mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
Auto-Update: 2024-10-14T18:00:18.159658+00:00
This commit is contained in:
parent
403cc85267
commit
59953b0434
33
CVE-2023/CVE-2023-507xx/CVE-2023-50780.json
Normal file
33
CVE-2023/CVE-2023-507xx/CVE-2023-50780.json
Normal file
@ -0,0 +1,33 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2023-50780",
|
||||||
|
"sourceIdentifier": "security@apache.org",
|
||||||
|
"published": "2024-10-14T16:15:03.477",
|
||||||
|
"lastModified": "2024-10-14T16:15:03.477",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Apache ActiveMQ Artemis allows access to diagnostic information and controls through MBeans, which are also exposed through the authenticated Jolokia endpoint. Before version 2.29.0, this also included the Log4J2 MBean. This MBean is not meant for exposure to non-administrative users. This could eventually allow an authenticated attacker to write arbitrary files to the filesystem and indirectly achieve RCE.\n\n\nUsers are recommended to upgrade to version 2.29.0 or later, which fixes the issue."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security@apache.org",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-285"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://lists.apache.org/thread/63b78shqz312phsx7v1ryr7jv7bprg58",
|
||||||
|
"source": "security@apache.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
33
CVE-2024/CVE-2024-419xx/CVE-2024-41997.json
Normal file
33
CVE-2024/CVE-2024-419xx/CVE-2024-41997.json
Normal file
@ -0,0 +1,33 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-41997",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2024-10-14T16:15:03.640",
|
||||||
|
"lastModified": "2024-10-14T16:15:03.640",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "An issue was discovered in version of Warp Terminal prior to 2024.07.18 (v0.2024.07.16.08.02). A command injection vulnerability exists in the Docker integration functionality. An attacker can create a specially crafted hyperlink using the `warp://action/docker/open_subshell` intent that when clicked by the victim results in command execution on the victim's machine."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://docs.warp.dev/features/integrations-and-plugins#docker",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://docs.warp.dev/getting-started/changelog#id-2024.07.18-v0.2024.07.16.08.02",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://gist.github.com/bhyh/d1ee7a825fce283bf8acbdb42c8a7832",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/warpdotdev/warp",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
60
CVE-2024/CVE-2024-457xx/CVE-2024-45731.json
Normal file
60
CVE-2024/CVE-2024-457xx/CVE-2024-45731.json
Normal file
@ -0,0 +1,60 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-45731",
|
||||||
|
"sourceIdentifier": "prodsec@splunk.com",
|
||||||
|
"published": "2024-10-14T17:15:11.177",
|
||||||
|
"lastModified": "2024-10-14T17:15:11.177",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In Splunk Enterprise for Windows versions below 9.3.1, 9.2.3, and 9.1.6, a low-privileged user that does not hold the \"admin\" or \"power\" Splunk roles could write a file to the Windows system root directory, which has a default location in the Windows System32 folder, when Splunk Enterprise for Windows is installed on a separate drive."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "prodsec@splunk.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "HIGH",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 8.0,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.3,
|
||||||
|
"impactScore": 6.0
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "prodsec@splunk.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-23"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://advisory.splunk.com/advisories/SVD-2024-1001",
|
||||||
|
"source": "prodsec@splunk.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://research.splunk.com/application/c97e0704-d9c6-454d-89ba-1510a987bf72/",
|
||||||
|
"source": "prodsec@splunk.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
60
CVE-2024/CVE-2024-457xx/CVE-2024-45732.json
Normal file
60
CVE-2024/CVE-2024-457xx/CVE-2024-45732.json
Normal file
@ -0,0 +1,60 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-45732",
|
||||||
|
"sourceIdentifier": "prodsec@splunk.com",
|
||||||
|
"published": "2024-10-14T17:15:11.410",
|
||||||
|
"lastModified": "2024-10-14T17:15:11.410",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In Splunk Enterprise versions below 9.3.1, and 9.2.0 versions below 9.2.3, and Splunk Cloud Platform versions below 9.2.2403.103, 9.1.2312.200, 9.1.2312.110 and 9.1.2308.208, a low-privileged user that does not hold the \"admin\" or \"power\" Splunk roles could run a search as the \"nobody\" Splunk user in the SplunkDeploymentServerConfig app. This could let the low-privileged user access potentially restricted data."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "prodsec@splunk.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 7.1,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 4.2
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "prodsec@splunk.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-862"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://advisory.splunk.com/advisories/SVD-2024-1002",
|
||||||
|
"source": "prodsec@splunk.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://research.splunk.com/application/f765c3fe-c3b6-4afe-a932-11dd4f3a024f/",
|
||||||
|
"source": "prodsec@splunk.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
60
CVE-2024/CVE-2024-457xx/CVE-2024-45733.json
Normal file
60
CVE-2024/CVE-2024-457xx/CVE-2024-45733.json
Normal file
@ -0,0 +1,60 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-45733",
|
||||||
|
"sourceIdentifier": "prodsec@splunk.com",
|
||||||
|
"published": "2024-10-14T17:15:11.657",
|
||||||
|
"lastModified": "2024-10-14T17:15:11.657",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In Splunk Enterprise for Windows versions below 9.2.3 and 9.1.6, a low-privileged user that does not hold the \"admin\" or \"power\" Splunk roles could perform a Remote Code Execution (RCE) due to an insecure session storage configuration."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "prodsec@splunk.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 8.8,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "prodsec@splunk.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-502"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://advisory.splunk.com/advisories/SVD-2024-1003",
|
||||||
|
"source": "prodsec@splunk.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://research.splunk.com/application/c97e0704-d9c6-454d-89ba-1510a987bf72/",
|
||||||
|
"source": "prodsec@splunk.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
60
CVE-2024/CVE-2024-457xx/CVE-2024-45734.json
Normal file
60
CVE-2024/CVE-2024-457xx/CVE-2024-45734.json
Normal file
@ -0,0 +1,60 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-45734",
|
||||||
|
"sourceIdentifier": "prodsec@splunk.com",
|
||||||
|
"published": "2024-10-14T17:15:11.850",
|
||||||
|
"lastModified": "2024-10-14T17:15:11.850",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In Splunk Enterprise versions 9.3.0, 9.2.3, and 9.1.6, a low-privileged user that does not hold the \"admin\" or \"power\" Splunk roles could view images on the machine that runs Splunk Enterprise by using the PDF export feature in Splunk classic dashboards. The images on the machine could be exposed by exporting the dashboard as a PDF, using the local image path in the img tag in the source extensible markup language (XML) code for the Splunk classic dashboard."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "prodsec@splunk.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 4.3,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "prodsec@splunk.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-284"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://advisory.splunk.com/advisories/SVD-2024-1004",
|
||||||
|
"source": "prodsec@splunk.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://research.splunk.com/application/7464e2dc-98a5-4af9-87a1-fa6d5a256fa6/",
|
||||||
|
"source": "prodsec@splunk.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
60
CVE-2024/CVE-2024-457xx/CVE-2024-45735.json
Normal file
60
CVE-2024/CVE-2024-457xx/CVE-2024-45735.json
Normal file
@ -0,0 +1,60 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-45735",
|
||||||
|
"sourceIdentifier": "prodsec@splunk.com",
|
||||||
|
"published": "2024-10-14T17:15:12.053",
|
||||||
|
"lastModified": "2024-10-14T17:15:12.053",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In Splunk Enterprise versions below 9.2.3 and 9.1.6, and Splunk Secure Gateway versions on Splunk Cloud Platform versions below 3.4.259, 3.6.17, and 3.7.0, a low-privileged user that does not hold the \"admin\" or \"power\" Splunk roles can see App Key Value Store (KV Store) deployment configuration and public/private keys in the Splunk Secure Gateway App."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "prodsec@splunk.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 4.3,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "prodsec@splunk.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-284"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://advisory.splunk.com/advisories/SVD-2024-1005",
|
||||||
|
"source": "prodsec@splunk.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://research.splunk.com/application/0a3d6035-7bef-4dfa-b01e-84349edac3b4/",
|
||||||
|
"source": "prodsec@splunk.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
60
CVE-2024/CVE-2024-457xx/CVE-2024-45736.json
Normal file
60
CVE-2024/CVE-2024-457xx/CVE-2024-45736.json
Normal file
@ -0,0 +1,60 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-45736",
|
||||||
|
"sourceIdentifier": "prodsec@splunk.com",
|
||||||
|
"published": "2024-10-14T17:15:12.253",
|
||||||
|
"lastModified": "2024-10-14T17:15:12.253",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In Splunk Enterprise versions below 9.3.1, 9.2.3, and 9.1.6 and Splunk Cloud Platform versions below 9.2.2403.107, 9.1.2312.204, and 9.1.2312.111, a low-privileged user that does not hold the \"admin\" or \"power\" Splunk roles could craft a search query with an improperly formatted \"INGEST_EVAL\" parameter as part of a [Field Transformation](https://docs.splunk.com/Documentation/Splunk/latest/Knowledge/Managefieldtransforms) which could crash the Splunk daemon (splunkd)."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "prodsec@splunk.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 6.5,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "prodsec@splunk.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-400"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://advisory.splunk.com/advisories/SVD-2024-1006",
|
||||||
|
"source": "prodsec@splunk.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://research.splunk.com/application/08978eca-caff-44c1-84dc-53f17def4e14/",
|
||||||
|
"source": "prodsec@splunk.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
60
CVE-2024/CVE-2024-457xx/CVE-2024-45737.json
Normal file
60
CVE-2024/CVE-2024-457xx/CVE-2024-45737.json
Normal file
@ -0,0 +1,60 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-45737",
|
||||||
|
"sourceIdentifier": "prodsec@splunk.com",
|
||||||
|
"published": "2024-10-14T17:15:12.453",
|
||||||
|
"lastModified": "2024-10-14T17:15:12.453",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In Splunk Enterprise versions below 9.3.1, 9.2.3, and 9.1.6 and Splunk Cloud Platform versions below 9.2.2403.108, and 9.1.2312.204, a low-privileged user that does not hold the \"admin\" or \"power\" Splunk roles could change the maintenance mode state of App Key Value Store (KVStore) through a Cross-Site Request Forgery (CSRF)."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "prodsec@splunk.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "LOW",
|
||||||
|
"baseScore": 4.3,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "prodsec@splunk.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-352"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://advisory.splunk.com/advisories/SVD-2024-1007",
|
||||||
|
"source": "prodsec@splunk.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://research.splunk.com/application/34bac267-a89b-4bd7-a072-a48eef1f15b8/",
|
||||||
|
"source": "prodsec@splunk.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
60
CVE-2024/CVE-2024-457xx/CVE-2024-45738.json
Normal file
60
CVE-2024/CVE-2024-457xx/CVE-2024-45738.json
Normal file
@ -0,0 +1,60 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-45738",
|
||||||
|
"sourceIdentifier": "prodsec@splunk.com",
|
||||||
|
"published": "2024-10-14T17:15:12.660",
|
||||||
|
"lastModified": "2024-10-14T17:15:12.660",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In Splunk Enterprise versions below 9.3.1, 9.2.3, and 9.1.6, the software potentially exposes sensitive HTTP parameters to the `_internal` index. This exposure could happen if you configure the Splunk Enterprise `REST_Calls` log channel at the DEBUG logging level."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "prodsec@splunk.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 4.9,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.2,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "prodsec@splunk.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-200"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://advisory.splunk.com/advisories/SVD-2024-1008",
|
||||||
|
"source": "prodsec@splunk.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://research.splunk.com/application/93dc7182-c5da-4085-82ec-401abf33d623/",
|
||||||
|
"source": "prodsec@splunk.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
60
CVE-2024/CVE-2024-457xx/CVE-2024-45739.json
Normal file
60
CVE-2024/CVE-2024-457xx/CVE-2024-45739.json
Normal file
@ -0,0 +1,60 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-45739",
|
||||||
|
"sourceIdentifier": "prodsec@splunk.com",
|
||||||
|
"published": "2024-10-14T17:15:12.860",
|
||||||
|
"lastModified": "2024-10-14T17:15:12.860",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In Splunk Enterprise versions below 9.3.1, 9.2.3, and 9.1.6, the software potentially exposes plaintext passwords for local native authentication Splunk users. This exposure could happen when you configure the Splunk Enterprise AdminManager log channel at the DEBUG logging level."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "prodsec@splunk.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 4.9,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.2,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "prodsec@splunk.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-200"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://advisory.splunk.com/advisories/SVD-2024-1009",
|
||||||
|
"source": "prodsec@splunk.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://research.splunk.com/application/93dc7182-c5da-4085-82ec-401abf33d623/",
|
||||||
|
"source": "prodsec@splunk.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
60
CVE-2024/CVE-2024-457xx/CVE-2024-45740.json
Normal file
60
CVE-2024/CVE-2024-457xx/CVE-2024-45740.json
Normal file
@ -0,0 +1,60 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-45740",
|
||||||
|
"sourceIdentifier": "prodsec@splunk.com",
|
||||||
|
"published": "2024-10-14T17:15:13.047",
|
||||||
|
"lastModified": "2024-10-14T17:15:13.047",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In Splunk Enterprise versions below 9.2.3 and 9.1.6 and Splunk Cloud Platform versions below 9.2.2403, a low-privileged user that does not hold the \"admin\" or \"power\" Splunk roles could craft a malicious payload through Scheduled Views that could result in execution of unauthorized JavaScript code in the browser of a user."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "prodsec@splunk.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 5.4,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.3,
|
||||||
|
"impactScore": 2.7
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "prodsec@splunk.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://advisory.splunk.com/advisories/SVD-2024-1010",
|
||||||
|
"source": "prodsec@splunk.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://research.splunk.com/application/d4f55f7c-6518-4122-a197-951fe0f21b25/",
|
||||||
|
"source": "prodsec@splunk.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
60
CVE-2024/CVE-2024-457xx/CVE-2024-45741.json
Normal file
60
CVE-2024/CVE-2024-457xx/CVE-2024-45741.json
Normal file
@ -0,0 +1,60 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-45741",
|
||||||
|
"sourceIdentifier": "prodsec@splunk.com",
|
||||||
|
"published": "2024-10-14T17:15:13.250",
|
||||||
|
"lastModified": "2024-10-14T17:15:13.250",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In Splunk Enterprise versions below 9.2.3 and 9.1.6 and Splunk Cloud Platform versions below 9.2.2403.108 and 9.1.2312.205, a low-privileged user that does not hold the \"admin\" or \"power\" Splunk roles could create a malicious payload through a custom configuration file that the \"api.uri\" parameter from the \"/manager/search/apps/local\" endpoint in Splunk Web calls. This could result in execution of unauthorized JavaScript code in the browser of a user."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "prodsec@splunk.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 5.4,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.3,
|
||||||
|
"impactScore": 2.7
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "prodsec@splunk.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://advisory.splunk.com/advisories/SVD-2024-1011",
|
||||||
|
"source": "prodsec@splunk.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://research.splunk.com/application/d7b5aa71-157f-4359-9c34-e35752b1d0a2/",
|
||||||
|
"source": "prodsec@splunk.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
21
CVE-2024/CVE-2024-465xx/CVE-2024-46535.json
Normal file
21
CVE-2024/CVE-2024-465xx/CVE-2024-46535.json
Normal file
@ -0,0 +1,21 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-46535",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2024-10-14T17:15:13.440",
|
||||||
|
"lastModified": "2024-10-14T17:15:13.440",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Jepaas v7.2.8 was discovered to contain a SQL injection vulnerability via the orderSQL parameter at /homePortal/loadUserMsg."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://gitee.com/ketr/jepaas-release/issues/IAPJ8H?from=project-issue",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
21
CVE-2024/CVE-2024-481xx/CVE-2024-48150.json
Normal file
21
CVE-2024/CVE-2024-481xx/CVE-2024-48150.json
Normal file
@ -0,0 +1,21 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-48150",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2024-10-14T16:15:03.750",
|
||||||
|
"lastModified": "2024-10-14T16:15:03.750",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "D-Link DIR-820L 1.05B03 has a stack overflow vulnerability in the sub_451208 function."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/fu37kola/cve/blob/main/D-Link/DIR-820L/D-Link%20DIR-820L%20Stack%20Overflow%20Vulnerability.md",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
21
CVE-2024/CVE-2024-481xx/CVE-2024-48153.json
Normal file
21
CVE-2024/CVE-2024-481xx/CVE-2024-48153.json
Normal file
@ -0,0 +1,21 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-48153",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2024-10-14T16:15:03.840",
|
||||||
|
"lastModified": "2024-10-14T16:15:03.840",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "DrayTek Vigor3900 1.5.1.3 allows attackers to inject malicious commands into mainfunction.cgi and execute arbitrary commands by calling the get_subconfig function."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/tw11ty/CVE/blob/main/DrayTek/Vigor3900/Vigor3900%20command%20execution%20vulnerability.md",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
21
CVE-2024/CVE-2024-481xx/CVE-2024-48168.json
Normal file
21
CVE-2024/CVE-2024-481xx/CVE-2024-48168.json
Normal file
@ -0,0 +1,21 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-48168",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2024-10-14T17:15:13.520",
|
||||||
|
"lastModified": "2024-10-14T17:15:13.520",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A stack overflow vulnerability exists in the sub_402280 function of the HNAP service of D-Link DCS-960L 1.09, allowing an attacker to execute arbitrary code."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/fu37kola/cve/blob/main/D-Link/DCS-960L/D-Link%20DCS-960L%201.09%20Stack%20overflow_1.md",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
25
CVE-2024/CVE-2024-487xx/CVE-2024-48796.json
Normal file
25
CVE-2024/CVE-2024-487xx/CVE-2024-48796.json
Normal file
@ -0,0 +1,25 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-48796",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2024-10-14T17:15:13.610",
|
||||||
|
"lastModified": "2024-10-14T17:15:13.610",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "An issue in EQUES com.eques.plug 1.0.1 allows a remote attacker to obtain sensitive information via the firmware update process."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "http://www.eques.cn/?lang=en",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/HankJames/Vul-Reports/blob/main/FirmwareLeakage/com.eques.plug/com.eques.plug.md",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
25
CVE-2024/CVE-2024-487xx/CVE-2024-48797.json
Normal file
25
CVE-2024/CVE-2024-487xx/CVE-2024-48797.json
Normal file
@ -0,0 +1,25 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-48797",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2024-10-14T17:15:13.690",
|
||||||
|
"lastModified": "2024-10-14T17:15:13.690",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "An issue in PCS Engineering Preston Cinema (com.prestoncinema.app) 0.2.0 allows a remote attacker to obtain sensitive information via the firmware update process."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "http://www.pcsengineering.net/",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/HankJames/Vul-Reports/blob/main/FirmwareLeakage/com.prestoncinema.app/com.prestoncinema.app.md",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
25
CVE-2024/CVE-2024-487xx/CVE-2024-48798.json
Normal file
25
CVE-2024/CVE-2024-487xx/CVE-2024-48798.json
Normal file
@ -0,0 +1,25 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-48798",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2024-10-14T17:15:13.770",
|
||||||
|
"lastModified": "2024-10-14T17:15:13.770",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "An issue in Hubble Connected (com.hubbleconnected.vervelife) 2.00.81 allows a remote attacker to obtain sensitive information via the firmware update process."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/HankJames/Vul-Reports/blob/main/FirmwareLeakage/com.hubbleconnected.vervelife/com.hubbleconnected.vervelife.md",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://hubbleconnected.com/",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
25
CVE-2024/CVE-2024-487xx/CVE-2024-48799.json
Normal file
25
CVE-2024/CVE-2024-487xx/CVE-2024-48799.json
Normal file
@ -0,0 +1,25 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-48799",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2024-10-14T17:15:13.857",
|
||||||
|
"lastModified": "2024-10-14T17:15:13.857",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "An issue in LOREX TECHNOLOGY INC com.lorexcorp.lorexping 1.4.22 allows a remote attacker to obtain sensitive information via the firmware update process."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/HankJames/Vul-Reports/blob/main/FirmwareLeakage/com.lorexcorp.lorexping/com.lorexcorp.lorexping.md",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.lorex.com/",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
76
CVE-2024/CVE-2024-67xx/CVE-2024-6762.json
Normal file
76
CVE-2024/CVE-2024-67xx/CVE-2024-6762.json
Normal file
@ -0,0 +1,76 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-6762",
|
||||||
|
"sourceIdentifier": "emo@eclipse.org",
|
||||||
|
"published": "2024-10-14T16:15:03.930",
|
||||||
|
"lastModified": "2024-10-14T16:15:03.930",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Jetty PushSessionCacheFilter can be exploited by unauthenticated users \nto launch remote DoS attacks by exhausting the server\u2019s memory."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "emo@eclipse.org",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "HIGH",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "LOW",
|
||||||
|
"baseScore": 3.1,
|
||||||
|
"baseSeverity": "LOW"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.6,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "emo@eclipse.org",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-400"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/jetty/jetty.project/pull/10755",
|
||||||
|
"source": "emo@eclipse.org"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/jetty/jetty.project/pull/10756",
|
||||||
|
"source": "emo@eclipse.org"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/jetty/jetty.project/pull/9715",
|
||||||
|
"source": "emo@eclipse.org"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/jetty/jetty.project/pull/9716",
|
||||||
|
"source": "emo@eclipse.org"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/jetty/jetty.project/security/advisories/GHSA-r7m4-f9h5-gr79",
|
||||||
|
"source": "emo@eclipse.org"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/24",
|
||||||
|
"source": "emo@eclipse.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
64
CVE-2024/CVE-2024-67xx/CVE-2024-6763.json
Normal file
64
CVE-2024/CVE-2024-67xx/CVE-2024-6763.json
Normal file
@ -0,0 +1,64 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-6763",
|
||||||
|
"sourceIdentifier": "emo@eclipse.org",
|
||||||
|
"published": "2024-10-14T16:15:04.163",
|
||||||
|
"lastModified": "2024-10-14T16:15:04.163",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Eclipse Jetty is a lightweight, highly scalable, Java-based web server and Servlet engine . It includes a utility class, HttpURI, for URI/URL parsing.\n\nThe HttpURI class does insufficient validation on the authority segment of a URI. However the behaviour of HttpURI\n differs from the common browsers in how it handles a URI that would be \nconsidered invalid if fully validated against the RRC. Specifically HttpURI\n and the browser may differ on the value of the host extracted from an \ninvalid URI and thus a combination of Jetty and a vulnerable browser may\n be vulnerable to a open redirect attack or to a SSRF attack if the URI \nis used after passing validation checks."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "emo@eclipse.org",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "HIGH",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 3.7,
|
||||||
|
"baseSeverity": "LOW"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.2,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "emo@eclipse.org",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-1286"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/jetty/jetty.project/pull/12012",
|
||||||
|
"source": "emo@eclipse.org"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/jetty/jetty.project/security/advisories/GHSA-qh8g-58pp-2wxh",
|
||||||
|
"source": "emo@eclipse.org"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/25",
|
||||||
|
"source": "emo@eclipse.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
64
CVE-2024/CVE-2024-81xx/CVE-2024-8184.json
Normal file
64
CVE-2024/CVE-2024-81xx/CVE-2024-8184.json
Normal file
@ -0,0 +1,64 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-8184",
|
||||||
|
"sourceIdentifier": "emo@eclipse.org",
|
||||||
|
"published": "2024-10-14T16:15:04.380",
|
||||||
|
"lastModified": "2024-10-14T16:15:04.380",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "There exists a security vulnerability in Jetty's ThreadLimitHandler.getRemote() which can be exploited by unauthorized users to cause remote denial-of-service (DoS) attack. By repeatedly sending crafted requests, attackers can trigger OutofMemory errors and exhaust the server's memory."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "emo@eclipse.org",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "HIGH",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 5.9,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.2,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "emo@eclipse.org",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-400"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/jetty/jetty.project/pull/11723",
|
||||||
|
"source": "emo@eclipse.org"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/jetty/jetty.project/security/advisories/GHSA-g8m5-722r-8whq",
|
||||||
|
"source": "emo@eclipse.org"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/30",
|
||||||
|
"source": "emo@eclipse.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-9142",
|
"id": "CVE-2024-9142",
|
||||||
"sourceIdentifier": "iletisim@usom.gov.tr",
|
"sourceIdentifier": "iletisim@usom.gov.tr",
|
||||||
"published": "2024-09-25T01:15:49.177",
|
"published": "2024-09-25T01:15:49.177",
|
||||||
"lastModified": "2024-09-26T13:32:02.803",
|
"lastModified": "2024-10-14T16:35:01.033",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -97,16 +97,6 @@
|
|||||||
"value": "CWE-732"
|
"value": "CWE-732"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
|
||||||
{
|
|
||||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
|
||||||
"type": "Secondary",
|
|
||||||
"description": [
|
|
||||||
{
|
|
||||||
"lang": "en",
|
|
||||||
"value": "CWE-73"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
|
@ -2,13 +2,13 @@
|
|||||||
"id": "CVE-2024-9823",
|
"id": "CVE-2024-9823",
|
||||||
"sourceIdentifier": "emo@eclipse.org",
|
"sourceIdentifier": "emo@eclipse.org",
|
||||||
"published": "2024-10-14T15:15:14.560",
|
"published": "2024-10-14T15:15:14.560",
|
||||||
"lastModified": "2024-10-14T15:15:14.560",
|
"lastModified": "2024-10-14T16:15:04.653",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Received",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Description\nThere exists a security vulnerability in Jetty's DosFilter which can be exploited by unauthorized\n\nusers to cause remote denial-of-service (DoS) attack on the server using DosFilter. By repeatedly sending crafted requests,\n\nattackers can trigger OutofMemory errors and exhaust the server's memory finally.\n\n\nVulnerability details\nThe Jetty DoSFilter (Denial of Service Filter) is a security filter designed to protect web\n\napplications against certain types of Denial of Service (DoS) attacks and other abusive behavior. It\n\nhelps to mitigate excessive resource consumption by limiting the rate at which clients can make\n\nrequests to the server. The DoSFilter monitors and tracks client request patterns, including\n\nrequest rates, and can take actions such as blocking or delaying requests from clients that exceed\n\npredefined thresholds. The internal tracking of requests in DoSFilter is the source of this OutOfMemory\n\ncondition.\n\n\nImpact\nUsers of the DoSFilter may be subject to DoS attacks that \nwill ultimately exhaust the memory of the server if they have not \nconfigured session passivation or an aggressive session inactivation \ntimeout.\n\n\nPatches\nThe DoSFilter has been patched in all active releases to no longer support the session tracking mode, even if configured.\n\n\nPatched releases:\n\n\n\n * 9.4.54\n\n * 10.0.18\n\n * 11.0.18\n\n * 12.0.3"
|
"value": "There exists a security vulnerability in Jetty's DosFilter which can be exploited by unauthorized users to cause remote denial-of-service (DoS) attack on the server using DosFilter. By repeatedly sending crafted requests, attackers can trigger OutofMemory errors and exhaust the server's memory finally."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
62
README.md
62
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
|||||||
### Last Repository Update
|
### Last Repository Update
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
2024-10-14T16:00:22.294274+00:00
|
2024-10-14T18:00:18.159658+00:00
|
||||||
```
|
```
|
||||||
|
|
||||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
2024-10-14T15:15:14.560000+00:00
|
2024-10-14T17:15:13.857000+00:00
|
||||||
```
|
```
|
||||||
|
|
||||||
### Last Data Feed Release
|
### Last Data Feed Release
|
||||||
@ -33,45 +33,45 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
|||||||
### Total Number of included CVEs
|
### Total Number of included CVEs
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
265485
|
265509
|
||||||
```
|
```
|
||||||
|
|
||||||
### CVEs added in the last Commit
|
### CVEs added in the last Commit
|
||||||
|
|
||||||
Recently added CVEs: `14`
|
Recently added CVEs: `24`
|
||||||
|
|
||||||
- [CVE-2024-40616](CVE-2024/CVE-2024-406xx/CVE-2024-40616.json) (`2024-10-14T15:15:13.407`)
|
- [CVE-2023-50780](CVE-2023/CVE-2023-507xx/CVE-2023-50780.json) (`2024-10-14T16:15:03.477`)
|
||||||
- [CVE-2024-48119](CVE-2024/CVE-2024-481xx/CVE-2024-48119.json) (`2024-10-14T14:15:11.597`)
|
- [CVE-2024-41997](CVE-2024/CVE-2024-419xx/CVE-2024-41997.json) (`2024-10-14T16:15:03.640`)
|
||||||
- [CVE-2024-48120](CVE-2024/CVE-2024-481xx/CVE-2024-48120.json) (`2024-10-14T14:15:11.780`)
|
- [CVE-2024-45731](CVE-2024/CVE-2024-457xx/CVE-2024-45731.json) (`2024-10-14T17:15:11.177`)
|
||||||
- [CVE-2024-48249](CVE-2024/CVE-2024-482xx/CVE-2024-48249.json) (`2024-10-14T15:15:13.760`)
|
- [CVE-2024-45732](CVE-2024/CVE-2024-457xx/CVE-2024-45732.json) (`2024-10-14T17:15:11.410`)
|
||||||
- [CVE-2024-48251](CVE-2024/CVE-2024-482xx/CVE-2024-48251.json) (`2024-10-14T15:15:13.857`)
|
- [CVE-2024-45733](CVE-2024/CVE-2024-457xx/CVE-2024-45733.json) (`2024-10-14T17:15:11.657`)
|
||||||
- [CVE-2024-48253](CVE-2024/CVE-2024-482xx/CVE-2024-48253.json) (`2024-10-14T14:15:11.857`)
|
- [CVE-2024-45734](CVE-2024/CVE-2024-457xx/CVE-2024-45734.json) (`2024-10-14T17:15:11.850`)
|
||||||
- [CVE-2024-48255](CVE-2024/CVE-2024-482xx/CVE-2024-48255.json) (`2024-10-14T14:15:11.937`)
|
- [CVE-2024-45735](CVE-2024/CVE-2024-457xx/CVE-2024-45735.json) (`2024-10-14T17:15:12.053`)
|
||||||
- [CVE-2024-48257](CVE-2024/CVE-2024-482xx/CVE-2024-48257.json) (`2024-10-14T15:15:13.947`)
|
- [CVE-2024-45736](CVE-2024/CVE-2024-457xx/CVE-2024-45736.json) (`2024-10-14T17:15:12.253`)
|
||||||
- [CVE-2024-48259](CVE-2024/CVE-2024-482xx/CVE-2024-48259.json) (`2024-10-14T15:15:14.033`)
|
- [CVE-2024-45737](CVE-2024/CVE-2024-457xx/CVE-2024-45737.json) (`2024-10-14T17:15:12.453`)
|
||||||
- [CVE-2024-48261](CVE-2024/CVE-2024-482xx/CVE-2024-48261.json) (`2024-10-14T15:15:14.130`)
|
- [CVE-2024-45738](CVE-2024/CVE-2024-457xx/CVE-2024-45738.json) (`2024-10-14T17:15:12.660`)
|
||||||
- [CVE-2024-7847](CVE-2024/CVE-2024-78xx/CVE-2024-7847.json) (`2024-10-14T14:15:12.020`)
|
- [CVE-2024-45739](CVE-2024/CVE-2024-457xx/CVE-2024-45739.json) (`2024-10-14T17:15:12.860`)
|
||||||
- [CVE-2024-8602](CVE-2024/CVE-2024-86xx/CVE-2024-8602.json) (`2024-10-14T14:15:12.400`)
|
- [CVE-2024-45740](CVE-2024/CVE-2024-457xx/CVE-2024-45740.json) (`2024-10-14T17:15:13.047`)
|
||||||
- [CVE-2024-9823](CVE-2024/CVE-2024-98xx/CVE-2024-9823.json) (`2024-10-14T15:15:14.560`)
|
- [CVE-2024-45741](CVE-2024/CVE-2024-457xx/CVE-2024-45741.json) (`2024-10-14T17:15:13.250`)
|
||||||
- [CVE-2024-9936](CVE-2024/CVE-2024-99xx/CVE-2024-9936.json) (`2024-10-14T14:15:12.553`)
|
- [CVE-2024-46535](CVE-2024/CVE-2024-465xx/CVE-2024-46535.json) (`2024-10-14T17:15:13.440`)
|
||||||
|
- [CVE-2024-48150](CVE-2024/CVE-2024-481xx/CVE-2024-48150.json) (`2024-10-14T16:15:03.750`)
|
||||||
|
- [CVE-2024-48153](CVE-2024/CVE-2024-481xx/CVE-2024-48153.json) (`2024-10-14T16:15:03.840`)
|
||||||
|
- [CVE-2024-48168](CVE-2024/CVE-2024-481xx/CVE-2024-48168.json) (`2024-10-14T17:15:13.520`)
|
||||||
|
- [CVE-2024-48796](CVE-2024/CVE-2024-487xx/CVE-2024-48796.json) (`2024-10-14T17:15:13.610`)
|
||||||
|
- [CVE-2024-48797](CVE-2024/CVE-2024-487xx/CVE-2024-48797.json) (`2024-10-14T17:15:13.690`)
|
||||||
|
- [CVE-2024-48798](CVE-2024/CVE-2024-487xx/CVE-2024-48798.json) (`2024-10-14T17:15:13.770`)
|
||||||
|
- [CVE-2024-48799](CVE-2024/CVE-2024-487xx/CVE-2024-48799.json) (`2024-10-14T17:15:13.857`)
|
||||||
|
- [CVE-2024-6762](CVE-2024/CVE-2024-67xx/CVE-2024-6762.json) (`2024-10-14T16:15:03.930`)
|
||||||
|
- [CVE-2024-6763](CVE-2024/CVE-2024-67xx/CVE-2024-6763.json) (`2024-10-14T16:15:04.163`)
|
||||||
|
- [CVE-2024-8184](CVE-2024/CVE-2024-81xx/CVE-2024-8184.json) (`2024-10-14T16:15:04.380`)
|
||||||
|
|
||||||
|
|
||||||
### CVEs modified in the last Commit
|
### CVEs modified in the last Commit
|
||||||
|
|
||||||
Recently modified CVEs: `12`
|
Recently modified CVEs: `2`
|
||||||
|
|
||||||
- [CVE-2023-2975](CVE-2023/CVE-2023-29xx/CVE-2023-2975.json) (`2024-10-14T15:15:11.457`)
|
- [CVE-2024-9142](CVE-2024/CVE-2024-91xx/CVE-2024-9142.json) (`2024-10-14T16:35:01.033`)
|
||||||
- [CVE-2023-3446](CVE-2023/CVE-2023-34xx/CVE-2023-3446.json) (`2024-10-14T15:15:11.730`)
|
- [CVE-2024-9823](CVE-2024/CVE-2024-98xx/CVE-2024-9823.json) (`2024-10-14T16:15:04.653`)
|
||||||
- [CVE-2023-3817](CVE-2023/CVE-2023-38xx/CVE-2023-3817.json) (`2024-10-14T15:15:11.930`)
|
|
||||||
- [CVE-2023-4807](CVE-2023/CVE-2023-48xx/CVE-2023-4807.json) (`2024-10-14T15:15:12.213`)
|
|
||||||
- [CVE-2023-5363](CVE-2023/CVE-2023-53xx/CVE-2023-5363.json) (`2024-10-14T15:15:12.407`)
|
|
||||||
- [CVE-2023-5678](CVE-2023/CVE-2023-56xx/CVE-2023-5678.json) (`2024-10-14T15:15:12.603`)
|
|
||||||
- [CVE-2023-6129](CVE-2023/CVE-2023-61xx/CVE-2023-6129.json) (`2024-10-14T15:15:12.800`)
|
|
||||||
- [CVE-2023-6237](CVE-2023/CVE-2023-62xx/CVE-2023-6237.json) (`2024-10-14T15:15:12.997`)
|
|
||||||
- [CVE-2024-0727](CVE-2024/CVE-2024-07xx/CVE-2024-0727.json) (`2024-10-14T15:15:13.100`)
|
|
||||||
- [CVE-2024-2511](CVE-2024/CVE-2024-25xx/CVE-2024-2511.json) (`2024-10-14T15:15:13.270`)
|
|
||||||
- [CVE-2024-4603](CVE-2024/CVE-2024-46xx/CVE-2024-4603.json) (`2024-10-14T15:15:14.210`)
|
|
||||||
- [CVE-2024-9341](CVE-2024/CVE-2024-93xx/CVE-2024-9341.json) (`2024-10-14T15:15:14.373`)
|
|
||||||
|
|
||||||
|
|
||||||
## Download and Usage
|
## Download and Usage
|
||||||
|
78
_state.csv
78
_state.csv
@ -222565,7 +222565,7 @@ CVE-2023-29746,0,0,4de2b2e1305924b83c2f864294adaef5a320dbbbfd2e0c4da9812d2544c38
|
|||||||
CVE-2023-29747,0,0,9eb43ea7631dd1e4b72ec6b22803484683cd26588e6859d3a4f9cd0a7cf5a6ed,2023-06-07T14:34:15.043000
|
CVE-2023-29747,0,0,9eb43ea7631dd1e4b72ec6b22803484683cd26588e6859d3a4f9cd0a7cf5a6ed,2023-06-07T14:34:15.043000
|
||||||
CVE-2023-29748,0,0,de4aac23f053152fc00e340c98d6ef168d487dd2c8d8003060d7aad38f43275c,2023-06-07T16:08:01.943000
|
CVE-2023-29748,0,0,de4aac23f053152fc00e340c98d6ef168d487dd2c8d8003060d7aad38f43275c,2023-06-07T16:08:01.943000
|
||||||
CVE-2023-29749,0,0,97c0ea052991d778178ffbad7d226f9a754724a6367429fd69f50e01a82beb12,2023-06-16T15:54:20.677000
|
CVE-2023-29749,0,0,97c0ea052991d778178ffbad7d226f9a754724a6367429fd69f50e01a82beb12,2023-06-16T15:54:20.677000
|
||||||
CVE-2023-2975,0,1,8c5ed1759a3f8bfe3996639c97b804b8ef7fd355e0ee87f009fefc1b3d8957ed,2024-10-14T15:15:11.457000
|
CVE-2023-2975,0,0,8c5ed1759a3f8bfe3996639c97b804b8ef7fd355e0ee87f009fefc1b3d8957ed,2024-10-14T15:15:11.457000
|
||||||
CVE-2023-29751,0,0,2461bc5a3a2fd89feadf65a8858f15921fea97751e88880207b87de2fec932ad,2023-06-16T16:35:22.790000
|
CVE-2023-29751,0,0,2461bc5a3a2fd89feadf65a8858f15921fea97751e88880207b87de2fec932ad,2023-06-16T16:35:22.790000
|
||||||
CVE-2023-29752,0,0,8e9fbd10ad7a80dafba43e1fcf07712781b98eb8ef62f0c41f7fa00e468ec7e1,2023-06-16T16:38:14.027000
|
CVE-2023-29752,0,0,8e9fbd10ad7a80dafba43e1fcf07712781b98eb8ef62f0c41f7fa00e468ec7e1,2023-06-16T16:38:14.027000
|
||||||
CVE-2023-29753,0,0,04743f0174dcc0b866fcd193b2c619f349964a63f6cc96d6eccf0198e8d578ca,2023-06-16T16:35:10.903000
|
CVE-2023-29753,0,0,04743f0174dcc0b866fcd193b2c619f349964a63f6cc96d6eccf0198e8d578ca,2023-06-16T16:35:10.903000
|
||||||
@ -226191,7 +226191,7 @@ CVE-2023-34455,0,0,20040caee8f9363f09b63fa89c3b13f7d06bec6ac095c1a41354e281696ca
|
|||||||
CVE-2023-34457,0,0,c984e4ca565e6e7772b40b5b931c9cee513dae66b761babd02d4d82b3876b73f,2023-08-03T15:15:24.573000
|
CVE-2023-34457,0,0,c984e4ca565e6e7772b40b5b931c9cee513dae66b761babd02d4d82b3876b73f,2023-08-03T15:15:24.573000
|
||||||
CVE-2023-34458,0,0,1972c79044b76b052e72e6e7d49a0030a5132a71fda0031caa56e56d48f8db72,2023-07-25T18:52:55.960000
|
CVE-2023-34458,0,0,1972c79044b76b052e72e6e7d49a0030a5132a71fda0031caa56e56d48f8db72,2023-07-25T18:52:55.960000
|
||||||
CVE-2023-34459,0,0,1661a6473de1a29629a1bc4d0bf8830bb82de99c243e642b96397442324d4635,2023-06-26T18:50:28.553000
|
CVE-2023-34459,0,0,1661a6473de1a29629a1bc4d0bf8830bb82de99c243e642b96397442324d4635,2023-06-26T18:50:28.553000
|
||||||
CVE-2023-3446,0,1,ef8f33ae332c554f794b1043b102758d30449855c76b3307b3ba2d934d2e2738,2024-10-14T15:15:11.730000
|
CVE-2023-3446,0,0,ef8f33ae332c554f794b1043b102758d30449855c76b3307b3ba2d934d2e2738,2024-10-14T15:15:11.730000
|
||||||
CVE-2023-34460,0,0,0487d7dc044cb6636be002c9646a7eb4bcbc917660ecd20c81d1e1d439ae04fe,2023-07-05T16:13:13.693000
|
CVE-2023-34460,0,0,0487d7dc044cb6636be002c9646a7eb4bcbc917660ecd20c81d1e1d439ae04fe,2023-07-05T16:13:13.693000
|
||||||
CVE-2023-34461,0,0,896acc05f1b2c77debce320c87f3a38c1be4e4a6a060c825bff0740c26dcbad2,2023-06-27T17:09:46.680000
|
CVE-2023-34461,0,0,896acc05f1b2c77debce320c87f3a38c1be4e4a6a060c825bff0740c26dcbad2,2023-06-27T17:09:46.680000
|
||||||
CVE-2023-34462,0,0,422a6937f1889a953f13ffdd3ac264e38fa42481cd06cc10e5413836428406f4,2024-06-21T19:15:27.163000
|
CVE-2023-34462,0,0,422a6937f1889a953f13ffdd3ac264e38fa42481cd06cc10e5413836428406f4,2024-06-21T19:15:27.163000
|
||||||
@ -228766,7 +228766,7 @@ CVE-2023-38164,0,0,c75b441218c78eeeccc06b658080d2048b20d7dd914d45a9a762a2cc2e592
|
|||||||
CVE-2023-38166,0,0,ec6db0f2c90b9a921c6e3d9dd66068fad15beb1f5bafe3cd770a908408705560,2024-05-29T02:16:27.720000
|
CVE-2023-38166,0,0,ec6db0f2c90b9a921c6e3d9dd66068fad15beb1f5bafe3cd770a908408705560,2024-05-29T02:16:27.720000
|
||||||
CVE-2023-38167,0,0,14fed7f47e692fcb5ef19b09920f17f6a8dd5207ad0171b7e71ba31daa66dc66,2024-05-29T02:16:27.953000
|
CVE-2023-38167,0,0,14fed7f47e692fcb5ef19b09920f17f6a8dd5207ad0171b7e71ba31daa66dc66,2024-05-29T02:16:27.953000
|
||||||
CVE-2023-38169,0,0,378fcd3dbcd1e5c72566352be29a70588185b5aaa4494f0fa99a7982c0eeb575,2024-05-29T02:16:28.170000
|
CVE-2023-38169,0,0,378fcd3dbcd1e5c72566352be29a70588185b5aaa4494f0fa99a7982c0eeb575,2024-05-29T02:16:28.170000
|
||||||
CVE-2023-3817,0,1,a08e5c61304fb5cac0fe57b7315dfa8930e089db523625cb31a230119ce7571c,2024-10-14T15:15:11.930000
|
CVE-2023-3817,0,0,a08e5c61304fb5cac0fe57b7315dfa8930e089db523625cb31a230119ce7571c,2024-10-14T15:15:11.930000
|
||||||
CVE-2023-38170,0,0,356aa6c6a4d22d05cdfe4df2b95a9403d364c230ec6550477c3569062517b42d,2024-05-29T02:16:28.293000
|
CVE-2023-38170,0,0,356aa6c6a4d22d05cdfe4df2b95a9403d364c230ec6550477c3569062517b42d,2024-05-29T02:16:28.293000
|
||||||
CVE-2023-38171,0,0,ee891f4e4709808afde7920b8591f11e8f6acb1ab3065f0211396b20ab5d2869,2024-05-29T02:16:28.403000
|
CVE-2023-38171,0,0,ee891f4e4709808afde7920b8591f11e8f6acb1ab3065f0211396b20ab5d2869,2024-05-29T02:16:28.403000
|
||||||
CVE-2023-38172,0,0,d3c568e41b16a7d41483c64374a5ac61b2d649c710fc60ed4d48400ab6dda974,2024-05-29T02:16:28.530000
|
CVE-2023-38172,0,0,d3c568e41b16a7d41483c64374a5ac61b2d649c710fc60ed4d48400ab6dda974,2024-05-29T02:16:28.530000
|
||||||
@ -235900,7 +235900,7 @@ CVE-2023-4806,0,0,169c709c7fcce2a813cb83fb6cce3554d64b2c509e52376f27f98faea6ca74
|
|||||||
CVE-2023-48060,0,0,fea1d282cced2562e6c31897934f5482f80df5de60fcee98c3efce46bed4f5cd,2024-09-03T19:35:07.643000
|
CVE-2023-48060,0,0,fea1d282cced2562e6c31897934f5482f80df5de60fcee98c3efce46bed4f5cd,2024-09-03T19:35:07.643000
|
||||||
CVE-2023-48063,0,0,ea9189f47de248a9b67965af3b522898bbda97ce156221191808cdec464e23d4,2023-11-16T17:35:21.507000
|
CVE-2023-48063,0,0,ea9189f47de248a9b67965af3b522898bbda97ce156221191808cdec464e23d4,2023-11-16T17:35:21.507000
|
||||||
CVE-2023-48068,0,0,d2ed6581af62c4b74ef3f8171b12ae6e16910b36aa9ccf062a942fd093c09c13,2023-11-16T17:35:37.623000
|
CVE-2023-48068,0,0,d2ed6581af62c4b74ef3f8171b12ae6e16910b36aa9ccf062a942fd093c09c13,2023-11-16T17:35:37.623000
|
||||||
CVE-2023-4807,0,1,3de0d677ebbf00153cefbfa374c0ecc381ecf722c89be68b57b7df074a7f14d7,2024-10-14T15:15:12.213000
|
CVE-2023-4807,0,0,3de0d677ebbf00153cefbfa374c0ecc381ecf722c89be68b57b7df074a7f14d7,2024-10-14T15:15:12.213000
|
||||||
CVE-2023-48078,0,0,0d9dcf5cb116c36b06b2365e4b759d1ca0ba54345b6daa32e108a2d9f4c48031,2024-08-14T19:35:13.890000
|
CVE-2023-48078,0,0,0d9dcf5cb116c36b06b2365e4b759d1ca0ba54345b6daa32e108a2d9f4c48031,2024-08-14T19:35:13.890000
|
||||||
CVE-2023-4808,0,0,4a43f94f49b00a1ded4942c432a3569f5fcf99624dd900f508f8d30286fbcfa9,2023-11-27T16:33:33.237000
|
CVE-2023-4808,0,0,4a43f94f49b00a1ded4942c432a3569f5fcf99624dd900f508f8d30286fbcfa9,2023-11-27T16:33:33.237000
|
||||||
CVE-2023-48084,0,0,459a90979a07550a284aa3e1863b171726a2debcb2ae1cda3b39790a2d652b29,2023-12-19T18:41:44.493000
|
CVE-2023-48084,0,0,459a90979a07550a284aa3e1863b171726a2debcb2ae1cda3b39790a2d652b29,2023-12-19T18:41:44.493000
|
||||||
@ -237793,6 +237793,7 @@ CVE-2023-50777,0,0,df0d9de6b8a0baaf3efff27900ebb62bf75a216074a2617fe71f734fe044c
|
|||||||
CVE-2023-50778,0,0,4c2b380d1452ab879c0bb2f5c89c5ce489b1f3e5d975b71bfe4549f784edbd60,2023-12-18T19:10:26.547000
|
CVE-2023-50778,0,0,4c2b380d1452ab879c0bb2f5c89c5ce489b1f3e5d975b71bfe4549f784edbd60,2023-12-18T19:10:26.547000
|
||||||
CVE-2023-50779,0,0,a0c5abaaea21dffc7e5a857a3cc8d6fdf18a54e29bad4eca92e474cb6a42116d,2023-12-18T19:09:28.547000
|
CVE-2023-50779,0,0,a0c5abaaea21dffc7e5a857a3cc8d6fdf18a54e29bad4eca92e474cb6a42116d,2023-12-18T19:09:28.547000
|
||||||
CVE-2023-5078,0,0,44af65139afdd3e9781ce81372f6fd64997c761012986369ca4fdcdd6cdd5a3c,2024-09-16T15:15:15.367000
|
CVE-2023-5078,0,0,44af65139afdd3e9781ce81372f6fd64997c761012986369ca4fdcdd6cdd5a3c,2024-09-16T15:15:15.367000
|
||||||
|
CVE-2023-50780,1,1,997ce97484e991ac4325541ba8de0cd441dbe9708d3ca1f82502bec6f09a06cf,2024-10-14T16:15:03.477000
|
||||||
CVE-2023-50781,0,0,4cd11cbf33226a1d3a67a681c39cb955b0d7b7bd73503eb21db0ba61d3e9a3f9,2024-02-26T16:27:47.760000
|
CVE-2023-50781,0,0,4cd11cbf33226a1d3a67a681c39cb955b0d7b7bd73503eb21db0ba61d3e9a3f9,2024-02-26T16:27:47.760000
|
||||||
CVE-2023-50782,0,0,658725b86153a9f539275c901096223b399321aeaa417b3e344f544d03067a46,2024-09-27T19:15:09.603000
|
CVE-2023-50782,0,0,658725b86153a9f539275c901096223b399321aeaa417b3e344f544d03067a46,2024-09-27T19:15:09.603000
|
||||||
CVE-2023-50783,0,0,6b32c482163913116bd4c154365475f6fbb1c73c4268388823017e442458c167,2023-12-28T13:45:11.130000
|
CVE-2023-50783,0,0,6b32c482163913116bd4c154365475f6fbb1c73c4268388823017e442458c167,2023-12-28T13:45:11.130000
|
||||||
@ -239544,7 +239545,7 @@ CVE-2023-5358,0,0,3843b7eb2b83630439823339cd1e7c1ebb5c2bfad1a924657ec37661bd127a
|
|||||||
CVE-2023-5359,0,0,cd93a1d7d146b91e639cade66b248b7feb66dbcb22fb36eaf6547dbca671eace,2024-09-30T14:19:15.970000
|
CVE-2023-5359,0,0,cd93a1d7d146b91e639cade66b248b7feb66dbcb22fb36eaf6547dbca671eace,2024-09-30T14:19:15.970000
|
||||||
CVE-2023-5360,0,0,23416f23056cf7d0eaf89d196ff3012aba1f2266b06af6861779d6d467ce1803,2023-11-29T15:15:10.100000
|
CVE-2023-5360,0,0,23416f23056cf7d0eaf89d196ff3012aba1f2266b06af6861779d6d467ce1803,2023-11-29T15:15:10.100000
|
||||||
CVE-2023-5362,0,0,80b923a43138bfee55c8b364d2d98e107b276de0395018a0792e2ca94e3f39da,2023-11-13T14:47:34.907000
|
CVE-2023-5362,0,0,80b923a43138bfee55c8b364d2d98e107b276de0395018a0792e2ca94e3f39da,2023-11-13T14:47:34.907000
|
||||||
CVE-2023-5363,0,1,32ed94009f7d7a0175ed9bbcf2376d54f9be36a8ef12ee3c789d732aa98c0273,2024-10-14T15:15:12.407000
|
CVE-2023-5363,0,0,32ed94009f7d7a0175ed9bbcf2376d54f9be36a8ef12ee3c789d732aa98c0273,2024-10-14T15:15:12.407000
|
||||||
CVE-2023-5365,0,0,a3d6abcc6553631f878844970226a67093bba6db11761fa7e287a38223bd4a0f,2024-09-19T15:35:08.273000
|
CVE-2023-5365,0,0,a3d6abcc6553631f878844970226a67093bba6db11761fa7e287a38223bd4a0f,2024-09-19T15:35:08.273000
|
||||||
CVE-2023-5366,0,0,549d2b06c12957ddad6fd9e09c667fc61e212290cbc78d274e985fd10c51fd9b,2024-03-23T03:15:10.327000
|
CVE-2023-5366,0,0,549d2b06c12957ddad6fd9e09c667fc61e212290cbc78d274e985fd10c51fd9b,2024-03-23T03:15:10.327000
|
||||||
CVE-2023-5367,0,0,ece93636181bbf6ef1a4f8c67dc0564beafd1659cfc2a57970f0c60be3279f64,2024-09-16T16:15:08.640000
|
CVE-2023-5367,0,0,ece93636181bbf6ef1a4f8c67dc0564beafd1659cfc2a57970f0c60be3279f64,2024-09-16T16:15:08.640000
|
||||||
@ -239833,7 +239834,7 @@ CVE-2023-5674,0,0,ad6a524623973b785443ed5ef1d7ce3fc434ea992e37165634367ac391476b
|
|||||||
CVE-2023-5675,0,0,26d656fccd5c8593a8d4a9ed8d70f37dec8e8fe19baf58f5aece6460feff10db,2024-08-01T13:45:45.357000
|
CVE-2023-5675,0,0,26d656fccd5c8593a8d4a9ed8d70f37dec8e8fe19baf58f5aece6460feff10db,2024-08-01T13:45:45.357000
|
||||||
CVE-2023-5676,0,0,a627ea7bf88ea5b6dccb528b94589245e9f9ba331b8e03892a33208a41506408,2023-11-22T22:39:25.137000
|
CVE-2023-5676,0,0,a627ea7bf88ea5b6dccb528b94589245e9f9ba331b8e03892a33208a41506408,2023-11-22T22:39:25.137000
|
||||||
CVE-2023-5677,0,0,08b2893d4601209dee22cd4c45290e5831a26efa6eeca1fc36aea8ab189442dc,2024-02-13T00:38:00.893000
|
CVE-2023-5677,0,0,08b2893d4601209dee22cd4c45290e5831a26efa6eeca1fc36aea8ab189442dc,2024-02-13T00:38:00.893000
|
||||||
CVE-2023-5678,0,1,20fd1e9f5bec6f0da539cc18e171e3a9021c1db788460fc8978c0d9abde4744d,2024-10-14T15:15:12.603000
|
CVE-2023-5678,0,0,20fd1e9f5bec6f0da539cc18e171e3a9021c1db788460fc8978c0d9abde4744d,2024-10-14T15:15:12.603000
|
||||||
CVE-2023-5679,0,0,4960f652ee6c5b1a46e7d7d2a06407e27c0c64465787d874631b65221eda9309,2024-04-26T09:15:08.843000
|
CVE-2023-5679,0,0,4960f652ee6c5b1a46e7d7d2a06407e27c0c64465787d874631b65221eda9309,2024-04-26T09:15:08.843000
|
||||||
CVE-2023-5680,0,0,8cff3e083f7c7bd084b842f852f743395da779c5a8fed0ab54ee3dfa1f5214a1,2024-05-03T13:15:21.093000
|
CVE-2023-5680,0,0,8cff3e083f7c7bd084b842f852f743395da779c5a8fed0ab54ee3dfa1f5214a1,2024-05-03T13:15:21.093000
|
||||||
CVE-2023-5681,0,0,d7491800836d2388e22440d68a862dd278a82c18bac217a1d7b7b5fd9c059522,2024-05-17T02:33:13.287000
|
CVE-2023-5681,0,0,d7491800836d2388e22440d68a862dd278a82c18bac217a1d7b7b5fd9c059522,2024-05-17T02:33:13.287000
|
||||||
@ -240254,7 +240255,7 @@ CVE-2023-6125,0,0,6680cb2510eb0946111f3e49e52187e7e4686cd04eee3143a65deb0d92b21d
|
|||||||
CVE-2023-6126,0,0,fd71edfc64e634c33eecaba889690a462253fd022c13eade6ebce93fb6ac3be0,2023-11-17T17:59:32.487000
|
CVE-2023-6126,0,0,fd71edfc64e634c33eecaba889690a462253fd022c13eade6ebce93fb6ac3be0,2023-11-17T17:59:32.487000
|
||||||
CVE-2023-6127,0,0,dd56a9c0eb24ea5efe54939a8e05dcbc5546629a3a54fa1faf2ac7228395f184,2023-11-17T17:58:50.183000
|
CVE-2023-6127,0,0,dd56a9c0eb24ea5efe54939a8e05dcbc5546629a3a54fa1faf2ac7228395f184,2023-11-17T17:58:50.183000
|
||||||
CVE-2023-6128,0,0,8286b6f56ff713bb258e67fc6a050b0a6ddfab13c3281cce30702591390dc377,2023-11-17T17:46:55.197000
|
CVE-2023-6128,0,0,8286b6f56ff713bb258e67fc6a050b0a6ddfab13c3281cce30702591390dc377,2023-11-17T17:46:55.197000
|
||||||
CVE-2023-6129,0,1,e16c8ea14afe5d997525e465c6bd7fde97ac937191b20df5c050420596b15dd9,2024-10-14T15:15:12.800000
|
CVE-2023-6129,0,0,e16c8ea14afe5d997525e465c6bd7fde97ac937191b20df5c050420596b15dd9,2024-10-14T15:15:12.800000
|
||||||
CVE-2023-6130,0,0,2818ee43655844efe6fed8882b910732845b519dfa1dbf502beef737f2e76f99,2023-11-17T21:28:58.080000
|
CVE-2023-6130,0,0,2818ee43655844efe6fed8882b910732845b519dfa1dbf502beef737f2e76f99,2023-11-17T21:28:58.080000
|
||||||
CVE-2023-6131,0,0,889a910bd1ac71ecfab90c405c0d8acaa1783fa5493cd17ac2acae757227003a,2023-11-17T21:28:31.490000
|
CVE-2023-6131,0,0,889a910bd1ac71ecfab90c405c0d8acaa1783fa5493cd17ac2acae757227003a,2023-11-17T21:28:31.490000
|
||||||
CVE-2023-6132,0,0,94bf0b300c60cba1ebf0a1af45abf44572088b1a37ffefc21172e6ef88b3b437,2024-03-01T14:04:26.010000
|
CVE-2023-6132,0,0,94bf0b300c60cba1ebf0a1af45abf44572088b1a37ffefc21172e6ef88b3b437,2024-03-01T14:04:26.010000
|
||||||
@ -240346,7 +240347,7 @@ CVE-2023-6233,0,0,e3aaa68b264dc91d419a318d56a374d994d572e57fedadcdf71ff52189d71e
|
|||||||
CVE-2023-6234,0,0,5e47c089c57aa5a25b883980b84d44dc18ef3c76841351a6420b2de979b06550,2024-02-13T19:51:46.740000
|
CVE-2023-6234,0,0,5e47c089c57aa5a25b883980b84d44dc18ef3c76841351a6420b2de979b06550,2024-02-13T19:51:46.740000
|
||||||
CVE-2023-6235,0,0,65e74a86f5bbff8d25e3efc268e4bb50210ad04b2f747cf0c9a224be0818ee6c,2023-11-29T16:59:51.970000
|
CVE-2023-6235,0,0,65e74a86f5bbff8d25e3efc268e4bb50210ad04b2f747cf0c9a224be0818ee6c,2023-11-29T16:59:51.970000
|
||||||
CVE-2023-6236,0,0,bfa67257c2a3ffd7b3d06b564fb26217261866326487bc912cbff8bf3f4202d7,2024-06-18T13:15:51.123000
|
CVE-2023-6236,0,0,bfa67257c2a3ffd7b3d06b564fb26217261866326487bc912cbff8bf3f4202d7,2024-06-18T13:15:51.123000
|
||||||
CVE-2023-6237,0,1,b4bc23e4eec08626993d6bd4b0ae8a847710940a5c6135d4b515a1f508c35ad0,2024-10-14T15:15:12.997000
|
CVE-2023-6237,0,0,b4bc23e4eec08626993d6bd4b0ae8a847710940a5c6135d4b515a1f508c35ad0,2024-10-14T15:15:12.997000
|
||||||
CVE-2023-6238,0,0,2e211fe01ee8c7e57afdef0930b8f1bc5c09293054105dbd159c8f8857f29757,2024-02-07T00:15:55.240000
|
CVE-2023-6238,0,0,2e211fe01ee8c7e57afdef0930b8f1bc5c09293054105dbd159c8f8857f29757,2024-02-07T00:15:55.240000
|
||||||
CVE-2023-6239,0,0,b65e4e0202f8c904d3bed9c0b298036f60e92b6b3988771b4545deac730dcf4b,2024-08-28T09:15:10.550000
|
CVE-2023-6239,0,0,b65e4e0202f8c904d3bed9c0b298036f60e92b6b3988771b4545deac730dcf4b,2024-08-28T09:15:10.550000
|
||||||
CVE-2023-6240,0,0,9a8f126fd8f5ef282af06e27627122b943a8da0b0302096eb47cb5d50f4fd387,2024-09-14T00:15:12.483000
|
CVE-2023-6240,0,0,9a8f126fd8f5ef282af06e27627122b943a8da0b0302096eb47cb5d50f4fd387,2024-09-14T00:15:12.483000
|
||||||
@ -241890,7 +241891,7 @@ CVE-2024-0722,0,0,e3fd857d56c3e7a1ce18df94c2aad06d8e5ba0ba6f59fdbc875af0baef84e5
|
|||||||
CVE-2024-0723,0,0,62b3b8158ed5f431f7c823843250dde65bc6b046016f1d806e5bf4a77c554601,2024-05-17T02:34:54.417000
|
CVE-2024-0723,0,0,62b3b8158ed5f431f7c823843250dde65bc6b046016f1d806e5bf4a77c554601,2024-05-17T02:34:54.417000
|
||||||
CVE-2024-0725,0,0,9f34bbeb9ca65e262b0f114d97475b4588551a2e0d6e1b478b0fe96d6457c471,2024-05-17T02:34:54.540000
|
CVE-2024-0725,0,0,9f34bbeb9ca65e262b0f114d97475b4588551a2e0d6e1b478b0fe96d6457c471,2024-05-17T02:34:54.540000
|
||||||
CVE-2024-0726,0,0,614c484a417a79563637bf6c4e4842b2936b34d19e28c25bc06b3ee24570d0f3,2024-05-17T02:34:54.650000
|
CVE-2024-0726,0,0,614c484a417a79563637bf6c4e4842b2936b34d19e28c25bc06b3ee24570d0f3,2024-05-17T02:34:54.650000
|
||||||
CVE-2024-0727,0,1,029a496ed427073edc27553aecd27066148acfe7af4675f627eb209fc5b1daaa,2024-10-14T15:15:13.100000
|
CVE-2024-0727,0,0,029a496ed427073edc27553aecd27066148acfe7af4675f627eb209fc5b1daaa,2024-10-14T15:15:13.100000
|
||||||
CVE-2024-0728,0,0,8e86daecc5b7cf2cd88ed5152fb6a2af57ca1a3f0df02f0db63414ebf20cd037,2024-05-17T02:34:54.780000
|
CVE-2024-0728,0,0,8e86daecc5b7cf2cd88ed5152fb6a2af57ca1a3f0df02f0db63414ebf20cd037,2024-05-17T02:34:54.780000
|
||||||
CVE-2024-0729,0,0,35aad4ab490381a796d82e9abc9a3e9bab04093ac6b38aa110e0a6401a78c4c6,2024-05-17T02:34:54.887000
|
CVE-2024-0729,0,0,35aad4ab490381a796d82e9abc9a3e9bab04093ac6b38aa110e0a6401a78c4c6,2024-05-17T02:34:54.887000
|
||||||
CVE-2024-0730,0,0,864087475952c894903074292e7d5d73331f2529c20d6e97f634c7504eb2ebd5,2024-05-17T02:34:55.003000
|
CVE-2024-0730,0,0,864087475952c894903074292e7d5d73331f2529c20d6e97f634c7504eb2ebd5,2024-05-17T02:34:55.003000
|
||||||
@ -246647,7 +246648,7 @@ CVE-2024-25106,0,0,69f4a5df8f9163ba3cc00a57d78f06705015dcf6a2341378521404b16f38f
|
|||||||
CVE-2024-25107,0,0,2f7af5f36b252a42eb30d1f8972da5732bf420e322522d60adcccf7f4819b86a,2024-02-15T18:52:25.613000
|
CVE-2024-25107,0,0,2f7af5f36b252a42eb30d1f8972da5732bf420e322522d60adcccf7f4819b86a,2024-02-15T18:52:25.613000
|
||||||
CVE-2024-25108,0,0,ea86aeb46132d1436758572e531bfe9d096e1704148614890b5ee2b811e5154b,2024-10-11T19:31:20.060000
|
CVE-2024-25108,0,0,ea86aeb46132d1436758572e531bfe9d096e1704148614890b5ee2b811e5154b,2024-10-11T19:31:20.060000
|
||||||
CVE-2024-25109,0,0,c41f7e7a8b0352e7db5bd3620b2014d3afb64c0a666c2f8d504ee8ea7a10e96b,2024-09-05T13:18:39.687000
|
CVE-2024-25109,0,0,c41f7e7a8b0352e7db5bd3620b2014d3afb64c0a666c2f8d504ee8ea7a10e96b,2024-09-05T13:18:39.687000
|
||||||
CVE-2024-2511,0,1,25ba3d5dec8dfd6cf26bc268a14176944084d3a63c61f96c81b75524a5331e44,2024-10-14T15:15:13.270000
|
CVE-2024-2511,0,0,25ba3d5dec8dfd6cf26bc268a14176944084d3a63c61f96c81b75524a5331e44,2024-10-14T15:15:13.270000
|
||||||
CVE-2024-25110,0,0,d26cbb0693a4d6c53e7081518beb8a84b92d2cd8bf57244ea03bf261dee5ab3f,2024-10-11T21:55:24.837000
|
CVE-2024-25110,0,0,d26cbb0693a4d6c53e7081518beb8a84b92d2cd8bf57244ea03bf261dee5ab3f,2024-10-11T21:55:24.837000
|
||||||
CVE-2024-25111,0,0,260c08f765b0b23211db8fb3020f7ae46891432e3f36f885aebdb89bc620ed80,2024-06-10T18:15:27.443000
|
CVE-2024-25111,0,0,260c08f765b0b23211db8fb3020f7ae46891432e3f36f885aebdb89bc620ed80,2024-06-10T18:15:27.443000
|
||||||
CVE-2024-25112,0,0,62d81a6835c854cf3f1a6117c1e57e73e656e5f510894e971df29562320bde94,2024-02-13T14:01:40.577000
|
CVE-2024-25112,0,0,62d81a6835c854cf3f1a6117c1e57e73e656e5f510894e971df29562320bde94,2024-02-13T14:01:40.577000
|
||||||
@ -257574,7 +257575,7 @@ CVE-2024-40604,0,0,96707551e8fc94b334085d5bf2926e369955211afc96673efa337699ead3d
|
|||||||
CVE-2024-40605,0,0,3b7d08be38342ed975d3a802af7734eccce4b6fa70dd407ef7f8c6cca68429e4,2024-07-09T16:09:30.277000
|
CVE-2024-40605,0,0,3b7d08be38342ed975d3a802af7734eccce4b6fa70dd407ef7f8c6cca68429e4,2024-07-09T16:09:30.277000
|
||||||
CVE-2024-4061,0,0,3d64526f6b4051e690acf87533a742bc5fa8b9683de463655fd6184fe7fa5bfb,2024-05-21T12:37:59.687000
|
CVE-2024-4061,0,0,3d64526f6b4051e690acf87533a742bc5fa8b9683de463655fd6184fe7fa5bfb,2024-05-21T12:37:59.687000
|
||||||
CVE-2024-40614,0,0,5a8c90c94f1b0dc56355424420ebae65c618d536c580acb4e248f7802de2136c,2024-07-10T13:15:10.833000
|
CVE-2024-40614,0,0,5a8c90c94f1b0dc56355424420ebae65c618d536c580acb4e248f7802de2136c,2024-07-10T13:15:10.833000
|
||||||
CVE-2024-40616,1,1,f080804a22bb99d6bad6cefea7d430cb07b5ac0dbf796cced63e81300b3d547a,2024-10-14T15:15:13.407000
|
CVE-2024-40616,0,0,f080804a22bb99d6bad6cefea7d430cb07b5ac0dbf796cced63e81300b3d547a,2024-10-14T15:15:13.407000
|
||||||
CVE-2024-40617,0,0,2efaf69feebd32907e47dcfdd1d9a6531eebf60e579d5726cae13557574657a9,2024-09-10T13:45:37.100000
|
CVE-2024-40617,0,0,2efaf69feebd32907e47dcfdd1d9a6531eebf60e579d5726cae13557574657a9,2024-09-10T13:45:37.100000
|
||||||
CVE-2024-40618,0,0,339cc634a42e8a7db54f4bb39e56482affa65b57dfd2765250a61f2e694456da,2024-07-12T16:12:00.597000
|
CVE-2024-40618,0,0,339cc634a42e8a7db54f4bb39e56482affa65b57dfd2765250a61f2e694456da,2024-07-12T16:12:00.597000
|
||||||
CVE-2024-40619,0,0,71752a5fbb09ad3b98ad49ccde5e7b24e7278b9eb9f9bc361b3decfc42effc78,2024-08-15T13:01:10.150000
|
CVE-2024-40619,0,0,71752a5fbb09ad3b98ad49ccde5e7b24e7278b9eb9f9bc361b3decfc42effc78,2024-08-15T13:01:10.150000
|
||||||
@ -258494,6 +258495,7 @@ CVE-2024-41990,0,0,a9d3bfe1152ea007eb5df4a4d15c3972fabe2ab7cf6c4dc84957655472913
|
|||||||
CVE-2024-41991,0,0,c38f7b679bd3e48c46db9fd1c6390ab9383b0c22d8669d807f374055f46ee42b,2024-08-07T20:48:22.403000
|
CVE-2024-41991,0,0,c38f7b679bd3e48c46db9fd1c6390ab9383b0c22d8669d807f374055f46ee42b,2024-08-07T20:48:22.403000
|
||||||
CVE-2024-41995,0,0,79638f0d10c16b237f07db3242d98d294e87bf4205be8c6d9c3c7b90790704bd,2024-08-06T16:30:24.547000
|
CVE-2024-41995,0,0,79638f0d10c16b237f07db3242d98d294e87bf4205be8c6d9c3c7b90790704bd,2024-08-06T16:30:24.547000
|
||||||
CVE-2024-41996,0,0,29b8c50df43b1c66bff4b5734acbca34adccc097a107dedf36398e589357d13d,2024-08-26T16:35:11.247000
|
CVE-2024-41996,0,0,29b8c50df43b1c66bff4b5734acbca34adccc097a107dedf36398e589357d13d,2024-08-26T16:35:11.247000
|
||||||
|
CVE-2024-41997,1,1,feb93180957d926c3a2515af9caa2596a5a805e498da40f2eabee214b9d19034,2024-10-14T16:15:03.640000
|
||||||
CVE-2024-41999,0,0,a370380ae5e595c1d409f5d8d8f92b14e0e23ae9708051ce0a7058f9d91625a3,2024-09-30T17:35:09.340000
|
CVE-2024-41999,0,0,a370380ae5e595c1d409f5d8d8f92b14e0e23ae9708051ce0a7058f9d91625a3,2024-09-30T17:35:09.340000
|
||||||
CVE-2024-4200,0,0,4cd240b08c44457e11ab7d0e46f05e7d4edddbc268bf54e61982ff7b6b50f3a4,2024-05-15T18:35:11.453000
|
CVE-2024-4200,0,0,4cd240b08c44457e11ab7d0e46f05e7d4edddbc268bf54e61982ff7b6b50f3a4,2024-05-15T18:35:11.453000
|
||||||
CVE-2024-42001,0,0,fcbbb9fe256b159250061e78a0e74ebb6632e1ed1a0fdada8381ebf9439eb017,2024-08-20T16:37:05.447000
|
CVE-2024-42001,0,0,fcbbb9fe256b159250061e78a0e74ebb6632e1ed1a0fdada8381ebf9439eb017,2024-08-20T16:37:05.447000
|
||||||
@ -260698,7 +260700,18 @@ CVE-2024-4571,0,0,76823bb120333d1d68e24e57a18868a62bd826931cb118db3f1630877d1250
|
|||||||
CVE-2024-4572,0,0,6754f54e88e479a744a4367c8d1d2577fd697a90d0783dabcb9fc508df61090e,2024-05-14T15:44:06.153000
|
CVE-2024-4572,0,0,6754f54e88e479a744a4367c8d1d2577fd697a90d0783dabcb9fc508df61090e,2024-05-14T15:44:06.153000
|
||||||
CVE-2024-45720,0,0,9a958c282ef360c53e2ab2db366594f7b62a7ef8d528ac6998de122fd3a653b0,2024-10-10T12:51:56.987000
|
CVE-2024-45720,0,0,9a958c282ef360c53e2ab2db366594f7b62a7ef8d528ac6998de122fd3a653b0,2024-10-10T12:51:56.987000
|
||||||
CVE-2024-45723,0,0,63a77b3806467261b762149cf38436dbbeeccf91520557e4f16dba13005bb2d7,2024-10-07T17:43:52.783000
|
CVE-2024-45723,0,0,63a77b3806467261b762149cf38436dbbeeccf91520557e4f16dba13005bb2d7,2024-10-07T17:43:52.783000
|
||||||
|
CVE-2024-45731,1,1,64f3b076e1ba73dffdf0c460512babb747cd809745bbab294692b67d6edcedab,2024-10-14T17:15:11.177000
|
||||||
|
CVE-2024-45732,1,1,4e5072a835dfaa21d6aa1c1f6e7186ca3a2566f20a3b2446f1311cd0df57600a,2024-10-14T17:15:11.410000
|
||||||
|
CVE-2024-45733,1,1,26b12148a3d1f105c07f5ec4d630a2627962ac0992e8874fa66efb919b028102,2024-10-14T17:15:11.657000
|
||||||
|
CVE-2024-45734,1,1,60f6ad0bd39b15a28edbbec8142bfd65f3dd6893675910d2f5a63b73b1510f5b,2024-10-14T17:15:11.850000
|
||||||
|
CVE-2024-45735,1,1,d1f5a904ff4ce2124f50a1bcd5480da3acc1d59dfb44c552ef8762f57a0c1d19,2024-10-14T17:15:12.053000
|
||||||
|
CVE-2024-45736,1,1,f78c0cba5a890982b2563a6304d5814ab3232334c5657217d2788ee254c5ee03,2024-10-14T17:15:12.253000
|
||||||
|
CVE-2024-45737,1,1,6f1419b68d8eca19f450336f3fec46602dda1e328d1cee2a20bb0db8b44f3328,2024-10-14T17:15:12.453000
|
||||||
|
CVE-2024-45738,1,1,5d1da984cf863288c52eaff3ff6108b50ab539a8a304723020a2fd2eac1740c7,2024-10-14T17:15:12.660000
|
||||||
|
CVE-2024-45739,1,1,01a43068fb72c181b3efa5733fc8e8be54627ae8a8ac05fdef7e7315f4ba75ed,2024-10-14T17:15:12.860000
|
||||||
CVE-2024-4574,0,0,5bc00996fe57104150ae610f292ff224de65f0948423aca3282fe7d917884520,2024-05-14T16:11:39.510000
|
CVE-2024-4574,0,0,5bc00996fe57104150ae610f292ff224de65f0948423aca3282fe7d917884520,2024-05-14T16:11:39.510000
|
||||||
|
CVE-2024-45740,1,1,9d225636a0ff30313e82d40744acf0f9d64b6da60e9d3a775ea47d422a68fd76,2024-10-14T17:15:13.047000
|
||||||
|
CVE-2024-45741,1,1,2446936f73030d260e2103cbcab9418fbd70c8e0a8e075e9a5a2ac2e64abaf06,2024-10-14T17:15:13.250000
|
||||||
CVE-2024-45744,0,0,ec4698c6891bd67c723c11e0dc841a026f8c5da574327fdd441b22164fa47c9a,2024-09-30T12:45:57.823000
|
CVE-2024-45744,0,0,ec4698c6891bd67c723c11e0dc841a026f8c5da574327fdd441b22164fa47c9a,2024-09-30T12:45:57.823000
|
||||||
CVE-2024-45745,0,0,095415295fb9e908dbd1bbbd24ecc8e41cf81936c17bbb0aa6290e6785ab228e,2024-09-30T12:45:57.823000
|
CVE-2024-45745,0,0,095415295fb9e908dbd1bbbd24ecc8e41cf81936c17bbb0aa6290e6785ab228e,2024-09-30T12:45:57.823000
|
||||||
CVE-2024-45746,0,0,902861897e83a8721d85c8381c9fc33c107d622749f6a985c29d3f01f324f690,2024-10-11T21:36:34.350000
|
CVE-2024-45746,0,0,902861897e83a8721d85c8381c9fc33c107d622749f6a985c29d3f01f324f690,2024-10-11T21:36:34.350000
|
||||||
@ -260818,7 +260831,7 @@ CVE-2024-45999,0,0,af895c303825f0596a9091053cec8108aced826e7775d2d54abeebde71fb3
|
|||||||
CVE-2024-4600,0,0,078ff1a3ce0c016ebe4abdef878e85c422e5d3e27f924ee561699d3a699695bb,2024-05-07T13:39:32.710000
|
CVE-2024-4600,0,0,078ff1a3ce0c016ebe4abdef878e85c422e5d3e27f924ee561699d3a699695bb,2024-05-07T13:39:32.710000
|
||||||
CVE-2024-4601,0,0,f0cf92b01a71b6ce5239836875c0fea83fe5cefcc9c9a95787d845c600418862,2024-05-07T13:39:32.710000
|
CVE-2024-4601,0,0,f0cf92b01a71b6ce5239836875c0fea83fe5cefcc9c9a95787d845c600418862,2024-05-07T13:39:32.710000
|
||||||
CVE-2024-4602,0,0,2d8504f508e1d4f718d8c666850c307b85c9596de2a8b2f0ab0bc138c9da4ca4,2024-08-01T13:59:32.233000
|
CVE-2024-4602,0,0,2d8504f508e1d4f718d8c666850c307b85c9596de2a8b2f0ab0bc138c9da4ca4,2024-08-01T13:59:32.233000
|
||||||
CVE-2024-4603,0,1,9942bc7f0ee4df83c0037c4c5d6b42a7bde07b02fe0e655d3c99ab93c8488123,2024-10-14T15:15:14.210000
|
CVE-2024-4603,0,0,9942bc7f0ee4df83c0037c4c5d6b42a7bde07b02fe0e655d3c99ab93c8488123,2024-10-14T15:15:14.210000
|
||||||
CVE-2024-4604,0,0,a39c956f080c616b17936b03ed62fbdee5080806b0deef5fc7741779c0bf0ec7,2024-06-27T12:47:19.847000
|
CVE-2024-4604,0,0,a39c956f080c616b17936b03ed62fbdee5080806b0deef5fc7741779c0bf0ec7,2024-06-27T12:47:19.847000
|
||||||
CVE-2024-46040,0,0,f69112d5a1863fbd0caca1b0b2804dd2dfc1a731583d042e591bd5e81ca4008b,2024-10-07T17:47:48.410000
|
CVE-2024-46040,0,0,f69112d5a1863fbd0caca1b0b2804dd2dfc1a731583d042e591bd5e81ca4008b,2024-10-07T17:47:48.410000
|
||||||
CVE-2024-46041,0,0,c02cff8dc91cfcfecb1fc716067f6a80d76cbf5a6025a1c04ea63ec71bb7758f,2024-10-07T20:35:09.113000
|
CVE-2024-46041,0,0,c02cff8dc91cfcfecb1fc716067f6a80d76cbf5a6025a1c04ea63ec71bb7758f,2024-10-07T20:35:09.113000
|
||||||
@ -260950,6 +260963,7 @@ CVE-2024-46511,0,0,78cf785de24718da0c0ea71257e191470c834e4be61ca79ad4d72c264c3c4
|
|||||||
CVE-2024-4652,0,0,8fd7af949b4c89aa1e5f9f8bc7784e47292323116a1f6a56ecb880f3c410a541,2024-06-04T19:20:44.873000
|
CVE-2024-4652,0,0,8fd7af949b4c89aa1e5f9f8bc7784e47292323116a1f6a56ecb880f3c410a541,2024-06-04T19:20:44.873000
|
||||||
CVE-2024-4653,0,0,7b6d5c0913690c5b51d844fc9718b4208eaa5f352f244fd41eee7be1add5e3bc,2024-06-04T19:20:44.990000
|
CVE-2024-4653,0,0,7b6d5c0913690c5b51d844fc9718b4208eaa5f352f244fd41eee7be1add5e3bc,2024-06-04T19:20:44.990000
|
||||||
CVE-2024-46532,0,0,3cc4b0eac6406170fdb3268901170209dd1adc3b3b14e5bfd21137ddfc4e89d7,2024-10-11T18:15:08.267000
|
CVE-2024-46532,0,0,3cc4b0eac6406170fdb3268901170209dd1adc3b3b14e5bfd21137ddfc4e89d7,2024-10-11T18:15:08.267000
|
||||||
|
CVE-2024-46535,1,1,236faad90efb2cca4a33db405473a6420ce807a7b23b2f487d5ed937562d9418,2024-10-14T17:15:13.440000
|
||||||
CVE-2024-46539,0,0,2d2c57643421ecf3202df41ca86f61b87e91435ec045a273724c1fd7bed0cf14,2024-10-10T12:56:30.817000
|
CVE-2024-46539,0,0,2d2c57643421ecf3202df41ca86f61b87e91435ec045a273724c1fd7bed0cf14,2024-10-10T12:56:30.817000
|
||||||
CVE-2024-4654,0,0,0088d34096b2578204ff98fe71c1f702e4c8866653411407f72fe940a56448df,2024-06-04T19:20:45.100000
|
CVE-2024-4654,0,0,0088d34096b2578204ff98fe71c1f702e4c8866653411407f72fe940a56448df,2024-06-04T19:20:45.100000
|
||||||
CVE-2024-46540,0,0,82bd73e280c5a23d3b35406dd5a042ddc542cc53d99831f15d05d7d862ed5067,2024-10-04T13:51:25.567000
|
CVE-2024-46540,0,0,82bd73e280c5a23d3b35406dd5a042ddc542cc53d99831f15d05d7d862ed5067,2024-10-04T13:51:25.567000
|
||||||
@ -261769,13 +261783,16 @@ CVE-2024-4808,0,0,9e98599f6886b9041c106d3216212c5c382436edfce35f9a1807d5234e020e
|
|||||||
CVE-2024-4809,0,0,27fb5be7556d421437500c3c993a8fe2f6b8b07eb589d66da5852c85ddbdadf0,2024-06-04T19:20:50.867000
|
CVE-2024-4809,0,0,27fb5be7556d421437500c3c993a8fe2f6b8b07eb589d66da5852c85ddbdadf0,2024-06-04T19:20:50.867000
|
||||||
CVE-2024-4810,0,0,67f5293ce6e2b07ebd74483d90aa4bd648288e3b70a7100b0946bf9b81e90029,2024-05-29T08:15:33.960000
|
CVE-2024-4810,0,0,67f5293ce6e2b07ebd74483d90aa4bd648288e3b70a7100b0946bf9b81e90029,2024-05-29T08:15:33.960000
|
||||||
CVE-2024-4811,0,0,8f7cba70fec134bbd5d6693fb99cf5ba1e86f11c73cf50479f15d27ff9c0c5a5,2024-07-25T12:36:39.947000
|
CVE-2024-4811,0,0,8f7cba70fec134bbd5d6693fb99cf5ba1e86f11c73cf50479f15d27ff9c0c5a5,2024-07-25T12:36:39.947000
|
||||||
CVE-2024-48119,1,1,5a61747aca6c21835c2f6c3a203be63c2093664c3f6f566c13d1fe431a2fd5d0,2024-10-14T14:15:11.597000
|
CVE-2024-48119,0,0,5a61747aca6c21835c2f6c3a203be63c2093664c3f6f566c13d1fe431a2fd5d0,2024-10-14T14:15:11.597000
|
||||||
CVE-2024-4812,0,0,96f0244e64d02e8b825789000f88a75dd5b3d67c4d6e5fa4b2230b6ad5599e15,2024-06-18T18:49:19.783000
|
CVE-2024-4812,0,0,96f0244e64d02e8b825789000f88a75dd5b3d67c4d6e5fa4b2230b6ad5599e15,2024-06-18T18:49:19.783000
|
||||||
CVE-2024-48120,1,1,c62e5be74f0d961b12e910dcf29c3c75e41c7914cfe890c3077ff6c43d8c87f9,2024-10-14T14:15:11.780000
|
CVE-2024-48120,0,0,c62e5be74f0d961b12e910dcf29c3c75e41c7914cfe890c3077ff6c43d8c87f9,2024-10-14T14:15:11.780000
|
||||||
CVE-2024-4813,0,0,ffced1bec51c6384e79d75317b856f32e05abf0a3cdd3adf718b586086ffad4a,2024-06-04T19:20:50.970000
|
CVE-2024-4813,0,0,ffced1bec51c6384e79d75317b856f32e05abf0a3cdd3adf718b586086ffad4a,2024-06-04T19:20:50.970000
|
||||||
CVE-2024-4814,0,0,6ed65b628d782e4c0035f27d12907232951228fb5dd63de02df922628089b508,2024-06-04T19:20:51.077000
|
CVE-2024-4814,0,0,6ed65b628d782e4c0035f27d12907232951228fb5dd63de02df922628089b508,2024-06-04T19:20:51.077000
|
||||||
CVE-2024-4815,0,0,a12a3714528f7b768c4c9101b510e3e25b21fa14abf883b4fca5d245888d3088,2024-06-04T19:20:51.183000
|
CVE-2024-4815,0,0,a12a3714528f7b768c4c9101b510e3e25b21fa14abf883b4fca5d245888d3088,2024-06-04T19:20:51.183000
|
||||||
|
CVE-2024-48150,1,1,19f1376e02c9f64643f71be368bb63d9dab50859eebf81f919523183a5c16d63,2024-10-14T16:15:03.750000
|
||||||
|
CVE-2024-48153,1,1,3cfd46a773704ab0a351a2b6ce72427b77a3ce4f0b94a6c1ddac6ddeed3918df,2024-10-14T16:15:03.840000
|
||||||
CVE-2024-4816,0,0,8565abd2d0a6378ede6981ddf7bac1f2251b8eaa5cb7a310b72a2f14c255bb14,2024-06-04T19:20:51.290000
|
CVE-2024-4816,0,0,8565abd2d0a6378ede6981ddf7bac1f2251b8eaa5cb7a310b72a2f14c255bb14,2024-06-04T19:20:51.290000
|
||||||
|
CVE-2024-48168,1,1,a09a7c75736c5a01c0400c19554fc92c3c8fd8dbfe7d3f38b5cf9ce5962080e1,2024-10-14T17:15:13.520000
|
||||||
CVE-2024-4817,0,0,34b565d993de0f23b2da3e66a459da3d9e976182c7f2db8f77c4f90d033797ec,2024-06-04T19:20:51.393000
|
CVE-2024-4817,0,0,34b565d993de0f23b2da3e66a459da3d9e976182c7f2db8f77c4f90d033797ec,2024-06-04T19:20:51.393000
|
||||||
CVE-2024-4818,0,0,3fe1d5f18f9b194d5b3db8480cedce43b94847211b0e14441f0f1578988c6d95,2024-06-04T19:20:51.510000
|
CVE-2024-4818,0,0,3fe1d5f18f9b194d5b3db8480cedce43b94847211b0e14441f0f1578988c6d95,2024-06-04T19:20:51.510000
|
||||||
CVE-2024-4819,0,0,bc26e072d222c9731ee42bb1198fec18f8f3236e713c07e319d531bbf6577caa,2024-06-04T19:20:51.613000
|
CVE-2024-4819,0,0,bc26e072d222c9731ee42bb1198fec18f8f3236e713c07e319d531bbf6577caa,2024-06-04T19:20:51.613000
|
||||||
@ -261784,15 +261801,15 @@ CVE-2024-4821,0,0,dc7d4132f68a39a1fe6c6bac80c0ac3156e2e90bf5e433ad24749311cb9093
|
|||||||
CVE-2024-4822,0,0,35737e7a1acb373d4b9b0a7db2a81b8ded4d641f08c88a2e676b684417908472,2024-05-14T16:11:39.510000
|
CVE-2024-4822,0,0,35737e7a1acb373d4b9b0a7db2a81b8ded4d641f08c88a2e676b684417908472,2024-05-14T16:11:39.510000
|
||||||
CVE-2024-4823,0,0,0c5de98ac761e11f69c407a8dbff0028d3fe4b31e8abb3e2bfd72a91e6adb2ed,2024-05-14T16:11:39.510000
|
CVE-2024-4823,0,0,0c5de98ac761e11f69c407a8dbff0028d3fe4b31e8abb3e2bfd72a91e6adb2ed,2024-05-14T16:11:39.510000
|
||||||
CVE-2024-4824,0,0,e31432116aed0554c3dc4b1001cfc03d00512889f9f84533cba85f3e0d8e9591,2024-05-14T16:11:39.510000
|
CVE-2024-4824,0,0,e31432116aed0554c3dc4b1001cfc03d00512889f9f84533cba85f3e0d8e9591,2024-05-14T16:11:39.510000
|
||||||
CVE-2024-48249,1,1,5f69ad216423d88721630184efcc3b6780298c2281ef45447866af266eeaf31b,2024-10-14T15:15:13.760000
|
CVE-2024-48249,0,0,5f69ad216423d88721630184efcc3b6780298c2281ef45447866af266eeaf31b,2024-10-14T15:15:13.760000
|
||||||
CVE-2024-4825,0,0,155a89a5474625dde1ab63dcac3020c23f71c92d3744c7dbee990f6fffb4feb0,2024-05-14T16:11:39.510000
|
CVE-2024-4825,0,0,155a89a5474625dde1ab63dcac3020c23f71c92d3744c7dbee990f6fffb4feb0,2024-05-14T16:11:39.510000
|
||||||
CVE-2024-48251,1,1,dda6068c3aec0a58728fe7bffc3300b768a57547cce716fc09ce51fb41c159b8,2024-10-14T15:15:13.857000
|
CVE-2024-48251,0,0,dda6068c3aec0a58728fe7bffc3300b768a57547cce716fc09ce51fb41c159b8,2024-10-14T15:15:13.857000
|
||||||
CVE-2024-48253,1,1,bc18a0e22f877a0da30943ce059ebde5cc7ada183f875ccf73bea55ec5d9c5dd,2024-10-14T14:15:11.857000
|
CVE-2024-48253,0,0,bc18a0e22f877a0da30943ce059ebde5cc7ada183f875ccf73bea55ec5d9c5dd,2024-10-14T14:15:11.857000
|
||||||
CVE-2024-48255,1,1,0a8ed856e42477c3dd884c692f58730bafdfb919692cb5c3147aec3949e7e20f,2024-10-14T14:15:11.937000
|
CVE-2024-48255,0,0,0a8ed856e42477c3dd884c692f58730bafdfb919692cb5c3147aec3949e7e20f,2024-10-14T14:15:11.937000
|
||||||
CVE-2024-48257,1,1,a1a727e578e5771b374c2be34c1390e71a4865969de7420f02809bdd4b7dbea9,2024-10-14T15:15:13.947000
|
CVE-2024-48257,0,0,a1a727e578e5771b374c2be34c1390e71a4865969de7420f02809bdd4b7dbea9,2024-10-14T15:15:13.947000
|
||||||
CVE-2024-48259,1,1,ec456a1c6c04e1393013f41c2dc440ffed601fb5f055ca35b2d9252dd23e0a84,2024-10-14T15:15:14.033000
|
CVE-2024-48259,0,0,ec456a1c6c04e1393013f41c2dc440ffed601fb5f055ca35b2d9252dd23e0a84,2024-10-14T15:15:14.033000
|
||||||
CVE-2024-4826,0,0,deaf8fdab596ba1219725251282b0367e2dd73462b62b55f2e950ae3725565c5,2024-05-16T13:15:48.163000
|
CVE-2024-4826,0,0,deaf8fdab596ba1219725251282b0367e2dd73462b62b55f2e950ae3725565c5,2024-05-16T13:15:48.163000
|
||||||
CVE-2024-48261,1,1,c50173bdf25e4741bc510b2698ace8c3db8c27162251f6faafaff8896241ef72,2024-10-14T15:15:14.130000
|
CVE-2024-48261,0,0,c50173bdf25e4741bc510b2698ace8c3db8c27162251f6faafaff8896241ef72,2024-10-14T15:15:14.130000
|
||||||
CVE-2024-4835,0,0,b63c1e2c2f2232a6ba415444f30303ee4e5ea1a45d737d79b2133d2755ec709c,2024-05-24T01:15:30.977000
|
CVE-2024-4835,0,0,b63c1e2c2f2232a6ba415444f30303ee4e5ea1a45d737d79b2133d2755ec709c,2024-05-24T01:15:30.977000
|
||||||
CVE-2024-4836,0,0,6397d82c08a27dc6d1e4828623f7dccd401e56dd97e62d291cde8c73c9f6f8bd,2024-07-02T12:09:16.907000
|
CVE-2024-4836,0,0,6397d82c08a27dc6d1e4828623f7dccd401e56dd97e62d291cde8c73c9f6f8bd,2024-07-02T12:09:16.907000
|
||||||
CVE-2024-4837,0,0,e7f6212a3767856f93e80078aa36a8d58ae9b0d6d87727b0b71ea9bfd6a3b44b,2024-05-15T18:35:11.453000
|
CVE-2024-4837,0,0,e7f6212a3767856f93e80078aa36a8d58ae9b0d6d87727b0b71ea9bfd6a3b44b,2024-05-15T18:35:11.453000
|
||||||
@ -261846,6 +261863,10 @@ CVE-2024-48786,0,0,c860c3ab3f85be5742131f9576a41113cc68380c4baa10b74833d50923537
|
|||||||
CVE-2024-48787,0,0,7a215e7cb70a1e88ac1a7855c7c78ffe9117f0eb6f9844010ee3a49bb152ca60,2024-10-11T20:15:06.407000
|
CVE-2024-48787,0,0,7a215e7cb70a1e88ac1a7855c7c78ffe9117f0eb6f9844010ee3a49bb152ca60,2024-10-11T20:15:06.407000
|
||||||
CVE-2024-48788,0,0,d531b63d24b558dcbfd8469ce1a5194d6aa29d693230d82c5c128cd8fc89dcbd,2024-10-11T21:15:07.220000
|
CVE-2024-48788,0,0,d531b63d24b558dcbfd8469ce1a5194d6aa29d693230d82c5c128cd8fc89dcbd,2024-10-11T21:15:07.220000
|
||||||
CVE-2024-4879,0,0,49a8b41ea605df8bd1da4063a7058b50435504f1dbecb0dc4bcc8efa8c8e8867,2024-07-30T15:13:39.720000
|
CVE-2024-4879,0,0,49a8b41ea605df8bd1da4063a7058b50435504f1dbecb0dc4bcc8efa8c8e8867,2024-07-30T15:13:39.720000
|
||||||
|
CVE-2024-48796,1,1,7879f1aa8bab9a14d016d74ec58af4d0baf4610a66493dc7e696e44b7ca1bc91,2024-10-14T17:15:13.610000
|
||||||
|
CVE-2024-48797,1,1,a42b610d7f725207e7958ca937816046c91c2ceb35bdd5acafea0351793590bf,2024-10-14T17:15:13.690000
|
||||||
|
CVE-2024-48798,1,1,f8e79fb9df797037d2a83f075374be88a20179dcf01384173fccd3a6fc8fb0f0,2024-10-14T17:15:13.770000
|
||||||
|
CVE-2024-48799,1,1,a3b8aa531325723a40f231e31c933f25fd306c627d1f496d1ce1b3883fd1201f,2024-10-14T17:15:13.857000
|
||||||
CVE-2024-4881,0,0,70a5432f5c5a777364201296899d588f04c479b317d8edcefa9e35906d6586a3,2024-06-07T14:56:05.647000
|
CVE-2024-4881,0,0,70a5432f5c5a777364201296899d588f04c479b317d8edcefa9e35906d6586a3,2024-06-07T14:56:05.647000
|
||||||
CVE-2024-48813,0,0,738900377884500d6e48ef86e8a92a90f8f38c9de5c7e8958544d021c7ce9ab7,2024-10-11T21:36:43.527000
|
CVE-2024-48813,0,0,738900377884500d6e48ef86e8a92a90f8f38c9de5c7e8958544d021c7ce9ab7,2024-10-11T21:36:43.527000
|
||||||
CVE-2024-4882,0,0,a4855f599041359b65e48a15f937a27e2ec2e91d9343d627eb58fe60c3b171c1,2024-07-09T18:19:14.047000
|
CVE-2024-4882,0,0,a4855f599041359b65e48a15f937a27e2ec2e91d9343d627eb58fe60c3b171c1,2024-07-09T18:19:14.047000
|
||||||
@ -263493,6 +263514,8 @@ CVE-2024-6758,0,0,eba9276bccb667ada2a9e6cadd00c35035c829f464cb8fc5793fac965ac82f
|
|||||||
CVE-2024-6759,0,0,e7cd1780cd31aac9820013b04e76a14ca6ed66e984c4afbf1fe81690ab6c39a6,2024-08-13T15:08:27.780000
|
CVE-2024-6759,0,0,e7cd1780cd31aac9820013b04e76a14ca6ed66e984c4afbf1fe81690ab6c39a6,2024-08-13T15:08:27.780000
|
||||||
CVE-2024-6760,0,0,2363997d66d6496a6d94c4263cbac8f525a5e902af0a9a7389048de6fc4d9b78,2024-08-13T15:08:51.977000
|
CVE-2024-6760,0,0,2363997d66d6496a6d94c4263cbac8f525a5e902af0a9a7389048de6fc4d9b78,2024-08-13T15:08:51.977000
|
||||||
CVE-2024-6761,0,0,f38b3ccdc89aa0093bd659ba31741817a9ff74cb3bee1ce8404957bf0a35b578,2024-07-29T11:15:10.140000
|
CVE-2024-6761,0,0,f38b3ccdc89aa0093bd659ba31741817a9ff74cb3bee1ce8404957bf0a35b578,2024-07-29T11:15:10.140000
|
||||||
|
CVE-2024-6762,1,1,053cd62e78397cb397f65a69e92749587baeeba6b06a23b25c2cde3a3e8e2412,2024-10-14T16:15:03.930000
|
||||||
|
CVE-2024-6763,1,1,2e3832a111ef9e1563172f5ed131b6afed3503a9ae140bbd5550f3cc5f769987,2024-10-14T16:15:04.163000
|
||||||
CVE-2024-6765,0,0,582116fb1612a7c43e0b570dc3dd773f185a6bed827d147d00793764d2f2774e,2024-07-17T14:15:04.327000
|
CVE-2024-6765,0,0,582116fb1612a7c43e0b570dc3dd773f185a6bed827d147d00793764d2f2774e,2024-07-17T14:15:04.327000
|
||||||
CVE-2024-6766,0,0,4e69f4c5d546bbff4d97a532e9e5f675c0139ba3a0fba76f00597bc0bd516b20,2024-08-06T16:30:24.547000
|
CVE-2024-6766,0,0,4e69f4c5d546bbff4d97a532e9e5f675c0139ba3a0fba76f00597bc0bd516b20,2024-08-06T16:30:24.547000
|
||||||
CVE-2024-6767,0,0,e624184eb5b85e1f323682c46b24401770f3ecb164370e5143c01069a4262025,2024-08-21T12:30:33.697000
|
CVE-2024-6767,0,0,e624184eb5b85e1f323682c46b24401770f3ecb164370e5143c01069a4262025,2024-08-21T12:30:33.697000
|
||||||
@ -264347,7 +264370,7 @@ CVE-2024-7843,0,0,1916845a00ac6d864acb448c0fe39fd74d4023a097dc2d81074d929455ca18
|
|||||||
CVE-2024-7844,0,0,b930ca741640f5c7b3b0ce1c61bb7f4e94c485b2638d8e79f4794845e86ce235,2024-08-21T14:12:43.497000
|
CVE-2024-7844,0,0,b930ca741640f5c7b3b0ce1c61bb7f4e94c485b2638d8e79f4794845e86ce235,2024-08-21T14:12:43.497000
|
||||||
CVE-2024-7845,0,0,2b4134672992a5057330a35c489891fcdc0ff66c466c2c96e09ea314c06bb030,2024-09-26T15:10:57.870000
|
CVE-2024-7845,0,0,2b4134672992a5057330a35c489891fcdc0ff66c466c2c96e09ea314c06bb030,2024-09-26T15:10:57.870000
|
||||||
CVE-2024-7846,0,0,8e15bdd83a5e179d37b373daa0289519d9b1688a7106bd69b16fbadef1928218,2024-09-26T13:32:55.343000
|
CVE-2024-7846,0,0,8e15bdd83a5e179d37b373daa0289519d9b1688a7106bd69b16fbadef1928218,2024-09-26T13:32:55.343000
|
||||||
CVE-2024-7847,1,1,c4a5e56225f9502b32f4cf902921ba916babb59c986821e50770707689fdbf7b,2024-10-14T14:15:12.020000
|
CVE-2024-7847,0,0,c4a5e56225f9502b32f4cf902921ba916babb59c986821e50770707689fdbf7b,2024-10-14T14:15:12.020000
|
||||||
CVE-2024-7848,0,0,b79248ef369f661dc93f45ab33fbf95a9110e81107fbfafbebe6c98477861dfa,2024-09-26T22:12:13.457000
|
CVE-2024-7848,0,0,b79248ef369f661dc93f45ab33fbf95a9110e81107fbfafbebe6c98477861dfa,2024-09-26T22:12:13.457000
|
||||||
CVE-2024-7849,0,0,e63d24df06d5f4555672e0892a25c4e5c95ca031f7861c25398c177add1bd8f5,2024-08-19T13:00:23.117000
|
CVE-2024-7849,0,0,e63d24df06d5f4555672e0892a25c4e5c95ca031f7861c25398c177add1bd8f5,2024-08-19T13:00:23.117000
|
||||||
CVE-2024-7850,0,0,eac62d06d40978b154610fb0b8829f684d203615f4f5ebfcbc586877034ad096,2024-08-20T15:44:20.567000
|
CVE-2024-7850,0,0,eac62d06d40978b154610fb0b8829f684d203615f4f5ebfcbc586877034ad096,2024-08-20T15:44:20.567000
|
||||||
@ -264588,6 +264611,7 @@ CVE-2024-8175,0,0,93cd36c03979068837f469bd77e40d2775fae2df59f7cba10d5c6e9b4e387e
|
|||||||
CVE-2024-8178,0,0,ba572c1f8157c41d405fb002c7b6f163f2d56dcc78fed52d2bcc31657caf5604,2024-09-06T17:35:20.203000
|
CVE-2024-8178,0,0,ba572c1f8157c41d405fb002c7b6f163f2d56dcc78fed52d2bcc31657caf5604,2024-09-06T17:35:20.203000
|
||||||
CVE-2024-8181,0,0,493690832b830d715024bac2c57cbeb9d316626844b43ee44a3d0839b5d01d36,2024-09-06T15:35:07.267000
|
CVE-2024-8181,0,0,493690832b830d715024bac2c57cbeb9d316626844b43ee44a3d0839b5d01d36,2024-09-06T15:35:07.267000
|
||||||
CVE-2024-8182,0,0,9ca161eed16086dd999c3dcdddb12be07c44a0882f46a0d2167122ca829615b9,2024-08-30T13:53:52.197000
|
CVE-2024-8182,0,0,9ca161eed16086dd999c3dcdddb12be07c44a0882f46a0d2167122ca829615b9,2024-08-30T13:53:52.197000
|
||||||
|
CVE-2024-8184,1,1,8c163146049144fdada87d362eb75f578744ca06a2fab167b1d676e981e40114,2024-10-14T16:15:04.380000
|
||||||
CVE-2024-8188,0,0,bf948f939efb55d2700c81c8fb5cefa3fc31038462bfeb7ac3e161719faca6b2,2024-08-26T20:15:08.760000
|
CVE-2024-8188,0,0,bf948f939efb55d2700c81c8fb5cefa3fc31038462bfeb7ac3e161719faca6b2,2024-08-26T20:15:08.760000
|
||||||
CVE-2024-8189,0,0,63668eb3e5fc8ff94f956bfec9b936178c3cdc9b685d09571c582433c179a1da,2024-10-07T15:44:45.110000
|
CVE-2024-8189,0,0,63668eb3e5fc8ff94f956bfec9b936178c3cdc9b685d09571c582433c179a1da,2024-10-07T15:44:45.110000
|
||||||
CVE-2024-8190,0,0,b93c21c7e68b63ff1a05425b35ca8850e4059906d4d0de60465090c0528ebe7c,2024-09-16T13:44:18.173000
|
CVE-2024-8190,0,0,b93c21c7e68b63ff1a05425b35ca8850e4059906d4d0de60465090c0528ebe7c,2024-09-16T13:44:18.173000
|
||||||
@ -264872,7 +264896,7 @@ CVE-2024-8584,0,0,f2bfb960200b98001a53756524046d766d8acbe67d6e46dee6e73d41f4473a
|
|||||||
CVE-2024-8585,0,0,e17d232ed4a4084d03c537d4bccfc260c2e2f4d1c4cbcfdf334e4783c2ee46f9,2024-09-11T15:53:35.693000
|
CVE-2024-8585,0,0,e17d232ed4a4084d03c537d4bccfc260c2e2f4d1c4cbcfdf334e4783c2ee46f9,2024-09-11T15:53:35.693000
|
||||||
CVE-2024-8586,0,0,23468ff8a51a574afa4ccf040ef08b97cdacf6166e19d71118517f5f68bba004,2024-09-16T13:28:03.400000
|
CVE-2024-8586,0,0,23468ff8a51a574afa4ccf040ef08b97cdacf6166e19d71118517f5f68bba004,2024-09-16T13:28:03.400000
|
||||||
CVE-2024-8601,0,0,350a6e2c691d4290217990f07e5aa1eab0aea03118253c9c9cd54625cff0b36e,2024-09-17T17:54:39.767000
|
CVE-2024-8601,0,0,350a6e2c691d4290217990f07e5aa1eab0aea03118253c9c9cd54625cff0b36e,2024-09-17T17:54:39.767000
|
||||||
CVE-2024-8602,1,1,4eeda86fadc2aa14b25662e1edaef238609ac66c3a06646af8bc061f10c582f4,2024-10-14T14:15:12.400000
|
CVE-2024-8602,0,0,4eeda86fadc2aa14b25662e1edaef238609ac66c3a06646af8bc061f10c582f4,2024-10-14T14:15:12.400000
|
||||||
CVE-2024-8604,0,0,011a82fa33d28627d93910a4b1b240e8b61f649834230335b18a4a93ce8a99bf,2024-09-10T19:14:57.017000
|
CVE-2024-8604,0,0,011a82fa33d28627d93910a4b1b240e8b61f649834230335b18a4a93ce8a99bf,2024-09-10T19:14:57.017000
|
||||||
CVE-2024-8605,0,0,2abdfde3fad91633012e2fbc4796f8bda82aa939ecbbf9c2890b650d01ffd42b,2024-09-13T15:31:52.140000
|
CVE-2024-8605,0,0,2abdfde3fad91633012e2fbc4796f8bda82aa939ecbbf9c2890b650d01ffd42b,2024-09-13T15:31:52.140000
|
||||||
CVE-2024-8606,0,0,20f69def3ac5362a6447befa6462591ee01c298b230281fd326f40893e51c1a1,2024-09-30T15:32:34.647000
|
CVE-2024-8606,0,0,20f69def3ac5362a6447befa6462591ee01c298b230281fd326f40893e51c1a1,2024-09-30T15:32:34.647000
|
||||||
@ -265181,7 +265205,7 @@ CVE-2024-9136,0,0,9b9746749b73403d8dc2b7a33b5935315a467feb0aa3698e70e44d08c2289a
|
|||||||
CVE-2024-9137,0,0,9065b9986e350cb1955cfbec462f81d3d3a9a0cca2dc3d030de4540532f9abca,2024-10-14T09:15:04.403000
|
CVE-2024-9137,0,0,9065b9986e350cb1955cfbec462f81d3d3a9a0cca2dc3d030de4540532f9abca,2024-10-14T09:15:04.403000
|
||||||
CVE-2024-9139,0,0,09eb3f13c3e60192800512c2b76c94742b9d9d7d743e90f5437ddfac8bcedf34,2024-10-14T09:15:04.693000
|
CVE-2024-9139,0,0,09eb3f13c3e60192800512c2b76c94742b9d9d7d743e90f5437ddfac8bcedf34,2024-10-14T09:15:04.693000
|
||||||
CVE-2024-9141,0,0,1186d93c71ba2b76e7029b0455d3828535e51a6f22b721a65c3963a052cae512,2024-09-26T13:32:02.803000
|
CVE-2024-9141,0,0,1186d93c71ba2b76e7029b0455d3828535e51a6f22b721a65c3963a052cae512,2024-09-26T13:32:02.803000
|
||||||
CVE-2024-9142,0,0,f41ad411b11065ca581c6c09a7cdbabb7231f7d077f84444580389a46c43e76b,2024-09-26T13:32:02.803000
|
CVE-2024-9142,0,1,143ad6ae744fa593642be06138ba59f5a3ac64fb0a6f22e5d0ade004fddfc127,2024-10-14T16:35:01.033000
|
||||||
CVE-2024-9145,0,0,666aa1000539c0391187e882757d18372cd0bce4cc6b153bd670793f8325f34a,2024-10-04T13:51:25.567000
|
CVE-2024-9145,0,0,666aa1000539c0391187e882757d18372cd0bce4cc6b153bd670793f8325f34a,2024-10-04T13:51:25.567000
|
||||||
CVE-2024-9146,0,0,dd225bf1435696d6b519369d4a8422b91a9f46c7eecd30c6fd592ac6ec22d53f,2024-10-07T17:48:28.117000
|
CVE-2024-9146,0,0,dd225bf1435696d6b519369d4a8422b91a9f46c7eecd30c6fd592ac6ec22d53f,2024-10-07T17:48:28.117000
|
||||||
CVE-2024-9148,0,0,54e87e3f2b6f69d5080b11c080fcfce17264899c6147cd6032f168b6e8923e92,2024-09-30T17:34:12.760000
|
CVE-2024-9148,0,0,54e87e3f2b6f69d5080b11c080fcfce17264899c6147cd6032f168b6e8923e92,2024-09-30T17:34:12.760000
|
||||||
@ -265279,7 +265303,7 @@ CVE-2024-9327,0,0,9bb62fae114b1c29588ad2672d640859a17a9f3af7375a799fc34e218e9d39
|
|||||||
CVE-2024-9328,0,0,a5f7378f6f2f1cd502f7cde1b5f6090c2d79ebec3e3af2aa2eaafb1f04d0c325,2024-10-01T11:34:57.773000
|
CVE-2024-9328,0,0,a5f7378f6f2f1cd502f7cde1b5f6090c2d79ebec3e3af2aa2eaafb1f04d0c325,2024-10-01T11:34:57.773000
|
||||||
CVE-2024-9329,0,0,45383f73609cef2d97bbcc2a37f0da26902c147f00f71a92dd725b6696a1e709,2024-10-07T15:52:47.267000
|
CVE-2024-9329,0,0,45383f73609cef2d97bbcc2a37f0da26902c147f00f71a92dd725b6696a1e709,2024-10-07T15:52:47.267000
|
||||||
CVE-2024-9333,0,0,29d3d497691b594c7c49948d48e229bbe8c23108f2eef552b2f92cd89acf1f06,2024-10-04T13:50:43.727000
|
CVE-2024-9333,0,0,29d3d497691b594c7c49948d48e229bbe8c23108f2eef552b2f92cd89acf1f06,2024-10-04T13:50:43.727000
|
||||||
CVE-2024-9341,0,1,d189ad1f5a137e8ae5c8357f3191cc9111f21b931f4eff48979046ce5164f4a3,2024-10-14T15:15:14.373000
|
CVE-2024-9341,0,0,d189ad1f5a137e8ae5c8357f3191cc9111f21b931f4eff48979046ce5164f4a3,2024-10-14T15:15:14.373000
|
||||||
CVE-2024-9344,0,0,d870e129ed50c7683cdbbee07d60a73dcd8b852b9805e9d5932c8a41008c379e,2024-10-08T15:06:57.470000
|
CVE-2024-9344,0,0,d870e129ed50c7683cdbbee07d60a73dcd8b852b9805e9d5932c8a41008c379e,2024-10-08T15:06:57.470000
|
||||||
CVE-2024-9345,0,0,b08be38bdc65e7df784af6af5cf36510583fc49f8a0ab62bc24aed87f83f55d0,2024-10-08T16:10:17.567000
|
CVE-2024-9345,0,0,b08be38bdc65e7df784af6af5cf36510583fc49f8a0ab62bc24aed87f83f55d0,2024-10-08T16:10:17.567000
|
||||||
CVE-2024-9346,0,0,54562034e717f93a9c89f6030e73e47fb9b9d7abbbde9d33821c04e2f0a85d64,2024-10-11T13:15:18.740000
|
CVE-2024-9346,0,0,54562034e717f93a9c89f6030e73e47fb9b9d7abbbde9d33821c04e2f0a85d64,2024-10-11T13:15:18.740000
|
||||||
@ -265455,7 +265479,7 @@ CVE-2024-9817,0,0,aa4071cf5ce97bf162c1cca4a7f07d25d51157e1698481fe4534c2979d4a7e
|
|||||||
CVE-2024-9818,0,0,0b4965dc9157be1c79882236820da1fc50a01232d912ae1b867d598f551f291b,2024-10-10T23:15:03.680000
|
CVE-2024-9818,0,0,0b4965dc9157be1c79882236820da1fc50a01232d912ae1b867d598f551f291b,2024-10-10T23:15:03.680000
|
||||||
CVE-2024-9821,0,0,0fe84d15377a57feb9c16456d9d6e98b8f06d72079455451a6924d64eac80b40,2024-10-12T03:15:02.507000
|
CVE-2024-9821,0,0,0fe84d15377a57feb9c16456d9d6e98b8f06d72079455451a6924d64eac80b40,2024-10-12T03:15:02.507000
|
||||||
CVE-2024-9822,0,0,31c5fa39db5fe31c5cd7802827b5c169adace5e7cdcfe1c09d420a2a1af019c6,2024-10-11T03:15:10.967000
|
CVE-2024-9822,0,0,31c5fa39db5fe31c5cd7802827b5c169adace5e7cdcfe1c09d420a2a1af019c6,2024-10-11T03:15:10.967000
|
||||||
CVE-2024-9823,1,1,7e4a61ee23132db2cb613d00e5ac442c24d492bd5341978073a831c8512ab73e,2024-10-14T15:15:14.560000
|
CVE-2024-9823,0,1,797ad589a845f20d3c764555cd88dd01739b03d274a2154c13310668db597c99,2024-10-14T16:15:04.653000
|
||||||
CVE-2024-9824,0,0,1fdcf28970a03200ea0750edfb27b712eac3be59fe088b6edf6f98bda2457c29,2024-10-12T06:15:04.230000
|
CVE-2024-9824,0,0,1fdcf28970a03200ea0750edfb27b712eac3be59fe088b6edf6f98bda2457c29,2024-10-12T06:15:04.230000
|
||||||
CVE-2024-9855,0,0,74811d4bb31eb0ad4289dbfb3b216d12eb73ec4e1a7f9bf880a5813c9b568440,2024-10-11T13:15:21.460000
|
CVE-2024-9855,0,0,74811d4bb31eb0ad4289dbfb3b216d12eb73ec4e1a7f9bf880a5813c9b568440,2024-10-11T13:15:21.460000
|
||||||
CVE-2024-9856,0,0,b5fbe1e11cd8120594b10c6f2c9ff297b13257bca69885420fdeff5341bb84c9,2024-10-11T13:15:21.883000
|
CVE-2024-9856,0,0,b5fbe1e11cd8120594b10c6f2c9ff297b13257bca69885420fdeff5341bb84c9,2024-10-11T13:15:21.883000
|
||||||
@ -265483,4 +265507,4 @@ CVE-2024-9921,0,0,006acd4b794e2adfef5d9ee2d65bed2b1e2281b0d23f9374b3500a3b648fc6
|
|||||||
CVE-2024-9922,0,0,38a9a769415efbcfedd53b122b48fa65b5e1f382fdf217a030bbaee2ce3081e3,2024-10-14T03:15:10.683000
|
CVE-2024-9922,0,0,38a9a769415efbcfedd53b122b48fa65b5e1f382fdf217a030bbaee2ce3081e3,2024-10-14T03:15:10.683000
|
||||||
CVE-2024-9923,0,0,54d0eb71a24239c4cf72f6c8d2d43f40cc27d7ae4dae943f2db0568ffd629c72,2024-10-14T04:15:06.070000
|
CVE-2024-9923,0,0,54d0eb71a24239c4cf72f6c8d2d43f40cc27d7ae4dae943f2db0568ffd629c72,2024-10-14T04:15:06.070000
|
||||||
CVE-2024-9924,0,0,5d7f89079afc3d9ca8548ebb3725e799ef08b64b7b5fd0fc7f3c47978b6a83d8,2024-10-14T04:15:06.353000
|
CVE-2024-9924,0,0,5d7f89079afc3d9ca8548ebb3725e799ef08b64b7b5fd0fc7f3c47978b6a83d8,2024-10-14T04:15:06.353000
|
||||||
CVE-2024-9936,1,1,84f1422b67bbaa43c4b2b921a0bd24fe5cb86e5da956c7f811c06ae275078cda,2024-10-14T14:15:12.553000
|
CVE-2024-9936,0,0,84f1422b67bbaa43c4b2b921a0bd24fe5cb86e5da956c7f811c06ae275078cda,2024-10-14T14:15:12.553000
|
||||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user