mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-08 11:37:26 +00:00
Auto-Update: 2024-10-11T20:00:17.844245+00:00
This commit is contained in:
parent
e0381cdc9f
commit
4ecf9f90c1
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-25108",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-02-12T20:15:08.590",
|
||||
"lastModified": "2024-02-12T20:39:09.773",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-11T19:31:20.060",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -41,8 +61,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -59,14 +89,40 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:pixelfed:pixelfed:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "0.10.4",
|
||||
"versionEndExcluding": "0.11.11",
|
||||
"matchCriteriaId": "FDC53226-FCCF-443B-8300-3450616781B2"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/pixelfed/pixelfed/commit/7e47d6dccb0393a2e95c42813c562c854882b037",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/pixelfed/pixelfed/security/advisories/GHSA-gccq-h3xj-jgvf",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-25122",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-02-13T19:15:11.357",
|
||||
"lastModified": "2024-02-13T19:45:42.327",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-11T19:15:51.707",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -41,7 +61,7 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
@ -49,16 +69,58 @@
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mhenrixon:sidekiq-unique-jobs:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "7.1.33",
|
||||
"matchCriteriaId": "C67DE7A3-6B7C-4508-8D33-2A0DD8AF4533"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mhenrixon:sidekiq-unique-jobs:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.0.0",
|
||||
"versionEndExcluding": "8.0.7",
|
||||
"matchCriteriaId": "37AA85C7-F423-4C52-A639-7E3FF13F47AD"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/mhenrixon/sidekiq-unique-jobs/commit/ec3afd920c1b55843c72f748a87baac7f8be82ed",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/mhenrixon/sidekiq-unique-jobs/security/advisories/GHSA-cmh9-rx85-xj38",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-441xx/CVE-2024-44157.json
Normal file
25
CVE-2024/CVE-2024-441xx/CVE-2024-44157.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-44157",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-10-11T18:15:08.030",
|
||||
"lastModified": "2024-10-11T18:15:08.030",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A stack buffer overflow was addressed through improved input validation. This issue is fixed in Apple TV 1.5.0.152 for Windows, iTunes 12.13.3 for Windows. Parsing a maliciously crafted video file may lead to unexpected system termination."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/121328",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/121441",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
41
CVE-2024/CVE-2024-448xx/CVE-2024-44807.json
Normal file
41
CVE-2024/CVE-2024-448xx/CVE-2024-44807.json
Normal file
@ -0,0 +1,41 @@
|
||||
{
|
||||
"id": "CVE-2024-44807",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-11T18:15:08.133",
|
||||
"lastModified": "2024-10-11T18:15:08.133",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A directory listing issue in the baserCMS plugin in D-ZERO CO., LTD. BurgerEditor and BurgerEditor Limited Edition before 2.25.1 allows remote attackers to obtain sensitive information by exposing a list of the uploaded files."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://basercms.com",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://burgereditor.com",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://burger.d-zero.co.jp/blogs/archives/2",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://jvn.jp/en/jp/JVN54676967/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://jvn.jp/jp/JVN54676967/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000109.html",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2024/CVE-2024-465xx/CVE-2024-46532.json
Normal file
29
CVE-2024/CVE-2024-465xx/CVE-2024-46532.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2024-46532",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-11T18:15:08.267",
|
||||
"lastModified": "2024-10-11T18:15:08.267",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SQL Injection vulnerability in OpenHIS v.1.0 allows an attacker to execute arbitrary code via the refund function in the PayController.class.php component."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://openhis.com",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/1638824607/OpenHIS?tab=readme-ov-file",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/KamenRiderDarker/CVE-2024-46532/tree/main/README.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-47161",
|
||||
"sourceIdentifier": "cve@jetbrains.com",
|
||||
"published": "2024-10-08T16:15:12.147",
|
||||
"lastModified": "2024-10-10T12:56:30.817",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-11T19:54:07.317",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "cve@jetbrains.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:jetbrains:teamcity:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "2024.07.3",
|
||||
"matchCriteriaId": "2D9ABC27-D1C3-4CF8-8478-851D09096DA6"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
|
||||
"source": "cve@jetbrains.com"
|
||||
"source": "cve@jetbrains.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-473xx/CVE-2024-47331.json
Normal file
56
CVE-2024/CVE-2024-473xx/CVE-2024-47331.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-47331",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-10-11T19:15:09.783",
|
||||
"lastModified": "2024-10-11T19:15:09.783",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in NinjaTeam Multi Step for Contact Form allows SQL Injection.This issue affects Multi Step for Contact Form: from n/a through 2.7.7."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 9.3,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 4.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/cf7-multi-step/wordpress-multi-step-for-contact-form-plugin-2-7-7-unauthenticated-sql-injection-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-473xx/CVE-2024-47353.json
Normal file
56
CVE-2024/CVE-2024-473xx/CVE-2024-47353.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-47353",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-10-11T19:15:10.003",
|
||||
"lastModified": "2024-10-11T19:15:10.003",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "URL Redirection to Untrusted Site ('Open Redirect') vulnerability in QuomodoSoft ElementsReady Addons for Elementor.This issue affects ElementsReady Addons for Elementor: from n/a through 6.4.2."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-601"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/element-ready-lite/wordpress-elementsready-addons-for-elementor-plugin-6-4-2-open-redirection-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-47948",
|
||||
"sourceIdentifier": "cve@jetbrains.com",
|
||||
"published": "2024-10-08T16:15:12.453",
|
||||
"lastModified": "2024-10-10T12:56:30.817",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-11T19:56:44.863",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "cve@jetbrains.com",
|
||||
"type": "Secondary",
|
||||
@ -41,8 +61,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve@jetbrains.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "cve@jetbrains.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -51,10 +81,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:jetbrains:teamcity:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "2024.07.3",
|
||||
"matchCriteriaId": "2D9ABC27-D1C3-4CF8-8478-851D09096DA6"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
|
||||
"source": "cve@jetbrains.com"
|
||||
"source": "cve@jetbrains.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-47949",
|
||||
"sourceIdentifier": "cve@jetbrains.com",
|
||||
"published": "2024-10-08T16:15:12.673",
|
||||
"lastModified": "2024-10-10T12:56:30.817",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-11T19:57:06.207",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "cve@jetbrains.com",
|
||||
"type": "Secondary",
|
||||
@ -41,8 +61,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve@jetbrains.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "cve@jetbrains.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -51,10 +81,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:jetbrains:teamcity:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "2024.07.3",
|
||||
"matchCriteriaId": "2D9ABC27-D1C3-4CF8-8478-851D09096DA6"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
|
||||
"source": "cve@jetbrains.com"
|
||||
"source": "cve@jetbrains.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-47950",
|
||||
"sourceIdentifier": "cve@jetbrains.com",
|
||||
"published": "2024-10-08T16:15:12.963",
|
||||
"lastModified": "2024-10-10T12:56:30.817",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-11T19:57:16.883",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "cve@jetbrains.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:jetbrains:teamcity:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "2024.07.03",
|
||||
"matchCriteriaId": "34F8B9FA-0A63-4219-82C9-8449A60A3A41"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
|
||||
"source": "cve@jetbrains.com"
|
||||
"source": "cve@jetbrains.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-47951",
|
||||
"sourceIdentifier": "cve@jetbrains.com",
|
||||
"published": "2024-10-08T16:15:13.190",
|
||||
"lastModified": "2024-10-10T12:56:30.817",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-11T19:57:58.937",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "cve@jetbrains.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:jetbrains:teamcity:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "2024.07.3",
|
||||
"matchCriteriaId": "2D9ABC27-D1C3-4CF8-8478-851D09096DA6"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
|
||||
"source": "cve@jetbrains.com"
|
||||
"source": "cve@jetbrains.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-480xx/CVE-2024-48020.json
Normal file
56
CVE-2024/CVE-2024-480xx/CVE-2024-48020.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-48020",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-10-11T19:15:10.220",
|
||||
"lastModified": "2024-10-11T19:15:10.220",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Revmakx Backup and Staging by WP Time Capsule allows SQL Injection.This issue affects Backup and Staging by WP Time Capsule: from n/a through 1.22.21."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 8.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 4.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/wp-time-capsule/wordpress-backup-and-staging-by-wp-time-capsule-plugin-1-22-21-sql-injection-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-480xx/CVE-2024-48033.json
Normal file
56
CVE-2024/CVE-2024-480xx/CVE-2024-48033.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-48033",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-10-11T19:15:10.430",
|
||||
"lastModified": "2024-10-11T19:15:10.430",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Deserialization of Untrusted Data vulnerability in Elie Burstein, Baptiste Gourdin Talkback allows Object Injection.This issue affects Talkback: from n/a through 1.0."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-502"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/talkback-secure-linkback-protocol/wordpress-talkback-plugin-1-0-php-object-injection-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-480xx/CVE-2024-48040.json
Normal file
56
CVE-2024/CVE-2024-480xx/CVE-2024-48040.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-48040",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-10-11T19:15:10.660",
|
||||
"lastModified": "2024-10-11T19:15:10.660",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Tainacan.Org Tainacan allows SQL Injection.This issue affects Tainacan: from n/a through 0.21.8."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 8.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 4.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/tainacan/wordpress-tainacan-plugin-0-21-8-sql-injection-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-480xx/CVE-2024-48041.json
Normal file
56
CVE-2024/CVE-2024-480xx/CVE-2024-48041.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-48041",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-10-11T19:15:10.880",
|
||||
"lastModified": "2024-10-11T19:15:10.880",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in CreativeMindsSolutions CM Tooltip Glossary allows Stored XSS.This issue affects CM Tooltip Glossary: from n/a through 4.3.9."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/enhanced-tooltipglossary/wordpress-cm-tooltip-glossary-plugin-4-3-9-privilege-escalation-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-48941",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-10T00:15:02.673",
|
||||
"lastModified": "2024-10-10T12:51:56.987",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-10-11T19:06:20.467",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,11 +15,79 @@
|
||||
"value": "El complemento Syracom Secure Login (2FA) para Jira, Confluence y Bitbucket hasta la versi\u00f3n 3.1.4.5 permite a atacantes remotos eludir la 2FA al interactuar con el endpoint /rest de Jira, Confluence o Bitbucket. En la configuraci\u00f3n predeterminada, /rest est\u00e1 en la lista de permitidos."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:syracom:secure_login:*:*:*:*:*:bitbucket:*:*",
|
||||
"versionEndIncluding": "3.1.4.5",
|
||||
"matchCriteriaId": "E7C683F9-246C-4A56-B040-41336473F74E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:syracom:secure_login:*:*:*:*:*:confluence:*:*",
|
||||
"versionEndIncluding": "3.1.4.5",
|
||||
"matchCriteriaId": "4FF3E0D2-BE95-4AE2-8CAB-B50E49E8727F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:syracom:secure_login:*:*:*:*:*:jira:*:*",
|
||||
"versionEndIncluding": "3.1.4.5",
|
||||
"matchCriteriaId": "07B7C7EC-A4E5-47E7-9640-6E34C0B492C1"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://syracom-bee.atlassian.net/wiki/spaces/SL/pages/3236560898/2024-09-16+-+Secure+Login+security+advisory+-+Insecure+default+configuration",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-48942",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-10T00:15:02.737",
|
||||
"lastModified": "2024-10-10T12:51:56.987",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-10-11T19:10:20.137",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,11 +15,79 @@
|
||||
"value": "El complemento Syracom Secure Login (2FA) para Jira, Confluence y Bitbucket hasta la versi\u00f3n 3.1.4.5 permite a atacantes remotos acceder f\u00e1cilmente por fuerza bruta al PIN de 2FA a trav\u00e9s del punto de conexi\u00f3n plugins/servlet/twofactor/public/pinvalidation. Los \u00faltimos 30 tokens y los siguientes 30 son v\u00e1lidos."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:syracom:secure_login:*:*:*:*:*:bitbucket:*:*",
|
||||
"versionEndIncluding": "3.1.4.5",
|
||||
"matchCriteriaId": "E7C683F9-246C-4A56-B040-41336473F74E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:syracom:secure_login:*:*:*:*:*:confluence:*:*",
|
||||
"versionEndIncluding": "3.1.4.5",
|
||||
"matchCriteriaId": "4FF3E0D2-BE95-4AE2-8CAB-B50E49E8727F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:syracom:secure_login:*:*:*:*:*:jira:*:*",
|
||||
"versionEndIncluding": "3.1.4.5",
|
||||
"matchCriteriaId": "07B7C7EC-A4E5-47E7-9640-6E34C0B492C1"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://syracom-bee.atlassian.net/wiki/spaces/SL/pages/3236560898/2024-09-16+-+Secure+Login+security+advisory+-+Insecure+default+configuration",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
78
CVE-2024/CVE-2024-89xx/CVE-2024-8912.json
Normal file
78
CVE-2024/CVE-2024-89xx/CVE-2024-8912.json
Normal file
@ -0,0 +1,78 @@
|
||||
{
|
||||
"id": "CVE-2024-8912",
|
||||
"sourceIdentifier": "cve-coordination@google.com",
|
||||
"published": "2024-10-11T19:15:11.110",
|
||||
"lastModified": "2024-10-11T19:15:11.110",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An HTTP Request Smuggling vulnerability in Looker allowed an unauthorized attacker to capture HTTP responses destined for legitimate users.\n\nThere are two Looker versions that are hosted by Looker:\n\n * Looker (Google Cloud core) was found to be vulnerable. This issue has already been mitigated and our investigation has found no signs of exploitation.\n * Looker (original) was not vulnerable to this issue.\n\n\nCustomer-hosted Looker instances were found to be vulnerable and must be upgraded.\n\nThis vulnerability has been patched in all supported versions of customer-hosted Looker, which are available on the Looker download page https://download.looker.com/ .\n\nFor Looker customer-hosted instances, please update to the latest supported version of Looker as soon as possible. The versions below have all been updated to protect from this vulnerability. You can download these versions at the Looker download page:\n\n * 23.12 -> 23.12.123+\n * 23.18 -> 23.18.117+\n * 24.0 -> 24.0.92+\n * 24.6 -> 24.6.77+\n * 24.8 -> 24.8.66+\n * 24.10 -> 24.10.78+\n * 24.12 -> 24.12.56+\n * 24.14 -> 24.14.37+"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cve-coordination@google.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "PRESENT",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "HIGH",
|
||||
"vulnerableSystemIntegrity": "NONE",
|
||||
"vulnerableSystemAvailability": "NONE",
|
||||
"subsequentSystemConfidentiality": "HIGH",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 8.9,
|
||||
"baseSeverity": "HIGH"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve-coordination@google.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-444"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cloud.google.com/looker/docs/best-practices/security-bulletin-09-16-24",
|
||||
"source": "cve-coordination@google.com"
|
||||
}
|
||||
]
|
||||
}
|
90
CVE-2024/CVE-2024-95xx/CVE-2024-9539.json
Normal file
90
CVE-2024/CVE-2024-95xx/CVE-2024-9539.json
Normal file
@ -0,0 +1,90 @@
|
||||
{
|
||||
"id": "CVE-2024-9539",
|
||||
"sourceIdentifier": "product-cna@github.com",
|
||||
"published": "2024-10-11T18:15:08.887",
|
||||
"lastModified": "2024-10-11T18:15:08.887",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An information disclosure vulnerability was identified in GitHub Enterprise Server via attacker uploaded asset URL allowing the attacker to retrieve metadata information of a user who clicks on the URL and further exploit it to create a convincing phishing page. This required the attacker to upload malicious SVG files and phish a victim user to click on that uploaded asset URL. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.14 and was fixed in versions 3.14.2, 3.13.5, 3.12.10, 3.11.16. This vulnerability was reported via the GitHub Bug Bounty program."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "product-cna@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:A/VC:H/VI:N/VA:N/SC:L/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"attackRequirements": "PRESENT",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "ACTIVE",
|
||||
"vulnerableSystemConfidentiality": "HIGH",
|
||||
"vulnerableSystemIntegrity": "NONE",
|
||||
"vulnerableSystemAvailability": "NONE",
|
||||
"subsequentSystemConfidentiality": "LOW",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 5.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "product-cna@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://docs.github.com/en/enterprise-server@3.11/admin/release-notes#3.11.16",
|
||||
"source": "product-cna@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://docs.github.com/en/enterprise-server@3.12/admin/release-notes#3.12.10",
|
||||
"source": "product-cna@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://docs.github.com/en/enterprise-server@3.13/admin/release-notes#3.13.5",
|
||||
"source": "product-cna@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://docs.github.com/en/enterprise-server@3.14/admin/release-notes#3.14.2",
|
||||
"source": "product-cna@github.com"
|
||||
}
|
||||
]
|
||||
}
|
66
README.md
66
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-10-11T18:00:18.031450+00:00
|
||||
2024-10-11T20:00:17.844245+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-10-11T17:15:04.677000+00:00
|
||||
2024-10-11T19:57:58.937000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,55 +33,39 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
265385
|
||||
265396
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `53`
|
||||
Recently added CVEs: `11`
|
||||
|
||||
- [CVE-2024-47491](CVE-2024/CVE-2024-474xx/CVE-2024-47491.json) (`2024-10-11T16:15:09.060`)
|
||||
- [CVE-2024-47493](CVE-2024/CVE-2024-474xx/CVE-2024-47493.json) (`2024-10-11T16:15:09.320`)
|
||||
- [CVE-2024-47494](CVE-2024/CVE-2024-474xx/CVE-2024-47494.json) (`2024-10-11T16:15:09.580`)
|
||||
- [CVE-2024-47495](CVE-2024/CVE-2024-474xx/CVE-2024-47495.json) (`2024-10-11T16:15:09.830`)
|
||||
- [CVE-2024-47496](CVE-2024/CVE-2024-474xx/CVE-2024-47496.json) (`2024-10-11T16:15:10.080`)
|
||||
- [CVE-2024-47497](CVE-2024/CVE-2024-474xx/CVE-2024-47497.json) (`2024-10-11T16:15:10.340`)
|
||||
- [CVE-2024-47498](CVE-2024/CVE-2024-474xx/CVE-2024-47498.json) (`2024-10-11T16:15:10.590`)
|
||||
- [CVE-2024-47499](CVE-2024/CVE-2024-474xx/CVE-2024-47499.json) (`2024-10-11T16:15:10.850`)
|
||||
- [CVE-2024-47501](CVE-2024/CVE-2024-475xx/CVE-2024-47501.json) (`2024-10-11T16:15:11.167`)
|
||||
- [CVE-2024-47502](CVE-2024/CVE-2024-475xx/CVE-2024-47502.json) (`2024-10-11T16:15:11.413`)
|
||||
- [CVE-2024-47503](CVE-2024/CVE-2024-475xx/CVE-2024-47503.json) (`2024-10-11T16:15:11.663`)
|
||||
- [CVE-2024-47504](CVE-2024/CVE-2024-475xx/CVE-2024-47504.json) (`2024-10-11T16:15:11.900`)
|
||||
- [CVE-2024-47505](CVE-2024/CVE-2024-475xx/CVE-2024-47505.json) (`2024-10-11T16:15:12.210`)
|
||||
- [CVE-2024-47506](CVE-2024/CVE-2024-475xx/CVE-2024-47506.json) (`2024-10-11T16:15:12.450`)
|
||||
- [CVE-2024-47507](CVE-2024/CVE-2024-475xx/CVE-2024-47507.json) (`2024-10-11T16:15:12.700`)
|
||||
- [CVE-2024-47508](CVE-2024/CVE-2024-475xx/CVE-2024-47508.json) (`2024-10-11T16:15:12.957`)
|
||||
- [CVE-2024-47509](CVE-2024/CVE-2024-475xx/CVE-2024-47509.json) (`2024-10-11T16:15:13.187`)
|
||||
- [CVE-2024-47877](CVE-2024/CVE-2024-478xx/CVE-2024-47877.json) (`2024-10-11T17:15:04.450`)
|
||||
- [CVE-2024-48813](CVE-2024/CVE-2024-488xx/CVE-2024-48813.json) (`2024-10-11T16:15:13.453`)
|
||||
- [CVE-2024-48827](CVE-2024/CVE-2024-488xx/CVE-2024-48827.json) (`2024-10-11T16:15:13.550`)
|
||||
- [CVE-2024-5474](CVE-2024/CVE-2024-54xx/CVE-2024-5474.json) (`2024-10-11T16:15:14.440`)
|
||||
- [CVE-2024-6985](CVE-2024/CVE-2024-69xx/CVE-2024-6985.json) (`2024-10-11T16:15:14.657`)
|
||||
- [CVE-2024-8376](CVE-2024/CVE-2024-83xx/CVE-2024-8376.json) (`2024-10-11T16:15:14.860`)
|
||||
- [CVE-2024-9046](CVE-2024/CVE-2024-90xx/CVE-2024-9046.json) (`2024-10-11T16:15:15.000`)
|
||||
- [CVE-2024-9859](CVE-2024/CVE-2024-98xx/CVE-2024-9859.json) (`2024-10-11T17:15:04.677`)
|
||||
- [CVE-2024-44157](CVE-2024/CVE-2024-441xx/CVE-2024-44157.json) (`2024-10-11T18:15:08.030`)
|
||||
- [CVE-2024-44807](CVE-2024/CVE-2024-448xx/CVE-2024-44807.json) (`2024-10-11T18:15:08.133`)
|
||||
- [CVE-2024-46532](CVE-2024/CVE-2024-465xx/CVE-2024-46532.json) (`2024-10-11T18:15:08.267`)
|
||||
- [CVE-2024-47331](CVE-2024/CVE-2024-473xx/CVE-2024-47331.json) (`2024-10-11T19:15:09.783`)
|
||||
- [CVE-2024-47353](CVE-2024/CVE-2024-473xx/CVE-2024-47353.json) (`2024-10-11T19:15:10.003`)
|
||||
- [CVE-2024-48020](CVE-2024/CVE-2024-480xx/CVE-2024-48020.json) (`2024-10-11T19:15:10.220`)
|
||||
- [CVE-2024-48033](CVE-2024/CVE-2024-480xx/CVE-2024-48033.json) (`2024-10-11T19:15:10.430`)
|
||||
- [CVE-2024-48040](CVE-2024/CVE-2024-480xx/CVE-2024-48040.json) (`2024-10-11T19:15:10.660`)
|
||||
- [CVE-2024-48041](CVE-2024/CVE-2024-480xx/CVE-2024-48041.json) (`2024-10-11T19:15:10.880`)
|
||||
- [CVE-2024-8912](CVE-2024/CVE-2024-89xx/CVE-2024-8912.json) (`2024-10-11T19:15:11.110`)
|
||||
- [CVE-2024-9539](CVE-2024/CVE-2024-95xx/CVE-2024-9539.json) (`2024-10-11T18:15:08.887`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `11`
|
||||
Recently modified CVEs: `9`
|
||||
|
||||
- [CVE-2017-1000082](CVE-2017/CVE-2017-10000xx/CVE-2017-1000082.json) (`2024-10-11T16:41:37.950`)
|
||||
- [CVE-2022-26878](CVE-2022/CVE-2022-268xx/CVE-2022-26878.json) (`2024-10-11T16:59:30.173`)
|
||||
- [CVE-2023-6228](CVE-2023/CVE-2023-62xx/CVE-2023-6228.json) (`2024-10-11T16:15:04.823`)
|
||||
- [CVE-2024-23806](CVE-2024/CVE-2024-238xx/CVE-2024-23806.json) (`2024-10-11T16:15:05.087`)
|
||||
- [CVE-2024-44400](CVE-2024/CVE-2024-444xx/CVE-2024-44400.json) (`2024-10-11T17:15:03.670`)
|
||||
- [CVE-2024-48957](CVE-2024/CVE-2024-489xx/CVE-2024-48957.json) (`2024-10-11T16:12:54.243`)
|
||||
- [CVE-2024-48958](CVE-2024/CVE-2024-489xx/CVE-2024-48958.json) (`2024-10-11T16:11:55.487`)
|
||||
- [CVE-2024-9393](CVE-2024/CVE-2024-93xx/CVE-2024-9393.json) (`2024-10-11T16:07:50.900`)
|
||||
- [CVE-2024-9394](CVE-2024/CVE-2024-93xx/CVE-2024-9394.json) (`2024-10-11T16:08:21.067`)
|
||||
- [CVE-2024-9397](CVE-2024/CVE-2024-93xx/CVE-2024-9397.json) (`2024-10-11T16:07:56.577`)
|
||||
- [CVE-2024-9398](CVE-2024/CVE-2024-93xx/CVE-2024-9398.json) (`2024-10-11T16:08:14.577`)
|
||||
- [CVE-2024-25108](CVE-2024/CVE-2024-251xx/CVE-2024-25108.json) (`2024-10-11T19:31:20.060`)
|
||||
- [CVE-2024-25122](CVE-2024/CVE-2024-251xx/CVE-2024-25122.json) (`2024-10-11T19:15:51.707`)
|
||||
- [CVE-2024-47161](CVE-2024/CVE-2024-471xx/CVE-2024-47161.json) (`2024-10-11T19:54:07.317`)
|
||||
- [CVE-2024-47948](CVE-2024/CVE-2024-479xx/CVE-2024-47948.json) (`2024-10-11T19:56:44.863`)
|
||||
- [CVE-2024-47949](CVE-2024/CVE-2024-479xx/CVE-2024-47949.json) (`2024-10-11T19:57:06.207`)
|
||||
- [CVE-2024-47950](CVE-2024/CVE-2024-479xx/CVE-2024-47950.json) (`2024-10-11T19:57:16.883`)
|
||||
- [CVE-2024-47951](CVE-2024/CVE-2024-479xx/CVE-2024-47951.json) (`2024-10-11T19:57:58.937`)
|
||||
- [CVE-2024-48941](CVE-2024/CVE-2024-489xx/CVE-2024-48941.json) (`2024-10-11T19:06:20.467`)
|
||||
- [CVE-2024-48942](CVE-2024/CVE-2024-489xx/CVE-2024-48942.json) (`2024-10-11T19:10:20.137`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
157
_state.csv
157
_state.csv
@ -93750,7 +93750,7 @@ CVE-2017-1000078,0,0,f359db7df43f28fe29cb4207b69fdf3ae08b7e36aa1b1c1f19ac97604d6
|
||||
CVE-2017-1000079,0,0,441188c065d4b4a011dc37c8c609874f046c6d5f4b7d0d91042ef99081cee231,2020-12-07T20:05:11.020000
|
||||
CVE-2017-1000080,0,0,c6402b4e2a7f5110e4c33fa92c713bb524e16906511ebcb12405c3b4c5fb4545,2020-12-07T20:05:58.020000
|
||||
CVE-2017-1000081,0,0,9e2f16da8413d7336f33fdddad79ff33f64c48188afd1df72b2577012e350727,2020-12-07T20:06:22.427000
|
||||
CVE-2017-1000082,0,1,a4c055477b449ab4fe316e3e35c4a7e2da06f2b67fac33b8f2801e34496f7598,2024-10-11T16:41:37.950000
|
||||
CVE-2017-1000082,0,0,a4c055477b449ab4fe316e3e35c4a7e2da06f2b67fac33b8f2801e34496f7598,2024-10-11T16:41:37.950000
|
||||
CVE-2017-1000083,0,0,6083a2dfe35de4701d0f1b42ca137909058cd64cc055e5cf654243e30e384250,2019-10-03T00:03:26.223000
|
||||
CVE-2017-1000084,0,0,98aebcca2434713d3a80445b6b6c1b4124e5508e9a597023ca06b252659cf0e1,2019-10-03T00:03:26.223000
|
||||
CVE-2017-1000085,0,0,435e2597fcecfc2a21e2f1f1afcea438f8bd5c6b89f8a3a5080e88cb94747351,2017-11-02T16:06:34.887000
|
||||
@ -195578,7 +195578,7 @@ CVE-2022-26872,0,0,c45a359c56c396764fb77c329cb6a0b63e5a380d85976680253c888cd3726
|
||||
CVE-2022-26873,0,0,b96f2a37297299b1e53daca25babf170bc42afa6e64b0a44310052644dcf34b0,2022-09-26T13:49:57.823000
|
||||
CVE-2022-26874,0,0,5f642b251b58d590ad32bf7b55132d91e6f0c837e648e2792d0f7d2af7b2529d,2022-10-14T12:44:33.543000
|
||||
CVE-2022-26877,0,0,de58995a14de9dca908f125c51317493cf012e58ed7ee0cdb9c3646425c498ef,2022-04-14T19:19:54.890000
|
||||
CVE-2022-26878,0,1,57baa3c5e7d01f578c7d59483a81ee65e6cb1e3214a72011d7683d804db4e189,2024-10-11T16:59:30.173000
|
||||
CVE-2022-26878,0,0,57baa3c5e7d01f578c7d59483a81ee65e6cb1e3214a72011d7683d804db4e189,2024-10-11T16:59:30.173000
|
||||
CVE-2022-2688,0,0,3284222b2ddeb7ae1e8a2fbbad3368fe2e2a99e29f20a1fdf4e7472d33a14267,2022-08-11T14:21:56.753000
|
||||
CVE-2022-26884,0,0,c227de89577e8f58082c7f343458078b04c6273262c0a6f34361b953b8466b42,2022-10-31T19:12:20.770000
|
||||
CVE-2022-26885,0,0,a4433c6e2fd5fb1ed1a52407caca75e17845ca47a61161810f58a667401e59a0,2023-08-08T14:22:24.967000
|
||||
@ -240337,7 +240337,7 @@ CVE-2023-6222,0,0,10ca719d6241a16d7a4af8b329be1dd72f36fa6eed5abc1684e0c343746dec
|
||||
CVE-2023-6223,0,0,4c9b2542ca6b96527ce1674814817a12c2ec6aea5a47819cd008b4689fedf8b6,2024-01-16T23:57:09.203000
|
||||
CVE-2023-6225,0,0,0c86f4bab68c98d520a08014c346b76b2f8114c74cf49363651f75a1c6d9db83,2023-12-04T15:10:44.187000
|
||||
CVE-2023-6226,0,0,1ad7582028a7ede50c5087c41c65f6f45601471c7c6fb9032c7165ecbe8ae9e2,2023-12-04T18:58:04.080000
|
||||
CVE-2023-6228,0,1,8636a9ca7230d12fdac424e291c8d6ccb47f3b90230ebd9670fdc59ad6d45b0b,2024-10-11T16:15:04.823000
|
||||
CVE-2023-6228,0,0,8636a9ca7230d12fdac424e291c8d6ccb47f3b90230ebd9670fdc59ad6d45b0b,2024-10-11T16:15:04.823000
|
||||
CVE-2023-6229,0,0,7a6877e6cd0a9e063fa3581cd9f67f5d9697e49714cb139584c502ef6e2c8c2b,2024-02-13T19:52:17.627000
|
||||
CVE-2023-6230,0,0,1c25ac356a7a646e0aefd3c71b6602874991a31b3b6a98b5ce144fde5f22a911,2024-02-13T19:52:11.940000
|
||||
CVE-2023-6231,0,0,6f4f7c52e38ce2ead3d4741dc9795843d5cdf706b9ffdd4922f210546c5d7d5f,2024-02-13T19:52:04.103000
|
||||
@ -245835,7 +245835,7 @@ CVE-2024-23802,0,0,81ec59be7b57b56010aae8a00a50785b4cae392063ce6ae45e9bdc96725d8
|
||||
CVE-2024-23803,0,0,acb079a869ba69b5fa9517baa83702edab7124f6e966e5bed18b9f9c193b59a3,2024-02-15T04:36:17.560000
|
||||
CVE-2024-23804,0,0,7277bdccb9bc646fb902ff98c0c67e6ba4574dcc991595c5d6ee5434140321d4,2024-02-15T04:36:11.463000
|
||||
CVE-2024-23805,0,0,5f26e955a2557d4c816d3384b83559235e768aa9a9c3cad2b60c3a7d1b3514a2,2024-02-14T18:04:45.380000
|
||||
CVE-2024-23806,0,1,4f2ac18c723097dbf24606103a980ce63d05979ed7f3d82691c8f3714561bd2b,2024-10-11T16:15:05.087000
|
||||
CVE-2024-23806,0,0,4f2ac18c723097dbf24606103a980ce63d05979ed7f3d82691c8f3714561bd2b,2024-10-11T16:15:05.087000
|
||||
CVE-2024-23807,0,0,984c8ec132fb9b34a66f1a6b18d86d01b97fb3adc24cfd01ea198f14feb9f784,2024-08-01T13:47:20.360000
|
||||
CVE-2024-23808,0,0,14e0c0844d35fca6b59513ca1c1b2a1154f1a862633ac35af1f74037de9e88e0,2024-05-07T13:39:32.710000
|
||||
CVE-2024-23809,0,0,8c1e9b945a93ac6e01dcce0462ab4df31dc74ec41362c54c0e6e8a37cf3dbf20,2024-04-02T15:15:53.217000
|
||||
@ -246645,7 +246645,7 @@ CVE-2024-25102,0,0,133268ffc984c42d69b4bf70a18b06bfa00e6f9b1a6b7979b0b7751daa3af
|
||||
CVE-2024-25103,0,0,bc16d0a18e5413d69ce0cfa7d659612fbf4d905c382e53747393112e47b23dfa,2024-09-23T12:15:03.290000
|
||||
CVE-2024-25106,0,0,69f4a5df8f9163ba3cc00a57d78f06705015dcf6a2341378521404b16f38f37b,2024-02-15T18:53:44.707000
|
||||
CVE-2024-25107,0,0,2f7af5f36b252a42eb30d1f8972da5732bf420e322522d60adcccf7f4819b86a,2024-02-15T18:52:25.613000
|
||||
CVE-2024-25108,0,0,fa8f6505be74e625097fa9ac671379105ef64ceb1fabbff12fb823c3e033b607,2024-02-12T20:39:09.773000
|
||||
CVE-2024-25108,0,1,ea86aeb46132d1436758572e531bfe9d096e1704148614890b5ee2b811e5154b,2024-10-11T19:31:20.060000
|
||||
CVE-2024-25109,0,0,c41f7e7a8b0352e7db5bd3620b2014d3afb64c0a666c2f8d504ee8ea7a10e96b,2024-09-05T13:18:39.687000
|
||||
CVE-2024-2511,0,0,e85e202ac0d96bf0165ada9b88f1fcf9a6fbf365413ed057ebdfaf286537c656,2024-05-03T13:15:21.930000
|
||||
CVE-2024-25110,0,0,2ad123d5329d817891e8dc3bae18c16385186216cc417eebddd2d60d9619e7fe,2024-02-12T20:39:09.773000
|
||||
@ -246660,7 +246660,7 @@ CVE-2024-25118,0,0,5a5d87ec39b0263d610d121aff303a2a887b58fc2c2bb0cb82e45c6c39356
|
||||
CVE-2024-25119,0,0,e00eb90c0e2b5f9ee441104e8a867af994d0038db78cdde9e1777dc983844f96,2024-02-14T13:59:35.580000
|
||||
CVE-2024-25120,0,0,22ab495202da9a816053ab6e8432de07c3fd99eeec113249a77e5d6da094b853,2024-02-14T13:59:35.580000
|
||||
CVE-2024-25121,0,0,b0d544a773d2eed790454c3855c0d500355e4c566f69865a021ff361b9749a9b,2024-02-14T13:59:35.580000
|
||||
CVE-2024-25122,0,0,be1fd017bcc516065a5a5ed45f48f4e84580bc723edfd73f500be919497b5036,2024-02-13T19:45:42.327000
|
||||
CVE-2024-25122,0,1,e365e28bb2f56caaa3ef9b80a1cc325b36fe31e51625a47d99ef7167fe1c5bf2,2024-10-11T19:15:51.707000
|
||||
CVE-2024-25123,0,0,d91338db3ed95b8913dc378067e1f32dfba4b3ec82603f1ac01d187651acb75a,2024-02-16T13:38:00.047000
|
||||
CVE-2024-25124,0,0,d570849c8f0f5f2638ea1dc3ea0947e3bcb6425f6af78c4802a7a9fc8debac63,2024-02-22T19:07:27.197000
|
||||
CVE-2024-25125,0,0,e8d3e2301ada9acbf67deee26992ba22f050532192238294c0e8c4b124dd2615,2024-02-14T13:59:35.580000
|
||||
@ -252830,12 +252830,12 @@ CVE-2024-33574,0,0,fc0d46b6052dd50132e8c494ba6e5e246282e5f24b82957996e49ca052563
|
||||
CVE-2024-33575,0,0,6a75bb9bdd105f2786ec0ae657e4af1bf461cec4cfee8d43e8f3d7320405726c,2024-04-29T12:42:03.667000
|
||||
CVE-2024-33576,0,0,94aae9ee2f0c33dcb6f6efff3d9d5ea4ef9ca359d6b87f7a468dec43b642bb3f,2024-05-07T13:39:32.710000
|
||||
CVE-2024-33577,0,0,aa1fe480f03b15b5790c3fe3746d5e0b22858ec01ccebcd9fc758219d9e476bc,2024-07-09T12:15:13.437000
|
||||
CVE-2024-33578,1,1,ff9a2c95d4feb0ae70c6d5cce551ebbc3dbf0a382ff1d756901e0bf7e3c43a14,2024-10-11T16:15:05.277000
|
||||
CVE-2024-33579,1,1,d086f107803b11a086e850badbc4a051f2a8e14fbc3c3449ceac2caa07c393f1,2024-10-11T16:15:05.523000
|
||||
CVE-2024-33578,0,0,ff9a2c95d4feb0ae70c6d5cce551ebbc3dbf0a382ff1d756901e0bf7e3c43a14,2024-10-11T16:15:05.277000
|
||||
CVE-2024-33579,0,0,d086f107803b11a086e850badbc4a051f2a8e14fbc3c3449ceac2caa07c393f1,2024-10-11T16:15:05.523000
|
||||
CVE-2024-3358,0,0,23527163c1f6e0e94b0385ffe56587c3bd4a94e2413e00c71a4ba5f8a69e7bad,2024-05-17T02:39:52.340000
|
||||
CVE-2024-33580,1,1,9f2a3b6bcf81be4de421cb75b205020698133f5e942ecbea64a5beecd6be7d9f,2024-10-11T16:15:05.730000
|
||||
CVE-2024-33581,1,1,ebb03f3bf5d0d72a973ecd6345cb597b9535f5d409856fe127487de929eb6186,2024-10-11T16:15:05.943000
|
||||
CVE-2024-33582,1,1,e40406303f562aaae495610a8d9feda7203ae75a97c2f2562bd95ecf9a8ffcde,2024-10-11T16:15:06.147000
|
||||
CVE-2024-33580,0,0,9f2a3b6bcf81be4de421cb75b205020698133f5e942ecbea64a5beecd6be7d9f,2024-10-11T16:15:05.730000
|
||||
CVE-2024-33581,0,0,ebb03f3bf5d0d72a973ecd6345cb597b9535f5d409856fe127487de929eb6186,2024-10-11T16:15:05.943000
|
||||
CVE-2024-33582,0,0,e40406303f562aaae495610a8d9feda7203ae75a97c2f2562bd95ecf9a8ffcde,2024-10-11T16:15:06.147000
|
||||
CVE-2024-33583,0,0,38272dcd4c11b3ceb59d346922b95e7d819f9730abaa6f62d3bb43a2c2f1f72f,2024-06-11T12:15:16.220000
|
||||
CVE-2024-33584,0,0,3bb5bf6abdca2bf5d5334941cdf5ce6c6206e90c8384d56ad541db48f2bfd2e2,2024-04-29T12:42:03.667000
|
||||
CVE-2024-33585,0,0,3c777c6a9b9a4a2e67efd6f7841cfd33983939bdb79e8fad41b131b2d622243e,2024-04-30T13:11:16.690000
|
||||
@ -257056,15 +257056,15 @@ CVE-2024-39522,0,0,b66709e6535a7cdadc12e252ab229dc8e8aef04f48261d0268655457d17fa
|
||||
CVE-2024-39523,0,0,a3811f47c02311cb1b3e9c779434ecc435f3ef774dbaecf23095150720747474,2024-09-23T13:41:41.567000
|
||||
CVE-2024-39524,0,0,f81747ca72ff72ed34e537ded9b51c09a5f97f91401f1ade11ec10102c46443b,2024-09-23T13:42:49.947000
|
||||
CVE-2024-39525,0,0,d775dd232fca82d89a27908f99c7ab9fcee2b3e4a09a48f8a86e162a59a4cd74,2024-10-10T12:51:56.987000
|
||||
CVE-2024-39526,1,1,e24e07695772824ae2947ac316ca5cb88441fec6694d5014cb866c5eabe1ecf6,2024-10-11T16:15:06.440000
|
||||
CVE-2024-39527,1,1,e8f0c6d34f46b9a4a2767c72bccf6729487307c7aa9dbb80f33738f44307b174,2024-10-11T16:15:06.707000
|
||||
CVE-2024-39526,0,0,e24e07695772824ae2947ac316ca5cb88441fec6694d5014cb866c5eabe1ecf6,2024-10-11T16:15:06.440000
|
||||
CVE-2024-39527,0,0,e8f0c6d34f46b9a4a2767c72bccf6729487307c7aa9dbb80f33738f44307b174,2024-10-11T16:15:06.707000
|
||||
CVE-2024-39528,0,0,e38a4ee98e70571927c02a6972041282f229d4485e62ff8801fae59946fb79e3,2024-09-23T14:01:41.367000
|
||||
CVE-2024-39529,0,0,00f43e2c27d890f4599c7f0b79b4f6e627b99f8bce970eddcf5a09f2b2c7a075,2024-09-23T14:08:47.240000
|
||||
CVE-2024-39530,0,0,1c9b47723a95ee2e38c28a71dbdfbc0698029b0ae899f35456744c3d18947342,2024-09-23T14:13:14.507000
|
||||
CVE-2024-39531,0,0,8b14b9ed4e884f3f41331eddcb8409f2e477ec19086cf663db8016dae35a5ed5,2024-07-11T18:09:58.777000
|
||||
CVE-2024-39532,0,0,9e2f90de2b6756658f7c58bd14832ce3e9b82ec713cc3bcefd6d19325399f7bc,2024-07-11T18:09:58.777000
|
||||
CVE-2024-39533,0,0,e6c26263dc6a9a850b1bca40535a85280c37c6059ff56ee0dc8524a61354db40,2024-07-11T18:09:58.777000
|
||||
CVE-2024-39534,1,1,85f3ed898312cca90321477173a295a54fd8ccd1a248a0590df6b91d9bcde0cb,2024-10-11T16:15:06.970000
|
||||
CVE-2024-39534,0,0,85f3ed898312cca90321477173a295a54fd8ccd1a248a0590df6b91d9bcde0cb,2024-10-11T16:15:06.970000
|
||||
CVE-2024-39535,0,0,83b12ccf84942d42e34000d1d8fe739916dabf0e1193a243a1f5f9242bfde519,2024-07-11T18:09:58.777000
|
||||
CVE-2024-39536,0,0,fcedd5a4fda577505833805e7e4997c8473247086d79366725456756ee1a42c8,2024-07-12T15:15:11.040000
|
||||
CVE-2024-39537,0,0,2402364b51defda98213c86ffffe14a816de6c89624e0dba8c995959e18bbb67,2024-07-11T18:09:58.777000
|
||||
@ -257075,10 +257075,10 @@ CVE-2024-39540,0,0,be0d416d14fb6707481af829a3c595b98223f4ff2afe56ae608c0f2f113c5
|
||||
CVE-2024-39541,0,0,2c2065cc472b958869a59744fd25c5b1d10d8a3e999984d3fe7f8909dda21c0b,2024-07-11T18:09:58.777000
|
||||
CVE-2024-39542,0,0,a20b733120c9407fac7cfbf8a11db6e6be29fbe8139b8b0238845f4359f20a12,2024-07-12T16:11:52.420000
|
||||
CVE-2024-39543,0,0,aaaad3e02df0b0d6d56ce697644f4ead0224422eef8d860010b2b8a0e7c3b779,2024-07-11T18:09:58.777000
|
||||
CVE-2024-39544,1,1,e67a5470e5baeb2bcc59640c1c904b4a74c11180f78c6e04a7362c515eac41c0,2024-10-11T16:15:07.240000
|
||||
CVE-2024-39544,0,0,e67a5470e5baeb2bcc59640c1c904b4a74c11180f78c6e04a7362c515eac41c0,2024-10-11T16:15:07.240000
|
||||
CVE-2024-39545,0,0,1eb5c972b938ca677d55ad154dd167ed070fc69afd56e645990ea5adac9fd888,2024-07-11T18:09:58.777000
|
||||
CVE-2024-39546,0,0,e16dcfa4fc66ceb6eb147443dbf92ba41be6e9e538dcfdb9345e3a289eefbf1c,2024-07-12T16:11:53.397000
|
||||
CVE-2024-39547,1,1,1fa8faf13c1e73e82c112b5dac3fd568c65ce819724267b4d6568a0c720bd9a7,2024-10-11T16:15:07.483000
|
||||
CVE-2024-39547,0,0,1fa8faf13c1e73e82c112b5dac3fd568c65ce819724267b4d6568a0c720bd9a7,2024-10-11T16:15:07.483000
|
||||
CVE-2024-39548,0,0,f508a41c267f71c0128d6c49ba38f3ffa926a8d4647ec725429fd94a8d643cbd,2024-07-11T18:09:58.777000
|
||||
CVE-2024-39549,0,0,dcfe0b098a69d3d25bd93373dc59a343ea9177e8f9ca55cd75f53b1d197ea475,2024-10-02T22:15:02.533000
|
||||
CVE-2024-3955,0,0,1980afc805b9b5d168ea6a08c34d1a9d581fd505fecdd9c097016e585c054b35,2024-07-03T02:06:56.087000
|
||||
@ -257096,7 +257096,7 @@ CVE-2024-3956,0,0,a3cb09bf1f28d977327946dc32f9ea686f27cbe51075fc0453b6840e64eb9d
|
||||
CVE-2024-39560,0,0,23f69d2135add515835b57e80ed861f5b71ea1c4537140e0184db49c17a20902,2024-10-01T20:15:05.170000
|
||||
CVE-2024-39561,0,0,2d6669fd46e5f06a296436c07948ef96b496b18cd802d54459b89b3379cbcb51,2024-07-11T13:05:54.930000
|
||||
CVE-2024-39562,0,0,e28be33d8ed9a3514708585e09c3a2a79edf6f92ad582e3763ed1e2ed2b7847b,2024-07-11T13:05:54.930000
|
||||
CVE-2024-39563,1,1,f785c5da4ce5fdb70b21df661dc4ad07e4508fbca67fc337a09ff141d3e2a43f,2024-10-11T16:15:07.740000
|
||||
CVE-2024-39563,0,0,f785c5da4ce5fdb70b21df661dc4ad07e4508fbca67fc337a09ff141d3e2a43f,2024-10-11T16:15:07.740000
|
||||
CVE-2024-39565,0,0,67e95ad66ccb875a343c94a008ae24e95d194b8d007cd8f237d44ba36352b116,2024-07-11T13:05:54.930000
|
||||
CVE-2024-39567,0,0,4a57ded9184af902b793d10964e38343dbe75d3e891132b111e62e60ba12ed7c,2024-07-09T18:19:14.047000
|
||||
CVE-2024-39568,0,0,f8994573b47195905c9ccbf8be81e7fc1ac765b7d83d3cc49f6dd1813186217f,2024-09-06T21:26:14.400000
|
||||
@ -257762,7 +257762,7 @@ CVE-2024-4088,0,0,61cc31924b86843bbd20c326ef7465dc1aa394b548458b2e1a9fc62c09ede6
|
||||
CVE-2024-40883,0,0,8855b9ba6890db3f512189380b135e2bd398db6f2ac8377c169993238c8e17e7,2024-09-26T05:15:11.973000
|
||||
CVE-2024-40884,0,0,c8797b81ca17f130e9b15061a257e8838b29d835c417f35d4ed5fe661f9275fc,2024-08-23T16:18:28.547000
|
||||
CVE-2024-40886,0,0,366f3546e42ed526b269e117ba5fde90b643767db321194ac7a300a3dda42364,2024-08-23T16:09:31.887000
|
||||
CVE-2024-4089,1,1,5c937f455213a850bbd3c1f9200144ba3ce7ed0d658b961e7847711b4f044541,2024-10-11T16:15:13.633000
|
||||
CVE-2024-4089,0,0,5c937f455213a850bbd3c1f9200144ba3ce7ed0d658b961e7847711b4f044541,2024-10-11T16:15:13.633000
|
||||
CVE-2024-40892,0,0,80f2c69eafcb531435cc671447d237ff8792f374d8c58f10182688d813811ab4,2024-08-21T18:15:09.710000
|
||||
CVE-2024-40893,0,0,3220dba971e1861a31a0659deabcf8dc81ec736d5ed6a5b82a9eb1d0c8650fcc,2024-08-21T18:15:09.803000
|
||||
CVE-2024-40895,0,0,8c1e79c4f9b4c4aa0a454566e9355d762509535d530511413d5b712e02da1fc1,2024-08-01T13:58:15.617000
|
||||
@ -258085,12 +258085,12 @@ CVE-2024-41281,0,0,acd5274a5314a460f4482234d2c8af8da53f6324e375946a6feb8a82983d1
|
||||
CVE-2024-41285,0,0,f9d8e2fe08b82d3f5c7f4ac42e37bd0268ac10deb583909c52659b72a2361eca,2024-08-27T16:03:16.043000
|
||||
CVE-2024-4129,0,0,f2fba94e29dd925b8a56a23f2711717731ea628ca4457222b442fc21c3f8c80a,2024-05-14T16:11:39.510000
|
||||
CVE-2024-41290,0,0,c49f8cd5603807c9b54528f3054e83df63373e1eca850d7e76d84e26592de69d,2024-10-04T13:50:43.727000
|
||||
CVE-2024-4130,1,1,2f47f7439ca290ef13cfb454941d3fbce6eeb562f898a226accf73d9e3dc0108,2024-10-11T16:15:13.840000
|
||||
CVE-2024-4130,0,0,2f47f7439ca290ef13cfb454941d3fbce6eeb562f898a226accf73d9e3dc0108,2024-10-11T16:15:13.840000
|
||||
CVE-2024-41304,0,0,97c8e67643f8470191a2e05ce641725b816a8cc5ff59a9e38a00154810fc7f9e,2024-08-23T16:35:06.883000
|
||||
CVE-2024-41305,0,0,44375e3d9aedae768570d453a5746b314221c07760efe679991b65a52a72cbb1,2024-08-08T14:36:06.423000
|
||||
CVE-2024-41308,0,0,0cfb1f5a539d1b3ab56fa248bc4e6b56744120f3ffd7eb646c940bb1f8d27a55,2024-08-08T15:04:28.510000
|
||||
CVE-2024-41309,0,0,b9bc578a75924505757e6c223f9b414f575de364b8af8a3b843d1bd2707bdb26,2024-08-08T15:35:19.553000
|
||||
CVE-2024-4131,1,1,cf19987c1526c38802b5baddc10395ed1c5bf282cc2b3c098f087ba13906bc4b,2024-10-11T16:15:14.050000
|
||||
CVE-2024-4131,0,0,cf19987c1526c38802b5baddc10395ed1c5bf282cc2b3c098f087ba13906bc4b,2024-10-11T16:15:14.050000
|
||||
CVE-2024-41310,0,0,dab67ac1aeab1ffb95f812e4938961307c6ce203d52330d45800d09dd75058c0,2024-08-28T17:42:01.190000
|
||||
CVE-2024-41314,0,0,db53d1cfc39af554879f83e26dbe36479a0a26172379fc4a043735d6cb186ac0,2024-08-01T13:58:28.057000
|
||||
CVE-2024-41315,0,0,2d4182edc23b3ca5f23da4066941e10349788ef80e0dc9d84cb1c30a4edf0d37,2024-08-01T13:58:28.840000
|
||||
@ -258098,7 +258098,7 @@ CVE-2024-41316,0,0,fdd83ec8e5f08975a0e0f1c308e905edc7588e4137c92360541a6835aa02f
|
||||
CVE-2024-41317,0,0,52395d4b73d1f3333bd86d331ce69b48cfe0221d866f68e6f5d1a7dd650e810d,2024-08-01T13:58:30.410000
|
||||
CVE-2024-41318,0,0,9b1c1d0472f281a532ac7cd9f50c0be0ec0f55b0327046bb10ee1709062e9e40,2024-08-01T13:58:31.180000
|
||||
CVE-2024-41319,0,0,1899a3684e8a27d8d6402d107bc11ca910ee14276fc605936dd401557907d526,2024-08-01T13:58:31.957000
|
||||
CVE-2024-4132,1,1,85cbee6170a9ca4792c56240782c4771addca3acda0c50c5f1d7c9c598148d99,2024-10-11T16:15:14.243000
|
||||
CVE-2024-4132,0,0,85cbee6170a9ca4792c56240782c4771addca3acda0c50c5f1d7c9c598148d99,2024-10-11T16:15:14.243000
|
||||
CVE-2024-41320,0,0,6629b2c1bbc9cd1b160b7b0f9c935334633b6b47708e3a65ad0ff69abde9e8ce,2024-08-01T13:58:32.723000
|
||||
CVE-2024-4133,0,0,809a3aebbf4e63405fb2f0740c9908f3dfcf1d711b93379e5d465ea9e56d3cba,2024-05-02T18:00:37.360000
|
||||
CVE-2024-41332,0,0,0c297902d1fd2e33f0ac4f9fcf27ea849083281238ee0df040d97531f7646dbb,2024-08-21T18:53:15.927000
|
||||
@ -258499,7 +258499,7 @@ CVE-2024-42009,0,0,8775464dacf05b07f164d9bf135cafdb2ba4b40a363a5d9db69127bd2ae3f
|
||||
CVE-2024-4201,0,0,ee0badf63a3e9c653031fb01c45e3bab9160ffb251dc5a875d128957347bb089,2024-07-18T19:39:50.667000
|
||||
CVE-2024-42010,0,0,f347d4c1e17b119f6d9851ca0a7b1b017e286c890135bf10b6afdc7ab31c6734,2024-08-12T14:15:07.370000
|
||||
CVE-2024-42017,0,0,7f9a4913b1239026519e3fb7d6fc6d114e8e4e346f101e97cc1469132655da88,2024-10-04T13:51:25.567000
|
||||
CVE-2024-42018,1,1,ed031212f83e34a8c531eee2c5ca50b726abe310c71af7d547da2b7a4be172f5,2024-10-11T17:15:03.573000
|
||||
CVE-2024-42018,0,0,ed031212f83e34a8c531eee2c5ca50b726abe310c71af7d547da2b7a4be172f5,2024-10-11T17:15:03.573000
|
||||
CVE-2024-42019,0,0,00604c99ddf544da3b62d7a84887b798a81cb0c15ced1dcc5fdbfa92f5dd8022,2024-09-09T17:35:05.247000
|
||||
CVE-2024-4202,0,0,614a40ef1052d861451b397b9533024f5e9aecccff7f20e945fab06926a9f188,2024-05-15T18:35:11.453000
|
||||
CVE-2024-42020,0,0,37c4c1406166ec6fd5ab227fac5e61169cbd195ea42942d8bd175d493c4f9eb1,2024-09-09T13:03:38.303000
|
||||
@ -259001,7 +259001,7 @@ CVE-2024-42637,0,0,91efd00f3a0c93af0bfc6d360416502bb044589161185dddb1564bcf24f65
|
||||
CVE-2024-42638,0,0,f05422802d125b3ce266da31a9abfdc3602d6bb3aba7eee20387c1a0cbe79fd0,2024-09-11T12:53:03.987000
|
||||
CVE-2024-42639,0,0,1a5c2259211b7b8d7a3c9ad7a85700d339edaffc744195b682680689ea5c39c4,2024-08-19T18:35:13.310000
|
||||
CVE-2024-4264,0,0,aceade487dcdf82d5a23a178a070b3c07d4cce69337175854977fa24341a320c,2024-05-20T13:00:34.807000
|
||||
CVE-2024-42640,1,1,43bf314c049537d4f45fb4b911ed2d057757762fd4c0b2ab5961911c22291a33,2024-10-11T16:15:08.040000
|
||||
CVE-2024-42640,0,0,43bf314c049537d4f45fb4b911ed2d057757762fd4c0b2ab5961911c22291a33,2024-10-11T16:15:08.040000
|
||||
CVE-2024-42642,0,0,368dc5dc34a16a5f055bfb8f43121adeaf05034c9b1b73657cc5e8228e1781ec,2024-09-10T13:46:25.733000
|
||||
CVE-2024-4265,0,0,674cb78ce8c95e07c05495b52772b5d4a079c608362a6e67c2dfb567e6b8517a,2024-05-02T18:00:37.360000
|
||||
CVE-2024-42657,0,0,7a9e5456dd66d94be3a75e811d67a1de5788317e788930f1ba2e8b5887d23144,2024-08-20T16:13:12.413000
|
||||
@ -259956,6 +259956,7 @@ CVE-2024-44151,0,0,54a719217bc8b8ee4e32503231faaae29cd72902e5e2fca3e1446643fb218
|
||||
CVE-2024-44152,0,0,b3dfe3e6aad4927c4120819b90ad93e4589e439a4acd3f9652fbd2503123fc62,2024-09-24T15:55:06.100000
|
||||
CVE-2024-44153,0,0,b4cd2fe3eed07a503bba11676bf795575e23a0692dcefb729ec0053f448cf187,2024-09-24T16:19:32.593000
|
||||
CVE-2024-44154,0,0,52420e716bdaf0c7fece3d5feef7b52e02f0f1fb32372b8f2d13dde79a13206d,2024-09-24T16:16:39.947000
|
||||
CVE-2024-44157,1,1,a28989cfff089fdc5c64928ba655211032121c3d0b825d46ac43db40236fab2c,2024-10-11T18:15:08.030000
|
||||
CVE-2024-44158,0,0,9d7e2fa5cd578734634a4ad7f07935a9c77533bae7cbf9b59ee2c2f082d12524,2024-09-24T15:50:25.083000
|
||||
CVE-2024-44160,0,0,111306ea6d5f4cd614ad1f97ebba8b9ebd1a48c26d38996100c4c5802f2b5bd6,2024-09-20T12:31:20.110000
|
||||
CVE-2024-44161,0,0,7c1aadaed2bcadc65ac3b4a310e13a88d0da6d821bc96d21705d61516e8bb478,2024-09-26T13:56:51.110000
|
||||
@ -260025,16 +260026,16 @@ CVE-2024-44387,0,0,f40bbfc4dd5c4303dcc7ceb337218443a73c6de292a9dc96408915cc8c9cb
|
||||
CVE-2024-4439,0,0,18d544a04352d4558f54a1793cd800ab605d9132c8464460d2f7ebbde183ef12,2024-07-03T02:07:34.593000
|
||||
CVE-2024-44390,0,0,6367b383b322d2f53bd8e6d4e8d76904ca1c75a20fddee8fd1295aedac6b8243,2024-08-27T14:48:18.393000
|
||||
CVE-2024-4440,0,0,32e49728cdc055a1dbfbd90b8e03664859c56d56e36afdc46644ff6b145c71da,2024-05-14T19:17:55.627000
|
||||
CVE-2024-44400,0,1,af9cb380c617801801b04ecd079877ac00cc016336484debaa9d48d7389e097b,2024-10-11T17:15:03.670000
|
||||
CVE-2024-44400,0,0,af9cb380c617801801b04ecd079877ac00cc016336484debaa9d48d7389e097b,2024-10-11T17:15:03.670000
|
||||
CVE-2024-44401,0,0,2f36533a57388286555f9f485bd7670fff32aaf299129a39b7844538812793db,2024-09-12T16:09:45.050000
|
||||
CVE-2024-44402,0,0,d4acc0243f99ebb558313eb78384bfd5d19c34bc0f46a33cc4ea78c414c927b9,2024-09-10T16:58:57.847000
|
||||
CVE-2024-44408,0,0,bceaf662d92e59640c5be45332f34cf4bf71aab9d4c102f8b4268d666b8b75b2,2024-09-10T17:01:55.630000
|
||||
CVE-2024-4441,0,0,ac0779300bad801b6c25a6a11418596c16f707acafd8505b85edf037d6de9dc4,2024-05-14T16:11:39.510000
|
||||
CVE-2024-44410,0,0,6c57a9bf372d97a29932dc411b42421130ab7221dd0f704bdc840e2d9eac456c,2024-09-10T19:00:29.527000
|
||||
CVE-2024-44411,0,0,598fa2c90c1fcb2e76dc9bbaf4d1053ce6ab00db76daa7f3174af16794b4965c,2024-09-10T14:35:06.690000
|
||||
CVE-2024-44413,1,1,98007b7f42bd9dd2b67db2d4d0a20a162d5bedc49eb5cd3230e65681cbeadef2,2024-10-11T17:15:03.790000
|
||||
CVE-2024-44414,1,1,39bbf18b52ff5a48ec3b4c759e29fd689c05910ff0a09f7c07e099969f878cdb,2024-10-11T17:15:03.880000
|
||||
CVE-2024-44415,1,1,ad755f39731002ab77617b43d94507b284d67e3ad7779c6cd8a779e287ac63c0,2024-10-11T17:15:03.967000
|
||||
CVE-2024-44413,0,0,98007b7f42bd9dd2b67db2d4d0a20a162d5bedc49eb5cd3230e65681cbeadef2,2024-10-11T17:15:03.790000
|
||||
CVE-2024-44414,0,0,39bbf18b52ff5a48ec3b4c759e29fd689c05910ff0a09f7c07e099969f878cdb,2024-10-11T17:15:03.880000
|
||||
CVE-2024-44415,0,0,ad755f39731002ab77617b43d94507b284d67e3ad7779c6cd8a779e287ac63c0,2024-10-11T17:15:03.967000
|
||||
CVE-2024-4442,0,0,9c1eda6fa3435f8c4d08218c5481ff931fe1467531bf106c3f2c1021638ef5a8,2024-05-21T12:37:59.687000
|
||||
CVE-2024-4443,0,0,844cc6ae76fc91b0a9b2c7cc836e7c7382ecc4895f252d76709d68a22aac17cb,2024-05-22T12:46:53.887000
|
||||
CVE-2024-44430,0,0,f640e237da24007d6a0c1a8b89d52bdbc13fc34691f8dcc93f05041c29090cb1,2024-09-19T01:38:06.317000
|
||||
@ -260113,11 +260114,11 @@ CVE-2024-44724,0,0,8275388c9a55c7b39cc91e96ee195961c5f04dd9487a0f8921294249f0634
|
||||
CVE-2024-44725,0,0,a55d2d013099f06bab136286a0540186f6f582fe646bcd5f9a3d4c9c9074736c,2024-09-10T12:09:50.377000
|
||||
CVE-2024-44727,0,0,519c6edd63986291fddd28777499b5bf49fa3688edaaf8c8b5736fac2c095d2c,2024-09-06T13:15:09.567000
|
||||
CVE-2024-44728,0,0,cb7a7604dfcd48f9cda73a0c69d9a24576616f565cbb7b44a1dd956c1a2540eb,2024-09-06T13:23:23.743000
|
||||
CVE-2024-44729,1,1,3dcf77781f61f4cbdf84dc014570b01dd5649b4d221ac540d450428ff4e45bdb,2024-10-11T16:15:08.150000
|
||||
CVE-2024-44729,0,0,3dcf77781f61f4cbdf84dc014570b01dd5649b4d221ac540d450428ff4e45bdb,2024-10-11T16:15:08.150000
|
||||
CVE-2024-4473,0,0,8a0cf4a98efdbfb5770862e11c920028f2e3a9a43c44eb843685fb5ef0c3f72b,2024-05-14T19:17:55.627000
|
||||
CVE-2024-44730,1,1,bb569c89296a90bc7c7ad7e7a6a55009f8bd0bf9a4fd1a58d711d12d3039cc27,2024-10-11T16:15:08.250000
|
||||
CVE-2024-44731,1,1,8f32c47f12795de1bbfcd47f4c68f72cda0ed66965511dcb203c578a657a9f5e,2024-10-11T17:15:04.080000
|
||||
CVE-2024-44734,1,1,ae2abe4d6b083ab9918eabee5329e8d275cafa6899dc9e8104664bdd5793b739,2024-10-11T17:15:04.157000
|
||||
CVE-2024-44730,0,0,bb569c89296a90bc7c7ad7e7a6a55009f8bd0bf9a4fd1a58d711d12d3039cc27,2024-10-11T16:15:08.250000
|
||||
CVE-2024-44731,0,0,8f32c47f12795de1bbfcd47f4c68f72cda0ed66965511dcb203c578a657a9f5e,2024-10-11T17:15:04.080000
|
||||
CVE-2024-44734,0,0,ae2abe4d6b083ab9918eabee5329e8d275cafa6899dc9e8104664bdd5793b739,2024-10-11T17:15:04.157000
|
||||
CVE-2024-44739,0,0,48da2c283a8d53275b8fef0ca13127577bd8ad3471472700794962cf357a3ab6,2024-09-06T16:46:47.907000
|
||||
CVE-2024-4474,0,0,f8c1a36ad14efe96f98dae06e1720ed737c744e50cd9a9e3991eaed9f98aef96,2024-07-17T02:48:04.213000
|
||||
CVE-2024-44744,0,0,83942cbf0bc52b807dc374447d58331fdab7ca8540cec1aa4efb11011d74c6f7,2024-10-04T20:15:07.203000
|
||||
@ -260138,6 +260139,7 @@ CVE-2024-44796,0,0,2932c57e25f9e35c74ce36b128d46acb3231e7bd610d9d98769e690ee695d
|
||||
CVE-2024-44797,0,0,045624a726ff5e1b8db30d7af17e11b2221f6b7d4bdca61ca2fe7511b3f6e808,2024-09-06T22:27:16.177000
|
||||
CVE-2024-44798,0,0,52c8ec12ad71f918e4568fe73d09fd21beb43d7a2334844f4fb68f12913c2757,2024-09-16T13:19:38.393000
|
||||
CVE-2024-4480,0,0,046ee1f51773a8c0ac4a6c81ddd78c147b0ada165d730df7b9b8d85146172347,2024-06-17T12:42:04.623000
|
||||
CVE-2024-44807,1,1,810975d199c77bf9871ff49351113ab0bf71110290c932592e13dd1febb2d984,2024-10-11T18:15:08.133000
|
||||
CVE-2024-44808,0,0,53ee5f88da9d15aa3ffd696fc5703153aab92dbb219aaccde4dc48186abdbb68,2024-09-05T12:53:21.110000
|
||||
CVE-2024-44809,0,0,424c650381a963ac60378eaa5a7cd36fd86829e33f994f3d0227dc416ec44e82,2024-09-04T14:35:12.707000
|
||||
CVE-2024-4481,0,0,c2852db732c7c65c13524ea22e5406663429c55dff3bfe0d5bbffa299f48bbd3,2024-05-14T16:11:39.510000
|
||||
@ -260832,7 +260834,7 @@ CVE-2024-46083,0,0,73f6a059a5ba6bc696db7247d8909675528ea79771aa3e324116789f85257
|
||||
CVE-2024-46084,0,0,b76e6b13523e15b76b374f65868a92b58cdd010c840abd828b2c93c894b78869,2024-10-04T13:50:43.727000
|
||||
CVE-2024-46085,0,0,c40bf34999e41384db415b4f8361df5bc1a972c059bfcf483e35e9bef50d8457,2024-09-20T12:30:51.220000
|
||||
CVE-2024-46086,0,0,504c7f52322e487d2224c0cc449e69a05fcab67f7a93912f7189c1bccd5d3802,2024-09-25T17:08:41.937000
|
||||
CVE-2024-46088,1,1,8f412cc2c1eb899e794bb30fcae9111259ad7d234fc9926143ae8d038968838c,2024-10-11T16:15:08.357000
|
||||
CVE-2024-46088,0,0,8f412cc2c1eb899e794bb30fcae9111259ad7d234fc9926143ae8d038968838c,2024-10-11T16:15:08.357000
|
||||
CVE-2024-4609,0,0,b6f3fd3db9085553e8d026a562774e21d6dc7bb2eb7a9a6cfeb43138546783c0,2024-05-17T18:36:31.297000
|
||||
CVE-2024-46097,0,0,512a1e36bd43b76dc23993f25084db214121a78b92f1064375f403c11dada0c4,2024-09-30T12:45:57.823000
|
||||
CVE-2024-4610,0,0,43047990281e26a04055de4ace6574603f0b08f61a7727d9acdec64f6d8d9784,2024-08-14T17:06:24.800000
|
||||
@ -260848,7 +260850,7 @@ CVE-2024-4618,0,0,c37ae26f2e1f44a703054cee4816ca3bf0ad845eefa4a632c5bbef4a4e755f
|
||||
CVE-2024-4619,0,0,4a40c989d02466215a13e8ebc90eedd665aa01db8dc0a625ac187e77f54f90ad,2024-05-21T12:37:59.687000
|
||||
CVE-2024-4620,0,0,1935a4a456c9356aa20baa9af9ee846c5d3912db31523d71d257746ce19dd702,2024-07-12T16:12:03.980000
|
||||
CVE-2024-4621,0,0,2ba6d981e4d5b6f91910837209ceaa779e2d1828d6d78fc3d542c33aa869820e,2024-07-03T02:07:50.963000
|
||||
CVE-2024-46215,1,1,0edb1c764d687d6040f8379d963624cdf40d57ffe4221c99522530dbb9fe9b8e,2024-10-11T17:15:04.260000
|
||||
CVE-2024-46215,0,0,0edb1c764d687d6040f8379d963624cdf40d57ffe4221c99522530dbb9fe9b8e,2024-10-11T17:15:04.260000
|
||||
CVE-2024-4622,0,0,7ee7f5b0dbbae0efd9526a317b5150a2af537411986feb7d056b697fe5fc8d53,2024-05-15T18:35:11.453000
|
||||
CVE-2024-4623,0,0,c53a127683caa8cc49c11a88cc217ef787af901116f1ba89c4741730eb1cc926,2024-06-20T12:44:01.637000
|
||||
CVE-2024-46237,0,0,feed7929a18595e09a4a774d6fced2d5d91ecf51e22b0c549b82335a7c6407dd,2024-10-10T12:51:56.987000
|
||||
@ -260937,6 +260939,7 @@ CVE-2024-46510,0,0,bb46a7737029f26392a246097a18ec9ca317101031432da9b686fbbec181f
|
||||
CVE-2024-46511,0,0,78cf785de24718da0c0ea71257e191470c834e4be61ca79ad4d72c264c3c4729,2024-10-04T13:51:25.567000
|
||||
CVE-2024-4652,0,0,8fd7af949b4c89aa1e5f9f8bc7784e47292323116a1f6a56ecb880f3c410a541,2024-06-04T19:20:44.873000
|
||||
CVE-2024-4653,0,0,7b6d5c0913690c5b51d844fc9718b4208eaa5f352f244fd41eee7be1add5e3bc,2024-06-04T19:20:44.990000
|
||||
CVE-2024-46532,1,1,3cc4b0eac6406170fdb3268901170209dd1adc3b3b14e5bfd21137ddfc4e89d7,2024-10-11T18:15:08.267000
|
||||
CVE-2024-46539,0,0,2d2c57643421ecf3202df41ca86f61b87e91435ec045a273724c1fd7bed0cf14,2024-10-10T12:56:30.817000
|
||||
CVE-2024-4654,0,0,0088d34096b2578204ff98fe71c1f702e4c8866653411407f72fe940a56448df,2024-06-04T19:20:45.100000
|
||||
CVE-2024-46540,0,0,82bd73e280c5a23d3b35406dd5a042ddc542cc53d99831f15d05d7d862ed5067,2024-10-04T13:51:25.567000
|
||||
@ -261345,7 +261348,7 @@ CVE-2024-4715,0,0,8280b54df57d141f79c5c5ba7edbd4b8610f06a30ecbd5ba39cd6c268b4b3f
|
||||
CVE-2024-47159,0,0,f629ab8645ae2d3b373e84498ebe22f56e42f569db9052d68376aa856c847502,2024-09-24T18:09:50.877000
|
||||
CVE-2024-4716,0,0,17dd73abada87214ed7c4da9787dcdd43aa5089416e4d3395c3029d4b8a776fa,2024-06-04T19:20:47.230000
|
||||
CVE-2024-47160,0,0,c1aad4fed9b1c25a1ac730f435c0afe6164d933ac9e43b9a1caf75e24768ef64,2024-09-24T18:03:48.370000
|
||||
CVE-2024-47161,0,0,de6bba3702bf92ae2f58bf77de3cccf9472850d7f360e20d58c4fe881348c53d,2024-10-10T12:56:30.817000
|
||||
CVE-2024-47161,0,1,b4f14ace0eaf8823c777465f809d23f928c4c28c11d0aa00813c7f2bf032d71e,2024-10-11T19:54:07.317000
|
||||
CVE-2024-47162,0,0,322233fc16cb60b7afacb06e9a8b8faccd2cf3bd8a5ab8537cf655de3bfbfae0,2024-09-24T17:57:43.827000
|
||||
CVE-2024-47164,0,0,5859bc42ffdd144898177fea7518c38f0b763cb9f31d761bb56378ffa2f03ff9,2024-10-10T22:15:10.437000
|
||||
CVE-2024-47165,0,0,6068da0b880a9925adbf77cd58fd288fd51574aa798be6053315e56aaf5343e3,2024-10-10T22:15:10.680000
|
||||
@ -261427,6 +261430,7 @@ CVE-2024-47327,0,0,e69cbc80f68558286d87724bfb3ff74a4556470fe4bba849a3f65a9c4a316
|
||||
CVE-2024-47329,0,0,959fd16ce295ac73c7340682dfbc4f00abc97a1906e836a2239dfaf44a22cfd5,2024-10-07T17:47:48.410000
|
||||
CVE-2024-4733,0,0,bab73609d3aaa55dacedcdd69b9c9d83fbc709adf98853b3adb423b13daf2498,2024-05-17T18:36:31.297000
|
||||
CVE-2024-47330,0,0,8e1bb94d03c47cc1936bb0a3abc1d94c591039097eebb503639095132d634032,2024-10-02T17:26:49.470000
|
||||
CVE-2024-47331,1,1,596c791ac8b0a95707c17084b5d3daf2eae269336f00917824d2d3797b89022e,2024-10-11T19:15:09.783000
|
||||
CVE-2024-47332,0,0,bebcc62121f57accf95efc9e23e2cb785faddb62a35b4509d76c7928e0003c00,2024-10-07T17:47:48.410000
|
||||
CVE-2024-47333,0,0,7b68cade94253428b89f07ec4ddffee957654bcbdc6a580835fa17b2ed55a3db,2024-10-07T17:47:48.410000
|
||||
CVE-2024-47334,0,0,b009b1e08524049ac674c8aea8d43b565f40269928fb41da018eb521c9e21ecc,2024-10-10T12:51:56.987000
|
||||
@ -261449,6 +261453,7 @@ CVE-2024-47349,0,0,e6c8290f3997da4ca5815c85f88c430fa697e63af208e1750b560fe37e4f7
|
||||
CVE-2024-4735,0,0,74f4fbd101bb46efdc880f338cfb70c8fd3a6ef365bd7732d2107c79fb3d78b8,2024-06-04T19:20:48.397000
|
||||
CVE-2024-47350,0,0,09067a079935a016b58f07623b3d09d0a14ce68a8d0e97bc64a38c36b79a09f5,2024-10-07T17:47:48.410000
|
||||
CVE-2024-47352,0,0,594028d39b78ff520b0396c6a3ce285d2e384a0ebe8a52208931d1ced0ad3b29,2024-10-07T17:47:48.410000
|
||||
CVE-2024-47353,1,1,46323252c46ba333ea4f36816ab9a80f2389e9d61296f8594ed082165cdc29c1,2024-10-11T19:15:10.003000
|
||||
CVE-2024-47354,0,0,d139da9360db9ab0b7a0ad752058da69c1005c00d22b020d554561160c2bccbe,2024-10-10T19:15:16.837000
|
||||
CVE-2024-47355,0,0,cf08585fe7cb6bc0c9335afe55d15aa081a8746842ce9e96d34e20bb3b2de71f,2024-10-07T17:47:48.410000
|
||||
CVE-2024-47356,0,0,cfe95239cc4248246cd874a2cb2d77c8e851cdbbe7ac1a464fc0eb4a3c757f5f,2024-10-07T17:47:48.410000
|
||||
@ -261514,27 +261519,27 @@ CVE-2024-4745,0,0,54a19ac018881ab94cc09206a38557755449249c459a354d473ddea48bafd7
|
||||
CVE-2024-4746,0,0,764da2d2faf52d5d8b005efc01764a8e4bfb42f0a65f0b328618a43b312322fb,2024-06-12T16:17:42.223000
|
||||
CVE-2024-4747,0,0,071c88b133efa29a5bceaf4f1781edaa635d35ede69008d4aad9361c37e95f56,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4748,0,0,5ce71114653bf2c9cc6586a0117b72827b192c4aa4e8e27ac2b81ed4a0b190af,2024-10-10T16:15:08.630000
|
||||
CVE-2024-47489,1,1,40082c9ea6af3f95e3adaa23bf06b126d7d87faf58740e252c8c8f8380cc9e40,2024-10-11T16:15:08.533000
|
||||
CVE-2024-47489,0,0,40082c9ea6af3f95e3adaa23bf06b126d7d87faf58740e252c8c8f8380cc9e40,2024-10-11T16:15:08.533000
|
||||
CVE-2024-4749,0,0,21df5bc0093c94425462a6e59e75544f486b5326a781fcb494e0f25aa2f7ef93,2024-08-01T13:59:33.520000
|
||||
CVE-2024-47490,1,1,aff460f2bb886b0c556320292bceb775329712483804e9b0338b4de254980cea,2024-10-11T16:15:08.803000
|
||||
CVE-2024-47491,1,1,61f380aa4eca71a114d68c477d91523642fbf583891c87c81bdfdf5f3974483e,2024-10-11T16:15:09.060000
|
||||
CVE-2024-47493,1,1,063925c1520d3414cb1ee69e964adb1f030ea403a77cefa25ff0439a08cd554d,2024-10-11T16:15:09.320000
|
||||
CVE-2024-47494,1,1,8fcd878ee54fa8b3d09223b7f4989139aacc792aebad87e2d9a254682982f88b,2024-10-11T16:15:09.580000
|
||||
CVE-2024-47495,1,1,4bef553e872359b4fc95e80c4cad4802591e7ba939bdd2d42a18e474509bef36,2024-10-11T16:15:09.830000
|
||||
CVE-2024-47496,1,1,e7b7c70aa0cca27791bbe9b8a83ce0cab9d16c184db2ffab4569a96982e74314,2024-10-11T16:15:10.080000
|
||||
CVE-2024-47497,1,1,8e5c86f378bb0e59f8301ddf4e1a53b153439ef401b68284b482ae56c6bfa753,2024-10-11T16:15:10.340000
|
||||
CVE-2024-47498,1,1,e7bda161b4d7d50f70ebd7d3725d035b1af79c053ff8bbb7e0def421f3062737,2024-10-11T16:15:10.590000
|
||||
CVE-2024-47499,1,1,b647a152c1d0f43218070f7f35e867edcad3f8df28d7b82fd5e10073a0081635,2024-10-11T16:15:10.850000
|
||||
CVE-2024-47490,0,0,aff460f2bb886b0c556320292bceb775329712483804e9b0338b4de254980cea,2024-10-11T16:15:08.803000
|
||||
CVE-2024-47491,0,0,61f380aa4eca71a114d68c477d91523642fbf583891c87c81bdfdf5f3974483e,2024-10-11T16:15:09.060000
|
||||
CVE-2024-47493,0,0,063925c1520d3414cb1ee69e964adb1f030ea403a77cefa25ff0439a08cd554d,2024-10-11T16:15:09.320000
|
||||
CVE-2024-47494,0,0,8fcd878ee54fa8b3d09223b7f4989139aacc792aebad87e2d9a254682982f88b,2024-10-11T16:15:09.580000
|
||||
CVE-2024-47495,0,0,4bef553e872359b4fc95e80c4cad4802591e7ba939bdd2d42a18e474509bef36,2024-10-11T16:15:09.830000
|
||||
CVE-2024-47496,0,0,e7b7c70aa0cca27791bbe9b8a83ce0cab9d16c184db2ffab4569a96982e74314,2024-10-11T16:15:10.080000
|
||||
CVE-2024-47497,0,0,8e5c86f378bb0e59f8301ddf4e1a53b153439ef401b68284b482ae56c6bfa753,2024-10-11T16:15:10.340000
|
||||
CVE-2024-47498,0,0,e7bda161b4d7d50f70ebd7d3725d035b1af79c053ff8bbb7e0def421f3062737,2024-10-11T16:15:10.590000
|
||||
CVE-2024-47499,0,0,b647a152c1d0f43218070f7f35e867edcad3f8df28d7b82fd5e10073a0081635,2024-10-11T16:15:10.850000
|
||||
CVE-2024-4750,0,0,e7d885dbb56d4f9fc74f5666b8e26860ce8baddd6593d5428816201f1663fb5f,2024-06-04T16:57:41.053000
|
||||
CVE-2024-47501,1,1,9d38ac9f30fb2461dc751986403d7cdc00216bd867c8656968e9be69d8b71af1,2024-10-11T16:15:11.167000
|
||||
CVE-2024-47502,1,1,0ac9bcdae916367f6e77292960a91cefbb0144dd122c43ecf5c03c4bb09c9e82,2024-10-11T16:15:11.413000
|
||||
CVE-2024-47503,1,1,33465613ee6f1265bc32ac702d6b48b093fd4231944e5c74d21db846f4ca534b,2024-10-11T16:15:11.663000
|
||||
CVE-2024-47504,1,1,13c78f1c6a691ed1435e84bf51120f6b3f9dd22512be8521af4970708cea2e9d,2024-10-11T16:15:11.900000
|
||||
CVE-2024-47505,1,1,554c1f48d9e1d8b28639e92fb32cbf6c0e445c179896e914c73d119fae3f9970,2024-10-11T16:15:12.210000
|
||||
CVE-2024-47506,1,1,1039f5e5572938c5f5f0e4f895df2d0e18fb82cbad2b8c7b5d75af3c751a54e4,2024-10-11T16:15:12.450000
|
||||
CVE-2024-47507,1,1,e36465efacc62969f058c438513d0ae9beeda7602752398c7d2a3be2531233f7,2024-10-11T16:15:12.700000
|
||||
CVE-2024-47508,1,1,9d17e4d6464fec53e39a71d9b3bff6a30234fe14e729bcc9c1f57ff29bdd62a2,2024-10-11T16:15:12.957000
|
||||
CVE-2024-47509,1,1,43e64569532dc69d5e1f5381f9f6dbc47e6b577336d03b81f0c24e659d0fa33b,2024-10-11T16:15:13.187000
|
||||
CVE-2024-47501,0,0,9d38ac9f30fb2461dc751986403d7cdc00216bd867c8656968e9be69d8b71af1,2024-10-11T16:15:11.167000
|
||||
CVE-2024-47502,0,0,0ac9bcdae916367f6e77292960a91cefbb0144dd122c43ecf5c03c4bb09c9e82,2024-10-11T16:15:11.413000
|
||||
CVE-2024-47503,0,0,33465613ee6f1265bc32ac702d6b48b093fd4231944e5c74d21db846f4ca534b,2024-10-11T16:15:11.663000
|
||||
CVE-2024-47504,0,0,13c78f1c6a691ed1435e84bf51120f6b3f9dd22512be8521af4970708cea2e9d,2024-10-11T16:15:11.900000
|
||||
CVE-2024-47505,0,0,554c1f48d9e1d8b28639e92fb32cbf6c0e445c179896e914c73d119fae3f9970,2024-10-11T16:15:12.210000
|
||||
CVE-2024-47506,0,0,1039f5e5572938c5f5f0e4f895df2d0e18fb82cbad2b8c7b5d75af3c751a54e4,2024-10-11T16:15:12.450000
|
||||
CVE-2024-47507,0,0,e36465efacc62969f058c438513d0ae9beeda7602752398c7d2a3be2531233f7,2024-10-11T16:15:12.700000
|
||||
CVE-2024-47508,0,0,9d17e4d6464fec53e39a71d9b3bff6a30234fe14e729bcc9c1f57ff29bdd62a2,2024-10-11T16:15:12.957000
|
||||
CVE-2024-47509,0,0,43e64569532dc69d5e1f5381f9f6dbc47e6b577336d03b81f0c24e659d0fa33b,2024-10-11T16:15:13.187000
|
||||
CVE-2024-4751,0,0,258479d9744cea39d1125b819c638c567793396e05305e64bbc0e320bde2cbf7,2024-08-09T19:35:10.473000
|
||||
CVE-2024-4752,0,0,6bc9a9ea56288a6bdc9797f778ecc1371bb94f8257819cae6e07cdc5634a3ca3,2024-08-01T13:59:33.713000
|
||||
CVE-2024-47523,0,0,22d43e6df5f74e6749ea10e7fe6523466b29bb84b684bbdd4f0562f87b193f88,2024-10-07T19:07:30.287000
|
||||
@ -261702,7 +261707,7 @@ CVE-2024-47870,0,0,67440b65a260801b69dd4b36e2659045709b26a62ba343a9258c4e21ff380
|
||||
CVE-2024-47871,0,0,4598420fb90bc720fd4ef6c3c6d6760832c25f6aa06e45d621b9a1ef226d8d4c,2024-10-10T23:15:03.187000
|
||||
CVE-2024-47872,0,0,8471c34cf55992e157ff7eba332e41edd983c92bf011e2e751c8d26e7ec94000,2024-10-10T23:15:03.303000
|
||||
CVE-2024-47875,0,0,078af0f210e8e30655ff63e30537d1f8dba962d087e301c359afca4f246d0946,2024-10-11T15:15:05.860000
|
||||
CVE-2024-47877,1,1,7531e66ff0397e313d2f97552017c7592a6d7da9498d96e0b29b6c2d6bd21145,2024-10-11T17:15:04.450000
|
||||
CVE-2024-47877,0,0,7531e66ff0397e313d2f97552017c7592a6d7da9498d96e0b29b6c2d6bd21145,2024-10-11T17:15:04.450000
|
||||
CVE-2024-4788,0,0,036e4ce9e476328c73022572d41365684f416f1f77ea3a1f5e72bdd2454ce2ec,2024-08-05T20:23:52.467000
|
||||
CVE-2024-4789,0,0,991c3c0809892f7a4ebcc223f96155782fc07af160e30bd64d5fbc63735bec50,2024-05-17T18:35:35.070000
|
||||
CVE-2024-4790,0,0,96aecd7cd4f769c190cdd6309a2627db4d493e5cf9efda536a135cb9a7f4eb96,2024-06-20T20:15:19.883000
|
||||
@ -261713,11 +261718,11 @@ CVE-2024-47913,0,0,7dc94fcd4cdeeb6c0d9aba640aeb2f6806a34afc409a57e9cc79ea392fd74
|
||||
CVE-2024-4792,0,0,d367db616eff60413675ec0cb96dcf5072899c5126e3ab7b85dd0b323d2aa0a3,2024-06-12T20:15:13.643000
|
||||
CVE-2024-4793,0,0,d7ea24a63b045e67640f8521c21cc9fd0113236775183a92ddafb3253726675a,2024-06-04T19:20:49.390000
|
||||
CVE-2024-4794,0,0,ae0da7f20a3f797e26793f17108eae7df40bf3f3b44a06ce135aa4fe4b35db7e,2024-06-04T19:20:49.487000
|
||||
CVE-2024-47948,0,0,22804f66c6f9ab275c179ec5f8e105f0642d633dda44683f36c7b86f6a1376eb,2024-10-10T12:56:30.817000
|
||||
CVE-2024-47949,0,0,e43462308f085b6b759cad854e3d1c28aaa801407e9db778208cd2503d64202b,2024-10-10T12:56:30.817000
|
||||
CVE-2024-47948,0,1,aafd0e8fc979ea94b2b8df4bf3f1f60d1fa5454036169ceb387558bd65bac363,2024-10-11T19:56:44.863000
|
||||
CVE-2024-47949,0,1,8ba4c45c98cb1da5a81b6d150df81b78f598bd9353dce1414e0f42eb2bdd7632,2024-10-11T19:57:06.207000
|
||||
CVE-2024-4795,0,0,2bcc48011ff4ecb8dd1cdbe375174bc480d75b3ad4f0c787cda1ca7cd904e298,2024-06-04T19:20:49.590000
|
||||
CVE-2024-47950,0,0,051b7d62708c153f7aefabbe7d8cbca3b760e43438404853bb4e254aa1c32f1d,2024-10-10T12:56:30.817000
|
||||
CVE-2024-47951,0,0,dd0e5081c613ef6331152cf5f5a93ee02293e5a5a930e15d75080ba702abfea6,2024-10-10T12:56:30.817000
|
||||
CVE-2024-47950,0,1,0333163b5a9f356fc60964ffdf9e21e2c5a0fd650f8b847ccf42b9907218b9aa,2024-10-11T19:57:16.883000
|
||||
CVE-2024-47951,0,1,e529fafd02710d7ac35ac8b78eedca3443695e348ede4d153aabc61ddef6e118,2024-10-11T19:57:58.937000
|
||||
CVE-2024-4796,0,0,964ab3d12855a9ebe6833342f869532f4dbb88319fd169505c04f4586bfbb727,2024-06-04T19:20:49.720000
|
||||
CVE-2024-47962,0,0,1c993031245b9205a9445c920e9186968a00d85e81c957a316576d409863e918,2024-10-10T18:15:08.183000
|
||||
CVE-2024-47963,0,0,e68b7121a7e0333c01b2d777a44d55fa8978f9459daf9609f2c28c44e3cd7b30,2024-10-10T18:15:08.330000
|
||||
@ -261739,8 +261744,12 @@ CVE-2024-4799,0,0,bef187df7ab031f873bee32f009cee90466081192edf9662131655f9488e20
|
||||
CVE-2024-4800,0,0,46f73cb5132c32f542b67f61b6f2138522f24eb42a7d5cb9e69a7f683ef97724,2024-06-04T19:20:50.013000
|
||||
CVE-2024-4801,0,0,2bcdaba0a3afa2888c47ef732ae4862e81c0c79cd78d2076198cb242d0df3f0e,2024-06-04T19:20:50.120000
|
||||
CVE-2024-4802,0,0,9f23c738b4e7167dada064b214f9ad2d560e5cec48c7eaa4346088c33abc9143,2024-06-04T19:20:50.247000
|
||||
CVE-2024-48020,1,1,829c283ecb63389e2cff1a1741c3e7cb21cdcddc68038d515211bb86aa4c455f,2024-10-11T19:15:10.220000
|
||||
CVE-2024-4803,0,0,9495051e0864e5e76c8973a987e9e6eb1b1cb49bec9a5ab21c9648610125fd4d,2024-06-04T19:20:50.353000
|
||||
CVE-2024-48033,1,1,43f4a76b8fc3610a7c182a16ab14a36b8f68d177db87ed6fd3f19819fe34cc88,2024-10-11T19:15:10.430000
|
||||
CVE-2024-4804,0,0,27889f6e71f31f5b5cb9daf7c221df1ea26a19e5d20319852f304f02b73ccaf6,2024-06-04T19:20:50.450000
|
||||
CVE-2024-48040,1,1,c57148f5b85311d99b66a455ed18d7c7ea6a3284758e530142be56984028b4db,2024-10-11T19:15:10.660000
|
||||
CVE-2024-48041,1,1,7cbfa9b2e3220db83ef3d6eff7a331f4c12bafdd869428a04141ba479dedb179,2024-10-11T19:15:10.880000
|
||||
CVE-2024-4805,0,0,a2ff69b1db9dd7c01e8bcdbe532fffb4f68853ea688982e077b1b01529f57c85,2024-06-04T19:20:50.553000
|
||||
CVE-2024-4806,0,0,f8a0e203429c4f99450a15aa6a4b26ee8c7effa68e79948138bc0eccf2af8e7f,2024-06-04T19:20:50.670000
|
||||
CVE-2024-4807,0,0,e5ccc41d46958232939be978f4766518ab72a806619364a653b00c23b63fbc68,2024-06-04T19:20:50.770000
|
||||
@ -261802,9 +261811,9 @@ CVE-2024-4875,0,0,5a9bf10de46e2f944321ed00fa6d17c799716a219001f5797c9cce4abb6a2b
|
||||
CVE-2024-4876,0,0,6c7ef7cd93a9d659be2199330000de11a6027348fd6a9308e40ba12083e70d2c,2024-05-21T12:37:59.687000
|
||||
CVE-2024-4879,0,0,49a8b41ea605df8bd1da4063a7058b50435504f1dbecb0dc4bcc8efa8c8e8867,2024-07-30T15:13:39.720000
|
||||
CVE-2024-4881,0,0,e010a6d611a1aff52f8425d30778d000b18cd2245ae12a3254f16e5b16421da7,2024-06-07T14:56:05.647000
|
||||
CVE-2024-48813,1,1,9334ed90a2bc2f99bdf43ba394cf554b2394a010b57e23c65c6dbd91bcd5211a,2024-10-11T16:15:13.453000
|
||||
CVE-2024-48813,0,0,9334ed90a2bc2f99bdf43ba394cf554b2394a010b57e23c65c6dbd91bcd5211a,2024-10-11T16:15:13.453000
|
||||
CVE-2024-4882,0,0,a4855f599041359b65e48a15f937a27e2ec2e91d9343d627eb58fe60c3b171c1,2024-07-09T18:19:14.047000
|
||||
CVE-2024-48827,1,1,95a05cb105f9089ac3138fdbcd6ebf5bdb0df4dff79ffd2930892d4422629ef7,2024-10-11T16:15:13.550000
|
||||
CVE-2024-48827,0,0,95a05cb105f9089ac3138fdbcd6ebf5bdb0df4dff79ffd2930892d4422629ef7,2024-10-11T16:15:13.550000
|
||||
CVE-2024-4883,0,0,66fd0c7113b75e4613bf51e6b10a097cc5dcf57aa3f97b3df0e5c31c4210be62,2024-09-06T22:46:17.103000
|
||||
CVE-2024-4884,0,0,a2dcec8e16e916f3e6bf44fbf27e64f395ae27ac96c65779b6d04fbf5173b4c4,2024-09-06T22:45:59.233000
|
||||
CVE-2024-4885,0,0,2608f2aa7fb5189467bda7bb610d4e03f1b43256b775a84e60ba9a3b8ac9b260,2024-09-06T22:44:27.840000
|
||||
@ -261819,12 +261828,12 @@ CVE-2024-4892,0,0,86d55410ceaf3ecac0b7906bf27b918d65f0ae499a5475505564f001e752da
|
||||
CVE-2024-4893,0,0,c4900f559bdc4a1c952ec15ffc0a407a7d0fc758594c29af597940962bf437f6,2024-05-15T16:40:19.330000
|
||||
CVE-2024-48933,0,0,3003e039111af51a407eaa338f91e1930c9de8b7e22ff78450b42fc9a05e6cc7,2024-10-10T12:51:56.987000
|
||||
CVE-2024-4894,0,0,1906244d072f236ffca4e7ab82222b86cb7f201e42e01d4517f3ab933ca907f5,2024-05-15T16:40:19.330000
|
||||
CVE-2024-48941,0,0,80341bc59a5c1548e955560fb91fc5d95330f9c3b23059767833d93a51bbb213,2024-10-10T12:51:56.987000
|
||||
CVE-2024-48942,0,0,9d039548210cac47c3a85e5d8f6dbc444b18273e0fb45ad4348a0d24112b86eb,2024-10-10T12:51:56.987000
|
||||
CVE-2024-48941,0,1,35ab7ff258205d0a73a0c5c3a4a13d58fc51339de1c036850059f90cd9a5f81c,2024-10-11T19:06:20.467000
|
||||
CVE-2024-48942,0,1,ea39c98e10a8fc84511a95f9d84a08387c5a9e2c30ccf449a088f0db604ed8ce,2024-10-11T19:10:20.137000
|
||||
CVE-2024-48949,0,0,7d55724ab06b8de7edf1f4b8a08def014420bedd09e2e171d24560c893af6404,2024-10-10T12:51:56.987000
|
||||
CVE-2024-4895,0,0,f6b1e62d3b5bd64aea52e6768b6c469e049c941759a77bf99aa3b85ad7e20caa,2024-05-24T01:15:30.977000
|
||||
CVE-2024-48957,0,1,c46c0ac873aa42c5c5fce51c2fd190551560e6471a3ec20c35231306af233d10,2024-10-11T16:12:54.243000
|
||||
CVE-2024-48958,0,1,78f8ea913e01786dab7124f80bf77d2db49d32828cc7ec77a90c7a2a507ee4f0,2024-10-11T16:11:55.487000
|
||||
CVE-2024-48957,0,0,c46c0ac873aa42c5c5fce51c2fd190551560e6471a3ec20c35231306af233d10,2024-10-11T16:12:54.243000
|
||||
CVE-2024-48958,0,0,78f8ea913e01786dab7124f80bf77d2db49d32828cc7ec77a90c7a2a507ee4f0,2024-10-11T16:11:55.487000
|
||||
CVE-2024-4896,0,0,20cc2dc19f323150528d4fb3a23b846b2e602fa65e075afe5dc2b86cb95d9c94,2024-05-22T12:46:53.887000
|
||||
CVE-2024-4897,0,0,b80483aa02f533d1f5c4695afa1f7ec5dae4ecfa8b472cf561efa5d05f8ff11d,2024-07-02T17:44:45.700000
|
||||
CVE-2024-4898,0,0,a64ada88476e7dbd5dca1f8ed9406bed15a3acb87fadbe7d9a4f3102502b7a67,2024-07-23T17:50:44.033000
|
||||
@ -262348,7 +262357,7 @@ CVE-2024-5470,0,0,6ad8fffdbc9fc3c2ca94bc381d3be223e310676e26148212c497e243b6c174
|
||||
CVE-2024-5471,0,0,b5058f52e9634b68f4d4000cb97858db03cd2fac3d75cd140cb047a19da1c69c,2024-07-18T14:09:17.740000
|
||||
CVE-2024-5472,0,0,cbeafb08776655e35d6e47fe8a75d08cb39135639adca55be0cfb4cff69e0ec6,2024-08-01T13:59:47.140000
|
||||
CVE-2024-5473,0,0,7a9289264d1a834c0b8e9151c353ddcb7a22a22f6b7d360897c02053aaaeb88c,2024-07-03T02:08:57.860000
|
||||
CVE-2024-5474,1,1,43a83dbafd311c5d5ae6228d64db4d0c4ac6ffef3f20fddca84b77e4de9c971f,2024-10-11T16:15:14.440000
|
||||
CVE-2024-5474,0,0,43a83dbafd311c5d5ae6228d64db4d0c4ac6ffef3f20fddca84b77e4de9c971f,2024-10-11T16:15:14.440000
|
||||
CVE-2024-5475,0,0,e09a66bd4d026df38a62a9d0642b82f2a5b9bf49c6a2d9e0e1e141414790fdd3,2024-07-03T02:08:58.050000
|
||||
CVE-2024-5478,0,0,c601a39452cb705e9035daa72131a8a960693dee4deccdae668f9ad5d8466d4f,2024-07-19T18:29:50.137000
|
||||
CVE-2024-5479,0,0,7bf7a94732a4ce28b83209c9d21f799503dcb5933696ba21b8f4bc98737c6d69,2024-07-09T18:19:14.047000
|
||||
@ -263619,7 +263628,7 @@ CVE-2024-6980,0,0,f6625eb84b24e1b38c56cc3bb53a8be195d62bb4e9db2a7b8e6feb6123dc76
|
||||
CVE-2024-6981,0,0,510d4c4925a1eb3b58785bbc8ab5a73c80a24b4283cae4ebe7ab898a6ac026fd,2024-09-30T12:45:57.823000
|
||||
CVE-2024-6983,0,0,26d1c914038fe83b8e6a8b16fb4211c387129700e5470999eec99bc2e4f2518e,2024-09-30T12:45:57.823000
|
||||
CVE-2024-6984,0,0,923e45bdbdeb390a80e72f79f52c794d2a4658d69ca6fdf4fb6edad3e12c000f,2024-09-11T16:39:37.253000
|
||||
CVE-2024-6985,1,1,5f21d30928cf28a33075885772aedefd7da288599a590670b4dbd0a400096eb8,2024-10-11T16:15:14.657000
|
||||
CVE-2024-6985,0,0,5f21d30928cf28a33075885772aedefd7da288599a590670b4dbd0a400096eb8,2024-10-11T16:15:14.657000
|
||||
CVE-2024-6987,0,0,330d8660e6c8d71a307c7f147e933f5e3b64b2ed81a202f0c00b33c60663824c,2024-08-08T13:04:18.753000
|
||||
CVE-2024-6988,0,0,7c7b8d3e1cf6e7ad313fbb0065550bb07b14482a1596e2d1017c6e1750b4a915,2024-08-07T20:51:56.167000
|
||||
CVE-2024-6989,0,0,ade79451132400d31d7ae605ff13fce7650d6dfcad5f07960cf60cc71279c505,2024-08-07T22:10:20.423000
|
||||
@ -264670,7 +264679,7 @@ CVE-2024-8372,0,0,ed7416684bf8c992c4344af2dee1225532302d263529a8756259e179ed722a
|
||||
CVE-2024-8373,0,0,d1a5cc99924a2151520a8ea490fb3d660801248a7f2168e9fe7f0fc9057db80c,2024-09-17T17:32:33.380000
|
||||
CVE-2024-8374,0,0,d48dc520ae709311b13e321521d105dda894c6710801eb063d42db744b0094d0,2024-09-16T16:44:42.403000
|
||||
CVE-2024-8375,0,0,58cea17ca7f7a98f8126bafea3caa90f64ce326ce0b828e067a1c86c7d982ac6,2024-09-20T12:30:17.483000
|
||||
CVE-2024-8376,1,1,9dd45ea5eb890d621b52ba6a952a2bede7fd684c24943263c6e7f11bc65ec39b,2024-10-11T16:15:14.860000
|
||||
CVE-2024-8376,0,0,9dd45ea5eb890d621b52ba6a952a2bede7fd684c24943263c6e7f11bc65ec39b,2024-10-11T16:15:14.860000
|
||||
CVE-2024-8379,0,0,085298af9559a314a9f72b50c0919e14d810bca9e3bf6d4dab66f461020341e6,2024-10-07T15:49:54.653000
|
||||
CVE-2024-8380,0,0,036c8c11a05ec98776794766e58c3583b3eabb4c67c37c1216e0519e7baf5609,2024-09-04T14:58:49.450000
|
||||
CVE-2024-8381,0,0,71cd6342a2b6c00c154431956e1e93b11926fd4f87284990ba91ff899e315a4c,2024-09-06T17:15:17.573000
|
||||
@ -264990,6 +264999,7 @@ CVE-2024-8908,0,0,814a632e733410078b07e9411999ce68ca7ad8b9d3cd0621cbfe771be63227
|
||||
CVE-2024-8909,0,0,164deeef11f6495a80d20f0aa7bd15b53f984d767860039b14665a9aa77c7c0d,2024-09-23T17:51:11.790000
|
||||
CVE-2024-8910,0,0,381e6285f77cbfcd68b12e9f3c36f92b4377fd4642413a4087debb4746eed093,2024-10-03T17:34:27.913000
|
||||
CVE-2024-8911,0,0,3e740b3cf92ecc1f17356bd7912ea5093c6c60b7cb91fb7bff5c155129d89dfe,2024-10-10T12:56:30.817000
|
||||
CVE-2024-8912,1,1,cc754920a66c9505b940e8219b2e4d1d89e8006fc7a2b380aec11b363ea547b9,2024-10-11T19:15:11.110000
|
||||
CVE-2024-8913,0,0,a55fc5932b647838acfa904d967ecbcbbf1a8451e2d81f1f3b7968e9aadf354c,2024-10-11T13:15:17.040000
|
||||
CVE-2024-8914,0,0,c67ce2c8d24044b482c9bbb33384856203ff5bb870309850d7df3d6267c1b679,2024-09-26T13:32:02.803000
|
||||
CVE-2024-8917,0,0,32a69b030ac61cd4e144a233fc55362cc6115ccb6ecca5ec236644320a2aecf1,2024-09-30T14:30:38.687000
|
||||
@ -265063,7 +265073,7 @@ CVE-2024-9039,0,0,2a46914eca39fc29da2da7edd5c8d5e2462d724fc7b13f9f758dbc7e741a3a
|
||||
CVE-2024-9040,0,0,0fb966ef41b73391708aea4bb41bcdf22035487df6b2f9dfc89d7d54ff500837,2024-09-27T15:53:28.333000
|
||||
CVE-2024-9041,0,0,99f9003688843669abe0778fb23af0702d95d6892437f5bbf3a35f1e206f8b48,2024-09-27T15:57:55.073000
|
||||
CVE-2024-9043,0,0,585c2a6b7b38dff44f8f31bab3e4cca50893ebff20d4d599fedd4ef31bc82eef,2024-09-25T17:54:05.297000
|
||||
CVE-2024-9046,1,1,ccf29b7f950c2068a983470342fd395555ea1d4320e405e4ca055421117646d1,2024-10-11T16:15:15
|
||||
CVE-2024-9046,0,0,ccf29b7f950c2068a983470342fd395555ea1d4320e405e4ca055421117646d1,2024-10-11T16:15:15
|
||||
CVE-2024-9048,0,0,f4eeb8fc17937a04134cb85e4ff1d8e798c7887dad672c6adf3a86ffdd0c5d34,2024-09-30T13:00:48.613000
|
||||
CVE-2024-9049,0,0,43c64cc2e53580aadfacb0d92c10ebf9c72fa78495b0a90bf4d0f0f029260a77,2024-10-04T18:53:10.910000
|
||||
CVE-2024-9051,0,0,cd9f5066c63e39d4ce5479a5ea7f24fe1eed0d9db90cc0d316834afb0392bf0a,2024-10-11T13:15:17.477000
|
||||
@ -265237,12 +265247,12 @@ CVE-2024-9384,0,0,a6a408c481cce62ffd2afe76e175a7a94a46c764ed46cc8221ec17248ad3b6
|
||||
CVE-2024-9385,0,0,d5290e9b463ce80e3cb0a2758c2b2174c3a3323b0c1b53b476f1fa2df6ded1c1,2024-10-07T17:48:28.117000
|
||||
CVE-2024-9391,0,0,7d6eba489d698d80c25274418cf61f043b91561cc903d053b7833bff789db601,2024-10-04T13:51:25.567000
|
||||
CVE-2024-9392,0,0,beca44e590b21e5502ca4e733f60749ac893cd13053addd71013500d8f613300,2024-10-04T13:51:25.567000
|
||||
CVE-2024-9393,0,1,8991f032fac5df92cbca1bcfbd289d2f6fc6372985ab09be505deb12f485dbe2,2024-10-11T16:07:50.900000
|
||||
CVE-2024-9394,0,1,5ed6e653f78b8906c28bb62e758664ed375e0597617ec060b919f3513dbdc6ac,2024-10-11T16:08:21.067000
|
||||
CVE-2024-9393,0,0,8991f032fac5df92cbca1bcfbd289d2f6fc6372985ab09be505deb12f485dbe2,2024-10-11T16:07:50.900000
|
||||
CVE-2024-9394,0,0,5ed6e653f78b8906c28bb62e758664ed375e0597617ec060b919f3513dbdc6ac,2024-10-11T16:08:21.067000
|
||||
CVE-2024-9395,0,0,5635514233d9ffee7876b8b2143dfc7636f2a12f95a3e319a76e442d8673b9b2,2024-10-04T13:51:25.567000
|
||||
CVE-2024-9396,0,0,530fd74976554bcd60385c13cda51e8c090f8d2168af9c130173451c01d15309,2024-10-04T13:51:25.567000
|
||||
CVE-2024-9397,0,1,eedca49f89627e559465b4c1980d39b3c979416597a1ac9dbc74efac9146189f,2024-10-11T16:07:56.577000
|
||||
CVE-2024-9398,0,1,bdddf943c112a95674b6a5445a1c9aea85241f45d8a7242f5a5f280afd3f7bd6,2024-10-11T16:08:14.577000
|
||||
CVE-2024-9397,0,0,eedca49f89627e559465b4c1980d39b3c979416597a1ac9dbc74efac9146189f,2024-10-11T16:07:56.577000
|
||||
CVE-2024-9398,0,0,bdddf943c112a95674b6a5445a1c9aea85241f45d8a7242f5a5f280afd3f7bd6,2024-10-11T16:08:14.577000
|
||||
CVE-2024-9399,0,0,a8306eeaf5f6d420fcd1d35299a7796a21f85097b65705c4ac2794bceab9b67e,2024-10-04T13:51:25.567000
|
||||
CVE-2024-9400,0,0,a07b092a7377838a4bb1e87b4e3b2f09cba515c42895dfa1fbf9dfd7eae19700,2024-10-04T13:51:25.567000
|
||||
CVE-2024-9401,0,0,9842edf4bc941b30860cfd929934eb8ba10b8d9f58d891f69f78bdfbf96f468c,2024-10-04T13:51:25.567000
|
||||
@ -265297,6 +265307,7 @@ CVE-2024-9534,0,0,c826e79c155e2dcea2a83d95fd56ee360f3177c126ff744e515a5e5c9099e0
|
||||
CVE-2024-9535,0,0,4a71ba0a2572a89f39d0b54033731c76d4c93435778a2b1285d18249bf7f619d,2024-10-09T11:16:35.487000
|
||||
CVE-2024-9536,0,0,56b0d71a5e1f747b35f1ac4fcfd42bf040a735cf796864344938e26d90f6930b,2024-10-07T17:47:48.410000
|
||||
CVE-2024-9538,0,0,09ff8d828136926273e234a7df0de9f7df3e277701497c2d4680e9ae80291314,2024-10-11T13:15:19.373000
|
||||
CVE-2024-9539,1,1,8966fc6636af6152e0414eab130e86797be15626adebb04d75d77ec16901db50,2024-10-11T18:15:08.887000
|
||||
CVE-2024-9543,0,0,0c6f45a8dc106427c9aa4a27ce0a99c89f29e67e9019a384d028eb17f2682b51,2024-10-11T13:15:19.577000
|
||||
CVE-2024-9549,0,0,de2015c0f448716988568c7b5dd774c121a80649e44094dfa56d887e4c1906a6,2024-10-10T13:14:51.793000
|
||||
CVE-2024-9550,0,0,910b684d766fc00d3bc835188c16842c5e64a2ca110db17b68c67c53481422d4,2024-10-09T11:15:52.520000
|
||||
@ -265382,5 +265393,5 @@ CVE-2024-9818,0,0,4a540b8f9903a9b9420b63ef2490b163dd3b5219ef38e22237dcd7875973e6
|
||||
CVE-2024-9822,0,0,d08d61a8f285dedd6e0156668251bfed17abd9d34a7fc326c5d7b2d904c03ab9,2024-10-11T03:15:10.967000
|
||||
CVE-2024-9855,0,0,74811d4bb31eb0ad4289dbfb3b216d12eb73ec4e1a7f9bf880a5813c9b568440,2024-10-11T13:15:21.460000
|
||||
CVE-2024-9856,0,0,b5fbe1e11cd8120594b10c6f2c9ff297b13257bca69885420fdeff5341bb84c9,2024-10-11T13:15:21.883000
|
||||
CVE-2024-9859,1,1,4c2e27e83d096af209ad8d4a7ba60ec60caaadb1032a58969905b29c3c0c3d1f,2024-10-11T17:15:04.677000
|
||||
CVE-2024-9859,0,0,4c2e27e83d096af209ad8d4a7ba60ec60caaadb1032a58969905b29c3c0c3d1f,2024-10-11T17:15:04.677000
|
||||
CVE-2024-9869,0,0,2195387ef9aab560e210893ad1e9f3295c5808c9d50c0ada4fa1d17778d3d1ae,2024-10-11T15:15:06.500000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user