f33ab0ef7a0c7606c08559e2c099c064cab5e2ac5756fa24252b7a04,2023-03-09T01:06:23.703000
|
||||
CVE-2022-49010,0,1,d80576c7b56f00013ea7b7dc864a80d590c14a16de91c0b1fdc858f0c8ef5805,2024-10-24T19:03:50.847000
|
||||
CVE-2022-49011,0,1,599b28539b8e427f24e26f370e4a82372844dcaf9874238111619d456f6deff5,2024-10-24T19:01:47.513000
|
||||
CVE-2022-49012,0,1,c7f131c8a5ce582750cf22f237762a39b122200ff928897e73148ae98ccfd3ae,2024-10-24T19:07:46.193000
|
||||
CVE-2022-49013,0,1,44aaf107cfeec645dd34f52f0cd065b9499e789ec820d67b73614f086e7af59b,2024-10-24T19:09:30.677000
|
||||
CVE-2022-49014,0,1,578af6a0495c8c75967a8dfd95a15b35f965fe7a5668f9b6fbf3061b11b875bf,2024-10-24T18:29:23.407000
|
||||
CVE-2022-49015,0,1,362e9ebd4f952db666a5cf7b235271e1730ba231d19e1a877c82c9ab348361bb,2024-10-24T18:31:54.943000
|
||||
CVE-2022-49016,0,1,c1d9958f2bd8f84adc504d3a1280ec26573c2ebb3355642f1cbe6170b0e41127,2024-10-24T18:35:01.597000
|
||||
CVE-2022-49017,0,1,854114d469a6f0821cf36adf0bc76d655074aeb2472ed60acd8104bc233f489e,2024-10-24T18:36:13.233000
|
||||
CVE-2022-49018,0,1,3f1b2cc632016094ee9af7738f5b2a34861f719ead535be5133fc7f41ee9348d,2024-10-24T18:38:38.033000
|
||||
CVE-2022-49019,0,1,5c0cc209de7b277a9f730293250f0e61a5ef16c4c75dfb71b519c0273182aba2,2024-10-24T18:43:50.413000
|
||||
CVE-2022-49010,0,0,d80576c7b56f00013ea7b7dc864a80d590c14a16de91c0b1fdc858f0c8ef5805,2024-10-24T19:03:50.847000
|
||||
CVE-2022-49011,0,0,599b28539b8e427f24e26f370e4a82372844dcaf9874238111619d456f6deff5,2024-10-24T19:01:47.513000
|
||||
CVE-2022-49012,0,0,c7f131c8a5ce582750cf22f237762a39b122200ff928897e73148ae98ccfd3ae,2024-10-24T19:07:46.193000
|
||||
CVE-2022-49013,0,0,44aaf107cfeec645dd34f52f0cd065b9499e789ec820d67b73614f086e7af59b,2024-10-24T19:09:30.677000
|
||||
CVE-2022-49014,0,0,578af6a0495c8c75967a8dfd95a15b35f965fe7a5668f9b6fbf3061b11b875bf,2024-10-24T18:29:23.407000
|
||||
CVE-2022-49015,0,0,362e9ebd4f952db666a5cf7b235271e1730ba231d19e1a877c82c9ab348361bb,2024-10-24T18:31:54.943000
|
||||
CVE-2022-49016,0,0,c1d9958f2bd8f84adc504d3a1280ec26573c2ebb3355642f1cbe6170b0e41127,2024-10-24T18:35:01.597000
|
||||
CVE-2022-49017,0,0,854114d469a6f0821cf36adf0bc76d655074aeb2472ed60acd8104bc233f489e,2024-10-24T18:36:13.233000
|
||||
CVE-2022-49018,0,0,3f1b2cc632016094ee9af7738f5b2a34861f719ead535be5133fc7f41ee9348d,2024-10-24T18:38:38.033000
|
||||
CVE-2022-49019,0,0,5c0cc209de7b277a9f730293250f0e61a5ef16c4c75dfb71b519c0273182aba2,2024-10-24T18:43:50.413000
|
||||
CVE-2022-4902,0,0,287e358bd6e692608595d8f35e480fa1fc0a17dda86b7a57dcb446074ab1fd22,2024-05-17T02:17:02.280000
|
||||
CVE-2022-49020,0,1,f909ba59e6e38da2e0c04e27bc86f983845d877b769100ad0347ac8d59e90616,2024-10-24T18:43:20.887000
|
||||
CVE-2022-49021,0,1,7abf5de0439d79af2db36a4427bee3124c6a1194b3d8cb96c822cec62146005d,2024-10-24T18:44:24.567000
|
||||
CVE-2022-49022,0,1,7916fb2a9efb7b7197f996804cc94d2927bd3fc41af2ccb83d88860d15a94534,2024-10-24T18:48:52.560000
|
||||
CVE-2022-49020,0,0,f909ba59e6e38da2e0c04e27bc86f983845d877b769100ad0347ac8d59e90616,2024-10-24T18:43:20.887000
|
||||
CVE-2022-49021,0,0,7abf5de0439d79af2db36a4427bee3124c6a1194b3d8cb96c822cec62146005d,2024-10-24T18:44:24.567000
|
||||
CVE-2022-49022,0,0,7916fb2a9efb7b7197f996804cc94d2927bd3fc41af2ccb83d88860d15a94534,2024-10-24T18:48:52.560000
|
||||
CVE-2022-49023,0,0,0735ff18caf8246b03c79c33b83cf62d783640bfd0713348e2d4e58370c405b0,2024-10-24T03:50:29.357000
|
||||
CVE-2022-49024,0,0,c66f01f2c8a41a2a22849da074498e2a47f55851811c1bb200d8ff998c2a459a,2024-10-24T03:50:03.797000
|
||||
CVE-2022-49025,0,0,74891ed957efad34f677418cab3fc02558af109bc31094684e4f71f7e513262c,2024-10-24T03:49:31.117000
|
||||
@ -212649,7 +212649,7 @@ CVE-2022-49027,0,0,08617aba8accba8d40c33a2dd9323ed07c4a53388d9fcae1554c4898c8121
|
||||
CVE-2022-49028,0,0,151442faeff9b14d8ce2ae4c9a4c94db2834ff9ccfc2de89b8fd58ca69c8cc70,2024-10-24T15:51:45.197000
|
||||
CVE-2022-49029,0,0,bc3565ae22eee1b819f7f608c3234a9c6a391de68ad397b4af9e7a0668ef7d9d,2024-10-24T15:59:48.417000
|
||||
CVE-2022-4903,0,0,cf9430f75554b10fc3063c2d4e895e2575b24650a7af1dc91ee51937fe80926d,2024-05-17T02:17:02.397000
|
||||
CVE-2022-49030,0,1,904b99924e5bfabd402744e1f2641368862a3c302dd16691ee4dde25d15ff21f,2024-10-24T18:42:07.703000
|
||||
CVE-2022-49030,0,0,904b99924e5bfabd402744e1f2641368862a3c302dd16691ee4dde25d15ff21f,2024-10-24T18:42:07.703000
|
||||
CVE-2022-49031,0,0,27b7324be957657ebfe2fa70a41fdfbee66b5d1a8d8879fc8bbe3b24c5b9c3f7,2024-10-24T16:03:12.907000
|
||||
CVE-2022-49032,0,0,efe71c7b59c43b9d0e289b0876c4b1896d076c1fbbeb41a201c57f837f1793c0,2024-10-24T16:04:49.880000
|
||||
CVE-2022-49033,0,0,f1525e73208fdc16ccb4e511516019213374c129e7ea61503d159b482ea92060,2024-10-23T15:12:34.673000
|
||||
@ -222796,7 +222796,7 @@ CVE-2023-29923,0,0,b33b23e61e562dc83c6e5f1776c1773a4cd87c91904480151748ca1d7d3db
|
||||
CVE-2023-29924,0,0,2ccc0584144c29564d1fa45d30873eda11c23ddf1e798e28992e89d0b774a992,2023-04-28T03:47:31.073000
|
||||
CVE-2023-29926,0,0,9225094d01fee3ffa7bc831fb1f80da9744a24dd565cc13e21927794981302ba,2023-04-28T03:48:49.887000
|
||||
CVE-2023-29927,0,0,9e8a9e15293311c93fbe723ab56ed0471994959c871514d4222963584fadee8d,2023-05-25T16:05:07.423000
|
||||
CVE-2023-29929,0,0,c4b7c8db7151fa57c0c0242b0a906c7d8eab412a4479e9c2d1bd3d305adc2920,2024-08-22T21:15:15.840000
|
||||
CVE-2023-29929,0,1,6f2f8abf6aeedfd5cac3854fce64a85cdbc520801b8f2ffbd3979521bcd9ccd5,2024-10-24T20:35:02.040000
|
||||
CVE-2023-2993,0,0,d44c9fbb84d48f2f2e04efcd22910452a7ca1db8b85f5163ca6dff6f458b6b41,2023-07-05T17:30:11.073000
|
||||
CVE-2023-29930,0,0,1d6d963e7d9226c0bd795ab7eb7ac30c93bd3ab4c90e9f87c9c6ddc10964c899,2023-05-24T13:50:58.667000
|
||||
CVE-2023-29931,0,0,4072247749c61f868b116869af506293a452ef82a75e1183fa4bb269840f61e7,2023-06-29T18:17:31.473000
|
||||
@ -229069,8 +229069,8 @@ CVE-2023-38330,0,0,b11b8311a56bc5c17f1fe686168a5a3db032ce08d438e4c5a2dffd1a1d730
|
||||
CVE-2023-38331,0,0,7adf2751ba17cd1de1ffb6db6153690ae0959f213d375c3f0b6f8984c63016b2,2023-08-03T14:04:00.513000
|
||||
CVE-2023-38332,0,0,e95a36d3dce855564a1d07d4ecd697bc91781b7e03ef51934460306e7db83fb5,2023-08-09T17:13:24.760000
|
||||
CVE-2023-38333,0,0,54189fbdb51ca920edb02fcd8a50bd8033eb837bf070c984cf975ab78207d49f,2023-08-15T19:57:13.227000
|
||||
CVE-2023-38334,0,0,01dd551fb6895c67930679c9cec3f0a5f61fa8a322b90de949bee81d70ac3f1e,2023-07-31T18:42:53.743000
|
||||
CVE-2023-38335,0,0,d473c72c16cf555bc131e99be56f25a47b8e1af3b2e36819a84c87e6b8ab373e,2023-07-31T18:42:46.760000
|
||||
CVE-2023-38334,0,1,e6ae68becd7817f442354911f9642a20ef01d0c1d9ec40e4847d4a0bc96ea63f,2024-10-24T21:35:02.113000
|
||||
CVE-2023-38335,0,1,5d0833ce00b493e720d1adb6ca16176c7f99498655258ff431cc5847064b5075,2024-10-24T21:35:04.503000
|
||||
CVE-2023-38336,0,0,43fdd10d8ccba2af679e7c7c5fa3793c85bc46c5094c33aa3e80000cce1b5f4c,2023-07-27T03:22:54.967000
|
||||
CVE-2023-38337,0,0,f4c79ade4dd8bc46340daddde44bf3d0768b2f1f21fc874630a9ca34158f8667,2023-07-27T03:23:39.037000
|
||||
CVE-2023-3834,0,0,79f59e2e98a9edb2bce976eba92b3e888a255a070425958fd0ee797e6d1975cb,2024-05-17T02:27:51.830000
|
||||
@ -229294,7 +229294,7 @@ CVE-2023-38562,0,0,127d1a2b630856d5538c1ca38a31578c3089871c39c5f3a8684c910dd7a42
|
||||
CVE-2023-38563,0,0,cd5653006ddb237fe74acb1487f8018dcc309b748db7c43e87d0e1655d65393a,2023-09-11T13:39:23.730000
|
||||
CVE-2023-38564,0,0,b6614995561f59800bbe304c9a4bb6f0df0678257f2d10dccc98201621f1d3d9,2023-08-03T16:48:13.720000
|
||||
CVE-2023-38565,0,0,149d8b68307130cd8b5fad99ef6f47e115e292c7805ed5f155c2ac1a686f799e,2023-08-03T16:42:43.680000
|
||||
CVE-2023-38566,0,1,b9e80dde1f400d3627e1e34a307490af49781464f00fb20fe903b4baaf1e192f,2024-10-24T19:14:10.307000
|
||||
CVE-2023-38566,0,0,b9e80dde1f400d3627e1e34a307490af49781464f00fb20fe903b4baaf1e192f,2024-10-24T19:14:10.307000
|
||||
CVE-2023-38568,0,0,fe3006418b3150234fc6bb5ea0ab250bf9ebe277e16313987e9ddcf20bb4bb1b,2023-09-11T13:39:55.610000
|
||||
CVE-2023-38569,0,0,e2c03e6bc874a9668ba615ef460a626240bf2f5be648e4d4af24f747a77bb59d,2023-09-08T16:47:59.860000
|
||||
CVE-2023-3857,0,0,f764245d305ac578d0764cadf8c08c7c2c58efa3cea28d80654e277802d84d75,2024-05-17T02:27:54.180000
|
||||
@ -229977,7 +229977,7 @@ CVE-2023-39427,0,0,bc7e52ed8676d0287ba324301b50627a151b43fb5cd244be9fa42525dbdfd
|
||||
CVE-2023-39429,0,0,e45d5f249dbba37b2a0f500dde0eaa26a84ef98250d6082bd2805021c83d4156,2023-10-04T17:08:58.890000
|
||||
CVE-2023-3943,0,0,3bfea338ff2ecfcf77a5fa067300607a2b70e9f53e16468b7b1451e54df83026,2024-05-21T16:54:26.047000
|
||||
CVE-2023-39431,0,0,26cadede41c2c3cb84c880d51209fee4b6934336388976525c85faa63e994ed0,2023-10-25T13:50:25.650000
|
||||
CVE-2023-39432,0,1,041ac297269e9be2639d7ad5add979739e1837b348d5cab6c1b9d11b46590240,2024-10-24T19:13:32.777000
|
||||
CVE-2023-39432,0,0,041ac297269e9be2639d7ad5add979739e1837b348d5cab6c1b9d11b46590240,2024-10-24T19:13:32.777000
|
||||
CVE-2023-39433,0,0,f891132ba414524367ca6e5b3376c4fd3194df781c7ccd69c825a121a915823e,2024-05-17T18:36:05.263000
|
||||
CVE-2023-39434,0,0,bc693e7754388058b19485a72219b0597d4d79b71ecc558e086fe03a669881fc,2024-01-31T15:15:09.663000
|
||||
CVE-2023-39435,0,0,2cde1591acdec05b9dded1c5b5ca1d20ab1200f3c8779b480c0f389d969c7be2,2024-08-02T18:16:11.260000
|
||||
@ -230288,14 +230288,14 @@ CVE-2023-39928,0,0,91282e780c029bca5230571e26da05cea4f7f8bbaeff21c9d74ff4f370d1c
|
||||
CVE-2023-39929,0,0,9ee055206e5132be81815049aebeff6d468d3e81abaeb697797813c03df4adb1,2024-05-17T18:36:05.263000
|
||||
CVE-2023-3993,0,0,6a4502fc730b10244b2a5f12fef2d075a1d38a2dac53ba48d1dcf3cdcda08ad9,2024-10-03T07:15:17.247000
|
||||
CVE-2023-39930,0,0,d750d5de68ec1cde9c7f725fc00c339d92094ec5ff393b14c4e64987eda9f87a,2023-10-31T18:10:51.270000
|
||||
CVE-2023-39932,0,1,12634c5c9ef0cff268f86e10b0c67410af36a28d1b513a74ce59753107a369e3,2024-10-24T19:04:48.510000
|
||||
CVE-2023-39932,0,0,12634c5c9ef0cff268f86e10b0c67410af36a28d1b513a74ce59753107a369e3,2024-10-24T19:04:48.510000
|
||||
CVE-2023-39933,0,0,1a0ab502e85598b40e7e961fd8e000415def9edc0b9351c41ae3d4f4e819b315,2024-03-18T01:53:02.353000
|
||||
CVE-2023-39935,0,0,e7273cf6b42db016c2234872a9e6b2af9325c39c0fbeec800f945c24cae29ab6,2023-09-11T13:41:11.193000
|
||||
CVE-2023-39936,0,0,c91849e55c7a55e36d3d0035f9880ed7b3b78132a705018d93999265c90b8b67,2023-11-06T18:13:06.433000
|
||||
CVE-2023-39938,0,0,b7f60caca70de06cad432a98ecc140601aca695ee4a3c25c4662905e139bf0e3,2023-09-08T18:45:56.717000
|
||||
CVE-2023-39939,0,0,4965016f7617cd5b3490ccc0805310c4ec2bb5245820676f8b5e01f5a194480e,2023-08-25T16:08:34.140000
|
||||
CVE-2023-3994,0,0,1b2340bec7f9a348a26613e1fc8a292c8b2aaa50d40e47a84eecd8c9324f6268,2024-10-03T07:15:17.590000
|
||||
CVE-2023-39941,0,1,7a7b0ebde101066406c8606dcd2e5bcb0d5dda26a40ce4a09946a3c0510ba6d6,2024-10-24T19:28:18.327000
|
||||
CVE-2023-39941,0,0,7a7b0ebde101066406c8606dcd2e5bcb0d5dda26a40ce4a09946a3c0510ba6d6,2024-10-24T19:28:18.327000
|
||||
CVE-2023-39944,0,0,1470e34a741cc4686e482386839a0af88bb3580a2d1e2f77be44953e184809f9,2023-08-23T16:47:51.790000
|
||||
CVE-2023-39945,0,0,27452af8682e7fc1dc0d0187e72741ecfe96e38d136e3ba6496d4fb2131d56a6,2023-08-22T16:12:14.807000
|
||||
CVE-2023-39946,0,0,ab0dbf5664c8a595401a21854502bec62dd8f35d5d1f6dfd019f4649b8c57813,2023-08-22T14:21:30.250000
|
||||
@ -231255,7 +231255,7 @@ CVE-2023-41088,0,0,49329b5d67d4cd3940fce7a9adab0d791c43fb70872ff5ce3deb4e26e23e1
|
||||
CVE-2023-41089,0,0,330c83575a9976e5107ccd3bae1c646ffa2e4fef50c0897f1ccd9bee7e5907f8,2023-10-25T13:38:19.127000
|
||||
CVE-2023-4109,0,0,8baa8250e57f9070f1588ee57a6aaa5e217a410144b639ec04878717d28bc67a,2023-11-07T04:22:05.817000
|
||||
CVE-2023-41090,0,0,854b0d414b7b6c0e11cc9e6219a438b183a76dbd03346da869904dfb3e0d1bf5,2024-10-23T15:36:17.703000
|
||||
CVE-2023-41091,0,1,ad7652e2d3c1b7f6e6e675f34f7c1c34cd6f691deb9d5ce07924a50cf1e09c08,2024-10-24T19:14:34.080000
|
||||
CVE-2023-41091,0,0,ad7652e2d3c1b7f6e6e675f34f7c1c34cd6f691deb9d5ce07924a50cf1e09c08,2024-10-24T19:14:34.080000
|
||||
CVE-2023-41092,0,0,4e8e931d3ededed79b2045da3cc968b68e4b0145dbe88e1d7c336f100fc82182,2024-05-17T18:36:05.263000
|
||||
CVE-2023-41093,0,0,e2ec8ffe14945965701d15ef17979727c54dc987034806d91272b18047967a11,2024-09-10T16:19:41.973000
|
||||
CVE-2023-41094,0,0,f19259e18ee5ecc21aebc175659559c20ae9ee22625a898f985fcca4d69d87b5,2024-09-26T22:15:03.453000
|
||||
@ -236105,7 +236105,7 @@ CVE-2023-48188,0,0,e25a0a9426de91c2097231c68f9a1c0e2db42b370754a400dac508d2f5877
|
||||
CVE-2023-4819,0,0,2ad6f927c78343f2e16fc822f7a5b92dab83a61bfd87f35e8c8dce495558816a,2023-11-07T04:23:00.223000
|
||||
CVE-2023-48192,0,0,5359a2542f7e7d23640bf862f7875ef2bd7b86d2f2452622e10713c4dc3be1cf,2023-11-29T18:00:50.257000
|
||||
CVE-2023-48193,0,0,ec5c02890cd9e1fffae359e8523a6a385c1312695a72f38433ff889cec94469e,2024-08-02T22:15:29.943000
|
||||
CVE-2023-48194,0,1,b3a7c1f9bd761e4291d34b5439919381f06d227ddaf4fe52f85e67b9a35945d7,2024-10-24T18:15:05.247000
|
||||
CVE-2023-48194,0,0,b3a7c1f9bd761e4291d34b5439919381f06d227ddaf4fe52f85e67b9a35945d7,2024-10-24T18:15:05.247000
|
||||
CVE-2023-48197,0,0,bd09279ecf36494f3533f0148ecc550e2b331b062d976962b46e6c7441a8b350,2024-01-24T22:15:14.793000
|
||||
CVE-2023-48198,0,0,118e4bd5449c9efc19936d81813ba9bd553d9241e436b3c8887cd622b8a518bc,2023-11-28T21:15:08.420000
|
||||
CVE-2023-48199,0,0,e5a552a9394f09277a2430652250b1515245f28b6cc3f5e1fb31928938b223d2,2023-11-28T21:15:08.477000
|
||||
@ -236993,7 +236993,7 @@ CVE-2023-4923,0,0,ce7fc500dde57469ac63f0d59e3b430b03bd8f45530b68eebb245625ccf8cf
|
||||
CVE-2023-49230,0,0,4ac429fff5dad6e7c2619e17899b81d72294b4ca67a40312f774f6a762a4a586,2024-01-04T17:17:22.257000
|
||||
CVE-2023-49231,0,0,c62fd1865f2eec72e7e6740f19af9d0cb475298622080bf6c81c19f47c897674,2024-08-27T19:35:08.170000
|
||||
CVE-2023-49232,0,0,9ca3b1a982e1c7a2ec1772835ea21cbd9593765c02546da72550a094ad870e5e,2024-08-01T13:45:09.797000
|
||||
CVE-2023-49233,0,0,5121a302ad4e119a4a0fae8bc29f849d9f16596272d8782981cc921ca87ec2e4,2024-09-03T21:35:04.420000
|
||||
CVE-2023-49233,0,1,0fd1771cca59f0b1f94b4e27247bf8f38e4a82f6c89a9d3221c17acc2af386bb,2024-10-24T20:35:03.457000
|
||||
CVE-2023-49234,0,0,42b8e485b1c2a4cac6ef6d6ad94acb217368faece94ca890be93bbb463698a19,2024-04-05T17:15:07.690000
|
||||
CVE-2023-49235,0,0,251e067594908fcdc9ea0af907df30c24f21af889b96692ba9e2877adfcb0e54,2024-01-12T19:51:24.593000
|
||||
CVE-2023-49236,0,0,043e2d596773c1427321050092baafadbd74f95bf10543e717d7f7b30af8f0a7,2024-01-12T20:39:27.197000
|
||||
@ -237959,7 +237959,7 @@ CVE-2023-50805,0,0,6a1b68eb1c84b0e9c0411e8c2b1c211a94333de961886c775bd464a3e1dc9
|
||||
CVE-2023-50806,0,0,b76f16dc23feb49e04f1b42035094c51dba4a883093ee0167c8a3ca387a724ae,2024-07-11T15:05:15.190000
|
||||
CVE-2023-50807,0,0,49d7ddd672f2ace5a4bacad8e9a69ecb67c1f752bb20673689176d58cf559602,2024-07-11T15:05:15.990000
|
||||
CVE-2023-50808,0,0,eb111853188ca06e9540385134be25115b61d3ae24652382189ac577efef0822,2024-10-17T14:35:01.797000
|
||||
CVE-2023-50809,0,0,7719a810705ea5c5a85faa78514d3a43be3a8cdc8a452351afdb2453caacced0,2024-08-13T14:35:00.967000
|
||||
CVE-2023-50809,0,1,bc071172f4263c6ad714cd837284dbe1dad1416a743fc7cfef6ab03d74ce787e,2024-10-24T20:35:04.223000
|
||||
CVE-2023-5081,0,0,0e732bce81b0acde4513851a952ca536476787a34e895e3dce2d7f429b7ac3bd,2024-09-16T15:15:15.767000
|
||||
CVE-2023-50810,0,0,ee660c82097e8ab9c992185745b4404dffd149b82690962a0ed8a0cb829c0aef,2024-08-23T15:35:03.107000
|
||||
CVE-2023-50811,0,0,094c840cf26fbf426edc4fdb20f1490465693445542cafd34c1943f1940efb84,2024-04-29T19:52:21.503000
|
||||
@ -240128,7 +240128,7 @@ CVE-2023-5820,0,0,84dc0c1c53fde44ab4c05c82ab5a2520c185f28133977ced9ce8f2cd09ee60
|
||||
CVE-2023-5821,0,0,e28393f5c28b9240685235d5df02d1a7ae14f1e20637f91ebbc54582eac12c8a,2023-11-07T04:24:27.417000
|
||||
CVE-2023-5822,0,0,a51a65f577998995d417ed51f86cef9948919caf09e4a292400acbf0bd22020b,2023-11-29T19:15:14.147000
|
||||
CVE-2023-5823,0,0,28470bb07246c70804364affe86bdccda42a47cc222585e7bb729e6b070dc476,2023-11-14T16:18:57.250000
|
||||
CVE-2023-5824,0,1,1998a360c26373b26fdef6f25fafcfb4347ac685ad7c26343981286e8cfed19a,2024-10-24T18:15:05.393000
|
||||
CVE-2023-5824,0,0,1998a360c26373b26fdef6f25fafcfb4347ac685ad7c26343981286e8cfed19a,2024-10-24T18:15:05.393000
|
||||
CVE-2023-5825,0,0,23edd36c9ccca6999373400a33456815056795d3867dea57d3ee2ac949146a8c,2024-10-08T19:01:27.957000
|
||||
CVE-2023-5826,0,0,77f5256c0b3e05297e344b8d4e57780d4479e864cd2195e9176c3e5c17241118,2024-05-17T02:33:20.243000
|
||||
CVE-2023-5827,0,0,4c86fad4c27658fb1ce8352df5d774bb9cb4abc80afb1b424ce85b5e8b692d54,2024-05-17T02:33:20.353000
|
||||
@ -242455,7 +242455,7 @@ CVE-2024-10290,0,0,d3e172c9c7b7b0403c392ffa2d79ecaff1aea477f009179997ba8147d4bbe
|
||||
CVE-2024-10291,0,0,4221f9dc258e6d84993fa0f34bdeaf5dfcbfbf20fdb69558d099a0b3635f00b4,2024-10-23T16:15:04.597000
|
||||
CVE-2024-10292,0,0,8f4c4ab580d9e369d7e7dd331e4604716d13ad341c8b824d3d76d119c02d65de,2024-10-23T16:15:04.943000
|
||||
CVE-2024-10293,0,0,a923f6e085338d69ea2111da01f3e4f9e0b9ff921e35106d46ce0e7cea63eda3,2024-10-23T16:15:05.207000
|
||||
CVE-2024-10295,1,1,a13dd697d69319dadd65bd708ebbbc7dff277fa249c7141ba4bca06236d03bd2,2024-10-24T19:35:03.070000
|
||||
CVE-2024-10295,0,0,a13dd697d69319dadd65bd708ebbbc7dff277fa249c7141ba4bca06236d03bd2,2024-10-24T19:35:03.070000
|
||||
CVE-2024-10296,0,0,6780536acb419474ab08f42f0ff74d0f3d24a7a6b50377aafc4dcdaecc7d294f,2024-10-23T17:15:13.690000
|
||||
CVE-2024-10297,0,0,21e16b153ab50c5e76cb5a479cf3c5f080b3f490cdf8b294a5380f2a80d7bd42,2024-10-23T18:15:05.137000
|
||||
CVE-2024-10298,0,0,62d5e88eb741969e4d70e673f71e4b81aab32ca793b396e4ddc4938c3dc3242a,2024-10-23T19:15:14.920000
|
||||
@ -242464,15 +242464,16 @@ CVE-2024-1030,0,0,34264c5a1a4e97f6ee4441192a69e3a5aa9d9614a8467bdc88cd76d1a9884f
|
||||
CVE-2024-10300,0,0,d1168f9c1ffba532571d74378610bb66b2289577686fbcbcb64095e338234da5,2024-10-23T20:15:05.060000
|
||||
CVE-2024-10301,0,0,29f96455927e9f4a2ae674b61ef5b8d39692dd5959eef8ab3ccd238c47977136,2024-10-23T20:15:05.310000
|
||||
CVE-2024-1031,0,0,6576162a78ac686f55e5931a6b8f02ff6c7312ac04792581e6d78da8a91700d4,2024-05-17T02:35:11.843000
|
||||
CVE-2024-10313,1,1,04194b1dbc8be595a4e5096cd0c21e48e5ea37adc11df72735299fd02aaeac0a,2024-10-24T18:15:05.920000
|
||||
CVE-2024-10313,0,0,04194b1dbc8be595a4e5096cd0c21e48e5ea37adc11df72735299fd02aaeac0a,2024-10-24T18:15:05.920000
|
||||
CVE-2024-1032,0,0,06925fc416f8ceea7fb895efc2e3f765d4f064c5150968a9409448741aa1fb78,2024-05-17T02:35:11.947000
|
||||
CVE-2024-10327,1,1,700b62762191bb41bc182ea69953bf414df4934f86eb96bd3a0692e3d649e1f1,2024-10-24T21:15:11.730000
|
||||
CVE-2024-1033,0,0,6041b3ccd70df4052a8c26438331689f702c93b37a47aeb2d707df9d77ed7f49,2024-05-17T02:35:12.047000
|
||||
CVE-2024-10331,0,0,0ea4704cb0b6d504547be8cbdae887d3647db162f6beaaee72d4b7584e44cc6c,2024-10-24T11:15:14.327000
|
||||
CVE-2024-10332,0,0,85cf635cfe3f26ffd48ff5c222b99c1eb587859c46939f8e6364d970eb422157,2024-10-24T13:15:11.830000
|
||||
CVE-2024-10335,0,0,d1262d29e5dc663657a331eba3883b5a351e7279597dd05852a56269f6e891d2,2024-10-24T17:15:14.823000
|
||||
CVE-2024-10336,0,0,33e82271c1bad361b028f2e98191e887a62f8fe553b83c9e8d440090c3c1fb29,2024-10-24T17:15:15.143000
|
||||
CVE-2024-10337,1,1,a69476b83db6c1f12d365a088fb8bc4d825727f073e5a237b1dd6d1ef8718249,2024-10-24T18:15:06.170000
|
||||
CVE-2024-10338,1,1,834519410f43f4f4c77b02126281b19245f19896884e0511305f98f5f48cd646,2024-10-24T18:15:06.437000
|
||||
CVE-2024-10337,0,0,a69476b83db6c1f12d365a088fb8bc4d825727f073e5a237b1dd6d1ef8718249,2024-10-24T18:15:06.170000
|
||||
CVE-2024-10338,0,0,834519410f43f4f4c77b02126281b19245f19896884e0511305f98f5f48cd646,2024-10-24T18:15:06.437000
|
||||
CVE-2024-1034,0,0,454f09f0f5fc636699352f4449a6882a204ccb564a121fe5e40109839ef595a1,2024-05-17T02:35:12.150000
|
||||
CVE-2024-1035,0,0,792864ab2b0f8151b262ffe209c5f075ae9ac530a32ee5bddc4609b3d7d6306a,2024-05-17T02:35:12.253000
|
||||
CVE-2024-1036,0,0,aa65a53beadc56e4dda3efe9acb5802f242935c19973e66e0ff7f62d01b276fd,2024-05-17T02:35:12.357000
|
||||
@ -243693,7 +243694,7 @@ CVE-2024-20433,0,0,5e566651815d3cb842d80bb54328b0e8280ee578655d8a254f288aa4418bc
|
||||
CVE-2024-20434,0,0,904368830c218856dc09e88c749c79a929855ae5c25f03306a83a7691e310e6c,2024-10-08T16:20:30.933000
|
||||
CVE-2024-20435,0,0,bea0a896db86de220514ce1618de53b05523503910f680b3361f4c8bb8734dd9,2024-07-18T12:28:43.707000
|
||||
CVE-2024-20436,0,0,5d5cf7d2b852964575995c0ffa88e22ef644ab7daf1e554efb7370d28d6f8d68,2024-10-08T21:00:00.670000
|
||||
CVE-2024-20437,0,1,f5342e83073163f5076b37217bd88c609cebc8e5fd125a4eaf2dc842fb175051,2024-10-24T19:45:01.540000
|
||||
CVE-2024-20437,0,0,f5342e83073163f5076b37217bd88c609cebc8e5fd125a4eaf2dc842fb175051,2024-10-24T19:45:01.540000
|
||||
CVE-2024-20438,0,0,a9dc208e682d6b275639ddea51e6d0791542b6ddcec3dc7b8e7fc31fc89eece9,2024-10-08T13:54:46.450000
|
||||
CVE-2024-20439,0,0,d6b5bcbae917ca310708f2b3bf5f6e48a7ee01ce537e933ecbd837bca81ceec5,2024-09-13T19:35:32.477000
|
||||
CVE-2024-2044,0,0,20580816ecbcb2d456bf5030911ad2dbba893322604e54631bb30d65d5e1ff74,2024-08-01T13:49:39.293000
|
||||
@ -243709,7 +243710,7 @@ CVE-2024-2045,0,0,711ac9453656184dc732c4f4633f4f7bda646ec847d7f0c1c60c568976f58a
|
||||
CVE-2024-20450,0,0,a40597aa01c7c808e6329a0cff711d7709db0a15729885e98911c863c6fe701c,2024-08-23T18:14:43.787000
|
||||
CVE-2024-20451,0,0,616ab4cb2b50cee49c462941d4d3e48792a6a3c09b725bd97a134b2f4a53bec9,2024-08-23T18:14:11.137000
|
||||
CVE-2024-20454,0,0,b7df5fe3c7f3ad82ec42e5ba189942703f651e8bba204ff78589b452573f75e5,2024-08-23T18:13:47.510000
|
||||
CVE-2024-20455,0,1,0eab0e0d21dc4342feafbdcb7840d45bd73b5886ce73a3d40c40f5d3f5d5114a,2024-10-24T19:47:49.750000
|
||||
CVE-2024-20455,0,0,0eab0e0d21dc4342feafbdcb7840d45bd73b5886ce73a3d40c40f5d3f5d5114a,2024-10-24T19:47:49.750000
|
||||
CVE-2024-20456,0,0,bf56f0f0f8d3ed0f6616c43fc8ca6a47b6257ec17aaac25185ba7a05790b5cc9,2024-07-11T13:05:54.930000
|
||||
CVE-2024-20458,0,0,7fb1e55e612ee6c8cc09ba5c55e99526661fa33e17c363c55add3406c5a053f4,2024-10-22T18:03:09.777000
|
||||
CVE-2024-20459,0,0,5cd54a48218e6b57b046cb69743cb297e897ffabcfc93cde2b5b5db91e60d9df,2024-10-22T18:06:48.333000
|
||||
@ -243717,8 +243718,8 @@ CVE-2024-20460,0,0,358defc63ad86f792960aac125709e2fb3ed671fce4437f964487072e33fe
|
||||
CVE-2024-20461,0,0,c15342729fb0990fca2c54c1ab369938cf9683949c2cefcc250f30164551b25e,2024-10-22T18:26:01.890000
|
||||
CVE-2024-20462,0,0,b4e4c93a961318330887a3ec7cd87acb06e21170fac85cb813ac45cad8cb70ab,2024-10-22T18:33:31.410000
|
||||
CVE-2024-20463,0,0,2fbbbaedfda9bb304c7dda8b513af588802004e5e8905e7372610fd9adcd741c,2024-10-22T18:36:35.487000
|
||||
CVE-2024-20464,0,1,f24579468ebdb84e5fe9b1671318293b6d5b473cae484edf3392abda0d117c91,2024-10-24T19:47:29.740000
|
||||
CVE-2024-20465,0,1,58c61302cfd8374a2de79b49d5aac585902b54820b0fbcf82d9f704341c07483,2024-10-24T19:46:15.007000
|
||||
CVE-2024-20464,0,0,f24579468ebdb84e5fe9b1671318293b6d5b473cae484edf3392abda0d117c91,2024-10-24T19:47:29.740000
|
||||
CVE-2024-20465,0,0,58c61302cfd8374a2de79b49d5aac585902b54820b0fbcf82d9f704341c07483,2024-10-24T19:46:15.007000
|
||||
CVE-2024-20466,0,0,1f67211864766033ae7df34d7b817672b03d47284d690437051f747cfe419304,2024-09-11T16:15:05.683000
|
||||
CVE-2024-20467,0,0,c1af58980ccad99499fcb95639264b5a0614f69936f5a7ffc5edb35f8fbf6c29,2024-10-03T20:09:50.970000
|
||||
CVE-2024-20469,0,0,394110c2afcd5812c9d147805c76bc56d743563b5c07576e0d27ad32427aafe0,2024-09-20T16:58:14.327000
|
||||
@ -244801,7 +244802,7 @@ CVE-2024-21683,0,0,9e98100df1746075be9f809cd7f00fd6b0e3e97382e91b70d2a85ac430e36
|
||||
CVE-2024-21684,0,0,59f12a4b04761da303d7e3a40c8e6edc45c41d4945c065d5a0ffea737104115d,2024-07-25T12:36:39.947000
|
||||
CVE-2024-21685,0,0,5660fcc85eb1dde5c65259d6d6205ae74624ad923dcf6470bb4f3577f99d7f00,2024-06-20T12:44:01.637000
|
||||
CVE-2024-21686,0,0,4a77c3c56e7b5b00a78de09ce573bf8e0630b6f60379d0ccdce9209c8559bd43,2024-07-17T13:34:20.520000
|
||||
CVE-2024-21687,0,0,376ba9a42cfc804d783dd58059d1accf85ade36be58bc6e24e95588c80302a09,2024-08-01T13:46:48.050000
|
||||
CVE-2024-21687,0,1,b10f0ce22ddc5215abb86b2d036e862f5c36c964079edaaed2bac3d77de9097f,2024-10-24T20:35:05.307000
|
||||
CVE-2024-21689,0,0,d8a79405abcb9c8abfdb03520e41049c9522145c88e975847ada5aebd53c39e7,2024-08-20T15:44:20.567000
|
||||
CVE-2024-2169,0,0,25fcbf8b9d7008ea9954a41615969f4d36543f4a604eb878bcc8b4c5c18a9fe0,2024-08-02T17:35:41.760000
|
||||
CVE-2024-21690,0,0,63aa6e78c909be7fa5e5f93bbdaf8524fe66cd24db06ace89e57fd339e74e16d,2024-08-21T17:25:08.560000
|
||||
@ -251907,7 +251908,7 @@ CVE-2024-31493,0,0,23786918c0e6bb606f80dfbf3cc1cf7aa62322ef3147c75ab2836cfafd79a
|
||||
CVE-2024-31495,0,0,cc64a104bd02c0ad2ecb59ee5b7d31fe176ceb300f836393c6f4ac68db9adc74,2024-06-13T18:36:45.417000
|
||||
CVE-2024-31497,0,0,8d8d7f6d342d19eead9a597122971bd1c38180baf81620a11231640a58ff9af9,2024-06-20T19:15:49.960000
|
||||
CVE-2024-31498,0,0,64e912cb7273640f524a86a4c4b92bedddd325f11af3ca69081c43f6ca10cd7a,2024-08-27T19:35:26.363000
|
||||
CVE-2024-3150,0,1,c04bcaa026ade77c6b3f2254ca025e593677eeaae597c362ec21f5c24ac7a445,2024-10-24T19:35:19.290000
|
||||
CVE-2024-3150,0,0,c04bcaa026ade77c6b3f2254ca025e593677eeaae597c362ec21f5c24ac7a445,2024-10-24T19:35:19.290000
|
||||
CVE-2024-31502,0,0,48eff8d0e1056f4d498c02b25fa6f36fe79ddc405bd5236ddde6ae6266b87571,2024-07-03T01:55:04.920000
|
||||
CVE-2024-31503,0,0,63f26c08bc84d4a6878a828315f5d6a190e4224cc41f797a0adf367284c5896d,2024-08-19T21:35:06.150000
|
||||
CVE-2024-31504,0,0,ff5e6de58bbe8f153bd36ad8b71b66ea5d63fceb3d05f083e0fcf1527f2e563c,2024-07-11T16:23:42.943000
|
||||
@ -254206,7 +254207,7 @@ CVE-2024-34726,0,0,148667699b7fd62da52cb8a62c1c3c6fd756ca900c40298f1823e1d94f769
|
||||
CVE-2024-34727,0,0,75befb2ba24a3b4b3047b7cd5fae93e6c869e1a4a8df4db9070d6b118a79dd7b,2024-09-11T12:43:45.260000
|
||||
CVE-2024-3473,0,0,174ffd5ba26767424b634a780ad377f8ae33849c44036babd665d0b98ce27738,2024-05-02T18:00:37.360000
|
||||
CVE-2024-34731,0,0,c2796903b18972c85283f94e39f216adab1245ab24ab7429de75a096f2bef3ba,2024-08-19T13:00:23.117000
|
||||
CVE-2024-34734,0,0,889d7cdea2a82a0f6a204d9bb0c40732ce31288993c2c8f191f18be876975fbf,2024-08-19T13:00:23.117000
|
||||
CVE-2024-34734,0,1,03ca469f8cd315011dd153921c263a875a2212423b28ba9a9477308f69d8631d,2024-10-24T20:35:05.433000
|
||||
CVE-2024-34736,0,0,af7fdcabef2746a86c0f80295ca02f0456c75246f9b931e1983da2058f718a9f,2024-08-19T13:00:23.117000
|
||||
CVE-2024-34737,0,0,8a32b951cb912392f48b43bbae36eebc622522d304125ad1990c6adfae52defd,2024-08-19T13:00:23.117000
|
||||
CVE-2024-34738,0,0,cabf58b36133aa62c93cf33c152bee953c7fc9fc19123e817a90962fd3ea12ad,2024-08-19T13:00:23.117000
|
||||
@ -254435,7 +254436,7 @@ CVE-2024-35173,0,0,49a434371ec4a6229edf5da12202cfa5598a4af286c41c326bfe7f54ebc1c
|
||||
CVE-2024-35174,0,0,b1c7ded9fc748474b589a3a5bf1c3406f1a807641e59436d3b061c2f7ba5cdeb,2024-05-17T18:35:35.070000
|
||||
CVE-2024-35175,0,0,c8c86729e26a3f8e4e543bcb56b2884e73c6c8c90917029f391628b680dfad69,2024-05-15T16:40:19.330000
|
||||
CVE-2024-35176,0,0,6ca7e7edb5c74cc4529c2f1d06dd954facb0383c2589dae58213add18d8e2594,2024-05-17T18:36:31.297000
|
||||
CVE-2024-35178,0,1,966d194fde3b588d2e33c6baaec163a3ac04113c9251192e56ae69f02639f080,2024-10-24T19:22:04.123000
|
||||
CVE-2024-35178,0,0,966d194fde3b588d2e33c6baaec163a3ac04113c9251192e56ae69f02639f080,2024-10-24T19:22:04.123000
|
||||
CVE-2024-35179,0,0,60884268b480220b0ed8e7d049c3aba7d13418af0d36f7c5bd91c29c2d5e7e96,2024-05-15T16:40:19.330000
|
||||
CVE-2024-3518,0,0,7a83fec6c9edcb89d532948688bb01695519330d58da21735682b3ae91dffe67,2024-05-22T12:46:53.887000
|
||||
CVE-2024-35180,0,0,190aa281c362464f8b05fe476a49394f7d0058a0dab615a9223a47f1581d0fb3,2024-05-21T16:54:35.880000
|
||||
@ -255199,7 +255200,7 @@ CVE-2024-36127,0,0,f67ed99c9205750d87408264109b0b2da12607ef1d07ca1d5849393d1955e
|
||||
CVE-2024-36128,0,0,9da468fd538eee45c49c6b3a5b681c0b3c17cde174e2675cb22d4e1b048d5007,2024-06-03T19:23:17.807000
|
||||
CVE-2024-36129,0,0,e8b8667180ad871a39015931b777fa59fb290eb036737b8e789f39cbc635a5fb,2024-06-18T17:34:11.873000
|
||||
CVE-2024-3613,0,0,26f9ac2543805748959db0b5d9b33039cf66eba7396fc9c5a9d8ce8ca1f82b38,2024-05-17T02:40:01.607000
|
||||
CVE-2024-36130,0,0,4671d62b05ac637a601468320fbde1254b9e1ab2c793e3e63f9ae03e57d902ad,2024-08-12T18:52:50.947000
|
||||
CVE-2024-36130,0,1,723d001970495d97ee77549d24284e1d4ff25a575094f2e8f64d2626c31b3c6f,2024-10-24T20:35:06.217000
|
||||
CVE-2024-36131,0,0,fe083931c777de5ebca95ef63997997b27461bd32c076901187f040a7a6fb25e,2024-08-21T18:35:05.670000
|
||||
CVE-2024-36132,0,0,1dce30d4e49190a42dd771e2cd02fc7bcd0f0b6c2d4894583a88755ab208fd59,2024-08-12T18:53:28.710000
|
||||
CVE-2024-36136,0,0,5d95909c13f0d8392324a7365478397dba5326ae554d2812281ea77aabac6cfb,2024-08-15T17:31:15.880000
|
||||
@ -255634,7 +255635,7 @@ CVE-2024-36857,0,0,a3957f20952d5f831d537cb81d4dc06ce5ec4152a9e930178e7fb48d5d56e
|
||||
CVE-2024-36858,0,0,bf952cd9ddab2a4c534851d95449ac4e2ed1c44a5763e3b560caa5613bebe64c,2024-08-14T19:35:23.693000
|
||||
CVE-2024-3686,0,0,4edaa8377de4644f957d15220cb91ea9e071a6615200cbf20f58f4b97f92967e,2024-05-17T02:40:03.933000
|
||||
CVE-2024-3687,0,0,0790df61296b0929bb9b469121387dd5b7cd2b562eeab594414896ab3fb872c8,2024-05-17T02:40:04.027000
|
||||
CVE-2024-36877,0,0,fb3a2ad7e0cda628050a16e7622b1d0d259b14fce2ceaae888658e10a286c5d3,2024-08-15T16:15:19.160000
|
||||
CVE-2024-36877,0,1,b5940056cb3357be0fc404faf9d20c26624de04b24c3b32151a8171b19c64e1f,2024-10-24T20:35:06.353000
|
||||
CVE-2024-3688,0,0,fd7741416f20e86cc9ace0c3d1680a96020807dd7ba69d4b2d23070e23e95bee,2024-06-04T19:20:23.107000
|
||||
CVE-2024-36880,0,0,2b0302be5dbda2a151ebafe5b0e4ed1edd1c138757440601b5f7ee782f06f5e4,2024-05-30T18:18:58.870000
|
||||
CVE-2024-36881,0,0,462fdd40c8930daf000297e318f0ca45e554b77fd5b7375bf9db7855ebe0f739,2024-05-30T18:18:58.870000
|
||||
@ -255968,7 +255969,7 @@ CVE-2024-37265,0,0,15f68b41e4db6ae6ccda7f80b0a70abe19004015dbcf0d1246d37335388c5
|
||||
CVE-2024-37266,0,0,44943b1bec747c3c4ecddbc943aaff365210584d2dac21ff41065ed54e40dcb1,2024-08-29T18:59:40.057000
|
||||
CVE-2024-37267,0,0,0d692f1d5fdd2443078b17f2b54167a732ba33e5479382e14b7e2bd4b6ec49a8,2024-07-25T13:47:43.833000
|
||||
CVE-2024-37268,0,0,32108042cd6042edb5d9a980c4bc9e7e171800cf8a42366d53d95c0b76a50314,2024-08-29T18:56:01.267000
|
||||
CVE-2024-3727,0,1,b0e2ad58d0d2a68040573151b20db183d58ae1205fb7aacdf4a0e26b9877e66f,2024-10-24T18:15:08.177000
|
||||
CVE-2024-3727,0,0,b0e2ad58d0d2a68040573151b20db183d58ae1205fb7aacdf4a0e26b9877e66f,2024-10-24T18:15:08.177000
|
||||
CVE-2024-37270,0,0,09adf8729d6feae3191994dc6f2b286449a8e4d910f8c343a3a9496ea050a29f,2024-07-11T13:05:54.930000
|
||||
CVE-2024-37271,0,0,82adde283ff9dacc0f77be200c055ea2f2c58a80387c070880c7d1f2c1068d32,2024-07-25T13:46:39.273000
|
||||
CVE-2024-37273,0,0,2a85b1da0ca6e483bcfb6dea755537146c70a6967cba53f16b02bbb377a77813,2024-08-15T14:35:03.053000
|
||||
@ -256739,7 +256740,7 @@ CVE-2024-38308,0,0,fe139b0ba6074f0e39f21bcc0d3b2863f88a6047b3a5a779d5f8bedf54884
|
||||
CVE-2024-3831,0,0,50e818929dc56e84afc0dd8fe8fae7a8b323529f272034386ddae5543191124f,2024-05-14T16:11:39.510000
|
||||
CVE-2024-38312,0,0,1eb38797c2d82d591d8abe57f1d4573a3412cb86f39c7ea700474f2d0b5ea92a,2024-08-07T17:47:36.897000
|
||||
CVE-2024-38313,0,0,6104dc2b29b4c8ac118d88c83436ea8db6780255231d99b7909daa998f4d9c3c,2024-09-12T17:48:33.947000
|
||||
CVE-2024-38314,1,1,f448bf43b0dcbd6f94057272eb0ce97542343e31622558d7a1a88ad6059e9f30,2024-10-24T18:15:07.957000
|
||||
CVE-2024-38314,0,0,f448bf43b0dcbd6f94057272eb0ce97542343e31622558d7a1a88ad6059e9f30,2024-10-24T18:15:07.957000
|
||||
CVE-2024-38315,0,0,aeb4bea82071a33b9340679ee227ee40ee52d5ed9a6712f0f0c3d02c04ca6f7f,2024-09-20T14:09:24.733000
|
||||
CVE-2024-38319,0,0,baca4c6dd463198ff6e83e4d1d026e029418f6c2a504c13c76e1be823b804509,2024-06-24T12:57:36.513000
|
||||
CVE-2024-3832,0,0,9a695728462575e75497ca13bb41d4307d467f786773e32ceb92b024954b50b9,2024-08-14T20:35:21.240000
|
||||
@ -257986,7 +257987,7 @@ CVE-2024-40422,0,0,d3469c3cd9d0a29c183d0e0059bb4038c9b4a37bd15891a6493843f933bd0
|
||||
CVE-2024-40425,0,0,00190f9170b077ba334795fc09138437ec577bc0e167bbe92fc8ad126823e729,2024-08-01T13:57:26.300000
|
||||
CVE-2024-4043,0,0,50e67cd87d2761034ee2e0514a61b1574f18a654fe271a8568be1eaa53e96b2e,2024-05-24T01:15:30.977000
|
||||
CVE-2024-40430,0,0,546dc110e07f45ee3ffd84e8af87c8ef8c5f6d93dcd27e587cb3a3c5233f7799,2024-09-13T21:15:10.357000
|
||||
CVE-2024-40431,0,1,5fb9c8d8e8eca2c6ce117cc8be2e6523610d310535354e9e5f55716d61b6e614,2024-10-24T18:35:07.010000
|
||||
CVE-2024-40431,0,0,5fb9c8d8e8eca2c6ce117cc8be2e6523610d310535354e9e5f55716d61b6e614,2024-10-24T18:35:07.010000
|
||||
CVE-2024-40432,0,0,c6bfa7d4fd77ce07d834ccbc132b9835555374c8e776fbf0436e00b0d426ea31,2024-10-24T16:35:06.560000
|
||||
CVE-2024-40433,0,0,e7a4ec9affcd5459ba2865b747a3c21f3af0ec6afc5f3d7573785ee38941782a,2024-08-01T13:57:28.500000
|
||||
CVE-2024-4044,0,0,e5bbe7519a57f32e10b3da751a3cb9112f45a7270ca309aa6997e34b1ffc6b95,2024-05-14T16:11:39.510000
|
||||
@ -258040,7 +258041,7 @@ CVE-2024-40521,0,0,f750523e60dcc32f0bb9bfafb3982029c7dd27cd5b8886a7de1a46e73ce19
|
||||
CVE-2024-40522,0,0,8a677ab9989e362511bec3e6f4edb768c909d11d73452c70e9694007bb6c7499,2024-08-01T13:57:36.927000
|
||||
CVE-2024-40524,0,0,90f7431206b5ecbb9d18d5d6f346e266df059fa6fac9c7463be67ad7414064c8,2024-08-01T13:57:37.610000
|
||||
CVE-2024-40530,0,0,efb514f12fd7b373398adea8678758d12c23eb4a56afc33b6cb2a0d986bc14b0,2024-08-28T19:15:08.717000
|
||||
CVE-2024-40531,0,0,197fc6f6a80e1880502547f174bb330235e9a4fff00fb8be3255641a40fc91b4,2024-08-28T19:15:08.797000
|
||||
CVE-2024-40531,0,1,cc72e41b5bd2c6e2acfb1db33dcaeb70a55b5a6a8e5bfdb7a47fc8a0c92293ce,2024-10-24T20:35:06.753000
|
||||
CVE-2024-40535,0,0,1510e098104a1d2f524b97f4ba986590a1c7d9af78dd4e91187f28763928fd2c,2024-08-22T19:35:35.893000
|
||||
CVE-2024-40536,0,0,8e08633375577085d9df665f2d62466b3b6eb1ecb2618a56ac5894fb283b7f3f,2024-07-17T13:34:20.520000
|
||||
CVE-2024-40539,0,0,8ebc42c1390ef84ac367ae8d1ba0b0ce9ac095f50c081e4e40b961f1bf0b144d,2024-08-01T13:57:39.077000
|
||||
@ -258582,8 +258583,8 @@ CVE-2024-41247,0,0,b1879234dbb5e4e51537003eb14b996f7ad3d024ec805dab5d73eb6a361d1
|
||||
CVE-2024-41248,0,0,2e3eb92d4ddb9fb73a0d6cd2e0e99894b028d705fe4f5641721da8bf80a9bf4d,2024-08-08T15:07:27.853000
|
||||
CVE-2024-41249,0,0,b36adc3976bd0fd4b1a986a438ce356cce08547870c88e153dfb2ebcd8a73b86,2024-08-08T15:06:48.843000
|
||||
CVE-2024-4125,0,0,16553edd1211e1aa2542535f3455b94ede37886029935c5af09bcd7638ededbf,2024-05-17T02:40:16.937000
|
||||
CVE-2024-41250,0,0,ed2ec7774a8ec7b69d0fb8bbb5a6282e439116063707acc8ce2b97cfaf8b3d0e,2024-08-08T21:35:16.680000
|
||||
CVE-2024-41251,0,0,da008bc6dc7814b48f867f21af4633a6806e17edefa70e303dbf35845dd6cab0,2024-08-08T20:35:09.980000
|
||||
CVE-2024-41250,0,1,e8c371b03a2b06097cf7b2f842c8aceaa0ac0c54683cfa50a27fdd6a98e8319c,2024-10-24T20:35:06.947000
|
||||
CVE-2024-41251,0,1,680fca5f9457aaf0fe813ceb0c7b82b77965d9e2392bd52cc49d8a570b8ba3f2,2024-10-24T20:35:07.133000
|
||||
CVE-2024-41252,0,0,6f7260587fe3d806095bb900d28d021360c8fa8615ba7755fc4b11adcc410d82,2024-08-08T15:04:56.287000
|
||||
CVE-2024-41253,0,0,1d15e693bee8ec7e0d17946828828bb61ca6ab7c564466339f09f66ca369a555,2024-08-01T13:58:25.153000
|
||||
CVE-2024-41254,0,0,f212e1634835b1fd96f85fe8003b7cfe4c7c22a05d9dcb9e60d767469bc03438,2024-08-15T13:15:29.170000
|
||||
@ -259619,7 +259620,7 @@ CVE-2024-4280,0,0,f46c38f13eff52b4d020fb374e18f92e6528a4bade2042627b2165ccf7b627
|
||||
CVE-2024-4281,0,0,cb48c26c252b1c83fb4810210335ce05e1fcbd94e5804419418b4f73b9d5c028,2024-05-08T13:15:00.690000
|
||||
CVE-2024-42812,0,0,5004482ab060d12928a1d563b5c5dacbbbdd48ef5a3cb8b0e65730030005a510,2024-10-10T20:18:11.100000
|
||||
CVE-2024-42813,0,0,ac2ce0206860ac49c7a00dc981456912113a83f39c5bd8ad9fc9aeb5495f6bf9,2024-08-20T15:44:20.567000
|
||||
CVE-2024-42815,0,0,fa939825da2520b0805320da8ef3bf06e37d61d20e773887864a50a3aa224eef,2024-09-03T21:15:16.197000
|
||||
CVE-2024-42815,0,1,70be5d3a8744ada575f0b9865a24fec76f60de84aad90d61f985ade26c35ea95,2024-10-24T20:35:07.330000
|
||||
CVE-2024-42816,0,0,8dd1ae8820cfa39b8949229a5b0a0fd0a511af977924a1929a9dcb8553f95dec,2024-08-27T14:35:07.077000
|
||||
CVE-2024-42818,0,0,694f268c461684854315b7e46e53659be0c6525c36cb73fb82a2ea42f888fdd3,2024-08-26T19:10:18.890000
|
||||
CVE-2024-4283,0,0,0b01382e91d2d3830bdcadad6ff16c4cbf45d62064e6424171f058dd71657988,2024-09-24T16:51:23.193000
|
||||
@ -259674,7 +259675,7 @@ CVE-2024-42953,0,0,8851520fe29c4e2cdfe788f671b16257937bb484146dbc70d9979d7ec9114
|
||||
CVE-2024-42954,0,0,d7dc5fdc7066bd66ef4157db7606f6118c02f98972de6c14f0326e5f39a08ace,2024-08-16T18:14:12.620000
|
||||
CVE-2024-42955,0,0,00b8e7d9e7586e92f9d97b1e6a1644d4d4ca5fa3cfd628bfbd234416a0d76773,2024-08-16T17:35:08.957000
|
||||
CVE-2024-4296,0,0,052b4ea8fe5e477de9d37ee5afe4ea95ec74241a638e1e02dda20e9782a7e237,2024-04-29T12:42:03.667000
|
||||
CVE-2024-42966,0,0,11fb4f8406b51aaf92dcd9c74f137affdd9a6a6d3d3dd012cff469b6ec43d58b,2024-08-19T19:35:09.913000
|
||||
CVE-2024-42966,0,1,77e676b8250f096a6ea0260af1378bb768a2addd8ad1a0d47894c67e134689a8,2024-10-24T20:35:08.087000
|
||||
CVE-2024-42967,0,0,9bc6baaf78abe67d011872c60700b9f7e2345b7623db19a03a7fee28d9c0f735,2024-09-06T17:35:16.717000
|
||||
CVE-2024-42968,0,0,ea8af3ba9d524f0f7175c3ac05010317eb6e0c3232797df2ec4eeeed8bf7be47,2024-08-16T18:14:39.303000
|
||||
CVE-2024-42969,0,0,8304dea3c274f1ae2ddaad05a344a9bb249c0e2abc4bd40a669c59c89b06623c,2024-08-16T18:35:15.027000
|
||||
@ -259682,7 +259683,7 @@ CVE-2024-4297,0,0,391cde32595a6f10054c7e99797c9f48482f1c612a355cb934b7ce023c8828
|
||||
CVE-2024-42973,0,0,ea510c6d08cc16bdb4d726fb68ca476e64ed97e5805f96a8d49cb53ef02d84a3,2024-08-16T18:11:51.570000
|
||||
CVE-2024-42974,0,0,938719a5c39f954ba2ac313637062853a8371b455f4b682f3eb1a2aeb5004821,2024-08-16T18:11:47.980000
|
||||
CVE-2024-42976,0,0,b55ce95834b0b84d45bcbcea47b22be13c2eeb921a6b297cd9c701de5bff705f,2024-08-16T17:35:09.687000
|
||||
CVE-2024-42977,0,0,284c1cb74b11c8add0a4a2fd16aa0430e19948019ec5006358de30f607388a3a,2024-08-19T20:35:17.330000
|
||||
CVE-2024-42977,0,1,7367f2b13f0a3175b01c6619c589a12f88c913a35b3e0a4ed5daa8eed6519355,2024-10-24T20:35:08.860000
|
||||
CVE-2024-42978,0,0,7f0bf0c687f04da83ed3192c78fe85643b350fb1ecb2a064e81c90dfb54e9756,2024-09-03T18:35:13.590000
|
||||
CVE-2024-42979,0,0,8fe829910a5c801caddb18b0a08003433bde998168b919898eba6ac640ceb18a,2024-08-16T18:11:41.197000
|
||||
CVE-2024-4298,0,0,56c11c4140998e5277d32b17cd52d40fe299fce95de1be0aa962947b44aa372d,2024-07-03T21:15:04.183000
|
||||
@ -259692,7 +259693,7 @@ CVE-2024-42982,0,0,b79378f1ff4a9e006826a55d7321d82064d4e893f7822df5232fe4a1a2613
|
||||
CVE-2024-42983,0,0,c725dcbfb5bb576199cbbf3ee9c5a740bda0a1873727d4ce4b2ca1e69a43a819,2024-08-16T18:11:08.020000
|
||||
CVE-2024-42984,0,0,2fd3b2ae263fff500fb556980428a38b378e10c4993fb651d635c225d8b2007e,2024-08-16T18:10:53.680000
|
||||
CVE-2024-42985,0,0,fd3e2b3b518908e52ebda25c2cfe8cc913346bb2192127a6006d7d26017d6a7d,2024-08-16T17:35:10.400000
|
||||
CVE-2024-42986,0,0,0b2d204ff26f9eb28ce17ac6820e07d93d61424a006dadbf321ab643bf7229ed,2024-08-19T21:35:07.937000
|
||||
CVE-2024-42986,0,1,333c29170d72b4f06c7cca25735b4ef703fb9bbd3ea5ccd5d0f80272270b1301,2024-10-24T20:35:09.653000
|
||||
CVE-2024-42987,0,0,78d20dcc8dedb262666f57c924ed05a38397e8611300fdadb69763919f535881,2024-09-03T18:35:13.793000
|
||||
CVE-2024-42988,0,0,6aad3ac6d5993957fb72ff6f9df2be456bfc38550cbc776bedc5dee8b4a51ef7,2024-10-10T12:51:56.987000
|
||||
CVE-2024-4299,0,0,2eb1fe754d25d4fca4f14435247c4dce7f2aa132c3677595429d39db730cdde4,2024-07-03T21:15:04.313000
|
||||
@ -260499,7 +260500,7 @@ CVE-2024-44133,0,0,37c73fbc80b87f8103d86196f929aadb6f994b40eadcbf5f51a2a2f17f44f
|
||||
CVE-2024-44134,0,0,6acd0998d9e90144e37860d44f416ff49a5729889dc934ad2ba9b80a8196fb3c,2024-09-24T18:26:26.963000
|
||||
CVE-2024-44135,0,0,2e30daeacd1c058db0b211917dd4f5e9ef4b14081fb1be4edc5057672e88cbd8,2024-09-25T13:28:09.067000
|
||||
CVE-2024-44139,0,0,1e5a55dd4e3bf6761362df168af8ec5360faa5b360c06fdbf37c0f9ce70d7baf,2024-09-24T18:30:34.863000
|
||||
CVE-2024-44141,0,1,2b676934bee762ca814654c97686c92039f139c445711b8df78a2b6d97ae559a,2024-10-24T18:35:07.340000
|
||||
CVE-2024-44141,0,0,2b676934bee762ca814654c97686c92039f139c445711b8df78a2b6d97ae559a,2024-10-24T18:35:07.340000
|
||||
CVE-2024-44146,0,0,c66454fdf1b0d7a7564849f02f2f09da6c49b1097620ca2f5b88a9c465a751e4,2024-09-24T16:14:02.090000
|
||||
CVE-2024-44147,0,0,8d82d5566ea29b70940c9c9f21d951cc6eb5498675d184ba22b8d555bbcad202,2024-09-20T12:31:20.110000
|
||||
CVE-2024-44148,0,0,059ce4bebff22300cb485a8cc23c3238cb5bdcfaba9ac22cf4f5aea163483afa,2024-09-24T16:09:49.490000
|
||||
@ -261016,6 +261017,7 @@ CVE-2024-45239,0,0,c3ffeaf25be7007252e004249861dec4385985427eba5bc5855dd2ae53128
|
||||
CVE-2024-4524,0,0,8e732eea1a281702bf1b965cf73e8243f70f2376e5e0521757bce6618382002a,2024-06-04T19:20:41.520000
|
||||
CVE-2024-45240,0,0,71d060de9ce29049494d6966979673903641ebddefc965fc9df5c7a08f6ba1cb,2024-08-26T12:47:20.187000
|
||||
CVE-2024-45241,0,0,db0315abb9e90395d374e44a8c98955e324445d54e9a189001fc6da18a250f14,2024-08-26T16:35:14.650000
|
||||
CVE-2024-45242,1,1,18d91e6932033aaec9d2a0b41034538b1797e282fe9646d40d2af10d74bfe2af,2024-10-24T20:15:04.243000
|
||||
CVE-2024-45244,0,0,a9f691efb65025129369bbba49bc88f6c172529b68c55b8214f47c2d49100aff,2024-09-12T16:07:49.530000
|
||||
CVE-2024-45245,0,0,b25df5848e1262f8558faee75f4c21da809ef74bc3ff13bc7e48405a4a50dd95,2024-10-07T17:47:48.410000
|
||||
CVE-2024-45246,0,0,94be062f72d49f47aeb4b27d54c3f9016c0bc6c7db145a96e840fd34f148105c,2024-10-07T17:47:48.410000
|
||||
@ -261028,7 +261030,12 @@ CVE-2024-45251,0,0,4723402deaff257a03485bee19d0c63cf2e4218538079529007db41f2e86b
|
||||
CVE-2024-45252,0,0,d5507db1b0bfef3e2d4dc8033cbb1d8a5c92c659f9cc4356d3a7d9eed6325773,2024-10-07T17:47:48.410000
|
||||
CVE-2024-45256,0,0,1ad6eb17928348883dd9cb354722f92894049d9e7bbed38aa0c5260ca73ab2c4,2024-08-26T13:35:02.937000
|
||||
CVE-2024-45258,0,0,20ee97d2eb3a83f8d2a7be46b53936d32dfd424c455ff5dc5358a331a56dedc1,2024-08-26T14:35:08.627000
|
||||
CVE-2024-45259,1,1,7332344db080c8332d8c2b2689d11bc571195487a52df5d104b5dea3e2db3b7f,2024-10-24T20:15:04.323000
|
||||
CVE-2024-4526,0,0,87a45e4eb41404ceb4b9ba3ca9513f18cac2687a381a0d6211a80485bbac625a,2024-06-04T19:20:41.720000
|
||||
CVE-2024-45260,1,1,1aa3fc7a31f1d175292f9ae22a3503f70b287eb23e86a51d9e5354e53eecdf35,2024-10-24T21:15:11.977000
|
||||
CVE-2024-45261,1,1,a0d160f94d52e481048dbc76418ac520896782812f343ba6a62a70926a34a4d4,2024-10-24T21:15:12.057000
|
||||
CVE-2024-45262,1,1,d0d1fc6e55fc07600b32b06bf58f90e08aff5f6855aa915ac2a24e96da72f708,2024-10-24T21:15:12.143000
|
||||
CVE-2024-45263,1,1,da3f78074c5f3da8ff1b0c477c73c07ad05ca64c52a17c347c8391bfb261f0dd,2024-10-24T21:15:12.217000
|
||||
CVE-2024-45264,0,0,822145f9a1da648532bc7a1b41e14edccb94fd2d8996f04c204c8fc97c8f117a,2024-08-30T15:02:34.610000
|
||||
CVE-2024-45265,0,0,0bfdc3ea11a3a8b692c725170390e0ed5e5bfa861ba7586668c7c78868fd4e58,2024-09-05T18:30:23.883000
|
||||
CVE-2024-45269,0,0,930c2dda66909b7393cc3daf8d8e0bcb8066c589d45124dd784354d0c2c32ffd,2024-09-04T11:49:36.950000
|
||||
@ -261469,7 +261476,7 @@ CVE-2024-4624,0,0,8d5df292e17ba086eddadcbafacc529f2ebc3c5e49d7b6ea9488db217d3278
|
||||
CVE-2024-46240,0,0,e1fabb07f498fd1cd5336ee19dd4a0cded9959b31a2fc1d149406578714fa211,2024-10-23T15:12:34.673000
|
||||
CVE-2024-46241,0,0,e8f867d722224165a0936937fdbb3a70034985bd08f25a28d6b30ab6a32199ce,2024-09-26T13:32:55.343000
|
||||
CVE-2024-46256,0,0,8bf470a14240bc761051ec27ff055fa64e8fa7727cdd73b13c40b5c555057a54,2024-10-24T17:15:16.690000
|
||||
CVE-2024-46257,0,1,77ff81579b9686846d30b6279f2f3ca51486f319de7ee8b1a0a61768d1f232f7,2024-10-24T18:15:08.617000
|
||||
CVE-2024-46257,0,0,77ff81579b9686846d30b6279f2f3ca51486f319de7ee8b1a0a61768d1f232f7,2024-10-24T18:15:08.617000
|
||||
CVE-2024-46258,0,0,8b56e4a9f9fd1a589c584ad7ce0a4a87192f12ba82adb8f81ba743ebccc7f757,2024-10-04T16:41:08.497000
|
||||
CVE-2024-46259,0,0,e52f3ae459d8b17def76efdc5501c5aee7ccdfd88a953171600235a977929f57,2024-10-04T16:40:29.857000
|
||||
CVE-2024-4626,0,0,2c49c68b79a7a3d7626dfac7c1ab161b6d51a1a10b834d04b620fc9c15d7e475,2024-07-15T17:10:52.563000
|
||||
@ -261540,7 +261547,7 @@ CVE-2024-46470,0,0,4aeda2c990e579b9008226e62d5cbdc47a22a0fa6603152064e359fb3aa1b
|
||||
CVE-2024-46471,0,0,470c933b4642dc2897ace8d3fcae6cce28009d5c4dc28b3858aee18cd52a08d7,2024-09-30T12:45:57.823000
|
||||
CVE-2024-46472,0,0,905efea5ffd69a3fd22b9ebc43e76cd3335e2f2038a60c220dd9d439817a4610,2024-09-30T12:45:57.823000
|
||||
CVE-2024-46475,0,0,6dd32d21b34d5ed62fc4d47e4e31b7806525d2f693fc3da0c33e5fca3fe88762,2024-10-04T13:51:25.567000
|
||||
CVE-2024-46478,1,1,95ee5e2c4e35afae36a9c0b6b6f68536735b14d9ae9e5853beb3b8db167d2831,2024-10-24T18:15:08.863000
|
||||
CVE-2024-46478,0,0,95ee5e2c4e35afae36a9c0b6b6f68536735b14d9ae9e5853beb3b8db167d2831,2024-10-24T18:15:08.863000
|
||||
CVE-2024-4648,0,0,911dfdcd448576dec5371ac5fe5f3ab9d434d7a73d2296063b028e9785e0deda,2024-06-04T19:20:44.580000
|
||||
CVE-2024-46482,0,0,0bd11529577a79bda1c61c449bff3d306490c152de71c2fae5d4eea05925babd,2024-10-23T18:35:03.670000
|
||||
CVE-2024-46483,0,0,efd1621b21138809f35625ddb77fc021e753097710878e96af20d908574d610c,2024-10-23T19:35:11.493000
|
||||
@ -261902,11 +261909,11 @@ CVE-2024-46988,0,0,e779744a9671f7163b46329d2305c8a1127f2655ca3ac90cf4c0a252af1bc
|
||||
CVE-2024-46989,0,0,fa29cba3c1dce457e1dbba7936349383199f9bdd1c6535b099705e0bc06fa139,2024-09-20T12:30:17.483000
|
||||
CVE-2024-4699,0,0,094a3293d1ad6c00b8f42deb1643b829befd633ab0dcef49a183da331debaad7,2024-08-06T19:15:57.580000
|
||||
CVE-2024-46990,0,0,a651df2006ba8ce24b06699e6e89ccb4decc32abf73ae7975ae4d0581b357bf8,2024-09-20T12:30:17.483000
|
||||
CVE-2024-46994,1,1,49d5bf09d2fe81f6bd806321a9bb9a1c9bda4f75f99522632bb8d04104b0636c,2024-10-24T19:15:13.843000
|
||||
CVE-2024-46995,1,1,4797f99ee69a6adf04c3acfa4aa75af0727164e3bb515bf340c219f12ab03f85,2024-10-24T19:15:14.137000
|
||||
CVE-2024-46996,1,1,4e16780a92fc50de10e47210cf065b6c0b45866ce1f17019fe60c069c55f53c8,2024-10-24T19:15:14.383000
|
||||
CVE-2024-46994,0,0,49d5bf09d2fe81f6bd806321a9bb9a1c9bda4f75f99522632bb8d04104b0636c,2024-10-24T19:15:13.843000
|
||||
CVE-2024-46995,0,0,4797f99ee69a6adf04c3acfa4aa75af0727164e3bb515bf340c219f12ab03f85,2024-10-24T19:15:14.137000
|
||||
CVE-2024-46996,0,0,4e16780a92fc50de10e47210cf065b6c0b45866ce1f17019fe60c069c55f53c8,2024-10-24T19:15:14.383000
|
||||
CVE-2024-46997,0,0,1e9d71d3dbd956d3ef6cb30e686537e0e0a898601c4508e786607d0a3d9c0450,2024-10-07T17:20:10.427000
|
||||
CVE-2024-46998,1,1,288003db18ccc322862e7f067e931335e4ad4a239f6ed7ccc91c1d5a25b486d7,2024-10-24T19:15:14.600000
|
||||
CVE-2024-46998,0,0,288003db18ccc322862e7f067e931335e4ad4a239f6ed7ccc91c1d5a25b486d7,2024-10-24T19:15:14.600000
|
||||
CVE-2024-46999,0,0,3f752cfc2057db8c9e88a86dc03848f68cfeb464ea96f96eaca0cf77bb84d96a,2024-09-24T20:20:39.253000
|
||||
CVE-2024-4700,0,0,fa1a582bbd6e4a675ead2d89728236d2ca7c92c15fe998cffa14cb24a4febb9d,2024-05-21T12:37:59.687000
|
||||
CVE-2024-47000,0,0,d44e65f26ff5211f3ae15f921442088284d2de145a1f7d23069c9caedddf80a6,2024-09-24T20:25:30.493000
|
||||
@ -261998,7 +262005,7 @@ CVE-2024-4717,0,0,7921e256cd1b57dcd690590999b44ca8d29db58a18405deda5f12fdfca691a
|
||||
CVE-2024-47170,0,0,5b51e77bbaf0aa4d73aaed7035aaf98c0f3c0e8a355756474eeb1aa8a1be9c4f,2024-09-30T12:46:20.237000
|
||||
CVE-2024-47171,0,0,48e31c72c69d0bb6a9d666c7c99661a52d3c05dd11adcb85b19ee942d0085d2e,2024-09-30T12:46:20.237000
|
||||
CVE-2024-47172,0,0,4b79f4b3803af95fc411c443fe5cc5794c9441cfc034adffdc054b0882caedf7,2024-10-04T13:51:25.567000
|
||||
CVE-2024-47173,1,1,25b0312246555b80a6520c6df372eba8e49ba0734474a70ffb9ed2408cefaebf,2024-10-24T19:15:14.817000
|
||||
CVE-2024-47173,0,0,25b0312246555b80a6520c6df372eba8e49ba0734474a70ffb9ed2408cefaebf,2024-10-24T19:15:14.817000
|
||||
CVE-2024-47174,0,0,45d61976806e6f261b6617173dfdd81cff9ff5aea1e4ed00e3593fe1fbbae7df,2024-09-30T12:46:20.237000
|
||||
CVE-2024-47175,0,0,98b0f302dda13c9ca08be74248115e033049a678f05ea7e4015fd75a9b0cd66d,2024-09-30T12:46:20.237000
|
||||
CVE-2024-47176,0,0,1236859fb548f3604f95f88a62b235a85b1497f9815e39d76c2bb849d27602db,2024-10-02T20:15:11.520000
|
||||
@ -262229,7 +262236,7 @@ CVE-2024-47562,0,0,f948ab473eac72b74771d65275c3bce022b2870f6200aad718c4a235ef7a7
|
||||
CVE-2024-47563,0,0,8e14a8aeeab89240dc7f71203e62b9d2c2b2c697ebcb095329938e996837371a,2024-10-11T20:05:05.143000
|
||||
CVE-2024-47565,0,0,1f4de7ea43d4059fde3978664bf9271defcef7d2ededc73cf25a3c2fbdf29d8c,2024-10-11T20:05:59.237000
|
||||
CVE-2024-4757,0,0,8697ca9e70d5ba37736a0a67620900f7a3da7cbcb97e29086de20de73cd3bfef,2024-07-03T02:08:02.463000
|
||||
CVE-2024-47575,0,1,45fa428c1b4284f712341ec98e74ee7d5ba71df025a020ce212880fb54ef8dfe,2024-10-24T18:56:47.930000
|
||||
CVE-2024-47575,0,0,45fa428c1b4284f712341ec98e74ee7d5ba71df025a020ce212880fb54ef8dfe,2024-10-24T18:56:47.930000
|
||||
CVE-2024-4758,0,0,725af37997323245576176c0490558b45926193602683436c3054da734872332,2024-07-03T02:08:02.707000
|
||||
CVE-2024-4759,0,0,88e594c7c898a4e82a1a8532a1f049d1a9fe25baf60278988c21dabe64f2896b,2024-07-03T02:08:02.923000
|
||||
CVE-2024-47594,0,0,1ae534f7a3c1c97ead2076790a49a30a6aebae2067756e88afe36b9237831ffa,2024-10-10T12:57:21.987000
|
||||
@ -262468,7 +262475,13 @@ CVE-2024-47874,0,0,88e5d0bddb2eed021dc78650aabb938bda29c8272245d4971b4c42756e899
|
||||
CVE-2024-47875,0,0,7d3f699a2dfd28fae24f11f0ffebcb02477b8963ab93d8f474f9ee88d14cf58e,2024-10-15T12:58:51.050000
|
||||
CVE-2024-47876,0,0,1c9291ffcd100f5445236e1c704211e20624e03c95916aeaee6676900242dcd8,2024-10-16T16:38:43.170000
|
||||
CVE-2024-47877,0,0,42d52e9a067bcb9f8cadc0b4324eaa32d4b8c11c11d62f0e9296f0c93d92bc00,2024-10-15T12:57:46.880000
|
||||
CVE-2024-47878,1,1,6a12549d5ddab7cb2f08af44b6f03f9581ecd0ce4ccac29cde3371a2fe32d986,2024-10-24T21:15:12.293000
|
||||
CVE-2024-47879,1,1,0637657e23bf47a56fc2ccd272e3d67c5502a5f9055f76ada6c94a9795fb6723,2024-10-24T21:15:12.523000
|
||||
CVE-2024-4788,0,0,036e4ce9e476328c73022572d41365684f416f1f77ea3a1f5e72bdd2454ce2ec,2024-08-05T20:23:52.467000
|
||||
CVE-2024-47880,1,1,284aaacc3ea9751c521883a4130e34ef0be92bd63b4d6c94042c415d90c23524,2024-10-24T21:15:12.750000
|
||||
CVE-2024-47881,1,1,b50839dd365fd4efe4b78d6ccb2b031d8e4f17af022b3e7bb61b4f89a88cd655,2024-10-24T21:15:12.957000
|
||||
CVE-2024-47882,1,1,dfa40aa92880435b3b642b6706da4d6e6f5868973f7967fbe7de7582c65f84a2,2024-10-24T21:15:13.160000
|
||||
CVE-2024-47883,1,1,5bc92c060441a71da4f11273814c3adebc694f79bfeba110bbb1aa8caa763089,2024-10-24T21:15:13.430000
|
||||
CVE-2024-47884,0,0,4b7292fdbf8233f599cca6380416fda96798ff386a0442d2b37eeea12dd398ed,2024-10-15T12:57:46.880000
|
||||
CVE-2024-47885,0,0,0d40ba494c86913544c4c9553c55befe8904b360cb2214c55ae6a6aeadb78d12,2024-10-15T12:57:46.880000
|
||||
CVE-2024-47887,0,0,a738abaa50c0f4cc119f2ab1db4d555ac635e57265d1892adcc800cfdded0011,2024-10-18T12:53:04.627000
|
||||
@ -262558,14 +262571,14 @@ CVE-2024-48119,0,0,6022221da5fd10d70715948b01fe2f7f8a0f43256a22ac2ee84f2922fba50
|
||||
CVE-2024-4812,0,0,96f0244e64d02e8b825789000f88a75dd5b3d67c4d6e5fa4b2230b6ad5599e15,2024-06-18T18:49:19.783000
|
||||
CVE-2024-48120,0,0,9504bbf5097a8042aa622e4bcffcd74f79e5a7cbeebb7a1d1951fd43248d522c,2024-10-15T16:35:09.650000
|
||||
CVE-2024-4813,0,0,ffced1bec51c6384e79d75317b856f32e05abf0a3cdd3adf718b586086ffad4a,2024-06-04T19:20:50.970000
|
||||
CVE-2024-48139,1,1,d6ed07547f7603768865e253f9fa277c4c0effbd5fa0d391daf68b8f307d7eb9,2024-10-24T19:15:15.050000
|
||||
CVE-2024-48139,0,0,d6ed07547f7603768865e253f9fa277c4c0effbd5fa0d391daf68b8f307d7eb9,2024-10-24T19:15:15.050000
|
||||
CVE-2024-4814,0,0,6ed65b628d782e4c0035f27d12907232951228fb5dd63de02df922628089b508,2024-06-04T19:20:51.077000
|
||||
CVE-2024-48140,1,1,dfeef73409fff7eba38e932c52f1a85532a96d7282df609347b4f4c1be1c9e21,2024-10-24T19:15:15.150000
|
||||
CVE-2024-48141,1,1,eee86c527f910cf44eef17cb96788695084b540e91fdea5652cc9032c32ba2a0,2024-10-24T19:15:15.240000
|
||||
CVE-2024-48142,1,1,5e09d80b70ae1c1370cf5625d40b9c9431b3acfa7452f829828119c0e1b16139,2024-10-24T19:15:15.333000
|
||||
CVE-2024-48143,1,1,7d0f5bf4da43da110ac78a237a08e3a5ded43ba9ec77eb3c73f07d90f1591c4e,2024-10-24T19:15:15.427000
|
||||
CVE-2024-48144,1,1,20ee409c728fbf50d2dd0717a0f9484a812232a1e6450931cf72a4a9d382fa50,2024-10-24T19:15:15.510000
|
||||
CVE-2024-48145,1,1,f97aa6f2f2dc7108422f93720da6ac0ea9cb673f4750cd0be12c42fb4b0d0e9c,2024-10-24T19:15:15.607000
|
||||
CVE-2024-48140,0,0,dfeef73409fff7eba38e932c52f1a85532a96d7282df609347b4f4c1be1c9e21,2024-10-24T19:15:15.150000
|
||||
CVE-2024-48141,0,0,eee86c527f910cf44eef17cb96788695084b540e91fdea5652cc9032c32ba2a0,2024-10-24T19:15:15.240000
|
||||
CVE-2024-48142,0,0,5e09d80b70ae1c1370cf5625d40b9c9431b3acfa7452f829828119c0e1b16139,2024-10-24T19:15:15.333000
|
||||
CVE-2024-48143,0,0,7d0f5bf4da43da110ac78a237a08e3a5ded43ba9ec77eb3c73f07d90f1591c4e,2024-10-24T19:15:15.427000
|
||||
CVE-2024-48144,0,0,20ee409c728fbf50d2dd0717a0f9484a812232a1e6450931cf72a4a9d382fa50,2024-10-24T19:15:15.510000
|
||||
CVE-2024-48145,0,0,f97aa6f2f2dc7108422f93720da6ac0ea9cb673f4750cd0be12c42fb4b0d0e9c,2024-10-24T19:15:15.607000
|
||||
CVE-2024-4815,0,0,a12a3714528f7b768c4c9101b510e3e25b21fa14abf883b4fca5d245888d3088,2024-06-04T19:20:51.183000
|
||||
CVE-2024-48150,0,0,3a74ef17dd937b2ce7ec4baf65ca0a0269cc457ed04e16b8c883126dbac56b6f,2024-10-15T16:35:10.450000
|
||||
CVE-2024-48153,0,0,ed2a32bb2c14f00255ae97ac8d2c6b7371ced6a3b47f478082697408eb2eccac,2024-10-17T18:35:10.707000
|
||||
@ -262577,6 +262590,7 @@ CVE-2024-48180,0,0,5891665b96e5bb6f8325528a26dbdcd36c2f7a69e9155272862a28dae07f4
|
||||
CVE-2024-4819,0,0,bc26e072d222c9731ee42bb1198fec18f8f3236e713c07e319d531bbf6577caa,2024-06-04T19:20:51.613000
|
||||
CVE-2024-48192,0,0,50ca3857fa6f25fe2966bfab9679a90bf80eec0b1a66f64f4eaab1d030168651,2024-10-18T12:52:33.507000
|
||||
CVE-2024-4820,0,0,832738c431d4032e72cf5367ea2c2310b7c6cd840d9bc0fc3f10b9e1f0e05ed2,2024-06-04T19:20:51.710000
|
||||
CVE-2024-48208,1,1,8d9bf7193529295bbcf221221e1dad02aac7d666b68c4aaf492bea77d35673bc,2024-10-24T21:15:14.040000
|
||||
CVE-2024-4821,0,0,dc7d4132f68a39a1fe6c6bac80c0ac3156e2e90bf5e433ad24749311cb9093af,2024-06-11T17:29:33.213000
|
||||
CVE-2024-48213,0,0,9acba2f77331378acc2327633dc745b7cd0142fda56453bd7cad6ba33d483d3d,2024-10-23T22:15:02.600000
|
||||
CVE-2024-4822,0,0,35737e7a1acb373d4b9b0a7db2a81b8ded4d641f08c88a2e676b684417908472,2024-05-14T16:11:39.510000
|
||||
@ -262607,33 +262621,37 @@ CVE-2024-4841,0,0,65ebfdfe2681835a6b4ece6477d685d2c79df9dc285d61b3c6847a6703ab51
|
||||
CVE-2024-48411,0,0,f02f5a173c68a1066ae1d0ad3ecb091448747ebc7ae5d98814db8ad4f2b7f72f,2024-10-16T19:35:11.290000
|
||||
CVE-2024-48415,0,0,f0924ee00bd27af7c2e3b4df709006fd2e622c007a3785ddb6461472428a80bb,2024-10-23T16:35:09.317000
|
||||
CVE-2024-4842,0,0,266948939b8663b41b45dca8cb12f3f3247c17eab2663a8a73d7a0fbf198d426,2024-05-30T20:15:09.703000
|
||||
CVE-2024-48427,1,1,b915126bb99cfd938cf21385d6a03b7881d183c1661def008f3bd462961c90da,2024-10-24T19:15:15.703000
|
||||
CVE-2024-48423,1,1,89da1be78ed0de5633d53fa4447af647ff25fe50e4b81e14ef8f0786f2dc7e2a,2024-10-24T21:15:14.143000
|
||||
CVE-2024-48424,1,1,dbc2e0c8c06b8ffdffd23459075027ff9cbcd101768c8979714c5a09f46fea57,2024-10-24T21:15:14.223000
|
||||
CVE-2024-48425,1,1,d25461bc59be120a67c064e10771de5b714958b59599ddc0afeab7fb071765fb,2024-10-24T21:15:14.303000
|
||||
CVE-2024-48426,1,1,9d7c477a1623fd3fcd4e2f8515f69e1566d150e8b3386e6fdf475fc323c3097e,2024-10-24T21:15:14.387000
|
||||
CVE-2024-48427,0,0,b915126bb99cfd938cf21385d6a03b7881d183c1661def008f3bd462961c90da,2024-10-24T19:15:15.703000
|
||||
CVE-2024-4843,0,0,b365eeabe96e8dec3f961357ff342df21bbefef716d14e64f95fe3929d1e363a,2024-05-16T13:03:05.353000
|
||||
CVE-2024-4844,0,0,b1cdfd63abb8075cb2a12dc44eacca2f75c6048adf9c4ea8b8b7c6072669030d,2024-05-16T13:03:05.353000
|
||||
CVE-2024-48440,1,1,88afc6f58873a5bd37dc9229c56f010e9701063642a2a78c89c795057409a8c3,2024-10-24T18:15:09.190000
|
||||
CVE-2024-48441,1,1,e3b28b135bd4d048d7af438b2ad84c0f8403bdae07b4248663c93a98599da599,2024-10-24T18:15:09.583000
|
||||
CVE-2024-48442,1,1,cd4f2215d895367e53ea257b0a4be0990410ba42e316921212d9f6d26caed6f7,2024-10-24T18:15:09.890000
|
||||
CVE-2024-48440,0,0,88afc6f58873a5bd37dc9229c56f010e9701063642a2a78c89c795057409a8c3,2024-10-24T18:15:09.190000
|
||||
CVE-2024-48441,0,0,e3b28b135bd4d048d7af438b2ad84c0f8403bdae07b4248663c93a98599da599,2024-10-24T18:15:09.583000
|
||||
CVE-2024-48442,0,0,cd4f2215d895367e53ea257b0a4be0990410ba42e316921212d9f6d26caed6f7,2024-10-24T18:15:09.890000
|
||||
CVE-2024-4845,0,0,f8e5a569577a931ed62905431d3e7dc57f80df89344697bf8fc7f196d4c6a1d9,2024-07-23T17:23:41.597000
|
||||
CVE-2024-48454,1,1,34e88a1ad53cbd83b0c86e1af450c0246ceedd95ac8dfdc33afc121ec5dc990b,2024-10-24T19:15:15.803000
|
||||
CVE-2024-48454,0,1,cbd7d1efbc522c443f78b7a0c38957e1ad80bf68787a915e8fbb212f54bd8823,2024-10-24T21:35:05.410000
|
||||
CVE-2024-4846,0,0,354213cecebbad5d2830809199864dadc70a5508c38afeb47a24b8f17c4c0fe1,2024-06-25T18:50:42.040000
|
||||
CVE-2024-4847,0,0,3e175fcde7743d0dafc07697dcd3c0585505cba50a8840c440513434f4a1e2f1,2024-05-15T16:40:19.330000
|
||||
CVE-2024-4848,0,0,e9a992014a82f7f25ea8b020a59a54821debcc21ba29ea30b909eb2d249ee224,2024-07-29T11:15:09.920000
|
||||
CVE-2024-4849,0,0,ea1119b37dea5602dfce7972c7449fed4caaba21295f1145a8612489a3c2fd07,2024-05-20T13:00:34.807000
|
||||
CVE-2024-48509,0,0,c6a322b44f1b5c48c99b4ab0a24ca78577b459bf4c9409e8862d334d073306ba,2024-10-23T15:12:34.673000
|
||||
CVE-2024-4851,0,0,444f4e959fbd50fab42bb9cd6f5b1019a6d50ea56a5371bcf4f4fa6566e3e360,2024-10-17T18:45:13.093000
|
||||
CVE-2024-48514,1,1,09d714c67d2d2f09be073ea6d53cfb7a82d3597f530a76d50d0b7f262abf2baa,2024-10-24T18:15:10.227000
|
||||
CVE-2024-48514,0,0,09d714c67d2d2f09be073ea6d53cfb7a82d3597f530a76d50d0b7f262abf2baa,2024-10-24T18:15:10.227000
|
||||
CVE-2024-4853,0,0,7e943be0a2434f6362f67f453fe22910f05fecde26076344b21d97f20b2d6efa,2024-08-29T15:15:31.687000
|
||||
CVE-2024-48538,0,0,dadc6051db8759534fe89315aed37502c34e5b56c665246d832d6d18a18543de,2024-10-24T16:15:05.210000
|
||||
CVE-2024-48539,0,0,be4889126f141dfbdc6e2433d99c3daffa1a8da8d0c7c7fc879a44f6c2251d0c,2024-10-24T17:15:16.873000
|
||||
CVE-2024-48538,0,1,93c25a23e70da94546cfcd6a85313310cb2740d1f764ddbbbbd1d1a3ec0b79f8,2024-10-24T20:35:10.890000
|
||||
CVE-2024-48539,0,1,e6db30982b3fe01f6a261ef9b0aa8eb6f3c5c34d50d31b9e3da7e644365a2ee9,2024-10-24T20:35:11.713000
|
||||
CVE-2024-4854,0,0,9d5d733c00183e47994464da1b76a252c7e4b8268459cd8a1634b1fda6297d73,2024-08-29T15:15:31.797000
|
||||
CVE-2024-48540,0,0,58c5ed3a4f6c16734d8df4a028a090a29237a126df7814573b2ad97904b8f426,2024-10-24T17:15:16.967000
|
||||
CVE-2024-48541,0,1,2d1760725ee9fc68d63395107ba154f476370d3f43646be2a1e082989d14d579,2024-10-24T19:35:04.263000
|
||||
CVE-2024-48542,0,1,95d0562f9fbfeb9012b52632ad838b2b85fa093f22956c17a96e66e33b2baf4b,2024-10-24T19:35:05.013000
|
||||
CVE-2024-48544,0,0,124659c28d5b6f5e5cdb2a9ad0e42300f914ae0aa4e9efb15dd6f767f0dbfa8a,2024-10-24T17:15:17.257000
|
||||
CVE-2024-48545,0,1,ef403d082c3d91800733fca609f0434128edabfbaae749785d13c103549498e3,2024-10-24T19:35:05.767000
|
||||
CVE-2024-48546,0,1,3d5f1fe8e93e0caca62917dfb71818c633551cf5ded134b2d4b4298fccd0322a,2024-10-24T19:35:06.563000
|
||||
CVE-2024-48547,0,1,2bbaa609896584d67644fbb09a4bfdbea61913d2d0753af7e9e6b82679e61355,2024-10-24T19:35:07.320000
|
||||
CVE-2024-48548,0,0,34778b0a1151822f708ea1f53b0b807b21b36fa281f672fd592e9a5093322129,2024-10-24T17:15:17.663000
|
||||
CVE-2024-48541,0,0,2d1760725ee9fc68d63395107ba154f476370d3f43646be2a1e082989d14d579,2024-10-24T19:35:04.263000
|
||||
CVE-2024-48542,0,0,95d0562f9fbfeb9012b52632ad838b2b85fa093f22956c17a96e66e33b2baf4b,2024-10-24T19:35:05.013000
|
||||
CVE-2024-48544,0,1,eecaf3c9522aac12bd369d4e73db52bc1e66dce83085e58f7146e19d1b1d06fe,2024-10-24T21:35:06.263000
|
||||
CVE-2024-48545,0,0,ef403d082c3d91800733fca609f0434128edabfbaae749785d13c103549498e3,2024-10-24T19:35:05.767000
|
||||
CVE-2024-48546,0,0,3d5f1fe8e93e0caca62917dfb71818c633551cf5ded134b2d4b4298fccd0322a,2024-10-24T19:35:06.563000
|
||||
CVE-2024-48547,0,0,2bbaa609896584d67644fbb09a4bfdbea61913d2d0753af7e9e6b82679e61355,2024-10-24T19:35:07.320000
|
||||
CVE-2024-48548,0,1,6aa626d9d4fb8e41914be3bc122dcb6a13ad79eabefb0826ec61c69e3c941808,2024-10-24T21:35:07.050000
|
||||
CVE-2024-4855,0,0,c93719b20367086f39a585784c8fe87b51678f3d6fabb283bc26fc5dedf0f872,2024-08-29T15:15:31.893000
|
||||
CVE-2024-4856,0,0,01234b09ea1a4585c989c1dc87d23ed182241e8a50536214983ade66b15e19f8,2024-06-04T16:57:41.053000
|
||||
CVE-2024-4857,0,0,1a28f92c79b598b55521235359a1d50b478306861b37a5a0ef0abc4d3160ef4c,2024-06-04T16:57:41.053000
|
||||
@ -262751,6 +262769,8 @@ CVE-2024-48927,0,0,01a9606e87c9d0fe295b7af78c12d3892f336c8d52386afeb159eacf9a03d
|
||||
CVE-2024-48929,0,0,8f42514e5e40293361141ad0a32c5cc2c18cee04cb42f38abe2f83b6fba170dd,2024-10-23T15:12:34.673000
|
||||
CVE-2024-4893,0,0,c4900f559bdc4a1c952ec15ffc0a407a7d0fc758594c29af597940962bf437f6,2024-05-15T16:40:19.330000
|
||||
CVE-2024-48930,0,0,c7b6cd0340da2631ccf07a7015b8cf581a1e5f29f6a6b1ff9f3168b16f8d9c48,2024-10-21T17:09:45.417000
|
||||
CVE-2024-48931,1,1,db9cdbd978b5e846ca388828c9a36b00b388132edef9463aebcc700ba8e86180,2024-10-24T21:15:14.580000
|
||||
CVE-2024-48932,1,1,72ddca77e442289d84b6d93c091c087fe60047a92c1cee4761989b03164b7098,2024-10-24T21:15:14.790000
|
||||
CVE-2024-48933,0,0,eab55cc4133fd12eb852707496206c0c064cf1bfef188e95346821cf2dadf897,2024-10-15T18:56:52.363000
|
||||
CVE-2024-48937,0,0,53216fc8a6fbe5febb4c086d6958028e95a58513bdf6caced98eaac34038db0e,2024-10-17T19:48:11.163000
|
||||
CVE-2024-48938,0,0,42546c0230f7c9740d6f2b303141b0c584cd79f3d515c30c7b8554d560fc1ee9,2024-10-17T19:49:56.327000
|
||||
@ -263054,23 +263074,23 @@ CVE-2024-49859,0,0,d128ad3420c66b03d628db278329ad6a0d637911116441391f7baa845a99a
|
||||
CVE-2024-49860,0,0,58465836429dbe2e6aaf835a73a59e39240a71d370ac212d7b09986db7503b3c,2024-10-23T16:44:58.473000
|
||||
CVE-2024-49861,0,0,1653e7df85a45b515fcdc441f9cb9f122cb6f11d500f6cbca9f4d9d62723f07c,2024-10-23T16:48:47.573000
|
||||
CVE-2024-49862,0,0,e0b25be7c75d96f390f553fe793605e2691bfb34c1e389879a3cd9200ce6c511,2024-10-23T16:53:51.050000
|
||||
CVE-2024-49863,0,1,41eb15cefa65add4e21060b9ff62fd64839f2e02cd81a7af8fe6b7da8453fc42,2024-10-24T19:43:56.103000
|
||||
CVE-2024-49863,0,0,41eb15cefa65add4e21060b9ff62fd64839f2e02cd81a7af8fe6b7da8453fc42,2024-10-24T19:43:56.103000
|
||||
CVE-2024-49864,0,0,11ee8b000b9a62890a75dd63920e4a33890ab9d058f73a94a2fe3382caeb81d2,2024-10-23T15:13:58.783000
|
||||
CVE-2024-49865,0,0,c4cae66eab62f15595d2364d0fa9447b0b6ab33d31dbe60340c7ef0ef852d1c8,2024-10-24T03:44:33.947000
|
||||
CVE-2024-49866,0,0,64fdfad45770d631f65ff417b8e0b441a9ced54aafec781f55abff0506219420,2024-10-23T15:13:58.783000
|
||||
CVE-2024-49867,0,0,11525928326247994afa37f5f74290d14e35f5766721fa984acf8b349134099f,2024-10-23T15:13:58.783000
|
||||
CVE-2024-49868,0,0,6609c1a314b5164f8a7adeabef80c2a74cbb80bc7c2a2e5c84963dbc51c9cd4a,2024-10-23T15:13:58.783000
|
||||
CVE-2024-49869,0,0,d690b4f2f8651d319485a5bc5cca48765c250e0f74f356167c1a1d3ed44b7fd9,2024-10-23T15:13:58.783000
|
||||
CVE-2024-49869,0,1,1ef7e6775f5061caa7e4dead4df8426a79419a75af385b7d702a23087606b23b,2024-10-24T20:28:21.597000
|
||||
CVE-2024-49870,0,0,bd25832bdab748cbefddb0beafc59ded25cc04cad6fd191b9be1b37f3e63d060,2024-10-23T15:13:58.783000
|
||||
CVE-2024-49871,0,0,ff3a0400aee2237325121a8977f8f422a8adc0802dd41c581f84b4b2b95f7591,2024-10-23T15:13:58.783000
|
||||
CVE-2024-49871,0,1,c02508465ea9d0c1ce0cc95a6cd2e44aadfbb3634ea87e7cb860d1d87e5795b7,2024-10-24T20:22:19.530000
|
||||
CVE-2024-49872,0,0,f6cbcd97baebde3f8280c71cb6b25b64732424c878389d8a2470cbdc55168647,2024-10-23T15:13:58.783000
|
||||
CVE-2024-49873,0,0,c6b069511598e461d2e296ba6e220ac16e5f671f4d49f2f2af9d3aa6afc61d05,2024-10-23T15:13:58.783000
|
||||
CVE-2024-49874,0,0,4f4502a656a6919bb0fc2df63ac79790c27837d9594594fa2f35c7d172253253,2024-10-23T15:13:58.783000
|
||||
CVE-2024-49875,0,0,82bafbcf170d072fa3aabc0828e31168f5d6064939d809bc95477f24f2a13491,2024-10-23T15:13:58.783000
|
||||
CVE-2024-49876,0,1,0c2ec3870c02d4651dcfea621e276acb9d0ae36a4e21afff13d7735e3b487729,2024-10-24T19:57:06.843000
|
||||
CVE-2024-49877,0,1,d6737343e2e6d35b24e2372e9def747b4bc65b280702cdab9fa882c14670143a,2024-10-24T19:58:55.383000
|
||||
CVE-2024-49873,0,1,9dd0affda433e9ea1287a2619ec66001c95cda8669905ec1e1e5816fb33b6e00,2024-10-24T20:22:42.387000
|
||||
CVE-2024-49874,0,1,bb64364be843ef37eaa2e7e28e1c1f68871769861f3b1beeca2cf5035cca4de4,2024-10-24T20:27:51.700000
|
||||
CVE-2024-49875,0,1,752d21cda2ec448a67a51c1316311354be9fdd8594fd8f17251472d1e3b8d00b,2024-10-24T20:13:50.927000
|
||||
CVE-2024-49876,0,0,0c2ec3870c02d4651dcfea621e276acb9d0ae36a4e21afff13d7735e3b487729,2024-10-24T19:57:06.843000
|
||||
CVE-2024-49877,0,0,d6737343e2e6d35b24e2372e9def747b4bc65b280702cdab9fa882c14670143a,2024-10-24T19:58:55.383000
|
||||
CVE-2024-49878,0,0,b8c9bc38c52857d113170f626183012a77e29f98422a41470a6d55d4836a25af,2024-10-23T15:13:58.783000
|
||||
CVE-2024-49879,0,1,4ba4f4e2755978e6b26e142493deaf8ac3f7043a28c24533d747809c633568d6,2024-10-24T19:59:12.897000
|
||||
CVE-2024-49879,0,0,4ba4f4e2755978e6b26e142493deaf8ac3f7043a28c24533d747809c633568d6,2024-10-24T19:59:12.897000
|
||||
CVE-2024-4988,0,0,ff557f66f633c813e65ed42f6b56820b4233d3efc23d00548e6797ba166f3d35,2024-08-21T03:15:05.460000
|
||||
CVE-2024-49880,0,0,451749fefd67e74bbeb3c0f709643bae60f2a71eb71ec77d830a94e7a1231b73,2024-10-23T15:13:58.783000
|
||||
CVE-2024-49881,0,0,a457e708f151afe70f4353ab787a197eced712e7eb008a4ae460560f613817df,2024-10-23T15:13:58.783000
|
||||
@ -263117,7 +263137,7 @@ CVE-2024-4992,0,0,e061228a83f2d41e21e64f404fd50aefb3a354b638438e4cf4870e41885d01
|
||||
CVE-2024-49920,0,0,1be42ef77ee9fc1c65ad81ab0dcd66fba1641a6fdde817094ddeecfb3f06d5d0,2024-10-23T15:13:25.583000
|
||||
CVE-2024-49921,0,0,6967ef728c2f67d4bb212d10da40edb6fbaf0fe7acdb581bbe0d307f401b8b13,2024-10-23T15:13:25.583000
|
||||
CVE-2024-49922,0,0,ca91ba7162cc32dc4e2cf14fb163208d854cd671aa75638cf4d3976a29621ea0,2024-10-23T15:13:25.583000
|
||||
CVE-2024-49923,0,1,09ac36e1842b66b81133b68e0fa1454145946558f64c3262440b063666a332ca,2024-10-24T19:43:27.327000
|
||||
CVE-2024-49923,0,0,09ac36e1842b66b81133b68e0fa1454145946558f64c3262440b063666a332ca,2024-10-24T19:43:27.327000
|
||||
CVE-2024-49924,0,0,e3e9d77dac8e6a933e59737e42ece4edc4793234e163acb67d340babaa85575b,2024-10-23T15:13:25.583000
|
||||
CVE-2024-49925,0,0,6717452f4abf1a8f70ff5a0320447c3ada5e06f5537ce54743f004253e0476ee,2024-10-23T15:13:25.583000
|
||||
CVE-2024-49926,0,0,c340907a54f3f82bc1267ccf326bdc9da10ebc5c7cb46a2ab73c0d413d3ff7bf,2024-10-23T15:13:25.583000
|
||||
@ -263235,26 +263255,26 @@ CVE-2024-5003,0,0,657f01af6ae4ffebd5508957e0a4ee664437c9c42d64fc0c4eaff54aefed65
|
||||
CVE-2024-50030,0,0,0347086f25dca26915e1436dcfd2de7f4b8fab3635e9fbe7eb8d2175af5dab95,2024-10-23T15:12:34.673000
|
||||
CVE-2024-50031,0,0,cc20af791cbec3a7c1c3bd59071b20e2915a6a03702994dd9f9650b8797df511,2024-10-23T15:12:34.673000
|
||||
CVE-2024-50032,0,0,9431344800434d7ee15e18d71c026f970a422c249ecc1b3c7c4159bc2d6ab597,2024-10-23T15:12:34.673000
|
||||
CVE-2024-50033,0,1,31b01ea83bcca81918c070b63b5485c88672f34d727199970bc597721f06bb09,2024-10-24T19:56:04.097000
|
||||
CVE-2024-50034,0,1,ef0ee6c054fa6d95d82a1cc5e3a063aef10790efa19e561bb55f1a0df403b297,2024-10-24T19:56:29.170000
|
||||
CVE-2024-50035,0,1,9397571eb914efebc6686d6fee86d3765ca656654c3527a13621032f6dad372b,2024-10-24T19:54:01.987000
|
||||
CVE-2024-50033,0,0,31b01ea83bcca81918c070b63b5485c88672f34d727199970bc597721f06bb09,2024-10-24T19:56:04.097000
|
||||
CVE-2024-50034,0,0,ef0ee6c054fa6d95d82a1cc5e3a063aef10790efa19e561bb55f1a0df403b297,2024-10-24T19:56:29.170000
|
||||
CVE-2024-50035,0,0,9397571eb914efebc6686d6fee86d3765ca656654c3527a13621032f6dad372b,2024-10-24T19:54:01.987000
|
||||
CVE-2024-50036,0,0,28901e0166f56dd1988eca00f958e5283f611146fde3cc7b000114e6ee533ed9,2024-10-23T15:12:34.673000
|
||||
CVE-2024-50037,0,0,4ee031bfddc4e8f99ddb949f282f6ad1a356c779ae1c3537126fd37e56dbeca8,2024-10-23T15:12:34.673000
|
||||
CVE-2024-50038,0,0,13f261ea139b7c77c532175eab38c9e4be7c3afe3db507ae1ed5105376d28292,2024-10-23T15:12:34.673000
|
||||
CVE-2024-50039,0,0,75801edb89c7be222bf7c69a5ad76563c04d4f50df342fe887cbc18b83b75ff9,2024-10-23T15:12:34.673000
|
||||
CVE-2024-5004,0,0,dbb46916d3eaa00ba190ac36848b4f73f0fcf9ebf3415c8f81f52119cf8e2d54,2024-08-01T13:59:37.913000
|
||||
CVE-2024-50040,0,0,981131558689eff63e7408bc26260009c579c8ae379b09b9fc858d45385e4ec1,2024-10-23T15:12:34.673000
|
||||
CVE-2024-50041,0,1,d48ad1d9e36b6ac3d6d954212f935345fcc28a78e693e8da5498dd1085259517,2024-10-24T19:31:39.373000
|
||||
CVE-2024-50041,0,0,d48ad1d9e36b6ac3d6d954212f935345fcc28a78e693e8da5498dd1085259517,2024-10-24T19:31:39.373000
|
||||
CVE-2024-50042,0,0,47d7a84ed9d469b00f4e210ab7562f73a18e6669a1c07a4576676ffef293e83f,2024-10-23T15:12:34.673000
|
||||
CVE-2024-50043,0,1,2972cb53a30dd078fc2eb8fda442a65781870d0dbaebb36d8be92565bfd7f051,2024-10-24T19:32:21.480000
|
||||
CVE-2024-50044,0,1,41e0e7cf31c36df6f6442bbd80b53a07a7e614cf4d1cf42a43ab7eecafb0b9a9,2024-10-24T19:36:12.717000
|
||||
CVE-2024-50045,0,1,6b3c6f611baa60631c237de06e0c9f244d76e5c84ee48cc375c5fff0d7c11f86,2024-10-24T19:38:03.343000
|
||||
CVE-2024-50046,0,1,92dff903e2c1a515c4d71882720d0d8376f6d82cd5b825071a3b47f34c34752e,2024-10-24T18:59:55.950000
|
||||
CVE-2024-50043,0,0,2972cb53a30dd078fc2eb8fda442a65781870d0dbaebb36d8be92565bfd7f051,2024-10-24T19:32:21.480000
|
||||
CVE-2024-50044,0,0,41e0e7cf31c36df6f6442bbd80b53a07a7e614cf4d1cf42a43ab7eecafb0b9a9,2024-10-24T19:36:12.717000
|
||||
CVE-2024-50045,0,0,6b3c6f611baa60631c237de06e0c9f244d76e5c84ee48cc375c5fff0d7c11f86,2024-10-24T19:38:03.343000
|
||||
CVE-2024-50046,0,0,92dff903e2c1a515c4d71882720d0d8376f6d82cd5b825071a3b47f34c34752e,2024-10-24T18:59:55.950000
|
||||
CVE-2024-50047,0,0,14e282f60ba539c523eed67f2ff3efdc4ac28f90eb922d10809f6bfe74f01181,2024-10-23T22:16:21.783000
|
||||
CVE-2024-50048,0,0,d005bc43ac7dffe85bb1b4c62a0be79335a5f23ef87660a48780d7c73272a7ca,2024-10-23T21:46:11.533000
|
||||
CVE-2024-50049,0,0,8a3f3791bfb77ef3d490e872a72df28d44a50dd01f038b8f63798b04c8c73740,2024-10-23T21:45:43.657000
|
||||
CVE-2024-5005,0,0,28bdb1683e492d24b33087981d0823dd42f49eeb8c271eabba28b1e925e506ca,2024-10-15T12:58:51.050000
|
||||
CVE-2024-50050,0,1,66652f02df241336011c1992f267ec2c5372a9547dcd28fcca3e67d65a218700,2024-10-24T19:35:08.107000
|
||||
CVE-2024-50050,0,0,66652f02df241336011c1992f267ec2c5372a9547dcd28fcca3e67d65a218700,2024-10-24T19:35:08.107000
|
||||
CVE-2024-50055,0,0,223ed98e7a7f4160f8634a62679e487b1296c8eb2d61be84de5731c91a2cb49b,2024-10-23T21:45:15.137000
|
||||
CVE-2024-50056,0,0,67d5758c0ace6615570a11511305d2b63ab44abb1709d3f0417dc90e404e22ad,2024-10-23T15:12:34.673000
|
||||
CVE-2024-50057,0,0,ba05620682b6a9a556450ee0eed48c115fc6212d5ab9174ae69859e3d6638159,2024-10-24T16:12:52.007000
|
||||
@ -263296,8 +263316,8 @@ CVE-2024-5035,0,0,592ce94ebba91d65c9cac29085dbc465d14be23d13ac08f1e0101f9ce552a8
|
||||
CVE-2024-5036,0,0,e97b40bd40cf208c311323e6564cb1ded96d8cc433059436a8705289f1e02a66,2024-06-20T12:43:25.663000
|
||||
CVE-2024-5037,0,0,46d4a5c4b83922b1ee19bcb8bbc97a0a290a2086fb5a073395bdb9a5e03441e0,2024-08-19T17:15:09.807000
|
||||
CVE-2024-5038,0,0,99b942f340bd77179350025250d1eccbd97ee2b6f6339af49bfd1a72be63cbf5,2024-06-11T17:41:37.883000
|
||||
CVE-2024-50382,0,0,ef507e79e3a47cb5db46886c833025ed9d096f55ed6dede99fee1d7a588181b0,2024-10-23T17:15:19.453000
|
||||
CVE-2024-50383,0,0,b31f839fb6680eaf55759b6413c371459ae54edfc8f56e29ccc0f46b2b3bc113,2024-10-23T17:15:19.540000
|
||||
CVE-2024-50382,0,1,c7db57f8effd3e1ea04692a5bac746c796993a38c824e102eb82dd6f88f2b374,2024-10-24T20:35:12.650000
|
||||
CVE-2024-50383,0,1,0c7ab126828c2415a37efc5d6f10e03eeca3ebe4707c43955c3e9d43f8de4938,2024-10-24T20:35:13.417000
|
||||
CVE-2024-5039,0,0,d4eca04aa1b7f16d8be388592f13108d7bb098b959dcbbbcd1cb04ce7429f2b9,2024-05-29T15:18:26.427000
|
||||
CVE-2024-5040,0,0,28e80b4d31908c888f58e8aabf481f59f60dc445c02b92b96b8990cba6ed3432,2024-05-22T12:46:53.887000
|
||||
CVE-2024-5041,0,0,50ceb705fe91e3598f01bb8363d7099f99df3d44a38bb258c5294ff805069b46,2024-05-31T13:01:46.727000
|
||||
@ -263448,7 +263468,7 @@ CVE-2024-5202,0,0,506e1bf31418d031771b54eb5cec35a7698867910819f07cfbd45cd0a9a0bc
|
||||
CVE-2024-5203,0,0,e867d44b31fa735ecaef1844aba382841138e742c9b7e957e6089969316cab00,2024-09-13T11:15:10.197000
|
||||
CVE-2024-5204,0,0,87eb5b753d379a1bd1ef79b260f2b73c84b7ff9a4b79082cf351323e04c98a6d,2024-05-29T13:02:09.280000
|
||||
CVE-2024-5205,0,0,4921ed356d4f56252ffbf3c608cb3301846a77ee8cc9c08ec7f0a543467e385d,2024-05-24T13:03:11.993000
|
||||
CVE-2024-5206,0,1,b3f524211e1d68f8da056248f629dbe7f435bd9f6a2b4ba4133bd7fb2ec50998,2024-10-24T19:48:31.637000
|
||||
CVE-2024-5206,0,0,b3f524211e1d68f8da056248f629dbe7f435bd9f6a2b4ba4133bd7fb2ec50998,2024-10-24T19:48:31.637000
|
||||
CVE-2024-5207,0,0,181dd5a561a1ca6cee33a4a5369908472f122edb94b0d0fa7d6cd5b5e2958e5a,2024-05-30T13:15:41.297000
|
||||
CVE-2024-5208,0,0,1cccb0861be6781d1738a6540c67013b2ca290af7bc911f2a2acee7d44fa67ac,2024-06-20T12:44:01.637000
|
||||
CVE-2024-5209,0,0,7531866dc2069833de5cded2977d100fe13c1eac0700fc84557e1bd601c0dcd0,2024-08-19T13:00:23.117000
|
||||
@ -265414,7 +265434,7 @@ CVE-2024-7531,0,0,dbb6c7bb708cc7892d9b9398cb954ae50065a4639c2a03cb64cbbe4b190ba0
|
||||
CVE-2024-7532,0,0,90c76a771bf2c3087c95892c6c8636149d558f7e7c6e8fc118a6fd5792493066,2024-08-12T18:31:14.987000
|
||||
CVE-2024-7533,0,0,c20f52f22bd957e76ce7ee76b3d504a6bf1b0987ab46e3435092f6d8144882d0,2024-08-12T18:31:36.127000
|
||||
CVE-2024-7534,0,0,e617e0746161521c688d11311339489549549660c20c373432ae0156acd463b5,2024-10-15T14:35:08.213000
|
||||
CVE-2024-7535,0,0,406a485be4ed145018eee5a42eee293edf3f855e9e608d288637ad13611ff84e,2024-08-12T18:31:56.687000
|
||||
CVE-2024-7535,0,1,35bb740627c756df8eadc3267735e3fa59ff4ff1ce06f1f974335d8c5c571073,2024-10-24T20:35:14.177000
|
||||
CVE-2024-7536,0,0,6d744a1cdbceb73b2517cc38c4973ef8f9e81b399df7da1dbc0e072ba9141ac8,2024-08-12T18:32:03.167000
|
||||
CVE-2024-7537,0,0,9b18c1e3141b81ab91d34faba60a5c749d81521efc9642561225894aa8d298d0,2024-08-29T18:01:05.103000
|
||||
CVE-2024-7538,0,0,193fad63547610339afca51fb42f4e1b63efd1246fa12674999d016a71d7b352,2024-08-29T17:59:31.983000
|
||||
@ -265607,6 +265627,7 @@ CVE-2024-7754,0,0,aa642088260d14c06ef027c5ebe72633a842f86ac8e6448a2c0c42d526be8f
|
||||
CVE-2024-7755,0,0,ef971a5ecbec92118875058fb4e190fc41fb035586060e0897fad69139da7909,2024-10-18T12:52:33.507000
|
||||
CVE-2024-7756,0,0,1b8e4c66c7bf8f5bb87e6dc0c53f1d7bb597ab897e7e923ca54d526835e888de,2024-09-14T11:47:14.677000
|
||||
CVE-2024-7757,0,0,ca7d079474a8e4f4b2f55e1721105da3a15a9e1d63f2bd4356eaaa03e8d55f39,2024-08-21T09:15:04.973000
|
||||
CVE-2024-7763,1,1,76e0407420c9036e24c38fc1bf9bc13eaafe34ef52d06910bad5acfce7ff99f0,2024-10-24T21:15:15.033000
|
||||
CVE-2024-7766,0,0,4e35bee576a6abfaafa62da3f1b54e408714e45f4e43f63a810722c69e36afe2,2024-09-26T20:37:18.900000
|
||||
CVE-2024-7770,0,0,c7cdbe9f10cd7fded45408e87450036bd23da653083b9d55869a5992b7da25b8,2024-09-26T17:49:17.457000
|
||||
CVE-2024-7772,0,0,10ae3b8ddfb97cd1facaede4399b22bddced2619c3d70ce3a321e07353f3ff86,2024-10-02T16:10:49.387000
|
||||
@ -265773,7 +265794,7 @@ CVE-2024-7969,0,0,004186edac2fefffd328a41ea15a25fa627c517f8fe839d3b4b4abc33a5fb6
|
||||
CVE-2024-7970,0,0,4bb992b64808219b839c5254e00c2c7348ddd7f9644ca29d4ab55ca307fec90f,2024-09-04T14:35:15.343000
|
||||
CVE-2024-7971,0,0,46adb6d7721c1dfcc60ee3fda6e97e01d50ab2f0fa3271375a72069a513c0516,2024-08-27T01:00:02.883000
|
||||
CVE-2024-7972,0,0,e61aba0cb3afa4d81531ac3dd06c76487abfdcc64e079a47655c169ee1d829d6,2024-08-26T15:11:35.017000
|
||||
CVE-2024-7973,0,0,57e1fa2533e5bc6ff8715efadca7a59b7db56c81e1c88635dd66a97401e58114,2024-08-26T15:13:04.650000
|
||||
CVE-2024-7973,0,1,f4a6e82caeabd156e6e39c448d3a6bc99c97ac280b9c1d190ceb79dabcc9ff3c,2024-10-24T20:35:14.967000
|
||||
CVE-2024-7974,0,0,4f1766ede0a46e011fd6362a463054e086647121f22e7cff04b5a03dfc3c746c,2024-08-22T17:40:27.950000
|
||||
CVE-2024-7975,0,0,6eead3f121fb76c19460ccba2d1c91cf33314b233f7cc8d0a23049d05e30e6a0,2024-08-22T17:40:09.223000
|
||||
CVE-2024-7976,0,0,8ea67749dc2e0457db6f465664717bd53fa70c14a92a0f107f894d380039b546,2024-08-22T17:39:54.540000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user