mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
Auto-Update: 2024-11-06T23:00:20.311060+00:00
This commit is contained in:
parent
43ca830a78
commit
5579586833
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2021-47075",
|
"id": "CVE-2021-47075",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2024-03-01T22:15:47.170",
|
"published": "2024-03-01T22:15:47.170",
|
||||||
"lastModified": "2024-03-01T22:22:25.913",
|
"lastModified": "2024-11-06T22:35:00.660",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,30 @@
|
|||||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: nvmet: repara la p\u00e9rdida de memoria en nvmet_alloc_ctrl() Al crear ctrl en nvmet_alloc_ctrl(), si cntlid_min es mayor que cntlid_max del subsistema y salta a la etiqueta \"out_free_changed_ns_list\", pero el ctrl->sqs falta para liberarse. Solucione este problema saltando a la etiqueta \"out_free_sqs\"."
|
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: nvmet: repara la p\u00e9rdida de memoria en nvmet_alloc_ctrl() Al crear ctrl en nvmet_alloc_ctrl(), si cntlid_min es mayor que cntlid_max del subsistema y salta a la etiqueta \"out_free_changed_ns_list\", pero el ctrl->sqs falta para liberarse. Solucione este problema saltando a la etiqueta \"out_free_sqs\"."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "LOW",
|
||||||
|
"baseScore": 5.3,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/4720f29acb3fe67aa8aa71e6b675b079d193aaeb",
|
"url": "https://git.kernel.org/stable/c/4720f29acb3fe67aa8aa71e6b675b079d193aaeb",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2023-40113",
|
"id": "CVE-2023-40113",
|
||||||
"sourceIdentifier": "security@android.com",
|
"sourceIdentifier": "security@android.com",
|
||||||
"published": "2024-02-15T23:15:08.597",
|
"published": "2024-02-15T23:15:08.597",
|
||||||
"lastModified": "2024-02-16T13:37:55.033",
|
"lastModified": "2024-11-06T21:35:01.543",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,30 @@
|
|||||||
"value": "En varias ubicaciones, existe una forma posible para que las aplicaciones accedan a datos de mensajes entre usuarios debido a una falta de verificaci\u00f3n de permiso. Esto podr\u00eda dar lugar a la divulgaci\u00f3n de informaci\u00f3n local sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n."
|
"value": "En varias ubicaciones, existe una forma posible para que las aplicaciones accedan a datos de mensajes entre usuarios debido a una falta de verificaci\u00f3n de permiso. Esto podr\u00eda dar lugar a la divulgaci\u00f3n de informaci\u00f3n local sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 5.5,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://android.googlesource.com/platform/packages/providers/TelephonyProvider/+/64ca6ba981745875dbf2064e0b2a47f8194c4f0a",
|
"url": "https://android.googlesource.com/platform/packages/providers/TelephonyProvider/+/64ca6ba981745875dbf2064e0b2a47f8194c4f0a",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2023-46049",
|
"id": "CVE-2023-46049",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-03-27T06:15:10.037",
|
"published": "2024-03-27T06:15:10.037",
|
||||||
"lastModified": "2024-08-02T21:15:49.197",
|
"lastModified": "2024-11-06T22:35:01.887",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [
|
"cveTags": [
|
||||||
{
|
{
|
||||||
@ -22,7 +22,42 @@
|
|||||||
"value": "LLVM 15.0.0 tiene una desreferencia de puntero NULL en la funci\u00f3n parseOneMetadata() a trav\u00e9s de un archivo pdflatex.fmt modificado (o quiz\u00e1s un archivo .o modificado) a llvm-lto. NOTA: esto est\u00e1 en disputa porque no se explica la relaci\u00f3n entre pdflatex.fmt y cualquier interfaz de lenguaje LLVM, y porque una falla de la aplicaci\u00f3n llvm-lto debe clasificarse como un problema de usabilidad."
|
"value": "LLVM 15.0.0 tiene una desreferencia de puntero NULL en la funci\u00f3n parseOneMetadata() a trav\u00e9s de un archivo pdflatex.fmt modificado (o quiz\u00e1s un archivo .o modificado) a llvm-lto. NOTA: esto est\u00e1 en disputa porque no se explica la relaci\u00f3n entre pdflatex.fmt y cualquier interfaz de lenguaje LLVM, y porque una falla de la aplicaci\u00f3n llvm-lto debe clasificarse como un problema de usabilidad."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 5.3,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-476"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "http://seclists.org/fulldisclosure/2024/Jan/66",
|
"url": "http://seclists.org/fulldisclosure/2024/Jan/66",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2023-52433",
|
"id": "CVE-2023-52433",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2024-02-20T13:15:08.140",
|
"published": "2024-02-20T13:15:08.140",
|
||||||
"lastModified": "2024-06-16T13:15:50.413",
|
"lastModified": "2024-11-06T22:35:02.950",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,42 @@
|
|||||||
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: netfilter: nft_set_rbtree: omitir sincronizaci\u00f3n GC para nuevos elementos en esta transacci\u00f3n los nuevos elementos en esta transacci\u00f3n pueden caducar antes de que finalice dicha transacci\u00f3n. Omita la sincronizaci\u00f3n del GC para dichos elementos; de lo contrario, la ruta de confirmaci\u00f3n podr\u00eda pasar por encima de un objeto ya liberado. Una vez finalizada la transacci\u00f3n, async GC recopilar\u00e1 dicho elemento caducado."
|
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: netfilter: nft_set_rbtree: omitir sincronizaci\u00f3n GC para nuevos elementos en esta transacci\u00f3n los nuevos elementos en esta transacci\u00f3n pueden caducar antes de que finalice dicha transacci\u00f3n. Omita la sincronizaci\u00f3n del GC para dichos elementos; de lo contrario, la ruta de confirmaci\u00f3n podr\u00eda pasar por encima de un objeto ya liberado. Una vez finalizada la transacci\u00f3n, async GC recopilar\u00e1 dicho elemento caducado."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 4.4,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 0.8,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-273"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/03caf75da1059f0460666c826e9f50e13dfd0017",
|
"url": "https://git.kernel.org/stable/c/03caf75da1059f0460666c826e9f50e13dfd0017",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2023-52618",
|
"id": "CVE-2023-52618",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2024-03-18T11:15:09.110",
|
"published": "2024-03-18T11:15:09.110",
|
||||||
"lastModified": "2024-11-04T13:16:41.660",
|
"lastModified": "2024-11-06T22:35:03.783",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,30 @@
|
|||||||
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: block/rnbd-srv: Comprueba si hay un desbordamiento de cadena improbable. Dado que \"dev_search_path\" t\u00e9cnicamente puede ser tan grande como PATH_MAX, exist\u00eda el riesgo de truncamiento al copiarlo y una segunda cadena en \" full_path\" ya que tambi\u00e9n ten\u00eda un tama\u00f1o PATH_MAX. Las compilaciones W=1 informaban esta advertencia: drivers/block/rnbd/rnbd-srv.c: En funci\u00f3n 'process_msg_open.isra': drivers/block/rnbd/rnbd-srv.c:616:51: advertencia: '% La salida de la directiva s se puede truncar escribiendo hasta 254 bytes en una regi\u00f3n de tama\u00f1o entre 0 y 4095 [-Wformat-truncation=] 616 | snprintf(full_path, PATH_MAX, \"%s/%s\", | ^~ En la funci\u00f3n 'rnbd_srv_get_full_path', insertada desde 'process_msg_open.isra' en drivers/block/rnbd/rnbd-srv.c:721:14: drivers/block /rnbd/rnbd-srv.c:616:17: nota: 'snprintf' genera entre 2 y 4351 bytes en un destino de tama\u00f1o 4096 616 | snprintf(full_path, PATH_MAX, \"%s/%s\", | ^~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 617 | dev_search_path, dev_name); | ~~~~~~~ ~~~~~~~~~~~~~~~~~~~ Para solucionar este problema, verifique incondicionalmente el truncamiento (como ya se hizo en el caso en el que \"%SESSNAME%\" estaba presente)."
|
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: block/rnbd-srv: Comprueba si hay un desbordamiento de cadena improbable. Dado que \"dev_search_path\" t\u00e9cnicamente puede ser tan grande como PATH_MAX, exist\u00eda el riesgo de truncamiento al copiarlo y una segunda cadena en \" full_path\" ya que tambi\u00e9n ten\u00eda un tama\u00f1o PATH_MAX. Las compilaciones W=1 informaban esta advertencia: drivers/block/rnbd/rnbd-srv.c: En funci\u00f3n 'process_msg_open.isra': drivers/block/rnbd/rnbd-srv.c:616:51: advertencia: '% La salida de la directiva s se puede truncar escribiendo hasta 254 bytes en una regi\u00f3n de tama\u00f1o entre 0 y 4095 [-Wformat-truncation=] 616 | snprintf(full_path, PATH_MAX, \"%s/%s\", | ^~ En la funci\u00f3n 'rnbd_srv_get_full_path', insertada desde 'process_msg_open.isra' en drivers/block/rnbd/rnbd-srv.c:721:14: drivers/block /rnbd/rnbd-srv.c:616:17: nota: 'snprintf' genera entre 2 y 4351 bytes en un destino de tama\u00f1o 4096 616 | snprintf(full_path, PATH_MAX, \"%s/%s\", | ^~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 617 | dev_search_path, dev_name); | ~~~~~~~ ~~~~~~~~~~~~~~~~~~~ Para solucionar este problema, verifique incondicionalmente el truncamiento (como ya se hizo en el caso en el que \"%SESSNAME%\" estaba presente)."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 5.3,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/5b9ea86e662035a886ccb5c76d56793cba618827",
|
"url": "https://git.kernel.org/stable/c/5b9ea86e662035a886ccb5c76d56793cba618827",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2023-52684",
|
"id": "CVE-2023-52684",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2024-05-17T15:15:19.583",
|
"published": "2024-05-17T15:15:19.583",
|
||||||
"lastModified": "2024-05-17T18:35:35.070",
|
"lastModified": "2024-11-06T21:35:01.813",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,30 @@
|
|||||||
"value": " En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: firmware: qcom: qseecom: corrige p\u00e9rdidas de memoria en rutas de error Corrija instancias de devoluci\u00f3n de c\u00f3digos de error directamente en lugar de saltar a las etiquetas relevantes donde se liberar\u00eda la memoria asignada para las llamadas SCM."
|
"value": " En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: firmware: qcom: qseecom: corrige p\u00e9rdidas de memoria en rutas de error Corrija instancias de devoluci\u00f3n de c\u00f3digos de error directamente en lugar de saltar a las etiquetas relevantes donde se liberar\u00eda la memoria asignada para las llamadas SCM."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 5.5,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/6c57d7b593c4a4e60db65d5ce0fe1d9f79ccbe9b",
|
"url": "https://git.kernel.org/stable/c/6c57d7b593c4a4e60db65d5ce0fe1d9f79ccbe9b",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2023-52738",
|
"id": "CVE-2023-52738",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2024-05-21T16:15:13.740",
|
"published": "2024-05-21T16:15:13.740",
|
||||||
"lastModified": "2024-05-21T16:53:56.550",
|
"lastModified": "2024-11-06T21:35:02.090",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,30 @@
|
|||||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amdgpu/fence: se solucion\u00f3 el error debido a que drm_sched init/fini no coincide. Actualmente, amdgpu llama a drm_sched_fini() desde la rutina SW fini del controlador de valla; se espera que se llame a dicha funci\u00f3n. s\u00f3lo despu\u00e9s de que la funci\u00f3n de inicio respectiva, drm_sched_init(), se haya ejecutado correctamente. Sucede que recientemente nos enfrentamos a una falla en la sonda del controlador en Steam Deck, y se llam\u00f3 a la funci\u00f3n drm_sched_fini() incluso sin que su contraparte se hubiera llamado previamente, lo que provoc\u00f3 el siguiente error: amdgpu: la sonda de 0000:04:00.0 fall\u00f3 con error -110 ERROR: desreferencia del puntero NULL del kernel, direcci\u00f3n: 0000000000000090 PGD 0 P4D 0 Ups: 0002 [#1] PREEMPT SMP NOPTI CPU: 0 PID: 609 Comm: systemd-udevd No contaminado 6.2.0-rc3-gpiccoli #338 Nombre del hardware : Valve Jupiter/Jupiter, BIOS F7A0113 04/11/2022 RIP: 0010:drm_sched_fini+0x84/0xa0 [gpu_sched] [...] Seguimiento de llamadas: amdgpu_fence_driver_sw_fini+0xc8/0xd0 [amdgpu] amdgpu_device_fini_sw+0x2b/0x3b0 [ amdgpu] amdgpu_driver_release_kms+0x16/0x30 [amdgpu] devm_drm_dev_init_release+0x49/0x70 [...] Para evitar eso, verifique si drm_sched se inicializ\u00f3 correctamente para un anillo determinado antes de llamar a su contraparte fini. Observe que idealmente usar\u00edamos sched.ready para eso; dicho campo se establece como lo \u00faltimo en drm_sched_init(). Pero amdgpu parece \"sobreescribir\" el significado de dicho campo; en el ejemplo anterior, por ejemplo, fue un anillo GFX el que provoc\u00f3 el bloqueo y el campo sched.ready se configur\u00f3 en verdadero en la rutina de inicio del anillo, independientemente del estado de el programador DRM. Por lo tanto, terminamos usando sched.ops seg\u00fan la sugerencia de Christian [0] y tambi\u00e9n eliminamos la verificaci\u00f3n no_scheduler [1]. [0] https://lore.kernel.org/amd-gfx/984ee981-2906-0eaf-ccec-9f80975cb136@amd.com/ [1] https://lore.kernel.org/amd-gfx/cd0e2994- f85f-d837-609f-7056d5fb7231@amd.com/"
|
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amdgpu/fence: se solucion\u00f3 el error debido a que drm_sched init/fini no coincide. Actualmente, amdgpu llama a drm_sched_fini() desde la rutina SW fini del controlador de valla; se espera que se llame a dicha funci\u00f3n. s\u00f3lo despu\u00e9s de que la funci\u00f3n de inicio respectiva, drm_sched_init(), se haya ejecutado correctamente. Sucede que recientemente nos enfrentamos a una falla en la sonda del controlador en Steam Deck, y se llam\u00f3 a la funci\u00f3n drm_sched_fini() incluso sin que su contraparte se hubiera llamado previamente, lo que provoc\u00f3 el siguiente error: amdgpu: la sonda de 0000:04:00.0 fall\u00f3 con error -110 ERROR: desreferencia del puntero NULL del kernel, direcci\u00f3n: 0000000000000090 PGD 0 P4D 0 Ups: 0002 [#1] PREEMPT SMP NOPTI CPU: 0 PID: 609 Comm: systemd-udevd No contaminado 6.2.0-rc3-gpiccoli #338 Nombre del hardware : Valve Jupiter/Jupiter, BIOS F7A0113 04/11/2022 RIP: 0010:drm_sched_fini+0x84/0xa0 [gpu_sched] [...] Seguimiento de llamadas: amdgpu_fence_driver_sw_fini+0xc8/0xd0 [amdgpu] amdgpu_device_fini_sw+0x2b/0x3b0 [ amdgpu] amdgpu_driver_release_kms+0x16/0x30 [amdgpu] devm_drm_dev_init_release+0x49/0x70 [...] Para evitar eso, verifique si drm_sched se inicializ\u00f3 correctamente para un anillo determinado antes de llamar a su contraparte fini. Observe que idealmente usar\u00edamos sched.ready para eso; dicho campo se establece como lo \u00faltimo en drm_sched_init(). Pero amdgpu parece \"sobreescribir\" el significado de dicho campo; en el ejemplo anterior, por ejemplo, fue un anillo GFX el que provoc\u00f3 el bloqueo y el campo sched.ready se configur\u00f3 en verdadero en la rutina de inicio del anillo, independientemente del estado de el programador DRM. Por lo tanto, terminamos usando sched.ops seg\u00fan la sugerencia de Christian [0] y tambi\u00e9n eliminamos la verificaci\u00f3n no_scheduler [1]. [0] https://lore.kernel.org/amd-gfx/984ee981-2906-0eaf-ccec-9f80975cb136@amd.com/ [1] https://lore.kernel.org/amd-gfx/cd0e2994- f85f-d837-609f-7056d5fb7231@amd.com/"
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "LOW",
|
||||||
|
"baseScore": 5.3,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/2bcbbef9cace772f5b7128b11401c515982de34b",
|
"url": "https://git.kernel.org/stable/c/2bcbbef9cace772f5b7128b11401c515982de34b",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-10122",
|
"id": "CVE-2024-10122",
|
||||||
"sourceIdentifier": "cna@vuldb.com",
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
"published": "2024-10-18T19:15:13.990",
|
"published": "2024-10-18T19:15:13.990",
|
||||||
"lastModified": "2024-10-21T17:10:22.857",
|
"lastModified": "2024-11-06T22:05:23.700",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -61,6 +61,26 @@
|
|||||||
}
|
}
|
||||||
],
|
],
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 4.9,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.2,
|
||||||
|
"impactScore": 3.6
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "cna@vuldb.com",
|
"source": "cna@vuldb.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -120,18 +140,44 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?ctiid.280914",
|
"nodes": [
|
||||||
"source": "cna@vuldb.com"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?id.280914",
|
"operator": "OR",
|
||||||
"source": "cna@vuldb.com"
|
"negate": false,
|
||||||
},
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?submit.421292",
|
"vulnerable": true,
|
||||||
"source": "cna@vuldb.com"
|
"criteria": "cpe:2.3:a:topdata:inner_rep_plus:2.01:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "1EBD086E-B71F-47DC-B335-0228F1EB61FF"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?ctiid.280914",
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Permissions Required"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?id.280914",
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?submit.421292",
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,13 +2,17 @@
|
|||||||
"id": "CVE-2024-10840",
|
"id": "CVE-2024-10840",
|
||||||
"sourceIdentifier": "cna@vuldb.com",
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
"published": "2024-11-05T13:15:03.443",
|
"published": "2024-11-05T13:15:03.443",
|
||||||
"lastModified": "2024-11-05T16:04:26.053",
|
"lastModified": "2024-11-06T22:49:12.173",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "A vulnerability classified as problematic has been found in romadebrian WEB-Sekolah 1.0. Affected is an unknown function of the file /Admin/akun_edit.php of the component Backend. The manipulation of the argument kode leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
|
"value": "A vulnerability classified as problematic has been found in romadebrian WEB-Sekolah 1.0. Affected is an unknown function of the file /Admin/akun_edit.php of the component Backend. The manipulation of the argument kode leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": " Se ha encontrado una vulnerabilidad clasificada como problem\u00e1tica en romadebrian WEB-Sekolah 1.0. Se trata de una funci\u00f3n desconocida del archivo /Admin/akun_edit.php del componente Backend. La manipulaci\u00f3n del argumento kode provoca ataques de Cross Site Scripting. Es posible lanzar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
@ -57,6 +61,26 @@
|
|||||||
}
|
}
|
||||||
],
|
],
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 4.8,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.7,
|
||||||
|
"impactScore": 2.7
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "cna@vuldb.com",
|
"source": "cna@vuldb.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -106,8 +130,18 @@
|
|||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
{
|
{
|
||||||
"source": "cna@vuldb.com",
|
"source": "nvd@nist.gov",
|
||||||
"type": "Primary",
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
@ -124,18 +158,44 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/2537463005/a/blob/main/WEB-Sekolah%E5%90%8E%E5%8F%B0%E5%AD%98%E5%82%A8%E5%9E%8Bxss.md",
|
"nodes": [
|
||||||
"source": "cna@vuldb.com"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?ctiid.283086",
|
"operator": "OR",
|
||||||
"source": "cna@vuldb.com"
|
"negate": false,
|
||||||
},
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?id.283086",
|
"vulnerable": true,
|
||||||
"source": "cna@vuldb.com"
|
"criteria": "cpe:2.3:a:romadebrian:web-sekolah:1.0:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "4AB95C15-C1D8-47EC-96B6-D38DD31920B3"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/2537463005/a/blob/main/WEB-Sekolah%E5%90%8E%E5%8F%B0%E5%AD%98%E5%82%A8%E5%9E%8Bxss.md",
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Exploit"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?ctiid.283086",
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Permissions Required"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?id.283086",
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,13 +2,17 @@
|
|||||||
"id": "CVE-2024-10841",
|
"id": "CVE-2024-10841",
|
||||||
"sourceIdentifier": "cna@vuldb.com",
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
"published": "2024-11-05T14:15:14.220",
|
"published": "2024-11-05T14:15:14.220",
|
||||||
"lastModified": "2024-11-05T16:04:26.053",
|
"lastModified": "2024-11-06T22:50:24.277",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "A vulnerability classified as critical was found in romadebrian WEB-Sekolah 1.0. Affected by this vulnerability is an unknown functionality of the file /Proses_Kirim.php of the component Mail Handler. The manipulation of the argument Name leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well."
|
"value": "A vulnerability classified as critical was found in romadebrian WEB-Sekolah 1.0. Affected by this vulnerability is an unknown functionality of the file /Proses_Kirim.php of the component Mail Handler. The manipulation of the argument Name leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "En la versi\u00f3n romadebrian WEB-Sekolah 1.0 se ha detectado una vulnerabilidad clasificada como cr\u00edtica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /Proses_Kirim.php del componente Mail Handler. La manipulaci\u00f3n del argumento Name provoca una inyecci\u00f3n SQL. El ataque se puede ejecutar de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Tambi\u00e9n pueden verse afectados otros par\u00e1metros."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
@ -57,6 +61,26 @@
|
|||||||
}
|
}
|
||||||
],
|
],
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 8.0,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.1,
|
||||||
|
"impactScore": 5.9
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "cna@vuldb.com",
|
"source": "cna@vuldb.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -106,8 +130,18 @@
|
|||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
{
|
{
|
||||||
"source": "cna@vuldb.com",
|
"source": "nvd@nist.gov",
|
||||||
"type": "Primary",
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-89"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
@ -124,18 +158,47 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/2537463005/a/blob/main/WEB-Sekolah%E5%90%8E%E5%8F%B0%E5%AD%98%E5%82%A8%E5%9E%8Bxss.md",
|
"nodes": [
|
||||||
"source": "cna@vuldb.com"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?ctiid.283087",
|
"operator": "OR",
|
||||||
"source": "cna@vuldb.com"
|
"negate": false,
|
||||||
},
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?id.283087",
|
"vulnerable": true,
|
||||||
"source": "cna@vuldb.com"
|
"criteria": "cpe:2.3:a:romadebrian:web-sekolah:1.0:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "4AB95C15-C1D8-47EC-96B6-D38DD31920B3"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/2537463005/a/blob/main/WEB-Sekolah%E5%90%8E%E5%8F%B0%E5%AD%98%E5%82%A8%E5%9E%8Bxss.md",
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?ctiid.283087",
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Permissions Required",
|
||||||
|
"VDB Entry"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?id.283087",
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory",
|
||||||
|
"VDB Entry"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,13 +2,17 @@
|
|||||||
"id": "CVE-2024-10842",
|
"id": "CVE-2024-10842",
|
||||||
"sourceIdentifier": "cna@vuldb.com",
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
"published": "2024-11-05T14:15:14.543",
|
"published": "2024-11-05T14:15:14.543",
|
||||||
"lastModified": "2024-11-05T16:04:26.053",
|
"lastModified": "2024-11-06T22:43:19.327",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "A vulnerability, which was classified as problematic, has been found in romadebrian WEB-Sekolah 1.0. Affected by this issue is some unknown functionality of the file /Admin/Proses_Edit_Akun.php of the component Backend. The manipulation of the argument Username_Baru/Password leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
|
"value": "A vulnerability, which was classified as problematic, has been found in romadebrian WEB-Sekolah 1.0. Affected by this issue is some unknown functionality of the file /Admin/Proses_Edit_Akun.php of the component Backend. The manipulation of the argument Username_Baru/Password leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": " Se ha encontrado una vulnerabilidad clasificada como problem\u00e1tica en romadebrian WEB-Sekolah 1.0. Este problema afecta a una funcionalidad desconocida del archivo /Admin/Proses_Edit_Akun.php del componente Backend. La manipulaci\u00f3n del argumento Username_Baru/Password provoca Cross Site Scripting. El ataque puede ejecutarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
@ -57,6 +61,26 @@
|
|||||||
}
|
}
|
||||||
],
|
],
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 4.8,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.7,
|
||||||
|
"impactScore": 2.7
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "cna@vuldb.com",
|
"source": "cna@vuldb.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -106,8 +130,18 @@
|
|||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
{
|
{
|
||||||
"source": "cna@vuldb.com",
|
"source": "nvd@nist.gov",
|
||||||
"type": "Primary",
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
@ -124,22 +158,52 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/2537463005/a/blob/main/WEB-Sekolah%E5%90%8E%E5%8F%B0%E5%AD%98%E5%82%A8%E5%9E%8Bxss.md",
|
"nodes": [
|
||||||
"source": "cna@vuldb.com"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?ctiid.283088",
|
"operator": "OR",
|
||||||
"source": "cna@vuldb.com"
|
"negate": false,
|
||||||
},
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?id.283088",
|
"vulnerable": true,
|
||||||
"source": "cna@vuldb.com"
|
"criteria": "cpe:2.3:a:romadebrian:web-sekolah:1.0:*:*:*:*:*:*:*",
|
||||||
},
|
"matchCriteriaId": "4AB95C15-C1D8-47EC-96B6-D38DD31920B3"
|
||||||
{
|
}
|
||||||
"url": "https://vuldb.com/?submit.429558",
|
]
|
||||||
"source": "cna@vuldb.com"
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/2537463005/a/blob/main/WEB-Sekolah%E5%90%8E%E5%8F%B0%E5%AD%98%E5%82%A8%E5%9E%8Bxss.md",
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?ctiid.283088",
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Permissions Required"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?id.283088",
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?submit.429558",
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,13 +2,17 @@
|
|||||||
"id": "CVE-2024-10844",
|
"id": "CVE-2024-10844",
|
||||||
"sourceIdentifier": "cna@vuldb.com",
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
"published": "2024-11-05T15:15:22.337",
|
"published": "2024-11-05T15:15:22.337",
|
||||||
"lastModified": "2024-11-05T16:04:26.053",
|
"lastModified": "2024-11-06T22:38:13.800",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "A vulnerability, which was classified as critical, was found in 1000 Projects Bookstore Management System 1.0. This affects an unknown part of the file search.php. The manipulation of the argument s leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
|
"value": "A vulnerability, which was classified as critical, was found in 1000 Projects Bookstore Management System 1.0. This affects an unknown part of the file search.php. The manipulation of the argument s leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en 1000 Projects Bookstore Management System 1.0. Afecta a una parte desconocida del archivo search.php. La manipulaci\u00f3n del argumento s provoca una inyecci\u00f3n SQL. Es posible iniciar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
@ -57,6 +61,26 @@
|
|||||||
}
|
}
|
||||||
],
|
],
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 9.8,
|
||||||
|
"baseSeverity": "CRITICAL"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 5.9
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "cna@vuldb.com",
|
"source": "cna@vuldb.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -106,8 +130,18 @@
|
|||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
{
|
{
|
||||||
"source": "cna@vuldb.com",
|
"source": "nvd@nist.gov",
|
||||||
"type": "Primary",
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-89"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
@ -124,22 +158,52 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/sbm-98/CVE/issues/1",
|
"nodes": [
|
||||||
"source": "cna@vuldb.com"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?ctiid.283089",
|
"operator": "OR",
|
||||||
"source": "cna@vuldb.com"
|
"negate": false,
|
||||||
},
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?id.283089",
|
"vulnerable": true,
|
||||||
"source": "cna@vuldb.com"
|
"criteria": "cpe:2.3:a:bookstore_management_system_project:bookstore_management_system:1.0:*:*:*:*:*:*:*",
|
||||||
},
|
"matchCriteriaId": "BE1C0C4B-D037-42DD-8505-68508274BC10"
|
||||||
{
|
}
|
||||||
"url": "https://vuldb.com/?submit.436969",
|
]
|
||||||
"source": "cna@vuldb.com"
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/sbm-98/CVE/issues/1",
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?ctiid.283089",
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Permissions Required"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?id.283089",
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?submit.436969",
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,13 +2,17 @@
|
|||||||
"id": "CVE-2024-10845",
|
"id": "CVE-2024-10845",
|
||||||
"sourceIdentifier": "cna@vuldb.com",
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
"published": "2024-11-05T15:15:22.620",
|
"published": "2024-11-05T15:15:22.620",
|
||||||
"lastModified": "2024-11-05T16:04:26.053",
|
"lastModified": "2024-11-06T22:38:03.347",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "A vulnerability has been found in 1000 Projects Bookstore Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file book_detail.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
|
"value": "A vulnerability has been found in 1000 Projects Bookstore Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file book_detail.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": " Se ha encontrado una vulnerabilidad en 1000 Projects Bookstore Management System 1.0 y se ha clasificado como cr\u00edtica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo book_detail.php. La manipulaci\u00f3n del argumento id provoca una inyecci\u00f3n SQL. El ataque puede iniciarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
@ -57,6 +61,26 @@
|
|||||||
}
|
}
|
||||||
],
|
],
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 9.8,
|
||||||
|
"baseSeverity": "CRITICAL"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 5.9
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "cna@vuldb.com",
|
"source": "cna@vuldb.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -105,6 +129,16 @@
|
|||||||
]
|
]
|
||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-89"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "cna@vuldb.com",
|
"source": "cna@vuldb.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -124,22 +158,55 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/hbuzs/CVE/issues/3",
|
"nodes": [
|
||||||
"source": "cna@vuldb.com"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?ctiid.283090",
|
"operator": "OR",
|
||||||
"source": "cna@vuldb.com"
|
"negate": false,
|
||||||
},
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?id.283090",
|
"vulnerable": true,
|
||||||
"source": "cna@vuldb.com"
|
"criteria": "cpe:2.3:a:bookstore_management_system_project:bookstore_management_system:1.0:*:*:*:*:*:*:*",
|
||||||
},
|
"matchCriteriaId": "BE1C0C4B-D037-42DD-8505-68508274BC10"
|
||||||
{
|
}
|
||||||
"url": "https://vuldb.com/?submit.436999",
|
]
|
||||||
"source": "cna@vuldb.com"
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/hbuzs/CVE/issues/3",
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?ctiid.283090",
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Permissions Required",
|
||||||
|
"VDB Entry"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?id.283090",
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory",
|
||||||
|
"VDB Entry"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?submit.436999",
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory",
|
||||||
|
"VDB Entry"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
141
CVE-2024/CVE-2024-109xx/CVE-2024-10926.json
Normal file
141
CVE-2024/CVE-2024-109xx/CVE-2024-10926.json
Normal file
@ -0,0 +1,141 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-10926",
|
||||||
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
|
"published": "2024-11-06T21:15:04.927",
|
||||||
|
"lastModified": "2024-11-06T21:15:04.927",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A vulnerability was found in IBPhoenix ibWebAdmin up to 1.0.2 and classified as problematic. This issue affects some unknown processing of the file /toggle_fold_panel.php of the component Tabelas Section. The manipulation of the argument p leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV40": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "4.0",
|
||||||
|
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"attackRequirements": "NONE",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"vulnerableSystemConfidentiality": "NONE",
|
||||||
|
"vulnerableSystemIntegrity": "LOW",
|
||||||
|
"vulnerableSystemAvailability": "NONE",
|
||||||
|
"subsequentSystemConfidentiality": "NONE",
|
||||||
|
"subsequentSystemIntegrity": "NONE",
|
||||||
|
"subsequentSystemAvailability": "NONE",
|
||||||
|
"exploitMaturity": "NOT_DEFINED",
|
||||||
|
"confidentialityRequirements": "NOT_DEFINED",
|
||||||
|
"integrityRequirements": "NOT_DEFINED",
|
||||||
|
"availabilityRequirements": "NOT_DEFINED",
|
||||||
|
"modifiedAttackVector": "NOT_DEFINED",
|
||||||
|
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||||
|
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||||
|
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||||
|
"modifiedUserInteraction": "NOT_DEFINED",
|
||||||
|
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||||
|
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||||
|
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||||
|
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||||
|
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||||
|
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||||
|
"safety": "NOT_DEFINED",
|
||||||
|
"automatable": "NOT_DEFINED",
|
||||||
|
"recovery": "NOT_DEFINED",
|
||||||
|
"valueDensity": "NOT_DEFINED",
|
||||||
|
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||||
|
"providerUrgency": "NOT_DEFINED",
|
||||||
|
"baseScore": 5.3,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 3.5,
|
||||||
|
"baseSeverity": "LOW"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.1,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV2": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "2.0",
|
||||||
|
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
|
||||||
|
"accessVector": "NETWORK",
|
||||||
|
"accessComplexity": "LOW",
|
||||||
|
"authentication": "SINGLE",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "PARTIAL",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 4.0
|
||||||
|
},
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"exploitabilityScore": 8.0,
|
||||||
|
"impactScore": 2.9,
|
||||||
|
"acInsufInfo": false,
|
||||||
|
"obtainAllPrivilege": false,
|
||||||
|
"obtainUserPrivilege": false,
|
||||||
|
"obtainOtherPrivilege": false,
|
||||||
|
"userInteractionRequired": false
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-74"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://docs.google.com/document/d/1h9LlTV1FVvOSDBWc7qwU_5qcboCKd6H99Oqg3rZdBRQ/edit?usp=sharing",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?ctiid.283325",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?id.283325",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?submit.429635",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
29
CVE-2024/CVE-2024-109xx/CVE-2024-10941.json
Normal file
29
CVE-2024/CVE-2024-109xx/CVE-2024-10941.json
Normal file
@ -0,0 +1,29 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-10941",
|
||||||
|
"sourceIdentifier": "security@mozilla.org",
|
||||||
|
"published": "2024-11-06T21:15:05.213",
|
||||||
|
"lastModified": "2024-11-06T21:15:05.213",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A malicious website could have included an iframe with an malformed URI resulting in a non-exploitable browser crash. This vulnerability affects Firefox < 126."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1880879",
|
||||||
|
"source": "security@mozilla.org"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1887614",
|
||||||
|
"source": "security@mozilla.org"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.mozilla.org/security/advisories/mfsa2024-21/",
|
||||||
|
"source": "security@mozilla.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-21249",
|
"id": "CVE-2024-21249",
|
||||||
"sourceIdentifier": "secalert_us@oracle.com",
|
"sourceIdentifier": "secalert_us@oracle.com",
|
||||||
"published": "2024-10-15T20:15:14.880",
|
"published": "2024-10-15T20:15:14.880",
|
||||||
"lastModified": "2024-10-31T15:35:25.647",
|
"lastModified": "2024-11-06T22:53:50.587",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -40,6 +40,16 @@
|
|||||||
]
|
]
|
||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "NVD-CWE-noinfo"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -51,10 +61,30 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html",
|
"nodes": [
|
||||||
"source": "secalert_us@oracle.com"
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:oracle:peoplesoft_enterprise_fin_expenses:9.2:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "38221C8A-6D2C-47F1-A222-B42472AB7F5A"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html",
|
||||||
|
"source": "secalert_us@oracle.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-21250",
|
"id": "CVE-2024-21250",
|
||||||
"sourceIdentifier": "secalert_us@oracle.com",
|
"sourceIdentifier": "secalert_us@oracle.com",
|
||||||
"published": "2024-10-15T20:15:15.063",
|
"published": "2024-10-15T20:15:15.063",
|
||||||
"lastModified": "2024-10-17T14:35:19.303",
|
"lastModified": "2024-11-06T22:54:57.887",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -40,6 +40,16 @@
|
|||||||
]
|
]
|
||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "NVD-CWE-noinfo"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -51,10 +61,35 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html",
|
"nodes": [
|
||||||
"source": "secalert_us@oracle.com"
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:oracle:process_manufacturing_product_development:12.2.13:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "A520C6E9-1006-43E6-98C2-332C89E398CC"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:oracle:process_manufacturing_product_development:12.2.14:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "137E4B4C-5286-445E-B347-B5D5BEBFAA23"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html",
|
||||||
|
"source": "secalert_us@oracle.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-21257",
|
"id": "CVE-2024-21257",
|
||||||
"sourceIdentifier": "secalert_us@oracle.com",
|
"sourceIdentifier": "secalert_us@oracle.com",
|
||||||
"published": "2024-10-15T20:15:16.220",
|
"published": "2024-10-15T20:15:16.220",
|
||||||
"lastModified": "2024-10-16T16:38:43.170",
|
"lastModified": "2024-11-06T22:55:18.400",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -39,10 +39,42 @@
|
|||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"references": [
|
"weaknesses": [
|
||||||
{
|
{
|
||||||
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html",
|
"source": "nvd@nist.gov",
|
||||||
"source": "secalert_us@oracle.com"
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "NVD-CWE-noinfo"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:oracle:hyperion_bi\\+:11.2.18.0.000:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "8EC21BCB-FA89-475B-9A33-108FF5363829"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html",
|
||||||
|
"source": "secalert_us@oracle.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-21258",
|
"id": "CVE-2024-21258",
|
||||||
"sourceIdentifier": "secalert_us@oracle.com",
|
"sourceIdentifier": "secalert_us@oracle.com",
|
||||||
"published": "2024-10-15T20:15:16.410",
|
"published": "2024-10-15T20:15:16.410",
|
||||||
"lastModified": "2024-10-16T16:38:43.170",
|
"lastModified": "2024-11-06T22:56:19.527",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -40,6 +40,16 @@
|
|||||||
]
|
]
|
||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "NVD-CWE-noinfo"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -51,10 +61,32 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html",
|
"nodes": [
|
||||||
"source": "secalert_us@oracle.com"
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:oracle:installed_base:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "12.2.3",
|
||||||
|
"versionEndIncluding": "12.2.14",
|
||||||
|
"matchCriteriaId": "4F2A7D80-68E3-4AAA-BD96-CE108A5CB0C6"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html",
|
||||||
|
"source": "secalert_us@oracle.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-21264",
|
"id": "CVE-2024-21264",
|
||||||
"sourceIdentifier": "secalert_us@oracle.com",
|
"sourceIdentifier": "secalert_us@oracle.com",
|
||||||
"published": "2024-10-15T20:15:17.533",
|
"published": "2024-10-15T20:15:17.533",
|
||||||
"lastModified": "2024-10-16T16:38:43.170",
|
"lastModified": "2024-11-06T22:56:41.647",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -17,6 +17,26 @@
|
|||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 5.4,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 2.5
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "secalert_us@oracle.com",
|
"source": "secalert_us@oracle.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -39,10 +59,42 @@
|
|||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"references": [
|
"weaknesses": [
|
||||||
{
|
{
|
||||||
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html",
|
"source": "nvd@nist.gov",
|
||||||
"source": "secalert_us@oracle.com"
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "NVD-CWE-noinfo"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:oracle:peoplesoft_enterprise_cost_center_common_application_objects:9.2:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "D30BE00A-198B-4398-9404-BEA9D255B554"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html",
|
||||||
|
"source": "secalert_us@oracle.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-22013",
|
"id": "CVE-2024-22013",
|
||||||
"sourceIdentifier": "dsap-vuln-management@google.com",
|
"sourceIdentifier": "dsap-vuln-management@google.com",
|
||||||
"published": "2024-09-16T20:15:45.743",
|
"published": "2024-09-16T20:15:45.743",
|
||||||
"lastModified": "2024-09-20T12:31:20.110",
|
"lastModified": "2024-11-06T21:35:02.500",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,30 @@
|
|||||||
"value": "El entorno U-Boot se lee desde una partici\u00f3n no autenticada."
|
"value": "El entorno U-Boot se lee desde una partici\u00f3n no autenticada."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 5.3,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://support.google.com/product-documentation/answer/14950962?hl=en&ref_topic=12974021&sjid=9595902703262170957-NA#zippy=%2Cwifi",
|
"url": "https://support.google.com/product-documentation/answer/14950962?hl=en&ref_topic=12974021&sjid=9595902703262170957-NA#zippy=%2Cwifi",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-23560",
|
"id": "CVE-2024-23560",
|
||||||
"sourceIdentifier": "psirt@hcl.com",
|
"sourceIdentifier": "psirt@hcl.com",
|
||||||
"published": "2024-04-15T20:15:10.873",
|
"published": "2024-04-15T20:15:10.873",
|
||||||
"lastModified": "2024-04-16T13:24:07.103",
|
"lastModified": "2024-11-06T22:35:04.240",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -39,6 +39,18 @@
|
|||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-281"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0111925",
|
"url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0111925",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-26367",
|
"id": "CVE-2024-26367",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-05-14T16:16:22.863",
|
"published": "2024-05-14T16:16:22.863",
|
||||||
"lastModified": "2024-05-14T19:18:31.490",
|
"lastModified": "2024-11-06T21:35:02.850",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,42 @@
|
|||||||
"value": "Vulnerabilidad de Cross Site Scripting en Evertz microsystems MViP-II Firmware 8.6.5, XPS-EDGE-* Build 1467, evEDGE-EO-* Build 0029, MMA10G-* Build 0498, 570IPG-X19-10G Build 0691 permite que un atacante remoto ejecute c\u00f3digo arbitrario a trav\u00e9s de un payload manipulado para los par\u00e1metros de inicio de sesi\u00f3n."
|
"value": "Vulnerabilidad de Cross Site Scripting en Evertz microsystems MViP-II Firmware 8.6.5, XPS-EDGE-* Build 1467, evEDGE-EO-* Build 0029, MMA10G-* Build 0498, 570IPG-X19-10G Build 0691 permite que un atacante remoto ejecute c\u00f3digo arbitrario a trav\u00e9s de un payload manipulado para los par\u00e1metros de inicio de sesi\u00f3n."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 6.1,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 2.7
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "http://cc.com",
|
"url": "http://cc.com",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-26648",
|
"id": "CVE-2024-26648",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2024-03-26T18:15:10.220",
|
"published": "2024-03-26T18:15:10.220",
|
||||||
"lastModified": "2024-03-27T12:29:41.530",
|
"lastModified": "2024-11-06T22:35:04.950",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,30 @@
|
|||||||
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: drm/amd/display: se corrigi\u00f3 la diferenciaci\u00f3n de variables antes de la verificaci\u00f3n NULL en edp_setup_replay() En edp_setup_replay(), se elimin\u00f3 la referencia a 'struct dc *dc' y 'struct dmub_replay *replay' antes de la comprobaci\u00f3n NULL del puntero 'enlace' y 'repetici\u00f3n'. Corrige lo siguiente: drivers/gpu/drm/amd/amdgpu/../display/dc/link/protocols/link_edp_panel_control.c:947 edp_setup_replay() advertencia: variable desreferenciada antes de marcar 'enlace' (ver l\u00ednea 933)"
|
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: drm/amd/display: se corrigi\u00f3 la diferenciaci\u00f3n de variables antes de la verificaci\u00f3n NULL en edp_setup_replay() En edp_setup_replay(), se elimin\u00f3 la referencia a 'struct dc *dc' y 'struct dmub_replay *replay' antes de la comprobaci\u00f3n NULL del puntero 'enlace' y 'repetici\u00f3n'. Corrige lo siguiente: drivers/gpu/drm/amd/amdgpu/../display/dc/link/protocols/link_edp_panel_control.c:947 edp_setup_replay() advertencia: variable desreferenciada antes de marcar 'enlace' (ver l\u00ednea 933)"
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 5.5,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/22ae604aea14756954e1c00ae653e34d2afd2935",
|
"url": "https://git.kernel.org/stable/c/22ae604aea14756954e1c00ae653e34d2afd2935",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-26731",
|
"id": "CVE-2024-26731",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2024-04-03T17:15:50.927",
|
"published": "2024-04-03T17:15:50.927",
|
||||||
"lastModified": "2024-04-03T17:24:18.150",
|
"lastModified": "2024-11-06T22:35:05.197",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,42 @@
|
|||||||
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: bpf, sockmap: corrigi\u00f3 la desreferencia del puntero NULL en sk_psock_verdict_data_ready() syzbot inform\u00f3 el siguiente problema de desreferencia del puntero NULL [1]: ERROR: desreferencia del puntero NULL del kernel, direcci\u00f3n: 0000000000000000 [... ] RIP: 0010:0x0 [...] Seguimiento de llamadas: sk_psock_verdict_data_ready+0x232/0x340 net/core/skmsg.c:1230 unix_stream_sendmsg+0x9b4/0x1230 net/unix/af_unix.c:2293 sock_sendmsg_nosec net/socket. c:730 [en l\u00ednea] __sock_sendmsg+0x221/0x270 net/socket.c:745 ____sys_sendmsg+0x525/0x7d0 net/socket.c:2584 ___sys_sendmsg net/socket.c:2638 [en l\u00ednea] __sys_sendmsg+0x2b0/0x3a0 net /socket. c:2667 do_syscall_64+0xf9/0x240 Entry_SYSCALL_64_after_hwframe+0x6f/0x77 Si sk_psock_verdict_data_ready() y sk_psock_stop_verdict() se llaman simult\u00e1neamente, psock->saved_data_ready puede ser NULL, causando el problema anterior. Este parche soluciona este problema llamando a la funci\u00f3n de preparaci\u00f3n de datos adecuada utilizando el asistente sk_psock_data_ready() y protegi\u00e9ndola de la concurrencia con sk->sk_callback_lock."
|
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: bpf, sockmap: corrigi\u00f3 la desreferencia del puntero NULL en sk_psock_verdict_data_ready() syzbot inform\u00f3 el siguiente problema de desreferencia del puntero NULL [1]: ERROR: desreferencia del puntero NULL del kernel, direcci\u00f3n: 0000000000000000 [... ] RIP: 0010:0x0 [...] Seguimiento de llamadas: sk_psock_verdict_data_ready+0x232/0x340 net/core/skmsg.c:1230 unix_stream_sendmsg+0x9b4/0x1230 net/unix/af_unix.c:2293 sock_sendmsg_nosec net/socket. c:730 [en l\u00ednea] __sock_sendmsg+0x221/0x270 net/socket.c:745 ____sys_sendmsg+0x525/0x7d0 net/socket.c:2584 ___sys_sendmsg net/socket.c:2638 [en l\u00ednea] __sys_sendmsg+0x2b0/0x3a0 net /socket. c:2667 do_syscall_64+0xf9/0x240 Entry_SYSCALL_64_after_hwframe+0x6f/0x77 Si sk_psock_verdict_data_ready() y sk_psock_stop_verdict() se llaman simult\u00e1neamente, psock->saved_data_ready puede ser NULL, causando el problema anterior. Este parche soluciona este problema llamando a la funci\u00f3n de preparaci\u00f3n de datos adecuada utilizando el asistente sk_psock_data_ready() y protegi\u00e9ndola de la concurrencia con sk->sk_callback_lock."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "LOW",
|
||||||
|
"baseScore": 5.3,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-476"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/4588b13abcbd561ec67f5b3c1cb2eff690990a54",
|
"url": "https://git.kernel.org/stable/c/4588b13abcbd561ec67f5b3c1cb2eff690990a54",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-26744",
|
"id": "CVE-2024-26744",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2024-04-03T17:15:51.627",
|
"published": "2024-04-03T17:15:51.627",
|
||||||
"lastModified": "2024-11-05T10:15:46.253",
|
"lastModified": "2024-11-06T21:35:03.883",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,42 @@
|
|||||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: RDMA/srpt: admite la especificaci\u00f3n del par\u00e1metro srpt_service_guid. Hace que la carga de ib_srpt con este conjunto de par\u00e1metros funcione. El comportamiento actual es que configurar ese par\u00e1metro mientras se carga el m\u00f3dulo del kernel ib_srpt desencadena el siguiente fallo del kernel: ERROR: desreferencia del puntero NULL del kernel, direcci\u00f3n: 0000000000000000 Seguimiento de llamadas: parse_one+0x18c/0x1d0 parse_args+0xe1/0x230 load_module+0x8de/ 0xa60 init_module_from_file+0x8b/0xd0 idempotent_init_module+0x181/0x240 __x64_sys_finit_module+0x5a/0xb0 do_syscall_64+0x5f/0xe0 Entry_SYSCALL_64_after_hwframe+0x6e/0x76"
|
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: RDMA/srpt: admite la especificaci\u00f3n del par\u00e1metro srpt_service_guid. Hace que la carga de ib_srpt con este conjunto de par\u00e1metros funcione. El comportamiento actual es que configurar ese par\u00e1metro mientras se carga el m\u00f3dulo del kernel ib_srpt desencadena el siguiente fallo del kernel: ERROR: desreferencia del puntero NULL del kernel, direcci\u00f3n: 0000000000000000 Seguimiento de llamadas: parse_one+0x18c/0x1d0 parse_args+0xe1/0x230 load_module+0x8de/ 0xa60 init_module_from_file+0x8b/0xd0 idempotent_init_module+0x181/0x240 __x64_sys_finit_module+0x5a/0xb0 do_syscall_64+0x5f/0xe0 Entry_SYSCALL_64_after_hwframe+0x6e/0x76"
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 5.5,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-476"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/5a5c039dac1b1b7ba3e91c791f4421052bf79b82",
|
"url": "https://git.kernel.org/stable/c/5a5c039dac1b1b7ba3e91c791f4421052bf79b82",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-26757",
|
"id": "CVE-2024-26757",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2024-04-03T17:15:52.207",
|
"published": "2024-04-03T17:15:52.207",
|
||||||
"lastModified": "2024-04-03T17:24:18.150",
|
"lastModified": "2024-11-06T21:35:04.737",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,42 @@
|
|||||||
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: md: No ignorar la matriz de solo lectura en md_check_recovery() Generalmente, si la matriz no es de lectura y escritura, md_check_recovery() no registrar\u00e1 un nuevo sync_thread en primer lugar. Y si la matriz es de lectura y escritura y sync_thread est\u00e1 registrado, md_set_readonly() cancelar\u00e1 el registro de sync_thread antes de configurar la matriz como de solo lectura. md/raid sigue este comportamiento, por lo que no hay problema. Despu\u00e9s de commit f52f5c71f3d4 (\"md: arreglar la detenci\u00f3n del hilo de sincronizaci\u00f3n\"), el siguiente bloqueo puede activarse mediante test shell/integrity-caching.sh: 1) la matriz es de solo lectura. Superbloque de actualizaci\u00f3n dm-raid: rs_update_sbs ro = mddev->ro mddev->ro = 0 -> establecer matriz de lectura y escritura md_update_sb 2) registrar un nuevo hilo de sincronizaci\u00f3n simult\u00e1neamente. 3) dm-raid vuelve a configurar la matriz en solo lectura: rs_update_sbs mddev->ro = ro 4) detiene la matriz: raid_dtr md_stop stop_sync_thread set_bit(MD_RECOVERY_INTR, &mddev->recovery); md_wakeup_thread_directly(mddev->sync_thread); wait_event(..., !test_bit(MD_RECOVERY_RUNNING, &mddev->recovery)) 5) hilo de sincronizaci\u00f3n realizado: md_do_sync set_bit(MD_RECOVERY_DONE, &mddev->recovery); md_wakeup_thread(mddev->thread); 6) el hilo del demonio no puede cancelar el registro del hilo de sincronizaci\u00f3n: md_check_recovery if (!md_is_rdwr(mddev) && !test_bit(MD_RECOVERY_NEEDED, &mddev->recovery)) return; -> -> MD_RECOVERY_RUNNING no se puede borrar, por lo tanto el paso 4 se bloquea; La causa principal es que dm-raid manipula 'mddev->ro' por s\u00ed solo; sin embargo, dm-raid realmente deber\u00eda detener el hilo de sincronizaci\u00f3n antes de configurar la matriz como de solo lectura. Desafortunadamente, necesito leer m\u00e1s c\u00f3digo antes de poder refactorizar el controlador de 'mddev->ro' en dm-raid, por lo tanto, solucionemos el problema de la manera m\u00e1s f\u00e1cil por ahora para evitar la regresi\u00f3n de dm-raid."
|
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: md: No ignorar la matriz de solo lectura en md_check_recovery() Generalmente, si la matriz no es de lectura y escritura, md_check_recovery() no registrar\u00e1 un nuevo sync_thread en primer lugar. Y si la matriz es de lectura y escritura y sync_thread est\u00e1 registrado, md_set_readonly() cancelar\u00e1 el registro de sync_thread antes de configurar la matriz como de solo lectura. md/raid sigue este comportamiento, por lo que no hay problema. Despu\u00e9s de commit f52f5c71f3d4 (\"md: arreglar la detenci\u00f3n del hilo de sincronizaci\u00f3n\"), el siguiente bloqueo puede activarse mediante test shell/integrity-caching.sh: 1) la matriz es de solo lectura. Superbloque de actualizaci\u00f3n dm-raid: rs_update_sbs ro = mddev->ro mddev->ro = 0 -> establecer matriz de lectura y escritura md_update_sb 2) registrar un nuevo hilo de sincronizaci\u00f3n simult\u00e1neamente. 3) dm-raid vuelve a configurar la matriz en solo lectura: rs_update_sbs mddev->ro = ro 4) detiene la matriz: raid_dtr md_stop stop_sync_thread set_bit(MD_RECOVERY_INTR, &mddev->recovery); md_wakeup_thread_directly(mddev->sync_thread); wait_event(..., !test_bit(MD_RECOVERY_RUNNING, &mddev->recovery)) 5) hilo de sincronizaci\u00f3n realizado: md_do_sync set_bit(MD_RECOVERY_DONE, &mddev->recovery); md_wakeup_thread(mddev->thread); 6) el hilo del demonio no puede cancelar el registro del hilo de sincronizaci\u00f3n: md_check_recovery if (!md_is_rdwr(mddev) && !test_bit(MD_RECOVERY_NEEDED, &mddev->recovery)) return; -> -> MD_RECOVERY_RUNNING no se puede borrar, por lo tanto el paso 4 se bloquea; La causa principal es que dm-raid manipula 'mddev->ro' por s\u00ed solo; sin embargo, dm-raid realmente deber\u00eda detener el hilo de sincronizaci\u00f3n antes de configurar la matriz como de solo lectura. Desafortunadamente, necesito leer m\u00e1s c\u00f3digo antes de poder refactorizar el controlador de 'mddev->ro' en dm-raid, por lo tanto, solucionemos el problema de la manera m\u00e1s f\u00e1cil por ahora para evitar la regresi\u00f3n de dm-raid."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 5.5,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-404"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/2ea169c5a0b1134d573d07fc27a16f327ad0e7d3",
|
"url": "https://git.kernel.org/stable/c/2ea169c5a0b1134d573d07fc27a16f327ad0e7d3",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-26779",
|
"id": "CVE-2024-26779",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2024-04-03T17:15:53.423",
|
"published": "2024-04-03T17:15:53.423",
|
||||||
"lastModified": "2024-11-05T10:15:49.233",
|
"lastModified": "2024-11-06T22:35:05.993",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,42 @@
|
|||||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wifi: mac80211: corrige la condici\u00f3n de ejecuci\u00f3n al habilitar fast-xmit fast-xmit solo debe habilitarse despu\u00e9s de que el sta se haya cargado en el controlador; de lo contrario, podr\u00eda terminar pasando el error sta a\u00fan cargada a trav\u00e9s de llamadas drv_tx al controlador, lo que genera posibles fallas debido a datos drv_priv no inicializados. Agregue una estaci\u00f3n faltante->comprobaci\u00f3n cargada y vuelva a verificar la transmisi\u00f3n r\u00e1pida despu\u00e9s de insertar una estaci\u00f3n."
|
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wifi: mac80211: corrige la condici\u00f3n de ejecuci\u00f3n al habilitar fast-xmit fast-xmit solo debe habilitarse despu\u00e9s de que el sta se haya cargado en el controlador; de lo contrario, podr\u00eda terminar pasando el error sta a\u00fan cargada a trav\u00e9s de llamadas drv_tx al controlador, lo que genera posibles fallas debido a datos drv_priv no inicializados. Agregue una estaci\u00f3n faltante->comprobaci\u00f3n cargada y vuelva a verificar la transmisi\u00f3n r\u00e1pida despu\u00e9s de insertar una estaci\u00f3n."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 5.5,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-362"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/281280276b70c822f55ce15b661f6d1d3228aaa9",
|
"url": "https://git.kernel.org/stable/c/281280276b70c822f55ce15b661f6d1d3228aaa9",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-28895",
|
"id": "CVE-2024-28895",
|
||||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||||
"published": "2024-04-01T01:15:46.890",
|
"published": "2024-04-01T01:15:46.890",
|
||||||
"lastModified": "2024-04-01T01:33:21.910",
|
"lastModified": "2024-11-06T21:35:05.843",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,42 @@
|
|||||||
"value": "Yahoo! JAPAN' App para Android v2.3.1 a v3.161.1 y 'Yahoo! La aplicaci\u00f3n JAPAN para iOS v3.2.2 a v4.109.0 contiene una vulnerabilidad de cross-site scripting. Si se explota esta vulnerabilidad, se puede ejecutar un script arbitrario en WebView de Yahoo! JAPAN ' App a trav\u00e9s de otra aplicaci\u00f3n instalada en el dispositivo del usuario."
|
"value": "Yahoo! JAPAN' App para Android v2.3.1 a v3.161.1 y 'Yahoo! La aplicaci\u00f3n JAPAN para iOS v3.2.2 a v4.109.0 contiene una vulnerabilidad de cross-site scripting. Si se explota esta vulnerabilidad, se puede ejecutar un script arbitrario en WebView de Yahoo! JAPAN ' App a trav\u00e9s de otra aplicaci\u00f3n instalada en el dispositivo del usuario."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 6.1,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 2.7
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://jvn.jp/en/jp/JVN23528780/",
|
"url": "https://jvn.jp/en/jp/JVN23528780/",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-29948",
|
"id": "CVE-2024-29948",
|
||||||
"sourceIdentifier": "hsrc@hikvision.com",
|
"sourceIdentifier": "hsrc@hikvision.com",
|
||||||
"published": "2024-04-02T11:15:51.813",
|
"published": "2024-04-02T11:15:51.813",
|
||||||
"lastModified": "2024-04-02T12:50:42.233",
|
"lastModified": "2024-11-06T21:35:06.680",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -39,6 +39,18 @@
|
|||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-125"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://www.hikvision.com/en/support/cybersecurity/security-advisory/security-vulnerabilities-in-hikvision-nvr-devices/",
|
"url": "https://www.hikvision.com/en/support/cybersecurity/security-advisory/security-vulnerabilities-in-hikvision-nvr-devices/",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-30122",
|
"id": "CVE-2024-30122",
|
||||||
"sourceIdentifier": "psirt@hcl.com",
|
"sourceIdentifier": "psirt@hcl.com",
|
||||||
"published": "2024-10-23T15:15:30.390",
|
"published": "2024-10-23T15:15:30.390",
|
||||||
"lastModified": "2024-10-25T12:56:36.827",
|
"lastModified": "2024-11-06T22:33:46.797",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -17,6 +17,26 @@
|
|||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 5.3,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 1.4
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "psirt@hcl.com",
|
"source": "psirt@hcl.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -39,10 +59,48 @@
|
|||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"references": [
|
"weaknesses": [
|
||||||
{
|
{
|
||||||
"url": "https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0115627",
|
"source": "nvd@nist.gov",
|
||||||
"source": "psirt@hcl.com"
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "NVD-CWE-noinfo"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:hcltech:sametime:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "12.0.2",
|
||||||
|
"matchCriteriaId": "FDA15EE5-1675-469C-BF7B-DB9FDE95F338"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:hcltech:sametime:12.0.2:-:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "D6A54E0B-DB62-4674-B57D-827A55BBE2CA"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0115627",
|
||||||
|
"source": "psirt@hcl.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-33338",
|
"id": "CVE-2024-33338",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-04-29T18:15:07.937",
|
"published": "2024-04-29T18:15:07.937",
|
||||||
"lastModified": "2024-04-30T13:11:16.690",
|
"lastModified": "2024-11-06T22:35:06.803",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,42 @@
|
|||||||
"value": "Una vulnerabilidad de Cross Site Scripting en jizhicms v.2.5.4 permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s de una solicitud de publicaci\u00f3n de art\u00edculo manipulada."
|
"value": "Una vulnerabilidad de Cross Site Scripting en jizhicms v.2.5.4 permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s de una solicitud de publicaci\u00f3n de art\u00edculo manipulada."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "LOW",
|
||||||
|
"baseScore": 7.3,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 3.4
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/7akahash1/POC/blob/main/1.md",
|
"url": "https://github.com/7akahash1/POC/blob/main/1.md",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-35835",
|
"id": "CVE-2024-35835",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2024-05-17T14:15:20.387",
|
"published": "2024-05-17T14:15:20.387",
|
||||||
"lastModified": "2024-11-05T10:16:42.810",
|
"lastModified": "2024-11-06T21:35:07.630",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,30 @@
|
|||||||
"value": " En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: net/mlx5e: corregido un double free en arfs_create_groups Cuando falla `in` asignado por kvzalloc, arfs_create_groups liberar\u00e1 ft->g y devolver\u00e1 un error. Sin embargo, arfs_create_table, el \u00fanico llamador de arfs_create_groups, mantendr\u00e1 este error y llamar\u00e1 a mlx5e_destroy_flow_table, en el que ft->g se liberar\u00e1 nuevamente."
|
"value": " En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: net/mlx5e: corregido un double free en arfs_create_groups Cuando falla `in` asignado por kvzalloc, arfs_create_groups liberar\u00e1 ft->g y devolver\u00e1 un error. Sin embargo, arfs_create_table, el \u00fanico llamador de arfs_create_groups, mantendr\u00e1 este error y llamar\u00e1 a mlx5e_destroy_flow_table, en el que ft->g se liberar\u00e1 nuevamente."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 5.3,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/2501afe6c4c9829d03abe9a368b83d9ea1b611b7",
|
"url": "https://git.kernel.org/stable/c/2501afe6c4c9829d03abe9a368b83d9ea1b611b7",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-36881",
|
"id": "CVE-2024-36881",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2024-05-30T16:15:11.723",
|
"published": "2024-05-30T16:15:11.723",
|
||||||
"lastModified": "2024-05-30T18:18:58.870",
|
"lastModified": "2024-11-06T22:35:07.757",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,30 @@
|
|||||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mm/userfaultfd: restablece ptes al cerrar() para los protegidos por wr. Userfaultfd unregister incluye un paso para eliminar los bits de wr-protect de todas las entradas relevantes de pgtable, pero eso solo cubre una UFFDIO_UNREGISTER ioctl expl\u00edcito, no un close() en el propio userfaultfd. Cubre eso tambi\u00e9n. Esto corrige un rastro WARN. El \u00fanico efecto secundario visible para el usuario es que puede observar los bits wr-protect sobrantes incluso si el usuario cerr\u00f3 () en un userfaultfd al liberar la \u00faltima referencia del mismo. Sin embargo, es de esperar que eso sea inofensivo y, aun as\u00ed, no deber\u00eda pasar nada malo. Este cambio ahora es m\u00e1s importante despu\u00e9s del reciente parche de verificaci\u00f3n de tabla de p\u00e1ginas que fusionamos en mm-unstable (446dd9ad37d0 (\"mm/page_table_check: admite entradas de protecci\u00f3n wr de error de usuario\")), ya que haremos una verificaci\u00f3n de cordura en uffd-wp. bits sin contexto vma. Por lo tanto, es mejor si podemos garantizar al 100% que no queden restos de bits de uffd-wp, para asegurarnos de que cada informe sea v\u00e1lido."
|
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mm/userfaultfd: restablece ptes al cerrar() para los protegidos por wr. Userfaultfd unregister incluye un paso para eliminar los bits de wr-protect de todas las entradas relevantes de pgtable, pero eso solo cubre una UFFDIO_UNREGISTER ioctl expl\u00edcito, no un close() en el propio userfaultfd. Cubre eso tambi\u00e9n. Esto corrige un rastro WARN. El \u00fanico efecto secundario visible para el usuario es que puede observar los bits wr-protect sobrantes incluso si el usuario cerr\u00f3 () en un userfaultfd al liberar la \u00faltima referencia del mismo. Sin embargo, es de esperar que eso sea inofensivo y, aun as\u00ed, no deber\u00eda pasar nada malo. Este cambio ahora es m\u00e1s importante despu\u00e9s del reciente parche de verificaci\u00f3n de tabla de p\u00e1ginas que fusionamos en mm-unstable (446dd9ad37d0 (\"mm/page_table_check: admite entradas de protecci\u00f3n wr de error de usuario\")), ya que haremos una verificaci\u00f3n de cordura en uffd-wp. bits sin contexto vma. Por lo tanto, es mejor si podemos garantizar al 100% que no queden restos de bits de uffd-wp, para asegurarnos de que cada informe sea v\u00e1lido."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 5.5,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/377f3a9a3d032a52325a5b110379a25dd1ab1931",
|
"url": "https://git.kernel.org/stable/c/377f3a9a3d032a52325a5b110379a25dd1ab1931",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-47253",
|
"id": "CVE-2024-47253",
|
||||||
"sourceIdentifier": "product-security@axis.com",
|
"sourceIdentifier": "product-security@axis.com",
|
||||||
"published": "2024-11-05T10:20:03.973",
|
"published": "2024-11-05T10:20:03.973",
|
||||||
"lastModified": "2024-11-05T16:04:26.053",
|
"lastModified": "2024-11-06T22:23:29.663",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -17,6 +17,26 @@
|
|||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 7.2,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.2,
|
||||||
|
"impactScore": 5.9
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "product-security@axis.com",
|
"source": "product-security@axis.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -40,6 +60,16 @@
|
|||||||
]
|
]
|
||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-22"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "product-security@axis.com",
|
"source": "product-security@axis.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -51,10 +81,31 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://www.2n.com/en-GB/about-2n/cybersecurity/",
|
"nodes": [
|
||||||
"source": "product-security@axis.com"
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:2n:access_commander:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndIncluding": "3.1.1.2",
|
||||||
|
"matchCriteriaId": "47A7B866-FF8F-4CA9-A34C-78D361E21730"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://www.2n.com/en-GB/about-2n/cybersecurity/",
|
||||||
|
"source": "product-security@axis.com",
|
||||||
|
"tags": [
|
||||||
|
"Product"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-47254",
|
"id": "CVE-2024-47254",
|
||||||
"sourceIdentifier": "product-security@axis.com",
|
"sourceIdentifier": "product-security@axis.com",
|
||||||
"published": "2024-11-05T10:20:04.843",
|
"published": "2024-11-05T10:20:04.843",
|
||||||
"lastModified": "2024-11-05T16:04:26.053",
|
"lastModified": "2024-11-06T22:22:01.623",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -17,6 +17,26 @@
|
|||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 7.2,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.2,
|
||||||
|
"impactScore": 5.9
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "product-security@axis.com",
|
"source": "product-security@axis.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -40,6 +60,16 @@
|
|||||||
]
|
]
|
||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "NVD-CWE-noinfo"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "product-security@axis.com",
|
"source": "product-security@axis.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -51,10 +81,31 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://www.2n.com/en-GB/about-2n/cybersecurity/",
|
"nodes": [
|
||||||
"source": "product-security@axis.com"
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:2n:access_commander:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndIncluding": "3.1.1.2",
|
||||||
|
"matchCriteriaId": "47A7B866-FF8F-4CA9-A34C-78D361E21730"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://www.2n.com/en-GB/about-2n/cybersecurity/",
|
||||||
|
"source": "product-security@axis.com",
|
||||||
|
"tags": [
|
||||||
|
"Product"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-47255",
|
"id": "CVE-2024-47255",
|
||||||
"sourceIdentifier": "product-security@axis.com",
|
"sourceIdentifier": "product-security@axis.com",
|
||||||
"published": "2024-11-05T10:20:05.300",
|
"published": "2024-11-05T10:20:05.300",
|
||||||
"lastModified": "2024-11-05T16:04:26.053",
|
"lastModified": "2024-11-06T22:23:05.770",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -17,6 +17,26 @@
|
|||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 7.8,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 5.9
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "product-security@axis.com",
|
"source": "product-security@axis.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -40,6 +60,16 @@
|
|||||||
]
|
]
|
||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "NVD-CWE-noinfo"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "product-security@axis.com",
|
"source": "product-security@axis.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -51,10 +81,31 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://www.2n.com/en-GB/about-2n/cybersecurity/",
|
"nodes": [
|
||||||
"source": "product-security@axis.com"
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:2n:access_commander:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndIncluding": "3.1.1.2",
|
||||||
|
"matchCriteriaId": "47A7B866-FF8F-4CA9-A34C-78D361E21730"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://www.2n.com/en-GB/about-2n/cybersecurity/",
|
||||||
|
"source": "product-security@axis.com",
|
||||||
|
"tags": [
|
||||||
|
"Product"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-48050",
|
"id": "CVE-2024-48050",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-11-04T23:15:04.250",
|
"published": "2024-11-04T23:15:04.250",
|
||||||
"lastModified": "2024-11-05T16:04:26.053",
|
"lastModified": "2024-11-06T21:35:07.863",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,42 @@
|
|||||||
"value": "En agentscope <=v0.0.4, el archivo agentscope\\web\\workstation\\workflow_utils.py tiene la funci\u00f3n is_callable_expression. Dentro de esta funci\u00f3n, la l\u00ednea result = eval(s) plantea un riesgo de seguridad, ya que puede ejecutar directamente comandos proporcionados por el usuario."
|
"value": "En agentscope <=v0.0.4, el archivo agentscope\\web\\workstation\\workflow_utils.py tiene la funci\u00f3n is_callable_expression. Dentro de esta funci\u00f3n, la l\u00ednea result = eval(s) plantea un riesgo de seguridad, ya que puede ejecutar directamente comandos proporcionados por el usuario."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 9.8,
|
||||||
|
"baseSeverity": "CRITICAL"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-94"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://gist.github.com/AfterSnows/0ad9d233a9d2a5b7e6e5273e2e23508d",
|
"url": "https://gist.github.com/AfterSnows/0ad9d233a9d2a5b7e6e5273e2e23508d",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-49370",
|
"id": "CVE-2024-49370",
|
||||||
"sourceIdentifier": "security-advisories@github.com",
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
"published": "2024-10-23T15:15:31.987",
|
"published": "2024-10-23T15:15:31.987",
|
||||||
"lastModified": "2024-10-25T12:56:36.827",
|
"lastModified": "2024-11-06T22:31:30.160",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -59,12 +59,44 @@
|
|||||||
"baseSeverity": "HIGH"
|
"baseSeverity": "HIGH"
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 4.9,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.2,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
{
|
{
|
||||||
"source": "security-advisories@github.com",
|
"source": "nvd@nist.gov",
|
||||||
"type": "Primary",
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "NVD-CWE-Other"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Secondary",
|
||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
@ -73,10 +105,39 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/pimcore/pimcore/security/advisories/GHSA-74p5-77rq-gfqc",
|
"nodes": [
|
||||||
"source": "security-advisories@github.com"
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:pimcore:pimcore:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "3.1.16",
|
||||||
|
"matchCriteriaId": "8E36A24C-B1EA-4E86-B87D-69AB12876830"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:pimcore:pimcore:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "4.0.0",
|
||||||
|
"versionEndExcluding": "4.1.7",
|
||||||
|
"matchCriteriaId": "13395FFF-7B19-4774-B7FF-F9EF31064AD6"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/pimcore/pimcore/security/advisories/GHSA-74p5-77rq-gfqc",
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-49675",
|
"id": "CVE-2024-49675",
|
||||||
"sourceIdentifier": "audit@patchstack.com",
|
"sourceIdentifier": "audit@patchstack.com",
|
||||||
"published": "2024-10-23T15:15:32.120",
|
"published": "2024-10-23T15:15:32.120",
|
||||||
"lastModified": "2024-10-25T12:56:36.827",
|
"lastModified": "2024-11-06T22:24:22.907",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -17,6 +17,26 @@
|
|||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 8.8,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 5.9
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "audit@patchstack.com",
|
"source": "audit@patchstack.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -40,6 +60,16 @@
|
|||||||
]
|
]
|
||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "NVD-CWE-Other"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "audit@patchstack.com",
|
"source": "audit@patchstack.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -51,10 +81,31 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://patchstack.com/database/vulnerability/ibryl-switch-user/wordpress-ibryl-switch-user-plugin-1-0-1-account-takeover-vulnerability?_s_id=cve",
|
"nodes": [
|
||||||
"source": "audit@patchstack.com"
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:vitaliibryl:switch_user:*:*:*:*:*:wordpress:*:*",
|
||||||
|
"versionEndIncluding": "1.0.1",
|
||||||
|
"matchCriteriaId": "AC4A7ABE-B11E-467C-B9E0-23C86844CABC"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://patchstack.com/database/vulnerability/ibryl-switch-user/wordpress-ibryl-switch-user-plugin-1-0-1-account-takeover-vulnerability?_s_id=cve",
|
||||||
|
"source": "audit@patchstack.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
60
CVE-2024/CVE-2024-503xx/CVE-2024-50340.json
Normal file
60
CVE-2024/CVE-2024-503xx/CVE-2024-50340.json
Normal file
@ -0,0 +1,60 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-50340",
|
||||||
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
|
"published": "2024-11-06T21:15:05.527",
|
||||||
|
"lastModified": "2024-11-06T21:15:05.527",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "symfony/runtime is a module for the Symphony PHP framework which enables decoupling PHP applications from global state. When the `register_argv_argc` php directive is set to `on` , and users call any URL with a special crafted query string, they are able to change the environment or debug mode used by the kernel when handling the request. As of versions 5.4.46, 6.4.14, and 7.1.7 the `SymfonyRuntime` now ignores the `argv` values for non-SAPI PHP runtimes. All users are advised to upgrade. There are no known workarounds for this vulnerability."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "LOW",
|
||||||
|
"baseScore": 7.3,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 3.4
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-74"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/symfony/symfony/commit/a77b308c3f179ed7c8a8bc295f82b2d6ee3493fa",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/symfony/symfony/security/advisories/GHSA-x8vp-gf4q-mw5j",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
60
CVE-2024/CVE-2024-503xx/CVE-2024-50341.json
Normal file
60
CVE-2024/CVE-2024-503xx/CVE-2024-50341.json
Normal file
@ -0,0 +1,60 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-50341",
|
||||||
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
|
"published": "2024-11-06T21:15:05.747",
|
||||||
|
"lastModified": "2024-11-06T21:15:05.747",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "symfony/security-bundle is a module for the Symphony PHP framework which provides a tight integration of the Security component into the Symfony full-stack framework. The custom `user_checker` defined on a firewall is not called when Login Programmaticaly with the `Security::login` method, leading to unwanted login. As of versions 6.4.10, 7.0.10 and 7.1.3 the `Security::login` method now ensure to call the configured `user_checker`. All users are advised to upgrade. There are no known workarounds for this vulnerability."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "HIGH",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 3.1,
|
||||||
|
"baseSeverity": "LOW"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.6,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-287"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/symfony/symfony/commit/22a0789a0085c3ee96f4ef715ecad8255cf0e105",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/symfony/symfony/security/advisories/GHSA-jxgr-3v7q-3w9v",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
60
CVE-2024/CVE-2024-503xx/CVE-2024-50342.json
Normal file
60
CVE-2024/CVE-2024-503xx/CVE-2024-50342.json
Normal file
@ -0,0 +1,60 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-50342",
|
||||||
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
|
"published": "2024-11-06T21:15:05.963",
|
||||||
|
"lastModified": "2024-11-06T21:15:05.963",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "symfony/http-client is a module for the Symphony PHP framework which provides powerful methods to fetch HTTP resources synchronously or asynchronously. When using the `NoPrivateNetworkHttpClient`, some internal information is still leaking during host resolution, which leads to possible IP/port enumeration. As of versions 5.4.46, 6.4.14, and 7.1.7 the `NoPrivateNetworkHttpClient` now filters blocked IPs earlier to prevent such leaks. All users are advised to upgrade. There are no known workarounds for this vulnerability."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "HIGH",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 3.1,
|
||||||
|
"baseSeverity": "LOW"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.6,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-200"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/symfony/symfony/commit/296d4b34a33b1a6ca5475c6040b3203622520f5b",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/symfony/symfony/security/advisories/GHSA-9c3x-r3wp-mgxm",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
60
CVE-2024/CVE-2024-503xx/CVE-2024-50343.json
Normal file
60
CVE-2024/CVE-2024-503xx/CVE-2024-50343.json
Normal file
@ -0,0 +1,60 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-50343",
|
||||||
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
|
"published": "2024-11-06T21:15:06.180",
|
||||||
|
"lastModified": "2024-11-06T21:15:06.180",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "symfony/validator is a module for the Symphony PHP framework which provides tools to validate values. It is possible to trick a `Validator` configured with a regular expression using the `$` metacharacters, with an input ending with `\\n`. Symfony as of versions 5.4.43, 6.4.11, and 7.1.4 now uses the `D` regex modifier to match the entire input. Users are advised to upgrade. There are no known workarounds for this vulnerability."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "HIGH",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 3.1,
|
||||||
|
"baseSeverity": "LOW"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.6,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-20"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/symfony/symfony/commit/7d1032bbead9a4229b32fa6ebca32681c80cb76f",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/symfony/symfony/security/advisories/GHSA-g3rh-rrhp-jhh9",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
60
CVE-2024/CVE-2024-503xx/CVE-2024-50345.json
Normal file
60
CVE-2024/CVE-2024-503xx/CVE-2024-50345.json
Normal file
@ -0,0 +1,60 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-50345",
|
||||||
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
|
"published": "2024-11-06T21:15:06.383",
|
||||||
|
"lastModified": "2024-11-06T21:15:06.383",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "symfony/http-foundation is a module for the Symphony PHP framework which defines an object-oriented layer for the HTTP specification. The `Request` class, does not parse URI with special characters the same way browsers do. As a result, an attacker can trick a validator relying on the `Request` class to redirect users to another domain. The `Request::create` methods now assert the URI does not contain invalid characters as defined by https://url.spec.whatwg.org/. This issue has been patched in versions 5.4.46, 6.4.14, and 7.1.7. Users are advised to upgrade. There are no known workarounds for this vulnerability."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "HIGH",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 3.1,
|
||||||
|
"baseSeverity": "LOW"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.6,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-601"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/symfony/symfony/security/advisories/GHSA-mrqx-rp3w-jpjp",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://url.spec.whatwg.org",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-51408",
|
"id": "CVE-2024-51408",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-11-04T14:15:16.603",
|
"published": "2024-11-04T14:15:16.603",
|
||||||
"lastModified": "2024-11-05T22:35:13.937",
|
"lastModified": "2024-11-06T22:06:43.100",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -17,6 +17,26 @@
|
|||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 6.5,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 3.6
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "cve@mitre.org",
|
"source": "cve@mitre.org",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -40,6 +60,16 @@
|
|||||||
]
|
]
|
||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-918"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -51,18 +81,46 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/appsmithorg/appsmith/pull/29286",
|
"nodes": [
|
||||||
"source": "cve@mitre.org"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://github.com/appsmithorg/appsmith/releases/tag/v1.46",
|
"operator": "OR",
|
||||||
"source": "cve@mitre.org"
|
"negate": false,
|
||||||
},
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/jahithoque/Vulnerability-Research/tree/main/CVE-2024-51408",
|
"vulnerable": true,
|
||||||
"source": "cve@mitre.org"
|
"criteria": "cpe:2.3:a:appsmith:appsmith:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "1.8.3",
|
||||||
|
"versionEndExcluding": "1.46",
|
||||||
|
"matchCriteriaId": "200066FD-141E-4023-A8CF-350F46C52870"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/appsmithorg/appsmith/pull/29286",
|
||||||
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Issue Tracking"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/appsmithorg/appsmith/releases/tag/v1.46",
|
||||||
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Release Notes"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/jahithoque/Vulnerability-Research/tree/main/CVE-2024-51408",
|
||||||
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Exploit"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,17 +2,41 @@
|
|||||||
"id": "CVE-2024-51626",
|
"id": "CVE-2024-51626",
|
||||||
"sourceIdentifier": "audit@patchstack.com",
|
"sourceIdentifier": "audit@patchstack.com",
|
||||||
"published": "2024-11-04T15:15:22.730",
|
"published": "2024-11-04T15:15:22.730",
|
||||||
"lastModified": "2024-11-04T18:50:05.607",
|
"lastModified": "2024-11-06T22:10:20.517",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Mansur Ahamed Woocommerce Quote Calculator allows Blind SQL Injection.This issue affects Woocommerce Quote Calculator: from n/a through 1.1."
|
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Mansur Ahamed Woocommerce Quote Calculator allows Blind SQL Injection.This issue affects Woocommerce Quote Calculator: from n/a through 1.1."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": " La vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en Woocommerce Quote Calculator de Mansur Ahamed permite la inyecci\u00f3n SQL ciega. Este problema afecta a Woocommerce Quote Calculator: desde n/a hasta 1.1."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 8.8,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 5.9
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "audit@patchstack.com",
|
"source": "audit@patchstack.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -47,10 +71,31 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://patchstack.com/database/vulnerability/woo-quote-calculator-order/wordpress-woocommerce-quote-calculator-plugin-1-1-sql-injection-vulnerability-2?_s_id=cve",
|
"nodes": [
|
||||||
"source": "audit@patchstack.com"
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:mansurahamed:woocommerce_quote_calculator:*:*:*:*:*:wordpress:*:*",
|
||||||
|
"versionEndIncluding": "1.1",
|
||||||
|
"matchCriteriaId": "A8F99F04-98CA-4DA4-B7CB-C6C16FD1156C"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://patchstack.com/database/vulnerability/woo-quote-calculator-order/wordpress-woocommerce-quote-calculator-plugin-1-1-sql-injection-vulnerability-2?_s_id=cve",
|
||||||
|
"source": "audit@patchstack.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,17 +2,41 @@
|
|||||||
"id": "CVE-2024-51665",
|
"id": "CVE-2024-51665",
|
||||||
"sourceIdentifier": "audit@patchstack.com",
|
"sourceIdentifier": "audit@patchstack.com",
|
||||||
"published": "2024-11-04T14:15:16.987",
|
"published": "2024-11-04T14:15:16.987",
|
||||||
"lastModified": "2024-11-04T18:50:05.607",
|
"lastModified": "2024-11-06T22:07:10.707",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Server-Side Request Forgery (SSRF) vulnerability in Noor alam Magical Addons For Elementor allows Server Side Request Forgery.This issue affects Magical Addons For Elementor: from n/a through 1.2.1."
|
"value": "Server-Side Request Forgery (SSRF) vulnerability in Noor alam Magical Addons For Elementor allows Server Side Request Forgery.This issue affects Magical Addons For Elementor: from n/a through 1.2.1."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": " La vulnerabilidad de Server-Side Request Forgery (SSRF) en Noor alam Magical Addons For Elementor permite Server-Side Request Forgery. Este problema afecta a Magical Addons For Elementor: desde n/a hasta 1.2.1."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 4.3,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 1.4
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "audit@patchstack.com",
|
"source": "audit@patchstack.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -47,10 +71,31 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://patchstack.com/database/vulnerability/magical-addons-for-elementor/wordpress-magical-addons-for-elementor-plugin-1-2-1-server-side-request-forgery-ssrf-vulnerability?_s_id=cve",
|
"nodes": [
|
||||||
"source": "audit@patchstack.com"
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:wpthemespace:magical_addons_for_elementor:*:*:*:*:*:wordpress:*:*",
|
||||||
|
"versionEndExcluding": "1.2.3",
|
||||||
|
"matchCriteriaId": "0D7D471C-B15C-4B06-B247-025BA5FB9194"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://patchstack.com/database/vulnerability/magical-addons-for-elementor/wordpress-magical-addons-for-elementor-plugin-1-2-1-server-side-request-forgery-ssrf-vulnerability?_s_id=cve",
|
||||||
|
"source": "audit@patchstack.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,17 +2,41 @@
|
|||||||
"id": "CVE-2024-51672",
|
"id": "CVE-2024-51672",
|
||||||
"sourceIdentifier": "audit@patchstack.com",
|
"sourceIdentifier": "audit@patchstack.com",
|
||||||
"published": "2024-11-04T14:15:17.190",
|
"published": "2024-11-04T14:15:17.190",
|
||||||
"lastModified": "2024-11-04T18:50:05.607",
|
"lastModified": "2024-11-06T22:08:22.747",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in WPDeveloper BetterLinks allows SQL Injection.This issue affects BetterLinks: from n/a through 2.1.7."
|
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in WPDeveloper BetterLinks allows SQL Injection.This issue affects BetterLinks: from n/a through 2.1.7."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": " Vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en WPDeveloper BetterLinks permite la inyecci\u00f3n SQL. Este problema afecta a BetterLinks: desde n/a hasta 2.1.7."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 7.2,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.2,
|
||||||
|
"impactScore": 5.9
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "audit@patchstack.com",
|
"source": "audit@patchstack.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -47,10 +71,31 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://patchstack.com/database/vulnerability/betterlinks/wordpress-betterlinks-plugin-2-1-7-sql-injection-vulnerability?_s_id=cve",
|
"nodes": [
|
||||||
"source": "audit@patchstack.com"
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:wpdeveloper:betterlinks:*:*:*:*:free:wordpress:*:*",
|
||||||
|
"versionEndExcluding": "2.1.8",
|
||||||
|
"matchCriteriaId": "F07AEFF7-CD0F-43EB-AD00-A1B4A2FCE774"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://patchstack.com/database/vulnerability/betterlinks/wordpress-betterlinks-plugin-2-1-7-sql-injection-vulnerability?_s_id=cve",
|
||||||
|
"source": "audit@patchstack.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,17 +2,41 @@
|
|||||||
"id": "CVE-2024-51677",
|
"id": "CVE-2024-51677",
|
||||||
"sourceIdentifier": "audit@patchstack.com",
|
"sourceIdentifier": "audit@patchstack.com",
|
||||||
"published": "2024-11-04T15:15:22.947",
|
"published": "2024-11-04T15:15:22.947",
|
||||||
"lastModified": "2024-11-04T18:50:05.607",
|
"lastModified": "2024-11-06T22:10:31.677",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WebberZone Knowledge Base allows Stored XSS.This issue affects Knowledge Base: from n/a through 2.2.0."
|
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WebberZone Knowledge Base allows Stored XSS.This issue affects Knowledge Base: from n/a through 2.2.0."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en WebberZone Knowledge Base permite XSS almacenado. Este problema afecta a Knowledge Base: desde n/a hasta 2.2.0."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 5.4,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.3,
|
||||||
|
"impactScore": 2.7
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "audit@patchstack.com",
|
"source": "audit@patchstack.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -47,10 +71,31 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://patchstack.com/database/vulnerability/knowledgebase/wordpress-knowledge-base-plugin-2-2-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
"nodes": [
|
||||||
"source": "audit@patchstack.com"
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:webberzone:knowledge_base:*:*:*:*:*:wordpress:*:*",
|
||||||
|
"versionEndExcluding": "2.2.1",
|
||||||
|
"matchCriteriaId": "5E509AFC-6A96-4395-9950-021A25F856EB"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://patchstack.com/database/vulnerability/knowledgebase/wordpress-knowledge-base-plugin-2-2-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||||
|
"source": "audit@patchstack.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,17 +2,41 @@
|
|||||||
"id": "CVE-2024-51678",
|
"id": "CVE-2024-51678",
|
||||||
"sourceIdentifier": "audit@patchstack.com",
|
"sourceIdentifier": "audit@patchstack.com",
|
||||||
"published": "2024-11-04T15:15:23.163",
|
"published": "2024-11-04T15:15:23.163",
|
||||||
"lastModified": "2024-11-04T18:50:05.607",
|
"lastModified": "2024-11-06T22:10:45.103",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Marcel Pol Elo Rating Shortcode allows Stored XSS.This issue affects Elo Rating Shortcode: from n/a through 1.0.3."
|
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Marcel Pol Elo Rating Shortcode allows Stored XSS.This issue affects Elo Rating Shortcode: from n/a through 1.0.3."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": " La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Marcel Pol Elo Rating Shortcode permite XSS almacenado. Este problema afecta a Elo Rating Shortcode: desde n/a hasta 1.0.3."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 5.4,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.3,
|
||||||
|
"impactScore": 2.7
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "audit@patchstack.com",
|
"source": "audit@patchstack.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -47,10 +71,31 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://patchstack.com/database/vulnerability/elo-rating-shortcode/wordpress-elo-rating-shortcode-plugin-1-0-3-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
"nodes": [
|
||||||
"source": "audit@patchstack.com"
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:timelord:elo_rating_shortcode:*:*:*:*:*:wordpress:*:*",
|
||||||
|
"versionEndExcluding": "1.0.4",
|
||||||
|
"matchCriteriaId": "DD6BD84D-7596-4867-846B-F1E3D3C850F1"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://patchstack.com/database/vulnerability/elo-rating-shortcode/wordpress-elo-rating-shortcode-plugin-1-0-3-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||||
|
"source": "audit@patchstack.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,17 +2,41 @@
|
|||||||
"id": "CVE-2024-51680",
|
"id": "CVE-2024-51680",
|
||||||
"sourceIdentifier": "audit@patchstack.com",
|
"sourceIdentifier": "audit@patchstack.com",
|
||||||
"published": "2024-11-04T15:15:23.367",
|
"published": "2024-11-04T15:15:23.367",
|
||||||
"lastModified": "2024-11-04T18:50:05.607",
|
"lastModified": "2024-11-06T22:10:59.270",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in CrestaProject \u2013 Rizzo Andrea Cresta Addons for Elementor allows Stored XSS.This issue affects Cresta Addons for Elementor: from n/a through 1.0.9."
|
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in CrestaProject \u2013 Rizzo Andrea Cresta Addons for Elementor allows Stored XSS.This issue affects Cresta Addons for Elementor: from n/a through 1.0.9."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": " Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en CrestaProject \u2013 Rizzo Andrea Cresta Addons para Elementor permite XSS almacenado. Este problema afecta a Cresta Addons para Elementor: desde n/a hasta 1.0.9."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 5.4,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.3,
|
||||||
|
"impactScore": 2.7
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "audit@patchstack.com",
|
"source": "audit@patchstack.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -47,10 +71,31 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://patchstack.com/database/vulnerability/cresta-addons-for-elementor/wordpress-cresta-addons-for-elementor-plugin-1-0-9-stored-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
"nodes": [
|
||||||
"source": "audit@patchstack.com"
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:crestaproject:cresta_addons_for_elementor:*:*:*:*:*:wordpress:*:*",
|
||||||
|
"versionEndExcluding": "1.1.0",
|
||||||
|
"matchCriteriaId": "BF5F07AA-0D63-4415-AD80-071F5F656550"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://patchstack.com/database/vulnerability/cresta-addons-for-elementor/wordpress-cresta-addons-for-elementor-plugin-1-0-9-stored-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||||
|
"source": "audit@patchstack.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,17 +2,41 @@
|
|||||||
"id": "CVE-2024-51681",
|
"id": "CVE-2024-51681",
|
||||||
"sourceIdentifier": "audit@patchstack.com",
|
"sourceIdentifier": "audit@patchstack.com",
|
||||||
"published": "2024-11-04T15:15:23.577",
|
"published": "2024-11-04T15:15:23.577",
|
||||||
"lastModified": "2024-11-04T18:50:05.607",
|
"lastModified": "2024-11-06T22:11:16.003",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in CodeRevolution WP Pocket URLs allows Stored XSS.This issue affects WP Pocket URLs: from n/a through 1.0.3."
|
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in CodeRevolution WP Pocket URLs allows Stored XSS.This issue affects WP Pocket URLs: from n/a through 1.0.3."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en las URL de WP Pocket de CodeRevolution permite XSS almacenado. Este problema afecta a las URL de WP Pocket: desde n/a hasta 1.0.3."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 5.4,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.3,
|
||||||
|
"impactScore": 2.7
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "audit@patchstack.com",
|
"source": "audit@patchstack.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -47,10 +71,31 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://patchstack.com/database/vulnerability/wp-pocket-urls/wordpress-wp-pocket-urls-plugin-1-0-3-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
"nodes": [
|
||||||
"source": "audit@patchstack.com"
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:coderevolution:wp_pocket_urls:*:*:*:*:*:wordpress:*:*",
|
||||||
|
"versionEndExcluding": "1.0.4",
|
||||||
|
"matchCriteriaId": "18E7B64D-FBAA-4F21-B18F-DF4162D68AE7"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://patchstack.com/database/vulnerability/wp-pocket-urls/wordpress-wp-pocket-urls-plugin-1-0-3-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||||
|
"source": "audit@patchstack.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,17 +2,41 @@
|
|||||||
"id": "CVE-2024-51682",
|
"id": "CVE-2024-51682",
|
||||||
"sourceIdentifier": "audit@patchstack.com",
|
"sourceIdentifier": "audit@patchstack.com",
|
||||||
"published": "2024-11-04T15:15:23.787",
|
"published": "2024-11-04T15:15:23.787",
|
||||||
"lastModified": "2024-11-04T18:50:05.607",
|
"lastModified": "2024-11-06T22:12:02.353",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in HasThemes HT Builder \u2013 WordPress Theme Builder for Elementor allows Stored XSS.This issue affects HT Builder \u2013 WordPress Theme Builder for Elementor: from n/a through 1.3.0."
|
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in HasThemes HT Builder \u2013 WordPress Theme Builder for Elementor allows Stored XSS.This issue affects HT Builder \u2013 WordPress Theme Builder for Elementor: from n/a through 1.3.0."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en HasThemes HT Builder \u2013 WordPress Theme Builder for Elementor permite XSS almacenado. Este problema afecta a HT Builder \u2013 WordPress Theme Builder for Elementor: desde n/a hasta 1.3.0."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 5.4,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.3,
|
||||||
|
"impactScore": 2.7
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "audit@patchstack.com",
|
"source": "audit@patchstack.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -36,6 +60,16 @@
|
|||||||
]
|
]
|
||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "audit@patchstack.com",
|
"source": "audit@patchstack.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -47,10 +81,31 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://patchstack.com/database/vulnerability/ht-builder/wordpress-ht-builder-wordpress-theme-builder-for-elementor-plugin-1-3-0-stored-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
"nodes": [
|
||||||
"source": "audit@patchstack.com"
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:hasthemes:ht_builder:*:*:*:*:*:wordpress:*:*",
|
||||||
|
"versionEndExcluding": "1.3.1",
|
||||||
|
"matchCriteriaId": "FD23AE19-E68B-4DBF-9ED9-4B9DD085271E"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://patchstack.com/database/vulnerability/ht-builder/wordpress-ht-builder-wordpress-theme-builder-for-elementor-plugin-1-3-0-stored-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||||
|
"source": "audit@patchstack.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,17 +2,41 @@
|
|||||||
"id": "CVE-2024-51683",
|
"id": "CVE-2024-51683",
|
||||||
"sourceIdentifier": "audit@patchstack.com",
|
"sourceIdentifier": "audit@patchstack.com",
|
||||||
"published": "2024-11-04T15:15:24.013",
|
"published": "2024-11-04T15:15:24.013",
|
||||||
"lastModified": "2024-11-04T18:50:05.607",
|
"lastModified": "2024-11-06T22:12:19.803",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Michael Gangolf Custom post type templates for Elementor allows Stored XSS.This issue affects Custom post type templates for Elementor: from n/a through 1.10.1."
|
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Michael Gangolf Custom post type templates for Elementor allows Stored XSS.This issue affects Custom post type templates for Elementor: from n/a through 1.10.1."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en las plantillas de tipo de publicaci\u00f3n personalizadas de Michael Gangolf para Elementor permite XSS almacenado. Este problema afecta a Custom post type templates for Elementor: desde n/a hasta 1.10.1."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 5.4,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.3,
|
||||||
|
"impactScore": 2.7
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "audit@patchstack.com",
|
"source": "audit@patchstack.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -47,10 +71,31 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://patchstack.com/database/vulnerability/custom-post-type-templates-for-elementor/wordpress-custom-post-type-templates-for-elementor-plugin-1-10-1-stored-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
"nodes": [
|
||||||
"source": "audit@patchstack.com"
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:migaweb:custom_post_type_templates_for_elementor:*:*:*:*:*:wordpress:*:*",
|
||||||
|
"versionEndExcluding": "1.1.12",
|
||||||
|
"matchCriteriaId": "BC28FA62-4EAC-4B4F-8E90-83862AFF1FDF"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://patchstack.com/database/vulnerability/custom-post-type-templates-for-elementor/wordpress-custom-post-type-templates-for-elementor-plugin-1-10-1-stored-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||||
|
"source": "audit@patchstack.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
60
CVE-2024/CVE-2024-517xx/CVE-2024-51736.json
Normal file
60
CVE-2024/CVE-2024-517xx/CVE-2024-51736.json
Normal file
@ -0,0 +1,60 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-51736",
|
||||||
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
|
"published": "2024-11-06T21:15:06.600",
|
||||||
|
"lastModified": "2024-11-06T21:15:06.600",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Symphony process is a module for the Symphony PHP framework which executes commands in sub-processes. On Windows, when an executable file named `cmd.exe` is located in the current working directory it will be called by the `Process` class when preparing command arguments, leading to possible hijacking. This issue has been addressed in release versions 5.4.46, 6.4.14, and 7.1.7. Users are advised to upgrade. There are no known workarounds for this vulnerability."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 0.0,
|
||||||
|
"baseSeverity": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.5,
|
||||||
|
"impactScore": 0.0
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-77"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/symfony/symfony/security/advisories/GHSA-qq5c-677p-737q",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/symfony/symfony/security/advisories/GHSA-qq5c-677p-737q",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-51757",
|
"id": "CVE-2024-51757",
|
||||||
"sourceIdentifier": "security-advisories@github.com",
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
"published": "2024-11-06T20:15:06.337",
|
"published": "2024-11-06T20:15:06.337",
|
||||||
"lastModified": "2024-11-06T20:15:06.337",
|
"lastModified": "2024-11-06T21:15:06.807",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Received",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -78,6 +78,10 @@
|
|||||||
"url": "https://github.com/capricorn86/happy-dom/commit/5ee0b1676d4ce20cc2a70d1c9c8d6f1e3f57efac",
|
"url": "https://github.com/capricorn86/happy-dom/commit/5ee0b1676d4ce20cc2a70d1c9c8d6f1e3f57efac",
|
||||||
"source": "security-advisories@github.com"
|
"source": "security-advisories@github.com"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/capricorn86/happy-dom/commit/d23834c232f1cf5519c9418b073f1dcec6b2f0fd",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://github.com/capricorn86/happy-dom/issues/1585",
|
"url": "https://github.com/capricorn86/happy-dom/issues/1585",
|
||||||
"source": "security-advisories@github.com"
|
"source": "security-advisories@github.com"
|
||||||
@ -86,6 +90,10 @@
|
|||||||
"url": "https://github.com/capricorn86/happy-dom/pull/1586",
|
"url": "https://github.com/capricorn86/happy-dom/pull/1586",
|
||||||
"source": "security-advisories@github.com"
|
"source": "security-advisories@github.com"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/capricorn86/happy-dom/releases/tag/v15.10.2",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://github.com/capricorn86/happy-dom/security/advisories/GHSA-96g7-g7g9-jxw8",
|
"url": "https://github.com/capricorn86/happy-dom/security/advisories/GHSA-96g7-g7g9-jxw8",
|
||||||
"source": "security-advisories@github.com"
|
"source": "security-advisories@github.com"
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-5642",
|
"id": "CVE-2024-5642",
|
||||||
"sourceIdentifier": "cna@python.org",
|
"sourceIdentifier": "cna@python.org",
|
||||||
"published": "2024-06-27T21:15:16.070",
|
"published": "2024-06-27T21:15:16.070",
|
||||||
"lastModified": "2024-07-28T14:15:11.220",
|
"lastModified": "2024-11-06T21:35:08.690",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,30 @@
|
|||||||
"value": "CPython 3.9 y versiones anteriores no permiten la configuraci\u00f3n de una lista vac\u00eda (\"[]\") para SSLContext.set_npn_protocols(), que es un valor no v\u00e1lido para la API OpenSSL subyacente. Esto da como resultado una lectura excesiva del b\u00fafer cuando se utiliza NPN (consulte CVE-2024-5535 para OpenSSL). Esta vulnerabilidad es de baja gravedad debido a que NPN no se usa ampliamente y especificar una lista vac\u00eda probablemente sea poco com\u00fan en la pr\u00e1ctica (normalmente se configurar\u00eda un nombre de protocolo)."
|
"value": "CPython 3.9 y versiones anteriores no permiten la configuraci\u00f3n de una lista vac\u00eda (\"[]\") para SSLContext.set_npn_protocols(), que es un valor no v\u00e1lido para la API OpenSSL subyacente. Esto da como resultado una lectura excesiva del b\u00fafer cuando se utiliza NPN (consulte CVE-2024-5535 para OpenSSL). Esta vulnerabilidad es de baja gravedad debido a que NPN no se usa ampliamente y especificar una lista vac\u00eda probablemente sea poco com\u00fan en la pr\u00e1ctica (normalmente se configurar\u00eda un nombre de protocolo)."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "LOW",
|
||||||
|
"baseScore": 6.5,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 2.5
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2024/06/28/4",
|
"url": "http://www.openwall.com/lists/oss-security/2024/06/28/4",
|
||||||
|
73
README.md
73
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
|||||||
### Last Repository Update
|
### Last Repository Update
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
2024-11-06T21:00:21.583587+00:00
|
2024-11-06T23:00:20.311060+00:00
|
||||||
```
|
```
|
||||||
|
|
||||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
2024-11-06T20:55:37.613000+00:00
|
2024-11-06T22:56:41.647000+00:00
|
||||||
```
|
```
|
||||||
|
|
||||||
### Last Data Feed Release
|
### Last Data Feed Release
|
||||||
@ -33,49 +33,52 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
|||||||
### Total Number of included CVEs
|
### Total Number of included CVEs
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
268480
|
268488
|
||||||
```
|
```
|
||||||
|
|
||||||
### CVEs added in the last Commit
|
### CVEs added in the last Commit
|
||||||
|
|
||||||
Recently added CVEs: `5`
|
Recently added CVEs: `8`
|
||||||
|
|
||||||
- [CVE-2024-51751](CVE-2024/CVE-2024-517xx/CVE-2024-51751.json) (`2024-11-06T20:15:05.557`)
|
- [CVE-2024-10926](CVE-2024/CVE-2024-109xx/CVE-2024-10926.json) (`2024-11-06T21:15:04.927`)
|
||||||
- [CVE-2024-51754](CVE-2024/CVE-2024-517xx/CVE-2024-51754.json) (`2024-11-06T20:15:05.817`)
|
- [CVE-2024-10941](CVE-2024/CVE-2024-109xx/CVE-2024-10941.json) (`2024-11-06T21:15:05.213`)
|
||||||
- [CVE-2024-51755](CVE-2024/CVE-2024-517xx/CVE-2024-51755.json) (`2024-11-06T20:15:06.077`)
|
- [CVE-2024-50340](CVE-2024/CVE-2024-503xx/CVE-2024-50340.json) (`2024-11-06T21:15:05.527`)
|
||||||
- [CVE-2024-51757](CVE-2024/CVE-2024-517xx/CVE-2024-51757.json) (`2024-11-06T20:15:06.337`)
|
- [CVE-2024-50341](CVE-2024/CVE-2024-503xx/CVE-2024-50341.json) (`2024-11-06T21:15:05.747`)
|
||||||
- [CVE-2024-51988](CVE-2024/CVE-2024-519xx/CVE-2024-51988.json) (`2024-11-06T20:15:06.513`)
|
- [CVE-2024-50342](CVE-2024/CVE-2024-503xx/CVE-2024-50342.json) (`2024-11-06T21:15:05.963`)
|
||||||
|
- [CVE-2024-50343](CVE-2024/CVE-2024-503xx/CVE-2024-50343.json) (`2024-11-06T21:15:06.180`)
|
||||||
|
- [CVE-2024-50345](CVE-2024/CVE-2024-503xx/CVE-2024-50345.json) (`2024-11-06T21:15:06.383`)
|
||||||
|
- [CVE-2024-51736](CVE-2024/CVE-2024-517xx/CVE-2024-51736.json) (`2024-11-06T21:15:06.600`)
|
||||||
|
|
||||||
|
|
||||||
### CVEs modified in the last Commit
|
### CVEs modified in the last Commit
|
||||||
|
|
||||||
Recently modified CVEs: `65`
|
Recently modified CVEs: `50`
|
||||||
|
|
||||||
- [CVE-2024-48052](CVE-2024/CVE-2024-480xx/CVE-2024-48052.json) (`2024-11-06T20:35:29.830`)
|
- [CVE-2024-26779](CVE-2024/CVE-2024-267xx/CVE-2024-26779.json) (`2024-11-06T22:35:05.993`)
|
||||||
- [CVE-2024-48061](CVE-2024/CVE-2024-480xx/CVE-2024-48061.json) (`2024-11-06T20:35:30.633`)
|
- [CVE-2024-28895](CVE-2024/CVE-2024-288xx/CVE-2024-28895.json) (`2024-11-06T21:35:05.843`)
|
||||||
- [CVE-2024-48463](CVE-2024/CVE-2024-484xx/CVE-2024-48463.json) (`2024-11-06T19:35:17.717`)
|
- [CVE-2024-29948](CVE-2024/CVE-2024-299xx/CVE-2024-29948.json) (`2024-11-06T21:35:06.680`)
|
||||||
- [CVE-2024-48809](CVE-2024/CVE-2024-488xx/CVE-2024-48809.json) (`2024-11-06T19:33:54.977`)
|
- [CVE-2024-30122](CVE-2024/CVE-2024-301xx/CVE-2024-30122.json) (`2024-11-06T22:33:46.797`)
|
||||||
- [CVE-2024-49217](CVE-2024/CVE-2024-492xx/CVE-2024-49217.json) (`2024-11-06T20:53:26.900`)
|
- [CVE-2024-33338](CVE-2024/CVE-2024-333xx/CVE-2024-33338.json) (`2024-11-06T22:35:06.803`)
|
||||||
- [CVE-2024-49219](CVE-2024/CVE-2024-492xx/CVE-2024-49219.json) (`2024-11-06T20:45:08.233`)
|
- [CVE-2024-35835](CVE-2024/CVE-2024-358xx/CVE-2024-35835.json) (`2024-11-06T21:35:07.630`)
|
||||||
- [CVE-2024-49220](CVE-2024/CVE-2024-492xx/CVE-2024-49220.json) (`2024-11-06T20:41:13.367`)
|
- [CVE-2024-36881](CVE-2024/CVE-2024-368xx/CVE-2024-36881.json) (`2024-11-06T22:35:07.757`)
|
||||||
- [CVE-2024-49221](CVE-2024/CVE-2024-492xx/CVE-2024-49221.json) (`2024-11-06T20:54:50.527`)
|
- [CVE-2024-47253](CVE-2024/CVE-2024-472xx/CVE-2024-47253.json) (`2024-11-06T22:23:29.663`)
|
||||||
- [CVE-2024-49223](CVE-2024/CVE-2024-492xx/CVE-2024-49223.json) (`2024-11-06T20:55:37.613`)
|
- [CVE-2024-47254](CVE-2024/CVE-2024-472xx/CVE-2024-47254.json) (`2024-11-06T22:22:01.623`)
|
||||||
- [CVE-2024-49229](CVE-2024/CVE-2024-492xx/CVE-2024-49229.json) (`2024-11-06T20:40:30.740`)
|
- [CVE-2024-47255](CVE-2024/CVE-2024-472xx/CVE-2024-47255.json) (`2024-11-06T22:23:05.770`)
|
||||||
- [CVE-2024-49237](CVE-2024/CVE-2024-492xx/CVE-2024-49237.json) (`2024-11-06T20:33:52.403`)
|
- [CVE-2024-48050](CVE-2024/CVE-2024-480xx/CVE-2024-48050.json) (`2024-11-06T21:35:07.863`)
|
||||||
- [CVE-2024-50637](CVE-2024/CVE-2024-506xx/CVE-2024-50637.json) (`2024-11-06T20:35:33.010`)
|
- [CVE-2024-49370](CVE-2024/CVE-2024-493xx/CVE-2024-49370.json) (`2024-11-06T22:31:30.160`)
|
||||||
- [CVE-2024-51127](CVE-2024/CVE-2024-511xx/CVE-2024-51127.json) (`2024-11-06T19:25:14.607`)
|
- [CVE-2024-49675](CVE-2024/CVE-2024-496xx/CVE-2024-49675.json) (`2024-11-06T22:24:22.907`)
|
||||||
- [CVE-2024-51132](CVE-2024/CVE-2024-511xx/CVE-2024-51132.json) (`2024-11-06T20:35:34.173`)
|
- [CVE-2024-51408](CVE-2024/CVE-2024-514xx/CVE-2024-51408.json) (`2024-11-06T22:06:43.100`)
|
||||||
- [CVE-2024-51136](CVE-2024/CVE-2024-511xx/CVE-2024-51136.json) (`2024-11-06T19:31:15.230`)
|
- [CVE-2024-51626](CVE-2024/CVE-2024-516xx/CVE-2024-51626.json) (`2024-11-06T22:10:20.517`)
|
||||||
- [CVE-2024-51240](CVE-2024/CVE-2024-512xx/CVE-2024-51240.json) (`2024-11-06T20:35:34.963`)
|
- [CVE-2024-51665](CVE-2024/CVE-2024-516xx/CVE-2024-51665.json) (`2024-11-06T22:07:10.707`)
|
||||||
- [CVE-2024-51329](CVE-2024/CVE-2024-513xx/CVE-2024-51329.json) (`2024-11-06T19:19:24.793`)
|
- [CVE-2024-51672](CVE-2024/CVE-2024-516xx/CVE-2024-51672.json) (`2024-11-06T22:08:22.747`)
|
||||||
- [CVE-2024-51362](CVE-2024/CVE-2024-513xx/CVE-2024-51362.json) (`2024-11-06T20:35:35.750`)
|
- [CVE-2024-51677](CVE-2024/CVE-2024-516xx/CVE-2024-51677.json) (`2024-11-06T22:10:31.677`)
|
||||||
- [CVE-2024-51685](CVE-2024/CVE-2024-516xx/CVE-2024-51685.json) (`2024-11-06T19:34:31.590`)
|
- [CVE-2024-51678](CVE-2024/CVE-2024-516xx/CVE-2024-51678.json) (`2024-11-06T22:10:45.103`)
|
||||||
- [CVE-2024-8775](CVE-2024/CVE-2024-87xx/CVE-2024-8775.json) (`2024-11-06T20:15:06.763`)
|
- [CVE-2024-51680](CVE-2024/CVE-2024-516xx/CVE-2024-51680.json) (`2024-11-06T22:10:59.270`)
|
||||||
- [CVE-2024-9341](CVE-2024/CVE-2024-93xx/CVE-2024-9341.json) (`2024-11-06T20:15:06.917`)
|
- [CVE-2024-51681](CVE-2024/CVE-2024-516xx/CVE-2024-51681.json) (`2024-11-06T22:11:16.003`)
|
||||||
- [CVE-2024-9675](CVE-2024/CVE-2024-96xx/CVE-2024-9675.json) (`2024-11-06T20:15:07.083`)
|
- [CVE-2024-51682](CVE-2024/CVE-2024-516xx/CVE-2024-51682.json) (`2024-11-06T22:12:02.353`)
|
||||||
- [CVE-2024-9676](CVE-2024/CVE-2024-96xx/CVE-2024-9676.json) (`2024-11-06T20:15:07.410`)
|
- [CVE-2024-51683](CVE-2024/CVE-2024-516xx/CVE-2024-51683.json) (`2024-11-06T22:12:19.803`)
|
||||||
- [CVE-2024-9689](CVE-2024/CVE-2024-96xx/CVE-2024-9689.json) (`2024-11-06T19:14:53.737`)
|
- [CVE-2024-51757](CVE-2024/CVE-2024-517xx/CVE-2024-51757.json) (`2024-11-06T21:15:06.807`)
|
||||||
- [CVE-2024-9902](CVE-2024/CVE-2024-99xx/CVE-2024-9902.json) (`2024-11-06T20:15:07.820`)
|
- [CVE-2024-5642](CVE-2024/CVE-2024-56xx/CVE-2024-5642.json) (`2024-11-06T21:35:08.690`)
|
||||||
|
|
||||||
|
|
||||||
## Download and Usage
|
## Download and Usage
|
||||||
|
246
_state.csv
246
_state.csv
@ -159311,7 +159311,7 @@ CVE-2020-36760,0,0,d3d6bde66e39bfdfd4a841324d82e511491b3d42fe004f124c54ac6ba8cb5
|
|||||||
CVE-2020-36761,0,0,c2eb02c7f5e6234f0a11001f3ccc54043ed97dd502248791c8d262b51058890e,2023-11-07T03:22:33.597000
|
CVE-2020-36761,0,0,c2eb02c7f5e6234f0a11001f3ccc54043ed97dd502248791c8d262b51058890e,2023-11-07T03:22:33.597000
|
||||||
CVE-2020-36762,0,0,f6173b7fd6f97d18fb02891c23a7c6178aa06e9b134b77ef08cd35cdcdc36681,2024-05-17T01:48:57.747000
|
CVE-2020-36762,0,0,f6173b7fd6f97d18fb02891c23a7c6178aa06e9b134b77ef08cd35cdcdc36681,2024-05-17T01:48:57.747000
|
||||||
CVE-2020-36763,0,0,e42a9e5e88fb81af0859cd97e3a2fb6d19d996764baf3706e8d6074686ad2768,2023-08-04T14:01:30.770000
|
CVE-2020-36763,0,0,e42a9e5e88fb81af0859cd97e3a2fb6d19d996764baf3706e8d6074686ad2768,2023-08-04T14:01:30.770000
|
||||||
CVE-2020-36765,0,1,8f5e53cdfa6de8b7bd007fab9b4b3fa9f738261de98aabc48e6fd805e67dd712,2024-11-06T20:35:02.123000
|
CVE-2020-36765,0,0,8f5e53cdfa6de8b7bd007fab9b4b3fa9f738261de98aabc48e6fd805e67dd712,2024-11-06T20:35:02.123000
|
||||||
CVE-2020-36766,0,0,114009cd5e840397d1acebf053cb444eb4c7cbfbe18f570ae9870647d1e8facf,2023-09-19T21:23:38.407000
|
CVE-2020-36766,0,0,114009cd5e840397d1acebf053cb444eb4c7cbfbe18f570ae9870647d1e8facf,2023-09-19T21:23:38.407000
|
||||||
CVE-2020-36767,0,0,05a3a61dc2792f45359316526a3d616e7f19a025ecb636a8fbad638d49ca9941,2024-09-09T20:35:00.707000
|
CVE-2020-36767,0,0,05a3a61dc2792f45359316526a3d616e7f19a025ecb636a8fbad638d49ca9941,2024-09-09T20:35:00.707000
|
||||||
CVE-2020-36768,0,0,ecc80caa61f3e820e6276ca18cc7a867921e71d907d5691cbc8a6de956bf71d9,2024-05-17T01:48:57.980000
|
CVE-2020-36768,0,0,ecc80caa61f3e820e6276ca18cc7a867921e71d907d5691cbc8a6de956bf71d9,2024-05-17T01:48:57.980000
|
||||||
@ -186998,7 +186998,7 @@ CVE-2021-47071,0,0,b0504ff2034ae0c4cc16202b4cc6e9136ea7ef90af22d96415d8d13f21662
|
|||||||
CVE-2021-47072,0,0,cf41cbf231f55b926ec73e3d5eeef7180bfd709e7f8ced7efd6dbec1d429bdcf,2024-03-01T22:22:25.913000
|
CVE-2021-47072,0,0,cf41cbf231f55b926ec73e3d5eeef7180bfd709e7f8ced7efd6dbec1d429bdcf,2024-03-01T22:22:25.913000
|
||||||
CVE-2021-47073,0,0,55717623a5e4775e6cdba866cbade7342e2c623e9f3852474ccdaf2b36202333,2024-03-01T22:22:25.913000
|
CVE-2021-47073,0,0,55717623a5e4775e6cdba866cbade7342e2c623e9f3852474ccdaf2b36202333,2024-03-01T22:22:25.913000
|
||||||
CVE-2021-47074,0,0,c944055c12bdbb473a00f06ba663e9aa59fbf07805a8b36dc68ca8eaece782c8,2024-03-01T22:22:25.913000
|
CVE-2021-47074,0,0,c944055c12bdbb473a00f06ba663e9aa59fbf07805a8b36dc68ca8eaece782c8,2024-03-01T22:22:25.913000
|
||||||
CVE-2021-47075,0,0,fbef03aac6a8106fd4f4c672eae599661287850b31546fdede7523cd1d19f393,2024-03-01T22:22:25.913000
|
CVE-2021-47075,0,1,27e8af01fd213c49f50653349ef0cf1ed22ebbd4ae6322143077ee7949c385c4,2024-11-06T22:35:00.660000
|
||||||
CVE-2021-47076,0,0,7c8622ce3d2f5da5194ef5fbe7d3dddeb59a9016a2e1d320c327f4bb4eeac7a7,2024-03-01T22:22:25.913000
|
CVE-2021-47076,0,0,7c8622ce3d2f5da5194ef5fbe7d3dddeb59a9016a2e1d320c327f4bb4eeac7a7,2024-03-01T22:22:25.913000
|
||||||
CVE-2021-47077,0,0,094226e13a4d30639d25f36be3dfea47179d6a1794694d0d910952f9e632810a,2024-03-01T22:22:25.913000
|
CVE-2021-47077,0,0,094226e13a4d30639d25f36be3dfea47179d6a1794694d0d910952f9e632810a,2024-03-01T22:22:25.913000
|
||||||
CVE-2021-47078,0,0,e39a645f82e6ef83a23da18377ebefe42c441100a5fd642553de38a4fecea2c2,2024-11-01T08:35:01.573000
|
CVE-2021-47078,0,0,e39a645f82e6ef83a23da18377ebefe42c441100a5fd642553de38a4fecea2c2,2024-11-01T08:35:01.573000
|
||||||
@ -187154,7 +187154,7 @@ CVE-2021-47227,0,0,d58b6e5d0039e2c73e223660c4806a8199d919f5d02b15eb3b8ec0875620e
|
|||||||
CVE-2021-47228,0,0,9c1b787ae52c72cbfb8866da7935ec75c9a82081ae53aec3f3f0cce23cf65a07,2024-10-31T15:35:03.093000
|
CVE-2021-47228,0,0,9c1b787ae52c72cbfb8866da7935ec75c9a82081ae53aec3f3f0cce23cf65a07,2024-10-31T15:35:03.093000
|
||||||
CVE-2021-47229,0,0,fbd2921f2b86842d2838e402054523e81b9ec6072574e295a789287be69873f9,2024-05-21T16:54:26.047000
|
CVE-2021-47229,0,0,fbd2921f2b86842d2838e402054523e81b9ec6072574e295a789287be69873f9,2024-05-21T16:54:26.047000
|
||||||
CVE-2021-47230,0,0,e93bfe980140e197128aeec8d8e071a295e8048bcae174dc11c0f6f8b98f2b67,2024-07-03T01:37:24.797000
|
CVE-2021-47230,0,0,e93bfe980140e197128aeec8d8e071a295e8048bcae174dc11c0f6f8b98f2b67,2024-07-03T01:37:24.797000
|
||||||
CVE-2021-47231,0,1,1256bef4bbc75f826a04367ba6cc6ef92a8f6c223b664e3719ccc68eabc6d142,2024-11-06T20:35:02.850000
|
CVE-2021-47231,0,0,1256bef4bbc75f826a04367ba6cc6ef92a8f6c223b664e3719ccc68eabc6d142,2024-11-06T20:35:02.850000
|
||||||
CVE-2021-47232,0,0,815758cd4f06e69d867d33b6931ac610aa8caffc0e8fb7075a2a9e75b5c2f775,2024-07-03T01:37:25.720000
|
CVE-2021-47232,0,0,815758cd4f06e69d867d33b6931ac610aa8caffc0e8fb7075a2a9e75b5c2f775,2024-07-03T01:37:25.720000
|
||||||
CVE-2021-47233,0,0,835070949da84097217f4d4e5033c3ff72191f49028f7bd22052b56b38fe9b03,2024-05-21T16:54:26.047000
|
CVE-2021-47233,0,0,835070949da84097217f4d4e5033c3ff72191f49028f7bd22052b56b38fe9b03,2024-05-21T16:54:26.047000
|
||||||
CVE-2021-47234,0,0,5e090bb9140802a519feef1c4149d848ac7b86688c14a5e0d7f61b967b2d5c5b,2024-05-21T16:54:26.047000
|
CVE-2021-47234,0,0,5e090bb9140802a519feef1c4149d848ac7b86688c14a5e0d7f61b967b2d5c5b,2024-05-21T16:54:26.047000
|
||||||
@ -187220,7 +187220,7 @@ CVE-2021-47293,0,0,d4175717fac52bdecf0a051eab952d1932ea701c0d180eda92454abd07515
|
|||||||
CVE-2021-47294,0,0,eed110f6ebe2f4f1f995b47d7666e7889aeb7fa2d87e2f53966418b3abc9e4bb,2024-05-21T16:54:26.047000
|
CVE-2021-47294,0,0,eed110f6ebe2f4f1f995b47d7666e7889aeb7fa2d87e2f53966418b3abc9e4bb,2024-05-21T16:54:26.047000
|
||||||
CVE-2021-47295,0,0,013087c79c3f331d9bb419ea80648c1fa718978367791e83c9506e16cd9f49b1,2024-07-03T01:37:35.127000
|
CVE-2021-47295,0,0,013087c79c3f331d9bb419ea80648c1fa718978367791e83c9506e16cd9f49b1,2024-07-03T01:37:35.127000
|
||||||
CVE-2021-47296,0,0,553ad20d7a60522641b80e942c788444f417324fcfe1677518267567a26cc7f8,2024-05-21T16:54:26.047000
|
CVE-2021-47296,0,0,553ad20d7a60522641b80e942c788444f417324fcfe1677518267567a26cc7f8,2024-05-21T16:54:26.047000
|
||||||
CVE-2021-47297,0,1,333805ed4e79f0bc3b67d88c0e6192920afb3fddf5417e17801e321533d44e06,2024-11-06T20:35:03.380000
|
CVE-2021-47297,0,0,333805ed4e79f0bc3b67d88c0e6192920afb3fddf5417e17801e321533d44e06,2024-11-06T20:35:03.380000
|
||||||
CVE-2021-47298,0,0,2a6bc6b6da25d2e397b3047358e3f94e3be86c5fbb66b5f57b8901cb87aa771f,2024-05-21T16:54:26.047000
|
CVE-2021-47298,0,0,2a6bc6b6da25d2e397b3047358e3f94e3be86c5fbb66b5f57b8901cb87aa771f,2024-05-21T16:54:26.047000
|
||||||
CVE-2021-47299,0,0,fba4b9b1cb0e64292a95658fd15d778e7dd5706d84eedb82deb4717ed9433da9,2024-05-21T16:54:26.047000
|
CVE-2021-47299,0,0,fba4b9b1cb0e64292a95658fd15d778e7dd5706d84eedb82deb4717ed9433da9,2024-05-21T16:54:26.047000
|
||||||
CVE-2021-47300,0,0,99d2f09c980dd38f30812bc5dbc2efbb17c499e36ca13769411dcadecf2f2dee,2024-05-21T16:54:26.047000
|
CVE-2021-47300,0,0,99d2f09c980dd38f30812bc5dbc2efbb17c499e36ca13769411dcadecf2f2dee,2024-05-21T16:54:26.047000
|
||||||
@ -187307,7 +187307,7 @@ CVE-2021-47380,0,0,6ef9d8f19e2d391d612177085eea92176c97933b61d761b5b210101aade90
|
|||||||
CVE-2021-47381,0,0,7b85e763b1e6aa964beacb6a095e7a796de91e62f6b651bf54755e15c83c4be4,2024-05-21T16:54:26.047000
|
CVE-2021-47381,0,0,7b85e763b1e6aa964beacb6a095e7a796de91e62f6b651bf54755e15c83c4be4,2024-05-21T16:54:26.047000
|
||||||
CVE-2021-47382,0,0,9902b5f0babaa9562f55cdcd44eda32880d1e10eda3b2384591d56d854c8420d,2024-05-21T16:54:26.047000
|
CVE-2021-47382,0,0,9902b5f0babaa9562f55cdcd44eda32880d1e10eda3b2384591d56d854c8420d,2024-05-21T16:54:26.047000
|
||||||
CVE-2021-47383,0,0,ff2552053b4f1b5e9d4e30daff68cd5b1b4bfd57e3ba2b4b2bab0caff135d3fa,2024-05-21T16:54:26.047000
|
CVE-2021-47383,0,0,ff2552053b4f1b5e9d4e30daff68cd5b1b4bfd57e3ba2b4b2bab0caff135d3fa,2024-05-21T16:54:26.047000
|
||||||
CVE-2021-47384,0,1,2a53cff041f6cd283c6aba6c3e33acbe7cdf32bb789c5688d14d6402d59d7023,2024-11-06T19:35:00.697000
|
CVE-2021-47384,0,0,2a53cff041f6cd283c6aba6c3e33acbe7cdf32bb789c5688d14d6402d59d7023,2024-11-06T19:35:00.697000
|
||||||
CVE-2021-47385,0,0,6010a520bcd7b1504800904e8165de2217ee2ba960dce5e53887b1aaa9581f95,2024-05-21T16:54:26.047000
|
CVE-2021-47385,0,0,6010a520bcd7b1504800904e8165de2217ee2ba960dce5e53887b1aaa9581f95,2024-05-21T16:54:26.047000
|
||||||
CVE-2021-47386,0,0,e158effddd011922f6bb1e239f3ac2ff0958ef62d3ee287d6927aa1acec73135,2024-05-21T16:54:26.047000
|
CVE-2021-47386,0,0,e158effddd011922f6bb1e239f3ac2ff0958ef62d3ee287d6927aa1acec73135,2024-05-21T16:54:26.047000
|
||||||
CVE-2021-47387,0,0,8b75eab51a871e46e57add98c9e15658762b300490120d757b7bbb028d38406c,2024-05-21T16:54:26.047000
|
CVE-2021-47387,0,0,8b75eab51a871e46e57add98c9e15658762b300490120d757b7bbb028d38406c,2024-05-21T16:54:26.047000
|
||||||
@ -187400,7 +187400,7 @@ CVE-2021-47473,0,0,62c8562680eb4c53639001cda404b00fb742f1279f4684ea0674924bae10b
|
|||||||
CVE-2021-47474,0,0,04fd221fb63a425b0cc8651869ddb014996f7867a1d0ff2cdc001afbfca8f702,2024-05-22T12:46:53.887000
|
CVE-2021-47474,0,0,04fd221fb63a425b0cc8651869ddb014996f7867a1d0ff2cdc001afbfca8f702,2024-05-22T12:46:53.887000
|
||||||
CVE-2021-47475,0,0,946afe63fc7669980621eb147080dce8165a487bfe4fc5efdf98c317407e6aed,2024-05-22T12:46:53.887000
|
CVE-2021-47475,0,0,946afe63fc7669980621eb147080dce8165a487bfe4fc5efdf98c317407e6aed,2024-05-22T12:46:53.887000
|
||||||
CVE-2021-47476,0,0,fa51be5b9d9f0fc66eedc2509899a798c0e108eebb09ae670114483c19895964,2024-11-01T15:35:04.050000
|
CVE-2021-47476,0,0,fa51be5b9d9f0fc66eedc2509899a798c0e108eebb09ae670114483c19895964,2024-11-01T15:35:04.050000
|
||||||
CVE-2021-47477,0,1,47f976030f46c20da49f298e5d3296ed2f0af2b5274eb733500f61bef980ebd3,2024-11-06T20:35:03.627000
|
CVE-2021-47477,0,0,47f976030f46c20da49f298e5d3296ed2f0af2b5274eb733500f61bef980ebd3,2024-11-06T20:35:03.627000
|
||||||
CVE-2021-47478,0,0,0c4d619a017b34a9e71fca60c9c78d1369044c99a73f7a9704ccc8d6d4213331,2024-05-22T12:46:53.887000
|
CVE-2021-47478,0,0,0c4d619a017b34a9e71fca60c9c78d1369044c99a73f7a9704ccc8d6d4213331,2024-05-22T12:46:53.887000
|
||||||
CVE-2021-47479,0,0,23846c9680437faaee8b60d655484b75ffbf3f6cfbaddf65bfa876ba4daa07c5,2024-05-22T12:46:53.887000
|
CVE-2021-47479,0,0,23846c9680437faaee8b60d655484b75ffbf3f6cfbaddf65bfa876ba4daa07c5,2024-05-22T12:46:53.887000
|
||||||
CVE-2021-47480,0,0,6fe0bcb80501304551f827c43dc962bcec63fb14686881c0934d1e7cba05e2dc,2024-05-22T12:46:53.887000
|
CVE-2021-47480,0,0,6fe0bcb80501304551f827c43dc962bcec63fb14686881c0934d1e7cba05e2dc,2024-05-22T12:46:53.887000
|
||||||
@ -187509,7 +187509,7 @@ CVE-2021-47582,0,0,a303bc490ed932a1afc5bb4b5129633bc3034bcabff4864f9a509289f08af
|
|||||||
CVE-2021-47583,0,0,31fa0416a87d3ac15f0275ea6141b29b416ea02761d8c7a0b7bebf09c972c897,2024-06-20T12:43:25.663000
|
CVE-2021-47583,0,0,31fa0416a87d3ac15f0275ea6141b29b416ea02761d8c7a0b7bebf09c972c897,2024-06-20T12:43:25.663000
|
||||||
CVE-2021-47584,0,0,5e297524c53687d7062f536fc4ebf0eec9dd59e0e1b8ce2a1565481a5d020832,2024-08-19T18:35:20.133000
|
CVE-2021-47584,0,0,5e297524c53687d7062f536fc4ebf0eec9dd59e0e1b8ce2a1565481a5d020832,2024-08-19T18:35:20.133000
|
||||||
CVE-2021-47585,0,0,ce01987df681397de7d54893e5efcb2392f1d920c4c52cb4fe8e15c2b35f81ff,2024-08-19T18:29:03.543000
|
CVE-2021-47585,0,0,ce01987df681397de7d54893e5efcb2392f1d920c4c52cb4fe8e15c2b35f81ff,2024-08-19T18:29:03.543000
|
||||||
CVE-2021-47586,0,1,9999b29ebc4be5f8da91519ea116e955bba1883cec7a48554f483b4ba00be485,2024-11-06T20:35:03.827000
|
CVE-2021-47586,0,0,9999b29ebc4be5f8da91519ea116e955bba1883cec7a48554f483b4ba00be485,2024-11-06T20:35:03.827000
|
||||||
CVE-2021-47587,0,0,87a6481c75c4ef2a3e6251612b5954051141159c9762a4879438fd1aa646fa0c,2024-11-01T15:10:35.867000
|
CVE-2021-47587,0,0,87a6481c75c4ef2a3e6251612b5954051141159c9762a4879438fd1aa646fa0c,2024-11-01T15:10:35.867000
|
||||||
CVE-2021-47588,0,0,0f7c2ddebf5230cc4da6aa5555c1f5261002923073136fff5e4910d65af55ae8,2024-06-20T12:43:25.663000
|
CVE-2021-47588,0,0,0f7c2ddebf5230cc4da6aa5555c1f5261002923073136fff5e4910d65af55ae8,2024-06-20T12:43:25.663000
|
||||||
CVE-2021-47589,0,0,90b76d41b40e586a29ff9e2db3957fc07fd2120cba5363d84fdec4e79fc74d37,2024-08-27T03:16:19
|
CVE-2021-47589,0,0,90b76d41b40e586a29ff9e2db3957fc07fd2120cba5363d84fdec4e79fc74d37,2024-08-27T03:16:19
|
||||||
@ -216927,7 +216927,7 @@ CVE-2023-22586,0,0,c0f6f379862442d3ccd46f1d01f35b2a6cd6c71022a896121eb7f131c67a1
|
|||||||
CVE-2023-2259,0,0,9259ad9ceae0c8c1f4c656af51f2c18472350b622766660808a6aa2eb69bd018,2023-05-03T20:01:59.110000
|
CVE-2023-2259,0,0,9259ad9ceae0c8c1f4c656af51f2c18472350b622766660808a6aa2eb69bd018,2023-05-03T20:01:59.110000
|
||||||
CVE-2023-22591,0,0,75da081719215e85b169466ab96fafbcbf7d54cd5859377961ad331a00e45425,2023-11-07T04:07:04.387000
|
CVE-2023-22591,0,0,75da081719215e85b169466ab96fafbcbf7d54cd5859377961ad331a00e45425,2023-11-07T04:07:04.387000
|
||||||
CVE-2023-22592,0,0,82b28f4ba2eac1f90837e550befeb0c1e0dcb9f94216a05d29c70063cff743b9,2023-11-07T04:07:04.477000
|
CVE-2023-22592,0,0,82b28f4ba2eac1f90837e550befeb0c1e0dcb9f94216a05d29c70063cff743b9,2023-11-07T04:07:04.477000
|
||||||
CVE-2023-22593,0,1,857bc2f70352828bb2de5e8a29e130b4a49b0e8b05230cc04409046b66a53189,2024-11-06T19:35:01.273000
|
CVE-2023-22593,0,0,857bc2f70352828bb2de5e8a29e130b4a49b0e8b05230cc04409046b66a53189,2024-11-06T19:35:01.273000
|
||||||
CVE-2023-22594,0,0,e7b22226fc5536c38dc1bfa9b8608c26d55fce01972e039872a3a3f6d24cb664,2023-11-07T04:07:04.730000
|
CVE-2023-22594,0,0,e7b22226fc5536c38dc1bfa9b8608c26d55fce01972e039872a3a3f6d24cb664,2023-11-07T04:07:04.730000
|
||||||
CVE-2023-22595,0,0,87c19ed494799c85280ecc5603d2d131eb58c4866c8bd25864baeef2d8d8a9b8,2023-08-04T17:25:00.243000
|
CVE-2023-22595,0,0,87c19ed494799c85280ecc5603d2d131eb58c4866c8bd25864baeef2d8d8a9b8,2023-08-04T17:25:00.243000
|
||||||
CVE-2023-22597,0,0,c5b8c532ce487ca0c3338f3c64fe075c749ce4ed59b601364427efe8a3f912d0,2023-11-07T04:07:04.990000
|
CVE-2023-22597,0,0,c5b8c532ce487ca0c3338f3c64fe075c749ce4ed59b601364427efe8a3f912d0,2023-11-07T04:07:04.990000
|
||||||
@ -223003,7 +223003,7 @@ CVE-2023-30307,0,0,9a4646bb9568f252fc01074e511568fce5daa83ca6ffc95bb5a8dd9c13ef0
|
|||||||
CVE-2023-30308,0,0,3194094e704a260b61b3aca71ad9525f4004c473c591db53bbad11ae33f61923,2024-05-29T13:02:09.280000
|
CVE-2023-30308,0,0,3194094e704a260b61b3aca71ad9525f4004c473c591db53bbad11ae33f61923,2024-05-29T13:02:09.280000
|
||||||
CVE-2023-30309,0,0,7bed2cc00d974c0f21981e002db05aa1d9c9bb6eea8a85e53b56492f139e3535,2024-05-29T13:02:09.280000
|
CVE-2023-30309,0,0,7bed2cc00d974c0f21981e002db05aa1d9c9bb6eea8a85e53b56492f139e3535,2024-05-29T13:02:09.280000
|
||||||
CVE-2023-3031,0,0,10c1f10cf1613bd0a1bbf7200771584bf6866fde631eac26533eb7c4ae501aea,2023-06-12T16:48:57.833000
|
CVE-2023-3031,0,0,10c1f10cf1613bd0a1bbf7200771584bf6866fde631eac26533eb7c4ae501aea,2023-06-12T16:48:57.833000
|
||||||
CVE-2023-30310,0,1,b64f22995dd6d4cf998abebda15f2f520a185af33c13f85f861bcf5fd0b99ea3,2024-11-06T20:35:04.160000
|
CVE-2023-30310,0,0,b64f22995dd6d4cf998abebda15f2f520a185af33c13f85f861bcf5fd0b99ea3,2024-11-06T20:35:04.160000
|
||||||
CVE-2023-30311,0,0,38ed413270d757fa6e6b0203aef5d67e96c045e85b6d145080f9751d7548d7fb,2024-08-20T19:35:00.850000
|
CVE-2023-30311,0,0,38ed413270d757fa6e6b0203aef5d67e96c045e85b6d145080f9751d7548d7fb,2024-08-20T19:35:00.850000
|
||||||
CVE-2023-30312,0,0,9bb840b5e08cc8b26537ea87c8910725e38e1ad08fef8fe39b89eeab371027a8,2024-06-19T04:15:10.477000
|
CVE-2023-30312,0,0,9bb840b5e08cc8b26537ea87c8910725e38e1ad08fef8fe39b89eeab371027a8,2024-06-19T04:15:10.477000
|
||||||
CVE-2023-30313,0,0,2cb0a9aa3f78a13a6e0375a643da2654e262a035ecaa4ef4f0a18ff3448b0de1,2024-11-05T21:35:00.983000
|
CVE-2023-30313,0,0,2cb0a9aa3f78a13a6e0375a643da2654e262a035ecaa4ef4f0a18ff3448b0de1,2024-11-05T21:35:00.983000
|
||||||
@ -230498,7 +230498,7 @@ CVE-2023-4011,0,0,ff845b3bec6fa1ec7ec6e3f06d521b3f25d1051621eed84e2a9da8c89b74f8
|
|||||||
CVE-2023-40110,0,0,cec4af71facc1cc987deceb5b2ce57911065506adb95057b276212cf5b36338b,2024-08-22T14:35:01.077000
|
CVE-2023-40110,0,0,cec4af71facc1cc987deceb5b2ce57911065506adb95057b276212cf5b36338b,2024-08-22T14:35:01.077000
|
||||||
CVE-2023-40111,0,0,7ef7fdb4bf5f59a65adc27a98870222810b4869fe47d231ee6164556414c6387,2024-08-26T18:35:02.257000
|
CVE-2023-40111,0,0,7ef7fdb4bf5f59a65adc27a98870222810b4869fe47d231ee6164556414c6387,2024-08-26T18:35:02.257000
|
||||||
CVE-2023-40112,0,0,3e814fd548a907e629b136506543b20b0c8bf4457d1103cb293d5b1296af5322,2024-10-31T14:35:03.023000
|
CVE-2023-40112,0,0,3e814fd548a907e629b136506543b20b0c8bf4457d1103cb293d5b1296af5322,2024-10-31T14:35:03.023000
|
||||||
CVE-2023-40113,0,0,dad3819774db3e875db7c132fed9de97c7d6741efc9f62a28c01187a90cb75bc,2024-02-16T13:37:55.033000
|
CVE-2023-40113,0,1,3853dba4c9b94994cc638ea53bf05fb88a4a7ea3a12c121e5a59c2e1bb350fae,2024-11-06T21:35:01.543000
|
||||||
CVE-2023-40114,0,0,e6aec33bc1c8bc322f8db56fa5435f1230eb43cb85d03f30ffc4d82fb9d7da4e,2024-08-15T18:35:04
|
CVE-2023-40114,0,0,e6aec33bc1c8bc322f8db56fa5435f1230eb43cb85d03f30ffc4d82fb9d7da4e,2024-08-15T18:35:04
|
||||||
CVE-2023-40115,0,0,6ad67ef2c7829749737245dfadc3fcfd57b4fbfd7581d4abd8672c61e42143e0,2024-08-01T13:44:27.970000
|
CVE-2023-40115,0,0,6ad67ef2c7829749737245dfadc3fcfd57b4fbfd7581d4abd8672c61e42143e0,2024-08-01T13:44:27.970000
|
||||||
CVE-2023-40116,0,0,fd7eabcb426fa5f4a29a166c8edb69a1f9a74a2f45f7b71a79b11321ea6b7183,2023-10-30T17:12:54.827000
|
CVE-2023-40116,0,0,fd7eabcb426fa5f4a29a166c8edb69a1f9a74a2f45f7b71a79b11321ea6b7183,2023-10-30T17:12:54.827000
|
||||||
@ -230783,7 +230783,7 @@ CVE-2023-40435,0,0,e7be1f239c3863a0eba73a76429a8b96807d5e85645d6b427822282e8a79d
|
|||||||
CVE-2023-40436,0,0,9151fd8967ecc0125396416ce982a67888cf21bc1634d6a6aeba9d57e0d2aeb5,2024-09-25T01:35:59.353000
|
CVE-2023-40436,0,0,9151fd8967ecc0125396416ce982a67888cf21bc1634d6a6aeba9d57e0d2aeb5,2024-09-25T01:35:59.353000
|
||||||
CVE-2023-40437,0,0,6941cb0456cc33ca3d33bbc99082f1df62f86f849fa6869631ecd6102a6298f7,2024-01-17T19:06:18.080000
|
CVE-2023-40437,0,0,6941cb0456cc33ca3d33bbc99082f1df62f86f849fa6869631ecd6102a6298f7,2024-01-17T19:06:18.080000
|
||||||
CVE-2023-40438,0,0,08d009f7555bd3b6180dbaf950da9c59b188e58a9caa39b2a01d3c280b373e23,2024-01-16T23:51:13.887000
|
CVE-2023-40438,0,0,08d009f7555bd3b6180dbaf950da9c59b188e58a9caa39b2a01d3c280b373e23,2024-01-16T23:51:13.887000
|
||||||
CVE-2023-40439,0,1,b59cf437acb175533643b5177fc84a9280077b61c863a7e6b1de22da28602d1e,2024-11-06T20:35:05.490000
|
CVE-2023-40439,0,0,b59cf437acb175533643b5177fc84a9280077b61c863a7e6b1de22da28602d1e,2024-11-06T20:35:05.490000
|
||||||
CVE-2023-40440,0,0,29069b9d0f2624195a3a6c5e937d855493bae53f7b8c7e0b2b74aba07a7e4e39,2024-01-30T21:15:08.517000
|
CVE-2023-40440,0,0,29069b9d0f2624195a3a6c5e937d855493bae53f7b8c7e0b2b74aba07a7e4e39,2024-01-30T21:15:08.517000
|
||||||
CVE-2023-40441,0,0,865a7fe67a1e12c20a0e54c9b60b5fddd74e863be31e8f7e01a43397e40c2016,2023-10-12T02:26:57.743000
|
CVE-2023-40441,0,0,865a7fe67a1e12c20a0e54c9b60b5fddd74e863be31e8f7e01a43397e40c2016,2023-10-12T02:26:57.743000
|
||||||
CVE-2023-40442,0,0,371a54a2886702bdd120ac95d0338c00531e4b44258cb23feb2e8e3ccda1d1c1,2023-12-22T16:10:36.647000
|
CVE-2023-40442,0,0,371a54a2886702bdd120ac95d0338c00531e4b44258cb23feb2e8e3ccda1d1c1,2023-12-22T16:10:36.647000
|
||||||
@ -232591,7 +232591,7 @@ CVE-2023-4283,0,0,40c39331048450495c644559b354ee713768185b93e1269a4c183c39135e4c
|
|||||||
CVE-2023-42830,0,0,9622822082e6d489decb51a66ff30e0a25a850d4f889ef38731f27c29845d8f1,2024-01-17T20:56:33.957000
|
CVE-2023-42830,0,0,9622822082e6d489decb51a66ff30e0a25a850d4f889ef38731f27c29845d8f1,2024-01-17T20:56:33.957000
|
||||||
CVE-2023-42831,0,0,15c2657a6cda93c32bf9e6d0e8961db6424b2c5d0a3a331db0a572f126ae013e,2024-01-17T20:51:35.577000
|
CVE-2023-42831,0,0,15c2657a6cda93c32bf9e6d0e8961db6424b2c5d0a3a331db0a572f126ae013e,2024-01-17T20:51:35.577000
|
||||||
CVE-2023-42832,0,0,d4139f8d7ebcb6dbe3f816f6f2093afb5b55323ca863cc15652de2caab2f0de4,2024-01-17T21:16:29.277000
|
CVE-2023-42832,0,0,d4139f8d7ebcb6dbe3f816f6f2093afb5b55323ca863cc15652de2caab2f0de4,2024-01-17T21:16:29.277000
|
||||||
CVE-2023-42833,0,1,e734eedae2bb752eeb00548b60901154a053eb23181a33e00797702140032cb8,2024-11-06T20:35:06.280000
|
CVE-2023-42833,0,0,e734eedae2bb752eeb00548b60901154a053eb23181a33e00797702140032cb8,2024-11-06T20:35:06.280000
|
||||||
CVE-2023-42834,0,0,08d87def638a26a5eb9093b6708a8eacf657bb89462798c60d907ee1b3410e44,2024-11-06T15:35:05.580000
|
CVE-2023-42834,0,0,08d87def638a26a5eb9093b6708a8eacf657bb89462798c60d907ee1b3410e44,2024-11-06T15:35:05.580000
|
||||||
CVE-2023-42835,0,0,78785fec11e2de3eca12998532cc4e293a664be2c1386edf69f250c848f4be97,2024-02-22T19:07:27.197000
|
CVE-2023-42835,0,0,78785fec11e2de3eca12998532cc4e293a664be2c1386edf69f250c848f4be97,2024-02-22T19:07:27.197000
|
||||||
CVE-2023-42836,0,0,57dd9f5214333cc32869174710fab8ff9c58d3ed310e22708cf2b23e79addefb,2024-02-22T19:07:27.197000
|
CVE-2023-42836,0,0,57dd9f5214333cc32869174710fab8ff9c58d3ed310e22708cf2b23e79addefb,2024-02-22T19:07:27.197000
|
||||||
@ -234666,7 +234666,7 @@ CVE-2023-46045,0,0,0e8abce2cbeee2bf608426602c7398443e9d61c9d45f545bf4f725e813250
|
|||||||
CVE-2023-46046,0,0,555b8b8a7696393805aad9f9e82bc3d251f1a10afcfafafc77a77e46b5bc656d,2024-11-05T16:35:04.913000
|
CVE-2023-46046,0,0,555b8b8a7696393805aad9f9e82bc3d251f1a10afcfafafc77a77e46b5bc656d,2024-11-05T16:35:04.913000
|
||||||
CVE-2023-46047,0,0,c24e10e557ef6edbf0ab7d162e7557ecb1baed06f8bacef6ed95114dbb222d99,2024-08-22T18:35:01.467000
|
CVE-2023-46047,0,0,c24e10e557ef6edbf0ab7d162e7557ecb1baed06f8bacef6ed95114dbb222d99,2024-08-22T18:35:01.467000
|
||||||
CVE-2023-46048,0,0,fdc0cbd47578c151a3373264bac42e14fbe5938d1d4d2542c8c29ee6e1717908,2024-08-19T19:35:04.860000
|
CVE-2023-46048,0,0,fdc0cbd47578c151a3373264bac42e14fbe5938d1d4d2542c8c29ee6e1717908,2024-08-19T19:35:04.860000
|
||||||
CVE-2023-46049,0,0,2315016d1ba4bba7f533371cd70ec259060eaeb7a90fd1662a78c0e2eff24ad7,2024-08-02T21:15:49.197000
|
CVE-2023-46049,0,1,8e6f7b6c7a7eac9ea78c6ce3bd00ffa3c645397b30e7e0d1d00f973f47c0bc45,2024-11-06T22:35:01.887000
|
||||||
CVE-2023-4605,0,0,4ca1198891ef7f19a4427afe916541ae6cc98eedaf95349b4181266b8438d380,2024-04-08T18:49:25.863000
|
CVE-2023-4605,0,0,4ca1198891ef7f19a4427afe916541ae6cc98eedaf95349b4181266b8438d380,2024-04-08T18:49:25.863000
|
||||||
CVE-2023-46050,0,0,87b655fafc2924f1174e71a2efa862ed9e13b897c527143d58a0e534f2058a50,2024-01-29T09:15:42.640000
|
CVE-2023-46050,0,0,87b655fafc2924f1174e71a2efa862ed9e13b897c527143d58a0e534f2058a50,2024-01-29T09:15:42.640000
|
||||||
CVE-2023-46051,0,0,2eb4bb56bef8fa961b472990c5ab8fe369fd9c4072f6f002726f3dd2b9de96c0,2024-08-02T21:15:49.273000
|
CVE-2023-46051,0,0,2eb4bb56bef8fa961b472990c5ab8fe369fd9c4072f6f002726f3dd2b9de96c0,2024-08-02T21:15:49.273000
|
||||||
@ -237221,7 +237221,7 @@ CVE-2023-49508,0,0,04e9a38738b4cc108d703febb2c252d26aa82baa13d5ac7cd4f3585b5914b
|
|||||||
CVE-2023-4951,0,0,a18642f9510452464e8d9524da7c3caa32fc5ff59f81d45c2b207c937616ee68,2023-09-22T15:15:14.253000
|
CVE-2023-4951,0,0,a18642f9510452464e8d9524da7c3caa32fc5ff59f81d45c2b207c937616ee68,2023-09-22T15:15:14.253000
|
||||||
CVE-2023-49515,0,0,fba6ae4b9dbda87bf77d58079d1e7fdc5597e983326dac218dacc086c68e81b6,2024-07-03T01:42:36.150000
|
CVE-2023-49515,0,0,fba6ae4b9dbda87bf77d58079d1e7fdc5597e983326dac218dacc086c68e81b6,2024-07-03T01:42:36.150000
|
||||||
CVE-2023-49528,0,0,bcff757c4ee07f22736afa13a889e6d02ee86ae241b71b1c98b3c18a1dcdacf5,2024-07-03T01:42:36.973000
|
CVE-2023-49528,0,0,bcff757c4ee07f22736afa13a889e6d02ee86ae241b71b1c98b3c18a1dcdacf5,2024-07-03T01:42:36.973000
|
||||||
CVE-2023-49539,0,1,e1d330f05b14a326f19ff77ceaae494168e128af031cec81933a24aa6c4e263b,2024-11-06T20:35:07.133000
|
CVE-2023-49539,0,0,e1d330f05b14a326f19ff77ceaae494168e128af031cec81933a24aa6c4e263b,2024-11-06T20:35:07.133000
|
||||||
CVE-2023-49540,0,0,fc00996658e2e1a07b2142617d49b74a28a84c9993046a375e13324fccec29b2,2024-08-06T16:35:02.663000
|
CVE-2023-49540,0,0,fc00996658e2e1a07b2142617d49b74a28a84c9993046a375e13324fccec29b2,2024-08-06T16:35:02.663000
|
||||||
CVE-2023-49543,0,0,5e9a28d34c8c9dccbca41948423cad2a9c85e5bdcb29ea577934b5fccba83d1b,2024-08-28T20:35:04.473000
|
CVE-2023-49543,0,0,5e9a28d34c8c9dccbca41948423cad2a9c85e5bdcb29ea577934b5fccba83d1b,2024-08-28T20:35:04.473000
|
||||||
CVE-2023-49544,0,0,4165df005ca812878112fcb221906d65322102731e6bd43d48afbe4e5ae39573,2024-08-01T13:45:11.667000
|
CVE-2023-49544,0,0,4165df005ca812878112fcb221906d65322102731e6bd43d48afbe4e5ae39573,2024-08-01T13:45:11.667000
|
||||||
@ -239131,7 +239131,7 @@ CVE-2023-5243,0,0,e49838102a5721a273506f040a2a95bdeca1c43c3e414141d5a1a29f3ab700
|
|||||||
CVE-2023-52430,0,0,9b119fede2bb0d45c16cf06aac5c3bb465a163e763f0ae820658b0f4e7b632b3,2024-10-16T13:11:53.423000
|
CVE-2023-52430,0,0,9b119fede2bb0d45c16cf06aac5c3bb465a163e763f0ae820658b0f4e7b632b3,2024-10-16T13:11:53.423000
|
||||||
CVE-2023-52431,0,0,c64a02a0cf6c92acef7a3c67de07bba1d63a180e819e78f76030c959fd7430a0,2024-10-21T20:19:07.513000
|
CVE-2023-52431,0,0,c64a02a0cf6c92acef7a3c67de07bba1d63a180e819e78f76030c959fd7430a0,2024-10-21T20:19:07.513000
|
||||||
CVE-2023-52432,0,0,33470768b31e3ca42f4e91386984f89611d22bbf917c9270afe6f040d18c0aa7,2024-03-05T13:41:01.900000
|
CVE-2023-52432,0,0,33470768b31e3ca42f4e91386984f89611d22bbf917c9270afe6f040d18c0aa7,2024-03-05T13:41:01.900000
|
||||||
CVE-2023-52433,0,0,5c95197bc729cebc3540e26fddb8edd3d3fb52d95160d4c0a67697d37cf469ee,2024-06-16T13:15:50.413000
|
CVE-2023-52433,0,1,8d887de26d6dfe68d81d2421f14cfca93fcdcdb99a18edd116f8f8ba1a152a5e,2024-11-06T22:35:02.950000
|
||||||
CVE-2023-52434,0,0,5f6421438d786a20a52ed0cde51449021705adf52d40bb4e366d1e2bfbcf89c9,2024-11-04T13:16:26.490000
|
CVE-2023-52434,0,0,5f6421438d786a20a52ed0cde51449021705adf52d40bb4e366d1e2bfbcf89c9,2024-11-04T13:16:26.490000
|
||||||
CVE-2023-52435,0,0,ae7b4fd4a171fec756dcf7f16bf33027a1ed1befebaf9b2d2ac0547ee44f8075,2024-09-04T12:15:03.967000
|
CVE-2023-52435,0,0,ae7b4fd4a171fec756dcf7f16bf33027a1ed1befebaf9b2d2ac0547ee44f8075,2024-09-04T12:15:03.967000
|
||||||
CVE-2023-52436,0,0,5082d9a933f70907f213f656684b4963f01c1f95bdc79d48ebfb69bdc95b2335,2024-11-04T13:16:27.173000
|
CVE-2023-52436,0,0,5082d9a933f70907f213f656684b4963f01c1f95bdc79d48ebfb69bdc95b2335,2024-11-04T13:16:27.173000
|
||||||
@ -239195,7 +239195,7 @@ CVE-2023-52489,0,0,8691663f32e0b87d6090652a9eefea760ece79f0cb2b6e57db1f7a8a5adc6
|
|||||||
CVE-2023-5249,0,0,902c33c9dbd28cbe5075a17fccde01699ae9f0ae88d9ebb42328197dcacfdffa,2024-07-03T01:44:12.613000
|
CVE-2023-5249,0,0,902c33c9dbd28cbe5075a17fccde01699ae9f0ae88d9ebb42328197dcacfdffa,2024-07-03T01:44:12.613000
|
||||||
CVE-2023-52490,0,0,5497ebcc533be995a69bc10424afce569aa011a4c97808cf492ed3f54baa7ba5,2024-03-12T12:40:13.500000
|
CVE-2023-52490,0,0,5497ebcc533be995a69bc10424afce569aa011a4c97808cf492ed3f54baa7ba5,2024-03-12T12:40:13.500000
|
||||||
CVE-2023-52491,0,0,a9def7af26959496f75588e8fbb8ad6e1b25e764e66a488bb14f62e906c4089f,2024-11-04T13:16:34.917000
|
CVE-2023-52491,0,0,a9def7af26959496f75588e8fbb8ad6e1b25e764e66a488bb14f62e906c4089f,2024-11-04T13:16:34.917000
|
||||||
CVE-2023-52492,0,1,6cb2ff207cf9aafb6090c129739c6d74d7c082df5985572149d2b1df87d0d5d4,2024-11-06T19:35:03.290000
|
CVE-2023-52492,0,0,6cb2ff207cf9aafb6090c129739c6d74d7c082df5985572149d2b1df87d0d5d4,2024-11-06T19:35:03.290000
|
||||||
CVE-2023-52493,0,0,0056ac7b9a11ed734aa93836878423f074f7718f5ce8771fef288d1615f0aa89,2024-11-04T13:16:35.103000
|
CVE-2023-52493,0,0,0056ac7b9a11ed734aa93836878423f074f7718f5ce8771fef288d1615f0aa89,2024-11-04T13:16:35.103000
|
||||||
CVE-2023-52494,0,0,ebe1d617d77329a0d9d56d0d6535311cfe7daa23b2498c41c7e912bcfaf261f7,2024-03-12T12:40:13.500000
|
CVE-2023-52494,0,0,ebe1d617d77329a0d9d56d0d6535311cfe7daa23b2498c41c7e912bcfaf261f7,2024-03-12T12:40:13.500000
|
||||||
CVE-2023-52495,0,0,c36feeccb5858e992af880f22a6164098203cb8ff165c7874d7ea3bb185fac52,2024-03-12T12:40:13.500000
|
CVE-2023-52495,0,0,c36feeccb5858e992af880f22a6164098203cb8ff165c7874d7ea3bb185fac52,2024-03-12T12:40:13.500000
|
||||||
@ -239216,7 +239216,7 @@ CVE-2023-52508,0,0,3df95157cefd88c2c70c60dc2487d4ca580bfd7d3fdbe934143d84c8e721d
|
|||||||
CVE-2023-52509,0,0,bcfcbf5df8dadb5c77febe775be16b48e4efcb0ae7858106717d3661c9712efd,2024-03-04T13:58:23.447000
|
CVE-2023-52509,0,0,bcfcbf5df8dadb5c77febe775be16b48e4efcb0ae7858106717d3661c9712efd,2024-03-04T13:58:23.447000
|
||||||
CVE-2023-5251,0,0,de8655b38a30642065bb297eb9a35bac6ebd60f43a29d54f33ad99175564509f,2023-11-08T02:15:53.437000
|
CVE-2023-5251,0,0,de8655b38a30642065bb297eb9a35bac6ebd60f43a29d54f33ad99175564509f,2023-11-08T02:15:53.437000
|
||||||
CVE-2023-52510,0,0,b0381f94ad157bbb54ab8605627db382c3f938399b2f02a5029ba8865071a1c0,2024-03-04T13:58:23.447000
|
CVE-2023-52510,0,0,b0381f94ad157bbb54ab8605627db382c3f938399b2f02a5029ba8865071a1c0,2024-03-04T13:58:23.447000
|
||||||
CVE-2023-52511,0,1,01296eb26594b1e185bb600b7dc924facb05b3ec05d3adb36dc6800174e05e0a,2024-11-06T19:35:04.233000
|
CVE-2023-52511,0,0,01296eb26594b1e185bb600b7dc924facb05b3ec05d3adb36dc6800174e05e0a,2024-11-06T19:35:04.233000
|
||||||
CVE-2023-52512,0,0,7596373f786b6636f89cf16d29f325de01a9f27b0c6ad0696e922063bc5589ad,2024-11-06T16:35:07.700000
|
CVE-2023-52512,0,0,7596373f786b6636f89cf16d29f325de01a9f27b0c6ad0696e922063bc5589ad,2024-11-06T16:35:07.700000
|
||||||
CVE-2023-52513,0,0,68cace4cbac4420bddff285689d43b129b233d8af8a4ea35d26ac73dcbdfbb33,2024-03-04T13:58:23.447000
|
CVE-2023-52513,0,0,68cace4cbac4420bddff285689d43b129b233d8af8a4ea35d26ac73dcbdfbb33,2024-03-04T13:58:23.447000
|
||||||
CVE-2023-52514,0,0,96b3bc37b65a7f0f11caed4828897554155b5e08fde97001434005eb59164e32,2024-03-11T16:15:07.720000
|
CVE-2023-52514,0,0,96b3bc37b65a7f0f11caed4828897554155b5e08fde97001434005eb59164e32,2024-03-11T16:15:07.720000
|
||||||
@ -239228,7 +239228,7 @@ CVE-2023-52519,0,0,f79ce1035763550ef6afb964f7e85392eec938c2001b022078a43182525a6
|
|||||||
CVE-2023-5252,0,0,10f9996951457224cec75839d378c1d5a53db0da5cae33c9f9a6fc2136cd44f0,2023-11-08T02:12:53.770000
|
CVE-2023-5252,0,0,10f9996951457224cec75839d378c1d5a53db0da5cae33c9f9a6fc2136cd44f0,2023-11-08T02:12:53.770000
|
||||||
CVE-2023-52520,0,0,dfb6be84ae9c08b205a8ea51f3a7f126c8fb64615069ff5cb9d3b51cb43ee2ef,2024-03-04T13:58:23.447000
|
CVE-2023-52520,0,0,dfb6be84ae9c08b205a8ea51f3a7f126c8fb64615069ff5cb9d3b51cb43ee2ef,2024-03-04T13:58:23.447000
|
||||||
CVE-2023-52521,0,0,26ba094f0a43e00b237fc666ea879d557b221b56ad6aeee17c07d7717bd0e4ca,2024-03-05T23:15:07.310000
|
CVE-2023-52521,0,0,26ba094f0a43e00b237fc666ea879d557b221b56ad6aeee17c07d7717bd0e4ca,2024-03-05T23:15:07.310000
|
||||||
CVE-2023-52522,0,1,b1ecf17729bb9b74f5dbf3546ec9de2d3c642cfd4f217702cac9956b0311d2f8,2024-11-06T20:35:08.150000
|
CVE-2023-52522,0,0,b1ecf17729bb9b74f5dbf3546ec9de2d3c642cfd4f217702cac9956b0311d2f8,2024-11-06T20:35:08.150000
|
||||||
CVE-2023-52523,0,0,2b8f78f901e030e63d8c8eb5395447753b7ff2211824258bf99a381a11aba125,2024-03-04T13:58:23.447000
|
CVE-2023-52523,0,0,2b8f78f901e030e63d8c8eb5395447753b7ff2211824258bf99a381a11aba125,2024-03-04T13:58:23.447000
|
||||||
CVE-2023-52524,0,0,2bb0786e3a461d7ca7f8c1c896ee359596adb6bf330c48f435cd78777cce4c48,2024-03-04T13:58:23.447000
|
CVE-2023-52524,0,0,2bb0786e3a461d7ca7f8c1c896ee359596adb6bf330c48f435cd78777cce4c48,2024-03-04T13:58:23.447000
|
||||||
CVE-2023-52525,0,0,da29f7fd4e888e13fc450d9b347a550d2ef7908097fa7df01f2173b5c063b678,2024-04-04T14:15:09.130000
|
CVE-2023-52525,0,0,da29f7fd4e888e13fc450d9b347a550d2ef7908097fa7df01f2173b5c063b678,2024-04-04T14:15:09.130000
|
||||||
@ -239333,10 +239333,10 @@ CVE-2023-52614,0,0,d94968612236477bba7745eee64229fa912817c484efb1fca20359c970e9a
|
|||||||
CVE-2023-52615,0,0,749d512f79fef77d3fdca4cad7a7699f201211b1e7d2e923a5efa04789e1232b,2024-11-04T13:16:41.400000
|
CVE-2023-52615,0,0,749d512f79fef77d3fdca4cad7a7699f201211b1e7d2e923a5efa04789e1232b,2024-11-04T13:16:41.400000
|
||||||
CVE-2023-52616,0,0,dbf5b5c019f95e9f7e084e0052b1042c7b0204698debded51abfbb51fcf5bc41,2024-11-04T13:16:41.497000
|
CVE-2023-52616,0,0,dbf5b5c019f95e9f7e084e0052b1042c7b0204698debded51abfbb51fcf5bc41,2024-11-04T13:16:41.497000
|
||||||
CVE-2023-52617,0,0,4fdfa9fe396d100d9c46a2a78e479a182caae5cbb210cbb8a5ff9c9c9bce0255,2024-11-04T13:16:41.580000
|
CVE-2023-52617,0,0,4fdfa9fe396d100d9c46a2a78e479a182caae5cbb210cbb8a5ff9c9c9bce0255,2024-11-04T13:16:41.580000
|
||||||
CVE-2023-52618,0,0,28dfc591ae56b48f3e0ad097b4f43795724cf80136fbe5fa2e6d19df668b08d0,2024-11-04T13:16:41.660000
|
CVE-2023-52618,0,1,e99ffc5626a291ed7c9ac4eb79c56c6a064fd62237f676b60250fcf88da7dacc,2024-11-06T22:35:03.783000
|
||||||
CVE-2023-52619,0,0,20a7bb0cb2eaa7fa51742374ca05d5bd7fdb36e86539d53100b75675b035a409,2024-11-04T13:16:41.737000
|
CVE-2023-52619,0,0,20a7bb0cb2eaa7fa51742374ca05d5bd7fdb36e86539d53100b75675b035a409,2024-11-04T13:16:41.737000
|
||||||
CVE-2023-5262,0,0,dbc9cec6bb50e0a68a3b5ede7b08b3e3d8766566fd5a2a3e7793ec9100e6864d,2024-05-17T02:32:56.017000
|
CVE-2023-5262,0,0,dbc9cec6bb50e0a68a3b5ede7b08b3e3d8766566fd5a2a3e7793ec9100e6864d,2024-05-17T02:32:56.017000
|
||||||
CVE-2023-52620,0,1,7c3227f3d7abaa4e58b0c4ba62caf899d71083a6f645f11271d63eb138082c52,2024-11-06T20:35:08.343000
|
CVE-2023-52620,0,0,7c3227f3d7abaa4e58b0c4ba62caf899d71083a6f645f11271d63eb138082c52,2024-11-06T20:35:08.343000
|
||||||
CVE-2023-52621,0,0,26a33f9b008c64c6664e3e3a4869fe4d4572933cf6941e2f62ad48b2a923903f,2024-03-27T12:29:41.530000
|
CVE-2023-52621,0,0,26a33f9b008c64c6664e3e3a4869fe4d4572933cf6941e2f62ad48b2a923903f,2024-03-27T12:29:41.530000
|
||||||
CVE-2023-52622,0,0,1a4aa348f9b525ca69fe5a199e23d2ce602b346fde4c103318a5ea96e124b7a6,2024-11-04T13:16:41.973000
|
CVE-2023-52622,0,0,1a4aa348f9b525ca69fe5a199e23d2ce602b346fde4c103318a5ea96e124b7a6,2024-11-04T13:16:41.973000
|
||||||
CVE-2023-52623,0,0,74f6264a0d4f8f612430a8ffd97335038e0648002eaa7642f7664a57b746597f,2024-11-04T17:35:08.873000
|
CVE-2023-52623,0,0,74f6264a0d4f8f612430a8ffd97335038e0648002eaa7642f7664a57b746597f,2024-11-04T17:35:08.873000
|
||||||
@ -239406,7 +239406,7 @@ CVE-2023-52680,0,0,e82e4387cefcb72f3626231c08d733fbbeee0a4339500eacb2170dc4151a1
|
|||||||
CVE-2023-52681,0,0,524cd4977fea10c4065e85c75e427a13dce6ed3e1a3cad8c759b5ff8706d5faa,2024-05-17T18:35:35.070000
|
CVE-2023-52681,0,0,524cd4977fea10c4065e85c75e427a13dce6ed3e1a3cad8c759b5ff8706d5faa,2024-05-17T18:35:35.070000
|
||||||
CVE-2023-52682,0,0,cc6799c17a2f081b667ffca3e6c764a8a9c44e0c1986a4909c37d26d7d17217e,2024-05-17T18:35:35.070000
|
CVE-2023-52682,0,0,cc6799c17a2f081b667ffca3e6c764a8a9c44e0c1986a4909c37d26d7d17217e,2024-05-17T18:35:35.070000
|
||||||
CVE-2023-52683,0,0,10cf5db773a627f10f62e2b747504a42a9b761360a3c2b0570d6054a6128bc20,2024-11-04T13:16:46.517000
|
CVE-2023-52683,0,0,10cf5db773a627f10f62e2b747504a42a9b761360a3c2b0570d6054a6128bc20,2024-11-04T13:16:46.517000
|
||||||
CVE-2023-52684,0,0,33c7802e83b0cacce3f4943922f9d7f250c042b0471e9f2d74c9792f85da2e19,2024-05-17T18:35:35.070000
|
CVE-2023-52684,0,1,51ae7d2a43eba5f5afdf160a7f780d7d593d4e2d03669e20e4d6cce8d2b31000,2024-11-06T21:35:01.813000
|
||||||
CVE-2023-52685,0,0,cf8140ec5f2b974bcd3641a1209ca634d3cb951fbfbcbdcc6560b6110e8da549,2024-06-18T14:15:10.603000
|
CVE-2023-52685,0,0,cf8140ec5f2b974bcd3641a1209ca634d3cb951fbfbcbdcc6560b6110e8da549,2024-06-18T14:15:10.603000
|
||||||
CVE-2023-52686,0,0,e035efa57ae3873f49aa0c8ed309f1cfd09bba774f28aff6bfa9af8bf3cd5628,2024-11-04T13:16:46.670000
|
CVE-2023-52686,0,0,e035efa57ae3873f49aa0c8ed309f1cfd09bba774f28aff6bfa9af8bf3cd5628,2024-11-04T13:16:46.670000
|
||||||
CVE-2023-52687,0,0,b28f8c5460527301f61b9b984f4d389c8ddced6a4a6f85a3bf5048ab19f25e70,2024-11-06T17:35:25.900000
|
CVE-2023-52687,0,0,b28f8c5460527301f61b9b984f4d389c8ddced6a4a6f85a3bf5048ab19f25e70,2024-11-06T17:35:25.900000
|
||||||
@ -239463,7 +239463,7 @@ CVE-2023-52734,0,0,2f76584608f90880dda5ed1cfe003cf8af38c50f85a7ba05f54382ff1ea93
|
|||||||
CVE-2023-52735,0,0,179c3f86616fee02c6472500bdd41878f007d990a3ea0e8bcc41b49975c24734,2024-07-03T01:43:52.910000
|
CVE-2023-52735,0,0,179c3f86616fee02c6472500bdd41878f007d990a3ea0e8bcc41b49975c24734,2024-07-03T01:43:52.910000
|
||||||
CVE-2023-52736,0,0,df1befba83ff05c2a0d33711ab630a647dd341841417f5be872b0b202fdf8e4c,2024-05-21T16:53:56.550000
|
CVE-2023-52736,0,0,df1befba83ff05c2a0d33711ab630a647dd341841417f5be872b0b202fdf8e4c,2024-05-21T16:53:56.550000
|
||||||
CVE-2023-52737,0,0,38cbe5e55641ebdafc5db964d325c9c266a1e7ec0b6e0d92c3a71b5417001004,2024-05-21T16:53:56.550000
|
CVE-2023-52737,0,0,38cbe5e55641ebdafc5db964d325c9c266a1e7ec0b6e0d92c3a71b5417001004,2024-05-21T16:53:56.550000
|
||||||
CVE-2023-52738,0,0,c876063cd09e734f72ff43929eb012970dc4e31f27bd74cc3669d02c7f455d51,2024-05-21T16:53:56.550000
|
CVE-2023-52738,0,1,dc676761402004e11f6262bd178a76b0a97c37b209a47d729e14948a72f3b55f,2024-11-06T21:35:02.090000
|
||||||
CVE-2023-52739,0,0,0604a018a0e873dfcb2efbd5385f2a976fd9bccf7eaeca2825615c866a803dd1,2024-05-21T16:53:56.550000
|
CVE-2023-52739,0,0,0604a018a0e873dfcb2efbd5385f2a976fd9bccf7eaeca2825615c866a803dd1,2024-05-21T16:53:56.550000
|
||||||
CVE-2023-5274,0,0,864010d058c6ccc43d7cfa5280cf12d11d903e5a06c224a3c38c51a571ff7581,2023-12-05T18:20:39.937000
|
CVE-2023-5274,0,0,864010d058c6ccc43d7cfa5280cf12d11d903e5a06c224a3c38c51a571ff7581,2023-12-05T18:20:39.937000
|
||||||
CVE-2023-52740,0,0,da86f48edd07a1ed6b3338b97bd3ad3fac2b70de7e362c30acbab6ea25eebd29,2024-05-21T16:53:56.550000
|
CVE-2023-52740,0,0,da86f48edd07a1ed6b3338b97bd3ad3fac2b70de7e362c30acbab6ea25eebd29,2024-05-21T16:53:56.550000
|
||||||
@ -239532,7 +239532,7 @@ CVE-2023-52797,0,0,b73a8fa6a4e76687f73e7ef3277e8c68588fa5517245ff16423bb4845b549
|
|||||||
CVE-2023-52798,0,0,903a4612f669db82041c075124d4474cdd9cf4659c36c3c48aa9ccdd02833098,2024-05-21T16:53:56.550000
|
CVE-2023-52798,0,0,903a4612f669db82041c075124d4474cdd9cf4659c36c3c48aa9ccdd02833098,2024-05-21T16:53:56.550000
|
||||||
CVE-2023-52799,0,0,6fa89f7497ff6b75f31beef8e947309d06c41f701952588e6bb06313dc1fdef6,2024-05-21T16:53:56.550000
|
CVE-2023-52799,0,0,6fa89f7497ff6b75f31beef8e947309d06c41f701952588e6bb06313dc1fdef6,2024-05-21T16:53:56.550000
|
||||||
CVE-2023-5280,0,0,cf02e072cc72e580d64df88a732c123a0390498118112c202e656970398e1bca,2024-06-04T19:18:10.060000
|
CVE-2023-5280,0,0,cf02e072cc72e580d64df88a732c123a0390498118112c202e656970398e1bca,2024-06-04T19:18:10.060000
|
||||||
CVE-2023-52800,0,1,14779273a0271f6f818fa65737c64c9364846719a230d118051fdc46a7303574,2024-11-06T19:35:04.477000
|
CVE-2023-52800,0,0,14779273a0271f6f818fa65737c64c9364846719a230d118051fdc46a7303574,2024-11-06T19:35:04.477000
|
||||||
CVE-2023-52801,0,0,b95bb5d93b24e9cbb6c35e0192140cfc3d31cdb66f52213d203f1a292ea4cc97,2024-07-03T01:43:59.217000
|
CVE-2023-52801,0,0,b95bb5d93b24e9cbb6c35e0192140cfc3d31cdb66f52213d203f1a292ea4cc97,2024-07-03T01:43:59.217000
|
||||||
CVE-2023-52802,0,0,38a995833f5576e7c1a5ec4da3354344605bb944329f5f6f5f2b3f5909e6538e,2024-06-08T12:15:09.783000
|
CVE-2023-52802,0,0,38a995833f5576e7c1a5ec4da3354344605bb944329f5f6f5f2b3f5909e6538e,2024-06-08T12:15:09.783000
|
||||||
CVE-2023-52803,0,0,694b6e6d733c1665ec8c85b7467bf8e595bd273683c4250c62b7d8067abc7346,2024-07-18T12:15:02.423000
|
CVE-2023-52803,0,0,694b6e6d733c1665ec8c85b7467bf8e595bd273683c4250c62b7d8067abc7346,2024-07-18T12:15:02.423000
|
||||||
@ -239609,7 +239609,7 @@ CVE-2023-52867,0,0,e3b1128fcef491f8e641a0d12897f04317e86b4b1298f61d59bdc866043f9
|
|||||||
CVE-2023-52868,0,0,75bd5ccd052bd251c0e42c6807740befac18d5aabec3715f40791b5a99e23ad5,2024-05-21T16:53:56.550000
|
CVE-2023-52868,0,0,75bd5ccd052bd251c0e42c6807740befac18d5aabec3715f40791b5a99e23ad5,2024-05-21T16:53:56.550000
|
||||||
CVE-2023-52869,0,0,d37040a4a2cb7087cc996199bd2cd80e9806440599974a39ed1796463348598f,2024-07-03T01:44:08.950000
|
CVE-2023-52869,0,0,d37040a4a2cb7087cc996199bd2cd80e9806440599974a39ed1796463348598f,2024-07-03T01:44:08.950000
|
||||||
CVE-2023-5287,0,0,ce1ed467182937769fcb531729fdb4e9725d88b02f3d1fc370ffab1fa8fb95bd,2024-08-02T08:15:35.190000
|
CVE-2023-5287,0,0,ce1ed467182937769fcb531729fdb4e9725d88b02f3d1fc370ffab1fa8fb95bd,2024-08-02T08:15:35.190000
|
||||||
CVE-2023-52870,0,1,27dae345b2e5970c9d3feba55d8322e50c1240ab8d505536cedb4d647d27a0d6,2024-11-06T19:35:05.403000
|
CVE-2023-52870,0,0,27dae345b2e5970c9d3feba55d8322e50c1240ab8d505536cedb4d647d27a0d6,2024-11-06T19:35:05.403000
|
||||||
CVE-2023-52871,0,0,fe9db8c2a60a638be83569a9528a947015c20fb1ca847cd7d6ee75b69b6f429f,2024-05-21T16:53:56.550000
|
CVE-2023-52871,0,0,fe9db8c2a60a638be83569a9528a947015c20fb1ca847cd7d6ee75b69b6f429f,2024-05-21T16:53:56.550000
|
||||||
CVE-2023-52872,0,0,95562b8fb0cc421a39b970c47689ca5dfb57a52adf4583e91f8091a32ec9fe9a,2024-11-06T15:35:08.170000
|
CVE-2023-52872,0,0,95562b8fb0cc421a39b970c47689ca5dfb57a52adf4583e91f8091a32ec9fe9a,2024-11-06T15:35:08.170000
|
||||||
CVE-2023-52873,0,0,87939aab335722274ff9346609ace667795230b4a40e5a5c0583dd242243c124,2024-05-21T16:53:56.550000
|
CVE-2023-52873,0,0,87939aab335722274ff9346609ace667795230b4a40e5a5c0583dd242243c124,2024-05-21T16:53:56.550000
|
||||||
@ -241492,7 +241492,7 @@ CVE-2024-0025,0,0,d28de8c9f19ab5ba79d0474f043c936cf414f4247e50396a672a60bd3b9be7
|
|||||||
CVE-2024-0026,0,0,774ed6ba82d0d9c7a541b3db4a5a359cf56663a0f101d669bdf9d716d0a13278,2024-07-03T01:44:32.803000
|
CVE-2024-0026,0,0,774ed6ba82d0d9c7a541b3db4a5a359cf56663a0f101d669bdf9d716d0a13278,2024-07-03T01:44:32.803000
|
||||||
CVE-2024-0027,0,0,8812c8953c6645d49bd5f62acac1b6ed41a4a4a9272988ed4e3b759e771e9ede,2024-05-08T13:15:00.690000
|
CVE-2024-0027,0,0,8812c8953c6645d49bd5f62acac1b6ed41a4a4a9272988ed4e3b759e771e9ede,2024-05-08T13:15:00.690000
|
||||||
CVE-2024-0029,0,0,55e8334b75ebe900149ddbd8622fac8b29c21a3b953c0b848545a4ed036cbf2f,2024-02-16T13:37:55.033000
|
CVE-2024-0029,0,0,55e8334b75ebe900149ddbd8622fac8b29c21a3b953c0b848545a4ed036cbf2f,2024-02-16T13:37:55.033000
|
||||||
CVE-2024-0030,0,1,0dd9bca1dbcc5e3458318f715ab6b433aff63564ed4b03d63174ae833d93503d,2024-11-06T19:35:07.573000
|
CVE-2024-0030,0,0,0dd9bca1dbcc5e3458318f715ab6b433aff63564ed4b03d63174ae833d93503d,2024-11-06T19:35:07.573000
|
||||||
CVE-2024-0031,0,0,b1cddaec25187c54af4bebb0dcc796dbc4415ad876a9b9d3fa787304a60914ff,2024-08-01T13:45:54.900000
|
CVE-2024-0031,0,0,b1cddaec25187c54af4bebb0dcc796dbc4415ad876a9b9d3fa787304a60914ff,2024-08-01T13:45:54.900000
|
||||||
CVE-2024-0032,0,0,28a201a5282c4952746adae47b502afc7f863fa68b2049d01865c530c24bbb57,2024-08-29T20:35:54.413000
|
CVE-2024-0032,0,0,28a201a5282c4952746adae47b502afc7f863fa68b2049d01865c530c24bbb57,2024-08-29T20:35:54.413000
|
||||||
CVE-2024-0033,0,0,27344b7715a75d0aa82a7b18cd174c27fc55902f246df424d23b6d9f7df6dd01,2024-08-16T18:35:03.300000
|
CVE-2024-0033,0,0,27344b7715a75d0aa82a7b18cd174c27fc55902f246df424d23b6d9f7df6dd01,2024-08-16T18:35:03.300000
|
||||||
@ -242423,7 +242423,7 @@ CVE-2024-1009,0,0,97af4237278897e4de60a52c929ac5642d8b709167b278dc1af6a70d4d177e
|
|||||||
CVE-2024-10091,0,0,d0b808b13e4ac8a1cdb029b434d2f58c9a91ce65332255a3523a2d40d54e2bbc,2024-10-28T13:58:09.230000
|
CVE-2024-10091,0,0,d0b808b13e4ac8a1cdb029b434d2f58c9a91ce65332255a3523a2d40d54e2bbc,2024-10-28T13:58:09.230000
|
||||||
CVE-2024-10092,0,0,96aeeb96773a5c0a6e4e68b9196f2f369ac89a58107c1085bc8eadc272cfbb94,2024-10-28T13:58:09.230000
|
CVE-2024-10092,0,0,96aeeb96773a5c0a6e4e68b9196f2f369ac89a58107c1085bc8eadc272cfbb94,2024-10-28T13:58:09.230000
|
||||||
CVE-2024-10093,0,0,94a330c294b313c7705272073b44baeb2e1acc1449e78c4e0c252c7b91c53316,2024-11-01T18:07:07.003000
|
CVE-2024-10093,0,0,94a330c294b313c7705272073b44baeb2e1acc1449e78c4e0c252c7b91c53316,2024-11-01T18:07:07.003000
|
||||||
CVE-2024-10097,0,1,ebed9ad10c7a648598c4572f4800c95ee8b1505f542b8454e9698f3995387b9d,2024-11-06T19:14:22.817000
|
CVE-2024-10097,0,0,ebed9ad10c7a648598c4572f4800c95ee8b1505f542b8454e9698f3995387b9d,2024-11-06T19:14:22.817000
|
||||||
CVE-2024-10099,0,0,f14bdb99d2ca7956ea9400330266332303014dc510bc6e629dc22733e615abb6,2024-10-21T21:03:53.647000
|
CVE-2024-10099,0,0,f14bdb99d2ca7956ea9400330266332303014dc510bc6e629dc22733e615abb6,2024-10-21T21:03:53.647000
|
||||||
CVE-2024-1010,0,0,b9c2292e551f86bb732084025c958f6307d4b05614efbc31206ace678efe61b8,2024-05-17T02:35:09.883000
|
CVE-2024-1010,0,0,b9c2292e551f86bb732084025c958f6307d4b05614efbc31206ace678efe61b8,2024-05-17T02:35:09.883000
|
||||||
CVE-2024-10100,0,0,f9d8653b0b809755807a27c91859fa59733e823c9baf33fbd9ba6460baccb9d4,2024-11-04T19:15:05.297000
|
CVE-2024-10100,0,0,f9d8653b0b809755807a27c91859fa59733e823c9baf33fbd9ba6460baccb9d4,2024-11-04T19:15:05.297000
|
||||||
@ -242439,7 +242439,7 @@ CVE-2024-10119,0,0,49edb44a36719c29f8ad406ee8678c1d6a57c817986d9e175ffebf1849d72
|
|||||||
CVE-2024-1012,0,0,261f4dda24c2aefd44892a1e7cff84e275a6853943a2bba059238594bb202f50,2024-05-17T02:35:10.090000
|
CVE-2024-1012,0,0,261f4dda24c2aefd44892a1e7cff84e275a6853943a2bba059238594bb202f50,2024-05-17T02:35:10.090000
|
||||||
CVE-2024-10120,0,0,877872300e701fe4a1efb68fcccda192535f4ea8d014c4745e6d765239ef8603,2024-10-30T20:20:46.010000
|
CVE-2024-10120,0,0,877872300e701fe4a1efb68fcccda192535f4ea8d014c4745e6d765239ef8603,2024-10-30T20:20:46.010000
|
||||||
CVE-2024-10121,0,0,4fac6e713d174c782f95945b8314e41c0820946450664e88d069ef79a5b04b0a,2024-10-30T21:21:02.083000
|
CVE-2024-10121,0,0,4fac6e713d174c782f95945b8314e41c0820946450664e88d069ef79a5b04b0a,2024-10-30T21:21:02.083000
|
||||||
CVE-2024-10122,0,0,153862f3f9eb72281b1c72dbca34e4eb5ada0e8c96788af32355e9b86fecda30,2024-10-21T17:10:22.857000
|
CVE-2024-10122,0,1,4e5f619ae1411af7ba6427863c46c2d3289b70e0f0b6031ee87ce9e9971de5c8,2024-11-06T22:05:23.700000
|
||||||
CVE-2024-10123,0,0,e122097599e5662b16a80366258ebdfd607e11805ffbed77bafc707b3aec8a81,2024-10-28T16:06:53.747000
|
CVE-2024-10123,0,0,e122097599e5662b16a80366258ebdfd607e11805ffbed77bafc707b3aec8a81,2024-10-28T16:06:53.747000
|
||||||
CVE-2024-10125,0,0,57aa34408f8260c656e1d34a999469d8529d9afe80be211b41d76ddc0eb4278d,2024-10-23T21:15:14.510000
|
CVE-2024-10125,0,0,57aa34408f8260c656e1d34a999469d8529d9afe80be211b41d76ddc0eb4278d,2024-10-23T21:15:14.510000
|
||||||
CVE-2024-10128,0,0,f4621c94fde2e2c994e30c7fb126f4e421d19f40a100d08f3cba9307c37673b9,2024-10-30T20:31:33.213000
|
CVE-2024-10128,0,0,f4621c94fde2e2c994e30c7fb126f4e421d19f40a100d08f3cba9307c37673b9,2024-10-30T20:31:33.213000
|
||||||
@ -242823,11 +242823,11 @@ CVE-2024-10826,0,0,e7caea17df9e50303e84eb12f606f4531bb8bb9449a87b4576ba355c7a719
|
|||||||
CVE-2024-10827,0,0,c533f4c70607df301dc68c381588fa8b3325a3d893bbcbb9a6092f250e2c41fa,2024-11-06T18:17:17.287000
|
CVE-2024-10827,0,0,c533f4c70607df301dc68c381588fa8b3325a3d893bbcbb9a6092f250e2c41fa,2024-11-06T18:17:17.287000
|
||||||
CVE-2024-1083,0,0,f65354685ac9d5e6ec0c7d89ef33fa98a96cad0e23da0316206039cbd9c94fda,2024-03-13T18:16:18.563000
|
CVE-2024-1083,0,0,f65354685ac9d5e6ec0c7d89ef33fa98a96cad0e23da0316206039cbd9c94fda,2024-03-13T18:16:18.563000
|
||||||
CVE-2024-1084,0,0,b38be98d35d4290a3ce2408da5081c91dd802a2448815858b2cd8d2247674e10,2024-10-17T15:46:42.330000
|
CVE-2024-1084,0,0,b38be98d35d4290a3ce2408da5081c91dd802a2448815858b2cd8d2247674e10,2024-10-17T15:46:42.330000
|
||||||
CVE-2024-10840,0,0,7c13b48653833d393d956bfeba05dc2dd9647859d024272e6982bcc84d954739,2024-11-05T16:04:26.053000
|
CVE-2024-10840,0,1,3088ecb88b6f610106137e52cd92a9df0637e9f9f20cd58417274c10e35a041a,2024-11-06T22:49:12.173000
|
||||||
CVE-2024-10841,0,0,cb468ec73cf79f50123b416f8630b7e95a6ee5ee80f06d5ca0c3e30ee71804b9,2024-11-05T16:04:26.053000
|
CVE-2024-10841,0,1,1914449d57ff1a3babaaf40b7a33b002037c2a6558bba70a8f37b24e8f3218c2,2024-11-06T22:50:24.277000
|
||||||
CVE-2024-10842,0,0,4f347a0fe404db0a70d46d9dfbb2bce6fdecc583b1df9d0e17ec6eb1dbdd1366,2024-11-05T16:04:26.053000
|
CVE-2024-10842,0,1,7aeafb02fa0f31956e4616acda70affdbdea4445fee41471b949ff3589528b00,2024-11-06T22:43:19.327000
|
||||||
CVE-2024-10844,0,0,32322f050196865be4aae941a4bb5adece1ed82ba13b1f2493fc23a256fb69c2,2024-11-05T16:04:26.053000
|
CVE-2024-10844,0,1,ab92f6f85407dca15cb1e5a84778b8d496e0601ae883a0bd7f3db6703a1b0447,2024-11-06T22:38:13.800000
|
||||||
CVE-2024-10845,0,0,a2864f4a8e52c61d4eaa5da9f3b813c3c867d63046f2a47c80f727d56a3ef7dc,2024-11-05T16:04:26.053000
|
CVE-2024-10845,0,1,e23b6836533b6527e69274c9897179b623fe8ac43fca2950e064d79cbfdb6f9f,2024-11-06T22:38:03.347000
|
||||||
CVE-2024-1085,0,0,1d186f1dd445cf86c8be70ef01a658a198ecb65ca5305ee36e96f272e65874b8,2024-02-05T20:41:40.513000
|
CVE-2024-1085,0,0,1d186f1dd445cf86c8be70ef01a658a198ecb65ca5305ee36e96f272e65874b8,2024-02-05T20:41:40.513000
|
||||||
CVE-2024-1086,0,0,3e819e2fff80149e3f377751fd1fb28a52f8791d9e5d08990c549613b15214b2,2024-08-14T19:41:08.673000
|
CVE-2024-1086,0,0,3e819e2fff80149e3f377751fd1fb28a52f8791d9e5d08990c549613b15214b2,2024-08-14T19:41:08.673000
|
||||||
CVE-2024-1087,0,0,9751a2fe52b8f14e0fc1c9d86ee656c42465ba61ef03201895b6c1868f5679fd,2024-01-31T13:15:11.030000
|
CVE-2024-1087,0,0,9751a2fe52b8f14e0fc1c9d86ee656c42465ba61ef03201895b6c1868f5679fd,2024-01-31T13:15:11.030000
|
||||||
@ -242841,8 +242841,10 @@ CVE-2024-10916,0,0,53443e54e55c3a54111ef55bbe8925e1700f77a586713f1c8fd853e1c516c
|
|||||||
CVE-2024-10919,0,0,a9eb02ffc877d3649d3e97e181e7b5d396e5513925c1dfbc9593594bbb4efcef,2024-11-06T18:17:17.287000
|
CVE-2024-10919,0,0,a9eb02ffc877d3649d3e97e181e7b5d396e5513925c1dfbc9593594bbb4efcef,2024-11-06T18:17:17.287000
|
||||||
CVE-2024-1092,0,0,4e514cbeb8cbdb0016fe4cb374f3dffe448e95b35a82b13ed7cb7be1b7fe61c2,2024-02-13T19:43:06.247000
|
CVE-2024-1092,0,0,4e514cbeb8cbdb0016fe4cb374f3dffe448e95b35a82b13ed7cb7be1b7fe61c2,2024-02-13T19:43:06.247000
|
||||||
CVE-2024-10920,0,0,2a084f5df50e8d62344f7fb5574910af35d9b3838be955d3bbcc07e777ed2e3c,2024-11-06T18:17:17.287000
|
CVE-2024-10920,0,0,2a084f5df50e8d62344f7fb5574910af35d9b3838be955d3bbcc07e777ed2e3c,2024-11-06T18:17:17.287000
|
||||||
|
CVE-2024-10926,1,1,836b6dad2f467cae785f28103c4c848e59141b80159f4c1ffe543f045d6be6ff,2024-11-06T21:15:04.927000
|
||||||
CVE-2024-1093,0,0,de7ad9b72d87a55cf339c2dc774b7bea1d33bb68e3b932a439fb6fd6a0ef5b53,2024-03-05T13:41:01.900000
|
CVE-2024-1093,0,0,de7ad9b72d87a55cf339c2dc774b7bea1d33bb68e3b932a439fb6fd6a0ef5b53,2024-03-05T13:41:01.900000
|
||||||
CVE-2024-1094,0,0,e9e492360318e20689e515fe6138ed3b8630e834f4abf2efeafd987f7e7b2dc6,2024-06-17T12:42:04.623000
|
CVE-2024-1094,0,0,e9e492360318e20689e515fe6138ed3b8630e834f4abf2efeafd987f7e7b2dc6,2024-06-17T12:42:04.623000
|
||||||
|
CVE-2024-10941,1,1,675a2a19161edc958e8a197cc6dc80c9908daf66aaab2775f6145c4f21c47875,2024-11-06T21:15:05.213000
|
||||||
CVE-2024-1095,0,0,e70da3b629cae08421ac3ff6db71fb525bf872b735f906aa9168a1a3feae7dcb,2024-03-05T13:41:01.900000
|
CVE-2024-1095,0,0,e70da3b629cae08421ac3ff6db71fb525bf872b735f906aa9168a1a3feae7dcb,2024-03-05T13:41:01.900000
|
||||||
CVE-2024-1096,0,0,9e6ec92aa91c226f1dce82b660bd82ecda12366a7db0465d5ab79a9947cb0a51,2024-03-21T02:51:34.720000
|
CVE-2024-1096,0,0,9e6ec92aa91c226f1dce82b660bd82ecda12366a7db0465d5ab79a9947cb0a51,2024-03-21T02:51:34.720000
|
||||||
CVE-2024-1098,0,0,7637c79f93f6fef4c2ad0472be16e5b2b85cffeb9436b7defda280fbd3390871,2024-05-17T02:35:14.017000
|
CVE-2024-1098,0,0,7637c79f93f6fef4c2ad0472be16e5b2b85cffeb9436b7defda280fbd3390871,2024-05-17T02:35:14.017000
|
||||||
@ -244467,7 +244469,7 @@ CVE-2024-20962,0,0,bcf0fdf63a172649d862e0b60296a1507069b6b1d3f284da5e5091c27efe3
|
|||||||
CVE-2024-20963,0,0,777b7cd2ebaadb4763a737f62544d35f548c2765fd413ec39c0e69f1d2e44eee,2024-02-02T17:36:33.743000
|
CVE-2024-20963,0,0,777b7cd2ebaadb4763a737f62544d35f548c2765fd413ec39c0e69f1d2e44eee,2024-02-02T17:36:33.743000
|
||||||
CVE-2024-20964,0,0,ab74670f7eba706fccff530b8fad5283c75afa505713ad1602df91d0111cf529,2024-02-20T19:50:53.960000
|
CVE-2024-20964,0,0,ab74670f7eba706fccff530b8fad5283c75afa505713ad1602df91d0111cf529,2024-02-20T19:50:53.960000
|
||||||
CVE-2024-20965,0,0,d41d12dc1f39ed4f3636fac85c63e6e6a8b99443b9015fee96d2868d746c8460,2024-02-02T17:42:20.270000
|
CVE-2024-20965,0,0,d41d12dc1f39ed4f3636fac85c63e6e6a8b99443b9015fee96d2868d746c8460,2024-02-02T17:42:20.270000
|
||||||
CVE-2024-20966,0,1,dab87e37585bb236d1417d0345775a702be652c48f5564f545a9e12473d94c75,2024-11-06T19:35:08.623000
|
CVE-2024-20966,0,0,dab87e37585bb236d1417d0345775a702be652c48f5564f545a9e12473d94c75,2024-11-06T19:35:08.623000
|
||||||
CVE-2024-20967,0,0,24e7161f6aa52b5a617854b182e26d8b3a2b8a2e00cfc6867379e3242f7ad4f6,2024-02-02T17:42:32.037000
|
CVE-2024-20967,0,0,24e7161f6aa52b5a617854b182e26d8b3a2b8a2e00cfc6867379e3242f7ad4f6,2024-02-02T17:42:32.037000
|
||||||
CVE-2024-20968,0,0,f87c3ac120b069363cef49b73c4bea5dd9bdd52a2a03eea095a7ff8c6c344cb0,2024-02-20T19:50:53.960000
|
CVE-2024-20968,0,0,f87c3ac120b069363cef49b73c4bea5dd9bdd52a2a03eea095a7ff8c6c344cb0,2024-02-20T19:50:53.960000
|
||||||
CVE-2024-20969,0,0,058e957bc600be5635dd584028438dce1629507fbbb938dc220b2cfe0d1cbacd,2024-02-02T17:24:44.617000
|
CVE-2024-20969,0,0,058e957bc600be5635dd584028438dce1629507fbbb938dc220b2cfe0d1cbacd,2024-02-02T17:24:44.617000
|
||||||
@ -244548,7 +244550,7 @@ CVE-2024-21039,0,0,5533a80506dc2a9584f3f0a1cb6213d349fbac4fc9f3be60fa10f69e60d73
|
|||||||
CVE-2024-21040,0,0,9207f1539b8715e9de73bf8605d282f9258ecbde4b6b5af37d49fb9b9b73b544,2024-07-03T01:46:25.020000
|
CVE-2024-21040,0,0,9207f1539b8715e9de73bf8605d282f9258ecbde4b6b5af37d49fb9b9b73b544,2024-07-03T01:46:25.020000
|
||||||
CVE-2024-21041,0,0,53175e4f9f6fe9a06cdb65415f15e9860a5cc1810804215df4199c035c4956b1,2024-10-31T16:35:04.810000
|
CVE-2024-21041,0,0,53175e4f9f6fe9a06cdb65415f15e9860a5cc1810804215df4199c035c4956b1,2024-10-31T16:35:04.810000
|
||||||
CVE-2024-21042,0,0,a53b604b49a76162fbba6ea20fde9e5db3c2c63e25a2d34ff97af2cb2bb953ae,2024-04-17T12:48:31.863000
|
CVE-2024-21042,0,0,a53b604b49a76162fbba6ea20fde9e5db3c2c63e25a2d34ff97af2cb2bb953ae,2024-04-17T12:48:31.863000
|
||||||
CVE-2024-21043,0,1,34b86fb6bc70d1cb3f2e8b52f242178af3e3c87a06302294640b6969cd919425,2024-11-06T19:35:09.460000
|
CVE-2024-21043,0,0,34b86fb6bc70d1cb3f2e8b52f242178af3e3c87a06302294640b6969cd919425,2024-11-06T19:35:09.460000
|
||||||
CVE-2024-21044,0,0,2cd88f43af07596557d9fca3fb13efe6eb725b0bbf07f13100392e30400b440d,2024-04-17T12:48:31.863000
|
CVE-2024-21044,0,0,2cd88f43af07596557d9fca3fb13efe6eb725b0bbf07f13100392e30400b440d,2024-04-17T12:48:31.863000
|
||||||
CVE-2024-21045,0,0,8f4acd1404f7851517d6c66a40a7ade78fca2381123c6edde49776a3d7abd81c,2024-04-17T12:48:31.863000
|
CVE-2024-21045,0,0,8f4acd1404f7851517d6c66a40a7ade78fca2381123c6edde49776a3d7abd81c,2024-04-17T12:48:31.863000
|
||||||
CVE-2024-21046,0,0,6cd7417a9fe1dad42e5e390bd73f6c59f847ce1b22a979e6a850a74e46589580,2024-11-05T16:35:11.803000
|
CVE-2024-21046,0,0,6cd7417a9fe1dad42e5e390bd73f6c59f847ce1b22a979e6a850a74e46589580,2024-11-05T16:35:11.803000
|
||||||
@ -244755,23 +244757,23 @@ CVE-2024-21244,0,0,a2d8857947cab47435f13652b22d7660077ec99971dc97d0f1c04da6d4b60
|
|||||||
CVE-2024-21246,0,0,ce26d4699cd66244be859e323ba861645fea4d7c63493af05a19982e79b3ffed,2024-10-18T19:04:57.587000
|
CVE-2024-21246,0,0,ce26d4699cd66244be859e323ba861645fea4d7c63493af05a19982e79b3ffed,2024-10-18T19:04:57.587000
|
||||||
CVE-2024-21247,0,0,65e62ada788d7c8dd8f6bbcfcf373e355969c491bcf2b35cf52ed2528731ff42,2024-10-16T20:33:33.027000
|
CVE-2024-21247,0,0,65e62ada788d7c8dd8f6bbcfcf373e355969c491bcf2b35cf52ed2528731ff42,2024-10-16T20:33:33.027000
|
||||||
CVE-2024-21248,0,0,9d2bec6b0c5bd428b3273089dc6de78cffbb45eee6dc4edb4da7a745f217bff7,2024-10-18T14:59:21.397000
|
CVE-2024-21248,0,0,9d2bec6b0c5bd428b3273089dc6de78cffbb45eee6dc4edb4da7a745f217bff7,2024-10-18T14:59:21.397000
|
||||||
CVE-2024-21249,0,0,561b0c05f80cd133fd2bf7f9570e926d43e2c7747cbbd22ee7f0f51bfa829c07,2024-10-31T15:35:25.647000
|
CVE-2024-21249,0,1,62dc164222266e9012addfd5a4c4b6cc91556280f972a8f370ed3479ce2dfab0,2024-11-06T22:53:50.587000
|
||||||
CVE-2024-2125,0,0,872a2657310e63ac8c9e764159a2a2b1b3991a1ff9d35b42d26ee113c654f515,2024-04-10T13:23:38.787000
|
CVE-2024-2125,0,0,872a2657310e63ac8c9e764159a2a2b1b3991a1ff9d35b42d26ee113c654f515,2024-04-10T13:23:38.787000
|
||||||
CVE-2024-21250,0,0,c3a216316fd161ecf42e4b85935aab4377046a8c65dc40e8a08a09abcd439125,2024-10-17T14:35:19.303000
|
CVE-2024-21250,0,1,194dad5e2041a7f20ff44922c3cd68e8f11877affaaf0af77e6c9accdf6d7287,2024-11-06T22:54:57.887000
|
||||||
CVE-2024-21251,0,0,95021887cdea7aae31070af44e524d1ee6c9c77252dd0eef331bed470fbf412a,2024-10-31T13:35:08.347000
|
CVE-2024-21251,0,0,95021887cdea7aae31070af44e524d1ee6c9c77252dd0eef331bed470fbf412a,2024-10-31T13:35:08.347000
|
||||||
CVE-2024-21252,0,0,3562e5499767a042e190a60bfd9dbb9b6b695af77c5fafca40036938307414a4,2024-10-18T17:04:44.797000
|
CVE-2024-21252,0,0,3562e5499767a042e190a60bfd9dbb9b6b695af77c5fafca40036938307414a4,2024-10-18T17:04:44.797000
|
||||||
CVE-2024-21253,0,0,82cb10003f4ec5bdfbeaba5304d2361b5866cecedb70f3ece91f971a87496d10,2024-10-18T14:59:43.660000
|
CVE-2024-21253,0,0,82cb10003f4ec5bdfbeaba5304d2361b5866cecedb70f3ece91f971a87496d10,2024-10-18T14:59:43.660000
|
||||||
CVE-2024-21254,0,0,69ca4bf103295a9b35d72b61c0821b7611adf3b7f78c0a3144fa3da855147ce0,2024-10-18T17:05:58.723000
|
CVE-2024-21254,0,0,69ca4bf103295a9b35d72b61c0821b7611adf3b7f78c0a3144fa3da855147ce0,2024-10-18T17:05:58.723000
|
||||||
CVE-2024-21255,0,0,e030f05632b5a87ee9fbc0b2487a30eaf79a4e92eeff8a93914fc40aa8e258ce,2024-10-18T18:16:50.040000
|
CVE-2024-21255,0,0,e030f05632b5a87ee9fbc0b2487a30eaf79a4e92eeff8a93914fc40aa8e258ce,2024-10-18T18:16:50.040000
|
||||||
CVE-2024-21257,0,0,4eb5b2386255bfe67a12d4f16c9687502d7809166e4f1a2b618c5f01aeaa9628,2024-10-16T16:38:43.170000
|
CVE-2024-21257,0,1,725e5cb13b95dde80a37c32a41b8094719a9fca76dfc8333734f482e81824a37,2024-11-06T22:55:18.400000
|
||||||
CVE-2024-21258,0,0,d66d60d8ebe1253680938995404bc802bc4b9dba35146ae97db380f0d8c97381,2024-10-16T16:38:43.170000
|
CVE-2024-21258,0,1,f6a4f5d7d1aa00a2377e749a4d3b06007d1ed6555c84462e00a1435f7514e74c,2024-11-06T22:56:19.527000
|
||||||
CVE-2024-21259,0,0,f4f5607ed9f1a78aaccb5e08790e38092d26477ddc636f65efb0050b27293955,2024-10-18T15:00:17.133000
|
CVE-2024-21259,0,0,f4f5607ed9f1a78aaccb5e08790e38092d26477ddc636f65efb0050b27293955,2024-10-18T15:00:17.133000
|
||||||
CVE-2024-2126,0,0,4ce1f11f7bd5c084b75067cba762f3a64c791e384d09fc3623bdffa8d2aef429,2024-03-13T18:15:58.530000
|
CVE-2024-2126,0,0,4ce1f11f7bd5c084b75067cba762f3a64c791e384d09fc3623bdffa8d2aef429,2024-03-13T18:15:58.530000
|
||||||
CVE-2024-21260,0,0,7a47438a9729091b847bae11b79b0b39e45eeeb29dbb35a8c4d79bd78f465c02,2024-10-18T19:05:29.830000
|
CVE-2024-21260,0,0,7a47438a9729091b847bae11b79b0b39e45eeeb29dbb35a8c4d79bd78f465c02,2024-10-18T19:05:29.830000
|
||||||
CVE-2024-21261,0,0,0899d9cbcc2683b4e5f057eef455f1d9ca53b0f3260b8ba7058f26a504b9b734,2024-10-21T18:27:17.307000
|
CVE-2024-21261,0,0,0899d9cbcc2683b4e5f057eef455f1d9ca53b0f3260b8ba7058f26a504b9b734,2024-10-21T18:27:17.307000
|
||||||
CVE-2024-21262,0,0,82558944e30d58821a3281c570a2d377b7ec0772f885917aea1c19c8d3bb4a8f,2024-10-21T16:28:16.427000
|
CVE-2024-21262,0,0,82558944e30d58821a3281c570a2d377b7ec0772f885917aea1c19c8d3bb4a8f,2024-10-21T16:28:16.427000
|
||||||
CVE-2024-21263,0,0,7ac7bc00544efec065b7a3ea0c417046cafbfd2ff0aea2fefa7b4595b67183a3,2024-10-18T15:00:52.463000
|
CVE-2024-21263,0,0,7ac7bc00544efec065b7a3ea0c417046cafbfd2ff0aea2fefa7b4595b67183a3,2024-10-18T15:00:52.463000
|
||||||
CVE-2024-21264,0,0,43edc8b0674a64ea84e7381a14394594bbb3f638fa4e4e95e2e0a620c8f8163d,2024-10-16T16:38:43.170000
|
CVE-2024-21264,0,1,d9f928ae696c644062bfe905454106684d42ecbe4c3ee5dbcffcc7a85fd3bc2f,2024-11-06T22:56:41.647000
|
||||||
CVE-2024-21265,0,0,c55c1df1e1622cf6e643b1eb11b86f0a45ff8d2660ab5a45972681fbb6ed81df,2024-10-21T15:49:21.027000
|
CVE-2024-21265,0,0,c55c1df1e1622cf6e643b1eb11b86f0a45ff8d2660ab5a45972681fbb6ed81df,2024-10-21T15:49:21.027000
|
||||||
CVE-2024-21266,0,0,eb9a8a34ffd00406d4abf6e4a3c73c351bf9d5c51c3a336b85b5cbd4050db042,2024-10-21T15:49:43.940000
|
CVE-2024-21266,0,0,eb9a8a34ffd00406d4abf6e4a3c73c351bf9d5c51c3a336b85b5cbd4050db042,2024-10-21T15:49:43.940000
|
||||||
CVE-2024-21267,0,0,badeabc98b9ebca68fd4a6f1dc13051a7275b459f1ba8064226c678286ad482a,2024-10-21T15:50:27.217000
|
CVE-2024-21267,0,0,badeabc98b9ebca68fd4a6f1dc13051a7275b459f1ba8064226c678286ad482a,2024-10-21T15:50:27.217000
|
||||||
@ -245006,7 +245008,7 @@ CVE-2024-21492,0,0,803eb1b38c0a3c364c8ed4dea2bf283518201c6c637d9dcb0eb2c40900b3f
|
|||||||
CVE-2024-21493,0,0,8c569f1b0a59292e6c9cf7ec9ce82294e78d1d0805330784c9c6f403ab9b5f07,2024-02-20T19:50:53.960000
|
CVE-2024-21493,0,0,8c569f1b0a59292e6c9cf7ec9ce82294e78d1d0805330784c9c6f403ab9b5f07,2024-02-20T19:50:53.960000
|
||||||
CVE-2024-21494,0,0,0bbab6d51758efdfbb0a7b2f9291f8e5deeed39eed0d020b8776487f79305949,2024-02-20T19:50:53.960000
|
CVE-2024-21494,0,0,0bbab6d51758efdfbb0a7b2f9291f8e5deeed39eed0d020b8776487f79305949,2024-02-20T19:50:53.960000
|
||||||
CVE-2024-21495,0,0,d8114eaee60fb319f9f14d9bbb95c01136acc0dc9b681a7e416381982ba11775,2024-02-20T19:50:53.960000
|
CVE-2024-21495,0,0,d8114eaee60fb319f9f14d9bbb95c01136acc0dc9b681a7e416381982ba11775,2024-02-20T19:50:53.960000
|
||||||
CVE-2024-21496,0,1,fd2afde9cc348b878ada34cb6af6773012668bca46f1e822b57f2512814d4fea,2024-11-06T19:35:12.967000
|
CVE-2024-21496,0,0,fd2afde9cc348b878ada34cb6af6773012668bca46f1e822b57f2512814d4fea,2024-11-06T19:35:12.967000
|
||||||
CVE-2024-21497,0,0,8aedc196ee518fe8560cc512f459ccbfc6592e8201a18667b2196e5e6bb6b22b,2024-02-20T19:50:53.960000
|
CVE-2024-21497,0,0,8aedc196ee518fe8560cc512f459ccbfc6592e8201a18667b2196e5e6bb6b22b,2024-02-20T19:50:53.960000
|
||||||
CVE-2024-21498,0,0,3c9376a89b1471a3f3dcd2f26b2302ecf028dd3649469284754d6d6bbe15e588,2024-08-01T13:46:44.130000
|
CVE-2024-21498,0,0,3c9376a89b1471a3f3dcd2f26b2302ecf028dd3649469284754d6d6bbe15e588,2024-08-01T13:46:44.130000
|
||||||
CVE-2024-21499,0,0,056024a19cf11190da9415625f86200e7f99c9c1c15d5f4eac3772c0369f1c48,2024-02-20T19:50:53.960000
|
CVE-2024-21499,0,0,056024a19cf11190da9415625f86200e7f99c9c1c15d5f4eac3772c0369f1c48,2024-02-20T19:50:53.960000
|
||||||
@ -245160,7 +245162,7 @@ CVE-2024-21686,0,0,4a77c3c56e7b5b00a78de09ce573bf8e0630b6f60379d0ccdce9209c8559b
|
|||||||
CVE-2024-21687,0,0,b10f0ce22ddc5215abb86b2d036e862f5c36c964079edaaed2bac3d77de9097f,2024-10-24T20:35:05.307000
|
CVE-2024-21687,0,0,b10f0ce22ddc5215abb86b2d036e862f5c36c964079edaaed2bac3d77de9097f,2024-10-24T20:35:05.307000
|
||||||
CVE-2024-21689,0,0,d8a79405abcb9c8abfdb03520e41049c9522145c88e975847ada5aebd53c39e7,2024-08-20T15:44:20.567000
|
CVE-2024-21689,0,0,d8a79405abcb9c8abfdb03520e41049c9522145c88e975847ada5aebd53c39e7,2024-08-20T15:44:20.567000
|
||||||
CVE-2024-2169,0,0,25fcbf8b9d7008ea9954a41615969f4d36543f4a604eb878bcc8b4c5c18a9fe0,2024-08-02T17:35:41.760000
|
CVE-2024-2169,0,0,25fcbf8b9d7008ea9954a41615969f4d36543f4a604eb878bcc8b4c5c18a9fe0,2024-08-02T17:35:41.760000
|
||||||
CVE-2024-21690,0,1,52f2f5bb1e3e94fbb3d7fb8fab564e88563477b86bcce8501f8853e0eaa6dfd8,2024-11-06T19:35:13.787000
|
CVE-2024-21690,0,0,52f2f5bb1e3e94fbb3d7fb8fab564e88563477b86bcce8501f8853e0eaa6dfd8,2024-11-06T19:35:13.787000
|
||||||
CVE-2024-2170,0,0,758d6332b5fccd657d38a7eddcc769e16fb72e0c1b6514443e29b8614302434a,2024-03-26T12:55:05.010000
|
CVE-2024-2170,0,0,758d6332b5fccd657d38a7eddcc769e16fb72e0c1b6514443e29b8614302434a,2024-03-26T12:55:05.010000
|
||||||
CVE-2024-2171,0,0,17c18c0537b711b05cfdac779ba2d168e9830dc55b69168346eed3896c1fbc48,2024-10-11T14:15:32.983000
|
CVE-2024-2171,0,0,17c18c0537b711b05cfdac779ba2d168e9830dc55b69168346eed3896c1fbc48,2024-10-11T14:15:32.983000
|
||||||
CVE-2024-2172,0,0,edf7001396454eaaf4557a9c3fcef53434431cfdf8112832b9dc273636d1d743,2024-03-13T18:15:58.530000
|
CVE-2024-2172,0,0,edf7001396454eaaf4557a9c3fcef53434431cfdf8112832b9dc273636d1d743,2024-03-13T18:15:58.530000
|
||||||
@ -245374,7 +245376,7 @@ CVE-2024-22009,0,0,b5b916a7d5e03fc859dbc7dc76ad79ca7e20552b5b212df09fe8f4b48b2af
|
|||||||
CVE-2024-22010,0,0,064f021344a36df851e34619a798aa49214be75a65182801242af835352a2a15,2024-11-05T17:35:07.960000
|
CVE-2024-22010,0,0,064f021344a36df851e34619a798aa49214be75a65182801242af835352a2a15,2024-11-05T17:35:07.960000
|
||||||
CVE-2024-22011,0,0,f1daed51c903d88d263d46bfaefe467f13d6b47a3368a8cc0e99c1a391f6eea9,2024-03-12T12:40:13.500000
|
CVE-2024-22011,0,0,f1daed51c903d88d263d46bfaefe467f13d6b47a3368a8cc0e99c1a391f6eea9,2024-03-12T12:40:13.500000
|
||||||
CVE-2024-22012,0,0,dc6a18ae7accb379105ae5b8c9fe53def4787e4dcb1f5ed3397b80bba457789c,2024-03-12T21:15:57.953000
|
CVE-2024-22012,0,0,dc6a18ae7accb379105ae5b8c9fe53def4787e4dcb1f5ed3397b80bba457789c,2024-03-12T21:15:57.953000
|
||||||
CVE-2024-22013,0,0,7f532e6900797141a60e66fca5bd8ac368c382be95753f2e15222fe6285acb11,2024-09-20T12:31:20.110000
|
CVE-2024-22013,0,1,82c717c65faf8d538fe3d2eedeb4ed9751bc8b1763b263d1a92ee0f5afa87e71,2024-11-06T21:35:02.500000
|
||||||
CVE-2024-22014,0,0,b059d091724833d1bb51d32eadbd1be8dce585949d29de43319d8d8ddaed06d9,2024-10-25T21:35:05.193000
|
CVE-2024-22014,0,0,b059d091724833d1bb51d32eadbd1be8dce585949d29de43319d8d8ddaed06d9,2024-10-25T21:35:05.193000
|
||||||
CVE-2024-22015,0,0,ab9198a00b8902f553a18672e99e37367cbd733d408a460d3e69564e986f708c,2024-07-03T01:46:59.010000
|
CVE-2024-22015,0,0,ab9198a00b8902f553a18672e99e37367cbd733d408a460d3e69564e986f708c,2024-07-03T01:46:59.010000
|
||||||
CVE-2024-22016,0,0,80ed0ed1953eb9bc819815a69c5782ab91648798b066ce1586fe70786fbfbdf5,2024-02-07T17:33:12.727000
|
CVE-2024-22016,0,0,80ed0ed1953eb9bc819815a69c5782ab91648798b066ce1586fe70786fbfbdf5,2024-02-07T17:33:12.727000
|
||||||
@ -245435,7 +245437,7 @@ CVE-2024-22081,0,0,c0e23ef382492c7380a92e96cb3bb331fbab187b3695f4beebcf35389003e
|
|||||||
CVE-2024-22082,0,0,459e25d191876c4f00cade807052f238137ad057437a31854486c01937977cf9,2024-08-05T19:35:02.233000
|
CVE-2024-22082,0,0,459e25d191876c4f00cade807052f238137ad057437a31854486c01937977cf9,2024-08-05T19:35:02.233000
|
||||||
CVE-2024-22083,0,0,7a6168861b8307faff71dd88ea4edf4af71ed0e4a8c79dad79d5ed358e7010c6,2024-03-20T13:00:16.367000
|
CVE-2024-22083,0,0,7a6168861b8307faff71dd88ea4edf4af71ed0e4a8c79dad79d5ed358e7010c6,2024-03-20T13:00:16.367000
|
||||||
CVE-2024-22084,0,0,0e122ae85d4de51fb69a5bdf68cc5b622f1fc44a5c7c74096438459ba25e7679,2024-08-03T20:35:04.983000
|
CVE-2024-22084,0,0,0e122ae85d4de51fb69a5bdf68cc5b622f1fc44a5c7c74096438459ba25e7679,2024-08-03T20:35:04.983000
|
||||||
CVE-2024-22085,0,1,9bb660a953db76f501963932fc60e0d5afb5a0529b26a144a0fb7fc6555c5828,2024-11-06T19:35:14.630000
|
CVE-2024-22085,0,0,9bb660a953db76f501963932fc60e0d5afb5a0529b26a144a0fb7fc6555c5828,2024-11-06T19:35:14.630000
|
||||||
CVE-2024-22086,0,0,1d7696b944cd1a26a2cc7bdc48a35b3903f2aec00a961a7e53e9ced659d9458d,2024-01-11T17:04:07.660000
|
CVE-2024-22086,0,0,1d7696b944cd1a26a2cc7bdc48a35b3903f2aec00a961a7e53e9ced659d9458d,2024-01-11T17:04:07.660000
|
||||||
CVE-2024-22087,0,0,4384797ae7846daec0107426d58d87d7c4784c559db16808176350ae4c959dce,2024-01-11T17:03:51.967000
|
CVE-2024-22087,0,0,4384797ae7846daec0107426d58d87d7c4784c559db16808176350ae4c959dce,2024-01-11T17:03:51.967000
|
||||||
CVE-2024-22088,0,0,b895d73398c482c8e6acdb9bb17741aa9b7a4b9e58038e199e46754d5e3337bd,2024-09-04T21:35:06.700000
|
CVE-2024-22088,0,0,b895d73398c482c8e6acdb9bb17741aa9b7a4b9e58038e199e46754d5e3337bd,2024-09-04T21:35:06.700000
|
||||||
@ -246232,7 +246234,7 @@ CVE-2024-23294,0,0,6e53ba65116756c4100f8fe8d5569a0c62f61cbe9a5faf2cb1a478a60da66
|
|||||||
CVE-2024-23295,0,0,888dad9ac3d8cb77923a71e92315d941876e8170cf4689e417e49228bdb9fd95,2024-10-27T14:35:05.370000
|
CVE-2024-23295,0,0,888dad9ac3d8cb77923a71e92315d941876e8170cf4689e417e49228bdb9fd95,2024-10-27T14:35:05.370000
|
||||||
CVE-2024-23296,0,0,4c1c20e10d440a721ea56c440f9f9d49de01279fc6b58c55156def98607c7416,2024-08-14T19:32:48.817000
|
CVE-2024-23296,0,0,4c1c20e10d440a721ea56c440f9f9d49de01279fc6b58c55156def98607c7416,2024-08-14T19:32:48.817000
|
||||||
CVE-2024-23297,0,0,4e04bab05bbe7ec82e24a36797403e08fa4bc700957cd0b27eee797a80773cdb,2024-10-27T14:35:05.540000
|
CVE-2024-23297,0,0,4e04bab05bbe7ec82e24a36797403e08fa4bc700957cd0b27eee797a80773cdb,2024-10-27T14:35:05.540000
|
||||||
CVE-2024-23298,0,1,11c25643b2811d3e7a7eaf30f2e6f582af0634ebd8c739f4afa1e19e40be1a63,2024-11-06T19:35:15.443000
|
CVE-2024-23298,0,0,11c25643b2811d3e7a7eaf30f2e6f582af0634ebd8c739f4afa1e19e40be1a63,2024-11-06T19:35:15.443000
|
||||||
CVE-2024-23299,0,0,fe4dd82d5102073a81be0172f4d91c213b490a3370bedc852ed979e38d0840d6,2024-08-20T15:35:03.893000
|
CVE-2024-23299,0,0,fe4dd82d5102073a81be0172f4d91c213b490a3370bedc852ed979e38d0840d6,2024-08-20T15:35:03.893000
|
||||||
CVE-2024-2330,0,0,9ae945264bb052d68e9c213073b32e3a9e8de8241b1a06dd279470149a8f98ca,2024-05-17T02:38:10.540000
|
CVE-2024-2330,0,0,9ae945264bb052d68e9c213073b32e3a9e8de8241b1a06dd279470149a8f98ca,2024-05-17T02:38:10.540000
|
||||||
CVE-2024-23300,0,0,c517d8f3cd7384c2ec4a46a0a893833bb0df2ca0141a1842a58ab8296dd562b0,2024-08-26T15:35:06.113000
|
CVE-2024-23300,0,0,c517d8f3cd7384c2ec4a46a0a893833bb0df2ca0141a1842a58ab8296dd562b0,2024-08-26T15:35:06.113000
|
||||||
@ -246440,7 +246442,7 @@ CVE-2024-23556,0,0,4abe0589b741d76d8a6140e408a99fff6f784fc140eb8dd575aa458015e6a
|
|||||||
CVE-2024-23557,0,0,4270afce746443b5193815936f76591ad043b307043acbde73eb7ec4d54cd34d,2024-08-07T19:35:03.190000
|
CVE-2024-23557,0,0,4270afce746443b5193815936f76591ad043b307043acbde73eb7ec4d54cd34d,2024-08-07T19:35:03.190000
|
||||||
CVE-2024-23558,0,0,1aaffec8c09fd69e12702b79a89a97fa66d8cf8050a73827a56fcf9396bca5b5,2024-11-01T19:35:15.123000
|
CVE-2024-23558,0,0,1aaffec8c09fd69e12702b79a89a97fa66d8cf8050a73827a56fcf9396bca5b5,2024-11-01T19:35:15.123000
|
||||||
CVE-2024-23559,0,0,1cfe950943db323f850a4ffa6fa09a9e594439fd864c25048ffda399bb0b3e4f,2024-04-15T19:15:09.577000
|
CVE-2024-23559,0,0,1cfe950943db323f850a4ffa6fa09a9e594439fd864c25048ffda399bb0b3e4f,2024-04-15T19:15:09.577000
|
||||||
CVE-2024-23560,0,0,e362890ddaf504fd7ec860643e0e2bcce74ce536f1ff64f240f88b9ed03a4aad,2024-04-16T13:24:07.103000
|
CVE-2024-23560,0,1,611d6f496e671cc0d1d356211a118fce6e543142f0a1a253e80e1a53fcc9dde1,2024-11-06T22:35:04.240000
|
||||||
CVE-2024-23561,0,0,05ce6bff2b3c083c40d1cefd8ecfe83b9e8bac92f3576a18d3243c6c46e3bef3,2024-11-04T22:35:03.360000
|
CVE-2024-23561,0,0,05ce6bff2b3c083c40d1cefd8ecfe83b9e8bac92f3576a18d3243c6c46e3bef3,2024-11-04T22:35:03.360000
|
||||||
CVE-2024-23562,0,0,4d517ea8a2763e5506a865d21e69db429e3d16d2d215329e0568829328a2181b,2024-10-23T23:15:12.397000
|
CVE-2024-23562,0,0,4d517ea8a2763e5506a865d21e69db429e3d16d2d215329e0568829328a2181b,2024-10-23T23:15:12.397000
|
||||||
CVE-2024-2357,0,0,58f4675a1a89325da5d3ee44283ebc42e89a0cdd69475172a4baac455a4ffac1,2024-03-23T03:15:12.690000
|
CVE-2024-2357,0,0,58f4675a1a89325da5d3ee44283ebc42e89a0cdd69475172a4baac455a4ffac1,2024-03-23T03:15:12.690000
|
||||||
@ -248402,7 +248404,7 @@ CVE-2024-26351,0,0,12fff75a6adfb2a49a1df2419d56c70a882606b31c647e6d0906250c15d15
|
|||||||
CVE-2024-26352,0,0,8b15f4dcf8c7ba10be17fb174c1fc0c7dab8a3918429d96aacd6df61b16faa50,2024-08-14T20:35:07.913000
|
CVE-2024-26352,0,0,8b15f4dcf8c7ba10be17fb174c1fc0c7dab8a3918429d96aacd6df61b16faa50,2024-08-14T20:35:07.913000
|
||||||
CVE-2024-2636,0,0,99a69aaffd46cfe65a84b6720d2f35122e16b65656b4791402aef2e645d8d6eb,2024-03-19T13:26:46
|
CVE-2024-2636,0,0,99a69aaffd46cfe65a84b6720d2f35122e16b65656b4791402aef2e645d8d6eb,2024-03-19T13:26:46
|
||||||
CVE-2024-26362,0,0,5faf69da8a67af4816d796fd5b51111ac2c788f77e8e8dd0cf83d9d0e45a369d,2024-07-03T01:49:39.793000
|
CVE-2024-26362,0,0,5faf69da8a67af4816d796fd5b51111ac2c788f77e8e8dd0cf83d9d0e45a369d,2024-07-03T01:49:39.793000
|
||||||
CVE-2024-26367,0,0,527c3fc48df6b7e73e05f006f7179ae46d331d377d9a28bb902941bd60f631f8,2024-05-14T19:18:31.490000
|
CVE-2024-26367,0,1,fb602fe640a36deea42d544a0bf5bbfec018fc1bce2e50bc4f6ba27f1fac9ba7,2024-11-06T21:35:02.850000
|
||||||
CVE-2024-26369,0,0,08c9f0525905502b41d2dcc09bd77683ee3501b8b43f7fda43dd5219f9780ed5,2024-08-01T13:48:09.673000
|
CVE-2024-26369,0,0,08c9f0525905502b41d2dcc09bd77683ee3501b8b43f7fda43dd5219f9780ed5,2024-08-01T13:48:09.673000
|
||||||
CVE-2024-2637,0,0,721622b64a65f273433032cdde0b2ce3d6c7d3ce5ea1581ad6c33c2a93b72687,2024-05-27T08:15:09.360000
|
CVE-2024-2637,0,0,721622b64a65f273433032cdde0b2ce3d6c7d3ce5ea1581ad6c33c2a93b72687,2024-05-27T08:15:09.360000
|
||||||
CVE-2024-2639,0,0,1b2fbb8554a3bfbdfb75c8d2c4abee29a55fe420023a4469268f266088d766ca,2024-05-17T02:38:22.540000
|
CVE-2024-2639,0,0,1b2fbb8554a3bfbdfb75c8d2c4abee29a55fe420023a4469268f266088d766ca,2024-05-17T02:38:22.540000
|
||||||
@ -248542,7 +248544,7 @@ CVE-2024-26644,0,0,7934c2f59b6e30a2c4b4745bfbfa90280e322c49f0c2a186c87bb52bbd1ff
|
|||||||
CVE-2024-26645,0,0,fcb784c6c783cccdf8ab1103cd462aaed01b5616113ac8c3b057371a72bdcc2d,2024-11-05T10:15:36.983000
|
CVE-2024-26645,0,0,fcb784c6c783cccdf8ab1103cd462aaed01b5616113ac8c3b057371a72bdcc2d,2024-11-05T10:15:36.983000
|
||||||
CVE-2024-26646,0,0,37b8583bb8aa6b5d9135a9adf8c1cea7db38d580753ce18483b0a0263c262490,2024-03-27T12:29:41.530000
|
CVE-2024-26646,0,0,37b8583bb8aa6b5d9135a9adf8c1cea7db38d580753ce18483b0a0263c262490,2024-03-27T12:29:41.530000
|
||||||
CVE-2024-26647,0,0,2352172cdf00eda3657e1ca2ad602c79475b6fdb427922a2ce2991151abd5140,2024-03-27T12:29:41.530000
|
CVE-2024-26647,0,0,2352172cdf00eda3657e1ca2ad602c79475b6fdb427922a2ce2991151abd5140,2024-03-27T12:29:41.530000
|
||||||
CVE-2024-26648,0,0,4cedcf3cfff8479b6fed3984e33e00ae084d6a67309ed2c17e18f60de1bb7057,2024-03-27T12:29:41.530000
|
CVE-2024-26648,0,1,c17515eda5659d8a7ff11ea44fa35ca00ff75d317f4eddf403747bbe01bfe069,2024-11-06T22:35:04.950000
|
||||||
CVE-2024-26649,0,0,940fcd7e5d20bc1c18f4c974a09622f0b6b6d87231bbd7408e7118d35c4bade7,2024-03-27T12:29:41.530000
|
CVE-2024-26649,0,0,940fcd7e5d20bc1c18f4c974a09622f0b6b6d87231bbd7408e7118d35c4bade7,2024-03-27T12:29:41.530000
|
||||||
CVE-2024-2665,0,0,0d168a0d5dbe4804c9bebe4f21c0d1f4a27974809ea172b5979b5dccd55d97c3,2024-04-10T13:23:38.787000
|
CVE-2024-2665,0,0,0d168a0d5dbe4804c9bebe4f21c0d1f4a27974809ea172b5979b5dccd55d97c3,2024-04-10T13:23:38.787000
|
||||||
CVE-2024-26650,0,0,c37b82afef74cba8f0a1b3081e8c53c80ac8f73689ed9f1c045183b9566d980d,2024-05-23T14:15:09.293000
|
CVE-2024-26650,0,0,c37b82afef74cba8f0a1b3081e8c53c80ac8f73689ed9f1c045183b9566d980d,2024-05-23T14:15:09.293000
|
||||||
@ -248634,7 +248636,7 @@ CVE-2024-26728,0,0,1d984fbbc09b2528ed0368e262b6925669160ac0081a20349d9ce1b0481cd
|
|||||||
CVE-2024-26729,0,0,f2558d66284076d36d46e0aacf3fb55436eadb8de18e68f9386d43b00e2b9ac0,2024-04-03T17:24:18.150000
|
CVE-2024-26729,0,0,f2558d66284076d36d46e0aacf3fb55436eadb8de18e68f9386d43b00e2b9ac0,2024-04-03T17:24:18.150000
|
||||||
CVE-2024-2673,0,0,c0d60620ac5234f9d83256f6c8f0cc424d5b12f467b9d75fc363f57a06d6b86c,2024-06-27T20:15:20.927000
|
CVE-2024-2673,0,0,c0d60620ac5234f9d83256f6c8f0cc424d5b12f467b9d75fc363f57a06d6b86c,2024-06-27T20:15:20.927000
|
||||||
CVE-2024-26730,0,0,e3adf1f18e75f02eb4ddde1d65703597e8a59901e6d25e50ea9de5823f84b09a,2024-04-03T17:24:18.150000
|
CVE-2024-26730,0,0,e3adf1f18e75f02eb4ddde1d65703597e8a59901e6d25e50ea9de5823f84b09a,2024-04-03T17:24:18.150000
|
||||||
CVE-2024-26731,0,0,a0b35e80e7d711c60a97912dc302c5db34b4fd9235fbfe456f2513f7ece65c03,2024-04-03T17:24:18.150000
|
CVE-2024-26731,0,1,444fd53cb325041c6066bba9c7011195568465765bfe4f679685b3d9f33781fd,2024-11-06T22:35:05.197000
|
||||||
CVE-2024-26732,0,0,ec7cbeff52970bd11884d825e88204cea9fe962424cd8f5b8fa233a8acdeb543,2024-04-03T17:24:18.150000
|
CVE-2024-26732,0,0,ec7cbeff52970bd11884d825e88204cea9fe962424cd8f5b8fa233a8acdeb543,2024-04-03T17:24:18.150000
|
||||||
CVE-2024-26733,0,0,ffb3f90c0778d3f838c29091a428911e1aa8d896c4d95445af70c44f0420f3e2,2024-11-05T10:15:45.177000
|
CVE-2024-26733,0,0,ffb3f90c0778d3f838c29091a428911e1aa8d896c4d95445af70c44f0420f3e2,2024-11-05T10:15:45.177000
|
||||||
CVE-2024-26734,0,0,0eb1b1feddc3c43838ae7b1cbb500208ff685270dbb18f151464783d19bf4c65,2024-04-03T17:24:18.150000
|
CVE-2024-26734,0,0,0eb1b1feddc3c43838ae7b1cbb500208ff685270dbb18f151464783d19bf4c65,2024-04-03T17:24:18.150000
|
||||||
@ -248648,7 +248650,7 @@ CVE-2024-26740,0,0,1e1bef330b72fc7d544d8597ed7662f3757f2fd4d4713d8ba1cf34c542f65
|
|||||||
CVE-2024-26741,0,0,e3c248718399fd38da7f7e0290c551d82b46ab3d7aa0a320a11762dcc655c816,2024-04-03T17:24:18.150000
|
CVE-2024-26741,0,0,e3c248718399fd38da7f7e0290c551d82b46ab3d7aa0a320a11762dcc655c816,2024-04-03T17:24:18.150000
|
||||||
CVE-2024-26742,0,0,d7af6623131612fa1c7fd4e052a63ef79bda58184e37bad2d9cdda66dda9e08a,2024-04-03T17:24:18.150000
|
CVE-2024-26742,0,0,d7af6623131612fa1c7fd4e052a63ef79bda58184e37bad2d9cdda66dda9e08a,2024-04-03T17:24:18.150000
|
||||||
CVE-2024-26743,0,0,4a7e68056af89e9c88fe98dfc22c3d733a12a894d9b16349f941d17c194d57a1,2024-11-05T10:15:46.150000
|
CVE-2024-26743,0,0,4a7e68056af89e9c88fe98dfc22c3d733a12a894d9b16349f941d17c194d57a1,2024-11-05T10:15:46.150000
|
||||||
CVE-2024-26744,0,0,0ceec025040440e9ba41481335beedc9c2145c266bf1333f6ac942206f1c0ce5,2024-11-05T10:15:46.253000
|
CVE-2024-26744,0,1,0a89200e6dfae9bb0e1be2a7f590bdb3afcdd853d9d245ed930156cf4025f324,2024-11-06T21:35:03.883000
|
||||||
CVE-2024-26745,0,0,122c004116025bf61ab1b820e4608632aeed8cec5ef7c9fee61ffd6ee6d9d826,2024-10-31T18:35:09.190000
|
CVE-2024-26745,0,0,122c004116025bf61ab1b820e4608632aeed8cec5ef7c9fee61ffd6ee6d9d826,2024-10-31T18:35:09.190000
|
||||||
CVE-2024-26746,0,0,503c547cde060b718fd5c822ced0ef17967b19427780440c26d09b063f4a1e1e,2024-04-04T12:48:41.700000
|
CVE-2024-26746,0,0,503c547cde060b718fd5c822ced0ef17967b19427780440c26d09b063f4a1e1e,2024-04-04T12:48:41.700000
|
||||||
CVE-2024-26747,0,0,09de0e643315d31c44b1583413acd72b2581d73c25656d42d1275770b236ac52,2024-11-05T15:35:09.820000
|
CVE-2024-26747,0,0,09de0e643315d31c44b1583413acd72b2581d73c25656d42d1275770b236ac52,2024-11-05T15:35:09.820000
|
||||||
@ -248662,7 +248664,7 @@ CVE-2024-26753,0,0,3846eb71f07ae66d4f1ab1df6c9d443c98aca1924ebf110c33d4d08080433
|
|||||||
CVE-2024-26754,0,0,4c9cfa7c31d874fcb7c7bccb3bab927e4d2ae66cd4f4c5042fa0e607d4d1901d,2024-11-05T10:15:47.167000
|
CVE-2024-26754,0,0,4c9cfa7c31d874fcb7c7bccb3bab927e4d2ae66cd4f4c5042fa0e607d4d1901d,2024-11-05T10:15:47.167000
|
||||||
CVE-2024-26755,0,0,39f7695747b108842d59070ebf8576f95142b84dcd41ed480d2d853aa612b61c,2024-04-03T17:24:18.150000
|
CVE-2024-26755,0,0,39f7695747b108842d59070ebf8576f95142b84dcd41ed480d2d853aa612b61c,2024-04-03T17:24:18.150000
|
||||||
CVE-2024-26756,0,0,655c17b37b1ef2579c61a87ebef153f2774027727f182f3917510b923fe0ccdc,2024-04-03T17:24:18.150000
|
CVE-2024-26756,0,0,655c17b37b1ef2579c61a87ebef153f2774027727f182f3917510b923fe0ccdc,2024-04-03T17:24:18.150000
|
||||||
CVE-2024-26757,0,0,6034152e03c1ca661ffc06ef00b2bfd06031f7a425df0cd8c48af8de3fbaa9da,2024-04-03T17:24:18.150000
|
CVE-2024-26757,0,1,90467e553fa06ea3a7c2ab3dea36e3f811f1f99408fa7e26a28d265d66f85785,2024-11-06T21:35:04.737000
|
||||||
CVE-2024-26758,0,0,13c69310718039924d9aab781258d9193abdbc64a782ef9279b6a2cb5e131a2b,2024-11-04T18:35:07.610000
|
CVE-2024-26758,0,0,13c69310718039924d9aab781258d9193abdbc64a782ef9279b6a2cb5e131a2b,2024-11-04T18:35:07.610000
|
||||||
CVE-2024-26759,0,0,fee904955decc510df312a537847d082dbb8683c61f8fb59034da4ba171b0bf7,2024-04-03T17:24:18.150000
|
CVE-2024-26759,0,0,fee904955decc510df312a537847d082dbb8683c61f8fb59034da4ba171b0bf7,2024-04-03T17:24:18.150000
|
||||||
CVE-2024-2676,0,0,c5aff2ba1e0c7344ce038e4f14ac4978d6bb29d1aa8d9b0c435541e971559719,2024-05-17T02:38:24.527000
|
CVE-2024-2676,0,0,c5aff2ba1e0c7344ce038e4f14ac4978d6bb29d1aa8d9b0c435541e971559719,2024-05-17T02:38:24.527000
|
||||||
@ -248686,7 +248688,7 @@ CVE-2024-26775,0,0,6fd84ebe1443aa1945a09fd4c48b2b5413a95fedab44014851d1e3de25fa4
|
|||||||
CVE-2024-26776,0,0,231483d2965c1ba8393bd7449031e7bde3f34468b7fb6c2f373633060a8098c5,2024-11-05T10:15:48.947000
|
CVE-2024-26776,0,0,231483d2965c1ba8393bd7449031e7bde3f34468b7fb6c2f373633060a8098c5,2024-11-05T10:15:48.947000
|
||||||
CVE-2024-26777,0,0,149a5e7ba07fc7fae23ca08bab697f35d178e4d6054d6fb6db6aa2ffb1dc45d8,2024-11-05T10:15:49.030000
|
CVE-2024-26777,0,0,149a5e7ba07fc7fae23ca08bab697f35d178e4d6054d6fb6db6aa2ffb1dc45d8,2024-11-05T10:15:49.030000
|
||||||
CVE-2024-26778,0,0,ba27fdacb2617bc8c2e5f1f9ee53b0927010430cedb669781ea0cbeb302b5a02,2024-11-05T10:15:49.133000
|
CVE-2024-26778,0,0,ba27fdacb2617bc8c2e5f1f9ee53b0927010430cedb669781ea0cbeb302b5a02,2024-11-05T10:15:49.133000
|
||||||
CVE-2024-26779,0,0,ec4054c03218d2454c2d30dd1769a652bdebca802addb64ef26c3ae272a73208,2024-11-05T10:15:49.233000
|
CVE-2024-26779,0,1,5213496ece4af679413eec0c49002bd6c886a5728eec3dcb023c0c154d5e6da6,2024-11-06T22:35:05.993000
|
||||||
CVE-2024-2678,0,0,bcb8f0bc79308fc240a2e04032fecd11d29a05e517a407df60996ec6cc430105,2024-05-17T02:38:24.730000
|
CVE-2024-2678,0,0,bcb8f0bc79308fc240a2e04032fecd11d29a05e517a407df60996ec6cc430105,2024-05-17T02:38:24.730000
|
||||||
CVE-2024-26780,0,0,910e1f464205bb4d61ae164984308d54dec4e128d9fce0100bb0bec47440e7b3,2024-04-04T14:15:09.667000
|
CVE-2024-26780,0,0,910e1f464205bb4d61ae164984308d54dec4e128d9fce0100bb0bec47440e7b3,2024-04-04T14:15:09.667000
|
||||||
CVE-2024-26781,0,0,f985d7d52d3c00d388812605acd1c322cb3a9f3a0500eb44ae3d519cd75a2f91,2024-11-05T10:15:49.403000
|
CVE-2024-26781,0,0,f985d7d52d3c00d388812605acd1c322cb3a9f3a0500eb44ae3d519cd75a2f91,2024-11-05T10:15:49.403000
|
||||||
@ -248721,7 +248723,7 @@ CVE-2024-26807,0,0,104a4e4d854016f8b324666da2a6519a8e2f2a9b7b206527a539918e69652
|
|||||||
CVE-2024-26808,0,0,78f28d423840a66070d27b2f76e4cfdb21e72d03dc73ddafa1fe00afc26ddd06,2024-11-05T10:15:51.720000
|
CVE-2024-26808,0,0,78f28d423840a66070d27b2f76e4cfdb21e72d03dc73ddafa1fe00afc26ddd06,2024-11-05T10:15:51.720000
|
||||||
CVE-2024-26809,0,0,01e5bd6a3e1086db6d390f88a74abf1dab95b48a5074d6a449e0ffc835016714,2024-11-05T10:15:51.820000
|
CVE-2024-26809,0,0,01e5bd6a3e1086db6d390f88a74abf1dab95b48a5074d6a449e0ffc835016714,2024-11-05T10:15:51.820000
|
||||||
CVE-2024-2681,0,0,064400d4b0835279b0227ccac554f0cfa5438a53fe0a37509df7fe4d3bb69b80,2024-05-17T02:38:25.007000
|
CVE-2024-2681,0,0,064400d4b0835279b0227ccac554f0cfa5438a53fe0a37509df7fe4d3bb69b80,2024-05-17T02:38:25.007000
|
||||||
CVE-2024-26810,0,1,3bcbd029ab3dc0530ec232fef8ab00be486fb08e0fc65e925a6e7547e08a8c3a,2024-11-06T20:35:09.833000
|
CVE-2024-26810,0,0,3bcbd029ab3dc0530ec232fef8ab00be486fb08e0fc65e925a6e7547e08a8c3a,2024-11-06T20:35:09.833000
|
||||||
CVE-2024-26811,0,0,b419aa5e7bfea8f6be9b0c18d47a04ffcdb7322b3bd6706c908ab4700cf29410,2024-04-28T12:15:20.780000
|
CVE-2024-26811,0,0,b419aa5e7bfea8f6be9b0c18d47a04ffcdb7322b3bd6706c908ab4700cf29410,2024-04-28T12:15:20.780000
|
||||||
CVE-2024-26812,0,0,e15f8f2f69aee37cecc8fd71e141552acaf8bd02ff4a9774ac9f3745dc6faa03,2024-11-05T10:15:52.087000
|
CVE-2024-26812,0,0,e15f8f2f69aee37cecc8fd71e141552acaf8bd02ff4a9774ac9f3745dc6faa03,2024-11-05T10:15:52.087000
|
||||||
CVE-2024-26813,0,0,1e161884c9c6bba988e090609d3e12222e5e93bf4b5b4ea55c3748df4f0005bd,2024-11-05T10:15:52.177000
|
CVE-2024-26813,0,0,1e161884c9c6bba988e090609d3e12222e5e93bf4b5b4ea55c3748df4f0005bd,2024-11-05T10:15:52.177000
|
||||||
@ -248757,7 +248759,7 @@ CVE-2024-2684,0,0,d36d2cea9eacbddac9e02987b1e26022fd6a893a6c0f09ee50bb451cfe4d7a
|
|||||||
CVE-2024-26840,0,0,66612eb6e16c6bcdf27f2a13a7a8da4787be523c0173463ccb5d506ac9b20933,2024-11-05T10:15:54.040000
|
CVE-2024-26840,0,0,66612eb6e16c6bcdf27f2a13a7a8da4787be523c0173463ccb5d506ac9b20933,2024-11-05T10:15:54.040000
|
||||||
CVE-2024-26841,0,0,5e1f136ad87debfe07a19d1692bc4baeabe3ebee450bd39d508ed3155d7f3178,2024-04-17T12:48:07.510000
|
CVE-2024-26841,0,0,5e1f136ad87debfe07a19d1692bc4baeabe3ebee450bd39d508ed3155d7f3178,2024-04-17T12:48:07.510000
|
||||||
CVE-2024-26842,0,0,2fcacd7d46da00b8ed6abd9aff9babef4fef495c42a9c08855209ae79c6b7116,2024-04-17T12:48:07.510000
|
CVE-2024-26842,0,0,2fcacd7d46da00b8ed6abd9aff9babef4fef495c42a9c08855209ae79c6b7116,2024-04-17T12:48:07.510000
|
||||||
CVE-2024-26843,0,1,08c4fd5074176009c661d945c518162a34e07b9556d45a3623e3f7aac78eaafe,2024-11-06T20:35:10.390000
|
CVE-2024-26843,0,0,08c4fd5074176009c661d945c518162a34e07b9556d45a3623e3f7aac78eaafe,2024-11-06T20:35:10.390000
|
||||||
CVE-2024-26844,0,0,e7dd9fdbca55a3fe3d15e1a88aaa23b8bd8dc5bda58e0747f6bd61e00240dea4,2024-04-17T12:48:07.510000
|
CVE-2024-26844,0,0,e7dd9fdbca55a3fe3d15e1a88aaa23b8bd8dc5bda58e0747f6bd61e00240dea4,2024-04-17T12:48:07.510000
|
||||||
CVE-2024-26845,0,0,d8720903c9d639d864f48e7c98cece1c82b5d1302754f3650c04c4d9b5ebfbf2,2024-11-05T10:15:54.423000
|
CVE-2024-26845,0,0,d8720903c9d639d864f48e7c98cece1c82b5d1302754f3650c04c4d9b5ebfbf2,2024-11-05T10:15:54.423000
|
||||||
CVE-2024-26846,0,0,923f64cc2eb677ab6a3c4fbbb44af82280cbfbab47e28dac8f179259ef7d96ac,2024-11-05T10:15:54.533000
|
CVE-2024-26846,0,0,923f64cc2eb677ab6a3c4fbbb44af82280cbfbab47e28dac8f179259ef7d96ac,2024-11-05T10:15:54.533000
|
||||||
@ -248963,7 +248965,7 @@ CVE-2024-27029,0,0,6c081ff738eb90dc7d9bc74913c1f6e1efe7fc554037e9bb9b8506cffba2a
|
|||||||
CVE-2024-2703,0,0,fb7268c6624632e5fa0c645fe7971240898e11ffe4f2cbdecab29aea976f669a,2024-05-17T02:38:25.893000
|
CVE-2024-2703,0,0,fb7268c6624632e5fa0c645fe7971240898e11ffe4f2cbdecab29aea976f669a,2024-05-17T02:38:25.893000
|
||||||
CVE-2024-27030,0,0,6cf033352f8b449cd788a898986efe2b6d73f55358a4b240c970dde448599393,2024-11-05T10:16:20.800000
|
CVE-2024-27030,0,0,6cf033352f8b449cd788a898986efe2b6d73f55358a4b240c970dde448599393,2024-11-05T10:16:20.800000
|
||||||
CVE-2024-27031,0,0,87e5bf3aa11aa1c30fab50e95fb076e098520276691532d4f69eba3b6501fd89,2024-05-01T19:50:25.633000
|
CVE-2024-27031,0,0,87e5bf3aa11aa1c30fab50e95fb076e098520276691532d4f69eba3b6501fd89,2024-05-01T19:50:25.633000
|
||||||
CVE-2024-27032,0,1,4256b1faa9815988bb13d55dd8255d2df11f44c2836efb1cce4d42829ee07487,2024-11-06T19:35:15.673000
|
CVE-2024-27032,0,0,4256b1faa9815988bb13d55dd8255d2df11f44c2836efb1cce4d42829ee07487,2024-11-06T19:35:15.673000
|
||||||
CVE-2024-27033,0,0,99ae4dd52c39324cecbf4c22b710e291de26bae8f09204b4a9dcb711e784eb7c,2024-05-01T19:50:25.633000
|
CVE-2024-27033,0,0,99ae4dd52c39324cecbf4c22b710e291de26bae8f09204b4a9dcb711e784eb7c,2024-05-01T19:50:25.633000
|
||||||
CVE-2024-27034,0,0,a9e7de1105d11e28310eeb40c6007754a28705e0fc4756aadd06d5c333670f91,2024-05-01T19:50:25.633000
|
CVE-2024-27034,0,0,a9e7de1105d11e28310eeb40c6007754a28705e0fc4756aadd06d5c333670f91,2024-05-01T19:50:25.633000
|
||||||
CVE-2024-27035,0,0,de6caa5353f29d207951f5c6cb0655ce88080de36a966a9e941d0bc22cc59584,2024-05-01T19:50:25.633000
|
CVE-2024-27035,0,0,de6caa5353f29d207951f5c6cb0655ce88080de36a966a9e941d0bc22cc59584,2024-05-01T19:50:25.633000
|
||||||
@ -248987,7 +248989,7 @@ CVE-2024-27050,0,0,dd1eb20f7cebaf03087c82f7049e5087e8556c8b803e5a5d2fec557dfd4f9
|
|||||||
CVE-2024-27051,0,0,a5f0f37dcf2988f5d46e492939e3fee8af550ad1a72bff52461dcb0b308f27dc,2024-11-05T10:16:24.617000
|
CVE-2024-27051,0,0,a5f0f37dcf2988f5d46e492939e3fee8af550ad1a72bff52461dcb0b308f27dc,2024-11-05T10:16:24.617000
|
||||||
CVE-2024-27052,0,0,b1181b5fccdcf1dfe1970739e055eb9b25314d32d3dbc033144a22078b1e858d,2024-11-05T10:16:24.720000
|
CVE-2024-27052,0,0,b1181b5fccdcf1dfe1970739e055eb9b25314d32d3dbc033144a22078b1e858d,2024-11-05T10:16:24.720000
|
||||||
CVE-2024-27053,0,0,8ef5fe8a862dfbc909fe138c33df28d8e01f8c7054d8543709bc08fc1a631712,2024-11-05T10:16:24.860000
|
CVE-2024-27053,0,0,8ef5fe8a862dfbc909fe138c33df28d8e01f8c7054d8543709bc08fc1a631712,2024-11-05T10:16:24.860000
|
||||||
CVE-2024-27054,0,1,07cae656266e4b957607ddcc6b44e4ae403eb66beb9e9e32950c2c983970e67a,2024-11-06T20:35:11.540000
|
CVE-2024-27054,0,0,07cae656266e4b957607ddcc6b44e4ae403eb66beb9e9e32950c2c983970e67a,2024-11-06T20:35:11.540000
|
||||||
CVE-2024-27055,0,0,f1f4f60e5be8e483ef7b713ef7c9c11c2b4e92b8e1ac3b8e82c2d3f18ccfe46b,2024-05-01T19:50:25.633000
|
CVE-2024-27055,0,0,f1f4f60e5be8e483ef7b713ef7c9c11c2b4e92b8e1ac3b8e82c2d3f18ccfe46b,2024-05-01T19:50:25.633000
|
||||||
CVE-2024-27056,0,0,eb9c42cff1d43c51ba37142ff49c7c647f598f278f30af80f297cea872e6d16b,2024-05-01T19:50:25.633000
|
CVE-2024-27056,0,0,eb9c42cff1d43c51ba37142ff49c7c647f598f278f30af80f297cea872e6d16b,2024-05-01T19:50:25.633000
|
||||||
CVE-2024-27057,0,0,c547d10d93717b1185795df41c7fbb63e300d75cd64ee01d7cffbe3a6007a3e8,2024-05-01T19:50:25.633000
|
CVE-2024-27057,0,0,c547d10d93717b1185795df41c7fbb63e300d75cd64ee01d7cffbe3a6007a3e8,2024-05-01T19:50:25.633000
|
||||||
@ -249008,7 +249010,7 @@ CVE-2024-2707,0,0,85c775d4cadcd703355fe22885699e6d3b33832ba1bf4a0f012eb92a76bd36
|
|||||||
CVE-2024-27070,0,0,9019d5d00e2e557d6bbee725ec44c36e787b905ee46e216a705cd23f704a5b7b,2024-05-01T19:50:25.633000
|
CVE-2024-27070,0,0,9019d5d00e2e557d6bbee725ec44c36e787b905ee46e216a705cd23f704a5b7b,2024-05-01T19:50:25.633000
|
||||||
CVE-2024-27071,0,0,4eba7924eed5d4a7c52b628064790bf6088c813be987aa811365f6d878e7223a,2024-05-01T19:50:25.633000
|
CVE-2024-27071,0,0,4eba7924eed5d4a7c52b628064790bf6088c813be987aa811365f6d878e7223a,2024-05-01T19:50:25.633000
|
||||||
CVE-2024-27072,0,0,21e910cf50ea565953242c80b6cde258546166e0d36d0f32695af1f87df3652c,2024-10-31T17:35:03.127000
|
CVE-2024-27072,0,0,21e910cf50ea565953242c80b6cde258546166e0d36d0f32695af1f87df3652c,2024-10-31T17:35:03.127000
|
||||||
CVE-2024-27073,0,1,e46a75cf5fc003f1d71f465a90896b6249ef76a9bad5eda1a1b988838d2a6979,2024-11-06T19:35:15.903000
|
CVE-2024-27073,0,0,e46a75cf5fc003f1d71f465a90896b6249ef76a9bad5eda1a1b988838d2a6979,2024-11-06T19:35:15.903000
|
||||||
CVE-2024-27074,0,0,1eb80e2232cf51208db1f3cef68d3f425247e597c202b41d3d631a42906e1aca,2024-11-05T10:16:27.387000
|
CVE-2024-27074,0,0,1eb80e2232cf51208db1f3cef68d3f425247e597c202b41d3d631a42906e1aca,2024-11-05T10:16:27.387000
|
||||||
CVE-2024-27075,0,0,b7b88762306d0403ff5ef3850347356e2cd48c2fda797c5c18c89bc098824519,2024-11-05T10:16:27.590000
|
CVE-2024-27075,0,0,b7b88762306d0403ff5ef3850347356e2cd48c2fda797c5c18c89bc098824519,2024-11-05T10:16:27.590000
|
||||||
CVE-2024-27076,0,0,27005424f15ce206aef745406456863fc53e2307c06546ea31f3e5740f638709,2024-11-05T10:16:27.753000
|
CVE-2024-27076,0,0,27005424f15ce206aef745406456863fc53e2307c06546ea31f3e5740f638709,2024-11-05T10:16:27.753000
|
||||||
@ -249571,7 +249573,7 @@ CVE-2024-27812,0,0,e7c3223e43baf8d7f28688930e2d8c8938ef379a12a8d3feb5b2d21387591
|
|||||||
CVE-2024-27813,0,0,7509894567bacd8024514a5dcee7ac821e790e4f4fe9721e1c69cc172a7632d5,2024-07-03T01:50:56.220000
|
CVE-2024-27813,0,0,7509894567bacd8024514a5dcee7ac821e790e4f4fe9721e1c69cc172a7632d5,2024-07-03T01:50:56.220000
|
||||||
CVE-2024-27814,0,0,4d984815b410e205b72405c2d467ac188e0b951fcaa72bcf867e3a4e9a308816,2024-07-03T01:50:56.430000
|
CVE-2024-27814,0,0,4d984815b410e205b72405c2d467ac188e0b951fcaa72bcf867e3a4e9a308816,2024-07-03T01:50:56.430000
|
||||||
CVE-2024-27815,0,0,d4d929e969df5e6d126561402877d5f150bcfd9ba0154fd52fd603f8c3293f47,2024-07-03T01:50:56.640000
|
CVE-2024-27815,0,0,d4d929e969df5e6d126561402877d5f150bcfd9ba0154fd52fd603f8c3293f47,2024-07-03T01:50:56.640000
|
||||||
CVE-2024-27816,0,1,4ad7196d1d7777ac482b799fc1cf864678982df9348a3a55f6e8a16124bb5751,2024-11-06T19:35:16.133000
|
CVE-2024-27816,0,0,4ad7196d1d7777ac482b799fc1cf864678982df9348a3a55f6e8a16124bb5751,2024-11-06T19:35:16.133000
|
||||||
CVE-2024-27817,0,0,a6ab5e337d8094f63b0da74ff4d2361a68df33c6031350054ba5dcf0e38bfd15,2024-07-03T01:50:57.557000
|
CVE-2024-27817,0,0,a6ab5e337d8094f63b0da74ff4d2361a68df33c6031350054ba5dcf0e38bfd15,2024-07-03T01:50:57.557000
|
||||||
CVE-2024-27818,0,0,195e34841c67a6c51f404c6aafece2a89e87db6332c4d32e1ca778a22a5fa453,2024-06-11T08:15:49.700000
|
CVE-2024-27818,0,0,195e34841c67a6c51f404c6aafece2a89e87db6332c4d32e1ca778a22a5fa453,2024-06-11T08:15:49.700000
|
||||||
CVE-2024-27819,0,0,b01d18af8106a4eb630a10d613bb8fd3a0b60e4d3d78300e68d51ac0725c6ff4,2024-07-03T01:50:58.300000
|
CVE-2024-27819,0,0,b01d18af8106a4eb630a10d613bb8fd3a0b60e4d3d78300e68d51ac0725c6ff4,2024-07-03T01:50:58.300000
|
||||||
@ -250217,7 +250219,7 @@ CVE-2024-28804,0,0,f7e3d6c3e14215e831a96b931ea15f5f72cb16cc7bfabd09d8b34530beca5
|
|||||||
CVE-2024-28805,0,0,cb27f95e8662e6f56b138761747243a7826d2330470c48886448473bebd0bb3c,2024-10-25T18:35:04.053000
|
CVE-2024-28805,0,0,cb27f95e8662e6f56b138761747243a7826d2330470c48886448473bebd0bb3c,2024-10-25T18:35:04.053000
|
||||||
CVE-2024-28806,0,0,b0870c92c612bc52e55ac5da958c74e320d7e205346206836a7ae598363f9d27,2024-08-05T11:35:01.757000
|
CVE-2024-28806,0,0,b0870c92c612bc52e55ac5da958c74e320d7e205346206836a7ae598363f9d27,2024-08-05T11:35:01.757000
|
||||||
CVE-2024-28807,0,0,5a4650d9d919dd00d60ada425df7221ee51ecb76af44fdd9eca355c706e3553b,2024-10-04T13:51:25.567000
|
CVE-2024-28807,0,0,5a4650d9d919dd00d60ada425df7221ee51ecb76af44fdd9eca355c706e3553b,2024-10-04T13:51:25.567000
|
||||||
CVE-2024-28808,0,1,6fc8e572569d4866c6fa9429b9d27d19969ab5023429b014e564e428389657b1,2024-11-06T20:35:12.717000
|
CVE-2024-28808,0,0,6fc8e572569d4866c6fa9429b9d27d19969ab5023429b014e564e428389657b1,2024-11-06T20:35:12.717000
|
||||||
CVE-2024-28809,0,0,32a8202bed4dd3b9abf5e0e2fc819e903ef58b53b2fb296a3ab4e72cb018ad65,2024-10-04T13:51:25.567000
|
CVE-2024-28809,0,0,32a8202bed4dd3b9abf5e0e2fc819e903ef58b53b2fb296a3ab4e72cb018ad65,2024-10-04T13:51:25.567000
|
||||||
CVE-2024-2881,0,0,65fc535be8a815e92053ae1d797e8977602b99048c471a2a98041135b70a0df9,2024-09-04T14:27:24.057000
|
CVE-2024-2881,0,0,65fc535be8a815e92053ae1d797e8977602b99048c471a2a98041135b70a0df9,2024-09-04T14:27:24.057000
|
||||||
CVE-2024-28810,0,0,3739176212869d56c3a3e998caee9cc2562b0d9aff07961502c94d248b44c109,2024-10-04T13:51:25.567000
|
CVE-2024-28810,0,0,3739176212869d56c3a3e998caee9cc2562b0d9aff07961502c94d248b44c109,2024-10-04T13:51:25.567000
|
||||||
@ -250288,7 +250290,7 @@ CVE-2024-28890,0,0,75d08f12fbd468307e29dd7cbe4c7c3d5acf11ae18647e40fe18f61a37a2b
|
|||||||
CVE-2024-28891,0,0,31c9d1ebf9f51d96b38fd3616c071c476c1bf3bdfafbca895cdab316c5bcd3e3,2024-03-22T12:45:36.130000
|
CVE-2024-28891,0,0,31c9d1ebf9f51d96b38fd3616c071c476c1bf3bdfafbca895cdab316c5bcd3e3,2024-03-22T12:45:36.130000
|
||||||
CVE-2024-28893,0,0,6bb6e7d4eb5ffccbd865059808a0bb14806c115db17b0c7b58ceaf6722125e36,2024-07-03T01:51:55.153000
|
CVE-2024-28893,0,0,6bb6e7d4eb5ffccbd865059808a0bb14806c115db17b0c7b58ceaf6722125e36,2024-07-03T01:51:55.153000
|
||||||
CVE-2024-28894,0,0,52f5c99a2393e8296645b919b77395855b2fbf6ddfb3ce5fad5f6c31f90cae17,2024-08-01T13:49:21.557000
|
CVE-2024-28894,0,0,52f5c99a2393e8296645b919b77395855b2fbf6ddfb3ce5fad5f6c31f90cae17,2024-08-01T13:49:21.557000
|
||||||
CVE-2024-28895,0,0,7f60c42026f8919d7327f07078b6071429a47272f57bf3ec7d964752af390988,2024-04-01T01:33:21.910000
|
CVE-2024-28895,0,1,cc9ec60ced6c4f6144882d61563736eb0ac7e1a82255f1711a9c93674e3ffa46,2024-11-06T21:35:05.843000
|
||||||
CVE-2024-28896,0,0,82c8e7dd995d4781c98f0d7c761e7b443ea0ceb397f6b58ed2e6c96c2843e057,2024-04-10T13:24:00.070000
|
CVE-2024-28896,0,0,82c8e7dd995d4781c98f0d7c761e7b443ea0ceb397f6b58ed2e6c96c2843e057,2024-04-10T13:24:00.070000
|
||||||
CVE-2024-28897,0,0,f9f596567c4f5a1d1ef0ea2267dd4bdd40c07a7d3f8bde3d914da43c8724226d,2024-04-10T13:24:00.070000
|
CVE-2024-28897,0,0,f9f596567c4f5a1d1ef0ea2267dd4bdd40c07a7d3f8bde3d914da43c8724226d,2024-04-10T13:24:00.070000
|
||||||
CVE-2024-28898,0,0,e62fdbb651dac3d1f5bd9c36f1fb9b36d2bc8afc331691f95d20f220846dce98,2024-04-10T13:24:00.070000
|
CVE-2024-28898,0,0,e62fdbb651dac3d1f5bd9c36f1fb9b36d2bc8afc331691f95d20f220846dce98,2024-04-10T13:24:00.070000
|
||||||
@ -250781,7 +250783,7 @@ CVE-2024-29739,0,0,e1057fb9115257c9cc112890add5aab29e2addabc474164aa5dc49dc015af
|
|||||||
CVE-2024-2974,0,0,f10703d4490e9d3ed63c6b4abd6c9bf87d6d9b2c11e56d030e360944602d03aa,2024-04-10T13:23:38.787000
|
CVE-2024-2974,0,0,f10703d4490e9d3ed63c6b4abd6c9bf87d6d9b2c11e56d030e360944602d03aa,2024-04-10T13:23:38.787000
|
||||||
CVE-2024-29740,0,0,b8da55b65cd03c8f279340fc383178e4918b6ddc001e65f509694a717508d4d0,2024-07-03T01:52:30.657000
|
CVE-2024-29740,0,0,b8da55b65cd03c8f279340fc383178e4918b6ddc001e65f509694a717508d4d0,2024-07-03T01:52:30.657000
|
||||||
CVE-2024-29741,0,0,a475db5d288fe89871088d062fc43a43c29a2a7a1fc8050faa6de7801796db92,2024-04-08T18:49:25.863000
|
CVE-2024-29741,0,0,a475db5d288fe89871088d062fc43a43c29a2a7a1fc8050faa6de7801796db92,2024-04-08T18:49:25.863000
|
||||||
CVE-2024-29742,0,1,3670333ea9fbb45ca159956c69b3ce18ac4d0f3cf08b138c36c7c46652b7f763,2024-11-06T20:35:13.483000
|
CVE-2024-29742,0,0,3670333ea9fbb45ca159956c69b3ce18ac4d0f3cf08b138c36c7c46652b7f763,2024-11-06T20:35:13.483000
|
||||||
CVE-2024-29743,0,0,84c45acac68285953d0f847d89629f6df4afe2ae0557e844a739860834244671,2024-04-08T18:49:25.863000
|
CVE-2024-29743,0,0,84c45acac68285953d0f847d89629f6df4afe2ae0557e844a739860834244671,2024-04-08T18:49:25.863000
|
||||||
CVE-2024-29744,0,0,261c7417210a4d10590c39459d063b6a3382c5fabd76d0ef2ba580fc9b59de43,2024-04-08T18:49:25.863000
|
CVE-2024-29744,0,0,261c7417210a4d10590c39459d063b6a3382c5fabd76d0ef2ba580fc9b59de43,2024-04-08T18:49:25.863000
|
||||||
CVE-2024-29745,0,0,40250cabd067f394dda6fb03fe08d83fd93611782b23244c4a5077110391f2e7,2024-08-14T16:59:22.427000
|
CVE-2024-29745,0,0,40250cabd067f394dda6fb03fe08d83fd93611782b23244c4a5077110391f2e7,2024-08-14T16:59:22.427000
|
||||||
@ -250993,7 +250995,7 @@ CVE-2024-29944,0,0,0c36a6d1c7372e4eb368749381c53b8250c9da970d136cfa0d6ab703ac139
|
|||||||
CVE-2024-29945,0,0,545d8d8a5d454680f75ae96bc2bf76a65720f53d27f04c08caf122c1f6350f1e,2024-04-10T01:15:18.693000
|
CVE-2024-29945,0,0,545d8d8a5d454680f75ae96bc2bf76a65720f53d27f04c08caf122c1f6350f1e,2024-04-10T01:15:18.693000
|
||||||
CVE-2024-29946,0,0,fe7659ecbb6ae16d4fdd53bc892e5c7f96cebf8e48eee47ced0bee27647d82e8,2024-10-15T18:35:13.400000
|
CVE-2024-29946,0,0,fe7659ecbb6ae16d4fdd53bc892e5c7f96cebf8e48eee47ced0bee27647d82e8,2024-10-15T18:35:13.400000
|
||||||
CVE-2024-29947,0,0,8ad8469acdce0b9e6eead1629c69da154792700d4004eaaf5144ca5b844c0d04,2024-10-31T15:35:31.567000
|
CVE-2024-29947,0,0,8ad8469acdce0b9e6eead1629c69da154792700d4004eaaf5144ca5b844c0d04,2024-10-31T15:35:31.567000
|
||||||
CVE-2024-29948,0,0,7ed27d99c23307d6fd7f79bc81ee07d6524ce20c9d05b450c959d1b570daca5b,2024-04-02T12:50:42.233000
|
CVE-2024-29948,0,1,e90b613e60d3fcc3b6383faa88cb646693ff5f746ac5f86e3ba2e922d0499f32,2024-11-06T21:35:06.680000
|
||||||
CVE-2024-29949,0,0,8f69a1b2712eb97f7e6695f2c2705447de624d6bcea7462b789eaee89a32183e,2024-08-27T15:35:13.560000
|
CVE-2024-29949,0,0,8f69a1b2712eb97f7e6695f2c2705447de624d6bcea7462b789eaee89a32183e,2024-08-27T15:35:13.560000
|
||||||
CVE-2024-2995,0,0,5c930568d7253585b775f810f84df45baf66709200c70b2d2468f14a6758b594,2024-05-17T02:38:41.600000
|
CVE-2024-2995,0,0,5c930568d7253585b775f810f84df45baf66709200c70b2d2468f14a6758b594,2024-05-17T02:38:41.600000
|
||||||
CVE-2024-29950,0,0,9160d1bdf3252c379c3a5b7b30fcb4dec34616c1033f3f635941b6a0b940cac7,2024-04-17T20:08:21.887000
|
CVE-2024-29950,0,0,9160d1bdf3252c379c3a5b7b30fcb4dec34616c1033f3f635941b6a0b940cac7,2024-04-17T20:08:21.887000
|
||||||
@ -251173,7 +251175,7 @@ CVE-2024-30118,0,0,a600cbc3312207feafbf7858618a61f6dd2c38296d39ec303171804559f68
|
|||||||
CVE-2024-30119,0,0,4baed8c508a821c818525782701105249753896feab644ba3efffba269f578b9,2024-07-03T01:53:51.120000
|
CVE-2024-30119,0,0,4baed8c508a821c818525782701105249753896feab644ba3efffba269f578b9,2024-07-03T01:53:51.120000
|
||||||
CVE-2024-3012,0,0,ae30314159430e25e9f2b09f2e0a440cd8bb99b7d72b62fa4eb73b4affe20188,2024-05-17T02:39:40.620000
|
CVE-2024-3012,0,0,ae30314159430e25e9f2b09f2e0a440cd8bb99b7d72b62fa4eb73b4affe20188,2024-05-17T02:39:40.620000
|
||||||
CVE-2024-30120,0,0,f704816cf356d01bbdb53903a0b14bef34a589a7c9185030672ca3a1f14e4a1c,2024-06-17T12:42:04.623000
|
CVE-2024-30120,0,0,f704816cf356d01bbdb53903a0b14bef34a589a7c9185030672ca3a1f14e4a1c,2024-06-17T12:42:04.623000
|
||||||
CVE-2024-30122,0,0,b78e8f60e4d0df5148447073604013d9d8b1860e36c446b761d204643c69cb09,2024-10-25T12:56:36.827000
|
CVE-2024-30122,0,1,9f485dd65437a7051ea4a1c20434d3eb51730baba0c509d8f2633bcd688cd79c,2024-11-06T22:33:46.797000
|
||||||
CVE-2024-30124,0,0,40a4254bc1bc6d9de977773d0f614d8309c4c262777ba96571bd84dac137cd34,2024-10-29T15:35:22.230000
|
CVE-2024-30124,0,0,40a4254bc1bc6d9de977773d0f614d8309c4c262777ba96571bd84dac137cd34,2024-10-29T15:35:22.230000
|
||||||
CVE-2024-30125,0,0,1e8984bc19e1a45cd2a6c4ac0b43f227ca7f3a8dcb96ab9c16c6ada82e4faa52,2024-07-19T13:01:44.567000
|
CVE-2024-30125,0,0,1e8984bc19e1a45cd2a6c4ac0b43f227ca7f3a8dcb96ab9c16c6ada82e4faa52,2024-07-19T13:01:44.567000
|
||||||
CVE-2024-30126,0,0,6fc62f044a7f0651037fa78da0350df1d81591508f3d5a2909dd34802958ba70,2024-10-30T17:35:02.160000
|
CVE-2024-30126,0,0,6fc62f044a7f0651037fa78da0350df1d81591508f3d5a2909dd34802958ba70,2024-10-30T17:35:02.160000
|
||||||
@ -252465,7 +252467,7 @@ CVE-2024-31874,0,0,2aaf0dfaa6414e1f138855d0f6d75787313d073eca635397ca103ff7f6449
|
|||||||
CVE-2024-31878,0,0,c6557222267c2e9c166ed275e7cc9327cfea0693e0a8976b187deb7865aacef5,2024-06-11T18:23:27.153000
|
CVE-2024-31878,0,0,c6557222267c2e9c166ed275e7cc9327cfea0693e0a8976b187deb7865aacef5,2024-06-11T18:23:27.153000
|
||||||
CVE-2024-31879,0,0,3d520028d5f0055139f730dd4a6eb2d11b7ab38a082798764c43108749c5b618,2024-05-20T13:00:34.807000
|
CVE-2024-31879,0,0,3d520028d5f0055139f730dd4a6eb2d11b7ab38a082798764c43108749c5b618,2024-05-20T13:00:34.807000
|
||||||
CVE-2024-3188,0,0,0566f9bb8e826930c137ba20908e573874a3f34d7900cbdeff699f1e3434f595,2024-07-08T14:19:01.160000
|
CVE-2024-3188,0,0,0566f9bb8e826930c137ba20908e573874a3f34d7900cbdeff699f1e3434f595,2024-07-08T14:19:01.160000
|
||||||
CVE-2024-31880,0,1,be8757c255692a002ba856efab44e4c34f4b168589ca30c0f60b6ad09580b3cc,2024-11-06T20:39:55.200000
|
CVE-2024-31880,0,0,be8757c255692a002ba856efab44e4c34f4b168589ca30c0f60b6ad09580b3cc,2024-11-06T20:39:55.200000
|
||||||
CVE-2024-31881,0,0,b3692d17c2d4f662273dec610556097ee0b8856656ac8f4835c5e840eb8a6228,2024-08-07T16:59:15.627000
|
CVE-2024-31881,0,0,b3692d17c2d4f662273dec610556097ee0b8856656ac8f4835c5e840eb8a6228,2024-08-07T16:59:15.627000
|
||||||
CVE-2024-31882,0,0,2166c1d8e88429778073b60eb2a31c41e2b55293434c096888febf101419ae12,2024-09-21T10:15:05.403000
|
CVE-2024-31882,0,0,2166c1d8e88429778073b60eb2a31c41e2b55293434c096888febf101419ae12,2024-09-21T10:15:05.403000
|
||||||
CVE-2024-31883,0,0,c4a2241ac7ebf5ea1afff59f8bf762360ac7a99942ee729cf3d03ae8864dc6f3,2024-08-02T15:06:08.297000
|
CVE-2024-31883,0,0,c4a2241ac7ebf5ea1afff59f8bf762360ac7a99942ee729cf3d03ae8864dc6f3,2024-08-02T15:06:08.297000
|
||||||
@ -253546,7 +253548,7 @@ CVE-2024-3333,0,0,07adae09fe4330a280bc63a18371de9b336f80bb47bd9644f6cd6164f000d8
|
|||||||
CVE-2024-33331,0,0,9615eb671a81caf99447cfe3f11a47c5fdeef0f060420da831650ede0c65f0d0,2024-04-28T23:15:07.120000
|
CVE-2024-33331,0,0,9615eb671a81caf99447cfe3f11a47c5fdeef0f060420da831650ede0c65f0d0,2024-04-28T23:15:07.120000
|
||||||
CVE-2024-33332,0,0,d4616ec3d8fa6c2d14a3b8584e4c2b0a6bdaf97d03584623852ed717f43b90a3,2024-07-03T01:57:52.560000
|
CVE-2024-33332,0,0,d4616ec3d8fa6c2d14a3b8584e4c2b0a6bdaf97d03584623852ed717f43b90a3,2024-07-03T01:57:52.560000
|
||||||
CVE-2024-33335,0,0,a6cf66b4ab082555dd66294d501cc06d5dc2570dbd2ca86fdaeca4a73e9bd728,2024-07-03T01:57:53.270000
|
CVE-2024-33335,0,0,a6cf66b4ab082555dd66294d501cc06d5dc2570dbd2ca86fdaeca4a73e9bd728,2024-07-03T01:57:53.270000
|
||||||
CVE-2024-33338,0,0,12ed0f94ef6bec704d8914890ae777ce00e44c5deae0f7e3194a77889af4a88d,2024-04-30T13:11:16.690000
|
CVE-2024-33338,0,1,dc64e17746d1abab607747c6889c78b7b366c3abba84bde17473f7cc02765f3e,2024-11-06T22:35:06.803000
|
||||||
CVE-2024-33339,0,0,1bca262a290e7823541ac5c56ca607cb8f0a9af8877c53f0a0d3e60cf0f91403,2024-04-29T05:15:06.340000
|
CVE-2024-33339,0,0,1bca262a290e7823541ac5c56ca607cb8f0a9af8877c53f0a0d3e60cf0f91403,2024-04-29T05:15:06.340000
|
||||||
CVE-2024-33342,0,0,060ace50da8b3f05ba7f67da31443071368333e101cc3fb61992e65c8481798b,2024-07-03T01:57:54.047000
|
CVE-2024-33342,0,0,060ace50da8b3f05ba7f67da31443071368333e101cc3fb61992e65c8481798b,2024-07-03T01:57:54.047000
|
||||||
CVE-2024-33343,0,0,0403ccc83281b5ef39242fa2607cb174a7fbc97f1fc5833b8133765daf81f98a,2024-07-03T01:57:54.823000
|
CVE-2024-33343,0,0,0403ccc83281b5ef39242fa2607cb174a7fbc97f1fc5833b8133765daf81f98a,2024-07-03T01:57:54.823000
|
||||||
@ -254715,10 +254717,10 @@ CVE-2024-34854,0,0,6f71aaf23a02a63a600f0bcc65e36559492677e420248555c46cf3409591d
|
|||||||
CVE-2024-3486,0,0,62a4db44c896a78c795e29b3f9a0c80ac2a4afae964bf16e58e73f8540a6d627,2024-05-15T18:35:11.453000
|
CVE-2024-3486,0,0,62a4db44c896a78c795e29b3f9a0c80ac2a4afae964bf16e58e73f8540a6d627,2024-05-15T18:35:11.453000
|
||||||
CVE-2024-3487,0,0,4ff2b905105ca048d90a2e33e25fd9b26128f3e6906b07d6299f870ad63ad55f,2024-05-15T18:35:11.453000
|
CVE-2024-3487,0,0,4ff2b905105ca048d90a2e33e25fd9b26128f3e6906b07d6299f870ad63ad55f,2024-05-15T18:35:11.453000
|
||||||
CVE-2024-3488,0,0,61e15575c22ff5a767d1be731e2c78e99681dc33e8575bc1a8940edf28193df9,2024-05-15T18:35:11.453000
|
CVE-2024-3488,0,0,61e15575c22ff5a767d1be731e2c78e99681dc33e8575bc1a8940edf28193df9,2024-05-15T18:35:11.453000
|
||||||
CVE-2024-34882,0,1,87af8750e4cb2492a1db05c6a474cbcbe5be6845ce5c5a5a7c082cfe43c24233,2024-11-06T19:28:48.523000
|
CVE-2024-34882,0,0,87af8750e4cb2492a1db05c6a474cbcbe5be6845ce5c5a5a7c082cfe43c24233,2024-11-06T19:28:48.523000
|
||||||
CVE-2024-34883,0,1,722d63ecfd95cb7389789f2d22dce1739cb8a5a04275a6b5ae60854c8f1c6842,2024-11-06T19:28:34.900000
|
CVE-2024-34883,0,0,722d63ecfd95cb7389789f2d22dce1739cb8a5a04275a6b5ae60854c8f1c6842,2024-11-06T19:28:34.900000
|
||||||
CVE-2024-34885,0,0,c31fa281dfa61082a4cb2f1ba2ae0a4d2fc44e82a0f4b8396c582b05683b39d0,2024-11-05T17:35:15.887000
|
CVE-2024-34885,0,0,c31fa281dfa61082a4cb2f1ba2ae0a4d2fc44e82a0f4b8396c582b05683b39d0,2024-11-05T17:35:15.887000
|
||||||
CVE-2024-34887,0,1,f7d4e5d57e7e6933735283b4e369818932c8268719be24dd494c0cc41f5513e7,2024-11-06T19:28:15.613000
|
CVE-2024-34887,0,0,f7d4e5d57e7e6933735283b4e369818932c8268719be24dd494c0cc41f5513e7,2024-11-06T19:28:15.613000
|
||||||
CVE-2024-3489,0,0,ea9bd95a767998b3f2d98747bee17b3d4435734727140c279148a23c9826811b,2024-05-02T18:00:37.360000
|
CVE-2024-3489,0,0,ea9bd95a767998b3f2d98747bee17b3d4435734727140c279148a23c9826811b,2024-05-02T18:00:37.360000
|
||||||
CVE-2024-34891,0,0,111963e19005c729fbfb50630519cf497707d87e3cea6358972fd367cefea299,2024-11-05T17:35:17.710000
|
CVE-2024-34891,0,0,111963e19005c729fbfb50630519cf497707d87e3cea6358972fd367cefea299,2024-11-05T17:35:17.710000
|
||||||
CVE-2024-34899,0,0,8587795bcb80eaac03ccdd83ddcd275c805b44aa37227142776a20079d894d2e,2024-05-14T16:12:23.490000
|
CVE-2024-34899,0,0,8587795bcb80eaac03ccdd83ddcd275c805b44aa37227142776a20079d894d2e,2024-05-14T16:12:23.490000
|
||||||
@ -255329,7 +255331,7 @@ CVE-2024-35831,0,0,e1fc7f0c23288b900631cc5188ff473f5fa3fdb4e972cc7bfb87b54902c97
|
|||||||
CVE-2024-35832,0,0,16e51c73c8492f6c41ac59c1b69f8a852bd6d4b4a851405fa3ce91979c7ac289,2024-05-17T18:35:35.070000
|
CVE-2024-35832,0,0,16e51c73c8492f6c41ac59c1b69f8a852bd6d4b4a851405fa3ce91979c7ac289,2024-05-17T18:35:35.070000
|
||||||
CVE-2024-35833,0,0,844b1146e92e53029cbdbc55527e41e7896607bf9d9f2d333a13fe6ce9ec3a8c,2024-11-05T10:16:42.453000
|
CVE-2024-35833,0,0,844b1146e92e53029cbdbc55527e41e7896607bf9d9f2d333a13fe6ce9ec3a8c,2024-11-05T10:16:42.453000
|
||||||
CVE-2024-35834,0,0,5790f34b9247e53213fb9b46635ec2095a0128f0902ae39f44312cfee4914f39,2024-05-17T18:35:35.070000
|
CVE-2024-35834,0,0,5790f34b9247e53213fb9b46635ec2095a0128f0902ae39f44312cfee4914f39,2024-05-17T18:35:35.070000
|
||||||
CVE-2024-35835,0,0,a276855569c1738142e0a9a7f5c96bc15a43a0942b6ac67b52a0d390795b7723,2024-11-05T10:16:42.810000
|
CVE-2024-35835,0,1,ed8b4cf6c12992561ec5c36280ef97df65b951d69180a908fa49c8fe9773371a,2024-11-06T21:35:07.630000
|
||||||
CVE-2024-35836,0,0,9b23a77395582da383d04f18fcf78c45edf3e53bc59c70e097e42d6ca3f4fb8e,2024-05-17T18:35:35.070000
|
CVE-2024-35836,0,0,9b23a77395582da383d04f18fcf78c45edf3e53bc59c70e097e42d6ca3f4fb8e,2024-05-17T18:35:35.070000
|
||||||
CVE-2024-35837,0,0,f29bf26182906cdda28aa14c299eef8b8b82348c3b88e46b3fbb87c2da0adaa9,2024-11-05T10:16:42.947000
|
CVE-2024-35837,0,0,f29bf26182906cdda28aa14c299eef8b8b82348c3b88e46b3fbb87c2da0adaa9,2024-11-05T10:16:42.947000
|
||||||
CVE-2024-35838,0,0,0eb47f23eeab52dc3f477b4fcefe531f1dd8b9865cefb266d57aa7fa08848ac2,2024-05-17T18:35:35.070000
|
CVE-2024-35838,0,0,0eb47f23eeab52dc3f477b4fcefe531f1dd8b9865cefb266d57aa7fa08848ac2,2024-05-17T18:35:35.070000
|
||||||
@ -256055,7 +256057,7 @@ CVE-2024-3687,0,0,0790df61296b0929bb9b469121387dd5b7cd2b562eeab594414896ab3fb872
|
|||||||
CVE-2024-36877,0,0,b5940056cb3357be0fc404faf9d20c26624de04b24c3b32151a8171b19c64e1f,2024-10-24T20:35:06.353000
|
CVE-2024-36877,0,0,b5940056cb3357be0fc404faf9d20c26624de04b24c3b32151a8171b19c64e1f,2024-10-24T20:35:06.353000
|
||||||
CVE-2024-3688,0,0,fd7741416f20e86cc9ace0c3d1680a96020807dd7ba69d4b2d23070e23e95bee,2024-06-04T19:20:23.107000
|
CVE-2024-3688,0,0,fd7741416f20e86cc9ace0c3d1680a96020807dd7ba69d4b2d23070e23e95bee,2024-06-04T19:20:23.107000
|
||||||
CVE-2024-36880,0,0,2b0302be5dbda2a151ebafe5b0e4ed1edd1c138757440601b5f7ee782f06f5e4,2024-05-30T18:18:58.870000
|
CVE-2024-36880,0,0,2b0302be5dbda2a151ebafe5b0e4ed1edd1c138757440601b5f7ee782f06f5e4,2024-05-30T18:18:58.870000
|
||||||
CVE-2024-36881,0,0,462fdd40c8930daf000297e318f0ca45e554b77fd5b7375bf9db7855ebe0f739,2024-05-30T18:18:58.870000
|
CVE-2024-36881,0,1,6142f77b57b8fb6af09e3dfaa3e3ba0665300e19134a7939c625c7275226d261,2024-11-06T22:35:07.757000
|
||||||
CVE-2024-36882,0,0,c4e89f47d00b2e43c4a551b216b884b27dd65ec4bd9b8e9c9ad6f421591d687e,2024-05-30T18:18:58.870000
|
CVE-2024-36882,0,0,c4e89f47d00b2e43c4a551b216b884b27dd65ec4bd9b8e9c9ad6f421591d687e,2024-05-30T18:18:58.870000
|
||||||
CVE-2024-36883,0,0,b7145948b44d2808530c599d92df6ba80fb8f0f74fbae1c4590915a25c35142a,2024-11-05T10:17:08.927000
|
CVE-2024-36883,0,0,b7145948b44d2808530c599d92df6ba80fb8f0f74fbae1c4590915a25c35142a,2024-11-05T10:17:08.927000
|
||||||
CVE-2024-36884,0,0,99fb9b488ff5facb16fca9a70e4acded4f568a909f2397c5349d3312ba4256b7,2024-06-10T19:21:50.973000
|
CVE-2024-36884,0,0,99fb9b488ff5facb16fca9a70e4acded4f568a909f2397c5349d3312ba4256b7,2024-06-10T19:21:50.973000
|
||||||
@ -257899,7 +257901,7 @@ CVE-2024-39332,0,0,c45d3a16d900c3a32f364ec197299d9fa083202fb226adfaa80ac6e38be04
|
|||||||
CVE-2024-39334,0,0,94cae5ba65ec50bed6d17b2b54650000947aeee42b8249838d1ebdc24642a191,2024-06-24T12:57:36.513000
|
CVE-2024-39334,0,0,94cae5ba65ec50bed6d17b2b54650000947aeee42b8249838d1ebdc24642a191,2024-06-24T12:57:36.513000
|
||||||
CVE-2024-39337,0,0,ae96e6e5658ac679eff4c9acfa518814cd5ee8874dd941939a565173aee28094,2024-06-24T12:57:36.513000
|
CVE-2024-39337,0,0,ae96e6e5658ac679eff4c9acfa518814cd5ee8874dd941939a565173aee28094,2024-06-24T12:57:36.513000
|
||||||
CVE-2024-39338,0,0,224e3a3c09358e014697d42ae118e958b11cd83a92fda65e581c38eeeb8c28af,2024-08-23T18:35:36.313000
|
CVE-2024-39338,0,0,224e3a3c09358e014697d42ae118e958b11cd83a92fda65e581c38eeeb8c28af,2024-08-23T18:35:36.313000
|
||||||
CVE-2024-39339,0,1,8276759a0218cbee90798944cb0970f3daa8fd8e677793f3d23bb043b043c911,2024-11-06T20:35:19.170000
|
CVE-2024-39339,0,0,8276759a0218cbee90798944cb0970f3daa8fd8e677793f3d23bb043b043c911,2024-11-06T20:35:19.170000
|
||||||
CVE-2024-3934,0,0,3e23cb8746110c86130adc40e1a1911de8a168d18836a34bacdc1437f4453cac,2024-07-22T13:00:53.287000
|
CVE-2024-3934,0,0,3e23cb8746110c86130adc40e1a1911de8a168d18836a34bacdc1437f4453cac,2024-07-22T13:00:53.287000
|
||||||
CVE-2024-39340,0,0,fc621b442d86eea0a2e72227f2b14f23e2a67834630b902f47135788b8db4fd4,2024-09-23T15:15:13.907000
|
CVE-2024-39340,0,0,fc621b442d86eea0a2e72227f2b14f23e2a67834630b902f47135788b8db4fd4,2024-09-23T15:15:13.907000
|
||||||
CVE-2024-39341,0,0,7c359c6b4015613fc52267fcd7e5d9646d4cfcd7e7964fd0c4b36316116d1347,2024-11-04T17:35:19.370000
|
CVE-2024-39341,0,0,7c359c6b4015613fc52267fcd7e5d9646d4cfcd7e7964fd0c4b36316116d1347,2024-11-04T17:35:19.370000
|
||||||
@ -259567,7 +259569,7 @@ CVE-2024-4201,0,0,ee0badf63a3e9c653031fb01c45e3bab9160ffb251dc5a875d128957347bb0
|
|||||||
CVE-2024-42010,0,0,f347d4c1e17b119f6d9851ca0a7b1b017e286c890135bf10b6afdc7ab31c6734,2024-08-12T14:15:07.370000
|
CVE-2024-42010,0,0,f347d4c1e17b119f6d9851ca0a7b1b017e286c890135bf10b6afdc7ab31c6734,2024-08-12T14:15:07.370000
|
||||||
CVE-2024-42011,0,0,780f257b76975d0fa98da03e1cf55c93a899ebb5f320ce83ce248dea2ed98368,2024-10-30T18:35:10.283000
|
CVE-2024-42011,0,0,780f257b76975d0fa98da03e1cf55c93a899ebb5f320ce83ce248dea2ed98368,2024-10-30T18:35:10.283000
|
||||||
CVE-2024-42017,0,0,88bb092060ad69b0ffe1434d2d5d47cfc3d35d9b74da347db32bafd31660675d,2024-10-29T15:35:30.713000
|
CVE-2024-42017,0,0,88bb092060ad69b0ffe1434d2d5d47cfc3d35d9b74da347db32bafd31660675d,2024-10-29T15:35:30.713000
|
||||||
CVE-2024-42018,0,1,d36c2d25618197055a9fa3c5f3f119418108bcdef04b170d040ef1fa8d21ed3f,2024-11-06T20:35:23.377000
|
CVE-2024-42018,0,0,d36c2d25618197055a9fa3c5f3f119418108bcdef04b170d040ef1fa8d21ed3f,2024-11-06T20:35:23.377000
|
||||||
CVE-2024-42019,0,0,00604c99ddf544da3b62d7a84887b798a81cb0c15ced1dcc5fdbfa92f5dd8022,2024-09-09T17:35:05.247000
|
CVE-2024-42019,0,0,00604c99ddf544da3b62d7a84887b798a81cb0c15ced1dcc5fdbfa92f5dd8022,2024-09-09T17:35:05.247000
|
||||||
CVE-2024-4202,0,0,614a40ef1052d861451b397b9533024f5e9aecccff7f20e945fab06926a9f188,2024-05-15T18:35:11.453000
|
CVE-2024-4202,0,0,614a40ef1052d861451b397b9533024f5e9aecccff7f20e945fab06926a9f188,2024-05-15T18:35:11.453000
|
||||||
CVE-2024-42020,0,0,997daa67acd86090eb264416d8bd0f016260f05083a5b2dc041d5c995b94ddfa,2024-10-27T15:35:08.650000
|
CVE-2024-42020,0,0,997daa67acd86090eb264416d8bd0f016260f05083a5b2dc041d5c995b94ddfa,2024-10-27T15:35:08.650000
|
||||||
@ -261685,7 +261687,7 @@ CVE-2024-45180,0,0,08348c7b1382a66372a71879585bc4b470bbbe0e7bc2a628091dcf790778c
|
|||||||
CVE-2024-45181,0,0,c1b3f50892c5ad2964a42f2f7c4bb1e591fc78d268d80e02244df3b7c3d3d502,2024-09-18T20:26:26.873000
|
CVE-2024-45181,0,0,c1b3f50892c5ad2964a42f2f7c4bb1e591fc78d268d80e02244df3b7c3d3d502,2024-09-18T20:26:26.873000
|
||||||
CVE-2024-45182,0,0,e32901d25899173bbdbcd4da8de2dfd78b6a7db5248414eaa56acb1cb3e78104,2024-10-29T21:35:21.720000
|
CVE-2024-45182,0,0,e32901d25899173bbdbcd4da8de2dfd78b6a7db5248414eaa56acb1cb3e78104,2024-10-29T21:35:21.720000
|
||||||
CVE-2024-45184,0,0,4b6497f365552ae587c6f2bb1b9a699bbd0812ac854bb52824296d2cb32eb74f,2024-11-06T17:35:34.223000
|
CVE-2024-45184,0,0,4b6497f365552ae587c6f2bb1b9a699bbd0812ac854bb52824296d2cb32eb74f,2024-11-06T17:35:34.223000
|
||||||
CVE-2024-45185,0,1,72bf9a166165415f673b127935e481d1ba969f414b40f9d8d7aa157b9fd36cb3,2024-11-06T19:35:16.420000
|
CVE-2024-45185,0,0,72bf9a166165415f673b127935e481d1ba969f414b40f9d8d7aa157b9fd36cb3,2024-11-06T19:35:16.420000
|
||||||
CVE-2024-45186,0,0,77c3f8977c3993383fb80894e402f55d5d22584cb41b5e73c31c8d88ae8792cc,2024-10-04T13:50:43.727000
|
CVE-2024-45186,0,0,77c3f8977c3993383fb80894e402f55d5d22584cb41b5e73c31c8d88ae8792cc,2024-10-04T13:50:43.727000
|
||||||
CVE-2024-45187,0,0,b29c34a9281e147a1f2b33bdd2a8c272cd39081d36dd9d0273787cf191e54024,2024-08-26T12:47:20.187000
|
CVE-2024-45187,0,0,b29c34a9281e147a1f2b33bdd2a8c272cd39081d36dd9d0273787cf191e54024,2024-08-26T12:47:20.187000
|
||||||
CVE-2024-45188,0,0,b715e0fd98dc9de103c52fc47a055822268226fc14af5f0a01f3a3eab3db9def,2024-08-26T12:47:20.187000
|
CVE-2024-45188,0,0,b715e0fd98dc9de103c52fc47a055822268226fc14af5f0a01f3a3eab3db9def,2024-08-26T12:47:20.187000
|
||||||
@ -262793,9 +262795,9 @@ CVE-2024-4724,0,0,1e35a8d6fb4d3f11b5f0d2a27ec10d126d5383267b650c161b24f017393ebb
|
|||||||
CVE-2024-47240,0,0,831fca78a2032785727b73be16136073448f60052857b8463d392806d75f9e1e,2024-10-22T15:28:55.637000
|
CVE-2024-47240,0,0,831fca78a2032785727b73be16136073448f60052857b8463d392806d75f9e1e,2024-10-22T15:28:55.637000
|
||||||
CVE-2024-47241,0,0,58a524562b790b246361050e626ab15f35dfe376489ed5527ca425e0e170e59e,2024-10-21T17:10:22.857000
|
CVE-2024-47241,0,0,58a524562b790b246361050e626ab15f35dfe376489ed5527ca425e0e170e59e,2024-10-21T17:10:22.857000
|
||||||
CVE-2024-4725,0,0,038fe38ac4531e61bf3177f0fb7b7333acb4571c75548945a25c993c1898f93c,2024-06-04T19:20:47.930000
|
CVE-2024-4725,0,0,038fe38ac4531e61bf3177f0fb7b7333acb4571c75548945a25c993c1898f93c,2024-06-04T19:20:47.930000
|
||||||
CVE-2024-47253,0,0,d147a39553cbd3e23c9dc47e018d2a55806f90f34fa6d522e8f7794675a01185,2024-11-05T16:04:26.053000
|
CVE-2024-47253,0,1,769fd45217280faed8eb9286b7d777459d03159dafc71924f67681fa771cd1e3,2024-11-06T22:23:29.663000
|
||||||
CVE-2024-47254,0,0,b8a0db85c06b44009d222028a5b119afe28ca7a95e927816b7a664426e22a4bf,2024-11-05T16:04:26.053000
|
CVE-2024-47254,0,1,7b2a0a7f61d863879927876e26f097e0efe10412130b78739d5752f40d5d539d,2024-11-06T22:22:01.623000
|
||||||
CVE-2024-47255,0,0,58719001e8fb814f33ea66a97cb372fbf5162fabaf050c7685b55017aa4f0c1f,2024-11-05T16:04:26.053000
|
CVE-2024-47255,0,1,30fe59c20fea93289fc2e58d886b91b21c216954eb831592a00b542847a8017b,2024-11-06T22:23:05.770000
|
||||||
CVE-2024-4726,0,0,270a342f16ba50f480fb87849b5e08fe420ac808bade1fd45455bab1f318f402,2024-06-12T20:15:13.070000
|
CVE-2024-4726,0,0,270a342f16ba50f480fb87849b5e08fe420ac808bade1fd45455bab1f318f402,2024-06-12T20:15:13.070000
|
||||||
CVE-2024-4727,0,0,944186dc32a6b9f919ede42bcb555e3e922a4782a833eff4d2f1edc6462e7155,2024-05-17T02:40:35.380000
|
CVE-2024-4727,0,0,944186dc32a6b9f919ede42bcb555e3e922a4782a833eff4d2f1edc6462e7155,2024-05-17T02:40:35.380000
|
||||||
CVE-2024-4728,0,0,4f079b987c555f4e946bc2da0c8ee767b411a220a728ca55c5e58bef9ad4770e,2024-05-17T02:40:35.490000
|
CVE-2024-4728,0,0,4f079b987c555f4e946bc2da0c8ee767b411a220a728ca55c5e58bef9ad4770e,2024-05-17T02:40:35.490000
|
||||||
@ -263343,12 +263345,12 @@ CVE-2024-48047,0,0,3283398b8a8a75e7e31eaa0ac97fe84164a0704ec4cafc99d8da73b654c08
|
|||||||
CVE-2024-48048,0,0,eca0ce0d3598806c22101f7f6a854102f0b0e3e7ffa812170ec79d143adac13e,2024-10-18T12:52:33.507000
|
CVE-2024-48048,0,0,eca0ce0d3598806c22101f7f6a854102f0b0e3e7ffa812170ec79d143adac13e,2024-10-18T12:52:33.507000
|
||||||
CVE-2024-48049,0,0,ba765e8b87b10659dfbdf97a27a2e9aefb039f46631f1b6725a7dcd9a3bfe5d3,2024-10-23T16:12:12.127000
|
CVE-2024-48049,0,0,ba765e8b87b10659dfbdf97a27a2e9aefb039f46631f1b6725a7dcd9a3bfe5d3,2024-10-23T16:12:12.127000
|
||||||
CVE-2024-4805,0,0,a2ff69b1db9dd7c01e8bcdbe532fffb4f68853ea688982e077b1b01529f57c85,2024-06-04T19:20:50.553000
|
CVE-2024-4805,0,0,a2ff69b1db9dd7c01e8bcdbe532fffb4f68853ea688982e077b1b01529f57c85,2024-06-04T19:20:50.553000
|
||||||
CVE-2024-48050,0,0,646bf231dbaea3acef4518aef21584a610338d98cdda355c55a38e4e6901cac1,2024-11-05T16:04:26.053000
|
CVE-2024-48050,0,1,efe925e5e80ddffc7c6c5a86aa417aaf629e499121448166a60f26bea5bdb8f9,2024-11-06T21:35:07.863000
|
||||||
CVE-2024-48052,0,1,6787dd59bbf6d5442afa73e6ab5a40a74adf87112b46990cfb17712cbdeff6c1,2024-11-06T20:35:29.830000
|
CVE-2024-48052,0,0,6787dd59bbf6d5442afa73e6ab5a40a74adf87112b46990cfb17712cbdeff6c1,2024-11-06T20:35:29.830000
|
||||||
CVE-2024-48057,0,0,8efebaa9314d97cebd20f7b67631fd55f5efc8a6a3e4bf2e70e24198b54d0deb,2024-11-05T18:35:10.987000
|
CVE-2024-48057,0,0,8efebaa9314d97cebd20f7b67631fd55f5efc8a6a3e4bf2e70e24198b54d0deb,2024-11-05T18:35:10.987000
|
||||||
CVE-2024-48059,0,0,f3391fb334843a3fc6d7e517bab31554559de5a31b6bcad37ec348d6020d4ff8,2024-11-05T22:35:11.853000
|
CVE-2024-48059,0,0,f3391fb334843a3fc6d7e517bab31554559de5a31b6bcad37ec348d6020d4ff8,2024-11-05T22:35:11.853000
|
||||||
CVE-2024-4806,0,0,f8a0e203429c4f99450a15aa6a4b26ee8c7effa68e79948138bc0eccf2af8e7f,2024-06-04T19:20:50.670000
|
CVE-2024-4806,0,0,f8a0e203429c4f99450a15aa6a4b26ee8c7effa68e79948138bc0eccf2af8e7f,2024-06-04T19:20:50.670000
|
||||||
CVE-2024-48061,0,1,3afb2ef6eba7f21135f7c2c854e268a2fe30714157a06ae965803eb7d12a5161,2024-11-06T20:35:30.633000
|
CVE-2024-48061,0,0,3afb2ef6eba7f21135f7c2c854e268a2fe30714157a06ae965803eb7d12a5161,2024-11-06T20:35:30.633000
|
||||||
CVE-2024-48063,0,0,7dad3075f35e3bd4e2e591484ba350f38d4e17902517b9e5e6279458bc0b207a,2024-11-01T13:15:12.020000
|
CVE-2024-48063,0,0,7dad3075f35e3bd4e2e591484ba350f38d4e17902517b9e5e6279458bc0b207a,2024-11-01T13:15:12.020000
|
||||||
CVE-2024-4807,0,0,e5ccc41d46958232939be978f4766518ab72a806619364a653b00c23b63fbc68,2024-06-04T19:20:50.770000
|
CVE-2024-4807,0,0,e5ccc41d46958232939be978f4766518ab72a806619364a653b00c23b63fbc68,2024-06-04T19:20:50.770000
|
||||||
CVE-2024-48074,0,0,bca0d6dbb462c34776a53e7a729ed3fb0634f7f2ea1bca1d6a49bf976df47741,2024-10-29T19:35:18.963000
|
CVE-2024-48074,0,0,bca0d6dbb462c34776a53e7a729ed3fb0634f7f2ea1bca1d6a49bf976df47741,2024-10-29T19:35:18.963000
|
||||||
@ -263483,7 +263485,7 @@ CVE-2024-48454,0,0,6b6ca49a060c554891c90c2e114c529f7522d5800fbd375e9b33b5c669ae0
|
|||||||
CVE-2024-48459,0,0,901474388331b2012a4633aead65b3a3d672e9f671a2126655443e04f1134f78,2024-10-29T20:35:32.737000
|
CVE-2024-48459,0,0,901474388331b2012a4633aead65b3a3d672e9f671a2126655443e04f1134f78,2024-10-29T20:35:32.737000
|
||||||
CVE-2024-4846,0,0,354213cecebbad5d2830809199864dadc70a5508c38afeb47a24b8f17c4c0fe1,2024-06-25T18:50:42.040000
|
CVE-2024-4846,0,0,354213cecebbad5d2830809199864dadc70a5508c38afeb47a24b8f17c4c0fe1,2024-06-25T18:50:42.040000
|
||||||
CVE-2024-48461,0,0,1c2083218c3c3685e23b071a99b5af3e2d4f1a943e6f041925ac67eedb8db886,2024-11-01T12:57:35.843000
|
CVE-2024-48461,0,0,1c2083218c3c3685e23b071a99b5af3e2d4f1a943e6f041925ac67eedb8db886,2024-11-01T12:57:35.843000
|
||||||
CVE-2024-48463,0,1,0bc7f3e7b8d54e56fe8dddcaa14275aa7a5820b50b73c79e9211e7d029e919b7,2024-11-06T19:35:17.717000
|
CVE-2024-48463,0,0,0bc7f3e7b8d54e56fe8dddcaa14275aa7a5820b50b73c79e9211e7d029e919b7,2024-11-06T19:35:17.717000
|
||||||
CVE-2024-48465,0,0,79a85011a870c4c08986e482d9ae1db011c8d568f8e3fabc9f719daa8800b0cb,2024-10-30T18:35:15.410000
|
CVE-2024-48465,0,0,79a85011a870c4c08986e482d9ae1db011c8d568f8e3fabc9f719daa8800b0cb,2024-10-30T18:35:15.410000
|
||||||
CVE-2024-4847,0,0,3e175fcde7743d0dafc07697dcd3c0585505cba50a8840c440513434f4a1e2f1,2024-05-15T16:40:19.330000
|
CVE-2024-4847,0,0,3e175fcde7743d0dafc07697dcd3c0585505cba50a8840c440513434f4a1e2f1,2024-05-15T16:40:19.330000
|
||||||
CVE-2024-4848,0,0,e9a992014a82f7f25ea8b020a59a54821debcc21ba29ea30b909eb2d249ee224,2024-07-29T11:15:09.920000
|
CVE-2024-4848,0,0,e9a992014a82f7f25ea8b020a59a54821debcc21ba29ea30b909eb2d249ee224,2024-07-29T11:15:09.920000
|
||||||
@ -263603,7 +263605,7 @@ CVE-2024-48797,0,0,84ec47d2f0875bb5f244804e75fe25176b42fd271e656bf8a6c457b2cefda
|
|||||||
CVE-2024-48798,0,0,456e6efd1999d161e08d7d92b829aad7f771e38427be013211a406399a3cd174,2024-10-15T16:35:14.783000
|
CVE-2024-48798,0,0,456e6efd1999d161e08d7d92b829aad7f771e38427be013211a406399a3cd174,2024-10-15T16:35:14.783000
|
||||||
CVE-2024-48799,0,0,896d6d04e9dd29e6b7911e8a609c1f9aedfadec2fef931b761998c1ee9dd8f3e,2024-10-15T15:35:21.350000
|
CVE-2024-48799,0,0,896d6d04e9dd29e6b7911e8a609c1f9aedfadec2fef931b761998c1ee9dd8f3e,2024-10-15T15:35:21.350000
|
||||||
CVE-2024-48807,0,0,0d144ac83f7e3b1760f53caa259e9e3c92797a393e9f0218e5e59721fbc1c4dc,2024-11-01T12:57:03.417000
|
CVE-2024-48807,0,0,0d144ac83f7e3b1760f53caa259e9e3c92797a393e9f0218e5e59721fbc1c4dc,2024-11-01T12:57:03.417000
|
||||||
CVE-2024-48809,0,1,47d6c9cea59d124dc3bf475183d772db66f12df1ce197c1776abbec8ee9e52a2,2024-11-06T19:33:54.977000
|
CVE-2024-48809,0,0,47d6c9cea59d124dc3bf475183d772db66f12df1ce197c1776abbec8ee9e52a2,2024-11-06T19:33:54.977000
|
||||||
CVE-2024-4881,0,0,d7fec9dc10ea1cda5c43b7baed66b19ac106fead894074c09a02df3073ad45bc,2024-10-17T15:17:00.590000
|
CVE-2024-4881,0,0,d7fec9dc10ea1cda5c43b7baed66b19ac106fead894074c09a02df3073ad45bc,2024-10-17T15:17:00.590000
|
||||||
CVE-2024-48813,0,0,b3275c3656b3f4746c55f236fa34d6d816026c088db796644a052e298f356a4f,2024-10-15T12:58:51.050000
|
CVE-2024-48813,0,0,b3275c3656b3f4746c55f236fa34d6d816026c088db796644a052e298f356a4f,2024-10-15T12:58:51.050000
|
||||||
CVE-2024-4882,0,0,a4855f599041359b65e48a15f937a27e2ec2e91d9343d627eb58fe60c3b171c1,2024-07-09T18:19:14.047000
|
CVE-2024-4882,0,0,a4855f599041359b65e48a15f937a27e2ec2e91d9343d627eb58fe60c3b171c1,2024-07-09T18:19:14.047000
|
||||||
@ -263700,19 +263702,19 @@ CVE-2024-49211,0,0,69e61cc8ef233b9ff13db5267d11c58ce2f779bbae4d2a372191875e0959a
|
|||||||
CVE-2024-49214,0,0,25aabfb69f8e67934aa819c25fb6d72399969fd517c067365488311d807f5b98,2024-10-29T16:35:14.877000
|
CVE-2024-49214,0,0,25aabfb69f8e67934aa819c25fb6d72399969fd517c067365488311d807f5b98,2024-10-29T16:35:14.877000
|
||||||
CVE-2024-49215,0,0,a819d161a1c5d99bae1a3537b9c18fdd18dd7d46b44a848b4173d70d0fe6177d,2024-10-24T14:10:17.137000
|
CVE-2024-49215,0,0,a819d161a1c5d99bae1a3537b9c18fdd18dd7d46b44a848b4173d70d0fe6177d,2024-10-24T14:10:17.137000
|
||||||
CVE-2024-49216,0,0,6acffa32d15c0271869a6ba3150ee4d41d9276ea01fbd76b60626657e8a8c6f0,2024-10-16T16:38:14.557000
|
CVE-2024-49216,0,0,6acffa32d15c0271869a6ba3150ee4d41d9276ea01fbd76b60626657e8a8c6f0,2024-10-16T16:38:14.557000
|
||||||
CVE-2024-49217,0,1,85c8a2bd11800855c22552b1c5bc2a47d344ead2a19c71b4f2a282b639a5eb22,2024-11-06T20:53:26.900000
|
CVE-2024-49217,0,0,85c8a2bd11800855c22552b1c5bc2a47d344ead2a19c71b4f2a282b639a5eb22,2024-11-06T20:53:26.900000
|
||||||
CVE-2024-49218,0,0,671ff343da2f5231222648ce902558a11e99be4b95e42fa72739eb1b7f6df389,2024-10-16T16:38:14.557000
|
CVE-2024-49218,0,0,671ff343da2f5231222648ce902558a11e99be4b95e42fa72739eb1b7f6df389,2024-10-16T16:38:14.557000
|
||||||
CVE-2024-49219,0,1,523812c25261161ba5e865409bca50593a9049b9d9f81554a1f3feb8b27a94b1,2024-11-06T20:45:08.233000
|
CVE-2024-49219,0,0,523812c25261161ba5e865409bca50593a9049b9d9f81554a1f3feb8b27a94b1,2024-11-06T20:45:08.233000
|
||||||
CVE-2024-4922,0,0,692b7adcf322621580a484f8f9b29edc18ffd7d0d7aa81554818742dd70afb00,2024-06-20T20:15:20.020000
|
CVE-2024-4922,0,0,692b7adcf322621580a484f8f9b29edc18ffd7d0d7aa81554818742dd70afb00,2024-06-20T20:15:20.020000
|
||||||
CVE-2024-49220,0,1,0ef4eec8872e2d73dcc890c17ee54afbea8a47ddd760e9d6518b78fbad00b47c,2024-11-06T20:41:13.367000
|
CVE-2024-49220,0,0,0ef4eec8872e2d73dcc890c17ee54afbea8a47ddd760e9d6518b78fbad00b47c,2024-11-06T20:41:13.367000
|
||||||
CVE-2024-49221,0,1,435842c334a660a0805ff050e49b3b4e8374bf2d1ce8479072841cb5d6919f8a,2024-11-06T20:54:50.527000
|
CVE-2024-49221,0,0,435842c334a660a0805ff050e49b3b4e8374bf2d1ce8479072841cb5d6919f8a,2024-11-06T20:54:50.527000
|
||||||
CVE-2024-49223,0,1,09a19af6067ac9483c25986020d58f93da9bc5c27f813ea5fddcf3b973d0489b,2024-11-06T20:55:37.613000
|
CVE-2024-49223,0,0,09a19af6067ac9483c25986020d58f93da9bc5c27f813ea5fddcf3b973d0489b,2024-11-06T20:55:37.613000
|
||||||
CVE-2024-49224,0,0,d5ed60c2b9217ee9e685d58c35300fb4a2b5ee5fb2fabe8974de51c33541a1ab,2024-10-21T16:31:21.593000
|
CVE-2024-49224,0,0,d5ed60c2b9217ee9e685d58c35300fb4a2b5ee5fb2fabe8974de51c33541a1ab,2024-10-21T16:31:21.593000
|
||||||
CVE-2024-49225,0,0,e045d0de6712b0b413de59de2f5ec4e42e811096a71880e86b358673c2e0d271,2024-10-21T16:33:00.403000
|
CVE-2024-49225,0,0,e045d0de6712b0b413de59de2f5ec4e42e811096a71880e86b358673c2e0d271,2024-10-21T16:33:00.403000
|
||||||
CVE-2024-49226,0,0,df9f2172258cc4d19c6bc195be87c4c9b1bf3d29dd47d60cce8b8efee0aca1a0,2024-10-16T16:38:14.557000
|
CVE-2024-49226,0,0,df9f2172258cc4d19c6bc195be87c4c9b1bf3d29dd47d60cce8b8efee0aca1a0,2024-10-16T16:38:14.557000
|
||||||
CVE-2024-49227,0,0,982f5e93a814f85c16cf1657f4ba0ca40040816eb1de34f1d6cd0e6ad4881dc1,2024-10-16T16:38:14.557000
|
CVE-2024-49227,0,0,982f5e93a814f85c16cf1657f4ba0ca40040816eb1de34f1d6cd0e6ad4881dc1,2024-10-16T16:38:14.557000
|
||||||
CVE-2024-49228,0,0,38437087aa9be3056a11c6798501f534e4b6d4e733ee6d1c2006add27aba0767,2024-10-21T16:34:41.267000
|
CVE-2024-49228,0,0,38437087aa9be3056a11c6798501f534e4b6d4e733ee6d1c2006add27aba0767,2024-10-21T16:34:41.267000
|
||||||
CVE-2024-49229,0,1,1e1752f517578bdb8e0d9073393d2366d6debf6a5e79cdf2932fb5c5b39d70c4,2024-11-06T20:40:30.740000
|
CVE-2024-49229,0,0,1e1752f517578bdb8e0d9073393d2366d6debf6a5e79cdf2932fb5c5b39d70c4,2024-11-06T20:40:30.740000
|
||||||
CVE-2024-4923,0,0,c83198e21d781e3384db11f118092c5fbfa4a06f25d53a21adb6fe23f4380f17,2024-06-04T19:20:53.833000
|
CVE-2024-4923,0,0,c83198e21d781e3384db11f118092c5fbfa4a06f25d53a21adb6fe23f4380f17,2024-06-04T19:20:53.833000
|
||||||
CVE-2024-49230,0,0,89342cb8496066491f5b3d74f112ed9eac62497b67d283852db13e34d1cb2199,2024-10-21T16:37:15.807000
|
CVE-2024-49230,0,0,89342cb8496066491f5b3d74f112ed9eac62497b67d283852db13e34d1cb2199,2024-10-21T16:37:15.807000
|
||||||
CVE-2024-49231,0,0,f1bca784a02483c4e1958c6dd7981ec9ffd6a01b629138db999d0ecc3e3b5b78,2024-10-21T16:37:46.010000
|
CVE-2024-49231,0,0,f1bca784a02483c4e1958c6dd7981ec9ffd6a01b629138db999d0ecc3e3b5b78,2024-10-21T16:37:46.010000
|
||||||
@ -263721,7 +263723,7 @@ CVE-2024-49233,0,0,d15701a736a720d91ce7a393cddc119d365e279a269d1078a3d62a0f44c1e
|
|||||||
CVE-2024-49234,0,0,00d6361d85da44a4fa5e98b0b1923a417577ef114f956e9a3a98833720c5555c,2024-10-21T17:16:51.053000
|
CVE-2024-49234,0,0,00d6361d85da44a4fa5e98b0b1923a417577ef114f956e9a3a98833720c5555c,2024-10-21T17:16:51.053000
|
||||||
CVE-2024-49235,0,0,81b65049d9913937f83fbb02a460f07035b9a9b3cadf729eaa07645e1a8a845f,2024-10-18T12:52:33.507000
|
CVE-2024-49235,0,0,81b65049d9913937f83fbb02a460f07035b9a9b3cadf729eaa07645e1a8a845f,2024-10-18T12:52:33.507000
|
||||||
CVE-2024-49236,0,0,a834af1459ab83c1993774b31ad0e95a9120429d91f000710053f11c8b77484e,2024-10-21T17:12:00.583000
|
CVE-2024-49236,0,0,a834af1459ab83c1993774b31ad0e95a9120429d91f000710053f11c8b77484e,2024-10-21T17:12:00.583000
|
||||||
CVE-2024-49237,0,1,7c921f1ff6e06cda49ce0b96aba5ad95d5b8d4cbec93e4fa528982e38f3e12f5,2024-11-06T20:33:52.403000
|
CVE-2024-49237,0,0,7c921f1ff6e06cda49ce0b96aba5ad95d5b8d4cbec93e4fa528982e38f3e12f5,2024-11-06T20:33:52.403000
|
||||||
CVE-2024-49238,0,0,4f7144ebb272524e891d29605f6262832b81db89d137d3761af7eafcb87405b6,2024-10-21T17:02:51.280000
|
CVE-2024-49238,0,0,4f7144ebb272524e891d29605f6262832b81db89d137d3761af7eafcb87405b6,2024-10-21T17:02:51.280000
|
||||||
CVE-2024-49239,0,0,6bb7d5c1f1f1cff54f68d71e2aed5ac9078819a889d9132789e8a59fb72db7e3,2024-10-21T16:26:20.220000
|
CVE-2024-49239,0,0,6bb7d5c1f1f1cff54f68d71e2aed5ac9078819a889d9132789e8a59fb72db7e3,2024-10-21T16:26:20.220000
|
||||||
CVE-2024-4924,0,0,1b70fe45b850b22b8585c0417300fcac708f98c59205a2cdb72b2f32602e7fb3,2024-10-28T21:35:21.157000
|
CVE-2024-4924,0,0,1b70fe45b850b22b8585c0417300fcac708f98c59205a2cdb72b2f32602e7fb3,2024-10-28T21:35:21.157000
|
||||||
@ -263834,7 +263836,7 @@ CVE-2024-49361,0,0,f551e9abf09d421b2a081416ae11d1d19a91d21656c86d2519f1c7f0e2810
|
|||||||
CVE-2024-49366,0,0,aa37188721af357c851b7fc33379d0188a960b9f96974610014dea2671948c2a,2024-10-23T15:13:58.783000
|
CVE-2024-49366,0,0,aa37188721af357c851b7fc33379d0188a960b9f96974610014dea2671948c2a,2024-10-23T15:13:58.783000
|
||||||
CVE-2024-49367,0,0,c9b869d3df961cbe6cd45089af2bd9e7675369053a02cc6adaf7052174946b00,2024-10-23T15:13:58.783000
|
CVE-2024-49367,0,0,c9b869d3df961cbe6cd45089af2bd9e7675369053a02cc6adaf7052174946b00,2024-10-23T15:13:58.783000
|
||||||
CVE-2024-49368,0,0,8be4e296ee1ec30084981da91255270e2fb2a840014ea77ee3103f7dcd091363,2024-11-06T18:28:54.440000
|
CVE-2024-49368,0,0,8be4e296ee1ec30084981da91255270e2fb2a840014ea77ee3103f7dcd091363,2024-11-06T18:28:54.440000
|
||||||
CVE-2024-49370,0,0,53182a6ce2637f054e6cf92c623239d8b52a4ad6590d2f00fca7214b8ca5b926,2024-10-25T12:56:36.827000
|
CVE-2024-49370,0,1,a5cd1a59d8359f30b64653ed20bc47230e4ab479f61eed26e21f9e51248ce0d7,2024-11-06T22:31:30.160000
|
||||||
CVE-2024-49373,0,0,4aa9cfdbe744fd3ae046ca1eeb4ecc11fd5a7b167271bdbcafbe01dffbbbe75a,2024-10-30T21:16:59.213000
|
CVE-2024-49373,0,0,4aa9cfdbe744fd3ae046ca1eeb4ecc11fd5a7b167271bdbcafbe01dffbbbe75a,2024-10-30T21:16:59.213000
|
||||||
CVE-2024-49376,0,0,190dbce5bcb7aada06f0c8b342eac2772846cf5d2a5dcc8eecc468a0b9c5d5e3,2024-10-28T13:58:09.230000
|
CVE-2024-49376,0,0,190dbce5bcb7aada06f0c8b342eac2772846cf5d2a5dcc8eecc468a0b9c5d5e3,2024-10-28T13:58:09.230000
|
||||||
CVE-2024-49377,0,0,f0a66be903c1ae0848c0330b2ecd5bcb10926f277636c57c6f6f956b317ea158,2024-11-06T18:17:17.287000
|
CVE-2024-49377,0,0,f0a66be903c1ae0848c0330b2ecd5bcb10926f277636c57c6f6f956b317ea158,2024-11-06T18:17:17.287000
|
||||||
@ -263960,7 +263962,7 @@ CVE-2024-49671,0,0,3444bda7ece1f693d338db4cc79d717f379cdd40dbc44287f6100eec0598b
|
|||||||
CVE-2024-49672,0,0,894e1f0624440e3d744307abfb9eb6064ef2e0f986134420bd1cb909f8951534,2024-10-29T14:34:04.427000
|
CVE-2024-49672,0,0,894e1f0624440e3d744307abfb9eb6064ef2e0f986134420bd1cb909f8951534,2024-10-29T14:34:04.427000
|
||||||
CVE-2024-49673,0,0,a91125aab1f7960fc60732cbd0b5d96ec0e4cbbc1297595b886e51864ee396a5,2024-10-29T14:34:04.427000
|
CVE-2024-49673,0,0,a91125aab1f7960fc60732cbd0b5d96ec0e4cbbc1297595b886e51864ee396a5,2024-10-29T14:34:04.427000
|
||||||
CVE-2024-49674,0,0,fd3d64b6e35b6eec27ee3c590860244c5a96a05725f767dbab9cf4cb455540e0,2024-11-01T12:57:03.417000
|
CVE-2024-49674,0,0,fd3d64b6e35b6eec27ee3c590860244c5a96a05725f767dbab9cf4cb455540e0,2024-11-01T12:57:03.417000
|
||||||
CVE-2024-49675,0,0,c6e09b39dfdaf468c89ebc29589596eee519705df1761375fc6ab1777046823b,2024-10-25T12:56:36.827000
|
CVE-2024-49675,0,1,c2223000da0c4ff77fd421192850d7f215252c939d91090d90395539c22636a9,2024-11-06T22:24:22.907000
|
||||||
CVE-2024-49676,0,0,dd890548fa1bcb69576eae4659e357c656125d877be6d06a44ddb178c101b43d,2024-10-25T12:56:36.827000
|
CVE-2024-49676,0,0,dd890548fa1bcb69576eae4659e357c656125d877be6d06a44ddb178c101b43d,2024-10-25T12:56:36.827000
|
||||||
CVE-2024-49678,0,0,a75d300a9f5fa676504639fae81083885456f78da78e7660ba14ca16476d39c0,2024-10-29T14:34:04.427000
|
CVE-2024-49678,0,0,a75d300a9f5fa676504639fae81083885456f78da78e7660ba14ca16476d39c0,2024-10-29T14:34:04.427000
|
||||||
CVE-2024-49679,0,0,20c268334a4df168f30b45a50be9eb5ec235eddb6257303d5d7faf86cb14924e,2024-10-29T14:34:04.427000
|
CVE-2024-49679,0,0,20c268334a4df168f30b45a50be9eb5ec235eddb6257303d5d7faf86cb14924e,2024-10-29T14:34:04.427000
|
||||||
@ -264341,7 +264343,12 @@ CVE-2024-50333,0,0,dec570600936fbd1d13d82c721e514d60fa6e5733b1c9746045163c28aeb4
|
|||||||
CVE-2024-50334,0,0,15b97ca0de89b7422ca1338a576d4ef71067410db416afc03dccd883f0aa73cd,2024-11-01T12:57:35.843000
|
CVE-2024-50334,0,0,15b97ca0de89b7422ca1338a576d4ef71067410db416afc03dccd883f0aa73cd,2024-11-01T12:57:35.843000
|
||||||
CVE-2024-50335,0,0,d56c49b3f816f27a07e453cd7f51250fd71a85087fc2558a07e34513c66fcd1a,2024-11-06T18:17:17.287000
|
CVE-2024-50335,0,0,d56c49b3f816f27a07e453cd7f51250fd71a85087fc2558a07e34513c66fcd1a,2024-11-06T18:17:17.287000
|
||||||
CVE-2024-5034,0,0,ecc1ebd0e8a7a2aea01c9ce5ac07669525947175e7e55790f4a8e8a0b317bae8,2024-08-01T13:59:38.920000
|
CVE-2024-5034,0,0,ecc1ebd0e8a7a2aea01c9ce5ac07669525947175e7e55790f4a8e8a0b317bae8,2024-08-01T13:59:38.920000
|
||||||
|
CVE-2024-50340,1,1,0d8006f3dd7bf6960a884ab327616feab504d4fb3d7bece8ca7ec146ee406621,2024-11-06T21:15:05.527000
|
||||||
|
CVE-2024-50341,1,1,56f80142c8430d4c9e687f36f4de41fdceb7e6a5fedaed2403afd3e967693c45,2024-11-06T21:15:05.747000
|
||||||
|
CVE-2024-50342,1,1,ad2d68e63f0a467fed99a59db8fd904072ce7170031980e68557c0e58aa6b3be,2024-11-06T21:15:05.963000
|
||||||
|
CVE-2024-50343,1,1,13d5f6bf56d0ed34f1292154c100bba90a98e43cd4d2ee727daa489f454989ed,2024-11-06T21:15:06.180000
|
||||||
CVE-2024-50344,0,0,01bf6c563fd2a47d8f1655926ebf620cef86a1d975ff50e33bcc2ca54db6ff27,2024-11-01T12:57:03.417000
|
CVE-2024-50344,0,0,01bf6c563fd2a47d8f1655926ebf620cef86a1d975ff50e33bcc2ca54db6ff27,2024-11-01T12:57:03.417000
|
||||||
|
CVE-2024-50345,1,1,a906319e9df14e184a1c49f6767e11bdb542ba55960f07fbf1c2e373b98a833e,2024-11-06T21:15:06.383000
|
||||||
CVE-2024-50346,0,0,fb25cbb7b8a23f8bc4a8f048afe511d7d942fe5a9bb027a602dbfa956ec82a3d,2024-11-05T16:04:26.053000
|
CVE-2024-50346,0,0,fb25cbb7b8a23f8bc4a8f048afe511d7d942fe5a9bb027a602dbfa956ec82a3d,2024-11-05T16:04:26.053000
|
||||||
CVE-2024-50347,0,0,09b35c9108a453337442f172c0c30bea977424cb455f7f1c26e8c5268b8f2c51,2024-11-01T12:57:03.417000
|
CVE-2024-50347,0,0,09b35c9108a453337442f172c0c30bea977424cb455f7f1c26e8c5268b8f2c51,2024-11-01T12:57:03.417000
|
||||||
CVE-2024-50348,0,0,fa8a8e9e48d227df1afdc378e4ee00ffda2dd051bb15c8b477e290549096cb45,2024-11-06T14:49:46.073000
|
CVE-2024-50348,0,0,fa8a8e9e48d227df1afdc378e4ee00ffda2dd051bb15c8b477e290549096cb45,2024-11-06T14:49:46.073000
|
||||||
@ -264506,7 +264513,7 @@ CVE-2024-5062,0,0,1dce1f93ce1b9242e76ae9cf090eb76ee6afadb656622c6eb5a578a5eb7601
|
|||||||
CVE-2024-50623,0,0,71c6fad96d3194eba7d5d7edd081f9ad30cc6decd08744ac71e97f086f12f546,2024-10-30T21:35:11.373000
|
CVE-2024-50623,0,0,71c6fad96d3194eba7d5d7edd081f9ad30cc6decd08744ac71e97f086f12f546,2024-10-30T21:35:11.373000
|
||||||
CVE-2024-50624,0,0,2f6d7cbc06ddd09de063e5bd0feef072f438fbd478c20a099bcf6256ed039f90,2024-10-30T21:35:12.223000
|
CVE-2024-50624,0,0,2f6d7cbc06ddd09de063e5bd0feef072f438fbd478c20a099bcf6256ed039f90,2024-10-30T21:35:12.223000
|
||||||
CVE-2024-5063,0,0,3ea00cb3f53084b2393e5a818811e5957f116b348338ce87a59f64292b187a9f,2024-06-04T19:20:57.760000
|
CVE-2024-5063,0,0,3ea00cb3f53084b2393e5a818811e5957f116b348338ce87a59f64292b187a9f,2024-06-04T19:20:57.760000
|
||||||
CVE-2024-50637,0,1,856bb5c23e31310b984bfc1cc6773072f2db15e1db2b9091d52418ddd1c7384f,2024-11-06T20:35:33.010000
|
CVE-2024-50637,0,0,856bb5c23e31310b984bfc1cc6773072f2db15e1db2b9091d52418ddd1c7384f,2024-11-06T20:35:33.010000
|
||||||
CVE-2024-5064,0,0,d857d2e0ee5316e135c4045ce3a7ab1579933a9b029d66480995681ffcc21c71,2024-06-04T19:20:57.870000
|
CVE-2024-5064,0,0,d857d2e0ee5316e135c4045ce3a7ab1579933a9b029d66480995681ffcc21c71,2024-06-04T19:20:57.870000
|
||||||
CVE-2024-5065,0,0,0430cc7c42876b1507fe619bbbc6ece1ba2c878f57a5564022a1efa295cd852d,2024-06-04T19:20:57.977000
|
CVE-2024-5065,0,0,0430cc7c42876b1507fe619bbbc6ece1ba2c878f57a5564022a1efa295cd852d,2024-06-04T19:20:57.977000
|
||||||
CVE-2024-5066,0,0,afaa043e18b083dd4b11b301517b086f80728c1a74393b687f88875df4970445,2024-05-20T13:00:34.807000
|
CVE-2024-5066,0,0,afaa043e18b083dd4b11b301517b086f80728c1a74393b687f88875df4970445,2024-05-20T13:00:34.807000
|
||||||
@ -264594,10 +264601,10 @@ CVE-2024-5111,0,0,1e1510502a884c6f23b18cee848205aa75aeed3171cb87569d39e4078bf923
|
|||||||
CVE-2024-51115,0,0,141fdcdabaf7c1ec8339c92338cf4045ebea4dbb9cb424f39276d597a3da7892,2024-11-06T18:17:17.287000
|
CVE-2024-51115,0,0,141fdcdabaf7c1ec8339c92338cf4045ebea4dbb9cb424f39276d597a3da7892,2024-11-06T18:17:17.287000
|
||||||
CVE-2024-51116,0,0,628a52b9257b50cdd3ccc07e8442fee438bd4b142b1a9d47d166ffcd98ae2965,2024-11-06T18:17:17.287000
|
CVE-2024-51116,0,0,628a52b9257b50cdd3ccc07e8442fee438bd4b142b1a9d47d166ffcd98ae2965,2024-11-06T18:17:17.287000
|
||||||
CVE-2024-5112,0,0,689c76c95598a2f86ee6cadbc1c25854cf35ada5e2d2725de4638c44d7f73797,2024-06-04T19:21:00.007000
|
CVE-2024-5112,0,0,689c76c95598a2f86ee6cadbc1c25854cf35ada5e2d2725de4638c44d7f73797,2024-06-04T19:21:00.007000
|
||||||
CVE-2024-51127,0,1,5cbf021500110127b38f6de54e9823061ea68366b333afb20ed57e2e95d1d646,2024-11-06T19:25:14.607000
|
CVE-2024-51127,0,0,5cbf021500110127b38f6de54e9823061ea68366b333afb20ed57e2e95d1d646,2024-11-06T19:25:14.607000
|
||||||
CVE-2024-5113,0,0,d52da1935c57c4016d19b1f0658aa6603ac8563b2af10cf87d5ce42568a3ed96,2024-06-04T19:21:00.113000
|
CVE-2024-5113,0,0,d52da1935c57c4016d19b1f0658aa6603ac8563b2af10cf87d5ce42568a3ed96,2024-06-04T19:21:00.113000
|
||||||
CVE-2024-51132,0,1,741849111477a3dea70a3f4f159f318bcb11e986e2637afecf8a608cf70fdf87,2024-11-06T20:35:34.173000
|
CVE-2024-51132,0,0,741849111477a3dea70a3f4f159f318bcb11e986e2637afecf8a608cf70fdf87,2024-11-06T20:35:34.173000
|
||||||
CVE-2024-51136,0,1,b7028b746c76b0b8db7064a5c94d8b9b8b4865b267652b712081099f88f87998,2024-11-06T19:31:15.230000
|
CVE-2024-51136,0,0,b7028b746c76b0b8db7064a5c94d8b9b8b4865b267652b712081099f88f87998,2024-11-06T19:31:15.230000
|
||||||
CVE-2024-5114,0,0,51655375bf74d88d0b44bf3106775b49d83b04b179d3446b4a92ffe727b17b66,2024-06-04T19:21:00.217000
|
CVE-2024-5114,0,0,51655375bf74d88d0b44bf3106775b49d83b04b179d3446b4a92ffe727b17b66,2024-06-04T19:21:00.217000
|
||||||
CVE-2024-5115,0,0,566281473e2daa2487dd251e202869dc3059aeec07f7c63daa38b65c3bae3de7,2024-06-04T19:21:00.323000
|
CVE-2024-5115,0,0,566281473e2daa2487dd251e202869dc3059aeec07f7c63daa38b65c3bae3de7,2024-06-04T19:21:00.323000
|
||||||
CVE-2024-5116,0,0,8edab88198021b2d3b9901d621d1dabac4b2933945eb225d0257a88c98ac3f15,2024-06-04T19:21:00.430000
|
CVE-2024-5116,0,0,8edab88198021b2d3b9901d621d1dabac4b2933945eb225d0257a88c98ac3f15,2024-06-04T19:21:00.430000
|
||||||
@ -264611,7 +264618,7 @@ CVE-2024-5121,0,0,98477bc3a7c67683bd43da705ad15db6f590ce85a12aaf89110d94461e6c3b
|
|||||||
CVE-2024-5122,0,0,b102c5894de9c993bdf361c85aa63dd17cb454ea5ed33d3ad3120a6c50356b5e,2024-06-04T19:21:00.963000
|
CVE-2024-5122,0,0,b102c5894de9c993bdf361c85aa63dd17cb454ea5ed33d3ad3120a6c50356b5e,2024-06-04T19:21:00.963000
|
||||||
CVE-2024-5123,0,0,c6ee92320f25e8ca50da0e044240269e2ddcb04724d5d630d165dc261fdc83ba,2024-06-04T19:21:01.063000
|
CVE-2024-5123,0,0,c6ee92320f25e8ca50da0e044240269e2ddcb04724d5d630d165dc261fdc83ba,2024-06-04T19:21:01.063000
|
||||||
CVE-2024-5124,0,0,ddf4d98394e08878019bd952c44f2cfd27f047274d82fb0e14f997780f16638c,2024-11-04T11:15:06.937000
|
CVE-2024-5124,0,0,ddf4d98394e08878019bd952c44f2cfd27f047274d82fb0e14f997780f16638c,2024-11-04T11:15:06.937000
|
||||||
CVE-2024-51240,0,1,7445c6ba47df36c0613eb4cb1195b6f0f9ac8d38ec29d4a0f09a129257d8d4ff,2024-11-06T20:35:34.963000
|
CVE-2024-51240,0,0,7445c6ba47df36c0613eb4cb1195b6f0f9ac8d38ec29d4a0f09a129257d8d4ff,2024-11-06T20:35:34.963000
|
||||||
CVE-2024-51242,0,0,e088a83b7d97849945ef8e4d907ce1041a9c29e696b96e8d85eb2989ae73aa7b,2024-11-01T12:57:03.417000
|
CVE-2024-51242,0,0,e088a83b7d97849945ef8e4d907ce1041a9c29e696b96e8d85eb2989ae73aa7b,2024-11-01T12:57:03.417000
|
||||||
CVE-2024-51243,0,0,dc9a3bcceef7b79b773664e490e9177d288abe6b5bfadf448f185196016ec54c,2024-11-01T12:57:03.417000
|
CVE-2024-51243,0,0,dc9a3bcceef7b79b773664e490e9177d288abe6b5bfadf448f185196016ec54c,2024-11-01T12:57:03.417000
|
||||||
CVE-2024-51244,0,0,1da847cb94e7afadbe7e923335974b45b31004bfdcaa7db1bb1325dae7dc5743,2024-11-05T19:28:09.403000
|
CVE-2024-51244,0,0,1da847cb94e7afadbe7e923335974b45b31004bfdcaa7db1bb1325dae7dc5743,2024-11-05T19:28:09.403000
|
||||||
@ -264645,13 +264652,13 @@ CVE-2024-5132,0,0,1e1b0edf57956ef222afc7fdedc2f2211203f4402428303961b463cfc0ea97
|
|||||||
CVE-2024-51326,0,0,86a38e3ec445ab1743629a943074bd136cc3a19613d33223b8410daa71b7467f,2024-11-06T15:02:12.403000
|
CVE-2024-51326,0,0,86a38e3ec445ab1743629a943074bd136cc3a19613d33223b8410daa71b7467f,2024-11-06T15:02:12.403000
|
||||||
CVE-2024-51327,0,0,6dff1d9ddb8570601185ec672ddf11cc5295d3cdce074e30aa360a3024bc5c57,2024-11-06T15:02:55.710000
|
CVE-2024-51327,0,0,6dff1d9ddb8570601185ec672ddf11cc5295d3cdce074e30aa360a3024bc5c57,2024-11-06T15:02:55.710000
|
||||||
CVE-2024-51328,0,0,768f8be19425d8bf4cf9b5b89b937b298b5cc7b18ce12eea5265b64902006bbb,2024-11-04T19:35:16.150000
|
CVE-2024-51328,0,0,768f8be19425d8bf4cf9b5b89b937b298b5cc7b18ce12eea5265b64902006bbb,2024-11-04T19:35:16.150000
|
||||||
CVE-2024-51329,0,1,134d8b5a46fc76f9917a9aed6fc6c4366a039772d7dfe5acc179470dd93f05e6,2024-11-06T19:19:24.793000
|
CVE-2024-51329,0,0,134d8b5a46fc76f9917a9aed6fc6c4366a039772d7dfe5acc179470dd93f05e6,2024-11-06T19:19:24.793000
|
||||||
CVE-2024-5133,0,0,ce2c3261ccf7a6af3656f0cd319a645240f50aa81e714a3f3634cc2f14d7c857,2024-10-17T16:41:53.717000
|
CVE-2024-5133,0,0,ce2c3261ccf7a6af3656f0cd319a645240f50aa81e714a3f3634cc2f14d7c857,2024-10-17T16:41:53.717000
|
||||||
CVE-2024-5134,0,0,58696e79550f0b90695fd0ef5882cdbbda645a91799b45ef9d447d20546faa19,2024-06-04T19:21:01.167000
|
CVE-2024-5134,0,0,58696e79550f0b90695fd0ef5882cdbbda645a91799b45ef9d447d20546faa19,2024-06-04T19:21:01.167000
|
||||||
CVE-2024-5135,0,0,2e8010a5b25d8168b9552f9cffde1de1e433efa7269af046a0453f1985b50c89,2024-05-20T13:00:04.957000
|
CVE-2024-5135,0,0,2e8010a5b25d8168b9552f9cffde1de1e433efa7269af046a0453f1985b50c89,2024-05-20T13:00:04.957000
|
||||||
CVE-2024-51358,0,0,be0f7decc72be7973be0b54dbe7f4f5d0c6692a8b1099b27d3347b7c8184f47f,2024-11-06T18:17:17.287000
|
CVE-2024-51358,0,0,be0f7decc72be7973be0b54dbe7f4f5d0c6692a8b1099b27d3347b7c8184f47f,2024-11-06T18:17:17.287000
|
||||||
CVE-2024-5136,0,0,00acd0d99ac180a457379231db172c8713de0958aea5d4d69a24c44371050460,2024-06-04T19:21:01.267000
|
CVE-2024-5136,0,0,00acd0d99ac180a457379231db172c8713de0958aea5d4d69a24c44371050460,2024-06-04T19:21:01.267000
|
||||||
CVE-2024-51362,0,1,a6e1a40cf5e527208990e8a764ceb58cfefd7f1b5e4a2c9e1905064ef69946f2,2024-11-06T20:35:35.750000
|
CVE-2024-51362,0,0,a6e1a40cf5e527208990e8a764ceb58cfefd7f1b5e4a2c9e1905064ef69946f2,2024-11-06T20:35:35.750000
|
||||||
CVE-2024-5137,0,0,1c94e90fa849c62df03c5c4f490c71de8dac579e548f5eda16234216f611cd2a,2024-06-04T19:21:01.370000
|
CVE-2024-5137,0,0,1c94e90fa849c62df03c5c4f490c71de8dac579e548f5eda16234216f611cd2a,2024-06-04T19:21:01.370000
|
||||||
CVE-2024-51377,0,0,27e24251b8fbb0cd40dc4b3232759f12cbe7946bd501f1e15145c4cb45ca2b57,2024-11-04T21:35:12.543000
|
CVE-2024-51377,0,0,27e24251b8fbb0cd40dc4b3232759f12cbe7946bd501f1e15145c4cb45ca2b57,2024-11-04T21:35:12.543000
|
||||||
CVE-2024-51378,0,0,25041eea06e8de15fb868a226604237e266234c162cafb1c59832cc50427a9bb,2024-11-01T12:57:03.417000
|
CVE-2024-51378,0,0,25041eea06e8de15fb868a226604237e266234c162cafb1c59832cc50427a9bb,2024-11-01T12:57:03.417000
|
||||||
@ -264664,7 +264671,7 @@ CVE-2024-51398,0,0,bf1065b8a7633fd26fe8d4034a94a303b4ea5c6fbbe5b2babb7e5454f0dc9
|
|||||||
CVE-2024-51399,0,0,fc9a4f7feccdf87ac1072a742df0a1dc4f133fcfd9c1bf1ed214d196e18abc1b,2024-11-05T18:35:18.260000
|
CVE-2024-51399,0,0,fc9a4f7feccdf87ac1072a742df0a1dc4f133fcfd9c1bf1ed214d196e18abc1b,2024-11-05T18:35:18.260000
|
||||||
CVE-2024-51406,0,0,219f1a907dc34e3139e40d74617f86db24d4b43908c87f25fb1a00f5ef8165d9,2024-11-04T19:35:17.410000
|
CVE-2024-51406,0,0,219f1a907dc34e3139e40d74617f86db24d4b43908c87f25fb1a00f5ef8165d9,2024-11-04T19:35:17.410000
|
||||||
CVE-2024-51407,0,0,fda917e854eca07dcff49df0339535f103ba20de93b59699ac770c63d8521d21,2024-11-04T20:35:11.350000
|
CVE-2024-51407,0,0,fda917e854eca07dcff49df0339535f103ba20de93b59699ac770c63d8521d21,2024-11-04T20:35:11.350000
|
||||||
CVE-2024-51408,0,0,d571e63af91ee1143469f4bb57d330653f7c5f692a2406715d228afd31a4069d,2024-11-05T22:35:13.937000
|
CVE-2024-51408,0,1,768985f0479d1b629ffaa63d05723a6cce6c2d94e338531281645d00b127aacd,2024-11-06T22:06:43.100000
|
||||||
CVE-2024-5141,0,0,5b006751fd2d8ca9e95fc8cef49a641b35089e8e5594eecd996fab7cf0d4e5e8,2024-07-24T17:58:54.867000
|
CVE-2024-5141,0,0,5b006751fd2d8ca9e95fc8cef49a641b35089e8e5594eecd996fab7cf0d4e5e8,2024-07-24T17:58:54.867000
|
||||||
CVE-2024-51419,0,0,e145fdc3d6134b228049cf2c0ec561624aa79dc4de0c1da7a3c5f83de9d39a5f,2024-11-01T12:57:03.417000
|
CVE-2024-51419,0,0,e145fdc3d6134b228049cf2c0ec561624aa79dc4de0c1da7a3c5f83de9d39a5f,2024-11-01T12:57:03.417000
|
||||||
CVE-2024-5142,0,0,8102929b9600e5392a308a1b7cfd863bc4b2848bde33508d601b388a9c02231d,2024-08-27T11:15:04.540000
|
CVE-2024-5142,0,0,8102929b9600e5392a308a1b7cfd863bc4b2848bde33508d601b388a9c02231d,2024-08-27T11:15:04.540000
|
||||||
@ -264738,22 +264745,22 @@ CVE-2024-5159,0,0,6487690749e64572084b0b1ffb84b7950e8b682c3129ca3d21d0dbc204e9ec
|
|||||||
CVE-2024-5160,0,0,761bdadb9ac3f89d156978519ca326c5704c62592c7f03e703ecc7e802a865d7,2024-07-03T02:08:36.807000
|
CVE-2024-5160,0,0,761bdadb9ac3f89d156978519ca326c5704c62592c7f03e703ecc7e802a865d7,2024-07-03T02:08:36.807000
|
||||||
CVE-2024-5161,0,0,f120c7db938e25c7983d6c400da502880d5ffbc93ab4e5e05351c3fca8fbd038,2024-07-24T17:54:42.387000
|
CVE-2024-5161,0,0,f120c7db938e25c7983d6c400da502880d5ffbc93ab4e5e05351c3fca8fbd038,2024-07-24T17:54:42.387000
|
||||||
CVE-2024-5162,0,0,b916c521cfe3c1fb21956086b784f2a8541eeb514496e084206ecc726f921efe,2024-07-24T17:53:33.277000
|
CVE-2024-5162,0,0,b916c521cfe3c1fb21956086b784f2a8541eeb514496e084206ecc726f921efe,2024-07-24T17:53:33.277000
|
||||||
CVE-2024-51626,0,0,18e5c511939be2558be617df0507b9f12fa7d0e50de2af2ea7459c488b192636,2024-11-04T18:50:05.607000
|
CVE-2024-51626,0,1,1464c1c98efb870dcd3b5a35eb6a7feff3782c73b32d47b788148d4cc3703554,2024-11-06T22:10:20.517000
|
||||||
CVE-2024-5163,0,0,1f45f157a740def8c3f1c2e097025198bc2166983108f63600058e7c57408d30,2024-08-21T06:15:07.277000
|
CVE-2024-5163,0,0,1f45f157a740def8c3f1c2e097025198bc2166983108f63600058e7c57408d30,2024-08-21T06:15:07.277000
|
||||||
CVE-2024-5165,0,0,2b7469c3d25cc1e03e7fcca1607bc78daf489d82c018a0fbc4f3b815c328cf85,2024-05-24T01:15:30.977000
|
CVE-2024-5165,0,0,2b7469c3d25cc1e03e7fcca1607bc78daf489d82c018a0fbc4f3b815c328cf85,2024-05-24T01:15:30.977000
|
||||||
CVE-2024-5166,0,0,5c544eab21844e01fabd3874ed7776a55145987bd3a510311ad16f12f33bd2bc,2024-05-22T18:59:20.240000
|
CVE-2024-5166,0,0,5c544eab21844e01fabd3874ed7776a55145987bd3a510311ad16f12f33bd2bc,2024-05-22T18:59:20.240000
|
||||||
CVE-2024-51661,0,0,9622f3634ba493f615ed2927ef92c179ee0dcb7280d813f52b441be81e048a8e,2024-11-04T18:50:05.607000
|
CVE-2024-51661,0,0,9622f3634ba493f615ed2927ef92c179ee0dcb7280d813f52b441be81e048a8e,2024-11-04T18:50:05.607000
|
||||||
CVE-2024-51665,0,0,56bf9fcd202b3ea9001e454522be11bd5978f32ce441602f00aa1bbb031128ad,2024-11-04T18:50:05.607000
|
CVE-2024-51665,0,1,836ecda2a38ee75dca042d09339ec8247ed79262a6a8d01bd25035a2e84a5ce0,2024-11-06T22:07:10.707000
|
||||||
CVE-2024-5167,0,0,a26d674346a63d8730649864e3fcc22e33fb8b5877ed990bcd49874aef8d8c48,2024-08-01T13:59:41.660000
|
CVE-2024-5167,0,0,a26d674346a63d8730649864e3fcc22e33fb8b5877ed990bcd49874aef8d8c48,2024-08-01T13:59:41.660000
|
||||||
CVE-2024-51672,0,0,02f34342c7a243fc55088e6039256e7de98338fcdc98f8b95fb11a31d6c364d4,2024-11-04T18:50:05.607000
|
CVE-2024-51672,0,1,14a5ef0a87d874231b0f786642aa34aa9f0064d5c86f2b9992f4fe90d62559ab,2024-11-06T22:08:22.747000
|
||||||
CVE-2024-51677,0,0,3a3f242a7ff6f80c9e763fd44464d5f149926414812ec89ee8be44bce14d131b,2024-11-04T18:50:05.607000
|
CVE-2024-51677,0,1,8b0f7a3853108bd14021b832cd2914a4bbd49dc774029c03bf84670c6d192320,2024-11-06T22:10:31.677000
|
||||||
CVE-2024-51678,0,0,ca8e2772685847dbfa010764deeffa0341c2b977902afc49a77a90e54643e432,2024-11-04T18:50:05.607000
|
CVE-2024-51678,0,1,ce4086679232add4ebc40be30bdc12f20f02b66e38c181d2556e9473603941fd,2024-11-06T22:10:45.103000
|
||||||
CVE-2024-5168,0,0,cbe1b6c96aef7b506dd526cf00951c936dfc5233fd9563b4af0bf7fdab7a5899,2024-05-24T01:15:30.977000
|
CVE-2024-5168,0,0,cbe1b6c96aef7b506dd526cf00951c936dfc5233fd9563b4af0bf7fdab7a5899,2024-05-24T01:15:30.977000
|
||||||
CVE-2024-51680,0,0,6a0e4dc35b32086a537bd54899180c80ad01a8c6290d199cc8c4684b6784a87c,2024-11-04T18:50:05.607000
|
CVE-2024-51680,0,1,e3d442fcfe0b4fceddb505a5eff13c52978f820716977fad69b0fdd39fa2c605,2024-11-06T22:10:59.270000
|
||||||
CVE-2024-51681,0,0,b2240f3aac7cf521a8583b6a4f2d4157a3e0c7b650f696a8fe56bed46dd560b4,2024-11-04T18:50:05.607000
|
CVE-2024-51681,0,1,6987ab81beb2df0eaa9da220f2d791ed5d8df3f0e18bd37d9a9b390a4eaf5a17,2024-11-06T22:11:16.003000
|
||||||
CVE-2024-51682,0,0,12881b8ca373787a3c057bd1e8d9525a2539983e5a3ed6d65b201c2ff661d1fb,2024-11-04T18:50:05.607000
|
CVE-2024-51682,0,1,aaba0581a3d811571ae104155388a45dd47ae531ed284c6ab0022efdb152fbe5,2024-11-06T22:12:02.353000
|
||||||
CVE-2024-51683,0,0,0f4d7566656d1bf0660d68c0ecfc6656f45f0a02e4da79c690f191f19760df22,2024-11-04T18:50:05.607000
|
CVE-2024-51683,0,1,f59d50717ee7305489d521abf4c5c1ef491e4436568b0e3c6dd145e0ad77427b,2024-11-06T22:12:19.803000
|
||||||
CVE-2024-51685,0,1,3ec6f589ce8427b20bd90f3e3168669c47fda17fa0f474f038e9a6e94e0e60b9,2024-11-06T19:34:31.590000
|
CVE-2024-51685,0,0,3ec6f589ce8427b20bd90f3e3168669c47fda17fa0f474f038e9a6e94e0e60b9,2024-11-06T19:34:31.590000
|
||||||
CVE-2024-5169,0,0,882a6aa1fee4c71f4df51ce353ec6b27431ae776e2b2b23b3c5ba8c59ca21797,2024-08-02T15:00:10.200000
|
CVE-2024-5169,0,0,882a6aa1fee4c71f4df51ce353ec6b27431ae776e2b2b23b3c5ba8c59ca21797,2024-08-02T15:00:10.200000
|
||||||
CVE-2024-5170,0,0,0357b8fbab1b76f01ca0dd625bf87ec8b80f7fd2d35927c69b68200ba07a11a4,2024-09-27T18:23:43.833000
|
CVE-2024-5170,0,0,0357b8fbab1b76f01ca0dd625bf87ec8b80f7fd2d35927c69b68200ba07a11a4,2024-09-27T18:23:43.833000
|
||||||
CVE-2024-5171,0,0,dd574bf92e93c62d270c5e3b0cb384556e01dba1d43a5b9db2a02845fa564cb4,2024-07-23T18:09:56.753000
|
CVE-2024-5171,0,0,dd574bf92e93c62d270c5e3b0cb384556e01dba1d43a5b9db2a02845fa564cb4,2024-07-23T18:09:56.753000
|
||||||
@ -264761,18 +264768,19 @@ CVE-2024-5172,0,0,b469524ff2309ced9aec08b056578c23e8b8b5248adb8fcea2b38cb214c812
|
|||||||
CVE-2024-5173,0,0,e808cbd0ff507575dfa32503bcc3a2123c9461298f1a4a4ef8cd294367da6464,2024-06-26T12:44:29.693000
|
CVE-2024-5173,0,0,e808cbd0ff507575dfa32503bcc3a2123c9461298f1a4a4ef8cd294367da6464,2024-06-26T12:44:29.693000
|
||||||
CVE-2024-51734,0,0,1cd13d8635d39c437cbb33b350735ec8f4fced2309825670ef2275f584df030b,2024-11-05T20:35:26.167000
|
CVE-2024-51734,0,0,1cd13d8635d39c437cbb33b350735ec8f4fced2309825670ef2275f584df030b,2024-11-05T20:35:26.167000
|
||||||
CVE-2024-51735,0,0,4d68a755141918a79130284871e942292c9f37924aba0b94103b08a16b1df114,2024-11-06T18:17:17.287000
|
CVE-2024-51735,0,0,4d68a755141918a79130284871e942292c9f37924aba0b94103b08a16b1df114,2024-11-06T18:17:17.287000
|
||||||
|
CVE-2024-51736,1,1,379ee3f6d2d9accb42efa81e333f4e655bf347820c945b9b76849f1517ca172f,2024-11-06T21:15:06.600000
|
||||||
CVE-2024-51739,0,0,ee203b09953b612bf98226788bae2c648a3d93de0cc3326880af2a364d5bb790,2024-11-06T18:17:17.287000
|
CVE-2024-51739,0,0,ee203b09953b612bf98226788bae2c648a3d93de0cc3326880af2a364d5bb790,2024-11-06T18:17:17.287000
|
||||||
CVE-2024-51740,0,0,8049b8be1065b4b8406a50a1cfde4cf3f6d43a64ebf12ea9e23c06d353369d55,2024-11-06T18:17:17.287000
|
CVE-2024-51740,0,0,8049b8be1065b4b8406a50a1cfde4cf3f6d43a64ebf12ea9e23c06d353369d55,2024-11-06T18:17:17.287000
|
||||||
CVE-2024-51744,0,0,df641a1b86566e97bb7074f2d337c50f51346569211bd554409b057e4c4da639,2024-11-05T16:04:26.053000
|
CVE-2024-51744,0,0,df641a1b86566e97bb7074f2d337c50f51346569211bd554409b057e4c4da639,2024-11-05T16:04:26.053000
|
||||||
CVE-2024-51745,0,0,37db28606ad10f651e6f62f94e51def5fb50b1cfae8314bc96328b8b65ad324b,2024-11-06T18:17:17.287000
|
CVE-2024-51745,0,0,37db28606ad10f651e6f62f94e51def5fb50b1cfae8314bc96328b8b65ad324b,2024-11-06T18:17:17.287000
|
||||||
CVE-2024-51746,0,0,3cd98a267aedbbeeb4ad193a68e5bacd0a1a46a62f6ccca5880e9520a47fbe14,2024-11-06T18:17:17.287000
|
CVE-2024-51746,0,0,3cd98a267aedbbeeb4ad193a68e5bacd0a1a46a62f6ccca5880e9520a47fbe14,2024-11-06T18:17:17.287000
|
||||||
CVE-2024-51751,1,1,5be875fb03dd84c20f8d271d29f5d3af24259f1c25883a44af5c941f68ac278f,2024-11-06T20:15:05.557000
|
CVE-2024-51751,0,0,5be875fb03dd84c20f8d271d29f5d3af24259f1c25883a44af5c941f68ac278f,2024-11-06T20:15:05.557000
|
||||||
CVE-2024-51752,0,0,e4bd7dfff09e294fe713d9b76aba7fd50689256bee0d75d076093e0fe4805888,2024-11-06T18:17:17.287000
|
CVE-2024-51752,0,0,e4bd7dfff09e294fe713d9b76aba7fd50689256bee0d75d076093e0fe4805888,2024-11-06T18:17:17.287000
|
||||||
CVE-2024-51753,0,0,bf33e866ff4adcdc8169c4272817d8f4f57258218421ea7cafddbf38a1c6e30a,2024-11-06T18:17:17.287000
|
CVE-2024-51753,0,0,bf33e866ff4adcdc8169c4272817d8f4f57258218421ea7cafddbf38a1c6e30a,2024-11-06T18:17:17.287000
|
||||||
CVE-2024-51754,1,1,ab8a7bcd0aef3f8778ab7f9b5f45ed9ae1110b90fa03bf7f3d612cb847bb1caa,2024-11-06T20:15:05.817000
|
CVE-2024-51754,0,0,ab8a7bcd0aef3f8778ab7f9b5f45ed9ae1110b90fa03bf7f3d612cb847bb1caa,2024-11-06T20:15:05.817000
|
||||||
CVE-2024-51755,1,1,7150a21cdebe589f49ef7bb36b4fad5dd8f080a46c27ff91852f0fd345ca5552,2024-11-06T20:15:06.077000
|
CVE-2024-51755,0,0,7150a21cdebe589f49ef7bb36b4fad5dd8f080a46c27ff91852f0fd345ca5552,2024-11-06T20:15:06.077000
|
||||||
CVE-2024-51756,0,0,7e7db3439c4e45c36bf53dc70dbe779b982ce3f3056b8757e470dab737dd37ba,2024-11-06T18:17:17.287000
|
CVE-2024-51756,0,0,7e7db3439c4e45c36bf53dc70dbe779b982ce3f3056b8757e470dab737dd37ba,2024-11-06T18:17:17.287000
|
||||||
CVE-2024-51757,1,1,6469de8ff53e3c67b6dea69ecf92a7c1c9657d29eb32af44797d561418c06bb5,2024-11-06T20:15:06.337000
|
CVE-2024-51757,0,1,94efafdd8ea10b2a0656841928d239afab2750ddf6f06a644397622ff5d6eb53,2024-11-06T21:15:06.807000
|
||||||
CVE-2024-5176,0,0,095b03ddd1cdcd739bbe8693b41d7d6e416f60f9815e0be55e0b3850508434d9,2024-06-05T15:15:12.620000
|
CVE-2024-5176,0,0,095b03ddd1cdcd739bbe8693b41d7d6e416f60f9815e0be55e0b3850508434d9,2024-06-05T15:15:12.620000
|
||||||
CVE-2024-5177,0,0,4596ccdb96b84f0f6003dc91187b58acc558e0743564be9aa6ad28db4e46749c,2024-05-24T01:15:30.977000
|
CVE-2024-5177,0,0,4596ccdb96b84f0f6003dc91187b58acc558e0743564be9aa6ad28db4e46749c,2024-05-24T01:15:30.977000
|
||||||
CVE-2024-51774,0,0,669a599ada079f107ff827e67143f083d374e9861d23daa36ef167763e62d529,2024-11-06T17:35:41.767000
|
CVE-2024-51774,0,0,669a599ada079f107ff827e67143f083d374e9861d23daa36ef167763e62d529,2024-11-06T17:35:41.767000
|
||||||
@ -264794,7 +264802,7 @@ CVE-2024-5194,0,0,8b46532d156b8b3c9309e51d70c9e0d478e4dda8959433d551fb9bae0e23a4
|
|||||||
CVE-2024-5195,0,0,a944b3bf4d682f545e6cb40d57a8d207d6c568eeb84f910c894251f96395025e,2024-06-04T19:21:02.077000
|
CVE-2024-5195,0,0,a944b3bf4d682f545e6cb40d57a8d207d6c568eeb84f910c894251f96395025e,2024-06-04T19:21:02.077000
|
||||||
CVE-2024-5196,0,0,fe96c1eeb1213602679ab014fd535da1193da9cfe24103856ca34e734451708d,2024-06-04T19:21:02.183000
|
CVE-2024-5196,0,0,fe96c1eeb1213602679ab014fd535da1193da9cfe24103856ca34e734451708d,2024-06-04T19:21:02.183000
|
||||||
CVE-2024-5197,0,0,01172b8d20369801e638a1092c2896c82735a2e04e92ac5031b21558c286d96f,2024-06-16T21:15:50.820000
|
CVE-2024-5197,0,0,01172b8d20369801e638a1092c2896c82735a2e04e92ac5031b21558c286d96f,2024-06-16T21:15:50.820000
|
||||||
CVE-2024-51988,1,1,2d17fe71a727874da6f8f6c999ae55f95138104406d5cbbc92ea592560164e88,2024-11-06T20:15:06.513000
|
CVE-2024-51988,0,0,2d17fe71a727874da6f8f6c999ae55f95138104406d5cbbc92ea592560164e88,2024-11-06T20:15:06.513000
|
||||||
CVE-2024-5199,0,0,8fdec235790e80ab25bf344b6e4e20c94c0a12c0bede9440d8c94965619f66eb,2024-10-28T21:35:23.237000
|
CVE-2024-5199,0,0,8fdec235790e80ab25bf344b6e4e20c94c0a12c0bede9440d8c94965619f66eb,2024-10-28T21:35:23.237000
|
||||||
CVE-2024-5201,0,0,64f0da97aed099b7390504c61b2a584cf361827a66e92ad103d8b3995d82fd05,2024-05-24T01:15:30.977000
|
CVE-2024-5201,0,0,64f0da97aed099b7390504c61b2a584cf361827a66e92ad103d8b3995d82fd05,2024-05-24T01:15:30.977000
|
||||||
CVE-2024-52013,0,0,d9e82ae91803da33afed578345dc1a358b894658d92808fa986ec4533aa8b6bc,2024-11-05T16:35:36.337000
|
CVE-2024-52013,0,0,d9e82ae91803da33afed578345dc1a358b894658d92808fa986ec4533aa8b6bc,2024-11-05T16:35:36.337000
|
||||||
@ -265216,7 +265224,7 @@ CVE-2024-5638,0,0,68ca32104039c555501740b79d9d053899dfa4f77cf28bfda3416440a76684
|
|||||||
CVE-2024-5639,0,0,492ad0d47d56549888d5f48237edc279d0d32d853604c73193623cce2eae0704,2024-06-24T19:24:23.883000
|
CVE-2024-5639,0,0,492ad0d47d56549888d5f48237edc279d0d32d853604c73193623cce2eae0704,2024-06-24T19:24:23.883000
|
||||||
CVE-2024-5640,0,0,8f33c54e7012000a851267741a433d3aa85134979ee0675a7c8c94bf7d26740a,2024-10-28T18:32:59.690000
|
CVE-2024-5640,0,0,8f33c54e7012000a851267741a433d3aa85134979ee0675a7c8c94bf7d26740a,2024-10-28T18:32:59.690000
|
||||||
CVE-2024-5641,0,0,1f23612877686d6e5143238f62dc02125c3d0a0d8a2499e0ec524473edb424e6,2024-07-05T17:14:44.840000
|
CVE-2024-5641,0,0,1f23612877686d6e5143238f62dc02125c3d0a0d8a2499e0ec524473edb424e6,2024-07-05T17:14:44.840000
|
||||||
CVE-2024-5642,0,0,bf58acd5f015124d4fa0c6ffb75779edb6afb99b41961d291eb7083813f4952e,2024-07-28T14:15:11.220000
|
CVE-2024-5642,0,1,4ed20babf058b3e506d0b66042a68f289ffcc8ee77fb96f7765ea8a1aca1a90e,2024-11-06T21:35:08.690000
|
||||||
CVE-2024-5644,0,0,35f5cce546de98cfce88cd6571a328f218696f426033c4c0d2e31a431c078a61,2024-08-01T13:59:56.260000
|
CVE-2024-5644,0,0,35f5cce546de98cfce88cd6571a328f218696f426033c4c0d2e31a431c078a61,2024-08-01T13:59:56.260000
|
||||||
CVE-2024-5645,0,0,81ee0a48f8169b5fa6535595d6aeb783fba06dd48c6af38e338fa98641a45635,2024-06-11T17:57:47.197000
|
CVE-2024-5645,0,0,81ee0a48f8169b5fa6535595d6aeb783fba06dd48c6af38e338fa98641a45635,2024-06-11T17:57:47.197000
|
||||||
CVE-2024-5646,0,0,54dff546debf316c7620aa15614b89fe6dc050f45cfaa67554d377c50ceda179,2024-06-13T18:36:09.013000
|
CVE-2024-5646,0,0,54dff546debf316c7620aa15614b89fe6dc050f45cfaa67554d377c50ceda179,2024-06-13T18:36:09.013000
|
||||||
@ -267758,7 +267766,7 @@ CVE-2024-8767,0,0,17744319861b5196f5a63bddf3c3c4ab0c9d11dd531ce1a95816c3c9e2193e
|
|||||||
CVE-2024-8768,0,0,a982019cb3e87700eba7d9922c696779881e32d71a95f1662a9030bc9b15c0d2,2024-09-20T12:30:51.220000
|
CVE-2024-8768,0,0,a982019cb3e87700eba7d9922c696779881e32d71a95f1662a9030bc9b15c0d2,2024-09-20T12:30:51.220000
|
||||||
CVE-2024-8770,0,0,092503c78b1ec747d9cd01983ee6d65a49e2eef82871ebe4802ea35253afc2e7,2024-09-27T13:49:29.690000
|
CVE-2024-8770,0,0,092503c78b1ec747d9cd01983ee6d65a49e2eef82871ebe4802ea35253afc2e7,2024-09-27T13:49:29.690000
|
||||||
CVE-2024-8771,0,0,8440e358d9ef6f31cf81e66a5a83b441147afe75ee9c3ad99e3f4526f8f30874,2024-09-30T12:46:20.237000
|
CVE-2024-8771,0,0,8440e358d9ef6f31cf81e66a5a83b441147afe75ee9c3ad99e3f4526f8f30874,2024-09-30T12:46:20.237000
|
||||||
CVE-2024-8775,0,1,b1c934c0f161c282b2ea9c3e55f934218dc75fc137b9f5d065788131a5d3a709,2024-11-06T20:15:06.763000
|
CVE-2024-8775,0,0,b1c934c0f161c282b2ea9c3e55f934218dc75fc137b9f5d065788131a5d3a709,2024-11-06T20:15:06.763000
|
||||||
CVE-2024-8776,0,0,5f24148b1f2c0e63f94c4b7c4eb112791a653befffb86dbacf9b6c99ebdd5088,2024-09-20T16:38:51.910000
|
CVE-2024-8776,0,0,5f24148b1f2c0e63f94c4b7c4eb112791a653befffb86dbacf9b6c99ebdd5088,2024-09-20T16:38:51.910000
|
||||||
CVE-2024-8777,0,0,abf6497bbb9ed542a83ea295cf446b5b0a64e2a3685378272b7c6e8d7a6d8418,2024-09-20T14:22:19.840000
|
CVE-2024-8777,0,0,abf6497bbb9ed542a83ea295cf446b5b0a64e2a3685378272b7c6e8d7a6d8418,2024-09-20T14:22:19.840000
|
||||||
CVE-2024-8778,0,0,04f76622204759cf035b6cf776488dd4e0117dc8a28cbc6a6f40333ff951b555,2024-09-20T14:23:37.697000
|
CVE-2024-8778,0,0,04f76622204759cf035b6cf776488dd4e0117dc8a28cbc6a6f40333ff951b555,2024-09-20T14:23:37.697000
|
||||||
@ -268097,7 +268105,7 @@ CVE-2024-9327,0,0,9bb62fae114b1c29588ad2672d640859a17a9f3af7375a799fc34e218e9d39
|
|||||||
CVE-2024-9328,0,0,a5f7378f6f2f1cd502f7cde1b5f6090c2d79ebec3e3af2aa2eaafb1f04d0c325,2024-10-01T11:34:57.773000
|
CVE-2024-9328,0,0,a5f7378f6f2f1cd502f7cde1b5f6090c2d79ebec3e3af2aa2eaafb1f04d0c325,2024-10-01T11:34:57.773000
|
||||||
CVE-2024-9329,0,0,45383f73609cef2d97bbcc2a37f0da26902c147f00f71a92dd725b6696a1e709,2024-10-07T15:52:47.267000
|
CVE-2024-9329,0,0,45383f73609cef2d97bbcc2a37f0da26902c147f00f71a92dd725b6696a1e709,2024-10-07T15:52:47.267000
|
||||||
CVE-2024-9333,0,0,29d3d497691b594c7c49948d48e229bbe8c23108f2eef552b2f92cd89acf1f06,2024-10-04T13:50:43.727000
|
CVE-2024-9333,0,0,29d3d497691b594c7c49948d48e229bbe8c23108f2eef552b2f92cd89acf1f06,2024-10-04T13:50:43.727000
|
||||||
CVE-2024-9341,0,1,c98b60eddd0169df613fb8aaf3d2ac969a4fdceebcb7e9147fd8771afde7bcb8,2024-11-06T20:15:06.917000
|
CVE-2024-9341,0,0,c98b60eddd0169df613fb8aaf3d2ac969a4fdceebcb7e9147fd8771afde7bcb8,2024-11-06T20:15:06.917000
|
||||||
CVE-2024-9344,0,0,d870e129ed50c7683cdbbee07d60a73dcd8b852b9805e9d5932c8a41008c379e,2024-10-08T15:06:57.470000
|
CVE-2024-9344,0,0,d870e129ed50c7683cdbbee07d60a73dcd8b852b9805e9d5932c8a41008c379e,2024-10-08T15:06:57.470000
|
||||||
CVE-2024-9345,0,0,b08be38bdc65e7df784af6af5cf36510583fc49f8a0ab62bc24aed87f83f55d0,2024-10-08T16:10:17.567000
|
CVE-2024-9345,0,0,b08be38bdc65e7df784af6af5cf36510583fc49f8a0ab62bc24aed87f83f55d0,2024-10-08T16:10:17.567000
|
||||||
CVE-2024-9346,0,0,62d32d35d45fd426e51a0ed8886468a70178025d3407ee17aee209be78f55958,2024-10-15T12:58:51.050000
|
CVE-2024-9346,0,0,62d32d35d45fd426e51a0ed8886468a70178025d3407ee17aee209be78f55958,2024-10-15T12:58:51.050000
|
||||||
@ -268301,8 +268309,8 @@ CVE-2024-9667,0,0,4c2cf3e987949daa6f6783b329a60c01d9a6ec3570b24191ca01f99d0f544e
|
|||||||
CVE-2024-9670,0,0,f306c0fbbcbde1e6a65006fd3bdd50d366f02be816ff2a6f00ef3348b3b76328,2024-10-15T12:57:46.880000
|
CVE-2024-9670,0,0,f306c0fbbcbde1e6a65006fd3bdd50d366f02be816ff2a6f00ef3348b3b76328,2024-10-15T12:57:46.880000
|
||||||
CVE-2024-9671,0,0,421f1b0ad6825ff096efd81ac122f33bafcdf7b21693a85f65613389bca55f89,2024-10-10T12:51:56.987000
|
CVE-2024-9671,0,0,421f1b0ad6825ff096efd81ac122f33bafcdf7b21693a85f65613389bca55f89,2024-10-10T12:51:56.987000
|
||||||
CVE-2024-9674,0,0,99b8206db3c3741ff50725aa3969c36280edf4a37082b6473da1336e00a39d59,2024-10-22T14:02:50.473000
|
CVE-2024-9674,0,0,99b8206db3c3741ff50725aa3969c36280edf4a37082b6473da1336e00a39d59,2024-10-22T14:02:50.473000
|
||||||
CVE-2024-9675,0,1,3cadd63f68fceef4cb7f647684ea61e6a2900e849efc03dcf4b2582d5452b03c,2024-11-06T20:15:07.083000
|
CVE-2024-9675,0,0,3cadd63f68fceef4cb7f647684ea61e6a2900e849efc03dcf4b2582d5452b03c,2024-11-06T20:15:07.083000
|
||||||
CVE-2024-9676,0,1,46624241f6a62cf8ced9778d99fdffe768deb7f9be20051bd0eb0c649c38f427,2024-11-06T20:15:07.410000
|
CVE-2024-9676,0,0,46624241f6a62cf8ced9778d99fdffe768deb7f9be20051bd0eb0c649c38f427,2024-11-06T20:15:07.410000
|
||||||
CVE-2024-9677,0,0,944e049c847e061867c66e6b586a0cd99260b04bc2e2059d736567bf47cae00c,2024-10-23T15:12:34.673000
|
CVE-2024-9677,0,0,944e049c847e061867c66e6b586a0cd99260b04bc2e2059d736567bf47cae00c,2024-10-23T15:12:34.673000
|
||||||
CVE-2024-9680,0,0,db0e4e19e09673238ffe3dfbb8e95974e9346a75b4fd6d9319c03e5970bb644e,2024-10-16T15:07:36.123000
|
CVE-2024-9680,0,0,db0e4e19e09673238ffe3dfbb8e95974e9346a75b4fd6d9319c03e5970bb644e,2024-10-16T15:07:36.123000
|
||||||
CVE-2024-9681,0,0,5184b45d0c5be56c6e66f5f4d21584d3fd220046fb9bac6604ac868b54d81bd8,2024-11-06T18:17:17.287000
|
CVE-2024-9681,0,0,5184b45d0c5be56c6e66f5f4d21584d3fd220046fb9bac6604ac868b54d81bd8,2024-11-06T18:17:17.287000
|
||||||
@ -268310,7 +268318,7 @@ CVE-2024-9683,0,0,a648737766df3deb74ddc86e7dcd00883598b7b3c943d9054e11451b5f1854
|
|||||||
CVE-2024-9685,0,0,a93c724a8b2ee6ce4a46c54a35028c939ad55b1fb441a5b479f473edc57de420,2024-10-15T14:30:00.483000
|
CVE-2024-9685,0,0,a93c724a8b2ee6ce4a46c54a35028c939ad55b1fb441a5b479f473edc57de420,2024-10-15T14:30:00.483000
|
||||||
CVE-2024-9686,0,0,8a91e1ae5070fa70337820c934475166fa3e061411ab7464abf260ed961a0668,2024-11-06T16:19:04.333000
|
CVE-2024-9686,0,0,8a91e1ae5070fa70337820c934475166fa3e061411ab7464abf260ed961a0668,2024-11-06T16:19:04.333000
|
||||||
CVE-2024-9687,0,0,ae8c4791dae243694c67044fa0088a221548cce6d43bc08144a537d590a79ff2,2024-10-17T21:11:14.197000
|
CVE-2024-9687,0,0,ae8c4791dae243694c67044fa0088a221548cce6d43bc08144a537d590a79ff2,2024-10-17T21:11:14.197000
|
||||||
CVE-2024-9689,0,1,3b3e5990fb9f08a51cd41a7e6a396c2471cfce792d4015e2d1365961bc64adf9,2024-11-06T19:14:53.737000
|
CVE-2024-9689,0,0,3b3e5990fb9f08a51cd41a7e6a396c2471cfce792d4015e2d1365961bc64adf9,2024-11-06T19:14:53.737000
|
||||||
CVE-2024-9692,0,0,6637a78c6a5a322d069f0f0384d674a49925fbfbbf719ba95a3af042d35fdc19,2024-10-25T12:56:07.750000
|
CVE-2024-9692,0,0,6637a78c6a5a322d069f0f0384d674a49925fbfbbf719ba95a3af042d35fdc19,2024-10-25T12:56:07.750000
|
||||||
CVE-2024-9696,0,0,78e7cb06b620e1544d9c6811ae0c44cf981cc195d0067b351c711666292c356e,2024-10-15T12:57:46.880000
|
CVE-2024-9696,0,0,78e7cb06b620e1544d9c6811ae0c44cf981cc195d0067b351c711666292c356e,2024-10-15T12:57:46.880000
|
||||||
CVE-2024-9700,0,0,ee544a9b692e7ab9f9ab56395ca8011eb3604c34474b906ade007707a048f142,2024-11-01T12:57:03.417000
|
CVE-2024-9700,0,0,ee544a9b692e7ab9f9ab56395ca8011eb3604c34474b906ade007707a048f142,2024-11-01T12:57:03.417000
|
||||||
@ -268401,7 +268409,7 @@ CVE-2024-9896,0,0,09339b3269859e496224a4ee93cb949746eeb659cdbf7ff07d2c92a00e93ed
|
|||||||
CVE-2024-9897,0,0,c000f038202bbdf161648c8f1d74fa0a88aad69aa13c730474d96a3fd2473014,2024-11-01T15:27:56.797000
|
CVE-2024-9897,0,0,c000f038202bbdf161648c8f1d74fa0a88aad69aa13c730474d96a3fd2473014,2024-11-01T15:27:56.797000
|
||||||
CVE-2024-9898,0,0,34647a8f54872789fb9d153b7e32e611f940664cb6907ab09e4df7e32cdaa8ba,2024-10-18T12:52:33.507000
|
CVE-2024-9898,0,0,34647a8f54872789fb9d153b7e32e611f940664cb6907ab09e4df7e32cdaa8ba,2024-10-18T12:52:33.507000
|
||||||
CVE-2024-9899,0,0,6c76ba1fcc7597d7958a7e74c7de009221352c8fe34414d847a1d4d85ee09e27,2024-10-23T21:15:15.050000
|
CVE-2024-9899,0,0,6c76ba1fcc7597d7958a7e74c7de009221352c8fe34414d847a1d4d85ee09e27,2024-10-23T21:15:15.050000
|
||||||
CVE-2024-9902,0,1,5a17b86729ea7d243eb9cea611038373d4bbb9ba8a32113c474ad669aed65087,2024-11-06T20:15:07.820000
|
CVE-2024-9902,0,0,5a17b86729ea7d243eb9cea611038373d4bbb9ba8a32113c474ad669aed65087,2024-11-06T20:15:07.820000
|
||||||
CVE-2024-9903,0,0,244e0ad624c75743e190bc7da6a1b45fe195aaf738d59f8decfde97c8722448f,2024-10-15T12:57:46.880000
|
CVE-2024-9903,0,0,244e0ad624c75743e190bc7da6a1b45fe195aaf738d59f8decfde97c8722448f,2024-10-15T12:57:46.880000
|
||||||
CVE-2024-9904,0,0,b8f5bdf1fde920247f061f9c3939c42469f53e3148abd589ac11ba36d4728079,2024-10-15T12:57:46.880000
|
CVE-2024-9904,0,0,b8f5bdf1fde920247f061f9c3939c42469f53e3148abd589ac11ba36d4728079,2024-10-15T12:57:46.880000
|
||||||
CVE-2024-9905,0,0,09e20420cf063b331c2f2444287faaf461bdb42e483d150bc77bc6c327c543d3,2024-10-16T22:12:18.153000
|
CVE-2024-9905,0,0,09e20420cf063b331c2f2444287faaf461bdb42e483d150bc77bc6c327c543d3,2024-10-16T22:12:18.153000
|
||||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user