mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-07 03:02:20 +00:00
Auto-Update: 2024-08-28T20:00:17.696095+00:00
This commit is contained in:
parent
632168d8cf
commit
4bbe8b0f33
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-27312",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-03T06:15:07.350",
|
||||
"lastModified": "2024-04-03T12:38:04.840",
|
||||
"lastModified": "2024-08-28T19:35:00.870",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Vulnerabilidad de Server Side Request Forgery (SSRF) en Gleez Cms 1.2.0, permite a atacantes remotos ejecutar c\u00f3digo arbitrario y obtener informaci\u00f3n confidencial a trav\u00e9s de module/gleez/classes/request.php."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 9.4,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-918"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/LioTree/8d10d123d31f50db05a25586e62a87ba",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-24333",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-21T21:15:08.673",
|
||||
"lastModified": "2024-02-22T19:07:27.197",
|
||||
"lastModified": "2024-08-28T18:35:00.873",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Una vulnerabilidad de desbordamiento en la regi\u00f3n stack de la memoria en Tenda AC21 con la versi\u00f3n de firmware US_AC21V1.0re_V16.03.08.15_cn_TDC01 permite a los atacantes ejecutar comandos arbitrarios a trav\u00e9s de una solicitud POST manipulada para /goform/openSchedWifi."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/caoyebo/CVE/tree/main/TENDA%20AC21%20-%20CVE-2023-24333",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-33677",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-06T01:15:06.960",
|
||||
"lastModified": "2024-03-06T15:18:08.093",
|
||||
"lastModified": "2024-08-28T19:35:04.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Sourcecodester Lost and Found Information System's Version 1.0 es vulnerable a una inyecci\u00f3n SQL no autenticada en \"?page=items/view&id=*\"."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://wwwsourcecodestercom.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-40100",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2024-02-15T23:15:07.743",
|
||||
"lastModified": "2024-02-16T13:38:00.047",
|
||||
"lastModified": "2024-08-28T19:35:06.173",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "En Discovery_thread de Dns64Configuration.cpp, existe una posible corrupci\u00f3n de memoria debido a un use after free. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.4,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://android.googlesource.com/platform/packages/modules/DnsResolver/+/8e1561fb603fdaec15798372f865fb1750537f4f",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-4024",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-08-17T08:15:05.300",
|
||||
"lastModified": "2024-08-19T13:00:23.117",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-28T18:32:02.433",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -40,6 +40,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
@ -51,22 +61,52 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:softlabbd:radio_player:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "2.0.74",
|
||||
"matchCriteriaId": "2F2023B8-C40D-4B40-BDE9-6EB71E09AABA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.svn.wordpress.org/radio-player/tags/2.0.7/readme.txt",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/2942906/radio-player/trunk/includes/class-ajax.php",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3048105",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/3f408f1f-207e-427a-a5d0-d0fadf453d7e?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-4025",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-08-17T08:15:05.500",
|
||||
"lastModified": "2024-08-19T13:00:23.117",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-28T18:30:15.657",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
@ -51,22 +81,52 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:softlabbd:radio_player:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "2.0.74",
|
||||
"matchCriteriaId": "2F2023B8-C40D-4B40-BDE9-6EB71E09AABA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.svn.wordpress.org/radio-player/tags/2.0.7/readme.txt",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/2942906/radio-player/trunk/includes/class-ajax.php",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3048105",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/77409977-6822-4d14-9842-cb6a5aff2162?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-41505",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-13T21:15:53.910",
|
||||
"lastModified": "2024-03-14T12:52:21.763",
|
||||
"lastModified": "2024-08-28T19:35:06.953",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,30 @@
|
||||
"value": "Una vulnerabilidad de carga de archivos arbitrarios en la funci\u00f3n Agregar imagen de perfil del estudiante de Student Enrollment In PHP v1.0 permite a los atacantes ejecutar c\u00f3digo arbitrario cargando un archivo PHP manipulado."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ASR511-OO7/CVE-2023-41505/blob/main/CVE-24",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-42581",
|
||||
"sourceIdentifier": "mobile.security@samsung.com",
|
||||
"published": "2023-12-05T03:15:19.293",
|
||||
"lastModified": "2023-12-12T17:08:44.080",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-08-28T19:35:07.143",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-43301",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-12-07T07:15:08.697",
|
||||
"lastModified": "2023-12-13T21:24:23.100",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-08-28T18:35:04.500",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -49,6 +49,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-6143",
|
||||
"sourceIdentifier": "arm-security@arm.com",
|
||||
"published": "2024-03-04T10:15:08.807",
|
||||
"lastModified": "2024-03-04T13:58:23.447",
|
||||
"lastModified": "2024-08-28T19:35:07.420",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,30 @@
|
||||
"value": "Vulnerabilidad Use After Free en Arm Ltd Midgard GPU Kernel Driver, Arm Ltd Bifrost GPU Kernel Driver, Arm Ltd Valhall GPU Kernel Driver, Arm Ltd Arm 5th Gen GPU Architecture Kernel Driver permite a un usuario local sin privilegios explotar una condici\u00f3n de ejecuci\u00f3n de software para realizar operaciones de procesamiento de memoria inadecuadas. Si el usuario prepara cuidadosamente la memoria del sistema y el sistema est\u00e1 bajo una carga pesada, esto a su vez provocar\u00e1 un Use After Free. Este problema afecta al controlador del kernel de GPU Midgard: de r13p0 a r32p0; Controlador del kernel de GPU Bifrost: desde r1p0 hasta r18p0; Controlador del kernel de GPU Valhall: desde r37p0 hasta r46p0; Controlador del kernel de arquitectura de GPU Arm de quinta generaci\u00f3n: desde r41p0 hasta r46p0."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.4,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "arm-security@arm.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-0048",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2024-03-11T17:15:45.673",
|
||||
"lastModified": "2024-03-12T12:40:13.500",
|
||||
"lastModified": "2024-08-28T19:35:07.667",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "En la sesi\u00f3n de AccountManagerService.java, existe un m\u00e9todo posible para conservar los privilegios del servicio en primer plano debido al manejo incorrecto de respuestas nulas. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.4,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-230"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://android.googlesource.com/platform/frameworks/base/+/2c236cde5505ee0e88cf1e3d073e2f1a53f0eede",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-0051",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2024-03-11T17:15:45.840",
|
||||
"lastModified": "2024-03-12T12:40:13.500",
|
||||
"lastModified": "2024-08-28T19:35:08.443",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "En onQueueFilled de SoftMPEG4.cpp, hay una posible escritura fuera de los l\u00edmites debido a un desbordamiento de b\u00fafer de almacenamiento din\u00e1mico. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://android.googlesource.com/platform/frameworks/av/+/a52c14a5b49f26efafa581dea653b4179d66909e",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-21501",
|
||||
"sourceIdentifier": "report@snyk.io",
|
||||
"published": "2024-02-24T05:15:44.310",
|
||||
"lastModified": "2024-06-10T18:15:25.273",
|
||||
"lastModified": "2024-08-28T18:35:07.823",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -49,6 +49,16 @@
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-538"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-25746",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-22T22:15:47.253",
|
||||
"lastModified": "2024-02-23T02:42:54.547",
|
||||
"lastModified": "2024-08-28T18:35:09.110",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Vulnerabilidad de desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria en Tenda AC9 v.3.0 con versi\u00f3n de firmware v.15.03.06.42_multi permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de la funci\u00f3n add_white_node."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/TimeSeg/IOT_CVE/blob/main/tenda/AC9V3/0218/add_white_node.md",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-25748",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-22T23:15:07.640",
|
||||
"lastModified": "2024-02-23T02:42:54.547",
|
||||
"lastModified": "2024-08-28T18:35:10.337",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Una vulnerabilidad de desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria en tenda AC9 AC9 v.3.0 con versi\u00f3n de firmware v.15.03.06.42_multi permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de la funci\u00f3n fromSetIpMacBind."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/TimeSeg/IOT_CVE/blob/main/tenda/AC9V3/0218/fromSetIpMacBind.md",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-25992",
|
||||
"sourceIdentifier": "dsap-vuln-management@google.com",
|
||||
"published": "2024-03-11T19:15:47.840",
|
||||
"lastModified": "2024-03-12T12:40:13.500",
|
||||
"lastModified": "2024-08-28T19:35:09.697",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "En tmu_tz_control de tmu.c, existe una posible lectura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltantes. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2024-03-01",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-26529",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-13T08:15:43.410",
|
||||
"lastModified": "2024-03-13T12:33:51.697",
|
||||
"lastModified": "2024-08-28T19:35:10.463",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,30 @@
|
||||
"value": "Un problema en mz-automation libiec61850 v.1.5.3 y anteriores permite que un atacante remoto provoque una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de la funci\u00f3n mmsServer_handleDeleteNamedVariableListRequest de src/mms/iso_mms/server/mms_named_variable_list_service.c."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/mz-automation/libiec61850/issues/492",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-27212",
|
||||
"sourceIdentifier": "dsap-vuln-management@google.com",
|
||||
"published": "2024-03-11T19:15:48.290",
|
||||
"lastModified": "2024-03-15T20:15:08.910",
|
||||
"lastModified": "2024-08-28T19:35:10.640",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "En init_data de TBD, existe una posible escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltantes. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2024-03-01",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-27228",
|
||||
"sourceIdentifier": "dsap-vuln-management@google.com",
|
||||
"published": "2024-03-11T19:15:48.827",
|
||||
"lastModified": "2024-03-15T20:15:09.193",
|
||||
"lastModified": "2024-08-28T19:35:11.443",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "En TBD de TBD, existe una posible escritura fuera de los l\u00edmites debido a un desbordamiento de b\u00fafer de almacenamiento din\u00e1mico. Esto podr\u00eda conducir a la ejecuci\u00f3n remota de c\u00f3digo sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2024-03-01",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-27568",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-01T14:15:54.180",
|
||||
"lastModified": "2024-03-01T15:23:36.177",
|
||||
"lastModified": "2024-08-28T19:35:12.240",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Se descubri\u00f3 que LBT T300-T390 v2.2.1.8 conten\u00eda un desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria a trav\u00e9s del par\u00e1metro apn_name_3g en la funci\u00f3n setupEC20Apn. Esta vulnerabilidad permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) mediante una solicitud POST manipulada."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/cvdyfbwa/IoT_LBT_Router/blob/main/setupEC20Apn.md",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-27631",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-08T21:15:10.067",
|
||||
"lastModified": "2024-04-11T06:15:06.560",
|
||||
"lastModified": "2024-08-28T19:35:13.040",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Vulnerabilidad de Cross Site Request Forgery en GNU Savane v.3.12 y anteriores permite a un atacante remoto escalar privilegios a trav\u00e9s de siteadmin/usergroup.php"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.0,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 4.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.savannah.nongnu.org/cgit/administration/savane.git/commit/?h=i18n&id=d3962d3feb75467489b869204db98e2dffaaaf09",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-27705",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-03T22:15:06.987",
|
||||
"lastModified": "2024-04-04T12:48:41.700",
|
||||
"lastModified": "2024-08-28T19:35:13.840",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "La vulnerabilidad de Cross Site Scripting en Leantime v3.0.6 permite a los atacantes ejecutar c\u00f3digo arbitrario mediante la carga de un archivo PDF manipulado en el endpoint de archivos/exploraci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.6,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 4.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/b-hermes/vulnerability-research/tree/main/CVE-2024-27705",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-28338",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-12T17:15:59.047",
|
||||
"lastModified": "2024-03-12T17:46:17.273",
|
||||
"lastModified": "2024-08-28T19:35:14.627",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Una omisi\u00f3n de inicio de sesi\u00f3n en TOTOLINK A8000RU V7.1cu.643_B20200521 permite a los atacantes iniciar sesi\u00f3n en cuentas de administrador proporcionando una cookie de sesi\u00f3n manipulada."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.0,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/funny-mud-peee/IoT-vuls/blob/main/TOTOLINK%20A8000RU/TOTOlink%20A8000RU%20login%20bypass.md",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-28553",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-12T13:15:49.763",
|
||||
"lastModified": "2024-03-21T20:58:52.357",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-08-28T18:35:12.120",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-28677",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-13T16:15:30.390",
|
||||
"lastModified": "2024-03-13T18:15:58.530",
|
||||
"lastModified": "2024-08-28T19:35:15.447",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Se descubri\u00f3 que DedeCMS v5.7 contiene una vulnerabilidad de Cross-Site Request Forgery (CSRF) a trav\u00e9s de /dede/article_keywords_main.php."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/777erp/cms/blob/main/14.md",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-28681",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-13T16:15:30.570",
|
||||
"lastModified": "2024-03-13T18:15:58.530",
|
||||
"lastModified": "2024-08-28T19:35:16.270",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Se descubri\u00f3 que DedeCMS v5.7 contiene una vulnerabilidad de Cross-Site Request Forgery (CSRF) a trav\u00e9s de /dede/plus_edit.php."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/777erp/cms/blob/main/17.md",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-29399",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-11T06:15:06.903",
|
||||
"lastModified": "2024-04-11T12:47:44.137",
|
||||
"lastModified": "2024-08-28T18:35:13.337",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Se descubri\u00f3 un problema en GNU Savane v.3.13 y anteriores que permite a un atacante remoto ejecutar c\u00f3digo arbitrario y escalar privilegios a trav\u00e9s de un archivo manipulado al componente upload.php."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.6,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 5.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ally-petitt/CVE-2024-29399",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-29514",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-02T13:15:51.620",
|
||||
"lastModified": "2024-04-02T18:12:16.283",
|
||||
"lastModified": "2024-08-28T19:35:17.070",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "La vulnerabilidad de carga de archivos en lepton v.7.1.0 permite a atacantes remotos autenticados ejecutar c\u00f3digo arbitrario cargando un archivo PHP manipulado."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/zzq66/cve6/",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-29757",
|
||||
"sourceIdentifier": "dsap-vuln-management@google.com",
|
||||
"published": "2024-04-05T20:15:08.867",
|
||||
"lastModified": "2024-04-08T18:49:25.863",
|
||||
"lastModified": "2024-08-28T19:35:17.877",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,30 @@
|
||||
"value": "Existe una posible omisi\u00f3n de permisos debido a que los certificados de depuraci\u00f3n est\u00e1n incluidos en la lista de permitidos. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-30565",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-04T08:15:07.153",
|
||||
"lastModified": "2024-04-04T12:48:41.700",
|
||||
"lastModified": "2024-08-28T19:35:18.093",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Se descubri\u00f3 un problema en SeaCMS versi\u00f3n 12.9, que permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de admin notify.php."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/XiLitter/CMS_vulnerability-discovery/blob/main/SeaCMS_v.12.9.md",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-30591",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-28T14:15:15.390",
|
||||
"lastModified": "2024-03-28T16:07:30.893",
|
||||
"lastModified": "2024-08-28T18:35:14.280",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Tenda FH1202 v1.2.0.14(408) tiene una vulnerabilidad de desbordamiento de la regi\u00f3n stack de la memoria en el par\u00e1metro de tiempo de la funci\u00f3n saveParentControlInfo."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/saveParentControlInfo_time.md",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-30598",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-28T15:15:46.467",
|
||||
"lastModified": "2024-03-28T16:07:30.893",
|
||||
"lastModified": "2024-08-28T18:35:15.197",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "El firmware Tenda FH1203 v2.0.1.6 tiene una vulnerabilidad de desbordamiento de la regi\u00f3n stack de la memoria en el par\u00e1metro security_5g de la funci\u00f3n formWifiBasicSet."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/formWifiBasicSet_security_5g.md",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-30624",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-29T13:15:15.953",
|
||||
"lastModified": "2024-03-29T13:28:22.880",
|
||||
"lastModified": "2024-08-28T18:35:15.953",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Tenda FH1205 v2.0.0.7(775) tiene una vulnerabilidad de desbordamiento de la regi\u00f3n stack de la memoria en el par\u00e1metro URL de la funci\u00f3n saveParentControlInfo."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1205/saveParentControlInfo_urls.md",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-31819",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-10T20:15:08.027",
|
||||
"lastModified": "2024-04-11T12:47:44.137",
|
||||
"lastModified": "2024-08-28T19:35:18.897",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Un problema en WWBN AVideo v.12.4 a v.14.2 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s del par\u00e1metro systemRootPath del componente submitIndex.php."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chocapikk.com/posts/2024/cve-2024-31819/",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-39504",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-07-12T13:15:12.830",
|
||||
"lastModified": "2024-07-12T16:34:58.687",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-28T19:58:45.653",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,19 +15,104 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: netfilter: nft_inner: valida meta y payload obligatorias. Comprueba los atributos de enlace de red obligatorios en el payload y la metaexpresi\u00f3n cuando se utilizan incrustados desde la expresi\u00f3n interna; de lo contrario, es posible desreferenciar el puntero NULL desde el espacio de usuario."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2",
|
||||
"versionEndExcluding": "6.6.35",
|
||||
"matchCriteriaId": "6F019D15-84C0-416B-8C57-7F51B68992F0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.9.6",
|
||||
"matchCriteriaId": "0ABBBA1D-F79D-4BDB-AA41-D1EDCC4A6975"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2EBB4392-5FA6-4DA9-9772-8F9C750109FA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "331C2F14-12C7-45D5-893D-8C52EE38EA10"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3173713D-909A-4DD3-9DD4-1E171EB057EE"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/39323f54cad29602917848346c71b087da92a19d",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/b30669fdea0ca03aa22995e6c99f7e7d9dee89ff",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/c4ab9da85b9df3692f861512fe6c9812f38b7471",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-39506",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-07-12T13:15:12.957",
|
||||
"lastModified": "2024-07-12T16:34:58.687",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-28T19:58:56.013",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,39 +15,174 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: liquidio: ajusta una ruta de manejo de puntero NULL en lio_vf_rep_copy_packet En lio_vf_rep_copy_packet() pg_info->page se compara con un valor NULL, pero luego se pasa incondicionalmente a skb_add_rx_frag() lo cual parece extra\u00f1o y podr\u00eda provocar una desreferencia del puntero nulo. El seguimiento de llamadas de lio_vf_rep_copy_packet() se ve as\u00ed: octeon_droq_process_packets octeon_droq_fast_process_packets octeon_droq_dispatch_pkt octeon_create_recv_info ...buscar en la lista de despacho... ->disp_fn(rdisp->rinfo, ...) lio_vf_rep_pkt_recv(struct octeon_recv_info *rec v_info, ...) En este camino hay No hay ning\u00fan c\u00f3digo que establezca pg_info->page en NULL. Por lo tanto, esta verificaci\u00f3n parece innecesaria y no resuelve el problema potencial. Pero supongo que el autor ten\u00eda motivos para agregar un cheque y yo no tengo esa tarjeta y no puedo hacer una prueba real. Adem\u00e1s, el c\u00f3digo de la funci\u00f3n liquidio_push_packet() en liquidio/lio_core.c hace exactamente lo mismo. En base a esto, considero la soluci\u00f3n de compromiso m\u00e1s aceptable para ajustar este problema moviendo skb_add_rx_frag() al alcance condicional. Encontrado por el Centro de verificaci\u00f3n de Linux (linuxtesting.org) con SVACE."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.15",
|
||||
"versionEndExcluding": "4.19.317",
|
||||
"matchCriteriaId": "CA0C2003-8954-406C-83EB-454FDEC08184"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.20",
|
||||
"versionEndExcluding": "5.4.279",
|
||||
"matchCriteriaId": "F4E38E58-1B9F-4DF2-AD3D-A8BEAA2959D8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.5",
|
||||
"versionEndExcluding": "5.10.221",
|
||||
"matchCriteriaId": "659E1520-6345-41AF-B893-A7C0647585A0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11",
|
||||
"versionEndExcluding": "5.15.162",
|
||||
"matchCriteriaId": "10A39ACC-3005-40E8-875C-98A372D1FFD5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "6.1.95",
|
||||
"matchCriteriaId": "D435765D-2766-44F5-B319-F713A13E35CE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2",
|
||||
"versionEndExcluding": "6.6.35",
|
||||
"matchCriteriaId": "6F019D15-84C0-416B-8C57-7F51B68992F0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.9.6",
|
||||
"matchCriteriaId": "0ABBBA1D-F79D-4BDB-AA41-D1EDCC4A6975"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2EBB4392-5FA6-4DA9-9772-8F9C750109FA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "331C2F14-12C7-45D5-893D-8C52EE38EA10"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3173713D-909A-4DD3-9DD4-1E171EB057EE"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/87d6bdc006f0cbf297a3b2ad6e40ede4c3ee5dc2",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/a6f4d0ec170a46b5f453cacf55dff5989b42bbfa",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/a86490a3712cc513113440a606a0e77130abd47c",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/c44711b78608c98a3e6b49ce91678cd0917d5349",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/cbf18d8128a753cb632bef39470d19befd9c7347",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/dcc7440f32c7a26b067aff6e7d931ec593024a79",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/f1ab15a09492a5ae8ab1e2c35ba2cf9e150d25ee",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/fd2b613bc4c508e55c1221c6595bb889812a4fea",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-39510",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-07-12T13:15:13.283",
|
||||
"lastModified": "2024-07-12T16:34:58.687",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-28T19:59:12.947",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,23 +15,104 @@
|
||||
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: cachefiles: fix slab-use-after-free in cachefiles_ondemand_daemon_read() Obtuvimos el siguiente problema en una prueba de ejecuci\u00f3n aleatoria del comando de restauraci\u00f3n: ======== ==================================================== ======== ERROR: KASAN: slab-use-after-free en cachefiles_ondemand_daemon_read+0xb41/0xb60 Lectura de tama\u00f1o 8 en la direcci\u00f3n ffff888122e84088 por tarea ondemand-04-dae/963 CPU: 13 PID: 963 Comm: ondemand -04-dae Not tainted 6.8.0-dirty #564 Seguimiento de llamadas: kasan_report+0x93/0xc0 cachefiles_ondemand_daemon_read+0xb41/0xb60 vfs_read+0x169/0xb50 ksys_read+0xf5/0x1e0 Asignado por tarea 116: kmem_cache_alloc+0x14 0/0x3a0 cachefiles_lookup_cookie+0x140/ 0xcd0 fscache_cookie_state_machine+0x43c/0x1230 [...] Liberado por la tarea 792: kmem_cache_free+0xfe/0x390 cachefiles_put_object+0x241/0x480 fscache_cookie_state_machine+0x5c8/0x1230 [...] =============== ==================================================== == El siguiente es el proceso que desencadena el problema: montar | daemon_thread1 | daemon_thread2 ------------------------------------------------- ----------- cachefiles_withdraw_cookie cachefiles_ondemand_clean_object(object) cachefiles_ondemand_send_req REQ_A = kzalloc(sizeof(*req) + data_len) wait_for_completion(&REQ_A->done) cachefiles_daemon_read cachefiles_ondemand_daemon_read REQ_A = cachefiles_ondemand_select_req- >object_id = solicitud->objeto ->ondemand->ondemand_id ------ restaurar ------ cachefiles_ondemand_restore xas_for_each(&xas, req, ULONG_MAX) xas_set_mark(&xas, CACHEFILES_REQ_NEW) cachefiles_daemon_read cachefiles_ondemand_daemon_read REQ_A = cachefiles_ondemand_select_req er, mensaje, n) xa_erase(&cache ->reqs, id) complete(&REQ_A->done) ------ close(fd) ------ cachefiles_ondemand_fd_release cachefiles_put_object cachefiles_put_object kmem_cache_free(cachefiles_object_jar, object) REQ_A->object->ondemand->ondemand_id // objeto UAF !!! Cuando vemos la solicitud dentro de xa_lock, req->object no debe haberse liberado a\u00fan, as\u00ed que tome el recuento de referencia del objeto antes de xa_unlock para evitar el problema anterior."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.8",
|
||||
"versionEndExcluding": "6.9.6",
|
||||
"matchCriteriaId": "5A16B675-D12F-49F9-AB96-23E6074FF336"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2EBB4392-5FA6-4DA9-9772-8F9C750109FA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "331C2F14-12C7-45D5-893D-8C52EE38EA10"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3173713D-909A-4DD3-9DD4-1E171EB057EE"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/3958679c49152391209b32be3357193300a51abd",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/93064676a2820420a2d37d7c8289f277fe20793d",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/cb55625f8eb9d2de8be4da0c4580d48cbb32058e",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/da4a827416066191aafeeccee50a8836a826ba10",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-39717",
|
||||
"sourceIdentifier": "support@hackerone.com",
|
||||
"published": "2024-08-22T19:15:09.173",
|
||||
"lastModified": "2024-08-27T16:15:07.400",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-08-28T19:47:25.410",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"cisaExploitAdd": "2024-08-23",
|
||||
"cisaActionDue": "2024-09-13",
|
||||
@ -127,7 +127,10 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "https://versa-networks.com/blog/versa-security-bulletin-update-on-cve-2024-39717-versa-director-dangerous-file-type-upload-vulnerability/",
|
||||
"source": "support@hackerone.com"
|
||||
"source": "support@hackerone.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2024-40530",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-05T16:15:36.750",
|
||||
"lastModified": "2024-08-06T16:30:24.547",
|
||||
"lastModified": "2024-08-28T19:15:08.717",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Insecure Permissions vulnerability in UAB Lexita PanteraCRM CMS v.401.152 and Patera CRM CMS v.402.072 allows a remote attacker to execute arbitrary code via modification of the X-Forwarded-For header component."
|
||||
"value": "A vulnerability in Pantera CRM versions 401.152 and 402.072 allows unauthorized attackers to bypass IP-based access controls by manipulating the X-Forwarded-For header."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2024-40531",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-05T16:15:36.800",
|
||||
"lastModified": "2024-08-07T19:35:06.233",
|
||||
"lastModified": "2024-08-28T19:15:08.797",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in UAB Lexita PanteraCRM CMS v.401.152 and Patera CRM CMS v.402.072 allows a remote attacker to escalate privileges via the user profile management function."
|
||||
"value": "A mass assignment vulnerability exists in Pantera CRM versions 401.152 and 402.072. This flaw allows authenticated users to modify any user attribute, including roles, by injecting additional parameters via profile management functions."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-40899",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-07-12T13:15:13.357",
|
||||
"lastModified": "2024-07-12T16:34:58.687",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-28T19:59:22.927",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,23 +15,104 @@
|
||||
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: cachefiles: fix slab-use-after-free in cachefiles_ondemand_get_fd() Obtuvimos el siguiente problema en una prueba de ejecuci\u00f3n aleatoria del comando de restauraci\u00f3n: ======== ==================================================== ======== ERROR: KASAN: slab-use-after-free en cachefiles_ondemand_daemon_read+0x609/0xab0 Escritura de tama\u00f1o 4 en la direcci\u00f3n ffff888109164a80 por tarea ondemand-04-dae/4962 CPU: 11 PID: 4962 Comm: ondemand -04-dae No contaminado 6.8.0-rc7-dirty #542 Seguimiento de llamadas: kasan_report+0x94/0xc0 cachefiles_ondemand_daemon_read+0x609/0xab0 vfs_read+0x169/0xb50 ksys_read+0xf5/0x1e0 Asignado por tarea 626: /0x4b0 archivos de cach\u00e9_ondemand_send_req+ 0x24d/0x690 cachefiles_create_tmpfile+0x249/0xb30 cachefiles_create_file+0x6f/0x140 cachefiles_look_up_object+0x29c/0xa60 cachefiles_lookup_cookie+0x37d/0xca0 fscache_cookie_state_machine+0x43c/0x1230 [...] Liberado por tarea 626: kfree+0xf1/0x2c0 cachefiles_ondemand_send_req+0x568/0x690 cachefiles_create_tmpfile+ 0x249/0xb30 cachefiles_create_file+0x6f/0x140 cachefiles_look_up_object+0x29c/0xa60 cachefiles_lookup_cookie+0x37d/0xca0 fscache_cookie_state_machine+0x43c/0x1230 [...] ======================= ============================================= El siguiente es el proceso que desencadena el problema: montar | daemon_thread1 | daemon_thread2 ------------------------------------------------- ----------- cachefiles_ondemand_init_object cachefiles_ondemand_send_req REQ_A = kzalloc(sizeof(*req) + data_len) wait_for_completion(&REQ_A->done) cachefiles_daemon_read cachefiles_ondemand_daemon_read REQ_A = cachefiles_ondemand_select_req cachefiles_ondemand_get_fd usuario(_buffer, msg, n) proceso_open_req(REQ_A) ------ restaurar ------ cachefiles_ondemand_restore xas_for_each(&xas, req, ULONG_MAX) xas_set_mark(&xas, CACHEFILES_REQ_NEW); cachefiles_daemon_read cachefiles_ondemand_daemon_read REQ_A = cachefiles_ondemand_select_req write(devfd, (\"copen %u,%llu\", msg->msg_id, tama\u00f1o)); cachefiles_ondemand_copen xa_erase(&cache->reqs, id) complete(&REQ_A->done) kfree(REQ_A) cachefiles_ondemand_get_fd(REQ_A) fd = get_unused_fd_flags file = anon_inode_getfile fd_install(fd, file) load = (void *)REQ_A->msg.data; cargar->fd = fd; // carga UAF !!! Este problema se debe a la emisi\u00f3n de un comando de restauraci\u00f3n cuando el daemon todav\u00eda est\u00e1 activo, lo que da como resultado que una solicitud se procese varias veces y, por lo tanto, se active una UAF. Entonces, para evitar este problema, agregue un recuento de referencia adicional a cachefiles_req, que se mantiene mientras se espera y se lee, y luego se libera cuando finaliza la espera y la lectura. Tenga en cuenta que, dado que solo hay un recuento de referencias para esperar, debemos evitar que la misma solicitud se complete varias veces, por lo que solo podemos completar la solicitud si se elimina con \u00e9xito del xarray."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.8",
|
||||
"versionEndExcluding": "6.9.6",
|
||||
"matchCriteriaId": "5A16B675-D12F-49F9-AB96-23E6074FF336"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2EBB4392-5FA6-4DA9-9772-8F9C750109FA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "331C2F14-12C7-45D5-893D-8C52EE38EA10"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3173713D-909A-4DD3-9DD4-1E171EB057EE"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/1d902d9a3aa4f2a8bda698294e34be788be012fc",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/99e9c5bd27ddefa0f9db88625bf5e31c1e833d62",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/a6de82765e12fb1201ab607f0d3ffe3309b30fc0",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/de3e26f9e5b76fc628077578c001c4a51bf54d06",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-40932",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-07-12T13:15:15.820",
|
||||
"lastModified": "2024-07-12T16:34:58.687",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-28T19:48:53.420",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,39 +15,173 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/exynos/vidi: corrige la p\u00e9rdida de memoria en .get_modes() El EDID duplicado nunca se libera. Arreglalo."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-401"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "4.19.317",
|
||||
"matchCriteriaId": "AD25C2E5-C116-4160-BA6D-CE9B0D10AE3E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.20",
|
||||
"versionEndExcluding": "5.4.279",
|
||||
"matchCriteriaId": "F4E38E58-1B9F-4DF2-AD3D-A8BEAA2959D8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.5",
|
||||
"versionEndExcluding": "5.10.221",
|
||||
"matchCriteriaId": "659E1520-6345-41AF-B893-A7C0647585A0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11",
|
||||
"versionEndExcluding": "5.15.162",
|
||||
"matchCriteriaId": "10A39ACC-3005-40E8-875C-98A372D1FFD5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "6.1.95",
|
||||
"matchCriteriaId": "D435765D-2766-44F5-B319-F713A13E35CE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2",
|
||||
"versionEndExcluding": "6.6.35",
|
||||
"matchCriteriaId": "6F019D15-84C0-416B-8C57-7F51B68992F0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.9.6",
|
||||
"matchCriteriaId": "0ABBBA1D-F79D-4BDB-AA41-D1EDCC4A6975"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2EBB4392-5FA6-4DA9-9772-8F9C750109FA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "331C2F14-12C7-45D5-893D-8C52EE38EA10"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3173713D-909A-4DD3-9DD4-1E171EB057EE"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/0acc356da8546b5c55aabfc2e2c5caa0ac9b0003",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/38e3825631b1f314b21e3ade00b5a4d737eb054e",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/540ca99729e28dbe902b01039a3b4bd74520a819",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/777838c9b571674ef14dbddf671f372265879226",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/a269c5701244db2722ae0fce5d1854f5d8f31224",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/cb3ac233434dba130281db330c4b15665b2d2c4d",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/dcba6bedb439581145d8aa6b0925209f23184ae1",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/ebcf81504fef03f701b9711e43fea4fe2d82ebc8",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-40934",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-07-12T13:15:15.977",
|
||||
"lastModified": "2024-07-12T16:34:58.687",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-28T19:49:04.307",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,35 +15,155 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: HID: logitech-dj: Reparar p\u00e9rdida de memoria en logi_dj_recv_switch_to_dj_mode() Reparar una p\u00e9rdida de memoria en la ruta de error logi_dj_recv_send_report()."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-401"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.4.257",
|
||||
"versionEndExcluding": "5.4.279",
|
||||
"matchCriteriaId": "71299EE2-D1AB-440D-95DA-50AE3BFDDD18"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.10.195",
|
||||
"versionEndExcluding": "5.10.221",
|
||||
"matchCriteriaId": "2A4A44D4-1B57-4B2B-A1E2-9C68B4DC2A62"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.15.132",
|
||||
"versionEndExcluding": "5.15.162",
|
||||
"matchCriteriaId": "739A47EB-82B2-406D-8A5D-5566B8046481"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.1.53",
|
||||
"versionEndExcluding": "6.1.95",
|
||||
"matchCriteriaId": "3BCDA0CD-C88C-4D23-80C9-97DC92D6F775"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.6",
|
||||
"versionEndExcluding": "6.6.35",
|
||||
"matchCriteriaId": "F4403344-197F-4A92-9E46-627CE50A9B83"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.9.6",
|
||||
"matchCriteriaId": "0ABBBA1D-F79D-4BDB-AA41-D1EDCC4A6975"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2EBB4392-5FA6-4DA9-9772-8F9C750109FA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "331C2F14-12C7-45D5-893D-8C52EE38EA10"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/15122dc140d82c51c216535c57b044c4587aae45",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/1df2ead5dfad5f8f92467bd94889392d53100b98",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/789c99a1d7d2c8f6096d75fc2930505840ec9ea0",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/a0503757947f2e46e59c1962326b53b3208c8213",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/caa9c9acb93db7ad7b74b157cf101579bac9596d",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/ce3af2ee95170b7d9e15fff6e500d67deab1e7b3",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/f677ca8cfefee2a729ca315f660cd4868abdf8de",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-40954",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-07-12T13:15:17.627",
|
||||
"lastModified": "2024-07-12T16:34:58.687",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-28T19:43:58.273",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,27 +15,137 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: no deja un puntero sk colgando cuando falla la creaci\u00f3n del socket. Es posible activar un use-after-free: * adjuntando una sonda fentry a __sock_release() y el sonda que llama al asistente bpf_get_socket_cookie() * ejecuta traceroute -I 1.1.1.1 en una m\u00e1quina virtual reci\u00e9n iniciada. Un kernel habilitado para KASAN registrar\u00e1 algo como lo siguiente (decodificado y eliminado): =============== ==================================================== = ERROR: KASAN: slab-use-after-free en __sock_gen_cookie (./arch/x86/include/asm/atomic64_64.h:15 ./include/linux/atomic/atomic-arch-fallback.h:2583 ./include /linux/atomic/atomic-instrumented.h:1611 net/core/sock_diag.c:29) Lectura de tama\u00f1o 8 en la direcci\u00f3n ffff888007110dd8 mediante tarea traceroute/299 CPU: 2 PID: 299 Comm: traceroute Contaminado: GE 6.10.0- rc2+ #2 Nombre del hardware: PC est\u00e1ndar QEMU (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 01/04/2014 Seguimiento de llamadas: dump_stack_lvl (lib/dump_stack.c:117 ( discriminador 1)) print_report (mm/kasan/report.c:378 mm/kasan/report.c:488)? __sock_gen_cookie (./arch/x86/include/asm/atomic64_64.h:15 ./include/linux/atomic/atomic-arch-fallback.h:2583 ./include/linux/atomic/atomic-instrumented.h:1611 neto /core/sock_diag.c:29) kasan_report (mm/kasan/report.c:603)? __sock_gen_cookie (./arch/x86/include/asm/atomic64_64.h:15 ./include/linux/atomic/atomic-arch-fallback.h:2583 ./include/linux/atomic/atomic-instrumented.h:1611 neto /core/sock_diag.c:29) kasan_check_range (mm/kasan/generic.c:183 mm/kasan/generic.c:189) __sock_gen_cookie (./arch/x86/include/asm/atomic64_64.h:15 ./include /linux/atomic/atomic-arch-fallback.h:2583 ./include/linux/atomic/atomic-instrumented.h:1611 net/core/sock_diag.c:29) bpf_get_socket_ptr_cookie (./arch/x86/include/asm /preempt.h:94 ./include/linux/sock_diag.h:42 net/core/filter.c:5094 net/core/filter.c:5092) bpf_prog_875642cf11f1d139___sock_release+0x6e/0x8e bpf_trampoline_6442506592+0x47/0xaf __ calcet\u00edn_release (net/ socket.c:652) __sock_create (net/socket.c:1601) ... Asignado por la tarea 299 en la CPU 2 en 78.328492s: kasan_save_stack (mm/kasan/common.c:48) kasan_save_track (mm/kasan/common. c:68) __kasan_slab_alloc (mm/kasan/common.c:312 mm/kasan/common.c:338) kmem_cache_alloc_noprof (mm/slub.c:3941 mm/slub.c:4000 mm/slub.c:4007) sk_prot_alloc (net/core/sock.c:2075) sk_alloc (net/core/sock.c:2134) inet_create (net/ipv4/af_inet.c:327 net/ipv4/af_inet.c:252) __sock_create (net/socket. c:1572) __sys_socket (net/socket.c:1660 net/socket.c:1644 net/socket.c:1706) __x64_sys_socket (net/socket.c:1718) do_syscall_64 (arch/x86/entry/common.c: 52 arch/x86/entry/common.c:83) Entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130) Liberado por la tarea 299 en la CPU 2 a las 78.328502s: kasan_save_stack (mm/kasan/common.c:48) kasan_save_track (mm/kasan/common.c:68) kasan_save_free_info (mm/kasan/generic.c:582) veneno_slab_object (mm/kasan/common.c:242) __kasan_slab_free (mm/kasan/common.c:256) kmem_cache_free ( mm/slub.c:4437 mm/slub.c:4511) __sk_destruct (net/core/sock.c:2117 net/core/sock.c:2208) inet_create (net/ipv4/af_inet.c:397 net/ipv4 /af_inet.c:252) __sock_create (net/socket.c:1572) __sys_socket (net/socket.c:1660 net/socket.c:1644 net/socket.c:1706) __x64_sys_socket (net/socket.c:1718 ) do_syscall_64 (arch/x86/entry/common.c:52 arch/x86/entry/common.c:83) Entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130) Solucione este problema borrando la referencia del socket de estructura en sk_common_release () para cubrir todas las familias de protocolos, cree funciones, que pueden ya adjuntar la referencia al objeto sk con sock_init_data()."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.12",
|
||||
"versionEndExcluding": "5.15.162",
|
||||
"matchCriteriaId": "BD852924-11EF-4EBB-B88D-50A6300754D3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "6.1.96",
|
||||
"matchCriteriaId": "61E887B4-732A-40D2-9983-CC6F281EBFB7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2",
|
||||
"versionEndExcluding": "6.6.36",
|
||||
"matchCriteriaId": "E1046C95-860A-45B0-B718-2B29F65BFF10"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.9.7",
|
||||
"matchCriteriaId": "0A047AF2-94AC-4A3A-B32D-6AB930D8EF1C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2EBB4392-5FA6-4DA9-9772-8F9C750109FA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "331C2F14-12C7-45D5-893D-8C52EE38EA10"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3173713D-909A-4DD3-9DD4-1E171EB057EE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "79F18AFA-40F7-43F0-BA30-7BDB65F918B9"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/454c454ed645fed051216b79622f7cb69c1638f5",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/5dfe2408fd7dc4d2e7ac38a116ff0a37b1cfd3b9",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/6cd4a78d962bebbaf8beb7d2ead3f34120e3f7b2",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/78e4aa528a7b1204219d808310524344f627d069",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/893eeba94c40d513cd0fe6539330ebdaea208c0e",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-40955",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-07-12T13:15:17.697",
|
||||
"lastModified": "2024-07-12T16:34:58.687",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-28T19:45:37.080",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,19 +15,89 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ext4: arreglar slab-out-of-bounds en ext4_mb_find_good_group_avg_frag_lists() Podemos activar un slab-out-of-bounds con los siguientes comandos: mkfs.ext4 -F /dev/ $disk 10G montaje /dev/$disk /tmp/test echo 2147483647 > /sys/fs/ext4/$disk/mb_group_prealloc echo test > /tmp/test/file && sync ============ ==================================================== ==== ERROR: KASAN: losa fuera de los l\u00edmites en ext4_mb_find_good_group_avg_frag_lists+0x8a/0x200 [ext4] Lectura de tama\u00f1o 8 en la direcci\u00f3n ffff888121b9d0f0 por tarea kworker/u2:0/11 CPU: 0 PID: 11 Comm: kworker/ u2:0 Tainted: GL 6.7.0-next-20240118 #521 Seguimiento de llamadas: dump_stack_lvl+0x2c/0x50 kasan_report+0xb6/0xf0 ext4_mb_find_good_group_avg_frag_lists+0x8a/0x200 [ext4_mb_regular_allocator+0x19e9 /0x2370 [ext4] text4_mb_new_blocks+0x88a/0x1370 [ text4] text4_ext_map_blocks+0x14f7/0x2390 [ext4] text4_map_blocks+0x569/0xea0 [ext4] text4_do_writepages+0x10f6/0x1bc0 [ext4] [...] ==================== ================================================ El flujo de La activaci\u00f3n del problema es la siguiente: // Establezca s_mb_group_prealloc en 2147483647 a trav\u00e9s de sysfs ext4_mb_new_blocks ext4_mb_normalize_request ext4_mb_normalize_group_request ac->ac_g_ex.fe_len = EXT4_SB(sb)->s_mb_group_prealloc ext4_mb_regular_allocator ext4_mb_choose _next_group ext4_mb_choose_next_group_best_avail mb_avg_fragment_size_order orden = fls(len) - 2 = 29 ext4_mb_find_good_group_avg_frag_lists frag_list = &sbi- >s_mb_avg_fragment_size[order] if (list_empty(frag_list)) // \u00a1Activa SOOB! En un tama\u00f1o de bloque de 4k, la longitud de la lista s_mb_avg_fragment_size es 14, pero se establece un s_mb_group_prealloc de gran tama\u00f1o, lo que provoca que los l\u00edmites de losa se activen al intentar acceder a un elemento en el \u00edndice 29. Agregue un nuevo attr_id attr_clusters_in_group con valores en el rango [0, sbi->s_clusters_per_group] y declare mb_group_prealloc como ese tipo para solucionar el problema. Adem\u00e1s, evite devolver un pedido de mb_avg_fragment_size_order() mayor que MB_NUM_ORDERS(sb) y reduzca algunos bucles in\u00fatiles."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.5",
|
||||
"versionEndExcluding": "6.6.36",
|
||||
"matchCriteriaId": "A9A441DF-0244-4D7F-B25A-F692568FFC15"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.9.7",
|
||||
"matchCriteriaId": "0A047AF2-94AC-4A3A-B32D-6AB930D8EF1C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/13df4d44a3aaabe61cd01d277b6ee23ead2a5206",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/677ff4589f1501578fa903a25bb14831d0607992",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/b829687ae1229224262bcabf49accfa2dbf8db06",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-40956",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-07-12T13:15:17.760",
|
||||
"lastModified": "2024-07-12T16:34:58.687",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-28T18:58:48.433",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,27 +15,137 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: dmaengine: idxd: corrija posible Use-After-Free en irq_process_work_list Use list_for_each_entry_safe() para permitir iterar a trav\u00e9s de la lista y eliminar la entrada en el proceso de iteraci\u00f3n. El descriptor se libera a trav\u00e9s de idxd_desc_complete() y existe una peque\u00f1a posibilidad de que cause problemas para el iterador de la lista cuando otro subproceso reutiliza el descriptor sin que se elimine de la lista."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11",
|
||||
"versionEndExcluding": "5.15.162",
|
||||
"matchCriteriaId": "10A39ACC-3005-40E8-875C-98A372D1FFD5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "6.1.96",
|
||||
"matchCriteriaId": "61E887B4-732A-40D2-9983-CC6F281EBFB7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2",
|
||||
"versionEndExcluding": "6.6.36",
|
||||
"matchCriteriaId": "E1046C95-860A-45B0-B718-2B29F65BFF10"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.9.7",
|
||||
"matchCriteriaId": "0A047AF2-94AC-4A3A-B32D-6AB930D8EF1C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2EBB4392-5FA6-4DA9-9772-8F9C750109FA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "331C2F14-12C7-45D5-893D-8C52EE38EA10"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3173713D-909A-4DD3-9DD4-1E171EB057EE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "79F18AFA-40F7-43F0-BA30-7BDB65F918B9"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/1b08bf5a17c66ab7dbb628df5344da53c8e7ab33",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/83163667d881100a485b6c2daa30301b7f68d9b5",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/a14968921486793f2a956086895c3793761309dd",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/e3215deca4520773cd2b155bed164c12365149a7",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/faa35db78b058a2ab6e074ee283f69fa398c36a8",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-40957",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-07-12T13:15:17.823",
|
||||
"lastModified": "2024-07-12T16:34:58.687",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-28T18:58:59.793",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,27 +15,137 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: seg6: corrige el paso de par\u00e1metros al llamar a NF_HOOK() en los comportamientos End.DX4 y End.DX6 input_action_end_dx4() y input_action_end_dx6() se llaman NF_HOOK() para el gancho PREROUTING, en el gancho PREROUTING , debemos pasar un indev v\u00e1lido y un outdev NULL a NF_HOOK(); de lo contrario, podemos desencadenar una desreferencia del puntero NULL, como se muestra a continuaci\u00f3n: [74830.647293] ERROR: desreferencia del puntero NULL del kernel, direcci\u00f3n: 00000000000000090 [74830.655633] #PF: acceso de lectura del supervisor en modo kernel [74830.657888] #PF: error_code(0x0000) - p\u00e1gina no presente [74830.659500] PGD 0 P4D 0 [74830.660450] Ups: 0000 [#1] PREEMPT SMP PTI... [74830.664953] Nombre de hardware: Red Hat KVM , BIOS 0.5.1 01/01/2011 [74830.666569] RIP: 0010:rpfilter_mt+0x44/0x15e [ipt_rpfilter] ... [74830.689725] Seguimiento de llamadas: [74830.690402] [74830.690953] ? show_trace_log_lvl+0x1c4/0x2df [74830.692020] ? show_trace_log_lvl+0x1c4/0x2df [74830.693095] ? ipt_do_table+0x286/0x710 [ip_tables] [74830.694275] ? __die_body.cold+0x8/0xd [74830.695205] ? page_fault_oops+0xac/0x140 [74830.696244] ? exc_page_fault+0x62/0x150 [74830.697225] ? asm_exc_page_fault+0x22/0x30 [74830.698344] ? rpfilter_mt+0x44/0x15e [ipt_rpfilter] [74830.699540] ipt_do_table+0x286/0x710 [ip_tables] [74830.700758] ? ip6_route_input+0x19d/0x240 [74830.701752] nf_hook_slow+0x3f/0xb0 [74830.702678] input_action_end_dx4+0x19b/0x1e0 [74830.703735] ? input_action_end_t+0xe0/0xe0 [74830.704734] seg6_local_input_core+0x2d/0x60 [74830.705782] lwtunnel_input+0x5b/0xb0 [74830.706690] __netif_receive_skb_one_core+0x63/0xa0 830.707825] proceso_atrasado+0x99/0x140 [74830.709538] __napi_poll+0x2c/0x160 [74830.710673] net_rx_action+ 0x296/0x350 [74830.711860] __do_softirq+0xcb/0x2ac [74830.713049] do_softirq+0x63/0x90 input_action_end_dx4() pasando un indev NULL a NF_HOOK(), y finalmente activa una desreferencia NULL en rpfilter_mt()->rpfilter_is_lo opback(): bool est\u00e1tico rpfilter_is_loopback (const struct sk_buff *skb, const struct net_device *in) { // in es NULL return skb->pkt_type == PACKET_LOOPBACK || en->flags & IFF_LOOPBACK; }"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.15",
|
||||
"versionEndExcluding": "5.15.162",
|
||||
"matchCriteriaId": "4626E4B7-D5F4-42CC-93A8-B73E6384273F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "6.1.96",
|
||||
"matchCriteriaId": "61E887B4-732A-40D2-9983-CC6F281EBFB7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2",
|
||||
"versionEndExcluding": "6.6.36",
|
||||
"matchCriteriaId": "E1046C95-860A-45B0-B718-2B29F65BFF10"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.9.7",
|
||||
"matchCriteriaId": "0A047AF2-94AC-4A3A-B32D-6AB930D8EF1C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2EBB4392-5FA6-4DA9-9772-8F9C750109FA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "331C2F14-12C7-45D5-893D-8C52EE38EA10"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3173713D-909A-4DD3-9DD4-1E171EB057EE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "79F18AFA-40F7-43F0-BA30-7BDB65F918B9"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/561475d53aa7e4511ee7cdba8728ded81cf1db1c",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/9a3bc8d16e0aacd65c31aaf23a2bced3288a7779",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/af90e3d73dc45778767b2fb6e7edd57ebe34380d",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/d62df86c172033679d744f07d89e93e367dd11f6",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/ec4d970b597ee5e17b0d8d73b7875197ce9a04d4",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-40958",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-07-12T13:15:17.883",
|
||||
"lastModified": "2024-07-12T16:34:58.687",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-28T18:46:29.543",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,35 +15,165 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: netns: haga que get_net_ns() maneje cero refcount net. Syzkaller recibi\u00f3 una advertencia: refcount_t: adici\u00f3n en 0; use-after-free. ADVERTENCIA: CPU: 3 PID: 7890 en lib/refcount.c:25 refcount_warn_saturate+0xdf/0x1d0 M\u00f3dulos vinculados en: CPU: 3 PID: 7890 Comm: tun No contaminado 6.10.0-rc3-00100-gcaa4f9578aba-dirty #310 Hardware nombre: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 01/04/2014 RIP: 0010:refcount_warn_saturate+0xdf/0x1d0 C\u00f3digo: 41 49 04 31 ff 89 de e8 9f 1e cd fe 84 db 75 9c e8 76 26 cd fe c6 05 b6 41 49 04 01 90 48 c7 c7 b8 8e 25 86 e8 d2 05 b5 fe 90 <0f> 0b 90 90 e9 79 ff ff ff e8 53 26 cd fe 0f b6 1 RSP: 0018: ffff8881067b7da0 EFLAGS: 00010286 RAX: 00000000000000000 RBX: 0000000000000000 RCX: ffffffff811c72ac RDX: ffff8881026a2140 RSI: ffffffff811c72b5 RDI: 0000000000000001 RBP: ffff8881067b7db0 R08: 0000000000000000 R09: 205b5d3730353139 R10: 00000000000000000 R11: 205d303938375420 R12: 8881086500c4 R13: ffff8881086500c4 R14: ffff8881086500b0 R15: ffff888108650040 FS : 00007f5b2961a4c0(0000) GS:ffff88823bd00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: fd18 CR3: 00000001482f6000 CR4: 00000000000006f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Seguimiento de llamadas: ? show_regs+0xa3/0xc0? __advertir+0xa5/0x1c0 ? refcount_warn_saturate+0xdf/0x1d0? report_bug+0x1fc/0x2d0? refcount_warn_saturate+0xdf/0x1d0? handle_bug+0xa1/0x110? exc_invalid_op+0x3c/0xb0? asm_exc_invalid_op+0x1f/0x30? __warn_printk+0xcc/0x140 ? __warn_printk+0xd5/0x140 ? refcount_warn_saturate+0xdf/0x1d0 get_net_ns+0xa4/0xc0 ? __pfx_get_net_ns+0x10/0x10 open_ related_ns+0x5a/0x130 __tun_chr_ioctl+0x1616/0x2370 ? __sanitizer_cov_trace_switch+0x58/0xa0? __sanitizer_cov_trace_const_cmp2+0x1c/0x30 ? __pfx_tun_chr_ioctl+0x10/0x10 tun_chr_ioctl+0x2f/0x40 __x64_sys_ioctl+0x11b/0x160 x64_sys_call+0x1211/0x20d0 do_syscall_64+0x9e/0x1d0 Entry_SYSCALL_64_after_h wframe+0x77/0x7f RIP: 0033:0x7f5b28f165d7 C\u00f3digo: b3 66 90 48 8b 05 b1 48 2d 00 64 c7 00 26 00 00 00 48 c7 c0 ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff 73 01 c3 48 8b 0d 81 48 2d 0 8 RSP: 002b:00007ffc2b59c5e8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f5b28f165d7 RDX: 000000000 RSI: 00000000000054e3 RDI: 0000000000000003 RBP: 00007ffc2b59c650 R08: 00007f5b291ed8c0 R09: 00007f5b2961a4c0 R10: 690010 R11: 0000000000000246 R12: 0000000000400730 R13: 00007ffc2b59cf40 R14: 0000000000000000 R15: 00000000000000000 P\u00e1nico del kernel - no sincronizado: kernel: p\u00e1nico_on_warn set ... Esto se activa como se muestra a continuaci\u00f3n: ns0 ns1 tun_set_iff() //dev is tun0 tun->dev = dev //ip link set tun0 netns ns1 put_net() //ref es 0 __tun_chr_ioctl() //TUNGETDEVNETNS net = dev_net(tun->dev); open_ related_ns(&net->ns, get_net_ns); //ns1 get_net_ns() get_net() //adici\u00f3n en 0 Use may_get_net() en get_net_ns en caso de que la referencia de red sea cero para solucionar este problema"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.2",
|
||||
"versionEndExcluding": "5.4.279",
|
||||
"matchCriteriaId": "5A16AF13-82B4-4031-88E2-F3A1AE0863D5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.5",
|
||||
"versionEndExcluding": "5.10.221",
|
||||
"matchCriteriaId": "659E1520-6345-41AF-B893-A7C0647585A0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11",
|
||||
"versionEndExcluding": "5.15.162",
|
||||
"matchCriteriaId": "10A39ACC-3005-40E8-875C-98A372D1FFD5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "6.1.96",
|
||||
"matchCriteriaId": "61E887B4-732A-40D2-9983-CC6F281EBFB7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2",
|
||||
"versionEndExcluding": "6.6.36",
|
||||
"matchCriteriaId": "E1046C95-860A-45B0-B718-2B29F65BFF10"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.9.7",
|
||||
"matchCriteriaId": "0A047AF2-94AC-4A3A-B32D-6AB930D8EF1C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2EBB4392-5FA6-4DA9-9772-8F9C750109FA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "331C2F14-12C7-45D5-893D-8C52EE38EA10"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3173713D-909A-4DD3-9DD4-1E171EB057EE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "79F18AFA-40F7-43F0-BA30-7BDB65F918B9"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/1b631bffcb2c09551888f3c723f4365c91fe05ef",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/2b82028a1f5ee3a8e04090776b10c534144ae77b",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/3a6cd326ead7c8bb1f64486789a01974a9f1ad55",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/3af28df0d883e8c89a29ac31bc65f9023485743b",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/cb7f811f638a14590ff98f53c6dd1fb54627d940",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/ef0394ca25953ea0eddcc82feae1f750451f1876",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/ff960f9d3edbe08a736b5a224d91a305ccc946b0",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-40959",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-07-12T13:15:17.947",
|
||||
"lastModified": "2024-07-12T16:34:58.687",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-28T18:46:52.453",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,39 +15,179 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: xfrm6: verifique el valor de retorno de ip6_dst_idev() en xfrm6_get_saddr() ip6_dst_idev() puede devolver NULL, xfrm6_get_saddr() debe actuar en consecuencia. syzbot inform\u00f3: Ups: falla de protecci\u00f3n general, probablemente para la direcci\u00f3n no can\u00f3nica 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN PTI KASAN: null-ptr-deref en el rango [0x0000000000000000-0x0000000000000007] CPU: 1 PID: 12 Comm: trabajador/ u8:1 No contaminado 6.10.0-rc2-syzkaller-00383-gb8481381d4e2 #0 Nombre del hardware: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/04/2024 Cola de trabajo: wg-kex-wg1 wg_packet_handshake_send_worker RIP: 0010:xfrm6_get_saddr +0x93/0x130 net/ipv6/xfrm6_policy.c:64 C\u00f3digo: df 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 97 00 00 00 4c 8b ab d8 00 00 00 48 b8 00 00 00 00 00 fc ff f 4c 89 ea 48 c1 ea 03 <80> 3c 02 00 0f 85 86 00 00 00 4d 8b 6d 00 e8 ca 13 47 01 48 b8 00 RSP: 0018:ffffc90000117378 EFLAGS: 00010246 RAX dff ffc0000000000 RBX: ffff88807b079dc0 RCX: ffffffff89a0d6d7 RDX: 0000000000000000 RSI: ffffffff89a0d6e9 RDI: ffff88807b079e98 RBP: ffff88807ad73248 R08: 0000000000000007 R09: ffffffffffff000 R10: ffff88807b079dc0 11: 0000000000000007 R12: ffffc90000117480 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 FS: 0000000000000000(0 000) GS:ffff8880b9300000(0000) knlGS:0000000000000000 CS : 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f4586d00440 CR3: 0000000079042000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Seguimiento de llamadas: xfrm_get_saddr net/xfrm/xfrm_policy .c:2452 [en l\u00ednea] xfrm_tmpl_resolve_one net/xfrm/xfrm_policy.c:2481 [en l\u00ednea] xfrm_tmpl_resolve+0xa26/0xf10 net/xfrm/xfrm_policy.c:2541 xfrm_resolve_and_create_bundle+0x140/0x2570 net/xfrm/xfrm_ pol\u00edtica.c:2835 xfrm_bundle_lookup net /xfrm/xfrm_policy.c:3070 [en l\u00ednea] xfrm_lookup_with_ifid+0x4d1/0x1e60 net/xfrm/xfrm_policy.c:3201 xfrm_lookup net/xfrm/xfrm_policy.c:3298 [en l\u00ednea] xfrm_lookup_route+0x3b/0x200 net/xfrm/xfrm _pol\u00edtica.c :3309 ip6_dst_lookup_flow+0x15c/0x1d0 net/ipv6/ip6_output.c:1256 send6+0x611/0xd20 controladores/net/wireguard/socket.c:139 wg_socket_send_skb_to_peer+0xf9/0x220 controladores/net/wireguard/socket.c:178 enviar_buffer_to_peer+ 0x12b/0x190 controladores/net/wireguard/socket.c:200 wg_packet_send_handshake_initiation+0x227/0x360 controladores/net/wireguard/send.c:40 wg_packet_handshake_send_worker+0x1c/0x30 controladores/net/wireguard/send.c:51 Process_one_work+0x9fb/ 0x1b60 kernel/workqueue.c:3231 Process_scheduled_works kernel/workqueue.c:3312 [en l\u00ednea] trabajador_thread+0x6c8/0xf70 kernel/workqueue.c:3393 kthread+0x2c1/0x3a0 kernel/kthread.c:389 ret_from_fork+0x45/0x80 arch/ x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2.6.12",
|
||||
"versionEndExcluding": "4.19.317",
|
||||
"matchCriteriaId": "4E229973-CC2A-4919-9D45-96986F94BAB1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.20",
|
||||
"versionEndExcluding": "5.4.279",
|
||||
"matchCriteriaId": "F4E38E58-1B9F-4DF2-AD3D-A8BEAA2959D8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.5",
|
||||
"versionEndExcluding": "5.10.221",
|
||||
"matchCriteriaId": "659E1520-6345-41AF-B893-A7C0647585A0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11",
|
||||
"versionEndExcluding": "5.15.162",
|
||||
"matchCriteriaId": "10A39ACC-3005-40E8-875C-98A372D1FFD5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "6.1.96",
|
||||
"matchCriteriaId": "61E887B4-732A-40D2-9983-CC6F281EBFB7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2",
|
||||
"versionEndExcluding": "6.6.36",
|
||||
"matchCriteriaId": "E1046C95-860A-45B0-B718-2B29F65BFF10"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.9.7",
|
||||
"matchCriteriaId": "0A047AF2-94AC-4A3A-B32D-6AB930D8EF1C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2EBB4392-5FA6-4DA9-9772-8F9C750109FA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "331C2F14-12C7-45D5-893D-8C52EE38EA10"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3173713D-909A-4DD3-9DD4-1E171EB057EE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "79F18AFA-40F7-43F0-BA30-7BDB65F918B9"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/20427b85781aca0ad072851f6907a3d4b2fed8d1",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/600a62b4232ac027f788c3ca395bc2333adeaacf",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/83c02fb2cc0afee5bb53cddf3f34f045f654ad6a",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/9f30f1f1a51d91e19f5a09236bb0b59e6a07ad08",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/c71761292d4d002a8eccb57b86792c4e3b3eb3c7",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/caf0bec84c62fb1cf6f7c9f0e8c857c87f8adbc3",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/d46401052c2d5614da8efea5788532f0401cb164",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/f897d7171652fcfc76d042bfec798b010ee89e41",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-412xx/CVE-2024-41236.json
Normal file
60
CVE-2024/CVE-2024-412xx/CVE-2024-41236.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-41236",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-28T18:15:09.497",
|
||||
"lastModified": "2024-08-28T18:35:16.790",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A SQL injection vulnerability in /smsa/admin_login.php in Kashipara Responsive School Management System v3.2.0 allows an attacker to execute arbitrary SQL commands via the \"username\" parameter of the Admin Login Page"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Responsive%20School%20Management%20System%20v3.2.0/SQL%20Injection%20-%20Admin.pdf",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.kashipara.com/project/php/12362/responsive-school-management-system-php-project-source-code",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-429xx/CVE-2024-42905.json
Normal file
60
CVE-2024/CVE-2024-429xx/CVE-2024-42905.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-42905",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-28T18:15:09.630",
|
||||
"lastModified": "2024-08-28T19:35:20.503",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Beijing Digital China Cloud Technology Co., Ltd. DCME-320 v.7.4.12.60 has a command execution vulnerability, which can be exploited to obtain device administrator privileges via the getVar function in the code/function/system/tool/ping.php file."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ZackSecurity/VulnerReport/blob/cve/DCN/1.md",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://immense-mirror-b42.notion.site/Beijing-Digital-China-Yunke-Information-Technology-Co-Ltd-DCN-firewall-has-a-command-execution-vuln-31bdd1228f6d47c09e854af5f0e7059f",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-43472",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2024-08-16T20:15:13.673",
|
||||
"lastModified": "2024-08-19T13:00:23.117",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-28T19:13:21.393",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -18,8 +18,28 @@
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.3,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 6.0
|
||||
},
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
@ -41,8 +61,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -51,10 +81,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:edge_chromium:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "127.0.2651.105",
|
||||
"matchCriteriaId": "FD5D1F37-DB27-4908-B519-EB29A99FE8AC"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43472",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-447xx/CVE-2024-44761.json
Normal file
21
CVE-2024/CVE-2024-447xx/CVE-2024-44761.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-44761",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-28T19:15:08.933",
|
||||
"lastModified": "2024-08-28T19:15:08.933",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in EQ Enterprise Management System before v2.0.0 allows attackers to execute a directory traversal via crafted requests."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/WarmBrew/web_vul/blob/main/EQ/EQEMS.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-449xx/CVE-2024-44913.json
Normal file
56
CVE-2024/CVE-2024-449xx/CVE-2024-44913.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-44913",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-28T18:15:09.707",
|
||||
"lastModified": "2024-08-28T19:35:21.377",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in the component EXR!ReadEXR+0x40ef1 of Irfanview v4.67.1.0 allows attackers to cause an access violation via a crafted EXR file. This vulnerability can lead to a Denial of Service (DoS)."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/yuhano/irfanview_Poc",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-449xx/CVE-2024-44914.json
Normal file
56
CVE-2024/CVE-2024-449xx/CVE-2024-44914.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-44914",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-28T18:15:09.780",
|
||||
"lastModified": "2024-08-28T19:35:22.160",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in the component EXR!ReadEXR+0x3df50 of Irfanview v4.67.1.0 allows attackers to cause an access violation via a crafted EXR file. This vulnerability can lead to a Denial of Service (DoS)."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/yuhano/irfanview_Poc",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-449xx/CVE-2024-44915.json
Normal file
56
CVE-2024/CVE-2024-449xx/CVE-2024-44915.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-44915",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-28T18:15:09.863",
|
||||
"lastModified": "2024-08-28T19:35:22.957",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in the component EXR!ReadEXR+0x4eef0 of Irfanview v4.67.1.0 allows attackers to cause an access violation via a crafted EXR file. This vulnerability can lead to a Denial of Service (DoS)."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/yuhano/irfanview_Poc",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-45191",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-22T16:15:10.120",
|
||||
"lastModified": "2024-08-23T16:18:28.547",
|
||||
"lastModified": "2024-08-28T19:15:09.110",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [
|
||||
{
|
||||
@ -15,7 +15,7 @@
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in Matrix libolm (aka Olm) through 3.2.16. The AES implementation is vulnerable to cache-timing attacks due to use of S-boxes. This is related to software that uses a lookup table for the SubWord step. NOTE: This vulnerability only affects products that are no longer supported by the maintainer."
|
||||
"value": "An issue was discovered in Matrix libolm through 3.2.16. The AES implementation is vulnerable to cache-timing attacks due to use of S-boxes. This is related to software that uses a lookup table for the SubWord step. NOTE: This vulnerability only affects products that are no longer supported by the maintainer."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-45192",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-22T16:15:10.237",
|
||||
"lastModified": "2024-08-23T16:18:28.547",
|
||||
"lastModified": "2024-08-28T19:15:09.210",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [
|
||||
{
|
||||
@ -15,7 +15,7 @@
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in Matrix libolm (aka Olm) through 3.2.16. Cache-timing attacks can occur due to use of base64 when decoding group session keys. NOTE: This vulnerability only affects products that are no longer supported by the maintainer."
|
||||
"value": "An issue was discovered in Matrix libolm through 3.2.16. Cache-timing attacks can occur due to use of base64 when decoding group session keys. NOTE: This vulnerability only affects products that are no longer supported by the maintainer."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-45193",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-22T16:15:10.300",
|
||||
"lastModified": "2024-08-23T16:18:28.547",
|
||||
"lastModified": "2024-08-28T19:15:09.297",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [
|
||||
{
|
||||
@ -15,7 +15,7 @@
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in Matrix libolm (aka Olm) through 3.2.16. There is Ed25519 signature malleability due to lack of validation criteria (does not ensure that S < n). NOTE: This vulnerability only affects products that are no longer supported by the maintainer."
|
||||
"value": "An issue was discovered in Matrix libolm through 3.2.16. There is Ed25519 signature malleability due to lack of validation criteria (does not ensure that S < n). NOTE: This vulnerability only affects products that are no longer supported by the maintainer."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-6361",
|
||||
"sourceIdentifier": "security@opentext.com",
|
||||
"published": "2024-08-05T19:15:38.333",
|
||||
"lastModified": "2024-08-06T16:30:24.547",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-28T18:17:35.497",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -59,9 +59,41 @@
|
||||
"baseSeverity": "HIGH"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security@opentext.com",
|
||||
"type": "Secondary",
|
||||
@ -73,10 +105,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opentext:alm_octane:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "23.4",
|
||||
"matchCriteriaId": "107C8D81-928E-491C-99E5-F52C2B43B332"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://portal.microfocus.com/s/article/KM000032605?language=en_US",
|
||||
"source": "security@opentext.com"
|
||||
"source": "security@opentext.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-7061",
|
||||
"sourceIdentifier": "psirt@okta.com",
|
||||
"published": "2024-08-07T17:15:52.113",
|
||||
"lastModified": "2024-08-07T19:09:46.290",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-28T18:25:38.217",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "psirt@okta.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-427"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "psirt@okta.com",
|
||||
"type": "Secondary",
|
||||
@ -55,14 +85,39 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:okta:verify:*:*:*:*:*:windows:*:*",
|
||||
"versionEndExcluding": "5.0.2",
|
||||
"matchCriteriaId": "951E2564-0B8A-49B9-A130-4647DF323B7E"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://help.okta.com/oie/en-us/content/topics/releasenotes/oie-ov-release-notes.htm#panel4",
|
||||
"source": "psirt@okta.com"
|
||||
"source": "psirt@okta.com",
|
||||
"tags": [
|
||||
"Not Applicable",
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://trust.okta.com/security-advisories/okta-verify-for-windows-privilege-escalation-cve-2024-7061/",
|
||||
"source": "psirt@okta.com"
|
||||
"source": "psirt@okta.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-7578",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-08-07T13:16:00.527",
|
||||
"lastModified": "2024-08-07T15:17:46.717",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-28T18:27:18.510",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -120,22 +140,70 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:alientechnology:alr-f800_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "19.10.24",
|
||||
"matchCriteriaId": "5EC1F8CB-8783-4A48-AF4E-6336310410EC"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:alientechnology:alr-f800:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A3CE7137-0ED2-47C0-A374-D41869F80314"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Push3AX/vul/blob/main/Alien%20Technology%20/ALR-F800.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.273858",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.273858",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.382469",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-7579",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-08-07T14:15:33.380",
|
||||
"lastModified": "2024-08-07T15:17:46.717",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-28T18:26:46.117",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -120,22 +140,70 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:alientechnology:alr-f800_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "19.10.24",
|
||||
"matchCriteriaId": "5EC1F8CB-8783-4A48-AF4E-6336310410EC"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:alientechnology:alr-f800:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A3CE7137-0ED2-47C0-A374-D41869F80314"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Push3AX/vul/blob/main/Alien%20Technology%20/ALR-F800.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.273859",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.273859",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.382470",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
80
README.md
80
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-08-28T18:00:18.030891+00:00
|
||||
2024-08-28T20:00:17.696095+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-08-28T17:59:36.023000+00:00
|
||||
2024-08-28T19:59:22.927000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,60 +33,50 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
261387
|
||||
261393
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `16`
|
||||
Recently added CVEs: `6`
|
||||
|
||||
- [CVE-2024-20279](CVE-2024/CVE-2024-202xx/CVE-2024-20279.json) (`2024-08-28T17:15:06.113`)
|
||||
- [CVE-2024-20284](CVE-2024/CVE-2024-202xx/CVE-2024-20284.json) (`2024-08-28T17:15:06.893`)
|
||||
- [CVE-2024-20285](CVE-2024/CVE-2024-202xx/CVE-2024-20285.json) (`2024-08-28T17:15:07.687`)
|
||||
- [CVE-2024-20286](CVE-2024/CVE-2024-202xx/CVE-2024-20286.json) (`2024-08-28T17:15:08.400`)
|
||||
- [CVE-2024-20289](CVE-2024/CVE-2024-202xx/CVE-2024-20289.json) (`2024-08-28T17:15:09.117`)
|
||||
- [CVE-2024-20411](CVE-2024/CVE-2024-204xx/CVE-2024-20411.json) (`2024-08-28T17:15:09.500`)
|
||||
- [CVE-2024-20413](CVE-2024/CVE-2024-204xx/CVE-2024-20413.json) (`2024-08-28T17:15:09.763`)
|
||||
- [CVE-2024-20446](CVE-2024/CVE-2024-204xx/CVE-2024-20446.json) (`2024-08-28T17:15:09.997`)
|
||||
- [CVE-2024-20478](CVE-2024/CVE-2024-204xx/CVE-2024-20478.json) (`2024-08-28T17:15:10.220`)
|
||||
- [CVE-2024-41564](CVE-2024/CVE-2024-415xx/CVE-2024-41564.json) (`2024-08-28T17:15:10.693`)
|
||||
- [CVE-2024-41565](CVE-2024/CVE-2024-415xx/CVE-2024-41565.json) (`2024-08-28T17:15:10.903`)
|
||||
- [CVE-2024-42698](CVE-2024/CVE-2024-426xx/CVE-2024-42698.json) (`2024-08-28T16:15:09.210`)
|
||||
- [CVE-2024-42900](CVE-2024/CVE-2024-429xx/CVE-2024-42900.json) (`2024-08-28T16:15:09.443`)
|
||||
- [CVE-2024-6053](CVE-2024/CVE-2024-60xx/CVE-2024-6053.json) (`2024-08-28T17:15:11.163`)
|
||||
- [CVE-2024-7744](CVE-2024/CVE-2024-77xx/CVE-2024-7744.json) (`2024-08-28T17:15:11.380`)
|
||||
- [CVE-2024-7745](CVE-2024/CVE-2024-77xx/CVE-2024-7745.json) (`2024-08-28T17:15:11.593`)
|
||||
- [CVE-2024-41236](CVE-2024/CVE-2024-412xx/CVE-2024-41236.json) (`2024-08-28T18:15:09.497`)
|
||||
- [CVE-2024-42905](CVE-2024/CVE-2024-429xx/CVE-2024-42905.json) (`2024-08-28T18:15:09.630`)
|
||||
- [CVE-2024-44761](CVE-2024/CVE-2024-447xx/CVE-2024-44761.json) (`2024-08-28T19:15:08.933`)
|
||||
- [CVE-2024-44913](CVE-2024/CVE-2024-449xx/CVE-2024-44913.json) (`2024-08-28T18:15:09.707`)
|
||||
- [CVE-2024-44914](CVE-2024/CVE-2024-449xx/CVE-2024-44914.json) (`2024-08-28T18:15:09.780`)
|
||||
- [CVE-2024-44915](CVE-2024/CVE-2024-449xx/CVE-2024-44915.json) (`2024-08-28T18:15:09.863`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `57`
|
||||
|
||||
- [CVE-2024-25579](CVE-2024/CVE-2024-255xx/CVE-2024-25579.json) (`2024-08-28T16:35:14.267`)
|
||||
- [CVE-2024-25655](CVE-2024/CVE-2024-256xx/CVE-2024-25655.json) (`2024-08-28T16:35:15.510`)
|
||||
- [CVE-2024-25859](CVE-2024/CVE-2024-258xx/CVE-2024-25859.json) (`2024-08-28T16:35:16.347`)
|
||||
- [CVE-2024-25866](CVE-2024/CVE-2024-258xx/CVE-2024-25866.json) (`2024-08-28T16:35:17.133`)
|
||||
- [CVE-2024-26470](CVE-2024/CVE-2024-264xx/CVE-2024-26470.json) (`2024-08-28T16:35:18.190`)
|
||||
- [CVE-2024-28125](CVE-2024/CVE-2024-281xx/CVE-2024-28125.json) (`2024-08-28T16:35:19.333`)
|
||||
- [CVE-2024-28537](CVE-2024/CVE-2024-285xx/CVE-2024-28537.json) (`2024-08-28T16:35:20.337`)
|
||||
- [CVE-2024-28640](CVE-2024/CVE-2024-286xx/CVE-2024-28640.json) (`2024-08-28T16:35:21.193`)
|
||||
- [CVE-2024-34087](CVE-2024/CVE-2024-340xx/CVE-2024-34087.json) (`2024-08-28T16:35:22.590`)
|
||||
- [CVE-2024-35325](CVE-2024/CVE-2024-353xx/CVE-2024-35325.json) (`2024-08-28T16:15:08.417`)
|
||||
- [CVE-2024-35326](CVE-2024/CVE-2024-353xx/CVE-2024-35326.json) (`2024-08-28T16:15:08.740`)
|
||||
- [CVE-2024-35328](CVE-2024/CVE-2024-353xx/CVE-2024-35328.json) (`2024-08-28T16:15:08.863`)
|
||||
- [CVE-2024-35329](CVE-2024/CVE-2024-353xx/CVE-2024-35329.json) (`2024-08-28T16:15:08.980`)
|
||||
- [CVE-2024-38856](CVE-2024/CVE-2024-388xx/CVE-2024-38856.json) (`2024-08-28T16:15:58.043`)
|
||||
- [CVE-2024-3980](CVE-2024/CVE-2024-39xx/CVE-2024-3980.json) (`2024-08-28T16:32:20.957`)
|
||||
- [CVE-2024-3982](CVE-2024/CVE-2024-39xx/CVE-2024-3982.json) (`2024-08-28T16:30:50.080`)
|
||||
- [CVE-2024-39930](CVE-2024/CVE-2024-399xx/CVE-2024-39930.json) (`2024-08-28T16:15:09.077`)
|
||||
- [CVE-2024-41310](CVE-2024/CVE-2024-413xx/CVE-2024-41310.json) (`2024-08-28T17:42:01.190`)
|
||||
- [CVE-2024-41657](CVE-2024/CVE-2024-416xx/CVE-2024-41657.json) (`2024-08-28T16:13:35.140`)
|
||||
- [CVE-2024-41658](CVE-2024/CVE-2024-416xx/CVE-2024-41658.json) (`2024-08-28T16:08:31.743`)
|
||||
- [CVE-2024-42845](CVE-2024/CVE-2024-428xx/CVE-2024-42845.json) (`2024-08-28T16:35:23.650`)
|
||||
- [CVE-2024-43915](CVE-2024/CVE-2024-439xx/CVE-2024-43915.json) (`2024-08-28T17:44:45.193`)
|
||||
- [CVE-2024-4872](CVE-2024/CVE-2024-48xx/CVE-2024-4872.json) (`2024-08-28T16:25:02.097`)
|
||||
- [CVE-2024-7940](CVE-2024/CVE-2024-79xx/CVE-2024-7940.json) (`2024-08-28T16:24:07.043`)
|
||||
- [CVE-2024-7941](CVE-2024/CVE-2024-79xx/CVE-2024-7941.json) (`2024-08-28T16:09:03.693`)
|
||||
- [CVE-2024-30624](CVE-2024/CVE-2024-306xx/CVE-2024-30624.json) (`2024-08-28T18:35:15.953`)
|
||||
- [CVE-2024-31819](CVE-2024/CVE-2024-318xx/CVE-2024-31819.json) (`2024-08-28T19:35:18.897`)
|
||||
- [CVE-2024-39504](CVE-2024/CVE-2024-395xx/CVE-2024-39504.json) (`2024-08-28T19:58:45.653`)
|
||||
- [CVE-2024-39506](CVE-2024/CVE-2024-395xx/CVE-2024-39506.json) (`2024-08-28T19:58:56.013`)
|
||||
- [CVE-2024-39510](CVE-2024/CVE-2024-395xx/CVE-2024-39510.json) (`2024-08-28T19:59:12.947`)
|
||||
- [CVE-2024-39717](CVE-2024/CVE-2024-397xx/CVE-2024-39717.json) (`2024-08-28T19:47:25.410`)
|
||||
- [CVE-2024-40530](CVE-2024/CVE-2024-405xx/CVE-2024-40530.json) (`2024-08-28T19:15:08.717`)
|
||||
- [CVE-2024-40531](CVE-2024/CVE-2024-405xx/CVE-2024-40531.json) (`2024-08-28T19:15:08.797`)
|
||||
- [CVE-2024-40899](CVE-2024/CVE-2024-408xx/CVE-2024-40899.json) (`2024-08-28T19:59:22.927`)
|
||||
- [CVE-2024-40932](CVE-2024/CVE-2024-409xx/CVE-2024-40932.json) (`2024-08-28T19:48:53.420`)
|
||||
- [CVE-2024-40934](CVE-2024/CVE-2024-409xx/CVE-2024-40934.json) (`2024-08-28T19:49:04.307`)
|
||||
- [CVE-2024-40954](CVE-2024/CVE-2024-409xx/CVE-2024-40954.json) (`2024-08-28T19:43:58.273`)
|
||||
- [CVE-2024-40955](CVE-2024/CVE-2024-409xx/CVE-2024-40955.json) (`2024-08-28T19:45:37.080`)
|
||||
- [CVE-2024-40956](CVE-2024/CVE-2024-409xx/CVE-2024-40956.json) (`2024-08-28T18:58:48.433`)
|
||||
- [CVE-2024-40957](CVE-2024/CVE-2024-409xx/CVE-2024-40957.json) (`2024-08-28T18:58:59.793`)
|
||||
- [CVE-2024-40958](CVE-2024/CVE-2024-409xx/CVE-2024-40958.json) (`2024-08-28T18:46:29.543`)
|
||||
- [CVE-2024-40959](CVE-2024/CVE-2024-409xx/CVE-2024-40959.json) (`2024-08-28T18:46:52.453`)
|
||||
- [CVE-2024-43472](CVE-2024/CVE-2024-434xx/CVE-2024-43472.json) (`2024-08-28T19:13:21.393`)
|
||||
- [CVE-2024-45191](CVE-2024/CVE-2024-451xx/CVE-2024-45191.json) (`2024-08-28T19:15:09.110`)
|
||||
- [CVE-2024-45192](CVE-2024/CVE-2024-451xx/CVE-2024-45192.json) (`2024-08-28T19:15:09.210`)
|
||||
- [CVE-2024-45193](CVE-2024/CVE-2024-451xx/CVE-2024-45193.json) (`2024-08-28T19:15:09.297`)
|
||||
- [CVE-2024-6361](CVE-2024/CVE-2024-63xx/CVE-2024-6361.json) (`2024-08-28T18:17:35.497`)
|
||||
- [CVE-2024-7061](CVE-2024/CVE-2024-70xx/CVE-2024-7061.json) (`2024-08-28T18:25:38.217`)
|
||||
- [CVE-2024-7578](CVE-2024/CVE-2024-75xx/CVE-2024-7578.json) (`2024-08-28T18:27:18.510`)
|
||||
- [CVE-2024-7579](CVE-2024/CVE-2024-75xx/CVE-2024-7579.json) (`2024-08-28T18:26:46.117`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
266
_state.csv
266
_state.csv
@ -92623,7 +92623,7 @@ CVE-2016-9838,0,0,8915e7a7760dab1b83ccc9fcf5714761065d956e576593ed79dbce273e9baa
|
||||
CVE-2016-9839,0,0,56dd29d3d2add257a8ccbd99c526531df97870ecd1b87178196e5e22a1a37a37,2023-01-31T19:58:56.190000
|
||||
CVE-2016-9840,0,0,c8cdfedcf9ba9d30c2e11a30c9ee1027f9c4943670cac0713400edb96b12ecbf,2023-11-07T02:37:35.780000
|
||||
CVE-2016-9841,0,0,8461023f0b6af372abbc700df4bf248326f3d17885a444f7d4bf87fb75831d87,2023-11-07T02:37:36.093000
|
||||
CVE-2016-9842,0,1,f887688450a4850080a5fa5b9a8d1985988eec4aa2e1048034fa4a27dddd287e,2024-08-28T16:07:50.587000
|
||||
CVE-2016-9842,0,0,f887688450a4850080a5fa5b9a8d1985988eec4aa2e1048034fa4a27dddd287e,2024-08-28T16:07:50.587000
|
||||
CVE-2016-9843,0,0,03bba8f361b4f311c57e6be0a8dca8d549e9547ec0826de5125cdde6ebac4654,2023-11-07T02:37:36.807000
|
||||
CVE-2016-9844,0,0,00ba3ac318d524a060543298e92f49ba342658607b49204e522db0201c5e4e2a,2019-12-16T20:24:14.587000
|
||||
CVE-2016-9845,0,0,00bb0b1bdce117249db0d0b791e75c832a7a8fdd6ba23a94074ca0696959dbbe,2020-11-10T19:23:05.543000
|
||||
@ -121384,7 +121384,7 @@ CVE-2018-25095,0,0,6f4ec7520fe1e8e1137939a36d89eebffe41414142eb46d5c5f36cf386b6b
|
||||
CVE-2018-25096,0,0,0f1a9d2fe0943450f70fc2f111ebfdebd2f2c63d07ffdb5b75cb7af27e02a352,2024-05-17T01:27:30.770000
|
||||
CVE-2018-25097,0,0,b132b2c05ec96134ee21d6c1f5f845fb6d9b53254de5311e7c1f18ebf1a12d65,2024-05-17T01:27:30.893000
|
||||
CVE-2018-25098,0,0,afd500b111d854a57f928388ff40ee517eeef41a47b8f0c70385aae8f8a38f95,2024-08-05T13:15:46.743000
|
||||
CVE-2018-25099,0,1,22c87c7789711d5cc0070c0c244e3b7eff042bf6e9bfc44eac77be6b7d7fb00e,2024-08-28T16:35:00.880000
|
||||
CVE-2018-25099,0,0,22c87c7789711d5cc0070c0c244e3b7eff042bf6e9bfc44eac77be6b7d7fb00e,2024-08-28T16:35:00.880000
|
||||
CVE-2018-25100,0,0,d942384485e6477ac02d774d7915e3145ff5d011228e897d01068d424d5fde66,2024-08-01T13:41:42.160000
|
||||
CVE-2018-25101,0,0,f5cb23a560b5f7e2ed0bc287e9dbbe48d218ed9a2d3fbe094521b3e09b217300,2024-06-04T19:16:57.060000
|
||||
CVE-2018-25103,0,0,e59105c00442742ab1ecc8faba8dbf0d67b37225837a23e9578526d5287d5f7e,2024-07-09T16:15:02.787000
|
||||
@ -136789,7 +136789,7 @@ CVE-2019-19820,0,0,d3200ebc5d581b4755916a609fe50979edea5a15e0fc3a04ffa5f71613f4e
|
||||
CVE-2019-19821,0,0,5d4ec7e2bffa15750c2939c0e7d2adea2bc3396ead4c3fc172fe464bc3578a28,2020-08-24T17:37:01.140000
|
||||
CVE-2019-19822,0,0,f372437f800ae6340a6e164d4e09649bd7569c516be8f3889c8ec515ac663de0,2020-08-24T17:37:01.140000
|
||||
CVE-2019-19823,0,0,3f6ad46dcab8a2c03d46210de505a5e9a1aaa92fdf0608ae333a991ddf15937a,2020-02-06T16:04:39.370000
|
||||
CVE-2019-19824,0,1,470dce5093b75447bd94440b7c6f03be30ee4db4f4b74c0509d2f6e47234a226,2024-08-28T16:15:07.290000
|
||||
CVE-2019-19824,0,0,470dce5093b75447bd94440b7c6f03be30ee4db4f4b74c0509d2f6e47234a226,2024-08-28T16:15:07.290000
|
||||
CVE-2019-19825,0,0,04de0123f214687b69fe0b70940205a91ae0ecd6ff99d9fd325f56ef736a2f2b,2020-02-05T14:35:31.347000
|
||||
CVE-2019-19826,0,0,2689ee020ae9e5e4ebe835dbcc0a88d036a8c5de49eae99421281d65c6938d42,2019-12-27T16:49:24.693000
|
||||
CVE-2019-19829,0,0,3f73ae381fa8469b280488161d5fec22d571a4f6250d30f76b53103ab377bf65,2019-12-23T12:27:16.840000
|
||||
@ -147483,7 +147483,7 @@ CVE-2020-1261,0,0,facd24f80876f2ac6682cd4ffcda5908f697f57ca36f3a6dbb2ed3896e7945
|
||||
CVE-2020-12612,0,0,27c013661b38b08d73a9ed802a24540f4841a815e7c5477dd782dabe8437df9c,2023-12-15T16:24:27.337000
|
||||
CVE-2020-12613,0,0,c95356c17bc093130235aa64aae86584b7d9b965bf99a8b709408a2aaf3f050c,2023-12-14T16:37:11.820000
|
||||
CVE-2020-12614,0,0,847dc8f32da2d3c78a4e8ef365590ce7648ef554d7da2f4e7aa6d04370642371,2024-08-01T13:42:02.280000
|
||||
CVE-2020-12615,0,1,cee1614af6805d53af2421028afbdb88ae531b53c887c8bfa80b60d7e96edf01,2024-08-28T17:35:00.743000
|
||||
CVE-2020-12615,0,0,cee1614af6805d53af2421028afbdb88ae531b53c887c8bfa80b60d7e96edf01,2024-08-28T17:35:00.743000
|
||||
CVE-2020-12618,0,0,6597e2bb9a8de14b97fe7ce944c521c20b776df974886bc6ada82eff63e8acda,2021-07-21T11:39:23.747000
|
||||
CVE-2020-12619,0,0,ee598b4bf1d4265af77d330472cf7b83e088560073a1c2a3d5a6cf8d6eb12600,2021-07-21T11:39:23.747000
|
||||
CVE-2020-1262,0,0,21c4e042f0bae4f9c23017151de84d72ef7a045e9efdf2cc4d6cb16ca079a3e6,2021-07-21T11:39:23.747000
|
||||
@ -172434,7 +172434,7 @@ CVE-2021-27306,0,0,6abb731f828d50dc31f5f8837f00ca666d352d589a763274228d94676f30c
|
||||
CVE-2021-27308,0,0,e75f64a338a590d6b8449ea646ab6c14feb2426700cc002f9c97dbfbf9db1140,2022-05-23T22:32:02.527000
|
||||
CVE-2021-27309,0,0,8f9d76be4305a6f70900f6114f260a4b3c8b50eb1326d17357d09b984d01979e,2021-03-24T18:49:25.550000
|
||||
CVE-2021-27310,0,0,17a88a926ef1eb0c9fffe07d584ba0bf2cca7e1fb363224d505448be27be189d,2021-03-24T18:49:16.487000
|
||||
CVE-2021-27312,0,0,50863b3469159a699f42002b846c223ed326fe3011cb56fbfc8510a3590b7b2a,2024-04-03T12:38:04.840000
|
||||
CVE-2021-27312,0,1,582b4519c2f7da9307132dd1ce33c17599b9214773e4d22a91abd408d1004b84,2024-08-28T19:35:00.870000
|
||||
CVE-2021-27314,0,0,ef81da613fa1d85737a5304fe0630c44874df715bb96267109aa2ed2ca143cf7,2021-03-05T20:45:06.427000
|
||||
CVE-2021-27315,0,0,3677cea89d40f4da4399e75a818af2539c61b38b6962a639337d49aae8920b57,2021-03-24T15:53:20.323000
|
||||
CVE-2021-27316,0,0,337c98afb6705298ed6fdf81f64738cc12146f58af35bb909361215bab6049a6,2021-03-24T15:54:58.873000
|
||||
@ -213969,7 +213969,7 @@ CVE-2023-1494,0,0,fabe57685f9f065291cb73b5da5d58e55c63347ea4b821215e6a77cd8e6703
|
||||
CVE-2023-1495,0,0,52d3a63f7531a21742127196634a25b8aac0e9134944b225f239008a7eb20fba,2024-05-17T02:18:10.487000
|
||||
CVE-2023-1496,0,0,3ad20729adb8da7a942dfca3bf38af88fc6858bc7a66965d5ec257bb936aaa30,2023-03-24T01:52:42.833000
|
||||
CVE-2023-1497,0,0,43a07682b47772aadc64da8126950dfea0d545240de7c9596bc9fee6200700c4,2024-05-17T02:18:10.633000
|
||||
CVE-2023-1498,0,1,4d50d5dbc3486095aedc7eaa2f308030e3ee52eaefe33b180e0e29b5a94f7140,2024-08-28T17:20:31.837000
|
||||
CVE-2023-1498,0,0,4d50d5dbc3486095aedc7eaa2f308030e3ee52eaefe33b180e0e29b5a94f7140,2024-08-28T17:20:31.837000
|
||||
CVE-2023-1499,0,0,8ff3854eaf9c82717c95e16a68fcb189e93074538f80edc381c1653810d6905e,2024-05-17T02:18:10.843000
|
||||
CVE-2023-1500,0,0,3e6c08282f27193f563da01f48a334141476b60383b5180210ca9fe12b3b5de6,2024-05-17T02:18:10.947000
|
||||
CVE-2023-1501,0,0,d6509f5f5f21ad6ed83987bcae6b52f819de1d497f3a8c7a59f97f9b53e05666,2024-05-17T02:18:11.043000
|
||||
@ -218046,7 +218046,7 @@ CVE-2023-2433,0,0,fcefb1d744e2436ca34c1e96068dcbd24fc8579f4fa267fa852ea1937f688b
|
||||
CVE-2023-24330,0,0,f05bada3541e493f7c0e952b860209e4955262c38b475c09bca0b6c5156aade2,2024-08-01T13:43:24.723000
|
||||
CVE-2023-24331,0,0,050f04d9bf3b2540619b4f1f79736e1598d2474273dc0664c9e95b1007380a03,2024-02-22T19:07:27.197000
|
||||
CVE-2023-24332,0,0,1c7be458c561d88b0c65bf8a70fcb4598344686f5f419e9a0237e871f28b3aa5,2024-08-14T15:35:01.550000
|
||||
CVE-2023-24333,0,0,3802b33c7cad8c386d2ca49a744a79027853ce07a3ef304671c801e3c9a7dcd0,2024-02-22T19:07:27.197000
|
||||
CVE-2023-24333,0,1,7e9df531c069ed4755a06f2fb82b4efefe770605f70313b1d809bac7d59607a8,2024-08-28T18:35:00.873000
|
||||
CVE-2023-24334,0,0,6e7ba58a919aa1ee8ff4fce321878db0fcd5ef0e2aebc034e541821e975781cb,2024-08-01T13:43:27.040000
|
||||
CVE-2023-2434,0,0,a9f172aa8578fb49449bc37bd820ab24b165eed89a9643a4cca796b2ac20b5bf,2023-12-18T15:32:39.347000
|
||||
CVE-2023-24343,0,0,d251214a0e80bbc1652809830ae45654632b0e128cea4fecfea9ad00cc1f3017,2023-04-26T18:55:30.893000
|
||||
@ -225418,7 +225418,7 @@ CVE-2023-33672,0,0,291fb7f59d1eae6b75bde1b5d591242bc0fb25cab928068f6a85a8688c610
|
||||
CVE-2023-33673,0,0,c54995448b4f5118860c2c72a41cb2379fdd61584cffca9b1c4f30c22fddffd4,2023-06-12T13:15:10.967000
|
||||
CVE-2023-33675,0,0,381da06a94ad6f9361a878c803e4e1fb1f9a7067c3b213f78ad9c1dfbf3d4a3c,2023-06-12T13:15:11.027000
|
||||
CVE-2023-33676,0,0,d8f74a6186c94f33f7f4dd75f85dc420a2cca6e4b92a04965885a06575277154,2024-08-16T17:35:02.057000
|
||||
CVE-2023-33677,0,0,fdaeb49d64bdf1efa8b5411d739207103f1736e1ceb5ef124ebf0bc2d9538056,2024-03-06T15:18:08.093000
|
||||
CVE-2023-33677,0,1,35438bc3c583b720476f0810047f72c89de7148b69d615cdaedc0dd5902008d1,2024-08-28T19:35:04.520000
|
||||
CVE-2023-3368,0,0,b9cfa1fb1e0c63886e4f96496a557e99b9be48828e3aceb01ab78631664a93ea,2023-12-04T18:57:35.040000
|
||||
CVE-2023-33684,0,0,afc92e89b7d5bca4bcdf52147d5685baff42318e93d9730a4d548a1a2dfb30f9,2024-02-16T20:34:46.687000
|
||||
CVE-2023-3369,0,0,29db5da69a767c35aea22ed723b1c6ee7c43f48ed1175441113bf5511d1f51e2,2023-11-07T04:18:36.577000
|
||||
@ -230203,7 +230203,7 @@ CVE-2023-40096,0,0,80c28bf71c8b791e73e10c9865fe8d8ebce552d17765524b6f7ba8d0a8a23
|
||||
CVE-2023-40097,0,0,fcc14a5c69e91f7c4d728f7cbe0f0a48c2badf3e8d8d2f00222df0c4c9ef7a84,2024-02-02T03:14:39.080000
|
||||
CVE-2023-40098,0,0,69f1206eae11d461353fadcedd8eb7551d87c233816314ea6c393cc2539141ed,2024-02-02T03:14:34.950000
|
||||
CVE-2023-4010,0,0,a8a9f7812f565816476651b6e5296effbd88d1bb2d79eb39527cfc3f0a26dfd0,2023-11-07T04:22:02.797000
|
||||
CVE-2023-40100,0,0,50885e1c8769688bc390208d2038bf237fc25b1a40529a82483ae99f45848f88,2024-02-16T13:38:00.047000
|
||||
CVE-2023-40100,0,1,d865222f08aa85ede2d3681caf9207be6bcb8c87eca41307d9aef1926195b418,2024-08-28T19:35:06.173000
|
||||
CVE-2023-40101,0,0,3ce51d90b0e7e589809d744dc88bb96b7c66c60685aebf47c83df3167c5dd843,2023-11-07T00:52:28.560000
|
||||
CVE-2023-40103,0,0,450c3a391def7a8afcbefb17dfde1c695cebaffcfd18ba45db0f0094ffb67ee0,2024-02-02T03:14:29.707000
|
||||
CVE-2023-40104,0,0,0cf270b8607bfa9d4e1d8714c505120c5fc75b5ddb276c75d9c23f91e95a9b08,2024-08-01T13:44:27.157000
|
||||
@ -230327,8 +230327,8 @@ CVE-2023-40235,0,0,72105b9c559b1ddc2ad9f13c18ab13a9fa55a22727500e92992c4e0f4ec55
|
||||
CVE-2023-40236,0,0,14f71801e1dfdcd9b355f3adbfa06238032294610f81b46a111266eb7777a93e,2023-12-29T18:39:44.950000
|
||||
CVE-2023-40238,0,0,8cd9a6ac9959ba296d215977c1b87d1d771afcf7aab5c34be210430f1271dda5,2024-01-05T18:15:29.060000
|
||||
CVE-2023-40239,0,0,aa0e89bb1e96bd5e8e2f363b3dde8360217f94f32277b47a1c6e77ce38b58a84,2023-09-07T16:26:26.913000
|
||||
CVE-2023-4024,0,0,8b527ef8d077fbb0e500e3ca07ee111bf71b07633714b2466fdffc55fe2754fb,2024-08-19T13:00:23.117000
|
||||
CVE-2023-4025,0,0,b2b0365977676536606768ca44b0505351e1c2f076c8fcb1931f17fddb8a018e,2024-08-19T13:00:23.117000
|
||||
CVE-2023-4024,0,1,3263f70bc4cfa471a1ebfbe3b6dd7f1caa59a19b55a8814fb5cad997ea7b1073,2024-08-28T18:32:02.433000
|
||||
CVE-2023-4025,0,1,875d633a8539be92bae12be6b1a35372471c5c3157e9171ada60f67dadd02517,2024-08-28T18:30:15.657000
|
||||
CVE-2023-40250,0,0,e7ce0448e3779d770797cca3047b64ac1d7604cdc050879a2952ebbea5fc57b1,2024-01-18T20:24:35.633000
|
||||
CVE-2023-40251,0,0,e47d373aa9704daf646bd928a2cc0678149d495cfca9b7abbd3818e5c74903f1,2023-08-29T02:15:08.277000
|
||||
CVE-2023-40252,0,0,27897e9f2fd3e9374d607e66dbdfb25f185ac2f919ae5207dfb1a7fd5974c153,2023-08-29T02:15:08.503000
|
||||
@ -231325,7 +231325,7 @@ CVE-2023-4149,0,0,5a341b7a68a99d862a2511fd7c4a78db3797c78d3afe50d681d537931f6fe4
|
||||
CVE-2023-4150,0,0,9e17d01d6dfd1bbad4581e9bdc99c95cb8eb97d9ecbd407283e813b7b9285ddf,2023-11-07T04:22:11.360000
|
||||
CVE-2023-41503,0,0,21a3f966ba8ab913409d2ff2fb633345f410b80e162d1526608421e53802bf8f,2024-08-02T19:35:22.577000
|
||||
CVE-2023-41504,0,0,848cc4699c1e8eb18242fd890d1d1b583b0b775a2ec9c39e2320016a91149dcd,2024-08-05T14:35:01.417000
|
||||
CVE-2023-41505,0,0,44cd3289634ca7cfd83a651030e9a773c9400d14c9f6e397b5380ee841c3c7ce,2024-03-14T12:52:21.763000
|
||||
CVE-2023-41505,0,1,aefb47bffb6d5b20a178fde4ec0b5b68799db86995d46b1812020cc11de222af,2024-08-28T19:35:06.953000
|
||||
CVE-2023-41506,0,0,d854ac7b20badfa924f73cdc9c8d229d9b3405b1560ab063fe84fca34598864e,2024-08-27T20:35:01.473000
|
||||
CVE-2023-41507,0,0,42d7d587d5d24994ad22c5fee4b7a0d6974f9356ec83148dba96a9f7c6064ec6,2023-09-08T16:51:07.547000
|
||||
CVE-2023-41508,0,0,9c51a520e4e0cd0b92dd417c82bafa4b094dbd24138cf8d018d6424f00a3ea0c,2023-09-11T18:53:12.833000
|
||||
@ -232092,7 +232092,7 @@ CVE-2023-42578,0,0,23816d96a4e8f8e7a85e681befe6c1b4beef53cae2b13da25d8ba105d77fb
|
||||
CVE-2023-42579,0,0,943fbf5d99df6edb832545cbbb389aa9f400ef688a2c81d3258a334debe4480e,2023-12-12T21:22:00.157000
|
||||
CVE-2023-4258,0,0,70cc916926ada92ee8983ef15a32e9a54f92480bc5437f4dc1fabee6bc18e751,2023-09-26T17:19:08.510000
|
||||
CVE-2023-42580,0,0,857d6b0c372e6663712d898c016feff0c3c218909136cd95337a864def798f99,2023-12-12T17:09:19.990000
|
||||
CVE-2023-42581,0,0,46e168df1b395467e74592619a6bbab0800f78cf8d4fec626bf850c7508c4d4f,2023-12-12T17:08:44.080000
|
||||
CVE-2023-42581,0,1,51a00bb7f2ed622b0d566db5c08d53683b1453c01821648994dfe0bb825438d4,2024-08-28T19:35:07.143000
|
||||
CVE-2023-4259,0,0,66c07068928725737fca6c815c044a284bfe54d498bc2dc1dfdc90d5db05576a,2023-12-22T19:33:51.477000
|
||||
CVE-2023-4260,0,0,825d2e262d09d358795c77a30ca8ce45e8b4eeaff5088b76af0e3b42b67d864b,2023-12-22T19:33:33.067000
|
||||
CVE-2023-4262,0,0,96c5e685e0ea51dcabf79db9f0bdc769da7bbc4411b11be6252f295df8d63962,2024-08-01T00:15:02.090000
|
||||
@ -232328,7 +232328,7 @@ CVE-2023-42856,0,0,3785bc6082e7fa65742eabd642d5d65c5d33879ffd7643e13cc058ba75458
|
||||
CVE-2023-42857,0,0,9ea98d96cc65b90009b648670c5da30d2e3d83b1ae536f9a719789ff9eb40128,2023-11-02T18:00:33.847000
|
||||
CVE-2023-42858,0,0,3cde77cff878b7bb98d08b0160f9736789daeec37f86aa56fd544ce01873eae4,2024-02-22T19:07:27.197000
|
||||
CVE-2023-42859,0,0,056e476b883af3601285b7d51ae8531980184ba9abc1b8c0a16964226a0b857e,2024-08-01T13:44:47.733000
|
||||
CVE-2023-42860,0,1,4e19a93e16851fec5fc6672b9721a2fce11965675135557499cfe11bbbdc7c5d,2024-08-28T16:35:01.493000
|
||||
CVE-2023-42860,0,0,4e19a93e16851fec5fc6672b9721a2fce11965675135557499cfe11bbbdc7c5d,2024-08-28T16:35:01.493000
|
||||
CVE-2023-42861,0,0,d8d65111e4802e544404dd9d1d2d3c6540cc7742d5e3fa7afcb7a11f5c1a79ab,2024-06-10T17:16:13.247000
|
||||
CVE-2023-42862,0,0,a36257707b4fb74a8615ecf862e41d30af8f3c8f9308b2858c6cc934e94b61f7,2024-01-17T20:51:42.080000
|
||||
CVE-2023-42865,0,0,bf2a0a432fe9999b756c62ffd215341250f2d8dc167f4293b6e906b46c209a63,2024-01-17T20:51:12.820000
|
||||
@ -232582,7 +232582,7 @@ CVE-2023-43298,0,0,9dc228ff73bdf528d43d0ed69906bd07f68ca6fc9bc3f0ef853fca3322473
|
||||
CVE-2023-43299,0,0,d94c0bf3ab73b965669565a71d51568c9bc57077de1c801b8cedf6d024d95ce3,2023-12-11T17:49:28.370000
|
||||
CVE-2023-4330,0,0,2fd86e9dd0e579883f8f7c0829ab8b7bda8ac701dd8a56f071347c2e4152f68e,2023-11-07T04:22:28.047000
|
||||
CVE-2023-43300,0,0,f0be1d017072b0cff316436c66a7299c83b2fd4838fb89ce71859847a9053a33,2023-12-13T21:24:31.183000
|
||||
CVE-2023-43301,0,0,2331dccdc45418895de12edbf9d93d91cc200595fd0694c5bf5a420828f85dcb,2023-12-13T21:24:23.100000
|
||||
CVE-2023-43301,0,1,6f50951f3b5632dfdd837d8c68cd8a26f5a2fe1134449bdb506bbd5fe04343bb,2024-08-28T18:35:04.500000
|
||||
CVE-2023-43302,0,0,edd1d8c368949a8601a81887ecd4be6df4ec6d90acda56627d9aeac98fd2253e,2023-12-13T21:24:15.203000
|
||||
CVE-2023-43303,0,0,01a5e9c635cbf46583a40d8cd583b7ab7550198f2870556b254d79899012babb,2023-12-13T21:24:10.403000
|
||||
CVE-2023-43304,0,0,5c0749626957cae1c690c285ce09a1c1b29fbb73d61b41212b63ce9ff0280580,2023-12-13T21:24:04.613000
|
||||
@ -236037,7 +236037,7 @@ CVE-2023-48402,0,0,4c809f2dd5e8dcfff010aa543a6c6f045768b178ca00ba8754b6c8edf6ecc
|
||||
CVE-2023-48403,0,0,4adc068ba69d93e217814aa03ab06c64d37d4e6f1f5b9e967d203dad5b01ccd6,2024-03-12T21:15:56.243000
|
||||
CVE-2023-48404,0,0,678d899eed5c458b58da3464689532ca0142c650f2cd178cdc3f7827df0120ca,2024-03-12T21:15:56.300000
|
||||
CVE-2023-48405,0,0,1184ca00738252a4a1fbfd7c535695d37028df78fe87d5aaaa04a1bc365c4159,2024-03-12T21:15:56.373000
|
||||
CVE-2023-48406,0,1,2445441492451ebf82a279a716c6dee55e56ee02ca955335af793ffffa08201f,2024-08-28T16:35:03.950000
|
||||
CVE-2023-48406,0,0,2445441492451ebf82a279a716c6dee55e56ee02ca955335af793ffffa08201f,2024-08-28T16:35:03.950000
|
||||
CVE-2023-48407,0,0,878114c674344ec771789050e93c4a630dfc18deac136706916dedaddc59d9b4,2024-03-12T21:15:56.517000
|
||||
CVE-2023-48408,0,0,685d630782a479a80a275f86cfe75523d6e24bb2a663d7b093992d79e473f5dd,2024-03-12T21:15:56.573000
|
||||
CVE-2023-48409,0,0,34f77accc0b2ac79d7dec98b91bbcd5fa76dbfd08a55d334eff38c7b0b7cd036,2024-03-12T21:15:56.647000
|
||||
@ -236888,7 +236888,7 @@ CVE-2023-49463,0,0,3997f0c76b75718e8d7fddf13118ae3adfe6e7b8a1e026bbdd8c02aa82ae2
|
||||
CVE-2023-49464,0,0,6558ffdc5c503d25be5dd218daff18765b512708dd37d505c33fce4d88f34e1f,2023-12-11T17:31:56.900000
|
||||
CVE-2023-49465,0,0,3295dd761e06a7bab659329b7dd55f865f3505849f65d110e023c01328124ac4,2023-12-30T21:15:43.877000
|
||||
CVE-2023-49467,0,0,7f3716a39cf738913c36e4fa2859efa373c3aaf2bd666ae6754d1492097f8159,2023-12-30T21:15:43.957000
|
||||
CVE-2023-49468,0,1,55990c3cfc1762557c3abc0f50412c9420be45de4a1b51770b6fd2755f3d891e,2024-08-28T17:35:02.020000
|
||||
CVE-2023-49468,0,0,55990c3cfc1762557c3abc0f50412c9420be45de4a1b51770b6fd2755f3d891e,2024-08-28T17:35:02.020000
|
||||
CVE-2023-49469,0,0,cbc193cf36e9355f9d67ec1bc5dc157b2a50fd7106252de12cbfb6ed4ef2ef76,2024-01-04T17:14:07.600000
|
||||
CVE-2023-4947,0,0,8df0a8e59512a342c1480f6e8ba47140e8a497588a05b9e649ab29c7e1e4eb1b,2023-11-07T04:23:12.703000
|
||||
CVE-2023-49471,0,0,0f7e53b0476caf611046a94136cc7f6de729f116f183f5bc0ae510c9611e40ac,2024-01-17T13:41:42.813000
|
||||
@ -240125,7 +240125,7 @@ CVE-2023-6139,0,0,58b38774f648051a2e873a85ff7a37aee0cf4ea89e9a3a4e1cb9e586395309
|
||||
CVE-2023-6140,0,0,d7aafe3b370ae93fdafc86b9788a271fc411e8123752fb92571bb74932be1e51,2024-01-11T19:50:08.143000
|
||||
CVE-2023-6141,0,0,c8dcaa0f230bcf4bab61b5120b835e0002022e253aa8729320cdbf7d8b88a7c3,2024-01-11T19:48:22.663000
|
||||
CVE-2023-6142,0,0,3fe59169d0ca291deeb17bb2da3d1e912e0369f1ef3de114449566381868dbc1,2023-11-29T17:21:22.010000
|
||||
CVE-2023-6143,0,0,43a283efe676a5f5b46783e6438546b59ab926654fc906ed9efa73f89d292c53,2024-03-04T13:58:23.447000
|
||||
CVE-2023-6143,0,1,2b02b2a87e188ae67b19643934110db253247a6a6318ed4d21a616265991aa41,2024-08-28T19:35:07.420000
|
||||
CVE-2023-6144,0,0,f1ada52cef47fbae7861cb468cbf9029aefa6079f9529a530cc69ebc44690282,2023-11-29T17:21:04.480000
|
||||
CVE-2023-6145,0,0,b6eb696be83bb3d8e6f03bcc3cffbbf6ce301a3b5d147393bbef0fd0f87c4ee0,2024-02-29T01:42:33.440000
|
||||
CVE-2023-6146,0,0,0a628bb48560248a46754aa0cc3ac6ec47651dc2ffdb0446c47e5313a06edf08,2023-12-12T17:20:59.940000
|
||||
@ -240877,7 +240877,7 @@ CVE-2023-7013,0,0,752e84fc788817f789f383d9b4727a6a371c7a1c500c5d0ed88cf4177f1382
|
||||
CVE-2023-7014,0,0,343f60c0c60318ab32b52871ee4d7ec4b33f7cbb001a30f4e8bb917247b8186a,2024-02-15T15:07:55.347000
|
||||
CVE-2023-7015,0,0,f6191da82f2fc008d6b0296c01ac7c77ae2915d456ba40916209a6adb4acf55a,2024-03-13T18:16:18.563000
|
||||
CVE-2023-7016,0,0,010884b21a27fa66d833a70681dd186e397f473cbb0b90536483fba7b0d7269d,2024-02-27T14:19:41.650000
|
||||
CVE-2023-7017,0,1,aa895f7622a9e9487e48d598147c82444bd79284c2bfbb4573f1fd908bd954d9,2024-08-28T17:35:03.137000
|
||||
CVE-2023-7017,0,0,aa895f7622a9e9487e48d598147c82444bd79284c2bfbb4573f1fd908bd954d9,2024-08-28T17:35:03.137000
|
||||
CVE-2023-7018,0,0,9438a9ef02cb6b14eeff26492e18c6b4314ac91317f5ba8b28b4a172250c35b2,2023-12-30T03:13:12.367000
|
||||
CVE-2023-7019,0,0,25421d5b7b02bc2542949247708020c3ce3a00d66a261d8b3c79bad4af5b1cd1,2024-01-17T22:28:36.323000
|
||||
CVE-2023-7020,0,0,7d3304d8f230cb46404a5f4e0c7dfc242c13c646702476b3fd55147c8232dd5a,2024-05-17T02:34:03.503000
|
||||
@ -240944,7 +240944,7 @@ CVE-2023-7081,0,0,b94c538c220abbbf5d50ca8a2904f1fe370fbb1f80a5e1f3321f9af9bffbc7
|
||||
CVE-2023-7082,0,0,500d0f2d877d9984b63decc202acb4ee4bb46b23d005a29465c40aa2ce7d0bca,2024-01-26T19:48:56.570000
|
||||
CVE-2023-7083,0,0,cb22c9eca48a356f4e09d670d9f560809daf8ed155fa4fd28ed59b232188d26d,2024-01-19T14:54:30.993000
|
||||
CVE-2023-7084,0,0,4632f03cec16c49d84207124ebe67a266da26c671bc47e64aa3e00e71deebb1b,2024-01-19T14:54:24.987000
|
||||
CVE-2023-7085,0,1,2e3497cfcb0d64b95af3c14736994ba0426fe4d3ef1d65caf7eb86e7da2ff298,2024-08-28T16:35:05.330000
|
||||
CVE-2023-7085,0,0,2e3497cfcb0d64b95af3c14736994ba0426fe4d3ef1d65caf7eb86e7da2ff298,2024-08-28T16:35:05.330000
|
||||
CVE-2023-7089,0,0,de15bf10cbbafe87d399a0ec4c918efb24631900a27c9c1192eff372993ed731,2024-02-03T00:27:31.313000
|
||||
CVE-2023-7090,0,0,a5b4a70cda853965b97ddccc4bf6511943919b8d4fb98b9077b8f1637ede54e4,2024-02-08T10:15:13.540000
|
||||
CVE-2023-7091,0,0,d58faa483178a62c20472bf1bded86f6b329c385b83c74a05c3e1f3b3b217008,2024-05-17T02:34:08.657000
|
||||
@ -241015,7 +241015,7 @@ CVE-2023-7163,0,0,54f5e7a55d48eb95c47fe9ab2bd934c769b28ba59ea5fbda349ed798a02bdb
|
||||
CVE-2023-7164,0,0,e7da404d660f91758f580fc565df691ca99acae8f562df71fb30da4b6304eb9b,2024-07-03T01:44:29.277000
|
||||
CVE-2023-7165,0,0,9579de52ee223f320f228c1ef75c7d093c7dd9bb72a0fc1f5802e6bcb3ff7ba2,2024-08-09T19:35:02.617000
|
||||
CVE-2023-7166,0,0,6cedf7ff09611c5f6f6894ca5635265e9233fca36dede244b351d519590f0234,2024-05-17T02:34:15.110000
|
||||
CVE-2023-7167,0,1,0e3c29c7cc835a20e80756f62d0f5108a7def03f7452b53925a11093d45ea396,2024-08-28T16:35:05.563000
|
||||
CVE-2023-7167,0,0,0e3c29c7cc835a20e80756f62d0f5108a7def03f7452b53925a11093d45ea396,2024-08-28T16:35:05.563000
|
||||
CVE-2023-7169,0,0,ab91bd41244dde388327206c23937e5dca7ce4b0de2116a1c3757d023bfdbdc4,2024-02-15T02:29:40.877000
|
||||
CVE-2023-7170,0,0,c09ccb7568e9a7781a5b4886b0c86c25c0a32c50adfe4049560ce5dfc4fe85bc,2024-01-26T21:05:46.627000
|
||||
CVE-2023-7171,0,0,ca5e0c79c1ad7ffbcf6087eb7053f4be605bc976e841898426c6792174a905d1,2024-05-17T02:34:15.343000
|
||||
@ -241107,7 +241107,7 @@ CVE-2024-0009,0,0,31a37345511ab8f9e782cdcb9d09dfe3dad4751b5c25ab7a9b1c5c74d0c64c
|
||||
CVE-2024-0010,0,0,0619a8beffc460e406861d5436887a98d4820a4ca409aea20f604a00879fcec0,2024-02-15T06:23:39.303000
|
||||
CVE-2024-0011,0,0,871bd2790e1644ed9a3dece6c89b7131ea036c72c23f82726bf2a5f6003f50ac,2024-02-15T06:23:39.303000
|
||||
CVE-2024-0014,0,0,57b1d977bcf36a4089ab5ef9c9905bf2b69a9e66b00e8c3e91bd20eccc0f8b75,2024-08-26T18:35:03.770000
|
||||
CVE-2024-0015,0,1,00e8b369d8c884be684dc161c3d8d59320e06337f56989191711b768cfe02c9b,2024-08-28T17:35:03.353000
|
||||
CVE-2024-0015,0,0,00e8b369d8c884be684dc161c3d8d59320e06337f56989191711b768cfe02c9b,2024-08-28T17:35:03.353000
|
||||
CVE-2024-0016,0,0,9f5b99ef0d039809c901d88070265a95558aa17f1c51832fa2b12f3ceeec7221,2024-02-16T21:39:50.223000
|
||||
CVE-2024-0017,0,0,e30ea632c5fd7e4383ceb5900aa731fb2d3b5c50d8f9b57582813b251f138048,2024-02-16T21:39:50.223000
|
||||
CVE-2024-0018,0,0,eb1e6beb7617de808c00f24002cfa4ad37cdeb05dc3559f2748a83507aca8f33,2024-08-15T18:35:05.293000
|
||||
@ -241139,10 +241139,10 @@ CVE-2024-0044,0,0,1b47d31ca0f3ca49c0b5dc05a9176417e6a0ac469a146bb9b6eda355db8c47
|
||||
CVE-2024-0045,0,0,219694127471d45a5a7cb3601b897968c387c3bc537ef76e491ce903819a3e03,2024-08-27T18:35:02.623000
|
||||
CVE-2024-0046,0,0,652dd2830858c9f5da14ce2fb1063779ed8d3adc9358318f9bd8799e5a854450,2024-08-05T20:35:02.317000
|
||||
CVE-2024-0047,0,0,c25f47e47c68f8ba9b41086c423ef72168ff29979539e7bc97672b3ded3ec18c,2024-03-12T12:40:13.500000
|
||||
CVE-2024-0048,0,0,30be6e3e50a23d26d89c4e1eb4fa3a008e8939a0b64350645365e22b39561aec,2024-03-12T12:40:13.500000
|
||||
CVE-2024-0048,0,1,2b50afbb16484af02f7a9fac9c6d27f3ee81b516e9d386d878d7bca0ff138175,2024-08-28T19:35:07.667000
|
||||
CVE-2024-0049,0,0,f9f835822b69f6be57714cc4435ee72c0d6574c4bbf25abdddb096ed40c941c2,2024-08-01T13:45:56.777000
|
||||
CVE-2024-0050,0,0,58a42c9b281faf7f034f105a443afa241b3c1edb6abc4c502f110ae260e2255e,2024-08-14T20:35:05.473000
|
||||
CVE-2024-0051,0,0,499108fe16dea1529516a3cfe4336e416f629611e159efd5458affbb8c6db782,2024-03-12T12:40:13.500000
|
||||
CVE-2024-0051,0,1,d8619ee025d9755a2c3cbb0bd85ce3e0383bc5138599bd4fcfc12bfd088fcc67,2024-08-28T19:35:08.443000
|
||||
CVE-2024-0052,0,0,028f0ef50c0a5bd8d4204c572d3df54976f47eea47c82f4c337b4b73e60f4aea,2024-03-12T12:40:13.500000
|
||||
CVE-2024-0053,0,0,1819b010c6a0341de8f41f40de4966b4aa1ac2481826c4f42a23be7eb74898c6,2024-03-12T12:40:13.500000
|
||||
CVE-2024-0054,0,0,65ffdd62a15fbba9fa1857978982b951512db6bc7615451d76f1e47eca67a7de,2024-03-19T13:26:46
|
||||
@ -241950,7 +241950,7 @@ CVE-2024-0968,0,0,2adf6f675fe8367153779cf53407f6187c199dacca5503cf3367ddd720d368
|
||||
CVE-2024-0969,0,0,4b15fb9fcc9f1de6dda40e4542fcbbf87d86fef0cff6f1d3f8f2a6ca2f7c00b4,2024-02-13T19:44:42.503000
|
||||
CVE-2024-0971,0,0,88718d312c26bf915d98212b01d4b46ae3d1c0d4d3f75eab0b87fa75b2f6d995,2024-03-04T22:58:00.967000
|
||||
CVE-2024-0972,0,0,2da1862f52cff62e6b3fe86a9a1b8df8664a0564b3dd76e9d8c8b90f9f4f4621,2024-07-25T13:04:13.057000
|
||||
CVE-2024-0973,0,1,57e7e11c9ba86ba2414e0194730d475b5afdbb6ee021101088071b9ab0faee7e,2024-08-28T16:35:06.353000
|
||||
CVE-2024-0973,0,0,57e7e11c9ba86ba2414e0194730d475b5afdbb6ee021101088071b9ab0faee7e,2024-08-28T16:35:06.353000
|
||||
CVE-2024-0974,0,0,27c177dc86dc0d7a1d035f410f40a9cb078df941228e5de284f0e0036f520990,2024-07-12T16:11:22.950000
|
||||
CVE-2024-0975,0,0,a15795e0a44b97545f6c3eb65673627e835a4d9230308268959e3a930cb2bd74,2024-02-28T14:06:45.783000
|
||||
CVE-2024-0976,0,0,cc7f106853c76332cf2c1434fc9c2b994b6bd96e33b062831e11057ccad8d2cf,2024-03-13T18:16:18.563000
|
||||
@ -242233,7 +242233,7 @@ CVE-2024-1267,0,0,0ac3a4ad3c33b1de1cb6d3c82dc409665a58abf06843c3ddfdea13f760f08d
|
||||
CVE-2024-1268,0,0,3535bc05eb7cd6037c1775f90518b1602949681d745c741de602c9d81d4b804c,2024-05-17T02:35:22.040000
|
||||
CVE-2024-1269,0,0,a76abee2be9909f0abd99b89e430ded39ff1049f1ebeb84a48acd793ed83933a,2024-05-17T02:35:22.143000
|
||||
CVE-2024-1272,0,0,b4d437cd136cc5d8abdc015e8eb4f6f631c3baee4f3e6fc8647d6a8bbf952472,2024-06-11T17:34:25.347000
|
||||
CVE-2024-1273,0,1,089b345b4f66bd4d35933d2f186ec6f7c5adc8306fa65b78fc7268f4e01fa9f0,2024-08-28T16:35:07.013000
|
||||
CVE-2024-1273,0,0,089b345b4f66bd4d35933d2f186ec6f7c5adc8306fa65b78fc7268f4e01fa9f0,2024-08-28T16:35:07.013000
|
||||
CVE-2024-1274,0,0,f8f7b3b52d888145d0c39dedcf6973ca7bc2bbccc06122fd76d9a28a5b8124d7,2024-08-27T16:35:07.453000
|
||||
CVE-2024-1275,0,0,95a0e980d47091d0f18245b57293289b11e86ae76da8634b5db343d37a5bd8e3,2024-06-05T15:15:10.990000
|
||||
CVE-2024-1276,0,0,5efaeac71a6f7c429ba2363a965edbe2ab6bb62c658e6eb49f5a8f8756c23656,2024-02-29T13:49:29.390000
|
||||
@ -242273,7 +242273,7 @@ CVE-2024-1311,0,0,158f219d191fc55e3a703340acfe0db7300bc756f612b9aecd45c845150c15
|
||||
CVE-2024-1312,0,0,5881f9a1935111843000509e72e7d874f8914b8ba0d8f1dcb31aaebae0b90758,2024-02-15T05:03:16.077000
|
||||
CVE-2024-1313,0,0,e178cffe6aa77a4f0d6d1f0bc0814c15387ceb02accf822d00ca94cf3dcbb92c,2024-06-10T18:15:24.947000
|
||||
CVE-2024-1315,0,0,25a55ec7d2eabca19718f4f801048334cc1cea56ed0621182dceeddb8f9f2d51,2024-04-10T13:24:00.070000
|
||||
CVE-2024-1316,0,1,8b9a0f5f641e245e1ad856d95d028ba3502b1ac3edd8a2acbd26809053aca8aa,2024-08-28T16:35:07.230000
|
||||
CVE-2024-1316,0,0,8b9a0f5f641e245e1ad856d95d028ba3502b1ac3edd8a2acbd26809053aca8aa,2024-08-28T16:35:07.230000
|
||||
CVE-2024-1317,0,0,e6b73971b8fadcf515a25ac1e50eb31e33a60418d7d45cd3d52420834e679d55,2024-02-29T13:49:29.390000
|
||||
CVE-2024-1318,0,0,5ba6af40f86ed8ef42439c311587e2b7fcfc352f41e84ea7a6e6cadfbc71379b,2024-02-29T13:49:29.390000
|
||||
CVE-2024-1319,0,0,903406ad02ffa43d0d568c21b4803da244dc9d7ce0c7f684b31acb02d2ec9380,2024-03-05T13:41:01.900000
|
||||
@ -242288,7 +242288,7 @@ CVE-2024-1327,0,0,ae9f5cba237be94589254d7283daa73f7fafabd33cfebb17147581f2cee609
|
||||
CVE-2024-1328,0,0,7073f5514db5b26279568b528e71529068f45e6ad24d9e6819ac92a07723ef47,2024-03-12T12:40:13.500000
|
||||
CVE-2024-1329,0,0,2cd50cabd5bf81a4f9539c2a3a992a874338213f75ad414ccf75d557c037546e,2024-02-15T18:27:28.837000
|
||||
CVE-2024-1330,0,0,0875f448ca8ca2cb13f0b11aa8869613059f2ee4aef3a7abb81ead9c5c3d291a,2024-06-28T13:30:35.033000
|
||||
CVE-2024-1331,0,1,2ed6a3714bdbfc8833dac239ac14e8cf9d94b83edc045afe826ecfe221db5078,2024-08-28T16:35:07.437000
|
||||
CVE-2024-1331,0,0,2ed6a3714bdbfc8833dac239ac14e8cf9d94b83edc045afe826ecfe221db5078,2024-08-28T16:35:07.437000
|
||||
CVE-2024-1332,0,0,b1d0012a9e40c173cc8f28116508227ff7724ad8f4f969c3dc5f4b0e2f08d038,2024-05-24T13:03:05.093000
|
||||
CVE-2024-1333,0,0,bd53e9cdde226b8c165843c67dcea5ab4ff36ead472bf29231b1c2f3f1abcb85,2024-08-27T21:35:07.153000
|
||||
CVE-2024-1334,0,0,fe4c6be53440216c757c2bf51b270a3930f5c7dd35674ef18ead1fe70ed3fa7c,2024-02-29T13:49:29.390000
|
||||
@ -243031,16 +243031,16 @@ CVE-2024-20272,0,0,9a8b431abc55ae18c0094ec2d1030d59c5263518a92577c729598443278bb
|
||||
CVE-2024-20276,0,0,77220479d2c4e0a0ce7772faba7bb9374ec34b0cd2307655f714f3eba6dc1b93,2024-03-27T17:48:21.140000
|
||||
CVE-2024-20277,0,0,736a7d458de43e0c8ef102aeef0adf3c0541fbbca3219355ca4fb06899462f58,2024-02-02T16:15:54.787000
|
||||
CVE-2024-20278,0,0,12aa1590b3e8a6125d7154bf2a045b19659a28fc2d4df972ed53df9e81e82c57,2024-03-27T17:48:21.140000
|
||||
CVE-2024-20279,1,1,d70470f037b7d05c267fe837a51ffe0ea6cc65e6c53b86c34aa33cd4290cbcab,2024-08-28T17:15:06.113000
|
||||
CVE-2024-20279,0,0,d70470f037b7d05c267fe837a51ffe0ea6cc65e6c53b86c34aa33cd4290cbcab,2024-08-28T17:15:06.113000
|
||||
CVE-2024-2028,0,0,e06846e6ba84daa4133d99af11982cf4b0bb14edf4a6a3dc6070516f4e834b30,2024-03-13T18:15:58.530000
|
||||
CVE-2024-20281,0,0,70f852907bc1bd5fcb581ca3147fb954d228d92f21dde79d0c952efed558ff29,2024-04-03T17:24:18.150000
|
||||
CVE-2024-20282,0,0,f6e711a9a9efd85ad7bd0b3c7c022b317810618a7b30ebfdd488c3c43efc8cbb,2024-04-03T17:24:18.150000
|
||||
CVE-2024-20283,0,0,89838f66dfd213c04e8273f1b3b892c92b85a1c5cc369285f3f9a454f716823b,2024-04-03T17:24:18.150000
|
||||
CVE-2024-20284,1,1,94e1b74ffedc9173b8687d071116f5d7bd8dbce82f75276fdc4216fa70f2122c,2024-08-28T17:15:06.893000
|
||||
CVE-2024-20285,1,1,07291ba086d427d7b395cf9a023737a945604fe3a97c30185e3a52ee5edcf578,2024-08-28T17:15:07.687000
|
||||
CVE-2024-20286,1,1,a48dde2bf690927e83a911609ce24cf903143a97cbd6a6810f27d7b184f6f6a3,2024-08-28T17:15:08.400000
|
||||
CVE-2024-20284,0,0,94e1b74ffedc9173b8687d071116f5d7bd8dbce82f75276fdc4216fa70f2122c,2024-08-28T17:15:06.893000
|
||||
CVE-2024-20285,0,0,07291ba086d427d7b395cf9a023737a945604fe3a97c30185e3a52ee5edcf578,2024-08-28T17:15:07.687000
|
||||
CVE-2024-20286,0,0,a48dde2bf690927e83a911609ce24cf903143a97cbd6a6810f27d7b184f6f6a3,2024-08-28T17:15:08.400000
|
||||
CVE-2024-20287,0,0,a744ff6c1bd94e5b436bea194b1f93eaa24b8e47ada607591c8d284066172138,2024-02-02T16:15:54.887000
|
||||
CVE-2024-20289,1,1,1464ce9b0a93176e874120a5b2b1063011bc50adc24c2ed4daf27402f4108fdb,2024-08-28T17:15:09.117000
|
||||
CVE-2024-20289,0,0,1464ce9b0a93176e874120a5b2b1063011bc50adc24c2ed4daf27402f4108fdb,2024-08-28T17:15:09.117000
|
||||
CVE-2024-2029,0,0,354f931e93072109dced3bc73857c32e7a282fc5266016d20bde6f1070f10b9d,2024-04-10T19:49:51.183000
|
||||
CVE-2024-20290,0,0,95fa55047489b4a2ee370988084e137cebac8acab30010c47f69339f30b23cb9,2024-02-15T15:43:27.240000
|
||||
CVE-2024-20291,0,0,c2ed04ab4eaaddf8b1bcc5dc083481f305536f5151be36cfe21c14f02472ee22,2024-02-29T13:49:29.390000
|
||||
@ -243129,8 +243129,8 @@ CVE-2024-20401,0,0,4e570494182ec3fb0c9186b46f7948499e59b61e9f8ec1f0ca5200f010002
|
||||
CVE-2024-20404,0,0,9ff8f593f71d4a0ff7aecb6b668971610942799ed16450e68ad59cf7f0b9f5af,2024-06-13T20:25:46.837000
|
||||
CVE-2024-20405,0,0,2fa5b4e65c2f399507a2e57227d51876c94b3517d024d761ea8ec8bc4f4a8a91,2024-06-18T18:04:04.497000
|
||||
CVE-2024-2041,0,0,7b4fc911113d944c485bed2a7f958b069e0536bf197811dc0e3dcb8018df3bd7,2024-05-06T14:15:07.747000
|
||||
CVE-2024-20411,1,1,395490d5288175386abbe9557d871d79478d52ab619dea23e01f03ed9b1e8c1f,2024-08-28T17:15:09.500000
|
||||
CVE-2024-20413,1,1,de84dfc41b4c606cc815faeb075f0d5e99c6a9bd6cf3cdba0004c89c4dc6eddd,2024-08-28T17:15:09.763000
|
||||
CVE-2024-20411,0,0,395490d5288175386abbe9557d871d79478d52ab619dea23e01f03ed9b1e8c1f,2024-08-28T17:15:09.500000
|
||||
CVE-2024-20413,0,0,de84dfc41b4c606cc815faeb075f0d5e99c6a9bd6cf3cdba0004c89c4dc6eddd,2024-08-28T17:15:09.763000
|
||||
CVE-2024-20416,0,0,36fba5d0b9a663051d43c2072f34c721bf06b423d2ffa103fc7cf93ef9750d67,2024-07-18T12:28:43.707000
|
||||
CVE-2024-20417,0,0,2b2621922f4e9896d58ad85f7dd970402245ce4da0539fb0012d7404735b7f45,2024-08-22T12:48:02.790000
|
||||
CVE-2024-20419,0,0,0795f6e87845f9b46dc3400495c49fb48a047d8ed4e9d1842a04ff7724f0ad68,2024-08-13T17:15:22.787000
|
||||
@ -243140,7 +243140,7 @@ CVE-2024-2043,0,0,7a3896d230f6f1ae602a08f92e2eaaa644b5893021849dee8a675eb9b7c81e
|
||||
CVE-2024-20435,0,0,bea0a896db86de220514ce1618de53b05523503910f680b3361f4c8bb8734dd9,2024-07-18T12:28:43.707000
|
||||
CVE-2024-2044,0,0,20580816ecbcb2d456bf5030911ad2dbba893322604e54631bb30d65d5e1ff74,2024-08-01T13:49:39.293000
|
||||
CVE-2024-20443,0,0,272afbe0465f6648950651b716899dcfcb722318ac954aaaf0e63544fb83de9e,2024-08-23T15:18:06.347000
|
||||
CVE-2024-20446,1,1,a1f458363061be398c6f14b4fa2ac064da5d71cc04c03ec0fa0519fcf8eb70fe,2024-08-28T17:15:09.997000
|
||||
CVE-2024-20446,0,0,a1f458363061be398c6f14b4fa2ac064da5d71cc04c03ec0fa0519fcf8eb70fe,2024-08-28T17:15:09.997000
|
||||
CVE-2024-2045,0,0,711ac9453656184dc732c4f4633f4f7bda646ec847d7f0c1c60c568976f58aa0,2024-03-01T14:04:26.010000
|
||||
CVE-2024-20450,0,0,a40597aa01c7c808e6329a0cff711d7709db0a15729885e98911c863c6fe701c,2024-08-23T18:14:43.787000
|
||||
CVE-2024-20451,0,0,616ab4cb2b50cee49c462941d4d3e48792a6a3c09b725bd97a134b2f4a53bec9,2024-08-23T18:14:11.137000
|
||||
@ -243148,7 +243148,7 @@ CVE-2024-20454,0,0,b7df5fe3c7f3ad82ec42e5ba189942703f651e8bba204ff78589b452573f7
|
||||
CVE-2024-20456,0,0,bf56f0f0f8d3ed0f6616c43fc8ca6a47b6257ec17aaac25185ba7a05790b5cc9,2024-07-11T13:05:54.930000
|
||||
CVE-2024-20466,0,0,d9adbd7a5cfca4a39494a47969f1c31ae3805a9aa7b4cd0a12535f31685e123d,2024-08-22T12:48:02.790000
|
||||
CVE-2024-2047,0,0,65f16d2420b90c918e9e57877aac5f0440eb772d779ccbd58288e6312f3c8025,2024-04-01T01:12:59.077000
|
||||
CVE-2024-20478,1,1,c7f81a4150a4b8f4abbdfe0686f6cf7280c0fc2d9ab56aa66625f46f1240ded1,2024-08-28T17:15:10.220000
|
||||
CVE-2024-20478,0,0,c7f81a4150a4b8f4abbdfe0686f6cf7280c0fc2d9ab56aa66625f46f1240ded1,2024-08-28T17:15:10.220000
|
||||
CVE-2024-20479,0,0,ced5b461eb6ab05478119ddf8b399bbc19a6ff248adc19d6fde8eab586c6db76,2024-08-23T15:14:45.913000
|
||||
CVE-2024-2048,0,0,3fe9d949673d5eedf190595df45c4c7d30c6a66a4722ea0631f740f815dd3cc0,2024-06-10T17:16:25.067000
|
||||
CVE-2024-20486,0,0,1ec7a6c2a991b67e11827b3b316fed30b5b5340988b303f9088e0f10e2e894f9,2024-08-22T12:48:02.790000
|
||||
@ -243668,23 +243668,23 @@ CVE-2024-21129,0,0,46efd627f8b87e045268cbee292986282d76e8b338e8626a07344d3f76a5e
|
||||
CVE-2024-2113,0,0,d820f9174045c4a91c8de22b2f318d393b16e5183ad826479f5c93fd64192dc6,2024-03-29T12:45:02.937000
|
||||
CVE-2024-21130,0,0,c5d206e6fb887c84baa9c493ebc7d93f2ba4e2f0bacd858d2d5741cf02d71f96,2024-07-17T13:34:20.520000
|
||||
CVE-2024-21131,0,0,02165835cc6f0e203728409c02066c414e0700a6416e43c004ac7c1741f0e57f,2024-07-19T14:15:05.180000
|
||||
CVE-2024-21132,0,1,683d4a8132332ad86fddc10cd15bb59076d052bf865226f7944ae794277a5d4e,2024-08-28T17:40:31.727000
|
||||
CVE-2024-21132,0,0,683d4a8132332ad86fddc10cd15bb59076d052bf865226f7944ae794277a5d4e,2024-08-28T17:40:31.727000
|
||||
CVE-2024-21133,0,0,9a1197ce9530b48696d53f4b8d6c0bb018d1a324656fccf337eedb1d5dc8a23b,2024-07-17T13:34:20.520000
|
||||
CVE-2024-21134,0,0,631920bbbb3f0a2e285eb8830426e0d345e96a6482baa287298491b83a91756a,2024-07-17T13:34:20.520000
|
||||
CVE-2024-21135,0,0,9aadd6ca5a38f239443e4aa9211c7acd69c8becfda2781dc6ecf3e89d27baedd,2024-07-17T13:34:20.520000
|
||||
CVE-2024-21136,0,1,0b3d31fd31b74b67777283c1c23811ac7b0b473c6d3e3e94fd2f66077b9a369c,2024-08-28T17:59:36.023000
|
||||
CVE-2024-21136,0,0,0b3d31fd31b74b67777283c1c23811ac7b0b473c6d3e3e94fd2f66077b9a369c,2024-08-28T17:59:36.023000
|
||||
CVE-2024-21137,0,0,8b1ccafbde54d689b232a5ba4da880526c6b578bae146f59db158760bdc4f414,2024-07-17T13:34:20.520000
|
||||
CVE-2024-21138,0,0,48e73281e1321884b4e1b592183d2ed2dbef5bea392b3b824bf77e00d538c447,2024-07-19T14:15:05.290000
|
||||
CVE-2024-21139,0,0,ac1e7874c883d227974696e6da1f4ea74ebc9ccd7cdf45b6f9f9065cbabb6c27,2024-07-17T13:34:20.520000
|
||||
CVE-2024-21140,0,0,4152c752f631d64c27b06e5115099663133590db63a2cfff7e518248f96c3d60,2024-08-01T13:46:27.193000
|
||||
CVE-2024-21141,0,1,f6351581c68c52a0fcae66a77dd601ef15127184835385b5e0479a9d14461be6,2024-08-28T17:58:43.457000
|
||||
CVE-2024-21141,0,0,f6351581c68c52a0fcae66a77dd601ef15127184835385b5e0479a9d14461be6,2024-08-28T17:58:43.457000
|
||||
CVE-2024-21142,0,0,f819d3a8ba6f5d3f6da22376ee3aac7e9c1012257d5ae28b11f63731d1547f92,2024-07-17T13:34:20.520000
|
||||
CVE-2024-21143,0,0,00d3158bf58fdef1b0ea359eb4fd1877d407a38c8141a35ed2d92f7d5fd7ff90,2024-07-17T13:34:20.520000
|
||||
CVE-2024-21144,0,0,a6e0220af7613c1fe6414e49d55f78f0a709fc1177b6fe6b6e15840375ef4e2d,2024-07-19T14:15:05.497000
|
||||
CVE-2024-21145,0,0,77d6b8d482bc9fea478023a3ac3b96ff89a156b807bd0fe4072eea7489b1a76c,2024-07-19T14:15:05.580000
|
||||
CVE-2024-21146,0,0,c75b160e4e3c99880ff62d36e7e801ade0e912daea3b1e5430c44ac99095338a,2024-07-17T13:34:20.520000
|
||||
CVE-2024-21147,0,0,d581db22cc70629aa91eb51c988684be29e1ff1430ebd94500067b05edd568f0,2024-08-13T00:49:47.367000
|
||||
CVE-2024-21148,0,1,5e054bb367a8e9656b43550b5962eaa7f739f26520f7472e3f916549fb13304b,2024-08-28T16:56:18.687000
|
||||
CVE-2024-21148,0,0,5e054bb367a8e9656b43550b5962eaa7f739f26520f7472e3f916549fb13304b,2024-08-28T16:56:18.687000
|
||||
CVE-2024-21149,0,0,ee2bd3223896d48493ed4bc80a50d18703c1a2b0e21db09049566849fca16635,2024-07-17T13:34:20.520000
|
||||
CVE-2024-2115,0,0,66506b198b4ece0adfc9016031263e6294a50c545f577c56b849d0c705d750c7,2024-04-05T12:40:52.763000
|
||||
CVE-2024-21150,0,0,8bf7ad156aade7fa3f13e2261e319a8085198969642f90d90774096fb77f35b3,2024-07-17T13:34:20.520000
|
||||
@ -243698,11 +243698,11 @@ CVE-2024-21158,0,0,abd2177430b15289f1dafe8369befc77334519d6a9221a02b1f5bfbbc009d
|
||||
CVE-2024-21159,0,0,2ff4efcbe3aa08e46da9e0946901b69656a8a1ad9976fd197b8e18d6231382c7,2024-07-17T13:34:20.520000
|
||||
CVE-2024-2116,0,0,db5680b78c73e9ed7444fef2da21a0c5bcac8a3e521c07413a62cc0c6dfac6ff,2024-03-29T12:45:02.937000
|
||||
CVE-2024-21160,0,0,20f8ad0ce54327b1482f0174779d6b8936bf9313ce550cb111b84c1a3729be73,2024-07-17T13:34:20.520000
|
||||
CVE-2024-21161,0,1,5ed4fb8c83a1a90d6a88e52f846feb2143ac832488b24fbdda9e4d8d58d3fedb,2024-08-28T17:00:38.797000
|
||||
CVE-2024-21161,0,0,5ed4fb8c83a1a90d6a88e52f846feb2143ac832488b24fbdda9e4d8d58d3fedb,2024-08-28T17:00:38.797000
|
||||
CVE-2024-21162,0,0,6599b8c3e8d4ce2bd56d758955204dc60835461542055bd440e060f275edef92,2024-07-17T13:34:20.520000
|
||||
CVE-2024-21163,0,0,1c218c6447f5bc6b8f4a4bcf8e9b987dd785d628ca9f5052cf582edba99f160a,2024-07-17T13:34:20.520000
|
||||
CVE-2024-21164,0,1,dbe60a5799862110e1bcaaaf92025ecfccc35d4b3c7e33902e20957fc9a2019e,2024-08-28T17:00:58.533000
|
||||
CVE-2024-21165,0,1,dabab484b919218d3e6ff0c2a6cf2040e9bda41dff7415dbae32ae776164209a,2024-08-28T16:43:23.220000
|
||||
CVE-2024-21164,0,0,dbe60a5799862110e1bcaaaf92025ecfccc35d4b3c7e33902e20957fc9a2019e,2024-08-28T17:00:58.533000
|
||||
CVE-2024-21165,0,0,dabab484b919218d3e6ff0c2a6cf2040e9bda41dff7415dbae32ae776164209a,2024-08-28T16:43:23.220000
|
||||
CVE-2024-21166,0,0,ede3b755f5804621a8ef25d79d9679055f7e04ae20b8138869340e09adf91227,2024-08-01T13:46:33.843000
|
||||
CVE-2024-21167,0,0,68c8f227666c06298257f7b468706125c2676562df674ce8154b7de7b4496211,2024-07-17T13:34:20.520000
|
||||
CVE-2024-21168,0,0,c69572c1110a4cc480c0e5afb70d08f9984a6bb55f4f3c55f471c687df059b4a,2024-07-17T13:34:20.520000
|
||||
@ -243948,7 +243948,7 @@ CVE-2024-21498,0,0,3c9376a89b1471a3f3dcd2f26b2302ecf028dd3649469284754d6d6bbe15e
|
||||
CVE-2024-21499,0,0,056024a19cf11190da9415625f86200e7f99c9c1c15d5f4eac3772c0369f1c48,2024-02-20T19:50:53.960000
|
||||
CVE-2024-2150,0,0,c22643bdc0b2ebd66d5b5ba194b52141f4bdaa1a38843b6dbc7c558d59d8b77c,2024-05-17T02:38:04.570000
|
||||
CVE-2024-21500,0,0,e32cca032c5c817f0140a0fc7fc7560c3a63cfca90476fe248b7470595a38be1,2024-02-20T19:50:53.960000
|
||||
CVE-2024-21501,0,0,4ffd9a5028e89c48b31b0817cbc116780b2008c7130edf8593ed9cc79a68cf48,2024-06-10T18:15:25.273000
|
||||
CVE-2024-21501,0,1,d04e2442e85706ba7437e49b49125d8ebfada3b71184a475809a9f06322396f6,2024-08-28T18:35:07.823000
|
||||
CVE-2024-21502,0,0,fb5ae175e215ddb01ef01146351120b7135179219e17913fc19fbdc46d2b3141,2024-02-26T13:42:22.567000
|
||||
CVE-2024-21503,0,0,e2363221420f9e91165d2e5e4f11cb5254f6968c7e760608a87c93e517f340a6,2024-07-03T01:46:41.680000
|
||||
CVE-2024-21504,0,0,d1975e31d99912870265dfe3c0f9fa565e4267402a6881e83026bdfe490998fd,2024-03-19T13:26:46
|
||||
@ -244074,7 +244074,7 @@ CVE-2024-21676,0,0,3127fbecbfae79d2f7f29e20d66e088e41b4c966ba7bc8eb69c82cce01bc6
|
||||
CVE-2024-21677,0,0,172011c5d5a06c0e2ca2f356ecd05cb171d9f8cbcabb5b389ad48344d43d1ad1,2024-03-20T13:00:16.367000
|
||||
CVE-2024-21678,0,0,cb3827f1e523b06b300224171594f9fd4e5c2622fa5d40070141728fc778397e,2024-02-20T19:50:53.960000
|
||||
CVE-2024-2168,0,0,74490de60c08e043593352cd4979e484251e5c8cdc32185131e72bfecce0dd0c,2024-05-17T02:38:05.397000
|
||||
CVE-2024-21682,0,1,646c2077276d5778c5018e29b5374e3c012d049729d58323d6e6c9b112e6285d,2024-08-28T16:35:07.830000
|
||||
CVE-2024-21682,0,0,646c2077276d5778c5018e29b5374e3c012d049729d58323d6e6c9b112e6285d,2024-08-28T16:35:07.830000
|
||||
CVE-2024-21683,0,0,9e98100df1746075be9f809cd7f00fd6b0e3e97382e91b70d2a85ac430e36b94,2024-07-03T01:46:45.440000
|
||||
CVE-2024-21684,0,0,59f12a4b04761da303d7e3a40c8e6edc45c41d4945c065d5a0ffea737104115d,2024-07-25T12:36:39.947000
|
||||
CVE-2024-21685,0,0,5660fcc85eb1dde5c65259d6d6205ae74624ad923dcf6470bb4f3577f99d7f00,2024-06-20T12:44:01.637000
|
||||
@ -245067,7 +245067,7 @@ CVE-2024-23240,0,0,497e30da1de753eb5948327cba1061ca7bd974bb0b6e982d8b68d5fdfd0d0
|
||||
CVE-2024-23241,0,0,c5a768451bd1e85db3c39139e6a6ab2856d36214932ed6b230453a123731e8b7,2024-03-13T22:15:10.003000
|
||||
CVE-2024-23242,0,0,95631f167174ef115c9c95938ba9ae61f1f0294242d6095fc64b03c429b051d7,2024-03-13T21:15:56.410000
|
||||
CVE-2024-23243,0,0,3b35a30cb124f0b586652130bcd66797855bcd6efb290e087afdb4d7fffb3adb,2024-03-13T21:15:56.460000
|
||||
CVE-2024-23244,0,1,24e1f39ea8345f9beebd2c960d56e2266341c33ce47de81803c5b5c5ff8fbc8f,2024-08-28T16:35:08.747000
|
||||
CVE-2024-23244,0,0,24e1f39ea8345f9beebd2c960d56e2266341c33ce47de81803c5b5c5ff8fbc8f,2024-08-28T16:35:08.747000
|
||||
CVE-2024-23245,0,0,3ef3bab1c68decbc207b88786c8ec7e903fe6be44e3bdef049351a5b3b76ec4b,2024-03-13T23:15:46.520000
|
||||
CVE-2024-23246,0,0,a3f6288a4dec4e6b98e18e3dcc2273527c942df80239f6227e94a0328a431f71,2024-07-03T01:47:40.097000
|
||||
CVE-2024-23247,0,0,d5698b79b28caabaab0fed7a322a63e6d266c688aa3ae5f6b0f0f62214304bc8,2024-08-26T15:35:04.747000
|
||||
@ -245102,7 +245102,7 @@ CVE-2024-23272,0,0,862f7d259a6cfce25fc04a6db8d5e2417105b7f51cabfc9af10955b3e49ce
|
||||
CVE-2024-23273,0,0,8ea5a132f7f9599d563a8466af6d69a139c2be77bdbd7e0c7a2fee86dd445737,2024-03-14T19:54:26.287000
|
||||
CVE-2024-23274,0,0,d63dec58c682291f417ab20be0e0fbb2c8ea2b0b1f5246aeb4f66431c08118d0,2024-08-01T13:47:13.570000
|
||||
CVE-2024-23275,0,0,2c9c1f4d2ca81860bcf12d49a2478f6772035d6cdcedc7473a9a2bfb8f8dfedf,2024-03-14T20:34:02.077000
|
||||
CVE-2024-23276,0,1,b7fa000b367d55e31a4b1c9fd4a1f238256bf2545a07d5e4a633de96f48c7a44,2024-08-28T16:35:09.187000
|
||||
CVE-2024-23276,0,0,b7fa000b367d55e31a4b1c9fd4a1f238256bf2545a07d5e4a633de96f48c7a44,2024-08-28T16:35:09.187000
|
||||
CVE-2024-23277,0,0,329d44f192e6d8ad64377bfea1b406324a89ddf322f5987758a35ef433724dec,2024-03-14T20:34:31.303000
|
||||
CVE-2024-23278,0,0,766bded776e256695874796c761a698226a698abed559def31f9f418b44fbd0e,2024-08-01T13:47:14.363000
|
||||
CVE-2024-23279,0,0,04cf6340eed14797588fb60b9db6f98aa22f7faf3625a9866457c3db2729515d,2024-03-13T21:15:58.063000
|
||||
@ -245115,7 +245115,7 @@ CVE-2024-23284,0,0,65ec6190d01341e583d233a656fc9dacb2a5d33dd6ef8512150ae4498bbdf
|
||||
CVE-2024-23285,0,0,5a0d4d7d553005e90735503704fdc16408a5286a022afa1dff47851a5d56c396,2024-08-27T21:35:09.383000
|
||||
CVE-2024-23286,0,0,f8f0ff0a8076d1acdcd931a303004a0abe139b7ebcc3b6a020d77caf3a452f67,2024-08-01T13:47:15.157000
|
||||
CVE-2024-23287,0,0,112483d9936a74ffcff3d96013576a1bfbb7b8c01b845a9cbe424d560297f227,2024-03-13T22:15:11.120000
|
||||
CVE-2024-23288,0,1,4c16d89ff3b357dfdd3be6b8ba218b937b9c0e25620417a442ae558ed820b4e4,2024-08-28T16:35:09.410000
|
||||
CVE-2024-23288,0,0,4c16d89ff3b357dfdd3be6b8ba218b937b9c0e25620417a442ae558ed820b4e4,2024-08-28T16:35:09.410000
|
||||
CVE-2024-23289,0,0,88178045365eb11e89ccefeb5771451d6b6166955f5f6c5f6a64f2f080826233,2024-03-13T22:15:11.227000
|
||||
CVE-2024-2329,0,0,11e6f1e43e05cca18867c7d5c048956c7fecd23b0254816ac97fead1b2517ae0,2024-05-17T02:38:10.443000
|
||||
CVE-2024-23290,0,0,c464194e225931bf0d2137cac165c36f9146fd1d9e1ad3c4a6426c7b4df4b92d,2024-03-13T22:15:11.280000
|
||||
@ -245692,7 +245692,7 @@ CVE-2024-24035,0,0,d0abb7c64f0c98440e73299b8a7786cd92f1d8fbb7861de6744b39b120e98
|
||||
CVE-2024-2404,0,0,9d875e94c9294fe9953ccca085b1745d0613b8cf9f0f07db3175f75218af4ec0,2024-08-09T19:35:05.613000
|
||||
CVE-2024-24041,0,0,4a0d654eb23409577a23026cb4704f48de37c0bc2bebd1ee3faa99b68f3773e8,2024-02-07T17:14:41.607000
|
||||
CVE-2024-24042,0,0,b866c3917f18283c11cab3dd04e447f4e26ea64e6c1cb154e64b25a1b7f8187d,2024-08-27T21:35:10.387000
|
||||
CVE-2024-24043,0,1,c9f0291d3b3ea0f3d4660ebdd10587f7bae9e2552aede9432383ad105d2d7da2,2024-08-28T16:35:09.730000
|
||||
CVE-2024-24043,0,0,c9f0291d3b3ea0f3d4660ebdd10587f7bae9e2552aede9432383ad105d2d7da2,2024-08-28T16:35:09.730000
|
||||
CVE-2024-2405,0,0,758f03026c76b7f47d263886ed290a557d382d5cf70707c814c23dc8eb2e5ffc,2024-07-03T01:53:13.110000
|
||||
CVE-2024-24050,0,0,d8a497c77556b4efbe72dd469fd71e81b74bd8a1e54cb63f7dab3892d7471943,2024-03-21T12:58:51.093000
|
||||
CVE-2024-24051,0,0,1d91890559076f5980bf15f5e9e94cabb5a5df274a545b95ecd8bd06b33e0e8b,2024-08-26T12:43:44.580000
|
||||
@ -245739,7 +245739,7 @@ CVE-2024-24148,0,0,a02156e49f720741f5d47ffecf3d295f680f99f45fd5e722459fdf6b3749f
|
||||
CVE-2024-24149,0,0,88ecb47947af05614cae359d076a027f161e62a67519dba09a75672f5d1ee0a5,2024-08-13T19:35:04.837000
|
||||
CVE-2024-2415,0,0,c558bdc444f1b504fdb58826094fd6354f995348e8626b08c069328ff4e39fde,2024-03-13T12:33:51.697000
|
||||
CVE-2024-24150,0,0,57d27c8e6078b73446ecc07e4ad11630c532b92e8ab5a1cac8386f4fab70f142,2024-03-12T14:59:55.920000
|
||||
CVE-2024-24155,0,1,3bb2e53518d2c73ef94fc9a8fd3fd200e14c25be078e767d43facf3cd96a63aa,2024-08-28T16:35:10.447000
|
||||
CVE-2024-24155,0,0,3bb2e53518d2c73ef94fc9a8fd3fd200e14c25be078e767d43facf3cd96a63aa,2024-08-28T16:35:10.447000
|
||||
CVE-2024-24156,0,0,4d905495fcc21ea03b392e5dcfb4049afb36c88ec6395d026fb3a826675269b3,2024-08-19T20:35:03.650000
|
||||
CVE-2024-24157,0,0,27cfa63ed3b3e1406c543915593772b11a8bd32859f21bed59160debb46b1929,2024-07-03T01:48:13.313000
|
||||
CVE-2024-2416,0,0,509b47b2b38dd8150594dfd075dd7f079b3bbd22e8420f2d63fb8a39e8d3ccb0,2024-03-13T12:33:51.697000
|
||||
@ -245810,12 +245810,12 @@ CVE-2024-24313,0,0,fb5ae34a5906d70e9a89b5d57ccc3ef0ec67afb90df0388312d4db57d8583
|
||||
CVE-2024-2432,0,0,57240eece5c1b31c057486728f6363c9217250d91f3d10c0c941fdad51a7f6e5,2024-03-13T18:15:58.530000
|
||||
CVE-2024-24320,0,0,a5847bec026f9a38211f5c0373776488eb6f7d35353beef2a24ffd1ecc8d8864,2024-08-21T14:35:04.240000
|
||||
CVE-2024-24321,0,0,88c98cb76542c8acb076726441dae70ba16682bd2171c6fbca3804855a845a0c,2024-02-15T05:02:58.427000
|
||||
CVE-2024-24323,0,1,adba4554463f2339fd11d6ce11dc6e7c60558587a50e2f826405f4cdcc1bbc13,2024-08-28T16:35:11.253000
|
||||
CVE-2024-24323,0,0,adba4554463f2339fd11d6ce11dc6e7c60558587a50e2f826405f4cdcc1bbc13,2024-08-28T16:35:11.253000
|
||||
CVE-2024-24324,0,0,e65b7320bc70eb87aafe69f87ce443d4231ab35603a9991590cdc2a337dea76b,2024-02-01T04:49:29.220000
|
||||
CVE-2024-24325,0,0,c48bdb59f66fc453df8a65a409e26ae0fc9e608ab91641625410877a482dad6a,2024-02-01T04:49:27.410000
|
||||
CVE-2024-24326,0,0,ffd176ee9cc205937cd1eaded7dc4a650316e43005277f1af89616e40875e18b,2024-02-01T04:49:24.940000
|
||||
CVE-2024-24327,0,0,b496192967607b64939b46dfafe2c91cb919e1f1a3928b7c8c6e7165f4559273,2024-02-01T04:49:22.830000
|
||||
CVE-2024-24328,0,1,9ec45e9ef706fa7e9212babc00d8f55f27592d1c1f21abb655b193ed546239da,2024-08-28T16:35:12.420000
|
||||
CVE-2024-24328,0,0,9ec45e9ef706fa7e9212babc00d8f55f27592d1c1f21abb655b193ed546239da,2024-08-28T16:35:12.420000
|
||||
CVE-2024-24329,0,0,cd2cef58182ccada9d789908a0715e06b22ee8c2346a6ad57e7666e3ca17fc5f,2024-02-01T04:49:18.867000
|
||||
CVE-2024-2433,0,0,af22ac085d1109b732837345c936d39f0c3c18741ae1714b3ff1934488777262,2024-03-13T18:15:58.530000
|
||||
CVE-2024-24330,0,0,6f4394e82ffdaddc9904fbc3397bf25ed86fab2a1cc87acc40260a4358ba28b7,2024-02-01T04:18:43.927000
|
||||
@ -246284,7 +246284,7 @@ CVE-2024-2508,0,0,5f5b90c70383af5e74076ecfe442ac5d6b537a3785081aa188cda0ddf04bd8
|
||||
CVE-2024-25080,0,0,18626c970f137cdb9398dd9a27a57c97c76048e9872d0484e7e3cc74df35e9d3,2024-04-01T12:49:00.877000
|
||||
CVE-2024-25081,0,0,8447758264e474cd1c8516048ae8770433feeb45ecce33ffdf5df19305ed1ff9,2024-08-27T19:35:13.260000
|
||||
CVE-2024-25082,0,0,c4024b086b0d99b44b3d9149e06878bd50b7e82765ae87c23c8e458108c36ef4,2024-05-01T19:15:22.237000
|
||||
CVE-2024-25083,0,1,82140a5a06672843cc06d8c49a45d2786901923a23d988718119cbf0cb5278eb,2024-08-28T16:35:13.370000
|
||||
CVE-2024-25083,0,0,82140a5a06672843cc06d8c49a45d2786901923a23d988718119cbf0cb5278eb,2024-08-28T16:35:13.370000
|
||||
CVE-2024-25086,0,0,d7f7d87d6cdc4c934f4645f409f9d6ad95bc0b43a7473acdcf85c7b382132abe,2024-07-08T14:17:42.020000
|
||||
CVE-2024-25087,0,0,c72ecbfe33bc1bedb424c3a8db8ed1e75d362fa6fbd3c127b6373b38910f773d,2024-07-05T17:04:43.917000
|
||||
CVE-2024-25088,0,0,50203c63d0e75eec6b30df19b3f3ba45509939426c60ccdf3351d03062178a9d,2024-08-01T13:47:33.673000
|
||||
@ -246576,7 +246576,7 @@ CVE-2024-25574,0,0,65726bda902fec4a9a49461993a5b1f1f19b916c575dd539bf5599a6d815d
|
||||
CVE-2024-25575,0,0,2e4887ee13b995216d77350689726b7532b0325e739fa8baefbe39600a3f9674,2024-04-30T17:52:35.057000
|
||||
CVE-2024-25576,0,0,1298eb71baf232c73dfc082da86c1a427fcac3907201ddd5e757f1be26775922,2024-08-14T17:49:14.177000
|
||||
CVE-2024-25578,0,0,0d1f2ffd4e03b50b29ccf39cdb2058ba91ae7a7cb01bdc49fe129aadbabc71e4,2024-03-01T14:04:26.010000
|
||||
CVE-2024-25579,0,1,e18a976cb7cc873665c4cde29595232519ed1d6333d6b865b6ffed467db01627,2024-08-28T16:35:14.267000
|
||||
CVE-2024-25579,0,0,e18a976cb7cc873665c4cde29595232519ed1d6333d6b865b6ffed467db01627,2024-08-28T16:35:14.267000
|
||||
CVE-2024-2558,0,0,4df4f161b02ab0ee082928d86d735f9684058e2b58c51335b3ee6abb912b22ce,2024-05-17T02:38:18.947000
|
||||
CVE-2024-25580,0,0,d25d9f73e9fc463223909f23338d50734f85395c9d208e28fc6abf197ca8cc67,2024-03-27T12:29:30.307000
|
||||
CVE-2024-25581,0,0,7b661193358cc282ffdeeb44cff665ab8564f25632f9671f041e9f50015c108f,2024-06-10T18:15:27.650000
|
||||
@ -246649,7 +246649,7 @@ CVE-2024-25651,0,0,141eb7237f8672075adb36d537e4b6bf696c6664fba30930784d19aa3662f
|
||||
CVE-2024-25652,0,0,8c49426ba9ad9fd1e89e8e83a1eeefc3222cdf552830f48a0a9961a99880036c,2024-08-01T13:47:48.337000
|
||||
CVE-2024-25653,0,0,efdc6e1fd6bc3201845fb807790d436f1b5ea82ec4d74b3ef4678687414457cf,2024-03-14T12:52:09.877000
|
||||
CVE-2024-25654,0,0,1d8c485b666617bf15e2be3bf3f059ab8542011fba9b3f67352ac0a3b72fec87,2024-03-19T13:26:46
|
||||
CVE-2024-25655,0,1,873187155e7b44c80bfdf0f8ac9cdfc6130f961d8321802657052de226969501,2024-08-28T16:35:15.510000
|
||||
CVE-2024-25655,0,0,873187155e7b44c80bfdf0f8ac9cdfc6130f961d8321802657052de226969501,2024-08-28T16:35:15.510000
|
||||
CVE-2024-25656,0,0,dd2a757ac88e60c65e553326c3978a5d90dbd260cb747593d758355402513e97,2024-08-02T16:35:36.647000
|
||||
CVE-2024-25657,0,0,4b43facfdcb326ebfd5828d4d462b595cdd46fa54d1b75d686b3ce7b78fb312c,2024-08-22T20:35:04.950000
|
||||
CVE-2024-2566,0,0,087689b93c35b2d23260489bf51254e9dbbd90f4e3c3903cdc8f028cf28ab7f4,2024-05-17T02:38:19.710000
|
||||
@ -246708,8 +246708,8 @@ CVE-2024-25741,0,0,fa774b03cf2ebe73114d17fe942f33d91843719d380f7003343f1feba56a5
|
||||
CVE-2024-25742,0,0,64a7e49ba77fe66b1f40220a562db53fca6672cb5535d529c8b5770ce2d5e19b,2024-05-20T13:00:34.807000
|
||||
CVE-2024-25743,0,0,1c0eddf9ff39c172b1917b2af6c386627e5412677b9092ed1b4c80ec112bb6af,2024-08-15T16:35:04.743000
|
||||
CVE-2024-25744,0,0,fc000ffd12e257e2403c7531be849ad7ae284e04e5faaeff0bd3c4b1bee1e1f6,2024-02-12T14:20:03.287000
|
||||
CVE-2024-25746,0,0,aff52edf515c4bb2be3d1c40746c76af6ee680ba5675ccdda5ccab353d740e3d,2024-02-23T02:42:54.547000
|
||||
CVE-2024-25748,0,0,9695611fe06c6e9b93fbd1431628cb47d8b27d680e5e9e22412df114dd60e72e,2024-02-23T02:42:54.547000
|
||||
CVE-2024-25746,0,1,8855a194466e5deeab9baa1ad399e9a9947473b628737c1175263f75df97cfa1,2024-08-28T18:35:09.110000
|
||||
CVE-2024-25748,0,1,5bb6acf358e655979178d585c8c32b626bf8ea83fccfe3ee7cdea479e1332b26,2024-08-28T18:35:10.337000
|
||||
CVE-2024-2575,0,0,a80d23ced381ef92b364937b2fb4dfbb5da5d71a7483fe8d8649f5052e293551,2024-06-07T20:15:11.520000
|
||||
CVE-2024-25751,0,0,8b180bfbf73b312b967d5200f41f4f4e3328a340941b788f5a6ee93c4d770b58,2024-08-27T19:35:15.767000
|
||||
CVE-2024-25753,0,0,3303d3f561a201b11986a4546c74260382f6d919781c88643b2fe7778dcd9e8b,2024-08-01T13:47:51.623000
|
||||
@ -246756,11 +246756,11 @@ CVE-2024-25851,0,0,d67a62091ab95045024d9c69930163fc6933a08dd0957c710b2d2f48274fa
|
||||
CVE-2024-25852,0,0,1d0753f6ef753fc5d1ef48013e91f716bd2a2109414419ba6e7c96f787b8b0b6,2024-08-14T20:35:06.957000
|
||||
CVE-2024-25854,0,0,44f4f18783a518014d6e03af20d6bc0b5fc3bde62ddf95f44bcd216cec489e6e,2024-08-27T19:35:16.580000
|
||||
CVE-2024-25858,0,0,a5cba2d53e795893941edce58201624f227bda6d68ecbb5cef1d602282ede544,2024-08-19T21:35:05.770000
|
||||
CVE-2024-25859,0,1,038a99d6ec3f53c4be4ba35c4800e6c9f2dae8250cbae6e620db9c90736521a9,2024-08-28T16:35:16.347000
|
||||
CVE-2024-25859,0,0,038a99d6ec3f53c4be4ba35c4800e6c9f2dae8250cbae6e620db9c90736521a9,2024-08-28T16:35:16.347000
|
||||
CVE-2024-2586,0,0,71d47abb08c7e463323230f7e49ea5f345cb538a7006733d07a2afa950cd9ac5,2024-03-18T19:40:00.173000
|
||||
CVE-2024-25864,0,0,2a09b4ab74072b776577b1c00a1bf5c268c139c75079ed692d71dc30af731c65,2024-08-01T13:47:54.857000
|
||||
CVE-2024-25865,0,0,9dd00ecb01423656380096aa5e060fbe6dfb829859154529d4f81246070dea21,2024-03-04T13:58:23.447000
|
||||
CVE-2024-25866,0,1,673561ed0df9fcdfda0c59cac1ca0b00fa241b251e245997f04994754e7eb44b,2024-08-28T16:35:17.133000
|
||||
CVE-2024-25866,0,0,673561ed0df9fcdfda0c59cac1ca0b00fa241b251e245997f04994754e7eb44b,2024-08-28T16:35:17.133000
|
||||
CVE-2024-25867,0,0,8e55f36e4f1b56edc96022f211fe880b4aa76b96735d12ae86aa863ef60ef510,2024-02-29T13:49:47.277000
|
||||
CVE-2024-25868,0,0,8468e8c7cd26d2e5838f8da558add0a0ea34e7d6538ad367885aebb852006e2e,2024-08-27T20:35:15.173000
|
||||
CVE-2024-25869,0,0,748b3f6208379a05bd57fedf558ac81540396f4b22ed44a19829a3ed8cbeb467,2024-08-01T13:47:55.047000
|
||||
@ -246877,7 +246877,7 @@ CVE-2024-25989,0,0,14738c46f94e94e6b7897446658f285f8e9a188c6fec45e970fce017c50eb
|
||||
CVE-2024-2599,0,0,448bf984845294b825ad64c45fc7ff6a1a97b88712ab8f0c7b9899ecc5e48ad8,2024-03-18T19:40:00.173000
|
||||
CVE-2024-25990,0,0,05042610d9d9eeed77c351ef8461507e7363f5a24856c830f88125ac3a7bb105,2024-08-01T13:47:57.997000
|
||||
CVE-2024-25991,0,0,55a93164172a1b22ef8f30a0ed89816155551a2ca968148a5c0da905634180b8,2024-03-12T12:40:13.500000
|
||||
CVE-2024-25992,0,0,9077f849d4dddde51329fbf2553fb349784d84e4a5aa50feb6dadd6e5e8acf0c,2024-03-12T12:40:13.500000
|
||||
CVE-2024-25992,0,1,caaba6874e69765d9fe6451819eb539f4e123768237e917b71bdea3c61f79a30,2024-08-28T19:35:09.697000
|
||||
CVE-2024-25993,0,0,e7cf4460dc5198c620b3541161c2ca1906e1b44bebbdda031856c68acc35baa6,2024-08-15T20:35:05.303000
|
||||
CVE-2024-25994,0,0,4a9979fd659a52838af4203d59aee9f2f6fbf6a2d3333b82853712f36ab74c9a,2024-03-12T12:40:13.500000
|
||||
CVE-2024-25995,0,0,7785cd6f8b87e1198fedd03d14b86de2a700a99574185f6812c6d8bee7390322,2024-03-12T12:40:13.500000
|
||||
@ -247238,7 +247238,7 @@ CVE-2024-26467,0,0,f852e96e7aa9bd31104a7a5efbb92bf78ab3732b64936f49fadf5127e2447
|
||||
CVE-2024-26468,0,0,def1bc4284fa411449589c5e4214627b54a1a33219fd215b1c6f274069ececaf,2024-02-26T16:32:25.577000
|
||||
CVE-2024-26469,0,0,202a3878dd7ca90a2deb83f9c6068be468c522265741b212613bae7399baf445,2024-03-04T13:58:23.447000
|
||||
CVE-2024-2647,0,0,dc044af22784e4db6ad7522cd4841e4dbc9efce24abfd075978f936ae875c263,2024-05-17T02:38:23.120000
|
||||
CVE-2024-26470,0,1,58e234d7e215267230c8a12c548ad8fb022e4ba21a7a856a3f33600c880169c4,2024-08-28T16:35:18.190000
|
||||
CVE-2024-26470,0,0,58e234d7e215267230c8a12c548ad8fb022e4ba21a7a856a3f33600c880169c4,2024-08-28T16:35:18.190000
|
||||
CVE-2024-26471,0,0,638407be95241af8b802e909dd749dda860405db3eaaa59ad63e6686ac6163d0,2024-08-27T20:35:17.533000
|
||||
CVE-2024-26472,0,0,3ea665ae7d8c4cb8ea3ef77beb55f90d75bb053da605750b4803b40c300fd840,2024-03-08T21:15:07.193000
|
||||
CVE-2024-26473,0,0,fc9f75146122995e0277d9d0adf8775c5418cc84731af51473c2bfe5d4f1f791,2024-02-29T13:49:29.390000
|
||||
@ -247263,7 +247263,7 @@ CVE-2024-2651,0,0,bd146bedf6ebe2167b2a748a6767423198ce44fb77df6650381302c98af6fd
|
||||
CVE-2024-26517,0,0,26d33e1785f323f6a59cabe443b6ac20ef93d37ea417fa08778ea549f200621f,2024-05-14T16:13:02.773000
|
||||
CVE-2024-26520,0,0,86e0582816b93edd4eb3d1c9ff436171e7839b198d50b34d2ff44523de982520,2024-08-01T15:35:07.080000
|
||||
CVE-2024-26521,0,0,ff2a5c02f9a6415a5b63e6732629254f75c56e7bdeff107f4eb34b7b12623384,2024-08-27T21:35:14.300000
|
||||
CVE-2024-26529,0,0,bd6cd552c022306ecb15ba77a51e2bdce3a9e1417338a63b92cda08b02e6c1ab,2024-03-13T12:33:51.697000
|
||||
CVE-2024-26529,0,1,a99f8b82dd93bb8e095cf66957c2511d719283fb972a26f9f23d0d1aca2bb1bf,2024-08-28T19:35:10.463000
|
||||
CVE-2024-2653,0,0,b3409d37c73c6e84286baa910f6042b0e4464dede287f82c98b61b036f897600,2024-05-01T18:15:19.257000
|
||||
CVE-2024-2654,0,0,44518084de18b3ca2eeba7166bf4da9d0a7d05a78603be70a4c69d74aa776745,2024-04-10T13:23:38.787000
|
||||
CVE-2024-26540,0,0,261971c75fd99d69bc373d27d0b3c0e0616255d37283f552b45502ec0054fabe,2024-08-27T18:35:05.790000
|
||||
@ -247953,7 +247953,7 @@ CVE-2024-27209,0,0,88724fb64803101f437886fbfbe86fa525a1caaa815e888f256e5571c93f2
|
||||
CVE-2024-2721,0,0,c7dffe084f91bae26b936c1afd1da9c04f9b37aef98b6753f280b03d8572eb4e,2024-03-20T13:00:16.367000
|
||||
CVE-2024-27210,0,0,745478bdb4403a82fac13021bc89339c878beb6d9492b165b8482fafb3cfd461,2024-08-01T13:48:18.507000
|
||||
CVE-2024-27211,0,0,6894b26756f6df7632bdb8a4b3513238346653fd0ee071685f883ad79c0a0f9c,2024-08-05T15:35:12.083000
|
||||
CVE-2024-27212,0,0,4542230b3b8db890d26ca347c87e449ef2355e140f779178cb911b4a8d90a5c2,2024-03-15T20:15:08.910000
|
||||
CVE-2024-27212,0,1,cd8d0cb9f45aa7ccf7d445110f8f2832810df99d9a78af5cf6414a8df74e5422,2024-08-28T19:35:10.640000
|
||||
CVE-2024-27213,0,0,38bf62e6cca45cb13c31c1b3c1f577caf25772cec3b7bdb3ce04f4d4c6e5cbdf,2024-08-01T13:48:19.280000
|
||||
CVE-2024-27215,0,0,60ef065eae63cf58718fd9a5d80dfa62c007813e270493517bc98a19fcefe594,2024-02-21T18:15:52.060000
|
||||
CVE-2024-27217,0,0,cb0dbfe9327fc52a02d056b77105239417a7cff860961ae434eeaf1ef6d2cb33,2024-05-07T13:39:32.710000
|
||||
@ -247968,7 +247968,7 @@ CVE-2024-27224,0,0,a3ab635f09865455059477937ba40dabd5c75c049ca5d090f69e7a764213a
|
||||
CVE-2024-27225,0,0,aa18bff66f03b0f275eac87bd5ea1a86e059d41f5a0861894165d74704434328,2024-03-12T12:40:13.500000
|
||||
CVE-2024-27226,0,0,09f15816885dbcfaf6362ca8e72640a49144f9653a0b3d4a746337108ce37a78,2024-08-27T15:35:10.130000
|
||||
CVE-2024-27227,0,0,07bb188ed9b66fc7fd965d8a240bed8b19d74680ddaf7fc1bf461b043fbb3889,2024-03-15T20:15:09.153000
|
||||
CVE-2024-27228,0,0,085b2888b9a3ea0ac5416508debf1f7f29728086a3efd3846db9b0b4ae138fe6,2024-03-15T20:15:09.193000
|
||||
CVE-2024-27228,0,1,5262c725eb223b05821eaec558c5d806b0071760b0a14d4556c2fbb1a42bc548,2024-08-28T19:35:11.443000
|
||||
CVE-2024-27229,0,0,b8b459ee0fc242831e7e68eb1fe9ed70ba0320038a180145828d0bdce79101e7,2024-03-12T12:40:13.500000
|
||||
CVE-2024-2723,0,0,a5d6e6fcb13799b6bac3165664e5b326db07e4b162d1f25e3d1dd5f10681ec04,2024-03-22T15:34:43.663000
|
||||
CVE-2024-27230,0,0,9420863bbd94fd05dcdfd0ca39954afd3c251ba38b740d930d8e5974939f128d,2024-03-12T12:40:13.500000
|
||||
@ -248217,7 +248217,7 @@ CVE-2024-27563,0,0,37d316ca473ce8ee235a7a00bc2f1934f40d1081b4a3297e3b4967e39c148
|
||||
CVE-2024-27564,0,0,4b4d4c7e144b76c27c52012d5becc86e0b5be9dc01f9b6263a0668719575530a,2024-08-06T15:35:10.030000
|
||||
CVE-2024-27565,0,0,0edf7f66daaa9b67c047bf93423dd3ee9ca4c410e75873bf1ca657086f339835,2024-03-05T18:50:18.333000
|
||||
CVE-2024-27567,0,0,ba0253b2315b31126919c66203669f237b0b455b097f59970da966ab9d67e865,2024-08-01T13:48:32.200000
|
||||
CVE-2024-27568,0,0,30a69742845b1488044d187ab76af1144dc7e9904fcf2c872ae36954db40b8a0,2024-03-01T15:23:36.177000
|
||||
CVE-2024-27568,0,1,5ef0355531266755ad4e5c631ffae6be8854ea4f1050fa4f02e42546b592e64c,2024-08-28T19:35:12.240000
|
||||
CVE-2024-27569,0,0,5c0a695bc7a1524024f1806d6c6d1550c657ccc9dd1fad298805953a7e078574,2024-08-19T20:35:08.430000
|
||||
CVE-2024-2757,0,0,4c422aba4be6a9a5da2652e2a836599ffe438bdae4eb45bb7067f46f34ffd36e,2024-07-03T01:53:32.100000
|
||||
CVE-2024-27570,0,0,8d5d62ec43c878f6bf09a9b5316375d908c11d0b5ec079a9674eb8a4339f1ea2,2024-03-01T15:23:36.177000
|
||||
@ -248249,7 +248249,7 @@ CVE-2024-27628,0,0,4ce05c55412fc4c447421f46fe72c28be9e75420f28dfb2af66d8c4d8126c
|
||||
CVE-2024-27629,0,0,ca701c59a502c4787b60da8baa107f0262ef924b3c876e947b7b71c4687e448d,2024-08-01T13:48:34.650000
|
||||
CVE-2024-2763,0,0,fa0860401e6fc5d5f4cf46ca75d9efd537ac3aaa7b5e2d61b6a29dcaeeced91c,2024-05-17T02:38:28.787000
|
||||
CVE-2024-27630,0,0,a1ea11c1c8b1f1d78e79a31b066ec8424df55ae64238847d3d73b77f87b170a7,2024-08-16T19:35:06.250000
|
||||
CVE-2024-27631,0,0,0f8d82617ea0ef47c0189b84bb322ae748cad4086019c00bd045700a1d3c6ae1,2024-04-11T06:15:06.560000
|
||||
CVE-2024-27631,0,1,823cf2520a1b79ed7d411349f6166aa032b72a764cabcf9507963ec85aab2169,2024-08-28T19:35:13.040000
|
||||
CVE-2024-27632,0,0,0bf9f7e4e2b38f2fc36100c20b55c947c0d336f90050dc79733290c2e357ef37,2024-08-16T19:35:06.933000
|
||||
CVE-2024-2764,0,0,31aa1e4cc55fa8edb093bc5aa135070b01e8111153eb7b17aab12d3117a8f555,2024-05-17T02:38:28.880000
|
||||
CVE-2024-2765,0,0,fdf9b012a44b1c7f6607dd1b547bd408571aa1e43b10c68fb7aad7dc812bebe9,2024-05-02T18:00:37.360000
|
||||
@ -248278,7 +248278,7 @@ CVE-2024-27694,0,0,ae7bf3b211028d282f997fe080b53d7dbd8277270cbb44dbcd90c920ce9d7
|
||||
CVE-2024-27698,0,0,d2be8f7c8e71227d00832ec4e65de145e12c9d05abf2103ca0b08b325e7399ca,2024-03-09T23:15:49.403000
|
||||
CVE-2024-2770,0,0,d26bc8bd1d4451d2ee541c7f447cc9cd2d848db62017303dfc34d573c4443d94,2024-05-17T02:38:29.393000
|
||||
CVE-2024-27703,0,0,21fa3dc3529306a6c5b9fe280ab0c0cb14191a6db9f9334f8f905f40616d832e,2024-08-27T19:35:18.967000
|
||||
CVE-2024-27705,0,0,538b62798ffb3deeb490d879f6c2b0551b7d4dbd846704c9743ab7991d01d3a0,2024-04-04T12:48:41.700000
|
||||
CVE-2024-27705,0,1,54a199ba78880b9893651da6ac13e5ae7eff87b01c1a1af6fe633bcde862516c,2024-08-28T19:35:13.840000
|
||||
CVE-2024-27706,0,0,aa2f6240a68011db6b5f8dd255d0386bac6b89f2e80e3dcc46650c4b4085146f,2024-04-04T12:48:41.700000
|
||||
CVE-2024-27707,0,0,97a5b1e4443445bbc3851bf93c1f743838b69b97d43532ab36e84f929a1c875f,2024-08-06T14:35:07.363000
|
||||
CVE-2024-27709,0,0,5ae0fb01fcc3e6a6feed263a5b82efd14a1c39afc6defb1474545136e5989939,2024-07-09T16:22:21.743000
|
||||
@ -248631,7 +248631,7 @@ CVE-2024-28120,0,0,31f0663194c3ae59508b649362ee2d5539147691a5912e9e045c000f7246f
|
||||
CVE-2024-28121,0,0,5d765bddd1522ef772672d7c5b7d192742701db6f681e7efbb273dbd45669d62,2024-03-13T21:16:00.460000
|
||||
CVE-2024-28122,0,0,84073f6c96d7936717c065299f48850cb9a25df36eb3f8060c8dc4aa02997344,2024-03-11T01:32:39.697000
|
||||
CVE-2024-28123,0,0,1f90dd93aca0d11a73a18e1eb6b5cda27a407eb4db9e34eaa0e325666a8f1c24,2024-03-21T12:58:51.093000
|
||||
CVE-2024-28125,0,1,7f0b2ff4edc64bb38a0ae0fa981d34a256be95c3adc6334cd99f96a6d79e27a8,2024-08-28T16:35:19.333000
|
||||
CVE-2024-28125,0,0,7f0b2ff4edc64bb38a0ae0fa981d34a256be95c3adc6334cd99f96a6d79e27a8,2024-08-28T16:35:19.333000
|
||||
CVE-2024-28126,0,0,81385e85c5a93c53bb47fe916edfff61f701ac34a4427a9e5bf459631bdea34d,2024-03-26T12:55:05.010000
|
||||
CVE-2024-28128,0,0,ff9121c55a5d465f19f3056b6278dc961489b664c0de60bae39143ce763e9dc9,2024-03-18T12:38:25.490000
|
||||
CVE-2024-2813,0,0,d92b59c3edc51ec01f06a151ea9186c3488c58069c0b5769bb5f8edad6a74d59,2024-05-17T02:38:31.770000
|
||||
@ -248775,7 +248775,7 @@ CVE-2024-28327,0,0,7ed9ed9c0231950061a20f16d0b466fa43b5d37d46730fdcd21aca4b586a2
|
||||
CVE-2024-28328,0,0,88f82b4f564bb2f0cfcfafe664c725ce4612a144351633fca17b714d7ef38607,2024-07-03T01:51:38.350000
|
||||
CVE-2024-2833,0,0,2bc6d91fce23c79b9817f7554599630a708e7859b230a9a2bced401cbd1dcd51,2024-04-18T13:04:28.900000
|
||||
CVE-2024-28335,0,0,1f0f16000380dd3374bd37cd33265b4629fe1de221282bb913749763f1030c56,2024-08-06T15:35:11.200000
|
||||
CVE-2024-28338,0,0,4058229b720fcbbfc31bf8d1e879b9db75368619bf7702bfd3d1c419a7233635,2024-03-12T17:46:17.273000
|
||||
CVE-2024-28338,0,1,fa368ff4231d46bff92ce959939349d4377377b2a7cc5fa138cc06ab225389c8,2024-08-28T19:35:14.627000
|
||||
CVE-2024-28339,0,0,1c5cb4ff3f5e62c64fce21c9b445d5a13cbabae48573837fd8e9a43861da7ac6,2024-08-28T14:35:08.337000
|
||||
CVE-2024-2834,0,0,b28e87c6f045d84badec2f950b6e65f36270629b305c79d294240554601bad8c,2024-04-08T18:48:40.217000
|
||||
CVE-2024-28340,0,0,df1f6b0e64753fa9fcb1e44290eba32c1363678518f4321559c5625366bd5374,2024-08-21T16:35:05.830000
|
||||
@ -248844,14 +248844,14 @@ CVE-2024-28520,0,0,0d1f20f1f11c459c615732a3ae08b6276ad3a3ce7691c30492f9301c8f89b
|
||||
CVE-2024-28521,0,0,4c470a16411ba9b060ae66f422bfe7a7a3db4fe1c8d1782aae757e57dba97825,2024-08-28T15:35:19.147000
|
||||
CVE-2024-2853,0,0,d81bfe0f2e8d27cfb2c79cc8c8a264f27a9770cb3cd0ef6dd08d9ccd4f7731b4,2024-05-17T02:38:34.337000
|
||||
CVE-2024-28535,0,0,b3d344cd79be8d85dbbdedf90a4aca4a63b5679340011f1e54eaf1af4f8bc64c,2024-08-01T13:49:07.553000
|
||||
CVE-2024-28537,0,1,561f7e94b8d92b36d6fbe4be70344b8d7fe8151321f8765b9517ac76c7332429,2024-08-28T16:35:20.337000
|
||||
CVE-2024-28537,0,0,561f7e94b8d92b36d6fbe4be70344b8d7fe8151321f8765b9517ac76c7332429,2024-08-28T16:35:20.337000
|
||||
CVE-2024-2854,0,0,c1c542fca188c35518ba79a264f89406944bf1f786d85f84048d2cb537d11189,2024-05-17T02:38:34.440000
|
||||
CVE-2024-28545,0,0,e9a4e3ca98799d0101f083d2aeb4e48f2d5da7cbf73a3832ee738e6e37caad1e,2024-08-06T14:35:08.207000
|
||||
CVE-2024-28547,0,0,6c303f8f5613978f1a0a818439df37889df3d74dbcbb9a87f20cfa2eecd135e7,2024-08-15T17:35:04.350000
|
||||
CVE-2024-2855,0,0,bf67a061be15a32c70da5cfde311a22d39981d3eb08b5dfae3a254bfe3ca6e82,2024-05-17T02:38:34.570000
|
||||
CVE-2024-28550,0,0,e57300171200da6138bca7c12faed1257d5a1ced8bcd637b3699d9ed4209df2a,2024-08-02T17:35:34.613000
|
||||
CVE-2024-28551,0,0,c28fe5afcd679c3aa0a3784905b4c05c433762c4432fa1ed2b44c099adba75a4,2024-08-05T20:35:07.203000
|
||||
CVE-2024-28553,0,0,b9d57a68a744d3ccd5c404d587c9bf7a5b20480c53447cfc05c22ab7aa24ff54,2024-03-21T20:58:52.357000
|
||||
CVE-2024-28553,0,1,d2d49d3b32b4ad4e5ed1fb793d3a4f18745439a22613343ef69fff92328aa945,2024-08-28T18:35:12.120000
|
||||
CVE-2024-28556,0,0,c7a9f11c6c2b705f23220da2e3877bcb36402bff752864a8069f34266c46e417,2024-07-03T01:51:41.963000
|
||||
CVE-2024-28557,0,0,77a8a38b1b31bd457d2e1155d30ba64028e47880496797c0f23104b8d60d248a,2024-08-21T15:35:04.820000
|
||||
CVE-2024-28558,0,0,7b30a622f0a0af74fb84bf56f284f0001ad46af28ee0c7db870ba46879fc3d39,2024-08-01T13:49:08.363000
|
||||
@ -248897,7 +248897,7 @@ CVE-2024-2863,0,0,51f45da8967ac2e9bd5b7be7c2b96b4f6f6eb08fbb2e67a9216114664ff1a4
|
||||
CVE-2024-28635,0,0,3ea376c2382b19ba1c40e1ca96db4a046dad170ab353c27de44a820093ca692e,2024-08-02T16:35:41.160000
|
||||
CVE-2024-28639,0,0,add78e1164c8df42f8993d3ec4e8bcc5efcf9c67ce1cf3d76c2a38423013e9f5,2024-03-17T22:38:29.433000
|
||||
CVE-2024-2864,0,0,0b7092f6657eda771a1a9211b6ecdc80d9c4229cfeb8d1413066da331f243b95,2024-03-25T13:47:14.087000
|
||||
CVE-2024-28640,0,1,cfbccc1010b8b02b088260f58142e9a85d6403f967e58bd0ed51c3322d74bfa1,2024-08-28T16:35:21.193000
|
||||
CVE-2024-28640,0,0,cfbccc1010b8b02b088260f58142e9a85d6403f967e58bd0ed51c3322d74bfa1,2024-08-28T16:35:21.193000
|
||||
CVE-2024-2865,0,0,55e62f341bb00366e8e43c3aae92bec34f13cdc149d9c58605d949f8282b8ec7,2024-03-25T16:43:06.137000
|
||||
CVE-2024-2866,0,0,0b9e7e6b190edc1fb6f92975c3f997f504dfccfc4fc2eb0b51cfe7935d053241,2024-04-11T16:15:24.870000
|
||||
CVE-2024-28662,0,0,dab9197cc819aeac0bf0ea06401058d5cc75e9a0ba3a4ce1ecd76d7bcd7e31f2,2024-03-14T12:52:16.723000
|
||||
@ -248913,12 +248913,12 @@ CVE-2024-28672,0,0,538db36b26db573d0bb55cb40ad522fa7947acf5e2956b1e113432093746b
|
||||
CVE-2024-28673,0,0,bd6746b41a01ccf049d37eb60c73f070158ae6b16895b623dddfc8455f2801ff,2024-08-02T21:35:24.280000
|
||||
CVE-2024-28675,0,0,80c451d1a35a0ff52d3fba9d95128727c58bec6c40fc50594a98fbdeafd67949,2024-08-06T16:35:10.273000
|
||||
CVE-2024-28676,0,0,63c5e4a02262e2b79dceab3a95058f444bf46b54f5978008708a63245a5f9f99,2024-08-01T13:49:11.717000
|
||||
CVE-2024-28677,0,0,c212bc6abeb632592f29fbc5fe22ee750468c999ed8be8e2db7f3e23376a076d,2024-03-13T18:15:58.530000
|
||||
CVE-2024-28677,0,1,0f69f140894f68c5b932d6edf8946595fb50d2c8b4a12358d0887d19b71fe56c,2024-08-28T19:35:15.447000
|
||||
CVE-2024-28678,0,0,b5c73aa5d385f8f65998ff1de30b4021247079d7e1aba9c219ff89ef49624a6a,2024-08-26T17:35:03.903000
|
||||
CVE-2024-28679,0,0,105ed47445b8d9fc8d56f311cb3b3bd3771e3a0f797a39fdf0ae6eee229ff71d,2024-03-13T18:15:58.530000
|
||||
CVE-2024-2868,0,0,0d0f218c7c83d10c9f9d6ae0e3c918a300514bd5c38acefa57e4da2fb68b6b16,2024-04-04T12:48:41.700000
|
||||
CVE-2024-28680,0,0,2c015a2a3060000c7ef4f8456bbc810496f8be9f148fccbda02f285f4310a0c8,2024-08-15T20:35:07.960000
|
||||
CVE-2024-28681,0,0,4b7cba0eeeff2f30c6b385de9946c7001ab8d0046bea262780a6c07cbb70db8c,2024-03-13T18:15:58.530000
|
||||
CVE-2024-28681,0,1,8a70f4514954d5b714df36fb204c3727ca85171b03b512322548d2cf00cd1bfc,2024-08-28T19:35:16.270000
|
||||
CVE-2024-28682,0,0,4f5f2d89be528d37359d245e4477bd20041973e3a5c07eac11756c948035a466,2024-08-28T14:35:09.923000
|
||||
CVE-2024-28683,0,0,a84750ef7113628223a83f3f1bafccf8cc7ce4d93141f0176c20c984e9a69c9f,2024-08-15T20:35:08.767000
|
||||
CVE-2024-28684,0,0,ad6bf053cac6fb6852a9113f5958a7b88b0baa069360a39369fc3cdf983cbd42,2024-08-05T18:35:16.690000
|
||||
@ -249417,7 +249417,7 @@ CVE-2024-29387,0,0,a7de4d7b83fd64ee90e8a52b42eaf0b9beccc3b6bea7a05d204d65990fc8f
|
||||
CVE-2024-2939,0,0,2535289099c8d33fbb19094f7fbda628b2a57cb3f5893b4424d20e832d7b98bf,2024-05-17T02:38:38.230000
|
||||
CVE-2024-29390,0,0,814ac687e5b2e01cf32c7127e50bbccad0da0364edfe1ee5a384153ed32a0446,2024-07-03T01:52:25.827000
|
||||
CVE-2024-29392,0,0,5e4ea30f516a843bdc62850b43582fcaf1c5126262e50fed5352ce6a7a6be694,2024-05-22T18:59:20.240000
|
||||
CVE-2024-29399,0,0,d5837116f884e80e697c2414bffb9a33585fc7eb16edc658512cc6480d48cc11,2024-04-11T12:47:44.137000
|
||||
CVE-2024-29399,0,1,697a66baad6ee4bae50c3e5a1e61a40d3516a4fa5056cb7fa4cab7012d6514f5,2024-08-28T18:35:13.337000
|
||||
CVE-2024-2940,0,0,ff445ca7ce0af843f5f704c8c90659aeb6511c9f210bd6d3afa6e1f01b0df39a,2024-06-05T20:15:13.267000
|
||||
CVE-2024-29400,0,0,8f34751d18d63c75601eb947e8c0e3714d1d567d723f8c0dc5c4c493f22e06b6,2024-07-03T01:52:26.027000
|
||||
CVE-2024-29401,0,0,14e4834e03b78a3df05cd8e04bcdf90a5bfad72c514740bf2fbb87c81dad0d19,2024-08-05T19:35:11.287000
|
||||
@ -249478,7 +249478,7 @@ CVE-2024-2951,0,0,f710e6d4245ad6c04fc32de495a410058cbe73872608e5a79d1a40f0d8a1be
|
||||
CVE-2024-29510,0,0,51d0625dfaf62c75da9e9bb8fd0fc5d3519f674d47bd05e2a65a6c09ad7cf0da,2024-07-08T14:18:07.743000
|
||||
CVE-2024-29511,0,0,71f40c07ffc6ddcd2ad428aa635a90b1b076d74d8bc5a2a3a20f87b7f6b658a4,2024-07-08T14:18:08.567000
|
||||
CVE-2024-29513,0,0,8cfcc3ee68a773ba517d1f3723d5fc41ae5eef49bbfc2250bce477983b34e599,2024-08-01T13:49:32.137000
|
||||
CVE-2024-29514,0,0,eb115f41feffccc853e81d533febd8becad8a070e1e7d9f658260b227fc1cfd6,2024-04-02T18:12:16.283000
|
||||
CVE-2024-29514,0,1,7caae15adf93c68426a0607e9f9430b69dadcf282c5b338343171d0469306829,2024-08-28T19:35:17.070000
|
||||
CVE-2024-29515,0,0,6c02acdf8486fd71d1a6a0f7b1121d658755c5e1493296a773ba3e16d5535a56,2024-08-19T20:35:11.413000
|
||||
CVE-2024-2952,0,0,9ca75cd38bb98c444fe6c898c357072e1eb1c9edb6d026f3884b5faa65c0c5c5,2024-04-15T18:15:11.027000
|
||||
CVE-2024-2953,0,0,72a01e417ee80dcceae8cb4163f101b7f2f672f028d8c1a0f25757daf02eaeed,2024-05-22T12:46:53.887000
|
||||
@ -249540,7 +249540,7 @@ CVE-2024-29753,0,0,2fe72d442a3bd6e3a448018f4b0c5fd08bbb9368714b97406c81c1f0d2544
|
||||
CVE-2024-29754,0,0,b25a573175d6d8364c520f2c021a5fa5bc0a8d78f24f393d4d4bf2a3811b35a3,2024-04-08T18:49:25.863000
|
||||
CVE-2024-29755,0,0,461a086b173843c1ce38032ceaf4026cd899fd13096838c66c3bf8c91a37dca7,2024-04-08T18:49:25.863000
|
||||
CVE-2024-29756,0,0,a317fd9c651464f79ee6fff622436852efb1b09b79adc8a90233c2482f2cabef,2024-08-13T20:35:08.120000
|
||||
CVE-2024-29757,0,0,649b65f43c61d43545d866e7cc6327f7ac42ed952b447288a1641e2c8a6c415a,2024-04-08T18:49:25.863000
|
||||
CVE-2024-29757,0,1,1258c85600b0e0b6c3574edf77ce10dfb1958d15da1a6a11aec242b319b28be3,2024-08-28T19:35:17.877000
|
||||
CVE-2024-29758,0,0,e99e03c9577f34d61d791ec358a8107af85a294778a310a65b4722e9f6af13d4,2024-03-27T15:49:41.437000
|
||||
CVE-2024-29759,0,0,f4cc1ab31785f6c5323fd4d9a7da94ce475eca6cb36b30795902b25143b7dbeb,2024-03-27T15:49:41.437000
|
||||
CVE-2024-2976,0,0,31ce9b59b83e33d10ee556791a66c7b468926a678a71bf4f87b9bde3e94a00ea,2024-05-17T02:38:39.800000
|
||||
@ -250321,7 +250321,7 @@ CVE-2024-3056,0,0,c33c3028618acd56970d704007cc8cb0c1300b261807cf531015dd6f1b2728
|
||||
CVE-2024-30560,0,0,29358f4cfba46b880efc18b382f49655b8da1f57de09ea2f3b221ee017e11a93,2024-05-14T15:23:17.730000
|
||||
CVE-2024-30561,0,0,317571b22962e8d6e5d0cb62ac3952d7d76cb14c6191157ad5ef89ba7149e860,2024-04-01T01:12:59.077000
|
||||
CVE-2024-30564,0,0,5b72a00e1c04b6fa93ffaa761b95fbd264190bcd29898850fc62b4910b45e5e3,2024-08-22T16:35:01.923000
|
||||
CVE-2024-30565,0,0,3bd2e856e06d3e3fe9f747497d3ea242e07c951fa4c500c8b76a56b8bcb712e0,2024-04-04T12:48:41.700000
|
||||
CVE-2024-30565,0,1,339f35b13bfd7475887e9d4aa2098d8942efc5c8efceb8855a2ae15b1ed6d216,2024-08-28T19:35:18.093000
|
||||
CVE-2024-30567,0,0,f2a4d1211b738fa363bb6c48ea72578b3372d81c87f66a2aa1c7f2df3ee8bec0,2024-08-01T13:50:09.870000
|
||||
CVE-2024-30568,0,0,44c25f2577fa5438de7f51a90d4ade231e906e1e0fac9c82f2eeb8db8041cb68,2024-08-21T15:35:06.717000
|
||||
CVE-2024-30569,0,0,d1232d2fff132152976a2834ea98d5f033f65e7554f5a22412d98913c4904d30,2024-08-27T15:35:14.373000
|
||||
@ -250338,14 +250338,14 @@ CVE-2024-30588,0,0,08e16a935f9fee8841f929d18032525bac7add60ccde5932cbd5663b4480d
|
||||
CVE-2024-30589,0,0,c6b1c9cba15556f8da9ae1af68138bacf841ae1da95dafd281283439cde5b9ae,2024-08-13T16:35:00.980000
|
||||
CVE-2024-3059,0,0,efb84c5280bb6d93917140ecb34e4d9d916e8aaa9c3b2370c96c352f4a530300,2024-07-03T02:05:57.660000
|
||||
CVE-2024-30590,0,0,74e13fafb4ea3fa2c3367d4c745d913b8700a9f648c307a3b7eeb10d783ad4d0,2024-08-01T13:50:13.810000
|
||||
CVE-2024-30591,0,0,e75a0dcfcb07a21c8d312cadcff98d8748de148e045209e07a96a4401e42a2fd,2024-03-28T16:07:30.893000
|
||||
CVE-2024-30591,0,1,e902c9af734db5833927060c0bddd3a7ba217bf46fdf47a12b5c187281d25d93,2024-08-28T18:35:14.280000
|
||||
CVE-2024-30592,0,0,507c49506de5111d6c96010bf6286cc127ab92c8bc8bbb896558bfe34d4346f9,2024-08-01T13:50:14.590000
|
||||
CVE-2024-30593,0,0,408d3bb4f55aa72702260e4a6dec5da795a667370808b6fd57e94ac266b7ab6e,2024-08-01T13:50:15.377000
|
||||
CVE-2024-30594,0,0,031ab14998cc22e319a2672b5d267e5c02bd96f6f8b3034c7bd0cc097da3d0fc,2024-08-16T19:35:08.517000
|
||||
CVE-2024-30595,0,0,4cbe3a1903ff2e8fa29d74cbfe2f90b968c54e4378a49a8e7a552056ca416818,2024-07-08T14:18:21.630000
|
||||
CVE-2024-30596,0,0,3e2307388e29cecf1eee26f29964858677d06f5c8613113eca2047417d85c54f,2024-08-27T21:35:21.827000
|
||||
CVE-2024-30597,0,0,850e4910803a98578d5f042e07a5f96647f12b4e67d43adaef74644382ed2f1a,2024-08-01T13:50:16.157000
|
||||
CVE-2024-30598,0,0,5522799fef0d78c0e4f9a84a19e85c4ae628d4ef9d72cf9af60f6cc653518431,2024-03-28T16:07:30.893000
|
||||
CVE-2024-30598,0,1,6ed6779adc284652fa82476796af034f1e40ee104aa46937c35f6a5778b7c19a,2024-08-28T18:35:15.197000
|
||||
CVE-2024-30599,0,0,a2de538454d934b66527a50625bb2ef5a8d7c80970adc9056aac0bf14f9e96b4,2024-08-01T13:50:16.990000
|
||||
CVE-2024-3060,0,0,1a2ca1531bb6941b20d9224cca8c4925ba7109cf026646e1258f2bbe2b20e308,2024-07-03T02:05:57.883000
|
||||
CVE-2024-30600,0,0,afb4ecd397678c812aa9252d63371e78d9b731787a22ea38c05d01f1336b7300,2024-08-27T19:35:20.830000
|
||||
@ -250363,7 +250363,7 @@ CVE-2024-30620,0,0,cb2dae6c6270bb539b2166cb7fc038684b4c961f4662350232b399db4e69a
|
||||
CVE-2024-30621,0,0,c30c1529b2190a6ab334a4d43b23be8a438f3a9728c71ea136b98a3e95653561,2024-08-19T20:35:13.943000
|
||||
CVE-2024-30622,0,0,9349da08418f3c5641f38670dab1e797cf4839fe3c9959b5e399bf11323db712,2024-08-13T15:35:09.960000
|
||||
CVE-2024-30623,0,0,068ad85c64fcd7c5771be6968a3fe4899f42b182e4626cc9e0835726390d147d,2024-07-03T01:54:12.180000
|
||||
CVE-2024-30624,0,0,9f0b6bbb0cdd2fc5e8275cfdf473e348e809449e2b22ebe6778b91e551369404,2024-03-29T13:28:22.880000
|
||||
CVE-2024-30624,0,1,ff6bf3285a4a0405e10b51a01d4154fed0ab5f5e8637b8cc2e4a3a03c98f121e,2024-08-28T18:35:15.953000
|
||||
CVE-2024-30625,0,0,c1d8544845866766a9c20cd1dd31dab57f6c7377e49b11e4618d24aa420ac546,2024-08-01T13:50:20.930000
|
||||
CVE-2024-30626,0,0,1aa9c6016c2b1f3328d360421842f1f87c091d5d7ea99ae5c5df6807c10e0be3,2024-08-27T19:35:24.760000
|
||||
CVE-2024-30627,0,0,b1dca4695abc9495ba7ec29f0112baaeb190e4bfd416384d570f2292f523f60d,2024-08-01T13:50:21.693000
|
||||
@ -251081,7 +251081,7 @@ CVE-2024-31815,0,0,3a4fb879bd99cdccbff5aa7dddf7124d852246045820d3d5445bebcfb10f3
|
||||
CVE-2024-31816,0,0,b044f3a9b0aa1619e0c2fca0cc8f8b5745d80dbd48fcbf7e00f1caed5cc7299b,2024-08-14T14:35:18.370000
|
||||
CVE-2024-31817,0,0,24b4e557f7af935e7754f7b85cb41f724f58a7b4e914343cc50d4eac0b54d001,2024-08-01T13:51:12.960000
|
||||
CVE-2024-31818,0,0,eee16737d75f73f8b945462c1dcd4c5cb19514639603d213fd1ee2d8a446805c,2024-07-03T01:55:23.933000
|
||||
CVE-2024-31819,0,0,4c17599099dc08aeb493ec31eb828cd358a289cc73a85088c37e9c52e7886635,2024-04-11T12:47:44.137000
|
||||
CVE-2024-31819,0,1,bfd6addbaf0640b479e38e78486acd7f48f4365622b9d1c32199ef52964cc949,2024-08-28T19:35:18.897000
|
||||
CVE-2024-3182,0,0,5b91472f2c23656576ba0485d37ef11d644641d0d37c54a71b00010283df192c,2024-08-01T16:35:10.453000
|
||||
CVE-2024-31820,0,0,c45ae4d9cf96e998a8e3836a25349d6dbd49df94bb64d18020aab9488babbb10,2024-08-01T13:51:13.733000
|
||||
CVE-2024-31821,0,0,7ffbf5610a7d2af61b143191111032e3581481a662d8ad2f16b1a632dc4600a8,2024-07-03T01:55:24.693000
|
||||
@ -252671,7 +252671,7 @@ CVE-2024-34083,0,0,be7ff33683a966fd2e2a91bd6e6ef912f3af6f70d27ba06b83f6ba7e43054
|
||||
CVE-2024-34084,0,0,7d9440ddf04c82559a24e924ee696f81ed9dcd7a55ec24907b743742e82c1796,2024-05-07T20:07:58.737000
|
||||
CVE-2024-34085,0,0,5d94e0e1234d28ea1392eb258fba225a24d0a9939e78b10ffa8b6f875a256c7c,2024-05-14T19:17:55.627000
|
||||
CVE-2024-34086,0,0,104df8351545cea86a5aeab75846aeda1282b00a21f2f9f835c10597aaf719fa,2024-05-14T19:17:55.627000
|
||||
CVE-2024-34087,0,1,b43933510c12517787f75bed2112cdd5360e703f06365c71649e9989d251d8cd,2024-08-28T16:35:22.590000
|
||||
CVE-2024-34087,0,0,b43933510c12517787f75bed2112cdd5360e703f06365c71649e9989d251d8cd,2024-08-28T16:35:22.590000
|
||||
CVE-2024-34088,0,0,6e1eb2987ec69271c7f130ee4d6c05bf54d17671e3eeb9426a758a6cc9ddbdcb,2024-04-30T19:35:36.960000
|
||||
CVE-2024-34089,0,0,5e7107f526e1d12d254978d5169bae34a870123e709df2c6ba63a16f1fef24b8,2024-05-06T19:53:38.797000
|
||||
CVE-2024-34090,0,0,4dc7a0402f56619348ec9c3e24642b60cff8f706f450ee8cc2f0663fc31edfc2,2024-05-06T19:53:38.797000
|
||||
@ -253461,10 +253461,10 @@ CVE-2024-35312,0,0,81ee7e5cffa0828718ff42985b5f71e3223019ea36fce71fb3a2d6856e31b
|
||||
CVE-2024-35313,0,0,1eb4867830818e97987762ca58d043d2f7f53fc926bce8bfb2e66b630c99ca4a,2024-05-20T13:00:34.807000
|
||||
CVE-2024-3532,0,0,861b69b5ea2c2097afdbe40dd2c40123c9da7c07e730e8c939be6340175b992f,2024-05-17T02:39:59.520000
|
||||
CVE-2024-35324,0,0,97e62876b974bdb37d65a00c14d6ae80121537e286249b5814c033b73ffdbb1b,2024-08-20T16:35:11.473000
|
||||
CVE-2024-35325,0,1,073df6c9b920e39e00ae6bf411b4ce7fcbfdedf8b124ea4a78741a586d12ac92,2024-08-28T16:15:08.417000
|
||||
CVE-2024-35326,0,1,badb78c2247033746c5cf3590d8af4f4dbcc53903451b4cc619d29045733e44d,2024-08-28T16:15:08.740000
|
||||
CVE-2024-35328,0,1,6d7e3bce1434bfe8bae39c276eca44835fb4b93c816e05b8d24818b425433bbc,2024-08-28T16:15:08.863000
|
||||
CVE-2024-35329,0,1,a629a972b3e74c82d06baf68eed2d70433d4fd04f2bd358c28abd414b9db51b4,2024-08-28T16:15:08.980000
|
||||
CVE-2024-35325,0,0,073df6c9b920e39e00ae6bf411b4ce7fcbfdedf8b124ea4a78741a586d12ac92,2024-08-28T16:15:08.417000
|
||||
CVE-2024-35326,0,0,badb78c2247033746c5cf3590d8af4f4dbcc53903451b4cc619d29045733e44d,2024-08-28T16:15:08.740000
|
||||
CVE-2024-35328,0,0,6d7e3bce1434bfe8bae39c276eca44835fb4b93c816e05b8d24818b425433bbc,2024-08-28T16:15:08.863000
|
||||
CVE-2024-35329,0,0,a629a972b3e74c82d06baf68eed2d70433d4fd04f2bd358c28abd414b9db51b4,2024-08-28T16:15:08.980000
|
||||
CVE-2024-3533,0,0,488bd266f4041c85454e2052fe9f29a33b96935dc189b43a270de9d8362e90d3,2024-05-17T02:39:59.617000
|
||||
CVE-2024-35333,0,0,cce46e99aeb1eab01d831e139f6817035aabe6e9396d1f88c05286346cde08b0,2024-08-19T16:35:15.757000
|
||||
CVE-2024-35338,0,0,e107c4747b0de9e551ea11a4d2e69bae2aea4d6b20bec204b7a0c7504a17ed7c,2024-08-01T13:52:35.817000
|
||||
@ -255885,7 +255885,7 @@ CVE-2024-38810,0,0,a8d05ba61ad79ab8e573251f3391c7e33071f14ecb67883defa939520cad5
|
||||
CVE-2024-3882,0,0,8cf286ca42c3a62eccb821d9ac0678dabad594eee248c127390ddaf169987d46,2024-05-17T02:40:10.457000
|
||||
CVE-2024-3883,0,0,e6bda202b9fd54c10f25f29dd8ae0cebb83b1538aee636944c2fd66bf4045fff,2024-05-02T13:27:25.103000
|
||||
CVE-2024-3885,0,0,9b28a2ee85edfe77753e71858fb1438bd68a9b6ee299843f3a5752cca4753d01,2024-05-02T18:00:37.360000
|
||||
CVE-2024-38856,0,1,cf2c30abb1c3c3e6b03acfa253b7bd98efa464ab76b49fddc2034ce3ce8a3be1,2024-08-28T16:15:58.043000
|
||||
CVE-2024-38856,0,0,cf2c30abb1c3c3e6b03acfa253b7bd98efa464ab76b49fddc2034ce3ce8a3be1,2024-08-28T16:15:58.043000
|
||||
CVE-2024-38857,0,0,857bbf4d5ee889c68ec1450930f0cf323232ab2d5a162824c8153ee668a7e638,2024-07-02T12:09:16.907000
|
||||
CVE-2024-38859,0,0,593edb58800c759df69d81e4c4902db80ed6954e27fabcb131a77e637ddeaf57,2024-08-26T15:15:23.727000
|
||||
CVE-2024-38867,0,0,0587553b0e73bb3d7fb83caa644dbd7ff748ca26af84fce237e8ae38fe20168b,2024-08-13T08:15:10.817000
|
||||
@ -256231,14 +256231,14 @@ CVE-2024-39500,0,0,32e48803900f332ecd0b386dfab340711259f55424109f63b42ef311f1aa9
|
||||
CVE-2024-39501,0,0,dbed8cdce2846df04987988dc191be230e467953108dbad3ef1866484e01944e,2024-07-12T16:34:58.687000
|
||||
CVE-2024-39502,0,0,99b689f6371529c59a665d9c426727398f43183fffa63b58cc95bb184d69fa0a,2024-07-12T16:34:58.687000
|
||||
CVE-2024-39503,0,0,5e4d34ef2c4459378b0d2181b74587a03eb064853eaebcf5be4aab1548d06b82,2024-07-12T16:34:58.687000
|
||||
CVE-2024-39504,0,0,48e2769b3ec4323ba69968251bb1c73f2d2616daaec5e45b600501ae1422b174,2024-07-12T16:34:58.687000
|
||||
CVE-2024-39504,0,1,bdccaf811e8fa1282cf93f14389fa178db83a9dd861ab1a8383eecda34377824,2024-08-28T19:58:45.653000
|
||||
CVE-2024-39505,0,0,33dc1a3989cb5c060d5c4f30fa91554943c85a657f65588f826529ceef0f94a9,2024-07-12T16:34:58.687000
|
||||
CVE-2024-39506,0,0,ae829e3f00d20cc7d46d93444ea3ee66289ca64644968e1acadf28fe34c4de5b,2024-07-12T16:34:58.687000
|
||||
CVE-2024-39506,0,1,8c462840acc6bb08d9230b602444b2f73c8c80f6b650776b8310449d2261b908,2024-08-28T19:58:56.013000
|
||||
CVE-2024-39507,0,0,1f47c187fd37c3a4a4dbd94d24344ef551d55fa35ab3ff979c4b1cc67002f4d5,2024-07-12T16:34:58.687000
|
||||
CVE-2024-39508,0,0,26013578589e34725fa81a94c339e09cc309ea5ca5a92a64ba271fcd81f91dee,2024-07-12T16:34:58.687000
|
||||
CVE-2024-39509,0,0,6f4a3358b91af56191a71e0d0b835dd811a8ac97ff57de735049825822c090da,2024-07-12T16:34:58.687000
|
||||
CVE-2024-3951,0,0,5ca8c536acbbd299aeb225ced02a6adee99ff33cec2e6b61bb0e0674eb9863cc,2024-05-08T17:05:24.083000
|
||||
CVE-2024-39510,0,0,0330eb4016b902660bd24b4fa194acb334e0589010f7fd402923aa619b0e4b9a,2024-07-12T16:34:58.687000
|
||||
CVE-2024-39510,0,1,219c25ef60503ac3e7f220cf8600d0b269f5ff3251fb7cce8e3ea23df3d2c0a2,2024-08-28T19:59:12.947000
|
||||
CVE-2024-39511,0,0,8ff64d2b76cac616818d233531010fca566a954b6d7754e7506b08d9563d0619,2024-07-11T13:05:54.930000
|
||||
CVE-2024-39512,0,0,8dc06e3a41bd79c2b8acee90011e9252ad90bde4c1d3ea0321002de14ee56805,2024-07-11T13:05:54.930000
|
||||
CVE-2024-39513,0,0,c9005dbac22de69512a9faa58a7ede6f14f1995b0d447d6210a9f7d9af401e1d,2024-07-11T13:05:54.930000
|
||||
@ -256396,7 +256396,7 @@ CVE-2024-39705,0,0,e4b6d32dbf56290b80b8c0b89889459c855e182d434956c162d34a43f4f67
|
||||
CVE-2024-39708,0,0,2eafb164d29e8efc470b1c615a7a961efa5060a31edd6795a1174fbb57cde7b9,2024-08-15T16:15:20.100000
|
||||
CVE-2024-3971,0,0,232de18e9e74ddfe0c81af44fc47161b6db81bcc698685ef24ea3f7084d9ef87,2024-07-29T16:51:34.570000
|
||||
CVE-2024-39713,0,0,99e8a316dad486c18bb302062018548767182c9767b7c9ef5e1c3b6a3cdb13f2,2024-08-05T12:41:45.957000
|
||||
CVE-2024-39717,0,0,5bff20e776d919aa9302ca536a347b754ee87a4d4da8c8233bd51a9093bc293e,2024-08-27T16:15:07.400000
|
||||
CVE-2024-39717,0,1,5c727700f5fb9ffcdff7d74de82f8cc7669d0dbb9bbb395cb4e4ef77f2b2701c,2024-08-28T19:47:25.410000
|
||||
CVE-2024-3972,0,0,0caddd7b34d493c3554c875afe72275890f23d83038241874e85ef811a9076b6,2024-08-01T13:56:47.637000
|
||||
CVE-2024-39723,0,0,003097d794792a3e1194202f71608927b35e402887d5f5ddf07d35b5dd183916,2024-07-11T14:54:10.243000
|
||||
CVE-2024-39728,0,0,fba26233ce0c4692619efffa132c45bfb836485ad2132e6f2e6d7ce0ec6f97d0,2024-07-16T13:57:37.203000
|
||||
@ -256429,7 +256429,7 @@ CVE-2024-3978,0,0,264c95fabf2474878692eedd3d0ccd0dbcfac72fb894e9f86052802e2ea097
|
||||
CVE-2024-3979,0,0,e9e7991f3b86f818ec400b9ec60245e440b2d51744d0b7d3598ed5add4c2b631,2024-06-06T20:15:14.127000
|
||||
CVE-2024-39791,0,0,67ad59fd29829ae2f24abc2182dde7428e4f74acb93e703ae70c08f625fe2293,2024-08-20T17:15:56.067000
|
||||
CVE-2024-39792,0,0,89dfb5d6e1471517d66a74daaa8f0b2947fd2994f2ce01af52b42a5dfe4eec05,2024-08-19T16:20:28.967000
|
||||
CVE-2024-3980,0,1,6652f5805751a97ef8fe1d7ec0309de8a25bc6d7db9b9d9ac3de9d266e97087a,2024-08-28T16:32:20.957000
|
||||
CVE-2024-3980,0,0,6652f5805751a97ef8fe1d7ec0309de8a25bc6d7db9b9d9ac3de9d266e97087a,2024-08-28T16:32:20.957000
|
||||
CVE-2024-39807,0,0,ba2c368fe4cdf413290b5bff8a949eddf35bb4de98ed47f43e524e6cb747e010,2024-07-05T17:07:47.090000
|
||||
CVE-2024-39809,0,0,c569a9d6ae86025131a09eaedcfa15c9c40ca354c9f22b3a0f796bbc84856d4d,2024-08-19T16:19:52.530000
|
||||
CVE-2024-39810,0,0,32d906c66fda3178aaaf67b328715612b9d762f16a6ecd0f62d6e5eaf48f095a,2024-08-23T16:16:36.907000
|
||||
@ -256437,7 +256437,7 @@ CVE-2024-39815,0,0,2d23504d87a7185e1f6c185524d0f78ab739cf6cb169d8e09b6dc1e083fb2
|
||||
CVE-2024-39817,0,0,1d1cd6a9e8c22fcd8349304542868600b6e99673901b52763ffb290c1ead2e5c,2024-08-06T16:30:24.547000
|
||||
CVE-2024-39818,0,0,23a1489eb93e492f2f531059c176556ef0ad56414a5154c8c0ebf1d474d9bd4f,2024-08-14T17:49:14.177000
|
||||
CVE-2024-39819,0,0,c8db5421a3ae027faff5d4d06e3d8592e32e290e4092ae4f0fac52eb30d3f58b,2024-07-16T13:43:58.773000
|
||||
CVE-2024-3982,0,1,2c1fd479e7699ecf469abfee8d6518a9d65222765727c23ebb6f762db081a48f,2024-08-28T16:30:50.080000
|
||||
CVE-2024-3982,0,0,2c1fd479e7699ecf469abfee8d6518a9d65222765727c23ebb6f762db081a48f,2024-08-28T16:30:50.080000
|
||||
CVE-2024-39820,0,0,e80ca54bf5fea4b83e9254c90576692ea592c71bc167353b8799d70169ce0139,2024-07-16T13:43:58.773000
|
||||
CVE-2024-39821,0,0,3d8221c440f8b1dbd5c98d43cf97f16f597a43c5d93725a475fc98495ffe9f3b,2024-07-16T13:43:58.773000
|
||||
CVE-2024-39822,0,0,cb2d1986932d128ad1eb7e7cc883dcc2562e93b2f186e64c96f02bfcb19b2244,2024-08-14T17:49:14.177000
|
||||
@ -256523,7 +256523,7 @@ CVE-2024-39922,0,0,49c31345500e32d6b7c4474f0f0a36570fac3b2db4261dad7ae8eae345056
|
||||
CVE-2024-39927,0,0,717dcd9b351ff5b040ab1ae7299ad64aae73108f68a03a8e01e420f58c1fcdd4,2024-08-01T13:56:03.057000
|
||||
CVE-2024-39929,0,0,a101bb24f7d63f090f20192946a102f9a39a1df49f06f499eb77157966db47ea,2024-07-09T16:22:58.760000
|
||||
CVE-2024-3993,0,0,a2f94f13d02cfe8603a71433706e6cc2c5ad0c0e3e2fd5d51c299cf3fc301a73,2024-07-03T02:06:58.160000
|
||||
CVE-2024-39930,0,1,cdc992a1c867403c11a0be36acd7b83ecbd37782c92bfa488077642f39b94c1c,2024-08-28T16:15:09.077000
|
||||
CVE-2024-39930,0,0,cdc992a1c867403c11a0be36acd7b83ecbd37782c92bfa488077642f39b94c1c,2024-08-28T16:15:09.077000
|
||||
CVE-2024-39931,0,0,57507fbe3202e653bd98909b84e780947039b01c02661b27c6bdbbdb819d80d9,2024-07-09T16:22:59.140000
|
||||
CVE-2024-39932,0,0,f66805c87f9aab2044f816b4446ff24a7e25b5aa6328c8b5e2e33ad89efc57a8,2024-07-08T14:18:57.240000
|
||||
CVE-2024-39933,0,0,b6d32209bff3b62be34bd9bfc29ae3793bbd5d0463ddb473f2add5c3bc3eb1dd,2024-07-12T16:11:56.423000
|
||||
@ -256666,8 +256666,8 @@ CVE-2024-40520,0,0,a2ac37b5fe4993386ad0c401ff27a90a4ee5d292a95a31b8ec4196b4a0643
|
||||
CVE-2024-40521,0,0,f750523e60dcc32f0bb9bfafb3982029c7dd27cd5b8886a7de1a46e73ce196a6,2024-07-12T18:44:41.670000
|
||||
CVE-2024-40522,0,0,8a677ab9989e362511bec3e6f4edb768c909d11d73452c70e9694007bb6c7499,2024-08-01T13:57:36.927000
|
||||
CVE-2024-40524,0,0,90f7431206b5ecbb9d18d5d6f346e266df059fa6fac9c7463be67ad7414064c8,2024-08-01T13:57:37.610000
|
||||
CVE-2024-40530,0,0,9e5cc738a7a0e410e0970f7751814354231f294fa9d110e489777dfb798ceffa,2024-08-06T16:30:24.547000
|
||||
CVE-2024-40531,0,0,9e583eb42d15be1f9048ae9b1965517ea12462cc8e4dd76ae30b81e5d3440314,2024-08-07T19:35:06.233000
|
||||
CVE-2024-40530,0,1,efb514f12fd7b373398adea8678758d12c23eb4a56afc33b6cb2a0d986bc14b0,2024-08-28T19:15:08.717000
|
||||
CVE-2024-40531,0,1,197fc6f6a80e1880502547f174bb330235e9a4fff00fb8be3255641a40fc91b4,2024-08-28T19:15:08.797000
|
||||
CVE-2024-40535,0,0,1510e098104a1d2f524b97f4ba986590a1c7d9af78dd4e91187f28763928fd2c,2024-08-22T19:35:35.893000
|
||||
CVE-2024-40536,0,0,8e08633375577085d9df665f2d62466b3b6eb1ecb2618a56ac5894fb283b7f3f,2024-07-17T13:34:20.520000
|
||||
CVE-2024-40539,0,0,8ebc42c1390ef84ac367ae8d1ba0b0ce9ac095f50c081e4e40b961f1bf0b144d,2024-08-01T13:57:39.077000
|
||||
@ -256853,7 +256853,7 @@ CVE-2024-40893,0,0,3220dba971e1861a31a0659deabcf8dc81ec736d5ed6a5b82a9eb1d0c8650
|
||||
CVE-2024-40895,0,0,8c1e79c4f9b4c4aa0a454566e9355d762509535d530511413d5b712e02da1fc1,2024-08-01T13:58:15.617000
|
||||
CVE-2024-40897,0,0,7f0ff77f7480d176e5ca1f86675f7cea8983627e8b9afaea0e9328e4e4b96a32,2024-08-27T13:52:53.790000
|
||||
CVE-2024-40898,0,0,c6ad18799f7505669566d9c81fb73660e4e14c652ad1fc12f5c5f928e7c51636,2024-08-08T16:02:40.887000
|
||||
CVE-2024-40899,0,0,e950acc969e56b6fc4b2198a92989ebcef19e4b4c9a9c8ad08fee90da2bba031,2024-07-12T16:34:58.687000
|
||||
CVE-2024-40899,0,1,e780b074d783a002df6b4261424c6db082994ffa39e09f112feba6d38138eca6,2024-08-28T19:59:22.927000
|
||||
CVE-2024-4090,0,0,bd5db9aa43fdf043c385c9f06c114ad9fbfb60a7cd8406c1329f0be062b40775,2024-08-01T14:35:12.593000
|
||||
CVE-2024-40900,0,0,d5b683c8350615b20febf47a29bbffae93edd0a350147e3cd873aa7a5a37926c,2024-07-12T16:34:58.687000
|
||||
CVE-2024-40901,0,0,e26097fb6f292c0ef621a3948768a962501ab86f3daa859d54d1945bd865aa16,2024-07-12T16:34:58.687000
|
||||
@ -256889,9 +256889,9 @@ CVE-2024-40929,0,0,922566e6896182fcd86bab51cbd2b2f5e83578ebe1d9528e2a3d395a2a144
|
||||
CVE-2024-4093,0,0,4094c134af1a117994cc6fa0b479bc18db1d53d46b6fa3e1bad5f760245c30a1,2024-05-17T02:40:15.433000
|
||||
CVE-2024-40930,0,0,b4f4f0f521513c469fe141e4f04568fa708146afbf26b9e43ef67c49fbb97034,2024-07-12T16:34:58.687000
|
||||
CVE-2024-40931,0,0,1ce51d0c1cf3e56971909d12fef17b7b190325030f87851f102025b07310a339,2024-07-12T16:34:58.687000
|
||||
CVE-2024-40932,0,0,e8ec84595af9a30f4368e085ee7539630fc3b219591ec1d658603c900fdd00fa,2024-07-12T16:34:58.687000
|
||||
CVE-2024-40932,0,1,a9cf96830b006378bce6c68ed0757ef896fae1b35ee3940d03a768e94ae65c5a,2024-08-28T19:48:53.420000
|
||||
CVE-2024-40933,0,0,96771d62b803cb6fb8413f216e98fe7325b9f160d5178302017c1ebbfdf41ad1,2024-07-12T16:34:58.687000
|
||||
CVE-2024-40934,0,0,bf33c91dae3b9649da53d2fa1482b0bf2738fdf0a9af98a8aa39239165b4e9e9,2024-07-12T16:34:58.687000
|
||||
CVE-2024-40934,0,1,0f4fa006864a9d48c0a4ffb7ec8d6898f10d1c1eb85215eb8c4ca2a5d7b3ba19,2024-08-28T19:49:04.307000
|
||||
CVE-2024-40935,0,0,a229105c5d2bb66ee17d53a34892f169d9c296108d2f7d99e57d4944bc30c1f0,2024-07-12T16:34:58.687000
|
||||
CVE-2024-40936,0,0,34f66f9dfd47f0ce49d1c77b26ffc55123e4f460cffd6c4a4b7f8e6444317e13,2024-07-12T16:34:58.687000
|
||||
CVE-2024-40937,0,0,18b0b0dc1e836fe3ae2e170c8982a2b4836f0393f58deb5f92b95d810e69aed1,2024-07-12T16:34:58.687000
|
||||
@ -256913,12 +256913,12 @@ CVE-2024-40950,0,0,b6979d5e6c063eb00970b540ceafda0becb430ff51009e9e1c48a7255ff5f
|
||||
CVE-2024-40951,0,0,15aa8df4b78f7514f02ec97aa813adcc5685b7b49e8bf3041732ce8e88b84a54,2024-08-06T13:29:07.827000
|
||||
CVE-2024-40952,0,0,0e259c5b64d27b28a64029bae66b9c49f91a589d68389fee91a3e779c87dcc5c,2024-08-21T16:50:34.377000
|
||||
CVE-2024-40953,0,0,b95ef29b38cb2bdc14b7d3310e089ce1c53f0ae5a8fac0aff1ea43db998d2aa8,2024-07-12T16:34:58.687000
|
||||
CVE-2024-40954,0,0,6435d77632d64383b2dd408edc2b98ec70827908a39e4fc7f1aeac09bff6b72f,2024-07-12T16:34:58.687000
|
||||
CVE-2024-40955,0,0,4f78b513b01dfd2400b7927009e3f8081393369b68b71a3a8bf67f98b5e12e0c,2024-07-12T16:34:58.687000
|
||||
CVE-2024-40956,0,0,01fdb45f44f8095c8f9389fef0857cd7ac1f55e504ec60f396a8f9e5482a8269,2024-07-12T16:34:58.687000
|
||||
CVE-2024-40957,0,0,ba43e6ddc634305a816231c000c7b443548485728739cecf3ba6005f6c02b2f3,2024-07-12T16:34:58.687000
|
||||
CVE-2024-40958,0,0,c4b20d9cb20e4970bb454dd1d6fa22674e8409df2a8f77cff22e9737b19836ab,2024-07-12T16:34:58.687000
|
||||
CVE-2024-40959,0,0,e7c156318badfedaa056792bcbefa34231e67bdbb7ed04e052f8e0abfa80614c,2024-07-12T16:34:58.687000
|
||||
CVE-2024-40954,0,1,78f0e309af3fbd1c7a3f44fe20c2a180906cb9fb2c93280aadfa346fd4829390,2024-08-28T19:43:58.273000
|
||||
CVE-2024-40955,0,1,944ef62a2af0db3b5c2b157398d008c072a9239350e5ae4417455b3911010b14,2024-08-28T19:45:37.080000
|
||||
CVE-2024-40956,0,1,b38583adc04d97ec9d688f8f059ebfc65c5239ed7aba58f834e95c4bc80bb3b7,2024-08-28T18:58:48.433000
|
||||
CVE-2024-40957,0,1,4169395d36d8df754af0ff2f0952d94b9d03cad9228a2cd953255dac27d54c21,2024-08-28T18:58:59.793000
|
||||
CVE-2024-40958,0,1,4055162d5de8cf1b7ae3f4360cf522ef9d8bb94c58b99c5968e7d3b887a367e8,2024-08-28T18:46:29.543000
|
||||
CVE-2024-40959,0,1,3efe7268d6bd3d9c0e7792eede131c4531003b8b0a406d93c2abed58e13790c2,2024-08-28T18:46:52.453000
|
||||
CVE-2024-4096,0,0,50bdcb96d8146d46d54f79639093726453baeacacf83f329111a9e971fb9861d,2024-08-01T13:59:25.313000
|
||||
CVE-2024-40960,0,0,224fc8abfb2f94783b28083c93e2292ac4ee8186631329fe5a1366c6e0afb3e1,2024-08-21T16:53:01.407000
|
||||
CVE-2024-40961,0,0,46c5313b9439073911d138fda8b8a768c839675dbf78976afbf75297f27433b1,2024-08-21T16:54:20.817000
|
||||
@ -257125,6 +257125,7 @@ CVE-2024-4121,0,0,62ca255cdda2e26a7a0224389681466727634cf0831afab2f14e58a1cb5bd9
|
||||
CVE-2024-4122,0,0,3d81c7d42348f56045cc538515e4a2e136e243adec928773370fb697e11bd281,2024-06-04T19:20:30.560000
|
||||
CVE-2024-41226,0,0,0f1b0fab09deb513b318e5339bb250b54a4148cca3ff553dad16500490764bac,2024-08-12T16:01:32.383000
|
||||
CVE-2024-4123,0,0,b9879b7d0937c162f61c7aeebe9319c3ee0d2290b23cb569d74c82da57c569d5,2024-06-04T19:20:30.660000
|
||||
CVE-2024-41236,1,1,c4e6a64b54b2e943aa2644b716126f214c4e5e917f99a2fe950f6695e8ec8574,2024-08-28T18:35:16.790000
|
||||
CVE-2024-41237,0,0,8ccb4952f164337b681989e54cc147e9e164fc596c980ba694a928ee7e458af2,2024-08-08T20:53:45.827000
|
||||
CVE-2024-41238,0,0,f705e2f0b1f5d028406d99f056a8ab6c4a04267fa568b3aa67b3ab220a8ce6db,2024-08-12T15:06:26.557000
|
||||
CVE-2024-41239,0,0,131b357876f7631347cb4a7eac6921190f3c4ad817f4e0a0fd5e6c6c0d9100d6,2024-08-08T19:04:43.380000
|
||||
@ -257164,7 +257165,7 @@ CVE-2024-41304,0,0,97c8e67643f8470191a2e05ce641725b816a8cc5ff59a9e38a00154810fc7
|
||||
CVE-2024-41305,0,0,44375e3d9aedae768570d453a5746b314221c07760efe679991b65a52a72cbb1,2024-08-08T14:36:06.423000
|
||||
CVE-2024-41308,0,0,0cfb1f5a539d1b3ab56fa248bc4e6b56744120f3ffd7eb646c940bb1f8d27a55,2024-08-08T15:04:28.510000
|
||||
CVE-2024-41309,0,0,b9bc578a75924505757e6c223f9b414f575de364b8af8a3b843d1bd2707bdb26,2024-08-08T15:35:19.553000
|
||||
CVE-2024-41310,0,1,dab67ac1aeab1ffb95f812e4938961307c6ce203d52330d45800d09dd75058c0,2024-08-28T17:42:01.190000
|
||||
CVE-2024-41310,0,0,dab67ac1aeab1ffb95f812e4938961307c6ce203d52330d45800d09dd75058c0,2024-08-28T17:42:01.190000
|
||||
CVE-2024-41314,0,0,db53d1cfc39af554879f83e26dbe36479a0a26172379fc4a043735d6cb186ac0,2024-08-01T13:58:28.057000
|
||||
CVE-2024-41315,0,0,2d4182edc23b3ca5f23da4066941e10349788ef80e0dc9d84cb1c30a4edf0d37,2024-08-01T13:58:28.840000
|
||||
CVE-2024-41316,0,0,fdd83ec8e5f08975a0e0f1c308e905edc7588e4137c92360541a6835aa02f708,2024-08-01T13:58:29.627000
|
||||
@ -257232,8 +257233,8 @@ CVE-2024-4155,0,0,9d1d3f06be4be4f0b611f0b92aa6b48510c05900efdf1b1c24851d7c9581a8
|
||||
CVE-2024-41550,0,0,6726e0c6849e70c536d9bf6936241acc920718305f74521a185836b6b51898fb,2024-08-01T13:58:53.253000
|
||||
CVE-2024-41551,0,0,a47b3d6d1401636bd7731728d6fcb9c38717d9cec4c98b37b50c290693f43ad0,2024-08-01T13:58:54.023000
|
||||
CVE-2024-4156,0,0,31cc9500838d0dc99d5959700d84ebbac93048893a2eb67f37ed77d13093550c,2024-05-02T18:00:37.360000
|
||||
CVE-2024-41564,1,1,01c34f438e5872694f278c8b8396057a7820fd6f83e9a693a9ecf1988006725d,2024-08-28T17:15:10.693000
|
||||
CVE-2024-41565,1,1,ec1d51b0f10f4435436477324f29c544ea70dc92e44967077c96d395a60a6faa,2024-08-28T17:15:10.903000
|
||||
CVE-2024-41564,0,0,01c34f438e5872694f278c8b8396057a7820fd6f83e9a693a9ecf1988006725d,2024-08-28T17:15:10.693000
|
||||
CVE-2024-41565,0,0,ec1d51b0f10f4435436477324f29c544ea70dc92e44967077c96d395a60a6faa,2024-08-28T17:15:10.903000
|
||||
CVE-2024-4157,0,0,ac5ec2e690c76b81403cfa49bc63d1a8caa2fb9d97d28a1055398849720db727,2024-05-22T12:46:53.887000
|
||||
CVE-2024-41570,0,0,08f18f006ef075be3e868b6121774877f2111f5f9ca9672280d529a6b344da0d,2024-08-13T01:14:38.880000
|
||||
CVE-2024-41572,0,0,3538ce626eeeb6e9299463c0d735b4d1491706bbb85dc5c5ebc08929e34353d5,2024-08-22T21:15:16.797000
|
||||
@ -257268,8 +257269,8 @@ CVE-2024-4165,0,0,1335796556da8c6a778d77814a8f1d84d8c2dc18b70d9de88815783ed1aa0d
|
||||
CVE-2024-41651,0,0,57f3cb7d00e7e9511d0d03f9437ce1a28380d574f08dab4c3cea3241ce2f7fe3,2024-08-14T21:35:07.780000
|
||||
CVE-2024-41655,0,0,ef3400d9e58c2cde6c539334829c8042d5ee995783a74a46bd16638786b0b6db,2024-07-24T12:55:13.223000
|
||||
CVE-2024-41656,0,0,d1b3325a39b6b3bcc8a959c5c8544c45c6c0440a0b7279ac0753d809322ad5fb,2024-07-24T12:55:13.223000
|
||||
CVE-2024-41657,0,1,a42a5606a1117689a3813ccf13de868ed46700bc2cc392be931df01456b9a289,2024-08-28T16:13:35.140000
|
||||
CVE-2024-41658,0,1,1f9220237877017e3c13ba7e8f7b4d6391ec43dc30ad917b851d9498bae40fed,2024-08-28T16:08:31.743000
|
||||
CVE-2024-41657,0,0,a42a5606a1117689a3813ccf13de868ed46700bc2cc392be931df01456b9a289,2024-08-28T16:13:35.140000
|
||||
CVE-2024-41658,0,0,1f9220237877017e3c13ba7e8f7b4d6391ec43dc30ad917b851d9498bae40fed,2024-08-28T16:08:31.743000
|
||||
CVE-2024-41659,0,0,998a35290d72b0eb949229fc531ef068f95738d64bf6829749ab13d3e732d9a9,2024-08-22T16:15:08.993000
|
||||
CVE-2024-4166,0,0,f698286bcd13839c3e713fc944a2d68390d9d1f07ea9696da7a343bdead6335d,2024-05-17T02:40:17.900000
|
||||
CVE-2024-41660,0,0,4c084a0db17b15ec343b2b75da4e6745a4156a9dd9381d5cdd96e60eb80314c7,2024-08-01T12:42:36.933000
|
||||
@ -257955,7 +257956,7 @@ CVE-2024-4268,0,0,ed1b7008ff1a2549bc2f685279352d3a8f5b6d435592b2f29fd10fa9328ca7
|
||||
CVE-2024-42680,0,0,b168ab4cd2e2150be7aaf36c84a318add99cf48e6e7026b9bd7262bb9f167200,2024-08-21T11:06:00.887000
|
||||
CVE-2024-42681,0,0,38014007bcc5735791461b793967c4dfbe475531f64d8682f14c63500277a9d8,2024-08-19T19:35:08.437000
|
||||
CVE-2024-4269,0,0,3a0e07c5dbf72b66f7c37e018ba2f8991c2e2b5c26c8f2d595b33767cdbe4e7e,2024-08-01T13:59:29.737000
|
||||
CVE-2024-42698,1,1,fe1c83135bf9fc84a6cd49538bca8838b9d9c29d3ca03087dcd64f79c8ed00e0,2024-08-28T16:15:09.210000
|
||||
CVE-2024-42698,0,0,fe1c83135bf9fc84a6cd49538bca8838b9d9c29d3ca03087dcd64f79c8ed00e0,2024-08-28T16:15:09.210000
|
||||
CVE-2024-4270,0,0,17133812b9c812b17ff2909d738c8b5ae6f8cc2b39eef016edec8cd05359b195,2024-07-29T16:31:09.117000
|
||||
CVE-2024-4271,0,0,264c116f07aa10a920ca78d5e9c58bba0fe1e2b31cb4f2cfd0a7a609be29751f,2024-07-03T02:07:19.577000
|
||||
CVE-2024-4272,0,0,c6d51ebaf4553eb5c8964297a8a6646c1c8e34e58f8be34bef185e25a27d5cec,2024-08-01T13:59:29.913000
|
||||
@ -258020,7 +258021,7 @@ CVE-2024-42816,0,0,8dd1ae8820cfa39b8949229a5b0a0fd0a511af977924a1929a9dcb8553f95
|
||||
CVE-2024-42818,0,0,95f0b34855c9e871f13f61a27d7d6c078da48a4416445325f9775ca851de2f13,2024-08-26T19:10:18.890000
|
||||
CVE-2024-4284,0,0,4fbe27a80563712e41b6422ac48754a31c657da862cab89b959335ecaf13d90e,2024-05-20T13:00:04.957000
|
||||
CVE-2024-42843,0,0,147a94e278dd08ceb9ff0b00f505eb868d7a1e59c01ddecc9d1420e344e9ec86,2024-08-19T19:35:09.180000
|
||||
CVE-2024-42845,0,1,f506b40591f84fe588a1ebf10f79903d4e58b530d7a712a8d7ac529b24aba892,2024-08-28T16:35:23.650000
|
||||
CVE-2024-42845,0,0,f506b40591f84fe588a1ebf10f79903d4e58b530d7a712a8d7ac529b24aba892,2024-08-28T16:35:23.650000
|
||||
CVE-2024-42849,0,0,476a8b05abd0e5119b7af3cdc63ecacc25e4b753be03084352759f8b34a540b8,2024-08-19T13:00:23.117000
|
||||
CVE-2024-42850,0,0,a72d6cc9fb65147822ff703ae140dbf9bc418b2813da9b6084ec42fe436f4f06,2024-08-19T16:35:24.160000
|
||||
CVE-2024-42851,0,0,6c308263fb08a775e02bfe8a8bf1ad5061e10f5571a88f89a609b0ef630568bc,2024-08-27T19:35:28
|
||||
@ -258030,7 +258031,8 @@ CVE-2024-4287,0,0,e4eaa9cc0eedd48e962bf47bbdeb2988e2d50ccd6011525ef3609c758b0c26
|
||||
CVE-2024-4288,0,0,98dba4b61502f5abd6b75fde706ee82a9bae31a5b0be7db458ed8cfdf0d8bfc6,2024-05-16T13:03:05.353000
|
||||
CVE-2024-4289,0,0,00867bfd0f1ec036543766f70ad029cfafef69b68de16bba7569db7276222c78,2024-05-21T12:37:59.687000
|
||||
CVE-2024-4290,0,0,96468cd9b26f589eaa99a2991d568962f6532fbc65b02b2950965134d65bb1ac,2024-08-01T13:59:30.177000
|
||||
CVE-2024-42900,1,1,03cb4ee58025e2ddb00a8eae086634a9edd3cd52073546780083b1fedebf3f3d,2024-08-28T16:35:24.427000
|
||||
CVE-2024-42900,0,0,03cb4ee58025e2ddb00a8eae086634a9edd3cd52073546780083b1fedebf3f3d,2024-08-28T16:35:24.427000
|
||||
CVE-2024-42905,1,1,63b2e3708e6370f68c8f0eab942c4bf94d6d07b2bc063f6d5b24c75cc4e46eeb,2024-08-28T19:35:20.503000
|
||||
CVE-2024-42906,0,0,83be373189250265e4f12ae408fac34eb129a889121f0ce4e7f0836727cd3453,2024-08-27T13:02:05.683000
|
||||
CVE-2024-4291,0,0,3555454673f17bb302e51e81ea2fe7cd049aabde203c094d5792666ddbcea9c8,2024-07-03T02:07:20.773000
|
||||
CVE-2024-42913,0,0,796fb1ba4b67987b44a9370ce058c2b037b19ffa316e1a186c445f2c01301c3c,2024-08-26T19:10:09.607000
|
||||
@ -258331,7 +258333,7 @@ CVE-2024-43444,0,0,fbee9de686ac80a9fde5553d13b4aef0864614401bc5081d1c7ab76503d44
|
||||
CVE-2024-4345,0,0,991a52fb88968c952c460a76f59f283c0ad80fedc25d9533338fbc3b0d515f60,2024-05-07T13:39:32.710000
|
||||
CVE-2024-4346,0,0,9d7617b39f85e35f3b425bc36c01c8cc51c24d84e65ff0d34bf4ea7488f000ec,2024-05-07T13:39:32.710000
|
||||
CVE-2024-4347,0,0,f9a9185c34e13435315e8c5679dcdbef88eacdd68a031d012b94daf573ce3f3f,2024-05-24T01:15:30.977000
|
||||
CVE-2024-43472,0,0,f0bdeaadc10d27ea81613820adf34fe3715a0574820193114227d17964089794,2024-08-19T13:00:23.117000
|
||||
CVE-2024-43472,0,1,4f801f83921e67b67f46b12b24b80ffa004f18db83d5caf5b1035ebd0cb2bc74,2024-08-28T19:13:21.393000
|
||||
CVE-2024-43477,0,0,7032b6e49493834ede52e5f56f0a124d3ffe61f7e9da696a9c0c79526fdcc194,2024-08-23T16:18:28.547000
|
||||
CVE-2024-4348,0,0,6e86bc5560fea8dde0d2ebca4133582cb5d1167a5aec18ad6c6b9b23741c69df,2024-06-04T19:20:36.223000
|
||||
CVE-2024-4349,0,0,a8b03025f36b8713c52951e7ebcf312d165d904bb8cd188665520ff04ec5e58b,2024-06-04T19:20:36.340000
|
||||
@ -258494,7 +258496,7 @@ CVE-2024-43911,0,0,12aeb44bc585c03b21c76c85e16ebe86660a58d7a2313ab40f0b85cb472c7
|
||||
CVE-2024-43912,0,0,9224434204b7590693cac3418bf42ebf514074b8e8db707b0e4b732c2fd9e6a1,2024-08-26T12:47:20.187000
|
||||
CVE-2024-43913,0,0,5c9c2c963f30f56673884f817fecf35fdb8c9c609214d88499e445eaad74d316,2024-08-26T12:47:20.187000
|
||||
CVE-2024-43914,0,0,6abd174237c3162d43a4c80a18de042ce09386ce614128479039a4b09b208b5e,2024-08-26T12:47:20.187000
|
||||
CVE-2024-43915,0,1,d179827f4a2239697e62ac501a97b8b3109220e3bde2278c20f3a196442ad24d,2024-08-28T17:44:45.193000
|
||||
CVE-2024-43915,0,0,d179827f4a2239697e62ac501a97b8b3109220e3bde2278c20f3a196442ad24d,2024-08-28T17:44:45.193000
|
||||
CVE-2024-43916,0,0,f029d23d9b2bb2878425bf53ff3e166ae08ff9834b0ced7b956909e8c596933c,2024-08-27T13:01:37.913000
|
||||
CVE-2024-4392,0,0,5c82c123a66d3444e81adbb958bd6b8cf11e432e36668571a78dbfc8c82c1c37,2024-05-14T19:17:55.627000
|
||||
CVE-2024-4393,0,0,4e00802830a11f2dfec38985ebf8ec82363098448bfe6d2b274aa9f7d7f56b33,2024-05-08T13:15:00.690000
|
||||
@ -258591,6 +258593,7 @@ CVE-2024-4471,0,0,44899070168831f8c9dbf9959b26f4abead5dc804569bf5f22dbe3807408cb
|
||||
CVE-2024-4473,0,0,8a0cf4a98efdbfb5770862e11c920028f2e3a9a43c44eb843685fb5ef0c3f72b,2024-05-14T19:17:55.627000
|
||||
CVE-2024-4474,0,0,f8c1a36ad14efe96f98dae06e1720ed737c744e50cd9a9e3991eaed9f98aef96,2024-07-17T02:48:04.213000
|
||||
CVE-2024-4475,0,0,b199ea7732b827fa53d53ebb43badb03a8dff248a786cc8d7d2459800e62c08e,2024-07-17T02:47:07.620000
|
||||
CVE-2024-44761,1,1,361838cb7a1b116b9f497344dd8aff3b164952f24f968d85f6ede5ec3de92766,2024-08-28T19:15:08.933000
|
||||
CVE-2024-4477,0,0,b275cf91a81ef0e33ced77c1c5ba5e17245e6b33fc991fd87901e463b723d83e,2024-07-12T16:12:03.717000
|
||||
CVE-2024-4478,0,0,df092e6d564da1ba274f237ab38d20f4d3626835a8920b1b768f819806d6fce1,2024-05-16T13:03:05.353000
|
||||
CVE-2024-4479,0,0,19a5d52fe32f562c79c648f88a021706b773334e3193aa8af739d9d0094fe357,2024-07-26T13:35:32.397000
|
||||
@ -258611,6 +258614,9 @@ CVE-2024-4488,0,0,1067ee59b8b50187d3b6e6dcedd09634fc158d8d3cf8abb63a1cced20ae50a
|
||||
CVE-2024-4489,0,0,982cbf89b6458fc8989b334c07bea5cd0f34b9af1a316c2d08ef53a4dd4e8b8f,2024-06-11T18:07:03.573000
|
||||
CVE-2024-4490,0,0,46d58037d58f18ff9df6b6b94f91d6beb02adec3983ce96102d15aba21f19fde,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4491,0,0,fec0fa99feb905362d1059ae18d849f25d02b15efc10c179ce136112d1e08871,2024-06-04T19:20:38.950000
|
||||
CVE-2024-44913,1,1,3d0a718f021ba05c36d3cde74252c706d497214671f8cff4d115bea728d16df4,2024-08-28T19:35:21.377000
|
||||
CVE-2024-44914,1,1,f9f8ba7025d22966f03b97ab83fc8a2749a603d218d7389ac39cfd20db2d5481,2024-08-28T19:35:22.160000
|
||||
CVE-2024-44915,1,1,9030bbe2236b67114df101ba08f9c9855f4e55916353587c850f6e3720a8d862,2024-08-28T19:35:22.957000
|
||||
CVE-2024-4492,0,0,0237cea7742a82f916a95c7121fd101b19e30a52d4f326fc68f5db785a621a29,2024-06-04T19:20:39.047000
|
||||
CVE-2024-4493,0,0,890374eb1d5a1051bad1d8c630ec03ea130ffcf654be5d03c4d1c85a0ebc3c87,2024-06-04T19:20:39.143000
|
||||
CVE-2024-44931,0,0,a811432be893129eec1153f2a1f5cf79e00f6cda4409f2898f7f29e87e49d41f,2024-08-26T12:47:20.187000
|
||||
@ -258666,9 +258672,9 @@ CVE-2024-45188,0,0,b715e0fd98dc9de103c52fc47a055822268226fc14af5f0a01f3a3eab3db9
|
||||
CVE-2024-45189,0,0,a1a91d374d9461d5778df63a2cf5d241a6c11d01b78d41c23bf70fd5616239fd,2024-08-26T12:47:20.187000
|
||||
CVE-2024-4519,0,0,5f7c1c0aa362af4fc3ba7e1d12e176f4028e88f0167af6f63c30c7ec7da86837,2024-06-04T19:20:41.127000
|
||||
CVE-2024-45190,0,0,d66cd4c54a74e68d49ead3a1a738b5a5af6006ce6c10ee38db19e97b19943350,2024-08-26T12:47:20.187000
|
||||
CVE-2024-45191,0,0,2a889b4602938b6e2674b0bf815335db30baaadca4c51b450f01e34042d695de,2024-08-23T16:18:28.547000
|
||||
CVE-2024-45192,0,0,30eddbb92dad40ea47915eb7180399e22941399795ea5b18c4d640a6070b3421,2024-08-23T16:18:28.547000
|
||||
CVE-2024-45193,0,0,d6f872fc649469c5b3046e7ef10246f8b1741f908732214cb33afbe1f14b40ed,2024-08-23T16:18:28.547000
|
||||
CVE-2024-45191,0,1,24320cb2d6c99102884a32a46b7a31b3437a78a394995949745365d8548a79f9,2024-08-28T19:15:09.110000
|
||||
CVE-2024-45192,0,1,4666f187009b1a4ab720c7a921aa9d4f66b4b44b91cc16546d5c51cd8fcccab7,2024-08-28T19:15:09.210000
|
||||
CVE-2024-45193,0,1,450979f4ae6c2f3dd1e7534dcc90d4edb6b061770952d9d6772a5ec5592929a7,2024-08-28T19:15:09.297000
|
||||
CVE-2024-4520,0,0,b2949348c863aeabf77cf8262dadc8a1301ac645ed88723ebde503df8cb28e51,2024-06-11T17:02:16.967000
|
||||
CVE-2024-45201,0,0,83db05d7484ca5c2638e18e64e3b5c06d28a9caaae332ad6d01f844ea902b04a,2024-08-23T16:18:28.547000
|
||||
CVE-2024-4521,0,0,a1d240438f25322e21494c2ddd2f5ee26b23410f012534bc2c27a0a49b09a860,2024-06-04T19:20:41.223000
|
||||
@ -259002,7 +259008,7 @@ CVE-2024-4868,0,0,115d92ddb75cc1364cb7dc1ed780a32e113f5bc6f17706ce21f4cd60cd219a
|
||||
CVE-2024-4869,0,0,c966893d60f3d2b834063ff6490a8006deca39b71769e89345f5be1133a2f10c,2024-06-26T12:44:29.693000
|
||||
CVE-2024-4870,0,0,34dc62fe0d9ee09fd087b0b9ccdcdae4c15125668207018dedb4b3cfd451baf0,2024-06-04T16:57:41.053000
|
||||
CVE-2024-4871,0,0,27d58887099f376e93909bb4c2214524b0789bbba79f05cabea36e120d5295ee,2024-08-12T16:15:17.313000
|
||||
CVE-2024-4872,0,1,d90ca5cb4f3aa571c9b2083a01f34e57193d2e6bd3fb94b4217f8fd14b43654d,2024-08-28T16:25:02.097000
|
||||
CVE-2024-4872,0,0,d90ca5cb4f3aa571c9b2083a01f34e57193d2e6bd3fb94b4217f8fd14b43654d,2024-08-28T16:25:02.097000
|
||||
CVE-2024-4873,0,0,acc2d485a3cc66f2d361ddda92f62901a8108a4490dc81ea4acfb7f60771d88d,2024-06-20T12:44:01.637000
|
||||
CVE-2024-4874,0,0,4b5967df7915507c9b0020b0ee4984332d2c23e37a57b9a262a2ae6c5b300f4b,2024-06-24T19:41:12.293000
|
||||
CVE-2024-4875,0,0,5a9bf10de46e2f944321ed00fa6d17c799716a219001f5797c9cce4abb6a2b7b,2024-05-21T12:37:59.687000
|
||||
@ -259986,7 +259992,7 @@ CVE-2024-6047,0,0,85682382a3873811b400f354140b032b3237064163e98177d5be59d88a26c9
|
||||
CVE-2024-6048,0,0,c67416098261daba4fbb7cd933140c3939f890be764cfd8ea2022f29e8208654,2024-06-17T12:42:04.623000
|
||||
CVE-2024-6050,0,0,977e3c1d954bb2d407afb4f807be75a02157bd9cd72111a32e132ff13e7f9262,2024-08-15T17:21:21.920000
|
||||
CVE-2024-6052,0,0,38b34f27bf68c4c46450287788affa9aba60ae6b039318e5898c7b1f92d4d920,2024-08-27T17:56:02.507000
|
||||
CVE-2024-6053,1,1,d948e07b8baf864dac71376d31f8ecc578facf82b0fb9781a32c5b912ab40183,2024-08-28T17:15:11.163000
|
||||
CVE-2024-6053,0,0,d948e07b8baf864dac71376d31f8ecc578facf82b0fb9781a32c5b912ab40183,2024-08-28T17:15:11.163000
|
||||
CVE-2024-6054,0,0,dbd3e49036b5938301871d5a6c67ee17ba89370e3288082b00ca89a51a1f06ed,2024-06-28T13:11:58.810000
|
||||
CVE-2024-6055,0,0,69ea90ebaa7aa8fe33baa786beceb3ec128eecc80f960a60b64b4cba1327c031,2024-06-20T12:44:22.977000
|
||||
CVE-2024-6056,0,0,7f74134484f6fd18fa58f8938789bdbc0044ca3e8ab999314ec931796600d896,2024-06-20T12:44:22.977000
|
||||
@ -260240,7 +260246,7 @@ CVE-2024-6355,0,0,7f4c7fb5a41a7b4cf241f6b370777bf2a8cf0ede73cf75d47093e841c71a69
|
||||
CVE-2024-6357,0,0,d17a8b9a4a9bc17bd90a79ef1b2a022c26416b8ede91adaf116bd0fc1d0de886,2024-08-19T17:23:16.973000
|
||||
CVE-2024-6358,0,0,3e184968ad38f7e6dfc49915eadebc5cb02badfeeeea523a574397eb20c849cc,2024-08-19T17:31:29.647000
|
||||
CVE-2024-6359,0,0,093dea73109d9b2f23d9e6885d4ebbb2b84fce28b7a075a363fc879a286259cb,2024-08-19T17:30:31.880000
|
||||
CVE-2024-6361,0,0,c78d54a60cbe74050dfcceec663bceae239fbbf7a647cea8c5a73a6e5ad54d91,2024-08-06T16:30:24.547000
|
||||
CVE-2024-6361,0,1,a3e4bbdd0f4905fca66747fb0442673a0924c1ae81b12b0ea7c60a6803fd61d3,2024-08-28T18:17:35.497000
|
||||
CVE-2024-6362,0,0,aeb770c7b39ef36db7bd4a49056b449aeba256942be50c6b83f329d15f15257d,2024-08-01T14:00:20.147000
|
||||
CVE-2024-6363,0,0,455979652b8642d7eb5b747949e6f02be3f028b83d7cfc357521a34bb9d7438e,2024-08-01T17:00:53.130000
|
||||
CVE-2024-6365,0,0,4363950e80c53434fcfd5afd5a384a9df5c49d102c20d1b50eb31e33005d9f26,2024-07-09T18:19:14.047000
|
||||
@ -260694,7 +260700,7 @@ CVE-2024-7054,0,0,c2f192d88d8b2a817d17540b8fda16fcd38e463cdb3b6d5e52e3cf243830ad
|
||||
CVE-2024-7055,0,0,b0e8b0793ccc61abbc70699af6d91421241877ab1f640f57d490cff121ecbcd0,2024-08-06T16:30:24.547000
|
||||
CVE-2024-7057,0,0,e86292da776d8c2eee12db885a241ac453174252cdfea8e6058f6d373bd4dc19,2024-07-25T12:36:39.947000
|
||||
CVE-2024-7060,0,0,2e0c92013c1ddde1bca0ad9e62aa50d23e69e1a598796a2170f54fccf61e7f4b,2024-07-25T12:36:39.947000
|
||||
CVE-2024-7061,0,0,686447eb073761a4f06d26ef5139931ec89b27cf41fe306832f1b298f86de885,2024-08-07T19:09:46.290000
|
||||
CVE-2024-7061,0,1,c3926c914ac99fe62f5bebfc1891b2d96043768b2289b704236ec0dafd824355,2024-08-28T18:25:38.217000
|
||||
CVE-2024-7062,0,0,95520405d89c9e85e2e20b19a5c4882dbc79fcc2537e689d2c94915f74a470cf,2024-08-27T14:00:21.543000
|
||||
CVE-2024-7063,0,0,0d05b5614f7552a1191547d1c63e6af55c9bef6fb9e919ea51ef069e5df2841d,2024-08-15T13:01:10.150000
|
||||
CVE-2024-7064,0,0,5f6dedf11b173ba1a8a6a366c520a45122cad062892b1564ebd329daa4d14d92,2024-08-15T13:01:10.150000
|
||||
@ -261047,8 +261053,8 @@ CVE-2024-7569,0,0,07c556a0d4f236c73af8fac785c7f2963a3da01e4fc90b977a8fbdbb989590
|
||||
CVE-2024-7570,0,0,5fffab459f0b197c9cc8f01b0f615f787054152c65ebadc4d4a680afc4fd51fa,2024-08-14T02:07:05.410000
|
||||
CVE-2024-7573,0,0,7b157c1bc586485011758f6317cb8548eaad83544501bf2e76c604287d08292a,2024-08-28T12:57:27.610000
|
||||
CVE-2024-7574,0,0,20d9970481b83bc1831e248b5fd88e17f245f697fcf3310f9ca87d287eec943e,2024-08-12T13:41:36.517000
|
||||
CVE-2024-7578,0,0,6775b71bfb147f33ac75e26864dff0d49501fe87846b04dfe823255ec77604d5,2024-08-07T15:17:46.717000
|
||||
CVE-2024-7579,0,0,889817c5384ba36003787d6aa90c4889164dbbf7f4fbfe5c6f0287e20d3cf6ed,2024-08-07T15:17:46.717000
|
||||
CVE-2024-7578,0,1,fafe75f6c08f3db49e42d74dbc7c12d20ded3ec028530cd367a8cd3d9bc7695e,2024-08-28T18:27:18.510000
|
||||
CVE-2024-7579,0,1,a0ae8fffc497f7c325419faf1d1612b2d58409c260f2e266adab0d394e09c9de,2024-08-28T18:26:46.117000
|
||||
CVE-2024-7580,0,0,42ecba325b4da39abdd4ffa702c3c1ac9ada1ac7a2f4a8a88b82d9e7776d5322,2024-08-07T20:47:00.277000
|
||||
CVE-2024-7581,0,0,f07aa40688c73c9e33d119ea47382f8f327c1f1763032f4818fad72345e632d2,2024-08-07T19:59:00.853000
|
||||
CVE-2024-7582,0,0,b5d30de3379d4f1314d865a318bcbb3d58683288c246ed462b10743522033514,2024-08-08T20:55:07.530000
|
||||
@ -261148,8 +261154,8 @@ CVE-2024-7740,0,0,b6b97e22b2a1c91ed733b5ea0db90c7ca386835aea8a2536d78b137aa899a0
|
||||
CVE-2024-7741,0,0,451b4501bfecb549fed2131350eefedffb5605095818bbd2dc73e6ce30b3b5e5,2024-08-21T19:07:40.757000
|
||||
CVE-2024-7742,0,0,5026e5c91e6d01ca137577cf715447f5db3eb9e4e96b1b8aca8896a09ee6d170,2024-08-21T19:08:47.707000
|
||||
CVE-2024-7743,0,0,c910ec910e11d4c23506ee8328b07eddb255cd4474ff1acb5544c0f61f82b883,2024-08-21T19:15:54.553000
|
||||
CVE-2024-7744,1,1,1c24802daeb8a1a916eb67627cef6aecd8c9091c1618d772795e5ffee13a4e0c,2024-08-28T17:15:11.380000
|
||||
CVE-2024-7745,1,1,e29f9de33b3b1e8fe4a25f6826bc4f6300a7deaa8241cd630860c39d845a5db0,2024-08-28T17:15:11.593000
|
||||
CVE-2024-7744,0,0,1c24802daeb8a1a916eb67627cef6aecd8c9091c1618d772795e5ffee13a4e0c,2024-08-28T17:15:11.380000
|
||||
CVE-2024-7745,0,0,e29f9de33b3b1e8fe4a25f6826bc4f6300a7deaa8241cd630860c39d845a5db0,2024-08-28T17:15:11.593000
|
||||
CVE-2024-7746,0,0,41ddc83547faacdfc7eb4febb4b7b289d12121016bfc1367db838e5c1dc32e37,2024-08-22T14:40:44.167000
|
||||
CVE-2024-7748,0,0,19a9780c8c3e3580e0507d6a06dfe151328aa44e58ebe3ad1d40e684712edce7,2024-08-15T17:22:53.340000
|
||||
CVE-2024-7749,0,0,b1dd92bb0312fc7ae82ed3bd4baca9ef6dbf65c2cbb7e0f4fc4cc1353892f66e,2024-08-15T17:23:28.410000
|
||||
@ -261248,8 +261254,8 @@ CVE-2024-7934,0,0,378bcc55a3df62e429d1f101d54479de592e8336c09692e7e3a6942b8872bb
|
||||
CVE-2024-7935,0,0,de5faf49db18a7840e6f8ddda5ba5a34ca6452592345acf93a6a1be43f2a05c7,2024-08-23T19:52:06.570000
|
||||
CVE-2024-7936,0,0,cf4365fe1d0752346fd362041feab4848729c5ce67cb542c05b95010d5242c1e,2024-08-20T15:44:20.567000
|
||||
CVE-2024-7937,0,0,bfd626110b4738097d3eecc17d410635b5492a7f6c8b4af76523530d264a7d87,2024-08-20T15:44:20.567000
|
||||
CVE-2024-7940,0,1,dbd0239c121d6194e450c1260a59c9e5a29e98f7339f7b43ef0e94924bfd60bf,2024-08-28T16:24:07.043000
|
||||
CVE-2024-7941,0,1,f84a573c5184fa9f02bbf2be035433cf04406330bf9f18b5c31c6f416d5532c2,2024-08-28T16:09:03.693000
|
||||
CVE-2024-7940,0,0,dbd0239c121d6194e450c1260a59c9e5a29e98f7339f7b43ef0e94924bfd60bf,2024-08-28T16:24:07.043000
|
||||
CVE-2024-7941,0,0,f84a573c5184fa9f02bbf2be035433cf04406330bf9f18b5c31c6f416d5532c2,2024-08-28T16:09:03.693000
|
||||
CVE-2024-7942,0,0,5b31cb5e8458774e5fec47eb01ab09f3b7e76a9f352de27f599173dde8e64b06,2024-08-20T15:44:20.567000
|
||||
CVE-2024-7943,0,0,84fd281936993964831a8456f79f6df290184647869e7054aff52b4493acaea1,2024-08-20T15:44:20.567000
|
||||
CVE-2024-7944,0,0,746f5ab96ce75fa2f3ceb934a195b4543f73936672a5c19d615f70b88c853fd7,2024-08-21T15:24:44.280000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user