mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-21 17:41:05 +00:00
Auto-Update: 2024-08-22T20:00:18.271897+00:00
This commit is contained in:
parent
607e009d85
commit
55de7e7bb8
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2020-22539",
|
"id": "CVE-2020-22539",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-04-15T22:15:07.620",
|
"published": "2024-04-15T22:15:07.620",
|
||||||
"lastModified": "2024-04-16T13:24:07.103",
|
"lastModified": "2024-08-22T19:35:00.877",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,42 @@
|
|||||||
"value": "Una vulnerabilidad de carga de archivos arbitrarios en la funci\u00f3n Agregar Categor\u00eda de Codoforum v4.9 permite a los atacantes ejecutar c\u00f3digo arbitrario cargando un archivo manipulado."
|
"value": "Una vulnerabilidad de carga de archivos arbitrarios en la funci\u00f3n Agregar Categor\u00eda de Codoforum v4.9 permite a los atacantes ejecutar c\u00f3digo arbitrario cargando un archivo manipulado."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 7.2,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.2,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-434"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://gist.github.com/s4fv4n/320f536a684650c6948433de8d53713c",
|
"url": "https://gist.github.com/s4fv4n/320f536a684650c6948433de8d53713c",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2022-25038",
|
"id": "CVE-2022-25038",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-05-31T16:15:09.240",
|
"published": "2024-05-31T16:15:09.240",
|
||||||
"lastModified": "2024-05-31T19:14:47.793",
|
"lastModified": "2024-08-22T19:35:03.130",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,42 @@
|
|||||||
"value": "Se descubri\u00f3 que wanEditor v4.7.11 conten\u00eda una vulnerabilidad de cross-site scripting (XSS) a trav\u00e9s de la funci\u00f3n de carga de videos."
|
"value": "Se descubri\u00f3 que wanEditor v4.7.11 conten\u00eda una vulnerabilidad de cross-site scripting (XSS) a trav\u00e9s de la funci\u00f3n de carga de videos."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 6.1,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 2.7
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://gist.github.com/Mdxjj/800f05f10a98591aa2cf3558f53f088f",
|
"url": "https://gist.github.com/Mdxjj/800f05f10a98591aa2cf3558f53f088f",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2022-48936",
|
"id": "CVE-2022-48936",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2024-08-22T04:15:16.950",
|
"published": "2024-08-22T04:15:16.950",
|
||||||
"lastModified": "2024-08-22T12:48:02.790",
|
"lastModified": "2024-08-22T19:03:59.643",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -15,39 +15,159 @@
|
|||||||
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: gso: no omita el encabezado de IP externo en caso de ipip y net_failover. Nos encontramos con un problema de ca\u00edda de TCP en nuestro entorno de nube. El paquete GROed en el host se reenv\u00eda a una NIC virtio_net de VM con net_failover habilitado. VM act\u00faa como IPVS LB con encapsulaci\u00f3n ipip. La ruta completa como: host gro -> vm virtio_net rx -> net_failover rx -> ipvs fullnat -> ipip encap -> net_failover tx -> virtio_net tx Cuando net_failover transmite un paquete ipip (gso_type = 0x0103, que significa SKB_GSO_TCPV4, SKB_GSO_DODGY y SKB_GSO_IPXIP 4 ), no existe gso porque admite TSO y GSO_IPXIP4. Pero network_header apunta al encabezado IP interno. Seguimiento de llamadas: tcp4_gso_segment ------> return NULL inet_gso_segment ------> iph interno, network_header apunta a ipip_gso_segment inet_gso_segment ------> iph externo skb_mac_gso_segment Luego, virtio_net transmite el paquete, solo se muestra el encabezado de IP interno modificado. Y el exterior simplemente se mantiene sin cambios. El paquete se colocar\u00e1 en el host remoto. Seguimiento de llamadas: inet_gso_segment ------> iph interno, se omite el iph externo skb_mac_gso_segment __skb_gso_segment validar_xmit_skb validar_xmit_skb_list sch_direct_xmit __qdisc_run __dev_queue_xmit ------> virtio_net dev_hard_start_xmit __dev_queue_xmit --- ---> net_failover ip_finish_output2 ip_output iptunnel_xmit ip_tunnel_xmit ipip_tunnel_xmit -- ----> ipip dev_hard_start_xmit __dev_queue_xmit ip_finish_output2 ip_output ip_forward ip_rcv __netif_receive_skb_one_core netif_receive_skb_internal napi_gro_receiveceived_buf virtnet_poll net_rx_action La causa ra\u00edz de este problema es espec\u00edfica de la rara combinaci\u00f3n de SKB_GSO_DODGY y un dispositivo de t\u00fanel que agrega una opci\u00f3n de t\u00fanel SKB_GSO_. SKB_GSO_DODGY se configura desde virtio_net externo. Necesitamos restablecer el encabezado de la red cuando callbacks.gso_segment() devuelve NULL. Este parche tambi\u00e9n incluye ipv6_gso_segment(), considerando SIT, etc."
|
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: gso: no omita el encabezado de IP externo en caso de ipip y net_failover. Nos encontramos con un problema de ca\u00edda de TCP en nuestro entorno de nube. El paquete GROed en el host se reenv\u00eda a una NIC virtio_net de VM con net_failover habilitado. VM act\u00faa como IPVS LB con encapsulaci\u00f3n ipip. La ruta completa como: host gro -> vm virtio_net rx -> net_failover rx -> ipvs fullnat -> ipip encap -> net_failover tx -> virtio_net tx Cuando net_failover transmite un paquete ipip (gso_type = 0x0103, que significa SKB_GSO_TCPV4, SKB_GSO_DODGY y SKB_GSO_IPXIP 4 ), no existe gso porque admite TSO y GSO_IPXIP4. Pero network_header apunta al encabezado IP interno. Seguimiento de llamadas: tcp4_gso_segment ------> return NULL inet_gso_segment ------> iph interno, network_header apunta a ipip_gso_segment inet_gso_segment ------> iph externo skb_mac_gso_segment Luego, virtio_net transmite el paquete, solo se muestra el encabezado de IP interno modificado. Y el exterior simplemente se mantiene sin cambios. El paquete se colocar\u00e1 en el host remoto. Seguimiento de llamadas: inet_gso_segment ------> iph interno, se omite el iph externo skb_mac_gso_segment __skb_gso_segment validar_xmit_skb validar_xmit_skb_list sch_direct_xmit __qdisc_run __dev_queue_xmit ------> virtio_net dev_hard_start_xmit __dev_queue_xmit --- ---> net_failover ip_finish_output2 ip_output iptunnel_xmit ip_tunnel_xmit ipip_tunnel_xmit -- ----> ipip dev_hard_start_xmit __dev_queue_xmit ip_finish_output2 ip_output ip_forward ip_rcv __netif_receive_skb_one_core netif_receive_skb_internal napi_gro_receiveceived_buf virtnet_poll net_rx_action La causa ra\u00edz de este problema es espec\u00edfica de la rara combinaci\u00f3n de SKB_GSO_DODGY y un dispositivo de t\u00fanel que agrega una opci\u00f3n de t\u00fanel SKB_GSO_. SKB_GSO_DODGY se configura desde virtio_net externo. Necesitamos restablecer el encabezado de la red cuando callbacks.gso_segment() devuelve NULL. Este parche tambi\u00e9n incluye ipv6_gso_segment(), considerando SIT, etc."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 5.5,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "NVD-CWE-noinfo"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "3.13",
|
||||||
|
"versionEndExcluding": "4.9.304",
|
||||||
|
"matchCriteriaId": "C6CC1F21-FAA1-403B-826E-B5709A12D4EE"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "4.10",
|
||||||
|
"versionEndExcluding": "4.14.269",
|
||||||
|
"matchCriteriaId": "F0F577D3-EFEA-42CF-80AA-905297529D7F"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "4.15",
|
||||||
|
"versionEndExcluding": "4.19.232",
|
||||||
|
"matchCriteriaId": "EF11C6DC-8B9A-4A37-B1E6-33B68F5366ED"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "4.20",
|
||||||
|
"versionEndExcluding": "5.4.182",
|
||||||
|
"matchCriteriaId": "EE74CED8-43BF-4060-9578-93A09735B4E2"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "5.5",
|
||||||
|
"versionEndExcluding": "5.10.103",
|
||||||
|
"matchCriteriaId": "1A95B717-3110-4D4F-B8FC-373919BB514D"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "5.11",
|
||||||
|
"versionEndExcluding": "5.15.26",
|
||||||
|
"matchCriteriaId": "9AB342AE-A62E-4947-A6EA-511453062B2B"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "5.16",
|
||||||
|
"versionEndExcluding": "5.16.12",
|
||||||
|
"matchCriteriaId": "C76BAB21-7F23-4AD8-A25F-CA7B262A2698"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/2b3cdd70ea5f5a694f95ea1788393fb3b83071ea",
|
"url": "https://git.kernel.org/stable/c/2b3cdd70ea5f5a694f95ea1788393fb3b83071ea",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/45d006c2c7ed7baf1fa258fa7b5bc9923d3a983e",
|
"url": "https://git.kernel.org/stable/c/45d006c2c7ed7baf1fa258fa7b5bc9923d3a983e",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/7840e559799a08a8588ee6de27516a991cb2e5e7",
|
"url": "https://git.kernel.org/stable/c/7840e559799a08a8588ee6de27516a991cb2e5e7",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/899e56a1ad435261812355550ae869d8be3df395",
|
"url": "https://git.kernel.org/stable/c/899e56a1ad435261812355550ae869d8be3df395",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/a739963f43269297c3f438b776194542e2a97499",
|
"url": "https://git.kernel.org/stable/c/a739963f43269297c3f438b776194542e2a97499",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/cc20cced0598d9a5ff91ae4ab147b3b5e99ee819",
|
"url": "https://git.kernel.org/stable/c/cc20cced0598d9a5ff91ae4ab147b3b5e99ee819",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/dac2490d9ee0b89dffc72f1172b8bbeb60eaec39",
|
"url": "https://git.kernel.org/stable/c/dac2490d9ee0b89dffc72f1172b8bbeb60eaec39",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/e9ffbe63f6f32f526a461756309b61c395168d73",
|
"url": "https://git.kernel.org/stable/c/e9ffbe63f6f32f526a461756309b61c395168d73",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2022-48937",
|
"id": "CVE-2022-48937",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2024-08-22T04:15:17.137",
|
"published": "2024-08-22T04:15:17.137",
|
||||||
"lastModified": "2024-08-22T12:48:02.790",
|
"lastModified": "2024-08-22T19:07:28.567",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -15,23 +15,103 @@
|
|||||||
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: io_uring: agregue un punto de programaci\u00f3n en io_add_buffers() Realizar bucles ~65535 veces al realizar llamadas kmalloc() puede desencadenar bloqueos suaves, especialmente con funciones DEBUG (como KASAN). [253.536212] perro guardi\u00e1n: ERROR: bloqueo suave - \u00a1CPU#64 bloqueada durante 26 segundos! [b219417889:12575] [253.544433] M\u00f3dulos vinculados en: vfat fat i2c_mux_pca954x i2c_mux spidev cdc_acm xhci_pci xhci_hcd sha3_generic gq(O) [253.544451] CPU: 64 PID: 12575 Comm: 417889 Contaminado: GSO 5.17.0-smp-DEV #801 [ 253.544457] RIP: 0010:kernel_text_address (./include/asm-generic/sections.h:192 ./include/linux/kallsyms.h:29 kernel/extable.c:67 kernel/extable.c:98) [ 253.544464] C\u00f3digo: 0f 93 c0 48 c7 c1 e0 63 d7 a4 48 39 cb 0f 92 c1 20 c1 0f b6 c1 5b 5d c3 90 0f 1f 44 00 00 55 48 89 e5 41 57 41 56 53 48 89 fb <48> c7 c0 00 00 80 a0 41 be 01 00 00 00 48 39 c7 72 0c 48 c7 c0 40 [ 253.544468] RSP: 0018:ffff8882d8baf4c0 EFLAGS: 00000246 [ 253.544471] RAX: 1ffff1105b1 75e00 RBX: fffffffa13ef09a RCX: 00000000a13ef001 [ 253.544474] RDX: fffffffa13ef09a RSI: ffff8882d8baf558 RDI: fffffffa13ef09a [ 253.544476] RBP: ffff8882d8baf4d8 R08: ffff8882d8baf5e0 R09: 00000000000000004 [ 253.544479] R10: ffff8882d8baf5e8 R11: 0d59a50 R12: ffff8882eab20380 [ 253.544481] R13: fffffffa0d59a50 R14: dffffc0000000000 R15: 1ffff1105b175eb0 [ 253.544483] FS: 00000000016d3380( 0000) GS: ffff88af48c00000(0000) knlGS:00000000000000000 [ 253.544486] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 253.544488] CR2: af0f0 CR3: 00000002eabfa004 CR4: 00000000003706e0 [ 253.544491] DR0: 0000000000000000 DR1: 00000000000000000 DR2: 0000000000000000 253.544 492] DR3 : 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 253.544494] Seguimiento de llamadas: [ 253.544496] [ 253.544498] ? io_queue_sqe (fs/io_uring.c:7143) [ 253.544505] __kernel_text_address (kernel/extable.c:78) [ 253.544508] unwind_get_return_address (arch/x86/kernel/unwind_frame.c:19) [ 253.544514] arch_stack_walk (arch/ x86/n\u00facleo /stacktrace.c:27) [253.544517]? io_queue_sqe (fs/io_uring.c:7143) [ 253.544521] stack_trace_save (kernel/stacktrace.c:123) [ 253.544527] ____kasan_kmalloc (mm/kasan/common.c:39 mm/kasan/common.c:45 mm/kasan/ common.c:436 mm/kasan/common.c:515) [ 253.544531] ? ____kasan_kmalloc (mm/kasan/common.c:39 mm/kasan/common.c:45 mm/kasan/common.c:436 mm/kasan/common.c:515) [ 253.544533] ? __kasan_kmalloc (mm/kasan/common.c:524) [253.544535]? kmem_cache_alloc_trace (./include/linux/kasan.h:270 mm/slab.c:3567) [ 253.544541] ? io_issue_sqe (fs/io_uring.c:4556 fs/io_uring.c:4589 fs/io_uring.c:6828) [253.544544]? __io_queue_sqe (fs/io_uring.c:?) [ 253.544551] __kasan_kmalloc (mm/kasan/common.c:524) [ 253.544553] kmem_cache_alloc_trace (./include/linux/kasan.h:270 mm/slab.c:3567) [ 253.544556] ? io_issue_sqe (fs/io_uring.c:4556 fs/io_uring.c:4589 fs/io_uring.c:6828) [ 253.544560] io_issue_sqe (fs/io_uring.c:4556 fs/io_uring.c:4589 fs/io_uring.c:6828 ) [253.544564] ? __kasan_slab_alloc (mm/kasan/common.c:45 mm/kasan/common.c:436 mm/kasan/common.c:469) [ 253.544567] ? __kasan_slab_alloc (mm/kasan/common.c:39 mm/kasan/common.c:45 mm/kasan/common.c:436 mm/kasan/common.c:469) [ 253.544569] ? kmem_cache_alloc_bulk (mm/slab.h:732 mm/slab.c:3546) [ 253.544573] ? __io_alloc_req_refill (fs/io_uring.c:2078) [253.544578]? io_submit_sqes (fs/io_uring.c:7441) [253.544581]? __se_sys_io_uring_enter (fs/io_uring.c:10154 fs/io_uring.c:10096) [253.544584]? __x64_sys_io_uring_enter (fs/io_uring.c:10096) [253.544587]? do_syscall_64 (arch/x86/entry/common.c:50 arch/x86/entry/common.c:80) [253.544590]? entrada_SYSCALL_64_after_hwframe (??:?) [ 253.544596] __io_queue_sqe (fs/io_uring.c:?) [ 253.544600] io_queue_sqe (fs/io_uring.c:7143) [ 253.544603] io_submit_sqe (fs/io_uring.c :?) [ 253.544608] io_submit_sqes (fs/io_uring.c:?) [ 253.544612] __se_sys_io_uring_enter (fs/io_uring.c:10154 fs/io_uri ---truncado---"
|
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: io_uring: agregue un punto de programaci\u00f3n en io_add_buffers() Realizar bucles ~65535 veces al realizar llamadas kmalloc() puede desencadenar bloqueos suaves, especialmente con funciones DEBUG (como KASAN). [253.536212] perro guardi\u00e1n: ERROR: bloqueo suave - \u00a1CPU#64 bloqueada durante 26 segundos! [b219417889:12575] [253.544433] M\u00f3dulos vinculados en: vfat fat i2c_mux_pca954x i2c_mux spidev cdc_acm xhci_pci xhci_hcd sha3_generic gq(O) [253.544451] CPU: 64 PID: 12575 Comm: 417889 Contaminado: GSO 5.17.0-smp-DEV #801 [ 253.544457] RIP: 0010:kernel_text_address (./include/asm-generic/sections.h:192 ./include/linux/kallsyms.h:29 kernel/extable.c:67 kernel/extable.c:98) [ 253.544464] C\u00f3digo: 0f 93 c0 48 c7 c1 e0 63 d7 a4 48 39 cb 0f 92 c1 20 c1 0f b6 c1 5b 5d c3 90 0f 1f 44 00 00 55 48 89 e5 41 57 41 56 53 48 89 fb <48> c7 c0 00 00 80 a0 41 be 01 00 00 00 48 39 c7 72 0c 48 c7 c0 40 [ 253.544468] RSP: 0018:ffff8882d8baf4c0 EFLAGS: 00000246 [ 253.544471] RAX: 1ffff1105b1 75e00 RBX: fffffffa13ef09a RCX: 00000000a13ef001 [ 253.544474] RDX: fffffffa13ef09a RSI: ffff8882d8baf558 RDI: fffffffa13ef09a [ 253.544476] RBP: ffff8882d8baf4d8 R08: ffff8882d8baf5e0 R09: 00000000000000004 [ 253.544479] R10: ffff8882d8baf5e8 R11: 0d59a50 R12: ffff8882eab20380 [ 253.544481] R13: fffffffa0d59a50 R14: dffffc0000000000 R15: 1ffff1105b175eb0 [ 253.544483] FS: 00000000016d3380( 0000) GS: ffff88af48c00000(0000) knlGS:00000000000000000 [ 253.544486] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 253.544488] CR2: af0f0 CR3: 00000002eabfa004 CR4: 00000000003706e0 [ 253.544491] DR0: 0000000000000000 DR1: 00000000000000000 DR2: 0000000000000000 253.544 492] DR3 : 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 253.544494] Seguimiento de llamadas: [ 253.544496] [ 253.544498] ? io_queue_sqe (fs/io_uring.c:7143) [ 253.544505] __kernel_text_address (kernel/extable.c:78) [ 253.544508] unwind_get_return_address (arch/x86/kernel/unwind_frame.c:19) [ 253.544514] arch_stack_walk (arch/ x86/n\u00facleo /stacktrace.c:27) [253.544517]? io_queue_sqe (fs/io_uring.c:7143) [ 253.544521] stack_trace_save (kernel/stacktrace.c:123) [ 253.544527] ____kasan_kmalloc (mm/kasan/common.c:39 mm/kasan/common.c:45 mm/kasan/ common.c:436 mm/kasan/common.c:515) [ 253.544531] ? ____kasan_kmalloc (mm/kasan/common.c:39 mm/kasan/common.c:45 mm/kasan/common.c:436 mm/kasan/common.c:515) [ 253.544533] ? __kasan_kmalloc (mm/kasan/common.c:524) [253.544535]? kmem_cache_alloc_trace (./include/linux/kasan.h:270 mm/slab.c:3567) [ 253.544541] ? io_issue_sqe (fs/io_uring.c:4556 fs/io_uring.c:4589 fs/io_uring.c:6828) [253.544544]? __io_queue_sqe (fs/io_uring.c:?) [ 253.544551] __kasan_kmalloc (mm/kasan/common.c:524) [ 253.544553] kmem_cache_alloc_trace (./include/linux/kasan.h:270 mm/slab.c:3567) [ 253.544556] ? io_issue_sqe (fs/io_uring.c:4556 fs/io_uring.c:4589 fs/io_uring.c:6828) [ 253.544560] io_issue_sqe (fs/io_uring.c:4556 fs/io_uring.c:4589 fs/io_uring.c:6828 ) [253.544564] ? __kasan_slab_alloc (mm/kasan/common.c:45 mm/kasan/common.c:436 mm/kasan/common.c:469) [ 253.544567] ? __kasan_slab_alloc (mm/kasan/common.c:39 mm/kasan/common.c:45 mm/kasan/common.c:436 mm/kasan/common.c:469) [ 253.544569] ? kmem_cache_alloc_bulk (mm/slab.h:732 mm/slab.c:3546) [ 253.544573] ? __io_alloc_req_refill (fs/io_uring.c:2078) [253.544578]? io_submit_sqes (fs/io_uring.c:7441) [253.544581]? __se_sys_io_uring_enter (fs/io_uring.c:10154 fs/io_uring.c:10096) [253.544584]? __x64_sys_io_uring_enter (fs/io_uring.c:10096) [253.544587]? do_syscall_64 (arch/x86/entry/common.c:50 arch/x86/entry/common.c:80) [253.544590]? entrada_SYSCALL_64_after_hwframe (??:?) [ 253.544596] __io_queue_sqe (fs/io_uring.c:?) [ 253.544600] io_queue_sqe (fs/io_uring.c:7143) [ 253.544603] io_submit_sqe (fs/io_uring.c :?) [ 253.544608] io_submit_sqes (fs/io_uring.c:?) [ 253.544612] __se_sys_io_uring_enter (fs/io_uring.c:10154 fs/io_uri ---truncado---"
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "LOW",
|
||||||
|
"baseScore": 3.3,
|
||||||
|
"baseSeverity": "LOW"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-667"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "5.7",
|
||||||
|
"versionEndExcluding": "5.10.103",
|
||||||
|
"matchCriteriaId": "7BF4E57B-2E8D-4F4A-9DD0-A1A61CDDD2B6"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "5.11",
|
||||||
|
"versionEndExcluding": "5.15.26",
|
||||||
|
"matchCriteriaId": "9AB342AE-A62E-4947-A6EA-511453062B2B"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "5.16",
|
||||||
|
"versionEndExcluding": "5.16.12",
|
||||||
|
"matchCriteriaId": "C76BAB21-7F23-4AD8-A25F-CA7B262A2698"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/4a93c6594613c3429b6f30136fff115c7f803af4",
|
"url": "https://git.kernel.org/stable/c/4a93c6594613c3429b6f30136fff115c7f803af4",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/8f3cc3c5bc43d03b5748ac4fb8d180084952c36a",
|
"url": "https://git.kernel.org/stable/c/8f3cc3c5bc43d03b5748ac4fb8d180084952c36a",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/c718ea4e7382e18957ed0e88a5f855e2122d9c00",
|
"url": "https://git.kernel.org/stable/c/c718ea4e7382e18957ed0e88a5f855e2122d9c00",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/f240762f88b4b1b58561939ffd44837759756477",
|
"url": "https://git.kernel.org/stable/c/f240762f88b4b1b58561939ffd44837759756477",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2022-48938",
|
"id": "CVE-2022-48938",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2024-08-22T04:15:17.787",
|
"published": "2024-08-22T04:15:17.787",
|
||||||
"lastModified": "2024-08-22T12:48:02.790",
|
"lastModified": "2024-08-22T18:49:20.320",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -15,23 +15,102 @@
|
|||||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: CDC-NCM: evitar desbordamiento en la comprobaci\u00f3n de cordura Un dispositivo roto puede dar un desplazamiento extremo como 0xFFF0 y una longitud razonable para un fragmento. En la verificaci\u00f3n de cordura tal como est\u00e1 formulada ahora, esto crear\u00e1 un desbordamiento de enteros, anulando la verificaci\u00f3n de cordura. Tanto el desplazamiento como el desplazamiento + len deben comprobarse de tal manera que no pueda producirse un desbordamiento. Y esas cantidades deber\u00edan estar sin firmar."
|
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: CDC-NCM: evitar desbordamiento en la comprobaci\u00f3n de cordura Un dispositivo roto puede dar un desplazamiento extremo como 0xFFF0 y una longitud razonable para un fragmento. En la verificaci\u00f3n de cordura tal como est\u00e1 formulada ahora, esto crear\u00e1 un desbordamiento de enteros, anulando la verificaci\u00f3n de cordura. Tanto el desplazamiento como el desplazamiento + len deben comprobarse de tal manera que no pueda producirse un desbordamiento. Y esas cantidades deber\u00edan estar sin firmar."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 5.5,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-190"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "5.10.103",
|
||||||
|
"matchCriteriaId": "7E2EF203-0F7F-41A9-9684-671AAD1D37A1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "5.11",
|
||||||
|
"versionEndExcluding": "5.15.26",
|
||||||
|
"matchCriteriaId": "9AB342AE-A62E-4947-A6EA-511453062B2B"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "5.16",
|
||||||
|
"versionEndExcluding": "5.16.12",
|
||||||
|
"matchCriteriaId": "C76BAB21-7F23-4AD8-A25F-CA7B262A2698"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/49909c9f8458cacb5b241106cba65aba5a6d8f4c",
|
"url": "https://git.kernel.org/stable/c/49909c9f8458cacb5b241106cba65aba5a6d8f4c",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/69560efa001397ebb8dc1c3e6a3ce00302bb9f7f",
|
"url": "https://git.kernel.org/stable/c/69560efa001397ebb8dc1c3e6a3ce00302bb9f7f",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/7b737e47b87589031f0d4657f6d7b0b770474925",
|
"url": "https://git.kernel.org/stable/c/7b737e47b87589031f0d4657f6d7b0b770474925",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/8d2b1a1ec9f559d30b724877da4ce592edc41fdc",
|
"url": "https://git.kernel.org/stable/c/8d2b1a1ec9f559d30b724877da4ce592edc41fdc",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2022-48939",
|
"id": "CVE-2022-48939",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2024-08-22T04:15:17.843",
|
"published": "2024-08-22T04:15:17.843",
|
||||||
"lastModified": "2024-08-22T12:48:02.790",
|
"lastModified": "2024-08-22T19:02:08.770",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -15,23 +15,103 @@
|
|||||||
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: bpf: agregar puntos de programaci\u00f3n en operaciones por lotes syzbot inform\u00f3 varios bloqueos suaves causados por operaciones por lotes de bpf. INFORMACI\u00d3N: tarea kworker/1:1:27 bloqueada durante m\u00e1s de 140 segundos. INFORMACI\u00d3N: tarea colgada en rcu_barrier Nada impide que las operaciones por lotes procesen una gran cantidad de datos, necesitamos agregar puntos de programaci\u00f3n en ellas. Tenga en cuenta que las llamadas de Maybe_wait_bpf_programs(map) desde generic_map_delete_batch() se pueden factorizar moviendo la llamada despu\u00e9s del ciclo. Esto se har\u00e1 m\u00e1s adelante en el \u00e1rbol siguiente una vez que combinemos esta soluci\u00f3n, a menos que haya una opini\u00f3n firme sobre realizar esta optimizaci\u00f3n antes."
|
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: bpf: agregar puntos de programaci\u00f3n en operaciones por lotes syzbot inform\u00f3 varios bloqueos suaves causados por operaciones por lotes de bpf. INFORMACI\u00d3N: tarea kworker/1:1:27 bloqueada durante m\u00e1s de 140 segundos. INFORMACI\u00d3N: tarea colgada en rcu_barrier Nada impide que las operaciones por lotes procesen una gran cantidad de datos, necesitamos agregar puntos de programaci\u00f3n en ellas. Tenga en cuenta que las llamadas de Maybe_wait_bpf_programs(map) desde generic_map_delete_batch() se pueden factorizar moviendo la llamada despu\u00e9s del ciclo. Esto se har\u00e1 m\u00e1s adelante en el \u00e1rbol siguiente una vez que combinemos esta soluci\u00f3n, a menos que haya una opini\u00f3n firme sobre realizar esta optimizaci\u00f3n antes."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "LOW",
|
||||||
|
"baseScore": 3.3,
|
||||||
|
"baseSeverity": "LOW"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-834"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "5.6",
|
||||||
|
"versionEndExcluding": "5.10.103",
|
||||||
|
"matchCriteriaId": "6C91B56F-6C5A-4448-903D-8AC2E4AC87C8"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "5.11",
|
||||||
|
"versionEndExcluding": "5.15.26",
|
||||||
|
"matchCriteriaId": "9AB342AE-A62E-4947-A6EA-511453062B2B"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "5.16",
|
||||||
|
"versionEndExcluding": "5.16.12",
|
||||||
|
"matchCriteriaId": "C76BAB21-7F23-4AD8-A25F-CA7B262A2698"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/75134f16e7dd0007aa474b281935c5f42e79f2c8",
|
"url": "https://git.kernel.org/stable/c/75134f16e7dd0007aa474b281935c5f42e79f2c8",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/7e8099967d0e3ff9d1ae043e80b27fbe46c08417",
|
"url": "https://git.kernel.org/stable/c/7e8099967d0e3ff9d1ae043e80b27fbe46c08417",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/7ef94bfb08fb9e73defafbd5ddef6b5a0e2ee12b",
|
"url": "https://git.kernel.org/stable/c/7ef94bfb08fb9e73defafbd5ddef6b5a0e2ee12b",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/8628f489b749a4f9767991631921dbe3fbcdc784",
|
"url": "https://git.kernel.org/stable/c/8628f489b749a4f9767991631921dbe3fbcdc784",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2022-48940",
|
"id": "CVE-2022-48940",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2024-08-22T04:15:17.907",
|
"published": "2024-08-22T04:15:17.907",
|
||||||
"lastModified": "2024-08-22T12:48:02.790",
|
"lastModified": "2024-08-22T18:37:46.133",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -15,19 +15,89 @@
|
|||||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: bpf: soluciona el fallo debido a copy_map_value incorrecto Cuando tanto bpf_spin_lock como bpf_timer est\u00e1n presentes en un valor de mapa BPF, copy_map_value necesita eludir ambos objetos al copiar un valor dentro y fuera del mapa. Sin embargo, el c\u00f3digo actual no establece s_off y t_off en copy_map_value, lo que provoca un bloqueo cuando, por ejemplo, bpf_spin_lock se coloca en el valor del mapa con bpf_timer, ya que la llamada a bpf_map_update_elem podr\u00e1 sobrescribir el otro objeto de temporizador. Cuando el problema no se soluciona, una sobrescritura puede producir el siguiente s\u00edmbolo: [root@(none) bpf]# ./test_progs -t timer_crash [15.930339] bpf_testmod: cargando el n\u00facleo de contaminaci\u00f3n del m\u00f3dulo fuera del \u00e1rbol. [16.037849] ================================================= =================== [16.038458] ERROR: KASAN: acceso a memoria de usuario en __pv_queued_spin_lock_slowpath+0x32b/0x520 [16.038944] Escritura de tama\u00f1o 8 en la direcci\u00f3n 0000000000043ec0 por tarea test_progs /325 [ 16.039399] [ 16.039514] CPU: 0 PID: 325 Comm: test_progs Contaminado: G OE 5.16.0+ #278 [ 16.039983] Nombre de hardware: PC est\u00e1ndar QEMU (i440FX + PIIX, 1996), BIOS ArchLinux 1.15.0- 1 01/04/2014 [ 16.040485] Seguimiento de llamadas: [ 16.040645] [ 16.040805] dump_stack_lvl+0x59/0x73 [ 16.041069] ? __pv_queued_spin_lock_slowpath+0x32b/0x520 [ 16.041427] kasan_report.cold+0x116/0x11b [ 16.041673] ? __pv_queued_spin_lock_slowpath+0x32b/0x520 [16.042040] __pv_queued_spin_lock_slowpath+0x32b/0x520 [16.042328] ? memcpy+0x39/0x60 [16.042552]? pv_hash+0xd0/0xd0 [16.042785]? lockdep_hardirqs_off+0x95/0xd0 [ 16.043079] __bpf_spin_lock_irqsave+0xdf/0xf0 [ 16.043366] ? bpf_get_current_comm+0x50/0x50 [16.043608]? jhash+0x11a/0x270 [ 16.043848] bpf_timer_cancel+0x34/0xe0 [ 16.044119] bpf_prog_c4ea1c0f7449940d_sys_enter+0x7c/0x81 [ 16.044500] 7838_0+0x36/0x1000 [ 16.044836] __x64_sys_nanosleep+0x5/0x140 [ 16.045119] do_syscall_64+0x59/0x80 [ 16.045377] ? lock_is_held_type+0xe4/0x140 [16.045670]? irqentry_exit_to_user_mode+0xa/0x40 [16.046001]? mark_held_locks+0x24/0x90 [16.046287]? asm_exc_page_fault+0x1e/0x30 [16.046569]? asm_exc_page_fault+0x8/0x30 [16.046851]? lockdep_hardirqs_on+0x7e/0x100 [16.047137] Entry_SYSCALL_64_after_hwframe+0x44/0xae [16.047405] RIP: 0033:0x7f9e4831718d [16.047602] C\u00f3digo: b4 0c 00 0f 05 eb a9 66 0f 1f 44 00 00 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d b3 6c 0c 00 f7 d8 64 89 01 48 [ 16.048764] : 002b:00007fff488086b8 EFLAGS: 00000206 ORIG_RAX: 0000000000000023 [ 16.049275] RAX: ffffffffffffffda RBX: 00007f9e48683740 RCX: 00007f9e4831718d [ 16.049747] RDX: 000000000000 RSI: 0000000000000000 RDI: 00007fff488086d0 [ 16.050225] RBP: 00007fff488086f0 R08: 00007fff488085d7 R09: 00007f9e4cb594a0 [ 16.050648] R10: 0000000000000000 R11: 0000000000000206 R12: 00007f9e484cde30 [ 16.051124] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 16.051608 ] [ 16.051762] ========================= ============================================"
|
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: bpf: soluciona el fallo debido a copy_map_value incorrecto Cuando tanto bpf_spin_lock como bpf_timer est\u00e1n presentes en un valor de mapa BPF, copy_map_value necesita eludir ambos objetos al copiar un valor dentro y fuera del mapa. Sin embargo, el c\u00f3digo actual no establece s_off y t_off en copy_map_value, lo que provoca un bloqueo cuando, por ejemplo, bpf_spin_lock se coloca en el valor del mapa con bpf_timer, ya que la llamada a bpf_map_update_elem podr\u00e1 sobrescribir el otro objeto de temporizador. Cuando el problema no se soluciona, una sobrescritura puede producir el siguiente s\u00edmbolo: [root@(none) bpf]# ./test_progs -t timer_crash [15.930339] bpf_testmod: cargando el n\u00facleo de contaminaci\u00f3n del m\u00f3dulo fuera del \u00e1rbol. [16.037849] ================================================= =================== [16.038458] ERROR: KASAN: acceso a memoria de usuario en __pv_queued_spin_lock_slowpath+0x32b/0x520 [16.038944] Escritura de tama\u00f1o 8 en la direcci\u00f3n 0000000000043ec0 por tarea test_progs /325 [ 16.039399] [ 16.039514] CPU: 0 PID: 325 Comm: test_progs Contaminado: G OE 5.16.0+ #278 [ 16.039983] Nombre de hardware: PC est\u00e1ndar QEMU (i440FX + PIIX, 1996), BIOS ArchLinux 1.15.0- 1 01/04/2014 [ 16.040485] Seguimiento de llamadas: [ 16.040645] [ 16.040805] dump_stack_lvl+0x59/0x73 [ 16.041069] ? __pv_queued_spin_lock_slowpath+0x32b/0x520 [ 16.041427] kasan_report.cold+0x116/0x11b [ 16.041673] ? __pv_queued_spin_lock_slowpath+0x32b/0x520 [16.042040] __pv_queued_spin_lock_slowpath+0x32b/0x520 [16.042328] ? memcpy+0x39/0x60 [16.042552]? pv_hash+0xd0/0xd0 [16.042785]? lockdep_hardirqs_off+0x95/0xd0 [ 16.043079] __bpf_spin_lock_irqsave+0xdf/0xf0 [ 16.043366] ? bpf_get_current_comm+0x50/0x50 [16.043608]? jhash+0x11a/0x270 [ 16.043848] bpf_timer_cancel+0x34/0xe0 [ 16.044119] bpf_prog_c4ea1c0f7449940d_sys_enter+0x7c/0x81 [ 16.044500] 7838_0+0x36/0x1000 [ 16.044836] __x64_sys_nanosleep+0x5/0x140 [ 16.045119] do_syscall_64+0x59/0x80 [ 16.045377] ? lock_is_held_type+0xe4/0x140 [16.045670]? irqentry_exit_to_user_mode+0xa/0x40 [16.046001]? mark_held_locks+0x24/0x90 [16.046287]? asm_exc_page_fault+0x1e/0x30 [16.046569]? asm_exc_page_fault+0x8/0x30 [16.046851]? lockdep_hardirqs_on+0x7e/0x100 [16.047137] Entry_SYSCALL_64_after_hwframe+0x44/0xae [16.047405] RIP: 0033:0x7f9e4831718d [16.047602] C\u00f3digo: b4 0c 00 0f 05 eb a9 66 0f 1f 44 00 00 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d b3 6c 0c 00 f7 d8 64 89 01 48 [ 16.048764] : 002b:00007fff488086b8 EFLAGS: 00000206 ORIG_RAX: 0000000000000023 [ 16.049275] RAX: ffffffffffffffda RBX: 00007f9e48683740 RCX: 00007f9e4831718d [ 16.049747] RDX: 000000000000 RSI: 0000000000000000 RDI: 00007fff488086d0 [ 16.050225] RBP: 00007fff488086f0 R08: 00007fff488085d7 R09: 00007f9e4cb594a0 [ 16.050648] R10: 0000000000000000 R11: 0000000000000206 R12: 00007f9e484cde30 [ 16.051124] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 16.051608 ] [ 16.051762] ========================= ============================================"
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 5.5,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-119"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "5.15",
|
||||||
|
"versionEndExcluding": "5.15.26",
|
||||||
|
"matchCriteriaId": "DD0395FB-2D21-4970-B193-86285F5C505E"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "5.16",
|
||||||
|
"versionEndExcluding": "5.16.12",
|
||||||
|
"matchCriteriaId": "C76BAB21-7F23-4AD8-A25F-CA7B262A2698"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/719d1c2524c89ada78c4c9202641c1d9e942a322",
|
"url": "https://git.kernel.org/stable/c/719d1c2524c89ada78c4c9202641c1d9e942a322",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/a8abb0c3dc1e28454851a00f8b7333d9695d566c",
|
"url": "https://git.kernel.org/stable/c/a8abb0c3dc1e28454851a00f8b7333d9695d566c",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/eca9bd215d2233de79d930fa97aefbce03247a98",
|
"url": "https://git.kernel.org/stable/c/eca9bd215d2233de79d930fa97aefbce03247a98",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2022-48941",
|
"id": "CVE-2022-48941",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2024-08-22T04:15:17.967",
|
"published": "2024-08-22T04:15:17.967",
|
||||||
"lastModified": "2024-08-22T12:48:02.790",
|
"lastModified": "2024-08-22T18:41:37.090",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -15,23 +15,102 @@
|
|||||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ice: corrige el restablecimiento y la eliminaci\u00f3n simult\u00e1neos de VF. El commit c503e63200c6 (\"ice: deja de procesar mensajes VF durante el desmontaje\") introdujo un indicador de estado del controlador, ICE_VF_DEINIT_IN_PROGRESS, cuyo objetivo es evitar algunos problemas con el manejo simult\u00e1neo de mensajes de VF mientras se derriban los VF. Este cambio fue motivado por accidentes causados al derribar y levantar VF en r\u00e1pida sucesi\u00f3n. Resulta que la soluci\u00f3n en realidad introduce problemas con el controlador VF causados porque el PF ya no responde a ning\u00fan mensaje enviado por el VF durante su rutina .remove. Esto da como resultado que el VF elimine potencialmente su memoria DMA antes de que el PF haya cerrado las colas de dispositivos. Adem\u00e1s, la soluci\u00f3n en realidad no resuelve los problemas de concurrencia dentro del controlador Ice. Es posible que un VF inicie un reinicio justo antes de que el conductor de hielo elimine los VF. Esto puede provocar que la tarea de eliminaci\u00f3n funcione simult\u00e1neamente mientras se restablece el VF. Esto da como resultado una corrupci\u00f3n de memoria similar y p\u00e1nicos supuestamente solucionados por esa confirmaci\u00f3n. Corrija esta simultaneidad desde la ra\u00edz protegiendo los flujos de reinicio y eliminaci\u00f3n utilizando el VF cfg_lock existente. Esto garantiza que no podamos eliminar el VF mientras se est\u00e9n realizando tareas cr\u00edticas pendientes, como un mensaje virtchnl o un reinicio. Este cambio de bloqueo tambi\u00e9n soluciona la causa ra\u00edz solucionada originalmente mediante el commit c503e63200c6 (\"ice: Detener el procesamiento de mensajes VF durante el desmontaje\"), por lo que simplemente podemos revertirlo. Tenga en cuenta que mantuve estos dos cambios juntos porque simplemente revertir el compromiso original dejar\u00eda al conductor vulnerable a peores condiciones de ejecuci\u00f3n."
|
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ice: corrige el restablecimiento y la eliminaci\u00f3n simult\u00e1neos de VF. El commit c503e63200c6 (\"ice: deja de procesar mensajes VF durante el desmontaje\") introdujo un indicador de estado del controlador, ICE_VF_DEINIT_IN_PROGRESS, cuyo objetivo es evitar algunos problemas con el manejo simult\u00e1neo de mensajes de VF mientras se derriban los VF. Este cambio fue motivado por accidentes causados al derribar y levantar VF en r\u00e1pida sucesi\u00f3n. Resulta que la soluci\u00f3n en realidad introduce problemas con el controlador VF causados porque el PF ya no responde a ning\u00fan mensaje enviado por el VF durante su rutina .remove. Esto da como resultado que el VF elimine potencialmente su memoria DMA antes de que el PF haya cerrado las colas de dispositivos. Adem\u00e1s, la soluci\u00f3n en realidad no resuelve los problemas de concurrencia dentro del controlador Ice. Es posible que un VF inicie un reinicio justo antes de que el conductor de hielo elimine los VF. Esto puede provocar que la tarea de eliminaci\u00f3n funcione simult\u00e1neamente mientras se restablece el VF. Esto da como resultado una corrupci\u00f3n de memoria similar y p\u00e1nicos supuestamente solucionados por esa confirmaci\u00f3n. Corrija esta simultaneidad desde la ra\u00edz protegiendo los flujos de reinicio y eliminaci\u00f3n utilizando el VF cfg_lock existente. Esto garantiza que no podamos eliminar el VF mientras se est\u00e9n realizando tareas cr\u00edticas pendientes, como un mensaje virtchnl o un reinicio. Este cambio de bloqueo tambi\u00e9n soluciona la causa ra\u00edz solucionada originalmente mediante el commit c503e63200c6 (\"ice: Detener el procesamiento de mensajes VF durante el desmontaje\"), por lo que simplemente podemos revertirlo. Tenga en cuenta que mantuve estos dos cambios juntos porque simplemente revertir el compromiso original dejar\u00eda al conductor vulnerable a peores condiciones de ejecuci\u00f3n."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "HIGH",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 4.7,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.0,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-362"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "5.10.104",
|
||||||
|
"matchCriteriaId": "11A056EC-CCC4-4F9D-8466-75C8592015D0"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "5.11",
|
||||||
|
"versionEndExcluding": "5.15.26",
|
||||||
|
"matchCriteriaId": "9AB342AE-A62E-4947-A6EA-511453062B2B"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "5.16",
|
||||||
|
"versionEndExcluding": "5.16.12",
|
||||||
|
"matchCriteriaId": "C76BAB21-7F23-4AD8-A25F-CA7B262A2698"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/05ae1f0fe9c6c5ead08b306e665763a352d20716",
|
"url": "https://git.kernel.org/stable/c/05ae1f0fe9c6c5ead08b306e665763a352d20716",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/2a3e61de89bab6696aa28b70030eb119968c5586",
|
"url": "https://git.kernel.org/stable/c/2a3e61de89bab6696aa28b70030eb119968c5586",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/3c805fce07c9dbc47d8a9129c7c5458025951957",
|
"url": "https://git.kernel.org/stable/c/3c805fce07c9dbc47d8a9129c7c5458025951957",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/fadead80fe4c033b5e514fcbadd20b55c4494112",
|
"url": "https://git.kernel.org/stable/c/fadead80fe4c033b5e514fcbadd20b55c4494112",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2022-48942",
|
"id": "CVE-2022-48942",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2024-08-22T04:15:18.953",
|
"published": "2024-08-22T04:15:18.953",
|
||||||
"lastModified": "2024-08-22T12:48:02.790",
|
"lastModified": "2024-08-22T18:25:14.867",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -15,23 +15,103 @@
|
|||||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: hwmon: Maneja la falla al registrar correctamente el sensor con zona t\u00e9rmica. Si se intenta acceder a un sensor con zona t\u00e9rmica y falla, la llamada a devm_thermal_zone_of_sensor_register() puede devolver -ENODEV. Esto puede provocar fallos similares a los siguientes. No se puede manejar la desreferencia del puntero NULL del kernel en la direcci\u00f3n virtual 00000000000003cd... Error interno: Ups: 96000021 [#1] PREEMPT SMP... pstate: 60400009 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc: mutex_lock+0x18/0x60 lr: Thermal_zone_device_update+0x40/0x2e0 sp: ffff800014c4fc60 x29: ffff800014c4fc60 x28: ffff365ee3f6e000 x27: ffffdde218426790 x26: f6e000 x25: 0000000000000000 x24: ffff365ee3f6e000 x23: ffffdde218426870 x22: ffff365ee3f6e000 x21: 00000000000003cd x20: ffff365ee8bf3308 ffffffffffffffff x18: 0000000000000000 x17: ffffdde21842689c x16: ffffdde1cb7a0b7c x15: 0000000000000040 x14: ffffdde21a4889a0 x13: 0000000000000228 x12: 00000000000000 x11: 0000000000000000 x10: 0000000000000000 x9: 0000000000000000 x8: 0000000001120000 x7: 0000000000000001 x6: 0000 000000000000 x5: 0068000878e20f07 x4: 0000000000000000 x3: 00000000000003cd x2: ffff365ee3f6e000 x1: 0000000000000000 x0: 00000000000003cd Rastreo de llamadas: mutex_lock+0x18/0x60 hwmon_notify_event+0xfc/0x110 0xffffdde1cb7a0a90 0xffffdde1cb7a0b7c thread_fn+0x2c/0xa0 irq_thread+0x134/0x240 kthread+0x178/0x190 ret_from_fork+0x10/0x20 C\u00f3digo: d503201f d503201f d2800001 aa0103e4 (c8e47c02 ) Jon Hunter informa que la secuencia de llamada exacta es: hwmon_notify_event() --> hwmon_thermal_notify() --> Thermal_zone_device_update() --> update_temperature() --> mutex_lock() El n\u00facleo de hwmon necesita manejar todos los errores devueltos por las llamadas a devm_thermal_zone_of_sensor_register(). Si la llamada falla con -ENODEV, informe que el sensor no estaba conectado a una zona t\u00e9rmica pero contin\u00fae registrando el dispositivo hwmon."
|
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: hwmon: Maneja la falla al registrar correctamente el sensor con zona t\u00e9rmica. Si se intenta acceder a un sensor con zona t\u00e9rmica y falla, la llamada a devm_thermal_zone_of_sensor_register() puede devolver -ENODEV. Esto puede provocar fallos similares a los siguientes. No se puede manejar la desreferencia del puntero NULL del kernel en la direcci\u00f3n virtual 00000000000003cd... Error interno: Ups: 96000021 [#1] PREEMPT SMP... pstate: 60400009 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc: mutex_lock+0x18/0x60 lr: Thermal_zone_device_update+0x40/0x2e0 sp: ffff800014c4fc60 x29: ffff800014c4fc60 x28: ffff365ee3f6e000 x27: ffffdde218426790 x26: f6e000 x25: 0000000000000000 x24: ffff365ee3f6e000 x23: ffffdde218426870 x22: ffff365ee3f6e000 x21: 00000000000003cd x20: ffff365ee8bf3308 ffffffffffffffff x18: 0000000000000000 x17: ffffdde21842689c x16: ffffdde1cb7a0b7c x15: 0000000000000040 x14: ffffdde21a4889a0 x13: 0000000000000228 x12: 00000000000000 x11: 0000000000000000 x10: 0000000000000000 x9: 0000000000000000 x8: 0000000001120000 x7: 0000000000000001 x6: 0000 000000000000 x5: 0068000878e20f07 x4: 0000000000000000 x3: 00000000000003cd x2: ffff365ee3f6e000 x1: 0000000000000000 x0: 00000000000003cd Rastreo de llamadas: mutex_lock+0x18/0x60 hwmon_notify_event+0xfc/0x110 0xffffdde1cb7a0a90 0xffffdde1cb7a0b7c thread_fn+0x2c/0xa0 irq_thread+0x134/0x240 kthread+0x178/0x190 ret_from_fork+0x10/0x20 C\u00f3digo: d503201f d503201f d2800001 aa0103e4 (c8e47c02 ) Jon Hunter informa que la secuencia de llamada exacta es: hwmon_notify_event() --> hwmon_thermal_notify() --> Thermal_zone_device_update() --> update_temperature() --> mutex_lock() El n\u00facleo de hwmon necesita manejar todos los errores devueltos por las llamadas a devm_thermal_zone_of_sensor_register(). Si la llamada falla con -ENODEV, informe que el sensor no estaba conectado a una zona t\u00e9rmica pero contin\u00fae registrando el dispositivo hwmon."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 5.5,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-476"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "5.8",
|
||||||
|
"versionEndExcluding": "5.10.103",
|
||||||
|
"matchCriteriaId": "D8C41B9F-E0FA-4DF6-A35F-596B525A72A6"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "5.11",
|
||||||
|
"versionEndExcluding": "5.15.26",
|
||||||
|
"matchCriteriaId": "9AB342AE-A62E-4947-A6EA-511453062B2B"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "5.16",
|
||||||
|
"versionEndExcluding": "5.16.12",
|
||||||
|
"matchCriteriaId": "C76BAB21-7F23-4AD8-A25F-CA7B262A2698"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/1b5f517cca36292076d9e38fa6e33a257703e62e",
|
"url": "https://git.kernel.org/stable/c/1b5f517cca36292076d9e38fa6e33a257703e62e",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/7efe8499cb90651c540753f4269d2d43ede14223",
|
"url": "https://git.kernel.org/stable/c/7efe8499cb90651c540753f4269d2d43ede14223",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/8a1969e14ad93663f9a3ed02ccc2138da9956a0e",
|
"url": "https://git.kernel.org/stable/c/8a1969e14ad93663f9a3ed02ccc2138da9956a0e",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/962b2a3188bfa5388756ffbc47dfa5ff59cb8011",
|
"url": "https://git.kernel.org/stable/c/962b2a3188bfa5388756ffbc47dfa5ff59cb8011",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2022-48943",
|
"id": "CVE-2022-48943",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2024-08-22T04:15:19.027",
|
"published": "2024-08-22T04:15:19.027",
|
||||||
"lastModified": "2024-08-22T12:48:02.790",
|
"lastModified": "2024-08-22T18:27:42.807",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -15,23 +15,102 @@
|
|||||||
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: KVM: x86/mmu: haga que el token apf sea distinto de cero para corregir el error En la l\u00f3gica de error de p\u00e1gina as\u00edncrona actual, cuando una p\u00e1gina est\u00e1 lista, KVM se basa en kvm_arch_can_dequeue_async_page_present() para determinar si se debe entregar un evento LISTO para el Invitado. Esta funci\u00f3n prueba el valor del token de la estructura kvm_vcpu_pv_apf_data, que el kernel invitado debe restablecer a cero cuando el invitado finaliza un evento READY. Si el valor es cero, significa que se realiz\u00f3 un evento READY, por lo que el KVM puede entregar otro. Pero kvm_arch_setup_async_pf() puede producir un token v\u00e1lido con valor cero, lo que se confunde con la menci\u00f3n anterior y puede provocar la p\u00e9rdida de este evento READY. Este error puede causar que la tarea se bloquee para siempre en Guest: INFORMACI\u00d3N: tarea de estr\u00e9s:7532 bloqueada durante m\u00e1s de 1254 segundos. Not tainted 5.10.0 #16 \"echo 0 > /proc/sys/kernel/hung_task_timeout_secs\" desactiva este mensaje. tarea:estr\u00e9s estado:D pila: 0 pid: 7532 ppid: 1409 banderas:0x00000080 Seguimiento de llamadas: __schedule+0x1e7/0x650 Schedule+0x46/0xb0 kvm_async_pf_task_wait_schedule+0xad/0xe0 ? exit_to_user_mode_prepare+0x60/0x70 __kvm_handle_async_pf+0x4f/0xb0 ? asm_exc_page_fault+0x8/0x30 exc_page_fault+0x6f/0x110? asm_exc_page_fault+0x8/0x30 asm_exc_page_fault+0x1e/0x30 RIP: 0033:0x402d00 RSP: 002b:00007ffd31912500 EFLAGS: 00010206 RAX: 0000000000071000 RBX: ffffffff RCX: 00000000021a32b0 RDX: 000000000007d011 RSI: 000000000007d000 RDI: 00000000021262b0 RBP: 00000000021262b0 R08: 03 R09: 0000000000000086 R10: 000000000000000000EB R11: 00007FEFBDF2BAA0 R12: 00000000000000000000 R13: 0000000000000002 R14: 000000000007D000 R15: 00000000001000"
|
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: KVM: x86/mmu: haga que el token apf sea distinto de cero para corregir el error En la l\u00f3gica de error de p\u00e1gina as\u00edncrona actual, cuando una p\u00e1gina est\u00e1 lista, KVM se basa en kvm_arch_can_dequeue_async_page_present() para determinar si se debe entregar un evento LISTO para el Invitado. Esta funci\u00f3n prueba el valor del token de la estructura kvm_vcpu_pv_apf_data, que el kernel invitado debe restablecer a cero cuando el invitado finaliza un evento READY. Si el valor es cero, significa que se realiz\u00f3 un evento READY, por lo que el KVM puede entregar otro. Pero kvm_arch_setup_async_pf() puede producir un token v\u00e1lido con valor cero, lo que se confunde con la menci\u00f3n anterior y puede provocar la p\u00e9rdida de este evento READY. Este error puede causar que la tarea se bloquee para siempre en Guest: INFORMACI\u00d3N: tarea de estr\u00e9s:7532 bloqueada durante m\u00e1s de 1254 segundos. Not tainted 5.10.0 #16 \"echo 0 > /proc/sys/kernel/hung_task_timeout_secs\" desactiva este mensaje. tarea:estr\u00e9s estado:D pila: 0 pid: 7532 ppid: 1409 banderas:0x00000080 Seguimiento de llamadas: __schedule+0x1e7/0x650 Schedule+0x46/0xb0 kvm_async_pf_task_wait_schedule+0xad/0xe0 ? exit_to_user_mode_prepare+0x60/0x70 __kvm_handle_async_pf+0x4f/0xb0 ? asm_exc_page_fault+0x8/0x30 exc_page_fault+0x6f/0x110? asm_exc_page_fault+0x8/0x30 asm_exc_page_fault+0x1e/0x30 RIP: 0033:0x402d00 RSP: 002b:00007ffd31912500 EFLAGS: 00010206 RAX: 0000000000071000 RBX: ffffffff RCX: 00000000021a32b0 RDX: 000000000007d011 RSI: 000000000007d000 RDI: 00000000021262b0 RBP: 00000000021262b0 R08: 03 R09: 0000000000000086 R10: 000000000000000000EB R11: 00007FEFBDF2BAA0 R12: 00000000000000000000 R13: 0000000000000002 R14: 000000000007D000 R15: 00000000001000"
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 7.8,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "NVD-CWE-noinfo"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "5.10.103",
|
||||||
|
"matchCriteriaId": "7E2EF203-0F7F-41A9-9684-671AAD1D37A1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "5.11",
|
||||||
|
"versionEndExcluding": "5.15.26",
|
||||||
|
"matchCriteriaId": "9AB342AE-A62E-4947-A6EA-511453062B2B"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "5.16",
|
||||||
|
"versionEndExcluding": "5.16.12",
|
||||||
|
"matchCriteriaId": "C76BAB21-7F23-4AD8-A25F-CA7B262A2698"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/4c3644b6c96c5daa5149e5abddc07234eea47c7c",
|
"url": "https://git.kernel.org/stable/c/4c3644b6c96c5daa5149e5abddc07234eea47c7c",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/62040f5cd7d937de547836e747b6aa8212fec573",
|
"url": "https://git.kernel.org/stable/c/62040f5cd7d937de547836e747b6aa8212fec573",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/6f3c1fc53d86d580d8d6d749c4af23705e4f6f79",
|
"url": "https://git.kernel.org/stable/c/6f3c1fc53d86d580d8d6d749c4af23705e4f6f79",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/72fdfc75d4217b32363cc80def3de2cb3fef3f02",
|
"url": "https://git.kernel.org/stable/c/72fdfc75d4217b32363cc80def3de2cb3fef3f02",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2023-46047",
|
"id": "CVE-2023-46047",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-03-27T05:15:47.500",
|
"published": "2024-03-27T05:15:47.500",
|
||||||
"lastModified": "2024-08-02T21:15:49.040",
|
"lastModified": "2024-08-22T18:35:01.467",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [
|
"cveTags": [
|
||||||
{
|
{
|
||||||
@ -22,7 +22,42 @@
|
|||||||
"value": "Un problema en Sane 1.2.1 permite a un atacante local ejecutar c\u00f3digo arbitrario a trav\u00e9s de un archivo manipulado en la funci\u00f3n sanei_configure_attach(). NOTA: esto est\u00e1 en disputa porque no se espera que el producto comience con un archivo de configuraci\u00f3n controlado por el atacante."
|
"value": "Un problema en Sane 1.2.1 permite a un atacante local ejecutar c\u00f3digo arbitrario a trav\u00e9s de un archivo manipulado en la funci\u00f3n sanei_configure_attach(). NOTA: esto est\u00e1 en disputa porque no se espera que el producto comience con un archivo de configuraci\u00f3n controlado por el atacante."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 7.3,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.3,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-20"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "http://seclists.org/fulldisclosure/2024/Jan/64",
|
"url": "http://seclists.org/fulldisclosure/2024/Jan/64",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2023-46297",
|
"id": "CVE-2023-46297",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-05-29T16:15:09.423",
|
"published": "2024-05-29T16:15:09.423",
|
||||||
"lastModified": "2024-05-29T19:50:25.303",
|
"lastModified": "2024-08-22T19:35:05.647",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,42 @@
|
|||||||
"value": "Se descubri\u00f3 un problema en los dispositivos Mercusys MW325R EU V3 MW325R(EU)_V3_1.11.0 221019. Un atacante de WAN puede hacer que la interfaz de administraci\u00f3n sea inaccesible/invisible mediante una solicitud HTTP no autenticada. No se produce verificaci\u00f3n de los datos enviados por el usuario. El servidor web no falla, pero la interfaz de administraci\u00f3n se vuelve invisible porque los archivos necesarios para mostrar el contenido ya no est\u00e1n disponibles. Normalmente es necesario reiniciar el enrutador para restaurar el comportamiento correcto."
|
"value": "Se descubri\u00f3 un problema en los dispositivos Mercusys MW325R EU V3 MW325R(EU)_V3_1.11.0 221019. Un atacante de WAN puede hacer que la interfaz de administraci\u00f3n sea inaccesible/invisible mediante una solicitud HTTP no autenticada. No se produce verificaci\u00f3n de los datos enviados por el usuario. El servidor web no falla, pero la interfaz de administraci\u00f3n se vuelve invisible porque los archivos necesarios para mostrar el contenido ya no est\u00e1n disponibles. Normalmente es necesario reiniciar el enrutador para restaurar el comportamiento correcto."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "LOW",
|
||||||
|
"baseScore": 5.1,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.5,
|
||||||
|
"impactScore": 2.5
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-755"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://k4m1ll0.com/cve-2023-46297.html",
|
"url": "https://k4m1ll0.com/cve-2023-46297.html",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2023-46442",
|
"id": "CVE-2023-46442",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-05-24T17:15:45.367",
|
"published": "2024-05-24T17:15:45.367",
|
||||||
"lastModified": "2024-05-24T18:09:20.027",
|
"lastModified": "2024-08-22T19:35:06.600",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,42 @@
|
|||||||
"value": "Un bucle infinito en la funci\u00f3n retrieveActiveBody de Soot anterior a v4.4.1 en Java 8 permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS)."
|
"value": "Un bucle infinito en la funci\u00f3n retrieveActiveBody de Soot anterior a v4.4.1 en Java 8 permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS)."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "LOW",
|
||||||
|
"baseScore": 4.3,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-400"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/JAckLosingHeart/CVE-2023-46442_POC/tree/main",
|
"url": "https://github.com/JAckLosingHeart/CVE-2023-46442_POC/tree/main",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2023-49963",
|
"id": "CVE-2023-49963",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-04-19T17:15:51.900",
|
"published": "2024-04-19T17:15:51.900",
|
||||||
"lastModified": "2024-04-19T18:29:53.040",
|
"lastModified": "2024-08-22T19:35:07.550",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,42 @@
|
|||||||
"value": "El servidor de impresi\u00f3n DYMO LabelWriter hasta la versi\u00f3n 2.366 contiene una contrase\u00f1a codificada de puerta trasera que podr\u00eda permitir que un atacante tome el control."
|
"value": "El servidor de impresi\u00f3n DYMO LabelWriter hasta la versi\u00f3n 2.366 contiene una contrase\u00f1a codificada de puerta trasera que podr\u00eda permitir que un atacante tome el control."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "ADJACENT_NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 8.8,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-259"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://gitlab.com/loudmouth-security/vulnerability-disclosures/cve-2023-49963",
|
"url": "https://gitlab.com/loudmouth-security/vulnerability-disclosures/cve-2023-49963",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2023-49965",
|
"id": "CVE-2023-49965",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-04-05T14:15:10.423",
|
"published": "2024-04-05T14:15:10.423",
|
||||||
"lastModified": "2024-04-08T18:49:25.863",
|
"lastModified": "2024-08-22T18:35:03.353",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,30 @@
|
|||||||
"value": "El router Wi-Fi SpaceX Starlink Gen 2 anterior a 2023.48.0 permite XSS a trav\u00e9s de los par\u00e1metros ssid y contrase\u00f1a en la p\u00e1gina de configuraci\u00f3n."
|
"value": "El router Wi-Fi SpaceX Starlink Gen 2 anterior a 2023.48.0 permite XSS a trav\u00e9s de los par\u00e1metros ssid y contrase\u00f1a en la p\u00e1gina de configuraci\u00f3n."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 6.8,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.1,
|
||||||
|
"impactScore": 4.7
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://hackintoanetwork.com/blog/2023-starlink-router-gen2-xss-eng/",
|
"url": "https://hackintoanetwork.com/blog/2023-starlink-router-gen2-xss-eng/",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2023-50061",
|
"id": "CVE-2023-50061",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-02-08T18:15:08.157",
|
"published": "2024-02-08T18:15:08.157",
|
||||||
"lastModified": "2024-02-15T05:02:52.427",
|
"lastModified": "2024-08-22T19:35:08.363",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -36,6 +36,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 3.9,
|
"exploitabilityScore": 3.9,
|
||||||
"impactScore": 5.9
|
"impactScore": 5.9
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 9.8,
|
||||||
|
"baseSeverity": "CRITICAL"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 5.9
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -49,6 +69,16 @@
|
|||||||
"value": "CWE-89"
|
"value": "CWE-89"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-89"
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"configurations": [
|
"configurations": [
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2023-52153",
|
"id": "CVE-2023-52153",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-02-21T22:15:49.023",
|
"published": "2024-02-21T22:15:49.023",
|
||||||
"lastModified": "2024-02-22T19:07:27.197",
|
"lastModified": "2024-08-22T19:35:09.257",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,42 @@
|
|||||||
"value": "Una vulnerabilidad de inyecci\u00f3n SQL en /pmb/opac_css/includes/sessions.inc.php en PMB 7.4.7 y versiones anteriores permite a atacantes remotos no autenticados inyectar comandos SQL arbitrarios a trav\u00e9s del valor de cookie PmbOpac-LOGIN."
|
"value": "Una vulnerabilidad de inyecci\u00f3n SQL en /pmb/opac_css/includes/sessions.inc.php en PMB 7.4.7 y versiones anteriores permite a atacantes remotos no autenticados inyectar comandos SQL arbitrarios a trav\u00e9s del valor de cookie PmbOpac-LOGIN."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 9.8,
|
||||||
|
"baseSeverity": "CRITICAL"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-89"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://nexacybersecurity.blogspot.com/2024/02/journey-finding-vulnerabilities-in-pmb-library-management-system.html",
|
"url": "https://nexacybersecurity.blogspot.com/2024/02/journey-finding-vulnerabilities-in-pmb-library-management-system.html",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2023-52366",
|
"id": "CVE-2023-52366",
|
||||||
"sourceIdentifier": "psirt@huawei.com",
|
"sourceIdentifier": "psirt@huawei.com",
|
||||||
"published": "2024-02-18T04:15:07.560",
|
"published": "2024-02-18T04:15:07.560",
|
||||||
"lastModified": "2024-02-20T19:50:53.960",
|
"lastModified": "2024-08-22T18:35:04.153",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,30 @@
|
|||||||
"value": "Vulnerabilidad de lectura fuera de los l\u00edmites en el m\u00f3dulo de reconocimiento de actividad inteligente. La explotaci\u00f3n exitosa de esta vulnerabilidad puede provocar que las funciones funcionen de manera anormal."
|
"value": "Vulnerabilidad de lectura fuera de los l\u00edmites en el m\u00f3dulo de reconocimiento de actividad inteligente. La explotaci\u00f3n exitosa de esta vulnerabilidad puede provocar que las funciones funcionen de manera anormal."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 7.5,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
{
|
{
|
||||||
"source": "psirt@huawei.com",
|
"source": "psirt@huawei.com",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-20037",
|
"id": "CVE-2024-20037",
|
||||||
"sourceIdentifier": "security@mediatek.com",
|
"sourceIdentifier": "security@mediatek.com",
|
||||||
"published": "2024-03-04T03:15:07.760",
|
"published": "2024-03-04T03:15:07.760",
|
||||||
"lastModified": "2024-03-04T13:58:23.447",
|
"lastModified": "2024-08-22T19:35:10.633",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,42 @@
|
|||||||
"value": "En pq, existe una posible condici\u00f3n de escritura en qu\u00e9 y d\u00f3nde debido a una verificaci\u00f3n de los l\u00edmites incorrecta. Esto podr\u00eda conducir a una escalada local de privilegios con permisos de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS08495937; ID del problema: ALPS08495937."
|
"value": "En pq, existe una posible condici\u00f3n de escritura en qu\u00e9 y d\u00f3nde debido a una verificaci\u00f3n de los l\u00edmites incorrecta. Esto podr\u00eda conducir a una escalada local de privilegios con permisos de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS08495937; ID del problema: ALPS08495937."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 6.7,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 0.8,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-754"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://corp.mediatek.com/product-security-bulletin/March-2024",
|
"url": "https://corp.mediatek.com/product-security-bulletin/March-2024",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-22394",
|
"id": "CVE-2024-22394",
|
||||||
"sourceIdentifier": "PSIRT@sonicwall.com",
|
"sourceIdentifier": "PSIRT@sonicwall.com",
|
||||||
"published": "2024-02-08T02:15:07.620",
|
"published": "2024-02-08T02:15:07.620",
|
||||||
"lastModified": "2024-02-14T21:46:40.537",
|
"lastModified": "2024-08-22T19:35:11.720",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -36,6 +36,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 3.9,
|
"exploitabilityScore": 3.9,
|
||||||
"impactScore": 5.9
|
"impactScore": 5.9
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 9.8,
|
||||||
|
"baseSeverity": "CRITICAL"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 5.9
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-22588",
|
"id": "CVE-2024-22588",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-05-24T15:15:23.377",
|
"published": "2024-05-24T15:15:23.377",
|
||||||
"lastModified": "2024-05-24T18:09:20.027",
|
"lastModified": "2024-08-22T19:35:11.923",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,42 @@
|
|||||||
"value": "Kwik commit 745fd4e2 no descarta las claves de cifrado no utilizadas."
|
"value": "Kwik commit 745fd4e2 no descarta las claves de cifrado no utilizadas."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "LOW",
|
||||||
|
"baseScore": 6.5,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 2.5
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-400"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://gist.github.com/QUICTester/29a1851c2b2a406411f688735526fe2e",
|
"url": "https://gist.github.com/QUICTester/29a1851c2b2a406411f688735526fe2e",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-23076",
|
"id": "CVE-2024-23076",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-04-10T12:15:09.190",
|
"published": "2024-04-10T12:15:09.190",
|
||||||
"lastModified": "2024-08-01T23:15:39.920",
|
"lastModified": "2024-08-22T19:35:12.810",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [
|
"cveTags": [
|
||||||
{
|
{
|
||||||
@ -22,7 +22,42 @@
|
|||||||
"value": "Se descubri\u00f3 que FreeChart v1.5.4 conten\u00eda una excepci\u00f3n NullPointerException a trav\u00e9s del componente /labels/BubbleXYItemLabelGenerator.java."
|
"value": "Se descubri\u00f3 que FreeChart v1.5.4 conten\u00eda una excepci\u00f3n NullPointerException a trav\u00e9s del componente /labels/BubbleXYItemLabelGenerator.java."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 7.5,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-395"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "http://jfreechart.com",
|
"url": "http://jfreechart.com",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-24133",
|
"id": "CVE-2024-24133",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-02-07T14:15:52.820",
|
"published": "2024-02-07T14:15:52.820",
|
||||||
"lastModified": "2024-08-02T00:15:15.980",
|
"lastModified": "2024-08-22T19:35:13.840",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [
|
"cveTags": [
|
||||||
{
|
{
|
||||||
@ -43,6 +43,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 3.9,
|
"exploitabilityScore": 3.9,
|
||||||
"impactScore": 5.9
|
"impactScore": 5.9
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 9.8,
|
||||||
|
"baseSeverity": "CRITICAL"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 5.9
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -56,6 +76,16 @@
|
|||||||
"value": "CWE-89"
|
"value": "CWE-89"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-89"
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"configurations": [
|
"configurations": [
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-24476",
|
"id": "CVE-2024-24476",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-02-21T19:15:09.030",
|
"published": "2024-02-21T19:15:09.030",
|
||||||
"lastModified": "2024-08-02T00:15:19.267",
|
"lastModified": "2024-08-22T18:35:04.910",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [
|
"cveTags": [
|
||||||
{
|
{
|
||||||
@ -22,7 +22,42 @@
|
|||||||
"value": "Vulnerabilidad de desbordamiento de b\u00fafer en el equipo Wireshark Wireshark anterior a v.4.2.0 permite que un atacante remoto provoque una denegaci\u00f3n de servicio a trav\u00e9s de los componentes de tama\u00f1o pan/addr_resolv.c y ws_manuf_lookup_str()."
|
"value": "Vulnerabilidad de desbordamiento de b\u00fafer en el equipo Wireshark Wireshark anterior a v.4.2.0 permite que un atacante remoto provoque una denegaci\u00f3n de servicio a trav\u00e9s de los componentes de tama\u00f1o pan/addr_resolv.c y ws_manuf_lookup_str()."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 7.5,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-119"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://gist.github.com/1047524396/369ba0ccffe255cf8142208b6142be2b",
|
"url": "https://gist.github.com/1047524396/369ba0ccffe255cf8142208b6142be2b",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-25502",
|
"id": "CVE-2024-25502",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-02-15T20:15:45.483",
|
"published": "2024-02-15T20:15:45.483",
|
||||||
"lastModified": "2024-02-16T13:38:00.047",
|
"lastModified": "2024-08-22T19:35:15.140",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,42 @@
|
|||||||
"value": "Vulnerabilidad de Directory Traversal en flusity CMS v.2.4 permite a un atacante remoto ejecutar c\u00f3digo arbitrario y obtener informaci\u00f3n confidencial a trav\u00e9s del componente download_backup.php."
|
"value": "Vulnerabilidad de Directory Traversal en flusity CMS v.2.4 permite a un atacante remoto ejecutar c\u00f3digo arbitrario y obtener informaci\u00f3n confidencial a trav\u00e9s del componente download_backup.php."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 9.8,
|
||||||
|
"baseSeverity": "CRITICAL"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-94"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/flusity/flusity-CMS/issues/10",
|
"url": "https://github.com/flusity/flusity-CMS/issues/10",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-25651",
|
"id": "CVE-2024-25651",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-03-14T03:15:08.727",
|
"published": "2024-03-14T03:15:08.727",
|
||||||
"lastModified": "2024-03-14T12:52:09.877",
|
"lastModified": "2024-08-22T19:35:16.053",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,42 @@
|
|||||||
"value": "La enumeraci\u00f3n de usuarios puede ocurrir en la API REST de autenticaci\u00f3n en Delinea PAM Secret Server 11.4. Esto permite a un atacante remoto determinar si un usuario es v\u00e1lido debido a una diferencia en las respuestas del endpoint /oauth2/token."
|
"value": "La enumeraci\u00f3n de usuarios puede ocurrir en la API REST de autenticaci\u00f3n en Delinea PAM Secret Server 11.4. Esto permite a un atacante remoto determinar si un usuario es v\u00e1lido debido a una diferencia en las respuestas del endpoint /oauth2/token."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 5.3,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-203"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://www.cvcn.gov.it/cvcn/cve/CVE-2024-25651",
|
"url": "https://www.cvcn.gov.it/cvcn/cve/CVE-2024-25651",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-25850",
|
"id": "CVE-2024-25850",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-02-22T15:15:08.540",
|
"published": "2024-02-22T15:15:08.540",
|
||||||
"lastModified": "2024-02-22T19:07:27.197",
|
"lastModified": "2024-08-22T19:35:16.957",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,42 @@
|
|||||||
"value": "Se descubri\u00f3 que Netis WF2780 v2.1.40144 contiene una vulnerabilidad de inyecci\u00f3n de comandos a trav\u00e9s del par\u00e1metro wps_ap_ssid5g"
|
"value": "Se descubri\u00f3 que Netis WF2780 v2.1.40144 contiene una vulnerabilidad de inyecci\u00f3n de comandos a trav\u00e9s del par\u00e1metro wps_ap_ssid5g"
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 9.8,
|
||||||
|
"baseSeverity": "CRITICAL"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-77"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/no1rr/Vulnerability/blob/master/netis/igd_wps_set_wps_ap_ssid5g.md",
|
"url": "https://github.com/no1rr/Vulnerability/blob/master/netis/igd_wps_set_wps_ap_ssid5g.md",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-27518",
|
"id": "CVE-2024-27518",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-04-29T21:15:47.857",
|
"published": "2024-04-29T21:15:47.857",
|
||||||
"lastModified": "2024-04-30T13:11:16.690",
|
"lastModified": "2024-08-22T19:35:18.243",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,42 @@
|
|||||||
"value": "Un problema en SUPERAntiSyware Professional X 10.0.1262 y 10.0.1264 permite a atacantes sin privilegios escalar privilegios mediante la restauraci\u00f3n de un archivo DLL manipulado en la carpeta C:\\Program Files\\SUPERAntiSpyware."
|
"value": "Un problema en SUPERAntiSyware Professional X 10.0.1262 y 10.0.1264 permite a atacantes sin privilegios escalar privilegios mediante la restauraci\u00f3n de un archivo DLL manipulado en la carpeta C:\\Program Files\\SUPERAntiSpyware."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 7.8,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-269"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/secunnix/CVE-2024-27518",
|
"url": "https://github.com/secunnix/CVE-2024-27518",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-27571",
|
"id": "CVE-2024-27571",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-03-01T14:15:54.280",
|
"published": "2024-03-01T14:15:54.280",
|
||||||
"lastModified": "2024-03-01T15:23:36.177",
|
"lastModified": "2024-08-22T19:35:19.107",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,42 @@
|
|||||||
"value": "Se descubri\u00f3 que LBT T300-T390 v2.2.1.8 conten\u00eda un desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria a trav\u00e9s del par\u00e1metro ApCliSsid en la funci\u00f3n makeCurRemoteApList. Esta vulnerabilidad permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) mediante una solicitud POST manipulada."
|
"value": "Se descubri\u00f3 que LBT T300-T390 v2.2.1.8 conten\u00eda un desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria a trav\u00e9s del par\u00e1metro ApCliSsid en la funci\u00f3n makeCurRemoteApList. Esta vulnerabilidad permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) mediante una solicitud POST manipulada."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 7.5,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-121"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/cvdyfbwa/IoT_LBT_Router/blob/main/makeCurRemoteApList.md",
|
"url": "https://github.com/cvdyfbwa/IoT_LBT_Router/blob/main/makeCurRemoteApList.md",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-28441",
|
"id": "CVE-2024-28441",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-03-22T02:15:08.480",
|
"published": "2024-03-22T02:15:08.480",
|
||||||
"lastModified": "2024-03-22T12:45:36.130",
|
"lastModified": "2024-08-22T18:35:05.960",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,42 @@
|
|||||||
"value": "Vulnerabilidad de carga de archivos en magicflue v.7.0 y anteriores permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de una solicitud manipulada al par\u00e1metro messageid del endpoint mail/mailupdate.jsp."
|
"value": "Vulnerabilidad de carga de archivos en magicflue v.7.0 y anteriores permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de una solicitud manipulada al par\u00e1metro messageid del endpoint mail/mailupdate.jsp."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 9.8,
|
||||||
|
"baseSeverity": "CRITICAL"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-434"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/iamHuFei/HVVault/blob/main/webapp/%E9%AD%94%E6%96%B9%E7%BD%91%E8%A1%A8/magicflu-mailupdate-jsp-fileupload.md",
|
"url": "https://github.com/iamHuFei/HVVault/blob/main/webapp/%E9%AD%94%E6%96%B9%E7%BD%91%E8%A1%A8/magicflu-mailupdate-jsp-fileupload.md",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-29489",
|
"id": "CVE-2024-29489",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-03-28T23:15:46.527",
|
"published": "2024-03-28T23:15:46.527",
|
||||||
"lastModified": "2024-03-29T12:45:02.937",
|
"lastModified": "2024-08-22T19:35:20.067",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,42 @@
|
|||||||
"value": "Jerryscript 2.4.0 tiene SEGV en ./jerry-core/ecma/base/ecma-helpers.c:238:58 en ecma_get_object_type."
|
"value": "Jerryscript 2.4.0 tiene SEGV en ./jerry-core/ecma/base/ecma-helpers.c:238:58 en ecma_get_object_type."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 5.5,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-476"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://gist.github.com/gandalf4a/9826a897ae1e3c8d1c7e71a1ec71d415",
|
"url": "https://gist.github.com/gandalf4a/9826a897ae1e3c8d1c7e71a1ec71d415",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-30804",
|
"id": "CVE-2024-30804",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-04-26T22:15:08.017",
|
"published": "2024-04-26T22:15:08.017",
|
||||||
"lastModified": "2024-04-29T12:42:03.667",
|
"lastModified": "2024-08-22T19:35:22.260",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,42 @@
|
|||||||
"value": "Un problema descubierto en el componente DeviceIoControl en ASUS Fan_Xpert anterior a v.10013 permite a un atacante ejecutar c\u00f3digo arbitrario a trav\u00e9s de solicitudes IOCTL manipuladas."
|
"value": "Un problema descubierto en el componente DeviceIoControl en ASUS Fan_Xpert anterior a v.10013 permite a un atacante ejecutar c\u00f3digo arbitrario a trav\u00e9s de solicitudes IOCTL manipuladas."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 9.8,
|
||||||
|
"baseSeverity": "CRITICAL"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-782"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/DriverHunter/Win-Driver-EXP/tree/main/CVE-2024-30804",
|
"url": "https://github.com/DriverHunter/Win-Driver-EXP/tree/main/CVE-2024-30804",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-31032",
|
"id": "CVE-2024-31032",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-03-29T17:15:20.993",
|
"published": "2024-03-29T17:15:20.993",
|
||||||
"lastModified": "2024-04-24T03:15:05.933",
|
"lastModified": "2024-08-22T19:35:23.210",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,42 @@
|
|||||||
"value": "Un problema en Huashi Private Cloud CDN Live Streaming Acceleration Server hgateway-sixport v.1.1.2 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s del componente manager/ipping.php."
|
"value": "Un problema en Huashi Private Cloud CDN Live Streaming Acceleration Server hgateway-sixport v.1.1.2 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s del componente manager/ipping.php."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 9.8,
|
||||||
|
"baseSeverity": "CRITICAL"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-94"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/walskt/CVE/blob/main/CVE-2024-31032/README.md",
|
"url": "https://github.com/walskt/CVE/blob/main/CVE-2024-31032/README.md",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-31041",
|
"id": "CVE-2024-31041",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-04-17T19:15:07.733",
|
"published": "2024-04-17T19:15:07.733",
|
||||||
"lastModified": "2024-04-17T20:08:21.887",
|
"lastModified": "2024-08-22T18:35:06.980",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,42 @@
|
|||||||
"value": "Vulnerabilidad de desreferencia de puntero nulo en la funci\u00f3n topic_filtern en mqtt_parser.c en NanoMQ 0.21.7 permite a atacantes provocar una denegaci\u00f3n de servicio."
|
"value": "Vulnerabilidad de desreferencia de puntero nulo en la funci\u00f3n topic_filtern en mqtt_parser.c en NanoMQ 0.21.7 permite a atacantes provocar una denegaci\u00f3n de servicio."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 7.5,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-476"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/nanomq/nanomq/issues/1723",
|
"url": "https://github.com/nanomq/nanomq/issues/1723",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-31759",
|
"id": "CVE-2024-31759",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-04-16T23:15:09.047",
|
"published": "2024-04-16T23:15:09.047",
|
||||||
"lastModified": "2024-04-17T12:48:07.510",
|
"lastModified": "2024-08-22T19:35:24.357",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,42 @@
|
|||||||
"value": "Un problema en sanluan PublicCMS v.4.0.202302.e permite a un atacante escalar privilegios mediante la funci\u00f3n de cambio de contrase\u00f1a."
|
"value": "Un problema en sanluan PublicCMS v.4.0.202302.e permite a un atacante escalar privilegios mediante la funci\u00f3n de cambio de contrase\u00f1a."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 8.8,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-284"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://1drv.ms/v/s%21AmTWEcd1YDpUjgoJ8lkA8pN8zYEJ?e=gIlbGf",
|
"url": "https://1drv.ms/v/s%21AmTWEcd1YDpUjgoJ8lkA8pN8zYEJ?e=gIlbGf",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-33103",
|
"id": "CVE-2024-33103",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-04-30T18:15:19.923",
|
"published": "2024-04-30T18:15:19.923",
|
||||||
"lastModified": "2024-08-02T03:15:23.713",
|
"lastModified": "2024-08-22T19:35:25.357",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [
|
"cveTags": [
|
||||||
{
|
{
|
||||||
@ -22,7 +22,42 @@
|
|||||||
"value": "Una vulnerabilidad de carga de archivos arbitrarios en el componente Media Manager de DokuWiki 2024-02-06a permite a los atacantes ejecutar c\u00f3digo arbitrario cargando un archivo SVG manipulado. NOTA: como se indica en la referencia del problema 4267, existe la posibilidad de que la explotabilidad solo pueda ocurrir con una mala configuraci\u00f3n del producto."
|
"value": "Una vulnerabilidad de carga de archivos arbitrarios en el componente Media Manager de DokuWiki 2024-02-06a permite a los atacantes ejecutar c\u00f3digo arbitrario cargando un archivo SVG manipulado. NOTA: como se indica en la referencia del problema 4267, existe la posibilidad de que la explotabilidad solo pueda ocurrir con una mala configuraci\u00f3n del producto."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 6.1,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 2.7
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/dokuwiki/dokuwiki/issues/4267",
|
"url": "https://github.com/dokuwiki/dokuwiki/issues/4267",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-33226",
|
"id": "CVE-2024-33226",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-05-22T16:15:10.317",
|
"published": "2024-05-22T16:15:10.317",
|
||||||
"lastModified": "2024-05-22T18:59:20.240",
|
"lastModified": "2024-08-22T19:35:26.237",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,42 @@
|
|||||||
"value": "Un problema en el componente Access64.sys de Wistron Corporation TBT Force Power Control v1.0.0.0 permite a los atacantes escalar privilegios y ejecutar c\u00f3digo arbitrario mediante el env\u00edo de solicitudes IOCTL manipuladas."
|
"value": "Un problema en el componente Access64.sys de Wistron Corporation TBT Force Power Control v1.0.0.0 permite a los atacantes escalar privilegios y ejecutar c\u00f3digo arbitrario mediante el env\u00edo de solicitudes IOCTL manipuladas."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "LOW",
|
||||||
|
"baseScore": 9.9,
|
||||||
|
"baseSeverity": "CRITICAL"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.1,
|
||||||
|
"impactScore": 6.0
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-269"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/DriverHunter/Win-Driver-EXP/tree/main/CVE-2024-33226",
|
"url": "https://github.com/DriverHunter/Win-Driver-EXP/tree/main/CVE-2024-33226",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-33655",
|
"id": "CVE-2024-33655",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-06-06T17:15:51.040",
|
"published": "2024-06-06T17:15:51.040",
|
||||||
"lastModified": "2024-06-10T18:15:34.520",
|
"lastModified": "2024-08-22T19:35:27.177",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,42 @@
|
|||||||
"value": "El protocolo DNS en RFC 1035 y sus actualizaciones permite a atacantes remotos provocar una denegaci\u00f3n de servicio (consumo de recursos) organizando que las consultas DNS se acumulen durante segundos, de modo que las respuestas se env\u00eden posteriormente en una r\u00e1faga pulsante (que puede considerarse amplificaci\u00f3n del tr\u00e1fico en algunos casos), tambi\u00e9n conocido como el problema \"DNSBomb\"."
|
"value": "El protocolo DNS en RFC 1035 y sus actualizaciones permite a atacantes remotos provocar una denegaci\u00f3n de servicio (consumo de recursos) organizando que las consultas DNS se acumulen durante segundos, de modo que las respuestas se env\u00eden posteriormente en una r\u00e1faga pulsante (que puede considerarse amplificaci\u00f3n del tr\u00e1fico en algunos casos), tambi\u00e9n conocido como el problema \"DNSBomb\"."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 7.5,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-400"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://alas.aws.amazon.com/ALAS-2024-1934.html",
|
"url": "https://alas.aws.amazon.com/ALAS-2024-1934.html",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-33799",
|
"id": "CVE-2024-33799",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-05-28T16:15:15.937",
|
"published": "2024-05-28T16:15:15.937",
|
||||||
"lastModified": "2024-05-28T17:11:47.007",
|
"lastModified": "2024-08-22T19:35:28.087",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,42 @@
|
|||||||
"value": "Una vulnerabilidad de inyecci\u00f3n SQL en /model/get_teacher.php en campcodes Complete Web-Based School Management System 1.0 permite a un atacante ejecutar comandos SQL arbitrarios a trav\u00e9s del par\u00e1metro id."
|
"value": "Una vulnerabilidad de inyecci\u00f3n SQL en /model/get_teacher.php en campcodes Complete Web-Based School Management System 1.0 permite a un atacante ejecutar comandos SQL arbitrarios a trav\u00e9s del par\u00e1metro id."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 9.8,
|
||||||
|
"baseSeverity": "CRITICAL"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-89"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Web-Based%20School%20Management%20System/Complete%20Web-Based%20School%20Management%20System%20-%20vuln%2018.pdf",
|
"url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Web-Based%20School%20Management%20System/Complete%20Web-Based%20School%20Management%20System%20-%20vuln%2018.pdf",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-34459",
|
"id": "CVE-2024-34459",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-05-14T15:39:11.917",
|
"published": "2024-05-14T15:39:11.917",
|
||||||
"lastModified": "2024-06-10T18:15:34.930",
|
"lastModified": "2024-08-22T18:35:08.623",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,42 @@
|
|||||||
"value": "Se descubri\u00f3 un problema en xmllint (de libxml2) anterior a 2.11.8 y 2.12.x anterior a 2.12.7. Formatear mensajes de error con xmllint --htmlout puede provocar una lectura excesiva del b\u00fafer en xmlHTMLPrintFileContext en xmllint.c."
|
"value": "Se descubri\u00f3 un problema en xmllint (de libxml2) anterior a 2.11.8 y 2.12.x anterior a 2.12.7. Formatear mensajes de error con xmllint --htmlout puede provocar una lectura excesiva del b\u00fafer en xmlHTMLPrintFileContext en xmllint.c."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 7.5,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-122"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://gitlab.gnome.org/GNOME/libxml2/-/issues/720",
|
"url": "https://gitlab.gnome.org/GNOME/libxml2/-/issues/720",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-34527",
|
"id": "CVE-2024-34527",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-05-06T00:15:10.207",
|
"published": "2024-05-06T00:15:10.207",
|
||||||
"lastModified": "2024-05-06T12:44:56.377",
|
"lastModified": "2024-08-22T18:35:09.990",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,42 @@
|
|||||||
"value": "space_plugin/app.py en SolidUI 0.4.0 tiene una declaraci\u00f3n de impresi\u00f3n innecesaria para una clave OpenAI. Es posible que se haya registrado la cadena impresa."
|
"value": "space_plugin/app.py en SolidUI 0.4.0 tiene una declaraci\u00f3n de impresi\u00f3n innecesaria para una clave OpenAI. Es posible que se haya registrado la cadena impresa."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 7.5,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-532"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/CloudOrc/SolidUI/blob/00d96b53bd0acf082996cef45b0f292eaba22fb7/solidui/spaces_plugin/app.py#L77",
|
"url": "https://github.com/CloudOrc/SolidUI/blob/00d96b53bd0acf082996cef45b0f292eaba22fb7/solidui/spaces_plugin/app.py#L77",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-35469",
|
"id": "CVE-2024-35469",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-05-30T18:15:09.730",
|
"published": "2024-05-30T18:15:09.730",
|
||||||
"lastModified": "2024-05-30T18:18:58.870",
|
"lastModified": "2024-08-22T19:35:28.953",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,42 @@
|
|||||||
"value": "Una vulnerabilidad de inyecci\u00f3n SQL en /hrm/user/ en SourceCodester Human Resource Management System 1.0 permite a atacantes ejecutar comandos SQL arbitrarios a trav\u00e9s del par\u00e1metro de contrase\u00f1a."
|
"value": "Una vulnerabilidad de inyecci\u00f3n SQL en /hrm/user/ en SourceCodester Human Resource Management System 1.0 permite a atacantes ejecutar comandos SQL arbitrarios a trav\u00e9s del par\u00e1metro de contrase\u00f1a."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 9.8,
|
||||||
|
"baseSeverity": "CRITICAL"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-89"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/dovankha/CVE-2024-35469",
|
"url": "https://github.com/dovankha/CVE-2024-35469",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-3566",
|
"id": "CVE-2024-3566",
|
||||||
"sourceIdentifier": "cret@cert.org",
|
"sourceIdentifier": "cret@cert.org",
|
||||||
"published": "2024-04-10T16:15:16.083",
|
"published": "2024-04-10T16:15:16.083",
|
||||||
"lastModified": "2024-04-10T19:49:51.183",
|
"lastModified": "2024-08-22T19:35:35.700",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -11,7 +11,30 @@
|
|||||||
"value": "A command inject vulnerability allows an attacker to perform command injection on Windows applications that indirectly depend on the CreateProcess function when the specific conditions are satisfied."
|
"value": "A command inject vulnerability allows an attacker to perform command injection on Windows applications that indirectly depend on the CreateProcess function when the specific conditions are satisfied."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 9.8,
|
||||||
|
"baseSeverity": "CRITICAL"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://flatt.tech/research/posts/batbadbut-you-cant-securely-execute-commands-on-windows/",
|
"url": "https://flatt.tech/research/posts/batbadbut-you-cant-securely-execute-commands-on-windows/",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-36439",
|
"id": "CVE-2024-36439",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-08-22T15:15:15.883",
|
"published": "2024-08-22T15:15:15.883",
|
||||||
"lastModified": "2024-08-22T15:15:15.883",
|
"lastModified": "2024-08-22T18:35:12.120",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Received",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -11,7 +11,42 @@
|
|||||||
"value": "Swissphone DiCal-RED 4009 devices allow a remote attacker to gain access to the administrative web interface via the device password's hash value, without knowing the actual device password."
|
"value": "Swissphone DiCal-RED 4009 devices allow a remote attacker to gain access to the administrative web interface via the device password's hash value, without knowing the actual device password."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "LOW",
|
||||||
|
"baseScore": 9.4,
|
||||||
|
"baseSeverity": "CRITICAL"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 5.5
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-269"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://www.swissphone.com/en-us/solutions/components/terminals/radio-data-module-dical-red/",
|
"url": "https://www.swissphone.com/en-us/solutions/components/terminals/radio-data-module-dical-red/",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-36441",
|
"id": "CVE-2024-36441",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-08-22T16:15:08.433",
|
"published": "2024-08-22T16:15:08.433",
|
||||||
"lastModified": "2024-08-22T16:15:08.433",
|
"lastModified": "2024-08-22T19:35:29.793",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Received",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -11,7 +11,42 @@
|
|||||||
"value": "Swissphone DiCal-RED 4009 devices allow an unauthenticated attacker use a port-2101 TCP connection to gain access to operation messages that are received by the device."
|
"value": "Swissphone DiCal-RED 4009 devices allow an unauthenticated attacker use a port-2101 TCP connection to gain access to operation messages that are received by the device."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L",
|
||||||
|
"attackVector": "PHYSICAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "LOW",
|
||||||
|
"baseScore": 5.4,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 0.7,
|
||||||
|
"impactScore": 4.7
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-284"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://www.swissphone.com/en-us/solutions/components/terminals/radio-data-module-dical-red/",
|
"url": "https://www.swissphone.com/en-us/solutions/components/terminals/radio-data-module-dical-red/",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-36443",
|
"id": "CVE-2024-36443",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-08-22T14:15:08.443",
|
"published": "2024-08-22T14:15:08.443",
|
||||||
"lastModified": "2024-08-22T14:15:08.443",
|
"lastModified": "2024-08-22T19:35:30.730",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Received",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -11,7 +11,42 @@
|
|||||||
"value": "Swissphone DiCal-RED 4009 devices allow a remote attacker to gain read access to almost the whole file system via anonymous FTP."
|
"value": "Swissphone DiCal-RED 4009 devices allow a remote attacker to gain read access to almost the whole file system via anonymous FTP."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "LOW",
|
||||||
|
"baseScore": 7.6,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 4.7
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-284"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://www.swissphone.com/en-us/solutions/components/terminals/radio-data-module-dical-red/",
|
"url": "https://www.swissphone.com/en-us/solutions/components/terminals/radio-data-module-dical-red/",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-36580",
|
"id": "CVE-2024-36580",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-06-17T14:15:10.227",
|
"published": "2024-06-17T14:15:10.227",
|
||||||
"lastModified": "2024-06-20T12:44:22.977",
|
"lastModified": "2024-08-22T19:35:31.613",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,42 @@
|
|||||||
"value": "Un problema de contaminaci\u00f3n de prototipos en cdr0 sg 1.0.10 permite a un atacante ejecutar c\u00f3digo arbitrario."
|
"value": "Un problema de contaminaci\u00f3n de prototipos en cdr0 sg 1.0.10 permite a un atacante ejecutar c\u00f3digo arbitrario."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 9.8,
|
||||||
|
"baseSeverity": "CRITICAL"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-1321"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://gist.github.com/mestrtee/a75d75eca4622ad08f7cfa903a6cc9c3",
|
"url": "https://gist.github.com/mestrtee/a75d75eca4622ad08f7cfa903a6cc9c3",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-36773",
|
"id": "CVE-2024-36773",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-06-07T15:15:50.063",
|
"published": "2024-06-07T15:15:50.063",
|
||||||
"lastModified": "2024-08-02T17:05:08.087",
|
"lastModified": "2024-08-22T19:35:32.557",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -36,6 +36,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 1.7,
|
"exploitabilityScore": 1.7,
|
||||||
"impactScore": 2.7
|
"impactScore": 2.7
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 4.8,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.7,
|
||||||
|
"impactScore": 2.7
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -49,6 +69,16 @@
|
|||||||
"value": "CWE-79"
|
"value": "CWE-79"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"configurations": [
|
"configurations": [
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-36811",
|
"id": "CVE-2024-36811",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-06-07T19:15:23.920",
|
"published": "2024-06-07T19:15:23.920",
|
||||||
"lastModified": "2024-06-07T19:24:09.243",
|
"lastModified": "2024-08-22T18:35:13.753",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,42 @@
|
|||||||
"value": "Una vulnerabilidad de carga de archivos arbitrarios en la funci\u00f3n de carga de im\u00e1genes de aimeos-core v2024.04 permite a los atacantes ejecutar c\u00f3digo arbitrario cargando un archivo PHP manipulado."
|
"value": "Una vulnerabilidad de carga de archivos arbitrarios en la funci\u00f3n de carga de im\u00e1genes de aimeos-core v2024.04 permite a los atacantes ejecutar c\u00f3digo arbitrario cargando un archivo PHP manipulado."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 8.8,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-434"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://drive.google.com/file/d/1QJWwaDB6smLCuNp10yZKWgpELTQJax31/view?usp=sharing",
|
"url": "https://drive.google.com/file/d/1QJWwaDB6smLCuNp10yZKWgpELTQJax31/view?usp=sharing",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-36843",
|
"id": "CVE-2024-36843",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-05-31T20:15:10.290",
|
"published": "2024-05-31T20:15:10.290",
|
||||||
"lastModified": "2024-07-09T19:15:11.767",
|
"lastModified": "2024-08-22T18:35:15.457",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,42 @@
|
|||||||
"value": "Se descubri\u00f3 que libmodbus v3.1.6 conten\u00eda un desbordamiento del mont\u00f3n mediante la funci\u00f3n modbus_mapping_free()."
|
"value": "Se descubri\u00f3 que libmodbus v3.1.6 conten\u00eda un desbordamiento del mont\u00f3n mediante la funci\u00f3n modbus_mapping_free()."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 7.5,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-122"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/balckgu1/libmodbusPoc/blob/main/gdb.md",
|
"url": "https://github.com/balckgu1/libmodbusPoc/blob/main/gdb.md",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-36856",
|
"id": "CVE-2024-36856",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-06-12T03:15:39.477",
|
"published": "2024-06-12T03:15:39.477",
|
||||||
"lastModified": "2024-06-13T18:36:09.013",
|
"lastModified": "2024-08-22T19:35:33.427",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Undergoing Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -15,7 +15,42 @@
|
|||||||
"value": "RMQTT Broker 0.4.0 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda del daemon) a trav\u00e9s de una determinada secuencia de cinco paquetes TCP. "
|
"value": "RMQTT Broker 0.4.0 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda del daemon) a trav\u00e9s de una determinada secuencia de cinco paquetes TCP. "
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 7.5,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-404"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://gist.github.com/pengwGit/d8410afeb0d5d11ab79f596a32178c2e",
|
"url": "https://gist.github.com/pengwGit/d8410afeb0d5d11ab79f596a32178c2e",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-37066",
|
"id": "CVE-2024-37066",
|
||||||
"sourceIdentifier": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
|
"sourceIdentifier": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
|
||||||
"published": "2024-07-19T12:15:02.320",
|
"published": "2024-07-19T12:15:02.320",
|
||||||
"lastModified": "2024-07-19T13:01:44.567",
|
"lastModified": "2024-08-22T18:22:47.927",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -17,6 +17,26 @@
|
|||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "ADJACENT_NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 8.8,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 5.9
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
|
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -40,6 +60,16 @@
|
|||||||
]
|
]
|
||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-78"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
|
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -51,14 +81,51 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"operator": "AND",
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:wyze:cam_v4_firmware:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndIncluding": "4.52.4.9887",
|
||||||
|
"matchCriteriaId": "678B080B-FFD7-4303-8812-CAAF44E3CBBC"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": false,
|
||||||
|
"criteria": "cpe:2.3:h:wyze:cam_v4:*:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "B7966E04-5847-4556-AD80-A9EF9E27E9D7"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://forums.wyze.com/t/security-advisory/289256",
|
"url": "https://forums.wyze.com/t/security-advisory/289256",
|
||||||
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c"
|
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://hiddenlayer.com/sai-security-advisory/2024-7-wyze/",
|
"url": "https://hiddenlayer.com/sai-security-advisory/2024-7-wyze/",
|
||||||
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c"
|
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-39211",
|
"id": "CVE-2024-39211",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-07-04T13:15:10.140",
|
"published": "2024-07-04T13:15:10.140",
|
||||||
"lastModified": "2024-07-05T12:55:51.367",
|
"lastModified": "2024-08-22T19:35:34.747",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,42 @@
|
|||||||
"value": "Kaiten 57.128.8 permite a atacantes remotos enumerar cuentas de usuario a trav\u00e9s de una solicitud POST manipulada, porque una respuesta de inicio de sesi\u00f3n contiene un campo user_email s\u00f3lo si la cuenta de usuario existe."
|
"value": "Kaiten 57.128.8 permite a atacantes remotos enumerar cuentas de usuario a trav\u00e9s de una solicitud POST manipulada, porque una respuesta de inicio de sesi\u00f3n contiene un campo user_email s\u00f3lo si la cuenta de usuario existe."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 5.3,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-204"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/artemy-ccrsky/CVE-2024-39211",
|
"url": "https://github.com/artemy-ccrsky/CVE-2024-39211",
|
||||||
|
56
CVE-2024/CVE-2024-397xx/CVE-2024-39717.json
Normal file
56
CVE-2024/CVE-2024-397xx/CVE-2024-39717.json
Normal file
@ -0,0 +1,56 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-39717",
|
||||||
|
"sourceIdentifier": "support@hackerone.com",
|
||||||
|
"published": "2024-08-22T19:15:09.173",
|
||||||
|
"lastModified": "2024-08-22T19:15:09.173",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "The Versa Director GUI provides an option to customize the look and feel of the user interface. This option is only available for a user logged with Provider-Data-Center-Admin or Provider-Data-Center-System-Admin. (Tenant level users do not have this privilege). The \u201cChange Favicon\u201d (Favorite Icon) option can be mis-used to upload a malicious file ending with .png extension to masquerade as image file. This is possible only after a user with Provider-Data-Center-Admin or Provider-Data-Center-System-Admin has successfully authenticated and logged in. \r\n\r\nSeverity: HIGH\r\n \r\nExploitation Status:\r\n\r\nVersa Networks is aware of one confirmed customer reported instance where this vulnerability was exploited because the Firewall guidelines which were published in 2015 & 2017 were not implemented by that customer. This non-implementation resulted in the bad actor being able to exploit this vulnerability without using the GUI. In our testing (not exhaustive, as not all numerical versions of major browsers were tested) the malicious file does not get executed on the client. There are reports of others based on backbone telemetry observations of a 3rd party provider, however these are unconfirmed to date."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV30": [
|
||||||
|
{
|
||||||
|
"source": "support@hackerone.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.0",
|
||||||
|
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "HIGH",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 6.6,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 0.7,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://support.versa-networks.com/support/solutions/articles/23000024323-release-21-2-3",
|
||||||
|
"source": "support@hackerone.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://support.versa-networks.com/support/solutions/articles/23000025680-release-22-1-2",
|
||||||
|
"source": "support@hackerone.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://support.versa-networks.com/support/solutions/articles/23000026033-release-22-1-3",
|
||||||
|
"source": "support@hackerone.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://support.versa-networks.com/support/solutions/articles/23000026724-versa-director-ha-port-exploit-discovery-remediation",
|
||||||
|
"source": "support@hackerone.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-40347",
|
"id": "CVE-2024-40347",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-07-20T04:15:03.853",
|
"published": "2024-07-20T04:15:03.853",
|
||||||
"lastModified": "2024-07-22T13:00:53.287",
|
"lastModified": "2024-08-22T18:37:49.850",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -15,11 +15,68 @@
|
|||||||
"value": " Una vulnerabilidad reflejada de Cross Site Scripting (XSS) en Hyland Alfresco Platform 23.2.1-r96 permite a los atacantes ejecutar c\u00f3digo arbitrario en el contexto del navegador de un usuario mediante la inyecci\u00f3n de un payload manipulado en el par\u00e1metro htmlid."
|
"value": " Una vulnerabilidad reflejada de Cross Site Scripting (XSS) en Hyland Alfresco Platform 23.2.1-r96 permite a los atacantes ejecutar c\u00f3digo arbitrario en el contexto del navegador de un usuario mediante la inyecci\u00f3n de un payload manipulado en el par\u00e1metro htmlid."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 6.1,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 2.7
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:hyland:alfresco_content_services:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "23.3",
|
||||||
|
"matchCriteriaId": "9F6EA814-DBA0-41E2-9729-BADAB1183C3F"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/4rdr/proofs/blob/main/info/Alfresco_Reflected_XSS_via_htmlid_parameter.md",
|
"url": "https://github.com/4rdr/proofs/blob/main/info/Alfresco_Reflected_XSS_via_htmlid_parameter.md",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-40535",
|
"id": "CVE-2024-40535",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-07-16T21:15:11.187",
|
"published": "2024-07-16T21:15:11.187",
|
||||||
"lastModified": "2024-07-17T13:34:20.520",
|
"lastModified": "2024-08-22T19:35:35.893",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,42 @@
|
|||||||
"value": "Se descubri\u00f3 que Shenzhen Libituo Technology Co., Ltd LBT-T300-T400 v3.2 conten\u00eda un desbordamiento de pila a trav\u00e9s del par\u00e1metro apn_name_3g en la funci\u00f3n config_3g_para."
|
"value": "Se descubri\u00f3 que Shenzhen Libituo Technology Co., Ltd LBT-T300-T400 v3.2 conten\u00eda un desbordamiento de pila a trav\u00e9s del par\u00e1metro apn_name_3g en la funci\u00f3n config_3g_para."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 9.8,
|
||||||
|
"baseSeverity": "CRITICAL"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-121"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/tt01bolt/vul/blob/main/LBT-T300-T400_Buffer%20overflow.md",
|
"url": "https://github.com/tt01bolt/vul/blob/main/LBT-T300-T400_Buffer%20overflow.md",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-41599",
|
"id": "CVE-2024-41599",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-07-19T20:15:09.063",
|
"published": "2024-07-19T20:15:09.063",
|
||||||
"lastModified": "2024-07-22T13:00:53.287",
|
"lastModified": "2024-08-22T18:27:45.397",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -15,11 +15,68 @@
|
|||||||
"value": " Vulnerabilidad de Cross Site Scripting en RuoYi v.4.7.9 y anteriores permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s del m\u00e9todo de carga de archivos"
|
"value": " Vulnerabilidad de Cross Site Scripting en RuoYi v.4.7.9 y anteriores permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s del m\u00e9todo de carga de archivos"
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 6.1,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 2.7
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:ruoyi:ruoyi:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndIncluding": "4.7.9",
|
||||||
|
"matchCriteriaId": "23C8B479-ECDA-4F19-8547-4129C63F3E0E"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/topsky979/Security-Collections/tree/main/CVE-2024-41599",
|
"url": "https://github.com/topsky979/Security-Collections/tree/main/CVE-2024-41599",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-41600",
|
"id": "CVE-2024-41600",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-07-19T18:15:05.727",
|
"published": "2024-07-19T18:15:05.727",
|
||||||
"lastModified": "2024-07-22T13:00:53.287",
|
"lastModified": "2024-08-22T18:27:15.310",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -15,11 +15,67 @@
|
|||||||
"value": " Vulnerabilidad de permisos inseguros en lin-CMS Springboot v.0.2.1 y anteriores permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s del m\u00e9todo de inicio de sesi\u00f3n en el componente UserController.java."
|
"value": " Vulnerabilidad de permisos inseguros en lin-CMS Springboot v.0.2.1 y anteriores permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s del m\u00e9todo de inicio de sesi\u00f3n en el componente UserController.java."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 7.5,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "NVD-CWE-noinfo"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:talelin:lin-cms-spring-boot:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndIncluding": "0.2.1",
|
||||||
|
"matchCriteriaId": "81E70529-20EB-4A70-BFC1-B7F495BEA48D"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/topsky979/Security-Collections/tree/main/CVE-2024-41600",
|
"url": "https://github.com/topsky979/Security-Collections/tree/main/CVE-2024-41600",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-42598",
|
"id": "CVE-2024-42598",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-08-20T16:15:11.727",
|
"published": "2024-08-20T16:15:11.727",
|
||||||
"lastModified": "2024-08-22T16:35:06.180",
|
"lastModified": "2024-08-22T18:15:10.187",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -52,6 +52,10 @@
|
|||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://gitee.com/fushuling/cve/blob/master/CVE-2024-42598.md",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://gitee.com/fushuling/cve/blob/master/SeaCMS%20V13%20admin_editplayer.php%20code%20injection.md",
|
"url": "https://gitee.com/fushuling/cve/blob/master/SeaCMS%20V13%20admin_editplayer.php%20code%20injection.md",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org"
|
||||||
|
60
CVE-2024/CVE-2024-427xx/CVE-2024-42767.json
Normal file
60
CVE-2024/CVE-2024-427xx/CVE-2024-42767.json
Normal file
@ -0,0 +1,60 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-42767",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2024-08-22T18:15:10.280",
|
||||||
|
"lastModified": "2024-08-22T19:35:36.800",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Kashipara Hotel Management System v1.0 is vulnerable to Unrestricted File Upload RCE via /admin/add_room_controller.php."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 7.2,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.2,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-434"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://cwe.mitre.org/data/definitions/434.html",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Hotel%20Management%20System%20v1.0/Unrestricted%20File%20Upload.pdf",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-42768",
|
"id": "CVE-2024-42768",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-08-22T17:15:05.693",
|
"published": "2024-08-22T17:15:05.693",
|
||||||
"lastModified": "2024-08-22T17:15:05.693",
|
"lastModified": "2024-08-22T18:35:16.727",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Received",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -11,7 +11,42 @@
|
|||||||
"value": "A Cross-Site Request Forgery (CSRF) vulnerability was found in Kashipara Hotel Management System v1.0 via /admin/delete_room.php."
|
"value": "A Cross-Site Request Forgery (CSRF) vulnerability was found in Kashipara Hotel Management System v1.0 via /admin/delete_room.php."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 6.8,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.1,
|
||||||
|
"impactScore": 4.7
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-352"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://cwe.mitre.org/data/definitions/352.html",
|
"url": "https://cwe.mitre.org/data/definitions/352.html",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-42769",
|
"id": "CVE-2024-42769",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-08-22T16:15:09.553",
|
"published": "2024-08-22T16:15:09.553",
|
||||||
"lastModified": "2024-08-22T16:15:09.553",
|
"lastModified": "2024-08-22T19:35:37.830",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Received",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -11,7 +11,42 @@
|
|||||||
"value": "A Reflected Cross Site Scripting (XSS) vulnerability was found in \"/core/signup_user.php \" of Kashipara Hotel Management System v1.0, which allows remote attackers to execute arbitrary code via \"user_fname\" and \"user_lname\" parameters."
|
"value": "A Reflected Cross Site Scripting (XSS) vulnerability was found in \"/core/signup_user.php \" of Kashipara Hotel Management System v1.0, which allows remote attackers to execute arbitrary code via \"user_fname\" and \"user_lname\" parameters."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 6.1,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 2.7
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Hotel%20Management%20System%20v1.0/Reflected%20XSS%20-%20Sign%20UP.pdf",
|
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Hotel%20Management%20System%20v1.0/Reflected%20XSS%20-%20Sign%20UP.pdf",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-42772",
|
"id": "CVE-2024-42772",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-08-22T17:15:06.070",
|
"published": "2024-08-22T17:15:06.070",
|
||||||
"lastModified": "2024-08-22T17:15:06.070",
|
"lastModified": "2024-08-22T19:35:38.793",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Received",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -11,7 +11,42 @@
|
|||||||
"value": "An Incorrect Access Control vulnerability was found in /admin/rooms.php in Kashipara Hotel Management System v1.0, which allows an unauthenticated attacker to view valid hotel room entries in administrator section."
|
"value": "An Incorrect Access Control vulnerability was found in /admin/rooms.php in Kashipara Hotel Management System v1.0, which allows an unauthenticated attacker to view valid hotel room entries in administrator section."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 7.5,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-284"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Hotel%20Management%20System%20v1.0/Broken%20Access%20Control%20-%20View%20Room%20Entry.pdf",
|
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Hotel%20Management%20System%20v1.0/Broken%20Access%20Control%20-%20View%20Room%20Entry.pdf",
|
||||||
|
25
CVE-2024/CVE-2024-427xx/CVE-2024-42773.json
Normal file
25
CVE-2024/CVE-2024-427xx/CVE-2024-42773.json
Normal file
@ -0,0 +1,25 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-42773",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2024-08-22T18:15:10.367",
|
||||||
|
"lastModified": "2024-08-22T18:15:10.367",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "An Incorrect Access Control vulnerability was found in /admin/edit_room_controller.php in Kashipara Hotel Management System v1.0, which allows an unauthenticated attacker to edit the valid hotel room entries in the administrator section."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Hotel%20Management%20System%20v1.0/Broken%20Access%20Control%20-%20Edit%20Room%20Entry.pdf",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.kashipara.com/",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-42780",
|
"id": "CVE-2024-42780",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-08-21T18:15:10.150",
|
"published": "2024-08-21T18:15:10.150",
|
||||||
"lastModified": "2024-08-22T12:48:02.790",
|
"lastModified": "2024-08-22T19:35:39.710",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Undergoing Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -15,7 +15,42 @@
|
|||||||
"value": "Se encontr\u00f3 una vulnerabilidad de carga de archivos sin restricciones en \"/music/ajax.php?action=save_genre\" en Kashipara Music Management System v1.0. Esto permite a los atacantes ejecutar c\u00f3digo arbitrario cargando un archivo PHP manipulado."
|
"value": "Se encontr\u00f3 una vulnerabilidad de carga de archivos sin restricciones en \"/music/ajax.php?action=save_genre\" en Kashipara Music Management System v1.0. Esto permite a los atacantes ejecutar c\u00f3digo arbitrario cargando un archivo PHP manipulado."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "ADJACENT_NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 8.8,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-434"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Music%20Management%20System%20v1.0/Unrestricted%20File%20Upload%20-%20Add%20New%20Genre.pdf",
|
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Music%20Management%20System%20v1.0/Unrestricted%20File%20Upload%20-%20Add%20New%20Genre.pdf",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-43853",
|
"id": "CVE-2024-43853",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2024-08-17T10:15:10.383",
|
"published": "2024-08-17T10:15:10.383",
|
||||||
"lastModified": "2024-08-19T12:59:59.177",
|
"lastModified": "2024-08-22T18:06:38.087",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -15,23 +15,103 @@
|
|||||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: cgroup/cpuset: Prevenir UAF en proc_cpuset_show() Puede ocurrir un UAF cuando se lee /proc/cpuset como se informa en [1]. Esto se puede reproducir mediante los siguientes m\u00e9todos: 1.Agregue un mdelay(1000) antes de adquirir cgroup_lock en la funci\u00f3n cgroup_path_ns. 2.$cat /proc//cpuset repetidamente. 3.$mount -t cgroup -o cpuset cpuset /sys/fs/cgroup/cpuset/ $umount /sys/fs/cgroup/cpuset/ repetidamente. La ejecuci\u00f3n que causa este error se puede mostrar a continuaci\u00f3n: (umount) | (cat /proc//cpuset) css_release | proc_cpuset_show css_release_work_fn | css = task_get_css(tsk, cpuset_cgrp_id); css_free_rwork_fn | cgroup_path_ns(css->cgroup, ...); cgroup_destroy_root | mutex_lock(&cgroup_mutex); rebind_subsistemas | cgroup_free_root | | // cgrp fue liberado, UAF | cgroup_path_ns_locked(cgrp,..); Cuando se inicializa cpuset, el nodo ra\u00edz top_cpuset.css.cgrp apuntar\u00e1 a &cgrp_dfl_root.cgrp. En cgroup v1, la operaci\u00f3n de montaje asignar\u00e1 cgroup_root y top_cpuset.css.cgrp apuntar\u00e1 al &cgroup_root.cgrp asignado. Cuando se ejecuta la operaci\u00f3n desmontaje, top_cpuset.css.cgrp se rebotar\u00e1 en &cgrp_dfl_root.cgrp. El problema es que al volver a vincular a cgrp_dfl_root, hay casos en los que el cgroup_root asignado al configurar la ra\u00edz para cgroup v1 se almacena en cach\u00e9. Esto podr\u00eda dar lugar a un use-after-free (UAF) si se libera posteriormente. Los cgroups descendientes de cgroup v1 solo se pueden liberar despu\u00e9s de que se publique el CSS. Sin embargo, el CSS de la ra\u00edz nunca se liberar\u00e1, pero cgroup_root debe liberarse cuando se desmonta. Esto significa que obtener una referencia al CSS de la ra\u00edz no garantiza que css.cgrp->root no se libere. Solucione este problema usando rcu_read_lock en proc_cpuset_show(). Como cgroup_root es kfree_rcu despu\u00e9s del commit d23b5c577715 (\"cgroup: hacer que las operaciones en la RCU cgroup root_list sean seguras\"), css->cgroup no se liberar\u00e1 durante la secci\u00f3n cr\u00edtica. Para llamar a cgroup_path_ns_locked, se necesita css_set_lock, por lo que es seguro reemplazar task_get_css con task_css. [1] https://syzkaller.appspot.com/bug?extid=9b1ff7be974a403aa4cd"
|
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: cgroup/cpuset: Prevenir UAF en proc_cpuset_show() Puede ocurrir un UAF cuando se lee /proc/cpuset como se informa en [1]. Esto se puede reproducir mediante los siguientes m\u00e9todos: 1.Agregue un mdelay(1000) antes de adquirir cgroup_lock en la funci\u00f3n cgroup_path_ns. 2.$cat /proc//cpuset repetidamente. 3.$mount -t cgroup -o cpuset cpuset /sys/fs/cgroup/cpuset/ $umount /sys/fs/cgroup/cpuset/ repetidamente. La ejecuci\u00f3n que causa este error se puede mostrar a continuaci\u00f3n: (umount) | (cat /proc//cpuset) css_release | proc_cpuset_show css_release_work_fn | css = task_get_css(tsk, cpuset_cgrp_id); css_free_rwork_fn | cgroup_path_ns(css->cgroup, ...); cgroup_destroy_root | mutex_lock(&cgroup_mutex); rebind_subsistemas | cgroup_free_root | | // cgrp fue liberado, UAF | cgroup_path_ns_locked(cgrp,..); Cuando se inicializa cpuset, el nodo ra\u00edz top_cpuset.css.cgrp apuntar\u00e1 a &cgrp_dfl_root.cgrp. En cgroup v1, la operaci\u00f3n de montaje asignar\u00e1 cgroup_root y top_cpuset.css.cgrp apuntar\u00e1 al &cgroup_root.cgrp asignado. Cuando se ejecuta la operaci\u00f3n desmontaje, top_cpuset.css.cgrp se rebotar\u00e1 en &cgrp_dfl_root.cgrp. El problema es que al volver a vincular a cgrp_dfl_root, hay casos en los que el cgroup_root asignado al configurar la ra\u00edz para cgroup v1 se almacena en cach\u00e9. Esto podr\u00eda dar lugar a un use-after-free (UAF) si se libera posteriormente. Los cgroups descendientes de cgroup v1 solo se pueden liberar despu\u00e9s de que se publique el CSS. Sin embargo, el CSS de la ra\u00edz nunca se liberar\u00e1, pero cgroup_root debe liberarse cuando se desmonta. Esto significa que obtener una referencia al CSS de la ra\u00edz no garantiza que css.cgrp->root no se libere. Solucione este problema usando rcu_read_lock en proc_cpuset_show(). Como cgroup_root es kfree_rcu despu\u00e9s del commit d23b5c577715 (\"cgroup: hacer que las operaciones en la RCU cgroup root_list sean seguras\"), css->cgroup no se liberar\u00e1 durante la secci\u00f3n cr\u00edtica. Para llamar a cgroup_path_ns_locked, se necesita css_set_lock, por lo que es seguro reemplazar task_get_css con task_css. [1] https://syzkaller.appspot.com/bug?extid=9b1ff7be974a403aa4cd"
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 5.5,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-416"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "4.6",
|
||||||
|
"versionEndExcluding": "6.1.103",
|
||||||
|
"matchCriteriaId": "B8828E57-70E4-428D-BC12-F89414C8715F"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.2",
|
||||||
|
"versionEndExcluding": "6.6.44",
|
||||||
|
"matchCriteriaId": "CC912330-6B41-4C6B-99AF-F3857FBACB6A"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.7",
|
||||||
|
"versionEndExcluding": "6.10.3",
|
||||||
|
"matchCriteriaId": "92D388F2-1EAF-4CFA-AC06-5B26D762EA7D"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/1be59c97c83ccd67a519d8a49486b3a8a73ca28a",
|
"url": "https://git.kernel.org/stable/c/1be59c97c83ccd67a519d8a49486b3a8a73ca28a",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/29a8d4e02fd4840028c38ceb1536cc8f82a257d4",
|
"url": "https://git.kernel.org/stable/c/29a8d4e02fd4840028c38ceb1536cc8f82a257d4",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/29ac1d238b3bf126af36037df80d7ecc4822341e",
|
"url": "https://git.kernel.org/stable/c/29ac1d238b3bf126af36037df80d7ecc4822341e",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/96226fbed566f3f686f53a489a29846f2d538080",
|
"url": "https://git.kernel.org/stable/c/96226fbed566f3f686f53a489a29846f2d538080",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-43854",
|
"id": "CVE-2024-43854",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2024-08-17T10:15:10.447",
|
"published": "2024-08-17T10:15:10.447",
|
||||||
"lastModified": "2024-08-19T12:59:59.177",
|
"lastModified": "2024-08-22T18:12:28.620",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -15,27 +15,117 @@
|
|||||||
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: bloque: inicializa el b\u00fafer de integridad a cero antes de escribirlo en el medio. Los metadatos agregados por bio_integrity_prep utilizan kmalloc simple, lo que lleva a que la memoria del kernel se escriba en el medio de forma aleatoria. Para los metadatos de PI, esto se limita a la etiqueta de la aplicaci\u00f3n que no es utilizada por los metadatos generados por el kernel, pero para los metadatos que no son de PI, todo el b\u00fafer pierde memoria del kernel. Solucione este problema agregando el indicador __GFP_ZERO a las asignaciones para escrituras."
|
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: bloque: inicializa el b\u00fafer de integridad a cero antes de escribirlo en el medio. Los metadatos agregados por bio_integrity_prep utilizan kmalloc simple, lo que lleva a que la memoria del kernel se escriba en el medio de forma aleatoria. Para los metadatos de PI, esto se limita a la etiqueta de la aplicaci\u00f3n que no es utilizada por los metadatos generados por el kernel, pero para los metadatos que no son de PI, todo el b\u00fafer pierde memoria del kernel. Solucione este problema agregando el indicador __GFP_ZERO a las asignaciones para escrituras."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 5.5,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-401"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "2.6.27",
|
||||||
|
"versionEndExcluding": "5.15.165",
|
||||||
|
"matchCriteriaId": "281A9189-26A2-46A1-ABED-BB34ABC26FDD"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "5.16",
|
||||||
|
"versionEndExcluding": "6.1.103",
|
||||||
|
"matchCriteriaId": "E45EAC72-8329-4F99-8276-86AF9BB3496A"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.2",
|
||||||
|
"versionEndExcluding": "6.6.44",
|
||||||
|
"matchCriteriaId": "CC912330-6B41-4C6B-99AF-F3857FBACB6A"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.7",
|
||||||
|
"versionEndExcluding": "6.10.3",
|
||||||
|
"matchCriteriaId": "92D388F2-1EAF-4CFA-AC06-5B26D762EA7D"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/23a19655fb56f241e592041156dfb1c6d04da644",
|
"url": "https://git.kernel.org/stable/c/23a19655fb56f241e592041156dfb1c6d04da644",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/899ee2c3829c5ac14bfc7d3c4a5846c0b709b78f",
|
"url": "https://git.kernel.org/stable/c/899ee2c3829c5ac14bfc7d3c4a5846c0b709b78f",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/cf6b45ea7a8df0f61bded1dc4a8561ac6ad143d2",
|
"url": "https://git.kernel.org/stable/c/cf6b45ea7a8df0f61bded1dc4a8561ac6ad143d2",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/d418313bd8f55c079a7da12651951b489a638ac1",
|
"url": "https://git.kernel.org/stable/c/d418313bd8f55c079a7da12651951b489a638ac1",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/ebc0e91ba76dc6544fff9f5b66408b1982806a00",
|
"url": "https://git.kernel.org/stable/c/ebc0e91ba76dc6544fff9f5b66408b1982806a00",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-45192",
|
"id": "CVE-2024-45192",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-08-22T16:15:10.237",
|
"published": "2024-08-22T16:15:10.237",
|
||||||
"lastModified": "2024-08-22T16:15:10.237",
|
"lastModified": "2024-08-22T19:35:40.953",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Received",
|
||||||
"cveTags": [
|
"cveTags": [
|
||||||
{
|
{
|
||||||
@ -18,7 +18,42 @@
|
|||||||
"value": "An issue was discovered in Matrix libolm (aka Olm) through 3.2.16. Cache-timing attacks can occur due to use of base64 when decoding group session keys. NOTE: This vulnerability only affects products that are no longer supported by the maintainer."
|
"value": "An issue was discovered in Matrix libolm (aka Olm) through 3.2.16. Cache-timing attacks can occur due to use of base64 when decoding group session keys. NOTE: This vulnerability only affects products that are no longer supported by the maintainer."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 7.5,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-385"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://gitlab.matrix.org/matrix-org/olm/",
|
"url": "https://gitlab.matrix.org/matrix-org/olm/",
|
||||||
|
100
CVE-2024/CVE-2024-76xx/CVE-2024-7634.json
Normal file
100
CVE-2024/CVE-2024-76xx/CVE-2024-7634.json
Normal file
@ -0,0 +1,100 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-7634",
|
||||||
|
"sourceIdentifier": "f5sirt@f5.com",
|
||||||
|
"published": "2024-08-22T18:15:10.553",
|
||||||
|
"lastModified": "2024-08-22T18:15:10.553",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "NGINX Agent's \"config_dirs\" restriction feature allows a highly privileged attacker to gain the ability to write/overwrite files outside of the designated secure directory."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV40": [
|
||||||
|
{
|
||||||
|
"source": "f5sirt@f5.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "4.0",
|
||||||
|
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"attackRequirements": "NONE",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"vulnerableSystemConfidentiality": "NONE",
|
||||||
|
"vulnerableSystemIntegrity": "HIGH",
|
||||||
|
"vulnerableSystemAvailability": "NONE",
|
||||||
|
"subsequentSystemConfidentiality": "NONE",
|
||||||
|
"subsequentSystemIntegrity": "NONE",
|
||||||
|
"subsequentSystemAvailability": "NONE",
|
||||||
|
"exploitMaturity": "NOT_DEFINED",
|
||||||
|
"confidentialityRequirements": "NOT_DEFINED",
|
||||||
|
"integrityRequirements": "NOT_DEFINED",
|
||||||
|
"availabilityRequirements": "NOT_DEFINED",
|
||||||
|
"modifiedAttackVector": "NOT_DEFINED",
|
||||||
|
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||||
|
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||||
|
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||||
|
"modifiedUserInteraction": "NOT_DEFINED",
|
||||||
|
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||||
|
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||||
|
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||||
|
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||||
|
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||||
|
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||||
|
"safety": "NOT_DEFINED",
|
||||||
|
"automatable": "NOT_DEFINED",
|
||||||
|
"recovery": "NOT_DEFINED",
|
||||||
|
"valueDensity": "NOT_DEFINED",
|
||||||
|
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||||
|
"providerUrgency": "NOT_DEFINED",
|
||||||
|
"baseScore": 6.9,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "f5sirt@f5.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 4.9,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.2,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "f5sirt@f5.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-22"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://my.f5.com/manage/s/article/K000140630",
|
||||||
|
"source": "f5sirt@f5.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
120
CVE-2024/CVE-2024-80xx/CVE-2024-8088.json
Normal file
120
CVE-2024/CVE-2024-80xx/CVE-2024-8088.json
Normal file
@ -0,0 +1,120 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-8088",
|
||||||
|
"sourceIdentifier": "cna@python.org",
|
||||||
|
"published": "2024-08-22T19:15:09.720",
|
||||||
|
"lastModified": "2024-08-22T19:15:09.720",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "There is a HIGH severity vulnerability affecting the CPython \"zipfile\"\nmodule.\n\n\n\n\n\nWhen iterating over names of entries in a zip archive (for example, methods\nof \"zipfile.ZipFile\" like \"namelist()\", \"iterdir()\", \"extractall()\", etc)\nthe process can be put into an infinite loop with a maliciously crafted\nzip archive. This defect applies when reading only metadata or extracting\nthe contents of the zip archive. Programs that are not handling\nuser-controlled zip archives are not affected."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV40": [
|
||||||
|
{
|
||||||
|
"source": "cna@python.org",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "4.0",
|
||||||
|
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:N/R:U/V:X/RE:L/U:X",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"attackRequirements": "NONE",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"vulnerableSystemConfidentiality": "NONE",
|
||||||
|
"vulnerableSystemIntegrity": "NONE",
|
||||||
|
"vulnerableSystemAvailability": "HIGH",
|
||||||
|
"subsequentSystemConfidentiality": "NONE",
|
||||||
|
"subsequentSystemIntegrity": "NONE",
|
||||||
|
"subsequentSystemAvailability": "NONE",
|
||||||
|
"exploitMaturity": "NOT_DEFINED",
|
||||||
|
"confidentialityRequirements": "NOT_DEFINED",
|
||||||
|
"integrityRequirements": "NOT_DEFINED",
|
||||||
|
"availabilityRequirements": "NOT_DEFINED",
|
||||||
|
"modifiedAttackVector": "NOT_DEFINED",
|
||||||
|
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||||
|
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||||
|
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||||
|
"modifiedUserInteraction": "NOT_DEFINED",
|
||||||
|
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||||
|
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||||
|
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||||
|
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||||
|
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||||
|
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||||
|
"safety": "NEGLIGIBLE",
|
||||||
|
"automatable": "NO",
|
||||||
|
"recovery": "USER",
|
||||||
|
"valueDensity": "NOT_DEFINED",
|
||||||
|
"vulnerabilityResponseEffort": "LOW",
|
||||||
|
"providerUrgency": "NOT_DEFINED",
|
||||||
|
"baseScore": 8.7,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "cna@python.org",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 7.5,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "cna@python.org",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-835"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/python/cpython/commit/795f2597a4be988e2bb19b69ff9958e981cb894e",
|
||||||
|
"source": "cna@python.org"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/python/cpython/commit/8c7348939d8a3ecd79d630075f6be1b0c5b41f64",
|
||||||
|
"source": "cna@python.org"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/python/cpython/commit/dcc5182f27c1500006a1ef78e10613bb45788dea",
|
||||||
|
"source": "cna@python.org"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/python/cpython/issues/122905",
|
||||||
|
"source": "cna@python.org"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/python/cpython/pull/122906",
|
||||||
|
"source": "cna@python.org"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://mail.python.org/archives/list/security-announce@python.org/thread/GNFCKVI4TCATKQLALJ5SN4L4CSPSMILU/",
|
||||||
|
"source": "cna@python.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
86
README.md
86
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
|||||||
### Last Repository Update
|
### Last Repository Update
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
2024-08-22T18:00:17.400296+00:00
|
2024-08-22T20:00:18.271897+00:00
|
||||||
```
|
```
|
||||||
|
|
||||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
2024-08-22T17:57:08.640000+00:00
|
2024-08-22T19:35:40.953000+00:00
|
||||||
```
|
```
|
||||||
|
|
||||||
### Last Data Feed Release
|
### Last Data Feed Release
|
||||||
@ -33,65 +33,49 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
|||||||
### Total Number of included CVEs
|
### Total Number of included CVEs
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
260964
|
260969
|
||||||
```
|
```
|
||||||
|
|
||||||
### CVEs added in the last Commit
|
### CVEs added in the last Commit
|
||||||
|
|
||||||
Recently added CVEs: `21`
|
Recently added CVEs: `5`
|
||||||
|
|
||||||
- [CVE-2023-6452](CVE-2023/CVE-2023-64xx/CVE-2023-6452.json) (`2024-08-22T16:15:07.997`)
|
- [CVE-2024-39717](CVE-2024/CVE-2024-397xx/CVE-2024-39717.json) (`2024-08-22T19:15:09.173`)
|
||||||
- [CVE-2024-3127](CVE-2024/CVE-2024-31xx/CVE-2024-3127.json) (`2024-08-22T16:15:08.590`)
|
- [CVE-2024-42767](CVE-2024/CVE-2024-427xx/CVE-2024-42767.json) (`2024-08-22T18:15:10.280`)
|
||||||
- [CVE-2024-36441](CVE-2024/CVE-2024-364xx/CVE-2024-36441.json) (`2024-08-22T16:15:08.433`)
|
- [CVE-2024-42773](CVE-2024/CVE-2024-427xx/CVE-2024-42773.json) (`2024-08-22T18:15:10.367`)
|
||||||
- [CVE-2024-40884](CVE-2024/CVE-2024-408xx/CVE-2024-40884.json) (`2024-08-22T16:15:08.797`)
|
- [CVE-2024-7634](CVE-2024/CVE-2024-76xx/CVE-2024-7634.json) (`2024-08-22T18:15:10.553`)
|
||||||
- [CVE-2024-42490](CVE-2024/CVE-2024-424xx/CVE-2024-42490.json) (`2024-08-22T16:15:09.117`)
|
- [CVE-2024-8088](CVE-2024/CVE-2024-80xx/CVE-2024-8088.json) (`2024-08-22T19:15:09.720`)
|
||||||
- [CVE-2024-42497](CVE-2024/CVE-2024-424xx/CVE-2024-42497.json) (`2024-08-22T16:15:09.330`)
|
|
||||||
- [CVE-2024-42768](CVE-2024/CVE-2024-427xx/CVE-2024-42768.json) (`2024-08-22T17:15:05.693`)
|
|
||||||
- [CVE-2024-42769](CVE-2024/CVE-2024-427xx/CVE-2024-42769.json) (`2024-08-22T16:15:09.553`)
|
|
||||||
- [CVE-2024-42770](CVE-2024/CVE-2024-427xx/CVE-2024-42770.json) (`2024-08-22T16:15:09.640`)
|
|
||||||
- [CVE-2024-42771](CVE-2024/CVE-2024-427xx/CVE-2024-42771.json) (`2024-08-22T16:15:09.730`)
|
|
||||||
- [CVE-2024-42772](CVE-2024/CVE-2024-427xx/CVE-2024-42772.json) (`2024-08-22T17:15:06.070`)
|
|
||||||
- [CVE-2024-42774](CVE-2024/CVE-2024-427xx/CVE-2024-42774.json) (`2024-08-22T17:15:06.350`)
|
|
||||||
- [CVE-2024-42775](CVE-2024/CVE-2024-427xx/CVE-2024-42775.json) (`2024-08-22T17:15:06.580`)
|
|
||||||
- [CVE-2024-42776](CVE-2024/CVE-2024-427xx/CVE-2024-42776.json) (`2024-08-22T17:15:06.807`)
|
|
||||||
- [CVE-2024-43780](CVE-2024/CVE-2024-437xx/CVE-2024-43780.json) (`2024-08-22T16:15:09.897`)
|
|
||||||
- [CVE-2024-45191](CVE-2024/CVE-2024-451xx/CVE-2024-45191.json) (`2024-08-22T16:15:10.120`)
|
|
||||||
- [CVE-2024-45192](CVE-2024/CVE-2024-451xx/CVE-2024-45192.json) (`2024-08-22T16:15:10.237`)
|
|
||||||
- [CVE-2024-45193](CVE-2024/CVE-2024-451xx/CVE-2024-45193.json) (`2024-08-22T16:15:10.300`)
|
|
||||||
- [CVE-2024-6502](CVE-2024/CVE-2024-65xx/CVE-2024-6502.json) (`2024-08-22T16:15:10.377`)
|
|
||||||
- [CVE-2024-7110](CVE-2024/CVE-2024-71xx/CVE-2024-7110.json) (`2024-08-22T16:15:10.627`)
|
|
||||||
- [CVE-2024-8041](CVE-2024/CVE-2024-80xx/CVE-2024-8041.json) (`2024-08-22T16:15:10.880`)
|
|
||||||
|
|
||||||
|
|
||||||
### CVEs modified in the last Commit
|
### CVEs modified in the last Commit
|
||||||
|
|
||||||
Recently modified CVEs: `45`
|
Recently modified CVEs: `65`
|
||||||
|
|
||||||
- [CVE-2024-42778](CVE-2024/CVE-2024-427xx/CVE-2024-42778.json) (`2024-08-22T17:46:56.953`)
|
- [CVE-2024-34527](CVE-2024/CVE-2024-345xx/CVE-2024-34527.json) (`2024-08-22T18:35:09.990`)
|
||||||
- [CVE-2024-42783](CVE-2024/CVE-2024-427xx/CVE-2024-42783.json) (`2024-08-22T17:35:07.750`)
|
- [CVE-2024-35469](CVE-2024/CVE-2024-354xx/CVE-2024-35469.json) (`2024-08-22T19:35:28.953`)
|
||||||
- [CVE-2024-43033](CVE-2024/CVE-2024-430xx/CVE-2024-43033.json) (`2024-08-22T16:35:08.663`)
|
- [CVE-2024-3566](CVE-2024/CVE-2024-35xx/CVE-2024-3566.json) (`2024-08-22T19:35:35.700`)
|
||||||
- [CVE-2024-43855](CVE-2024/CVE-2024-438xx/CVE-2024-43855.json) (`2024-08-22T17:48:09.100`)
|
- [CVE-2024-36439](CVE-2024/CVE-2024-364xx/CVE-2024-36439.json) (`2024-08-22T18:35:12.120`)
|
||||||
- [CVE-2024-43856](CVE-2024/CVE-2024-438xx/CVE-2024-43856.json) (`2024-08-22T17:57:08.640`)
|
- [CVE-2024-36441](CVE-2024/CVE-2024-364xx/CVE-2024-36441.json) (`2024-08-22T19:35:29.793`)
|
||||||
- [CVE-2024-43857](CVE-2024/CVE-2024-438xx/CVE-2024-43857.json) (`2024-08-22T17:38:21.003`)
|
- [CVE-2024-36443](CVE-2024/CVE-2024-364xx/CVE-2024-36443.json) (`2024-08-22T19:35:30.730`)
|
||||||
- [CVE-2024-43858](CVE-2024/CVE-2024-438xx/CVE-2024-43858.json) (`2024-08-22T17:40:11.663`)
|
- [CVE-2024-36580](CVE-2024/CVE-2024-365xx/CVE-2024-36580.json) (`2024-08-22T19:35:31.613`)
|
||||||
- [CVE-2024-43859](CVE-2024/CVE-2024-438xx/CVE-2024-43859.json) (`2024-08-22T17:28:28.490`)
|
- [CVE-2024-36773](CVE-2024/CVE-2024-367xx/CVE-2024-36773.json) (`2024-08-22T19:35:32.557`)
|
||||||
- [CVE-2024-43860](CVE-2024/CVE-2024-438xx/CVE-2024-43860.json) (`2024-08-22T17:08:15.097`)
|
- [CVE-2024-36811](CVE-2024/CVE-2024-368xx/CVE-2024-36811.json) (`2024-08-22T18:35:13.753`)
|
||||||
- [CVE-2024-5554](CVE-2024/CVE-2024-55xx/CVE-2024-5554.json) (`2024-08-22T16:43:52.650`)
|
- [CVE-2024-36843](CVE-2024/CVE-2024-368xx/CVE-2024-36843.json) (`2024-08-22T18:35:15.457`)
|
||||||
- [CVE-2024-5555](CVE-2024/CVE-2024-55xx/CVE-2024-5555.json) (`2024-08-22T16:46:14.177`)
|
- [CVE-2024-36856](CVE-2024/CVE-2024-368xx/CVE-2024-36856.json) (`2024-08-22T19:35:33.427`)
|
||||||
- [CVE-2024-6164](CVE-2024/CVE-2024-61xx/CVE-2024-6164.json) (`2024-08-22T16:35:18.693`)
|
- [CVE-2024-37066](CVE-2024/CVE-2024-370xx/CVE-2024-37066.json) (`2024-08-22T18:22:47.927`)
|
||||||
- [CVE-2024-7964](CVE-2024/CVE-2024-79xx/CVE-2024-7964.json) (`2024-08-22T17:44:47.560`)
|
- [CVE-2024-39211](CVE-2024/CVE-2024-392xx/CVE-2024-39211.json) (`2024-08-22T19:35:34.747`)
|
||||||
- [CVE-2024-7966](CVE-2024/CVE-2024-79xx/CVE-2024-7966.json) (`2024-08-22T17:44:11.147`)
|
- [CVE-2024-40347](CVE-2024/CVE-2024-403xx/CVE-2024-40347.json) (`2024-08-22T18:37:49.850`)
|
||||||
- [CVE-2024-7968](CVE-2024/CVE-2024-79xx/CVE-2024-7968.json) (`2024-08-22T17:41:56.847`)
|
- [CVE-2024-40535](CVE-2024/CVE-2024-405xx/CVE-2024-40535.json) (`2024-08-22T19:35:35.893`)
|
||||||
- [CVE-2024-7969](CVE-2024/CVE-2024-79xx/CVE-2024-7969.json) (`2024-08-22T17:42:47.627`)
|
- [CVE-2024-41599](CVE-2024/CVE-2024-415xx/CVE-2024-41599.json) (`2024-08-22T18:27:45.397`)
|
||||||
- [CVE-2024-7974](CVE-2024/CVE-2024-79xx/CVE-2024-7974.json) (`2024-08-22T17:40:27.950`)
|
- [CVE-2024-41600](CVE-2024/CVE-2024-416xx/CVE-2024-41600.json) (`2024-08-22T18:27:15.310`)
|
||||||
- [CVE-2024-7975](CVE-2024/CVE-2024-79xx/CVE-2024-7975.json) (`2024-08-22T17:40:09.223`)
|
- [CVE-2024-42598](CVE-2024/CVE-2024-425xx/CVE-2024-42598.json) (`2024-08-22T18:15:10.187`)
|
||||||
- [CVE-2024-7976](CVE-2024/CVE-2024-79xx/CVE-2024-7976.json) (`2024-08-22T17:39:54.540`)
|
- [CVE-2024-42768](CVE-2024/CVE-2024-427xx/CVE-2024-42768.json) (`2024-08-22T18:35:16.727`)
|
||||||
- [CVE-2024-7977](CVE-2024/CVE-2024-79xx/CVE-2024-7977.json) (`2024-08-22T17:39:32.730`)
|
- [CVE-2024-42769](CVE-2024/CVE-2024-427xx/CVE-2024-42769.json) (`2024-08-22T19:35:37.830`)
|
||||||
- [CVE-2024-7978](CVE-2024/CVE-2024-79xx/CVE-2024-7978.json) (`2024-08-22T17:38:11.200`)
|
- [CVE-2024-42772](CVE-2024/CVE-2024-427xx/CVE-2024-42772.json) (`2024-08-22T19:35:38.793`)
|
||||||
- [CVE-2024-7981](CVE-2024/CVE-2024-79xx/CVE-2024-7981.json) (`2024-08-22T17:36:24.803`)
|
- [CVE-2024-42780](CVE-2024/CVE-2024-427xx/CVE-2024-42780.json) (`2024-08-22T19:35:39.710`)
|
||||||
- [CVE-2024-8033](CVE-2024/CVE-2024-80xx/CVE-2024-8033.json) (`2024-08-22T17:36:07.673`)
|
- [CVE-2024-43853](CVE-2024/CVE-2024-438xx/CVE-2024-43853.json) (`2024-08-22T18:06:38.087`)
|
||||||
- [CVE-2024-8034](CVE-2024/CVE-2024-80xx/CVE-2024-8034.json) (`2024-08-22T17:35:30.003`)
|
- [CVE-2024-43854](CVE-2024/CVE-2024-438xx/CVE-2024-43854.json) (`2024-08-22T18:12:28.620`)
|
||||||
- [CVE-2024-8035](CVE-2024/CVE-2024-80xx/CVE-2024-8035.json) (`2024-08-22T17:33:37.407`)
|
- [CVE-2024-45192](CVE-2024/CVE-2024-451xx/CVE-2024-45192.json) (`2024-08-22T19:35:40.953`)
|
||||||
|
|
||||||
|
|
||||||
## Download and Usage
|
## Download and Usage
|
||||||
|
255
_state.csv
255
_state.csv
@ -153303,7 +153303,7 @@ CVE-2020-22524,0,0,3963018bd375efbb104317019440f969cb986995a7cd6c3fe6c16a8a1b9da
|
|||||||
CVE-2020-2253,0,0,6c05875bf0d2370ea4760b0be37855dec09deb871bbe2ec77d0ed51932a51534,2023-10-25T18:16:39.320000
|
CVE-2020-2253,0,0,6c05875bf0d2370ea4760b0be37855dec09deb871bbe2ec77d0ed51932a51534,2023-10-25T18:16:39.320000
|
||||||
CVE-2020-22533,0,0,8cf73333b4ebcde6d608738a7182e3a0c8935887ec73faac29a965d055d3ea73,2023-04-10T19:17:46.887000
|
CVE-2020-22533,0,0,8cf73333b4ebcde6d608738a7182e3a0c8935887ec73faac29a965d055d3ea73,2023-04-10T19:17:46.887000
|
||||||
CVE-2020-22535,0,0,3d39b81bb0c64f73d36642872de8b40a5e64321679c1a0ef90beeaf09e6bae1a,2021-07-13T18:58:42.140000
|
CVE-2020-22535,0,0,3d39b81bb0c64f73d36642872de8b40a5e64321679c1a0ef90beeaf09e6bae1a,2021-07-13T18:58:42.140000
|
||||||
CVE-2020-22539,0,0,2fa294f006ff885bb08e36ac096349c9826e6e384a4e9a2931bbb230307a235a,2024-04-16T13:24:07.103000
|
CVE-2020-22539,0,1,15bbe4ba3bc7be73f3da6475e511295156ebfd2ea390b950930b64bf8492d8d8,2024-08-22T19:35:00.877000
|
||||||
CVE-2020-2254,0,0,e7830526f9ccb1eacc81ed0b7e7bba867a9db0d3b245b1c38b997be50037937f,2023-10-25T18:16:39.377000
|
CVE-2020-2254,0,0,e7830526f9ccb1eacc81ed0b7e7bba867a9db0d3b245b1c38b997be50037937f,2023-10-25T18:16:39.377000
|
||||||
CVE-2020-22540,0,0,376647c49c1c6bd480053c09b9a209b442662340e7faa02a7740de4fbd0b2879,2024-04-16T13:24:07.103000
|
CVE-2020-22540,0,0,376647c49c1c6bd480053c09b9a209b442662340e7faa02a7740de4fbd0b2879,2024-04-16T13:24:07.103000
|
||||||
CVE-2020-2255,0,0,38e94953c094aa7fe06618634ee9c7f217363a9813b7dc4898775e41721a0fda,2023-10-25T18:16:39.430000
|
CVE-2020-2255,0,0,38e94953c094aa7fe06618634ee9c7f217363a9813b7dc4898775e41721a0fda,2023-10-25T18:16:39.430000
|
||||||
@ -194042,7 +194042,7 @@ CVE-2022-25029,0,0,4f5ebeabd557699e2691548f246212aabc28faeeb68ba1ce26e296cf83025
|
|||||||
CVE-2022-2503,0,0,e5d7de9bb954e10ce8ff1af61305cc8d604d34179c029b7c85941e33c8645199,2023-02-14T13:15:10.920000
|
CVE-2022-2503,0,0,e5d7de9bb954e10ce8ff1af61305cc8d604d34179c029b7c85941e33c8645199,2023-02-14T13:15:10.920000
|
||||||
CVE-2022-25031,0,0,11831fe23c98bb2f83d36e26fa6d73b5b7ef122b13991d3c195134577b498c6d,2022-03-09T20:09:58.927000
|
CVE-2022-25031,0,0,11831fe23c98bb2f83d36e26fa6d73b5b7ef122b13991d3c195134577b498c6d,2022-03-09T20:09:58.927000
|
||||||
CVE-2022-25037,0,0,b2ed585030daabbb7d96476f093899a863967f803d3459702d41efdc72314dc6,2024-08-19T19:35:02.193000
|
CVE-2022-25037,0,0,b2ed585030daabbb7d96476f093899a863967f803d3459702d41efdc72314dc6,2024-08-19T19:35:02.193000
|
||||||
CVE-2022-25038,0,0,d4ef5d26ced29c463b76ab9e49c88e159235454bb783bae2b05d2fe11de9ef7a,2024-05-31T19:14:47.793000
|
CVE-2022-25038,0,1,6bbcf5f0263481ae60f4fbb572b5749eaac36bd2e533bf005101ca5448d9ad88,2024-08-22T19:35:03.130000
|
||||||
CVE-2022-2504,0,0,fc0576f3b04bc0215c64e8eac32767b7e3e92fc531faaaa3da38a353d2a8f3bc,2023-11-07T03:46:37.600000
|
CVE-2022-2504,0,0,fc0576f3b04bc0215c64e8eac32767b7e3e92fc531faaaa3da38a353d2a8f3bc,2023-11-07T03:46:37.600000
|
||||||
CVE-2022-25041,0,0,c7230f4463dec3a15269bd0ce972ed91cee22d14918683d272cd1954c5e8fc4e,2022-03-29T13:50:33.407000
|
CVE-2022-25041,0,0,c7230f4463dec3a15269bd0ce972ed91cee22d14918683d272cd1954c5e8fc4e,2022-03-29T13:50:33.407000
|
||||||
CVE-2022-25044,0,0,04a774b0ed7f50c45cfbfcc56f7a8d205c4448d23d2248f0cfc9ee2ba6a7d6c1,2022-03-11T15:58:29.333000
|
CVE-2022-25044,0,0,04a774b0ed7f50c45cfbfcc56f7a8d205c4448d23d2248f0cfc9ee2ba6a7d6c1,2022-03-11T15:58:29.333000
|
||||||
@ -212448,15 +212448,15 @@ CVE-2022-48932,0,0,e4da3a55bf16cb7e74c7fb3bdbf52444ea58790de72cae46bb81b25a337bf
|
|||||||
CVE-2022-48933,0,0,6a98e8528fd6b1faa8c76a7aef7cb8ac273ef9526f460ba641654c0c398c5fd5,2024-08-22T12:48:02.790000
|
CVE-2022-48933,0,0,6a98e8528fd6b1faa8c76a7aef7cb8ac273ef9526f460ba641654c0c398c5fd5,2024-08-22T12:48:02.790000
|
||||||
CVE-2022-48934,0,0,0b176a681e7d2610694041d871f000280fa9228e1a2f8f6acd92de8a95952120,2024-08-22T12:48:02.790000
|
CVE-2022-48934,0,0,0b176a681e7d2610694041d871f000280fa9228e1a2f8f6acd92de8a95952120,2024-08-22T12:48:02.790000
|
||||||
CVE-2022-48935,0,0,5ae5db22ff9f7dee996037e977140fbd043608ec34a821cc0dbd24ce26c41bcd,2024-08-22T12:48:02.790000
|
CVE-2022-48935,0,0,5ae5db22ff9f7dee996037e977140fbd043608ec34a821cc0dbd24ce26c41bcd,2024-08-22T12:48:02.790000
|
||||||
CVE-2022-48936,0,0,e5e6490031bd8ea6058d99325de9d6a29afe230573f54734a35addab474fa07c,2024-08-22T12:48:02.790000
|
CVE-2022-48936,0,1,36ac70219cd8aef6a8970544481442eac16b9c0cd068921aa64078a27ffc7215,2024-08-22T19:03:59.643000
|
||||||
CVE-2022-48937,0,0,98eb258fb5480a0a64ad578f4d7d0745fa4dca07cb91f4b45bfd63f9aff98e4e,2024-08-22T12:48:02.790000
|
CVE-2022-48937,0,1,5acf0c5064ef79bcf25c1dae2675f0433d0999928e6f36ce64d5e6c9907aa5b9,2024-08-22T19:07:28.567000
|
||||||
CVE-2022-48938,0,0,966938e7530b15ebcc13eb90d4c2c84b75d163c5cb28b3caf3980b5de4d95ca5,2024-08-22T12:48:02.790000
|
CVE-2022-48938,0,1,eff2e9fbfc7aa611d20c84d8b3736eb4c859583a2ca7af1dd4c15351c5551139,2024-08-22T18:49:20.320000
|
||||||
CVE-2022-48939,0,0,d87216561f7a780dc797ba3a4cd412fbc9fe7377390bfa15f8570e808e36ecb7,2024-08-22T12:48:02.790000
|
CVE-2022-48939,0,1,171710b03fe72b0b5576806a870449655b0f9165fe85d09b9d9bd74ca80174f4,2024-08-22T19:02:08.770000
|
||||||
CVE-2022-4894,0,0,c3227cd516d71db144057b054e28013337d055a6a605d8987216a7774f3ac9b7,2023-08-23T15:29:31.687000
|
CVE-2022-4894,0,0,c3227cd516d71db144057b054e28013337d055a6a605d8987216a7774f3ac9b7,2023-08-23T15:29:31.687000
|
||||||
CVE-2022-48940,0,0,6c2232d064008b51de41e3883361ae471cfa4d2baa265f94b3c9f5e081cb809f,2024-08-22T12:48:02.790000
|
CVE-2022-48940,0,1,6f15a6b4fa7f43e99852715a17fcd420a06e24b0776b09d707d9bdb81ddea902,2024-08-22T18:37:46.133000
|
||||||
CVE-2022-48941,0,0,7c688a7c244fb68615ed7d5d279e538ad5249bed2a7dc9d2630d8d33ed1bdedb,2024-08-22T12:48:02.790000
|
CVE-2022-48941,0,1,723bbba9bcccbd20edb366905d194ad938e20cb00b782a5e655658df54707693,2024-08-22T18:41:37.090000
|
||||||
CVE-2022-48942,0,0,a81a7889c84bb2f83037b09e273a2b372457cf8542aa9c966659f5b1dd1186d9,2024-08-22T12:48:02.790000
|
CVE-2022-48942,0,1,2cf46354691478839d2223efa2eaa869b06a9729fd72ecdcbb1c9e9660f0aaa9,2024-08-22T18:25:14.867000
|
||||||
CVE-2022-48943,0,0,d7eecc45f74def44aad3b02137059c63161b61532700973d2208c6f9f55014f2,2024-08-22T12:48:02.790000
|
CVE-2022-48943,0,1,a7018e1dbe7c5677e235ba4ed082a73fce76282052204bd38ca850f621dffe72,2024-08-22T18:27:42.807000
|
||||||
CVE-2022-4895,0,0,0efd54174b680d04b5646c623fd6b294801b419a72088921312b45e7bb6c068f,2023-11-07T03:59:15.667000
|
CVE-2022-4895,0,0,0efd54174b680d04b5646c623fd6b294801b419a72088921312b45e7bb6c068f,2023-11-07T03:59:15.667000
|
||||||
CVE-2022-4896,0,0,04cb60ab8732a1bfba8bf7d8a4df08b8371cdecc380fd455d1b928e8213822e1,2023-09-15T15:18:10.843000
|
CVE-2022-4896,0,0,04cb60ab8732a1bfba8bf7d8a4df08b8371cdecc380fd455d1b928e8213822e1,2023-09-15T15:18:10.843000
|
||||||
CVE-2022-4897,0,0,0a243664793293bb535173693d8b2bb850e8caf27eb71e5f98003bf4c293392a,2023-11-07T03:59:15.853000
|
CVE-2022-4897,0,0,0a243664793293bb535173693d8b2bb850e8caf27eb71e5f98003bf4c293392a,2023-11-07T03:59:15.853000
|
||||||
@ -231000,7 +231000,7 @@ CVE-2023-41095,0,0,deee64e9e520cbd28974f4c3c1b7d02b2c55b60ea677ddead3af0482dd0a7
|
|||||||
CVE-2023-41096,0,0,52af64b05366a4d43b15642ba40df6e1ae8efc25c5fe20f7a4ec7b8ffa1abd9b,2023-11-08T01:48:37.717000
|
CVE-2023-41096,0,0,52af64b05366a4d43b15642ba40df6e1ae8efc25c5fe20f7a4ec7b8ffa1abd9b,2023-11-08T01:48:37.717000
|
||||||
CVE-2023-41097,0,0,225555e7a96923a582ba79f8ccb5c9ee9b827759fb76ff6066b045a3ae73653f,2024-01-03T17:22:03.797000
|
CVE-2023-41097,0,0,225555e7a96923a582ba79f8ccb5c9ee9b827759fb76ff6066b045a3ae73653f,2024-01-03T17:22:03.797000
|
||||||
CVE-2023-41098,0,0,1877421a99644398c5448d161e47d1b4f3f34d4c0be4875e9313e545e2d53226,2023-08-28T21:21:37.023000
|
CVE-2023-41098,0,0,1877421a99644398c5448d161e47d1b4f3f34d4c0be4875e9313e545e2d53226,2023-08-28T21:21:37.023000
|
||||||
CVE-2023-41099,0,1,c541702f1a2a5937b975af12a4eb88323b5abfddc3ba442a1352acbd4bacb37f,2024-08-22T17:35:00.720000
|
CVE-2023-41099,0,0,c541702f1a2a5937b975af12a4eb88323b5abfddc3ba442a1352acbd4bacb37f,2024-08-22T17:35:00.720000
|
||||||
CVE-2023-4110,0,0,6f05564b88d67a4e37f9507e8115c927563bedfea67f2dfdbc398b9ca9e94615,2024-05-17T02:31:19.523000
|
CVE-2023-4110,0,0,6f05564b88d67a4e37f9507e8115c927563bedfea67f2dfdbc398b9ca9e94615,2024-05-17T02:31:19.523000
|
||||||
CVE-2023-41100,0,0,30bd0525f09b3bfd34e6442c925dd2b383c4cc7432aca6eb1c6a3f586f5f0285,2023-08-28T21:27:36.420000
|
CVE-2023-41100,0,0,30bd0525f09b3bfd34e6442c925dd2b383c4cc7432aca6eb1c6a3f586f5f0285,2023-08-28T21:27:36.420000
|
||||||
CVE-2023-41101,0,0,9d279aed31c2d0df402abd3646c8e0c3d11b0759d2e721ed53b35ef8b2562b81,2024-06-20T18:15:11.237000
|
CVE-2023-41101,0,0,9d279aed31c2d0df402abd3646c8e0c3d11b0759d2e721ed53b35ef8b2562b81,2024-06-20T18:15:11.237000
|
||||||
@ -233018,7 +233018,7 @@ CVE-2023-43959,0,0,3e0508b282ce13b7ab31b65b36da1089fb9bc1c29185cb09f3c4226ee594b
|
|||||||
CVE-2023-43960,0,0,9436258b0be27800fafff316b46719607100f02382a5925bda03f182056bac68,2023-11-07T04:21:32.280000
|
CVE-2023-43960,0,0,9436258b0be27800fafff316b46719607100f02382a5925bda03f182056bac68,2023-11-07T04:21:32.280000
|
||||||
CVE-2023-43961,0,0,d022a1326b47938450ca513431def271a90d142825dd394edf75f3be724de0cc,2023-11-01T16:16:14.943000
|
CVE-2023-43961,0,0,d022a1326b47938450ca513431def271a90d142825dd394edf75f3be724de0cc,2023-11-01T16:16:14.943000
|
||||||
CVE-2023-4397,0,0,806c05c57b1f10660e4c63dcf9d9a34cfadf8928a75c42c7a5c8fcfbece74dfc,2023-12-04T18:05:04.100000
|
CVE-2023-4397,0,0,806c05c57b1f10660e4c63dcf9d9a34cfadf8928a75c42c7a5c8fcfbece74dfc,2023-12-04T18:05:04.100000
|
||||||
CVE-2023-43971,0,1,c2064ebdbad348b085d6e18a3454b611e7eca0a799a8c6b1b26378d9c5f74d47,2024-08-22T16:20:20.413000
|
CVE-2023-43971,0,0,c2064ebdbad348b085d6e18a3454b611e7eca0a799a8c6b1b26378d9c5f74d47,2024-08-22T16:20:20.413000
|
||||||
CVE-2023-43976,0,0,02187eddeb3770a7f1febec00624360ee5250e93dc31f3e8b51b3ba1d9bb4442,2023-10-05T15:17:11.293000
|
CVE-2023-43976,0,0,02187eddeb3770a7f1febec00624360ee5250e93dc31f3e8b51b3ba1d9bb4442,2023-10-05T15:17:11.293000
|
||||||
CVE-2023-43979,0,0,b42ecb5c3472ee75481a81f4bcc721f9df20b88fcd306940b556920c1fd7490b,2023-11-21T14:07:31.363000
|
CVE-2023-43979,0,0,b42ecb5c3472ee75481a81f4bcc721f9df20b88fcd306940b556920c1fd7490b,2023-11-21T14:07:31.363000
|
||||||
CVE-2023-4398,0,0,941805a464290ceda704bc08a9de74a80348460471c7271929b1e2e9a230208e,2023-12-04T18:04:39.363000
|
CVE-2023-4398,0,0,941805a464290ceda704bc08a9de74a80348460471c7271929b1e2e9a230208e,2023-12-04T18:04:39.363000
|
||||||
@ -234349,7 +234349,7 @@ CVE-2023-46040,0,0,6eff75a2812c317a80847f611adb0ea2b165227205b9790d775b06619e979
|
|||||||
CVE-2023-46042,0,0,b6d495a936dc07be63ad36740d8e9766ee2bd3ae6c4a8ef73b985512f02df521,2023-10-25T15:20:17.570000
|
CVE-2023-46042,0,0,b6d495a936dc07be63ad36740d8e9766ee2bd3ae6c4a8ef73b985512f02df521,2023-10-25T15:20:17.570000
|
||||||
CVE-2023-46045,0,0,0e8abce2cbeee2bf608426602c7398443e9d61c9d45f545bf4f725e8132500eb,2024-03-21T02:49:19.427000
|
CVE-2023-46045,0,0,0e8abce2cbeee2bf608426602c7398443e9d61c9d45f545bf4f725e8132500eb,2024-03-21T02:49:19.427000
|
||||||
CVE-2023-46046,0,0,3bc45ec9592baeab7ef720efeac1a7d65f4f02d8606730aa13f5baaa81584553,2024-08-02T21:15:48.963000
|
CVE-2023-46046,0,0,3bc45ec9592baeab7ef720efeac1a7d65f4f02d8606730aa13f5baaa81584553,2024-08-02T21:15:48.963000
|
||||||
CVE-2023-46047,0,0,f5c37c94ca5fa594b714e2ffca7c2bdc6f46a8bdd28b18487a40447ff0803b85,2024-08-02T21:15:49.040000
|
CVE-2023-46047,0,1,c24e10e557ef6edbf0ab7d162e7557ecb1baed06f8bacef6ed95114dbb222d99,2024-08-22T18:35:01.467000
|
||||||
CVE-2023-46048,0,0,fdc0cbd47578c151a3373264bac42e14fbe5938d1d4d2542c8c29ee6e1717908,2024-08-19T19:35:04.860000
|
CVE-2023-46048,0,0,fdc0cbd47578c151a3373264bac42e14fbe5938d1d4d2542c8c29ee6e1717908,2024-08-19T19:35:04.860000
|
||||||
CVE-2023-46049,0,0,2315016d1ba4bba7f533371cd70ec259060eaeb7a90fd1662a78c0e2eff24ad7,2024-08-02T21:15:49.197000
|
CVE-2023-46049,0,0,2315016d1ba4bba7f533371cd70ec259060eaeb7a90fd1662a78c0e2eff24ad7,2024-08-02T21:15:49.197000
|
||||||
CVE-2023-4605,0,0,4ca1198891ef7f19a4427afe916541ae6cc98eedaf95349b4181266b8438d380,2024-04-08T18:49:25.863000
|
CVE-2023-4605,0,0,4ca1198891ef7f19a4427afe916541ae6cc98eedaf95349b4181266b8438d380,2024-04-08T18:49:25.863000
|
||||||
@ -234562,7 +234562,7 @@ CVE-2023-4629,0,0,a2da5926fb0fca7bbafeced6fa322c009d8e911a79a6b6bf7f38a2a5e0ea6e
|
|||||||
CVE-2023-46290,0,0,27e5ae817a0021378c38e4fd99f2c228169bd8f39b57bf0a325b209cd30c76ea,2023-11-07T19:09:56.033000
|
CVE-2023-46290,0,0,27e5ae817a0021378c38e4fd99f2c228169bd8f39b57bf0a325b209cd30c76ea,2023-11-07T19:09:56.033000
|
||||||
CVE-2023-46294,0,0,5aebe5d15d21a3c99db9d0aa22d1effedd56a960f93e5caf38568b64d0bdb4c0,2024-05-02T13:27:25.103000
|
CVE-2023-46294,0,0,5aebe5d15d21a3c99db9d0aa22d1effedd56a960f93e5caf38568b64d0bdb4c0,2024-05-02T13:27:25.103000
|
||||||
CVE-2023-46295,0,0,b15972e98a1950e4d4a3b9eb508002e3a9685d0bb1eed8df111f8eb853e8c9e0,2024-07-03T01:42:00.680000
|
CVE-2023-46295,0,0,b15972e98a1950e4d4a3b9eb508002e3a9685d0bb1eed8df111f8eb853e8c9e0,2024-07-03T01:42:00.680000
|
||||||
CVE-2023-46297,0,0,217f47ac4249495c7d5f5b500faeed7856fda49b0db87e1875ce7c2658fe3264,2024-05-29T19:50:25.303000
|
CVE-2023-46297,0,1,36ec00ece79ff59f1f7e8a89df1d401e3ccfe69b828e4f08f1bead640ad02eba,2024-08-22T19:35:05.647000
|
||||||
CVE-2023-46298,0,0,11fb6fb4012be55616d4ed607b07d97f1217c6cccf4f89f567489addcccf54b4,2023-10-28T03:30:11.740000
|
CVE-2023-46298,0,0,11fb6fb4012be55616d4ed607b07d97f1217c6cccf4f89f567489addcccf54b4,2023-10-28T03:30:11.740000
|
||||||
CVE-2023-4630,0,0,84642586247351fd243a36a028f47b98bdbaebb8bb9393939811b558e3daca7b,2023-09-13T16:50:23.250000
|
CVE-2023-4630,0,0,84642586247351fd243a36a028f47b98bdbaebb8bb9393939811b558e3daca7b,2023-09-13T16:50:23.250000
|
||||||
CVE-2023-46300,0,0,ef50ba7da8805e453a397a1a5d11a994fcd6ff305d395f739cf3f9017964b18d,2023-10-31T17:08:50.757000
|
CVE-2023-46300,0,0,ef50ba7da8805e453a397a1a5d11a994fcd6ff305d395f739cf3f9017964b18d,2023-10-31T17:08:50.757000
|
||||||
@ -234665,7 +234665,7 @@ CVE-2023-46427,0,0,f866f9e54a1652715d6c8d5cf0ab85e5d06c714508a8f7e5c787c0848377e
|
|||||||
CVE-2023-46428,0,0,faa78dcade98f2a1e124d91c90afd9b9a200a5dd262391aece6b2b8f2e67c134,2023-11-06T19:30:17.810000
|
CVE-2023-46428,0,0,faa78dcade98f2a1e124d91c90afd9b9a200a5dd262391aece6b2b8f2e67c134,2023-11-06T19:30:17.810000
|
||||||
CVE-2023-4643,0,0,f6caf5740564746f31d2fc7731a7738c5a9fdb65fac1d028210c31eb8a3076a3,2023-11-07T04:22:48.657000
|
CVE-2023-4643,0,0,f6caf5740564746f31d2fc7731a7738c5a9fdb65fac1d028210c31eb8a3076a3,2023-11-07T04:22:48.657000
|
||||||
CVE-2023-46435,0,0,9045d4cee8109ec2b6ac83ee0b4dc133557afb03e66020489ecea163a3631054,2023-10-30T16:20:21.103000
|
CVE-2023-46435,0,0,9045d4cee8109ec2b6ac83ee0b4dc133557afb03e66020489ecea163a3631054,2023-10-30T16:20:21.103000
|
||||||
CVE-2023-46442,0,0,b3f699fa0a17a25444e4e48f3449cd5a23068de1a7b2896891c354ac1a68a9d1,2024-05-24T18:09:20.027000
|
CVE-2023-46442,0,1,9293faa2d8956aa4f30804364065a1b1e61ee21acf16953213f0ca472daec3be,2024-08-22T19:35:06.600000
|
||||||
CVE-2023-46445,0,0,d30b7a69d534d58879daef0d8df2b1cc94af49180044c8b573c6dff1e56b4fe0,2023-12-22T20:15:07.270000
|
CVE-2023-46445,0,0,d30b7a69d534d58879daef0d8df2b1cc94af49180044c8b573c6dff1e56b4fe0,2023-12-22T20:15:07.270000
|
||||||
CVE-2023-46446,0,0,8947e039d91da74ea0d8abe1c8e929f5ba6d7ec6e059b8fabb66ab2753cd716c,2023-12-22T20:15:07.367000
|
CVE-2023-46446,0,0,8947e039d91da74ea0d8abe1c8e929f5ba6d7ec6e059b8fabb66ab2753cd716c,2023-12-22T20:15:07.367000
|
||||||
CVE-2023-46447,0,0,3399247934a925d1a22abe563fd15983a03e402beebeab4d93fc81ab8bf7b896,2024-01-29T15:27:03.267000
|
CVE-2023-46447,0,0,3399247934a925d1a22abe563fd15983a03e402beebeab4d93fc81ab8bf7b896,2024-01-29T15:27:03.267000
|
||||||
@ -237194,9 +237194,9 @@ CVE-2023-49959,0,0,88693f11e9749c7b6e276c7f9d19f715b73a4f2009b695830855f5158498f
|
|||||||
CVE-2023-4996,0,0,6a96837fcca1d7deaa6aa589d92a14b4327d14c87ed64a80dfeb3367527137a1,2023-11-14T17:04:04.747000
|
CVE-2023-4996,0,0,6a96837fcca1d7deaa6aa589d92a14b4327d14c87ed64a80dfeb3367527137a1,2023-11-14T17:04:04.747000
|
||||||
CVE-2023-49960,0,0,0e9ad95596e6a050966eeae850b05c374feaaec388768a0ded233d222e3ddb12,2024-08-01T13:45:17.753000
|
CVE-2023-49960,0,0,0e9ad95596e6a050966eeae850b05c374feaaec388768a0ded233d222e3ddb12,2024-08-01T13:45:17.753000
|
||||||
CVE-2023-49961,0,0,fe18aca8b440f329c1d528d19a34369d87e6c8005ab3d538fd1c3f47cafa72b1,2024-01-12T16:13:48.350000
|
CVE-2023-49961,0,0,fe18aca8b440f329c1d528d19a34369d87e6c8005ab3d538fd1c3f47cafa72b1,2024-01-12T16:13:48.350000
|
||||||
CVE-2023-49963,0,0,cc3a77502e77d00f9c20011e97a97957573a6f8abb51b75925791cafed3f9e9f,2024-04-19T18:29:53.040000
|
CVE-2023-49963,0,1,1834205893b0a4ca865a9ef7e3a83b265bbd7d92cfe069a1f2dd2fa040d59a3c,2024-08-22T19:35:07.550000
|
||||||
CVE-2023-49964,0,0,4a201f112134a3d6cf6021d5b91032c58a31552b69366b1a2d0998d8e981118b,2023-12-14T14:36:17.293000
|
CVE-2023-49964,0,0,4a201f112134a3d6cf6021d5b91032c58a31552b69366b1a2d0998d8e981118b,2023-12-14T14:36:17.293000
|
||||||
CVE-2023-49965,0,0,e0d8a82e98c6c9a3815ede421319b87954864ded3456793693be862d41bc33bc,2024-04-08T18:49:25.863000
|
CVE-2023-49965,0,1,48e6b3e821ed6e4ac6e7c9a1268066cbff076d429495b607839693844fd16bcd,2024-08-22T18:35:03.353000
|
||||||
CVE-2023-49967,0,0,747a56ed33b32c4d1b311fdebeb305be64d8bfa851a5ebfe9be1ea5d7affb098,2023-12-09T04:48:27.967000
|
CVE-2023-49967,0,0,747a56ed33b32c4d1b311fdebeb305be64d8bfa851a5ebfe9be1ea5d7affb098,2023-12-09T04:48:27.967000
|
||||||
CVE-2023-49968,0,0,443b0a12900df986124c3c0058d5658df13e1f540049ddc612a4f43f44d6cfc3,2024-03-05T13:41:01.900000
|
CVE-2023-49968,0,0,443b0a12900df986124c3c0058d5658df13e1f540049ddc612a4f43f44d6cfc3,2024-03-05T13:41:01.900000
|
||||||
CVE-2023-49969,0,0,469876939b4b9f9c3637cadc1ea51d82fbf4e880cd6bad43cc5c9ae371564219,2024-08-01T13:45:18.787000
|
CVE-2023-49969,0,0,469876939b4b9f9c3637cadc1ea51d82fbf4e880cd6bad43cc5c9ae371564219,2024-08-01T13:45:18.787000
|
||||||
@ -237255,7 +237255,7 @@ CVE-2023-5005,0,0,745cb1ab76d83a3107371edfdd319096e1b6d1d025dbda4b9d241b022cb918
|
|||||||
CVE-2023-50053,0,0,9b450f039e219e8c0dc6b5319645fc133cad473316e16f22c0a481e9974339ce,2024-08-01T13:45:22.157000
|
CVE-2023-50053,0,0,9b450f039e219e8c0dc6b5319645fc133cad473316e16f22c0a481e9974339ce,2024-08-01T13:45:22.157000
|
||||||
CVE-2023-50059,0,0,c672df92e602de468d6a10dde3ef7658749e2af6fdb872b8bc56a5b1138f8560,2024-04-30T19:35:36.960000
|
CVE-2023-50059,0,0,c672df92e602de468d6a10dde3ef7658749e2af6fdb872b8bc56a5b1138f8560,2024-04-30T19:35:36.960000
|
||||||
CVE-2023-5006,0,0,21d14cc4876f8cc1a801d8b8c70a50bf2886311fb727493df0ced96b6e0ba142,2024-01-24T17:16:48.267000
|
CVE-2023-5006,0,0,21d14cc4876f8cc1a801d8b8c70a50bf2886311fb727493df0ced96b6e0ba142,2024-01-24T17:16:48.267000
|
||||||
CVE-2023-50061,0,0,b1e3995dc3fd0fc7fe136f60cffc40dccfe3ce4602a59d160c32d5355319e83f,2024-02-15T05:02:52.427000
|
CVE-2023-50061,0,1,233fe17f839b0e8ef7a1099d37a8dbf5d9b685d75def71772f132a905686000f,2024-08-22T19:35:08.363000
|
||||||
CVE-2023-50069,0,0,d5b56f504dfc9456d663c793e6af0eeee24a43c49c91c208a5bdce7a8736c014,2024-01-05T23:08:29.450000
|
CVE-2023-50069,0,0,d5b56f504dfc9456d663c793e6af0eeee24a43c49c91c208a5bdce7a8736c014,2024-01-05T23:08:29.450000
|
||||||
CVE-2023-5007,0,0,2c3a0305698c7d0eb69e8429d362775d9108864cd5873643c1bb4add99591ed5,2023-12-26T21:32:57.167000
|
CVE-2023-5007,0,0,2c3a0305698c7d0eb69e8429d362775d9108864cd5873643c1bb4add99591ed5,2023-12-26T21:32:57.167000
|
||||||
CVE-2023-50070,0,0,4c0e0b3a6a619999bf7c4d96a134f8e5b7b9f9c028a8642d016e18163d586de9,2024-01-05T19:45:20.357000
|
CVE-2023-50070,0,0,4c0e0b3a6a619999bf7c4d96a134f8e5b7b9f9c028a8642d016e18163d586de9,2024-01-05T19:45:20.357000
|
||||||
@ -238579,7 +238579,7 @@ CVE-2023-5215,0,0,076f3ad4d1737a363373e0b80c210de679a7c69cccbb36b095edcc1c654cb5
|
|||||||
CVE-2023-52150,0,0,d6cc0c17a73b480b712f1be2d69c9c9ac6e0f201ff524861fd68bbcccab1a10f,2024-01-10T19:50:26.923000
|
CVE-2023-52150,0,0,d6cc0c17a73b480b712f1be2d69c9c9ac6e0f201ff524861fd68bbcccab1a10f,2024-01-10T19:50:26.923000
|
||||||
CVE-2023-52151,0,0,85b7b7f24b04898381709d8e25edbe733fd7631a4f636fe0a6d084fa96bc68a9,2024-01-10T03:59:57.907000
|
CVE-2023-52151,0,0,85b7b7f24b04898381709d8e25edbe733fd7631a4f636fe0a6d084fa96bc68a9,2024-01-10T03:59:57.907000
|
||||||
CVE-2023-52152,0,0,097fc00b61b252fe2f250d2355f140cbca254720913054490d1cf9f4c7d22fe8,2024-01-05T16:00:51.157000
|
CVE-2023-52152,0,0,097fc00b61b252fe2f250d2355f140cbca254720913054490d1cf9f4c7d22fe8,2024-01-05T16:00:51.157000
|
||||||
CVE-2023-52153,0,0,ea0183f3a1ad92d7b240ff5fe5fe2b56094367e656ceab2022df017c6ea4585f,2024-02-22T19:07:27.197000
|
CVE-2023-52153,0,1,8610f30de3b3ae26b18922885a0ae2aaa344e98001b8664f3e5b159222943c76,2024-08-22T19:35:09.257000
|
||||||
CVE-2023-52154,0,0,3c09d8bbc34bc21301a7ba257cb3ebe4acad4608bcdd31c9c14e3f17024b636a,2024-02-22T19:07:27.197000
|
CVE-2023-52154,0,0,3c09d8bbc34bc21301a7ba257cb3ebe4acad4608bcdd31c9c14e3f17024b636a,2024-02-22T19:07:27.197000
|
||||||
CVE-2023-52155,0,0,66b2036b8aa4b2b0821aeadedccb952fd85f88f5197038ead7aa814bc9f3095a,2024-08-14T17:35:02.300000
|
CVE-2023-52155,0,0,66b2036b8aa4b2b0821aeadedccb952fd85f88f5197038ead7aa814bc9f3095a,2024-08-14T17:35:02.300000
|
||||||
CVE-2023-52159,0,0,bec77c293fd7ebf7e62680f3fc4955e6930fe18607be4ec5691592c67d41ceeb,2024-03-25T14:15:09.267000
|
CVE-2023-52159,0,0,bec77c293fd7ebf7e62680f3fc4955e6930fe18607be4ec5691592c67d41ceeb,2024-03-25T14:15:09.267000
|
||||||
@ -238743,7 +238743,7 @@ CVE-2023-52362,0,0,43adf8e6c64a96c436ca7a8a4039c94bf893e1cb423359d1487ffcd189c40
|
|||||||
CVE-2023-52363,0,0,99d169dd3c72fa3419e618676e8cf0cd222763ee208d2535052bfc2f7a5e1e20,2024-02-20T19:50:53.960000
|
CVE-2023-52363,0,0,99d169dd3c72fa3419e618676e8cf0cd222763ee208d2535052bfc2f7a5e1e20,2024-02-20T19:50:53.960000
|
||||||
CVE-2023-52364,0,0,503781f00d75ade91ea9177c8585cd44a5a73fe2baa30f425ba6bec99d44c41c,2024-04-08T18:48:40.217000
|
CVE-2023-52364,0,0,503781f00d75ade91ea9177c8585cd44a5a73fe2baa30f425ba6bec99d44c41c,2024-04-08T18:48:40.217000
|
||||||
CVE-2023-52365,0,0,bd1a11d425827e65eed9149e868165cf65bfaf0fcc43e0347175b951fc733d54,2024-02-20T19:50:53.960000
|
CVE-2023-52365,0,0,bd1a11d425827e65eed9149e868165cf65bfaf0fcc43e0347175b951fc733d54,2024-02-20T19:50:53.960000
|
||||||
CVE-2023-52366,0,0,b417476c5a1740717d6d26dbc75402a3e3e206645941f2568924597b90fc1608,2024-02-20T19:50:53.960000
|
CVE-2023-52366,0,1,237c716036b70fdbe0d981998960891e9cef688cdb85da8994548d5f0d670539,2024-08-22T18:35:04.153000
|
||||||
CVE-2023-52367,0,0,059d33a9b5e3c4078b26cbdc15a1861aeba6ae88b6776bd4d8541399245b8c62,2024-07-03T01:43:31.290000
|
CVE-2023-52367,0,0,059d33a9b5e3c4078b26cbdc15a1861aeba6ae88b6776bd4d8541399245b8c62,2024-07-03T01:43:31.290000
|
||||||
CVE-2023-52368,0,0,ab6ff08815d4283a11d94d78d409b6cb80ad558c4d3f1353292c6023cff0808c,2024-02-20T19:50:53.960000
|
CVE-2023-52368,0,0,ab6ff08815d4283a11d94d78d409b6cb80ad558c4d3f1353292c6023cff0808c,2024-02-20T19:50:53.960000
|
||||||
CVE-2023-52369,0,0,1047464a4296b31a7cf6f87a7a312b39cc01e8c732edf6ebc4526ed97e7841ad,2024-02-20T19:50:53.960000
|
CVE-2023-52369,0,0,1047464a4296b31a7cf6f87a7a312b39cc01e8c732edf6ebc4526ed97e7841ad,2024-02-20T19:50:53.960000
|
||||||
@ -240372,7 +240372,7 @@ CVE-2023-6448,0,0,f7f271f9b08baff1e70e4a44ec3b05327ba7aad4658ca132cb49aa8e275080
|
|||||||
CVE-2023-6449,0,0,a7f9c2b5501cdd9fc21a14160551e18f6c2ae8e1d2fbbd505e7a7b32722bbf0e,2023-12-06T20:56:48.923000
|
CVE-2023-6449,0,0,a7f9c2b5501cdd9fc21a14160551e18f6c2ae8e1d2fbbd505e7a7b32722bbf0e,2023-12-06T20:56:48.923000
|
||||||
CVE-2023-6450,0,0,e76b7b0addf647726eba5bc734dd23c4b1f2101780b0fb20f535aa0ca20caeb1,2024-01-26T15:59:00.420000
|
CVE-2023-6450,0,0,e76b7b0addf647726eba5bc734dd23c4b1f2101780b0fb20f535aa0ca20caeb1,2024-01-26T15:59:00.420000
|
||||||
CVE-2023-6451,0,0,f12b562c1c96070fc5e29b85d7db92fde3d7bad88af9e8831d139b62eb69a5b6,2024-02-16T13:37:51.433000
|
CVE-2023-6451,0,0,f12b562c1c96070fc5e29b85d7db92fde3d7bad88af9e8831d139b62eb69a5b6,2024-02-16T13:37:51.433000
|
||||||
CVE-2023-6452,1,1,c5299f185bdb32bda151a9967f902be9f9e61a9d314aad85e6e7a6a1642a9854,2024-08-22T16:15:07.997000
|
CVE-2023-6452,0,0,c5299f185bdb32bda151a9967f902be9f9e61a9d314aad85e6e7a6a1642a9854,2024-08-22T16:15:07.997000
|
||||||
CVE-2023-6456,0,0,e46e0d37304e52e0bebade1bd99fe797a2c17dba35b72ee4232c48409ec0198d,2024-01-25T02:02:23.760000
|
CVE-2023-6456,0,0,e46e0d37304e52e0bebade1bd99fe797a2c17dba35b72ee4232c48409ec0198d,2024-01-25T02:02:23.760000
|
||||||
CVE-2023-6457,0,0,1d0aafe1ff9d8e5471ee20dcac54ea1ba924bf6cb0d15d7ebecd5192eedea5f7,2024-01-22T21:25:07.550000
|
CVE-2023-6457,0,0,1d0aafe1ff9d8e5471ee20dcac54ea1ba924bf6cb0d15d7ebecd5192eedea5f7,2024-01-22T21:25:07.550000
|
||||||
CVE-2023-6458,0,0,d5ab3aabd050ac001731c9ca925bc1c0303a945e438599593a52c25d763ddeeb,2023-12-12T19:11:36.897000
|
CVE-2023-6458,0,0,d5ab3aabd050ac001731c9ca925bc1c0303a945e438599593a52c25d763ddeeb,2023-12-12T19:11:36.897000
|
||||||
@ -241824,7 +241824,7 @@ CVE-2024-0853,0,0,3c910daae8e71e1ce70b1329a110fcfb56e12ff4cd703e160872830a02778b
|
|||||||
CVE-2024-0854,0,0,078c838d6b39f270536d9d77e44ca7ffaa60bd2fba9534d52e2f6ab03b587b3d,2024-01-30T17:01:37.127000
|
CVE-2024-0854,0,0,078c838d6b39f270536d9d77e44ca7ffaa60bd2fba9534d52e2f6ab03b587b3d,2024-01-30T17:01:37.127000
|
||||||
CVE-2024-0855,0,0,61bb12eb398f3f222f6fe0c4603d214af7ba9f6d4fd218198b137421ef268723,2024-08-08T21:35:01.813000
|
CVE-2024-0855,0,0,61bb12eb398f3f222f6fe0c4603d214af7ba9f6d4fd218198b137421ef268723,2024-08-08T21:35:01.813000
|
||||||
CVE-2024-0856,0,0,cdf686922dc6dc53a8573a4e6d7fe25c3162a97d00eaaeaf4df6f669bee7cf43,2024-08-05T19:35:01.477000
|
CVE-2024-0856,0,0,cdf686922dc6dc53a8573a4e6d7fe25c3162a97d00eaaeaf4df6f669bee7cf43,2024-08-05T19:35:01.477000
|
||||||
CVE-2024-0857,0,1,135b818be9db5d9ae259c8ee8260201b0eed5c0f5f2f59c834f8ec0a79ea8407,2024-08-22T17:23:44.947000
|
CVE-2024-0857,0,0,135b818be9db5d9ae259c8ee8260201b0eed5c0f5f2f59c834f8ec0a79ea8407,2024-08-22T17:23:44.947000
|
||||||
CVE-2024-0858,0,0,0cac4e7a1bf81dbbbf49fb45b774f9b9d61dff98c8323a87e06b4f2eb2f216bd,2024-03-18T19:40:00.173000
|
CVE-2024-0858,0,0,0cac4e7a1bf81dbbbf49fb45b774f9b9d61dff98c8323a87e06b4f2eb2f216bd,2024-03-18T19:40:00.173000
|
||||||
CVE-2024-0859,0,0,ff784ede10a0711bc0887b221fef20123179373dca5468014d5965d599854b96,2024-02-13T19:45:29.770000
|
CVE-2024-0859,0,0,ff784ede10a0711bc0887b221fef20123179373dca5468014d5965d599854b96,2024-02-13T19:45:29.770000
|
||||||
CVE-2024-0860,0,0,831bd3ec539e95c34edc12f0e20bfc01b276aabb943cb43f0dff12e235110897,2024-03-15T12:53:06.423000
|
CVE-2024-0860,0,0,831bd3ec539e95c34edc12f0e20bfc01b276aabb943cb43f0dff12e235110897,2024-03-15T12:53:06.423000
|
||||||
@ -242921,7 +242921,7 @@ CVE-2024-20032,0,0,d9f17715cae8cf4f7f490704895224d3c5f8721c9379d158f6d75534a2fbe
|
|||||||
CVE-2024-20033,0,0,54fbaa24cdc7b0bf4840e2f98e0d8064474699ec248bdbd149da783c89610676,2024-03-04T13:58:23.447000
|
CVE-2024-20033,0,0,54fbaa24cdc7b0bf4840e2f98e0d8064474699ec248bdbd149da783c89610676,2024-03-04T13:58:23.447000
|
||||||
CVE-2024-20034,0,0,cf35da749882a42d3fb4d555cf4c7784b9ca63e49754c62d7cbfb93c29b82d3d,2024-07-03T01:45:49.510000
|
CVE-2024-20034,0,0,cf35da749882a42d3fb4d555cf4c7784b9ca63e49754c62d7cbfb93c29b82d3d,2024-07-03T01:45:49.510000
|
||||||
CVE-2024-20036,0,0,a842a455104cefb6335a12470cf3ea09e402c164144afb30609fd627a5d8a9ce,2024-03-04T13:58:23.447000
|
CVE-2024-20036,0,0,a842a455104cefb6335a12470cf3ea09e402c164144afb30609fd627a5d8a9ce,2024-03-04T13:58:23.447000
|
||||||
CVE-2024-20037,0,0,9c45a018c7c075a8a97c9a68674f13d53eed1650b73e588cabb51078922b13c9,2024-03-04T13:58:23.447000
|
CVE-2024-20037,0,1,adb1866d4c227394880a8656ea0442a9b76611b77fb814d4721a97640cafcc3a,2024-08-22T19:35:10.633000
|
||||||
CVE-2024-20038,0,0,b24fd54a338c5bcd125b3ff0e1aa517302167214bb3333a900e600b4cd1318a8,2024-03-04T13:58:23.447000
|
CVE-2024-20038,0,0,b24fd54a338c5bcd125b3ff0e1aa517302167214bb3333a900e600b4cd1318a8,2024-03-04T13:58:23.447000
|
||||||
CVE-2024-20039,0,0,16957c5f03c6deb27e91c56e5a56c47ab9ce0361bbd04c3b1e9fc45aae937591,2024-08-01T15:35:05.340000
|
CVE-2024-20039,0,0,16957c5f03c6deb27e91c56e5a56c47ab9ce0361bbd04c3b1e9fc45aae937591,2024-08-01T15:35:05.340000
|
||||||
CVE-2024-2004,0,0,306db60d89047f410d6d61c78e80dc7bb4c98731b18731d539f0ad8a070bfc68,2024-07-30T02:15:05.320000
|
CVE-2024-2004,0,0,306db60d89047f410d6d61c78e80dc7bb4c98731b18731d539f0ad8a070bfc68,2024-07-30T02:15:05.320000
|
||||||
@ -244594,7 +244594,7 @@ CVE-2024-2239,0,0,62d5946fcfafb2a4be7efadc9b7155219cc610ca4673c610a784dbbc3d091b
|
|||||||
CVE-2024-22390,0,0,55902feb124ae1975588cd87c6024bd399658d0d39667fda823793e05c4f62c0,2024-07-03T01:47:16.433000
|
CVE-2024-22390,0,0,55902feb124ae1975588cd87c6024bd399658d0d39667fda823793e05c4f62c0,2024-07-03T01:47:16.433000
|
||||||
CVE-2024-22391,0,0,1f24cf22f6c35797cf3f1b5f513aeb27d6c9ee9188ababd3d8b06daf33275477,2024-05-05T03:15:06.950000
|
CVE-2024-22391,0,0,1f24cf22f6c35797cf3f1b5f513aeb27d6c9ee9188ababd3d8b06daf33275477,2024-05-05T03:15:06.950000
|
||||||
CVE-2024-22393,0,0,708a22f5d3d86e394b7bd57dc98253e578e5dadb2c4096ced276d5893ef994b3,2024-08-01T13:46:55.723000
|
CVE-2024-22393,0,0,708a22f5d3d86e394b7bd57dc98253e578e5dadb2c4096ced276d5893ef994b3,2024-08-01T13:46:55.723000
|
||||||
CVE-2024-22394,0,0,ff5d094c82b627ed23cbc9e3d21e923a656eaed78e78037950e31bab38d65a83,2024-02-14T21:46:40.537000
|
CVE-2024-22394,0,1,2d2cacf44303c3f2d5173aeda14462e9b46618509e14fff72aa5e0f1e00e04f1,2024-08-22T19:35:11.720000
|
||||||
CVE-2024-22395,0,0,0d29784f93066fed6298e77c63a9a7ba15d287ad4907fe05e0ebf699a961fc21,2024-02-26T13:42:22.567000
|
CVE-2024-22395,0,0,0d29784f93066fed6298e77c63a9a7ba15d287ad4907fe05e0ebf699a961fc21,2024-02-26T13:42:22.567000
|
||||||
CVE-2024-22396,0,0,a5f00b94b83832b467db4300982cd3b6b686890c80cea01a13cc610352a5b12f,2024-07-03T01:47:17.270000
|
CVE-2024-22396,0,0,a5f00b94b83832b467db4300982cd3b6b686890c80cea01a13cc610352a5b12f,2024-07-03T01:47:17.270000
|
||||||
CVE-2024-22397,0,0,a22476279a0935a827e77ac005c3f79785c215cd6755d834d6f6f936f670c7bd,2024-03-14T12:52:09.877000
|
CVE-2024-22397,0,0,a22476279a0935a827e77ac005c3f79785c215cd6755d834d6f6f936f670c7bd,2024-03-14T12:52:09.877000
|
||||||
@ -244710,7 +244710,7 @@ CVE-2024-22569,0,0,709461d4796d213733f83973d7bcb39ae1034c99e9f028bded13074174036
|
|||||||
CVE-2024-2257,0,0,87856c3d2c0879cb041162bfc2d43d1a962975cb88c7d659c694453442f173d3,2024-07-03T01:53:07.027000
|
CVE-2024-2257,0,0,87856c3d2c0879cb041162bfc2d43d1a962975cb88c7d659c694453442f173d3,2024-07-03T01:53:07.027000
|
||||||
CVE-2024-22570,0,0,ff1b02be80dc9b74eb41974349d357529a516d7a6b80d2e4f2e7a5ada4f115ed,2024-02-02T23:32:46.897000
|
CVE-2024-22570,0,0,ff1b02be80dc9b74eb41974349d357529a516d7a6b80d2e4f2e7a5ada4f115ed,2024-02-02T23:32:46.897000
|
||||||
CVE-2024-2258,0,0,c494b8257d2f25d655eb6c978d87037350b24fb5e6a25d746bcf4e3ede80c89a,2024-04-29T12:42:03.667000
|
CVE-2024-2258,0,0,c494b8257d2f25d655eb6c978d87037350b24fb5e6a25d746bcf4e3ede80c89a,2024-04-29T12:42:03.667000
|
||||||
CVE-2024-22588,0,0,8bc5ffa2d82b0a2b5c7a4f7b05618c8edfe047109115070d834077f2cb63d9ca,2024-05-24T18:09:20.027000
|
CVE-2024-22588,0,1,a256e02887a23b217209241f70470c3ebdd9d466eea5d17713c72f3f04119775,2024-08-22T19:35:11.923000
|
||||||
CVE-2024-2259,0,0,47e9716e08a8a64152636e816d65e3ceba79ed2969d2637cad811811cd82755b,2024-08-13T12:58:25.437000
|
CVE-2024-2259,0,0,47e9716e08a8a64152636e816d65e3ceba79ed2969d2637cad811811cd82755b,2024-08-13T12:58:25.437000
|
||||||
CVE-2024-22590,0,0,2265223fce93787a4f3c35c5166069376211edf7fda5f6fe38dcbb266d997cfa,2024-05-28T17:11:55.903000
|
CVE-2024-22590,0,0,2265223fce93787a4f3c35c5166069376211edf7fda5f6fe38dcbb266d997cfa,2024-05-28T17:11:55.903000
|
||||||
CVE-2024-22591,0,0,70771714261423b75efa32d9aeb9ee1dd7955f2ff659f39ff329504c4eb8516f,2024-01-20T18:49:47.907000
|
CVE-2024-22591,0,0,70771714261423b75efa32d9aeb9ee1dd7955f2ff659f39ff329504c4eb8516f,2024-01-20T18:49:47.907000
|
||||||
@ -244892,7 +244892,7 @@ CVE-2024-2306,0,0,dba4619c77c06715e90d6a0a9c40f646be88098100eb784089d749ef57adff
|
|||||||
CVE-2024-23060,0,0,c533a2c3ab7879cb6341107bf55fb347921b4dcfd1771c35cc46c295fffc3384,2024-01-18T15:17:35.587000
|
CVE-2024-23060,0,0,c533a2c3ab7879cb6341107bf55fb347921b4dcfd1771c35cc46c295fffc3384,2024-01-18T15:17:35.587000
|
||||||
CVE-2024-23061,0,0,4bc85ee93751bdf2ecee1ac20f811b6d9a6f53cf85093d58751326cdb25cc0ec,2024-01-18T15:18:14.357000
|
CVE-2024-23061,0,0,4bc85ee93751bdf2ecee1ac20f811b6d9a6f53cf85093d58751326cdb25cc0ec,2024-01-18T15:18:14.357000
|
||||||
CVE-2024-2307,0,0,6e1c015f3d6c569a19e33c3b29b1ee5858f1aa7b73f614547925fd730d9ad323,2024-05-22T17:16:14.610000
|
CVE-2024-2307,0,0,6e1c015f3d6c569a19e33c3b29b1ee5858f1aa7b73f614547925fd730d9ad323,2024-05-22T17:16:14.610000
|
||||||
CVE-2024-23076,0,0,3755509bf8827817934da61e08729c2a885d027bcd7311729b31f1394b062b4a,2024-08-01T23:15:39.920000
|
CVE-2024-23076,0,1,8b4a3aa99e4b0016eb04a2f21af25c778dfbd8defa93aacee4f93410e13a8292,2024-08-22T19:35:12.810000
|
||||||
CVE-2024-23077,0,0,8f63dd6db7b5e7fcb60e699216bda5b62808ca284359f0bf54d6092ff16b4456,2024-08-21T14:35:02.117000
|
CVE-2024-23077,0,0,8f63dd6db7b5e7fcb60e699216bda5b62808ca284359f0bf54d6092ff16b4456,2024-08-21T14:35:02.117000
|
||||||
CVE-2024-23078,0,0,ee4cbf2c8fa0612860e33eb58b6ee83f820a866a5cff0b624d94739f87f4098c,2024-08-01T23:15:40.070000
|
CVE-2024-23078,0,0,ee4cbf2c8fa0612860e33eb58b6ee83f820a866a5cff0b624d94739f87f4098c,2024-08-01T23:15:40.070000
|
||||||
CVE-2024-23079,0,0,0ebc4dd979380ec9ace5c9105776106a2e5250b5f5ea58853bd0c8da0ac1d128,2024-08-05T14:15:34.510000
|
CVE-2024-23079,0,0,0ebc4dd979380ec9ace5c9105776106a2e5250b5f5ea58853bd0c8da0ac1d128,2024-08-05T14:15:34.510000
|
||||||
@ -245201,8 +245201,8 @@ CVE-2024-23463,0,0,3757d1676f1ef0efc7fd06c5dbfd1e77b5a81f192ccd6411055b5756d9898
|
|||||||
CVE-2024-23464,0,0,f96ace951d186b2988bc125fdea8c86f0397bed95b21593fc51223e1b64bb834,2024-08-07T21:23:59.990000
|
CVE-2024-23464,0,0,f96ace951d186b2988bc125fdea8c86f0397bed95b21593fc51223e1b64bb834,2024-08-07T21:23:59.990000
|
||||||
CVE-2024-23465,0,0,a4c1ec35f04e9fdf474cd87b3c2aafdeacdae5a8eab83da2bfa5a53b38af34f6,2024-07-18T12:28:43.707000
|
CVE-2024-23465,0,0,a4c1ec35f04e9fdf474cd87b3c2aafdeacdae5a8eab83da2bfa5a53b38af34f6,2024-07-18T12:28:43.707000
|
||||||
CVE-2024-23466,0,0,c827b69aa8ff2c2472dcf3ed2eaa36e10a05c679d817d0cf5ef1324ef9e4ddf6,2024-08-22T15:23:31.480000
|
CVE-2024-23466,0,0,c827b69aa8ff2c2472dcf3ed2eaa36e10a05c679d817d0cf5ef1324ef9e4ddf6,2024-08-22T15:23:31.480000
|
||||||
CVE-2024-23467,0,1,0f3812c8027e2b1a0387ae084b54a312746a6f4208c9fd471e82159f817c624e,2024-08-22T16:01:54.223000
|
CVE-2024-23467,0,0,0f3812c8027e2b1a0387ae084b54a312746a6f4208c9fd471e82159f817c624e,2024-08-22T16:01:54.223000
|
||||||
CVE-2024-23468,0,1,e8765a070e032d74be82ef4378840bde9abdf40be241610e53dac176bf3a85a0,2024-08-22T16:00:38.870000
|
CVE-2024-23468,0,0,e8765a070e032d74be82ef4378840bde9abdf40be241610e53dac176bf3a85a0,2024-08-22T16:00:38.870000
|
||||||
CVE-2024-23469,0,0,05b78d88e5a9305969bd12b72fe36d95687a40703caf5cbe6f8f531283cef4a1,2024-07-18T12:28:43.707000
|
CVE-2024-23469,0,0,05b78d88e5a9305969bd12b72fe36d95687a40703caf5cbe6f8f531283cef4a1,2024-07-18T12:28:43.707000
|
||||||
CVE-2024-2347,0,0,639c42723b33042f97a80a4a3a2bc3546c4d216290aee32968515b2758b6d986,2024-04-10T13:23:38.787000
|
CVE-2024-2347,0,0,639c42723b33042f97a80a4a3a2bc3546c4d216290aee32968515b2758b6d986,2024-04-10T13:23:38.787000
|
||||||
CVE-2024-23470,0,0,21f957f5830ba7f3cb8f0b5cba3b3cc643e8f559e292c381232ffecb2aac58c4,2024-07-18T12:28:43.707000
|
CVE-2024-23470,0,0,21f957f5830ba7f3cb8f0b5cba3b3cc643e8f559e292c381232ffecb2aac58c4,2024-07-18T12:28:43.707000
|
||||||
@ -245692,7 +245692,7 @@ CVE-2024-2412,0,0,5eb3e084c15080bce88063a202edef708e748222aace75a3232d4d6b3f448d
|
|||||||
CVE-2024-2413,0,0,bcce963a476349e5182596e9d4a6b2abe57a4b3c6a7908768bff05824ae06fd2,2024-03-13T12:33:51.697000
|
CVE-2024-2413,0,0,bcce963a476349e5182596e9d4a6b2abe57a4b3c6a7908768bff05824ae06fd2,2024-03-13T12:33:51.697000
|
||||||
CVE-2024-24130,0,0,3711a524e7aaabb83e56488f8a369c6a69a909641f1667882c43871af5a9c3a7,2024-07-03T01:48:12.487000
|
CVE-2024-24130,0,0,3711a524e7aaabb83e56488f8a369c6a69a909641f1667882c43871af5a9c3a7,2024-07-03T01:48:12.487000
|
||||||
CVE-2024-24131,0,0,8a34d68fbe59589499b97058e1cc5501abd20303216cfd95ea1911115864db68,2024-02-12T14:32:43.777000
|
CVE-2024-24131,0,0,8a34d68fbe59589499b97058e1cc5501abd20303216cfd95ea1911115864db68,2024-02-12T14:32:43.777000
|
||||||
CVE-2024-24133,0,0,8b1f520de46f6c7b356b19920cc93077fbf5256bc96dbbdce2d9687915bffd46,2024-08-02T00:15:15.980000
|
CVE-2024-24133,0,1,d949da0e1ac241998db2e8167fd5857f2e74feefba8bfda0856fa1bf8007e505,2024-08-22T19:35:13.840000
|
||||||
CVE-2024-24134,0,0,60e84ab02df9a5eebdd98ea4a5db40e2dea9f01666850cc98731ba000a572158,2024-02-22T03:36:42.397000
|
CVE-2024-24134,0,0,60e84ab02df9a5eebdd98ea4a5db40e2dea9f01666850cc98731ba000a572158,2024-02-22T03:36:42.397000
|
||||||
CVE-2024-24135,0,0,977ca85955d4bb50888ba44be3ff5724d7a85958ba21e73ab9d084c94066f20a,2024-02-22T03:39:23.233000
|
CVE-2024-24135,0,0,977ca85955d4bb50888ba44be3ff5724d7a85958ba21e73ab9d084c94066f20a,2024-02-22T03:39:23.233000
|
||||||
CVE-2024-24136,0,0,4e52a4e0c3e2bcd6af5c4faaf3a70948e406b5b2d6cac3691257ba4bddd05547,2024-02-02T23:32:58.107000
|
CVE-2024-24136,0,0,4e52a4e0c3e2bcd6af5c4faaf3a70948e406b5b2d6cac3691257ba4bddd05547,2024-02-02T23:32:58.107000
|
||||||
@ -245828,7 +245828,7 @@ CVE-2024-2447,0,0,6305c2b7cb7de274154ca47c393d8343e28d151abe5d313800ccc312259a26
|
|||||||
CVE-2024-24470,0,0,16e381fa0a431abc8440a13d798da189428114544eb84ba0cdf0c6b44081e4ca,2024-02-06T21:07:34.547000
|
CVE-2024-24470,0,0,16e381fa0a431abc8440a13d798da189428114544eb84ba0cdf0c6b44081e4ca,2024-02-06T21:07:34.547000
|
||||||
CVE-2024-24474,0,0,7e9666bf8baf4869b81de15eea7d74142cdbcec829ea181976812d1817d9f045,2024-08-15T21:35:04.887000
|
CVE-2024-24474,0,0,7e9666bf8baf4869b81de15eea7d74142cdbcec829ea181976812d1817d9f045,2024-08-15T21:35:04.887000
|
||||||
CVE-2024-24475,0,0,cc33da32b8386d85f2716db0b7573f224c2a2466da82581395da702e95a8ad4c,2024-02-21T01:15:07.890000
|
CVE-2024-24475,0,0,cc33da32b8386d85f2716db0b7573f224c2a2466da82581395da702e95a8ad4c,2024-02-21T01:15:07.890000
|
||||||
CVE-2024-24476,0,0,f4b1eaee12a3672aa3ce2076a41e7e21bf4ac04a6f045fb2b55db6f5bb90f517,2024-08-02T00:15:19.267000
|
CVE-2024-24476,0,1,35173e0759cbff63e7dc92d5e25f4cab09b39e59ddcae8323e62df958905df80,2024-08-22T18:35:04.910000
|
||||||
CVE-2024-24478,0,0,b94544886ad00605269b35b690b03335a5085810bb0290de0a4c36a28c5a785e,2024-08-02T00:15:19.350000
|
CVE-2024-24478,0,0,b94544886ad00605269b35b690b03335a5085810bb0290de0a4c36a28c5a785e,2024-08-02T00:15:19.350000
|
||||||
CVE-2024-24479,0,0,549c1faefc95446c73c237c8fc36405069121ac467e76d98310d7dcfb6901321,2024-08-02T00:15:19.433000
|
CVE-2024-24479,0,0,549c1faefc95446c73c237c8fc36405069121ac467e76d98310d7dcfb6901321,2024-08-02T00:15:19.433000
|
||||||
CVE-2024-2448,0,0,1625ab16b72103512d70f9dadaa1a93632daea1863fd2e539d584ce390412d31,2024-03-22T15:34:43.663000
|
CVE-2024-2448,0,0,1625ab16b72103512d70f9dadaa1a93632daea1863fd2e539d584ce390412d31,2024-03-22T15:34:43.663000
|
||||||
@ -246493,7 +246493,7 @@ CVE-2024-25469,0,0,c93aa28e3914b49b6c5094bb3a85adbe0a6d382b0bed611cf4ed2908051d4
|
|||||||
CVE-2024-2547,0,0,146fae91278ac89c915ff47054ab066cf474c37945462dcf0d1632a5cd39af51,2024-05-17T02:38:18.377000
|
CVE-2024-2547,0,0,146fae91278ac89c915ff47054ab066cf474c37945462dcf0d1632a5cd39af51,2024-05-17T02:38:18.377000
|
||||||
CVE-2024-2548,0,0,77bed2cbe868603341c5c4fe00286d759f5ff5a17e6112b21ff9565c6b1c1c8a,2024-06-07T14:56:05.647000
|
CVE-2024-2548,0,0,77bed2cbe868603341c5c4fe00286d759f5ff5a17e6112b21ff9565c6b1c1c8a,2024-06-07T14:56:05.647000
|
||||||
CVE-2024-25501,0,0,323095296ad9ad2b7b65354e8dc713fb0ff55c81a387332b25d6d222ed3321f1,2024-03-11T01:32:29.610000
|
CVE-2024-25501,0,0,323095296ad9ad2b7b65354e8dc713fb0ff55c81a387332b25d6d222ed3321f1,2024-03-11T01:32:29.610000
|
||||||
CVE-2024-25502,0,0,ae578fb4220918f5c79c04ddf94a1dcef1514713ad368fe6ddbcf4d062b5a31d,2024-02-16T13:38:00.047000
|
CVE-2024-25502,0,1,d9aa39f94cfb1820b327a0e3490f96eeb91b5ac2a113d9f7ad8c92fe65038e88,2024-08-22T19:35:15.140000
|
||||||
CVE-2024-25503,0,0,d18daea47533c0b519e93decb5b52383220a142cd875d19e67dca0b7259c8ef8,2024-08-19T20:35:07.610000
|
CVE-2024-25503,0,0,d18daea47533c0b519e93decb5b52383220a142cd875d19e67dca0b7259c8ef8,2024-08-19T20:35:07.610000
|
||||||
CVE-2024-25506,0,0,331fc2aa8008abcbe7529c8e1f902eaa8f01961e899bf76c0c02400b4802e463,2024-08-01T13:47:45.357000
|
CVE-2024-25506,0,0,331fc2aa8008abcbe7529c8e1f902eaa8f01961e899bf76c0c02400b4802e463,2024-08-01T13:47:45.357000
|
||||||
CVE-2024-25507,0,0,d01f5e6d07dd4234554e701d042eeba7ebff258fccd1723712b33d5ea82451cc,2024-07-03T01:48:51.430000
|
CVE-2024-25507,0,0,d01f5e6d07dd4234554e701d042eeba7ebff258fccd1723712b33d5ea82451cc,2024-07-03T01:48:51.430000
|
||||||
@ -246613,7 +246613,7 @@ CVE-2024-25648,0,0,43a3c9df6a9798012b99a2670068513af50de7590b4bfb346569d85e9cedf
|
|||||||
CVE-2024-25649,0,0,78e924f5d41e5f05e296cc03dc3adfffa64606ad0d931d33e585d324f935d2d4,2024-03-14T12:52:09.877000
|
CVE-2024-25649,0,0,78e924f5d41e5f05e296cc03dc3adfffa64606ad0d931d33e585d324f935d2d4,2024-03-14T12:52:09.877000
|
||||||
CVE-2024-2565,0,0,343041114de587054fc8697fd61433e361f1d5090f96a5bc5840cfbd0d3fa764,2024-05-17T02:38:19.613000
|
CVE-2024-2565,0,0,343041114de587054fc8697fd61433e361f1d5090f96a5bc5840cfbd0d3fa764,2024-05-17T02:38:19.613000
|
||||||
CVE-2024-25650,0,0,01debd251b64ab98dbfb6f9755755f4a861dcf15301c1f9d4cc42c00838c070f,2024-03-14T12:52:16.723000
|
CVE-2024-25650,0,0,01debd251b64ab98dbfb6f9755755f4a861dcf15301c1f9d4cc42c00838c070f,2024-03-14T12:52:16.723000
|
||||||
CVE-2024-25651,0,0,a546ba0f7fd025d784b6fc0e494427092f33a4e4e0e2d25861f67306b90b8ed4,2024-03-14T12:52:09.877000
|
CVE-2024-25651,0,1,141eb7237f8672075adb36d537e4b6bf696c6664fba30930784d19aa3662f69d,2024-08-22T19:35:16.053000
|
||||||
CVE-2024-25652,0,0,8c49426ba9ad9fd1e89e8e83a1eeefc3222cdf552830f48a0a9961a99880036c,2024-08-01T13:47:48.337000
|
CVE-2024-25652,0,0,8c49426ba9ad9fd1e89e8e83a1eeefc3222cdf552830f48a0a9961a99880036c,2024-08-01T13:47:48.337000
|
||||||
CVE-2024-25653,0,0,efdc6e1fd6bc3201845fb807790d436f1b5ea82ec4d74b3ef4678687414457cf,2024-03-14T12:52:09.877000
|
CVE-2024-25653,0,0,efdc6e1fd6bc3201845fb807790d436f1b5ea82ec4d74b3ef4678687414457cf,2024-03-14T12:52:09.877000
|
||||||
CVE-2024-25654,0,0,1d8c485b666617bf15e2be3bf3f059ab8542011fba9b3f67352ac0a3b72fec87,2024-03-19T13:26:46
|
CVE-2024-25654,0,0,1d8c485b666617bf15e2be3bf3f059ab8542011fba9b3f67352ac0a3b72fec87,2024-03-19T13:26:46
|
||||||
@ -246719,7 +246719,7 @@ CVE-2024-25847,0,0,768589b83f1428c67363b11073f1a1ed8713927725c83f5055ba58a636fde
|
|||||||
CVE-2024-25848,0,0,6c1bfa77711841ec03ded833f1894e9609b79f14cb4ec6bb43654b13a2cb7b3b,2024-03-08T14:02:57.420000
|
CVE-2024-25848,0,0,6c1bfa77711841ec03ded833f1894e9609b79f14cb4ec6bb43654b13a2cb7b3b,2024-03-08T14:02:57.420000
|
||||||
CVE-2024-25849,0,0,ff1448816af02e5feb5f816e4bcbbe340dd06d99e43025948714f4eb8f651531,2024-08-01T13:47:54.067000
|
CVE-2024-25849,0,0,ff1448816af02e5feb5f816e4bcbbe340dd06d99e43025948714f4eb8f651531,2024-08-01T13:47:54.067000
|
||||||
CVE-2024-2585,0,0,09f7de950868ec14db3e38701fc5881ee82655225ee04ef5941127f736832c98,2024-03-18T19:40:00.173000
|
CVE-2024-2585,0,0,09f7de950868ec14db3e38701fc5881ee82655225ee04ef5941127f736832c98,2024-03-18T19:40:00.173000
|
||||||
CVE-2024-25850,0,0,5af0f934ea484ec3ca1490c96924ef0aab7c5c7572c450b40cf4d9d726414295,2024-02-22T19:07:27.197000
|
CVE-2024-25850,0,1,9b8c642b39958e632d1cf5b6a4c613d6256616e4a43ffeb3ab8d505ab2755097,2024-08-22T19:35:16.957000
|
||||||
CVE-2024-25851,0,0,d67a62091ab95045024d9c69930163fc6933a08dd0957c710b2d2f48274fafad,2024-03-11T22:15:55.150000
|
CVE-2024-25851,0,0,d67a62091ab95045024d9c69930163fc6933a08dd0957c710b2d2f48274fafad,2024-03-11T22:15:55.150000
|
||||||
CVE-2024-25852,0,0,1d0753f6ef753fc5d1ef48013e91f716bd2a2109414419ba6e7c96f787b8b0b6,2024-08-14T20:35:06.957000
|
CVE-2024-25852,0,0,1d0753f6ef753fc5d1ef48013e91f716bd2a2109414419ba6e7c96f787b8b0b6,2024-08-14T20:35:06.957000
|
||||||
CVE-2024-25854,0,0,17ea666d7172d54584074846a82d44b7b8f164d46f64195f0b1bec22a7304545,2024-03-12T12:40:13.500000
|
CVE-2024-25854,0,0,17ea666d7172d54584074846a82d44b7b8f164d46f64195f0b1bec22a7304545,2024-03-12T12:40:13.500000
|
||||||
@ -248158,7 +248158,7 @@ CVE-2024-27474,0,0,4a390a0a495b528719cdfad3c5cdbeeb4b25b7052e56b9b2bf54d8bb9762d
|
|||||||
CVE-2024-27476,0,0,7a4663f499ee23e08c2a048515f5b6745ec9423d99e38efec54dd0ceaf59a3fa,2024-08-01T13:48:28.390000
|
CVE-2024-27476,0,0,7a4663f499ee23e08c2a048515f5b6745ec9423d99e38efec54dd0ceaf59a3fa,2024-08-01T13:48:28.390000
|
||||||
CVE-2024-27477,0,0,e0cd02f233cdafbc91249b5781d33c91da5035c970dc05ec11d6a3134871bf1b,2024-04-10T19:49:51.183000
|
CVE-2024-27477,0,0,e0cd02f233cdafbc91249b5781d33c91da5035c970dc05ec11d6a3134871bf1b,2024-04-10T19:49:51.183000
|
||||||
CVE-2024-2748,0,0,a5981f926316e727f1bb9455ec311db801fabdd6fc8350d94a1fb8a2edb4a89a,2024-03-21T12:58:51.093000
|
CVE-2024-2748,0,0,a5981f926316e727f1bb9455ec311db801fabdd6fc8350d94a1fb8a2edb4a89a,2024-03-21T12:58:51.093000
|
||||||
CVE-2024-27488,0,1,bfdf15a6c63aa1a91ac337c65bb16cee3d64b1e4a0cba0b13044ecc27d04a86f,2024-08-22T17:35:01.813000
|
CVE-2024-27488,0,0,bfdf15a6c63aa1a91ac337c65bb16cee3d64b1e4a0cba0b13044ecc27d04a86f,2024-08-22T17:35:01.813000
|
||||||
CVE-2024-27489,0,0,fae6db07f37367cac095792be5d6f831e097964d9738fbc71b73f8a7056182d5,2024-08-01T13:48:29.187000
|
CVE-2024-27489,0,0,fae6db07f37367cac095792be5d6f831e097964d9738fbc71b73f8a7056182d5,2024-08-01T13:48:29.187000
|
||||||
CVE-2024-2749,0,0,1d41dd2f9a8ec812d743eb2503d3459b40e5b74ef406549f3f22535f8f1ae124,2024-07-03T01:53:31.040000
|
CVE-2024-2749,0,0,1d41dd2f9a8ec812d743eb2503d3459b40e5b74ef406549f3f22535f8f1ae124,2024-07-03T01:53:31.040000
|
||||||
CVE-2024-27497,0,0,2405900a7ea943326a9606fe19fb79f48e8cc6663a4627c665d5498ade7bedff,2024-08-16T16:35:04.793000
|
CVE-2024-27497,0,0,2405900a7ea943326a9606fe19fb79f48e8cc6663a4627c665d5498ade7bedff,2024-08-16T16:35:04.793000
|
||||||
@ -248170,7 +248170,7 @@ CVE-2024-2751,0,0,e0380b41cfa9755453969621f95a77af0ea62dd5295ce9849e6c35313a94c3
|
|||||||
CVE-2024-27515,0,0,3f190b29b377831cc24590b4a1f853471b234f4a1c7e2d52c2e51f41a12a57d4,2024-08-05T18:35:12.953000
|
CVE-2024-27515,0,0,3f190b29b377831cc24590b4a1f853471b234f4a1c7e2d52c2e51f41a12a57d4,2024-08-05T18:35:12.953000
|
||||||
CVE-2024-27516,0,0,3dc18d3982e9b3ac9d2998b4f4d3df66c427d5d211641c6aee2d4c423b9aacd1,2024-07-03T01:50:41.420000
|
CVE-2024-27516,0,0,3dc18d3982e9b3ac9d2998b4f4d3df66c427d5d211641c6aee2d4c423b9aacd1,2024-07-03T01:50:41.420000
|
||||||
CVE-2024-27517,0,0,5e97f075b436a5c8f2e51d28a398abf4c938438e6f3743132df7b78060b7cc66,2024-02-29T13:49:29.390000
|
CVE-2024-27517,0,0,5e97f075b436a5c8f2e51d28a398abf4c938438e6f3743132df7b78060b7cc66,2024-02-29T13:49:29.390000
|
||||||
CVE-2024-27518,0,0,d812237f641178f6bc686b6c229d69abdd7eae6ab50b55b6efd5c619ffb68b42,2024-04-30T13:11:16.690000
|
CVE-2024-27518,0,1,eee44445b24d086f58ae13c836362c174731b2fe04eb60975982bae1d572cb19,2024-08-22T19:35:18.243000
|
||||||
CVE-2024-2752,0,0,9ac4a8690eeceffd759ff2fb7b55e32f8cb8bb4afb752110bdafa62b8f4bb686,2024-05-02T18:00:37.360000
|
CVE-2024-2752,0,0,9ac4a8690eeceffd759ff2fb7b55e32f8cb8bb4afb752110bdafa62b8f4bb686,2024-05-02T18:00:37.360000
|
||||||
CVE-2024-27521,0,0,142655bf7422b3c81bdc37fb7ef4329756d07238f339af47f3bda39ff16ed820,2024-08-09T21:35:03.300000
|
CVE-2024-27521,0,0,142655bf7422b3c81bdc37fb7ef4329756d07238f339af47f3bda39ff16ed820,2024-08-09T21:35:03.300000
|
||||||
CVE-2024-2753,0,0,af8f0bf6c002c3e1db46c2cc4926e36d1e1afb83468ed827c9e47555532f1bd6,2024-04-04T12:48:41.700000
|
CVE-2024-2753,0,0,af8f0bf6c002c3e1db46c2cc4926e36d1e1afb83468ed827c9e47555532f1bd6,2024-04-04T12:48:41.700000
|
||||||
@ -248189,7 +248189,7 @@ CVE-2024-27568,0,0,30a69742845b1488044d187ab76af1144dc7e9904fcf2c872ae36954db40b
|
|||||||
CVE-2024-27569,0,0,5c0a695bc7a1524024f1806d6c6d1550c657ccc9dd1fad298805953a7e078574,2024-08-19T20:35:08.430000
|
CVE-2024-27569,0,0,5c0a695bc7a1524024f1806d6c6d1550c657ccc9dd1fad298805953a7e078574,2024-08-19T20:35:08.430000
|
||||||
CVE-2024-2757,0,0,4c422aba4be6a9a5da2652e2a836599ffe438bdae4eb45bb7067f46f34ffd36e,2024-07-03T01:53:32.100000
|
CVE-2024-2757,0,0,4c422aba4be6a9a5da2652e2a836599ffe438bdae4eb45bb7067f46f34ffd36e,2024-07-03T01:53:32.100000
|
||||||
CVE-2024-27570,0,0,8d5d62ec43c878f6bf09a9b5316375d908c11d0b5ec079a9674eb8a4339f1ea2,2024-03-01T15:23:36.177000
|
CVE-2024-27570,0,0,8d5d62ec43c878f6bf09a9b5316375d908c11d0b5ec079a9674eb8a4339f1ea2,2024-03-01T15:23:36.177000
|
||||||
CVE-2024-27571,0,0,ff0b0bcf3cf1fe0befdff4abfbb2b521b733f994207f9d68707861baf05a3a26,2024-03-01T15:23:36.177000
|
CVE-2024-27571,0,1,ac088f7b64ad71ffe595852b417cdbab48f16b4154eb8d90ddb111c8e2f63030,2024-08-22T19:35:19.107000
|
||||||
CVE-2024-27572,0,0,021a88f3c1ae2bf66877708ae71a24ab68a5a10fe16311950a18df580d61c782,2024-08-01T13:48:32.977000
|
CVE-2024-27572,0,0,021a88f3c1ae2bf66877708ae71a24ab68a5a10fe16311950a18df580d61c782,2024-08-01T13:48:32.977000
|
||||||
CVE-2024-27574,0,0,3445d7e232fea473b297543f2639b454fd942ac9a4758abe8e2e7d31ea60e498,2024-07-03T01:50:42.303000
|
CVE-2024-27574,0,0,3445d7e232fea473b297543f2639b454fd942ac9a4758abe8e2e7d31ea60e498,2024-07-03T01:50:42.303000
|
||||||
CVE-2024-27575,0,0,be8794a9d53d194bc575e7dee32b34180e95b0c9ca647d9bec212ab94e155297,2024-07-03T01:50:43.093000
|
CVE-2024-27575,0,0,be8794a9d53d194bc575e7dee32b34180e95b0c9ca647d9bec212ab94e155297,2024-07-03T01:50:43.093000
|
||||||
@ -248791,7 +248791,7 @@ CVE-2024-28434,0,0,ec4590de9963214229aa112f1c2ad2fa85380f4041b7dae287eb880ebccdc
|
|||||||
CVE-2024-28435,0,0,4c02f96d0bdc1a14461e768ad92ad2becc695cfb2c978e4da67bd0167ce78dc9,2024-03-25T16:43:06.137000
|
CVE-2024-28435,0,0,4c02f96d0bdc1a14461e768ad92ad2becc695cfb2c978e4da67bd0167ce78dc9,2024-03-25T16:43:06.137000
|
||||||
CVE-2024-28436,0,0,f0499ab721c50eb1235cd653eb0433c4817c1b654cfff253ce1e58bd858ba26c,2024-04-22T19:24:06.727000
|
CVE-2024-28436,0,0,f0499ab721c50eb1235cd653eb0433c4817c1b654cfff253ce1e58bd858ba26c,2024-04-22T19:24:06.727000
|
||||||
CVE-2024-2844,0,0,894b7bd298d78fe3d2c3a3679ae19f19f64e2dda7f94e19d66505e36627d9d53,2024-03-29T12:45:02.937000
|
CVE-2024-2844,0,0,894b7bd298d78fe3d2c3a3679ae19f19f64e2dda7f94e19d66505e36627d9d53,2024-03-29T12:45:02.937000
|
||||||
CVE-2024-28441,0,0,9a9f6f2c4260b8aae3ecfbe0c03e98fa14418d977037c8b88369db7de3e12104,2024-03-22T12:45:36.130000
|
CVE-2024-28441,0,1,98f673e8e169ee952dddca79ea78c3ead96fc2eb99b2c0a11068e947c06c44d4,2024-08-22T18:35:05.960000
|
||||||
CVE-2024-28442,0,0,b5d378d7bf249d8932b5ef67495fddcb797bea8509e4f1706eab874d95ebf375,2024-08-05T17:35:10
|
CVE-2024-28442,0,0,b5d378d7bf249d8932b5ef67495fddcb797bea8509e4f1706eab874d95ebf375,2024-08-05T17:35:10
|
||||||
CVE-2024-28446,0,0,5cb6c3ad6343c7605d7288fa21a1a2b4ecbb6433ed1975b50505c4c4841c4770,2024-03-19T13:26:46
|
CVE-2024-28446,0,0,5cb6c3ad6343c7605d7288fa21a1a2b4ecbb6433ed1975b50505c4c4841c4770,2024-03-19T13:26:46
|
||||||
CVE-2024-28447,0,0,96efc6b45fb26dce648a4b187b204c486498ef994105e9fd2065b17d0a61b2f5,2024-08-20T21:35:02.770000
|
CVE-2024-28447,0,0,96efc6b45fb26dce648a4b187b204c486498ef994105e9fd2065b17d0a61b2f5,2024-08-20T21:35:02.770000
|
||||||
@ -249430,7 +249430,7 @@ CVE-2024-29473,0,0,8245ba1b7b6cfc2fd736894d074e12778ffb6419be24c78b4098d989642f6
|
|||||||
CVE-2024-29474,0,0,1e6da7c761ee3de98f7b759f0097c1b775ea91f11305f8a90e1129070ffdd028,2024-08-02T20:35:28.270000
|
CVE-2024-29474,0,0,1e6da7c761ee3de98f7b759f0097c1b775ea91f11305f8a90e1129070ffdd028,2024-08-02T20:35:28.270000
|
||||||
CVE-2024-29477,0,0,95dcae9bc8061c5d58cf2b63e167bb4091735292e7ec34284f04e5b395f25cbd,2024-04-03T12:38:04.840000
|
CVE-2024-29477,0,0,95dcae9bc8061c5d58cf2b63e167bb4091735292e7ec34284f04e5b395f25cbd,2024-04-03T12:38:04.840000
|
||||||
CVE-2024-2948,0,0,2331d78509f1f3893daaecaf2db5091913c1d64d9406e6199bfd4abbc5caa395,2024-04-01T01:12:59.077000
|
CVE-2024-2948,0,0,2331d78509f1f3893daaecaf2db5091913c1d64d9406e6199bfd4abbc5caa395,2024-04-01T01:12:59.077000
|
||||||
CVE-2024-29489,0,0,a096f3af707632e4fb911c6cd8398eea6fc361d8f6afa884b110f6feb7c61845,2024-03-29T12:45:02.937000
|
CVE-2024-29489,0,1,2cd7b967a834ebb80ab1382ec368c5b1d73b4dff18a9c5fbfabbbbccd3dff0ee,2024-08-22T19:35:20.067000
|
||||||
CVE-2024-2949,0,0,741e52e7909be6687101b8ec7aa347d81d5d7ec2a7c6c782e512ff2bce69b7e4,2024-04-08T18:48:40.217000
|
CVE-2024-2949,0,0,741e52e7909be6687101b8ec7aa347d81d5d7ec2a7c6c782e512ff2bce69b7e4,2024-04-08T18:48:40.217000
|
||||||
CVE-2024-29499,0,0,0df4c342550eca93c20715245870721539a608c42f67ae6ae86966560d5e9723,2024-07-03T01:52:28.783000
|
CVE-2024-29499,0,0,0df4c342550eca93c20715245870721539a608c42f67ae6ae86966560d5e9723,2024-07-03T01:52:28.783000
|
||||||
CVE-2024-2950,0,0,596af42449f28aff5b2c79c90b770bb4c97ffb9bc969aaf5cc4ba262b42d972f,2024-04-08T18:49:25.863000
|
CVE-2024-2950,0,0,596af42449f28aff5b2c79c90b770bb4c97ffb9bc969aaf5cc4ba262b42d972f,2024-04-08T18:49:25.863000
|
||||||
@ -249484,7 +249484,7 @@ CVE-2024-29732,0,0,e30fc06180575c1796869bb0b4fa02497c40c6d7939d34aba0362f12c2710
|
|||||||
CVE-2024-29733,0,0,0811972ef853088b726fd2b07316244d1d628e55e310910ac8174bd65d097612,2024-07-03T01:52:30.320000
|
CVE-2024-29733,0,0,0811972ef853088b726fd2b07316244d1d628e55e310910ac8174bd65d097612,2024-07-03T01:52:30.320000
|
||||||
CVE-2024-29734,0,0,65bb1ba04f673142d3081922c5e4533cd4af140db3cdfbbce09ab73848e3b6c3,2024-04-03T12:38:04.840000
|
CVE-2024-29734,0,0,65bb1ba04f673142d3081922c5e4533cd4af140db3cdfbbce09ab73848e3b6c3,2024-04-03T12:38:04.840000
|
||||||
CVE-2024-29735,0,0,1c27e1fe9dbb50907062f908fab6fbb55a16239f685d6be40b04c11200e2a361,2024-05-01T19:15:23.573000
|
CVE-2024-29735,0,0,1c27e1fe9dbb50907062f908fab6fbb55a16239f685d6be40b04c11200e2a361,2024-05-01T19:15:23.573000
|
||||||
CVE-2024-29736,0,1,5b51c834110c4ab0fba6db5636bf570f371288eeb5e87d8fc00ae6c266b9181d,2024-08-22T17:31:48.980000
|
CVE-2024-29736,0,0,5b51c834110c4ab0fba6db5636bf570f371288eeb5e87d8fc00ae6c266b9181d,2024-08-22T17:31:48.980000
|
||||||
CVE-2024-29737,0,0,773c8720c44afb54cbbd0c12354c2f0a043cfa72e5f75a21b0108ef944307c03,2024-08-01T13:49:34.853000
|
CVE-2024-29737,0,0,773c8720c44afb54cbbd0c12354c2f0a043cfa72e5f75a21b0108ef944307c03,2024-08-01T13:49:34.853000
|
||||||
CVE-2024-29738,0,0,1c3e1564461702d87cd213d777f3523814ac3c73b5cc61bff5ae595e06e0fbeb,2024-04-08T18:49:25.863000
|
CVE-2024-29738,0,0,1c3e1564461702d87cd213d777f3523814ac3c73b5cc61bff5ae595e06e0fbeb,2024-04-08T18:49:25.863000
|
||||||
CVE-2024-29739,0,0,e1057fb9115257c9cc112890add5aab29e2addabc474164aa5dc49dc015af77f,2024-08-21T14:35:06.390000
|
CVE-2024-29739,0,0,e1057fb9115257c9cc112890add5aab29e2addabc474164aa5dc49dc015af77f,2024-08-21T14:35:06.390000
|
||||||
@ -250287,7 +250287,7 @@ CVE-2024-30559,0,0,7bb411cba178991a1e753b9b344d96e6c257adaaf46f6d70bda139a8b3d1f
|
|||||||
CVE-2024-3056,0,0,c33c3028618acd56970d704007cc8cb0c1300b261807cf531015dd6f1b2728df,2024-08-05T12:41:45.957000
|
CVE-2024-3056,0,0,c33c3028618acd56970d704007cc8cb0c1300b261807cf531015dd6f1b2728df,2024-08-05T12:41:45.957000
|
||||||
CVE-2024-30560,0,0,29358f4cfba46b880efc18b382f49655b8da1f57de09ea2f3b221ee017e11a93,2024-05-14T15:23:17.730000
|
CVE-2024-30560,0,0,29358f4cfba46b880efc18b382f49655b8da1f57de09ea2f3b221ee017e11a93,2024-05-14T15:23:17.730000
|
||||||
CVE-2024-30561,0,0,317571b22962e8d6e5d0cb62ac3952d7d76cb14c6191157ad5ef89ba7149e860,2024-04-01T01:12:59.077000
|
CVE-2024-30561,0,0,317571b22962e8d6e5d0cb62ac3952d7d76cb14c6191157ad5ef89ba7149e860,2024-04-01T01:12:59.077000
|
||||||
CVE-2024-30564,0,1,5b72a00e1c04b6fa93ffaa761b95fbd264190bcd29898850fc62b4910b45e5e3,2024-08-22T16:35:01.923000
|
CVE-2024-30564,0,0,5b72a00e1c04b6fa93ffaa761b95fbd264190bcd29898850fc62b4910b45e5e3,2024-08-22T16:35:01.923000
|
||||||
CVE-2024-30565,0,0,3bd2e856e06d3e3fe9f747497d3ea242e07c951fa4c500c8b76a56b8bcb712e0,2024-04-04T12:48:41.700000
|
CVE-2024-30565,0,0,3bd2e856e06d3e3fe9f747497d3ea242e07c951fa4c500c8b76a56b8bcb712e0,2024-04-04T12:48:41.700000
|
||||||
CVE-2024-30567,0,0,f2a4d1211b738fa363bb6c48ea72578b3372d81c87f66a2aa1c7f2df3ee8bec0,2024-08-01T13:50:09.870000
|
CVE-2024-30567,0,0,f2a4d1211b738fa363bb6c48ea72578b3372d81c87f66a2aa1c7f2df3ee8bec0,2024-08-01T13:50:09.870000
|
||||||
CVE-2024-30568,0,0,44c25f2577fa5438de7f51a90d4ade231e906e1e0fac9c82f2eeb8db8041cb68,2024-08-21T15:35:06.717000
|
CVE-2024-30568,0,0,44c25f2577fa5438de7f51a90d4ade231e906e1e0fac9c82f2eeb8db8041cb68,2024-08-21T15:35:06.717000
|
||||||
@ -250427,7 +250427,7 @@ CVE-2024-3080,0,0,6986301309c9922bc02fa19392bc6067c49e953b2f624eb66756f4ffea7fbe
|
|||||||
CVE-2024-30800,0,0,c159abf1d20ef9221dca0ce07749c41b848d269f6d72d244107e748c6895169d,2024-08-01T13:50:26.523000
|
CVE-2024-30800,0,0,c159abf1d20ef9221dca0ce07749c41b848d269f6d72d244107e748c6895169d,2024-08-01T13:50:26.523000
|
||||||
CVE-2024-30801,0,0,79037a49ae58d0454d89f94ba313d584f276e2894821b324a5e75dde95008219,2024-08-15T17:35:05.230000
|
CVE-2024-30801,0,0,79037a49ae58d0454d89f94ba313d584f276e2894821b324a5e75dde95008219,2024-08-15T17:35:05.230000
|
||||||
CVE-2024-30802,0,0,37683b49f88fa426fcec7397572b9c76113c55e23f5ab472e56f33731e38df96,2024-05-14T16:13:02.773000
|
CVE-2024-30802,0,0,37683b49f88fa426fcec7397572b9c76113c55e23f5ab472e56f33731e38df96,2024-05-14T16:13:02.773000
|
||||||
CVE-2024-30804,0,0,c8ff423e3540a19b0faa1f1a1a616d5872ea6369d2742217c6f7bd92e390eb83,2024-04-29T12:42:03.667000
|
CVE-2024-30804,0,1,0f43430d25009eadae7caa97b23b35ddd86648f9eae82b9b828a91f9ed0e4773,2024-08-22T19:35:22.260000
|
||||||
CVE-2024-30806,0,0,69d03451e34851319586e66efe84d4aaaa1374f82acfc9b49736cd881cce5ca7,2024-04-02T20:31:58.463000
|
CVE-2024-30806,0,0,69d03451e34851319586e66efe84d4aaaa1374f82acfc9b49736cd881cce5ca7,2024-04-02T20:31:58.463000
|
||||||
CVE-2024-30807,0,0,4152651982bff689cfa963c375e94b647d4d42e48408c3cb0b93ed4cc183ecd1,2024-04-02T20:31:58.463000
|
CVE-2024-30807,0,0,4152651982bff689cfa963c375e94b647d4d42e48408c3cb0b93ed4cc183ecd1,2024-04-02T20:31:58.463000
|
||||||
CVE-2024-30808,0,0,156121cad1cb8b48efeaec8ac2958220fd52aa0ba41912798852a887abc4f701,2024-04-02T20:31:58.463000
|
CVE-2024-30808,0,0,156121cad1cb8b48efeaec8ac2958220fd52aa0ba41912798852a887abc4f701,2024-04-02T20:31:58.463000
|
||||||
@ -250535,12 +250535,12 @@ CVE-2024-31022,0,0,c7e2196fc2144529ae779b7c6081e3f8d64391691f708665471ce7a0ce765
|
|||||||
CVE-2024-31025,0,0,f6815681c00034cb26fb1b993f08da7051c7712a081b04f3f2c6c1b167cd8d92,2024-04-04T12:48:41.700000
|
CVE-2024-31025,0,0,f6815681c00034cb26fb1b993f08da7051c7712a081b04f3f2c6c1b167cd8d92,2024-04-04T12:48:41.700000
|
||||||
CVE-2024-31030,0,0,55e23e64b3707eab4de6e94c5df81025e4c96cb6796b4cba9a4e287691f568e8,2024-08-01T13:50:41.730000
|
CVE-2024-31030,0,0,55e23e64b3707eab4de6e94c5df81025e4c96cb6796b4cba9a4e287691f568e8,2024-08-01T13:50:41.730000
|
||||||
CVE-2024-31031,0,0,22dbfc8ddbe94926f4450ce3680a694e3a6be4ac1b04af44fb2aad33642532ec,2024-07-03T01:54:34.620000
|
CVE-2024-31031,0,0,22dbfc8ddbe94926f4450ce3680a694e3a6be4ac1b04af44fb2aad33642532ec,2024-07-03T01:54:34.620000
|
||||||
CVE-2024-31032,0,0,144966e50c1158b9000567e4c8a86d47234af0a2fb3b9449e4059bdb91d1715f,2024-04-24T03:15:05.933000
|
CVE-2024-31032,0,1,9dc46c99afa3eb3462c2c2bb3d13abfc32da42b12a1aa1cfc0db0d7d5a534d98,2024-08-22T19:35:23.210000
|
||||||
CVE-2024-31033,0,0,ad98d7e55b8cc6171b35a6136e6eb51847672500aa911f7497c7969c50af9164,2024-08-02T02:15:31.420000
|
CVE-2024-31033,0,0,ad98d7e55b8cc6171b35a6136e6eb51847672500aa911f7497c7969c50af9164,2024-08-02T02:15:31.420000
|
||||||
CVE-2024-31036,0,0,c1dc30371cbc232c45ce2a1ab5b75a9f53a1a706550cc27b167d070e5b7d7860,2024-07-03T01:54:35.980000
|
CVE-2024-31036,0,0,c1dc30371cbc232c45ce2a1ab5b75a9f53a1a706550cc27b167d070e5b7d7860,2024-07-03T01:54:35.980000
|
||||||
CVE-2024-3104,0,0,e1dbcea3b82583c3a8bb219203e646c341fcc97755b89e1c83328a1d4d36d637,2024-06-07T14:56:05.647000
|
CVE-2024-3104,0,0,e1dbcea3b82583c3a8bb219203e646c341fcc97755b89e1c83328a1d4d36d637,2024-06-07T14:56:05.647000
|
||||||
CVE-2024-31040,0,0,8cff83beadb4c661eae93230dc1b40189dfecbc2297bd60a6380f76952c5534c,2024-07-03T01:54:37.220000
|
CVE-2024-31040,0,0,8cff83beadb4c661eae93230dc1b40189dfecbc2297bd60a6380f76952c5534c,2024-07-03T01:54:37.220000
|
||||||
CVE-2024-31041,0,0,1e28d1e3e8a1eb79805e190c840f78679beeca32a1e22fcb2bfe1394de19057b,2024-04-17T20:08:21.887000
|
CVE-2024-31041,0,1,a2e5f2c50616130ae69bb4600fa3df33defe16f317b87e21856a1ac474301f96,2024-08-22T18:35:06.980000
|
||||||
CVE-2024-31047,0,0,af5d8fcf98f981a9f813cc3db6d53189749ea7407eeff6f344af923836b4a452,2024-08-01T13:50:42.517000
|
CVE-2024-31047,0,0,af5d8fcf98f981a9f813cc3db6d53189749ea7407eeff6f344af923836b4a452,2024-08-01T13:50:42.517000
|
||||||
CVE-2024-3105,0,0,d1365c4198fb5e36e8becbc41dad6d35b33f14f8f23909f9ba45f9f9d5508f57,2024-06-17T12:42:04.623000
|
CVE-2024-3105,0,0,d1365c4198fb5e36e8becbc41dad6d35b33f14f8f23909f9ba45f9f9d5508f57,2024-06-17T12:42:04.623000
|
||||||
CVE-2024-31061,0,0,66c585c6dcfe88f6d4ed833c4b2082d6859ef1b946fb15da1a412618a9ebff85,2024-08-01T13:50:43.283000
|
CVE-2024-31061,0,0,66c585c6dcfe88f6d4ed833c4b2082d6859ef1b946fb15da1a412618a9ebff85,2024-08-01T13:50:43.283000
|
||||||
@ -250699,7 +250699,7 @@ CVE-2024-31266,0,0,b92d3472dc7ea2fb235b5bcb68cf81aecc30e7cb1ee1bd1aa6dafd92cf1bd
|
|||||||
CVE-2024-31267,0,0,040058e14e9fdb721a91dacc70a415fed99bbf6a8b0312f5e05b9e69e9a0c81b,2024-06-10T02:52:08.267000
|
CVE-2024-31267,0,0,040058e14e9fdb721a91dacc70a415fed99bbf6a8b0312f5e05b9e69e9a0c81b,2024-06-10T02:52:08.267000
|
||||||
CVE-2024-31268,0,0,cc3a61e7598538b428678882d7d6fc8be6fe9abdf509b0bae8b464c540b05a25,2024-04-15T13:15:51.577000
|
CVE-2024-31268,0,0,cc3a61e7598538b428678882d7d6fc8be6fe9abdf509b0bae8b464c540b05a25,2024-04-15T13:15:51.577000
|
||||||
CVE-2024-31269,0,0,86a2fc976069d7e9fe6dbc1dcd3b4bc1f5d59b016a301859aeeb8e23bd95e8d6,2024-04-15T13:15:51.577000
|
CVE-2024-31269,0,0,86a2fc976069d7e9fe6dbc1dcd3b4bc1f5d59b016a301859aeeb8e23bd95e8d6,2024-04-15T13:15:51.577000
|
||||||
CVE-2024-3127,1,1,6cc9e310e622b055f109ee1067c668db0a55dbf9550eabccd044c67d5bcfc115,2024-08-22T16:15:08.590000
|
CVE-2024-3127,0,0,6cc9e310e622b055f109ee1067c668db0a55dbf9550eabccd044c67d5bcfc115,2024-08-22T16:15:08.590000
|
||||||
CVE-2024-31270,0,0,0d4fb68db93c302d6959c71357aec0a409fd68ac83d0cfe96c55d4825aec0e52,2024-05-08T17:05:24.083000
|
CVE-2024-31270,0,0,0d4fb68db93c302d6959c71357aec0a409fd68ac83d0cfe96c55d4825aec0e52,2024-05-08T17:05:24.083000
|
||||||
CVE-2024-31271,0,0,9ff92eb8bbc3e7bde801b4b1d4c1bb80f0abb134b87ad407d23ab89ee9509ab3,2024-04-15T13:15:51.577000
|
CVE-2024-31271,0,0,9ff92eb8bbc3e7bde801b4b1d4c1bb80f0abb134b87ad407d23ab89ee9509ab3,2024-04-15T13:15:51.577000
|
||||||
CVE-2024-31272,0,0,37b5ce6f43ab85f0748383fe28a22f89c4f6f43da0d4ba23932c516627b4eab9,2024-04-15T13:15:51.577000
|
CVE-2024-31272,0,0,37b5ce6f43ab85f0748383fe28a22f89c4f6f43da0d4ba23932c516627b4eab9,2024-04-15T13:15:51.577000
|
||||||
@ -250844,7 +250844,7 @@ CVE-2024-31406,0,0,50456975bcaa7f8217ed5d32434dc8fe15a49c6e53ad431c822a1405fa86b
|
|||||||
CVE-2024-31409,0,0,09ade636686018d011934a2d430e86d633c432ebce6a25dfdd22659ad619bb0a,2024-05-16T13:03:05.353000
|
CVE-2024-31409,0,0,09ade636686018d011934a2d430e86d633c432ebce6a25dfdd22659ad619bb0a,2024-05-16T13:03:05.353000
|
||||||
CVE-2024-3141,0,0,f613ac942cd4fe27f02940a465f775f9bffd5aa44eaf65a9fb94b5d68958c63e,2024-05-17T02:39:44.593000
|
CVE-2024-3141,0,0,f613ac942cd4fe27f02940a465f775f9bffd5aa44eaf65a9fb94b5d68958c63e,2024-05-17T02:39:44.593000
|
||||||
CVE-2024-31410,0,0,23155e757f76d6df45e3314d3045af8745f87c8b7ddeb1d4a8dad059bea073da,2024-05-16T13:03:05.353000
|
CVE-2024-31410,0,0,23155e757f76d6df45e3314d3045af8745f87c8b7ddeb1d4a8dad059bea073da,2024-05-16T13:03:05.353000
|
||||||
CVE-2024-31411,0,1,4ae8e92f24ab80cd4eeff80dde44b86a5e45219785c2eb09757e8f4f11b858d3,2024-08-22T16:07:06.267000
|
CVE-2024-31411,0,0,4ae8e92f24ab80cd4eeff80dde44b86a5e45219785c2eb09757e8f4f11b858d3,2024-08-22T16:07:06.267000
|
||||||
CVE-2024-31412,0,0,91783357bf64a7c6a8a8fc4dd61d86515f3c43b87fd5026db89b258496a563c2,2024-08-01T13:50:54.890000
|
CVE-2024-31412,0,0,91783357bf64a7c6a8a8fc4dd61d86515f3c43b87fd5026db89b258496a563c2,2024-08-01T13:50:54.890000
|
||||||
CVE-2024-31413,0,0,bb1445e4de4fe6231d24b5144c9534a3d5daec05348443646de7635aa924272f,2024-07-03T01:54:50.813000
|
CVE-2024-31413,0,0,bb1445e4de4fe6231d24b5144c9534a3d5daec05348443646de7635aa924272f,2024-07-03T01:54:50.813000
|
||||||
CVE-2024-31419,0,0,d12cf9d3a6a9056d09543372e3ec9556904c7fd0922004ef5361ecc4fb1ba007,2024-04-03T17:24:18.150000
|
CVE-2024-31419,0,0,d12cf9d3a6a9056d09543372e3ec9556904c7fd0922004ef5361ecc4fb1ba007,2024-04-03T17:24:18.150000
|
||||||
@ -251015,7 +251015,7 @@ CVE-2024-31750,0,0,1a15dee129c540f50ba0b22addd9273e209e8744c01daff655aada30a84ff
|
|||||||
CVE-2024-31755,0,0,3bd12cf4853126d6f31d6cbd32f6b5b02770582813fa897bd2c19a22d945bc42,2024-07-03T01:55:20.690000
|
CVE-2024-31755,0,0,3bd12cf4853126d6f31d6cbd32f6b5b02770582813fa897bd2c19a22d945bc42,2024-07-03T01:55:20.690000
|
||||||
CVE-2024-31756,0,0,b265a44ac5576ee6d5c0a18978b0e66ae2e3119d6151f744407705cbd0d8e888,2024-05-22T12:46:53.887000
|
CVE-2024-31756,0,0,b265a44ac5576ee6d5c0a18978b0e66ae2e3119d6151f744407705cbd0d8e888,2024-05-22T12:46:53.887000
|
||||||
CVE-2024-31757,0,0,640246057d9af431a856f7069b3a4b0176cede6dd1a0ca84cccb72f8b2351ce2,2024-05-22T12:46:53.887000
|
CVE-2024-31757,0,0,640246057d9af431a856f7069b3a4b0176cede6dd1a0ca84cccb72f8b2351ce2,2024-05-22T12:46:53.887000
|
||||||
CVE-2024-31759,0,0,5ca30fe161f942476fedc4c1a25392d9f6bd5f838b11978a0afee068f1ffa3e9,2024-04-17T12:48:07.510000
|
CVE-2024-31759,0,1,a91ca69c3b65caf8011a472beaa42aae9a0ba32af5a57dbfbe22a6f7bd2fef94,2024-08-22T19:35:24.357000
|
||||||
CVE-2024-3176,0,0,b581b35f96c3e71f6864e9ec04e922ca6011a2abb5dc1a155976a5a31d9d63e9,2024-07-18T14:47:38.093000
|
CVE-2024-3176,0,0,b581b35f96c3e71f6864e9ec04e922ca6011a2abb5dc1a155976a5a31d9d63e9,2024-07-18T14:47:38.093000
|
||||||
CVE-2024-31760,0,0,f16f02679dd1d653421cfa1b377c9d22a632b6c4fccebc3d14af855ae5a31d71,2024-08-01T13:51:06.777000
|
CVE-2024-31760,0,0,f16f02679dd1d653421cfa1b377c9d22a632b6c4fccebc3d14af855ae5a31d71,2024-08-01T13:51:06.777000
|
||||||
CVE-2024-3177,0,0,572d97d46eb0c253ee03c3934b9d649f7fc7d88b4a672b4edb358cf1ed9c5fcc,2024-05-01T19:15:27.480000
|
CVE-2024-3177,0,0,572d97d46eb0c253ee03c3934b9d649f7fc7d88b4a672b4edb358cf1ed9c5fcc,2024-05-01T19:15:27.480000
|
||||||
@ -252017,7 +252017,7 @@ CVE-2024-3308,0,0,b12c3c7359268120e478241aac0d965ee4975d5f2a92382c8de950e6d75610
|
|||||||
CVE-2024-3309,0,0,86d23734c08e91abb9c54fe3adc839130d817cf111a237c0656262c25ce176f0,2024-04-29T12:42:03.667000
|
CVE-2024-3309,0,0,86d23734c08e91abb9c54fe3adc839130d817cf111a237c0656262c25ce176f0,2024-04-29T12:42:03.667000
|
||||||
CVE-2024-33101,0,0,02c41b74667ba4c6c855c7f8be761695b1033ca3ebd54d33f4c74ffe5c076663,2024-07-03T01:57:25.600000
|
CVE-2024-33101,0,0,02c41b74667ba4c6c855c7f8be761695b1033ca3ebd54d33f4c74ffe5c076663,2024-07-03T01:57:25.600000
|
||||||
CVE-2024-33102,0,0,5913737ef9c2cdea9d03e524178ff2c4a07bc37811d823721759d56c1627f7bb,2024-07-03T01:57:26.367000
|
CVE-2024-33102,0,0,5913737ef9c2cdea9d03e524178ff2c4a07bc37811d823721759d56c1627f7bb,2024-07-03T01:57:26.367000
|
||||||
CVE-2024-33103,0,0,05686544949830897372108bd228a37c7f004a025c3eed2758fff22fb6d3d634,2024-08-02T03:15:23.713000
|
CVE-2024-33103,0,1,a36bb540d060154b2c500281aeebe1e440c6921a98c2ffcc128ad329bcfc7117,2024-08-22T19:35:25.357000
|
||||||
CVE-2024-3311,0,0,6e298bee2f64a50081e2cbf2a03ac8b7d3c6b0b9fd9ec2176921cbd680375d90,2024-06-04T19:20:19.213000
|
CVE-2024-3311,0,0,6e298bee2f64a50081e2cbf2a03ac8b7d3c6b0b9fd9ec2176921cbd680375d90,2024-06-04T19:20:19.213000
|
||||||
CVE-2024-33110,0,0,cadaede73d3a0da5440547f9c49768ef66978382531070a9c510181ac9abc5a8,2024-07-03T01:57:27.130000
|
CVE-2024-33110,0,0,cadaede73d3a0da5440547f9c49768ef66978382531070a9c510181ac9abc5a8,2024-07-03T01:57:27.130000
|
||||||
CVE-2024-33111,0,0,b6aa79d7fa96972383b596dcb7f242edbb816eac6eafb7be06fed5f14d30b343,2024-05-06T16:00:59.253000
|
CVE-2024-33111,0,0,b6aa79d7fa96972383b596dcb7f242edbb816eac6eafb7be06fed5f14d30b343,2024-05-06T16:00:59.253000
|
||||||
@ -252067,7 +252067,7 @@ CVE-2024-33222,0,0,826b88c0df0010107f0595e8bf718ff48038d9c2823c40b87f1e329d93d63
|
|||||||
CVE-2024-33223,0,0,bd16de328c282f1aa1b7015361c590473a5b6bf3caa6b0c34867ec1e542d4f9a,2024-05-22T18:59:20.240000
|
CVE-2024-33223,0,0,bd16de328c282f1aa1b7015361c590473a5b6bf3caa6b0c34867ec1e542d4f9a,2024-05-22T18:59:20.240000
|
||||||
CVE-2024-33224,0,0,ea562c47166b9ccee59aa37caec5e01025be0e30460cf86b89874eb41ddf1200,2024-05-22T18:59:20.240000
|
CVE-2024-33224,0,0,ea562c47166b9ccee59aa37caec5e01025be0e30460cf86b89874eb41ddf1200,2024-05-22T18:59:20.240000
|
||||||
CVE-2024-33225,0,0,20ea8cc6ddfb6cfd8258351119e0796feeaade6c50f1b0404fcf51caf0bfa6d3,2024-05-22T18:59:20.240000
|
CVE-2024-33225,0,0,20ea8cc6ddfb6cfd8258351119e0796feeaade6c50f1b0404fcf51caf0bfa6d3,2024-05-22T18:59:20.240000
|
||||||
CVE-2024-33226,0,0,f3fb4ee69f05f27f81b817914fa93a341a77a038a9407ec5a7a16217f3ea6498,2024-05-22T18:59:20.240000
|
CVE-2024-33226,0,1,118644c9a4526f22ebac7f7b4738b46fc0e07956b270365957b518f88d5f05c3,2024-08-22T19:35:26.237000
|
||||||
CVE-2024-33227,0,0,7642d7b0dea4438aa6cf20447aa6ccfb5a37e8289abc2e50d39a48026159e609,2024-08-21T21:35:06.933000
|
CVE-2024-33227,0,0,7642d7b0dea4438aa6cf20447aa6ccfb5a37e8289abc2e50d39a48026159e609,2024-08-21T21:35:06.933000
|
||||||
CVE-2024-33228,0,0,85cdbd71550aee88b5f9d8549e2c2f09f274676ddc09487eba7cc0a4fad357e8,2024-08-15T15:35:10.277000
|
CVE-2024-33228,0,0,85cdbd71550aee88b5f9d8549e2c2f09f274676ddc09487eba7cc0a4fad357e8,2024-08-15T15:35:10.277000
|
||||||
CVE-2024-3323,0,0,35a6027c28bfec2d03f21e8dc2fb44053ba20d6734735309aeaba44e533a0061,2024-07-03T02:06:09.693000
|
CVE-2024-3323,0,0,35a6027c28bfec2d03f21e8dc2fb44053ba20d6734735309aeaba44e533a0061,2024-07-03T02:06:09.693000
|
||||||
@ -252329,7 +252329,7 @@ CVE-2024-33651,0,0,f2ee7352faa4d013ce2dbc2e7d6ca251932118d3e5b2422d264e03fcb1cbd
|
|||||||
CVE-2024-33652,0,0,486e801beae2c2c99c631668abda9d91af90b0e1a9af64a8cd7a679f08c5c36e,2024-04-29T12:42:03.667000
|
CVE-2024-33652,0,0,486e801beae2c2c99c631668abda9d91af90b0e1a9af64a8cd7a679f08c5c36e,2024-04-29T12:42:03.667000
|
||||||
CVE-2024-33653,0,0,265fc534e8717f316164edd35fe39b65af5bd4a9e2599f020b58283bd3269b45,2024-07-09T18:19:14.047000
|
CVE-2024-33653,0,0,265fc534e8717f316164edd35fe39b65af5bd4a9e2599f020b58283bd3269b45,2024-07-09T18:19:14.047000
|
||||||
CVE-2024-33654,0,0,0892ef25c45719b53efeedb9f6ebabbe65a8f1a2df54c2a179e8dc18f8e5c732,2024-07-09T18:19:14.047000
|
CVE-2024-33654,0,0,0892ef25c45719b53efeedb9f6ebabbe65a8f1a2df54c2a179e8dc18f8e5c732,2024-07-09T18:19:14.047000
|
||||||
CVE-2024-33655,0,0,5b78877100297f0da919505636ca4a0c13bc834698615142818e1b1740a1898b,2024-06-10T18:15:34.520000
|
CVE-2024-33655,0,1,9e64ca7b34c4566d1306046984ab49450e7da90a07f23b1974ef43c7b46b8b70,2024-08-22T19:35:27.177000
|
||||||
CVE-2024-33656,0,0,4dba07a4d7c3975860634650cad6a2f6ef65414eb84506eae92fb7aa2b8aafe0,2024-08-21T17:24:59.627000
|
CVE-2024-33656,0,0,4dba07a4d7c3975860634650cad6a2f6ef65414eb84506eae92fb7aa2b8aafe0,2024-08-21T17:24:59.627000
|
||||||
CVE-2024-33657,0,0,16f4d3f5fb15d93af789c743eaccd0cb6f8039f81c1fd99ea9692086f0dcc089,2024-08-21T17:24:59.627000
|
CVE-2024-33657,0,0,16f4d3f5fb15d93af789c743eaccd0cb6f8039f81c1fd99ea9692086f0dcc089,2024-08-21T17:24:59.627000
|
||||||
CVE-2024-3366,0,0,a2c419b6dceb854c8524f6fea56c90f31e3f9047e1890ead74a66fe52a9e4023,2024-05-17T02:39:53.090000
|
CVE-2024-3366,0,0,a2c419b6dceb854c8524f6fea56c90f31e3f9047e1890ead74a66fe52a9e4023,2024-05-17T02:39:53.090000
|
||||||
@ -252400,7 +252400,7 @@ CVE-2024-33789,0,0,1b705f261bdfdb3c7c0384a6685c74908e5e41969953d5575683a1d41efd6
|
|||||||
CVE-2024-33791,0,0,4a99a46cc9bc13330a58a77df6070e766b5a533f0015633cf295877892d64b94,2024-07-03T01:58:48.567000
|
CVE-2024-33791,0,0,4a99a46cc9bc13330a58a77df6070e766b5a533f0015633cf295877892d64b94,2024-07-03T01:58:48.567000
|
||||||
CVE-2024-33792,0,0,7c7c9a5cdc3e6c8c82320ec108a0ab3708c01bb96dfb27d34785495a231c6066,2024-07-03T01:58:49.357000
|
CVE-2024-33792,0,0,7c7c9a5cdc3e6c8c82320ec108a0ab3708c01bb96dfb27d34785495a231c6066,2024-07-03T01:58:49.357000
|
||||||
CVE-2024-33793,0,0,657ddfb93c384e79c20456942320d557ebaeb8c427e62d4fba5eb78b0e45cbc0,2024-07-03T01:58:50.130000
|
CVE-2024-33793,0,0,657ddfb93c384e79c20456942320d557ebaeb8c427e62d4fba5eb78b0e45cbc0,2024-07-03T01:58:50.130000
|
||||||
CVE-2024-33799,0,0,bdd9f09a7e12636314e6c3f2a347985a0a99e4b2447b14defb0b973670e27602,2024-05-28T17:11:47.007000
|
CVE-2024-33799,0,1,9d8baf9264b308f06d2bfe7c972157c80c3d36eac1c756578279660cf6d83ddb,2024-08-22T19:35:28.087000
|
||||||
CVE-2024-3380,0,0,2dff51ddbee3af980b9cfb6cf09776d99cf02d06821df7efa0940e1572fc0531,2024-06-07T17:15:51.487000
|
CVE-2024-3380,0,0,2dff51ddbee3af980b9cfb6cf09776d99cf02d06821df7efa0940e1572fc0531,2024-06-07T17:15:51.487000
|
||||||
CVE-2024-33800,0,0,201356ff7d99d67e9b23318eb81347b8e0acce7c8616f8f0b16bc1aecb8d2a62,2024-05-28T17:11:47.007000
|
CVE-2024-33800,0,0,201356ff7d99d67e9b23318eb81347b8e0acce7c8616f8f0b16bc1aecb8d2a62,2024-05-28T17:11:47.007000
|
||||||
CVE-2024-33801,0,0,383edbe255017d36a3f80e7a95d80ea991a96b279313ea8f636ba2617e7f4948,2024-07-03T01:58:50.903000
|
CVE-2024-33801,0,0,383edbe255017d36a3f80e7a95d80ea991a96b279313ea8f636ba2617e7f4948,2024-07-03T01:58:50.903000
|
||||||
@ -252892,7 +252892,7 @@ CVE-2024-34454,0,0,9c41ced14bcda502a6d91e8242ee544d71d5283ff3511493207ec7805cdb4
|
|||||||
CVE-2024-34455,0,0,c191f5457e9d706ca3323355b6cb28301bf69c793f902f33757952929305bbe5,2024-07-03T02:00:08.547000
|
CVE-2024-34455,0,0,c191f5457e9d706ca3323355b6cb28301bf69c793f902f33757952929305bbe5,2024-07-03T02:00:08.547000
|
||||||
CVE-2024-34457,0,0,b14d1b09a16733cbe8e237801f72eb2ee4d363ca08aadfa585a48dbe12e38c8f,2024-07-22T14:15:04.883000
|
CVE-2024-34457,0,0,b14d1b09a16733cbe8e237801f72eb2ee4d363ca08aadfa585a48dbe12e38c8f,2024-07-22T14:15:04.883000
|
||||||
CVE-2024-34458,0,0,ad9c57980a1196e03a7ff89c7cbce14805d2491f6af55e1053911cc733df4207,2024-08-21T13:31:38.380000
|
CVE-2024-34458,0,0,ad9c57980a1196e03a7ff89c7cbce14805d2491f6af55e1053911cc733df4207,2024-08-21T13:31:38.380000
|
||||||
CVE-2024-34459,0,0,e23f2c7438f4601aa9a56de6db52d8787783787763d585bc066caf2ee41c958d,2024-06-10T18:15:34.930000
|
CVE-2024-34459,0,1,fa787ae7a4c8630112bbb06f81f3133274e5fdd9f7332b290019503934d44271,2024-08-22T18:35:08.623000
|
||||||
CVE-2024-3446,0,0,cb97091f9e4759b1c0912bd51a56b30e45443e03748f74b42eff2bfcc530cf53,2024-04-18T08:15:38.340000
|
CVE-2024-3446,0,0,cb97091f9e4759b1c0912bd51a56b30e45443e03748f74b42eff2bfcc530cf53,2024-04-18T08:15:38.340000
|
||||||
CVE-2024-34460,0,0,441531d0808bd0543a3084d408b6b9ab77342b046b0f375a6d08c1971aedd3c7,2024-05-06T12:44:56.377000
|
CVE-2024-34460,0,0,441531d0808bd0543a3084d408b6b9ab77342b046b0f375a6d08c1971aedd3c7,2024-05-06T12:44:56.377000
|
||||||
CVE-2024-34461,0,0,cc374f56fc002b0ab8a1c4c41f3103778880e140f4d0402c66d5feb164fd7550,2024-07-03T02:00:09.560000
|
CVE-2024-34461,0,0,cc374f56fc002b0ab8a1c4c41f3103778880e140f4d0402c66d5feb164fd7550,2024-07-03T02:00:09.560000
|
||||||
@ -252935,7 +252935,7 @@ CVE-2024-34519,0,0,e1bab0f51bff6ddc1064f759576ee7e30191ae4ab924c21597ebc2a29f9b8
|
|||||||
CVE-2024-34523,0,0,7ef51f7e789546b198cf934fa08689a630a0291ba9909985498eacb1d192e4fb,2024-08-02T03:15:43.153000
|
CVE-2024-34523,0,0,7ef51f7e789546b198cf934fa08689a630a0291ba9909985498eacb1d192e4fb,2024-08-02T03:15:43.153000
|
||||||
CVE-2024-34524,0,0,3e667092f2fac2e9248384e2031bfe46558254a6a3fc0f2ae0aecbfd07dbb573,2024-07-03T02:00:27.283000
|
CVE-2024-34524,0,0,3e667092f2fac2e9248384e2031bfe46558254a6a3fc0f2ae0aecbfd07dbb573,2024-07-03T02:00:27.283000
|
||||||
CVE-2024-34525,0,0,7b62d839278ce76830c96b3fb5e58c932a408ac771b301e231e0f571e1316ee9,2024-07-03T02:00:29.427000
|
CVE-2024-34525,0,0,7b62d839278ce76830c96b3fb5e58c932a408ac771b301e231e0f571e1316ee9,2024-07-03T02:00:29.427000
|
||||||
CVE-2024-34527,0,0,996370802900d2dcb9978bdc308402f608bd87c4d8749958f78f38e9a2c40f9f,2024-05-06T12:44:56.377000
|
CVE-2024-34527,0,1,23e03d0c4fa6bfa8b77f24e782beaeccc9957ed9211c09f918e2b7968b887f04,2024-08-22T18:35:09.990000
|
||||||
CVE-2024-34528,0,0,8d9b5b257f7d2fd4a76a2b149b8062182b52b5547fe4d60dbfd3d242d3d40d64,2024-05-06T12:44:56.377000
|
CVE-2024-34528,0,0,8d9b5b257f7d2fd4a76a2b149b8062182b52b5547fe4d60dbfd3d242d3d40d64,2024-05-06T12:44:56.377000
|
||||||
CVE-2024-34529,0,0,d8133b9a4ea4710432fb31a4132ab39e712c33d1c820f137246e054dc4fb105b,2024-07-03T02:00:30.540000
|
CVE-2024-34529,0,0,d8133b9a4ea4710432fb31a4132ab39e712c33d1c820f137246e054dc4fb105b,2024-07-03T02:00:30.540000
|
||||||
CVE-2024-34532,0,0,dcb761bea457268d59c0be9416083baced4fef01729f53184cc4673fe1957bbe,2024-07-03T02:00:31.917000
|
CVE-2024-34532,0,0,dcb761bea457268d59c0be9416083baced4fef01729f53184cc4673fe1957bbe,2024-07-03T02:00:31.917000
|
||||||
@ -253486,7 +253486,7 @@ CVE-2024-3544,0,0,ac159828af5bc2292e8e0701d42b4d30a3b9b1860c97c52c0c82cf5c85bdac
|
|||||||
CVE-2024-3545,0,0,d9f283192ab8f986c7e851f9b58a13c1438e2ebb25fe23225197629fde187eac,2024-04-10T13:23:38.787000
|
CVE-2024-3545,0,0,d9f283192ab8f986c7e851f9b58a13c1438e2ebb25fe23225197629fde187eac,2024-04-10T13:23:38.787000
|
||||||
CVE-2024-3546,0,0,35163ad2b2190e22887b6e298f1e24f2828b8a7ebd49798d961ad2c534ecb1cb,2024-05-02T18:00:37.360000
|
CVE-2024-3546,0,0,35163ad2b2190e22887b6e298f1e24f2828b8a7ebd49798d961ad2c534ecb1cb,2024-05-02T18:00:37.360000
|
||||||
CVE-2024-35468,0,0,f9dd9febc4034bc90fe43ce99b50256976b33c57b8b35c20fdc90432a37fa2c3,2024-08-19T15:35:09.230000
|
CVE-2024-35468,0,0,f9dd9febc4034bc90fe43ce99b50256976b33c57b8b35c20fdc90432a37fa2c3,2024-08-19T15:35:09.230000
|
||||||
CVE-2024-35469,0,0,300cffdd249203f66ae711e28c9f794f8cc6095c55aaa66381de9a39ce8cd9e5,2024-05-30T18:18:58.870000
|
CVE-2024-35469,0,1,18bee3ba5715b478a436de716da42f1ea7108aec420f8357db65b4bc2307290f,2024-08-22T19:35:28.953000
|
||||||
CVE-2024-3547,0,0,5281ad8cfbf75d8e7097f8df52b8a3e9c74f8dabf40b76a70b99a4928380607e,2024-05-14T16:11:39.510000
|
CVE-2024-3547,0,0,5281ad8cfbf75d8e7097f8df52b8a3e9c74f8dabf40b76a70b99a4928380607e,2024-05-14T16:11:39.510000
|
||||||
CVE-2024-35474,0,0,1aa452483d6d7da77f1090f3cd37ef4b816291e1838401dc1342635ac1a9c4c8,2024-06-10T18:06:22.600000
|
CVE-2024-35474,0,0,1aa452483d6d7da77f1090f3cd37ef4b816291e1838401dc1342635ac1a9c4c8,2024-06-10T18:06:22.600000
|
||||||
CVE-2024-35475,0,0,5630b4549b65d33d3ee9b0fbe82b2113175125b521e97ea87cdc02319a1cf4fd,2024-07-03T02:01:45.963000
|
CVE-2024-35475,0,0,5630b4549b65d33d3ee9b0fbe82b2113175125b521e97ea87cdc02319a1cf4fd,2024-07-03T02:01:45.963000
|
||||||
@ -253580,7 +253580,7 @@ CVE-2024-35656,0,0,b6fb99a75659a0b6cddb17e86374269e5493cd14bd9535b3dfd7ed1f6e679
|
|||||||
CVE-2024-35657,0,0,b51c4e22c7c5f52f89b80edb48a52842853a592201112fcdbd807b87af974c40,2024-06-10T02:52:08.267000
|
CVE-2024-35657,0,0,b51c4e22c7c5f52f89b80edb48a52842853a592201112fcdbd807b87af974c40,2024-06-10T02:52:08.267000
|
||||||
CVE-2024-35658,0,0,02d603bb4833c826378dc2c7b4b6c158aa64f99f63e182d87141c499aba708ea,2024-06-12T17:50:55.227000
|
CVE-2024-35658,0,0,02d603bb4833c826378dc2c7b4b6c158aa64f99f63e182d87141c499aba708ea,2024-06-12T17:50:55.227000
|
||||||
CVE-2024-35659,0,0,2651c0d3218fe1050c14ffaf3928003168756cb772b19ad449c9389f3dfde3e5,2024-06-10T02:52:08.267000
|
CVE-2024-35659,0,0,2651c0d3218fe1050c14ffaf3928003168756cb772b19ad449c9389f3dfde3e5,2024-06-10T02:52:08.267000
|
||||||
CVE-2024-3566,0,0,52109228033be4a76369eab1b84dbeb669822bc1d1993f552ad1186c27babca1,2024-04-10T19:49:51.183000
|
CVE-2024-3566,0,1,d8adb5426b454694781dd5ab667311ecd90bc8a46fc99ba28a1f66dd045ba157,2024-08-22T19:35:35.700000
|
||||||
CVE-2024-35660,0,0,a85ff0a7822a14d165e5de7ed1919abb154a1de11c8215173a97f054ca1441ea,2024-06-10T02:52:08.267000
|
CVE-2024-35660,0,0,a85ff0a7822a14d165e5de7ed1919abb154a1de11c8215173a97f054ca1441ea,2024-06-10T02:52:08.267000
|
||||||
CVE-2024-35661,0,0,8b8332085c8053a42df002a98652102b5e05133894d3f36aab8949e0eb0e3128,2024-06-12T13:31:41.527000
|
CVE-2024-35661,0,0,8b8332085c8053a42df002a98652102b5e05133894d3f36aab8949e0eb0e3128,2024-06-12T13:31:41.527000
|
||||||
CVE-2024-35662,0,0,43b492385b92b1fc942c99fc466dcd6547a4a7b780999e4b389c076e3ea39b15,2024-06-12T13:31:10.767000
|
CVE-2024-35662,0,0,43b492385b92b1fc942c99fc466dcd6547a4a7b780999e4b389c076e3ea39b15,2024-06-12T13:31:10.767000
|
||||||
@ -254277,12 +254277,12 @@ CVE-2024-36433,0,0,2d18270b463db9b276375797189132982b3093c59a94a1ba3c26d6b6e8046
|
|||||||
CVE-2024-36434,0,0,8fba84c9c20ed6e9e38e371f6a7314cc80d9ab38ed1fc3ffdc1e7c8b52186a69,2024-08-01T13:52:49.800000
|
CVE-2024-36434,0,0,8fba84c9c20ed6e9e38e371f6a7314cc80d9ab38ed1fc3ffdc1e7c8b52186a69,2024-08-01T13:52:49.800000
|
||||||
CVE-2024-36435,0,0,42aa941ee425d333c537ed403b5f168d15cf55caec805a299bb4c45521e1c947,2024-08-01T13:52:50.527000
|
CVE-2024-36435,0,0,42aa941ee425d333c537ed403b5f168d15cf55caec805a299bb4c45521e1c947,2024-08-01T13:52:50.527000
|
||||||
CVE-2024-36438,0,0,fcbe2e02dbfe7753ae10ee196c2c3d66e08c15fdea4edc31b3da8e63f435a898,2024-08-01T13:52:51.240000
|
CVE-2024-36438,0,0,fcbe2e02dbfe7753ae10ee196c2c3d66e08c15fdea4edc31b3da8e63f435a898,2024-08-01T13:52:51.240000
|
||||||
CVE-2024-36439,0,0,552cc6bf9f3a854c35497dfa977c3d093556dbdf2425977771abb27b0df0b30f,2024-08-22T15:15:15.883000
|
CVE-2024-36439,0,1,edea588a3d58143973d3a88665fe7989ba6a7c452ce1625826da8fe7ccbaec07,2024-08-22T18:35:12.120000
|
||||||
CVE-2024-3644,0,0,e904dffa636a621d1f1644a68a8bb26342dbf717ae684f12b60a37d102e4d87d,2024-05-16T13:03:05.353000
|
CVE-2024-3644,0,0,e904dffa636a621d1f1644a68a8bb26342dbf717ae684f12b60a37d102e4d87d,2024-05-16T13:03:05.353000
|
||||||
CVE-2024-36440,0,0,e3ffbfb49a6a83abf3c4c4f0e950f7ab7d62439e253be0053a26163bc8cdbe93,2024-08-22T15:15:15.977000
|
CVE-2024-36440,0,0,e3ffbfb49a6a83abf3c4c4f0e950f7ab7d62439e253be0053a26163bc8cdbe93,2024-08-22T15:15:15.977000
|
||||||
CVE-2024-36441,1,1,16e16de21c8f99458d9aea248831dcf153409a4f95f4c31dcb522bd5c60300eb,2024-08-22T16:15:08.433000
|
CVE-2024-36441,0,1,b7e607580a741b331b28097cfaeea480d665d3502e7441fdb4ad9127149df5d0,2024-08-22T19:35:29.793000
|
||||||
CVE-2024-36442,0,0,a825b90a27d1c300a2715e85e051e17ac9b243078f4181741a9faca3afd00e3a,2024-08-22T15:15:16.047000
|
CVE-2024-36442,0,0,a825b90a27d1c300a2715e85e051e17ac9b243078f4181741a9faca3afd00e3a,2024-08-22T15:15:16.047000
|
||||||
CVE-2024-36443,0,0,6b41f9be21c37101e04a2af5bcb1ed0de69466c478ef5ba6e2afaead6470be36,2024-08-22T14:15:08.443000
|
CVE-2024-36443,0,1,10f70b00f33288c8118fd3612f1ed4e1a88033326a408ee6f896806864ee0cf3,2024-08-22T19:35:30.730000
|
||||||
CVE-2024-36444,0,0,7764dcc9d2cad1809eec2f3d12f8959ca5dfa6fa7ba59999bc2fa6d6ce039685,2024-08-22T15:15:16.117000
|
CVE-2024-36444,0,0,7764dcc9d2cad1809eec2f3d12f8959ca5dfa6fa7ba59999bc2fa6d6ce039685,2024-08-22T15:15:16.117000
|
||||||
CVE-2024-36445,0,0,b3878d99c2c158182c669809477e39a5c3c4bcc3cc88b511a97003a3be74bdce,2024-08-22T15:15:16.187000
|
CVE-2024-36445,0,0,b3878d99c2c158182c669809477e39a5c3c4bcc3cc88b511a97003a3be74bdce,2024-08-22T15:15:16.187000
|
||||||
CVE-2024-36446,0,0,fb83b75323b3e400ca2145700cc136f4b6c6846fd602109bf32c3aabc452c8ad,2024-08-14T02:07:05.410000
|
CVE-2024-36446,0,0,fb83b75323b3e400ca2145700cc136f4b6c6846fd602109bf32c3aabc452c8ad,2024-08-14T02:07:05.410000
|
||||||
@ -254366,7 +254366,7 @@ CVE-2024-36575,0,0,b117fb4e52d0f8b4cc58a403a03ce56bde8486e8cc8deaf2edb246c707092
|
|||||||
CVE-2024-36577,0,0,576812aeee52a5f7c1a1906492595372da454d658eef342066e241ac365be3f2,2024-07-03T02:03:20.433000
|
CVE-2024-36577,0,0,576812aeee52a5f7c1a1906492595372da454d658eef342066e241ac365be3f2,2024-07-03T02:03:20.433000
|
||||||
CVE-2024-36578,0,0,31bf2da1d72ccc586cf7c2601482054c25f91d07cda12037e2c9b6f157363a1c,2024-07-03T02:03:21.253000
|
CVE-2024-36578,0,0,31bf2da1d72ccc586cf7c2601482054c25f91d07cda12037e2c9b6f157363a1c,2024-07-03T02:03:21.253000
|
||||||
CVE-2024-3658,0,0,a8a6b79dfd0c32467a1ed9fb3702397672f9a3e041e004bbddb8214a3aee78d6,2024-05-28T15:15:09.703000
|
CVE-2024-3658,0,0,a8a6b79dfd0c32467a1ed9fb3702397672f9a3e041e004bbddb8214a3aee78d6,2024-05-28T15:15:09.703000
|
||||||
CVE-2024-36580,0,0,4e1be53a2f39c0a80b55fee3f7dc36a6db304045cdf599ebdf8f8db467e32f50,2024-06-20T12:44:22.977000
|
CVE-2024-36580,0,1,214697697bb80df3f9cca6a9df817f6d970b4b4eff9913528d0b988f85d755f8,2024-08-22T19:35:31.613000
|
||||||
CVE-2024-36581,0,0,48b3b841e1a97b73bb9fb2b7b5331df839757f8bbf0337d9846097c4be400d00,2024-08-01T13:53:09.057000
|
CVE-2024-36581,0,0,48b3b841e1a97b73bb9fb2b7b5331df839757f8bbf0337d9846097c4be400d00,2024-08-01T13:53:09.057000
|
||||||
CVE-2024-36582,0,0,b71b20c052e8f3abff98eda16b544f3e1b361097abcfc5540ed46152890c3496,2024-08-19T17:35:19.213000
|
CVE-2024-36582,0,0,b71b20c052e8f3abff98eda16b544f3e1b361097abcfc5540ed46152890c3496,2024-08-19T17:35:19.213000
|
||||||
CVE-2024-36583,0,0,ddd27123c3646f7a3fa3b735f22a6a85d1a122401d7d1a0d660277bbd83fa9d8,2024-07-03T02:03:22.067000
|
CVE-2024-36583,0,0,ddd27123c3646f7a3fa3b735f22a6a85d1a122401d7d1a0d660277bbd83fa9d8,2024-07-03T02:03:22.067000
|
||||||
@ -254434,7 +254434,7 @@ CVE-2024-3676,0,0,8dc193c8609917b35ba91a632e73de4e92ed46289774a677f06060a8b04aac
|
|||||||
CVE-2024-36760,0,0,841ebe4cb8fe3bd81c22749215bf86b89aa9ddd323f20136f04010af75de3413,2024-07-03T02:03:35.990000
|
CVE-2024-36760,0,0,841ebe4cb8fe3bd81c22749215bf86b89aa9ddd323f20136f04010af75de3413,2024-07-03T02:03:35.990000
|
||||||
CVE-2024-36761,0,0,2def433fa1c84a9e275856e3918a20f7afbf72e8563d9face0a26c843d2d46da,2024-06-13T18:36:09.010000
|
CVE-2024-36761,0,0,2def433fa1c84a9e275856e3918a20f7afbf72e8563d9face0a26c843d2d46da,2024-06-13T18:36:09.010000
|
||||||
CVE-2024-3677,0,0,6cc15bc7354ad532633e5fc6daa425aea3dc2f25b49c3017f86224f41078ae1a,2024-05-02T18:00:37.360000
|
CVE-2024-3677,0,0,6cc15bc7354ad532633e5fc6daa425aea3dc2f25b49c3017f86224f41078ae1a,2024-05-02T18:00:37.360000
|
||||||
CVE-2024-36773,0,0,720de74f1ee0644bf544aa650aaafc650bba06adb51118d8aad2d248b0937337,2024-08-02T17:05:08.087000
|
CVE-2024-36773,0,1,4ac6d9752deb503d9154cd9b7cfebc1de88c0335c9fecfd94ecc432aebe75b9b,2024-08-22T19:35:32.557000
|
||||||
CVE-2024-36774,0,0,a0f118c44c070f7e889ef45df0f4c9a5fc8bc258ceac7eec500dce645d16bebe,2024-08-19T15:35:09.967000
|
CVE-2024-36774,0,0,a0f118c44c070f7e889ef45df0f4c9a5fc8bc258ceac7eec500dce645d16bebe,2024-08-19T15:35:09.967000
|
||||||
CVE-2024-36775,0,0,750f40a30c6e33f479ff9b0d44a619121855a88190c8461ae383413d7d8bda06,2024-08-22T15:35:07.603000
|
CVE-2024-36775,0,0,750f40a30c6e33f479ff9b0d44a619121855a88190c8461ae383413d7d8bda06,2024-08-22T15:35:07.603000
|
||||||
CVE-2024-36779,0,0,683c0fd02360318850b70342be346d01a593435d02125ebb1b54b41fe6a80036,2024-08-20T16:35:20.517000
|
CVE-2024-36779,0,0,683c0fd02360318850b70342be346d01a593435d02125ebb1b54b41fe6a80036,2024-08-20T16:35:20.517000
|
||||||
@ -254446,13 +254446,13 @@ CVE-2024-36788,0,0,ce421f00af3050883a12bce11fefd1ad9628128d70c1a012c0032b203b967
|
|||||||
CVE-2024-36789,0,0,e3781e3969948bd92ae74a8bb78c5b0d32bc5708516429d524b2a965c1c4e0b5,2024-08-15T16:35:11.633000
|
CVE-2024-36789,0,0,e3781e3969948bd92ae74a8bb78c5b0d32bc5708516429d524b2a965c1c4e0b5,2024-08-15T16:35:11.633000
|
||||||
CVE-2024-36790,0,0,f8247224261f96e31ccf08410164dd4379381055fde60fa853baf6df22465be3,2024-08-14T20:35:14.473000
|
CVE-2024-36790,0,0,f8247224261f96e31ccf08410164dd4379381055fde60fa853baf6df22465be3,2024-08-14T20:35:14.473000
|
||||||
CVE-2024-36792,0,0,fabceb2ff375c58d64c9553c86e9784f4de9e6f1c14eeb688305657805693eab,2024-07-03T02:03:37.690000
|
CVE-2024-36792,0,0,fabceb2ff375c58d64c9553c86e9784f4de9e6f1c14eeb688305657805693eab,2024-07-03T02:03:37.690000
|
||||||
CVE-2024-36795,0,1,421d7caed3f1bfdd012cee0400460351c045d5fa781e1724ee2bfb8de7fe2f98,2024-08-22T16:35:04.130000
|
CVE-2024-36795,0,0,421d7caed3f1bfdd012cee0400460351c045d5fa781e1724ee2bfb8de7fe2f98,2024-08-22T16:35:04.130000
|
||||||
CVE-2024-3680,0,0,a00e5c81c2599a81ed1e944ed0d1a6cb38236de396da2ad7b68a4f9ced279cbe,2024-05-14T16:11:39.510000
|
CVE-2024-3680,0,0,a00e5c81c2599a81ed1e944ed0d1a6cb38236de396da2ad7b68a4f9ced279cbe,2024-05-14T16:11:39.510000
|
||||||
CVE-2024-36800,0,0,7145d6f747aaada9716fb81bc8dfb45a6760f4d4c44d1923a8fcdfd4d6bf0704,2024-06-04T16:57:41.053000
|
CVE-2024-36800,0,0,7145d6f747aaada9716fb81bc8dfb45a6760f4d4c44d1923a8fcdfd4d6bf0704,2024-06-04T16:57:41.053000
|
||||||
CVE-2024-36801,0,0,615520142931b66fde6db6951c58c2f4d595e9209406619dd298379a6ca83c50,2024-06-04T16:57:41.053000
|
CVE-2024-36801,0,0,615520142931b66fde6db6951c58c2f4d595e9209406619dd298379a6ca83c50,2024-06-04T16:57:41.053000
|
||||||
CVE-2024-36802,0,0,d90679a1557e63ced02c20ce3a95d6abd566ddbe5bfb37eb5db0c573c610d3f6,2024-06-26T06:15:15.200000
|
CVE-2024-36802,0,0,d90679a1557e63ced02c20ce3a95d6abd566ddbe5bfb37eb5db0c573c610d3f6,2024-06-26T06:15:15.200000
|
||||||
CVE-2024-3681,0,0,447617aa0ff72974414a3f009efb09a39cced1c45f643ef6f3cd3ded49aa798d,2024-05-02T18:00:37.360000
|
CVE-2024-3681,0,0,447617aa0ff72974414a3f009efb09a39cced1c45f643ef6f3cd3ded49aa798d,2024-05-02T18:00:37.360000
|
||||||
CVE-2024-36811,0,0,f90db255bac241fb3eb4c4274fa7aa4f43fe1ecaa498e979225312b15e44df61,2024-06-07T19:24:09.243000
|
CVE-2024-36811,0,1,815d4884a97aa7f3725308aaf483dcc964427c0f4f9f5a4bc76dffdbfa70bca4,2024-08-22T18:35:13.753000
|
||||||
CVE-2024-36819,0,0,b06c755f900c06f50434f89b91de559393300344dda01bbc662266b5fc611e52,2024-06-26T12:44:29.693000
|
CVE-2024-36819,0,0,b06c755f900c06f50434f89b91de559393300344dda01bbc662266b5fc611e52,2024-06-26T12:44:29.693000
|
||||||
CVE-2024-3682,0,0,aebee2feda89d709e11e9bec3e1c17ca0ae10ff39719e7f62be10e1e27b06dc2,2024-04-26T12:58:17.720000
|
CVE-2024-3682,0,0,aebee2feda89d709e11e9bec3e1c17ca0ae10ff39719e7f62be10e1e27b06dc2,2024-04-26T12:58:17.720000
|
||||||
CVE-2024-36821,0,0,4048b5245e036c49d5dbdedad8d1915f86e0e0022083fd298392f4047a036134,2024-08-16T16:33:38.597000
|
CVE-2024-36821,0,0,4048b5245e036c49d5dbdedad8d1915f86e0e0022083fd298392f4047a036134,2024-08-16T16:33:38.597000
|
||||||
@ -254462,11 +254462,11 @@ CVE-2024-36829,0,0,5509ab1d6b09194f3e037884f0294eea6f9178d3338dcfb674a6c6cc4137e
|
|||||||
CVE-2024-36837,0,0,bcb13008fecb3ca83d2c91f29752567c7b7ae53837e580080105d1fb590b60cf,2024-07-03T02:03:38.687000
|
CVE-2024-36837,0,0,bcb13008fecb3ca83d2c91f29752567c7b7ae53837e580080105d1fb590b60cf,2024-07-03T02:03:38.687000
|
||||||
CVE-2024-3684,0,0,ef6904f473bb993a6bf9ca34fba021c50efb8f96f04049399eccb5be29999ef7,2024-04-19T16:19:49.043000
|
CVE-2024-3684,0,0,ef6904f473bb993a6bf9ca34fba021c50efb8f96f04049399eccb5be29999ef7,2024-04-19T16:19:49.043000
|
||||||
CVE-2024-36840,0,0,c0a9de70789d65f424215f2cc1e80fd7ad2932b8a40a67794427ac3ed63f1d5e,2024-07-03T02:03:39.517000
|
CVE-2024-36840,0,0,c0a9de70789d65f424215f2cc1e80fd7ad2932b8a40a67794427ac3ed63f1d5e,2024-07-03T02:03:39.517000
|
||||||
CVE-2024-36843,0,0,9015deb54483bbcbcf02bd2036f67dfa0518d8cfe31e8126a4a07c18b90651be,2024-07-09T19:15:11.767000
|
CVE-2024-36843,0,1,4198bc8a9b485a9b6edbe36e6e06e96f5937d55d9694e4e4309439b88c915982,2024-08-22T18:35:15.457000
|
||||||
CVE-2024-36844,0,0,c94553ba0a682e74879975e6898720453ce64bffe623293e0082986b05d492e2,2024-08-19T16:35:19.853000
|
CVE-2024-36844,0,0,c94553ba0a682e74879975e6898720453ce64bffe623293e0082986b05d492e2,2024-08-19T16:35:19.853000
|
||||||
CVE-2024-36845,0,0,747949195846139aef34b9900f2ed12e01f0114001f72450e51b2514ff97399a,2024-07-03T02:03:40.363000
|
CVE-2024-36845,0,0,747949195846139aef34b9900f2ed12e01f0114001f72450e51b2514ff97399a,2024-07-03T02:03:40.363000
|
||||||
CVE-2024-3685,0,0,dda0c71ef8f633473513e14b8b76ca4b9f78357b8af623185fa69818b961df70,2024-05-17T02:40:03.840000
|
CVE-2024-3685,0,0,dda0c71ef8f633473513e14b8b76ca4b9f78357b8af623185fa69818b961df70,2024-05-17T02:40:03.840000
|
||||||
CVE-2024-36856,0,0,428da7159e6af3ad222a9ec24a9e21a9c38c9d1e6381cf02af11d68bd1668b7e,2024-06-13T18:36:09.013000
|
CVE-2024-36856,0,1,dcc09dd034e14f7209a49a89553bd06990a72cd8ab2f8f5d6e2d144a9d460281,2024-08-22T19:35:33.427000
|
||||||
CVE-2024-36857,0,0,a3957f20952d5f831d537cb81d4dc06ce5ec4152a9e930178e7fb48d5d56e274,2024-08-14T20:35:15.433000
|
CVE-2024-36857,0,0,a3957f20952d5f831d537cb81d4dc06ce5ec4152a9e930178e7fb48d5d56e274,2024-08-14T20:35:15.433000
|
||||||
CVE-2024-36858,0,0,bf952cd9ddab2a4c534851d95449ac4e2ed1c44a5763e3b560caa5613bebe64c,2024-08-14T19:35:23.693000
|
CVE-2024-36858,0,0,bf952cd9ddab2a4c534851d95449ac4e2ed1c44a5763e3b560caa5613bebe64c,2024-08-14T19:35:23.693000
|
||||||
CVE-2024-3686,0,0,4edaa8377de4644f957d15220cb91ea9e071a6615200cbf20f58f4b97f92967e,2024-05-17T02:40:03.933000
|
CVE-2024-3686,0,0,4edaa8377de4644f957d15220cb91ea9e071a6615200cbf20f58f4b97f92967e,2024-05-17T02:40:03.933000
|
||||||
@ -254649,7 +254649,7 @@ CVE-2024-37062,0,0,58b116066013b6d749a8f2b0cb5ea2db72b9da7fafa4e8c628598d59a99c6
|
|||||||
CVE-2024-37063,0,0,80954941ce1b7f85a9ddba2aa731f5591bda02de0a05b724cd044a2e0e2bf543,2024-06-04T16:57:41.053000
|
CVE-2024-37063,0,0,80954941ce1b7f85a9ddba2aa731f5591bda02de0a05b724cd044a2e0e2bf543,2024-06-04T16:57:41.053000
|
||||||
CVE-2024-37064,0,0,4c38fa1163e0fea8ab5ca1b8c699de3b9ac20f20b6e58d0f246dcde7abe2ce8c,2024-06-04T16:57:41.053000
|
CVE-2024-37064,0,0,4c38fa1163e0fea8ab5ca1b8c699de3b9ac20f20b6e58d0f246dcde7abe2ce8c,2024-06-04T16:57:41.053000
|
||||||
CVE-2024-37065,0,0,98a759a5df37913375764d521d81dec2811436d61b541015e740c355e39d43cd,2024-06-04T16:57:41.053000
|
CVE-2024-37065,0,0,98a759a5df37913375764d521d81dec2811436d61b541015e740c355e39d43cd,2024-06-04T16:57:41.053000
|
||||||
CVE-2024-37066,0,0,ae5db33dd6c962e6b7336efadb086a63a8b8a216ef42eadd0ebcdc9873952816,2024-07-19T13:01:44.567000
|
CVE-2024-37066,0,1,846c6cc9851f92e172f698dfdac0216349fea638c25d55cdb5de9d8c7c3efe87,2024-08-22T18:22:47.927000
|
||||||
CVE-2024-3707,0,0,6bfaa46ff6eb40f5f2f9b2ce66b762ad7c8a8dd85b0bee59ae4503c9e3de8bec,2024-07-05T13:15:10.997000
|
CVE-2024-3707,0,0,6bfaa46ff6eb40f5f2f9b2ce66b762ad7c8a8dd85b0bee59ae4503c9e3de8bec,2024-07-05T13:15:10.997000
|
||||||
CVE-2024-37077,0,0,ff2ab30c51fd1f14ba05ba8f6a2cb5932da12571ff707f15bafd014a8f78dc32,2024-07-03T18:02:47.117000
|
CVE-2024-37077,0,0,ff2ab30c51fd1f14ba05ba8f6a2cb5932da12571ff707f15bafd014a8f78dc32,2024-07-03T18:02:47.117000
|
||||||
CVE-2024-37078,0,0,009c869d231f8709f73a489f7029f4a82b9aafc8e4c52e039b4b2d9718fdb586,2024-07-05T08:15:03.130000
|
CVE-2024-37078,0,0,009c869d231f8709f73a489f7029f4a82b9aafc8e4c52e039b4b2d9718fdb586,2024-07-05T08:15:03.130000
|
||||||
@ -255520,7 +255520,7 @@ CVE-2024-38435,0,0,443ed766c9f1828c7340ce8e1e5ea8f41dedacb0f54d1fb72032e14d63301
|
|||||||
CVE-2024-38436,0,0,2a0666a7d40fd9b389de8adbff2ee11921b85d211afc0554b4f25dd1a035a738,2024-07-22T13:00:31.330000
|
CVE-2024-38436,0,0,2a0666a7d40fd9b389de8adbff2ee11921b85d211afc0554b4f25dd1a035a738,2024-07-22T13:00:31.330000
|
||||||
CVE-2024-38437,0,0,af3d5558f6171821fe7b56d83a7ce68b00464fcaad0f93b82569b698cf8c8174,2024-07-22T13:00:31.330000
|
CVE-2024-38437,0,0,af3d5558f6171821fe7b56d83a7ce68b00464fcaad0f93b82569b698cf8c8174,2024-07-22T13:00:31.330000
|
||||||
CVE-2024-38438,0,0,358e2c9395c78cc48f79a959f0dc011aabc3bf93ca600ba6e11d2ea9dd5c842d,2024-07-22T13:00:31.330000
|
CVE-2024-38438,0,0,358e2c9395c78cc48f79a959f0dc011aabc3bf93ca600ba6e11d2ea9dd5c842d,2024-07-22T13:00:31.330000
|
||||||
CVE-2024-38439,0,1,5e41004fdb849f3a15eab07684ffe3e0d6b4b290c3eafdf0306f628c717fabef,2024-08-22T17:35:02.870000
|
CVE-2024-38439,0,0,5e41004fdb849f3a15eab07684ffe3e0d6b4b290c3eafdf0306f628c717fabef,2024-08-22T17:35:02.870000
|
||||||
CVE-2024-3844,0,0,5af78e025341bf79ebde5375de51163c2d0699600acafc572d0eda08d0af5664,2024-08-06T19:35:07.433000
|
CVE-2024-3844,0,0,5af78e025341bf79ebde5375de51163c2d0699600acafc572d0eda08d0af5664,2024-08-06T19:35:07.433000
|
||||||
CVE-2024-38440,0,0,63abac1dfb7b4b8bf3c5de5703789232b47ff29321fae9f604e5571079b98b34,2024-08-05T17:35:14.930000
|
CVE-2024-38440,0,0,63abac1dfb7b4b8bf3c5de5703789232b47ff29321fae9f604e5571079b98b34,2024-08-05T17:35:14.930000
|
||||||
CVE-2024-38441,0,0,ac0b93cb6ffa098c7084725e672b8a46eaec79cba86c9914543059b94977fa29,2024-08-05T17:35:15.733000
|
CVE-2024-38441,0,0,ac0b93cb6ffa098c7084725e672b8a46eaec79cba86c9914543059b94977fa29,2024-08-05T17:35:15.733000
|
||||||
@ -255985,7 +255985,7 @@ CVE-2024-39208,0,0,bfca919135cb16c924d14a3e46a90c36fb45e8d6f50651e543c7c3b744627
|
|||||||
CVE-2024-39209,0,0,7ae48942b6b741e327b80a7d619fe2cbf17f09140a290b1dc29277309cf5b1dc,2024-08-01T13:55:46.647000
|
CVE-2024-39209,0,0,7ae48942b6b741e327b80a7d619fe2cbf17f09140a290b1dc29277309cf5b1dc,2024-08-01T13:55:46.647000
|
||||||
CVE-2024-3921,0,0,3df891161d817967027b36a59ee53de2ea83f1b76e0d4238df41e738cf592261,2024-08-09T20:35:04.863000
|
CVE-2024-3921,0,0,3df891161d817967027b36a59ee53de2ea83f1b76e0d4238df41e738cf592261,2024-08-09T20:35:04.863000
|
||||||
CVE-2024-39210,0,0,9e92b2a764e37e65ff70cacec2f99d4341944da2c135d4b7c23af986b18ec326,2024-07-09T16:22:51.927000
|
CVE-2024-39210,0,0,9e92b2a764e37e65ff70cacec2f99d4341944da2c135d4b7c23af986b18ec326,2024-07-09T16:22:51.927000
|
||||||
CVE-2024-39211,0,0,2097c1c66ba59a15383c9353c96916ab9a5680eac99b1f2a60f6c4879ed468b9,2024-07-05T12:55:51.367000
|
CVE-2024-39211,0,1,c9d7c4325bba0a2ec1ec1fe3daef35d056c7407899b9cbce0b5c58ab7122a0da,2024-08-22T19:35:34.747000
|
||||||
CVE-2024-3922,0,0,d93b594e75035330ffbe6c52b35218aa3c4c95531df86f73f7a2c93c08b19be8,2024-07-18T19:33:55.580000
|
CVE-2024-3922,0,0,d93b594e75035330ffbe6c52b35218aa3c4c95531df86f73f7a2c93c08b19be8,2024-07-18T19:33:55.580000
|
||||||
CVE-2024-39220,0,0,cffdc7781bb5a48c8af1f6973408b621ad60d81fad4d0ce74cb4feeeca56b86d,2024-07-09T16:22:52.750000
|
CVE-2024-39220,0,0,cffdc7781bb5a48c8af1f6973408b621ad60d81fad4d0ce74cb4feeeca56b86d,2024-07-09T16:22:52.750000
|
||||||
CVE-2024-39223,0,0,883c34699a9736998d96a24eca81d41004d2627c06ccc61484d0f3062b934079,2024-07-09T16:22:53.590000
|
CVE-2024-39223,0,0,883c34699a9736998d96a24eca81d41004d2627c06ccc61484d0f3062b934079,2024-07-09T16:22:53.590000
|
||||||
@ -256126,7 +256126,7 @@ CVE-2024-39429,0,0,c0f0ea0961d667a14523724c8241b9d1f206aa304e922487a3184313c2bde
|
|||||||
CVE-2024-3943,0,0,fecb7894fc8f71bb1eb318ec20be6409020b761b3221fbb9ca597f81fb48f5da,2024-05-30T13:15:41.297000
|
CVE-2024-3943,0,0,fecb7894fc8f71bb1eb318ec20be6409020b761b3221fbb9ca597f81fb48f5da,2024-05-30T13:15:41.297000
|
||||||
CVE-2024-39430,0,0,64e823bdb7084987f6e4f2dcc4ad0f20791cdd196a0003b3469db98557837678,2024-07-01T12:37:24.220000
|
CVE-2024-39430,0,0,64e823bdb7084987f6e4f2dcc4ad0f20791cdd196a0003b3469db98557837678,2024-07-01T12:37:24.220000
|
||||||
CVE-2024-3945,0,0,f529a76504b589632a786b994a7e59172142cd26cd001d628e7f3ff9658da8b1,2024-05-30T13:15:41.297000
|
CVE-2024-3945,0,0,f529a76504b589632a786b994a7e59172142cd26cd001d628e7f3ff9658da8b1,2024-05-30T13:15:41.297000
|
||||||
CVE-2024-39457,0,1,71348762cda2a65a9fb6ee86fb97ddb6684e341009bf79ffb50846af36c0e45a,2024-08-22T17:33:32.373000
|
CVE-2024-39457,0,0,71348762cda2a65a9fb6ee86fb97ddb6684e341009bf79ffb50846af36c0e45a,2024-08-22T17:33:32.373000
|
||||||
CVE-2024-39458,0,0,057d26d6064abe38c6844996c076741573b3fb5797f6e26a9cfc5dd443dbc18e,2024-06-27T12:47:19.847000
|
CVE-2024-39458,0,0,057d26d6064abe38c6844996c076741573b3fb5797f6e26a9cfc5dd443dbc18e,2024-06-27T12:47:19.847000
|
||||||
CVE-2024-39459,0,0,a2d4a360bea52f929e9e67b789c87ad1cf52c7054f238a5096a4acbd8cc22855,2024-06-27T12:47:19.847000
|
CVE-2024-39459,0,0,a2d4a360bea52f929e9e67b789c87ad1cf52c7054f238a5096a4acbd8cc22855,2024-06-27T12:47:19.847000
|
||||||
CVE-2024-3946,0,0,ab824b4f2a8403c27b100f5c3d6e7f8d9dd1c20c9aa138888e04631941f166f6,2024-05-30T13:15:41.297000
|
CVE-2024-3946,0,0,ab824b4f2a8403c27b100f5c3d6e7f8d9dd1c20c9aa138888e04631941f166f6,2024-05-30T13:15:41.297000
|
||||||
@ -256336,6 +256336,7 @@ CVE-2024-39705,0,0,91d39f33d5bd2d9618d124407e406b5aefb3921b0f0d526c128476a465358
|
|||||||
CVE-2024-39708,0,0,2eafb164d29e8efc470b1c615a7a961efa5060a31edd6795a1174fbb57cde7b9,2024-08-15T16:15:20.100000
|
CVE-2024-39708,0,0,2eafb164d29e8efc470b1c615a7a961efa5060a31edd6795a1174fbb57cde7b9,2024-08-15T16:15:20.100000
|
||||||
CVE-2024-3971,0,0,232de18e9e74ddfe0c81af44fc47161b6db81bcc698685ef24ea3f7084d9ef87,2024-07-29T16:51:34.570000
|
CVE-2024-3971,0,0,232de18e9e74ddfe0c81af44fc47161b6db81bcc698685ef24ea3f7084d9ef87,2024-07-29T16:51:34.570000
|
||||||
CVE-2024-39713,0,0,99e8a316dad486c18bb302062018548767182c9767b7c9ef5e1c3b6a3cdb13f2,2024-08-05T12:41:45.957000
|
CVE-2024-39713,0,0,99e8a316dad486c18bb302062018548767182c9767b7c9ef5e1c3b6a3cdb13f2,2024-08-05T12:41:45.957000
|
||||||
|
CVE-2024-39717,1,1,0287b7253c42801cd81bb87dcdcd0c884eb32e8da119d94075ee8a696b5cb3b3,2024-08-22T19:15:09.173000
|
||||||
CVE-2024-3972,0,0,0caddd7b34d493c3554c875afe72275890f23d83038241874e85ef811a9076b6,2024-08-01T13:56:47.637000
|
CVE-2024-3972,0,0,0caddd7b34d493c3554c875afe72275890f23d83038241874e85ef811a9076b6,2024-08-01T13:56:47.637000
|
||||||
CVE-2024-39723,0,0,003097d794792a3e1194202f71608927b35e402887d5f5ddf07d35b5dd183916,2024-07-11T14:54:10.243000
|
CVE-2024-39723,0,0,003097d794792a3e1194202f71608927b35e402887d5f5ddf07d35b5dd183916,2024-07-11T14:54:10.243000
|
||||||
CVE-2024-39728,0,0,fba26233ce0c4692619efffa132c45bfb836485ad2132e6f2e6d7ce0ec6f97d0,2024-07-16T13:57:37.203000
|
CVE-2024-39728,0,0,fba26233ce0c4692619efffa132c45bfb836485ad2132e6f2e6d7ce0ec6f97d0,2024-07-16T13:57:37.203000
|
||||||
@ -256534,7 +256535,7 @@ CVE-2024-40333,0,0,7e3d2c86e913650fda83b9ed457908dd220d08dc6d50420a52a17a80ec44e
|
|||||||
CVE-2024-40334,0,0,7c5139eedfaa7c790c86aa9490dc20d97f552a9ba2b8fc27c6c10365859ea652,2024-08-01T13:57:11.203000
|
CVE-2024-40334,0,0,7c5139eedfaa7c790c86aa9490dc20d97f552a9ba2b8fc27c6c10365859ea652,2024-08-01T13:57:11.203000
|
||||||
CVE-2024-40336,0,0,a5b75245e4db87e4fc3263aabb369a58a472f30d7c4ce491654a7dc1d23a1d6f,2024-07-11T15:06:22.143000
|
CVE-2024-40336,0,0,a5b75245e4db87e4fc3263aabb369a58a472f30d7c4ce491654a7dc1d23a1d6f,2024-07-11T15:06:22.143000
|
||||||
CVE-2024-4034,0,0,b39ca2e444e8e083e595bb1c45cab5e2a41d75405ee52855e2d6dbb02a011da0,2024-05-02T18:00:37.360000
|
CVE-2024-4034,0,0,b39ca2e444e8e083e595bb1c45cab5e2a41d75405ee52855e2d6dbb02a011da0,2024-05-02T18:00:37.360000
|
||||||
CVE-2024-40347,0,0,de9468190b204b497ece56be99f262af1b42bf76ed7f418d30bb9f22c65ba719,2024-07-22T13:00:53.287000
|
CVE-2024-40347,0,1,5083889b5d718c58eb8d1f1588f34f2acdc50ca81bdbf57436efa16a3a8ffc06,2024-08-22T18:37:49.850000
|
||||||
CVE-2024-40348,0,0,6f13fda773d8e13c984cf3b16a2d645e0294f8f1764ff4caaca1e99b49b9dc8a,2024-08-01T13:57:13.270000
|
CVE-2024-40348,0,0,6f13fda773d8e13c984cf3b16a2d645e0294f8f1764ff4caaca1e99b49b9dc8a,2024-08-01T13:57:13.270000
|
||||||
CVE-2024-4035,0,0,3bb15040ac0c3c22ceadcf3607ee680ed3a99c29170715a5693bcfb82b999cb6,2024-04-25T13:18:02.660000
|
CVE-2024-4035,0,0,3bb15040ac0c3c22ceadcf3607ee680ed3a99c29170715a5693bcfb82b999cb6,2024-04-25T13:18:02.660000
|
||||||
CVE-2024-4036,0,0,faef85b8ea4d3772643857800ca53857ac0bd4e8c893e27c61e628dc7852637c,2024-05-02T18:00:37.360000
|
CVE-2024-4036,0,0,faef85b8ea4d3772643857800ca53857ac0bd4e8c893e27c61e628dc7852637c,2024-05-02T18:00:37.360000
|
||||||
@ -256600,7 +256601,7 @@ CVE-2024-40522,0,0,8a677ab9989e362511bec3e6f4edb768c909d11d73452c70e9694007bb6c7
|
|||||||
CVE-2024-40524,0,0,90f7431206b5ecbb9d18d5d6f346e266df059fa6fac9c7463be67ad7414064c8,2024-08-01T13:57:37.610000
|
CVE-2024-40524,0,0,90f7431206b5ecbb9d18d5d6f346e266df059fa6fac9c7463be67ad7414064c8,2024-08-01T13:57:37.610000
|
||||||
CVE-2024-40530,0,0,9e5cc738a7a0e410e0970f7751814354231f294fa9d110e489777dfb798ceffa,2024-08-06T16:30:24.547000
|
CVE-2024-40530,0,0,9e5cc738a7a0e410e0970f7751814354231f294fa9d110e489777dfb798ceffa,2024-08-06T16:30:24.547000
|
||||||
CVE-2024-40531,0,0,9e583eb42d15be1f9048ae9b1965517ea12462cc8e4dd76ae30b81e5d3440314,2024-08-07T19:35:06.233000
|
CVE-2024-40531,0,0,9e583eb42d15be1f9048ae9b1965517ea12462cc8e4dd76ae30b81e5d3440314,2024-08-07T19:35:06.233000
|
||||||
CVE-2024-40535,0,0,4a5d9d0c87f6ae400c205afdbc4f766e452e750a075595a5321b8d7d810f01d1,2024-07-17T13:34:20.520000
|
CVE-2024-40535,0,1,1510e098104a1d2f524b97f4ba986590a1c7d9af78dd4e91187f28763928fd2c,2024-08-22T19:35:35.893000
|
||||||
CVE-2024-40536,0,0,8e08633375577085d9df665f2d62466b3b6eb1ecb2618a56ac5894fb283b7f3f,2024-07-17T13:34:20.520000
|
CVE-2024-40536,0,0,8e08633375577085d9df665f2d62466b3b6eb1ecb2618a56ac5894fb283b7f3f,2024-07-17T13:34:20.520000
|
||||||
CVE-2024-40539,0,0,8ebc42c1390ef84ac367ae8d1ba0b0ce9ac095f50c081e4e40b961f1bf0b144d,2024-08-01T13:57:39.077000
|
CVE-2024-40539,0,0,8ebc42c1390ef84ac367ae8d1ba0b0ce9ac095f50c081e4e40b961f1bf0b144d,2024-08-01T13:57:39.077000
|
||||||
CVE-2024-40540,0,0,812067b26dd7cd753b1d3089300f8704ff38af643d689f8a41629c2d3fffe24f,2024-08-01T13:57:39.867000
|
CVE-2024-40540,0,0,812067b26dd7cd753b1d3089300f8704ff38af643d689f8a41629c2d3fffe24f,2024-08-01T13:57:39.867000
|
||||||
@ -256686,7 +256687,7 @@ CVE-2024-40721,0,0,e925b9407604ba1cd45dcb152cbb5c51e61b8964f6bec2135a5763eab76a2
|
|||||||
CVE-2024-40722,0,0,3f4f7e149a4eb425a0e28fef9d1b50a8bebfa8863debf3c2b799a570ae99ce9f,2024-08-09T14:39:28.157000
|
CVE-2024-40722,0,0,3f4f7e149a4eb425a0e28fef9d1b50a8bebfa8863debf3c2b799a570ae99ce9f,2024-08-09T14:39:28.157000
|
||||||
CVE-2024-40723,0,0,e04f296cec18624b17999f7835fdbf784e5f656a5baf868ac5f6b3b681e3a875,2024-08-09T14:44:01.907000
|
CVE-2024-40723,0,0,e04f296cec18624b17999f7835fdbf784e5f656a5baf868ac5f6b3b681e3a875,2024-08-09T14:44:01.907000
|
||||||
CVE-2024-40724,0,0,7760c39c7ea9cd43ce07bb58fee4f3b8fbd5ff3c12d0d2faca499135b3db5d70,2024-08-07T20:15:57.773000
|
CVE-2024-40724,0,0,7760c39c7ea9cd43ce07bb58fee4f3b8fbd5ff3c12d0d2faca499135b3db5d70,2024-08-07T20:15:57.773000
|
||||||
CVE-2024-40725,0,1,49f0f88958ae561d8b2b0b1ee4fb8bec2acdee702f61bcb5645f83d42fdd426a,2024-08-22T17:13:09.820000
|
CVE-2024-40725,0,0,49f0f88958ae561d8b2b0b1ee4fb8bec2acdee702f61bcb5645f83d42fdd426a,2024-08-22T17:13:09.820000
|
||||||
CVE-2024-40726,0,0,763881d353b2a872c395d06db8ff47aa2480183ffa56c57536446e062ec43bc5,2024-07-11T15:06:22.967000
|
CVE-2024-40726,0,0,763881d353b2a872c395d06db8ff47aa2480183ffa56c57536446e062ec43bc5,2024-07-11T15:06:22.967000
|
||||||
CVE-2024-40727,0,0,b9db12f74fa9e60fafdd87d2e3b118721f9da9edf52efc272fb39aa64e4cd584,2024-07-11T15:06:23.850000
|
CVE-2024-40727,0,0,b9db12f74fa9e60fafdd87d2e3b118721f9da9edf52efc272fb39aa64e4cd584,2024-07-11T15:06:23.850000
|
||||||
CVE-2024-40728,0,0,5d2cc4c2d64f07952d89d5ed2b4fa506494bbe43569a964ec30192faf719601b,2024-08-01T13:57:55.770000
|
CVE-2024-40728,0,0,5d2cc4c2d64f07952d89d5ed2b4fa506494bbe43569a964ec30192faf719601b,2024-08-01T13:57:55.770000
|
||||||
@ -256777,7 +256778,7 @@ CVE-2024-40872,0,0,61b6054f8d04261e92c08a44feec16dc1d8422a97543a2162e5dea5f0a6c8
|
|||||||
CVE-2024-40873,0,0,6df1707815f9f38105b50cd71b6fad1bdaf7a6f3e3c945bc399ab848fdd0a9bf,2024-08-02T19:57:17.407000
|
CVE-2024-40873,0,0,6df1707815f9f38105b50cd71b6fad1bdaf7a6f3e3c945bc399ab848fdd0a9bf,2024-08-02T19:57:17.407000
|
||||||
CVE-2024-4088,0,0,61cc31924b86843bbd20c326ef7465dc1aa394b548458b2e1a9fc62c09ede628,2024-06-11T17:11:30.193000
|
CVE-2024-4088,0,0,61cc31924b86843bbd20c326ef7465dc1aa394b548458b2e1a9fc62c09ede628,2024-06-11T17:11:30.193000
|
||||||
CVE-2024-40883,0,0,dacd9a67232f6d97da8b548085eb71f69250fd3fec34bd945dc78c157c912274,2024-08-01T12:42:36.933000
|
CVE-2024-40883,0,0,dacd9a67232f6d97da8b548085eb71f69250fd3fec34bd945dc78c157c912274,2024-08-01T12:42:36.933000
|
||||||
CVE-2024-40884,1,1,9dc081271de7d95f10da0bf793d111f8d53dd0e5b21b249774ac65c34f857073,2024-08-22T16:15:08.797000
|
CVE-2024-40884,0,0,9dc081271de7d95f10da0bf793d111f8d53dd0e5b21b249774ac65c34f857073,2024-08-22T16:15:08.797000
|
||||||
CVE-2024-40886,0,0,956e61b02c76a4462886dd7b546df3fa5ab5cdbdf99796901fd42a9badb0564a,2024-08-22T12:48:02.790000
|
CVE-2024-40886,0,0,956e61b02c76a4462886dd7b546df3fa5ab5cdbdf99796901fd42a9badb0564a,2024-08-22T12:48:02.790000
|
||||||
CVE-2024-40892,0,0,80f2c69eafcb531435cc671447d237ff8792f374d8c58f10182688d813811ab4,2024-08-21T18:15:09.710000
|
CVE-2024-40892,0,0,80f2c69eafcb531435cc671447d237ff8792f374d8c58f10182688d813811ab4,2024-08-21T18:15:09.710000
|
||||||
CVE-2024-40893,0,0,3220dba971e1861a31a0659deabcf8dc81ec736d5ed6a5b82a9eb1d0c8650fcc,2024-08-21T18:15:09.803000
|
CVE-2024-40893,0,0,3220dba971e1861a31a0659deabcf8dc81ec736d5ed6a5b82a9eb1d0c8650fcc,2024-08-21T18:15:09.803000
|
||||||
@ -257163,9 +257164,9 @@ CVE-2024-41577,0,0,1db7c1144df378d1f0197182c3eb7cc1bf4798d90e82fc3037fda80bd09f3
|
|||||||
CVE-2024-4158,0,0,9bd0a38e47c5b6d26f1e587737a0ffeb7c251278f38061995fc29ba309646aa6,2024-05-14T16:11:39.510000
|
CVE-2024-4158,0,0,9bd0a38e47c5b6d26f1e587737a0ffeb7c251278f38061995fc29ba309646aa6,2024-05-14T16:11:39.510000
|
||||||
CVE-2024-4159,0,0,72a4ec46db1a22f62474bfa22a14f37a28a6ceba3042de92b905fca6cc58c082,2024-04-25T23:15:47.087000
|
CVE-2024-4159,0,0,72a4ec46db1a22f62474bfa22a14f37a28a6ceba3042de92b905fca6cc58c082,2024-04-25T23:15:47.087000
|
||||||
CVE-2024-41597,0,0,7bc1c683ecc7754ef9a4accb42f1f9f659f54572a438343a1c4fabae2a9dfaf6,2024-08-01T13:58:54.793000
|
CVE-2024-41597,0,0,7bc1c683ecc7754ef9a4accb42f1f9f659f54572a438343a1c4fabae2a9dfaf6,2024-08-01T13:58:54.793000
|
||||||
CVE-2024-41599,0,0,eb607562b4faacb5cba93d5b9c0bbc37dd670b1d974499a6671588a854a9e5f8,2024-07-22T13:00:53.287000
|
CVE-2024-41599,0,1,48a45c986c9579d7d3c0496e1b383e5802ce839d40edd99b19ede2ffd41e1b22,2024-08-22T18:27:45.397000
|
||||||
CVE-2024-4160,0,0,02cbb5178621697de395e5bf97f83709ae910ce21eba24af27e6bc1b3971ae89,2024-05-31T13:01:46.727000
|
CVE-2024-4160,0,0,02cbb5178621697de395e5bf97f83709ae910ce21eba24af27e6bc1b3971ae89,2024-05-31T13:01:46.727000
|
||||||
CVE-2024-41600,0,0,c15c51d53ae94a762371dbf5dca32c6ce50f2d645e29733f7a591ad483809d6b,2024-07-22T13:00:53.287000
|
CVE-2024-41600,0,1,ddd05664b5ee0043272f1a43166002722a6b163ed847eae777be121e2c652a5b,2024-08-22T18:27:15.310000
|
||||||
CVE-2024-41601,0,0,bbe6fd3c72d7dad8c522d892fc1c0f9bacbb178b64f66555395886f778d90253,2024-08-01T13:58:55.750000
|
CVE-2024-41601,0,0,bbe6fd3c72d7dad8c522d892fc1c0f9bacbb178b64f66555395886f778d90253,2024-08-01T13:58:55.750000
|
||||||
CVE-2024-41602,0,0,3aaf8bd0d1359c5ef86792c331ff3b330f01dba788f9b1812b99e2f11e997bba,2024-08-01T13:58:56.507000
|
CVE-2024-41602,0,0,3aaf8bd0d1359c5ef86792c331ff3b330f01dba788f9b1812b99e2f11e997bba,2024-08-01T13:58:56.507000
|
||||||
CVE-2024-41603,0,0,274738d202695ad4f9eeac726dd842b3cdc47fbabba17edb5ee76c87292d7f32,2024-08-01T13:58:57.330000
|
CVE-2024-41603,0,0,274738d202695ad4f9eeac726dd842b3cdc47fbabba17edb5ee76c87292d7f32,2024-08-01T13:58:57.330000
|
||||||
@ -257191,7 +257192,7 @@ CVE-2024-41655,0,0,ef3400d9e58c2cde6c539334829c8042d5ee995783a74a46bd16638786b0b
|
|||||||
CVE-2024-41656,0,0,d1b3325a39b6b3bcc8a959c5c8544c45c6c0440a0b7279ac0753d809322ad5fb,2024-07-24T12:55:13.223000
|
CVE-2024-41656,0,0,d1b3325a39b6b3bcc8a959c5c8544c45c6c0440a0b7279ac0753d809322ad5fb,2024-07-24T12:55:13.223000
|
||||||
CVE-2024-41657,0,0,9548b1223e9a93c24c88da65f71fa257164363d0fa8c7101bf5615f81fe0c55e,2024-08-21T12:30:33.697000
|
CVE-2024-41657,0,0,9548b1223e9a93c24c88da65f71fa257164363d0fa8c7101bf5615f81fe0c55e,2024-08-21T12:30:33.697000
|
||||||
CVE-2024-41658,0,0,6ae504120f32a9740f2609938bf47828d872f6a284b7f6df52aa43fde2a8ed46,2024-08-21T12:30:33.697000
|
CVE-2024-41658,0,0,6ae504120f32a9740f2609938bf47828d872f6a284b7f6df52aa43fde2a8ed46,2024-08-21T12:30:33.697000
|
||||||
CVE-2024-41659,0,1,998a35290d72b0eb949229fc531ef068f95738d64bf6829749ab13d3e732d9a9,2024-08-22T16:15:08.993000
|
CVE-2024-41659,0,0,998a35290d72b0eb949229fc531ef068f95738d64bf6829749ab13d3e732d9a9,2024-08-22T16:15:08.993000
|
||||||
CVE-2024-4166,0,0,f698286bcd13839c3e713fc944a2d68390d9d1f07ea9696da7a343bdead6335d,2024-05-17T02:40:17.900000
|
CVE-2024-4166,0,0,f698286bcd13839c3e713fc944a2d68390d9d1f07ea9696da7a343bdead6335d,2024-05-17T02:40:17.900000
|
||||||
CVE-2024-41660,0,0,4c084a0db17b15ec343b2b75da4e6745a4156a9dd9381d5cdd96e60eb80314c7,2024-08-01T12:42:36.933000
|
CVE-2024-41660,0,0,4c084a0db17b15ec343b2b75da4e6745a4156a9dd9381d5cdd96e60eb80314c7,2024-08-01T12:42:36.933000
|
||||||
CVE-2024-41661,0,0,9bb4ba38de23abec768fb88c25fd9926dc19ebbf46e995b3d88e74cabbdda1a3,2024-07-24T12:55:13.223000
|
CVE-2024-41661,0,0,9bb4ba38de23abec768fb88c25fd9926dc19ebbf46e995b3d88e74cabbdda1a3,2024-07-24T12:55:13.223000
|
||||||
@ -257626,20 +257627,20 @@ CVE-2024-42297,0,0,c6a17cd20eb476c36e74835def3dec9425eca068ceb110058bb8cda346565
|
|||||||
CVE-2024-42298,0,0,847a234781753fbc78128bf1a1b0230495d1dd37b0db004081592c3547d5f698,2024-08-19T12:59:59.177000
|
CVE-2024-42298,0,0,847a234781753fbc78128bf1a1b0230495d1dd37b0db004081592c3547d5f698,2024-08-19T12:59:59.177000
|
||||||
CVE-2024-42299,0,0,1d9a7f76ca05044914ea6b23419a3afe5dfacda94e0276680ead40f3cc253bdb,2024-08-19T12:59:59.177000
|
CVE-2024-42299,0,0,1d9a7f76ca05044914ea6b23419a3afe5dfacda94e0276680ead40f3cc253bdb,2024-08-19T12:59:59.177000
|
||||||
CVE-2024-42300,0,0,0085a0d67ebb00a2eb0fdee834d161b381fb524f015d1781780f7c3f00257248,2024-08-19T12:59:59.177000
|
CVE-2024-42300,0,0,0085a0d67ebb00a2eb0fdee834d161b381fb524f015d1781780f7c3f00257248,2024-08-19T12:59:59.177000
|
||||||
CVE-2024-42301,0,1,8d0c14aa5ce2bd9cfafdc53d1d4803a15deeb7dea9cf4dee21ca58c87d5e7b73,2024-08-22T16:31:18.667000
|
CVE-2024-42301,0,0,8d0c14aa5ce2bd9cfafdc53d1d4803a15deeb7dea9cf4dee21ca58c87d5e7b73,2024-08-22T16:31:18.667000
|
||||||
CVE-2024-42302,0,1,ac5603e3536d5d3d4e183c896c42b27487b96235a32c9669ebd773415a745978,2024-08-22T16:37:26.237000
|
CVE-2024-42302,0,0,ac5603e3536d5d3d4e183c896c42b27487b96235a32c9669ebd773415a745978,2024-08-22T16:37:26.237000
|
||||||
CVE-2024-42303,0,0,dcf78b75f0f625f0e1e5df3b0bc433e9d8484bdabfad7ed343c7012b7aaaf44f,2024-08-19T12:59:59.177000
|
CVE-2024-42303,0,0,dcf78b75f0f625f0e1e5df3b0bc433e9d8484bdabfad7ed343c7012b7aaaf44f,2024-08-19T12:59:59.177000
|
||||||
CVE-2024-42304,0,0,d173e622eb62d973d07785876ea39085958d8e911790210e06238340260b1d9a,2024-08-19T12:59:59.177000
|
CVE-2024-42304,0,0,d173e622eb62d973d07785876ea39085958d8e911790210e06238340260b1d9a,2024-08-19T12:59:59.177000
|
||||||
CVE-2024-42305,0,0,2a0027efaf18337e14a39532daab3b0d02ba1e240704105fd7925f4d1b755c9a,2024-08-19T12:59:59.177000
|
CVE-2024-42305,0,0,2a0027efaf18337e14a39532daab3b0d02ba1e240704105fd7925f4d1b755c9a,2024-08-19T12:59:59.177000
|
||||||
CVE-2024-42306,0,0,ecd4db3e8cdd17b10ea08b2eca0729317a2688c0bef58523ae201bb7d84633e3,2024-08-19T12:59:59.177000
|
CVE-2024-42306,0,0,ecd4db3e8cdd17b10ea08b2eca0729317a2688c0bef58523ae201bb7d84633e3,2024-08-19T12:59:59.177000
|
||||||
CVE-2024-42307,0,0,021c1bf3b0b2f8d64c924e06216b8a74c38217276f58a374fe838603733c4495,2024-08-19T12:59:59.177000
|
CVE-2024-42307,0,0,021c1bf3b0b2f8d64c924e06216b8a74c38217276f58a374fe838603733c4495,2024-08-19T12:59:59.177000
|
||||||
CVE-2024-42308,0,0,2a36ea46f924932ba8b403ffa81309ed7322f08858d89457f1ac73d7be8c21fe,2024-08-19T12:59:59.177000
|
CVE-2024-42308,0,0,2a36ea46f924932ba8b403ffa81309ed7322f08858d89457f1ac73d7be8c21fe,2024-08-19T12:59:59.177000
|
||||||
CVE-2024-42309,0,1,620e4db2a37ec65908b26f0c89994589b6187d0cfe5ed9c47a2f3dc54d759d19,2024-08-22T16:01:29.287000
|
CVE-2024-42309,0,0,620e4db2a37ec65908b26f0c89994589b6187d0cfe5ed9c47a2f3dc54d759d19,2024-08-22T16:01:29.287000
|
||||||
CVE-2024-4231,0,0,c87a42b4dfede9046d13b34e260c0c7ec4e51f68f0fbfb8755010b78e39f405d,2024-08-01T13:59:28.843000
|
CVE-2024-4231,0,0,c87a42b4dfede9046d13b34e260c0c7ec4e51f68f0fbfb8755010b78e39f405d,2024-08-01T13:59:28.843000
|
||||||
CVE-2024-42310,0,1,400c9cfae2eb45fa11efe161bf5c79e5b421ec2976855d764d0806127b25caf0,2024-08-22T16:01:46.263000
|
CVE-2024-42310,0,0,400c9cfae2eb45fa11efe161bf5c79e5b421ec2976855d764d0806127b25caf0,2024-08-22T16:01:46.263000
|
||||||
CVE-2024-42311,0,0,ee026ffaa3435a8fee00e98fff3782a46b4f2eff532aed7bff974de91275ee18,2024-08-19T12:59:59.177000
|
CVE-2024-42311,0,0,ee026ffaa3435a8fee00e98fff3782a46b4f2eff532aed7bff974de91275ee18,2024-08-19T12:59:59.177000
|
||||||
CVE-2024-42312,0,0,8419f66ad6ae63296361d79f9dacef9b878e08f5aec63988a53ec2b285c951e4,2024-08-19T12:59:59.177000
|
CVE-2024-42312,0,0,8419f66ad6ae63296361d79f9dacef9b878e08f5aec63988a53ec2b285c951e4,2024-08-19T12:59:59.177000
|
||||||
CVE-2024-42313,0,1,9c1d5c48d055f58f1d9db953b1d9df536df6f372c5b4c034423cf0ca1e8ccaa9,2024-08-22T16:01:59.467000
|
CVE-2024-42313,0,0,9c1d5c48d055f58f1d9db953b1d9df536df6f372c5b4c034423cf0ca1e8ccaa9,2024-08-22T16:01:59.467000
|
||||||
CVE-2024-42314,0,0,89c58dc7b3cd8b2fd3f960c13bee9362713642d22d4898076c0acf86c2564d4a,2024-08-22T15:50:47.437000
|
CVE-2024-42314,0,0,89c58dc7b3cd8b2fd3f960c13bee9362713642d22d4898076c0acf86c2564d4a,2024-08-22T15:50:47.437000
|
||||||
CVE-2024-42315,0,0,ad8e62245cec9b91e03cf0701da404d6b4ca5f784fbecb811226908929f71f6e,2024-08-22T15:51:03.077000
|
CVE-2024-42315,0,0,ad8e62245cec9b91e03cf0701da404d6b4ca5f784fbecb811226908929f71f6e,2024-08-22T15:51:03.077000
|
||||||
CVE-2024-42316,0,0,5b706fe03d29a1efdfca0a0866006926090ec5745ff3a19fc18eeaca74a060eb,2024-08-22T15:52:38.520000
|
CVE-2024-42316,0,0,5b706fe03d29a1efdfca0a0866006926090ec5745ff3a19fc18eeaca74a060eb,2024-08-22T15:52:38.520000
|
||||||
@ -257745,9 +257746,9 @@ CVE-2024-42487,0,0,2efeb3a744823d93cb77dca921c5d1e1876bd604d6d9b9e3d12e2ec5d005b
|
|||||||
CVE-2024-42488,0,0,d4b28d6f7587a9892f3e1f2f60f322ad605b2174a3099ed0ae0224cdeca7655d,2024-08-19T13:00:23.117000
|
CVE-2024-42488,0,0,d4b28d6f7587a9892f3e1f2f60f322ad605b2174a3099ed0ae0224cdeca7655d,2024-08-19T13:00:23.117000
|
||||||
CVE-2024-42489,0,0,cdd86cc62ae99e91c414cd210e2840035f1a515c38caae18a4e22c79cdb0af72,2024-08-12T18:57:17.383000
|
CVE-2024-42489,0,0,cdd86cc62ae99e91c414cd210e2840035f1a515c38caae18a4e22c79cdb0af72,2024-08-12T18:57:17.383000
|
||||||
CVE-2024-4249,0,0,20dbadf05c38d413ed14f5d424310da5ffa119a0ccbbcb5b690e0c54ceac344f,2024-06-04T19:20:34.093000
|
CVE-2024-4249,0,0,20dbadf05c38d413ed14f5d424310da5ffa119a0ccbbcb5b690e0c54ceac344f,2024-06-04T19:20:34.093000
|
||||||
CVE-2024-42490,1,1,3eec40446c13f9eb28bd32bc94ff39cd886335dbb08831b09e891eacc1349c53,2024-08-22T16:15:09.117000
|
CVE-2024-42490,0,0,3eec40446c13f9eb28bd32bc94ff39cd886335dbb08831b09e891eacc1349c53,2024-08-22T16:15:09.117000
|
||||||
CVE-2024-42493,0,0,f6b5486c33bc66cf003608659d12007760e6f11e14f162d8f0f6b524c3d0cd10,2024-08-08T18:55:19.180000
|
CVE-2024-42493,0,0,f6b5486c33bc66cf003608659d12007760e6f11e14f162d8f0f6b524c3d0cd10,2024-08-08T18:55:19.180000
|
||||||
CVE-2024-42497,1,1,d0db13532a5ddb0f8eb4c11c984e4109db7e68721821582b492c07273b6e93f5,2024-08-22T16:15:09.330000
|
CVE-2024-42497,0,0,d0db13532a5ddb0f8eb4c11c984e4109db7e68721821582b492c07273b6e93f5,2024-08-22T16:15:09.330000
|
||||||
CVE-2024-4250,0,0,29d8096febeb47af7a705b5c5f44b0e0121b5483d3074c39ff1bff1155e9a3a5,2024-06-04T19:20:34.200000
|
CVE-2024-4250,0,0,29d8096febeb47af7a705b5c5f44b0e0121b5483d3074c39ff1bff1155e9a3a5,2024-06-04T19:20:34.200000
|
||||||
CVE-2024-4251,0,0,4911c8bef2a1e60ace7e3694403733ed66cd48ed80870211c4240e0e24584389,2024-06-04T19:20:34.297000
|
CVE-2024-4251,0,0,4911c8bef2a1e60ace7e3694403733ed66cd48ed80870211c4240e0e24584389,2024-06-04T19:20:34.297000
|
||||||
CVE-2024-4252,0,0,9237a844d9d9b4c175441eb52c39ce07fc14167f47531df4616e5c1079e2e93b,2024-05-17T02:40:21.053000
|
CVE-2024-4252,0,0,9237a844d9d9b4c175441eb52c39ce07fc14167f47531df4616e5c1079e2e93b,2024-05-17T02:40:21.053000
|
||||||
@ -257798,7 +257799,7 @@ CVE-2024-42583,0,0,8fd0440f353ad964c47cf3a77100747b6a669fde220cd35bfe86af45e7c13
|
|||||||
CVE-2024-42584,0,0,1d49fc6ba26b04e6a414935584dbbc10ccedbe7e9c02f914a1b9e55e373062b9,2024-08-21T13:37:57.767000
|
CVE-2024-42584,0,0,1d49fc6ba26b04e6a414935584dbbc10ccedbe7e9c02f914a1b9e55e373062b9,2024-08-21T13:37:57.767000
|
||||||
CVE-2024-42585,0,0,a5c96f6969903c085392629454a335ad16ad53dd668e8958bf965c31b35d6775,2024-08-20T16:35:31.307000
|
CVE-2024-42585,0,0,a5c96f6969903c085392629454a335ad16ad53dd668e8958bf965c31b35d6775,2024-08-20T16:35:31.307000
|
||||||
CVE-2024-42586,0,0,cbadbedcb4b3c2d2ab907140f92a66b7af1f959a0d34de9272c8d68911fd44f3,2024-08-20T16:35:33.523000
|
CVE-2024-42586,0,0,cbadbedcb4b3c2d2ab907140f92a66b7af1f959a0d34de9272c8d68911fd44f3,2024-08-20T16:35:33.523000
|
||||||
CVE-2024-42598,0,1,0d05d8dab7d3f4ad09766e52642da392dd15ece228ebf0dca63459f8d654e22f,2024-08-22T16:35:06.180000
|
CVE-2024-42598,0,1,f71051f9c507db6076bf3717820c0c67d1cab35bfba6f04f909801baaae9d568,2024-08-22T18:15:10.187000
|
||||||
CVE-2024-4260,0,0,16d46a0b5bcb66a093fc7ed1472e8a955d65f29368360dc29eff1d3d84145b9b,2024-08-01T13:59:29.547000
|
CVE-2024-4260,0,0,16d46a0b5bcb66a093fc7ed1472e8a955d65f29368360dc29eff1d3d84145b9b,2024-08-01T13:59:29.547000
|
||||||
CVE-2024-42603,0,0,994e52c74dfb66d27249c2b65181ca74c70f6e7f1904d6fd7ee8f461dc2cc6fb,2024-08-21T13:21:56.383000
|
CVE-2024-42603,0,0,994e52c74dfb66d27249c2b65181ca74c70f6e7f1904d6fd7ee8f461dc2cc6fb,2024-08-21T13:21:56.383000
|
||||||
CVE-2024-42604,0,0,53718c28d04ee9ff5e5273896e62f5eef0651385f9073829087b371924096be7,2024-08-21T20:35:05.780000
|
CVE-2024-42604,0,0,53718c28d04ee9ff5e5273896e62f5eef0651385f9073829087b371924096be7,2024-08-21T20:35:05.780000
|
||||||
@ -257870,22 +257871,24 @@ CVE-2024-42748,0,0,52e6e14746af30f6f3124891b89bbdbe775ebb6c4232d3347332f267006d0
|
|||||||
CVE-2024-4275,0,0,c229bc373f94c5248df137d0b0d9ca9d61bf79f845040a419335cc081cba5e27,2024-05-14T16:11:39.510000
|
CVE-2024-4275,0,0,c229bc373f94c5248df137d0b0d9ca9d61bf79f845040a419335cc081cba5e27,2024-05-14T16:11:39.510000
|
||||||
CVE-2024-42757,0,0,7f6ba25a82908bfc7acb20e761fdbba6f23f597232f39843fc1cc43949e3074d,2024-08-20T15:35:25.190000
|
CVE-2024-42757,0,0,7f6ba25a82908bfc7acb20e761fdbba6f23f597232f39843fc1cc43949e3074d,2024-08-20T15:35:25.190000
|
||||||
CVE-2024-42758,0,0,78591070e9343c09b0ea814d5b331b967691862f9b02d6e8c624fb011530a86d,2024-08-19T18:35:14.237000
|
CVE-2024-42758,0,0,78591070e9343c09b0ea814d5b331b967691862f9b02d6e8c624fb011530a86d,2024-08-19T18:35:14.237000
|
||||||
CVE-2024-42768,1,1,f79fea926bde9b879e5109e9d7ccf7da6d7b9e28012b3c5dc2bf1594038712ee,2024-08-22T17:15:05.693000
|
CVE-2024-42767,1,1,a9af70e60ae4729616c8e41d35684a991996bffe02660ccbde0c88c3b2e5580a,2024-08-22T19:35:36.800000
|
||||||
CVE-2024-42769,1,1,37a87960c5f28ee9d84e69b3adbbcc050439fae36edce7f7fe85a762297528f7,2024-08-22T16:15:09.553000
|
CVE-2024-42768,0,1,01c9a577e2113a24d25ad4019b4f4d6fb1431167eec95d87d5c825a8100aef1a,2024-08-22T18:35:16.727000
|
||||||
|
CVE-2024-42769,0,1,41a04011f2437869f03856eeb060f408751a3c896461d4ab1914e040758874a0,2024-08-22T19:35:37.830000
|
||||||
CVE-2024-4277,0,0,ec975a6ab8cd435ccab2b915965095df8c992e1e8e765cf73bc6d545aa3b1e0a,2024-05-14T16:11:39.510000
|
CVE-2024-4277,0,0,ec975a6ab8cd435ccab2b915965095df8c992e1e8e765cf73bc6d545aa3b1e0a,2024-05-14T16:11:39.510000
|
||||||
CVE-2024-42770,1,1,213f338c118c1cbe17f8bc7d2011a969fb5d543d85c27b7a3da8ddf6af65531b,2024-08-22T16:35:07.240000
|
CVE-2024-42770,0,0,213f338c118c1cbe17f8bc7d2011a969fb5d543d85c27b7a3da8ddf6af65531b,2024-08-22T16:35:07.240000
|
||||||
CVE-2024-42771,1,1,09314c32302b97a3ccd054edfa4f9fecdf9b3ff025c4bc8ffc2b2a2979a12fc6,2024-08-22T16:15:09.730000
|
CVE-2024-42771,0,0,09314c32302b97a3ccd054edfa4f9fecdf9b3ff025c4bc8ffc2b2a2979a12fc6,2024-08-22T16:15:09.730000
|
||||||
CVE-2024-42772,1,1,4e62c39f7bbbd2ec4d9b0e556f4f946eb46f70662b958385c3fcf0b92905f592,2024-08-22T17:15:06.070000
|
CVE-2024-42772,0,1,c6fa15cc52f56ae33a3ddb59b887f84ca8d6a3d0b94bc71565f13766c07aa3e6,2024-08-22T19:35:38.793000
|
||||||
CVE-2024-42774,1,1,e14a4cf75acb6188434ccbc606909ebe07b86cbdf9dea44d004ad7863a967a10,2024-08-22T17:15:06.350000
|
CVE-2024-42773,1,1,a15b1dba4fd49bdf1bafdb1dd4446c4b47f48e6ccfe35acb5b3c465b2444e8d0,2024-08-22T18:15:10.367000
|
||||||
CVE-2024-42775,1,1,2e0cd48608fe41915ec9ff64309439001962a490bdbb2f88a448015aea179620,2024-08-22T17:15:06.580000
|
CVE-2024-42774,0,0,e14a4cf75acb6188434ccbc606909ebe07b86cbdf9dea44d004ad7863a967a10,2024-08-22T17:15:06.350000
|
||||||
CVE-2024-42776,1,1,5f7f3b3e4bf3124870102683953b810d90bbd4ef60cd4045588d0a7f7c2e3caa,2024-08-22T17:15:06.807000
|
CVE-2024-42775,0,0,2e0cd48608fe41915ec9ff64309439001962a490bdbb2f88a448015aea179620,2024-08-22T17:15:06.580000
|
||||||
|
CVE-2024-42776,0,0,5f7f3b3e4bf3124870102683953b810d90bbd4ef60cd4045588d0a7f7c2e3caa,2024-08-22T17:15:06.807000
|
||||||
CVE-2024-42777,0,0,a3a6a3f436d63757d909e35bf85227d948a610bf403bbf409724424474f99244,2024-08-22T12:48:02.790000
|
CVE-2024-42777,0,0,a3a6a3f436d63757d909e35bf85227d948a610bf403bbf409724424474f99244,2024-08-22T12:48:02.790000
|
||||||
CVE-2024-42778,0,1,d764d72d39cc4183a1af0d7e19f09d7d0960ab591232c3ea88adf9b672102c66,2024-08-22T17:46:56.953000
|
CVE-2024-42778,0,0,d764d72d39cc4183a1af0d7e19f09d7d0960ab591232c3ea88adf9b672102c66,2024-08-22T17:46:56.953000
|
||||||
CVE-2024-42779,0,0,7fa9347fecf8bb1f718d36d92bb608ba8868bf482dadae633b850723bf230632,2024-08-22T14:35:10.640000
|
CVE-2024-42779,0,0,7fa9347fecf8bb1f718d36d92bb608ba8868bf482dadae633b850723bf230632,2024-08-22T14:35:10.640000
|
||||||
CVE-2024-42780,0,0,e826593252205b3d8e5034341498fa244d03108b73f3ad8c82b84c6b7276e451,2024-08-22T12:48:02.790000
|
CVE-2024-42780,0,1,7efc9b98ef0d9ac4794d44ec0ccbc388ea7d3e0de2d27e8b96a32d176c23f637,2024-08-22T19:35:39.710000
|
||||||
CVE-2024-42781,0,0,68007156c17ee47f298a37cc150f13de3eb35249db160856cb2b8565b92d98bf,2024-08-22T14:35:11.393000
|
CVE-2024-42781,0,0,68007156c17ee47f298a37cc150f13de3eb35249db160856cb2b8565b92d98bf,2024-08-22T14:35:11.393000
|
||||||
CVE-2024-42782,0,0,c88036a1a9c99d71bfc251d5b6c0be95ab852a5980a0325b1c2181381dc03814,2024-08-22T15:35:10.447000
|
CVE-2024-42782,0,0,c88036a1a9c99d71bfc251d5b6c0be95ab852a5980a0325b1c2181381dc03814,2024-08-22T15:35:10.447000
|
||||||
CVE-2024-42783,0,1,a90f42465fb73d63717350e61bed2a1d2459bfb1585238e07a16ef63fa6fdfc7,2024-08-22T17:35:07.750000
|
CVE-2024-42783,0,0,a90f42465fb73d63717350e61bed2a1d2459bfb1585238e07a16ef63fa6fdfc7,2024-08-22T17:35:07.750000
|
||||||
CVE-2024-42784,0,0,ae6453c1305840d7826f5fb04807ac2e6014377b83456873440c2250d93d806e,2024-08-22T14:35:12.170000
|
CVE-2024-42784,0,0,ae6453c1305840d7826f5fb04807ac2e6014377b83456873440c2250d93d806e,2024-08-22T14:35:12.170000
|
||||||
CVE-2024-42785,0,0,b5ca1c8cf409a09fd190be5882a3f1065d93ed2d64fe581fb5571056dcc4c9c5,2024-08-22T15:35:11.450000
|
CVE-2024-42785,0,0,b5ca1c8cf409a09fd190be5882a3f1065d93ed2d64fe581fb5571056dcc4c9c5,2024-08-22T15:35:11.450000
|
||||||
CVE-2024-42786,0,0,45cc74a129f840b910b7eae19f93b2633379a97760df9aaea4e54ee022b13d38,2024-08-22T12:48:02.790000
|
CVE-2024-42786,0,0,45cc74a129f840b910b7eae19f93b2633379a97760df9aaea4e54ee022b13d38,2024-08-22T12:48:02.790000
|
||||||
@ -257961,7 +257964,7 @@ CVE-2024-4302,0,0,3989b291497fea424d341ee8d50afc238ccc795cfb4606a4430491f615d9ea
|
|||||||
CVE-2024-43022,0,0,60b15925d48bd4a0544b6a90b44d37dd7b45f132534cfb6161c485e040769eb2,2024-08-21T18:35:09.733000
|
CVE-2024-43022,0,0,60b15925d48bd4a0544b6a90b44d37dd7b45f132534cfb6161c485e040769eb2,2024-08-21T18:35:09.733000
|
||||||
CVE-2024-43027,0,0,023646627aeb42c9f27c70e233b2b26c2ec04024033b793398340bc23e8b2b89,2024-08-21T17:25:08.560000
|
CVE-2024-43027,0,0,023646627aeb42c9f27c70e233b2b26c2ec04024033b793398340bc23e8b2b89,2024-08-21T17:25:08.560000
|
||||||
CVE-2024-4303,0,0,83a712aebf2d4281174fc319c5a3b5ed1f6b2a8b7c1590974611c884faeb0657,2024-04-29T12:42:03.667000
|
CVE-2024-4303,0,0,83a712aebf2d4281174fc319c5a3b5ed1f6b2a8b7c1590974611c884faeb0657,2024-04-29T12:42:03.667000
|
||||||
CVE-2024-43033,0,1,fd57d359a27fcaf19587aca04a23681152ba867b02d3eb512220398c8467fb35,2024-08-22T16:35:08.663000
|
CVE-2024-43033,0,0,fd57d359a27fcaf19587aca04a23681152ba867b02d3eb512220398c8467fb35,2024-08-22T16:35:08.663000
|
||||||
CVE-2024-4304,0,0,cc036c021f3a6e70e19e6533fc0c5b7e8e9615d68f40d67450c876ce97ebcd8f,2024-04-29T12:42:03.667000
|
CVE-2024-4304,0,0,cc036c021f3a6e70e19e6533fc0c5b7e8e9615d68f40d67450c876ce97ebcd8f,2024-04-29T12:42:03.667000
|
||||||
CVE-2024-43042,0,0,b853bda14fa02964a16c19d1896f72364ccfb9e1c7f5c0faac2a5ae6d185d191,2024-08-19T13:00:23.117000
|
CVE-2024-43042,0,0,b853bda14fa02964a16c19d1896f72364ccfb9e1c7f5c0faac2a5ae6d185d191,2024-08-19T13:00:23.117000
|
||||||
CVE-2024-43044,0,0,0f847f7b25552f59db6fe108bc5868ae7095ef3bf92eb01d14caa8a1c32e542a,2024-08-16T17:19:30.643000
|
CVE-2024-43044,0,0,0f847f7b25552f59db6fe108bc5868ae7095ef3bf92eb01d14caa8a1c32e542a,2024-08-16T17:19:30.643000
|
||||||
@ -258198,7 +258201,7 @@ CVE-2024-4375,0,0,a80e63d12c12bb1a4c76673525f796ba2c31674a917e8feea214a8d89539b3
|
|||||||
CVE-2024-4376,0,0,7b257e3003fee7879c886112d028b58d973966a06334b732b2628be71d9e1e45,2024-05-31T13:01:46.727000
|
CVE-2024-4376,0,0,7b257e3003fee7879c886112d028b58d973966a06334b732b2628be71d9e1e45,2024-05-31T13:01:46.727000
|
||||||
CVE-2024-4377,0,0,1f0bc109d8a6e47162fe7e13cb7db22957e997f770c56ad1361c99539d4a2fb0,2024-07-17T02:53:06.217000
|
CVE-2024-4377,0,0,1f0bc109d8a6e47162fe7e13cb7db22957e997f770c56ad1361c99539d4a2fb0,2024-07-17T02:53:06.217000
|
||||||
CVE-2024-4378,0,0,09f9e04bae659373b82712486e7efa4baa3211e21ee904b68f572ef978953753,2024-05-24T01:15:30.977000
|
CVE-2024-4378,0,0,09f9e04bae659373b82712486e7efa4baa3211e21ee904b68f572ef978953753,2024-05-24T01:15:30.977000
|
||||||
CVE-2024-43780,1,1,68f06be6c51bd11b2023e49700a53e54fa3dac62a141055bb7230734e17bb0b3,2024-08-22T16:15:09.897000
|
CVE-2024-43780,0,0,68f06be6c51bd11b2023e49700a53e54fa3dac62a141055bb7230734e17bb0b3,2024-08-22T16:15:09.897000
|
||||||
CVE-2024-43785,0,0,28e6190998a7b50827ca97edc90f225bf92dffe8990a6186f86e2a71f0d4359d,2024-08-22T15:15:16.670000
|
CVE-2024-43785,0,0,28e6190998a7b50827ca97edc90f225bf92dffe8990a6186f86e2a71f0d4359d,2024-08-22T15:15:16.670000
|
||||||
CVE-2024-43787,0,0,f61db6f79a1095039a5ac89944b6da6b584fb7e6ecf3d75d3d252fa665e365d1,2024-08-22T15:15:16.857000
|
CVE-2024-43787,0,0,f61db6f79a1095039a5ac89944b6da6b584fb7e6ecf3d75d3d252fa665e365d1,2024-08-22T15:15:16.857000
|
||||||
CVE-2024-4379,0,0,21c1593ccdc9c542b9ca9b0ba403ad32afbc0c98a6b0c8f514039e188e2373a7,2024-05-31T13:01:46.727000
|
CVE-2024-4379,0,0,21c1593ccdc9c542b9ca9b0ba403ad32afbc0c98a6b0c8f514039e188e2373a7,2024-05-31T13:01:46.727000
|
||||||
@ -258250,15 +258253,15 @@ CVE-2024-4385,0,0,77dea89143b3a0633a6b8d90c0521dc82338402099ab7a378f8d43e8fe04ec
|
|||||||
CVE-2024-43850,0,0,af5a8e5c81d2d7083cc2063dd97b917fab8a477ad546922bdeb0b7cb165eb7d7,2024-08-19T12:59:59.177000
|
CVE-2024-43850,0,0,af5a8e5c81d2d7083cc2063dd97b917fab8a477ad546922bdeb0b7cb165eb7d7,2024-08-19T12:59:59.177000
|
||||||
CVE-2024-43851,0,0,6b377a11182d300738f6cb3fcaa1aa4d6b0f57bbe7852e35522a14ee29006899,2024-08-19T12:59:59.177000
|
CVE-2024-43851,0,0,6b377a11182d300738f6cb3fcaa1aa4d6b0f57bbe7852e35522a14ee29006899,2024-08-19T12:59:59.177000
|
||||||
CVE-2024-43852,0,0,e16a39e3485e6268d56a06e4f3ecc24b277dfc853c8871fb0e21f6f409c0a86d,2024-08-20T19:32:55.747000
|
CVE-2024-43852,0,0,e16a39e3485e6268d56a06e4f3ecc24b277dfc853c8871fb0e21f6f409c0a86d,2024-08-20T19:32:55.747000
|
||||||
CVE-2024-43853,0,0,a19fb14377c7f24b756633650bd958b6ae843b7b6d8ad25c4d37bcd34b5bda34,2024-08-19T12:59:59.177000
|
CVE-2024-43853,0,1,36efb4595067b56d7e5fcb48cb087d35edd1df5e2fba303124fad2de2b6dde32,2024-08-22T18:06:38.087000
|
||||||
CVE-2024-43854,0,0,bfd585f1c370eaecf2bb935c34690deac5522a5908f7d4c85b08d25eb0247bd2,2024-08-19T12:59:59.177000
|
CVE-2024-43854,0,1,72b23f2522211646b59fb2af8abb234e4c5bc99d8683607813e7cc7231678efc,2024-08-22T18:12:28.620000
|
||||||
CVE-2024-43855,0,1,b20a91fb4977616b14c0349af9fe6fdf38deab2ab7796fadba2ea00dab4f6345,2024-08-22T17:48:09.100000
|
CVE-2024-43855,0,0,b20a91fb4977616b14c0349af9fe6fdf38deab2ab7796fadba2ea00dab4f6345,2024-08-22T17:48:09.100000
|
||||||
CVE-2024-43856,0,1,91d346c264b1a27e13a95a79650da4390a2d02a7cc5798231b8314954af3044d,2024-08-22T17:57:08.640000
|
CVE-2024-43856,0,0,91d346c264b1a27e13a95a79650da4390a2d02a7cc5798231b8314954af3044d,2024-08-22T17:57:08.640000
|
||||||
CVE-2024-43857,0,1,1770874efc8d117e3bd251f738e88729b0ef15b20bed1182b733a19e974e06d4,2024-08-22T17:38:21.003000
|
CVE-2024-43857,0,0,1770874efc8d117e3bd251f738e88729b0ef15b20bed1182b733a19e974e06d4,2024-08-22T17:38:21.003000
|
||||||
CVE-2024-43858,0,1,af09898ffa278eaf458ba54f4590eb4fb3ade046d9a31e9697e73bd46738182b,2024-08-22T17:40:11.663000
|
CVE-2024-43858,0,0,af09898ffa278eaf458ba54f4590eb4fb3ade046d9a31e9697e73bd46738182b,2024-08-22T17:40:11.663000
|
||||||
CVE-2024-43859,0,1,c80f1d20a200e8e7c04740035b687c5519ed09874bdbbd064f52b001212ddb3c,2024-08-22T17:28:28.490000
|
CVE-2024-43859,0,0,c80f1d20a200e8e7c04740035b687c5519ed09874bdbbd064f52b001212ddb3c,2024-08-22T17:28:28.490000
|
||||||
CVE-2024-4386,0,0,731d04018d6299c9e1d8f7a212148a53db39578a94a703a0b90337f63dd3089f,2024-05-14T16:11:39.510000
|
CVE-2024-4386,0,0,731d04018d6299c9e1d8f7a212148a53db39578a94a703a0b90337f63dd3089f,2024-05-14T16:11:39.510000
|
||||||
CVE-2024-43860,0,1,09f701f7954bb547deb131405fc8454ea2909d63034fedfeaae4e6b22ac05cfc,2024-08-22T17:08:15.097000
|
CVE-2024-43860,0,0,09f701f7954bb547deb131405fc8454ea2909d63034fedfeaae4e6b22ac05cfc,2024-08-22T17:08:15.097000
|
||||||
CVE-2024-43861,0,0,356b6dbbcd5535ba76dcd78a87fd5df7522157cacaed0327954273ead9025b21,2024-08-21T12:30:33.697000
|
CVE-2024-43861,0,0,356b6dbbcd5535ba76dcd78a87fd5df7522157cacaed0327954273ead9025b21,2024-08-21T12:30:33.697000
|
||||||
CVE-2024-43862,0,0,73b429ba4062c240ef5657760dd2797510410c65046b141eae59e5a01f4e0f39,2024-08-21T12:30:33.697000
|
CVE-2024-43862,0,0,73b429ba4062c240ef5657760dd2797510410c65046b141eae59e5a01f4e0f39,2024-08-21T12:30:33.697000
|
||||||
CVE-2024-43863,0,0,8e5e01d22b57359fcf091d9531df2ac12c42d526d43aa46ba9fd057c2b2d9772,2024-08-21T12:30:33.697000
|
CVE-2024-43863,0,0,8e5e01d22b57359fcf091d9531df2ac12c42d526d43aa46ba9fd057c2b2d9772,2024-08-21T12:30:33.697000
|
||||||
@ -258409,9 +258412,9 @@ CVE-2024-45169,0,0,9c1ccfed5f8c51cc81c5cd2eec094329fe2aa7c6c132e4f4099baad9dc306
|
|||||||
CVE-2024-4517,0,0,3fa4b03e407f8fc963e6e42e2d6f56f1c6623d21471e9883bdedad7e9bb00507,2024-06-04T19:20:41.030000
|
CVE-2024-4517,0,0,3fa4b03e407f8fc963e6e42e2d6f56f1c6623d21471e9883bdedad7e9bb00507,2024-06-04T19:20:41.030000
|
||||||
CVE-2024-4518,0,0,64c3b6e6e74f6d9fd929463119875b686279109a997143c5dd3ad8e2c1af1355,2024-05-17T02:40:27.187000
|
CVE-2024-4518,0,0,64c3b6e6e74f6d9fd929463119875b686279109a997143c5dd3ad8e2c1af1355,2024-05-17T02:40:27.187000
|
||||||
CVE-2024-4519,0,0,5f7c1c0aa362af4fc3ba7e1d12e176f4028e88f0167af6f63c30c7ec7da86837,2024-06-04T19:20:41.127000
|
CVE-2024-4519,0,0,5f7c1c0aa362af4fc3ba7e1d12e176f4028e88f0167af6f63c30c7ec7da86837,2024-06-04T19:20:41.127000
|
||||||
CVE-2024-45191,1,1,a815b047b39b41a8006b9cc6e51c48cec3d8d1ca119fb37d18f67f94ea762f7f,2024-08-22T16:15:10.120000
|
CVE-2024-45191,0,0,a815b047b39b41a8006b9cc6e51c48cec3d8d1ca119fb37d18f67f94ea762f7f,2024-08-22T16:15:10.120000
|
||||||
CVE-2024-45192,1,1,fb72912d08ea4a658d1c69d4cfebe6a1e383484234c392f3119eb1f8034b4d2e,2024-08-22T16:15:10.237000
|
CVE-2024-45192,0,1,0fc95418e65db4d92a13ea1880011534b2cfc4ab1403f85d1ff524c8b4c52075,2024-08-22T19:35:40.953000
|
||||||
CVE-2024-45193,1,1,e2d2a95ce15a049c74af7a52d095d6013d9809c1ea23c07c1fdda34b6d50e120,2024-08-22T16:15:10.300000
|
CVE-2024-45193,0,0,e2d2a95ce15a049c74af7a52d095d6013d9809c1ea23c07c1fdda34b6d50e120,2024-08-22T16:15:10.300000
|
||||||
CVE-2024-4520,0,0,b2949348c863aeabf77cf8262dadc8a1301ac645ed88723ebde503df8cb28e51,2024-06-11T17:02:16.967000
|
CVE-2024-4520,0,0,b2949348c863aeabf77cf8262dadc8a1301ac645ed88723ebde503df8cb28e51,2024-06-11T17:02:16.967000
|
||||||
CVE-2024-4521,0,0,a1d240438f25322e21494c2ddd2f5ee26b23410f012534bc2c27a0a49b09a860,2024-06-04T19:20:41.223000
|
CVE-2024-4521,0,0,a1d240438f25322e21494c2ddd2f5ee26b23410f012534bc2c27a0a49b09a860,2024-06-04T19:20:41.223000
|
||||||
CVE-2024-4522,0,0,acd0b6b231758473c48ed22daa75c2f0d87280406667aa3ced0f39aaa73cb777,2024-06-04T19:20:41.320000
|
CVE-2024-4522,0,0,acd0b6b231758473c48ed22daa75c2f0d87280406667aa3ced0f39aaa73cb777,2024-06-04T19:20:41.320000
|
||||||
@ -259317,8 +259320,8 @@ CVE-2024-5550,0,0,dab352871e5b1599db274fe7ee72f4ef4902afffcd5667b3ef675a3fe452e4
|
|||||||
CVE-2024-5551,0,0,d4fe322803a15d54f942643eecca544bbc21fd2d50a048ef751f6568e43cd352,2024-08-07T19:09:17.363000
|
CVE-2024-5551,0,0,d4fe322803a15d54f942643eecca544bbc21fd2d50a048ef751f6568e43cd352,2024-08-07T19:09:17.363000
|
||||||
CVE-2024-5552,0,0,7f73b574dd8e83d52dd7f28ecc579b960fbf7de562da98c7e63b5b8e0fd54be8,2024-06-07T14:56:05.647000
|
CVE-2024-5552,0,0,7f73b574dd8e83d52dd7f28ecc579b960fbf7de562da98c7e63b5b8e0fd54be8,2024-06-07T14:56:05.647000
|
||||||
CVE-2024-5553,0,0,c4739ca4bfc71591786473d36aff26ccf561ba778e4c902dca863cedff7bba13,2024-06-13T18:36:09.013000
|
CVE-2024-5553,0,0,c4739ca4bfc71591786473d36aff26ccf561ba778e4c902dca863cedff7bba13,2024-06-13T18:36:09.013000
|
||||||
CVE-2024-5554,0,1,0f1d3226bb0a486c4b917c91c2f0f711d8f9d9fbb5ad6f69f3a6a7fdce6ab9ad,2024-08-22T16:43:52.650000
|
CVE-2024-5554,0,0,0f1d3226bb0a486c4b917c91c2f0f711d8f9d9fbb5ad6f69f3a6a7fdce6ab9ad,2024-08-22T16:43:52.650000
|
||||||
CVE-2024-5555,0,1,ea0332df14a2e6edd0aa953ada9ade3a1da4ea6fb56dda0883a54ace27f96d97,2024-08-22T16:46:14.177000
|
CVE-2024-5555,0,0,ea0332df14a2e6edd0aa953ada9ade3a1da4ea6fb56dda0883a54ace27f96d97,2024-08-22T16:46:14.177000
|
||||||
CVE-2024-5557,0,0,71e19027344115370537e5e9f2ac729a9013865b6ffe7632f9b652113dae4753,2024-07-25T20:00:46.653000
|
CVE-2024-5557,0,0,71e19027344115370537e5e9f2ac729a9013865b6ffe7632f9b652113dae4753,2024-07-25T20:00:46.653000
|
||||||
CVE-2024-5558,0,0,d7061155c6f430b38a1e769635e4eca1c24478e5beedfff7ff120ab1f85e7481,2024-07-25T20:00:25.773000
|
CVE-2024-5558,0,0,d7061155c6f430b38a1e769635e4eca1c24478e5beedfff7ff120ab1f85e7481,2024-07-25T20:00:25.773000
|
||||||
CVE-2024-5559,0,0,0c59604cbf219c2ba1c247f52c304752b12dd0f3c92c8b3c96e21ad233f99b0a,2024-06-13T18:36:09.010000
|
CVE-2024-5559,0,0,0c59604cbf219c2ba1c247f52c304752b12dd0f3c92c8b3c96e21ad233f99b0a,2024-06-13T18:36:09.010000
|
||||||
@ -259789,7 +259792,7 @@ CVE-2024-6160,0,0,ef1a3b3e7f3366ded429b369db1d335204ba1e5aa345b7b6a0087f8051f247
|
|||||||
CVE-2024-6161,0,0,4874ef369326f57ebaead3e865a12df6057ceb7ec30e698c3deb9b52e2b10028,2024-07-09T18:19:14.047000
|
CVE-2024-6161,0,0,4874ef369326f57ebaead3e865a12df6057ceb7ec30e698c3deb9b52e2b10028,2024-07-09T18:19:14.047000
|
||||||
CVE-2024-6162,0,0,42b0c84bb9f8407ee29b440898aa638cfeb455faf60863456bc05225330b70ad,2024-08-05T15:15:54.090000
|
CVE-2024-6162,0,0,42b0c84bb9f8407ee29b440898aa638cfeb455faf60863456bc05225330b70ad,2024-08-05T15:15:54.090000
|
||||||
CVE-2024-6163,0,0,38b12c0f7e168992652ab7a71785fb2aab63391cb3f79d2e2dd970485bc5678f,2024-08-20T17:44:11.677000
|
CVE-2024-6163,0,0,38b12c0f7e168992652ab7a71785fb2aab63391cb3f79d2e2dd970485bc5678f,2024-08-20T17:44:11.677000
|
||||||
CVE-2024-6164,0,1,08afad8ab6b717af0b90be7bbe2f7a32357bf99ca8728b0f338d52b01a06d786,2024-08-22T16:35:18.693000
|
CVE-2024-6164,0,0,08afad8ab6b717af0b90be7bbe2f7a32357bf99ca8728b0f338d52b01a06d786,2024-08-22T16:35:18.693000
|
||||||
CVE-2024-6165,0,0,6301727d4094498886864a9dae2aa85ba81a15451475733d92db12396ffe834c,2024-08-01T14:00:13.553000
|
CVE-2024-6165,0,0,6301727d4094498886864a9dae2aa85ba81a15451475733d92db12396ffe834c,2024-08-01T14:00:13.553000
|
||||||
CVE-2024-6166,0,0,c93093bf8454afe95675994fb929c06931906789a59088dfba4992e2491ed4c6,2024-07-12T14:23:53.600000
|
CVE-2024-6166,0,0,c93093bf8454afe95675994fb929c06931906789a59088dfba4992e2491ed4c6,2024-07-12T14:23:53.600000
|
||||||
CVE-2024-6167,0,0,53411719c1d4f7c7e0b31dcbc40822727b85ab3cd28b45158c4db6b81cb57664,2024-07-09T18:19:14.047000
|
CVE-2024-6167,0,0,53411719c1d4f7c7e0b31dcbc40822727b85ab3cd28b45158c4db6b81cb57664,2024-07-09T18:19:14.047000
|
||||||
@ -260051,7 +260054,7 @@ CVE-2024-6497,0,0,b980a8afca3367d307f1b8ae084c1de1478e48fcb0a6d42a16be67c3823c34
|
|||||||
CVE-2024-6498,0,0,630981d31a800e5a325158bdb522b2e1db688d536ea57caaef1013f6348f0ce8,2024-08-05T12:41:45.957000
|
CVE-2024-6498,0,0,630981d31a800e5a325158bdb522b2e1db688d536ea57caaef1013f6348f0ce8,2024-08-05T12:41:45.957000
|
||||||
CVE-2024-6500,0,0,d6e17cf29259cccc059c07e88e123ff08e9fd8308cfe5e11844bc5a9a1491c18,2024-08-19T13:00:23.117000
|
CVE-2024-6500,0,0,d6e17cf29259cccc059c07e88e123ff08e9fd8308cfe5e11844bc5a9a1491c18,2024-08-19T13:00:23.117000
|
||||||
CVE-2024-6501,0,0,45d58d6fcd90c3b83531e796541078a549af17f7a81eb1fbfe7d6944aa2bc8ac,2024-07-11T13:06:13.187000
|
CVE-2024-6501,0,0,45d58d6fcd90c3b83531e796541078a549af17f7a81eb1fbfe7d6944aa2bc8ac,2024-07-11T13:06:13.187000
|
||||||
CVE-2024-6502,1,1,1f22fb0e7d7ba54b58395d225d1dfe244f49ebfd7f5ec9024690cf313b498a4a,2024-08-22T16:15:10.377000
|
CVE-2024-6502,0,0,1f22fb0e7d7ba54b58395d225d1dfe244f49ebfd7f5ec9024690cf313b498a4a,2024-08-22T16:15:10.377000
|
||||||
CVE-2024-6504,0,0,8b12236aeea36b8f50ca52878af23b200b8eec2ab40fe418832b1f4c4c6b95f9,2024-07-18T12:28:43.707000
|
CVE-2024-6504,0,0,8b12236aeea36b8f50ca52878af23b200b8eec2ab40fe418832b1f4c4c6b95f9,2024-07-18T12:28:43.707000
|
||||||
CVE-2024-6505,0,0,b8708084cd092b6ca88acb18ad5e80f748f8e2829ec040b8958bfe3c1fee2cd6,2024-07-08T15:41:17.883000
|
CVE-2024-6505,0,0,b8708084cd092b6ca88acb18ad5e80f748f8e2829ec040b8958bfe3c1fee2cd6,2024-07-08T15:41:17.883000
|
||||||
CVE-2024-6506,0,0,58310ca3e68e3dacb16dafd9b32db187bdf111a88d3da008267c8c84bbec48d6,2024-07-05T12:55:51.367000
|
CVE-2024-6506,0,0,58310ca3e68e3dacb16dafd9b32db187bdf111a88d3da008267c8c84bbec48d6,2024-07-05T12:55:51.367000
|
||||||
@ -260415,7 +260418,7 @@ CVE-2024-7100,0,0,dcfec02e0ae4a6f64f97ae0297c66dfbc0aebe11e663bfc596e9b5b147ad74
|
|||||||
CVE-2024-7101,0,0,5454c1208509de59c11b3527ed3914e0b9b453785a2425c8a2e412da33d0d539,2024-07-26T12:38:41.683000
|
CVE-2024-7101,0,0,5454c1208509de59c11b3527ed3914e0b9b453785a2425c8a2e412da33d0d539,2024-07-26T12:38:41.683000
|
||||||
CVE-2024-7105,0,0,a997b2c0e4e91d96626adcc721c978e22c9883ba6b9b8f61b29dff1a03ad516f,2024-07-26T12:38:41.683000
|
CVE-2024-7105,0,0,a997b2c0e4e91d96626adcc721c978e22c9883ba6b9b8f61b29dff1a03ad516f,2024-07-26T12:38:41.683000
|
||||||
CVE-2024-7106,0,0,ff3ffd817a427576052bad31a6af61e50bfb0473d392446ac87a1106350f920d,2024-08-13T14:15:31.030000
|
CVE-2024-7106,0,0,ff3ffd817a427576052bad31a6af61e50bfb0473d392446ac87a1106350f920d,2024-08-13T14:15:31.030000
|
||||||
CVE-2024-7110,1,1,f89c34f450c50e2099e6f7cb76c4d9dbe54e7cd373814ff226a3ae48feb13a3d,2024-08-22T16:15:10.627000
|
CVE-2024-7110,0,0,f89c34f450c50e2099e6f7cb76c4d9dbe54e7cd373814ff226a3ae48feb13a3d,2024-08-22T16:15:10.627000
|
||||||
CVE-2024-7113,0,0,0a8f4221b6e071d6c72a8ad7c45f4c251b092637dae636c0dfdbfb44a73d4a6e,2024-08-14T02:07:05.410000
|
CVE-2024-7113,0,0,0a8f4221b6e071d6c72a8ad7c45f4c251b092637dae636c0dfdbfb44a73d4a6e,2024-08-14T02:07:05.410000
|
||||||
CVE-2024-7114,0,0,63b5a866782f89fc9f6ac1d30b03e6de66da2ca9dd341d6c07330fc52fb56b69,2024-07-26T12:38:41.683000
|
CVE-2024-7114,0,0,63b5a866782f89fc9f6ac1d30b03e6de66da2ca9dd341d6c07330fc52fb56b69,2024-07-26T12:38:41.683000
|
||||||
CVE-2024-7115,0,0,d198b7c0d1a7a67e83535bd15c8ec8b27ae3282d7abe6e695fb34b6781238fb3,2024-08-08T19:06:00.017000
|
CVE-2024-7115,0,0,d198b7c0d1a7a67e83535bd15c8ec8b27ae3282d7abe6e695fb34b6781238fb3,2024-08-08T19:06:00.017000
|
||||||
@ -260761,6 +260764,7 @@ CVE-2024-7628,0,0,13c6e75993fc4e0ea638854e2c037e11703f2e05b1bb0a7d2173b121da5472
|
|||||||
CVE-2024-7629,0,0,45eb45459388d6798e88edee38a7dd2ceac912098ce5cc3a42af5f252bb2fbc1,2024-08-21T12:30:33.697000
|
CVE-2024-7629,0,0,45eb45459388d6798e88edee38a7dd2ceac912098ce5cc3a42af5f252bb2fbc1,2024-08-21T12:30:33.697000
|
||||||
CVE-2024-7630,0,0,418e383b03350a1fa5d21be50b8eebc36b3c165fb7c794a3b77aa7313e9af0aa,2024-08-19T13:00:23.117000
|
CVE-2024-7630,0,0,418e383b03350a1fa5d21be50b8eebc36b3c165fb7c794a3b77aa7313e9af0aa,2024-08-19T13:00:23.117000
|
||||||
CVE-2024-7633,0,0,3b1df1487eb71af2061753f656e2660f3fdd60b89404cd84fa2c01a4dff29ee6,2024-08-12T13:38:45.690000
|
CVE-2024-7633,0,0,3b1df1487eb71af2061753f656e2660f3fdd60b89404cd84fa2c01a4dff29ee6,2024-08-12T13:38:45.690000
|
||||||
|
CVE-2024-7634,1,1,d6d95d6be7118359eb1835d8d0fa1c2d139f74d8132d5d9170668a31dc0ed049,2024-08-22T18:15:10.553000
|
||||||
CVE-2024-7635,0,0,77137333cb856f76f03e4b50e0e5dbce5cc99fa466aafebf6530d8cfb2e96fdd,2024-08-15T18:12:33.270000
|
CVE-2024-7635,0,0,77137333cb856f76f03e4b50e0e5dbce5cc99fa466aafebf6530d8cfb2e96fdd,2024-08-15T18:12:33.270000
|
||||||
CVE-2024-7636,0,0,81414365f80fa57b345628baccc97b68e4a32475a3dd61fce01a599a3ee31eee,2024-08-15T18:13:23.327000
|
CVE-2024-7636,0,0,81414365f80fa57b345628baccc97b68e4a32475a3dd61fce01a599a3ee31eee,2024-08-15T18:13:23.327000
|
||||||
CVE-2024-7637,0,0,07fff1a7df418b9e3b67d234f6aa590337509d3b6198aaa332e768f862723c65,2024-08-15T18:15:15.667000
|
CVE-2024-7637,0,0,07fff1a7df418b9e3b67d234f6aa590337509d3b6198aaa332e768f862723c65,2024-08-15T18:15:15.667000
|
||||||
@ -260934,32 +260938,33 @@ CVE-2024-7947,0,0,65fb4d7d58134ef9bc023552b764ff03308d80cb6ca6d1287d9d812240a193
|
|||||||
CVE-2024-7948,0,0,10e56bd82889acf527e731295a76df26abf6e1bd128042058528282707ce870d,2024-08-21T13:52:38.057000
|
CVE-2024-7948,0,0,10e56bd82889acf527e731295a76df26abf6e1bd128042058528282707ce870d,2024-08-21T13:52:38.057000
|
||||||
CVE-2024-7949,0,0,64b957370c21ddcba0bc925ad861d01e09364475441bf650c2c5e65485084163,2024-08-21T19:15:13.600000
|
CVE-2024-7949,0,0,64b957370c21ddcba0bc925ad861d01e09364475441bf650c2c5e65485084163,2024-08-21T19:15:13.600000
|
||||||
CVE-2024-7958,0,0,483ea949f242fd0880547068782264d397026329e525a14dcbacca7c22e7bcec,2024-08-19T20:15:08.907000
|
CVE-2024-7958,0,0,483ea949f242fd0880547068782264d397026329e525a14dcbacca7c22e7bcec,2024-08-19T20:15:08.907000
|
||||||
CVE-2024-7964,0,1,c52134917f72c90e63a54f50f2b1a96c22bef052773e66c5f63a5749f9629303,2024-08-22T17:44:47.560000
|
CVE-2024-7964,0,0,c52134917f72c90e63a54f50f2b1a96c22bef052773e66c5f63a5749f9629303,2024-08-22T17:44:47.560000
|
||||||
CVE-2024-7965,0,0,efa0555bbb67557f1f4f029b94195e1d9dc4a9cf7b553840ebdc5072a02f2db9,2024-08-22T14:35:15.280000
|
CVE-2024-7965,0,0,efa0555bbb67557f1f4f029b94195e1d9dc4a9cf7b553840ebdc5072a02f2db9,2024-08-22T14:35:15.280000
|
||||||
CVE-2024-7966,0,1,c834c0011ca06a1efd266a4239a473434dee53599a1a84163bf0336c2d5b29a3,2024-08-22T17:44:11.147000
|
CVE-2024-7966,0,0,c834c0011ca06a1efd266a4239a473434dee53599a1a84163bf0336c2d5b29a3,2024-08-22T17:44:11.147000
|
||||||
CVE-2024-7967,0,0,6b9e3bc6003fa2e0640f930f9d670867e7411229c66a601e6cbe6f8eaf351c0d,2024-08-22T14:35:16.310000
|
CVE-2024-7967,0,0,6b9e3bc6003fa2e0640f930f9d670867e7411229c66a601e6cbe6f8eaf351c0d,2024-08-22T14:35:16.310000
|
||||||
CVE-2024-7968,0,1,da660cd047ae7ab70548a94fe3bdc25d42e767c3eac17d765635320e381d048e,2024-08-22T17:41:56.847000
|
CVE-2024-7968,0,0,da660cd047ae7ab70548a94fe3bdc25d42e767c3eac17d765635320e381d048e,2024-08-22T17:41:56.847000
|
||||||
CVE-2024-7969,0,1,5d7da0c2013aed33a237ee1ce4d97e9da2011ff310b073e3d8709a4f478578bb,2024-08-22T17:42:47.627000
|
CVE-2024-7969,0,0,5d7da0c2013aed33a237ee1ce4d97e9da2011ff310b073e3d8709a4f478578bb,2024-08-22T17:42:47.627000
|
||||||
CVE-2024-7971,0,0,5406efa61c68652b55c12fe54555241d6d0e600bbe58e6909119226df13133b0,2024-08-22T14:35:17.313000
|
CVE-2024-7971,0,0,5406efa61c68652b55c12fe54555241d6d0e600bbe58e6909119226df13133b0,2024-08-22T14:35:17.313000
|
||||||
CVE-2024-7972,0,0,70b5b4000609ceeb60deedf7c0d82b9e59e80aae5bf8399f48b8e878bf408f8b,2024-08-22T15:35:14.597000
|
CVE-2024-7972,0,0,70b5b4000609ceeb60deedf7c0d82b9e59e80aae5bf8399f48b8e878bf408f8b,2024-08-22T15:35:14.597000
|
||||||
CVE-2024-7973,0,0,fb795d32a144ad521439e1fe4e5042ac17e2b8505faf35a28d1bc7d4c5a4483d,2024-08-22T15:35:15.597000
|
CVE-2024-7973,0,0,fb795d32a144ad521439e1fe4e5042ac17e2b8505faf35a28d1bc7d4c5a4483d,2024-08-22T15:35:15.597000
|
||||||
CVE-2024-7974,0,1,4f1766ede0a46e011fd6362a463054e086647121f22e7cff04b5a03dfc3c746c,2024-08-22T17:40:27.950000
|
CVE-2024-7974,0,0,4f1766ede0a46e011fd6362a463054e086647121f22e7cff04b5a03dfc3c746c,2024-08-22T17:40:27.950000
|
||||||
CVE-2024-7975,0,1,6eead3f121fb76c19460ccba2d1c91cf33314b233f7cc8d0a23049d05e30e6a0,2024-08-22T17:40:09.223000
|
CVE-2024-7975,0,0,6eead3f121fb76c19460ccba2d1c91cf33314b233f7cc8d0a23049d05e30e6a0,2024-08-22T17:40:09.223000
|
||||||
CVE-2024-7976,0,1,8ea67749dc2e0457db6f465664717bd53fa70c14a92a0f107f894d380039b546,2024-08-22T17:39:54.540000
|
CVE-2024-7976,0,0,8ea67749dc2e0457db6f465664717bd53fa70c14a92a0f107f894d380039b546,2024-08-22T17:39:54.540000
|
||||||
CVE-2024-7977,0,1,376d3398785a73c2927625b4057b1ad21ad4db08c185aea810399ba8f1f4ab5b,2024-08-22T17:39:32.730000
|
CVE-2024-7977,0,0,376d3398785a73c2927625b4057b1ad21ad4db08c185aea810399ba8f1f4ab5b,2024-08-22T17:39:32.730000
|
||||||
CVE-2024-7978,0,1,67c4229f7235438f3aa7b05e7807f93765050dcc016da021af4e6ebc6fa52ea9,2024-08-22T17:38:11.200000
|
CVE-2024-7978,0,0,67c4229f7235438f3aa7b05e7807f93765050dcc016da021af4e6ebc6fa52ea9,2024-08-22T17:38:11.200000
|
||||||
CVE-2024-7979,0,0,078bf6b1178f274a34fc1356c3dbffb7074d9c903c74e589d1b081f58230d3ec,2024-08-22T15:35:16.610000
|
CVE-2024-7979,0,0,078bf6b1178f274a34fc1356c3dbffb7074d9c903c74e589d1b081f58230d3ec,2024-08-22T15:35:16.610000
|
||||||
CVE-2024-7980,0,0,1661097b9193f473ee067de4d4f40312756af353419ed3265d5438cf70d837f5,2024-08-22T15:35:17.610000
|
CVE-2024-7980,0,0,1661097b9193f473ee067de4d4f40312756af353419ed3265d5438cf70d837f5,2024-08-22T15:35:17.610000
|
||||||
CVE-2024-7981,0,1,558a7e30af48c73a27172093229eee673e34b504c9731b910b5af4369614c86c,2024-08-22T17:36:24.803000
|
CVE-2024-7981,0,0,558a7e30af48c73a27172093229eee673e34b504c9731b910b5af4369614c86c,2024-08-22T17:36:24.803000
|
||||||
CVE-2024-7998,0,0,8aa3505a1b6ed462573d7b65c55c5633ff88a81168885ae03bec6b1db69a2167,2024-08-21T12:30:33.697000
|
CVE-2024-7998,0,0,8aa3505a1b6ed462573d7b65c55c5633ff88a81168885ae03bec6b1db69a2167,2024-08-21T12:30:33.697000
|
||||||
CVE-2024-8003,0,0,1eb6cc8bd16248d54ed281136e233da0a723cb74879af6e3337c9532a3caf8e1,2024-08-21T15:51:28.397000
|
CVE-2024-8003,0,0,1eb6cc8bd16248d54ed281136e233da0a723cb74879af6e3337c9532a3caf8e1,2024-08-21T15:51:28.397000
|
||||||
CVE-2024-8005,0,0,c059370cb975aea915e5671e32cb80d879151797480dbd5423b1593aeba96675,2024-08-21T15:49:59.470000
|
CVE-2024-8005,0,0,c059370cb975aea915e5671e32cb80d879151797480dbd5423b1593aeba96675,2024-08-21T15:49:59.470000
|
||||||
CVE-2024-8007,0,0,d227b03f895ef761f269cb1491d7d5722db05e40b51b1467b77f2f84ee5beceb,2024-08-21T16:06:23.153000
|
CVE-2024-8007,0,0,d227b03f895ef761f269cb1491d7d5722db05e40b51b1467b77f2f84ee5beceb,2024-08-21T16:06:23.153000
|
||||||
CVE-2024-8022,0,0,469d074c70ed4d6e1b7ca7023005d3bb3e3f23419b5a39b3540fd69e34fadcaa,2024-08-21T12:30:33.697000
|
CVE-2024-8022,0,0,469d074c70ed4d6e1b7ca7023005d3bb3e3f23419b5a39b3540fd69e34fadcaa,2024-08-21T12:30:33.697000
|
||||||
CVE-2024-8023,0,0,7f1c10536d9d4e1a728f09b10c1ff35f77d0bba503a7c61c411fbfd5f6584d46,2024-08-21T12:30:33.697000
|
CVE-2024-8023,0,0,7f1c10536d9d4e1a728f09b10c1ff35f77d0bba503a7c61c411fbfd5f6584d46,2024-08-21T12:30:33.697000
|
||||||
CVE-2024-8033,0,1,a55cf019f91370d30ea7734ed696c6e008634912634c88c606ef5f6209b81cb2,2024-08-22T17:36:07.673000
|
CVE-2024-8033,0,0,a55cf019f91370d30ea7734ed696c6e008634912634c88c606ef5f6209b81cb2,2024-08-22T17:36:07.673000
|
||||||
CVE-2024-8034,0,1,990fb53670bf6f787a3d54c0392722fc0a67a939e8056c22142bc6f2bee92a38,2024-08-22T17:35:30.003000
|
CVE-2024-8034,0,0,990fb53670bf6f787a3d54c0392722fc0a67a939e8056c22142bc6f2bee92a38,2024-08-22T17:35:30.003000
|
||||||
CVE-2024-8035,0,1,e11fe8c378f080395f404658baee2e1c5cd70ef826bdf0b13fe46f85c653ad4a,2024-08-22T17:33:37.407000
|
CVE-2024-8035,0,0,e11fe8c378f080395f404658baee2e1c5cd70ef826bdf0b13fe46f85c653ad4a,2024-08-22T17:33:37.407000
|
||||||
CVE-2024-8041,1,1,a1cbdddbce69857892b2d0881ba6bfcc668b66194ac3d90441c1bdbb66f0dae3,2024-08-22T16:15:10.880000
|
CVE-2024-8041,0,0,a1cbdddbce69857892b2d0881ba6bfcc668b66194ac3d90441c1bdbb66f0dae3,2024-08-22T16:15:10.880000
|
||||||
CVE-2024-8071,0,0,41d62a2818ebc39a47942042600f7172df861ffe79f8871e225899553216e03c,2024-08-22T12:48:02.790000
|
CVE-2024-8071,0,0,41d62a2818ebc39a47942042600f7172df861ffe79f8871e225899553216e03c,2024-08-22T12:48:02.790000
|
||||||
CVE-2024-8072,0,0,08fafb0bed7b0568fefcb8938e0e01cf4acf3cb153d4b847bc3e1d9427344a62,2024-08-22T14:35:18.797000
|
CVE-2024-8072,0,0,08fafb0bed7b0568fefcb8938e0e01cf4acf3cb153d4b847bc3e1d9427344a62,2024-08-22T14:35:18.797000
|
||||||
|
CVE-2024-8088,1,1,4ef83eee673ee14bb05eb2757d0f3a4f17e1e757b372b527d200b6de8438c4b6,2024-08-22T19:15:09.720000
|
||||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user