mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-21 17:41:05 +00:00
Auto-Update: 2024-08-22T20:00:18.271897+00:00
This commit is contained in:
parent
607e009d85
commit
55de7e7bb8
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2020-22539",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-15T22:15:07.620",
|
||||
"lastModified": "2024-04-16T13:24:07.103",
|
||||
"lastModified": "2024-08-22T19:35:00.877",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Una vulnerabilidad de carga de archivos arbitrarios en la funci\u00f3n Agregar Categor\u00eda de Codoforum v4.9 permite a los atacantes ejecutar c\u00f3digo arbitrario cargando un archivo manipulado."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/s4fv4n/320f536a684650c6948433de8d53713c",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-25038",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-05-31T16:15:09.240",
|
||||
"lastModified": "2024-05-31T19:14:47.793",
|
||||
"lastModified": "2024-08-22T19:35:03.130",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Se descubri\u00f3 que wanEditor v4.7.11 conten\u00eda una vulnerabilidad de cross-site scripting (XSS) a trav\u00e9s de la funci\u00f3n de carga de videos."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/Mdxjj/800f05f10a98591aa2cf3558f53f088f",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-48936",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-08-22T04:15:16.950",
|
||||
"lastModified": "2024-08-22T12:48:02.790",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-22T19:03:59.643",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,39 +15,159 @@
|
||||
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: gso: no omita el encabezado de IP externo en caso de ipip y net_failover. Nos encontramos con un problema de ca\u00edda de TCP en nuestro entorno de nube. El paquete GROed en el host se reenv\u00eda a una NIC virtio_net de VM con net_failover habilitado. VM act\u00faa como IPVS LB con encapsulaci\u00f3n ipip. La ruta completa como: host gro -> vm virtio_net rx -> net_failover rx -> ipvs fullnat -> ipip encap -> net_failover tx -> virtio_net tx Cuando net_failover transmite un paquete ipip (gso_type = 0x0103, que significa SKB_GSO_TCPV4, SKB_GSO_DODGY y SKB_GSO_IPXIP 4 ), no existe gso porque admite TSO y GSO_IPXIP4. Pero network_header apunta al encabezado IP interno. Seguimiento de llamadas: tcp4_gso_segment ------> return NULL inet_gso_segment ------> iph interno, network_header apunta a ipip_gso_segment inet_gso_segment ------> iph externo skb_mac_gso_segment Luego, virtio_net transmite el paquete, solo se muestra el encabezado de IP interno modificado. Y el exterior simplemente se mantiene sin cambios. El paquete se colocar\u00e1 en el host remoto. Seguimiento de llamadas: inet_gso_segment ------> iph interno, se omite el iph externo skb_mac_gso_segment __skb_gso_segment validar_xmit_skb validar_xmit_skb_list sch_direct_xmit __qdisc_run __dev_queue_xmit ------> virtio_net dev_hard_start_xmit __dev_queue_xmit --- ---> net_failover ip_finish_output2 ip_output iptunnel_xmit ip_tunnel_xmit ipip_tunnel_xmit -- ----> ipip dev_hard_start_xmit __dev_queue_xmit ip_finish_output2 ip_output ip_forward ip_rcv __netif_receive_skb_one_core netif_receive_skb_internal napi_gro_receiveceived_buf virtnet_poll net_rx_action La causa ra\u00edz de este problema es espec\u00edfica de la rara combinaci\u00f3n de SKB_GSO_DODGY y un dispositivo de t\u00fanel que agrega una opci\u00f3n de t\u00fanel SKB_GSO_. SKB_GSO_DODGY se configura desde virtio_net externo. Necesitamos restablecer el encabezado de la red cuando callbacks.gso_segment() devuelve NULL. Este parche tambi\u00e9n incluye ipv6_gso_segment(), considerando SIT, etc."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.13",
|
||||
"versionEndExcluding": "4.9.304",
|
||||
"matchCriteriaId": "C6CC1F21-FAA1-403B-826E-B5709A12D4EE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.10",
|
||||
"versionEndExcluding": "4.14.269",
|
||||
"matchCriteriaId": "F0F577D3-EFEA-42CF-80AA-905297529D7F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.15",
|
||||
"versionEndExcluding": "4.19.232",
|
||||
"matchCriteriaId": "EF11C6DC-8B9A-4A37-B1E6-33B68F5366ED"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.20",
|
||||
"versionEndExcluding": "5.4.182",
|
||||
"matchCriteriaId": "EE74CED8-43BF-4060-9578-93A09735B4E2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.5",
|
||||
"versionEndExcluding": "5.10.103",
|
||||
"matchCriteriaId": "1A95B717-3110-4D4F-B8FC-373919BB514D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11",
|
||||
"versionEndExcluding": "5.15.26",
|
||||
"matchCriteriaId": "9AB342AE-A62E-4947-A6EA-511453062B2B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "5.16.12",
|
||||
"matchCriteriaId": "C76BAB21-7F23-4AD8-A25F-CA7B262A2698"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/2b3cdd70ea5f5a694f95ea1788393fb3b83071ea",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/45d006c2c7ed7baf1fa258fa7b5bc9923d3a983e",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/7840e559799a08a8588ee6de27516a991cb2e5e7",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/899e56a1ad435261812355550ae869d8be3df395",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/a739963f43269297c3f438b776194542e2a97499",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/cc20cced0598d9a5ff91ae4ab147b3b5e99ee819",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/dac2490d9ee0b89dffc72f1172b8bbeb60eaec39",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/e9ffbe63f6f32f526a461756309b61c395168d73",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-48937",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-08-22T04:15:17.137",
|
||||
"lastModified": "2024-08-22T12:48:02.790",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-22T19:07:28.567",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,23 +15,103 @@
|
||||
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: io_uring: agregue un punto de programaci\u00f3n en io_add_buffers() Realizar bucles ~65535 veces al realizar llamadas kmalloc() puede desencadenar bloqueos suaves, especialmente con funciones DEBUG (como KASAN). [253.536212] perro guardi\u00e1n: ERROR: bloqueo suave - \u00a1CPU#64 bloqueada durante 26 segundos! [b219417889:12575] [253.544433] M\u00f3dulos vinculados en: vfat fat i2c_mux_pca954x i2c_mux spidev cdc_acm xhci_pci xhci_hcd sha3_generic gq(O) [253.544451] CPU: 64 PID: 12575 Comm: 417889 Contaminado: GSO 5.17.0-smp-DEV #801 [ 253.544457] RIP: 0010:kernel_text_address (./include/asm-generic/sections.h:192 ./include/linux/kallsyms.h:29 kernel/extable.c:67 kernel/extable.c:98) [ 253.544464] C\u00f3digo: 0f 93 c0 48 c7 c1 e0 63 d7 a4 48 39 cb 0f 92 c1 20 c1 0f b6 c1 5b 5d c3 90 0f 1f 44 00 00 55 48 89 e5 41 57 41 56 53 48 89 fb <48> c7 c0 00 00 80 a0 41 be 01 00 00 00 48 39 c7 72 0c 48 c7 c0 40 [ 253.544468] RSP: 0018:ffff8882d8baf4c0 EFLAGS: 00000246 [ 253.544471] RAX: 1ffff1105b1 75e00 RBX: fffffffa13ef09a RCX: 00000000a13ef001 [ 253.544474] RDX: fffffffa13ef09a RSI: ffff8882d8baf558 RDI: fffffffa13ef09a [ 253.544476] RBP: ffff8882d8baf4d8 R08: ffff8882d8baf5e0 R09: 00000000000000004 [ 253.544479] R10: ffff8882d8baf5e8 R11: 0d59a50 R12: ffff8882eab20380 [ 253.544481] R13: fffffffa0d59a50 R14: dffffc0000000000 R15: 1ffff1105b175eb0 [ 253.544483] FS: 00000000016d3380( 0000) GS: ffff88af48c00000(0000) knlGS:00000000000000000 [ 253.544486] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 253.544488] CR2: af0f0 CR3: 00000002eabfa004 CR4: 00000000003706e0 [ 253.544491] DR0: 0000000000000000 DR1: 00000000000000000 DR2: 0000000000000000 253.544 492] DR3 : 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 253.544494] Seguimiento de llamadas: [ 253.544496] [ 253.544498] ? io_queue_sqe (fs/io_uring.c:7143) [ 253.544505] __kernel_text_address (kernel/extable.c:78) [ 253.544508] unwind_get_return_address (arch/x86/kernel/unwind_frame.c:19) [ 253.544514] arch_stack_walk (arch/ x86/n\u00facleo /stacktrace.c:27) [253.544517]? io_queue_sqe (fs/io_uring.c:7143) [ 253.544521] stack_trace_save (kernel/stacktrace.c:123) [ 253.544527] ____kasan_kmalloc (mm/kasan/common.c:39 mm/kasan/common.c:45 mm/kasan/ common.c:436 mm/kasan/common.c:515) [ 253.544531] ? ____kasan_kmalloc (mm/kasan/common.c:39 mm/kasan/common.c:45 mm/kasan/common.c:436 mm/kasan/common.c:515) [ 253.544533] ? __kasan_kmalloc (mm/kasan/common.c:524) [253.544535]? kmem_cache_alloc_trace (./include/linux/kasan.h:270 mm/slab.c:3567) [ 253.544541] ? io_issue_sqe (fs/io_uring.c:4556 fs/io_uring.c:4589 fs/io_uring.c:6828) [253.544544]? __io_queue_sqe (fs/io_uring.c:?) [ 253.544551] __kasan_kmalloc (mm/kasan/common.c:524) [ 253.544553] kmem_cache_alloc_trace (./include/linux/kasan.h:270 mm/slab.c:3567) [ 253.544556] ? io_issue_sqe (fs/io_uring.c:4556 fs/io_uring.c:4589 fs/io_uring.c:6828) [ 253.544560] io_issue_sqe (fs/io_uring.c:4556 fs/io_uring.c:4589 fs/io_uring.c:6828 ) [253.544564] ? __kasan_slab_alloc (mm/kasan/common.c:45 mm/kasan/common.c:436 mm/kasan/common.c:469) [ 253.544567] ? __kasan_slab_alloc (mm/kasan/common.c:39 mm/kasan/common.c:45 mm/kasan/common.c:436 mm/kasan/common.c:469) [ 253.544569] ? kmem_cache_alloc_bulk (mm/slab.h:732 mm/slab.c:3546) [ 253.544573] ? __io_alloc_req_refill (fs/io_uring.c:2078) [253.544578]? io_submit_sqes (fs/io_uring.c:7441) [253.544581]? __se_sys_io_uring_enter (fs/io_uring.c:10154 fs/io_uring.c:10096) [253.544584]? __x64_sys_io_uring_enter (fs/io_uring.c:10096) [253.544587]? do_syscall_64 (arch/x86/entry/common.c:50 arch/x86/entry/common.c:80) [253.544590]? entrada_SYSCALL_64_after_hwframe (??:?) [ 253.544596] __io_queue_sqe (fs/io_uring.c:?) [ 253.544600] io_queue_sqe (fs/io_uring.c:7143) [ 253.544603] io_submit_sqe (fs/io_uring.c :?) [ 253.544608] io_submit_sqes (fs/io_uring.c:?) [ 253.544612] __se_sys_io_uring_enter (fs/io_uring.c:10154 fs/io_uri ---truncado---"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 3.3,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-667"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.7",
|
||||
"versionEndExcluding": "5.10.103",
|
||||
"matchCriteriaId": "7BF4E57B-2E8D-4F4A-9DD0-A1A61CDDD2B6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11",
|
||||
"versionEndExcluding": "5.15.26",
|
||||
"matchCriteriaId": "9AB342AE-A62E-4947-A6EA-511453062B2B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "5.16.12",
|
||||
"matchCriteriaId": "C76BAB21-7F23-4AD8-A25F-CA7B262A2698"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/4a93c6594613c3429b6f30136fff115c7f803af4",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/8f3cc3c5bc43d03b5748ac4fb8d180084952c36a",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/c718ea4e7382e18957ed0e88a5f855e2122d9c00",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/f240762f88b4b1b58561939ffd44837759756477",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-48938",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-08-22T04:15:17.787",
|
||||
"lastModified": "2024-08-22T12:48:02.790",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-22T18:49:20.320",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,23 +15,102 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: CDC-NCM: evitar desbordamiento en la comprobaci\u00f3n de cordura Un dispositivo roto puede dar un desplazamiento extremo como 0xFFF0 y una longitud razonable para un fragmento. En la verificaci\u00f3n de cordura tal como est\u00e1 formulada ahora, esto crear\u00e1 un desbordamiento de enteros, anulando la verificaci\u00f3n de cordura. Tanto el desplazamiento como el desplazamiento + len deben comprobarse de tal manera que no pueda producirse un desbordamiento. Y esas cantidades deber\u00edan estar sin firmar."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-190"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "5.10.103",
|
||||
"matchCriteriaId": "7E2EF203-0F7F-41A9-9684-671AAD1D37A1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11",
|
||||
"versionEndExcluding": "5.15.26",
|
||||
"matchCriteriaId": "9AB342AE-A62E-4947-A6EA-511453062B2B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "5.16.12",
|
||||
"matchCriteriaId": "C76BAB21-7F23-4AD8-A25F-CA7B262A2698"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/49909c9f8458cacb5b241106cba65aba5a6d8f4c",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/69560efa001397ebb8dc1c3e6a3ce00302bb9f7f",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/7b737e47b87589031f0d4657f6d7b0b770474925",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/8d2b1a1ec9f559d30b724877da4ce592edc41fdc",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-48939",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-08-22T04:15:17.843",
|
||||
"lastModified": "2024-08-22T12:48:02.790",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-22T19:02:08.770",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,23 +15,103 @@
|
||||
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: bpf: agregar puntos de programaci\u00f3n en operaciones por lotes syzbot inform\u00f3 varios bloqueos suaves causados por operaciones por lotes de bpf. INFORMACI\u00d3N: tarea kworker/1:1:27 bloqueada durante m\u00e1s de 140 segundos. INFORMACI\u00d3N: tarea colgada en rcu_barrier Nada impide que las operaciones por lotes procesen una gran cantidad de datos, necesitamos agregar puntos de programaci\u00f3n en ellas. Tenga en cuenta que las llamadas de Maybe_wait_bpf_programs(map) desde generic_map_delete_batch() se pueden factorizar moviendo la llamada despu\u00e9s del ciclo. Esto se har\u00e1 m\u00e1s adelante en el \u00e1rbol siguiente una vez que combinemos esta soluci\u00f3n, a menos que haya una opini\u00f3n firme sobre realizar esta optimizaci\u00f3n antes."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 3.3,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-834"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.6",
|
||||
"versionEndExcluding": "5.10.103",
|
||||
"matchCriteriaId": "6C91B56F-6C5A-4448-903D-8AC2E4AC87C8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11",
|
||||
"versionEndExcluding": "5.15.26",
|
||||
"matchCriteriaId": "9AB342AE-A62E-4947-A6EA-511453062B2B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "5.16.12",
|
||||
"matchCriteriaId": "C76BAB21-7F23-4AD8-A25F-CA7B262A2698"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/75134f16e7dd0007aa474b281935c5f42e79f2c8",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/7e8099967d0e3ff9d1ae043e80b27fbe46c08417",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/7ef94bfb08fb9e73defafbd5ddef6b5a0e2ee12b",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/8628f489b749a4f9767991631921dbe3fbcdc784",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-48940",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-08-22T04:15:17.907",
|
||||
"lastModified": "2024-08-22T12:48:02.790",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-22T18:37:46.133",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,19 +15,89 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: bpf: soluciona el fallo debido a copy_map_value incorrecto Cuando tanto bpf_spin_lock como bpf_timer est\u00e1n presentes en un valor de mapa BPF, copy_map_value necesita eludir ambos objetos al copiar un valor dentro y fuera del mapa. Sin embargo, el c\u00f3digo actual no establece s_off y t_off en copy_map_value, lo que provoca un bloqueo cuando, por ejemplo, bpf_spin_lock se coloca en el valor del mapa con bpf_timer, ya que la llamada a bpf_map_update_elem podr\u00e1 sobrescribir el otro objeto de temporizador. Cuando el problema no se soluciona, una sobrescritura puede producir el siguiente s\u00edmbolo: [root@(none) bpf]# ./test_progs -t timer_crash [15.930339] bpf_testmod: cargando el n\u00facleo de contaminaci\u00f3n del m\u00f3dulo fuera del \u00e1rbol. [16.037849] ================================================= =================== [16.038458] ERROR: KASAN: acceso a memoria de usuario en __pv_queued_spin_lock_slowpath+0x32b/0x520 [16.038944] Escritura de tama\u00f1o 8 en la direcci\u00f3n 0000000000043ec0 por tarea test_progs /325 [ 16.039399] [ 16.039514] CPU: 0 PID: 325 Comm: test_progs Contaminado: G OE 5.16.0+ #278 [ 16.039983] Nombre de hardware: PC est\u00e1ndar QEMU (i440FX + PIIX, 1996), BIOS ArchLinux 1.15.0- 1 01/04/2014 [ 16.040485] Seguimiento de llamadas: [ 16.040645] [ 16.040805] dump_stack_lvl+0x59/0x73 [ 16.041069] ? __pv_queued_spin_lock_slowpath+0x32b/0x520 [ 16.041427] kasan_report.cold+0x116/0x11b [ 16.041673] ? __pv_queued_spin_lock_slowpath+0x32b/0x520 [16.042040] __pv_queued_spin_lock_slowpath+0x32b/0x520 [16.042328] ? memcpy+0x39/0x60 [16.042552]? pv_hash+0xd0/0xd0 [16.042785]? lockdep_hardirqs_off+0x95/0xd0 [ 16.043079] __bpf_spin_lock_irqsave+0xdf/0xf0 [ 16.043366] ? bpf_get_current_comm+0x50/0x50 [16.043608]? jhash+0x11a/0x270 [ 16.043848] bpf_timer_cancel+0x34/0xe0 [ 16.044119] bpf_prog_c4ea1c0f7449940d_sys_enter+0x7c/0x81 [ 16.044500] 7838_0+0x36/0x1000 [ 16.044836] __x64_sys_nanosleep+0x5/0x140 [ 16.045119] do_syscall_64+0x59/0x80 [ 16.045377] ? lock_is_held_type+0xe4/0x140 [16.045670]? irqentry_exit_to_user_mode+0xa/0x40 [16.046001]? mark_held_locks+0x24/0x90 [16.046287]? asm_exc_page_fault+0x1e/0x30 [16.046569]? asm_exc_page_fault+0x8/0x30 [16.046851]? lockdep_hardirqs_on+0x7e/0x100 [16.047137] Entry_SYSCALL_64_after_hwframe+0x44/0xae [16.047405] RIP: 0033:0x7f9e4831718d [16.047602] C\u00f3digo: b4 0c 00 0f 05 eb a9 66 0f 1f 44 00 00 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d b3 6c 0c 00 f7 d8 64 89 01 48 [ 16.048764] : 002b:00007fff488086b8 EFLAGS: 00000206 ORIG_RAX: 0000000000000023 [ 16.049275] RAX: ffffffffffffffda RBX: 00007f9e48683740 RCX: 00007f9e4831718d [ 16.049747] RDX: 000000000000 RSI: 0000000000000000 RDI: 00007fff488086d0 [ 16.050225] RBP: 00007fff488086f0 R08: 00007fff488085d7 R09: 00007f9e4cb594a0 [ 16.050648] R10: 0000000000000000 R11: 0000000000000206 R12: 00007f9e484cde30 [ 16.051124] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 16.051608 ] [ 16.051762] ========================= ============================================"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-119"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.15",
|
||||
"versionEndExcluding": "5.15.26",
|
||||
"matchCriteriaId": "DD0395FB-2D21-4970-B193-86285F5C505E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "5.16.12",
|
||||
"matchCriteriaId": "C76BAB21-7F23-4AD8-A25F-CA7B262A2698"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/719d1c2524c89ada78c4c9202641c1d9e942a322",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/a8abb0c3dc1e28454851a00f8b7333d9695d566c",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/eca9bd215d2233de79d930fa97aefbce03247a98",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-48941",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-08-22T04:15:17.967",
|
||||
"lastModified": "2024-08-22T12:48:02.790",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-22T18:41:37.090",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,23 +15,102 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ice: corrige el restablecimiento y la eliminaci\u00f3n simult\u00e1neos de VF. El commit c503e63200c6 (\"ice: deja de procesar mensajes VF durante el desmontaje\") introdujo un indicador de estado del controlador, ICE_VF_DEINIT_IN_PROGRESS, cuyo objetivo es evitar algunos problemas con el manejo simult\u00e1neo de mensajes de VF mientras se derriban los VF. Este cambio fue motivado por accidentes causados al derribar y levantar VF en r\u00e1pida sucesi\u00f3n. Resulta que la soluci\u00f3n en realidad introduce problemas con el controlador VF causados porque el PF ya no responde a ning\u00fan mensaje enviado por el VF durante su rutina .remove. Esto da como resultado que el VF elimine potencialmente su memoria DMA antes de que el PF haya cerrado las colas de dispositivos. Adem\u00e1s, la soluci\u00f3n en realidad no resuelve los problemas de concurrencia dentro del controlador Ice. Es posible que un VF inicie un reinicio justo antes de que el conductor de hielo elimine los VF. Esto puede provocar que la tarea de eliminaci\u00f3n funcione simult\u00e1neamente mientras se restablece el VF. Esto da como resultado una corrupci\u00f3n de memoria similar y p\u00e1nicos supuestamente solucionados por esa confirmaci\u00f3n. Corrija esta simultaneidad desde la ra\u00edz protegiendo los flujos de reinicio y eliminaci\u00f3n utilizando el VF cfg_lock existente. Esto garantiza que no podamos eliminar el VF mientras se est\u00e9n realizando tareas cr\u00edticas pendientes, como un mensaje virtchnl o un reinicio. Este cambio de bloqueo tambi\u00e9n soluciona la causa ra\u00edz solucionada originalmente mediante el commit c503e63200c6 (\"ice: Detener el procesamiento de mensajes VF durante el desmontaje\"), por lo que simplemente podemos revertirlo. Tenga en cuenta que mantuve estos dos cambios juntos porque simplemente revertir el compromiso original dejar\u00eda al conductor vulnerable a peores condiciones de ejecuci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 4.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.0,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-362"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "5.10.104",
|
||||
"matchCriteriaId": "11A056EC-CCC4-4F9D-8466-75C8592015D0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11",
|
||||
"versionEndExcluding": "5.15.26",
|
||||
"matchCriteriaId": "9AB342AE-A62E-4947-A6EA-511453062B2B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "5.16.12",
|
||||
"matchCriteriaId": "C76BAB21-7F23-4AD8-A25F-CA7B262A2698"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/05ae1f0fe9c6c5ead08b306e665763a352d20716",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/2a3e61de89bab6696aa28b70030eb119968c5586",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/3c805fce07c9dbc47d8a9129c7c5458025951957",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/fadead80fe4c033b5e514fcbadd20b55c4494112",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-48942",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-08-22T04:15:18.953",
|
||||
"lastModified": "2024-08-22T12:48:02.790",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-22T18:25:14.867",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,23 +15,103 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: hwmon: Maneja la falla al registrar correctamente el sensor con zona t\u00e9rmica. Si se intenta acceder a un sensor con zona t\u00e9rmica y falla, la llamada a devm_thermal_zone_of_sensor_register() puede devolver -ENODEV. Esto puede provocar fallos similares a los siguientes. No se puede manejar la desreferencia del puntero NULL del kernel en la direcci\u00f3n virtual 00000000000003cd... Error interno: Ups: 96000021 [#1] PREEMPT SMP... pstate: 60400009 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc: mutex_lock+0x18/0x60 lr: Thermal_zone_device_update+0x40/0x2e0 sp: ffff800014c4fc60 x29: ffff800014c4fc60 x28: ffff365ee3f6e000 x27: ffffdde218426790 x26: f6e000 x25: 0000000000000000 x24: ffff365ee3f6e000 x23: ffffdde218426870 x22: ffff365ee3f6e000 x21: 00000000000003cd x20: ffff365ee8bf3308 ffffffffffffffff x18: 0000000000000000 x17: ffffdde21842689c x16: ffffdde1cb7a0b7c x15: 0000000000000040 x14: ffffdde21a4889a0 x13: 0000000000000228 x12: 00000000000000 x11: 0000000000000000 x10: 0000000000000000 x9: 0000000000000000 x8: 0000000001120000 x7: 0000000000000001 x6: 0000 000000000000 x5: 0068000878e20f07 x4: 0000000000000000 x3: 00000000000003cd x2: ffff365ee3f6e000 x1: 0000000000000000 x0: 00000000000003cd Rastreo de llamadas: mutex_lock+0x18/0x60 hwmon_notify_event+0xfc/0x110 0xffffdde1cb7a0a90 0xffffdde1cb7a0b7c thread_fn+0x2c/0xa0 irq_thread+0x134/0x240 kthread+0x178/0x190 ret_from_fork+0x10/0x20 C\u00f3digo: d503201f d503201f d2800001 aa0103e4 (c8e47c02 ) Jon Hunter informa que la secuencia de llamada exacta es: hwmon_notify_event() --> hwmon_thermal_notify() --> Thermal_zone_device_update() --> update_temperature() --> mutex_lock() El n\u00facleo de hwmon necesita manejar todos los errores devueltos por las llamadas a devm_thermal_zone_of_sensor_register(). Si la llamada falla con -ENODEV, informe que el sensor no estaba conectado a una zona t\u00e9rmica pero contin\u00fae registrando el dispositivo hwmon."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.8",
|
||||
"versionEndExcluding": "5.10.103",
|
||||
"matchCriteriaId": "D8C41B9F-E0FA-4DF6-A35F-596B525A72A6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11",
|
||||
"versionEndExcluding": "5.15.26",
|
||||
"matchCriteriaId": "9AB342AE-A62E-4947-A6EA-511453062B2B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "5.16.12",
|
||||
"matchCriteriaId": "C76BAB21-7F23-4AD8-A25F-CA7B262A2698"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/1b5f517cca36292076d9e38fa6e33a257703e62e",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/7efe8499cb90651c540753f4269d2d43ede14223",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/8a1969e14ad93663f9a3ed02ccc2138da9956a0e",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/962b2a3188bfa5388756ffbc47dfa5ff59cb8011",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-48943",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-08-22T04:15:19.027",
|
||||
"lastModified": "2024-08-22T12:48:02.790",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-22T18:27:42.807",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,23 +15,102 @@
|
||||
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: KVM: x86/mmu: haga que el token apf sea distinto de cero para corregir el error En la l\u00f3gica de error de p\u00e1gina as\u00edncrona actual, cuando una p\u00e1gina est\u00e1 lista, KVM se basa en kvm_arch_can_dequeue_async_page_present() para determinar si se debe entregar un evento LISTO para el Invitado. Esta funci\u00f3n prueba el valor del token de la estructura kvm_vcpu_pv_apf_data, que el kernel invitado debe restablecer a cero cuando el invitado finaliza un evento READY. Si el valor es cero, significa que se realiz\u00f3 un evento READY, por lo que el KVM puede entregar otro. Pero kvm_arch_setup_async_pf() puede producir un token v\u00e1lido con valor cero, lo que se confunde con la menci\u00f3n anterior y puede provocar la p\u00e9rdida de este evento READY. Este error puede causar que la tarea se bloquee para siempre en Guest: INFORMACI\u00d3N: tarea de estr\u00e9s:7532 bloqueada durante m\u00e1s de 1254 segundos. Not tainted 5.10.0 #16 \"echo 0 > /proc/sys/kernel/hung_task_timeout_secs\" desactiva este mensaje. tarea:estr\u00e9s estado:D pila: 0 pid: 7532 ppid: 1409 banderas:0x00000080 Seguimiento de llamadas: __schedule+0x1e7/0x650 Schedule+0x46/0xb0 kvm_async_pf_task_wait_schedule+0xad/0xe0 ? exit_to_user_mode_prepare+0x60/0x70 __kvm_handle_async_pf+0x4f/0xb0 ? asm_exc_page_fault+0x8/0x30 exc_page_fault+0x6f/0x110? asm_exc_page_fault+0x8/0x30 asm_exc_page_fault+0x1e/0x30 RIP: 0033:0x402d00 RSP: 002b:00007ffd31912500 EFLAGS: 00010206 RAX: 0000000000071000 RBX: ffffffff RCX: 00000000021a32b0 RDX: 000000000007d011 RSI: 000000000007d000 RDI: 00000000021262b0 RBP: 00000000021262b0 R08: 03 R09: 0000000000000086 R10: 000000000000000000EB R11: 00007FEFBDF2BAA0 R12: 00000000000000000000 R13: 0000000000000002 R14: 000000000007D000 R15: 00000000001000"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "5.10.103",
|
||||
"matchCriteriaId": "7E2EF203-0F7F-41A9-9684-671AAD1D37A1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11",
|
||||
"versionEndExcluding": "5.15.26",
|
||||
"matchCriteriaId": "9AB342AE-A62E-4947-A6EA-511453062B2B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "5.16.12",
|
||||
"matchCriteriaId": "C76BAB21-7F23-4AD8-A25F-CA7B262A2698"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/4c3644b6c96c5daa5149e5abddc07234eea47c7c",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/62040f5cd7d937de547836e747b6aa8212fec573",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/6f3c1fc53d86d580d8d6d749c4af23705e4f6f79",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/72fdfc75d4217b32363cc80def3de2cb3fef3f02",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-46047",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-27T05:15:47.500",
|
||||
"lastModified": "2024-08-02T21:15:49.040",
|
||||
"lastModified": "2024-08-22T18:35:01.467",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [
|
||||
{
|
||||
@ -22,7 +22,42 @@
|
||||
"value": "Un problema en Sane 1.2.1 permite a un atacante local ejecutar c\u00f3digo arbitrario a trav\u00e9s de un archivo manipulado en la funci\u00f3n sanei_configure_attach(). NOTA: esto est\u00e1 en disputa porque no se espera que el producto comience con un archivo de configuraci\u00f3n controlado por el atacante."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.3,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2024/Jan/64",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-46297",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-05-29T16:15:09.423",
|
||||
"lastModified": "2024-05-29T19:50:25.303",
|
||||
"lastModified": "2024-08-22T19:35:05.647",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Se descubri\u00f3 un problema en los dispositivos Mercusys MW325R EU V3 MW325R(EU)_V3_1.11.0 221019. Un atacante de WAN puede hacer que la interfaz de administraci\u00f3n sea inaccesible/invisible mediante una solicitud HTTP no autenticada. No se produce verificaci\u00f3n de los datos enviados por el usuario. El servidor web no falla, pero la interfaz de administraci\u00f3n se vuelve invisible porque los archivos necesarios para mostrar el contenido ya no est\u00e1n disponibles. Normalmente es necesario reiniciar el enrutador para restaurar el comportamiento correcto."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 5.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-755"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://k4m1ll0.com/cve-2023-46297.html",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-46442",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-05-24T17:15:45.367",
|
||||
"lastModified": "2024-05-24T18:09:20.027",
|
||||
"lastModified": "2024-08-22T19:35:06.600",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Un bucle infinito en la funci\u00f3n retrieveActiveBody de Soot anterior a v4.4.1 en Java 8 permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS)."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-400"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/JAckLosingHeart/CVE-2023-46442_POC/tree/main",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-49963",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-19T17:15:51.900",
|
||||
"lastModified": "2024-04-19T18:29:53.040",
|
||||
"lastModified": "2024-08-22T19:35:07.550",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "El servidor de impresi\u00f3n DYMO LabelWriter hasta la versi\u00f3n 2.366 contiene una contrase\u00f1a codificada de puerta trasera que podr\u00eda permitir que un atacante tome el control."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-259"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitlab.com/loudmouth-security/vulnerability-disclosures/cve-2023-49963",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-49965",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-05T14:15:10.423",
|
||||
"lastModified": "2024-04-08T18:49:25.863",
|
||||
"lastModified": "2024-08-22T18:35:03.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,30 @@
|
||||
"value": "El router Wi-Fi SpaceX Starlink Gen 2 anterior a 2023.48.0 permite XSS a trav\u00e9s de los par\u00e1metros ssid y contrase\u00f1a en la p\u00e1gina de configuraci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 4.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://hackintoanetwork.com/blog/2023-starlink-router-gen2-xss-eng/",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-50061",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-08T18:15:08.157",
|
||||
"lastModified": "2024-02-15T05:02:52.427",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-08-22T19:35:08.363",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-52153",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-21T22:15:49.023",
|
||||
"lastModified": "2024-02-22T19:07:27.197",
|
||||
"lastModified": "2024-08-22T19:35:09.257",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Una vulnerabilidad de inyecci\u00f3n SQL en /pmb/opac_css/includes/sessions.inc.php en PMB 7.4.7 y versiones anteriores permite a atacantes remotos no autenticados inyectar comandos SQL arbitrarios a trav\u00e9s del valor de cookie PmbOpac-LOGIN."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://nexacybersecurity.blogspot.com/2024/02/journey-finding-vulnerabilities-in-pmb-library-management-system.html",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-52366",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2024-02-18T04:15:07.560",
|
||||
"lastModified": "2024-02-20T19:50:53.960",
|
||||
"lastModified": "2024-08-22T18:35:04.153",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,30 @@
|
||||
"value": "Vulnerabilidad de lectura fuera de los l\u00edmites en el m\u00f3dulo de reconocimiento de actividad inteligente. La explotaci\u00f3n exitosa de esta vulnerabilidad puede provocar que las funciones funcionen de manera anormal."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@huawei.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-20037",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2024-03-04T03:15:07.760",
|
||||
"lastModified": "2024-03-04T13:58:23.447",
|
||||
"lastModified": "2024-08-22T19:35:10.633",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "En pq, existe una posible condici\u00f3n de escritura en qu\u00e9 y d\u00f3nde debido a una verificaci\u00f3n de los l\u00edmites incorrecta. Esto podr\u00eda conducir a una escalada local de privilegios con permisos de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS08495937; ID del problema: ALPS08495937."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-754"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/March-2024",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-22394",
|
||||
"sourceIdentifier": "PSIRT@sonicwall.com",
|
||||
"published": "2024-02-08T02:15:07.620",
|
||||
"lastModified": "2024-02-14T21:46:40.537",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-08-22T19:35:11.720",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-22588",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-05-24T15:15:23.377",
|
||||
"lastModified": "2024-05-24T18:09:20.027",
|
||||
"lastModified": "2024-08-22T19:35:11.923",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Kwik commit 745fd4e2 no descarta las claves de cifrado no utilizadas."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-400"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/QUICTester/29a1851c2b2a406411f688735526fe2e",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-23076",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-10T12:15:09.190",
|
||||
"lastModified": "2024-08-01T23:15:39.920",
|
||||
"lastModified": "2024-08-22T19:35:12.810",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [
|
||||
{
|
||||
@ -22,7 +22,42 @@
|
||||
"value": "Se descubri\u00f3 que FreeChart v1.5.4 conten\u00eda una excepci\u00f3n NullPointerException a trav\u00e9s del componente /labels/BubbleXYItemLabelGenerator.java."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-395"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://jfreechart.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-24133",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-07T14:15:52.820",
|
||||
"lastModified": "2024-08-02T00:15:15.980",
|
||||
"lastModified": "2024-08-22T19:35:13.840",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [
|
||||
{
|
||||
@ -43,6 +43,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -56,6 +76,16 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-24476",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-21T19:15:09.030",
|
||||
"lastModified": "2024-08-02T00:15:19.267",
|
||||
"lastModified": "2024-08-22T18:35:04.910",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [
|
||||
{
|
||||
@ -22,7 +22,42 @@
|
||||
"value": "Vulnerabilidad de desbordamiento de b\u00fafer en el equipo Wireshark Wireshark anterior a v.4.2.0 permite que un atacante remoto provoque una denegaci\u00f3n de servicio a trav\u00e9s de los componentes de tama\u00f1o pan/addr_resolv.c y ws_manuf_lookup_str()."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-119"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/1047524396/369ba0ccffe255cf8142208b6142be2b",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-25502",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-15T20:15:45.483",
|
||||
"lastModified": "2024-02-16T13:38:00.047",
|
||||
"lastModified": "2024-08-22T19:35:15.140",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Vulnerabilidad de Directory Traversal en flusity CMS v.2.4 permite a un atacante remoto ejecutar c\u00f3digo arbitrario y obtener informaci\u00f3n confidencial a trav\u00e9s del componente download_backup.php."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/flusity/flusity-CMS/issues/10",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-25651",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-14T03:15:08.727",
|
||||
"lastModified": "2024-03-14T12:52:09.877",
|
||||
"lastModified": "2024-08-22T19:35:16.053",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "La enumeraci\u00f3n de usuarios puede ocurrir en la API REST de autenticaci\u00f3n en Delinea PAM Secret Server 11.4. Esto permite a un atacante remoto determinar si un usuario es v\u00e1lido debido a una diferencia en las respuestas del endpoint /oauth2/token."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-203"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.cvcn.gov.it/cvcn/cve/CVE-2024-25651",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-25850",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-22T15:15:08.540",
|
||||
"lastModified": "2024-02-22T19:07:27.197",
|
||||
"lastModified": "2024-08-22T19:35:16.957",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Se descubri\u00f3 que Netis WF2780 v2.1.40144 contiene una vulnerabilidad de inyecci\u00f3n de comandos a trav\u00e9s del par\u00e1metro wps_ap_ssid5g"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/no1rr/Vulnerability/blob/master/netis/igd_wps_set_wps_ap_ssid5g.md",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-27518",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-29T21:15:47.857",
|
||||
"lastModified": "2024-04-30T13:11:16.690",
|
||||
"lastModified": "2024-08-22T19:35:18.243",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Un problema en SUPERAntiSyware Professional X 10.0.1262 y 10.0.1264 permite a atacantes sin privilegios escalar privilegios mediante la restauraci\u00f3n de un archivo DLL manipulado en la carpeta C:\\Program Files\\SUPERAntiSpyware."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/secunnix/CVE-2024-27518",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-27571",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-01T14:15:54.280",
|
||||
"lastModified": "2024-03-01T15:23:36.177",
|
||||
"lastModified": "2024-08-22T19:35:19.107",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Se descubri\u00f3 que LBT T300-T390 v2.2.1.8 conten\u00eda un desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria a trav\u00e9s del par\u00e1metro ApCliSsid en la funci\u00f3n makeCurRemoteApList. Esta vulnerabilidad permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) mediante una solicitud POST manipulada."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/cvdyfbwa/IoT_LBT_Router/blob/main/makeCurRemoteApList.md",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-28441",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-22T02:15:08.480",
|
||||
"lastModified": "2024-03-22T12:45:36.130",
|
||||
"lastModified": "2024-08-22T18:35:05.960",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Vulnerabilidad de carga de archivos en magicflue v.7.0 y anteriores permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de una solicitud manipulada al par\u00e1metro messageid del endpoint mail/mailupdate.jsp."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/iamHuFei/HVVault/blob/main/webapp/%E9%AD%94%E6%96%B9%E7%BD%91%E8%A1%A8/magicflu-mailupdate-jsp-fileupload.md",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-29489",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-28T23:15:46.527",
|
||||
"lastModified": "2024-03-29T12:45:02.937",
|
||||
"lastModified": "2024-08-22T19:35:20.067",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Jerryscript 2.4.0 tiene SEGV en ./jerry-core/ecma/base/ecma-helpers.c:238:58 en ecma_get_object_type."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/gandalf4a/9826a897ae1e3c8d1c7e71a1ec71d415",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-30804",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-26T22:15:08.017",
|
||||
"lastModified": "2024-04-29T12:42:03.667",
|
||||
"lastModified": "2024-08-22T19:35:22.260",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Un problema descubierto en el componente DeviceIoControl en ASUS Fan_Xpert anterior a v.10013 permite a un atacante ejecutar c\u00f3digo arbitrario a trav\u00e9s de solicitudes IOCTL manipuladas."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-782"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/DriverHunter/Win-Driver-EXP/tree/main/CVE-2024-30804",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-31032",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-29T17:15:20.993",
|
||||
"lastModified": "2024-04-24T03:15:05.933",
|
||||
"lastModified": "2024-08-22T19:35:23.210",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Un problema en Huashi Private Cloud CDN Live Streaming Acceleration Server hgateway-sixport v.1.1.2 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s del componente manager/ipping.php."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/walskt/CVE/blob/main/CVE-2024-31032/README.md",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-31041",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-17T19:15:07.733",
|
||||
"lastModified": "2024-04-17T20:08:21.887",
|
||||
"lastModified": "2024-08-22T18:35:06.980",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Vulnerabilidad de desreferencia de puntero nulo en la funci\u00f3n topic_filtern en mqtt_parser.c en NanoMQ 0.21.7 permite a atacantes provocar una denegaci\u00f3n de servicio."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/nanomq/nanomq/issues/1723",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-31759",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-16T23:15:09.047",
|
||||
"lastModified": "2024-04-17T12:48:07.510",
|
||||
"lastModified": "2024-08-22T19:35:24.357",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Un problema en sanluan PublicCMS v.4.0.202302.e permite a un atacante escalar privilegios mediante la funci\u00f3n de cambio de contrase\u00f1a."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://1drv.ms/v/s%21AmTWEcd1YDpUjgoJ8lkA8pN8zYEJ?e=gIlbGf",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-33103",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-30T18:15:19.923",
|
||||
"lastModified": "2024-08-02T03:15:23.713",
|
||||
"lastModified": "2024-08-22T19:35:25.357",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [
|
||||
{
|
||||
@ -22,7 +22,42 @@
|
||||
"value": "Una vulnerabilidad de carga de archivos arbitrarios en el componente Media Manager de DokuWiki 2024-02-06a permite a los atacantes ejecutar c\u00f3digo arbitrario cargando un archivo SVG manipulado. NOTA: como se indica en la referencia del problema 4267, existe la posibilidad de que la explotabilidad solo pueda ocurrir con una mala configuraci\u00f3n del producto."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/dokuwiki/dokuwiki/issues/4267",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-33226",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-05-22T16:15:10.317",
|
||||
"lastModified": "2024-05-22T18:59:20.240",
|
||||
"lastModified": "2024-08-22T19:35:26.237",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Un problema en el componente Access64.sys de Wistron Corporation TBT Force Power Control v1.0.0.0 permite a los atacantes escalar privilegios y ejecutar c\u00f3digo arbitrario mediante el env\u00edo de solicitudes IOCTL manipuladas."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 9.9,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/DriverHunter/Win-Driver-EXP/tree/main/CVE-2024-33226",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-33655",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-06-06T17:15:51.040",
|
||||
"lastModified": "2024-06-10T18:15:34.520",
|
||||
"lastModified": "2024-08-22T19:35:27.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "El protocolo DNS en RFC 1035 y sus actualizaciones permite a atacantes remotos provocar una denegaci\u00f3n de servicio (consumo de recursos) organizando que las consultas DNS se acumulen durante segundos, de modo que las respuestas se env\u00eden posteriormente en una r\u00e1faga pulsante (que puede considerarse amplificaci\u00f3n del tr\u00e1fico en algunos casos), tambi\u00e9n conocido como el problema \"DNSBomb\"."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-400"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://alas.aws.amazon.com/ALAS-2024-1934.html",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-33799",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-05-28T16:15:15.937",
|
||||
"lastModified": "2024-05-28T17:11:47.007",
|
||||
"lastModified": "2024-08-22T19:35:28.087",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Una vulnerabilidad de inyecci\u00f3n SQL en /model/get_teacher.php en campcodes Complete Web-Based School Management System 1.0 permite a un atacante ejecutar comandos SQL arbitrarios a trav\u00e9s del par\u00e1metro id."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Web-Based%20School%20Management%20System/Complete%20Web-Based%20School%20Management%20System%20-%20vuln%2018.pdf",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-34459",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-05-14T15:39:11.917",
|
||||
"lastModified": "2024-06-10T18:15:34.930",
|
||||
"lastModified": "2024-08-22T18:35:08.623",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Se descubri\u00f3 un problema en xmllint (de libxml2) anterior a 2.11.8 y 2.12.x anterior a 2.12.7. Formatear mensajes de error con xmllint --htmlout puede provocar una lectura excesiva del b\u00fafer en xmlHTMLPrintFileContext en xmllint.c."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-122"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitlab.gnome.org/GNOME/libxml2/-/issues/720",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-34527",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-05-06T00:15:10.207",
|
||||
"lastModified": "2024-05-06T12:44:56.377",
|
||||
"lastModified": "2024-08-22T18:35:09.990",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "space_plugin/app.py en SolidUI 0.4.0 tiene una declaraci\u00f3n de impresi\u00f3n innecesaria para una clave OpenAI. Es posible que se haya registrado la cadena impresa."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-532"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/CloudOrc/SolidUI/blob/00d96b53bd0acf082996cef45b0f292eaba22fb7/solidui/spaces_plugin/app.py#L77",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-35469",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-05-30T18:15:09.730",
|
||||
"lastModified": "2024-05-30T18:18:58.870",
|
||||
"lastModified": "2024-08-22T19:35:28.953",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Una vulnerabilidad de inyecci\u00f3n SQL en /hrm/user/ en SourceCodester Human Resource Management System 1.0 permite a atacantes ejecutar comandos SQL arbitrarios a trav\u00e9s del par\u00e1metro de contrase\u00f1a."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/dovankha/CVE-2024-35469",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-3566",
|
||||
"sourceIdentifier": "cret@cert.org",
|
||||
"published": "2024-04-10T16:15:16.083",
|
||||
"lastModified": "2024-04-10T19:49:51.183",
|
||||
"lastModified": "2024-08-22T19:35:35.700",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,30 @@
|
||||
"value": "A command inject vulnerability allows an attacker to perform command injection on Windows applications that indirectly depend on the CreateProcess function when the specific conditions are satisfied."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://flatt.tech/research/posts/batbadbut-you-cant-securely-execute-commands-on-windows/",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-36439",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-22T15:15:15.883",
|
||||
"lastModified": "2024-08-22T15:15:15.883",
|
||||
"lastModified": "2024-08-22T18:35:12.120",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "Swissphone DiCal-RED 4009 devices allow a remote attacker to gain access to the administrative web interface via the device password's hash value, without knowing the actual device password."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 9.4,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.swissphone.com/en-us/solutions/components/terminals/radio-data-module-dical-red/",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-36441",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-22T16:15:08.433",
|
||||
"lastModified": "2024-08-22T16:15:08.433",
|
||||
"lastModified": "2024-08-22T19:35:29.793",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "Swissphone DiCal-RED 4009 devices allow an unauthenticated attacker use a port-2101 TCP connection to gain access to operation messages that are received by the device."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L",
|
||||
"attackVector": "PHYSICAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.7,
|
||||
"impactScore": 4.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.swissphone.com/en-us/solutions/components/terminals/radio-data-module-dical-red/",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-36443",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-22T14:15:08.443",
|
||||
"lastModified": "2024-08-22T14:15:08.443",
|
||||
"lastModified": "2024-08-22T19:35:30.730",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "Swissphone DiCal-RED 4009 devices allow a remote attacker to gain read access to almost the whole file system via anonymous FTP."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.6,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 4.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.swissphone.com/en-us/solutions/components/terminals/radio-data-module-dical-red/",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-36580",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-06-17T14:15:10.227",
|
||||
"lastModified": "2024-06-20T12:44:22.977",
|
||||
"lastModified": "2024-08-22T19:35:31.613",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Un problema de contaminaci\u00f3n de prototipos en cdr0 sg 1.0.10 permite a un atacante ejecutar c\u00f3digo arbitrario."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-1321"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/mestrtee/a75d75eca4622ad08f7cfa903a6cc9c3",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-36773",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-06-07T15:15:50.063",
|
||||
"lastModified": "2024-08-02T17:05:08.087",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-08-22T19:35:32.557",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-36811",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-06-07T19:15:23.920",
|
||||
"lastModified": "2024-06-07T19:24:09.243",
|
||||
"lastModified": "2024-08-22T18:35:13.753",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Una vulnerabilidad de carga de archivos arbitrarios en la funci\u00f3n de carga de im\u00e1genes de aimeos-core v2024.04 permite a los atacantes ejecutar c\u00f3digo arbitrario cargando un archivo PHP manipulado."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://drive.google.com/file/d/1QJWwaDB6smLCuNp10yZKWgpELTQJax31/view?usp=sharing",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-36843",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-05-31T20:15:10.290",
|
||||
"lastModified": "2024-07-09T19:15:11.767",
|
||||
"lastModified": "2024-08-22T18:35:15.457",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Se descubri\u00f3 que libmodbus v3.1.6 conten\u00eda un desbordamiento del mont\u00f3n mediante la funci\u00f3n modbus_mapping_free()."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-122"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/balckgu1/libmodbusPoc/blob/main/gdb.md",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-36856",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-06-12T03:15:39.477",
|
||||
"lastModified": "2024-06-13T18:36:09.013",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-22T19:35:33.427",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "RMQTT Broker 0.4.0 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda del daemon) a trav\u00e9s de una determinada secuencia de cinco paquetes TCP. "
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-404"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/pengwGit/d8410afeb0d5d11ab79f596a32178c2e",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-37066",
|
||||
"sourceIdentifier": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
|
||||
"published": "2024-07-19T12:15:02.320",
|
||||
"lastModified": "2024-07-19T13:01:44.567",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-22T18:22:47.927",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
|
||||
"type": "Secondary",
|
||||
@ -51,14 +81,51 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:wyze:cam_v4_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "4.52.4.9887",
|
||||
"matchCriteriaId": "678B080B-FFD7-4303-8812-CAAF44E3CBBC"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:wyze:cam_v4:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B7966E04-5847-4556-AD80-A9EF9E27E9D7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://forums.wyze.com/t/security-advisory/289256",
|
||||
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c"
|
||||
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://hiddenlayer.com/sai-security-advisory/2024-7-wyze/",
|
||||
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c"
|
||||
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-39211",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-04T13:15:10.140",
|
||||
"lastModified": "2024-07-05T12:55:51.367",
|
||||
"lastModified": "2024-08-22T19:35:34.747",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Kaiten 57.128.8 permite a atacantes remotos enumerar cuentas de usuario a trav\u00e9s de una solicitud POST manipulada, porque una respuesta de inicio de sesi\u00f3n contiene un campo user_email s\u00f3lo si la cuenta de usuario existe."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-204"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/artemy-ccrsky/CVE-2024-39211",
|
||||
|
56
CVE-2024/CVE-2024-397xx/CVE-2024-39717.json
Normal file
56
CVE-2024/CVE-2024-397xx/CVE-2024-39717.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-39717",
|
||||
"sourceIdentifier": "support@hackerone.com",
|
||||
"published": "2024-08-22T19:15:09.173",
|
||||
"lastModified": "2024-08-22T19:15:09.173",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Versa Director GUI provides an option to customize the look and feel of the user interface. This option is only available for a user logged with Provider-Data-Center-Admin or Provider-Data-Center-System-Admin. (Tenant level users do not have this privilege). The \u201cChange Favicon\u201d (Favorite Icon) option can be mis-used to upload a malicious file ending with .png extension to masquerade as image file. This is possible only after a user with Provider-Data-Center-Admin or Provider-Data-Center-System-Admin has successfully authenticated and logged in. \r\n\r\nSeverity: HIGH\r\n \r\nExploitation Status:\r\n\r\nVersa Networks is aware of one confirmed customer reported instance where this vulnerability was exploited because the Firewall guidelines which were published in 2015 & 2017 were not implemented by that customer. This non-implementation resulted in the bad actor being able to exploit this vulnerability without using the GUI. In our testing (not exhaustive, as not all numerical versions of major browsers were tested) the malicious file does not get executed on the client. There are reports of others based on backbone telemetry observations of a 3rd party provider, however these are unconfirmed to date."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "support@hackerone.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.6,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.7,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.versa-networks.com/support/solutions/articles/23000024323-release-21-2-3",
|
||||
"source": "support@hackerone.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.versa-networks.com/support/solutions/articles/23000025680-release-22-1-2",
|
||||
"source": "support@hackerone.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.versa-networks.com/support/solutions/articles/23000026033-release-22-1-3",
|
||||
"source": "support@hackerone.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.versa-networks.com/support/solutions/articles/23000026724-versa-director-ha-port-exploit-discovery-remediation",
|
||||
"source": "support@hackerone.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-40347",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-20T04:15:03.853",
|
||||
"lastModified": "2024-07-22T13:00:53.287",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-22T18:37:49.850",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,11 +15,68 @@
|
||||
"value": " Una vulnerabilidad reflejada de Cross Site Scripting (XSS) en Hyland Alfresco Platform 23.2.1-r96 permite a los atacantes ejecutar c\u00f3digo arbitrario en el contexto del navegador de un usuario mediante la inyecci\u00f3n de un payload manipulado en el par\u00e1metro htmlid."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hyland:alfresco_content_services:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "23.3",
|
||||
"matchCriteriaId": "9F6EA814-DBA0-41E2-9729-BADAB1183C3F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/4rdr/proofs/blob/main/info/Alfresco_Reflected_XSS_via_htmlid_parameter.md",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-40535",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-16T21:15:11.187",
|
||||
"lastModified": "2024-07-17T13:34:20.520",
|
||||
"lastModified": "2024-08-22T19:35:35.893",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Se descubri\u00f3 que Shenzhen Libituo Technology Co., Ltd LBT-T300-T400 v3.2 conten\u00eda un desbordamiento de pila a trav\u00e9s del par\u00e1metro apn_name_3g en la funci\u00f3n config_3g_para."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/tt01bolt/vul/blob/main/LBT-T300-T400_Buffer%20overflow.md",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-41599",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-19T20:15:09.063",
|
||||
"lastModified": "2024-07-22T13:00:53.287",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-22T18:27:45.397",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,11 +15,68 @@
|
||||
"value": " Vulnerabilidad de Cross Site Scripting en RuoYi v.4.7.9 y anteriores permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s del m\u00e9todo de carga de archivos"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ruoyi:ruoyi:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "4.7.9",
|
||||
"matchCriteriaId": "23C8B479-ECDA-4F19-8547-4129C63F3E0E"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/topsky979/Security-Collections/tree/main/CVE-2024-41599",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-41600",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-19T18:15:05.727",
|
||||
"lastModified": "2024-07-22T13:00:53.287",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-22T18:27:15.310",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,11 +15,67 @@
|
||||
"value": " Vulnerabilidad de permisos inseguros en lin-CMS Springboot v.0.2.1 y anteriores permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s del m\u00e9todo de inicio de sesi\u00f3n en el componente UserController.java."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:talelin:lin-cms-spring-boot:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "0.2.1",
|
||||
"matchCriteriaId": "81E70529-20EB-4A70-BFC1-B7F495BEA48D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/topsky979/Security-Collections/tree/main/CVE-2024-41600",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-42598",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-20T16:15:11.727",
|
||||
"lastModified": "2024-08-22T16:35:06.180",
|
||||
"lastModified": "2024-08-22T18:15:10.187",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -52,6 +52,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitee.com/fushuling/cve/blob/master/CVE-2024-42598.md",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://gitee.com/fushuling/cve/blob/master/SeaCMS%20V13%20admin_editplayer.php%20code%20injection.md",
|
||||
"source": "cve@mitre.org"
|
||||
|
60
CVE-2024/CVE-2024-427xx/CVE-2024-42767.json
Normal file
60
CVE-2024/CVE-2024-427xx/CVE-2024-42767.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-42767",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-22T18:15:10.280",
|
||||
"lastModified": "2024-08-22T19:35:36.800",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Kashipara Hotel Management System v1.0 is vulnerable to Unrestricted File Upload RCE via /admin/add_room_controller.php."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cwe.mitre.org/data/definitions/434.html",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Hotel%20Management%20System%20v1.0/Unrestricted%20File%20Upload.pdf",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-42768",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-22T17:15:05.693",
|
||||
"lastModified": "2024-08-22T17:15:05.693",
|
||||
"lastModified": "2024-08-22T18:35:16.727",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "A Cross-Site Request Forgery (CSRF) vulnerability was found in Kashipara Hotel Management System v1.0 via /admin/delete_room.php."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 4.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cwe.mitre.org/data/definitions/352.html",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-42769",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-22T16:15:09.553",
|
||||
"lastModified": "2024-08-22T16:15:09.553",
|
||||
"lastModified": "2024-08-22T19:35:37.830",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "A Reflected Cross Site Scripting (XSS) vulnerability was found in \"/core/signup_user.php \" of Kashipara Hotel Management System v1.0, which allows remote attackers to execute arbitrary code via \"user_fname\" and \"user_lname\" parameters."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Hotel%20Management%20System%20v1.0/Reflected%20XSS%20-%20Sign%20UP.pdf",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-42772",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-22T17:15:06.070",
|
||||
"lastModified": "2024-08-22T17:15:06.070",
|
||||
"lastModified": "2024-08-22T19:35:38.793",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "An Incorrect Access Control vulnerability was found in /admin/rooms.php in Kashipara Hotel Management System v1.0, which allows an unauthenticated attacker to view valid hotel room entries in administrator section."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Hotel%20Management%20System%20v1.0/Broken%20Access%20Control%20-%20View%20Room%20Entry.pdf",
|
||||
|
25
CVE-2024/CVE-2024-427xx/CVE-2024-42773.json
Normal file
25
CVE-2024/CVE-2024-427xx/CVE-2024-42773.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-42773",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-22T18:15:10.367",
|
||||
"lastModified": "2024-08-22T18:15:10.367",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An Incorrect Access Control vulnerability was found in /admin/edit_room_controller.php in Kashipara Hotel Management System v1.0, which allows an unauthenticated attacker to edit the valid hotel room entries in the administrator section."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Hotel%20Management%20System%20v1.0/Broken%20Access%20Control%20-%20Edit%20Room%20Entry.pdf",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.kashipara.com/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-42780",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-21T18:15:10.150",
|
||||
"lastModified": "2024-08-22T12:48:02.790",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-22T19:35:39.710",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Se encontr\u00f3 una vulnerabilidad de carga de archivos sin restricciones en \"/music/ajax.php?action=save_genre\" en Kashipara Music Management System v1.0. Esto permite a los atacantes ejecutar c\u00f3digo arbitrario cargando un archivo PHP manipulado."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Music%20Management%20System%20v1.0/Unrestricted%20File%20Upload%20-%20Add%20New%20Genre.pdf",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-43853",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-08-17T10:15:10.383",
|
||||
"lastModified": "2024-08-19T12:59:59.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-22T18:06:38.087",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,23 +15,103 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: cgroup/cpuset: Prevenir UAF en proc_cpuset_show() Puede ocurrir un UAF cuando se lee /proc/cpuset como se informa en [1]. Esto se puede reproducir mediante los siguientes m\u00e9todos: 1.Agregue un mdelay(1000) antes de adquirir cgroup_lock en la funci\u00f3n cgroup_path_ns. 2.$cat /proc//cpuset repetidamente. 3.$mount -t cgroup -o cpuset cpuset /sys/fs/cgroup/cpuset/ $umount /sys/fs/cgroup/cpuset/ repetidamente. La ejecuci\u00f3n que causa este error se puede mostrar a continuaci\u00f3n: (umount) | (cat /proc//cpuset) css_release | proc_cpuset_show css_release_work_fn | css = task_get_css(tsk, cpuset_cgrp_id); css_free_rwork_fn | cgroup_path_ns(css->cgroup, ...); cgroup_destroy_root | mutex_lock(&cgroup_mutex); rebind_subsistemas | cgroup_free_root | | // cgrp fue liberado, UAF | cgroup_path_ns_locked(cgrp,..); Cuando se inicializa cpuset, el nodo ra\u00edz top_cpuset.css.cgrp apuntar\u00e1 a &cgrp_dfl_root.cgrp. En cgroup v1, la operaci\u00f3n de montaje asignar\u00e1 cgroup_root y top_cpuset.css.cgrp apuntar\u00e1 al &cgroup_root.cgrp asignado. Cuando se ejecuta la operaci\u00f3n desmontaje, top_cpuset.css.cgrp se rebotar\u00e1 en &cgrp_dfl_root.cgrp. El problema es que al volver a vincular a cgrp_dfl_root, hay casos en los que el cgroup_root asignado al configurar la ra\u00edz para cgroup v1 se almacena en cach\u00e9. Esto podr\u00eda dar lugar a un use-after-free (UAF) si se libera posteriormente. Los cgroups descendientes de cgroup v1 solo se pueden liberar despu\u00e9s de que se publique el CSS. Sin embargo, el CSS de la ra\u00edz nunca se liberar\u00e1, pero cgroup_root debe liberarse cuando se desmonta. Esto significa que obtener una referencia al CSS de la ra\u00edz no garantiza que css.cgrp->root no se libere. Solucione este problema usando rcu_read_lock en proc_cpuset_show(). Como cgroup_root es kfree_rcu despu\u00e9s del commit d23b5c577715 (\"cgroup: hacer que las operaciones en la RCU cgroup root_list sean seguras\"), css->cgroup no se liberar\u00e1 durante la secci\u00f3n cr\u00edtica. Para llamar a cgroup_path_ns_locked, se necesita css_set_lock, por lo que es seguro reemplazar task_get_css con task_css. [1] https://syzkaller.appspot.com/bug?extid=9b1ff7be974a403aa4cd"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.6",
|
||||
"versionEndExcluding": "6.1.103",
|
||||
"matchCriteriaId": "B8828E57-70E4-428D-BC12-F89414C8715F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2",
|
||||
"versionEndExcluding": "6.6.44",
|
||||
"matchCriteriaId": "CC912330-6B41-4C6B-99AF-F3857FBACB6A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.10.3",
|
||||
"matchCriteriaId": "92D388F2-1EAF-4CFA-AC06-5B26D762EA7D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/1be59c97c83ccd67a519d8a49486b3a8a73ca28a",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/29a8d4e02fd4840028c38ceb1536cc8f82a257d4",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/29ac1d238b3bf126af36037df80d7ecc4822341e",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/96226fbed566f3f686f53a489a29846f2d538080",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-43854",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-08-17T10:15:10.447",
|
||||
"lastModified": "2024-08-19T12:59:59.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-22T18:12:28.620",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,27 +15,117 @@
|
||||
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: bloque: inicializa el b\u00fafer de integridad a cero antes de escribirlo en el medio. Los metadatos agregados por bio_integrity_prep utilizan kmalloc simple, lo que lleva a que la memoria del kernel se escriba en el medio de forma aleatoria. Para los metadatos de PI, esto se limita a la etiqueta de la aplicaci\u00f3n que no es utilizada por los metadatos generados por el kernel, pero para los metadatos que no son de PI, todo el b\u00fafer pierde memoria del kernel. Solucione este problema agregando el indicador __GFP_ZERO a las asignaciones para escrituras."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-401"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2.6.27",
|
||||
"versionEndExcluding": "5.15.165",
|
||||
"matchCriteriaId": "281A9189-26A2-46A1-ABED-BB34ABC26FDD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "6.1.103",
|
||||
"matchCriteriaId": "E45EAC72-8329-4F99-8276-86AF9BB3496A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2",
|
||||
"versionEndExcluding": "6.6.44",
|
||||
"matchCriteriaId": "CC912330-6B41-4C6B-99AF-F3857FBACB6A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.10.3",
|
||||
"matchCriteriaId": "92D388F2-1EAF-4CFA-AC06-5B26D762EA7D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/23a19655fb56f241e592041156dfb1c6d04da644",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/899ee2c3829c5ac14bfc7d3c4a5846c0b709b78f",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/cf6b45ea7a8df0f61bded1dc4a8561ac6ad143d2",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/d418313bd8f55c079a7da12651951b489a638ac1",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/ebc0e91ba76dc6544fff9f5b66408b1982806a00",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-45192",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-22T16:15:10.237",
|
||||
"lastModified": "2024-08-22T16:15:10.237",
|
||||
"lastModified": "2024-08-22T19:35:40.953",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [
|
||||
{
|
||||
@ -18,7 +18,42 @@
|
||||
"value": "An issue was discovered in Matrix libolm (aka Olm) through 3.2.16. Cache-timing attacks can occur due to use of base64 when decoding group session keys. NOTE: This vulnerability only affects products that are no longer supported by the maintainer."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-385"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitlab.matrix.org/matrix-org/olm/",
|
||||
|
100
CVE-2024/CVE-2024-76xx/CVE-2024-7634.json
Normal file
100
CVE-2024/CVE-2024-76xx/CVE-2024-7634.json
Normal file
@ -0,0 +1,100 @@
|
||||
{
|
||||
"id": "CVE-2024-7634",
|
||||
"sourceIdentifier": "f5sirt@f5.com",
|
||||
"published": "2024-08-22T18:15:10.553",
|
||||
"lastModified": "2024-08-22T18:15:10.553",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NGINX Agent's \"config_dirs\" restriction feature allows a highly privileged attacker to gain the ability to write/overwrite files outside of the designated secure directory."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "f5sirt@f5.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "NONE",
|
||||
"vulnerableSystemIntegrity": "HIGH",
|
||||
"vulnerableSystemAvailability": "NONE",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 6.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "f5sirt@f5.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "f5sirt@f5.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://my.f5.com/manage/s/article/K000140630",
|
||||
"source": "f5sirt@f5.com"
|
||||
}
|
||||
]
|
||||
}
|
120
CVE-2024/CVE-2024-80xx/CVE-2024-8088.json
Normal file
120
CVE-2024/CVE-2024-80xx/CVE-2024-8088.json
Normal file
@ -0,0 +1,120 @@
|
||||
{
|
||||
"id": "CVE-2024-8088",
|
||||
"sourceIdentifier": "cna@python.org",
|
||||
"published": "2024-08-22T19:15:09.720",
|
||||
"lastModified": "2024-08-22T19:15:09.720",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "There is a HIGH severity vulnerability affecting the CPython \"zipfile\"\nmodule.\n\n\n\n\n\nWhen iterating over names of entries in a zip archive (for example, methods\nof \"zipfile.ZipFile\" like \"namelist()\", \"iterdir()\", \"extractall()\", etc)\nthe process can be put into an infinite loop with a maliciously crafted\nzip archive. This defect applies when reading only metadata or extracting\nthe contents of the zip archive. Programs that are not handling\nuser-controlled zip archives are not affected."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@python.org",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:N/R:U/V:X/RE:L/U:X",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "NONE",
|
||||
"vulnerableSystemIntegrity": "NONE",
|
||||
"vulnerableSystemAvailability": "HIGH",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NEGLIGIBLE",
|
||||
"automatable": "NO",
|
||||
"recovery": "USER",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "LOW",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 8.7,
|
||||
"baseSeverity": "HIGH"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@python.org",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@python.org",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-835"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/python/cpython/commit/795f2597a4be988e2bb19b69ff9958e981cb894e",
|
||||
"source": "cna@python.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/python/cpython/commit/8c7348939d8a3ecd79d630075f6be1b0c5b41f64",
|
||||
"source": "cna@python.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/python/cpython/commit/dcc5182f27c1500006a1ef78e10613bb45788dea",
|
||||
"source": "cna@python.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/python/cpython/issues/122905",
|
||||
"source": "cna@python.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/python/cpython/pull/122906",
|
||||
"source": "cna@python.org"
|
||||
},
|
||||
{
|
||||
"url": "https://mail.python.org/archives/list/security-announce@python.org/thread/GNFCKVI4TCATKQLALJ5SN4L4CSPSMILU/",
|
||||
"source": "cna@python.org"
|
||||
}
|
||||
]
|
||||
}
|
86
README.md
86
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-08-22T18:00:17.400296+00:00
|
||||
2024-08-22T20:00:18.271897+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-08-22T17:57:08.640000+00:00
|
||||
2024-08-22T19:35:40.953000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,65 +33,49 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
260964
|
||||
260969
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `21`
|
||||
Recently added CVEs: `5`
|
||||
|
||||
- [CVE-2023-6452](CVE-2023/CVE-2023-64xx/CVE-2023-6452.json) (`2024-08-22T16:15:07.997`)
|
||||
- [CVE-2024-3127](CVE-2024/CVE-2024-31xx/CVE-2024-3127.json) (`2024-08-22T16:15:08.590`)
|
||||
- [CVE-2024-36441](CVE-2024/CVE-2024-364xx/CVE-2024-36441.json) (`2024-08-22T16:15:08.433`)
|
||||
- [CVE-2024-40884](CVE-2024/CVE-2024-408xx/CVE-2024-40884.json) (`2024-08-22T16:15:08.797`)
|
||||
- [CVE-2024-42490](CVE-2024/CVE-2024-424xx/CVE-2024-42490.json) (`2024-08-22T16:15:09.117`)
|
||||
- [CVE-2024-42497](CVE-2024/CVE-2024-424xx/CVE-2024-42497.json) (`2024-08-22T16:15:09.330`)
|
||||
- [CVE-2024-42768](CVE-2024/CVE-2024-427xx/CVE-2024-42768.json) (`2024-08-22T17:15:05.693`)
|
||||
- [CVE-2024-42769](CVE-2024/CVE-2024-427xx/CVE-2024-42769.json) (`2024-08-22T16:15:09.553`)
|
||||
- [CVE-2024-42770](CVE-2024/CVE-2024-427xx/CVE-2024-42770.json) (`2024-08-22T16:15:09.640`)
|
||||
- [CVE-2024-42771](CVE-2024/CVE-2024-427xx/CVE-2024-42771.json) (`2024-08-22T16:15:09.730`)
|
||||
- [CVE-2024-42772](CVE-2024/CVE-2024-427xx/CVE-2024-42772.json) (`2024-08-22T17:15:06.070`)
|
||||
- [CVE-2024-42774](CVE-2024/CVE-2024-427xx/CVE-2024-42774.json) (`2024-08-22T17:15:06.350`)
|
||||
- [CVE-2024-42775](CVE-2024/CVE-2024-427xx/CVE-2024-42775.json) (`2024-08-22T17:15:06.580`)
|
||||
- [CVE-2024-42776](CVE-2024/CVE-2024-427xx/CVE-2024-42776.json) (`2024-08-22T17:15:06.807`)
|
||||
- [CVE-2024-43780](CVE-2024/CVE-2024-437xx/CVE-2024-43780.json) (`2024-08-22T16:15:09.897`)
|
||||
- [CVE-2024-45191](CVE-2024/CVE-2024-451xx/CVE-2024-45191.json) (`2024-08-22T16:15:10.120`)
|
||||
- [CVE-2024-45192](CVE-2024/CVE-2024-451xx/CVE-2024-45192.json) (`2024-08-22T16:15:10.237`)
|
||||
- [CVE-2024-45193](CVE-2024/CVE-2024-451xx/CVE-2024-45193.json) (`2024-08-22T16:15:10.300`)
|
||||
- [CVE-2024-6502](CVE-2024/CVE-2024-65xx/CVE-2024-6502.json) (`2024-08-22T16:15:10.377`)
|
||||
- [CVE-2024-7110](CVE-2024/CVE-2024-71xx/CVE-2024-7110.json) (`2024-08-22T16:15:10.627`)
|
||||
- [CVE-2024-8041](CVE-2024/CVE-2024-80xx/CVE-2024-8041.json) (`2024-08-22T16:15:10.880`)
|
||||
- [CVE-2024-39717](CVE-2024/CVE-2024-397xx/CVE-2024-39717.json) (`2024-08-22T19:15:09.173`)
|
||||
- [CVE-2024-42767](CVE-2024/CVE-2024-427xx/CVE-2024-42767.json) (`2024-08-22T18:15:10.280`)
|
||||
- [CVE-2024-42773](CVE-2024/CVE-2024-427xx/CVE-2024-42773.json) (`2024-08-22T18:15:10.367`)
|
||||
- [CVE-2024-7634](CVE-2024/CVE-2024-76xx/CVE-2024-7634.json) (`2024-08-22T18:15:10.553`)
|
||||
- [CVE-2024-8088](CVE-2024/CVE-2024-80xx/CVE-2024-8088.json) (`2024-08-22T19:15:09.720`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `45`
|
||||
Recently modified CVEs: `65`
|
||||
|
||||
- [CVE-2024-42778](CVE-2024/CVE-2024-427xx/CVE-2024-42778.json) (`2024-08-22T17:46:56.953`)
|
||||
- [CVE-2024-42783](CVE-2024/CVE-2024-427xx/CVE-2024-42783.json) (`2024-08-22T17:35:07.750`)
|
||||
- [CVE-2024-43033](CVE-2024/CVE-2024-430xx/CVE-2024-43033.json) (`2024-08-22T16:35:08.663`)
|
||||
- [CVE-2024-43855](CVE-2024/CVE-2024-438xx/CVE-2024-43855.json) (`2024-08-22T17:48:09.100`)
|
||||
- [CVE-2024-43856](CVE-2024/CVE-2024-438xx/CVE-2024-43856.json) (`2024-08-22T17:57:08.640`)
|
||||
- [CVE-2024-43857](CVE-2024/CVE-2024-438xx/CVE-2024-43857.json) (`2024-08-22T17:38:21.003`)
|
||||
- [CVE-2024-43858](CVE-2024/CVE-2024-438xx/CVE-2024-43858.json) (`2024-08-22T17:40:11.663`)
|
||||
- [CVE-2024-43859](CVE-2024/CVE-2024-438xx/CVE-2024-43859.json) (`2024-08-22T17:28:28.490`)
|
||||
- [CVE-2024-43860](CVE-2024/CVE-2024-438xx/CVE-2024-43860.json) (`2024-08-22T17:08:15.097`)
|
||||
- [CVE-2024-5554](CVE-2024/CVE-2024-55xx/CVE-2024-5554.json) (`2024-08-22T16:43:52.650`)
|
||||
- [CVE-2024-5555](CVE-2024/CVE-2024-55xx/CVE-2024-5555.json) (`2024-08-22T16:46:14.177`)
|
||||
- [CVE-2024-6164](CVE-2024/CVE-2024-61xx/CVE-2024-6164.json) (`2024-08-22T16:35:18.693`)
|
||||
- [CVE-2024-7964](CVE-2024/CVE-2024-79xx/CVE-2024-7964.json) (`2024-08-22T17:44:47.560`)
|
||||
- [CVE-2024-7966](CVE-2024/CVE-2024-79xx/CVE-2024-7966.json) (`2024-08-22T17:44:11.147`)
|
||||
- [CVE-2024-7968](CVE-2024/CVE-2024-79xx/CVE-2024-7968.json) (`2024-08-22T17:41:56.847`)
|
||||
- [CVE-2024-7969](CVE-2024/CVE-2024-79xx/CVE-2024-7969.json) (`2024-08-22T17:42:47.627`)
|
||||
- [CVE-2024-7974](CVE-2024/CVE-2024-79xx/CVE-2024-7974.json) (`2024-08-22T17:40:27.950`)
|
||||
- [CVE-2024-7975](CVE-2024/CVE-2024-79xx/CVE-2024-7975.json) (`2024-08-22T17:40:09.223`)
|
||||
- [CVE-2024-7976](CVE-2024/CVE-2024-79xx/CVE-2024-7976.json) (`2024-08-22T17:39:54.540`)
|
||||
- [CVE-2024-7977](CVE-2024/CVE-2024-79xx/CVE-2024-7977.json) (`2024-08-22T17:39:32.730`)
|
||||
- [CVE-2024-7978](CVE-2024/CVE-2024-79xx/CVE-2024-7978.json) (`2024-08-22T17:38:11.200`)
|
||||
- [CVE-2024-7981](CVE-2024/CVE-2024-79xx/CVE-2024-7981.json) (`2024-08-22T17:36:24.803`)
|
||||
- [CVE-2024-8033](CVE-2024/CVE-2024-80xx/CVE-2024-8033.json) (`2024-08-22T17:36:07.673`)
|
||||
- [CVE-2024-8034](CVE-2024/CVE-2024-80xx/CVE-2024-8034.json) (`2024-08-22T17:35:30.003`)
|
||||
- [CVE-2024-8035](CVE-2024/CVE-2024-80xx/CVE-2024-8035.json) (`2024-08-22T17:33:37.407`)
|
||||
- [CVE-2024-34527](CVE-2024/CVE-2024-345xx/CVE-2024-34527.json) (`2024-08-22T18:35:09.990`)
|
||||
- [CVE-2024-35469](CVE-2024/CVE-2024-354xx/CVE-2024-35469.json) (`2024-08-22T19:35:28.953`)
|
||||
- [CVE-2024-3566](CVE-2024/CVE-2024-35xx/CVE-2024-3566.json) (`2024-08-22T19:35:35.700`)
|
||||
- [CVE-2024-36439](CVE-2024/CVE-2024-364xx/CVE-2024-36439.json) (`2024-08-22T18:35:12.120`)
|
||||
- [CVE-2024-36441](CVE-2024/CVE-2024-364xx/CVE-2024-36441.json) (`2024-08-22T19:35:29.793`)
|
||||
- [CVE-2024-36443](CVE-2024/CVE-2024-364xx/CVE-2024-36443.json) (`2024-08-22T19:35:30.730`)
|
||||
- [CVE-2024-36580](CVE-2024/CVE-2024-365xx/CVE-2024-36580.json) (`2024-08-22T19:35:31.613`)
|
||||
- [CVE-2024-36773](CVE-2024/CVE-2024-367xx/CVE-2024-36773.json) (`2024-08-22T19:35:32.557`)
|
||||
- [CVE-2024-36811](CVE-2024/CVE-2024-368xx/CVE-2024-36811.json) (`2024-08-22T18:35:13.753`)
|
||||
- [CVE-2024-36843](CVE-2024/CVE-2024-368xx/CVE-2024-36843.json) (`2024-08-22T18:35:15.457`)
|
||||
- [CVE-2024-36856](CVE-2024/CVE-2024-368xx/CVE-2024-36856.json) (`2024-08-22T19:35:33.427`)
|
||||
- [CVE-2024-37066](CVE-2024/CVE-2024-370xx/CVE-2024-37066.json) (`2024-08-22T18:22:47.927`)
|
||||
- [CVE-2024-39211](CVE-2024/CVE-2024-392xx/CVE-2024-39211.json) (`2024-08-22T19:35:34.747`)
|
||||
- [CVE-2024-40347](CVE-2024/CVE-2024-403xx/CVE-2024-40347.json) (`2024-08-22T18:37:49.850`)
|
||||
- [CVE-2024-40535](CVE-2024/CVE-2024-405xx/CVE-2024-40535.json) (`2024-08-22T19:35:35.893`)
|
||||
- [CVE-2024-41599](CVE-2024/CVE-2024-415xx/CVE-2024-41599.json) (`2024-08-22T18:27:45.397`)
|
||||
- [CVE-2024-41600](CVE-2024/CVE-2024-416xx/CVE-2024-41600.json) (`2024-08-22T18:27:15.310`)
|
||||
- [CVE-2024-42598](CVE-2024/CVE-2024-425xx/CVE-2024-42598.json) (`2024-08-22T18:15:10.187`)
|
||||
- [CVE-2024-42768](CVE-2024/CVE-2024-427xx/CVE-2024-42768.json) (`2024-08-22T18:35:16.727`)
|
||||
- [CVE-2024-42769](CVE-2024/CVE-2024-427xx/CVE-2024-42769.json) (`2024-08-22T19:35:37.830`)
|
||||
- [CVE-2024-42772](CVE-2024/CVE-2024-427xx/CVE-2024-42772.json) (`2024-08-22T19:35:38.793`)
|
||||
- [CVE-2024-42780](CVE-2024/CVE-2024-427xx/CVE-2024-42780.json) (`2024-08-22T19:35:39.710`)
|
||||
- [CVE-2024-43853](CVE-2024/CVE-2024-438xx/CVE-2024-43853.json) (`2024-08-22T18:06:38.087`)
|
||||
- [CVE-2024-43854](CVE-2024/CVE-2024-438xx/CVE-2024-43854.json) (`2024-08-22T18:12:28.620`)
|
||||
- [CVE-2024-45192](CVE-2024/CVE-2024-451xx/CVE-2024-45192.json) (`2024-08-22T19:35:40.953`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
255
_state.csv
255
_state.csv
@ -153303,7 +153303,7 @@ CVE-2020-22524,0,0,3963018bd375efbb104317019440f969cb986995a7cd6c3fe6c16a8a1b9da
|
||||
CVE-2020-2253,0,0,6c05875bf0d2370ea4760b0be37855dec09deb871bbe2ec77d0ed51932a51534,2023-10-25T18:16:39.320000
|
||||
CVE-2020-22533,0,0,8cf73333b4ebcde6d608738a7182e3a0c8935887ec73faac29a965d055d3ea73,2023-04-10T19:17:46.887000
|
||||
CVE-2020-22535,0,0,3d39b81bb0c64f73d36642872de8b40a5e64321679c1a0ef90beeaf09e6bae1a,2021-07-13T18:58:42.140000
|
||||
CVE-2020-22539,0,0,2fa294f006ff885bb08e36ac096349c9826e6e384a4e9a2931bbb230307a235a,2024-04-16T13:24:07.103000
|
||||
CVE-2020-22539,0,1,15bbe4ba3bc7be73f3da6475e511295156ebfd2ea390b950930b64bf8492d8d8,2024-08-22T19:35:00.877000
|
||||
CVE-2020-2254,0,0,e7830526f9ccb1eacc81ed0b7e7bba867a9db0d3b245b1c38b997be50037937f,2023-10-25T18:16:39.377000
|
||||
CVE-2020-22540,0,0,376647c49c1c6bd480053c09b9a209b442662340e7faa02a7740de4fbd0b2879,2024-04-16T13:24:07.103000
|
||||
CVE-2020-2255,0,0,38e94953c094aa7fe06618634ee9c7f217363a9813b7dc4898775e41721a0fda,2023-10-25T18:16:39.430000
|
||||
@ -194042,7 +194042,7 @@ CVE-2022-25029,0,0,4f5ebeabd557699e2691548f246212aabc28faeeb68ba1ce26e296cf83025
|
||||
CVE-2022-2503,0,0,e5d7de9bb954e10ce8ff1af61305cc8d604d34179c029b7c85941e33c8645199,2023-02-14T13:15:10.920000
|
||||
CVE-2022-25031,0,0,11831fe23c98bb2f83d36e26fa6d73b5b7ef122b13991d3c195134577b498c6d,2022-03-09T20:09:58.927000
|
||||
CVE-2022-25037,0,0,b2ed585030daabbb7d96476f093899a863967f803d3459702d41efdc72314dc6,2024-08-19T19:35:02.193000
|
||||
CVE-2022-25038,0,0,d4ef5d26ced29c463b76ab9e49c88e159235454bb783bae2b05d2fe11de9ef7a,2024-05-31T19:14:47.793000
|
||||
CVE-2022-25038,0,1,6bbcf5f0263481ae60f4fbb572b5749eaac36bd2e533bf005101ca5448d9ad88,2024-08-22T19:35:03.130000
|
||||
CVE-2022-2504,0,0,fc0576f3b04bc0215c64e8eac32767b7e3e92fc531faaaa3da38a353d2a8f3bc,2023-11-07T03:46:37.600000
|
||||
CVE-2022-25041,0,0,c7230f4463dec3a15269bd0ce972ed91cee22d14918683d272cd1954c5e8fc4e,2022-03-29T13:50:33.407000
|
||||
CVE-2022-25044,0,0,04a774b0ed7f50c45cfbfcc56f7a8d205c4448d23d2248f0cfc9ee2ba6a7d6c1,2022-03-11T15:58:29.333000
|
||||
@ -212448,15 +212448,15 @@ CVE-2022-48932,0,0,e4da3a55bf16cb7e74c7fb3bdbf52444ea58790de72cae46bb81b25a337bf
|
||||
CVE-2022-48933,0,0,6a98e8528fd6b1faa8c76a7aef7cb8ac273ef9526f460ba641654c0c398c5fd5,2024-08-22T12:48:02.790000
|
||||
CVE-2022-48934,0,0,0b176a681e7d2610694041d871f000280fa9228e1a2f8f6acd92de8a95952120,2024-08-22T12:48:02.790000
|
||||
CVE-2022-48935,0,0,5ae5db22ff9f7dee996037e977140fbd043608ec34a821cc0dbd24ce26c41bcd,2024-08-22T12:48:02.790000
|
||||
CVE-2022-48936,0,0,e5e6490031bd8ea6058d99325de9d6a29afe230573f54734a35addab474fa07c,2024-08-22T12:48:02.790000
|
||||
CVE-2022-48937,0,0,98eb258fb5480a0a64ad578f4d7d0745fa4dca07cb91f4b45bfd63f9aff98e4e,2024-08-22T12:48:02.790000
|
||||
CVE-2022-48938,0,0,966938e7530b15ebcc13eb90d4c2c84b75d163c5cb28b3caf3980b5de4d95ca5,2024-08-22T12:48:02.790000
|
||||
CVE-2022-48939,0,0,d87216561f7a780dc797ba3a4cd412fbc9fe7377390bfa15f8570e808e36ecb7,2024-08-22T12:48:02.790000
|
||||
CVE-2022-48936,0,1,36ac70219cd8aef6a8970544481442eac16b9c0cd068921aa64078a27ffc7215,2024-08-22T19:03:59.643000
|
||||
CVE-2022-48937,0,1,5acf0c5064ef79bcf25c1dae2675f0433d0999928e6f36ce64d5e6c9907aa5b9,2024-08-22T19:07:28.567000
|
||||
CVE-2022-48938,0,1,eff2e9fbfc7aa611d20c84d8b3736eb4c859583a2ca7af1dd4c15351c5551139,2024-08-22T18:49:20.320000
|
||||
CVE-2022-48939,0,1,171710b03fe72b0b5576806a870449655b0f9165fe85d09b9d9bd74ca80174f4,2024-08-22T19:02:08.770000
|
||||
CVE-2022-4894,0,0,c3227cd516d71db144057b054e28013337d055a6a605d8987216a7774f3ac9b7,2023-08-23T15:29:31.687000
|
||||
CVE-2022-48940,0,0,6c2232d064008b51de41e3883361ae471cfa4d2baa265f94b3c9f5e081cb809f,2024-08-22T12:48:02.790000
|
||||
CVE-2022-48941,0,0,7c688a7c244fb68615ed7d5d279e538ad5249bed2a7dc9d2630d8d33ed1bdedb,2024-08-22T12:48:02.790000
|
||||
CVE-2022-48942,0,0,a81a7889c84bb2f83037b09e273a2b372457cf8542aa9c966659f5b1dd1186d9,2024-08-22T12:48:02.790000
|
||||
CVE-2022-48943,0,0,d7eecc45f74def44aad3b02137059c63161b61532700973d2208c6f9f55014f2,2024-08-22T12:48:02.790000
|
||||
CVE-2022-48940,0,1,6f15a6b4fa7f43e99852715a17fcd420a06e24b0776b09d707d9bdb81ddea902,2024-08-22T18:37:46.133000
|
||||
CVE-2022-48941,0,1,723bbba9bcccbd20edb366905d194ad938e20cb00b782a5e655658df54707693,2024-08-22T18:41:37.090000
|
||||
CVE-2022-48942,0,1,2cf46354691478839d2223efa2eaa869b06a9729fd72ecdcbb1c9e9660f0aaa9,2024-08-22T18:25:14.867000
|
||||
CVE-2022-48943,0,1,a7018e1dbe7c5677e235ba4ed082a73fce76282052204bd38ca850f621dffe72,2024-08-22T18:27:42.807000
|
||||
CVE-2022-4895,0,0,0efd54174b680d04b5646c623fd6b294801b419a72088921312b45e7bb6c068f,2023-11-07T03:59:15.667000
|
||||
CVE-2022-4896,0,0,04cb60ab8732a1bfba8bf7d8a4df08b8371cdecc380fd455d1b928e8213822e1,2023-09-15T15:18:10.843000
|
||||
CVE-2022-4897,0,0,0a243664793293bb535173693d8b2bb850e8caf27eb71e5f98003bf4c293392a,2023-11-07T03:59:15.853000
|
||||
@ -231000,7 +231000,7 @@ CVE-2023-41095,0,0,deee64e9e520cbd28974f4c3c1b7d02b2c55b60ea677ddead3af0482dd0a7
|
||||
CVE-2023-41096,0,0,52af64b05366a4d43b15642ba40df6e1ae8efc25c5fe20f7a4ec7b8ffa1abd9b,2023-11-08T01:48:37.717000
|
||||
CVE-2023-41097,0,0,225555e7a96923a582ba79f8ccb5c9ee9b827759fb76ff6066b045a3ae73653f,2024-01-03T17:22:03.797000
|
||||
CVE-2023-41098,0,0,1877421a99644398c5448d161e47d1b4f3f34d4c0be4875e9313e545e2d53226,2023-08-28T21:21:37.023000
|
||||
CVE-2023-41099,0,1,c541702f1a2a5937b975af12a4eb88323b5abfddc3ba442a1352acbd4bacb37f,2024-08-22T17:35:00.720000
|
||||
CVE-2023-41099,0,0,c541702f1a2a5937b975af12a4eb88323b5abfddc3ba442a1352acbd4bacb37f,2024-08-22T17:35:00.720000
|
||||
CVE-2023-4110,0,0,6f05564b88d67a4e37f9507e8115c927563bedfea67f2dfdbc398b9ca9e94615,2024-05-17T02:31:19.523000
|
||||
CVE-2023-41100,0,0,30bd0525f09b3bfd34e6442c925dd2b383c4cc7432aca6eb1c6a3f586f5f0285,2023-08-28T21:27:36.420000
|
||||
CVE-2023-41101,0,0,9d279aed31c2d0df402abd3646c8e0c3d11b0759d2e721ed53b35ef8b2562b81,2024-06-20T18:15:11.237000
|
||||
@ -233018,7 +233018,7 @@ CVE-2023-43959,0,0,3e0508b282ce13b7ab31b65b36da1089fb9bc1c29185cb09f3c4226ee594b
|
||||
CVE-2023-43960,0,0,9436258b0be27800fafff316b46719607100f02382a5925bda03f182056bac68,2023-11-07T04:21:32.280000
|
||||
CVE-2023-43961,0,0,d022a1326b47938450ca513431def271a90d142825dd394edf75f3be724de0cc,2023-11-01T16:16:14.943000
|
||||
CVE-2023-4397,0,0,806c05c57b1f10660e4c63dcf9d9a34cfadf8928a75c42c7a5c8fcfbece74dfc,2023-12-04T18:05:04.100000
|
||||
CVE-2023-43971,0,1,c2064ebdbad348b085d6e18a3454b611e7eca0a799a8c6b1b26378d9c5f74d47,2024-08-22T16:20:20.413000
|
||||
CVE-2023-43971,0,0,c2064ebdbad348b085d6e18a3454b611e7eca0a799a8c6b1b26378d9c5f74d47,2024-08-22T16:20:20.413000
|
||||
CVE-2023-43976,0,0,02187eddeb3770a7f1febec00624360ee5250e93dc31f3e8b51b3ba1d9bb4442,2023-10-05T15:17:11.293000
|
||||
CVE-2023-43979,0,0,b42ecb5c3472ee75481a81f4bcc721f9df20b88fcd306940b556920c1fd7490b,2023-11-21T14:07:31.363000
|
||||
CVE-2023-4398,0,0,941805a464290ceda704bc08a9de74a80348460471c7271929b1e2e9a230208e,2023-12-04T18:04:39.363000
|
||||
@ -234349,7 +234349,7 @@ CVE-2023-46040,0,0,6eff75a2812c317a80847f611adb0ea2b165227205b9790d775b06619e979
|
||||
CVE-2023-46042,0,0,b6d495a936dc07be63ad36740d8e9766ee2bd3ae6c4a8ef73b985512f02df521,2023-10-25T15:20:17.570000
|
||||
CVE-2023-46045,0,0,0e8abce2cbeee2bf608426602c7398443e9d61c9d45f545bf4f725e8132500eb,2024-03-21T02:49:19.427000
|
||||
CVE-2023-46046,0,0,3bc45ec9592baeab7ef720efeac1a7d65f4f02d8606730aa13f5baaa81584553,2024-08-02T21:15:48.963000
|
||||
CVE-2023-46047,0,0,f5c37c94ca5fa594b714e2ffca7c2bdc6f46a8bdd28b18487a40447ff0803b85,2024-08-02T21:15:49.040000
|
||||
CVE-2023-46047,0,1,c24e10e557ef6edbf0ab7d162e7557ecb1baed06f8bacef6ed95114dbb222d99,2024-08-22T18:35:01.467000
|
||||
CVE-2023-46048,0,0,fdc0cbd47578c151a3373264bac42e14fbe5938d1d4d2542c8c29ee6e1717908,2024-08-19T19:35:04.860000
|
||||
CVE-2023-46049,0,0,2315016d1ba4bba7f533371cd70ec259060eaeb7a90fd1662a78c0e2eff24ad7,2024-08-02T21:15:49.197000
|
||||
CVE-2023-4605,0,0,4ca1198891ef7f19a4427afe916541ae6cc98eedaf95349b4181266b8438d380,2024-04-08T18:49:25.863000
|
||||
@ -234562,7 +234562,7 @@ CVE-2023-4629,0,0,a2da5926fb0fca7bbafeced6fa322c009d8e911a79a6b6bf7f38a2a5e0ea6e
|
||||
CVE-2023-46290,0,0,27e5ae817a0021378c38e4fd99f2c228169bd8f39b57bf0a325b209cd30c76ea,2023-11-07T19:09:56.033000
|
||||
CVE-2023-46294,0,0,5aebe5d15d21a3c99db9d0aa22d1effedd56a960f93e5caf38568b64d0bdb4c0,2024-05-02T13:27:25.103000
|
||||
CVE-2023-46295,0,0,b15972e98a1950e4d4a3b9eb508002e3a9685d0bb1eed8df111f8eb853e8c9e0,2024-07-03T01:42:00.680000
|
||||
CVE-2023-46297,0,0,217f47ac4249495c7d5f5b500faeed7856fda49b0db87e1875ce7c2658fe3264,2024-05-29T19:50:25.303000
|
||||
CVE-2023-46297,0,1,36ec00ece79ff59f1f7e8a89df1d401e3ccfe69b828e4f08f1bead640ad02eba,2024-08-22T19:35:05.647000
|
||||
CVE-2023-46298,0,0,11fb6fb4012be55616d4ed607b07d97f1217c6cccf4f89f567489addcccf54b4,2023-10-28T03:30:11.740000
|
||||
CVE-2023-4630,0,0,84642586247351fd243a36a028f47b98bdbaebb8bb9393939811b558e3daca7b,2023-09-13T16:50:23.250000
|
||||
CVE-2023-46300,0,0,ef50ba7da8805e453a397a1a5d11a994fcd6ff305d395f739cf3f9017964b18d,2023-10-31T17:08:50.757000
|
||||
@ -234665,7 +234665,7 @@ CVE-2023-46427,0,0,f866f9e54a1652715d6c8d5cf0ab85e5d06c714508a8f7e5c787c0848377e
|
||||
CVE-2023-46428,0,0,faa78dcade98f2a1e124d91c90afd9b9a200a5dd262391aece6b2b8f2e67c134,2023-11-06T19:30:17.810000
|
||||
CVE-2023-4643,0,0,f6caf5740564746f31d2fc7731a7738c5a9fdb65fac1d028210c31eb8a3076a3,2023-11-07T04:22:48.657000
|
||||
CVE-2023-46435,0,0,9045d4cee8109ec2b6ac83ee0b4dc133557afb03e66020489ecea163a3631054,2023-10-30T16:20:21.103000
|
||||
CVE-2023-46442,0,0,b3f699fa0a17a25444e4e48f3449cd5a23068de1a7b2896891c354ac1a68a9d1,2024-05-24T18:09:20.027000
|
||||
CVE-2023-46442,0,1,9293faa2d8956aa4f30804364065a1b1e61ee21acf16953213f0ca472daec3be,2024-08-22T19:35:06.600000
|
||||
CVE-2023-46445,0,0,d30b7a69d534d58879daef0d8df2b1cc94af49180044c8b573c6dff1e56b4fe0,2023-12-22T20:15:07.270000
|
||||
CVE-2023-46446,0,0,8947e039d91da74ea0d8abe1c8e929f5ba6d7ec6e059b8fabb66ab2753cd716c,2023-12-22T20:15:07.367000
|
||||
CVE-2023-46447,0,0,3399247934a925d1a22abe563fd15983a03e402beebeab4d93fc81ab8bf7b896,2024-01-29T15:27:03.267000
|
||||
@ -237194,9 +237194,9 @@ CVE-2023-49959,0,0,88693f11e9749c7b6e276c7f9d19f715b73a4f2009b695830855f5158498f
|
||||
CVE-2023-4996,0,0,6a96837fcca1d7deaa6aa589d92a14b4327d14c87ed64a80dfeb3367527137a1,2023-11-14T17:04:04.747000
|
||||
CVE-2023-49960,0,0,0e9ad95596e6a050966eeae850b05c374feaaec388768a0ded233d222e3ddb12,2024-08-01T13:45:17.753000
|
||||
CVE-2023-49961,0,0,fe18aca8b440f329c1d528d19a34369d87e6c8005ab3d538fd1c3f47cafa72b1,2024-01-12T16:13:48.350000
|
||||
CVE-2023-49963,0,0,cc3a77502e77d00f9c20011e97a97957573a6f8abb51b75925791cafed3f9e9f,2024-04-19T18:29:53.040000
|
||||
CVE-2023-49963,0,1,1834205893b0a4ca865a9ef7e3a83b265bbd7d92cfe069a1f2dd2fa040d59a3c,2024-08-22T19:35:07.550000
|
||||
CVE-2023-49964,0,0,4a201f112134a3d6cf6021d5b91032c58a31552b69366b1a2d0998d8e981118b,2023-12-14T14:36:17.293000
|
||||
CVE-2023-49965,0,0,e0d8a82e98c6c9a3815ede421319b87954864ded3456793693be862d41bc33bc,2024-04-08T18:49:25.863000
|
||||
CVE-2023-49965,0,1,48e6b3e821ed6e4ac6e7c9a1268066cbff076d429495b607839693844fd16bcd,2024-08-22T18:35:03.353000
|
||||
CVE-2023-49967,0,0,747a56ed33b32c4d1b311fdebeb305be64d8bfa851a5ebfe9be1ea5d7affb098,2023-12-09T04:48:27.967000
|
||||
CVE-2023-49968,0,0,443b0a12900df986124c3c0058d5658df13e1f540049ddc612a4f43f44d6cfc3,2024-03-05T13:41:01.900000
|
||||
CVE-2023-49969,0,0,469876939b4b9f9c3637cadc1ea51d82fbf4e880cd6bad43cc5c9ae371564219,2024-08-01T13:45:18.787000
|
||||
@ -237255,7 +237255,7 @@ CVE-2023-5005,0,0,745cb1ab76d83a3107371edfdd319096e1b6d1d025dbda4b9d241b022cb918
|
||||
CVE-2023-50053,0,0,9b450f039e219e8c0dc6b5319645fc133cad473316e16f22c0a481e9974339ce,2024-08-01T13:45:22.157000
|
||||
CVE-2023-50059,0,0,c672df92e602de468d6a10dde3ef7658749e2af6fdb872b8bc56a5b1138f8560,2024-04-30T19:35:36.960000
|
||||
CVE-2023-5006,0,0,21d14cc4876f8cc1a801d8b8c70a50bf2886311fb727493df0ced96b6e0ba142,2024-01-24T17:16:48.267000
|
||||
CVE-2023-50061,0,0,b1e3995dc3fd0fc7fe136f60cffc40dccfe3ce4602a59d160c32d5355319e83f,2024-02-15T05:02:52.427000
|
||||
CVE-2023-50061,0,1,233fe17f839b0e8ef7a1099d37a8dbf5d9b685d75def71772f132a905686000f,2024-08-22T19:35:08.363000
|
||||
CVE-2023-50069,0,0,d5b56f504dfc9456d663c793e6af0eeee24a43c49c91c208a5bdce7a8736c014,2024-01-05T23:08:29.450000
|
||||
CVE-2023-5007,0,0,2c3a0305698c7d0eb69e8429d362775d9108864cd5873643c1bb4add99591ed5,2023-12-26T21:32:57.167000
|
||||
CVE-2023-50070,0,0,4c0e0b3a6a619999bf7c4d96a134f8e5b7b9f9c028a8642d016e18163d586de9,2024-01-05T19:45:20.357000
|
||||
@ -238579,7 +238579,7 @@ CVE-2023-5215,0,0,076f3ad4d1737a363373e0b80c210de679a7c69cccbb36b095edcc1c654cb5
|
||||
CVE-2023-52150,0,0,d6cc0c17a73b480b712f1be2d69c9c9ac6e0f201ff524861fd68bbcccab1a10f,2024-01-10T19:50:26.923000
|
||||
CVE-2023-52151,0,0,85b7b7f24b04898381709d8e25edbe733fd7631a4f636fe0a6d084fa96bc68a9,2024-01-10T03:59:57.907000
|
||||
CVE-2023-52152,0,0,097fc00b61b252fe2f250d2355f140cbca254720913054490d1cf9f4c7d22fe8,2024-01-05T16:00:51.157000
|
||||
CVE-2023-52153,0,0,ea0183f3a1ad92d7b240ff5fe5fe2b56094367e656ceab2022df017c6ea4585f,2024-02-22T19:07:27.197000
|
||||
CVE-2023-52153,0,1,8610f30de3b3ae26b18922885a0ae2aaa344e98001b8664f3e5b159222943c76,2024-08-22T19:35:09.257000
|
||||
CVE-2023-52154,0,0,3c09d8bbc34bc21301a7ba257cb3ebe4acad4608bcdd31c9c14e3f17024b636a,2024-02-22T19:07:27.197000
|
||||
CVE-2023-52155,0,0,66b2036b8aa4b2b0821aeadedccb952fd85f88f5197038ead7aa814bc9f3095a,2024-08-14T17:35:02.300000
|
||||
CVE-2023-52159,0,0,bec77c293fd7ebf7e62680f3fc4955e6930fe18607be4ec5691592c67d41ceeb,2024-03-25T14:15:09.267000
|
||||
@ -238743,7 +238743,7 @@ CVE-2023-52362,0,0,43adf8e6c64a96c436ca7a8a4039c94bf893e1cb423359d1487ffcd189c40
|
||||
CVE-2023-52363,0,0,99d169dd3c72fa3419e618676e8cf0cd222763ee208d2535052bfc2f7a5e1e20,2024-02-20T19:50:53.960000
|
||||
CVE-2023-52364,0,0,503781f00d75ade91ea9177c8585cd44a5a73fe2baa30f425ba6bec99d44c41c,2024-04-08T18:48:40.217000
|
||||
CVE-2023-52365,0,0,bd1a11d425827e65eed9149e868165cf65bfaf0fcc43e0347175b951fc733d54,2024-02-20T19:50:53.960000
|
||||
CVE-2023-52366,0,0,b417476c5a1740717d6d26dbc75402a3e3e206645941f2568924597b90fc1608,2024-02-20T19:50:53.960000
|
||||
CVE-2023-52366,0,1,237c716036b70fdbe0d981998960891e9cef688cdb85da8994548d5f0d670539,2024-08-22T18:35:04.153000
|
||||
CVE-2023-52367,0,0,059d33a9b5e3c4078b26cbdc15a1861aeba6ae88b6776bd4d8541399245b8c62,2024-07-03T01:43:31.290000
|
||||
CVE-2023-52368,0,0,ab6ff08815d4283a11d94d78d409b6cb80ad558c4d3f1353292c6023cff0808c,2024-02-20T19:50:53.960000
|
||||
CVE-2023-52369,0,0,1047464a4296b31a7cf6f87a7a312b39cc01e8c732edf6ebc4526ed97e7841ad,2024-02-20T19:50:53.960000
|
||||
@ -240372,7 +240372,7 @@ CVE-2023-6448,0,0,f7f271f9b08baff1e70e4a44ec3b05327ba7aad4658ca132cb49aa8e275080
|
||||
CVE-2023-6449,0,0,a7f9c2b5501cdd9fc21a14160551e18f6c2ae8e1d2fbbd505e7a7b32722bbf0e,2023-12-06T20:56:48.923000
|
||||
CVE-2023-6450,0,0,e76b7b0addf647726eba5bc734dd23c4b1f2101780b0fb20f535aa0ca20caeb1,2024-01-26T15:59:00.420000
|
||||
CVE-2023-6451,0,0,f12b562c1c96070fc5e29b85d7db92fde3d7bad88af9e8831d139b62eb69a5b6,2024-02-16T13:37:51.433000
|
||||
CVE-2023-6452,1,1,c5299f185bdb32bda151a9967f902be9f9e61a9d314aad85e6e7a6a1642a9854,2024-08-22T16:15:07.997000
|
||||
CVE-2023-6452,0,0,c5299f185bdb32bda151a9967f902be9f9e61a9d314aad85e6e7a6a1642a9854,2024-08-22T16:15:07.997000
|
||||
CVE-2023-6456,0,0,e46e0d37304e52e0bebade1bd99fe797a2c17dba35b72ee4232c48409ec0198d,2024-01-25T02:02:23.760000
|
||||
CVE-2023-6457,0,0,1d0aafe1ff9d8e5471ee20dcac54ea1ba924bf6cb0d15d7ebecd5192eedea5f7,2024-01-22T21:25:07.550000
|
||||
CVE-2023-6458,0,0,d5ab3aabd050ac001731c9ca925bc1c0303a945e438599593a52c25d763ddeeb,2023-12-12T19:11:36.897000
|
||||
@ -241824,7 +241824,7 @@ CVE-2024-0853,0,0,3c910daae8e71e1ce70b1329a110fcfb56e12ff4cd703e160872830a02778b
|
||||
CVE-2024-0854,0,0,078c838d6b39f270536d9d77e44ca7ffaa60bd2fba9534d52e2f6ab03b587b3d,2024-01-30T17:01:37.127000
|
||||
CVE-2024-0855,0,0,61bb12eb398f3f222f6fe0c4603d214af7ba9f6d4fd218198b137421ef268723,2024-08-08T21:35:01.813000
|
||||
CVE-2024-0856,0,0,cdf686922dc6dc53a8573a4e6d7fe25c3162a97d00eaaeaf4df6f669bee7cf43,2024-08-05T19:35:01.477000
|
||||
CVE-2024-0857,0,1,135b818be9db5d9ae259c8ee8260201b0eed5c0f5f2f59c834f8ec0a79ea8407,2024-08-22T17:23:44.947000
|
||||
CVE-2024-0857,0,0,135b818be9db5d9ae259c8ee8260201b0eed5c0f5f2f59c834f8ec0a79ea8407,2024-08-22T17:23:44.947000
|
||||
CVE-2024-0858,0,0,0cac4e7a1bf81dbbbf49fb45b774f9b9d61dff98c8323a87e06b4f2eb2f216bd,2024-03-18T19:40:00.173000
|
||||
CVE-2024-0859,0,0,ff784ede10a0711bc0887b221fef20123179373dca5468014d5965d599854b96,2024-02-13T19:45:29.770000
|
||||
CVE-2024-0860,0,0,831bd3ec539e95c34edc12f0e20bfc01b276aabb943cb43f0dff12e235110897,2024-03-15T12:53:06.423000
|
||||
@ -242921,7 +242921,7 @@ CVE-2024-20032,0,0,d9f17715cae8cf4f7f490704895224d3c5f8721c9379d158f6d75534a2fbe
|
||||
CVE-2024-20033,0,0,54fbaa24cdc7b0bf4840e2f98e0d8064474699ec248bdbd149da783c89610676,2024-03-04T13:58:23.447000
|
||||
CVE-2024-20034,0,0,cf35da749882a42d3fb4d555cf4c7784b9ca63e49754c62d7cbfb93c29b82d3d,2024-07-03T01:45:49.510000
|
||||
CVE-2024-20036,0,0,a842a455104cefb6335a12470cf3ea09e402c164144afb30609fd627a5d8a9ce,2024-03-04T13:58:23.447000
|
||||
CVE-2024-20037,0,0,9c45a018c7c075a8a97c9a68674f13d53eed1650b73e588cabb51078922b13c9,2024-03-04T13:58:23.447000
|
||||
CVE-2024-20037,0,1,adb1866d4c227394880a8656ea0442a9b76611b77fb814d4721a97640cafcc3a,2024-08-22T19:35:10.633000
|
||||
CVE-2024-20038,0,0,b24fd54a338c5bcd125b3ff0e1aa517302167214bb3333a900e600b4cd1318a8,2024-03-04T13:58:23.447000
|
||||
CVE-2024-20039,0,0,16957c5f03c6deb27e91c56e5a56c47ab9ce0361bbd04c3b1e9fc45aae937591,2024-08-01T15:35:05.340000
|
||||
CVE-2024-2004,0,0,306db60d89047f410d6d61c78e80dc7bb4c98731b18731d539f0ad8a070bfc68,2024-07-30T02:15:05.320000
|
||||
@ -244594,7 +244594,7 @@ CVE-2024-2239,0,0,62d5946fcfafb2a4be7efadc9b7155219cc610ca4673c610a784dbbc3d091b
|
||||
CVE-2024-22390,0,0,55902feb124ae1975588cd87c6024bd399658d0d39667fda823793e05c4f62c0,2024-07-03T01:47:16.433000
|
||||
CVE-2024-22391,0,0,1f24cf22f6c35797cf3f1b5f513aeb27d6c9ee9188ababd3d8b06daf33275477,2024-05-05T03:15:06.950000
|
||||
CVE-2024-22393,0,0,708a22f5d3d86e394b7bd57dc98253e578e5dadb2c4096ced276d5893ef994b3,2024-08-01T13:46:55.723000
|
||||
CVE-2024-22394,0,0,ff5d094c82b627ed23cbc9e3d21e923a656eaed78e78037950e31bab38d65a83,2024-02-14T21:46:40.537000
|
||||
CVE-2024-22394,0,1,2d2cacf44303c3f2d5173aeda14462e9b46618509e14fff72aa5e0f1e00e04f1,2024-08-22T19:35:11.720000
|
||||
CVE-2024-22395,0,0,0d29784f93066fed6298e77c63a9a7ba15d287ad4907fe05e0ebf699a961fc21,2024-02-26T13:42:22.567000
|
||||
CVE-2024-22396,0,0,a5f00b94b83832b467db4300982cd3b6b686890c80cea01a13cc610352a5b12f,2024-07-03T01:47:17.270000
|
||||
CVE-2024-22397,0,0,a22476279a0935a827e77ac005c3f79785c215cd6755d834d6f6f936f670c7bd,2024-03-14T12:52:09.877000
|
||||
@ -244710,7 +244710,7 @@ CVE-2024-22569,0,0,709461d4796d213733f83973d7bcb39ae1034c99e9f028bded13074174036
|
||||
CVE-2024-2257,0,0,87856c3d2c0879cb041162bfc2d43d1a962975cb88c7d659c694453442f173d3,2024-07-03T01:53:07.027000
|
||||
CVE-2024-22570,0,0,ff1b02be80dc9b74eb41974349d357529a516d7a6b80d2e4f2e7a5ada4f115ed,2024-02-02T23:32:46.897000
|
||||
CVE-2024-2258,0,0,c494b8257d2f25d655eb6c978d87037350b24fb5e6a25d746bcf4e3ede80c89a,2024-04-29T12:42:03.667000
|
||||
CVE-2024-22588,0,0,8bc5ffa2d82b0a2b5c7a4f7b05618c8edfe047109115070d834077f2cb63d9ca,2024-05-24T18:09:20.027000
|
||||
CVE-2024-22588,0,1,a256e02887a23b217209241f70470c3ebdd9d466eea5d17713c72f3f04119775,2024-08-22T19:35:11.923000
|
||||
CVE-2024-2259,0,0,47e9716e08a8a64152636e816d65e3ceba79ed2969d2637cad811811cd82755b,2024-08-13T12:58:25.437000
|
||||
CVE-2024-22590,0,0,2265223fce93787a4f3c35c5166069376211edf7fda5f6fe38dcbb266d997cfa,2024-05-28T17:11:55.903000
|
||||
CVE-2024-22591,0,0,70771714261423b75efa32d9aeb9ee1dd7955f2ff659f39ff329504c4eb8516f,2024-01-20T18:49:47.907000
|
||||
@ -244892,7 +244892,7 @@ CVE-2024-2306,0,0,dba4619c77c06715e90d6a0a9c40f646be88098100eb784089d749ef57adff
|
||||
CVE-2024-23060,0,0,c533a2c3ab7879cb6341107bf55fb347921b4dcfd1771c35cc46c295fffc3384,2024-01-18T15:17:35.587000
|
||||
CVE-2024-23061,0,0,4bc85ee93751bdf2ecee1ac20f811b6d9a6f53cf85093d58751326cdb25cc0ec,2024-01-18T15:18:14.357000
|
||||
CVE-2024-2307,0,0,6e1c015f3d6c569a19e33c3b29b1ee5858f1aa7b73f614547925fd730d9ad323,2024-05-22T17:16:14.610000
|
||||
CVE-2024-23076,0,0,3755509bf8827817934da61e08729c2a885d027bcd7311729b31f1394b062b4a,2024-08-01T23:15:39.920000
|
||||
CVE-2024-23076,0,1,8b4a3aa99e4b0016eb04a2f21af25c778dfbd8defa93aacee4f93410e13a8292,2024-08-22T19:35:12.810000
|
||||
CVE-2024-23077,0,0,8f63dd6db7b5e7fcb60e699216bda5b62808ca284359f0bf54d6092ff16b4456,2024-08-21T14:35:02.117000
|
||||
CVE-2024-23078,0,0,ee4cbf2c8fa0612860e33eb58b6ee83f820a866a5cff0b624d94739f87f4098c,2024-08-01T23:15:40.070000
|
||||
CVE-2024-23079,0,0,0ebc4dd979380ec9ace5c9105776106a2e5250b5f5ea58853bd0c8da0ac1d128,2024-08-05T14:15:34.510000
|
||||
@ -245201,8 +245201,8 @@ CVE-2024-23463,0,0,3757d1676f1ef0efc7fd06c5dbfd1e77b5a81f192ccd6411055b5756d9898
|
||||
CVE-2024-23464,0,0,f96ace951d186b2988bc125fdea8c86f0397bed95b21593fc51223e1b64bb834,2024-08-07T21:23:59.990000
|
||||
CVE-2024-23465,0,0,a4c1ec35f04e9fdf474cd87b3c2aafdeacdae5a8eab83da2bfa5a53b38af34f6,2024-07-18T12:28:43.707000
|
||||
CVE-2024-23466,0,0,c827b69aa8ff2c2472dcf3ed2eaa36e10a05c679d817d0cf5ef1324ef9e4ddf6,2024-08-22T15:23:31.480000
|
||||
CVE-2024-23467,0,1,0f3812c8027e2b1a0387ae084b54a312746a6f4208c9fd471e82159f817c624e,2024-08-22T16:01:54.223000
|
||||
CVE-2024-23468,0,1,e8765a070e032d74be82ef4378840bde9abdf40be241610e53dac176bf3a85a0,2024-08-22T16:00:38.870000
|
||||
CVE-2024-23467,0,0,0f3812c8027e2b1a0387ae084b54a312746a6f4208c9fd471e82159f817c624e,2024-08-22T16:01:54.223000
|
||||
CVE-2024-23468,0,0,e8765a070e032d74be82ef4378840bde9abdf40be241610e53dac176bf3a85a0,2024-08-22T16:00:38.870000
|
||||
CVE-2024-23469,0,0,05b78d88e5a9305969bd12b72fe36d95687a40703caf5cbe6f8f531283cef4a1,2024-07-18T12:28:43.707000
|
||||
CVE-2024-2347,0,0,639c42723b33042f97a80a4a3a2bc3546c4d216290aee32968515b2758b6d986,2024-04-10T13:23:38.787000
|
||||
CVE-2024-23470,0,0,21f957f5830ba7f3cb8f0b5cba3b3cc643e8f559e292c381232ffecb2aac58c4,2024-07-18T12:28:43.707000
|
||||
@ -245692,7 +245692,7 @@ CVE-2024-2412,0,0,5eb3e084c15080bce88063a202edef708e748222aace75a3232d4d6b3f448d
|
||||
CVE-2024-2413,0,0,bcce963a476349e5182596e9d4a6b2abe57a4b3c6a7908768bff05824ae06fd2,2024-03-13T12:33:51.697000
|
||||
CVE-2024-24130,0,0,3711a524e7aaabb83e56488f8a369c6a69a909641f1667882c43871af5a9c3a7,2024-07-03T01:48:12.487000
|
||||
CVE-2024-24131,0,0,8a34d68fbe59589499b97058e1cc5501abd20303216cfd95ea1911115864db68,2024-02-12T14:32:43.777000
|
||||
CVE-2024-24133,0,0,8b1f520de46f6c7b356b19920cc93077fbf5256bc96dbbdce2d9687915bffd46,2024-08-02T00:15:15.980000
|
||||
CVE-2024-24133,0,1,d949da0e1ac241998db2e8167fd5857f2e74feefba8bfda0856fa1bf8007e505,2024-08-22T19:35:13.840000
|
||||
CVE-2024-24134,0,0,60e84ab02df9a5eebdd98ea4a5db40e2dea9f01666850cc98731ba000a572158,2024-02-22T03:36:42.397000
|
||||
CVE-2024-24135,0,0,977ca85955d4bb50888ba44be3ff5724d7a85958ba21e73ab9d084c94066f20a,2024-02-22T03:39:23.233000
|
||||
CVE-2024-24136,0,0,4e52a4e0c3e2bcd6af5c4faaf3a70948e406b5b2d6cac3691257ba4bddd05547,2024-02-02T23:32:58.107000
|
||||
@ -245828,7 +245828,7 @@ CVE-2024-2447,0,0,6305c2b7cb7de274154ca47c393d8343e28d151abe5d313800ccc312259a26
|
||||
CVE-2024-24470,0,0,16e381fa0a431abc8440a13d798da189428114544eb84ba0cdf0c6b44081e4ca,2024-02-06T21:07:34.547000
|
||||
CVE-2024-24474,0,0,7e9666bf8baf4869b81de15eea7d74142cdbcec829ea181976812d1817d9f045,2024-08-15T21:35:04.887000
|
||||
CVE-2024-24475,0,0,cc33da32b8386d85f2716db0b7573f224c2a2466da82581395da702e95a8ad4c,2024-02-21T01:15:07.890000
|
||||
CVE-2024-24476,0,0,f4b1eaee12a3672aa3ce2076a41e7e21bf4ac04a6f045fb2b55db6f5bb90f517,2024-08-02T00:15:19.267000
|
||||
CVE-2024-24476,0,1,35173e0759cbff63e7dc92d5e25f4cab09b39e59ddcae8323e62df958905df80,2024-08-22T18:35:04.910000
|
||||
CVE-2024-24478,0,0,b94544886ad00605269b35b690b03335a5085810bb0290de0a4c36a28c5a785e,2024-08-02T00:15:19.350000
|
||||
CVE-2024-24479,0,0,549c1faefc95446c73c237c8fc36405069121ac467e76d98310d7dcfb6901321,2024-08-02T00:15:19.433000
|
||||
CVE-2024-2448,0,0,1625ab16b72103512d70f9dadaa1a93632daea1863fd2e539d584ce390412d31,2024-03-22T15:34:43.663000
|
||||
@ -246493,7 +246493,7 @@ CVE-2024-25469,0,0,c93aa28e3914b49b6c5094bb3a85adbe0a6d382b0bed611cf4ed2908051d4
|
||||
CVE-2024-2547,0,0,146fae91278ac89c915ff47054ab066cf474c37945462dcf0d1632a5cd39af51,2024-05-17T02:38:18.377000
|
||||
CVE-2024-2548,0,0,77bed2cbe868603341c5c4fe00286d759f5ff5a17e6112b21ff9565c6b1c1c8a,2024-06-07T14:56:05.647000
|
||||
CVE-2024-25501,0,0,323095296ad9ad2b7b65354e8dc713fb0ff55c81a387332b25d6d222ed3321f1,2024-03-11T01:32:29.610000
|
||||
CVE-2024-25502,0,0,ae578fb4220918f5c79c04ddf94a1dcef1514713ad368fe6ddbcf4d062b5a31d,2024-02-16T13:38:00.047000
|
||||
CVE-2024-25502,0,1,d9aa39f94cfb1820b327a0e3490f96eeb91b5ac2a113d9f7ad8c92fe65038e88,2024-08-22T19:35:15.140000
|
||||
CVE-2024-25503,0,0,d18daea47533c0b519e93decb5b52383220a142cd875d19e67dca0b7259c8ef8,2024-08-19T20:35:07.610000
|
||||
CVE-2024-25506,0,0,331fc2aa8008abcbe7529c8e1f902eaa8f01961e899bf76c0c02400b4802e463,2024-08-01T13:47:45.357000
|
||||
CVE-2024-25507,0,0,d01f5e6d07dd4234554e701d042eeba7ebff258fccd1723712b33d5ea82451cc,2024-07-03T01:48:51.430000
|
||||
@ -246613,7 +246613,7 @@ CVE-2024-25648,0,0,43a3c9df6a9798012b99a2670068513af50de7590b4bfb346569d85e9cedf
|
||||
CVE-2024-25649,0,0,78e924f5d41e5f05e296cc03dc3adfffa64606ad0d931d33e585d324f935d2d4,2024-03-14T12:52:09.877000
|
||||
CVE-2024-2565,0,0,343041114de587054fc8697fd61433e361f1d5090f96a5bc5840cfbd0d3fa764,2024-05-17T02:38:19.613000
|
||||
CVE-2024-25650,0,0,01debd251b64ab98dbfb6f9755755f4a861dcf15301c1f9d4cc42c00838c070f,2024-03-14T12:52:16.723000
|
||||
CVE-2024-25651,0,0,a546ba0f7fd025d784b6fc0e494427092f33a4e4e0e2d25861f67306b90b8ed4,2024-03-14T12:52:09.877000
|
||||
CVE-2024-25651,0,1,141eb7237f8672075adb36d537e4b6bf696c6664fba30930784d19aa3662f69d,2024-08-22T19:35:16.053000
|
||||
CVE-2024-25652,0,0,8c49426ba9ad9fd1e89e8e83a1eeefc3222cdf552830f48a0a9961a99880036c,2024-08-01T13:47:48.337000
|
||||
CVE-2024-25653,0,0,efdc6e1fd6bc3201845fb807790d436f1b5ea82ec4d74b3ef4678687414457cf,2024-03-14T12:52:09.877000
|
||||
CVE-2024-25654,0,0,1d8c485b666617bf15e2be3bf3f059ab8542011fba9b3f67352ac0a3b72fec87,2024-03-19T13:26:46
|
||||
@ -246719,7 +246719,7 @@ CVE-2024-25847,0,0,768589b83f1428c67363b11073f1a1ed8713927725c83f5055ba58a636fde
|
||||
CVE-2024-25848,0,0,6c1bfa77711841ec03ded833f1894e9609b79f14cb4ec6bb43654b13a2cb7b3b,2024-03-08T14:02:57.420000
|
||||
CVE-2024-25849,0,0,ff1448816af02e5feb5f816e4bcbbe340dd06d99e43025948714f4eb8f651531,2024-08-01T13:47:54.067000
|
||||
CVE-2024-2585,0,0,09f7de950868ec14db3e38701fc5881ee82655225ee04ef5941127f736832c98,2024-03-18T19:40:00.173000
|
||||
CVE-2024-25850,0,0,5af0f934ea484ec3ca1490c96924ef0aab7c5c7572c450b40cf4d9d726414295,2024-02-22T19:07:27.197000
|
||||
CVE-2024-25850,0,1,9b8c642b39958e632d1cf5b6a4c613d6256616e4a43ffeb3ab8d505ab2755097,2024-08-22T19:35:16.957000
|
||||
CVE-2024-25851,0,0,d67a62091ab95045024d9c69930163fc6933a08dd0957c710b2d2f48274fafad,2024-03-11T22:15:55.150000
|
||||
CVE-2024-25852,0,0,1d0753f6ef753fc5d1ef48013e91f716bd2a2109414419ba6e7c96f787b8b0b6,2024-08-14T20:35:06.957000
|
||||
CVE-2024-25854,0,0,17ea666d7172d54584074846a82d44b7b8f164d46f64195f0b1bec22a7304545,2024-03-12T12:40:13.500000
|
||||
@ -248158,7 +248158,7 @@ CVE-2024-27474,0,0,4a390a0a495b528719cdfad3c5cdbeeb4b25b7052e56b9b2bf54d8bb9762d
|
||||
CVE-2024-27476,0,0,7a4663f499ee23e08c2a048515f5b6745ec9423d99e38efec54dd0ceaf59a3fa,2024-08-01T13:48:28.390000
|
||||
CVE-2024-27477,0,0,e0cd02f233cdafbc91249b5781d33c91da5035c970dc05ec11d6a3134871bf1b,2024-04-10T19:49:51.183000
|
||||
CVE-2024-2748,0,0,a5981f926316e727f1bb9455ec311db801fabdd6fc8350d94a1fb8a2edb4a89a,2024-03-21T12:58:51.093000
|
||||
CVE-2024-27488,0,1,bfdf15a6c63aa1a91ac337c65bb16cee3d64b1e4a0cba0b13044ecc27d04a86f,2024-08-22T17:35:01.813000
|
||||
CVE-2024-27488,0,0,bfdf15a6c63aa1a91ac337c65bb16cee3d64b1e4a0cba0b13044ecc27d04a86f,2024-08-22T17:35:01.813000
|
||||
CVE-2024-27489,0,0,fae6db07f37367cac095792be5d6f831e097964d9738fbc71b73f8a7056182d5,2024-08-01T13:48:29.187000
|
||||
CVE-2024-2749,0,0,1d41dd2f9a8ec812d743eb2503d3459b40e5b74ef406549f3f22535f8f1ae124,2024-07-03T01:53:31.040000
|
||||
CVE-2024-27497,0,0,2405900a7ea943326a9606fe19fb79f48e8cc6663a4627c665d5498ade7bedff,2024-08-16T16:35:04.793000
|
||||
@ -248170,7 +248170,7 @@ CVE-2024-2751,0,0,e0380b41cfa9755453969621f95a77af0ea62dd5295ce9849e6c35313a94c3
|
||||
CVE-2024-27515,0,0,3f190b29b377831cc24590b4a1f853471b234f4a1c7e2d52c2e51f41a12a57d4,2024-08-05T18:35:12.953000
|
||||
CVE-2024-27516,0,0,3dc18d3982e9b3ac9d2998b4f4d3df66c427d5d211641c6aee2d4c423b9aacd1,2024-07-03T01:50:41.420000
|
||||
CVE-2024-27517,0,0,5e97f075b436a5c8f2e51d28a398abf4c938438e6f3743132df7b78060b7cc66,2024-02-29T13:49:29.390000
|
||||
CVE-2024-27518,0,0,d812237f641178f6bc686b6c229d69abdd7eae6ab50b55b6efd5c619ffb68b42,2024-04-30T13:11:16.690000
|
||||
CVE-2024-27518,0,1,eee44445b24d086f58ae13c836362c174731b2fe04eb60975982bae1d572cb19,2024-08-22T19:35:18.243000
|
||||
CVE-2024-2752,0,0,9ac4a8690eeceffd759ff2fb7b55e32f8cb8bb4afb752110bdafa62b8f4bb686,2024-05-02T18:00:37.360000
|
||||
CVE-2024-27521,0,0,142655bf7422b3c81bdc37fb7ef4329756d07238f339af47f3bda39ff16ed820,2024-08-09T21:35:03.300000
|
||||
CVE-2024-2753,0,0,af8f0bf6c002c3e1db46c2cc4926e36d1e1afb83468ed827c9e47555532f1bd6,2024-04-04T12:48:41.700000
|
||||
@ -248189,7 +248189,7 @@ CVE-2024-27568,0,0,30a69742845b1488044d187ab76af1144dc7e9904fcf2c872ae36954db40b
|
||||
CVE-2024-27569,0,0,5c0a695bc7a1524024f1806d6c6d1550c657ccc9dd1fad298805953a7e078574,2024-08-19T20:35:08.430000
|
||||
CVE-2024-2757,0,0,4c422aba4be6a9a5da2652e2a836599ffe438bdae4eb45bb7067f46f34ffd36e,2024-07-03T01:53:32.100000
|
||||
CVE-2024-27570,0,0,8d5d62ec43c878f6bf09a9b5316375d908c11d0b5ec079a9674eb8a4339f1ea2,2024-03-01T15:23:36.177000
|
||||
CVE-2024-27571,0,0,ff0b0bcf3cf1fe0befdff4abfbb2b521b733f994207f9d68707861baf05a3a26,2024-03-01T15:23:36.177000
|
||||
CVE-2024-27571,0,1,ac088f7b64ad71ffe595852b417cdbab48f16b4154eb8d90ddb111c8e2f63030,2024-08-22T19:35:19.107000
|
||||
CVE-2024-27572,0,0,021a88f3c1ae2bf66877708ae71a24ab68a5a10fe16311950a18df580d61c782,2024-08-01T13:48:32.977000
|
||||
CVE-2024-27574,0,0,3445d7e232fea473b297543f2639b454fd942ac9a4758abe8e2e7d31ea60e498,2024-07-03T01:50:42.303000
|
||||
CVE-2024-27575,0,0,be8794a9d53d194bc575e7dee32b34180e95b0c9ca647d9bec212ab94e155297,2024-07-03T01:50:43.093000
|
||||
@ -248791,7 +248791,7 @@ CVE-2024-28434,0,0,ec4590de9963214229aa112f1c2ad2fa85380f4041b7dae287eb880ebccdc
|
||||
CVE-2024-28435,0,0,4c02f96d0bdc1a14461e768ad92ad2becc695cfb2c978e4da67bd0167ce78dc9,2024-03-25T16:43:06.137000
|
||||
CVE-2024-28436,0,0,f0499ab721c50eb1235cd653eb0433c4817c1b654cfff253ce1e58bd858ba26c,2024-04-22T19:24:06.727000
|
||||
CVE-2024-2844,0,0,894b7bd298d78fe3d2c3a3679ae19f19f64e2dda7f94e19d66505e36627d9d53,2024-03-29T12:45:02.937000
|
||||
CVE-2024-28441,0,0,9a9f6f2c4260b8aae3ecfbe0c03e98fa14418d977037c8b88369db7de3e12104,2024-03-22T12:45:36.130000
|
||||
CVE-2024-28441,0,1,98f673e8e169ee952dddca79ea78c3ead96fc2eb99b2c0a11068e947c06c44d4,2024-08-22T18:35:05.960000
|
||||
CVE-2024-28442,0,0,b5d378d7bf249d8932b5ef67495fddcb797bea8509e4f1706eab874d95ebf375,2024-08-05T17:35:10
|
||||
CVE-2024-28446,0,0,5cb6c3ad6343c7605d7288fa21a1a2b4ecbb6433ed1975b50505c4c4841c4770,2024-03-19T13:26:46
|
||||
CVE-2024-28447,0,0,96efc6b45fb26dce648a4b187b204c486498ef994105e9fd2065b17d0a61b2f5,2024-08-20T21:35:02.770000
|
||||
@ -249430,7 +249430,7 @@ CVE-2024-29473,0,0,8245ba1b7b6cfc2fd736894d074e12778ffb6419be24c78b4098d989642f6
|
||||
CVE-2024-29474,0,0,1e6da7c761ee3de98f7b759f0097c1b775ea91f11305f8a90e1129070ffdd028,2024-08-02T20:35:28.270000
|
||||
CVE-2024-29477,0,0,95dcae9bc8061c5d58cf2b63e167bb4091735292e7ec34284f04e5b395f25cbd,2024-04-03T12:38:04.840000
|
||||
CVE-2024-2948,0,0,2331d78509f1f3893daaecaf2db5091913c1d64d9406e6199bfd4abbc5caa395,2024-04-01T01:12:59.077000
|
||||
CVE-2024-29489,0,0,a096f3af707632e4fb911c6cd8398eea6fc361d8f6afa884b110f6feb7c61845,2024-03-29T12:45:02.937000
|
||||
CVE-2024-29489,0,1,2cd7b967a834ebb80ab1382ec368c5b1d73b4dff18a9c5fbfabbbbccd3dff0ee,2024-08-22T19:35:20.067000
|
||||
CVE-2024-2949,0,0,741e52e7909be6687101b8ec7aa347d81d5d7ec2a7c6c782e512ff2bce69b7e4,2024-04-08T18:48:40.217000
|
||||
CVE-2024-29499,0,0,0df4c342550eca93c20715245870721539a608c42f67ae6ae86966560d5e9723,2024-07-03T01:52:28.783000
|
||||
CVE-2024-2950,0,0,596af42449f28aff5b2c79c90b770bb4c97ffb9bc969aaf5cc4ba262b42d972f,2024-04-08T18:49:25.863000
|
||||
@ -249484,7 +249484,7 @@ CVE-2024-29732,0,0,e30fc06180575c1796869bb0b4fa02497c40c6d7939d34aba0362f12c2710
|
||||
CVE-2024-29733,0,0,0811972ef853088b726fd2b07316244d1d628e55e310910ac8174bd65d097612,2024-07-03T01:52:30.320000
|
||||
CVE-2024-29734,0,0,65bb1ba04f673142d3081922c5e4533cd4af140db3cdfbbce09ab73848e3b6c3,2024-04-03T12:38:04.840000
|
||||
CVE-2024-29735,0,0,1c27e1fe9dbb50907062f908fab6fbb55a16239f685d6be40b04c11200e2a361,2024-05-01T19:15:23.573000
|
||||
CVE-2024-29736,0,1,5b51c834110c4ab0fba6db5636bf570f371288eeb5e87d8fc00ae6c266b9181d,2024-08-22T17:31:48.980000
|
||||
CVE-2024-29736,0,0,5b51c834110c4ab0fba6db5636bf570f371288eeb5e87d8fc00ae6c266b9181d,2024-08-22T17:31:48.980000
|
||||
CVE-2024-29737,0,0,773c8720c44afb54cbbd0c12354c2f0a043cfa72e5f75a21b0108ef944307c03,2024-08-01T13:49:34.853000
|
||||
CVE-2024-29738,0,0,1c3e1564461702d87cd213d777f3523814ac3c73b5cc61bff5ae595e06e0fbeb,2024-04-08T18:49:25.863000
|
||||
CVE-2024-29739,0,0,e1057fb9115257c9cc112890add5aab29e2addabc474164aa5dc49dc015af77f,2024-08-21T14:35:06.390000
|
||||
@ -250287,7 +250287,7 @@ CVE-2024-30559,0,0,7bb411cba178991a1e753b9b344d96e6c257adaaf46f6d70bda139a8b3d1f
|
||||
CVE-2024-3056,0,0,c33c3028618acd56970d704007cc8cb0c1300b261807cf531015dd6f1b2728df,2024-08-05T12:41:45.957000
|
||||
CVE-2024-30560,0,0,29358f4cfba46b880efc18b382f49655b8da1f57de09ea2f3b221ee017e11a93,2024-05-14T15:23:17.730000
|
||||
CVE-2024-30561,0,0,317571b22962e8d6e5d0cb62ac3952d7d76cb14c6191157ad5ef89ba7149e860,2024-04-01T01:12:59.077000
|
||||
CVE-2024-30564,0,1,5b72a00e1c04b6fa93ffaa761b95fbd264190bcd29898850fc62b4910b45e5e3,2024-08-22T16:35:01.923000
|
||||
CVE-2024-30564,0,0,5b72a00e1c04b6fa93ffaa761b95fbd264190bcd29898850fc62b4910b45e5e3,2024-08-22T16:35:01.923000
|
||||
CVE-2024-30565,0,0,3bd2e856e06d3e3fe9f747497d3ea242e07c951fa4c500c8b76a56b8bcb712e0,2024-04-04T12:48:41.700000
|
||||
CVE-2024-30567,0,0,f2a4d1211b738fa363bb6c48ea72578b3372d81c87f66a2aa1c7f2df3ee8bec0,2024-08-01T13:50:09.870000
|
||||
CVE-2024-30568,0,0,44c25f2577fa5438de7f51a90d4ade231e906e1e0fac9c82f2eeb8db8041cb68,2024-08-21T15:35:06.717000
|
||||
@ -250427,7 +250427,7 @@ CVE-2024-3080,0,0,6986301309c9922bc02fa19392bc6067c49e953b2f624eb66756f4ffea7fbe
|
||||
CVE-2024-30800,0,0,c159abf1d20ef9221dca0ce07749c41b848d269f6d72d244107e748c6895169d,2024-08-01T13:50:26.523000
|
||||
CVE-2024-30801,0,0,79037a49ae58d0454d89f94ba313d584f276e2894821b324a5e75dde95008219,2024-08-15T17:35:05.230000
|
||||
CVE-2024-30802,0,0,37683b49f88fa426fcec7397572b9c76113c55e23f5ab472e56f33731e38df96,2024-05-14T16:13:02.773000
|
||||
CVE-2024-30804,0,0,c8ff423e3540a19b0faa1f1a1a616d5872ea6369d2742217c6f7bd92e390eb83,2024-04-29T12:42:03.667000
|
||||
CVE-2024-30804,0,1,0f43430d25009eadae7caa97b23b35ddd86648f9eae82b9b828a91f9ed0e4773,2024-08-22T19:35:22.260000
|
||||
CVE-2024-30806,0,0,69d03451e34851319586e66efe84d4aaaa1374f82acfc9b49736cd881cce5ca7,2024-04-02T20:31:58.463000
|
||||
CVE-2024-30807,0,0,4152651982bff689cfa963c375e94b647d4d42e48408c3cb0b93ed4cc183ecd1,2024-04-02T20:31:58.463000
|
||||
CVE-2024-30808,0,0,156121cad1cb8b48efeaec8ac2958220fd52aa0ba41912798852a887abc4f701,2024-04-02T20:31:58.463000
|
||||
@ -250535,12 +250535,12 @@ CVE-2024-31022,0,0,c7e2196fc2144529ae779b7c6081e3f8d64391691f708665471ce7a0ce765
|
||||
CVE-2024-31025,0,0,f6815681c00034cb26fb1b993f08da7051c7712a081b04f3f2c6c1b167cd8d92,2024-04-04T12:48:41.700000
|
||||
CVE-2024-31030,0,0,55e23e64b3707eab4de6e94c5df81025e4c96cb6796b4cba9a4e287691f568e8,2024-08-01T13:50:41.730000
|
||||
CVE-2024-31031,0,0,22dbfc8ddbe94926f4450ce3680a694e3a6be4ac1b04af44fb2aad33642532ec,2024-07-03T01:54:34.620000
|
||||
CVE-2024-31032,0,0,144966e50c1158b9000567e4c8a86d47234af0a2fb3b9449e4059bdb91d1715f,2024-04-24T03:15:05.933000
|
||||
CVE-2024-31032,0,1,9dc46c99afa3eb3462c2c2bb3d13abfc32da42b12a1aa1cfc0db0d7d5a534d98,2024-08-22T19:35:23.210000
|
||||
CVE-2024-31033,0,0,ad98d7e55b8cc6171b35a6136e6eb51847672500aa911f7497c7969c50af9164,2024-08-02T02:15:31.420000
|
||||
CVE-2024-31036,0,0,c1dc30371cbc232c45ce2a1ab5b75a9f53a1a706550cc27b167d070e5b7d7860,2024-07-03T01:54:35.980000
|
||||
CVE-2024-3104,0,0,e1dbcea3b82583c3a8bb219203e646c341fcc97755b89e1c83328a1d4d36d637,2024-06-07T14:56:05.647000
|
||||
CVE-2024-31040,0,0,8cff83beadb4c661eae93230dc1b40189dfecbc2297bd60a6380f76952c5534c,2024-07-03T01:54:37.220000
|
||||
CVE-2024-31041,0,0,1e28d1e3e8a1eb79805e190c840f78679beeca32a1e22fcb2bfe1394de19057b,2024-04-17T20:08:21.887000
|
||||
CVE-2024-31041,0,1,a2e5f2c50616130ae69bb4600fa3df33defe16f317b87e21856a1ac474301f96,2024-08-22T18:35:06.980000
|
||||
CVE-2024-31047,0,0,af5d8fcf98f981a9f813cc3db6d53189749ea7407eeff6f344af923836b4a452,2024-08-01T13:50:42.517000
|
||||
CVE-2024-3105,0,0,d1365c4198fb5e36e8becbc41dad6d35b33f14f8f23909f9ba45f9f9d5508f57,2024-06-17T12:42:04.623000
|
||||
CVE-2024-31061,0,0,66c585c6dcfe88f6d4ed833c4b2082d6859ef1b946fb15da1a412618a9ebff85,2024-08-01T13:50:43.283000
|
||||
@ -250699,7 +250699,7 @@ CVE-2024-31266,0,0,b92d3472dc7ea2fb235b5bcb68cf81aecc30e7cb1ee1bd1aa6dafd92cf1bd
|
||||
CVE-2024-31267,0,0,040058e14e9fdb721a91dacc70a415fed99bbf6a8b0312f5e05b9e69e9a0c81b,2024-06-10T02:52:08.267000
|
||||
CVE-2024-31268,0,0,cc3a61e7598538b428678882d7d6fc8be6fe9abdf509b0bae8b464c540b05a25,2024-04-15T13:15:51.577000
|
||||
CVE-2024-31269,0,0,86a2fc976069d7e9fe6dbc1dcd3b4bc1f5d59b016a301859aeeb8e23bd95e8d6,2024-04-15T13:15:51.577000
|
||||
CVE-2024-3127,1,1,6cc9e310e622b055f109ee1067c668db0a55dbf9550eabccd044c67d5bcfc115,2024-08-22T16:15:08.590000
|
||||
CVE-2024-3127,0,0,6cc9e310e622b055f109ee1067c668db0a55dbf9550eabccd044c67d5bcfc115,2024-08-22T16:15:08.590000
|
||||
CVE-2024-31270,0,0,0d4fb68db93c302d6959c71357aec0a409fd68ac83d0cfe96c55d4825aec0e52,2024-05-08T17:05:24.083000
|
||||
CVE-2024-31271,0,0,9ff92eb8bbc3e7bde801b4b1d4c1bb80f0abb134b87ad407d23ab89ee9509ab3,2024-04-15T13:15:51.577000
|
||||
CVE-2024-31272,0,0,37b5ce6f43ab85f0748383fe28a22f89c4f6f43da0d4ba23932c516627b4eab9,2024-04-15T13:15:51.577000
|
||||
@ -250844,7 +250844,7 @@ CVE-2024-31406,0,0,50456975bcaa7f8217ed5d32434dc8fe15a49c6e53ad431c822a1405fa86b
|
||||
CVE-2024-31409,0,0,09ade636686018d011934a2d430e86d633c432ebce6a25dfdd22659ad619bb0a,2024-05-16T13:03:05.353000
|
||||
CVE-2024-3141,0,0,f613ac942cd4fe27f02940a465f775f9bffd5aa44eaf65a9fb94b5d68958c63e,2024-05-17T02:39:44.593000
|
||||
CVE-2024-31410,0,0,23155e757f76d6df45e3314d3045af8745f87c8b7ddeb1d4a8dad059bea073da,2024-05-16T13:03:05.353000
|
||||
CVE-2024-31411,0,1,4ae8e92f24ab80cd4eeff80dde44b86a5e45219785c2eb09757e8f4f11b858d3,2024-08-22T16:07:06.267000
|
||||
CVE-2024-31411,0,0,4ae8e92f24ab80cd4eeff80dde44b86a5e45219785c2eb09757e8f4f11b858d3,2024-08-22T16:07:06.267000
|
||||
CVE-2024-31412,0,0,91783357bf64a7c6a8a8fc4dd61d86515f3c43b87fd5026db89b258496a563c2,2024-08-01T13:50:54.890000
|
||||
CVE-2024-31413,0,0,bb1445e4de4fe6231d24b5144c9534a3d5daec05348443646de7635aa924272f,2024-07-03T01:54:50.813000
|
||||
CVE-2024-31419,0,0,d12cf9d3a6a9056d09543372e3ec9556904c7fd0922004ef5361ecc4fb1ba007,2024-04-03T17:24:18.150000
|
||||
@ -251015,7 +251015,7 @@ CVE-2024-31750,0,0,1a15dee129c540f50ba0b22addd9273e209e8744c01daff655aada30a84ff
|
||||
CVE-2024-31755,0,0,3bd12cf4853126d6f31d6cbd32f6b5b02770582813fa897bd2c19a22d945bc42,2024-07-03T01:55:20.690000
|
||||
CVE-2024-31756,0,0,b265a44ac5576ee6d5c0a18978b0e66ae2e3119d6151f744407705cbd0d8e888,2024-05-22T12:46:53.887000
|
||||
CVE-2024-31757,0,0,640246057d9af431a856f7069b3a4b0176cede6dd1a0ca84cccb72f8b2351ce2,2024-05-22T12:46:53.887000
|
||||
CVE-2024-31759,0,0,5ca30fe161f942476fedc4c1a25392d9f6bd5f838b11978a0afee068f1ffa3e9,2024-04-17T12:48:07.510000
|
||||
CVE-2024-31759,0,1,a91ca69c3b65caf8011a472beaa42aae9a0ba32af5a57dbfbe22a6f7bd2fef94,2024-08-22T19:35:24.357000
|
||||
CVE-2024-3176,0,0,b581b35f96c3e71f6864e9ec04e922ca6011a2abb5dc1a155976a5a31d9d63e9,2024-07-18T14:47:38.093000
|
||||
CVE-2024-31760,0,0,f16f02679dd1d653421cfa1b377c9d22a632b6c4fccebc3d14af855ae5a31d71,2024-08-01T13:51:06.777000
|
||||
CVE-2024-3177,0,0,572d97d46eb0c253ee03c3934b9d649f7fc7d88b4a672b4edb358cf1ed9c5fcc,2024-05-01T19:15:27.480000
|
||||
@ -252017,7 +252017,7 @@ CVE-2024-3308,0,0,b12c3c7359268120e478241aac0d965ee4975d5f2a92382c8de950e6d75610
|
||||
CVE-2024-3309,0,0,86d23734c08e91abb9c54fe3adc839130d817cf111a237c0656262c25ce176f0,2024-04-29T12:42:03.667000
|
||||
CVE-2024-33101,0,0,02c41b74667ba4c6c855c7f8be761695b1033ca3ebd54d33f4c74ffe5c076663,2024-07-03T01:57:25.600000
|
||||
CVE-2024-33102,0,0,5913737ef9c2cdea9d03e524178ff2c4a07bc37811d823721759d56c1627f7bb,2024-07-03T01:57:26.367000
|
||||
CVE-2024-33103,0,0,05686544949830897372108bd228a37c7f004a025c3eed2758fff22fb6d3d634,2024-08-02T03:15:23.713000
|
||||
CVE-2024-33103,0,1,a36bb540d060154b2c500281aeebe1e440c6921a98c2ffcc128ad329bcfc7117,2024-08-22T19:35:25.357000
|
||||
CVE-2024-3311,0,0,6e298bee2f64a50081e2cbf2a03ac8b7d3c6b0b9fd9ec2176921cbd680375d90,2024-06-04T19:20:19.213000
|
||||
CVE-2024-33110,0,0,cadaede73d3a0da5440547f9c49768ef66978382531070a9c510181ac9abc5a8,2024-07-03T01:57:27.130000
|
||||
CVE-2024-33111,0,0,b6aa79d7fa96972383b596dcb7f242edbb816eac6eafb7be06fed5f14d30b343,2024-05-06T16:00:59.253000
|
||||
@ -252067,7 +252067,7 @@ CVE-2024-33222,0,0,826b88c0df0010107f0595e8bf718ff48038d9c2823c40b87f1e329d93d63
|
||||
CVE-2024-33223,0,0,bd16de328c282f1aa1b7015361c590473a5b6bf3caa6b0c34867ec1e542d4f9a,2024-05-22T18:59:20.240000
|
||||
CVE-2024-33224,0,0,ea562c47166b9ccee59aa37caec5e01025be0e30460cf86b89874eb41ddf1200,2024-05-22T18:59:20.240000
|
||||
CVE-2024-33225,0,0,20ea8cc6ddfb6cfd8258351119e0796feeaade6c50f1b0404fcf51caf0bfa6d3,2024-05-22T18:59:20.240000
|
||||
CVE-2024-33226,0,0,f3fb4ee69f05f27f81b817914fa93a341a77a038a9407ec5a7a16217f3ea6498,2024-05-22T18:59:20.240000
|
||||
CVE-2024-33226,0,1,118644c9a4526f22ebac7f7b4738b46fc0e07956b270365957b518f88d5f05c3,2024-08-22T19:35:26.237000
|
||||
CVE-2024-33227,0,0,7642d7b0dea4438aa6cf20447aa6ccfb5a37e8289abc2e50d39a48026159e609,2024-08-21T21:35:06.933000
|
||||
CVE-2024-33228,0,0,85cdbd71550aee88b5f9d8549e2c2f09f274676ddc09487eba7cc0a4fad357e8,2024-08-15T15:35:10.277000
|
||||
CVE-2024-3323,0,0,35a6027c28bfec2d03f21e8dc2fb44053ba20d6734735309aeaba44e533a0061,2024-07-03T02:06:09.693000
|
||||
@ -252329,7 +252329,7 @@ CVE-2024-33651,0,0,f2ee7352faa4d013ce2dbc2e7d6ca251932118d3e5b2422d264e03fcb1cbd
|
||||
CVE-2024-33652,0,0,486e801beae2c2c99c631668abda9d91af90b0e1a9af64a8cd7a679f08c5c36e,2024-04-29T12:42:03.667000
|
||||
CVE-2024-33653,0,0,265fc534e8717f316164edd35fe39b65af5bd4a9e2599f020b58283bd3269b45,2024-07-09T18:19:14.047000
|
||||
CVE-2024-33654,0,0,0892ef25c45719b53efeedb9f6ebabbe65a8f1a2df54c2a179e8dc18f8e5c732,2024-07-09T18:19:14.047000
|
||||
CVE-2024-33655,0,0,5b78877100297f0da919505636ca4a0c13bc834698615142818e1b1740a1898b,2024-06-10T18:15:34.520000
|
||||
CVE-2024-33655,0,1,9e64ca7b34c4566d1306046984ab49450e7da90a07f23b1974ef43c7b46b8b70,2024-08-22T19:35:27.177000
|
||||
CVE-2024-33656,0,0,4dba07a4d7c3975860634650cad6a2f6ef65414eb84506eae92fb7aa2b8aafe0,2024-08-21T17:24:59.627000
|
||||
CVE-2024-33657,0,0,16f4d3f5fb15d93af789c743eaccd0cb6f8039f81c1fd99ea9692086f0dcc089,2024-08-21T17:24:59.627000
|
||||
CVE-2024-3366,0,0,a2c419b6dceb854c8524f6fea56c90f31e3f9047e1890ead74a66fe52a9e4023,2024-05-17T02:39:53.090000
|
||||
@ -252400,7 +252400,7 @@ CVE-2024-33789,0,0,1b705f261bdfdb3c7c0384a6685c74908e5e41969953d5575683a1d41efd6
|
||||
CVE-2024-33791,0,0,4a99a46cc9bc13330a58a77df6070e766b5a533f0015633cf295877892d64b94,2024-07-03T01:58:48.567000
|
||||
CVE-2024-33792,0,0,7c7c9a5cdc3e6c8c82320ec108a0ab3708c01bb96dfb27d34785495a231c6066,2024-07-03T01:58:49.357000
|
||||
CVE-2024-33793,0,0,657ddfb93c384e79c20456942320d557ebaeb8c427e62d4fba5eb78b0e45cbc0,2024-07-03T01:58:50.130000
|
||||
CVE-2024-33799,0,0,bdd9f09a7e12636314e6c3f2a347985a0a99e4b2447b14defb0b973670e27602,2024-05-28T17:11:47.007000
|
||||
CVE-2024-33799,0,1,9d8baf9264b308f06d2bfe7c972157c80c3d36eac1c756578279660cf6d83ddb,2024-08-22T19:35:28.087000
|
||||
CVE-2024-3380,0,0,2dff51ddbee3af980b9cfb6cf09776d99cf02d06821df7efa0940e1572fc0531,2024-06-07T17:15:51.487000
|
||||
CVE-2024-33800,0,0,201356ff7d99d67e9b23318eb81347b8e0acce7c8616f8f0b16bc1aecb8d2a62,2024-05-28T17:11:47.007000
|
||||
CVE-2024-33801,0,0,383edbe255017d36a3f80e7a95d80ea991a96b279313ea8f636ba2617e7f4948,2024-07-03T01:58:50.903000
|
||||
@ -252892,7 +252892,7 @@ CVE-2024-34454,0,0,9c41ced14bcda502a6d91e8242ee544d71d5283ff3511493207ec7805cdb4
|
||||
CVE-2024-34455,0,0,c191f5457e9d706ca3323355b6cb28301bf69c793f902f33757952929305bbe5,2024-07-03T02:00:08.547000
|
||||
CVE-2024-34457,0,0,b14d1b09a16733cbe8e237801f72eb2ee4d363ca08aadfa585a48dbe12e38c8f,2024-07-22T14:15:04.883000
|
||||
CVE-2024-34458,0,0,ad9c57980a1196e03a7ff89c7cbce14805d2491f6af55e1053911cc733df4207,2024-08-21T13:31:38.380000
|
||||
CVE-2024-34459,0,0,e23f2c7438f4601aa9a56de6db52d8787783787763d585bc066caf2ee41c958d,2024-06-10T18:15:34.930000
|
||||
CVE-2024-34459,0,1,fa787ae7a4c8630112bbb06f81f3133274e5fdd9f7332b290019503934d44271,2024-08-22T18:35:08.623000
|
||||
CVE-2024-3446,0,0,cb97091f9e4759b1c0912bd51a56b30e45443e03748f74b42eff2bfcc530cf53,2024-04-18T08:15:38.340000
|
||||
CVE-2024-34460,0,0,441531d0808bd0543a3084d408b6b9ab77342b046b0f375a6d08c1971aedd3c7,2024-05-06T12:44:56.377000
|
||||
CVE-2024-34461,0,0,cc374f56fc002b0ab8a1c4c41f3103778880e140f4d0402c66d5feb164fd7550,2024-07-03T02:00:09.560000
|
||||
@ -252935,7 +252935,7 @@ CVE-2024-34519,0,0,e1bab0f51bff6ddc1064f759576ee7e30191ae4ab924c21597ebc2a29f9b8
|
||||
CVE-2024-34523,0,0,7ef51f7e789546b198cf934fa08689a630a0291ba9909985498eacb1d192e4fb,2024-08-02T03:15:43.153000
|
||||
CVE-2024-34524,0,0,3e667092f2fac2e9248384e2031bfe46558254a6a3fc0f2ae0aecbfd07dbb573,2024-07-03T02:00:27.283000
|
||||
CVE-2024-34525,0,0,7b62d839278ce76830c96b3fb5e58c932a408ac771b301e231e0f571e1316ee9,2024-07-03T02:00:29.427000
|
||||
CVE-2024-34527,0,0,996370802900d2dcb9978bdc308402f608bd87c4d8749958f78f38e9a2c40f9f,2024-05-06T12:44:56.377000
|
||||
CVE-2024-34527,0,1,23e03d0c4fa6bfa8b77f24e782beaeccc9957ed9211c09f918e2b7968b887f04,2024-08-22T18:35:09.990000
|
||||
CVE-2024-34528,0,0,8d9b5b257f7d2fd4a76a2b149b8062182b52b5547fe4d60dbfd3d242d3d40d64,2024-05-06T12:44:56.377000
|
||||
CVE-2024-34529,0,0,d8133b9a4ea4710432fb31a4132ab39e712c33d1c820f137246e054dc4fb105b,2024-07-03T02:00:30.540000
|
||||
CVE-2024-34532,0,0,dcb761bea457268d59c0be9416083baced4fef01729f53184cc4673fe1957bbe,2024-07-03T02:00:31.917000
|
||||
@ -253486,7 +253486,7 @@ CVE-2024-3544,0,0,ac159828af5bc2292e8e0701d42b4d30a3b9b1860c97c52c0c82cf5c85bdac
|
||||
CVE-2024-3545,0,0,d9f283192ab8f986c7e851f9b58a13c1438e2ebb25fe23225197629fde187eac,2024-04-10T13:23:38.787000
|
||||
CVE-2024-3546,0,0,35163ad2b2190e22887b6e298f1e24f2828b8a7ebd49798d961ad2c534ecb1cb,2024-05-02T18:00:37.360000
|
||||
CVE-2024-35468,0,0,f9dd9febc4034bc90fe43ce99b50256976b33c57b8b35c20fdc90432a37fa2c3,2024-08-19T15:35:09.230000
|
||||
CVE-2024-35469,0,0,300cffdd249203f66ae711e28c9f794f8cc6095c55aaa66381de9a39ce8cd9e5,2024-05-30T18:18:58.870000
|
||||
CVE-2024-35469,0,1,18bee3ba5715b478a436de716da42f1ea7108aec420f8357db65b4bc2307290f,2024-08-22T19:35:28.953000
|
||||
CVE-2024-3547,0,0,5281ad8cfbf75d8e7097f8df52b8a3e9c74f8dabf40b76a70b99a4928380607e,2024-05-14T16:11:39.510000
|
||||
CVE-2024-35474,0,0,1aa452483d6d7da77f1090f3cd37ef4b816291e1838401dc1342635ac1a9c4c8,2024-06-10T18:06:22.600000
|
||||
CVE-2024-35475,0,0,5630b4549b65d33d3ee9b0fbe82b2113175125b521e97ea87cdc02319a1cf4fd,2024-07-03T02:01:45.963000
|
||||
@ -253580,7 +253580,7 @@ CVE-2024-35656,0,0,b6fb99a75659a0b6cddb17e86374269e5493cd14bd9535b3dfd7ed1f6e679
|
||||
CVE-2024-35657,0,0,b51c4e22c7c5f52f89b80edb48a52842853a592201112fcdbd807b87af974c40,2024-06-10T02:52:08.267000
|
||||
CVE-2024-35658,0,0,02d603bb4833c826378dc2c7b4b6c158aa64f99f63e182d87141c499aba708ea,2024-06-12T17:50:55.227000
|
||||
CVE-2024-35659,0,0,2651c0d3218fe1050c14ffaf3928003168756cb772b19ad449c9389f3dfde3e5,2024-06-10T02:52:08.267000
|
||||
CVE-2024-3566,0,0,52109228033be4a76369eab1b84dbeb669822bc1d1993f552ad1186c27babca1,2024-04-10T19:49:51.183000
|
||||
CVE-2024-3566,0,1,d8adb5426b454694781dd5ab667311ecd90bc8a46fc99ba28a1f66dd045ba157,2024-08-22T19:35:35.700000
|
||||
CVE-2024-35660,0,0,a85ff0a7822a14d165e5de7ed1919abb154a1de11c8215173a97f054ca1441ea,2024-06-10T02:52:08.267000
|
||||
CVE-2024-35661,0,0,8b8332085c8053a42df002a98652102b5e05133894d3f36aab8949e0eb0e3128,2024-06-12T13:31:41.527000
|
||||
CVE-2024-35662,0,0,43b492385b92b1fc942c99fc466dcd6547a4a7b780999e4b389c076e3ea39b15,2024-06-12T13:31:10.767000
|
||||
@ -254277,12 +254277,12 @@ CVE-2024-36433,0,0,2d18270b463db9b276375797189132982b3093c59a94a1ba3c26d6b6e8046
|
||||
CVE-2024-36434,0,0,8fba84c9c20ed6e9e38e371f6a7314cc80d9ab38ed1fc3ffdc1e7c8b52186a69,2024-08-01T13:52:49.800000
|
||||
CVE-2024-36435,0,0,42aa941ee425d333c537ed403b5f168d15cf55caec805a299bb4c45521e1c947,2024-08-01T13:52:50.527000
|
||||
CVE-2024-36438,0,0,fcbe2e02dbfe7753ae10ee196c2c3d66e08c15fdea4edc31b3da8e63f435a898,2024-08-01T13:52:51.240000
|
||||
CVE-2024-36439,0,0,552cc6bf9f3a854c35497dfa977c3d093556dbdf2425977771abb27b0df0b30f,2024-08-22T15:15:15.883000
|
||||
CVE-2024-36439,0,1,edea588a3d58143973d3a88665fe7989ba6a7c452ce1625826da8fe7ccbaec07,2024-08-22T18:35:12.120000
|
||||
CVE-2024-3644,0,0,e904dffa636a621d1f1644a68a8bb26342dbf717ae684f12b60a37d102e4d87d,2024-05-16T13:03:05.353000
|
||||
CVE-2024-36440,0,0,e3ffbfb49a6a83abf3c4c4f0e950f7ab7d62439e253be0053a26163bc8cdbe93,2024-08-22T15:15:15.977000
|
||||
CVE-2024-36441,1,1,16e16de21c8f99458d9aea248831dcf153409a4f95f4c31dcb522bd5c60300eb,2024-08-22T16:15:08.433000
|
||||
CVE-2024-36441,0,1,b7e607580a741b331b28097cfaeea480d665d3502e7441fdb4ad9127149df5d0,2024-08-22T19:35:29.793000
|
||||
CVE-2024-36442,0,0,a825b90a27d1c300a2715e85e051e17ac9b243078f4181741a9faca3afd00e3a,2024-08-22T15:15:16.047000
|
||||
CVE-2024-36443,0,0,6b41f9be21c37101e04a2af5bcb1ed0de69466c478ef5ba6e2afaead6470be36,2024-08-22T14:15:08.443000
|
||||
CVE-2024-36443,0,1,10f70b00f33288c8118fd3612f1ed4e1a88033326a408ee6f896806864ee0cf3,2024-08-22T19:35:30.730000
|
||||
CVE-2024-36444,0,0,7764dcc9d2cad1809eec2f3d12f8959ca5dfa6fa7ba59999bc2fa6d6ce039685,2024-08-22T15:15:16.117000
|
||||
CVE-2024-36445,0,0,b3878d99c2c158182c669809477e39a5c3c4bcc3cc88b511a97003a3be74bdce,2024-08-22T15:15:16.187000
|
||||
CVE-2024-36446,0,0,fb83b75323b3e400ca2145700cc136f4b6c6846fd602109bf32c3aabc452c8ad,2024-08-14T02:07:05.410000
|
||||
@ -254366,7 +254366,7 @@ CVE-2024-36575,0,0,b117fb4e52d0f8b4cc58a403a03ce56bde8486e8cc8deaf2edb246c707092
|
||||
CVE-2024-36577,0,0,576812aeee52a5f7c1a1906492595372da454d658eef342066e241ac365be3f2,2024-07-03T02:03:20.433000
|
||||
CVE-2024-36578,0,0,31bf2da1d72ccc586cf7c2601482054c25f91d07cda12037e2c9b6f157363a1c,2024-07-03T02:03:21.253000
|
||||
CVE-2024-3658,0,0,a8a6b79dfd0c32467a1ed9fb3702397672f9a3e041e004bbddb8214a3aee78d6,2024-05-28T15:15:09.703000
|
||||
CVE-2024-36580,0,0,4e1be53a2f39c0a80b55fee3f7dc36a6db304045cdf599ebdf8f8db467e32f50,2024-06-20T12:44:22.977000
|
||||
CVE-2024-36580,0,1,214697697bb80df3f9cca6a9df817f6d970b4b4eff9913528d0b988f85d755f8,2024-08-22T19:35:31.613000
|
||||
CVE-2024-36581,0,0,48b3b841e1a97b73bb9fb2b7b5331df839757f8bbf0337d9846097c4be400d00,2024-08-01T13:53:09.057000
|
||||
CVE-2024-36582,0,0,b71b20c052e8f3abff98eda16b544f3e1b361097abcfc5540ed46152890c3496,2024-08-19T17:35:19.213000
|
||||
CVE-2024-36583,0,0,ddd27123c3646f7a3fa3b735f22a6a85d1a122401d7d1a0d660277bbd83fa9d8,2024-07-03T02:03:22.067000
|
||||
@ -254434,7 +254434,7 @@ CVE-2024-3676,0,0,8dc193c8609917b35ba91a632e73de4e92ed46289774a677f06060a8b04aac
|
||||
CVE-2024-36760,0,0,841ebe4cb8fe3bd81c22749215bf86b89aa9ddd323f20136f04010af75de3413,2024-07-03T02:03:35.990000
|
||||
CVE-2024-36761,0,0,2def433fa1c84a9e275856e3918a20f7afbf72e8563d9face0a26c843d2d46da,2024-06-13T18:36:09.010000
|
||||
CVE-2024-3677,0,0,6cc15bc7354ad532633e5fc6daa425aea3dc2f25b49c3017f86224f41078ae1a,2024-05-02T18:00:37.360000
|
||||
CVE-2024-36773,0,0,720de74f1ee0644bf544aa650aaafc650bba06adb51118d8aad2d248b0937337,2024-08-02T17:05:08.087000
|
||||
CVE-2024-36773,0,1,4ac6d9752deb503d9154cd9b7cfebc1de88c0335c9fecfd94ecc432aebe75b9b,2024-08-22T19:35:32.557000
|
||||
CVE-2024-36774,0,0,a0f118c44c070f7e889ef45df0f4c9a5fc8bc258ceac7eec500dce645d16bebe,2024-08-19T15:35:09.967000
|
||||
CVE-2024-36775,0,0,750f40a30c6e33f479ff9b0d44a619121855a88190c8461ae383413d7d8bda06,2024-08-22T15:35:07.603000
|
||||
CVE-2024-36779,0,0,683c0fd02360318850b70342be346d01a593435d02125ebb1b54b41fe6a80036,2024-08-20T16:35:20.517000
|
||||
@ -254446,13 +254446,13 @@ CVE-2024-36788,0,0,ce421f00af3050883a12bce11fefd1ad9628128d70c1a012c0032b203b967
|
||||
CVE-2024-36789,0,0,e3781e3969948bd92ae74a8bb78c5b0d32bc5708516429d524b2a965c1c4e0b5,2024-08-15T16:35:11.633000
|
||||
CVE-2024-36790,0,0,f8247224261f96e31ccf08410164dd4379381055fde60fa853baf6df22465be3,2024-08-14T20:35:14.473000
|
||||
CVE-2024-36792,0,0,fabceb2ff375c58d64c9553c86e9784f4de9e6f1c14eeb688305657805693eab,2024-07-03T02:03:37.690000
|
||||
CVE-2024-36795,0,1,421d7caed3f1bfdd012cee0400460351c045d5fa781e1724ee2bfb8de7fe2f98,2024-08-22T16:35:04.130000
|
||||
CVE-2024-36795,0,0,421d7caed3f1bfdd012cee0400460351c045d5fa781e1724ee2bfb8de7fe2f98,2024-08-22T16:35:04.130000
|
||||
CVE-2024-3680,0,0,a00e5c81c2599a81ed1e944ed0d1a6cb38236de396da2ad7b68a4f9ced279cbe,2024-05-14T16:11:39.510000
|
||||
CVE-2024-36800,0,0,7145d6f747aaada9716fb81bc8dfb45a6760f4d4c44d1923a8fcdfd4d6bf0704,2024-06-04T16:57:41.053000
|
||||
CVE-2024-36801,0,0,615520142931b66fde6db6951c58c2f4d595e9209406619dd298379a6ca83c50,2024-06-04T16:57:41.053000
|
||||
CVE-2024-36802,0,0,d90679a1557e63ced02c20ce3a95d6abd566ddbe5bfb37eb5db0c573c610d3f6,2024-06-26T06:15:15.200000
|
||||
CVE-2024-3681,0,0,447617aa0ff72974414a3f009efb09a39cced1c45f643ef6f3cd3ded49aa798d,2024-05-02T18:00:37.360000
|
||||
CVE-2024-36811,0,0,f90db255bac241fb3eb4c4274fa7aa4f43fe1ecaa498e979225312b15e44df61,2024-06-07T19:24:09.243000
|
||||
CVE-2024-36811,0,1,815d4884a97aa7f3725308aaf483dcc964427c0f4f9f5a4bc76dffdbfa70bca4,2024-08-22T18:35:13.753000
|
||||
CVE-2024-36819,0,0,b06c755f900c06f50434f89b91de559393300344dda01bbc662266b5fc611e52,2024-06-26T12:44:29.693000
|
||||
CVE-2024-3682,0,0,aebee2feda89d709e11e9bec3e1c17ca0ae10ff39719e7f62be10e1e27b06dc2,2024-04-26T12:58:17.720000
|
||||
CVE-2024-36821,0,0,4048b5245e036c49d5dbdedad8d1915f86e0e0022083fd298392f4047a036134,2024-08-16T16:33:38.597000
|
||||
@ -254462,11 +254462,11 @@ CVE-2024-36829,0,0,5509ab1d6b09194f3e037884f0294eea6f9178d3338dcfb674a6c6cc4137e
|
||||
CVE-2024-36837,0,0,bcb13008fecb3ca83d2c91f29752567c7b7ae53837e580080105d1fb590b60cf,2024-07-03T02:03:38.687000
|
||||
CVE-2024-3684,0,0,ef6904f473bb993a6bf9ca34fba021c50efb8f96f04049399eccb5be29999ef7,2024-04-19T16:19:49.043000
|
||||
CVE-2024-36840,0,0,c0a9de70789d65f424215f2cc1e80fd7ad2932b8a40a67794427ac3ed63f1d5e,2024-07-03T02:03:39.517000
|
||||
CVE-2024-36843,0,0,9015deb54483bbcbcf02bd2036f67dfa0518d8cfe31e8126a4a07c18b90651be,2024-07-09T19:15:11.767000
|
||||
CVE-2024-36843,0,1,4198bc8a9b485a9b6edbe36e6e06e96f5937d55d9694e4e4309439b88c915982,2024-08-22T18:35:15.457000
|
||||
CVE-2024-36844,0,0,c94553ba0a682e74879975e6898720453ce64bffe623293e0082986b05d492e2,2024-08-19T16:35:19.853000
|
||||
CVE-2024-36845,0,0,747949195846139aef34b9900f2ed12e01f0114001f72450e51b2514ff97399a,2024-07-03T02:03:40.363000
|
||||
CVE-2024-3685,0,0,dda0c71ef8f633473513e14b8b76ca4b9f78357b8af623185fa69818b961df70,2024-05-17T02:40:03.840000
|
||||
CVE-2024-36856,0,0,428da7159e6af3ad222a9ec24a9e21a9c38c9d1e6381cf02af11d68bd1668b7e,2024-06-13T18:36:09.013000
|
||||
CVE-2024-36856,0,1,dcc09dd034e14f7209a49a89553bd06990a72cd8ab2f8f5d6e2d144a9d460281,2024-08-22T19:35:33.427000
|
||||
CVE-2024-36857,0,0,a3957f20952d5f831d537cb81d4dc06ce5ec4152a9e930178e7fb48d5d56e274,2024-08-14T20:35:15.433000
|
||||
CVE-2024-36858,0,0,bf952cd9ddab2a4c534851d95449ac4e2ed1c44a5763e3b560caa5613bebe64c,2024-08-14T19:35:23.693000
|
||||
CVE-2024-3686,0,0,4edaa8377de4644f957d15220cb91ea9e071a6615200cbf20f58f4b97f92967e,2024-05-17T02:40:03.933000
|
||||
@ -254649,7 +254649,7 @@ CVE-2024-37062,0,0,58b116066013b6d749a8f2b0cb5ea2db72b9da7fafa4e8c628598d59a99c6
|
||||
CVE-2024-37063,0,0,80954941ce1b7f85a9ddba2aa731f5591bda02de0a05b724cd044a2e0e2bf543,2024-06-04T16:57:41.053000
|
||||
CVE-2024-37064,0,0,4c38fa1163e0fea8ab5ca1b8c699de3b9ac20f20b6e58d0f246dcde7abe2ce8c,2024-06-04T16:57:41.053000
|
||||
CVE-2024-37065,0,0,98a759a5df37913375764d521d81dec2811436d61b541015e740c355e39d43cd,2024-06-04T16:57:41.053000
|
||||
CVE-2024-37066,0,0,ae5db33dd6c962e6b7336efadb086a63a8b8a216ef42eadd0ebcdc9873952816,2024-07-19T13:01:44.567000
|
||||
CVE-2024-37066,0,1,846c6cc9851f92e172f698dfdac0216349fea638c25d55cdb5de9d8c7c3efe87,2024-08-22T18:22:47.927000
|
||||
CVE-2024-3707,0,0,6bfaa46ff6eb40f5f2f9b2ce66b762ad7c8a8dd85b0bee59ae4503c9e3de8bec,2024-07-05T13:15:10.997000
|
||||
CVE-2024-37077,0,0,ff2ab30c51fd1f14ba05ba8f6a2cb5932da12571ff707f15bafd014a8f78dc32,2024-07-03T18:02:47.117000
|
||||
CVE-2024-37078,0,0,009c869d231f8709f73a489f7029f4a82b9aafc8e4c52e039b4b2d9718fdb586,2024-07-05T08:15:03.130000
|
||||
@ -255520,7 +255520,7 @@ CVE-2024-38435,0,0,443ed766c9f1828c7340ce8e1e5ea8f41dedacb0f54d1fb72032e14d63301
|
||||
CVE-2024-38436,0,0,2a0666a7d40fd9b389de8adbff2ee11921b85d211afc0554b4f25dd1a035a738,2024-07-22T13:00:31.330000
|
||||
CVE-2024-38437,0,0,af3d5558f6171821fe7b56d83a7ce68b00464fcaad0f93b82569b698cf8c8174,2024-07-22T13:00:31.330000
|
||||
CVE-2024-38438,0,0,358e2c9395c78cc48f79a959f0dc011aabc3bf93ca600ba6e11d2ea9dd5c842d,2024-07-22T13:00:31.330000
|
||||
CVE-2024-38439,0,1,5e41004fdb849f3a15eab07684ffe3e0d6b4b290c3eafdf0306f628c717fabef,2024-08-22T17:35:02.870000
|
||||
CVE-2024-38439,0,0,5e41004fdb849f3a15eab07684ffe3e0d6b4b290c3eafdf0306f628c717fabef,2024-08-22T17:35:02.870000
|
||||
CVE-2024-3844,0,0,5af78e025341bf79ebde5375de51163c2d0699600acafc572d0eda08d0af5664,2024-08-06T19:35:07.433000
|
||||
CVE-2024-38440,0,0,63abac1dfb7b4b8bf3c5de5703789232b47ff29321fae9f604e5571079b98b34,2024-08-05T17:35:14.930000
|
||||
CVE-2024-38441,0,0,ac0b93cb6ffa098c7084725e672b8a46eaec79cba86c9914543059b94977fa29,2024-08-05T17:35:15.733000
|
||||
@ -255985,7 +255985,7 @@ CVE-2024-39208,0,0,bfca919135cb16c924d14a3e46a90c36fb45e8d6f50651e543c7c3b744627
|
||||
CVE-2024-39209,0,0,7ae48942b6b741e327b80a7d619fe2cbf17f09140a290b1dc29277309cf5b1dc,2024-08-01T13:55:46.647000
|
||||
CVE-2024-3921,0,0,3df891161d817967027b36a59ee53de2ea83f1b76e0d4238df41e738cf592261,2024-08-09T20:35:04.863000
|
||||
CVE-2024-39210,0,0,9e92b2a764e37e65ff70cacec2f99d4341944da2c135d4b7c23af986b18ec326,2024-07-09T16:22:51.927000
|
||||
CVE-2024-39211,0,0,2097c1c66ba59a15383c9353c96916ab9a5680eac99b1f2a60f6c4879ed468b9,2024-07-05T12:55:51.367000
|
||||
CVE-2024-39211,0,1,c9d7c4325bba0a2ec1ec1fe3daef35d056c7407899b9cbce0b5c58ab7122a0da,2024-08-22T19:35:34.747000
|
||||
CVE-2024-3922,0,0,d93b594e75035330ffbe6c52b35218aa3c4c95531df86f73f7a2c93c08b19be8,2024-07-18T19:33:55.580000
|
||||
CVE-2024-39220,0,0,cffdc7781bb5a48c8af1f6973408b621ad60d81fad4d0ce74cb4feeeca56b86d,2024-07-09T16:22:52.750000
|
||||
CVE-2024-39223,0,0,883c34699a9736998d96a24eca81d41004d2627c06ccc61484d0f3062b934079,2024-07-09T16:22:53.590000
|
||||
@ -256126,7 +256126,7 @@ CVE-2024-39429,0,0,c0f0ea0961d667a14523724c8241b9d1f206aa304e922487a3184313c2bde
|
||||
CVE-2024-3943,0,0,fecb7894fc8f71bb1eb318ec20be6409020b761b3221fbb9ca597f81fb48f5da,2024-05-30T13:15:41.297000
|
||||
CVE-2024-39430,0,0,64e823bdb7084987f6e4f2dcc4ad0f20791cdd196a0003b3469db98557837678,2024-07-01T12:37:24.220000
|
||||
CVE-2024-3945,0,0,f529a76504b589632a786b994a7e59172142cd26cd001d628e7f3ff9658da8b1,2024-05-30T13:15:41.297000
|
||||
CVE-2024-39457,0,1,71348762cda2a65a9fb6ee86fb97ddb6684e341009bf79ffb50846af36c0e45a,2024-08-22T17:33:32.373000
|
||||
CVE-2024-39457,0,0,71348762cda2a65a9fb6ee86fb97ddb6684e341009bf79ffb50846af36c0e45a,2024-08-22T17:33:32.373000
|
||||
CVE-2024-39458,0,0,057d26d6064abe38c6844996c076741573b3fb5797f6e26a9cfc5dd443dbc18e,2024-06-27T12:47:19.847000
|
||||
CVE-2024-39459,0,0,a2d4a360bea52f929e9e67b789c87ad1cf52c7054f238a5096a4acbd8cc22855,2024-06-27T12:47:19.847000
|
||||
CVE-2024-3946,0,0,ab824b4f2a8403c27b100f5c3d6e7f8d9dd1c20c9aa138888e04631941f166f6,2024-05-30T13:15:41.297000
|
||||
@ -256336,6 +256336,7 @@ CVE-2024-39705,0,0,91d39f33d5bd2d9618d124407e406b5aefb3921b0f0d526c128476a465358
|
||||
CVE-2024-39708,0,0,2eafb164d29e8efc470b1c615a7a961efa5060a31edd6795a1174fbb57cde7b9,2024-08-15T16:15:20.100000
|
||||
CVE-2024-3971,0,0,232de18e9e74ddfe0c81af44fc47161b6db81bcc698685ef24ea3f7084d9ef87,2024-07-29T16:51:34.570000
|
||||
CVE-2024-39713,0,0,99e8a316dad486c18bb302062018548767182c9767b7c9ef5e1c3b6a3cdb13f2,2024-08-05T12:41:45.957000
|
||||
CVE-2024-39717,1,1,0287b7253c42801cd81bb87dcdcd0c884eb32e8da119d94075ee8a696b5cb3b3,2024-08-22T19:15:09.173000
|
||||
CVE-2024-3972,0,0,0caddd7b34d493c3554c875afe72275890f23d83038241874e85ef811a9076b6,2024-08-01T13:56:47.637000
|
||||
CVE-2024-39723,0,0,003097d794792a3e1194202f71608927b35e402887d5f5ddf07d35b5dd183916,2024-07-11T14:54:10.243000
|
||||
CVE-2024-39728,0,0,fba26233ce0c4692619efffa132c45bfb836485ad2132e6f2e6d7ce0ec6f97d0,2024-07-16T13:57:37.203000
|
||||
@ -256534,7 +256535,7 @@ CVE-2024-40333,0,0,7e3d2c86e913650fda83b9ed457908dd220d08dc6d50420a52a17a80ec44e
|
||||
CVE-2024-40334,0,0,7c5139eedfaa7c790c86aa9490dc20d97f552a9ba2b8fc27c6c10365859ea652,2024-08-01T13:57:11.203000
|
||||
CVE-2024-40336,0,0,a5b75245e4db87e4fc3263aabb369a58a472f30d7c4ce491654a7dc1d23a1d6f,2024-07-11T15:06:22.143000
|
||||
CVE-2024-4034,0,0,b39ca2e444e8e083e595bb1c45cab5e2a41d75405ee52855e2d6dbb02a011da0,2024-05-02T18:00:37.360000
|
||||
CVE-2024-40347,0,0,de9468190b204b497ece56be99f262af1b42bf76ed7f418d30bb9f22c65ba719,2024-07-22T13:00:53.287000
|
||||
CVE-2024-40347,0,1,5083889b5d718c58eb8d1f1588f34f2acdc50ca81bdbf57436efa16a3a8ffc06,2024-08-22T18:37:49.850000
|
||||
CVE-2024-40348,0,0,6f13fda773d8e13c984cf3b16a2d645e0294f8f1764ff4caaca1e99b49b9dc8a,2024-08-01T13:57:13.270000
|
||||
CVE-2024-4035,0,0,3bb15040ac0c3c22ceadcf3607ee680ed3a99c29170715a5693bcfb82b999cb6,2024-04-25T13:18:02.660000
|
||||
CVE-2024-4036,0,0,faef85b8ea4d3772643857800ca53857ac0bd4e8c893e27c61e628dc7852637c,2024-05-02T18:00:37.360000
|
||||
@ -256600,7 +256601,7 @@ CVE-2024-40522,0,0,8a677ab9989e362511bec3e6f4edb768c909d11d73452c70e9694007bb6c7
|
||||
CVE-2024-40524,0,0,90f7431206b5ecbb9d18d5d6f346e266df059fa6fac9c7463be67ad7414064c8,2024-08-01T13:57:37.610000
|
||||
CVE-2024-40530,0,0,9e5cc738a7a0e410e0970f7751814354231f294fa9d110e489777dfb798ceffa,2024-08-06T16:30:24.547000
|
||||
CVE-2024-40531,0,0,9e583eb42d15be1f9048ae9b1965517ea12462cc8e4dd76ae30b81e5d3440314,2024-08-07T19:35:06.233000
|
||||
CVE-2024-40535,0,0,4a5d9d0c87f6ae400c205afdbc4f766e452e750a075595a5321b8d7d810f01d1,2024-07-17T13:34:20.520000
|
||||
CVE-2024-40535,0,1,1510e098104a1d2f524b97f4ba986590a1c7d9af78dd4e91187f28763928fd2c,2024-08-22T19:35:35.893000
|
||||
CVE-2024-40536,0,0,8e08633375577085d9df665f2d62466b3b6eb1ecb2618a56ac5894fb283b7f3f,2024-07-17T13:34:20.520000
|
||||
CVE-2024-40539,0,0,8ebc42c1390ef84ac367ae8d1ba0b0ce9ac095f50c081e4e40b961f1bf0b144d,2024-08-01T13:57:39.077000
|
||||
CVE-2024-40540,0,0,812067b26dd7cd753b1d3089300f8704ff38af643d689f8a41629c2d3fffe24f,2024-08-01T13:57:39.867000
|
||||
@ -256686,7 +256687,7 @@ CVE-2024-40721,0,0,e925b9407604ba1cd45dcb152cbb5c51e61b8964f6bec2135a5763eab76a2
|
||||
CVE-2024-40722,0,0,3f4f7e149a4eb425a0e28fef9d1b50a8bebfa8863debf3c2b799a570ae99ce9f,2024-08-09T14:39:28.157000
|
||||
CVE-2024-40723,0,0,e04f296cec18624b17999f7835fdbf784e5f656a5baf868ac5f6b3b681e3a875,2024-08-09T14:44:01.907000
|
||||
CVE-2024-40724,0,0,7760c39c7ea9cd43ce07bb58fee4f3b8fbd5ff3c12d0d2faca499135b3db5d70,2024-08-07T20:15:57.773000
|
||||
CVE-2024-40725,0,1,49f0f88958ae561d8b2b0b1ee4fb8bec2acdee702f61bcb5645f83d42fdd426a,2024-08-22T17:13:09.820000
|
||||
CVE-2024-40725,0,0,49f0f88958ae561d8b2b0b1ee4fb8bec2acdee702f61bcb5645f83d42fdd426a,2024-08-22T17:13:09.820000
|
||||
CVE-2024-40726,0,0,763881d353b2a872c395d06db8ff47aa2480183ffa56c57536446e062ec43bc5,2024-07-11T15:06:22.967000
|
||||
CVE-2024-40727,0,0,b9db12f74fa9e60fafdd87d2e3b118721f9da9edf52efc272fb39aa64e4cd584,2024-07-11T15:06:23.850000
|
||||
CVE-2024-40728,0,0,5d2cc4c2d64f07952d89d5ed2b4fa506494bbe43569a964ec30192faf719601b,2024-08-01T13:57:55.770000
|
||||
@ -256777,7 +256778,7 @@ CVE-2024-40872,0,0,61b6054f8d04261e92c08a44feec16dc1d8422a97543a2162e5dea5f0a6c8
|
||||
CVE-2024-40873,0,0,6df1707815f9f38105b50cd71b6fad1bdaf7a6f3e3c945bc399ab848fdd0a9bf,2024-08-02T19:57:17.407000
|
||||
CVE-2024-4088,0,0,61cc31924b86843bbd20c326ef7465dc1aa394b548458b2e1a9fc62c09ede628,2024-06-11T17:11:30.193000
|
||||
CVE-2024-40883,0,0,dacd9a67232f6d97da8b548085eb71f69250fd3fec34bd945dc78c157c912274,2024-08-01T12:42:36.933000
|
||||
CVE-2024-40884,1,1,9dc081271de7d95f10da0bf793d111f8d53dd0e5b21b249774ac65c34f857073,2024-08-22T16:15:08.797000
|
||||
CVE-2024-40884,0,0,9dc081271de7d95f10da0bf793d111f8d53dd0e5b21b249774ac65c34f857073,2024-08-22T16:15:08.797000
|
||||
CVE-2024-40886,0,0,956e61b02c76a4462886dd7b546df3fa5ab5cdbdf99796901fd42a9badb0564a,2024-08-22T12:48:02.790000
|
||||
CVE-2024-40892,0,0,80f2c69eafcb531435cc671447d237ff8792f374d8c58f10182688d813811ab4,2024-08-21T18:15:09.710000
|
||||
CVE-2024-40893,0,0,3220dba971e1861a31a0659deabcf8dc81ec736d5ed6a5b82a9eb1d0c8650fcc,2024-08-21T18:15:09.803000
|
||||
@ -257163,9 +257164,9 @@ CVE-2024-41577,0,0,1db7c1144df378d1f0197182c3eb7cc1bf4798d90e82fc3037fda80bd09f3
|
||||
CVE-2024-4158,0,0,9bd0a38e47c5b6d26f1e587737a0ffeb7c251278f38061995fc29ba309646aa6,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4159,0,0,72a4ec46db1a22f62474bfa22a14f37a28a6ceba3042de92b905fca6cc58c082,2024-04-25T23:15:47.087000
|
||||
CVE-2024-41597,0,0,7bc1c683ecc7754ef9a4accb42f1f9f659f54572a438343a1c4fabae2a9dfaf6,2024-08-01T13:58:54.793000
|
||||
CVE-2024-41599,0,0,eb607562b4faacb5cba93d5b9c0bbc37dd670b1d974499a6671588a854a9e5f8,2024-07-22T13:00:53.287000
|
||||
CVE-2024-41599,0,1,48a45c986c9579d7d3c0496e1b383e5802ce839d40edd99b19ede2ffd41e1b22,2024-08-22T18:27:45.397000
|
||||
CVE-2024-4160,0,0,02cbb5178621697de395e5bf97f83709ae910ce21eba24af27e6bc1b3971ae89,2024-05-31T13:01:46.727000
|
||||
CVE-2024-41600,0,0,c15c51d53ae94a762371dbf5dca32c6ce50f2d645e29733f7a591ad483809d6b,2024-07-22T13:00:53.287000
|
||||
CVE-2024-41600,0,1,ddd05664b5ee0043272f1a43166002722a6b163ed847eae777be121e2c652a5b,2024-08-22T18:27:15.310000
|
||||
CVE-2024-41601,0,0,bbe6fd3c72d7dad8c522d892fc1c0f9bacbb178b64f66555395886f778d90253,2024-08-01T13:58:55.750000
|
||||
CVE-2024-41602,0,0,3aaf8bd0d1359c5ef86792c331ff3b330f01dba788f9b1812b99e2f11e997bba,2024-08-01T13:58:56.507000
|
||||
CVE-2024-41603,0,0,274738d202695ad4f9eeac726dd842b3cdc47fbabba17edb5ee76c87292d7f32,2024-08-01T13:58:57.330000
|
||||
@ -257191,7 +257192,7 @@ CVE-2024-41655,0,0,ef3400d9e58c2cde6c539334829c8042d5ee995783a74a46bd16638786b0b
|
||||
CVE-2024-41656,0,0,d1b3325a39b6b3bcc8a959c5c8544c45c6c0440a0b7279ac0753d809322ad5fb,2024-07-24T12:55:13.223000
|
||||
CVE-2024-41657,0,0,9548b1223e9a93c24c88da65f71fa257164363d0fa8c7101bf5615f81fe0c55e,2024-08-21T12:30:33.697000
|
||||
CVE-2024-41658,0,0,6ae504120f32a9740f2609938bf47828d872f6a284b7f6df52aa43fde2a8ed46,2024-08-21T12:30:33.697000
|
||||
CVE-2024-41659,0,1,998a35290d72b0eb949229fc531ef068f95738d64bf6829749ab13d3e732d9a9,2024-08-22T16:15:08.993000
|
||||
CVE-2024-41659,0,0,998a35290d72b0eb949229fc531ef068f95738d64bf6829749ab13d3e732d9a9,2024-08-22T16:15:08.993000
|
||||
CVE-2024-4166,0,0,f698286bcd13839c3e713fc944a2d68390d9d1f07ea9696da7a343bdead6335d,2024-05-17T02:40:17.900000
|
||||
CVE-2024-41660,0,0,4c084a0db17b15ec343b2b75da4e6745a4156a9dd9381d5cdd96e60eb80314c7,2024-08-01T12:42:36.933000
|
||||
CVE-2024-41661,0,0,9bb4ba38de23abec768fb88c25fd9926dc19ebbf46e995b3d88e74cabbdda1a3,2024-07-24T12:55:13.223000
|
||||
@ -257626,20 +257627,20 @@ CVE-2024-42297,0,0,c6a17cd20eb476c36e74835def3dec9425eca068ceb110058bb8cda346565
|
||||
CVE-2024-42298,0,0,847a234781753fbc78128bf1a1b0230495d1dd37b0db004081592c3547d5f698,2024-08-19T12:59:59.177000
|
||||
CVE-2024-42299,0,0,1d9a7f76ca05044914ea6b23419a3afe5dfacda94e0276680ead40f3cc253bdb,2024-08-19T12:59:59.177000
|
||||
CVE-2024-42300,0,0,0085a0d67ebb00a2eb0fdee834d161b381fb524f015d1781780f7c3f00257248,2024-08-19T12:59:59.177000
|
||||
CVE-2024-42301,0,1,8d0c14aa5ce2bd9cfafdc53d1d4803a15deeb7dea9cf4dee21ca58c87d5e7b73,2024-08-22T16:31:18.667000
|
||||
CVE-2024-42302,0,1,ac5603e3536d5d3d4e183c896c42b27487b96235a32c9669ebd773415a745978,2024-08-22T16:37:26.237000
|
||||
CVE-2024-42301,0,0,8d0c14aa5ce2bd9cfafdc53d1d4803a15deeb7dea9cf4dee21ca58c87d5e7b73,2024-08-22T16:31:18.667000
|
||||
CVE-2024-42302,0,0,ac5603e3536d5d3d4e183c896c42b27487b96235a32c9669ebd773415a745978,2024-08-22T16:37:26.237000
|
||||
CVE-2024-42303,0,0,dcf78b75f0f625f0e1e5df3b0bc433e9d8484bdabfad7ed343c7012b7aaaf44f,2024-08-19T12:59:59.177000
|
||||
CVE-2024-42304,0,0,d173e622eb62d973d07785876ea39085958d8e911790210e06238340260b1d9a,2024-08-19T12:59:59.177000
|
||||
CVE-2024-42305,0,0,2a0027efaf18337e14a39532daab3b0d02ba1e240704105fd7925f4d1b755c9a,2024-08-19T12:59:59.177000
|
||||
CVE-2024-42306,0,0,ecd4db3e8cdd17b10ea08b2eca0729317a2688c0bef58523ae201bb7d84633e3,2024-08-19T12:59:59.177000
|
||||
CVE-2024-42307,0,0,021c1bf3b0b2f8d64c924e06216b8a74c38217276f58a374fe838603733c4495,2024-08-19T12:59:59.177000
|
||||
CVE-2024-42308,0,0,2a36ea46f924932ba8b403ffa81309ed7322f08858d89457f1ac73d7be8c21fe,2024-08-19T12:59:59.177000
|
||||
CVE-2024-42309,0,1,620e4db2a37ec65908b26f0c89994589b6187d0cfe5ed9c47a2f3dc54d759d19,2024-08-22T16:01:29.287000
|
||||
CVE-2024-42309,0,0,620e4db2a37ec65908b26f0c89994589b6187d0cfe5ed9c47a2f3dc54d759d19,2024-08-22T16:01:29.287000
|
||||
CVE-2024-4231,0,0,c87a42b4dfede9046d13b34e260c0c7ec4e51f68f0fbfb8755010b78e39f405d,2024-08-01T13:59:28.843000
|
||||
CVE-2024-42310,0,1,400c9cfae2eb45fa11efe161bf5c79e5b421ec2976855d764d0806127b25caf0,2024-08-22T16:01:46.263000
|
||||
CVE-2024-42310,0,0,400c9cfae2eb45fa11efe161bf5c79e5b421ec2976855d764d0806127b25caf0,2024-08-22T16:01:46.263000
|
||||
CVE-2024-42311,0,0,ee026ffaa3435a8fee00e98fff3782a46b4f2eff532aed7bff974de91275ee18,2024-08-19T12:59:59.177000
|
||||
CVE-2024-42312,0,0,8419f66ad6ae63296361d79f9dacef9b878e08f5aec63988a53ec2b285c951e4,2024-08-19T12:59:59.177000
|
||||
CVE-2024-42313,0,1,9c1d5c48d055f58f1d9db953b1d9df536df6f372c5b4c034423cf0ca1e8ccaa9,2024-08-22T16:01:59.467000
|
||||
CVE-2024-42313,0,0,9c1d5c48d055f58f1d9db953b1d9df536df6f372c5b4c034423cf0ca1e8ccaa9,2024-08-22T16:01:59.467000
|
||||
CVE-2024-42314,0,0,89c58dc7b3cd8b2fd3f960c13bee9362713642d22d4898076c0acf86c2564d4a,2024-08-22T15:50:47.437000
|
||||
CVE-2024-42315,0,0,ad8e62245cec9b91e03cf0701da404d6b4ca5f784fbecb811226908929f71f6e,2024-08-22T15:51:03.077000
|
||||
CVE-2024-42316,0,0,5b706fe03d29a1efdfca0a0866006926090ec5745ff3a19fc18eeaca74a060eb,2024-08-22T15:52:38.520000
|
||||
@ -257745,9 +257746,9 @@ CVE-2024-42487,0,0,2efeb3a744823d93cb77dca921c5d1e1876bd604d6d9b9e3d12e2ec5d005b
|
||||
CVE-2024-42488,0,0,d4b28d6f7587a9892f3e1f2f60f322ad605b2174a3099ed0ae0224cdeca7655d,2024-08-19T13:00:23.117000
|
||||
CVE-2024-42489,0,0,cdd86cc62ae99e91c414cd210e2840035f1a515c38caae18a4e22c79cdb0af72,2024-08-12T18:57:17.383000
|
||||
CVE-2024-4249,0,0,20dbadf05c38d413ed14f5d424310da5ffa119a0ccbbcb5b690e0c54ceac344f,2024-06-04T19:20:34.093000
|
||||
CVE-2024-42490,1,1,3eec40446c13f9eb28bd32bc94ff39cd886335dbb08831b09e891eacc1349c53,2024-08-22T16:15:09.117000
|
||||
CVE-2024-42490,0,0,3eec40446c13f9eb28bd32bc94ff39cd886335dbb08831b09e891eacc1349c53,2024-08-22T16:15:09.117000
|
||||
CVE-2024-42493,0,0,f6b5486c33bc66cf003608659d12007760e6f11e14f162d8f0f6b524c3d0cd10,2024-08-08T18:55:19.180000
|
||||
CVE-2024-42497,1,1,d0db13532a5ddb0f8eb4c11c984e4109db7e68721821582b492c07273b6e93f5,2024-08-22T16:15:09.330000
|
||||
CVE-2024-42497,0,0,d0db13532a5ddb0f8eb4c11c984e4109db7e68721821582b492c07273b6e93f5,2024-08-22T16:15:09.330000
|
||||
CVE-2024-4250,0,0,29d8096febeb47af7a705b5c5f44b0e0121b5483d3074c39ff1bff1155e9a3a5,2024-06-04T19:20:34.200000
|
||||
CVE-2024-4251,0,0,4911c8bef2a1e60ace7e3694403733ed66cd48ed80870211c4240e0e24584389,2024-06-04T19:20:34.297000
|
||||
CVE-2024-4252,0,0,9237a844d9d9b4c175441eb52c39ce07fc14167f47531df4616e5c1079e2e93b,2024-05-17T02:40:21.053000
|
||||
@ -257798,7 +257799,7 @@ CVE-2024-42583,0,0,8fd0440f353ad964c47cf3a77100747b6a669fde220cd35bfe86af45e7c13
|
||||
CVE-2024-42584,0,0,1d49fc6ba26b04e6a414935584dbbc10ccedbe7e9c02f914a1b9e55e373062b9,2024-08-21T13:37:57.767000
|
||||
CVE-2024-42585,0,0,a5c96f6969903c085392629454a335ad16ad53dd668e8958bf965c31b35d6775,2024-08-20T16:35:31.307000
|
||||
CVE-2024-42586,0,0,cbadbedcb4b3c2d2ab907140f92a66b7af1f959a0d34de9272c8d68911fd44f3,2024-08-20T16:35:33.523000
|
||||
CVE-2024-42598,0,1,0d05d8dab7d3f4ad09766e52642da392dd15ece228ebf0dca63459f8d654e22f,2024-08-22T16:35:06.180000
|
||||
CVE-2024-42598,0,1,f71051f9c507db6076bf3717820c0c67d1cab35bfba6f04f909801baaae9d568,2024-08-22T18:15:10.187000
|
||||
CVE-2024-4260,0,0,16d46a0b5bcb66a093fc7ed1472e8a955d65f29368360dc29eff1d3d84145b9b,2024-08-01T13:59:29.547000
|
||||
CVE-2024-42603,0,0,994e52c74dfb66d27249c2b65181ca74c70f6e7f1904d6fd7ee8f461dc2cc6fb,2024-08-21T13:21:56.383000
|
||||
CVE-2024-42604,0,0,53718c28d04ee9ff5e5273896e62f5eef0651385f9073829087b371924096be7,2024-08-21T20:35:05.780000
|
||||
@ -257870,22 +257871,24 @@ CVE-2024-42748,0,0,52e6e14746af30f6f3124891b89bbdbe775ebb6c4232d3347332f267006d0
|
||||
CVE-2024-4275,0,0,c229bc373f94c5248df137d0b0d9ca9d61bf79f845040a419335cc081cba5e27,2024-05-14T16:11:39.510000
|
||||
CVE-2024-42757,0,0,7f6ba25a82908bfc7acb20e761fdbba6f23f597232f39843fc1cc43949e3074d,2024-08-20T15:35:25.190000
|
||||
CVE-2024-42758,0,0,78591070e9343c09b0ea814d5b331b967691862f9b02d6e8c624fb011530a86d,2024-08-19T18:35:14.237000
|
||||
CVE-2024-42768,1,1,f79fea926bde9b879e5109e9d7ccf7da6d7b9e28012b3c5dc2bf1594038712ee,2024-08-22T17:15:05.693000
|
||||
CVE-2024-42769,1,1,37a87960c5f28ee9d84e69b3adbbcc050439fae36edce7f7fe85a762297528f7,2024-08-22T16:15:09.553000
|
||||
CVE-2024-42767,1,1,a9af70e60ae4729616c8e41d35684a991996bffe02660ccbde0c88c3b2e5580a,2024-08-22T19:35:36.800000
|
||||
CVE-2024-42768,0,1,01c9a577e2113a24d25ad4019b4f4d6fb1431167eec95d87d5c825a8100aef1a,2024-08-22T18:35:16.727000
|
||||
CVE-2024-42769,0,1,41a04011f2437869f03856eeb060f408751a3c896461d4ab1914e040758874a0,2024-08-22T19:35:37.830000
|
||||
CVE-2024-4277,0,0,ec975a6ab8cd435ccab2b915965095df8c992e1e8e765cf73bc6d545aa3b1e0a,2024-05-14T16:11:39.510000
|
||||
CVE-2024-42770,1,1,213f338c118c1cbe17f8bc7d2011a969fb5d543d85c27b7a3da8ddf6af65531b,2024-08-22T16:35:07.240000
|
||||
CVE-2024-42771,1,1,09314c32302b97a3ccd054edfa4f9fecdf9b3ff025c4bc8ffc2b2a2979a12fc6,2024-08-22T16:15:09.730000
|
||||
CVE-2024-42772,1,1,4e62c39f7bbbd2ec4d9b0e556f4f946eb46f70662b958385c3fcf0b92905f592,2024-08-22T17:15:06.070000
|
||||
CVE-2024-42774,1,1,e14a4cf75acb6188434ccbc606909ebe07b86cbdf9dea44d004ad7863a967a10,2024-08-22T17:15:06.350000
|
||||
CVE-2024-42775,1,1,2e0cd48608fe41915ec9ff64309439001962a490bdbb2f88a448015aea179620,2024-08-22T17:15:06.580000
|
||||
CVE-2024-42776,1,1,5f7f3b3e4bf3124870102683953b810d90bbd4ef60cd4045588d0a7f7c2e3caa,2024-08-22T17:15:06.807000
|
||||
CVE-2024-42770,0,0,213f338c118c1cbe17f8bc7d2011a969fb5d543d85c27b7a3da8ddf6af65531b,2024-08-22T16:35:07.240000
|
||||
CVE-2024-42771,0,0,09314c32302b97a3ccd054edfa4f9fecdf9b3ff025c4bc8ffc2b2a2979a12fc6,2024-08-22T16:15:09.730000
|
||||
CVE-2024-42772,0,1,c6fa15cc52f56ae33a3ddb59b887f84ca8d6a3d0b94bc71565f13766c07aa3e6,2024-08-22T19:35:38.793000
|
||||
CVE-2024-42773,1,1,a15b1dba4fd49bdf1bafdb1dd4446c4b47f48e6ccfe35acb5b3c465b2444e8d0,2024-08-22T18:15:10.367000
|
||||
CVE-2024-42774,0,0,e14a4cf75acb6188434ccbc606909ebe07b86cbdf9dea44d004ad7863a967a10,2024-08-22T17:15:06.350000
|
||||
CVE-2024-42775,0,0,2e0cd48608fe41915ec9ff64309439001962a490bdbb2f88a448015aea179620,2024-08-22T17:15:06.580000
|
||||
CVE-2024-42776,0,0,5f7f3b3e4bf3124870102683953b810d90bbd4ef60cd4045588d0a7f7c2e3caa,2024-08-22T17:15:06.807000
|
||||
CVE-2024-42777,0,0,a3a6a3f436d63757d909e35bf85227d948a610bf403bbf409724424474f99244,2024-08-22T12:48:02.790000
|
||||
CVE-2024-42778,0,1,d764d72d39cc4183a1af0d7e19f09d7d0960ab591232c3ea88adf9b672102c66,2024-08-22T17:46:56.953000
|
||||
CVE-2024-42778,0,0,d764d72d39cc4183a1af0d7e19f09d7d0960ab591232c3ea88adf9b672102c66,2024-08-22T17:46:56.953000
|
||||
CVE-2024-42779,0,0,7fa9347fecf8bb1f718d36d92bb608ba8868bf482dadae633b850723bf230632,2024-08-22T14:35:10.640000
|
||||
CVE-2024-42780,0,0,e826593252205b3d8e5034341498fa244d03108b73f3ad8c82b84c6b7276e451,2024-08-22T12:48:02.790000
|
||||
CVE-2024-42780,0,1,7efc9b98ef0d9ac4794d44ec0ccbc388ea7d3e0de2d27e8b96a32d176c23f637,2024-08-22T19:35:39.710000
|
||||
CVE-2024-42781,0,0,68007156c17ee47f298a37cc150f13de3eb35249db160856cb2b8565b92d98bf,2024-08-22T14:35:11.393000
|
||||
CVE-2024-42782,0,0,c88036a1a9c99d71bfc251d5b6c0be95ab852a5980a0325b1c2181381dc03814,2024-08-22T15:35:10.447000
|
||||
CVE-2024-42783,0,1,a90f42465fb73d63717350e61bed2a1d2459bfb1585238e07a16ef63fa6fdfc7,2024-08-22T17:35:07.750000
|
||||
CVE-2024-42783,0,0,a90f42465fb73d63717350e61bed2a1d2459bfb1585238e07a16ef63fa6fdfc7,2024-08-22T17:35:07.750000
|
||||
CVE-2024-42784,0,0,ae6453c1305840d7826f5fb04807ac2e6014377b83456873440c2250d93d806e,2024-08-22T14:35:12.170000
|
||||
CVE-2024-42785,0,0,b5ca1c8cf409a09fd190be5882a3f1065d93ed2d64fe581fb5571056dcc4c9c5,2024-08-22T15:35:11.450000
|
||||
CVE-2024-42786,0,0,45cc74a129f840b910b7eae19f93b2633379a97760df9aaea4e54ee022b13d38,2024-08-22T12:48:02.790000
|
||||
@ -257961,7 +257964,7 @@ CVE-2024-4302,0,0,3989b291497fea424d341ee8d50afc238ccc795cfb4606a4430491f615d9ea
|
||||
CVE-2024-43022,0,0,60b15925d48bd4a0544b6a90b44d37dd7b45f132534cfb6161c485e040769eb2,2024-08-21T18:35:09.733000
|
||||
CVE-2024-43027,0,0,023646627aeb42c9f27c70e233b2b26c2ec04024033b793398340bc23e8b2b89,2024-08-21T17:25:08.560000
|
||||
CVE-2024-4303,0,0,83a712aebf2d4281174fc319c5a3b5ed1f6b2a8b7c1590974611c884faeb0657,2024-04-29T12:42:03.667000
|
||||
CVE-2024-43033,0,1,fd57d359a27fcaf19587aca04a23681152ba867b02d3eb512220398c8467fb35,2024-08-22T16:35:08.663000
|
||||
CVE-2024-43033,0,0,fd57d359a27fcaf19587aca04a23681152ba867b02d3eb512220398c8467fb35,2024-08-22T16:35:08.663000
|
||||
CVE-2024-4304,0,0,cc036c021f3a6e70e19e6533fc0c5b7e8e9615d68f40d67450c876ce97ebcd8f,2024-04-29T12:42:03.667000
|
||||
CVE-2024-43042,0,0,b853bda14fa02964a16c19d1896f72364ccfb9e1c7f5c0faac2a5ae6d185d191,2024-08-19T13:00:23.117000
|
||||
CVE-2024-43044,0,0,0f847f7b25552f59db6fe108bc5868ae7095ef3bf92eb01d14caa8a1c32e542a,2024-08-16T17:19:30.643000
|
||||
@ -258198,7 +258201,7 @@ CVE-2024-4375,0,0,a80e63d12c12bb1a4c76673525f796ba2c31674a917e8feea214a8d89539b3
|
||||
CVE-2024-4376,0,0,7b257e3003fee7879c886112d028b58d973966a06334b732b2628be71d9e1e45,2024-05-31T13:01:46.727000
|
||||
CVE-2024-4377,0,0,1f0bc109d8a6e47162fe7e13cb7db22957e997f770c56ad1361c99539d4a2fb0,2024-07-17T02:53:06.217000
|
||||
CVE-2024-4378,0,0,09f9e04bae659373b82712486e7efa4baa3211e21ee904b68f572ef978953753,2024-05-24T01:15:30.977000
|
||||
CVE-2024-43780,1,1,68f06be6c51bd11b2023e49700a53e54fa3dac62a141055bb7230734e17bb0b3,2024-08-22T16:15:09.897000
|
||||
CVE-2024-43780,0,0,68f06be6c51bd11b2023e49700a53e54fa3dac62a141055bb7230734e17bb0b3,2024-08-22T16:15:09.897000
|
||||
CVE-2024-43785,0,0,28e6190998a7b50827ca97edc90f225bf92dffe8990a6186f86e2a71f0d4359d,2024-08-22T15:15:16.670000
|
||||
CVE-2024-43787,0,0,f61db6f79a1095039a5ac89944b6da6b584fb7e6ecf3d75d3d252fa665e365d1,2024-08-22T15:15:16.857000
|
||||
CVE-2024-4379,0,0,21c1593ccdc9c542b9ca9b0ba403ad32afbc0c98a6b0c8f514039e188e2373a7,2024-05-31T13:01:46.727000
|
||||
@ -258250,15 +258253,15 @@ CVE-2024-4385,0,0,77dea89143b3a0633a6b8d90c0521dc82338402099ab7a378f8d43e8fe04ec
|
||||
CVE-2024-43850,0,0,af5a8e5c81d2d7083cc2063dd97b917fab8a477ad546922bdeb0b7cb165eb7d7,2024-08-19T12:59:59.177000
|
||||
CVE-2024-43851,0,0,6b377a11182d300738f6cb3fcaa1aa4d6b0f57bbe7852e35522a14ee29006899,2024-08-19T12:59:59.177000
|
||||
CVE-2024-43852,0,0,e16a39e3485e6268d56a06e4f3ecc24b277dfc853c8871fb0e21f6f409c0a86d,2024-08-20T19:32:55.747000
|
||||
CVE-2024-43853,0,0,a19fb14377c7f24b756633650bd958b6ae843b7b6d8ad25c4d37bcd34b5bda34,2024-08-19T12:59:59.177000
|
||||
CVE-2024-43854,0,0,bfd585f1c370eaecf2bb935c34690deac5522a5908f7d4c85b08d25eb0247bd2,2024-08-19T12:59:59.177000
|
||||
CVE-2024-43855,0,1,b20a91fb4977616b14c0349af9fe6fdf38deab2ab7796fadba2ea00dab4f6345,2024-08-22T17:48:09.100000
|
||||
CVE-2024-43856,0,1,91d346c264b1a27e13a95a79650da4390a2d02a7cc5798231b8314954af3044d,2024-08-22T17:57:08.640000
|
||||
CVE-2024-43857,0,1,1770874efc8d117e3bd251f738e88729b0ef15b20bed1182b733a19e974e06d4,2024-08-22T17:38:21.003000
|
||||
CVE-2024-43858,0,1,af09898ffa278eaf458ba54f4590eb4fb3ade046d9a31e9697e73bd46738182b,2024-08-22T17:40:11.663000
|
||||
CVE-2024-43859,0,1,c80f1d20a200e8e7c04740035b687c5519ed09874bdbbd064f52b001212ddb3c,2024-08-22T17:28:28.490000
|
||||
CVE-2024-43853,0,1,36efb4595067b56d7e5fcb48cb087d35edd1df5e2fba303124fad2de2b6dde32,2024-08-22T18:06:38.087000
|
||||
CVE-2024-43854,0,1,72b23f2522211646b59fb2af8abb234e4c5bc99d8683607813e7cc7231678efc,2024-08-22T18:12:28.620000
|
||||
CVE-2024-43855,0,0,b20a91fb4977616b14c0349af9fe6fdf38deab2ab7796fadba2ea00dab4f6345,2024-08-22T17:48:09.100000
|
||||
CVE-2024-43856,0,0,91d346c264b1a27e13a95a79650da4390a2d02a7cc5798231b8314954af3044d,2024-08-22T17:57:08.640000
|
||||
CVE-2024-43857,0,0,1770874efc8d117e3bd251f738e88729b0ef15b20bed1182b733a19e974e06d4,2024-08-22T17:38:21.003000
|
||||
CVE-2024-43858,0,0,af09898ffa278eaf458ba54f4590eb4fb3ade046d9a31e9697e73bd46738182b,2024-08-22T17:40:11.663000
|
||||
CVE-2024-43859,0,0,c80f1d20a200e8e7c04740035b687c5519ed09874bdbbd064f52b001212ddb3c,2024-08-22T17:28:28.490000
|
||||
CVE-2024-4386,0,0,731d04018d6299c9e1d8f7a212148a53db39578a94a703a0b90337f63dd3089f,2024-05-14T16:11:39.510000
|
||||
CVE-2024-43860,0,1,09f701f7954bb547deb131405fc8454ea2909d63034fedfeaae4e6b22ac05cfc,2024-08-22T17:08:15.097000
|
||||
CVE-2024-43860,0,0,09f701f7954bb547deb131405fc8454ea2909d63034fedfeaae4e6b22ac05cfc,2024-08-22T17:08:15.097000
|
||||
CVE-2024-43861,0,0,356b6dbbcd5535ba76dcd78a87fd5df7522157cacaed0327954273ead9025b21,2024-08-21T12:30:33.697000
|
||||
CVE-2024-43862,0,0,73b429ba4062c240ef5657760dd2797510410c65046b141eae59e5a01f4e0f39,2024-08-21T12:30:33.697000
|
||||
CVE-2024-43863,0,0,8e5e01d22b57359fcf091d9531df2ac12c42d526d43aa46ba9fd057c2b2d9772,2024-08-21T12:30:33.697000
|
||||
@ -258409,9 +258412,9 @@ CVE-2024-45169,0,0,9c1ccfed5f8c51cc81c5cd2eec094329fe2aa7c6c132e4f4099baad9dc306
|
||||
CVE-2024-4517,0,0,3fa4b03e407f8fc963e6e42e2d6f56f1c6623d21471e9883bdedad7e9bb00507,2024-06-04T19:20:41.030000
|
||||
CVE-2024-4518,0,0,64c3b6e6e74f6d9fd929463119875b686279109a997143c5dd3ad8e2c1af1355,2024-05-17T02:40:27.187000
|
||||
CVE-2024-4519,0,0,5f7c1c0aa362af4fc3ba7e1d12e176f4028e88f0167af6f63c30c7ec7da86837,2024-06-04T19:20:41.127000
|
||||
CVE-2024-45191,1,1,a815b047b39b41a8006b9cc6e51c48cec3d8d1ca119fb37d18f67f94ea762f7f,2024-08-22T16:15:10.120000
|
||||
CVE-2024-45192,1,1,fb72912d08ea4a658d1c69d4cfebe6a1e383484234c392f3119eb1f8034b4d2e,2024-08-22T16:15:10.237000
|
||||
CVE-2024-45193,1,1,e2d2a95ce15a049c74af7a52d095d6013d9809c1ea23c07c1fdda34b6d50e120,2024-08-22T16:15:10.300000
|
||||
CVE-2024-45191,0,0,a815b047b39b41a8006b9cc6e51c48cec3d8d1ca119fb37d18f67f94ea762f7f,2024-08-22T16:15:10.120000
|
||||
CVE-2024-45192,0,1,0fc95418e65db4d92a13ea1880011534b2cfc4ab1403f85d1ff524c8b4c52075,2024-08-22T19:35:40.953000
|
||||
CVE-2024-45193,0,0,e2d2a95ce15a049c74af7a52d095d6013d9809c1ea23c07c1fdda34b6d50e120,2024-08-22T16:15:10.300000
|
||||
CVE-2024-4520,0,0,b2949348c863aeabf77cf8262dadc8a1301ac645ed88723ebde503df8cb28e51,2024-06-11T17:02:16.967000
|
||||
CVE-2024-4521,0,0,a1d240438f25322e21494c2ddd2f5ee26b23410f012534bc2c27a0a49b09a860,2024-06-04T19:20:41.223000
|
||||
CVE-2024-4522,0,0,acd0b6b231758473c48ed22daa75c2f0d87280406667aa3ced0f39aaa73cb777,2024-06-04T19:20:41.320000
|
||||
@ -259317,8 +259320,8 @@ CVE-2024-5550,0,0,dab352871e5b1599db274fe7ee72f4ef4902afffcd5667b3ef675a3fe452e4
|
||||
CVE-2024-5551,0,0,d4fe322803a15d54f942643eecca544bbc21fd2d50a048ef751f6568e43cd352,2024-08-07T19:09:17.363000
|
||||
CVE-2024-5552,0,0,7f73b574dd8e83d52dd7f28ecc579b960fbf7de562da98c7e63b5b8e0fd54be8,2024-06-07T14:56:05.647000
|
||||
CVE-2024-5553,0,0,c4739ca4bfc71591786473d36aff26ccf561ba778e4c902dca863cedff7bba13,2024-06-13T18:36:09.013000
|
||||
CVE-2024-5554,0,1,0f1d3226bb0a486c4b917c91c2f0f711d8f9d9fbb5ad6f69f3a6a7fdce6ab9ad,2024-08-22T16:43:52.650000
|
||||
CVE-2024-5555,0,1,ea0332df14a2e6edd0aa953ada9ade3a1da4ea6fb56dda0883a54ace27f96d97,2024-08-22T16:46:14.177000
|
||||
CVE-2024-5554,0,0,0f1d3226bb0a486c4b917c91c2f0f711d8f9d9fbb5ad6f69f3a6a7fdce6ab9ad,2024-08-22T16:43:52.650000
|
||||
CVE-2024-5555,0,0,ea0332df14a2e6edd0aa953ada9ade3a1da4ea6fb56dda0883a54ace27f96d97,2024-08-22T16:46:14.177000
|
||||
CVE-2024-5557,0,0,71e19027344115370537e5e9f2ac729a9013865b6ffe7632f9b652113dae4753,2024-07-25T20:00:46.653000
|
||||
CVE-2024-5558,0,0,d7061155c6f430b38a1e769635e4eca1c24478e5beedfff7ff120ab1f85e7481,2024-07-25T20:00:25.773000
|
||||
CVE-2024-5559,0,0,0c59604cbf219c2ba1c247f52c304752b12dd0f3c92c8b3c96e21ad233f99b0a,2024-06-13T18:36:09.010000
|
||||
@ -259789,7 +259792,7 @@ CVE-2024-6160,0,0,ef1a3b3e7f3366ded429b369db1d335204ba1e5aa345b7b6a0087f8051f247
|
||||
CVE-2024-6161,0,0,4874ef369326f57ebaead3e865a12df6057ceb7ec30e698c3deb9b52e2b10028,2024-07-09T18:19:14.047000
|
||||
CVE-2024-6162,0,0,42b0c84bb9f8407ee29b440898aa638cfeb455faf60863456bc05225330b70ad,2024-08-05T15:15:54.090000
|
||||
CVE-2024-6163,0,0,38b12c0f7e168992652ab7a71785fb2aab63391cb3f79d2e2dd970485bc5678f,2024-08-20T17:44:11.677000
|
||||
CVE-2024-6164,0,1,08afad8ab6b717af0b90be7bbe2f7a32357bf99ca8728b0f338d52b01a06d786,2024-08-22T16:35:18.693000
|
||||
CVE-2024-6164,0,0,08afad8ab6b717af0b90be7bbe2f7a32357bf99ca8728b0f338d52b01a06d786,2024-08-22T16:35:18.693000
|
||||
CVE-2024-6165,0,0,6301727d4094498886864a9dae2aa85ba81a15451475733d92db12396ffe834c,2024-08-01T14:00:13.553000
|
||||
CVE-2024-6166,0,0,c93093bf8454afe95675994fb929c06931906789a59088dfba4992e2491ed4c6,2024-07-12T14:23:53.600000
|
||||
CVE-2024-6167,0,0,53411719c1d4f7c7e0b31dcbc40822727b85ab3cd28b45158c4db6b81cb57664,2024-07-09T18:19:14.047000
|
||||
@ -260051,7 +260054,7 @@ CVE-2024-6497,0,0,b980a8afca3367d307f1b8ae084c1de1478e48fcb0a6d42a16be67c3823c34
|
||||
CVE-2024-6498,0,0,630981d31a800e5a325158bdb522b2e1db688d536ea57caaef1013f6348f0ce8,2024-08-05T12:41:45.957000
|
||||
CVE-2024-6500,0,0,d6e17cf29259cccc059c07e88e123ff08e9fd8308cfe5e11844bc5a9a1491c18,2024-08-19T13:00:23.117000
|
||||
CVE-2024-6501,0,0,45d58d6fcd90c3b83531e796541078a549af17f7a81eb1fbfe7d6944aa2bc8ac,2024-07-11T13:06:13.187000
|
||||
CVE-2024-6502,1,1,1f22fb0e7d7ba54b58395d225d1dfe244f49ebfd7f5ec9024690cf313b498a4a,2024-08-22T16:15:10.377000
|
||||
CVE-2024-6502,0,0,1f22fb0e7d7ba54b58395d225d1dfe244f49ebfd7f5ec9024690cf313b498a4a,2024-08-22T16:15:10.377000
|
||||
CVE-2024-6504,0,0,8b12236aeea36b8f50ca52878af23b200b8eec2ab40fe418832b1f4c4c6b95f9,2024-07-18T12:28:43.707000
|
||||
CVE-2024-6505,0,0,b8708084cd092b6ca88acb18ad5e80f748f8e2829ec040b8958bfe3c1fee2cd6,2024-07-08T15:41:17.883000
|
||||
CVE-2024-6506,0,0,58310ca3e68e3dacb16dafd9b32db187bdf111a88d3da008267c8c84bbec48d6,2024-07-05T12:55:51.367000
|
||||
@ -260415,7 +260418,7 @@ CVE-2024-7100,0,0,dcfec02e0ae4a6f64f97ae0297c66dfbc0aebe11e663bfc596e9b5b147ad74
|
||||
CVE-2024-7101,0,0,5454c1208509de59c11b3527ed3914e0b9b453785a2425c8a2e412da33d0d539,2024-07-26T12:38:41.683000
|
||||
CVE-2024-7105,0,0,a997b2c0e4e91d96626adcc721c978e22c9883ba6b9b8f61b29dff1a03ad516f,2024-07-26T12:38:41.683000
|
||||
CVE-2024-7106,0,0,ff3ffd817a427576052bad31a6af61e50bfb0473d392446ac87a1106350f920d,2024-08-13T14:15:31.030000
|
||||
CVE-2024-7110,1,1,f89c34f450c50e2099e6f7cb76c4d9dbe54e7cd373814ff226a3ae48feb13a3d,2024-08-22T16:15:10.627000
|
||||
CVE-2024-7110,0,0,f89c34f450c50e2099e6f7cb76c4d9dbe54e7cd373814ff226a3ae48feb13a3d,2024-08-22T16:15:10.627000
|
||||
CVE-2024-7113,0,0,0a8f4221b6e071d6c72a8ad7c45f4c251b092637dae636c0dfdbfb44a73d4a6e,2024-08-14T02:07:05.410000
|
||||
CVE-2024-7114,0,0,63b5a866782f89fc9f6ac1d30b03e6de66da2ca9dd341d6c07330fc52fb56b69,2024-07-26T12:38:41.683000
|
||||
CVE-2024-7115,0,0,d198b7c0d1a7a67e83535bd15c8ec8b27ae3282d7abe6e695fb34b6781238fb3,2024-08-08T19:06:00.017000
|
||||
@ -260761,6 +260764,7 @@ CVE-2024-7628,0,0,13c6e75993fc4e0ea638854e2c037e11703f2e05b1bb0a7d2173b121da5472
|
||||
CVE-2024-7629,0,0,45eb45459388d6798e88edee38a7dd2ceac912098ce5cc3a42af5f252bb2fbc1,2024-08-21T12:30:33.697000
|
||||
CVE-2024-7630,0,0,418e383b03350a1fa5d21be50b8eebc36b3c165fb7c794a3b77aa7313e9af0aa,2024-08-19T13:00:23.117000
|
||||
CVE-2024-7633,0,0,3b1df1487eb71af2061753f656e2660f3fdd60b89404cd84fa2c01a4dff29ee6,2024-08-12T13:38:45.690000
|
||||
CVE-2024-7634,1,1,d6d95d6be7118359eb1835d8d0fa1c2d139f74d8132d5d9170668a31dc0ed049,2024-08-22T18:15:10.553000
|
||||
CVE-2024-7635,0,0,77137333cb856f76f03e4b50e0e5dbce5cc99fa466aafebf6530d8cfb2e96fdd,2024-08-15T18:12:33.270000
|
||||
CVE-2024-7636,0,0,81414365f80fa57b345628baccc97b68e4a32475a3dd61fce01a599a3ee31eee,2024-08-15T18:13:23.327000
|
||||
CVE-2024-7637,0,0,07fff1a7df418b9e3b67d234f6aa590337509d3b6198aaa332e768f862723c65,2024-08-15T18:15:15.667000
|
||||
@ -260934,32 +260938,33 @@ CVE-2024-7947,0,0,65fb4d7d58134ef9bc023552b764ff03308d80cb6ca6d1287d9d812240a193
|
||||
CVE-2024-7948,0,0,10e56bd82889acf527e731295a76df26abf6e1bd128042058528282707ce870d,2024-08-21T13:52:38.057000
|
||||
CVE-2024-7949,0,0,64b957370c21ddcba0bc925ad861d01e09364475441bf650c2c5e65485084163,2024-08-21T19:15:13.600000
|
||||
CVE-2024-7958,0,0,483ea949f242fd0880547068782264d397026329e525a14dcbacca7c22e7bcec,2024-08-19T20:15:08.907000
|
||||
CVE-2024-7964,0,1,c52134917f72c90e63a54f50f2b1a96c22bef052773e66c5f63a5749f9629303,2024-08-22T17:44:47.560000
|
||||
CVE-2024-7964,0,0,c52134917f72c90e63a54f50f2b1a96c22bef052773e66c5f63a5749f9629303,2024-08-22T17:44:47.560000
|
||||
CVE-2024-7965,0,0,efa0555bbb67557f1f4f029b94195e1d9dc4a9cf7b553840ebdc5072a02f2db9,2024-08-22T14:35:15.280000
|
||||
CVE-2024-7966,0,1,c834c0011ca06a1efd266a4239a473434dee53599a1a84163bf0336c2d5b29a3,2024-08-22T17:44:11.147000
|
||||
CVE-2024-7966,0,0,c834c0011ca06a1efd266a4239a473434dee53599a1a84163bf0336c2d5b29a3,2024-08-22T17:44:11.147000
|
||||
CVE-2024-7967,0,0,6b9e3bc6003fa2e0640f930f9d670867e7411229c66a601e6cbe6f8eaf351c0d,2024-08-22T14:35:16.310000
|
||||
CVE-2024-7968,0,1,da660cd047ae7ab70548a94fe3bdc25d42e767c3eac17d765635320e381d048e,2024-08-22T17:41:56.847000
|
||||
CVE-2024-7969,0,1,5d7da0c2013aed33a237ee1ce4d97e9da2011ff310b073e3d8709a4f478578bb,2024-08-22T17:42:47.627000
|
||||
CVE-2024-7968,0,0,da660cd047ae7ab70548a94fe3bdc25d42e767c3eac17d765635320e381d048e,2024-08-22T17:41:56.847000
|
||||
CVE-2024-7969,0,0,5d7da0c2013aed33a237ee1ce4d97e9da2011ff310b073e3d8709a4f478578bb,2024-08-22T17:42:47.627000
|
||||
CVE-2024-7971,0,0,5406efa61c68652b55c12fe54555241d6d0e600bbe58e6909119226df13133b0,2024-08-22T14:35:17.313000
|
||||
CVE-2024-7972,0,0,70b5b4000609ceeb60deedf7c0d82b9e59e80aae5bf8399f48b8e878bf408f8b,2024-08-22T15:35:14.597000
|
||||
CVE-2024-7973,0,0,fb795d32a144ad521439e1fe4e5042ac17e2b8505faf35a28d1bc7d4c5a4483d,2024-08-22T15:35:15.597000
|
||||
CVE-2024-7974,0,1,4f1766ede0a46e011fd6362a463054e086647121f22e7cff04b5a03dfc3c746c,2024-08-22T17:40:27.950000
|
||||
CVE-2024-7975,0,1,6eead3f121fb76c19460ccba2d1c91cf33314b233f7cc8d0a23049d05e30e6a0,2024-08-22T17:40:09.223000
|
||||
CVE-2024-7976,0,1,8ea67749dc2e0457db6f465664717bd53fa70c14a92a0f107f894d380039b546,2024-08-22T17:39:54.540000
|
||||
CVE-2024-7977,0,1,376d3398785a73c2927625b4057b1ad21ad4db08c185aea810399ba8f1f4ab5b,2024-08-22T17:39:32.730000
|
||||
CVE-2024-7978,0,1,67c4229f7235438f3aa7b05e7807f93765050dcc016da021af4e6ebc6fa52ea9,2024-08-22T17:38:11.200000
|
||||
CVE-2024-7974,0,0,4f1766ede0a46e011fd6362a463054e086647121f22e7cff04b5a03dfc3c746c,2024-08-22T17:40:27.950000
|
||||
CVE-2024-7975,0,0,6eead3f121fb76c19460ccba2d1c91cf33314b233f7cc8d0a23049d05e30e6a0,2024-08-22T17:40:09.223000
|
||||
CVE-2024-7976,0,0,8ea67749dc2e0457db6f465664717bd53fa70c14a92a0f107f894d380039b546,2024-08-22T17:39:54.540000
|
||||
CVE-2024-7977,0,0,376d3398785a73c2927625b4057b1ad21ad4db08c185aea810399ba8f1f4ab5b,2024-08-22T17:39:32.730000
|
||||
CVE-2024-7978,0,0,67c4229f7235438f3aa7b05e7807f93765050dcc016da021af4e6ebc6fa52ea9,2024-08-22T17:38:11.200000
|
||||
CVE-2024-7979,0,0,078bf6b1178f274a34fc1356c3dbffb7074d9c903c74e589d1b081f58230d3ec,2024-08-22T15:35:16.610000
|
||||
CVE-2024-7980,0,0,1661097b9193f473ee067de4d4f40312756af353419ed3265d5438cf70d837f5,2024-08-22T15:35:17.610000
|
||||
CVE-2024-7981,0,1,558a7e30af48c73a27172093229eee673e34b504c9731b910b5af4369614c86c,2024-08-22T17:36:24.803000
|
||||
CVE-2024-7981,0,0,558a7e30af48c73a27172093229eee673e34b504c9731b910b5af4369614c86c,2024-08-22T17:36:24.803000
|
||||
CVE-2024-7998,0,0,8aa3505a1b6ed462573d7b65c55c5633ff88a81168885ae03bec6b1db69a2167,2024-08-21T12:30:33.697000
|
||||
CVE-2024-8003,0,0,1eb6cc8bd16248d54ed281136e233da0a723cb74879af6e3337c9532a3caf8e1,2024-08-21T15:51:28.397000
|
||||
CVE-2024-8005,0,0,c059370cb975aea915e5671e32cb80d879151797480dbd5423b1593aeba96675,2024-08-21T15:49:59.470000
|
||||
CVE-2024-8007,0,0,d227b03f895ef761f269cb1491d7d5722db05e40b51b1467b77f2f84ee5beceb,2024-08-21T16:06:23.153000
|
||||
CVE-2024-8022,0,0,469d074c70ed4d6e1b7ca7023005d3bb3e3f23419b5a39b3540fd69e34fadcaa,2024-08-21T12:30:33.697000
|
||||
CVE-2024-8023,0,0,7f1c10536d9d4e1a728f09b10c1ff35f77d0bba503a7c61c411fbfd5f6584d46,2024-08-21T12:30:33.697000
|
||||
CVE-2024-8033,0,1,a55cf019f91370d30ea7734ed696c6e008634912634c88c606ef5f6209b81cb2,2024-08-22T17:36:07.673000
|
||||
CVE-2024-8034,0,1,990fb53670bf6f787a3d54c0392722fc0a67a939e8056c22142bc6f2bee92a38,2024-08-22T17:35:30.003000
|
||||
CVE-2024-8035,0,1,e11fe8c378f080395f404658baee2e1c5cd70ef826bdf0b13fe46f85c653ad4a,2024-08-22T17:33:37.407000
|
||||
CVE-2024-8041,1,1,a1cbdddbce69857892b2d0881ba6bfcc668b66194ac3d90441c1bdbb66f0dae3,2024-08-22T16:15:10.880000
|
||||
CVE-2024-8033,0,0,a55cf019f91370d30ea7734ed696c6e008634912634c88c606ef5f6209b81cb2,2024-08-22T17:36:07.673000
|
||||
CVE-2024-8034,0,0,990fb53670bf6f787a3d54c0392722fc0a67a939e8056c22142bc6f2bee92a38,2024-08-22T17:35:30.003000
|
||||
CVE-2024-8035,0,0,e11fe8c378f080395f404658baee2e1c5cd70ef826bdf0b13fe46f85c653ad4a,2024-08-22T17:33:37.407000
|
||||
CVE-2024-8041,0,0,a1cbdddbce69857892b2d0881ba6bfcc668b66194ac3d90441c1bdbb66f0dae3,2024-08-22T16:15:10.880000
|
||||
CVE-2024-8071,0,0,41d62a2818ebc39a47942042600f7172df861ffe79f8871e225899553216e03c,2024-08-22T12:48:02.790000
|
||||
CVE-2024-8072,0,0,08fafb0bed7b0568fefcb8938e0e01cf4acf3cb153d4b847bc3e1d9427344a62,2024-08-22T14:35:18.797000
|
||||
CVE-2024-8088,1,1,4ef83eee673ee14bb05eb2757d0f3a4f17e1e757b372b527d200b6de8438c4b6,2024-08-22T19:15:09.720000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user