mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-07 19:16:29 +00:00
Auto-Update: 2024-10-14T18:00:18.159658+00:00
This commit is contained in:
parent
403cc85267
commit
59953b0434
33
CVE-2023/CVE-2023-507xx/CVE-2023-50780.json
Normal file
33
CVE-2023/CVE-2023-507xx/CVE-2023-50780.json
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
"id": "CVE-2023-50780",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-10-14T16:15:03.477",
|
||||
"lastModified": "2024-10-14T16:15:03.477",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Apache ActiveMQ Artemis allows access to diagnostic information and controls through MBeans, which are also exposed through the authenticated Jolokia endpoint. Before version 2.29.0, this also included the Log4J2 MBean. This MBean is not meant for exposure to non-administrative users. This could eventually allow an authenticated attacker to write arbitrary files to the filesystem and indirectly achieve RCE.\n\n\nUsers are recommended to upgrade to version 2.29.0 or later, which fixes the issue."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@apache.org",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-285"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://lists.apache.org/thread/63b78shqz312phsx7v1ryr7jv7bprg58",
|
||||
"source": "security@apache.org"
|
||||
}
|
||||
]
|
||||
}
|
33
CVE-2024/CVE-2024-419xx/CVE-2024-41997.json
Normal file
33
CVE-2024/CVE-2024-419xx/CVE-2024-41997.json
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
"id": "CVE-2024-41997",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-14T16:15:03.640",
|
||||
"lastModified": "2024-10-14T16:15:03.640",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in version of Warp Terminal prior to 2024.07.18 (v0.2024.07.16.08.02). A command injection vulnerability exists in the Docker integration functionality. An attacker can create a specially crafted hyperlink using the `warp://action/docker/open_subshell` intent that when clicked by the victim results in command execution on the victim's machine."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://docs.warp.dev/features/integrations-and-plugins#docker",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://docs.warp.dev/getting-started/changelog#id-2024.07.18-v0.2024.07.16.08.02",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://gist.github.com/bhyh/d1ee7a825fce283bf8acbdb42c8a7832",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/warpdotdev/warp",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-457xx/CVE-2024-45731.json
Normal file
60
CVE-2024/CVE-2024-457xx/CVE-2024-45731.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-45731",
|
||||
"sourceIdentifier": "prodsec@splunk.com",
|
||||
"published": "2024-10-14T17:15:11.177",
|
||||
"lastModified": "2024-10-14T17:15:11.177",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In Splunk Enterprise for Windows versions below 9.3.1, 9.2.3, and 9.1.6, a low-privileged user that does not hold the \"admin\" or \"power\" Splunk roles could write a file to the Windows system root directory, which has a default location in the Windows System32 folder, when Splunk Enterprise for Windows is installed on a separate drive."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "prodsec@splunk.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.0,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.3,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "prodsec@splunk.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-23"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://advisory.splunk.com/advisories/SVD-2024-1001",
|
||||
"source": "prodsec@splunk.com"
|
||||
},
|
||||
{
|
||||
"url": "https://research.splunk.com/application/c97e0704-d9c6-454d-89ba-1510a987bf72/",
|
||||
"source": "prodsec@splunk.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-457xx/CVE-2024-45732.json
Normal file
60
CVE-2024/CVE-2024-457xx/CVE-2024-45732.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-45732",
|
||||
"sourceIdentifier": "prodsec@splunk.com",
|
||||
"published": "2024-10-14T17:15:11.410",
|
||||
"lastModified": "2024-10-14T17:15:11.410",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In Splunk Enterprise versions below 9.3.1, and 9.2.0 versions below 9.2.3, and Splunk Cloud Platform versions below 9.2.2403.103, 9.1.2312.200, 9.1.2312.110 and 9.1.2308.208, a low-privileged user that does not hold the \"admin\" or \"power\" Splunk roles could run a search as the \"nobody\" Splunk user in the SplunkDeploymentServerConfig app. This could let the low-privileged user access potentially restricted data."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "prodsec@splunk.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 4.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "prodsec@splunk.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://advisory.splunk.com/advisories/SVD-2024-1002",
|
||||
"source": "prodsec@splunk.com"
|
||||
},
|
||||
{
|
||||
"url": "https://research.splunk.com/application/f765c3fe-c3b6-4afe-a932-11dd4f3a024f/",
|
||||
"source": "prodsec@splunk.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-457xx/CVE-2024-45733.json
Normal file
60
CVE-2024/CVE-2024-457xx/CVE-2024-45733.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-45733",
|
||||
"sourceIdentifier": "prodsec@splunk.com",
|
||||
"published": "2024-10-14T17:15:11.657",
|
||||
"lastModified": "2024-10-14T17:15:11.657",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In Splunk Enterprise for Windows versions below 9.2.3 and 9.1.6, a low-privileged user that does not hold the \"admin\" or \"power\" Splunk roles could perform a Remote Code Execution (RCE) due to an insecure session storage configuration."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "prodsec@splunk.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "prodsec@splunk.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-502"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://advisory.splunk.com/advisories/SVD-2024-1003",
|
||||
"source": "prodsec@splunk.com"
|
||||
},
|
||||
{
|
||||
"url": "https://research.splunk.com/application/c97e0704-d9c6-454d-89ba-1510a987bf72/",
|
||||
"source": "prodsec@splunk.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-457xx/CVE-2024-45734.json
Normal file
60
CVE-2024/CVE-2024-457xx/CVE-2024-45734.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-45734",
|
||||
"sourceIdentifier": "prodsec@splunk.com",
|
||||
"published": "2024-10-14T17:15:11.850",
|
||||
"lastModified": "2024-10-14T17:15:11.850",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In Splunk Enterprise versions 9.3.0, 9.2.3, and 9.1.6, a low-privileged user that does not hold the \"admin\" or \"power\" Splunk roles could view images on the machine that runs Splunk Enterprise by using the PDF export feature in Splunk classic dashboards. The images on the machine could be exposed by exporting the dashboard as a PDF, using the local image path in the img tag in the source extensible markup language (XML) code for the Splunk classic dashboard."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "prodsec@splunk.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "prodsec@splunk.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://advisory.splunk.com/advisories/SVD-2024-1004",
|
||||
"source": "prodsec@splunk.com"
|
||||
},
|
||||
{
|
||||
"url": "https://research.splunk.com/application/7464e2dc-98a5-4af9-87a1-fa6d5a256fa6/",
|
||||
"source": "prodsec@splunk.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-457xx/CVE-2024-45735.json
Normal file
60
CVE-2024/CVE-2024-457xx/CVE-2024-45735.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-45735",
|
||||
"sourceIdentifier": "prodsec@splunk.com",
|
||||
"published": "2024-10-14T17:15:12.053",
|
||||
"lastModified": "2024-10-14T17:15:12.053",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In Splunk Enterprise versions below 9.2.3 and 9.1.6, and Splunk Secure Gateway versions on Splunk Cloud Platform versions below 3.4.259, 3.6.17, and 3.7.0, a low-privileged user that does not hold the \"admin\" or \"power\" Splunk roles can see App Key Value Store (KV Store) deployment configuration and public/private keys in the Splunk Secure Gateway App."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "prodsec@splunk.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "prodsec@splunk.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://advisory.splunk.com/advisories/SVD-2024-1005",
|
||||
"source": "prodsec@splunk.com"
|
||||
},
|
||||
{
|
||||
"url": "https://research.splunk.com/application/0a3d6035-7bef-4dfa-b01e-84349edac3b4/",
|
||||
"source": "prodsec@splunk.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-457xx/CVE-2024-45736.json
Normal file
60
CVE-2024/CVE-2024-457xx/CVE-2024-45736.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-45736",
|
||||
"sourceIdentifier": "prodsec@splunk.com",
|
||||
"published": "2024-10-14T17:15:12.253",
|
||||
"lastModified": "2024-10-14T17:15:12.253",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In Splunk Enterprise versions below 9.3.1, 9.2.3, and 9.1.6 and Splunk Cloud Platform versions below 9.2.2403.107, 9.1.2312.204, and 9.1.2312.111, a low-privileged user that does not hold the \"admin\" or \"power\" Splunk roles could craft a search query with an improperly formatted \"INGEST_EVAL\" parameter as part of a [Field Transformation](https://docs.splunk.com/Documentation/Splunk/latest/Knowledge/Managefieldtransforms) which could crash the Splunk daemon (splunkd)."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "prodsec@splunk.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "prodsec@splunk.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-400"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://advisory.splunk.com/advisories/SVD-2024-1006",
|
||||
"source": "prodsec@splunk.com"
|
||||
},
|
||||
{
|
||||
"url": "https://research.splunk.com/application/08978eca-caff-44c1-84dc-53f17def4e14/",
|
||||
"source": "prodsec@splunk.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-457xx/CVE-2024-45737.json
Normal file
60
CVE-2024/CVE-2024-457xx/CVE-2024-45737.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-45737",
|
||||
"sourceIdentifier": "prodsec@splunk.com",
|
||||
"published": "2024-10-14T17:15:12.453",
|
||||
"lastModified": "2024-10-14T17:15:12.453",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In Splunk Enterprise versions below 9.3.1, 9.2.3, and 9.1.6 and Splunk Cloud Platform versions below 9.2.2403.108, and 9.1.2312.204, a low-privileged user that does not hold the \"admin\" or \"power\" Splunk roles could change the maintenance mode state of App Key Value Store (KVStore) through a Cross-Site Request Forgery (CSRF)."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "prodsec@splunk.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "prodsec@splunk.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://advisory.splunk.com/advisories/SVD-2024-1007",
|
||||
"source": "prodsec@splunk.com"
|
||||
},
|
||||
{
|
||||
"url": "https://research.splunk.com/application/34bac267-a89b-4bd7-a072-a48eef1f15b8/",
|
||||
"source": "prodsec@splunk.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-457xx/CVE-2024-45738.json
Normal file
60
CVE-2024/CVE-2024-457xx/CVE-2024-45738.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-45738",
|
||||
"sourceIdentifier": "prodsec@splunk.com",
|
||||
"published": "2024-10-14T17:15:12.660",
|
||||
"lastModified": "2024-10-14T17:15:12.660",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In Splunk Enterprise versions below 9.3.1, 9.2.3, and 9.1.6, the software potentially exposes sensitive HTTP parameters to the `_internal` index. This exposure could happen if you configure the Splunk Enterprise `REST_Calls` log channel at the DEBUG logging level."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "prodsec@splunk.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "prodsec@splunk.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://advisory.splunk.com/advisories/SVD-2024-1008",
|
||||
"source": "prodsec@splunk.com"
|
||||
},
|
||||
{
|
||||
"url": "https://research.splunk.com/application/93dc7182-c5da-4085-82ec-401abf33d623/",
|
||||
"source": "prodsec@splunk.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-457xx/CVE-2024-45739.json
Normal file
60
CVE-2024/CVE-2024-457xx/CVE-2024-45739.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-45739",
|
||||
"sourceIdentifier": "prodsec@splunk.com",
|
||||
"published": "2024-10-14T17:15:12.860",
|
||||
"lastModified": "2024-10-14T17:15:12.860",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In Splunk Enterprise versions below 9.3.1, 9.2.3, and 9.1.6, the software potentially exposes plaintext passwords for local native authentication Splunk users. This exposure could happen when you configure the Splunk Enterprise AdminManager log channel at the DEBUG logging level."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "prodsec@splunk.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "prodsec@splunk.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://advisory.splunk.com/advisories/SVD-2024-1009",
|
||||
"source": "prodsec@splunk.com"
|
||||
},
|
||||
{
|
||||
"url": "https://research.splunk.com/application/93dc7182-c5da-4085-82ec-401abf33d623/",
|
||||
"source": "prodsec@splunk.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-457xx/CVE-2024-45740.json
Normal file
60
CVE-2024/CVE-2024-457xx/CVE-2024-45740.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-45740",
|
||||
"sourceIdentifier": "prodsec@splunk.com",
|
||||
"published": "2024-10-14T17:15:13.047",
|
||||
"lastModified": "2024-10-14T17:15:13.047",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In Splunk Enterprise versions below 9.2.3 and 9.1.6 and Splunk Cloud Platform versions below 9.2.2403, a low-privileged user that does not hold the \"admin\" or \"power\" Splunk roles could craft a malicious payload through Scheduled Views that could result in execution of unauthorized JavaScript code in the browser of a user."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "prodsec@splunk.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "prodsec@splunk.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://advisory.splunk.com/advisories/SVD-2024-1010",
|
||||
"source": "prodsec@splunk.com"
|
||||
},
|
||||
{
|
||||
"url": "https://research.splunk.com/application/d4f55f7c-6518-4122-a197-951fe0f21b25/",
|
||||
"source": "prodsec@splunk.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-457xx/CVE-2024-45741.json
Normal file
60
CVE-2024/CVE-2024-457xx/CVE-2024-45741.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-45741",
|
||||
"sourceIdentifier": "prodsec@splunk.com",
|
||||
"published": "2024-10-14T17:15:13.250",
|
||||
"lastModified": "2024-10-14T17:15:13.250",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In Splunk Enterprise versions below 9.2.3 and 9.1.6 and Splunk Cloud Platform versions below 9.2.2403.108 and 9.1.2312.205, a low-privileged user that does not hold the \"admin\" or \"power\" Splunk roles could create a malicious payload through a custom configuration file that the \"api.uri\" parameter from the \"/manager/search/apps/local\" endpoint in Splunk Web calls. This could result in execution of unauthorized JavaScript code in the browser of a user."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "prodsec@splunk.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "prodsec@splunk.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://advisory.splunk.com/advisories/SVD-2024-1011",
|
||||
"source": "prodsec@splunk.com"
|
||||
},
|
||||
{
|
||||
"url": "https://research.splunk.com/application/d7b5aa71-157f-4359-9c34-e35752b1d0a2/",
|
||||
"source": "prodsec@splunk.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-465xx/CVE-2024-46535.json
Normal file
21
CVE-2024/CVE-2024-465xx/CVE-2024-46535.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-46535",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-14T17:15:13.440",
|
||||
"lastModified": "2024-10-14T17:15:13.440",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Jepaas v7.2.8 was discovered to contain a SQL injection vulnerability via the orderSQL parameter at /homePortal/loadUserMsg."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitee.com/ketr/jepaas-release/issues/IAPJ8H?from=project-issue",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-481xx/CVE-2024-48150.json
Normal file
21
CVE-2024/CVE-2024-481xx/CVE-2024-48150.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-48150",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-14T16:15:03.750",
|
||||
"lastModified": "2024-10-14T16:15:03.750",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "D-Link DIR-820L 1.05B03 has a stack overflow vulnerability in the sub_451208 function."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/fu37kola/cve/blob/main/D-Link/DIR-820L/D-Link%20DIR-820L%20Stack%20Overflow%20Vulnerability.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-481xx/CVE-2024-48153.json
Normal file
21
CVE-2024/CVE-2024-481xx/CVE-2024-48153.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-48153",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-14T16:15:03.840",
|
||||
"lastModified": "2024-10-14T16:15:03.840",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "DrayTek Vigor3900 1.5.1.3 allows attackers to inject malicious commands into mainfunction.cgi and execute arbitrary commands by calling the get_subconfig function."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/tw11ty/CVE/blob/main/DrayTek/Vigor3900/Vigor3900%20command%20execution%20vulnerability.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-481xx/CVE-2024-48168.json
Normal file
21
CVE-2024/CVE-2024-481xx/CVE-2024-48168.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-48168",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-14T17:15:13.520",
|
||||
"lastModified": "2024-10-14T17:15:13.520",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A stack overflow vulnerability exists in the sub_402280 function of the HNAP service of D-Link DCS-960L 1.09, allowing an attacker to execute arbitrary code."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/fu37kola/cve/blob/main/D-Link/DCS-960L/D-Link%20DCS-960L%201.09%20Stack%20overflow_1.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-487xx/CVE-2024-48796.json
Normal file
25
CVE-2024/CVE-2024-487xx/CVE-2024-48796.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-48796",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-14T17:15:13.610",
|
||||
"lastModified": "2024-10-14T17:15:13.610",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in EQUES com.eques.plug 1.0.1 allows a remote attacker to obtain sensitive information via the firmware update process."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.eques.cn/?lang=en",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/HankJames/Vul-Reports/blob/main/FirmwareLeakage/com.eques.plug/com.eques.plug.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-487xx/CVE-2024-48797.json
Normal file
25
CVE-2024/CVE-2024-487xx/CVE-2024-48797.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-48797",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-14T17:15:13.690",
|
||||
"lastModified": "2024-10-14T17:15:13.690",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in PCS Engineering Preston Cinema (com.prestoncinema.app) 0.2.0 allows a remote attacker to obtain sensitive information via the firmware update process."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.pcsengineering.net/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/HankJames/Vul-Reports/blob/main/FirmwareLeakage/com.prestoncinema.app/com.prestoncinema.app.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-487xx/CVE-2024-48798.json
Normal file
25
CVE-2024/CVE-2024-487xx/CVE-2024-48798.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-48798",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-14T17:15:13.770",
|
||||
"lastModified": "2024-10-14T17:15:13.770",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in Hubble Connected (com.hubbleconnected.vervelife) 2.00.81 allows a remote attacker to obtain sensitive information via the firmware update process."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/HankJames/Vul-Reports/blob/main/FirmwareLeakage/com.hubbleconnected.vervelife/com.hubbleconnected.vervelife.md",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://hubbleconnected.com/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-487xx/CVE-2024-48799.json
Normal file
25
CVE-2024/CVE-2024-487xx/CVE-2024-48799.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-48799",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-14T17:15:13.857",
|
||||
"lastModified": "2024-10-14T17:15:13.857",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in LOREX TECHNOLOGY INC com.lorexcorp.lorexping 1.4.22 allows a remote attacker to obtain sensitive information via the firmware update process."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/HankJames/Vul-Reports/blob/main/FirmwareLeakage/com.lorexcorp.lorexping/com.lorexcorp.lorexping.md",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.lorex.com/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
76
CVE-2024/CVE-2024-67xx/CVE-2024-6762.json
Normal file
76
CVE-2024/CVE-2024-67xx/CVE-2024-6762.json
Normal file
@ -0,0 +1,76 @@
|
||||
{
|
||||
"id": "CVE-2024-6762",
|
||||
"sourceIdentifier": "emo@eclipse.org",
|
||||
"published": "2024-10-14T16:15:03.930",
|
||||
"lastModified": "2024-10-14T16:15:03.930",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Jetty PushSessionCacheFilter can be exploited by unauthenticated users \nto launch remote DoS attacks by exhausting the server\u2019s memory."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "emo@eclipse.org",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 3.1,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "emo@eclipse.org",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-400"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/jetty/jetty.project/pull/10755",
|
||||
"source": "emo@eclipse.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/jetty/jetty.project/pull/10756",
|
||||
"source": "emo@eclipse.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/jetty/jetty.project/pull/9715",
|
||||
"source": "emo@eclipse.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/jetty/jetty.project/pull/9716",
|
||||
"source": "emo@eclipse.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/jetty/jetty.project/security/advisories/GHSA-r7m4-f9h5-gr79",
|
||||
"source": "emo@eclipse.org"
|
||||
},
|
||||
{
|
||||
"url": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/24",
|
||||
"source": "emo@eclipse.org"
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2024/CVE-2024-67xx/CVE-2024-6763.json
Normal file
64
CVE-2024/CVE-2024-67xx/CVE-2024-6763.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2024-6763",
|
||||
"sourceIdentifier": "emo@eclipse.org",
|
||||
"published": "2024-10-14T16:15:04.163",
|
||||
"lastModified": "2024-10-14T16:15:04.163",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Eclipse Jetty is a lightweight, highly scalable, Java-based web server and Servlet engine . It includes a utility class, HttpURI, for URI/URL parsing.\n\nThe HttpURI class does insufficient validation on the authority segment of a URI. However the behaviour of HttpURI\n differs from the common browsers in how it handles a URI that would be \nconsidered invalid if fully validated against the RRC. Specifically HttpURI\n and the browser may differ on the value of the host extracted from an \ninvalid URI and thus a combination of Jetty and a vulnerable browser may\n be vulnerable to a open redirect attack or to a SSRF attack if the URI \nis used after passing validation checks."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "emo@eclipse.org",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 3.7,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "emo@eclipse.org",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-1286"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/jetty/jetty.project/pull/12012",
|
||||
"source": "emo@eclipse.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/jetty/jetty.project/security/advisories/GHSA-qh8g-58pp-2wxh",
|
||||
"source": "emo@eclipse.org"
|
||||
},
|
||||
{
|
||||
"url": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/25",
|
||||
"source": "emo@eclipse.org"
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2024/CVE-2024-81xx/CVE-2024-8184.json
Normal file
64
CVE-2024/CVE-2024-81xx/CVE-2024-8184.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2024-8184",
|
||||
"sourceIdentifier": "emo@eclipse.org",
|
||||
"published": "2024-10-14T16:15:04.380",
|
||||
"lastModified": "2024-10-14T16:15:04.380",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "There exists a security vulnerability in Jetty's ThreadLimitHandler.getRemote() which can be exploited by unauthorized users to cause remote denial-of-service (DoS) attack. By repeatedly sending crafted requests, attackers can trigger OutofMemory errors and exhaust the server's memory."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "emo@eclipse.org",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "emo@eclipse.org",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-400"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/jetty/jetty.project/pull/11723",
|
||||
"source": "emo@eclipse.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/jetty/jetty.project/security/advisories/GHSA-g8m5-722r-8whq",
|
||||
"source": "emo@eclipse.org"
|
||||
},
|
||||
{
|
||||
"url": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/30",
|
||||
"source": "emo@eclipse.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-9142",
|
||||
"sourceIdentifier": "iletisim@usom.gov.tr",
|
||||
"published": "2024-09-25T01:15:49.177",
|
||||
"lastModified": "2024-09-26T13:32:02.803",
|
||||
"lastModified": "2024-10-14T16:35:01.033",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -97,16 +97,6 @@
|
||||
"value": "CWE-732"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-73"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2024-9823",
|
||||
"sourceIdentifier": "emo@eclipse.org",
|
||||
"published": "2024-10-14T15:15:14.560",
|
||||
"lastModified": "2024-10-14T15:15:14.560",
|
||||
"lastModified": "2024-10-14T16:15:04.653",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Description\nThere exists a security vulnerability in Jetty's DosFilter which can be exploited by unauthorized\n\nusers to cause remote denial-of-service (DoS) attack on the server using DosFilter. By repeatedly sending crafted requests,\n\nattackers can trigger OutofMemory errors and exhaust the server's memory finally.\n\n\nVulnerability details\nThe Jetty DoSFilter (Denial of Service Filter) is a security filter designed to protect web\n\napplications against certain types of Denial of Service (DoS) attacks and other abusive behavior. It\n\nhelps to mitigate excessive resource consumption by limiting the rate at which clients can make\n\nrequests to the server. The DoSFilter monitors and tracks client request patterns, including\n\nrequest rates, and can take actions such as blocking or delaying requests from clients that exceed\n\npredefined thresholds. The internal tracking of requests in DoSFilter is the source of this OutOfMemory\n\ncondition.\n\n\nImpact\nUsers of the DoSFilter may be subject to DoS attacks that \nwill ultimately exhaust the memory of the server if they have not \nconfigured session passivation or an aggressive session inactivation \ntimeout.\n\n\nPatches\nThe DoSFilter has been patched in all active releases to no longer support the session tracking mode, even if configured.\n\n\nPatched releases:\n\n\n\n * 9.4.54\n\n * 10.0.18\n\n * 11.0.18\n\n * 12.0.3"
|
||||
"value": "There exists a security vulnerability in Jetty's DosFilter which can be exploited by unauthorized users to cause remote denial-of-service (DoS) attack on the server using DosFilter. By repeatedly sending crafted requests, attackers can trigger OutofMemory errors and exhaust the server's memory finally."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
62
README.md
62
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-10-14T16:00:22.294274+00:00
|
||||
2024-10-14T18:00:18.159658+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-10-14T15:15:14.560000+00:00
|
||||
2024-10-14T17:15:13.857000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,45 +33,45 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
265485
|
||||
265509
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `14`
|
||||
Recently added CVEs: `24`
|
||||
|
||||
- [CVE-2024-40616](CVE-2024/CVE-2024-406xx/CVE-2024-40616.json) (`2024-10-14T15:15:13.407`)
|
||||
- [CVE-2024-48119](CVE-2024/CVE-2024-481xx/CVE-2024-48119.json) (`2024-10-14T14:15:11.597`)
|
||||
- [CVE-2024-48120](CVE-2024/CVE-2024-481xx/CVE-2024-48120.json) (`2024-10-14T14:15:11.780`)
|
||||
- [CVE-2024-48249](CVE-2024/CVE-2024-482xx/CVE-2024-48249.json) (`2024-10-14T15:15:13.760`)
|
||||
- [CVE-2024-48251](CVE-2024/CVE-2024-482xx/CVE-2024-48251.json) (`2024-10-14T15:15:13.857`)
|
||||
- [CVE-2024-48253](CVE-2024/CVE-2024-482xx/CVE-2024-48253.json) (`2024-10-14T14:15:11.857`)
|
||||
- [CVE-2024-48255](CVE-2024/CVE-2024-482xx/CVE-2024-48255.json) (`2024-10-14T14:15:11.937`)
|
||||
- [CVE-2024-48257](CVE-2024/CVE-2024-482xx/CVE-2024-48257.json) (`2024-10-14T15:15:13.947`)
|
||||
- [CVE-2024-48259](CVE-2024/CVE-2024-482xx/CVE-2024-48259.json) (`2024-10-14T15:15:14.033`)
|
||||
- [CVE-2024-48261](CVE-2024/CVE-2024-482xx/CVE-2024-48261.json) (`2024-10-14T15:15:14.130`)
|
||||
- [CVE-2024-7847](CVE-2024/CVE-2024-78xx/CVE-2024-7847.json) (`2024-10-14T14:15:12.020`)
|
||||
- [CVE-2024-8602](CVE-2024/CVE-2024-86xx/CVE-2024-8602.json) (`2024-10-14T14:15:12.400`)
|
||||
- [CVE-2024-9823](CVE-2024/CVE-2024-98xx/CVE-2024-9823.json) (`2024-10-14T15:15:14.560`)
|
||||
- [CVE-2024-9936](CVE-2024/CVE-2024-99xx/CVE-2024-9936.json) (`2024-10-14T14:15:12.553`)
|
||||
- [CVE-2023-50780](CVE-2023/CVE-2023-507xx/CVE-2023-50780.json) (`2024-10-14T16:15:03.477`)
|
||||
- [CVE-2024-41997](CVE-2024/CVE-2024-419xx/CVE-2024-41997.json) (`2024-10-14T16:15:03.640`)
|
||||
- [CVE-2024-45731](CVE-2024/CVE-2024-457xx/CVE-2024-45731.json) (`2024-10-14T17:15:11.177`)
|
||||
- [CVE-2024-45732](CVE-2024/CVE-2024-457xx/CVE-2024-45732.json) (`2024-10-14T17:15:11.410`)
|
||||
- [CVE-2024-45733](CVE-2024/CVE-2024-457xx/CVE-2024-45733.json) (`2024-10-14T17:15:11.657`)
|
||||
- [CVE-2024-45734](CVE-2024/CVE-2024-457xx/CVE-2024-45734.json) (`2024-10-14T17:15:11.850`)
|
||||
- [CVE-2024-45735](CVE-2024/CVE-2024-457xx/CVE-2024-45735.json) (`2024-10-14T17:15:12.053`)
|
||||
- [CVE-2024-45736](CVE-2024/CVE-2024-457xx/CVE-2024-45736.json) (`2024-10-14T17:15:12.253`)
|
||||
- [CVE-2024-45737](CVE-2024/CVE-2024-457xx/CVE-2024-45737.json) (`2024-10-14T17:15:12.453`)
|
||||
- [CVE-2024-45738](CVE-2024/CVE-2024-457xx/CVE-2024-45738.json) (`2024-10-14T17:15:12.660`)
|
||||
- [CVE-2024-45739](CVE-2024/CVE-2024-457xx/CVE-2024-45739.json) (`2024-10-14T17:15:12.860`)
|
||||
- [CVE-2024-45740](CVE-2024/CVE-2024-457xx/CVE-2024-45740.json) (`2024-10-14T17:15:13.047`)
|
||||
- [CVE-2024-45741](CVE-2024/CVE-2024-457xx/CVE-2024-45741.json) (`2024-10-14T17:15:13.250`)
|
||||
- [CVE-2024-46535](CVE-2024/CVE-2024-465xx/CVE-2024-46535.json) (`2024-10-14T17:15:13.440`)
|
||||
- [CVE-2024-48150](CVE-2024/CVE-2024-481xx/CVE-2024-48150.json) (`2024-10-14T16:15:03.750`)
|
||||
- [CVE-2024-48153](CVE-2024/CVE-2024-481xx/CVE-2024-48153.json) (`2024-10-14T16:15:03.840`)
|
||||
- [CVE-2024-48168](CVE-2024/CVE-2024-481xx/CVE-2024-48168.json) (`2024-10-14T17:15:13.520`)
|
||||
- [CVE-2024-48796](CVE-2024/CVE-2024-487xx/CVE-2024-48796.json) (`2024-10-14T17:15:13.610`)
|
||||
- [CVE-2024-48797](CVE-2024/CVE-2024-487xx/CVE-2024-48797.json) (`2024-10-14T17:15:13.690`)
|
||||
- [CVE-2024-48798](CVE-2024/CVE-2024-487xx/CVE-2024-48798.json) (`2024-10-14T17:15:13.770`)
|
||||
- [CVE-2024-48799](CVE-2024/CVE-2024-487xx/CVE-2024-48799.json) (`2024-10-14T17:15:13.857`)
|
||||
- [CVE-2024-6762](CVE-2024/CVE-2024-67xx/CVE-2024-6762.json) (`2024-10-14T16:15:03.930`)
|
||||
- [CVE-2024-6763](CVE-2024/CVE-2024-67xx/CVE-2024-6763.json) (`2024-10-14T16:15:04.163`)
|
||||
- [CVE-2024-8184](CVE-2024/CVE-2024-81xx/CVE-2024-8184.json) (`2024-10-14T16:15:04.380`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `12`
|
||||
Recently modified CVEs: `2`
|
||||
|
||||
- [CVE-2023-2975](CVE-2023/CVE-2023-29xx/CVE-2023-2975.json) (`2024-10-14T15:15:11.457`)
|
||||
- [CVE-2023-3446](CVE-2023/CVE-2023-34xx/CVE-2023-3446.json) (`2024-10-14T15:15:11.730`)
|
||||
- [CVE-2023-3817](CVE-2023/CVE-2023-38xx/CVE-2023-3817.json) (`2024-10-14T15:15:11.930`)
|
||||
- [CVE-2023-4807](CVE-2023/CVE-2023-48xx/CVE-2023-4807.json) (`2024-10-14T15:15:12.213`)
|
||||
- [CVE-2023-5363](CVE-2023/CVE-2023-53xx/CVE-2023-5363.json) (`2024-10-14T15:15:12.407`)
|
||||
- [CVE-2023-5678](CVE-2023/CVE-2023-56xx/CVE-2023-5678.json) (`2024-10-14T15:15:12.603`)
|
||||
- [CVE-2023-6129](CVE-2023/CVE-2023-61xx/CVE-2023-6129.json) (`2024-10-14T15:15:12.800`)
|
||||
- [CVE-2023-6237](CVE-2023/CVE-2023-62xx/CVE-2023-6237.json) (`2024-10-14T15:15:12.997`)
|
||||
- [CVE-2024-0727](CVE-2024/CVE-2024-07xx/CVE-2024-0727.json) (`2024-10-14T15:15:13.100`)
|
||||
- [CVE-2024-2511](CVE-2024/CVE-2024-25xx/CVE-2024-2511.json) (`2024-10-14T15:15:13.270`)
|
||||
- [CVE-2024-4603](CVE-2024/CVE-2024-46xx/CVE-2024-4603.json) (`2024-10-14T15:15:14.210`)
|
||||
- [CVE-2024-9341](CVE-2024/CVE-2024-93xx/CVE-2024-9341.json) (`2024-10-14T15:15:14.373`)
|
||||
- [CVE-2024-9142](CVE-2024/CVE-2024-91xx/CVE-2024-9142.json) (`2024-10-14T16:35:01.033`)
|
||||
- [CVE-2024-9823](CVE-2024/CVE-2024-98xx/CVE-2024-9823.json) (`2024-10-14T16:15:04.653`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
78
_state.csv
78
_state.csv
@ -222565,7 +222565,7 @@ CVE-2023-29746,0,0,4de2b2e1305924b83c2f864294adaef5a320dbbbfd2e0c4da9812d2544c38
|
||||
CVE-2023-29747,0,0,9eb43ea7631dd1e4b72ec6b22803484683cd26588e6859d3a4f9cd0a7cf5a6ed,2023-06-07T14:34:15.043000
|
||||
CVE-2023-29748,0,0,de4aac23f053152fc00e340c98d6ef168d487dd2c8d8003060d7aad38f43275c,2023-06-07T16:08:01.943000
|
||||
CVE-2023-29749,0,0,97c0ea052991d778178ffbad7d226f9a754724a6367429fd69f50e01a82beb12,2023-06-16T15:54:20.677000
|
||||
CVE-2023-2975,0,1,8c5ed1759a3f8bfe3996639c97b804b8ef7fd355e0ee87f009fefc1b3d8957ed,2024-10-14T15:15:11.457000
|
||||
CVE-2023-2975,0,0,8c5ed1759a3f8bfe3996639c97b804b8ef7fd355e0ee87f009fefc1b3d8957ed,2024-10-14T15:15:11.457000
|
||||
CVE-2023-29751,0,0,2461bc5a3a2fd89feadf65a8858f15921fea97751e88880207b87de2fec932ad,2023-06-16T16:35:22.790000
|
||||
CVE-2023-29752,0,0,8e9fbd10ad7a80dafba43e1fcf07712781b98eb8ef62f0c41f7fa00e468ec7e1,2023-06-16T16:38:14.027000
|
||||
CVE-2023-29753,0,0,04743f0174dcc0b866fcd193b2c619f349964a63f6cc96d6eccf0198e8d578ca,2023-06-16T16:35:10.903000
|
||||
@ -226191,7 +226191,7 @@ CVE-2023-34455,0,0,20040caee8f9363f09b63fa89c3b13f7d06bec6ac095c1a41354e281696ca
|
||||
CVE-2023-34457,0,0,c984e4ca565e6e7772b40b5b931c9cee513dae66b761babd02d4d82b3876b73f,2023-08-03T15:15:24.573000
|
||||
CVE-2023-34458,0,0,1972c79044b76b052e72e6e7d49a0030a5132a71fda0031caa56e56d48f8db72,2023-07-25T18:52:55.960000
|
||||
CVE-2023-34459,0,0,1661a6473de1a29629a1bc4d0bf8830bb82de99c243e642b96397442324d4635,2023-06-26T18:50:28.553000
|
||||
CVE-2023-3446,0,1,ef8f33ae332c554f794b1043b102758d30449855c76b3307b3ba2d934d2e2738,2024-10-14T15:15:11.730000
|
||||
CVE-2023-3446,0,0,ef8f33ae332c554f794b1043b102758d30449855c76b3307b3ba2d934d2e2738,2024-10-14T15:15:11.730000
|
||||
CVE-2023-34460,0,0,0487d7dc044cb6636be002c9646a7eb4bcbc917660ecd20c81d1e1d439ae04fe,2023-07-05T16:13:13.693000
|
||||
CVE-2023-34461,0,0,896acc05f1b2c77debce320c87f3a38c1be4e4a6a060c825bff0740c26dcbad2,2023-06-27T17:09:46.680000
|
||||
CVE-2023-34462,0,0,422a6937f1889a953f13ffdd3ac264e38fa42481cd06cc10e5413836428406f4,2024-06-21T19:15:27.163000
|
||||
@ -228766,7 +228766,7 @@ CVE-2023-38164,0,0,c75b441218c78eeeccc06b658080d2048b20d7dd914d45a9a762a2cc2e592
|
||||
CVE-2023-38166,0,0,ec6db0f2c90b9a921c6e3d9dd66068fad15beb1f5bafe3cd770a908408705560,2024-05-29T02:16:27.720000
|
||||
CVE-2023-38167,0,0,14fed7f47e692fcb5ef19b09920f17f6a8dd5207ad0171b7e71ba31daa66dc66,2024-05-29T02:16:27.953000
|
||||
CVE-2023-38169,0,0,378fcd3dbcd1e5c72566352be29a70588185b5aaa4494f0fa99a7982c0eeb575,2024-05-29T02:16:28.170000
|
||||
CVE-2023-3817,0,1,a08e5c61304fb5cac0fe57b7315dfa8930e089db523625cb31a230119ce7571c,2024-10-14T15:15:11.930000
|
||||
CVE-2023-3817,0,0,a08e5c61304fb5cac0fe57b7315dfa8930e089db523625cb31a230119ce7571c,2024-10-14T15:15:11.930000
|
||||
CVE-2023-38170,0,0,356aa6c6a4d22d05cdfe4df2b95a9403d364c230ec6550477c3569062517b42d,2024-05-29T02:16:28.293000
|
||||
CVE-2023-38171,0,0,ee891f4e4709808afde7920b8591f11e8f6acb1ab3065f0211396b20ab5d2869,2024-05-29T02:16:28.403000
|
||||
CVE-2023-38172,0,0,d3c568e41b16a7d41483c64374a5ac61b2d649c710fc60ed4d48400ab6dda974,2024-05-29T02:16:28.530000
|
||||
@ -235900,7 +235900,7 @@ CVE-2023-4806,0,0,169c709c7fcce2a813cb83fb6cce3554d64b2c509e52376f27f98faea6ca74
|
||||
CVE-2023-48060,0,0,fea1d282cced2562e6c31897934f5482f80df5de60fcee98c3efce46bed4f5cd,2024-09-03T19:35:07.643000
|
||||
CVE-2023-48063,0,0,ea9189f47de248a9b67965af3b522898bbda97ce156221191808cdec464e23d4,2023-11-16T17:35:21.507000
|
||||
CVE-2023-48068,0,0,d2ed6581af62c4b74ef3f8171b12ae6e16910b36aa9ccf062a942fd093c09c13,2023-11-16T17:35:37.623000
|
||||
CVE-2023-4807,0,1,3de0d677ebbf00153cefbfa374c0ecc381ecf722c89be68b57b7df074a7f14d7,2024-10-14T15:15:12.213000
|
||||
CVE-2023-4807,0,0,3de0d677ebbf00153cefbfa374c0ecc381ecf722c89be68b57b7df074a7f14d7,2024-10-14T15:15:12.213000
|
||||
CVE-2023-48078,0,0,0d9dcf5cb116c36b06b2365e4b759d1ca0ba54345b6daa32e108a2d9f4c48031,2024-08-14T19:35:13.890000
|
||||
CVE-2023-4808,0,0,4a43f94f49b00a1ded4942c432a3569f5fcf99624dd900f508f8d30286fbcfa9,2023-11-27T16:33:33.237000
|
||||
CVE-2023-48084,0,0,459a90979a07550a284aa3e1863b171726a2debcb2ae1cda3b39790a2d652b29,2023-12-19T18:41:44.493000
|
||||
@ -237793,6 +237793,7 @@ CVE-2023-50777,0,0,df0d9de6b8a0baaf3efff27900ebb62bf75a216074a2617fe71f734fe044c
|
||||
CVE-2023-50778,0,0,4c2b380d1452ab879c0bb2f5c89c5ce489b1f3e5d975b71bfe4549f784edbd60,2023-12-18T19:10:26.547000
|
||||
CVE-2023-50779,0,0,a0c5abaaea21dffc7e5a857a3cc8d6fdf18a54e29bad4eca92e474cb6a42116d,2023-12-18T19:09:28.547000
|
||||
CVE-2023-5078,0,0,44af65139afdd3e9781ce81372f6fd64997c761012986369ca4fdcdd6cdd5a3c,2024-09-16T15:15:15.367000
|
||||
CVE-2023-50780,1,1,997ce97484e991ac4325541ba8de0cd441dbe9708d3ca1f82502bec6f09a06cf,2024-10-14T16:15:03.477000
|
||||
CVE-2023-50781,0,0,4cd11cbf33226a1d3a67a681c39cb955b0d7b7bd73503eb21db0ba61d3e9a3f9,2024-02-26T16:27:47.760000
|
||||
CVE-2023-50782,0,0,658725b86153a9f539275c901096223b399321aeaa417b3e344f544d03067a46,2024-09-27T19:15:09.603000
|
||||
CVE-2023-50783,0,0,6b32c482163913116bd4c154365475f6fbb1c73c4268388823017e442458c167,2023-12-28T13:45:11.130000
|
||||
@ -239544,7 +239545,7 @@ CVE-2023-5358,0,0,3843b7eb2b83630439823339cd1e7c1ebb5c2bfad1a924657ec37661bd127a
|
||||
CVE-2023-5359,0,0,cd93a1d7d146b91e639cade66b248b7feb66dbcb22fb36eaf6547dbca671eace,2024-09-30T14:19:15.970000
|
||||
CVE-2023-5360,0,0,23416f23056cf7d0eaf89d196ff3012aba1f2266b06af6861779d6d467ce1803,2023-11-29T15:15:10.100000
|
||||
CVE-2023-5362,0,0,80b923a43138bfee55c8b364d2d98e107b276de0395018a0792e2ca94e3f39da,2023-11-13T14:47:34.907000
|
||||
CVE-2023-5363,0,1,32ed94009f7d7a0175ed9bbcf2376d54f9be36a8ef12ee3c789d732aa98c0273,2024-10-14T15:15:12.407000
|
||||
CVE-2023-5363,0,0,32ed94009f7d7a0175ed9bbcf2376d54f9be36a8ef12ee3c789d732aa98c0273,2024-10-14T15:15:12.407000
|
||||
CVE-2023-5365,0,0,a3d6abcc6553631f878844970226a67093bba6db11761fa7e287a38223bd4a0f,2024-09-19T15:35:08.273000
|
||||
CVE-2023-5366,0,0,549d2b06c12957ddad6fd9e09c667fc61e212290cbc78d274e985fd10c51fd9b,2024-03-23T03:15:10.327000
|
||||
CVE-2023-5367,0,0,ece93636181bbf6ef1a4f8c67dc0564beafd1659cfc2a57970f0c60be3279f64,2024-09-16T16:15:08.640000
|
||||
@ -239833,7 +239834,7 @@ CVE-2023-5674,0,0,ad6a524623973b785443ed5ef1d7ce3fc434ea992e37165634367ac391476b
|
||||
CVE-2023-5675,0,0,26d656fccd5c8593a8d4a9ed8d70f37dec8e8fe19baf58f5aece6460feff10db,2024-08-01T13:45:45.357000
|
||||
CVE-2023-5676,0,0,a627ea7bf88ea5b6dccb528b94589245e9f9ba331b8e03892a33208a41506408,2023-11-22T22:39:25.137000
|
||||
CVE-2023-5677,0,0,08b2893d4601209dee22cd4c45290e5831a26efa6eeca1fc36aea8ab189442dc,2024-02-13T00:38:00.893000
|
||||
CVE-2023-5678,0,1,20fd1e9f5bec6f0da539cc18e171e3a9021c1db788460fc8978c0d9abde4744d,2024-10-14T15:15:12.603000
|
||||
CVE-2023-5678,0,0,20fd1e9f5bec6f0da539cc18e171e3a9021c1db788460fc8978c0d9abde4744d,2024-10-14T15:15:12.603000
|
||||
CVE-2023-5679,0,0,4960f652ee6c5b1a46e7d7d2a06407e27c0c64465787d874631b65221eda9309,2024-04-26T09:15:08.843000
|
||||
CVE-2023-5680,0,0,8cff3e083f7c7bd084b842f852f743395da779c5a8fed0ab54ee3dfa1f5214a1,2024-05-03T13:15:21.093000
|
||||
CVE-2023-5681,0,0,d7491800836d2388e22440d68a862dd278a82c18bac217a1d7b7b5fd9c059522,2024-05-17T02:33:13.287000
|
||||
@ -240254,7 +240255,7 @@ CVE-2023-6125,0,0,6680cb2510eb0946111f3e49e52187e7e4686cd04eee3143a65deb0d92b21d
|
||||
CVE-2023-6126,0,0,fd71edfc64e634c33eecaba889690a462253fd022c13eade6ebce93fb6ac3be0,2023-11-17T17:59:32.487000
|
||||
CVE-2023-6127,0,0,dd56a9c0eb24ea5efe54939a8e05dcbc5546629a3a54fa1faf2ac7228395f184,2023-11-17T17:58:50.183000
|
||||
CVE-2023-6128,0,0,8286b6f56ff713bb258e67fc6a050b0a6ddfab13c3281cce30702591390dc377,2023-11-17T17:46:55.197000
|
||||
CVE-2023-6129,0,1,e16c8ea14afe5d997525e465c6bd7fde97ac937191b20df5c050420596b15dd9,2024-10-14T15:15:12.800000
|
||||
CVE-2023-6129,0,0,e16c8ea14afe5d997525e465c6bd7fde97ac937191b20df5c050420596b15dd9,2024-10-14T15:15:12.800000
|
||||
CVE-2023-6130,0,0,2818ee43655844efe6fed8882b910732845b519dfa1dbf502beef737f2e76f99,2023-11-17T21:28:58.080000
|
||||
CVE-2023-6131,0,0,889a910bd1ac71ecfab90c405c0d8acaa1783fa5493cd17ac2acae757227003a,2023-11-17T21:28:31.490000
|
||||
CVE-2023-6132,0,0,94bf0b300c60cba1ebf0a1af45abf44572088b1a37ffefc21172e6ef88b3b437,2024-03-01T14:04:26.010000
|
||||
@ -240346,7 +240347,7 @@ CVE-2023-6233,0,0,e3aaa68b264dc91d419a318d56a374d994d572e57fedadcdf71ff52189d71e
|
||||
CVE-2023-6234,0,0,5e47c089c57aa5a25b883980b84d44dc18ef3c76841351a6420b2de979b06550,2024-02-13T19:51:46.740000
|
||||
CVE-2023-6235,0,0,65e74a86f5bbff8d25e3efc268e4bb50210ad04b2f747cf0c9a224be0818ee6c,2023-11-29T16:59:51.970000
|
||||
CVE-2023-6236,0,0,bfa67257c2a3ffd7b3d06b564fb26217261866326487bc912cbff8bf3f4202d7,2024-06-18T13:15:51.123000
|
||||
CVE-2023-6237,0,1,b4bc23e4eec08626993d6bd4b0ae8a847710940a5c6135d4b515a1f508c35ad0,2024-10-14T15:15:12.997000
|
||||
CVE-2023-6237,0,0,b4bc23e4eec08626993d6bd4b0ae8a847710940a5c6135d4b515a1f508c35ad0,2024-10-14T15:15:12.997000
|
||||
CVE-2023-6238,0,0,2e211fe01ee8c7e57afdef0930b8f1bc5c09293054105dbd159c8f8857f29757,2024-02-07T00:15:55.240000
|
||||
CVE-2023-6239,0,0,b65e4e0202f8c904d3bed9c0b298036f60e92b6b3988771b4545deac730dcf4b,2024-08-28T09:15:10.550000
|
||||
CVE-2023-6240,0,0,9a8f126fd8f5ef282af06e27627122b943a8da0b0302096eb47cb5d50f4fd387,2024-09-14T00:15:12.483000
|
||||
@ -241890,7 +241891,7 @@ CVE-2024-0722,0,0,e3fd857d56c3e7a1ce18df94c2aad06d8e5ba0ba6f59fdbc875af0baef84e5
|
||||
CVE-2024-0723,0,0,62b3b8158ed5f431f7c823843250dde65bc6b046016f1d806e5bf4a77c554601,2024-05-17T02:34:54.417000
|
||||
CVE-2024-0725,0,0,9f34bbeb9ca65e262b0f114d97475b4588551a2e0d6e1b478b0fe96d6457c471,2024-05-17T02:34:54.540000
|
||||
CVE-2024-0726,0,0,614c484a417a79563637bf6c4e4842b2936b34d19e28c25bc06b3ee24570d0f3,2024-05-17T02:34:54.650000
|
||||
CVE-2024-0727,0,1,029a496ed427073edc27553aecd27066148acfe7af4675f627eb209fc5b1daaa,2024-10-14T15:15:13.100000
|
||||
CVE-2024-0727,0,0,029a496ed427073edc27553aecd27066148acfe7af4675f627eb209fc5b1daaa,2024-10-14T15:15:13.100000
|
||||
CVE-2024-0728,0,0,8e86daecc5b7cf2cd88ed5152fb6a2af57ca1a3f0df02f0db63414ebf20cd037,2024-05-17T02:34:54.780000
|
||||
CVE-2024-0729,0,0,35aad4ab490381a796d82e9abc9a3e9bab04093ac6b38aa110e0a6401a78c4c6,2024-05-17T02:34:54.887000
|
||||
CVE-2024-0730,0,0,864087475952c894903074292e7d5d73331f2529c20d6e97f634c7504eb2ebd5,2024-05-17T02:34:55.003000
|
||||
@ -246647,7 +246648,7 @@ CVE-2024-25106,0,0,69f4a5df8f9163ba3cc00a57d78f06705015dcf6a2341378521404b16f38f
|
||||
CVE-2024-25107,0,0,2f7af5f36b252a42eb30d1f8972da5732bf420e322522d60adcccf7f4819b86a,2024-02-15T18:52:25.613000
|
||||
CVE-2024-25108,0,0,ea86aeb46132d1436758572e531bfe9d096e1704148614890b5ee2b811e5154b,2024-10-11T19:31:20.060000
|
||||
CVE-2024-25109,0,0,c41f7e7a8b0352e7db5bd3620b2014d3afb64c0a666c2f8d504ee8ea7a10e96b,2024-09-05T13:18:39.687000
|
||||
CVE-2024-2511,0,1,25ba3d5dec8dfd6cf26bc268a14176944084d3a63c61f96c81b75524a5331e44,2024-10-14T15:15:13.270000
|
||||
CVE-2024-2511,0,0,25ba3d5dec8dfd6cf26bc268a14176944084d3a63c61f96c81b75524a5331e44,2024-10-14T15:15:13.270000
|
||||
CVE-2024-25110,0,0,d26cbb0693a4d6c53e7081518beb8a84b92d2cd8bf57244ea03bf261dee5ab3f,2024-10-11T21:55:24.837000
|
||||
CVE-2024-25111,0,0,260c08f765b0b23211db8fb3020f7ae46891432e3f36f885aebdb89bc620ed80,2024-06-10T18:15:27.443000
|
||||
CVE-2024-25112,0,0,62d81a6835c854cf3f1a6117c1e57e73e656e5f510894e971df29562320bde94,2024-02-13T14:01:40.577000
|
||||
@ -257574,7 +257575,7 @@ CVE-2024-40604,0,0,96707551e8fc94b334085d5bf2926e369955211afc96673efa337699ead3d
|
||||
CVE-2024-40605,0,0,3b7d08be38342ed975d3a802af7734eccce4b6fa70dd407ef7f8c6cca68429e4,2024-07-09T16:09:30.277000
|
||||
CVE-2024-4061,0,0,3d64526f6b4051e690acf87533a742bc5fa8b9683de463655fd6184fe7fa5bfb,2024-05-21T12:37:59.687000
|
||||
CVE-2024-40614,0,0,5a8c90c94f1b0dc56355424420ebae65c618d536c580acb4e248f7802de2136c,2024-07-10T13:15:10.833000
|
||||
CVE-2024-40616,1,1,f080804a22bb99d6bad6cefea7d430cb07b5ac0dbf796cced63e81300b3d547a,2024-10-14T15:15:13.407000
|
||||
CVE-2024-40616,0,0,f080804a22bb99d6bad6cefea7d430cb07b5ac0dbf796cced63e81300b3d547a,2024-10-14T15:15:13.407000
|
||||
CVE-2024-40617,0,0,2efaf69feebd32907e47dcfdd1d9a6531eebf60e579d5726cae13557574657a9,2024-09-10T13:45:37.100000
|
||||
CVE-2024-40618,0,0,339cc634a42e8a7db54f4bb39e56482affa65b57dfd2765250a61f2e694456da,2024-07-12T16:12:00.597000
|
||||
CVE-2024-40619,0,0,71752a5fbb09ad3b98ad49ccde5e7b24e7278b9eb9f9bc361b3decfc42effc78,2024-08-15T13:01:10.150000
|
||||
@ -258494,6 +258495,7 @@ CVE-2024-41990,0,0,a9d3bfe1152ea007eb5df4a4d15c3972fabe2ab7cf6c4dc84957655472913
|
||||
CVE-2024-41991,0,0,c38f7b679bd3e48c46db9fd1c6390ab9383b0c22d8669d807f374055f46ee42b,2024-08-07T20:48:22.403000
|
||||
CVE-2024-41995,0,0,79638f0d10c16b237f07db3242d98d294e87bf4205be8c6d9c3c7b90790704bd,2024-08-06T16:30:24.547000
|
||||
CVE-2024-41996,0,0,29b8c50df43b1c66bff4b5734acbca34adccc097a107dedf36398e589357d13d,2024-08-26T16:35:11.247000
|
||||
CVE-2024-41997,1,1,feb93180957d926c3a2515af9caa2596a5a805e498da40f2eabee214b9d19034,2024-10-14T16:15:03.640000
|
||||
CVE-2024-41999,0,0,a370380ae5e595c1d409f5d8d8f92b14e0e23ae9708051ce0a7058f9d91625a3,2024-09-30T17:35:09.340000
|
||||
CVE-2024-4200,0,0,4cd240b08c44457e11ab7d0e46f05e7d4edddbc268bf54e61982ff7b6b50f3a4,2024-05-15T18:35:11.453000
|
||||
CVE-2024-42001,0,0,fcbbb9fe256b159250061e78a0e74ebb6632e1ed1a0fdada8381ebf9439eb017,2024-08-20T16:37:05.447000
|
||||
@ -260698,7 +260700,18 @@ CVE-2024-4571,0,0,76823bb120333d1d68e24e57a18868a62bd826931cb118db3f1630877d1250
|
||||
CVE-2024-4572,0,0,6754f54e88e479a744a4367c8d1d2577fd697a90d0783dabcb9fc508df61090e,2024-05-14T15:44:06.153000
|
||||
CVE-2024-45720,0,0,9a958c282ef360c53e2ab2db366594f7b62a7ef8d528ac6998de122fd3a653b0,2024-10-10T12:51:56.987000
|
||||
CVE-2024-45723,0,0,63a77b3806467261b762149cf38436dbbeeccf91520557e4f16dba13005bb2d7,2024-10-07T17:43:52.783000
|
||||
CVE-2024-45731,1,1,64f3b076e1ba73dffdf0c460512babb747cd809745bbab294692b67d6edcedab,2024-10-14T17:15:11.177000
|
||||
CVE-2024-45732,1,1,4e5072a835dfaa21d6aa1c1f6e7186ca3a2566f20a3b2446f1311cd0df57600a,2024-10-14T17:15:11.410000
|
||||
CVE-2024-45733,1,1,26b12148a3d1f105c07f5ec4d630a2627962ac0992e8874fa66efb919b028102,2024-10-14T17:15:11.657000
|
||||
CVE-2024-45734,1,1,60f6ad0bd39b15a28edbbec8142bfd65f3dd6893675910d2f5a63b73b1510f5b,2024-10-14T17:15:11.850000
|
||||
CVE-2024-45735,1,1,d1f5a904ff4ce2124f50a1bcd5480da3acc1d59dfb44c552ef8762f57a0c1d19,2024-10-14T17:15:12.053000
|
||||
CVE-2024-45736,1,1,f78c0cba5a890982b2563a6304d5814ab3232334c5657217d2788ee254c5ee03,2024-10-14T17:15:12.253000
|
||||
CVE-2024-45737,1,1,6f1419b68d8eca19f450336f3fec46602dda1e328d1cee2a20bb0db8b44f3328,2024-10-14T17:15:12.453000
|
||||
CVE-2024-45738,1,1,5d1da984cf863288c52eaff3ff6108b50ab539a8a304723020a2fd2eac1740c7,2024-10-14T17:15:12.660000
|
||||
CVE-2024-45739,1,1,01a43068fb72c181b3efa5733fc8e8be54627ae8a8ac05fdef7e7315f4ba75ed,2024-10-14T17:15:12.860000
|
||||
CVE-2024-4574,0,0,5bc00996fe57104150ae610f292ff224de65f0948423aca3282fe7d917884520,2024-05-14T16:11:39.510000
|
||||
CVE-2024-45740,1,1,9d225636a0ff30313e82d40744acf0f9d64b6da60e9d3a775ea47d422a68fd76,2024-10-14T17:15:13.047000
|
||||
CVE-2024-45741,1,1,2446936f73030d260e2103cbcab9418fbd70c8e0a8e075e9a5a2ac2e64abaf06,2024-10-14T17:15:13.250000
|
||||
CVE-2024-45744,0,0,ec4698c6891bd67c723c11e0dc841a026f8c5da574327fdd441b22164fa47c9a,2024-09-30T12:45:57.823000
|
||||
CVE-2024-45745,0,0,095415295fb9e908dbd1bbbd24ecc8e41cf81936c17bbb0aa6290e6785ab228e,2024-09-30T12:45:57.823000
|
||||
CVE-2024-45746,0,0,902861897e83a8721d85c8381c9fc33c107d622749f6a985c29d3f01f324f690,2024-10-11T21:36:34.350000
|
||||
@ -260818,7 +260831,7 @@ CVE-2024-45999,0,0,af895c303825f0596a9091053cec8108aced826e7775d2d54abeebde71fb3
|
||||
CVE-2024-4600,0,0,078ff1a3ce0c016ebe4abdef878e85c422e5d3e27f924ee561699d3a699695bb,2024-05-07T13:39:32.710000
|
||||
CVE-2024-4601,0,0,f0cf92b01a71b6ce5239836875c0fea83fe5cefcc9c9a95787d845c600418862,2024-05-07T13:39:32.710000
|
||||
CVE-2024-4602,0,0,2d8504f508e1d4f718d8c666850c307b85c9596de2a8b2f0ab0bc138c9da4ca4,2024-08-01T13:59:32.233000
|
||||
CVE-2024-4603,0,1,9942bc7f0ee4df83c0037c4c5d6b42a7bde07b02fe0e655d3c99ab93c8488123,2024-10-14T15:15:14.210000
|
||||
CVE-2024-4603,0,0,9942bc7f0ee4df83c0037c4c5d6b42a7bde07b02fe0e655d3c99ab93c8488123,2024-10-14T15:15:14.210000
|
||||
CVE-2024-4604,0,0,a39c956f080c616b17936b03ed62fbdee5080806b0deef5fc7741779c0bf0ec7,2024-06-27T12:47:19.847000
|
||||
CVE-2024-46040,0,0,f69112d5a1863fbd0caca1b0b2804dd2dfc1a731583d042e591bd5e81ca4008b,2024-10-07T17:47:48.410000
|
||||
CVE-2024-46041,0,0,c02cff8dc91cfcfecb1fc716067f6a80d76cbf5a6025a1c04ea63ec71bb7758f,2024-10-07T20:35:09.113000
|
||||
@ -260950,6 +260963,7 @@ CVE-2024-46511,0,0,78cf785de24718da0c0ea71257e191470c834e4be61ca79ad4d72c264c3c4
|
||||
CVE-2024-4652,0,0,8fd7af949b4c89aa1e5f9f8bc7784e47292323116a1f6a56ecb880f3c410a541,2024-06-04T19:20:44.873000
|
||||
CVE-2024-4653,0,0,7b6d5c0913690c5b51d844fc9718b4208eaa5f352f244fd41eee7be1add5e3bc,2024-06-04T19:20:44.990000
|
||||
CVE-2024-46532,0,0,3cc4b0eac6406170fdb3268901170209dd1adc3b3b14e5bfd21137ddfc4e89d7,2024-10-11T18:15:08.267000
|
||||
CVE-2024-46535,1,1,236faad90efb2cca4a33db405473a6420ce807a7b23b2f487d5ed937562d9418,2024-10-14T17:15:13.440000
|
||||
CVE-2024-46539,0,0,2d2c57643421ecf3202df41ca86f61b87e91435ec045a273724c1fd7bed0cf14,2024-10-10T12:56:30.817000
|
||||
CVE-2024-4654,0,0,0088d34096b2578204ff98fe71c1f702e4c8866653411407f72fe940a56448df,2024-06-04T19:20:45.100000
|
||||
CVE-2024-46540,0,0,82bd73e280c5a23d3b35406dd5a042ddc542cc53d99831f15d05d7d862ed5067,2024-10-04T13:51:25.567000
|
||||
@ -261769,13 +261783,16 @@ CVE-2024-4808,0,0,9e98599f6886b9041c106d3216212c5c382436edfce35f9a1807d5234e020e
|
||||
CVE-2024-4809,0,0,27fb5be7556d421437500c3c993a8fe2f6b8b07eb589d66da5852c85ddbdadf0,2024-06-04T19:20:50.867000
|
||||
CVE-2024-4810,0,0,67f5293ce6e2b07ebd74483d90aa4bd648288e3b70a7100b0946bf9b81e90029,2024-05-29T08:15:33.960000
|
||||
CVE-2024-4811,0,0,8f7cba70fec134bbd5d6693fb99cf5ba1e86f11c73cf50479f15d27ff9c0c5a5,2024-07-25T12:36:39.947000
|
||||
CVE-2024-48119,1,1,5a61747aca6c21835c2f6c3a203be63c2093664c3f6f566c13d1fe431a2fd5d0,2024-10-14T14:15:11.597000
|
||||
CVE-2024-48119,0,0,5a61747aca6c21835c2f6c3a203be63c2093664c3f6f566c13d1fe431a2fd5d0,2024-10-14T14:15:11.597000
|
||||
CVE-2024-4812,0,0,96f0244e64d02e8b825789000f88a75dd5b3d67c4d6e5fa4b2230b6ad5599e15,2024-06-18T18:49:19.783000
|
||||
CVE-2024-48120,1,1,c62e5be74f0d961b12e910dcf29c3c75e41c7914cfe890c3077ff6c43d8c87f9,2024-10-14T14:15:11.780000
|
||||
CVE-2024-48120,0,0,c62e5be74f0d961b12e910dcf29c3c75e41c7914cfe890c3077ff6c43d8c87f9,2024-10-14T14:15:11.780000
|
||||
CVE-2024-4813,0,0,ffced1bec51c6384e79d75317b856f32e05abf0a3cdd3adf718b586086ffad4a,2024-06-04T19:20:50.970000
|
||||
CVE-2024-4814,0,0,6ed65b628d782e4c0035f27d12907232951228fb5dd63de02df922628089b508,2024-06-04T19:20:51.077000
|
||||
CVE-2024-4815,0,0,a12a3714528f7b768c4c9101b510e3e25b21fa14abf883b4fca5d245888d3088,2024-06-04T19:20:51.183000
|
||||
CVE-2024-48150,1,1,19f1376e02c9f64643f71be368bb63d9dab50859eebf81f919523183a5c16d63,2024-10-14T16:15:03.750000
|
||||
CVE-2024-48153,1,1,3cfd46a773704ab0a351a2b6ce72427b77a3ce4f0b94a6c1ddac6ddeed3918df,2024-10-14T16:15:03.840000
|
||||
CVE-2024-4816,0,0,8565abd2d0a6378ede6981ddf7bac1f2251b8eaa5cb7a310b72a2f14c255bb14,2024-06-04T19:20:51.290000
|
||||
CVE-2024-48168,1,1,a09a7c75736c5a01c0400c19554fc92c3c8fd8dbfe7d3f38b5cf9ce5962080e1,2024-10-14T17:15:13.520000
|
||||
CVE-2024-4817,0,0,34b565d993de0f23b2da3e66a459da3d9e976182c7f2db8f77c4f90d033797ec,2024-06-04T19:20:51.393000
|
||||
CVE-2024-4818,0,0,3fe1d5f18f9b194d5b3db8480cedce43b94847211b0e14441f0f1578988c6d95,2024-06-04T19:20:51.510000
|
||||
CVE-2024-4819,0,0,bc26e072d222c9731ee42bb1198fec18f8f3236e713c07e319d531bbf6577caa,2024-06-04T19:20:51.613000
|
||||
@ -261784,15 +261801,15 @@ CVE-2024-4821,0,0,dc7d4132f68a39a1fe6c6bac80c0ac3156e2e90bf5e433ad24749311cb9093
|
||||
CVE-2024-4822,0,0,35737e7a1acb373d4b9b0a7db2a81b8ded4d641f08c88a2e676b684417908472,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4823,0,0,0c5de98ac761e11f69c407a8dbff0028d3fe4b31e8abb3e2bfd72a91e6adb2ed,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4824,0,0,e31432116aed0554c3dc4b1001cfc03d00512889f9f84533cba85f3e0d8e9591,2024-05-14T16:11:39.510000
|
||||
CVE-2024-48249,1,1,5f69ad216423d88721630184efcc3b6780298c2281ef45447866af266eeaf31b,2024-10-14T15:15:13.760000
|
||||
CVE-2024-48249,0,0,5f69ad216423d88721630184efcc3b6780298c2281ef45447866af266eeaf31b,2024-10-14T15:15:13.760000
|
||||
CVE-2024-4825,0,0,155a89a5474625dde1ab63dcac3020c23f71c92d3744c7dbee990f6fffb4feb0,2024-05-14T16:11:39.510000
|
||||
CVE-2024-48251,1,1,dda6068c3aec0a58728fe7bffc3300b768a57547cce716fc09ce51fb41c159b8,2024-10-14T15:15:13.857000
|
||||
CVE-2024-48253,1,1,bc18a0e22f877a0da30943ce059ebde5cc7ada183f875ccf73bea55ec5d9c5dd,2024-10-14T14:15:11.857000
|
||||
CVE-2024-48255,1,1,0a8ed856e42477c3dd884c692f58730bafdfb919692cb5c3147aec3949e7e20f,2024-10-14T14:15:11.937000
|
||||
CVE-2024-48257,1,1,a1a727e578e5771b374c2be34c1390e71a4865969de7420f02809bdd4b7dbea9,2024-10-14T15:15:13.947000
|
||||
CVE-2024-48259,1,1,ec456a1c6c04e1393013f41c2dc440ffed601fb5f055ca35b2d9252dd23e0a84,2024-10-14T15:15:14.033000
|
||||
CVE-2024-48251,0,0,dda6068c3aec0a58728fe7bffc3300b768a57547cce716fc09ce51fb41c159b8,2024-10-14T15:15:13.857000
|
||||
CVE-2024-48253,0,0,bc18a0e22f877a0da30943ce059ebde5cc7ada183f875ccf73bea55ec5d9c5dd,2024-10-14T14:15:11.857000
|
||||
CVE-2024-48255,0,0,0a8ed856e42477c3dd884c692f58730bafdfb919692cb5c3147aec3949e7e20f,2024-10-14T14:15:11.937000
|
||||
CVE-2024-48257,0,0,a1a727e578e5771b374c2be34c1390e71a4865969de7420f02809bdd4b7dbea9,2024-10-14T15:15:13.947000
|
||||
CVE-2024-48259,0,0,ec456a1c6c04e1393013f41c2dc440ffed601fb5f055ca35b2d9252dd23e0a84,2024-10-14T15:15:14.033000
|
||||
CVE-2024-4826,0,0,deaf8fdab596ba1219725251282b0367e2dd73462b62b55f2e950ae3725565c5,2024-05-16T13:15:48.163000
|
||||
CVE-2024-48261,1,1,c50173bdf25e4741bc510b2698ace8c3db8c27162251f6faafaff8896241ef72,2024-10-14T15:15:14.130000
|
||||
CVE-2024-48261,0,0,c50173bdf25e4741bc510b2698ace8c3db8c27162251f6faafaff8896241ef72,2024-10-14T15:15:14.130000
|
||||
CVE-2024-4835,0,0,b63c1e2c2f2232a6ba415444f30303ee4e5ea1a45d737d79b2133d2755ec709c,2024-05-24T01:15:30.977000
|
||||
CVE-2024-4836,0,0,6397d82c08a27dc6d1e4828623f7dccd401e56dd97e62d291cde8c73c9f6f8bd,2024-07-02T12:09:16.907000
|
||||
CVE-2024-4837,0,0,e7f6212a3767856f93e80078aa36a8d58ae9b0d6d87727b0b71ea9bfd6a3b44b,2024-05-15T18:35:11.453000
|
||||
@ -261846,6 +261863,10 @@ CVE-2024-48786,0,0,c860c3ab3f85be5742131f9576a41113cc68380c4baa10b74833d50923537
|
||||
CVE-2024-48787,0,0,7a215e7cb70a1e88ac1a7855c7c78ffe9117f0eb6f9844010ee3a49bb152ca60,2024-10-11T20:15:06.407000
|
||||
CVE-2024-48788,0,0,d531b63d24b558dcbfd8469ce1a5194d6aa29d693230d82c5c128cd8fc89dcbd,2024-10-11T21:15:07.220000
|
||||
CVE-2024-4879,0,0,49a8b41ea605df8bd1da4063a7058b50435504f1dbecb0dc4bcc8efa8c8e8867,2024-07-30T15:13:39.720000
|
||||
CVE-2024-48796,1,1,7879f1aa8bab9a14d016d74ec58af4d0baf4610a66493dc7e696e44b7ca1bc91,2024-10-14T17:15:13.610000
|
||||
CVE-2024-48797,1,1,a42b610d7f725207e7958ca937816046c91c2ceb35bdd5acafea0351793590bf,2024-10-14T17:15:13.690000
|
||||
CVE-2024-48798,1,1,f8e79fb9df797037d2a83f075374be88a20179dcf01384173fccd3a6fc8fb0f0,2024-10-14T17:15:13.770000
|
||||
CVE-2024-48799,1,1,a3b8aa531325723a40f231e31c933f25fd306c627d1f496d1ce1b3883fd1201f,2024-10-14T17:15:13.857000
|
||||
CVE-2024-4881,0,0,70a5432f5c5a777364201296899d588f04c479b317d8edcefa9e35906d6586a3,2024-06-07T14:56:05.647000
|
||||
CVE-2024-48813,0,0,738900377884500d6e48ef86e8a92a90f8f38c9de5c7e8958544d021c7ce9ab7,2024-10-11T21:36:43.527000
|
||||
CVE-2024-4882,0,0,a4855f599041359b65e48a15f937a27e2ec2e91d9343d627eb58fe60c3b171c1,2024-07-09T18:19:14.047000
|
||||
@ -263493,6 +263514,8 @@ CVE-2024-6758,0,0,eba9276bccb667ada2a9e6cadd00c35035c829f464cb8fc5793fac965ac82f
|
||||
CVE-2024-6759,0,0,e7cd1780cd31aac9820013b04e76a14ca6ed66e984c4afbf1fe81690ab6c39a6,2024-08-13T15:08:27.780000
|
||||
CVE-2024-6760,0,0,2363997d66d6496a6d94c4263cbac8f525a5e902af0a9a7389048de6fc4d9b78,2024-08-13T15:08:51.977000
|
||||
CVE-2024-6761,0,0,f38b3ccdc89aa0093bd659ba31741817a9ff74cb3bee1ce8404957bf0a35b578,2024-07-29T11:15:10.140000
|
||||
CVE-2024-6762,1,1,053cd62e78397cb397f65a69e92749587baeeba6b06a23b25c2cde3a3e8e2412,2024-10-14T16:15:03.930000
|
||||
CVE-2024-6763,1,1,2e3832a111ef9e1563172f5ed131b6afed3503a9ae140bbd5550f3cc5f769987,2024-10-14T16:15:04.163000
|
||||
CVE-2024-6765,0,0,582116fb1612a7c43e0b570dc3dd773f185a6bed827d147d00793764d2f2774e,2024-07-17T14:15:04.327000
|
||||
CVE-2024-6766,0,0,4e69f4c5d546bbff4d97a532e9e5f675c0139ba3a0fba76f00597bc0bd516b20,2024-08-06T16:30:24.547000
|
||||
CVE-2024-6767,0,0,e624184eb5b85e1f323682c46b24401770f3ecb164370e5143c01069a4262025,2024-08-21T12:30:33.697000
|
||||
@ -264347,7 +264370,7 @@ CVE-2024-7843,0,0,1916845a00ac6d864acb448c0fe39fd74d4023a097dc2d81074d929455ca18
|
||||
CVE-2024-7844,0,0,b930ca741640f5c7b3b0ce1c61bb7f4e94c485b2638d8e79f4794845e86ce235,2024-08-21T14:12:43.497000
|
||||
CVE-2024-7845,0,0,2b4134672992a5057330a35c489891fcdc0ff66c466c2c96e09ea314c06bb030,2024-09-26T15:10:57.870000
|
||||
CVE-2024-7846,0,0,8e15bdd83a5e179d37b373daa0289519d9b1688a7106bd69b16fbadef1928218,2024-09-26T13:32:55.343000
|
||||
CVE-2024-7847,1,1,c4a5e56225f9502b32f4cf902921ba916babb59c986821e50770707689fdbf7b,2024-10-14T14:15:12.020000
|
||||
CVE-2024-7847,0,0,c4a5e56225f9502b32f4cf902921ba916babb59c986821e50770707689fdbf7b,2024-10-14T14:15:12.020000
|
||||
CVE-2024-7848,0,0,b79248ef369f661dc93f45ab33fbf95a9110e81107fbfafbebe6c98477861dfa,2024-09-26T22:12:13.457000
|
||||
CVE-2024-7849,0,0,e63d24df06d5f4555672e0892a25c4e5c95ca031f7861c25398c177add1bd8f5,2024-08-19T13:00:23.117000
|
||||
CVE-2024-7850,0,0,eac62d06d40978b154610fb0b8829f684d203615f4f5ebfcbc586877034ad096,2024-08-20T15:44:20.567000
|
||||
@ -264588,6 +264611,7 @@ CVE-2024-8175,0,0,93cd36c03979068837f469bd77e40d2775fae2df59f7cba10d5c6e9b4e387e
|
||||
CVE-2024-8178,0,0,ba572c1f8157c41d405fb002c7b6f163f2d56dcc78fed52d2bcc31657caf5604,2024-09-06T17:35:20.203000
|
||||
CVE-2024-8181,0,0,493690832b830d715024bac2c57cbeb9d316626844b43ee44a3d0839b5d01d36,2024-09-06T15:35:07.267000
|
||||
CVE-2024-8182,0,0,9ca161eed16086dd999c3dcdddb12be07c44a0882f46a0d2167122ca829615b9,2024-08-30T13:53:52.197000
|
||||
CVE-2024-8184,1,1,8c163146049144fdada87d362eb75f578744ca06a2fab167b1d676e981e40114,2024-10-14T16:15:04.380000
|
||||
CVE-2024-8188,0,0,bf948f939efb55d2700c81c8fb5cefa3fc31038462bfeb7ac3e161719faca6b2,2024-08-26T20:15:08.760000
|
||||
CVE-2024-8189,0,0,63668eb3e5fc8ff94f956bfec9b936178c3cdc9b685d09571c582433c179a1da,2024-10-07T15:44:45.110000
|
||||
CVE-2024-8190,0,0,b93c21c7e68b63ff1a05425b35ca8850e4059906d4d0de60465090c0528ebe7c,2024-09-16T13:44:18.173000
|
||||
@ -264872,7 +264896,7 @@ CVE-2024-8584,0,0,f2bfb960200b98001a53756524046d766d8acbe67d6e46dee6e73d41f4473a
|
||||
CVE-2024-8585,0,0,e17d232ed4a4084d03c537d4bccfc260c2e2f4d1c4cbcfdf334e4783c2ee46f9,2024-09-11T15:53:35.693000
|
||||
CVE-2024-8586,0,0,23468ff8a51a574afa4ccf040ef08b97cdacf6166e19d71118517f5f68bba004,2024-09-16T13:28:03.400000
|
||||
CVE-2024-8601,0,0,350a6e2c691d4290217990f07e5aa1eab0aea03118253c9c9cd54625cff0b36e,2024-09-17T17:54:39.767000
|
||||
CVE-2024-8602,1,1,4eeda86fadc2aa14b25662e1edaef238609ac66c3a06646af8bc061f10c582f4,2024-10-14T14:15:12.400000
|
||||
CVE-2024-8602,0,0,4eeda86fadc2aa14b25662e1edaef238609ac66c3a06646af8bc061f10c582f4,2024-10-14T14:15:12.400000
|
||||
CVE-2024-8604,0,0,011a82fa33d28627d93910a4b1b240e8b61f649834230335b18a4a93ce8a99bf,2024-09-10T19:14:57.017000
|
||||
CVE-2024-8605,0,0,2abdfde3fad91633012e2fbc4796f8bda82aa939ecbbf9c2890b650d01ffd42b,2024-09-13T15:31:52.140000
|
||||
CVE-2024-8606,0,0,20f69def3ac5362a6447befa6462591ee01c298b230281fd326f40893e51c1a1,2024-09-30T15:32:34.647000
|
||||
@ -265181,7 +265205,7 @@ CVE-2024-9136,0,0,9b9746749b73403d8dc2b7a33b5935315a467feb0aa3698e70e44d08c2289a
|
||||
CVE-2024-9137,0,0,9065b9986e350cb1955cfbec462f81d3d3a9a0cca2dc3d030de4540532f9abca,2024-10-14T09:15:04.403000
|
||||
CVE-2024-9139,0,0,09eb3f13c3e60192800512c2b76c94742b9d9d7d743e90f5437ddfac8bcedf34,2024-10-14T09:15:04.693000
|
||||
CVE-2024-9141,0,0,1186d93c71ba2b76e7029b0455d3828535e51a6f22b721a65c3963a052cae512,2024-09-26T13:32:02.803000
|
||||
CVE-2024-9142,0,0,f41ad411b11065ca581c6c09a7cdbabb7231f7d077f84444580389a46c43e76b,2024-09-26T13:32:02.803000
|
||||
CVE-2024-9142,0,1,143ad6ae744fa593642be06138ba59f5a3ac64fb0a6f22e5d0ade004fddfc127,2024-10-14T16:35:01.033000
|
||||
CVE-2024-9145,0,0,666aa1000539c0391187e882757d18372cd0bce4cc6b153bd670793f8325f34a,2024-10-04T13:51:25.567000
|
||||
CVE-2024-9146,0,0,dd225bf1435696d6b519369d4a8422b91a9f46c7eecd30c6fd592ac6ec22d53f,2024-10-07T17:48:28.117000
|
||||
CVE-2024-9148,0,0,54e87e3f2b6f69d5080b11c080fcfce17264899c6147cd6032f168b6e8923e92,2024-09-30T17:34:12.760000
|
||||
@ -265279,7 +265303,7 @@ CVE-2024-9327,0,0,9bb62fae114b1c29588ad2672d640859a17a9f3af7375a799fc34e218e9d39
|
||||
CVE-2024-9328,0,0,a5f7378f6f2f1cd502f7cde1b5f6090c2d79ebec3e3af2aa2eaafb1f04d0c325,2024-10-01T11:34:57.773000
|
||||
CVE-2024-9329,0,0,45383f73609cef2d97bbcc2a37f0da26902c147f00f71a92dd725b6696a1e709,2024-10-07T15:52:47.267000
|
||||
CVE-2024-9333,0,0,29d3d497691b594c7c49948d48e229bbe8c23108f2eef552b2f92cd89acf1f06,2024-10-04T13:50:43.727000
|
||||
CVE-2024-9341,0,1,d189ad1f5a137e8ae5c8357f3191cc9111f21b931f4eff48979046ce5164f4a3,2024-10-14T15:15:14.373000
|
||||
CVE-2024-9341,0,0,d189ad1f5a137e8ae5c8357f3191cc9111f21b931f4eff48979046ce5164f4a3,2024-10-14T15:15:14.373000
|
||||
CVE-2024-9344,0,0,d870e129ed50c7683cdbbee07d60a73dcd8b852b9805e9d5932c8a41008c379e,2024-10-08T15:06:57.470000
|
||||
CVE-2024-9345,0,0,b08be38bdc65e7df784af6af5cf36510583fc49f8a0ab62bc24aed87f83f55d0,2024-10-08T16:10:17.567000
|
||||
CVE-2024-9346,0,0,54562034e717f93a9c89f6030e73e47fb9b9d7abbbde9d33821c04e2f0a85d64,2024-10-11T13:15:18.740000
|
||||
@ -265455,7 +265479,7 @@ CVE-2024-9817,0,0,aa4071cf5ce97bf162c1cca4a7f07d25d51157e1698481fe4534c2979d4a7e
|
||||
CVE-2024-9818,0,0,0b4965dc9157be1c79882236820da1fc50a01232d912ae1b867d598f551f291b,2024-10-10T23:15:03.680000
|
||||
CVE-2024-9821,0,0,0fe84d15377a57feb9c16456d9d6e98b8f06d72079455451a6924d64eac80b40,2024-10-12T03:15:02.507000
|
||||
CVE-2024-9822,0,0,31c5fa39db5fe31c5cd7802827b5c169adace5e7cdcfe1c09d420a2a1af019c6,2024-10-11T03:15:10.967000
|
||||
CVE-2024-9823,1,1,7e4a61ee23132db2cb613d00e5ac442c24d492bd5341978073a831c8512ab73e,2024-10-14T15:15:14.560000
|
||||
CVE-2024-9823,0,1,797ad589a845f20d3c764555cd88dd01739b03d274a2154c13310668db597c99,2024-10-14T16:15:04.653000
|
||||
CVE-2024-9824,0,0,1fdcf28970a03200ea0750edfb27b712eac3be59fe088b6edf6f98bda2457c29,2024-10-12T06:15:04.230000
|
||||
CVE-2024-9855,0,0,74811d4bb31eb0ad4289dbfb3b216d12eb73ec4e1a7f9bf880a5813c9b568440,2024-10-11T13:15:21.460000
|
||||
CVE-2024-9856,0,0,b5fbe1e11cd8120594b10c6f2c9ff297b13257bca69885420fdeff5341bb84c9,2024-10-11T13:15:21.883000
|
||||
@ -265483,4 +265507,4 @@ CVE-2024-9921,0,0,006acd4b794e2adfef5d9ee2d65bed2b1e2281b0d23f9374b3500a3b648fc6
|
||||
CVE-2024-9922,0,0,38a9a769415efbcfedd53b122b48fa65b5e1f382fdf217a030bbaee2ce3081e3,2024-10-14T03:15:10.683000
|
||||
CVE-2024-9923,0,0,54d0eb71a24239c4cf72f6c8d2d43f40cc27d7ae4dae943f2db0568ffd629c72,2024-10-14T04:15:06.070000
|
||||
CVE-2024-9924,0,0,5d7f89079afc3d9ca8548ebb3725e799ef08b64b7b5fd0fc7f3c47978b6a83d8,2024-10-14T04:15:06.353000
|
||||
CVE-2024-9936,1,1,84f1422b67bbaa43c4b2b921a0bd24fe5cb86e5da956c7f811c06ae275078cda,2024-10-14T14:15:12.553000
|
||||
CVE-2024-9936,0,0,84f1422b67bbaa43c4b2b921a0bd24fe5cb86e5da956c7f811c06ae275078cda,2024-10-14T14:15:12.553000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user