mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-08 11:37:26 +00:00
Auto-Update: 2024-09-11T02:00:17.254709+00:00
This commit is contained in:
parent
89f66dde2c
commit
62fc35d8b6
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-38028",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-10-11T19:15:15.067",
|
||||
"lastModified": "2024-05-23T18:12:17.383",
|
||||
"lastModified": "2024-09-11T01:00:01.227",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"cisaExploitAdd": "2024-04-23",
|
||||
"cisaActionDue": "2024-05-14",
|
||||
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
|
||||
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. ",
|
||||
"cisaVulnerabilityName": "Microsoft Windows Print Spooler Privilege Escalation Vulnerability ",
|
||||
"descriptions": [
|
||||
{
|
||||
|
21
CVE-2024/CVE-2024-237xx/CVE-2024-23716.json
Normal file
21
CVE-2024/CVE-2024-237xx/CVE-2024-23716.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-23716",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2024-09-11T00:15:10.957",
|
||||
"lastModified": "2024-09-11T00:15:10.957",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In DevmemIntPFNotify of devicemem_server.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/2024-09-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-313xx/CVE-2024-31336.json
Normal file
21
CVE-2024/CVE-2024-313xx/CVE-2024-31336.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-31336",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2024-09-11T00:15:11.023",
|
||||
"lastModified": "2024-09-11T00:15:11.023",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "N/A"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/2024-09-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,9 +2,13 @@
|
||||
"id": "CVE-2024-38014",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2024-09-10T17:15:20.320",
|
||||
"lastModified": "2024-09-10T17:43:14.410",
|
||||
"lastModified": "2024-09-11T01:00:01.227",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"cisaExploitAdd": "2024-09-10",
|
||||
"cisaActionDue": "2024-10-01",
|
||||
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
|
||||
"cisaVulnerabilityName": "Microsoft Windows Installer Privilege Escalation Vulnerability ",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,9 +2,13 @@
|
||||
"id": "CVE-2024-38217",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2024-09-10T17:15:24.640",
|
||||
"lastModified": "2024-09-10T17:43:14.410",
|
||||
"lastModified": "2024-09-11T01:00:01.227",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"cisaExploitAdd": "2024-09-10",
|
||||
"cisaActionDue": "2024-10-01",
|
||||
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
|
||||
"cisaVulnerabilityName": "Microsoft Windows Mark of the Web (MOTW) Security Feature Bypass Vulnerability",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,9 +2,13 @@
|
||||
"id": "CVE-2024-38226",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2024-09-10T17:15:25.267",
|
||||
"lastModified": "2024-09-10T17:43:14.410",
|
||||
"lastModified": "2024-09-11T01:00:01.227",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"cisaExploitAdd": "2024-09-10",
|
||||
"cisaActionDue": "2024-10-01",
|
||||
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
|
||||
"cisaVulnerabilityName": "Microsoft Publisher Security Feature Bypass Vulnerability",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
25
CVE-2024/CVE-2024-406xx/CVE-2024-40650.json
Normal file
25
CVE-2024/CVE-2024-406xx/CVE-2024-40650.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-40650",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2024-09-11T00:15:11.080",
|
||||
"lastModified": "2024-09-11T00:15:11.080",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In wifi_item_edit_content of styles.xml , there is a possible FRP bypass due to Missing check for FRP state. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://android.googlesource.com/platform/packages/apps/Settings/+/2968ccc911956fa5813a9a6a5e5c8970e383a60f",
|
||||
"source": "security@android.com"
|
||||
},
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/2024-09-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-406xx/CVE-2024-40652.json
Normal file
25
CVE-2024/CVE-2024-406xx/CVE-2024-40652.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-40652",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2024-09-11T00:15:11.140",
|
||||
"lastModified": "2024-09-11T00:15:11.140",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In onCreate of SettingsHomepageActivity.java, there is a possible way to access the Settings app while the device is provisioning due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://android.googlesource.com/platform/packages/apps/Settings/+/2909433f7d59dcdd0c74044b1c8e9f48927193dc",
|
||||
"source": "security@android.com"
|
||||
},
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/2024-09-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-406xx/CVE-2024-40654.json
Normal file
25
CVE-2024/CVE-2024-406xx/CVE-2024-40654.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-40654",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2024-09-11T00:15:11.190",
|
||||
"lastModified": "2024-09-11T00:15:11.190",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In multiple locations, there is a possible permission bypass due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://android.googlesource.com/platform/packages/apps/Settings/+/f1d0079c91734168c150f839168544f407b17b06",
|
||||
"source": "security@android.com"
|
||||
},
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/2024-09-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-406xx/CVE-2024-40655.json
Normal file
25
CVE-2024/CVE-2024-406xx/CVE-2024-40655.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-40655",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2024-09-11T00:15:11.243",
|
||||
"lastModified": "2024-09-11T00:15:11.243",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In bindAndGetCallIdentification of CallScreeningServiceHelper.java, there is a possible way to maintain a while-in-use permission in the background due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://android.googlesource.com/platform/packages/services/Telecomm/+/eeef54b37a362f506ea3aa155baddc545b6a909a",
|
||||
"source": "security@android.com"
|
||||
},
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/2024-09-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-406xx/CVE-2024-40656.json
Normal file
25
CVE-2024/CVE-2024-406xx/CVE-2024-40656.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-40656",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2024-09-11T00:15:11.297",
|
||||
"lastModified": "2024-09-11T00:15:11.297",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In handleCreateConferenceComplete of ConnectionServiceWrapper.java, there is a possible way to reveal images across users due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://android.googlesource.com/platform/packages/services/Telecomm/+/f3e6a6c02439401eb7aeb3749ee5ec0b51a625b9",
|
||||
"source": "security@android.com"
|
||||
},
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/2024-09-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-406xx/CVE-2024-40657.json
Normal file
25
CVE-2024/CVE-2024-406xx/CVE-2024-40657.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-40657",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2024-09-11T00:15:11.350",
|
||||
"lastModified": "2024-09-11T00:15:11.350",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In addPreferencesForType of AccountTypePreferenceLoader.java, there is a possible way to disable apps for other users due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://android.googlesource.com/platform/packages/apps/Settings/+/8261e0ade3b414fea61d7fe9d8bc6df7a3fc8603",
|
||||
"source": "security@android.com"
|
||||
},
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/2024-09-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-406xx/CVE-2024-40658.json
Normal file
25
CVE-2024/CVE-2024-406xx/CVE-2024-40658.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-40658",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2024-09-11T00:15:11.397",
|
||||
"lastModified": "2024-09-11T00:15:11.397",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In getConfig of SoftVideoDecoderOMXComponent.cpp, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://android.googlesource.com/platform/frameworks/av/+/6d23fa05a40e5462d4b9bad28afa932e6e12a4f3",
|
||||
"source": "security@android.com"
|
||||
},
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/2024-09-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-406xx/CVE-2024-40659.json
Normal file
25
CVE-2024/CVE-2024-406xx/CVE-2024-40659.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-40659",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2024-09-11T00:15:11.473",
|
||||
"lastModified": "2024-09-11T00:15:11.473",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In getRegistration of RemoteProvisioningService.java, there is a possible way to permanently disable the AndroidKeyStore key generation feature by updating the attestation keys of all installed apps due to improper input validation. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://android.googlesource.com/platform/packages/modules/RemoteKeyProvisioning/+/c65dce4c6d8d54e47dce79a56e29e2223a2354e6",
|
||||
"source": "security@android.com"
|
||||
},
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/2024-09-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-406xx/CVE-2024-40662.json
Normal file
25
CVE-2024/CVE-2024-406xx/CVE-2024-40662.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-40662",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2024-09-11T00:15:11.530",
|
||||
"lastModified": "2024-09-11T00:15:11.530",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In scheme of Uri.java, there is a possible way to craft a malformed Uri object due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://android.googlesource.com/platform/frameworks/base/+/e7af00cafb52a25933ec4edb80c5111d42af0237",
|
||||
"source": "security@android.com"
|
||||
},
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/2024-09-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,9 +2,13 @@
|
||||
"id": "CVE-2024-43491",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2024-09-10T17:15:36.427",
|
||||
"lastModified": "2024-09-10T17:43:14.410",
|
||||
"lastModified": "2024-09-11T01:00:01.227",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"cisaExploitAdd": "2024-09-10",
|
||||
"cisaActionDue": "2024-10-01",
|
||||
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
|
||||
"cisaVulnerabilityName": "Microsoft Windows Update Remote Code Execution Vulnerability",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
30
README.md
30
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-09-10T23:55:17.317120+00:00
|
||||
2024-09-11T02:00:17.254709+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-09-10T22:15:01.967000+00:00
|
||||
2024-09-11T01:00:01.227000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -27,27 +27,41 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest)
|
||||
|
||||
```plain
|
||||
2024-09-10T00:00:08.658600+00:00
|
||||
2024-09-11T00:00:08.654090+00:00
|
||||
```
|
||||
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
262484
|
||||
262495
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `1`
|
||||
Recently added CVEs: `11`
|
||||
|
||||
- [CVE-2024-45597](CVE-2024/CVE-2024-455xx/CVE-2024-45597.json) (`2024-09-10T22:15:01.967`)
|
||||
- [CVE-2024-23716](CVE-2024/CVE-2024-237xx/CVE-2024-23716.json) (`2024-09-11T00:15:10.957`)
|
||||
- [CVE-2024-31336](CVE-2024/CVE-2024-313xx/CVE-2024-31336.json) (`2024-09-11T00:15:11.023`)
|
||||
- [CVE-2024-40650](CVE-2024/CVE-2024-406xx/CVE-2024-40650.json) (`2024-09-11T00:15:11.080`)
|
||||
- [CVE-2024-40652](CVE-2024/CVE-2024-406xx/CVE-2024-40652.json) (`2024-09-11T00:15:11.140`)
|
||||
- [CVE-2024-40654](CVE-2024/CVE-2024-406xx/CVE-2024-40654.json) (`2024-09-11T00:15:11.190`)
|
||||
- [CVE-2024-40655](CVE-2024/CVE-2024-406xx/CVE-2024-40655.json) (`2024-09-11T00:15:11.243`)
|
||||
- [CVE-2024-40656](CVE-2024/CVE-2024-406xx/CVE-2024-40656.json) (`2024-09-11T00:15:11.297`)
|
||||
- [CVE-2024-40657](CVE-2024/CVE-2024-406xx/CVE-2024-40657.json) (`2024-09-11T00:15:11.350`)
|
||||
- [CVE-2024-40658](CVE-2024/CVE-2024-406xx/CVE-2024-40658.json) (`2024-09-11T00:15:11.397`)
|
||||
- [CVE-2024-40659](CVE-2024/CVE-2024-406xx/CVE-2024-40659.json) (`2024-09-11T00:15:11.473`)
|
||||
- [CVE-2024-40662](CVE-2024/CVE-2024-406xx/CVE-2024-40662.json) (`2024-09-11T00:15:11.530`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `1`
|
||||
Recently modified CVEs: `5`
|
||||
|
||||
- [CVE-2024-44815](CVE-2024/CVE-2024-448xx/CVE-2024-44815.json) (`2024-09-10T22:15:01.887`)
|
||||
- [CVE-2022-38028](CVE-2022/CVE-2022-380xx/CVE-2022-38028.json) (`2024-09-11T01:00:01.227`)
|
||||
- [CVE-2024-38014](CVE-2024/CVE-2024-380xx/CVE-2024-38014.json) (`2024-09-11T01:00:01.227`)
|
||||
- [CVE-2024-38217](CVE-2024/CVE-2024-382xx/CVE-2024-38217.json) (`2024-09-11T01:00:01.227`)
|
||||
- [CVE-2024-38226](CVE-2024/CVE-2024-382xx/CVE-2024-38226.json) (`2024-09-11T01:00:01.227`)
|
||||
- [CVE-2024-43491](CVE-2024/CVE-2024-434xx/CVE-2024-43491.json) (`2024-09-11T01:00:01.227`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
25
_state.csv
25
_state.csv
@ -204450,7 +204450,7 @@ CVE-2022-38023,0,0,3c55fb453594178da8ba3d482f340896fae4490b4eba1e34874712902c89f
|
||||
CVE-2022-38025,0,0,e444a61476717e2b1cbf74d4e18d9470c831462ecac7f56c5c3508bd3dc05db1,2023-12-20T20:15:15.140000
|
||||
CVE-2022-38026,0,0,17d48edb2f4ddfe5ccb255236af59ca6c8a00681f205604b06d2114d05d8f4e7,2023-12-20T20:15:15.233000
|
||||
CVE-2022-38027,0,0,28af1db49fff74aadb41ab8af1bef1e42a511868bf0a0e33242cb178f2773950,2023-12-20T20:15:15.317000
|
||||
CVE-2022-38028,0,0,6a7b03a9a682d89dc6c5133fa141e7d824b7a14e545aad0777c64c3e1a767880,2024-05-23T18:12:17.383000
|
||||
CVE-2022-38028,0,1,806b613a093e30647e8a5b34faa40d4e0ca0e0e9b8fa7551e1e0ba5979484d0c,2024-09-11T01:00:01.227000
|
||||
CVE-2022-38029,0,0,19c79c2bbf5f2b397403292eead58b25e6e0a2ca37f9a9ce9c47417d4c06018b,2023-12-20T20:15:15.500000
|
||||
CVE-2022-3803,0,0,ea976c3de717c67220c17a3ddaaa9b7e6b2ab0a31a0013625682fa57c546821c,2023-11-07T03:51:49.163000
|
||||
CVE-2022-38030,0,0,270a35ba92b2646f610e305ab17b3543230d0c4f1479eb0dc3932296d87c7d18,2023-12-20T20:15:15.607000
|
||||
@ -245543,6 +245543,7 @@ CVE-2024-23710,0,0,bd7284af235de5db2fd51076f2026e0e8319c2a15e9eab609541ac6fe582c
|
||||
CVE-2024-23711,0,0,3b2f25c3bfdf9a198d84e7ce79a3c5bc71465fc8bd3a9e12aa99c3c94a4d9db4,2024-07-11T15:05:25.990000
|
||||
CVE-2024-23712,0,0,99a9a0e98f6ec74442cc23ab4a592b5612be30e655f849926f8cbd43d464cc6c,2024-07-03T01:48:04.970000
|
||||
CVE-2024-23713,0,0,84ac23a9c686e595929bab4dad7b08bca80d94f5a0dad54d418e0bd955964876,2024-07-03T01:48:05.220000
|
||||
CVE-2024-23716,1,1,4870aa8d7e96af13639b3139c8954733bf6a51589bc92bbb98e03b251a456704,2024-09-11T00:15:10.957000
|
||||
CVE-2024-23717,0,0,6ae2f39818716426e507c7fefae1ead3e28d18b5fd2ac50fedfcf5c736aa3969,2024-08-16T19:35:03.877000
|
||||
CVE-2024-23721,0,0,738ea0fe142701915583cf528173779941e7a1ec154f74c48132f1439081fb4a,2024-08-28T15:35:15.520000
|
||||
CVE-2024-23722,0,0,af1e6a2b53efd211283ec4f6a153b9c2bd466feef4ec2b55fd6db947ef4fb0f6,2024-08-06T14:35:05.600000
|
||||
@ -250932,6 +250933,7 @@ CVE-2024-31332,0,0,fe533958eb1f5014a983744e26d4dc56008592fb4b2dc96ebd425a317d9ee
|
||||
CVE-2024-31333,0,0,fffa52c47c5b8e1c2bcdc9fe3c080f43dd069e7ef7813f142892cae434fbd8ff,2024-08-19T13:00:23.117000
|
||||
CVE-2024-31334,0,0,69828e729ce39e0f18173fda19e01cf9f4d39333d7345a58dacf94a302bbacd6,2024-07-11T15:05:41.960000
|
||||
CVE-2024-31335,0,0,3a5c3c43b9344b158e79d76d5bd0e2d36d3e7822b50bec9afc211045c26c9812,2024-08-01T13:50:52.347000
|
||||
CVE-2024-31336,1,1,ab364778351ba44b09e40898f8aaedd5cff82dfc1cf2679ed07b7f78b86451c2,2024-09-11T00:15:11.023000
|
||||
CVE-2024-31339,0,0,cd4c96aade7176a5aa7427f1e13d7eb03c1e703de2eb92c3c6c97472cece1e5c,2024-07-12T16:11:34.910000
|
||||
CVE-2024-3134,0,0,29c3b545a5da0a472480af2af3f9f3acedbe4b841a8f6f121606a369bcd8fa7c,2024-05-17T18:36:05.263000
|
||||
CVE-2024-31340,0,0,69d2a170836208f6faad46a647a02e1d14f5dbc15c6da296b85bfb3a229fe567,2024-07-03T01:54:45.633000
|
||||
@ -255507,7 +255509,7 @@ CVE-2024-3801,0,0,59de265ce1af1c02a0bfcf9801db717e0400c3bfeeedabcf1fa6b682733a55
|
||||
CVE-2024-38010,0,0,125b75eaae30e843cae73c88a30795eb210e3d24686e4a61bf98ad43199377ac,2024-07-12T18:53:35.657000
|
||||
CVE-2024-38011,0,0,dfdf39bbdcd434b41a8000e4746e5893d04cf4219e333c27df414f4801f5d71e,2024-07-12T18:57:40.873000
|
||||
CVE-2024-38013,0,0,0a18606eaff9f516ff72b6e0417c94b62f282527a7fb5284ff29917a0162ad77,2024-07-11T16:17:38.197000
|
||||
CVE-2024-38014,0,0,c3e6ceb0cee7e45f36bbca81f1d791775a74c6c328369f53b3a2bdd397fd846a,2024-09-10T17:43:14.410000
|
||||
CVE-2024-38014,0,1,a658ae199e48d2216317c144ccf10e7616d6bd48992ccbcebbc19089557cd8ab,2024-09-11T01:00:01.227000
|
||||
CVE-2024-38015,0,0,5b1426585b115ad720503cf293b548c59cb7459bc19ab9bc440800c3121fe7f4,2024-07-11T16:18:10.113000
|
||||
CVE-2024-38017,0,0,b2da9df045e49b65d6e2e15b7cfe34dfa17f558263037e08e7692bad9d214937,2024-07-11T16:20:51.827000
|
||||
CVE-2024-38018,0,0,bbdc2dca451b5fddb37db9148885748272e887a947585b5768d3e4d030d44598,2024-09-10T17:43:14.410000
|
||||
@ -255698,14 +255700,14 @@ CVE-2024-38213,0,0,a57ec7b97080baf05c7c67e1e8b814c6ef63e8cb4eb809fa5c6a9e16af89b
|
||||
CVE-2024-38214,0,0,36d440db09d4a2cbf6127fa4a6571f8fdbf7003c0a2820ce7057958b7fe01f75,2024-08-15T20:28:25.893000
|
||||
CVE-2024-38215,0,0,0ced8c69c344bb918392454f0cf78558fdfc7db995aead6aebc3687298b1b7c6,2024-08-16T19:02:41.517000
|
||||
CVE-2024-38216,0,0,9da2da64d36518c00c753f25b7c81a7149247eb0c35b8e9c2ae5ff39bc571f48,2024-09-10T17:43:14.410000
|
||||
CVE-2024-38217,0,0,d5a07a8fd54570e3967449a8db55247994bf5c989a9355915c502d537c8a25e1,2024-09-10T17:43:14.410000
|
||||
CVE-2024-38217,0,1,75ac49419ed3491570ad07f1f323d76f6a627cd3e912f32a42f83c2ddb257522,2024-09-11T01:00:01.227000
|
||||
CVE-2024-38218,0,0,d8154113c709876f61605539852c344572b202f6d86619699565b8c3f572b9b4,2024-08-13T18:15:31.500000
|
||||
CVE-2024-38219,0,0,34502e067fd7412232e3cff9d01123fa667f329fff13204df696956cac257c32,2024-08-29T14:45:17.383000
|
||||
CVE-2024-3822,0,0,51b0f82a9028abb2f3a6ab312236a4c8392000a211092257ada320c541b18cc9,2024-05-15T16:40:19.330000
|
||||
CVE-2024-38220,0,0,75d1d2b4a4c084fa7a781cee5622397ece32cf08d890075be7f73458ef7b79aa,2024-09-10T17:43:14.410000
|
||||
CVE-2024-38223,0,0,bc14ce3f021016f5d7fdf26984192d7afd912fddeb21523c067e8db2fe7a06a5,2024-08-15T20:18:28.240000
|
||||
CVE-2024-38225,0,0,9fef32ff53f02aa8c1358c50b31033ff2c3e33337edda025b0788ca47e24a0a2,2024-09-10T17:43:14.410000
|
||||
CVE-2024-38226,0,0,5a7f89424ec93f1635617e83d43b6115a2df7d5cc79a20b6324717b6eaa61c87,2024-09-10T17:43:14.410000
|
||||
CVE-2024-38226,0,1,b80d7c4f16019e718fdbddac08e8c534174dc43f77e8a3ab178af67b7f4fb444,2024-09-11T01:00:01.227000
|
||||
CVE-2024-38227,0,0,530a8714fe4c2026ef544b351c789cbbe0c690cb06ac9afdae49238280f9af62,2024-09-10T17:43:14.410000
|
||||
CVE-2024-38228,0,0,ecd2eb588a86b904449a792d5d4a07ad323dee48eae1e800a6b0ff7710362f8d,2024-09-10T17:43:14.410000
|
||||
CVE-2024-3823,0,0,53ae63b27eb43a6740a92f1ff13f05ddd2a8941167fdfb2924cdfa6b561369e6,2024-05-15T16:40:19.330000
|
||||
@ -257048,7 +257050,16 @@ CVE-2024-40645,0,0,c5d696c93dacee54aa97dfea7bb392eb61945c1f1d80336104e770237e779
|
||||
CVE-2024-40647,0,0,20e5e587d0777d0bcce77df9be17d322be6b8b310278f85b131c82750480c300,2024-07-19T13:01:44.567000
|
||||
CVE-2024-40648,0,0,e2349aa5f69c8421d1802e501ed70a5d9670cb28532fa26d74d83879e98ba750,2024-07-19T13:01:44.567000
|
||||
CVE-2024-4065,0,0,e9243298c32ccba8ab1ac6d427150517ee98217790d2dec0b1b5ec685d8cbc83,2024-06-04T19:20:29.227000
|
||||
CVE-2024-40650,1,1,6c3cc80f92519f70e36bf62879dd89773ca40a8f4f88db859b5428090ebf6be3,2024-09-11T00:15:11.080000
|
||||
CVE-2024-40652,1,1,860ac8d35bd15da5b571f64f908c53ccc1c0ff1f627ae6d53990c5c2f4da927a,2024-09-11T00:15:11.140000
|
||||
CVE-2024-40654,1,1,e20287e242febf3bfccfca4af8584f54393a91f8229966ebc86c9f93f22581fc,2024-09-11T00:15:11.190000
|
||||
CVE-2024-40655,1,1,e5264766c0bc5631ab0fab58e4e9d3f401655fb7b4ab7ae611fdc04d0b58a2c1,2024-09-11T00:15:11.243000
|
||||
CVE-2024-40656,1,1,91dad1272b865456a277c18007f24c8eff550f80b64e662feef3d6d4f3b1cee9,2024-09-11T00:15:11.297000
|
||||
CVE-2024-40657,1,1,31a9d1d329d9e7c72fb1f802001487d4822a2a62530a35c918857821ba29ce14,2024-09-11T00:15:11.350000
|
||||
CVE-2024-40658,1,1,9659c26fdc7cd4a3b7e04317ee07d27c758624ea2c232c3eb1bedd4c8919ab50,2024-09-11T00:15:11.397000
|
||||
CVE-2024-40659,1,1,c757b258e14bab6f1cecaf94d0d3ec601cef0380e96d2358fb048812859bc662,2024-09-11T00:15:11.473000
|
||||
CVE-2024-4066,0,0,5674d1317b0a03adb324e31f70d35a87031f26ca2ea2869349483359d081bdf7,2024-06-04T19:20:29.323000
|
||||
CVE-2024-40662,1,1,6c8a297d3472954b37409b1473b4d0951c03fd3d2e5ad981778a67c4dcf035cb,2024-09-11T00:15:11.530000
|
||||
CVE-2024-4067,0,0,cb2492818fe81f39be6108b3726f1fbc34af211b5be3405ee7a17904cdbd58f2,2024-08-28T00:15:04.130000
|
||||
CVE-2024-4068,0,0,bb45b0f3c24ec800e9c86d4119a908807b555886bbc03073bf2175c668679f63,2024-07-03T02:07:03.943000
|
||||
CVE-2024-40680,0,0,41ab7b70c7ee12d084f1da220538cd376d47c73295a5e0bc20c807a666a18193,2024-09-09T13:03:38.303000
|
||||
@ -258770,7 +258781,7 @@ CVE-2024-4348,0,0,6e86bc5560fea8dde0d2ebca4133582cb5d1167a5aec18ad6c6b9b23741c69
|
||||
CVE-2024-43482,0,0,6e7c134aa469a60e780cabf13e44734b4c5f233def960d877a7b1678a97c618a,2024-09-10T17:43:14.410000
|
||||
CVE-2024-43487,0,0,dea08ba1cfb3ff23b9368f43188bc90a9104601ab6b01d42181bcb8180caaef5,2024-09-10T17:43:14.410000
|
||||
CVE-2024-4349,0,0,a8b03025f36b8713c52951e7ebcf312d165d904bb8cd188665520ff04ec5e58b,2024-06-04T19:20:36.340000
|
||||
CVE-2024-43491,0,0,0beeb74a14e123341dd31104956dca431c35ed8971f77a61809e5e01fb39c656,2024-09-10T17:43:14.410000
|
||||
CVE-2024-43491,0,1,09bd1dfd917904b61d404a3b1070a3481f2dbae5f8c211d599a6ebbbe646cff8,2024-09-11T01:00:01.227000
|
||||
CVE-2024-43492,0,0,3dd12071c651e27e40ec4fb50ba07efcfac4fe4f70a8035620f06f9e51f7d211,2024-09-10T17:43:14.410000
|
||||
CVE-2024-43495,0,0,4562605b4a917b204e73ac08fedfd131430061e6ccf42153383db64c34a941ba,2024-09-10T17:43:14.410000
|
||||
CVE-2024-4350,0,0,064be752b5def38b2ae127a671a2419b00cbe1db7bc8e8e49beca0c95658f61b,2024-08-30T18:18:37.130000
|
||||
@ -259144,7 +259155,7 @@ CVE-2024-4480,0,0,046ee1f51773a8c0ac4a6c81ddd78c147b0ada165d730df7b9b8d851461723
|
||||
CVE-2024-44808,0,0,53ee5f88da9d15aa3ffd696fc5703153aab92dbb219aaccde4dc48186abdbb68,2024-09-05T12:53:21.110000
|
||||
CVE-2024-44809,0,0,424c650381a963ac60378eaa5a7cd36fd86829e33f994f3d0227dc416ec44e82,2024-09-04T14:35:12.707000
|
||||
CVE-2024-4481,0,0,c2852db732c7c65c13524ea22e5406663429c55dff3bfe0d5bbffa299f48bbd3,2024-05-14T16:11:39.510000
|
||||
CVE-2024-44815,0,1,5cef67b7d65dcd183a4c302efb8cfcc48239537dffc219b3742868dc85124b61,2024-09-10T22:15:01.887000
|
||||
CVE-2024-44815,0,0,5cef67b7d65dcd183a4c302efb8cfcc48239537dffc219b3742868dc85124b61,2024-09-10T22:15:01.887000
|
||||
CVE-2024-44817,0,0,69deaa4e7ecbf919037754dfd86d6f5f34bcd33ff645863b7e5f14d08ab18721,2024-09-05T12:53:21.110000
|
||||
CVE-2024-44818,0,0,d174c0799ffdbf965fa98c057c949d0dd19f8293fcbd2dc7f74d6c2c59752335,2024-09-05T12:53:21.110000
|
||||
CVE-2024-44819,0,0,fb850f7977d16cbee039f22251cb3645c89cd534504aa87478038b012f6c8acc,2024-09-05T14:40:07.637000
|
||||
@ -259485,7 +259496,7 @@ CVE-2024-45592,0,0,a6da3331dabbde48afc9c09a6ca7109ae4814f4878288894284237183ee05
|
||||
CVE-2024-45593,0,0,b530ea022f2e8e4aa156129a75961f9228743d411d4a1930e0d44cdca74a998e,2024-09-10T17:43:14.410000
|
||||
CVE-2024-45595,0,0,649b5475221eb6226048e280295a64f14525c165ac46abdbd9b86d52afbd2a88,2024-09-10T17:43:14.410000
|
||||
CVE-2024-45596,0,0,45821d3632755e50b9567a02008899ce310b65562369c77277b373a6169d2af1,2024-09-10T19:15:22.303000
|
||||
CVE-2024-45597,1,1,1d2481fc071ab72c04aeb3b4234c6b552f5038c15de12e28a47ec5c90364e670,2024-09-10T22:15:01.967000
|
||||
CVE-2024-45597,0,0,1d2481fc071ab72c04aeb3b4234c6b552f5038c15de12e28a47ec5c90364e670,2024-09-10T22:15:01.967000
|
||||
CVE-2024-4560,0,0,3d2b06b4cd5ab2760bd3f364e15c96b4f7456a14baec47a1cd857fe992686648,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4561,0,0,8ef61ebc386f7e587b6eb6df8054d64514729591e443c5ac6735c0df58420e0f,2024-05-15T16:40:19.330000
|
||||
CVE-2024-45615,0,0,b9c937a8f973f4733b0499e8694ffb8f8660ef2ac78b4a4d6df66b1c171491cf,2024-09-04T18:15:05.377000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user