mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
Auto-Update: 2024-08-22T18:00:17.400296+00:00
This commit is contained in:
parent
a2cb96d584
commit
607e009d85
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-41099",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-22T15:15:15.390",
|
||||
"lastModified": "2024-03-22T15:34:43.663",
|
||||
"lastModified": "2024-08-22T17:35:00.720",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "En el instalador de Windows en Atos Eviden CardOS API anterior a 5.5.5.2811, puede ocurrir una escalada de privilegios locales (de un usuario normal a SYSTEM)."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.bull.com/ols/product/security/psirt/security-bulletins/cardos-api-local-privilege-escalation-psirt-358-tlp-clear-version-2-6-cve-2023-41099/view",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-43971",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-17T22:15:03.627",
|
||||
"lastModified": "2024-07-18T12:28:43.707",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-22T16:20:20.413",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,15 +15,75 @@
|
||||
"value": "Una vulnerabilidad de Cross Site Scripting en ACG-faka v1.1.7 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s del par\u00e1metro de codificaci\u00f3n en Index.php."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:lizhipay:acg-faka:1.1.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "ADD2505E-412F-45CF-B53F-0687C0D16A6B"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/N0boy-0/7251856fed517eb6358d8cae03099b7b",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/lizhipay/acg-faka/issues/72",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2023/CVE-2023-64xx/CVE-2023-6452.json
Normal file
56
CVE-2023/CVE-2023-64xx/CVE-2023-6452.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2023-6452",
|
||||
"sourceIdentifier": "psirt@forcepoint.com",
|
||||
"published": "2024-08-22T16:15:07.997",
|
||||
"lastModified": "2024-08-22T16:15:07.997",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Forcepoint Web Security (Transaction Viewer) allows Stored XSS.\n\n\n\n\n\nThe\n Forcepoint Web Security portal allows administrators to generate \ndetailed reports on user requests made through the Web proxy. It has \nbeen determined that the \"user agent\" field in the Transaction Viewer is\n vulnerable to a persistent Cross-Site Scripting (XSS) vulnerability, \nwhich can be exploited by any user who can route traffic through the \nForcepoint Web proxy.\n\nThis \nvulnerability enables unauthorized attackers to execute JavaScript \nwithin the browser context of a Forcepoint administrator, thereby \nallowing them to perform actions on the administrator's behalf. Such a \nbreach could lead to unauthorized access or modifications, posing a \nsignificant security risk.\n\n\n\n\n\n\nThis issue affects Web Security: before 8.5.6."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@forcepoint.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.6,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@forcepoint.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.forcepoint.com/s/article/000042212",
|
||||
"source": "psirt@forcepoint.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-0857",
|
||||
"sourceIdentifier": "iletisim@usom.gov.tr",
|
||||
"published": "2024-07-18T18:15:05.177",
|
||||
"lastModified": "2024-07-22T09:15:04.457",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-22T17:23:44.947",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:uni-yaz:flexwater_corporate_water_management:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "5.452.0",
|
||||
"matchCriteriaId": "2F0258AD-AFAD-46A3-A050-ABF176A3A3F2"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.usom.gov.tr/bildirim/tr-24-1011",
|
||||
"source": "iletisim@usom.gov.tr"
|
||||
"source": "iletisim@usom.gov.tr",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-23467",
|
||||
"sourceIdentifier": "psirt@solarwinds.com",
|
||||
"published": "2024-07-17T15:15:11.500",
|
||||
"lastModified": "2024-07-18T12:28:43.707",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-22T16:01:54.223",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -18,8 +18,28 @@
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@solarwinds.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "psirt@solarwinds.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
|
||||
@ -51,10 +71,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:solarwinds:access_rights_manager:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "2023.2.4",
|
||||
"matchCriteriaId": "DC3AC50B-3261-4394-80A9-15303C2C1D58"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://documentation.solarwinds.com/en/success_center/arm/content/release_notes/arm_2024-3_release_notes.htm",
|
||||
"source": "psirt@solarwinds.com"
|
||||
"source": "psirt@solarwinds.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-23468",
|
||||
"sourceIdentifier": "psirt@solarwinds.com",
|
||||
"published": "2024-07-17T15:15:11.730",
|
||||
"lastModified": "2024-07-18T12:28:43.707",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-22T16:00:38.870",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -18,8 +18,28 @@
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@solarwinds.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.4,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.5
|
||||
},
|
||||
{
|
||||
"source": "psirt@solarwinds.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
|
||||
@ -51,10 +71,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:solarwinds:access_rights_manager:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "2023.2.4",
|
||||
"matchCriteriaId": "DC3AC50B-3261-4394-80A9-15303C2C1D58"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://documentation.solarwinds.com/en/success_center/arm/content/release_notes/arm_2024-3_release_notes.htm",
|
||||
"source": "psirt@solarwinds.com"
|
||||
"source": "psirt@solarwinds.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-27488",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-08T06:15:07.533",
|
||||
"lastModified": "2024-04-08T18:48:40.217",
|
||||
"lastModified": "2024-08-22T17:35:01.813",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Vulnerabilidad de control de acceso incorrecto en las versiones 1.0 a 8.0 de ZLMediaKit, permite a atacantes remotos escalar privilegios y obtener informaci\u00f3n confidencial. El sistema de aplicaci\u00f3n habilita la interfaz API http de forma predeterminada y utiliza el m\u00e9todo de par\u00e1metro secreto para autenticar la interfaz API restful de http, pero el secreto est\u00e1 codificado de forma predeterminada."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-259"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/tr4pmaker/44442d6f068458175213f4ba71da1312",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-29736",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-07-19T09:15:04.003",
|
||||
"lastModified": "2024-08-01T13:49:34.540",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-22T17:31:48.980",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 9.1,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.2
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,46 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:cxf:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "3.5.9",
|
||||
"matchCriteriaId": "BF0BA29F-721E-4599-A7AC-32DAC5AB44D5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:cxf:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.6.0",
|
||||
"versionEndExcluding": "3.6.4",
|
||||
"matchCriteriaId": "7D6F6603-DD23-4DD5-8B90-0BAB0EB7E1D1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:cxf:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.0.0",
|
||||
"versionEndExcluding": "4.0.5",
|
||||
"matchCriteriaId": "ACAFECF5-75A5-4397-A588-F51D09717335"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://lists.apache.org/thread/4jtpsswn2r6xommol54p5mg263ysgdw2",
|
||||
"source": "security@apache.org"
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-30564",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-18T15:15:30.220",
|
||||
"lastModified": "2024-04-26T04:15:09.020",
|
||||
"lastModified": "2024-08-22T16:35:01.923",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Un problema en andrei-tatar nora-firebase-common entre v.1.0.41 y v.1.12.2 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de un script manipulado en el par\u00e1metro updateState del m\u00e9todo updateStateInternal."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-1321"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/mestrtee/5dc2c948c2057f98d3de0a9790903c6c",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-31411",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-07-17T10:15:01.810",
|
||||
"lastModified": "2024-08-01T13:50:54.623",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-22T16:07:06.267",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:streampipes:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "0.95.0",
|
||||
"matchCriteriaId": "B5EC9EC8-4988-4DAC-A92F-CCDED7F9CB52"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://lists.apache.org/thread/b0657okbwzg5xxs11hphvc9qrd9s70mt",
|
||||
"source": "security@apache.org"
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-31xx/CVE-2024-3127.json
Normal file
60
CVE-2024/CVE-2024-31xx/CVE-2024-3127.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-3127",
|
||||
"sourceIdentifier": "cve@gitlab.com",
|
||||
"published": "2024-08-22T16:15:08.590",
|
||||
"lastModified": "2024-08-22T16:15:08.590",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue has been discovered in GitLab EE affecting all versions starting from 12.5 before 17.1.6, all versions starting from 17.2 before 17.2.4, all versions starting from 17.3 before 17.3.1. Under certain conditions it may be possible to bypass the IP restriction for groups through GraphQL allowing unauthorised users to perform some actions at the group level."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@gitlab.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve@gitlab.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/452640",
|
||||
"source": "cve@gitlab.com"
|
||||
},
|
||||
{
|
||||
"url": "https://hackerone.com/reports/2395169",
|
||||
"source": "cve@gitlab.com"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-364xx/CVE-2024-36441.json
Normal file
25
CVE-2024/CVE-2024-364xx/CVE-2024-36441.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-36441",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-22T16:15:08.433",
|
||||
"lastModified": "2024-08-22T16:15:08.433",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Swissphone DiCal-RED 4009 devices allow an unauthenticated attacker use a port-2101 TCP connection to gain access to operation messages that are received by the device."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.swissphone.com/en-us/solutions/components/terminals/radio-data-module-dical-red/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-042.txt",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-36795",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-06-06T21:15:48.687",
|
||||
"lastModified": "2024-06-07T14:56:05.647",
|
||||
"lastModified": "2024-08-22T16:35:04.130",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Los permisos inseguros en Netgear WNR614 JNR1010V2/N300-V1.1.0.54_1.0.1 permiten a los atacantes acceder a URL y directorios integrados en el firmware a trav\u00e9s de vectores no especificados."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.0,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://redfoxsec.com/blog/security-advisory-multiple-vulnerabilities-in-netgear-wnr614-router/",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-38439",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-06-16T13:15:53.030",
|
||||
"lastModified": "2024-08-07T19:28:25.430",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-08-22T17:35:02.870",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-39457",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2024-07-19T09:15:05.343",
|
||||
"lastModified": "2024-07-19T13:01:44.567",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-22T17:33:32.373",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,15 +15,75 @@
|
||||
"value": " Cybozu Garoon 6.0.0 a 6.0.1 contiene una vulnerabilidad de Cross Site Scripting en la vista previa de PDF. Si se explota esta vulnerabilidad, se puede ejecutar un script arbitrario en el navegador web de un usuario que haya iniciado sesi\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cybozu:garoon:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.0.0",
|
||||
"versionEndExcluding": "6.0.2",
|
||||
"matchCriteriaId": "86C99C88-076E-4108-8D3A-E0117B948240"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://jvn.jp/en/jp/JVN74825766/",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
"source": "vultures@jpcert.or.jp",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://kb.cybozu.support/?product=garoon&v=&fv=6.0.2&t=%E8%84%86%E5%BC%B1%E6%80%A7&f=&r=&b=&s=&posts_per_page=20",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
"source": "vultures@jpcert.or.jp",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-40725",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-07-18T10:15:02.357",
|
||||
"lastModified": "2024-07-18T12:28:43.707",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-22T17:13:09.820",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,11 +15,44 @@
|
||||
"value": "Una soluci\u00f3n parcial para CVE-2024-39884 en el n\u00facleo de Apache HTTP Server 2.4.61 ignora parte del uso de la configuraci\u00f3n de controladores heredada basada en el tipo de contenido. \"AddType\" y configuraciones similares, en algunas circunstancias en las que los archivos se solicitan indirectamente, dan como resultado la divulgaci\u00f3n del c\u00f3digo fuente del contenido local. Por ejemplo, los scripts PHP pueden servirse en lugar de interpretarse. Se recomienda a los usuarios actualizar a la versi\u00f3n 2.4.62, que soluciona este problema."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@apache.org",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security@apache.org",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -28,10 +61,35 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:http_server:2.4.60:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3B948936-6007-4436-AF16-CCE8F59E0C29"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:http_server:2.4.61:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DA1CBE0F-AE94-4412-B8AB-8D6FC8698B86"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://httpd.apache.org/security/vulnerabilities_24.html",
|
||||
"source": "security@apache.org"
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-408xx/CVE-2024-40884.json
Normal file
56
CVE-2024/CVE-2024-408xx/CVE-2024-40884.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-40884",
|
||||
"sourceIdentifier": "responsibledisclosure@mattermost.com",
|
||||
"published": "2024-08-22T16:15:08.797",
|
||||
"lastModified": "2024-08-22T16:15:08.797",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Mattermost versions 9.5.x <= 9.5.7, 9.10.x <= 9.10.0 fail to properly enforce permissions which allows a team admin user without \"Add Team Members\" permission to disable the invite URL."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "responsibledisclosure@mattermost.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 2.7,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "responsibledisclosure@mattermost.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://mattermost.com/security-updates",
|
||||
"source": "responsibledisclosure@mattermost.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2024-41659",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-08-20T20:15:08.207",
|
||||
"lastModified": "2024-08-21T12:30:33.697",
|
||||
"lastModified": "2024-08-22T16:15:08.993",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "memos is a privacy-first, lightweight note-taking service. A CORS misconfiguration exists in memos 0.20.1 and earlier where an arbitrary origin is reflected with Access-Control-Allow-Credentials set to true. This may allow an attacking website to make a cross-origin request, allowing the attacker to read private information or make privileged changes to the system as the vulnerable user account."
|
||||
"value": "memos is a privacy-first, lightweight note-taking service. A CORS misconfiguration exists in memos 0.20.1 and earlier where an arbitrary origin is reflected with Access-Control-Allow-Credentials set to true. This may allow an attacking website to make a cross-origin request, allowing the attacker to read private information or make privileged changes to the system as the vulnerable user account. This vulnerability is fixed in 0.21.0."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -56,6 +56,10 @@
|
||||
"url": "https://github.com/usememos/memos/blob/v0.20.1/server/server.go#L163",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/usememos/memos/commit/8101a5e0b162044c16385bee4f12a4a653d050b9",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://securitylab.github.com/advisories/GHSL-2024-034_memos/",
|
||||
"source": "security-advisories@github.com"
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-42301",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-08-17T09:15:10.423",
|
||||
"lastModified": "2024-08-19T12:59:59.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-22T16:31:18.667",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,39 +15,158 @@
|
||||
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: dev/parport: corrige el riesgo de que la matriz est\u00e9 fuera de los l\u00edmites. Se corrigieron los problemas de matriz fuera de los l\u00edmites causados por sprintf reemplaz\u00e1ndolo con snprintf para una copia de datos m\u00e1s segura, garantizando el b\u00fafer de destino no est\u00e1 desbordado. A continuaci\u00f3n se muestra el seguimiento de la pila que encontr\u00e9 durante el problema real: [66.575408s] [pid:5118,cpu4,QThread,4]P\u00e1nico en el kernel: no se sincroniza: stack-protector: la pila del kernel est\u00e1 da\u00f1ada en: do_hardware_base_addr+0xcc/0xd0 [parport ] [ 66.575408s] [pid:5118,cpu4,QThread,5]CPU: 4 PID: 5118 Comunicaci\u00f3n: QThread contaminado: GSWO 5.10.97-arm64-desktop #7100.57021.2 [ 66.575439s] [pid:5118,cpu4, QThread,6]TGID: 5087 Comm: EFileApp [66.575439s] [pid:5118,cpu4,QThread,7]Nombre del hardware: HUAWEI HUAWEI QingYun PGUX-W515x-B081/SP1PANGUXM, BIOS 1.00.07 29/04/2024 [66.575439 s] [pid:5118,cpu4,QThread,8]Rastreo de llamadas: [66.575469s] [pid:5118,cpu4,QThread,9] dump_backtrace+0x0/0x1c0 [66.575469s] [pid:5118,cpu4,QThread,0 ] show_stack+0x14/0x20 [ 66.575469s] [pid:5118,cpu4,QThread,1] dump_stack+0xd4/0x10c [ 66.575500s] [pid:5118,cpu4,QThread,2] p\u00e1nico+0x1d8/0x3bc [ 66.575500s] [pid:5118,cpu4,QThread,3] __stack_chk_fail+0x2c/0x38 [66.575500s] [pid:5118,cpu4,QThread,4] do_hardware_base_addr+0xcc/0xd0 [parport]"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-129"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "4.19.320",
|
||||
"matchCriteriaId": "0B4EF915-550B-45E5-B2CA-648FEACD60FC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.20",
|
||||
"versionEndExcluding": "5.4.282",
|
||||
"matchCriteriaId": "A8961D98-9ACF-4188-BA88-44038B14BC28"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.5",
|
||||
"versionEndExcluding": "5.10.224",
|
||||
"matchCriteriaId": "5CCEDF13-293D-4E64-B501-4409D0365AFE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11",
|
||||
"versionEndExcluding": "5.15.165",
|
||||
"matchCriteriaId": "B4E2B568-3171-41DE-B519-F2B1A3600D94"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "6.1.103",
|
||||
"matchCriteriaId": "E45EAC72-8329-4F99-8276-86AF9BB3496A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2",
|
||||
"versionEndExcluding": "6.6.44",
|
||||
"matchCriteriaId": "CC912330-6B41-4C6B-99AF-F3857FBACB6A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.10.3",
|
||||
"matchCriteriaId": "92D388F2-1EAF-4CFA-AC06-5B26D762EA7D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/166a0bddcc27de41fe13f861c8348e8e53e988c8",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/47b3dce100778001cd76f7e9188944b5cb27a76d",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/7789a1d6792af410aa9b39a1eb237ed24fa2170a",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/7f4da759092a1a6ce35fb085182d02de8cc4cc84",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/a44f88f7576bc1916d8d6293f5c62fbe7cbe03e0",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/ab11dac93d2d568d151b1918d7b84c2d02bacbd5",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/b579ea3516c371ecf59d073772bc45dfd28c8a0e",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/c719b393374d3763e64900ee19aaed767d5a08d6",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-42302",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-08-17T09:15:10.487",
|
||||
"lastModified": "2024-08-19T12:59:59.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-22T16:37:26.237",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,31 +15,130 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: PCI/DPC: corrige el use-after-free en DPC simult\u00e1neos y la eliminaci\u00f3n en caliente. Keith informa un use-after-free cuando ocurre un evento de DPC simult\u00e1neamente con la eliminaci\u00f3n en caliente del mismo. parte de la jerarqu\u00eda: dpc_handler() espera que el bus secundario est\u00e9 listo debajo del puerto descendente donde ocurri\u00f3 el evento DPC. Para hacerlo, sondea el espacio de configuraci\u00f3n del primer dispositivo secundario en el bus secundario. Si ese dispositivo secundario se elimina simult\u00e1neamente, los accesos a su estructura pci_dev hacen que el kernel falle. Esto se debe a que pci_bridge_wait_for_secondary_bus() no mantiene una referencia en el dispositivo secundario. Antes de v6.3, la funci\u00f3n solo se llamaba al reanudar desde la suspensi\u00f3n del sistema o al reanudar el tiempo de ejecuci\u00f3n. Mantener una referencia no era necesario en aquel entonces porque el subproceso pciehp IRQ nunca pod\u00eda ejecutarse al mismo tiempo. (Al reanudar desde la suspensi\u00f3n del sistema, las IRQ no se habilitan hasta despu\u00e9s de la fase resume_noirq. Y la reanudaci\u00f3n del tiempo de ejecuci\u00f3n siempre se espera antes de que se elimine un dispositivo PCI). Sin embargo, a partir de v6.3, pci_bridge_wait_for_secondary_bus() tambi\u00e9n se llama en un evento DPC. El commit 53b54ad074de (\"PCI/DPC: Esperar la preparaci\u00f3n del bus secundario despu\u00e9s del reinicio\"), que introdujo eso, no pudo apreciar que pci_bridge_wait_for_secundary_bus() ahora necesita mantener una referencia en el dispositivo secundario porque dpc_handler() y pciehp pueden ejecutarse simult\u00e1neamente. El commit fue respaldada a n\u00facleos estables v5.10+, por lo que ese es el m\u00e1s antiguo afectado. Agregue la adquisici\u00f3n de referencia que falta. Seguimiento de pila abreviado: ERROR: no se puede manejar el error de p\u00e1gina para la direcci\u00f3n: 00000000091400c0 CPU: 15 PID: 2464 Comm: irq/53-pcie-dpc 6.9.0 RIP: pci_bus_read_config_dword+0x17/0x50 pci_dev_wait() pci_bridge_wait_for_secondary_bus() dpc_reset_link() _hacer_recuperaci\u00f3n () dpc_handler()"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "5.10.224",
|
||||
"matchCriteriaId": "8C51B278-A459-4B27-8CDF-1F3B85D9D08E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11",
|
||||
"versionEndExcluding": "5.15.165",
|
||||
"matchCriteriaId": "B4E2B568-3171-41DE-B519-F2B1A3600D94"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "6.1.103",
|
||||
"matchCriteriaId": "E45EAC72-8329-4F99-8276-86AF9BB3496A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2",
|
||||
"versionEndExcluding": "6.6.44",
|
||||
"matchCriteriaId": "CC912330-6B41-4C6B-99AF-F3857FBACB6A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.10.3",
|
||||
"matchCriteriaId": "92D388F2-1EAF-4CFA-AC06-5B26D762EA7D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/11a1f4bc47362700fcbde717292158873fb847ed",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/2c111413f38ca5cf87557cab89f6d82b0e3433e7",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/2cc8973bdc4d6c928ebe38b88090a2cdfe81f42f",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/b16f3ea1db47a6766a9f1169244cf1fc287a7c62",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/c52f9e1a9eb40f13993142c331a6cfd334d4b91d",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/f63df70b439bb8331358a306541893bf415bf1da",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-42309",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-08-17T09:15:10.987",
|
||||
"lastModified": "2024-08-19T12:59:59.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-22T16:01:29.287",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,39 +15,159 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/gma500: corrige la desreferencia del puntero nulo en psb_intel_lvds_get_modes En psb_intel_lvds_get_modes(), el valor de retorno de drm_mode_duplicate() se asigna al modo, lo que conducir\u00e1 a una posible desreferencia del puntero NULL en caso de falla de drm_mode_duplicate(). Agregue una marca para evitar npd."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.3",
|
||||
"versionEndExcluding": "4.19.320",
|
||||
"matchCriteriaId": "A8CC84FF-E64E-4A70-8AA3-8BAC46058B6B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.20",
|
||||
"versionEndExcluding": "5.4.282",
|
||||
"matchCriteriaId": "A8961D98-9ACF-4188-BA88-44038B14BC28"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.5",
|
||||
"versionEndExcluding": "5.10.224",
|
||||
"matchCriteriaId": "5CCEDF13-293D-4E64-B501-4409D0365AFE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11",
|
||||
"versionEndExcluding": "5.15.165",
|
||||
"matchCriteriaId": "B4E2B568-3171-41DE-B519-F2B1A3600D94"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "6.1.103",
|
||||
"matchCriteriaId": "E45EAC72-8329-4F99-8276-86AF9BB3496A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2",
|
||||
"versionEndExcluding": "6.6.44",
|
||||
"matchCriteriaId": "CC912330-6B41-4C6B-99AF-F3857FBACB6A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.10.3",
|
||||
"matchCriteriaId": "92D388F2-1EAF-4CFA-AC06-5B26D762EA7D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/13b5f3ee94bdbdc4b5f40582aab62977905aedee",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/2df7aac81070987b0f052985856aa325a38debf6",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/46d2ef272957879cbe30a884574320e7f7d78692",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/475a5b3b7c8edf6e583a9eb59cf28ea770602e14",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/6735d02ead7dd3adf74eb8b70aebd09e0ce78ec9",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/7e52c62ff029f95005915c0a11863b5fb5185c8c",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/d6ad202f73f8edba0cbc0065aa57a79ffe8fdcdc",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/f70ffeca546452d1acd3a70ada56ecb2f3e7f811",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-42310",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-08-17T09:15:11.067",
|
||||
"lastModified": "2024-08-19T12:59:59.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-22T16:01:46.263",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,39 +15,159 @@
|
||||
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: drm/gma500: corrige la desreferencia del puntero nulo en cdv_intel_lvds_get_modes En cdv_intel_lvds_get_modes(), el valor de retorno de drm_mode_duplicate() se asigna al modo, lo que conducir\u00e1 a una desreferencia del puntero NULL en caso de falla de drm_mode_duplicate(). Agregue una marca para evitar npd."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.3",
|
||||
"versionEndExcluding": "4.19.320",
|
||||
"matchCriteriaId": "A8CC84FF-E64E-4A70-8AA3-8BAC46058B6B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.20",
|
||||
"versionEndExcluding": "5.4.282",
|
||||
"matchCriteriaId": "A8961D98-9ACF-4188-BA88-44038B14BC28"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.5",
|
||||
"versionEndExcluding": "5.10.224",
|
||||
"matchCriteriaId": "5CCEDF13-293D-4E64-B501-4409D0365AFE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11",
|
||||
"versionEndExcluding": "5.15.165",
|
||||
"matchCriteriaId": "B4E2B568-3171-41DE-B519-F2B1A3600D94"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "6.1.103",
|
||||
"matchCriteriaId": "E45EAC72-8329-4F99-8276-86AF9BB3496A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2",
|
||||
"versionEndExcluding": "6.6.44",
|
||||
"matchCriteriaId": "CC912330-6B41-4C6B-99AF-F3857FBACB6A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.10.3",
|
||||
"matchCriteriaId": "92D388F2-1EAF-4CFA-AC06-5B26D762EA7D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/08f45102c81ad8bc9f85f7a25e9f64e128edb87d",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/2d209b2f862f6b8bff549ede541590a8d119da23",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/977ee4fe895e1729cd36cc26916bbb10084713d6",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/a658ae2173ab74667c009e2550455e6de5b33ddc",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/b6ac46a00188cde50ffba233e6efb366354a1de5",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/cb520c3f366c77e8d69e4e2e2781a8ce48d98e79",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/e74eb5e8089427c8c49e0dd5067e5f39ce3a4d56",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/f392c36cebf4c1d6997a4cc2c0f205254acef42a",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-42313",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-08-17T09:15:11.320",
|
||||
"lastModified": "2024-08-19T12:59:59.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-22T16:01:59.467",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,39 +15,159 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: medios: venus: arreglar el use after free en vdec_close Parece haber un posible use after free con vdec_close(). El firmware agregar\u00e1 trabajo de liberaci\u00f3n de b\u00fafer a la cola de trabajos a trav\u00e9s de devoluciones de llamada HFI como parte normal de la decodificaci\u00f3n. Cerrar aleatoriamente el dispositivo decodificador desde el espacio de usuario durante la decodificaci\u00f3n normal puede generar una lectura despu\u00e9s de la liberaci\u00f3n por instante. Solucionarlo cancelando el trabajo en vdec_close."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.13",
|
||||
"versionEndExcluding": "4.19.320",
|
||||
"matchCriteriaId": "ACC6CF43-5ABC-413A-8970-EB5985568FE5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.20",
|
||||
"versionEndExcluding": "5.4.282",
|
||||
"matchCriteriaId": "A8961D98-9ACF-4188-BA88-44038B14BC28"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.5",
|
||||
"versionEndExcluding": "5.10.224",
|
||||
"matchCriteriaId": "5CCEDF13-293D-4E64-B501-4409D0365AFE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11",
|
||||
"versionEndExcluding": "5.15.165",
|
||||
"matchCriteriaId": "B4E2B568-3171-41DE-B519-F2B1A3600D94"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "6.1.103",
|
||||
"matchCriteriaId": "E45EAC72-8329-4F99-8276-86AF9BB3496A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2",
|
||||
"versionEndExcluding": "6.6.44",
|
||||
"matchCriteriaId": "CC912330-6B41-4C6B-99AF-F3857FBACB6A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.10.3",
|
||||
"matchCriteriaId": "92D388F2-1EAF-4CFA-AC06-5B26D762EA7D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/4c9d235630d35db762b85a4149bbb0be9d504c36",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/66fa52edd32cdbb675f0803b3c4da10ea19b6635",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/6a96041659e834dc0b172dda4b2df512d63920c2",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/72aff311194c8ceda934f24fd6f250b8827d7567",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/a0157b5aa34eb43ec4c5510f9c260bbb03be937e",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/ad8cf035baf29467158e0550c7a42b7bb43d1db6",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/da55685247f409bf7f976cc66ba2104df75d8dad",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/f8e9a63b982a8345470c225679af4ba86e4a7282",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2024/CVE-2024-424xx/CVE-2024-42490.json
Normal file
64
CVE-2024/CVE-2024-424xx/CVE-2024-42490.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2024-42490",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-08-22T16:15:09.117",
|
||||
"lastModified": "2024-08-22T16:15:09.117",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "authentik is an open-source Identity Provider. Several API endpoints can be accessed by users without correct authentication/authorization. The main API endpoints affected by this are /api/v3/crypto/certificatekeypairs/<uuid>/view_certificate/, /api/v3/crypto/certificatekeypairs/<uuid>/view_private_key/, and /api/v3/.../used_by/. Note that all of the affected API endpoints require the knowledge of the ID of an object, which especially for certificates is not accessible to an unprivileged user. Additionally the IDs for most objects are UUIDv4, meaning they are not easily guessable/enumerable. authentik 2024.4.4, 2024.6.4 and 2024.8.0 fix this issue."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 4.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-285"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/goauthentik/authentik/commit/19318d4c00bb02c4ec3c4f8f15ac2e1dbe8d846c",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/goauthentik/authentik/commit/359b343f51524342a5ca03828e7c975a1d654b11",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/goauthentik/authentik/security/advisories/GHSA-qxqc-27pr-wgc8",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-424xx/CVE-2024-42497.json
Normal file
56
CVE-2024/CVE-2024-424xx/CVE-2024-42497.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-42497",
|
||||
"sourceIdentifier": "responsibledisclosure@mattermost.com",
|
||||
"published": "2024-08-22T16:15:09.330",
|
||||
"lastModified": "2024-08-22T16:15:09.330",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Mattermost versions 9.9.x <= 9.9.1, 9.5.x <= 9.5.7, 9.10.x <= 9.10.0, 9.8.x <= 9.8.2 fail to properly enforce permissions which allows a user with systems manager role with read-only access to teams to perform write operations on teams."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "responsibledisclosure@mattermost.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.0,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 4.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "responsibledisclosure@mattermost.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://mattermost.com/security-updates",
|
||||
"source": "responsibledisclosure@mattermost.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-42598",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-20T16:15:11.727",
|
||||
"lastModified": "2024-08-21T12:30:33.697",
|
||||
"lastModified": "2024-08-22T16:35:06.180",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "SeaCMS 13.0 tiene una vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo. La raz\u00f3n de esta vulnerabilidad es que, aunque admin_editplayer.php impone restricciones a los archivos editados, los atacantes a\u00fan pueden eludir estas restricciones y escribir c\u00f3digo, lo que permite a los atacantes autenticados explotar la vulnerabilidad para ejecutar comandos arbitrarios y obtener privilegios del sistema."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitee.com/fushuling/cve/blob/master/SeaCMS%20V13%20admin_editplayer.php%20code%20injection.md",
|
||||
|
25
CVE-2024/CVE-2024-427xx/CVE-2024-42768.json
Normal file
25
CVE-2024/CVE-2024-427xx/CVE-2024-42768.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-42768",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-22T17:15:05.693",
|
||||
"lastModified": "2024-08-22T17:15:05.693",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A Cross-Site Request Forgery (CSRF) vulnerability was found in Kashipara Hotel Management System v1.0 via /admin/delete_room.php."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cwe.mitre.org/data/definitions/352.html",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Hotel%20Management%20System%20v1.0/CSRF.pdf",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-427xx/CVE-2024-42769.json
Normal file
25
CVE-2024/CVE-2024-427xx/CVE-2024-42769.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-42769",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-22T16:15:09.553",
|
||||
"lastModified": "2024-08-22T16:15:09.553",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A Reflected Cross Site Scripting (XSS) vulnerability was found in \"/core/signup_user.php \" of Kashipara Hotel Management System v1.0, which allows remote attackers to execute arbitrary code via \"user_fname\" and \"user_lname\" parameters."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Hotel%20Management%20System%20v1.0/Reflected%20XSS%20-%20Sign%20UP.pdf",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.kashipara.com/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-427xx/CVE-2024-42770.json
Normal file
60
CVE-2024/CVE-2024-427xx/CVE-2024-42770.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-42770",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-22T16:15:09.640",
|
||||
"lastModified": "2024-08-22T16:35:07.240",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A Stored Cross Site Scripting (XSS) vulnerability was found in \"/core/signup_user.php\" of Kashipara Hotel Management System v1.0, which allows remote attackers to execute arbitrary code via the \"user_email\" parameter."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Hotel%20Management%20System%20v1.0/Stored%20XSS%20-%20Sign%20UP.pdf",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.kashipara.com/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-427xx/CVE-2024-42771.json
Normal file
25
CVE-2024/CVE-2024-427xx/CVE-2024-42771.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-42771",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-22T16:15:09.730",
|
||||
"lastModified": "2024-08-22T16:15:09.730",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A Stored Cross Site Scripting (XSS) vulnerability was found in \" /admin/edit_room_controller.php\" of the Kashipara Hotel Management System v1.0, which allows remote attackers to execute arbitrary code via \"room_name\" parameter."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Hotel%20Management%20System%20v1.0/Stored%20XSS%20-%20Edit%20Room.pdf",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.kashipara.com/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-427xx/CVE-2024-42772.json
Normal file
25
CVE-2024/CVE-2024-427xx/CVE-2024-42772.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-42772",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-22T17:15:06.070",
|
||||
"lastModified": "2024-08-22T17:15:06.070",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An Incorrect Access Control vulnerability was found in /admin/rooms.php in Kashipara Hotel Management System v1.0, which allows an unauthenticated attacker to view valid hotel room entries in administrator section."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Hotel%20Management%20System%20v1.0/Broken%20Access%20Control%20-%20View%20Room%20Entry.pdf",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.kashipara.com/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-427xx/CVE-2024-42774.json
Normal file
25
CVE-2024/CVE-2024-427xx/CVE-2024-42774.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-42774",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-22T17:15:06.350",
|
||||
"lastModified": "2024-08-22T17:15:06.350",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An Incorrect Access Control vulnerability was found in /admin/delete_room.php in Kashipara Hotel Management System v1.0, which allows an unauthenticated attacker to delete valid hotel room entries in the administrator section."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Hotel%20Management%20System%20v1.0/Broken%20Access%20Control%20-%20Delete%20Room%20Entry.pdf",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.kashipara.com/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-427xx/CVE-2024-42775.json
Normal file
25
CVE-2024/CVE-2024-427xx/CVE-2024-42775.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-42775",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-22T17:15:06.580",
|
||||
"lastModified": "2024-08-22T17:15:06.580",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An Incorrect Access Control vulnerability was found in /admin/add_room_controller.php in Kashipara Hotel Management System v1.0, which allows an unauthenticated attacker to add the valid hotel room entries in the administrator section via the direct URL access."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Hotel%20Management%20System%20v1.0/Broken%20Access%20Control%20-%20Add%20New%20Room%20Entry.pdf",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.kashipara.com/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-427xx/CVE-2024-42776.json
Normal file
25
CVE-2024/CVE-2024-427xx/CVE-2024-42776.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-42776",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-22T17:15:06.807",
|
||||
"lastModified": "2024-08-22T17:15:06.807",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Kashipara Hotel Management System v1.0 is vulnerable to Incorrect Access Control via /admin/users.php."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Hotel%20Management%20System%20v1.0/Broken%20Access%20Control%20-%20View%20User%20Data.pdf",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.kashipara.com/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-42778",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-21T18:15:10.003",
|
||||
"lastModified": "2024-08-22T12:48:02.790",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-22T17:46:56.953",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,15 +15,73 @@
|
||||
"value": "Se encontr\u00f3 una vulnerabilidad de carga de archivos sin restricciones en \"/music/ajax.php?action=save_playlist\" en Kashipara Music Management System v1.0. Esto permite a los atacantes ejecutar c\u00f3digo arbitrario cargando un archivo PHP manipulado."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:lopalopa:music_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B9E63270-AF05-41C1-8464-61ECA2425ABA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Music%20Management%20System%20v1.0/Unrestricted%20File%20Upload%20-%20Add%20New%20Playlist.pdf",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.kashipara.com/project/php/12978/music-management-system-in-php-php-project-source-code",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-42783",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-21T18:15:10.453",
|
||||
"lastModified": "2024-08-22T12:48:02.790",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-22T17:35:07.750",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Kashipara Music Management System v1.0 es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s de /music/manage_playlist_items.php. Un atacante puede ejecutar comandos SQL arbitrarios mediante el par\u00e1metro \"pid\"."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Music%20Management%20System%20v1.0/SQL%20Injection%20-%20Manage%20Playlist.pdf",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-43033",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-22T01:15:03.540",
|
||||
"lastModified": "2024-08-22T12:48:02.790",
|
||||
"lastModified": "2024-08-22T16:35:08.663",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "JPress hasta 5.1.1 en Windows tiene una vulnerabilidad de carga de archivos arbitrarios que podr\u00eda causar la ejecuci\u00f3n de c\u00f3digo arbitrario a trav\u00e9s de ::$DATA a AttachmentController, como un archivo .jsp::$DATA a io.jpress.web.commons.controller.AttachmentController# subir. NOTA: esto no est\u00e1 relacionado con el vector de ataque de CVE-2024-32358."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-69"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cwe.mitre.org/data/definitions/69.html",
|
||||
|
56
CVE-2024/CVE-2024-437xx/CVE-2024-43780.json
Normal file
56
CVE-2024/CVE-2024-437xx/CVE-2024-43780.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-43780",
|
||||
"sourceIdentifier": "responsibledisclosure@mattermost.com",
|
||||
"published": "2024-08-22T16:15:09.897",
|
||||
"lastModified": "2024-08-22T16:15:09.897",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Mattermost versions 9.9.x <= 9.9.1, 9.5.x <= 9.5.7, 9.10.0, 9.8.x <= 9.8.2 fail to enforce permissions which allows a guest user with read access to upload files to a channel."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "responsibledisclosure@mattermost.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "responsibledisclosure@mattermost.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://mattermost.com/security-updates",
|
||||
"source": "responsibledisclosure@mattermost.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-43855",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-08-17T10:15:10.527",
|
||||
"lastModified": "2024-08-19T12:59:59.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-22T17:48:09.100",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,23 +15,102 @@
|
||||
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: md: corrige el punto muerto entre mddev_suspend y purgar bio. El punto muerto ocurre cuando mddev se suspende mientras se realiza alg\u00fan purga de biograf\u00eda. Es una cuesti\u00f3n compleja. T1. la primera descarga est\u00e1 en la etapa final, borra 'mddev->flush_bio' e intenta enviar datos, pero se bloquea porque T4 suspende mddev. T2. la segunda descarga establece 'mddev->flush_bio' e intenta poner en cola md_submit_flush_data(), que ya se est\u00e1 ejecutando (T1) y no se ejecutar\u00e1 nuevamente si est\u00e1 en la misma CPU que T1. T3. el tercer enjuague incluye active_io e intenta descargar, pero se bloquea porque 'mddev->flush_bio' no es NULL (establecido por T2). T4. Se llama a mddev_suspend() y espera que active_io dec a 0, que es incrementado por T3. T1 T2 T3 T4 (flush 1) (flush 2) (tercero 3) (suspender) md_submit_flush_data mddev->flush_bio = NULL; . . md_flush_request. mddev->flush_bio = biograf\u00eda. cola submit_flushes . . . . md_handle_request. . activo_io + 1. . md_flush_request. . \u00a1espera! mddev->flush_bio. . . . mddev_suspend. . \u00a1espera! active_io. . . enviar_flushes. queue_work md_submit_flush_data. //md_submit_flush_data ya se est\u00e1 ejecutando (T1). md_handle_request espera reanudar la ra\u00edz del problema es el aumento/disminuci\u00f3n no at\u00f3mico de active_io durante el proceso de descarga. active_io disminuye antes de que md_submit_flush_data se ponga en cola y se inc poco despu\u00e9s de ejecutar md_submit_flush_data(). md_flush_request active_io + 1 submit_flushes active_io - 1 md_submit_flush_data md_handle_request active_io + 1 make_request active_io - 1 Si active_io se dec despu\u00e9s de md_handle_request() en lugar de dentro de submit_flushes(), se puede llamar a make_request() directamente en lugar de md_handle_request() en md_submit_flush_data(), y active_io solo aumentar\u00e1 y disminuir\u00e1 una vez durante todo el proceso de descarga. Se solucionar\u00e1 el punto muerto. Adem\u00e1s, la \u00fanica diferencia entre solucionar el problema y antes es que no hay manejo de errores de devoluci\u00f3n de make_request(). Pero despu\u00e9s de que el parche anterior limpi\u00f3 md_write_start(), make_requst() solo devuelve un error en raid5_make_request() por dm-raid, consulte el commit 41425f96d7aa (\"dm-raid456, md/raid456: solucione un punto muerto para dm-raid456 mientras io concurre con reshape) \". Dado que dm siempre divide los datos y la operaci\u00f3n de descarga en dos io separados, el tama\u00f1o de io de descarga enviado por dm siempre es 0, no se llamar\u00e1 a make_request() en md_submit_flush_data(). Para evitar que modificaciones futuras introduzcan problemas, agregue WARN_ON para garantizar que make_request() no se devuelva ning\u00fan error en este contexto."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.1.103",
|
||||
"matchCriteriaId": "5C41F9D9-FD77-4351-9E80-31CDB3FB794F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2",
|
||||
"versionEndExcluding": "6.6.44",
|
||||
"matchCriteriaId": "CC912330-6B41-4C6B-99AF-F3857FBACB6A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.10.3",
|
||||
"matchCriteriaId": "92D388F2-1EAF-4CFA-AC06-5B26D762EA7D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/2d0738a8322bf4e5bfe693d16b3111928a9ccfbf",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/32226070813140234b6c507084738e8e8385c5c6",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/611d5cbc0b35a752e657a83eebadf40d814d006b",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/ca963eefbc3331222b6121baa696d49ba2008811",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-43856",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-08-17T10:15:10.613",
|
||||
"lastModified": "2024-08-19T12:59:59.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-22T17:57:08.640",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,39 +15,159 @@
|
||||
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: dma: corrige el orden de llamadas en dmam_free_coherent dmam_free_coherent() libera una asignaci\u00f3n de DMA, lo que hace que el vaddr liberado est\u00e9 disponible para su reutilizaci\u00f3n, luego llama a devres_destroy() para eliminar y liberar la estructura de datos utilizada para realizar un seguimiento de la asignaci\u00f3n de DMA. Entre las dos llamadas, es posible que una tarea simult\u00e1nea realice una asignaci\u00f3n con el mismo vaddr y lo agregue a la lista de devres. Si esto sucede, habr\u00e1 dos entradas en la lista devres con el mismo vaddr y devres_destroy() puede liberar la entrada incorrecta, activando WARN_ON() en dmam_match. Para solucionarlo, destruya la entrada devres antes de liberar la asignaci\u00f3n de DMA. kokonut //net/encryption http://sponge2/b9145fe6-0f72-4325-ac2f-a84d81075b03"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-770"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2.6.21",
|
||||
"versionEndExcluding": "4.19.320",
|
||||
"matchCriteriaId": "482B11C0-6B3C-4F07-817D-E7E181A88878"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.20",
|
||||
"versionEndExcluding": "5.4.282",
|
||||
"matchCriteriaId": "A8961D98-9ACF-4188-BA88-44038B14BC28"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.5",
|
||||
"versionEndExcluding": "5.10.224",
|
||||
"matchCriteriaId": "5CCEDF13-293D-4E64-B501-4409D0365AFE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11",
|
||||
"versionEndExcluding": "5.15.165",
|
||||
"matchCriteriaId": "B4E2B568-3171-41DE-B519-F2B1A3600D94"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "6.1.103",
|
||||
"matchCriteriaId": "E45EAC72-8329-4F99-8276-86AF9BB3496A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2",
|
||||
"versionEndExcluding": "6.6.44",
|
||||
"matchCriteriaId": "CC912330-6B41-4C6B-99AF-F3857FBACB6A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.10.3",
|
||||
"matchCriteriaId": "92D388F2-1EAF-4CFA-AC06-5B26D762EA7D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/1fe97f68fce1ba24bf823bfb0eb0956003473130",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/22094f5f52e7bc16c5bf9613365049383650b02e",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/257193083e8f43907e99ea633820fc2b3bcd24c7",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/28e8b7406d3a1f5329a03aa25a43aa28e087cb20",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/2f7bbdc744f2e7051d1cb47c8e082162df1923c9",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/87b34c8c94e29fa01d744e5147697f592998d954",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/f993a4baf6b622232e4c190d34c220179e5d61eb",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/fe2d246080f035e0af5793cb79067ba125e4fb63",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-43857",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-08-17T10:15:10.687",
|
||||
"lastModified": "2024-08-19T12:59:59.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-22T17:38:21.003",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,15 +15,75 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: f2fs: corrige el error de referencia nula al comprobar el final de la zona. Este parche corrige un puntero potencialmente nulo al que accede is_end_zone_blkaddr() que comprueba el \u00faltimo bloque de una zona cuando f2fs est\u00e1 montado como dispositivo \u00fanico."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.5",
|
||||
"versionEndExcluding": "6.10.3",
|
||||
"matchCriteriaId": "94C06380-0119-4822-BAD3-44C05394E6B6"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/381cbe85592c78fbaeb3e770e3e9f3bfa3e67efb",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/c82bc1ab2a8a5e73d9728e80c4c2ed87e8921a38",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-43858",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-08-17T10:15:10.750",
|
||||
"lastModified": "2024-08-19T12:59:59.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-22T17:40:11.663",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,39 +15,159 @@
|
||||
"value": "En el kernel de Linux se ha resuelto la siguiente vulnerabilidad: jfs: Reparar array-index-out-of-bounds en diFree"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-129"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2.6.12",
|
||||
"versionEndExcluding": "4.19.320",
|
||||
"matchCriteriaId": "3D02F024-6A60-41D9-B21D-2EF8EE3410DD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.20",
|
||||
"versionEndExcluding": "5.4.282",
|
||||
"matchCriteriaId": "A8961D98-9ACF-4188-BA88-44038B14BC28"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.5",
|
||||
"versionEndExcluding": "5.10.224",
|
||||
"matchCriteriaId": "5CCEDF13-293D-4E64-B501-4409D0365AFE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11",
|
||||
"versionEndExcluding": "5.15.165",
|
||||
"matchCriteriaId": "B4E2B568-3171-41DE-B519-F2B1A3600D94"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "6.1.103",
|
||||
"matchCriteriaId": "E45EAC72-8329-4F99-8276-86AF9BB3496A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2",
|
||||
"versionEndExcluding": "6.6.44",
|
||||
"matchCriteriaId": "CC912330-6B41-4C6B-99AF-F3857FBACB6A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.10.3",
|
||||
"matchCriteriaId": "92D388F2-1EAF-4CFA-AC06-5B26D762EA7D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/538a27c8048f081a5ddd286f886eb986fbbc7f80",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/55b732c8b09b41148eaab2fa8e31b0af47671e00",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/63f7fdf733add82f126ea00e2e48f6eba15ac4b9",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/6aa6892a90a5a7fabffe5692ab9f06a7a46c6e42",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/8d8f9a477de0d7962342eedf2a599215b7c63d28",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/9b3a4345957f5372041bc4f59de322f62653e862",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/f73f969b2eb39ad8056f6c7f3a295fa2f85e313a",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/ff14eadc278663cac69d57d3ca7fb2f394e1f8a7",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-43859",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-08-17T10:15:10.817",
|
||||
"lastModified": "2024-08-19T12:59:59.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-22T17:28:28.490",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,19 +15,89 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: F2FS: Correcto para truncar los bloques preallocados en F2FS_FILE_OPEN () Chenyuwen informa un error F2FS a continuaci\u00f3n: Ineable para manejar el kernel nulo dreference en la direcci\u00f3n virtual 000000000011 FSCRYPT_SET_BIO_CRYPT_ POTER_ GACT/0X1 ab_read_bio+0x78 /0x208 f2fs_submit_page_read+0x44/0x154 f2fs_get_read_data_page+0x288/0x5f4 f2fs_get_lock_data_page+0x60/0x190 truncate_partial_data_page+0x108/0x4fc f2fs_do_truncate_blocks+0x344/0x5f0 f2fs_truncate_blocks+0x6c/0x134 f2fs_truncate+0xd8/0x200 f2fs_iget+0x20c/0x5ac do_garbage_collect+0x5d0/0xf6c f2fs_gc+0x22c /0x6a4 f2fs_disable_checkpoint+0xc8/0x310 f2fs_fill_super+0x14bc/0x1764 mount_bdev+0x1b4/0x21c f2fs_mount+0x20/0x30 Legacy_get_tree+0x50/0xbc vfs_get_tree+0x5c/0x1b0 8/0x4cc path_mount+0x33c/0x5fc __arm64_sys_mount+0xcc/0x15c invoke_syscall+0x60 /0x150 el0_svc_common+0xb8/0xf8 do_el0_svc+0x28/0xa0 el0_svc+0x24/0x84 el0t_64_sync_handler+0x88/0xec Es porque inode.i_crypt_info no se inicializa durante la siguiente ruta: - mount - f2fs_fill_super - f2fs_disable_checkpoint - fs_gc - f2fs_iget - f2fs_truncate Entonces, reubique el truncamiento de bloques preasignados a f2fs_file_open(), despu\u00e9s de fscrypt_file_open()."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.17",
|
||||
"versionEndExcluding": "6.6.44",
|
||||
"matchCriteriaId": "88C7B344-4818-4A1A-A34B-E3134FED942C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.10.3",
|
||||
"matchCriteriaId": "92D388F2-1EAF-4CFA-AC06-5B26D762EA7D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/298b1e4182d657c3e388adcc29477904e9600ed5",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/3ba0ae885215b325605ff7ebf6de12ac2adf204d",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/f44a25a8bfe0c15d33244539696cd9119cf44d18",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-43860",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-08-17T10:15:10.887",
|
||||
"lastModified": "2024-08-19T12:59:59.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-22T17:08:15.097",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,39 +15,159 @@
|
||||
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: remoteproc: imx_rproc: omitir la regi\u00f3n de memoria cuando el valor del nodo es NULL En imx_rproc_addr_init() \"nph = of_count_phandle_with_args()\" solo cuenta el n\u00famero de phandles. Pero los phandles pueden estar vac\u00edos. Por lo tanto, of_parse_phandle() en el bucle de an\u00e1lisis (0 < a < nph) puede devolver NULL, que luego se desreferencia. Ajuste este problema agregando una verificaci\u00f3n de retorno NULL. Encontrado por el Centro de verificaci\u00f3n de Linux (linuxtesting.org) con SVACE. [T\u00edtulo fijo para que se ajuste a los 70-75 caracteres prescritos]"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.14",
|
||||
"versionEndExcluding": "4.19.320",
|
||||
"matchCriteriaId": "272F1A13-F5CF-488B-9BBA-93B1D1FE6BDB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.20",
|
||||
"versionEndExcluding": "5.4.282",
|
||||
"matchCriteriaId": "A8961D98-9ACF-4188-BA88-44038B14BC28"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.5",
|
||||
"versionEndExcluding": "5.10.224",
|
||||
"matchCriteriaId": "5CCEDF13-293D-4E64-B501-4409D0365AFE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11",
|
||||
"versionEndExcluding": "5.15.165",
|
||||
"matchCriteriaId": "B4E2B568-3171-41DE-B519-F2B1A3600D94"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "6.1.103",
|
||||
"matchCriteriaId": "E45EAC72-8329-4F99-8276-86AF9BB3496A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2",
|
||||
"versionEndExcluding": "6.6.44",
|
||||
"matchCriteriaId": "CC912330-6B41-4C6B-99AF-F3857FBACB6A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.10.3",
|
||||
"matchCriteriaId": "92D388F2-1EAF-4CFA-AC06-5B26D762EA7D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/2fa26ca8b786888673689ccc9da6094150939982",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/4e13b7c23988c0a13fdca92e94296a3bc2ff9f21",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/6884fd0283e0831be153fb8d82d9eda8a55acaaa",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/6b50462b473fdccdc0dfad73001147e40ff19a66",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/6c9ea3547fad252fe9ae5d3ed7e066e2085bf3a2",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/84beb7738459cac0ff9f8a7c4654b8ff82a702c0",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/9a17cf8b2ce483fa75258bc2cdcf628f24bcf5f8",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/c877a5f5268d4ab8224b9c9fbce3d746e4e72bc9",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
40
CVE-2024/CVE-2024-451xx/CVE-2024-45191.json
Normal file
40
CVE-2024/CVE-2024-451xx/CVE-2024-45191.json
Normal file
@ -0,0 +1,40 @@
|
||||
{
|
||||
"id": "CVE-2024-45191",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-22T16:15:10.120",
|
||||
"lastModified": "2024-08-22T16:15:10.120",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [
|
||||
{
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"tags": [
|
||||
"unsupported-when-assigned"
|
||||
]
|
||||
}
|
||||
],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in Matrix libolm (aka Olm) through 3.2.16. The AES implementation is vulnerable to cache-timing attacks due to use of S-boxes. This is related to software that uses a lookup table for the SubWord step. NOTE: This vulnerability only affects products that are no longer supported by the maintainer."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitlab.matrix.org/matrix-org/olm/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://gitlab.matrix.org/matrix-org/olm/-/commit/6d4b5b07887821a95b144091c8497d09d377f985",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://news.ycombinator.com/item?id=41249371",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://soatok.blog/2024/08/14/security-issues-in-matrixs-olm-library/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
40
CVE-2024/CVE-2024-451xx/CVE-2024-45192.json
Normal file
40
CVE-2024/CVE-2024-451xx/CVE-2024-45192.json
Normal file
@ -0,0 +1,40 @@
|
||||
{
|
||||
"id": "CVE-2024-45192",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-22T16:15:10.237",
|
||||
"lastModified": "2024-08-22T16:15:10.237",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [
|
||||
{
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"tags": [
|
||||
"unsupported-when-assigned"
|
||||
]
|
||||
}
|
||||
],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in Matrix libolm (aka Olm) through 3.2.16. Cache-timing attacks can occur due to use of base64 when decoding group session keys. NOTE: This vulnerability only affects products that are no longer supported by the maintainer."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitlab.matrix.org/matrix-org/olm/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://gitlab.matrix.org/matrix-org/olm/-/commit/6d4b5b07887821a95b144091c8497d09d377f985",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://news.ycombinator.com/item?id=41249371",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://soatok.blog/2024/08/14/security-issues-in-matrixs-olm-library/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
40
CVE-2024/CVE-2024-451xx/CVE-2024-45193.json
Normal file
40
CVE-2024/CVE-2024-451xx/CVE-2024-45193.json
Normal file
@ -0,0 +1,40 @@
|
||||
{
|
||||
"id": "CVE-2024-45193",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-22T16:15:10.300",
|
||||
"lastModified": "2024-08-22T16:15:10.300",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [
|
||||
{
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"tags": [
|
||||
"unsupported-when-assigned"
|
||||
]
|
||||
}
|
||||
],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in Matrix libolm (aka Olm) through 3.2.16. There is Ed25519 signature malleability due to lack of validation criteria (does not ensure that S < n). NOTE: This vulnerability only affects products that are no longer supported by the maintainer."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitlab.matrix.org/matrix-org/olm/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://gitlab.matrix.org/matrix-org/olm/-/commit/6d4b5b07887821a95b144091c8497d09d377f985",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://news.ycombinator.com/item?id=41249371",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://soatok.blog/2024/08/14/security-issues-in-matrixs-olm-library/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-5554",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-07-18T09:15:02.740",
|
||||
"lastModified": "2024-07-18T12:28:43.707",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-22T16:43:52.650",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,18 +39,58 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:bdthemes:element_pack:*:*:*:*:lite:wordpress:*:*",
|
||||
"versionEndExcluding": "5.6.12",
|
||||
"matchCriteriaId": "4C0AB91B-E824-4E11-9FEC-434E750A203A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/bdthemes-element-pack-lite/tags/5.6.4/modules/step-flow/widgets/step-flow.php#L2287",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3110404/",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/696c379a-c5a4-489f-8363-8aea9a4da814?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-5555",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-07-18T09:15:02.980",
|
||||
"lastModified": "2024-07-18T12:28:43.707",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-22T16:46:14.177",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,18 +39,58 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:bdthemes:element_pack:*:*:*:*:lite:wordpress:*:*",
|
||||
"versionEndExcluding": "5.6.6",
|
||||
"matchCriteriaId": "0BFB11EA-A2A2-4912-AD03-34BDADCEDC35"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/bdthemes-element-pack-lite/trunk/modules/member/widgets/member.php#L1273",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3096559/",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/cdb69e0e-f3d4-4b5b-9bdf-14018f4c7ecc?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-6164",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-07-18T06:15:02.233",
|
||||
"lastModified": "2024-08-01T14:00:13.243",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-22T16:35:18.693",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -39,10 +59,44 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ymc-22:filter_\\&_grids:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "2.8.33",
|
||||
"matchCriteriaId": "74F46F69-F76B-41DA-8365-5C4259662DBA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/40bd880e-67a1-4180-b197-8dcadaa0ace4/",
|
||||
"source": "contact@wpscan.com"
|
||||
"source": "contact@wpscan.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-65xx/CVE-2024-6502.json
Normal file
60
CVE-2024/CVE-2024-65xx/CVE-2024-6502.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-6502",
|
||||
"sourceIdentifier": "cve@gitlab.com",
|
||||
"published": "2024-08-22T16:15:10.377",
|
||||
"lastModified": "2024-08-22T16:15:10.377",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in GitLab CE/EE affecting all versions starting from 8.2 prior to 17.1.6 starting from 17.2 prior to 17.2.4, and starting from 17.3 prior to 17.3.1, which allows an attacker to create a branch with the same name as a deleted tag."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@gitlab.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve@gitlab.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-684"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/470647",
|
||||
"source": "cve@gitlab.com"
|
||||
},
|
||||
{
|
||||
"url": "https://hackerone.com/reports/2574561",
|
||||
"source": "cve@gitlab.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-71xx/CVE-2024-7110.json
Normal file
56
CVE-2024/CVE-2024-71xx/CVE-2024-7110.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-7110",
|
||||
"sourceIdentifier": "cve@gitlab.com",
|
||||
"published": "2024-08-22T16:15:10.627",
|
||||
"lastModified": "2024-08-22T16:15:10.627",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in GitLab EE affecting all versions starting 17.0 to 17.1.6, 17.2 prior to 17.2.4, and 17.3 prior to 17.3.1 allows an attacker to execute arbitrary command in a victim's pipeline through prompt injection."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@gitlab.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve@gitlab.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/472603",
|
||||
"source": "cve@gitlab.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-7964",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2024-08-21T21:15:08.850",
|
||||
"lastModified": "2024-08-22T12:48:02.790",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-22T17:44:47.560",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,8 +15,41 @@
|
||||
"value": "Use after free en Contrase\u00f1as en Google Chrome en Android anterior a 128.0.6613.84 permit\u00eda a un atacante remoto explotar potencialmente la corrupci\u00f3n del mont\u00f3n a trav\u00e9s de una p\u00e1gina HTML manipulada. (Severidad de seguridad de Chrome: alta)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"type": "Secondary",
|
||||
@ -28,14 +61,51 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "128.0.6613.84",
|
||||
"matchCriteriaId": "DAE0C7AB-1D61-4449-BC82-915B019F311F"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop_21.html",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://issues.chromium.org/issues/358296941",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-7966",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2024-08-21T21:15:09.000",
|
||||
"lastModified": "2024-08-22T12:48:02.790",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-22T17:44:11.147",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,15 +15,75 @@
|
||||
"value": "El acceso a memoria fuera de los l\u00edmites en Skia en Google Chrome anterior a 128.0.6613.84 permit\u00eda a un atacante remoto que hab\u00eda comprometido el proceso de renderizado realizar un acceso a la memoria fuera de los l\u00edmites a trav\u00e9s de una p\u00e1gina HTML manipulada. (Severidad de seguridad de Chrome: alta)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-119"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "128.0.6613.84",
|
||||
"matchCriteriaId": "DAE0C7AB-1D61-4449-BC82-915B019F311F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop_21.html",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://issues.chromium.org/issues/355465305",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-7968",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2024-08-21T21:15:09.133",
|
||||
"lastModified": "2024-08-22T12:48:02.790",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-22T17:41:56.847",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,8 +15,41 @@
|
||||
"value": "Use after free en Autocompletar en Google Chrome anterior a 128.0.6613.84 permit\u00eda a un atacante remoto que hab\u00eda convencido al usuario de participar en interacciones espec\u00edficas de la interfaz de usuario para explotar potencialmente la corrupci\u00f3n del mont\u00f3n a trav\u00e9s de una p\u00e1gina HTML manipulada. (Severidad de seguridad de Chrome: alta)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"type": "Secondary",
|
||||
@ -28,14 +61,39 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "128.0.6613.84",
|
||||
"matchCriteriaId": "DAE0C7AB-1D61-4449-BC82-915B019F311F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop_21.html",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://issues.chromium.org/issues/349253666",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-7969",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2024-08-21T21:15:09.203",
|
||||
"lastModified": "2024-08-22T12:48:02.790",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-22T17:42:47.627",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,8 +15,41 @@
|
||||
"value": "Type Confusion en V8 en Google Chrome anterior a 128.0.6613.84 permit\u00eda a un atacante remoto explotar potencialmente la corrupci\u00f3n del mont\u00f3n a trav\u00e9s de una p\u00e1gina HTML manipulada. (Severidad de seguridad de Chrome: alta)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-843"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"type": "Secondary",
|
||||
@ -28,14 +61,39 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "128.0.6613.84",
|
||||
"matchCriteriaId": "DAE0C7AB-1D61-4449-BC82-915B019F311F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop_21.html",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://issues.chromium.org/issues/351865302",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-7974",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2024-08-21T21:15:09.480",
|
||||
"lastModified": "2024-08-22T12:48:02.790",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-22T17:40:27.950",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,15 +15,75 @@
|
||||
"value": "La validaci\u00f3n de datos insuficiente en la API V8 en Google Chrome anterior a 128.0.6613.84 permiti\u00f3 a un atacante remoto explotar potencialmente la corrupci\u00f3n del mont\u00f3n a trav\u00e9s de una extensi\u00f3n de Chrome manipulada. (Severidad de seguridad de Chromium: media)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "128.0.6613.84",
|
||||
"matchCriteriaId": "DAE0C7AB-1D61-4449-BC82-915B019F311F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop_21.html",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://issues.chromium.org/issues/339141099",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-7975",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2024-08-21T21:15:09.533",
|
||||
"lastModified": "2024-08-22T12:48:02.790",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-22T17:40:09.223",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,15 +15,75 @@
|
||||
"value": "La implementaci\u00f3n inadecuada de Permisos en Google Chrome anterior a 128.0.6613.84 permiti\u00f3 a un atacante remoto realizar una suplantaci\u00f3n de interfaz de usuario a trav\u00e9s de una p\u00e1gina HTML manipulada. (Severidad de seguridad de Chromium: media)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "128.0.6613.84",
|
||||
"matchCriteriaId": "DAE0C7AB-1D61-4449-BC82-915B019F311F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop_21.html",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://issues.chromium.org/issues/347588491",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-7976",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2024-08-21T21:15:09.583",
|
||||
"lastModified": "2024-08-22T12:48:02.790",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-22T17:39:54.540",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,15 +15,75 @@
|
||||
"value": "La implementaci\u00f3n inapropiada en FedCM en Google Chrome anterior a 128.0.6613.84 permiti\u00f3 a un atacante remoto realizar una suplantaci\u00f3n de interfaz de usuario a trav\u00e9s de una p\u00e1gina HTML manipulada. (Severidad de seguridad de Chromium: media)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "128.0.6613.84",
|
||||
"matchCriteriaId": "DAE0C7AB-1D61-4449-BC82-915B019F311F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop_21.html",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://issues.chromium.org/issues/339654392",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-7977",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2024-08-21T21:15:09.630",
|
||||
"lastModified": "2024-08-22T12:48:02.790",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-22T17:39:32.730",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,15 +15,87 @@
|
||||
"value": "La validaci\u00f3n de datos insuficiente en el instalador de Google Chrome en Windows anterior a 128.0.6613.84 permiti\u00f3 a un atacante local realizar una escalada de privilegios a trav\u00e9s de un archivo malicioso. (Severidad de seguridad de Chromium: media)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "128.0.6613.84",
|
||||
"matchCriteriaId": "DAE0C7AB-1D61-4449-BC82-915B019F311F"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop_21.html",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://issues.chromium.org/issues/324770940",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-7978",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2024-08-21T21:15:09.697",
|
||||
"lastModified": "2024-08-22T12:48:02.790",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-22T17:38:11.200",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,15 +15,75 @@
|
||||
"value": "La aplicaci\u00f3n insuficiente de pol\u00edticas en Transferencia de datos en Google Chrome antes de 128.0.6613.84 permiti\u00f3 que un atacante remoto convenciera a un usuario de realizar gestos de interfaz de usuario espec\u00edficos para filtrar datos de or\u00edgenes cruzados a trav\u00e9s de una p\u00e1gina HTML manipulada. (Severidad de seguridad de Chromium: media)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "128.0.6613.84",
|
||||
"matchCriteriaId": "DAE0C7AB-1D61-4449-BC82-915B019F311F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop_21.html",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://issues.chromium.org/issues/40060358",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-7981",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2024-08-21T21:15:09.843",
|
||||
"lastModified": "2024-08-22T12:48:02.790",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-22T17:36:24.803",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,15 +15,75 @@
|
||||
"value": "La implementaci\u00f3n inapropiada en Vistas en Google Chrome anteriores a 128.0.6613.84 permiti\u00f3 a un atacante remoto realizar una suplantaci\u00f3n de interfaz de usuario a trav\u00e9s de una p\u00e1gina HTML manipulada. (Severidad de seguridad de Chrome: baja)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "128.0.6613.84",
|
||||
"matchCriteriaId": "DAE0C7AB-1D61-4449-BC82-915B019F311F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop_21.html",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://issues.chromium.org/issues/40067456",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-8033",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2024-08-21T21:15:09.897",
|
||||
"lastModified": "2024-08-22T12:48:02.790",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-22T17:36:07.673",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,15 +15,79 @@
|
||||
"value": "La implementaci\u00f3n inadecuada en las instalaciones de aplicaciones web en Google Chrome en Windows anteriores a 128.0.6613.84 permiti\u00f3 que un atacante convenciera a un usuario de instalar una aplicaci\u00f3n maliciosa para realizar una suplantaci\u00f3n de la interfaz de usuario a trav\u00e9s de una p\u00e1gina HTML manipulada. (Severidad de seguridad de Chrome: baja)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop_21.html",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://issues.chromium.org/issues/350256139",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-8034",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2024-08-21T21:15:09.957",
|
||||
"lastModified": "2024-08-22T12:48:02.790",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-22T17:35:30.003",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,15 +15,87 @@
|
||||
"value": "La implementaci\u00f3n inapropiada en pesta\u00f1as personalizadas en Google Chrome en Android anterior a 128.0.6613.84 permiti\u00f3 a un atacante remoto realizar una suplantaci\u00f3n de interfaz de usuario a trav\u00e9s de una p\u00e1gina HTML manipulada. (Severidad de seguridad de Chrome: baja)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "128.0.6613.84",
|
||||
"matchCriteriaId": "DAE0C7AB-1D61-4449-BC82-915B019F311F"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop_21.html",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://issues.chromium.org/issues/353858776",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-8035",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2024-08-21T21:15:10.010",
|
||||
"lastModified": "2024-08-22T12:48:02.790",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-22T17:33:37.407",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,15 +15,86 @@
|
||||
"value": "La implementaci\u00f3n inapropiada en Extensiones en Google Chrome en Windows anterior a 128.0.6613.84 permiti\u00f3 a un atacante remoto realizar una suplantaci\u00f3n de interfaz de usuario a trav\u00e9s de una p\u00e1gina HTML manipulada. (Severidad de seguridad de Chrome: baja)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "128.0.6613.84",
|
||||
"matchCriteriaId": "DAE0C7AB-1D61-4449-BC82-915B019F311F"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop_21.html",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://issues.chromium.org/issues/40059470",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-80xx/CVE-2024-8041.json
Normal file
60
CVE-2024/CVE-2024-80xx/CVE-2024-8041.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-8041",
|
||||
"sourceIdentifier": "cve@gitlab.com",
|
||||
"published": "2024-08-22T16:15:10.880",
|
||||
"lastModified": "2024-08-22T16:15:10.880",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A Denial of Service (DoS) issue has been discovered in GitLab CE/EE affecting all versions prior to 17.1.6, 17.2 prior to 17.2.4, and 17.3 prior to 17.3.1. A denial of service could occur upon importing a maliciously crafted repository using the GitHub importer."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@gitlab.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve@gitlab.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-400"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/463092",
|
||||
"source": "cve@gitlab.com"
|
||||
},
|
||||
{
|
||||
"url": "https://hackerone.com/reports/2499070",
|
||||
"source": "cve@gitlab.com"
|
||||
}
|
||||
]
|
||||
}
|
90
README.md
90
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-08-22T16:00:17.779913+00:00
|
||||
2024-08-22T18:00:17.400296+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-08-22T15:59:11.740000+00:00
|
||||
2024-08-22T17:57:08.640000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,53 +33,65 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
260943
|
||||
260964
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `9`
|
||||
Recently added CVEs: `21`
|
||||
|
||||
- [CVE-2024-36439](CVE-2024/CVE-2024-364xx/CVE-2024-36439.json) (`2024-08-22T15:15:15.883`)
|
||||
- [CVE-2024-36440](CVE-2024/CVE-2024-364xx/CVE-2024-36440.json) (`2024-08-22T15:15:15.977`)
|
||||
- [CVE-2024-36442](CVE-2024/CVE-2024-364xx/CVE-2024-36442.json) (`2024-08-22T15:15:16.047`)
|
||||
- [CVE-2024-36443](CVE-2024/CVE-2024-364xx/CVE-2024-36443.json) (`2024-08-22T14:15:08.443`)
|
||||
- [CVE-2024-36444](CVE-2024/CVE-2024-364xx/CVE-2024-36444.json) (`2024-08-22T15:15:16.117`)
|
||||
- [CVE-2024-36445](CVE-2024/CVE-2024-364xx/CVE-2024-36445.json) (`2024-08-22T15:15:16.187`)
|
||||
- [CVE-2024-43398](CVE-2024/CVE-2024-433xx/CVE-2024-43398.json) (`2024-08-22T15:15:16.440`)
|
||||
- [CVE-2024-43785](CVE-2024/CVE-2024-437xx/CVE-2024-43785.json) (`2024-08-22T15:15:16.670`)
|
||||
- [CVE-2024-43787](CVE-2024/CVE-2024-437xx/CVE-2024-43787.json) (`2024-08-22T15:15:16.857`)
|
||||
- [CVE-2023-6452](CVE-2023/CVE-2023-64xx/CVE-2023-6452.json) (`2024-08-22T16:15:07.997`)
|
||||
- [CVE-2024-3127](CVE-2024/CVE-2024-31xx/CVE-2024-3127.json) (`2024-08-22T16:15:08.590`)
|
||||
- [CVE-2024-36441](CVE-2024/CVE-2024-364xx/CVE-2024-36441.json) (`2024-08-22T16:15:08.433`)
|
||||
- [CVE-2024-40884](CVE-2024/CVE-2024-408xx/CVE-2024-40884.json) (`2024-08-22T16:15:08.797`)
|
||||
- [CVE-2024-42490](CVE-2024/CVE-2024-424xx/CVE-2024-42490.json) (`2024-08-22T16:15:09.117`)
|
||||
- [CVE-2024-42497](CVE-2024/CVE-2024-424xx/CVE-2024-42497.json) (`2024-08-22T16:15:09.330`)
|
||||
- [CVE-2024-42768](CVE-2024/CVE-2024-427xx/CVE-2024-42768.json) (`2024-08-22T17:15:05.693`)
|
||||
- [CVE-2024-42769](CVE-2024/CVE-2024-427xx/CVE-2024-42769.json) (`2024-08-22T16:15:09.553`)
|
||||
- [CVE-2024-42770](CVE-2024/CVE-2024-427xx/CVE-2024-42770.json) (`2024-08-22T16:15:09.640`)
|
||||
- [CVE-2024-42771](CVE-2024/CVE-2024-427xx/CVE-2024-42771.json) (`2024-08-22T16:15:09.730`)
|
||||
- [CVE-2024-42772](CVE-2024/CVE-2024-427xx/CVE-2024-42772.json) (`2024-08-22T17:15:06.070`)
|
||||
- [CVE-2024-42774](CVE-2024/CVE-2024-427xx/CVE-2024-42774.json) (`2024-08-22T17:15:06.350`)
|
||||
- [CVE-2024-42775](CVE-2024/CVE-2024-427xx/CVE-2024-42775.json) (`2024-08-22T17:15:06.580`)
|
||||
- [CVE-2024-42776](CVE-2024/CVE-2024-427xx/CVE-2024-42776.json) (`2024-08-22T17:15:06.807`)
|
||||
- [CVE-2024-43780](CVE-2024/CVE-2024-437xx/CVE-2024-43780.json) (`2024-08-22T16:15:09.897`)
|
||||
- [CVE-2024-45191](CVE-2024/CVE-2024-451xx/CVE-2024-45191.json) (`2024-08-22T16:15:10.120`)
|
||||
- [CVE-2024-45192](CVE-2024/CVE-2024-451xx/CVE-2024-45192.json) (`2024-08-22T16:15:10.237`)
|
||||
- [CVE-2024-45193](CVE-2024/CVE-2024-451xx/CVE-2024-45193.json) (`2024-08-22T16:15:10.300`)
|
||||
- [CVE-2024-6502](CVE-2024/CVE-2024-65xx/CVE-2024-6502.json) (`2024-08-22T16:15:10.377`)
|
||||
- [CVE-2024-7110](CVE-2024/CVE-2024-71xx/CVE-2024-7110.json) (`2024-08-22T16:15:10.627`)
|
||||
- [CVE-2024-8041](CVE-2024/CVE-2024-80xx/CVE-2024-8041.json) (`2024-08-22T16:15:10.880`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `68`
|
||||
Recently modified CVEs: `45`
|
||||
|
||||
- [CVE-2024-42784](CVE-2024/CVE-2024-427xx/CVE-2024-42784.json) (`2024-08-22T14:35:12.170`)
|
||||
- [CVE-2024-42785](CVE-2024/CVE-2024-427xx/CVE-2024-42785.json) (`2024-08-22T15:35:11.450`)
|
||||
- [CVE-2024-43828](CVE-2024/CVE-2024-438xx/CVE-2024-43828.json) (`2024-08-22T15:41:50.870`)
|
||||
- [CVE-2024-43833](CVE-2024/CVE-2024-438xx/CVE-2024-43833.json) (`2024-08-22T15:42:46.827`)
|
||||
- [CVE-2024-43836](CVE-2024/CVE-2024-438xx/CVE-2024-43836.json) (`2024-08-22T15:43:26.303`)
|
||||
- [CVE-2024-43837](CVE-2024/CVE-2024-438xx/CVE-2024-43837.json) (`2024-08-22T15:44:03.417`)
|
||||
- [CVE-2024-45163](CVE-2024/CVE-2024-451xx/CVE-2024-45163.json) (`2024-08-22T15:35:12.750`)
|
||||
- [CVE-2024-45166](CVE-2024/CVE-2024-451xx/CVE-2024-45166.json) (`2024-08-22T14:35:13.183`)
|
||||
- [CVE-2024-45168](CVE-2024/CVE-2024-451xx/CVE-2024-45168.json) (`2024-08-22T14:35:13.957`)
|
||||
- [CVE-2024-45169](CVE-2024/CVE-2024-451xx/CVE-2024-45169.json) (`2024-08-22T15:35:13.507`)
|
||||
- [CVE-2024-4944](CVE-2024/CVE-2024-49xx/CVE-2024-4944.json) (`2024-08-22T15:06:05.480`)
|
||||
- [CVE-2024-5974](CVE-2024/CVE-2024-59xx/CVE-2024-5974.json) (`2024-08-22T14:26:55.657`)
|
||||
- [CVE-2024-6563](CVE-2024/CVE-2024-65xx/CVE-2024-6563.json) (`2024-08-22T15:51:55.843`)
|
||||
- [CVE-2024-6564](CVE-2024/CVE-2024-65xx/CVE-2024-6564.json) (`2024-08-22T15:52:05.033`)
|
||||
- [CVE-2024-6800](CVE-2024/CVE-2024-68xx/CVE-2024-6800.json) (`2024-08-22T15:15:17.127`)
|
||||
- [CVE-2024-7731](CVE-2024/CVE-2024-77xx/CVE-2024-7731.json) (`2024-08-22T14:40:00.913`)
|
||||
- [CVE-2024-7746](CVE-2024/CVE-2024-77xx/CVE-2024-7746.json) (`2024-08-22T14:40:44.167`)
|
||||
- [CVE-2024-7965](CVE-2024/CVE-2024-79xx/CVE-2024-7965.json) (`2024-08-22T14:35:15.280`)
|
||||
- [CVE-2024-7967](CVE-2024/CVE-2024-79xx/CVE-2024-7967.json) (`2024-08-22T14:35:16.310`)
|
||||
- [CVE-2024-7971](CVE-2024/CVE-2024-79xx/CVE-2024-7971.json) (`2024-08-22T14:35:17.313`)
|
||||
- [CVE-2024-7972](CVE-2024/CVE-2024-79xx/CVE-2024-7972.json) (`2024-08-22T15:35:14.597`)
|
||||
- [CVE-2024-7973](CVE-2024/CVE-2024-79xx/CVE-2024-7973.json) (`2024-08-22T15:35:15.597`)
|
||||
- [CVE-2024-7979](CVE-2024/CVE-2024-79xx/CVE-2024-7979.json) (`2024-08-22T15:35:16.610`)
|
||||
- [CVE-2024-7980](CVE-2024/CVE-2024-79xx/CVE-2024-7980.json) (`2024-08-22T15:35:17.610`)
|
||||
- [CVE-2024-8072](CVE-2024/CVE-2024-80xx/CVE-2024-8072.json) (`2024-08-22T14:35:18.797`)
|
||||
- [CVE-2024-42778](CVE-2024/CVE-2024-427xx/CVE-2024-42778.json) (`2024-08-22T17:46:56.953`)
|
||||
- [CVE-2024-42783](CVE-2024/CVE-2024-427xx/CVE-2024-42783.json) (`2024-08-22T17:35:07.750`)
|
||||
- [CVE-2024-43033](CVE-2024/CVE-2024-430xx/CVE-2024-43033.json) (`2024-08-22T16:35:08.663`)
|
||||
- [CVE-2024-43855](CVE-2024/CVE-2024-438xx/CVE-2024-43855.json) (`2024-08-22T17:48:09.100`)
|
||||
- [CVE-2024-43856](CVE-2024/CVE-2024-438xx/CVE-2024-43856.json) (`2024-08-22T17:57:08.640`)
|
||||
- [CVE-2024-43857](CVE-2024/CVE-2024-438xx/CVE-2024-43857.json) (`2024-08-22T17:38:21.003`)
|
||||
- [CVE-2024-43858](CVE-2024/CVE-2024-438xx/CVE-2024-43858.json) (`2024-08-22T17:40:11.663`)
|
||||
- [CVE-2024-43859](CVE-2024/CVE-2024-438xx/CVE-2024-43859.json) (`2024-08-22T17:28:28.490`)
|
||||
- [CVE-2024-43860](CVE-2024/CVE-2024-438xx/CVE-2024-43860.json) (`2024-08-22T17:08:15.097`)
|
||||
- [CVE-2024-5554](CVE-2024/CVE-2024-55xx/CVE-2024-5554.json) (`2024-08-22T16:43:52.650`)
|
||||
- [CVE-2024-5555](CVE-2024/CVE-2024-55xx/CVE-2024-5555.json) (`2024-08-22T16:46:14.177`)
|
||||
- [CVE-2024-6164](CVE-2024/CVE-2024-61xx/CVE-2024-6164.json) (`2024-08-22T16:35:18.693`)
|
||||
- [CVE-2024-7964](CVE-2024/CVE-2024-79xx/CVE-2024-7964.json) (`2024-08-22T17:44:47.560`)
|
||||
- [CVE-2024-7966](CVE-2024/CVE-2024-79xx/CVE-2024-7966.json) (`2024-08-22T17:44:11.147`)
|
||||
- [CVE-2024-7968](CVE-2024/CVE-2024-79xx/CVE-2024-7968.json) (`2024-08-22T17:41:56.847`)
|
||||
- [CVE-2024-7969](CVE-2024/CVE-2024-79xx/CVE-2024-7969.json) (`2024-08-22T17:42:47.627`)
|
||||
- [CVE-2024-7974](CVE-2024/CVE-2024-79xx/CVE-2024-7974.json) (`2024-08-22T17:40:27.950`)
|
||||
- [CVE-2024-7975](CVE-2024/CVE-2024-79xx/CVE-2024-7975.json) (`2024-08-22T17:40:09.223`)
|
||||
- [CVE-2024-7976](CVE-2024/CVE-2024-79xx/CVE-2024-7976.json) (`2024-08-22T17:39:54.540`)
|
||||
- [CVE-2024-7977](CVE-2024/CVE-2024-79xx/CVE-2024-7977.json) (`2024-08-22T17:39:32.730`)
|
||||
- [CVE-2024-7978](CVE-2024/CVE-2024-79xx/CVE-2024-7978.json) (`2024-08-22T17:38:11.200`)
|
||||
- [CVE-2024-7981](CVE-2024/CVE-2024-79xx/CVE-2024-7981.json) (`2024-08-22T17:36:24.803`)
|
||||
- [CVE-2024-8033](CVE-2024/CVE-2024-80xx/CVE-2024-8033.json) (`2024-08-22T17:36:07.673`)
|
||||
- [CVE-2024-8034](CVE-2024/CVE-2024-80xx/CVE-2024-8034.json) (`2024-08-22T17:35:30.003`)
|
||||
- [CVE-2024-8035](CVE-2024/CVE-2024-80xx/CVE-2024-8035.json) (`2024-08-22T17:33:37.407`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
265
_state.csv
265
_state.csv
@ -6826,7 +6826,7 @@ CVE-2003-0059,0,0,9b467128aa7d52b1c0228e54a512232ea06b5094b0ca4328a1b19c18c086bb
|
||||
CVE-2003-0060,0,0,2b161e5e23ecaff15a71eedebc54308999fda54f3b03eb3f15e239e527ef079a,2020-01-21T15:44:53.820000
|
||||
CVE-2003-0061,0,0,fb48c810402a59f1e816cce84765259427dd905ebafca590217d2c1d1a0a8ba6,2008-09-05T20:33:21.787000
|
||||
CVE-2003-0062,0,0,220e4ca7fe7a82c24abb8933393b0872bef9fb76c3a861b86d6b6b6d3b45fd2c,2016-10-18T02:28:57.360000
|
||||
CVE-2003-0063,0,1,08e8c1fb6e1a3ba6d45ede25c5a8a7fe5c4cbb47435d606b1c1c0fd9e8f62207,2024-08-22T15:35:00.600000
|
||||
CVE-2003-0063,0,0,08e8c1fb6e1a3ba6d45ede25c5a8a7fe5c4cbb47435d606b1c1c0fd9e8f62207,2024-08-22T15:35:00.600000
|
||||
CVE-2003-0064,0,0,0f3d2197cadb1ae2a90294bd1e0ce23bd609779c42335a9bf1f6318b5e844d84,2018-10-30T16:26:22.763000
|
||||
CVE-2003-0065,0,0,32c52cb2ff50eee0bd89462e579d28cc1a8537aa17f9ad12358b4b4edb43ab1e,2016-10-18T02:29:01.440000
|
||||
CVE-2003-0066,0,0,77fac5544f85a414f7d717e1977ab442b656c9b7041d46aa7231df36ff38a87e,2016-10-18T02:29:02.690000
|
||||
@ -73024,7 +73024,7 @@ CVE-2014-9510,0,0,19193e66fd5db68f4c1e456f32a619257e3e6ab946f404bae7f293cab5d117
|
||||
CVE-2014-9512,0,0,2ab5a92bff5ea988b46f3c00235ff6b672ecc142bd47d1d0aa5028bc6e300774,2020-07-28T20:15:12.060000
|
||||
CVE-2014-9513,0,0,e745d9fde65a85ae96dae0b70254a67ff78cb9eebe7681bd336ec22167e84fd3,2017-09-08T02:22:47.890000
|
||||
CVE-2014-9514,0,0,23d982d511dc4dd5b0ee4d20d13ec854282abd7ffd4e0f326a23013c9c55db06,2017-08-31T13:46:55.820000
|
||||
CVE-2014-9515,0,1,152a4fc755c424efe371779645f9d6aeb10209c0f007f159e1b12840db4466e9,2024-08-22T15:35:01.630000
|
||||
CVE-2014-9515,0,0,152a4fc755c424efe371779645f9d6aeb10209c0f007f159e1b12840db4466e9,2024-08-22T15:35:01.630000
|
||||
CVE-2014-9516,0,0,6e198e840f166756d5e58760115938c2a398eec9cfd4aedac45b0f03710a6db7,2015-01-06T16:48:32.723000
|
||||
CVE-2014-9517,0,0,279a156651ad5993cc16d034460157adb07f2c6a29e6d67e65e7aceb275abac6,2023-11-17T20:01:31.690000
|
||||
CVE-2014-9518,0,0,5942cce75c2632a7a5abda187d30833574a9d1d9769e051797a5faa5f3a6d96b,2015-01-06T17:37:17.063000
|
||||
@ -175250,7 +175250,7 @@ CVE-2021-31192,0,0,fd789248bf776790286911c1cb62d193d3758ca81ef93da2b769e43d45b36
|
||||
CVE-2021-31193,0,0,077bb091684d98f26b6775e11540d1486855c8b0d31cece055f7164c231d488f,2023-08-02T00:15:14.130000
|
||||
CVE-2021-31194,0,0,a881a4ba34181125ee9ae9d9c1b01593524b854565df4e5996e91bfacc287967,2023-08-02T00:15:14.223000
|
||||
CVE-2021-31195,0,0,70601223ee123bbcfc6c70e498c7011bda164e6f4ddb34afe419d104ffa66b25,2023-08-02T00:15:14.323000
|
||||
CVE-2021-31196,0,1,c90e7e86ad84b3fe62b6068d7900bac0e921351a4581cbb17e4034b5eadf7d04,2024-08-22T14:13:46.367000
|
||||
CVE-2021-31196,0,0,c90e7e86ad84b3fe62b6068d7900bac0e921351a4581cbb17e4034b5eadf7d04,2024-08-22T14:13:46.367000
|
||||
CVE-2021-31198,0,0,c30b3a1c57145c6bd60798b28f43bf1b762d20c9da745906c3aa84d02e50db9f,2023-08-02T00:15:14.423000
|
||||
CVE-2021-31199,0,0,6a10871a43e5aa3edee13eb1b7ba5d0cfbf7151ab2ede6f7ce968c12cd3946fc,2024-07-29T18:06:29.307000
|
||||
CVE-2021-3120,0,0,08daa0568cd7cfafde23061c9f7b245e79e5316ac276c10375c44ea0d54bbceb,2023-02-01T02:23:04.767000
|
||||
@ -195988,7 +195988,7 @@ CVE-2022-27482,0,0,36b6f1b97ebba78c42fbca698ce9c45dd58b63814d39b8408a6e4f47c85c7
|
||||
CVE-2022-27483,0,0,547cae1c29ba4c8e34ce2ca3485c07e3564bbb8ad0bc933f56fe2bc4cfd995a2,2022-07-27T07:18:54.910000
|
||||
CVE-2022-27484,0,0,b70ab124e3868d4300a35fe9373862610a18fbb62290ce37b9943e259b6259b4,2023-08-08T14:21:49.707000
|
||||
CVE-2022-27485,0,0,89c71954a05af3cb3fa20c6d9b6c24ac726da380f9e9c148dcc8373b207c974a,2023-11-07T03:45:20.327000
|
||||
CVE-2022-27486,0,1,d9634ef51201dc92021cc40d6c68b96adffc3632fb81f86d8cb3b72dbf25443a,2024-08-22T14:29:44.627000
|
||||
CVE-2022-27486,0,0,d9634ef51201dc92021cc40d6c68b96adffc3632fb81f86d8cb3b72dbf25443a,2024-08-22T14:29:44.627000
|
||||
CVE-2022-27487,0,0,40352dcb6eab8d9a69c504241370e01f28a37002d1641a037d7821aac682f726,2023-11-07T03:45:20.453000
|
||||
CVE-2022-27488,0,0,6e31ddd90d81cb2ce85c8657468174115b85ad3aef674059057db057dfb8f7e7,2024-01-18T15:48:06.043000
|
||||
CVE-2022-27489,0,0,81b540b09f87c477cd65ccdf38f3c4e50b2037d1b2ce7272f3b17e5d12163420,2023-11-07T03:45:20.570000
|
||||
@ -196038,7 +196038,7 @@ CVE-2022-27537,0,0,4f323c390ae67bf4d4a49e2bfbd872c09defecbb2392cd2942a41e6707998
|
||||
CVE-2022-27538,0,0,9d3139694e40c37c446ec1b8a15ba025f469f19e9dade9e273a97b6d4bdaa89a,2023-02-16T21:59:04.027000
|
||||
CVE-2022-27539,0,0,fc9e4c3c8111f15c12cce968358404e33bcb8d28f4b40ea515ad7c623c1ce1b4,2023-06-28T20:09:40.707000
|
||||
CVE-2022-2754,0,0,a0d5346a2857741d9627a2bd4d0e70d2226ccc2da26068426ace52410fbe6f90,2022-09-21T06:28:06.090000
|
||||
CVE-2022-27540,0,1,4e084977308d1f9bcabf9d7df04d1976d0bace484b39561703f7e6e0558a479c,2024-08-22T15:35:02.633000
|
||||
CVE-2022-27540,0,0,4e084977308d1f9bcabf9d7df04d1976d0bace484b39561703f7e6e0558a479c,2024-08-22T15:35:02.633000
|
||||
CVE-2022-27541,0,0,e68146274941a4057a248c3e754148a97011afa1498ab0865f0f238b16aa3f0d,2023-06-28T20:09:53.083000
|
||||
CVE-2022-27544,0,0,1742c2d20287265afbbbc0e653c2ad62768620600f695fc6956c35b3d20f219a,2022-07-27T22:40:03.920000
|
||||
CVE-2022-27545,0,0,4b0da5810298d30534b12b64765c5d5fe3946cfa485df7f3f365142546bec22f,2022-07-27T22:36:45.790000
|
||||
@ -198276,7 +198276,7 @@ CVE-2022-30284,0,0,3f682ca57ebd600d22ba889ad73f2f828b756b846c709580dd1eb4fc8ff92
|
||||
CVE-2022-30285,0,0,b074e639bdd1cfbb52847b7e52d2b4be281d99afaf667c29503ba6a3ad501b78,2023-08-08T14:22:24.967000
|
||||
CVE-2022-30286,0,0,2303d5314d85878656f33a9936c3e0fb956f5ed156c51c5b48466ed0f6800766,2022-05-16T18:47:04.993000
|
||||
CVE-2022-30287,0,0,b5f11e39986f9100b6b8734e101ef752eb839b0487a3bb33aaf4a311f1a73f6f,2023-08-08T14:22:24.967000
|
||||
CVE-2022-30288,0,1,48ea3ecf9aaac83590785bb6ce37caa8952e2c2e688dea389d99a3208bdefd89,2024-08-22T15:35:03.537000
|
||||
CVE-2022-30288,0,0,48ea3ecf9aaac83590785bb6ce37caa8952e2c2e688dea389d99a3208bdefd89,2024-08-22T15:35:03.537000
|
||||
CVE-2022-30289,0,0,7d69849dbf9b399d69de8d247e85d4aafbb60d0b9c5d1c4cee4af233a0b20cdf,2022-07-11T13:36:15.213000
|
||||
CVE-2022-3029,0,0,75565c82e64f54277abff1006121e0fbc6d3431900f0f15c48c79db2248b3a97,2023-11-07T03:50:43.043000
|
||||
CVE-2022-30290,0,0,5feec6389aa4a5512393fc0b6c74470cca733f66a5d7ba7d901e67757d98c69e,2023-08-08T14:22:24.967000
|
||||
@ -210268,7 +210268,7 @@ CVE-2022-45859,0,0,e348c03f2d659f2f5386e4f909b6e1cb2796eaee095e3e655cb0987893244
|
||||
CVE-2022-4586,0,0,0aa055d519b6e153850ccca55806ee707b733003747c3a50acc7fbfa7cffac55,2023-11-07T03:58:14.667000
|
||||
CVE-2022-45860,0,0,19ff9249ce30a9b49b0ef71436486c56cd636a8a1ff2b9bc5fc6dacb75c5ac16,2023-11-07T03:54:54.520000
|
||||
CVE-2022-45861,0,0,ce9a5217138c4f0b88d9c1f1c18264fd40036371397c206a84c6003fd1ed0947,2023-11-07T03:54:54.773000
|
||||
CVE-2022-45862,0,1,3b22c1b4147b0d5e3363ef563a6a04aa1f2320431b3f3284c2ba49a20118fc59,2024-08-22T14:32:16.823000
|
||||
CVE-2022-45862,0,0,3b22c1b4147b0d5e3363ef563a6a04aa1f2320431b3f3284c2ba49a20118fc59,2024-08-22T14:32:16.823000
|
||||
CVE-2022-45866,0,0,d74e30c203376ee64b52bc0674dadc3d7e6655262995eb7d10ab3de283c1a2c3,2023-11-07T03:54:55.003000
|
||||
CVE-2022-45867,0,0,9683286023a0db7745466ef67dbea5f2d24359816c975944697b49893f1ea929,2023-01-10T03:23:59.953000
|
||||
CVE-2022-45868,0,0,c81f731922d209a11898651a91a4d106607ad1989f6cc83a36eca554d71b85d5,2024-08-03T15:15:31.327000
|
||||
@ -217882,7 +217882,7 @@ CVE-2023-24062,0,0,7349391aa1b91dc2f7dd35a217ddf473498cadeb29f5897b6dc518a785304
|
||||
CVE-2023-24063,0,0,c7aaa53e06b05b465c4c303b4d1d80d1b86df5b05165165b121a99c122768787,2024-08-19T19:04:47.293000
|
||||
CVE-2023-24064,0,0,ea608bd85f328e25ad346566e820e40989eae34a1962a7913afeb3fd2bab99c5,2024-08-19T19:04:26.627000
|
||||
CVE-2023-24065,0,0,c4f145c06edbdba1ae8818e2c25911e6f07b1fec3941d787d994c67eb91e4a9b,2023-02-07T17:29:25.500000
|
||||
CVE-2023-24068,0,1,efa89cea43eacdbe090acdc4021643fdac80fc9f7fb2eacafd76af63322c0b8f,2024-08-22T15:35:03.853000
|
||||
CVE-2023-24068,0,0,efa89cea43eacdbe090acdc4021643fdac80fc9f7fb2eacafd76af63322c0b8f,2024-08-22T15:35:03.853000
|
||||
CVE-2023-24069,0,0,31c87c9ec1a1f4e0e7ca7308f0b22f9d6b11a20fcdca63dde72ea3afa1217817,2024-08-02T11:16:10.287000
|
||||
CVE-2023-2407,0,0,4e7522c024a3236b8f81276c0b7a8a72f2eafc2c8b2dbc8b1918850286948fce,2023-11-07T04:12:37.020000
|
||||
CVE-2023-24070,0,0,a03e8a943e32b6cd457e58b59335ffecc5d8fc731aaf6b71cf658947deaef048,2024-01-09T02:55:33.710000
|
||||
@ -219600,7 +219600,7 @@ CVE-2023-26208,0,0,6d0f4dc6d724abcb907704fe533b579a8e93c30a273129ba89479b697be9d
|
||||
CVE-2023-26209,0,0,7d59b19062f3260362329b8fb9d5c15b2ae02a8836d5bca5cb172fc8c782b133,2023-11-07T04:09:30.447000
|
||||
CVE-2023-2621,0,0,7f94a2689b6229804f06a0491733acc8b775ae9f925cf1e972b069fef12e261e,2023-11-08T20:24:04.207000
|
||||
CVE-2023-26210,0,0,99c2d6b2b1b10e12d31bdc0b224bc3d023d9d7cc443b37d4e2e13fe1d6018bbf,2023-11-07T04:09:30.613000
|
||||
CVE-2023-26211,0,1,5a263dd7d2e3150aad12bb103fa2fbf5877e875e68ee83bc46d00b52837b4027,2024-08-22T14:33:54.453000
|
||||
CVE-2023-26211,0,0,5a263dd7d2e3150aad12bb103fa2fbf5877e875e68ee83bc46d00b52837b4027,2024-08-22T14:33:54.453000
|
||||
CVE-2023-26213,0,0,9fca21a4f0ef9105b70445769c776c24e65be74243dac24bc6ee96342368114c,2023-03-10T14:53:13.973000
|
||||
CVE-2023-26214,0,0,9e7b174c5aaea2917c7d88fd07688e669455d4f2f30624879fd03413171a17b0,2023-03-02T18:26:30.863000
|
||||
CVE-2023-26215,0,0,79741706e0402cd903a56cce97eb88259c18de371ac6ef6ea150277ca6ac8145,2023-06-01T20:34:27.187000
|
||||
@ -230197,7 +230197,7 @@ CVE-2023-40106,0,0,6d9f8c84c211a0ff1a7429561ccdcbd5b138bf68f865cdf0fd7423613ec05
|
||||
CVE-2023-40107,0,0,9b5d8c411184c5b318513e2f9308b05cbf529a3dea80774c590446ec7489cece,2024-08-21T21:35:01.720000
|
||||
CVE-2023-40109,0,0,418785915c5c782eaecea452fe3e0bcad27a28cd6d2cb7fa6c5725ebb93ef7e2,2024-08-16T16:35:00.740000
|
||||
CVE-2023-4011,0,0,f4c9a2bb464c5a1de2dfebfd2730b2028967d3b4a059651b6b18a027ee3ccdd5,2023-08-04T19:45:30.020000
|
||||
CVE-2023-40110,0,1,cec4af71facc1cc987deceb5b2ce57911065506adb95057b276212cf5b36338b,2024-08-22T14:35:01.077000
|
||||
CVE-2023-40110,0,0,cec4af71facc1cc987deceb5b2ce57911065506adb95057b276212cf5b36338b,2024-08-22T14:35:01.077000
|
||||
CVE-2023-40111,0,0,f1ce81f644f8445e9edc563f366dea3f110d604fec94f86b52e2f9e00728d430,2024-02-16T13:37:55.033000
|
||||
CVE-2023-40112,0,0,4ddec6ab2662940b93a3dc42430a4fadcac48159b9ef1e91d81653103c488b43,2024-02-16T13:37:55.033000
|
||||
CVE-2023-40113,0,0,dad3819774db3e875db7c132fed9de97c7d6741efc9f62a28c01187a90cb75bc,2024-02-16T13:37:55.033000
|
||||
@ -231000,7 +231000,7 @@ CVE-2023-41095,0,0,deee64e9e520cbd28974f4c3c1b7d02b2c55b60ea677ddead3af0482dd0a7
|
||||
CVE-2023-41096,0,0,52af64b05366a4d43b15642ba40df6e1ae8efc25c5fe20f7a4ec7b8ffa1abd9b,2023-11-08T01:48:37.717000
|
||||
CVE-2023-41097,0,0,225555e7a96923a582ba79f8ccb5c9ee9b827759fb76ff6066b045a3ae73653f,2024-01-03T17:22:03.797000
|
||||
CVE-2023-41098,0,0,1877421a99644398c5448d161e47d1b4f3f34d4c0be4875e9313e545e2d53226,2023-08-28T21:21:37.023000
|
||||
CVE-2023-41099,0,0,c16372b8c3fe30f749760773b7ca0f02e10cd6d76274cbfe8a3efb4e6c4bcc89,2024-03-22T15:34:43.663000
|
||||
CVE-2023-41099,0,1,c541702f1a2a5937b975af12a4eb88323b5abfddc3ba442a1352acbd4bacb37f,2024-08-22T17:35:00.720000
|
||||
CVE-2023-4110,0,0,6f05564b88d67a4e37f9507e8115c927563bedfea67f2dfdbc398b9ca9e94615,2024-05-17T02:31:19.523000
|
||||
CVE-2023-41100,0,0,30bd0525f09b3bfd34e6442c925dd2b383c4cc7432aca6eb1c6a3f586f5f0285,2023-08-28T21:27:36.420000
|
||||
CVE-2023-41101,0,0,9d279aed31c2d0df402abd3646c8e0c3d11b0759d2e721ed53b35ef8b2562b81,2024-06-20T18:15:11.237000
|
||||
@ -232393,7 +232393,7 @@ CVE-2023-42940,0,0,d1747dccf9be170d7d2459f45012020f08d4eb5ce17698d439f59de70dd43
|
||||
CVE-2023-42941,0,0,07ef4c50d699b2c4d697e69c7eba84c968b3abecdc0454485729209830f2d05b,2024-01-16T23:54:14.273000
|
||||
CVE-2023-42942,0,0,47b3808be894c1e814ff21abb00505dba924600cc2ad1b2661621841b4e6dcc5,2024-02-22T19:07:27.197000
|
||||
CVE-2023-42943,0,0,8790183efd35acc800e913b3464e91f8a65e51f27e9353b2a98f8ccb4e333257,2024-08-12T15:44:12.630000
|
||||
CVE-2023-42945,0,1,ded1b5c2e0337280b23c4c9aa988849a090fc35ab214c2519d212d959fafba41,2024-08-22T14:35:01.547000
|
||||
CVE-2023-42945,0,0,ded1b5c2e0337280b23c4c9aa988849a090fc35ab214c2519d212d959fafba41,2024-08-22T14:35:01.547000
|
||||
CVE-2023-42946,0,0,cc0d621d8703ec59422ebc54c6cd13379fdeace179303d8f3bcd98bed0924a19,2024-02-22T19:07:27.197000
|
||||
CVE-2023-42947,0,0,463a7c288ca72ceb5a42872b2d94a5ff7e5b5024cc13eee6b8c843ca1541a18d,2024-04-08T22:47:21.010000
|
||||
CVE-2023-42948,0,0,e60e6a270a4159f47177637c1f0213b5b06987cbaccbf7c2b067805f6ba007e7,2024-08-12T15:43:25.587000
|
||||
@ -233018,7 +233018,7 @@ CVE-2023-43959,0,0,3e0508b282ce13b7ab31b65b36da1089fb9bc1c29185cb09f3c4226ee594b
|
||||
CVE-2023-43960,0,0,9436258b0be27800fafff316b46719607100f02382a5925bda03f182056bac68,2023-11-07T04:21:32.280000
|
||||
CVE-2023-43961,0,0,d022a1326b47938450ca513431def271a90d142825dd394edf75f3be724de0cc,2023-11-01T16:16:14.943000
|
||||
CVE-2023-4397,0,0,806c05c57b1f10660e4c63dcf9d9a34cfadf8928a75c42c7a5c8fcfbece74dfc,2023-12-04T18:05:04.100000
|
||||
CVE-2023-43971,0,0,fda77036a5308003e0fb24dd9b2100d6849512da904eaaca694a94bea0b31f4a,2024-07-18T12:28:43.707000
|
||||
CVE-2023-43971,0,1,c2064ebdbad348b085d6e18a3454b611e7eca0a799a8c6b1b26378d9c5f74d47,2024-08-22T16:20:20.413000
|
||||
CVE-2023-43976,0,0,02187eddeb3770a7f1febec00624360ee5250e93dc31f3e8b51b3ba1d9bb4442,2023-10-05T15:17:11.293000
|
||||
CVE-2023-43979,0,0,b42ecb5c3472ee75481a81f4bcc721f9df20b88fcd306940b556920c1fd7490b,2023-11-21T14:07:31.363000
|
||||
CVE-2023-4398,0,0,941805a464290ceda704bc08a9de74a80348460471c7271929b1e2e9a230208e,2023-12-04T18:04:39.363000
|
||||
@ -235263,7 +235263,7 @@ CVE-2023-4723,0,0,a7b5d9fe62bfe417bf7a01ca914351b9a139cb64decca1c52b45f88bca778b
|
||||
CVE-2023-47230,0,0,8c9ea53aeba7fb8dc01a6d3d446631ba61b08e735e3638033e92bc7eff978922,2023-11-16T23:42:46.737000
|
||||
CVE-2023-47231,0,0,0e56d6a53e9dffcad55f29918057657f20586c9cd9de1621fecc7e52cf2c944b,2023-11-15T16:21:11.800000
|
||||
CVE-2023-47233,0,0,6a6dbaf8f067fa8b9ee025869bebffd314b509a9e4a321b94211adf000ea7deb,2024-06-27T13:15:52.623000
|
||||
CVE-2023-47234,0,1,c0b750c83f29ad2eb543e31817525b502e810fc43a7032b6a3e3b95afaf2d447,2024-08-22T15:35:04.480000
|
||||
CVE-2023-47234,0,0,c0b750c83f29ad2eb543e31817525b502e810fc43a7032b6a3e3b95afaf2d447,2024-08-22T15:35:04.480000
|
||||
CVE-2023-47235,0,0,b75caa87f8a3a2600e2a80e9d7122ca67645d01789e6d8aacfb2b04849ef8ebd,2024-07-03T01:42:11.777000
|
||||
CVE-2023-47236,0,0,b3e204de76f54e6e3f6ebb929e777f0a8ba1d0aae0254c73ae685244df53a883,2023-12-28T20:07:16.600000
|
||||
CVE-2023-47237,0,0,3ebc1ce6a5413647a9dd520607d2ca86d15d269ba64f5051655b2d6b2994c39a,2023-11-15T02:25:41.300000
|
||||
@ -238754,7 +238754,7 @@ CVE-2023-52372,0,0,15bf2071dc5da824a9df6bfd38af92c18dd9fd6f2d339d50b05268dc8c69c
|
||||
CVE-2023-52373,0,0,b688042e235deab3885c2fa0dca42afdbe734d6e8b4da6930a3ca13df8c7b884,2024-02-20T19:50:53.960000
|
||||
CVE-2023-52374,0,0,c3e1b0b58b2485371f036ee611aa6749f15d30b59aa2e7e645694aa3a34e19b3,2024-02-20T19:50:53.960000
|
||||
CVE-2023-52375,0,0,8b1124f491eac6a9625ff675ba683400b5b7d3f23a913d0d79196202d05c38ba,2024-02-20T19:50:53.960000
|
||||
CVE-2023-52376,0,1,83a4ff733e5d799164c7ebb5fc1c6d2bc436056e3b5dd111bbf28970a41696b3,2024-08-22T14:35:03.367000
|
||||
CVE-2023-52376,0,0,83a4ff733e5d799164c7ebb5fc1c6d2bc436056e3b5dd111bbf28970a41696b3,2024-08-22T14:35:03.367000
|
||||
CVE-2023-52377,0,0,b7bb8dcb6ccf72aa22b68fe6a7295a9e9583539669264335e5baefdd8fb2b023,2024-02-20T19:50:53.960000
|
||||
CVE-2023-52378,0,0,7d972f87df9155825bdca8688e6d1bd2426c7da77f9fdbba23cf94fc02560c06,2024-02-20T19:50:53.960000
|
||||
CVE-2023-52379,0,0,93b64dbad4e7209449b731f7d3e953f0a7c364b7d5a6a5a8e4913ba277d5b0b1,2024-08-01T13:45:38.070000
|
||||
@ -239524,7 +239524,7 @@ CVE-2023-5512,0,0,8f255f7600c876ac3f257539ecd63ba70ffd31d409fa952e6e1e6acca138ee
|
||||
CVE-2023-5514,0,0,10af8b6b0b626b561055de6189ef81fc4a75e29fab24339af80cb860ca2be855,2023-11-08T19:36:35.017000
|
||||
CVE-2023-5515,0,0,91a527d8a3473e517c634177c09d7c6152b47b2cca5db6d0f913eaea36a318d5,2023-11-08T19:28:26.543000
|
||||
CVE-2023-5516,0,0,ae73e4c23390248a1b340b12bd6e20a04e577dbe67f7bc8cbdc1d9c665aad45e,2023-11-08T19:40:16.980000
|
||||
CVE-2023-5517,0,1,092f5a23d77e754c9b42cabd4ac07b9f18ffe376c4c7e384c57bdabfb0330954,2024-08-22T14:35:04.137000
|
||||
CVE-2023-5517,0,0,092f5a23d77e754c9b42cabd4ac07b9f18ffe376c4c7e384c57bdabfb0330954,2024-08-22T14:35:04.137000
|
||||
CVE-2023-5519,0,0,37aee9a1129923dc93077477efa909f5ba6fdcb7802f73bac61f5648f04e8d65,2023-11-08T18:43:21.643000
|
||||
CVE-2023-5520,0,0,844f3dfeec17b0f2ef7eb23244c5ae362e4682ab16bd653f8e0d489e8a8f6789,2023-10-13T15:13:36.757000
|
||||
CVE-2023-5521,0,0,b63acfc129aa3310a98a296c6b047b557f6d4d113cf2debba604fa2d54e6d526,2023-10-13T18:07:46.757000
|
||||
@ -240372,6 +240372,7 @@ CVE-2023-6448,0,0,f7f271f9b08baff1e70e4a44ec3b05327ba7aad4658ca132cb49aa8e275080
|
||||
CVE-2023-6449,0,0,a7f9c2b5501cdd9fc21a14160551e18f6c2ae8e1d2fbbd505e7a7b32722bbf0e,2023-12-06T20:56:48.923000
|
||||
CVE-2023-6450,0,0,e76b7b0addf647726eba5bc734dd23c4b1f2101780b0fb20f535aa0ca20caeb1,2024-01-26T15:59:00.420000
|
||||
CVE-2023-6451,0,0,f12b562c1c96070fc5e29b85d7db92fde3d7bad88af9e8831d139b62eb69a5b6,2024-02-16T13:37:51.433000
|
||||
CVE-2023-6452,1,1,c5299f185bdb32bda151a9967f902be9f9e61a9d314aad85e6e7a6a1642a9854,2024-08-22T16:15:07.997000
|
||||
CVE-2023-6456,0,0,e46e0d37304e52e0bebade1bd99fe797a2c17dba35b72ee4232c48409ec0198d,2024-01-25T02:02:23.760000
|
||||
CVE-2023-6457,0,0,1d0aafe1ff9d8e5471ee20dcac54ea1ba924bf6cb0d15d7ebecd5192eedea5f7,2024-01-22T21:25:07.550000
|
||||
CVE-2023-6458,0,0,d5ab3aabd050ac001731c9ca925bc1c0303a945e438599593a52c25d763ddeeb,2023-12-12T19:11:36.897000
|
||||
@ -241107,7 +241108,7 @@ CVE-2024-0034,0,0,cf6982fa2541b8054d4b654ea4c176621af3fadbf8e13dda28278df5290d90
|
||||
CVE-2024-0035,0,0,9eaae678f1f9bc39ffb7f55e9bf0592ae82d1ab0298cf35f56b4c4901d254625,2024-02-16T13:37:51.433000
|
||||
CVE-2024-0036,0,0,fff8c3e6a7e572a710532aa58189e21f41ee35c59b75c244857e50ee7d7b8970,2024-08-21T21:35:03.820000
|
||||
CVE-2024-0037,0,0,afae0135406bbad6488057d26d0f96084f22f97b3b4cd7fc16729b7c9f861063,2024-02-16T13:37:51.433000
|
||||
CVE-2024-0038,0,1,8a4c5cca5cece8c101e9b56b16a23bb12b2d4f0643275b101b5b221ef0addcbe,2024-08-22T14:35:04.960000
|
||||
CVE-2024-0038,0,0,8a4c5cca5cece8c101e9b56b16a23bb12b2d4f0643275b101b5b221ef0addcbe,2024-08-22T14:35:04.960000
|
||||
CVE-2024-0039,0,0,68d4a281bb1d84f85cd5be142d8735596562f1396cf3f56249110327634e46fe,2024-03-12T12:40:13.500000
|
||||
CVE-2024-0040,0,0,cb768c0c56422d8be59b8ead41b2abde5abcab3c6641c5456375c74ed8738c47,2024-08-01T13:45:55.990000
|
||||
CVE-2024-0041,0,0,b813d6bcf6c48b25cab056ec33aebf10f8835e0ad83b4b9b3e3dda0209c4933b,2024-02-16T13:37:51.433000
|
||||
@ -241823,7 +241824,7 @@ CVE-2024-0853,0,0,3c910daae8e71e1ce70b1329a110fcfb56e12ff4cd703e160872830a02778b
|
||||
CVE-2024-0854,0,0,078c838d6b39f270536d9d77e44ca7ffaa60bd2fba9534d52e2f6ab03b587b3d,2024-01-30T17:01:37.127000
|
||||
CVE-2024-0855,0,0,61bb12eb398f3f222f6fe0c4603d214af7ba9f6d4fd218198b137421ef268723,2024-08-08T21:35:01.813000
|
||||
CVE-2024-0856,0,0,cdf686922dc6dc53a8573a4e6d7fe25c3162a97d00eaaeaf4df6f669bee7cf43,2024-08-05T19:35:01.477000
|
||||
CVE-2024-0857,0,0,eb17afdc7dc1bf92b321f990519fddd6b2895b42e203d3876b1bb54222e90b64,2024-07-22T09:15:04.457000
|
||||
CVE-2024-0857,0,1,135b818be9db5d9ae259c8ee8260201b0eed5c0f5f2f59c834f8ec0a79ea8407,2024-08-22T17:23:44.947000
|
||||
CVE-2024-0858,0,0,0cac4e7a1bf81dbbbf49fb45b774f9b9d61dff98c8323a87e06b4f2eb2f216bd,2024-03-18T19:40:00.173000
|
||||
CVE-2024-0859,0,0,ff784ede10a0711bc0887b221fef20123179373dca5468014d5965d599854b96,2024-02-13T19:45:29.770000
|
||||
CVE-2024-0860,0,0,831bd3ec539e95c34edc12f0e20bfc01b276aabb943cb43f0dff12e235110897,2024-03-15T12:53:06.423000
|
||||
@ -244090,7 +244091,7 @@ CVE-2024-21752,0,0,1c3f8b9711eb134dc24ac607b805147df44f1f88998d9833be077b129a214
|
||||
CVE-2024-21754,0,0,b97eddd3100f107222ee5e32da6dcd88fb7b0ee9149673b247db14c9970fccbe,2024-06-13T18:36:45.417000
|
||||
CVE-2024-21755,0,0,9a466316a66e45e4d0307d7e1708925f9ce7b32c6c8fd1a33c7d4ec0ae073e31,2024-04-10T13:24:22.187000
|
||||
CVE-2024-21756,0,0,bfc7206c5a35bb9a2182cf343b6e246cc54f15a3cfdddaffd353644c2951bedd,2024-04-10T13:24:22.187000
|
||||
CVE-2024-21757,0,1,66e21018e776a45a8ac67481d369c1c7c7a16e8eeafbc02057073be569347dec,2024-08-22T14:34:54.550000
|
||||
CVE-2024-21757,0,0,66e21018e776a45a8ac67481d369c1c7c7a16e8eeafbc02057073be569347dec,2024-08-22T14:34:54.550000
|
||||
CVE-2024-21759,0,0,6a61d7cb7523f60aeda71efe4ce4dc64f1500a7a1399f02108eff6d901e5e1da,2024-07-09T18:18:38.713000
|
||||
CVE-2024-2176,0,0,2ba78cf020993deed98ae980ebb92c5b68a22bb08492374d068beaa29a78e2e2,2024-08-08T21:35:08.447000
|
||||
CVE-2024-21761,0,0,2f2a716518ed143d836c780b247de3ae3910c7d7d968185283e0e6563fd7349d,2024-03-21T21:04:27.653000
|
||||
@ -244454,7 +244455,7 @@ CVE-2024-22239,0,0,9ea71bafa19cd131168ec7436d9ae98e5c9a50c32fb4550df539f9890cb5c
|
||||
CVE-2024-2224,0,0,b7ed9c2b9de420f7dfef45eac495d93dd8573ef5087b0e0970c5333ab24ff4be,2024-04-10T13:24:22.187000
|
||||
CVE-2024-22240,0,0,d7299eca430a3db2169c91a2dcf2392e54a6cf25183980860f34a8511f88e9e1,2024-02-10T04:11:57.463000
|
||||
CVE-2024-22241,0,0,43dae529a9c9ad0aafe69e774734bac33e826cd26512a1ce15473d96a6d6b08b,2024-02-10T04:11:46.267000
|
||||
CVE-2024-22243,0,1,72bca4806f3b46de2a1156654366dff0ac55a619786286afeabc5852a2a6c520,2024-08-22T15:35:05.027000
|
||||
CVE-2024-22243,0,0,72bca4806f3b46de2a1156654366dff0ac55a619786286afeabc5852a2a6c520,2024-08-22T15:35:05.027000
|
||||
CVE-2024-22244,0,0,eedd59a55d37d004f47a47d330c84ea460b68618fc0176589f1e06dacf7dd073,2024-06-11T13:54:12.057000
|
||||
CVE-2024-22245,0,0,b849e44010c7e6432b450e48e41da9a7dd3343f7e5f0bfd8d7ff7052eea57b33,2024-08-01T23:15:31.903000
|
||||
CVE-2024-22246,0,0,76171b54a9144a796e871026656a5c18298d50d46b7b4fd57d1a0e8c44956850,2024-07-03T01:47:08.260000
|
||||
@ -245199,14 +245200,14 @@ CVE-2024-23462,0,0,89eee1bc8417ec5c165498a10c45118559ef0ab7b53f75c35dd8c8aeefb82
|
||||
CVE-2024-23463,0,0,3757d1676f1ef0efc7fd06c5dbfd1e77b5a81f192ccd6411055b5756d98980c9,2024-04-30T17:52:35.057000
|
||||
CVE-2024-23464,0,0,f96ace951d186b2988bc125fdea8c86f0397bed95b21593fc51223e1b64bb834,2024-08-07T21:23:59.990000
|
||||
CVE-2024-23465,0,0,a4c1ec35f04e9fdf474cd87b3c2aafdeacdae5a8eab83da2bfa5a53b38af34f6,2024-07-18T12:28:43.707000
|
||||
CVE-2024-23466,0,1,c827b69aa8ff2c2472dcf3ed2eaa36e10a05c679d817d0cf5ef1324ef9e4ddf6,2024-08-22T15:23:31.480000
|
||||
CVE-2024-23467,0,0,5c86ed0c4cd13fd5925dd08e4b0d9d462c31ba7560e982c8660271250292a002,2024-07-18T12:28:43.707000
|
||||
CVE-2024-23468,0,0,7442e7a1f95905e4c846579344b9b898257e33405e23ada18e8a7677ffa37903,2024-07-18T12:28:43.707000
|
||||
CVE-2024-23466,0,0,c827b69aa8ff2c2472dcf3ed2eaa36e10a05c679d817d0cf5ef1324ef9e4ddf6,2024-08-22T15:23:31.480000
|
||||
CVE-2024-23467,0,1,0f3812c8027e2b1a0387ae084b54a312746a6f4208c9fd471e82159f817c624e,2024-08-22T16:01:54.223000
|
||||
CVE-2024-23468,0,1,e8765a070e032d74be82ef4378840bde9abdf40be241610e53dac176bf3a85a0,2024-08-22T16:00:38.870000
|
||||
CVE-2024-23469,0,0,05b78d88e5a9305969bd12b72fe36d95687a40703caf5cbe6f8f531283cef4a1,2024-07-18T12:28:43.707000
|
||||
CVE-2024-2347,0,0,639c42723b33042f97a80a4a3a2bc3546c4d216290aee32968515b2758b6d986,2024-04-10T13:23:38.787000
|
||||
CVE-2024-23470,0,0,21f957f5830ba7f3cb8f0b5cba3b3cc643e8f559e292c381232ffecb2aac58c4,2024-07-18T12:28:43.707000
|
||||
CVE-2024-23471,0,0,fe11efd17d8239a398506b0c207c833c4f64b5421ad9bbfff0c7a3f2189764bd,2024-07-18T12:28:43.707000
|
||||
CVE-2024-23472,0,1,121ca4221b4eb99e581b7a9e5e1e275d159863d781beeaa8fc9490d7cd94a082,2024-08-22T15:59:11.740000
|
||||
CVE-2024-23472,0,0,121ca4221b4eb99e581b7a9e5e1e275d159863d781beeaa8fc9490d7cd94a082,2024-08-22T15:59:11.740000
|
||||
CVE-2024-23473,0,0,fcdf3057371442a23acb771e071986edb9353b73cf0334bd53b552c2669c7305,2024-05-14T16:13:02.773000
|
||||
CVE-2024-23474,0,0,5b83eda1571f8d586afa7fdf61e84b7ee80ad4b928c31e2fb19bed55c0b0f5c1,2024-07-18T12:28:43.707000
|
||||
CVE-2024-23475,0,0,c393da98bbb9d83c6eda41c7438e97e9e7abcbedc909c6a49411cef32a15193c,2024-07-18T12:28:43.707000
|
||||
@ -245968,7 +245969,7 @@ CVE-2024-24740,0,0,055e621299fb8cfa25051c1c9b5b6e90ccf0de6c197861466b8c657e95fd4
|
||||
CVE-2024-24741,0,0,055f4a536b488558e042e77fcf1dc4ede8dc674d4e491c7a235734621d72b4a1,2024-02-13T14:01:40.577000
|
||||
CVE-2024-24742,0,0,87b67dd3de4a42ff5193bf6db8fa126263e616b4bc4dcdea2d08157e23dce2d0,2024-02-13T14:01:40.577000
|
||||
CVE-2024-24743,0,0,951e24161363ed6730298781326eb91e2e05dd09153b345d01a5eecb04bc8312,2024-02-13T14:01:40.577000
|
||||
CVE-2024-24746,0,1,40e7bceff1c25e6b9953ddd3810454050ac129de5e60f835bc00a18b7d10c7b8,2024-08-22T14:35:07.450000
|
||||
CVE-2024-24746,0,0,40e7bceff1c25e6b9953ddd3810454050ac129de5e60f835bc00a18b7d10c7b8,2024-08-22T14:35:07.450000
|
||||
CVE-2024-24747,0,0,c7102f6cbbbb54dbf174b4ec9b33188c1d6a88ca038e451e81aa538a223d6e72,2024-02-09T15:18:00.510000
|
||||
CVE-2024-24748,0,0,5f49ffc2835721d9b1ffe4198862561f4a25b7f09882de4d4811a0ddce7110f1,2024-03-17T22:38:29.433000
|
||||
CVE-2024-24749,0,0,38d4307753926d528fb1dee6ba588b6843344e7264e3e2eed6b33ca60b1a13c5,2024-07-01T16:37:39.040000
|
||||
@ -246599,7 +246600,7 @@ CVE-2024-25635,0,0,0396aede9a718a4992e7575bb30a0d211bf1d85759070350344147d63377b
|
||||
CVE-2024-25636,0,0,4e6fd7db5d6991432a0fc47bea99f1bd82ebb492967965ed027d0a8cefe8402e,2024-02-20T19:50:53.960000
|
||||
CVE-2024-25637,0,0,6b107052af4924b87ae030a7574b9b21f62a146f03952919ea9b1d4b0e21ed3d,2024-06-27T12:47:19.847000
|
||||
CVE-2024-25638,0,0,7f8f1079c160060a16106452028dd7eb9ccdcd50bb3965ebe5b6b12548db2abe,2024-07-24T12:55:13.223000
|
||||
CVE-2024-25639,0,1,90920ed35508f61f109c2fa6620249a2bcd1fd3af4dea83f43caf568353474b7,2024-08-22T14:59:56.757000
|
||||
CVE-2024-25639,0,0,90920ed35508f61f109c2fa6620249a2bcd1fd3af4dea83f43caf568353474b7,2024-08-22T14:59:56.757000
|
||||
CVE-2024-2564,0,0,6b3fd70d19edcd290602091f68cfa932af4444200d4de70b2e0360193173678c,2024-05-17T02:38:19.517000
|
||||
CVE-2024-25640,0,0,3bceb9b54384127c8987d6d0f984f439fa5009d13bcb784ca7a9cb2c455ef455,2024-02-20T19:50:53.960000
|
||||
CVE-2024-25641,0,0,676a26b1b2c12534fcd8ac5d05e0285f4f22783fa69470781479894a7e859c5d,2024-06-10T17:16:21.837000
|
||||
@ -248157,7 +248158,7 @@ CVE-2024-27474,0,0,4a390a0a495b528719cdfad3c5cdbeeb4b25b7052e56b9b2bf54d8bb9762d
|
||||
CVE-2024-27476,0,0,7a4663f499ee23e08c2a048515f5b6745ec9423d99e38efec54dd0ceaf59a3fa,2024-08-01T13:48:28.390000
|
||||
CVE-2024-27477,0,0,e0cd02f233cdafbc91249b5781d33c91da5035c970dc05ec11d6a3134871bf1b,2024-04-10T19:49:51.183000
|
||||
CVE-2024-2748,0,0,a5981f926316e727f1bb9455ec311db801fabdd6fc8350d94a1fb8a2edb4a89a,2024-03-21T12:58:51.093000
|
||||
CVE-2024-27488,0,0,6be2a43b71b53f166dfab0e5a48f18012ba860e052bdc0fdded0a51aae424787,2024-04-08T18:48:40.217000
|
||||
CVE-2024-27488,0,1,bfdf15a6c63aa1a91ac337c65bb16cee3d64b1e4a0cba0b13044ecc27d04a86f,2024-08-22T17:35:01.813000
|
||||
CVE-2024-27489,0,0,fae6db07f37367cac095792be5d6f831e097964d9738fbc71b73f8a7056182d5,2024-08-01T13:48:29.187000
|
||||
CVE-2024-2749,0,0,1d41dd2f9a8ec812d743eb2503d3459b40e5b74ef406549f3f22535f8f1ae124,2024-07-03T01:53:31.040000
|
||||
CVE-2024-27497,0,0,2405900a7ea943326a9606fe19fb79f48e8cc6663a4627c665d5498ade7bedff,2024-08-16T16:35:04.793000
|
||||
@ -249101,8 +249102,8 @@ CVE-2024-28984,0,0,276bc8c54cf8ee7419930c3e9177a9acf5146d6167c989ef6d1387fafadac
|
||||
CVE-2024-28986,0,0,1bc724868f1fc8a3c45a5557a2e0154a8318c8e26360517fdaccaced6288454f,2024-08-16T15:04:28.150000
|
||||
CVE-2024-28987,0,0,a8b388aa0866daa044867e0e7549769a8c4ba15acabd6bd0464b05f5ad13c511,2024-08-22T12:48:02.790000
|
||||
CVE-2024-2899,0,0,0be0fb50fdcc13228c9b49554460e4a306be4c6e83ee7f9bfb94b945f4f9e595,2024-05-17T02:38:36.220000
|
||||
CVE-2024-28992,0,1,dcb8c493077168591aebe4d60d7719870f581d45ce48e73108abe9067fb629eb,2024-08-22T15:56:58.207000
|
||||
CVE-2024-28993,0,1,9c5125da7327315f017a58b350f8b638b25e9c0dcede224162aff682993b7d59,2024-08-22T15:54:56.087000
|
||||
CVE-2024-28992,0,0,dcb8c493077168591aebe4d60d7719870f581d45ce48e73108abe9067fb629eb,2024-08-22T15:56:58.207000
|
||||
CVE-2024-28993,0,0,9c5125da7327315f017a58b350f8b638b25e9c0dcede224162aff682993b7d59,2024-08-22T15:54:56.087000
|
||||
CVE-2024-28995,0,0,23c52fbffb3e9fb74833a00e094548a239a07eefa8716c4e259000599c6e6a05,2024-07-18T01:00:03.197000
|
||||
CVE-2024-28996,0,0,09468fc42886d2b9d5b470ae44f5a5cbca16443960a600683fb24e9570dc922c,2024-06-06T16:23:24.377000
|
||||
CVE-2024-28999,0,0,768d1b3fe866566c9082c710789c8fcaa529e82f91bdfdec236693dabe93837d,2024-06-06T19:06:50.923000
|
||||
@ -249483,7 +249484,7 @@ CVE-2024-29732,0,0,e30fc06180575c1796869bb0b4fa02497c40c6d7939d34aba0362f12c2710
|
||||
CVE-2024-29733,0,0,0811972ef853088b726fd2b07316244d1d628e55e310910ac8174bd65d097612,2024-07-03T01:52:30.320000
|
||||
CVE-2024-29734,0,0,65bb1ba04f673142d3081922c5e4533cd4af140db3cdfbbce09ab73848e3b6c3,2024-04-03T12:38:04.840000
|
||||
CVE-2024-29735,0,0,1c27e1fe9dbb50907062f908fab6fbb55a16239f685d6be40b04c11200e2a361,2024-05-01T19:15:23.573000
|
||||
CVE-2024-29736,0,0,a29e5ad6d2da9dd2101bffb608f207d24cf828ac3cbdfd7bb52689ac543dddf1,2024-08-01T13:49:34.540000
|
||||
CVE-2024-29736,0,1,5b51c834110c4ab0fba6db5636bf570f371288eeb5e87d8fc00ae6c266b9181d,2024-08-22T17:31:48.980000
|
||||
CVE-2024-29737,0,0,773c8720c44afb54cbbd0c12354c2f0a043cfa72e5f75a21b0108ef944307c03,2024-08-01T13:49:34.853000
|
||||
CVE-2024-29738,0,0,1c3e1564461702d87cd213d777f3523814ac3c73b5cc61bff5ae595e06e0fbeb,2024-04-08T18:49:25.863000
|
||||
CVE-2024-29739,0,0,e1057fb9115257c9cc112890add5aab29e2addabc474164aa5dc49dc015af77f,2024-08-21T14:35:06.390000
|
||||
@ -249882,7 +249883,7 @@ CVE-2024-30135,0,0,434c5499719264a4e2ad07af1f36d8ed1af6151b19467e0009865806919ae
|
||||
CVE-2024-3014,0,0,c46983235075ad6c61a858c21d5be28ec226124df8363686d4a4d1cade05d3fc,2024-05-17T02:39:40.800000
|
||||
CVE-2024-3015,0,0,cf3ef36018f814f81d7c4b278b721ac941c52c0f1c0bedc65491406707b51ee6,2024-05-17T02:39:40.887000
|
||||
CVE-2024-30156,0,0,3d53855c757ad6b4fdec1c866bc6a474f7a081008c29fdfc2556616a5702f89d,2024-03-25T01:51:01.223000
|
||||
CVE-2024-3016,0,1,365b1d8bd40146c56247f165cad66ba9032ab62d7024128ecd437112ab8f9af3,2024-08-22T15:35:08.600000
|
||||
CVE-2024-3016,0,0,365b1d8bd40146c56247f165cad66ba9032ab62d7024128ecd437112ab8f9af3,2024-08-22T15:35:08.600000
|
||||
CVE-2024-30161,0,0,1923ba0ba6f178ce866a1a8ca8f64984391bfd8920138b4d8c36e03ff657287b,2024-04-11T14:15:12.083000
|
||||
CVE-2024-30162,0,0,bfc1b2dd1f9f0516f5fde509ec8f6b937e3d3043c9b38e8e614a15ddc80d79a3,2024-07-03T01:53:51.970000
|
||||
CVE-2024-30163,0,0,a73a629b03deb6cd2f20f667428a8c95efd54363034c035eeeed31541b8e07f7,2024-08-08T21:25:19.010000
|
||||
@ -250134,7 +250135,7 @@ CVE-2024-30414,0,0,e64c669e53c2987f3547fe2d3f570a685cb932dd6dc71edd2e9b0531a95f3
|
||||
CVE-2024-30415,0,0,f281fed7c3faa7dc041e240ec4e6ac1c46962cc31332fe749fb4d64177e3d2e4,2024-04-08T18:48:40.217000
|
||||
CVE-2024-30416,0,0,d291744711f1dbb5817510d2d6fc5de3fe8fd84c6a61838c148f9e7cfacc8058,2024-08-01T13:50:07.780000
|
||||
CVE-2024-30417,0,0,454137694c003758247b4c0acabe990dae4347bce9b044c8ece06c3d4e475793,2024-04-08T18:48:40.217000
|
||||
CVE-2024-30418,0,1,dd8da8af4bd8164eb1f999131e29375420efd11048e6bd1ecc6b7ea8936ad00d,2024-08-22T15:35:05.833000
|
||||
CVE-2024-30418,0,0,dd8da8af4bd8164eb1f999131e29375420efd11048e6bd1ecc6b7ea8936ad00d,2024-08-22T15:35:05.833000
|
||||
CVE-2024-30419,0,0,2f530b202492e52318032e7619655e6192edb2822beab428ec9cba2b2427cda7,2024-07-03T01:54:04.563000
|
||||
CVE-2024-3042,0,0,b51852dae1f5eba8e99dd3aba03255977b2f1344b1da87286dbd9f450156442b,2024-05-17T02:39:41.680000
|
||||
CVE-2024-30420,0,0,c7aa765232ba482242d297cfff54623d69e480ef9ec026f910cf7643167f5bd5,2024-08-19T20:35:12.223000
|
||||
@ -250286,7 +250287,7 @@ CVE-2024-30559,0,0,7bb411cba178991a1e753b9b344d96e6c257adaaf46f6d70bda139a8b3d1f
|
||||
CVE-2024-3056,0,0,c33c3028618acd56970d704007cc8cb0c1300b261807cf531015dd6f1b2728df,2024-08-05T12:41:45.957000
|
||||
CVE-2024-30560,0,0,29358f4cfba46b880efc18b382f49655b8da1f57de09ea2f3b221ee017e11a93,2024-05-14T15:23:17.730000
|
||||
CVE-2024-30561,0,0,317571b22962e8d6e5d0cb62ac3952d7d76cb14c6191157ad5ef89ba7149e860,2024-04-01T01:12:59.077000
|
||||
CVE-2024-30564,0,0,92e98c5dcd641d0673e96635e88dfdb173d7997e6d4761f483834203fe7a9974,2024-04-26T04:15:09.020000
|
||||
CVE-2024-30564,0,1,5b72a00e1c04b6fa93ffaa761b95fbd264190bcd29898850fc62b4910b45e5e3,2024-08-22T16:35:01.923000
|
||||
CVE-2024-30565,0,0,3bd2e856e06d3e3fe9f747497d3ea242e07c951fa4c500c8b76a56b8bcb712e0,2024-04-04T12:48:41.700000
|
||||
CVE-2024-30567,0,0,f2a4d1211b738fa363bb6c48ea72578b3372d81c87f66a2aa1c7f2df3ee8bec0,2024-08-01T13:50:09.870000
|
||||
CVE-2024-30568,0,0,44c25f2577fa5438de7f51a90d4ade231e906e1e0fac9c82f2eeb8db8041cb68,2024-08-21T15:35:06.717000
|
||||
@ -250698,6 +250699,7 @@ CVE-2024-31266,0,0,b92d3472dc7ea2fb235b5bcb68cf81aecc30e7cb1ee1bd1aa6dafd92cf1bd
|
||||
CVE-2024-31267,0,0,040058e14e9fdb721a91dacc70a415fed99bbf6a8b0312f5e05b9e69e9a0c81b,2024-06-10T02:52:08.267000
|
||||
CVE-2024-31268,0,0,cc3a61e7598538b428678882d7d6fc8be6fe9abdf509b0bae8b464c540b05a25,2024-04-15T13:15:51.577000
|
||||
CVE-2024-31269,0,0,86a2fc976069d7e9fe6dbc1dcd3b4bc1f5d59b016a301859aeeb8e23bd95e8d6,2024-04-15T13:15:51.577000
|
||||
CVE-2024-3127,1,1,6cc9e310e622b055f109ee1067c668db0a55dbf9550eabccd044c67d5bcfc115,2024-08-22T16:15:08.590000
|
||||
CVE-2024-31270,0,0,0d4fb68db93c302d6959c71357aec0a409fd68ac83d0cfe96c55d4825aec0e52,2024-05-08T17:05:24.083000
|
||||
CVE-2024-31271,0,0,9ff92eb8bbc3e7bde801b4b1d4c1bb80f0abb134b87ad407d23ab89ee9509ab3,2024-04-15T13:15:51.577000
|
||||
CVE-2024-31272,0,0,37b5ce6f43ab85f0748383fe28a22f89c4f6f43da0d4ba23932c516627b4eab9,2024-04-15T13:15:51.577000
|
||||
@ -250842,7 +250844,7 @@ CVE-2024-31406,0,0,50456975bcaa7f8217ed5d32434dc8fe15a49c6e53ad431c822a1405fa86b
|
||||
CVE-2024-31409,0,0,09ade636686018d011934a2d430e86d633c432ebce6a25dfdd22659ad619bb0a,2024-05-16T13:03:05.353000
|
||||
CVE-2024-3141,0,0,f613ac942cd4fe27f02940a465f775f9bffd5aa44eaf65a9fb94b5d68958c63e,2024-05-17T02:39:44.593000
|
||||
CVE-2024-31410,0,0,23155e757f76d6df45e3314d3045af8745f87c8b7ddeb1d4a8dad059bea073da,2024-05-16T13:03:05.353000
|
||||
CVE-2024-31411,0,0,825e1b84f8b1b768e292f27f196285d9ac70286d0de1b0e473d4ad782faed11f,2024-08-01T13:50:54.623000
|
||||
CVE-2024-31411,0,1,4ae8e92f24ab80cd4eeff80dde44b86a5e45219785c2eb09757e8f4f11b858d3,2024-08-22T16:07:06.267000
|
||||
CVE-2024-31412,0,0,91783357bf64a7c6a8a8fc4dd61d86515f3c43b87fd5026db89b258496a563c2,2024-08-01T13:50:54.890000
|
||||
CVE-2024-31413,0,0,bb1445e4de4fe6231d24b5144c9534a3d5daec05348443646de7635aa924272f,2024-07-03T01:54:50.813000
|
||||
CVE-2024-31419,0,0,d12cf9d3a6a9056d09543372e3ec9556904c7fd0922004ef5361ecc4fb1ba007,2024-04-03T17:24:18.150000
|
||||
@ -252732,7 +252734,7 @@ CVE-2024-34222,0,0,c9254aeea26939ed840e05e8449aee7f6267f0c74101a29fff26f90fc72a2
|
||||
CVE-2024-34223,0,0,e20a175c7dfda07a23d9be727c891b1d9b5fe04956f12c400e7a65f5770b7fda,2024-05-14T16:12:23.490000
|
||||
CVE-2024-34224,0,0,f4b792085c33fe751ba37a69e3ef609b6c4267fa901657944ebf702e373cd8dc,2024-05-14T16:12:23.490000
|
||||
CVE-2024-34225,0,0,e08a9ad45b2661eed67570a87cb42ad712c6fe6e9c128f00e0736869ea473a7c,2024-07-03T01:59:42.910000
|
||||
CVE-2024-34226,0,1,e9df399e03868b5419f9e1d39391572872ab999c75d356756b02d0d173e993c9,2024-08-22T15:35:06.620000
|
||||
CVE-2024-34226,0,0,e9df399e03868b5419f9e1d39391572872ab999c75d356756b02d0d173e993c9,2024-08-22T15:35:06.620000
|
||||
CVE-2024-3423,0,0,5df33203eaf14342db1ae141cfe06e52884cff2f7dfa5b3fcca2ff4c13d5eebb,2024-05-17T02:39:54.990000
|
||||
CVE-2024-34230,0,0,a05a38a79741a72c9d6f5456446d713ef2ea9e7cfac29bb555039d0657084814,2024-08-08T16:35:11.040000
|
||||
CVE-2024-34231,0,0,bc89f3c9bb61baf29d2d35dc13499882fd5aa1b8a06439e514ae7d635339b6f7,2024-08-01T13:52:18.070000
|
||||
@ -253456,7 +253458,7 @@ CVE-2024-35375,0,0,ed34ddd9d512918cc00e937f04fcc44b2e98fec270008373eac869e7c2125
|
||||
CVE-2024-3538,0,0,9615e321c043201a8d062641e6113a127ad070f2c61985bcd402bdf4990165ec,2024-05-17T02:40:00.087000
|
||||
CVE-2024-35384,0,0,80c459d6b8b92f35efd27c83c865d17dc86005bdbc1e6e04541d28ddd40786f0,2024-08-01T13:52:39.203000
|
||||
CVE-2024-35385,0,0,398a0815629caee79e0ed577c05dcef42bd37c568d9a41ae8597fc88574b3380,2024-07-03T02:01:39.520000
|
||||
CVE-2024-35386,0,1,2a720bc530e0efacea62f463c2514e39604e38d3d34515573bee595bfa4c9346,2024-08-22T15:35:07.413000
|
||||
CVE-2024-35386,0,0,2a720bc530e0efacea62f463c2514e39604e38d3d34515573bee595bfa4c9346,2024-08-22T15:35:07.413000
|
||||
CVE-2024-35387,0,0,c15fdfd7d84f50c783e9e09361abe37993b474b133a90ed661a9f7fadb59afd8,2024-07-03T02:01:40.300000
|
||||
CVE-2024-35388,0,0,830a86b36926f5e0687c6d41178a5d819df1e34c94732e02a8d2ad4cef75400a,2024-07-03T02:01:41.110000
|
||||
CVE-2024-3539,0,0,187a49c7d3510ecfca5f59edc68d9b81cca1aa600a7ff6a291f1b4fc3dfb6d98,2024-06-26T18:15:15.653000
|
||||
@ -254275,13 +254277,14 @@ CVE-2024-36433,0,0,2d18270b463db9b276375797189132982b3093c59a94a1ba3c26d6b6e8046
|
||||
CVE-2024-36434,0,0,8fba84c9c20ed6e9e38e371f6a7314cc80d9ab38ed1fc3ffdc1e7c8b52186a69,2024-08-01T13:52:49.800000
|
||||
CVE-2024-36435,0,0,42aa941ee425d333c537ed403b5f168d15cf55caec805a299bb4c45521e1c947,2024-08-01T13:52:50.527000
|
||||
CVE-2024-36438,0,0,fcbe2e02dbfe7753ae10ee196c2c3d66e08c15fdea4edc31b3da8e63f435a898,2024-08-01T13:52:51.240000
|
||||
CVE-2024-36439,1,1,552cc6bf9f3a854c35497dfa977c3d093556dbdf2425977771abb27b0df0b30f,2024-08-22T15:15:15.883000
|
||||
CVE-2024-36439,0,0,552cc6bf9f3a854c35497dfa977c3d093556dbdf2425977771abb27b0df0b30f,2024-08-22T15:15:15.883000
|
||||
CVE-2024-3644,0,0,e904dffa636a621d1f1644a68a8bb26342dbf717ae684f12b60a37d102e4d87d,2024-05-16T13:03:05.353000
|
||||
CVE-2024-36440,1,1,e3ffbfb49a6a83abf3c4c4f0e950f7ab7d62439e253be0053a26163bc8cdbe93,2024-08-22T15:15:15.977000
|
||||
CVE-2024-36442,1,1,a825b90a27d1c300a2715e85e051e17ac9b243078f4181741a9faca3afd00e3a,2024-08-22T15:15:16.047000
|
||||
CVE-2024-36443,1,1,6b41f9be21c37101e04a2af5bcb1ed0de69466c478ef5ba6e2afaead6470be36,2024-08-22T14:15:08.443000
|
||||
CVE-2024-36444,1,1,7764dcc9d2cad1809eec2f3d12f8959ca5dfa6fa7ba59999bc2fa6d6ce039685,2024-08-22T15:15:16.117000
|
||||
CVE-2024-36445,1,1,b3878d99c2c158182c669809477e39a5c3c4bcc3cc88b511a97003a3be74bdce,2024-08-22T15:15:16.187000
|
||||
CVE-2024-36440,0,0,e3ffbfb49a6a83abf3c4c4f0e950f7ab7d62439e253be0053a26163bc8cdbe93,2024-08-22T15:15:15.977000
|
||||
CVE-2024-36441,1,1,16e16de21c8f99458d9aea248831dcf153409a4f95f4c31dcb522bd5c60300eb,2024-08-22T16:15:08.433000
|
||||
CVE-2024-36442,0,0,a825b90a27d1c300a2715e85e051e17ac9b243078f4181741a9faca3afd00e3a,2024-08-22T15:15:16.047000
|
||||
CVE-2024-36443,0,0,6b41f9be21c37101e04a2af5bcb1ed0de69466c478ef5ba6e2afaead6470be36,2024-08-22T14:15:08.443000
|
||||
CVE-2024-36444,0,0,7764dcc9d2cad1809eec2f3d12f8959ca5dfa6fa7ba59999bc2fa6d6ce039685,2024-08-22T15:15:16.117000
|
||||
CVE-2024-36445,0,0,b3878d99c2c158182c669809477e39a5c3c4bcc3cc88b511a97003a3be74bdce,2024-08-22T15:15:16.187000
|
||||
CVE-2024-36446,0,0,fb83b75323b3e400ca2145700cc136f4b6c6846fd602109bf32c3aabc452c8ad,2024-08-14T02:07:05.410000
|
||||
CVE-2024-36448,0,0,1175cc623301466e8a019bc6e0833d0f29d9f1c79b10495f6dc5ff5c39383d2f,2024-08-05T17:15:41.557000
|
||||
CVE-2024-3645,0,0,ea45063aa3cff8d7bb517959f0685ad339f1e48c249e10e3851af9fbba289420,2024-04-22T19:24:12.920000
|
||||
@ -254325,7 +254328,7 @@ CVE-2024-36500,0,0,32af1afd4bbbe42fa4488d4c1e5cc6ce476ad041bd1fdba49949cbef0ad81
|
||||
CVE-2024-36501,0,0,e9cab9d7dda9a217e690001b6c798a6fbb4e54d85ebb6ee3110f4200709cc1e8,2024-07-16T16:25:49.413000
|
||||
CVE-2024-36502,0,0,ce6106b712ac934aa3d46433d1d90bd69a47142ad6fe94c097ce1ae7a55cb590,2024-07-16T15:19:59.157000
|
||||
CVE-2024-36503,0,0,cf0c7df8eb5d0563a3adb9382b90b37caa70a1002731797c28a41bd8794b11f6,2024-07-16T15:19:45.557000
|
||||
CVE-2024-36505,0,1,5f3f0cdeca57fafe761af488854e771d0523077cbcea5a41dd4a6b4cc9d56e84,2024-08-22T14:36:31.643000
|
||||
CVE-2024-36505,0,0,5f3f0cdeca57fafe761af488854e771d0523077cbcea5a41dd4a6b4cc9d56e84,2024-08-22T14:36:31.643000
|
||||
CVE-2024-3651,0,0,3337eb59719c2f9e59e57f7ed588f3375e47160773d149a8aeb60c1398d8674e,2024-07-11T14:58:01.803000
|
||||
CVE-2024-36518,0,0,064cad3de67032c4f830b8ce3196cfd8df79e51094d50317231dcf250dd1a617,2024-08-12T13:41:36.517000
|
||||
CVE-2024-3652,0,0,df71e97982cfb8bbdea2c8b53979ee8792aae4a73aef6703ec1b621d3f12e772,2024-05-01T17:15:37.793000
|
||||
@ -254433,7 +254436,7 @@ CVE-2024-36761,0,0,2def433fa1c84a9e275856e3918a20f7afbf72e8563d9face0a26c843d2d4
|
||||
CVE-2024-3677,0,0,6cc15bc7354ad532633e5fc6daa425aea3dc2f25b49c3017f86224f41078ae1a,2024-05-02T18:00:37.360000
|
||||
CVE-2024-36773,0,0,720de74f1ee0644bf544aa650aaafc650bba06adb51118d8aad2d248b0937337,2024-08-02T17:05:08.087000
|
||||
CVE-2024-36774,0,0,a0f118c44c070f7e889ef45df0f4c9a5fc8bc258ceac7eec500dce645d16bebe,2024-08-19T15:35:09.967000
|
||||
CVE-2024-36775,0,1,750f40a30c6e33f479ff9b0d44a619121855a88190c8461ae383413d7d8bda06,2024-08-22T15:35:07.603000
|
||||
CVE-2024-36775,0,0,750f40a30c6e33f479ff9b0d44a619121855a88190c8461ae383413d7d8bda06,2024-08-22T15:35:07.603000
|
||||
CVE-2024-36779,0,0,683c0fd02360318850b70342be346d01a593435d02125ebb1b54b41fe6a80036,2024-08-20T16:35:20.517000
|
||||
CVE-2024-3678,0,0,469a9707bf4a10787b83dfdbba79cfb824cfe86b743e31553512cd5fa81bcd6d,2024-04-26T12:58:17.720000
|
||||
CVE-2024-36782,0,0,a26ba637b3d65bc93f6cef8eab2e486cb22e0f173ff0b09ffa5f5054e7e91e9a,2024-07-03T02:03:36.797000
|
||||
@ -254443,7 +254446,7 @@ CVE-2024-36788,0,0,ce421f00af3050883a12bce11fefd1ad9628128d70c1a012c0032b203b967
|
||||
CVE-2024-36789,0,0,e3781e3969948bd92ae74a8bb78c5b0d32bc5708516429d524b2a965c1c4e0b5,2024-08-15T16:35:11.633000
|
||||
CVE-2024-36790,0,0,f8247224261f96e31ccf08410164dd4379381055fde60fa853baf6df22465be3,2024-08-14T20:35:14.473000
|
||||
CVE-2024-36792,0,0,fabceb2ff375c58d64c9553c86e9784f4de9e6f1c14eeb688305657805693eab,2024-07-03T02:03:37.690000
|
||||
CVE-2024-36795,0,0,46ba20e8747072af55f2caab9b0b2156e34c43ea304c19f325bf4da1095d48e5,2024-06-07T14:56:05.647000
|
||||
CVE-2024-36795,0,1,421d7caed3f1bfdd012cee0400460351c045d5fa781e1724ee2bfb8de7fe2f98,2024-08-22T16:35:04.130000
|
||||
CVE-2024-3680,0,0,a00e5c81c2599a81ed1e944ed0d1a6cb38236de396da2ad7b68a4f9ced279cbe,2024-05-14T16:11:39.510000
|
||||
CVE-2024-36800,0,0,7145d6f747aaada9716fb81bc8dfb45a6760f4d4c44d1923a8fcdfd4d6bf0704,2024-06-04T16:57:41.053000
|
||||
CVE-2024-36801,0,0,615520142931b66fde6db6951c58c2f4d595e9209406619dd298379a6ca83c50,2024-06-04T16:57:41.053000
|
||||
@ -255517,7 +255520,7 @@ CVE-2024-38435,0,0,443ed766c9f1828c7340ce8e1e5ea8f41dedacb0f54d1fb72032e14d63301
|
||||
CVE-2024-38436,0,0,2a0666a7d40fd9b389de8adbff2ee11921b85d211afc0554b4f25dd1a035a738,2024-07-22T13:00:31.330000
|
||||
CVE-2024-38437,0,0,af3d5558f6171821fe7b56d83a7ce68b00464fcaad0f93b82569b698cf8c8174,2024-07-22T13:00:31.330000
|
||||
CVE-2024-38438,0,0,358e2c9395c78cc48f79a959f0dc011aabc3bf93ca600ba6e11d2ea9dd5c842d,2024-07-22T13:00:31.330000
|
||||
CVE-2024-38439,0,0,59170ec5528b0f3ad2c0e5e21d5aeb19836156d32b2bc9404706c66617c13f12,2024-08-07T19:28:25.430000
|
||||
CVE-2024-38439,0,1,5e41004fdb849f3a15eab07684ffe3e0d6b4b290c3eafdf0306f628c717fabef,2024-08-22T17:35:02.870000
|
||||
CVE-2024-3844,0,0,5af78e025341bf79ebde5375de51163c2d0699600acafc572d0eda08d0af5664,2024-08-06T19:35:07.433000
|
||||
CVE-2024-38440,0,0,63abac1dfb7b4b8bf3c5de5703789232b47ff29321fae9f604e5571079b98b34,2024-08-05T17:35:14.930000
|
||||
CVE-2024-38441,0,0,ac0b93cb6ffa098c7084725e672b8a46eaec79cba86c9914543059b94977fa29,2024-08-05T17:35:15.733000
|
||||
@ -255650,7 +255653,7 @@ CVE-2024-38576,0,0,2236920d60064e661a944c733eb2e7966e7c6fdf3b15109d7e99a4086a362
|
||||
CVE-2024-38577,0,0,4c84519c5a14d83bf1e1afda58945cc2b4924597691a0e5a8782c751132e779f,2024-08-01T20:13:24.763000
|
||||
CVE-2024-38578,0,0,59aca8de5dbd59caa444dd7e2a1cba02589d14b7e716ca8b1544730c92701d84,2024-07-15T07:15:10.620000
|
||||
CVE-2024-38579,0,0,b473c1338d077f4b1eb5b907c1fe49edff8282b40b79f122f252878eded18e82,2024-07-15T07:15:10.703000
|
||||
CVE-2024-3858,0,1,dd053838f3e277a81d969816e65a4f781c68054bd6d54d527d61add36147e05e,2024-08-22T15:35:08.807000
|
||||
CVE-2024-3858,0,0,dd053838f3e277a81d969816e65a4f781c68054bd6d54d527d61add36147e05e,2024-08-22T15:35:08.807000
|
||||
CVE-2024-38580,0,0,f767d8c72e121e64fa886da74166c0eb1f56d7af5ff19f167059ca44868c4cb6,2024-06-20T12:44:01.637000
|
||||
CVE-2024-38581,0,0,163d2599f0d04bac3fcda8729bc91618b1a33a7c58994982f4ff41f06afb0603,2024-08-01T20:12:00.623000
|
||||
CVE-2024-38582,0,0,5bf2ab3765292126c7b2b3caf98adbacc937c1d69982e23478c39937ea0c9383,2024-07-15T07:15:10.780000
|
||||
@ -256024,7 +256027,7 @@ CVE-2024-39304,0,0,b5f772f01b3427664c53f2fa0501efa536f799b20c5d68d0936fe6db6ed2d
|
||||
CVE-2024-39305,0,0,63f56317b3a65afc1e2039e772edc429176693e571707c38de2e052250926788,2024-07-02T12:09:16.907000
|
||||
CVE-2024-39306,0,0,8e446f8cd38382555b776a84edd1102287cdb22d9e95652344c53f12d26a921f,2024-08-19T14:15:22.423000
|
||||
CVE-2024-39307,0,0,c6ba32c8ba3cfcd15570f781df2bcad3fc5cb61b722485741dcbdce4f9e733a2,2024-07-01T12:37:24.220000
|
||||
CVE-2024-39308,0,1,391a33c40d65efbb21a3e72856c5b6e7c78acfc8a536f5e714b7e384392790dc,2024-08-22T14:22:34.320000
|
||||
CVE-2024-39308,0,0,391a33c40d65efbb21a3e72856c5b6e7c78acfc8a536f5e714b7e384392790dc,2024-08-22T14:22:34.320000
|
||||
CVE-2024-39309,0,0,136c09ae402132cc087ad5758d406eac21c47491362259de052db9baf065bd3e,2024-07-02T12:09:16.907000
|
||||
CVE-2024-3931,0,0,dc3222ede6dc2fc1538ac21332ba32552f7a481ab27e70085114f0462848e6c7,2024-06-06T20:15:13.933000
|
||||
CVE-2024-39310,0,0,187be4dc945171a7657d1459e6c80fed53aa1f7d448ef02205a5dc997f08bebc,2024-07-02T12:09:16.907000
|
||||
@ -256123,7 +256126,7 @@ CVE-2024-39429,0,0,c0f0ea0961d667a14523724c8241b9d1f206aa304e922487a3184313c2bde
|
||||
CVE-2024-3943,0,0,fecb7894fc8f71bb1eb318ec20be6409020b761b3221fbb9ca597f81fb48f5da,2024-05-30T13:15:41.297000
|
||||
CVE-2024-39430,0,0,64e823bdb7084987f6e4f2dcc4ad0f20791cdd196a0003b3469db98557837678,2024-07-01T12:37:24.220000
|
||||
CVE-2024-3945,0,0,f529a76504b589632a786b994a7e59172142cd26cd001d628e7f3ff9658da8b1,2024-05-30T13:15:41.297000
|
||||
CVE-2024-39457,0,0,3e70e4c282d28f04a6f0565d109ad30c3b18a08954e0ae1c6ae3af436192ab62,2024-07-19T13:01:44.567000
|
||||
CVE-2024-39457,0,1,71348762cda2a65a9fb6ee86fb97ddb6684e341009bf79ffb50846af36c0e45a,2024-08-22T17:33:32.373000
|
||||
CVE-2024-39458,0,0,057d26d6064abe38c6844996c076741573b3fb5797f6e26a9cfc5dd443dbc18e,2024-06-27T12:47:19.847000
|
||||
CVE-2024-39459,0,0,a2d4a360bea52f929e9e67b789c87ad1cf52c7054f238a5096a4acbd8cc22855,2024-06-27T12:47:19.847000
|
||||
CVE-2024-3946,0,0,ab824b4f2a8403c27b100f5c3d6e7f8d9dd1c20c9aa138888e04631941f166f6,2024-05-30T13:15:41.297000
|
||||
@ -256683,7 +256686,7 @@ CVE-2024-40721,0,0,e925b9407604ba1cd45dcb152cbb5c51e61b8964f6bec2135a5763eab76a2
|
||||
CVE-2024-40722,0,0,3f4f7e149a4eb425a0e28fef9d1b50a8bebfa8863debf3c2b799a570ae99ce9f,2024-08-09T14:39:28.157000
|
||||
CVE-2024-40723,0,0,e04f296cec18624b17999f7835fdbf784e5f656a5baf868ac5f6b3b681e3a875,2024-08-09T14:44:01.907000
|
||||
CVE-2024-40724,0,0,7760c39c7ea9cd43ce07bb58fee4f3b8fbd5ff3c12d0d2faca499135b3db5d70,2024-08-07T20:15:57.773000
|
||||
CVE-2024-40725,0,0,27ddf61295cd28078b1f9de55f307855293b185f22be05b7367bb4d1ccd08bdd,2024-07-18T12:28:43.707000
|
||||
CVE-2024-40725,0,1,49f0f88958ae561d8b2b0b1ee4fb8bec2acdee702f61bcb5645f83d42fdd426a,2024-08-22T17:13:09.820000
|
||||
CVE-2024-40726,0,0,763881d353b2a872c395d06db8ff47aa2480183ffa56c57536446e062ec43bc5,2024-07-11T15:06:22.967000
|
||||
CVE-2024-40727,0,0,b9db12f74fa9e60fafdd87d2e3b118721f9da9edf52efc272fb39aa64e4cd584,2024-07-11T15:06:23.850000
|
||||
CVE-2024-40728,0,0,5d2cc4c2d64f07952d89d5ed2b4fa506494bbe43569a964ec30192faf719601b,2024-08-01T13:57:55.770000
|
||||
@ -256774,6 +256777,7 @@ CVE-2024-40872,0,0,61b6054f8d04261e92c08a44feec16dc1d8422a97543a2162e5dea5f0a6c8
|
||||
CVE-2024-40873,0,0,6df1707815f9f38105b50cd71b6fad1bdaf7a6f3e3c945bc399ab848fdd0a9bf,2024-08-02T19:57:17.407000
|
||||
CVE-2024-4088,0,0,61cc31924b86843bbd20c326ef7465dc1aa394b548458b2e1a9fc62c09ede628,2024-06-11T17:11:30.193000
|
||||
CVE-2024-40883,0,0,dacd9a67232f6d97da8b548085eb71f69250fd3fec34bd945dc78c157c912274,2024-08-01T12:42:36.933000
|
||||
CVE-2024-40884,1,1,9dc081271de7d95f10da0bf793d111f8d53dd0e5b21b249774ac65c34f857073,2024-08-22T16:15:08.797000
|
||||
CVE-2024-40886,0,0,956e61b02c76a4462886dd7b546df3fa5ab5cdbdf99796901fd42a9badb0564a,2024-08-22T12:48:02.790000
|
||||
CVE-2024-40892,0,0,80f2c69eafcb531435cc671447d237ff8792f374d8c58f10182688d813811ab4,2024-08-21T18:15:09.710000
|
||||
CVE-2024-40893,0,0,3220dba971e1861a31a0659deabcf8dc81ec736d5ed6a5b82a9eb1d0c8650fcc,2024-08-21T18:15:09.803000
|
||||
@ -256948,8 +256952,8 @@ CVE-2024-41050,0,0,39d4269dc6ec271427b4bdd65b9d3d16d3d31b7b1303de1471509f3b60dd1
|
||||
CVE-2024-41051,0,0,828856464b37c81ed12190c5149ddea9cdaf7edfd74019e8a2aa69fd3cf3a9ff,2024-07-29T16:21:52.517000
|
||||
CVE-2024-41052,0,0,02410c9b72898d738184e0b7a3effa9630f2e9d19b23d5deeaa031a00c5a143e,2024-08-21T19:27:26.227000
|
||||
CVE-2024-41053,0,0,f44272aa5841bc62914782889e664342425d762592f8f78de62bccbea7d12c58,2024-08-21T19:21:41.530000
|
||||
CVE-2024-41054,0,1,fb57c1b2d87b0db4b758e5bf9759b6f07aa083fd8f9d243c55e175c8a5861a4a,2024-08-22T14:11:42.053000
|
||||
CVE-2024-41055,0,1,1a51f4529531a736115b87aea4e8a73346ad127f99905a25f3e6e7343b3d1385,2024-08-22T14:11:00.903000
|
||||
CVE-2024-41054,0,0,fb57c1b2d87b0db4b758e5bf9759b6f07aa083fd8f9d243c55e175c8a5861a4a,2024-08-22T14:11:42.053000
|
||||
CVE-2024-41055,0,0,1a51f4529531a736115b87aea4e8a73346ad127f99905a25f3e6e7343b3d1385,2024-08-22T14:11:00.903000
|
||||
CVE-2024-41056,0,0,681ae471fcf06bdb78f6869758eaa87ed447f2fed56eb21007ad5f506a538998,2024-07-29T16:21:52.517000
|
||||
CVE-2024-41057,0,0,a55a0fad7ba15203e2b4b26c71efab49706c9bb2ce1d966486e4544f6f91ab8a,2024-08-22T13:38:03.577000
|
||||
CVE-2024-41058,0,0,31868f2a557744984e7874683aa697ff5ee97c10d7e2f10058c8921d174aaec3,2024-08-21T19:35:22.120000
|
||||
@ -256966,10 +256970,10 @@ CVE-2024-41067,0,0,0efab6bb0225a9dd01a2c48c612b8c9b17f157652f45c02a997409b99216f
|
||||
CVE-2024-41068,0,0,204dddbf2c3055c6474c497e009d780021b3a3ba131c505449bf528ad22a3199,2024-07-29T16:21:52.517000
|
||||
CVE-2024-41069,0,0,66906a938ffa21542183270372c452da3dca88c60e17c7adf5b30603bb4e6f9d,2024-07-29T16:21:52.517000
|
||||
CVE-2024-4107,0,0,ce88498baf95f06d1267d29854f2a9888ac0ddfe7fc00ea3036ccad453e487fa,2024-05-14T16:11:39.510000
|
||||
CVE-2024-41070,0,1,01d1361dcf471afa5275cde4037db2ad5e839a7c0db4ba0fc938ed41752f9a1e,2024-08-22T14:05:32.407000
|
||||
CVE-2024-41070,0,0,01d1361dcf471afa5275cde4037db2ad5e839a7c0db4ba0fc938ed41752f9a1e,2024-08-22T14:05:32.407000
|
||||
CVE-2024-41071,0,0,177c0b40693c47d1cfe95645d274ca4f188f21ea0538c600baca1cfb2270342f,2024-07-29T16:21:52.517000
|
||||
CVE-2024-41072,0,0,9708e45d2def4fb738b5d02d9d55acf1fa8c399eb790a4b712e28e9b74f333ba,2024-07-29T16:21:52.517000
|
||||
CVE-2024-41073,0,1,cab647062b5f8d3239ead637a6bf28b2a45d5584465cb4fcbc7b276fb13535b4,2024-08-22T14:11:28.697000
|
||||
CVE-2024-41073,0,0,cab647062b5f8d3239ead637a6bf28b2a45d5584465cb4fcbc7b276fb13535b4,2024-08-22T14:11:28.697000
|
||||
CVE-2024-41074,0,0,f542082ddf599a04b16950f50752f817590bbf66500823b9fc1bcea6a4f3fe4f,2024-07-29T16:21:52.517000
|
||||
CVE-2024-41075,0,0,7e5f7e52455b6252728f795318b0692091849e92df2f13b0fc7d4653c500eb13,2024-07-29T16:21:52.517000
|
||||
CVE-2024-41076,0,0,16a9781840e0a19b08b657bc21d37f0f27b0c19f577ebc677bd3e135db214aff,2024-08-22T13:23:39.187000
|
||||
@ -257187,7 +257191,7 @@ CVE-2024-41655,0,0,ef3400d9e58c2cde6c539334829c8042d5ee995783a74a46bd16638786b0b
|
||||
CVE-2024-41656,0,0,d1b3325a39b6b3bcc8a959c5c8544c45c6c0440a0b7279ac0753d809322ad5fb,2024-07-24T12:55:13.223000
|
||||
CVE-2024-41657,0,0,9548b1223e9a93c24c88da65f71fa257164363d0fa8c7101bf5615f81fe0c55e,2024-08-21T12:30:33.697000
|
||||
CVE-2024-41658,0,0,6ae504120f32a9740f2609938bf47828d872f6a284b7f6df52aa43fde2a8ed46,2024-08-21T12:30:33.697000
|
||||
CVE-2024-41659,0,0,ac2558137e8051c9ac6fc033ad0bed168630c3da876cc8a763620352aee78d81,2024-08-21T12:30:33.697000
|
||||
CVE-2024-41659,0,1,998a35290d72b0eb949229fc531ef068f95738d64bf6829749ab13d3e732d9a9,2024-08-22T16:15:08.993000
|
||||
CVE-2024-4166,0,0,f698286bcd13839c3e713fc944a2d68390d9d1f07ea9696da7a343bdead6335d,2024-05-17T02:40:17.900000
|
||||
CVE-2024-41660,0,0,4c084a0db17b15ec343b2b75da4e6745a4156a9dd9381d5cdd96e60eb80314c7,2024-08-01T12:42:36.933000
|
||||
CVE-2024-41661,0,0,9bb4ba38de23abec768fb88c25fd9926dc19ebbf46e995b3d88e74cabbdda1a3,2024-07-24T12:55:13.223000
|
||||
@ -257622,23 +257626,23 @@ CVE-2024-42297,0,0,c6a17cd20eb476c36e74835def3dec9425eca068ceb110058bb8cda346565
|
||||
CVE-2024-42298,0,0,847a234781753fbc78128bf1a1b0230495d1dd37b0db004081592c3547d5f698,2024-08-19T12:59:59.177000
|
||||
CVE-2024-42299,0,0,1d9a7f76ca05044914ea6b23419a3afe5dfacda94e0276680ead40f3cc253bdb,2024-08-19T12:59:59.177000
|
||||
CVE-2024-42300,0,0,0085a0d67ebb00a2eb0fdee834d161b381fb524f015d1781780f7c3f00257248,2024-08-19T12:59:59.177000
|
||||
CVE-2024-42301,0,0,caead8f13ad2ac1c26e142953e2d6cde5414964ad9183de15221008c4358bcd5,2024-08-19T12:59:59.177000
|
||||
CVE-2024-42302,0,0,0b3683b86953ebdcb232a1db472077e3496a1972c8f177a4a7086b5fe39dc5d1,2024-08-19T12:59:59.177000
|
||||
CVE-2024-42301,0,1,8d0c14aa5ce2bd9cfafdc53d1d4803a15deeb7dea9cf4dee21ca58c87d5e7b73,2024-08-22T16:31:18.667000
|
||||
CVE-2024-42302,0,1,ac5603e3536d5d3d4e183c896c42b27487b96235a32c9669ebd773415a745978,2024-08-22T16:37:26.237000
|
||||
CVE-2024-42303,0,0,dcf78b75f0f625f0e1e5df3b0bc433e9d8484bdabfad7ed343c7012b7aaaf44f,2024-08-19T12:59:59.177000
|
||||
CVE-2024-42304,0,0,d173e622eb62d973d07785876ea39085958d8e911790210e06238340260b1d9a,2024-08-19T12:59:59.177000
|
||||
CVE-2024-42305,0,0,2a0027efaf18337e14a39532daab3b0d02ba1e240704105fd7925f4d1b755c9a,2024-08-19T12:59:59.177000
|
||||
CVE-2024-42306,0,0,ecd4db3e8cdd17b10ea08b2eca0729317a2688c0bef58523ae201bb7d84633e3,2024-08-19T12:59:59.177000
|
||||
CVE-2024-42307,0,0,021c1bf3b0b2f8d64c924e06216b8a74c38217276f58a374fe838603733c4495,2024-08-19T12:59:59.177000
|
||||
CVE-2024-42308,0,0,2a36ea46f924932ba8b403ffa81309ed7322f08858d89457f1ac73d7be8c21fe,2024-08-19T12:59:59.177000
|
||||
CVE-2024-42309,0,0,f3857da62a239a8937a6a8f660f19b33121ce903bc957d8a2a5fc7bd82bd8d6c,2024-08-19T12:59:59.177000
|
||||
CVE-2024-42309,0,1,620e4db2a37ec65908b26f0c89994589b6187d0cfe5ed9c47a2f3dc54d759d19,2024-08-22T16:01:29.287000
|
||||
CVE-2024-4231,0,0,c87a42b4dfede9046d13b34e260c0c7ec4e51f68f0fbfb8755010b78e39f405d,2024-08-01T13:59:28.843000
|
||||
CVE-2024-42310,0,0,7629386c3f41aa6a34e41a6c5d349fabbd9abea6dcdeef93571adcc63039d396,2024-08-19T12:59:59.177000
|
||||
CVE-2024-42310,0,1,400c9cfae2eb45fa11efe161bf5c79e5b421ec2976855d764d0806127b25caf0,2024-08-22T16:01:46.263000
|
||||
CVE-2024-42311,0,0,ee026ffaa3435a8fee00e98fff3782a46b4f2eff532aed7bff974de91275ee18,2024-08-19T12:59:59.177000
|
||||
CVE-2024-42312,0,0,8419f66ad6ae63296361d79f9dacef9b878e08f5aec63988a53ec2b285c951e4,2024-08-19T12:59:59.177000
|
||||
CVE-2024-42313,0,0,f319d0057aa3cd90f1188c53e50e737fae9be2ccf322f07044c4d422a41859d3,2024-08-19T12:59:59.177000
|
||||
CVE-2024-42314,0,1,89c58dc7b3cd8b2fd3f960c13bee9362713642d22d4898076c0acf86c2564d4a,2024-08-22T15:50:47.437000
|
||||
CVE-2024-42315,0,1,ad8e62245cec9b91e03cf0701da404d6b4ca5f784fbecb811226908929f71f6e,2024-08-22T15:51:03.077000
|
||||
CVE-2024-42316,0,1,5b706fe03d29a1efdfca0a0866006926090ec5745ff3a19fc18eeaca74a060eb,2024-08-22T15:52:38.520000
|
||||
CVE-2024-42313,0,1,9c1d5c48d055f58f1d9db953b1d9df536df6f372c5b4c034423cf0ca1e8ccaa9,2024-08-22T16:01:59.467000
|
||||
CVE-2024-42314,0,0,89c58dc7b3cd8b2fd3f960c13bee9362713642d22d4898076c0acf86c2564d4a,2024-08-22T15:50:47.437000
|
||||
CVE-2024-42315,0,0,ad8e62245cec9b91e03cf0701da404d6b4ca5f784fbecb811226908929f71f6e,2024-08-22T15:51:03.077000
|
||||
CVE-2024-42316,0,0,5b706fe03d29a1efdfca0a0866006926090ec5745ff3a19fc18eeaca74a060eb,2024-08-22T15:52:38.520000
|
||||
CVE-2024-42317,0,0,44f472938e0f5464917f6f6f19a154afd8a7d285193dd7544e55d6415831a573,2024-08-19T12:59:59.177000
|
||||
CVE-2024-42318,0,0,9010727792eb410d1e9ad3b39440509d19383e8fe33f90305bb640c17c956a4b,2024-08-19T12:59:59.177000
|
||||
CVE-2024-42319,0,0,eb5fc32e810c02d0e4bc3b0d9ebaf0ea35abaefd35cea63e1339820db2a46ad1,2024-08-19T12:59:59.177000
|
||||
@ -257741,7 +257745,9 @@ CVE-2024-42487,0,0,2efeb3a744823d93cb77dca921c5d1e1876bd604d6d9b9e3d12e2ec5d005b
|
||||
CVE-2024-42488,0,0,d4b28d6f7587a9892f3e1f2f60f322ad605b2174a3099ed0ae0224cdeca7655d,2024-08-19T13:00:23.117000
|
||||
CVE-2024-42489,0,0,cdd86cc62ae99e91c414cd210e2840035f1a515c38caae18a4e22c79cdb0af72,2024-08-12T18:57:17.383000
|
||||
CVE-2024-4249,0,0,20dbadf05c38d413ed14f5d424310da5ffa119a0ccbbcb5b690e0c54ceac344f,2024-06-04T19:20:34.093000
|
||||
CVE-2024-42490,1,1,3eec40446c13f9eb28bd32bc94ff39cd886335dbb08831b09e891eacc1349c53,2024-08-22T16:15:09.117000
|
||||
CVE-2024-42493,0,0,f6b5486c33bc66cf003608659d12007760e6f11e14f162d8f0f6b524c3d0cd10,2024-08-08T18:55:19.180000
|
||||
CVE-2024-42497,1,1,d0db13532a5ddb0f8eb4c11c984e4109db7e68721821582b492c07273b6e93f5,2024-08-22T16:15:09.330000
|
||||
CVE-2024-4250,0,0,29d8096febeb47af7a705b5c5f44b0e0121b5483d3074c39ff1bff1155e9a3a5,2024-06-04T19:20:34.200000
|
||||
CVE-2024-4251,0,0,4911c8bef2a1e60ace7e3694403733ed66cd48ed80870211c4240e0e24584389,2024-06-04T19:20:34.297000
|
||||
CVE-2024-4252,0,0,9237a844d9d9b4c175441eb52c39ce07fc14167f47531df4616e5c1079e2e93b,2024-05-17T02:40:21.053000
|
||||
@ -257754,7 +257760,7 @@ CVE-2024-42546,0,0,fb60d203dacd557a0d6c3dd4a088a3933e203b772ae4b090e279b0a2f7b98
|
||||
CVE-2024-42547,0,0,35eeb010fca94dc794f14fe3c29b0586f2dd6b453f1de383f4e89dde1cb85973,2024-08-13T17:08:12.543000
|
||||
CVE-2024-4255,0,0,35fd058a4cc0a80e19d25400a3e944345c636d8ef400085f905d7b019af7edbf,2024-06-04T19:20:34.420000
|
||||
CVE-2024-42550,0,0,fc040a9fdb9874d1ee6063db817db51f08698296778147bc870cf1ae6bde398f,2024-08-21T17:24:59.627000
|
||||
CVE-2024-42552,0,1,b6da6172bfaee31e780122f380efcaf48a37ee35d069ec9b3f7a187aa14d2135,2024-08-22T15:35:09.600000
|
||||
CVE-2024-42552,0,0,b6da6172bfaee31e780122f380efcaf48a37ee35d069ec9b3f7a187aa14d2135,2024-08-22T15:35:09.600000
|
||||
CVE-2024-42553,0,0,2423da66b36b5ac46e4d328e5cb18cc8071803cc838cae0003cc2096a1c3dcbb,2024-08-20T16:35:22.120000
|
||||
CVE-2024-42554,0,0,e7093d400617647f295578e1e2a0acba43985e714edb761c848d698d7a6942ea,2024-08-20T15:44:20.567000
|
||||
CVE-2024-42555,0,0,0a22b9ad39decd5ee3fb21d58c15efa0c29c80c6617d4653453476c140cafc1c,2024-08-20T16:35:23.320000
|
||||
@ -257777,7 +257783,7 @@ CVE-2024-4257,0,0,e0d599f1bfc48408556261adebbc05066e8b6b86cdfabfa8d99484b6710fdc
|
||||
CVE-2024-42570,0,0,f4fb85a858f58c2f291542defe868101fdd651787665eab2245b6ac99f2a7d38,2024-08-21T13:46:00.837000
|
||||
CVE-2024-42571,0,0,1c554bb814a228d2952a27acace697648b5faf72b3d0b65c235a3480b0e47c2a,2024-08-20T15:44:20.567000
|
||||
CVE-2024-42572,0,0,8a27d950b3f1c9ad5db7a77b1ee249eea67e2798f67a1d2d16a37bd410483cab,2024-08-21T16:35:10.263000
|
||||
CVE-2024-42573,0,1,00fbca41f1add93c23ba10874512b85c0d8d54a0b0357866c6b56806fe4c20af,2024-08-22T14:35:09.667000
|
||||
CVE-2024-42573,0,0,00fbca41f1add93c23ba10874512b85c0d8d54a0b0357866c6b56806fe4c20af,2024-08-22T14:35:09.667000
|
||||
CVE-2024-42574,0,0,aa616629d677652eb91e6bb032b777df1c13de96e0b62fbe4b20bbe0e1fe4f9a,2024-08-21T13:44:39.147000
|
||||
CVE-2024-42575,0,0,cf2b2349db3c76ced20b6aa1a9b6de0d11718de3d1ae748f38b2de1c10e7197a,2024-08-21T13:43:06.420000
|
||||
CVE-2024-42576,0,0,d7eb868484ad37f21c56ed60bc9cbb03790a1e242dbcb4957b7f3d19f6553c68,2024-08-20T16:35:29.750000
|
||||
@ -257792,7 +257798,7 @@ CVE-2024-42583,0,0,8fd0440f353ad964c47cf3a77100747b6a669fde220cd35bfe86af45e7c13
|
||||
CVE-2024-42584,0,0,1d49fc6ba26b04e6a414935584dbbc10ccedbe7e9c02f914a1b9e55e373062b9,2024-08-21T13:37:57.767000
|
||||
CVE-2024-42585,0,0,a5c96f6969903c085392629454a335ad16ad53dd668e8958bf965c31b35d6775,2024-08-20T16:35:31.307000
|
||||
CVE-2024-42586,0,0,cbadbedcb4b3c2d2ab907140f92a66b7af1f959a0d34de9272c8d68911fd44f3,2024-08-20T16:35:33.523000
|
||||
CVE-2024-42598,0,0,f84068afa431dac666314c81a0e0ae65b2644ef29efa564d1b4da4b712849c95,2024-08-21T12:30:33.697000
|
||||
CVE-2024-42598,0,1,0d05d8dab7d3f4ad09766e52642da392dd15ece228ebf0dca63459f8d654e22f,2024-08-22T16:35:06.180000
|
||||
CVE-2024-4260,0,0,16d46a0b5bcb66a093fc7ed1472e8a955d65f29368360dc29eff1d3d84145b9b,2024-08-01T13:59:29.547000
|
||||
CVE-2024-42603,0,0,994e52c74dfb66d27249c2b65181ca74c70f6e7f1904d6fd7ee8f461dc2cc6fb,2024-08-21T13:21:56.383000
|
||||
CVE-2024-42604,0,0,53718c28d04ee9ff5e5273896e62f5eef0651385f9073829087b371924096be7,2024-08-21T20:35:05.780000
|
||||
@ -257864,16 +257870,24 @@ CVE-2024-42748,0,0,52e6e14746af30f6f3124891b89bbdbe775ebb6c4232d3347332f267006d0
|
||||
CVE-2024-4275,0,0,c229bc373f94c5248df137d0b0d9ca9d61bf79f845040a419335cc081cba5e27,2024-05-14T16:11:39.510000
|
||||
CVE-2024-42757,0,0,7f6ba25a82908bfc7acb20e761fdbba6f23f597232f39843fc1cc43949e3074d,2024-08-20T15:35:25.190000
|
||||
CVE-2024-42758,0,0,78591070e9343c09b0ea814d5b331b967691862f9b02d6e8c624fb011530a86d,2024-08-19T18:35:14.237000
|
||||
CVE-2024-42768,1,1,f79fea926bde9b879e5109e9d7ccf7da6d7b9e28012b3c5dc2bf1594038712ee,2024-08-22T17:15:05.693000
|
||||
CVE-2024-42769,1,1,37a87960c5f28ee9d84e69b3adbbcc050439fae36edce7f7fe85a762297528f7,2024-08-22T16:15:09.553000
|
||||
CVE-2024-4277,0,0,ec975a6ab8cd435ccab2b915965095df8c992e1e8e765cf73bc6d545aa3b1e0a,2024-05-14T16:11:39.510000
|
||||
CVE-2024-42770,1,1,213f338c118c1cbe17f8bc7d2011a969fb5d543d85c27b7a3da8ddf6af65531b,2024-08-22T16:35:07.240000
|
||||
CVE-2024-42771,1,1,09314c32302b97a3ccd054edfa4f9fecdf9b3ff025c4bc8ffc2b2a2979a12fc6,2024-08-22T16:15:09.730000
|
||||
CVE-2024-42772,1,1,4e62c39f7bbbd2ec4d9b0e556f4f946eb46f70662b958385c3fcf0b92905f592,2024-08-22T17:15:06.070000
|
||||
CVE-2024-42774,1,1,e14a4cf75acb6188434ccbc606909ebe07b86cbdf9dea44d004ad7863a967a10,2024-08-22T17:15:06.350000
|
||||
CVE-2024-42775,1,1,2e0cd48608fe41915ec9ff64309439001962a490bdbb2f88a448015aea179620,2024-08-22T17:15:06.580000
|
||||
CVE-2024-42776,1,1,5f7f3b3e4bf3124870102683953b810d90bbd4ef60cd4045588d0a7f7c2e3caa,2024-08-22T17:15:06.807000
|
||||
CVE-2024-42777,0,0,a3a6a3f436d63757d909e35bf85227d948a610bf403bbf409724424474f99244,2024-08-22T12:48:02.790000
|
||||
CVE-2024-42778,0,0,cbd3903a79923424c789bda04b10d0059fc6638bf85821cf7827574c1f012c42,2024-08-22T12:48:02.790000
|
||||
CVE-2024-42779,0,1,7fa9347fecf8bb1f718d36d92bb608ba8868bf482dadae633b850723bf230632,2024-08-22T14:35:10.640000
|
||||
CVE-2024-42778,0,1,d764d72d39cc4183a1af0d7e19f09d7d0960ab591232c3ea88adf9b672102c66,2024-08-22T17:46:56.953000
|
||||
CVE-2024-42779,0,0,7fa9347fecf8bb1f718d36d92bb608ba8868bf482dadae633b850723bf230632,2024-08-22T14:35:10.640000
|
||||
CVE-2024-42780,0,0,e826593252205b3d8e5034341498fa244d03108b73f3ad8c82b84c6b7276e451,2024-08-22T12:48:02.790000
|
||||
CVE-2024-42781,0,1,68007156c17ee47f298a37cc150f13de3eb35249db160856cb2b8565b92d98bf,2024-08-22T14:35:11.393000
|
||||
CVE-2024-42782,0,1,c88036a1a9c99d71bfc251d5b6c0be95ab852a5980a0325b1c2181381dc03814,2024-08-22T15:35:10.447000
|
||||
CVE-2024-42783,0,0,51b01d67e90dd0e5b487abeb0faf3db05121eacfedd764dc830d4e6e024a03dc,2024-08-22T12:48:02.790000
|
||||
CVE-2024-42784,0,1,ae6453c1305840d7826f5fb04807ac2e6014377b83456873440c2250d93d806e,2024-08-22T14:35:12.170000
|
||||
CVE-2024-42785,0,1,b5ca1c8cf409a09fd190be5882a3f1065d93ed2d64fe581fb5571056dcc4c9c5,2024-08-22T15:35:11.450000
|
||||
CVE-2024-42781,0,0,68007156c17ee47f298a37cc150f13de3eb35249db160856cb2b8565b92d98bf,2024-08-22T14:35:11.393000
|
||||
CVE-2024-42782,0,0,c88036a1a9c99d71bfc251d5b6c0be95ab852a5980a0325b1c2181381dc03814,2024-08-22T15:35:10.447000
|
||||
CVE-2024-42783,0,1,a90f42465fb73d63717350e61bed2a1d2459bfb1585238e07a16ef63fa6fdfc7,2024-08-22T17:35:07.750000
|
||||
CVE-2024-42784,0,0,ae6453c1305840d7826f5fb04807ac2e6014377b83456873440c2250d93d806e,2024-08-22T14:35:12.170000
|
||||
CVE-2024-42785,0,0,b5ca1c8cf409a09fd190be5882a3f1065d93ed2d64fe581fb5571056dcc4c9c5,2024-08-22T15:35:11.450000
|
||||
CVE-2024-42786,0,0,45cc74a129f840b910b7eae19f93b2633379a97760df9aaea4e54ee022b13d38,2024-08-22T12:48:02.790000
|
||||
CVE-2024-4279,0,0,dfbad3c4052d0097199e5a57f42abb52975c0de3af4475a04c90870b0d97f015,2024-05-16T13:03:05.353000
|
||||
CVE-2024-4280,0,0,f46c38f13eff52b4d020fb374e18f92e6528a4bade2042627b2165ccf7b62772,2024-05-14T16:11:39.510000
|
||||
@ -257947,7 +257961,7 @@ CVE-2024-4302,0,0,3989b291497fea424d341ee8d50afc238ccc795cfb4606a4430491f615d9ea
|
||||
CVE-2024-43022,0,0,60b15925d48bd4a0544b6a90b44d37dd7b45f132534cfb6161c485e040769eb2,2024-08-21T18:35:09.733000
|
||||
CVE-2024-43027,0,0,023646627aeb42c9f27c70e233b2b26c2ec04024033b793398340bc23e8b2b89,2024-08-21T17:25:08.560000
|
||||
CVE-2024-4303,0,0,83a712aebf2d4281174fc319c5a3b5ed1f6b2a8b7c1590974611c884faeb0657,2024-04-29T12:42:03.667000
|
||||
CVE-2024-43033,0,0,99cabe3267561648c475535e19333b9cef7520f92aec3b6c534e35c1c6ff27a7,2024-08-22T12:48:02.790000
|
||||
CVE-2024-43033,0,1,fd57d359a27fcaf19587aca04a23681152ba867b02d3eb512220398c8467fb35,2024-08-22T16:35:08.663000
|
||||
CVE-2024-4304,0,0,cc036c021f3a6e70e19e6533fc0c5b7e8e9615d68f40d67450c876ce97ebcd8f,2024-04-29T12:42:03.667000
|
||||
CVE-2024-43042,0,0,b853bda14fa02964a16c19d1896f72364ccfb9e1c7f5c0faac2a5ae6d185d191,2024-08-19T13:00:23.117000
|
||||
CVE-2024-43044,0,0,0f847f7b25552f59db6fe108bc5868ae7095ef3bf92eb01d14caa8a1c32e542a,2024-08-16T17:19:30.643000
|
||||
@ -258132,7 +258146,7 @@ CVE-2024-4339,0,0,240ed7230e0a6e458ae0cd6534f1dc024d6c16f3537e0357643e823e6aa095
|
||||
CVE-2024-43395,0,0,e2392bf6475b12db51f31adf2ecd9f40f62cf7ccf326ac732a93b8b209786a49,2024-08-19T13:00:23.117000
|
||||
CVE-2024-43396,0,0,72cb7f8de5e6cc0fddf41576db9b3a5c979441bdbeba09448d4bb5c685d81cca,2024-08-21T12:30:33.697000
|
||||
CVE-2024-43397,0,0,264c2f81cd99428d5aa158f1dc2af7c3c349186ea362901e061722c9a7a0394f,2024-08-20T15:44:20.567000
|
||||
CVE-2024-43398,1,1,a88a0edf1fdebfdbb2faeb4a91b7e6ae77f78605c717ab0209af377bd1e321d9,2024-08-22T15:15:16.440000
|
||||
CVE-2024-43398,0,0,a88a0edf1fdebfdbb2faeb4a91b7e6ae77f78605c717ab0209af377bd1e321d9,2024-08-22T15:15:16.440000
|
||||
CVE-2024-43399,0,0,72972aa8210630cb7e9ed019395b1964574a7b9fdb0cdecaf47d033016a56fac,2024-08-20T16:21:22.747000
|
||||
CVE-2024-4340,0,0,47279ef0860b5c8c8bd0a3697c64eecb43c1be11e1b93224b8fe23143c960d81,2024-04-30T17:52:35.057000
|
||||
CVE-2024-43400,0,0,a74902014f54105a8fa235ae36e5688fa3ffdb525b8d03b30be1350fafa88962,2024-08-20T16:10:29.987000
|
||||
@ -258184,8 +258198,9 @@ CVE-2024-4375,0,0,a80e63d12c12bb1a4c76673525f796ba2c31674a917e8feea214a8d89539b3
|
||||
CVE-2024-4376,0,0,7b257e3003fee7879c886112d028b58d973966a06334b732b2628be71d9e1e45,2024-05-31T13:01:46.727000
|
||||
CVE-2024-4377,0,0,1f0bc109d8a6e47162fe7e13cb7db22957e997f770c56ad1361c99539d4a2fb0,2024-07-17T02:53:06.217000
|
||||
CVE-2024-4378,0,0,09f9e04bae659373b82712486e7efa4baa3211e21ee904b68f572ef978953753,2024-05-24T01:15:30.977000
|
||||
CVE-2024-43785,1,1,28e6190998a7b50827ca97edc90f225bf92dffe8990a6186f86e2a71f0d4359d,2024-08-22T15:15:16.670000
|
||||
CVE-2024-43787,1,1,f61db6f79a1095039a5ac89944b6da6b584fb7e6ecf3d75d3d252fa665e365d1,2024-08-22T15:15:16.857000
|
||||
CVE-2024-43780,1,1,68f06be6c51bd11b2023e49700a53e54fa3dac62a141055bb7230734e17bb0b3,2024-08-22T16:15:09.897000
|
||||
CVE-2024-43785,0,0,28e6190998a7b50827ca97edc90f225bf92dffe8990a6186f86e2a71f0d4359d,2024-08-22T15:15:16.670000
|
||||
CVE-2024-43787,0,0,f61db6f79a1095039a5ac89944b6da6b584fb7e6ecf3d75d3d252fa665e365d1,2024-08-22T15:15:16.857000
|
||||
CVE-2024-4379,0,0,21c1593ccdc9c542b9ca9b0ba403ad32afbc0c98a6b0c8f514039e188e2373a7,2024-05-31T13:01:46.727000
|
||||
CVE-2024-43807,0,0,3f91dd87019f53cf891d3a83100dd5c601626acd9f1336f0bde904afb8c4caa9,2024-08-19T21:09:42.313000
|
||||
CVE-2024-43808,0,0,5904dacb826507090b9d583058f58aa9b73c36079d8a4861440bfd52d34f3890,2024-08-19T21:10:14.093000
|
||||
@ -258207,17 +258222,17 @@ CVE-2024-43824,0,0,3e6d9611c9c00713f2825d42dd41c9169c00e57ef1735c1ac7eade065567c
|
||||
CVE-2024-43825,0,0,130af7d96288110e02aee1e7600bdbf8c5cd66dfe2f98ab074c672e68f4722cd,2024-08-19T12:59:59.177000
|
||||
CVE-2024-43826,0,0,a71e01ef1f7bf0e81ff2e96aa2e3536879a0a625a8e0f17873ad3f06283b51ad,2024-08-19T12:59:59.177000
|
||||
CVE-2024-43827,0,0,cf65368434e7a2b682a9d717038e50932b650d5aee79f4ae380ff9863f20dec9,2024-08-19T12:59:59.177000
|
||||
CVE-2024-43828,0,1,34d93531989f41b09094ffb798c3bd14e32cc02dc3ecd2194ff28e1c3f3ed704,2024-08-22T15:41:50.870000
|
||||
CVE-2024-43828,0,0,34d93531989f41b09094ffb798c3bd14e32cc02dc3ecd2194ff28e1c3f3ed704,2024-08-22T15:41:50.870000
|
||||
CVE-2024-43829,0,0,cb6e8b0f01b87b3f7e043e1ec20f970771e88fee11f056198306c40048ba4acc,2024-08-19T12:59:59.177000
|
||||
CVE-2024-4383,0,0,79a386b1175f996c5232e33e8542f544a0804b6992fb3e16e7f612c169e16a45,2024-05-14T16:11:39.510000
|
||||
CVE-2024-43830,0,0,0c202a646bcfaaaa39d2cb27400c7552b5186a7ed520c033e84fbd5365796f5a,2024-08-19T12:59:59.177000
|
||||
CVE-2024-43831,0,0,d2d2b5793f8c890b4b992408f65959bbc46269161bd855b4336fdc8262090039,2024-08-19T12:59:59.177000
|
||||
CVE-2024-43832,0,0,15442ca051ab0155fadf84dac6604a0024bcf8cf7f43b8779d15dbd2c77cba17,2024-08-19T12:59:59.177000
|
||||
CVE-2024-43833,0,1,b30b83d76397439bef43f76504d35264f0368821411284c2b15462cf53f03404,2024-08-22T15:42:46.827000
|
||||
CVE-2024-43833,0,0,b30b83d76397439bef43f76504d35264f0368821411284c2b15462cf53f03404,2024-08-22T15:42:46.827000
|
||||
CVE-2024-43834,0,0,76e2d6369e7d6ad23c4c79e5f16adb028cca8d18769694b501fae11b3f998575,2024-08-19T12:59:59.177000
|
||||
CVE-2024-43835,0,0,311ffd76c4938846026877fe43e10ffa3dcd91fe42160a62635c5b77934d0f9c,2024-08-19T12:59:59.177000
|
||||
CVE-2024-43836,0,1,e20113b16d82c5c2e4bb122ce52a725f5444590d487c2fb8daa577de32ce154c,2024-08-22T15:43:26.303000
|
||||
CVE-2024-43837,0,1,2029cea2c86194c36b6c131e1ea74e1961ace80d0c79989b0fb86fab2b65d1ae,2024-08-22T15:44:03.417000
|
||||
CVE-2024-43836,0,0,e20113b16d82c5c2e4bb122ce52a725f5444590d487c2fb8daa577de32ce154c,2024-08-22T15:43:26.303000
|
||||
CVE-2024-43837,0,0,2029cea2c86194c36b6c131e1ea74e1961ace80d0c79989b0fb86fab2b65d1ae,2024-08-22T15:44:03.417000
|
||||
CVE-2024-43838,0,0,aea18ddc95b4597b8fcc9d42c5f12cf2294cab2381941209a829361028b9d783,2024-08-19T12:59:59.177000
|
||||
CVE-2024-43839,0,0,8837353b52a881be05b25b7fd8ffdec6b5f99540c518bf74d996a0bee6721fa2,2024-08-19T12:59:59.177000
|
||||
CVE-2024-4384,0,0,9e6f6b1cee0183a069a2a4eaff8415209b35f5a05fd8cbbb389885858a6f3133,2024-07-17T03:01:34.710000
|
||||
@ -258237,13 +258252,13 @@ CVE-2024-43851,0,0,6b377a11182d300738f6cb3fcaa1aa4d6b0f57bbe7852e35522a14ee29006
|
||||
CVE-2024-43852,0,0,e16a39e3485e6268d56a06e4f3ecc24b277dfc853c8871fb0e21f6f409c0a86d,2024-08-20T19:32:55.747000
|
||||
CVE-2024-43853,0,0,a19fb14377c7f24b756633650bd958b6ae843b7b6d8ad25c4d37bcd34b5bda34,2024-08-19T12:59:59.177000
|
||||
CVE-2024-43854,0,0,bfd585f1c370eaecf2bb935c34690deac5522a5908f7d4c85b08d25eb0247bd2,2024-08-19T12:59:59.177000
|
||||
CVE-2024-43855,0,0,a9b8211410258f4ffe87936e444a57fe6490500086ef370c1971203a7afdbfa5,2024-08-19T12:59:59.177000
|
||||
CVE-2024-43856,0,0,fab4f725e5b2de51e970479f70c02584de7e4545aff52946b15484a07327fa35,2024-08-19T12:59:59.177000
|
||||
CVE-2024-43857,0,0,3aa0fb2c08cbc6f19d63bea60ecd0d0f6f6d707a2c686c62895296204e029743,2024-08-19T12:59:59.177000
|
||||
CVE-2024-43858,0,0,0a0385cf9d0c0fc9eaa0d371a3762bcf312c0ca0ce4acfe991bb8d771b07e26f,2024-08-19T12:59:59.177000
|
||||
CVE-2024-43859,0,0,9712b932918a4c9b01b9c17486755a7d630a29290c2554f3a970daffc82e20d5,2024-08-19T12:59:59.177000
|
||||
CVE-2024-43855,0,1,b20a91fb4977616b14c0349af9fe6fdf38deab2ab7796fadba2ea00dab4f6345,2024-08-22T17:48:09.100000
|
||||
CVE-2024-43856,0,1,91d346c264b1a27e13a95a79650da4390a2d02a7cc5798231b8314954af3044d,2024-08-22T17:57:08.640000
|
||||
CVE-2024-43857,0,1,1770874efc8d117e3bd251f738e88729b0ef15b20bed1182b733a19e974e06d4,2024-08-22T17:38:21.003000
|
||||
CVE-2024-43858,0,1,af09898ffa278eaf458ba54f4590eb4fb3ade046d9a31e9697e73bd46738182b,2024-08-22T17:40:11.663000
|
||||
CVE-2024-43859,0,1,c80f1d20a200e8e7c04740035b687c5519ed09874bdbbd064f52b001212ddb3c,2024-08-22T17:28:28.490000
|
||||
CVE-2024-4386,0,0,731d04018d6299c9e1d8f7a212148a53db39578a94a703a0b90337f63dd3089f,2024-05-14T16:11:39.510000
|
||||
CVE-2024-43860,0,0,491920f1c1ab45942801557921424048533e33d83993551563440b271ac0e9b2,2024-08-19T12:59:59.177000
|
||||
CVE-2024-43860,0,1,09f701f7954bb547deb131405fc8454ea2909d63034fedfeaae4e6b22ac05cfc,2024-08-22T17:08:15.097000
|
||||
CVE-2024-43861,0,0,356b6dbbcd5535ba76dcd78a87fd5df7522157cacaed0327954273ead9025b21,2024-08-21T12:30:33.697000
|
||||
CVE-2024-43862,0,0,73b429ba4062c240ef5657760dd2797510410c65046b141eae59e5a01f4e0f39,2024-08-21T12:30:33.697000
|
||||
CVE-2024-43863,0,0,8e5e01d22b57359fcf091d9531df2ac12c42d526d43aa46ba9fd057c2b2d9772,2024-08-21T12:30:33.697000
|
||||
@ -258385,15 +258400,18 @@ CVE-2024-4513,0,0,6c3f318b0d8a8c538c1f3920692d132bd9a92a5cfece17f174b91ed826f808
|
||||
CVE-2024-4514,0,0,385303b4c456222ef36bff0fbd012efb4cf0e7eb509cfab25e182e333e168c36,2024-06-04T19:20:40.733000
|
||||
CVE-2024-4515,0,0,745b5001aba1f09f57fb481d2a3d2000635a4a96793fd9115da6678f1f7fddb3,2024-06-04T19:20:40.830000
|
||||
CVE-2024-4516,0,0,7413b58d03a0a8938a8f9c3b85a26b19cfb41e2c50a00216b0df80496b4b87e3,2024-06-04T19:20:40.930000
|
||||
CVE-2024-45163,0,1,d1b8d71b55c9c05a6535a6d473b973daf564bdfb091297232be0a5c5759d6390,2024-08-22T15:35:12.750000
|
||||
CVE-2024-45163,0,0,d1b8d71b55c9c05a6535a6d473b973daf564bdfb091297232be0a5c5759d6390,2024-08-22T15:35:12.750000
|
||||
CVE-2024-45165,0,0,b001eacfea75d370a82a50b82205930e70aa975a85c81e49480bf2cbd2fdd05a,2024-08-22T12:48:02.790000
|
||||
CVE-2024-45166,0,1,a776bd2559e4bed9a84a577a682c1ac93ea07fab716da8fcb660f8b43cc91ea2,2024-08-22T14:35:13.183000
|
||||
CVE-2024-45166,0,0,a776bd2559e4bed9a84a577a682c1ac93ea07fab716da8fcb660f8b43cc91ea2,2024-08-22T14:35:13.183000
|
||||
CVE-2024-45167,0,0,3d6b0e0b6f5108003be15e714060a0ff1cb52ef97b5c6b87863fb941a4eee6b9,2024-08-22T12:48:02.790000
|
||||
CVE-2024-45168,0,1,6124dea0f408bc63748f989f7ce4cf06d1deb9da69f42ab4bdcfa64b8daa0ab1,2024-08-22T14:35:13.957000
|
||||
CVE-2024-45169,0,1,9c1ccfed5f8c51cc81c5cd2eec094329fe2aa7c6c132e4f4099baad9dc306193,2024-08-22T15:35:13.507000
|
||||
CVE-2024-45168,0,0,6124dea0f408bc63748f989f7ce4cf06d1deb9da69f42ab4bdcfa64b8daa0ab1,2024-08-22T14:35:13.957000
|
||||
CVE-2024-45169,0,0,9c1ccfed5f8c51cc81c5cd2eec094329fe2aa7c6c132e4f4099baad9dc306193,2024-08-22T15:35:13.507000
|
||||
CVE-2024-4517,0,0,3fa4b03e407f8fc963e6e42e2d6f56f1c6623d21471e9883bdedad7e9bb00507,2024-06-04T19:20:41.030000
|
||||
CVE-2024-4518,0,0,64c3b6e6e74f6d9fd929463119875b686279109a997143c5dd3ad8e2c1af1355,2024-05-17T02:40:27.187000
|
||||
CVE-2024-4519,0,0,5f7c1c0aa362af4fc3ba7e1d12e176f4028e88f0167af6f63c30c7ec7da86837,2024-06-04T19:20:41.127000
|
||||
CVE-2024-45191,1,1,a815b047b39b41a8006b9cc6e51c48cec3d8d1ca119fb37d18f67f94ea762f7f,2024-08-22T16:15:10.120000
|
||||
CVE-2024-45192,1,1,fb72912d08ea4a658d1c69d4cfebe6a1e383484234c392f3119eb1f8034b4d2e,2024-08-22T16:15:10.237000
|
||||
CVE-2024-45193,1,1,e2d2a95ce15a049c74af7a52d095d6013d9809c1ea23c07c1fdda34b6d50e120,2024-08-22T16:15:10.300000
|
||||
CVE-2024-4520,0,0,b2949348c863aeabf77cf8262dadc8a1301ac645ed88723ebde503df8cb28e51,2024-06-11T17:02:16.967000
|
||||
CVE-2024-4521,0,0,a1d240438f25322e21494c2ddd2f5ee26b23410f012534bc2c27a0a49b09a860,2024-06-04T19:20:41.223000
|
||||
CVE-2024-4522,0,0,acd0b6b231758473c48ed22daa75c2f0d87280406667aa3ced0f39aaa73cb777,2024-06-04T19:20:41.320000
|
||||
@ -258773,7 +258791,7 @@ CVE-2024-4940,0,0,4accffc853c801fe14d0f801549945291e8d9583e559383dea39b767fc7e6f
|
||||
CVE-2024-4941,0,0,13ca0e2a0167ec0b910e07ee313a5634910f0ad60753924b6a13637e3feff21f,2024-06-07T14:56:05.647000
|
||||
CVE-2024-4942,0,0,ec40ecb2c6f2c92030124cf4a899658443926a41ec90982de736f0fdfba6bcb7,2024-07-23T21:09:15.900000
|
||||
CVE-2024-4943,0,0,c3255ca69e7d3076031772cbfca36198fc76d9c4ad7b4e1b0b2d1944b2bfd408,2024-05-21T12:37:59.687000
|
||||
CVE-2024-4944,0,1,4c179510d1e03e5badefb2baa5976b22075fd8af2558d89d09a0401516cd83b3,2024-08-22T15:06:05.480000
|
||||
CVE-2024-4944,0,0,4c179510d1e03e5badefb2baa5976b22075fd8af2558d89d09a0401516cd83b3,2024-08-22T15:06:05.480000
|
||||
CVE-2024-4945,0,0,30a0ab1a0c03dbd140fcf7c71669ea9d01e0f4e5f56736f7caa84678a6833359,2024-06-04T19:20:54.767000
|
||||
CVE-2024-4946,0,0,c62331c31cdff2ac998e7e200ab6653707e57767349d786cb3712d85549cf2ad,2024-06-04T19:20:54.867000
|
||||
CVE-2024-4947,0,0,3635839d47ca4be777d1000c77c519be36c42f5d72cb0c679b358b9a41c64636,2024-08-14T17:07:05.277000
|
||||
@ -259299,8 +259317,8 @@ CVE-2024-5550,0,0,dab352871e5b1599db274fe7ee72f4ef4902afffcd5667b3ef675a3fe452e4
|
||||
CVE-2024-5551,0,0,d4fe322803a15d54f942643eecca544bbc21fd2d50a048ef751f6568e43cd352,2024-08-07T19:09:17.363000
|
||||
CVE-2024-5552,0,0,7f73b574dd8e83d52dd7f28ecc579b960fbf7de562da98c7e63b5b8e0fd54be8,2024-06-07T14:56:05.647000
|
||||
CVE-2024-5553,0,0,c4739ca4bfc71591786473d36aff26ccf561ba778e4c902dca863cedff7bba13,2024-06-13T18:36:09.013000
|
||||
CVE-2024-5554,0,0,74bc30aa41742477c70b24fe6a1325284ef507b86f8f58abff9cf8ec0fe1023d,2024-07-18T12:28:43.707000
|
||||
CVE-2024-5555,0,0,04da76d03dc7341c8a138d42367dd78d50c3a88f001073e3ae48b09dec66a0e6,2024-07-18T12:28:43.707000
|
||||
CVE-2024-5554,0,1,0f1d3226bb0a486c4b917c91c2f0f711d8f9d9fbb5ad6f69f3a6a7fdce6ab9ad,2024-08-22T16:43:52.650000
|
||||
CVE-2024-5555,0,1,ea0332df14a2e6edd0aa953ada9ade3a1da4ea6fb56dda0883a54ace27f96d97,2024-08-22T16:46:14.177000
|
||||
CVE-2024-5557,0,0,71e19027344115370537e5e9f2ac729a9013865b6ffe7632f9b652113dae4753,2024-07-25T20:00:46.653000
|
||||
CVE-2024-5558,0,0,d7061155c6f430b38a1e769635e4eca1c24478e5beedfff7ff120ab1f85e7481,2024-07-25T20:00:25.773000
|
||||
CVE-2024-5559,0,0,0c59604cbf219c2ba1c247f52c304752b12dd0f3c92c8b3c96e21ad233f99b0a,2024-06-13T18:36:09.010000
|
||||
@ -259623,7 +259641,7 @@ CVE-2024-5970,0,0,e17a8b7d022fd70a35f0b32d2191e09c5597e5e1c83547c2cb361b6d17360b
|
||||
CVE-2024-5971,0,0,01d70de536a697a1c65e871f029e293b5051eed9b63fc3f224826d44a6d72378,2024-08-12T13:38:38.567000
|
||||
CVE-2024-5972,0,0,3700c5b3eb4bcd1d3bafe18b568e7aab0a0471128c3ce92a2f73ba8aa9a9cb4f,2024-06-28T19:15:07.500000
|
||||
CVE-2024-5973,0,0,149a91603c9d83724ac65f413ff97fc2f66dbcbaf98a063fb82f82fbdd67043a,2024-08-01T14:00:06.420000
|
||||
CVE-2024-5974,0,1,6465747ebb7259fe338ca54f64293ac9e5e639bde8c31a40e65e3d25cce88c2a,2024-08-22T14:26:55.657000
|
||||
CVE-2024-5974,0,0,6465747ebb7259fe338ca54f64293ac9e5e639bde8c31a40e65e3d25cce88c2a,2024-08-22T14:26:55.657000
|
||||
CVE-2024-5975,0,0,fa255d4ef912d8f8da76e1022132a17caf8538a1c8cca7df81e3eaadac5c5086,2024-08-01T14:00:06.617000
|
||||
CVE-2024-5976,0,0,77b9cc86c9238f37d2799be9bfcfd76dc8bf6ab8aad4ffdc48881bdede83c5f6,2024-08-16T17:53:25.450000
|
||||
CVE-2024-5977,0,0,4e816ebc7667057f83765d2758ec72f0b5ebf68f5f0bba511fae25da75815823,2024-07-19T18:27:34.967000
|
||||
@ -259771,7 +259789,7 @@ CVE-2024-6160,0,0,ef1a3b3e7f3366ded429b369db1d335204ba1e5aa345b7b6a0087f8051f247
|
||||
CVE-2024-6161,0,0,4874ef369326f57ebaead3e865a12df6057ceb7ec30e698c3deb9b52e2b10028,2024-07-09T18:19:14.047000
|
||||
CVE-2024-6162,0,0,42b0c84bb9f8407ee29b440898aa638cfeb455faf60863456bc05225330b70ad,2024-08-05T15:15:54.090000
|
||||
CVE-2024-6163,0,0,38b12c0f7e168992652ab7a71785fb2aab63391cb3f79d2e2dd970485bc5678f,2024-08-20T17:44:11.677000
|
||||
CVE-2024-6164,0,0,8aa2027cddef15962d1efe110931fe9273d01fee626f2b259663e607033be508,2024-08-01T14:00:13.243000
|
||||
CVE-2024-6164,0,1,08afad8ab6b717af0b90be7bbe2f7a32357bf99ca8728b0f338d52b01a06d786,2024-08-22T16:35:18.693000
|
||||
CVE-2024-6165,0,0,6301727d4094498886864a9dae2aa85ba81a15451475733d92db12396ffe834c,2024-08-01T14:00:13.553000
|
||||
CVE-2024-6166,0,0,c93093bf8454afe95675994fb929c06931906789a59088dfba4992e2491ed4c6,2024-07-12T14:23:53.600000
|
||||
CVE-2024-6167,0,0,53411719c1d4f7c7e0b31dcbc40822727b85ab3cd28b45158c4db6b81cb57664,2024-07-09T18:19:14.047000
|
||||
@ -260033,6 +260051,7 @@ CVE-2024-6497,0,0,b980a8afca3367d307f1b8ae084c1de1478e48fcb0a6d42a16be67c3823c34
|
||||
CVE-2024-6498,0,0,630981d31a800e5a325158bdb522b2e1db688d536ea57caaef1013f6348f0ce8,2024-08-05T12:41:45.957000
|
||||
CVE-2024-6500,0,0,d6e17cf29259cccc059c07e88e123ff08e9fd8308cfe5e11844bc5a9a1491c18,2024-08-19T13:00:23.117000
|
||||
CVE-2024-6501,0,0,45d58d6fcd90c3b83531e796541078a549af17f7a81eb1fbfe7d6944aa2bc8ac,2024-07-11T13:06:13.187000
|
||||
CVE-2024-6502,1,1,1f22fb0e7d7ba54b58395d225d1dfe244f49ebfd7f5ec9024690cf313b498a4a,2024-08-22T16:15:10.377000
|
||||
CVE-2024-6504,0,0,8b12236aeea36b8f50ca52878af23b200b8eec2ab40fe418832b1f4c4c6b95f9,2024-07-18T12:28:43.707000
|
||||
CVE-2024-6505,0,0,b8708084cd092b6ca88acb18ad5e80f748f8e2829ec040b8958bfe3c1fee2cd6,2024-07-08T15:41:17.883000
|
||||
CVE-2024-6506,0,0,58310ca3e68e3dacb16dafd9b32db187bdf111a88d3da008267c8c84bbec48d6,2024-07-05T12:55:51.367000
|
||||
@ -260076,8 +260095,8 @@ CVE-2024-6558,0,0,cca325939290855a6fbb36c96da159f7692c9149fa644ac352f933f0f941a7
|
||||
CVE-2024-6559,0,0,2866b76c45bfa3fcb2a29d8b63ef335520f76c77ee94faa7443c1c34b010c185,2024-07-16T13:43:58.773000
|
||||
CVE-2024-6560,0,0,131d869035ca470d33b727fd5e6c3ee539b49dab7fe493b3f3155c0a8f2eb339,2024-07-22T13:00:53.287000
|
||||
CVE-2024-6562,0,0,c488d352cd932104260f046b393896c928145bbead702bb6d934eaf0d4ce07f3,2024-08-12T13:41:36.517000
|
||||
CVE-2024-6563,0,1,4bb6d856aecb1061fe7ddf667198467d6782b1525c7ac168b9de1fadd66e576f,2024-08-22T15:51:55.843000
|
||||
CVE-2024-6564,0,1,f3f35528bc1f72a04108e7734af6c8785498b4db6bab388deb8ec67a1e375b50,2024-08-22T15:52:05.033000
|
||||
CVE-2024-6563,0,0,4bb6d856aecb1061fe7ddf667198467d6782b1525c7ac168b9de1fadd66e576f,2024-08-22T15:51:55.843000
|
||||
CVE-2024-6564,0,0,f3f35528bc1f72a04108e7734af6c8785498b4db6bab388deb8ec67a1e375b50,2024-08-22T15:52:05.033000
|
||||
CVE-2024-6565,0,0,43def900ab0d6afe7974c0f6bcdb1952d3f11b54fce1bb808ab6238edf9d39c2,2024-07-16T13:43:58.773000
|
||||
CVE-2024-6566,0,0,d6506e8698f9fc48107baf6879b3d68aa0d41c6ff56f3284c695ecacd8e825b0,2024-07-29T14:12:08.783000
|
||||
CVE-2024-6567,0,0,9de7307cc0759fd9897fd3f0912c6bf0e2680673968bc0cc458d792904193dbe,2024-08-02T12:59:43.990000
|
||||
@ -260232,7 +260251,7 @@ CVE-2024-6791,0,0,530a9e011d938f884a817484b487117900f43c2f83e7c51084019bfb404fc8
|
||||
CVE-2024-6793,0,0,d3b7076c1491770aa57006b0fda0ca29233a316fd768110e179dab36334b145c,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6794,0,0,deb0448edb68525192d212a4a5bb7cd3beda8036c6e71adf051ab04617417890,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6799,0,0,4139a727efc5bbba878823dd77da7ecbccc0d31113ed4001d69cc00c0e6e86e7,2024-07-19T13:01:44.567000
|
||||
CVE-2024-6800,0,1,a15298e35d6052e73a8ba7e320d06f1ae120c932f1a3656ad087f1be4be328b2,2024-08-22T15:15:17.127000
|
||||
CVE-2024-6800,0,0,a15298e35d6052e73a8ba7e320d06f1ae120c932f1a3656ad087f1be4be328b2,2024-08-22T15:15:17.127000
|
||||
CVE-2024-6801,0,0,6cf94e1980aea6fcc25b038d583cb2250e04ba4c9461d4d907e1f9ce16b1e09a,2024-07-19T14:55:25.753000
|
||||
CVE-2024-6802,0,0,142132499d580419e4ae1b418027d1b34172d0e6fecb143b4079760b02794bc8,2024-08-06T11:16:07.290000
|
||||
CVE-2024-6803,0,0,e77960f60e5c3ea5b22b60c53aac93b8bf6ffc93dd5f015dabaabc8b5a77736e,2024-07-19T15:01:50.250000
|
||||
@ -260396,6 +260415,7 @@ CVE-2024-7100,0,0,dcfec02e0ae4a6f64f97ae0297c66dfbc0aebe11e663bfc596e9b5b147ad74
|
||||
CVE-2024-7101,0,0,5454c1208509de59c11b3527ed3914e0b9b453785a2425c8a2e412da33d0d539,2024-07-26T12:38:41.683000
|
||||
CVE-2024-7105,0,0,a997b2c0e4e91d96626adcc721c978e22c9883ba6b9b8f61b29dff1a03ad516f,2024-07-26T12:38:41.683000
|
||||
CVE-2024-7106,0,0,ff3ffd817a427576052bad31a6af61e50bfb0473d392446ac87a1106350f920d,2024-08-13T14:15:31.030000
|
||||
CVE-2024-7110,1,1,f89c34f450c50e2099e6f7cb76c4d9dbe54e7cd373814ff226a3ae48feb13a3d,2024-08-22T16:15:10.627000
|
||||
CVE-2024-7113,0,0,0a8f4221b6e071d6c72a8ad7c45f4c251b092637dae636c0dfdbfb44a73d4a6e,2024-08-14T02:07:05.410000
|
||||
CVE-2024-7114,0,0,63b5a866782f89fc9f6ac1d30b03e6de66da2ca9dd341d6c07330fc52fb56b69,2024-07-26T12:38:41.683000
|
||||
CVE-2024-7115,0,0,d198b7c0d1a7a67e83535bd15c8ec8b27ae3282d7abe6e695fb34b6781238fb3,2024-08-08T19:06:00.017000
|
||||
@ -260799,7 +260819,7 @@ CVE-2024-7724,0,0,2140d53b1531a123a76a6a3dc8b0dd231e5c8087b65471a97b5981e4adc896
|
||||
CVE-2024-7725,0,0,d259c6d5729bf44a1338f2a16127fec02c9b65e8cb1e5bc73a0892db20205863,2024-08-21T17:24:59.627000
|
||||
CVE-2024-7728,0,0,c0ed30007f00488b5c62db3cfd8f859193059df346d1ebce1c04c936068d2a21,2024-08-14T13:00:37.107000
|
||||
CVE-2024-7729,0,0,b303d5d4be15b474d481a2bd874b63765444e7a77fd0332a4aa454ee055ae189,2024-08-14T13:00:37.107000
|
||||
CVE-2024-7731,0,1,e84a2998e171304858ad1fb8b038e10b362c1589200ef021af448b39d41434b9,2024-08-22T14:40:00.913000
|
||||
CVE-2024-7731,0,0,e84a2998e171304858ad1fb8b038e10b362c1589200ef021af448b39d41434b9,2024-08-22T14:40:00.913000
|
||||
CVE-2024-7732,0,0,d07658c10ed57e2a3eecd9b14e76e8eed0b7a7133550030a1f5039eb59d98d22,2024-08-14T13:00:37.107000
|
||||
CVE-2024-7733,0,0,bb60f9c1721a7d7267312f0897dbc581707f825a01d4c52185c190045c2c2268,2024-08-14T02:07:05.410000
|
||||
CVE-2024-7738,0,0,9abbf70090d4bac2436939ae1d7e5b66071c9e95d911875233a210759cede2ef,2024-08-14T02:07:05.410000
|
||||
@ -260808,7 +260828,7 @@ CVE-2024-7740,0,0,b6b97e22b2a1c91ed733b5ea0db90c7ca386835aea8a2536d78b137aa899a0
|
||||
CVE-2024-7741,0,0,451b4501bfecb549fed2131350eefedffb5605095818bbd2dc73e6ce30b3b5e5,2024-08-21T19:07:40.757000
|
||||
CVE-2024-7742,0,0,5026e5c91e6d01ca137577cf715447f5db3eb9e4e96b1b8aca8896a09ee6d170,2024-08-21T19:08:47.707000
|
||||
CVE-2024-7743,0,0,c910ec910e11d4c23506ee8328b07eddb255cd4474ff1acb5544c0f61f82b883,2024-08-21T19:15:54.553000
|
||||
CVE-2024-7746,0,1,41ddc83547faacdfc7eb4febb4b7b289d12121016bfc1367db838e5c1dc32e37,2024-08-22T14:40:44.167000
|
||||
CVE-2024-7746,0,0,41ddc83547faacdfc7eb4febb4b7b289d12121016bfc1367db838e5c1dc32e37,2024-08-22T14:40:44.167000
|
||||
CVE-2024-7748,0,0,19a9780c8c3e3580e0507d6a06dfe151328aa44e58ebe3ad1d40e684712edce7,2024-08-15T17:22:53.340000
|
||||
CVE-2024-7749,0,0,b1dd92bb0312fc7ae82ed3bd4baca9ef6dbf65c2cbb7e0f4fc4cc1353892f66e,2024-08-15T17:23:28.410000
|
||||
CVE-2024-7750,0,0,ae9806ea563d7ef9ab418b33b0dd9169de6692e64ddca227f95ec3ceb4e78bc1,2024-08-19T17:48:40.913000
|
||||
@ -260914,31 +260934,32 @@ CVE-2024-7947,0,0,65fb4d7d58134ef9bc023552b764ff03308d80cb6ca6d1287d9d812240a193
|
||||
CVE-2024-7948,0,0,10e56bd82889acf527e731295a76df26abf6e1bd128042058528282707ce870d,2024-08-21T13:52:38.057000
|
||||
CVE-2024-7949,0,0,64b957370c21ddcba0bc925ad861d01e09364475441bf650c2c5e65485084163,2024-08-21T19:15:13.600000
|
||||
CVE-2024-7958,0,0,483ea949f242fd0880547068782264d397026329e525a14dcbacca7c22e7bcec,2024-08-19T20:15:08.907000
|
||||
CVE-2024-7964,0,0,8822f6b0f0610850bdf35210ea8c688feaf1f86028ec6dbf869e1fa875ccb60c,2024-08-22T12:48:02.790000
|
||||
CVE-2024-7965,0,1,efa0555bbb67557f1f4f029b94195e1d9dc4a9cf7b553840ebdc5072a02f2db9,2024-08-22T14:35:15.280000
|
||||
CVE-2024-7966,0,0,bfc4dcef3c5ead5653786d3a4b93da692b661a8241304cdd64aab76d453ac1d2,2024-08-22T12:48:02.790000
|
||||
CVE-2024-7967,0,1,6b9e3bc6003fa2e0640f930f9d670867e7411229c66a601e6cbe6f8eaf351c0d,2024-08-22T14:35:16.310000
|
||||
CVE-2024-7968,0,0,0ebd8028130b08086583f2e4531b9cd31f970806eb24b143727e1e6e521961f5,2024-08-22T12:48:02.790000
|
||||
CVE-2024-7969,0,0,aa07c52d9525fdaa1180f7ff2dbd0076c66d561ef11dc8515b79089ee13f0362,2024-08-22T12:48:02.790000
|
||||
CVE-2024-7971,0,1,5406efa61c68652b55c12fe54555241d6d0e600bbe58e6909119226df13133b0,2024-08-22T14:35:17.313000
|
||||
CVE-2024-7972,0,1,70b5b4000609ceeb60deedf7c0d82b9e59e80aae5bf8399f48b8e878bf408f8b,2024-08-22T15:35:14.597000
|
||||
CVE-2024-7973,0,1,fb795d32a144ad521439e1fe4e5042ac17e2b8505faf35a28d1bc7d4c5a4483d,2024-08-22T15:35:15.597000
|
||||
CVE-2024-7974,0,0,c6bac75b54c27669e52a449b9a88647f34bd6ebea8da4faee12acd929ef504f5,2024-08-22T12:48:02.790000
|
||||
CVE-2024-7975,0,0,52128ff84c744d1b190f65e7e327a1f36e2267fddcf188901cfc28d850ae5349,2024-08-22T12:48:02.790000
|
||||
CVE-2024-7976,0,0,f4323ba6e769363619b25624a388acbb9ef8dd02a9844111618d9bccec1ec677,2024-08-22T12:48:02.790000
|
||||
CVE-2024-7977,0,0,cb03e76d70d875478cbce54a8fac8cf14535f3d8b92869a3662e5af0a00fa301,2024-08-22T12:48:02.790000
|
||||
CVE-2024-7978,0,0,fac0e6ae590e44513f6f54583d29dc6e4263f99b9f6fb091ee007b07e379e63d,2024-08-22T12:48:02.790000
|
||||
CVE-2024-7979,0,1,078bf6b1178f274a34fc1356c3dbffb7074d9c903c74e589d1b081f58230d3ec,2024-08-22T15:35:16.610000
|
||||
CVE-2024-7980,0,1,1661097b9193f473ee067de4d4f40312756af353419ed3265d5438cf70d837f5,2024-08-22T15:35:17.610000
|
||||
CVE-2024-7981,0,0,09a1fc9846d85ff0684e8acda10679cdc6d747c523e3f84989fb6a6f8203bb91,2024-08-22T12:48:02.790000
|
||||
CVE-2024-7964,0,1,c52134917f72c90e63a54f50f2b1a96c22bef052773e66c5f63a5749f9629303,2024-08-22T17:44:47.560000
|
||||
CVE-2024-7965,0,0,efa0555bbb67557f1f4f029b94195e1d9dc4a9cf7b553840ebdc5072a02f2db9,2024-08-22T14:35:15.280000
|
||||
CVE-2024-7966,0,1,c834c0011ca06a1efd266a4239a473434dee53599a1a84163bf0336c2d5b29a3,2024-08-22T17:44:11.147000
|
||||
CVE-2024-7967,0,0,6b9e3bc6003fa2e0640f930f9d670867e7411229c66a601e6cbe6f8eaf351c0d,2024-08-22T14:35:16.310000
|
||||
CVE-2024-7968,0,1,da660cd047ae7ab70548a94fe3bdc25d42e767c3eac17d765635320e381d048e,2024-08-22T17:41:56.847000
|
||||
CVE-2024-7969,0,1,5d7da0c2013aed33a237ee1ce4d97e9da2011ff310b073e3d8709a4f478578bb,2024-08-22T17:42:47.627000
|
||||
CVE-2024-7971,0,0,5406efa61c68652b55c12fe54555241d6d0e600bbe58e6909119226df13133b0,2024-08-22T14:35:17.313000
|
||||
CVE-2024-7972,0,0,70b5b4000609ceeb60deedf7c0d82b9e59e80aae5bf8399f48b8e878bf408f8b,2024-08-22T15:35:14.597000
|
||||
CVE-2024-7973,0,0,fb795d32a144ad521439e1fe4e5042ac17e2b8505faf35a28d1bc7d4c5a4483d,2024-08-22T15:35:15.597000
|
||||
CVE-2024-7974,0,1,4f1766ede0a46e011fd6362a463054e086647121f22e7cff04b5a03dfc3c746c,2024-08-22T17:40:27.950000
|
||||
CVE-2024-7975,0,1,6eead3f121fb76c19460ccba2d1c91cf33314b233f7cc8d0a23049d05e30e6a0,2024-08-22T17:40:09.223000
|
||||
CVE-2024-7976,0,1,8ea67749dc2e0457db6f465664717bd53fa70c14a92a0f107f894d380039b546,2024-08-22T17:39:54.540000
|
||||
CVE-2024-7977,0,1,376d3398785a73c2927625b4057b1ad21ad4db08c185aea810399ba8f1f4ab5b,2024-08-22T17:39:32.730000
|
||||
CVE-2024-7978,0,1,67c4229f7235438f3aa7b05e7807f93765050dcc016da021af4e6ebc6fa52ea9,2024-08-22T17:38:11.200000
|
||||
CVE-2024-7979,0,0,078bf6b1178f274a34fc1356c3dbffb7074d9c903c74e589d1b081f58230d3ec,2024-08-22T15:35:16.610000
|
||||
CVE-2024-7980,0,0,1661097b9193f473ee067de4d4f40312756af353419ed3265d5438cf70d837f5,2024-08-22T15:35:17.610000
|
||||
CVE-2024-7981,0,1,558a7e30af48c73a27172093229eee673e34b504c9731b910b5af4369614c86c,2024-08-22T17:36:24.803000
|
||||
CVE-2024-7998,0,0,8aa3505a1b6ed462573d7b65c55c5633ff88a81168885ae03bec6b1db69a2167,2024-08-21T12:30:33.697000
|
||||
CVE-2024-8003,0,0,1eb6cc8bd16248d54ed281136e233da0a723cb74879af6e3337c9532a3caf8e1,2024-08-21T15:51:28.397000
|
||||
CVE-2024-8005,0,0,c059370cb975aea915e5671e32cb80d879151797480dbd5423b1593aeba96675,2024-08-21T15:49:59.470000
|
||||
CVE-2024-8007,0,0,d227b03f895ef761f269cb1491d7d5722db05e40b51b1467b77f2f84ee5beceb,2024-08-21T16:06:23.153000
|
||||
CVE-2024-8022,0,0,469d074c70ed4d6e1b7ca7023005d3bb3e3f23419b5a39b3540fd69e34fadcaa,2024-08-21T12:30:33.697000
|
||||
CVE-2024-8023,0,0,7f1c10536d9d4e1a728f09b10c1ff35f77d0bba503a7c61c411fbfd5f6584d46,2024-08-21T12:30:33.697000
|
||||
CVE-2024-8033,0,0,3f316f7e9198aca7c5aa2e36e772dc32f2f22bce30d787bfae16b53392d884ef,2024-08-22T12:48:02.790000
|
||||
CVE-2024-8034,0,0,eaa926608d388e32154f035cf3b7a3d924c2e30d7f24b96fbcf3a9d5002cba03,2024-08-22T12:48:02.790000
|
||||
CVE-2024-8035,0,0,3aa95c98d3128ccdb489242c18c77df884328f4a8925b81f2020dee2c13aaf80,2024-08-22T12:48:02.790000
|
||||
CVE-2024-8033,0,1,a55cf019f91370d30ea7734ed696c6e008634912634c88c606ef5f6209b81cb2,2024-08-22T17:36:07.673000
|
||||
CVE-2024-8034,0,1,990fb53670bf6f787a3d54c0392722fc0a67a939e8056c22142bc6f2bee92a38,2024-08-22T17:35:30.003000
|
||||
CVE-2024-8035,0,1,e11fe8c378f080395f404658baee2e1c5cd70ef826bdf0b13fe46f85c653ad4a,2024-08-22T17:33:37.407000
|
||||
CVE-2024-8041,1,1,a1cbdddbce69857892b2d0881ba6bfcc668b66194ac3d90441c1bdbb66f0dae3,2024-08-22T16:15:10.880000
|
||||
CVE-2024-8071,0,0,41d62a2818ebc39a47942042600f7172df861ffe79f8871e225899553216e03c,2024-08-22T12:48:02.790000
|
||||
CVE-2024-8072,0,1,08fafb0bed7b0568fefcb8938e0e01cf4acf3cb153d4b847bc3e1d9427344a62,2024-08-22T14:35:18.797000
|
||||
CVE-2024-8072,0,0,08fafb0bed7b0568fefcb8938e0e01cf4acf3cb153d4b847bc3e1d9427344a62,2024-08-22T14:35:18.797000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user