mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-12-16 04:43:10 +00:00
Auto-Update: 2024-08-28T18:00:18.030891+00:00
This commit is contained in:
parent
6c7e0e1705
commit
632168d8cf
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2016-9842",
|
||||
"sourceIdentifier": "security@opentext.com",
|
||||
"published": "2017-05-23T04:29:01.837",
|
||||
"lastModified": "2023-11-07T02:37:36.463",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-08-28T16:07:50.587",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -85,10 +85,10 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:zlib:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:a:zlib:zlib:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "1.2.3.4",
|
||||
"versionEndExcluding": "1.2.9",
|
||||
"matchCriteriaId": "27DBF1B3-EBCE-4F4E-A83C-98DFE157D524"
|
||||
"matchCriteriaId": "018FE9CE-4D44-4A7D-90DB-A2B1953B5B7F"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -147,8 +147,8 @@
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
|
||||
"matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D"
|
||||
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:esm:*:*:*",
|
||||
"matchCriteriaId": "B3293E55-5506-4587-A318-D1734F781C09"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -366,123 +366,221 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2016-12/msg00127.html",
|
||||
"source": "security@opentext.com"
|
||||
"source": "security@opentext.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2017-01/msg00050.html",
|
||||
"source": "security@opentext.com"
|
||||
"source": "security@opentext.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2017-01/msg00053.html",
|
||||
"source": "security@opentext.com"
|
||||
"source": "security@opentext.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2016/12/05/21",
|
||||
"source": "security@opentext.com"
|
||||
"source": "security@opentext.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
|
||||
"source": "security@opentext.com"
|
||||
"source": "security@opentext.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
|
||||
"source": "security@opentext.com"
|
||||
"source": "security@opentext.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/bid/95131",
|
||||
"source": "security@opentext.com"
|
||||
"source": "security@opentext.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securitytracker.com/id/1039427",
|
||||
"source": "security@opentext.com"
|
||||
"source": "security@opentext.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2017:1220",
|
||||
"source": "security@opentext.com"
|
||||
"source": "security@opentext.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2017:1221",
|
||||
"source": "security@opentext.com"
|
||||
"source": "security@opentext.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2017:1222",
|
||||
"source": "security@opentext.com"
|
||||
"source": "security@opentext.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2017:2999",
|
||||
"source": "security@opentext.com"
|
||||
"source": "security@opentext.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2017:3046",
|
||||
"source": "security@opentext.com"
|
||||
"source": "security@opentext.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2017:3047",
|
||||
"source": "security@opentext.com"
|
||||
"source": "security@opentext.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2017:3453",
|
||||
"source": "security@opentext.com"
|
||||
"source": "security@opentext.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1402348",
|
||||
"source": "security@opentext.com"
|
||||
"source": "security@opentext.com",
|
||||
"tags": [
|
||||
"Issue Tracking",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/madler/zlib/commit/e54e1299404101a5a9d0cf5e45512b543967f958",
|
||||
"source": "security@opentext.com"
|
||||
"source": "security@opentext.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00027.html",
|
||||
"source": "security@opentext.com"
|
||||
"source": "security@opentext.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/01/msg00030.html",
|
||||
"source": "security@opentext.com"
|
||||
"source": "security@opentext.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/201701-56",
|
||||
"source": "security@opentext.com"
|
||||
"source": "security@opentext.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202007-54",
|
||||
"source": "security@opentext.com"
|
||||
"source": "security@opentext.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/HT208112",
|
||||
"source": "security@opentext.com"
|
||||
"source": "security@opentext.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/HT208113",
|
||||
"source": "security@opentext.com"
|
||||
"source": "security@opentext.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/HT208115",
|
||||
"source": "security@opentext.com"
|
||||
"source": "security@opentext.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/HT208144",
|
||||
"source": "security@opentext.com"
|
||||
"source": "security@opentext.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://usn.ubuntu.com/4246-1/",
|
||||
"source": "security@opentext.com"
|
||||
"source": "security@opentext.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://usn.ubuntu.com/4292-1/",
|
||||
"source": "security@opentext.com"
|
||||
"source": "security@opentext.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://wiki.mozilla.org/MOSS/Secure_Open_Source/Completed#zlib",
|
||||
"source": "security@opentext.com"
|
||||
"source": "security@opentext.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://wiki.mozilla.org/images/0/09/Zlib-report.pdf",
|
||||
"source": "security@opentext.com"
|
||||
"source": "security@opentext.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujul2020.html",
|
||||
"source": "security@opentext.com"
|
||||
"source": "security@opentext.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2018-25099",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-18T05:15:06.007",
|
||||
"lastModified": "2024-03-18T12:38:25.490",
|
||||
"lastModified": "2024-08-28T16:35:00.880",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,30 @@
|
||||
"value": "En el m\u00f3dulo CryptX anterior a 0.062 para Perl, gcm_decrypt_verify() y chacha20poly1305_decrypt_verify() no verifican la etiqueta."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/DCIT/perl-CryptX/issues/47",
|
||||
|
||||
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2019-19824",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2020-01-27T18:15:12.960",
|
||||
"lastModified": "2020-02-05T14:30:22.743",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-08-28T16:15:07.290",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "On certain TOTOLINK Realtek SDK based routers, an authenticated attacker may execute arbitrary OS commands via the sysCmd parameter to the boafrm/formSysCmd URI, even if the GUI (syscmd.htm) is not available. This allows for full control over the device's internals. This affects A3002RU through 2.0.0, A702R through 2.1.3, N301RT through 2.1.6, N302R through 3.4.0, N300RT through 3.4.0, N200RE through 4.0.0, N150RT through 3.4.0, and N100RE through 3.4.0."
|
||||
"value": "On certain TOTOLINK Realtek SDK based routers, an authenticated attacker may execute arbitrary OS commands via the sysCmd parameter to the boafrm/formSysCmd URI, even if the GUI (syscmd.htm) is not available. This allows for full control over the device's internals. This affects A3002RU through 2.0.0, A702R through 2.1.3, N301RT through 2.1.6, N302R through 3.4.0, N300RT through 3.4.0, N200RE through 4.0.0, N150RT through 3.4.0, N100RE through 3.4.0, and N302RE 2.0.2."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -330,6 +330,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yckuo-sdc/totolink-boa-api-vulnerabilities",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://sploit.tech",
|
||||
"source": "cve@mitre.org",
|
||||
|
||||
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2020-12615",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-12-12T13:15:06.820",
|
||||
"lastModified": "2023-12-15T16:04:51.323",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-08-28T17:35:00.743",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -49,6 +49,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
||||
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-1498",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-03-19T20:15:19.280",
|
||||
"lastModified": "2024-05-17T02:18:10.733",
|
||||
"lastModified": "2024-08-28T17:20:31.837",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -101,8 +101,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:responsive_hotel_site_project:responsive_hotel_site:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6725818B-1AEC-4448-B8F4-02078ADD04FD"
|
||||
"criteria": "cpe:2.3:a:fabianros:responsive_hotel_site:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E1C10207-0B0E-455F-B5AE-2CAA6C98BA15"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
||||
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-42860",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-02-21T07:15:49.827",
|
||||
"lastModified": "2024-02-22T19:07:27.197",
|
||||
"lastModified": "2024-08-28T16:35:01.493",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Se solucion\u00f3 un problema de permisos con restricciones adicionales. Este problema se solucion\u00f3 en macOS Sonoma 14.1, macOS Monterey 12.7.1, macOS Ventura 13.6.1. Es posible que una aplicaci\u00f3n pueda modificar partes protegidas del sistema de archivos."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.7,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT213983",
|
||||
|
||||
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-48406",
|
||||
"sourceIdentifier": "dsap-vuln-management@google.com",
|
||||
"published": "2023-12-08T16:15:17.783",
|
||||
"lastModified": "2024-03-12T21:15:56.447",
|
||||
"lastModified": "2024-08-28T16:35:03.950",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -49,6 +49,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
||||
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-49468",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-12-07T20:15:38.477",
|
||||
"lastModified": "2023-12-30T21:15:44.010",
|
||||
"lastModified": "2024-08-28T17:35:02.020",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
||||
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-7017",
|
||||
"sourceIdentifier": "cret@cert.org",
|
||||
"published": "2024-03-15T17:15:07.857",
|
||||
"lastModified": "2024-03-17T22:38:29.433",
|
||||
"lastModified": "2024-08-28T17:35:03.137",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,30 @@
|
||||
"value": "El mecanismo de actualizaci\u00f3n de firmware de las cerraduras Sciener no autentica ni valida las actualizaciones de firmware si se pasan a la cerradura a trav\u00e9s del servicio Bluetooth Low Energy. Se puede enviar una solicitud de desaf\u00edo a la cerradura con un comando para prepararse para una actualizaci\u00f3n, en lugar de una solicitud de desbloqueo, lo que permite a un atacante comprometer el dispositivo."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://alephsecurity.com/2024/03/07/kontrol-lux-lock-2/",
|
||||
|
||||
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-7085",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-03-18T19:15:06.160",
|
||||
"lastModified": "2024-03-18T19:40:00.173",
|
||||
"lastModified": "2024-08-28T16:35:05.330",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,30 @@
|
||||
"value": "El complemento Scalable Vector Graphics (SVG) de WordPress hasta la versi\u00f3n 3.4 no sanitiza los archivos SVG cargados, lo que podr\u00eda permitir a los usuarios con un rol tan bajo como Autor cargar un SVG malicioso que contenga payloads XSS."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/a2ec1308-75a0-49d0-9288-33c6d9ee4328/",
|
||||
|
||||
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-7167",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-02-27T09:15:37.293",
|
||||
"lastModified": "2024-02-27T14:20:06.637",
|
||||
"lastModified": "2024-08-28T16:35:05.563",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,30 @@
|
||||
"value": "El complemento Persian Fonts de WordPress hasta la versi\u00f3n 1.6 no sanitiza ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con privilegios elevados, como el administrador, realizar ataques de Cross-Site Scripting Almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n multisitio)."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/6a2eb871-6b6e-4dbb-99f0-dd74d6c61e83/",
|
||||
|
||||
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-0015",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2024-02-16T19:15:08.153",
|
||||
"lastModified": "2024-02-16T19:26:55.393",
|
||||
"lastModified": "2024-08-28T17:35:03.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,30 @@
|
||||
"value": "En convertToComponentName de DreamService.java, existe una forma posible de iniciar actividades protegidas arbitrarias debido a la redirecci\u00f3n de intenci\u00f3n. Esto podr\u00eda conducir a una escalada local de privilegios con permisos de ejecuci\u00f3n del usuario necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://android.googlesource.com/platform/frameworks/base/+/2ce1b7fd37273ea19fbbb6daeeaa6212357b9a70",
|
||||
|
||||
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-0973",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-03-18T19:15:06.620",
|
||||
"lastModified": "2024-03-18T19:40:00.173",
|
||||
"lastModified": "2024-08-28T16:35:06.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,30 @@
|
||||
"value": "El complemento Widget for Social Page Feeds de WordPress anterior a 6.4 no sanitiza ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con privilegios elevados, como el administrador, realizar ataques de Cross-Site Scripting Almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n multisitio)."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/798de421-4814-46a9-a055-ebb95a7218ed/",
|
||||
|
||||
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-1273",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-03-11T18:15:17.900",
|
||||
"lastModified": "2024-03-12T12:40:13.500",
|
||||
"lastModified": "2024-08-28T16:35:07.013",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,30 @@
|
||||
"value": "El complemento Starbox de WordPress anterior a 3.5.0 no sanitiza ni escapa a algunos par\u00e1metros, lo que podr\u00eda permitir a usuarios con un rol tan bajo como Colaborador realizar ataques de cross-site scripting"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/9784d7c8-e3aa-42af-ace8-5b2b37ebc9cb/",
|
||||
|
||||
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-1316",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-03-04T21:15:07.007",
|
||||
"lastModified": "2024-03-05T13:41:01.900",
|
||||
"lastModified": "2024-08-28T16:35:07.230",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,30 @@
|
||||
"value": "El complemento Event Tickets and Registration de WordPress anterior a 5.8.1, el complemento Events Tickets Plus de WordPress anterior a 5.9.1 no impide que los usuarios con al menos el rol de colaborador filtren la existencia de ciertos eventos a los que no deber\u00edan tener acceso. (por ejemplo, eventos borrador, privados, pendientes de revisi\u00f3n, protegidos por contrase\u00f1a y eliminados)."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/d80dfe2f-207d-4cdf-8c71-27936c6318e5/",
|
||||
|
||||
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-1331",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-03-18T16:15:07.103",
|
||||
"lastModified": "2024-03-18T19:40:00.173",
|
||||
"lastModified": "2024-08-28T16:35:07.437",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,30 @@
|
||||
"value": "El complemento Team Members de WordPress anterior a 5.3.2 no valida ni escapa algunos de sus atributos de shortcode antes de devolverlos a una p\u00e1gina/publicaci\u00f3n donde est\u00e1 incrustado el shortcode, lo que podr\u00eda permitir a los usuarios con el rol de autor y superior realizar un ataque de Cross-Site Scripting Almacenado"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/b2bac900-3d8f-406c-b03d-c8db156acc59/",
|
||||
|
||||
56
CVE-2024/CVE-2024-202xx/CVE-2024-20279.json
Normal file
56
CVE-2024/CVE-2024-202xx/CVE-2024-20279.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-20279",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-08-28T17:15:06.113",
|
||||
"lastModified": "2024-08-28T17:15:06.113",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the restricted security domain implementation of Cisco Application Policy Infrastructure Controller (APIC) could allow an authenticated, remote attacker to modify the behavior of default system policies, such as quality of service (QoS) policies, on an affected system. This vulnerability is due to improper access control when restricted security domains are used to implement multi-tenancy. An attacker with a valid user account associated with a restricted security domain could exploit this vulnerability. A successful exploit could allow the attacker to read, modify, or delete child policies created under default system policies, which are implicitly used by all tenants in the fabric, resulting in disruption of network traffic. Exploitation is not possible for policies under tenants that an attacker has no authorization to access."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apic-cousmo-uBpBYGbq",
|
||||
"source": "ykramarz@cisco.com"
|
||||
}
|
||||
]
|
||||
}
|
||||
60
CVE-2024/CVE-2024-202xx/CVE-2024-20284.json
Normal file
60
CVE-2024/CVE-2024-202xx/CVE-2024-20284.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-20284",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-08-28T17:15:06.893",
|
||||
"lastModified": "2024-08-28T17:15:06.893",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the Python interpreter of Cisco NX-OS Software could allow an authenticated, low-privileged, local attacker to escape the Python sandbox and gain unauthorized access to the underlying operating system of the device.\r\n\r\nThe vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by manipulating specific functions within the Python interpreter. A successful exploit could allow an attacker to escape the Python sandbox and execute arbitrary commands on the underlying operating system with the privileges of the authenticated user. \r\nNote: An attacker must be authenticated with Python execution privileges to exploit these vulnerabilities. For more information regarding Python execution privileges, see product-specific documentation, such as the section of the Cisco Nexus 9000 Series NX-OS Programmability Guide."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-693"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-psbe-ce-YvbTn5du",
|
||||
"source": "ykramarz@cisco.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.cisco.com/c/en/us/td/docs/dcn/nx-os/nexus9000/105x/programmability/cisco-nexus-9000-series-nx-os-programmability-guide-105x/m-n9k-python-api-101x.html?bookSearch=true#concept_A2CFF094ADCB414C983EA06AD8E9A410",
|
||||
"source": "ykramarz@cisco.com"
|
||||
}
|
||||
]
|
||||
}
|
||||
60
CVE-2024/CVE-2024-202xx/CVE-2024-20285.json
Normal file
60
CVE-2024/CVE-2024-202xx/CVE-2024-20285.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-20285",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-08-28T17:15:07.687",
|
||||
"lastModified": "2024-08-28T17:15:07.687",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the Python interpreter of Cisco NX-OS Software could allow an authenticated, low-privileged, local attacker to escape the Python sandbox and gain unauthorized access to the underlying operating system of the device.\r\n\r\nThe vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by manipulating specific functions within the Python interpreter. A successful exploit could allow an attacker to escape the Python sandbox and execute arbitrary commands on the underlying operating system with the privileges of the authenticated user. \r\nNote: An attacker must be authenticated with Python execution privileges to exploit these vulnerabilities. For more information regarding Python execution privileges, see product-specific documentation, such as the section of the Cisco Nexus 9000 Series NX-OS Programmability Guide."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-653"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-psbe-ce-YvbTn5du",
|
||||
"source": "ykramarz@cisco.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.cisco.com/c/en/us/td/docs/dcn/nx-os/nexus9000/105x/programmability/cisco-nexus-9000-series-nx-os-programmability-guide-105x/m-n9k-python-api-101x.html?bookSearch=true#concept_A2CFF094ADCB414C983EA06AD8E9A410",
|
||||
"source": "ykramarz@cisco.com"
|
||||
}
|
||||
]
|
||||
}
|
||||
60
CVE-2024/CVE-2024-202xx/CVE-2024-20286.json
Normal file
60
CVE-2024/CVE-2024-202xx/CVE-2024-20286.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-20286",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-08-28T17:15:08.400",
|
||||
"lastModified": "2024-08-28T17:15:08.400",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the Python interpreter of Cisco NX-OS Software could allow an authenticated, low-privileged, local attacker to escape the Python sandbox and gain unauthorized access to the underlying operating system of the device.\r\n\r\nThe vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by manipulating specific functions within the Python interpreter. A successful exploit could allow an attacker to escape the Python sandbox and execute arbitrary commands on the underlying operating system with the privileges of the authenticated user. \r\nNote: An attacker must be authenticated with Python execution privileges to exploit these vulnerabilities. For more information regarding Python execution privileges, see product-specific documentation, such as the section of the Cisco Nexus 9000 Series NX-OS Programmability Guide."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-693"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-psbe-ce-YvbTn5du",
|
||||
"source": "ykramarz@cisco.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.cisco.com/c/en/us/td/docs/dcn/nx-os/nexus9000/105x/programmability/cisco-nexus-9000-series-nx-os-programmability-guide-105x/m-n9k-python-api-101x.html?bookSearch=true#concept_A2CFF094ADCB414C983EA06AD8E9A410",
|
||||
"source": "ykramarz@cisco.com"
|
||||
}
|
||||
]
|
||||
}
|
||||
56
CVE-2024/CVE-2024-202xx/CVE-2024-20289.json
Normal file
56
CVE-2024/CVE-2024-202xx/CVE-2024-20289.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-20289",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-08-28T17:15:09.117",
|
||||
"lastModified": "2024-08-28T17:15:09.117",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated, low-privileged, local attacker to execute arbitrary commands on the underlying operating system of an affected device. \r\n\r\nThis vulnerability is due to insufficient validation of arguments for a specific CLI command. An attacker could exploit this vulnerability by including crafted input as the argument of the affected command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with the privileges of the currently logged-in user."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-cmdinj-Lq6jsZhH",
|
||||
"source": "ykramarz@cisco.com"
|
||||
}
|
||||
]
|
||||
}
|
||||
56
CVE-2024/CVE-2024-204xx/CVE-2024-20411.json
Normal file
56
CVE-2024/CVE-2024-204xx/CVE-2024-20411.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-20411",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-08-28T17:15:09.500",
|
||||
"lastModified": "2024-08-28T17:15:09.500",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in Cisco NX-OS Software could allow an authenticated, local attacker with privileges to access the Bash shell to execute arbitrary code as root on an affected device.\r\n\r\nThis vulnerability is due to insufficient security restrictions when executing commands from the Bash shell. An attacker with privileges to access the Bash shell could exploit this vulnerability by executing a specific crafted command on the underlying operating system. A successful exploit could allow the attacker to execute arbitrary code with the privileges of root."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-267"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-bshacepe-bApeHSx7",
|
||||
"source": "ykramarz@cisco.com"
|
||||
}
|
||||
]
|
||||
}
|
||||
56
CVE-2024/CVE-2024-204xx/CVE-2024-20413.json
Normal file
56
CVE-2024/CVE-2024-204xx/CVE-2024-20413.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-20413",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-08-28T17:15:09.763",
|
||||
"lastModified": "2024-08-28T17:15:09.763",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in Cisco NX-OS Software could allow an authenticated, local attacker with privileges to access the Bash shell to elevate privileges to network-admin on an affected device.\r\n\r\nThis vulnerability is due to insufficient security restrictions when executing application arguments from the Bash shell. An attacker with privileges to access the Bash shell could exploit this vulnerability by executing crafted commands on the underlying operating system. A successful exploit could allow the attacker to create new users with the privileges of network-admin."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-bshacepe-bApeHSx7",
|
||||
"source": "ykramarz@cisco.com"
|
||||
}
|
||||
]
|
||||
}
|
||||
56
CVE-2024/CVE-2024-204xx/CVE-2024-20446.json
Normal file
56
CVE-2024/CVE-2024-204xx/CVE-2024-20446.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-20446",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-08-28T17:15:09.997",
|
||||
"lastModified": "2024-08-28T17:15:09.997",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the DHCPv6 relay agent of Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.\r\n\r\nThis vulnerability is due to improper handling of specific fields in a DHCPv6 RELAY-REPLY message. An attacker could exploit this vulnerability by sending a crafted DHCPv6 packet to any IPv6 address that is configured on an affected device. A successful exploit could allow the attacker to cause the dhcp_snoop process to crash and restart multiple times, causing the affected device to reload and resulting in a DoS condition."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.6,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 4.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-dhcp6-relay-dos-znEAA6xn",
|
||||
"source": "ykramarz@cisco.com"
|
||||
}
|
||||
]
|
||||
}
|
||||
56
CVE-2024/CVE-2024-204xx/CVE-2024-20478.json
Normal file
56
CVE-2024/CVE-2024-204xx/CVE-2024-20478.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-20478",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-08-28T17:15:10.220",
|
||||
"lastModified": "2024-08-28T17:15:10.220",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the software upgrade component of Cisco Application Policy Infrastructure Controller (APIC) and Cisco Cloud Network Controller, formerly Cisco Cloud APIC, could allow an authenticated, remote attacker with Administrator-level privileges to install a modified software image, leading to arbitrary code injection on an affected system.\r\n\r\nThis vulnerability is due to insufficient signature validation of software images. An attacker could exploit this vulnerability by installing a modified software image. A successful exploit could allow the attacker to execute arbitrary code on the affected system and elevate their privileges to root.\r\nNote: Administrators should always validate the hash of any upgrade image before uploading it to Cisco APIC and Cisco Cloud Network Controller."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-250"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-capic-priv-esc-uYQJjnuU",
|
||||
"source": "ykramarz@cisco.com"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-21132",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2024-07-16T23:15:13.403",
|
||||
"lastModified": "2024-07-17T13:34:20.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-28T17:40:31.727",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "secalert_us@oracle.com",
|
||||
"type": "Secondary",
|
||||
@ -39,10 +59,44 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:purchasing:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "12.2.3",
|
||||
"versionEndIncluding": "12.2.13",
|
||||
"matchCriteriaId": "56D8188F-3203-4D0C-B8BB-5AD9020359B5"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujul2024.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-21136",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2024-07-16T23:15:14.243",
|
||||
"lastModified": "2024-07-17T13:34:20.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-28T17:59:36.023",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,10 +39,62 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:retail_xstore_office:19.0.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3207145B-91F6-4785-BAE4-D0A195B422AE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:retail_xstore_office:20.0.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2B59C3D5-61A4-468C-B5CC-4A6ED0BBEA8C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:retail_xstore_office:20.0.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C70D2D6A-98BE-4971-B8B2-AD478663EDD9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:retail_xstore_office:22.0.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C2F21BF7-051C-4D63-B301-AFA43DC5D1E0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:retail_xstore_office:23.0.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "18FD36BE-B692-498A-AF47-8C18A7B708D4"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujul2024.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-21141",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2024-07-16T23:15:15.230",
|
||||
"lastModified": "2024-07-17T13:34:20.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-28T17:58:43.457",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,10 +39,43 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "7.0.20",
|
||||
"matchCriteriaId": "2AF6F0BB-B5B7-4905-AED4-5250C46394FF"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujul2024.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-21148",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2024-07-16T23:15:16.590",
|
||||
"lastModified": "2024-07-17T13:34:20.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-28T16:56:18.687",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "secalert_us@oracle.com",
|
||||
"type": "Secondary",
|
||||
@ -39,10 +59,44 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:e-business_suite:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "12.2.3",
|
||||
"versionEndIncluding": "12.2.13",
|
||||
"matchCriteriaId": "03EF06AB-699E-4F8E-8B6C-C4B17F3F4DC1"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujul2024.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-21161",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2024-07-16T23:15:18.930",
|
||||
"lastModified": "2024-07-17T13:34:20.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-28T17:00:38.797",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,10 +39,43 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "7.0.20",
|
||||
"matchCriteriaId": "2AF6F0BB-B5B7-4905-AED4-5250C46394FF"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujul2024.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-21164",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2024-07-16T23:15:19.490",
|
||||
"lastModified": "2024-07-17T13:34:20.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-28T17:00:58.533",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,10 +39,43 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "7.0.20",
|
||||
"matchCriteriaId": "2AF6F0BB-B5B7-4905-AED4-5250C46394FF"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujul2024.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-21165",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2024-07-16T23:15:19.700",
|
||||
"lastModified": "2024-07-17T13:34:20.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-28T16:43:23.220",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,10 +39,44 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.0",
|
||||
"versionEndIncluding": "8.0.37",
|
||||
"matchCriteriaId": "6251DC2A-53C2-4FBF-9EC1-CAF0C7893F1E"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujul2024.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-21682",
|
||||
"sourceIdentifier": "security@atlassian.com",
|
||||
"published": "2024-02-20T18:15:51.063",
|
||||
"lastModified": "2024-02-20T19:50:53.960",
|
||||
"lastModified": "2024-08-28T16:35:07.830",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -39,6 +39,18 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://confluence.atlassian.com/assetapps/assets-discovery-3-2-1-cloud-6-2-1-data_center-1333987182.html",
|
||||
|
||||
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-23244",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-03-08T02:15:48.243",
|
||||
"lastModified": "2024-03-13T23:15:46.480",
|
||||
"lastModified": "2024-08-28T16:35:08.747",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,30 @@
|
||||
"value": "Se abord\u00f3 un problema de l\u00f3gica con restricciones mejoradas. Este problema se solucion\u00f3 en macOS Sonoma 14.4, macOS Monterey 12.7.4. Una aplicaci\u00f3n de una cuenta de usuario est\u00e1ndar puede escalar privilegios despu\u00e9s de iniciar sesi\u00f3n como usuario administrador."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2024/Mar/21",
|
||||
|
||||
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-23276",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-03-08T02:15:49.557",
|
||||
"lastModified": "2024-03-14T20:34:18.527",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-08-28T16:35:09.187",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.4,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
|
||||
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-23288",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-03-08T02:15:50.070",
|
||||
"lastModified": "2024-03-13T22:15:11.173",
|
||||
"lastModified": "2024-08-28T16:35:09.410",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,30 @@
|
||||
"value": "Este problema se solucion\u00f3 eliminando el c\u00f3digo vulnerable. Este problema se solucion\u00f3 en tvOS 17.4, iOS 17.4 y iPadOS 17.4, macOS Sonoma 14.4, watchOS 10.4. Es posible que una aplicaci\u00f3n pueda elevar los privilegios."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.4,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2024/Mar/21",
|
||||
|
||||
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-24043",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-19T07:15:09.517",
|
||||
"lastModified": "2024-03-19T13:26:46.000",
|
||||
"lastModified": "2024-08-28T16:35:09.730",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -39,6 +39,18 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/apple502j/193358682885fe1a6708309ce934e4ed",
|
||||
|
||||
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-24155",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-29T01:44:11.810",
|
||||
"lastModified": "2024-02-29T13:49:29.390",
|
||||
"lastModified": "2024-08-28T16:35:10.447",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Bento4 v1.5.1-628 contiene una p\u00e9rdida de memoria en AP4_Movie::AP4_Movie, analizando pistas y agreg\u00e1ndolas a la lista m_Tracks, pero mp42aac no puede eliminarse correctamente cuando recibimos un error de no encontrar pista de audio. Esta vulnerabilidad permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de un archivo mp4 manipulado."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-401"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/axiomatic-systems/Bento4/issues/919",
|
||||
|
||||
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-24323",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-27T17:15:12.103",
|
||||
"lastModified": "2024-02-28T14:06:45.783",
|
||||
"lastModified": "2024-08-28T16:35:11.253",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Vulnerabilidad de inyecci\u00f3n SQL en linlinjava litemall v.1.8.0 permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s de los par\u00e1metros apodo, consignatario, orderSN, orderStatusArray del componente AdminOrdercontroller.java."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/lousix/exp/blob/main/CVE-2024-24323/CVE-2024-24323.md",
|
||||
|
||||
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-24328",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-01-30T15:15:09.487",
|
||||
"lastModified": "2024-02-01T04:49:21.037",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-08-28T16:35:12.420",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
||||
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-25083",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-16T21:15:08.260",
|
||||
"lastModified": "2024-02-16T21:39:50.223",
|
||||
"lastModified": "2024-08-28T16:35:13.370",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -39,6 +39,18 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-266"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.beyondtrust.com/trust-center/security-advisories/bt24-01",
|
||||
|
||||
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-25579",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2024-02-28T23:15:09.660",
|
||||
"lastModified": "2024-06-12T01:15:49.137",
|
||||
"lastModified": "2024-08-28T16:35:14.267",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "La vulnerabilidad de inyecci\u00f3n de comandos del sistema operativo en enrutadores LAN inal\u00e1mbricos ELECOM permite que un atacante adyacente a la red con privilegios administrativos ejecute comandos arbitrarios del sistema operativo enviando una solicitud especialmente manipulada al producto. Los productos y versiones afectados son los siguientes: WRC-1167GS2-B v1.67 y anteriores, WRC-1167GS2H-B v1.67 y anteriores, WRC-2533GS2-B v1.62 y anteriores, WRC-2533GS2-W v1.62 y anteriores y WRC-2533GS2V-B v1.62 y anteriores."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://jvn.jp/en/vu/JVNVU99444194/",
|
||||
|
||||
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-25655",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-18T20:15:08.917",
|
||||
"lastModified": "2024-03-19T13:26:46.000",
|
||||
"lastModified": "2024-08-28T16:35:15.510",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "El almacenamiento inseguro de contrase\u00f1as LDAP en la funcionalidad de autenticaci\u00f3n de AVSystem Unified Management Platform (UMP) 23.07.0.16567~LTS permite a los miembros (con acceso de lectura a la base de datos de la aplicaci\u00f3n) descifrar las contrase\u00f1as LDAP de los usuarios que se autentican exitosamente en la administraci\u00f3n web a trav\u00e9s de LDAP."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-922"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.cvcn.gov.it/cvcn/cve/CVE-2024-25655",
|
||||
|
||||
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-25859",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-28T20:15:41.900",
|
||||
"lastModified": "2024-02-29T13:49:47.277",
|
||||
"lastModified": "2024-08-28T16:35:16.347",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Una vulnerabilidad de path traversal en el directorio /path/to/uploads/ de Blesta anterior a v5.9.2 permite a los atacantes apoderarse de cuentas de usuarios y ejecutar c\u00f3digo arbitrario."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.blesta.com/2024/02/08/security-advisory/",
|
||||
|
||||
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-25866",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-28T22:15:26.573",
|
||||
"lastModified": "2024-02-29T13:49:47.277",
|
||||
"lastModified": "2024-08-28T16:35:17.133",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Una vulnerabilidad de inyecci\u00f3n SQL en CodeAstro Membership Management System en PHP v.1.0 permite a un atacante remoto ejecutar comandos SQL arbitrarios a trav\u00e9s del par\u00e1metro email en el componente index.php."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/0xQRx/VulnerabilityResearch/blob/master/2024/MembershipManagementSystem-SQL_Injection_Login.md",
|
||||
|
||||
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-26470",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-29T01:44:18.927",
|
||||
"lastModified": "2024-02-29T13:49:29.390",
|
||||
"lastModified": "2024-08-28T16:35:18.190",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Una vulnerabilidad de inyecci\u00f3n de encabezado de host en la funci\u00f3n de contrase\u00f1a olvidada de WebAPI Boilerplate v1.0.0 y v1.0.1 de FullStackHero permite a los atacantes filtrar el token de restablecimiento de contrase\u00f1a a trav\u00e9s de una solicitud manipulada."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/dub-flow/vulnerability-research/tree/main/CVE-2024-26470",
|
||||
|
||||
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-28125",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2024-03-18T08:15:06.347",
|
||||
"lastModified": "2024-03-18T12:38:25.490",
|
||||
"lastModified": "2024-08-28T16:35:19.333",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Todas las versiones de FitNesse permiten que un atacante remoto autenticado ejecute comandos arbitrarios del sistema operativo."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://fitnesse.org/FitNesseDownload",
|
||||
|
||||
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-28537",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-18T14:15:09.960",
|
||||
"lastModified": "2024-03-18T19:40:00.173",
|
||||
"lastModified": "2024-08-28T16:35:20.337",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Tenda AC18 V15.03.05.05 tiene una vulnerabilidad de desbordamiento de pila en el par\u00e1metro de p\u00e1gina de la funci\u00f3n fromNatStaticSetting."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/fromNatStaticSetting.md",
|
||||
|
||||
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-28640",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-16T06:15:14.613",
|
||||
"lastModified": "2024-03-17T22:38:29.433",
|
||||
"lastModified": "2024-08-28T16:35:21.193",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Vulnerabilidad de desbordamiento de b\u00fafer en TOTOLink X5000R V9.1.0u.6118-B20201102 y A7000R V9.1.0u.6115-B20201022 permite a un atacante remoto provocar una denegaci\u00f3n de servicio (D0S) a trav\u00e9s del campo de comando."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ZIKH26/CVE-information/blob/master/TOTOLINK/Vulnerability%20Information_2.md",
|
||||
|
||||
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-34087",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-26T16:15:08.507",
|
||||
"lastModified": "2024-08-26T19:10:18.890",
|
||||
"lastModified": "2024-08-28T16:35:22.590",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An SEH-based buffer overflow in the BPQ32 HTTP Server in BPQ32 6.0.24.1 allows remote attackers with access to the Web Terminal to achieve remote code execution via an HTTP POST /TermInput request."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Un desbordamiento de b\u00fafer basado en SEH en el servidor HTTP BPQ32 en BPQ32 6.0.24.1 permite a atacantes remotos con acceso a la terminal web lograr la ejecuci\u00f3n remota de c\u00f3digo a trav\u00e9s de una solicitud HTTP POST /TermInput."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://groups.io/g/bpq32",
|
||||
|
||||
@ -2,85 +2,15 @@
|
||||
"id": "CVE-2024-35325",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-06-13T17:15:50.390",
|
||||
"lastModified": "2024-08-28T14:15:08.433",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-08-28T16:15:08.417",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in libyaml up to 0.2.5. Affected by this issue is the function yaml_event_delete of the file /src/libyaml/src/api.c. The manipulation leads to a double-free."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se encontr\u00f3 una vulnerabilidad en libyaml hasta 0.2.5. La funci\u00f3n yaml_event_delete del archivo /src/libyaml/src/api.c es afectada por esta vulnerabilidad. La manipulaci\u00f3n conduce a una doble libertad."
|
||||
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-415"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:pyyaml:libyaml:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "0.2.5",
|
||||
"matchCriteriaId": "2EC679D8-115E-4170-8038-0BCB93DFE1BA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/idhyt/pocs/blob/main/libyaml/CVE-2024-35325.c",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/idhyt/pocs/tree/main/libyaml",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
||||
@ -2,99 +2,15 @@
|
||||
"id": "CVE-2024-35326",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-06-13T17:15:50.490",
|
||||
"lastModified": "2024-08-28T15:15:16.590",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [
|
||||
{
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"tags": [
|
||||
"disputed"
|
||||
]
|
||||
}
|
||||
],
|
||||
"lastModified": "2024-08-28T16:15:08.740",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "libyaml v0.2.5 is vulnerable to Buffer Overflow. Affected by this issue is the function yaml_emitter_emit of the file /src/libyaml/src/emitter.c. The manipulation leads to a double-free. NOTE: this is disputed by the supplier because the discoverer's sample C code is incorrect: it does not call all of the required _initialize functions that are described in the LibYAML documentation."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "libyaml v0.2.5 es vulnerable al desbordamiento de b\u00fafer. La funci\u00f3n yaml_emitter_emit del archivo /src/libyaml/src/emitter.c es afectada por esta vulnerabilidad. La manipulaci\u00f3n conduce a una doble libertad."
|
||||
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:pyyaml:libyaml:0.2.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A6BEAEF3-43E6-4FD6-8A52-C73530C631E9"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/idhyt/pocs/blob/main/libyaml/CVE-2024-35326.c",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/idhyt/pocs/tree/main/libyaml",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yaml/libyaml/issues/298",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yaml/libyaml/issues/302",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
||||
@ -2,90 +2,15 @@
|
||||
"id": "CVE-2024-35328",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-06-13T16:15:11.037",
|
||||
"lastModified": "2024-08-28T15:15:16.750",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [
|
||||
{
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"tags": [
|
||||
"disputed"
|
||||
]
|
||||
}
|
||||
],
|
||||
"lastModified": "2024-08-28T16:15:08.863",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "libyaml v0.2.5 is vulnerable to a denial of service. Affected by this issue is the function yaml_parser_parse of the file /src/libyaml/src/parser.c. NOTE: this is disputed by the supplier because the discoverer's sample C code is incorrect: it does not call required _initialize functions that are described in the LibYAML documentation."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "libyaml v0.2.5 es vulnerable a DDOS. La funci\u00f3n yaml_parser_parse del archivo /src/libyaml/src/parser.c es afectada por esta vulnerabilidad."
|
||||
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-835"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:pyyaml:libyaml:0.2.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A6BEAEF3-43E6-4FD6-8A52-C73530C631E9"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/idhyt/pocs/blob/main/libyaml/CVE-2024-35328.c",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/idhyt/pocs/tree/main/libyaml",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
||||
@ -2,35 +2,15 @@
|
||||
"id": "CVE-2024-35329",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-06-11T05:15:53.533",
|
||||
"lastModified": "2024-08-02T03:15:51.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [
|
||||
{
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"tags": [
|
||||
"disputed"
|
||||
]
|
||||
}
|
||||
],
|
||||
"lastModified": "2024-08-28T16:15:08.980",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "libyaml 0.2.5 is vulnerable to a heap-based Buffer Overflow in yaml_document_add_sequence in api.c. NOTE: the supplier disputes this because the finding represents a user error. The problem is that the application, which was making use of the libyaml library, omitted the required calls to the yaml_document_initialize and yaml_document_delete functions."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "libyaml 0.2.5 es vulnerable a un desbordamiento de b\u00fafer basado en mont\u00f3n en yaml_document_add_sequence en api.c."
|
||||
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://drive.google.com/file/d/1xgQ9hJ7Sn5RVEsdMGvIy0s3b_bg3Wyk-/view?usp=sharing",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yaml/libyaml/releases/tag/0.2.5",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
"references": []
|
||||
}
|
||||
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-38856",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-08-05T09:15:56.780",
|
||||
"lastModified": "2024-08-28T01:00:00.950",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-28T16:15:58.043",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"cisaExploitAdd": "2024-08-27",
|
||||
"cisaActionDue": "2024-09-17",
|
||||
@ -21,6 +21,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -55,22 +75,53 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:ofbiz:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "18.12.15",
|
||||
"matchCriteriaId": "445F4EEE-8237-47E4-AB1C-729659C36A57"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://issues.apache.org/jira/browse/OFBIZ-13128",
|
||||
"source": "security@apache.org"
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.apache.org/thread/olxxjk6b13sl3wh9cmp0k2dscvp24l7w",
|
||||
"source": "security@apache.org"
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://ofbiz.apache.org/download.html",
|
||||
"source": "security@apache.org"
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://ofbiz.apache.org/security.html",
|
||||
"source": "security@apache.org"
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-39930",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-04T16:15:02.277",
|
||||
"lastModified": "2024-08-12T19:35:09.940",
|
||||
"lastModified": "2024-08-28T16:15:09.077",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -59,6 +59,10 @@
|
||||
{
|
||||
"url": "https://www.sonarsource.com/blog/securing-developer-tools-unpatched-code-vulnerabilities-in-gogs-1/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.vicarius.io/vsociety/posts/argument-injection-in-gogs-ssh-server-cve-2024-39930",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -2,17 +2,41 @@
|
||||
"id": "CVE-2024-3980",
|
||||
"sourceIdentifier": "cybersecurity@hitachienergy.com",
|
||||
"published": "2024-08-27T13:15:05.210",
|
||||
"lastModified": "2024-08-27T15:52:01.317",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-28T16:32:20.957",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The product allows user input to control or influence paths or file\nnames that are used in filesystem operations, allowing the attacker to access or modify system files or other files that are\ncritical to the application."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El producto permite que el usuario controle o influya en las rutas o nombres de archivos que se utilizan en las operaciones del sistema de archivos, lo que permite al atacante acceder o modificar archivos del sistema u otros archivos que son cr\u00edticos para la aplicaci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cybersecurity@hitachienergy.com",
|
||||
"type": "Secondary",
|
||||
@ -36,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-88"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "cybersecurity@hitachienergy.com",
|
||||
"type": "Secondary",
|
||||
@ -47,10 +81,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hitachienergy:microscada_x_sys600:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.6",
|
||||
"matchCriteriaId": "DF883AE0-876F-4A66-AAD1-19B9695F14CC"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://publisher.hitachienergy.com/preview?DocumentID=8DBD000160&LanguageCode=en&DocumentPartId=&Action=Launch",
|
||||
"source": "cybersecurity@hitachienergy.com"
|
||||
"source": "cybersecurity@hitachienergy.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -2,17 +2,41 @@
|
||||
"id": "CVE-2024-3982",
|
||||
"sourceIdentifier": "cybersecurity@hitachienergy.com",
|
||||
"published": "2024-08-27T13:15:05.557",
|
||||
"lastModified": "2024-08-27T15:52:01.317",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-28T16:30:50.080",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An attacker with local access to machine where MicroSCADA X\nSYS600 is installed, could enable the session logging supporting the product and try to exploit a session hijacking of an already established session. By default, the session logging level\nis not enabled and only users with administrator rights can enable it."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Un atacante con acceso local a la m\u00e1quina donde est\u00e1 instalado MicroSCADA X SYS600, podr\u00eda habilitar el registro de sesiones que soporta el producto e intentar explotar un secuestro de sesi\u00f3n de una sesi\u00f3n ya establecida. De forma predeterminada, el nivel de registro de sesi\u00f3n no est\u00e1 habilitado y solo los usuarios con derechos de administrador pueden habilitarlo."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.2,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.5,
|
||||
"impactScore": 6.0
|
||||
},
|
||||
{
|
||||
"source": "cybersecurity@hitachienergy.com",
|
||||
"type": "Secondary",
|
||||
@ -36,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-294"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "cybersecurity@hitachienergy.com",
|
||||
"type": "Secondary",
|
||||
@ -47,10 +81,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hitachienergy:microscada_x_sys600:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.6",
|
||||
"matchCriteriaId": "DF883AE0-876F-4A66-AAD1-19B9695F14CC"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://publisher.hitachienergy.com/preview?DocumentID=8DBD000160&LanguageCode=en&DocumentPartId=&Action=Launch",
|
||||
"source": "cybersecurity@hitachienergy.com"
|
||||
"source": "cybersecurity@hitachienergy.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-41310",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-02T17:16:38.763",
|
||||
"lastModified": "2024-08-05T12:41:45.957",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-28T17:42:01.190",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,11 +15,67 @@
|
||||
"value": "AndServer 2.1.12 es vulnerable a Directory Traversal."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:yanzhenjie:andserver:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "2.1.12",
|
||||
"matchCriteriaId": "2CB0C220-D4E7-4805-9121-39E85B6E16A4"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/Gppp23333/f915655ff17df9a0fd1d92e3e2096cb9",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
48
CVE-2024/CVE-2024-415xx/CVE-2024-41564.json
Normal file
48
CVE-2024/CVE-2024-415xx/CVE-2024-41564.json
Normal file
@ -0,0 +1,48 @@
|
||||
{
|
||||
"id": "CVE-2024-41564",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-28T17:15:10.693",
|
||||
"lastModified": "2024-08-28T17:15:10.693",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "EMI v.1.1.10 and before, fixed in v.1.1.11, contains an Improper Validation of Specified Index, Position, or Offset in Input vulnerability. The specific issue is a failure to validate slot index and decrement stack count in EMI mod for Minecraft, which allows in-game item duplication."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@mitre.org",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/apple502j/6d691b62c37fc37b03b0784917064df6",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/emilyploszaj/emi/blob/1.21/xplat/src/main/java/dev/emi/emi/network/FillRecipeC2SPacket.java",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
||||
48
CVE-2024/CVE-2024-415xx/CVE-2024-41565.json
Normal file
48
CVE-2024/CVE-2024-415xx/CVE-2024-41565.json
Normal file
@ -0,0 +1,48 @@
|
||||
{
|
||||
"id": "CVE-2024-41565",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-28T17:15:10.903",
|
||||
"lastModified": "2024-08-28T17:15:10.903",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "JustEnoughItems (JEI) 19.5.0.33 and before contains an Improper Validation of Specified Index, Position, or Offset in Input vulnerability. The specific issue is a failure to validate slot index in JEI for Minecraft, which allows in-game item duplication."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@mitre.org",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/apple502j/05123abb1d1c89c31afde15a9b34e2ae",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/mezz/JustEnoughItems/commit/99ff43ba1009c44c6d935e2ab8a6c9292bb12873",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-41657",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-08-20T21:15:13.687",
|
||||
"lastModified": "2024-08-21T12:30:33.697",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-28T16:13:35.140",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-697"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -51,14 +81,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:casbin:casdoor:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F1B75F3C-3552-48E9-87F8-B34056AA5A5E"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/casdoor/casdoor/blob/v1.577.0/routers/cors_filter.go#L45",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://securitylab.github.com/advisories/GHSL-2024-035_GHSL-2024-036_casdoor/",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-41658",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-08-20T21:15:13.910",
|
||||
"lastModified": "2024-08-21T12:30:33.697",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-28T16:08:31.743",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -51,14 +81,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:casbin:casdoor:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F1B75F3C-3552-48E9-87F8-B34056AA5A5E"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/casdoor/casdoor/blob/v1.577.0/web/src/QrCodePage.js",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://securitylab.github.com/advisories/GHSL-2024-035_GHSL-2024-036_casdoor/",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
48
CVE-2024/CVE-2024-426xx/CVE-2024-42698.json
Normal file
48
CVE-2024/CVE-2024-426xx/CVE-2024-42698.json
Normal file
@ -0,0 +1,48 @@
|
||||
{
|
||||
"id": "CVE-2024-42698",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-28T16:15:09.210",
|
||||
"lastModified": "2024-08-28T16:15:09.210",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Roughly Enough Items (REI) v.16.0.729 and before contains an Improper Validation of Specified Index, Position, or Offset in Input vulnerability. The specific issue is a failure to validate slot index and decrement stack count in the Roughly Enough Items (REI) mod for Minecraft, which allows in-game item duplication."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@mitre.org",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/apple502j/7b1af0082449c9bfbf910e9a25ef3595",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/shedaniel/RoughlyEnoughItems/commit/e80ca84f1affb91d2388ddb298bfc6b141828cad",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-42845",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-23T19:15:06.947",
|
||||
"lastModified": "2024-08-26T12:47:20.187",
|
||||
"lastModified": "2024-08-28T16:35:23.650",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Una vulnerabilidad de inyecci\u00f3n de evaluaci\u00f3n en el componente invesalius/reader/dicom.py de InVesalius 3.1.99991 a 3.1.99998 permite a atacantes ejecutar c\u00f3digo arbitrario cargando un archivo DICOM manipulado."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.0,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/invesalius/invesalius3",
|
||||
|
||||
60
CVE-2024/CVE-2024-429xx/CVE-2024-42900.json
Normal file
60
CVE-2024/CVE-2024-429xx/CVE-2024-42900.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-42900",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-28T16:15:09.443",
|
||||
"lastModified": "2024-08-28T16:35:24.427",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Ruoyi v4.7.9 and before was discovered to contain a cross-site scripting (XSS) vulnerability via the sql parameter of the createTable() function at /tool/gen/create."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://g03m0n.github.io/posts/cve-2024-42900/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://gitee.com/y_project/RuoYi",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-43915",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-08-26T21:15:29.360",
|
||||
"lastModified": "2024-08-27T13:01:37.913",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-28T17:44:45.193",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:zephyr-one:zephyr_project_manager:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "3.3.103",
|
||||
"matchCriteriaId": "8862B152-D6D9-4600-BAA9-2059B1758E63"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/zephyr-project-manager/wordpress-zephyr-project-manager-plugin-3-3-102-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -2,17 +2,41 @@
|
||||
"id": "CVE-2024-4872",
|
||||
"sourceIdentifier": "cybersecurity@hitachienergy.com",
|
||||
"published": "2024-08-27T13:15:05.890",
|
||||
"lastModified": "2024-08-27T15:52:01.317",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-28T16:25:02.097",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The product does not validate any query towards persistent\ndata, resulting in a risk of injection attacks."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El producto no valida ninguna consulta sobre datos persistentes, lo que genera riesgo de ataques de inyecci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cybersecurity@hitachienergy.com",
|
||||
"type": "Secondary",
|
||||
@ -36,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "cybersecurity@hitachienergy.com",
|
||||
"type": "Secondary",
|
||||
@ -47,10 +81,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hitachienergy:microscada_x_sys600:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.6",
|
||||
"matchCriteriaId": "DF883AE0-876F-4A66-AAD1-19B9695F14CC"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://publisher.hitachienergy.com/preview?DocumentID=8DBD000160&LanguageCode=en&DocumentPartId=&Action=Launch",
|
||||
"source": "cybersecurity@hitachienergy.com"
|
||||
"source": "cybersecurity@hitachienergy.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
56
CVE-2024/CVE-2024-60xx/CVE-2024-6053.json
Normal file
56
CVE-2024/CVE-2024-60xx/CVE-2024-6053.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-6053",
|
||||
"sourceIdentifier": "psirt@teamviewer.com",
|
||||
"published": "2024-08-28T17:15:11.163",
|
||||
"lastModified": "2024-08-28T17:15:11.163",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper access control in the clipboard synchronization feature in TeamViewer Full Client prior version 15.57 and TeamViewer Meeting prior version 15.55.3 can lead to unintentional sharing of the clipboard with the current presenter of a meeting."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@teamviewer.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@teamviewer.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-359"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.teamviewer.com/en/resources/trust-center/security-bulletins/tv-2024-1007/",
|
||||
"source": "psirt@teamviewer.com"
|
||||
}
|
||||
]
|
||||
}
|
||||
64
CVE-2024/CVE-2024-77xx/CVE-2024-7744.json
Normal file
64
CVE-2024/CVE-2024-77xx/CVE-2024-7744.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2024-7744",
|
||||
"sourceIdentifier": "security@progress.com",
|
||||
"published": "2024-08-28T17:15:11.380",
|
||||
"lastModified": "2024-08-28T17:15:11.380",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In WS_FTP Server versions before 8.8.8 (2022.0.8), an Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in the Web Transfer Module allows File Discovery, Probe System Files, User-Controlled Filename, Path Traversal.\n\u00a0\n\nAn authenticated file download flaw has been identified where a user can craft an API call that allows them to download a file from an arbitrary folder on the drive where that user host's root folder is located (by default this is C:)"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@progress.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@progress.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-73"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://community.progress.com/s/article/WS-FTP-Server-Service-Pack-August-2024",
|
||||
"source": "security@progress.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.progress.com/ftp-server",
|
||||
"source": "security@progress.com"
|
||||
}
|
||||
]
|
||||
}
|
||||
64
CVE-2024/CVE-2024-77xx/CVE-2024-7745.json
Normal file
64
CVE-2024/CVE-2024-77xx/CVE-2024-7745.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2024-7745",
|
||||
"sourceIdentifier": "security@progress.com",
|
||||
"published": "2024-08-28T17:15:11.593",
|
||||
"lastModified": "2024-08-28T17:15:11.593",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In WS_FTP Server versions before 8.8.8 (2022.0.8), a Missing Critical Step in Multi-Factor Authentication of the Web Transfer Module allows users to skip the second-factor verification and log in with username and password only."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@progress.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@progress.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-290"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-304"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://community.progress.com/s/article/WS-FTP-Server-Service-Pack-August-2024",
|
||||
"source": "security@progress.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.progress.com/ftp-server",
|
||||
"source": "security@progress.com"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -2,17 +2,41 @@
|
||||
"id": "CVE-2024-7940",
|
||||
"sourceIdentifier": "cybersecurity@hitachienergy.com",
|
||||
"published": "2024-08-27T13:15:06.217",
|
||||
"lastModified": "2024-08-27T15:52:01.317",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-28T16:24:07.043",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The product exposes a service that is intended for local only to\nall network interfaces without any authentication."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El producto expone un servicio destinado \u00fanicamente al nivel local para todas las interfaces de red sin ninguna autenticaci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cybersecurity@hitachienergy.com",
|
||||
"type": "Secondary",
|
||||
@ -36,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-306"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "cybersecurity@hitachienergy.com",
|
||||
"type": "Secondary",
|
||||
@ -47,10 +81,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hitachienergy:microscada_x_sys600:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "10.2",
|
||||
"versionEndExcluding": "10.6",
|
||||
"matchCriteriaId": "5B9D0068-FDE8-4A91-B4A6-F498363223E5"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://publisher.hitachienergy.com/preview?DocumentID=8DBD000160&LanguageCode=en&DocumentPartId=&Action=Launch",
|
||||
"source": "cybersecurity@hitachienergy.com"
|
||||
"source": "cybersecurity@hitachienergy.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -2,17 +2,41 @@
|
||||
"id": "CVE-2024-7941",
|
||||
"sourceIdentifier": "cybersecurity@hitachienergy.com",
|
||||
"published": "2024-08-27T13:15:06.467",
|
||||
"lastModified": "2024-08-27T15:52:01.317",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-28T16:09:03.693",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An HTTP parameter may contain a URL value and could cause\nthe web application to redirect the request to the specified URL.\nBy modifying the URL value to a malicious site, an attacker may\nsuccessfully launch a phishing scam and steal user credentials."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Un par\u00e1metro HTTP puede contener un valor de URL y podr\u00eda hacer que la aplicaci\u00f3n web redirija la solicitud a la URL especificada. Al modificar el valor de la URL de un sitio malicioso, un atacante puede iniciar con \u00e9xito una estafa de phishing y robar las credenciales del usuario."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "cybersecurity@hitachienergy.com",
|
||||
"type": "Secondary",
|
||||
@ -36,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-601"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "cybersecurity@hitachienergy.com",
|
||||
"type": "Secondary",
|
||||
@ -47,10 +81,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hitachienergy:microscada_x_sys600:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.6",
|
||||
"matchCriteriaId": "DF883AE0-876F-4A66-AAD1-19B9695F14CC"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://publisher.hitachienergy.com/preview?DocumentID=8DBD000160&LanguageCode=en&DocumentPartId=&Action=Launch",
|
||||
"source": "cybersecurity@hitachienergy.com"
|
||||
"source": "cybersecurity@hitachienergy.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
78
README.md
78
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-08-28T16:00:18.024756+00:00
|
||||
2024-08-28T18:00:18.030891+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-08-28T15:46:39.613000+00:00
|
||||
2024-08-28T17:59:36.023000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,46 +33,60 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
261371
|
||||
261387
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `2`
|
||||
Recently added CVEs: `16`
|
||||
|
||||
- [CVE-2024-34198](CVE-2024/CVE-2024-341xx/CVE-2024-34198.json) (`2024-08-28T15:15:16.503`)
|
||||
- [CVE-2024-8195](CVE-2024/CVE-2024-81xx/CVE-2024-8195.json) (`2024-08-28T14:15:08.990`)
|
||||
- [CVE-2024-20279](CVE-2024/CVE-2024-202xx/CVE-2024-20279.json) (`2024-08-28T17:15:06.113`)
|
||||
- [CVE-2024-20284](CVE-2024/CVE-2024-202xx/CVE-2024-20284.json) (`2024-08-28T17:15:06.893`)
|
||||
- [CVE-2024-20285](CVE-2024/CVE-2024-202xx/CVE-2024-20285.json) (`2024-08-28T17:15:07.687`)
|
||||
- [CVE-2024-20286](CVE-2024/CVE-2024-202xx/CVE-2024-20286.json) (`2024-08-28T17:15:08.400`)
|
||||
- [CVE-2024-20289](CVE-2024/CVE-2024-202xx/CVE-2024-20289.json) (`2024-08-28T17:15:09.117`)
|
||||
- [CVE-2024-20411](CVE-2024/CVE-2024-204xx/CVE-2024-20411.json) (`2024-08-28T17:15:09.500`)
|
||||
- [CVE-2024-20413](CVE-2024/CVE-2024-204xx/CVE-2024-20413.json) (`2024-08-28T17:15:09.763`)
|
||||
- [CVE-2024-20446](CVE-2024/CVE-2024-204xx/CVE-2024-20446.json) (`2024-08-28T17:15:09.997`)
|
||||
- [CVE-2024-20478](CVE-2024/CVE-2024-204xx/CVE-2024-20478.json) (`2024-08-28T17:15:10.220`)
|
||||
- [CVE-2024-41564](CVE-2024/CVE-2024-415xx/CVE-2024-41564.json) (`2024-08-28T17:15:10.693`)
|
||||
- [CVE-2024-41565](CVE-2024/CVE-2024-415xx/CVE-2024-41565.json) (`2024-08-28T17:15:10.903`)
|
||||
- [CVE-2024-42698](CVE-2024/CVE-2024-426xx/CVE-2024-42698.json) (`2024-08-28T16:15:09.210`)
|
||||
- [CVE-2024-42900](CVE-2024/CVE-2024-429xx/CVE-2024-42900.json) (`2024-08-28T16:15:09.443`)
|
||||
- [CVE-2024-6053](CVE-2024/CVE-2024-60xx/CVE-2024-6053.json) (`2024-08-28T17:15:11.163`)
|
||||
- [CVE-2024-7744](CVE-2024/CVE-2024-77xx/CVE-2024-7744.json) (`2024-08-28T17:15:11.380`)
|
||||
- [CVE-2024-7745](CVE-2024/CVE-2024-77xx/CVE-2024-7745.json) (`2024-08-28T17:15:11.593`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `45`
|
||||
Recently modified CVEs: `57`
|
||||
|
||||
- [CVE-2024-23721](CVE-2024/CVE-2024-237xx/CVE-2024-23721.json) (`2024-08-28T15:35:15.520`)
|
||||
- [CVE-2024-25354](CVE-2024/CVE-2024-253xx/CVE-2024-25354.json) (`2024-08-28T14:35:07.993`)
|
||||
- [CVE-2024-2605](CVE-2024/CVE-2024-26xx/CVE-2024-2605.json) (`2024-08-28T15:35:21.410`)
|
||||
- [CVE-2024-2609](CVE-2024/CVE-2024-26xx/CVE-2024-2609.json) (`2024-08-28T15:35:21.617`)
|
||||
- [CVE-2024-2615](CVE-2024/CVE-2024-26xx/CVE-2024-2615.json) (`2024-08-28T15:35:21.843`)
|
||||
- [CVE-2024-2625](CVE-2024/CVE-2024-26xx/CVE-2024-2625.json) (`2024-08-28T15:35:22.080`)
|
||||
- [CVE-2024-26310](CVE-2024/CVE-2024-263xx/CVE-2024-26310.json) (`2024-08-28T15:35:16.490`)
|
||||
- [CVE-2024-26503](CVE-2024/CVE-2024-265xx/CVE-2024-26503.json) (`2024-08-28T15:35:17.227`)
|
||||
- [CVE-2024-27746](CVE-2024/CVE-2024-277xx/CVE-2024-27746.json) (`2024-08-28T15:35:18.103`)
|
||||
- [CVE-2024-28339](CVE-2024/CVE-2024-283xx/CVE-2024-28339.json) (`2024-08-28T14:35:08.337`)
|
||||
- [CVE-2024-28521](CVE-2024/CVE-2024-285xx/CVE-2024-28521.json) (`2024-08-28T15:35:19.147`)
|
||||
- [CVE-2024-28669](CVE-2024/CVE-2024-286xx/CVE-2024-28669.json) (`2024-08-28T14:35:09.157`)
|
||||
- [CVE-2024-28682](CVE-2024/CVE-2024-286xx/CVE-2024-28682.json) (`2024-08-28T14:35:09.923`)
|
||||
- [CVE-2024-28756](CVE-2024/CVE-2024-287xx/CVE-2024-28756.json) (`2024-08-28T14:35:10.690`)
|
||||
- [CVE-2024-29131](CVE-2024/CVE-2024-291xx/CVE-2024-29131.json) (`2024-08-28T15:35:19.953`)
|
||||
- [CVE-2024-29271](CVE-2024/CVE-2024-292xx/CVE-2024-29271.json) (`2024-08-28T14:35:11.473`)
|
||||
- [CVE-2024-31811](CVE-2024/CVE-2024-318xx/CVE-2024-31811.json) (`2024-08-28T15:35:22.300`)
|
||||
- [CVE-2024-35325](CVE-2024/CVE-2024-353xx/CVE-2024-35325.json) (`2024-08-28T14:15:08.433`)
|
||||
- [CVE-2024-35326](CVE-2024/CVE-2024-353xx/CVE-2024-35326.json) (`2024-08-28T15:15:16.590`)
|
||||
- [CVE-2024-35328](CVE-2024/CVE-2024-353xx/CVE-2024-35328.json) (`2024-08-28T15:15:16.750`)
|
||||
- [CVE-2024-44083](CVE-2024/CVE-2024-440xx/CVE-2024-44083.json) (`2024-08-28T15:15:17.050`)
|
||||
- [CVE-2024-45346](CVE-2024/CVE-2024-453xx/CVE-2024-45346.json) (`2024-08-28T14:35:12.640`)
|
||||
- [CVE-2024-6879](CVE-2024/CVE-2024-68xx/CVE-2024-6879.json) (`2024-08-28T15:35:24.120`)
|
||||
- [CVE-2024-7720](CVE-2024/CVE-2024-77xx/CVE-2024-7720.json) (`2024-08-28T14:35:14.160`)
|
||||
- [CVE-2024-8088](CVE-2024/CVE-2024-80xx/CVE-2024-8088.json) (`2024-08-28T14:15:08.813`)
|
||||
- [CVE-2024-25579](CVE-2024/CVE-2024-255xx/CVE-2024-25579.json) (`2024-08-28T16:35:14.267`)
|
||||
- [CVE-2024-25655](CVE-2024/CVE-2024-256xx/CVE-2024-25655.json) (`2024-08-28T16:35:15.510`)
|
||||
- [CVE-2024-25859](CVE-2024/CVE-2024-258xx/CVE-2024-25859.json) (`2024-08-28T16:35:16.347`)
|
||||
- [CVE-2024-25866](CVE-2024/CVE-2024-258xx/CVE-2024-25866.json) (`2024-08-28T16:35:17.133`)
|
||||
- [CVE-2024-26470](CVE-2024/CVE-2024-264xx/CVE-2024-26470.json) (`2024-08-28T16:35:18.190`)
|
||||
- [CVE-2024-28125](CVE-2024/CVE-2024-281xx/CVE-2024-28125.json) (`2024-08-28T16:35:19.333`)
|
||||
- [CVE-2024-28537](CVE-2024/CVE-2024-285xx/CVE-2024-28537.json) (`2024-08-28T16:35:20.337`)
|
||||
- [CVE-2024-28640](CVE-2024/CVE-2024-286xx/CVE-2024-28640.json) (`2024-08-28T16:35:21.193`)
|
||||
- [CVE-2024-34087](CVE-2024/CVE-2024-340xx/CVE-2024-34087.json) (`2024-08-28T16:35:22.590`)
|
||||
- [CVE-2024-35325](CVE-2024/CVE-2024-353xx/CVE-2024-35325.json) (`2024-08-28T16:15:08.417`)
|
||||
- [CVE-2024-35326](CVE-2024/CVE-2024-353xx/CVE-2024-35326.json) (`2024-08-28T16:15:08.740`)
|
||||
- [CVE-2024-35328](CVE-2024/CVE-2024-353xx/CVE-2024-35328.json) (`2024-08-28T16:15:08.863`)
|
||||
- [CVE-2024-35329](CVE-2024/CVE-2024-353xx/CVE-2024-35329.json) (`2024-08-28T16:15:08.980`)
|
||||
- [CVE-2024-38856](CVE-2024/CVE-2024-388xx/CVE-2024-38856.json) (`2024-08-28T16:15:58.043`)
|
||||
- [CVE-2024-3980](CVE-2024/CVE-2024-39xx/CVE-2024-3980.json) (`2024-08-28T16:32:20.957`)
|
||||
- [CVE-2024-3982](CVE-2024/CVE-2024-39xx/CVE-2024-3982.json) (`2024-08-28T16:30:50.080`)
|
||||
- [CVE-2024-39930](CVE-2024/CVE-2024-399xx/CVE-2024-39930.json) (`2024-08-28T16:15:09.077`)
|
||||
- [CVE-2024-41310](CVE-2024/CVE-2024-413xx/CVE-2024-41310.json) (`2024-08-28T17:42:01.190`)
|
||||
- [CVE-2024-41657](CVE-2024/CVE-2024-416xx/CVE-2024-41657.json) (`2024-08-28T16:13:35.140`)
|
||||
- [CVE-2024-41658](CVE-2024/CVE-2024-416xx/CVE-2024-41658.json) (`2024-08-28T16:08:31.743`)
|
||||
- [CVE-2024-42845](CVE-2024/CVE-2024-428xx/CVE-2024-42845.json) (`2024-08-28T16:35:23.650`)
|
||||
- [CVE-2024-43915](CVE-2024/CVE-2024-439xx/CVE-2024-43915.json) (`2024-08-28T17:44:45.193`)
|
||||
- [CVE-2024-4872](CVE-2024/CVE-2024-48xx/CVE-2024-4872.json) (`2024-08-28T16:25:02.097`)
|
||||
- [CVE-2024-7940](CVE-2024/CVE-2024-79xx/CVE-2024-7940.json) (`2024-08-28T16:24:07.043`)
|
||||
- [CVE-2024-7941](CVE-2024/CVE-2024-79xx/CVE-2024-7941.json) (`2024-08-28T16:09:03.693`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
||||
218
_state.csv
218
_state.csv
@ -92623,7 +92623,7 @@ CVE-2016-9838,0,0,8915e7a7760dab1b83ccc9fcf5714761065d956e576593ed79dbce273e9baa
|
||||
CVE-2016-9839,0,0,56dd29d3d2add257a8ccbd99c526531df97870ecd1b87178196e5e22a1a37a37,2023-01-31T19:58:56.190000
|
||||
CVE-2016-9840,0,0,c8cdfedcf9ba9d30c2e11a30c9ee1027f9c4943670cac0713400edb96b12ecbf,2023-11-07T02:37:35.780000
|
||||
CVE-2016-9841,0,0,8461023f0b6af372abbc700df4bf248326f3d17885a444f7d4bf87fb75831d87,2023-11-07T02:37:36.093000
|
||||
CVE-2016-9842,0,0,d67fed1be1f6e8159dfb3396159a58fa49ed8dc17f52d03827fd9c4112a2c093,2023-11-07T02:37:36.463000
|
||||
CVE-2016-9842,0,1,f887688450a4850080a5fa5b9a8d1985988eec4aa2e1048034fa4a27dddd287e,2024-08-28T16:07:50.587000
|
||||
CVE-2016-9843,0,0,03bba8f361b4f311c57e6be0a8dca8d549e9547ec0826de5125cdde6ebac4654,2023-11-07T02:37:36.807000
|
||||
CVE-2016-9844,0,0,00ba3ac318d524a060543298e92f49ba342658607b49204e522db0201c5e4e2a,2019-12-16T20:24:14.587000
|
||||
CVE-2016-9845,0,0,00bb0b1bdce117249db0d0b791e75c832a7a8fdd6ba23a94074ca0696959dbbe,2020-11-10T19:23:05.543000
|
||||
@ -121384,7 +121384,7 @@ CVE-2018-25095,0,0,6f4ec7520fe1e8e1137939a36d89eebffe41414142eb46d5c5f36cf386b6b
|
||||
CVE-2018-25096,0,0,0f1a9d2fe0943450f70fc2f111ebfdebd2f2c63d07ffdb5b75cb7af27e02a352,2024-05-17T01:27:30.770000
|
||||
CVE-2018-25097,0,0,b132b2c05ec96134ee21d6c1f5f845fb6d9b53254de5311e7c1f18ebf1a12d65,2024-05-17T01:27:30.893000
|
||||
CVE-2018-25098,0,0,afd500b111d854a57f928388ff40ee517eeef41a47b8f0c70385aae8f8a38f95,2024-08-05T13:15:46.743000
|
||||
CVE-2018-25099,0,0,586c7631a0b69d643c54a64a2d6b1e5bcbdf77958964a738487d2e947c8f6cc3,2024-03-18T12:38:25.490000
|
||||
CVE-2018-25099,0,1,22c87c7789711d5cc0070c0c244e3b7eff042bf6e9bfc44eac77be6b7d7fb00e,2024-08-28T16:35:00.880000
|
||||
CVE-2018-25100,0,0,d942384485e6477ac02d774d7915e3145ff5d011228e897d01068d424d5fde66,2024-08-01T13:41:42.160000
|
||||
CVE-2018-25101,0,0,f5cb23a560b5f7e2ed0bc287e9dbbe48d218ed9a2d3fbe094521b3e09b217300,2024-06-04T19:16:57.060000
|
||||
CVE-2018-25103,0,0,e59105c00442742ab1ecc8faba8dbf0d67b37225837a23e9578526d5287d5f7e,2024-07-09T16:15:02.787000
|
||||
@ -136789,7 +136789,7 @@ CVE-2019-19820,0,0,d3200ebc5d581b4755916a609fe50979edea5a15e0fc3a04ffa5f71613f4e
|
||||
CVE-2019-19821,0,0,5d4ec7e2bffa15750c2939c0e7d2adea2bc3396ead4c3fc172fe464bc3578a28,2020-08-24T17:37:01.140000
|
||||
CVE-2019-19822,0,0,f372437f800ae6340a6e164d4e09649bd7569c516be8f3889c8ec515ac663de0,2020-08-24T17:37:01.140000
|
||||
CVE-2019-19823,0,0,3f6ad46dcab8a2c03d46210de505a5e9a1aaa92fdf0608ae333a991ddf15937a,2020-02-06T16:04:39.370000
|
||||
CVE-2019-19824,0,0,59b351a45fa829535350144da6c60d4794ee8053c5a3ab8fc932ddcb8697aa6e,2020-02-05T14:30:22.743000
|
||||
CVE-2019-19824,0,1,470dce5093b75447bd94440b7c6f03be30ee4db4f4b74c0509d2f6e47234a226,2024-08-28T16:15:07.290000
|
||||
CVE-2019-19825,0,0,04de0123f214687b69fe0b70940205a91ae0ecd6ff99d9fd325f56ef736a2f2b,2020-02-05T14:35:31.347000
|
||||
CVE-2019-19826,0,0,2689ee020ae9e5e4ebe835dbcc0a88d036a8c5de49eae99421281d65c6938d42,2019-12-27T16:49:24.693000
|
||||
CVE-2019-19829,0,0,3f73ae381fa8469b280488161d5fec22d571a4f6250d30f76b53103ab377bf65,2019-12-23T12:27:16.840000
|
||||
@ -147483,7 +147483,7 @@ CVE-2020-1261,0,0,facd24f80876f2ac6682cd4ffcda5908f697f57ca36f3a6dbb2ed3896e7945
|
||||
CVE-2020-12612,0,0,27c013661b38b08d73a9ed802a24540f4841a815e7c5477dd782dabe8437df9c,2023-12-15T16:24:27.337000
|
||||
CVE-2020-12613,0,0,c95356c17bc093130235aa64aae86584b7d9b965bf99a8b709408a2aaf3f050c,2023-12-14T16:37:11.820000
|
||||
CVE-2020-12614,0,0,847dc8f32da2d3c78a4e8ef365590ce7648ef554d7da2f4e7aa6d04370642371,2024-08-01T13:42:02.280000
|
||||
CVE-2020-12615,0,0,36d741a8300c40d0907640fbe1b56e3d7d47937811858f27d7bb5e898c668199,2023-12-15T16:04:51.323000
|
||||
CVE-2020-12615,0,1,cee1614af6805d53af2421028afbdb88ae531b53c887c8bfa80b60d7e96edf01,2024-08-28T17:35:00.743000
|
||||
CVE-2020-12618,0,0,6597e2bb9a8de14b97fe7ce944c521c20b776df974886bc6ada82eff63e8acda,2021-07-21T11:39:23.747000
|
||||
CVE-2020-12619,0,0,ee598b4bf1d4265af77d330472cf7b83e088560073a1c2a3d5a6cf8d6eb12600,2021-07-21T11:39:23.747000
|
||||
CVE-2020-1262,0,0,21c4e042f0bae4f9c23017151de84d72ef7a045e9efdf2cc4d6cb16ca079a3e6,2021-07-21T11:39:23.747000
|
||||
@ -205546,7 +205546,7 @@ CVE-2022-39332,0,0,477ba7648b2ff3efc7e15c35cd4f9a8063953643bd104d8fcf6e4123d4bd6
|
||||
CVE-2022-39333,0,0,cae9628f620aeaa785bde614c3495c0a2350667e343b17114cdc498043380647,2022-12-01T17:39:03.577000
|
||||
CVE-2022-39334,0,0,953bd45d6f15391408c3de4c9a67e9cc53b41429382ade33f7af626f41ee3551,2023-03-06T23:15:10.630000
|
||||
CVE-2022-39335,0,0,338f7cecc4b22c17265bfd6917b9af12b92d4fcf78cd780c23b38825977fd2cc,2023-06-11T04:15:46.950000
|
||||
CVE-2022-39337,0,1,f866441bba89a0453feac8e7bea56e5219ca451051c24133b8806696129bfcb4,2024-08-28T15:44:19.793000
|
||||
CVE-2022-39337,0,0,f866441bba89a0453feac8e7bea56e5219ca451051c24133b8806696129bfcb4,2024-08-28T15:44:19.793000
|
||||
CVE-2022-39338,0,0,df2a8a3e9084a1d1b2316940bbb923180459197a0b5b11dac656c6305cfdf18b,2022-12-01T20:43:10.727000
|
||||
CVE-2022-39339,0,0,e54c18e4443dc47f306cd260e8ea3e02e1e318519ab443dbbf61c42136e20110,2022-12-01T20:43:02.263000
|
||||
CVE-2022-3934,0,0,7ed77fa0bccfc3f3da1a7580185e2d2d09a7b3cc8b2502be4a6a5fc2baf3cbd9,2023-11-07T03:51:59.160000
|
||||
@ -205864,7 +205864,7 @@ CVE-2022-39988,0,0,9f069419049172b539dd2423b25d3d05c1cc2c011ba2c6a9dcec6c5b14ff3
|
||||
CVE-2022-39989,0,0,7ffdce84d8cd26b98c707b03c57c173dd5d7b41678d150601e81ecbc1bbf6f23,2023-05-04T19:49:24.510000
|
||||
CVE-2022-3999,0,0,56326c6b077d7a3c7ca90954778c1f40832d60973c4c7842e4f24fc67bbe6eef,2023-11-07T03:52:05.753000
|
||||
CVE-2022-39996,0,0,515d89341d75fc891c2495715479db343fbd6a795549afa8dc6e58128081b767,2024-08-27T21:35:01.140000
|
||||
CVE-2022-39997,0,1,c4be36e10992cb34e24c9e36e48466b46176d35b275196043e4e9383a4fda946,2024-08-28T14:35:01.570000
|
||||
CVE-2022-39997,0,0,c4be36e10992cb34e24c9e36e48466b46176d35b275196043e4e9383a4fda946,2024-08-28T14:35:01.570000
|
||||
CVE-2022-4000,0,0,293c79822977efd995079bd9f91c2bb859b092b412fd024b23d45cadf6837091,2023-11-07T03:56:39.273000
|
||||
CVE-2022-40000,0,0,b2c90b4cd331ea48eb1c696df1cfed736f89b655e360d832a043e7696dd829cb,2022-12-19T16:23:40.887000
|
||||
CVE-2022-40001,0,0,53944e40d3dc029fd806c75d13f9eb446512b7b5067631d8fcb6e9c0e4408b76,2022-12-19T16:23:53.913000
|
||||
@ -213969,7 +213969,7 @@ CVE-2023-1494,0,0,fabe57685f9f065291cb73b5da5d58e55c63347ea4b821215e6a77cd8e6703
|
||||
CVE-2023-1495,0,0,52d3a63f7531a21742127196634a25b8aac0e9134944b225f239008a7eb20fba,2024-05-17T02:18:10.487000
|
||||
CVE-2023-1496,0,0,3ad20729adb8da7a942dfca3bf38af88fc6858bc7a66965d5ec257bb936aaa30,2023-03-24T01:52:42.833000
|
||||
CVE-2023-1497,0,0,43a07682b47772aadc64da8126950dfea0d545240de7c9596bc9fee6200700c4,2024-05-17T02:18:10.633000
|
||||
CVE-2023-1498,0,0,9eeeceff41634d9dbf8d03706cdae4e9acea19ed25c6b8ff143ac0284ca5312f,2024-05-17T02:18:10.733000
|
||||
CVE-2023-1498,0,1,4d50d5dbc3486095aedc7eaa2f308030e3ee52eaefe33b180e0e29b5a94f7140,2024-08-28T17:20:31.837000
|
||||
CVE-2023-1499,0,0,8ff3854eaf9c82717c95e16a68fcb189e93074538f80edc381c1653810d6905e,2024-05-17T02:18:10.843000
|
||||
CVE-2023-1500,0,0,3e6c08282f27193f563da01f48a334141476b60383b5180210ca9fe12b3b5de6,2024-05-17T02:18:10.947000
|
||||
CVE-2023-1501,0,0,d6509f5f5f21ad6ed83987bcae6b52f819de1d497f3a8c7a59f97f9b53e05666,2024-05-17T02:18:11.043000
|
||||
@ -219701,9 +219701,9 @@ CVE-2023-26319,0,0,3dd6441fbb2cf89b0e957e6f3f556dd38ea034f50ae932ae756d43f14248f
|
||||
CVE-2023-2632,0,0,301898869b5a60457376f20e3b7ea036dcafa847ec705a351ca3cee971a25c85,2023-05-25T16:08:28.660000
|
||||
CVE-2023-26320,0,0,ce18ada0dab81b6e3cbb23f236fe2120ff674b38177ae9eb5db23adbd1986f1c,2023-10-16T19:04:10.920000
|
||||
CVE-2023-26321,0,0,b75b605fdb8ac99bba7cd33bc5a27b0464761915d8e051cc7391f87c31191bc9,2024-08-28T12:57:17.117000
|
||||
CVE-2023-26322,0,1,ae8c5667c11735312321cb181d2196f18f33751c8d17700350b90e39fb0c2fbd,2024-08-28T14:35:02.847000
|
||||
CVE-2023-26322,0,0,ae8c5667c11735312321cb181d2196f18f33751c8d17700350b90e39fb0c2fbd,2024-08-28T14:35:02.847000
|
||||
CVE-2023-26323,0,0,484add0c04d4a78cede6c93a8c8952694f596119aecb48ac15eaa55dd3b75254,2024-08-28T12:57:17.117000
|
||||
CVE-2023-26324,0,1,8b1c94ee76ce1b7d9628f12727c64bd99e209245cf657c110e5b9f5e4629b4f9,2024-08-28T14:35:04.193000
|
||||
CVE-2023-26324,0,0,8b1c94ee76ce1b7d9628f12727c64bd99e209245cf657c110e5b9f5e4629b4f9,2024-08-28T14:35:04.193000
|
||||
CVE-2023-26325,0,0,0815d0f5538437b0c1a37e2d30e66d4594a1f33bad8ba20cf36ef6d2f6c24077,2023-04-13T20:15:09.657000
|
||||
CVE-2023-26326,0,0,7a94421fc97dc2e69220f52c8149f79ba5e3f607156d057693f823cb0ba1ecd2,2023-03-03T16:46:29.717000
|
||||
CVE-2023-26327,0,0,1cc55ebadf8900607cbb779734840e485cf992ab645ea88d7f35d67b7049a018,2023-04-03T18:42:37.320000
|
||||
@ -232328,7 +232328,7 @@ CVE-2023-42856,0,0,3785bc6082e7fa65742eabd642d5d65c5d33879ffd7643e13cc058ba75458
|
||||
CVE-2023-42857,0,0,9ea98d96cc65b90009b648670c5da30d2e3d83b1ae536f9a719789ff9eb40128,2023-11-02T18:00:33.847000
|
||||
CVE-2023-42858,0,0,3cde77cff878b7bb98d08b0160f9736789daeec37f86aa56fd544ce01873eae4,2024-02-22T19:07:27.197000
|
||||
CVE-2023-42859,0,0,056e476b883af3601285b7d51ae8531980184ba9abc1b8c0a16964226a0b857e,2024-08-01T13:44:47.733000
|
||||
CVE-2023-42860,0,0,cb68b7c82514ef900a7acd7613121b5f748ef4ff4bdc9490298810a61c3cc7e3,2024-02-22T19:07:27.197000
|
||||
CVE-2023-42860,0,1,4e19a93e16851fec5fc6672b9721a2fce11965675135557499cfe11bbbdc7c5d,2024-08-28T16:35:01.493000
|
||||
CVE-2023-42861,0,0,d8d65111e4802e544404dd9d1d2d3c6540cc7742d5e3fa7afcb7a11f5c1a79ab,2024-06-10T17:16:13.247000
|
||||
CVE-2023-42862,0,0,a36257707b4fb74a8615ecf862e41d30af8f3c8f9308b2858c6cc934e94b61f7,2024-01-17T20:51:42.080000
|
||||
CVE-2023-42865,0,0,bf2a0a432fe9999b756c62ffd215341250f2d8dc167f4293b6e906b46c209a63,2024-01-17T20:51:12.820000
|
||||
@ -232351,7 +232351,7 @@ CVE-2023-42887,0,0,6a183a6bbbb784cf3ff7a27ca6dc2d91b7b7c3f3cb1bda7867c2939a5f618
|
||||
CVE-2023-42888,0,0,b067218531e45be7cc34fa1275d3c2b57f0925c26eb93740839a000d9953633b,2024-01-26T20:53:27.637000
|
||||
CVE-2023-42889,0,0,1649dc73df9490d9ce669184ee1d4b8722c3b17f66d00680b3c3c34df498b755,2024-02-22T19:07:27.197000
|
||||
CVE-2023-4289,0,0,97e9dbfb002f991c9b0c7bb56513ad2ad7a34e2cc2f1908f40b15808fc4c7b13,2023-11-07T04:22:25.410000
|
||||
CVE-2023-42890,0,1,53f9bd40d8d0f96f9f6543dcc5925d3ff1f33138300a4d36e7353088fc83c101,2024-08-28T15:35:01.817000
|
||||
CVE-2023-42890,0,0,53f9bd40d8d0f96f9f6543dcc5925d3ff1f33138300a4d36e7353088fc83c101,2024-08-28T15:35:01.817000
|
||||
CVE-2023-42891,0,0,9e832a9c79650ad0321f807def388413064ff2ab68c6ecbf9bb18e2496c75004,2023-12-13T17:46:10.560000
|
||||
CVE-2023-42892,0,0,45868be9e713d43fbe1857fd521e7819eff03e6332a2f62faa55e58f6a79244c,2024-08-21T23:35:00.660000
|
||||
CVE-2023-42893,0,0,3980591866774d66d6fd5796746be691a489cc5b2a82a91788fc3f19d39afc21,2024-08-27T17:35:02.800000
|
||||
@ -234678,7 +234678,7 @@ CVE-2023-46422,0,0,9828db1651145e55303f7c90e9b80d9152a0babe8f2b6bf7c6211e8345b27
|
||||
CVE-2023-46423,0,0,fae9f7621f04eecce4ee8c67ae3cb477991a1d96e9608dd2d417468ee933e47e,2023-11-01T16:37:41.027000
|
||||
CVE-2023-46424,0,0,50d5b8cffd7312c685b7f6280f3573716a877c1580c703fe9f896ec5081cf2ad,2023-11-01T16:37:51.027000
|
||||
CVE-2023-46426,0,0,095958b9525a539d6bad1510a5c4a9bb3f3e81ffc03067e72a3a22c99ed7e1b9,2024-08-05T20:35:01.333000
|
||||
CVE-2023-46427,0,1,49f28026f66bab442fbbca6291281014daccaf89a172c4da56b52f3f0d507191,2024-08-28T14:35:05.477000
|
||||
CVE-2023-46427,0,0,49f28026f66bab442fbbca6291281014daccaf89a172c4da56b52f3f0d507191,2024-08-28T14:35:05.477000
|
||||
CVE-2023-46428,0,0,faa78dcade98f2a1e124d91c90afd9b9a200a5dd262391aece6b2b8f2e67c134,2023-11-06T19:30:17.810000
|
||||
CVE-2023-4643,0,0,f6caf5740564746f31d2fc7731a7738c5a9fdb65fac1d028210c31eb8a3076a3,2023-11-07T04:22:48.657000
|
||||
CVE-2023-46435,0,0,9045d4cee8109ec2b6ac83ee0b4dc133557afb03e66020489ecea163a3631054,2023-10-30T16:20:21.103000
|
||||
@ -234692,7 +234692,7 @@ CVE-2023-4645,0,0,080630aaab2615758e1b4d6f50d89291c19a67c7887d417a836246d5119706
|
||||
CVE-2023-46450,0,0,9eedfca9fc0f26e4373fe52fcdff22340a7718bcd00536967f1e45fb1ec952e0,2023-10-30T15:55:16.417000
|
||||
CVE-2023-46451,0,0,b7c650f5171568ff66e636d2cc25afe576e379cc753300c14a6647b49ae59d53,2023-11-06T18:15:09.143000
|
||||
CVE-2023-46454,0,0,3dbd1be3466e652b6244f86c6f23f5226b664c9ce63ddb43f7325d4e0e6c7c6d,2023-12-14T19:33:14.070000
|
||||
CVE-2023-46455,0,1,e03b9e4bc6b2de6f664a9f7cd364bb185c8fa2f5c4a439688d4c28bff35710b3,2024-08-28T15:35:03.253000
|
||||
CVE-2023-46455,0,0,e03b9e4bc6b2de6f664a9f7cd364bb185c8fa2f5c4a439688d4c28bff35710b3,2024-08-28T15:35:03.253000
|
||||
CVE-2023-46456,0,0,c4dfd3d82ae14a8b837bb61f8d23f14c4d0fc689e9b777f969e34fde85a437e8,2023-12-14T22:49:19.163000
|
||||
CVE-2023-4646,0,0,8b7e316f7875d1dd1b48005b399d9b0cf2d7921bd690ed55ff013ac594bec756,2023-11-07T04:22:48.910000
|
||||
CVE-2023-46467,0,0,8054488fd0132f7e27914107b3db54b56d981952490fdc3e16c9ef4f66fb3574,2023-11-07T15:08:59.640000
|
||||
@ -235490,7 +235490,7 @@ CVE-2023-47575,0,0,30cf6be65abd61448a4a89a9b72de85e929953eb93306b378cfacaff6d87c
|
||||
CVE-2023-47576,0,0,b658502efe54d9b05c4f426be235a8b40d293e00fdab9f01c40b60b57e7ef3f8,2023-12-18T15:01:53.273000
|
||||
CVE-2023-47577,0,0,c0f13ddb15e49455530054095cc0266851552b5d13fc042a223643cd9df0b789,2023-12-18T15:08:42.737000
|
||||
CVE-2023-47578,0,0,8bf0aae804a5d895a13b8eaa8706ff025054dd6e316ca1b2834837b692a8f7bf,2023-12-18T15:09:42.753000
|
||||
CVE-2023-47579,0,1,0bc8ca0bdf2b7d7cbafb94bed8df43d5e20d7b33eda5789e01e7640552057e07,2024-08-28T15:35:05.660000
|
||||
CVE-2023-47579,0,0,0bc8ca0bdf2b7d7cbafb94bed8df43d5e20d7b33eda5789e01e7640552057e07,2024-08-28T15:35:05.660000
|
||||
CVE-2023-4758,0,0,713db879644d26febfa528fa3b5a32eaa4d032e64a180d47e3477adfad42aa0a,2023-09-06T20:43:43.440000
|
||||
CVE-2023-47580,0,0,1046d1b7ec521db48bb6fc1bed5767243c03c220591fb511a40a277d8666b4e6,2024-08-14T19:35:12.147000
|
||||
CVE-2023-47581,0,0,5103c8a44f66e69718053305c6d841267ec2f6ba489578cb95ee5adf75321cf4,2024-08-12T15:35:03.167000
|
||||
@ -236037,7 +236037,7 @@ CVE-2023-48402,0,0,4c809f2dd5e8dcfff010aa543a6c6f045768b178ca00ba8754b6c8edf6ecc
|
||||
CVE-2023-48403,0,0,4adc068ba69d93e217814aa03ab06c64d37d4e6f1f5b9e967d203dad5b01ccd6,2024-03-12T21:15:56.243000
|
||||
CVE-2023-48404,0,0,678d899eed5c458b58da3464689532ca0142c650f2cd178cdc3f7827df0120ca,2024-03-12T21:15:56.300000
|
||||
CVE-2023-48405,0,0,1184ca00738252a4a1fbfd7c535695d37028df78fe87d5aaaa04a1bc365c4159,2024-03-12T21:15:56.373000
|
||||
CVE-2023-48406,0,0,b330092f99e86d2edcd1d228620e5c48e2defe79dfd91e54db7fffe08c3396da,2024-03-12T21:15:56.447000
|
||||
CVE-2023-48406,0,1,2445441492451ebf82a279a716c6dee55e56ee02ca955335af793ffffa08201f,2024-08-28T16:35:03.950000
|
||||
CVE-2023-48407,0,0,878114c674344ec771789050e93c4a630dfc18deac136706916dedaddc59d9b4,2024-03-12T21:15:56.517000
|
||||
CVE-2023-48408,0,0,685d630782a479a80a275f86cfe75523d6e24bb2a663d7b093992d79e473f5dd,2024-03-12T21:15:56.573000
|
||||
CVE-2023-48409,0,0,34f77accc0b2ac79d7dec98b91bbcd5fa76dbfd08a55d334eff38c7b0b7cd036,2024-03-12T21:15:56.647000
|
||||
@ -236888,7 +236888,7 @@ CVE-2023-49463,0,0,3997f0c76b75718e8d7fddf13118ae3adfe6e7b8a1e026bbdd8c02aa82ae2
|
||||
CVE-2023-49464,0,0,6558ffdc5c503d25be5dd218daff18765b512708dd37d505c33fce4d88f34e1f,2023-12-11T17:31:56.900000
|
||||
CVE-2023-49465,0,0,3295dd761e06a7bab659329b7dd55f865f3505849f65d110e023c01328124ac4,2023-12-30T21:15:43.877000
|
||||
CVE-2023-49467,0,0,7f3716a39cf738913c36e4fa2859efa373c3aaf2bd666ae6754d1492097f8159,2023-12-30T21:15:43.957000
|
||||
CVE-2023-49468,0,0,bfb71ddc96fc61c25389cb277f3607453a350af6a19b799eacb4a3c375f3b229,2023-12-30T21:15:44.010000
|
||||
CVE-2023-49468,0,1,55990c3cfc1762557c3abc0f50412c9420be45de4a1b51770b6fd2755f3d891e,2024-08-28T17:35:02.020000
|
||||
CVE-2023-49469,0,0,cbc193cf36e9355f9d67ec1bc5dc157b2a50fd7106252de12cbfb6ed4ef2ef76,2024-01-04T17:14:07.600000
|
||||
CVE-2023-4947,0,0,8df0a8e59512a342c1480f6e8ba47140e8a497588a05b9e649ab29c7e1e4eb1b,2023-11-07T04:23:12.703000
|
||||
CVE-2023-49471,0,0,0f7e53b0476caf611046a94136cc7f6de729f116f183f5bc0ae510c9611e40ac,2024-01-17T13:41:42.813000
|
||||
@ -236917,7 +236917,7 @@ CVE-2023-49540,0,0,fc00996658e2e1a07b2142617d49b74a28a84c9993046a375e13324fccec2
|
||||
CVE-2023-49543,0,0,9b27cf28e2f4c20b40d2a61fced0fc62af90f21931996c253e884b5f19a62074,2024-03-01T22:22:25.913000
|
||||
CVE-2023-49544,0,0,4165df005ca812878112fcb221906d65322102731e6bd43d48afbe4e5ae39573,2024-08-01T13:45:11.667000
|
||||
CVE-2023-49545,0,0,5c8aa915328bef2165801ea42c2341178b1be4c886fc54a48ff456640387987f,2024-08-26T20:35:08.767000
|
||||
CVE-2023-49546,0,1,651265cc1835f191987d8dea805e802734a1a950ddf6c3305c2a4b545571de95,2024-08-28T15:35:07.920000
|
||||
CVE-2023-49546,0,0,651265cc1835f191987d8dea805e802734a1a950ddf6c3305c2a4b545571de95,2024-08-28T15:35:07.920000
|
||||
CVE-2023-49547,0,0,0d72f4b66aa616990dce257fb750379ef931b2acf59d9d176a6ef0cb0371efa7,2024-03-05T13:41:01.900000
|
||||
CVE-2023-49548,0,0,34b77376d27ee723d3ac14898631fa76b657dfe4cf5b3276c3299d37e41dd1fc,2024-08-08T20:35:02.323000
|
||||
CVE-2023-49549,0,0,2421b127f456be0fc67abfad0a3b1f8926786d5d65fc8c1f3d22621b1f55fe3e,2024-01-09T16:18:48.520000
|
||||
@ -237237,7 +237237,7 @@ CVE-2023-49985,0,0,48621d95c58dd65f642543dd394ac7e9d6daa5b1663d066d6d97b86f6ff66
|
||||
CVE-2023-49986,0,0,0bfa07ebd9dbe1f0457cbd00aed62c65d63f7c4a056604f06d8368c48ba916b7,2024-08-05T16:35:03.407000
|
||||
CVE-2023-49987,0,0,6666894146cb92f75fc70a6c668cf409191be8d05d66fdbc2b6973b27220807d,2024-03-07T13:52:27.110000
|
||||
CVE-2023-49988,0,0,af3f01af8abbd20907ca3d22a8fb2f0ce6ca13f1af6f9bf92429d44550b8b49a,2024-08-16T18:35:02.507000
|
||||
CVE-2023-49989,0,1,8df1969668f4784b3aa305612d6516447c61c41a729e4e36322e658aab5c3304,2024-08-28T15:35:08.730000
|
||||
CVE-2023-49989,0,0,8df1969668f4784b3aa305612d6516447c61c41a729e4e36322e658aab5c3304,2024-08-28T15:35:08.730000
|
||||
CVE-2023-4999,0,0,a9caefdd4df7e960da2284d3ca94a538ae47e3d7f39d9ecb83734266ebc3a13e,2023-11-07T04:23:17.550000
|
||||
CVE-2023-49990,0,0,1e5e5df2253f1be938172770085e3c41be08a9bc49fb8adca7ab6f2eb4169092,2024-01-19T04:15:08.763000
|
||||
CVE-2023-49991,0,0,bd97a9ee7ae0f1cc74ef24bcda4231f713b9e1b0d8fdff1d77ef1e74196f05c6,2024-01-19T04:15:08.870000
|
||||
@ -237991,7 +237991,7 @@ CVE-2023-51381,0,0,dae38e2969db35298f7bb53595e944e9233b54858e286dfa2789b9cc64727
|
||||
CVE-2023-51384,0,0,ec284ced8a028c80f45570d0f48e893a628f0d7f6a64a78835100e3773167767,2024-05-16T20:05:04.420000
|
||||
CVE-2023-51385,0,0,851b9cad7a3a79109e0c97cd30aedcae9c6f131217d805171f55cda1951222c6,2024-03-13T21:15:55.100000
|
||||
CVE-2023-51386,0,0,4989bef2423d43e06599dc7ab49fc1d8a0bef0f8e3a284aff6f4a4e0683c2314,2024-01-04T19:16:10.103000
|
||||
CVE-2023-51387,0,1,61045a6f80132e19a6458cc843badc64a41bde5ee1cf5a76830bb756b79dd605,2024-08-28T15:44:19.793000
|
||||
CVE-2023-51387,0,0,61045a6f80132e19a6458cc843badc64a41bde5ee1cf5a76830bb756b79dd605,2024-08-28T15:44:19.793000
|
||||
CVE-2023-51388,0,0,2e3ad8da9f38d091cbd8c98cd1a3aabae546f5511bbdfeff688c563085b3097e,2024-02-22T19:07:27.197000
|
||||
CVE-2023-51389,0,0,c8183e674f9d5219872a33e92b5a1fdc0eae3b4f316b3eb093c7a493c5e168c0,2024-02-22T19:07:27.197000
|
||||
CVE-2023-5139,0,0,1703630468285261ed8fc04774841fb8122f0aa2e090a95b0549614dd0a159a8,2024-01-21T01:44:13.437000
|
||||
@ -238263,7 +238263,7 @@ CVE-2023-51637,0,0,9dd5b13b347418006a53b7d73382dc77bb92ad47f1cbb8db408529d421275
|
||||
CVE-2023-5164,0,0,b96e66d5438a1cd840a20c13041943d6f222ecbeaac68c7c2ffd9b6ed64d4331,2023-11-07T20:09:50.093000
|
||||
CVE-2023-51649,0,0,70538420b22ae7c1ec835f6d0f9cf2b1648e5b5b1c043bf313fd06206fe66366,2024-01-03T20:05:01.863000
|
||||
CVE-2023-5165,0,0,f7a9615603b2683ca9f4a9791f442b32b6c76896818992c01d44336b1364689e,2023-09-26T15:50:49.217000
|
||||
CVE-2023-51650,0,1,98710112de1b85c9e5cffb5b0fe011dc59cbdea61dca30c0e7335004e1cac08a,2024-08-28T15:44:19.793000
|
||||
CVE-2023-51650,0,0,98710112de1b85c9e5cffb5b0fe011dc59cbdea61dca30c0e7335004e1cac08a,2024-08-28T15:44:19.793000
|
||||
CVE-2023-51651,0,0,67d2a3bf08f4d907e981e638fa0d5228e436cc7d71dbb46f1110ed924b67b0d6,2024-01-03T18:32:41.760000
|
||||
CVE-2023-51652,0,0,39d217c9de6d0571e49c9aba349c3d8cf90b339902c56edcd4df3013a87c71f5,2024-01-08T19:35:18.890000
|
||||
CVE-2023-51653,0,0,340dbcfc1bdb4753b236d00e4b63c6786e60d215a986fbe2b29b43277f9525e4,2024-02-22T19:07:27.197000
|
||||
@ -240877,7 +240877,7 @@ CVE-2023-7013,0,0,752e84fc788817f789f383d9b4727a6a371c7a1c500c5d0ed88cf4177f1382
|
||||
CVE-2023-7014,0,0,343f60c0c60318ab32b52871ee4d7ec4b33f7cbb001a30f4e8bb917247b8186a,2024-02-15T15:07:55.347000
|
||||
CVE-2023-7015,0,0,f6191da82f2fc008d6b0296c01ac7c77ae2915d456ba40916209a6adb4acf55a,2024-03-13T18:16:18.563000
|
||||
CVE-2023-7016,0,0,010884b21a27fa66d833a70681dd186e397f473cbb0b90536483fba7b0d7269d,2024-02-27T14:19:41.650000
|
||||
CVE-2023-7017,0,0,d43bb3d02f436ac3feae16f37cb770aded8869c7c92b22169a5874f87e286ae1,2024-03-17T22:38:29.433000
|
||||
CVE-2023-7017,0,1,aa895f7622a9e9487e48d598147c82444bd79284c2bfbb4573f1fd908bd954d9,2024-08-28T17:35:03.137000
|
||||
CVE-2023-7018,0,0,9438a9ef02cb6b14eeff26492e18c6b4314ac91317f5ba8b28b4a172250c35b2,2023-12-30T03:13:12.367000
|
||||
CVE-2023-7019,0,0,25421d5b7b02bc2542949247708020c3ce3a00d66a261d8b3c79bad4af5b1cd1,2024-01-17T22:28:36.323000
|
||||
CVE-2023-7020,0,0,7d3304d8f230cb46404a5f4e0c7dfc242c13c646702476b3fd55147c8232dd5a,2024-05-17T02:34:03.503000
|
||||
@ -240944,7 +240944,7 @@ CVE-2023-7081,0,0,b94c538c220abbbf5d50ca8a2904f1fe370fbb1f80a5e1f3321f9af9bffbc7
|
||||
CVE-2023-7082,0,0,500d0f2d877d9984b63decc202acb4ee4bb46b23d005a29465c40aa2ce7d0bca,2024-01-26T19:48:56.570000
|
||||
CVE-2023-7083,0,0,cb22c9eca48a356f4e09d670d9f560809daf8ed155fa4fd28ed59b232188d26d,2024-01-19T14:54:30.993000
|
||||
CVE-2023-7084,0,0,4632f03cec16c49d84207124ebe67a266da26c671bc47e64aa3e00e71deebb1b,2024-01-19T14:54:24.987000
|
||||
CVE-2023-7085,0,0,da4e24c322f876c0f94209a6ada5b031f39fe51c4da1fcc26d3e0f2743831f74,2024-03-18T19:40:00.173000
|
||||
CVE-2023-7085,0,1,2e3497cfcb0d64b95af3c14736994ba0426fe4d3ef1d65caf7eb86e7da2ff298,2024-08-28T16:35:05.330000
|
||||
CVE-2023-7089,0,0,de15bf10cbbafe87d399a0ec4c918efb24631900a27c9c1192eff372993ed731,2024-02-03T00:27:31.313000
|
||||
CVE-2023-7090,0,0,a5b4a70cda853965b97ddccc4bf6511943919b8d4fb98b9077b8f1637ede54e4,2024-02-08T10:15:13.540000
|
||||
CVE-2023-7091,0,0,d58faa483178a62c20472bf1bded86f6b329c385b83c74a05c3e1f3b3b217008,2024-05-17T02:34:08.657000
|
||||
@ -241015,7 +241015,7 @@ CVE-2023-7163,0,0,54f5e7a55d48eb95c47fe9ab2bd934c769b28ba59ea5fbda349ed798a02bdb
|
||||
CVE-2023-7164,0,0,e7da404d660f91758f580fc565df691ca99acae8f562df71fb30da4b6304eb9b,2024-07-03T01:44:29.277000
|
||||
CVE-2023-7165,0,0,9579de52ee223f320f228c1ef75c7d093c7dd9bb72a0fc1f5802e6bcb3ff7ba2,2024-08-09T19:35:02.617000
|
||||
CVE-2023-7166,0,0,6cedf7ff09611c5f6f6894ca5635265e9233fca36dede244b351d519590f0234,2024-05-17T02:34:15.110000
|
||||
CVE-2023-7167,0,0,88ba53fe30221ae79ab66946da9ed586fa8d09e6fce2dd10ec5e0586182d0a78,2024-02-27T14:20:06.637000
|
||||
CVE-2023-7167,0,1,0e3c29c7cc835a20e80756f62d0f5108a7def03f7452b53925a11093d45ea396,2024-08-28T16:35:05.563000
|
||||
CVE-2023-7169,0,0,ab91bd41244dde388327206c23937e5dca7ce4b0de2116a1c3757d023bfdbdc4,2024-02-15T02:29:40.877000
|
||||
CVE-2023-7170,0,0,c09ccb7568e9a7781a5b4886b0c86c25c0a32c50adfe4049560ce5dfc4fe85bc,2024-01-26T21:05:46.627000
|
||||
CVE-2023-7171,0,0,ca5e0c79c1ad7ffbcf6087eb7053f4be605bc976e841898426c6792174a905d1,2024-05-17T02:34:15.343000
|
||||
@ -241107,13 +241107,13 @@ CVE-2024-0009,0,0,31a37345511ab8f9e782cdcb9d09dfe3dad4751b5c25ab7a9b1c5c74d0c64c
|
||||
CVE-2024-0010,0,0,0619a8beffc460e406861d5436887a98d4820a4ca409aea20f604a00879fcec0,2024-02-15T06:23:39.303000
|
||||
CVE-2024-0011,0,0,871bd2790e1644ed9a3dece6c89b7131ea036c72c23f82726bf2a5f6003f50ac,2024-02-15T06:23:39.303000
|
||||
CVE-2024-0014,0,0,57b1d977bcf36a4089ab5ef9c9905bf2b69a9e66b00e8c3e91bd20eccc0f8b75,2024-08-26T18:35:03.770000
|
||||
CVE-2024-0015,0,0,81cd08444b6aef5834e4eb427fcb32b84cfcb9c43ccd80385d5b532e537d2ea5,2024-02-16T19:26:55.393000
|
||||
CVE-2024-0015,0,1,00e8b369d8c884be684dc161c3d8d59320e06337f56989191711b768cfe02c9b,2024-08-28T17:35:03.353000
|
||||
CVE-2024-0016,0,0,9f5b99ef0d039809c901d88070265a95558aa17f1c51832fa2b12f3ceeec7221,2024-02-16T21:39:50.223000
|
||||
CVE-2024-0017,0,0,e30ea632c5fd7e4383ceb5900aa731fb2d3b5c50d8f9b57582813b251f138048,2024-02-16T21:39:50.223000
|
||||
CVE-2024-0018,0,0,eb1e6beb7617de808c00f24002cfa4ad37cdeb05dc3559f2748a83507aca8f33,2024-08-15T18:35:05.293000
|
||||
CVE-2024-0019,0,0,99addb01bdd59dfa56c3bb78510b54e791e3b9af747d8108035ab5d4ed5b10b6,2024-02-16T21:39:50.223000
|
||||
CVE-2024-0020,0,0,e73ca517c90039568523c56c44f0cf8b451388b3358b22e01f666a71e39cd157,2024-08-01T13:45:54.660000
|
||||
CVE-2024-0021,0,1,35bc8c578cc0cec7a2154a7bc3054d93602e915964abd6edd058f93c9e8b6d66,2024-08-28T15:35:10.670000
|
||||
CVE-2024-0021,0,0,35bc8c578cc0cec7a2154a7bc3054d93602e915964abd6edd058f93c9e8b6d66,2024-08-28T15:35:10.670000
|
||||
CVE-2024-0022,0,0,3cd621aee24b508cab60e42df908bea04c2b9934f8ccf5b596c88265f9b01d22,2024-05-08T13:15:00.690000
|
||||
CVE-2024-0023,0,0,0ae19107c0f009088c14cc9607c2fcb734bab1e5ea02d37a78e27ee1213b97f1,2024-08-21T20:35:01.700000
|
||||
CVE-2024-0024,0,0,5fb9489ab6bda1953438739836edf4a6b94bd74733037853a8a3c897eda90f7b,2024-07-03T01:44:32.010000
|
||||
@ -241126,7 +241126,7 @@ CVE-2024-0031,0,0,b1cddaec25187c54af4bebb0dcc796dbc4415ad876a9b9d3fa787304a60914
|
||||
CVE-2024-0032,0,0,fc22f68933af2c7d437ee6e4910dddc9fa796af5b59e8f4b2de22081edbdf814,2024-02-16T13:37:55.033000
|
||||
CVE-2024-0033,0,0,27344b7715a75d0aa82a7b18cd174c27fc55902f246df424d23b6d9f7df6dd01,2024-08-16T18:35:03.300000
|
||||
CVE-2024-0034,0,0,cf6982fa2541b8054d4b654ea4c176621af3fadbf8e13dda28278df5290d9039,2024-08-01T13:45:55.720000
|
||||
CVE-2024-0035,0,1,7f9a041eb0797a9ce082ac40f420562683422751c556b2a3bd01f4fb3ad4e8b1,2024-08-28T15:35:11.740000
|
||||
CVE-2024-0035,0,0,7f9a041eb0797a9ce082ac40f420562683422751c556b2a3bd01f4fb3ad4e8b1,2024-08-28T15:35:11.740000
|
||||
CVE-2024-0036,0,0,fff8c3e6a7e572a710532aa58189e21f41ee35c59b75c244857e50ee7d7b8970,2024-08-21T21:35:03.820000
|
||||
CVE-2024-0037,0,0,afae0135406bbad6488057d26d0f96084f22f97b3b4cd7fc16729b7c9f861063,2024-02-16T13:37:51.433000
|
||||
CVE-2024-0038,0,0,8a4c5cca5cece8c101e9b56b16a23bb12b2d4f0643275b101b5b221ef0addcbe,2024-08-22T14:35:04.960000
|
||||
@ -241671,7 +241671,7 @@ CVE-2024-0669,0,0,c742feb186482c5b850f8f47a8ad21b0a116882aa950f3b591c682f1d00d2f
|
||||
CVE-2024-0670,0,0,d7af230e4a779f07d41ef710c5466f9f1f09f5eed836a0b4fda43c6f633ecf53,2024-03-13T23:15:45.750000
|
||||
CVE-2024-0671,0,0,da79a7432f09b3aacdd03314c2c3998286887dab5f0baa17017c9c249e32ba15,2024-07-03T01:44:49.547000
|
||||
CVE-2024-0672,0,0,9f967c7c28c39681b8715c430ba5c3017f006b32b9fca1db8d250c48798b2ff7,2024-07-03T01:44:50.407000
|
||||
CVE-2024-0673,0,1,621eebfb65bea0cab143f6093ba44b0bae2c8c23ef4511aa09cd166f1cd81608,2024-08-28T15:35:12.690000
|
||||
CVE-2024-0673,0,0,621eebfb65bea0cab143f6093ba44b0bae2c8c23ef4511aa09cd166f1cd81608,2024-08-28T15:35:12.690000
|
||||
CVE-2024-0674,0,0,2202c0e4a57a8020cd97aff2c1a5d1a1df2bd5f61035f83890c80e50cc47048f,2024-02-08T16:39:59.450000
|
||||
CVE-2024-0675,0,0,31b4e65d3d10777ce13189dafebdfb82e520a928a3d9c7e18ba8db99a930c11a,2024-02-08T16:39:42.950000
|
||||
CVE-2024-0676,0,0,435ecea72a5bce3bb04c7988a29d806f61fbeed7ad45e02290781eeac120a465,2024-02-08T16:39:00.907000
|
||||
@ -241950,7 +241950,7 @@ CVE-2024-0968,0,0,2adf6f675fe8367153779cf53407f6187c199dacca5503cf3367ddd720d368
|
||||
CVE-2024-0969,0,0,4b15fb9fcc9f1de6dda40e4542fcbbf87d86fef0cff6f1d3f8f2a6ca2f7c00b4,2024-02-13T19:44:42.503000
|
||||
CVE-2024-0971,0,0,88718d312c26bf915d98212b01d4b46ae3d1c0d4d3f75eab0b87fa75b2f6d995,2024-03-04T22:58:00.967000
|
||||
CVE-2024-0972,0,0,2da1862f52cff62e6b3fe86a9a1b8df8664a0564b3dd76e9d8c8b90f9f4f4621,2024-07-25T13:04:13.057000
|
||||
CVE-2024-0973,0,0,e5fb6b4d7ce253b144fdf362ec0f968de6ca466dcd6c3adca143df6bc6e05926,2024-03-18T19:40:00.173000
|
||||
CVE-2024-0973,0,1,57e7e11c9ba86ba2414e0194730d475b5afdbb6ee021101088071b9ab0faee7e,2024-08-28T16:35:06.353000
|
||||
CVE-2024-0974,0,0,27c177dc86dc0d7a1d035f410f40a9cb078df941228e5de284f0e0036f520990,2024-07-12T16:11:22.950000
|
||||
CVE-2024-0975,0,0,a15795e0a44b97545f6c3eb65673627e835a4d9230308268959e3a930cb2bd74,2024-02-28T14:06:45.783000
|
||||
CVE-2024-0976,0,0,cc7f106853c76332cf2c1434fc9c2b994b6bd96e33b062831e11057ccad8d2cf,2024-03-13T18:16:18.563000
|
||||
@ -242233,7 +242233,7 @@ CVE-2024-1267,0,0,0ac3a4ad3c33b1de1cb6d3c82dc409665a58abf06843c3ddfdea13f760f08d
|
||||
CVE-2024-1268,0,0,3535bc05eb7cd6037c1775f90518b1602949681d745c741de602c9d81d4b804c,2024-05-17T02:35:22.040000
|
||||
CVE-2024-1269,0,0,a76abee2be9909f0abd99b89e430ded39ff1049f1ebeb84a48acd793ed83933a,2024-05-17T02:35:22.143000
|
||||
CVE-2024-1272,0,0,b4d437cd136cc5d8abdc015e8eb4f6f631c3baee4f3e6fc8647d6a8bbf952472,2024-06-11T17:34:25.347000
|
||||
CVE-2024-1273,0,0,77e426e491189decb08be6f5f41b23b0e6b37212aa753cdfd723b534f74aeb9c,2024-03-12T12:40:13.500000
|
||||
CVE-2024-1273,0,1,089b345b4f66bd4d35933d2f186ec6f7c5adc8306fa65b78fc7268f4e01fa9f0,2024-08-28T16:35:07.013000
|
||||
CVE-2024-1274,0,0,f8f7b3b52d888145d0c39dedcf6973ca7bc2bbccc06122fd76d9a28a5b8124d7,2024-08-27T16:35:07.453000
|
||||
CVE-2024-1275,0,0,95a0e980d47091d0f18245b57293289b11e86ae76da8634b5db343d37a5bd8e3,2024-06-05T15:15:10.990000
|
||||
CVE-2024-1276,0,0,5efaeac71a6f7c429ba2363a965edbe2ab6bb62c658e6eb49f5a8f8756c23656,2024-02-29T13:49:29.390000
|
||||
@ -242273,7 +242273,7 @@ CVE-2024-1311,0,0,158f219d191fc55e3a703340acfe0db7300bc756f612b9aecd45c845150c15
|
||||
CVE-2024-1312,0,0,5881f9a1935111843000509e72e7d874f8914b8ba0d8f1dcb31aaebae0b90758,2024-02-15T05:03:16.077000
|
||||
CVE-2024-1313,0,0,e178cffe6aa77a4f0d6d1f0bc0814c15387ceb02accf822d00ca94cf3dcbb92c,2024-06-10T18:15:24.947000
|
||||
CVE-2024-1315,0,0,25a55ec7d2eabca19718f4f801048334cc1cea56ed0621182dceeddb8f9f2d51,2024-04-10T13:24:00.070000
|
||||
CVE-2024-1316,0,0,8219ebc553a9077664f3f7c46bd8d84684203b334ed147394b768c21ba00910d,2024-03-05T13:41:01.900000
|
||||
CVE-2024-1316,0,1,8b9a0f5f641e245e1ad856d95d028ba3502b1ac3edd8a2acbd26809053aca8aa,2024-08-28T16:35:07.230000
|
||||
CVE-2024-1317,0,0,e6b73971b8fadcf515a25ac1e50eb31e33a60418d7d45cd3d52420834e679d55,2024-02-29T13:49:29.390000
|
||||
CVE-2024-1318,0,0,5ba6af40f86ed8ef42439c311587e2b7fcfc352f41e84ea7a6e6cadfbc71379b,2024-02-29T13:49:29.390000
|
||||
CVE-2024-1319,0,0,903406ad02ffa43d0d568c21b4803da244dc9d7ce0c7f684b31acb02d2ec9380,2024-03-05T13:41:01.900000
|
||||
@ -242288,7 +242288,7 @@ CVE-2024-1327,0,0,ae9f5cba237be94589254d7283daa73f7fafabd33cfebb17147581f2cee609
|
||||
CVE-2024-1328,0,0,7073f5514db5b26279568b528e71529068f45e6ad24d9e6819ac92a07723ef47,2024-03-12T12:40:13.500000
|
||||
CVE-2024-1329,0,0,2cd50cabd5bf81a4f9539c2a3a992a874338213f75ad414ccf75d557c037546e,2024-02-15T18:27:28.837000
|
||||
CVE-2024-1330,0,0,0875f448ca8ca2cb13f0b11aa8869613059f2ee4aef3a7abb81ead9c5c3d291a,2024-06-28T13:30:35.033000
|
||||
CVE-2024-1331,0,0,6c977f20f6f7bde4755773555c00e763bf8e9a163fc61da4ae97f1dd32b908a9,2024-03-18T19:40:00.173000
|
||||
CVE-2024-1331,0,1,2ed6a3714bdbfc8833dac239ac14e8cf9d94b83edc045afe826ecfe221db5078,2024-08-28T16:35:07.437000
|
||||
CVE-2024-1332,0,0,b1d0012a9e40c173cc8f28116508227ff7724ad8f4f969c3dc5f4b0e2f08d038,2024-05-24T13:03:05.093000
|
||||
CVE-2024-1333,0,0,bd53e9cdde226b8c165843c67dcea5ab4ff36ead472bf29231b1c2f3f1abcb85,2024-08-27T21:35:07.153000
|
||||
CVE-2024-1334,0,0,fe4c6be53440216c757c2bf51b270a3930f5c7dd35674ef18ead1fe70ed3fa7c,2024-02-29T13:49:29.390000
|
||||
@ -242593,7 +242593,7 @@ CVE-2024-1665,0,0,a3c3185e1ed099faa2439b0c30b394f32019efc90b2215de07a537212ac7a0
|
||||
CVE-2024-1666,0,0,1f8333a8347ccf0940f5f18eb72bff97cea1045d2d21b82516336ffe9989709b,2024-04-16T13:24:07.103000
|
||||
CVE-2024-1668,0,0,5d777dacf70894c13bb98378761ebbab538d2f58e3be366f3dd859cfdec3a507,2024-03-13T18:15:58.530000
|
||||
CVE-2024-1669,0,0,7051f11d6175af0afa7adcb8852b15d12f5bb44802faedbbae321e1477b73fea,2024-02-26T16:27:52.577000
|
||||
CVE-2024-1670,0,1,1076fe172d6239bf170090e8e565b53f2a5e980bdc541ad08c209e2df3f767db,2024-08-28T15:35:13.310000
|
||||
CVE-2024-1670,0,0,1076fe172d6239bf170090e8e565b53f2a5e980bdc541ad08c209e2df3f767db,2024-08-28T15:35:13.310000
|
||||
CVE-2024-1671,0,0,b90d151a59720bfc66cb3bbbb41d4e1a2a08b8f84ae511718307d6e0d6c90578,2024-02-26T16:27:52.697000
|
||||
CVE-2024-1672,0,0,5df25617ae1b8580bd17e41342f3db39038751d4dea40ef6d92d4a83e8eeb0f4,2024-08-01T13:46:08.940000
|
||||
CVE-2024-1673,0,0,72b6738109f060ca33cec8daa581f20d84f924c2dda86dec338ec0b1edf6aa3e,2024-08-01T13:46:09.737000
|
||||
@ -242871,7 +242871,7 @@ CVE-2024-1958,0,0,947fad07d36c41a06040aff36ab5d050d343db5e82c876a243f2fa9452dd0f
|
||||
CVE-2024-1959,0,0,20773b09a03765316a8a30eab375cea71fea1425346dc1ce35f18b661dfaac63,2024-05-02T18:00:37.360000
|
||||
CVE-2024-1960,0,0,c755cb8cb954b0b1fd45e3b2b2de1bed153c08b47450f36752ad68952963c3e6,2024-04-10T13:23:38.787000
|
||||
CVE-2024-1961,0,0,dc2f9d3f3b67fb9e1c6125531b0d8e4d845cdbbf4294ea07c79e7fd65b2f59e9,2024-04-16T13:24:07.103000
|
||||
CVE-2024-1962,0,1,476e6b66d2ca2741a53c9d27ba89ea688db749fb510d2b8ea19c7c65ad5b2d5e,2024-08-28T14:35:06.573000
|
||||
CVE-2024-1962,0,0,476e6b66d2ca2741a53c9d27ba89ea688db749fb510d2b8ea19c7c65ad5b2d5e,2024-08-28T14:35:06.573000
|
||||
CVE-2024-1963,0,0,497da3e0c849986f6d35bf596bea7f2a65b5687d8cd64468172b927cfb094a60,2024-07-18T19:46:01.863000
|
||||
CVE-2024-1965,0,0,5cf0344d0ba6ffdf46e178c3a3f0a22dafc37cdaf493620506aae0773081ac04,2024-02-28T14:06:45.783000
|
||||
CVE-2024-1968,0,0,5d386d638a6745d5972e3da785c6fa3ef4f25b00eef921490d278858d9e57670,2024-05-20T13:00:04.957000
|
||||
@ -243031,11 +243031,16 @@ CVE-2024-20272,0,0,9a8b431abc55ae18c0094ec2d1030d59c5263518a92577c729598443278bb
|
||||
CVE-2024-20276,0,0,77220479d2c4e0a0ce7772faba7bb9374ec34b0cd2307655f714f3eba6dc1b93,2024-03-27T17:48:21.140000
|
||||
CVE-2024-20277,0,0,736a7d458de43e0c8ef102aeef0adf3c0541fbbca3219355ca4fb06899462f58,2024-02-02T16:15:54.787000
|
||||
CVE-2024-20278,0,0,12aa1590b3e8a6125d7154bf2a045b19659a28fc2d4df972ed53df9e81e82c57,2024-03-27T17:48:21.140000
|
||||
CVE-2024-20279,1,1,d70470f037b7d05c267fe837a51ffe0ea6cc65e6c53b86c34aa33cd4290cbcab,2024-08-28T17:15:06.113000
|
||||
CVE-2024-2028,0,0,e06846e6ba84daa4133d99af11982cf4b0bb14edf4a6a3dc6070516f4e834b30,2024-03-13T18:15:58.530000
|
||||
CVE-2024-20281,0,0,70f852907bc1bd5fcb581ca3147fb954d228d92f21dde79d0c952efed558ff29,2024-04-03T17:24:18.150000
|
||||
CVE-2024-20282,0,0,f6e711a9a9efd85ad7bd0b3c7c022b317810618a7b30ebfdd488c3c43efc8cbb,2024-04-03T17:24:18.150000
|
||||
CVE-2024-20283,0,0,89838f66dfd213c04e8273f1b3b892c92b85a1c5cc369285f3f9a454f716823b,2024-04-03T17:24:18.150000
|
||||
CVE-2024-20284,1,1,94e1b74ffedc9173b8687d071116f5d7bd8dbce82f75276fdc4216fa70f2122c,2024-08-28T17:15:06.893000
|
||||
CVE-2024-20285,1,1,07291ba086d427d7b395cf9a023737a945604fe3a97c30185e3a52ee5edcf578,2024-08-28T17:15:07.687000
|
||||
CVE-2024-20286,1,1,a48dde2bf690927e83a911609ce24cf903143a97cbd6a6810f27d7b184f6f6a3,2024-08-28T17:15:08.400000
|
||||
CVE-2024-20287,0,0,a744ff6c1bd94e5b436bea194b1f93eaa24b8e47ada607591c8d284066172138,2024-02-02T16:15:54.887000
|
||||
CVE-2024-20289,1,1,1464ce9b0a93176e874120a5b2b1063011bc50adc24c2ed4daf27402f4108fdb,2024-08-28T17:15:09.117000
|
||||
CVE-2024-2029,0,0,354f931e93072109dced3bc73857c32e7a282fc5266016d20bde6f1070f10b9d,2024-04-10T19:49:51.183000
|
||||
CVE-2024-20290,0,0,95fa55047489b4a2ee370988084e137cebac8acab30010c47f69339f30b23cb9,2024-02-15T15:43:27.240000
|
||||
CVE-2024-20291,0,0,c2ed04ab4eaaddf8b1bcc5dc083481f305536f5151be36cfe21c14f02472ee22,2024-02-29T13:49:29.390000
|
||||
@ -243124,6 +243129,8 @@ CVE-2024-20401,0,0,4e570494182ec3fb0c9186b46f7948499e59b61e9f8ec1f0ca5200f010002
|
||||
CVE-2024-20404,0,0,9ff8f593f71d4a0ff7aecb6b668971610942799ed16450e68ad59cf7f0b9f5af,2024-06-13T20:25:46.837000
|
||||
CVE-2024-20405,0,0,2fa5b4e65c2f399507a2e57227d51876c94b3517d024d761ea8ec8bc4f4a8a91,2024-06-18T18:04:04.497000
|
||||
CVE-2024-2041,0,0,7b4fc911113d944c485bed2a7f958b069e0536bf197811dc0e3dcb8018df3bd7,2024-05-06T14:15:07.747000
|
||||
CVE-2024-20411,1,1,395490d5288175386abbe9557d871d79478d52ab619dea23e01f03ed9b1e8c1f,2024-08-28T17:15:09.500000
|
||||
CVE-2024-20413,1,1,de84dfc41b4c606cc815faeb075f0d5e99c6a9bd6cf3cdba0004c89c4dc6eddd,2024-08-28T17:15:09.763000
|
||||
CVE-2024-20416,0,0,36fba5d0b9a663051d43c2072f34c721bf06b423d2ffa103fc7cf93ef9750d67,2024-07-18T12:28:43.707000
|
||||
CVE-2024-20417,0,0,2b2621922f4e9896d58ad85f7dd970402245ce4da0539fb0012d7404735b7f45,2024-08-22T12:48:02.790000
|
||||
CVE-2024-20419,0,0,0795f6e87845f9b46dc3400495c49fb48a047d8ed4e9d1842a04ff7724f0ad68,2024-08-13T17:15:22.787000
|
||||
@ -243133,6 +243140,7 @@ CVE-2024-2043,0,0,7a3896d230f6f1ae602a08f92e2eaaa644b5893021849dee8a675eb9b7c81e
|
||||
CVE-2024-20435,0,0,bea0a896db86de220514ce1618de53b05523503910f680b3361f4c8bb8734dd9,2024-07-18T12:28:43.707000
|
||||
CVE-2024-2044,0,0,20580816ecbcb2d456bf5030911ad2dbba893322604e54631bb30d65d5e1ff74,2024-08-01T13:49:39.293000
|
||||
CVE-2024-20443,0,0,272afbe0465f6648950651b716899dcfcb722318ac954aaaf0e63544fb83de9e,2024-08-23T15:18:06.347000
|
||||
CVE-2024-20446,1,1,a1f458363061be398c6f14b4fa2ac064da5d71cc04c03ec0fa0519fcf8eb70fe,2024-08-28T17:15:09.997000
|
||||
CVE-2024-2045,0,0,711ac9453656184dc732c4f4633f4f7bda646ec847d7f0c1c60c568976f58aa0,2024-03-01T14:04:26.010000
|
||||
CVE-2024-20450,0,0,a40597aa01c7c808e6329a0cff711d7709db0a15729885e98911c863c6fe701c,2024-08-23T18:14:43.787000
|
||||
CVE-2024-20451,0,0,616ab4cb2b50cee49c462941d4d3e48792a6a3c09b725bd97a134b2f4a53bec9,2024-08-23T18:14:11.137000
|
||||
@ -243140,6 +243148,7 @@ CVE-2024-20454,0,0,b7df5fe3c7f3ad82ec42e5ba189942703f651e8bba204ff78589b452573f7
|
||||
CVE-2024-20456,0,0,bf56f0f0f8d3ed0f6616c43fc8ca6a47b6257ec17aaac25185ba7a05790b5cc9,2024-07-11T13:05:54.930000
|
||||
CVE-2024-20466,0,0,d9adbd7a5cfca4a39494a47969f1c31ae3805a9aa7b4cd0a12535f31685e123d,2024-08-22T12:48:02.790000
|
||||
CVE-2024-2047,0,0,65f16d2420b90c918e9e57877aac5f0440eb772d779ccbd58288e6312f3c8025,2024-04-01T01:12:59.077000
|
||||
CVE-2024-20478,1,1,c7f81a4150a4b8f4abbdfe0686f6cf7280c0fc2d9ab56aa66625f46f1240ded1,2024-08-28T17:15:10.220000
|
||||
CVE-2024-20479,0,0,ced5b461eb6ab05478119ddf8b399bbc19a6ff248adc19d6fde8eab586c6db76,2024-08-23T15:14:45.913000
|
||||
CVE-2024-2048,0,0,3fe9d949673d5eedf190595df45c4c7d30c6a66a4722ea0631f740f815dd3cc0,2024-06-10T17:16:25.067000
|
||||
CVE-2024-20486,0,0,1ec7a6c2a991b67e11827b3b316fed30b5b5340988b303f9088e0f10e2e894f9,2024-08-22T12:48:02.790000
|
||||
@ -243659,23 +243668,23 @@ CVE-2024-21129,0,0,46efd627f8b87e045268cbee292986282d76e8b338e8626a07344d3f76a5e
|
||||
CVE-2024-2113,0,0,d820f9174045c4a91c8de22b2f318d393b16e5183ad826479f5c93fd64192dc6,2024-03-29T12:45:02.937000
|
||||
CVE-2024-21130,0,0,c5d206e6fb887c84baa9c493ebc7d93f2ba4e2f0bacd858d2d5741cf02d71f96,2024-07-17T13:34:20.520000
|
||||
CVE-2024-21131,0,0,02165835cc6f0e203728409c02066c414e0700a6416e43c004ac7c1741f0e57f,2024-07-19T14:15:05.180000
|
||||
CVE-2024-21132,0,0,a847eec6e39593d2e3be335daccbaa7566fca94a3cea944f277ae6077eb8c167,2024-07-17T13:34:20.520000
|
||||
CVE-2024-21132,0,1,683d4a8132332ad86fddc10cd15bb59076d052bf865226f7944ae794277a5d4e,2024-08-28T17:40:31.727000
|
||||
CVE-2024-21133,0,0,9a1197ce9530b48696d53f4b8d6c0bb018d1a324656fccf337eedb1d5dc8a23b,2024-07-17T13:34:20.520000
|
||||
CVE-2024-21134,0,0,631920bbbb3f0a2e285eb8830426e0d345e96a6482baa287298491b83a91756a,2024-07-17T13:34:20.520000
|
||||
CVE-2024-21135,0,0,9aadd6ca5a38f239443e4aa9211c7acd69c8becfda2781dc6ecf3e89d27baedd,2024-07-17T13:34:20.520000
|
||||
CVE-2024-21136,0,0,ad8ed641eb9e0dfe773d7b453ce1a777791004300592ffcb4b9aeccb6189d2b8,2024-07-17T13:34:20.520000
|
||||
CVE-2024-21136,0,1,0b3d31fd31b74b67777283c1c23811ac7b0b473c6d3e3e94fd2f66077b9a369c,2024-08-28T17:59:36.023000
|
||||
CVE-2024-21137,0,0,8b1ccafbde54d689b232a5ba4da880526c6b578bae146f59db158760bdc4f414,2024-07-17T13:34:20.520000
|
||||
CVE-2024-21138,0,0,48e73281e1321884b4e1b592183d2ed2dbef5bea392b3b824bf77e00d538c447,2024-07-19T14:15:05.290000
|
||||
CVE-2024-21139,0,0,ac1e7874c883d227974696e6da1f4ea74ebc9ccd7cdf45b6f9f9065cbabb6c27,2024-07-17T13:34:20.520000
|
||||
CVE-2024-21140,0,0,4152c752f631d64c27b06e5115099663133590db63a2cfff7e518248f96c3d60,2024-08-01T13:46:27.193000
|
||||
CVE-2024-21141,0,0,a46fdd63fb31ff99b4780cb153ac9f2ae29000b590679f43cbb64095a7fb0c47,2024-07-17T13:34:20.520000
|
||||
CVE-2024-21141,0,1,f6351581c68c52a0fcae66a77dd601ef15127184835385b5e0479a9d14461be6,2024-08-28T17:58:43.457000
|
||||
CVE-2024-21142,0,0,f819d3a8ba6f5d3f6da22376ee3aac7e9c1012257d5ae28b11f63731d1547f92,2024-07-17T13:34:20.520000
|
||||
CVE-2024-21143,0,0,00d3158bf58fdef1b0ea359eb4fd1877d407a38c8141a35ed2d92f7d5fd7ff90,2024-07-17T13:34:20.520000
|
||||
CVE-2024-21144,0,0,a6e0220af7613c1fe6414e49d55f78f0a709fc1177b6fe6b6e15840375ef4e2d,2024-07-19T14:15:05.497000
|
||||
CVE-2024-21145,0,0,77d6b8d482bc9fea478023a3ac3b96ff89a156b807bd0fe4072eea7489b1a76c,2024-07-19T14:15:05.580000
|
||||
CVE-2024-21146,0,0,c75b160e4e3c99880ff62d36e7e801ade0e912daea3b1e5430c44ac99095338a,2024-07-17T13:34:20.520000
|
||||
CVE-2024-21147,0,0,d581db22cc70629aa91eb51c988684be29e1ff1430ebd94500067b05edd568f0,2024-08-13T00:49:47.367000
|
||||
CVE-2024-21148,0,0,7bc96a76ce0077505eae8d68abc8206f3ba6f186267ade9b3eedb49371d494f1,2024-07-17T13:34:20.520000
|
||||
CVE-2024-21148,0,1,5e054bb367a8e9656b43550b5962eaa7f739f26520f7472e3f916549fb13304b,2024-08-28T16:56:18.687000
|
||||
CVE-2024-21149,0,0,ee2bd3223896d48493ed4bc80a50d18703c1a2b0e21db09049566849fca16635,2024-07-17T13:34:20.520000
|
||||
CVE-2024-2115,0,0,66506b198b4ece0adfc9016031263e6294a50c545f577c56b849d0c705d750c7,2024-04-05T12:40:52.763000
|
||||
CVE-2024-21150,0,0,8bf7ad156aade7fa3f13e2261e319a8085198969642f90d90774096fb77f35b3,2024-07-17T13:34:20.520000
|
||||
@ -243689,11 +243698,11 @@ CVE-2024-21158,0,0,abd2177430b15289f1dafe8369befc77334519d6a9221a02b1f5bfbbc009d
|
||||
CVE-2024-21159,0,0,2ff4efcbe3aa08e46da9e0946901b69656a8a1ad9976fd197b8e18d6231382c7,2024-07-17T13:34:20.520000
|
||||
CVE-2024-2116,0,0,db5680b78c73e9ed7444fef2da21a0c5bcac8a3e521c07413a62cc0c6dfac6ff,2024-03-29T12:45:02.937000
|
||||
CVE-2024-21160,0,0,20f8ad0ce54327b1482f0174779d6b8936bf9313ce550cb111b84c1a3729be73,2024-07-17T13:34:20.520000
|
||||
CVE-2024-21161,0,0,612c4884deeafecd7580dfdbda30fa8bdd1ab1716fdba44ef79465dbc125b3e1,2024-07-17T13:34:20.520000
|
||||
CVE-2024-21161,0,1,5ed4fb8c83a1a90d6a88e52f846feb2143ac832488b24fbdda9e4d8d58d3fedb,2024-08-28T17:00:38.797000
|
||||
CVE-2024-21162,0,0,6599b8c3e8d4ce2bd56d758955204dc60835461542055bd440e060f275edef92,2024-07-17T13:34:20.520000
|
||||
CVE-2024-21163,0,0,1c218c6447f5bc6b8f4a4bcf8e9b987dd785d628ca9f5052cf582edba99f160a,2024-07-17T13:34:20.520000
|
||||
CVE-2024-21164,0,0,409d31e6725bddcbc7809866c9718b7fe29398e89ea9c04f4ddf0f02e0b7f477,2024-07-17T13:34:20.520000
|
||||
CVE-2024-21165,0,0,20993784304d7762a8021f9b16e9507bbf65223455c94632351bf958464a2463,2024-07-17T13:34:20.520000
|
||||
CVE-2024-21164,0,1,dbe60a5799862110e1bcaaaf92025ecfccc35d4b3c7e33902e20957fc9a2019e,2024-08-28T17:00:58.533000
|
||||
CVE-2024-21165,0,1,dabab484b919218d3e6ff0c2a6cf2040e9bda41dff7415dbae32ae776164209a,2024-08-28T16:43:23.220000
|
||||
CVE-2024-21166,0,0,ede3b755f5804621a8ef25d79d9679055f7e04ae20b8138869340e09adf91227,2024-08-01T13:46:33.843000
|
||||
CVE-2024-21167,0,0,68c8f227666c06298257f7b468706125c2676562df674ce8154b7de7b4496211,2024-07-17T13:34:20.520000
|
||||
CVE-2024-21168,0,0,c69572c1110a4cc480c0e5afb70d08f9984a6bb55f4f3c55f471c687df059b4a,2024-07-17T13:34:20.520000
|
||||
@ -244065,7 +244074,7 @@ CVE-2024-21676,0,0,3127fbecbfae79d2f7f29e20d66e088e41b4c966ba7bc8eb69c82cce01bc6
|
||||
CVE-2024-21677,0,0,172011c5d5a06c0e2ca2f356ecd05cb171d9f8cbcabb5b389ad48344d43d1ad1,2024-03-20T13:00:16.367000
|
||||
CVE-2024-21678,0,0,cb3827f1e523b06b300224171594f9fd4e5c2622fa5d40070141728fc778397e,2024-02-20T19:50:53.960000
|
||||
CVE-2024-2168,0,0,74490de60c08e043593352cd4979e484251e5c8cdc32185131e72bfecce0dd0c,2024-05-17T02:38:05.397000
|
||||
CVE-2024-21682,0,0,ea94962fb19bc771b1e7e5a4a1b57027a5c5c8b332b79d32007472ab6d5177d5,2024-02-20T19:50:53.960000
|
||||
CVE-2024-21682,0,1,646c2077276d5778c5018e29b5374e3c012d049729d58323d6e6c9b112e6285d,2024-08-28T16:35:07.830000
|
||||
CVE-2024-21683,0,0,9e98100df1746075be9f809cd7f00fd6b0e3e97382e91b70d2a85ac430e36b94,2024-07-03T01:46:45.440000
|
||||
CVE-2024-21684,0,0,59f12a4b04761da303d7e3a40c8e6edc45c41d4945c065d5a0ffea737104115d,2024-07-25T12:36:39.947000
|
||||
CVE-2024-21685,0,0,5660fcc85eb1dde5c65259d6d6205ae74624ad923dcf6470bb4f3577f99d7f00,2024-06-20T12:44:01.637000
|
||||
@ -244096,7 +244105,7 @@ CVE-2024-21736,0,0,794296433b0b6c553cd106f1bd31a638f539e91ea6f82e61204a43660acdc
|
||||
CVE-2024-21737,0,0,59ff5ff1f6beafb8f0d3418ea62fa9e84b0ab8ac80ddfb91af2e3d93d716a188,2024-01-16T17:45:47.083000
|
||||
CVE-2024-21738,0,0,ee493f18830fa61778a839e41065e0a164cfc7a69da412e6c6babcc4b17cc105,2024-01-11T22:54:02.190000
|
||||
CVE-2024-21739,0,0,74c51cc55d726fea23dbc7423ad28b618c0ad3e8f250404a9e572e22bf0444c5,2024-06-26T12:44:29.693000
|
||||
CVE-2024-2174,0,1,69f2854ef3602f6c241fc54636cb33b9aa524ada04f0df9d9cfac3f6048da2a0,2024-08-28T15:35:20.553000
|
||||
CVE-2024-2174,0,0,69f2854ef3602f6c241fc54636cb33b9aa524ada04f0df9d9cfac3f6048da2a0,2024-08-28T15:35:20.553000
|
||||
CVE-2024-21740,0,0,578e6e77253937b45696dc5f6043eefe34a835f238564d1fe1369311381e46c2,2024-07-11T15:05:22.467000
|
||||
CVE-2024-21741,0,0,abad64de70c0fef6bdf30dcd2634a39b659714e71a96cc61f74db71b448be2aa,2024-07-03T01:46:46.537000
|
||||
CVE-2024-21742,0,0,fae1ce375f3fcebe0111b56738c6b02117d77d438c12e42f2ce0251b9cb2427c,2024-02-29T01:44:04.040000
|
||||
@ -244421,7 +244430,7 @@ CVE-2024-22182,0,0,b8c6625a5282a72f76fb60314413b773d9f3fb9c9d9f485e5d536e19dd0bf
|
||||
CVE-2024-22184,0,0,e3b13ffe675f8579db3776363f4670ba9137f26137c3f424c46d120f2b78c4bf,2024-08-14T17:49:14.177000
|
||||
CVE-2024-22186,0,0,59ecddd100ddcae06a7ecf9fc641630f9ab4f57ca25d5313e480ef6c07a40e52,2024-05-28T17:15:09.680000
|
||||
CVE-2024-22187,0,0,764c633f29a9b7a4988eca707a5f5a20cd222e9e3850a0ea108932eed046a25b,2024-06-10T18:15:25.660000
|
||||
CVE-2024-22188,0,1,9401f81b36fcbdf2dae8a78204f4b25a3c0ed74442678101e58a7cdc0376abe2,2024-08-28T15:35:14.437000
|
||||
CVE-2024-22188,0,0,9401f81b36fcbdf2dae8a78204f4b25a3c0ed74442678101e58a7cdc0376abe2,2024-08-28T15:35:14.437000
|
||||
CVE-2024-22189,0,0,fea0be1a5a7409c880f87752eeb084fafd5b6d1284d3177e6521b5c7516d6ecd,2024-04-04T16:33:06.610000
|
||||
CVE-2024-22190,0,0,e6ac33b356ba6a74674e45bf7cdf7d2f2e69f941856b85a391b927bae4fad4a8,2024-01-18T13:48:07.553000
|
||||
CVE-2024-22191,0,0,f7f1b03cf67feaead11389a4af47a24ff41e590c594aa0c037973685b4253fd3,2024-01-24T18:13:53.947000
|
||||
@ -245030,7 +245039,7 @@ CVE-2024-23212,0,0,f80d0116e96d75ecefd545c3526dcd4d5f88bcbed5b339e1c95b1820f7413
|
||||
CVE-2024-23213,0,0,3accb2e6ca7cc402e236c9474680e18edadbd0d691e602685b9c7a01131e56df,2024-06-12T10:15:29.957000
|
||||
CVE-2024-23214,0,0,33119634a46fa5c4e530acd0e9c618db34847fde568cfa47bd7b42b58ac780ef,2024-06-12T10:15:30.080000
|
||||
CVE-2024-23215,0,0,33fc650ebd8d97f7539b32750e085a2fd8b81965edd8ee0561acd57fa017b4eb,2024-01-30T16:17:32.130000
|
||||
CVE-2024-23216,0,1,f8f18e7552f290902a4ebbaf17adb29e0e3fc3f3d4000accb9bf87224755f7f4,2024-08-28T14:35:06.780000
|
||||
CVE-2024-23216,0,0,f8f18e7552f290902a4ebbaf17adb29e0e3fc3f3d4000accb9bf87224755f7f4,2024-08-28T14:35:06.780000
|
||||
CVE-2024-23217,0,0,22b8aabc2c537f06727d28ccece5638ac7f57c64b05d618b0085cec7c37d61be,2024-03-13T22:15:09.273000
|
||||
CVE-2024-23218,0,0,764d9591d3c5e993d8e4b9e38693ec8072deb6341bcae3b3215d2e62a14277ea,2024-03-13T23:15:46.027000
|
||||
CVE-2024-23219,0,0,478ca77553ffcd9677d8ceaf589ef8d6cf6bae32d2a8df76b85c410ad74b3348,2024-01-30T14:36:42.017000
|
||||
@ -245058,7 +245067,7 @@ CVE-2024-23240,0,0,497e30da1de753eb5948327cba1061ca7bd974bb0b6e982d8b68d5fdfd0d0
|
||||
CVE-2024-23241,0,0,c5a768451bd1e85db3c39139e6a6ab2856d36214932ed6b230453a123731e8b7,2024-03-13T22:15:10.003000
|
||||
CVE-2024-23242,0,0,95631f167174ef115c9c95938ba9ae61f1f0294242d6095fc64b03c429b051d7,2024-03-13T21:15:56.410000
|
||||
CVE-2024-23243,0,0,3b35a30cb124f0b586652130bcd66797855bcd6efb290e087afdb4d7fffb3adb,2024-03-13T21:15:56.460000
|
||||
CVE-2024-23244,0,0,455d9fe185a5ba98c85be5a60bcc93f0c8059eb317391f8af99e553d44b61dc5,2024-03-13T23:15:46.480000
|
||||
CVE-2024-23244,0,1,24e1f39ea8345f9beebd2c960d56e2266341c33ce47de81803c5b5c5ff8fbc8f,2024-08-28T16:35:08.747000
|
||||
CVE-2024-23245,0,0,3ef3bab1c68decbc207b88786c8ec7e903fe6be44e3bdef049351a5b3b76ec4b,2024-03-13T23:15:46.520000
|
||||
CVE-2024-23246,0,0,a3f6288a4dec4e6b98e18e3dcc2273527c942df80239f6227e94a0328a431f71,2024-07-03T01:47:40.097000
|
||||
CVE-2024-23247,0,0,d5698b79b28caabaab0fed7a322a63e6d266c688aa3ae5f6b0f0f62214304bc8,2024-08-26T15:35:04.747000
|
||||
@ -245093,7 +245102,7 @@ CVE-2024-23272,0,0,862f7d259a6cfce25fc04a6db8d5e2417105b7f51cabfc9af10955b3e49ce
|
||||
CVE-2024-23273,0,0,8ea5a132f7f9599d563a8466af6d69a139c2be77bdbd7e0c7a2fee86dd445737,2024-03-14T19:54:26.287000
|
||||
CVE-2024-23274,0,0,d63dec58c682291f417ab20be0e0fbb2c8ea2b0b1f5246aeb4f66431c08118d0,2024-08-01T13:47:13.570000
|
||||
CVE-2024-23275,0,0,2c9c1f4d2ca81860bcf12d49a2478f6772035d6cdcedc7473a9a2bfb8f8dfedf,2024-03-14T20:34:02.077000
|
||||
CVE-2024-23276,0,0,6f3b52f749f8311c4232b3c82ff3f246f15d88c45d906f1a4e0e3bdde6ac41e7,2024-03-14T20:34:18.527000
|
||||
CVE-2024-23276,0,1,b7fa000b367d55e31a4b1c9fd4a1f238256bf2545a07d5e4a633de96f48c7a44,2024-08-28T16:35:09.187000
|
||||
CVE-2024-23277,0,0,329d44f192e6d8ad64377bfea1b406324a89ddf322f5987758a35ef433724dec,2024-03-14T20:34:31.303000
|
||||
CVE-2024-23278,0,0,766bded776e256695874796c761a698226a698abed559def31f9f418b44fbd0e,2024-08-01T13:47:14.363000
|
||||
CVE-2024-23279,0,0,04cf6340eed14797588fb60b9db6f98aa22f7faf3625a9866457c3db2729515d,2024-03-13T21:15:58.063000
|
||||
@ -245106,7 +245115,7 @@ CVE-2024-23284,0,0,65ec6190d01341e583d233a656fc9dacb2a5d33dd6ef8512150ae4498bbdf
|
||||
CVE-2024-23285,0,0,5a0d4d7d553005e90735503704fdc16408a5286a022afa1dff47851a5d56c396,2024-08-27T21:35:09.383000
|
||||
CVE-2024-23286,0,0,f8f0ff0a8076d1acdcd931a303004a0abe139b7ebcc3b6a020d77caf3a452f67,2024-08-01T13:47:15.157000
|
||||
CVE-2024-23287,0,0,112483d9936a74ffcff3d96013576a1bfbb7b8c01b845a9cbe424d560297f227,2024-03-13T22:15:11.120000
|
||||
CVE-2024-23288,0,0,26b1136d0d4444408c9f51d02208acadeac0b309c2fd8cd24b38e5f71e3d14bf,2024-03-13T22:15:11.173000
|
||||
CVE-2024-23288,0,1,4c16d89ff3b357dfdd3be6b8ba218b937b9c0e25620417a442ae558ed820b4e4,2024-08-28T16:35:09.410000
|
||||
CVE-2024-23289,0,0,88178045365eb11e89ccefeb5771451d6b6166955f5f6c5f6a64f2f080826233,2024-03-13T22:15:11.227000
|
||||
CVE-2024-2329,0,0,11e6f1e43e05cca18867c7d5c048956c7fecd23b0254816ac97fead1b2517ae0,2024-05-17T02:38:10.443000
|
||||
CVE-2024-23290,0,0,c464194e225931bf0d2137cac165c36f9146fd1d9e1ad3c4a6426c7b4df4b92d,2024-03-13T22:15:11.280000
|
||||
@ -245437,7 +245446,7 @@ CVE-2024-23711,0,0,3b2f25c3bfdf9a198d84e7ce79a3c5bc71465fc8bd3a9e12aa99c3c94a4d9
|
||||
CVE-2024-23712,0,0,99a9a0e98f6ec74442cc23ab4a592b5612be30e655f849926f8cbd43d464cc6c,2024-07-03T01:48:04.970000
|
||||
CVE-2024-23713,0,0,84ac23a9c686e595929bab4dad7b08bca80d94f5a0dad54d418e0bd955964876,2024-07-03T01:48:05.220000
|
||||
CVE-2024-23717,0,0,6ae2f39818716426e507c7fefae1ead3e28d18b5fd2ac50fedfcf5c736aa3969,2024-08-16T19:35:03.877000
|
||||
CVE-2024-23721,0,1,738ea0fe142701915583cf528173779941e7a1ec154f74c48132f1439081fb4a,2024-08-28T15:35:15.520000
|
||||
CVE-2024-23721,0,0,738ea0fe142701915583cf528173779941e7a1ec154f74c48132f1439081fb4a,2024-08-28T15:35:15.520000
|
||||
CVE-2024-23722,0,0,af1e6a2b53efd211283ec4f6a153b9c2bd466feef4ec2b55fd6db947ef4fb0f6,2024-08-06T14:35:05.600000
|
||||
CVE-2024-23724,0,0,5cc76252bcfe665701c3f11744cfd264292f873fd21df1c2782e1c197e0c01a4,2024-08-01T23:15:47.180000
|
||||
CVE-2024-23725,0,0,96d1f58f146e10084452af188f967aa7d2c64d922f58373c2c0f92aec9556706,2024-01-29T15:25:48.110000
|
||||
@ -245683,7 +245692,7 @@ CVE-2024-24035,0,0,d0abb7c64f0c98440e73299b8a7786cd92f1d8fbb7861de6744b39b120e98
|
||||
CVE-2024-2404,0,0,9d875e94c9294fe9953ccca085b1745d0613b8cf9f0f07db3175f75218af4ec0,2024-08-09T19:35:05.613000
|
||||
CVE-2024-24041,0,0,4a0d654eb23409577a23026cb4704f48de37c0bc2bebd1ee3faa99b68f3773e8,2024-02-07T17:14:41.607000
|
||||
CVE-2024-24042,0,0,b866c3917f18283c11cab3dd04e447f4e26ea64e6c1cb154e64b25a1b7f8187d,2024-08-27T21:35:10.387000
|
||||
CVE-2024-24043,0,0,e1968910fbe3303046e08aad0f620638588dfecc0e402ebdf747bad91bf95f6f,2024-03-19T13:26:46
|
||||
CVE-2024-24043,0,1,c9f0291d3b3ea0f3d4660ebdd10587f7bae9e2552aede9432383ad105d2d7da2,2024-08-28T16:35:09.730000
|
||||
CVE-2024-2405,0,0,758f03026c76b7f47d263886ed290a557d382d5cf70707c814c23dc8eb2e5ffc,2024-07-03T01:53:13.110000
|
||||
CVE-2024-24050,0,0,d8a497c77556b4efbe72dd469fd71e81b74bd8a1e54cb63f7dab3892d7471943,2024-03-21T12:58:51.093000
|
||||
CVE-2024-24051,0,0,1d91890559076f5980bf15f5e9e94cabb5a5df274a545b95ecd8bd06b33e0e8b,2024-08-26T12:43:44.580000
|
||||
@ -245730,7 +245739,7 @@ CVE-2024-24148,0,0,a02156e49f720741f5d47ffecf3d295f680f99f45fd5e722459fdf6b3749f
|
||||
CVE-2024-24149,0,0,88ecb47947af05614cae359d076a027f161e62a67519dba09a75672f5d1ee0a5,2024-08-13T19:35:04.837000
|
||||
CVE-2024-2415,0,0,c558bdc444f1b504fdb58826094fd6354f995348e8626b08c069328ff4e39fde,2024-03-13T12:33:51.697000
|
||||
CVE-2024-24150,0,0,57d27c8e6078b73446ecc07e4ad11630c532b92e8ab5a1cac8386f4fab70f142,2024-03-12T14:59:55.920000
|
||||
CVE-2024-24155,0,0,2c63d7924f0cfbcec05c8391f1806e0f50aabfd2ca7e4c7b5af6f390f137d171,2024-02-29T13:49:29.390000
|
||||
CVE-2024-24155,0,1,3bb2e53518d2c73ef94fc9a8fd3fd200e14c25be078e767d43facf3cd96a63aa,2024-08-28T16:35:10.447000
|
||||
CVE-2024-24156,0,0,4d905495fcc21ea03b392e5dcfb4049afb36c88ec6395d026fb3a826675269b3,2024-08-19T20:35:03.650000
|
||||
CVE-2024-24157,0,0,27cfa63ed3b3e1406c543915593772b11a8bd32859f21bed59160debb46b1929,2024-07-03T01:48:13.313000
|
||||
CVE-2024-2416,0,0,509b47b2b38dd8150594dfd075dd7f079b3bbd22e8420f2d63fb8a39e8d3ccb0,2024-03-13T12:33:51.697000
|
||||
@ -245801,12 +245810,12 @@ CVE-2024-24313,0,0,fb5ae34a5906d70e9a89b5d57ccc3ef0ec67afb90df0388312d4db57d8583
|
||||
CVE-2024-2432,0,0,57240eece5c1b31c057486728f6363c9217250d91f3d10c0c941fdad51a7f6e5,2024-03-13T18:15:58.530000
|
||||
CVE-2024-24320,0,0,a5847bec026f9a38211f5c0373776488eb6f7d35353beef2a24ffd1ecc8d8864,2024-08-21T14:35:04.240000
|
||||
CVE-2024-24321,0,0,88c98cb76542c8acb076726441dae70ba16682bd2171c6fbca3804855a845a0c,2024-02-15T05:02:58.427000
|
||||
CVE-2024-24323,0,0,87c9f21a2b792326c3395038aca05fa9c659ed3affd70ad21bad1ba52479ce4a,2024-02-28T14:06:45.783000
|
||||
CVE-2024-24323,0,1,adba4554463f2339fd11d6ce11dc6e7c60558587a50e2f826405f4cdcc1bbc13,2024-08-28T16:35:11.253000
|
||||
CVE-2024-24324,0,0,e65b7320bc70eb87aafe69f87ce443d4231ab35603a9991590cdc2a337dea76b,2024-02-01T04:49:29.220000
|
||||
CVE-2024-24325,0,0,c48bdb59f66fc453df8a65a409e26ae0fc9e608ab91641625410877a482dad6a,2024-02-01T04:49:27.410000
|
||||
CVE-2024-24326,0,0,ffd176ee9cc205937cd1eaded7dc4a650316e43005277f1af89616e40875e18b,2024-02-01T04:49:24.940000
|
||||
CVE-2024-24327,0,0,b496192967607b64939b46dfafe2c91cb919e1f1a3928b7c8c6e7165f4559273,2024-02-01T04:49:22.830000
|
||||
CVE-2024-24328,0,0,6ead54e0ed7aac5b64071a50f85f248cebff3b6d5e997fc6c92b63dc8aee1aa4,2024-02-01T04:49:21.037000
|
||||
CVE-2024-24328,0,1,9ec45e9ef706fa7e9212babc00d8f55f27592d1c1f21abb655b193ed546239da,2024-08-28T16:35:12.420000
|
||||
CVE-2024-24329,0,0,cd2cef58182ccada9d789908a0715e06b22ee8c2346a6ad57e7666e3ca17fc5f,2024-02-01T04:49:18.867000
|
||||
CVE-2024-2433,0,0,af22ac085d1109b732837345c936d39f0c3c18741ae1714b3ff1934488777262,2024-03-13T18:15:58.530000
|
||||
CVE-2024-24330,0,0,6f4394e82ffdaddc9904fbc3397bf25ed86fab2a1cc87acc40260a4358ba28b7,2024-02-01T04:18:43.927000
|
||||
@ -246275,7 +246284,7 @@ CVE-2024-2508,0,0,5f5b90c70383af5e74076ecfe442ac5d6b537a3785081aa188cda0ddf04bd8
|
||||
CVE-2024-25080,0,0,18626c970f137cdb9398dd9a27a57c97c76048e9872d0484e7e3cc74df35e9d3,2024-04-01T12:49:00.877000
|
||||
CVE-2024-25081,0,0,8447758264e474cd1c8516048ae8770433feeb45ecce33ffdf5df19305ed1ff9,2024-08-27T19:35:13.260000
|
||||
CVE-2024-25082,0,0,c4024b086b0d99b44b3d9149e06878bd50b7e82765ae87c23c8e458108c36ef4,2024-05-01T19:15:22.237000
|
||||
CVE-2024-25083,0,0,9d2f407cabf3a12bbd22cd36b42859a90ce2fc840877d4b234c6f6f10f6ee54c,2024-02-16T21:39:50.223000
|
||||
CVE-2024-25083,0,1,82140a5a06672843cc06d8c49a45d2786901923a23d988718119cbf0cb5278eb,2024-08-28T16:35:13.370000
|
||||
CVE-2024-25086,0,0,d7f7d87d6cdc4c934f4645f409f9d6ad95bc0b43a7473acdcf85c7b382132abe,2024-07-08T14:17:42.020000
|
||||
CVE-2024-25087,0,0,c72ecbfe33bc1bedb424c3a8db8ed1e75d362fa6fbd3c127b6373b38910f773d,2024-07-05T17:04:43.917000
|
||||
CVE-2024-25088,0,0,50203c63d0e75eec6b30df19b3f3ba45509939426c60ccdf3351d03062178a9d,2024-08-01T13:47:33.673000
|
||||
@ -246449,7 +246458,7 @@ CVE-2024-25344,0,0,db69ab30d7794b839b183db3e507228c9f3f45497af2375243b3fe88a539e
|
||||
CVE-2024-2535,0,0,1d4fc1154e21273a7c74f61b7c8874d973288768c48e8247cc99c965af9b7c7f,2024-05-17T02:38:18.023000
|
||||
CVE-2024-25350,0,0,3eadafce3b2244ddf5f3884efc711bcacedce55f760934f937927ed6e35502b0,2024-08-01T13:47:41.340000
|
||||
CVE-2024-25351,0,0,799dbc66bff5fa6efdf5aa91495ce5a0210c4cb89c79f9796068de8220467c77,2024-08-26T20:35:14.720000
|
||||
CVE-2024-25354,0,1,256346a489531f9aa59a7b9890e8d89008038eb0fd76238658fbc486e3560812,2024-08-28T14:35:07.993000
|
||||
CVE-2024-25354,0,0,256346a489531f9aa59a7b9890e8d89008038eb0fd76238658fbc486e3560812,2024-08-28T14:35:07.993000
|
||||
CVE-2024-25355,0,0,9e4c154c10879aa65df3f836e3d26a161aa9d5b18c5f9f98e84ee39f0e0f3042,2024-07-03T01:48:45.420000
|
||||
CVE-2024-25359,0,0,0fb20cbc3a9d97e4b1c7aeba16baa279c02f24b91366fceb9801ea8cdef6ca08,2024-08-02T20:35:24.740000
|
||||
CVE-2024-2536,0,0,65acd52804d1fab5b7f8fb23c09b74c0bf5acd3bf488cb768800ded49c99706e,2024-04-10T13:23:38.787000
|
||||
@ -246567,7 +246576,7 @@ CVE-2024-25574,0,0,65726bda902fec4a9a49461993a5b1f1f19b916c575dd539bf5599a6d815d
|
||||
CVE-2024-25575,0,0,2e4887ee13b995216d77350689726b7532b0325e739fa8baefbe39600a3f9674,2024-04-30T17:52:35.057000
|
||||
CVE-2024-25576,0,0,1298eb71baf232c73dfc082da86c1a427fcac3907201ddd5e757f1be26775922,2024-08-14T17:49:14.177000
|
||||
CVE-2024-25578,0,0,0d1f2ffd4e03b50b29ccf39cdb2058ba91ae7a7cb01bdc49fe129aadbabc71e4,2024-03-01T14:04:26.010000
|
||||
CVE-2024-25579,0,0,3ce7817b4efbfe814fc7f2f138ef6147015c649f3e26a4e4549fa9163410577a,2024-06-12T01:15:49.137000
|
||||
CVE-2024-25579,0,1,e18a976cb7cc873665c4cde29595232519ed1d6333d6b865b6ffed467db01627,2024-08-28T16:35:14.267000
|
||||
CVE-2024-2558,0,0,4df4f161b02ab0ee082928d86d735f9684058e2b58c51335b3ee6abb912b22ce,2024-05-17T02:38:18.947000
|
||||
CVE-2024-25580,0,0,d25d9f73e9fc463223909f23338d50734f85395c9d208e28fc6abf197ca8cc67,2024-03-27T12:29:30.307000
|
||||
CVE-2024-25581,0,0,7b661193358cc282ffdeeb44cff665ab8564f25632f9671f041e9f50015c108f,2024-06-10T18:15:27.650000
|
||||
@ -246640,7 +246649,7 @@ CVE-2024-25651,0,0,141eb7237f8672075adb36d537e4b6bf696c6664fba30930784d19aa3662f
|
||||
CVE-2024-25652,0,0,8c49426ba9ad9fd1e89e8e83a1eeefc3222cdf552830f48a0a9961a99880036c,2024-08-01T13:47:48.337000
|
||||
CVE-2024-25653,0,0,efdc6e1fd6bc3201845fb807790d436f1b5ea82ec4d74b3ef4678687414457cf,2024-03-14T12:52:09.877000
|
||||
CVE-2024-25654,0,0,1d8c485b666617bf15e2be3bf3f059ab8542011fba9b3f67352ac0a3b72fec87,2024-03-19T13:26:46
|
||||
CVE-2024-25655,0,0,e15adc8eac4466bc206ecbf344e823f2dc60c695c8e2b528f93955091c188195,2024-03-19T13:26:46
|
||||
CVE-2024-25655,0,1,873187155e7b44c80bfdf0f8ac9cdfc6130f961d8321802657052de226969501,2024-08-28T16:35:15.510000
|
||||
CVE-2024-25656,0,0,dd2a757ac88e60c65e553326c3978a5d90dbd260cb747593d758355402513e97,2024-08-02T16:35:36.647000
|
||||
CVE-2024-25657,0,0,4b43facfdcb326ebfd5828d4d462b595cdd46fa54d1b75d686b3ce7b78fb312c,2024-08-22T20:35:04.950000
|
||||
CVE-2024-2566,0,0,087689b93c35b2d23260489bf51254e9dbbd90f4e3c3903cdc8f028cf28ab7f4,2024-05-17T02:38:19.710000
|
||||
@ -246747,11 +246756,11 @@ CVE-2024-25851,0,0,d67a62091ab95045024d9c69930163fc6933a08dd0957c710b2d2f48274fa
|
||||
CVE-2024-25852,0,0,1d0753f6ef753fc5d1ef48013e91f716bd2a2109414419ba6e7c96f787b8b0b6,2024-08-14T20:35:06.957000
|
||||
CVE-2024-25854,0,0,44f4f18783a518014d6e03af20d6bc0b5fc3bde62ddf95f44bcd216cec489e6e,2024-08-27T19:35:16.580000
|
||||
CVE-2024-25858,0,0,a5cba2d53e795893941edce58201624f227bda6d68ecbb5cef1d602282ede544,2024-08-19T21:35:05.770000
|
||||
CVE-2024-25859,0,0,5d3416d33baad6c5419dcee926eb2da1abee7dd2d03a2d827cc53b262fcccd60,2024-02-29T13:49:47.277000
|
||||
CVE-2024-25859,0,1,038a99d6ec3f53c4be4ba35c4800e6c9f2dae8250cbae6e620db9c90736521a9,2024-08-28T16:35:16.347000
|
||||
CVE-2024-2586,0,0,71d47abb08c7e463323230f7e49ea5f345cb538a7006733d07a2afa950cd9ac5,2024-03-18T19:40:00.173000
|
||||
CVE-2024-25864,0,0,2a09b4ab74072b776577b1c00a1bf5c268c139c75079ed692d71dc30af731c65,2024-08-01T13:47:54.857000
|
||||
CVE-2024-25865,0,0,9dd00ecb01423656380096aa5e060fbe6dfb829859154529d4f81246070dea21,2024-03-04T13:58:23.447000
|
||||
CVE-2024-25866,0,0,9800d1d73cf4e02f2835e7808c820220d82c6c39d582e9178e2e2aa396a9c576,2024-02-29T13:49:47.277000
|
||||
CVE-2024-25866,0,1,673561ed0df9fcdfda0c59cac1ca0b00fa241b251e245997f04994754e7eb44b,2024-08-28T16:35:17.133000
|
||||
CVE-2024-25867,0,0,8e55f36e4f1b56edc96022f211fe880b4aa76b96735d12ae86aa863ef60ef510,2024-02-29T13:49:47.277000
|
||||
CVE-2024-25868,0,0,8468e8c7cd26d2e5838f8da558add0a0ea34e7d6538ad367885aebb852006e2e,2024-08-27T20:35:15.173000
|
||||
CVE-2024-25869,0,0,748b3f6208379a05bd57fedf558ac81540396f4b22ed44a19829a3ed8cbeb467,2024-08-01T13:47:55.047000
|
||||
@ -246919,7 +246928,7 @@ CVE-2024-26045,0,0,0acb4c430eb04b486f9fde8afbebe04bb30c7a2da9501b59437c922e62ac2
|
||||
CVE-2024-26046,0,0,5c87a28b13d53ec29b89a2b33427517db21012c37c446a313fb6274d8fa5a520,2024-04-10T13:23:38.787000
|
||||
CVE-2024-26047,0,0,148096905025fd63cbc95f27e9e4e0c5f23280eef70892c2f079c5329b94e086,2024-04-10T13:23:38.787000
|
||||
CVE-2024-26049,0,0,a3a34d9b7dae7c572a170c4cf9ad06366559734e7c052afbd0e4cb731a5c408a,2024-08-07T13:15:59.723000
|
||||
CVE-2024-2605,0,1,349e4409ed80d6811abb3d6a22d4a1c2580eb4cb5b90719226cde56ad4b7d78f,2024-08-28T15:35:21.410000
|
||||
CVE-2024-2605,0,0,349e4409ed80d6811abb3d6a22d4a1c2580eb4cb5b90719226cde56ad4b7d78f,2024-08-28T15:35:21.410000
|
||||
CVE-2024-26050,0,0,a01e15c84b45a65b3bc336a569ca46f534ec28925a3745536846dbd737880774,2024-03-18T19:40:00.173000
|
||||
CVE-2024-26051,0,0,78bc48859c38750da39204fe9139ed7326b9440e064a7c71bb9438b77aa20ed2,2024-03-18T19:40:00.173000
|
||||
CVE-2024-26052,0,0,b304109295db8f5f3410f8f04ff1bacf299ca38b40fc697f2ab4ec3a5eabc71f,2024-03-18T19:40:00.173000
|
||||
@ -246963,7 +246972,7 @@ CVE-2024-26086,0,0,ae34cc70c1fb5245418ea1021c46e145477ed2510ed19be388b0597933b58
|
||||
CVE-2024-26087,0,0,886690623538c9b67d73b3140abb23679c4e72a1155e44ccb96173e256c726c6,2024-04-10T13:23:38.787000
|
||||
CVE-2024-26088,0,0,aed72cfe3c05269ae6fa7444f7478df5bb7d6d6fd37a95c7c481f7f0efb015d9,2024-06-14T20:10:01.653000
|
||||
CVE-2024-26089,0,0,87f38a9968c3e4028ac78d2f547942af5af438b7e5b9b22788cce73b35aca8df,2024-06-17T20:32:03.657000
|
||||
CVE-2024-2609,0,1,b6301650fec4122c3c02b6e335400036f83dab48aa35b0d865ffd587777c27c3,2024-08-28T15:35:21.617000
|
||||
CVE-2024-2609,0,0,b6301650fec4122c3c02b6e335400036f83dab48aa35b0d865ffd587777c27c3,2024-08-28T15:35:21.617000
|
||||
CVE-2024-26090,0,0,ed98f35d571423c5ef53e825d7ea9212d7ca429e14c4d90b79333d7179f2c1a9,2024-06-17T20:32:18.073000
|
||||
CVE-2024-26091,0,0,432c29cd1da1e6c9f8652a2bc2bfacfd01862e5bf100718ad43ba6760143b36d,2024-06-17T20:32:37.817000
|
||||
CVE-2024-26092,0,0,67476159c2a94aa6c3caf2c7ea973d42f985c77e89e69f10705b74d3b72d9b65,2024-06-14T19:55:31.347000
|
||||
@ -247023,7 +247032,7 @@ CVE-2024-26146,0,0,554fce310a1cb01edbb3b3f06f7dd6d6c768a6125a05ad6a5f05315540519
|
||||
CVE-2024-26147,0,0,31938bfd609e440a2f1803807cf5ed67ed95c5f9b331c66db59a00a1433a779e,2024-02-22T19:07:27.197000
|
||||
CVE-2024-26148,0,0,db984f5e17193fef4f237cfc03c668c1be3c9c198ae40220b6dfc6aeb32d7d9f,2024-02-22T19:07:27.197000
|
||||
CVE-2024-26149,0,0,cdd4ff9e035195557225db24049cf1e570f0b2e25d95a9e4fdf8b2509a4f3d3a,2024-02-26T22:10:40.463000
|
||||
CVE-2024-2615,0,1,96fccb91db04540134f2e85737f4c1b81249de0dc9bd5a3d73e2ffbfd4e26379,2024-08-28T15:35:21.843000
|
||||
CVE-2024-2615,0,0,96fccb91db04540134f2e85737f4c1b81249de0dc9bd5a3d73e2ffbfd4e26379,2024-08-28T15:35:21.843000
|
||||
CVE-2024-26150,0,0,724a23f6f5cd2b08e078faf9766b70ef43f45650f38390687bb0597c880332b3,2024-02-23T19:31:25.817000
|
||||
CVE-2024-26151,0,0,e1dc838a6d430f2f3bb000afc8645752ee52070eab909d9c789d043adb639eb1,2024-02-23T02:42:54.547000
|
||||
CVE-2024-26152,0,0,be8646b007362130f2d7e4b19e1e011379a1ee505dd31fab682fd492bc0e9a97,2024-02-23T02:42:54.547000
|
||||
@ -247122,7 +247131,7 @@ CVE-2024-26245,0,0,d8e7715693a4c17db96124229016576d132c978af86f165ed843021cc0e24
|
||||
CVE-2024-26246,0,0,281c00482b3c35bb6fb58282b68f55f76ce6bc574686f37dcb024dae18841f5f,2024-06-11T16:15:22.197000
|
||||
CVE-2024-26247,0,0,2e08eb3ba6b627c10ba27bd8963a5aabfaab07773e08696de8ef39c9e2d29c88,2024-06-11T16:15:22.333000
|
||||
CVE-2024-26248,0,0,1d69ec410d789e5cecdce5ca5f00f4cb4dc73522c17a80577a09df4303fbce8e,2024-04-10T13:24:00.070000
|
||||
CVE-2024-2625,0,1,bf9861c3991010c842a10750333614c270100ec9c0d1879521fb5a22ee29df8b,2024-08-28T15:35:22.080000
|
||||
CVE-2024-2625,0,0,bf9861c3991010c842a10750333614c270100ec9c0d1879521fb5a22ee29df8b,2024-08-28T15:35:22.080000
|
||||
CVE-2024-26250,0,0,361a4a598e17b5e0caa4dfe07f1d82a4b2b3caf0473c9778a9a5173e920f20ed,2024-04-10T13:24:00.070000
|
||||
CVE-2024-26251,0,0,752d1c2a1c430ddddba02d64b195b606d79a2c3854c081fbabcf7b1750edf415,2024-04-10T13:24:00.070000
|
||||
CVE-2024-26252,0,0,a16ea7a04b440699076d4a90d57b94e69adc561ff365215a47bfe0edfb85ff13,2024-04-10T13:24:00.070000
|
||||
@ -247178,7 +247187,7 @@ CVE-2024-26307,0,0,69e56c1207bd415bbef84f2246a3f4dffa28e9109056e4a053129ad394592
|
||||
CVE-2024-26308,0,0,b4d73560210ad1a249254bb49e208942ee75ee7f41147c3b9e47cd68fff84e87,2024-03-21T19:54:03.230000
|
||||
CVE-2024-26309,0,0,2640b5966073fd3d518fa5abac6bf90144529b272adda5f9f180e91c567c3f6b,2024-03-08T14:02:57.420000
|
||||
CVE-2024-2631,0,0,c40f6cd20ef48d6d5340c38d8cfe42cec4782b3ae9f2af1e0914d012954c4b8c,2024-04-01T15:23:45.590000
|
||||
CVE-2024-26310,0,1,69cee22c675c3146c38aababff9be493f09176b7ddb80cd90cd4be608f2c217c,2024-08-28T15:35:16.490000
|
||||
CVE-2024-26310,0,0,69cee22c675c3146c38aababff9be493f09176b7ddb80cd90cd4be608f2c217c,2024-08-28T15:35:16.490000
|
||||
CVE-2024-26311,0,0,28ff8a1b0384f422415c01ccf263a2e9d55cfdafba39542393811f1550f890d2,2024-02-22T19:07:27.197000
|
||||
CVE-2024-26312,0,0,63211e4b9a2e957457396397837a5777078f70d897b833c1c389cff9a53a6fcc,2024-07-03T01:49:37.810000
|
||||
CVE-2024-26313,0,0,f4cc2c8a31f2a657cb8e56530069fdda1b7331701b9b323e9b20a0d62c414aa3,2024-03-08T14:02:57.420000
|
||||
@ -247229,7 +247238,7 @@ CVE-2024-26467,0,0,f852e96e7aa9bd31104a7a5efbb92bf78ab3732b64936f49fadf5127e2447
|
||||
CVE-2024-26468,0,0,def1bc4284fa411449589c5e4214627b54a1a33219fd215b1c6f274069ececaf,2024-02-26T16:32:25.577000
|
||||
CVE-2024-26469,0,0,202a3878dd7ca90a2deb83f9c6068be468c522265741b212613bae7399baf445,2024-03-04T13:58:23.447000
|
||||
CVE-2024-2647,0,0,dc044af22784e4db6ad7522cd4841e4dbc9efce24abfd075978f936ae875c263,2024-05-17T02:38:23.120000
|
||||
CVE-2024-26470,0,0,c7b5d7dc6fff2b462a4e7b75eff02406620bfb4a3f9caec2a7328aed1e8f840f,2024-02-29T13:49:29.390000
|
||||
CVE-2024-26470,0,1,58e234d7e215267230c8a12c548ad8fb022e4ba21a7a856a3f33600c880169c4,2024-08-28T16:35:18.190000
|
||||
CVE-2024-26471,0,0,638407be95241af8b802e909dd749dda860405db3eaaa59ad63e6686ac6163d0,2024-08-27T20:35:17.533000
|
||||
CVE-2024-26472,0,0,3ea665ae7d8c4cb8ea3ef77beb55f90d75bb053da605750b4803b40c300fd840,2024-03-08T21:15:07.193000
|
||||
CVE-2024-26473,0,0,fc9f75146122995e0277d9d0adf8775c5418cc84731af51473c2bfe5d4f1f791,2024-02-29T13:49:29.390000
|
||||
@ -247247,7 +247256,7 @@ CVE-2024-26491,0,0,3d9a25d9d13dab43f4fccb79edc1a9c15bdabd787c28cc0e8ec66c7f9fee3
|
||||
CVE-2024-26492,0,0,776536ff3e72d199deab8e9d9e1f16da2e95ac241f37505598569b095df6bfc6,2024-03-08T14:02:57.420000
|
||||
CVE-2024-26495,0,0,3c32f7bed61a7925414ccba584adc4484e3c603c024ccad8423c6f927ec096b6,2024-04-03T12:38:04.840000
|
||||
CVE-2024-2650,0,0,4b5612c4084720b2f75ed069d914fcdc0a38f0f53c7b3b04b755c2a4e98778bb,2024-04-10T13:23:38.787000
|
||||
CVE-2024-26503,0,1,f96c865fc711ca69d18c1db7a096f4b4b623c09f9b612372bb3c8a1f56bc4c7b,2024-08-28T15:35:17.227000
|
||||
CVE-2024-26503,0,0,f96c865fc711ca69d18c1db7a096f4b4b623c09f9b612372bb3c8a1f56bc4c7b,2024-08-28T15:35:17.227000
|
||||
CVE-2024-26504,0,0,666faf787e5dc390b263f6f43b439704bacedd4c95ae744503624ba00795620b,2024-07-03T01:49:41.007000
|
||||
CVE-2024-26507,0,0,64f088a446d983fef0e9e5fe7e57b9067d595ae9ecbc4c9f4bac89b612f6dadc,2024-07-03T01:49:41.820000
|
||||
CVE-2024-2651,0,0,bd146bedf6ebe2167b2a748a6767423198ce44fb77df6650381302c98af6fd86,2024-05-14T16:13:02.773000
|
||||
@ -248294,7 +248303,7 @@ CVE-2024-27734,0,0,bf6aeaba46a01a9b67c56dd711450d0582ae90b1d0bd0418b821f57fcd663
|
||||
CVE-2024-2774,0,0,e66d8123d132aac12382a6e2ac593a72a85e469f411c6020b7cc9170c2075820,2024-05-17T02:38:29.590000
|
||||
CVE-2024-27743,0,0,b2fe2e7ce3a309e376bbb21a5e8eb0f8c98c444e26e52cd761c800a121c2af4d,2024-08-01T13:48:44.883000
|
||||
CVE-2024-27744,0,0,56bcff35b4b37cb35913a0cb22dd08c69cc0aaf691322c9f45e718a27d4a69f3,2024-08-16T16:35:07.307000
|
||||
CVE-2024-27746,0,1,f61708904df2f81aaa7be546a108ac9b8025b28332ac272646509eabc1bda1ee,2024-08-28T15:35:18.103000
|
||||
CVE-2024-27746,0,0,f61708904df2f81aaa7be546a108ac9b8025b28332ac272646509eabc1bda1ee,2024-08-28T15:35:18.103000
|
||||
CVE-2024-27747,0,0,43ca1ef187762467880e06e47b6be069096be41453e51c48b4193416f6039e25,2024-03-13T07:15:36.523000
|
||||
CVE-2024-2775,0,0,46caf5afd9e0a541c7aee346d23d915891b1af22a996efec3edfa49253e458bb,2024-05-17T02:38:29.683000
|
||||
CVE-2024-27752,0,0,b5e0902297e1d9d8f0b79a5fa02c330bc4447f06ee56b81e4776b650e157a62a,2024-07-03T01:50:45.653000
|
||||
@ -248622,7 +248631,7 @@ CVE-2024-28120,0,0,31f0663194c3ae59508b649362ee2d5539147691a5912e9e045c000f7246f
|
||||
CVE-2024-28121,0,0,5d765bddd1522ef772672d7c5b7d192742701db6f681e7efbb273dbd45669d62,2024-03-13T21:16:00.460000
|
||||
CVE-2024-28122,0,0,84073f6c96d7936717c065299f48850cb9a25df36eb3f8060c8dc4aa02997344,2024-03-11T01:32:39.697000
|
||||
CVE-2024-28123,0,0,1f90dd93aca0d11a73a18e1eb6b5cda27a407eb4db9e34eaa0e325666a8f1c24,2024-03-21T12:58:51.093000
|
||||
CVE-2024-28125,0,0,d05b4beef18ff94cb171b45d1bff2e0f308181a912ef6501300c9c027e77556c,2024-03-18T12:38:25.490000
|
||||
CVE-2024-28125,0,1,7f0b2ff4edc64bb38a0ae0fa981d34a256be95c3adc6334cd99f96a6d79e27a8,2024-08-28T16:35:19.333000
|
||||
CVE-2024-28126,0,0,81385e85c5a93c53bb47fe916edfff61f701ac34a4427a9e5bf459631bdea34d,2024-03-26T12:55:05.010000
|
||||
CVE-2024-28128,0,0,ff9121c55a5d465f19f3056b6278dc961489b664c0de60bae39143ce763e9dc9,2024-03-18T12:38:25.490000
|
||||
CVE-2024-2813,0,0,d92b59c3edc51ec01f06a151ea9186c3488c58069c0b5769bb5f8edad6a74d59,2024-05-17T02:38:31.770000
|
||||
@ -248767,7 +248776,7 @@ CVE-2024-28328,0,0,88f82b4f564bb2f0cfcfafe664c725ce4612a144351633fca17b714d7ef38
|
||||
CVE-2024-2833,0,0,2bc6d91fce23c79b9817f7554599630a708e7859b230a9a2bced401cbd1dcd51,2024-04-18T13:04:28.900000
|
||||
CVE-2024-28335,0,0,1f0f16000380dd3374bd37cd33265b4629fe1de221282bb913749763f1030c56,2024-08-06T15:35:11.200000
|
||||
CVE-2024-28338,0,0,4058229b720fcbbfc31bf8d1e879b9db75368619bf7702bfd3d1c419a7233635,2024-03-12T17:46:17.273000
|
||||
CVE-2024-28339,0,1,1c5cb4ff3f5e62c64fce21c9b445d5a13cbabae48573837fd8e9a43861da7ac6,2024-08-28T14:35:08.337000
|
||||
CVE-2024-28339,0,0,1c5cb4ff3f5e62c64fce21c9b445d5a13cbabae48573837fd8e9a43861da7ac6,2024-08-28T14:35:08.337000
|
||||
CVE-2024-2834,0,0,b28e87c6f045d84badec2f950b6e65f36270629b305c79d294240554601bad8c,2024-04-08T18:48:40.217000
|
||||
CVE-2024-28340,0,0,df1f6b0e64753fa9fcb1e44290eba32c1363678518f4321559c5625366bd5374,2024-08-21T16:35:05.830000
|
||||
CVE-2024-28344,0,0,07e206e8ae7b1052e93419db971a4a320fe24d9f630cd6feb731f0be928f9073,2024-07-03T01:51:39.137000
|
||||
@ -248832,10 +248841,10 @@ CVE-2024-28515,0,0,a1e2389b4555eab5e18310c7e283a6a35bc4bcaedf003e200c7e78de4e2e3
|
||||
CVE-2024-28519,0,0,8e20e3d590247971a9d8000bfa92fdfdad67e4416371af4c691b0cf99deea50c,2024-08-15T19:35:08.117000
|
||||
CVE-2024-2852,0,0,ce3b26e82372ba3a1ea7a513f638a60f6b521dabbda2b7b15730e3be31569c45,2024-05-17T02:38:34.220000
|
||||
CVE-2024-28520,0,0,0d1f20f1f11c459c615732a3ae08b6276ad3a3ce7691c30492f9301c8f89ba87,2024-08-01T14:35:07.467000
|
||||
CVE-2024-28521,0,1,4c470a16411ba9b060ae66f422bfe7a7a3db4fe1c8d1782aae757e57dba97825,2024-08-28T15:35:19.147000
|
||||
CVE-2024-28521,0,0,4c470a16411ba9b060ae66f422bfe7a7a3db4fe1c8d1782aae757e57dba97825,2024-08-28T15:35:19.147000
|
||||
CVE-2024-2853,0,0,d81bfe0f2e8d27cfb2c79cc8c8a264f27a9770cb3cd0ef6dd08d9ccd4f7731b4,2024-05-17T02:38:34.337000
|
||||
CVE-2024-28535,0,0,b3d344cd79be8d85dbbdedf90a4aca4a63b5679340011f1e54eaf1af4f8bc64c,2024-08-01T13:49:07.553000
|
||||
CVE-2024-28537,0,0,a1b289879a7e37eeb256b0155a9bf07c4755d98e64b0810b5b45c7e328ef254b,2024-03-18T19:40:00.173000
|
||||
CVE-2024-28537,0,1,561f7e94b8d92b36d6fbe4be70344b8d7fe8151321f8765b9517ac76c7332429,2024-08-28T16:35:20.337000
|
||||
CVE-2024-2854,0,0,c1c542fca188c35518ba79a264f89406944bf1f786d85f84048d2cb537d11189,2024-05-17T02:38:34.440000
|
||||
CVE-2024-28545,0,0,e9a4e3ca98799d0101f083d2aeb4e48f2d5da7cbf73a3832ee738e6e37caad1e,2024-08-06T14:35:08.207000
|
||||
CVE-2024-28547,0,0,6c303f8f5613978f1a0a818439df37889df3d74dbcbb9a87f20cfa2eecd135e7,2024-08-15T17:35:04.350000
|
||||
@ -248888,7 +248897,7 @@ CVE-2024-2863,0,0,51f45da8967ac2e9bd5b7be7c2b96b4f6f6eb08fbb2e67a9216114664ff1a4
|
||||
CVE-2024-28635,0,0,3ea376c2382b19ba1c40e1ca96db4a046dad170ab353c27de44a820093ca692e,2024-08-02T16:35:41.160000
|
||||
CVE-2024-28639,0,0,add78e1164c8df42f8993d3ec4e8bcc5efcf9c67ce1cf3d76c2a38423013e9f5,2024-03-17T22:38:29.433000
|
||||
CVE-2024-2864,0,0,0b7092f6657eda771a1a9211b6ecdc80d9c4229cfeb8d1413066da331f243b95,2024-03-25T13:47:14.087000
|
||||
CVE-2024-28640,0,0,106c587776d7eaa30d047f09c3864bea29de634863ccad6bc6dabf8d3997046e,2024-03-17T22:38:29.433000
|
||||
CVE-2024-28640,0,1,cfbccc1010b8b02b088260f58142e9a85d6403f967e58bd0ed51c3322d74bfa1,2024-08-28T16:35:21.193000
|
||||
CVE-2024-2865,0,0,55e62f341bb00366e8e43c3aae92bec34f13cdc149d9c58605d949f8282b8ec7,2024-03-25T16:43:06.137000
|
||||
CVE-2024-2866,0,0,0b9e7e6b190edc1fb6f92975c3f997f504dfccfc4fc2eb0b51cfe7935d053241,2024-04-11T16:15:24.870000
|
||||
CVE-2024-28662,0,0,dab9197cc819aeac0bf0ea06401058d5cc75e9a0ba3a4ce1ecd76d7bcd7e31f2,2024-03-14T12:52:16.723000
|
||||
@ -248896,7 +248905,7 @@ CVE-2024-28665,0,0,1bcb843df69123849882283a8f9fca9c4abb51adf88a0a7fc25bcd7f8392f
|
||||
CVE-2024-28666,0,0,9909b1d8b42ce81db5680c2cff308836e3dc86a07602ebc3692c51a5608b0d49,2024-08-02T21:35:23.507000
|
||||
CVE-2024-28667,0,0,a722c74094b46413cd2f0e1e6663b7ae2104332e1b5c605e7cc511a2a8371374,2024-08-05T19:35:10.487000
|
||||
CVE-2024-28668,0,0,dfab810650daaa38b417cd38363fcb259e164356905554402cb2ffe391f0ae90,2024-08-02T19:35:34.313000
|
||||
CVE-2024-28669,0,1,c4afab4e693b87bd1d4cb0ea504889e1927ba508a176fb9bd7063780045543c4,2024-08-28T14:35:09.157000
|
||||
CVE-2024-28669,0,0,c4afab4e693b87bd1d4cb0ea504889e1927ba508a176fb9bd7063780045543c4,2024-08-28T14:35:09.157000
|
||||
CVE-2024-2867,0,0,22ce17bc91c68b182edb0434ac76ac7f869c6c754fce9597b9e7c40c50afa2f7,2024-05-02T18:00:37.360000
|
||||
CVE-2024-28670,0,0,845945b47c5eff5f2f3fd7e5bf1a4a985e355f96d0a2e2e63d9e2637032bebea,2024-08-15T20:35:07.023000
|
||||
CVE-2024-28671,0,0,9a1d1290de5a4ba6867a05ae1d283c711cdd9d5647299d6bacd992d6df39a6cf,2024-08-01T13:49:10.897000
|
||||
@ -248910,7 +248919,7 @@ CVE-2024-28679,0,0,105ed47445b8d9fc8d56f311cb3b3bd3771e3a0f797a39fdf0ae6eee229ff
|
||||
CVE-2024-2868,0,0,0d0f218c7c83d10c9f9d6ae0e3c918a300514bd5c38acefa57e4da2fb68b6b16,2024-04-04T12:48:41.700000
|
||||
CVE-2024-28680,0,0,2c015a2a3060000c7ef4f8456bbc810496f8be9f148fccbda02f285f4310a0c8,2024-08-15T20:35:07.960000
|
||||
CVE-2024-28681,0,0,4b7cba0eeeff2f30c6b385de9946c7001ab8d0046bea262780a6c07cbb70db8c,2024-03-13T18:15:58.530000
|
||||
CVE-2024-28682,0,1,4f5f2d89be528d37359d245e4477bd20041973e3a5c07eac11756c948035a466,2024-08-28T14:35:09.923000
|
||||
CVE-2024-28682,0,0,4f5f2d89be528d37359d245e4477bd20041973e3a5c07eac11756c948035a466,2024-08-28T14:35:09.923000
|
||||
CVE-2024-28683,0,0,a84750ef7113628223a83f3f1bafccf8cc7ce4d93141f0176c20c984e9a69c9f,2024-08-15T20:35:08.767000
|
||||
CVE-2024-28684,0,0,ad6bf053cac6fb6852a9113f5958a7b88b0baa069360a39369fc3cdf983cbd42,2024-08-05T18:35:16.690000
|
||||
CVE-2024-28698,0,0,396cba3e1e1963c7f40bf85fd9f50e44dce9235019edfebcdaa211dedffb5752,2024-08-01T13:49:12.527000
|
||||
@ -248948,7 +248957,7 @@ CVE-2024-28752,0,0,201eab5c3984ec2eeccdd8a718f765ccc577edf4cb5cdd6dc7af0c666b0e9
|
||||
CVE-2024-28753,0,0,9b7534424fcafcef08233e24d8609288fcd5326b5da35fb8ff9f88b8b46d19e0,2024-03-11T01:32:39.697000
|
||||
CVE-2024-28754,0,0,b825517ec09be0ea62da6389e64d9784f7fd2758d87d7ecb524c18a858c8d2f8,2024-03-11T01:32:39.697000
|
||||
CVE-2024-28755,0,0,a971352ccfd1d9312c8fc951387a64198c3d2967458d020bfed491bd6af81566,2024-04-03T12:38:04.840000
|
||||
CVE-2024-28756,0,1,382afa2a84e7631da7af99644d58f88393f4012cb74b7d61efdfef4f7d7e8fc8,2024-08-28T14:35:10.690000
|
||||
CVE-2024-28756,0,0,382afa2a84e7631da7af99644d58f88393f4012cb74b7d61efdfef4f7d7e8fc8,2024-08-28T14:35:10.690000
|
||||
CVE-2024-28757,0,0,38e35916340cc7b59636f71fd12bb6c865345cd709ec2ad97abfbd0121697391,2024-05-01T19:15:22.567000
|
||||
CVE-2024-28759,0,0,dcdc9bf6250fc5bc69b9326038bec864cb143a6aab76dd04534ae889181ed6fb,2024-05-14T16:13:02.773000
|
||||
CVE-2024-2876,0,0,96b96473aca77aa576cfbfd4fdd62bd6bbdb12d76f0bee3d312855d2e34a9cd3,2024-05-02T18:00:37.360000
|
||||
@ -249257,7 +249266,7 @@ CVE-2024-29128,0,0,77fce425c49ac339ee33e12f1b3878cbdddd513fcac87acb1ce6cb06f4726
|
||||
CVE-2024-29129,0,0,022433b928b77b4e11df8137329a8e805ce777a51e5c390569874776ed9f1d92,2024-03-19T14:31:27.883000
|
||||
CVE-2024-2913,0,0,f13b68719789b0ec1d0ac3f00293efe13ae2d2476f7393cb029a386c10b9d5fb,2024-05-07T13:39:32.710000
|
||||
CVE-2024-29130,0,0,3c5ab042ef8fedd1c9b8f15ab543cc07d9c157ccb5fa600e78e62121be1aee44,2024-03-19T14:31:27.883000
|
||||
CVE-2024-29131,0,1,2ae4211a49a3f62b40c035e6593efbeb170b4f6145b3bd61df41334ef04dc0f3,2024-08-28T15:35:19.953000
|
||||
CVE-2024-29131,0,0,2ae4211a49a3f62b40c035e6593efbeb170b4f6145b3bd61df41334ef04dc0f3,2024-08-28T15:35:19.953000
|
||||
CVE-2024-29133,0,0,36561ecc1d25beeebffdfe71774843942f6f7498bb13fffd291f6157a4b0ff67,2024-05-01T17:15:31.283000
|
||||
CVE-2024-29134,0,0,64d7104dca1a7039d75ee2143ca2d6681014df1f5270f4434e5925abd69f5cba,2024-03-19T14:31:27.883000
|
||||
CVE-2024-29135,0,0,82b1b4a3f7dec94f8bbc60ae3c283e311437a5e9bda89959429180db805aaa10,2024-03-19T14:31:27.883000
|
||||
@ -249368,7 +249377,7 @@ CVE-2024-2925,0,0,504f348571b0724954329b33d6f2a7f319fa5d707d1f954272102f96b1330b
|
||||
CVE-2024-2926,0,0,6100f4386bbfe5450836eb65f9370c21adbc96474bbe6cfb9f696f055cca979a,2024-07-05T17:14:10.767000
|
||||
CVE-2024-29269,0,0,ebc1b5f27d771e6ee93ac1603f9526ec43c4cfe05c644b51205833a4ec58d1da,2024-08-27T18:35:06.583000
|
||||
CVE-2024-2927,0,0,f3bb3c9a30a99b51229870b4966b198934ad11007ef0d3791756757dba92d38b,2024-05-17T02:38:37.557000
|
||||
CVE-2024-29271,0,1,5402ce904d944d492416abac8e4f4c9ddf77369e744c2e469a951401a76b3ecf,2024-08-28T14:35:11.473000
|
||||
CVE-2024-29271,0,0,5402ce904d944d492416abac8e4f4c9ddf77369e744c2e469a951401a76b3ecf,2024-08-28T14:35:11.473000
|
||||
CVE-2024-29272,0,0,b270e02cad18e4df92dae6e1cbf164c1906a980efefcc9e36d9450cec32eecab,2024-08-01T19:36:05.820000
|
||||
CVE-2024-29273,0,0,c5afb013b946ae2c73d92fcbdb0c49112c4146cc606c2998618843bfb65fffd8,2024-08-27T21:35:20.250000
|
||||
CVE-2024-29275,0,0,019299934d2875a3343e07edeed968a51219f7dc129478a92947831a4c668c96,2024-08-01T13:49:27.553000
|
||||
@ -251064,7 +251073,7 @@ CVE-2024-31808,0,0,4ca3797160f40a508a2f1647ee565c7f4dfaebc9f383eaea19fce840eda82
|
||||
CVE-2024-31809,0,0,e4cdf5792005cb2f9dfbd37d300dd109766c0a4513cca5e9d46f263f8d455de2,2024-08-01T13:51:10.623000
|
||||
CVE-2024-3181,0,0,6b9f7aefd2f6d55b0cd7164186830f2507ec3f62ff8140326ea78f2d9a673378,2024-04-04T12:48:41.700000
|
||||
CVE-2024-31810,0,0,26fe393e9644e5bd4e624b86eb0f71b590d6fd459475e3a5579f903609e5f639,2024-07-03T01:55:23.187000
|
||||
CVE-2024-31811,0,1,ff265894abb5ed6badd79b2bdff04a0b300703a00c33228bdaf868c0272d19f8,2024-08-28T15:35:22.300000
|
||||
CVE-2024-31811,0,0,ff265894abb5ed6badd79b2bdff04a0b300703a00c33228bdaf868c0272d19f8,2024-08-28T15:35:22.300000
|
||||
CVE-2024-31812,0,0,e59d4fa5975f0119da4cfd4900343a38d484d0506f79ca6ee0996d32731f70d0,2024-08-01T13:51:11.397000
|
||||
CVE-2024-31813,0,0,29e23c3e48f06162164aa0d6475a9681cc76184b2c7d19a6059995c0e6dd7e35,2024-04-08T18:48:40.217000
|
||||
CVE-2024-31814,0,0,9e4411c92895e7b973cb8cdaa5d063ce91670d843374d0de8b17a9f579b1c377,2024-08-01T13:51:12.177000
|
||||
@ -252662,7 +252671,7 @@ CVE-2024-34083,0,0,be7ff33683a966fd2e2a91bd6e6ef912f3af6f70d27ba06b83f6ba7e43054
|
||||
CVE-2024-34084,0,0,7d9440ddf04c82559a24e924ee696f81ed9dcd7a55ec24907b743742e82c1796,2024-05-07T20:07:58.737000
|
||||
CVE-2024-34085,0,0,5d94e0e1234d28ea1392eb258fba225a24d0a9939e78b10ffa8b6f875a256c7c,2024-05-14T19:17:55.627000
|
||||
CVE-2024-34086,0,0,104df8351545cea86a5aeab75846aeda1282b00a21f2f9f835c10597aaf719fa,2024-05-14T19:17:55.627000
|
||||
CVE-2024-34087,0,0,5426f4aa57991d63a28f5e8b07028c60fe5b8f0b154c31b4e8cd3001af26d0dc,2024-08-26T19:10:18.890000
|
||||
CVE-2024-34087,0,1,b43933510c12517787f75bed2112cdd5360e703f06365c71649e9989d251d8cd,2024-08-28T16:35:22.590000
|
||||
CVE-2024-34088,0,0,6e1eb2987ec69271c7f130ee4d6c05bf54d17671e3eeb9426a758a6cc9ddbdcb,2024-04-30T19:35:36.960000
|
||||
CVE-2024-34089,0,0,5e7107f526e1d12d254978d5169bae34a870123e709df2c6ba63a16f1fef24b8,2024-05-06T19:53:38.797000
|
||||
CVE-2024-34090,0,0,4dc7a0402f56619348ec9c3e24642b60cff8f706f450ee8cc2f0663fc31edfc2,2024-05-06T19:53:38.797000
|
||||
@ -252737,7 +252746,7 @@ CVE-2024-3419,0,0,55e9e939cce7031c82bff2b248ad3247eb5f6b71fadfe890fcd9e67ed87233
|
||||
CVE-2024-34191,0,0,dbd580573375fd2d1820adc0049af00ef94f1f54fcce834415d344bda1271c56,2024-05-14T19:17:55.627000
|
||||
CVE-2024-34193,0,0,e28053bd0a22d022848badc9c3f75e2fb164790fa29e948e479e4871e120d21a,2024-08-20T15:35:11.077000
|
||||
CVE-2024-34196,0,0,fa10f060dde56de72ad527f194a43f50d5d3befcfd4eea3294712a1774de38b0,2024-08-01T13:52:15.947000
|
||||
CVE-2024-34198,1,1,ba93ef8fc5dbbb63bf24a83115f601ac65bb25dbfcfc498c53d09eed142379f4,2024-08-28T15:46:39.613000
|
||||
CVE-2024-34198,0,0,ba93ef8fc5dbbb63bf24a83115f601ac65bb25dbfcfc498c53d09eed142379f4,2024-08-28T15:46:39.613000
|
||||
CVE-2024-34199,0,0,27f51e6e9a085d1edb0a1380e0bfff4433e52f8f9e25d5bec96a743b9a9ffd85,2024-07-03T01:59:29.647000
|
||||
CVE-2024-3420,0,0,4a79874e63037882cf5f1fcd7dd6a1cad0c790500da420cf829e4ec3a26df5fc,2024-05-17T02:39:54.717000
|
||||
CVE-2024-34200,0,0,233f6ce04f4e95f03eaabab680c92f73f949e711725c4041d58add8301c7e04e,2024-07-03T01:59:30.427000
|
||||
@ -253452,10 +253461,10 @@ CVE-2024-35312,0,0,81ee7e5cffa0828718ff42985b5f71e3223019ea36fce71fb3a2d6856e31b
|
||||
CVE-2024-35313,0,0,1eb4867830818e97987762ca58d043d2f7f53fc926bce8bfb2e66b630c99ca4a,2024-05-20T13:00:34.807000
|
||||
CVE-2024-3532,0,0,861b69b5ea2c2097afdbe40dd2c40123c9da7c07e730e8c939be6340175b992f,2024-05-17T02:39:59.520000
|
||||
CVE-2024-35324,0,0,97e62876b974bdb37d65a00c14d6ae80121537e286249b5814c033b73ffdbb1b,2024-08-20T16:35:11.473000
|
||||
CVE-2024-35325,0,1,4b80666b63fc2d080ad0ef78d60bca54774976fcbb99e3bbc447d091344fce9e,2024-08-28T14:15:08.433000
|
||||
CVE-2024-35326,0,1,785b7c0f0611cee707ab55e4e91e7281ee39cefedfaae81dcfde51906229e1f9,2024-08-28T15:15:16.590000
|
||||
CVE-2024-35328,0,1,e32cbb90dfa97693b919430d56bab63542e4093ad25a37c20d599be5a44e71ea,2024-08-28T15:15:16.750000
|
||||
CVE-2024-35329,0,0,4d7aa78fa054a9381ac03b56ef696af98c93a3855ee38f8a31593aacb03aa73e,2024-08-02T03:15:51.520000
|
||||
CVE-2024-35325,0,1,073df6c9b920e39e00ae6bf411b4ce7fcbfdedf8b124ea4a78741a586d12ac92,2024-08-28T16:15:08.417000
|
||||
CVE-2024-35326,0,1,badb78c2247033746c5cf3590d8af4f4dbcc53903451b4cc619d29045733e44d,2024-08-28T16:15:08.740000
|
||||
CVE-2024-35328,0,1,6d7e3bce1434bfe8bae39c276eca44835fb4b93c816e05b8d24818b425433bbc,2024-08-28T16:15:08.863000
|
||||
CVE-2024-35329,0,1,a629a972b3e74c82d06baf68eed2d70433d4fd04f2bd358c28abd414b9db51b4,2024-08-28T16:15:08.980000
|
||||
CVE-2024-3533,0,0,488bd266f4041c85454e2052fe9f29a33b96935dc189b43a270de9d8362e90d3,2024-05-17T02:39:59.617000
|
||||
CVE-2024-35333,0,0,cce46e99aeb1eab01d831e139f6817035aabe6e9396d1f88c05286346cde08b0,2024-08-19T16:35:15.757000
|
||||
CVE-2024-35338,0,0,e107c4747b0de9e551ea11a4d2e69bae2aea4d6b20bec204b7a0c7504a17ed7c,2024-08-01T13:52:35.817000
|
||||
@ -255876,7 +255885,7 @@ CVE-2024-38810,0,0,a8d05ba61ad79ab8e573251f3391c7e33071f14ecb67883defa939520cad5
|
||||
CVE-2024-3882,0,0,8cf286ca42c3a62eccb821d9ac0678dabad594eee248c127390ddaf169987d46,2024-05-17T02:40:10.457000
|
||||
CVE-2024-3883,0,0,e6bda202b9fd54c10f25f29dd8ae0cebb83b1538aee636944c2fd66bf4045fff,2024-05-02T13:27:25.103000
|
||||
CVE-2024-3885,0,0,9b28a2ee85edfe77753e71858fb1438bd68a9b6ee299843f3a5752cca4753d01,2024-05-02T18:00:37.360000
|
||||
CVE-2024-38856,0,0,b96edffa3c5d3c056b0b683b5901b7d1b42d5c04f23c921a537c2a85ba0d9c15,2024-08-28T01:00:00.950000
|
||||
CVE-2024-38856,0,1,cf2c30abb1c3c3e6b03acfa253b7bd98efa464ab76b49fddc2034ce3ce8a3be1,2024-08-28T16:15:58.043000
|
||||
CVE-2024-38857,0,0,857bbf4d5ee889c68ec1450930f0cf323232ab2d5a162824c8153ee668a7e638,2024-07-02T12:09:16.907000
|
||||
CVE-2024-38859,0,0,593edb58800c759df69d81e4c4902db80ed6954e27fabcb131a77e637ddeaf57,2024-08-26T15:15:23.727000
|
||||
CVE-2024-38867,0,0,0587553b0e73bb3d7fb83caa644dbd7ff748ca26af84fce237e8ae38fe20168b,2024-08-13T08:15:10.817000
|
||||
@ -256420,7 +256429,7 @@ CVE-2024-3978,0,0,264c95fabf2474878692eedd3d0ccd0dbcfac72fb894e9f86052802e2ea097
|
||||
CVE-2024-3979,0,0,e9e7991f3b86f818ec400b9ec60245e440b2d51744d0b7d3598ed5add4c2b631,2024-06-06T20:15:14.127000
|
||||
CVE-2024-39791,0,0,67ad59fd29829ae2f24abc2182dde7428e4f74acb93e703ae70c08f625fe2293,2024-08-20T17:15:56.067000
|
||||
CVE-2024-39792,0,0,89dfb5d6e1471517d66a74daaa8f0b2947fd2994f2ce01af52b42a5dfe4eec05,2024-08-19T16:20:28.967000
|
||||
CVE-2024-3980,0,0,49f4e2a123078274984196ef63d2506b6e8e655b0a6bda271789de0fb7938b36,2024-08-27T15:52:01.317000
|
||||
CVE-2024-3980,0,1,6652f5805751a97ef8fe1d7ec0309de8a25bc6d7db9b9d9ac3de9d266e97087a,2024-08-28T16:32:20.957000
|
||||
CVE-2024-39807,0,0,ba2c368fe4cdf413290b5bff8a949eddf35bb4de98ed47f43e524e6cb747e010,2024-07-05T17:07:47.090000
|
||||
CVE-2024-39809,0,0,c569a9d6ae86025131a09eaedcfa15c9c40ca354c9f22b3a0f796bbc84856d4d,2024-08-19T16:19:52.530000
|
||||
CVE-2024-39810,0,0,32d906c66fda3178aaaf67b328715612b9d762f16a6ecd0f62d6e5eaf48f095a,2024-08-23T16:16:36.907000
|
||||
@ -256428,7 +256437,7 @@ CVE-2024-39815,0,0,2d23504d87a7185e1f6c185524d0f78ab739cf6cb169d8e09b6dc1e083fb2
|
||||
CVE-2024-39817,0,0,1d1cd6a9e8c22fcd8349304542868600b6e99673901b52763ffb290c1ead2e5c,2024-08-06T16:30:24.547000
|
||||
CVE-2024-39818,0,0,23a1489eb93e492f2f531059c176556ef0ad56414a5154c8c0ebf1d474d9bd4f,2024-08-14T17:49:14.177000
|
||||
CVE-2024-39819,0,0,c8db5421a3ae027faff5d4d06e3d8592e32e290e4092ae4f0fac52eb30d3f58b,2024-07-16T13:43:58.773000
|
||||
CVE-2024-3982,0,0,a0de489e3433ce3a86a9c4e65d10b7ac468577660531b6c8501a0094ff1cccce,2024-08-27T15:52:01.317000
|
||||
CVE-2024-3982,0,1,2c1fd479e7699ecf469abfee8d6518a9d65222765727c23ebb6f762db081a48f,2024-08-28T16:30:50.080000
|
||||
CVE-2024-39820,0,0,e80ca54bf5fea4b83e9254c90576692ea592c71bc167353b8799d70169ce0139,2024-07-16T13:43:58.773000
|
||||
CVE-2024-39821,0,0,3d8221c440f8b1dbd5c98d43cf97f16f597a43c5d93725a475fc98495ffe9f3b,2024-07-16T13:43:58.773000
|
||||
CVE-2024-39822,0,0,cb2d1986932d128ad1eb7e7cc883dcc2562e93b2f186e64c96f02bfcb19b2244,2024-08-14T17:49:14.177000
|
||||
@ -256514,7 +256523,7 @@ CVE-2024-39922,0,0,49c31345500e32d6b7c4474f0f0a36570fac3b2db4261dad7ae8eae345056
|
||||
CVE-2024-39927,0,0,717dcd9b351ff5b040ab1ae7299ad64aae73108f68a03a8e01e420f58c1fcdd4,2024-08-01T13:56:03.057000
|
||||
CVE-2024-39929,0,0,a101bb24f7d63f090f20192946a102f9a39a1df49f06f499eb77157966db47ea,2024-07-09T16:22:58.760000
|
||||
CVE-2024-3993,0,0,a2f94f13d02cfe8603a71433706e6cc2c5ad0c0e3e2fd5d51c299cf3fc301a73,2024-07-03T02:06:58.160000
|
||||
CVE-2024-39930,0,0,7b1072f578db5486acad330ef551c9af3d89161af147b6932a05219f09829b8e,2024-08-12T19:35:09.940000
|
||||
CVE-2024-39930,0,1,cdc992a1c867403c11a0be36acd7b83ecbd37782c92bfa488077642f39b94c1c,2024-08-28T16:15:09.077000
|
||||
CVE-2024-39931,0,0,57507fbe3202e653bd98909b84e780947039b01c02661b27c6bdbbdb819d80d9,2024-07-09T16:22:59.140000
|
||||
CVE-2024-39932,0,0,f66805c87f9aab2044f816b4446ff24a7e25b5aa6328c8b5e2e33ad89efc57a8,2024-07-08T14:18:57.240000
|
||||
CVE-2024-39933,0,0,b6d32209bff3b62be34bd9bfc29ae3793bbd5d0463ddb473f2add5c3bc3eb1dd,2024-07-12T16:11:56.423000
|
||||
@ -257155,7 +257164,7 @@ CVE-2024-41304,0,0,97c8e67643f8470191a2e05ce641725b816a8cc5ff59a9e38a00154810fc7
|
||||
CVE-2024-41305,0,0,44375e3d9aedae768570d453a5746b314221c07760efe679991b65a52a72cbb1,2024-08-08T14:36:06.423000
|
||||
CVE-2024-41308,0,0,0cfb1f5a539d1b3ab56fa248bc4e6b56744120f3ffd7eb646c940bb1f8d27a55,2024-08-08T15:04:28.510000
|
||||
CVE-2024-41309,0,0,b9bc578a75924505757e6c223f9b414f575de364b8af8a3b843d1bd2707bdb26,2024-08-08T15:35:19.553000
|
||||
CVE-2024-41310,0,0,411e679a4d87025cfbd714a6e1af5ab48738e4397cbbc5202ae220b932f1975c,2024-08-05T12:41:45.957000
|
||||
CVE-2024-41310,0,1,dab67ac1aeab1ffb95f812e4938961307c6ce203d52330d45800d09dd75058c0,2024-08-28T17:42:01.190000
|
||||
CVE-2024-41314,0,0,db53d1cfc39af554879f83e26dbe36479a0a26172379fc4a043735d6cb186ac0,2024-08-01T13:58:28.057000
|
||||
CVE-2024-41315,0,0,2d4182edc23b3ca5f23da4066941e10349788ef80e0dc9d84cb1c30a4edf0d37,2024-08-01T13:58:28.840000
|
||||
CVE-2024-41316,0,0,fdd83ec8e5f08975a0e0f1c308e905edc7588e4137c92360541a6835aa02f708,2024-08-01T13:58:29.627000
|
||||
@ -257223,6 +257232,8 @@ CVE-2024-4155,0,0,9d1d3f06be4be4f0b611f0b92aa6b48510c05900efdf1b1c24851d7c9581a8
|
||||
CVE-2024-41550,0,0,6726e0c6849e70c536d9bf6936241acc920718305f74521a185836b6b51898fb,2024-08-01T13:58:53.253000
|
||||
CVE-2024-41551,0,0,a47b3d6d1401636bd7731728d6fcb9c38717d9cec4c98b37b50c290693f43ad0,2024-08-01T13:58:54.023000
|
||||
CVE-2024-4156,0,0,31cc9500838d0dc99d5959700d84ebbac93048893a2eb67f37ed77d13093550c,2024-05-02T18:00:37.360000
|
||||
CVE-2024-41564,1,1,01c34f438e5872694f278c8b8396057a7820fd6f83e9a693a9ecf1988006725d,2024-08-28T17:15:10.693000
|
||||
CVE-2024-41565,1,1,ec1d51b0f10f4435436477324f29c544ea70dc92e44967077c96d395a60a6faa,2024-08-28T17:15:10.903000
|
||||
CVE-2024-4157,0,0,ac5ec2e690c76b81403cfa49bc63d1a8caa2fb9d97d28a1055398849720db727,2024-05-22T12:46:53.887000
|
||||
CVE-2024-41570,0,0,08f18f006ef075be3e868b6121774877f2111f5f9ca9672280d529a6b344da0d,2024-08-13T01:14:38.880000
|
||||
CVE-2024-41572,0,0,3538ce626eeeb6e9299463c0d735b4d1491706bbb85dc5c5ebc08929e34353d5,2024-08-22T21:15:16.797000
|
||||
@ -257257,8 +257268,8 @@ CVE-2024-4165,0,0,1335796556da8c6a778d77814a8f1d84d8c2dc18b70d9de88815783ed1aa0d
|
||||
CVE-2024-41651,0,0,57f3cb7d00e7e9511d0d03f9437ce1a28380d574f08dab4c3cea3241ce2f7fe3,2024-08-14T21:35:07.780000
|
||||
CVE-2024-41655,0,0,ef3400d9e58c2cde6c539334829c8042d5ee995783a74a46bd16638786b0b6db,2024-07-24T12:55:13.223000
|
||||
CVE-2024-41656,0,0,d1b3325a39b6b3bcc8a959c5c8544c45c6c0440a0b7279ac0753d809322ad5fb,2024-07-24T12:55:13.223000
|
||||
CVE-2024-41657,0,0,482cc991d05bcd3eb066c0c56d874cc7b42b646258450f155c57d61a96a8fda1,2024-08-21T12:30:33.697000
|
||||
CVE-2024-41658,0,0,7b1c1c3712bae12126c9b8d3964c233fb804348f9c0993c62ac378019e83523e,2024-08-21T12:30:33.697000
|
||||
CVE-2024-41657,0,1,a42a5606a1117689a3813ccf13de868ed46700bc2cc392be931df01456b9a289,2024-08-28T16:13:35.140000
|
||||
CVE-2024-41658,0,1,1f9220237877017e3c13ba7e8f7b4d6391ec43dc30ad917b851d9498bae40fed,2024-08-28T16:08:31.743000
|
||||
CVE-2024-41659,0,0,998a35290d72b0eb949229fc531ef068f95738d64bf6829749ab13d3e732d9a9,2024-08-22T16:15:08.993000
|
||||
CVE-2024-4166,0,0,f698286bcd13839c3e713fc944a2d68390d9d1f07ea9696da7a343bdead6335d,2024-05-17T02:40:17.900000
|
||||
CVE-2024-41660,0,0,4c084a0db17b15ec343b2b75da4e6745a4156a9dd9381d5cdd96e60eb80314c7,2024-08-01T12:42:36.933000
|
||||
@ -257944,6 +257955,7 @@ CVE-2024-4268,0,0,ed1b7008ff1a2549bc2f685279352d3a8f5b6d435592b2f29fd10fa9328ca7
|
||||
CVE-2024-42680,0,0,b168ab4cd2e2150be7aaf36c84a318add99cf48e6e7026b9bd7262bb9f167200,2024-08-21T11:06:00.887000
|
||||
CVE-2024-42681,0,0,38014007bcc5735791461b793967c4dfbe475531f64d8682f14c63500277a9d8,2024-08-19T19:35:08.437000
|
||||
CVE-2024-4269,0,0,3a0e07c5dbf72b66f7c37e018ba2f8991c2e2b5c26c8f2d595b33767cdbe4e7e,2024-08-01T13:59:29.737000
|
||||
CVE-2024-42698,1,1,fe1c83135bf9fc84a6cd49538bca8838b9d9c29d3ca03087dcd64f79c8ed00e0,2024-08-28T16:15:09.210000
|
||||
CVE-2024-4270,0,0,17133812b9c812b17ff2909d738c8b5ae6f8cc2b39eef016edec8cd05359b195,2024-07-29T16:31:09.117000
|
||||
CVE-2024-4271,0,0,264c116f07aa10a920ca78d5e9c58bba0fe1e2b31cb4f2cfd0a7a609be29751f,2024-07-03T02:07:19.577000
|
||||
CVE-2024-4272,0,0,c6d51ebaf4553eb5c8964297a8a6646c1c8e34e58f8be34bef185e25a27d5cec,2024-08-01T13:59:29.913000
|
||||
@ -258008,7 +258020,7 @@ CVE-2024-42816,0,0,8dd1ae8820cfa39b8949229a5b0a0fd0a511af977924a1929a9dcb8553f95
|
||||
CVE-2024-42818,0,0,95f0b34855c9e871f13f61a27d7d6c078da48a4416445325f9775ca851de2f13,2024-08-26T19:10:18.890000
|
||||
CVE-2024-4284,0,0,4fbe27a80563712e41b6422ac48754a31c657da862cab89b959335ecaf13d90e,2024-05-20T13:00:04.957000
|
||||
CVE-2024-42843,0,0,147a94e278dd08ceb9ff0b00f505eb868d7a1e59c01ddecc9d1420e344e9ec86,2024-08-19T19:35:09.180000
|
||||
CVE-2024-42845,0,0,41f949a7278b40e93c96bce086a04dddafae3cccde3fe1baa3e17a4aa01d20bb,2024-08-26T12:47:20.187000
|
||||
CVE-2024-42845,0,1,f506b40591f84fe588a1ebf10f79903d4e58b530d7a712a8d7ac529b24aba892,2024-08-28T16:35:23.650000
|
||||
CVE-2024-42849,0,0,476a8b05abd0e5119b7af3cdc63ecacc25e4b753be03084352759f8b34a540b8,2024-08-19T13:00:23.117000
|
||||
CVE-2024-42850,0,0,a72d6cc9fb65147822ff703ae140dbf9bc418b2813da9b6084ec42fe436f4f06,2024-08-19T16:35:24.160000
|
||||
CVE-2024-42851,0,0,6c308263fb08a775e02bfe8a8bf1ad5061e10f5571a88f89a609b0ef630568bc,2024-08-27T19:35:28
|
||||
@ -258018,6 +258030,7 @@ CVE-2024-4287,0,0,e4eaa9cc0eedd48e962bf47bbdeb2988e2d50ccd6011525ef3609c758b0c26
|
||||
CVE-2024-4288,0,0,98dba4b61502f5abd6b75fde706ee82a9bae31a5b0be7db458ed8cfdf0d8bfc6,2024-05-16T13:03:05.353000
|
||||
CVE-2024-4289,0,0,00867bfd0f1ec036543766f70ad029cfafef69b68de16bba7569db7276222c78,2024-05-21T12:37:59.687000
|
||||
CVE-2024-4290,0,0,96468cd9b26f589eaa99a2991d568962f6532fbc65b02b2950965134d65bb1ac,2024-08-01T13:59:30.177000
|
||||
CVE-2024-42900,1,1,03cb4ee58025e2ddb00a8eae086634a9edd3cd52073546780083b1fedebf3f3d,2024-08-28T16:35:24.427000
|
||||
CVE-2024-42906,0,0,83be373189250265e4f12ae408fac34eb129a889121f0ce4e7f0836727cd3453,2024-08-27T13:02:05.683000
|
||||
CVE-2024-4291,0,0,3555454673f17bb302e51e81ea2fe7cd049aabde203c094d5792666ddbcea9c8,2024-07-03T02:07:20.773000
|
||||
CVE-2024-42913,0,0,796fb1ba4b67987b44a9370ce058c2b037b19ffa316e1a186c445f2c01301c3c,2024-08-26T19:10:09.607000
|
||||
@ -258481,7 +258494,7 @@ CVE-2024-43911,0,0,12aeb44bc585c03b21c76c85e16ebe86660a58d7a2313ab40f0b85cb472c7
|
||||
CVE-2024-43912,0,0,9224434204b7590693cac3418bf42ebf514074b8e8db707b0e4b732c2fd9e6a1,2024-08-26T12:47:20.187000
|
||||
CVE-2024-43913,0,0,5c9c2c963f30f56673884f817fecf35fdb8c9c609214d88499e445eaad74d316,2024-08-26T12:47:20.187000
|
||||
CVE-2024-43914,0,0,6abd174237c3162d43a4c80a18de042ce09386ce614128479039a4b09b208b5e,2024-08-26T12:47:20.187000
|
||||
CVE-2024-43915,0,0,527eaabdc21342738de4963484c9dc8224b73fd991fc0a05e81028cc4df2773a,2024-08-27T13:01:37.913000
|
||||
CVE-2024-43915,0,1,d179827f4a2239697e62ac501a97b8b3109220e3bde2278c20f3a196442ad24d,2024-08-28T17:44:45.193000
|
||||
CVE-2024-43916,0,0,f029d23d9b2bb2878425bf53ff3e166ae08ff9834b0ced7b956909e8c596933c,2024-08-27T13:01:37.913000
|
||||
CVE-2024-4392,0,0,5c82c123a66d3444e81adbb958bd6b8cf11e432e36668571a78dbfc8c82c1c37,2024-05-14T19:17:55.627000
|
||||
CVE-2024-4393,0,0,4e00802830a11f2dfec38985ebf8ec82363098448bfe6d2b274aa9f7d7f56b33,2024-05-08T13:15:00.690000
|
||||
@ -258501,7 +258514,7 @@ CVE-2024-44069,0,0,2eb956dd06d71bb925b0fe816cbe078cd7c5c9a8647e07e8d081256cc543f
|
||||
CVE-2024-44070,0,0,335509dea99ada6c9ff96f06f0e87dab6ba3af229752b80bde023da9415a33b1,2024-08-21T14:35:15.433000
|
||||
CVE-2024-44073,0,0,ad93c7cd67f110b3f3dbf8094f03e2f128eb131898a84b811a05132b4dd487f2,2024-08-21T12:32:44.470000
|
||||
CVE-2024-44076,0,0,d8ab474e3e0cd492e411ba495a07543359555360960989541af9d6ad1fd6855e,2024-08-21T12:33:42.487000
|
||||
CVE-2024-44083,0,1,0fbb97686726ee4d6be299ae185c5a7e6d7807c436d290993d1b41ed0119344c,2024-08-28T15:15:17.050000
|
||||
CVE-2024-44083,0,0,0fbb97686726ee4d6be299ae185c5a7e6d7807c436d290993d1b41ed0119344c,2024-08-28T15:15:17.050000
|
||||
CVE-2024-4409,0,0,ef601ae22761768812ec6eb133885b7a6b08c5417903a944100f49b603e1172f,2024-05-24T13:03:11.993000
|
||||
CVE-2024-4410,0,0,ca43b98286a78ab63b5139b50b93fc074ee9aec4c16e78097aa3514c43622322,2024-07-29T14:12:08.783000
|
||||
CVE-2024-4411,0,0,9d1b27ccac7555d95c6be5f4488ca4d9772a0570efc26fe6a3f3d131fd0aea06,2024-05-14T16:11:39.510000
|
||||
@ -258686,7 +258699,7 @@ CVE-2024-4532,0,0,4fd2f02f0358f1c611846b77f1b0e80bcb1985e07f23fa6a21a71cc2559350
|
||||
CVE-2024-45321,0,0,37b6c3801843cd19376dfc008024087eb46b0d9a726e5ad21af320498cf91f40,2024-08-27T14:35:13.357000
|
||||
CVE-2024-4533,0,0,aca3a412ead1ce1343d6f498450801be5e059db6302d74881039b5fe75fb6c09,2024-05-28T12:39:28.377000
|
||||
CVE-2024-4534,0,0,527a3127a7586bdf18d80cd2b5b17fe74ac5ed6a2aa4ee562148173cc1d9d3e9,2024-08-09T19:35:09.923000
|
||||
CVE-2024-45346,0,1,967ca6ed0df27e2a9e907ff7d312e14e26f5a8bce44c8629742d5fb67d6cff89,2024-08-28T14:35:12.640000
|
||||
CVE-2024-45346,0,0,967ca6ed0df27e2a9e907ff7d312e14e26f5a8bce44c8629742d5fb67d6cff89,2024-08-28T14:35:12.640000
|
||||
CVE-2024-4535,0,0,87b4b5e0787ea182ddd9c6fa8e26c59b6c616e4e57e592ee0d6f169678ff9b64,2024-05-28T12:39:28.377000
|
||||
CVE-2024-4536,0,0,7a5702ddadcf7f48c7c82ca09978f30e343a6d4f259e12cc6fa88068d1723500,2024-05-07T13:39:32.710000
|
||||
CVE-2024-4537,0,0,2e530ca2c49a8373646367a8e0c1771a783669d0151f9600cf6b8a99b12e73b9,2024-05-07T13:39:32.710000
|
||||
@ -258989,7 +259002,7 @@ CVE-2024-4868,0,0,115d92ddb75cc1364cb7dc1ed780a32e113f5bc6f17706ce21f4cd60cd219a
|
||||
CVE-2024-4869,0,0,c966893d60f3d2b834063ff6490a8006deca39b71769e89345f5be1133a2f10c,2024-06-26T12:44:29.693000
|
||||
CVE-2024-4870,0,0,34dc62fe0d9ee09fd087b0b9ccdcdae4c15125668207018dedb4b3cfd451baf0,2024-06-04T16:57:41.053000
|
||||
CVE-2024-4871,0,0,27d58887099f376e93909bb4c2214524b0789bbba79f05cabea36e120d5295ee,2024-08-12T16:15:17.313000
|
||||
CVE-2024-4872,0,0,eb6d7f4214203eee8a6cb72e8d792186755c20a5d101f33f66ef4b3cea8dad55,2024-08-27T15:52:01.317000
|
||||
CVE-2024-4872,0,1,d90ca5cb4f3aa571c9b2083a01f34e57193d2e6bd3fb94b4217f8fd14b43654d,2024-08-28T16:25:02.097000
|
||||
CVE-2024-4873,0,0,acc2d485a3cc66f2d361ddda92f62901a8108a4490dc81ea4acfb7f60771d88d,2024-06-20T12:44:01.637000
|
||||
CVE-2024-4874,0,0,4b5967df7915507c9b0020b0ee4984332d2c23e37a57b9a262a2ae6c5b300f4b,2024-06-24T19:41:12.293000
|
||||
CVE-2024-4875,0,0,5a9bf10de46e2f944321ed00fa6d17c799716a219001f5797c9cce4abb6a2b7b,2024-05-21T12:37:59.687000
|
||||
@ -259973,6 +259986,7 @@ CVE-2024-6047,0,0,85682382a3873811b400f354140b032b3237064163e98177d5be59d88a26c9
|
||||
CVE-2024-6048,0,0,c67416098261daba4fbb7cd933140c3939f890be764cfd8ea2022f29e8208654,2024-06-17T12:42:04.623000
|
||||
CVE-2024-6050,0,0,977e3c1d954bb2d407afb4f807be75a02157bd9cd72111a32e132ff13e7f9262,2024-08-15T17:21:21.920000
|
||||
CVE-2024-6052,0,0,38b34f27bf68c4c46450287788affa9aba60ae6b039318e5898c7b1f92d4d920,2024-08-27T17:56:02.507000
|
||||
CVE-2024-6053,1,1,d948e07b8baf864dac71376d31f8ecc578facf82b0fb9781a32c5b912ab40183,2024-08-28T17:15:11.163000
|
||||
CVE-2024-6054,0,0,dbd3e49036b5938301871d5a6c67ee17ba89370e3288082b00ca89a51a1f06ed,2024-06-28T13:11:58.810000
|
||||
CVE-2024-6055,0,0,69ea90ebaa7aa8fe33baa786beceb3ec128eecc80f960a60b64b4cba1327c031,2024-06-20T12:44:22.977000
|
||||
CVE-2024-6056,0,0,7f74134484f6fd18fa58f8938789bdbc0044ca3e8ab999314ec931796600d896,2024-06-20T12:44:22.977000
|
||||
@ -260567,7 +260581,7 @@ CVE-2024-6870,0,0,fdc9781daaba3083ba91ed61390ac3ea5e3a3c1deb45aa4706aee786b8d537
|
||||
CVE-2024-6872,0,0,9eb628e3a6d1ea0380e94dd099512f5a2f74ddb0ba75bf9a102e83ab13e260f5,2024-08-05T12:41:45.957000
|
||||
CVE-2024-6873,0,0,8e5db8bfa0491746f29814d1d8249a1850325cbcdbd09b52dbf90709e95d212c,2024-08-01T16:45:25.400000
|
||||
CVE-2024-6874,0,0,dbf80741a5dbaf69dfea3d6102d0d56a1052d5bac2fe6cc0bc24819c43cddd92,2024-08-01T14:00:45.683000
|
||||
CVE-2024-6879,0,1,6dd99f7574923c6a0220f28a1253b4ac8ff29b09a2650b86b7b021e79b9e4f08,2024-08-28T15:35:24.120000
|
||||
CVE-2024-6879,0,0,6dd99f7574923c6a0220f28a1253b4ac8ff29b09a2650b86b7b021e79b9e4f08,2024-08-28T15:35:24.120000
|
||||
CVE-2024-6881,0,0,9eb1bb1325feedc0a442bcf6c20b4ef8c1194f18829a36ce47ae950cf638d18d,2024-08-27T11:15:04.740000
|
||||
CVE-2024-6883,0,0,17af31f8537d0ebfdcc29735e63f85da6d525c783f08d8df80e6d71ccea2f1ba,2024-08-21T12:30:33.697000
|
||||
CVE-2024-6884,0,0,02f1ddb5da314dd396e2205aa21249cb1d9497ae10f450ff628522b4f22bdeac,2024-08-08T19:35:22.760000
|
||||
@ -261118,7 +261132,7 @@ CVE-2024-7707,0,0,f8de015be00795da0af9b00fe142b56145045c7575c0f341ba96aecb6e80eb
|
||||
CVE-2024-7709,0,0,885c8ab670bc9137207c7147a93dbb83f228a878ced7f9e3351a8e82272eda87,2024-08-17T10:15:10.957000
|
||||
CVE-2024-7711,0,0,d162b2aa52f460525a4de3c665dffbe11ff5ad157026981df71b9201129fde70,2024-08-21T12:30:33.697000
|
||||
CVE-2024-7715,0,0,cce2a99e52ea07f4f42d2501434c3e0483cd57d931341a557261d628f3236d39,2024-08-15T15:15:22.690000
|
||||
CVE-2024-7720,0,1,ddf81bc4df03ac1e2d7b5b61581e0a5dc6cc3f46e57542a631155ffde48ea5ad,2024-08-28T14:35:14.160000
|
||||
CVE-2024-7720,0,0,ddf81bc4df03ac1e2d7b5b61581e0a5dc6cc3f46e57542a631155ffde48ea5ad,2024-08-28T14:35:14.160000
|
||||
CVE-2024-7722,0,0,dd34a6c6fa187cfdff62390c6b38a3b9bbf49b761e6117c420a823ed09401edf,2024-08-21T17:24:59.627000
|
||||
CVE-2024-7723,0,0,0bdf76bf964a28a97b4d4d8ab086a048836c54fd8be0e41d26426907a661be8a,2024-08-21T17:24:59.627000
|
||||
CVE-2024-7724,0,0,fd9d5d4a5cde684cb1f23cf1c101e9cac57afdf61c2e095e3e5cfe8dee5c7260,2024-08-21T17:24:59.627000
|
||||
@ -261134,6 +261148,8 @@ CVE-2024-7740,0,0,b6b97e22b2a1c91ed733b5ea0db90c7ca386835aea8a2536d78b137aa899a0
|
||||
CVE-2024-7741,0,0,451b4501bfecb549fed2131350eefedffb5605095818bbd2dc73e6ce30b3b5e5,2024-08-21T19:07:40.757000
|
||||
CVE-2024-7742,0,0,5026e5c91e6d01ca137577cf715447f5db3eb9e4e96b1b8aca8896a09ee6d170,2024-08-21T19:08:47.707000
|
||||
CVE-2024-7743,0,0,c910ec910e11d4c23506ee8328b07eddb255cd4474ff1acb5544c0f61f82b883,2024-08-21T19:15:54.553000
|
||||
CVE-2024-7744,1,1,1c24802daeb8a1a916eb67627cef6aecd8c9091c1618d772795e5ffee13a4e0c,2024-08-28T17:15:11.380000
|
||||
CVE-2024-7745,1,1,e29f9de33b3b1e8fe4a25f6826bc4f6300a7deaa8241cd630860c39d845a5db0,2024-08-28T17:15:11.593000
|
||||
CVE-2024-7746,0,0,41ddc83547faacdfc7eb4febb4b7b289d12121016bfc1367db838e5c1dc32e37,2024-08-22T14:40:44.167000
|
||||
CVE-2024-7748,0,0,19a9780c8c3e3580e0507d6a06dfe151328aa44e58ebe3ad1d40e684712edce7,2024-08-15T17:22:53.340000
|
||||
CVE-2024-7749,0,0,b1dd92bb0312fc7ae82ed3bd4baca9ef6dbf65c2cbb7e0f4fc4cc1353892f66e,2024-08-15T17:23:28.410000
|
||||
@ -261232,8 +261248,8 @@ CVE-2024-7934,0,0,378bcc55a3df62e429d1f101d54479de592e8336c09692e7e3a6942b8872bb
|
||||
CVE-2024-7935,0,0,de5faf49db18a7840e6f8ddda5ba5a34ca6452592345acf93a6a1be43f2a05c7,2024-08-23T19:52:06.570000
|
||||
CVE-2024-7936,0,0,cf4365fe1d0752346fd362041feab4848729c5ce67cb542c05b95010d5242c1e,2024-08-20T15:44:20.567000
|
||||
CVE-2024-7937,0,0,bfd626110b4738097d3eecc17d410635b5492a7f6c8b4af76523530d264a7d87,2024-08-20T15:44:20.567000
|
||||
CVE-2024-7940,0,0,c6f423f2b42a2fa2f207dbe4fa5849cf630d4d81436ada726895ff9b4151e77e,2024-08-27T15:52:01.317000
|
||||
CVE-2024-7941,0,0,77b44bc4d6878b7df0eb95e35f81ca8d59535ebb8b2e02ca2418a09213f68a6b,2024-08-27T15:52:01.317000
|
||||
CVE-2024-7940,0,1,dbd0239c121d6194e450c1260a59c9e5a29e98f7339f7b43ef0e94924bfd60bf,2024-08-28T16:24:07.043000
|
||||
CVE-2024-7941,0,1,f84a573c5184fa9f02bbf2be035433cf04406330bf9f18b5c31c6f416d5532c2,2024-08-28T16:09:03.693000
|
||||
CVE-2024-7942,0,0,5b31cb5e8458774e5fec47eb01ab09f3b7e76a9f352de27f599173dde8e64b06,2024-08-20T15:44:20.567000
|
||||
CVE-2024-7943,0,0,84fd281936993964831a8456f79f6df290184647869e7054aff52b4493acaea1,2024-08-20T15:44:20.567000
|
||||
CVE-2024-7944,0,0,746f5ab96ce75fa2f3ceb934a195b4543f73936672a5c19d615f70b88c853fd7,2024-08-21T15:24:44.280000
|
||||
@ -261292,7 +261308,7 @@ CVE-2024-8083,0,0,132ff33ed62a0570cfdbcc24775ef89bd874f9ae2d6b782cd1fd9309d1bcaa
|
||||
CVE-2024-8084,0,0,800f6f0fe2093be3327a671bc62389e5ecd680550a19025f92dbb7c739b52793,2024-08-27T16:11:11.460000
|
||||
CVE-2024-8086,0,0,1db8fbbbc3b8bbc355402aca80f0447c54000b25360ca3b1fa582aada4800dfb,2024-08-27T13:17:34.187000
|
||||
CVE-2024-8087,0,0,9e47ad2dfed1c8a4045274b6d757cb5a75d1e05917b45ee6f1489b72f67b871b,2024-08-27T13:19:35.530000
|
||||
CVE-2024-8088,0,1,eefe1a1372d9b46aa5e566c2ef27254fde97726a0efc2a70dcee8d1d993663e7,2024-08-28T14:15:08.813000
|
||||
CVE-2024-8088,0,0,eefe1a1372d9b46aa5e566c2ef27254fde97726a0efc2a70dcee8d1d993663e7,2024-08-28T14:15:08.813000
|
||||
CVE-2024-8089,0,0,e6e12db9d845890df3284b8f9ed104fa7a1183d91532c3c72d090f8235aedb4e,2024-08-27T13:21:22.927000
|
||||
CVE-2024-8105,0,0,752bedc9f1c31babb6206d0feb37f4463554ca0baee90f1af7f94ac05e52579f,2024-08-27T13:02:05.683000
|
||||
CVE-2024-8112,0,0,53bc9e4fb84bb028363b46c3cb18428063770b5e5c085f93ec85e24d18222c0b,2024-08-23T16:18:28.547000
|
||||
@ -261342,7 +261358,7 @@ CVE-2024-8174,0,0,8543f0d8f92ea7727c4605df4b165224a3b6d137f11ee710b81d48c311ac7b
|
||||
CVE-2024-8181,0,0,30918501aab4364009bd3804956f0f10b449aad4949fccf3aacccef25d5db4b2,2024-08-27T15:52:01.317000
|
||||
CVE-2024-8182,0,0,d21b4ee027b5d7ffbba2e6af93024450552ec0bbbe1dfa5ea2b2ec2db0e50d89,2024-08-27T15:52:01.317000
|
||||
CVE-2024-8188,0,0,bf948f939efb55d2700c81c8fb5cefa3fc31038462bfeb7ac3e161719faca6b2,2024-08-26T20:15:08.760000
|
||||
CVE-2024-8195,1,1,690850dad9e9debe83e3b31934e05f3d048da18a5a72ab008b4259527f1aad61,2024-08-28T14:31:24.487000
|
||||
CVE-2024-8195,0,0,690850dad9e9debe83e3b31934e05f3d048da18a5a72ab008b4259527f1aad61,2024-08-28T14:31:24.487000
|
||||
CVE-2024-8197,0,0,60c1dd5a1a3c5aad3ac938fab8c46d1fa7e711c4df3249376b3e24407eb9fe54,2024-08-27T13:01:37.913000
|
||||
CVE-2024-8199,0,0,e4e155faf7982af494f6088e1ddff038dcc1d62a5700003ee5b4a40cfdce83b8,2024-08-27T18:33:14.247000
|
||||
CVE-2024-8200,0,0,d43bb5c61e83498550affa212dfef3001c48e0b48cb46337b88a2d4649830cd9,2024-08-27T18:33:14.247000
|
||||
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user