mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
Auto-Update: 2024-12-11T21:00:29.770164+00:00
This commit is contained in:
parent
5ad13190eb
commit
50ec205fcf
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2023-27975",
|
"id": "CVE-2023-27975",
|
||||||
"sourceIdentifier": "cybersecurity@se.com",
|
"sourceIdentifier": "cybersecurity@se.com",
|
||||||
"published": "2024-02-14T17:15:08.700",
|
"published": "2024-02-14T17:15:08.700",
|
||||||
"lastModified": "2024-11-21T07:53:51.157",
|
"lastModified": "2024-12-11T19:33:27.327",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -36,6 +36,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 1.8,
|
"exploitabilityScore": 1.8,
|
||||||
"impactScore": 5.2
|
"impactScore": 5.2
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
|
||||||
|
"baseScore": 7.1,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 5.2
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -51,14 +71,44 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:schneider-electric:ecostruxure_control_expert:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "16.0",
|
||||||
|
"matchCriteriaId": "1FF68269-FEB0-41F0-9127-965AA4ADCC91"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:schneider-electric:ecostruxure_process_expert:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "2023",
|
||||||
|
"matchCriteriaId": "D8022AED-42C4-42F5-A30A-45F157D71CA9"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2024-044-01&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2024-044-01.pdf",
|
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2024-044-01&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2024-044-01.pdf",
|
||||||
"source": "cybersecurity@se.com"
|
"source": "cybersecurity@se.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2024-044-01&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2024-044-01.pdf",
|
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2024-044-01&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2024-044-01.pdf",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2023-6371",
|
"id": "CVE-2023-6371",
|
||||||
"sourceIdentifier": "cve@gitlab.com",
|
"sourceIdentifier": "cve@gitlab.com",
|
||||||
"published": "2024-03-28T08:15:26.223",
|
"published": "2024-03-28T08:15:26.223",
|
||||||
"lastModified": "2024-11-21T08:43:43.620",
|
"lastModified": "2024-12-11T20:26:05.660",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -36,6 +36,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 2.3,
|
"exploitabilityScore": 2.3,
|
||||||
"impactScore": 5.8
|
"impactScore": 5.8
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"baseScore": 5.4,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.3,
|
||||||
|
"impactScore": 2.7
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -49,24 +69,98 @@
|
|||||||
"value": "CWE-79"
|
"value": "CWE-79"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
|
||||||
|
"versionEndExcluding": "16.8.5",
|
||||||
|
"matchCriteriaId": "4867F1FA-53C2-4AB4-ACF1-257BA2125484"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
|
||||||
|
"versionEndExcluding": "16.8.5",
|
||||||
|
"matchCriteriaId": "D0918E4A-3AD6-461C-A693-9A7273757AC2"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
|
||||||
|
"versionStartIncluding": "16.9.0",
|
||||||
|
"versionEndExcluding": "16.9.3",
|
||||||
|
"matchCriteriaId": "D8B59378-A2DC-4C3D-A4F8-D3913AFD46D0"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
|
||||||
|
"versionStartIncluding": "16.9.0",
|
||||||
|
"versionEndExcluding": "16.9.3",
|
||||||
|
"matchCriteriaId": "EE028131-A200-472E-8CA5-167A4057DB4A"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:gitlab:gitlab:16.10.0:*:*:*:community:*:*:*",
|
||||||
|
"matchCriteriaId": "D7864CB7-B9B8-45D3-AD0E-AE9560A23011"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:gitlab:gitlab:16.10.0:*:*:*:enterprise:*:*:*",
|
||||||
|
"matchCriteriaId": "81BBF090-0C40-4056-AE87-620051A1A349"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/433021",
|
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/433021",
|
||||||
"source": "cve@gitlab.com"
|
"source": "cve@gitlab.com",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Issue Tracking"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://hackerone.com/reports/2257080",
|
"url": "https://hackerone.com/reports/2257080",
|
||||||
"source": "cve@gitlab.com"
|
"source": "cve@gitlab.com",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Issue Tracking"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/433021",
|
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/433021",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Issue Tracking"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://hackerone.com/reports/2257080",
|
"url": "https://hackerone.com/reports/2257080",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Issue Tracking"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2023-6409",
|
"id": "CVE-2023-6409",
|
||||||
"sourceIdentifier": "cybersecurity@se.com",
|
"sourceIdentifier": "cybersecurity@se.com",
|
||||||
"published": "2024-02-14T17:15:11.247",
|
"published": "2024-02-14T17:15:11.247",
|
||||||
"lastModified": "2024-11-21T08:43:47.797",
|
"lastModified": "2024-12-11T19:33:54.427",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -36,6 +36,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 2.5,
|
"exploitabilityScore": 2.5,
|
||||||
"impactScore": 5.2
|
"impactScore": 5.2
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
|
||||||
|
"baseScore": 7.7,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.5,
|
||||||
|
"impactScore": 5.2
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -51,14 +71,44 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:schneider-electric:ecostruxure_control_expert:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "16.0",
|
||||||
|
"matchCriteriaId": "1FF68269-FEB0-41F0-9127-965AA4ADCC91"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:schneider-electric:ecostruxure_process_expert:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "2023",
|
||||||
|
"matchCriteriaId": "D8022AED-42C4-42F5-A30A-45F157D71CA9"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2024-044-01&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2024-044-01.pdf",
|
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2024-044-01&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2024-044-01.pdf",
|
||||||
"source": "cybersecurity@se.com"
|
"source": "cybersecurity@se.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2024-044-01&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2024-044-01.pdf",
|
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2024-044-01&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2024-044-01.pdf",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2023-6489",
|
"id": "CVE-2023-6489",
|
||||||
"sourceIdentifier": "cve@gitlab.com",
|
"sourceIdentifier": "cve@gitlab.com",
|
||||||
"published": "2024-04-12T01:15:57.340",
|
"published": "2024-04-12T01:15:57.340",
|
||||||
"lastModified": "2024-11-21T08:43:57.290",
|
"lastModified": "2024-12-11T19:06:06.800",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -36,6 +36,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 2.8,
|
"exploitabilityScore": 2.8,
|
||||||
"impactScore": 1.4
|
"impactScore": 1.4
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"baseScore": 6.5,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 3.6
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -49,24 +69,100 @@
|
|||||||
"value": "CWE-1333"
|
"value": "CWE-1333"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-1333"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
|
||||||
|
"versionStartIncluding": "16.7.7",
|
||||||
|
"versionEndExcluding": "16.8.6",
|
||||||
|
"matchCriteriaId": "CEC51D1F-F1B7-44E4-BB00-4C57D0F7988C"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
|
||||||
|
"versionStartIncluding": "16.7.7",
|
||||||
|
"versionEndExcluding": "16.8.6",
|
||||||
|
"matchCriteriaId": "754B2043-9069-40C7-8238-A6C163409EB0"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
|
||||||
|
"versionStartIncluding": "16.9.0",
|
||||||
|
"versionEndExcluding": "16.9.4",
|
||||||
|
"matchCriteriaId": "6C090961-541F-48DB-A98E-B7227E2BEF1E"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
|
||||||
|
"versionStartIncluding": "16.9.0",
|
||||||
|
"versionEndExcluding": "16.9.4",
|
||||||
|
"matchCriteriaId": "CE07887F-4BE5-4269-9C3B-10CF3E2E307E"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
|
||||||
|
"versionStartIncluding": "16.10.0",
|
||||||
|
"versionEndExcluding": "16.10.2",
|
||||||
|
"matchCriteriaId": "F66DCEFD-34BA-48AA-8154-D34480ADEF3B"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
|
||||||
|
"versionStartIncluding": "16.10.0",
|
||||||
|
"versionEndExcluding": "16.10.2",
|
||||||
|
"matchCriteriaId": "5D01A2BB-5343-4AF5-AAD0-9D3AB09C6CBE"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/433520",
|
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/433520",
|
||||||
"source": "cve@gitlab.com"
|
"source": "cve@gitlab.com",
|
||||||
|
"tags": [
|
||||||
|
"Broken Link"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://hackerone.com/reports/2262450",
|
"url": "https://hackerone.com/reports/2262450",
|
||||||
"source": "cve@gitlab.com"
|
"source": "cve@gitlab.com",
|
||||||
|
"tags": [
|
||||||
|
"Permissions Required"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/433520",
|
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/433520",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Broken Link"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://hackerone.com/reports/2262450",
|
"url": "https://hackerone.com/reports/2262450",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Permissions Required"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2023-6678",
|
"id": "CVE-2023-6678",
|
||||||
"sourceIdentifier": "cve@gitlab.com",
|
"sourceIdentifier": "cve@gitlab.com",
|
||||||
"published": "2024-04-12T01:15:57.563",
|
"published": "2024-04-12T01:15:57.563",
|
||||||
"lastModified": "2024-11-21T08:44:19.660",
|
"lastModified": "2024-12-11T19:58:13.110",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -36,6 +36,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 2.8,
|
"exploitabilityScore": 2.8,
|
||||||
"impactScore": 1.4
|
"impactScore": 1.4
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"baseScore": 6.5,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 3.6
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -49,24 +69,78 @@
|
|||||||
"value": "CWE-1333"
|
"value": "CWE-1333"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-1333"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
|
||||||
|
"versionEndExcluding": "16.8.6",
|
||||||
|
"matchCriteriaId": "44EA3B4E-8979-4BEC-9CB2-44C78FB1E37F"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
|
||||||
|
"versionStartIncluding": "16.9.0",
|
||||||
|
"versionEndExcluding": "16.9.4",
|
||||||
|
"matchCriteriaId": "CE07887F-4BE5-4269-9C3B-10CF3E2E307E"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
|
||||||
|
"versionStartIncluding": "16.10.0",
|
||||||
|
"versionEndExcluding": "16.10.2",
|
||||||
|
"matchCriteriaId": "5D01A2BB-5343-4AF5-AAD0-9D3AB09C6CBE"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/434689",
|
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/434689",
|
||||||
"source": "cve@gitlab.com"
|
"source": "cve@gitlab.com",
|
||||||
|
"tags": [
|
||||||
|
"Broken Link"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://hackerone.com/reports/2268037",
|
"url": "https://hackerone.com/reports/2268037",
|
||||||
"source": "cve@gitlab.com"
|
"source": "cve@gitlab.com",
|
||||||
|
"tags": [
|
||||||
|
"Permissions Required"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/434689",
|
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/434689",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Broken Link"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://hackerone.com/reports/2268037",
|
"url": "https://hackerone.com/reports/2268037",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Permissions Required"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-0199",
|
"id": "CVE-2024-0199",
|
||||||
"sourceIdentifier": "cve@gitlab.com",
|
"sourceIdentifier": "cve@gitlab.com",
|
||||||
"published": "2024-03-07T01:15:52.233",
|
"published": "2024-03-07T01:15:52.233",
|
||||||
"lastModified": "2024-11-21T08:46:02.880",
|
"lastModified": "2024-12-11T20:12:49.670",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -36,6 +36,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 1.3,
|
"exploitabilityScore": 1.3,
|
||||||
"impactScore": 5.8
|
"impactScore": 5.8
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 8.0,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.1,
|
||||||
|
"impactScore": 5.9
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -49,32 +69,116 @@
|
|||||||
"value": "CWE-863"
|
"value": "CWE-863"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-863"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
|
||||||
|
"versionStartIncluding": "11.3",
|
||||||
|
"versionEndExcluding": "16.7.7",
|
||||||
|
"matchCriteriaId": "B94BEED5-2938-43D0-A97E-8F47CB3A6DBC"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
|
||||||
|
"versionStartIncluding": "11.3",
|
||||||
|
"versionEndExcluding": "16.7.7",
|
||||||
|
"matchCriteriaId": "04AE6840-C038-43C3-B985-205C413C34B7"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
|
||||||
|
"versionStartIncluding": "16.8.0",
|
||||||
|
"versionEndExcluding": "16.8.4",
|
||||||
|
"matchCriteriaId": "C1D7C60A-061E-44F9-AE22-D548DE53B117"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
|
||||||
|
"versionStartIncluding": "16.8.0",
|
||||||
|
"versionEndExcluding": "16.8.4",
|
||||||
|
"matchCriteriaId": "2F20E088-CE58-4838-B756-612BB8687809"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
|
||||||
|
"versionStartIncluding": "16.9.0",
|
||||||
|
"versionEndExcluding": "16.9.2",
|
||||||
|
"matchCriteriaId": "D02C567D-8E1A-42C8-83A3-CF368AB3204F"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
|
||||||
|
"versionStartIncluding": "16.9.0",
|
||||||
|
"versionEndExcluding": "16.9.2",
|
||||||
|
"matchCriteriaId": "254A5DA0-23B6-45B2-A91E-F9825E717290"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://about.gitlab.com/releases/2024/03/06/security-release-gitlab-16-9-2-released/",
|
"url": "https://about.gitlab.com/releases/2024/03/06/security-release-gitlab-16-9-2-released/",
|
||||||
"source": "cve@gitlab.com"
|
"source": "cve@gitlab.com",
|
||||||
|
"tags": [
|
||||||
|
"Release Notes"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/436977",
|
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/436977",
|
||||||
"source": "cve@gitlab.com"
|
"source": "cve@gitlab.com",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Issue Tracking"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://hackerone.com/reports/2295423",
|
"url": "https://hackerone.com/reports/2295423",
|
||||||
"source": "cve@gitlab.com"
|
"source": "cve@gitlab.com",
|
||||||
|
"tags": [
|
||||||
|
"Permissions Required"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://about.gitlab.com/releases/2024/03/06/security-release-gitlab-16-9-2-released/",
|
"url": "https://about.gitlab.com/releases/2024/03/06/security-release-gitlab-16-9-2-released/",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Release Notes"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/436977",
|
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/436977",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Issue Tracking"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://hackerone.com/reports/2295423",
|
"url": "https://hackerone.com/reports/2295423",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Permissions Required"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-10946",
|
"id": "CVE-2024-10946",
|
||||||
"sourceIdentifier": "cna@vuldb.com",
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
"published": "2024-11-07T04:15:03.277",
|
"published": "2024-11-07T04:15:03.277",
|
||||||
"lastModified": "2024-11-08T19:01:25.633",
|
"lastModified": "2024-12-11T19:58:39.510",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -80,6 +80,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 1.2,
|
"exploitabilityScore": 1.2,
|
||||||
"impactScore": 3.4
|
"impactScore": 3.4
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 7.2,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.2,
|
||||||
|
"impactScore": 5.9
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"cvssMetricV2": [
|
"cvssMetricV2": [
|
||||||
@ -122,24 +142,68 @@
|
|||||||
"value": "CWE-89"
|
"value": "CWE-89"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-89"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:guangzhou_tuchuang:interlib:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndIncluding": "2.0.1",
|
||||||
|
"matchCriteriaId": "9AEC9567-DF51-466C-B31F-9008F3EE54E6"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?ctiid.283365",
|
"url": "https://vuldb.com/?ctiid.283365",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Permissions Required",
|
||||||
|
"VDB Entry"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?id.283365",
|
"url": "https://vuldb.com/?id.283365",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory",
|
||||||
|
"VDB Entry"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?submit.434449",
|
"url": "https://vuldb.com/?submit.434449",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory",
|
||||||
|
"VDB Entry"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://wiki.shikangsi.com/post/share/cfb12573-ca11-433d-b9a0-fce47837a1f5",
|
"url": "https://wiki.shikangsi.com/post/share/cfb12573-ca11-433d-b9a0-fce47837a1f5",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-10947",
|
"id": "CVE-2024-10947",
|
||||||
"sourceIdentifier": "cna@vuldb.com",
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
"published": "2024-11-07T04:15:03.590",
|
"published": "2024-11-07T04:15:03.590",
|
||||||
"lastModified": "2024-11-08T19:01:03.880",
|
"lastModified": "2024-12-11T19:58:55.657",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -80,6 +80,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 1.2,
|
"exploitabilityScore": 1.2,
|
||||||
"impactScore": 3.4
|
"impactScore": 3.4
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 7.2,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.2,
|
||||||
|
"impactScore": 5.9
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"cvssMetricV2": [
|
"cvssMetricV2": [
|
||||||
@ -124,22 +144,56 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:guangzhou_tuchuang:interlib:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndIncluding": "2.0.1",
|
||||||
|
"matchCriteriaId": "9AEC9567-DF51-466C-B31F-9008F3EE54E6"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?ctiid.283366",
|
"url": "https://vuldb.com/?ctiid.283366",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Permissions Required",
|
||||||
|
"VDB Entry"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?id.283366",
|
"url": "https://vuldb.com/?id.283366",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory",
|
||||||
|
"VDB Entry"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?submit.434450",
|
"url": "https://vuldb.com/?submit.434450",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory",
|
||||||
|
"VDB Entry"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://wiki.shikangsi.com/post/share/9dbc9639-ee9d-4328-9ed2-bc1bfbb2e741",
|
"url": "https://wiki.shikangsi.com/post/share/9dbc9639-ee9d-4328-9ed2-bc1bfbb2e741",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-11477",
|
"id": "CVE-2024-11477",
|
||||||
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||||
"published": "2024-11-22T21:15:08.613",
|
"published": "2024-11-22T21:15:08.613",
|
||||||
"lastModified": "2024-11-22T21:15:08.613",
|
"lastModified": "2024-12-11T19:23:36.800",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -16,6 +16,28 @@
|
|||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 7.8,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
],
|
||||||
"cvssMetricV30": [
|
"cvssMetricV30": [
|
||||||
{
|
{
|
||||||
"source": "zdi-disclosures@trendmicro.com",
|
"source": "zdi-disclosures@trendmicro.com",
|
||||||
@ -51,10 +73,32 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:7-zip:7-zip:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "24.07",
|
||||||
|
"matchCriteriaId": "01AEC7B4-8443-4267-A0E3-3C41EDFFBB38"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1532/",
|
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1532/",
|
||||||
"source": "zdi-disclosures@trendmicro.com"
|
"source": "zdi-disclosures@trendmicro.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory",
|
||||||
|
"VDB Entry"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-11961",
|
"id": "CVE-2024-11961",
|
||||||
"sourceIdentifier": "cna@vuldb.com",
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
"published": "2024-11-28T15:15:18.527",
|
"published": "2024-11-28T15:15:18.527",
|
||||||
"lastModified": "2024-11-28T15:15:18.527",
|
"lastModified": "2024-12-11T19:59:30.533",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -80,6 +80,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 3.9,
|
"exploitabilityScore": 3.9,
|
||||||
"impactScore": 1.4
|
"impactScore": 1.4
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||||
|
"baseScore": 7.5,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 3.6
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"cvssMetricV2": [
|
"cvssMetricV2": [
|
||||||
@ -122,24 +142,64 @@
|
|||||||
"value": "CWE-284"
|
"value": "CWE-284"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "NVD-CWE-noinfo"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:huayi-tec:jeewms:3.7:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "0DA92964-FED7-4734-A336-BABA2B90A97D"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/dycccccccc/JEEWMS/blob/main/JEEWMS%20Shipper%20Information%20Leakage.docx",
|
"url": "https://github.com/dycccccccc/JEEWMS/blob/main/JEEWMS%20Shipper%20Information%20Leakage.docx",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?ctiid.286343",
|
"url": "https://vuldb.com/?ctiid.286343",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Permissions Required"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?id.286343",
|
"url": "https://vuldb.com/?id.286343",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?submit.445596",
|
"url": "https://vuldb.com/?submit.445596",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-1299",
|
"id": "CVE-2024-1299",
|
||||||
"sourceIdentifier": "cve@gitlab.com",
|
"sourceIdentifier": "cve@gitlab.com",
|
||||||
"published": "2024-03-07T01:15:52.443",
|
"published": "2024-03-07T01:15:52.443",
|
||||||
"lastModified": "2024-11-21T08:50:16.040",
|
"lastModified": "2024-12-11T20:23:27.497",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -36,6 +36,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 1.2,
|
"exploitabilityScore": 1.2,
|
||||||
"impactScore": 5.2
|
"impactScore": 5.2
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
|
||||||
|
"baseScore": 8.1,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 5.2
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -49,32 +69,102 @@
|
|||||||
"value": "CWE-268"
|
"value": "CWE-268"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "NVD-CWE-noinfo"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
|
||||||
|
"versionStartIncluding": "16.8.0",
|
||||||
|
"versionEndExcluding": "16.8.4",
|
||||||
|
"matchCriteriaId": "C1D7C60A-061E-44F9-AE22-D548DE53B117"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
|
||||||
|
"versionStartIncluding": "16.8.0",
|
||||||
|
"versionEndExcluding": "16.8.4",
|
||||||
|
"matchCriteriaId": "2F20E088-CE58-4838-B756-612BB8687809"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
|
||||||
|
"versionStartIncluding": "16.9.0",
|
||||||
|
"versionEndExcluding": "16.9.2",
|
||||||
|
"matchCriteriaId": "D02C567D-8E1A-42C8-83A3-CF368AB3204F"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
|
||||||
|
"versionStartIncluding": "16.9.0",
|
||||||
|
"versionEndExcluding": "16.9.2",
|
||||||
|
"matchCriteriaId": "254A5DA0-23B6-45B2-A91E-F9825E717290"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://about.gitlab.com/releases/2024/03/06/security-release-gitlab-16-9-2-released/",
|
"url": "https://about.gitlab.com/releases/2024/03/06/security-release-gitlab-16-9-2-released/",
|
||||||
"source": "cve@gitlab.com"
|
"source": "cve@gitlab.com",
|
||||||
|
"tags": [
|
||||||
|
"Release Notes"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/440745",
|
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/440745",
|
||||||
"source": "cve@gitlab.com"
|
"source": "cve@gitlab.com",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Issue Tracking"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://hackerone.com/reports/2356976",
|
"url": "https://hackerone.com/reports/2356976",
|
||||||
"source": "cve@gitlab.com"
|
"source": "cve@gitlab.com",
|
||||||
|
"tags": [
|
||||||
|
"Permissions Required"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://about.gitlab.com/releases/2024/03/06/security-release-gitlab-16-9-2-released/",
|
"url": "https://about.gitlab.com/releases/2024/03/06/security-release-gitlab-16-9-2-released/",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Release Notes"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/440745",
|
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/440745",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Issue Tracking"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://hackerone.com/reports/2356976",
|
"url": "https://hackerone.com/reports/2356976",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Permissions Required"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-1347",
|
"id": "CVE-2024-1347",
|
||||||
"sourceIdentifier": "cve@gitlab.com",
|
"sourceIdentifier": "cve@gitlab.com",
|
||||||
"published": "2024-04-25T11:15:45.637",
|
"published": "2024-04-25T11:15:45.637",
|
||||||
"lastModified": "2024-11-21T08:50:22.910",
|
"lastModified": "2024-12-11T19:24:26.643",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -36,6 +36,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 2.8,
|
"exploitabilityScore": 2.8,
|
||||||
"impactScore": 1.4
|
"impactScore": 1.4
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||||
|
"baseScore": 5.3,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 1.4
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -49,24 +69,94 @@
|
|||||||
"value": "CWE-290"
|
"value": "CWE-290"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "NVD-CWE-noinfo"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
|
||||||
|
"versionEndExcluding": "16.9.6",
|
||||||
|
"matchCriteriaId": "2F0F0583-C3CF-434F-8ECF-5435FFC123FC"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
|
||||||
|
"versionEndExcluding": "16.9.6",
|
||||||
|
"matchCriteriaId": "9D88BF7B-8341-48C7-95B9-570908BC0898"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
|
||||||
|
"versionStartIncluding": "16.10.0",
|
||||||
|
"versionEndExcluding": "16.10.4",
|
||||||
|
"matchCriteriaId": "A56BDD5E-E19A-4C96-BFA1-0C9C714BC1DF"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
|
||||||
|
"versionStartIncluding": "16.10.0",
|
||||||
|
"versionEndExcluding": "16.10.4",
|
||||||
|
"matchCriteriaId": "4DFA9764-53C9-46A5-904A-109E64CF5942"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:gitlab:gitlab:16.11.0:*:*:*:community:*:*:*",
|
||||||
|
"matchCriteriaId": "DBAF6CB8-EEBE-4F61-9B80-165C351748E2"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:gitlab:gitlab:16.11.0:*:*:*:enterprise:*:*:*",
|
||||||
|
"matchCriteriaId": "BEF58721-8679-4EA5-A353-4ED035241169"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/441093",
|
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/441093",
|
||||||
"source": "cve@gitlab.com"
|
"source": "cve@gitlab.com",
|
||||||
|
"tags": [
|
||||||
|
"Broken Link"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://hackerone.com/reports/2355565",
|
"url": "https://hackerone.com/reports/2355565",
|
||||||
"source": "cve@gitlab.com"
|
"source": "cve@gitlab.com",
|
||||||
|
"tags": [
|
||||||
|
"Permissions Required"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/441093",
|
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/441093",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Broken Link"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://hackerone.com/reports/2355565",
|
"url": "https://hackerone.com/reports/2355565",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Permissions Required"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-1832",
|
"id": "CVE-2024-1832",
|
||||||
"sourceIdentifier": "cna@vuldb.com",
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
"published": "2024-02-23T20:15:52.070",
|
"published": "2024-02-23T20:15:52.070",
|
||||||
"lastModified": "2024-11-21T08:51:25.270",
|
"lastModified": "2024-12-11T19:57:16.060",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -36,6 +36,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 3.9,
|
"exploitabilityScore": 3.9,
|
||||||
"impactScore": 3.4
|
"impactScore": 3.4
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 9.8,
|
||||||
|
"baseSeverity": "CRITICAL",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 5.9
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"cvssMetricV2": [
|
"cvssMetricV2": [
|
||||||
@ -76,30 +96,71 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:nelzkie15:complete_file_management_system:1.0:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "284419EC-2195-4DD4-8FE9-B32FF9F08C20"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://toradah.notion.site/SQL-Injection-via-Admin-Login-Form-7372893848cb4bb996ae2c9effb0266a?pvs=25",
|
"url": "https://toradah.notion.site/SQL-Injection-via-Admin-Login-Form-7372893848cb4bb996ae2c9effb0266a?pvs=25",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?ctiid.254623",
|
"url": "https://vuldb.com/?ctiid.254623",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Permissions Required",
|
||||||
|
"VDB Entry"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?id.254623",
|
"url": "https://vuldb.com/?id.254623",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory",
|
||||||
|
"VDB Entry"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://toradah.notion.site/SQL-Injection-via-Admin-Login-Form-7372893848cb4bb996ae2c9effb0266a?pvs=25",
|
"url": "https://toradah.notion.site/SQL-Injection-via-Admin-Login-Form-7372893848cb4bb996ae2c9effb0266a?pvs=25",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?ctiid.254623",
|
"url": "https://vuldb.com/?ctiid.254623",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Permissions Required",
|
||||||
|
"VDB Entry"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?id.254623",
|
"url": "https://vuldb.com/?id.254623",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory",
|
||||||
|
"VDB Entry"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-1833",
|
"id": "CVE-2024-1833",
|
||||||
"sourceIdentifier": "cna@vuldb.com",
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
"published": "2024-02-23T20:15:52.307",
|
"published": "2024-02-23T20:15:52.307",
|
||||||
"lastModified": "2024-11-21T08:51:25.440",
|
"lastModified": "2024-12-11T19:57:54.520",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -36,6 +36,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 3.9,
|
"exploitabilityScore": 3.9,
|
||||||
"impactScore": 3.4
|
"impactScore": 3.4
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 9.8,
|
||||||
|
"baseSeverity": "CRITICAL",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 5.9
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"cvssMetricV2": [
|
"cvssMetricV2": [
|
||||||
@ -76,30 +96,71 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:walterjnr1:employee_management_system:1.0:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "FF3F7354-F778-4707-BE75-ABC13A806D29"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/employee-management-system.md#2accountloginphp",
|
"url": "https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/employee-management-system.md#2accountloginphp",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?ctiid.254624",
|
"url": "https://vuldb.com/?ctiid.254624",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Permissions Required",
|
||||||
|
"VDB Entry"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?id.254624",
|
"url": "https://vuldb.com/?id.254624",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory",
|
||||||
|
"VDB Entry"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/employee-management-system.md#2accountloginphp",
|
"url": "https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/employee-management-system.md#2accountloginphp",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?ctiid.254624",
|
"url": "https://vuldb.com/?ctiid.254624",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Permissions Required",
|
||||||
|
"VDB Entry"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?id.254624",
|
"url": "https://vuldb.com/?id.254624",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory",
|
||||||
|
"VDB Entry"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-21915",
|
"id": "CVE-2024-21915",
|
||||||
"sourceIdentifier": "PSIRT@rockwellautomation.com",
|
"sourceIdentifier": "PSIRT@rockwellautomation.com",
|
||||||
"published": "2024-02-16T19:15:08.460",
|
"published": "2024-02-16T19:15:08.460",
|
||||||
"lastModified": "2024-11-21T08:55:16.073",
|
"lastModified": "2024-12-11T19:31:28.200",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -36,6 +36,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 2.2,
|
"exploitabilityScore": 2.2,
|
||||||
"impactScore": 6.0
|
"impactScore": 6.0
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 8.8,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 5.9
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -49,16 +69,52 @@
|
|||||||
"value": "CWE-732"
|
"value": "CWE-732"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-732"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:rockwellautomation:factorytalk_services_platform:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "2.74",
|
||||||
|
"matchCriteriaId": "1B7CF7EA-7F18-4103-8E35-80800D1FA9E5"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://www.rockwellautomation.com/en-us/support/advisory.SD1662.html",
|
"url": "https://www.rockwellautomation.com/en-us/support/advisory.SD1662.html",
|
||||||
"source": "PSIRT@rockwellautomation.com"
|
"source": "PSIRT@rockwellautomation.com",
|
||||||
|
"tags": [
|
||||||
|
"Broken Link",
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://www.rockwellautomation.com/en-us/support/advisory.SD1662.html",
|
"url": "https://www.rockwellautomation.com/en-us/support/advisory.SD1662.html",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Broken Link",
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-2279",
|
"id": "CVE-2024-2279",
|
||||||
"sourceIdentifier": "cve@gitlab.com",
|
"sourceIdentifier": "cve@gitlab.com",
|
||||||
"published": "2024-04-12T01:15:57.750",
|
"published": "2024-04-12T01:15:57.750",
|
||||||
"lastModified": "2024-11-21T09:09:25.050",
|
"lastModified": "2024-12-11T19:29:27.377",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -36,6 +36,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 2.3,
|
"exploitabilityScore": 2.3,
|
||||||
"impactScore": 5.8
|
"impactScore": 5.8
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"baseScore": 5.4,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.3,
|
||||||
|
"impactScore": 2.7
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -49,24 +69,102 @@
|
|||||||
"value": "CWE-79"
|
"value": "CWE-79"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
|
||||||
|
"versionStartIncluding": "16.7.0",
|
||||||
|
"versionEndExcluding": "16.8.6",
|
||||||
|
"matchCriteriaId": "E736CD45-142B-4D8F-AAFA-D4CEDA8A9BA4"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
|
||||||
|
"versionStartIncluding": "16.7.0",
|
||||||
|
"versionEndExcluding": "16.8.6",
|
||||||
|
"matchCriteriaId": "37750CD6-1FA5-49CE-91AF-1A503738727D"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
|
||||||
|
"versionStartIncluding": "16.9.0",
|
||||||
|
"versionEndExcluding": "16.9.4",
|
||||||
|
"matchCriteriaId": "6C090961-541F-48DB-A98E-B7227E2BEF1E"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
|
||||||
|
"versionStartIncluding": "16.9.0",
|
||||||
|
"versionEndExcluding": "16.9.4",
|
||||||
|
"matchCriteriaId": "CE07887F-4BE5-4269-9C3B-10CF3E2E307E"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
|
||||||
|
"versionStartIncluding": "16.10.0",
|
||||||
|
"versionEndExcluding": "16.10.2",
|
||||||
|
"matchCriteriaId": "F66DCEFD-34BA-48AA-8154-D34480ADEF3B"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
|
||||||
|
"versionStartIncluding": "16.10.0",
|
||||||
|
"versionEndExcluding": "16.10.2",
|
||||||
|
"matchCriteriaId": "5D01A2BB-5343-4AF5-AAD0-9D3AB09C6CBE"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/448469",
|
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/448469",
|
||||||
"source": "cve@gitlab.com"
|
"source": "cve@gitlab.com",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Issue Tracking"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://hackerone.com/reports/2404710",
|
"url": "https://hackerone.com/reports/2404710",
|
||||||
"source": "cve@gitlab.com"
|
"source": "cve@gitlab.com",
|
||||||
|
"tags": [
|
||||||
|
"Permissions Required"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/448469",
|
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/448469",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Issue Tracking"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://hackerone.com/reports/2404710",
|
"url": "https://hackerone.com/reports/2404710",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Permissions Required"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-23662",
|
"id": "CVE-2024-23662",
|
||||||
"sourceIdentifier": "psirt@fortinet.com",
|
"sourceIdentifier": "psirt@fortinet.com",
|
||||||
"published": "2024-04-09T15:15:31.370",
|
"published": "2024-04-09T15:15:31.370",
|
||||||
"lastModified": "2024-11-21T08:58:07.050",
|
"lastModified": "2024-12-11T19:11:44.790",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -36,6 +36,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 3.9,
|
"exploitabilityScore": 3.9,
|
||||||
"impactScore": 1.4
|
"impactScore": 1.4
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||||
|
"baseScore": 7.5,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 3.6
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -49,16 +69,58 @@
|
|||||||
"value": "CWE-200"
|
"value": "CWE-200"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "NVD-CWE-noinfo"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.4.0",
|
||||||
|
"versionEndExcluding": "7.2.6",
|
||||||
|
"matchCriteriaId": "C84C7A2F-EE15-4CAA-BC3F-A7FDD8A4574F"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "7.4.0",
|
||||||
|
"versionEndExcluding": "7.4.2",
|
||||||
|
"matchCriteriaId": "4316C2EA-3D6E-4A0C-B81D-ADCE040E03E0"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://fortiguard.com/psirt/FG-IR-23-224",
|
"url": "https://fortiguard.com/psirt/FG-IR-23-224",
|
||||||
"source": "psirt@fortinet.com"
|
"source": "psirt@fortinet.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://fortiguard.com/psirt/FG-IR-23-224",
|
"url": "https://fortiguard.com/psirt/FG-IR-23-224",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-26007",
|
"id": "CVE-2024-26007",
|
||||||
"sourceIdentifier": "psirt@fortinet.com",
|
"sourceIdentifier": "psirt@fortinet.com",
|
||||||
"published": "2024-05-14T17:15:40.370",
|
"published": "2024-05-14T17:15:40.370",
|
||||||
"lastModified": "2024-11-21T09:01:45.567",
|
"lastModified": "2024-12-11T19:55:59.830",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -36,6 +36,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 3.9,
|
"exploitabilityScore": 3.9,
|
||||||
"impactScore": 1.4
|
"impactScore": 1.4
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"baseScore": 7.5,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 3.6
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -49,16 +69,49 @@
|
|||||||
"value": "CWE-703"
|
"value": "CWE-703"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "NVD-CWE-Other"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:fortinet:fortios:7.4.1:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "17FE168A-0EA4-467C-91D2-87EB6D83917A"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://fortiguard.com/psirt/FG-IR-24-017",
|
"url": "https://fortiguard.com/psirt/FG-IR-24-017",
|
||||||
"source": "psirt@fortinet.com"
|
"source": "psirt@fortinet.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://fortiguard.com/psirt/FG-IR-24-017",
|
"url": "https://fortiguard.com/psirt/FG-IR-24-017",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-26010",
|
"id": "CVE-2024-26010",
|
||||||
"sourceIdentifier": "psirt@fortinet.com",
|
"sourceIdentifier": "psirt@fortinet.com",
|
||||||
"published": "2024-06-11T15:16:04.473",
|
"published": "2024-06-11T15:16:04.473",
|
||||||
"lastModified": "2024-11-21T09:01:45.697",
|
"lastModified": "2024-12-11T19:54:35.323",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -36,6 +36,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 1.6,
|
"exploitabilityScore": 1.6,
|
||||||
"impactScore": 5.9
|
"impactScore": 5.9
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 7.5,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "HIGH",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.6,
|
||||||
|
"impactScore": 5.9
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -49,16 +69,137 @@
|
|||||||
"value": "CWE-121"
|
"value": "CWE-121"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-787"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.0.0",
|
||||||
|
"versionEndExcluding": "7.0.15",
|
||||||
|
"matchCriteriaId": "4A93633F-8865-49D7-A5CE-F7D009DFB901"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "7.2.0",
|
||||||
|
"versionEndExcluding": "7.2.8",
|
||||||
|
"matchCriteriaId": "A6D2A14F-3916-45A0-AD4D-27C60E00AEC0"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "7.4.0",
|
||||||
|
"versionEndExcluding": "7.4.4",
|
||||||
|
"matchCriteriaId": "1FDDB5F3-D229-4208-9110-8860A03C8B59"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:fortinet:fortipam:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "1.0.0",
|
||||||
|
"versionEndIncluding": "1.3.0",
|
||||||
|
"matchCriteriaId": "62F2452A-7AF9-4BD2-932D-D6414699C793"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "1.0.0",
|
||||||
|
"versionEndExcluding": "7.0.17",
|
||||||
|
"matchCriteriaId": "E7E7DA8E-34CB-4527-A4A0-1EDBFBBDA894"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "7.2.0",
|
||||||
|
"versionEndExcluding": "7.2.10",
|
||||||
|
"matchCriteriaId": "EDFFA2C3-0A23-4884-B751-785BE598DFF3"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "7.4.0",
|
||||||
|
"versionEndExcluding": "7.4.4",
|
||||||
|
"matchCriteriaId": "3F2C29AD-A11F-4A5F-8BB0-8600D5F77E72"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:fortinet:fortiswitchmanager:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "7.0.1",
|
||||||
|
"versionEndExcluding": "7.0.4",
|
||||||
|
"matchCriteriaId": "EFB333FC-4406-4EBD-B6F2-6C41BCE2E742"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:fortinet:fortiswitchmanager:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "7.2.0",
|
||||||
|
"versionEndExcluding": "7.2.4",
|
||||||
|
"matchCriteriaId": "EB0D2553-E4E6-454A-80F6-9D014A4710D3"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-036",
|
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-036",
|
||||||
"source": "psirt@fortinet.com"
|
"source": "psirt@fortinet.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-036",
|
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-036",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-27794",
|
"id": "CVE-2024-27794",
|
||||||
"sourceIdentifier": "product-security@apple.com",
|
"sourceIdentifier": "product-security@apple.com",
|
||||||
"published": "2024-04-15T23:15:06.890",
|
"published": "2024-04-15T23:15:06.890",
|
||||||
"lastModified": "2024-11-21T09:05:04.223",
|
"lastModified": "2024-12-11T19:56:37.067",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -17,6 +17,26 @@
|
|||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"baseScore": 6.1,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 2.7
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -40,6 +60,16 @@
|
|||||||
]
|
]
|
||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -51,14 +81,38 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:claris:filemaker_server:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "20.3.2",
|
||||||
|
"matchCriteriaId": "C78CBE2B-EEF8-4BC4-ADE2-339D6D23019B"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://support.claris.com/s/article/Security-Vulnerability-in-Claris-FileMaker-Server?language=en_US",
|
"url": "https://support.claris.com/s/article/Security-Vulnerability-in-Claris-FileMaker-Server?language=en_US",
|
||||||
"source": "product-security@apple.com"
|
"source": "product-security@apple.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://support.claris.com/s/article/Security-Vulnerability-in-Claris-FileMaker-Server?language=en_US",
|
"url": "https://support.claris.com/s/article/Security-Vulnerability-in-Claris-FileMaker-Server?language=en_US",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-2818",
|
"id": "CVE-2024-2818",
|
||||||
"sourceIdentifier": "cve@gitlab.com",
|
"sourceIdentifier": "cve@gitlab.com",
|
||||||
"published": "2024-03-28T08:15:26.590",
|
"published": "2024-03-28T08:15:26.590",
|
||||||
"lastModified": "2024-11-21T09:10:35.943",
|
"lastModified": "2024-12-11T20:25:14.693",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -36,6 +36,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 2.8,
|
"exploitabilityScore": 2.8,
|
||||||
"impactScore": 1.4
|
"impactScore": 1.4
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"baseScore": 6.5,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 3.6
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -49,16 +69,80 @@
|
|||||||
"value": "CWE-770"
|
"value": "CWE-770"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-770"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
|
||||||
|
"versionEndExcluding": "16.8.5",
|
||||||
|
"matchCriteriaId": "4867F1FA-53C2-4AB4-ACF1-257BA2125484"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
|
||||||
|
"versionEndExcluding": "16.8.5",
|
||||||
|
"matchCriteriaId": "D0918E4A-3AD6-461C-A693-9A7273757AC2"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
|
||||||
|
"versionStartIncluding": "16.9.0",
|
||||||
|
"versionEndExcluding": "16.9.3",
|
||||||
|
"matchCriteriaId": "D8B59378-A2DC-4C3D-A4F8-D3913AFD46D0"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
|
||||||
|
"versionStartIncluding": "16.9.0",
|
||||||
|
"versionEndExcluding": "16.9.3",
|
||||||
|
"matchCriteriaId": "EE028131-A200-472E-8CA5-167A4057DB4A"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:gitlab:gitlab:16.10.0:*:*:*:community:*:*:*",
|
||||||
|
"matchCriteriaId": "D7864CB7-B9B8-45D3-AD0E-AE9560A23011"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:gitlab:gitlab:16.10.0:*:*:*:enterprise:*:*:*",
|
||||||
|
"matchCriteriaId": "81BBF090-0C40-4056-AE87-620051A1A349"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/434803",
|
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/434803",
|
||||||
"source": "cve@gitlab.com"
|
"source": "cve@gitlab.com",
|
||||||
|
"tags": [
|
||||||
|
"Broken Link"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/434803",
|
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/434803",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Broken Link"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-3092",
|
"id": "CVE-2024-3092",
|
||||||
"sourceIdentifier": "cve@gitlab.com",
|
"sourceIdentifier": "cve@gitlab.com",
|
||||||
"published": "2024-04-12T01:15:57.937",
|
"published": "2024-04-12T01:15:57.937",
|
||||||
"lastModified": "2024-11-21T09:28:52.960",
|
"lastModified": "2024-12-11T19:19:05.273",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -36,6 +36,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 2.3,
|
"exploitabilityScore": 2.3,
|
||||||
"impactScore": 5.8
|
"impactScore": 5.8
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"baseScore": 5.4,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.3,
|
||||||
|
"impactScore": 2.7
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -49,24 +69,88 @@
|
|||||||
"value": "CWE-79"
|
"value": "CWE-79"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
|
||||||
|
"versionStartIncluding": "16.9.0",
|
||||||
|
"versionEndExcluding": "16.9.4",
|
||||||
|
"matchCriteriaId": "6C090961-541F-48DB-A98E-B7227E2BEF1E"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
|
||||||
|
"versionStartIncluding": "16.9.0",
|
||||||
|
"versionEndExcluding": "16.9.4",
|
||||||
|
"matchCriteriaId": "CE07887F-4BE5-4269-9C3B-10CF3E2E307E"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
|
||||||
|
"versionStartIncluding": "16.10.0",
|
||||||
|
"versionEndExcluding": "16.10.2",
|
||||||
|
"matchCriteriaId": "F66DCEFD-34BA-48AA-8154-D34480ADEF3B"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
|
||||||
|
"versionStartIncluding": "16.10.0",
|
||||||
|
"versionEndExcluding": "16.10.2",
|
||||||
|
"matchCriteriaId": "5D01A2BB-5343-4AF5-AAD0-9D3AB09C6CBE"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/452510",
|
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/452510",
|
||||||
"source": "cve@gitlab.com"
|
"source": "cve@gitlab.com",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Issue Tracking"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://hackerone.com/reports/2441257",
|
"url": "https://hackerone.com/reports/2441257",
|
||||||
"source": "cve@gitlab.com"
|
"source": "cve@gitlab.com",
|
||||||
|
"tags": [
|
||||||
|
"Permissions Required"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/452510",
|
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/452510",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Issue Tracking"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://hackerone.com/reports/2441257",
|
"url": "https://hackerone.com/reports/2441257",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Permissions Required"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-40824",
|
"id": "CVE-2024-40824",
|
||||||
"sourceIdentifier": "product-security@apple.com",
|
"sourceIdentifier": "product-security@apple.com",
|
||||||
"published": "2024-07-29T23:15:13.990",
|
"published": "2024-07-29T23:15:13.990",
|
||||||
"lastModified": "2024-11-21T09:31:42.770",
|
"lastModified": "2024-12-11T19:46:47.707",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -17,6 +17,26 @@
|
|||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||||||
|
"baseScore": 5.5,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 3.6
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -40,6 +60,16 @@
|
|||||||
]
|
]
|
||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "NVD-CWE-noinfo"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -51,70 +81,161 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "17.6",
|
||||||
|
"matchCriteriaId": "A8A1B228-89B1-470E-9B6E-8553E561E062"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "17.6",
|
||||||
|
"matchCriteriaId": "1E393815-B3B5-4FF9-9D1D-AA3EA9C5D352"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "14.0",
|
||||||
|
"versionEndExcluding": "14.6",
|
||||||
|
"matchCriteriaId": "51E2E93B-C5A3-4C83-B806-2EC555AD45FE"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "17.6",
|
||||||
|
"matchCriteriaId": "9FB1D28B-EF0E-4CA0-90F7-073A85D001E5"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "10.6",
|
||||||
|
"matchCriteriaId": "035D8460-BD6F-4696-9D7B-BA571A994FD0"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "http://seclists.org/fulldisclosure/2024/Jul/16",
|
"url": "http://seclists.org/fulldisclosure/2024/Jul/16",
|
||||||
"source": "product-security@apple.com"
|
"source": "product-security@apple.com",
|
||||||
|
"tags": [
|
||||||
|
"Mailing List"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "http://seclists.org/fulldisclosure/2024/Jul/18",
|
"url": "http://seclists.org/fulldisclosure/2024/Jul/18",
|
||||||
"source": "product-security@apple.com"
|
"source": "product-security@apple.com",
|
||||||
|
"tags": [
|
||||||
|
"Mailing List"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "http://seclists.org/fulldisclosure/2024/Jul/21",
|
"url": "http://seclists.org/fulldisclosure/2024/Jul/21",
|
||||||
"source": "product-security@apple.com"
|
"source": "product-security@apple.com",
|
||||||
|
"tags": [
|
||||||
|
"Mailing List"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "http://seclists.org/fulldisclosure/2024/Jul/22",
|
"url": "http://seclists.org/fulldisclosure/2024/Jul/22",
|
||||||
"source": "product-security@apple.com"
|
"source": "product-security@apple.com",
|
||||||
|
"tags": [
|
||||||
|
"Mailing List"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://support.apple.com/en-us/HT214117",
|
"url": "https://support.apple.com/en-us/HT214117",
|
||||||
"source": "product-security@apple.com"
|
"source": "product-security@apple.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://support.apple.com/en-us/HT214119",
|
"url": "https://support.apple.com/en-us/HT214119",
|
||||||
"source": "product-security@apple.com"
|
"source": "product-security@apple.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://support.apple.com/en-us/HT214122",
|
"url": "https://support.apple.com/en-us/HT214122",
|
||||||
"source": "product-security@apple.com"
|
"source": "product-security@apple.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://support.apple.com/en-us/HT214124",
|
"url": "https://support.apple.com/en-us/HT214124",
|
||||||
"source": "product-security@apple.com"
|
"source": "product-security@apple.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "http://seclists.org/fulldisclosure/2024/Jul/16",
|
"url": "http://seclists.org/fulldisclosure/2024/Jul/16",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Mailing List"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "http://seclists.org/fulldisclosure/2024/Jul/18",
|
"url": "http://seclists.org/fulldisclosure/2024/Jul/18",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Mailing List"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "http://seclists.org/fulldisclosure/2024/Jul/21",
|
"url": "http://seclists.org/fulldisclosure/2024/Jul/21",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Mailing List"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "http://seclists.org/fulldisclosure/2024/Jul/22",
|
"url": "http://seclists.org/fulldisclosure/2024/Jul/22",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Mailing List"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://support.apple.com/en-us/HT214117",
|
"url": "https://support.apple.com/en-us/HT214117",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://support.apple.com/en-us/HT214119",
|
"url": "https://support.apple.com/en-us/HT214119",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://support.apple.com/en-us/HT214122",
|
"url": "https://support.apple.com/en-us/HT214122",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://support.apple.com/en-us/HT214124",
|
"url": "https://support.apple.com/en-us/HT214124",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-40828",
|
"id": "CVE-2024-40828",
|
||||||
"sourceIdentifier": "product-security@apple.com",
|
"sourceIdentifier": "product-security@apple.com",
|
||||||
"published": "2024-07-29T23:15:14.130",
|
"published": "2024-07-29T23:15:14.130",
|
||||||
"lastModified": "2024-11-21T09:31:43.340",
|
"lastModified": "2024-12-11T19:46:12.057",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -17,6 +17,26 @@
|
|||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 7.8,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 5.9
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -40,6 +60,16 @@
|
|||||||
]
|
]
|
||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "NVD-CWE-noinfo"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -51,54 +81,123 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "12.0",
|
||||||
|
"versionEndExcluding": "12.7.6",
|
||||||
|
"matchCriteriaId": "EA924D87-8FAE-4E34-83F7-A5E25C7450E5"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "13.0",
|
||||||
|
"versionEndExcluding": "13.6.8",
|
||||||
|
"matchCriteriaId": "7008225C-B5B9-4F87-9392-DD2080717E9A"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "14.0",
|
||||||
|
"versionEndExcluding": "14.6",
|
||||||
|
"matchCriteriaId": "51E2E93B-C5A3-4C83-B806-2EC555AD45FE"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "http://seclists.org/fulldisclosure/2024/Jul/18",
|
"url": "http://seclists.org/fulldisclosure/2024/Jul/18",
|
||||||
"source": "product-security@apple.com"
|
"source": "product-security@apple.com",
|
||||||
|
"tags": [
|
||||||
|
"Mailing List"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "http://seclists.org/fulldisclosure/2024/Jul/19",
|
"url": "http://seclists.org/fulldisclosure/2024/Jul/19",
|
||||||
"source": "product-security@apple.com"
|
"source": "product-security@apple.com",
|
||||||
|
"tags": [
|
||||||
|
"Mailing List"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "http://seclists.org/fulldisclosure/2024/Jul/20",
|
"url": "http://seclists.org/fulldisclosure/2024/Jul/20",
|
||||||
"source": "product-security@apple.com"
|
"source": "product-security@apple.com",
|
||||||
|
"tags": [
|
||||||
|
"Mailing List"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://support.apple.com/en-us/HT214118",
|
"url": "https://support.apple.com/en-us/HT214118",
|
||||||
"source": "product-security@apple.com"
|
"source": "product-security@apple.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://support.apple.com/en-us/HT214119",
|
"url": "https://support.apple.com/en-us/HT214119",
|
||||||
"source": "product-security@apple.com"
|
"source": "product-security@apple.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://support.apple.com/en-us/HT214120",
|
"url": "https://support.apple.com/en-us/HT214120",
|
||||||
"source": "product-security@apple.com"
|
"source": "product-security@apple.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "http://seclists.org/fulldisclosure/2024/Jul/18",
|
"url": "http://seclists.org/fulldisclosure/2024/Jul/18",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Mailing List"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "http://seclists.org/fulldisclosure/2024/Jul/19",
|
"url": "http://seclists.org/fulldisclosure/2024/Jul/19",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Mailing List"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "http://seclists.org/fulldisclosure/2024/Jul/20",
|
"url": "http://seclists.org/fulldisclosure/2024/Jul/20",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Mailing List"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://support.apple.com/en-us/HT214118",
|
"url": "https://support.apple.com/en-us/HT214118",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://support.apple.com/en-us/HT214119",
|
"url": "https://support.apple.com/en-us/HT214119",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://support.apple.com/en-us/HT214120",
|
"url": "https://support.apple.com/en-us/HT214120",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-40829",
|
"id": "CVE-2024-40829",
|
||||||
"sourceIdentifier": "product-security@apple.com",
|
"sourceIdentifier": "product-security@apple.com",
|
||||||
"published": "2024-07-29T23:15:14.193",
|
"published": "2024-07-29T23:15:14.193",
|
||||||
"lastModified": "2024-11-21T09:31:43.537",
|
"lastModified": "2024-12-11T19:45:39.007",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -17,6 +17,26 @@
|
|||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||||
|
"baseScore": 4.6,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "PHYSICAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 0.9,
|
||||||
|
"impactScore": 3.6
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -39,70 +59,181 @@
|
|||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "NVD-CWE-noinfo"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "16.7.9",
|
||||||
|
"matchCriteriaId": "29A9994D-AE71-45E0-8CC5-E6219420F7E8"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "17.0",
|
||||||
|
"versionEndExcluding": "17.6",
|
||||||
|
"matchCriteriaId": "B191C80F-3801-4AD0-9A63-EB294A029D7C"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "16.7.9",
|
||||||
|
"matchCriteriaId": "1ACEA981-1D96-49F1-8048-74D21D71FD39"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "17.0",
|
||||||
|
"versionEndExcluding": "17.6",
|
||||||
|
"matchCriteriaId": "34E8C966-19C7-4376-A0C3-A242720F62DF"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "13.0",
|
||||||
|
"versionEndExcluding": "13.6.8",
|
||||||
|
"matchCriteriaId": "7008225C-B5B9-4F87-9392-DD2080717E9A"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "10.6",
|
||||||
|
"matchCriteriaId": "035D8460-BD6F-4696-9D7B-BA571A994FD0"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "http://seclists.org/fulldisclosure/2024/Jul/16",
|
"url": "http://seclists.org/fulldisclosure/2024/Jul/16",
|
||||||
"source": "product-security@apple.com"
|
"source": "product-security@apple.com",
|
||||||
|
"tags": [
|
||||||
|
"Mailing List"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "http://seclists.org/fulldisclosure/2024/Jul/17",
|
"url": "http://seclists.org/fulldisclosure/2024/Jul/17",
|
||||||
"source": "product-security@apple.com"
|
"source": "product-security@apple.com",
|
||||||
|
"tags": [
|
||||||
|
"Mailing List"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "http://seclists.org/fulldisclosure/2024/Jul/19",
|
"url": "http://seclists.org/fulldisclosure/2024/Jul/19",
|
||||||
"source": "product-security@apple.com"
|
"source": "product-security@apple.com",
|
||||||
|
"tags": [
|
||||||
|
"Mailing List"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "http://seclists.org/fulldisclosure/2024/Jul/21",
|
"url": "http://seclists.org/fulldisclosure/2024/Jul/21",
|
||||||
"source": "product-security@apple.com"
|
"source": "product-security@apple.com",
|
||||||
|
"tags": [
|
||||||
|
"Mailing List"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://support.apple.com/en-us/HT214116",
|
"url": "https://support.apple.com/en-us/HT214116",
|
||||||
"source": "product-security@apple.com"
|
"source": "product-security@apple.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://support.apple.com/en-us/HT214117",
|
"url": "https://support.apple.com/en-us/HT214117",
|
||||||
"source": "product-security@apple.com"
|
"source": "product-security@apple.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://support.apple.com/en-us/HT214120",
|
"url": "https://support.apple.com/en-us/HT214120",
|
||||||
"source": "product-security@apple.com"
|
"source": "product-security@apple.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://support.apple.com/en-us/HT214124",
|
"url": "https://support.apple.com/en-us/HT214124",
|
||||||
"source": "product-security@apple.com"
|
"source": "product-security@apple.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "http://seclists.org/fulldisclosure/2024/Jul/16",
|
"url": "http://seclists.org/fulldisclosure/2024/Jul/16",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Mailing List"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "http://seclists.org/fulldisclosure/2024/Jul/17",
|
"url": "http://seclists.org/fulldisclosure/2024/Jul/17",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Mailing List"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "http://seclists.org/fulldisclosure/2024/Jul/19",
|
"url": "http://seclists.org/fulldisclosure/2024/Jul/19",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Mailing List"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "http://seclists.org/fulldisclosure/2024/Jul/21",
|
"url": "http://seclists.org/fulldisclosure/2024/Jul/21",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Mailing List"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://support.apple.com/en-us/HT214116",
|
"url": "https://support.apple.com/en-us/HT214116",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://support.apple.com/en-us/HT214117",
|
"url": "https://support.apple.com/en-us/HT214117",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://support.apple.com/en-us/HT214120",
|
"url": "https://support.apple.com/en-us/HT214120",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://support.apple.com/en-us/HT214124",
|
"url": "https://support.apple.com/en-us/HT214124",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-40836",
|
"id": "CVE-2024-40836",
|
||||||
"sourceIdentifier": "product-security@apple.com",
|
"sourceIdentifier": "product-security@apple.com",
|
||||||
"published": "2024-07-29T23:15:14.570",
|
"published": "2024-07-29T23:15:14.570",
|
||||||
"lastModified": "2024-11-21T09:31:44.590",
|
"lastModified": "2024-12-11T19:40:36.427",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -17,6 +17,26 @@
|
|||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||||
|
"baseScore": 5.5,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 3.6
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -39,70 +59,181 @@
|
|||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "NVD-CWE-noinfo"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "16.7.9",
|
||||||
|
"matchCriteriaId": "29A9994D-AE71-45E0-8CC5-E6219420F7E8"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "17.0",
|
||||||
|
"versionEndExcluding": "17.6",
|
||||||
|
"matchCriteriaId": "B191C80F-3801-4AD0-9A63-EB294A029D7C"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "16.7.9",
|
||||||
|
"matchCriteriaId": "1ACEA981-1D96-49F1-8048-74D21D71FD39"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "17.0",
|
||||||
|
"versionEndExcluding": "17.6",
|
||||||
|
"matchCriteriaId": "34E8C966-19C7-4376-A0C3-A242720F62DF"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "14.0",
|
||||||
|
"versionEndExcluding": "14.6",
|
||||||
|
"matchCriteriaId": "51E2E93B-C5A3-4C83-B806-2EC555AD45FE"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "10.6",
|
||||||
|
"matchCriteriaId": "035D8460-BD6F-4696-9D7B-BA571A994FD0"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "http://seclists.org/fulldisclosure/2024/Jul/16",
|
"url": "http://seclists.org/fulldisclosure/2024/Jul/16",
|
||||||
"source": "product-security@apple.com"
|
"source": "product-security@apple.com",
|
||||||
|
"tags": [
|
||||||
|
"Mailing List"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "http://seclists.org/fulldisclosure/2024/Jul/17",
|
"url": "http://seclists.org/fulldisclosure/2024/Jul/17",
|
||||||
"source": "product-security@apple.com"
|
"source": "product-security@apple.com",
|
||||||
|
"tags": [
|
||||||
|
"Mailing List"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "http://seclists.org/fulldisclosure/2024/Jul/18",
|
"url": "http://seclists.org/fulldisclosure/2024/Jul/18",
|
||||||
"source": "product-security@apple.com"
|
"source": "product-security@apple.com",
|
||||||
|
"tags": [
|
||||||
|
"Mailing List"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "http://seclists.org/fulldisclosure/2024/Jul/21",
|
"url": "http://seclists.org/fulldisclosure/2024/Jul/21",
|
||||||
"source": "product-security@apple.com"
|
"source": "product-security@apple.com",
|
||||||
|
"tags": [
|
||||||
|
"Mailing List"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://support.apple.com/en-us/HT214116",
|
"url": "https://support.apple.com/en-us/HT214116",
|
||||||
"source": "product-security@apple.com"
|
"source": "product-security@apple.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://support.apple.com/en-us/HT214117",
|
"url": "https://support.apple.com/en-us/HT214117",
|
||||||
"source": "product-security@apple.com"
|
"source": "product-security@apple.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://support.apple.com/en-us/HT214119",
|
"url": "https://support.apple.com/en-us/HT214119",
|
||||||
"source": "product-security@apple.com"
|
"source": "product-security@apple.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://support.apple.com/en-us/HT214124",
|
"url": "https://support.apple.com/en-us/HT214124",
|
||||||
"source": "product-security@apple.com"
|
"source": "product-security@apple.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "http://seclists.org/fulldisclosure/2024/Jul/16",
|
"url": "http://seclists.org/fulldisclosure/2024/Jul/16",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Mailing List"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "http://seclists.org/fulldisclosure/2024/Jul/17",
|
"url": "http://seclists.org/fulldisclosure/2024/Jul/17",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Mailing List"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "http://seclists.org/fulldisclosure/2024/Jul/18",
|
"url": "http://seclists.org/fulldisclosure/2024/Jul/18",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Mailing List"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "http://seclists.org/fulldisclosure/2024/Jul/21",
|
"url": "http://seclists.org/fulldisclosure/2024/Jul/21",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Mailing List"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://support.apple.com/en-us/HT214116",
|
"url": "https://support.apple.com/en-us/HT214116",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://support.apple.com/en-us/HT214117",
|
"url": "https://support.apple.com/en-us/HT214117",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://support.apple.com/en-us/HT214119",
|
"url": "https://support.apple.com/en-us/HT214119",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://support.apple.com/en-us/HT214124",
|
"url": "https://support.apple.com/en-us/HT214124",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-44306",
|
"id": "CVE-2024-44306",
|
||||||
"sourceIdentifier": "product-security@apple.com",
|
"sourceIdentifier": "product-security@apple.com",
|
||||||
"published": "2024-11-20T00:15:16.967",
|
"published": "2024-11-20T00:15:16.967",
|
||||||
"lastModified": "2024-11-21T13:57:24.187",
|
"lastModified": "2024-12-11T20:34:16.127",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -17,6 +17,26 @@
|
|||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 7.8,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 5.9
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -40,6 +60,16 @@
|
|||||||
]
|
]
|
||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-120"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -51,10 +81,32 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "14.0",
|
||||||
|
"versionEndExcluding": "14.6",
|
||||||
|
"matchCriteriaId": "51E2E93B-C5A3-4C83-B806-2EC555AD45FE"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://support.apple.com/en-us/120911",
|
"url": "https://support.apple.com/en-us/120911",
|
||||||
"source": "product-security@apple.com"
|
"source": "product-security@apple.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-44307",
|
"id": "CVE-2024-44307",
|
||||||
"sourceIdentifier": "product-security@apple.com",
|
"sourceIdentifier": "product-security@apple.com",
|
||||||
"published": "2024-11-20T00:15:17.030",
|
"published": "2024-11-20T00:15:17.030",
|
||||||
"lastModified": "2024-11-21T13:57:24.187",
|
"lastModified": "2024-12-11T20:32:54.970",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -17,6 +17,26 @@
|
|||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 7.8,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 5.9
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -40,6 +60,16 @@
|
|||||||
]
|
]
|
||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-120"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -51,10 +81,32 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "14.0",
|
||||||
|
"versionEndExcluding": "14.6",
|
||||||
|
"matchCriteriaId": "51E2E93B-C5A3-4C83-B806-2EC555AD45FE"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://support.apple.com/en-us/120911",
|
"url": "https://support.apple.com/en-us/120911",
|
||||||
"source": "product-security@apple.com"
|
"source": "product-security@apple.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-53109",
|
"id": "CVE-2024-53109",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2024-12-02T14:15:11.713",
|
"published": "2024-12-02T14:15:11.713",
|
||||||
"lastModified": "2024-12-02T14:15:11.713",
|
"lastModified": "2024-12-11T20:21:25.433",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -15,19 +15,124 @@
|
|||||||
"value": " En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: nommu: pasar argumento NULL a vma_iter_prealloc(). Al eliminar una entrada vma de un \u00e1rbol maple, tiene que pasar NULL a vma_iter_prealloc() para calcular el estado interno del \u00e1rbol, pero pas\u00f3 un argumento incorrecto. Como resultado, los kernels nommu fallaban al acceder a un iterador vma, como acct_collect() que lee el tama\u00f1o de las entradas vma despu\u00e9s de do_munmap(). Esta confirmaci\u00f3n corrige este problema al pasar un argumento correcto a la llamada de preasignaci\u00f3n."
|
"value": " En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: nommu: pasar argumento NULL a vma_iter_prealloc(). Al eliminar una entrada vma de un \u00e1rbol maple, tiene que pasar NULL a vma_iter_prealloc() para calcular el estado interno del \u00e1rbol, pero pas\u00f3 un argumento incorrecto. Como resultado, los kernels nommu fallaban al acceder a un iterador vma, como acct_collect() que lee el tama\u00f1o de las entradas vma despu\u00e9s de do_munmap(). Esta confirmaci\u00f3n corrige este problema al pasar un argumento correcto a la llamada de preasignaci\u00f3n."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"baseScore": 5.5,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "NVD-CWE-noinfo"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.6",
|
||||||
|
"versionEndExcluding": "6.6.63",
|
||||||
|
"matchCriteriaId": "BC10231A-96EA-466E-AB1B-9C40D6E030C0"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.7",
|
||||||
|
"versionEndExcluding": "6.11.10",
|
||||||
|
"matchCriteriaId": "C256F46A-AFDD-4B99-AA4F-67D9D9D2C55A"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "7F361E1D-580F-4A2D-A509-7615F73167A1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "925478D0-3E3D-4E6F-ACD5-09F28D5DF82C"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "3C95E234-D335-4B6C-96BF-E2CEBD8654ED"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "E0F717D8-3014-4F84-8086-0124B2111379"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc5:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "24DBE6C7-2AAE-4818-AED2-E131F153D2FA"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc6:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "24B88717-53F5-42AA-9B72-14C707639E3F"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc7:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "1EF8CD82-1EAE-4254-9545-F85AB94CF90F"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/247d720b2c5d22f7281437fd6054a138256986ba",
|
"url": "https://git.kernel.org/stable/c/247d720b2c5d22f7281437fd6054a138256986ba",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/8bbf0ab631cdf1dade6745f137cff98751e6ced7",
|
"url": "https://git.kernel.org/stable/c/8bbf0ab631cdf1dade6745f137cff98751e6ced7",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/aceaf33b7666b72dfb86e0aa977be81e3bcbc727",
|
"url": "https://git.kernel.org/stable/c/aceaf33b7666b72dfb86e0aa977be81e3bcbc727",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-53110",
|
"id": "CVE-2024-53110",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2024-12-02T14:15:11.803",
|
"published": "2024-12-02T14:15:11.803",
|
||||||
"lastModified": "2024-12-02T14:15:11.803",
|
"lastModified": "2024-12-11T20:24:25.883",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -15,23 +15,138 @@
|
|||||||
"value": " En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: vp_vdpa: se corrige el error de matriz id_table no terminada en nulo. Asigne un virtio_device_id adicional como terminador nulo; de lo contrario, vdpa_mgmtdev_get_classes() puede iterar varias veces y visitar memoria no definida."
|
"value": " En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: vp_vdpa: se corrige el error de matriz id_table no terminada en nulo. Asigne un virtio_device_id adicional como terminador nulo; de lo contrario, vdpa_mgmtdev_get_classes() puede iterar varias veces y visitar memoria no definida."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"baseScore": 5.5,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "NVD-CWE-Other"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "5.19",
|
||||||
|
"versionEndExcluding": "6.1.119",
|
||||||
|
"matchCriteriaId": "9CACAA6C-9974-496D-9F06-79E8F3C291D2"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.2",
|
||||||
|
"versionEndExcluding": "6.6.63",
|
||||||
|
"matchCriteriaId": "8800BB45-48BC-4B52-BDA5-B1E4633F42E5"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.7",
|
||||||
|
"versionEndExcluding": "6.11.10",
|
||||||
|
"matchCriteriaId": "C256F46A-AFDD-4B99-AA4F-67D9D9D2C55A"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "7F361E1D-580F-4A2D-A509-7615F73167A1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "925478D0-3E3D-4E6F-ACD5-09F28D5DF82C"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "3C95E234-D335-4B6C-96BF-E2CEBD8654ED"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "E0F717D8-3014-4F84-8086-0124B2111379"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc5:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "24DBE6C7-2AAE-4818-AED2-E131F153D2FA"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc6:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "24B88717-53F5-42AA-9B72-14C707639E3F"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc7:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "1EF8CD82-1EAE-4254-9545-F85AB94CF90F"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/0a886489d274596ad1a80789d3a773503210a615",
|
"url": "https://git.kernel.org/stable/c/0a886489d274596ad1a80789d3a773503210a615",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/4e39ecadf1d2a08187139619f1f314b64ba7d947",
|
"url": "https://git.kernel.org/stable/c/4e39ecadf1d2a08187139619f1f314b64ba7d947",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/870d68fe17b5d9032049dcad98b5781a344a8657",
|
"url": "https://git.kernel.org/stable/c/870d68fe17b5d9032049dcad98b5781a344a8657",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/c4d64534d4b1c47d2f1ce427497f971ad4735aae",
|
"url": "https://git.kernel.org/stable/c/c4d64534d4b1c47d2f1ce427497f971ad4735aae",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-53111",
|
"id": "CVE-2024-53111",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2024-12-02T14:15:11.903",
|
"published": "2024-12-02T14:15:11.903",
|
||||||
"lastModified": "2024-12-02T14:15:11.903",
|
"lastModified": "2024-12-11T20:27:04.360",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -15,15 +15,110 @@
|
|||||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mm/mremap: se corrige el envoltorio de direcciones en move_page_tables() En plataformas de 32 bits, es posible que la expresi\u00f3n `len + old_addr < old_end` sea un falso positivo si `len + old_addr` realiza un envoltorio. `old_addr` es el cursor en el rango antiguo hasta el cual se han movido las entradas de la tabla de p\u00e1ginas; por lo que si la operaci\u00f3n tuvo \u00e9xito, `old_addr` es el *final* de la regi\u00f3n antigua, y agregarle `len` puede realizar un envoltorio. El desbordamiento hace que mremap() crea err\u00f3neamente que se han copiado las PTE; la consecuencia es que mremap() se retira, pero no mueve las PTE de nuevo antes de que se desasigne el nuevo VMA, lo que provoca que se pierdan las p\u00e1ginas an\u00f3nimas en la regi\u00f3n. B\u00e1sicamente, si el espacio de usuario intenta ejecutar mremap() en una regi\u00f3n privada-anon y encuentra este error, mremap() devolver\u00e1 un error y el contenido de la regi\u00f3n privada-anon parecer\u00e1 haber sido puesto a cero. La idea de esta comprobaci\u00f3n es que `old_end - len` sea la direcci\u00f3n de inicio original, y escribir la comprobaci\u00f3n de esa manera tambi\u00e9n facilita la lectura; por lo tanto, arregle la comprobaci\u00f3n reorganizando la comparaci\u00f3n en consecuencia. (Un workaround ser\u00eda refactorizar esta funci\u00f3n introduciendo una variable \"orig_old_start\" o algo similar). Probado en una m\u00e1quina virtual con un n\u00facleo X86 de 32 bits; sin el parche: ``` usuario@horn:~/big_mremap$ cat test.c #define _GNU_SOURCE #include #include #include #include #define ADDR1 ((void*)0x60000000) #define ADDR2 ((void*)0x10000000) #define SIZE 0x50000000uL int main(void) { unsigned char *p1 = mmap(ADDR1, SIZE, PROT_READ|PROT_WRITE, MAP_ANONYMOUS|MAP_PRIVATE|MAP_FIXED_NOREPLACE, -1, 0); if (p1 == MAP_FAILED) err(1, \"mmap 1\"); car\u00e1cter sin signo *p2 = mmap(ADDR2, SIZE, PROT_NONE, MAP_ANONYMOUS|MAP_PRIVATE|MAP_FIXED_NOREPLACE, -1, 0); si (p2 == MAP_FAILED) err(1, \"mmap 2\"); *p1 = 0x41; printf(\"el primer car\u00e1cter es 0x%02hhx\\n\", *p1); car\u00e1cter sin signo *p3 = mremap(p1, SIZE, SIZE, MREMAP_MAYMOVE|MREMAP_FIXED, p2); si (p3 == MAP_FAILED) { printf(\"mremap() fall\u00f3; el primer car\u00e1cter es 0x%02hhx\\n\", *p1); } de lo contrario { printf(\"mremap() tuvo \u00e9xito; el primer car\u00e1cter es 0x%02hhx\\n\", *p3); } } usuario@horn:~/big_mremap$ gcc -static -o test test.c usuario@horn:~/big_mremap$ setarch -R ./test el primer car\u00e1cter es 0x41 mremap() fall\u00f3; el primer car\u00e1cter es 0x00 ``` Con el parche: ``` usuario@horn:~/big_mremap$ setarch -R ./test el primer car\u00e1cter es 0x41 mremap() tuvo \u00e9xito; el primer car\u00e1cter es 0x41 ```"
|
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mm/mremap: se corrige el envoltorio de direcciones en move_page_tables() En plataformas de 32 bits, es posible que la expresi\u00f3n `len + old_addr < old_end` sea un falso positivo si `len + old_addr` realiza un envoltorio. `old_addr` es el cursor en el rango antiguo hasta el cual se han movido las entradas de la tabla de p\u00e1ginas; por lo que si la operaci\u00f3n tuvo \u00e9xito, `old_addr` es el *final* de la regi\u00f3n antigua, y agregarle `len` puede realizar un envoltorio. El desbordamiento hace que mremap() crea err\u00f3neamente que se han copiado las PTE; la consecuencia es que mremap() se retira, pero no mueve las PTE de nuevo antes de que se desasigne el nuevo VMA, lo que provoca que se pierdan las p\u00e1ginas an\u00f3nimas en la regi\u00f3n. B\u00e1sicamente, si el espacio de usuario intenta ejecutar mremap() en una regi\u00f3n privada-anon y encuentra este error, mremap() devolver\u00e1 un error y el contenido de la regi\u00f3n privada-anon parecer\u00e1 haber sido puesto a cero. La idea de esta comprobaci\u00f3n es que `old_end - len` sea la direcci\u00f3n de inicio original, y escribir la comprobaci\u00f3n de esa manera tambi\u00e9n facilita la lectura; por lo tanto, arregle la comprobaci\u00f3n reorganizando la comparaci\u00f3n en consecuencia. (Un workaround ser\u00eda refactorizar esta funci\u00f3n introduciendo una variable \"orig_old_start\" o algo similar). Probado en una m\u00e1quina virtual con un n\u00facleo X86 de 32 bits; sin el parche: ``` usuario@horn:~/big_mremap$ cat test.c #define _GNU_SOURCE #include #include #include #include #define ADDR1 ((void*)0x60000000) #define ADDR2 ((void*)0x10000000) #define SIZE 0x50000000uL int main(void) { unsigned char *p1 = mmap(ADDR1, SIZE, PROT_READ|PROT_WRITE, MAP_ANONYMOUS|MAP_PRIVATE|MAP_FIXED_NOREPLACE, -1, 0); if (p1 == MAP_FAILED) err(1, \"mmap 1\"); car\u00e1cter sin signo *p2 = mmap(ADDR2, SIZE, PROT_NONE, MAP_ANONYMOUS|MAP_PRIVATE|MAP_FIXED_NOREPLACE, -1, 0); si (p2 == MAP_FAILED) err(1, \"mmap 2\"); *p1 = 0x41; printf(\"el primer car\u00e1cter es 0x%02hhx\\n\", *p1); car\u00e1cter sin signo *p3 = mremap(p1, SIZE, SIZE, MREMAP_MAYMOVE|MREMAP_FIXED, p2); si (p3 == MAP_FAILED) { printf(\"mremap() fall\u00f3; el primer car\u00e1cter es 0x%02hhx\\n\", *p1); } de lo contrario { printf(\"mremap() tuvo \u00e9xito; el primer car\u00e1cter es 0x%02hhx\\n\", *p3); } } usuario@horn:~/big_mremap$ gcc -static -o test test.c usuario@horn:~/big_mremap$ setarch -R ./test el primer car\u00e1cter es 0x41 mremap() fall\u00f3; el primer car\u00e1cter es 0x00 ``` Con el parche: ``` usuario@horn:~/big_mremap$ setarch -R ./test el primer car\u00e1cter es 0x41 mremap() tuvo \u00e9xito; el primer car\u00e1cter es 0x41 ```"
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"baseScore": 5.5,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-190"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.7",
|
||||||
|
"versionEndExcluding": "6.11.10",
|
||||||
|
"matchCriteriaId": "C256F46A-AFDD-4B99-AA4F-67D9D9D2C55A"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "7F361E1D-580F-4A2D-A509-7615F73167A1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "925478D0-3E3D-4E6F-ACD5-09F28D5DF82C"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "3C95E234-D335-4B6C-96BF-E2CEBD8654ED"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "E0F717D8-3014-4F84-8086-0124B2111379"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc5:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "24DBE6C7-2AAE-4818-AED2-E131F153D2FA"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc6:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "24B88717-53F5-42AA-9B72-14C707639E3F"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc7:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "1EF8CD82-1EAE-4254-9545-F85AB94CF90F"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/909543dc279a91122fb08e4653a72b82f0ad28f4",
|
"url": "https://git.kernel.org/stable/c/909543dc279a91122fb08e4653a72b82f0ad28f4",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/a4a282daf1a190f03790bf163458ea3c8d28d217",
|
"url": "https://git.kernel.org/stable/c/a4a282daf1a190f03790bf163458ea3c8d28d217",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-53112",
|
"id": "CVE-2024-53112",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2024-12-02T14:15:11.997",
|
"published": "2024-12-02T14:15:11.997",
|
||||||
"lastModified": "2024-12-05T12:15:19.190",
|
"lastModified": "2024-12-11T20:28:19.407",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -15,27 +15,152 @@
|
|||||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ocfs2: anular la cach\u00e9 de un nodo que no ha podido entrar en el grupo Syzbot ha informado del siguiente ERROR: ERROR del kernel en fs/ocfs2/uptodate.c:509! ... Seguimiento de llamadas: ? __die_body+0x5f/0xb0 ? die+0x9e/0xc0 ? do_trap+0x15a/0x3a0 ? ocfs2_set_new_buffer_uptodate+0x145/0x160 ? do_error_trap+0x1dc/0x2c0 ? ocfs2_set_new_buffer_uptodate+0x145/0x160 ? __pfx_do_error_trap+0x10/0x10 ? handle_invalid_op+0x34/0x40 ? ocfs2_set_new_buffer_uptodate+0x145/0x160 ? exc_invalid_op+0x38/0x50 ? asm_exc_invalid_op+0x1a/0x20 ? ocfs2_set_new_buffer_uptodate+0x2e/0x160 ? ocfs2_set_new_buffer_uptodate+0x144/0x160 ? ocfs2_set_new_buffer_uptodate+0x145/0x160 ocfs2_group_add+0x39f/0x15a0 ? __pfx_ocfs2_group_add+0x10/0x10 ? __pfx_lock_acquire+0x10/0x10 ? __pfx_ocfs2_ioctl+0x65e/0x7d0 ? __pfx_smack_file_ioctl+0x29e/0x3a0 ? __pfx_smack_file_ioctl+0x10/0x10 ? bloqueo_dep_hardirqs_en_preparar+0x43d/0x780 ? lockdep_hardirqs_on_prepare+0x10/0x10 ? __pfx_ocfs2_ioctl+0x10/0x10 __se_sys_ioctl+0xfb/0x170 do_syscall_64+0xf3/0x230 entry_SYSCALL_64_after_hwframe+0x77/0x7f ... Cuando 'ioctl(OCFS2_IOC_GROUP_ADD, ...)' ha fallado para el inodo particular en 'ocfs2_verify_group_and_input()', el cabezal de b\u00fafer correspondiente permanece en cach\u00e9 y la llamada posterior al mismo 'ioctl()' para el mismo inodo emite el BUG() en 'ocfs2_set_new_buffer_uptodate()' (intentando almacenar en cach\u00e9 el mismo cabezal de b\u00fafer de ese inodo). Solucione este problema quitando el cach\u00e9 del encabezado del b\u00fafer con 'ocfs2_remove_from_cache()' en la ruta de error en 'ocfs2_group_add()'."
|
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ocfs2: anular la cach\u00e9 de un nodo que no ha podido entrar en el grupo Syzbot ha informado del siguiente ERROR: ERROR del kernel en fs/ocfs2/uptodate.c:509! ... Seguimiento de llamadas: ? __die_body+0x5f/0xb0 ? die+0x9e/0xc0 ? do_trap+0x15a/0x3a0 ? ocfs2_set_new_buffer_uptodate+0x145/0x160 ? do_error_trap+0x1dc/0x2c0 ? ocfs2_set_new_buffer_uptodate+0x145/0x160 ? __pfx_do_error_trap+0x10/0x10 ? handle_invalid_op+0x34/0x40 ? ocfs2_set_new_buffer_uptodate+0x145/0x160 ? exc_invalid_op+0x38/0x50 ? asm_exc_invalid_op+0x1a/0x20 ? ocfs2_set_new_buffer_uptodate+0x2e/0x160 ? ocfs2_set_new_buffer_uptodate+0x144/0x160 ? ocfs2_set_new_buffer_uptodate+0x145/0x160 ocfs2_group_add+0x39f/0x15a0 ? __pfx_ocfs2_group_add+0x10/0x10 ? __pfx_lock_acquire+0x10/0x10 ? __pfx_ocfs2_ioctl+0x65e/0x7d0 ? __pfx_smack_file_ioctl+0x29e/0x3a0 ? __pfx_smack_file_ioctl+0x10/0x10 ? bloqueo_dep_hardirqs_en_preparar+0x43d/0x780 ? lockdep_hardirqs_on_prepare+0x10/0x10 ? __pfx_ocfs2_ioctl+0x10/0x10 __se_sys_ioctl+0xfb/0x170 do_syscall_64+0xf3/0x230 entry_SYSCALL_64_after_hwframe+0x77/0x7f ... Cuando 'ioctl(OCFS2_IOC_GROUP_ADD, ...)' ha fallado para el inodo particular en 'ocfs2_verify_group_and_input()', el cabezal de b\u00fafer correspondiente permanece en cach\u00e9 y la llamada posterior al mismo 'ioctl()' para el mismo inodo emite el BUG() en 'ocfs2_set_new_buffer_uptodate()' (intentando almacenar en cach\u00e9 el mismo cabezal de b\u00fafer de ese inodo). Solucione este problema quitando el cach\u00e9 del encabezado del b\u00fafer con 'ocfs2_remove_from_cache()' en la ruta de error en 'ocfs2_group_add()'."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"baseScore": 5.5,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "NVD-CWE-noinfo"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "2.6.25",
|
||||||
|
"versionEndExcluding": "4.19.325",
|
||||||
|
"matchCriteriaId": "FEB31F82-F68B-4515-A54D-46D35F5CA5D5"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "4.20",
|
||||||
|
"versionEndExcluding": "6.1.119",
|
||||||
|
"matchCriteriaId": "6B7FAECA-414B-4BFF-905E-5DC7092800A1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.2",
|
||||||
|
"versionEndExcluding": "6.6.63",
|
||||||
|
"matchCriteriaId": "8800BB45-48BC-4B52-BDA5-B1E4633F42E5"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.7",
|
||||||
|
"versionEndExcluding": "6.11.10",
|
||||||
|
"matchCriteriaId": "C256F46A-AFDD-4B99-AA4F-67D9D9D2C55A"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "7F361E1D-580F-4A2D-A509-7615F73167A1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "925478D0-3E3D-4E6F-ACD5-09F28D5DF82C"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "3C95E234-D335-4B6C-96BF-E2CEBD8654ED"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "E0F717D8-3014-4F84-8086-0124B2111379"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc5:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "24DBE6C7-2AAE-4818-AED2-E131F153D2FA"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc6:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "24B88717-53F5-42AA-9B72-14C707639E3F"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc7:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "1EF8CD82-1EAE-4254-9545-F85AB94CF90F"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/620d22598110b0d0cb97a3fcca65fc473ea86e73",
|
"url": "https://git.kernel.org/stable/c/620d22598110b0d0cb97a3fcca65fc473ea86e73",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/737f34137844d6572ab7d473c998c7f977ff30eb",
|
"url": "https://git.kernel.org/stable/c/737f34137844d6572ab7d473c998c7f977ff30eb",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/843dfc804af4b338ead42331dd58081b428ecdf8",
|
"url": "https://git.kernel.org/stable/c/843dfc804af4b338ead42331dd58081b428ecdf8",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/ac0cfe8ac35cf1be54131b90d114087b558777ca",
|
"url": "https://git.kernel.org/stable/c/ac0cfe8ac35cf1be54131b90d114087b558777ca",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/b751c50e19d66cfb7360c0b55cf17b0722252d12",
|
"url": "https://git.kernel.org/stable/c/b751c50e19d66cfb7360c0b55cf17b0722252d12",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-53113",
|
"id": "CVE-2024-53113",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2024-12-02T14:15:12.097",
|
"published": "2024-12-02T14:15:12.097",
|
||||||
"lastModified": "2024-12-02T14:15:12.097",
|
"lastModified": "2024-12-11T20:29:10.150",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -15,23 +15,138 @@
|
|||||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mm: corregir la desreferencia de puntero NULL en alloc_pages_bulk_noprof Activamos una desreferencia de puntero NULL para ac.preferred_zoneref->zone en alloc_pages_bulk_noprof() cuando la tarea se migra entre conjuntos de CPU. Cuando se habilita el conjunto de CPU, en prepare_alloc_pages(), ac->nodemask puede ser &current->mems_allowed. Cuando se llama a first_zones_zonelist() para encontrar preference_zoneref, ac->nodemask puede modificarse simult\u00e1neamente si la tarea se migra entre diferentes conjuntos de CPU. Suponiendo que tenemos 2 nodos NUMA, al recorrer el nodo 1 en ac->zonelist, la m\u00e1scara de nodo es 2, y al recorrer el nodo 2 en ac->zonelist, la m\u00e1scara de nodo es 1. Como resultado, ac->preferred_zoneref apunta a la zona NULL. En alloc_pages_bulk_noprof(), for_each_zone_zonelist_nodemask() encuentra una zona permitida y llama a zonelist_node_idx(ac.preferred_zoneref), lo que genera una desreferencia del puntero NULL. __alloc_pages_noprof() corrige este problema al verificar el puntero NULL en el commit ea57485af8f4 (\"mm, page_alloc: corregir la verificaci\u00f3n para la zona preferida NULL\") y el commit df76cee6bbeb (\"mm, page_alloc: eliminar las verificaciones redundantes de la ruta r\u00e1pida de asignaci\u00f3n\"). Para solucionarlo, verifique el puntero NULL para la zona preferida->zone."
|
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mm: corregir la desreferencia de puntero NULL en alloc_pages_bulk_noprof Activamos una desreferencia de puntero NULL para ac.preferred_zoneref->zone en alloc_pages_bulk_noprof() cuando la tarea se migra entre conjuntos de CPU. Cuando se habilita el conjunto de CPU, en prepare_alloc_pages(), ac->nodemask puede ser &current->mems_allowed. Cuando se llama a first_zones_zonelist() para encontrar preference_zoneref, ac->nodemask puede modificarse simult\u00e1neamente si la tarea se migra entre diferentes conjuntos de CPU. Suponiendo que tenemos 2 nodos NUMA, al recorrer el nodo 1 en ac->zonelist, la m\u00e1scara de nodo es 2, y al recorrer el nodo 2 en ac->zonelist, la m\u00e1scara de nodo es 1. Como resultado, ac->preferred_zoneref apunta a la zona NULL. En alloc_pages_bulk_noprof(), for_each_zone_zonelist_nodemask() encuentra una zona permitida y llama a zonelist_node_idx(ac.preferred_zoneref), lo que genera una desreferencia del puntero NULL. __alloc_pages_noprof() corrige este problema al verificar el puntero NULL en el commit ea57485af8f4 (\"mm, page_alloc: corregir la verificaci\u00f3n para la zona preferida NULL\") y el commit df76cee6bbeb (\"mm, page_alloc: eliminar las verificaciones redundantes de la ruta r\u00e1pida de asignaci\u00f3n\"). Para solucionarlo, verifique el puntero NULL para la zona preferida->zone."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"baseScore": 5.5,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-476"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "5.13",
|
||||||
|
"versionEndExcluding": "6.1.119",
|
||||||
|
"matchCriteriaId": "1DC3D09C-354A-4F4D-9A89-E62897E5187A"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.2",
|
||||||
|
"versionEndExcluding": "6.6.63",
|
||||||
|
"matchCriteriaId": "8800BB45-48BC-4B52-BDA5-B1E4633F42E5"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.7",
|
||||||
|
"versionEndExcluding": "6.11.10",
|
||||||
|
"matchCriteriaId": "C256F46A-AFDD-4B99-AA4F-67D9D9D2C55A"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "7F361E1D-580F-4A2D-A509-7615F73167A1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "925478D0-3E3D-4E6F-ACD5-09F28D5DF82C"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "3C95E234-D335-4B6C-96BF-E2CEBD8654ED"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "E0F717D8-3014-4F84-8086-0124B2111379"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc5:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "24DBE6C7-2AAE-4818-AED2-E131F153D2FA"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc6:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "24B88717-53F5-42AA-9B72-14C707639E3F"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc7:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "1EF8CD82-1EAE-4254-9545-F85AB94CF90F"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/31502374627ba9ec3e710dbd0bb00457cc6d2c19",
|
"url": "https://git.kernel.org/stable/c/31502374627ba9ec3e710dbd0bb00457cc6d2c19",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/6addb2d9501ec866d7b3a3b4e665307c437e9be2",
|
"url": "https://git.kernel.org/stable/c/6addb2d9501ec866d7b3a3b4e665307c437e9be2",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/8ce41b0f9d77cca074df25afd39b86e2ee3aa68e",
|
"url": "https://git.kernel.org/stable/c/8ce41b0f9d77cca074df25afd39b86e2ee3aa68e",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/d0f16cec79774c3132df006cf771eddd89d08f58",
|
"url": "https://git.kernel.org/stable/c/d0f16cec79774c3132df006cf771eddd89d08f58",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-53114",
|
"id": "CVE-2024-53114",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2024-12-02T14:15:12.197",
|
"published": "2024-12-02T14:15:12.197",
|
||||||
"lastModified": "2024-12-02T14:15:12.197",
|
"lastModified": "2024-12-11T20:30:29.440",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -15,15 +15,109 @@
|
|||||||
"value": " En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: x86/CPU/AMD: Borrar VMLOAD/VMSAVE virtualizado en el cliente Zen4 Varios SoC de cliente Zen4 anuncian la capacidad de usar VMLOAD/VMSAVE virtualizado, pero se informa que el uso de estas instrucciones es la causa de un reinicio aleatorio del host. Estas instrucciones no est\u00e1n destinadas a ser anunciadas en el cliente Zen4, por lo que se debe borrar la capacidad."
|
"value": " En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: x86/CPU/AMD: Borrar VMLOAD/VMSAVE virtualizado en el cliente Zen4 Varios SoC de cliente Zen4 anuncian la capacidad de usar VMLOAD/VMSAVE virtualizado, pero se informa que el uso de estas instrucciones es la causa de un reinicio aleatorio del host. Estas instrucciones no est\u00e1n destinadas a ser anunciadas en el cliente Zen4, por lo que se debe borrar la capacidad."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"baseScore": 5.5,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "NVD-CWE-noinfo"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "6.11.10",
|
||||||
|
"matchCriteriaId": "2946A7E3-FA43-4284-BFFB-9BD5B341AA7F"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "7F361E1D-580F-4A2D-A509-7615F73167A1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "925478D0-3E3D-4E6F-ACD5-09F28D5DF82C"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "3C95E234-D335-4B6C-96BF-E2CEBD8654ED"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "E0F717D8-3014-4F84-8086-0124B2111379"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc5:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "24DBE6C7-2AAE-4818-AED2-E131F153D2FA"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc6:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "24B88717-53F5-42AA-9B72-14C707639E3F"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc7:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "1EF8CD82-1EAE-4254-9545-F85AB94CF90F"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/00c713f84f477a85e524f34aad8fbd11a1c051f0",
|
"url": "https://git.kernel.org/stable/c/00c713f84f477a85e524f34aad8fbd11a1c051f0",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/a5ca1dc46a6b610dd4627d8b633d6c84f9724ef0",
|
"url": "https://git.kernel.org/stable/c/a5ca1dc46a6b610dd4627d8b633d6c84f9724ef0",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-53115",
|
"id": "CVE-2024-53115",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2024-12-02T14:15:12.287",
|
"published": "2024-12-02T14:15:12.287",
|
||||||
"lastModified": "2024-12-02T14:15:12.287",
|
"lastModified": "2024-12-11T20:31:39.927",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -15,15 +15,117 @@
|
|||||||
"value": " En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/vmwgfx: evitar null_ptr_deref en vmw_framebuffer_surface_create_handle La funci\u00f3n 'vmw_user_object_buffer' puede devolver NULL con entradas incorrectas. Para evitar una posible desreferencia de puntero nulo, agregue una comprobaci\u00f3n para comprobar si 'bo' es NULL en vmw_framebuffer_surface_create_handle."
|
"value": " En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/vmwgfx: evitar null_ptr_deref en vmw_framebuffer_surface_create_handle La funci\u00f3n 'vmw_user_object_buffer' puede devolver NULL con entradas incorrectas. Para evitar una posible desreferencia de puntero nulo, agregue una comprobaci\u00f3n para comprobar si 'bo' es NULL en vmw_framebuffer_surface_create_handle."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"baseScore": 5.5,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-476"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.10.4",
|
||||||
|
"versionEndExcluding": "6.11",
|
||||||
|
"matchCriteriaId": "6D416D9F-373E-4412-A172-24D9BF64DAE0"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.11",
|
||||||
|
"versionEndExcluding": "6.11.10",
|
||||||
|
"matchCriteriaId": "D04DE94B-7655-4F33-96C5-47B09FF8D844"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "7F361E1D-580F-4A2D-A509-7615F73167A1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "925478D0-3E3D-4E6F-ACD5-09F28D5DF82C"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "3C95E234-D335-4B6C-96BF-E2CEBD8654ED"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "E0F717D8-3014-4F84-8086-0124B2111379"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc5:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "24DBE6C7-2AAE-4818-AED2-E131F153D2FA"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc6:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "24B88717-53F5-42AA-9B72-14C707639E3F"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc7:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "1EF8CD82-1EAE-4254-9545-F85AB94CF90F"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/36f64da080555175b58d85f99f5f90435e274e56",
|
"url": "https://git.kernel.org/stable/c/36f64da080555175b58d85f99f5f90435e274e56",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/93d1f41a82de382845af460bf03bcb17dcbf08c5",
|
"url": "https://git.kernel.org/stable/c/93d1f41a82de382845af460bf03bcb17dcbf08c5",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-53116",
|
"id": "CVE-2024-53116",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2024-12-02T14:15:12.373",
|
"published": "2024-12-02T14:15:12.373",
|
||||||
"lastModified": "2024-12-02T14:15:12.373",
|
"lastModified": "2024-12-11T20:34:11.147",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -15,15 +15,110 @@
|
|||||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/panthor: Corregir el manejo del mapeo parcial de la GPU de los BO. Esta confirmaci\u00f3n corrige el error en el manejo del mapeo parcial de los objetos del b\u00fafer a la GPU, que causaba advertencias del kernel. Panthor no manejaba correctamente el caso en el que el mapeo parcial abarcaba m\u00faltiples listas de dispersi\u00f3n y el desplazamiento del mapeo no apuntaba a la primera p\u00e1gina de la lista de dispersi\u00f3n inicial. La variable de desplazamiento no se borraba despu\u00e9s de alcanzar la lista de dispersi\u00f3n inicial. Se vieron los siguientes mensajes de advertencia. ADVERTENCIA: CPU: 1 PID: 650 en drivers/iommu/io-pgtable-arm.c:659 __arm_lpae_unmap+0x254/0x5a0 pc : __arm_lpae_unmap+0x254/0x5a0 lr : __arm_lpae_unmap+0x2cc/0x5a0 Rastreo de llamadas: __arm_lpae_unmap+0x254/0x5a0 __arm_lpae_unmap+0x108/0x5a0 __arm_lpae_unmap+0x108/0x5a0 __arm_lpae_unmap+0x108/0x5a0 arm_lpae_unmap_pages+0x80/0xa0 panthor_vm_unmap_pages+0xac/0x1c8 [panthor] panthor_gpuva_sm_step_unmap+0x4c/0xc8 [panthor] op_unmap_cb.isra.23.constprop.30+0x54/0x80 __drm_gpuvm_sm_unmap+0x184/0x1c8 drm_gpuvm_sm_unmap+0x40/0x60 panthor_vm_exec_op+0xa8/0x120 [panthor] panthor_vm_bind_exec_sync_op+0xc4/0xe8 [panthor] panthor_ioctl_vm_bind+0x10c/0x170 [panthor] drm_ioctl_kernel+0xbc/0x138 drm_ioctl+0x210/0x4b0 __arm64_sys_ioctl+0xb0/0xf8 invocar_syscall+0x4c/0x110 el0_svc_common.constprop.1+0x98/0xf8 do_el0_svc+0x24/0x38 el0_svc+0x34/0xc8 el0t_64_sync_handler+0xa0/0xc8 el0t_64_sync+0x174/0x178 panthor : [drm] drm_WARN_ON(unmapped_sz != pgsize * pgcount) ADVERTENCIA: CPU: 1 PID: 650 en drivers/gpu/drm/panthor/panthor_mmu.c:922 panthor_vm_unmap_pages+0x124/0x1c8 [panthor] pc : panthor_vm_unmap_pages+0x124/0x1c8 [panthor] lr : panthor_vm_unmap_pages+0x124/0x1c8 [panthor] panthor : [drm] *ERROR* no se pudo desasignar el rango ffffa388f000-ffffa3890000 (rango solicitado ffffa388c000-ffffa3890000)"
|
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/panthor: Corregir el manejo del mapeo parcial de la GPU de los BO. Esta confirmaci\u00f3n corrige el error en el manejo del mapeo parcial de los objetos del b\u00fafer a la GPU, que causaba advertencias del kernel. Panthor no manejaba correctamente el caso en el que el mapeo parcial abarcaba m\u00faltiples listas de dispersi\u00f3n y el desplazamiento del mapeo no apuntaba a la primera p\u00e1gina de la lista de dispersi\u00f3n inicial. La variable de desplazamiento no se borraba despu\u00e9s de alcanzar la lista de dispersi\u00f3n inicial. Se vieron los siguientes mensajes de advertencia. ADVERTENCIA: CPU: 1 PID: 650 en drivers/iommu/io-pgtable-arm.c:659 __arm_lpae_unmap+0x254/0x5a0 pc : __arm_lpae_unmap+0x254/0x5a0 lr : __arm_lpae_unmap+0x2cc/0x5a0 Rastreo de llamadas: __arm_lpae_unmap+0x254/0x5a0 __arm_lpae_unmap+0x108/0x5a0 __arm_lpae_unmap+0x108/0x5a0 __arm_lpae_unmap+0x108/0x5a0 arm_lpae_unmap_pages+0x80/0xa0 panthor_vm_unmap_pages+0xac/0x1c8 [panthor] panthor_gpuva_sm_step_unmap+0x4c/0xc8 [panthor] op_unmap_cb.isra.23.constprop.30+0x54/0x80 __drm_gpuvm_sm_unmap+0x184/0x1c8 drm_gpuvm_sm_unmap+0x40/0x60 panthor_vm_exec_op+0xa8/0x120 [panthor] panthor_vm_bind_exec_sync_op+0xc4/0xe8 [panthor] panthor_ioctl_vm_bind+0x10c/0x170 [panthor] drm_ioctl_kernel+0xbc/0x138 drm_ioctl+0x210/0x4b0 __arm64_sys_ioctl+0xb0/0xf8 invocar_syscall+0x4c/0x110 el0_svc_common.constprop.1+0x98/0xf8 do_el0_svc+0x24/0x38 el0_svc+0x34/0xc8 el0t_64_sync_handler+0xa0/0xc8 el0t_64_sync+0x174/0x178 panthor : [drm] drm_WARN_ON(unmapped_sz != pgsize * pgcount) ADVERTENCIA: CPU: 1 PID: 650 en drivers/gpu/drm/panthor/panthor_mmu.c:922 panthor_vm_unmap_pages+0x124/0x1c8 [panthor] pc : panthor_vm_unmap_pages+0x124/0x1c8 [panthor] lr : panthor_vm_unmap_pages+0x124/0x1c8 [panthor] panthor : [drm] *ERROR* no se pudo desasignar el rango ffffa388f000-ffffa3890000 (rango solicitado ffffa388c000-ffffa3890000)"
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"baseScore": 5.5,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "NVD-CWE-noinfo"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.10",
|
||||||
|
"versionEndExcluding": "6.11.10",
|
||||||
|
"matchCriteriaId": "CBF353B6-8FA6-4F52-AEA3-56FB3CD25A79"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "7F361E1D-580F-4A2D-A509-7615F73167A1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "925478D0-3E3D-4E6F-ACD5-09F28D5DF82C"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "3C95E234-D335-4B6C-96BF-E2CEBD8654ED"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "E0F717D8-3014-4F84-8086-0124B2111379"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc5:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "24DBE6C7-2AAE-4818-AED2-E131F153D2FA"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc6:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "24B88717-53F5-42AA-9B72-14C707639E3F"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc7:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "1EF8CD82-1EAE-4254-9545-F85AB94CF90F"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/3387e043918e154ca08d83954966a8b087fe2835",
|
"url": "https://git.kernel.org/stable/c/3387e043918e154ca08d83954966a8b087fe2835",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/d3e61af64b770e0038470c81f42bd1d0598f6bcc",
|
"url": "https://git.kernel.org/stable/c/d3e61af64b770e0038470c81f42bd1d0598f6bcc",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-53117",
|
"id": "CVE-2024-53117",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2024-12-02T14:15:12.470",
|
"published": "2024-12-02T14:15:12.470",
|
||||||
"lastModified": "2024-12-02T14:15:12.470",
|
"lastModified": "2024-12-11T20:44:30.167",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -15,15 +15,110 @@
|
|||||||
"value": " En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: virtio/vsock: Mejorar el manejo de errores MSG_ZEROCOPY. Agregar un kfree_skb() faltante para evitar p\u00e9rdidas de memoria."
|
"value": " En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: virtio/vsock: Mejorar el manejo de errores MSG_ZEROCOPY. Agregar un kfree_skb() faltante para evitar p\u00e9rdidas de memoria."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"baseScore": 5.5,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-401"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.7",
|
||||||
|
"versionEndExcluding": "6.11.10",
|
||||||
|
"matchCriteriaId": "C256F46A-AFDD-4B99-AA4F-67D9D9D2C55A"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "7F361E1D-580F-4A2D-A509-7615F73167A1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "925478D0-3E3D-4E6F-ACD5-09F28D5DF82C"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "3C95E234-D335-4B6C-96BF-E2CEBD8654ED"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "E0F717D8-3014-4F84-8086-0124B2111379"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc5:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "24DBE6C7-2AAE-4818-AED2-E131F153D2FA"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc6:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "24B88717-53F5-42AA-9B72-14C707639E3F"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc7:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "1EF8CD82-1EAE-4254-9545-F85AB94CF90F"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/50061d7319e21165d04e3024354c1b43b6137821",
|
"url": "https://git.kernel.org/stable/c/50061d7319e21165d04e3024354c1b43b6137821",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/60cf6206a1f513512f5d73fa4d3dbbcad2e7dcd6",
|
"url": "https://git.kernel.org/stable/c/60cf6206a1f513512f5d73fa4d3dbbcad2e7dcd6",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-53118",
|
"id": "CVE-2024-53118",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2024-12-02T14:15:12.567",
|
"published": "2024-12-02T14:15:12.567",
|
||||||
"lastModified": "2024-12-02T14:15:12.567",
|
"lastModified": "2024-12-11T20:52:52.993",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -15,15 +15,110 @@
|
|||||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: vsock: se corrige la p\u00e9rdida de memoria sk_error_queue. El kernel coloca en cola las notificaciones de finalizaci\u00f3n MSG_ZEROCOPY en la cola de errores, donde permanecen hasta que se recv()en forma expl\u00edcita. Para evitar p\u00e9rdidas de memoria, limpie la cola cuando se destruya el socket. objeto sin referencia 0xffff8881028beb00 (tama\u00f1o 224): comm \"vsock_test\", pid 1218, jiffies 4294694897 volcado hexadecimal (primeros 32 bytes): 90 b0 21 17 81 88 ff ff 90 b0 21 17 81 88 ff ff ..!.......!..... 00 00 00 00 00 00 00 00 00 b0 21 17 81 88 ff ff ..........!..... backtrace (crc 6c7031ca): [] kmem_cache_alloc_node_noprof+0x2f7/0x370 [] __alloc_skb+0x132/0x180 [] sock_omalloc+0x4b/0x80 [] msg_zerocopy_realloc+0x9e/0x240 [] virtio_transport_send_pkt_info+0x412/0x4c0 [] virtio_transport_stream_enqueue+0x43/0x50 [] vsock_connectible_sendmsg+0x373/0x450 [] ____sys_sendmsg+0x365/0x3a0 [] ___sys_sendmsg+0x84/0xd0 [] __sys_sendmsg+0x47/0x80 [] do_syscall_64+0x93/0x180 [] entry_SYSCALL_64_after_hwframe+0x76/0x7e"
|
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: vsock: se corrige la p\u00e9rdida de memoria sk_error_queue. El kernel coloca en cola las notificaciones de finalizaci\u00f3n MSG_ZEROCOPY en la cola de errores, donde permanecen hasta que se recv()en forma expl\u00edcita. Para evitar p\u00e9rdidas de memoria, limpie la cola cuando se destruya el socket. objeto sin referencia 0xffff8881028beb00 (tama\u00f1o 224): comm \"vsock_test\", pid 1218, jiffies 4294694897 volcado hexadecimal (primeros 32 bytes): 90 b0 21 17 81 88 ff ff 90 b0 21 17 81 88 ff ff ..!.......!..... 00 00 00 00 00 00 00 00 00 b0 21 17 81 88 ff ff ..........!..... backtrace (crc 6c7031ca): [] kmem_cache_alloc_node_noprof+0x2f7/0x370 [] __alloc_skb+0x132/0x180 [] sock_omalloc+0x4b/0x80 [] msg_zerocopy_realloc+0x9e/0x240 [] virtio_transport_send_pkt_info+0x412/0x4c0 [] virtio_transport_stream_enqueue+0x43/0x50 [] vsock_connectible_sendmsg+0x373/0x450 [] ____sys_sendmsg+0x365/0x3a0 [] ___sys_sendmsg+0x84/0xd0 [] __sys_sendmsg+0x47/0x80 [] do_syscall_64+0x93/0x180 [] entry_SYSCALL_64_after_hwframe+0x76/0x7e"
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"baseScore": 5.5,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-401"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.7",
|
||||||
|
"versionEndExcluding": "6.11.10",
|
||||||
|
"matchCriteriaId": "C256F46A-AFDD-4B99-AA4F-67D9D9D2C55A"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "7F361E1D-580F-4A2D-A509-7615F73167A1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "925478D0-3E3D-4E6F-ACD5-09F28D5DF82C"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "3C95E234-D335-4B6C-96BF-E2CEBD8654ED"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "E0F717D8-3014-4F84-8086-0124B2111379"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc5:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "24DBE6C7-2AAE-4818-AED2-E131F153D2FA"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc6:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "24B88717-53F5-42AA-9B72-14C707639E3F"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc7:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "1EF8CD82-1EAE-4254-9545-F85AB94CF90F"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/bea4779a45f49275b1e1b1bd9de03cd3727244d8",
|
"url": "https://git.kernel.org/stable/c/bea4779a45f49275b1e1b1bd9de03cd3727244d8",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/fbf7085b3ad1c7cc0677834c90f985f1b4f77a33",
|
"url": "https://git.kernel.org/stable/c/fbf7085b3ad1c7cc0677834c90f985f1b4f77a33",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-53119",
|
"id": "CVE-2024-53119",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2024-12-02T14:15:12.667",
|
"published": "2024-12-02T14:15:12.667",
|
||||||
"lastModified": "2024-12-02T14:15:12.667",
|
"lastModified": "2024-12-11T20:55:09.957",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -15,23 +15,138 @@
|
|||||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: virtio/vsock: Se soluciona la p\u00e9rdida de memoria de accept_queue. Como las etapas finales de la destrucci\u00f3n del socket pueden demorarse, es posible que se llame a virtio_transport_recv_listen() despu\u00e9s de que se haya vaciado accept_queue, pero antes de que se haya establecido el indicador SOCK_DONE. Como resultado, los sockets en cola despu\u00e9s del vaciado permanecer\u00edan sin eliminar, lo que provocar\u00eda una p\u00e9rdida de memoria. vsock_release __vsock_release bloquear virtio_transport_release virtio_transport_close schedule_delayed_work(cerrar_trabajo) sk_shutdown = SHUTDOWN_MASK (!) vaciar accept_queue liberar virtio_transport_recv_pkt vsock_find_bound_socket bloquear si indicador(SOCK_DONE) devolver virtio_transport_recv_listen child = vsock_create_connected (!) vsock_enqueue_accept(child) liberar close_work bloquear virtio_transport_do_close set_flag(SOCK_DONE) virtio_transport_remove_sock vsock_remove_sock vsock_remove_bound liberar Introduce una comprobaci\u00f3n de sk_shutdown para no permitir vsock_enqueue_accept() durante la destrucci\u00f3n del socket. objeto sin referencia 0xffff888109e3f800 (tama\u00f1o 2040): comm \"kworker/5:2\", pid 371, jiffies 4294940105 volcado hexadecimal (primeros 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 28 00 0b 40 00 00 00 00 00 00 00 00 00 00 00 00 (..@............ backtrace (crc 9e5f4e84): [] kmem_cache_alloc_noprof+0x2c1/0x360 [] sk_prot_alloc+0x30/0x120 [] sk_alloc+0x2c/0x4b0 [] __vsock_create.constprop.0+0x2a/0x310 [] virtio_transport_recv_pkt+0x4dc/0x9a0 [] vsock_loopback_work+0xfd/0x140 [] process_one_work+0x20c/0x570 [] subproceso_trabajador+0x1bf/0x3a0 [] kthread+0xdd/0x110 [] ret_de_la_bifurcaci\u00f3n+0x2d/0x50 [] ret_de_la_bifurcaci\u00f3n_asm+0x1a/0x30"
|
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: virtio/vsock: Se soluciona la p\u00e9rdida de memoria de accept_queue. Como las etapas finales de la destrucci\u00f3n del socket pueden demorarse, es posible que se llame a virtio_transport_recv_listen() despu\u00e9s de que se haya vaciado accept_queue, pero antes de que se haya establecido el indicador SOCK_DONE. Como resultado, los sockets en cola despu\u00e9s del vaciado permanecer\u00edan sin eliminar, lo que provocar\u00eda una p\u00e9rdida de memoria. vsock_release __vsock_release bloquear virtio_transport_release virtio_transport_close schedule_delayed_work(cerrar_trabajo) sk_shutdown = SHUTDOWN_MASK (!) vaciar accept_queue liberar virtio_transport_recv_pkt vsock_find_bound_socket bloquear si indicador(SOCK_DONE) devolver virtio_transport_recv_listen child = vsock_create_connected (!) vsock_enqueue_accept(child) liberar close_work bloquear virtio_transport_do_close set_flag(SOCK_DONE) virtio_transport_remove_sock vsock_remove_sock vsock_remove_bound liberar Introduce una comprobaci\u00f3n de sk_shutdown para no permitir vsock_enqueue_accept() durante la destrucci\u00f3n del socket. objeto sin referencia 0xffff888109e3f800 (tama\u00f1o 2040): comm \"kworker/5:2\", pid 371, jiffies 4294940105 volcado hexadecimal (primeros 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 28 00 0b 40 00 00 00 00 00 00 00 00 00 00 00 00 (..@............ backtrace (crc 9e5f4e84): [] kmem_cache_alloc_noprof+0x2c1/0x360 [] sk_prot_alloc+0x30/0x120 [] sk_alloc+0x2c/0x4b0 [] __vsock_create.constprop.0+0x2a/0x310 [] virtio_transport_recv_pkt+0x4dc/0x9a0 [] vsock_loopback_work+0xfd/0x140 [] process_one_work+0x20c/0x570 [] subproceso_trabajador+0x1bf/0x3a0 [] kthread+0xdd/0x110 [] ret_de_la_bifurcaci\u00f3n+0x2d/0x50 [] ret_de_la_bifurcaci\u00f3n_asm+0x1a/0x30"
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"baseScore": 5.5,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-401"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "5.10",
|
||||||
|
"versionEndExcluding": "6.1.119",
|
||||||
|
"matchCriteriaId": "6A2C9B37-E912-41BB-9EF9-3BC3C5E13B09"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.2",
|
||||||
|
"versionEndExcluding": "6.6.63",
|
||||||
|
"matchCriteriaId": "8800BB45-48BC-4B52-BDA5-B1E4633F42E5"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.7",
|
||||||
|
"versionEndExcluding": "6.11.10",
|
||||||
|
"matchCriteriaId": "C256F46A-AFDD-4B99-AA4F-67D9D9D2C55A"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "7F361E1D-580F-4A2D-A509-7615F73167A1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "925478D0-3E3D-4E6F-ACD5-09F28D5DF82C"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "3C95E234-D335-4B6C-96BF-E2CEBD8654ED"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "E0F717D8-3014-4F84-8086-0124B2111379"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc5:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "24DBE6C7-2AAE-4818-AED2-E131F153D2FA"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc6:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "24B88717-53F5-42AA-9B72-14C707639E3F"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc7:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "1EF8CD82-1EAE-4254-9545-F85AB94CF90F"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/2415345042245de7601dcc6eafdbe3a3dcc9e379",
|
"url": "https://git.kernel.org/stable/c/2415345042245de7601dcc6eafdbe3a3dcc9e379",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/897617a413e0bf1c6380e3b34b2f28f450508549",
|
"url": "https://git.kernel.org/stable/c/897617a413e0bf1c6380e3b34b2f28f450508549",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/946c7600fa2207cc8d3fbc86a518ec56f98a5813",
|
"url": "https://git.kernel.org/stable/c/946c7600fa2207cc8d3fbc86a518ec56f98a5813",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/d7b0ff5a866724c3ad21f2628c22a63336deec3f",
|
"url": "https://git.kernel.org/stable/c/d7b0ff5a866724c3ad21f2628c22a63336deec3f",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-53120",
|
"id": "CVE-2024-53120",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2024-12-02T14:15:12.773",
|
"published": "2024-12-02T14:15:12.773",
|
||||||
"lastModified": "2024-12-02T14:15:12.773",
|
"lastModified": "2024-12-11T20:59:36.660",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -15,23 +15,138 @@
|
|||||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net/mlx5e: CT: Corregir null-ptr-deref en el flujo de error de agregar regla. En el flujo de error de mlx5_tc_ct_entry_add_rule(), en caso de que la devoluci\u00f3n de llamada ct_rule_add() devuelva un error, se usa zone_rule->attr sin iniciar. Arr\u00e9glelo para usar attr que tiene el valor de puntero necesario. Registro del kernel: ERROR: desreferencia de puntero NULL del kernel, direcci\u00f3n: 0000000000000110 RIP: 0010:mlx5_tc_ct_entry_add_rule+0x2b1/0x2f0 [mlx5_core] \u2026 Seguimiento de llamadas: ? __die+0x20/0x70 ? page_fault_oops+0x150/0x3e0 ? exc_page_fault+0x74/0x140 ? asm_exc_page_fault+0x22/0x30 ? mlx5_tc_ct_entry_add_rule+0x2b1/0x2f0 [mlx5_core] ? mlx5_tc_ct_entry_add_rule+0x1d5/0x2f0 [mlx5_core] mlx5_tc_ct_block_flow_offload+0xc6a/0xf90 [mlx5_core] ? nf_flow_offload_tuple+0xd8/0x190 [nf_flow_table] nf_flow_offload_tuple+0xd8/0x190 [nf_flow_table] flow_offload_work_handler+0x142/0x320 [nf_flow_table] ? finish_task_switch.isra.0+0x15b/0x2b0 process_one_work+0x16c/0x320 worker_thread+0x28c/0x3a0 ? __pfx_worker_thread+0x10/0x10 kthread+0xb8/0xf0 ? __pfx_kthread+0x10/0x10 ret_from_fork+0x2d/0x50 ? __pfx_kthread+0x10/0x10 ret_from_fork_asm+0x1a/0x30 "
|
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net/mlx5e: CT: Corregir null-ptr-deref en el flujo de error de agregar regla. En el flujo de error de mlx5_tc_ct_entry_add_rule(), en caso de que la devoluci\u00f3n de llamada ct_rule_add() devuelva un error, se usa zone_rule->attr sin iniciar. Arr\u00e9glelo para usar attr que tiene el valor de puntero necesario. Registro del kernel: ERROR: desreferencia de puntero NULL del kernel, direcci\u00f3n: 0000000000000110 RIP: 0010:mlx5_tc_ct_entry_add_rule+0x2b1/0x2f0 [mlx5_core] \u2026 Seguimiento de llamadas: ? __die+0x20/0x70 ? page_fault_oops+0x150/0x3e0 ? exc_page_fault+0x74/0x140 ? asm_exc_page_fault+0x22/0x30 ? mlx5_tc_ct_entry_add_rule+0x2b1/0x2f0 [mlx5_core] ? mlx5_tc_ct_entry_add_rule+0x1d5/0x2f0 [mlx5_core] mlx5_tc_ct_block_flow_offload+0xc6a/0xf90 [mlx5_core] ? nf_flow_offload_tuple+0xd8/0x190 [nf_flow_table] nf_flow_offload_tuple+0xd8/0x190 [nf_flow_table] flow_offload_work_handler+0x142/0x320 [nf_flow_table] ? finish_task_switch.isra.0+0x15b/0x2b0 process_one_work+0x16c/0x320 worker_thread+0x28c/0x3a0 ? __pfx_worker_thread+0x10/0x10 kthread+0xb8/0xf0 ? __pfx_kthread+0x10/0x10 ret_from_fork+0x2d/0x50 ? __pfx_kthread+0x10/0x10 ret_from_fork_asm+0x1a/0x30 "
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"baseScore": 5.5,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-476"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "5.14",
|
||||||
|
"versionEndExcluding": "6.1.119",
|
||||||
|
"matchCriteriaId": "134AE704-E2CE-49DC-BD75-5B7CF56E9439"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.2",
|
||||||
|
"versionEndExcluding": "6.6.63",
|
||||||
|
"matchCriteriaId": "8800BB45-48BC-4B52-BDA5-B1E4633F42E5"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.7",
|
||||||
|
"versionEndExcluding": "6.11.10",
|
||||||
|
"matchCriteriaId": "C256F46A-AFDD-4B99-AA4F-67D9D9D2C55A"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "7F361E1D-580F-4A2D-A509-7615F73167A1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "925478D0-3E3D-4E6F-ACD5-09F28D5DF82C"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "3C95E234-D335-4B6C-96BF-E2CEBD8654ED"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "E0F717D8-3014-4F84-8086-0124B2111379"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc5:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "24DBE6C7-2AAE-4818-AED2-E131F153D2FA"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc6:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "24B88717-53F5-42AA-9B72-14C707639E3F"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc7:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "1EF8CD82-1EAE-4254-9545-F85AB94CF90F"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/06dc488a593020bd2f006798557d2a32104d8359",
|
"url": "https://git.kernel.org/stable/c/06dc488a593020bd2f006798557d2a32104d8359",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/0c7c70ff8b696cfedba350411dca736361ef9a0f",
|
"url": "https://git.kernel.org/stable/c/0c7c70ff8b696cfedba350411dca736361ef9a0f",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/6030f8bd7902e9e276a0edc09bf11979e4e2bc2e",
|
"url": "https://git.kernel.org/stable/c/6030f8bd7902e9e276a0edc09bf11979e4e2bc2e",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/e99c6873229fe0482e7ceb7d5600e32d623ed9d9",
|
"url": "https://git.kernel.org/stable/c/e99c6873229fe0482e7ceb7d5600e32d623ed9d9",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
66
README.md
66
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
|||||||
### Last Repository Update
|
### Last Repository Update
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
2024-12-11T19:01:05.148499+00:00
|
2024-12-11T21:00:29.770164+00:00
|
||||||
```
|
```
|
||||||
|
|
||||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
2024-12-11T18:29:33.870000+00:00
|
2024-12-11T20:59:36.660000+00:00
|
||||||
```
|
```
|
||||||
|
|
||||||
### Last Data Feed Release
|
### Last Data Feed Release
|
||||||
@ -38,47 +38,39 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
|||||||
|
|
||||||
### CVEs added in the last Commit
|
### CVEs added in the last Commit
|
||||||
|
|
||||||
Recently added CVEs: `8`
|
Recently added CVEs: `0`
|
||||||
|
|
||||||
- [CVE-2024-10251](CVE-2024/CVE-2024-102xx/CVE-2024-10251.json) (`2024-12-11T17:15:14.140`)
|
|
||||||
- [CVE-2024-11597](CVE-2024/CVE-2024-115xx/CVE-2024-11597.json) (`2024-12-11T17:15:14.307`)
|
|
||||||
- [CVE-2024-11598](CVE-2024/CVE-2024-115xx/CVE-2024-11598.json) (`2024-12-11T17:15:14.453`)
|
|
||||||
- [CVE-2024-47760](CVE-2024/CVE-2024-477xx/CVE-2024-47760.json) (`2024-12-11T17:15:16.620`)
|
|
||||||
- [CVE-2024-47761](CVE-2024/CVE-2024-477xx/CVE-2024-47761.json) (`2024-12-11T17:15:16.753`)
|
|
||||||
- [CVE-2024-48912](CVE-2024/CVE-2024-489xx/CVE-2024-48912.json) (`2024-12-11T17:15:17.043`)
|
|
||||||
- [CVE-2024-8496](CVE-2024/CVE-2024-84xx/CVE-2024-8496.json) (`2024-12-11T17:15:21.390`)
|
|
||||||
- [CVE-2024-9845](CVE-2024/CVE-2024-98xx/CVE-2024-9845.json) (`2024-12-11T17:15:21.550`)
|
|
||||||
|
|
||||||
|
|
||||||
### CVEs modified in the last Commit
|
### CVEs modified in the last Commit
|
||||||
|
|
||||||
Recently modified CVEs: `70`
|
Recently modified CVEs: `40`
|
||||||
|
|
||||||
- [CVE-2024-50628](CVE-2024/CVE-2024-506xx/CVE-2024-50628.json) (`2024-12-11T17:15:17.350`)
|
- [CVE-2024-2279](CVE-2024/CVE-2024-22xx/CVE-2024-2279.json) (`2024-12-11T19:29:27.377`)
|
||||||
- [CVE-2024-53126](CVE-2024/CVE-2024-531xx/CVE-2024-53126.json) (`2024-12-11T17:26:28.807`)
|
- [CVE-2024-23662](CVE-2024/CVE-2024-236xx/CVE-2024-23662.json) (`2024-12-11T19:11:44.790`)
|
||||||
- [CVE-2024-53127](CVE-2024/CVE-2024-531xx/CVE-2024-53127.json) (`2024-12-11T17:30:25.387`)
|
- [CVE-2024-26007](CVE-2024/CVE-2024-260xx/CVE-2024-26007.json) (`2024-12-11T19:55:59.830`)
|
||||||
- [CVE-2024-53132](CVE-2024/CVE-2024-531xx/CVE-2024-53132.json) (`2024-12-11T17:17:23.790`)
|
- [CVE-2024-26010](CVE-2024/CVE-2024-260xx/CVE-2024-26010.json) (`2024-12-11T19:54:35.323`)
|
||||||
- [CVE-2024-53133](CVE-2024/CVE-2024-531xx/CVE-2024-53133.json) (`2024-12-11T17:16:16.593`)
|
- [CVE-2024-27794](CVE-2024/CVE-2024-277xx/CVE-2024-27794.json) (`2024-12-11T19:56:37.067`)
|
||||||
- [CVE-2024-53134](CVE-2024/CVE-2024-531xx/CVE-2024-53134.json) (`2024-12-11T17:10:16.683`)
|
- [CVE-2024-2818](CVE-2024/CVE-2024-28xx/CVE-2024-2818.json) (`2024-12-11T20:25:14.693`)
|
||||||
- [CVE-2024-53135](CVE-2024/CVE-2024-531xx/CVE-2024-53135.json) (`2024-12-11T17:08:02.847`)
|
- [CVE-2024-3092](CVE-2024/CVE-2024-30xx/CVE-2024-3092.json) (`2024-12-11T19:19:05.273`)
|
||||||
- [CVE-2024-53136](CVE-2024/CVE-2024-531xx/CVE-2024-53136.json) (`2024-12-11T17:04:47.447`)
|
- [CVE-2024-40824](CVE-2024/CVE-2024-408xx/CVE-2024-40824.json) (`2024-12-11T19:46:47.707`)
|
||||||
- [CVE-2024-53137](CVE-2024/CVE-2024-531xx/CVE-2024-53137.json) (`2024-12-11T17:01:09.277`)
|
- [CVE-2024-40828](CVE-2024/CVE-2024-408xx/CVE-2024-40828.json) (`2024-12-11T19:46:12.057`)
|
||||||
- [CVE-2024-53138](CVE-2024/CVE-2024-531xx/CVE-2024-53138.json) (`2024-12-11T16:59:47.763`)
|
- [CVE-2024-40829](CVE-2024/CVE-2024-408xx/CVE-2024-40829.json) (`2024-12-11T19:45:39.007`)
|
||||||
- [CVE-2024-53442](CVE-2024/CVE-2024-534xx/CVE-2024-53442.json) (`2024-12-11T17:15:19.083`)
|
- [CVE-2024-40836](CVE-2024/CVE-2024-408xx/CVE-2024-40836.json) (`2024-12-11T19:40:36.427`)
|
||||||
- [CVE-2024-53472](CVE-2024/CVE-2024-534xx/CVE-2024-53472.json) (`2024-12-11T17:15:19.720`)
|
- [CVE-2024-44306](CVE-2024/CVE-2024-443xx/CVE-2024-44306.json) (`2024-12-11T20:34:16.127`)
|
||||||
- [CVE-2024-53490](CVE-2024/CVE-2024-534xx/CVE-2024-53490.json) (`2024-12-11T17:15:19.903`)
|
- [CVE-2024-44307](CVE-2024/CVE-2024-443xx/CVE-2024-44307.json) (`2024-12-11T20:32:54.970`)
|
||||||
- [CVE-2024-53523](CVE-2024/CVE-2024-535xx/CVE-2024-53523.json) (`2024-12-11T17:15:20.073`)
|
- [CVE-2024-53109](CVE-2024/CVE-2024-531xx/CVE-2024-53109.json) (`2024-12-11T20:21:25.433`)
|
||||||
- [CVE-2024-53589](CVE-2024/CVE-2024-535xx/CVE-2024-53589.json) (`2024-12-11T17:15:20.233`)
|
- [CVE-2024-53110](CVE-2024/CVE-2024-531xx/CVE-2024-53110.json) (`2024-12-11T20:24:25.883`)
|
||||||
- [CVE-2024-54745](CVE-2024/CVE-2024-547xx/CVE-2024-54745.json) (`2024-12-11T17:15:20.460`)
|
- [CVE-2024-53111](CVE-2024/CVE-2024-531xx/CVE-2024-53111.json) (`2024-12-11T20:27:04.360`)
|
||||||
- [CVE-2024-54922](CVE-2024/CVE-2024-549xx/CVE-2024-54922.json) (`2024-12-11T17:23:39.127`)
|
- [CVE-2024-53112](CVE-2024/CVE-2024-531xx/CVE-2024-53112.json) (`2024-12-11T20:28:19.407`)
|
||||||
- [CVE-2024-54926](CVE-2024/CVE-2024-549xx/CVE-2024-54926.json) (`2024-12-11T17:24:11.403`)
|
- [CVE-2024-53113](CVE-2024/CVE-2024-531xx/CVE-2024-53113.json) (`2024-12-11T20:29:10.150`)
|
||||||
- [CVE-2024-54930](CVE-2024/CVE-2024-549xx/CVE-2024-54930.json) (`2024-12-11T17:20:32.780`)
|
- [CVE-2024-53114](CVE-2024/CVE-2024-531xx/CVE-2024-53114.json) (`2024-12-11T20:30:29.440`)
|
||||||
- [CVE-2024-54933](CVE-2024/CVE-2024-549xx/CVE-2024-54933.json) (`2024-12-11T17:19:32.987`)
|
- [CVE-2024-53115](CVE-2024/CVE-2024-531xx/CVE-2024-53115.json) (`2024-12-11T20:31:39.927`)
|
||||||
- [CVE-2024-54937](CVE-2024/CVE-2024-549xx/CVE-2024-54937.json) (`2024-12-11T17:15:20.790`)
|
- [CVE-2024-53116](CVE-2024/CVE-2024-531xx/CVE-2024-53116.json) (`2024-12-11T20:34:11.147`)
|
||||||
- [CVE-2024-55268](CVE-2024/CVE-2024-552xx/CVE-2024-55268.json) (`2024-12-11T17:15:20.920`)
|
- [CVE-2024-53117](CVE-2024/CVE-2024-531xx/CVE-2024-53117.json) (`2024-12-11T20:44:30.167`)
|
||||||
- [CVE-2024-55582](CVE-2024/CVE-2024-555xx/CVE-2024-55582.json) (`2024-12-11T17:15:21.103`)
|
- [CVE-2024-53118](CVE-2024/CVE-2024-531xx/CVE-2024-53118.json) (`2024-12-11T20:52:52.993`)
|
||||||
- [CVE-2024-55634](CVE-2024/CVE-2024-556xx/CVE-2024-55634.json) (`2024-12-11T17:15:21.243`)
|
- [CVE-2024-53119](CVE-2024/CVE-2024-531xx/CVE-2024-53119.json) (`2024-12-11T20:55:09.957`)
|
||||||
- [CVE-2024-9978](CVE-2024/CVE-2024-99xx/CVE-2024-9978.json) (`2024-12-11T17:20:04.517`)
|
- [CVE-2024-53120](CVE-2024/CVE-2024-531xx/CVE-2024-53120.json) (`2024-12-11T20:59:36.660`)
|
||||||
|
|
||||||
|
|
||||||
## Download and Usage
|
## Download and Usage
|
||||||
|
236
_state.csv
236
_state.csv
@ -138503,7 +138503,7 @@ CVE-2019-25105,0,0,2d2f4b60fbc7052293e6c62b503b2f8a1b560d07d1adf6bbfa5d349e649e2
|
|||||||
CVE-2019-2511,0,0,c0988ccd82bc5b584b1f45acde74dea31fbfe8a406e71873f462eefd767ca6fe,2024-11-21T04:41:01.153000
|
CVE-2019-2511,0,0,c0988ccd82bc5b584b1f45acde74dea31fbfe8a406e71873f462eefd767ca6fe,2024-11-21T04:41:01.153000
|
||||||
CVE-2019-2512,0,0,d868a4bd495eb28e78f5bf29d3144bf81d9c043ac0ea1126f1af4a0cbca3254b,2024-11-21T04:41:01.290000
|
CVE-2019-2512,0,0,d868a4bd495eb28e78f5bf29d3144bf81d9c043ac0ea1126f1af4a0cbca3254b,2024-11-21T04:41:01.290000
|
||||||
CVE-2019-2513,0,0,89a4f0afa00fb6165e067c0fd554018d0b7b0c382d11df235e6c1701240f4e3c,2024-11-21T04:41:01.420000
|
CVE-2019-2513,0,0,89a4f0afa00fb6165e067c0fd554018d0b7b0c382d11df235e6c1701240f4e3c,2024-11-21T04:41:01.420000
|
||||||
CVE-2019-25136,0,1,45e98e459d7f8d4f6cd4e12d2c20f5e7c66568e3609250a98d78ee717473ecc7,2024-12-11T17:15:05.877000
|
CVE-2019-25136,0,0,45e98e459d7f8d4f6cd4e12d2c20f5e7c66568e3609250a98d78ee717473ecc7,2024-12-11T17:15:05.877000
|
||||||
CVE-2019-25137,0,0,611eef4fb5b2d87eb40bc5f0bd86b472f4c73525c37c88325d45367ef895d81d,2024-11-21T04:39:57.323000
|
CVE-2019-25137,0,0,611eef4fb5b2d87eb40bc5f0bd86b472f4c73525c37c88325d45367ef895d81d,2024-11-21T04:39:57.323000
|
||||||
CVE-2019-25138,0,0,986e567409626728e38c746233e290013c4b79fa210185f46a0055f3b8a89566,2024-11-21T04:39:57.490000
|
CVE-2019-25138,0,0,986e567409626728e38c746233e290013c4b79fa210185f46a0055f3b8a89566,2024-11-21T04:39:57.490000
|
||||||
CVE-2019-25139,0,0,b70320216716a9cee9596425903e50f90d308e70626c905bd6562dca135abb24,2024-11-21T04:39:57.630000
|
CVE-2019-25139,0,0,b70320216716a9cee9596425903e50f90d308e70626c905bd6562dca135abb24,2024-11-21T04:39:57.630000
|
||||||
@ -152627,9 +152627,9 @@ CVE-2020-2003,0,0,0bb5c81bbe8d93ca13601629ed88e3d6a42bdcdf99420a2dab31a5615a060c
|
|||||||
CVE-2020-2004,0,0,473c017dfac81f5d00352b99d0fe53e8c6050adebd66e4b6135c478531f255c1,2024-11-21T05:24:25.340000
|
CVE-2020-2004,0,0,473c017dfac81f5d00352b99d0fe53e8c6050adebd66e4b6135c478531f255c1,2024-11-21T05:24:25.340000
|
||||||
CVE-2020-2005,0,0,ee9830bb79335fab3965556750580fb09ebe7c570864fd98d4909beafe359ee8,2024-11-21T05:24:25.537000
|
CVE-2020-2005,0,0,ee9830bb79335fab3965556750580fb09ebe7c570864fd98d4909beafe359ee8,2024-11-21T05:24:25.537000
|
||||||
CVE-2020-2006,0,0,8a5572a98e809c79e5f6c3f90914aa4e6e3fd94f7beae4d57652e1dcc97d50b6,2024-11-21T05:24:25.720000
|
CVE-2020-2006,0,0,8a5572a98e809c79e5f6c3f90914aa4e6e3fd94f7beae4d57652e1dcc97d50b6,2024-11-21T05:24:25.720000
|
||||||
CVE-2020-20067,0,1,5bd71e577ab402e4f4cd428af147b9847c424a0a346d0dc1f093c9a9c6098002,2024-12-11T17:15:08.677000
|
CVE-2020-20067,0,0,5bd71e577ab402e4f4cd428af147b9847c424a0a346d0dc1f093c9a9c6098002,2024-12-11T17:15:08.677000
|
||||||
CVE-2020-2007,0,0,e892dce87da51d9ea48d03c950daf2de41e3ae32cc74c6bb0607aca872d2370b,2024-11-21T05:24:25.880000
|
CVE-2020-2007,0,0,e892dce87da51d9ea48d03c950daf2de41e3ae32cc74c6bb0607aca872d2370b,2024-11-21T05:24:25.880000
|
||||||
CVE-2020-20070,0,1,a73d0f64c263a275a0607448fb52d4c5fbb80a3b31f4ee1afd7ad2634350658b,2024-12-11T17:15:09.410000
|
CVE-2020-20070,0,0,a73d0f64c263a275a0607448fb52d4c5fbb80a3b31f4ee1afd7ad2634350658b,2024-12-11T17:15:09.410000
|
||||||
CVE-2020-2008,0,0,685c0cf3ac43e23cb18437a2868c3567c70f201deefaebbab6d19472d9d00e6f,2024-11-21T05:24:26.053000
|
CVE-2020-2008,0,0,685c0cf3ac43e23cb18437a2868c3567c70f201deefaebbab6d19472d9d00e6f,2024-11-21T05:24:26.053000
|
||||||
CVE-2020-2009,0,0,89e301c339436b9b995f40fba36a1bbee7eff3c131f7c26cf0f262a2ba60500f,2024-11-21T05:24:26.243000
|
CVE-2020-2009,0,0,89e301c339436b9b995f40fba36a1bbee7eff3c131f7c26cf0f262a2ba60500f,2024-11-21T05:24:26.243000
|
||||||
CVE-2020-20092,0,0,6eea068d89bdf08a6726c59f3fca4ec448823acc73c74af648c8c120dc1d56b3,2024-11-21T05:11:49.920000
|
CVE-2020-20092,0,0,6eea068d89bdf08a6726c59f3fca4ec448823acc73c74af648c8c120dc1d56b3,2024-11-21T05:11:49.920000
|
||||||
@ -152851,7 +152851,7 @@ CVE-2020-20703,0,0,9fa0a0d6377328a527ec7a4cf87560b9b471e23933351a67a89251a890f3b
|
|||||||
CVE-2020-2071,0,0,52503cf5be8c814fdbd15c9c7c05152acda201336c3679b5e0371e974c905229,2023-11-07T03:21:38.630000
|
CVE-2020-2071,0,0,52503cf5be8c814fdbd15c9c7c05152acda201336c3679b5e0371e974c905229,2023-11-07T03:21:38.630000
|
||||||
CVE-2020-20718,0,0,bfa43fcda3d3e9afc0e65549bf55ad8a55d489d1cb4123f8549a94680ef59605,2024-12-10T18:15:22.673000
|
CVE-2020-20718,0,0,bfa43fcda3d3e9afc0e65549bf55ad8a55d489d1cb4123f8549a94680ef59605,2024-12-10T18:15:22.673000
|
||||||
CVE-2020-2072,0,0,154bc74bb11e59c2af149ddc832bd8c915bd314c6e7568132bcfaa568de92143,2023-11-07T03:21:38.860000
|
CVE-2020-2072,0,0,154bc74bb11e59c2af149ddc832bd8c915bd314c6e7568132bcfaa568de92143,2023-11-07T03:21:38.860000
|
||||||
CVE-2020-20725,0,1,c88f460fb8df2b361d5e1511608c539ca65f39efda9c191cb9fe633ddd0de60d,2024-12-11T17:15:09.930000
|
CVE-2020-20725,0,0,c88f460fb8df2b361d5e1511608c539ca65f39efda9c191cb9fe633ddd0de60d,2024-12-11T17:15:09.930000
|
||||||
CVE-2020-20726,0,0,edcec45d7f37b943efe44c6b4ff2e11f8066b1ce08b1324592ed70d43054324b,2024-12-11T15:15:06.953000
|
CVE-2020-20726,0,0,edcec45d7f37b943efe44c6b4ff2e11f8066b1ce08b1324592ed70d43054324b,2024-12-11T15:15:06.953000
|
||||||
CVE-2020-2073,0,0,a28a9d77f0aba17d584da12e3595e8b99e7a49642b378ce3cf4fa02f4836976b,2023-11-07T03:21:39.100000
|
CVE-2020-2073,0,0,a28a9d77f0aba17d584da12e3595e8b99e7a49642b378ce3cf4fa02f4836976b,2023-11-07T03:21:39.100000
|
||||||
CVE-2020-20735,0,0,08a621bab1bd76991868d51da53b4faa6c5fb4285908e26091134f1c6e40e0a7,2024-12-10T18:15:22.867000
|
CVE-2020-20735,0,0,08a621bab1bd76991868d51da53b4faa6c5fb4285908e26091134f1c6e40e0a7,2024-12-10T18:15:22.867000
|
||||||
@ -219731,10 +219731,10 @@ CVE-2023-2573,0,0,40a20e38e77809c8ffedcfa100abf33f2c5d5a2603128f087df5ce171f6bc9
|
|||||||
CVE-2023-25730,0,0,5938f4a29a2f7f7398508b274f7f27223f21ce5e25ea5e33b585f94266b480a6,2024-11-21T07:50:01.977000
|
CVE-2023-25730,0,0,5938f4a29a2f7f7398508b274f7f27223f21ce5e25ea5e33b585f94266b480a6,2024-11-21T07:50:01.977000
|
||||||
CVE-2023-25731,0,0,95b511e9492a8b26a85d7b5c8cca492c8539be4e7599ef21acbd63f0f1f9fe86,2024-11-21T07:50:02.110000
|
CVE-2023-25731,0,0,95b511e9492a8b26a85d7b5c8cca492c8539be4e7599ef21acbd63f0f1f9fe86,2024-11-21T07:50:02.110000
|
||||||
CVE-2023-25732,0,0,89d8810a2a49fff1b30790fd0c5f6679266f4c83e96dffba5a1df7e9c6260e49,2024-11-21T07:50:02.223000
|
CVE-2023-25732,0,0,89d8810a2a49fff1b30790fd0c5f6679266f4c83e96dffba5a1df7e9c6260e49,2024-11-21T07:50:02.223000
|
||||||
CVE-2023-25733,0,1,10a90ae5ad556926804a31843a3012f99b62c69cd2f456be9096450447d05d49,2024-12-11T17:15:10.510000
|
CVE-2023-25733,0,0,10a90ae5ad556926804a31843a3012f99b62c69cd2f456be9096450447d05d49,2024-12-11T17:15:10.510000
|
||||||
CVE-2023-25734,0,0,5233edcade88c98d3d87cdff2f784c1367df5b38d54617d59a2edecd505479b6,2024-11-21T07:50:02.470000
|
CVE-2023-25734,0,0,5233edcade88c98d3d87cdff2f784c1367df5b38d54617d59a2edecd505479b6,2024-11-21T07:50:02.470000
|
||||||
CVE-2023-25735,0,0,7f54db20849cf0543cac27806e5b50d084dec588e16c5bba89d212267d0aea14,2024-11-21T07:50:02.613000
|
CVE-2023-25735,0,0,7f54db20849cf0543cac27806e5b50d084dec588e16c5bba89d212267d0aea14,2024-11-21T07:50:02.613000
|
||||||
CVE-2023-25736,0,1,76f650a4fed8de36a04203b9343e8d99f692c9c436b2bff95df16f6bad103603,2024-12-11T17:15:11.430000
|
CVE-2023-25736,0,0,76f650a4fed8de36a04203b9343e8d99f692c9c436b2bff95df16f6bad103603,2024-12-11T17:15:11.430000
|
||||||
CVE-2023-25737,0,0,a4ba1ad4a2d37de6cf866b05f3c8dd14acae53d075e4f2529273d8a822f1cd18,2024-11-21T07:50:02.873000
|
CVE-2023-25737,0,0,a4ba1ad4a2d37de6cf866b05f3c8dd14acae53d075e4f2529273d8a822f1cd18,2024-11-21T07:50:02.873000
|
||||||
CVE-2023-25738,0,0,f3d5eed0e5f951142c6a6691439f9be7a3f48664280dacb415bd1d5f992de8d6,2024-11-21T07:50:03.007000
|
CVE-2023-25738,0,0,f3d5eed0e5f951142c6a6691439f9be7a3f48664280dacb415bd1d5f992de8d6,2024-11-21T07:50:03.007000
|
||||||
CVE-2023-25739,0,0,136df5b9574de59efa9de44dbcbd90b6f7e781b2083a51a1b6ecc4d7578c3714,2024-11-21T07:50:03.150000
|
CVE-2023-25739,0,0,136df5b9574de59efa9de44dbcbd90b6f7e781b2083a51a1b6ecc4d7578c3714,2024-11-21T07:50:03.150000
|
||||||
@ -220614,7 +220614,7 @@ CVE-2023-26829,0,0,71868b4f394c052ce5116670118792d9ee7b0b9eef37549e7082cbaae0b0a
|
|||||||
CVE-2023-2683,0,0,6321281989e28a431315c290991dffbeb4f9ce891d32e039908e243de9f291c5,2024-11-21T07:59:04.673000
|
CVE-2023-2683,0,0,6321281989e28a431315c290991dffbeb4f9ce891d32e039908e243de9f291c5,2024-11-21T07:59:04.673000
|
||||||
CVE-2023-26830,0,0,a416682310687f6038d561d31260ca35b08ac5632ed77570568e55f17d7dc4c9,2024-11-21T07:51:59.023000
|
CVE-2023-26830,0,0,a416682310687f6038d561d31260ca35b08ac5632ed77570568e55f17d7dc4c9,2024-11-21T07:51:59.023000
|
||||||
CVE-2023-26839,0,0,2e06e162dd6641d9de27a0ae00ad48d10c52ded486a65242954258790a85b3db,2024-11-21T07:51:59.153000
|
CVE-2023-26839,0,0,2e06e162dd6641d9de27a0ae00ad48d10c52ded486a65242954258790a85b3db,2024-11-21T07:51:59.153000
|
||||||
CVE-2023-2684,0,1,d4da490eebef562874c85cc5dae74b568240f925b5edf3f8b53ae8cd615e419e,2024-12-11T17:15:12.467000
|
CVE-2023-2684,0,0,d4da490eebef562874c85cc5dae74b568240f925b5edf3f8b53ae8cd615e419e,2024-12-11T17:15:12.467000
|
||||||
CVE-2023-26840,0,0,10050fa474c9498a342f4f18f7f213f12f1c53764b6fe15f92bb7bd024f628fc,2024-11-21T07:51:59.293000
|
CVE-2023-26840,0,0,10050fa474c9498a342f4f18f7f213f12f1c53764b6fe15f92bb7bd024f628fc,2024-11-21T07:51:59.293000
|
||||||
CVE-2023-26841,0,0,cf784a03f1035170d882277f185f72bfa73df1e3de452edb90b82c5e700e3c31,2024-11-21T07:51:59.427000
|
CVE-2023-26841,0,0,cf784a03f1035170d882277f185f72bfa73df1e3de452edb90b82c5e700e3c31,2024-11-21T07:51:59.427000
|
||||||
CVE-2023-26842,0,0,0b76b30ff46a8c967d9ab802040e37b1a2652269404f1556a38d873bc56b67df,2024-11-21T07:51:59.560000
|
CVE-2023-26842,0,0,0b76b30ff46a8c967d9ab802040e37b1a2652269404f1556a38d873bc56b67df,2024-11-21T07:51:59.560000
|
||||||
@ -221498,7 +221498,7 @@ CVE-2023-27971,0,0,697871038e9f195dda48b8c3a640aa8bbf063c21a5ff59442a2ac68d2ea6c
|
|||||||
CVE-2023-27972,0,0,420429654e9bf1c36921c5fb5ba9fd2a3cef17c110a30df72aaea78d27cfc78c,2024-11-21T07:53:50.660000
|
CVE-2023-27972,0,0,420429654e9bf1c36921c5fb5ba9fd2a3cef17c110a30df72aaea78d27cfc78c,2024-11-21T07:53:50.660000
|
||||||
CVE-2023-27973,0,0,d08fe914a7a90b67c8fff32446e07617af2ab2e8c1d32e40b6c83140c1b3a4f8,2024-11-21T07:53:50.817000
|
CVE-2023-27973,0,0,d08fe914a7a90b67c8fff32446e07617af2ab2e8c1d32e40b6c83140c1b3a4f8,2024-11-21T07:53:50.817000
|
||||||
CVE-2023-27974,0,0,3ad1eff0022adec35468a53c0c2dda6cdf1c1306b3acd8c5eb169ac126c3b376,2024-11-21T07:53:50.983000
|
CVE-2023-27974,0,0,3ad1eff0022adec35468a53c0c2dda6cdf1c1306b3acd8c5eb169ac126c3b376,2024-11-21T07:53:50.983000
|
||||||
CVE-2023-27975,0,0,e3c23f84b70c3aa565941d5acaf057eec56a7b16c67483ed335d6c8a2cea2a98,2024-11-21T07:53:51.157000
|
CVE-2023-27975,0,1,a8b615a95c618fd666d7af4dd64ecaf20efa67e612e19e9284003a5b9ca75398,2024-12-11T19:33:27.327000
|
||||||
CVE-2023-27976,0,0,1240c9e56fa57ba402d3f7e0a14dff38751e133e041d1bb8c630fe5679aa2691,2024-11-21T07:53:51.340000
|
CVE-2023-27976,0,0,1240c9e56fa57ba402d3f7e0a14dff38751e133e041d1bb8c630fe5679aa2691,2024-11-21T07:53:51.340000
|
||||||
CVE-2023-27977,0,0,857c0588f212ad0444d729b9bdbc719f3ff7494c48677155ae6ada64511bceb5,2024-11-21T07:53:51.470000
|
CVE-2023-27977,0,0,857c0588f212ad0444d729b9bdbc719f3ff7494c48677155ae6ada64511bceb5,2024-11-21T07:53:51.470000
|
||||||
CVE-2023-27978,0,0,c5eb2c6d56ffdb1729f08196cf9badfd393df023c5ef837a92c0fe3c0ea271df,2024-11-21T07:53:51.587000
|
CVE-2023-27978,0,0,c5eb2c6d56ffdb1729f08196cf9badfd393df023c5ef837a92c0fe3c0ea271df,2024-11-21T07:53:51.587000
|
||||||
@ -221634,7 +221634,7 @@ CVE-2023-28106,0,0,481689ebfd6fb74281124561e2bac0d8593540f48a8ce688ce35f9d319530
|
|||||||
CVE-2023-28107,0,0,7a79af014a2001f54fa1b2bbb7a0ea159b9a65fbe0579339a25b58cdf0454658,2024-11-21T07:54:25.113000
|
CVE-2023-28107,0,0,7a79af014a2001f54fa1b2bbb7a0ea159b9a65fbe0579339a25b58cdf0454658,2024-11-21T07:54:25.113000
|
||||||
CVE-2023-28108,0,0,0da0e2d41b61273f6a52433b74ae3026f46c267a32386fe63d07f1537660301b,2024-11-21T07:54:25.270000
|
CVE-2023-28108,0,0,0da0e2d41b61273f6a52433b74ae3026f46c267a32386fe63d07f1537660301b,2024-11-21T07:54:25.270000
|
||||||
CVE-2023-28109,0,0,4264a59f43287fdfd8eea938b30877a7852dbbe46e6159779972fd259eb0f878,2024-11-21T07:54:25.390000
|
CVE-2023-28109,0,0,4264a59f43287fdfd8eea938b30877a7852dbbe46e6159779972fd259eb0f878,2024-11-21T07:54:25.390000
|
||||||
CVE-2023-2811,0,1,2b2bb541e051e07931351d2d875c5065249c215140680ce3499a7c9c2eda86e0,2024-12-11T17:15:12.677000
|
CVE-2023-2811,0,0,2b2bb541e051e07931351d2d875c5065249c215140680ce3499a7c9c2eda86e0,2024-12-11T17:15:12.677000
|
||||||
CVE-2023-28110,0,0,11e8676d151f66db62aa376f6b730d213454c85cf9a0a782300072b21b7d07ba,2024-11-21T07:54:25.523000
|
CVE-2023-28110,0,0,11e8676d151f66db62aa376f6b730d213454c85cf9a0a782300072b21b7d07ba,2024-11-21T07:54:25.523000
|
||||||
CVE-2023-28111,0,0,cb42a440c06843b882beacb0577450d3f63e664820ad80aa4d790b04eed5aed0,2024-11-21T07:54:25.660000
|
CVE-2023-28111,0,0,cb42a440c06843b882beacb0577450d3f63e664820ad80aa4d790b04eed5aed0,2024-11-21T07:54:25.660000
|
||||||
CVE-2023-28112,0,0,e0e4150c1c8b3396312e669e9b5b9bb89ebcd154f6b7d1de301832ab38c25ba4,2024-11-21T07:54:25.787000
|
CVE-2023-28112,0,0,e0e4150c1c8b3396312e669e9b5b9bb89ebcd154f6b7d1de301832ab38c25ba4,2024-11-21T07:54:25.787000
|
||||||
@ -222982,7 +222982,7 @@ CVE-2023-29542,0,0,46b8932e18265980690a3bcaa6fb35d98fb3d5a02f300b2e5626bd6c59fbe
|
|||||||
CVE-2023-29543,0,0,f316bf6ac4bd9f13fdef4eedac5dd7397ba341296875b6769be678c979946300,2024-11-21T07:57:16.047000
|
CVE-2023-29543,0,0,f316bf6ac4bd9f13fdef4eedac5dd7397ba341296875b6769be678c979946300,2024-11-21T07:57:16.047000
|
||||||
CVE-2023-29544,0,0,4f51f44fd5cabc3b79b2a7a7978204c4c24836c255ad25bf71f89fa796f8c720,2024-11-21T07:57:16.150000
|
CVE-2023-29544,0,0,4f51f44fd5cabc3b79b2a7a7978204c4c24836c255ad25bf71f89fa796f8c720,2024-11-21T07:57:16.150000
|
||||||
CVE-2023-29545,0,0,46705769a17275c16028682008fb3b90c787fd80d73cb633eacf73710e5b4383,2024-12-11T16:15:09.403000
|
CVE-2023-29545,0,0,46705769a17275c16028682008fb3b90c787fd80d73cb633eacf73710e5b4383,2024-12-11T16:15:09.403000
|
||||||
CVE-2023-29546,0,1,57d0023a77f60c8dc8855dcfbf98938a34f4d67c23bef24cdf588d53af50b83c,2024-12-11T17:15:11.990000
|
CVE-2023-29546,0,0,57d0023a77f60c8dc8855dcfbf98938a34f4d67c23bef24cdf588d53af50b83c,2024-12-11T17:15:11.990000
|
||||||
CVE-2023-29547,0,0,8fc777296f97d4ea9bc87b22b8f33be24f41690dee114e2f7f2c228e53b57fba,2024-11-21T07:57:16.487000
|
CVE-2023-29547,0,0,8fc777296f97d4ea9bc87b22b8f33be24f41690dee114e2f7f2c228e53b57fba,2024-11-21T07:57:16.487000
|
||||||
CVE-2023-29548,0,0,00e902680bbcecab5106b6846ed6e510d2721dffb60f34398345ef8db93261a7,2024-11-21T07:57:16.590000
|
CVE-2023-29548,0,0,00e902680bbcecab5106b6846ed6e510d2721dffb60f34398345ef8db93261a7,2024-11-21T07:57:16.590000
|
||||||
CVE-2023-29549,0,0,4e4192b4015dfe410378a0838eaec5c6eacfc95fba4abbebc809259190d6e4a5,2024-11-21T07:57:16.700000
|
CVE-2023-29549,0,0,4e4192b4015dfe410378a0838eaec5c6eacfc95fba4abbebc809259190d6e4a5,2024-11-21T07:57:16.700000
|
||||||
@ -225680,7 +225680,7 @@ CVE-2023-33145,0,0,c40c0d5c4137def4c60290cbe0d22345cda79bca8c19201e079fff62a834f
|
|||||||
CVE-2023-33146,0,0,75077b07f61cf9475551388324a9a1aebc58b8358dd1b7357824810a762005eb,2024-11-21T08:04:58.943000
|
CVE-2023-33146,0,0,75077b07f61cf9475551388324a9a1aebc58b8358dd1b7357824810a762005eb,2024-11-21T08:04:58.943000
|
||||||
CVE-2023-33148,0,0,646b0ba12b97235637d81b067194a3f742d19e0e2391184dfbdfe75c6f57e6b1,2024-11-21T08:04:59.060000
|
CVE-2023-33148,0,0,646b0ba12b97235637d81b067194a3f742d19e0e2391184dfbdfe75c6f57e6b1,2024-11-21T08:04:59.060000
|
||||||
CVE-2023-33149,0,0,f75f0a747a83f3f235651d937dd265d40c46a2ffafd9e6970a83f54434de4e89,2024-11-21T08:04:59.187000
|
CVE-2023-33149,0,0,f75f0a747a83f3f235651d937dd265d40c46a2ffafd9e6970a83f54434de4e89,2024-11-21T08:04:59.187000
|
||||||
CVE-2023-3315,0,1,a5cc1682b0bd1470d76652335c3939881cf5018e24052724b93fef0a4f802a67,2024-12-11T17:15:13.593000
|
CVE-2023-3315,0,0,a5cc1682b0bd1470d76652335c3939881cf5018e24052724b93fef0a4f802a67,2024-12-11T17:15:13.593000
|
||||||
CVE-2023-33150,0,0,6caba448143db509122b7504b690c83b3cc3aee90d66e70f5c8040cea0e99105,2024-11-21T08:04:59.320000
|
CVE-2023-33150,0,0,6caba448143db509122b7504b690c83b3cc3aee90d66e70f5c8040cea0e99105,2024-11-21T08:04:59.320000
|
||||||
CVE-2023-33151,0,0,f17e6ac28e2729340aa6594d68ce2d2b7fdb7124deed3a7280a0d99b4b5d9838,2024-11-21T08:04:59.440000
|
CVE-2023-33151,0,0,f17e6ac28e2729340aa6594d68ce2d2b7fdb7124deed3a7280a0d99b4b5d9838,2024-11-21T08:04:59.440000
|
||||||
CVE-2023-33152,0,0,939457a123619614ab551649c36717856d708fedb4cfe7b746afc7d87b9f32b9,2024-11-21T08:04:59.563000
|
CVE-2023-33152,0,0,939457a123619614ab551649c36717856d708fedb4cfe7b746afc7d87b9f32b9,2024-11-21T08:04:59.563000
|
||||||
@ -227503,7 +227503,7 @@ CVE-2023-3585,0,0,8314547bb503bc3211ef720722155e9222a54630cec4c373aa5acdebbaf719
|
|||||||
CVE-2023-35850,0,0,1ffb00e9d510fb74e6835c7f412b0d3ef15914ff877dc7a341b727fde212b5e7,2024-11-21T08:08:49.250000
|
CVE-2023-35850,0,0,1ffb00e9d510fb74e6835c7f412b0d3ef15914ff877dc7a341b727fde212b5e7,2024-11-21T08:08:49.250000
|
||||||
CVE-2023-35851,0,0,77839f6476b1f8c026b815652c623876574634ec2785a7cd0dca712035b38396,2024-11-21T08:08:49.380000
|
CVE-2023-35851,0,0,77839f6476b1f8c026b815652c623876574634ec2785a7cd0dca712035b38396,2024-11-21T08:08:49.380000
|
||||||
CVE-2023-35852,0,0,cf191db85c13679b30f440535a9af76ac17d3f6970527f4a9c94adb5826aeb10,2024-11-21T08:08:49.503000
|
CVE-2023-35852,0,0,cf191db85c13679b30f440535a9af76ac17d3f6970527f4a9c94adb5826aeb10,2024-11-21T08:08:49.503000
|
||||||
CVE-2023-35853,0,1,d15643a36ed5c0348b7f37bb9c18bffe13b7be5febc67133c1fe2eb5da2bd42d,2024-12-11T17:15:13.037000
|
CVE-2023-35853,0,0,d15643a36ed5c0348b7f37bb9c18bffe13b7be5febc67133c1fe2eb5da2bd42d,2024-12-11T17:15:13.037000
|
||||||
CVE-2023-35854,0,0,8e3dd18f7ac3815cb66905a8f948fd7f2ee46134910b5a7e6c70a596cda48c15,2024-11-21T08:08:49.827000
|
CVE-2023-35854,0,0,8e3dd18f7ac3815cb66905a8f948fd7f2ee46134910b5a7e6c70a596cda48c15,2024-11-21T08:08:49.827000
|
||||||
CVE-2023-35855,0,0,462c8837191df7cb2596dc63b32fbd4d5044336709229bca76680da0c067cb4d,2024-11-21T08:08:49.980000
|
CVE-2023-35855,0,0,462c8837191df7cb2596dc63b32fbd4d5044336709229bca76680da0c067cb4d,2024-11-21T08:08:49.980000
|
||||||
CVE-2023-35856,0,0,b7bfd38d60a2dd0f91e795d548e864ae5047a63adfda033242d00c5e9860e504,2024-11-21T08:08:50.117000
|
CVE-2023-35856,0,0,b7bfd38d60a2dd0f91e795d548e864ae5047a63adfda033242d00c5e9860e504,2024-11-21T08:08:50.117000
|
||||||
@ -227515,7 +227515,7 @@ CVE-2023-35860,0,0,20c16022c95fa5e10bcf2a63c48e8cacc3e2ec88d3a2bfbd3b853c5efb74f
|
|||||||
CVE-2023-35861,0,0,ab14211c026624f4b12d60fd07d08ed6fe8cda62b354386b065ac4c212e873ef,2024-11-21T08:08:51
|
CVE-2023-35861,0,0,ab14211c026624f4b12d60fd07d08ed6fe8cda62b354386b065ac4c212e873ef,2024-11-21T08:08:51
|
||||||
CVE-2023-35862,0,0,269f6a0572b06cea3af1f4b1e68b8e6025b8f8ac9d95cd25116be59c7bb9da11,2024-11-21T08:08:51.300000
|
CVE-2023-35862,0,0,269f6a0572b06cea3af1f4b1e68b8e6025b8f8ac9d95cd25116be59c7bb9da11,2024-11-21T08:08:51.300000
|
||||||
CVE-2023-35863,0,0,71f45b955d6161a8148d7ae8524480ccab490dfcd82cd6933c32c95a284c5203,2024-11-21T08:08:51.477000
|
CVE-2023-35863,0,0,71f45b955d6161a8148d7ae8524480ccab490dfcd82cd6933c32c95a284c5203,2024-11-21T08:08:51.477000
|
||||||
CVE-2023-35866,0,1,b8bb620a5b0c844bc123d40d310bc7e9043555be0b1802be47f03a758145ae77,2024-12-11T17:15:13.390000
|
CVE-2023-35866,0,0,b8bb620a5b0c844bc123d40d310bc7e9043555be0b1802be47f03a758145ae77,2024-12-11T17:15:13.390000
|
||||||
CVE-2023-35867,0,0,7b9ea116f3022384bbc08d3e3d911e296934f3f66e01c6a7501455b9a15f3639,2024-11-21T08:08:51.793000
|
CVE-2023-35867,0,0,7b9ea116f3022384bbc08d3e3d911e296934f3f66e01c6a7501455b9a15f3639,2024-11-21T08:08:51.793000
|
||||||
CVE-2023-3587,0,0,1f54e9fdb71d4673784fa0b15f44d1b8faf9a757eabbcc79dfa3a23c0b8a7cf2,2024-11-21T08:17:36.643000
|
CVE-2023-3587,0,0,1f54e9fdb71d4673784fa0b15f44d1b8faf9a757eabbcc79dfa3a23c0b8a7cf2,2024-11-21T08:17:36.643000
|
||||||
CVE-2023-35870,0,0,fb4521dbfeef764768d0f580ba80e8daf22603860339a6deacbe8f44931fda3c,2024-11-21T08:08:51.930000
|
CVE-2023-35870,0,0,fb4521dbfeef764768d0f580ba80e8daf22603860339a6deacbe8f44931fda3c,2024-11-21T08:08:51.930000
|
||||||
@ -236463,7 +236463,7 @@ CVE-2023-47997,0,0,12c5b586b678f710d3488c6ea0bce408a7fe54f1116b3c5b1079fafd97184
|
|||||||
CVE-2023-4800,0,0,401278beedadcdd4fa5081887eb268f7ffef99a4f3aec258870a6c584fe762f2,2024-11-21T08:35:59.570000
|
CVE-2023-4800,0,0,401278beedadcdd4fa5081887eb268f7ffef99a4f3aec258870a6c584fe762f2,2024-11-21T08:35:59.570000
|
||||||
CVE-2023-48003,0,0,39e2d8087ac8da7a3c050c642a95f0b99731fa2299f4641ccbdf29b34156ea6a,2024-11-21T08:30:59.023000
|
CVE-2023-48003,0,0,39e2d8087ac8da7a3c050c642a95f0b99731fa2299f4641ccbdf29b34156ea6a,2024-11-21T08:30:59.023000
|
||||||
CVE-2023-4801,0,0,1612b8ad8a100bd0095834f8cf820b43c1529313117b5922e35f752cf57742d4,2024-11-21T08:35:59.690000
|
CVE-2023-4801,0,0,1612b8ad8a100bd0095834f8cf820b43c1529313117b5922e35f752cf57742d4,2024-11-21T08:35:59.690000
|
||||||
CVE-2023-48010,0,1,e1fe89213ce90a7900e1f6a7994354bf24a589b18d4933ffb40f5731aa4ca2d7,2024-12-11T17:15:13.820000
|
CVE-2023-48010,0,0,e1fe89213ce90a7900e1f6a7994354bf24a589b18d4933ffb40f5731aa4ca2d7,2024-12-11T17:15:13.820000
|
||||||
CVE-2023-48011,0,0,d20184241bb926727b4fe3e3fcbd6b9c8788828c5bc07320d1129553260a884a,2024-11-21T08:30:59.223000
|
CVE-2023-48011,0,0,d20184241bb926727b4fe3e3fcbd6b9c8788828c5bc07320d1129553260a884a,2024-11-21T08:30:59.223000
|
||||||
CVE-2023-48013,0,0,5aa1cf92e1179d877001a7df378fe61d75436daaceda5d5b308bd8cfcc524ae5,2024-11-21T08:30:59.433000
|
CVE-2023-48013,0,0,5aa1cf92e1179d877001a7df378fe61d75436daaceda5d5b308bd8cfcc524ae5,2024-11-21T08:30:59.433000
|
||||||
CVE-2023-48014,0,0,4afcb211b6efbc049f2be7285e924ca939af0bc564c0c4609ff82f8f7bc44369,2024-11-21T08:30:59.577000
|
CVE-2023-48014,0,0,4afcb211b6efbc049f2be7285e924ca939af0bc564c0c4609ff82f8f7bc44369,2024-11-21T08:30:59.577000
|
||||||
@ -238547,7 +238547,7 @@ CVE-2023-50903,0,0,3fa39dc38762562804b11d7de8a76ce8c37c187505318c2992c59bc03cf63
|
|||||||
CVE-2023-50904,0,0,f93402b8c2d38f076f809b872a587a3eb637d7d4b9464cb3c4a545e44060d8f8,2024-12-09T13:15:39.360000
|
CVE-2023-50904,0,0,f93402b8c2d38f076f809b872a587a3eb637d7d4b9464cb3c4a545e44060d8f8,2024-12-09T13:15:39.360000
|
||||||
CVE-2023-50905,0,0,65070ee50cd677079288302c2ef7be4463199f179e536057085dd5d4415679d8,2024-11-21T08:37:30.600000
|
CVE-2023-50905,0,0,65070ee50cd677079288302c2ef7be4463199f179e536057085dd5d4415679d8,2024-11-21T08:37:30.600000
|
||||||
CVE-2023-5091,0,0,76e90fb12920cf8eb3c06980010aa42cc3b519c0b400c871e57db3605c7f9697,2024-11-21T08:41:02.960000
|
CVE-2023-5091,0,0,76e90fb12920cf8eb3c06980010aa42cc3b519c0b400c871e57db3605c7f9697,2024-11-21T08:41:02.960000
|
||||||
CVE-2023-50913,0,1,b8952c5f9cefbad968ab10bb33543ea53a3af411cf109c1a8265edd9f3910c7e,2024-12-11T17:15:13.987000
|
CVE-2023-50913,0,0,b8952c5f9cefbad968ab10bb33543ea53a3af411cf109c1a8265edd9f3910c7e,2024-12-11T17:15:13.987000
|
||||||
CVE-2023-50914,0,0,a68f3bdcc37bb0a7b603c178c02c36faa0c57813aa230f12907d1e36d8e33aa4,2024-11-21T08:37:30.730000
|
CVE-2023-50914,0,0,a68f3bdcc37bb0a7b603c178c02c36faa0c57813aa230f12907d1e36d8e33aa4,2024-11-21T08:37:30.730000
|
||||||
CVE-2023-50915,0,0,d05e58d330f4589b8a688ee1a68f73c809a3a719a6d618d110c84ab5faa981aa,2024-11-21T08:37:30.960000
|
CVE-2023-50915,0,0,d05e58d330f4589b8a688ee1a68f73c809a3a719a6d618d110c84ab5faa981aa,2024-11-21T08:37:30.960000
|
||||||
CVE-2023-50916,0,0,c28a373211a1c6b097f18432ad4535a66138f49347d4a2ac6a8ca52f359ef919,2024-11-21T08:37:31.173000
|
CVE-2023-50916,0,0,c28a373211a1c6b097f18432ad4535a66138f49347d4a2ac6a8ca52f359ef919,2024-11-21T08:37:31.173000
|
||||||
@ -239781,7 +239781,7 @@ CVE-2023-52574,0,0,8323bac1d9b1547c4da987d85886bb3baf8f9d838d025c7c0a11cea296a49
|
|||||||
CVE-2023-52575,0,0,a5b1456e1f4f3168b96ec99b70713689f039d7b9a7af7c035fa313f136ce995a,2024-04-25T06:15:52.767000
|
CVE-2023-52575,0,0,a5b1456e1f4f3168b96ec99b70713689f039d7b9a7af7c035fa313f136ce995a,2024-04-25T06:15:52.767000
|
||||||
CVE-2023-52576,0,0,9dd43aec57900dbc078e5d91979cedca10e73f2f39b1fcf866726ede9c267476,2024-11-21T08:40:06.350000
|
CVE-2023-52576,0,0,9dd43aec57900dbc078e5d91979cedca10e73f2f39b1fcf866726ede9c267476,2024-11-21T08:40:06.350000
|
||||||
CVE-2023-52577,0,0,5bd6982550137aea20a2ecd267614d20749b25811f7f7f8a84e7c7b156c3f5b0,2024-12-11T16:21:49.573000
|
CVE-2023-52577,0,0,5bd6982550137aea20a2ecd267614d20749b25811f7f7f8a84e7c7b156c3f5b0,2024-12-11T16:21:49.573000
|
||||||
CVE-2023-52578,0,1,7fde1fb5cbbb0a2937bb0b665d1b0debdfecb0d6288e6b5ff0d4a3ae6d5040d9,2024-12-11T17:44:23.533000
|
CVE-2023-52578,0,0,7fde1fb5cbbb0a2937bb0b665d1b0debdfecb0d6288e6b5ff0d4a3ae6d5040d9,2024-12-11T17:44:23.533000
|
||||||
CVE-2023-52579,0,0,46d3719ad784e436d8f68041c52fb234bc85c10006dd0f7ac61db478c13665bf,2024-03-04T16:15:49.340000
|
CVE-2023-52579,0,0,46d3719ad784e436d8f68041c52fb234bc85c10006dd0f7ac61db478c13665bf,2024-03-04T16:15:49.340000
|
||||||
CVE-2023-5258,0,0,0eac0cf4832fe4baeba17b515861a9fac722da219a538bafac0ab2693112b166,2024-11-21T08:41:23.570000
|
CVE-2023-5258,0,0,0eac0cf4832fe4baeba17b515861a9fac722da219a538bafac0ab2693112b166,2024-11-21T08:41:23.570000
|
||||||
CVE-2023-52580,0,0,b5e8245caac429cbfe54d5f9faf9ec643108211f2434aceb4bdea51b07278685,2024-11-21T08:40:06.887000
|
CVE-2023-52580,0,0,b5e8245caac429cbfe54d5f9faf9ec643108211f2434aceb4bdea51b07278685,2024-11-21T08:40:06.887000
|
||||||
@ -241164,7 +241164,7 @@ CVE-2023-6366,0,0,c81700b7298857b773609357411d7cd6d0b02ac8393a73ce8a6606b05ba2d9
|
|||||||
CVE-2023-6367,0,0,13d76c3bab03b632a5ac104354ccaddbcb44c50528fde449f747852266366fe0,2024-11-21T08:43:43.187000
|
CVE-2023-6367,0,0,13d76c3bab03b632a5ac104354ccaddbcb44c50528fde449f747852266366fe0,2024-11-21T08:43:43.187000
|
||||||
CVE-2023-6368,0,0,d7aade1b917eace2f4f7a629d1a8f587870cb2ed26467abb236ad6212afe7aca,2024-11-21T08:43:43.327000
|
CVE-2023-6368,0,0,d7aade1b917eace2f4f7a629d1a8f587870cb2ed26467abb236ad6212afe7aca,2024-11-21T08:43:43.327000
|
||||||
CVE-2023-6369,0,0,0684710d5098cb455bcc0c897289ba2b2e7af1dfe38f32171dee435c9acf05ec,2024-11-21T08:43:43.477000
|
CVE-2023-6369,0,0,0684710d5098cb455bcc0c897289ba2b2e7af1dfe38f32171dee435c9acf05ec,2024-11-21T08:43:43.477000
|
||||||
CVE-2023-6371,0,0,9f1ee062b8401b166397230d8f3a8ef14bc3a79efd8b5bc0d237cb284df2050a,2024-11-21T08:43:43.620000
|
CVE-2023-6371,0,1,bdf202c7e40c357c6b073175b5c7e7998f357cc642b231c8ed78a6a3a7f4c6ae,2024-12-11T20:26:05.660000
|
||||||
CVE-2023-6373,0,0,ae50e94c3438b36e9a3ebda05fda95ad4b2f8a3d74d2aabbf5139492357e4296,2024-11-21T08:43:43.753000
|
CVE-2023-6373,0,0,ae50e94c3438b36e9a3ebda05fda95ad4b2f8a3d74d2aabbf5139492357e4296,2024-11-21T08:43:43.753000
|
||||||
CVE-2023-6374,0,0,c2cfa15d0836d3f414742a5d2b6d44b857494d4b4f777df4bc71e86462c49e40,2024-11-21T08:43:43.890000
|
CVE-2023-6374,0,0,c2cfa15d0836d3f414742a5d2b6d44b857494d4b4f777df4bc71e86462c49e40,2024-11-21T08:43:43.890000
|
||||||
CVE-2023-6375,0,0,a3328413eb606f3d04183995fe30732c030df2bbe51aae4950d8517c7ddff638,2024-11-21T08:43:44.030000
|
CVE-2023-6375,0,0,a3328413eb606f3d04183995fe30732c030df2bbe51aae4950d8517c7ddff638,2024-11-21T08:43:44.030000
|
||||||
@ -241194,7 +241194,7 @@ CVE-2023-6401,0,0,b0f667a4dcd8ac6cdc2481ebbf204c862f58e6f2a554adfe690d5248646a0c
|
|||||||
CVE-2023-6402,0,0,0c89da37396c30e00e6d75f9aae38e19dbc57459695681cad5f81bca9e128446,2024-11-21T08:43:47.370000
|
CVE-2023-6402,0,0,0c89da37396c30e00e6d75f9aae38e19dbc57459695681cad5f81bca9e128446,2024-11-21T08:43:47.370000
|
||||||
CVE-2023-6407,0,0,dd10f941df2883a962d86cfc0f1f9b8ec320d08848c9ccf0363d118bd39eb390,2024-11-21T08:43:47.523000
|
CVE-2023-6407,0,0,dd10f941df2883a962d86cfc0f1f9b8ec320d08848c9ccf0363d118bd39eb390,2024-11-21T08:43:47.523000
|
||||||
CVE-2023-6408,0,0,0cedc637831222283fffb53e08c80d7989733459a15ffcd8421a31ac8746072e,2024-11-21T08:43:47.663000
|
CVE-2023-6408,0,0,0cedc637831222283fffb53e08c80d7989733459a15ffcd8421a31ac8746072e,2024-11-21T08:43:47.663000
|
||||||
CVE-2023-6409,0,0,b6f94212ba1704fd505900561be8c09df17208a00003d22ebe70aebf2c0daa3a,2024-11-21T08:43:47.797000
|
CVE-2023-6409,0,1,0f9352bdb6c1de606bdf3ef0c48621b69d24747b0de2a27df1c23bfb8768cae0,2024-12-11T19:33:54.427000
|
||||||
CVE-2023-6410,0,0,7f5d659d0706bec6f1add65010cc3be9af3f6ec1ff619f6bffb38f2d7bce54ab,2024-11-21T08:43:47.920000
|
CVE-2023-6410,0,0,7f5d659d0706bec6f1add65010cc3be9af3f6ec1ff619f6bffb38f2d7bce54ab,2024-11-21T08:43:47.920000
|
||||||
CVE-2023-6411,0,0,576c9ad94cee75db2b72bf62554810452e47edeca121016837c86aa1c12239f5,2024-11-21T08:43:48.047000
|
CVE-2023-6411,0,0,576c9ad94cee75db2b72bf62554810452e47edeca121016837c86aa1c12239f5,2024-11-21T08:43:48.047000
|
||||||
CVE-2023-6412,0,0,0dda674cc5906418fc0e519e16e714db5fe1e891e4d2e219eb93416eb240fb9a,2024-11-21T08:43:48.177000
|
CVE-2023-6412,0,0,0dda674cc5906418fc0e519e16e714db5fe1e891e4d2e219eb93416eb240fb9a,2024-11-21T08:43:48.177000
|
||||||
@ -241263,7 +241263,7 @@ CVE-2023-6485,0,0,88189a74e618a8780b3b3fb22c708fc0ffaa04a9d99cb8e28f399c48705d49
|
|||||||
CVE-2023-6486,0,0,3fb73e477ab2287dc3682414ba96858420b34c65203555550881fae7301da544,2024-11-21T08:43:56.887000
|
CVE-2023-6486,0,0,3fb73e477ab2287dc3682414ba96858420b34c65203555550881fae7301da544,2024-11-21T08:43:56.887000
|
||||||
CVE-2023-6487,0,0,23ae3b05d51ce51f76fa3e9d4fb6f7c2f380e6bbbcb03c51f14db68ee81a1ae4,2024-11-21T08:43:57.017000
|
CVE-2023-6487,0,0,23ae3b05d51ce51f76fa3e9d4fb6f7c2f380e6bbbcb03c51f14db68ee81a1ae4,2024-11-21T08:43:57.017000
|
||||||
CVE-2023-6488,0,0,d98f3cfb2d0e78a494791101f8ea0fff358cf4b57a1ea2cf08e8bf6dfb2dee4d,2024-11-21T08:43:57.150000
|
CVE-2023-6488,0,0,d98f3cfb2d0e78a494791101f8ea0fff358cf4b57a1ea2cf08e8bf6dfb2dee4d,2024-11-21T08:43:57.150000
|
||||||
CVE-2023-6489,0,0,105a70a7e56314cb419949aa8d599b15c5d24a9e67e1802b56fbb7ff19e1fb93,2024-11-21T08:43:57.290000
|
CVE-2023-6489,0,1,a9e4d7a039c991299a330f31e1936aa9d07858cc5c43626bc1bfc6ea780b752e,2024-12-11T19:06:06.800000
|
||||||
CVE-2023-6491,0,0,708b8f4bd32ebd1485ce2aad158d524378e5ecd9cb55f1f4183d21b05ef95b26,2024-11-21T08:43:57.410000
|
CVE-2023-6491,0,0,708b8f4bd32ebd1485ce2aad158d524378e5ecd9cb55f1f4183d21b05ef95b26,2024-11-21T08:43:57.410000
|
||||||
CVE-2023-6492,0,0,e6005ae667055ac8ae283196b03169ed895debca9f77dbaece293ed0c91f2b51,2024-11-21T08:43:57.547000
|
CVE-2023-6492,0,0,e6005ae667055ac8ae283196b03169ed895debca9f77dbaece293ed0c91f2b51,2024-11-21T08:43:57.547000
|
||||||
CVE-2023-6493,0,0,66a6bc3744048daffff5b648f4b2a86cf20fb0204e54a7708f7bf9298339ead7,2024-11-21T08:43:57.670000
|
CVE-2023-6493,0,0,66a6bc3744048daffff5b648f4b2a86cf20fb0204e54a7708f7bf9298339ead7,2024-11-21T08:43:57.670000
|
||||||
@ -241418,7 +241418,7 @@ CVE-2023-6673,0,0,3a650b3eb4786634d840cb3cc0f15623e73a6ae796615143cb299297acb672
|
|||||||
CVE-2023-6675,0,0,256937adfd0060027db8e052681e30244debd0c62786ed6d634b1d5c9e1b90d3,2024-11-21T08:44:19.243000
|
CVE-2023-6675,0,0,256937adfd0060027db8e052681e30244debd0c62786ed6d634b1d5c9e1b90d3,2024-11-21T08:44:19.243000
|
||||||
CVE-2023-6676,0,0,d6df9da0cb051c0b5e514876c794167f7138c8fe225267146b80a819d287476e,2024-11-21T08:44:19.373000
|
CVE-2023-6676,0,0,d6df9da0cb051c0b5e514876c794167f7138c8fe225267146b80a819d287476e,2024-11-21T08:44:19.373000
|
||||||
CVE-2023-6677,0,0,a42907a68b35ab893f84a4a8982d5a0459299568a0e135d60959e938df1dfc11,2024-11-21T08:44:19.513000
|
CVE-2023-6677,0,0,a42907a68b35ab893f84a4a8982d5a0459299568a0e135d60959e938df1dfc11,2024-11-21T08:44:19.513000
|
||||||
CVE-2023-6678,0,0,5b7a94fac41954ecd4b8bcf86619b32535de26c151a23a02a7e5363e9a0c74ee,2024-11-21T08:44:19.660000
|
CVE-2023-6678,0,1,6f3a5f028fe8255ef71af1c12d235abfed4cf3aa03103a5801341366424f5626,2024-12-11T19:58:13.110000
|
||||||
CVE-2023-6679,0,0,2433496c121ca610d17640117da3db027308473d1e8f376305a6f3251be24882,2024-11-21T08:44:19.783000
|
CVE-2023-6679,0,0,2433496c121ca610d17640117da3db027308473d1e8f376305a6f3251be24882,2024-11-21T08:44:19.783000
|
||||||
CVE-2023-6680,0,0,c5ebb765eb58422ad2a1705f900d6e487ec280b792c1875e94c130510d5cd8c0,2024-11-21T08:44:19.957000
|
CVE-2023-6680,0,0,c5ebb765eb58422ad2a1705f900d6e487ec280b792c1875e94c130510d5cd8c0,2024-11-21T08:44:19.957000
|
||||||
CVE-2023-6681,0,0,0f04aff308b498004b056ce42e67b46004fb37e86ec12da84c8829ed28a2b2e6,2024-11-21T08:44:20.090000
|
CVE-2023-6681,0,0,0f04aff308b498004b056ce42e67b46004fb37e86ec12da84c8829ed28a2b2e6,2024-11-21T08:44:20.090000
|
||||||
@ -242130,7 +242130,7 @@ CVE-2024-0194,0,0,aebaac2f2096d2130a6374250cdf5207fba6109273d9eb049f10f67fd69e55
|
|||||||
CVE-2024-0195,0,0,20d44a923469cd72437093c52a9988a6ea0c329c670153d613e10fe01c1f003e,2024-11-21T08:46:02.473000
|
CVE-2024-0195,0,0,20d44a923469cd72437093c52a9988a6ea0c329c670153d613e10fe01c1f003e,2024-11-21T08:46:02.473000
|
||||||
CVE-2024-0196,0,0,a710d52c8be3a6249890209b5cb88477dafab3e2f6559a2b4df7510ce36db555,2024-11-21T08:46:02.607000
|
CVE-2024-0196,0,0,a710d52c8be3a6249890209b5cb88477dafab3e2f6559a2b4df7510ce36db555,2024-11-21T08:46:02.607000
|
||||||
CVE-2024-0197,0,0,df7a7d0f88a3087dadfb0a85b5558d236be8425dcf730b96558aa872bf299f8a,2024-11-21T08:46:02.750000
|
CVE-2024-0197,0,0,df7a7d0f88a3087dadfb0a85b5558d236be8425dcf730b96558aa872bf299f8a,2024-11-21T08:46:02.750000
|
||||||
CVE-2024-0199,0,0,e889bde282d550f7973241354153a9cdea0b77ff40989740d1a37347adb065f7,2024-11-21T08:46:02.880000
|
CVE-2024-0199,0,1,21d5ab91f1ef81daf029bd9933e93292228f6e37c8bf61f6ea8ae9ff1893aef3,2024-12-11T20:12:49.670000
|
||||||
CVE-2024-0200,0,0,960bfffc60e8e094b51fc325744ecd82e4e15c7f4a611a4c757227ceca1a67ed,2024-11-21T08:46:03.023000
|
CVE-2024-0200,0,0,960bfffc60e8e094b51fc325744ecd82e4e15c7f4a611a4c757227ceca1a67ed,2024-11-21T08:46:03.023000
|
||||||
CVE-2024-0201,0,0,bc1414ac350a7f67445e5f54f441bae0f708e8c010ba49ff59690510ed4d1239,2024-11-21T08:46:03.193000
|
CVE-2024-0201,0,0,bc1414ac350a7f67445e5f54f441bae0f708e8c010ba49ff59690510ed4d1239,2024-11-21T08:46:03.193000
|
||||||
CVE-2024-0202,0,0,72c547fb3aee28c1cf66f48325eaa3b3635703c62aa29f3ce5a0d24c6af3222c,2024-11-21T08:46:03.343000
|
CVE-2024-0202,0,0,72c547fb3aee28c1cf66f48325eaa3b3635703c62aa29f3ce5a0d24c6af3222c,2024-11-21T08:46:03.343000
|
||||||
@ -243070,7 +243070,7 @@ CVE-2024-10241,0,0,fe3dcecfada7c3764490fec385526c423fea05ceb1d8cfae03a9be08ced79
|
|||||||
CVE-2024-10245,0,0,5714c51fb85acb3984990d3d9b6159b31ef4484b309f1b36de23af150cc1fca1,2024-11-12T13:55:21.227000
|
CVE-2024-10245,0,0,5714c51fb85acb3984990d3d9b6159b31ef4484b309f1b36de23af150cc1fca1,2024-11-12T13:55:21.227000
|
||||||
CVE-2024-10247,0,0,23e6e9a03b8e93235649708b73fc812b92cb4eb313d477a522da2963089c88ec,2024-12-06T04:15:04.190000
|
CVE-2024-10247,0,0,23e6e9a03b8e93235649708b73fc812b92cb4eb313d477a522da2963089c88ec,2024-12-06T04:15:04.190000
|
||||||
CVE-2024-10250,0,0,dce2ccadbd6e77d5f97f6e4ccb7b1ad74933eaf3de52e88abfac961c0db9fd4a,2024-10-25T16:37:32.777000
|
CVE-2024-10250,0,0,dce2ccadbd6e77d5f97f6e4ccb7b1ad74933eaf3de52e88abfac961c0db9fd4a,2024-10-25T16:37:32.777000
|
||||||
CVE-2024-10251,1,1,09813a0451fc7f49ce19debf14e92b3496990ab421721ffa04eac0dfba8e953d,2024-12-11T17:15:14.140000
|
CVE-2024-10251,0,0,09813a0451fc7f49ce19debf14e92b3496990ab421721ffa04eac0dfba8e953d,2024-12-11T17:15:14.140000
|
||||||
CVE-2024-10256,0,0,41e50c2772aee3c6f19c1613289373c5e13b9c940006c460417aa0ecff16f0a4,2024-12-10T19:15:19.280000
|
CVE-2024-10256,0,0,41e50c2772aee3c6f19c1613289373c5e13b9c940006c460417aa0ecff16f0a4,2024-12-10T19:15:19.280000
|
||||||
CVE-2024-1026,0,0,3b8711e596f8e047332158b9d61379ba52e624c4b3a7c24f0fe541a714abce3e,2024-11-21T08:49:37.720000
|
CVE-2024-1026,0,0,3b8711e596f8e047332158b9d61379ba52e624c4b3a7c24f0fe541a714abce3e,2024-11-21T08:49:37.720000
|
||||||
CVE-2024-10260,0,0,d942f8528242106c707ac5e36063bb1ab6b42d2c9d03f6207b97112072b4168d,2024-11-19T21:20:51.707000
|
CVE-2024-10260,0,0,d942f8528242106c707ac5e36063bb1ab6b42d2c9d03f6207b97112072b4168d,2024-11-19T21:20:51.707000
|
||||||
@ -243620,8 +243620,8 @@ CVE-2024-10941,0,0,13c9aa5648736117eddcc05b7c7bbd41bd256da81c39332a1bd9e9e846bf4
|
|||||||
CVE-2024-10943,0,0,26f3128d989fcb7c084f6a2785233e142b456ba7fa2bbfa2225352075f798149,2024-11-13T17:01:58.603000
|
CVE-2024-10943,0,0,26f3128d989fcb7c084f6a2785233e142b456ba7fa2bbfa2225352075f798149,2024-11-13T17:01:58.603000
|
||||||
CVE-2024-10944,0,0,1c0b69d1ba3b87998eabf673d5ce85783b7ff742767256df1f0369b07a97fdcd,2024-11-13T17:01:58.603000
|
CVE-2024-10944,0,0,1c0b69d1ba3b87998eabf673d5ce85783b7ff742767256df1f0369b07a97fdcd,2024-11-13T17:01:58.603000
|
||||||
CVE-2024-10945,0,0,eaecb76bb2926a21e85aba18d448e990c084aea718f0f5fbf4d666258d929307,2024-11-13T17:01:58.603000
|
CVE-2024-10945,0,0,eaecb76bb2926a21e85aba18d448e990c084aea718f0f5fbf4d666258d929307,2024-11-13T17:01:58.603000
|
||||||
CVE-2024-10946,0,0,98c66af0fbd30064e814fd6894d508ea8897df9a53fff28f2b60bc2053a71580,2024-11-08T19:01:25.633000
|
CVE-2024-10946,0,1,e939ae56a130941682682fa8c3248447c6e56390d24186994637b4a0f9c753fe,2024-12-11T19:58:39.510000
|
||||||
CVE-2024-10947,0,0,23a13fcea8040826fa1f5989e8ed9f0fb7b2fc23c0145a8de48e0b734753cd0d,2024-11-08T19:01:03.880000
|
CVE-2024-10947,0,1,dacc13455ec4929fc7dfb8811927a59e4a69ca38f996547e3516014c1db68e50,2024-12-11T19:58:55.657000
|
||||||
CVE-2024-1095,0,0,c3b9382662b402032abf8ceff61647f8e00b16f3ebb8e17edcc93fa481ed1000,2024-11-21T08:49:47.093000
|
CVE-2024-1095,0,0,c3b9382662b402032abf8ceff61647f8e00b16f3ebb8e17edcc93fa481ed1000,2024-11-21T08:49:47.093000
|
||||||
CVE-2024-10952,0,0,edff8b29d26accda4a8e33f169e18ac16231b4d8b9445539c32344bf5f44c6f1,2024-12-04T03:15:04.593000
|
CVE-2024-10952,0,0,edff8b29d26accda4a8e33f169e18ac16231b4d8b9445539c32344bf5f44c6f1,2024-12-04T03:15:04.593000
|
||||||
CVE-2024-10953,0,0,94ed881c1741c9a6db86af195e84904697442fcf31d986afec17a96f3fc5a311,2024-11-12T13:56:54.483000
|
CVE-2024-10953,0,0,94ed881c1741c9a6db86af195e84904697442fcf31d986afec17a96f3fc5a311,2024-11-12T13:56:54.483000
|
||||||
@ -243993,7 +243993,7 @@ CVE-2024-11463,0,0,ad17f3fab6bfb40a789d68c4383c6c0e1f14efa77f86cc521d310c195559f
|
|||||||
CVE-2024-11464,0,0,b8134ded04019f0dc322d50c830b80e3f3f841b43578bd4adfc4b4daf1965843,2024-12-07T12:15:19.567000
|
CVE-2024-11464,0,0,b8134ded04019f0dc322d50c830b80e3f3f841b43578bd4adfc4b4daf1965843,2024-12-07T12:15:19.567000
|
||||||
CVE-2024-11466,0,0,36ba29a0e83960f183cdc1bb8910604befb538a9ed8bdd074a88ef8b7f706e46,2024-12-04T08:15:06.523000
|
CVE-2024-11466,0,0,36ba29a0e83960f183cdc1bb8910604befb538a9ed8bdd074a88ef8b7f706e46,2024-12-04T08:15:06.523000
|
||||||
CVE-2024-1147,0,0,7c585dad4e071b38d649d847ff37c79a25a5d07f7a32720dda50f90a08541bc4,2024-11-21T08:49:54.360000
|
CVE-2024-1147,0,0,7c585dad4e071b38d649d847ff37c79a25a5d07f7a32720dda50f90a08541bc4,2024-11-21T08:49:54.360000
|
||||||
CVE-2024-11477,0,0,b5ae247987a814f37d475f21c9146cbdb60f48cd455d8fc3195c20cd24e278f6,2024-11-22T21:15:08.613000
|
CVE-2024-11477,0,1,76aa7637b95fa2ecc6b147d714f578f30f2e0042532b214641b9ba44d9ec49fd,2024-12-11T19:23:36.800000
|
||||||
CVE-2024-11479,0,0,e45a25bfdd55a73dd4f84ed406864a56b4c33194e1807e98971c4aae47176800,2024-12-04T01:15:04.650000
|
CVE-2024-11479,0,0,e45a25bfdd55a73dd4f84ed406864a56b4c33194e1807e98971c4aae47176800,2024-12-04T01:15:04.650000
|
||||||
CVE-2024-1148,0,0,42f8b4a331499e416da7e39ecb917cc148de70355c01e7459a0ecc809b95c273,2024-11-21T08:49:54.507000
|
CVE-2024-1148,0,0,42f8b4a331499e416da7e39ecb917cc148de70355c01e7459a0ecc809b95c273,2024-11-21T08:49:54.507000
|
||||||
CVE-2024-11481,0,0,43aefde0b60b7bb2c03e6e9073efa36888743c80ea5c30a176dc892fe3500a31,2024-11-29T08:15:04.270000
|
CVE-2024-11481,0,0,43aefde0b60b7bb2c03e6e9073efa36888743c80ea5c30a176dc892fe3500a31,2024-11-29T08:15:04.270000
|
||||||
@ -244108,8 +244108,8 @@ CVE-2024-11591,0,0,5eec80b1852a517df18be0f28e5d8878cb437694093f1b583289c41f3be6c
|
|||||||
CVE-2024-11592,0,0,aa2ca9e49c0b66e2b9ddd982b5b002e43397f92095593f87db1ef37aa31469f9,2024-12-10T16:52:43.287000
|
CVE-2024-11592,0,0,aa2ca9e49c0b66e2b9ddd982b5b002e43397f92095593f87db1ef37aa31469f9,2024-12-10T16:52:43.287000
|
||||||
CVE-2024-11595,0,0,a5112dbb9cb2e7f356d3cce7d0ed3c3ac245c3e9a2ca11df8391a68c97c97211,2024-11-21T13:57:24.187000
|
CVE-2024-11595,0,0,a5112dbb9cb2e7f356d3cce7d0ed3c3ac245c3e9a2ca11df8391a68c97c97211,2024-11-21T13:57:24.187000
|
||||||
CVE-2024-11596,0,0,6343cd2138cc057262127834530bb4e7d4aee6e59c66c3eb257ce4b183831bc4,2024-11-21T13:57:24.187000
|
CVE-2024-11596,0,0,6343cd2138cc057262127834530bb4e7d4aee6e59c66c3eb257ce4b183831bc4,2024-11-21T13:57:24.187000
|
||||||
CVE-2024-11597,1,1,0760e63e76abecd8ee01212b88f31eb33494e3c6d045fdebd72f7f212448ca43,2024-12-11T17:15:14.307000
|
CVE-2024-11597,0,0,0760e63e76abecd8ee01212b88f31eb33494e3c6d045fdebd72f7f212448ca43,2024-12-11T17:15:14.307000
|
||||||
CVE-2024-11598,1,1,8db17abf6fd551960fc0ff86e06ef04537ce68cd55739712d07c0a5589bc2d07,2024-12-11T17:15:14.453000
|
CVE-2024-11598,0,0,8db17abf6fd551960fc0ff86e06ef04537ce68cd55739712d07c0a5589bc2d07,2024-12-11T17:15:14.453000
|
||||||
CVE-2024-11599,0,0,a26c993827526d1af73bfe90f868b9bfb9a722b6b2267b567215827aef919d86,2024-11-28T10:15:06.657000
|
CVE-2024-11599,0,0,a26c993827526d1af73bfe90f868b9bfb9a722b6b2267b567215827aef919d86,2024-11-28T10:15:06.657000
|
||||||
CVE-2024-1160,0,0,12b04de1fea0a3119efc89b33ba5d2f3d172880f1becfa13297009e56b4efb45,2024-11-21T08:49:55.987000
|
CVE-2024-1160,0,0,12b04de1fea0a3119efc89b33ba5d2f3d172880f1becfa13297009e56b4efb45,2024-11-21T08:49:55.987000
|
||||||
CVE-2024-11601,0,0,51a555e6d26623f2054da12f000d146e4e1662608f2c3f75f4d4bafe7cada303,2024-11-22T06:15:19.830000
|
CVE-2024-11601,0,0,51a555e6d26623f2054da12f000d146e4e1662608f2c3f75f4d4bafe7cada303,2024-11-22T06:15:19.830000
|
||||||
@ -244289,7 +244289,7 @@ CVE-2024-11952,0,0,8be0c69e3107fa6f3273f59b11ff511450df70a157d0236a300dd71a0356b
|
|||||||
CVE-2024-11959,0,0,8e4c044a79a34553dacc3bbf68fddd2b6e5f24a72d4b7a0c2b06bf8643853e87,2024-12-04T16:52:55.150000
|
CVE-2024-11959,0,0,8e4c044a79a34553dacc3bbf68fddd2b6e5f24a72d4b7a0c2b06bf8643853e87,2024-12-04T16:52:55.150000
|
||||||
CVE-2024-1196,0,0,fb9cee3548f997ff6f5fcfe0021c5d65fb9ff65b14bac0023a1f0fa42083dcd0,2024-11-21T08:50:00.883000
|
CVE-2024-1196,0,0,fb9cee3548f997ff6f5fcfe0021c5d65fb9ff65b14bac0023a1f0fa42083dcd0,2024-11-21T08:50:00.883000
|
||||||
CVE-2024-11960,0,0,bd9138e92373cf0f2d64cabaf1c792eb3475a5676b172a9be24a4ae943f1b162,2024-12-04T16:52:34.413000
|
CVE-2024-11960,0,0,bd9138e92373cf0f2d64cabaf1c792eb3475a5676b172a9be24a4ae943f1b162,2024-12-04T16:52:34.413000
|
||||||
CVE-2024-11961,0,0,b5c930e4cc091b12b2646e5237f3c48eac9f4e90d7c9cd84adfbfc5d2c053ef4,2024-11-28T15:15:18.527000
|
CVE-2024-11961,0,1,e6c58b0f0ebcb435bb20e9edf2a205e6264c5d1fef5b95ef6f8a54827fe7cf7b,2024-12-11T19:59:30.533000
|
||||||
CVE-2024-11962,0,0,f538b65665f2e3cba57b21491ff610cfd2c91dae4a78a6a09ff0930469b2bf9d,2024-12-04T16:51:47.007000
|
CVE-2024-11962,0,0,f538b65665f2e3cba57b21491ff610cfd2c91dae4a78a6a09ff0930469b2bf9d,2024-12-04T16:51:47.007000
|
||||||
CVE-2024-11963,0,0,3e254fdaabe1a428140e6a7d7fc0327fd8a35973f16b2835f24e923dec166329,2024-12-04T16:51:21.440000
|
CVE-2024-11963,0,0,3e254fdaabe1a428140e6a7d7fc0327fd8a35973f16b2835f24e923dec166329,2024-12-04T16:51:21.440000
|
||||||
CVE-2024-11964,0,0,37459bfcc29215486f1bd42ba7b539350d067861021516c9a1104062a391c8fc,2024-12-04T16:50:38.423000
|
CVE-2024-11964,0,0,37459bfcc29215486f1bd42ba7b539350d067861021516c9a1104062a391c8fc,2024-12-04T16:50:38.423000
|
||||||
@ -244343,7 +244343,7 @@ CVE-2024-12062,0,0,72735736917491b453ec9a8b66f16471859e8308b17c93b657198e604c611
|
|||||||
CVE-2024-12064,0,0,5bbffd5016c2c66c65f1cad07469a2c9304ddde32e6765225186e453c653a401,2024-12-05T22:15:20.080000
|
CVE-2024-12064,0,0,5bbffd5016c2c66c65f1cad07469a2c9304ddde32e6765225186e453c653a401,2024-12-05T22:15:20.080000
|
||||||
CVE-2024-1207,0,0,7ca2a33c54192dfcfa7fe7f99bed16fbfa1215b4ac8ba5de485b890ce26af06c,2024-11-21T08:50:02.457000
|
CVE-2024-1207,0,0,7ca2a33c54192dfcfa7fe7f99bed16fbfa1215b4ac8ba5de485b890ce26af06c,2024-11-21T08:50:02.457000
|
||||||
CVE-2024-1208,0,0,3c4b0e7895c1837530e812c9d592f58958b18ef870d236a49969dfb3f5e669a9,2024-11-21T08:50:02.590000
|
CVE-2024-1208,0,0,3c4b0e7895c1837530e812c9d592f58958b18ef870d236a49969dfb3f5e669a9,2024-11-21T08:50:02.590000
|
||||||
CVE-2024-12082,0,1,d67c450c190c0364d4b144dcd382bc569f8e4f4f12ff2a960005828e083c85c7,2024-12-11T17:12:56.793000
|
CVE-2024-12082,0,0,d67c450c190c0364d4b144dcd382bc569f8e4f4f12ff2a960005828e083c85c7,2024-12-11T17:12:56.793000
|
||||||
CVE-2024-1209,0,0,0c11632b4f799f8334de1fe031a18ed75abc1306137789706f83e79036cdbf29,2024-11-21T08:50:02.720000
|
CVE-2024-1209,0,0,0c11632b4f799f8334de1fe031a18ed75abc1306137789706f83e79036cdbf29,2024-11-21T08:50:02.720000
|
||||||
CVE-2024-12094,0,0,6e383cc75b3f85962bcdf8903d07540ef3fc4cb3d2555f929b41425068cb2b8a,2024-12-05T13:15:05.923000
|
CVE-2024-12094,0,0,6e383cc75b3f85962bcdf8903d07540ef3fc4cb3d2555f929b41425068cb2b8a,2024-12-05T13:15:05.923000
|
||||||
CVE-2024-12099,0,0,82c97da21165b875b9d77b9a11ed031ee03fad8a14b90d2e80c74afeac6e262d,2024-12-04T04:15:04.287000
|
CVE-2024-12099,0,0,82c97da21165b875b9d77b9a11ed031ee03fad8a14b90d2e80c74afeac6e262d,2024-12-04T04:15:04.287000
|
||||||
@ -244428,10 +244428,10 @@ CVE-2024-12344,0,0,a74c4de6f3ec8761526e235e0afb71aca4880eff4cfe7e19b9ce946c54f2c
|
|||||||
CVE-2024-12346,0,0,80cb0f641e48457b23b15bd65b063b12a84c74cd98692c10accc52ead008b067,2024-12-09T00:15:04.207000
|
CVE-2024-12346,0,0,80cb0f641e48457b23b15bd65b063b12a84c74cd98692c10accc52ead008b067,2024-12-09T00:15:04.207000
|
||||||
CVE-2024-12347,0,0,03b5c659fb7311a053f8959fd28372cdf56b1d1a85fe87823f3ed5487c3d37dc,2024-12-09T00:15:04.910000
|
CVE-2024-12347,0,0,03b5c659fb7311a053f8959fd28372cdf56b1d1a85fe87823f3ed5487c3d37dc,2024-12-09T00:15:04.910000
|
||||||
CVE-2024-12348,0,0,8a10f1d1bbeb46074f9e146f37bc90c671b027b7252fa3e978381ed5d459a2a7,2024-12-09T01:15:05.603000
|
CVE-2024-12348,0,0,8a10f1d1bbeb46074f9e146f37bc90c671b027b7252fa3e978381ed5d459a2a7,2024-12-09T01:15:05.603000
|
||||||
CVE-2024-12349,0,1,a2a385c266220a3b9907aeb5d0dc086710bc5ba3fcb3d3894eff648c53d0304f,2024-12-11T17:34:02.013000
|
CVE-2024-12349,0,0,a2a385c266220a3b9907aeb5d0dc086710bc5ba3fcb3d3894eff648c53d0304f,2024-12-11T17:34:02.013000
|
||||||
CVE-2024-1235,0,0,fd37d01ad20dcc5d0dd22397b78801055d1e00ef080900e252a8af428afe4d67,2024-11-21T08:50:07.683000
|
CVE-2024-1235,0,0,fd37d01ad20dcc5d0dd22397b78801055d1e00ef080900e252a8af428afe4d67,2024-11-21T08:50:07.683000
|
||||||
CVE-2024-12350,0,1,3f32de33517497523630f4ff9dbfee58d0240751867903833fdadc5a48d1665a,2024-12-11T17:32:54.327000
|
CVE-2024-12350,0,0,3f32de33517497523630f4ff9dbfee58d0240751867903833fdadc5a48d1665a,2024-12-11T17:32:54.327000
|
||||||
CVE-2024-12351,0,1,ae980823422cd01ab3976006fda17a846f0e7ef12fdab85a8d8a34ea36ae8456,2024-12-11T17:32:56.967000
|
CVE-2024-12351,0,0,ae980823422cd01ab3976006fda17a846f0e7ef12fdab85a8d8a34ea36ae8456,2024-12-11T17:32:56.967000
|
||||||
CVE-2024-12352,0,0,32f72a704f1e2542fc20de0d035c196da17ca0c575db05fe3835b61fbee7c417,2024-12-10T23:31:47.427000
|
CVE-2024-12352,0,0,32f72a704f1e2542fc20de0d035c196da17ca0c575db05fe3835b61fbee7c417,2024-12-10T23:31:47.427000
|
||||||
CVE-2024-12353,0,0,036565fabbbc178396eb3e3c0305ad86dac517256d160df7657b090d3f9dd19d,2024-12-10T23:37:06.613000
|
CVE-2024-12353,0,0,036565fabbbc178396eb3e3c0305ad86dac517256d160df7657b090d3f9dd19d,2024-12-10T23:37:06.613000
|
||||||
CVE-2024-12354,0,0,b8e15a077e4c1a839cf8211dcd4deb8e8c4036fa20d487417d7ee12337ae44d8,2024-12-10T23:36:25.740000
|
CVE-2024-12354,0,0,b8e15a077e4c1a839cf8211dcd4deb8e8c4036fa20d487417d7ee12337ae44d8,2024-12-10T23:36:25.740000
|
||||||
@ -244446,7 +244446,7 @@ CVE-2024-12369,0,0,020d729c045c8eaa8f498306958a74fd2b364bdb1cd395ef2460e8703f801
|
|||||||
CVE-2024-1237,0,0,7608b762d209f55f10a23dbde634d086adad1d6240344714ec7de5c458d836b6,2024-11-21T08:50:07.910000
|
CVE-2024-1237,0,0,7608b762d209f55f10a23dbde634d086adad1d6240344714ec7de5c458d836b6,2024-11-21T08:50:07.910000
|
||||||
CVE-2024-1238,0,0,61e2d99ce6e3dfa86afb8331abcc236f68b5fa34f245659f4f6216db5239b32e,2024-11-21T08:50:08.053000
|
CVE-2024-1238,0,0,61e2d99ce6e3dfa86afb8331abcc236f68b5fa34f245659f4f6216db5239b32e,2024-11-21T08:50:08.053000
|
||||||
CVE-2024-1239,0,0,a515a367dab4b48d00e7f390a15c0d107266b53b28358b9f5ebf3476b0a625f5,2024-11-21T08:50:08.180000
|
CVE-2024-1239,0,0,a515a367dab4b48d00e7f390a15c0d107266b53b28358b9f5ebf3476b0a625f5,2024-11-21T08:50:08.180000
|
||||||
CVE-2024-12393,0,1,39a195de61de1d5575a41974225041afe3006b623a6c202b6b63283c75a42f9c,2024-12-11T17:15:14.657000
|
CVE-2024-12393,0,0,39a195de61de1d5575a41974225041afe3006b623a6c202b6b63283c75a42f9c,2024-12-11T17:15:14.657000
|
||||||
CVE-2024-1240,0,0,04799415e1f0377b54b78e2b8bdc0cc625bbd87f5e08d92014024c374e43cc79,2024-11-19T19:04:53.913000
|
CVE-2024-1240,0,0,04799415e1f0377b54b78e2b8bdc0cc625bbd87f5e08d92014024c374e43cc79,2024-11-19T19:04:53.913000
|
||||||
CVE-2024-1241,0,0,ba82bb77c28ed45b324839e72710669d8c2af006c45eeed23dee90a28ff67ea8,2024-11-21T08:50:08.490000
|
CVE-2024-1241,0,0,ba82bb77c28ed45b324839e72710669d8c2af006c45eeed23dee90a28ff67ea8,2024-11-21T08:50:08.490000
|
||||||
CVE-2024-1242,0,0,d730388eb7530fa29fb11ce649456e01cfb020c8a1d70e87c977d44dc1314073,2024-11-21T08:50:08.620000
|
CVE-2024-1242,0,0,d730388eb7530fa29fb11ce649456e01cfb020c8a1d70e87c977d44dc1314073,2024-11-21T08:50:08.620000
|
||||||
@ -244500,7 +244500,7 @@ CVE-2024-1295,0,0,58e65e331ff11f824ceffb79237c2ca705e423c379ee489ababaab58413247
|
|||||||
CVE-2024-1296,0,0,2c8681669a40b4c1355bcd3bfff211c08a874ea1e31940665fa8f736883bd89e,2024-11-21T08:50:15.633000
|
CVE-2024-1296,0,0,2c8681669a40b4c1355bcd3bfff211c08a874ea1e31940665fa8f736883bd89e,2024-11-21T08:50:15.633000
|
||||||
CVE-2024-1297,0,0,0d9e22e56ecef1715a16e9d7809dba48ba55def0e741f79f7098027ea7ebc7ff,2024-11-21T08:50:15.770000
|
CVE-2024-1297,0,0,0d9e22e56ecef1715a16e9d7809dba48ba55def0e741f79f7098027ea7ebc7ff,2024-11-21T08:50:15.770000
|
||||||
CVE-2024-1298,0,0,04246e35362f6f4b760051526529d0b042d99f56b78c06a26d303553264d4594,2024-11-21T08:50:15.890000
|
CVE-2024-1298,0,0,04246e35362f6f4b760051526529d0b042d99f56b78c06a26d303553264d4594,2024-11-21T08:50:15.890000
|
||||||
CVE-2024-1299,0,0,eb4f41356898de10671593779aac8ff14c003f6b5f9049e02f50658032ca7804,2024-11-21T08:50:16.040000
|
CVE-2024-1299,0,1,c7f245e662ec35ddd87c48ae29ff03e74531f9ba7973bf15293ed4e82f111599,2024-12-11T20:23:27.497000
|
||||||
CVE-2024-1300,0,0,1449d51d635587092ee7e467b53bae80464f92cc07a6bda2595172832d29c1e4,2024-11-25T03:15:10.053000
|
CVE-2024-1300,0,0,1449d51d635587092ee7e467b53bae80464f92cc07a6bda2595172832d29c1e4,2024-11-25T03:15:10.053000
|
||||||
CVE-2024-1301,0,0,a82904378c141da107f996cbfc3663893c64b71f2f3d06fe2a7b32b9cc0bfa85,2024-11-21T08:50:16.340000
|
CVE-2024-1301,0,0,a82904378c141da107f996cbfc3663893c64b71f2f3d06fe2a7b32b9cc0bfa85,2024-11-21T08:50:16.340000
|
||||||
CVE-2024-1302,0,0,50e21539c22b43b4db748f33a4680786d0cd3b39c9a7a5fc858bc75c33660782,2024-11-21T08:50:16.467000
|
CVE-2024-1302,0,0,50e21539c22b43b4db748f33a4680786d0cd3b39c9a7a5fc858bc75c33660782,2024-11-21T08:50:16.467000
|
||||||
@ -244547,7 +244547,7 @@ CVE-2024-1343,0,0,419883927ae3b083384516246fa6e1f74b7f4f2e309a0068972246a296f53e
|
|||||||
CVE-2024-1344,0,0,597c0cc8c6eb641f90ae3a9870d3e75470a230889fbaee8e504503cb0f59d32c,2024-11-21T08:50:22.543000
|
CVE-2024-1344,0,0,597c0cc8c6eb641f90ae3a9870d3e75470a230889fbaee8e504503cb0f59d32c,2024-11-21T08:50:22.543000
|
||||||
CVE-2024-1345,0,0,0c76ed0a957ae2e29015c6df7057e5c17f3081f7b68ed33d0e7f09f33dcdc4ff,2024-11-21T08:50:22.667000
|
CVE-2024-1345,0,0,0c76ed0a957ae2e29015c6df7057e5c17f3081f7b68ed33d0e7f09f33dcdc4ff,2024-11-21T08:50:22.667000
|
||||||
CVE-2024-1346,0,0,303f14c2019e4c9714a03c35023cb78da79f82df77a269203b1411390b024a24,2024-11-21T08:50:22.793000
|
CVE-2024-1346,0,0,303f14c2019e4c9714a03c35023cb78da79f82df77a269203b1411390b024a24,2024-11-21T08:50:22.793000
|
||||||
CVE-2024-1347,0,0,e114c5a6545081e9ce84973c73b5ea2601db8af3ef7e27a418296802abf16db1,2024-11-21T08:50:22.910000
|
CVE-2024-1347,0,1,b12a4cbf8e4f285872bf9a248874204d9208208e515ae74de2299237bb6626ad,2024-12-11T19:24:26.643000
|
||||||
CVE-2024-1348,0,0,1859f4ea1d00e7386fbff1ae86e38e3076d8135556fc20b2256d2f026d728722,2024-11-21T08:50:23.040000
|
CVE-2024-1348,0,0,1859f4ea1d00e7386fbff1ae86e38e3076d8135556fc20b2256d2f026d728722,2024-11-21T08:50:23.040000
|
||||||
CVE-2024-1349,0,0,e7a4e73532ed6e0c8758e3697d94f88d5800a92d17af76b3782f000b22261a78,2024-11-21T08:50:23.197000
|
CVE-2024-1349,0,0,e7a4e73532ed6e0c8758e3697d94f88d5800a92d17af76b3782f000b22261a78,2024-11-21T08:50:23.197000
|
||||||
CVE-2024-1350,0,0,ce11ba75737d3c0dc14aea45038ee6ef39f1db647d13879ee3f248d09a81697f,2024-11-21T08:50:23.313000
|
CVE-2024-1350,0,0,ce11ba75737d3c0dc14aea45038ee6ef39f1db647d13879ee3f248d09a81697f,2024-11-21T08:50:23.313000
|
||||||
@ -245002,8 +245002,8 @@ CVE-2024-1828,0,0,b6976ed94d57f1336064fc79323390eec3658f16d0aa2744f892fad62b7ea3
|
|||||||
CVE-2024-1829,0,0,1d902f6ab55a48ce8679b9555af4f7400a09e1e8a88e9a612ee93d6a137b7279,2024-12-06T16:20:39.807000
|
CVE-2024-1829,0,0,1d902f6ab55a48ce8679b9555af4f7400a09e1e8a88e9a612ee93d6a137b7279,2024-12-06T16:20:39.807000
|
||||||
CVE-2024-1830,0,0,d45cda4b1d5ed84f256382444c2274c6c644ab1eafdc8f3894a05d999338ff31,2024-12-06T16:15:12.410000
|
CVE-2024-1830,0,0,d45cda4b1d5ed84f256382444c2274c6c644ab1eafdc8f3894a05d999338ff31,2024-12-06T16:15:12.410000
|
||||||
CVE-2024-1831,0,0,6fb1b01628c74786d0213dead60cf1da6fc0a4c2c0dd9d0d6a178c6822c37f39,2024-11-21T08:51:25.133000
|
CVE-2024-1831,0,0,6fb1b01628c74786d0213dead60cf1da6fc0a4c2c0dd9d0d6a178c6822c37f39,2024-11-21T08:51:25.133000
|
||||||
CVE-2024-1832,0,0,5445425722a1ba242f1b320bbc732dbf3fec9984d74adb48634915ad90a6a223,2024-11-21T08:51:25.270000
|
CVE-2024-1832,0,1,c06d50298f0700d94c119d417d23c0a1930dc31256814c3e89781b7d12de3489,2024-12-11T19:57:16.060000
|
||||||
CVE-2024-1833,0,0,7db19a3c407b6af60979edf37fb6fe6e6ee0928e25128cb4175c0af49c0175d4,2024-11-21T08:51:25.440000
|
CVE-2024-1833,0,1,c8d92fc9cd839b68971699d5d283e73f3d2803989549e697773061edb8d08a35,2024-12-11T19:57:54.520000
|
||||||
CVE-2024-1834,0,0,48b90332f0c6341e9785a8b27fcf738be2841e8ef5a9b23f4fc109fd93604577,2024-12-06T19:59:24.463000
|
CVE-2024-1834,0,0,48b90332f0c6341e9785a8b27fcf738be2841e8ef5a9b23f4fc109fd93604577,2024-12-06T19:59:24.463000
|
||||||
CVE-2024-1839,0,0,3c411ae2cf52bddf662314956b4d5c92c6cd816f3113019cdd44905638026af6,2024-11-21T08:51:25.720000
|
CVE-2024-1839,0,0,3c411ae2cf52bddf662314956b4d5c92c6cd816f3113019cdd44905638026af6,2024-11-21T08:51:25.720000
|
||||||
CVE-2024-1840,0,0,2e6d7672faccf941673a79a75aacce54ff693ecbc0604990f24bf8316ac34cbb,2024-11-21T08:51:25.860000
|
CVE-2024-1840,0,0,2e6d7672faccf941673a79a75aacce54ff693ecbc0604990f24bf8316ac34cbb,2024-11-21T08:51:25.860000
|
||||||
@ -246841,7 +246841,7 @@ CVE-2024-21911,0,0,ecf2241468adf940e2c0a2f0db8992eda0c6792ed4a6f3737c2295eb4920e
|
|||||||
CVE-2024-21912,0,0,582ec5203997d71ac0d1056ed47fe2417de67c4c6aa7cffe8ec76cfed2576539,2024-12-09T15:13:40.437000
|
CVE-2024-21912,0,0,582ec5203997d71ac0d1056ed47fe2417de67c4c6aa7cffe8ec76cfed2576539,2024-12-09T15:13:40.437000
|
||||||
CVE-2024-21913,0,0,479b5dd08769265b5661e21b75669cce61442e59290ecf0b015bb7ab2058f5f3,2024-12-09T15:18:28.870000
|
CVE-2024-21913,0,0,479b5dd08769265b5661e21b75669cce61442e59290ecf0b015bb7ab2058f5f3,2024-12-09T15:18:28.870000
|
||||||
CVE-2024-21914,0,0,9be91234e3a87100bb31a25430bfb3372edd3b42a557333c44d4254d13220f1f,2024-11-21T08:55:15.933000
|
CVE-2024-21914,0,0,9be91234e3a87100bb31a25430bfb3372edd3b42a557333c44d4254d13220f1f,2024-11-21T08:55:15.933000
|
||||||
CVE-2024-21915,0,0,8c0430bb5e7ac4cc862ad2a195a44bbc5e010c1744697d9d9f20c657c2a55d8a,2024-11-21T08:55:16.073000
|
CVE-2024-21915,0,1,a165f2d25eb37fb2f87120fddd3fade5ec5c366c0d09d9e6ea27b966a24766a0,2024-12-11T19:31:28.200000
|
||||||
CVE-2024-21916,0,0,281122525b18b4c37d709679826f35f553f234e6aca4e9b21e208465570118c1,2024-11-21T08:55:16.243000
|
CVE-2024-21916,0,0,281122525b18b4c37d709679826f35f553f234e6aca4e9b21e208465570118c1,2024-11-21T08:55:16.243000
|
||||||
CVE-2024-21917,0,0,4596cf747d33ef750330f71a8f984548ddf844a5b7fe1daf92e4333c822c4a23,2024-11-21T08:55:16.427000
|
CVE-2024-21917,0,0,4596cf747d33ef750330f71a8f984548ddf844a5b7fe1daf92e4333c822c4a23,2024-11-21T08:55:16.427000
|
||||||
CVE-2024-21918,0,0,a67329e256c4a4c8d9d647b0d42114dbaccc94d666d01581e4b8a2c6d540f918,2024-12-09T15:18:49.257000
|
CVE-2024-21918,0,0,a67329e256c4a4c8d9d647b0d42114dbaccc94d666d01581e4b8a2c6d540f918,2024-12-09T15:18:49.257000
|
||||||
@ -247447,7 +247447,7 @@ CVE-2024-22778,0,0,0281e5b3d87cacccb8a69ac78c76b4bd9497abd80d8182d500e2e4228a262
|
|||||||
CVE-2024-22779,0,0,4b2529eb2a537ec4153614b263ea5bd6cc064ff2067dc5f922966e44620967d9,2024-11-21T08:56:38.937000
|
CVE-2024-22779,0,0,4b2529eb2a537ec4153614b263ea5bd6cc064ff2067dc5f922966e44620967d9,2024-11-21T08:56:38.937000
|
||||||
CVE-2024-2278,0,0,afc218644888ddfdbfc0ee64d2dbcff5719c87ddda676fd55b5f4ebef946ea8f,2024-11-21T09:09:24.857000
|
CVE-2024-2278,0,0,afc218644888ddfdbfc0ee64d2dbcff5719c87ddda676fd55b5f4ebef946ea8f,2024-11-21T09:09:24.857000
|
||||||
CVE-2024-22780,0,0,e7c9e53b53c73f14641469ac17c6a267c6ae51b4da23d85d4748bd237084cc7c,2024-12-04T21:15:21.567000
|
CVE-2024-22780,0,0,e7c9e53b53c73f14641469ac17c6a267c6ae51b4da23d85d4748bd237084cc7c,2024-12-04T21:15:21.567000
|
||||||
CVE-2024-2279,0,0,0d87d9029bc6ae2316f995ea3df18df5eb045ff9fe90ee0cd55eb2b3e4d993a4,2024-11-21T09:09:25.050000
|
CVE-2024-2279,0,1,15594de242362166ba4fcc677c674c35e566adb6da76d65bb4bb570b8c49add8,2024-12-11T19:29:27.377000
|
||||||
CVE-2024-22795,0,0,4b871fe15d673131e56820fa86db7a52e60ec35118fbfcd9a32eee5736e087d9,2024-11-21T08:56:39.250000
|
CVE-2024-22795,0,0,4b871fe15d673131e56820fa86db7a52e60ec35118fbfcd9a32eee5736e087d9,2024-11-21T08:56:39.250000
|
||||||
CVE-2024-2280,0,0,ee01e33ad8c8e15890c2537e3a2ce31e47602f1cab0dfcd5928f922e440ae8d7,2024-11-21T09:09:25.187000
|
CVE-2024-2280,0,0,ee01e33ad8c8e15890c2537e3a2ce31e47602f1cab0dfcd5928f922e440ae8d7,2024-11-21T09:09:25.187000
|
||||||
CVE-2024-22807,0,0,c63e56e80af4c58ae1f7129e86f946e6c72bfda64cfef4929c6ab6ca5fc4096d,2024-11-21T08:56:39.420000
|
CVE-2024-22807,0,0,c63e56e80af4c58ae1f7129e86f946e6c72bfda64cfef4929c6ab6ca5fc4096d,2024-11-21T08:56:39.420000
|
||||||
@ -248053,7 +248053,7 @@ CVE-2024-23658,0,0,031ef15b7509622c724db229aaa3a875142f71b91d78f59e593c2d2226a24
|
|||||||
CVE-2024-23659,0,0,ad170a41af26f2d803ac6b77f51bcda8b824401a4b561683bd9fd982de3deaf1,2024-11-21T08:58:06.740000
|
CVE-2024-23659,0,0,ad170a41af26f2d803ac6b77f51bcda8b824401a4b561683bd9fd982de3deaf1,2024-11-21T08:58:06.740000
|
||||||
CVE-2024-2366,0,0,90e2f12149642b70d84804fc6f88a92a2e96d1915eadd9b4c5ad94265dc43843,2024-11-21T09:09:36.327000
|
CVE-2024-2366,0,0,90e2f12149642b70d84804fc6f88a92a2e96d1915eadd9b4c5ad94265dc43843,2024-11-21T09:09:36.327000
|
||||||
CVE-2024-23660,0,0,a0693769ca2af12f268fbf5cf4c178feba914b1a9e06080d95be4eda9e1f6ced,2024-11-21T08:58:06.890000
|
CVE-2024-23660,0,0,a0693769ca2af12f268fbf5cf4c178feba914b1a9e06080d95be4eda9e1f6ced,2024-11-21T08:58:06.890000
|
||||||
CVE-2024-23662,0,0,b8492d65c1ea56ce0eda1130658b1d436ba0d02df7cc76586b7a0627abbcf063,2024-11-21T08:58:07.050000
|
CVE-2024-23662,0,1,fcb6a3236ea3e39380df6e19287e42e2832677f3aa97bcd1d15ed0addfd552f6,2024-12-11T19:11:44.790000
|
||||||
CVE-2024-23663,0,0,4115801077b89b088b225d11dd742f9500976c4f6b3e6ad1ae4e5eab6cc084e4,2024-11-21T08:58:07.203000
|
CVE-2024-23663,0,0,4115801077b89b088b225d11dd742f9500976c4f6b3e6ad1ae4e5eab6cc084e4,2024-11-21T08:58:07.203000
|
||||||
CVE-2024-23664,0,0,665ff2ffa7ebe6329b6096a4739ce61633371294cf2579873454d1efb96b574b,2024-11-21T08:58:07.350000
|
CVE-2024-23664,0,0,665ff2ffa7ebe6329b6096a4739ce61633371294cf2579873454d1efb96b574b,2024-11-21T08:58:07.350000
|
||||||
CVE-2024-23665,0,0,c8eca8ed5083a6d0fa08238fe8d304598d21bb2eb465c1d1eedb994b2280c9b5,2024-11-21T08:58:07.463000
|
CVE-2024-23665,0,0,c8eca8ed5083a6d0fa08238fe8d304598d21bb2eb465c1d1eedb994b2280c9b5,2024-11-21T08:58:07.463000
|
||||||
@ -249333,11 +249333,11 @@ CVE-2024-25603,0,0,6efc2ab54ea3be651c1cc1d95ba47da582406dbdf361cbfd55e80b7611a41
|
|||||||
CVE-2024-25604,0,0,adb2744e99dce2faa265e66e541e673623a62dc0725d7f7a02f3571eed752f2b,2024-12-10T22:59:32.727000
|
CVE-2024-25604,0,0,adb2744e99dce2faa265e66e541e673623a62dc0725d7f7a02f3571eed752f2b,2024-12-10T22:59:32.727000
|
||||||
CVE-2024-25605,0,0,cd3f213631c053f1b608e3b480951743b40dfcd47cd39c4fbb6227f798899db1,2024-12-10T22:20:47.737000
|
CVE-2024-25605,0,0,cd3f213631c053f1b608e3b480951743b40dfcd47cd39c4fbb6227f798899db1,2024-12-10T22:20:47.737000
|
||||||
CVE-2024-25606,0,0,cac38eab3443645d7904eb9442ba71c62f7d0310cd49ec6e2c6f23596207af9e,2024-12-11T14:27:37.600000
|
CVE-2024-25606,0,0,cac38eab3443645d7904eb9442ba71c62f7d0310cd49ec6e2c6f23596207af9e,2024-12-11T14:27:37.600000
|
||||||
CVE-2024-25607,0,1,06dc471323b4afa7222682ac5fb4dd5d44d44e94ff758e128f9acd26e8c70902,2024-12-11T18:01:46.027000
|
CVE-2024-25607,0,0,06dc471323b4afa7222682ac5fb4dd5d44d44e94ff758e128f9acd26e8c70902,2024-12-11T18:01:46.027000
|
||||||
CVE-2024-25608,0,1,2218fa4ac21f657fa2fbbebf77aba86963a945c80edb012840336f5250fa9527,2024-12-11T17:56:22.230000
|
CVE-2024-25608,0,0,2218fa4ac21f657fa2fbbebf77aba86963a945c80edb012840336f5250fa9527,2024-12-11T17:56:22.230000
|
||||||
CVE-2024-25609,0,1,449173a45e8af1888444d8561b8c36a94ed4c231c7b5cd3ac9b60aae4312f88a,2024-12-11T17:55:21.677000
|
CVE-2024-25609,0,0,449173a45e8af1888444d8561b8c36a94ed4c231c7b5cd3ac9b60aae4312f88a,2024-12-11T17:55:21.677000
|
||||||
CVE-2024-2561,0,0,e685cf810e05e818a542c9c9406a3401d56a98dafc4f9d785b4cc60cbb8d7e20,2024-11-21T09:10:00.900000
|
CVE-2024-2561,0,0,e685cf810e05e818a542c9c9406a3401d56a98dafc4f9d785b4cc60cbb8d7e20,2024-11-21T09:10:00.900000
|
||||||
CVE-2024-25610,0,1,8896ff0f1f468ecd846d761dc6b069e63fe6869fa6f678c43376d7d1c0de05df,2024-12-11T17:53:18.093000
|
CVE-2024-25610,0,0,8896ff0f1f468ecd846d761dc6b069e63fe6869fa6f678c43376d7d1c0de05df,2024-12-11T17:53:18.093000
|
||||||
CVE-2024-25611,0,0,cde677ed5ebe4d43712eddebcd30ecd2f61efb6ed67eed3492ff3e41f222582d,2024-11-21T09:01:04.730000
|
CVE-2024-25611,0,0,cde677ed5ebe4d43712eddebcd30ecd2f61efb6ed67eed3492ff3e41f222582d,2024-11-21T09:01:04.730000
|
||||||
CVE-2024-25612,0,0,ec9cb19cb6fef9f5730ac98407ab78035ecdd8500b5dd57529c310a3425ca68a,2024-11-21T09:01:04.860000
|
CVE-2024-25612,0,0,ec9cb19cb6fef9f5730ac98407ab78035ecdd8500b5dd57529c310a3425ca68a,2024-11-21T09:01:04.860000
|
||||||
CVE-2024-25613,0,0,abce985e14133b1827d84fe10d0f0e73bc7dc20c86542f9557f704b35c6fcb0e,2024-11-21T09:01:04.997000
|
CVE-2024-25613,0,0,abce985e14133b1827d84fe10d0f0e73bc7dc20c86542f9557f704b35c6fcb0e,2024-11-21T09:01:04.997000
|
||||||
@ -249639,8 +249639,8 @@ CVE-2024-26002,0,0,32fc549004fe526f29d75a3c1035c8b1eea052113d42e21c57b5e9dc040cc
|
|||||||
CVE-2024-26003,0,0,acf8a847c632d1fd9e01f901c5b2e86fd0b75b5ff38501c5893d29f7e6b8d728,2024-11-21T09:01:45.207000
|
CVE-2024-26003,0,0,acf8a847c632d1fd9e01f901c5b2e86fd0b75b5ff38501c5893d29f7e6b8d728,2024-11-21T09:01:45.207000
|
||||||
CVE-2024-26004,0,0,fde2d42e2610c51c10504bb6c3916fb89500c264b8ec9b06c18924f884e5115e,2024-11-21T09:01:45.330000
|
CVE-2024-26004,0,0,fde2d42e2610c51c10504bb6c3916fb89500c264b8ec9b06c18924f884e5115e,2024-11-21T09:01:45.330000
|
||||||
CVE-2024-26005,0,0,ab8dec86b835a1025d9007a91813d1fb4ad91c2949fe7b6a778b69a8a5e1905d,2024-11-21T09:01:45.453000
|
CVE-2024-26005,0,0,ab8dec86b835a1025d9007a91813d1fb4ad91c2949fe7b6a778b69a8a5e1905d,2024-11-21T09:01:45.453000
|
||||||
CVE-2024-26007,0,0,eefb844b11ce0ccb28a0bc3b53c5bd1c27562c10d0b4f36f91cf7dc2e9265d5e,2024-11-21T09:01:45.567000
|
CVE-2024-26007,0,1,5566a1952f2701dd4149a375a6c93e3c6434006ebc54211b6a50bcacb2b01156,2024-12-11T19:55:59.830000
|
||||||
CVE-2024-26010,0,0,bdb0998ae95551e294835269f00f6e55e927ae19a1281c8e37ab777cb5ec7258,2024-11-21T09:01:45.697000
|
CVE-2024-26010,0,1,aa94400b6d9b88521b847077f70baf8416af93283c6afed0d9452bca0e3c5cd0,2024-12-11T19:54:35.323000
|
||||||
CVE-2024-26011,0,0,e974a2b113f427dd018031dca3d60158e24db135804a10020cf79fb5b92d5801,2024-11-13T17:01:16.850000
|
CVE-2024-26011,0,0,e974a2b113f427dd018031dca3d60158e24db135804a10020cf79fb5b92d5801,2024-11-13T17:01:16.850000
|
||||||
CVE-2024-26015,0,0,61e1ee285e159a140490fe9bac1615210ace2b02df5e5f1a9d7b48836125a67e,2024-11-21T09:01:45.940000
|
CVE-2024-26015,0,0,61e1ee285e159a140490fe9bac1615210ace2b02df5e5f1a9d7b48836125a67e,2024-11-21T09:01:45.940000
|
||||||
CVE-2024-26016,0,0,0ae73fe611f07c6e72809273d28a2e16fd71142d8f7d9b985444be8bf710ce16,2024-11-21T09:01:46.090000
|
CVE-2024-26016,0,0,0ae73fe611f07c6e72809273d28a2e16fd71142d8f7d9b985444be8bf710ce16,2024-11-21T09:01:46.090000
|
||||||
@ -250081,7 +250081,7 @@ CVE-2024-26619,0,0,cea3de92a82b3b5d95b6a9c5e9b2f6861ec568bfa8d9cd70a5df9ca1b112b
|
|||||||
CVE-2024-2662,0,0,1c2424fe7ba1293a1a8d258761d5193dbd4dbf056c7fc12b13f4e9af64b90758,2024-11-21T09:10:14.287000
|
CVE-2024-2662,0,0,1c2424fe7ba1293a1a8d258761d5193dbd4dbf056c7fc12b13f4e9af64b90758,2024-11-21T09:10:14.287000
|
||||||
CVE-2024-26620,0,0,5c124f9203e78c511ecea4b65d08b8416fe0d09aedbc7125a2416556c4b83f7a,2024-11-21T09:02:42.407000
|
CVE-2024-26620,0,0,5c124f9203e78c511ecea4b65d08b8416fe0d09aedbc7125a2416556c4b83f7a,2024-11-21T09:02:42.407000
|
||||||
CVE-2024-26621,0,0,f287c9063032a301fe385469e2711a2664244dd0593a1fc0cc0e696517e3974d,2024-11-21T09:02:42.520000
|
CVE-2024-26621,0,0,f287c9063032a301fe385469e2711a2664244dd0593a1fc0cc0e696517e3974d,2024-11-21T09:02:42.520000
|
||||||
CVE-2024-26622,0,1,44771474d96e6a32e262a8e82c8d605514616358779ded6b7654a20fc0c2a12a,2024-12-11T17:36:15.267000
|
CVE-2024-26622,0,0,44771474d96e6a32e262a8e82c8d605514616358779ded6b7654a20fc0c2a12a,2024-12-11T17:36:15.267000
|
||||||
CVE-2024-26623,0,0,0559021091993fe9db37214ef7cd77c9efff423028df4dd92763f3af84de83b6,2024-11-21T09:02:42.767000
|
CVE-2024-26623,0,0,0559021091993fe9db37214ef7cd77c9efff423028df4dd92763f3af84de83b6,2024-11-21T09:02:42.767000
|
||||||
CVE-2024-26624,0,0,dfec722c86cb19deabe85be0fdccacdcf71bc34ee8cead4ebe6ca2d88e75d73c,2024-03-27T14:15:10.163000
|
CVE-2024-26624,0,0,dfec722c86cb19deabe85be0fdccacdcf71bc34ee8cead4ebe6ca2d88e75d73c,2024-03-27T14:15:10.163000
|
||||||
CVE-2024-26625,0,0,1d457c1d2cd319d91a0c264b68061fe6c460ae66e9d6c535307a9c22b32c0e3c,2024-11-21T09:02:42.897000
|
CVE-2024-26625,0,0,1d457c1d2cd319d91a0c264b68061fe6c460ae66e9d6c535307a9c22b32c0e3c,2024-11-21T09:02:42.897000
|
||||||
@ -251122,7 +251122,7 @@ CVE-2024-27790,0,0,19fcb60ab52fe9c379609c39b59142d5014d893a59bae627bebebc5a2412f
|
|||||||
CVE-2024-27791,0,0,439aca2fd1f55eeaf8fa200c5d29a0be14fb7faf194f143c1548179e82383c22,2024-12-10T17:58:55.290000
|
CVE-2024-27791,0,0,439aca2fd1f55eeaf8fa200c5d29a0be14fb7faf194f143c1548179e82383c22,2024-12-10T17:58:55.290000
|
||||||
CVE-2024-27792,0,0,f31b62b6f6fa42ac443db705e1bcf2907bbf913e30a3984de7b426f885533f5d,2024-11-21T09:05:03.877000
|
CVE-2024-27792,0,0,f31b62b6f6fa42ac443db705e1bcf2907bbf913e30a3984de7b426f885533f5d,2024-11-21T09:05:03.877000
|
||||||
CVE-2024-27793,0,0,4b0df2c2b74473c2b8ba466a704f8df7dacd244d361ee42c49a6311ab2e4a128,2024-12-09T19:28:03.753000
|
CVE-2024-27793,0,0,4b0df2c2b74473c2b8ba466a704f8df7dacd244d361ee42c49a6311ab2e4a128,2024-12-09T19:28:03.753000
|
||||||
CVE-2024-27794,0,0,d31a20391341ddc157e39354f0d7908e4fa2a36a4c8a104fc4e286f39f2c3e38,2024-11-21T09:05:04.223000
|
CVE-2024-27794,0,1,4504b4b825a11a7d65b5081c774372a74748805bca6e18e3905fa44645f60653,2024-12-11T19:56:37.067000
|
||||||
CVE-2024-27795,0,0,2de9488f4a2a5b051aabc1783837072f4df9aa8191cf9f582ee4dd5bd134fb81,2024-09-23T20:01:19.910000
|
CVE-2024-27795,0,0,2de9488f4a2a5b051aabc1783837072f4df9aa8191cf9f582ee4dd5bd134fb81,2024-09-23T20:01:19.910000
|
||||||
CVE-2024-27796,0,0,29507f426e53036da7b53c85ed50d31725f49a7e326b571b9bcdf2b6bd7f5686,2024-12-09T19:22:11.867000
|
CVE-2024-27796,0,0,29507f426e53036da7b53c85ed50d31725f49a7e326b571b9bcdf2b6bd7f5686,2024-12-09T19:22:11.867000
|
||||||
CVE-2024-27798,0,0,4709bcea1f0a0d9660b4090ec800aba4e3c546c43ac22074df5e0370c9b4fc3b,2024-12-09T19:21:45.187000
|
CVE-2024-27798,0,0,4709bcea1f0a0d9660b4090ec800aba4e3c546c43ac22074df5e0370c9b4fc3b,2024-12-09T19:21:45.187000
|
||||||
@ -251453,11 +251453,11 @@ CVE-2024-28134,0,0,176d7778d5677e5c126fff541f7ec5fbb5db5093236274cdce961e0bb3c00
|
|||||||
CVE-2024-28135,0,0,6d8627a9b034ba8daa88a5653a4fa0fcc3873b400b81ab25bdd0e76c225d5345,2024-11-21T09:05:53.393000
|
CVE-2024-28135,0,0,6d8627a9b034ba8daa88a5653a4fa0fcc3873b400b81ab25bdd0e76c225d5345,2024-11-21T09:05:53.393000
|
||||||
CVE-2024-28136,0,0,398b3e60c35d63350ccdd7436d0410a7095050774975b3a534ff55e78c95c043,2024-11-21T09:05:53.517000
|
CVE-2024-28136,0,0,398b3e60c35d63350ccdd7436d0410a7095050774975b3a534ff55e78c95c043,2024-11-21T09:05:53.517000
|
||||||
CVE-2024-28137,0,0,d00b9036b2b7e693ab669d43cf51d8844983db366103d517587e7601c3ae558f,2024-11-21T09:05:53.637000
|
CVE-2024-28137,0,0,d00b9036b2b7e693ab669d43cf51d8844983db366103d517587e7601c3ae558f,2024-11-21T09:05:53.637000
|
||||||
CVE-2024-28138,0,1,af84d5c66a2669116f8f10dc2942fd5e7b29713533dbd72a5523f381091dad4b,2024-12-11T17:15:14.827000
|
CVE-2024-28138,0,0,af84d5c66a2669116f8f10dc2942fd5e7b29713533dbd72a5523f381091dad4b,2024-12-11T17:15:14.827000
|
||||||
CVE-2024-28139,0,0,871d40bc8a7366798572b17910afce0da36a7dc3bc42652a155d0d45e3265634,2024-12-11T16:15:09.930000
|
CVE-2024-28139,0,0,871d40bc8a7366798572b17910afce0da36a7dc3bc42652a155d0d45e3265634,2024-12-11T16:15:09.930000
|
||||||
CVE-2024-2814,0,0,266291004cb50fc9fa499704214f3d6d747ab61c03d4ecf60b55016bd9e70c6a,2024-11-21T09:10:35.307000
|
CVE-2024-2814,0,0,266291004cb50fc9fa499704214f3d6d747ab61c03d4ecf60b55016bd9e70c6a,2024-11-21T09:10:35.307000
|
||||||
CVE-2024-28140,0,0,dadde50b75eefe01f0efda1b4e1316f0bfd01f34e1b0c90c96285d838caa2661,2024-12-11T16:15:10.050000
|
CVE-2024-28140,0,0,dadde50b75eefe01f0efda1b4e1316f0bfd01f34e1b0c90c96285d838caa2661,2024-12-11T16:15:10.050000
|
||||||
CVE-2024-28141,0,1,d301dc86e6b9da2d535b33aa3d93591f7cfa6960db015fd11adcc9dde289a182,2024-12-11T17:15:15.007000
|
CVE-2024-28141,0,0,d301dc86e6b9da2d535b33aa3d93591f7cfa6960db015fd11adcc9dde289a182,2024-12-11T17:15:15.007000
|
||||||
CVE-2024-28147,0,0,385f022ef3b9e74c16d2ca430dbfe84754b0905ec234f9f62a2995438a07dfd7,2024-11-21T09:05:53.770000
|
CVE-2024-28147,0,0,385f022ef3b9e74c16d2ca430dbfe84754b0905ec234f9f62a2995438a07dfd7,2024-11-21T09:05:53.770000
|
||||||
CVE-2024-28148,0,0,3ac8f61b51b12f3a297806b3219d55d9a6d8e022b2f823c428c505a4ab5ae12c,2024-11-21T09:05:53.983000
|
CVE-2024-28148,0,0,3ac8f61b51b12f3a297806b3219d55d9a6d8e022b2f823c428c505a4ab5ae12c,2024-11-21T09:05:53.983000
|
||||||
CVE-2024-28149,0,0,57ed6574f074778f026c6cc859bdab33a0e7bd4d9407db0a106e88c4247206d2,2024-12-06T19:15:11.663000
|
CVE-2024-28149,0,0,57ed6574f074778f026c6cc859bdab33a0e7bd4d9407db0a106e88c4247206d2,2024-12-06T19:15:11.663000
|
||||||
@ -251492,7 +251492,7 @@ CVE-2024-28174,0,0,70032b95a853e7690385c0d53188c202b95c2c5ec7c61b8a9d2f2e919f971
|
|||||||
CVE-2024-28175,0,0,d3ff2e666b1aedf8b388410f078a1d5d7af943680bbf262f67250c6a4b9da239,2024-11-21T09:05:57.817000
|
CVE-2024-28175,0,0,d3ff2e666b1aedf8b388410f078a1d5d7af943680bbf262f67250c6a4b9da239,2024-11-21T09:05:57.817000
|
||||||
CVE-2024-28176,0,0,8e2712bfe1ea7116f11f8ad9a2861387b20c6463817c56944eede5e5ddf4bb41,2024-11-21T09:05:57.947000
|
CVE-2024-28176,0,0,8e2712bfe1ea7116f11f8ad9a2861387b20c6463817c56944eede5e5ddf4bb41,2024-11-21T09:05:57.947000
|
||||||
CVE-2024-28179,0,0,7f82026281e2dd9f15927caa04d85bc2295c5beb1cf03576e742ef34b4c15043,2024-11-21T09:05:58.083000
|
CVE-2024-28179,0,0,7f82026281e2dd9f15927caa04d85bc2295c5beb1cf03576e742ef34b4c15043,2024-11-21T09:05:58.083000
|
||||||
CVE-2024-2818,0,0,3b38e6da84e413b0ff20170855a39f35dd79ea63f7cc5a8c9ff37fda55a9f9e2,2024-11-21T09:10:35.943000
|
CVE-2024-2818,0,1,0911c1acc4d9c090902c611e6719e3f0aa3c0379c78a97d42dc069d2ec5f6dee,2024-12-11T20:25:14.693000
|
||||||
CVE-2024-28180,0,0,9f5a21f69cf8970f5cdcfc45029ec448caaadd4eb92377934524f9dd36094847,2024-11-21T09:05:58.227000
|
CVE-2024-28180,0,0,9f5a21f69cf8970f5cdcfc45029ec448caaadd4eb92377934524f9dd36094847,2024-11-21T09:05:58.227000
|
||||||
CVE-2024-28181,0,0,6bd311faaf46af3dff9fd97c3b0355e1ad7f1917e6cc72e0605e0852aabed029,2024-11-21T09:05:58.393000
|
CVE-2024-28181,0,0,6bd311faaf46af3dff9fd97c3b0355e1ad7f1917e6cc72e0605e0852aabed029,2024-11-21T09:05:58.393000
|
||||||
CVE-2024-28182,0,0,36cc5d7b3bc1aeb665e26b64252bf571693be9481e520c82c88e8eddbab3b630,2024-11-21T09:05:58.537000
|
CVE-2024-28182,0,0,36cc5d7b3bc1aeb665e26b64252bf571693be9481e520c82c88e8eddbab3b630,2024-11-21T09:05:58.537000
|
||||||
@ -253413,7 +253413,7 @@ CVE-2024-3091,0,0,e0eeef129ce9a44d0ebea4d97f92b821262466eaf3a38a7275856066395171
|
|||||||
CVE-2024-30915,0,0,955c73c260c7bf6c12b9e7af49211a242d1f4ff7118c7fbceeab57178f5aebab,2024-11-21T09:12:33.743000
|
CVE-2024-30915,0,0,955c73c260c7bf6c12b9e7af49211a242d1f4ff7118c7fbceeab57178f5aebab,2024-11-21T09:12:33.743000
|
||||||
CVE-2024-30916,0,0,4073e6dea6f641fb158f013be5768038a110090e69c49bb4a7be384745684c55,2024-11-21T09:12:33.980000
|
CVE-2024-30916,0,0,4073e6dea6f641fb158f013be5768038a110090e69c49bb4a7be384745684c55,2024-11-21T09:12:33.980000
|
||||||
CVE-2024-30917,0,0,1db8ecc4f84bdb53bb46c092c6af560f66ec5de557a1924722b14e3fcd15eded,2024-11-21T09:12:34.190000
|
CVE-2024-30917,0,0,1db8ecc4f84bdb53bb46c092c6af560f66ec5de557a1924722b14e3fcd15eded,2024-11-21T09:12:34.190000
|
||||||
CVE-2024-3092,0,0,a310a760b7d889e6a4dc26bbb23d2d38bc115b24edb39b1eac371a5ec6eed1b7,2024-11-21T09:28:52.960000
|
CVE-2024-3092,0,1,91b6db3015b37d065cd77564396003fe4e7ebc37c5fe361994ab7567d49e61c6,2024-12-11T19:19:05.273000
|
||||||
CVE-2024-30920,0,0,31223b0c711bda40c144eb0e5090c9e613dff648aec6b9f6f4db7b5e0ea61799,2024-11-21T09:12:34.407000
|
CVE-2024-30920,0,0,31223b0c711bda40c144eb0e5090c9e613dff648aec6b9f6f4db7b5e0ea61799,2024-11-21T09:12:34.407000
|
||||||
CVE-2024-30921,0,0,ed325ad563d44c5ff4793afe259206bdc76a0c6351793ca20e0031756a46e279,2024-11-21T09:12:34.627000
|
CVE-2024-30921,0,0,ed325ad563d44c5ff4793afe259206bdc76a0c6351793ca20e0031756a46e279,2024-11-21T09:12:34.627000
|
||||||
CVE-2024-30922,0,0,0ecbae908129430749f82fec4c0e0e5d6e255c53578d811d0b95baacb487d0d1,2024-11-21T09:12:34.847000
|
CVE-2024-30922,0,0,0ecbae908129430749f82fec4c0e0e5d6e255c53578d811d0b95baacb487d0d1,2024-11-21T09:12:34.847000
|
||||||
@ -253437,7 +253437,7 @@ CVE-2024-30951,0,0,e2ddf0b14f4dcaeb216be2fcf0887e33437786ba7d58824597b7a914c5499
|
|||||||
CVE-2024-30952,0,0,72d1dfe3307157cf0218b430325d0f7f356225adeed2af6cfa844ec593d2abf4,2024-11-21T09:12:38.123000
|
CVE-2024-30952,0,0,72d1dfe3307157cf0218b430325d0f7f356225adeed2af6cfa844ec593d2abf4,2024-11-21T09:12:38.123000
|
||||||
CVE-2024-30953,0,0,4a7e5400b8e5906b881b330f0b9fbeb133d6bed4fdcdd7823e19f9c53d690e4e,2024-11-21T09:12:38.263000
|
CVE-2024-30953,0,0,4a7e5400b8e5906b881b330f0b9fbeb133d6bed4fdcdd7823e19f9c53d690e4e,2024-11-21T09:12:38.263000
|
||||||
CVE-2024-3096,0,0,7d886574e1f435839864ee0eb7de15ccf0552c995885a07fa07c1a8c596cb5c2,2024-11-21T09:28:53.520000
|
CVE-2024-3096,0,0,7d886574e1f435839864ee0eb7de15ccf0552c995885a07fa07c1a8c596cb5c2,2024-11-21T09:28:53.520000
|
||||||
CVE-2024-30961,0,1,c1c534414b6abe9505c0479b65230799f40b00f3eff3a32e477b46f0509bba37,2024-12-11T17:15:15.177000
|
CVE-2024-30961,0,0,c1c534414b6abe9505c0479b65230799f40b00f3eff3a32e477b46f0509bba37,2024-12-11T17:15:15.177000
|
||||||
CVE-2024-30962,0,0,b411502f8c7d9c40f2c6322021a8d7f60a27083c329137beecd348089faf4eaa,2024-12-05T23:15:05.147000
|
CVE-2024-30962,0,0,b411502f8c7d9c40f2c6322021a8d7f60a27083c329137beecd348089faf4eaa,2024-12-05T23:15:05.147000
|
||||||
CVE-2024-30963,0,0,fb47aff0ed2c815bc469630ead38211697e148fda1c584c6381fe7c58c475400,2024-12-06T20:15:24.757000
|
CVE-2024-30963,0,0,fb47aff0ed2c815bc469630ead38211697e148fda1c584c6381fe7c58c475400,2024-12-06T20:15:24.757000
|
||||||
CVE-2024-30964,0,0,360be10466f441ad70b0bae466dede38250137bb1f0e25bf624766129856cc0c,2024-12-06T20:15:24.937000
|
CVE-2024-30964,0,0,360be10466f441ad70b0bae466dede38250137bb1f0e25bf624766129856cc0c,2024-12-06T20:15:24.937000
|
||||||
@ -259677,7 +259677,7 @@ CVE-2024-39209,0,0,3c468a823026718018166d88bbe2ce6b9a5201d96c9d72b4582d74c168b47
|
|||||||
CVE-2024-3921,0,0,1974db7416463ff8de7b09e5dfff743d8bf129ca2fb063d3c9b074658a976946,2024-11-21T09:30:42.320000
|
CVE-2024-3921,0,0,1974db7416463ff8de7b09e5dfff743d8bf129ca2fb063d3c9b074658a976946,2024-11-21T09:30:42.320000
|
||||||
CVE-2024-39210,0,0,1bf7b6f228bfad5b66fba459031e2670686de3998f65f02f20ae730bcd4c983c,2024-11-21T09:27:19.187000
|
CVE-2024-39210,0,0,1bf7b6f228bfad5b66fba459031e2670686de3998f65f02f20ae730bcd4c983c,2024-11-21T09:27:19.187000
|
||||||
CVE-2024-39211,0,0,2bdfe1b741640eafa51192b93b9145ddeddf2fc404a3343ab8f3db8049ae019b,2024-11-21T09:27:19.440000
|
CVE-2024-39211,0,0,2bdfe1b741640eafa51192b93b9145ddeddf2fc404a3343ab8f3db8049ae019b,2024-11-21T09:27:19.440000
|
||||||
CVE-2024-39219,0,1,171b6ad0d1ca69588501e9a3d28998ae4c5d728f62093cd8c2915d8a0e22a9db,2024-12-11T17:15:15.373000
|
CVE-2024-39219,0,0,171b6ad0d1ca69588501e9a3d28998ae4c5d728f62093cd8c2915d8a0e22a9db,2024-12-11T17:15:15.373000
|
||||||
CVE-2024-3922,0,0,ec00fee6becc04f737624aa07d27590ce81326662e0116cfb0b376329d474976,2024-11-21T09:30:42.490000
|
CVE-2024-3922,0,0,ec00fee6becc04f737624aa07d27590ce81326662e0116cfb0b376329d474976,2024-11-21T09:30:42.490000
|
||||||
CVE-2024-39220,0,0,24eca335147782268c1594565f121e2c590ab6a053d595fd18baa98a13d8fb7f,2024-11-21T09:27:19.680000
|
CVE-2024-39220,0,0,24eca335147782268c1594565f121e2c590ab6a053d595fd18baa98a13d8fb7f,2024-11-21T09:27:19.680000
|
||||||
CVE-2024-39223,0,0,532b0793fe330cb3686e3423758c6f4556fb5a7ec0bff08ef7bf8cd0e559a300,2024-11-21T09:27:19.917000
|
CVE-2024-39223,0,0,532b0793fe330cb3686e3423758c6f4556fb5a7ec0bff08ef7bf8cd0e559a300,2024-11-21T09:27:19.917000
|
||||||
@ -260652,12 +260652,12 @@ CVE-2024-4082,0,0,884f744d4b6d6c38211069fff9472a771275afdc68ad46774024765c6d1375
|
|||||||
CVE-2024-40821,0,0,a3b876952ec8ce255096f7c26040316035df8c47e37e23640e020f9cd5f7797f,2024-12-10T14:47:42.573000
|
CVE-2024-40821,0,0,a3b876952ec8ce255096f7c26040316035df8c47e37e23640e020f9cd5f7797f,2024-12-10T14:47:42.573000
|
||||||
CVE-2024-40822,0,0,f2e42c11a9194a009cec70add00bceafd93485fa2ccc44b94afc5a8685e89cd1,2024-11-21T09:31:42.490000
|
CVE-2024-40822,0,0,f2e42c11a9194a009cec70add00bceafd93485fa2ccc44b94afc5a8685e89cd1,2024-11-21T09:31:42.490000
|
||||||
CVE-2024-40823,0,0,ea5834191915fbf77537780befd2f8170562cc3e8f14a6bae616ecfbb3aa16eb,2024-11-21T09:31:42.633000
|
CVE-2024-40823,0,0,ea5834191915fbf77537780befd2f8170562cc3e8f14a6bae616ecfbb3aa16eb,2024-11-21T09:31:42.633000
|
||||||
CVE-2024-40824,0,0,f06a65634df701916688a4cb6ccf61904c2867fc9a521a8cf66bf5eb3a0571a0,2024-11-21T09:31:42.770000
|
CVE-2024-40824,0,1,fbdc319b868b2cfa791578ade1e61c98f6d87f7eb28feeae98cf58c6b93dbf7d,2024-12-11T19:46:47.707000
|
||||||
CVE-2024-40825,0,0,9d304162ffa86a0427546e740669b60679660b64dbbb4aae0359d2b969ff4c63,2024-09-20T12:31:20.110000
|
CVE-2024-40825,0,0,9d304162ffa86a0427546e740669b60679660b64dbbb4aae0359d2b969ff4c63,2024-09-20T12:31:20.110000
|
||||||
CVE-2024-40826,0,0,c1291659e0404a097790dfd83faebb12f457e81680df4ca24c59974ee41a889a,2024-09-23T19:25:04.707000
|
CVE-2024-40826,0,0,c1291659e0404a097790dfd83faebb12f457e81680df4ca24c59974ee41a889a,2024-09-23T19:25:04.707000
|
||||||
CVE-2024-40827,0,0,a6a2c34277bc8e4cfbaeac3ab667c292869f606bd0db645af1cff508065008ad,2024-11-21T09:31:43.213000
|
CVE-2024-40827,0,0,a6a2c34277bc8e4cfbaeac3ab667c292869f606bd0db645af1cff508065008ad,2024-11-21T09:31:43.213000
|
||||||
CVE-2024-40828,0,0,be1117321f470cf0a4d30fa41799f486389db02236ed77a21163ba85cdb66ef4,2024-11-21T09:31:43.340000
|
CVE-2024-40828,0,1,7b08ff9a88811c1a2d2f6a8cabe468d48214feff7b5748f8277c1d1c6bcaac95,2024-12-11T19:46:12.057000
|
||||||
CVE-2024-40829,0,0,2fb47b63ae7d2ca95f6af5c69ff989cc74d6cfa76b3295dc0b7e21372da7abc3,2024-11-21T09:31:43.537000
|
CVE-2024-40829,0,1,7b94e56592e4d055988a33b0a03aa7c3e38da8fd672f53fd9dd2cc8e302d9c7d,2024-12-11T19:45:39.007000
|
||||||
CVE-2024-4083,0,0,861c69f070b98df21ed1e5fe755d0f8a3138be95fcc12d774c40863a7b1a40b2,2024-11-21T09:42:09.710000
|
CVE-2024-4083,0,0,861c69f070b98df21ed1e5fe755d0f8a3138be95fcc12d774c40863a7b1a40b2,2024-11-21T09:42:09.710000
|
||||||
CVE-2024-40830,0,0,5a11ad0fbf19f984d9514795e3ce671f0d4fd0db283d4edb735d82b003a62069,2024-09-23T19:19:46.127000
|
CVE-2024-40830,0,0,5a11ad0fbf19f984d9514795e3ce671f0d4fd0db283d4edb735d82b003a62069,2024-09-23T19:19:46.127000
|
||||||
CVE-2024-40831,0,0,77a034f59c59409708be4a3edb262d2ddfc572eafa36e0ec5128163562471781,2024-09-23T19:18:02.207000
|
CVE-2024-40831,0,0,77a034f59c59409708be4a3edb262d2ddfc572eafa36e0ec5128163562471781,2024-09-23T19:18:02.207000
|
||||||
@ -260665,7 +260665,7 @@ CVE-2024-40832,0,0,00c14c566f042719b789e0fa64de268df676d122f61af7b5d4e2c9ee45727
|
|||||||
CVE-2024-40833,0,0,b910eead051682eac062094cd6da18a48ed3792c5e338b1321e1813ef0d8294e,2024-11-21T09:31:44.070000
|
CVE-2024-40833,0,0,b910eead051682eac062094cd6da18a48ed3792c5e338b1321e1813ef0d8294e,2024-11-21T09:31:44.070000
|
||||||
CVE-2024-40834,0,0,b4c4b71055815b6c806419e94e6b9564969aed474e4e4a56741e21af283b0152,2024-11-21T09:31:44.290000
|
CVE-2024-40834,0,0,b4c4b71055815b6c806419e94e6b9564969aed474e4e4a56741e21af283b0152,2024-11-21T09:31:44.290000
|
||||||
CVE-2024-40835,0,0,3f6ef0b1fef5cf4b00a629185a96b630665ef3a9544463783f9d2cf4975e71e7,2024-11-21T09:31:44.430000
|
CVE-2024-40835,0,0,3f6ef0b1fef5cf4b00a629185a96b630665ef3a9544463783f9d2cf4975e71e7,2024-11-21T09:31:44.430000
|
||||||
CVE-2024-40836,0,0,fd76fd7f918605250343bd6a8b830d27aa8fecdc783702b7108a04f652089dc2,2024-11-21T09:31:44.590000
|
CVE-2024-40836,0,1,a141cd1ddaeaf46ffa54c1bf810175958c1ce047751b66d0d0ec544280cee946,2024-12-11T19:40:36.427000
|
||||||
CVE-2024-40837,0,0,d9e1d727c5489e5fbe91c9a35481e1b475460063dae3d0ae089fbdf692fb517e,2024-09-23T18:50:16.050000
|
CVE-2024-40837,0,0,d9e1d727c5489e5fbe91c9a35481e1b475460063dae3d0ae089fbdf692fb517e,2024-09-23T18:50:16.050000
|
||||||
CVE-2024-40838,0,0,580b3d51fd4431cbc24e96aafd19ebfdf3fdc30d947e42e3e5409dfdf94d1c3e,2024-09-25T16:46:24.123000
|
CVE-2024-40838,0,0,580b3d51fd4431cbc24e96aafd19ebfdf3fdc30d947e42e3e5409dfdf94d1c3e,2024-09-25T16:46:24.123000
|
||||||
CVE-2024-4084,0,0,657f5681c21f742d770aabfd6f3259f87cb735c98cee6e03f2c636c6ffc65895,2024-11-21T09:42:09.817000
|
CVE-2024-4084,0,0,657f5681c21f742d770aabfd6f3259f87cb735c98cee6e03f2c636c6ffc65895,2024-11-21T09:42:09.817000
|
||||||
@ -261148,7 +261148,7 @@ CVE-2024-4157,0,0,3b4a953e70ebb437de1ad14041aea1d4ddb40efd03289f86d3c89dadae0ffc
|
|||||||
CVE-2024-41570,0,0,bc7c6440b2a67efc5463bb4c39b989d97eed435dea63e8e6c437acf558913c6d,2024-08-29T13:32:21.020000
|
CVE-2024-41570,0,0,bc7c6440b2a67efc5463bb4c39b989d97eed435dea63e8e6c437acf558913c6d,2024-08-29T13:32:21.020000
|
||||||
CVE-2024-41572,0,0,a9f0d828cc4e2bc36792fc456a6a868ace184f72abe54a0c002137b56b623f16,2024-09-11T14:15:13.380000
|
CVE-2024-41572,0,0,a9f0d828cc4e2bc36792fc456a6a868ace184f72abe54a0c002137b56b623f16,2024-09-11T14:15:13.380000
|
||||||
CVE-2024-41577,0,0,b1f882437231c85f732c91780240de4516b5d2682e39952346ec72953d56207b,2024-11-05T22:35:07.160000
|
CVE-2024-41577,0,0,b1f882437231c85f732c91780240de4516b5d2682e39952346ec72953d56207b,2024-11-05T22:35:07.160000
|
||||||
CVE-2024-41579,0,1,00401f5a27bbe5068511cb2e589592e7d13e313ad7b023bdea7b8a4482f81c9a,2024-12-11T17:15:15.517000
|
CVE-2024-41579,0,0,00401f5a27bbe5068511cb2e589592e7d13e313ad7b023bdea7b8a4482f81c9a,2024-12-11T17:15:15.517000
|
||||||
CVE-2024-4158,0,0,2c2f42bd1f9a6659e153a95bcc02f51689a9d796af69575dfe628166d7078e69,2024-11-21T09:42:18.030000
|
CVE-2024-4158,0,0,2c2f42bd1f9a6659e153a95bcc02f51689a9d796af69575dfe628166d7078e69,2024-11-21T09:42:18.030000
|
||||||
CVE-2024-41583,0,0,1a2cf944ac0faaad65d0fa8a08d6745d58f6ed5d5ab422f4a8a1c3b961675df9,2024-10-04T13:50:43.727000
|
CVE-2024-41583,0,0,1a2cf944ac0faaad65d0fa8a08d6745d58f6ed5d5ab422f4a8a1c3b961675df9,2024-10-04T13:50:43.727000
|
||||||
CVE-2024-41584,0,0,a756336a17820148688412fc36dbdf4cf1430daae27f7ae91b5ca9d658835775,2024-10-04T13:50:43.727000
|
CVE-2024-41584,0,0,a756336a17820148688412fc36dbdf4cf1430daae27f7ae91b5ca9d658835775,2024-10-04T13:50:43.727000
|
||||||
@ -261614,9 +261614,9 @@ CVE-2024-42129,0,0,f82b8cccac737fcb5940a6df38c5a1e457e8b8f6dc9b8d9669c964d0fce6e
|
|||||||
CVE-2024-4213,0,0,3573bf93a4719aa1c4450c6623bad525af84cd5514375d4b6c835daf8bcad37f,2024-11-21T09:42:24.017000
|
CVE-2024-4213,0,0,3573bf93a4719aa1c4450c6623bad525af84cd5514375d4b6c835daf8bcad37f,2024-11-21T09:42:24.017000
|
||||||
CVE-2024-42130,0,0,398398c4b93e66fc4f7156d7603690263885b26268c30d4def00c2eb70c4b6aa,2024-11-21T09:33:39.923000
|
CVE-2024-42130,0,0,398398c4b93e66fc4f7156d7603690263885b26268c30d4def00c2eb70c4b6aa,2024-11-21T09:33:39.923000
|
||||||
CVE-2024-42131,0,0,db085189da3b1018c39f394e11d97ed680f76fa1907c88c45ed38fab0f2eb16d,2024-11-21T09:33:40.053000
|
CVE-2024-42131,0,0,db085189da3b1018c39f394e11d97ed680f76fa1907c88c45ed38fab0f2eb16d,2024-11-21T09:33:40.053000
|
||||||
CVE-2024-42132,0,1,e14161c7791d813f57d7312e7b0809870bb8e12b9cea97aefe404d2a0ba2b8e4,2024-12-11T17:35:31.740000
|
CVE-2024-42132,0,0,e14161c7791d813f57d7312e7b0809870bb8e12b9cea97aefe404d2a0ba2b8e4,2024-12-11T17:35:31.740000
|
||||||
CVE-2024-42133,0,1,8f4d781f6602d1fd03124b15ecc1baef5b8964e467f2f54d69ec5b6e99c35738,2024-12-11T17:27:04.253000
|
CVE-2024-42133,0,0,8f4d781f6602d1fd03124b15ecc1baef5b8964e467f2f54d69ec5b6e99c35738,2024-12-11T17:27:04.253000
|
||||||
CVE-2024-42134,0,1,5879c560cb40734a5ec5056dcf833a3d52f46f585daeb5c80c99d50b68cc2d34,2024-12-11T17:19:26.307000
|
CVE-2024-42134,0,0,5879c560cb40734a5ec5056dcf833a3d52f46f585daeb5c80c99d50b68cc2d34,2024-12-11T17:19:26.307000
|
||||||
CVE-2024-42135,0,0,0d77200cd1db63536fe02bbc697ee9cac3377a841f3e6d1c18cc172ac5451f93,2024-12-11T14:59:33.097000
|
CVE-2024-42135,0,0,0d77200cd1db63536fe02bbc697ee9cac3377a841f3e6d1c18cc172ac5451f93,2024-12-11T14:59:33.097000
|
||||||
CVE-2024-42136,0,0,46cf0449c1576cec046c7cfd30f571d29aa4a3763cd2bcc721d00c8e3b8292c0,2024-11-21T09:33:40.673000
|
CVE-2024-42136,0,0,46cf0449c1576cec046c7cfd30f571d29aa4a3763cd2bcc721d00c8e3b8292c0,2024-11-21T09:33:40.673000
|
||||||
CVE-2024-42137,0,0,af91881db6e05d40d39068871045965102a2d4547246ad7308857f29c1a14506,2024-11-21T09:33:40.817000
|
CVE-2024-42137,0,0,af91881db6e05d40d39068871045965102a2d4547246ad7308857f29c1a14506,2024-11-21T09:33:40.817000
|
||||||
@ -263226,7 +263226,7 @@ CVE-2024-44134,0,0,a1a7565b3d1d747868a47cfe0b90ac2757ca3fe3528c74bc3c5562541c409
|
|||||||
CVE-2024-44135,0,0,1a66ffb3fced69f7dd0088f00608289a6df8f259d48e72e731b80a9fde46b0b9,2024-09-25T13:28:09.067000
|
CVE-2024-44135,0,0,1a66ffb3fced69f7dd0088f00608289a6df8f259d48e72e731b80a9fde46b0b9,2024-09-25T13:28:09.067000
|
||||||
CVE-2024-44137,0,0,d4f6436a74ca2949527dd50649d59762594e5936bfba7a01a6e8b64ce29142e0,2024-10-30T19:35:16.590000
|
CVE-2024-44137,0,0,d4f6436a74ca2949527dd50649d59762594e5936bfba7a01a6e8b64ce29142e0,2024-10-30T19:35:16.590000
|
||||||
CVE-2024-44139,0,0,227592f6930f5804ef7361e5c64b194003d6a9fbe8100b1944463ea300dd6852,2024-09-24T18:30:34.863000
|
CVE-2024-44139,0,0,227592f6930f5804ef7361e5c64b194003d6a9fbe8100b1944463ea300dd6852,2024-09-24T18:30:34.863000
|
||||||
CVE-2024-44141,0,1,cf418c986171e3bc9f6e94361ae23fe33ff672a5506240ca7f0249f80c1cacd9,2024-12-11T18:29:33.870000
|
CVE-2024-44141,0,0,cf418c986171e3bc9f6e94361ae23fe33ff672a5506240ca7f0249f80c1cacd9,2024-12-11T18:29:33.870000
|
||||||
CVE-2024-44144,0,0,9b76d7b551b1f0186bb586552a7b8b7528c49f9926c44e33ae408477bdfe743a,2024-10-29T21:35:14.290000
|
CVE-2024-44144,0,0,9b76d7b551b1f0186bb586552a7b8b7528c49f9926c44e33ae408477bdfe743a,2024-10-29T21:35:14.290000
|
||||||
CVE-2024-44145,0,0,d62f5077a98ef996cf6a93b517571803f3a471b93f7b81e2b4d95eb59c6e1123,2024-10-29T20:35:26.280000
|
CVE-2024-44145,0,0,d62f5077a98ef996cf6a93b517571803f3a471b93f7b81e2b4d95eb59c6e1123,2024-10-29T20:35:26.280000
|
||||||
CVE-2024-44146,0,0,9fc3cf91a523a17011d8ddc92710ccca41ad98f894b85050d976b55965940506,2024-09-24T16:14:02.090000
|
CVE-2024-44146,0,0,9fc3cf91a523a17011d8ddc92710ccca41ad98f894b85050d976b55965940506,2024-09-24T16:14:02.090000
|
||||||
@ -263317,12 +263317,12 @@ CVE-2024-44255,0,0,9820b88dd625880139ecea13163fb771ab9d5c255abaf683730d14c11807c
|
|||||||
CVE-2024-44256,0,0,1d0b32e9f5aab30f342fe79425a4926a212e023867c253355a3694c71a6c02f6,2024-10-29T20:35:29.053000
|
CVE-2024-44256,0,0,1d0b32e9f5aab30f342fe79425a4926a212e023867c253355a3694c71a6c02f6,2024-10-29T20:35:29.053000
|
||||||
CVE-2024-44257,0,0,091b47b1f9e59250445b4e9804da1c6a81738459c3a636f1c879f42f06301de3,2024-10-29T20:35:29.240000
|
CVE-2024-44257,0,0,091b47b1f9e59250445b4e9804da1c6a81738459c3a636f1c879f42f06301de3,2024-10-29T20:35:29.240000
|
||||||
CVE-2024-44258,0,0,b9a751f91557dd3ab0500580cec00561525ca507ea060ba008584e768ee04176,2024-11-06T14:35:02.583000
|
CVE-2024-44258,0,0,b9a751f91557dd3ab0500580cec00561525ca507ea060ba008584e768ee04176,2024-11-06T14:35:02.583000
|
||||||
CVE-2024-44259,0,1,7840059ec23ad4e0890ff31c5401691372d865ee50b84fd574bde49a1d54e491,2024-12-11T18:29:11.187000
|
CVE-2024-44259,0,0,7840059ec23ad4e0890ff31c5401691372d865ee50b84fd574bde49a1d54e491,2024-12-11T18:29:11.187000
|
||||||
CVE-2024-4426,0,0,5a50340811c8dac1bab1bb70f4f13d24fac71e6cdebba82e37baca92dd31c3ea,2024-11-21T09:42:48.490000
|
CVE-2024-4426,0,0,5a50340811c8dac1bab1bb70f4f13d24fac71e6cdebba82e37baca92dd31c3ea,2024-11-21T09:42:48.490000
|
||||||
CVE-2024-44260,0,0,669eddf2f80ad4a9dea43d3e0d97a86d2d7ff375b707af96d521b4157ac05c9a,2024-10-29T21:35:17.343000
|
CVE-2024-44260,0,0,669eddf2f80ad4a9dea43d3e0d97a86d2d7ff375b707af96d521b4157ac05c9a,2024-10-29T21:35:17.343000
|
||||||
CVE-2024-44261,0,1,faa469041a43d1fdc729623424014a61aa05639472f8e744062ab95ba97c94df,2024-12-11T18:28:45.787000
|
CVE-2024-44261,0,0,faa469041a43d1fdc729623424014a61aa05639472f8e744062ab95ba97c94df,2024-12-11T18:28:45.787000
|
||||||
CVE-2024-44262,0,0,216f942ab6946c91db934f20abb4be07ce9b18ecbb90ae92edc94facbee54171,2024-10-30T21:35:08.940000
|
CVE-2024-44262,0,0,216f942ab6946c91db934f20abb4be07ce9b18ecbb90ae92edc94facbee54171,2024-10-30T21:35:08.940000
|
||||||
CVE-2024-44263,0,1,42f7f724861a2052b680b2ef9862efbf46666fed69249a4e3fc22b29cd68b4c0,2024-12-11T18:18:06.987000
|
CVE-2024-44263,0,0,42f7f724861a2052b680b2ef9862efbf46666fed69249a4e3fc22b29cd68b4c0,2024-12-11T18:18:06.987000
|
||||||
CVE-2024-44264,0,0,ee0924179708704586a947f8cb1bfc3250aa2f192047d549667f366c53b09528,2024-10-30T18:37:01.203000
|
CVE-2024-44264,0,0,ee0924179708704586a947f8cb1bfc3250aa2f192047d549667f366c53b09528,2024-10-30T18:37:01.203000
|
||||||
CVE-2024-44265,0,0,2a35e1f543866e069d19984c92081c66c8b71cadcb6f6181093964e7539adb55,2024-10-30T19:35:20.800000
|
CVE-2024-44265,0,0,2a35e1f543866e069d19984c92081c66c8b71cadcb6f6181093964e7539adb55,2024-10-30T19:35:20.800000
|
||||||
CVE-2024-44267,0,0,a998007de4d2f37cefd77b01798057f7e8712e22e07027587ff9faa51feecfc5,2024-10-30T18:39:55.167000
|
CVE-2024-44267,0,0,a998007de4d2f37cefd77b01798057f7e8712e22e07027587ff9faa51feecfc5,2024-10-30T18:39:55.167000
|
||||||
@ -263331,12 +263331,12 @@ CVE-2024-4427,0,0,b4bf66b2e009198014a610dfd9745462884232b31fa92086d9d085cb136f35
|
|||||||
CVE-2024-44270,0,0,51d4b52a115ad2f279bed3a378d4fb4fa92b6583bd4c55801137fe6a87bcf63a,2024-10-30T18:44:35.083000
|
CVE-2024-44270,0,0,51d4b52a115ad2f279bed3a378d4fb4fa92b6583bd4c55801137fe6a87bcf63a,2024-10-30T18:44:35.083000
|
||||||
CVE-2024-44273,0,0,caae658c20ea929becd6a50f15cc5040f32d55f5bf0889d84daca4b410aa6c36,2024-12-09T15:15:16.147000
|
CVE-2024-44273,0,0,caae658c20ea929becd6a50f15cc5040f32d55f5bf0889d84daca4b410aa6c36,2024-12-09T15:15:16.147000
|
||||||
CVE-2024-44274,0,0,d4611874fae8cf46b4ebeede4c74afb829adabc974787d5151107510971373f7,2024-10-30T21:35:09.203000
|
CVE-2024-44274,0,0,d4611874fae8cf46b4ebeede4c74afb829adabc974787d5151107510971373f7,2024-10-30T21:35:09.203000
|
||||||
CVE-2024-44275,0,1,ae4f014c6d01e8a3d13555cccb97f78d51a6a2d56fdb3201e11be9cbc301fbd5,2024-12-11T18:10:43.967000
|
CVE-2024-44275,0,0,ae4f014c6d01e8a3d13555cccb97f78d51a6a2d56fdb3201e11be9cbc301fbd5,2024-12-11T18:10:43.967000
|
||||||
CVE-2024-44277,0,1,416642d85105a1b053290a8297fa3dafbcfa733e6016ecf82fd3765564a269c3,2024-12-11T18:02:08.390000
|
CVE-2024-44277,0,0,416642d85105a1b053290a8297fa3dafbcfa733e6016ecf82fd3765564a269c3,2024-12-11T18:02:08.390000
|
||||||
CVE-2024-44278,0,1,92c8ffff1d26b209c14a014b695aae7202ba326c6d599f23f579cecea24b8f80,2024-12-11T17:56:28.003000
|
CVE-2024-44278,0,0,92c8ffff1d26b209c14a014b695aae7202ba326c6d599f23f579cecea24b8f80,2024-12-11T17:56:28.003000
|
||||||
CVE-2024-44279,0,1,812b461493404626705b5c366e9a37ba4b5cce2f8aa8a61ee91e148ba4ee6083,2024-12-11T17:46:27.933000
|
CVE-2024-44279,0,0,812b461493404626705b5c366e9a37ba4b5cce2f8aa8a61ee91e148ba4ee6083,2024-12-11T17:46:27.933000
|
||||||
CVE-2024-4428,0,0,2527344d7b01ebc86d2898d4306f4d2c0205a173128a1642769222149b277c45,2024-08-30T15:49:16.927000
|
CVE-2024-4428,0,0,2527344d7b01ebc86d2898d4306f4d2c0205a173128a1642769222149b277c45,2024-08-30T15:49:16.927000
|
||||||
CVE-2024-44280,0,1,c232cb3eb70483ba8f3d7751295781b7f4b5e9f1988330d8d3a3841a03771e8d,2024-12-11T17:36:38.283000
|
CVE-2024-44280,0,0,c232cb3eb70483ba8f3d7751295781b7f4b5e9f1988330d8d3a3841a03771e8d,2024-12-11T17:36:38.283000
|
||||||
CVE-2024-44281,0,0,0da37e141d40e570c211530ed64844d2e9849fb56726f88952f508886c8410dc,2024-10-30T21:35:09.543000
|
CVE-2024-44281,0,0,0da37e141d40e570c211530ed64844d2e9849fb56726f88952f508886c8410dc,2024-10-30T21:35:09.543000
|
||||||
CVE-2024-44282,0,0,19e7f89bc53f9996266df8d8f970c647ae8c9feb6b62e99ce7e6ddcafec7613d,2024-10-30T18:47:21.447000
|
CVE-2024-44282,0,0,19e7f89bc53f9996266df8d8f970c647ae8c9feb6b62e99ce7e6ddcafec7613d,2024-10-30T18:47:21.447000
|
||||||
CVE-2024-44283,0,0,b1ba836451173f2dda6c5713cc87d16e1384ae67bd6e0eb45ac6126de69c296f,2024-10-29T21:35:19.207000
|
CVE-2024-44283,0,0,b1ba836451173f2dda6c5713cc87d16e1384ae67bd6e0eb45ac6126de69c296f,2024-10-29T21:35:19.207000
|
||||||
@ -263352,8 +263352,8 @@ CVE-2024-44297,0,0,15b11a1a880cbcc6b8dc8f6c7e90f9afa6080bf98d20fe4b15a67c3ef7cd8
|
|||||||
CVE-2024-4430,0,0,d5d36fbeccc483ac36a1692cd3da44d019b58c951236b193b64bdfb1c1fbb731,2024-11-21T09:42:48.940000
|
CVE-2024-4430,0,0,d5d36fbeccc483ac36a1692cd3da44d019b58c951236b193b64bdfb1c1fbb731,2024-11-21T09:42:48.940000
|
||||||
CVE-2024-44301,0,0,92d51fc975ead2b338c26accd94652ad84b6246707eb6eb0fccef69671475afd,2024-10-30T19:35:22.447000
|
CVE-2024-44301,0,0,92d51fc975ead2b338c26accd94652ad84b6246707eb6eb0fccef69671475afd,2024-10-30T19:35:22.447000
|
||||||
CVE-2024-44302,0,0,8e2df0f8c8bbf990ae9e0c0188d5dc060a503901afef39bb207c003562ed13c7,2024-12-06T15:15:09.050000
|
CVE-2024-44302,0,0,8e2df0f8c8bbf990ae9e0c0188d5dc060a503901afef39bb207c003562ed13c7,2024-12-06T15:15:09.050000
|
||||||
CVE-2024-44306,0,0,066c1941beb859046a0f35518b67c30dc71510c24094b71774fffea2e5d20e84,2024-11-21T13:57:24.187000
|
CVE-2024-44306,0,1,8fb83c68a3960e43ecba5e716ce2c319df21cea60529cc8954824fbcac0a96d6,2024-12-11T20:34:16.127000
|
||||||
CVE-2024-44307,0,0,e5abde029a826180bf0bded828b1ec239af59b643bab36556eb430dba6456188,2024-11-21T13:57:24.187000
|
CVE-2024-44307,0,1,1f7e71cf7755409ec2cf8830e6d0a0c679d373aedb9b20dcc049bbb014d968fb,2024-12-11T20:32:54.970000
|
||||||
CVE-2024-44308,0,0,acc369578912d118b4a89ca8ee5987b89635f4149292d31f719e55be8c103584,2024-11-27T19:35:10.147000
|
CVE-2024-44308,0,0,acc369578912d118b4a89ca8ee5987b89635f4149292d31f719e55be8c103584,2024-11-27T19:35:10.147000
|
||||||
CVE-2024-44309,0,0,52770843bac18ca9341a93eea8b19ddbef2c8812b70a8cb8a748cb3c19c4c5a4,2024-11-29T18:28:16.227000
|
CVE-2024-44309,0,0,52770843bac18ca9341a93eea8b19ddbef2c8812b70a8cb8a748cb3c19c4c5a4,2024-11-29T18:28:16.227000
|
||||||
CVE-2024-4431,0,0,357eff4f15b095adf7d0d7c2534d815a670275730c5f5456eabe410d4fe83988,2024-11-21T09:42:49.050000
|
CVE-2024-4431,0,0,357eff4f15b095adf7d0d7c2534d815a670275730c5f5456eabe410d4fe83988,2024-11-21T09:42:49.050000
|
||||||
@ -265480,11 +265480,11 @@ CVE-2024-47754,0,0,15efe46b5acd24e6a048863fe4e659f9670882dda2e519b1e7e7ce2228e3b
|
|||||||
CVE-2024-47755,0,0,8cf25d07e196e075734f98083f38dbef19fd8e91fd1c66d640e943585b9e2f41,2024-10-23T06:15:09.873000
|
CVE-2024-47755,0,0,8cf25d07e196e075734f98083f38dbef19fd8e91fd1c66d640e943585b9e2f41,2024-10-23T06:15:09.873000
|
||||||
CVE-2024-47756,0,0,1de05fda503d02fa87bd65fed649de9909414f3433775c910b61f18ec7e108ff,2024-11-08T16:15:28.193000
|
CVE-2024-47756,0,0,1de05fda503d02fa87bd65fed649de9909414f3433775c910b61f18ec7e108ff,2024-11-08T16:15:28.193000
|
||||||
CVE-2024-47757,0,0,4e322af9265d57e4063793da36297e2e8e33c72df9516cf2e3471642eb8d6f80,2024-11-08T16:15:28.343000
|
CVE-2024-47757,0,0,4e322af9265d57e4063793da36297e2e8e33c72df9516cf2e3471642eb8d6f80,2024-11-08T16:15:28.343000
|
||||||
CVE-2024-47758,0,1,cc7ed3652675f623f93e6d3af501aea6668bd8fe02a027acd6a93c402c69fe5f,2024-12-11T17:15:16.520000
|
CVE-2024-47758,0,0,cc7ed3652675f623f93e6d3af501aea6668bd8fe02a027acd6a93c402c69fe5f,2024-12-11T17:15:16.520000
|
||||||
CVE-2024-47759,0,0,1fd116c727aabbd54984baaa595563834133a65845c6f288b440b9da6678ff32,2024-11-21T15:15:31.887000
|
CVE-2024-47759,0,0,1fd116c727aabbd54984baaa595563834133a65845c6f288b440b9da6678ff32,2024-11-21T15:15:31.887000
|
||||||
CVE-2024-4776,0,0,2a2b40e79143dfc9f450d4468b54f62c55f3f15452736cde9c1621738d0e995d,2024-11-21T09:43:35.370000
|
CVE-2024-4776,0,0,2a2b40e79143dfc9f450d4468b54f62c55f3f15452736cde9c1621738d0e995d,2024-11-21T09:43:35.370000
|
||||||
CVE-2024-47760,1,1,dd73bf907aa6438e4057744c055f3a371f92454280c39c68413e8d6ce4b3e399,2024-12-11T17:15:16.620000
|
CVE-2024-47760,0,0,dd73bf907aa6438e4057744c055f3a371f92454280c39c68413e8d6ce4b3e399,2024-12-11T17:15:16.620000
|
||||||
CVE-2024-47761,1,1,4ac4cc6d037701d65d5ff094089efc8240a823b58728cdf3e794069a13fdffb9,2024-12-11T17:15:16.753000
|
CVE-2024-47761,0,0,4ac4cc6d037701d65d5ff094089efc8240a823b58728cdf3e794069a13fdffb9,2024-12-11T17:15:16.753000
|
||||||
CVE-2024-47762,0,0,ed6d8e4baa5d7147af1ba2857c162b2f60951a58b12f0b0044596a4ae5e7cc4b,2024-10-04T13:50:43.727000
|
CVE-2024-47762,0,0,ed6d8e4baa5d7147af1ba2857c162b2f60951a58b12f0b0044596a4ae5e7cc4b,2024-10-04T13:50:43.727000
|
||||||
CVE-2024-47763,0,0,da855ec087d4b8e0a9eb31b1a21ff8baddf111ce8dff6dcb6df1a928202880d4,2024-10-10T12:51:56.987000
|
CVE-2024-47763,0,0,da855ec087d4b8e0a9eb31b1a21ff8baddf111ce8dff6dcb6df1a928202880d4,2024-10-10T12:51:56.987000
|
||||||
CVE-2024-47764,0,0,00956feb7e58ad9d2c6d9773a9bb600b33607eb85945ea92d542eb5a9b0e5fd3,2024-10-07T17:48:28.117000
|
CVE-2024-47764,0,0,00956feb7e58ad9d2c6d9773a9bb600b33607eb85945ea92d542eb5a9b0e5fd3,2024-10-07T17:48:28.117000
|
||||||
@ -265910,7 +265910,7 @@ CVE-2024-4869,0,0,a498392e92d4315a3c1a63f0751024c8b7def437eeab49123db178ff4b1bb7
|
|||||||
CVE-2024-48694,0,0,faeae9ab327b97202e086aff921470e6b984670cc294f1289742129b482c0fbd,2024-11-21T17:15:20.110000
|
CVE-2024-48694,0,0,faeae9ab327b97202e086aff921470e6b984670cc294f1289742129b482c0fbd,2024-11-21T17:15:20.110000
|
||||||
CVE-2024-4870,0,0,0ea27412573995f30563e69813626323b1c481b1ce23f80a057c978dadba8008,2024-11-21T09:43:45.780000
|
CVE-2024-4870,0,0,0ea27412573995f30563e69813626323b1c481b1ce23f80a057c978dadba8008,2024-11-21T09:43:45.780000
|
||||||
CVE-2024-48700,0,0,01c4f559aaf90a38c82d132f177d7376c563e831acc8fed72ee735b60694278e,2024-10-29T19:35:24.643000
|
CVE-2024-48700,0,0,01c4f559aaf90a38c82d132f177d7376c563e831acc8fed72ee735b60694278e,2024-10-29T19:35:24.643000
|
||||||
CVE-2024-48703,0,1,66b49a296cfb94ace483912b990b744b957f247ff107c8ad1fc8f2d7eabd4b79,2024-12-11T17:15:16.880000
|
CVE-2024-48703,0,0,66b49a296cfb94ace483912b990b744b957f247ff107c8ad1fc8f2d7eabd4b79,2024-12-11T17:15:16.880000
|
||||||
CVE-2024-48706,0,0,01b14d93ae4ee00944ef1cd75a9875b03abdc2bf7e76fb805796512272c54952,2024-10-25T18:58:35.380000
|
CVE-2024-48706,0,0,01b14d93ae4ee00944ef1cd75a9875b03abdc2bf7e76fb805796512272c54952,2024-10-25T18:58:35.380000
|
||||||
CVE-2024-48707,0,0,8c5783a4e9b64c0d59925994774447278a2e90a82fd2cd55ee2072a8b3d5b0c7,2024-10-25T19:11:54.310000
|
CVE-2024-48707,0,0,8c5783a4e9b64c0d59925994774447278a2e90a82fd2cd55ee2072a8b3d5b0c7,2024-10-25T19:11:54.310000
|
||||||
CVE-2024-48708,0,0,e061892415ada1b97948e5eaa0f479bd634d96d643152026ca3698c48e905eeb,2024-10-25T19:10:08.457000
|
CVE-2024-48708,0,0,e061892415ada1b97948e5eaa0f479bd634d96d643152026ca3698c48e905eeb,2024-10-25T19:10:08.457000
|
||||||
@ -266019,7 +266019,7 @@ CVE-2024-48909,0,0,5af217867017b45645b1cd88e9368407196c63b062f42cfaf011c832caa8e
|
|||||||
CVE-2024-4891,0,0,7cb3db743f108d5675454fcadd708016c769ea8cf5a8b2853b03b88bb20963e7,2024-11-21T09:43:48.267000
|
CVE-2024-4891,0,0,7cb3db743f108d5675454fcadd708016c769ea8cf5a8b2853b03b88bb20963e7,2024-11-21T09:43:48.267000
|
||||||
CVE-2024-48910,0,0,7f12c97e649c7955bf5eb5f3507eac6092487e8d427486ba58a1995cf7bdfe0b,2024-11-01T12:57:03.417000
|
CVE-2024-48910,0,0,7f12c97e649c7955bf5eb5f3507eac6092487e8d427486ba58a1995cf7bdfe0b,2024-11-01T12:57:03.417000
|
||||||
CVE-2024-48911,0,0,55b7a5a266268268213060e2c0d21ae7b031d3c5984450b459efb48b395401c8,2024-10-17T21:13:37.147000
|
CVE-2024-48911,0,0,55b7a5a266268268213060e2c0d21ae7b031d3c5984450b459efb48b395401c8,2024-10-17T21:13:37.147000
|
||||||
CVE-2024-48912,1,1,ff95c64412382e8bf9935aaafeab92fa0a3884f65d560a3b6c434adca6180412,2024-12-11T17:15:17.043000
|
CVE-2024-48912,0,0,ff95c64412382e8bf9935aaafeab92fa0a3884f65d560a3b6c434adca6180412,2024-12-11T17:15:17.043000
|
||||||
CVE-2024-48913,0,0,27febbef07f52d15082822a078467473fe159291b0acb1f4d5bbfdd00e1f7d37,2024-10-16T16:38:43.170000
|
CVE-2024-48913,0,0,27febbef07f52d15082822a078467473fe159291b0acb1f4d5bbfdd00e1f7d37,2024-10-16T16:38:43.170000
|
||||||
CVE-2024-48914,0,0,06e6403f67b46df13be7d3307b268a340a7b5ecc4c110c41c7ad7a6e410813ce,2024-10-16T16:38:43.170000
|
CVE-2024-48914,0,0,06e6403f67b46df13be7d3307b268a340a7b5ecc4c110c41c7ad7a6e410813ce,2024-10-16T16:38:43.170000
|
||||||
CVE-2024-48915,0,0,9d7a6a29dbd5024252c24e84e8b90c6b30d7a5e8086888e4b95df3996ef82dfc,2024-11-21T17:15:20.387000
|
CVE-2024-48915,0,0,9d7a6a29dbd5024252c24e84e8b90c6b30d7a5e8086888e4b95df3996ef82dfc,2024-11-21T17:15:20.387000
|
||||||
@ -267365,8 +267365,8 @@ CVE-2024-50623,0,0,6fcd66e2e3cba1cd1f30ebab630bce12ee40ef64a6546c3f39f7c8deba389
|
|||||||
CVE-2024-50624,0,0,425b4912ca74d0f19519cece63451f565c900b6a769644536a74ca4edcfab020,2024-10-30T21:35:12.223000
|
CVE-2024-50624,0,0,425b4912ca74d0f19519cece63451f565c900b6a769644536a74ca4edcfab020,2024-10-30T21:35:12.223000
|
||||||
CVE-2024-50625,0,0,5abc4084e07d9a3c79345867768f046fd6b8291d524d27fdad129b14201bd194,2024-12-09T22:15:22.610000
|
CVE-2024-50625,0,0,5abc4084e07d9a3c79345867768f046fd6b8291d524d27fdad129b14201bd194,2024-12-09T22:15:22.610000
|
||||||
CVE-2024-50626,0,0,663472eceab67dc8729488b116bdfc4f91c7ae178fe7f09c80d8f236516196dd,2024-12-09T22:15:22.733000
|
CVE-2024-50626,0,0,663472eceab67dc8729488b116bdfc4f91c7ae178fe7f09c80d8f236516196dd,2024-12-09T22:15:22.733000
|
||||||
CVE-2024-50627,0,1,ea64848ef2e270f567cb88c4dbf4ab01f9f2d915f5893b3b8f1eff3daf718969,2024-12-11T17:15:17.200000
|
CVE-2024-50627,0,0,ea64848ef2e270f567cb88c4dbf4ab01f9f2d915f5893b3b8f1eff3daf718969,2024-12-11T17:15:17.200000
|
||||||
CVE-2024-50628,0,1,1daf5ff0cc9df608c8ff4c00f291eda5553afef20749a9ab4a5287cfc68ca0a9,2024-12-11T17:15:17.350000
|
CVE-2024-50628,0,0,1daf5ff0cc9df608c8ff4c00f291eda5553afef20749a9ab4a5287cfc68ca0a9,2024-12-11T17:15:17.350000
|
||||||
CVE-2024-5063,0,0,d66483573e96022ccfb509c4cd99c3f2ab64b3e900fde1922f4af776a81cdb65,2024-11-21T09:46:53.250000
|
CVE-2024-5063,0,0,d66483573e96022ccfb509c4cd99c3f2ab64b3e900fde1922f4af776a81cdb65,2024-11-21T09:46:53.250000
|
||||||
CVE-2024-50634,0,0,75c75741b4ff07a7223817b405561d2122b2e965df2d36431c234973c9416179,2024-11-14T20:40:43.690000
|
CVE-2024-50634,0,0,75c75741b4ff07a7223817b405561d2122b2e965df2d36431c234973c9416179,2024-11-14T20:40:43.690000
|
||||||
CVE-2024-50636,0,0,35ef03dd8175dba345c3fb32a6b071a45c850c144fdf90f5aef46a21c35cb9c9,2024-11-19T19:35:14.833000
|
CVE-2024-50636,0,0,35ef03dd8175dba345c3fb32a6b071a45c850c144fdf90f5aef46a21c35cb9c9,2024-11-19T19:35:14.833000
|
||||||
@ -268777,39 +268777,39 @@ CVE-2024-53105,0,0,49789fd38eb8c2e3aaed32c560b477653876ad3a281d38d4728b170cce015
|
|||||||
CVE-2024-53106,0,0,30e3702644fc7a35784d9f94136dad383572937546c2f59633334350f5453e80,2024-12-02T14:15:11.420000
|
CVE-2024-53106,0,0,30e3702644fc7a35784d9f94136dad383572937546c2f59633334350f5453e80,2024-12-02T14:15:11.420000
|
||||||
CVE-2024-53107,0,0,8f70c788a7b6178a3903b9f5f9459c260918d71bed6669c5c2bf534cedaffb24,2024-12-02T14:15:11.523000
|
CVE-2024-53107,0,0,8f70c788a7b6178a3903b9f5f9459c260918d71bed6669c5c2bf534cedaffb24,2024-12-02T14:15:11.523000
|
||||||
CVE-2024-53108,0,0,b4292863b8ed237f808d295de102699b1ca4b4ad0a5c2696f066f9d9322750ce,2024-12-02T14:15:11.617000
|
CVE-2024-53108,0,0,b4292863b8ed237f808d295de102699b1ca4b4ad0a5c2696f066f9d9322750ce,2024-12-02T14:15:11.617000
|
||||||
CVE-2024-53109,0,0,f72d8cc0c9d685b6d3352cb38d6940f4204a7edf839e402a599f221486e6b64e,2024-12-02T14:15:11.713000
|
CVE-2024-53109,0,1,d80085f3f410dd8afe5fcb4bb2a7425adbf441880eea0d78d08351256f1f73ed,2024-12-11T20:21:25.433000
|
||||||
CVE-2024-5311,0,0,f8378ba9ebef46eccbf323def8cbd96b7160acf8b4fbc81591c784546335a944,2024-11-21T09:47:24.407000
|
CVE-2024-5311,0,0,f8378ba9ebef46eccbf323def8cbd96b7160acf8b4fbc81591c784546335a944,2024-11-21T09:47:24.407000
|
||||||
CVE-2024-53110,0,0,04a372c3b93129e83b4bf2f47fd3cfc0da94c189f1532ab3eb5ed170baa52ed0,2024-12-02T14:15:11.803000
|
CVE-2024-53110,0,1,bccbe74747dd8340ef9bab29109d8892c819998be48c1b36230170d42b1281e1,2024-12-11T20:24:25.883000
|
||||||
CVE-2024-53111,0,0,3ecbad1fb4aed498b5ba4878d86dac37a0eb3d1a376e83ad252f51ac36d6244e,2024-12-02T14:15:11.903000
|
CVE-2024-53111,0,1,e6cccb5360d7be828bc3d6ee06773ec6a738d42e94be83ed1e612e5458065938,2024-12-11T20:27:04.360000
|
||||||
CVE-2024-53112,0,0,1f52fe6b05ca9a744cc5559de0f46a923bb8636dcf8a82d706d9e59da13f9b98,2024-12-05T12:15:19.190000
|
CVE-2024-53112,0,1,f9a5f14a5c91f3a4f9aec80e7e66bea060ee69c2aaf9fd454be8fbaa8e4997dd,2024-12-11T20:28:19.407000
|
||||||
CVE-2024-53113,0,0,0172ebd4c1a62a3c52949ad4be5c70ea1b6f5b8c31e079b31abd02b0fb5ee4ed,2024-12-02T14:15:12.097000
|
CVE-2024-53113,0,1,a5dbf8867cc8acd3bb02fb96e099532a2cc5c6a04e027b1659de7c1ee85ac36e,2024-12-11T20:29:10.150000
|
||||||
CVE-2024-53114,0,0,de802c88dfd6d505b8fb877dda45c7f46ac128433d0f4e793f94e56105ec7f58,2024-12-02T14:15:12.197000
|
CVE-2024-53114,0,1,0cb65a410b3587aabfb1cf3b28d41f6036958f6d46ab3f63ee8852d20e1cc953,2024-12-11T20:30:29.440000
|
||||||
CVE-2024-53115,0,0,651ce6bd6d64e502d54d8f15fc8bc081f03cd744398fd763ca5dfc10c96ba0cb,2024-12-02T14:15:12.287000
|
CVE-2024-53115,0,1,501caba5bd28664d84ca1ecb6b341727e67873c4d1380ad693f3be1beb2d4dfa,2024-12-11T20:31:39.927000
|
||||||
CVE-2024-53116,0,0,7b45fbb7069dc95354e247ec5aac69d8d6f0ca3c4bec594b3c11a3f3ee366f1f,2024-12-02T14:15:12.373000
|
CVE-2024-53116,0,1,93437c22f5df7465cbd26c3922add3afeeb61a2aa2abbbb83e35597c8fed0711,2024-12-11T20:34:11.147000
|
||||||
CVE-2024-53117,0,0,7605ef9219761f0504ebd2dc32bcb27d3323cc164e479fd5ea3ccea6cfd38027,2024-12-02T14:15:12.470000
|
CVE-2024-53117,0,1,10537f1f8b5d15eafcabda813e9011665124189b2e4722cf2ad12faaca24813a,2024-12-11T20:44:30.167000
|
||||||
CVE-2024-53118,0,0,32e630dfd32e1df2947bbbc094c3e3f2f0ba2fdcd5b8e7898fe14fef093e5dde,2024-12-02T14:15:12.567000
|
CVE-2024-53118,0,1,cf99f3a0b5334b8c2170fa08f994b6085545faed7e1f9a2e12fd06a382632f22,2024-12-11T20:52:52.993000
|
||||||
CVE-2024-53119,0,0,5bd96fdaa591a521b659bad21fd845d53a693c9114d2989627b6fcba5f37af18,2024-12-02T14:15:12.667000
|
CVE-2024-53119,0,1,a5cb29cc4540c3ac475fc1c857e391019e201a894198296122bd3cfa250d839d,2024-12-11T20:55:09.957000
|
||||||
CVE-2024-5312,0,0,76fc8f0f224e779c413fe7053d6cc7231c000374597daa3fa125fa2942cfd8ea,2024-11-21T09:47:24.540000
|
CVE-2024-5312,0,0,76fc8f0f224e779c413fe7053d6cc7231c000374597daa3fa125fa2942cfd8ea,2024-11-21T09:47:24.540000
|
||||||
CVE-2024-53120,0,0,c733317896a4bf5e4bc4d89bd10ae4dae9d07438bcd651cdea5f96004ac81c40,2024-12-02T14:15:12.773000
|
CVE-2024-53120,0,1,9b354eea941c64c4589ba6b55c7962c2166bcaf461a5602e55b7e9dbb37c2b79,2024-12-11T20:59:36.660000
|
||||||
CVE-2024-53121,0,0,20e6456104ca3e9475977760331dbe5bef10a1641e5a4ae3e9d30fe889a1eb88,2024-12-02T14:15:12.877000
|
CVE-2024-53121,0,0,20e6456104ca3e9475977760331dbe5bef10a1641e5a4ae3e9d30fe889a1eb88,2024-12-02T14:15:12.877000
|
||||||
CVE-2024-53122,0,0,296e5c6ddaf65cb73532dbf1c8691b97f4aceba923bea3b92ff6182e3e9a96fc,2024-12-02T14:15:13.010000
|
CVE-2024-53122,0,0,296e5c6ddaf65cb73532dbf1c8691b97f4aceba923bea3b92ff6182e3e9a96fc,2024-12-02T14:15:13.010000
|
||||||
CVE-2024-53123,0,0,24dcf5fc8c07696d4316a0bcaae80c912836766e13bc36abf856ed9cfdf90e86,2024-12-02T14:15:13.120000
|
CVE-2024-53123,0,0,24dcf5fc8c07696d4316a0bcaae80c912836766e13bc36abf856ed9cfdf90e86,2024-12-02T14:15:13.120000
|
||||||
CVE-2024-53124,0,0,da81b079a26032372df994f5cc215d5737b556ce711aee1c1f9f02abac5fe165,2024-12-02T14:15:13.220000
|
CVE-2024-53124,0,0,da81b079a26032372df994f5cc215d5737b556ce711aee1c1f9f02abac5fe165,2024-12-02T14:15:13.220000
|
||||||
CVE-2024-53125,0,0,d287d13c96190c9b37b83c5ddd3e5440e1a3556c4f4f915762743d7e8ac2ac93,2024-12-04T14:15:20.460000
|
CVE-2024-53125,0,0,d287d13c96190c9b37b83c5ddd3e5440e1a3556c4f4f915762743d7e8ac2ac93,2024-12-04T14:15:20.460000
|
||||||
CVE-2024-53126,0,1,a72263375ba67d50282c60abedec935bfe8d50e7cbcfeba2f1a3d6ecee961c22,2024-12-11T17:26:28.807000
|
CVE-2024-53126,0,0,a72263375ba67d50282c60abedec935bfe8d50e7cbcfeba2f1a3d6ecee961c22,2024-12-11T17:26:28.807000
|
||||||
CVE-2024-53127,0,1,cec2242d0c78ed327c08b697c91b7aa54e84f1501c9625675c6496076be61db6,2024-12-11T17:30:25.387000
|
CVE-2024-53127,0,0,cec2242d0c78ed327c08b697c91b7aa54e84f1501c9625675c6496076be61db6,2024-12-11T17:30:25.387000
|
||||||
CVE-2024-53128,0,0,f9eec68ede1e406488191c46f9d50f73ad3aa1613bc770edcaf522cca67dd4a8,2024-12-04T15:15:12.737000
|
CVE-2024-53128,0,0,f9eec68ede1e406488191c46f9d50f73ad3aa1613bc770edcaf522cca67dd4a8,2024-12-04T15:15:12.737000
|
||||||
CVE-2024-53129,0,0,d1fc77f1dab17eeff37788fbf62ea42867a917fecd21166d87ba8aca6ef2ff20,2024-12-04T15:15:12.837000
|
CVE-2024-53129,0,0,d1fc77f1dab17eeff37788fbf62ea42867a917fecd21166d87ba8aca6ef2ff20,2024-12-04T15:15:12.837000
|
||||||
CVE-2024-5313,0,0,be791a23ecd40bbfd3a356fb20dc239f3a0459ddf5fc8645766d7d90d3fc6d71,2024-11-21T09:47:24.663000
|
CVE-2024-5313,0,0,be791a23ecd40bbfd3a356fb20dc239f3a0459ddf5fc8645766d7d90d3fc6d71,2024-11-21T09:47:24.663000
|
||||||
CVE-2024-53130,0,0,23ee5f4159f8dab2108c8598b8abfbca1237bd7aabbe8e7a77092d09590b0823,2024-12-11T15:01:08.660000
|
CVE-2024-53130,0,0,23ee5f4159f8dab2108c8598b8abfbca1237bd7aabbe8e7a77092d09590b0823,2024-12-11T15:01:08.660000
|
||||||
CVE-2024-53131,0,0,19eba6d8151a3ccf75118bd0f587f03ce57bf19a786a52e87aafc302369fecff,2024-12-11T14:55:01.573000
|
CVE-2024-53131,0,0,19eba6d8151a3ccf75118bd0f587f03ce57bf19a786a52e87aafc302369fecff,2024-12-11T14:55:01.573000
|
||||||
CVE-2024-53132,0,1,02684fd5295d1816d19d855ff4313b9ab0a5ef21393b8f3bf551d14d7c419da0,2024-12-11T17:17:23.790000
|
CVE-2024-53132,0,0,02684fd5295d1816d19d855ff4313b9ab0a5ef21393b8f3bf551d14d7c419da0,2024-12-11T17:17:23.790000
|
||||||
CVE-2024-53133,0,1,6c95e6b5b7d387821d7512d082449ab7ccc92df69bed0faffcc1faa9baa708e4,2024-12-11T17:16:16.593000
|
CVE-2024-53133,0,0,6c95e6b5b7d387821d7512d082449ab7ccc92df69bed0faffcc1faa9baa708e4,2024-12-11T17:16:16.593000
|
||||||
CVE-2024-53134,0,1,a7e90b2b5ba811b1e470b3c20eb9de7cbf73de01881eab55121f613f9b395ee7,2024-12-11T17:10:16.683000
|
CVE-2024-53134,0,0,a7e90b2b5ba811b1e470b3c20eb9de7cbf73de01881eab55121f613f9b395ee7,2024-12-11T17:10:16.683000
|
||||||
CVE-2024-53135,0,1,2599970c734ddaa4c7ca6632276a0ba0f33840b30c767ea62536cc132ef323e6,2024-12-11T17:08:02.847000
|
CVE-2024-53135,0,0,2599970c734ddaa4c7ca6632276a0ba0f33840b30c767ea62536cc132ef323e6,2024-12-11T17:08:02.847000
|
||||||
CVE-2024-53136,0,1,89e921ce2eebc2b188282936e4c57cdcccbbffd94b6a069943cac2cc28869a83,2024-12-11T17:04:47.447000
|
CVE-2024-53136,0,0,89e921ce2eebc2b188282936e4c57cdcccbbffd94b6a069943cac2cc28869a83,2024-12-11T17:04:47.447000
|
||||||
CVE-2024-53137,0,1,ab21365dc50b4678bed6ce6c5762aff8f85aed03af19b1c02f26a57cff53277b,2024-12-11T17:01:09.277000
|
CVE-2024-53137,0,0,ab21365dc50b4678bed6ce6c5762aff8f85aed03af19b1c02f26a57cff53277b,2024-12-11T17:01:09.277000
|
||||||
CVE-2024-53138,0,1,cf0e25cdffed6b53c740699e9a6607b7b31368754555444748962e5c5d17f1b8,2024-12-11T16:59:47.763000
|
CVE-2024-53138,0,0,cf0e25cdffed6b53c740699e9a6607b7b31368754555444748962e5c5d17f1b8,2024-12-11T16:59:47.763000
|
||||||
CVE-2024-53139,0,0,38e0ae2d6b2c4e8a68fa87c84522af1b5dddfecf72b546f9f1556d45a497a8c8,2024-12-11T16:47:34.503000
|
CVE-2024-53139,0,0,38e0ae2d6b2c4e8a68fa87c84522af1b5dddfecf72b546f9f1556d45a497a8c8,2024-12-11T16:47:34.503000
|
||||||
CVE-2024-5314,0,0,3f9bafe97657efc7f668c5d897662a9659297ed1c2230826ab18be8ba9a6342b,2024-11-21T09:47:24.810000
|
CVE-2024-5314,0,0,3f9bafe97657efc7f668c5d897662a9659297ed1c2230826ab18be8ba9a6342b,2024-11-21T09:47:24.810000
|
||||||
CVE-2024-53140,0,0,b503ff41f27d09c97e1340bff7967ee87bb32e39dafc91d99f5fdd4a3e40d538,2024-12-11T16:45:38.077000
|
CVE-2024-53140,0,0,b503ff41f27d09c97e1340bff7967ee87bb32e39dafc91d99f5fdd4a3e40d538,2024-12-11T16:45:38.077000
|
||||||
@ -268882,7 +268882,7 @@ CVE-2024-53432,0,0,91200366caef4fd477ae549a4b97936ab0103419821400acdfe9619ad1d64
|
|||||||
CVE-2024-53438,0,0,269e7677ace7d9295c53368d7a770c8536638e497558c04303dcd88d3a89eb20,2024-11-27T17:15:14.647000
|
CVE-2024-53438,0,0,269e7677ace7d9295c53368d7a770c8536638e497558c04303dcd88d3a89eb20,2024-11-27T17:15:14.647000
|
||||||
CVE-2024-5344,0,0,8f458be972a177773c42d8be4d4a2a3285a02690bc775c46c880075a709e9dd2,2024-11-21T09:47:27.763000
|
CVE-2024-5344,0,0,8f458be972a177773c42d8be4d4a2a3285a02690bc775c46c880075a709e9dd2,2024-11-21T09:47:27.763000
|
||||||
CVE-2024-53441,0,0,6fa821e2c267d095456f77ca67b20d4bddb8527931416944a8acea3783a3793c,2024-12-09T20:15:20.800000
|
CVE-2024-53441,0,0,6fa821e2c267d095456f77ca67b20d4bddb8527931416944a8acea3783a3793c,2024-12-09T20:15:20.800000
|
||||||
CVE-2024-53442,0,1,d228660d56d3a571a361a3c128f6a576835f40179a930e9ca9db1661418723b2,2024-12-11T17:15:19.083000
|
CVE-2024-53442,0,0,d228660d56d3a571a361a3c128f6a576835f40179a930e9ca9db1661418723b2,2024-12-11T17:15:19.083000
|
||||||
CVE-2024-5345,0,0,c0e9154b8cf6eccc0abbcabbb8ee4621432a41cc6dca94348a2468e667caa563,2024-11-21T09:47:27.883000
|
CVE-2024-5345,0,0,c0e9154b8cf6eccc0abbcabbb8ee4621432a41cc6dca94348a2468e667caa563,2024-11-21T09:47:27.883000
|
||||||
CVE-2024-53450,0,0,35c5f2872561bc157223093101834ca44cd8e03e4dad5a58a6584da3319abc23,2024-12-11T16:15:13.910000
|
CVE-2024-53450,0,0,35c5f2872561bc157223093101834ca44cd8e03e4dad5a58a6584da3319abc23,2024-12-11T16:15:13.910000
|
||||||
CVE-2024-53457,0,0,2a9d6ff9530514e1b1118f6cfb8ea3e80f964c7759c5b6fc65af26bdd6a25cf5,2024-12-10T18:15:41.873000
|
CVE-2024-53457,0,0,2a9d6ff9530514e1b1118f6cfb8ea3e80f964c7759c5b6fc65af26bdd6a25cf5,2024-12-10T18:15:41.873000
|
||||||
@ -268891,7 +268891,7 @@ CVE-2024-5346,0,0,835e1b7230e6e33db8d8cf7bc9b64a0aa9f43b5b6335773933376ca9c2372d
|
|||||||
CVE-2024-5347,0,0,a4eb7d8feed8c584fc13b2c0e6136e67598b45cb75b5638081f14ed1c0f5fa79,2024-11-21T09:47:28.127000
|
CVE-2024-5347,0,0,a4eb7d8feed8c584fc13b2c0e6136e67598b45cb75b5638081f14ed1c0f5fa79,2024-11-21T09:47:28.127000
|
||||||
CVE-2024-53470,0,0,7e717d458d3e971476fce58f4e759acfb3653594788d9bb4f7ef6a8cad1dbc8b,2024-12-10T22:15:25.010000
|
CVE-2024-53470,0,0,7e717d458d3e971476fce58f4e759acfb3653594788d9bb4f7ef6a8cad1dbc8b,2024-12-10T22:15:25.010000
|
||||||
CVE-2024-53471,0,0,dea70dfafbf7c115f6b9fc5aab8fa383b86b6c8d65d06c11e3049e5b3d3b885e,2024-12-10T22:15:25.277000
|
CVE-2024-53471,0,0,dea70dfafbf7c115f6b9fc5aab8fa383b86b6c8d65d06c11e3049e5b3d3b885e,2024-12-10T22:15:25.277000
|
||||||
CVE-2024-53472,0,1,f62f01117567dfa980810b663addc9d4b9e324fc111266531f31ef2f0fb28372,2024-12-11T17:15:19.720000
|
CVE-2024-53472,0,0,f62f01117567dfa980810b663addc9d4b9e324fc111266531f31ef2f0fb28372,2024-12-11T17:15:19.720000
|
||||||
CVE-2024-53473,0,0,358e2b05fdc54a6e3691e8ba3f77fedff57be14fcbc952f41ed19a97501744e2,2024-12-07T23:15:34.137000
|
CVE-2024-53473,0,0,358e2b05fdc54a6e3691e8ba3f77fedff57be14fcbc952f41ed19a97501744e2,2024-12-07T23:15:34.137000
|
||||||
CVE-2024-53477,0,0,3dfbb52637bb052a793d1b67a024cd50b899929ad7fee8a9366a9aa6e069e388,2024-12-11T16:15:14.150000
|
CVE-2024-53477,0,0,3dfbb52637bb052a793d1b67a024cd50b899929ad7fee8a9366a9aa6e069e388,2024-12-11T16:15:14.150000
|
||||||
CVE-2024-5348,0,0,0c3454114961657672c2409af3f9f2f3bb9995c6579ea15f7d29552347b906f3,2024-11-21T09:47:28.240000
|
CVE-2024-5348,0,0,0c3454114961657672c2409af3f9f2f3bb9995c6579ea15f7d29552347b906f3,2024-11-21T09:47:28.240000
|
||||||
@ -268899,7 +268899,7 @@ CVE-2024-53480,0,0,4889d0ff1fe4dddc3829b2478649a6155b88e7256aa2574b5a87fc73b9645
|
|||||||
CVE-2024-53481,0,0,8c2a844186665814baa9349f5f9eb75c05702deacf50797c7fa1db6e74c909d8,2024-12-10T21:15:20.003000
|
CVE-2024-53481,0,0,8c2a844186665814baa9349f5f9eb75c05702deacf50797c7fa1db6e74c909d8,2024-12-10T21:15:20.003000
|
||||||
CVE-2024-53484,0,0,0fc6633eb0bb323c7c1b56ffa21d5cd5b78570e350e583a38942d8a30f904a22,2024-12-03T16:15:23.980000
|
CVE-2024-53484,0,0,0fc6633eb0bb323c7c1b56ffa21d5cd5b78570e350e583a38942d8a30f904a22,2024-12-03T16:15:23.980000
|
||||||
CVE-2024-5349,0,0,75911b9a04c41ba625bf561a6fda73d6a6249d16eb1736f313b0d58e1202f17d,2024-11-21T09:47:28.357000
|
CVE-2024-5349,0,0,75911b9a04c41ba625bf561a6fda73d6a6249d16eb1736f313b0d58e1202f17d,2024-11-21T09:47:28.357000
|
||||||
CVE-2024-53490,0,1,229997de596954b948d854ed350eb8461ad79b06939654658f3b483b570ec130,2024-12-11T17:15:19.903000
|
CVE-2024-53490,0,0,229997de596954b948d854ed350eb8461ad79b06939654658f3b483b570ec130,2024-12-11T17:15:19.903000
|
||||||
CVE-2024-5350,0,0,fec46d89c176e2bfb23d981380f75d90db8604244c5286366b69fb5e4abda736,2024-11-21T09:47:28.477000
|
CVE-2024-5350,0,0,fec46d89c176e2bfb23d981380f75d90db8604244c5286366b69fb5e4abda736,2024-11-21T09:47:28.477000
|
||||||
CVE-2024-53502,0,0,0e2e0713a58a3a2542be28fd04d5259e06c0e70087d279c3cfb7ab6a491df2e3,2024-12-04T18:15:15.623000
|
CVE-2024-53502,0,0,0e2e0713a58a3a2542be28fd04d5259e06c0e70087d279c3cfb7ab6a491df2e3,2024-12-04T18:15:15.623000
|
||||||
CVE-2024-53504,0,0,0cf1059548643389b1e33bad68f218b18235298c923b702dcc5a0c676fd86048,2024-12-02T17:15:13.047000
|
CVE-2024-53504,0,0,0cf1059548643389b1e33bad68f218b18235298c923b702dcc5a0c676fd86048,2024-12-02T17:15:13.047000
|
||||||
@ -268908,7 +268908,7 @@ CVE-2024-53506,0,0,9dfa3208f902ab3513f3502d8928ce98e8eedec2f27ad06842644780d149d
|
|||||||
CVE-2024-53507,0,0,12d141a23906013906618b23cee234cf31c91fd8e1e8d9da3760596286952af5,2024-12-02T17:15:13.707000
|
CVE-2024-53507,0,0,12d141a23906013906618b23cee234cf31c91fd8e1e8d9da3760596286952af5,2024-12-02T17:15:13.707000
|
||||||
CVE-2024-5351,0,0,a2df3cc9be27d64a2cd3dc5a2f1d5f6a44f6e98794670e6c0c19928c9af58ef2,2024-11-21T09:47:28.610000
|
CVE-2024-5351,0,0,a2df3cc9be27d64a2cd3dc5a2f1d5f6a44f6e98794670e6c0c19928c9af58ef2,2024-11-21T09:47:28.610000
|
||||||
CVE-2024-5352,0,0,afede3a744404a4b63e0d831a5ec0e86e744b459100c94c26c1030a6d60025a6,2024-11-21T09:47:28.743000
|
CVE-2024-5352,0,0,afede3a744404a4b63e0d831a5ec0e86e744b459100c94c26c1030a6d60025a6,2024-11-21T09:47:28.743000
|
||||||
CVE-2024-53523,0,1,62264463ec7bd597c8cd954da8d0baf08b58aa4c7ac24397d44469055812e6bd,2024-12-11T17:15:20.073000
|
CVE-2024-53523,0,0,62264463ec7bd597c8cd954da8d0baf08b58aa4c7ac24397d44469055812e6bd,2024-12-11T17:15:20.073000
|
||||||
CVE-2024-5353,0,0,797e03a5615e2bede928ac816012d8783c471de5bd74a0480881887afd7a657a,2024-11-21T09:47:28.863000
|
CVE-2024-5353,0,0,797e03a5615e2bede928ac816012d8783c471de5bd74a0480881887afd7a657a,2024-11-21T09:47:28.863000
|
||||||
CVE-2024-5354,0,0,e179ff0fdd33289a32ca4c68c73a51c0aa8ddee9c94944cd1d4fd7185f36a76c,2024-11-21T09:47:28.997000
|
CVE-2024-5354,0,0,e179ff0fdd33289a32ca4c68c73a51c0aa8ddee9c94944cd1d4fd7185f36a76c,2024-11-21T09:47:28.997000
|
||||||
CVE-2024-5355,0,0,5ae56d862872a5268a44df2d0e26a54aa307acbf5ff2835727472c989e377b6d,2024-11-21T09:47:29.130000
|
CVE-2024-5355,0,0,5ae56d862872a5268a44df2d0e26a54aa307acbf5ff2835727472c989e377b6d,2024-11-21T09:47:29.130000
|
||||||
@ -268921,7 +268921,7 @@ CVE-2024-53564,0,0,bf61935418f5f92f32cd62964e032ec47360caecda9e24bdf2d4ee2ea5631
|
|||||||
CVE-2024-53566,0,0,fc369a1b56664965996271c6928e1c8e2a064ca2d4eb527d8b2effd8b48ca032,2024-12-02T18:15:11.500000
|
CVE-2024-53566,0,0,fc369a1b56664965996271c6928e1c8e2a064ca2d4eb527d8b2effd8b48ca032,2024-12-02T18:15:11.500000
|
||||||
CVE-2024-5357,0,0,9057606a4938c9bbcd6685626eec47e410331b31cc1665fb8c9e75b9a990e3a5,2024-11-21T09:47:29.400000
|
CVE-2024-5357,0,0,9057606a4938c9bbcd6685626eec47e410331b31cc1665fb8c9e75b9a990e3a5,2024-11-21T09:47:29.400000
|
||||||
CVE-2024-5358,0,0,ba9d3d6f584bd09e4f2a4dbb07d0235a0771fbffd077ecd2b7b801a3c6466c2b,2024-11-21T09:47:29.543000
|
CVE-2024-5358,0,0,ba9d3d6f584bd09e4f2a4dbb07d0235a0771fbffd077ecd2b7b801a3c6466c2b,2024-11-21T09:47:29.543000
|
||||||
CVE-2024-53589,0,1,728322b8c5b51205676d46003289ad227ccda2e910c9140fa8921fafd791e832,2024-12-11T17:15:20.233000
|
CVE-2024-53589,0,0,728322b8c5b51205676d46003289ad227ccda2e910c9140fa8921fafd791e832,2024-12-11T17:15:20.233000
|
||||||
CVE-2024-5359,0,0,a1926c7cffc0ddd7cf732ce221c5b773e4f3ba3b6110f8717338c32417e29d1e,2024-11-21T09:47:29.680000
|
CVE-2024-5359,0,0,a1926c7cffc0ddd7cf732ce221c5b773e4f3ba3b6110f8717338c32417e29d1e,2024-11-21T09:47:29.680000
|
||||||
CVE-2024-53597,0,0,438026e14ae09726543276b1bb70c22feed1a3a736c09b864ce876954f4f80b7,2024-11-27T21:15:08.170000
|
CVE-2024-53597,0,0,438026e14ae09726543276b1bb70c22feed1a3a736c09b864ce876954f4f80b7,2024-11-27T21:15:08.170000
|
||||||
CVE-2024-53599,0,0,4e154161154da95241d6e7cee4b06be89db1c3cd7ac717fcb16e70a39031c607,2024-11-25T21:15:21.993000
|
CVE-2024-53599,0,0,4e154161154da95241d6e7cee4b06be89db1c3cd7ac717fcb16e70a39031c607,2024-11-25T21:15:21.993000
|
||||||
@ -269339,7 +269339,7 @@ CVE-2024-5471,0,0,631b7a50303d6f9a193814092037f29379ca6ca2282e0b67207306f8abcc9b
|
|||||||
CVE-2024-5472,0,0,5e12957cd076edb077638ab18db3a7202837e8fd64948bba00e3365a85b54117,2024-11-21T09:47:45.027000
|
CVE-2024-5472,0,0,5e12957cd076edb077638ab18db3a7202837e8fd64948bba00e3365a85b54117,2024-11-21T09:47:45.027000
|
||||||
CVE-2024-5473,0,0,fdd6160c6121db618882f16bfc9c17f8c3a2501715cb9519638ef5a1fcd2441d,2024-11-21T09:47:45.190000
|
CVE-2024-5473,0,0,fdd6160c6121db618882f16bfc9c17f8c3a2501715cb9519638ef5a1fcd2441d,2024-11-21T09:47:45.190000
|
||||||
CVE-2024-5474,0,0,63893131768de13d83eb37c8075bce21b1c0f49d4d852fdf9f27e69aab8b3e48,2024-11-15T17:00:35.697000
|
CVE-2024-5474,0,0,63893131768de13d83eb37c8075bce21b1c0f49d4d852fdf9f27e69aab8b3e48,2024-11-15T17:00:35.697000
|
||||||
CVE-2024-54745,0,1,fa6c31d7a2d0035c561f7b97850c2a530b0e2e38d0e9249ae4c46e230cdcbc34,2024-12-11T17:15:20.460000
|
CVE-2024-54745,0,0,fa6c31d7a2d0035c561f7b97850c2a530b0e2e38d0e9249ae4c46e230cdcbc34,2024-12-11T17:15:20.460000
|
||||||
CVE-2024-54747,0,0,9f0fca61fa6eccf9336f8eaa6d72537b4bbb8d5e3fd08e6c628143c0e6117234,2024-12-09T15:15:21.320000
|
CVE-2024-54747,0,0,9f0fca61fa6eccf9336f8eaa6d72537b4bbb8d5e3fd08e6c628143c0e6117234,2024-12-09T15:15:21.320000
|
||||||
CVE-2024-54749,0,0,9843b013f360d8fb3ff95bfdcdfc0bf5c3f632d1d8b1b0bbd6fc777fe9950e5c,2024-12-07T23:15:34.810000
|
CVE-2024-54749,0,0,9843b013f360d8fb3ff95bfdcdfc0bf5c3f632d1d8b1b0bbd6fc777fe9950e5c,2024-12-07T23:15:34.810000
|
||||||
CVE-2024-5475,0,0,3f93fbbe9009c236ea2c6da72827f7bd871ace2e1ffd3b439453d8900914ef7f,2024-11-21T09:47:45.480000
|
CVE-2024-5475,0,0,3f93fbbe9009c236ea2c6da72827f7bd871ace2e1ffd3b439453d8900914ef7f,2024-11-21T09:47:45.480000
|
||||||
@ -269364,23 +269364,23 @@ CVE-2024-54919,0,0,d240fd7b13ed8b141b8975d3eb4f4e201c9093f582cb0ecbb49a96c5b085f
|
|||||||
CVE-2024-5492,0,0,bef41c141414e91a737f6b5c4fcaf83f2ee31e6e95a9e2405d6f4dc30a93092c,2024-11-21T09:47:47.140000
|
CVE-2024-5492,0,0,bef41c141414e91a737f6b5c4fcaf83f2ee31e6e95a9e2405d6f4dc30a93092c,2024-11-21T09:47:47.140000
|
||||||
CVE-2024-54920,0,0,e0ff812c1f95bed20dae279ccbe6840a2a70586b27f9b541b7f43952ea8bc2db,2024-12-10T15:41:01.480000
|
CVE-2024-54920,0,0,e0ff812c1f95bed20dae279ccbe6840a2a70586b27f9b541b7f43952ea8bc2db,2024-12-10T15:41:01.480000
|
||||||
CVE-2024-54921,0,0,cca6e9946a10d822b3789a307ddfbc30063b7ccd63b68a5ee517e97237385303,2024-12-11T16:15:15.127000
|
CVE-2024-54921,0,0,cca6e9946a10d822b3789a307ddfbc30063b7ccd63b68a5ee517e97237385303,2024-12-11T16:15:15.127000
|
||||||
CVE-2024-54922,0,1,48b8537ce49f8d7bdfd5bd4310d2cbdb2cc8960cfe7fea1f1b5bd39aa46c7e11,2024-12-11T17:23:39.127000
|
CVE-2024-54922,0,0,48b8537ce49f8d7bdfd5bd4310d2cbdb2cc8960cfe7fea1f1b5bd39aa46c7e11,2024-12-11T17:23:39.127000
|
||||||
CVE-2024-54923,0,0,ac868ab770236405018c881372b6d93db70eba6cf51aa07cb1f8611df0b9555f,2024-12-11T16:15:15.347000
|
CVE-2024-54923,0,0,ac868ab770236405018c881372b6d93db70eba6cf51aa07cb1f8611df0b9555f,2024-12-11T16:15:15.347000
|
||||||
CVE-2024-54924,0,0,5516064a5c14b486a3c57b9b85448212cdef809ec6376b9e1e9b15d03f0a400c,2024-12-11T16:15:15.547000
|
CVE-2024-54924,0,0,5516064a5c14b486a3c57b9b85448212cdef809ec6376b9e1e9b15d03f0a400c,2024-12-11T16:15:15.547000
|
||||||
CVE-2024-54925,0,0,e8fc0e673f76afd453f937fee588d6565e8390b5f63d2742f455c4e6fda77f47,2024-12-09T19:15:16.350000
|
CVE-2024-54925,0,0,e8fc0e673f76afd453f937fee588d6565e8390b5f63d2742f455c4e6fda77f47,2024-12-09T19:15:16.350000
|
||||||
CVE-2024-54926,0,1,99308ee0c7bdb2555270e9769b907fdbadfdbd27447c982cce941529cd8dbe0a,2024-12-11T17:24:11.403000
|
CVE-2024-54926,0,0,99308ee0c7bdb2555270e9769b907fdbadfdbd27447c982cce941529cd8dbe0a,2024-12-11T17:24:11.403000
|
||||||
CVE-2024-54927,0,0,2a84cef7ce78de15805fc567c03cc87b494945c36668a4978419cbb3e112af6a,2024-12-11T16:15:16.360000
|
CVE-2024-54927,0,0,2a84cef7ce78de15805fc567c03cc87b494945c36668a4978419cbb3e112af6a,2024-12-11T16:15:16.360000
|
||||||
CVE-2024-54928,0,0,decaafc5537a789ca582262d234e6ec3e1eef513f3e8475e578984355258576e,2024-12-11T16:15:16.590000
|
CVE-2024-54928,0,0,decaafc5537a789ca582262d234e6ec3e1eef513f3e8475e578984355258576e,2024-12-11T16:15:16.590000
|
||||||
CVE-2024-54929,0,0,028424391bfd0e6e1a80decba8ca8422fb184a112971073f186a5d0b3e71e96b,2024-12-10T15:47:10.800000
|
CVE-2024-54929,0,0,028424391bfd0e6e1a80decba8ca8422fb184a112971073f186a5d0b3e71e96b,2024-12-10T15:47:10.800000
|
||||||
CVE-2024-5493,0,0,934df9c05abfa1e1b0f50d724dbce11e7e01bba7d9ae25f41fb3a41d6fcaa53b,2024-11-21T09:47:47.260000
|
CVE-2024-5493,0,0,934df9c05abfa1e1b0f50d724dbce11e7e01bba7d9ae25f41fb3a41d6fcaa53b,2024-11-21T09:47:47.260000
|
||||||
CVE-2024-54930,0,1,5d2ab7486a02348e877a461db69f051d1f2b70c239066680c65e8cd7493b548b,2024-12-11T17:20:32.780000
|
CVE-2024-54930,0,0,5d2ab7486a02348e877a461db69f051d1f2b70c239066680c65e8cd7493b548b,2024-12-11T17:20:32.780000
|
||||||
CVE-2024-54931,0,0,01f2c9e9859a4685fdae8fc97970e11d560ed3c224bef019f85557d4b43a3ccc,2024-12-11T16:15:16.820000
|
CVE-2024-54931,0,0,01f2c9e9859a4685fdae8fc97970e11d560ed3c224bef019f85557d4b43a3ccc,2024-12-11T16:15:16.820000
|
||||||
CVE-2024-54932,0,0,3c73c5f584e1dd4a385e064a7bcd5eb3bdeabf421d3e900fc314c73bf0c97b7e,2024-12-09T19:15:16.777000
|
CVE-2024-54932,0,0,3c73c5f584e1dd4a385e064a7bcd5eb3bdeabf421d3e900fc314c73bf0c97b7e,2024-12-09T19:15:16.777000
|
||||||
CVE-2024-54933,0,1,a5b0a2c3d4d571c5da0d1009d294d55c95453cc675e7509017c7b896391b5111,2024-12-11T17:19:32.987000
|
CVE-2024-54933,0,0,a5b0a2c3d4d571c5da0d1009d294d55c95453cc675e7509017c7b896391b5111,2024-12-11T17:19:32.987000
|
||||||
CVE-2024-54934,0,0,b305f5717c64529f287ec02c132f7990f3db15a40feac89298c6f232af77a9e1,2024-12-09T19:15:16.887000
|
CVE-2024-54934,0,0,b305f5717c64529f287ec02c132f7990f3db15a40feac89298c6f232af77a9e1,2024-12-09T19:15:16.887000
|
||||||
CVE-2024-54935,0,0,61185b20f382be4d3639bac7ef1593b440e8859a1d371e482182cb5ef4251a0a,2024-12-11T16:51:17.447000
|
CVE-2024-54935,0,0,61185b20f382be4d3639bac7ef1593b440e8859a1d371e482182cb5ef4251a0a,2024-12-11T16:51:17.447000
|
||||||
CVE-2024-54936,0,0,f21b1da20346f5f757f77e403c54bbd170034aa987896c1a2a9c5ceb1fff38da,2024-12-10T18:15:43.233000
|
CVE-2024-54936,0,0,f21b1da20346f5f757f77e403c54bbd170034aa987896c1a2a9c5ceb1fff38da,2024-12-10T18:15:43.233000
|
||||||
CVE-2024-54937,0,1,197a7c9b3b72f036ddf287711fb28635bb9463140aa1361b9ca00a7c51b672cd,2024-12-11T17:15:20.790000
|
CVE-2024-54937,0,0,197a7c9b3b72f036ddf287711fb28635bb9463140aa1361b9ca00a7c51b672cd,2024-12-11T17:15:20.790000
|
||||||
CVE-2024-54938,0,0,7b80582288c8eefa4ba94a300feee6c2fe5b23f6ec6a1a9ade37311383b889c3,2024-12-11T16:15:17.033000
|
CVE-2024-54938,0,0,7b80582288c8eefa4ba94a300feee6c2fe5b23f6ec6a1a9ade37311383b889c3,2024-12-11T16:15:17.033000
|
||||||
CVE-2024-5494,0,0,8cf1519a61ea4a6a4f006eea5f9156b6b849d9688fc3df3baf2171897301c8ac,2024-11-21T09:47:47.450000
|
CVE-2024-5494,0,0,8cf1519a61ea4a6a4f006eea5f9156b6b849d9688fc3df3baf2171897301c8ac,2024-11-21T09:47:47.450000
|
||||||
CVE-2024-5495,0,0,e8211ab29f4239a9e0c9017a1df13982e259112697e44dda84f6d2c28e9245ea,2024-11-21T09:47:48.493000
|
CVE-2024-5495,0,0,e8211ab29f4239a9e0c9017a1df13982e259112697e44dda84f6d2c28e9245ea,2024-11-21T09:47:48.493000
|
||||||
@ -269415,7 +269415,7 @@ CVE-2024-5523,0,0,0b2c43ef384781b0113b9be6f2b000f9de2199a81d337c7e51164ef3b409e6
|
|||||||
CVE-2024-5524,0,0,96c1a4bf81cf964718431dd9c92394b3c99d70800d36b6797c2485b5f853cce6,2024-11-21T09:47:52.060000
|
CVE-2024-5524,0,0,96c1a4bf81cf964718431dd9c92394b3c99d70800d36b6797c2485b5f853cce6,2024-11-21T09:47:52.060000
|
||||||
CVE-2024-5525,0,0,85c272ad425dacde32e9f0580795bbb5b12316ff774e7fabc4e97fd793674bab,2024-11-21T09:47:52.173000
|
CVE-2024-5525,0,0,85c272ad425dacde32e9f0580795bbb5b12316ff774e7fabc4e97fd793674bab,2024-11-21T09:47:52.173000
|
||||||
CVE-2024-5526,0,0,0c9c91db78cbdd3ff4ee3a189e439a311e3e6928df326db13557ea657472d9b7,2024-11-21T09:47:52.290000
|
CVE-2024-5526,0,0,0c9c91db78cbdd3ff4ee3a189e439a311e3e6928df326db13557ea657472d9b7,2024-11-21T09:47:52.290000
|
||||||
CVE-2024-55268,0,1,5f3c37cf8158a1c44928734f909dc42c1030ecc39541485d8d944019f4ad558f,2024-12-11T17:15:20.920000
|
CVE-2024-55268,0,0,5f3c37cf8158a1c44928734f909dc42c1030ecc39541485d8d944019f4ad558f,2024-12-11T17:15:20.920000
|
||||||
CVE-2024-5527,0,0,d332540fc72a82323997817d4e967456b7cfd92130ba717f37312bb67a51dc8a,2024-08-16T20:24:34.470000
|
CVE-2024-5527,0,0,d332540fc72a82323997817d4e967456b7cfd92130ba717f37312bb67a51dc8a,2024-08-16T20:24:34.470000
|
||||||
CVE-2024-5529,0,0,163a9ebbb03299028cfce2ba2a1351447eb53d5a4fc9810f5fc56b6d374bb7d9,2024-11-21T09:47:52.530000
|
CVE-2024-5529,0,0,163a9ebbb03299028cfce2ba2a1351447eb53d5a4fc9810f5fc56b6d374bb7d9,2024-11-21T09:47:52.530000
|
||||||
CVE-2024-5530,0,0,2d0b01cc83bfe8893d941d6bfdb13cbbc2a5c286addf6d9a79089f227ed325e3,2024-11-21T09:47:52.657000
|
CVE-2024-5530,0,0,2d0b01cc83bfe8893d941d6bfdb13cbbc2a5c286addf6d9a79089f227ed325e3,2024-11-21T09:47:52.657000
|
||||||
@ -269459,14 +269459,14 @@ CVE-2024-55578,0,0,20c731157c69055e7769ca27d0621e2d376edcf0d0159177c1cfedd63f521
|
|||||||
CVE-2024-55579,0,0,eb7b97c3360bce570eb740843f88f428eb8ed07ac934bdc24aaa75a35aac660f,2024-12-10T15:15:08.163000
|
CVE-2024-55579,0,0,eb7b97c3360bce570eb740843f88f428eb8ed07ac934bdc24aaa75a35aac660f,2024-12-10T15:15:08.163000
|
||||||
CVE-2024-5558,0,0,b9640ac59698561d1e2153bd708b9d8ca2d328fcb61a159842590b547b4c1a0f,2024-11-21T09:47:55.700000
|
CVE-2024-5558,0,0,b9640ac59698561d1e2153bd708b9d8ca2d328fcb61a159842590b547b4c1a0f,2024-11-21T09:47:55.700000
|
||||||
CVE-2024-55580,0,0,d0db8db8caa9064b5ccfd1ebfcb70a56a05a77720b165abb2a708efdd1b5b12c,2024-12-10T15:15:08.300000
|
CVE-2024-55580,0,0,d0db8db8caa9064b5ccfd1ebfcb70a56a05a77720b165abb2a708efdd1b5b12c,2024-12-10T15:15:08.300000
|
||||||
CVE-2024-55582,0,1,8c7e64bb3acec7a473c6e65040db0fdec814405cb32a2dc0c98b336fe36f3523,2024-12-11T17:15:21.103000
|
CVE-2024-55582,0,0,8c7e64bb3acec7a473c6e65040db0fdec814405cb32a2dc0c98b336fe36f3523,2024-12-11T17:15:21.103000
|
||||||
CVE-2024-55586,0,0,783bbc0952a9c9a1d0e90c4c1133d59847ae90b7821de6a7e7ad86d9d5d5c9cf,2024-12-11T16:15:17.473000
|
CVE-2024-55586,0,0,783bbc0952a9c9a1d0e90c4c1133d59847ae90b7821de6a7e7ad86d9d5d5c9cf,2024-12-11T16:15:17.473000
|
||||||
CVE-2024-5559,0,0,da875044adc3709281edfed6e696b593f02a48923f7270d2350dbdeb9c3f0186,2024-11-21T09:47:55.840000
|
CVE-2024-5559,0,0,da875044adc3709281edfed6e696b593f02a48923f7270d2350dbdeb9c3f0186,2024-11-21T09:47:55.840000
|
||||||
CVE-2024-5560,0,0,5aa7f1759c9eb53992bc8fa45515cc25adc477b89cd6554f8c0736d42239dd24,2024-11-21T09:47:55.983000
|
CVE-2024-5560,0,0,5aa7f1759c9eb53992bc8fa45515cc25adc477b89cd6554f8c0736d42239dd24,2024-11-21T09:47:55.983000
|
||||||
CVE-2024-55601,0,0,89175adefd85ee52b8d0660bf5cffaad0818c3ee1a9c4ccd9c1b1dad82da5932,2024-12-09T22:15:23.100000
|
CVE-2024-55601,0,0,89175adefd85ee52b8d0660bf5cffaad0818c3ee1a9c4ccd9c1b1dad82da5932,2024-12-09T22:15:23.100000
|
||||||
CVE-2024-55602,0,0,50669de054a1828aef63b70e8d626e9a1c733113b3df3c2b5b9e9ba1699877b0,2024-12-10T18:15:43.500000
|
CVE-2024-55602,0,0,50669de054a1828aef63b70e8d626e9a1c733113b3df3c2b5b9e9ba1699877b0,2024-12-10T18:15:43.500000
|
||||||
CVE-2024-5561,0,0,4022800ab031c19c97b7a8f23f8f937de2c70091af69e68157c4f9d46ea4b02c,2024-10-07T17:45:29.950000
|
CVE-2024-5561,0,0,4022800ab031c19c97b7a8f23f8f937de2c70091af69e68157c4f9d46ea4b02c,2024-10-07T17:45:29.950000
|
||||||
CVE-2024-55634,0,1,f06197616165c09ccf146814619fe9a554d67043067bfc6a77975366f0ae3d63,2024-12-11T17:15:21.243000
|
CVE-2024-55634,0,0,f06197616165c09ccf146814619fe9a554d67043067bfc6a77975366f0ae3d63,2024-12-11T17:15:21.243000
|
||||||
CVE-2024-55635,0,0,02aeec60dc680ba5e64ba21b7921f79d14588994f0456ea0982ac81c3eef7905,2024-12-10T22:15:28.190000
|
CVE-2024-55635,0,0,02aeec60dc680ba5e64ba21b7921f79d14588994f0456ea0982ac81c3eef7905,2024-12-10T22:15:28.190000
|
||||||
CVE-2024-55636,0,0,b733e66d088dc80ea0d2f7272ec2b8b2908f8b8b999bac93067067b2ba1c576a,2024-12-10T22:15:28.347000
|
CVE-2024-55636,0,0,b733e66d088dc80ea0d2f7272ec2b8b2908f8b8b999bac93067067b2ba1c576a,2024-12-10T22:15:28.347000
|
||||||
CVE-2024-55637,0,0,b339d1b46d013911874bbdadbc242ce2cec2e62c40f0c0b5fcadabacc3a18ead,2024-12-10T22:15:28.500000
|
CVE-2024-55637,0,0,b339d1b46d013911874bbdadbc242ce2cec2e62c40f0c0b5fcadabacc3a18ead,2024-12-10T22:15:28.500000
|
||||||
@ -272005,7 +272005,7 @@ CVE-2024-8486,0,0,72c8d12fbda6079a657a7f7d5227b28970fafaa525b2f5c74dce370135cee4
|
|||||||
CVE-2024-8488,0,0,3018a5659d434cc801dc5e3e8a6e3f6b1d0cf4538dce2991c2254ff7a5f65d98,2024-10-10T12:56:30.817000
|
CVE-2024-8488,0,0,3018a5659d434cc801dc5e3e8a6e3f6b1d0cf4538dce2991c2254ff7a5f65d98,2024-10-10T12:56:30.817000
|
||||||
CVE-2024-8490,0,0,499133fb8cac62e8ddf510bc10d868ba622eda60dd0c0c95b0569695428a6f38,2024-09-27T18:36:00.053000
|
CVE-2024-8490,0,0,499133fb8cac62e8ddf510bc10d868ba622eda60dd0c0c95b0569695428a6f38,2024-09-27T18:36:00.053000
|
||||||
CVE-2024-8495,0,0,b098ed51540ac09b3707525a74befdef00850cf1d733e87cff25ff8bfdf78c16,2024-11-13T17:01:58.603000
|
CVE-2024-8495,0,0,b098ed51540ac09b3707525a74befdef00850cf1d733e87cff25ff8bfdf78c16,2024-11-13T17:01:58.603000
|
||||||
CVE-2024-8496,1,1,43c3c4e89082981b88f6389373c305f6fc1a0db59dcef1f592effe345994f670,2024-12-11T17:15:21.390000
|
CVE-2024-8496,0,0,43c3c4e89082981b88f6389373c305f6fc1a0db59dcef1f592effe345994f670,2024-12-11T17:15:21.390000
|
||||||
CVE-2024-8497,0,0,964dec8be2200cdf9d07127057f8b6f303d0e240ee7e6f76cdfe9a2fce62258d,2024-09-26T13:32:02.803000
|
CVE-2024-8497,0,0,964dec8be2200cdf9d07127057f8b6f303d0e240ee7e6f76cdfe9a2fce62258d,2024-09-26T13:32:02.803000
|
||||||
CVE-2024-8499,0,0,2edefd90741d92198f57d70f6a88792184be7286118419ab2da73ea4b4333266,2024-11-08T21:01:13.457000
|
CVE-2024-8499,0,0,2edefd90741d92198f57d70f6a88792184be7286118419ab2da73ea4b4333266,2024-11-08T21:01:13.457000
|
||||||
CVE-2024-8500,0,0,91c32699d0d1f94f5e8769427f74d1ebb681dc4927ff43bb2bd1d27e37609a43,2024-10-25T16:43:24.040000
|
CVE-2024-8500,0,0,91c32699d0d1f94f5e8769427f74d1ebb681dc4927ff43bb2bd1d27e37609a43,2024-10-25T16:43:24.040000
|
||||||
@ -273056,7 +273056,7 @@ CVE-2024-9841,0,0,c53d88eafada925ed527f104c1b1b1199a9f5255a50ee9eb8941cdbc1ee0bb
|
|||||||
CVE-2024-9842,0,0,401514bda8111953e3c87d696ebe17147d50fe0193b7bd342e8f5a2f91a2c84d,2024-11-13T17:01:58.603000
|
CVE-2024-9842,0,0,401514bda8111953e3c87d696ebe17147d50fe0193b7bd342e8f5a2f91a2c84d,2024-11-13T17:01:58.603000
|
||||||
CVE-2024-9843,0,0,87995b35b7ca864fee74129f3dfad5bf38de372e00678c6a2a361bfe2c95d461,2024-11-13T17:01:58.603000
|
CVE-2024-9843,0,0,87995b35b7ca864fee74129f3dfad5bf38de372e00678c6a2a361bfe2c95d461,2024-11-13T17:01:58.603000
|
||||||
CVE-2024-9844,0,0,9f5accdc865e1585713af7fca166a37605dcc88fd3d83360b135a809845dc0ad,2024-12-10T19:15:31.607000
|
CVE-2024-9844,0,0,9f5accdc865e1585713af7fca166a37605dcc88fd3d83360b135a809845dc0ad,2024-12-10T19:15:31.607000
|
||||||
CVE-2024-9845,1,1,5977e985f2e6cae90bb62036ed64a71cad264972594fcc21d1dd7c8df9cf9ed2,2024-12-11T17:15:21.550000
|
CVE-2024-9845,0,0,5977e985f2e6cae90bb62036ed64a71cad264972594fcc21d1dd7c8df9cf9ed2,2024-12-11T17:15:21.550000
|
||||||
CVE-2024-9846,0,0,5a29335b18c23f96eafa12a0012dbfa40c39c1cc47deb5473e372f76f16fe2df,2024-11-06T14:58:04.160000
|
CVE-2024-9846,0,0,5a29335b18c23f96eafa12a0012dbfa40c39c1cc47deb5473e372f76f16fe2df,2024-11-06T14:58:04.160000
|
||||||
CVE-2024-9848,0,0,148772454ae4a112a7436067b81ee2ac8c78d3a83ad8a189df162c230ac91d15,2024-10-22T16:42:25.867000
|
CVE-2024-9848,0,0,148772454ae4a112a7436067b81ee2ac8c78d3a83ad8a189df162c230ac91d15,2024-10-22T16:42:25.867000
|
||||||
CVE-2024-9849,0,0,c9c7b4f6b31937a5425e02b6f2d865ca15961d24fdb3efd7477da376d32caee1,2024-11-18T17:11:17.393000
|
CVE-2024-9849,0,0,c9c7b4f6b31937a5425e02b6f2d865ca15961d24fdb3efd7477da376d32caee1,2024-11-18T17:11:17.393000
|
||||||
@ -273170,7 +273170,7 @@ CVE-2024-9974,0,0,3f49a2c843fe917e0fcf61d308882a6fddfdc0afcbbd417f658612e3626ee4
|
|||||||
CVE-2024-9975,0,0,48ce0b7d64766a64962284a24021cd68fa50fccdc81e0f64339f10ea9b77932b,2024-10-16T13:44:46.220000
|
CVE-2024-9975,0,0,48ce0b7d64766a64962284a24021cd68fa50fccdc81e0f64339f10ea9b77932b,2024-10-16T13:44:46.220000
|
||||||
CVE-2024-9976,0,0,ce443c863950aa154fd371cff2f7ac11c082244ac2a34befb488b4ef0d30b008,2024-10-16T13:42:24.153000
|
CVE-2024-9976,0,0,ce443c863950aa154fd371cff2f7ac11c082244ac2a34befb488b4ef0d30b008,2024-10-16T13:42:24.153000
|
||||||
CVE-2024-9977,0,0,d67650a26539e46f37aba7944dd5e18b16a81cccdedaccfc632f97f544b2d279,2024-10-16T16:38:43.170000
|
CVE-2024-9977,0,0,d67650a26539e46f37aba7944dd5e18b16a81cccdedaccfc632f97f544b2d279,2024-10-16T16:38:43.170000
|
||||||
CVE-2024-9978,0,1,6cdd8c416016acd07dbd7c0a72b0c71563527a1c4465c0cf0cbd7b98185b100a,2024-12-11T17:20:04.517000
|
CVE-2024-9978,0,0,6cdd8c416016acd07dbd7c0a72b0c71563527a1c4465c0cf0cbd7b98185b100a,2024-12-11T17:20:04.517000
|
||||||
CVE-2024-9979,0,0,e9ae23ea9939bd8ddc2e19138dbc3858385557ec08a4f886a2b1157cfd831b59,2024-10-16T16:38:43.170000
|
CVE-2024-9979,0,0,e9ae23ea9939bd8ddc2e19138dbc3858385557ec08a4f886a2b1157cfd831b59,2024-10-16T16:38:43.170000
|
||||||
CVE-2024-9980,0,0,002b64167000ae9726f97e042c58f5a18a9a1759a0385805fad52117c96362ce,2024-10-17T18:03:34.807000
|
CVE-2024-9980,0,0,002b64167000ae9726f97e042c58f5a18a9a1759a0385805fad52117c96362ce,2024-10-17T18:03:34.807000
|
||||||
CVE-2024-9981,0,0,d72207054fbbef980956ef1f3b04f0c696d0d42c6100221c166368feab9d03ae,2024-10-17T18:05:29.947000
|
CVE-2024-9981,0,0,d72207054fbbef980956ef1f3b04f0c696d0d42c6100221c166368feab9d03ae,2024-10-17T18:05:29.947000
|
||||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user