mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-08 19:47:09 +00:00
Auto-Update: 2024-11-15T19:00:20.352944+00:00
This commit is contained in:
parent
27d154bb2b
commit
5136f40281
88
CVE-2021/CVE-2021-14xx/CVE-2021-1464.json
Normal file
88
CVE-2021/CVE-2021-14xx/CVE-2021-1464.json
Normal file
@ -0,0 +1,88 @@
|
||||
{
|
||||
"id": "CVE-2021-1464",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-11-15T17:15:07.350",
|
||||
"lastModified": "2024-11-15T17:15:07.350",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to bypass authorization checking and gain restricted access to the configuration information of an affected system.\r\nThis vulnerability exists because the affected software has insufficient input validation for certain commands. An attacker could exploit this vulnerability by sending crafted requests to the affected commands of an affected system. A successful exploit could allow the attacker to bypass authorization checking and gain restricted access to the configuration data of the affected system.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.0,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdw-sqlinj-HDJUeEAX",
|
||||
"source": "ykramarz@cisco.com"
|
||||
},
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-vdaemon-bo-RuzzEA2",
|
||||
"source": "ykramarz@cisco.com"
|
||||
},
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vman-auth-bypass-Z3Zze5XC",
|
||||
"source": "ykramarz@cisco.com"
|
||||
},
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vman-authorization-b-GUEpSLK",
|
||||
"source": "ykramarz@cisco.com"
|
||||
},
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vman-cmdinj-nRHKgfHX",
|
||||
"source": "ykramarz@cisco.com"
|
||||
},
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vman-dir-trav-Bpwc5gtm",
|
||||
"source": "ykramarz@cisco.com"
|
||||
},
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vman-xml-ext-entity-q6Z7uVUg",
|
||||
"source": "ykramarz@cisco.com"
|
||||
},
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanage-cql-inject-c7z9QqyB",
|
||||
"source": "ykramarz@cisco.com"
|
||||
},
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanage-info-disclos-gGvm9Mfu",
|
||||
"source": "ykramarz@cisco.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2021/CVE-2021-14xx/CVE-2021-1466.json
Normal file
56
CVE-2021/CVE-2021-14xx/CVE-2021-1466.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2021-1466",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-11-15T17:15:07.670",
|
||||
"lastModified": "2024-11-15T17:15:07.670",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the vDaemon service of Cisco SD-WAN vManage Software could allow an authenticated, local attacker to cause a buffer overflow on an affected system, resulting in a denial of service (DoS) condition.\r\nThe vulnerability is due to incomplete bounds checks for data that is provided to the vDaemon service of an affected system. An attacker could exploit this vulnerability by sending malicious data to the vDaemon listening service on the affected system. A successful exploit could allow the attacker to cause a buffer overflow condition on the affected system, which could allow the attacker to cause the vDaemon listening service to reload and result in a DoS condition.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-vdaemon-bo-RuzzEA2",
|
||||
"source": "ykramarz@cisco.com"
|
||||
}
|
||||
]
|
||||
}
|
74
CVE-2021/CVE-2021-14xx/CVE-2021-1470.json
Normal file
74
CVE-2021/CVE-2021-14xx/CVE-2021-1470.json
Normal file
@ -0,0 +1,74 @@
|
||||
{
|
||||
"id": "CVE-2021-1470",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-11-15T17:15:07.977",
|
||||
"lastModified": "2024-11-15T17:35:11.340",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the web-based management interface of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to conduct SQL injection attacks on an affected system.\r\nThis vulnerability is due to improper input validation of SQL queries to an affected system. An attacker could exploit this vulnerability by authenticating to the application and sending malicious SQL queries to an affected system. A successful exploit could allow the attacker to modify values on or return values from the vManage database or the underlying operating system.Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdw-sqlinj-HDJUeEAX",
|
||||
"source": "ykramarz@cisco.com"
|
||||
},
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vman-auth-bypass-Z3Zze5XC",
|
||||
"source": "ykramarz@cisco.com"
|
||||
},
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanage-cql-inject-c7z9QqyB",
|
||||
"source": "ykramarz@cisco.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2021/CVE-2021-14xx/CVE-2021-1481.json
Normal file
60
CVE-2021/CVE-2021-14xx/CVE-2021-1481.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2021-1481",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-11-15T17:15:08.277",
|
||||
"lastModified": "2024-11-15T17:15:08.277",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the web-based management interface of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to conduct Cypher query language injection attacks on an affected system.\r\nThis vulnerability is due to insufficient input validation by the web-based management interface. An attacker could exploit this vulnerability by sending crafted HTTP requests to the interface of an affected system. A successful exploit could allow the attacker to obtain sensitive information.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-943"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vman-auth-bypass-Z3Zze5XC",
|
||||
"source": "ykramarz@cisco.com"
|
||||
},
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanage-cql-inject-c7z9QqyB",
|
||||
"source": "ykramarz@cisco.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2021/CVE-2021-14xx/CVE-2021-1482.json
Normal file
56
CVE-2021/CVE-2021-14xx/CVE-2021-1482.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2021-1482",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-11-15T17:15:08.530",
|
||||
"lastModified": "2024-11-15T17:15:08.530",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the web-based management interface of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to bypass authorization checking and gain access to sensitive information on an affected system.\r\nThis vulnerability is due to insufficient authorization checks. An attacker could exploit this vulnerability by sending crafted HTTP requests to the web-based management interface of an affected system. A successful exploit could allow the attacker to bypass authorization checking and gain access to sensitive information on the affected system.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vman-auth-bypass-Z3Zze5XC",
|
||||
"source": "ykramarz@cisco.com"
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2021/CVE-2021-14xx/CVE-2021-1483.json
Normal file
64
CVE-2021/CVE-2021-14xx/CVE-2021-1483.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2021-1483",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-11-15T17:15:08.760",
|
||||
"lastModified": "2024-11-15T17:15:08.760",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the web UI of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to gain read and write access to information that is stored on an affected system.\r\nThis vulnerability is due to improper handling of XML External Entity (XXE) entries when the affected software parses certain XML files. An attacker could exploit this vulnerability by persuading a user to import a crafted XML file with malicious entries. A successful exploit could allow the attacker to read and write files within the affected application.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-611"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vman-cmdinj-nRHKgfHX",
|
||||
"source": "ykramarz@cisco.com"
|
||||
},
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vman-xml-ext-entity-q6Z7uVUg",
|
||||
"source": "ykramarz@cisco.com"
|
||||
},
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanage-info-disclos-gGvm9Mfu",
|
||||
"source": "ykramarz@cisco.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2021/CVE-2021-14xx/CVE-2021-1484.json
Normal file
60
CVE-2021/CVE-2021-14xx/CVE-2021-1484.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2021-1484",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-11-15T17:15:08.983",
|
||||
"lastModified": "2024-11-15T17:15:08.983",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the web UI of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to inject arbitrary commands on an affected system and cause a denial of service (DoS) condition.\r\nThis vulnerability is due to improper input validation of user-supplied input to the device template configuration. An attacker could exploit this vulnerability by submitting crafted input to the device template configuration. A successful exploit could allow the attacker to cause a DoS condition on the affected system.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-88"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vman-cmdinj-nRHKgfHX",
|
||||
"source": "ykramarz@cisco.com"
|
||||
},
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanage-info-disclos-gGvm9Mfu",
|
||||
"source": "ykramarz@cisco.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2021/CVE-2021-14xx/CVE-2021-1491.json
Normal file
56
CVE-2021/CVE-2021-14xx/CVE-2021-1491.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2021-1491",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-11-15T17:15:09.220",
|
||||
"lastModified": "2024-11-15T17:15:09.220",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the web-based management interface of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to read arbitrary files on the underlying file system of the device.\r\nThis vulnerability is due to insufficient file scope limiting. An attacker could exploit this vulnerability by creating a specific file reference on the file system and then accessing it through the web-based management interface. A successful exploit could allow the attacker to read arbitrary files from the file system of the underlying operating system.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-59"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanage-info-disclos-gGvm9Mfu",
|
||||
"source": "ykramarz@cisco.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2021/CVE-2021-14xx/CVE-2021-1494.json
Normal file
56
CVE-2021/CVE-2021-14xx/CVE-2021-1494.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2021-1494",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-11-15T17:15:09.423",
|
||||
"lastModified": "2024-11-15T17:15:09.423",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Multiple Cisco products are affected by a vulnerability in the Snort detection engine that could allow an unauthenticated, remote attacker to bypass a configured file policy for HTTP.\r\n The vulnerability is due to incorrect handling of specific HTTP header parameters. An attacker could exploit this vulnerability by sending crafted HTTP packets through an affected device. A successful exploit could allow the attacker to bypass a configured file policy for HTTP packets and deliver a malicious payload."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-693"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-http-fp-bp-KfDdcQhc",
|
||||
"source": "ykramarz@cisco.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-29038",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-20T22:15:08.010",
|
||||
"lastModified": "2024-02-22T19:07:37.840",
|
||||
"lastModified": "2024-11-15T18:35:29.580",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Liferay Portal 7.2.0 a 7.3.5 y versiones anteriores no compatibles, y Liferay DXP 7.3 anterior al fix pack 1, 7.2 anterior al fix pack 17 y versiones anteriores no compatibles no ofuscan las respuestas de recordatorio de contrase\u00f1a en la p\u00e1gina, lo que permite a los atacantes utilizar ataques de man-in-the-middle para robar las respuestas de recordatorio de contrase\u00f1a del usuario."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-640"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2021-29038",
|
||||
|
56
CVE-2021/CVE-2021-347xx/CVE-2021-34750.json
Normal file
56
CVE-2021/CVE-2021-347xx/CVE-2021-34750.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2021-34750",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-11-15T17:15:09.657",
|
||||
"lastModified": "2024-11-15T17:15:09.657",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the administrative web-based GUI configuration manager of Cisco Firepower Management Center Software could allow an authenticated, remote attacker to access sensitive configuration information. The attacker would require low privilege credentials on an affected device.\r\nThis vulnerability is due to lack of proper encryption of sensitive information stored within the GUI configuration manager. An attacker could exploit this vulnerability by logging into the FMC GUI and navigating to certain sensitive configurations. A successful exploit could allow the attacker to view sensitive configuration parameters in clear text.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.[[Publication_URL{Layout()}]]This advisory is part of the October 2021 release of the Cisco ASA, FTD, and FMC Security Advisory Bundled publication. For a complete list of the advisories and links to them, see ."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-317"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-infodisc-Ft2WVmNU",
|
||||
"source": "ykramarz@cisco.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2021/CVE-2021-347xx/CVE-2021-34751.json
Normal file
56
CVE-2021/CVE-2021-347xx/CVE-2021-34751.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2021-34751",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-11-15T17:15:09.883",
|
||||
"lastModified": "2024-11-15T17:15:09.883",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the administrative web-based GUI configuration manager of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to access sensitive configuration information. The attacker would require low privilege credentials on an affected device.\r\nThis vulnerability exists because of improper encryption of sensitive information stored within the GUI configuration manager. An attacker could exploit this vulnerability by logging into the GUI of Cisco FMC Software and navigating to certain sensitive configurations. A successful exploit could allow the attacker to view sensitive configuration parameters in clear text.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.[[Publication_URL{Layout()}]]This advisory is part of the October 2021 release of the Cisco ASA, FTD, and FMC Security Advisory Bundled publication. For a complete list of the advisories and links to them, see . "
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-317"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-infodisc-Ft2WVmNU",
|
||||
"source": "ykramarz@cisco.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2021/CVE-2021-347xx/CVE-2021-34752.json
Normal file
56
CVE-2021/CVE-2021-347xx/CVE-2021-34752.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2021-34752",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-11-15T17:15:10.097",
|
||||
"lastModified": "2024-11-15T17:15:10.097",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the CLI of Cisco FTD Software could allow an authenticated, local attacker with administrative privileges to execute arbitrary commands with root privileges on the underlying operating system of an affected device. \r\n\r\nThis vulnerability is due to insufficient validation of user-supplied command arguments. An attacker could exploit this vulnerability by submitting crafted input to the affected commands. A successful exploit could allow the attacker to execute commands with root privileges on the underlying operating system.\r\nCisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-cmdinject-FmzsLN8",
|
||||
"source": "ykramarz@cisco.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2021/CVE-2021-347xx/CVE-2021-34753.json
Normal file
56
CVE-2021/CVE-2021-347xx/CVE-2021-34753.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2021-34753",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-11-15T17:15:10.303",
|
||||
"lastModified": "2024-11-15T17:15:10.303",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the payload inspection for Ethernet Industrial Protocol (ENIP) traffic for Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass configured rules for ENIP traffic.\r\n\r\nThis vulnerability is due to incomplete processing during deep packet inspection for ENIP packets. An attacker could exploit this vulnerability by sending a crafted ENIP packet to the targeted interface. A successful exploit could allow the attacker to bypass configured access control and intrusion policies that should trigger and drop for the ENIP packet."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-enip-bypass-eFsxd8KP",
|
||||
"source": "ykramarz@cisco.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2022/CVE-2022-206xx/CVE-2022-20632.json
Normal file
56
CVE-2022/CVE-2022-206xx/CVE-2022-20632.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2022-20632",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-11-15T17:15:10.583",
|
||||
"lastModified": "2024-11-15T17:15:10.583",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the web-based management interface of Cisco ECE could allow an unauthenticated, remote attacker to conduct an XSS attack against a user of the interface of an affected device.\r\nThe vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or allow the attacker to access sensitive browser-based information.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ece-multivulns-kbK2yVhR",
|
||||
"source": "ykramarz@cisco.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2022/CVE-2022-206xx/CVE-2022-20633.json
Normal file
56
CVE-2022/CVE-2022-206xx/CVE-2022-20633.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2022-20633",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-11-15T17:15:10.820",
|
||||
"lastModified": "2024-11-15T17:15:10.820",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the web-based management interface of Cisco ECE could allow an unauthenticated, remote attacker to perform a username enumeration attack against an affected device.\r\n\r\nThis vulnerability is due to differences in authentication responses that are sent back from the application as part of an authentication attempt. An attacker could exploit this vulnerability by sending authentication requests to an affected device. A successful exploit could allow the attacker to confirm existing user accounts, which could be used in further attacks.\r\nCisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-204"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ece-multivulns-kbK2yVhR",
|
||||
"source": "ykramarz@cisco.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-20846",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-11-15T16:15:23.120",
|
||||
"lastModified": "2024-11-15T16:15:23.120",
|
||||
"lastModified": "2024-11-15T17:15:11.147",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-0407",
|
||||
"sourceIdentifier": "hp-security-alert@hp.com",
|
||||
"published": "2024-02-21T01:15:07.753",
|
||||
"lastModified": "2024-02-22T19:07:37.840",
|
||||
"lastModified": "2024-11-15T18:35:31.860",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,30 @@
|
||||
"value": "Ciertas impresoras HP Enterprise LaserJet y HP LaserJet Managed son potencialmente vulnerables a la divulgaci\u00f3n de informaci\u00f3n, cuando las conexiones realizadas por el dispositivo a los servicios habilitados por algunas soluciones pueden haber sido confiables sin el certificado CA apropiado en el almac\u00e9n de certificados del dispositivo."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.hp.com/us-en/document/ish_10174094-10174120-16",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-11062",
|
||||
"sourceIdentifier": "twcert@cert.org.tw",
|
||||
"published": "2024-11-11T08:15:05.530",
|
||||
"lastModified": "2024-11-12T13:55:21.227",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-11-15T18:21:42.127",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [
|
||||
{
|
||||
"sourceIdentifier": "twcert@cert.org.tw",
|
||||
@ -24,6 +24,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "twcert@cert.org.tw",
|
||||
"type": "Secondary",
|
||||
@ -58,14 +78,49 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:dlink:dsl6740c_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "702B0914-7B3E-4797-9D28-C1C680EC6668"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:dlink:dsl6740c:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "04466F44-FDB1-4ABF-84F1-C88CC175BCB9"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.twcert.org.tw/en/cp-139-8228-1fbb0-2.html",
|
||||
"source": "twcert@cert.org.tw"
|
||||
"source": "twcert@cert.org.tw",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.twcert.org.tw/tw/cp-132-8221-601c3-1.html",
|
||||
"source": "twcert@cert.org.tw"
|
||||
"source": "twcert@cert.org.tw",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-11063",
|
||||
"sourceIdentifier": "twcert@cert.org.tw",
|
||||
"published": "2024-11-11T08:15:06.120",
|
||||
"lastModified": "2024-11-12T13:55:21.227",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-11-15T18:21:55.407",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [
|
||||
{
|
||||
"sourceIdentifier": "twcert@cert.org.tw",
|
||||
@ -58,14 +58,49 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:dlink:dsl6740c_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "702B0914-7B3E-4797-9D28-C1C680EC6668"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:dlink:dsl6740c:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "04466F44-FDB1-4ABF-84F1-C88CC175BCB9"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.twcert.org.tw/en/cp-139-8229-3c2ab-2.html",
|
||||
"source": "twcert@cert.org.tw"
|
||||
"source": "twcert@cert.org.tw",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.twcert.org.tw/tw/cp-132-8222-eb5bb-1.html",
|
||||
"source": "twcert@cert.org.tw"
|
||||
"source": "twcert@cert.org.tw",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-11064",
|
||||
"sourceIdentifier": "twcert@cert.org.tw",
|
||||
"published": "2024-11-11T08:15:06.653",
|
||||
"lastModified": "2024-11-12T13:55:21.227",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-11-15T18:22:07.027",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [
|
||||
{
|
||||
"sourceIdentifier": "twcert@cert.org.tw",
|
||||
@ -58,14 +58,49 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:dlink:dsl6740c_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "702B0914-7B3E-4797-9D28-C1C680EC6668"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:dlink:dsl6740c:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "04466F44-FDB1-4ABF-84F1-C88CC175BCB9"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.twcert.org.tw/en/cp-139-8230-11430-2.html",
|
||||
"source": "twcert@cert.org.tw"
|
||||
"source": "twcert@cert.org.tw",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.twcert.org.tw/tw/cp-132-8223-f6da0-1.html",
|
||||
"source": "twcert@cert.org.tw"
|
||||
"source": "twcert@cert.org.tw",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-11065",
|
||||
"sourceIdentifier": "twcert@cert.org.tw",
|
||||
"published": "2024-11-11T08:15:07.180",
|
||||
"lastModified": "2024-11-12T13:55:21.227",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-11-15T18:22:28.430",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [
|
||||
{
|
||||
"sourceIdentifier": "twcert@cert.org.tw",
|
||||
@ -58,14 +58,49 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:dlink:dsl6740c_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "702B0914-7B3E-4797-9D28-C1C680EC6668"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:dlink:dsl6740c:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "04466F44-FDB1-4ABF-84F1-C88CC175BCB9"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.twcert.org.tw/en/cp-139-8231-2432e-2.html",
|
||||
"source": "twcert@cert.org.tw"
|
||||
"source": "twcert@cert.org.tw",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.twcert.org.tw/tw/cp-132-8224-d939e-1.html",
|
||||
"source": "twcert@cert.org.tw"
|
||||
"source": "twcert@cert.org.tw",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-11066",
|
||||
"sourceIdentifier": "twcert@cert.org.tw",
|
||||
"published": "2024-11-11T08:15:07.730",
|
||||
"lastModified": "2024-11-12T13:55:21.227",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-11-15T18:22:45.323",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [
|
||||
{
|
||||
"sourceIdentifier": "twcert@cert.org.tw",
|
||||
@ -58,14 +58,49 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:dlink:dsl6740c_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "702B0914-7B3E-4797-9D28-C1C680EC6668"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:dlink:dsl6740c:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "04466F44-FDB1-4ABF-84F1-C88CC175BCB9"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.twcert.org.tw/en/cp-139-8232-5d94e-2.html",
|
||||
"source": "twcert@cert.org.tw"
|
||||
"source": "twcert@cert.org.tw",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.twcert.org.tw/tw/cp-132-8225-3d882-1.html",
|
||||
"source": "twcert@cert.org.tw"
|
||||
"source": "twcert@cert.org.tw",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-11067",
|
||||
"sourceIdentifier": "twcert@cert.org.tw",
|
||||
"published": "2024-11-11T08:15:08.263",
|
||||
"lastModified": "2024-11-12T13:55:21.227",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-11-15T18:23:32.557",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [
|
||||
{
|
||||
"sourceIdentifier": "twcert@cert.org.tw",
|
||||
@ -58,14 +58,49 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:dlink:dsl6740c_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "702B0914-7B3E-4797-9D28-C1C680EC6668"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:dlink:dsl6740c:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "04466F44-FDB1-4ABF-84F1-C88CC175BCB9"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.twcert.org.tw/en/cp-139-8233-903d9-2.html",
|
||||
"source": "twcert@cert.org.tw"
|
||||
"source": "twcert@cert.org.tw",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.twcert.org.tw/tw/cp-132-8226-0b07b-1.html",
|
||||
"source": "twcert@cert.org.tw"
|
||||
"source": "twcert@cert.org.tw",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-11068",
|
||||
"sourceIdentifier": "twcert@cert.org.tw",
|
||||
"published": "2024-11-11T08:15:08.850",
|
||||
"lastModified": "2024-11-12T13:55:21.227",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-11-15T18:24:25.127",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [
|
||||
{
|
||||
"sourceIdentifier": "twcert@cert.org.tw",
|
||||
@ -58,14 +58,49 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:dlink:dsl6740c_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "702B0914-7B3E-4797-9D28-C1C680EC6668"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:dlink:dsl6740c:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "04466F44-FDB1-4ABF-84F1-C88CC175BCB9"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.twcert.org.tw/en/cp-139-8234-0514c-2.html",
|
||||
"source": "twcert@cert.org.tw"
|
||||
"source": "twcert@cert.org.tw",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.twcert.org.tw/tw/cp-132-8227-f3f3b-1.html",
|
||||
"source": "twcert@cert.org.tw"
|
||||
"source": "twcert@cert.org.tw",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-11127",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-11-12T15:15:06.920",
|
||||
"lastModified": "2024-11-12T15:48:59.103",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-11-15T17:29:43.450",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in code-projects Job Recruitment up to 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file admin.php. The manipulation of the argument userid leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha encontrado una vulnerabilidad en code-projects Job Recruitment hasta la versi\u00f3n 1.0. Se ha declarado como cr\u00edtica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo admin.php. La manipulaci\u00f3n del argumento userid conduce a una inyecci\u00f3n SQL. El ataque se puede lanzar de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -57,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -106,8 +130,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -120,26 +154,62 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:anisha:job_recruitment:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "56E6381D-BF5F-4DC1-A525-4DEDA44D5C56"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://code-projects.org/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/ljllll123/cve/blob/main/sql-1.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.283975",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.283975",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.441841",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-11130",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-11-12T15:15:07.243",
|
||||
"lastModified": "2024-11-12T15:48:59.103",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-11-15T17:57:53.270",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in ZZCMS up to 2023. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /admin/msg.php. The manipulation of the argument keyword leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha detectado una vulnerabilidad en ZZCMS hasta 2023. Se ha calificado como problem\u00e1tica. Este problema afecta a una funcionalidad desconocida del archivo /admin/msg.php. La manipulaci\u00f3n de la palabra clave del argumento provoca Cross Site Scripting. El ataque puede ejecutarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -57,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -106,8 +130,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -120,22 +154,55 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:zzcms:zzcms:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "2023",
|
||||
"matchCriteriaId": "8FD00C13-599B-4944-99F6-83C9F44DB42F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/En0t5/vul/blob/main/zzcms-msg-xss.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.283976",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.283976",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.439699",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
145
CVE-2024/CVE-2024-112xx/CVE-2024-11247.json
Normal file
145
CVE-2024/CVE-2024-112xx/CVE-2024-11247.json
Normal file
@ -0,0 +1,145 @@
|
||||
{
|
||||
"id": "CVE-2024-11247",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-11-15T17:15:19.237",
|
||||
"lastModified": "2024-11-15T17:15:19.237",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability has been found in SourceCodester Online Eyewear Shop 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /oews/classes/Master.php?f=save_product of the component Inventory Page. The manipulation of the argument brand leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "NONE",
|
||||
"vulnerableSystemIntegrity": "LOW",
|
||||
"vulnerableSystemAvailability": "NONE",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 3.5,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.0
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Fl4g-Pshacker/cve/blob/main/xss.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.284683",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.284683",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.443194",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.sourcecodester.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
145
CVE-2024/CVE-2024-112xx/CVE-2024-11248.json
Normal file
145
CVE-2024/CVE-2024-112xx/CVE-2024-11248.json
Normal file
@ -0,0 +1,145 @@
|
||||
{
|
||||
"id": "CVE-2024-11248",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-11-15T17:15:19.580",
|
||||
"lastModified": "2024-11-15T17:15:19.580",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in Tenda AC10 16.03.10.13 and classified as critical. Affected by this issue is the function formSetRebootTimer of the file /goform/SetSysAutoRebbotCfg. The manipulation of the argument rebootTime leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "HIGH",
|
||||
"vulnerableSystemIntegrity": "HIGH",
|
||||
"vulnerableSystemAvailability": "HIGH",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 8.7,
|
||||
"baseSeverity": "HIGH"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "COMPLETE",
|
||||
"integrityImpact": "COMPLETE",
|
||||
"availabilityImpact": "COMPLETE",
|
||||
"baseScore": 9.0
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 10.0,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-119"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://tasty-foxtrot-3a8.notion.site/Tenda-AC10v4-formSetRebootTimer-stack-overflow-13d0448e619580bf8ab1df7cfb6c018b",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.284684",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.284684",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.443204",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.tenda.com.cn/",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
145
CVE-2024/CVE-2024-112xx/CVE-2024-11250.json
Normal file
145
CVE-2024/CVE-2024-112xx/CVE-2024-11250.json
Normal file
@ -0,0 +1,145 @@
|
||||
{
|
||||
"id": "CVE-2024-11250",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-11-15T18:15:26.280",
|
||||
"lastModified": "2024-11-15T18:15:26.280",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in code-projects Inventory Management up to 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /model/editProduct.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "LOW",
|
||||
"vulnerableSystemIntegrity": "LOW",
|
||||
"vulnerableSystemAvailability": "LOW",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 6.5
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-74"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://code-projects.org/",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/sh3rl0ckpggp/0day/blob/main/inventory-management_authenticated_sqli.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.284686",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.284686",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.443272",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
137
CVE-2024/CVE-2024-112xx/CVE-2024-11251.json
Normal file
137
CVE-2024/CVE-2024-112xx/CVE-2024-11251.json
Normal file
@ -0,0 +1,137 @@
|
||||
{
|
||||
"id": "CVE-2024-11251",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-11-15T18:15:26.653",
|
||||
"lastModified": "2024-11-15T18:15:26.653",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in erzhongxmu Jeewms up to 20241108. It has been rated as critical. This issue affects some unknown processing of the file cgReportController.do of the component AuthInterceptor. The manipulation of the argument begin_date leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. Other parameters might be affected as well."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "LOW",
|
||||
"vulnerableSystemIntegrity": "LOW",
|
||||
"vulnerableSystemAvailability": "LOW",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 6.5
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-74"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitee.com/erzhongxmu/JEEWMS/issues/IB2XZG",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.284687",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.284687",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-244xx/CVE-2024-24447.json
Normal file
25
CVE-2024/CVE-2024-244xx/CVE-2024-24447.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-24447",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-15T18:15:26.930",
|
||||
"lastModified": "2024-11-15T18:15:26.930",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Stack-based memcpy buffer overflow in the ngap_handle_pdu_session_resource_setup_response routine in OpenAirInterface CN5G AMF <= 2.0.0 allows a remote attacker with access to the N2 interface to carry out denial of service against the AMF and potentially execute code by sending a PDU Session Resource Setup Response with a ResourceFailedToSetupList containing zero elements."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cellularsecurity.org/ransacked",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://openairinterface.org/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-244xx/CVE-2024-24449.json
Normal file
25
CVE-2024/CVE-2024-244xx/CVE-2024-24449.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-24449",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-15T18:15:27.013",
|
||||
"lastModified": "2024-11-15T18:15:27.013",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An uninitialized pointer dereference in the NasPdu::NasPdu component of OpenAirInterface CN5G AMF up to v2.0.0 allows attackers to cause a Denial of Service (DoS) via a crafted InitialUEMessage message sent to the AMF."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cellularsecurity.org/ransacked",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://openairinterface.org/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-244xx/CVE-2024-24450.json
Normal file
25
CVE-2024/CVE-2024-244xx/CVE-2024-24450.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-24450",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-15T18:15:27.097",
|
||||
"lastModified": "2024-11-15T18:15:27.097",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Stack-based memcpy buffer overflow in the ngap_handle_pdu_session_resource_setup_response routine in OpenAirInterface CN5G AMF <= 2.0.0 allows a remote attacker with access to the N2 interface to carry out denial of service against the AMF and potentially execute code by sending a PDU Session Resource Setup Response with a suffciently large FailedToSetupList IE."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cellularsecurity.org/ransacked",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://openairinterface.org/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-34397",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-05-07T18:15:08.350",
|
||||
"lastModified": "2024-06-10T18:15:34.863",
|
||||
"lastModified": "2024-11-15T18:35:32.760",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Se descubri\u00f3 un problema en GNOME GLib anterior a 2.78.5 y en 2.79.x y 2.80.x anterior a 2.80.1. Cuando un cliente basado en GDBus se suscribe a se\u00f1ales de un servicio de sistema confiable, como NetworkManager, en un ordenador compartido, otros usuarios del mismo ordenador pueden enviar se\u00f1ales D-Bus falsificadas que el cliente basado en GDBus interpretar\u00e1 err\u00f3neamente como enviadas por el mismo. servicio de sistema confiable. Esto podr\u00eda provocar que el cliente basado en GDBus se comporte incorrectamente, con un impacto que depende de la aplicaci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L",
|
||||
"attackVector": "PHYSICAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 5.2,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.9,
|
||||
"impactScore": 4.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-290"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitlab.gnome.org/GNOME/glib/-/issues/3268",
|
||||
|
56
CVE-2024/CVE-2024-397xx/CVE-2024-39726.json
Normal file
56
CVE-2024/CVE-2024-397xx/CVE-2024-39726.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-39726",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-11-15T17:15:19.983",
|
||||
"lastModified": "2024-11-15T17:15:19.983",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM Engineering Lifecycle Optimization - Engineering Insights 7.0.2 and 7.0.3 is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 8.2,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 4.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-611"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7176208",
|
||||
"source": "psirt@us.ibm.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-406xx/CVE-2024-40638.json
Normal file
56
CVE-2024/CVE-2024-406xx/CVE-2024-40638.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-40638",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-11-15T18:15:27.457",
|
||||
"lastModified": "2024-11-15T18:15:27.457",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "GLPI is a free asset and IT management software package. An authenticated user can exploit multiple SQL injection vulnerabilities. One of them can be used to alter another user account data and take control of it. Upgrade to 10.0.17."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-8843-r3m7-gfqx",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-416xx/CVE-2024-41678.json
Normal file
56
CVE-2024/CVE-2024-416xx/CVE-2024-41678.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-41678",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-11-15T18:15:27.720",
|
||||
"lastModified": "2024-11-15T18:15:27.720",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "GLPI is a free asset and IT management software package. An unauthenticated user can provide a malicious link to a GLPI technician in order to exploit a reflected XSS vulnerability. Upgrade to 10.0.17."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-xwmx-mmrf-hqf9",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-446xx/CVE-2024-44625.json
Normal file
25
CVE-2024/CVE-2024-446xx/CVE-2024-44625.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-44625",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-15T17:15:20.260",
|
||||
"lastModified": "2024-11-15T17:15:20.260",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Gogs <=0.13.0 is vulnerable to Directory Traversal via the editFilePost function of internal/route/repo/editor.go."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://fysac.github.io/posts/2024/11/unpatched-remote-code-execution-in-gogs/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://gogs.io/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-463xx/CVE-2024-46383.json
Normal file
25
CVE-2024/CVE-2024-463xx/CVE-2024-46383.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-46383",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-15T18:15:27.960",
|
||||
"lastModified": "2024-11-15T18:15:27.960",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Hathway Skyworth Router CM5100-511 v4.1.1.24 was discovered to store sensitive information about USB and Wifi connected devices in plaintext."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://skyworth.com",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/nitinronge91/Sensitive-Information-disclosure-via-SPI-flash-firmware-for-Hathway-router-CVE-2024-46383",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-464xx/CVE-2024-46462.json
Normal file
21
CVE-2024/CVE-2024-464xx/CVE-2024-46462.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-46462",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-15T18:15:28.053",
|
||||
"lastModified": "2024-11-15T18:15:28.053",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "By default, dedicated folders of ZEDMAIL for Windows up to 2024.3 can be accessed by other users to misuse technical files and make them perform tasks with higher privileges. Configuration of ZEDMAIL has to be modified to prevent this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.primx.eu/en/bulletins/security-bulletin-24931936/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-464xx/CVE-2024-46463.json
Normal file
21
CVE-2024/CVE-2024-464xx/CVE-2024-46463.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-46463",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-15T18:15:28.140",
|
||||
"lastModified": "2024-11-15T18:15:28.140",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "By default, dedicated folders of ORIZON for Windows up to 2024.3 can be accessed by other users to misuse technical files and make them perform tasks with higher privileges. Configuration of ORIZON has to be modified to prevent this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.primx.eu/en/bulletins/security-bulletin-24932297/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-464xx/CVE-2024-46465.json
Normal file
21
CVE-2024/CVE-2024-464xx/CVE-2024-46465.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-46465",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-15T18:15:28.220",
|
||||
"lastModified": "2024-11-15T18:15:28.220",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "By default, dedicated folders of CRYHOD for Windows up to 2024.3 can be accessed by other users to misuse technical files and make them perform tasks with higher privileges. Configuration of CRYHOD has to be modified to prevent this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.primx.eu/en/bulletins/security-bulletin-24932296/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-464xx/CVE-2024-46466.json
Normal file
21
CVE-2024/CVE-2024-464xx/CVE-2024-46466.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-46466",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-15T18:15:28.297",
|
||||
"lastModified": "2024-11-15T18:15:28.297",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "By default, dedicated folders of ZONECENTRAL for Windows up to 2024.3 or up to Q.2021.2 (ANSSI qualification submission) can be accessed by other users to misuse technical files and make them perform tasks with higher privileges. Configuration of ZONECENTRAL has to be modified to prevent this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.primx.eu/en/bulletins/security-bulletin-24931934/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-464xx/CVE-2024-46467.json
Normal file
21
CVE-2024/CVE-2024-464xx/CVE-2024-46467.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-46467",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-15T18:15:28.377",
|
||||
"lastModified": "2024-11-15T18:15:28.377",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "By default, dedicated folders of ZONEPOINT for Windows up to 2024.1 can be accessed by other users to misuse technical files and make them perform tasks with higher privileges. Configuration of ZONEPOINT has to be modified to prevent this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.primx.eu/en/bulletins/security-bulletin-24932299/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-47178",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-09-30T16:15:09.410",
|
||||
"lastModified": "2024-10-04T13:51:25.567",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-11-15T18:05:22.603",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -59,12 +59,44 @@
|
||||
"baseSeverity": "HIGH"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -73,14 +105,39 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:expressjs:basic-auth-connect:*:*:*:*:*:node.js:*:*",
|
||||
"versionEndExcluding": "1.1.0",
|
||||
"matchCriteriaId": "B3E20E89-0B8A-47DF-BEB6-F8C12B7EAD83"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/expressjs/basic-auth-connect/commit/bac1e6a8530e1efd0028800b9b588a37adb0d203",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/expressjs/basic-auth-connect/security/advisories/GHSA-7p89-p6hx-q4fw",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-47530",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-09-30T16:15:09.540",
|
||||
"lastModified": "2024-10-04T13:51:25.567",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-11-15T18:03:06.497",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -51,14 +71,39 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:clinical-genomics:scout:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "4.89",
|
||||
"matchCriteriaId": "44ADA126-F97E-4ADC-AE4C-7C54D3375D19"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Clinical-Genomics/scout/commit/50055edfca9a7183b248019af97e1fb0b0065a02",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/Clinical-Genomics/scout/security/advisories/GHSA-3x45-2m34-x95v",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-47531",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-09-30T16:15:09.750",
|
||||
"lastModified": "2024-10-04T13:51:25.567",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-11-15T18:02:14.250",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 3.5,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -51,14 +71,39 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:clinical-genomics:scout:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "4.89",
|
||||
"matchCriteriaId": "44ADA126-F97E-4ADC-AE4C-7C54D3375D19"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Clinical-Genomics/scout/commit/f59e50f8ea596e641da8a0e9c7a33c0696bcbea5",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/Clinical-Genomics/scout/security/advisories/GHSA-24xv-q29v-3h6r",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-47532",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-09-30T16:15:09.960",
|
||||
"lastModified": "2024-10-04T13:51:25.567",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-11-15T17:59:51.307",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -59,12 +59,44 @@
|
||||
"baseSeverity": "HIGH"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -73,14 +105,40 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:zope:restrictedpython:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "7.3",
|
||||
"matchCriteriaId": "F6D940AC-E4E1-48EC-BD41-24754C974F29"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/zopefoundation/RestrictedPython/commit/d701cc36cccac36b21fa200f1f2d1945a9a215e6",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/zopefoundation/RestrictedPython/security/advisories/GHSA-5rfv-66g4-jr8h",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Mitigation",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
100
CVE-2024/CVE-2024-477xx/CVE-2024-47759.json
Normal file
100
CVE-2024/CVE-2024-477xx/CVE-2024-47759.json
Normal file
@ -0,0 +1,100 @@
|
||||
{
|
||||
"id": "CVE-2024-47759",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-11-15T18:15:28.463",
|
||||
"lastModified": "2024-11-15T18:35:34.290",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "GLPI is a free Asset and IT management software package. An technician can upload a SVG containing a malicious script. The script will then be executed when any user will try to see the document contents. Upgrade to 10.0.17."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "ACTIVE",
|
||||
"vulnerableSystemConfidentiality": "HIGH",
|
||||
"vulnerableSystemIntegrity": "NONE",
|
||||
"vulnerableSystemAvailability": "NONE",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 6.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 0.0,
|
||||
"baseSeverity": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 0.9,
|
||||
"impactScore": 0.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-474f-9vpp-xxq5",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-48838",
|
||||
"sourceIdentifier": "security_alert@emc.com",
|
||||
"published": "2024-11-12T04:15:05.833",
|
||||
"lastModified": "2024-11-12T13:55:21.227",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-11-15T17:36:43.520",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 3.3,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,46 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:dell:smartfabric_os10:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "10.5.4.0",
|
||||
"versionEndExcluding": "10.5.4.13",
|
||||
"matchCriteriaId": "0938D211-024F-4794-90D1-A34F19ACD70F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:dell:smartfabric_os10:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "10.5.5.0",
|
||||
"versionEndExcluding": "10.5.5.12",
|
||||
"matchCriteriaId": "22D34ABF-8002-42DE-8E21-DC66AF548F29"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:dell:smartfabric_os10:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "10.5.6.0",
|
||||
"versionEndExcluding": "10.5.6.6",
|
||||
"matchCriteriaId": "BB6E5BA8-71D2-4908-9B2B-CEDA754654B6"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.dell.com/support/kbdoc/en-us/000247217/dsa-2024-425-security-update-for-dell-networking-os10-vulnerabilities",
|
||||
"source": "security_alert@emc.com"
|
||||
"source": "security_alert@emc.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-49557",
|
||||
"sourceIdentifier": "security_alert@emc.com",
|
||||
"published": "2024-11-12T04:15:06.040",
|
||||
"lastModified": "2024-11-12T13:55:21.227",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-11-15T17:36:47.110",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,46 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:dell:smartfabric_os10:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "10.5.4.0",
|
||||
"versionEndExcluding": "10.5.4.13",
|
||||
"matchCriteriaId": "0938D211-024F-4794-90D1-A34F19ACD70F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:dell:smartfabric_os10:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "10.5.5.0",
|
||||
"versionEndExcluding": "10.5.5.12",
|
||||
"matchCriteriaId": "22D34ABF-8002-42DE-8E21-DC66AF548F29"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:dell:smartfabric_os10:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "10.5.6.0",
|
||||
"versionEndExcluding": "10.5.6.6",
|
||||
"matchCriteriaId": "BB6E5BA8-71D2-4908-9B2B-CEDA754654B6"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.dell.com/support/kbdoc/en-us/000247217/dsa-2024-425-security-update-for-dell-networking-os10-vulnerabilities",
|
||||
"source": "security_alert@emc.com"
|
||||
"source": "security_alert@emc.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-49558",
|
||||
"sourceIdentifier": "security_alert@emc.com",
|
||||
"published": "2024-11-12T04:15:06.243",
|
||||
"lastModified": "2024-11-12T13:55:21.227",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-11-15T17:35:54.480",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Secondary",
|
||||
@ -41,8 +61,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -51,10 +81,46 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:dell:smartfabric_os10:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "10.5.4.0",
|
||||
"versionEndExcluding": "10.5.4.13",
|
||||
"matchCriteriaId": "0938D211-024F-4794-90D1-A34F19ACD70F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:dell:smartfabric_os10:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "10.5.5.0",
|
||||
"versionEndExcluding": "10.5.5.12",
|
||||
"matchCriteriaId": "22D34ABF-8002-42DE-8E21-DC66AF548F29"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:dell:smartfabric_os10:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "10.5.6.0",
|
||||
"versionEndExcluding": "10.5.6.6",
|
||||
"matchCriteriaId": "BB6E5BA8-71D2-4908-9B2B-CEDA754654B6"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.dell.com/support/kbdoc/en-us/000247217/dsa-2024-425-security-update-for-dell-networking-os10-vulnerabilities",
|
||||
"source": "security_alert@emc.com"
|
||||
"source": "security_alert@emc.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-49560",
|
||||
"sourceIdentifier": "security_alert@emc.com",
|
||||
"published": "2024-11-12T04:15:06.443",
|
||||
"lastModified": "2024-11-12T13:55:21.227",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-11-15T17:35:25.407",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,46 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:dell:smartfabric_os10:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "10.5.4.0",
|
||||
"versionEndExcluding": "10.5.4.13",
|
||||
"matchCriteriaId": "0938D211-024F-4794-90D1-A34F19ACD70F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:dell:smartfabric_os10:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "10.5.5.0",
|
||||
"versionEndExcluding": "10.5.5.12",
|
||||
"matchCriteriaId": "22D34ABF-8002-42DE-8E21-DC66AF548F29"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:dell:smartfabric_os10:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "10.5.6.0",
|
||||
"versionEndExcluding": "10.5.6.6",
|
||||
"matchCriteriaId": "BB6E5BA8-71D2-4908-9B2B-CEDA754654B6"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.dell.com/support/kbdoc/en-us/000247217/dsa-2024-425-security-update-for-dell-networking-os10-vulnerabilities",
|
||||
"source": "security_alert@emc.com"
|
||||
"source": "security_alert@emc.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-49776",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-14T23:15:05.457",
|
||||
"lastModified": "2024-11-15T13:58:08.913",
|
||||
"lastModified": "2024-11-15T18:35:34.550",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Un par\u00e1metro de tama\u00f1o negativo en la versi\u00f3n nightly-2024-04-05-01-53-02 de tsMuxer permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de un archivo de video TS manipulado."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-131"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/justdan96/tsMuxer/issues/862",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-49777",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-14T23:15:05.547",
|
||||
"lastModified": "2024-11-15T13:58:08.913",
|
||||
"lastModified": "2024-11-15T18:35:35.413",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Un desbordamiento de b\u00fafer basado en mont\u00f3n en tsMuxer versi\u00f3n nightly-2024-03-14-01-51-12 permite a los atacantes provocar denegaci\u00f3n de servicio (DoS), divulgaci\u00f3n de informaci\u00f3n y ejecuci\u00f3n de c\u00f3digo a trav\u00e9s de un archivo de video MKV manipulado."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/justdan96/tsMuxer/issues/842",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-49778",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-14T23:15:05.643",
|
||||
"lastModified": "2024-11-15T13:58:08.913",
|
||||
"lastModified": "2024-11-15T18:35:36.260",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Un desbordamiento de b\u00fafer basado en mont\u00f3n en tsMuxer versi\u00f3n nightly-2024-05-12-02-01-18 permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) y ejecuci\u00f3n de c\u00f3digo a trav\u00e9s de un archivo de video MOV manipulado."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/justdan96/tsMuxer/issues/879",
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-50313",
|
||||
"sourceIdentifier": "productcert@siemens.com",
|
||||
"published": "2024-11-12T13:15:11.910",
|
||||
"lastModified": "2024-11-12T13:55:21.227",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-11-15T17:12:44.410",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability has been identified in Mendix Runtime V10 (All versions < V10.16.0 only if the basic authentication mechanism is used by the application), Mendix Runtime V10.12 (All versions < V10.12.7 only if the basic authentication mechanism is used by the application), Mendix Runtime V10.6 (All versions < V10.6.15 only if the basic authentication mechanism is used by the application), Mendix Runtime V8 (All versions), Mendix Runtime V9 (All versions < V9.24.29 only if the basic authentication mechanism is used by the application). The basic authentication implementation of affected applications contains a race condition vulnerability which could allow unauthenticated remote attackers to circumvent default account lockout measures."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha identificado una vulnerabilidad en Mendix Runtime V10 (todas las versiones anteriores a la V10.16.0, solo si la aplicaci\u00f3n utiliza el mecanismo de autenticaci\u00f3n b\u00e1sica), Mendix Runtime V10.12 (todas las versiones anteriores a la V10.12.7, solo si la aplicaci\u00f3n utiliza el mecanismo de autenticaci\u00f3n b\u00e1sica), Mendix Runtime V10.6 (todas las versiones anteriores a la V10.6.15, solo si la aplicaci\u00f3n utiliza el mecanismo de autenticaci\u00f3n b\u00e1sica), Mendix Runtime V8 (todas las versiones), Mendix Runtime V9 (todas las versiones anteriores a la V9.24.29, solo si la aplicaci\u00f3n utiliza el mecanismo de autenticaci\u00f3n b\u00e1sica). La implementaci\u00f3n de autenticaci\u00f3n b\u00e1sica de las aplicaciones afectadas contiene una vulnerabilidad de condici\u00f3n de ejecuci\u00f3n que podr\u00eda permitir a atacantes remotos no autenticados eludir las medidas de bloqueo de cuentas predeterminadas."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -58,8 +62,28 @@
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "productcert@siemens.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 2.5
|
||||
},
|
||||
{
|
||||
"source": "productcert@siemens.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||
@ -91,10 +115,53 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mendix:mendix:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.0.0",
|
||||
"versionEndExcluding": "9.24.29",
|
||||
"matchCriteriaId": "F6087752-F90F-4674-8C24-A4D1EB5CB7AB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mendix:mendix:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "10.0.0",
|
||||
"versionEndExcluding": "10.6.15",
|
||||
"matchCriteriaId": "774E44F6-A7DA-4903-9AA5-B41D4AC39B5F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mendix:mendix:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "10.7.0",
|
||||
"versionEndExcluding": "10.12.7",
|
||||
"matchCriteriaId": "4B78566A-6B9D-4C40-9834-D16410CEE04F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mendix:mendix:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "10.13.0",
|
||||
"versionEndExcluding": "10.16.0",
|
||||
"matchCriteriaId": "243DDDBE-BA70-44F9-B363-A0DC51595876"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cert-portal.siemens.com/productcert/html/ssa-914892.html",
|
||||
"source": "productcert@siemens.com"
|
||||
"source": "productcert@siemens.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-506xx/CVE-2024-50653.json
Normal file
25
CVE-2024/CVE-2024-506xx/CVE-2024-50653.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-50653",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-15T17:15:20.417",
|
||||
"lastModified": "2024-11-15T17:15:20.417",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CRMEB <=5.4.0 is vulnerable to Incorrect Access Control. Users can bypass the front-end restriction of only being able to claim coupons once by capturing packets and sending a large number of data packets for coupon collection, achieving unlimited coupon collection."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Yllxx03/CVE/tree/main/CVE-2024-50653",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/crmeb",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-506xx/CVE-2024-50654.json
Normal file
25
CVE-2024/CVE-2024-506xx/CVE-2024-50654.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-50654",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-15T17:15:20.507",
|
||||
"lastModified": "2024-11-15T17:15:20.507",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "lilishop <=4.2.4 is vulnerable to Incorrect Access Control, which can allow attackers to obtain coupons beyond the quantity limit by capturing and sending the data packets for coupon collection in high concurrency."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Yllxx03/CVE/blob/main/lilishop/CouponLogicVulnerability.md",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/Yllxx03/CVE/tree/main/CVE-2024-50654",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-506xx/CVE-2024-50655.json
Normal file
25
CVE-2024/CVE-2024-506xx/CVE-2024-50655.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-50655",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-15T17:15:20.613",
|
||||
"lastModified": "2024-11-15T17:15:20.613",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "emlog pro <=2.3.18 is vulnerable to Cross Site Scripting (XSS), which allows attackers to write malicious JavaScript code in published articles."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Yllxx03/CVE/blob/main/emlog/XSS.md",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/Yllxx03/CVE/tree/main/CVE-2024-50655",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-508xx/CVE-2024-50800.json
Normal file
21
CVE-2024/CVE-2024-508xx/CVE-2024-50800.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-50800",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-15T18:15:28.727",
|
||||
"lastModified": "2024-11-15T18:15:28.727",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross Site Scripting vulnerability in M2000 Smart4Web before v.5.020241004 allows a remote attacker to execute arbitrary code via the error parameter in URL"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Jellyfishxoxo/vulnerability-research/tree/main/CVE-2024-50800",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-51585",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-11-09T15:15:04.480",
|
||||
"lastModified": "2024-11-12T13:56:24.513",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-11-15T17:17:47.730",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nicheaddons:sales_page_addon:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "1.4.2",
|
||||
"matchCriteriaId": "2E45C329-EBE4-4CBC-BEF5-329F2E7F71C8"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/sales-page-addon/wordpress-sales-page-addon-plugin-1-4-2-stored-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-51592",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-11-09T15:15:05.983",
|
||||
"lastModified": "2024-11-12T13:56:24.513",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-11-15T17:04:52.197",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mysticalthemes:meta_store_elements:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "1.0.9",
|
||||
"matchCriteriaId": "B709C841-2545-488B-89B2-FE917C3E845D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/meta-store-elements/wordpress-meta-store-elements-plugin-1-0-9-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-51594",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-11-09T15:15:06.403",
|
||||
"lastModified": "2024-11-12T13:56:24.513",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-11-15T17:15:21.580",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:rafelsanso:gmap_point_list:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "1.1.2",
|
||||
"matchCriteriaId": "5F1A02B1-5CC3-4FBB-AD2B-E7F67DFAD9AF"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/gmap-point-list/wordpress-gmap-point-list-plugin-1-1-2-stored-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-51595",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-11-09T15:15:06.613",
|
||||
"lastModified": "2024-11-12T13:56:24.513",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-11-15T17:03:07.770",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,30 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sksdev:sksdev_toolkit:1.0.0:*:*:*:*:wordpress:*:*",
|
||||
"matchCriteriaId": "BFF19CC2-6812-4059-840B-C5B3C48D37F1"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/sksdev-toolkit/wordpress-sksdev-toolkit-plugin-1-0-0-stored-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-51596",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-11-09T15:15:06.827",
|
||||
"lastModified": "2024-11-12T13:56:24.513",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-11-15T17:01:15.687",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:snilesh:business:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "1.3",
|
||||
"matchCriteriaId": "81371556-078D-44AC-943E-D7FBECD9479F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/business/wordpress-business-plugin-1-3-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-51662",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-11-09T14:15:17.617",
|
||||
"lastModified": "2024-11-12T13:56:24.513",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-11-15T17:16:49.063",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:modernaweb:black_widgets_for_elementor:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "1.3.6",
|
||||
"matchCriteriaId": "CBC9D329-B73C-4EAD-A5D3-2D9428EFC45E"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/black-widgets/wordpress-black-widgets-for-elementor-plugin-1-3-6-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-52352",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-11-11T07:15:06.907",
|
||||
"lastModified": "2024-11-12T13:55:21.227",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-11-15T17:46:27.217",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:miloco:postcasa_shortcode:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "1.0",
|
||||
"matchCriteriaId": "6BE02E15-2D9D-4188-86CB-0A7144D3B435"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/postcasa/wordpress-postcasa-shortcode-plugin-1-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-52353",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-11-11T07:15:07.223",
|
||||
"lastModified": "2024-11-12T13:55:21.227",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-11-15T17:49:31.553",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sharethepractice:christian_science_bible_lesson_subjects:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "2.1",
|
||||
"matchCriteriaId": "2DCEFEA8-6059-4407-B81A-FBD3208967F8"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/christian-science-bible-lesson-subjects/wordpress-christian-science-bible-lesson-subjects-plugin-2-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-52354",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-11-11T07:15:07.500",
|
||||
"lastModified": "2024-11-12T13:55:21.227",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-11-15T17:50:59.703",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:coolplugins:web_stories_widgets_for_elementor:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "1.1.1",
|
||||
"matchCriteriaId": "47DD1AF9-B3A3-4EAE-B5FA-FDC68C7F50FB"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/shortcodes-for-amp-web-stories-and-elementor-widget/wordpress-web-stories-widgets-for-elementor-plugin-1-1-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-52355",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-11-11T07:15:07.790",
|
||||
"lastModified": "2024-11-12T13:55:21.227",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-11-15T17:51:44.273",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hyumika:openstreetmap:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "6.1.3",
|
||||
"matchCriteriaId": "837BBC04-A553-4F08-A8DC-2313D0AD7455"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/osm/wordpress-osm-openstreetmap-plugin-6-1-2-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
68
CVE-2024/CVE-2024-525xx/CVE-2024-52507.json
Normal file
68
CVE-2024/CVE-2024-525xx/CVE-2024-52507.json
Normal file
@ -0,0 +1,68 @@
|
||||
{
|
||||
"id": "CVE-2024-52507",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-11-15T18:15:28.847",
|
||||
"lastModified": "2024-11-15T18:15:28.847",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Nextcloud Tables allows users to to create tables with individual columns. The information which Table (numeric ID) is shared with which groups and users and the respective permissions was not limited to affected users. It is recommended that the Nextcloud Tables app is upgraded to 0.8.1."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 3.5,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-639"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-rgvc-xr2w-qq45",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/nextcloud/tables/commit/13ca45f1b9f70f694aea81b78bc7416ec840c332",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/nextcloud/tables/pull/1406",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://hackerone.com/reports/2705507",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
68
CVE-2024/CVE-2024-525xx/CVE-2024-52508.json
Normal file
68
CVE-2024/CVE-2024-525xx/CVE-2024-52508.json
Normal file
@ -0,0 +1,68 @@
|
||||
{
|
||||
"id": "CVE-2024-52508",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-11-15T18:15:29.060",
|
||||
"lastModified": "2024-11-15T18:15:29.060",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Nextcloud Mail is the mail app for Nextcloud, a self-hosted productivity platform. When a user is trying to set up a mail account with an email address like user@example.tld that does not support auto configuration, and an attacker managed to register autoconfig.tld, the used email details would be send to the server of the attacker. It is recommended that the Nextcloud Mail app is upgraded to 1.14.6, 1.15.4, 2.2.11, 3.6.3, 3.7.7 or 4.0.0."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 8.2,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/nextcloud/mail/commit/a84c70e15d814dab6f0e8eda71bbaaf48152079b",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/nextcloud/mail/pull/9964",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-vmhx-hwph-q6mc",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://hackerone.com/reports/2508422",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
68
CVE-2024/CVE-2024-525xx/CVE-2024-52509.json
Normal file
68
CVE-2024/CVE-2024-525xx/CVE-2024-52509.json
Normal file
@ -0,0 +1,68 @@
|
||||
{
|
||||
"id": "CVE-2024-52509",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-11-15T18:15:29.280",
|
||||
"lastModified": "2024-11-15T18:15:29.280",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Nextcloud Mail is the mail app for Nextcloud, a self-hosted productivity platform. The Nextcloud mail app incorrectly allowed attaching shared files without download permissions as attachments. This allowed users to send them the files to themselves and then downloading it from their mail clients. It is recommended that the Nextcloud Mail is upgraded to 2.2.10, 3.6.2 or 3.7.2."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 3.5,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/nextcloud/mail/commit/8d44f1ce44684022aa4e62a3e0462fdadcde6c8b",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/nextcloud/mail/pull/9592",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-pwpp-fvcr-w862",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://hackerone.com/reports/1878255",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
68
CVE-2024/CVE-2024-525xx/CVE-2024-52510.json
Normal file
68
CVE-2024/CVE-2024-525xx/CVE-2024-52510.json
Normal file
@ -0,0 +1,68 @@
|
||||
{
|
||||
"id": "CVE-2024-52510",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-11-15T18:15:29.497",
|
||||
"lastModified": "2024-11-15T18:15:29.497",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Nextcloud Desktop Client is a tool to synchronize files from Nextcloud Server with your computer. The Desktop client did not stop with an error but allowed by-passing the signature validation, if a manipulated server sends an empty initial signature. It is recommended that the Nextcloud Desktop client is upgraded to 3.14.2 or later."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.2,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.5,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-295"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/nextcloud/desktop/commit/97539218e6f63c3a3fd1694cb7d8aef27c5910d7",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/nextcloud/desktop/pull/7333",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-r4qc-m9mj-452v",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://hackerone.com/reports/2597504",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
68
CVE-2024/CVE-2024-525xx/CVE-2024-52511.json
Normal file
68
CVE-2024/CVE-2024-525xx/CVE-2024-52511.json
Normal file
@ -0,0 +1,68 @@
|
||||
{
|
||||
"id": "CVE-2024-52511",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-11-15T18:15:29.717",
|
||||
"lastModified": "2024-11-15T18:15:29.717",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Nextcloud Tables allows users to to create tables with individual columns. By directly specifying the ID of a table or view, a malicious user could blindly insert new rows into tables they have no access to. It is recommended that the Nextcloud Tables is upgraded to 0.8.0."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 4.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-639"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-4qqp-9h2g-7qg7",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/nextcloud/tables/commit/52846ad81fe192ee977f14c82a229b0d9cdc406c",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/nextcloud/tables/pull/1351",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://hackerone.com/reports/2671404",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
68
CVE-2024/CVE-2024-525xx/CVE-2024-52512.json
Normal file
68
CVE-2024/CVE-2024-525xx/CVE-2024-52512.json
Normal file
@ -0,0 +1,68 @@
|
||||
{
|
||||
"id": "CVE-2024-52512",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-11-15T18:15:29.933",
|
||||
"lastModified": "2024-11-15T18:15:29.933",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "user_oidc app is an OpenID Connect user backend for Nextcloud. A malicious user could send a malformed login link that would redirect the user to a provided URL after successfully authenticating. It is recommended that the Nextcloud User OIDC app is upgraded to 6.1.0."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 3.3,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-601"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-784j-x2g5-4g7q",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/nextcloud/user_oidc/commit/c923428d51972f6d04636c6accbecdec0c1b88e9",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/nextcloud/user_oidc/pull/961",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://hackerone.com/reports/2720030",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
68
CVE-2024/CVE-2024-525xx/CVE-2024-52513.json
Normal file
68
CVE-2024/CVE-2024-525xx/CVE-2024-52513.json
Normal file
@ -0,0 +1,68 @@
|
||||
{
|
||||
"id": "CVE-2024-52513",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-11-15T18:15:30.157",
|
||||
"lastModified": "2024-11-15T18:15:30.157",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Nextcloud Server is a self hosted personal cloud system. After receiving a \"Files drop\" or \"Password protected\" share link a malicious user was able to download attachments that are referenced in Text files without providing the password. It is recommended that the Nextcloud Server is upgraded to 28.0.11, 29.0.8 or 30.0.1 and Nextcloud Enterprise Server is upgraded to 25.0.13.13, 26.0.13.9, 27.1.11.9, 28.0.11, 29.0.8 or 30.0.1."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 2.6,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-gxph-5m4j-pfmj",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/nextcloud/text/commit/ca24b25c93b81626b4e457c260243edeab5f1548",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/nextcloud/text/pull/6485",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://hackerone.com/reports/2376900",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
68
CVE-2024/CVE-2024-525xx/CVE-2024-52514.json
Normal file
68
CVE-2024/CVE-2024-525xx/CVE-2024-52514.json
Normal file
@ -0,0 +1,68 @@
|
||||
{
|
||||
"id": "CVE-2024-52514",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-11-15T18:15:30.370",
|
||||
"lastModified": "2024-11-15T18:15:30.370",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Nextcloud Server is a self hosted personal cloud system. After a user received a share with some files inside being blocked by the files access control, the user would still be able to copy the intermediate folder inside Nextcloud allowing them to afterwards potentially access the blocked files depending on the user access control rules. It is recommended that the Nextcloud Server is upgraded to 27.1.9, 28.0.5 or 29.0.0 and Nextcloud Enterprise Server is upgraded to 21.0.9.18, 22.2.10.23, 23.0.12.18, 24.0.12.14, 25.0.13.9, 26.0.13.3, 27.1.9, 28.0.5 or 29.0.0."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-g8pr-g25r-58xj",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/nextcloud/server/commit/5fffbcfe8650eab75b00e8d188fbc95b0e43f3a8",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/nextcloud/server/pull/44889",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://hackerone.com/reports/2447316",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
68
CVE-2024/CVE-2024-525xx/CVE-2024-52515.json
Normal file
68
CVE-2024/CVE-2024-525xx/CVE-2024-52515.json
Normal file
@ -0,0 +1,68 @@
|
||||
{
|
||||
"id": "CVE-2024-52515",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-11-15T17:15:20.837",
|
||||
"lastModified": "2024-11-15T17:15:20.837",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Nextcloud Server is a self hosted personal cloud system. After an admin enables the default-disabled SVG preview provider, a malicious user could upload a manipulated SVG file referencing paths. If the file would exist the preview of the SVG would preview the other file instead. It is recommended that the Nextcloud Server is upgraded to 27.1.10, 28.0.6 or 29.0.1 and Nextcloud Enterprise Server is upgraded to 24.0.12.15, 25.0.13.10, 26.0.13.4, 27.1.10, 28.0.6 or 29.0.1."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-706"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-5m5g-hw8c-2236",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/nextcloud/server/commit/7e1c30f82a63fbea8c269e0eec38291377f32604",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/nextcloud/server/pull/45340",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://hackerone.com/reports/2484499",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2024/CVE-2024-525xx/CVE-2024-52516.json
Normal file
64
CVE-2024/CVE-2024-525xx/CVE-2024-52516.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2024-52516",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-11-15T17:15:21.070",
|
||||
"lastModified": "2024-11-15T17:15:21.070",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Nextcloud Server is a self hosted personal cloud system. When a server is configured to only allow sharing with users that are in ones own groups, after a user was removed from a group, previously shared items were not unshared. It is recommended that the Nextcloud Server is upgraded to 22.2.11 or 23.0.11 or 24.0.6 and Nextcloud Enterprise Server is upgraded to 22.2.11 or 23.0.11 or 24.0.6."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 3.0,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 1.3,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-35gc-jc6x-29cm",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/nextcloud/server/commit/142b6e313ffa9d3b950bcd23cb58850d3ae7cf34",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/nextcloud/server/pull/47180",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
68
CVE-2024/CVE-2024-525xx/CVE-2024-52517.json
Normal file
68
CVE-2024/CVE-2024-525xx/CVE-2024-52517.json
Normal file
@ -0,0 +1,68 @@
|
||||
{
|
||||
"id": "CVE-2024-52517",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-11-15T17:15:21.297",
|
||||
"lastModified": "2024-11-15T17:15:21.297",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Nextcloud Server is a self hosted personal cloud system. After storing \"Global credentials\" on the server, the API returns them and adds them into the frontend again, allowing to read them in plain text when an attacker already has access to an active session of a user. It is recommended that the Nextcloud Server is upgraded to 28.0.11, 29.0.8 or 30.0.1 and Nextcloud Enterprise Server is upgraded to 25.0.13.13, 26.0.13.9, 27.1.11.9, 28.0.11, 29.0.8 or 30.0.1."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:H/UI:R/S:C/C:H/I:N/A:N",
|
||||
"attackVector": "PHYSICAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.6,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.2,
|
||||
"impactScore": 4.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-x9q3-c7f8-3rcg",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/nextcloud/server/commit/c45ed55f959ff54f3ea23dd2ae1a5868a075c9fe",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/nextcloud/server/pull/48359",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://hackerone.com/reports/2554079",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
72
CVE-2024/CVE-2024-525xx/CVE-2024-52518.json
Normal file
72
CVE-2024/CVE-2024-525xx/CVE-2024-52518.json
Normal file
@ -0,0 +1,72 @@
|
||||
{
|
||||
"id": "CVE-2024-52518",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-11-15T17:15:21.543",
|
||||
"lastModified": "2024-11-15T17:15:21.543",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Nextcloud Server is a self hosted personal cloud system. After an attacker got access to the session of a user or administrator, the attacker would be able to create, change or delete external storages without having to confirm the password. It is recommended that the Nextcloud Server is upgraded to 28.0.12, 29.0.9 or 30.0.2."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.7,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-287"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-vrhf-532w-99rg",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/nextcloud/server/pull/48373",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/nextcloud/server/pull/48788",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/nextcloud/server/pull/48992",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://hackerone.com/reports/2602973",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2024/CVE-2024-525xx/CVE-2024-52519.json
Normal file
64
CVE-2024/CVE-2024-525xx/CVE-2024-52519.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2024-52519",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-11-15T17:15:21.843",
|
||||
"lastModified": "2024-11-15T17:15:21.843",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Nextcloud Server is a self hosted personal cloud system. The OAuth2 client secrets were stored in a recoverable way, so that an attacker that got access to a backup of the database and the Nextcloud config file, would be able to decrypt them. It is recommended that the Nextcloud Server is upgraded to 28.0.10 or 29.0.7 and Nextcloud Enterprise Server is upgraded to 27.1.11.8, 28.0.10 or 29.0.7."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:N",
|
||||
"attackVector": "PHYSICAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 2.7,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 0.1,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-922"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-fvpc-8hq6-jgq2",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/nextcloud/server/commit/09b8aea8f6783514bffe00df6abbf9fa542faac5",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/nextcloud/server/pull/47635",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
74
CVE-2024/CVE-2024-525xx/CVE-2024-52520.json
Normal file
74
CVE-2024/CVE-2024-525xx/CVE-2024-52520.json
Normal file
@ -0,0 +1,74 @@
|
||||
{
|
||||
"id": "CVE-2024-52520",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-11-15T17:15:22.200",
|
||||
"lastModified": "2024-11-15T17:35:16.007",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Nextcloud Server is a self hosted personal cloud system. Due to a pre-flighted HEAD request, the link reference provider could be tricked into downloading bigger websites than intended, to find open-graph data. It is recommended that the Nextcloud Server is upgraded to 28.0.10 or 29.0.7 and Nextcloud Enterprise Server is upgraded to 27.1.11.8, 28.0.10 or 29.0.7."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-400"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-pxqf-cfxw-mqmj",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/nextcloud/server/commit/873c42b0f1383d5b6f2b7a481e1d9620ed30f44a",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/nextcloud/server/pull/47627",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2024/CVE-2024-525xx/CVE-2024-52521.json
Normal file
64
CVE-2024/CVE-2024-525xx/CVE-2024-52521.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2024-52521",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-11-15T17:15:22.580",
|
||||
"lastModified": "2024-11-15T17:15:22.580",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Nextcloud Server is a self hosted personal cloud system. MD5 hashes were used to check background jobs for their uniqueness. This increased the chances of a background job with arguments falsely being identified as already existing and not be queued for execution. By changing the Hash to SHA256 the probability was heavily decreased. It is recommended that the Nextcloud Server is upgraded to 28.0.10, 29.0.7 or 30.0.0."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 2.6,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-328"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-2q6f-gjgj-7hp4",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/nextcloud/server/commit/a933ba1fdba77e7d8c6b8ff400e082cf853ea46d",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/nextcloud/server/pull/47769",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
90
CVE-2024/CVE-2024-525xx/CVE-2024-52522.json
Normal file
90
CVE-2024/CVE-2024-525xx/CVE-2024-52522.json
Normal file
@ -0,0 +1,90 @@
|
||||
{
|
||||
"id": "CVE-2024-52522",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-11-15T18:15:30.643",
|
||||
"lastModified": "2024-11-15T18:15:30.643",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rclone is a command-line program to sync files and directories to and from different cloud storage providers. Insecure handling of symlinks with --links and --metadata in rclone while copying to local disk allows unprivileged users to indirectly modify ownership and permissions on symlink target files when a superuser or privileged process performs a copy. This vulnerability could enable privilege escalation and unauthorized access to critical system files, compromising system integrity, confidentiality, and availability. This vulnerability is fixed in 1.68.2."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "PRESENT",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "ACTIVE",
|
||||
"vulnerableSystemConfidentiality": "HIGH",
|
||||
"vulnerableSystemIntegrity": "HIGH",
|
||||
"vulnerableSystemAvailability": "HIGH",
|
||||
"subsequentSystemConfidentiality": "LOW",
|
||||
"subsequentSystemIntegrity": "LOW",
|
||||
"subsequentSystemAvailability": "LOW",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-281"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-59"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-61"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/rclone/rclone/commit/01ccf204f42b4f68541b16843292439090a2dcf0",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/rclone/rclone/security/advisories/GHSA-hrxh-9w67-g4cv",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
74
CVE-2024/CVE-2024-525xx/CVE-2024-52523.json
Normal file
74
CVE-2024/CVE-2024-525xx/CVE-2024-52523.json
Normal file
@ -0,0 +1,74 @@
|
||||
{
|
||||
"id": "CVE-2024-52523",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-11-15T17:15:22.870",
|
||||
"lastModified": "2024-11-15T17:35:16.820",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Nextcloud Server is a self hosted personal cloud system. After setting up a user or administrator defined external storage with fixed credentials, the API returns them and adds them into the frontend again, allowing to read them in plain text when an attacker already has access to an active session of a user. It is recommended that the Nextcloud Server is upgraded to 28.0.12, 29.0.9 or 30.0.2 and Nextcloud Enterprise Server is upgraded to 25.0.13.14, 26.0.13.10, 27.1.11.10, 28.0.12, 29.0.9 or 30.0.2."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:H/UI:R/S:C/C:H/I:N/A:N",
|
||||
"attackVector": "PHYSICAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.6,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.2,
|
||||
"impactScore": 4.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-42w6-r45m-9w9j",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/nextcloud/server/commit/8a13f284765bd4606984e7d925c32ae6e82b8a27",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/nextcloud/server/pull/49009",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2024/CVE-2024-525xx/CVE-2024-52525.json
Normal file
64
CVE-2024/CVE-2024-525xx/CVE-2024-52525.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2024-52525",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-11-15T17:15:23.150",
|
||||
"lastModified": "2024-11-15T17:15:23.150",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Nextcloud Server is a self hosted personal cloud system. Under certain conditions the password of a user was stored unencrypted in the session data. The session data is encrypted before being saved in the session storage (Redis or disk), but it would allow a malicious process that gains access to the memory of the PHP process, to get access to the cleartext password of the user. It is recommended that the Nextcloud Server is upgraded to 28.0.12, 29.0.9 or 30.0.2."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:H/UI:R/S:C/C:L/I:N/A:N",
|
||||
"attackVector": "PHYSICAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 1.8,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 0.2,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-312"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-w7v5-mgxm-v6gm",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/nextcloud/server/commit/d25a0a2896a2a981939cacb8ee0d555feef22b3b",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/nextcloud/server/pull/48915",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
78
CVE-2024/CVE-2024-525xx/CVE-2024-52528.json
Normal file
78
CVE-2024/CVE-2024-525xx/CVE-2024-52528.json
Normal file
@ -0,0 +1,78 @@
|
||||
{
|
||||
"id": "CVE-2024-52528",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-11-15T17:15:23.400",
|
||||
"lastModified": "2024-11-15T17:15:23.400",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Budget Control Gateway acts as an entry point for incoming requests and routes them to the appropriate microservices for Budget Control. Budget Control Gateway does not properly validate auth tokens, which allows attackers to bypass intended restrictions. This vulnerability is fixed in 1.5.2."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "HIGH",
|
||||
"vulnerableSystemIntegrity": "HIGH",
|
||||
"vulnerableSystemAvailability": "NONE",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 9.3,
|
||||
"baseSeverity": "CRITICAL"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-285"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/BudgetControl/Gateway/security/advisories/GHSA-jqx6-gm7f-vp7m",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-5474",
|
||||
"sourceIdentifier": "psirt@lenovo.com",
|
||||
"published": "2024-10-11T16:15:14.440",
|
||||
"lastModified": "2024-10-15T12:58:51.050",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-11-15T17:00:35.697",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "psirt@lenovo.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-276"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "psirt@lenovo.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:lenovo:dolby_vision_provisioning:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "2.0.0.2",
|
||||
"matchCriteriaId": "0A189EC9-ED49-4291-95E9-2F5BE2CB6595"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.lenovo.com/us/en/product_security/LEN-158394",
|
||||
"source": "psirt@lenovo.com"
|
||||
"source": "psirt@lenovo.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-6985",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2024-10-11T16:15:14.657",
|
||||
"lastModified": "2024-10-15T12:58:51.050",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-11-15T17:10:59.157",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -16,6 +16,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
],
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
@ -51,14 +73,39 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:lollms:lollms:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "5.9.0",
|
||||
"matchCriteriaId": "A801CCA9-B08E-469F-B38C-21474B050AC4"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/parisneo/lollms/commit/28ee567a9a120967215ff19b96ab7515ce469620",
|
||||
"source": "security@huntr.dev"
|
||||
"source": "security@huntr.dev",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://huntr.com/bounties/79c11579-47d8-4e68-8466-b47c3bf5ef6a",
|
||||
"source": "security@huntr.dev"
|
||||
"source": "security@huntr.dev",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-8376",
|
||||
"sourceIdentifier": "emo@eclipse.org",
|
||||
"published": "2024-10-11T16:15:14.860",
|
||||
"lastModified": "2024-10-31T10:15:05.930",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-11-15T17:21:02.327",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -59,9 +59,49 @@
|
||||
"baseSeverity": "HIGH"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-401"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-755"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "emo@eclipse.org",
|
||||
"type": "Secondary",
|
||||
@ -81,38 +121,81 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:eclipse:mosquitto:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "2.0.19",
|
||||
"matchCriteriaId": "427A4001-C682-433E-A653-B13B770BF193"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/eclipse-mosquitto/mosquitto/commit/1914b3ee2a18102d0a94cbdbbfeae1afa03edd17",
|
||||
"source": "emo@eclipse.org"
|
||||
"source": "emo@eclipse.org",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/eclipse/mosquitto/releases/tag/v2.0.19",
|
||||
"source": "emo@eclipse.org"
|
||||
"source": "emo@eclipse.org",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/26",
|
||||
"source": "emo@eclipse.org"
|
||||
"source": "emo@eclipse.org",
|
||||
"tags": [
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/216",
|
||||
"source": "emo@eclipse.org"
|
||||
"source": "emo@eclipse.org",
|
||||
"tags": [
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/217",
|
||||
"source": "emo@eclipse.org"
|
||||
"source": "emo@eclipse.org",
|
||||
"tags": [
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/218",
|
||||
"source": "emo@eclipse.org"
|
||||
"source": "emo@eclipse.org",
|
||||
"tags": [
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/227",
|
||||
"source": "emo@eclipse.org"
|
||||
"source": "emo@eclipse.org",
|
||||
"tags": [
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://mosquitto.org/",
|
||||
"source": "emo@eclipse.org"
|
||||
"source": "emo@eclipse.org",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-9539",
|
||||
"sourceIdentifier": "product-cna@github.com",
|
||||
"published": "2024-10-11T18:15:08.887",
|
||||
"lastModified": "2024-10-15T12:57:46.880",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-11-15T17:15:06.600",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -59,9 +59,41 @@
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "product-cna@github.com",
|
||||
"type": "Secondary",
|
||||
@ -73,22 +105,73 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "3.11.16",
|
||||
"matchCriteriaId": "E624875C-FCF2-4538-8F3E-D64183154275"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.12.0",
|
||||
"versionEndExcluding": "3.12.10",
|
||||
"matchCriteriaId": "F70645DE-4DC2-40CB-B425-4E002B302FDB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.13.0",
|
||||
"versionEndExcluding": "3.13.5",
|
||||
"matchCriteriaId": "B08CBD2C-6DA7-4C0F-9812-42933F51C003"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.14.0",
|
||||
"versionEndExcluding": "3.14.2",
|
||||
"matchCriteriaId": "59E74193-93FE-45FE-8C74-34EC30EEB03C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://docs.github.com/en/enterprise-server@3.11/admin/release-notes#3.11.16",
|
||||
"source": "product-cna@github.com"
|
||||
"source": "product-cna@github.com",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://docs.github.com/en/enterprise-server@3.12/admin/release-notes#3.12.10",
|
||||
"source": "product-cna@github.com"
|
||||
"source": "product-cna@github.com",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://docs.github.com/en/enterprise-server@3.13/admin/release-notes#3.13.5",
|
||||
"source": "product-cna@github.com"
|
||||
"source": "product-cna@github.com",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://docs.github.com/en/enterprise-server@3.14/admin/release-notes#3.14.2",
|
||||
"source": "product-cna@github.com"
|
||||
"source": "product-cna@github.com",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
110
README.md
110
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-11-15T17:00:20.137202+00:00
|
||||
2024-11-15T19:00:20.352944+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-11-15T16:57:10.080000+00:00
|
||||
2024-11-15T18:35:36.260000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,69 +33,69 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
269906
|
||||
269962
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `71`
|
||||
Recently added CVEs: `56`
|
||||
|
||||
- [CVE-2024-49754](CVE-2024/CVE-2024-497xx/CVE-2024-49754.json) (`2024-11-15T16:15:34.510`)
|
||||
- [CVE-2024-49758](CVE-2024/CVE-2024-497xx/CVE-2024-49758.json) (`2024-11-15T16:15:34.880`)
|
||||
- [CVE-2024-49759](CVE-2024/CVE-2024-497xx/CVE-2024-49759.json) (`2024-11-15T16:15:35.100`)
|
||||
- [CVE-2024-49764](CVE-2024/CVE-2024-497xx/CVE-2024-49764.json) (`2024-11-15T16:15:35.323`)
|
||||
- [CVE-2024-50350](CVE-2024/CVE-2024-503xx/CVE-2024-50350.json) (`2024-11-15T16:15:35.537`)
|
||||
- [CVE-2024-50351](CVE-2024/CVE-2024-503xx/CVE-2024-50351.json) (`2024-11-15T16:15:35.750`)
|
||||
- [CVE-2024-50352](CVE-2024/CVE-2024-503xx/CVE-2024-50352.json) (`2024-11-15T16:15:35.960`)
|
||||
- [CVE-2024-50355](CVE-2024/CVE-2024-503xx/CVE-2024-50355.json) (`2024-11-15T16:15:36.160`)
|
||||
- [CVE-2024-50647](CVE-2024/CVE-2024-506xx/CVE-2024-50647.json) (`2024-11-15T16:15:36.467`)
|
||||
- [CVE-2024-50648](CVE-2024/CVE-2024-506xx/CVE-2024-50648.json) (`2024-11-15T16:15:36.547`)
|
||||
- [CVE-2024-50649](CVE-2024/CVE-2024-506xx/CVE-2024-50649.json) (`2024-11-15T16:15:36.637`)
|
||||
- [CVE-2024-50650](CVE-2024/CVE-2024-506xx/CVE-2024-50650.json) (`2024-11-15T16:15:36.710`)
|
||||
- [CVE-2024-50651](CVE-2024/CVE-2024-506xx/CVE-2024-50651.json) (`2024-11-15T16:15:36.783`)
|
||||
- [CVE-2024-50652](CVE-2024/CVE-2024-506xx/CVE-2024-50652.json) (`2024-11-15T16:15:36.863`)
|
||||
- [CVE-2024-50724](CVE-2024/CVE-2024-507xx/CVE-2024-50724.json) (`2024-11-15T16:15:36.943`)
|
||||
- [CVE-2024-50986](CVE-2024/CVE-2024-509xx/CVE-2024-50986.json) (`2024-11-15T15:15:07.773`)
|
||||
- [CVE-2024-51164](CVE-2024/CVE-2024-511xx/CVE-2024-51164.json) (`2024-11-15T16:15:37.057`)
|
||||
- [CVE-2024-51494](CVE-2024/CVE-2024-514xx/CVE-2024-51494.json) (`2024-11-15T16:15:37.140`)
|
||||
- [CVE-2024-51495](CVE-2024/CVE-2024-514xx/CVE-2024-51495.json) (`2024-11-15T16:15:37.343`)
|
||||
- [CVE-2024-51496](CVE-2024/CVE-2024-514xx/CVE-2024-51496.json) (`2024-11-15T16:15:37.553`)
|
||||
- [CVE-2024-51497](CVE-2024/CVE-2024-514xx/CVE-2024-51497.json) (`2024-11-15T16:15:37.770`)
|
||||
- [CVE-2024-52526](CVE-2024/CVE-2024-525xx/CVE-2024-52526.json) (`2024-11-15T16:15:38.107`)
|
||||
- [CVE-2024-52555](CVE-2024/CVE-2024-525xx/CVE-2024-52555.json) (`2024-11-15T16:15:38.340`)
|
||||
- [CVE-2024-6413](CVE-2024/CVE-2024-64xx/CVE-2024-6413.json) (`2024-11-15T16:15:38.573`)
|
||||
- [CVE-2024-7865](CVE-2024/CVE-2024-78xx/CVE-2024-7865.json) (`2024-11-15T16:15:38.630`)
|
||||
- [CVE-2024-46467](CVE-2024/CVE-2024-464xx/CVE-2024-46467.json) (`2024-11-15T18:15:28.377`)
|
||||
- [CVE-2024-47759](CVE-2024/CVE-2024-477xx/CVE-2024-47759.json) (`2024-11-15T18:15:28.463`)
|
||||
- [CVE-2024-50653](CVE-2024/CVE-2024-506xx/CVE-2024-50653.json) (`2024-11-15T17:15:20.417`)
|
||||
- [CVE-2024-50654](CVE-2024/CVE-2024-506xx/CVE-2024-50654.json) (`2024-11-15T17:15:20.507`)
|
||||
- [CVE-2024-50655](CVE-2024/CVE-2024-506xx/CVE-2024-50655.json) (`2024-11-15T17:15:20.613`)
|
||||
- [CVE-2024-50800](CVE-2024/CVE-2024-508xx/CVE-2024-50800.json) (`2024-11-15T18:15:28.727`)
|
||||
- [CVE-2024-52507](CVE-2024/CVE-2024-525xx/CVE-2024-52507.json) (`2024-11-15T18:15:28.847`)
|
||||
- [CVE-2024-52508](CVE-2024/CVE-2024-525xx/CVE-2024-52508.json) (`2024-11-15T18:15:29.060`)
|
||||
- [CVE-2024-52509](CVE-2024/CVE-2024-525xx/CVE-2024-52509.json) (`2024-11-15T18:15:29.280`)
|
||||
- [CVE-2024-52510](CVE-2024/CVE-2024-525xx/CVE-2024-52510.json) (`2024-11-15T18:15:29.497`)
|
||||
- [CVE-2024-52511](CVE-2024/CVE-2024-525xx/CVE-2024-52511.json) (`2024-11-15T18:15:29.717`)
|
||||
- [CVE-2024-52512](CVE-2024/CVE-2024-525xx/CVE-2024-52512.json) (`2024-11-15T18:15:29.933`)
|
||||
- [CVE-2024-52513](CVE-2024/CVE-2024-525xx/CVE-2024-52513.json) (`2024-11-15T18:15:30.157`)
|
||||
- [CVE-2024-52514](CVE-2024/CVE-2024-525xx/CVE-2024-52514.json) (`2024-11-15T18:15:30.370`)
|
||||
- [CVE-2024-52515](CVE-2024/CVE-2024-525xx/CVE-2024-52515.json) (`2024-11-15T17:15:20.837`)
|
||||
- [CVE-2024-52516](CVE-2024/CVE-2024-525xx/CVE-2024-52516.json) (`2024-11-15T17:15:21.070`)
|
||||
- [CVE-2024-52517](CVE-2024/CVE-2024-525xx/CVE-2024-52517.json) (`2024-11-15T17:15:21.297`)
|
||||
- [CVE-2024-52518](CVE-2024/CVE-2024-525xx/CVE-2024-52518.json) (`2024-11-15T17:15:21.543`)
|
||||
- [CVE-2024-52519](CVE-2024/CVE-2024-525xx/CVE-2024-52519.json) (`2024-11-15T17:15:21.843`)
|
||||
- [CVE-2024-52520](CVE-2024/CVE-2024-525xx/CVE-2024-52520.json) (`2024-11-15T17:15:22.200`)
|
||||
- [CVE-2024-52521](CVE-2024/CVE-2024-525xx/CVE-2024-52521.json) (`2024-11-15T17:15:22.580`)
|
||||
- [CVE-2024-52522](CVE-2024/CVE-2024-525xx/CVE-2024-52522.json) (`2024-11-15T18:15:30.643`)
|
||||
- [CVE-2024-52523](CVE-2024/CVE-2024-525xx/CVE-2024-52523.json) (`2024-11-15T17:15:22.870`)
|
||||
- [CVE-2024-52525](CVE-2024/CVE-2024-525xx/CVE-2024-52525.json) (`2024-11-15T17:15:23.150`)
|
||||
- [CVE-2024-52528](CVE-2024/CVE-2024-525xx/CVE-2024-52528.json) (`2024-11-15T17:15:23.400`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `43`
|
||||
Recently modified CVEs: `39`
|
||||
|
||||
- [CVE-2024-49009](CVE-2024/CVE-2024-490xx/CVE-2024-49009.json) (`2024-11-15T16:02:11.097`)
|
||||
- [CVE-2024-49010](CVE-2024/CVE-2024-490xx/CVE-2024-49010.json) (`2024-11-15T15:59:36.937`)
|
||||
- [CVE-2024-49011](CVE-2024/CVE-2024-490xx/CVE-2024-49011.json) (`2024-11-15T16:16:21.817`)
|
||||
- [CVE-2024-49012](CVE-2024/CVE-2024-490xx/CVE-2024-49012.json) (`2024-11-15T16:16:05.507`)
|
||||
- [CVE-2024-49013](CVE-2024/CVE-2024-490xx/CVE-2024-49013.json) (`2024-11-15T16:14:55.170`)
|
||||
- [CVE-2024-49014](CVE-2024/CVE-2024-490xx/CVE-2024-49014.json) (`2024-11-15T15:55:46.947`)
|
||||
- [CVE-2024-49015](CVE-2024/CVE-2024-490xx/CVE-2024-49015.json) (`2024-11-15T16:07:40.680`)
|
||||
- [CVE-2024-49016](CVE-2024/CVE-2024-490xx/CVE-2024-49016.json) (`2024-11-15T16:07:22.397`)
|
||||
- [CVE-2024-49017](CVE-2024/CVE-2024-490xx/CVE-2024-49017.json) (`2024-11-15T16:07:03.200`)
|
||||
- [CVE-2024-49018](CVE-2024/CVE-2024-490xx/CVE-2024-49018.json) (`2024-11-15T16:06:29.407`)
|
||||
- [CVE-2024-49021](CVE-2024/CVE-2024-490xx/CVE-2024-49021.json) (`2024-11-15T16:04:55.487`)
|
||||
- [CVE-2024-49043](CVE-2024/CVE-2024-490xx/CVE-2024-49043.json) (`2024-11-15T16:05:30.773`)
|
||||
- [CVE-2024-50623](CVE-2024/CVE-2024-506xx/CVE-2024-50623.json) (`2024-11-15T16:15:36.367`)
|
||||
- [CVE-2024-5125](CVE-2024/CVE-2024-51xx/CVE-2024-5125.json) (`2024-11-15T16:35:09.290`)
|
||||
- [CVE-2024-51599](CVE-2024/CVE-2024-515xx/CVE-2024-51599.json) (`2024-11-15T16:55:34.480`)
|
||||
- [CVE-2024-51603](CVE-2024/CVE-2024-516xx/CVE-2024-51603.json) (`2024-11-15T16:24:18.843`)
|
||||
- [CVE-2024-51604](CVE-2024/CVE-2024-516xx/CVE-2024-51604.json) (`2024-11-15T16:19:11.063`)
|
||||
- [CVE-2024-51605](CVE-2024/CVE-2024-516xx/CVE-2024-51605.json) (`2024-11-15T16:31:12.773`)
|
||||
- [CVE-2024-51610](CVE-2024/CVE-2024-516xx/CVE-2024-51610.json) (`2024-11-15T16:32:46.277`)
|
||||
- [CVE-2024-51882](CVE-2024/CVE-2024-518xx/CVE-2024-51882.json) (`2024-11-15T16:08:40.333`)
|
||||
- [CVE-2024-52356](CVE-2024/CVE-2024-523xx/CVE-2024-52356.json) (`2024-11-15T16:05:12.367`)
|
||||
- [CVE-2024-52357](CVE-2024/CVE-2024-523xx/CVE-2024-52357.json) (`2024-11-15T16:04:45.767`)
|
||||
- [CVE-2024-52358](CVE-2024/CVE-2024-523xx/CVE-2024-52358.json) (`2024-11-15T16:17:40.127`)
|
||||
- [CVE-2024-9487](CVE-2024/CVE-2024-94xx/CVE-2024-9487.json) (`2024-11-15T16:57:10.080`)
|
||||
- [CVE-2024-9822](CVE-2024/CVE-2024-98xx/CVE-2024-9822.json) (`2024-11-15T16:41:41.507`)
|
||||
- [CVE-2024-47530](CVE-2024/CVE-2024-475xx/CVE-2024-47530.json) (`2024-11-15T18:03:06.497`)
|
||||
- [CVE-2024-47531](CVE-2024/CVE-2024-475xx/CVE-2024-47531.json) (`2024-11-15T18:02:14.250`)
|
||||
- [CVE-2024-47532](CVE-2024/CVE-2024-475xx/CVE-2024-47532.json) (`2024-11-15T17:59:51.307`)
|
||||
- [CVE-2024-48838](CVE-2024/CVE-2024-488xx/CVE-2024-48838.json) (`2024-11-15T17:36:43.520`)
|
||||
- [CVE-2024-49557](CVE-2024/CVE-2024-495xx/CVE-2024-49557.json) (`2024-11-15T17:36:47.110`)
|
||||
- [CVE-2024-49558](CVE-2024/CVE-2024-495xx/CVE-2024-49558.json) (`2024-11-15T17:35:54.480`)
|
||||
- [CVE-2024-49560](CVE-2024/CVE-2024-495xx/CVE-2024-49560.json) (`2024-11-15T17:35:25.407`)
|
||||
- [CVE-2024-49776](CVE-2024/CVE-2024-497xx/CVE-2024-49776.json) (`2024-11-15T18:35:34.550`)
|
||||
- [CVE-2024-49777](CVE-2024/CVE-2024-497xx/CVE-2024-49777.json) (`2024-11-15T18:35:35.413`)
|
||||
- [CVE-2024-49778](CVE-2024/CVE-2024-497xx/CVE-2024-49778.json) (`2024-11-15T18:35:36.260`)
|
||||
- [CVE-2024-50313](CVE-2024/CVE-2024-503xx/CVE-2024-50313.json) (`2024-11-15T17:12:44.410`)
|
||||
- [CVE-2024-51585](CVE-2024/CVE-2024-515xx/CVE-2024-51585.json) (`2024-11-15T17:17:47.730`)
|
||||
- [CVE-2024-51592](CVE-2024/CVE-2024-515xx/CVE-2024-51592.json) (`2024-11-15T17:04:52.197`)
|
||||
- [CVE-2024-51594](CVE-2024/CVE-2024-515xx/CVE-2024-51594.json) (`2024-11-15T17:15:21.580`)
|
||||
- [CVE-2024-51595](CVE-2024/CVE-2024-515xx/CVE-2024-51595.json) (`2024-11-15T17:03:07.770`)
|
||||
- [CVE-2024-51596](CVE-2024/CVE-2024-515xx/CVE-2024-51596.json) (`2024-11-15T17:01:15.687`)
|
||||
- [CVE-2024-51662](CVE-2024/CVE-2024-516xx/CVE-2024-51662.json) (`2024-11-15T17:16:49.063`)
|
||||
- [CVE-2024-52352](CVE-2024/CVE-2024-523xx/CVE-2024-52352.json) (`2024-11-15T17:46:27.217`)
|
||||
- [CVE-2024-52353](CVE-2024/CVE-2024-523xx/CVE-2024-52353.json) (`2024-11-15T17:49:31.553`)
|
||||
- [CVE-2024-52354](CVE-2024/CVE-2024-523xx/CVE-2024-52354.json) (`2024-11-15T17:50:59.703`)
|
||||
- [CVE-2024-52355](CVE-2024/CVE-2024-523xx/CVE-2024-52355.json) (`2024-11-15T17:51:44.273`)
|
||||
- [CVE-2024-5474](CVE-2024/CVE-2024-54xx/CVE-2024-5474.json) (`2024-11-15T17:00:35.697`)
|
||||
- [CVE-2024-6985](CVE-2024/CVE-2024-69xx/CVE-2024-6985.json) (`2024-11-15T17:10:59.157`)
|
||||
- [CVE-2024-8376](CVE-2024/CVE-2024-83xx/CVE-2024-8376.json) (`2024-11-15T17:21:02.327`)
|
||||
- [CVE-2024-9539](CVE-2024/CVE-2024-95xx/CVE-2024-9539.json) (`2024-11-15T17:15:06.600`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
360
_state.csv
360
_state.csv
@ -165897,9 +165897,12 @@ CVE-2021-1458,0,0,263d7494ed4bb1b0a3432ebf81af384e2ec6ecfdaed8077bd168e517083deb
|
||||
CVE-2021-1459,0,0,56b2fc01d86da20d71515cb6213cc91e2ec296f51bc138bcb5820738f8e3248e,2023-11-07T03:28:21.880000
|
||||
CVE-2021-1460,0,0,47be0f201f45cd0b8ceb48b3499e1efa0d43c1877b8142245b65f7263a024596,2023-11-07T03:28:22.057000
|
||||
CVE-2021-1463,0,0,ffc195d1166bc0d6787fdfc0cec2580a3b2a53f31d28fce59ec0c8b46d296b2b,2023-11-07T03:28:22.227000
|
||||
CVE-2021-1464,1,1,69edcf99fca42452877c7d99e0481d6c6243b3bf0d342c9185950d620f44722b,2024-11-15T17:15:07.350000
|
||||
CVE-2021-1466,1,1,144b47122f71eb87a6dfc75681d4034620a616551c642a5d0941c7094143eeb3,2024-11-15T17:15:07.670000
|
||||
CVE-2021-1467,0,0,16d0ae18a4d2970e8bc1800d9eb7f8e62737768f457e02f2477f0502b07369d4,2023-11-07T03:28:22.400000
|
||||
CVE-2021-1468,0,0,b25464624e6ccf5128973d4bf048ad5c527411837ef5d1b126d3a376b7afb008,2023-11-07T03:28:22.600000
|
||||
CVE-2021-1469,0,0,bd141bfbb413c72f4175f3d230bbd06d7b95d511ced58c2fb5e5d84b94e51c9c,2023-11-07T03:28:22.787000
|
||||
CVE-2021-1470,1,1,2e6e28520ccceb170365b941f3bfbe4d6f793cf1fa9fc71d2f2fe07f0ee4a45c,2024-11-15T17:35:11.340000
|
||||
CVE-2021-1471,0,0,2ed8200049e51b6d7c3a7000c469f7d473f831b4dc4eb802e8c6662692462f3a,2023-11-07T03:28:22.960000
|
||||
CVE-2021-1472,0,0,741c86b32193afd497d137042e32b87a97a950d8b7a1bbce814fd37a18694853,2023-11-07T03:28:23.127000
|
||||
CVE-2021-1473,0,0,06e55996caf568e77ab9f88592bfa7a6c84580fd7dd89d962ac6095e3bd0c8fb,2023-11-07T03:28:23.327000
|
||||
@ -165910,14 +165913,20 @@ CVE-2021-1477,0,0,ce4b0e06660cc36e91f4b739c1de03794220cace0d4f46d2d7ab91a8a91d7b
|
||||
CVE-2021-1478,0,0,0a73c19d88561a03362db2711e06d63404108331636a97fd3769648c3609667c,2023-11-07T03:28:24.250000
|
||||
CVE-2021-1479,0,0,03206262a2ad10b36e2bd9a6c464f6ff92d82ba06c821de662f3258be81971ca,2023-11-07T03:28:24.437000
|
||||
CVE-2021-1480,0,0,fa4d61c697b5eb46a2c0e7b6a4f78ef1ae9eca007d7b580c9d9d852aeb21a0f6,2023-11-07T03:28:24.607000
|
||||
CVE-2021-1481,1,1,b21a88f00dea192a0875ee705b85d0561e70266c1ccfc14aa3a403328a05a470,2024-11-15T17:15:08.277000
|
||||
CVE-2021-1482,1,1,0476c0df73ef662b2b6f0f2840b91c04fbe05790f1471aeeffc90edfd16d31fe,2024-11-15T17:15:08.530000
|
||||
CVE-2021-1483,1,1,cc1f0eab0f727d87a84bffa706316af41e2f9ebaadc9122759ef823e64b19443,2024-11-15T17:15:08.760000
|
||||
CVE-2021-1484,1,1,ed06f966ff1a17a8d14eed009e5c0700b7e04a831af0ed038d2e9250c28441df,2024-11-15T17:15:08.983000
|
||||
CVE-2021-1485,0,0,e4890f167b9430fa6559ddd87381a3e2cd7e165f9f9f713ee68aac837d657b8b,2023-11-07T03:28:24.777000
|
||||
CVE-2021-1486,0,0,51c76d642672f3d43e8e0ec81b52ff874d878e9e6c2d81aa10deb18a80a13b94,2023-11-07T03:28:24.957000
|
||||
CVE-2021-1487,0,0,88a69f88b70ea4d8163acbb4d132f134525cadf0fc0263d65a3fa79cb9c41927,2023-11-07T03:28:25.120000
|
||||
CVE-2021-1488,0,0,8d507186241cf4ca8f136368d17565793565f1cbc266a9c9ada2ff6df3e9f97f,2023-11-07T03:28:25.300000
|
||||
CVE-2021-1489,0,0,1df7ed8ed63ef77a936f8562cbeb8c0b409103fa24faf53519ceab2c50fddc15,2021-05-09T02:41:29.470000
|
||||
CVE-2021-1490,0,0,d83f13a770baa445700cb222e2ffaf188dbb98ae0e300164d2ae22136186da73,2023-11-07T03:28:25.480000
|
||||
CVE-2021-1491,1,1,1702cfcf21275fe33c8397437163bb99c396169ee42615c32ad7c8c80c1d42f8,2024-11-15T17:15:09.220000
|
||||
CVE-2021-1492,0,0,a69047622f80854df4ebb0282bbd625633a27bc29349c6dd23618cf9df0f72be,2021-03-27T03:29:38.427000
|
||||
CVE-2021-1493,0,0,1972fe993c347c9cea2e8eb1cb5110425f1d779b9b88aa05049e99c9a0ad82af,2023-11-07T03:28:25.657000
|
||||
CVE-2021-1494,1,1,1f7b59aff15d7824f0ab33957eaca5131f497f08823befcd6c909de7471bd189,2024-11-15T17:15:09.423000
|
||||
CVE-2021-1495,0,0,dc2985faadbc016aaf69732c00934b0bfe0e76ad4afb876f2b4d3c9fce405acd,2023-11-07T03:28:25.833000
|
||||
CVE-2021-1496,0,0,8500d9350f301c5993471cace6bdea0ff38e1db7d30046ec6244f4d3b6c4fbb0,2023-11-07T03:28:26.017000
|
||||
CVE-2021-1497,0,0,7aff829bd7102e7218ed7977e28442b8bd5c83b225095b13fe23f759d2a734f0,2024-07-25T17:32:35.267000
|
||||
@ -173603,7 +173612,7 @@ CVE-2021-29030,0,0,668b234f031a9afddc3313c3706c3aabd60d8b142a10483bf025fb74d7980
|
||||
CVE-2021-29031,0,0,75e7ebf82318e6e9f048bc211d75ab98a4eabb993013fc6de9161a17a4071c2c,2021-03-24T15:11:15.467000
|
||||
CVE-2021-29032,0,0,76d754de11bd965f6651616a6d7b98c4e5dce137557c8bebf0bb2ab2db0e462e,2021-03-24T15:11:33.467000
|
||||
CVE-2021-29033,0,0,60d767518da428a2005fca7ce27e0ca3a754e2b2837a161d9b6ff4ec9ed86b1d,2021-03-24T15:11:47.137000
|
||||
CVE-2021-29038,0,0,5c2058106212a3134ab3f1e0eb26280032ab4a722985fd68a3b546b21dd2e2a8,2024-02-22T19:07:37.840000
|
||||
CVE-2021-29038,0,1,372b679d0df0950850c0fee22b0e5db5e0afb4e9914d7ca6b773089e93b45b18,2024-11-15T18:35:29.580000
|
||||
CVE-2021-29039,0,0,6aa5914f8ab5325d882a0d83275fe034bbcf3abf5b9a7bb89b18a9f0029ff38d,2021-05-24T19:26:32.200000
|
||||
CVE-2021-29040,0,0,54ec79200ea8a2572e64518b3fadba87f883efa852528386d386a9aab10c4e70,2021-05-24T19:17:41.780000
|
||||
CVE-2021-29041,0,0,aa55497562c8a420125fd12f4ba2303ac441fc5b7bf916164939105ac453158a,2021-05-24T19:00:08.610000
|
||||
@ -178000,6 +178009,10 @@ CVE-2021-34746,0,0,5f1c9f950c5a7bdfb338a415b4f605c55da56a39232c402eddadf135d38b2
|
||||
CVE-2021-34748,0,0,827d9e9dc0a23e7dfa19a7e36199b1eb91cf2be59987763b3d8d77aa72a9c62c,2023-11-07T03:36:18.053000
|
||||
CVE-2021-34749,0,0,ac11e1c4f7cbb25a3e55c8936c31bd39a324d277bdb8c816e5f8460000095de2,2023-11-07T03:36:18.510000
|
||||
CVE-2021-3475,0,0,11f13dc2193da9f811eb73ebe62f9b8e02d1bb42f041a704fb956e47200bb4d0,2023-02-03T23:53:29.553000
|
||||
CVE-2021-34750,1,1,5be5097f0b46c08acb3b10bf1e03ca6590d854c0a993075c16cc5a3f97e40534,2024-11-15T17:15:09.657000
|
||||
CVE-2021-34751,1,1,0d4ba3c4b24daac7b0de0220a70f9e2e04faa7cdd39553de5621a704a2e7abfa,2024-11-15T17:15:09.883000
|
||||
CVE-2021-34752,1,1,73e1ee213770bf47ac96b0028a6af3d273ec66f6096cba730774d655805a4fb8,2024-11-15T17:15:10.097000
|
||||
CVE-2021-34753,1,1,c9a6e295f9b82d0d7806f07a38b273f27c21d7a1b084d96ad869445d730dbee9,2024-11-15T17:15:10.303000
|
||||
CVE-2021-34754,0,0,78316189d4816d16fbe2300d25329a00a2aa7a4fe282f57f3ba65151b9a8f75c,2023-11-07T03:36:18.717000
|
||||
CVE-2021-34755,0,0,d847d28e5b0f9b3ea8e438a851e6118ab2f5fcc6b5efe4d3db27453d24cda1a0,2023-11-07T03:36:18.923000
|
||||
CVE-2021-34756,0,0,a8bb35a7b253afd1195ba525bf5832d6023c4c71dfbcc9876714da89cd83c081,2023-11-07T03:36:19.103000
|
||||
@ -190125,14 +190138,16 @@ CVE-2022-20622,0,0,21f8864443a2ef64c107280614b898e9b5d4c9e8c77661acad69cff2f1a46
|
||||
CVE-2022-20623,0,0,7c797f2b6141740b167d12f60757b1cdad545053d3150326da5778540cb57a02,2023-11-07T03:42:28.110000
|
||||
CVE-2022-20624,0,0,3c70791dc122586abc481fbd7bb7216723c3e6d202f07e63cbb1e6162b35f5fa,2023-11-07T03:42:28.307000
|
||||
CVE-2022-20625,0,0,b2289228f7d56d599a0cac3cd2984eb7943c96e01df0e18df0052f01f8d4a9e0,2023-11-07T03:42:28.523000
|
||||
CVE-2022-20626,1,1,71d7034560b3981ea3bd3ba6ca05c8a821b253c0fd58e019fbe642ed9e598ccb,2024-11-15T16:15:19.287000
|
||||
CVE-2022-20626,0,0,71d7034560b3981ea3bd3ba6ca05c8a821b253c0fd58e019fbe642ed9e598ccb,2024-11-15T16:15:19.287000
|
||||
CVE-2022-20627,0,0,61e6aaadc7256ae597e1358157a3f8a7ca5c65ceb03de865f99c00b8cc067e76,2023-11-07T03:42:28.730000
|
||||
CVE-2022-20628,0,0,2d913383575108b406c6fd7f6d7b27f7042313f3ec94ec4b865b29c23ff51516,2023-11-07T03:42:28.940000
|
||||
CVE-2022-20629,0,0,349b8459f865e323293bf05068ff9de40ca8c8ffdf8aa26427123369090292d1,2023-11-07T03:42:29.150000
|
||||
CVE-2022-2063,0,0,d062d780a00017fb43c5ea9093ff0ade157df72419b34c1782bda4532983613e,2022-06-22T15:15:56.310000
|
||||
CVE-2022-20630,0,0,13b8dfdcba520d48f3edc38534d08ff817268f168eafce0c2fa806a535bf598b,2023-11-07T03:42:29.340000
|
||||
CVE-2022-20631,1,1,e7f1fe229b50433969790eff74efa4aae4b10defefdad753b836d39da4042706,2024-11-15T16:15:19.527000
|
||||
CVE-2022-20634,1,1,48c40b6618c9373d684cf71f1c386b2094b7fd260584dffa83cb52e6f13c9c85,2024-11-15T16:15:19.747000
|
||||
CVE-2022-20631,0,0,e7f1fe229b50433969790eff74efa4aae4b10defefdad753b836d39da4042706,2024-11-15T16:15:19.527000
|
||||
CVE-2022-20632,1,1,092f04c16c87003ff0331633a2abc962051fbc319803b3a3b3ed638c10f500c7,2024-11-15T17:15:10.583000
|
||||
CVE-2022-20633,1,1,84a931f94c69649be41e63c6c98a1073baebf4e9533cbc9297879cf6cb491e23,2024-11-15T17:15:10.820000
|
||||
CVE-2022-20634,0,0,48c40b6618c9373d684cf71f1c386b2094b7fd260584dffa83cb52e6f13c9c85,2024-11-15T16:15:19.747000
|
||||
CVE-2022-20635,0,0,312537bfc7fadc3f4a5ae453076f673da67ee7fd6d6c549bd850db6bbd3634f5,2023-11-07T03:42:29.527000
|
||||
CVE-2022-20636,0,0,cb1e137161d1f8bb5eb5658fe185dcf66aa86cbb228fbedff5a38969384418c1,2023-11-07T03:42:29.713000
|
||||
CVE-2022-20637,0,0,6c706a8e39f723ce20951f46cff7c8db43813cd9854833ae35aa389e314d6648,2023-11-07T03:42:29.910000
|
||||
@ -190147,24 +190162,24 @@ CVE-2022-20644,0,0,0b78bd45d6c626c7de60e88864441db476f08a5174dd41f6637b7edccc7f2
|
||||
CVE-2022-20645,0,0,160c71f81c35d36d8616f55bb4461f93f9d6e0502c187926122b382be552fc94,2023-11-07T03:42:31.427000
|
||||
CVE-2022-20646,0,0,ef0f3bd90058a0fbc8ce4e9e70856731466565eb44005ab60f710d7413f85873,2023-11-07T03:42:31.623000
|
||||
CVE-2022-20647,0,0,d692c23c3d73e41484cc8829c6fef8bb7f01eaadabaa22a077af57a682a118b8,2023-11-07T03:42:31.810000
|
||||
CVE-2022-20648,1,1,562f23b1937d127df3ea41a2276f5e7197ae5ed5a0fa8cb86fcea1b92269b63d,2024-11-15T16:15:19.983000
|
||||
CVE-2022-20649,1,1,8155ccf997bad476539f5908278a9fb6af22a844515ebeff02b78573f25b19cc,2024-11-15T16:15:20.247000
|
||||
CVE-2022-20648,0,0,562f23b1937d127df3ea41a2276f5e7197ae5ed5a0fa8cb86fcea1b92269b63d,2024-11-15T16:15:19.983000
|
||||
CVE-2022-20649,0,0,8155ccf997bad476539f5908278a9fb6af22a844515ebeff02b78573f25b19cc,2024-11-15T16:15:20.247000
|
||||
CVE-2022-2065,0,0,571960ee80a382ed580e7d50315d006024f880324c003ffed0bd463503bb2a8a,2022-06-22T16:20:27.387000
|
||||
CVE-2022-20650,0,0,390d5d5a31497df0829ae3a8fc18eb7f62e12fd0be6f7fb4d5181ea2eae9bff8,2023-11-07T03:42:31.993000
|
||||
CVE-2022-20651,0,0,d94f842526344890878ca96e31695d88f10dc06979f9c817f5f2aba7d6da3f9d,2023-11-07T03:42:32.200000
|
||||
CVE-2022-20652,1,1,f09523846e227026ee68c0eb35b1818ad786a9eddbdedfddee4965b8ae83736d,2024-11-15T16:15:20.520000
|
||||
CVE-2022-20652,0,0,f09523846e227026ee68c0eb35b1818ad786a9eddbdedfddee4965b8ae83736d,2024-11-15T16:15:20.520000
|
||||
CVE-2022-20653,0,0,970fcc0d6442596100c16b68df05f9dad01eb21b28dfd29c61acafe7da6b8ed4,2023-11-07T03:42:32.423000
|
||||
CVE-2022-20654,1,1,6d5ad5888c06146b87ff8b655e3550807cdbee3f61d9fe4b625555b16f4a4d67,2024-11-15T16:15:20.767000
|
||||
CVE-2022-20655,1,1,8f64410d345cab96b82fbe57818b3d1e3d9a6ea1a40fe710503a24b34cd3534c,2024-11-15T16:15:20.987000
|
||||
CVE-2022-20656,1,1,94d0d175330b07bdd1dd64cfefab5a80bd81f2f0a1fbb504960830adc92aaeeb,2024-11-15T16:15:21.237000
|
||||
CVE-2022-20657,1,1,7baaace96e123a6345b4bb4abaa834dde9cfba9ca99b0ed993ff6964c5a74a33,2024-11-15T16:15:21.473000
|
||||
CVE-2022-20654,0,0,6d5ad5888c06146b87ff8b655e3550807cdbee3f61d9fe4b625555b16f4a4d67,2024-11-15T16:15:20.767000
|
||||
CVE-2022-20655,0,0,8f64410d345cab96b82fbe57818b3d1e3d9a6ea1a40fe710503a24b34cd3534c,2024-11-15T16:15:20.987000
|
||||
CVE-2022-20656,0,0,94d0d175330b07bdd1dd64cfefab5a80bd81f2f0a1fbb504960830adc92aaeeb,2024-11-15T16:15:21.237000
|
||||
CVE-2022-20657,0,0,7baaace96e123a6345b4bb4abaa834dde9cfba9ca99b0ed993ff6964c5a74a33,2024-11-15T16:15:21.473000
|
||||
CVE-2022-20658,0,0,774a5dde9c2ecf972fc765622b6d0329acd4851f27b3d1ab2d6b2cbfc1ac03cd,2023-11-07T03:42:32.603000
|
||||
CVE-2022-20659,0,0,3fd61ea02c1112c94dc17c417ca780e8ee231b8cf54650606f53f7fde39a0294,2023-11-07T03:42:32.800000
|
||||
CVE-2022-2066,0,0,568eafb08191ec2a4e1a7f2d0ecaf78921ed93b231ddacd6663ad37debc4f4d6,2022-06-22T16:21:24.417000
|
||||
CVE-2022-20660,0,0,25e35575d22740895f29ecfa5b6f10e97e537332cd507b8a5a02cfdb0a151c82,2023-11-07T03:42:33
|
||||
CVE-2022-20661,0,0,ebbc5bdda270769928f447c068a18170348fd8ac2a4054e266807c3234e50017,2023-11-07T03:42:33.230000
|
||||
CVE-2022-20662,0,0,fb11ce878bd9e5767617bbb14056b29a23c7fb6e26be8d2cdbb2091ddaa1a1bf,2023-11-07T03:42:33.423000
|
||||
CVE-2022-20663,1,1,36394921b0dcdb60ecef258e3301f4f1586711911ece1d2d90660247854d0552,2024-11-15T16:15:21.693000
|
||||
CVE-2022-20663,0,0,36394921b0dcdb60ecef258e3301f4f1586711911ece1d2d90660247854d0552,2024-11-15T16:15:21.693000
|
||||
CVE-2022-20664,0,0,be14e0a88f9bd5873e4e7d83da3f9a1ae1ddad4b757d0073bdb5b8e0e8b0b849,2023-11-07T03:42:33.617000
|
||||
CVE-2022-20665,0,0,65ea883e8571a97a65aa5035f73402c0028f57d383f6bc792038f719cc5b4623,2023-11-07T03:42:33.803000
|
||||
CVE-2022-20666,0,0,554438e89eef0f5407fb469b9bc4b48cb7fd326de5225a6475b70540a51c7fc5,2023-11-07T03:42:33.990000
|
||||
@ -190188,7 +190203,7 @@ CVE-2022-20681,0,0,8ce88ca30f33ba86a2d4adc3dd9bbad9d36c51fccd8d2b3acc49b78d941ac
|
||||
CVE-2022-20682,0,0,25a7eb9330f70ef9976d6c55d4569af37b05abd1af56d00ee24736136c649e0c,2023-11-07T03:42:37.030000
|
||||
CVE-2022-20683,0,0,a354d3c0e5b0f24befc71439adf6bbcbde0e7e37e1c93f2b570b32d1492672af,2023-11-07T03:42:37.410000
|
||||
CVE-2022-20684,0,0,ace0be60e7c6730ba3570013e8fe871c4b55baaaeff74811edd07de64469e799,2023-11-07T03:42:37.597000
|
||||
CVE-2022-20685,1,1,bd96f0d54eae7ff5d0ea140707a16b5191f28fb92f723d510b739e1db809af63,2024-11-15T16:15:21.910000
|
||||
CVE-2022-20685,0,0,bd96f0d54eae7ff5d0ea140707a16b5191f28fb92f723d510b739e1db809af63,2024-11-15T16:15:21.910000
|
||||
CVE-2022-20686,0,0,63471bf91a63f74f5bc4dc22960373a5446fe8fcf9d0734fbd1b5b92fd83f77b,2024-01-25T17:15:14.263000
|
||||
CVE-2022-20687,0,0,c86852782558780f02ecbadae1910d7d3d8aa5808e760b8d6bee105b7473f89d,2024-01-25T17:15:14.410000
|
||||
CVE-2022-20688,0,0,349b788ecdc733c67c5b8c538600b2022545072f056bfdf0f4685151c41347d6,2024-01-25T17:15:14.540000
|
||||
@ -190277,7 +190292,7 @@ CVE-2022-20762,0,0,288f61e6fd65ba791a1a7db2c5f51d79a13328f1955ce01c53ef82ffdb7b8
|
||||
CVE-2022-20763,0,0,e6700aed27706764408fa6238a5bbf832a8e2d16b381788d9bafcb2d443e7342,2023-11-07T03:42:52.870000
|
||||
CVE-2022-20764,0,0,9d232eabbd0c2be2319c5539459914b198378ecb409a966ef5a73adbeb491896,2023-11-07T03:42:53.053000
|
||||
CVE-2022-20765,0,0,61b2c3dbcaea45db7f3243431662ba7c2881cbdb7a5d7d6956de355f8ab882d9,2023-11-07T03:42:53.240000
|
||||
CVE-2022-20766,1,1,11eade385af401c66fba3bea146972bc7aaa61ec2923546c24dc6a13d120ab95,2024-11-15T16:15:22.133000
|
||||
CVE-2022-20766,0,0,11eade385af401c66fba3bea146972bc7aaa61ec2923546c24dc6a13d120ab95,2024-11-15T16:15:22.133000
|
||||
CVE-2022-20767,0,0,bf3e408f2ddb577255f2a65ca0d92afecbfac86b6c268999a1d91a15bb935a65,2023-11-07T03:42:53.413000
|
||||
CVE-2022-20768,0,0,b31df78e6f7a1690a0e6dc9026760925463d8c56c3c89a6df70005c95c07a8b4,2023-11-07T03:42:53.597000
|
||||
CVE-2022-20769,0,0,9b39cf5519304df5f8eb08403777d95fd8d0b56cec10c7963730515e4701a15c,2023-11-07T03:42:53.770000
|
||||
@ -190307,7 +190322,7 @@ CVE-2022-2079,0,0,960f06c13a414a3705d83f5387631ce2fc7a4df365ebb43e16e4f2c0a1119b
|
||||
CVE-2022-20790,0,0,8dfe9c0790bcdd9e5d24c882a8764e4f3efe0ffb7dfafa8ed6588c86d8874174,2023-11-07T03:42:57.763000
|
||||
CVE-2022-20791,0,0,0a0d06758ea5b6a8a0bfa7e93734af692de69e6ae62272ab0563b7dca0259a54,2023-11-07T03:42:57.940000
|
||||
CVE-2022-20792,0,0,9d31518fb1ecca5bf2eef7cab0f72d7aed9df73b04ddb2aa2f1a47344b6e4d20,2023-10-01T11:15:10.490000
|
||||
CVE-2022-20793,1,1,d42474ba7afc1fa88b1811e630c9cc232b04180956634328a3450ec92af25992,2024-11-15T16:15:22.370000
|
||||
CVE-2022-20793,0,0,d42474ba7afc1fa88b1811e630c9cc232b04180956634328a3450ec92af25992,2024-11-15T16:15:22.370000
|
||||
CVE-2022-20794,0,0,db18b8afc597f4f3ca2303342cd61b95263cdf62a8397bee6efeefd72db9573f,2023-11-07T03:42:58.150000
|
||||
CVE-2022-20795,0,0,401cda8a7f1773e7dc44867691432480a43fc9bb2bb011a5642d8e138d4bbbef,2023-11-07T03:42:58.327000
|
||||
CVE-2022-20796,0,0,d10c97adcc8041fe2197f037ec61ff1033fc25e78b803756d801f9e39c0f073a,2023-11-07T03:42:58.520000
|
||||
@ -190330,7 +190345,7 @@ CVE-2022-20810,0,0,d465eef9b8b49f6cfb2d6bafb33fa2e371f9e6acad1c0018859266ef98cb7
|
||||
CVE-2022-20811,0,0,894662974debbe90d9048d04c2e89055d5abb1a4cf1c1d40eeea299833ae5fe9,2023-11-07T03:43:01.097000
|
||||
CVE-2022-20812,0,0,ab77d59c65b8c3b8fa22769a2502e274cfb97592b7f62e8f7e615979b1069764,2023-11-07T03:43:01.317000
|
||||
CVE-2022-20813,0,0,41ff039ab407da2aee799c0e1f824d1a5aed4332ff899eff1c4f22e18add2aca,2023-11-07T03:43:01.517000
|
||||
CVE-2022-20814,1,1,2a51a8ad0b3a6aea61694eae4c68a3c856708276243d42739a7f8962ab6a8c3c,2024-11-15T16:15:22.670000
|
||||
CVE-2022-20814,0,0,2a51a8ad0b3a6aea61694eae4c68a3c856708276243d42739a7f8962ab6a8c3c,2024-11-15T16:15:22.670000
|
||||
CVE-2022-20815,0,0,3b286a33cd412277cd07ecc33c3a88fe24589d1bb8e68df238991b9f13826a97,2023-11-07T03:43:01.693000
|
||||
CVE-2022-20816,0,0,f11ccbdc893ee80f99212c658d510a9d68a3c1dc64cf17744fc0ba52a820c978,2023-11-07T03:43:01.880000
|
||||
CVE-2022-20817,0,0,d44f2aa7ff7acf966547c59d8fb64b08a5a1dc81ddb4d70dbf3284d5da7cd837,2023-11-07T03:43:02.067000
|
||||
@ -190363,16 +190378,16 @@ CVE-2022-20841,0,0,e14c27fc3061f8b1830c57f8e521b083f3ab7f22e5a692520de69b6b21ca5
|
||||
CVE-2022-20842,0,0,1d7d4435c2ef9a46ba9809bda8eab515ed9c7fc8e795761c86bc8df5d0a73cb5,2023-11-07T03:43:06.253000
|
||||
CVE-2022-20843,0,0,6316d53e796b332df867738f37e3f529db0c0e2177960556c25cdb7820dae231,2024-01-25T17:15:17.370000
|
||||
CVE-2022-20844,0,0,b1a64b1a4c5d7dcc8860c07126d6ed58b168d65f2b142dae84529b201148addd,2023-11-07T03:43:06.533000
|
||||
CVE-2022-20845,1,1,31837f57a193b5de7f66c9b5307ced859f47e302726debf13e0c26ba2cb2ff84,2024-11-15T16:15:22.913000
|
||||
CVE-2022-20846,1,1,1b03b1c123c48d1a360c4a170ea42c62a7566a09fc99da03090658cf6b439522,2024-11-15T16:15:23.120000
|
||||
CVE-2022-20845,0,0,31837f57a193b5de7f66c9b5307ced859f47e302726debf13e0c26ba2cb2ff84,2024-11-15T16:15:22.913000
|
||||
CVE-2022-20846,0,1,b266aef901830297af5ceb0ec26b4641fcef2dbd86d472d6ec9fb62c386bb1ca,2024-11-15T17:15:11.147000
|
||||
CVE-2022-20847,0,0,d21ac3e78f416486eced7fa6cfc95babac837c7da6572789bb1ab30b56b84e30,2023-11-07T03:43:06.717000
|
||||
CVE-2022-20848,0,0,6856ea2a34bbbf446a21aebecd96700714cd1b28252f9d8d45fbb3b93186ddbf,2023-11-07T03:43:06.903000
|
||||
CVE-2022-20849,1,1,d0b7b0f488f1e88d4c0d5b5c4f1d0d1788625fb8a626a15634326e38180e40c3,2024-11-15T16:15:23.327000
|
||||
CVE-2022-20849,0,0,d0b7b0f488f1e88d4c0d5b5c4f1d0d1788625fb8a626a15634326e38180e40c3,2024-11-15T16:15:23.327000
|
||||
CVE-2022-2085,0,0,f4cc97e054d518a1b8e57be5dd18f72a26616e2d14ce992571496bd5c70179fd,2023-09-17T07:15:07.477000
|
||||
CVE-2022-20850,0,0,24d532a63709c9c79d292d9ed54926b717811f58afab7f6b996c677a1adbd1d6,2023-11-07T03:43:07.130000
|
||||
CVE-2022-20851,0,0,2e7bafafa01d45a84d4b2a8c580c4c75362d932b722c85590bceb09f3183033d,2023-11-07T03:43:07.323000
|
||||
CVE-2022-20852,0,0,1bdd9d0b9d69398e7edb0f874a3fffa56b7b8b47091299d08b5674ce44cb70b3,2023-11-07T03:43:07.543000
|
||||
CVE-2022-20853,1,1,4e2aa3c2ab3b57418dc6f78d60a93e0308d1f0dd505f9ecdfa4e1881453e3373,2024-11-15T16:15:23.540000
|
||||
CVE-2022-20853,0,0,4e2aa3c2ab3b57418dc6f78d60a93e0308d1f0dd505f9ecdfa4e1881453e3373,2024-11-15T16:15:23.540000
|
||||
CVE-2022-20854,0,0,1a05af98dc8d2ef15178eb96b0b76560c3e4cb96313975c5ea578841c47c60c1,2024-01-25T17:15:17.553000
|
||||
CVE-2022-20855,0,0,9f6f93783492963335ac892a343dd4cdacef454e1b9b7dce8584d27bdc95e2a6,2023-11-07T03:43:07.853000
|
||||
CVE-2022-20856,0,0,868e5ad39f52bfd78d3e7385f0e52869ec525ec684dde7ef1c1c7286d1dd3549,2023-11-07T03:43:08.077000
|
||||
@ -190392,7 +190407,7 @@ CVE-2022-20868,0,0,4640e0357abedaa6546d966462561149d797bdbab2bbadadef49344d3fd11
|
||||
CVE-2022-20869,0,0,8887b091e307a2f88853ff131574b445d6e7f0597cb704fb6a7c61e6418f8a49,2023-11-07T03:43:10.317000
|
||||
CVE-2022-2087,0,0,fda9e6cd2c392bb72803e7dbda3914e31ca3ca5df0dd6e23a58310711305f386,2022-06-23T20:18:52.003000
|
||||
CVE-2022-20870,0,0,6f92229442f62bfb5da21fcb7695aab7bb0921406738dfb31ff76b5d6bb0dcdd,2023-11-07T03:43:10.497000
|
||||
CVE-2022-20871,1,1,c0532d5e751d14eba9b12dbc2b35817cb13c35611c95884f40f9e516900fb05e,2024-11-15T16:15:23.757000
|
||||
CVE-2022-20871,0,0,c0532d5e751d14eba9b12dbc2b35817cb13c35611c95884f40f9e516900fb05e,2024-11-15T16:15:23.757000
|
||||
CVE-2022-20872,0,0,1945a4dcb7945d859a19d40da445928f2094af2529e1e70a83a3bd202f8c41ee,2024-01-25T17:15:18.350000
|
||||
CVE-2022-20873,0,0,d8bf430445adaf3263b8acd5192c1bd1d0db328031972aa64cfb0f60a4b16104,2023-11-07T03:43:10.800000
|
||||
CVE-2022-20874,0,0,0e01d51ac565010ffd696d15a51e5ae7cc5c44445885b94d7f0d2d506e5aa9d1,2023-11-07T03:43:10.993000
|
||||
@ -190458,7 +190473,7 @@ CVE-2022-20928,0,0,b4bd8b7eb9845a5dea83e785fb8c3899d259ad181c9b176e8422c105f318b
|
||||
CVE-2022-20929,0,0,9f8c5dc9e36cc6b7f4e13cb5e0133b8ef9c8d1c97757a2f523c4c08c6c4607c4,2024-01-25T17:15:19.680000
|
||||
CVE-2022-2093,0,0,f9b6c46d92ed3a273479f0aac6b074690a25c899c0a81056db6bb170ebe3407a,2022-07-15T21:04:01.350000
|
||||
CVE-2022-20930,0,0,b8872f19944e1a2247dfb95b6faf0c0e7eaa3d2f18cea7fdfefae7f7900b33c7,2023-11-07T03:43:20.913000
|
||||
CVE-2022-20931,1,1,e5fb10462a81b13c06dd06c488845db7d743f391aacd2eb72f311a695bbf6842,2024-11-15T16:15:23.967000
|
||||
CVE-2022-20931,0,0,e5fb10462a81b13c06dd06c488845db7d743f391aacd2eb72f311a695bbf6842,2024-11-15T16:15:23.967000
|
||||
CVE-2022-20932,0,0,7c4fcd146ede3d6f7ba677a46479a351e54f0aa5e1d73606f8df1118caa068ff,2024-01-25T17:15:19.803000
|
||||
CVE-2022-20933,0,0,1e3f8165b47aa08c2f85f22683a82391e523ba4b3d0e0e05c77690809d7d71d4,2023-11-07T03:43:21.230000
|
||||
CVE-2022-20934,0,0,3eca5a2d3b359874a263a3a14b4a938cd00d4932f8daa7be0579a8c705e9bdc8,2024-01-25T17:15:19.910000
|
||||
@ -190466,7 +190481,7 @@ CVE-2022-20935,0,0,c6cd0d5563c829bcad9fdec873f413150075b70909f2cdd7967e28a06c665
|
||||
CVE-2022-20936,0,0,79a4d834423e5e48bbc06de76ac7d3473907bd3fa94c8bdf1610226472c24195,2024-01-25T17:15:20.170000
|
||||
CVE-2022-20937,0,0,8e5b375c4457ca31958f4afc7ba467afb9b666e17cd09da694c6761da19c3374,2024-01-25T17:15:20.310000
|
||||
CVE-2022-20938,0,0,0716f27fa0cadcc725b3df26d6c7e6466d6941bf89479f43ef098c881ea48696,2024-01-25T17:15:20.443000
|
||||
CVE-2022-20939,1,1,e07cbe365a6e87f2c336d694baaf775b629f4d76606c9e96fda3e9aa795547b0,2024-11-15T16:15:24.200000
|
||||
CVE-2022-20939,0,0,e07cbe365a6e87f2c336d694baaf775b629f4d76606c9e96fda3e9aa795547b0,2024-11-15T16:15:24.200000
|
||||
CVE-2022-2094,0,0,aa8e90b78fb16ce790f2711a054b3e1e1aff3fd1748a249ad1a0e41c3a136bb8,2023-11-07T03:46:12.680000
|
||||
CVE-2022-20940,0,0,af53884143c8285046170dd4e82cf6cbdd440ae613a8d35ce9164ebe27f7d939,2024-01-25T17:15:20.583000
|
||||
CVE-2022-20941,0,0,71446826ba7b5ebf325cbe0c4e0c055414ee6e18ba4a0637ac686f9ae7cb72c3,2024-01-25T17:15:20.713000
|
||||
@ -190476,7 +190491,7 @@ CVE-2022-20944,0,0,d58bd4035167d677f318709b4ebea617d8d18c861ba0013d9b503a3010875
|
||||
CVE-2022-20945,0,0,9ac7c9cd20a7de1d05f991eb10d16d7f1862b368e5a43a2c5aa867e25e186258,2023-11-07T03:43:22.547000
|
||||
CVE-2022-20946,0,0,b0ea2682a6374774770e0bcbde525c8be07755eccbfc5b7daca4813803d1ed24,2024-01-25T17:15:21.187000
|
||||
CVE-2022-20947,0,0,bc3e0c6e94591d9afa8eb56626954db5e7a8bf9b8f24b857429895e836356bb1,2024-01-25T17:15:21.303000
|
||||
CVE-2022-20948,1,1,228c80ec66473cd1e93ed08690f05a2f53bf644debb790097de9e597079ad5a2,2024-11-15T16:15:24.427000
|
||||
CVE-2022-20948,0,0,228c80ec66473cd1e93ed08690f05a2f53bf644debb790097de9e597079ad5a2,2024-11-15T16:15:24.427000
|
||||
CVE-2022-20949,0,0,0c27a247c22579ca4e19d2d036bd7af81f0fba76711a1a7a70435d0fa406e580,2024-01-25T17:15:21.460000
|
||||
CVE-2022-2095,0,0,3c251989bea580be837ba52fc5502217dfec5c99671ae55c970e8f7da9e0ae82,2022-08-11T15:01:36.410000
|
||||
CVE-2022-20950,0,0,a1584a6de4bec827872a5671921aa2b3aac3dc26894b0a2f83afd677eb9cc1d3,2024-01-25T17:15:21.597000
|
||||
@ -214726,7 +214741,7 @@ CVE-2023-1999,0,0,83389713b72fbb33f0448bb5b017209184e6ccef0d6519c942437609b0d8d1
|
||||
CVE-2023-2000,0,0,8cd3accd68d360d71369e55670660f98528dc3de89fec28ade37ccac2b39579a,2023-05-09T16:31:00.540000
|
||||
CVE-2023-20002,0,0,ff13495a0460fbbacc056e6923313814b51b36acd21f7c9330f556a50e5a03b3,2024-01-25T17:15:23.817000
|
||||
CVE-2023-20003,0,0,8fe26b3bec3529a10e55876a22ec60b9ee58198c132d4ff5edf36301727ae87b,2023-11-07T04:05:41.743000
|
||||
CVE-2023-20004,1,1,b8b8bb895d1c0ffae6c7a94554cf6f58305da8062a3b0cc143d9c959768e78e9,2024-11-15T16:15:24.657000
|
||||
CVE-2023-20004,0,0,b8b8bb895d1c0ffae6c7a94554cf6f58305da8062a3b0cc143d9c959768e78e9,2024-11-15T16:15:24.657000
|
||||
CVE-2023-20005,0,0,e6f8b8b85fb6df871de6707dd09891ba34946e80382eb4a813f86c4405f5b2e8,2024-01-25T17:15:23.923000
|
||||
CVE-2023-20006,0,0,622425150ebc1a2988c05bbaea651c7a6ed670ba7f0e101f079ee845f25f6c12,2024-01-25T17:15:24.040000
|
||||
CVE-2023-20007,0,0,1e7c88b95bdcf2290facf5bbacd178b32fa5b1d81010bee0a06d65a221ba36af,2024-01-25T17:15:24.170000
|
||||
@ -214761,10 +214776,10 @@ CVE-2023-20032,0,0,0fee7d5743a2e252d59b0ededb2008bac10fa1267c3289a466f3942175317
|
||||
CVE-2023-20033,0,0,bd6288e791dfb3c89867f4824e1ee919aae061f3e96f787678743266c88dcf23,2024-01-25T17:15:26.057000
|
||||
CVE-2023-20034,0,0,afd24b3dbdd5e84fb716ee5384c251e519b4b7ebccb7a61a644c5b76dafe5b5b,2024-01-25T17:15:26.360000
|
||||
CVE-2023-20035,0,0,bf990679f6d153aa28516a84b9951dc45b406e82f1842f688d0df62730227192,2023-11-07T04:05:49.507000
|
||||
CVE-2023-20036,1,1,916e6764f208248dc43a0b22f54d555c1ce314abeb0e390cc5c0ab5ae85d622e,2024-11-15T16:15:24.950000
|
||||
CVE-2023-20036,0,0,916e6764f208248dc43a0b22f54d555c1ce314abeb0e390cc5c0ab5ae85d622e,2024-11-15T16:15:24.950000
|
||||
CVE-2023-20037,0,0,c2914760d5e410f5261b59e565cefb8d4f1ad623014e2dd1e8cb5eb583c1e599,2024-01-25T17:15:26.570000
|
||||
CVE-2023-20038,0,0,57f68a49cbd3aba16d00a0b70502d11657968cc0f76448d9c73d428db9623a97,2024-01-25T17:15:26.670000
|
||||
CVE-2023-20039,1,1,d65c08ea066f3359ebb27749600ec14b5f90b5612ef5e69d2cf14f12a603e408,2024-11-15T16:15:25.157000
|
||||
CVE-2023-20039,0,0,d65c08ea066f3359ebb27749600ec14b5f90b5612ef5e69d2cf14f12a603e408,2024-11-15T16:15:25.157000
|
||||
CVE-2023-2004,0,0,43f7bc74ef9fcd317532bd3537b64c658f91f5edb3bbc6123888b6bcd27ec49a,2023-11-07T04:11:40.947000
|
||||
CVE-2023-20040,0,0,0922a655363fa1ec544d5405a43843e57a5d1d552046d1047b53c5b382f2b45c,2024-01-25T17:15:26.757000
|
||||
CVE-2023-20041,0,0,fd5755bac85a4f3c718b0f1eb74d0c569a2cc18341d3c265f8df5cf4be80a077,2024-01-25T17:15:26.853000
|
||||
@ -214787,7 +214802,7 @@ CVE-2023-20057,0,0,043792f5aee16aeaeb4241db65fe08863eb4a3d25ab39d0568d5bffb0a156
|
||||
CVE-2023-20058,0,0,ad815c14d82ee176555edb6a4e2052d61f7ea3f63365c395b0328bebd76c78c0,2024-01-25T17:15:28.070000
|
||||
CVE-2023-20059,0,0,b99d0f72dcc000eb953ace65e13282c926b8d14b4c6816adcddee8cc0dd72692,2023-11-07T04:05:53.953000
|
||||
CVE-2023-2006,0,0,576ccd01f75cc25728924f4ed5e26d8b930bd4477bce9be56dd71bf07e1c6057,2023-08-25T15:23:55.877000
|
||||
CVE-2023-20060,1,1,4fe227273b5e34e9cbc20e8fc1a831f4459e6cc67c0f6ea42c5c4cf1a0dfdf59,2024-11-15T16:15:25.357000
|
||||
CVE-2023-20060,0,0,4fe227273b5e34e9cbc20e8fc1a831f4459e6cc67c0f6ea42c5c4cf1a0dfdf59,2024-11-15T16:15:25.357000
|
||||
CVE-2023-20061,0,0,2ec24e7f0c8bcf98f0de0b7378a7de0b9009080959b3f6e60b70d985f8c0253b,2023-11-07T04:05:54.383000
|
||||
CVE-2023-20062,0,0,74adefadccfa785110e4e05f634c8688933a1b2a514cb692712de49e45b87ba6,2023-11-07T04:05:54.797000
|
||||
CVE-2023-20063,0,0,ab9aa4a035ed2a1055c8eae268aa7b6b803ad113e479a4dca4e69fb32738c3a9,2024-10-23T17:15:13.320000
|
||||
@ -214820,11 +214835,11 @@ CVE-2023-20087,0,0,133c6492751092d6c28ab324bb58a12f819bd773f8708e73bfb29f97a2be8
|
||||
CVE-2023-20088,0,0,705f2ea50f1d59a2e3ad7ebc85510dd9d8de6350673ed4bdfd84da5ef77c6e04,2023-11-07T04:06:01.113000
|
||||
CVE-2023-20089,0,0,984606cfab01f8b8da767b529c591d341f255333dd5307e8011a8533079438b1,2023-11-07T04:06:01.503000
|
||||
CVE-2023-2009,0,0,f993c356b46fc35d0cbf9d2c6587ae24636f78445d0fc0982a31ae802aada552,2023-11-07T04:11:41.033000
|
||||
CVE-2023-20090,1,1,7d8ed5165f13ce8abe5c92710ba00fc6627539c932bfceefcd559e7d5c2d9c0c,2024-11-15T16:15:25.560000
|
||||
CVE-2023-20091,1,1,7957d54a758c97d56ea8f39938f86e458704a25f7e6f0d0392c890dc728d5579,2024-11-15T16:15:25.770000
|
||||
CVE-2023-20092,1,1,c4563a1f3434466be4aea0d7227c50c30aa74a790971fa8ffe4531c50241f35f,2024-11-15T16:15:25.980000
|
||||
CVE-2023-20093,1,1,300b01ffe6545980e2d5e8da2c4875c20bcc800d9dad4aca9740acdc9fbd769b,2024-11-15T16:15:26.187000
|
||||
CVE-2023-20094,1,1,c772b82858adcd41613402d4f19b1e84a24c9a0c5be417184c8d0d17eedefdc1,2024-11-15T16:15:26.390000
|
||||
CVE-2023-20090,0,0,7d8ed5165f13ce8abe5c92710ba00fc6627539c932bfceefcd559e7d5c2d9c0c,2024-11-15T16:15:25.560000
|
||||
CVE-2023-20091,0,0,7957d54a758c97d56ea8f39938f86e458704a25f7e6f0d0392c890dc728d5579,2024-11-15T16:15:25.770000
|
||||
CVE-2023-20092,0,0,c4563a1f3434466be4aea0d7227c50c30aa74a790971fa8ffe4531c50241f35f,2024-11-15T16:15:25.980000
|
||||
CVE-2023-20093,0,0,300b01ffe6545980e2d5e8da2c4875c20bcc800d9dad4aca9740acdc9fbd769b,2024-11-15T16:15:26.187000
|
||||
CVE-2023-20094,0,0,c772b82858adcd41613402d4f19b1e84a24c9a0c5be417184c8d0d17eedefdc1,2024-11-15T16:15:26.390000
|
||||
CVE-2023-20095,0,0,c1d39625b73fc4114d101d356e72bcbfa28ba08de7f2dbc09ec224218c1f83e0,2024-01-25T17:15:29.320000
|
||||
CVE-2023-20096,0,0,5ec9d92a3c53d239a4bea6ac652028ebc9a4f75c4f12a87c04a0f5b9d268f7d1,2023-11-07T04:06:01.853000
|
||||
CVE-2023-20097,0,0,0f1b759fa19d9d1fbf0d1fb932575fa350688fd85c697d74def63c42805ec83a,2023-11-07T04:06:02.180000
|
||||
@ -214855,7 +214870,7 @@ CVE-2023-20121,0,0,358dbca94d32e6dcf0b3104823aa6eef27bbc41a499c165775feefef3dd70
|
||||
CVE-2023-20122,0,0,7c9e16c7a0ee316d150ed9cf383eca40d39459afaa779ec2d9350f20bcf1e719,2023-11-07T04:06:06.620000
|
||||
CVE-2023-20123,0,0,1938d04db810293056039009697e32a6b0e0e894259a64bf86651878bc0084e4,2023-11-07T04:06:06.960000
|
||||
CVE-2023-20124,0,0,e83f8aaae6cd3d65ff2154227681c9318ae0e3b7070056480e66eb5d3b4ab066,2023-11-07T04:06:07.280000
|
||||
CVE-2023-20125,1,1,4d3ece80bb2bc98d6b9179f7ff626afd566df172ea9eac0084c18d7ae4849bdd,2024-11-15T15:15:05.347000
|
||||
CVE-2023-20125,0,0,4d3ece80bb2bc98d6b9179f7ff626afd566df172ea9eac0084c18d7ae4849bdd,2024-11-15T15:15:05.347000
|
||||
CVE-2023-20126,0,0,f839d079229ba6c1e694033f3ce70a9f46e6c8795d13d51bd2484856d9f0674a,2023-11-07T04:06:07.613000
|
||||
CVE-2023-20127,0,0,5dd1b97bf22fd06bfdbb3184f8e0d784536bbcfd9846484be1e70c5dfc0a2bdf,2023-11-07T04:06:07.933000
|
||||
CVE-2023-20128,0,0,84d58c0ee921e563d643445e5800ae3cd231b79ec1aa65fe75f6d6b469342bc7,2023-11-07T04:06:08.293000
|
||||
@ -214887,7 +214902,7 @@ CVE-2023-20150,0,0,94ea55c7c3cf20c73cbf1b524abac3dc9bbcc065627308840f1663af75b5b
|
||||
CVE-2023-20151,0,0,88742a817c2df6fdace33e29b508ea48e1e2e1dc833b2f75c7b254b36e99152c,2023-11-07T04:06:15.360000
|
||||
CVE-2023-20152,0,0,b285aade6162740e6dd931c919008308d719b96b4e7dc41373d9b5d41f9dc560,2023-11-07T04:06:15.710000
|
||||
CVE-2023-20153,0,0,ae7f889caea069cd7690b5f9920f78358d15337fff658fe3de0d3daef91d68f0,2023-11-07T04:06:16.027000
|
||||
CVE-2023-20154,1,1,4d0a0d038c8b5442778ad17b85c37cdb9cd722940a6cd558087f26d17561d095,2024-11-15T15:15:05.697000
|
||||
CVE-2023-20154,0,0,4d0a0d038c8b5442778ad17b85c37cdb9cd722940a6cd558087f26d17561d095,2024-11-15T15:15:05.697000
|
||||
CVE-2023-20155,0,0,33b71951116186ed9605c91d855e2b68ba331011dda75495bb098ec5b6e270bb,2024-01-25T17:15:31.683000
|
||||
CVE-2023-20156,0,0,ea0e130fec2d57b54bae7e81d6b74b3374f2cc6170c056dd2fc367148eca7107,2023-11-07T04:06:16.423000
|
||||
CVE-2023-20157,0,0,bbdecebb32e3e6b666e8da5d3dee094804414044129700721a781dd8705107e8,2023-11-07T04:06:16.923000
|
||||
@ -241913,7 +241928,7 @@ CVE-2024-0403,0,0,60e2bc88e92810ed72ef2996e4d2d759ca3bc0f293ee405aa604a1736f0dd6
|
||||
CVE-2024-0404,0,0,267abbe2ff290c3b77a55510b83fb776d7ef5ba08b1e7aa00fb99b1a3b94e009,2024-04-16T13:24:07.103000
|
||||
CVE-2024-0405,0,0,66f278ea46b088f52ebb4b38f4ef42b6f80eccd9a2f6905641a7e3bb3c98f38b,2024-01-24T17:23:09.773000
|
||||
CVE-2024-0406,0,0,00691f3e97095f7797b778e136f67313da4ee5005641a54e751fff886b78962c,2024-04-08T18:48:40.217000
|
||||
CVE-2024-0407,0,0,0e84b3507983daa04b361f9ab4440365192ec477ea85d3878f953e6a1ca2e94f,2024-02-22T19:07:37.840000
|
||||
CVE-2024-0407,0,1,845032af1abe4df4d480ed927b876c7e0caeb6b81b3bfd21922c9b1c715d366b,2024-11-15T18:35:31.860000
|
||||
CVE-2024-0408,0,0,da14a0008a1f28062fd759482e67948d91b898dac00f491b3f46d1fd1f2d182e,2024-09-16T16:15:12.447000
|
||||
CVE-2024-0409,0,0,b9b920cb31e8a9757b8815a5b45bb04b88a36f65a0bfb89820c247491a2aa112,2024-09-16T16:15:12.617000
|
||||
CVE-2024-0410,0,0,8855b841f08bc0b807343dd7ef72faf063c406af2c68e097af1f2d342abe8bd4,2024-10-03T07:15:27.943000
|
||||
@ -242927,7 +242942,7 @@ CVE-2024-10686,0,0,fcdad82b29385ae50029c826386214a0438adfef3126687e07ca7cc6d4975
|
||||
CVE-2024-10687,0,0,2d74811f2fc6d3aaef423135ea18016bd4a20ce3a927ba94efb8aa3eac4c5b2f,2024-11-08T15:26:52.523000
|
||||
CVE-2024-10688,0,0,2bcb0cc2d0a39373aaf27b3a9b6b49c4606abf5541b93372733fc379535c54ca,2024-11-12T13:56:24.513000
|
||||
CVE-2024-1069,0,0,9f4b19e535b82e8b50b814b402985dc45959fb8eebaa25a120ba3f787349c9c3,2024-02-06T20:11:52.587000
|
||||
CVE-2024-10691,1,1,db2c0688a52bf60c2a1055a856c5f32b6875efacbb339285fcf0094be8a5d17a,2024-11-15T15:15:05.943000
|
||||
CVE-2024-10691,0,0,db2c0688a52bf60c2a1055a856c5f32b6875efacbb339285fcf0094be8a5d17a,2024-11-15T15:15:05.943000
|
||||
CVE-2024-10693,0,0,2a11d3d5f51d0b8c3f7c9ca79b8ec09785ef4fc759c11326213a65170220169f,2024-11-12T13:56:24.513000
|
||||
CVE-2024-10694,0,0,05c164a4732350edd5fee46247e775b1e69a11363b78cebc8b6784de8da1fb44,2024-11-11T21:15:06.030000
|
||||
CVE-2024-10695,0,0,c91c88b2e014c926c977a623d612f44936109b69ef58435a4fdca68abda40e21,2024-11-14T19:44:16.020000
|
||||
@ -243127,13 +243142,13 @@ CVE-2024-11059,0,0,de7cfb30a6274819a2f3576f81d64b58ec0837ba2b51799f2a317460e7cb2
|
||||
CVE-2024-1106,0,0,20cb4a0a045157ac9e013fd166b9513d5a44a1304cf8a8ccabd3185b4a52ab40,2024-10-27T23:35:01.747000
|
||||
CVE-2024-11060,0,0,59a41911bcfc298095aabf4f558a2377a774e2b5628861d2f98e8a12c664f388,2024-11-12T16:15:20.447000
|
||||
CVE-2024-11061,0,0,d8f9bef48761b4e4749749cf732ccf55059f93d4170dee66c1cfe0b2a4ff086c,2024-11-13T23:04:25.633000
|
||||
CVE-2024-11062,0,0,fd55df6ee60df3ac3e659d07193cf97542af5dcd211c78f8b53360e3a9e97cc9,2024-11-12T13:55:21.227000
|
||||
CVE-2024-11063,0,0,1a3eff04d87f74bc64be56e4515d0ac1a1dad44d3ef5f9e41d9c2ff803dd28c6,2024-11-12T13:55:21.227000
|
||||
CVE-2024-11064,0,0,fbc6fc46169b65b5e9f021a6e3aa02dddacbcbeaa8df4c510741f7cfa069b0a2,2024-11-12T13:55:21.227000
|
||||
CVE-2024-11065,0,0,bfb35f980499608a9a3496379264eb51d60e25932db9b7623457d633eef9a55d,2024-11-12T13:55:21.227000
|
||||
CVE-2024-11066,0,0,a4cbe189914f12c5d2c97a6da0947cc3e10eb247702d656a1dbe04db5cfbb7fb,2024-11-12T13:55:21.227000
|
||||
CVE-2024-11067,0,0,5483dbfbd683f340236ce9255ef6a7c7f72011fb5216fc7269ab5aac0d5213a7,2024-11-12T13:55:21.227000
|
||||
CVE-2024-11068,0,0,4b051dd1e90eddfcfc88c8711edd0209408a9ba2f8b4588824fefefed2e09378,2024-11-12T13:55:21.227000
|
||||
CVE-2024-11062,0,1,382398a254813285a8ce00b946267d17abf1e43f0a04fb87d058a641703ccc25,2024-11-15T18:21:42.127000
|
||||
CVE-2024-11063,0,1,c82d798dd5590a078b5d7d26840dc30b4d0e6afdb1c08ee601fbc34cd61d9b36,2024-11-15T18:21:55.407000
|
||||
CVE-2024-11064,0,1,7bc630a0bda7c8d299c9c3d34681318b70b580b6ee835e3a35824920be4cbd1c,2024-11-15T18:22:07.027000
|
||||
CVE-2024-11065,0,1,07ecc20a5dd82ce3ecccd8bd16ce6c9c834a7ee14450b7b733f59e01e4d5af6b,2024-11-15T18:22:28.430000
|
||||
CVE-2024-11066,0,1,e16818aa9ce80078f2734ac486cf4eb542ac5bd17e4c391662d4998111e3a483,2024-11-15T18:22:45.323000
|
||||
CVE-2024-11067,0,1,56467501c947edd55cd4613fd2ef381247159c27f7d35a83af06c94b6a86acf3,2024-11-15T18:23:32.557000
|
||||
CVE-2024-11068,0,1,f7e9062074774d089c911b3e1747ffd8f63444b7d0cb3b7ce8ded4e6fed69b57,2024-11-15T18:24:25.127000
|
||||
CVE-2024-1107,0,0,7fae6df9cdce298be180c2cb6d3dacceb0e976e847fc87cce19a7d73f37dfe2b,2024-09-16T19:08:27.840000
|
||||
CVE-2024-11070,0,0,3b497257d1d87e8089d11256275eff956cb64bd2c8e5b58c0672dafc5015efdc,2024-11-12T13:55:21.227000
|
||||
CVE-2024-11073,0,0,7b275d77346d3baae5145fae1e1bc949854bb720c1a66c386a5f1f31e520bae5,2024-11-12T13:55:21.227000
|
||||
@ -243168,9 +243183,9 @@ CVE-2024-11123,0,0,2c2c3a47aaef9d48349e1017759c96035abab5e51ba4d62444aa173a7ccd2
|
||||
CVE-2024-11124,0,0,efd601a275819de67bd20a9a8d3bf2e3170b2fecab4aaf15486a28875c9a9123,2024-11-12T15:48:59.103000
|
||||
CVE-2024-11125,0,0,122a7b88d4467b2583e8cd046c15116b4ff84a1dc79b401a73643c2cfd3066b9,2024-11-12T15:48:59.103000
|
||||
CVE-2024-11126,0,0,b967d4c9797ae557d5008a2e89e34b56b8ab089540ce69fba53b421e80e1e708,2024-11-12T15:48:59.103000
|
||||
CVE-2024-11127,0,0,872c91b8fef54d334e58f460ad31540519bfcc5b745ac9da794cfe9b05f34fe8,2024-11-12T15:48:59.103000
|
||||
CVE-2024-11127,0,1,7d1296cebc7c05fd3dd6b306ae87cbc2c9940166d503543487e9da9414a97cf7,2024-11-15T17:29:43.450000
|
||||
CVE-2024-1113,0,0,6955c6c679809523d129efea09ef779c898e264f7e3230a68d2b1fd615c8f410,2024-05-17T02:35:14.663000
|
||||
CVE-2024-11130,0,0,578a772ca1269be9bdc99bb966d7eb9c39dbd0e02e5dba4d3229d53dfaceb8e4,2024-11-12T15:48:59.103000
|
||||
CVE-2024-11130,0,1,15b63aa205de6a4f54c182b134585f269cb8266092a000bd91d13bef5e0dadb4,2024-11-15T17:57:53.270000
|
||||
CVE-2024-11136,0,0,24240577f7b850705f8148f1e2257c636c3b9dc696f019566c5d55e0511cc8a2,2024-11-15T13:58:08.913000
|
||||
CVE-2024-11138,0,0,7b0edb369e2d9df427aea00759a3991acb4ee32080a1e83cba9502f5a7a362f2,2024-11-13T17:01:58.603000
|
||||
CVE-2024-1114,0,0,4ba1cd03fbc35862ac6b2ce79da50122dd303ea22f4f4a45a352ffb5be12a8ee,2024-05-17T02:35:14.777000
|
||||
@ -243206,13 +243221,17 @@ CVE-2024-11238,0,0,f196800203d7a40ea6fe71674205d5ffdaa3f312de9f25c1b832724bfe8a5
|
||||
CVE-2024-11239,0,0,f1dab3b1bd9473b4d4db92608adf6e4ae1f9c5d4ed0e180c09e7deb1a37f009f,2024-11-15T14:23:55.747000
|
||||
CVE-2024-1124,0,0,913ac2351f43d83be68411d873bf568715eb455fa7fe6219a9189bc1238726a9,2024-03-11T01:32:39.697000
|
||||
CVE-2024-11240,0,0,4cbdc145e46050047bae82d06e6eca707b526afd40e8adf36873c1573b95ee6e,2024-11-15T14:23:55.747000
|
||||
CVE-2024-11241,1,1,5adf62031ef29f2a6aff64af13c8577879fdb0eeb5c43426a2053134c8e9a63b,2024-11-15T15:15:06.003000
|
||||
CVE-2024-11242,1,1,b664b9f9ca5ef78a8f76c90b02dcb3e79e313f2513ec5d029d7980fcef3095d0,2024-11-15T15:15:06.280000
|
||||
CVE-2024-11243,1,1,07cdde05767a6c078a6880e496b4fc9b8dfe250fb9a8764bfb93c7dd52756f43,2024-11-15T15:15:06.557000
|
||||
CVE-2024-11244,1,1,eb8845955460a34ff0f05caa9bffc40321db9bab2c0d6c5ab4b0b8a45f110b8d,2024-11-15T16:15:32.790000
|
||||
CVE-2024-11245,1,1,1d3c3963003f652e39ad70e62873c3ce61143e6efc282e684e7f3305765b976f,2024-11-15T16:15:33.153000
|
||||
CVE-2024-11246,1,1,03623f9d2973a20ed102a61231dd48a6ec42601438415081c5e6186dd1e755c3,2024-11-15T16:15:33.593000
|
||||
CVE-2024-11241,0,0,5adf62031ef29f2a6aff64af13c8577879fdb0eeb5c43426a2053134c8e9a63b,2024-11-15T15:15:06.003000
|
||||
CVE-2024-11242,0,0,b664b9f9ca5ef78a8f76c90b02dcb3e79e313f2513ec5d029d7980fcef3095d0,2024-11-15T15:15:06.280000
|
||||
CVE-2024-11243,0,0,07cdde05767a6c078a6880e496b4fc9b8dfe250fb9a8764bfb93c7dd52756f43,2024-11-15T15:15:06.557000
|
||||
CVE-2024-11244,0,0,eb8845955460a34ff0f05caa9bffc40321db9bab2c0d6c5ab4b0b8a45f110b8d,2024-11-15T16:15:32.790000
|
||||
CVE-2024-11245,0,0,1d3c3963003f652e39ad70e62873c3ce61143e6efc282e684e7f3305765b976f,2024-11-15T16:15:33.153000
|
||||
CVE-2024-11246,0,0,03623f9d2973a20ed102a61231dd48a6ec42601438415081c5e6186dd1e755c3,2024-11-15T16:15:33.593000
|
||||
CVE-2024-11247,1,1,bce8b608709ee2f34f26a7ac0361a1afd401bbabed86d1e5122b198d8d891745,2024-11-15T17:15:19.237000
|
||||
CVE-2024-11248,1,1,05f63ae886ce8e4f4f6c9c95a9d19bf2bcd71685909c7308e46e3edf7854f64c,2024-11-15T17:15:19.580000
|
||||
CVE-2024-1125,0,0,f1d015036f4cdda32f03ba210c93a8838e991a1e1d168cce1bd81d56428097c5,2024-03-11T01:32:39.697000
|
||||
CVE-2024-11250,1,1,8b0e6334f9dcad2b90092c4673840dfd4d860cb1e6e6f8d5be015dbe688bf885,2024-11-15T18:15:26.280000
|
||||
CVE-2024-11251,1,1,e3365cd5b35beffead202860ed23ac651fd05ceb4020ebe0e15542749f7995ad,2024-11-15T18:15:26.653000
|
||||
CVE-2024-1126,0,0,719cb9688eaad755b04db0e390abb1a9b0b6a5e25f632a929e6736322faf9c06,2024-03-13T18:16:18.563000
|
||||
CVE-2024-1127,0,0,fc004f13d69dd65990588f481257d3c8dd60a3804cfac37ac389768e5b88f08c,2024-03-13T18:16:18.563000
|
||||
CVE-2024-1128,0,0,de5352d9c421a908307277eb7da3f5f6fcfc08a095ea033ab740d4804aa5ccea,2024-02-29T13:49:29.390000
|
||||
@ -244305,7 +244324,7 @@ CVE-2024-20369,0,0,e23910e4adf6ac7fe444b246c85eb12e2e56e7b12054f1339b9256c8ec4ec
|
||||
CVE-2024-20370,0,0,9c8d802e115773847851e6a87a7c6331398027635ff6abdb8c313a21d8306cc9,2024-10-25T12:56:36.827000
|
||||
CVE-2024-20371,0,0,5b763c21f0dad7933d07cd6f6f6dc5ca9ec50c488ae19c36eb22a1fb95a945ae,2024-11-06T18:17:17.287000
|
||||
CVE-2024-20372,0,0,feaf3b98a24bdcf61707d881e5427a56c3f9e9ebde0774029fc1bd7580a0df31,2024-11-05T16:04:41.993000
|
||||
CVE-2024-20373,1,1,a2c2841c5e75e2098b2545a81c3463193dde584ae470f938c5f5d2013afd2a94,2024-11-15T15:15:06.823000
|
||||
CVE-2024-20373,0,0,a2c2841c5e75e2098b2545a81c3463193dde584ae470f938c5f5d2013afd2a94,2024-11-15T15:15:06.823000
|
||||
CVE-2024-20374,0,0,e0c9fc3f494f29ebf625a888aaf98651649c668b7d5475f4297a0435038e214e,2024-10-25T12:56:36.827000
|
||||
CVE-2024-20375,0,0,a4ae364a987d406a5046b71b718fe2e5ce4da208cd9db67ac24eb19997b1276b,2024-08-21T17:24:59.627000
|
||||
CVE-2024-20376,0,0,616e740c2ab9d6be811f96c68e43db8bad88fc7cef9833f2acf95234fb3cc478,2024-05-01T19:50:25.633000
|
||||
@ -247379,7 +247398,10 @@ CVE-2024-2441,0,0,748a7ac4d6ed599dc743b338d434f4fac66b4e81d9dc4afe98a976de37bf66
|
||||
CVE-2024-2442,0,0,da6587851d777a7caecc3fd36ba9b67242261a5b34dedee058c0f959b1280fc4,2024-03-20T13:00:16.367000
|
||||
CVE-2024-2443,0,0,a8bbe87eac8a41399b1d0d3a72e714355872c34062df72f2bddd7214646f509e,2024-03-21T12:58:51.093000
|
||||
CVE-2024-2444,0,0,4077967648b87af230c120a80abe8a1c3709647ab561500ac246716e12815b1b,2024-08-08T21:35:09.480000
|
||||
CVE-2024-24447,1,1,7de8a37bbcca3834bb348521e76c5fcdb7608e804ddf780fc7d72494a9b71a38,2024-11-15T18:15:26.930000
|
||||
CVE-2024-24449,1,1,c1cedd05172c4efc6df6d5d561bf0d004bf06abec1c0e01707406c0e914ff17f,2024-11-15T18:15:27.013000
|
||||
CVE-2024-2445,0,0,4580fbdabeda1a44cff89d119283db83c12561dfbbac9584647c19bac102f840,2024-03-15T12:53:06.423000
|
||||
CVE-2024-24450,1,1,d81358a2964522ca6fb1f5769ded6178556fe128fbb0360faf4057187f926cee,2024-11-15T18:15:27.097000
|
||||
CVE-2024-2446,0,0,ef51f957632ec98e360c50fa0db196c0f3cfe0183f1093005f40b796022ec810,2024-03-15T12:53:06.423000
|
||||
CVE-2024-24468,0,0,bbac026196c9a5e8ca29f54a8d36ba3e229b24779335db2752c28502233c74ac,2024-02-07T22:03:09.897000
|
||||
CVE-2024-24469,0,0,118364649006ddd6dd7a0282a82463969addbea3b241460c52f60a3b25b50f38,2024-08-26T19:35:10.113000
|
||||
@ -254765,7 +254787,7 @@ CVE-2024-34391,0,0,fea0526d8b3f094ea1377906b102ca6f0f9ab852468be2342d35da7d8b322
|
||||
CVE-2024-34392,0,0,95f700dedff586182f66d1ca5e7da764d337c16226845e0ee1ec7b84b40d651f,2024-08-01T13:52:21.033000
|
||||
CVE-2024-34393,0,0,9d61a4306d036e5052fc5d8b364b63a626c2cc9af434ed24e38ecec71df608d5,2024-05-03T12:50:34.250000
|
||||
CVE-2024-34394,0,0,9d971c1ec9518d2a1ce0c68b603eddff6cf55abad02bc9ebdbbffcbdf77796e3,2024-05-03T12:50:34.250000
|
||||
CVE-2024-34397,0,0,16b5c41784e4f3ba325a2b1735509d7fce68bb2c9a1b2765d2c61257921c1fa2,2024-06-10T18:15:34.863000
|
||||
CVE-2024-34397,0,1,fbe115fc17ef3ae402335dbe24a2a48fe58cd8036552f43e922fe8ad96767329,2024-11-15T18:35:32.760000
|
||||
CVE-2024-34399,0,0,b575bfaa23d53510470a68bea01ab071e8876f6597cd9250405e7f9141fb6390,2024-09-20T12:30:17.483000
|
||||
CVE-2024-3440,0,0,534ad01cc4d99b7aec93fa9eb5959ed4cc5d68a1c33a8c467ae485dbc87a6451,2024-05-17T02:39:56.370000
|
||||
CVE-2024-34400,0,0,7810632e891837a80fc3ff6fe66a8824988f8d2b9291638447500bd6cfd0b44e,2024-11-05T15:35:14.213000
|
||||
@ -255009,7 +255031,7 @@ CVE-2024-34659,0,0,dd3f9420e24bf859148c793c2123fe1fcf6f82da97ec67367518f44415c24
|
||||
CVE-2024-3466,0,0,0337eeb2bb11dc2971562c8acd5fd5c98aad745dda4239343a7e69d2339c0489,2024-05-17T02:39:57.717000
|
||||
CVE-2024-34660,0,0,0b2d2bea24d7fa6e914da9f7286c2cb2a544faaaec97dda10fa17e8966604e75,2024-09-05T13:30:28.343000
|
||||
CVE-2024-34661,0,0,39eda7ed3fc18d4431971deb4f86b7b12866001e42dbec50f2575ba9405dbbce,2024-09-05T17:57:44.563000
|
||||
CVE-2024-34662,0,1,606c004802ffd4bbbf92e055cc11b6c203b0ea6fc76b4b2f8bcb431031d349ac,2024-11-15T16:34:28.937000
|
||||
CVE-2024-34662,0,0,606c004802ffd4bbbf92e055cc11b6c203b0ea6fc76b4b2f8bcb431031d349ac,2024-11-15T16:34:28.937000
|
||||
CVE-2024-34663,0,0,bc7e792d3bf9cb19b3bac7de5e5f393eda73c48981c29bad44b4305bf7709bc5,2024-10-10T12:57:21.987000
|
||||
CVE-2024-34664,0,0,b864c4351ccbb106aca6a04f609ab07081f58539736f6b0a259450595fc32b90,2024-10-10T12:57:21.987000
|
||||
CVE-2024-34665,0,0,8e97b696e2825593cef2b60bbd5fe842a775ccd597e31a6a3daa4e47d15b624a,2024-10-30T14:28:55.223000
|
||||
@ -258797,6 +258819,7 @@ CVE-2024-39720,0,0,d0abcb66b33d9eb5538e2c3f6b1c0a5ec90e4231fb92eae0b5bdb3698a665
|
||||
CVE-2024-39721,0,0,a53f4a408292484f4e31830b23f4d1e9fa44faea82210aef0c3385e6a6ce66da,2024-11-01T16:35:24.357000
|
||||
CVE-2024-39722,0,0,08a96543a5db4fbd3fecc413584aca3682c28f3fb47ec14ffd29adb20a7fbede,2024-11-01T15:35:17.693000
|
||||
CVE-2024-39723,0,0,003097d794792a3e1194202f71608927b35e402887d5f5ddf07d35b5dd183916,2024-07-11T14:54:10.243000
|
||||
CVE-2024-39726,1,1,0a5e81dbde3fa950422b79a0538ab8807c0f94b1a9dbcb7c4da57d86278a1408,2024-11-15T17:15:19.983000
|
||||
CVE-2024-39728,0,0,fba26233ce0c4692619efffa132c45bfb836485ad2132e6f2e6d7ce0ec6f97d0,2024-07-16T13:57:37.203000
|
||||
CVE-2024-39729,0,0,bfb0ee29aaef980e2b91ef648868f4c0e36729a7e019c3fc9d2073fdf0f8ba3f,2024-07-16T14:02:53.577000
|
||||
CVE-2024-3973,0,0,1e562721e06ec34010a875bed42bd8dd124b3449743c9a2acf9ba1a2336534dd,2024-08-07T15:17:46.717000
|
||||
@ -259182,6 +259205,7 @@ CVE-2024-40633,0,0,cb8b1e46d2fb0350ee65397b524eda33b035785c4ff54d8f631326909af07
|
||||
CVE-2024-40634,0,0,f0b1b04d49b6a98a87295b9d83a3ab2b8cbfe90c15ea00701d78a02066d0251e,2024-07-24T12:55:13.223000
|
||||
CVE-2024-40636,0,0,98744b954b3d196b3f10d684008952126f958b809a4f56d792514a1180b74df0,2024-07-18T12:28:43.707000
|
||||
CVE-2024-40637,0,0,8f01e513c3194bcf30056752321b26e2f21549acaed31b1fc0f5890d359b45ae,2024-07-19T14:37:17.863000
|
||||
CVE-2024-40638,1,1,db82f6838b27a691b85a6743c128cbf9ff57d7ead1ca3f936302168cd35bcc6b,2024-11-15T18:15:27.457000
|
||||
CVE-2024-40639,0,0,8bbb50b2a25542a9b7af4d56fa6e5b2d2c32a2fc32f95961ce4984af08c80bab,2024-07-17T20:15:06.603000
|
||||
CVE-2024-4064,0,0,3a1a40467a64f04bfa80ae5c066454b06b4092014a9e47cc1a50eb6eb22d315c,2024-05-17T02:40:14.223000
|
||||
CVE-2024-40640,0,0,7e1f28a17873c57850e387e604bc4923eccdf39126e84bd67e6dd03b6e2f6417,2024-07-18T12:28:43.707000
|
||||
@ -259881,6 +259905,7 @@ CVE-2024-41674,0,0,e673b8205e82a534b9a977608e67254dbf60c56054d2121630b866936cabb
|
||||
CVE-2024-41675,0,0,99d7bb404b6db7a620ac267d34a06ef7dcdda9c80bdd1ecb6c741290a9b47f60,2024-08-23T17:07:28.247000
|
||||
CVE-2024-41676,0,0,f8c727903895dd3f774fa8fafadf4d13b194d23bd32750d21228bccd7e3862a1,2024-08-23T13:44:42.487000
|
||||
CVE-2024-41677,0,0,350177b79949244cfbc185c5f18aee412a8902a49d36a53e1d4b50536f1effd5,2024-08-12T18:51:29.497000
|
||||
CVE-2024-41678,1,1,43bfd773fe0f389d4d2972065648cf80c04ab4504b31ed9b2e85f880173045d0,2024-11-15T18:15:27.720000
|
||||
CVE-2024-4168,0,0,7f4f833c88738c683a47d814a058bf8a730868170937a9aca799097bc79bf22f,2024-06-04T19:20:31.690000
|
||||
CVE-2024-41681,0,0,6dfdc16b96a5715c67e93e3b8e76db2de56f823b305a3ba2f49e1e9df8ebee6d,2024-08-14T18:37:06.540000
|
||||
CVE-2024-41682,0,0,b98500d64915be62a0e5e2d6d50336319231d8c45c711d39d83e7568c61fc3c7,2024-08-14T18:37:24.413000
|
||||
@ -259953,8 +259978,8 @@ CVE-2024-4176,0,0,2a1e283cc95c7d3d47b09f457f96512613ab4fb1878e9b333c02ce78f75d83
|
||||
CVE-2024-4177,0,0,e1d6d87dc8ef62b0d8de94cfe98a875b1cbd39c3640e8e02d8d5a4e8bb3cca88,2024-06-11T17:53:13.710000
|
||||
CVE-2024-41773,0,0,73b68ae1e3819b7d1bac9bdaf38a7a90512524d32ae7dfbb950bef5b99d479bb,2024-08-26T18:33:07.997000
|
||||
CVE-2024-41774,0,0,efcbfdf7ce18fcd97c6ecc860adabe2a80f23f77068d5d032fbe380664ccfbc3,2024-08-24T11:15:05.670000
|
||||
CVE-2024-41784,1,1,4b9bce87b99a4cb8633adeca46d5c13b7e94312b7a819f69309d37321034c793,2024-11-15T16:15:34.240000
|
||||
CVE-2024-41785,1,1,acdd00f5f60c3a57c055b3330660e51341a71d97fcd9840019eb93d619819ff9,2024-11-15T15:15:07.047000
|
||||
CVE-2024-41784,0,0,4b9bce87b99a4cb8633adeca46d5c13b7e94312b7a819f69309d37321034c793,2024-11-15T16:15:34.240000
|
||||
CVE-2024-41785,0,0,acdd00f5f60c3a57c055b3330660e51341a71d97fcd9840019eb93d619819ff9,2024-11-15T15:15:07.047000
|
||||
CVE-2024-41798,0,0,0376144119ee906fa3756a5ffda1af85d3678e11ad2cbd0913fd4be38d98ecf1,2024-10-10T12:56:30.817000
|
||||
CVE-2024-41799,0,0,7695f1ee4025235dd7412142131ce8d75a7b17a18d3cf669cff383f93f7dba19,2024-07-29T16:21:52.517000
|
||||
CVE-2024-4180,0,0,89f84993baa10ab5b41ed58678b5b9e31ff190980a67ee18130266156f7434fc,2024-06-04T16:57:41.053000
|
||||
@ -260932,7 +260957,7 @@ CVE-2024-43177,0,0,2e91df99c102e520c2bb937f75df1229588c30ac5f4c9282ac32d182ae564
|
||||
CVE-2024-4318,0,0,3bd63bc61468b7ca3d2d40c33a55eb01fa72ff95d7d5fb5f0e4f8d9b094da54b,2024-05-16T13:03:05.353000
|
||||
CVE-2024-43180,0,0,abb2e48a138ce8e840850ec2c73107ac445b622170d298531958775b0aa3e8a2,2024-09-20T17:28:06.617000
|
||||
CVE-2024-43188,0,0,e35d0111e2400440d7a3229650e46565d9a613f599bd61cb8e0041fbf0bfcd3f,2024-09-29T00:24:49.103000
|
||||
CVE-2024-43189,1,1,8361501fcc1618295692fa4ffcd954b7028fa6b3347368e6559d4521dfeabfce,2024-11-15T15:15:07.307000
|
||||
CVE-2024-43189,0,0,8361501fcc1618295692fa4ffcd954b7028fa6b3347368e6559d4521dfeabfce,2024-11-15T15:15:07.307000
|
||||
CVE-2024-4319,0,0,7ca0245a01df3d5ced472265b32f90c6f6a22a37af3715d5589379ecac1f6a24,2024-06-11T13:54:12.057000
|
||||
CVE-2024-43191,0,0,39f06d3c6ad8405bfc0c97c3e896524beacc5fba902e2cdc1730fdb616dc0623,2024-09-30T12:46:20.237000
|
||||
CVE-2024-43199,0,0,94150f8459e19abf18625a946d8a507867275817cd3d9928084030fcb7fa8330,2024-08-12T12:59:48.253000
|
||||
@ -261991,6 +262016,7 @@ CVE-2024-4461,0,0,51250da8bcd9ecf720caf9f3a7efd550d6e47af21e57f982fabb8237238dcf
|
||||
CVE-2024-44610,0,0,04bd20e65597a0e47eb48d662767349876511b643e2309be49dec3988931a8cd,2024-10-04T13:51:25.567000
|
||||
CVE-2024-4462,0,0,7de1c10fc651b37d9659e3e60da12a8c072b437874aeb6819554614b6acb9a58,2024-06-04T16:57:41.053000
|
||||
CVE-2024-44623,0,0,be0881fa228aca782008c2748d4b046bd517031ec8a03bf9e09823e1f811d2b8,2024-09-25T14:53:20.253000
|
||||
CVE-2024-44625,1,1,8b2d24925ebe1cc1d2ae855254c27874ba2f60efed82a7b89d29dab166144e27,2024-11-15T17:15:20.260000
|
||||
CVE-2024-4463,0,0,697d96b65b3f5bb41384b58e0f6586cf3caa8378b8edc45503427d4f5bdd2d8e,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4465,0,0,26ef4c6776c9d416386e05785f538f3827353feee51318ae877b367823cc1915,2024-09-20T13:15:19.850000
|
||||
CVE-2024-4466,0,0,b7aa09b25d001fa0ca3c8a92093b33e950eb38bf6c988ff6fde91a26b7231c00,2024-05-03T12:48:41.067000
|
||||
@ -262911,6 +262937,7 @@ CVE-2024-46376,0,0,f3c4758540f2ac7c03838f8eccd3f67c9d25fd080cb7169c664824c92406d
|
||||
CVE-2024-46377,0,0,dbd66064786bd129c8f0daf0f8e37ec51d021bf976974fef51557cd63106242d,2024-09-20T12:30:17.483000
|
||||
CVE-2024-4638,0,0,fdd077899626129e208d16f53a9a5482358eca01d91f2895388a2a3863f13467,2024-09-24T17:13:43.997000
|
||||
CVE-2024-46382,0,0,65cd8f8715b62b5a7598d3b8d6186f6e2f4b087b931ac8f129c8f64b10f1fd55,2024-09-25T16:56:09.927000
|
||||
CVE-2024-46383,1,1,679a9ac2144cd9e31a21deb625c79a17a5bf284718910987c893d728cb144734,2024-11-15T18:15:27.960000
|
||||
CVE-2024-4639,0,0,f02b5c58ae5a71f4f7afea4e263ab89427639817f2fb26164569232dacb74959,2024-10-10T10:39:06.410000
|
||||
CVE-2024-46394,0,0,2516725e4bff704e46174a8f5632e7834a8075c579df9c6725759cf5ecdadeb1,2024-09-25T16:55:15.023000
|
||||
CVE-2024-4640,0,0,561eb45560c6a2512cf49113a4a8a4e86a4cf3daabba823a155e6305f710bfc9,2024-09-18T15:48:43.557000
|
||||
@ -262929,6 +262956,11 @@ CVE-2024-46451,0,0,d3a56959d528545e5d37d75143f0c1e0141235a2bd503adf0162594e2e188
|
||||
CVE-2024-46453,0,0,f2e65264e0b1a5c3ff7f710d8d23db018673f8328ef08ecc489a300ea4d9bf1f,2024-10-07T13:53:04.767000
|
||||
CVE-2024-4646,0,0,368f6c8b75aa07d035e1b1b12d3ee4faeb304323401bbcc5aa2596217dc42f5b,2024-06-04T19:20:44.390000
|
||||
CVE-2024-46461,0,0,cc86f5c42464c26c4a36c6d59fbb4ac13932ea21683a14dbd86ef949d78638fc,2024-09-26T13:32:02.803000
|
||||
CVE-2024-46462,1,1,412241a1e3ea10048c9b2ba97c03ea7b435094221628995ba93dbb1a6eb450aa,2024-11-15T18:15:28.053000
|
||||
CVE-2024-46463,1,1,cc31280306f54abffe2fdba3f47cc0293a3070e30d773ace6dcf736f09c61578,2024-11-15T18:15:28.140000
|
||||
CVE-2024-46465,1,1,80e1e0e5e7cd3c509168c0985f18a986cf700538a81b8f6ae79f33e43334316e,2024-11-15T18:15:28.220000
|
||||
CVE-2024-46466,1,1,1e7d4313b8ccd32630e508af2a3ba08321509ccecff813069da7d2a62ea1defe,2024-11-15T18:15:28.297000
|
||||
CVE-2024-46467,1,1,8ab1cfde961da426ea1c40bf65dba8b21a433e4bd6350031671a4736141b5ef6,2024-11-15T18:15:28.377000
|
||||
CVE-2024-46468,0,0,d1dabc49a2c8f6666100b3e113a0965ffec605533a3aa178ac1056f150b98c3d,2024-10-15T18:35:14.680000
|
||||
CVE-2024-4647,0,0,abfff49b4d0bc1323cd8c136d2663c14e45b73cbc22df4c684f6d02301cae0cc,2024-06-04T19:20:44.487000
|
||||
CVE-2024-46470,0,0,4aeda2c990e579b9008226e62d5cbdc47a22a0fa6603152064e359fb3aa1bf47,2024-09-30T12:45:57.823000
|
||||
@ -263382,7 +263414,7 @@ CVE-2024-47062,0,0,c88a3c374fa0eb0b07de5442f40e8a296375128149eedfb948b94e624d430
|
||||
CVE-2024-47063,0,0,c726e0d37891011bf574e2ada4ecd35149371afeb49fe2d5efae62d1adcff659,2024-10-30T18:24:21
|
||||
CVE-2024-47064,0,0,5ab2606b47a3954363f47ef08af3365b7f2a07e53b06c729e25edc8cc707330a,2024-10-30T18:23:17.020000
|
||||
CVE-2024-47066,0,0,0b43b85d84d6edf2581c4495657e290f15385b4237a6d0903f4ed36005e8e711,2024-09-30T18:03:58.750000
|
||||
CVE-2024-47067,0,1,8929a705056d33f2294d5cbfad444e9ca09934cfd86406b1d0bf38287cb7c1bd,2024-11-15T16:28:48.533000
|
||||
CVE-2024-47067,0,0,8929a705056d33f2294d5cbfad444e9ca09934cfd86406b1d0bf38287cb7c1bd,2024-11-15T16:28:48.533000
|
||||
CVE-2024-47068,0,0,264a648ddebf754f99098ce6835c5c225a8b5d43bf206a3d80cb7c7fc0e3a5d3,2024-10-29T16:15:05.583000
|
||||
CVE-2024-47069,0,0,255d89cbb652b594a7eefdca5524a576b519375e297f09c89870c40566f1ba4a,2024-09-30T13:40:36.460000
|
||||
CVE-2024-4707,0,0,8435cc27f87132831b9d3f5ec9dd9fe3cf2e85b8b55db14f2e03c7e1023e49fc,2024-07-24T17:59:29.230000
|
||||
@ -263452,7 +263484,7 @@ CVE-2024-47174,0,0,45d61976806e6f261b6617173dfdd81cff9ff5aea1e4ed00e3593fe1fbbae
|
||||
CVE-2024-47175,0,0,98b0f302dda13c9ca08be74248115e033049a678f05ea7e4015fd75a9b0cd66d,2024-09-30T12:46:20.237000
|
||||
CVE-2024-47176,0,0,1236859fb548f3604f95f88a62b235a85b1497f9815e39d76c2bb849d27602db,2024-10-02T20:15:11.520000
|
||||
CVE-2024-47177,0,0,c3d1fff6e6c651906b3b7b3db7e611572822f47ef60858bd0aa18bbf89a3315d,2024-09-30T12:46:20.237000
|
||||
CVE-2024-47178,0,0,4b3608cd773dadb192e16beb77fa1e65e8ee51bd05c7dce0427d0f28ff63847b,2024-10-04T13:51:25.567000
|
||||
CVE-2024-47178,0,1,1bdd2275367d5c24daee09db8a93a56adb2710840ffa9896a6e8530f12ab14d1,2024-11-15T18:05:22.603000
|
||||
CVE-2024-47179,0,0,d53006137adae685c7c1c2137c456714ed89b092428bbe15520d76109ed40b36,2024-10-02T20:15:11.627000
|
||||
CVE-2024-4718,0,0,2fda56f630ea417950b3260007ed553b407a44c514b05be289e283a21ee915c1,2024-06-06T20:15:14.717000
|
||||
CVE-2024-47180,0,0,657c5516ab8b6145e58c8aac2b3c60b2287f164333060e376b2fc3a8acbd6fb3,2024-09-30T12:46:20.237000
|
||||
@ -263715,9 +263747,9 @@ CVE-2024-47527,0,0,6448adfc6fe781d292ba5a9887205495de1e6ae1fd7107635f3ac2f0d1da5
|
||||
CVE-2024-47528,0,0,f8a40bc5f3a1abfe246d4cda70316c63fc753979863ed711468abfa611b23cd8,2024-10-04T13:50:43.727000
|
||||
CVE-2024-47529,0,0,a86e1b3d3c851df630bad3a7b24a37914280a02c935e97aec5b5217c5975635e,2024-11-13T17:15:46.543000
|
||||
CVE-2024-4753,0,0,9e12d2c068502550c7c14176439a96816e2b604b1703bdae766fcb5d094be144,2024-08-01T13:59:33.903000
|
||||
CVE-2024-47530,0,0,fed1c84544c0e51056ec77fc5d6317c40fbcbb8ff2284050a11260f26a3d0c29,2024-10-04T13:51:25.567000
|
||||
CVE-2024-47531,0,0,3c1eac025448da4ef56a64b8782ce45f8d883f9cb11cc38200fa63f6c47d35ec,2024-10-04T13:51:25.567000
|
||||
CVE-2024-47532,0,0,8782a61a2e6393b4eaa2920ce672fbaf71cd431530e5dbfab9dfea37a0c9da22,2024-10-04T13:51:25.567000
|
||||
CVE-2024-47530,0,1,c6f97fa84b092a9eb2d48e14ff6f5d7de6955f2fff4d52714e57afe841f02fba,2024-11-15T18:03:06.497000
|
||||
CVE-2024-47531,0,1,6b496437616d44c1687bfdf7c83e71a8a08a0e7190260cd72e0c9d19f65d8be8,2024-11-15T18:02:14.250000
|
||||
CVE-2024-47532,0,1,ca603482a4e5336a13d9966dac0aa20f77d073c579719da9b8fe95ac7a0dc7d8,2024-11-15T17:59:51.307000
|
||||
CVE-2024-47534,0,0,3fdf39e9d60bdd61b891053803d0cdd86e1d9b2f1594fae7730f1f0f0b99a057,2024-10-11T15:15:05.490000
|
||||
CVE-2024-47535,0,0,63a4302cce4cbc5b98965ded88b399629f71758bc7b059f3ca8923cf2603f89c,2024-11-13T17:01:58.603000
|
||||
CVE-2024-47536,0,0,353df15c5abe486c0bd2000eeee4b00375b2403ebe72a10be7f49c66f18c4bd4,2024-10-04T13:51:25.567000
|
||||
@ -263912,6 +263944,7 @@ CVE-2024-47754,0,0,c998ddb7bc3dbcc169b2eae7169517ec00cc08562e1a7f8fb53bdf6d08fdc
|
||||
CVE-2024-47755,0,0,8cf25d07e196e075734f98083f38dbef19fd8e91fd1c66d640e943585b9e2f41,2024-10-23T06:15:09.873000
|
||||
CVE-2024-47756,0,0,b16b4f8db45f19a804a745ad54857c0866041580168f803472ffd8044edad7ec,2024-11-08T16:15:28.193000
|
||||
CVE-2024-47757,0,0,5c3bc84bf0532d52f78dd383d4cc765ee17a323a7f5a7392a8d7f71add2c3618,2024-11-08T16:15:28.343000
|
||||
CVE-2024-47759,1,1,acaa5f0db80802b75023a1647866e35eab454b244f852df9e8db4b6f687ae962,2024-11-15T18:35:34.290000
|
||||
CVE-2024-4776,0,0,8d62a3fb449cd595ed01f29a43c4395459263028a3240838c3f471dfed40e010,2024-07-03T02:08:08.187000
|
||||
CVE-2024-47762,0,0,faf4eb81ce6d805e421dff7a7d50a27f6affd6a56e4bb98171a2180279fc1ecf,2024-10-04T13:50:43.727000
|
||||
CVE-2024-47763,0,0,0009d92633a66a995666b904976a3f571897c7b107ff706ed2173ff97f66c3ef,2024-10-10T12:51:56.987000
|
||||
@ -263982,7 +264015,7 @@ CVE-2024-47850,0,0,9d437471ee4f1be7fe8d8f91eb2162f8d4a45526c516c7abe8fcc5930f99b
|
||||
CVE-2024-47854,0,0,cef81393ed48661f146b05190eb5cd22e800b4711975bd0fc685986ac16438cf,2024-11-13T15:25:13.953000
|
||||
CVE-2024-47855,0,0,55506bc59fb300d34c632b3a5f880b3df3b3b2206fd15f460c6853ba7eb245ef,2024-11-07T20:35:11.733000
|
||||
CVE-2024-4786,0,0,bbc8c5b9b549878acd4ee1e5896d7add0ba995b55e84e619083dd37cca26f8f1,2024-07-29T14:12:08.783000
|
||||
CVE-2024-47867,0,1,61f4df5a4a08eee13ad627f16450273fdbebcbdee4534b2d49b7e1adc602b8a3,2024-11-15T16:44:54.783000
|
||||
CVE-2024-47867,0,0,61f4df5a4a08eee13ad627f16450273fdbebcbdee4534b2d49b7e1adc602b8a3,2024-11-15T16:44:54.783000
|
||||
CVE-2024-47868,0,0,b1d3ae34e95c1b5cdfd4777e6cf22588fee5fb92f1e32bee19fdee66c93a7d46,2024-10-17T17:04:35.547000
|
||||
CVE-2024-47869,0,0,d239f8cdf446e03965c640dcef85e018494089ffa7953a4e5e2539ab04b057de,2024-10-17T16:59:04.703000
|
||||
CVE-2024-4787,0,0,6e9b8652de9328ef9248746b2fe52f715cb97566c59048ae6277a1aaed304f45,2024-06-20T12:44:01.637000
|
||||
@ -264102,7 +264135,7 @@ CVE-2024-48059,0,0,f3391fb334843a3fc6d7e517bab31554559de5a31b6bcad37ec348d6020d4
|
||||
CVE-2024-4806,0,0,f8a0e203429c4f99450a15aa6a4b26ee8c7effa68e79948138bc0eccf2af8e7f,2024-06-04T19:20:50.670000
|
||||
CVE-2024-48061,0,0,3afb2ef6eba7f21135f7c2c854e268a2fe30714157a06ae965803eb7d12a5161,2024-11-06T20:35:30.633000
|
||||
CVE-2024-48063,0,0,7dad3075f35e3bd4e2e591484ba350f38d4e17902517b9e5e6279458bc0b207a,2024-11-01T13:15:12.020000
|
||||
CVE-2024-48068,1,1,06b45b29ce3f821e2db622a6716622dc89ea68129fc83706bd80927d88a3593e,2024-11-15T15:15:07.607000
|
||||
CVE-2024-48068,0,0,06b45b29ce3f821e2db622a6716622dc89ea68129fc83706bd80927d88a3593e,2024-11-15T15:15:07.607000
|
||||
CVE-2024-4807,0,0,e5ccc41d46958232939be978f4766518ab72a806619364a653b00c23b63fbc68,2024-06-04T19:20:50.770000
|
||||
CVE-2024-48073,0,0,410986e3bac5b99d20c35e908ba9e14361ecff8b8737388dcc22bfd8d08857aa,2024-11-12T13:56:54.483000
|
||||
CVE-2024-48074,0,0,ad38eed7680db70af45f593399c08c1cb64e93854bc7fa5dd06ea3c6cdff4594,2024-11-08T22:15:20.877000
|
||||
@ -264376,7 +264409,7 @@ CVE-2024-48826,0,0,75c9450df85723c7e5fe507735f7be7d84001c192ccab935bbc0ccf65a951
|
||||
CVE-2024-48827,0,0,b8784c14c4c0a2af4d656264bee611472f424ecc32bdba68ae4a9cb4ecb6178a,2024-10-15T12:58:51.050000
|
||||
CVE-2024-4883,0,0,66fd0c7113b75e4613bf51e6b10a097cc5dcf57aa3f97b3df0e5c31c4210be62,2024-09-06T22:46:17.103000
|
||||
CVE-2024-48837,0,0,f5488c45b5b240917695042772d5a51760ce591b49d83868db6d3f484decff9e,2024-11-12T13:55:21.227000
|
||||
CVE-2024-48838,0,0,2e9787182617613ac5c5c71a35da89da4e0da1fca7b29929c3f69c43fe9528d6,2024-11-12T13:55:21.227000
|
||||
CVE-2024-48838,0,1,b9b13e45e7344ebfd4c931bb904861604db282988dc9483dd7d29d8be8b1d771,2024-11-15T17:36:43.520000
|
||||
CVE-2024-4884,0,0,a2dcec8e16e916f3e6bf44fbf27e64f395ae27ac96c65779b6d04fbf5173b4c4,2024-09-06T22:45:59.233000
|
||||
CVE-2024-4885,0,0,2608f2aa7fb5189467bda7bb610d4e03f1b43256b775a84e60ba9a3b8ac9b260,2024-09-06T22:44:27.840000
|
||||
CVE-2024-4886,0,0,d27ca09c7d3a0108a7cfa4692eb479eab6127452085468fbf17d7a45144cc1ee,2024-06-11T17:14:56.323000
|
||||
@ -264445,36 +264478,36 @@ CVE-2024-48987,0,0,bb1285db59c3075341f96aec62f9b4ce4709041d90082c7f3534792a4d32f
|
||||
CVE-2024-48989,0,0,58124d2b058d3a194dfa580edaf9984afd1d4350d13e9d1063b31cfbc8902f5b,2024-11-13T17:01:16.850000
|
||||
CVE-2024-4899,0,0,7d0ca1543842829897b22c32fd7c3ea389ea1c85b28761d045bc30da0b354462,2024-07-03T02:08:16.280000
|
||||
CVE-2024-48993,0,0,0dab823074732093bc8d73d037071c26077efcc55f0a4da56d7b2a3ff60a512f,2024-11-13T17:01:58.603000
|
||||
CVE-2024-48994,0,1,f318b3abe51a65c36b34811cd6779d9025e28bb0518b94d3d7c79c7579b1e1e4,2024-11-15T15:40:38.250000
|
||||
CVE-2024-48995,0,1,c8a152b4d83ebd46a319f38f36cd95f3ce9fdb5043f9229f5986839789db7ebd,2024-11-15T15:41:26.280000
|
||||
CVE-2024-48996,0,1,63c2449ddf3c17aa92c6f7edb44c8efc93ae248c076045e11c0bc6772ecc2dcb,2024-11-15T15:45:46.920000
|
||||
CVE-2024-48997,0,1,809a5ae9097510048a583e48fefef3bfec1f102e64cf832ee44a1d74b0d2cd79,2024-11-15T15:46:44.917000
|
||||
CVE-2024-48998,0,1,70ad12bbf3d2e3a049a22afd48ec9e5148477d4d2bb2bad66ee315a84a6b2057,2024-11-15T15:51:24.197000
|
||||
CVE-2024-48999,0,1,557ea53a4d5db33249b0ce08f59e4afba8c2445967d6a9a4c87c2b91ac47c81e,2024-11-15T15:51:44.517000
|
||||
CVE-2024-48994,0,0,f318b3abe51a65c36b34811cd6779d9025e28bb0518b94d3d7c79c7579b1e1e4,2024-11-15T15:40:38.250000
|
||||
CVE-2024-48995,0,0,c8a152b4d83ebd46a319f38f36cd95f3ce9fdb5043f9229f5986839789db7ebd,2024-11-15T15:41:26.280000
|
||||
CVE-2024-48996,0,0,63c2449ddf3c17aa92c6f7edb44c8efc93ae248c076045e11c0bc6772ecc2dcb,2024-11-15T15:45:46.920000
|
||||
CVE-2024-48997,0,0,809a5ae9097510048a583e48fefef3bfec1f102e64cf832ee44a1d74b0d2cd79,2024-11-15T15:46:44.917000
|
||||
CVE-2024-48998,0,0,70ad12bbf3d2e3a049a22afd48ec9e5148477d4d2bb2bad66ee315a84a6b2057,2024-11-15T15:51:24.197000
|
||||
CVE-2024-48999,0,0,557ea53a4d5db33249b0ce08f59e4afba8c2445967d6a9a4c87c2b91ac47c81e,2024-11-15T15:51:44.517000
|
||||
CVE-2024-4900,0,0,2074e15c0050e8989f750822fa85e67702dc13ece861470c246a4c4acb047889,2024-06-24T12:57:36.513000
|
||||
CVE-2024-49000,0,1,784c045fc0596c9e0642c36b4b8f2ac0ab57e10e1a32b95efc1bf1bdb02864ac,2024-11-15T15:52:08.557000
|
||||
CVE-2024-49001,0,1,06fd47831380c806b4bee6116a8c985746c5f6952a7e0c3793873d3412bf0bcb,2024-11-15T15:58:36.290000
|
||||
CVE-2024-49002,0,1,e7f871d3ce352cffc0c373425650a6788d487f9947f789b179ef5ad36c05fdf9,2024-11-15T15:58:14.693000
|
||||
CVE-2024-49003,0,1,5a592fa72515a983d73d29c561211092a9b91851e5d03aeedc0164ac6df45e7a,2024-11-15T15:57:52.277000
|
||||
CVE-2024-49004,0,1,d52868406da97d18b407ad1a9fce860ed9e93cff6cd03153aff07ef6455908a2,2024-11-15T15:56:55.917000
|
||||
CVE-2024-49005,0,1,4e1a42633da9f66381e9eb7fad5b051b9a4cd07b8a8756924c2df8f8a62048fe,2024-11-15T15:56:23.680000
|
||||
CVE-2024-49006,0,1,239eda227c0a60b6c6e5013994d6fea02af0115bf54bb9d4853d304d22727dcf,2024-11-15T16:03:33.790000
|
||||
CVE-2024-49007,0,1,4d209a87923d4eb39c2f50646b9124ece07c6ef85100bb37dec22f7045b578b5,2024-11-15T16:03:17.297000
|
||||
CVE-2024-49008,0,1,4a2d6677dc40eb5691d14bf7cd6591d2473719cc7702de78d1912ce7772b5650,2024-11-15T16:02:22.743000
|
||||
CVE-2024-49009,0,1,30770ccb7ad68c4e475f1386011b4fadd40c5114fdda7630d72ba718edec2908,2024-11-15T16:02:11.097000
|
||||
CVE-2024-49000,0,0,784c045fc0596c9e0642c36b4b8f2ac0ab57e10e1a32b95efc1bf1bdb02864ac,2024-11-15T15:52:08.557000
|
||||
CVE-2024-49001,0,0,06fd47831380c806b4bee6116a8c985746c5f6952a7e0c3793873d3412bf0bcb,2024-11-15T15:58:36.290000
|
||||
CVE-2024-49002,0,0,e7f871d3ce352cffc0c373425650a6788d487f9947f789b179ef5ad36c05fdf9,2024-11-15T15:58:14.693000
|
||||
CVE-2024-49003,0,0,5a592fa72515a983d73d29c561211092a9b91851e5d03aeedc0164ac6df45e7a,2024-11-15T15:57:52.277000
|
||||
CVE-2024-49004,0,0,d52868406da97d18b407ad1a9fce860ed9e93cff6cd03153aff07ef6455908a2,2024-11-15T15:56:55.917000
|
||||
CVE-2024-49005,0,0,4e1a42633da9f66381e9eb7fad5b051b9a4cd07b8a8756924c2df8f8a62048fe,2024-11-15T15:56:23.680000
|
||||
CVE-2024-49006,0,0,239eda227c0a60b6c6e5013994d6fea02af0115bf54bb9d4853d304d22727dcf,2024-11-15T16:03:33.790000
|
||||
CVE-2024-49007,0,0,4d209a87923d4eb39c2f50646b9124ece07c6ef85100bb37dec22f7045b578b5,2024-11-15T16:03:17.297000
|
||||
CVE-2024-49008,0,0,4a2d6677dc40eb5691d14bf7cd6591d2473719cc7702de78d1912ce7772b5650,2024-11-15T16:02:22.743000
|
||||
CVE-2024-49009,0,0,30770ccb7ad68c4e475f1386011b4fadd40c5114fdda7630d72ba718edec2908,2024-11-15T16:02:11.097000
|
||||
CVE-2024-4901,0,0,038977315c18c98069a655ab35eb2b501ae92d62e5deb196337fd2891dd989fe,2024-06-28T13:18:19.407000
|
||||
CVE-2024-49010,0,1,8dc6769987a70c8e901c43efaedf045ff627b8b5d66588b1cf1d8c71721eb88c,2024-11-15T15:59:36.937000
|
||||
CVE-2024-49011,0,1,01c749f70821920c3c477877b9d9cfb54346eae8ef76d8020513d0754bda6a6a,2024-11-15T16:16:21.817000
|
||||
CVE-2024-49012,0,1,929df80ba01c0711e6d4de2e89fa8304d1bf6a8a701e56efd9b6cff04ea88b34,2024-11-15T16:16:05.507000
|
||||
CVE-2024-49013,0,1,d6e7f65f705950800f1774a16d44e92b41eabeb6640c763d719c65985b489e86,2024-11-15T16:14:55.170000
|
||||
CVE-2024-49014,0,1,2ae717a1e7a00c91281675e1dd196ebf937d4372aaa95ea483d875af56032c7e,2024-11-15T15:55:46.947000
|
||||
CVE-2024-49015,0,1,010b13c2c915010b0f12355795a3e7db594c11886ca0722fcb257bddfb91fbde,2024-11-15T16:07:40.680000
|
||||
CVE-2024-49016,0,1,6e6a3e1e7d43f87788dff79da9bc35781bc8df562605244075a145d65f186874,2024-11-15T16:07:22.397000
|
||||
CVE-2024-49017,0,1,725144d756c259d6e8e5930241ee20e0430c0d60f2d540c6eb59c09762345d3e,2024-11-15T16:07:03.200000
|
||||
CVE-2024-49018,0,1,37682cb9b699fa423e654654a1734c21f63fb95a81f3e043a18fcb7be760f973,2024-11-15T16:06:29.407000
|
||||
CVE-2024-49010,0,0,8dc6769987a70c8e901c43efaedf045ff627b8b5d66588b1cf1d8c71721eb88c,2024-11-15T15:59:36.937000
|
||||
CVE-2024-49011,0,0,01c749f70821920c3c477877b9d9cfb54346eae8ef76d8020513d0754bda6a6a,2024-11-15T16:16:21.817000
|
||||
CVE-2024-49012,0,0,929df80ba01c0711e6d4de2e89fa8304d1bf6a8a701e56efd9b6cff04ea88b34,2024-11-15T16:16:05.507000
|
||||
CVE-2024-49013,0,0,d6e7f65f705950800f1774a16d44e92b41eabeb6640c763d719c65985b489e86,2024-11-15T16:14:55.170000
|
||||
CVE-2024-49014,0,0,2ae717a1e7a00c91281675e1dd196ebf937d4372aaa95ea483d875af56032c7e,2024-11-15T15:55:46.947000
|
||||
CVE-2024-49015,0,0,010b13c2c915010b0f12355795a3e7db594c11886ca0722fcb257bddfb91fbde,2024-11-15T16:07:40.680000
|
||||
CVE-2024-49016,0,0,6e6a3e1e7d43f87788dff79da9bc35781bc8df562605244075a145d65f186874,2024-11-15T16:07:22.397000
|
||||
CVE-2024-49017,0,0,725144d756c259d6e8e5930241ee20e0430c0d60f2d540c6eb59c09762345d3e,2024-11-15T16:07:03.200000
|
||||
CVE-2024-49018,0,0,37682cb9b699fa423e654654a1734c21f63fb95a81f3e043a18fcb7be760f973,2024-11-15T16:06:29.407000
|
||||
CVE-2024-49019,0,0,e08679fc365479f57d65d68203459387c13c3c1dd4e5679713ba188e89b8cabc,2024-11-13T17:01:58.603000
|
||||
CVE-2024-4902,0,0,41bb791734595d42fd1c69ded99c61dc232bf3972633339d010380dd468a9fb6,2024-10-29T18:07:23.897000
|
||||
CVE-2024-49021,0,1,85116f14375956c0e17b04e02d70108b9bbae302c7ed7fb6c441a5f54c8f1324,2024-11-15T16:04:55.487000
|
||||
CVE-2024-49021,0,0,85116f14375956c0e17b04e02d70108b9bbae302c7ed7fb6c441a5f54c8f1324,2024-11-15T16:04:55.487000
|
||||
CVE-2024-49023,0,0,af47ee9dc5b34537abe1e2a50e9a1a6dd7bec2ff89d9910cf199b8b7e8fc3c1a,2024-10-18T17:01:32.803000
|
||||
CVE-2024-49025,0,0,35dc42d2dd7a2e760f68b11d7ba7c5916c688fb71c05374f7a2ecaa9b21d3c92,2024-11-15T13:58:08.913000
|
||||
CVE-2024-49026,0,0,389b45fb365606f0dc850137e89a99d79b49e7936c4d322daa7512c8f2a443d1,2024-11-13T17:01:58.603000
|
||||
@ -264490,7 +264523,7 @@ CVE-2024-49039,0,0,35081b6450a24914db672b1bfea30c0edc233e94d1f078f8c664cf196464b
|
||||
CVE-2024-4904,0,0,e08155723dc24ff1bcb5adf9d2f839d33f4e022ac557667a35564764380e5202,2024-06-04T19:20:52.380000
|
||||
CVE-2024-49040,0,0,be49458de740c9721130038142e1187759fb23950dfc8c806ecf7b0472546f4b,2024-11-13T17:01:58.603000
|
||||
CVE-2024-49042,0,0,8550e6f45d8ccfb522aabce24120e04e03609dbaf334f8e26399de3cabfb4b51,2024-11-13T17:01:16.850000
|
||||
CVE-2024-49043,0,1,7687f02e8c033046e84a25a54a1ddfa232890a08944ecd76f708f2aed0f5dc24,2024-11-15T16:05:30.773000
|
||||
CVE-2024-49043,0,0,7687f02e8c033046e84a25a54a1ddfa232890a08944ecd76f708f2aed0f5dc24,2024-11-15T16:05:30.773000
|
||||
CVE-2024-49044,0,0,d82fb98a7f5feaaff34665c3e5f2204ad3822610f6571f31342b781d5bf4f678,2024-11-13T17:01:58.603000
|
||||
CVE-2024-49046,0,0,b644a86688d45b12601d38cbe6e9dc0cb7d8a26a2b34042f583e5aa086f28d23,2024-11-13T17:01:58.603000
|
||||
CVE-2024-49048,0,0,3478b70374b682b5c968ed62afec830bb0af9b0a095d1ec23b524e486f51e98a,2024-11-13T17:01:58.603000
|
||||
@ -264732,10 +264765,10 @@ CVE-2024-49525,0,0,28a277ab9b52157a5e4549773b7a8750a6dbb7b4cb916799fff07dd0ec631
|
||||
CVE-2024-49526,0,0,0871004c04b2341eb737b8d4e5693e458bc7c8461095a71ec5604d2d8a7a3e4f,2024-11-13T17:01:58.603000
|
||||
CVE-2024-49527,0,0,90add3f65b96eee1f0b9fbf01f92dfd0e4ee77a768256f110d47e754c67f09f0,2024-11-13T17:01:58.603000
|
||||
CVE-2024-49528,0,0,0e21c50648494dddb2e6f81fb4539064ca26c5177933d85140437daf91d91144,2024-11-13T17:01:58.603000
|
||||
CVE-2024-49557,0,0,2a5d766ad2ace9ca4473e381728b5667e6cadd8340da6faf7936ed125bc7364d,2024-11-12T13:55:21.227000
|
||||
CVE-2024-49558,0,0,47432e1f54f695adb17b8dc00f9577022f45f8f0ba5da018a951249b00715362,2024-11-12T13:55:21.227000
|
||||
CVE-2024-49557,0,1,d5723680a20b941e0b929edc2959b845b0ec9b5d07125e59e1942c5e8991b90e,2024-11-15T17:36:47.110000
|
||||
CVE-2024-49558,0,1,3c676b75de26a8476d548ed8b3e232d51677ecb4a62749082177600c22312603,2024-11-15T17:35:54.480000
|
||||
CVE-2024-4956,0,0,319b39cd7f80ef1a8cfcc633b91e7d5f141facd950994947b42a7565c106a7a4,2024-05-17T18:36:31.297000
|
||||
CVE-2024-49560,0,0,ab312f3dd70e163a5c72b63be519379ba38d0c543c55c0ea8821e33d6ab68e6b,2024-11-12T13:55:21.227000
|
||||
CVE-2024-49560,0,1,0903f1d2d4b8ea486a494eda9aaa463e3a0d845c10ed5808d6808c17d2b3d951,2024-11-15T17:35:25.407000
|
||||
CVE-2024-4957,0,0,e3bb8e47c8dfba146bed7647eff25fc6cc8427bb0bd54429262b4324d627abed,2024-07-03T02:08:22.473000
|
||||
CVE-2024-49579,0,0,0f0dd66a3db0fe299ae55b9b0e6c22f11c400dc3ee27d05103041b63e67e9d3e,2024-11-14T19:24:45.603000
|
||||
CVE-2024-4958,0,0,15591ba73d7708bbd560fadc0281274b5c7c2c12545797826fbf6e13e1222639,2024-06-03T14:46:24.250000
|
||||
@ -264845,17 +264878,17 @@ CVE-2024-4975,0,0,d684ecfff12b84901405d8ee54394b9595e6fb8a06328936509cd0d9c15207
|
||||
CVE-2024-49750,0,0,a4d8c273c7d01e1dcb69ab54945d9fa3ef0aafd14a5615789a19e3567d7b1d64,2024-11-06T14:58:19.993000
|
||||
CVE-2024-49751,0,0,ff7d052700c88a06f3721dad1b8cfae38c2356a33cba16eba3e8bf2b6f89cf9e,2024-10-25T12:56:36.827000
|
||||
CVE-2024-49753,0,0,e48f997c3307c7149c72669441f9343576b6be2cbdb15b89775e89497816dbec,2024-10-28T13:58:09.230000
|
||||
CVE-2024-49754,1,1,3550e73273f425617ed28b59b36a9108486b5c28d588af30eef27d5785caf9d5,2024-11-15T16:15:34.510000
|
||||
CVE-2024-49754,0,0,3550e73273f425617ed28b59b36a9108486b5c28d588af30eef27d5785caf9d5,2024-11-15T16:15:34.510000
|
||||
CVE-2024-49755,0,0,b1c1713e62d1c6cff006bddd32caeacb7a00a5abd98bfdd4887a4a4fcdb0308a,2024-10-29T14:34:50.257000
|
||||
CVE-2024-49756,0,0,17e2aa8675de07a9bb36aad326a0b90c2e6105df968303ed06bc9a1149a476bc,2024-10-25T12:56:36.827000
|
||||
CVE-2024-49757,0,0,41883c0db2190e07eb75f1500b6be8583d0953bfe5f6820811285d92db2c4bda,2024-10-28T13:58:09.230000
|
||||
CVE-2024-49758,1,1,b469460ce3b2b26871ada73252ec097b2120dacea45da1951a93146e86a8fd7a,2024-11-15T16:15:34.880000
|
||||
CVE-2024-49759,1,1,ba9444879a3b53f14c62c77f0b4d72cd1329bbf91a3aad6f19fbe3de6c548660,2024-11-15T16:15:35.100000
|
||||
CVE-2024-49758,0,0,b469460ce3b2b26871ada73252ec097b2120dacea45da1951a93146e86a8fd7a,2024-11-15T16:15:34.880000
|
||||
CVE-2024-49759,0,0,ba9444879a3b53f14c62c77f0b4d72cd1329bbf91a3aad6f19fbe3de6c548660,2024-11-15T16:15:35.100000
|
||||
CVE-2024-4976,0,0,fc4df77a0f9a74699614d42497ce42eb6f6db7897f4ce74b0071ab4cbdb2d9cf,2024-05-16T13:03:05.353000
|
||||
CVE-2024-49760,0,0,ab1d2b1d3d6f87001d0ec0c674554d145fba544f43978860ab9f315317a9615d,2024-11-06T15:01:01.013000
|
||||
CVE-2024-49761,0,0,cc77d1f33b16264261b43a7d1baebc02063ded1f31c9ab42da049e2bed05a708,2024-11-05T16:41:46.660000
|
||||
CVE-2024-49762,0,0,e267f4df9b55b0cddd8b82283d5a577158c52194b354f86421be17fb0c5fcf65,2024-10-25T12:56:07.750000
|
||||
CVE-2024-49764,1,1,6747ce98a9cc0f5e3f54775a8fffdb9c130835843da49143280334403b418cd0,2024-11-15T16:15:35.323000
|
||||
CVE-2024-49764,0,0,6747ce98a9cc0f5e3f54775a8fffdb9c130835843da49143280334403b418cd0,2024-11-15T16:15:35.323000
|
||||
CVE-2024-49766,0,0,555038e30b17856b98b1634207b04f50d3fce08a3c00047a5f41e29a9d10d5d9,2024-10-28T13:58:09.230000
|
||||
CVE-2024-49767,0,0,b1abfb6c942255ecba6af733c92d4d0cb5e1d316b2b9040982ab9c6769c6893b,2024-11-05T20:03:04.847000
|
||||
CVE-2024-49768,0,0,d1c7bee24c60a7682e6a57ee28bfb0a2fbc48c379b23053fbff091516cb1e066,2024-11-07T17:28:02.853000
|
||||
@ -264866,9 +264899,9 @@ CVE-2024-49771,0,0,160fc663912b069ef891129905ae1be73f75e83c8368c487931bd9ae946e0
|
||||
CVE-2024-49772,0,0,9281743e575857929b74a42ff17b0b9202ae9bb7ed1b47fefe705f7bd0b972d2,2024-11-13T20:19:54.597000
|
||||
CVE-2024-49773,0,0,e7ad43d5c3fd7b249f682f0b65eb1709f39d3084c0fa75087a4fd4a2decb3591,2024-11-13T20:29:11.297000
|
||||
CVE-2024-49774,0,0,ebd8a0eea0a53281f5f3ae3a93acb0432e3d9a4208605b56d1016ce02a10c1a5,2024-11-13T20:40:26.100000
|
||||
CVE-2024-49776,0,0,b98b59521cd715d0ec617d2fd0db152a13cd8254e4dda962c91988b20e09de7f,2024-11-15T13:58:08.913000
|
||||
CVE-2024-49777,0,0,9baeca1cafb37b9a950e665befe702cbd02f2ad8698e66a79c9b0d29d5965980,2024-11-15T13:58:08.913000
|
||||
CVE-2024-49778,0,0,958fdd6c4862af8f1bd031bb3fc3cf3c4e3090a99baf545814260a0e74f7bb7b,2024-11-15T13:58:08.913000
|
||||
CVE-2024-49776,0,1,43181081d16dff1c8572dc7efd12b0623a58d2321b4d135b6857413c0be83101,2024-11-15T18:35:34.550000
|
||||
CVE-2024-49777,0,1,314466c2b7b0e20ad6728b0e7432b53a78d87374e0a21437c089e38cdba9aa08,2024-11-15T18:35:35.413000
|
||||
CVE-2024-49778,0,1,b40056776286249c4f0e7d406280c79c53290f21552c8f5c4b72da612431d704,2024-11-15T18:35:36.260000
|
||||
CVE-2024-4978,0,0,5928c3b846f5437fa931d5f8f8094b6c99b5e796eec27a2a5602f4b07774db40,2024-05-31T16:03:52.247000
|
||||
CVE-2024-4980,0,0,1d2b61808b4cae121d6a29c34adc83b7ce102dcc100d7578fef807794b8506ae,2024-05-22T12:46:53.887000
|
||||
CVE-2024-4983,0,0,47e5eccd768078063df4e275a1ffdcd617ddbc2b7b8451c89e2e261cf23ec523,2024-06-27T12:47:19.847000
|
||||
@ -265324,7 +265357,7 @@ CVE-2024-5031,0,0,5b0fce1eabb88a37a871d927606cb4ca5166c3808ddca60f777848c692bab1
|
||||
CVE-2024-50310,0,0,cdbb51e1b47d1a9497998e60f58fb5fe87ced29e9d042b4c42b3a1b3ac7563d2,2024-11-13T23:15:38.657000
|
||||
CVE-2024-50311,0,0,a911784e609d4ab74e0290e5d915dbb7b1471b8d97b5435937a13bc8c9811bb6,2024-10-30T18:39:40.617000
|
||||
CVE-2024-50312,0,0,8b68d956a110cf88efd2db7bdd6fdd3dc5b02186497d9ae2cbca0852915a398f,2024-10-30T18:35:56.753000
|
||||
CVE-2024-50313,0,0,1f9bfdd78a62f9b5771008b0c7fd93e4e221029be8c4ff06400d9d0c1dd48acc,2024-11-12T13:55:21.227000
|
||||
CVE-2024-50313,0,1,57c773ed95d19cba8304d961904a015105ffc1450a840dde453d207457fba72c,2024-11-15T17:12:44.410000
|
||||
CVE-2024-50315,0,0,4cc2faf3d8c489bc195ea9b1b71e3db71fb7f18259f91c4f6bf82e911f7ad06a,2024-11-06T18:15:06.173000
|
||||
CVE-2024-50317,0,0,3ef7929b8ca37a83862b1a0ddb7f1ecbe9417af55e87d826ab8962ddad2d7d42,2024-11-13T17:01:58.603000
|
||||
CVE-2024-50318,0,0,7c15c1e7658f71ae931d546a21c8e818b9c8d50f58c6d5d224584bee63f031ed,2024-11-13T17:01:58.603000
|
||||
@ -265358,12 +265391,12 @@ CVE-2024-50346,0,0,fb25cbb7b8a23f8bc4a8f048afe511d7d942fe5a9bb027a602dbfa956ec82
|
||||
CVE-2024-50347,0,0,27f16939f93088b46ca4735812513cca765a91a390b88a1aa60491d8fb6217f3,2024-11-01T12:57:03.417000
|
||||
CVE-2024-50348,0,0,fa8a8e9e48d227df1afdc378e4ee00ffda2dd051bb15c8b477e290549096cb45,2024-11-06T14:49:46.073000
|
||||
CVE-2024-5035,0,0,592ce94ebba91d65c9cac29085dbc465d14be23d13ac08f1e0101f9ce552a856,2024-05-29T05:16:08.793000
|
||||
CVE-2024-50350,1,1,fe33fb1c52289387a103d60f99132eed80d6bd254f86a98de7b78a4c941057aa,2024-11-15T16:15:35.537000
|
||||
CVE-2024-50351,1,1,ae2519e0c7bf4bfda7fca0bf4c148d971d247eeb107cc3d234d0973074b92910,2024-11-15T16:15:35.750000
|
||||
CVE-2024-50352,1,1,e598f971ea4973919bec33ee98be0b76e78d3b7e47b4e2939d4342c0730209ed,2024-11-15T16:15:35.960000
|
||||
CVE-2024-50350,0,0,fe33fb1c52289387a103d60f99132eed80d6bd254f86a98de7b78a4c941057aa,2024-11-15T16:15:35.537000
|
||||
CVE-2024-50351,0,0,ae2519e0c7bf4bfda7fca0bf4c148d971d247eeb107cc3d234d0973074b92910,2024-11-15T16:15:35.750000
|
||||
CVE-2024-50352,0,0,e598f971ea4973919bec33ee98be0b76e78d3b7e47b4e2939d4342c0730209ed,2024-11-15T16:15:35.960000
|
||||
CVE-2024-50353,0,0,ccbaa89f0150ad038f7930bf7da95bdebd48b8dd8438583bd87ed80c0a277898,2024-11-13T15:15:19.900000
|
||||
CVE-2024-50354,0,0,5fe2cfed42eb75a8865a8b156fa958f7af02063c60312ccd6714684eb18cee96,2024-11-01T12:57:03.417000
|
||||
CVE-2024-50355,1,1,f1ef7d5e8f66469b3931f44256f6bd3ac9c89a211edc6ffbf7eafef6207e5929,2024-11-15T16:15:36.160000
|
||||
CVE-2024-50355,0,0,f1ef7d5e8f66469b3931f44256f6bd3ac9c89a211edc6ffbf7eafef6207e5929,2024-11-15T16:15:36.160000
|
||||
CVE-2024-50356,0,0,1007ed397ecbfac0c7e4779187113696b4d36207eb77ee96ff22c8fde6a29757,2024-11-01T14:35:08.330000
|
||||
CVE-2024-5036,0,0,e97b40bd40cf208c311323e6564cb1ded96d8cc433059436a8705289f1e02a66,2024-06-20T12:43:25.663000
|
||||
CVE-2024-5037,0,0,46d4a5c4b83922b1ee19bcb8bbc97a0a290a2086fb5a073395bdb9a5e03441e0,2024-08-19T17:15:09.807000
|
||||
@ -265538,27 +265571,30 @@ CVE-2024-50614,0,0,e4dbc17db42a0c42579ba77a146705a8445a75f90546cb7b4c3dc14d7adb7
|
||||
CVE-2024-50615,0,0,b7e43b47cd429a59ea1e65cb3383a96641f8d8401c0e7577999bdb52f4f71fe1,2024-10-30T20:35:37.310000
|
||||
CVE-2024-50616,0,0,e123de96868e8818da5b7d193dee2e816ee0e81fabf6e652a87cb9726aad9098,2024-10-30T20:35:38.380000
|
||||
CVE-2024-5062,0,0,1dce1f93ce1b9242e76ae9cf090eb76ee6afadb656622c6eb5a578a5eb76013f,2024-08-20T14:14:35.717000
|
||||
CVE-2024-50623,0,1,ad30148e87f5246daa69bfdb66ae52252255d95d6629024623f3277543bd569d,2024-11-15T16:15:36.367000
|
||||
CVE-2024-50623,0,0,ad30148e87f5246daa69bfdb66ae52252255d95d6629024623f3277543bd569d,2024-11-15T16:15:36.367000
|
||||
CVE-2024-50624,0,0,2f6d7cbc06ddd09de063e5bd0feef072f438fbd478c20a099bcf6256ed039f90,2024-10-30T21:35:12.223000
|
||||
CVE-2024-5063,0,0,3ea00cb3f53084b2393e5a818811e5957f116b348338ce87a59f64292b187a9f,2024-06-04T19:20:57.760000
|
||||
CVE-2024-50634,0,0,fc2a161c2c755e76311d472b0c0ca48eeb524c368ea8177e76956b97738f2002,2024-11-14T20:40:43.690000
|
||||
CVE-2024-50636,0,0,2fc9138fa183119876b777928207f426f13352402fa782392dc2b828754f0184,2024-11-12T13:55:21.227000
|
||||
CVE-2024-50637,0,0,7cb3fd4c2566fc1d1593156e77d24b90af6dfd042618185e839399543b673bed,2024-11-07T14:15:16.780000
|
||||
CVE-2024-5064,0,0,d857d2e0ee5316e135c4045ce3a7ab1579933a9b029d66480995681ffcc21c71,2024-06-04T19:20:57.870000
|
||||
CVE-2024-50647,1,1,2e7f3d7e544ece0ccbd2aaa6f612b5dc159612e5869768624aaaad0a22d84340,2024-11-15T16:15:36.467000
|
||||
CVE-2024-50648,1,1,30c2e10e651b32960de225f86256bd9fbaacf658adf0001ebfbed0c8c5c26fc0,2024-11-15T16:15:36.547000
|
||||
CVE-2024-50649,1,1,7d22823a31c69e206ba178b089c551e50e81d6f9ee0c9cb53f27845845392f2c,2024-11-15T16:15:36.637000
|
||||
CVE-2024-50647,0,0,2e7f3d7e544ece0ccbd2aaa6f612b5dc159612e5869768624aaaad0a22d84340,2024-11-15T16:15:36.467000
|
||||
CVE-2024-50648,0,0,30c2e10e651b32960de225f86256bd9fbaacf658adf0001ebfbed0c8c5c26fc0,2024-11-15T16:15:36.547000
|
||||
CVE-2024-50649,0,0,7d22823a31c69e206ba178b089c551e50e81d6f9ee0c9cb53f27845845392f2c,2024-11-15T16:15:36.637000
|
||||
CVE-2024-5065,0,0,0430cc7c42876b1507fe619bbbc6ece1ba2c878f57a5564022a1efa295cd852d,2024-06-04T19:20:57.977000
|
||||
CVE-2024-50650,1,1,5bec41adc57062c51936e8c337bf1e936a3ecb43832b17672528a8666a80227d,2024-11-15T16:15:36.710000
|
||||
CVE-2024-50651,1,1,4bf05b042e73c0bfe89a5dc5ae8bb550ea2493dde13bd6ee166a1ac311cf9dc2,2024-11-15T16:15:36.783000
|
||||
CVE-2024-50652,1,1,4c6e0ebe8d90d732657f125730d362693c1bd46064ac0d862788dfb71947eb2e,2024-11-15T16:15:36.863000
|
||||
CVE-2024-50650,0,0,5bec41adc57062c51936e8c337bf1e936a3ecb43832b17672528a8666a80227d,2024-11-15T16:15:36.710000
|
||||
CVE-2024-50651,0,0,4bf05b042e73c0bfe89a5dc5ae8bb550ea2493dde13bd6ee166a1ac311cf9dc2,2024-11-15T16:15:36.783000
|
||||
CVE-2024-50652,0,0,4c6e0ebe8d90d732657f125730d362693c1bd46064ac0d862788dfb71947eb2e,2024-11-15T16:15:36.863000
|
||||
CVE-2024-50653,1,1,04aa223670ca8ac7e6e42eb750922eb1eddd03b40c75ac69ba2037e986b202fb,2024-11-15T17:15:20.417000
|
||||
CVE-2024-50654,1,1,08c547c72106766138db6ec1da1c94ff7787e165e8917a63881abe77d6f40591,2024-11-15T17:15:20.507000
|
||||
CVE-2024-50655,1,1,da0d9e781c2b1c6164c6a6f739060bdc8f25ef4722f41360417dac50f1ba609e,2024-11-15T17:15:20.613000
|
||||
CVE-2024-5066,0,0,afaa043e18b083dd4b11b301517b086f80728c1a74393b687f88875df4970445,2024-05-20T13:00:34.807000
|
||||
CVE-2024-50667,0,0,0dcbd7b35b311fe7a681d780dcbe2293327603709e31a27594acb760866d084d,2024-11-12T17:35:12.270000
|
||||
CVE-2024-5067,0,0,7a5f09523c1a14d6651905f1f8853395c32eebb526caa99a81fddc9a443e16ea,2024-09-05T17:29:32.287000
|
||||
CVE-2024-5069,0,0,9472ccb93cc67e368452ccbd7690fcdac2e9c6bf3a0a4c1febdda7b23dc05b96,2024-06-04T19:20:58.080000
|
||||
CVE-2024-5071,0,0,1e84a840bf7fe6d05a333c61daff03721e2399762594abd260e8b415b74d49eb,2024-10-28T21:35:22.430000
|
||||
CVE-2024-5072,0,0,b208332fdeb0349d564f3ae12700e597664b77bbcd409305187f03a8e1be9ee8,2024-05-17T18:35:35.070000
|
||||
CVE-2024-50724,1,1,5876d658fd18659eb21f77ce4b57af6281fab952c0298d4065af6f6407d660a7,2024-11-15T16:15:36.943000
|
||||
CVE-2024-50724,0,0,5876d658fd18659eb21f77ce4b57af6281fab952c0298d4065af6f6407d660a7,2024-11-15T16:15:36.943000
|
||||
CVE-2024-5073,0,0,84e84c9e85d38ba2ba8fcac94cd632adf73ebd62caf103a5afc104149a6ce671,2024-05-30T13:15:41.297000
|
||||
CVE-2024-5074,0,0,323ff3e4be9a1a01795a645c087210e0124e3c1100808fef1bff4cc986dff48b,2024-08-01T13:59:39.780000
|
||||
CVE-2024-5075,0,0,3a68f5400be3fd65933ca2b54d2fe1b2cd42ebfc5586417b08ab71b3ebef46c2,2024-08-01T13:59:39.960000
|
||||
@ -265567,6 +265603,7 @@ CVE-2024-50766,0,0,af3ada3641e5f900c68c3d98d58b715ce7a7d6da5b4d545f2ac59e163c2e3
|
||||
CVE-2024-5077,0,0,58d61679dec16d0807ee3c6d8f70abda23dd3b8ef542c3a47286601f3d544039,2024-08-01T13:59:40.333000
|
||||
CVE-2024-5079,0,0,03cab751fae6538cdd3ee0f9a467090b1b9dca8ded972c9a24812d90a2b62ab7,2024-08-01T13:59:40.517000
|
||||
CVE-2024-5080,0,0,88ae00b43e12b64ab9ecc2d4c4ea1fe4d89b86d4c131aa05e4a989c5a4e3b207,2024-08-01T13:59:40.707000
|
||||
CVE-2024-50800,1,1,9d292a12bf13cfbd45587c76c8936ec43dce5f2b439c7abba13d6cb654cf82c8,2024-11-15T18:15:28.727000
|
||||
CVE-2024-50801,0,0,b02fd2a4d914f47ebf18861bef14a429b26208dd8058232ee786f89bcea879c0,2024-11-04T19:35:13.810000
|
||||
CVE-2024-50802,0,0,8492f5be24f5ad2918f47970062e4bc2c1c3f432ad972af1d330cb18adac5b2e,2024-11-04T19:35:14.907000
|
||||
CVE-2024-50808,0,0,1a667410201903fdc8230c48df98057d6516bd370b3a4500e5037005f86c9f20,2024-11-12T13:56:54.483000
|
||||
@ -265623,7 +265660,7 @@ CVE-2024-50970,0,0,2e7889cd3277e474e337527bd160fa64940d7885ad18ecb1fd92dbeebea4f
|
||||
CVE-2024-50971,0,0,848df10022c9f75f1c9b9af05147f0923c3bc4a87738961451f1396fe9fbaab2,2024-11-14T14:54:33.787000
|
||||
CVE-2024-50972,0,0,4e8fb2dd82bb709cf8c210bd21d32873aff8eb306d7b228bf00eb024671ceb3b,2024-11-14T14:55:08.567000
|
||||
CVE-2024-5098,0,0,51bb68a404444dbad57c4444d3880f6dd34c8b10fc09ab7783a9da02fb8f5608,2024-06-04T19:20:58.887000
|
||||
CVE-2024-50986,1,1,949bd035da5362255ed7ac7c9edff0cc7fd8e202111ff0c1f3097978f8821437,2024-11-15T15:15:07.773000
|
||||
CVE-2024-50986,0,0,949bd035da5362255ed7ac7c9edff0cc7fd8e202111ff0c1f3097978f8821437,2024-11-15T15:15:07.773000
|
||||
CVE-2024-50989,0,0,539ed9c0a64887e69fa9cae96035a115db3a8a96afe0045140278b0fb7737495,2024-11-12T18:35:31.437000
|
||||
CVE-2024-5099,0,0,c449033239abbf7fd2bba4f64694ff77374623f364f0fa141d0a92a151a3ab2c,2024-06-04T19:20:58.993000
|
||||
CVE-2024-50990,0,0,3537d7668a1d8721c4b70a753dc5bd5ceae4b32dbcc1547432740e88301eb02f,2024-11-12T20:35:16.907000
|
||||
@ -265702,7 +265739,7 @@ CVE-2024-51152,0,0,2fc415b0efc6d5417097e1245b382b91c976aaa5917a1040e7761d3f03c4c
|
||||
CVE-2024-51156,0,0,ab531e15c589d8d218306e8fd6a6995b5bbbca61f7ac15e609aad877e064595a,2024-11-15T13:58:08.913000
|
||||
CVE-2024-51157,0,0,15c268449f10cd3f5e2b0f898333f8df5f6a7a275257a0f4491ba5cb90f1b17e,2024-11-12T13:56:54.483000
|
||||
CVE-2024-5116,0,0,8edab88198021b2d3b9901d621d1dabac4b2933945eb225d0257a88c98ac3f15,2024-06-04T19:21:00.430000
|
||||
CVE-2024-51164,1,1,b9f1776fc3ef4840650c14e1a3f3e7dd8ac91dd3773b241274f401af13a4a1cc,2024-11-15T16:15:37.057000
|
||||
CVE-2024-51164,0,0,b9f1776fc3ef4840650c14e1a3f3e7dd8ac91dd3773b241274f401af13a4a1cc,2024-11-15T16:15:37.057000
|
||||
CVE-2024-5117,0,0,8f71e5dda3348556d6b06143dcd47b79229dad0468d30aa7c38f8c5c1ecb8524,2024-06-04T19:21:00.547000
|
||||
CVE-2024-51179,0,0,1ac36b7f8ecbb6442c3e82b8bfc190a784ef1fdb6227f3a1da3d4126f204bf98,2024-11-13T20:35:10.303000
|
||||
CVE-2024-5118,0,0,ede24973ef1505b96fcd3c614d177bf90baaafde820cda4461fa6280b3c2b455,2024-05-20T13:00:04.957000
|
||||
@ -265730,7 +265767,7 @@ CVE-2024-51246,0,0,aa194fa853a376377fe6819071cfa2916e0d00edaefe6d104071b5230b5ba
|
||||
CVE-2024-51247,0,0,6f763214fc728651cee8f49e7f9d3466af02b1a87bcb320803295d2391bcc8af,2024-11-05T19:28:25.143000
|
||||
CVE-2024-51248,0,0,24dce655c534c26b0b67ea327bc58bc6e5d7937e725965feb96bf75ba11def28,2024-11-05T19:28:29.730000
|
||||
CVE-2024-51249,0,0,23dd85f23924e75ce199438298671d7b20ece05b7ee21f636e4f3929eb3f65e7,2024-11-04T18:50:05.607000
|
||||
CVE-2024-5125,0,1,f1ae9e54b9f94555190f44a209aeee1e2465c5a5c1bc0183d9c12898cc0fe1e7,2024-11-15T16:35:09.290000
|
||||
CVE-2024-5125,0,0,f1ae9e54b9f94555190f44a209aeee1e2465c5a5c1bc0183d9c12898cc0fe1e7,2024-11-15T16:35:09.290000
|
||||
CVE-2024-51251,0,0,63152562fe66f261ed3205b0767b9a859ea9c0ff927b599c5c96705e6967a8f8,2024-11-04T18:50:05.607000
|
||||
CVE-2024-51252,0,0,bf357f6855609c81237cb444d332859dc7316dc50aaeed6006dd85a3ea82ebf7,2024-11-05T20:54:38.960000
|
||||
CVE-2024-51253,0,0,bd6b7c4e24728199770eb9a14af1e277c7168d7d6f853e011077c74df42885e3,2024-11-04T18:50:05.607000
|
||||
@ -265808,10 +265845,10 @@ CVE-2024-5149,0,0,35aba13432990695b4ab26ada33d31578be519ff456b8edf807a15027d0b18
|
||||
CVE-2024-51490,0,0,ce278c5bd11182b0f76e1306bfd4f5475ffe3bef255b34a2e09a247de41ed216,2024-11-14T20:13:01.587000
|
||||
CVE-2024-51492,0,0,0a58c7013d2cd1abea36461b62b0843b3a8fe747b96ce2f6ac388e3c542b0b6c,2024-11-01T21:15:15.080000
|
||||
CVE-2024-51493,0,0,905ca061a7e2249944cb0aec37c9054b75e237343bc05a733cf47492ea8f9f1d,2024-11-06T18:17:17.287000
|
||||
CVE-2024-51494,1,1,3bf3dc12c3275774bba61fd80cb9b469c3d1558c31dcf555fea4131d1a96dff7,2024-11-15T16:15:37.140000
|
||||
CVE-2024-51495,1,1,e5f07f08dba079d6dbed1b9bb4b396d9f02dcfcea5a5cfc1d096beea8d8ada12,2024-11-15T16:15:37.343000
|
||||
CVE-2024-51496,1,1,74cb6333739e3cc4c8e4c5764cfdffa2904217e6fbc34f4ca72b325e67ebd30c,2024-11-15T16:15:37.553000
|
||||
CVE-2024-51497,1,1,a39c34b7cc7817251d031d66b8a932ec72bf7d572c96a4983b8eae763d06c98b,2024-11-15T16:15:37.770000
|
||||
CVE-2024-51494,0,0,3bf3dc12c3275774bba61fd80cb9b469c3d1558c31dcf555fea4131d1a96dff7,2024-11-15T16:15:37.140000
|
||||
CVE-2024-51495,0,0,e5f07f08dba079d6dbed1b9bb4b396d9f02dcfcea5a5cfc1d096beea8d8ada12,2024-11-15T16:15:37.343000
|
||||
CVE-2024-51496,0,0,74cb6333739e3cc4c8e4c5764cfdffa2904217e6fbc34f4ca72b325e67ebd30c,2024-11-15T16:15:37.553000
|
||||
CVE-2024-51497,0,0,a39c34b7cc7817251d031d66b8a932ec72bf7d572c96a4983b8eae763d06c98b,2024-11-15T16:15:37.770000
|
||||
CVE-2024-51498,0,0,a215c64a461c357224f24d4e16a3f3f3214ac081278e197bc9556945ad303f5e,2024-11-05T16:04:26.053000
|
||||
CVE-2024-5150,0,0,af277f2642e60b6f0769d64573990279b6b64286b8d76d1359b09a52e223643b,2024-05-29T13:02:09.280000
|
||||
CVE-2024-51500,0,0,42c2a285903076a2664ebb01d93e2fe7be0196e6180cfa0174e85e23f0ae008b,2024-11-05T16:04:26.053000
|
||||
@ -265879,7 +265916,7 @@ CVE-2024-51581,0,0,092e2530027eae5b98691ff622c8b4e7c7c051dbeea02ee3ce6c68d4ccbeb
|
||||
CVE-2024-51582,0,0,9c6a2abc6ff39ea954384c7b38779cdbe6d44511f3a75194c8ab9223c55c709b,2024-11-06T15:47:13.077000
|
||||
CVE-2024-51583,0,0,010a1e766cc75cf146f9c46f237fd66f102136959cced374ac920d84a09d74b4,2024-11-14T02:17:13.323000
|
||||
CVE-2024-51584,0,0,9c4a52f0d53ee42578cceb9af71c252fa973eb5d3948982134b3891bd8f24f09,2024-11-14T02:23:33.777000
|
||||
CVE-2024-51585,0,0,f8f0159c16016c8277cf65597d8f99b43d67be3e4576e769b2c2d94060d5ff5c,2024-11-12T13:56:24.513000
|
||||
CVE-2024-51585,0,1,0bc0ac1464e29ee44df8444d7c4cdb63f1fa2b443bcb1af0569bc42ab7621110,2024-11-15T17:17:47.730000
|
||||
CVE-2024-51586,0,0,a8972424c5984945ec92c9d745b8e4e19d8648e53cf9bf4412423a5729e18a26,2024-11-12T13:56:24.513000
|
||||
CVE-2024-51587,0,0,5012d2ea8e67b5c3d09827ef519aa6163b1c4ce17e7784b8af6d96ad392aa639,2024-11-14T20:26:14.467000
|
||||
CVE-2024-51588,0,0,70526e1ab4d1d5c15696a10cecb0303b3b1171b870de0da3e9c134310aec09dc,2024-11-14T20:26:28.047000
|
||||
@ -265887,26 +265924,26 @@ CVE-2024-51589,0,0,f74ef05c06e608fec4a8cb8e6637837c5709985a6e45866d77121ef9596fd
|
||||
CVE-2024-5159,0,0,6487690749e64572084b0b1ffb84b7950e8b682c3129ca3d21d0dbc204e9ec91,2024-10-25T19:35:15.010000
|
||||
CVE-2024-51590,0,0,2b2dd3629e58a1a0a584c789ff16e47b54d755aa79cd57fc09a49fbe103244b5,2024-11-12T13:56:24.513000
|
||||
CVE-2024-51591,0,0,726468de391ad91b93d7baa9a968a1009926515da7cdc024a9ffcb433fe899c7,2024-11-14T17:51:14.717000
|
||||
CVE-2024-51592,0,0,d7967d1b981bf412d08b0a25269c7d321b022b9cea0f3a4b67df42b6afa94a25,2024-11-12T13:56:24.513000
|
||||
CVE-2024-51592,0,1,6dde9559fc706856c16fa16d5ca27161b15508ec6dfbe02d9bb0b204646f1a04,2024-11-15T17:04:52.197000
|
||||
CVE-2024-51593,0,0,0b8922825fb0b901603d2f67d3b43c5b8e0349818c9523e9ebd1542dcf2e04bf,2024-11-12T13:56:24.513000
|
||||
CVE-2024-51594,0,0,6349168b6c38502c80c5202765ac4a54912ffa4126b37a3166a4be8b98199c58,2024-11-12T13:56:24.513000
|
||||
CVE-2024-51595,0,0,86c632a830d98810cba6685fef0932835324b783d480bd1e19dc70d238e88d12,2024-11-12T13:56:24.513000
|
||||
CVE-2024-51596,0,0,68d56f326e86c174368dc8e5c4f277c0b65894f0149206735201856a3bb51840,2024-11-12T13:56:24.513000
|
||||
CVE-2024-51594,0,1,23c2bde634ef42108d5f97125b3187b82c0cbc626b82203b6c3273a5f7560ce9,2024-11-15T17:15:21.580000
|
||||
CVE-2024-51595,0,1,10c393f98a067c2f8e99f7ad9b6b4c58d89c36bcb5b68d6536bed94af2eb5437,2024-11-15T17:03:07.770000
|
||||
CVE-2024-51596,0,1,01788e96d18557d9efd5f3a1c0cc87c5c59abd37f0da1cf910d07664ffc536c3,2024-11-15T17:01:15.687000
|
||||
CVE-2024-51597,0,0,e580da6df611238773fd113640aa155cd0ddae703c31494078adb66dd981bd48,2024-11-14T20:27:46.943000
|
||||
CVE-2024-51598,0,0,ab45aa537bf288c8af2bb6366c2e9a74b71582c9d0d27efbfe545b94537181da,2024-11-12T13:56:24.513000
|
||||
CVE-2024-51599,0,1,7acfc4d03f6c4e0241e4f801826852b96d8755f6240b0f8a5702939c52f7cc5a,2024-11-15T16:55:34.480000
|
||||
CVE-2024-51599,0,0,7acfc4d03f6c4e0241e4f801826852b96d8755f6240b0f8a5702939c52f7cc5a,2024-11-15T16:55:34.480000
|
||||
CVE-2024-5160,0,0,761bdadb9ac3f89d156978519ca326c5704c62592c7f03e703ecc7e802a865d7,2024-07-03T02:08:36.807000
|
||||
CVE-2024-51601,0,0,1c0dbdb8639065f7f5ea5f6062d0125a4c4ce4b0c601912e96fe5db543ebfd2a,2024-11-12T13:56:24.513000
|
||||
CVE-2024-51602,0,0,822f9c86566535e8535c86995cf3af8d3cfe52baf5520ff85e767e1c3e7259ea,2024-11-12T13:56:24.513000
|
||||
CVE-2024-51603,0,1,a730746ec59538833fb1b8d30890055ac7925dfae1cdd77b4fda1967b595a281,2024-11-15T16:24:18.843000
|
||||
CVE-2024-51604,0,1,6a3e4a9375291be744614b2d5906671c19d1fe09996779b8dae193cdb2d50254,2024-11-15T16:19:11.063000
|
||||
CVE-2024-51605,0,1,1ef48abb0eb49926eef25f707be1d8bf237a6deaa1172eb4cd87e118f053e35d,2024-11-15T16:31:12.773000
|
||||
CVE-2024-51603,0,0,a730746ec59538833fb1b8d30890055ac7925dfae1cdd77b4fda1967b595a281,2024-11-15T16:24:18.843000
|
||||
CVE-2024-51604,0,0,6a3e4a9375291be744614b2d5906671c19d1fe09996779b8dae193cdb2d50254,2024-11-15T16:19:11.063000
|
||||
CVE-2024-51605,0,0,1ef48abb0eb49926eef25f707be1d8bf237a6deaa1172eb4cd87e118f053e35d,2024-11-15T16:31:12.773000
|
||||
CVE-2024-51606,0,0,ee1e7a1b1dbbb608910d3a1a8045750337c3795b4002cbbe921c849cc6ea0c49,2024-11-14T17:17:28.997000
|
||||
CVE-2024-51607,0,0,6430a32ad0ccdbe2b5e85b260802defe649419f41be04507feb4e50aaec51a17,2024-11-12T13:56:24.513000
|
||||
CVE-2024-51608,0,0,fa8c1f71c1313549b1f07e9b16bbcd2db8cf2a03813dee88669910ab58470fe5,2024-11-14T17:14:55.070000
|
||||
CVE-2024-51609,0,0,56872967e7644d93195c5d54b9b6037222a1a65a36a397a829075693cfee2bc9,2024-11-14T17:10:36.463000
|
||||
CVE-2024-5161,0,0,f120c7db938e25c7983d6c400da502880d5ffbc93ab4e5e05351c3fca8fbd038,2024-07-24T17:54:42.387000
|
||||
CVE-2024-51610,0,1,7648a3f8f67777cb52a0face6e2d46430e2e9cd0bf8a7468c0457d04e5d93ed9,2024-11-15T16:32:46.277000
|
||||
CVE-2024-51610,0,0,7648a3f8f67777cb52a0face6e2d46430e2e9cd0bf8a7468c0457d04e5d93ed9,2024-11-15T16:32:46.277000
|
||||
CVE-2024-51611,0,0,df71ebdad6b83784c059a213dbfeff0cd4ad4cfa07621a54c78ae28de90b182c,2024-11-12T13:56:24.513000
|
||||
CVE-2024-51612,0,0,68d292e6c4edc9ad2cb6a4f4df85c4beb58f5e75eb303880d4a399c88b63d1b7,2024-11-12T13:56:24.513000
|
||||
CVE-2024-51613,0,0,e5e09d28c859e2362905d8484d126a9fa39bc52028d1cd16464bb2210975b217,2024-11-12T13:56:24.513000
|
||||
@ -265932,7 +265969,7 @@ CVE-2024-51658,0,0,435f4fb63039956e91b2b852b51372b029bcbaead7356ecd935124297917c
|
||||
CVE-2024-51659,0,0,78d45b532178a143b0c2b377e8ea9093595088b2434d4e401a5f34f0a4ad9452,2024-11-15T13:58:08.913000
|
||||
CVE-2024-5166,0,0,5c544eab21844e01fabd3874ed7776a55145987bd3a510311ad16f12f33bd2bc,2024-05-22T18:59:20.240000
|
||||
CVE-2024-51661,0,0,7f81708d1fd43600536029afc897b01b4855aee3d2fe39c5692b8132139274de,2024-11-08T15:02:08.660000
|
||||
CVE-2024-51662,0,0,f5359332d7a9d4e37aab99663d0e73af1a60912d65021c3415523622490d6f78,2024-11-12T13:56:24.513000
|
||||
CVE-2024-51662,0,1,55b3b930a708e0b1f39e971bf0a8031fc7194c46e2d846ee33949a5396059d6a,2024-11-15T17:16:49.063000
|
||||
CVE-2024-51663,0,0,ddfbfefbc7a60682ba4fd5adc3f91d6c6ef86922dae3505b62e59555b1a68629,2024-11-12T13:56:24.513000
|
||||
CVE-2024-51664,0,0,f57811c0abc589cff3297f759189abd0529924ea2c107b407c1d4b0c093360b5,2024-11-12T13:56:24.513000
|
||||
CVE-2024-51665,0,0,836ecda2a38ee75dca042d09339ec8247ed79262a6a8d01bd25035a2e84a5ce0,2024-11-06T22:07:10.707000
|
||||
@ -266051,7 +266088,7 @@ CVE-2024-5185,0,0,0c09010aee9423412314c9f1cbba57fc2fd9ee19c760646e6502f5738cacb7
|
||||
CVE-2024-5186,0,0,7baed0c201f742c44896dec767d6237c8df7ae961ab3d7ec09eb8b65736716f7,2024-09-24T14:04:47.170000
|
||||
CVE-2024-5187,0,0,88fb29ce759c452b913d57a873a63220e31c82d475ca2c84fa3b804bf9736023,2024-10-23T13:36:11.643000
|
||||
CVE-2024-5188,0,0,b2a939863f7779e6dba1e0e2aecd4047c60710495b7cac734003aec732566505,2024-06-11T17:41:17.087000
|
||||
CVE-2024-51882,0,1,5d194411246929bd7d2c565494fb6c4858f77dd0f83ada9b5feee4075b6dc33c,2024-11-15T16:08:40.333000
|
||||
CVE-2024-51882,0,0,5d194411246929bd7d2c565494fb6c4858f77dd0f83ada9b5feee4075b6dc33c,2024-11-15T16:08:40.333000
|
||||
CVE-2024-5189,0,0,87ea6bb70c0f4e8e0e95d6725175819a83c6ff33cc484fc5f525db9ad5e385e9,2024-06-13T18:36:45.417000
|
||||
CVE-2024-5190,0,0,d58b9fdaecdb1abec20ccf7764e52a460a4959870ee8917a6c4a9f4c686657e6,2024-05-22T03:15:08.273000
|
||||
CVE-2024-5191,0,0,855a566258b8b88a588ebc49e507f9db3fa3e450b83819e0fe6599e7fdad210b,2024-06-24T19:25:23.943000
|
||||
@ -266157,13 +266194,13 @@ CVE-2024-5234,0,0,14a09ab7485c5dff6a0e2d37ff7f584b26da4a8cf075e00d5ab541632ac32b
|
||||
CVE-2024-5235,0,0,98bbbe6acfd408ea35eab71055bef5859edfdf3c3c90f82fa44b5b2f0c597f28,2024-06-04T19:21:03.207000
|
||||
CVE-2024-52350,0,0,e1972ef2ed811c153b13903abf6cdb344f717306ca9175d9381f4d30088fc38a,2024-11-14T20:22:24.387000
|
||||
CVE-2024-52351,0,0,bc8a69483160ec6542284bd2a28a21525e92c209bc39a02aab3ce5329e7f65b5,2024-11-14T20:24:39.083000
|
||||
CVE-2024-52352,0,0,d000632140f71e44e942a3dbc2ddd9260fa470cb96bef8ac5f8ba3eea1f0382e,2024-11-12T13:55:21.227000
|
||||
CVE-2024-52353,0,0,8f6fdbf8162ece41a08a7cc2a2dc9e5249ac6195297b0e830ced0d3f4bc5c84a,2024-11-12T13:55:21.227000
|
||||
CVE-2024-52354,0,0,bd5ed3d68271f155fc3112a493679226950394a406d6f8e4021a12bfa7a3c4fe,2024-11-12T13:55:21.227000
|
||||
CVE-2024-52355,0,0,ab138c81f8a6c2d78d8bf3737e35a8422aee1976da0dc3f8a86c63b65d3787dd,2024-11-12T13:55:21.227000
|
||||
CVE-2024-52356,0,1,851c201d7c2106e058116183f3ef13ac524e944c93e92a0be8b5c856c91b9b6b,2024-11-15T16:05:12.367000
|
||||
CVE-2024-52357,0,1,1972e22f599a1fd1b8d4152d07239a706a9c53ad0eb79683c3aab852fc4e443e,2024-11-15T16:04:45.767000
|
||||
CVE-2024-52358,0,1,64a4a904a23151aab1b11ae172d146919fa43e3b57b368f1c78e5557900f2543,2024-11-15T16:17:40.127000
|
||||
CVE-2024-52352,0,1,c96622c29cd330895f9beb2fe9ff89da9b80f902c68b78e2f7d6103ce4614e24,2024-11-15T17:46:27.217000
|
||||
CVE-2024-52353,0,1,daef8ce50caff998506ffd0fef6c59a46e385066c4d0e0cadd19145c5978f5d1,2024-11-15T17:49:31.553000
|
||||
CVE-2024-52354,0,1,7638d121a9657b0fa58bc3a68518ed0b3c2d06f335789558b0998388971e1384,2024-11-15T17:50:59.703000
|
||||
CVE-2024-52355,0,1,9f82a4c6a6c3e61ee91aee7a03bac939ee5b60c2e6aff9270e8dd90a90f029dd,2024-11-15T17:51:44.273000
|
||||
CVE-2024-52356,0,0,851c201d7c2106e058116183f3ef13ac524e944c93e92a0be8b5c856c91b9b6b,2024-11-15T16:05:12.367000
|
||||
CVE-2024-52357,0,0,1972e22f599a1fd1b8d4152d07239a706a9c53ad0eb79683c3aab852fc4e443e,2024-11-15T16:04:45.767000
|
||||
CVE-2024-52358,0,0,64a4a904a23151aab1b11ae172d146919fa43e3b57b368f1c78e5557900f2543,2024-11-15T16:17:40.127000
|
||||
CVE-2024-5236,0,0,3a876190aab882c0110e09fef49a5c72516897cda47bddba2de12251cfa9a5e8,2024-05-24T01:15:30.977000
|
||||
CVE-2024-52369,0,0,9bb6355bce4a4436b67b89be0df4c04ac56d16c7e0beb82cd7d9fa08a46a5e50,2024-11-15T13:58:08.913000
|
||||
CVE-2024-5237,0,0,8803efe45da93d97b55082adbd1bb29281c1282514c20ec3608a648081cd56be,2024-06-04T19:21:03.317000
|
||||
@ -266198,10 +266235,29 @@ CVE-2024-5248,0,0,6cfa5cec6de457c13d7096887dc7c2d8bd99f0e898238886822e69d1ee6603
|
||||
CVE-2024-5249,0,0,7881e207dd06fe76500d559735f87b1084a494789351514ee988debe74e79673,2024-10-01T14:26:17.410000
|
||||
CVE-2024-5250,0,0,b4b370273f1fe30d94b715ad219dda570a7dcb84192abd50c3cb746299bdbb93,2024-10-01T14:33:47.727000
|
||||
CVE-2024-52505,0,0,7c58f328eee3b40bfcef13b278250e7509b58c18af26b7fe642ca2ce116c61a9,2024-11-15T13:58:08.913000
|
||||
CVE-2024-52507,1,1,125f6e76ead970265ccbf72b03c073e885a41a8afed378315ad0eb723198acc7,2024-11-15T18:15:28.847000
|
||||
CVE-2024-52508,1,1,d6130dd73205c2d46831c1d437b1c635c8d9ad98fc719be06f29835d91ebc3b6,2024-11-15T18:15:29.060000
|
||||
CVE-2024-52509,1,1,a363fa464af35ac67493cdafcaded0d43fc1d98dbc897995ce1110859374e370,2024-11-15T18:15:29.280000
|
||||
CVE-2024-5251,0,0,7d84d2df7bf6674f7d634954defb2f38b0363c19ae19f78012df0aa633abf27a,2024-07-19T15:25:30.980000
|
||||
CVE-2024-52510,1,1,cc7d1ba4832e566babce4719fad7f982f1af06b53a3701790303c04d7ff7f69b,2024-11-15T18:15:29.497000
|
||||
CVE-2024-52511,1,1,15a6ba2d4b341b2d290edee9136ece82582e18ea391c5106374d99a2c4c8a40c,2024-11-15T18:15:29.717000
|
||||
CVE-2024-52512,1,1,6a63c39bd17573ecb0c00b9d4a77014e067a4b6f563641db935489603a22e52f,2024-11-15T18:15:29.933000
|
||||
CVE-2024-52513,1,1,b77daa0a56ac4001634f9d8555d15be1089bfb834ae881cb5e9a31ddd82f2bc7,2024-11-15T18:15:30.157000
|
||||
CVE-2024-52514,1,1,8473a595428b93d2147902d8b67b70903474e0a95b272cccc2ccd88e17eddb8d,2024-11-15T18:15:30.370000
|
||||
CVE-2024-52515,1,1,01803eef0486d96e7b73173ce83da53fc736e13641607b187afa0d24eefa62ff,2024-11-15T17:15:20.837000
|
||||
CVE-2024-52516,1,1,75e66465effc3863e439bb3f53f56098ce6985454a646030523f9b1919e4994d,2024-11-15T17:15:21.070000
|
||||
CVE-2024-52517,1,1,ef287e5e3c0bc63233aaef19833d59a0a3b70f6f88c5fd6f9dbbdce130c37eff,2024-11-15T17:15:21.297000
|
||||
CVE-2024-52518,1,1,6ebb5f9b29d8be57def26bafc7d4c9a9037ed95795b8a27881e57a224525b49e,2024-11-15T17:15:21.543000
|
||||
CVE-2024-52519,1,1,ef167401ae9fc01ccb1f13f70e64122366cb19a9418bcd255bc301ab8d4f7f92,2024-11-15T17:15:21.843000
|
||||
CVE-2024-5252,0,0,1b28d536afc88eae5088fe06ff49428bbad5ffcb2aa7139fe40c4c06d2601422,2024-07-19T15:29:35.447000
|
||||
CVE-2024-52520,1,1,4de7d2e7a45bd842065c15f5be2bd96578b919552715d69160c2096043d8c3e4,2024-11-15T17:35:16.007000
|
||||
CVE-2024-52521,1,1,faa46aebbec3a6f9761c605df33640c3789d02a577af493da0314de121761d4d,2024-11-15T17:15:22.580000
|
||||
CVE-2024-52522,1,1,3fb25637642f297664e883d8e91f2ab58d790cdf1866dd3c39c494590bd043d5,2024-11-15T18:15:30.643000
|
||||
CVE-2024-52523,1,1,c73b3a3e311904286520f4e28b5eb14cf21a74cb1348dc035fd6fd39108922b4,2024-11-15T17:35:16.820000
|
||||
CVE-2024-52524,0,0,71485345519193ae9ba542ea67056853a738d2240eb01cec0b89113cc24468ca,2024-11-15T13:58:08.913000
|
||||
CVE-2024-52526,1,1,db92b0ba845b721050dc5d75b07751c56b5840b3faec607c877ff07aee8d97f7,2024-11-15T16:15:38.107000
|
||||
CVE-2024-52525,1,1,ec8e0a0bf9b687aeae95450e5373687e7d3db6b39b44f52647e90ceeb50d4278,2024-11-15T17:15:23.150000
|
||||
CVE-2024-52526,0,0,db92b0ba845b721050dc5d75b07751c56b5840b3faec607c877ff07aee8d97f7,2024-11-15T16:15:38.107000
|
||||
CVE-2024-52528,1,1,7c0284429d075ac8663d2766c53f75a5ea01338874404bdf68a356726c7ad40f,2024-11-15T17:15:23.400000
|
||||
CVE-2024-5253,0,0,73f9562f224a9a11b8b8279a7bf00d920003fa046cb7c88a3a55caf281adabe4,2024-07-19T15:30:34.717000
|
||||
CVE-2024-52530,0,0,9accb3b51708da4056e1b2d60bf748a8c8f27363e68e7120159317514b4fed53,2024-11-12T19:35:14.927000
|
||||
CVE-2024-52531,0,0,4a9a627b31c610f608576c39893b61b41c0efeb9f9d97b523937261d20004d52,2024-11-12T19:35:15.807000
|
||||
@ -266215,7 +266271,7 @@ CVE-2024-52551,0,0,a55fcfda0c856a7c2e6739ceee574cb85a24fabb6c3ff844edb014b969fe9
|
||||
CVE-2024-52552,0,0,2f96ac448bf9b00ee8139fe2b1f83755e1d5e7ee62e44cc3e0f2925f12d3f6ce,2024-11-15T14:00:09.720000
|
||||
CVE-2024-52553,0,0,11348c28b862f60d8b3c8dc11ab0fb5f1e53e1358b82b1f8a97199c0de1f5907,2024-11-15T14:00:09.720000
|
||||
CVE-2024-52554,0,0,6589eaee43c4794afc2869f1e1fb69f264d40d3a38b215d2e67a517b5a3abbef,2024-11-15T13:58:08.913000
|
||||
CVE-2024-52555,1,1,5bd2a197b9b62d1570e8e4e5ac858dca21aea78d7b7b9d312bc19de044b868c9,2024-11-15T16:15:38.340000
|
||||
CVE-2024-52555,0,0,5bd2a197b9b62d1570e8e4e5ac858dca21aea78d7b7b9d312bc19de044b868c9,2024-11-15T16:15:38.340000
|
||||
CVE-2024-5256,0,0,c0c79be075ef53b66bd4c726b840e366d70c6f0c56013178c0440e2e2bf91c1e,2024-09-24T18:41:40.007000
|
||||
CVE-2024-5257,0,0,e4fba0a5c9dc635ae9582dcee356a08c90165a6e8c8a0a01b6dfbef5e885cd24,2024-07-12T16:54:34.517000
|
||||
CVE-2024-5258,0,0,51134eb56f05332c584317818ff995de56b2de598a9752cb1990f31f73c535e3,2024-05-24T01:15:30.977000
|
||||
@ -266421,7 +266477,7 @@ CVE-2024-5470,0,0,6ad8fffdbc9fc3c2ca94bc381d3be223e310676e26148212c497e243b6c174
|
||||
CVE-2024-5471,0,0,b5058f52e9634b68f4d4000cb97858db03cd2fac3d75cd140cb047a19da1c69c,2024-07-18T14:09:17.740000
|
||||
CVE-2024-5472,0,0,cbeafb08776655e35d6e47fe8a75d08cb39135639adca55be0cfb4cff69e0ec6,2024-08-01T13:59:47.140000
|
||||
CVE-2024-5473,0,0,7a9289264d1a834c0b8e9151c353ddcb7a22a22f6b7d360897c02053aaaeb88c,2024-07-03T02:08:57.860000
|
||||
CVE-2024-5474,0,0,0261380472823b7ef383b7b05cfdc57f13f0ff67f622b2c501faca79b6c35eba,2024-10-15T12:58:51.050000
|
||||
CVE-2024-5474,0,1,20b2c41a331598795f754fc38fbdf69c26a3bdc540877e8ec1d3dfd8d963cecf,2024-11-15T17:00:35.697000
|
||||
CVE-2024-5475,0,0,e09a66bd4d026df38a62a9d0642b82f2a5b9bf49c6a2d9e0e1e141414790fdd3,2024-07-03T02:08:58.050000
|
||||
CVE-2024-5478,0,0,c601a39452cb705e9035daa72131a8a960693dee4deccdae668f9ad5d8466d4f,2024-07-19T18:29:50.137000
|
||||
CVE-2024-5479,0,0,7bf7a94732a4ce28b83209c9d21f799503dcb5933696ba21b8f4bc98737c6d69,2024-07-09T18:19:14.047000
|
||||
@ -267245,7 +267301,7 @@ CVE-2024-6409,0,0,9bcf73b7e73de600a40e8d67921dca9ee633e58d1be7205c1cbcd58e7e7c03
|
||||
CVE-2024-6410,0,0,9db961a9e1824a35ea4ea0ac1b25800d120aafac2e5d4caf32d46e6051ad19d3,2024-07-11T13:05:54.930000
|
||||
CVE-2024-6411,0,0,47c8df8c850420fccb0a9ac1089e4a10bdc49d8ecc38cd5ac33a449b2082a491,2024-07-11T13:05:54.930000
|
||||
CVE-2024-6412,0,0,ac3e0b4dd9dc421ed7bc50bb0eaac729f5a46e72227bdeb5f2fc2db7ccb48399,2024-08-01T18:35:24.697000
|
||||
CVE-2024-6413,1,1,b5f68fde45a9f778cbd0fdc1a3ab3968b7f6b50b44c8e25d6d6e5c144950ab51,2024-11-15T16:15:38.573000
|
||||
CVE-2024-6413,0,0,b5f68fde45a9f778cbd0fdc1a3ab3968b7f6b50b44c8e25d6d6e5c144950ab51,2024-11-15T16:15:38.573000
|
||||
CVE-2024-6414,0,0,ae0d661be5f3239fdfe6f0d08030fef27c03212dc1e12675bcf532fd90369002,2024-07-01T12:37:24.220000
|
||||
CVE-2024-6415,0,0,2d930efbf55d72578aa6f6117194938fd91dbe48efc49659be82131c011d6129,2024-07-01T12:37:24.220000
|
||||
CVE-2024-6416,0,0,1d3038bca30e2041aec4c6f6e9ac2c7cb38b0b032dbc11dcdc7f3d31ad18d01f,2024-07-01T12:37:24.220000
|
||||
@ -267724,7 +267780,7 @@ CVE-2024-6980,0,0,f6625eb84b24e1b38c56cc3bb53a8be195d62bb4e9db2a7b8e6feb6123dc76
|
||||
CVE-2024-6981,0,0,510d4c4925a1eb3b58785bbc8ab5a73c80a24b4283cae4ebe7ab898a6ac026fd,2024-09-30T12:45:57.823000
|
||||
CVE-2024-6983,0,0,26d1c914038fe83b8e6a8b16fb4211c387129700e5470999eec99bc2e4f2518e,2024-09-30T12:45:57.823000
|
||||
CVE-2024-6984,0,0,923e45bdbdeb390a80e72f79f52c794d2a4658d69ca6fdf4fb6edad3e12c000f,2024-09-11T16:39:37.253000
|
||||
CVE-2024-6985,0,0,725ec504770a2860bc10fde289ec9c08990ebc76d2606157fcd4e8d4fef9068d,2024-10-15T12:58:51.050000
|
||||
CVE-2024-6985,0,1,5f1c7f843f103283ef340d6aef84884ca87fbfcf1e850856d8d1ff0697d7a56e,2024-11-15T17:10:59.157000
|
||||
CVE-2024-6987,0,0,330d8660e6c8d71a307c7f147e933f5e3b64b2ed81a202f0c00b33c60663824c,2024-08-08T13:04:18.753000
|
||||
CVE-2024-6988,0,0,7c7b8d3e1cf6e7ad313fbb0065550bb07b14482a1596e2d1017c6e1750b4a915,2024-08-07T20:51:56.167000
|
||||
CVE-2024-6989,0,0,ade79451132400d31d7ae605ff13fce7650d6dfcad5f07960cf60cc71279c505,2024-08-07T22:10:20.423000
|
||||
@ -268445,7 +268501,7 @@ CVE-2024-7861,0,0,0a909509d97ae1cc7403adef3feb39aabff91c1c695789c3f097cacdbb9f06
|
||||
CVE-2024-7862,0,0,93a56c5460193ed1b7a3fcd65df3704afa8a5142705928cac67e2d4cbedb7a4c,2024-09-30T14:15:37.093000
|
||||
CVE-2024-7863,0,0,11d320db6ad42df94b7ce126cd0ba1a84504b8818a402a12b56e92e066aa845a,2024-09-27T21:27:07.640000
|
||||
CVE-2024-7864,0,0,8cb55f9c6813f7ebb3e411de07404fd2812a548c1112fcc9ece6be38f8f1e98f,2024-09-27T21:26:50.067000
|
||||
CVE-2024-7865,1,1,f7c647db6becccf9919112076e8e4feb9a32ead1a81ccabf732c60c97ebe93bd,2024-11-15T16:15:38.630000
|
||||
CVE-2024-7865,0,0,f7c647db6becccf9919112076e8e4feb9a32ead1a81ccabf732c60c97ebe93bd,2024-11-15T16:15:38.630000
|
||||
CVE-2024-7866,0,0,4c0cb0c858c0ff2de3d3bc9c6187348080bb51d5934bb16167513e626d441be5,2024-08-20T19:23:02.780000
|
||||
CVE-2024-7867,0,0,cc4e8e2cbae6cc9c2393332b56b3dc1a7160836d4b3b7919e8d1234e73599a3b,2024-08-28T21:59:33.973000
|
||||
CVE-2024-7868,0,0,c4ea1bb97a13baa8d231995b3d29c0db15f328b428d9b25a1a7a0b4c8b9c1d1a,2024-09-11T12:40:01.817000
|
||||
@ -268833,7 +268889,7 @@ CVE-2024-8372,0,0,ed7416684bf8c992c4344af2dee1225532302d263529a8756259e179ed722a
|
||||
CVE-2024-8373,0,0,d1a5cc99924a2151520a8ea490fb3d660801248a7f2168e9fe7f0fc9057db80c,2024-09-17T17:32:33.380000
|
||||
CVE-2024-8374,0,0,d48dc520ae709311b13e321521d105dda894c6710801eb063d42db744b0094d0,2024-09-16T16:44:42.403000
|
||||
CVE-2024-8375,0,0,58cea17ca7f7a98f8126bafea3caa90f64ce326ce0b828e067a1c86c7d982ac6,2024-09-20T12:30:17.483000
|
||||
CVE-2024-8376,0,0,8755f13d2baf2ea4c1f32851a9e5c748f58fd57e01338c5081bda3b629604419,2024-10-31T10:15:05.930000
|
||||
CVE-2024-8376,0,1,c73e1dac5f22c8265a05cae90e61c52c37270cb05b4b1cdafbf5199fe95ba0a8,2024-11-15T17:21:02.327000
|
||||
CVE-2024-8378,0,0,3434914a3a4696d8c6e4be732060229a1888e16a9bb4c1b6ee051204dce8e665,2024-11-08T19:01:03.880000
|
||||
CVE-2024-8379,0,0,085298af9559a314a9f72b50c0919e14d810bca9e3bf6d4dab66f461020341e6,2024-10-07T15:49:54.653000
|
||||
CVE-2024-8380,0,0,036c8c11a05ec98776794766e58c3583b3eabb4c67c37c1216e0519e7baf5609,2024-09-04T14:58:49.450000
|
||||
@ -269599,7 +269655,7 @@ CVE-2024-9482,0,0,761865a3338cb95ad6952db46fced2e0b200e6722c7208c63ea4447e293045
|
||||
CVE-2024-9483,0,0,ad5fedd0cd72fbc18365b7b114267513d576cf1b98379267d7018d384a26ba96,2024-11-08T20:54:30.980000
|
||||
CVE-2024-9484,0,0,86ad5ee84c3c6fb7cf3b149fe0f453f5a54885e17fbe04bacb6644367538b071,2024-11-08T20:55:14.283000
|
||||
CVE-2024-9486,0,0,69b6721a825ab2624e7f19326bb9e1625f15ea4093ed6bc68f868f6a5c393d51,2024-11-08T20:56:54.807000
|
||||
CVE-2024-9487,0,1,8c0f797a1267751cd655e097cc4e72301937e39ee2b0b43119e44c1b6d6e9879,2024-11-15T16:57:10.080000
|
||||
CVE-2024-9487,0,0,8c0f797a1267751cd655e097cc4e72301937e39ee2b0b43119e44c1b6d6e9879,2024-11-15T16:57:10.080000
|
||||
CVE-2024-9488,0,0,7160e6226507ff679fbcba733953e2a0c67fe3c2a8e1dee05991bd941a40e8b2,2024-11-06T14:57:04.457000
|
||||
CVE-2024-9489,0,0,da9917eda81b5ad40f78c98d3cdcfaa2ce360118ba030bb2ddb2e149e55b8a8e,2024-11-01T16:27:25.937000
|
||||
CVE-2024-9501,0,0,d7be73289096f59e8614142ae5f23da8d3cd042d0cbe3c76d9c725d64a67b604,2024-10-28T13:58:09.230000
|
||||
@ -269625,7 +269681,7 @@ CVE-2024-9535,0,0,4a71ba0a2572a89f39d0b54033731c76d4c93435778a2b1285d18249bf7f61
|
||||
CVE-2024-9536,0,0,56b0d71a5e1f747b35f1ac4fcfd42bf040a735cf796864344938e26d90f6930b,2024-10-07T17:47:48.410000
|
||||
CVE-2024-9537,0,0,aa6888a9cfaabe7c166bed0948898b65f4ee4b8fc4b3ec78f2bc1cb749794abf,2024-10-22T17:33:23.837000
|
||||
CVE-2024-9538,0,0,11f6571425b77352661bef56e196d840faf334a919cdd5771fb07fb3f313a4e6,2024-10-15T12:58:51.050000
|
||||
CVE-2024-9539,0,0,a0cbd26a327675fb40fcaea93c0a3ea911dbc683021df526355995459666c7a0,2024-10-15T12:57:46.880000
|
||||
CVE-2024-9539,0,1,11c46fc6a0754fafad9e15015d4146ba491e021bb291b9ec64e4cebcec8265c9,2024-11-15T17:15:06.600000
|
||||
CVE-2024-9540,0,0,4cadd44c097aa3daf6f235c810f4f4366e2397875e1522a0c58f481ec8e438a3,2024-10-30T20:56:01.637000
|
||||
CVE-2024-9541,0,0,54c1df5f396c57f877a5cd4cb59c8edc81b18e3e67e601f49a4b9fc18ad0b5e9,2024-10-25T21:16:12.447000
|
||||
CVE-2024-9543,0,0,2a7de8e1e43a15761699f58c8b8bbb57c7e560a2fb555c13127ead0f3f3c7fd9,2024-10-15T12:58:51.050000
|
||||
@ -269774,7 +269830,7 @@ CVE-2024-9817,0,0,f8de20e1a75881ef54f60bc313d87d714ab8deb93b0bb597962b93099db146
|
||||
CVE-2024-9818,0,0,27036e755744f27c38d726a43ad1c9df4e3ef69bf87c77f10cf90295a9b03eec,2024-10-17T18:13:37.347000
|
||||
CVE-2024-9820,0,0,c625b59d383479a78d36c1a053a231b239e4eac8d7ff5924cc83c93a44968c73,2024-10-19T00:44:10.420000
|
||||
CVE-2024-9821,0,0,847982287e8db8d54661c5522d18fa833c3d9091b2ddb2afe78ab1e8077a47cb,2024-10-15T12:57:46.880000
|
||||
CVE-2024-9822,0,1,82e3d945f4509fe65e88458324aa86a5fabdddc602a0f9734fd3049d36a53ed7,2024-11-15T16:41:41.507000
|
||||
CVE-2024-9822,0,0,82e3d945f4509fe65e88458324aa86a5fabdddc602a0f9734fd3049d36a53ed7,2024-11-15T16:41:41.507000
|
||||
CVE-2024-9823,0,0,9bd58749a01179ea21ca36b4d37feb833f368418a0a0359d3cad87b853574111,2024-10-15T12:57:46.880000
|
||||
CVE-2024-9824,0,0,0b6b46e52b34b071e6f48e5304d76a541526a4368e490338503476fca424894a,2024-10-15T12:57:46.880000
|
||||
CVE-2024-9825,0,0,43f77069eab20c6659796a5ca73cb04eb18b719fa0ad0721704c789de713790a,2024-10-29T14:34:50.257000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user