mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-21 17:41:05 +00:00
Auto-Update: 2024-06-03T12:00:38.593869+00:00
This commit is contained in:
parent
29492ebd1d
commit
65ff53e3d4
55
CVE-2023/CVE-2023-435xx/CVE-2023-43537.json
Normal file
55
CVE-2023/CVE-2023-435xx/CVE-2023-43537.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-43537",
|
||||
"sourceIdentifier": "product-security@qualcomm.com",
|
||||
"published": "2024-06-03T10:15:09.063",
|
||||
"lastModified": "2024-06-03T10:15:09.063",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Information disclosure while handling T2LM Action Frame in WLAN Host."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "product-security@qualcomm.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "product-security@qualcomm.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-126"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/june-2024-bulletin.html",
|
||||
"source": "product-security@qualcomm.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2023/CVE-2023-435xx/CVE-2023-43538.json
Normal file
55
CVE-2023/CVE-2023-435xx/CVE-2023-43538.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-43538",
|
||||
"sourceIdentifier": "product-security@qualcomm.com",
|
||||
"published": "2024-06-03T10:15:09.937",
|
||||
"lastModified": "2024-06-03T10:15:09.937",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Memory corruption in TZ Secure OS while Tunnel Invoke Manager initialization."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "product-security@qualcomm.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.3,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "product-security@qualcomm.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/june-2024-bulletin.html",
|
||||
"source": "product-security@qualcomm.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2023/CVE-2023-435xx/CVE-2023-43542.json
Normal file
55
CVE-2023/CVE-2023-435xx/CVE-2023-43542.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-43542",
|
||||
"sourceIdentifier": "product-security@qualcomm.com",
|
||||
"published": "2024-06-03T10:15:10.220",
|
||||
"lastModified": "2024-06-03T10:15:10.220",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Memory corruption while copying a keyblob`s material when the key material`s size is not accurately checked."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "product-security@qualcomm.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "product-security@qualcomm.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/june-2024-bulletin.html",
|
||||
"source": "product-security@qualcomm.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2023/CVE-2023-435xx/CVE-2023-43543.json
Normal file
55
CVE-2023/CVE-2023-435xx/CVE-2023-43543.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-43543",
|
||||
"sourceIdentifier": "product-security@qualcomm.com",
|
||||
"published": "2024-06-03T10:15:10.467",
|
||||
"lastModified": "2024-06-03T10:15:10.467",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Memory corruption in Audio during a playback or a recording due to race condition between allocation and deallocation of graph object."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "product-security@qualcomm.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "product-security@qualcomm.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/june-2024-bulletin.html",
|
||||
"source": "product-security@qualcomm.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2023/CVE-2023-435xx/CVE-2023-43544.json
Normal file
55
CVE-2023/CVE-2023-435xx/CVE-2023-43544.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-43544",
|
||||
"sourceIdentifier": "product-security@qualcomm.com",
|
||||
"published": "2024-06-03T10:15:10.700",
|
||||
"lastModified": "2024-06-03T10:15:10.700",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Memory corruption when IPC callback handle is used after it has been released during register callback by another thread."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "product-security@qualcomm.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "product-security@qualcomm.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/june-2024-bulletin.html",
|
||||
"source": "product-security@qualcomm.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2023/CVE-2023-435xx/CVE-2023-43545.json
Normal file
55
CVE-2023/CVE-2023-435xx/CVE-2023-43545.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-43545",
|
||||
"sourceIdentifier": "product-security@qualcomm.com",
|
||||
"published": "2024-06-03T10:15:10.907",
|
||||
"lastModified": "2024-06-03T10:15:10.907",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Memory corruption when more scan frequency list or channels are sent from the user space."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "product-security@qualcomm.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "product-security@qualcomm.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-190"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/june-2024-bulletin.html",
|
||||
"source": "product-security@qualcomm.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2023/CVE-2023-435xx/CVE-2023-43551.json
Normal file
55
CVE-2023/CVE-2023-435xx/CVE-2023-43551.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-43551",
|
||||
"sourceIdentifier": "product-security@qualcomm.com",
|
||||
"published": "2024-06-03T10:15:11.147",
|
||||
"lastModified": "2024-06-03T10:15:11.147",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cryptographic issue while performing attach with a LTE network, a rogue base station can skip the authentication phase and immediately send the Security Mode Command."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "product-security@qualcomm.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 9.1,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "product-security@qualcomm.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-287"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/june-2024-bulletin.html",
|
||||
"source": "product-security@qualcomm.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2023/CVE-2023-435xx/CVE-2023-43555.json
Normal file
55
CVE-2023/CVE-2023-435xx/CVE-2023-43555.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-43555",
|
||||
"sourceIdentifier": "product-security@qualcomm.com",
|
||||
"published": "2024-06-03T10:15:11.420",
|
||||
"lastModified": "2024-06-03T10:15:11.420",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Information disclosure in Video while parsing mp2 clip with invalid section length."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "product-security@qualcomm.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 8.2,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 4.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "product-security@qualcomm.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-126"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/june-2024-bulletin.html",
|
||||
"source": "product-security@qualcomm.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2023/CVE-2023-435xx/CVE-2023-43556.json
Normal file
55
CVE-2023/CVE-2023-435xx/CVE-2023-43556.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-43556",
|
||||
"sourceIdentifier": "product-security@qualcomm.com",
|
||||
"published": "2024-06-03T10:15:11.673",
|
||||
"lastModified": "2024-06-03T10:15:11.673",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Memory corruption in Hypervisor when platform information mentioned is not aligned."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "product-security@qualcomm.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.3,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "product-security@qualcomm.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/june-2024-bulletin.html",
|
||||
"source": "product-security@qualcomm.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-214xx/CVE-2024-21478.json
Normal file
55
CVE-2024/CVE-2024-214xx/CVE-2024-21478.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-21478",
|
||||
"sourceIdentifier": "product-security@qualcomm.com",
|
||||
"published": "2024-06-03T10:15:11.907",
|
||||
"lastModified": "2024-06-03T10:15:11.907",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "transient DOS when setting up a fence callback to free a KGSL memory entry object during DMA."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "product-security@qualcomm.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.2,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "product-security@qualcomm.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-704"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/june-2024-bulletin.html",
|
||||
"source": "product-security@qualcomm.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-233xx/CVE-2024-23360.json
Normal file
55
CVE-2024/CVE-2024-233xx/CVE-2024-23360.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-23360",
|
||||
"sourceIdentifier": "product-security@qualcomm.com",
|
||||
"published": "2024-06-03T10:15:12.130",
|
||||
"lastModified": "2024-06-03T10:15:12.130",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Memory corruption while creating a LPAC client as LPAC engine was allowed to access GPU registers."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "product-security@qualcomm.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.4,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "product-security@qualcomm.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/june-2024-bulletin.html",
|
||||
"source": "product-security@qualcomm.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-233xx/CVE-2024-23363.json
Normal file
55
CVE-2024/CVE-2024-233xx/CVE-2024-23363.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-23363",
|
||||
"sourceIdentifier": "product-security@qualcomm.com",
|
||||
"published": "2024-06-03T10:15:12.377",
|
||||
"lastModified": "2024-06-03T10:15:12.377",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Transient DOS while processing an improperly formatted Fine Time Measurement (FTM) management frame."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "product-security@qualcomm.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "product-security@qualcomm.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-126"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/june-2024-bulletin.html",
|
||||
"source": "product-security@qualcomm.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-236xx/CVE-2024-23664.json
Normal file
55
CVE-2024/CVE-2024-236xx/CVE-2024-23664.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-23664",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2024-06-03T10:15:12.620",
|
||||
"lastModified": "2024-06-03T10:15:12.620",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A URL redirection to untrusted site ('open redirect') in Fortinet FortiAuthenticator version 6.6.0, version 6.5.3 and below, version 6.4.9 and below may allow an attacker to to redirect users to an arbitrary website via a crafted URL."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@fortinet.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@fortinet.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-601"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-23-465",
|
||||
"source": "psirt@fortinet.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-236xx/CVE-2024-23665.json
Normal file
55
CVE-2024/CVE-2024-236xx/CVE-2024-23665.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-23665",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2024-06-03T10:15:12.870",
|
||||
"lastModified": "2024-06-03T10:15:12.870",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Multiple improper authorization vulnerabilities [CWE-285] in FortiWeb version 7.4.2 and below, version 7.2.7 and below, version 7.0.10 and below, version 6.4.3 and below, version 6.3.23 and below may allow an authenticated attacker to perform unauthorized ADOM operations via crafted requests."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@fortinet.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 4.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@fortinet.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-285"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-23-474",
|
||||
"source": "psirt@fortinet.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-236xx/CVE-2024-23667.json
Normal file
55
CVE-2024/CVE-2024-236xx/CVE-2024-23667.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-23667",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2024-06-03T10:15:13.100",
|
||||
"lastModified": "2024-06-03T10:15:13.100",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An improper authorization in Fortinet FortiWebManager version 7.2.0 and 7.0.0 through 7.0.4 and 6.3.0 and 6.2.3 through 6.2.4 and 6.0.2 allows attacker to execute unauthorized code or commands via HTTP requests or CLI."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@fortinet.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@fortinet.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-285"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-23-222",
|
||||
"source": "psirt@fortinet.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-236xx/CVE-2024-23668.json
Normal file
55
CVE-2024/CVE-2024-236xx/CVE-2024-23668.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-23668",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2024-06-03T10:15:13.320",
|
||||
"lastModified": "2024-06-03T10:15:13.320",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An improper authorization in Fortinet FortiWebManager version 7.2.0 and 7.0.0 through 7.0.4 and 6.3.0 and 6.2.3 through 6.2.4 and 6.0.2 allows attacker to execute unauthorized code or commands via HTTP requests or CLI."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@fortinet.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@fortinet.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-23-222",
|
||||
"source": "psirt@fortinet.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-236xx/CVE-2024-23670.json
Normal file
55
CVE-2024/CVE-2024-236xx/CVE-2024-23670.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-23670",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2024-06-03T10:15:13.523",
|
||||
"lastModified": "2024-06-03T10:15:13.523",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An improper authorization in Fortinet FortiWebManager version 7.2.0 and 7.0.0 through 7.0.4 and 6.3.0 and 6.2.3 through 6.2.4 and 6.0.2 allows attacker to execute unauthorized code or commands via HTTP requests or CLI."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@fortinet.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@fortinet.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-285"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-23-222",
|
||||
"source": "psirt@fortinet.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-347xx/CVE-2024-34754.json
Normal file
55
CVE-2024/CVE-2024-347xx/CVE-2024-34754.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-34754",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-06-03T11:15:08.743",
|
||||
"lastModified": "2024-06-03T11:15:08.743",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Exposure of Sensitive Information to an Unauthorized Actor vulnerability in A WP Life Contact Form Widget.This issue affects Contact Form Widget: from n/a through 1.3.9."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/new-contact-form-widget/wordpress-contact-form-widget-plugin-1-3-9-sensitive-data-exposure-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-347xx/CVE-2024-34789.json
Normal file
55
CVE-2024/CVE-2024-347xx/CVE-2024-34789.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-34789",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-06-03T11:15:09.003",
|
||||
"lastModified": "2024-06-03T11:15:09.003",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WP Hait Post Grid Elementor Addon allows Stored XSS.This issue affects Post Grid Elementor Addon: from n/a through 2.0.16."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/post-grid-elementor-addon/wordpress-post-grid-elementor-addon-plugin-2-0-16-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-347xx/CVE-2024-34790.json
Normal file
55
CVE-2024/CVE-2024-347xx/CVE-2024-34790.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-34790",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-06-03T11:15:09.233",
|
||||
"lastModified": "2024-06-03T11:15:09.233",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Hans van Eijsden,niwreg ImageMagick Sharpen Resized Images allows Stored XSS.This issue affects ImageMagick Sharpen Resized Images: from n/a through 1.1.7."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 5.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/imagemagick-sharpen-resized-images/wordpress-download-imagemagick-sharpen-resized-images-plugin-1-1-7-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-347xx/CVE-2024-34791.json
Normal file
55
CVE-2024/CVE-2024-347xx/CVE-2024-34791.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-34791",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-06-03T11:15:09.467",
|
||||
"lastModified": "2024-06-03T11:15:09.467",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in wpbean WPB Elementor Addons allows Stored XSS.This issue affects WPB Elementor Addons: from n/a through 1.0.9."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/wpb-elementor-addons/wordpress-wpb-elementor-addons-plugin-1-0-9-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-347xx/CVE-2024-34793.json
Normal file
55
CVE-2024/CVE-2024-347xx/CVE-2024-34793.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-34793",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-06-03T11:15:09.687",
|
||||
"lastModified": "2024-06-03T11:15:09.687",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Kharim Tomlinson WP Next Post Navi allows Stored XSS.This issue affects WP Next Post Navi: from n/a through 1.8.3."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 5.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/wp-next-post-navi/wordpress-wp-next-post-navi-plugin-1-8-3-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-347xx/CVE-2024-34794.json
Normal file
55
CVE-2024/CVE-2024-347xx/CVE-2024-34794.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-34794",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-06-03T11:15:09.917",
|
||||
"lastModified": "2024-06-03T11:15:09.917",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Tainacan.Org Tainacan allows Reflected XSS.This issue affects Tainacan: from n/a through 0.21.3."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/tainacan/wordpress-tainacan-plugin-0-21-3-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-347xx/CVE-2024-34795.json
Normal file
55
CVE-2024/CVE-2024-347xx/CVE-2024-34795.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-34795",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-06-03T11:15:10.133",
|
||||
"lastModified": "2024-06-03T11:15:10.133",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Tainacan.Org Tainacan allows Stored XSS.This issue affects Tainacan: from n/a through 0.21.3."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/tainacan/wordpress-tainacan-plugin-0-21-3-cross-site-scripting-xss-vulnerability-2?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-347xx/CVE-2024-34796.json
Normal file
55
CVE-2024/CVE-2024-347xx/CVE-2024-34796.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-34796",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-06-03T11:15:10.360",
|
||||
"lastModified": "2024-06-03T11:15:10.360",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in AccessAlly PopupAlly allows Stored XSS.This issue affects PopupAlly: from n/a through 2.1.1."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 5.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/popupally/wordpress-popupally-plugin-2-1-1-cross-site-scripting-xss-vulnerability-2?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-347xx/CVE-2024-34797.json
Normal file
55
CVE-2024/CVE-2024-347xx/CVE-2024-34797.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-34797",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-06-03T11:15:10.580",
|
||||
"lastModified": "2024-06-03T11:15:10.580",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Benoit Mercusot Simple Popup Manager allows Stored XSS.This issue affects Simple Popup Manager: from n/a through 1.3.5."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 5.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/simple-popup-manager/wordpress-simple-popup-manager-plugin-1-3-5-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-347xx/CVE-2024-34798.json
Normal file
55
CVE-2024/CVE-2024-347xx/CVE-2024-34798.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-34798",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-06-03T11:15:10.813",
|
||||
"lastModified": "2024-06-03T11:15:10.813",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Insertion of Sensitive Information into Log File vulnerability in Lukman Nakib Debug Log \u2013 Manger Tool.This issue affects Debug Log \u2013 Manger Tool: from n/a through 1.4.5."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-532"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/debug-log-config-tool/wordpress-debug-log-manger-tool-plugin-1-4-5-sensitive-data-exposure-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-348xx/CVE-2024-34801.json
Normal file
55
CVE-2024/CVE-2024-348xx/CVE-2024-34801.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-34801",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-06-03T11:15:11.040",
|
||||
"lastModified": "2024-06-03T11:15:11.040",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Mervin Praison Praison SEO WordPress allows Stored XSS.This issue affects Praison SEO WordPress: from n/a through 4.0.15."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/seo-wordpress/wordpress-praison-seo-wordpress-plugin-4-0-15-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-348xx/CVE-2024-34803.json
Normal file
55
CVE-2024/CVE-2024-348xx/CVE-2024-34803.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-34803",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-06-03T11:15:11.270",
|
||||
"lastModified": "2024-06-03T11:15:11.270",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Missing Authorization vulnerability in Fastly.This issue affects Fastly: from n/a through 1.2.25."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/fastly/wordpress-fastly-plugin-1-2-25-broken-access-control-vulnerability-2?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-356xx/CVE-2024-35630.json
Normal file
55
CVE-2024/CVE-2024-356xx/CVE-2024-35630.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-35630",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-06-03T11:15:11.520",
|
||||
"lastModified": "2024-06-03T11:15:11.520",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in LJ Apps WP TripAdvisor Review Slider allows Blind SQL Injection.This issue affects WP TripAdvisor Review Slider: from n/a through 12.6."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.6,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 4.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/wp-tripadvisor-review-slider/wordpress-wp-tripadvisor-review-slider-plugin-12-6-sql-injection-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-356xx/CVE-2024-35631.json
Normal file
55
CVE-2024/CVE-2024-356xx/CVE-2024-35631.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-35631",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-06-03T11:15:11.740",
|
||||
"lastModified": "2024-06-03T11:15:11.740",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Foliovision FV Flowplayer Video Player allows Reflected XSS.This issue affects FV Flowplayer Video Player: from n/a through 7.5.45.7212."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/fv-wordpress-flowplayer/wordpress-fv-flowplayer-video-player-plugin-7-5-45-7212-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-356xx/CVE-2024-35633.json
Normal file
55
CVE-2024/CVE-2024-356xx/CVE-2024-35633.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-35633",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-06-03T10:15:13.720",
|
||||
"lastModified": "2024-06-03T10:15:13.720",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Server-Side Request Forgery (SSRF) vulnerability in CreativeThemes Blocksy Companion.This issue affects Blocksy Companion: from n/a through 2.0.42."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-918"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/blocksy-companion/wordpress-blocksy-companion-plugin-2-0-42-server-side-request-forgery-ssrf-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-356xx/CVE-2024-35635.json
Normal file
55
CVE-2024/CVE-2024-356xx/CVE-2024-35635.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-35635",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-06-03T10:15:14.050",
|
||||
"lastModified": "2024-06-03T10:15:14.050",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Server-Side Request Forgery (SSRF) vulnerability in WPManageNinja LLC Ninja Tables.This issue affects Ninja Tables: from n/a through 5.0.9."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-918"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/ninja-tables/wordpress-ninja-tables-plugin-5-0-9-server-side-request-forgery-ssrf-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2024/CVE-2024-38xx/CVE-2024-3829.json
Normal file
59
CVE-2024/CVE-2024-38xx/CVE-2024-3829.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-3829",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2024-06-03T10:15:14.267",
|
||||
"lastModified": "2024-06-03T10:15:14.267",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "qdrant/qdrant version 1.9.0-dev is vulnerable to arbitrary file read and write during the snapshot recovery process. Attackers can exploit this vulnerability by manipulating snapshot files to include symlinks, leading to arbitrary file read by adding a symlink that points to a desired file on the filesystem and arbitrary file write by including a symlink and a payload file in the snapshot's directory structure. This vulnerability allows for the reading and writing of arbitrary files on the server, which could potentially lead to a full takeover of the system. The issue is fixed in version v1.9.0."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/qdrant/qdrant/commit/ee7a31ec3459a6a4219200234615c1817ab82260",
|
||||
"source": "security@huntr.dev"
|
||||
},
|
||||
{
|
||||
"url": "https://huntr.com/bounties/abd9c906-75ee-4d84-b76d-ce1386401e08",
|
||||
"source": "security@huntr.dev"
|
||||
}
|
||||
]
|
||||
}
|
@ -8,6 +8,10 @@
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An unauthenticated remote attacker\u00a0can change the admin password in a\u00a0moneo appliance due to weak password recovery mechanism.\n"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Un atacante remoto no autenticado puede cambiar la contrase\u00f1a de administrador en un dispositivo moneo debido a un mecanismo de recuperaci\u00f3n de contrase\u00f1a d\u00e9bil."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
48
README.md
48
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-06-03T10:00:37.862736+00:00
|
||||
2024-06-03T12:00:38.593869+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-06-03T09:15:10.193000+00:00
|
||||
2024-06-03T11:15:11.740000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,33 +33,45 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
252409
|
||||
252443
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `13`
|
||||
Recently added CVEs: `34`
|
||||
|
||||
- [CVE-2023-48789](CVE-2023/CVE-2023-487xx/CVE-2023-48789.json) (`2024-06-03T08:15:08.507`)
|
||||
- [CVE-2024-23107](CVE-2024/CVE-2024-231xx/CVE-2024-23107.json) (`2024-06-03T08:15:08.837`)
|
||||
- [CVE-2024-31493](CVE-2024/CVE-2024-314xx/CVE-2024-31493.json) (`2024-06-03T08:15:09.097`)
|
||||
- [CVE-2024-35637](CVE-2024/CVE-2024-356xx/CVE-2024-35637.json) (`2024-06-03T09:15:09.390`)
|
||||
- [CVE-2024-35638](CVE-2024/CVE-2024-356xx/CVE-2024-35638.json) (`2024-06-03T09:15:09.703`)
|
||||
- [CVE-2024-35639](CVE-2024/CVE-2024-356xx/CVE-2024-35639.json) (`2024-06-03T09:15:09.947`)
|
||||
- [CVE-2024-35640](CVE-2024/CVE-2024-356xx/CVE-2024-35640.json) (`2024-06-03T08:15:09.330`)
|
||||
- [CVE-2024-36960](CVE-2024/CVE-2024-369xx/CVE-2024-36960.json) (`2024-06-03T08:15:09.557`)
|
||||
- [CVE-2024-36961](CVE-2024/CVE-2024-369xx/CVE-2024-36961.json) (`2024-06-03T08:15:09.660`)
|
||||
- [CVE-2024-36962](CVE-2024/CVE-2024-369xx/CVE-2024-36962.json) (`2024-06-03T08:15:09.740`)
|
||||
- [CVE-2024-36963](CVE-2024/CVE-2024-369xx/CVE-2024-36963.json) (`2024-06-03T08:15:09.820`)
|
||||
- [CVE-2024-36964](CVE-2024/CVE-2024-369xx/CVE-2024-36964.json) (`2024-06-03T08:15:09.903`)
|
||||
- [CVE-2024-5404](CVE-2024/CVE-2024-54xx/CVE-2024-5404.json) (`2024-06-03T09:15:10.193`)
|
||||
- [CVE-2024-21478](CVE-2024/CVE-2024-214xx/CVE-2024-21478.json) (`2024-06-03T10:15:11.907`)
|
||||
- [CVE-2024-23360](CVE-2024/CVE-2024-233xx/CVE-2024-23360.json) (`2024-06-03T10:15:12.130`)
|
||||
- [CVE-2024-23363](CVE-2024/CVE-2024-233xx/CVE-2024-23363.json) (`2024-06-03T10:15:12.377`)
|
||||
- [CVE-2024-23664](CVE-2024/CVE-2024-236xx/CVE-2024-23664.json) (`2024-06-03T10:15:12.620`)
|
||||
- [CVE-2024-23665](CVE-2024/CVE-2024-236xx/CVE-2024-23665.json) (`2024-06-03T10:15:12.870`)
|
||||
- [CVE-2024-23667](CVE-2024/CVE-2024-236xx/CVE-2024-23667.json) (`2024-06-03T10:15:13.100`)
|
||||
- [CVE-2024-23668](CVE-2024/CVE-2024-236xx/CVE-2024-23668.json) (`2024-06-03T10:15:13.320`)
|
||||
- [CVE-2024-23670](CVE-2024/CVE-2024-236xx/CVE-2024-23670.json) (`2024-06-03T10:15:13.523`)
|
||||
- [CVE-2024-34754](CVE-2024/CVE-2024-347xx/CVE-2024-34754.json) (`2024-06-03T11:15:08.743`)
|
||||
- [CVE-2024-34789](CVE-2024/CVE-2024-347xx/CVE-2024-34789.json) (`2024-06-03T11:15:09.003`)
|
||||
- [CVE-2024-34790](CVE-2024/CVE-2024-347xx/CVE-2024-34790.json) (`2024-06-03T11:15:09.233`)
|
||||
- [CVE-2024-34791](CVE-2024/CVE-2024-347xx/CVE-2024-34791.json) (`2024-06-03T11:15:09.467`)
|
||||
- [CVE-2024-34793](CVE-2024/CVE-2024-347xx/CVE-2024-34793.json) (`2024-06-03T11:15:09.687`)
|
||||
- [CVE-2024-34794](CVE-2024/CVE-2024-347xx/CVE-2024-34794.json) (`2024-06-03T11:15:09.917`)
|
||||
- [CVE-2024-34795](CVE-2024/CVE-2024-347xx/CVE-2024-34795.json) (`2024-06-03T11:15:10.133`)
|
||||
- [CVE-2024-34796](CVE-2024/CVE-2024-347xx/CVE-2024-34796.json) (`2024-06-03T11:15:10.360`)
|
||||
- [CVE-2024-34797](CVE-2024/CVE-2024-347xx/CVE-2024-34797.json) (`2024-06-03T11:15:10.580`)
|
||||
- [CVE-2024-34798](CVE-2024/CVE-2024-347xx/CVE-2024-34798.json) (`2024-06-03T11:15:10.813`)
|
||||
- [CVE-2024-34801](CVE-2024/CVE-2024-348xx/CVE-2024-34801.json) (`2024-06-03T11:15:11.040`)
|
||||
- [CVE-2024-34803](CVE-2024/CVE-2024-348xx/CVE-2024-34803.json) (`2024-06-03T11:15:11.270`)
|
||||
- [CVE-2024-35630](CVE-2024/CVE-2024-356xx/CVE-2024-35630.json) (`2024-06-03T11:15:11.520`)
|
||||
- [CVE-2024-35631](CVE-2024/CVE-2024-356xx/CVE-2024-35631.json) (`2024-06-03T11:15:11.740`)
|
||||
- [CVE-2024-35633](CVE-2024/CVE-2024-356xx/CVE-2024-35633.json) (`2024-06-03T10:15:13.720`)
|
||||
- [CVE-2024-35635](CVE-2024/CVE-2024-356xx/CVE-2024-35635.json) (`2024-06-03T10:15:14.050`)
|
||||
- [CVE-2024-3829](CVE-2024/CVE-2024-38xx/CVE-2024-3829.json) (`2024-06-03T10:15:14.267`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `1`
|
||||
|
||||
- [CVE-2024-5311](CVE-2024/CVE-2024-53xx/CVE-2024-5311.json) (`2024-06-03T07:15:10.163`)
|
||||
- [CVE-2024-5404](CVE-2024/CVE-2024-54xx/CVE-2024-5404.json) (`2024-06-03T09:15:10.193`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
62
_state.csv
62
_state.csv
@ -232067,18 +232067,27 @@ CVE-2023-43533,0,0,cec1346ee365b50af03fb7e0ce641c9f914a9a51fe3e4e72d4a1c1a0cbf8c
|
||||
CVE-2023-43534,0,0,dba7439cea4cfc2b29f72af250575fb4036c5493c63694f3d269d919ecc92250,2024-04-12T16:15:35.230000
|
||||
CVE-2023-43535,0,0,e1269d8d312a2ceaa4b0553616412d9d494e38e4a6f1965a466dad52b8ea60f6,2024-04-12T16:15:35.560000
|
||||
CVE-2023-43536,0,0,76e2708fa3e9111d6523fd70d0293d879b927b408b44f21ef24c6fb42c1f6097,2024-04-12T16:15:35.820000
|
||||
CVE-2023-43537,1,1,1e51cbaadb4db61c51a04b49147eb517e1d05c253892920587cccccbdea42475,2024-06-03T10:15:09.063000
|
||||
CVE-2023-43538,1,1,7efd06eefef8a0ae3dc4431e092e96470a555317fa943b6556de5331cda560e8,2024-06-03T10:15:09.937000
|
||||
CVE-2023-43539,0,0,a0d10ac25ff0d0f37bc7234eb89facc9efab87ef1fcabd6c86ec9bbddc79c96c,2024-04-12T15:15:21.433000
|
||||
CVE-2023-4354,0,0,b3a04d1006e2f4eb94ee005944358fcae0c2bb0f216ffa6497c71e2291933a60,2024-01-31T17:15:14.710000
|
||||
CVE-2023-43540,0,0,efd650e6595c39c8362f88b761fdae11642adf9b9bde5b2fe188649abb18f8e1,2024-04-12T15:15:21.530000
|
||||
CVE-2023-43541,0,0,dfd1eb041ceb949b871d4f726bdc740a09a5ddb58d3ab0fafb1e00d5a19881d9,2024-04-12T15:15:21.620000
|
||||
CVE-2023-43542,1,1,2241cd6b97d978010e5cc33b5d5efcadb49989ec603305757a8cf384b9888e5a,2024-06-03T10:15:10.220000
|
||||
CVE-2023-43543,1,1,3f18f59589c3c54ba389cca8e8a40a8684d0aac7c81e50f686a026025fd43b89,2024-06-03T10:15:10.467000
|
||||
CVE-2023-43544,1,1,a10b94476746a2b405891b3e8f7bf4692399157f962f6383603ebe3b3840a6ad,2024-06-03T10:15:10.700000
|
||||
CVE-2023-43545,1,1,dbbc8faca15dc2c1118283e9db3106032cc58c2467ff147307803df401dedaa9,2024-06-03T10:15:10.907000
|
||||
CVE-2023-43546,0,0,89e5afff2dc3b88b31894eab3ce43642da3b283fc6cb7d2e88a199d429ebcad3,2024-04-12T15:15:21.713000
|
||||
CVE-2023-43547,0,0,450a59a4b4e1770738d3c56ace390dc05069b1396f6d86001db3ed0a662fe9c5,2024-04-12T15:15:21.810000
|
||||
CVE-2023-43548,0,0,08de2551449157c1420de1efb291b07e659743dfd8e0661fd70a491331034253,2024-04-12T15:15:21.907000
|
||||
CVE-2023-43549,0,0,f1de5fa849a4658fa863c5a64278b564558b0de4b9f2143d5edf8ce7fec403b4,2024-04-12T15:15:22.003000
|
||||
CVE-2023-4355,0,0,c361aa021bb0626a0e307b5cf33dd51fde9986638cf0f3a141e01925b83f1585,2024-01-31T17:15:14.840000
|
||||
CVE-2023-43550,0,0,1355e44b0bdef7fc02eec66c7d8c4c8822fa31e3406d0ce44b05faf4ddcb0384,2024-04-12T15:15:22.110000
|
||||
CVE-2023-43551,1,1,8189c89b3908130b9d13005d0d874bbcd3f8ede7ba2818c6f346aa0df6e68155,2024-06-03T10:15:11.147000
|
||||
CVE-2023-43552,0,0,219a820f0d74d0eccbb21dd32fa4737b1fbff83065edd3c67c682afa52aaf7a9,2024-04-12T15:15:22.210000
|
||||
CVE-2023-43553,0,0,3824e0ea8ed5ad8dde20da11270e38123e4d2d966d89aa1a0e668fc6b193a630,2024-04-12T15:15:22.310000
|
||||
CVE-2023-43555,1,1,242eeb2fd5c965c2fd5393936cc73afa54815744d6510c886d351ef16ac0441e,2024-06-03T10:15:11.420000
|
||||
CVE-2023-43556,1,1,c8ad3699c541fdfeb7ce585844fcacf6cae91cc37b184913313012644c269d41,2024-06-03T10:15:11.673000
|
||||
CVE-2023-4356,0,0,51f331be3605818c8ee40c6a87e55b57af1424a9aa9525f64ed6c38dd6cd0ef5,2024-01-31T17:15:14.917000
|
||||
CVE-2023-43566,0,0,efdf21754c3a0ae7401b084dc8cb36a979c1eb2760f721e694f6e12bacd4880b,2023-09-21T20:01:48.277000
|
||||
CVE-2023-43567,0,0,9c0ac93c4f06b0c8e85604350b7bccc39b0ec28259b140e4614d9cc5a5c35bf7,2023-11-16T14:27:01.117000
|
||||
@ -235698,7 +235707,7 @@ CVE-2023-48782,0,0,88145c135f3d36dc2324e589083cb79dceef7bf357c73c33782a57f9910e4
|
||||
CVE-2023-48783,0,0,ebc0e9b096de11f5bb2feb6ecedfda87f1114290b6bb005e0f4f19fb8a6d2ef6,2024-01-17T18:24:38.617000
|
||||
CVE-2023-48784,0,0,2c8c9b5cd73fccd6bf717ce3db3d03b76214161101a0e621003f928d07a57cf5,2024-04-17T12:15:07.353000
|
||||
CVE-2023-48788,0,0,a76225488769211eb3f82baf06e8c2fdae1734ff7e897a76c118d8a783dbc141,2024-05-23T18:00:08.207000
|
||||
CVE-2023-48789,1,1,0571bd4a37f3c97e6d8e9b10601719eec33455abb7eb3af2a2662d718dd67176,2024-06-03T08:15:08.507000
|
||||
CVE-2023-48789,0,0,0571bd4a37f3c97e6d8e9b10601719eec33455abb7eb3af2a2662d718dd67176,2024-06-03T08:15:08.507000
|
||||
CVE-2023-4879,0,0,8ff2f4fac231edfb0e8e6c6042e670dbdf0da9230931b634f3b1ed60cbdab258,2023-09-18T18:58:43.767000
|
||||
CVE-2023-48791,0,0,4e7d2cae3ad6ba11c4e276624bedca77887a0ee315b409ddadb10bd81db3bb45,2023-12-15T20:09:24.010000
|
||||
CVE-2023-48792,0,0,a3c17617afe01ace18242f14c2f591f70a09281fccef1129ab04ab7743ac5ed0,2024-02-09T19:41:33.093000
|
||||
@ -242707,6 +242716,7 @@ CVE-2024-21474,0,0,f2a0bb0689e81550825d1ea2ff18872b7ed9732f71b1df2a783fa00cbbba9
|
||||
CVE-2024-21475,0,0,08ca02671a08696ba0c7516ccba2f78b5a25c25f05d4d934fd4396db32490a97,2024-05-06T16:00:59.253000
|
||||
CVE-2024-21476,0,0,f7f3a41ab53efd1329a1fcafe8a5c0bf5a6daefaebcf82c3ccffee4519748663,2024-05-06T16:00:59.253000
|
||||
CVE-2024-21477,0,0,2dfc1d466e14269455d623dbe436a1e6d9dccf3c01b4aaeec3bd9b9f104b4ac3,2024-05-06T16:00:59.253000
|
||||
CVE-2024-21478,1,1,8f23a8cef733da9e745bc6f343469dcb38f73d49eb0921f3eacf7ed7e631023e,2024-06-03T10:15:11.907000
|
||||
CVE-2024-2148,0,0,f9ad2f00527f5c10697ce47ba63c57e584aab0240fc88e91a15c3572a9aa5790,2024-05-17T02:38:04.387000
|
||||
CVE-2024-21480,0,0,8440778e45413c0e24db83877880d3ede6fda18ff0fea3fa59c66be00cec51d0,2024-05-06T16:00:59.253000
|
||||
CVE-2024-21483,0,0,9151aea81f4a61f57a2b42ef8dafe022eeea7af379bf181ee6a30f8665567492,2024-03-12T12:40:13.500000
|
||||
@ -243587,7 +243597,7 @@ CVE-2024-2309,0,0,5e7d16d6f71f2f007544bcbcc47dd8107c18e2714e36b52143e4572bbdc634
|
||||
CVE-2024-23094,0,0,8b7fd2c37601b9f636934db44ed8e567ef20eff4d921df465afdbb6ef925a041,2024-02-22T19:07:27.197000
|
||||
CVE-2024-2310,0,0,0edce614ca737c9f4f6f172b9fca4020b1a932854b13e864a7ef93ffce2dc5e8,2024-04-26T12:58:17.720000
|
||||
CVE-2024-23105,0,0,4f4ecfc1737be07823bcaafc96e8879d6b5c3ae1db58c428ada8e62f19153579,2024-05-23T15:52:39.123000
|
||||
CVE-2024-23107,1,1,f95c78068a77be131b17b383b5dedbee5d41921bd626de291cf3de54dc105567,2024-06-03T08:15:08.837000
|
||||
CVE-2024-23107,0,0,f95c78068a77be131b17b383b5dedbee5d41921bd626de291cf3de54dc105567,2024-06-03T08:15:08.837000
|
||||
CVE-2024-23108,0,0,4bd66ae4e2150cd9c3073e095bacf489de77af9a273b611e130c3e3fa4edf7ea,2024-02-07T15:02:00.203000
|
||||
CVE-2024-23109,0,0,c2686a38cd2651bfef8ab0e98ee0dbcce98e98fd7c1f1805290cb9df9c03fe78,2024-02-07T15:04:28.237000
|
||||
CVE-2024-2311,0,0,738ffcbe7f411809b0dd04835f3243a6f3350cd455230e0887015d402141b408,2024-04-10T13:23:38.787000
|
||||
@ -243794,6 +243804,8 @@ CVE-2024-2335,0,0,efe1e2a5a88779dcaa56517f16fc8862179b5ee96c6455caf55add5931f2e1
|
||||
CVE-2024-23351,0,0,55afa2a1096cf0aa167ae828427ca9b1e7daf36842c51c8fe0621b3f0ec14617,2024-05-06T16:00:59.253000
|
||||
CVE-2024-23354,0,0,524905b4df533efbcae0403dea5cdcdf4f507ec96e09f870f5c27c0b03f65fe6,2024-05-06T16:00:59.253000
|
||||
CVE-2024-2336,0,0,858071e914ebaea9fbe161c5ef8e540e29b84f9d635c439141db287421da0568,2024-04-10T13:23:38.787000
|
||||
CVE-2024-23360,1,1,f4d7ebb62940d9b72d8217b342fc2cced03dc772827b2c8f674afdd4c3507cbf,2024-06-03T10:15:12.130000
|
||||
CVE-2024-23363,1,1,cb81ab11c9be5032cf51438c8bb838acdabdbdf9d75fbd6f58c3f689a12af21a,2024-06-03T10:15:12.377000
|
||||
CVE-2024-2338,0,0,2d543a556e65d2c959c15e10c3e9a74031d18693370229ae5e1770e5ef380b4c,2024-03-08T21:19:43.127000
|
||||
CVE-2024-23387,0,0,651b9110a70ec6d8150b78d412ab0c449da5b24d5059a74c85bc0d06b6759568,2024-01-25T02:00:29.210000
|
||||
CVE-2024-23388,0,0,d9ef291f69bac73e9b23ebc37df19469f57319d5ff49c901cd1cd709d40899ff,2024-02-05T15:18:21.920000
|
||||
@ -243959,6 +243971,11 @@ CVE-2024-23659,0,0,236290b059375e8b7040b3505591889202adcca1fe58c9cff8e0844cbcf32
|
||||
CVE-2024-2366,0,0,561eca4f7d46892009230ef936eca60ce1d593865f21bb5667643256074aa468,2024-05-16T13:03:05.353000
|
||||
CVE-2024-23660,0,0,1b2c29c1f9877409e81cc31263cb621728177876460bb697b8348507998614a6,2024-02-15T16:01:29.370000
|
||||
CVE-2024-23662,0,0,878b23e10c46382d5166f21a5ce8b15ca491a34151aa70377e6758a415cbb56d,2024-04-10T13:24:22.187000
|
||||
CVE-2024-23664,1,1,8d13f5909d1e04bfe76cf46330cbbcfd5a4af39ba418f383f73a06f325faf92d,2024-06-03T10:15:12.620000
|
||||
CVE-2024-23665,1,1,fce25590082d66baca226d442317a35953cf3b4cc205d6acdf98115c98799274,2024-06-03T10:15:12.870000
|
||||
CVE-2024-23667,1,1,94a6dbe54c65e75f8fb555e6711753fed006ebd88cbbc6984c1189cb31f1ec8f,2024-06-03T10:15:13.100000
|
||||
CVE-2024-23668,1,1,4fec4864cea612333f7d910f8fefddcc9af0defe95285c4ca6a47c3696cc11fe,2024-06-03T10:15:13.320000
|
||||
CVE-2024-23670,1,1,402f6750bcbc5d007fc1f77fcfb835cf819ac6b21f9a302b79af91b4b28ce95d,2024-06-03T10:15:13.523000
|
||||
CVE-2024-23671,0,0,108c61a6aa74a9b71687a2e3aa153a422c4a0c3adcd258415c5b065e1ef21ae7,2024-04-10T13:24:22.187000
|
||||
CVE-2024-23672,0,0,ecf21cf6fef0fb9a72fe820ee02e2854b5a2d1575ce42cd766c4a52761cff3de,2024-05-01T18:15:14.357000
|
||||
CVE-2024-23673,0,0,11a42dc617628e4138314e2a3d8d0f02b60cec9315a80bc3284ec5f1547fd09f,2024-02-14T00:26:41.517000
|
||||
@ -248821,7 +248838,7 @@ CVE-2024-31487,0,0,ffef7fcdc05bb476a1f2c02c71de4a76075ea7f0301d6a8889db629ce9b19
|
||||
CVE-2024-31488,0,0,8fd4ea2d7a10d03e6cc8df9fdf21315abd98246cc112d9626a2dc74747d004e0,2024-05-14T19:17:55.627000
|
||||
CVE-2024-31491,0,0,5f002356f8390a8ec883fdc05cbd199fbc913871302dee308e6ee0aa04c7ac67,2024-05-14T19:17:55.627000
|
||||
CVE-2024-31492,0,0,a251126d380ad734bdcae40155276c0c8cd0f78c057d6c232814179759c90bf9,2024-04-10T19:49:51.183000
|
||||
CVE-2024-31493,1,1,eb92f9f4c4feadf3b90c327ee2008f971dfc30631ea4767017e0b0d47be4af71,2024-06-03T08:15:09.097000
|
||||
CVE-2024-31493,0,0,eb92f9f4c4feadf3b90c327ee2008f971dfc30631ea4767017e0b0d47be4af71,2024-06-03T08:15:09.097000
|
||||
CVE-2024-31497,0,0,4e1eafb2dcb4144981ef085a5b8158282c3a0977a083d73fc04d3f981acbd1e7,2024-05-10T14:33:55.323000
|
||||
CVE-2024-31498,0,0,db3c4e2337e3fccc66e084ef6016d8532925f451bef4124b0c2782f0c54d90b6,2024-04-08T00:15:08
|
||||
CVE-2024-31502,0,0,52fc3984aab146fd5296bbc2584fa31ec06529d852df83c020a3abdb54510354,2024-04-29T12:42:03.667000
|
||||
@ -250494,6 +250511,7 @@ CVE-2024-34749,0,0,a26a9cdaa6b9cdd859ea0f8895bc1e27a45773d0dd4321619e9dcf295b3f2
|
||||
CVE-2024-3475,0,0,e528ec7d5c8727ea0d98d659186b040308d5844df7467319e5b573505cdc6e7c,2024-05-02T13:27:25.103000
|
||||
CVE-2024-34751,0,0,3bc824c76b005bef3c5502f774f511888cffc942b3953fc4e78f3f0d8ad9e615,2024-05-17T18:36:31.297000
|
||||
CVE-2024-34752,0,0,242ab90c6a96e91b737168caac935dedcfed36964913472cce8df4bff8adef50,2024-05-17T18:36:05.263000
|
||||
CVE-2024-34754,1,1,9d58b9d4cf84f7418dbd746b56c4062b86032da2cb5552e8ea4fc0d14e34509b,2024-06-03T11:15:08.743000
|
||||
CVE-2024-34755,0,0,d9d093e244bdb9881814a581fcf0cceddc50257ae74dd4a27a2c1f59b6cdc217,2024-05-17T18:35:35.070000
|
||||
CVE-2024-34756,0,0,c1f51cb5304487e29b0a4c8a67e9d115a4f2b56ac322e60a8774a285c457e7c0,2024-05-17T18:35:35.070000
|
||||
CVE-2024-34757,0,0,57042a3bb13f31e69b5b7fd23a19541f4fa2fb8db07ba9037fc775417523a9d1,2024-05-17T18:36:05.263000
|
||||
@ -250504,8 +250522,19 @@ CVE-2024-34771,0,0,deaa281b48d1539fc4d88a99f2c542da7d2f97b319dd410ab53213b70ec8b
|
||||
CVE-2024-34772,0,0,635f5a0bcdcc084928ed60d40a3f5691181a54a2efa05b50e13ad7462247110c,2024-05-14T19:17:55.627000
|
||||
CVE-2024-34773,0,0,8d4786b71411a201832db647dece110e046d5ed6169dce1446e93616263bacee,2024-05-14T19:17:55.627000
|
||||
CVE-2024-3478,0,0,ae882595ac6fe06ab517c1e505d55eeeed4b5c0450cbd6b83825ab78d9e88f1e,2024-05-02T13:27:25.103000
|
||||
CVE-2024-34789,1,1,3cd55374ddb45727555a4ddc1e9ad766353350411961927b16c82b2a4be3dee3,2024-06-03T11:15:09.003000
|
||||
CVE-2024-3479,0,0,fd58a9eee7829eb22d6cfb17d87e6b7652b13a6666535069e70c5a2768e8dce6,2024-05-03T15:32:19.637000
|
||||
CVE-2024-34790,1,1,1a5b8cee6aa93ad10ba303666024e363953d81c8116b01a1921ab0986e5235bc,2024-06-03T11:15:09.233000
|
||||
CVE-2024-34791,1,1,63a167b6d65428b715bdce7830adbd5f9dda5b5651667d6a0e8be0e00a3b3049,2024-06-03T11:15:09.467000
|
||||
CVE-2024-34793,1,1,483b50b8734b95527b8ec11dcfbaa161ab6a0bd04df0a0d4291542559e572729,2024-06-03T11:15:09.687000
|
||||
CVE-2024-34794,1,1,0fcea07d90a264c294804f910b6665efeed9385e5e6d56e31aace0afd80a626f,2024-06-03T11:15:09.917000
|
||||
CVE-2024-34795,1,1,91c02cf1e7eeb8503093139ca6f3dd4b5cf591a85079d787fe17433b511dba1f,2024-06-03T11:15:10.133000
|
||||
CVE-2024-34796,1,1,7b63d24ad2f15c716a204e2f40ba9d35a88899031da8a8b5ad2feece0a7da066,2024-06-03T11:15:10.360000
|
||||
CVE-2024-34797,1,1,5bb1f3ddf9562d7678b22979eec373c838cdffa4417e576318c8b9ceb77a0b66,2024-06-03T11:15:10.580000
|
||||
CVE-2024-34798,1,1,55a30b7aba14ebe802fee14a3141374d5bfd8987e086cdcb9c3412887a74ed08,2024-06-03T11:15:10.813000
|
||||
CVE-2024-3480,0,0,efd268116762f9a268444b69dedc6b75682706697867d3d93c2c71f376810267,2024-05-03T15:32:19.637000
|
||||
CVE-2024-34801,1,1,5c05e9df68c6a2706d41abfa0924db6473ada533efd49d9bc853a3238dd441f6,2024-06-03T11:15:11.040000
|
||||
CVE-2024-34803,1,1,e941f12dd43c66f0a30013889c22ee9ae6cb29ead6e0b509b8f398783df82990,2024-06-03T11:15:11.270000
|
||||
CVE-2024-34805,0,0,4db06c40a60d0ea9fc68ae0b74b3d16b7df09b33205e3b40409d2383df796279,2024-05-17T18:36:31.297000
|
||||
CVE-2024-34806,0,0,3b1b6563ba887546de6e8afcda84fbe0c4e88d6cd4a9afa2164171d94fd3a99a,2024-05-17T18:35:35.070000
|
||||
CVE-2024-34807,0,0,1b210e8fbd98db6886fdf7153f61122f9d59a5653f7e82ad43004bb026f58b60,2024-05-17T18:35:35.070000
|
||||
@ -250798,12 +250827,16 @@ CVE-2024-3560,0,0,66c1a96b1f1d19ab8c2a91f30bb939a8ccde028ecd6951f27029cb1628de4d
|
||||
CVE-2024-35618,0,0,fc2572e9e8823eb6313bf2bb54c527fc11c4117d0d0837dc8f8794515acd3b77,2024-05-24T18:09:20.027000
|
||||
CVE-2024-35621,0,0,eff37f6109cc46dfb019de6bac1c1e4ffe46087d96bb684a690c4e1a8342c7d1,2024-05-28T17:11:47.007000
|
||||
CVE-2024-35627,0,0,152f6a140367536a1e62d9a33b0213a3c0edb39ccbba33db112f0915411e954b,2024-05-24T01:15:30.977000
|
||||
CVE-2024-35630,1,1,89264cd1a4afa71b588d04af1510e9f5fa30a567bc8836139f915a641c8706ca,2024-06-03T11:15:11.520000
|
||||
CVE-2024-35631,1,1,7cbcaa0d94470af5584922933479b84fa5109af34d8b31d9b44346e9e0480e51,2024-06-03T11:15:11.740000
|
||||
CVE-2024-35633,1,1,d1b53e557a63ad400682b1f460ac520a7a728625610b8f88b299e9e3a666395f,2024-06-03T10:15:13.720000
|
||||
CVE-2024-35635,1,1,a6648ac54f661e5b4a9c3c92e46de6c4e3ce5718e4b099218271b0d9ff75cc45,2024-06-03T10:15:14.050000
|
||||
CVE-2024-35636,0,0,50355c13300a6ac082e1c483b1ab0ef66d8d81a837d0b58fd86ac7bbb9fe7982,2024-06-01T09:15:08.983000
|
||||
CVE-2024-35637,1,1,a3bbaca3340add97b05922e5f3b6c323a82a11ee28efa6dacd9faac985e017af,2024-06-03T09:15:09.390000
|
||||
CVE-2024-35638,1,1,d40f8eb039698819fa66f21f9769dac9687415417efb672407b31b270ecc7aa0,2024-06-03T09:15:09.703000
|
||||
CVE-2024-35639,1,1,a9f6ceacf0b15e8d73d02a0e44ba7f868caccb9abf6430e27ee988ea745ef246,2024-06-03T09:15:09.947000
|
||||
CVE-2024-35637,0,0,a3bbaca3340add97b05922e5f3b6c323a82a11ee28efa6dacd9faac985e017af,2024-06-03T09:15:09.390000
|
||||
CVE-2024-35638,0,0,d40f8eb039698819fa66f21f9769dac9687415417efb672407b31b270ecc7aa0,2024-06-03T09:15:09.703000
|
||||
CVE-2024-35639,0,0,a9f6ceacf0b15e8d73d02a0e44ba7f868caccb9abf6430e27ee988ea745ef246,2024-06-03T09:15:09.947000
|
||||
CVE-2024-3564,0,0,126b0ad745c05ac2b6e0879d574d7c57b3c5395a16548c8e712a48ce4bee21ab,2024-06-01T04:15:08.743000
|
||||
CVE-2024-35640,1,1,358aecfa6522bfb60c0852d09cc5e4f8adc292000e1c5dc1db7c810f50935a8d,2024-06-03T08:15:09.330000
|
||||
CVE-2024-35640,0,0,358aecfa6522bfb60c0852d09cc5e4f8adc292000e1c5dc1db7c810f50935a8d,2024-06-03T08:15:09.330000
|
||||
CVE-2024-35641,0,0,ad916927f4dc66b26e37a696884d9ea1315a0f444182d47bd127409ab7975d3a,2024-06-03T07:15:09.100000
|
||||
CVE-2024-35642,0,0,5f0cf1abc8073c52dfacad8fd9b2a937ae549d5addf8a17283021c02e90c70af,2024-06-03T07:15:09.560000
|
||||
CVE-2024-35643,0,0,c2e75a738c426c54e453512f0b08e3b439606dd23983e8834340678e0539f0e2,2024-06-03T07:15:09.850000
|
||||
@ -251304,11 +251337,11 @@ CVE-2024-36957,0,0,14a25382151b1945f300cd0f690fdd6ed21995daebf481bf33bcbc3cfcf88
|
||||
CVE-2024-36958,0,0,27ba702862686ffcbfc7435dcc4011c841c4be08d6d6bff774be51941829ca30,2024-05-30T18:18:58.870000
|
||||
CVE-2024-36959,0,0,d6bbacbe3376b8ea605862991764d4131cc35403035f548e6498def7a4bbd69c,2024-05-30T18:18:58.870000
|
||||
CVE-2024-3696,0,0,54c8c42492f1c31e1d0d081b12ae9fb101d447905039b557dcc4372130239b90,2024-05-17T02:40:04.613000
|
||||
CVE-2024-36960,1,1,acf3c6f441eac5469a9c25fd1ebfdd6f1cf461c1d844318f9c119d13aa112a81,2024-06-03T08:15:09.557000
|
||||
CVE-2024-36961,1,1,f6fb90cc986c6069fd23d1d9888817e08e921f71b08213bf2b70aa68a6c4297d,2024-06-03T08:15:09.660000
|
||||
CVE-2024-36962,1,1,0786e9d15d91a5bfc2f5fd63a100e44f0f095cc32cc0a7e91d3e96757091e975,2024-06-03T08:15:09.740000
|
||||
CVE-2024-36963,1,1,6783d7e9cad5d6855f4047fc4da40186696c7d06fdbfcf7e02f88b8f9412d9ad,2024-06-03T08:15:09.820000
|
||||
CVE-2024-36964,1,1,ab7328b637a6af08291107a29c8eba501cdb343a15c8c594a58247f3b8e08077,2024-06-03T08:15:09.903000
|
||||
CVE-2024-36960,0,0,acf3c6f441eac5469a9c25fd1ebfdd6f1cf461c1d844318f9c119d13aa112a81,2024-06-03T08:15:09.557000
|
||||
CVE-2024-36961,0,0,f6fb90cc986c6069fd23d1d9888817e08e921f71b08213bf2b70aa68a6c4297d,2024-06-03T08:15:09.660000
|
||||
CVE-2024-36962,0,0,0786e9d15d91a5bfc2f5fd63a100e44f0f095cc32cc0a7e91d3e96757091e975,2024-06-03T08:15:09.740000
|
||||
CVE-2024-36963,0,0,6783d7e9cad5d6855f4047fc4da40186696c7d06fdbfcf7e02f88b8f9412d9ad,2024-06-03T08:15:09.820000
|
||||
CVE-2024-36964,0,0,ab7328b637a6af08291107a29c8eba501cdb343a15c8c594a58247f3b8e08077,2024-06-03T08:15:09.903000
|
||||
CVE-2024-3697,0,0,cc8cf5a7af305c88ebdfa6655aacb4fa5ec406664965d679a29a0cbf17ffb930,2024-05-17T02:40:04.710000
|
||||
CVE-2024-3698,0,0,13b4029eb6179dbe788598788e16556a1995d850ddfc4af1ee0c4e86961a3a21,2024-05-17T02:40:04.800000
|
||||
CVE-2024-3701,0,0,d78f52a76181001272debccb095fb5971bb478ebc111313d9ff2994f4ec0598f,2024-04-15T13:15:31.997000
|
||||
@ -251419,6 +251452,7 @@ CVE-2024-3823,0,0,cd28ea160a68276fdd70271b0ec926d19fdc3598e922bafa9bf05d9fdd41ea
|
||||
CVE-2024-3824,0,0,8545575d3e734e1433cd4d7c91c77cd29907e6f5ee87d4739239efdf13c20f26,2024-05-15T16:40:19.330000
|
||||
CVE-2024-3825,0,0,f398f78dcc905612b8b1fff020bcc62d405b80ffdf3a9053d9f90f163c40baa7,2024-04-17T15:31:50.160000
|
||||
CVE-2024-3828,0,0,57a9b409ca1cac39bc20af9eb7a4e7dcc3bae1882e9b3a8ca25cdf22dad097ef,2024-05-14T16:11:39.510000
|
||||
CVE-2024-3829,1,1,119f47ebf6538814f476e14f1daa8260cc404e5b9a6cfc3dc44621c320ff0d3e,2024-06-03T10:15:14.267000
|
||||
CVE-2024-3831,0,0,28fa4e2fb2524144138a610966fa5501c7b19e1083bb04e4062bd6679bbd2a31,2024-05-14T16:11:39.510000
|
||||
CVE-2024-3832,0,0,1075b96952121645fbb81b228e0c3813e39db7e21c4c9aa1fc24c30b61618c13,2024-04-23T18:15:15.187000
|
||||
CVE-2024-3833,0,0,ba630503495cf2aaf1fce7ce704a30930ed35eb1665a53e19102e8c18f607a36,2024-05-03T03:16:28.940000
|
||||
@ -252300,7 +252334,7 @@ CVE-2024-5297,0,0,00a87902d7cb688c5f453a52360105eb024acff7ed2743a841cec085f6c70d
|
||||
CVE-2024-5298,0,0,06eb32cfed51faae03040e262c135cd2456565f192a3fa9c39d1028a133d926f,2024-05-24T01:15:30.977000
|
||||
CVE-2024-5299,0,0,ae65325eb08b6dc79f15a33a7800bb0b9af221d170dea70dbcb229fe698b5075,2024-05-24T01:15:30.977000
|
||||
CVE-2024-5310,0,0,aff5601be87ae3c08dc3ce041153e17c3e7a6faa41ba6b44778c9142e5941031,2024-05-24T13:03:05.093000
|
||||
CVE-2024-5311,0,1,bc0dd8fe2c9b76c0164439ed50a0a9214ee8a9c28beab0c44f8ee299d96c6945,2024-06-03T07:15:10.163000
|
||||
CVE-2024-5311,0,0,bc0dd8fe2c9b76c0164439ed50a0a9214ee8a9c28beab0c44f8ee299d96c6945,2024-06-03T07:15:10.163000
|
||||
CVE-2024-5312,0,0,3a9d8301087c1d7edb8976207e286d0d247ebf6ccf4b5edb4137e81b02e5ec2b,2024-05-24T13:03:05.093000
|
||||
CVE-2024-5314,0,0,fb6304ffb5d50ce8724d643a46fad25ba80695f7c0c0eb4ec33a07d41bc4980a,2024-05-24T13:03:05.093000
|
||||
CVE-2024-5315,0,0,e1b0baaf93d62cf125eea53091da57c404cdf61d625ae810529ebef84e73357d,2024-05-24T13:03:05.093000
|
||||
@ -252362,7 +252396,7 @@ CVE-2024-5397,0,0,3fa492ac656a0dc8b44c0c2439095185551e47b9b3d1d85bd44fafa325950b
|
||||
CVE-2024-5399,0,0,fa7eef6bbf34e07faf1acdcbb967da16ac637ca3df72c0acc1bd2e0f60228b23,2024-05-28T12:39:28.377000
|
||||
CVE-2024-5400,0,0,d3c501060bf431388a2cf50edbec679a7265e7c25a2addcb59a0d9057b8884e3,2024-05-28T12:39:28.377000
|
||||
CVE-2024-5403,0,0,21ef2036234b077bc1f129f4d78aa7befab02d334c0d4840a63d95ad54da2b3d,2024-05-28T12:39:28.377000
|
||||
CVE-2024-5404,1,1,2f2c39786498ab4718cdc5931c7e32f2881d2453b1870cf774e75a751aeadd2e,2024-06-03T09:15:10.193000
|
||||
CVE-2024-5404,0,1,42c1d4f54ccd945d042e8c46560bbcfa89e4a0b2f053599bf0821dd3b72846fe,2024-06-03T09:15:10.193000
|
||||
CVE-2024-5405,0,0,0726f3329c87a86f8903abd8a0efb034839b1c4fb01bb69fa1c55fb7fdc0b2ce,2024-05-28T12:39:28.377000
|
||||
CVE-2024-5406,0,0,128407d22b74a56625ebded67c527f89f63de550e972932c839965bdff9c4612,2024-05-28T12:39:28.377000
|
||||
CVE-2024-5407,0,0,2fcd76e27db1c908eadad490ca75346b74b5c01495e67a00eb793a48de914bb1,2024-05-28T12:39:28.377000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user