mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
Auto-Update: 2024-08-21T22:00:17.601688+00:00
This commit is contained in:
parent
acc9a328aa
commit
534fdfba61
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-29929",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-21T18:15:09.173",
|
||||
"lastModified": "2024-08-21T18:15:09.173",
|
||||
"lastModified": "2024-08-21T21:35:00.720",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "Buffer Overflow vulnerability found in Kemptechnologies Loadmaster before v.7.2.60.0 allows a remote attacker to casue a denial of service via the libkemplink.so, isreverse library."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://kemptechnologies.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-40107",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2024-02-15T23:15:08.197",
|
||||
"lastModified": "2024-02-16T13:37:55.033",
|
||||
"lastModified": "2024-08-21T21:35:01.720",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "En ARTPWriter de ARTPWriter.cpp, existe un posible use after free debido a datos no inicializados. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.4,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.4,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://android.googlesource.com/platform/frameworks/av/+/acb81624b4f50fed52cb1b3829809ee2f7377093",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-44039",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-03T16:15:07.093",
|
||||
"lastModified": "2024-04-03T17:24:18.150",
|
||||
"lastModified": "2024-08-21T21:35:02.723",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "En VeridiumID anterior a 3.5.0, la API WebAuthn permite que un atacante interno no autenticado (que puede pasar verificaciones de inscripci\u00f3n y puede registrar una clave FIDO) registre su autenticador FIDO en la cuenta de una v\u00edctima y, en consecuencia, se haga cargo de la cuenta."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 9.1,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-287"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://docs.veridiumid.com/docs/v3.5/security-advisory#id-%28v3.52%29SecurityAdvisory-Acknowledgement",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-52892",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-06-27T22:15:10.277",
|
||||
"lastModified": "2024-06-28T10:27:00.920",
|
||||
"lastModified": "2024-08-21T20:35:00.760",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "En phpseclib anterior a 1.0.22, 2.x anterior a 2.0.46 y 3.x anterior a 3.0.33, se permite incorrectamente que algunos caracteres en los campos Nombre alternativo del sujeto en los certificados TLS tengan un significado especial en expresiones regulares (como + comod\u00edn), lo que genera confusi\u00f3n de nombres en la verificaci\u00f3n del host de certificados X.509."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-436"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/phpseclib/phpseclib/commit/6cd6e8ceab9f2b55c8cd81d2192bf98cbeaf4627",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-0023",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2024-02-16T20:15:47.767",
|
||||
"lastModified": "2024-02-16T21:39:50.223",
|
||||
"lastModified": "2024-08-21T20:35:01.700",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "En ConvertRGBToPlanarYUV de Codec2BufferUtils.cpp, existe una posible escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites incorrecta. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.4,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.4,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://android.googlesource.com/platform/frameworks/av/+/30b1b34cfd5abfcfee759e7d13167d368ac6c268",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-0036",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2024-02-16T02:15:51.047",
|
||||
"lastModified": "2024-02-16T13:37:51.433",
|
||||
"lastModified": "2024-08-21T21:35:03.820",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "En startNextMatchingActivity de ActivityTaskManagerService.java, existe una forma posible de evitar las restricciones para iniciar actividades desde segundo plano debido a un error l\u00f3gico en el c\u00f3digo. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.4,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.4,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://android.googlesource.com/platform/frameworks/base/+/3eaaa9687e90c65f51762deb343f18bef95d4e8e",
|
||||
|
56
CVE-2024/CVE-2024-204xx/CVE-2024-20417.json
Normal file
56
CVE-2024/CVE-2024-204xx/CVE-2024-20417.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-20417",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-08-21T20:15:08.533",
|
||||
"lastModified": "2024-08-21T20:15:08.533",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Multiple vulnerabilities in the REST API of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to conduct blind SQL injection attacks.\r\n\r\nThese vulnerabilities are due to insufficient validation of user-supplied input in REST API calls. An attacker could exploit these vulnerabilities by sending crafted input to an affected device. A successful exploit could allow the attacker to view or modify data on the affected device."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-rest-5bPKrNtZ",
|
||||
"source": "ykramarz@cisco.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-204xx/CVE-2024-20466.json
Normal file
56
CVE-2024/CVE-2024-204xx/CVE-2024-20466.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-20466",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-08-21T20:15:08.737",
|
||||
"lastModified": "2024-08-21T20:15:08.737",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to obtain sensitive information from an affected device.\r\n\r\nThis vulnerability is due to improper enforcement of administrative privilege levels for high-value sensitive data. An attacker with read-only Administrator privileges for the web-based management interface on an affected device could exploit this vulnerability by browsing to a page that contains sensitive data. A successful exploit could allow the attacker to collect sensitive information regarding the configuration of the system."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-266"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-info-exp-vdF8Jbyk",
|
||||
"source": "ykramarz@cisco.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-204xx/CVE-2024-20486.json
Normal file
56
CVE-2024/CVE-2024-204xx/CVE-2024-20486.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-20486",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-08-21T20:15:08.933",
|
||||
"lastModified": "2024-08-21T20:15:08.933",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack and perform arbitrary actions on an affected device.\r\n\r\nThis vulnerability is due to insufficient CSRF protections for the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to follow a crafted link. A successful exploit could allow the attacker to perform arbitrary actions on the affected device with the privileges of the targeted user."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-csrf-y4ZUz5Rj",
|
||||
"source": "ykramarz@cisco.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-27138",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-03-01T16:15:45.983",
|
||||
"lastModified": "2024-08-02T01:15:30.263",
|
||||
"lastModified": "2024-08-21T21:35:04.820",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [
|
||||
{
|
||||
@ -22,7 +22,30 @@
|
||||
"value": "** NO SOPORTADO CUANDO SE ASIGN\u00d3 ** Vulnerabilidad de autorizaci\u00f3n incorrecta en Apache Archiva. Apache Archiva tiene una configuraci\u00f3n para deshabilitar el registro de usuarios; sin embargo, esta restricci\u00f3n se puede evitar. Como Apache Archiva ha sido retirado, no esperamos lanzar una versi\u00f3n de Apache Archiva que solucione este problema. Se recomienda considerar la posibilidad de migrar a una soluci\u00f3n diferente o aislar su instancia de usuarios que no sean de confianza. NOTA: Esta vulnerabilidad solo afecta a productos que ya no son compatibles con el fabricante"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@apache.org",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-27474",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-10T15:16:04.867",
|
||||
"lastModified": "2024-04-10T19:49:51.183",
|
||||
"lastModified": "2024-08-21T21:35:05.010",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Leantime 3.0.6 es vulnerable a Cross-Site Request Forgery (CSRF). Esta vulnerabilidad permite a actores malintencionados realizar acciones no autorizadas en nombre de usuarios autenticados, espec\u00edficamente administradores."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://drive.proton.me/urls/67VER05Z84#f0fXnmp8o6Y9",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-28732",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-08T14:15:07.600",
|
||||
"lastModified": "2024-04-08T18:48:40.217",
|
||||
"lastModified": "2024-08-21T21:35:05.793",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Se descubri\u00f3 un problema en OFPMatch en parser.py en Faucet SDN Ryu versi\u00f3n 4.34, que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (DoS) (bucle infinito)."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-835"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/ErodedElk/1133d64dde2d92393a065edc9b243792",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-30850",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-12T06:15:06.943",
|
||||
"lastModified": "2024-04-12T12:43:46.210",
|
||||
"lastModified": "2024-08-21T20:35:03.010",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Un problema en tiagorlampert CHAOS v5.0.1 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de la funci\u00f3n BuildClient dentro de client_service.go"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://blog.chebuya.com/posts/remote-code-execution-on-chaos-rat-via-spoofed-agents/",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-32902",
|
||||
"sourceIdentifier": "dsap-vuln-management@google.com",
|
||||
"published": "2024-06-13T21:15:54.503",
|
||||
"lastModified": "2024-07-16T14:57:42.527",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-08-21T21:35:06.743",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-33227",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-05-22T16:15:10.403",
|
||||
"lastModified": "2024-05-22T18:59:20.240",
|
||||
"lastModified": "2024-08-21T21:35:06.933",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,30 @@
|
||||
"value": "Un problema en el componente ddcdrv.sys de Nicomsoft WinI2C/DDC v3.7.4.0 permite a los atacantes escalar privilegios y ejecutar c\u00f3digo arbitrario mediante el env\u00edo de solicitudes IOCTL manipuladas."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/DriverHunter/Win-Driver-EXP/tree/main/CVE-2024-33227",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-33673",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-26T02:15:06.790",
|
||||
"lastModified": "2024-04-26T12:58:17.720",
|
||||
"lastModified": "2024-08-21T21:35:07.123",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -39,6 +39,18 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.veritas.com/support/en_US/security/VTS24-002#H2",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-34502",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-05-05T19:15:07.197",
|
||||
"lastModified": "2024-06-10T17:16:29.370",
|
||||
"lastModified": "2024-08-21T20:35:03.920",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Se descubri\u00f3 un problema en WikibaseLexeme en MediaWiki antes de 1.39.6, 1.40.x antes de 1.40.2 y 1.41.x antes de 1.41.1. Cargando especial: MergeLexemes (intentar\u00e1) realizar una edici\u00f3n que combine el ID de origen con el ID de destino, incluso si la solicitud no fue una solicitud POST, e incluso si no contiene un token de edici\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/WikibaseLexeme/+/1013359",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-3590",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-05-14T15:41:54.880",
|
||||
"lastModified": "2024-05-14T16:11:39.510",
|
||||
"lastModified": "2024-08-21T21:35:07.913",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,30 @@
|
||||
"value": "El complemento LetterPress WordPress hasta la versi\u00f3n 1.2.2 no tiene comprobaciones CSRF en algunos lugares, lo que podr\u00eda permitir a los atacantes hacer que los usuarios que han iniciado sesi\u00f3n realicen acciones no deseadas a trav\u00e9s de ataques CSRF, como eliminar suscriptores arbitrarios."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/829f4d40-e5b0-4009-b753-85ca2a5b3d25/",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-40480",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-12T13:38:29.003",
|
||||
"lastModified": "2024-08-15T13:47:50.450",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-08-21T21:35:08.270",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -49,6 +49,16 @@
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-41630",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-31T19:15:12.390",
|
||||
"lastModified": "2024-08-01T12:42:36.933",
|
||||
"lastModified": "2024-08-21T21:35:09.060",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": " Vulnerabilidad de desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria en Tenda AC18 V15.03.3.10_EN permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s del par\u00e1metro ssid en ip/goform/fast_setting_wifi_set."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.6,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 4.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://palm-vertebra-fe9.notion.site/form_fast_setting_wifi_set-fd47294cf4bb460bb95f804d39e53f34",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-42102",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-07-30T08:15:02.733",
|
||||
"lastModified": "2024-07-30T13:32:45.943",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-21T20:48:01.940",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,39 +15,159 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: Revertir \"mm/writeback: corrige la posible divisi\u00f3n por cero en wb_dirty_limits(), nuevamente\" Patch series \"mm: evita posibles desbordamientos en la aceleraci\u00f3n sucia\". La l\u00f3gica de limitaci\u00f3n sucia supone que los l\u00edmites sucios en las unidades de p\u00e1ginas caben en 32 bits. Esta serie de parches garantiza que esto sea cierto (consulte el parche 2/2 para obtener m\u00e1s detalles). Este parche (de 2): esto revierte la confirmaci\u00f3n 9319b647902cbd5cc884ac08a8a6d54ce111fc78. El compromiso se rompe de varias maneras. En primer lugar, la conversi\u00f3n eliminada (u64) de la multiplicaci\u00f3n introducir\u00e1 un desbordamiento de multiplicaci\u00f3n en arcos de 32 bits si wb_thresh * bg_thresh >= 1<<32 (lo cual es realmente com\u00fan; la configuraci\u00f3n predeterminada con 4 GB de RAM activar\u00e1 esto). En segundo lugar, div64_u64() es innecesariamente caro en arcos de 32 bits. Tenemos div64_ul() en caso de que queramos ser seguros y econ\u00f3micos. En tercer lugar, si los umbrales sucios son mayores que 1<<32 p\u00e1ginas, entonces el equilibrio sucio explotar\u00e1 de muchas otras maneras espectaculares de todos modos, por lo que intentar solucionar un posible desbordamiento es discutible."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-369"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.19.307",
|
||||
"versionEndExcluding": "4.19.318",
|
||||
"matchCriteriaId": "AC87CBCC-3003-46A2-A52F-5CCE1E460E3B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.4.269",
|
||||
"versionEndExcluding": "5.4.280",
|
||||
"matchCriteriaId": "293D6C3D-DC96-4828-BE63-8D51E25BE21C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.10.210",
|
||||
"versionEndExcluding": "5.10.222",
|
||||
"matchCriteriaId": "3D7FDA64-0DC4-4B41-B50A-574D2D1FA12D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.15.149",
|
||||
"versionEndExcluding": "5.15.163",
|
||||
"matchCriteriaId": "0720413E-F29A-4C0A-9B57-5158A778C4A2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.1.79",
|
||||
"versionEndExcluding": "6.1.98",
|
||||
"matchCriteriaId": "56BF47BE-6357-4916-8FB6-5EB3BF21A96E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.6.18",
|
||||
"versionEndExcluding": "6.6.39",
|
||||
"matchCriteriaId": "B702CA29-94C0-4076-8DE7-5041233C96A5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.8",
|
||||
"versionEndExcluding": "6.9.9",
|
||||
"matchCriteriaId": "5726EB4D-ED18-4DEC-B0C0-A525D33487E1"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/000099d71648504fb9c7a4616f92c2b70c3e44ec",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/145faa3d03688cbb7bbaaecbd84c01539852942c",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/23a28f5f3f6ca1e4184bd0e9631cd0944cf1c807",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/253f9ea7e8e53a5176bd80ceb174907b10724c1a",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/2820005edae13b140f2d54267d1bd6bb23915f59",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/30139c702048f1097342a31302cbd3d478f50c63",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/cbbe17a324437c0ff99881a3ee453da45b228a00",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/f6620df12cb6bdcad671d269debbb23573502f9d",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-42108",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-07-30T08:15:03.333",
|
||||
"lastModified": "2024-07-30T13:32:45.943",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-21T20:52:35.470",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,15 +15,75 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: rswitch: Evite el use after free en rswitch_poll() El use after free est\u00e1 en realidad en rswitch_tx_free(), que est\u00e1 incluido en rswitch_poll(). Dado que `skb` y `gq->skbs[gq->dirty]` son de hecho el mismo puntero, el skb primero se libera usando dev_kfree_skb_any(), luego el valor en skb->len se usa para actualizar las estad\u00edsticas de la interfaz. Avancemos por las instrucciones para usar skb->len antes de liberar el skb. Este error es trivial de reproducir usando KFENCE. Activar\u00e1 un sonido cada pocos paquetes. Una simple solicitud ARP o una solicitud de eco ICMP es suficiente."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.8",
|
||||
"versionEndExcluding": "6.9.9",
|
||||
"matchCriteriaId": "5726EB4D-ED18-4DEC-B0C0-A525D33487E1"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/92cbbe7759193e3418f38d0d73f8fe125312c58b",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/9a0c28efeec6383ef22e97437616b920e7320b67",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-42604",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-20T15:15:21.940",
|
||||
"lastModified": "2024-08-21T13:12:50.820",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-08-21T20:35:05.780",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-42777",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-21T18:15:09.930",
|
||||
"lastModified": "2024-08-21T18:15:09.930",
|
||||
"lastModified": "2024-08-21T21:35:09.833",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "An Unrestricted file upload vulnerability was found in \"/music/ajax.php?action=signup\" of Kashipara Music Management System v1.0, which allows attackers to execute arbitrary code via uploading a crafted PHP file."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Music%20Management%20System%20v1.0/Unrestricted%20File%20Upload%20-%20SignUp.pdf",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-42786",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-21T18:15:10.783",
|
||||
"lastModified": "2024-08-21T18:15:10.783",
|
||||
"lastModified": "2024-08-21T21:35:10.637",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "A SQL injection vulnerability in \"/music/view_user.php\" in Kashipara Music Management System v1.0 allows an attacker to execute arbitrary SQL commands via the \"id\" parameter of View User Profile Page."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Music%20Management%20System%20v1.0/SQL%20Injection%20-%20View%20Profile.pdf",
|
||||
|
64
CVE-2024/CVE-2024-63xx/CVE-2024-6386.json
Normal file
64
CVE-2024/CVE-2024-63xx/CVE-2024-6386.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2024-6386",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-08-21T21:15:08.577",
|
||||
"lastModified": "2024-08-21T21:15:08.577",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The WPML plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 4.6.12 via the Twig Server-Side Template Injection. This is due to missing input validation and sanitization on the render function. This makes it possible for authenticated attackers, with Contributor-level access and above, to execute code on the server."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.9,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-1336"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec.stealthcopter.com/wpml-rce-via-twig-ssti/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://wpml.org/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f7fc91cc-e529-4362-8269-bf7ee0766e1e?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
37
CVE-2024/CVE-2024-79xx/CVE-2024-7964.json
Normal file
37
CVE-2024/CVE-2024-79xx/CVE-2024-7964.json
Normal file
@ -0,0 +1,37 @@
|
||||
{
|
||||
"id": "CVE-2024-7964",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2024-08-21T21:15:08.850",
|
||||
"lastModified": "2024-08-21T21:15:08.850",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Use after free in Passwords in Google Chrome on Android prior to 128.0.6613.84 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop_21.html",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://issues.chromium.org/issues/358296941",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-79xx/CVE-2024-7965.json
Normal file
25
CVE-2024/CVE-2024-79xx/CVE-2024-7965.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-7965",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2024-08-21T21:15:08.947",
|
||||
"lastModified": "2024-08-21T21:15:08.947",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Inappropriate implementation in V8 in Google Chrome prior to 128.0.6613.84 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop_21.html",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://issues.chromium.org/issues/356196918",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-79xx/CVE-2024-7966.json
Normal file
25
CVE-2024/CVE-2024-79xx/CVE-2024-7966.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-7966",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2024-08-21T21:15:09.000",
|
||||
"lastModified": "2024-08-21T21:15:09.000",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Out of bounds memory access in Skia in Google Chrome prior to 128.0.6613.84 allowed a remote attacker who had compromised the renderer process to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop_21.html",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://issues.chromium.org/issues/355465305",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
}
|
||||
]
|
||||
}
|
37
CVE-2024/CVE-2024-79xx/CVE-2024-7967.json
Normal file
37
CVE-2024/CVE-2024-79xx/CVE-2024-7967.json
Normal file
@ -0,0 +1,37 @@
|
||||
{
|
||||
"id": "CVE-2024-7967",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2024-08-21T21:15:09.060",
|
||||
"lastModified": "2024-08-21T21:15:09.060",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Heap buffer overflow in Fonts in Google Chrome prior to 128.0.6613.84 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-122"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop_21.html",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://issues.chromium.org/issues/355731798",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
}
|
||||
]
|
||||
}
|
37
CVE-2024/CVE-2024-79xx/CVE-2024-7968.json
Normal file
37
CVE-2024/CVE-2024-79xx/CVE-2024-7968.json
Normal file
@ -0,0 +1,37 @@
|
||||
{
|
||||
"id": "CVE-2024-7968",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2024-08-21T21:15:09.133",
|
||||
"lastModified": "2024-08-21T21:15:09.133",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Use after free in Autofill in Google Chrome prior to 128.0.6613.84 allowed a remote attacker who had convinced the user to engage in specific UI interactions to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop_21.html",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://issues.chromium.org/issues/349253666",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
}
|
||||
]
|
||||
}
|
37
CVE-2024/CVE-2024-79xx/CVE-2024-7969.json
Normal file
37
CVE-2024/CVE-2024-79xx/CVE-2024-7969.json
Normal file
@ -0,0 +1,37 @@
|
||||
{
|
||||
"id": "CVE-2024-7969",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2024-08-21T21:15:09.203",
|
||||
"lastModified": "2024-08-21T21:15:09.203",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Type Confusion in V8 in Google Chrome prior to 128.0.6613.84 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-843"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop_21.html",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://issues.chromium.org/issues/351865302",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
}
|
||||
]
|
||||
}
|
37
CVE-2024/CVE-2024-79xx/CVE-2024-7971.json
Normal file
37
CVE-2024/CVE-2024-79xx/CVE-2024-7971.json
Normal file
@ -0,0 +1,37 @@
|
||||
{
|
||||
"id": "CVE-2024-7971",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2024-08-21T21:15:09.277",
|
||||
"lastModified": "2024-08-21T21:15:09.277",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Type confusion in V8 in Google Chrome prior to 128.0.6613.84 allowed a remote attacker to exploit heap corruption via a crafted HTML page. (Chromium security severity: High)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-843"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop_21.html",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://issues.chromium.org/issues/360700873",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-79xx/CVE-2024-7972.json
Normal file
25
CVE-2024/CVE-2024-79xx/CVE-2024-7972.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-7972",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2024-08-21T21:15:09.353",
|
||||
"lastModified": "2024-08-21T21:15:09.353",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Inappropriate implementation in V8 in Google Chrome prior to 128.0.6613.84 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page. (Chromium security severity: Medium)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop_21.html",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://issues.chromium.org/issues/345960102",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
}
|
||||
]
|
||||
}
|
37
CVE-2024/CVE-2024-79xx/CVE-2024-7973.json
Normal file
37
CVE-2024/CVE-2024-79xx/CVE-2024-7973.json
Normal file
@ -0,0 +1,37 @@
|
||||
{
|
||||
"id": "CVE-2024-7973",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2024-08-21T21:15:09.407",
|
||||
"lastModified": "2024-08-21T21:15:09.407",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Heap buffer overflow in PDFium in Google Chrome prior to 128.0.6613.84 allowed a remote attacker to perform an out of bounds memory read via a crafted PDF file. (Chromium security severity: Medium)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-122"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop_21.html",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://issues.chromium.org/issues/345518608",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-79xx/CVE-2024-7974.json
Normal file
25
CVE-2024/CVE-2024-79xx/CVE-2024-7974.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-7974",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2024-08-21T21:15:09.480",
|
||||
"lastModified": "2024-08-21T21:15:09.480",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Insufficient data validation in V8 API in Google Chrome prior to 128.0.6613.84 allowed a remote attacker to potentially exploit heap corruption via a crafted Chrome Extension. (Chromium security severity: Medium)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop_21.html",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://issues.chromium.org/issues/339141099",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-79xx/CVE-2024-7975.json
Normal file
25
CVE-2024/CVE-2024-79xx/CVE-2024-7975.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-7975",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2024-08-21T21:15:09.533",
|
||||
"lastModified": "2024-08-21T21:15:09.533",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Inappropriate implementation in Permissions in Google Chrome prior to 128.0.6613.84 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop_21.html",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://issues.chromium.org/issues/347588491",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-79xx/CVE-2024-7976.json
Normal file
25
CVE-2024/CVE-2024-79xx/CVE-2024-7976.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-7976",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2024-08-21T21:15:09.583",
|
||||
"lastModified": "2024-08-21T21:15:09.583",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Inappropriate implementation in FedCM in Google Chrome prior to 128.0.6613.84 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop_21.html",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://issues.chromium.org/issues/339654392",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-79xx/CVE-2024-7977.json
Normal file
25
CVE-2024/CVE-2024-79xx/CVE-2024-7977.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-7977",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2024-08-21T21:15:09.630",
|
||||
"lastModified": "2024-08-21T21:15:09.630",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Insufficient data validation in Installer in Google Chrome on Windows prior to 128.0.6613.84 allowed a local attacker to perform privilege escalation via a malicious file. (Chromium security severity: Medium)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop_21.html",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://issues.chromium.org/issues/324770940",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-79xx/CVE-2024-7978.json
Normal file
25
CVE-2024/CVE-2024-79xx/CVE-2024-7978.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-7978",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2024-08-21T21:15:09.697",
|
||||
"lastModified": "2024-08-21T21:15:09.697",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Insufficient policy enforcement in Data Transfer in Google Chrome prior to 128.0.6613.84 allowed a remote attacker who convinced a user to engage in specific UI gestures to leak cross-origin data via a crafted HTML page. (Chromium security severity: Medium)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop_21.html",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://issues.chromium.org/issues/40060358",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-79xx/CVE-2024-7979.json
Normal file
25
CVE-2024/CVE-2024-79xx/CVE-2024-7979.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-7979",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2024-08-21T21:15:09.747",
|
||||
"lastModified": "2024-08-21T21:15:09.747",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Insufficient data validation in Installer in Google Chrome on Windows prior to 128.0.6613.84 allowed a local attacker to perform privilege escalation via a crafted symbolic link. (Chromium security severity: Medium)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop_21.html",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://issues.chromium.org/issues/356064205",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-79xx/CVE-2024-7980.json
Normal file
25
CVE-2024/CVE-2024-79xx/CVE-2024-7980.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-7980",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2024-08-21T21:15:09.793",
|
||||
"lastModified": "2024-08-21T21:15:09.793",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Insufficient data validation in Installer in Google Chrome on Windows prior to 128.0.6613.84 allowed a local attacker to perform privilege escalation via a crafted symbolic link. (Chromium security severity: Medium)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop_21.html",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://issues.chromium.org/issues/356328460",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-79xx/CVE-2024-7981.json
Normal file
25
CVE-2024/CVE-2024-79xx/CVE-2024-7981.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-7981",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2024-08-21T21:15:09.843",
|
||||
"lastModified": "2024-08-21T21:15:09.843",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Inappropriate implementation in Views in Google Chrome prior to 128.0.6613.84 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop_21.html",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://issues.chromium.org/issues/40067456",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-80xx/CVE-2024-8033.json
Normal file
25
CVE-2024/CVE-2024-80xx/CVE-2024-8033.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-8033",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2024-08-21T21:15:09.897",
|
||||
"lastModified": "2024-08-21T21:15:09.897",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Inappropriate implementation in WebApp Installs in Google Chrome on Windows prior to 128.0.6613.84 allowed an attacker who convinced a user to install a malicious application to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop_21.html",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://issues.chromium.org/issues/350256139",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-80xx/CVE-2024-8034.json
Normal file
25
CVE-2024/CVE-2024-80xx/CVE-2024-8034.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-8034",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2024-08-21T21:15:09.957",
|
||||
"lastModified": "2024-08-21T21:15:09.957",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Inappropriate implementation in Custom Tabs in Google Chrome on Android prior to 128.0.6613.84 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop_21.html",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://issues.chromium.org/issues/353858776",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-80xx/CVE-2024-8035.json
Normal file
25
CVE-2024/CVE-2024-80xx/CVE-2024-8035.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-8035",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2024-08-21T21:15:10.010",
|
||||
"lastModified": "2024-08-21T21:15:10.010",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Inappropriate implementation in Extensions in Google Chrome on Windows prior to 128.0.6613.84 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop_21.html",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://issues.chromium.org/issues/40059470",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
}
|
||||
]
|
||||
}
|
94
README.md
94
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-08-21T20:00:17.982029+00:00
|
||||
2024-08-21T22:00:17.601688+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-08-21T19:35:22.120000+00:00
|
||||
2024-08-21T21:35:10.637000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,57 +33,65 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
260836
|
||||
260860
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `13`
|
||||
Recently added CVEs: `24`
|
||||
|
||||
- [CVE-2023-29929](CVE-2023/CVE-2023-299xx/CVE-2023-29929.json) (`2024-08-21T18:15:09.173`)
|
||||
- [CVE-2024-20488](CVE-2024/CVE-2024-204xx/CVE-2024-20488.json) (`2024-08-21T19:15:13.163`)
|
||||
- [CVE-2024-41572](CVE-2024/CVE-2024-415xx/CVE-2024-41572.json) (`2024-08-21T19:15:13.380`)
|
||||
- [CVE-2024-42777](CVE-2024/CVE-2024-427xx/CVE-2024-42777.json) (`2024-08-21T18:15:09.930`)
|
||||
- [CVE-2024-42778](CVE-2024/CVE-2024-427xx/CVE-2024-42778.json) (`2024-08-21T18:15:10.003`)
|
||||
- [CVE-2024-42779](CVE-2024/CVE-2024-427xx/CVE-2024-42779.json) (`2024-08-21T18:15:10.073`)
|
||||
- [CVE-2024-42780](CVE-2024/CVE-2024-427xx/CVE-2024-42780.json) (`2024-08-21T18:15:10.150`)
|
||||
- [CVE-2024-42781](CVE-2024/CVE-2024-427xx/CVE-2024-42781.json) (`2024-08-21T18:15:10.227`)
|
||||
- [CVE-2024-42782](CVE-2024/CVE-2024-427xx/CVE-2024-42782.json) (`2024-08-21T18:15:10.303`)
|
||||
- [CVE-2024-42783](CVE-2024/CVE-2024-427xx/CVE-2024-42783.json) (`2024-08-21T18:15:10.453`)
|
||||
- [CVE-2024-42784](CVE-2024/CVE-2024-427xx/CVE-2024-42784.json) (`2024-08-21T18:15:10.630`)
|
||||
- [CVE-2024-42785](CVE-2024/CVE-2024-427xx/CVE-2024-42785.json) (`2024-08-21T18:15:10.707`)
|
||||
- [CVE-2024-42786](CVE-2024/CVE-2024-427xx/CVE-2024-42786.json) (`2024-08-21T18:15:10.783`)
|
||||
- [CVE-2024-20417](CVE-2024/CVE-2024-204xx/CVE-2024-20417.json) (`2024-08-21T20:15:08.533`)
|
||||
- [CVE-2024-20466](CVE-2024/CVE-2024-204xx/CVE-2024-20466.json) (`2024-08-21T20:15:08.737`)
|
||||
- [CVE-2024-20486](CVE-2024/CVE-2024-204xx/CVE-2024-20486.json) (`2024-08-21T20:15:08.933`)
|
||||
- [CVE-2024-6386](CVE-2024/CVE-2024-63xx/CVE-2024-6386.json) (`2024-08-21T21:15:08.577`)
|
||||
- [CVE-2024-7964](CVE-2024/CVE-2024-79xx/CVE-2024-7964.json) (`2024-08-21T21:15:08.850`)
|
||||
- [CVE-2024-7965](CVE-2024/CVE-2024-79xx/CVE-2024-7965.json) (`2024-08-21T21:15:08.947`)
|
||||
- [CVE-2024-7966](CVE-2024/CVE-2024-79xx/CVE-2024-7966.json) (`2024-08-21T21:15:09.000`)
|
||||
- [CVE-2024-7967](CVE-2024/CVE-2024-79xx/CVE-2024-7967.json) (`2024-08-21T21:15:09.060`)
|
||||
- [CVE-2024-7968](CVE-2024/CVE-2024-79xx/CVE-2024-7968.json) (`2024-08-21T21:15:09.133`)
|
||||
- [CVE-2024-7969](CVE-2024/CVE-2024-79xx/CVE-2024-7969.json) (`2024-08-21T21:15:09.203`)
|
||||
- [CVE-2024-7971](CVE-2024/CVE-2024-79xx/CVE-2024-7971.json) (`2024-08-21T21:15:09.277`)
|
||||
- [CVE-2024-7972](CVE-2024/CVE-2024-79xx/CVE-2024-7972.json) (`2024-08-21T21:15:09.353`)
|
||||
- [CVE-2024-7973](CVE-2024/CVE-2024-79xx/CVE-2024-7973.json) (`2024-08-21T21:15:09.407`)
|
||||
- [CVE-2024-7974](CVE-2024/CVE-2024-79xx/CVE-2024-7974.json) (`2024-08-21T21:15:09.480`)
|
||||
- [CVE-2024-7975](CVE-2024/CVE-2024-79xx/CVE-2024-7975.json) (`2024-08-21T21:15:09.533`)
|
||||
- [CVE-2024-7976](CVE-2024/CVE-2024-79xx/CVE-2024-7976.json) (`2024-08-21T21:15:09.583`)
|
||||
- [CVE-2024-7977](CVE-2024/CVE-2024-79xx/CVE-2024-7977.json) (`2024-08-21T21:15:09.630`)
|
||||
- [CVE-2024-7978](CVE-2024/CVE-2024-79xx/CVE-2024-7978.json) (`2024-08-21T21:15:09.697`)
|
||||
- [CVE-2024-7979](CVE-2024/CVE-2024-79xx/CVE-2024-7979.json) (`2024-08-21T21:15:09.747`)
|
||||
- [CVE-2024-7980](CVE-2024/CVE-2024-79xx/CVE-2024-7980.json) (`2024-08-21T21:15:09.793`)
|
||||
- [CVE-2024-7981](CVE-2024/CVE-2024-79xx/CVE-2024-7981.json) (`2024-08-21T21:15:09.843`)
|
||||
- [CVE-2024-8033](CVE-2024/CVE-2024-80xx/CVE-2024-8033.json) (`2024-08-21T21:15:09.897`)
|
||||
- [CVE-2024-8034](CVE-2024/CVE-2024-80xx/CVE-2024-8034.json) (`2024-08-21T21:15:09.957`)
|
||||
- [CVE-2024-8035](CVE-2024/CVE-2024-80xx/CVE-2024-8035.json) (`2024-08-21T21:15:10.010`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `45`
|
||||
Recently modified CVEs: `22`
|
||||
|
||||
- [CVE-2024-40129](CVE-2024/CVE-2024-401xx/CVE-2024-40129.json) (`2024-08-21T18:59:09.703`)
|
||||
- [CVE-2024-40130](CVE-2024/CVE-2024-401xx/CVE-2024-40130.json) (`2024-08-21T19:00:56.183`)
|
||||
- [CVE-2024-40393](CVE-2024/CVE-2024-403xx/CVE-2024-40393.json) (`2024-08-21T18:13:42.670`)
|
||||
- [CVE-2024-40892](CVE-2024/CVE-2024-408xx/CVE-2024-40892.json) (`2024-08-21T18:15:09.710`)
|
||||
- [CVE-2024-40893](CVE-2024/CVE-2024-408xx/CVE-2024-40893.json) (`2024-08-21T18:15:09.803`)
|
||||
- [CVE-2024-41052](CVE-2024/CVE-2024-410xx/CVE-2024-41052.json) (`2024-08-21T19:27:26.227`)
|
||||
- [CVE-2024-41053](CVE-2024/CVE-2024-410xx/CVE-2024-41053.json) (`2024-08-21T19:21:41.530`)
|
||||
- [CVE-2024-41058](CVE-2024/CVE-2024-410xx/CVE-2024-41058.json) (`2024-08-21T19:35:22.120`)
|
||||
- [CVE-2024-41061](CVE-2024/CVE-2024-410xx/CVE-2024-41061.json) (`2024-08-21T19:34:12.550`)
|
||||
- [CVE-2024-41332](CVE-2024/CVE-2024-413xx/CVE-2024-41332.json) (`2024-08-21T18:53:15.927`)
|
||||
- [CVE-2024-42579](CVE-2024/CVE-2024-425xx/CVE-2024-42579.json) (`2024-08-21T18:35:08.200`)
|
||||
- [CVE-2024-42608](CVE-2024/CVE-2024-426xx/CVE-2024-42608.json) (`2024-08-21T18:35:08.967`)
|
||||
- [CVE-2024-43022](CVE-2024/CVE-2024-430xx/CVE-2024-43022.json) (`2024-08-21T18:35:09.733`)
|
||||
- [CVE-2024-6728](CVE-2024/CVE-2024-67xx/CVE-2024-6728.json) (`2024-08-21T18:08:50.630`)
|
||||
- [CVE-2024-6729](CVE-2024/CVE-2024-67xx/CVE-2024-6729.json) (`2024-08-21T18:07:04.263`)
|
||||
- [CVE-2024-6736](CVE-2024/CVE-2024-67xx/CVE-2024-6736.json) (`2024-08-21T18:14:15.270`)
|
||||
- [CVE-2024-7613](CVE-2024/CVE-2024-76xx/CVE-2024-7613.json) (`2024-08-21T18:47:11.523`)
|
||||
- [CVE-2024-7614](CVE-2024/CVE-2024-76xx/CVE-2024-7614.json) (`2024-08-21T18:48:47.273`)
|
||||
- [CVE-2024-7615](CVE-2024/CVE-2024-76xx/CVE-2024-7615.json) (`2024-08-21T18:48:19.590`)
|
||||
- [CVE-2024-7740](CVE-2024/CVE-2024-77xx/CVE-2024-7740.json) (`2024-08-21T19:06:30.707`)
|
||||
- [CVE-2024-7741](CVE-2024/CVE-2024-77xx/CVE-2024-7741.json) (`2024-08-21T19:07:40.757`)
|
||||
- [CVE-2024-7742](CVE-2024/CVE-2024-77xx/CVE-2024-7742.json) (`2024-08-21T19:08:47.707`)
|
||||
- [CVE-2024-7743](CVE-2024/CVE-2024-77xx/CVE-2024-7743.json) (`2024-08-21T19:15:54.553`)
|
||||
- [CVE-2024-7909](CVE-2024/CVE-2024-79xx/CVE-2024-7909.json) (`2024-08-21T19:15:13.487`)
|
||||
- [CVE-2024-7949](CVE-2024/CVE-2024-79xx/CVE-2024-7949.json) (`2024-08-21T19:15:13.600`)
|
||||
- [CVE-2023-29929](CVE-2023/CVE-2023-299xx/CVE-2023-29929.json) (`2024-08-21T21:35:00.720`)
|
||||
- [CVE-2023-40107](CVE-2023/CVE-2023-401xx/CVE-2023-40107.json) (`2024-08-21T21:35:01.720`)
|
||||
- [CVE-2023-44039](CVE-2023/CVE-2023-440xx/CVE-2023-44039.json) (`2024-08-21T21:35:02.723`)
|
||||
- [CVE-2023-52892](CVE-2023/CVE-2023-528xx/CVE-2023-52892.json) (`2024-08-21T20:35:00.760`)
|
||||
- [CVE-2024-0023](CVE-2024/CVE-2024-00xx/CVE-2024-0023.json) (`2024-08-21T20:35:01.700`)
|
||||
- [CVE-2024-0036](CVE-2024/CVE-2024-00xx/CVE-2024-0036.json) (`2024-08-21T21:35:03.820`)
|
||||
- [CVE-2024-27138](CVE-2024/CVE-2024-271xx/CVE-2024-27138.json) (`2024-08-21T21:35:04.820`)
|
||||
- [CVE-2024-27474](CVE-2024/CVE-2024-274xx/CVE-2024-27474.json) (`2024-08-21T21:35:05.010`)
|
||||
- [CVE-2024-28732](CVE-2024/CVE-2024-287xx/CVE-2024-28732.json) (`2024-08-21T21:35:05.793`)
|
||||
- [CVE-2024-30850](CVE-2024/CVE-2024-308xx/CVE-2024-30850.json) (`2024-08-21T20:35:03.010`)
|
||||
- [CVE-2024-32902](CVE-2024/CVE-2024-329xx/CVE-2024-32902.json) (`2024-08-21T21:35:06.743`)
|
||||
- [CVE-2024-33227](CVE-2024/CVE-2024-332xx/CVE-2024-33227.json) (`2024-08-21T21:35:06.933`)
|
||||
- [CVE-2024-33673](CVE-2024/CVE-2024-336xx/CVE-2024-33673.json) (`2024-08-21T21:35:07.123`)
|
||||
- [CVE-2024-34502](CVE-2024/CVE-2024-345xx/CVE-2024-34502.json) (`2024-08-21T20:35:03.920`)
|
||||
- [CVE-2024-3590](CVE-2024/CVE-2024-35xx/CVE-2024-3590.json) (`2024-08-21T21:35:07.913`)
|
||||
- [CVE-2024-40480](CVE-2024/CVE-2024-404xx/CVE-2024-40480.json) (`2024-08-21T21:35:08.270`)
|
||||
- [CVE-2024-41630](CVE-2024/CVE-2024-416xx/CVE-2024-41630.json) (`2024-08-21T21:35:09.060`)
|
||||
- [CVE-2024-42102](CVE-2024/CVE-2024-421xx/CVE-2024-42102.json) (`2024-08-21T20:48:01.940`)
|
||||
- [CVE-2024-42108](CVE-2024/CVE-2024-421xx/CVE-2024-42108.json) (`2024-08-21T20:52:35.470`)
|
||||
- [CVE-2024-42604](CVE-2024/CVE-2024-426xx/CVE-2024-42604.json) (`2024-08-21T20:35:05.780`)
|
||||
- [CVE-2024-42777](CVE-2024/CVE-2024-427xx/CVE-2024-42777.json) (`2024-08-21T21:35:09.833`)
|
||||
- [CVE-2024-42786](CVE-2024/CVE-2024-427xx/CVE-2024-42786.json) (`2024-08-21T21:35:10.637`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
178
_state.csv
178
_state.csv
@ -194326,7 +194326,7 @@ CVE-2022-25372,0,0,3afa1032089f61dab3ed154ec03c4c15430a85ef0fc2ac9ae598d4da295d4
|
||||
CVE-2022-25373,0,0,f3e06aa4cff9c34576c6046792debbf2f880be30c925fe1331c49304d5fd986a,2022-10-07T14:32:48.513000
|
||||
CVE-2022-25374,0,0,6361adb85d05647b7d10fddecc8e6abc57890f3c4e6fc867653c899551a3768c,2022-08-11T00:25:29.163000
|
||||
CVE-2022-25375,0,0,f752fdbcccd8ef08cc85b01b5b98d61bc041d81886db14771b5b5984b1a22193,2023-08-08T14:22:24.967000
|
||||
CVE-2022-25377,0,1,5a781ee5ee6569da0f6eb99b1ffe7b1c3b435e485786b08464508b20b3ae3679,2024-08-21T18:35:00.673000
|
||||
CVE-2022-25377,0,0,5a781ee5ee6569da0f6eb99b1ffe7b1c3b435e485786b08464508b20b3ae3679,2024-08-21T18:35:00.673000
|
||||
CVE-2022-2538,0,0,0c12e0f7f9e555340f2f1680d793cf15cc2ee18610a68b91e429f7afca6d5cc6,2022-09-01T06:46:34.243000
|
||||
CVE-2022-25389,0,0,d42a88a505fd5a7f62a0db54409eb4f5239b80d1324b54d52ca5d77173b51b75,2022-03-26T03:53:33.087000
|
||||
CVE-2022-2539,0,0,b629d5a5a8c182ad3c6108ecb09d08a47ec4b1ba159188994bd9b96ee182df9c,2023-08-08T14:22:24.967000
|
||||
@ -211638,7 +211638,7 @@ CVE-2022-47937,0,0,636176527665617f3facff8634e8954d2158730f82a85997de2b9511eefce
|
||||
CVE-2022-47938,0,0,442c25e602433938a9921e75f8e951b83ddd7027b36d46a901abb14bb5ea6d5b,2023-01-23T18:55:50.117000
|
||||
CVE-2022-47939,0,0,9ba60aa5756ff0c30fab8973f90a56883f8c984d8e5f8b0a23e7965824254a07,2023-05-16T11:03:04.080000
|
||||
CVE-2022-4794,0,0,a3ec06697be5e9ca32fca3c53d1678a7b25f03dbc9d92c6511a0fa363fa8a372,2023-11-07T03:58:57.833000
|
||||
CVE-2022-47940,0,1,229b78739a766eecb17608ddcb4dc360032312abbc5dc36114ca260a76aba0fd,2024-08-21T18:19:29.143000
|
||||
CVE-2022-47940,0,0,229b78739a766eecb17608ddcb4dc360032312abbc5dc36114ca260a76aba0fd,2024-08-21T18:19:29.143000
|
||||
CVE-2022-47941,0,0,a960c5c6b7478a38352797f8671155edce8fe893cef852bd8ab843d248171789,2023-05-16T11:03:07.537000
|
||||
CVE-2022-47942,0,0,29eecf09da3516358fd7280399596a1d1954d9a61b850522c2552abd8ebaaa2c,2023-05-16T11:03:10.667000
|
||||
CVE-2022-47943,0,0,4e1e7ead652d3a42100c80f087bde274ea4b62e5ad6d277d6672d96ed7d8563e,2023-05-16T11:03:14.360000
|
||||
@ -212275,12 +212275,12 @@ CVE-2022-48775,0,0,2acb46b961b5a6a98400ee899a0271b90d0006fde257656a51a219503be9e
|
||||
CVE-2022-48776,0,0,893198e6ce5b87d6fcbfe9bc4c8bb366e00f9c75f1eab9b7f2694e999d3ee514,2024-07-16T13:43:58.773000
|
||||
CVE-2022-48777,0,0,830cdb53c9b73e969d2dc50a8fae272c4cde81d156eacd00732a3b9bd6316f81,2024-08-21T17:52:44.367000
|
||||
CVE-2022-48778,0,0,cf80129bac53c697067af006cd31eeb61d796e99bba997a50ccafd500fb3fa60,2024-08-21T17:59:05.793000
|
||||
CVE-2022-48779,0,1,12c7c14756703808df47072b1211231bfd942ce7126ba4f8493f4852c1585db9,2024-08-21T18:00:53.417000
|
||||
CVE-2022-48779,0,0,12c7c14756703808df47072b1211231bfd942ce7126ba4f8493f4852c1585db9,2024-08-21T18:00:53.417000
|
||||
CVE-2022-4878,0,0,fb05127321f1dbc90cfbd12f64590320f5f815bf94532155a8a99445e7198622,2024-05-17T02:17:00.683000
|
||||
CVE-2022-48780,0,0,b117f40454daee066e1fc26a32af7cc957d4703e741175087709e91e884ce0cf,2024-07-16T13:43:58.773000
|
||||
CVE-2022-48781,0,1,73b1a0e4e12eaa999501e6fe9340fcf850bd0f95f1f33b67bb67fb3428e49c9b,2024-08-21T18:01:51.267000
|
||||
CVE-2022-48782,0,1,83e23cc6024fc3aa2a6c1e6bc030287e0e4a269359df30c12b90d0e0f29d0b01,2024-08-21T18:02:33.843000
|
||||
CVE-2022-48783,0,1,98b96c894064ae5b14616312ff7bad26f9c609e777ddd1d154850db58db33bbd,2024-08-21T18:03:24.540000
|
||||
CVE-2022-48781,0,0,73b1a0e4e12eaa999501e6fe9340fcf850bd0f95f1f33b67bb67fb3428e49c9b,2024-08-21T18:01:51.267000
|
||||
CVE-2022-48782,0,0,83e23cc6024fc3aa2a6c1e6bc030287e0e4a269359df30c12b90d0e0f29d0b01,2024-08-21T18:02:33.843000
|
||||
CVE-2022-48783,0,0,98b96c894064ae5b14616312ff7bad26f9c609e777ddd1d154850db58db33bbd,2024-08-21T18:03:24.540000
|
||||
CVE-2022-48784,0,0,5258aaafda307edeed3c9a3b307ec01e840379f7f29969631856afc65e4f5dbc,2024-07-16T13:43:58.773000
|
||||
CVE-2022-48785,0,0,0adcbd4fa3a41d134b7ab19221818594e5ed82b16ebc039c296bffa582d73508,2024-07-16T13:43:58.773000
|
||||
CVE-2022-48786,0,0,7d7c573b97f8855425dfbc3317804fd84cd7695d623ea48985f5896e1607970b,2024-07-16T13:43:58.773000
|
||||
@ -212299,7 +212299,7 @@ CVE-2022-48797,0,0,fcc023da4e4ebc8d61e2d441a12dbd9491041100b065e9fa0f2767a71d864
|
||||
CVE-2022-48798,0,0,d1152ada4c21c5b163c0d3e9731d5a9f61bf5130232a6f0fb85b6a8d67afc41b,2024-07-16T13:43:58.773000
|
||||
CVE-2022-48799,0,0,ca82b2a4ed9342b37b95b87fe963d9358abb6b9b25c6c909bb1a6783d9900299,2024-07-16T13:43:58.773000
|
||||
CVE-2022-4880,0,0,4ba00f45fa60e84e17646df0b31022c326d2de77554d7c7bed348aaf66eba2e8,2024-05-17T02:17:00.927000
|
||||
CVE-2022-48800,0,1,5bffec658ed745e51d5459e4aea9ac8807866d47f5990e78bf7633d4d1764443,2024-08-21T18:04:42.103000
|
||||
CVE-2022-48800,0,0,5bffec658ed745e51d5459e4aea9ac8807866d47f5990e78bf7633d4d1764443,2024-08-21T18:04:42.103000
|
||||
CVE-2022-48801,0,0,6653f1f5cf0e260b8c6a7c11277b02305adc16a1936040a89c4ab1b97527a852,2024-07-16T13:43:58.773000
|
||||
CVE-2022-48802,0,0,9a5cfaff9acf94bf883296dd5ba65bc3c4b5cb5bacd82a666569b25935f67533,2024-07-16T13:43:58.773000
|
||||
CVE-2022-48803,0,0,b4abff8be2e0f42801670ccff819cb36f420c74818031cf95a4f7137a7cf8225,2024-07-16T13:43:58.773000
|
||||
@ -213625,7 +213625,7 @@ CVE-2023-1190,0,0,e31de81f7acd3a9a3daf93bd4e7617fb352f13f737cbfe3f936e1529f250e8
|
||||
CVE-2023-1191,0,0,63ef8c869750311a99b3704a8c3cdcb68365330502998f1f566afcf1e31d7b4d,2024-05-17T02:17:53.347000
|
||||
CVE-2023-1192,0,0,dc0548ad6de408a7d5be2fffbdbcf4aebb63044fe81a7e86f3034a7170d73ac2,2024-03-07T17:15:09.620000
|
||||
CVE-2023-1193,0,0,7bd37bcdebf587c410b4cda3afd616c7e6d50171d9d012d1f3bffb9b8827db09,2023-11-09T15:13:51.737000
|
||||
CVE-2023-1194,0,1,0e0deb4c27aa6a24aa17cf117ca9e4e1f4848b1203b782ca35f1deb2e3ae9cb3,2024-08-21T18:20:30.137000
|
||||
CVE-2023-1194,0,0,0e0deb4c27aa6a24aa17cf117ca9e4e1f4848b1203b782ca35f1deb2e3ae9cb3,2024-08-21T18:20:30.137000
|
||||
CVE-2023-1195,0,0,a6e9afb70b2b4637ca87741d57b4478bb172b65a3d019182df690af84bac9529,2023-05-26T18:27:29.387000
|
||||
CVE-2023-1196,0,0,3b78ce5b21fe15fac3a0849f302e5d9d359e6cc2fff7986ef1f5d62bd790bd32,2023-11-07T04:02:50.747000
|
||||
CVE-2023-1197,0,0,95adf7f63914afb96db7936aec3afe63bb42aee3fe13d0ab63112aa1aad7da8b,2023-03-11T03:30:53.137000
|
||||
@ -222525,7 +222525,7 @@ CVE-2023-29923,0,0,b33b23e61e562dc83c6e5f1776c1773a4cd87c91904480151748ca1d7d3db
|
||||
CVE-2023-29924,0,0,2ccc0584144c29564d1fa45d30873eda11c23ddf1e798e28992e89d0b774a992,2023-04-28T03:47:31.073000
|
||||
CVE-2023-29926,0,0,9225094d01fee3ffa7bc831fb1f80da9744a24dd565cc13e21927794981302ba,2023-04-28T03:48:49.887000
|
||||
CVE-2023-29927,0,0,9e8a9e15293311c93fbe723ab56ed0471994959c871514d4222963584fadee8d,2023-05-25T16:05:07.423000
|
||||
CVE-2023-29929,1,1,ba752222632cdb8d13b351c9bce670a2fd57c75847ff6c6144d5c674fdf31bfb,2024-08-21T18:15:09.173000
|
||||
CVE-2023-29929,0,1,f70a215d27bea3d12f26bb11ed5a9d139a1bdaa94206399b5049f7eb74d20b38,2024-08-21T21:35:00.720000
|
||||
CVE-2023-2993,0,0,d44c9fbb84d48f2f2e04efcd22910452a7ca1db8b85f5163ca6dff6f458b6b41,2023-07-05T17:30:11.073000
|
||||
CVE-2023-29930,0,0,1d6d963e7d9226c0bd795ab7eb7ac30c93bd3ab4c90e9f87c9c6ddc10964c899,2023-05-24T13:50:58.667000
|
||||
CVE-2023-29931,0,0,4072247749c61f868b116869af506293a452ef82a75e1183fa4bb269840f61e7,2023-06-29T18:17:31.473000
|
||||
@ -224156,9 +224156,9 @@ CVE-2023-32245,0,0,b006dcad499643997f59b967ed8620eb8689245fc3a80c90f10d9e156aee4
|
||||
CVE-2023-32247,0,0,6ed61dedd90284bab675cfd007656c22e76a5281d18c8e0b6ae0d0c320230d6f,2023-12-04T14:55:19.007000
|
||||
CVE-2023-32248,0,0,a5d678c7b7103547aa2939c989f1036addae6cfeaed1fc01872c0756f6eccb2d,2023-12-04T14:54:50.907000
|
||||
CVE-2023-3225,0,0,900a6da755c932fc51f406ca2354a5ccef9c3b9baa8b65bd7ef2e31abe56ece2,2023-11-07T04:18:15.240000
|
||||
CVE-2023-32250,0,1,8cac480d2c6765e6b59bc48c89c5e9286782feca7d63265d3f86771c04c5f44b,2024-08-21T18:17:13.937000
|
||||
CVE-2023-32250,0,0,8cac480d2c6765e6b59bc48c89c5e9286782feca7d63265d3f86771c04c5f44b,2024-08-21T18:17:13.937000
|
||||
CVE-2023-32252,0,0,d58cdd6d41b61e01636cbce96c5c95617a1fb413e4534a05ad59e2763a4df396,2023-12-04T14:53:38.480000
|
||||
CVE-2023-32254,0,1,04d969b843b2483c3edef280dd23a4ff386936a5d850268b83a2e741584aa99a,2024-08-21T18:21:55.587000
|
||||
CVE-2023-32254,0,0,04d969b843b2483c3edef280dd23a4ff386936a5d850268b83a2e741584aa99a,2024-08-21T18:21:55.587000
|
||||
CVE-2023-32257,0,0,e863f95271bbd102a1dbc5990b29c3c9bedfb59faca99d10f3fe80d80959dfb3,2023-12-22T17:06:02.047000
|
||||
CVE-2023-32258,0,0,1b7d9e9ed9a24d4763f3dd34c86ff525f58eabf344847aa293dd4e794e241b4a,2023-11-17T18:29:58.827000
|
||||
CVE-2023-32259,0,0,63d94242b8b0d4e358593674a90324955b50adf4e3d50cf943b4320e76d2c808,2024-03-19T16:33:58.680000
|
||||
@ -229444,7 +229444,7 @@ CVE-2023-39187,0,0,1e2f733c364a0a935eea976f809c932a5620ee577865f260905a21785deeb
|
||||
CVE-2023-39188,0,0,1dbe43eb2ae9b7e031bfedfe5eabb7f022b67670006ce52b6150a1df4bea9a6e,2023-08-10T15:29:47.423000
|
||||
CVE-2023-39189,0,0,49d56177e5708f7f33ecf8ec1adabceb1b19cbdf48fe7ad376718f05cd14641a,2024-05-22T17:16:03.030000
|
||||
CVE-2023-39190,0,0,873a8a713e33526ba780ab65f9b512961ce53d2b57a22906d0fe6e897429416f,2023-11-07T04:17:27.090000
|
||||
CVE-2023-39191,0,1,6a4baa34024e89c4461316ec374ac75a258ce9aa13502df00389ca7d217f014e,2024-08-21T18:16:34.433000
|
||||
CVE-2023-39191,0,0,6a4baa34024e89c4461316ec374ac75a258ce9aa13502df00389ca7d217f014e,2024-08-21T18:16:34.433000
|
||||
CVE-2023-39192,0,0,a6fe9cdcd9d48f80b49bf3c89938353607cdae62056604114c8179f6c266befe,2024-05-22T17:16:03.250000
|
||||
CVE-2023-39193,0,0,3ad8b95389e83b92a344cb4402538f60b8731f4ce39ac2e8734cb37a8afd18cb,2024-05-22T17:16:03.400000
|
||||
CVE-2023-39194,0,0,2030f9410aac6066f150fa3941eec569327600cbe4908600bc63b6e2de0988f7,2024-05-22T17:16:03.547000
|
||||
@ -230149,7 +230149,7 @@ CVE-2023-40103,0,0,450c3a391def7a8afcbefb17dfde1c695cebaffcfd18ba45db0f0094ffb67
|
||||
CVE-2023-40104,0,0,0cf270b8607bfa9d4e1d8714c505120c5fc75b5ddb276c75d9c23f91e95a9b08,2024-08-01T13:44:27.157000
|
||||
CVE-2023-40105,0,0,aad385399771bf8ef1682cd01ea151bd6776f60f896cc985fd26fd6d806bf2b4,2024-02-16T13:37:55.033000
|
||||
CVE-2023-40106,0,0,6d9f8c84c211a0ff1a7429561ccdcbd5b138bf68f865cdf0fd7423613ec0599e,2024-02-16T13:37:55.033000
|
||||
CVE-2023-40107,0,0,66f62207d9e25b242ec6da7f35b2ef9ecf0f1e96681d1510eaef351f3c32142f,2024-02-16T13:37:55.033000
|
||||
CVE-2023-40107,0,1,9b5d8c411184c5b318513e2f9308b05cbf529a3dea80774c590446ec7489cece,2024-08-21T21:35:01.720000
|
||||
CVE-2023-40109,0,0,418785915c5c782eaecea452fe3e0bcad27a28cd6d2cb7fa6c5725ebb93ef7e2,2024-08-16T16:35:00.740000
|
||||
CVE-2023-4011,0,0,f4c9a2bb464c5a1de2dfebfd2730b2028967d3b4a059651b6b18a027ee3ccdd5,2023-08-04T19:45:30.020000
|
||||
CVE-2023-40110,0,0,0da8aae64ff0eaf8c18d1725956d88dfae89050f4e3cb7fa2c7e3b0656903e32,2024-02-16T13:37:55.033000
|
||||
@ -233023,7 +233023,7 @@ CVE-2023-44025,0,0,3828a36a55dc18732bf3aa8fafcd2642ac7e9e5d7d7309e7e47431663f218
|
||||
CVE-2023-44031,0,0,bbca3cb963fcc5a93d66669e3242ef0586a8aa94486fc6b302474de164e4c665,2024-02-13T00:57:11.897000
|
||||
CVE-2023-44037,0,0,bb097c15786910ef054939c26d8760affedd479bc34d93408cef6bf30ca0e248,2023-10-19T17:41:28.530000
|
||||
CVE-2023-44038,0,0,0d2a697aa6bc99f909dfbf81fa90d2283e93bbc1d49c1a74925567d1b1527ce6,2024-04-03T17:24:18.150000
|
||||
CVE-2023-44039,0,0,f1a449f6e0a516168f601cdef321ba87aa0a7bfc0d9f1434c032e838ae343c8c,2024-04-03T17:24:18.150000
|
||||
CVE-2023-44039,0,1,590991cce8499111971bee245da4448afb145205c08f7a5aabba8a3a351fa0da,2024-08-21T21:35:02.723000
|
||||
CVE-2023-4404,0,0,9c13e997f8a0e200af0b7a4b5f083873718159a7818d27bb1b8c22e6294445f8,2023-11-07T04:22:31.870000
|
||||
CVE-2023-44040,0,0,d8d6d700e1c01853dafe1c8d53a5c4388e0d545913e2bedde199d66a7d141cba,2024-04-03T17:24:18.150000
|
||||
CVE-2023-44042,0,0,1dbfafd11cb24b979a12e87249829a85f1f497a13885e6ef23047c64ad0a4240,2023-09-28T15:48:44.617000
|
||||
@ -239244,7 +239244,7 @@ CVE-2023-52889,0,0,ad1cde02a64052b28564d8e8a7e2af925007327c5229809929326bf9b8081
|
||||
CVE-2023-5289,0,0,85a0656428a156af531ef9ce48391ff960ba4c2a8af32298a7386854e98b6d86,2023-10-02T18:13:04.227000
|
||||
CVE-2023-52890,0,0,98d004bfa32a49234fd94c1d29c092368def9b12c09abef3185e148025b433c1,2024-06-13T18:36:09.010000
|
||||
CVE-2023-52891,0,0,5e151a4d8c6f84e3d9dd04a36315448ea54aacacf0306d24e88a33c5bc6a9764,2024-07-09T18:19:14.047000
|
||||
CVE-2023-52892,0,0,32d862a219e297bef87d6af26c1c79f877a4570bd3376c8ef713855d979da993,2024-06-28T10:27:00.920000
|
||||
CVE-2023-52892,0,1,e76a088ce4e19742d870b8476c614d46bee6f2abd88542d335617b1f2fbef53f,2024-08-21T20:35:00.760000
|
||||
CVE-2023-52893,0,0,f90ef0c635dc5e96ae72022334213ea95dcab5dbd307cb21411266f0404ac61c,2024-08-21T12:30:33.697000
|
||||
CVE-2023-52894,0,0,2e1a1b33551b46a32f161e1e0895eb9b4109ca7bc25f7f829bb0be0a183d33af,2024-08-21T12:30:33.697000
|
||||
CVE-2023-52895,0,0,cdfca4de01d01d96f66c1e396dc4f20d4c8ed5ab2a7bd7e0c026a8f8a9b624e7,2024-08-21T12:30:33.697000
|
||||
@ -241048,7 +241048,7 @@ CVE-2024-0019,0,0,99addb01bdd59dfa56c3bb78510b54e791e3b9af747d8108035ab5d4ed5b10
|
||||
CVE-2024-0020,0,0,e73ca517c90039568523c56c44f0cf8b451388b3358b22e01f666a71e39cd157,2024-08-01T13:45:54.660000
|
||||
CVE-2024-0021,0,0,48878e30e65ca9b7752f91ec634b409988ea482f472219ebf9713d370864d726,2024-02-16T21:39:50.223000
|
||||
CVE-2024-0022,0,0,3cd621aee24b508cab60e42df908bea04c2b9934f8ccf5b596c88265f9b01d22,2024-05-08T13:15:00.690000
|
||||
CVE-2024-0023,0,0,91670c2de393b4df4a82610047e68fa9b86a2aa6f6cccd122d84d8ca2ad9f4e0,2024-02-16T21:39:50.223000
|
||||
CVE-2024-0023,0,1,0ae19107c0f009088c14cc9607c2fcb734bab1e5ea02d37a78e27ee1213b97f1,2024-08-21T20:35:01.700000
|
||||
CVE-2024-0024,0,0,5fb9489ab6bda1953438739836edf4a6b94bd74733037853a8a3c897eda90f7b,2024-07-03T01:44:32.010000
|
||||
CVE-2024-0025,0,0,d28de8c9f19ab5ba79d0474f043c936cf414f4247e50396a672a60bd3b9be766,2024-08-01T20:35:09.143000
|
||||
CVE-2024-0026,0,0,774ed6ba82d0d9c7a541b3db4a5a359cf56663a0f101d669bdf9d716d0a13278,2024-07-03T01:44:32.803000
|
||||
@ -241060,7 +241060,7 @@ CVE-2024-0032,0,0,fc22f68933af2c7d437ee6e4910dddc9fa796af5b59e8f4b2de22081edbdf8
|
||||
CVE-2024-0033,0,0,27344b7715a75d0aa82a7b18cd174c27fc55902f246df424d23b6d9f7df6dd01,2024-08-16T18:35:03.300000
|
||||
CVE-2024-0034,0,0,cf6982fa2541b8054d4b654ea4c176621af3fadbf8e13dda28278df5290d9039,2024-08-01T13:45:55.720000
|
||||
CVE-2024-0035,0,0,9eaae678f1f9bc39ffb7f55e9bf0592ae82d1ab0298cf35f56b4c4901d254625,2024-02-16T13:37:51.433000
|
||||
CVE-2024-0036,0,0,d9c0b6734c282a6d9728365410b8e629548c8409828f413d80063f93ca75f370,2024-02-16T13:37:51.433000
|
||||
CVE-2024-0036,0,1,fff8c3e6a7e572a710532aa58189e21f41ee35c59b75c244857e50ee7d7b8970,2024-08-21T21:35:03.820000
|
||||
CVE-2024-0037,0,0,afae0135406bbad6488057d26d0f96084f22f97b3b4cd7fc16729b7c9f861063,2024-02-16T13:37:51.433000
|
||||
CVE-2024-0038,0,0,ea347078d5115696feec8ec271b749eacff96a2d3bca9777e248043aee98fcbc,2024-02-16T13:37:51.433000
|
||||
CVE-2024-0039,0,0,68d4a281bb1d84f85cd5be142d8735596562f1396cf3f56249110327634e46fe,2024-03-12T12:40:13.500000
|
||||
@ -242923,7 +242923,7 @@ CVE-2024-2008,0,0,9a3dfffdf84cbaecec5e4ac83fc5a2438eae99d0d114b1045bad131ec57012
|
||||
CVE-2024-20080,0,0,90f248eed6a75fce7971996f28983ff9968e454d013e84d03f8b65c25bdd5601,2024-08-01T13:46:18.790000
|
||||
CVE-2024-20081,0,0,c71489cf0f2bedca59bdc5569ddfc23bc345fff8731fd4100ad31f358075b686,2024-07-01T12:37:24.220000
|
||||
CVE-2024-20082,0,0,56503a8297b29c06a4779b6ce0cb09b68c0c4128ced5292c021ec15204e93c22,2024-08-14T15:35:04.003000
|
||||
CVE-2024-20083,0,1,d9b832ff5357fbfb0bb330afe0c52fd472ba2f26e66518e0a2caf3dcf4f28daf,2024-08-21T18:35:02.057000
|
||||
CVE-2024-20083,0,0,d9b832ff5357fbfb0bb330afe0c52fd472ba2f26e66518e0a2caf3dcf4f28daf,2024-08-21T18:35:02.057000
|
||||
CVE-2024-2009,0,0,e315bb187496fdfbd237809339603453c22bbf947712d2f37b8c2f26c500e401,2024-05-17T02:37:59.337000
|
||||
CVE-2024-2011,0,0,4150023a6f5b05ff7bb1f10e004dac522c292e22a6fa4bc68fed9003ca68fddf,2024-08-15T21:25:45.037000
|
||||
CVE-2024-2012,0,0,02707995e28bba3e21e37a0cc9698bd91832709b25d71785b53bd5ea8c9a7518,2024-08-15T21:19:03.770000
|
||||
@ -243057,6 +243057,7 @@ CVE-2024-20404,0,0,9ff8f593f71d4a0ff7aecb6b668971610942799ed16450e68ad59cf7f0b9f
|
||||
CVE-2024-20405,0,0,2fa5b4e65c2f399507a2e57227d51876c94b3517d024d761ea8ec8bc4f4a8a91,2024-06-18T18:04:04.497000
|
||||
CVE-2024-2041,0,0,7b4fc911113d944c485bed2a7f958b069e0536bf197811dc0e3dcb8018df3bd7,2024-05-06T14:15:07.747000
|
||||
CVE-2024-20416,0,0,36fba5d0b9a663051d43c2072f34c721bf06b423d2ffa103fc7cf93ef9750d67,2024-07-18T12:28:43.707000
|
||||
CVE-2024-20417,1,1,ba169affbe1bdc00af793894dff8ba9b795f436c902800d99a04a917c6c411f0,2024-08-21T20:15:08.533000
|
||||
CVE-2024-20419,0,0,0795f6e87845f9b46dc3400495c49fb48a047d8ed4e9d1842a04ff7724f0ad68,2024-08-13T17:15:22.787000
|
||||
CVE-2024-2042,0,0,148bfce3b5f48e2144e9167826ed5f6f120e539bf15296a435b2ce580e8b1f74,2024-03-17T22:38:29.433000
|
||||
CVE-2024-20429,0,0,f467ae3dedce5a1f38518317999bbc8fc79bc2960eb95679505ee1fcb992ae20,2024-07-18T12:28:43.707000
|
||||
@ -243069,10 +243070,12 @@ CVE-2024-20450,0,0,cfe46dc7826c305ab98574cf72ddea7d365b2634d22c5b3d211ce8df40e35
|
||||
CVE-2024-20451,0,0,5716a06bbe518ce49d6f96da365d23009de45980184470eb3ddec420dfc210c3,2024-08-07T19:09:46.290000
|
||||
CVE-2024-20454,0,0,82704fb503b7059454a85ef30e98f2c90abd21a5c3b3087fb54fa9f88dce6ed1,2024-08-07T19:09:46.290000
|
||||
CVE-2024-20456,0,0,bf56f0f0f8d3ed0f6616c43fc8ca6a47b6257ec17aaac25185ba7a05790b5cc9,2024-07-11T13:05:54.930000
|
||||
CVE-2024-20466,1,1,d3065529fa1e4984466291d549a3655bef083d9f50fb7a2f9dae3b83194028a0,2024-08-21T20:15:08.737000
|
||||
CVE-2024-2047,0,0,65f16d2420b90c918e9e57877aac5f0440eb772d779ccbd58288e6312f3c8025,2024-04-01T01:12:59.077000
|
||||
CVE-2024-20479,0,0,e43b191fa2d4610d4436c6122b2a02d0645e504181a7e15baaa05c8cae8fe0da,2024-08-07T19:09:46.290000
|
||||
CVE-2024-2048,0,0,3fe9d949673d5eedf190595df45c4c7d30c6a66a4722ea0631f740f815dd3cc0,2024-06-10T17:16:25.067000
|
||||
CVE-2024-20488,1,1,191a528b2731fcf6221ed8ee98d54e34833f14ec3a1b6a134d9d25daacb35ac0,2024-08-21T19:15:13.163000
|
||||
CVE-2024-20486,1,1,20653804a6b54c970eb135ea2d1dc617dfa52ca1163291c5a6fc4b0a09ac00ca,2024-08-21T20:15:08.933000
|
||||
CVE-2024-20488,0,0,191a528b2731fcf6221ed8ee98d54e34833f14ec3a1b6a134d9d25daacb35ac0,2024-08-21T19:15:13.163000
|
||||
CVE-2024-2049,0,0,398a9eaf0287296877598afba029844504bbde28a3270479d8cbbb594cc11b40,2024-03-12T16:02:33.900000
|
||||
CVE-2024-2050,0,0,309a92deb7dc6d1c9b389273f8521ce493fa3e8c536f740883081c4cdf858e77,2024-03-18T19:40:00.173000
|
||||
CVE-2024-2051,0,0,7b283f8057b783b668166a17f1e1ff3c63b74d0e0fa3f6b8acdcd7e3ce5a09c9,2024-03-18T19:40:00.173000
|
||||
@ -245678,7 +245681,7 @@ CVE-2024-24199,0,0,7ba43404c5022da254878ea129b205d46b0f249a8f3526c8415be3cc2a20e
|
||||
CVE-2024-2420,0,0,13b83832dbf3c227f1bb0a786d7224f8bb2d919ddb4e3730a2d048cbbb3f3674,2024-05-30T18:18:58.870000
|
||||
CVE-2024-24202,0,0,668325610a66240d6d1186abf034222333d655c33a74fab67ccef821464427c8,2024-08-19T20:35:04.473000
|
||||
CVE-2024-2421,0,0,d6a9f4a7ca738e43373fd351f7d51d46e3ad2798d84cdbebb07a7724c675a343,2024-05-30T18:18:58.870000
|
||||
CVE-2024-24213,0,1,287278b021309aa035f3a4bd904869bf5f79125ed1840b3f7786eee9a7e710d4,2024-08-21T18:06:24.633000
|
||||
CVE-2024-24213,0,0,287278b021309aa035f3a4bd904869bf5f79125ed1840b3f7786eee9a7e710d4,2024-08-21T18:06:24.633000
|
||||
CVE-2024-24215,0,0,85b457ffd0214deceb92715f93f3b98e9ac0926a8e517f205498cdcd7f026571,2024-02-15T18:08:47.813000
|
||||
CVE-2024-24216,0,0,cc96bdba0be53e21ec4f72b549cd1780854565b7b4a6c5081be7a211ccd03725,2024-02-08T13:44:21.670000
|
||||
CVE-2024-2422,0,0,3cd5f28c31482f281d8aa1c4c5b76e9420ca9d6bd73cdb7ceb049f2a4aab7203,2024-05-30T18:18:58.870000
|
||||
@ -247792,7 +247795,7 @@ CVE-2024-27132,0,0,c5cfdc93a4a30eb4ada1b68dc89dd72224529d7dc99c692ce9a1a016e1ab5
|
||||
CVE-2024-27133,0,0,6574fdde089b4683da8bd06069d4a01e27d182b9361898f9a2a8686337a251e3,2024-02-26T13:42:22.567000
|
||||
CVE-2024-27135,0,0,8f681cbd0423d5edcf1af419653a19c055e013668588c5e21fc1acd9f7af97d0,2024-05-01T17:15:30.087000
|
||||
CVE-2024-27136,0,0,95371c097b782a9c3eb2e668bc7e52a3add3a0ca964de3d4fb22468a7d6fe516,2024-06-24T12:57:36.513000
|
||||
CVE-2024-27138,0,0,e480229f5f3f97ad39b85546ab08384a6eb2e8b6119adfe2872a8053ae1f5d28,2024-08-02T01:15:30.263000
|
||||
CVE-2024-27138,0,1,1f057fc4a86e32fdd3cbe80da63722cbc73089ddadbb43b1562d5d847b0f5599,2024-08-21T21:35:04.820000
|
||||
CVE-2024-27139,0,0,5ffd1b44abbd3dc84ccc8dc40302ee472c30e7eda7536bd71d562f3fb40cf709,2024-08-02T01:15:30.347000
|
||||
CVE-2024-2714,0,0,fd707009e35b2adf97d47fd45e1287d327a5720e922cfb5f98c6896a9e8b6097,2024-05-17T02:38:26.850000
|
||||
CVE-2024-27140,0,0,792f5350d961d2c57a4d83059389a2799aafa0cb7b0a5d870e522f2e29bff45e,2024-08-05T21:15:38.120000
|
||||
@ -248105,7 +248108,7 @@ CVE-2024-27460,0,0,8683af8a542feb170a538bcba55c469e083f9924ef0c1691a92718c202474
|
||||
CVE-2024-27461,0,0,aa8cd584bdc5b8b3d078d3166544e96e10118040c10a5b885de911ca69058c38,2024-08-14T17:49:14.177000
|
||||
CVE-2024-27462,0,0,2177b080bf16597b1d3af90d404590cae7bb441b9367c276a25f840d3e6c7f9f,2024-04-14T23:15:45.830000
|
||||
CVE-2024-2747,0,0,5387110be360e1fd36f0342bcd8dd7e83bfa4eabd929725feec9963b35cc169c,2024-06-13T18:36:09.010000
|
||||
CVE-2024-27474,0,0,3f0932161a77385f85ec7fc0004a8008398981e7f75c919376f930b5622a4131,2024-04-10T19:49:51.183000
|
||||
CVE-2024-27474,0,1,4a390a0a495b528719cdfad3c5cdbeeb4b25b7052e56b9b2bf54d8bb9762dcc1,2024-08-21T21:35:05.010000
|
||||
CVE-2024-27476,0,0,7a4663f499ee23e08c2a048515f5b6745ec9423d99e38efec54dd0ceaf59a3fa,2024-08-01T13:48:28.390000
|
||||
CVE-2024-27477,0,0,e0cd02f233cdafbc91249b5781d33c91da5035c970dc05ec11d6a3134871bf1b,2024-04-10T19:49:51.183000
|
||||
CVE-2024-2748,0,0,a5981f926316e727f1bb9455ec311db801fabdd6fc8350d94a1fb8a2edb4a89a,2024-03-21T12:58:51.093000
|
||||
@ -248854,13 +248857,13 @@ CVE-2024-2872,0,0,e60d6692ffdbbc7dca47dd221e29fe124966b59c3165de45eca31ca595a9df
|
||||
CVE-2024-28722,0,0,4d114a5bb3de475df05c084fbb00bf1fb6503998847c685d4d1672b2617054ce,2024-07-03T01:51:47.757000
|
||||
CVE-2024-28725,0,0,76f38f123d93dc5a87b1081a9a46cc5a546425e009751f0bb38d077b83255a95,2024-08-01T13:49:14.173000
|
||||
CVE-2024-2873,0,0,ed9040959ed5f40d916defffcff03f64da72505082c3b91fe33a6506c19636e1,2024-03-26T12:55:05.010000
|
||||
CVE-2024-28732,0,0,9851816f66d45de8afdad8c9816c7a6b7919c6a4b7292add9b2b3b84fff0f7f0,2024-04-08T18:48:40.217000
|
||||
CVE-2024-28732,0,1,4d9b8e2fd2ba72cc6df49c8f091f8b99ef2fc40022314c635b2f93676e7b2d75,2024-08-21T21:35:05.793000
|
||||
CVE-2024-28734,0,0,1c14934084e1e00ba63d896d0125baa20ca223930e97186ab2fc273c15799ec8,2024-07-03T01:51:48.533000
|
||||
CVE-2024-28735,0,0,004afab27d51efc6ac1b999df3e4f3751a9bc81de88a92938e218f69e07ed59d,2024-08-01T13:49:15.007000
|
||||
CVE-2024-28736,0,0,b18e265ab9079a090b10f2fe5a13acf391230f937283b97c645741a4ee888897,2024-07-03T01:51:49.307000
|
||||
CVE-2024-28739,0,0,36caa1134a8a7b2783edbb7df33b4da4cf1e215d5eea570ae15bc02fd363246e,2024-08-12T18:18:17.717000
|
||||
CVE-2024-2874,0,0,80b110f5e4061aa4b7108ad521bebbe850331343538d6ef70c9be87fbdfcd4cf,2024-05-24T01:15:30.977000
|
||||
CVE-2024-28740,0,1,5f70f267e5a95ad5a027628a10c98f8169f84e918b27fa20ab04ed5ecaa1e182,2024-08-21T18:35:02.877000
|
||||
CVE-2024-28740,0,0,5f70f267e5a95ad5a027628a10c98f8169f84e918b27fa20ab04ed5ecaa1e182,2024-08-21T18:35:02.877000
|
||||
CVE-2024-28741,0,0,795f862a6d9ed04b0207def6b2b416a0cc650c64f2309e9860cb5b0d520d30f6,2024-08-15T15:35:08.427000
|
||||
CVE-2024-28744,0,0,6de1af81e457c114bae7b1738d6658348e92bf9c2953cae361b0b30d06e054f6,2024-08-01T13:49:15.900000
|
||||
CVE-2024-28745,0,0,da878c5f5cc0e7f2e4abb5594a05991a98129a08d42ab910eae7e36c68d7e661,2024-03-18T12:38:25.490000
|
||||
@ -250391,7 +250394,7 @@ CVE-2024-30845,0,0,bd254f7d322b717fb5f477bd2a6072b935bc9b8c30db157f273a719062c17
|
||||
CVE-2024-30848,0,0,e520fc03d7d120883158934b80667a2b4d6398e475b39bea0f39a4affc9e9f6e,2024-08-01T13:50:28.210000
|
||||
CVE-2024-30849,0,0,4b2a4ccd593d26ef45288147032dbc711b9bbef7de8ea7827855efca75655daa,2024-08-01T13:50:28.983000
|
||||
CVE-2024-3085,0,0,509209dfddf53f9b46075ed419de44cbb1f67edbb1a1b964fb67c8391adf6753,2024-05-17T02:39:42.607000
|
||||
CVE-2024-30850,0,0,38a1756acc49f668f5841f513a1e63d34dbb4cec7b0eff4d2738aec5335923b1,2024-04-12T12:43:46.210000
|
||||
CVE-2024-30850,0,1,c1ef257dd5e33e880b36cd35ccee098b89832c161bbe3dd2489cb767eeacade1,2024-08-21T20:35:03.010000
|
||||
CVE-2024-30851,0,0,50f4be60cfd340e55ad1701da02739f1151719e7af37a9957f274744dd91c34b,2024-05-06T12:44:56.377000
|
||||
CVE-2024-30858,0,0,93e0a53927efd0637571ec0f8079f664a09ad42dbc1f395dcf941f97a4b21575,2024-08-01T13:50:29.850000
|
||||
CVE-2024-30859,0,0,cb3a05b13bb3d557f99196539489ef40266ca1d1884c327caec647dd84413ea6,2024-08-16T19:35:10.010000
|
||||
@ -251835,7 +251838,7 @@ CVE-2024-32899,0,0,74d49a0c054c70b6782d3d17817d354b539c7fc1885677c696b3943279ac6
|
||||
CVE-2024-3290,0,0,e37941463fbcfeca19f06c6ff95de33721080f43186b5a4e3649d38706662f8a,2024-05-17T18:35:35.070000
|
||||
CVE-2024-32900,0,0,f4a32c220f617bf5506c14a7483b88c719a703371f248ae870ea7d83b0dd7ef8,2024-08-19T14:35:07.680000
|
||||
CVE-2024-32901,0,0,0396668e4055b6cf30063754945d8be1d532a6ec0e47e38129ed67921f73e173,2024-08-15T15:35:09.947000
|
||||
CVE-2024-32902,0,0,1fbd0dd08d9bd5e977338d384aea2714e29c13de9c12a031106e742a6a47a2bf,2024-07-16T14:57:42.527000
|
||||
CVE-2024-32902,0,1,1db1dac10406af96e5c81e43197c12ae1faf99567fcddfd4acdc8793b6ac4309,2024-08-21T21:35:06.743000
|
||||
CVE-2024-32903,0,0,3ad2528ab2612529b9c0754d4af9e267ab72c067c205eb196588acd915ae500e,2024-08-20T18:35:03.550000
|
||||
CVE-2024-32904,0,0,3961c2a580b4e2b2979bdb22f632f77b910e660ceef5325c42d6a6fa26d552d7,2024-07-11T15:14:41.203000
|
||||
CVE-2024-32905,0,0,4460b80af340c6f668b7232b3aebc59e6f35de40c0e49ba7c976380d5f0f46f5,2024-08-01T13:51:38.530000
|
||||
@ -252016,7 +252019,7 @@ CVE-2024-33223,0,0,bd16de328c282f1aa1b7015361c590473a5b6bf3caa6b0c34867ec1e542d4
|
||||
CVE-2024-33224,0,0,ea562c47166b9ccee59aa37caec5e01025be0e30460cf86b89874eb41ddf1200,2024-05-22T18:59:20.240000
|
||||
CVE-2024-33225,0,0,20ea8cc6ddfb6cfd8258351119e0796feeaade6c50f1b0404fcf51caf0bfa6d3,2024-05-22T18:59:20.240000
|
||||
CVE-2024-33226,0,0,f3fb4ee69f05f27f81b817914fa93a341a77a038a9407ec5a7a16217f3ea6498,2024-05-22T18:59:20.240000
|
||||
CVE-2024-33227,0,0,28dd1771db477989c0572e57f26fd3346bd032b5331c9baa2149840f310b32df,2024-05-22T18:59:20.240000
|
||||
CVE-2024-33227,0,1,7642d7b0dea4438aa6cf20447aa6ccfb5a37e8289abc2e50d39a48026159e609,2024-08-21T21:35:06.933000
|
||||
CVE-2024-33228,0,0,85cdbd71550aee88b5f9d8549e2c2f09f274676ddc09487eba7cc0a4fad357e8,2024-08-15T15:35:10.277000
|
||||
CVE-2024-3323,0,0,35a6027c28bfec2d03f21e8dc2fb44053ba20d6734735309aeaba44e533a0061,2024-07-03T02:06:09.693000
|
||||
CVE-2024-33247,0,0,40a5fef5b7dc3488c3170d87b3d0b3fdeccf50a4efd249dd8f1c8814c02594a3,2024-04-25T13:18:02.660000
|
||||
@ -252293,7 +252296,7 @@ CVE-2024-3367,0,0,31f1b96caacdf32cb07b44d556d68ab31ddfc6550ca25d8ad2ff89de82dc4e
|
||||
CVE-2024-33670,0,0,3abc3d385958341e24c9eda52dec235106719c4d891dda10a7a17ff0ec58be16,2024-07-03T01:58:36.127000
|
||||
CVE-2024-33671,0,0,5feca8f352d561cdd0e0c6bac5759d95e299a4747d95bc22a8db29940e7c5bd1,2024-04-26T12:58:17.720000
|
||||
CVE-2024-33672,0,0,4f42606374298c39a17dbd38700642945b2e9bef08fd2b3fd4fad590404e973d,2024-07-03T01:58:36.807000
|
||||
CVE-2024-33673,0,0,c202ae3644283126f759ef95c90b7314f4bf4bd803caec90e15330e8a963b545,2024-04-26T12:58:17.720000
|
||||
CVE-2024-33673,0,1,2e121fa93cd95e243645b6330a6810a785d78928d9f086479dd41d632f236bd8,2024-08-21T21:35:07.123000
|
||||
CVE-2024-33677,0,0,c3a699c048bec4cee3b4b765cde86a17d71ee190ed8c41ad782a7d14e4a12a52,2024-04-26T12:58:17.720000
|
||||
CVE-2024-33678,0,0,b380961e2903f7d33552d9997a2a3576aac4c1bd21221a008232a5149dc12f5f,2024-04-26T12:58:17.720000
|
||||
CVE-2024-33679,0,0,2119127df34c1b1778920d4e6065d4ed740b3c90a6263470bb3216974f628ba9,2024-06-05T17:15:13.407000
|
||||
@ -252853,7 +252856,7 @@ CVE-2024-34470,0,0,c26a3e4e103c3a39ccd71f6b73acf5c04b4f366cb36f58bea718bc4b8f16a
|
||||
CVE-2024-34471,0,0,532d16184865828974b7b8bfccacf00acd1cea4229675a661e47fbd9ede966c2,2024-07-03T02:00:12.450000
|
||||
CVE-2024-34472,0,0,849451fca1b199d715cc88e41dff8ac49cd790dbac58f51bec15328bb61654e2,2024-07-03T02:00:13.630000
|
||||
CVE-2024-34473,0,0,43374aed676f28dde9bbbef2a52ca305b9ed3cc132864c1fcb62c3381af2a62a,2024-05-06T12:44:56.377000
|
||||
CVE-2024-34474,0,1,6e1deb46e9a08c506cb3ac842207bea635d1ff5b91cd6c8644c3d105a2f41019,2024-08-21T18:35:04
|
||||
CVE-2024-34474,0,0,6e1deb46e9a08c506cb3ac842207bea635d1ff5b91cd6c8644c3d105a2f41019,2024-08-21T18:35:04
|
||||
CVE-2024-34475,0,0,3c160241762503df55acb87d7d14b9c9456523cbc048b20e9117848219522386,2024-07-03T02:00:14.950000
|
||||
CVE-2024-34476,0,0,0e840da90ac72a5275cc1cab81863ba6c9d8f821141193be8bf66abb3acfdeaf,2024-08-01T13:52:23.687000
|
||||
CVE-2024-34477,0,0,5d1de91fef7cafecd3b029f0bcee8de7cabdae801a9f3bc40e1b3eaf6a48cb39,2024-06-07T14:15:10.293000
|
||||
@ -252870,7 +252873,7 @@ CVE-2024-34488,0,0,bd1886e792bd0f0be5174d43785b1ee8c3d2805a0b92328a691bf28c3b9e5
|
||||
CVE-2024-34489,0,0,98fc4bbdad28e1f470f6bbf8edfd27b4d57977594296e589fe4b4857cec1a304,2024-07-03T02:00:18.727000
|
||||
CVE-2024-34490,0,0,8682749851a19fd719239443e2502b58b0b536d71d97e88f6d39bdad053f0e7a,2024-07-03T02:00:19.953000
|
||||
CVE-2024-34500,0,0,ac0f11e606e3a2f4fa3a35277b66fd154ed807cd910549607f9e78f6d7afdfa3,2024-06-10T17:16:29.303000
|
||||
CVE-2024-34502,0,0,f647808a1829f668ec011d91757a55b92eb3b1e32252e5bb388ffa596c83b5c3,2024-06-10T17:16:29.370000
|
||||
CVE-2024-34502,0,1,ff8021fe77a80f8fce883984eb2b34368073d3f3b28ee0c6d7be9cabaf01d43f,2024-08-21T20:35:03.920000
|
||||
CVE-2024-34506,0,0,91884f62e0a07e36490be7a849db3addb4a9338b84975e418e0914a4f89aa554,2024-07-03T02:00:21.367000
|
||||
CVE-2024-34507,0,0,218d2664de9ad27dc44233beca69cace0ca437014bd07ff163e57c33e50085bd,2024-07-03T02:00:22.533000
|
||||
CVE-2024-34508,0,0,5e2673a670e4b77b4a9c2499c88b60b0bcbf7731c3422764416c91ccda5ee532,2024-06-28T19:15:05.557000
|
||||
@ -253426,7 +253429,7 @@ CVE-2024-35429,0,0,330b233a9d961e5ab60bb84ab073545ccf41085088e749b133fee4692c3b4
|
||||
CVE-2024-3543,0,0,14aebe52440b6c29accdfa7acf400fe951e7d7441b56210ed47a5a2c1e52128f,2024-05-02T18:00:37.360000
|
||||
CVE-2024-35430,0,0,56e6241f029678a052009701d49bb56dd50fb27b414c4e76330cb64eb76c9db6,2024-07-03T02:01:45.150000
|
||||
CVE-2024-35431,0,0,0a35dffe7e6c93066fa509053c839d3a8bc16edf2b77120799090f4882a8d3ea,2024-08-01T13:52:41.087000
|
||||
CVE-2024-35432,0,1,a5bddee657b22bd17e3fa9b1098801bb1ed3f60d3017572c00af5fda3d0c506d,2024-08-21T18:35:04.913000
|
||||
CVE-2024-35432,0,0,a5bddee657b22bd17e3fa9b1098801bb1ed3f60d3017572c00af5fda3d0c506d,2024-08-21T18:35:04.913000
|
||||
CVE-2024-35433,0,0,0b3687e6d05fd0aabce2f6753ab48622a6daecb670483272307382dbb941306d,2024-05-30T18:18:58.870000
|
||||
CVE-2024-35434,0,0,55e035c2a162134710b80f5640b923747de7468a0790da753e41ecb6e33217f6,2024-05-29T19:50:25.303000
|
||||
CVE-2024-3544,0,0,ac159828af5bc2292e8e0701d42b4d30a3b9b1860c97c52c0c82cf5c85bdace8,2024-05-02T18:00:37.360000
|
||||
@ -253785,7 +253788,7 @@ CVE-2024-35896,0,0,38740fa9e0e28c1998375bca10b45aa3bea5349d16d5bb779072be0a08a5e
|
||||
CVE-2024-35897,0,0,93dd335f3c661b184a9126ceda6682793e22f6e45c2ebebcb998960eb0c68b3e,2024-06-25T22:15:32.503000
|
||||
CVE-2024-35898,0,0,f2046edcf7a6f808589e35b06e7686f88f49d32de2ed71667b4d90ced64d89c8,2024-06-27T12:15:26.020000
|
||||
CVE-2024-35899,0,0,4dbe75b47a1246880346d207e2caf3bd12899b72a9fbfa1f3838858346681f0f,2024-07-03T02:02:23.870000
|
||||
CVE-2024-3590,0,0,0b94fa675ea98f8403de77b9a76eee251df4aab7724ab3840b246b050afcd80f,2024-05-14T16:11:39.510000
|
||||
CVE-2024-3590,0,1,ecd599d2024811d7e4dba1970704a54055fa584cc9df087a6b1053a3f8a6a0dd,2024-08-21T21:35:07.913000
|
||||
CVE-2024-35900,0,0,209f03e2c7f8a26f9615592392c404b536c539af27e1d45bce559140a2f91b57,2024-06-25T22:15:32.823000
|
||||
CVE-2024-35901,0,0,46a8946b537056fbdf89b6c0c01774a7932e4c39290c8079b2a807551fced0eb,2024-05-20T13:00:04.957000
|
||||
CVE-2024-35902,0,0,a500266164e7c77ccc8a48349779198ba10d1f10a0a7ef418ed4a8f27509ee82,2024-06-27T12:15:26.087000
|
||||
@ -254000,7 +254003,7 @@ CVE-2024-36128,0,0,9da468fd538eee45c49c6b3a5b681c0b3c17cde174e2675cb22d4e1b048d5
|
||||
CVE-2024-36129,0,0,e8b8667180ad871a39015931b777fa59fb290eb036737b8e789f39cbc635a5fb,2024-06-18T17:34:11.873000
|
||||
CVE-2024-3613,0,0,26f9ac2543805748959db0b5d9b33039cf66eba7396fc9c5a9d8ce8ca1f82b38,2024-05-17T02:40:01.607000
|
||||
CVE-2024-36130,0,0,4671d62b05ac637a601468320fbde1254b9e1ab2c793e3e63f9ae03e57d902ad,2024-08-12T18:52:50.947000
|
||||
CVE-2024-36131,0,1,fe083931c777de5ebca95ef63997997b27461bd32c076901187f040a7a6fb25e,2024-08-21T18:35:05.670000
|
||||
CVE-2024-36131,0,0,fe083931c777de5ebca95ef63997997b27461bd32c076901187f040a7a6fb25e,2024-08-21T18:35:05.670000
|
||||
CVE-2024-36132,0,0,1dce30d4e49190a42dd771e2cd02fc7bcd0f0b6c2d4894583a88755ab208fd59,2024-08-12T18:53:28.710000
|
||||
CVE-2024-36136,0,0,5d95909c13f0d8392324a7365478397dba5326ae554d2812281ea77aabac6cfb,2024-08-15T17:31:15.880000
|
||||
CVE-2024-3614,0,0,7d52e3588cbb3715dc858d110e11a928859b665db7d4d54abdbcae84467ecd9e,2024-05-17T02:40:01.707000
|
||||
@ -255850,8 +255853,8 @@ CVE-2024-39008,0,0,d8f19e5215777652d65d1787e2b99d3c75e4a232be174ccdef7b4b42d5758
|
||||
CVE-2024-39010,0,0,ea27e1a674e0e51152c366aff9b8434577dd6bdd1d1fbf49281cb1173cbd8dea,2024-08-08T14:17:52.963000
|
||||
CVE-2024-39011,0,0,0ff72e1262c145c0e7ad0e12159fa8940005cef45637179ea7630e9fc6914efb,2024-08-08T14:16:25.860000
|
||||
CVE-2024-39012,0,0,9df6324c2bfe44c83576ce38800d6b3518f1e8bebb5d26f5ef119b7475ae9607,2024-08-08T14:03:03.583000
|
||||
CVE-2024-39013,0,1,88397ac64721f404ef835e429cd6b6ea19d04c3211d855c608a964fcc32dacb0,2024-08-21T18:35:06.380000
|
||||
CVE-2024-39014,0,1,e328d9a926890a5b4f53069f32eed15f888241e4388cf64d2236a02398c4c2dc,2024-08-21T18:35:07.170000
|
||||
CVE-2024-39013,0,0,88397ac64721f404ef835e429cd6b6ea19d04c3211d855c608a964fcc32dacb0,2024-08-21T18:35:06.380000
|
||||
CVE-2024-39014,0,0,e328d9a926890a5b4f53069f32eed15f888241e4388cf64d2236a02398c4c2dc,2024-08-21T18:35:07.170000
|
||||
CVE-2024-39015,0,0,b9306c4366608a9bdba82a3b5fe9ddf19f9ad98b5ed41b597c0d6fd48fb1b83f,2024-07-03T02:05:35.967000
|
||||
CVE-2024-39016,0,0,44b10b31c2dcb3d5902acc74499e6688219a0202af7dbd3ffd5adca56db398f0,2024-07-03T02:05:36.777000
|
||||
CVE-2024-39017,0,0,cad5c73885b78ec41e9e1236a7a0070e7449eef74b63e32b190c59476e544a2f,2024-07-03T02:05:37.560000
|
||||
@ -255865,7 +255868,7 @@ CVE-2024-39027,0,0,9f73e18bd924a22ea308a0e3f3aba42dd8cadda957e02d96adc8536dc59de
|
||||
CVE-2024-39028,0,0,9687db509e67ca899b7283535a6c24eebf7f6784e1a1f28baae3172078bffed5,2024-08-01T13:55:19.873000
|
||||
CVE-2024-3903,0,0,1173acb865ab00a4b856055c98dd70060d7f57d01c944a25db26e0ac92cb735f,2024-08-01T13:56:45.143000
|
||||
CVE-2024-39031,0,0,d24f6f8147beeb7e9c2d09f46b9b50d67c2b9ac54ebfd67e20353ba96152db2b,2024-07-25T22:15:08.837000
|
||||
CVE-2024-39036,0,1,1815c46fdce9cf5d7067d9b211491bb0c920c7748005faa34854c855193cbfe8,2024-08-21T18:57:12.603000
|
||||
CVE-2024-39036,0,0,1815c46fdce9cf5d7067d9b211491bb0c920c7748005faa34854c855193cbfe8,2024-08-21T18:57:12.603000
|
||||
CVE-2024-3904,0,0,b47d95974559a4f3b756535a5502c34ce174362aa3e2f750b6b7a9a829cd5533,2024-07-23T01:15:09.063000
|
||||
CVE-2024-3905,0,0,67966257112781442fc6e512d6c151edda862eaaff35815fcc6adec0f7a08ca4,2024-06-04T19:20:26.357000
|
||||
CVE-2024-3906,0,0,a3b427119bdbbda357983f8fdd52a145484ad89b344f08b8387b1c5f33e2d6f6,2024-06-04T19:20:26.463000
|
||||
@ -256439,9 +256442,9 @@ CVE-2024-40110,0,0,68d861d5d10a023f1915f02afcd75d8882ae33a201769ba967017148b1a5c
|
||||
CVE-2024-40116,0,0,eb70c9a9b1b545c9ad476d8d1542c9445241ad3bd4f0dd5767e3b25e7e8e8497,2024-08-01T13:56:51.153000
|
||||
CVE-2024-40117,0,0,c995513fc31f8c8ab9b7343003983d62c093f801640bdaede808c210dab8c1f8,2024-08-01T13:56:51.860000
|
||||
CVE-2024-40119,0,0,684af900644d0baaaf3eeabc10aa1cf28b30369a49ccf90f61c5cecb4e42879b,2024-08-01T13:56:52.650000
|
||||
CVE-2024-40129,0,1,094db6b1cc5f6ee95fab428762b39a3d67f29eab1863c6c2fa082d03f389b949,2024-08-21T18:59:09.703000
|
||||
CVE-2024-40129,0,0,094db6b1cc5f6ee95fab428762b39a3d67f29eab1863c6c2fa082d03f389b949,2024-08-21T18:59:09.703000
|
||||
CVE-2024-4013,0,0,3586550d51b92b0f462ebc695cf4afe7e9f245d08490f98716812b60f3625af2,2024-06-07T14:56:05.647000
|
||||
CVE-2024-40130,0,1,093b1fad643c93b0a06c31b2bb9b67d52d3d511f6e3c5e9dbb0e8432db230090,2024-08-21T19:00:56.183000
|
||||
CVE-2024-40130,0,0,093b1fad643c93b0a06c31b2bb9b67d52d3d511f6e3c5e9dbb0e8432db230090,2024-08-21T19:00:56.183000
|
||||
CVE-2024-40137,0,0,4158bade34f096859f58d84cfe190a8d5559ddcf08eebfd1ce97260b054d79c0,2024-08-01T13:57:00.547000
|
||||
CVE-2024-4014,0,0,b3b1290aefb4c494a91b06e73308720019bcbbd573300060d0dbb0155cbc5507,2024-04-22T13:28:43.747000
|
||||
CVE-2024-4017,0,0,80bc2cfe2c053bce72096cd358a992628c3c16de9493da95b29bf0e4f3e1b16f,2024-04-22T13:28:50.310000
|
||||
@ -256476,7 +256479,7 @@ CVE-2024-4037,0,0,835f7b633520c38dc69c5473ca883b788d7739f8c5278809ab72b10ff3489f
|
||||
CVE-2024-4038,0,0,9199a5f679fdf6d4f05942a1d329990ffc0905f3bf6de7561a7af327688cdab4,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4039,0,0,b18b8aac4336f296c5655f645710463e48a4544089b8c4c20638e847b5c74634,2024-05-14T16:11:39.510000
|
||||
CVE-2024-40392,0,0,4fca88dff401a8138459da84bc3f01447997dddad0d6609e6db41057956be98a,2024-08-01T13:57:14.083000
|
||||
CVE-2024-40393,0,1,9b92da21177fe8aa44a5e39548076593e5725a02c42ea3793eafd13d4eb2e51a,2024-08-21T18:13:42.670000
|
||||
CVE-2024-40393,0,0,9b92da21177fe8aa44a5e39548076593e5725a02c42ea3793eafd13d4eb2e51a,2024-08-21T18:13:42.670000
|
||||
CVE-2024-40394,0,0,6a6373d6840a53222337e137dc03e4cb2a60579893b62069f0f6025fffca56b3,2024-08-01T13:57:15.033000
|
||||
CVE-2024-4040,0,0,4c2ad1f11d479d0071ddbaeb3523edde6a0cd9c4e74c065c69d4bb5c9b1ac029,2024-04-26T15:25:47.270000
|
||||
CVE-2024-40400,0,0,aec60b9f9f600363c457f651ff723a62cac6ef548b5399a3264322f4567e7220,2024-08-01T13:57:15.850000
|
||||
@ -256510,7 +256513,7 @@ CVE-2024-40476,0,0,f9287e4de79741df61fb3063574b5ffbc3a40e7aba2a9ae7b1c9a4ed2d244
|
||||
CVE-2024-40477,0,0,6cb0cc10c37b24482c4bb193827b5d7d3a2113c4464b073473336af2956aa387,2024-08-13T01:13:46.877000
|
||||
CVE-2024-40478,0,0,17b98c2a8ea50e8a90d83e222f7ae8a097b82de7508a46519094d9be0f6fe775,2024-08-12T13:41:36.517000
|
||||
CVE-2024-40479,0,0,c5bec1df57db16e609d1623e6517bb40c5b937de6b2390aae79ad47c0b80430a,2024-08-13T01:13:47.860000
|
||||
CVE-2024-40480,0,0,8a5587d0c52b3e2bab6e37cd2c4376f46191977b095b6fb4b6027fa3bdca9dcc,2024-08-15T13:47:50.450000
|
||||
CVE-2024-40480,0,1,e7a951452f0ffeb9495f3973bc193ff807eb0f9c1dd8fd2ead8c62923fcd7549,2024-08-21T21:35:08.270000
|
||||
CVE-2024-40481,0,0,4827ebaf038f9227afaa10ae59d01fa6610f2bcdbbe677b5840a09b2a19855a4,2024-08-15T13:58:16.033000
|
||||
CVE-2024-40482,0,0,77b0e0d738c085be01901fe452456d9f6f2c227935acf82b80697b6be23d963f,2024-08-13T01:13:50.130000
|
||||
CVE-2024-40484,0,0,450f717e0dcf79c0d7625633ec58aab189af6e628b95e324782e3205e6fde516,2024-08-15T13:59:35.813000
|
||||
@ -256711,8 +256714,8 @@ CVE-2024-40872,0,0,61b6054f8d04261e92c08a44feec16dc1d8422a97543a2162e5dea5f0a6c8
|
||||
CVE-2024-40873,0,0,6df1707815f9f38105b50cd71b6fad1bdaf7a6f3e3c945bc399ab848fdd0a9bf,2024-08-02T19:57:17.407000
|
||||
CVE-2024-4088,0,0,61cc31924b86843bbd20c326ef7465dc1aa394b548458b2e1a9fc62c09ede628,2024-06-11T17:11:30.193000
|
||||
CVE-2024-40883,0,0,dacd9a67232f6d97da8b548085eb71f69250fd3fec34bd945dc78c157c912274,2024-08-01T12:42:36.933000
|
||||
CVE-2024-40892,0,1,80f2c69eafcb531435cc671447d237ff8792f374d8c58f10182688d813811ab4,2024-08-21T18:15:09.710000
|
||||
CVE-2024-40893,0,1,3220dba971e1861a31a0659deabcf8dc81ec736d5ed6a5b82a9eb1d0c8650fcc,2024-08-21T18:15:09.803000
|
||||
CVE-2024-40892,0,0,80f2c69eafcb531435cc671447d237ff8792f374d8c58f10182688d813811ab4,2024-08-21T18:15:09.710000
|
||||
CVE-2024-40893,0,0,3220dba971e1861a31a0659deabcf8dc81ec736d5ed6a5b82a9eb1d0c8650fcc,2024-08-21T18:15:09.803000
|
||||
CVE-2024-40895,0,0,8c1e79c4f9b4c4aa0a454566e9355d762509535d530511413d5b712e02da1fc1,2024-08-01T13:58:15.617000
|
||||
CVE-2024-40897,0,0,961e760bbf75aa3c22f4f2524dda55f63ec78f0f1d7997b53bd7e0a1a9dddcac,2024-08-01T13:58:16.503000
|
||||
CVE-2024-40898,0,0,c6ad18799f7505669566d9c81fb73660e4e14c652ad1fc12f5c5f928e7c51636,2024-08-08T16:02:40.887000
|
||||
@ -256882,17 +256885,17 @@ CVE-2024-41049,0,0,92c1bb7b998a305af611ea0fb8cec280acf0ca6290c6083ab04ddb40be141
|
||||
CVE-2024-4105,0,0,5dcbaf8d64f37f58816de0666875f99544dc68f0a9ee2a9bf8d53a5a9c60191e,2024-06-26T12:44:29.693000
|
||||
CVE-2024-41050,0,0,39d4269dc6ec271427b4bdd65b9d3d16d3d31b7b1303de1471509f3b60dd1681,2024-07-29T16:21:52.517000
|
||||
CVE-2024-41051,0,0,828856464b37c81ed12190c5149ddea9cdaf7edfd74019e8a2aa69fd3cf3a9ff,2024-07-29T16:21:52.517000
|
||||
CVE-2024-41052,0,1,02410c9b72898d738184e0b7a3effa9630f2e9d19b23d5deeaa031a00c5a143e,2024-08-21T19:27:26.227000
|
||||
CVE-2024-41053,0,1,f44272aa5841bc62914782889e664342425d762592f8f78de62bccbea7d12c58,2024-08-21T19:21:41.530000
|
||||
CVE-2024-41052,0,0,02410c9b72898d738184e0b7a3effa9630f2e9d19b23d5deeaa031a00c5a143e,2024-08-21T19:27:26.227000
|
||||
CVE-2024-41053,0,0,f44272aa5841bc62914782889e664342425d762592f8f78de62bccbea7d12c58,2024-08-21T19:21:41.530000
|
||||
CVE-2024-41054,0,0,54d000610420765de59a42fcd6b0218f3e2dc53e9697b03d4c5cf83c4402e430,2024-07-29T16:21:52.517000
|
||||
CVE-2024-41055,0,0,499100fd75a0a01af0a661e5f3f470cfc510510f055a9070bfb5cea9bafe2b0b,2024-07-29T16:21:52.517000
|
||||
CVE-2024-41056,0,0,681ae471fcf06bdb78f6869758eaa87ed447f2fed56eb21007ad5f506a538998,2024-07-29T16:21:52.517000
|
||||
CVE-2024-41057,0,0,99f60754c1ef6e2aef87de980618623143e6219cad98680847261d6cd9f33181,2024-07-29T16:21:52.517000
|
||||
CVE-2024-41058,0,1,31868f2a557744984e7874683aa697ff5ee97c10d7e2f10058c8921d174aaec3,2024-08-21T19:35:22.120000
|
||||
CVE-2024-41058,0,0,31868f2a557744984e7874683aa697ff5ee97c10d7e2f10058c8921d174aaec3,2024-08-21T19:35:22.120000
|
||||
CVE-2024-41059,0,0,a3e848e0f22cf6429fd584bc8b1d0becbc43af3e8de05f6d70f42a052cdb4353,2024-07-29T16:21:52.517000
|
||||
CVE-2024-4106,0,0,3fc11eee434aa540a2e37440bd2e3ba6e18faae117022d3f68496d405f62ba7f,2024-06-26T12:44:29.693000
|
||||
CVE-2024-41060,0,0,ec0fe6e11350c37a45a30d3a61b44ae7110f7091e533c89a2e06068486abe2d7,2024-07-29T16:21:52.517000
|
||||
CVE-2024-41061,0,1,36d616e9bc36920a3c33a3b1c2ebff74d68391a8728cb87e68a5c76d7b4ef06e,2024-08-21T19:34:12.550000
|
||||
CVE-2024-41061,0,0,36d616e9bc36920a3c33a3b1c2ebff74d68391a8728cb87e68a5c76d7b4ef06e,2024-08-21T19:34:12.550000
|
||||
CVE-2024-41062,0,0,fbf24b9fd211a6aa96a9c57e6e5ee51eed4d30e0f0990ba1f54a615f2caf60dd,2024-07-29T16:21:52.517000
|
||||
CVE-2024-41063,0,0,e4ddf8fb0026c8f28f6d7d93c6ba6f6b51f6cf05a4df4cf405d518f420d57bca,2024-07-29T16:21:52.517000
|
||||
CVE-2024-41064,0,0,38bd2f5b07078a53c43ab68cf08b88abdd1fbf1876fcfc6333b8f4086de00926,2024-07-29T16:21:52.517000
|
||||
@ -257030,7 +257033,7 @@ CVE-2024-41318,0,0,9b1c1d0472f281a532ac7cd9f50c0be0ec0f55b0327046bb10ee1709062e9
|
||||
CVE-2024-41319,0,0,1899a3684e8a27d8d6402d107bc11ca910ee14276fc605936dd401557907d526,2024-08-01T13:58:31.957000
|
||||
CVE-2024-41320,0,0,6629b2c1bbc9cd1b160b7b0f9c935334633b6b47708e3a65ad0ff69abde9e8ce,2024-08-01T13:58:32.723000
|
||||
CVE-2024-4133,0,0,809a3aebbf4e63405fb2f0740c9908f3dfcf1d711b93379e5d465ea9e56d3cba,2024-05-02T18:00:37.360000
|
||||
CVE-2024-41332,0,1,0c297902d1fd2e33f0ac4f9fcf27ea849083281238ee0df040d97531f7646dbb,2024-08-21T18:53:15.927000
|
||||
CVE-2024-41332,0,0,0c297902d1fd2e33f0ac4f9fcf27ea849083281238ee0df040d97531f7646dbb,2024-08-21T18:53:15.927000
|
||||
CVE-2024-41333,0,0,cddcfe88014fc883d7c26828c1a1c1f213d8d1e951fc2a526ac4569575e77f96,2024-08-07T20:54:44.060000
|
||||
CVE-2024-4135,0,0,3adddfced77f8fc8630aec5e175734a40783e3f6b247cb0614a312485a8097a3,2024-05-08T13:15:00.690000
|
||||
CVE-2024-41353,0,0,283f710ae1d74e1c389a6d83c71bf34f8cb957eca1e713efb25da5fc972611a3,2024-08-01T13:58:33.490000
|
||||
@ -257090,7 +257093,7 @@ CVE-2024-41551,0,0,a47b3d6d1401636bd7731728d6fcb9c38717d9cec4c98b37b50c290693f43
|
||||
CVE-2024-4156,0,0,31cc9500838d0dc99d5959700d84ebbac93048893a2eb67f37ed77d13093550c,2024-05-02T18:00:37.360000
|
||||
CVE-2024-4157,0,0,ac5ec2e690c76b81403cfa49bc63d1a8caa2fb9d97d28a1055398849720db727,2024-05-22T12:46:53.887000
|
||||
CVE-2024-41570,0,0,08f18f006ef075be3e868b6121774877f2111f5f9ca9672280d529a6b344da0d,2024-08-13T01:14:38.880000
|
||||
CVE-2024-41572,1,1,f415a06f9331f0092b607416c405edebe23a7ef92516bc8339bdf48ae35e5ad4,2024-08-21T19:15:13.380000
|
||||
CVE-2024-41572,0,0,f415a06f9331f0092b607416c405edebe23a7ef92516bc8339bdf48ae35e5ad4,2024-08-21T19:15:13.380000
|
||||
CVE-2024-41577,0,0,1db7c1144df378d1f0197182c3eb7cc1bf4798d90e82fc3037fda80bd09f3f04,2024-08-12T13:41:36.517000
|
||||
CVE-2024-4158,0,0,9bd0a38e47c5b6d26f1e587737a0ffeb7c251278f38061995fc29ba309646aa6,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4159,0,0,72a4ec46db1a22f62474bfa22a14f37a28a6ceba3042de92b905fca6cc58c082,2024-04-25T23:15:47.087000
|
||||
@ -257112,7 +257115,7 @@ CVE-2024-41623,0,0,a9ebe8f50cad28f049bc48127c9cd7648861ed6c75cbd2c9dddecb0df4275
|
||||
CVE-2024-41624,0,0,300a907d59c60bf938fbbe11abf1d1dd305a7cd2619bf29e5e11f38514dc3443,2024-07-29T16:21:52.517000
|
||||
CVE-2024-41628,0,0,3f95419a732116ba5016aeec3d83a528b6096a3cc023e4d133c06f26311a9cae,2024-08-06T21:16:03.323000
|
||||
CVE-2024-4163,0,0,69022c7df60536fa7bdfb20d2705efebe8d2d6c2c39bf59b2dcb5940921dba2c,2024-07-03T02:07:10.047000
|
||||
CVE-2024-41630,0,0,1f68238b8090ad7d80fcdde7844c7b581ff0ac481c35df52ee6c6fce21a269d8,2024-08-01T12:42:36.933000
|
||||
CVE-2024-41630,0,1,e548dfebacddac9001ef8ea716c134ba37f5b617a7452dc32ae593b8c4a0bcf0,2024-08-21T21:35:09.060000
|
||||
CVE-2024-41631,0,0,64089e0a0fdbef62a9df919d7f8440afb5a1d3b3a0dc3fcc6c457b7b45e40639,2024-08-01T13:59:00.513000
|
||||
CVE-2024-41637,0,0,55c2ebf6d4e1b5a52e76380fb54fc17a20ca604f4f925dc181c059611f7f9e00,2024-08-01T13:59:00.710000
|
||||
CVE-2024-4164,0,0,5c582c5408e712b207393008a4bc438580820bad61af8c831d6d320440184b2c,2024-05-17T02:40:17.710000
|
||||
@ -257395,13 +257398,13 @@ CVE-2024-42099,0,0,3238974df1fe016605810e840ae3252de7cbfd02bda034d599f06c9b461b0
|
||||
CVE-2024-4210,0,0,3de0526bc7ee4d2ee3e85387e784b47b575c14d9043bdb29c130980f21c212c3,2024-08-08T13:04:18.753000
|
||||
CVE-2024-42100,0,0,9f2359920901de15a72f82c74dd31f7cfd476c8a0553c2aa7b3605f8c3eb567f,2024-07-30T13:32:45.943000
|
||||
CVE-2024-42101,0,0,a43b8a223f1ffc3fdbab7ceec1d85321f13ef67abc72e8df2d3881226ed3c5c7,2024-07-30T13:32:45.943000
|
||||
CVE-2024-42102,0,0,c0abd8510596319502db15bc3b069d82cca2de50b634d2f59f6ce82e03010599,2024-07-30T13:32:45.943000
|
||||
CVE-2024-42102,0,1,6316e9599f21ebdb21ae9fa78c744fcee5e0d5e7ec56a75728d7b5f4ac6d9f1a,2024-08-21T20:48:01.940000
|
||||
CVE-2024-42103,0,0,571d1f20007ce6492a18993a5251eb19a6d81ac85736922f03454b3e3d7e7288,2024-07-30T13:32:45.943000
|
||||
CVE-2024-42104,0,0,afcbe4f1517f0991a2f8be927dec0a5aee82a58d76a6b63d0d1ad5734deb68fb,2024-07-30T13:32:45.943000
|
||||
CVE-2024-42105,0,0,602b7eceacc9e23748db5c2c201abe70f13508a1dc06a4238bfa6a02e44d1d34,2024-07-30T13:32:45.943000
|
||||
CVE-2024-42106,0,0,d1be86d3a499fcbbd48fa48666a765f712be1dd5a6b971ade33744c711a65cf7,2024-07-30T13:32:45.943000
|
||||
CVE-2024-42107,0,0,6491957e69d9efbbc6993b086ea49c99500b6fccef3248643b058f90720776c1,2024-07-30T13:32:45.943000
|
||||
CVE-2024-42108,0,0,31b235bd396c4d2f15a3ef348c75f98d88384bfab92490615536848031e2452c,2024-07-30T13:32:45.943000
|
||||
CVE-2024-42108,0,1,07a55e64558b7f3e959e84e219b350a11c328136e4e4f1bc5343262d1bc114f5,2024-08-21T20:52:35.470000
|
||||
CVE-2024-42109,0,0,73f90676ff123a528c581779716841725a0b8ad686ebe44e00d09c690aa44455,2024-07-30T13:32:45.943000
|
||||
CVE-2024-42110,0,0,d32e698de0e7b17bea1969eb2144abdc6b889fd7317c6b8113fda73d076657e7,2024-07-30T13:32:45.943000
|
||||
CVE-2024-42111,0,0,54db76ff7e8130362d41c492aa2e759d1e30f80ea24bf90a20c876a40458428a,2024-07-30T13:32:45.943000
|
||||
@ -257717,7 +257720,7 @@ CVE-2024-42575,0,0,cf2b2349db3c76ced20b6aa1a9b6de0d11718de3d1ae748f38b2de1c10e71
|
||||
CVE-2024-42576,0,0,d7eb868484ad37f21c56ed60bc9cbb03790a1e242dbcb4957b7f3d19f6553c68,2024-08-20T16:35:29.750000
|
||||
CVE-2024-42577,0,0,90aae1e6030150c8a860d623cdf957a84ff52b3a936bb9734a4fd516a3527414,2024-08-21T14:35:12.110000
|
||||
CVE-2024-42578,0,0,e49e6d1eec15d8971d4646a9d9f4fa585ff2792aff3d9892d55116d7caa208d1,2024-08-20T15:44:20.567000
|
||||
CVE-2024-42579,0,1,c99a5f9acecd1dfba8e26c5185f2a559c0ce5eb71a2cce527f62a9e51b0ebb06,2024-08-21T18:35:08.200000
|
||||
CVE-2024-42579,0,0,c99a5f9acecd1dfba8e26c5185f2a559c0ce5eb71a2cce527f62a9e51b0ebb06,2024-08-21T18:35:08.200000
|
||||
CVE-2024-4258,0,0,cedc452cf08b1d582601f74b54055702e4527b179d19ae6d21e1fa7a35e392d8,2024-06-17T12:42:04.623000
|
||||
CVE-2024-42580,0,0,2990563b67d4dc92b3ce407afe260e1a67fac4a4f00be92eeacf912a244c329a,2024-08-21T13:39:07.857000
|
||||
CVE-2024-42581,0,0,c905d276d2309271a54559459476e6aa55a4022f51585f282439786c09ceb2ed,2024-08-21T13:38:50.380000
|
||||
@ -257729,11 +257732,11 @@ CVE-2024-42586,0,0,cbadbedcb4b3c2d2ab907140f92a66b7af1f959a0d34de9272c8d68911fd4
|
||||
CVE-2024-42598,0,0,f84068afa431dac666314c81a0e0ae65b2644ef29efa564d1b4da4b712849c95,2024-08-21T12:30:33.697000
|
||||
CVE-2024-4260,0,0,16d46a0b5bcb66a093fc7ed1472e8a955d65f29368360dc29eff1d3d84145b9b,2024-08-01T13:59:29.547000
|
||||
CVE-2024-42603,0,0,994e52c74dfb66d27249c2b65181ca74c70f6e7f1904d6fd7ee8f461dc2cc6fb,2024-08-21T13:21:56.383000
|
||||
CVE-2024-42604,0,0,c728aa7d1997da2891fdaf68c4e186010a0ab578e913f3d19b193328f99c33c2,2024-08-21T13:12:50.820000
|
||||
CVE-2024-42604,0,1,53718c28d04ee9ff5e5273896e62f5eef0651385f9073829087b371924096be7,2024-08-21T20:35:05.780000
|
||||
CVE-2024-42605,0,0,3d7b70705f0c340fd9e9ac2feaeb7c16213ffec0f6a7c6374438550a8c1d62c6,2024-08-21T13:12:40.957000
|
||||
CVE-2024-42606,0,0,e46323a2b9a85aad3954a3b27bc1e8c958b659372d991d6df8f73aab5c26bf01,2024-08-21T13:12:27.070000
|
||||
CVE-2024-42607,0,0,b5b5d184fb29386f840a66de2587a7be0c2df56835ad775e585769a324e9820a,2024-08-21T13:12:16.913000
|
||||
CVE-2024-42608,0,1,2812a36dacc1d1d37dd871ef3cf52b053de223536dfa32113940a363ab5fab6d,2024-08-21T18:35:08.967000
|
||||
CVE-2024-42608,0,0,2812a36dacc1d1d37dd871ef3cf52b053de223536dfa32113940a363ab5fab6d,2024-08-21T18:35:08.967000
|
||||
CVE-2024-42609,0,0,f63b45fca798ad24817857f390287beb793195563f037ecfcae8997c9ecfddec,2024-08-21T13:12:03.427000
|
||||
CVE-2024-4261,0,0,cad163d5402c8383e323c083e324c4342bcfec07494a0960d776456fb2ab221b,2024-05-22T14:30:41.953000
|
||||
CVE-2024-42610,0,0,9ff653a6a99494fed368590a85a46ec66dee52a770d3e028c312550d378eb0f9,2024-08-21T13:11:37.863000
|
||||
@ -257799,16 +257802,16 @@ CVE-2024-4275,0,0,c229bc373f94c5248df137d0b0d9ca9d61bf79f845040a419335cc081cba5e
|
||||
CVE-2024-42757,0,0,7f6ba25a82908bfc7acb20e761fdbba6f23f597232f39843fc1cc43949e3074d,2024-08-20T15:35:25.190000
|
||||
CVE-2024-42758,0,0,78591070e9343c09b0ea814d5b331b967691862f9b02d6e8c624fb011530a86d,2024-08-19T18:35:14.237000
|
||||
CVE-2024-4277,0,0,ec975a6ab8cd435ccab2b915965095df8c992e1e8e765cf73bc6d545aa3b1e0a,2024-05-14T16:11:39.510000
|
||||
CVE-2024-42777,1,1,f19d6b5356800377bd1539cbfc14b31e97ff797f3033dec3f5badbe693daa64b,2024-08-21T18:15:09.930000
|
||||
CVE-2024-42778,1,1,7dcf72b1dfb9bfe76b9d141481aefdee385b5bba55e20eb1891204c415ab8ed8,2024-08-21T18:15:10.003000
|
||||
CVE-2024-42779,1,1,c0b1fae1eef405e09938d56473acce09c74e979e86c711ae564c2b9c6f4326a9,2024-08-21T18:15:10.073000
|
||||
CVE-2024-42780,1,1,ffa79341d136a2fe32f61e2177f7968cc6085bf9af8cfac4879351d5892dcdc5,2024-08-21T18:15:10.150000
|
||||
CVE-2024-42781,1,1,1ac0c9af5612cbf5d1260f940e4e4e708d6e06d10e1d2878a91835e815cfc7a5,2024-08-21T18:15:10.227000
|
||||
CVE-2024-42782,1,1,ba055618f34155af28e55c7c75210e6ecb3f8ef361bccfbb9e575dcc4777a07e,2024-08-21T18:15:10.303000
|
||||
CVE-2024-42783,1,1,acd091b1f1c030b017eaf01a7cbf618eca139ba4341ff9f3ecab6d10eba3f509,2024-08-21T18:15:10.453000
|
||||
CVE-2024-42784,1,1,044452a33f637cb7d87ad5995060fe9ceade24692dbdf884a0a102e4b5d407f2,2024-08-21T18:15:10.630000
|
||||
CVE-2024-42785,1,1,552938865a02839d30ef320418a9071e80c7ca9bef81bef108e7cfdd75a7de36,2024-08-21T18:15:10.707000
|
||||
CVE-2024-42786,1,1,67be097c4312e65e740419ccf899e94bbb8bf27af0aa8beb26b760fd35d4a25f,2024-08-21T18:15:10.783000
|
||||
CVE-2024-42777,0,1,601937d41df30c05fa0d87ca76aaaf5c2da7d99d475dc58fa1c53bc531c413b2,2024-08-21T21:35:09.833000
|
||||
CVE-2024-42778,0,0,7dcf72b1dfb9bfe76b9d141481aefdee385b5bba55e20eb1891204c415ab8ed8,2024-08-21T18:15:10.003000
|
||||
CVE-2024-42779,0,0,c0b1fae1eef405e09938d56473acce09c74e979e86c711ae564c2b9c6f4326a9,2024-08-21T18:15:10.073000
|
||||
CVE-2024-42780,0,0,ffa79341d136a2fe32f61e2177f7968cc6085bf9af8cfac4879351d5892dcdc5,2024-08-21T18:15:10.150000
|
||||
CVE-2024-42781,0,0,1ac0c9af5612cbf5d1260f940e4e4e708d6e06d10e1d2878a91835e815cfc7a5,2024-08-21T18:15:10.227000
|
||||
CVE-2024-42782,0,0,ba055618f34155af28e55c7c75210e6ecb3f8ef361bccfbb9e575dcc4777a07e,2024-08-21T18:15:10.303000
|
||||
CVE-2024-42783,0,0,acd091b1f1c030b017eaf01a7cbf618eca139ba4341ff9f3ecab6d10eba3f509,2024-08-21T18:15:10.453000
|
||||
CVE-2024-42784,0,0,044452a33f637cb7d87ad5995060fe9ceade24692dbdf884a0a102e4b5d407f2,2024-08-21T18:15:10.630000
|
||||
CVE-2024-42785,0,0,552938865a02839d30ef320418a9071e80c7ca9bef81bef108e7cfdd75a7de36,2024-08-21T18:15:10.707000
|
||||
CVE-2024-42786,0,1,348f38439c7eccea8f4c8f85e3cc1b1a41f79120150e99336aba447190a494f7,2024-08-21T21:35:10.637000
|
||||
CVE-2024-4279,0,0,dfbad3c4052d0097199e5a57f42abb52975c0de3af4475a04c90870b0d97f015,2024-05-16T13:03:05.353000
|
||||
CVE-2024-4280,0,0,f46c38f13eff52b4d020fb374e18f92e6528a4bade2042627b2165ccf7b62772,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4281,0,0,cb48c26c252b1c83fb4810210335ce05e1fcbd94e5804419418b4f73b9d5c028,2024-05-08T13:15:00.690000
|
||||
@ -257878,7 +257881,7 @@ CVE-2024-43009,0,0,468db8caeabef579a226d8a65490e413d586c09d4e7e764fb4b818b81835a
|
||||
CVE-2024-4301,0,0,218172685a71d9dc14b7de60ac62731c757d7801c2c506799e72286e245e5cdd,2024-04-29T12:42:03.667000
|
||||
CVE-2024-43011,0,0,a1a7726f53e21e3beb63c25ff5d202a0a16dad76f49dffd4b60f93fe1759157a,2024-08-19T14:35:10.893000
|
||||
CVE-2024-4302,0,0,3989b291497fea424d341ee8d50afc238ccc795cfb4606a4430491f615d9ea6b,2024-04-29T12:42:03.667000
|
||||
CVE-2024-43022,0,1,60b15925d48bd4a0544b6a90b44d37dd7b45f132534cfb6161c485e040769eb2,2024-08-21T18:35:09.733000
|
||||
CVE-2024-43022,0,0,60b15925d48bd4a0544b6a90b44d37dd7b45f132534cfb6161c485e040769eb2,2024-08-21T18:35:09.733000
|
||||
CVE-2024-43027,0,0,023646627aeb42c9f27c70e233b2b26c2ec04024033b793398340bc23e8b2b89,2024-08-21T17:25:08.560000
|
||||
CVE-2024-4303,0,0,83a712aebf2d4281174fc319c5a3b5ed1f6b2a8b7c1590974611c884faeb0657,2024-04-29T12:42:03.667000
|
||||
CVE-2024-4304,0,0,cc036c021f3a6e70e19e6533fc0c5b7e8e9615d68f40d67450c876ce97ebcd8f,2024-04-29T12:42:03.667000
|
||||
@ -259876,6 +259879,7 @@ CVE-2024-6382,0,0,9f140af24f460b4413fa844f95383cc153754360a136939b8743c2d8327ebf
|
||||
CVE-2024-6383,0,0,4622f4fc90fbde51d6570a14e2ee494e3e71659c68201475e4e4eb659c036ac0,2024-07-05T12:55:51.367000
|
||||
CVE-2024-6384,0,0,69acc14adf4ad2dfa9acf19196e8d21558fac0b5469b1fd3bf540f24a32ab6da,2024-08-16T14:29:24.947000
|
||||
CVE-2024-6385,0,0,13d2095bcd11ed43b6c47262c7b96c8a9e162b20cb975895bc98c3af67d39ff6,2024-07-12T16:49:14.047000
|
||||
CVE-2024-6386,1,1,560a15d3e4b6bd546e22b46d37a950f994931af46e63848e3eb4ce3e463ac328,2024-08-21T21:15:08.577000
|
||||
CVE-2024-6387,0,0,db893df8e717a9bd82383b1c159531d9bd008b0dedb866ba3b332081811995f1,2024-07-30T02:15:08.387000
|
||||
CVE-2024-6388,0,0,0ce37f83493b5d79bb3fdc963327390bc09266ac17f5f1de660cf43d4cdce70d,2024-06-27T17:11:52.390000
|
||||
CVE-2024-6390,0,0,a350381d3f247972bbe468db9ec2332b3c135e89cdf36bdf1358f9f5965e67ff,2024-08-05T14:35:08.267000
|
||||
@ -260099,15 +260103,15 @@ CVE-2024-6724,0,0,4c62a72c14d0d54a44bd529f2e1e2cb1bbf7b4dd7ab83d5409a9b7e23529f2
|
||||
CVE-2024-6725,0,0,02f518ea588b9f58d1f41a7ee9055d6a87d38c1076b40cf72b33d47960c5f058,2024-07-31T12:57:02.300000
|
||||
CVE-2024-6726,0,0,67da9a54e5a829e4300bb2883a5b7a4407d07a460c0b67dc5027c2e9a4f78316,2024-07-30T13:33:30.653000
|
||||
CVE-2024-6727,0,0,9d08fdd347dc87a0df3a4e157904c3068a4121c1538981e1be169dd75a3fc029,2024-07-30T13:33:30.653000
|
||||
CVE-2024-6728,0,1,89e66778f2b381ea7c063797a9902e44dbd60e43d41df6b9b479954aa8b57128,2024-08-21T18:08:50.630000
|
||||
CVE-2024-6729,0,1,3c39f156d8f05be16bae3b2d5d19dbd9e5e58833dbb3cc98b9943490250aa643,2024-08-21T18:07:04.263000
|
||||
CVE-2024-6728,0,0,89e66778f2b381ea7c063797a9902e44dbd60e43d41df6b9b479954aa8b57128,2024-08-21T18:08:50.630000
|
||||
CVE-2024-6729,0,0,3c39f156d8f05be16bae3b2d5d19dbd9e5e58833dbb3cc98b9943490250aa643,2024-08-21T18:07:04.263000
|
||||
CVE-2024-6730,0,0,ef30d2eb7f24b640da190afcbc16e385d73ab8dd33302ee9e560c4fd64a066a0,2024-07-15T13:00:34.853000
|
||||
CVE-2024-6731,0,0,c1f0bd3c11a2c8c6e666a080ff8caef145c9222128333d693bdc36ce4aafa4b2,2024-08-19T13:27:46.773000
|
||||
CVE-2024-6732,0,0,4b564e3077773ce9465e3e7f1c3de207d911b9bdb780e0e7ab4cd3d37dda245b,2024-08-19T13:30:45.700000
|
||||
CVE-2024-6733,0,0,2c6af872f9b8e7fd5b566f1882ba0aab1c7fe087e89241fd4a5514342919d09e,2024-08-21T17:00:32.243000
|
||||
CVE-2024-6734,0,0,99b6c404dde349127fbc4e3a9bddf4648a2734ed6897dbd445a2358ddaf7af89,2024-08-21T17:00:52.007000
|
||||
CVE-2024-6735,0,0,9ef87cfa7be3ed557a324eb8235c9371d645f72e1b23bc285d329ecd8e5d2258,2024-08-21T17:01:02.657000
|
||||
CVE-2024-6736,0,1,2d663f35896bd1420a8935dfae2be163d45d490f852b5406a36a1a062262f9a2,2024-08-21T18:14:15.270000
|
||||
CVE-2024-6736,0,0,2d663f35896bd1420a8935dfae2be163d45d490f852b5406a36a1a062262f9a2,2024-08-21T18:14:15.270000
|
||||
CVE-2024-6737,0,0,8702e57b452a150308d6299787708abc780fef0e416c70970908b3d0d87bc73f,2024-07-16T14:06:09.530000
|
||||
CVE-2024-6738,0,0,3a61a9d0dff57bd9a24abf3ccb065f63726018d20fe8e9197bc7bc11863de922,2024-07-16T14:06:27.810000
|
||||
CVE-2024-6739,0,0,ff130f606a3e8a51263eb79c0c10405a59fd6ec00a9a26fc959f88e93b41ffd0,2024-07-16T18:02:40.327000
|
||||
@ -260648,9 +260652,9 @@ CVE-2024-7602,0,0,681670da0d5ea368276c458bfd335dc84142a379f35cd9d1072e79c0c0968d
|
||||
CVE-2024-7603,0,0,ee75ca73d9ff000a521d60dd2bd96d940a61dcfaa024b75a8d0f0f33bb52d71c,2024-08-21T17:25:08.560000
|
||||
CVE-2024-7604,0,0,58eb9c041603c3622120dc34dbfc5b0275d32c68e3480a84279fede21b10ec78,2024-08-21T17:24:59.627000
|
||||
CVE-2024-7610,0,0,a10689bea1d0fbdec4f1b8819e74182773158d5010cb9fbea2ce46532922c645,2024-08-08T13:04:18.753000
|
||||
CVE-2024-7613,0,1,595ae1d3f56b81eeb34ef1e184ddf7962f3a8fbfc042ff77a8fcf0bd3f10f263,2024-08-21T18:47:11.523000
|
||||
CVE-2024-7614,0,1,70ea68e630891f9909a0a8afd3fe5566dad840edc8df033b5c308064cf074a69,2024-08-21T18:48:47.273000
|
||||
CVE-2024-7615,0,1,bdb4e2a47bb0b635ad5424e7dee382fdbc667ab1983b9e7b4b79b80817773efa,2024-08-21T18:48:19.590000
|
||||
CVE-2024-7613,0,0,595ae1d3f56b81eeb34ef1e184ddf7962f3a8fbfc042ff77a8fcf0bd3f10f263,2024-08-21T18:47:11.523000
|
||||
CVE-2024-7614,0,0,70ea68e630891f9909a0a8afd3fe5566dad840edc8df033b5c308064cf074a69,2024-08-21T18:48:47.273000
|
||||
CVE-2024-7615,0,0,bdb4e2a47bb0b635ad5424e7dee382fdbc667ab1983b9e7b4b79b80817773efa,2024-08-21T18:48:19.590000
|
||||
CVE-2024-7616,0,0,240142a7cf93711d379b14c2a6284d004fd0a2d1c674fc02d32efdd57aa3e2bd,2024-08-13T16:59:39.517000
|
||||
CVE-2024-7621,0,0,07161284faa2eb0637370b6ff462e631787a37850cefb6ac5fa6750545dd7050,2024-08-12T13:41:36.517000
|
||||
CVE-2024-7624,0,0,c87cdcd90fb34d1c79e4bedcfe521cd45a7c97d88fc176665ac59544b2fffb63,2024-08-15T13:01:10.150000
|
||||
@ -260722,10 +260726,10 @@ CVE-2024-7732,0,0,d07658c10ed57e2a3eecd9b14e76e8eed0b7a7133550030a1f5039eb59d98d
|
||||
CVE-2024-7733,0,0,bb60f9c1721a7d7267312f0897dbc581707f825a01d4c52185c190045c2c2268,2024-08-14T02:07:05.410000
|
||||
CVE-2024-7738,0,0,9abbf70090d4bac2436939ae1d7e5b66071c9e95d911875233a210759cede2ef,2024-08-14T02:07:05.410000
|
||||
CVE-2024-7739,0,0,48d24e6c734bdd0aabede58961a2ddba8bd9566478ef049fa21ee7be6d7677d2,2024-08-14T02:07:05.410000
|
||||
CVE-2024-7740,0,1,b6b97e22b2a1c91ed733b5ea0db90c7ca386835aea8a2536d78b137aa899a052,2024-08-21T19:06:30.707000
|
||||
CVE-2024-7741,0,1,451b4501bfecb549fed2131350eefedffb5605095818bbd2dc73e6ce30b3b5e5,2024-08-21T19:07:40.757000
|
||||
CVE-2024-7742,0,1,5026e5c91e6d01ca137577cf715447f5db3eb9e4e96b1b8aca8896a09ee6d170,2024-08-21T19:08:47.707000
|
||||
CVE-2024-7743,0,1,c910ec910e11d4c23506ee8328b07eddb255cd4474ff1acb5544c0f61f82b883,2024-08-21T19:15:54.553000
|
||||
CVE-2024-7740,0,0,b6b97e22b2a1c91ed733b5ea0db90c7ca386835aea8a2536d78b137aa899a052,2024-08-21T19:06:30.707000
|
||||
CVE-2024-7741,0,0,451b4501bfecb549fed2131350eefedffb5605095818bbd2dc73e6ce30b3b5e5,2024-08-21T19:07:40.757000
|
||||
CVE-2024-7742,0,0,5026e5c91e6d01ca137577cf715447f5db3eb9e4e96b1b8aca8896a09ee6d170,2024-08-21T19:08:47.707000
|
||||
CVE-2024-7743,0,0,c910ec910e11d4c23506ee8328b07eddb255cd4474ff1acb5544c0f61f82b883,2024-08-21T19:15:54.553000
|
||||
CVE-2024-7746,0,0,57c293bd84bcc81db971f993e54710083e23fbaa2d9a714afae737b9c1e2cedc,2024-08-13T17:11:53.553000
|
||||
CVE-2024-7748,0,0,19a9780c8c3e3580e0507d6a06dfe151328aa44e58ebe3ad1d40e684712edce7,2024-08-15T17:22:53.340000
|
||||
CVE-2024-7749,0,0,b1dd92bb0312fc7ae82ed3bd4baca9ef6dbf65c2cbb7e0f4fc4cc1353892f66e,2024-08-15T17:23:28.410000
|
||||
@ -260795,7 +260799,7 @@ CVE-2024-7905,0,0,21f9c7e0a38dacbbd12a6dfd1c594b7e02a0285538c8d01b6b02b4c01004d2
|
||||
CVE-2024-7906,0,0,5925ebd1a52432bd63b3f19ac1ead0d4887664fec659899d48bbaa77d66a321d,2024-08-19T12:59:59.177000
|
||||
CVE-2024-7907,0,0,827448a6d782832b90e0dd3114804655fe12e38aa269495431146155f04a25e9,2024-08-19T18:53:05.753000
|
||||
CVE-2024-7908,0,0,1704b05a8eab2513be21f00da86f5d343c3177e7c40e6732dc94cca77c757036,2024-08-19T18:51:45.210000
|
||||
CVE-2024-7909,0,1,40f7aff5d4e7669f2f16671b680f3fd5a01c5b2e923d87f6df868e1cdd6fdef1,2024-08-21T19:15:13.487000
|
||||
CVE-2024-7909,0,0,40f7aff5d4e7669f2f16671b680f3fd5a01c5b2e923d87f6df868e1cdd6fdef1,2024-08-21T19:15:13.487000
|
||||
CVE-2024-7910,0,0,dddecbe9efccf1f397282c79f0ba4716c91b37bb24bbae91fa6ba76ac0a217be,2024-08-19T18:49:49.110000
|
||||
CVE-2024-7911,0,0,859a4ab2d69fd8051484705c8ccd7b2fca36f9fd16b342bf7a32ac0026ea24e4,2024-08-19T18:48:06.527000
|
||||
CVE-2024-7912,0,0,d022e995569549791df9628a3255ea9ef44a2cde43358affb6b230c8e7dbab8f,2024-08-19T16:16:10.667000
|
||||
@ -260827,11 +260831,31 @@ CVE-2024-7945,0,0,d2428ee2dcd967452089d140ce94a2be4092f314afe3e103f6f27860690dc8
|
||||
CVE-2024-7946,0,0,55b44492c55caac843a1ad836ee11f9cccc3723d88087e17cb61194f5c694743,2024-08-21T13:55:24.780000
|
||||
CVE-2024-7947,0,0,65fb4d7d58134ef9bc023552b764ff03308d80cb6ca6d1287d9d812240a193e5,2024-08-21T13:53:38.750000
|
||||
CVE-2024-7948,0,0,10e56bd82889acf527e731295a76df26abf6e1bd128042058528282707ce870d,2024-08-21T13:52:38.057000
|
||||
CVE-2024-7949,0,1,64b957370c21ddcba0bc925ad861d01e09364475441bf650c2c5e65485084163,2024-08-21T19:15:13.600000
|
||||
CVE-2024-7949,0,0,64b957370c21ddcba0bc925ad861d01e09364475441bf650c2c5e65485084163,2024-08-21T19:15:13.600000
|
||||
CVE-2024-7958,0,0,483ea949f242fd0880547068782264d397026329e525a14dcbacca7c22e7bcec,2024-08-19T20:15:08.907000
|
||||
CVE-2024-7964,1,1,9014295bfa737365db03c76140b85acea72a0088e8ad3fabe43cc715bfac85c2,2024-08-21T21:15:08.850000
|
||||
CVE-2024-7965,1,1,df363051cdf71462e7b27d2de6c8715fb709398b47670690e50ceac5d2dcff0f,2024-08-21T21:15:08.947000
|
||||
CVE-2024-7966,1,1,1d4d143509e03a295d1ded12de008e968aedee0675838c46b063c3b83a98384b,2024-08-21T21:15:09
|
||||
CVE-2024-7967,1,1,b38b537ec961e442e115e4635187a1ea00b8a925de9396be0eba1b6f9775734a,2024-08-21T21:15:09.060000
|
||||
CVE-2024-7968,1,1,46b1bd903ff6a3f2725cc5936995eea33ccda0a825f39fe616abb2a9a3640732,2024-08-21T21:15:09.133000
|
||||
CVE-2024-7969,1,1,85f45cdb050f1db59b146eee74944739f360e35d21cb4a7d27b5551e24ab7cae,2024-08-21T21:15:09.203000
|
||||
CVE-2024-7971,1,1,94b4ea0d2e8cfdf1328cdfa0fb3549d37e85aadf235db419a3d3dfde073aa944,2024-08-21T21:15:09.277000
|
||||
CVE-2024-7972,1,1,757d12ce9d884d45dbc40f5bb22d028bda6011f93037db0945b662ece6a14451,2024-08-21T21:15:09.353000
|
||||
CVE-2024-7973,1,1,7bbfedcd4a7d1d83329b497ab1f5b6ccf2d7831c7718786de198ec9a742d3dcc,2024-08-21T21:15:09.407000
|
||||
CVE-2024-7974,1,1,24cae8bf4c54d5222499be0e66843f2c59e61d076c00bcc309f864b6615fecbe,2024-08-21T21:15:09.480000
|
||||
CVE-2024-7975,1,1,cae32fa42668d1b0b0aae07539aa477dc9899deee4ebec57be1192e9236ea386,2024-08-21T21:15:09.533000
|
||||
CVE-2024-7976,1,1,9025ff5fc9a54ee7291fd41a06bbae491b88fd29a7edf66b167242b28536ea14,2024-08-21T21:15:09.583000
|
||||
CVE-2024-7977,1,1,5f25d332e28e2bc714c75f784b41c8da7428c693b68b7f9b76cedc2e8c467bc1,2024-08-21T21:15:09.630000
|
||||
CVE-2024-7978,1,1,f315d5e0f2085ec15ff1b778e7288fc00cb59ac54109e65c8c2a3de44032f92c,2024-08-21T21:15:09.697000
|
||||
CVE-2024-7979,1,1,6ad4018d30c05da7c71962208723a13aab1fc847ad71a5511d9645aaab228adc,2024-08-21T21:15:09.747000
|
||||
CVE-2024-7980,1,1,d16778e8145a5adbe6047e6e1fc9db078966060b653e5b609a27fad5b1b8ac9f,2024-08-21T21:15:09.793000
|
||||
CVE-2024-7981,1,1,39c79a9cd553be141c9f213efb8cac2f10198a869d0a9669579c3b630dd4be2b,2024-08-21T21:15:09.843000
|
||||
CVE-2024-7998,0,0,8aa3505a1b6ed462573d7b65c55c5633ff88a81168885ae03bec6b1db69a2167,2024-08-21T12:30:33.697000
|
||||
CVE-2024-8003,0,0,1eb6cc8bd16248d54ed281136e233da0a723cb74879af6e3337c9532a3caf8e1,2024-08-21T15:51:28.397000
|
||||
CVE-2024-8005,0,0,c059370cb975aea915e5671e32cb80d879151797480dbd5423b1593aeba96675,2024-08-21T15:49:59.470000
|
||||
CVE-2024-8007,0,0,d227b03f895ef761f269cb1491d7d5722db05e40b51b1467b77f2f84ee5beceb,2024-08-21T16:06:23.153000
|
||||
CVE-2024-8022,0,0,469d074c70ed4d6e1b7ca7023005d3bb3e3f23419b5a39b3540fd69e34fadcaa,2024-08-21T12:30:33.697000
|
||||
CVE-2024-8023,0,0,7f1c10536d9d4e1a728f09b10c1ff35f77d0bba503a7c61c411fbfd5f6584d46,2024-08-21T12:30:33.697000
|
||||
CVE-2024-8033,1,1,474ca8870cf9b670510d19eed5c14882ceb4bd6ad7995e7e63bce94de964db02,2024-08-21T21:15:09.897000
|
||||
CVE-2024-8034,1,1,c526cc05681ad2481b0574f11b49e00d365c3d4553e9a0575b545dc17a3804a9,2024-08-21T21:15:09.957000
|
||||
CVE-2024-8035,1,1,38022f95d3472be828d03744ae35827b794523de6d3705a1f92311c7c8b00c33,2024-08-21T21:15:10.010000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user