mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-07 19:16:29 +00:00
Auto-Update: 2024-09-24T20:00:17.350813+00:00
This commit is contained in:
parent
79e405279c
commit
67129a68d6
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2017-9419",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2017-06-15T19:29:00.180",
|
||||
"lastModified": "2017-07-17T13:18:30.687",
|
||||
"lastModified": "2024-09-24T19:18:56.973",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -85,8 +85,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:webhammer:wp-custom-fields-search:0.3.28:*:*:*:*:wordpress:*:*",
|
||||
"matchCriteriaId": "FEA68848-F58A-4413-BD31-B68AC0531648"
|
||||
"criteria": "cpe:2.3:a:webhammer:wp_custom_fields_search:0.3.28:*:*:*:*:wordpress:*:*",
|
||||
"matchCriteriaId": "807AAD2B-9D07-4E78-95B8-F08F7E55037E"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-36103",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-10T16:15:18.380",
|
||||
"lastModified": "2024-09-10T20:35:00.660",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-24T18:10:16.207",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,43 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:tenda:ac15_firmware:15.03.05.20:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "35964FEE-C449-4967-A6B6-7A0CDC1DD3FA"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:tenda:ac15:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B73E7C1C-F121-486A-8B15-E97EA0C219A5"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/t0hka1/Tenda-AC15-Exp/blob/master/Tenda%20AC15%20V15.03.05.20%20Exp.md",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-25673",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-19T19:15:24.093",
|
||||
"lastModified": "2024-09-20T12:30:17.483",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-24T19:08:32.737",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,19 +15,89 @@
|
||||
"value": "Couchbase Server 7.6.x anterior a 7.6.2, 7.2.x anterior a 7.2.6 y todas las versiones anteriores permiten la inyecci\u00f3n de encabezado de host HTTP."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-74"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:couchbase:couchbase_server:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2.0.0",
|
||||
"versionEndExcluding": "7.2.6",
|
||||
"matchCriteriaId": "643693D1-A64C-4049-AC4F-BAB3F088597E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:couchbase:couchbase_server:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "7.6.0",
|
||||
"versionEndExcluding": "7.6.2",
|
||||
"matchCriteriaId": "93805CFF-CBA4-440C-92B8-2EF9B5FEE810"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://docs.couchbase.com/server/current/release-notes/relnotes.html",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://forums.couchbase.com/tags/security",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.couchbase.com/alerts/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-31960",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-10T16:15:19.580",
|
||||
"lastModified": "2024-09-10T20:35:07.120",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-24T18:08:34.750",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cve@mitre.org",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -51,14 +81,76 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:exynos_1480_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "64897B0D-EBF6-4BEB-BF54-ABCDBFAB45E0"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:samsung:exynos_1480:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F3F328B4-0442-4748-B5EE-DD1CEE50D6CF"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:exynos_2400_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "16D9272E-1794-48FF-B6A4-8F48395BA38E"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:samsung:exynos_2400:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "932F5FB3-5527-44D7-9DD9-EF03963E3CA3"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2024-31960/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-38271",
|
||||
"sourceIdentifier": "cve-coordination@google.com",
|
||||
"published": "2024-06-26T16:15:11.560",
|
||||
"lastModified": "2024-07-29T22:15:04.757",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-24T19:29:24.630",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -59,9 +59,41 @@
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-404"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "cve-coordination@google.com",
|
||||
"type": "Secondary",
|
||||
@ -73,22 +105,56 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:google:nearby:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "1.0.1724.0",
|
||||
"matchCriteriaId": "8225DC5D-71F4-42B4-A401-A8327E178058"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/google/nearby/pull/2402",
|
||||
"source": "cve-coordination@google.com"
|
||||
"source": "cve-coordination@google.com",
|
||||
"tags": [
|
||||
"Issue Tracking",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/google/nearby/pull/2433",
|
||||
"source": "cve-coordination@google.com"
|
||||
"source": "cve-coordination@google.com",
|
||||
"tags": [
|
||||
"Issue Tracking",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/google/nearby/pull/2435",
|
||||
"source": "cve-coordination@google.com"
|
||||
"source": "cve-coordination@google.com",
|
||||
"tags": [
|
||||
"Issue Tracking",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/google/nearby/pull/2589",
|
||||
"source": "cve-coordination@google.com"
|
||||
"source": "cve-coordination@google.com",
|
||||
"tags": [
|
||||
"Issue Tracking",
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-40866",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-09-17T00:15:49.840",
|
||||
"lastModified": "2024-09-20T12:31:20.110",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-24T19:02:09.850",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,15 +15,82 @@
|
||||
"value": "El problema se solucion\u00f3 con una interfaz de usuario mejorada. Este problema se solucion\u00f3 en Safari 18 y macOS Sequoia 15. Visitar un sitio web malicioso puede provocar la suplantaci\u00f3n de la barra de direcciones."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "18.0",
|
||||
"matchCriteriaId": "0DCB4657-8F40-418E-8E98-743C271E4CDE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "15.0",
|
||||
"matchCriteriaId": "E8017C16-A17E-4AE7-9A0B-1295200A3A45"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/121238",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/121241",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-43977",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-09-17T23:15:18.647",
|
||||
"lastModified": "2024-09-20T12:30:51.220",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-24T19:17:15.327",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:posimyth:the_plus_addons_for_elementor:*:*:*:*:free:wordpress:*:*",
|
||||
"versionEndExcluding": "5.6.3",
|
||||
"matchCriteriaId": "F72544E1-A1FE-4EF4-B9A3-18954702A2EE"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/the-plus-addons-for-elementor-page-builder/wordpress-the-plus-addons-for-elementor-plugin-5-6-2-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-43985",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-09-17T23:15:19.037",
|
||||
"lastModified": "2024-09-20T12:30:51.220",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-24T19:33:16.910",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mage-people:bus_ticket_booking_with_seat_reservation:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "5.3.6",
|
||||
"matchCriteriaId": "0E122E17-ECE0-4BC5-B9A1-9F51BEA76901"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/bus-ticket-booking-with-seat-reservation/wordpress-bus-ticket-booking-with-seat-reservation-plugin-5-3-5-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-44004",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-09-17T23:15:19.230",
|
||||
"lastModified": "2024-09-20T12:30:51.220",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-24T19:22:14.760",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:wptaskforce:track_\\&_trace:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "7.0.6",
|
||||
"matchCriteriaId": "06DFF23E-5673-4D6C-987F-6EC8C8EDFF13"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/wpcargo/wordpress-wpcargo-track-trace-plugin-7-0-6-sql-injection-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-44064",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-09-17T23:15:20.753",
|
||||
"lastModified": "2024-09-20T12:30:51.220",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-24T18:15:30.537",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:likebtn:like_button_rating:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "2.6.54",
|
||||
"matchCriteriaId": "566CCF16-B6B5-4BD6-B6F7-3CD3558C3BDC"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/likebtn-like-button/wordpress-like-button-rating-likebtn-plugin-2-6-53-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-44130",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-09-17T00:15:50.147",
|
||||
"lastModified": "2024-09-20T12:31:20.110",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-24T18:49:47.557",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,11 +15,68 @@
|
||||
"value": "Este problema se solucion\u00f3 mejorando la protecci\u00f3n de datos. Este problema se solucion\u00f3 en macOS Sequoia 15. Una aplicaci\u00f3n con privilegios de superusuario puede tener acceso a informaci\u00f3n privada."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "15.0",
|
||||
"matchCriteriaId": "E8017C16-A17E-4AE7-9A0B-1295200A3A45"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/121238",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-44131",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-09-17T00:15:50.200",
|
||||
"lastModified": "2024-09-20T12:31:20.110",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-24T19:01:55.470",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,15 +15,86 @@
|
||||
"value": "Este problema se solucion\u00f3 con una validaci\u00f3n mejorada de los enlaces simb\u00f3licos. Este problema se solucion\u00f3 en iOS 18 y iPadOS 18, macOS Sequoia 15. Una aplicaci\u00f3n puede tener acceso a datos confidenciales del usuario."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-59"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "18.0",
|
||||
"matchCriteriaId": "ACD3B3B0-329C-413B-BDF7-6B1C6298846E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "18.0",
|
||||
"matchCriteriaId": "2222A2EE-00FA-4019-8779-13B82A4F9DD0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "15.0",
|
||||
"matchCriteriaId": "E8017C16-A17E-4AE7-9A0B-1295200A3A45"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/121238",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/121250",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-44133",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-09-17T00:15:50.300",
|
||||
"lastModified": "2024-09-20T12:31:20.110",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-24T18:24:44.733",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,11 +15,67 @@
|
||||
"value": "Este problema se solucion\u00f3 eliminando el c\u00f3digo vulnerable. Este problema se solucion\u00f3 en macOS Sequoia 15. En los dispositivos administrados por MDM, una aplicaci\u00f3n puede ser capaz de eludir ciertas preferencias de privacidad."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "15.0",
|
||||
"matchCriteriaId": "E8017C16-A17E-4AE7-9A0B-1295200A3A45"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/121238",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-44134",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-09-17T00:15:50.350",
|
||||
"lastModified": "2024-09-20T12:31:20.110",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-24T18:26:26.963",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,11 +15,67 @@
|
||||
"value": "Este problema se solucion\u00f3 con una redacci\u00f3n mejorada de informaci\u00f3n confidencial. Este problema se solucion\u00f3 en macOS Sequoia 15. Es posible que una aplicaci\u00f3n pueda leer informaci\u00f3n confidencial de ubicaci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "15.0",
|
||||
"matchCriteriaId": "E8017C16-A17E-4AE7-9A0B-1295200A3A45"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/121238",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-44139",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-09-17T00:15:50.443",
|
||||
"lastModified": "2024-09-20T12:31:20.110",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-24T18:30:34.863",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,11 +15,73 @@
|
||||
"value": "El problema se solucion\u00f3 con comprobaciones mejoradas. Este problema se solucion\u00f3 en iOS 18 y iPadOS 18. Un atacante con acceso f\u00edsico podr\u00eda acceder a los contactos desde la pantalla de bloqueo."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "PHYSICAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 2.4,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 0.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "18.0",
|
||||
"matchCriteriaId": "769AF343-F65B-46B6-BBA1-D8FCC2B5CFFD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "18.0",
|
||||
"matchCriteriaId": "2222A2EE-00FA-4019-8779-13B82A4F9DD0"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/121250",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-44180",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-09-17T00:15:51.743",
|
||||
"lastModified": "2024-09-20T12:31:20.110",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-24T19:04:17.890",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,11 +15,74 @@
|
||||
"value": "El problema se solucion\u00f3 con comprobaciones mejoradas. Este problema se solucion\u00f3 en iOS 18 y iPadOS 18. Un atacante con acceso f\u00edsico podr\u00eda acceder a los contactos desde la pantalla de bloqueo."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "PHYSICAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 2.4,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 0.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "18.0",
|
||||
"matchCriteriaId": "ACD3B3B0-329C-413B-BDF7-6B1C6298846E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "18.0",
|
||||
"matchCriteriaId": "2222A2EE-00FA-4019-8779-13B82A4F9DD0"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/121250",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-44181",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-09-17T00:15:51.790",
|
||||
"lastModified": "2024-09-20T12:31:20.110",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-24T18:39:12.733",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,19 +15,91 @@
|
||||
"value": "Se solucion\u00f3 un problema mejorando el manejo de archivos temporales. Este problema se solucion\u00f3 en macOS Ventura 13.7, macOS Sonoma 14.7 y macOS Sequoia 15. Es posible que una aplicaci\u00f3n pueda leer informaci\u00f3n confidencial sobre la ubicaci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "13.7",
|
||||
"matchCriteriaId": "74CD5775-17B0-4158-AED7-ABA27A4393CA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "14.0",
|
||||
"versionEndExcluding": "14.7",
|
||||
"matchCriteriaId": "06F1EED8-2BB5-4768-908B-83AF76DE7B5F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/121234",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/121238",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/121247",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-44183",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-09-17T00:15:51.890",
|
||||
"lastModified": "2024-09-20T12:31:20.110",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-24T19:04:51.030",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,39 +15,161 @@
|
||||
"value": "Se solucion\u00f3 un error l\u00f3gico con un manejo de errores mejorado. Este problema se solucion\u00f3 en macOS Ventura 13.7, iOS 17.7 y iPadOS 17.7, visionOS 2, watchOS 11, macOS Sequoia 15, iOS 18 y iPadOS 18, macOS Sonoma 14.7 y tvOS 18. Es posible que una aplicaci\u00f3n pueda provocar una denegaci\u00f3n de servicio."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "17.7",
|
||||
"matchCriteriaId": "064488F4-456F-4C5D-B325-4F1FCDF2D432"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "17.7",
|
||||
"matchCriteriaId": "B8542FD9-368A-4A38-965E-47AE279208F1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "13.7",
|
||||
"matchCriteriaId": "74CD5775-17B0-4158-AED7-ABA27A4393CA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "14.0",
|
||||
"versionEndExcluding": "14.7",
|
||||
"matchCriteriaId": "06F1EED8-2BB5-4768-908B-83AF76DE7B5F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "18.0",
|
||||
"matchCriteriaId": "F34BD4C1-5C6A-4C6D-BD96-8CC3F3CBFF74"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "2.0",
|
||||
"matchCriteriaId": "A6AE7B0F-C356-4601-9636-617CDD09F009"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "11.0",
|
||||
"matchCriteriaId": "4D2E10A0-47C2-4475-A061-DF63ED44A0AE"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/121234",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/121238",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/121240",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/121246",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/121247",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/121248",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/121249",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/121250",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-44184",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-09-17T00:15:51.940",
|
||||
"lastModified": "2024-09-20T12:31:20.110",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-24T19:03:08.110",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,27 +15,119 @@
|
||||
"value": "Se solucion\u00f3 un problema de permisos con restricciones adicionales. Este problema se solucion\u00f3 en macOS Ventura 13.7, iOS 17.7 y iPadOS 17.7, iOS 18 y iPadOS 18, macOS Sonoma 14.7 y macOS Sequoia 15. Es posible que una aplicaci\u00f3n pueda acceder a datos confidenciales del usuario."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "17.7",
|
||||
"matchCriteriaId": "064488F4-456F-4C5D-B325-4F1FCDF2D432"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "17.7",
|
||||
"matchCriteriaId": "B8542FD9-368A-4A38-965E-47AE279208F1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "13.7",
|
||||
"matchCriteriaId": "74CD5775-17B0-4158-AED7-ABA27A4393CA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "14.0",
|
||||
"versionEndExcluding": "14.7",
|
||||
"matchCriteriaId": "06F1EED8-2BB5-4768-908B-83AF76DE7B5F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/121234",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/121238",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/121246",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/121247",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/121250",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-44186",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-09-17T00:15:51.987",
|
||||
"lastModified": "2024-09-20T12:31:20.110",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-24T18:03:45.513",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,11 +15,68 @@
|
||||
"value": "Se solucion\u00f3 un problema de acceso con restricciones adicionales en el entorno aislado. Este problema se solucion\u00f3 en macOS Sequoia 15. Una aplicaci\u00f3n puede tener acceso a datos de usuario protegidos."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "15.0",
|
||||
"matchCriteriaId": "E8017C16-A17E-4AE7-9A0B-1295200A3A45"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/121238",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-44189",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-09-17T00:15:52.143",
|
||||
"lastModified": "2024-09-20T12:31:20.110",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-24T18:33:02.477",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,11 +15,67 @@
|
||||
"value": "El problema se solucion\u00f3 con comprobaciones mejoradas. Este problema se solucion\u00f3 en macOS Sequoia 15. Exist\u00eda un problema l\u00f3gico por el cual un proceso pod\u00eda capturar el contenido de la pantalla sin el consentimiento del usuario."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "15.0",
|
||||
"matchCriteriaId": "E8017C16-A17E-4AE7-9A0B-1295200A3A45"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/121238",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-44190",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-09-17T00:15:52.200",
|
||||
"lastModified": "2024-09-20T12:31:20.110",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-24T18:02:25.313",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,19 +15,91 @@
|
||||
"value": "Se solucion\u00f3 un problema de manejo de rutas con una validaci\u00f3n mejorada. Este problema se solucion\u00f3 en macOS Ventura 13.7, macOS Sonoma 14.7 y macOS Sequoia 15. Es posible que una aplicaci\u00f3n pueda leer archivos arbitrarios."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "13.7",
|
||||
"matchCriteriaId": "74CD5775-17B0-4158-AED7-ABA27A4393CA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "14.0",
|
||||
"versionEndExcluding": "14.7",
|
||||
"matchCriteriaId": "06F1EED8-2BB5-4768-908B-83AF76DE7B5F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/121234",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/121238",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/121247",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-45810",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-09-20T00:15:03.153",
|
||||
"lastModified": "2024-09-20T12:30:17.483",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-24T19:48:22.993",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,53 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "1.28.7",
|
||||
"matchCriteriaId": "C5E423BE-4022-47AB-A5D4-B218627517DD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "1.29.0",
|
||||
"versionEndExcluding": "1.29.9",
|
||||
"matchCriteriaId": "E442EF13-A99D-42B9-BC76-AC398C32D132"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "1.30.0",
|
||||
"versionEndExcluding": "1.30.6",
|
||||
"matchCriteriaId": "D9685C62-CFE4-43C5-B0C2-1C6722FB4F64"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "1.31.0",
|
||||
"versionEndExcluding": "1.31.2",
|
||||
"matchCriteriaId": "C765FFC0-2FF7-4318-A347-2AFCAD0E7C74"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/envoyproxy/envoy/security/advisories/GHSA-qm74-x36m-555q",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-47159",
|
||||
"sourceIdentifier": "cve@jetbrains.com",
|
||||
"published": "2024-09-19T18:15:09.803",
|
||||
"lastModified": "2024-09-20T12:30:17.483",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-24T18:09:50.877",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "cve@jetbrains.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:jetbrains:youtrack:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "2024.3.44799",
|
||||
"matchCriteriaId": "87D7870B-1EB0-4688-8D64-A4136EED3B9B"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
|
||||
"source": "cve@jetbrains.com"
|
||||
"source": "cve@jetbrains.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-47160",
|
||||
"sourceIdentifier": "cve@jetbrains.com",
|
||||
"published": "2024-09-19T18:15:10.013",
|
||||
"lastModified": "2024-09-20T12:30:17.483",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-24T18:03:48.370",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "cve@jetbrains.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "cve@jetbrains.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:jetbrains:youtrack:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "2024.3.44799",
|
||||
"matchCriteriaId": "87D7870B-1EB0-4688-8D64-A4136EED3B9B"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
|
||||
"source": "cve@jetbrains.com"
|
||||
"source": "cve@jetbrains.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-5256",
|
||||
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||
"published": "2024-06-06T18:15:19.220",
|
||||
"lastModified": "2024-06-07T14:56:05.647",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-24T18:41:40.007",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -16,6 +16,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
@ -40,6 +62,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-191"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +83,43 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:sonos:era_100_firmware:15.9:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "ABA40771-918E-4114-ADA3-68030045115F"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:sonos:era_100:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B75787D8-A364-46E2-8ACF-D23166CF6FAF"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-542/",
|
||||
"source": "zdi-disclosures@trendmicro.com"
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-5267",
|
||||
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||
"published": "2024-06-06T18:15:19.477",
|
||||
"lastModified": "2024-06-07T14:56:05.647",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-24T18:56:10.507",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -16,6 +16,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
@ -40,6 +62,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +83,43 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:sonos:era_100_firmware:15.9:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "ABA40771-918E-4114-ADA3-68030045115F"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:sonos:era_100:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B75787D8-A364-46E2-8ACF-D23166CF6FAF"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-543/",
|
||||
"source": "zdi-disclosures@trendmicro.com"
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-5268",
|
||||
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||
"published": "2024-06-06T18:15:19.680",
|
||||
"lastModified": "2024-06-07T14:56:05.647",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-24T18:47:03.597",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -16,6 +16,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
],
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
@ -40,6 +62,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +83,43 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:sonos:era_100_firmware:15.9:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "ABA40771-918E-4114-ADA3-68030045115F"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:sonos:era_100:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B75787D8-A364-46E2-8ACF-D23166CF6FAF"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-544/",
|
||||
"source": "zdi-disclosures@trendmicro.com"
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
56
README.md
56
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-09-24T18:00:19.500737+00:00
|
||||
2024-09-24T20:00:17.350813+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-09-24T17:57:43.827000+00:00
|
||||
2024-09-24T19:48:22.993000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -44,33 +44,33 @@ Recently added CVEs: `0`
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `64`
|
||||
Recently modified CVEs: `28`
|
||||
|
||||
- [CVE-2024-46581](CVE-2024/CVE-2024-465xx/CVE-2024-46581.json) (`2024-09-24T16:41:36.533`)
|
||||
- [CVE-2024-46582](CVE-2024/CVE-2024-465xx/CVE-2024-46582.json) (`2024-09-24T16:41:29.377`)
|
||||
- [CVE-2024-46583](CVE-2024/CVE-2024-465xx/CVE-2024-46583.json) (`2024-09-24T16:40:48.437`)
|
||||
- [CVE-2024-46584](CVE-2024/CVE-2024-465xx/CVE-2024-46584.json) (`2024-09-24T16:40:50.223`)
|
||||
- [CVE-2024-46585](CVE-2024/CVE-2024-465xx/CVE-2024-46585.json) (`2024-09-24T16:40:52.817`)
|
||||
- [CVE-2024-46586](CVE-2024/CVE-2024-465xx/CVE-2024-46586.json) (`2024-09-24T16:40:54.183`)
|
||||
- [CVE-2024-46588](CVE-2024/CVE-2024-465xx/CVE-2024-46588.json) (`2024-09-24T16:40:55.433`)
|
||||
- [CVE-2024-46589](CVE-2024/CVE-2024-465xx/CVE-2024-46589.json) (`2024-09-24T16:40:56.763`)
|
||||
- [CVE-2024-46591](CVE-2024/CVE-2024-465xx/CVE-2024-46591.json) (`2024-09-24T16:40:58.790`)
|
||||
- [CVE-2024-46592](CVE-2024/CVE-2024-465xx/CVE-2024-46592.json) (`2024-09-24T16:41:00.260`)
|
||||
- [CVE-2024-46593](CVE-2024/CVE-2024-465xx/CVE-2024-46593.json) (`2024-09-24T16:41:02.327`)
|
||||
- [CVE-2024-46594](CVE-2024/CVE-2024-465xx/CVE-2024-46594.json) (`2024-09-24T16:41:04.160`)
|
||||
- [CVE-2024-46595](CVE-2024/CVE-2024-465xx/CVE-2024-46595.json) (`2024-09-24T16:41:05.947`)
|
||||
- [CVE-2024-46596](CVE-2024/CVE-2024-465xx/CVE-2024-46596.json) (`2024-09-24T16:41:07.350`)
|
||||
- [CVE-2024-46597](CVE-2024/CVE-2024-465xx/CVE-2024-46597.json) (`2024-09-24T16:41:09.457`)
|
||||
- [CVE-2024-46598](CVE-2024/CVE-2024-465xx/CVE-2024-46598.json) (`2024-09-24T16:37:39.833`)
|
||||
- [CVE-2024-46793](CVE-2024/CVE-2024-467xx/CVE-2024-46793.json) (`2024-09-24T16:00:17.977`)
|
||||
- [CVE-2024-46986](CVE-2024/CVE-2024-469xx/CVE-2024-46986.json) (`2024-09-24T16:30:55.167`)
|
||||
- [CVE-2024-46987](CVE-2024/CVE-2024-469xx/CVE-2024-46987.json) (`2024-09-24T16:27:30.457`)
|
||||
- [CVE-2024-47162](CVE-2024/CVE-2024-471xx/CVE-2024-47162.json) (`2024-09-24T17:57:43.827`)
|
||||
- [CVE-2024-5269](CVE-2024/CVE-2024-52xx/CVE-2024-5269.json) (`2024-09-24T17:50:07.957`)
|
||||
- [CVE-2024-6685](CVE-2024/CVE-2024-66xx/CVE-2024-6685.json) (`2024-09-24T16:48:24.497`)
|
||||
- [CVE-2024-7319](CVE-2024/CVE-2024-73xx/CVE-2024-7319.json) (`2024-09-24T17:00:00.917`)
|
||||
- [CVE-2024-8146](CVE-2024/CVE-2024-81xx/CVE-2024-8146.json) (`2024-09-24T17:00:38.933`)
|
||||
- [CVE-2024-9001](CVE-2024/CVE-2024-90xx/CVE-2024-9001.json) (`2024-09-24T16:14:30.190`)
|
||||
- [CVE-2024-31960](CVE-2024/CVE-2024-319xx/CVE-2024-31960.json) (`2024-09-24T18:08:34.750`)
|
||||
- [CVE-2024-38271](CVE-2024/CVE-2024-382xx/CVE-2024-38271.json) (`2024-09-24T19:29:24.630`)
|
||||
- [CVE-2024-40866](CVE-2024/CVE-2024-408xx/CVE-2024-40866.json) (`2024-09-24T19:02:09.850`)
|
||||
- [CVE-2024-43977](CVE-2024/CVE-2024-439xx/CVE-2024-43977.json) (`2024-09-24T19:17:15.327`)
|
||||
- [CVE-2024-43985](CVE-2024/CVE-2024-439xx/CVE-2024-43985.json) (`2024-09-24T19:33:16.910`)
|
||||
- [CVE-2024-44004](CVE-2024/CVE-2024-440xx/CVE-2024-44004.json) (`2024-09-24T19:22:14.760`)
|
||||
- [CVE-2024-44064](CVE-2024/CVE-2024-440xx/CVE-2024-44064.json) (`2024-09-24T18:15:30.537`)
|
||||
- [CVE-2024-44130](CVE-2024/CVE-2024-441xx/CVE-2024-44130.json) (`2024-09-24T18:49:47.557`)
|
||||
- [CVE-2024-44131](CVE-2024/CVE-2024-441xx/CVE-2024-44131.json) (`2024-09-24T19:01:55.470`)
|
||||
- [CVE-2024-44133](CVE-2024/CVE-2024-441xx/CVE-2024-44133.json) (`2024-09-24T18:24:44.733`)
|
||||
- [CVE-2024-44134](CVE-2024/CVE-2024-441xx/CVE-2024-44134.json) (`2024-09-24T18:26:26.963`)
|
||||
- [CVE-2024-44139](CVE-2024/CVE-2024-441xx/CVE-2024-44139.json) (`2024-09-24T18:30:34.863`)
|
||||
- [CVE-2024-44180](CVE-2024/CVE-2024-441xx/CVE-2024-44180.json) (`2024-09-24T19:04:17.890`)
|
||||
- [CVE-2024-44181](CVE-2024/CVE-2024-441xx/CVE-2024-44181.json) (`2024-09-24T18:39:12.733`)
|
||||
- [CVE-2024-44183](CVE-2024/CVE-2024-441xx/CVE-2024-44183.json) (`2024-09-24T19:04:51.030`)
|
||||
- [CVE-2024-44184](CVE-2024/CVE-2024-441xx/CVE-2024-44184.json) (`2024-09-24T19:03:08.110`)
|
||||
- [CVE-2024-44186](CVE-2024/CVE-2024-441xx/CVE-2024-44186.json) (`2024-09-24T18:03:45.513`)
|
||||
- [CVE-2024-44189](CVE-2024/CVE-2024-441xx/CVE-2024-44189.json) (`2024-09-24T18:33:02.477`)
|
||||
- [CVE-2024-44190](CVE-2024/CVE-2024-441xx/CVE-2024-44190.json) (`2024-09-24T18:02:25.313`)
|
||||
- [CVE-2024-45810](CVE-2024/CVE-2024-458xx/CVE-2024-45810.json) (`2024-09-24T19:48:22.993`)
|
||||
- [CVE-2024-47159](CVE-2024/CVE-2024-471xx/CVE-2024-47159.json) (`2024-09-24T18:09:50.877`)
|
||||
- [CVE-2024-47160](CVE-2024/CVE-2024-471xx/CVE-2024-47160.json) (`2024-09-24T18:03:48.370`)
|
||||
- [CVE-2024-5256](CVE-2024/CVE-2024-52xx/CVE-2024-5256.json) (`2024-09-24T18:41:40.007`)
|
||||
- [CVE-2024-5267](CVE-2024/CVE-2024-52xx/CVE-2024-5267.json) (`2024-09-24T18:56:10.507`)
|
||||
- [CVE-2024-5268](CVE-2024/CVE-2024-52xx/CVE-2024-5268.json) (`2024-09-24T18:47:03.597`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
184
_state.csv
184
_state.csv
@ -109215,7 +109215,7 @@ CVE-2017-9415,0,0,95d24e93a9bcede657d8aa631eacbb651ba7899941590059bec56e63044074
|
||||
CVE-2017-9416,0,0,aedaf0e437ffca5ec466c6ecb5a4b1553d8ab25e773bbb8a3a6fc4b832fee7fc,2017-06-08T18:21:33.577000
|
||||
CVE-2017-9417,0,0,49e995a9a593964f830046198b4cf55c1e106b63dc94716ae5e49c6f32c15b92,2019-10-03T00:03:26.223000
|
||||
CVE-2017-9418,0,0,ce185419ab94ff39234e56a71cccaa715f2631f60465de9fc51527ab28b9cb1d,2017-08-13T01:29:23.553000
|
||||
CVE-2017-9419,0,0,c784a70829251d810d46d90cc4804e176447335cac0e38935747003daf578f0d,2017-07-17T13:18:30.687000
|
||||
CVE-2017-9419,0,1,ea366ee0277a7e18741c9478efb42ed5ed12755ea51bca3892ec011bf0be2e0d,2024-09-24T19:18:56.973000
|
||||
CVE-2017-9420,0,0,d1788b4782b52689dc3580785ad2b90f152b62cdef6ff29ee7e81a57ce6ca07f,2017-07-17T13:18:30.750000
|
||||
CVE-2017-9421,0,0,a767bee636512082ae75fe3682b741ef14ecab57fc509a1dc3b280ec579823fe,2018-06-27T11:44:21.350000
|
||||
CVE-2017-9422,0,0,a243fbdd25f6e69540519f653d630b6dd3fb4ad1dad89363a3fca65ba968e86c,2023-11-07T02:50:46.157000
|
||||
@ -196109,7 +196109,7 @@ CVE-2022-27585,0,0,06bd67868494e48600b1e88772f0d06eeb9e5edbaab726ccfbe26c3e24d06
|
||||
CVE-2022-27586,0,0,07100889aae941602772df408a285c729afa35da3e646d67a217a253d61f5785,2023-03-31T16:11:07.293000
|
||||
CVE-2022-27588,0,0,c8c843a51b73d17fc5ad8c84b81a450869de76e594dfd66a4355994a422db1c2,2022-05-13T04:03:37.187000
|
||||
CVE-2022-2759,0,0,94ec1874b395b7471d795b84e4f7a560900905e9d42ff4804e1aeea35f373c65,2022-09-02T21:53:44.030000
|
||||
CVE-2022-27592,0,1,9d0c315e14f425af2eb679d04e9dcc5e97778aaf6003d6f5dec353c9e4c6e1d1,2024-09-24T16:44:35.460000
|
||||
CVE-2022-27592,0,0,9d0c315e14f425af2eb679d04e9dcc5e97778aaf6003d6f5dec353c9e4c6e1d1,2024-09-24T16:44:35.460000
|
||||
CVE-2022-27593,0,0,56fafb9518e5fb764ee2a86c9284349ca9bf7294d7c59fe8cdb5292b04dab2ac,2022-09-13T14:41:36.173000
|
||||
CVE-2022-27596,0,0,e9bb74716a5676f20e7ebc2e01d61a53693ebfcfe25ec7fd68966aab916e53d0,2023-11-07T03:45:21.480000
|
||||
CVE-2022-27597,0,0,6633b782cbe58b62e962ad2a4704cecb30b098c5d341786e9d2e705cf87f27da,2023-09-01T17:10:13.670000
|
||||
@ -227143,7 +227143,7 @@ CVE-2023-36095,0,0,ceab2a6fe5ff376a689e3efe372405a2a8939b96d91fd88ffa7233875163d
|
||||
CVE-2023-36097,0,0,d69938fc728da34d8768a0c5fff74b9f5fdf3c3a2579ad3f611d775612b7514c,2023-06-28T07:22:39.250000
|
||||
CVE-2023-3610,0,0,64c0e8d2425050cc67fb6bf5e0c9fc93a2196e61379b8959e14e5951d7558153,2023-12-29T16:05:32.897000
|
||||
CVE-2023-36100,0,0,2780314d2b1141fba57782f745de049c531df759192c158ad02872ef9d44b115,2023-09-07T18:16:22.440000
|
||||
CVE-2023-36103,0,0,d3c843425945c5710f51465e3e9ec6ca6c0a99f69fbf5be08b89a4010372ad04,2024-09-10T20:35:00.660000
|
||||
CVE-2023-36103,0,1,e23d9a2dd86cb9355cdbf5242465c87caaa1af25f65237f20a1638f8c876293e,2024-09-24T18:10:16.207000
|
||||
CVE-2023-36106,0,0,b4d24519cb6404a5e8ee83f274be002cd600bd9db8f91c065889d76d5476c9aa,2023-08-23T14:33:07.907000
|
||||
CVE-2023-36109,0,0,2905c47f1f22b864042595a1a3690775764e8e0cf79a8f06d31d838015bda409,2023-09-22T02:12:15.177000
|
||||
CVE-2023-3611,0,0,3276ea952612bf8ce9f28e73d33d9668ae065819920d37d3d7dd3deee2d0f859,2024-08-22T20:25:34.373000
|
||||
@ -229674,7 +229674,7 @@ CVE-2023-39296,0,0,d2ec6b91dad78c170d91d5c6c2c3863f4db2498df87584b7c243e2866ab2c
|
||||
CVE-2023-39297,0,0,4286e66a3fc85dffb0bf2ab3f29bb0e61528784bb09b30507bf508702bcc2a90,2024-02-08T03:51:19.150000
|
||||
CVE-2023-39298,0,0,127a03b989843fa889dcc92dca295fee4311b9ce66e3bc7ebd5b9cd26dc36776,2024-09-20T16:39:55.483000
|
||||
CVE-2023-39299,0,0,ed3a79cdf9f92da55d26eba629e88b3987231e3e3c75647573478f1f547565f6,2023-11-14T14:07:58.267000
|
||||
CVE-2023-39300,0,1,8164063b48e27fa6ca5cf55a627137e3109c7511fe1b2e06a75619a69d0d888f,2024-09-24T16:42:02.873000
|
||||
CVE-2023-39300,0,0,8164063b48e27fa6ca5cf55a627137e3109c7511fe1b2e06a75619a69d0d888f,2024-09-24T16:42:02.873000
|
||||
CVE-2023-39301,0,0,dc6e14951492020f95c90c8273cb9de69be93c16f1238b0bd06656b85ced5463,2023-11-14T15:29:43.047000
|
||||
CVE-2023-39302,0,0,563e576c55b23b655a16b30bf6ef18ed5199da3ecc4dfcd0590830de8b5b54d5,2024-02-06T19:54:10.380000
|
||||
CVE-2023-39303,0,0,6bc9866c62d077bd4443fc92245de27e9bff5a3693a8a8a86261e910d43203f1,2024-02-06T19:57:03.963000
|
||||
@ -246853,7 +246853,7 @@ CVE-2024-25657,0,0,4b43facfdcb326ebfd5828d4d462b595cdd46fa54d1b75d686b3ce7b78fb3
|
||||
CVE-2024-2566,0,0,087689b93c35b2d23260489bf51254e9dbbd90f4e3c3903cdc8f028cf28ab7f4,2024-05-17T02:38:19.710000
|
||||
CVE-2024-25662,0,0,731e4a5b21d04f93342e67f003659a0e732cf91f4619ab2aeea54741b462d915,2024-05-14T16:13:02.773000
|
||||
CVE-2024-2567,0,0,894c1cbf5b078d66a72f8e7a485b38287a781715f51ccca3dd4b9958cfc1e069,2024-08-01T20:15:15.443000
|
||||
CVE-2024-25673,0,0,aed80796d7a3374c0acda4eabef794fd88f4890380e50c588005bdbf57b8834a,2024-09-20T12:30:17.483000
|
||||
CVE-2024-25673,0,1,020bf3214c5ffa87859d3ca28dd29461160bdf033b62023050f62c5799071658,2024-09-24T19:08:32.737000
|
||||
CVE-2024-25674,0,0,a93e87559f3310a2a7f0b0950089f8e58e9cb97b1d3ba4777163ca1197a89f40,2024-08-26T19:35:20.977000
|
||||
CVE-2024-25675,0,0,557139e6badf2f7cbea8b1e635432a1b7bfe50ad3cd4ea09e589187f2a0848c5,2024-02-12T14:30:28.640000
|
||||
CVE-2024-25676,0,0,a08186e93b8e72e7d0fccd86e2d99f3ceb03caa74e9fe0fb3ce31f97ab303d23,2024-05-02T13:27:25.103000
|
||||
@ -248639,7 +248639,7 @@ CVE-2024-27877,0,0,f267e4e9b2c15ea5212cd96d8b790eca5b3bdc1ce3ab48286d7c0d66eea29
|
||||
CVE-2024-27878,0,0,0c018d0060dfa2d1e866f6f95570e39bac870f1d62334bf4a576f22fb4e08910,2024-08-01T14:35:06.007000
|
||||
CVE-2024-27879,0,0,254e8be6ba8a43e047f04cd80464022737a7bf42d0a4ef2248a263ff6e0ff3c7,2024-09-20T12:31:20.110000
|
||||
CVE-2024-2788,0,0,fae17eccf9cd9e59e0540a9ad532e11d3f58404c6459f605cc04b4c55f908408,2024-04-10T13:23:38.787000
|
||||
CVE-2024-27880,0,1,c2945c65ace9eef3d7cd6d4a7a5dc8c1be8029a3c89d763e6749e64dea4c00cf,2024-09-24T16:34:04.597000
|
||||
CVE-2024-27880,0,0,c2945c65ace9eef3d7cd6d4a7a5dc8c1be8029a3c89d763e6749e64dea4c00cf,2024-09-24T16:34:04.597000
|
||||
CVE-2024-27881,0,0,ecd3b41ffcf84a1b769c2ce9b805a207566f7e84b913888f092b35189f2e87e8,2024-08-16T17:37:25.757000
|
||||
CVE-2024-27882,0,0,5ddf2334142d0bee4ddfa2f398cb632ecb7d93b8ecf3478fdf0f165645bf7677,2024-08-20T15:05:39.703000
|
||||
CVE-2024-27883,0,0,5c8407bb3533667d9c8babdd5f7216ed0bdeb839d4e78b45e22424db69d8306d,2024-08-20T15:06:34.580000
|
||||
@ -251484,7 +251484,7 @@ CVE-2024-31957,0,0,52e3fc3f2f752e45a27580270575f061b25dbef0b821774e0c078c0204289
|
||||
CVE-2024-31958,0,0,416fc9a4d3e4a5d3047ec5c2778da02b0620ad75afe0364bc50bb13dddbd55a8,2024-06-07T19:24:09.243000
|
||||
CVE-2024-31959,0,0,0e7916914eb676533e3ce17ff90db00a77b463066e7818d1b2ebfe4e56b6ecb1,2024-08-01T13:51:16.797000
|
||||
CVE-2024-3196,0,0,0f543f16f346b107528fe7e208edf9b8c7b4cb02986f3b597e9cf2f5b191ce1d,2024-06-04T19:20:17.433000
|
||||
CVE-2024-31960,0,0,4c11e007ba6ca96f4d0e7121590f33e87acbab683cc7cc97876acc8292e36d27,2024-09-10T20:35:07.120000
|
||||
CVE-2024-31960,0,1,80d099e4c32eafd5a6b6127af89364daf313e658752f127dd89c41d6f571d27b,2024-09-24T18:08:34.750000
|
||||
CVE-2024-31961,0,0,8693e8165d9cdba44092b3dc0a2cbcef973a8cdf8c9f695519261f49865d4db3,2024-07-03T01:55:36.730000
|
||||
CVE-2024-31963,0,0,ba90c05a8c9e5dbd1f07d8d76d1b3e91d5e43d418493615f1ef67d7be6576eae,2024-07-03T01:55:37.503000
|
||||
CVE-2024-31964,0,0,8d3c29fd368a319e520256c3700d613581d90bf641f7cb9d55243462f4fa2849,2024-07-03T01:55:38.253000
|
||||
@ -252180,9 +252180,9 @@ CVE-2024-32852,0,0,a3d0fb678566cddfae620060977d02beade594e7fe5869436aa58da1501da
|
||||
CVE-2024-32853,0,0,a1dca3d4bd42a909fb90bb63c4311872870004374a80c3f2c77a99712953ab64,2024-07-03T17:58:53.163000
|
||||
CVE-2024-32854,0,0,ca09015aea734c79d590c062091997f16b37e268e9b438da15806fb6d9439330,2024-07-03T17:59:14.203000
|
||||
CVE-2024-32855,0,0,c49305c977dd2e708a0d316df4ef9be1d74cd331a1c2ffedbc125e28a10592cf,2024-06-25T12:24:17.873000
|
||||
CVE-2024-32856,0,1,2ac0f5139efed0fba37a4f94d77263c1302706c903c0f9bf6425bede55ea4bda,2024-09-24T17:24:05.123000
|
||||
CVE-2024-32856,0,0,2ac0f5139efed0fba37a4f94d77263c1302706c903c0f9bf6425bede55ea4bda,2024-09-24T17:24:05.123000
|
||||
CVE-2024-32857,0,0,cd2bae36db5519723b2404409c5a2285b1e5b4332d74f6586db2f526ae196183,2024-08-08T21:10:04.773000
|
||||
CVE-2024-32858,0,1,ac7f394b471d62d2745599fec2e148646f43c5b96216e2f7e1c79fb5801430b6,2024-09-24T17:45:28.353000
|
||||
CVE-2024-32858,0,0,ac7f394b471d62d2745599fec2e148646f43c5b96216e2f7e1c79fb5801430b6,2024-09-24T17:45:28.353000
|
||||
CVE-2024-32859,0,0,6878eb303e3fed06b69428c85d734cc5e74e821709864440c8758419372d20f9,2024-09-19T16:24:39.147000
|
||||
CVE-2024-3286,0,0,f064673537255c8b5419193db861ab38d2aa66df0f5b7dffd2eb436b55f3980e,2024-05-17T18:36:31.297000
|
||||
CVE-2024-32860,0,0,140d176974a544a70b011e4a7385dddf6177887685faa32d97074b7714e98c8d,2024-08-16T16:46:36.203000
|
||||
@ -255950,7 +255950,7 @@ CVE-2024-38268,0,0,c0d92d39a228e71921f32f3ddc47c859074eb7e98748f90e039aa6a788158
|
||||
CVE-2024-38269,0,0,28d137c665748c22a5a1296047801b7530b158c787732e0220a5e198375f8bd5,2024-09-24T02:15:03.230000
|
||||
CVE-2024-3827,0,0,fe9452c74994fbdb1f4a1edea576f588d513e300bcd491a382890605454b836b,2024-08-02T12:59:43.990000
|
||||
CVE-2024-38270,0,0,1961d440f3358bfa7071d7e107f3bab1b4b617abe6229812924e38655d765076,2024-09-18T18:23:40.977000
|
||||
CVE-2024-38271,0,0,d0fad2223108f05be98b695595aafaa9b6e89fe7fa5d7ebe88a9244c49515816,2024-07-29T22:15:04.757000
|
||||
CVE-2024-38271,0,1,9834d9a0550777bb280ac01d7ed323683d684e57908edc4058e727ad92f2608d,2024-09-24T19:29:24.630000
|
||||
CVE-2024-38272,0,0,8cca70759f5a39c84ccff793266a73e31b5589b491a0667bfde62566efc0d885,2024-09-24T14:34:06.627000
|
||||
CVE-2024-38273,0,0,98139fcc5d27706ddcb6f85d322a9c3ffe167225916ac0c861ab393656c9d382,2024-06-27T03:15:50.130000
|
||||
CVE-2024-38274,0,0,3f34dcdbcb04b3bd1c27e63f0c6c999c7639ff04bd1f29bc2ba555ae3687211a,2024-06-27T03:15:50.233000
|
||||
@ -257443,7 +257443,7 @@ CVE-2024-40861,0,0,7204d4c395d904aba2687d268d077938e2cf1cd101497574171fb4f0b590b
|
||||
CVE-2024-40862,0,0,0525786495a6d1734dd38aea7fe1aa5e14f710766343f641e193e4a65abe834e,2024-09-20T12:31:20.110000
|
||||
CVE-2024-40863,0,0,6d19988e7f98214ad02b31d8b0b7ea2f69e12db56e9a0545de8d6a7e8a3a5527,2024-09-20T12:31:20.110000
|
||||
CVE-2024-40865,0,0,86a860e5905b6728c79a2b0220fe6fe620623c98d110f80f056e40b418685ee4,2024-09-19T17:58:37.370000
|
||||
CVE-2024-40866,0,0,7804a731da61a2d5edd0ed92c509085f01d704f1c7f9a17206bb04685f829403,2024-09-20T12:31:20.110000
|
||||
CVE-2024-40866,0,1,b70b7495abe739ca87ac99d55432fe61ef90e14c7b56889eeedb3e6da6ebe6de,2024-09-24T19:02:09.850000
|
||||
CVE-2024-4087,0,0,559dc8fcb531eb7d96e390fa33463b50a20c5a688e8dbefeb3187bf1d2c5f774,2024-06-03T14:46:24.250000
|
||||
CVE-2024-40872,0,0,61b6054f8d04261e92c08a44feec16dc1d8422a97543a2162e5dea5f0a6c8f9d,2024-07-26T12:38:41.683000
|
||||
CVE-2024-40873,0,0,6df1707815f9f38105b50cd71b6fad1bdaf7a6f3e3c945bc399ab848fdd0a9bf,2024-08-02T19:57:17.407000
|
||||
@ -258720,7 +258720,7 @@ CVE-2024-42813,0,0,ac2ce0206860ac49c7a00dc981456912113a83f39c5bd8ad9fc9aeb5495f6
|
||||
CVE-2024-42815,0,0,fa939825da2520b0805320da8ef3bf06e37d61d20e773887864a50a3aa224eef,2024-09-03T21:15:16.197000
|
||||
CVE-2024-42816,0,0,8dd1ae8820cfa39b8949229a5b0a0fd0a511af977924a1929a9dcb8553f95dec,2024-08-27T14:35:07.077000
|
||||
CVE-2024-42818,0,0,694f268c461684854315b7e46e53659be0c6525c36cb73fb82a2ea42f888fdd3,2024-08-26T19:10:18.890000
|
||||
CVE-2024-4283,0,1,0b01382e91d2d3830bdcadad6ff16c4cbf45d62064e6424171f058dd71657988,2024-09-24T16:51:23.193000
|
||||
CVE-2024-4283,0,0,0b01382e91d2d3830bdcadad6ff16c4cbf45d62064e6424171f058dd71657988,2024-09-24T16:51:23.193000
|
||||
CVE-2024-4284,0,0,4fbe27a80563712e41b6422ac48754a31c657da862cab89b959335ecaf13d90e,2024-05-20T13:00:04.957000
|
||||
CVE-2024-42843,0,0,147a94e278dd08ceb9ff0b00f505eb868d7a1e59c01ddecc9d1420e344e9ec86,2024-08-19T19:35:09.180000
|
||||
CVE-2024-42845,0,0,f506b40591f84fe588a1ebf10f79903d4e58b530d7a712a8d7ac529b24aba892,2024-08-28T16:35:23.650000
|
||||
@ -259324,12 +259324,12 @@ CVE-2024-43970,0,0,eb63732798152f8124074a55ee3aa3a4bd2bd176d6febbd091cb7ebc3fc9a
|
||||
CVE-2024-43971,0,0,34472b5ac709ce9a3f1abe23b8eaa963797fcce9e53b661d070b799ddc85f7ac,2024-09-20T12:30:51.220000
|
||||
CVE-2024-43972,0,0,4fddac4919273fee7376e45e0057a4cc10abb7819b09ddabafb76ef0ea1017ac,2024-09-20T12:30:51.220000
|
||||
CVE-2024-43975,0,0,977229ee6f21ff44b2f4c2cb7deb0207c9f2f611ad753dcecfedffb4a8442761,2024-09-20T12:30:51.220000
|
||||
CVE-2024-43976,0,1,b5b36a728accce9a5c243e352c901188e8a688872f36e1c893cd85efac637a21,2024-09-24T16:32:37.747000
|
||||
CVE-2024-43977,0,0,9dc13a044aaf4c90e341701952fdc8a28870c07dcda98939ff30632b53700c56,2024-09-20T12:30:51.220000
|
||||
CVE-2024-43978,0,1,b84c789c57b2300e5e696cc4e44909900a0446291c850df47c011342afd925c3,2024-09-24T16:44:01.557000
|
||||
CVE-2024-43976,0,0,b5b36a728accce9a5c243e352c901188e8a688872f36e1c893cd85efac637a21,2024-09-24T16:32:37.747000
|
||||
CVE-2024-43977,0,1,8548dd346f70e10bd02563139f9662536c4c908bc4be8bbe5ccbe1834db20d5d,2024-09-24T19:17:15.327000
|
||||
CVE-2024-43978,0,0,b84c789c57b2300e5e696cc4e44909900a0446291c850df47c011342afd925c3,2024-09-24T16:44:01.557000
|
||||
CVE-2024-4398,0,0,fee297010492d7a9d0bd198f00369fbc7ee85eff508879444e062d535e0abd54,2024-05-14T16:11:39.510000
|
||||
CVE-2024-43983,0,0,1129654801fd3266f7fe50d30c14628ba8e34277b02cfc392393ce4aaa513f92,2024-09-20T12:30:51.220000
|
||||
CVE-2024-43985,0,0,aa1c4ff43ee665dbdf84e97752be7025182a4441fda6e53b1528cb3015c4fd6e,2024-09-20T12:30:51.220000
|
||||
CVE-2024-43985,0,1,b30648ddb1d2b11b33385d41d42e62d1ebe2261e3847ee7222ca30a44e15ddae,2024-09-24T19:33:16.910000
|
||||
CVE-2024-43986,0,0,9478adfda55868d7b94f2eea7c2c936b95469666be97191a74de84a03c2187a9,2024-08-29T13:25:27.537000
|
||||
CVE-2024-43987,0,0,5f2ad565a5d32bae37360bc37876e8a6cdef75055ca9a1d57a5047cb69a7250c,2024-09-20T12:30:51.220000
|
||||
CVE-2024-43988,0,0,58810a59167a152a28df3aac148f6a81b7e962eeb8f36cca2c04029c80f728ba,2024-09-20T12:30:51.220000
|
||||
@ -259346,7 +259346,7 @@ CVE-2024-4400,0,0,387fe642c8f26702c425b79a01d9b1ba308ec0bd188f1564ff2c4908751331
|
||||
CVE-2024-44001,0,0,43db0f88c3e640d31c1ced26a25fee31b35f13afe37712fdf24ec0f8f0863bb5,2024-09-20T12:30:51.220000
|
||||
CVE-2024-44002,0,0,78aabec616bf445add31137b546b3614b9511be8a441ab676da5dce9d6232c6b,2024-09-20T12:30:51.220000
|
||||
CVE-2024-44003,0,0,2744e27ce4993c02a8ad8b34984a99e1a86eb64e2a65d6dacdbd3f08ce311e94,2024-09-20T12:30:51.220000
|
||||
CVE-2024-44004,0,0,b99a13d77777e37b259313f217514c0ca7d604751c8fe558b73fc3da3d8258d6,2024-09-20T12:30:51.220000
|
||||
CVE-2024-44004,0,1,aa050c3ee15a31d1070dbd236f7b72cf53d90d76d0c2baff9d9ca9b4dc524727,2024-09-24T19:22:14.760000
|
||||
CVE-2024-44005,0,0,74a6df6258e6dee55074c5cdcb40f2b7a2782c98a0852d6f9e6d353d86509cf5,2024-09-20T12:30:51.220000
|
||||
CVE-2024-44007,0,0,25399a4387c6e910f1e31a22ecd7376eca59f06b5a84938f46c283649da686d9,2024-09-20T12:30:51.220000
|
||||
CVE-2024-44008,0,0,fab9f9caf57c4b8932c925160fa367471e20ceb27bb77110cf5e92702d0ff579,2024-09-20T12:30:51.220000
|
||||
@ -259370,7 +259370,7 @@ CVE-2024-4406,0,0,4d2edf89174eefb11c1e35948c69459d7b4d6dd1a09c10eb7a0704c1561ef9
|
||||
CVE-2024-44060,0,0,ea289f0bdc9789c9ec67d1508aa08afeb9f803f52099e34e6af184526da44eb7,2024-09-16T15:30:28.733000
|
||||
CVE-2024-44062,0,0,14538aba5f6d0cee1fffe23d891617a033aae9a8c2411d6855777f0a1a7aba3c,2024-09-16T15:30:28.733000
|
||||
CVE-2024-44063,0,0,d642b3fb89950affe44ef0b88153cbec24d22c27c53a8da8ab9d205a291c0668,2024-09-16T15:30:28.733000
|
||||
CVE-2024-44064,0,0,2e5fb8d8b878db7db7ccf389ea4db3eaa76fdd1d43affb3324675a60f4935082,2024-09-20T12:30:51.220000
|
||||
CVE-2024-44064,0,1,4e74c010eb0f0db49dd4385b0641f0bed56c75cde28c530ba6b3d37d998a5b5d,2024-09-24T18:15:30.537000
|
||||
CVE-2024-44067,0,0,f6acc392be4d580c3750239c741db14e9e0b23cb38f1820ef772266e93e1673a,2024-08-20T20:35:34.497000
|
||||
CVE-2024-44069,0,0,2eb956dd06d71bb925b0fe816cbe078cd7c5c9a8647e07e8d081256cc543fa9f,2024-08-19T12:59:59.177000
|
||||
CVE-2024-44070,0,0,897c04ba9a67e5ea511bddee651919522720d2ac02cb9c6411d8cfecd25984e1,2024-08-30T16:19:49.587000
|
||||
@ -259408,21 +259408,21 @@ CVE-2024-44127,0,0,dd0c6b9721104380f6a5b85cab540e81cef5152e26883b5789fde70c5e555
|
||||
CVE-2024-44128,0,0,0d066e39a9d2e85c653bba4cb69edb057d90c1a06e2e2de543fb82ec551e1666,2024-09-20T12:31:20.110000
|
||||
CVE-2024-44129,0,0,e53a9ce09955a665419f7026ace3914c7b269c25d0abbbe77b9d291ebff0baa1,2024-09-20T12:31:20.110000
|
||||
CVE-2024-4413,0,0,63e6df043fde5eb9cf937a1f1c34414009dec10f116b4c7a5421dbd8a403038d,2024-05-14T16:11:39.510000
|
||||
CVE-2024-44130,0,0,b860a41cc74f8cdb030d0762c448bbce0f404e56008223c8cc73a7b3a27447c2,2024-09-20T12:31:20.110000
|
||||
CVE-2024-44131,0,0,616a6306e83c59df35b7c762f574080ddc1fb5a715c9e09a09ecfcb6996b25e3,2024-09-20T12:31:20.110000
|
||||
CVE-2024-44130,0,1,f4e89b68598385cc10c7257ab5a15425ed9bf99a914c2f9da983ff94c809a0d7,2024-09-24T18:49:47.557000
|
||||
CVE-2024-44131,0,1,e8738fd0c6ae001394ef8981882c811c82e7272ea012840137fc1618fe06c3bc,2024-09-24T19:01:55.470000
|
||||
CVE-2024-44132,0,0,025bc39178c8aaeeedde19fa86578cab56517e73471c42ea3a47af8718cfd908,2024-09-20T12:31:20.110000
|
||||
CVE-2024-44133,0,0,ffcc4c90a999a71b673f653ae8a0e753cd591c3f40af2bdbcfb5bfa0a8f912fb,2024-09-20T12:31:20.110000
|
||||
CVE-2024-44134,0,0,a07a476bf5dd298ab30484c09c84f519c218ca1ebb18d95a53c45b803a6ea88d,2024-09-20T12:31:20.110000
|
||||
CVE-2024-44133,0,1,37c73fbc80b87f8103d86196f929aadb6f994b40eadcbf5f51a2a2f17f44fe6e,2024-09-24T18:24:44.733000
|
||||
CVE-2024-44134,0,1,6acd0998d9e90144e37860d44f416ff49a5729889dc934ad2ba9b80a8196fb3c,2024-09-24T18:26:26.963000
|
||||
CVE-2024-44135,0,0,5965a57b9acfdbabd92fe864390d08c378d2b08941f576cb0b1177942ddb4946,2024-09-20T12:31:20.110000
|
||||
CVE-2024-44139,0,0,f8d0ba8be2f26827096f7c4b211f1011ab13a9b5f5d8a5a599b88274df2fe4b0,2024-09-20T12:31:20.110000
|
||||
CVE-2024-44146,0,1,c66454fdf1b0d7a7564849f02f2f09da6c49b1097620ca2f5b88a9c465a751e4,2024-09-24T16:14:02.090000
|
||||
CVE-2024-44139,0,1,1e5a55dd4e3bf6761362df168af8ec5360faa5b360c06fdbf37c0f9ce70d7baf,2024-09-24T18:30:34.863000
|
||||
CVE-2024-44146,0,0,c66454fdf1b0d7a7564849f02f2f09da6c49b1097620ca2f5b88a9c465a751e4,2024-09-24T16:14:02.090000
|
||||
CVE-2024-44147,0,0,8d82d5566ea29b70940c9c9f21d951cc6eb5498675d184ba22b8d555bbcad202,2024-09-20T12:31:20.110000
|
||||
CVE-2024-44148,0,1,059ce4bebff22300cb485a8cc23c3238cb5bdcfaba9ac22cf4f5aea163483afa,2024-09-24T16:09:49.490000
|
||||
CVE-2024-44148,0,0,059ce4bebff22300cb485a8cc23c3238cb5bdcfaba9ac22cf4f5aea163483afa,2024-09-24T16:09:49.490000
|
||||
CVE-2024-44149,0,0,74aaff5915c0b56b9c98602118066bf0aa596f3c8e7bf2a3d4da1c3225539bee,2024-09-24T15:58:38.770000
|
||||
CVE-2024-44151,0,1,54a719217bc8b8ee4e32503231faaae29cd72902e5e2fca3e1446643fb2185bc,2024-09-24T16:21:05.280000
|
||||
CVE-2024-44151,0,0,54a719217bc8b8ee4e32503231faaae29cd72902e5e2fca3e1446643fb2185bc,2024-09-24T16:21:05.280000
|
||||
CVE-2024-44152,0,0,b3dfe3e6aad4927c4120819b90ad93e4589e439a4acd3f9652fbd2503123fc62,2024-09-24T15:55:06.100000
|
||||
CVE-2024-44153,0,1,b4cd2fe3eed07a503bba11676bf795575e23a0692dcefb729ec0053f448cf187,2024-09-24T16:19:32.593000
|
||||
CVE-2024-44154,0,1,52420e716bdaf0c7fece3d5feef7b52e02f0f1fb32372b8f2d13dde79a13206d,2024-09-24T16:16:39.947000
|
||||
CVE-2024-44153,0,0,b4cd2fe3eed07a503bba11676bf795575e23a0692dcefb729ec0053f448cf187,2024-09-24T16:19:32.593000
|
||||
CVE-2024-44154,0,0,52420e716bdaf0c7fece3d5feef7b52e02f0f1fb32372b8f2d13dde79a13206d,2024-09-24T16:16:39.947000
|
||||
CVE-2024-44158,0,0,9d7e2fa5cd578734634a4ad7f07935a9c77533bae7cbf9b59ee2c2f082d12524,2024-09-24T15:50:25.083000
|
||||
CVE-2024-44160,0,0,111306ea6d5f4cd614ad1f97ebba8b9ebd1a48c26d38996100c4c5802f2b5bd6,2024-09-20T12:31:20.110000
|
||||
CVE-2024-44161,0,0,addbc514445e0c7292301d9de7a75e8bede0890df281f99ad80b419b4c502969,2024-09-20T12:31:20.110000
|
||||
@ -259436,22 +259436,22 @@ CVE-2024-44168,0,0,a0b9e33b35d889f897da896fb7c191ca4c99f7830c925f799140b17ef18fb
|
||||
CVE-2024-44169,0,0,1984dc39e10d51ae75d1eb4ce71ed44a0e161e0da261bb6e58a46f9336bba7e5,2024-09-20T12:31:20.110000
|
||||
CVE-2024-4417,0,0,9b4dc22c7f1e74f381016fafb921403ecdaeb7b3b80aa5fc2130db180ef5935c,2024-05-14T16:11:39.510000
|
||||
CVE-2024-44170,0,0,ad9c7ebf0677867158c66367ee67fb353ce44ea245452aff8d81c248a025d15c,2024-09-20T12:31:20.110000
|
||||
CVE-2024-44171,0,1,8849ab93a4e3d95b8d0c07b2a5929755d0774e3c1ebcd6d4c47f015cff90ac49,2024-09-24T16:22:38.880000
|
||||
CVE-2024-44171,0,0,8849ab93a4e3d95b8d0c07b2a5929755d0774e3c1ebcd6d4c47f015cff90ac49,2024-09-24T16:22:38.880000
|
||||
CVE-2024-44176,0,0,ba7f8b73267c9c45a3d8e8ca5968b7373044b3082c40552641c913654fc3e7d6,2024-09-20T12:31:20.110000
|
||||
CVE-2024-44177,0,1,4b644fb54bfe5bad82f56bfb2ac65172a558203c45040f662484a2178ef047ba,2024-09-24T16:28:09.853000
|
||||
CVE-2024-44178,0,1,8f3bedb3f1854b823e7d7c5ff9360a99b55c0a468dfebda9287f95f4dbce5848,2024-09-24T16:28:40.960000
|
||||
CVE-2024-44177,0,0,4b644fb54bfe5bad82f56bfb2ac65172a558203c45040f662484a2178ef047ba,2024-09-24T16:28:09.853000
|
||||
CVE-2024-44178,0,0,8f3bedb3f1854b823e7d7c5ff9360a99b55c0a468dfebda9287f95f4dbce5848,2024-09-24T16:28:40.960000
|
||||
CVE-2024-4418,0,0,b4bbbecff5b748c422c3d0ed121fdcb8cd9b2330acacbc04d39874726279d92b,2024-09-13T22:15:02.123000
|
||||
CVE-2024-44180,0,0,21cafe3f871f544ffbc1129f47115fe5101d1aff279092e56bacc98d9f72735c,2024-09-20T12:31:20.110000
|
||||
CVE-2024-44181,0,0,853b4c4e0553eb4d105d2b58b48901eab1bb091eb370adb3a05d7eb187a53f2b,2024-09-20T12:31:20.110000
|
||||
CVE-2024-44182,0,1,c8405a3d9209d8acdecd393b8c354b0a78369af6884ff3ac8bf0fb4d77988b16,2024-09-24T16:52:49.767000
|
||||
CVE-2024-44183,0,0,888fbfb072caf0d49188915dc6bd856f9e11d6cb91d62ef6a0dfe9ab161a7c03,2024-09-20T12:31:20.110000
|
||||
CVE-2024-44184,0,0,de0e6668ade6964b051d2235b41345c8a5f0a452f02df6a0ab24c5c4befe1c44,2024-09-20T12:31:20.110000
|
||||
CVE-2024-44186,0,0,9a86ae4ba99a26d085ee7869bbb0a851e649d0f6881deb2cf3b518804c3bebbd,2024-09-20T12:31:20.110000
|
||||
CVE-2024-44180,0,1,c2086039edb6d705b6272d3e2653c024b83da6bce5d70b87fb51c878c99c8331,2024-09-24T19:04:17.890000
|
||||
CVE-2024-44181,0,1,6968e89bcc34da95b275f481a5e61eaf93b419f4e1f0ac49b3eaa4255a65d455,2024-09-24T18:39:12.733000
|
||||
CVE-2024-44182,0,0,c8405a3d9209d8acdecd393b8c354b0a78369af6884ff3ac8bf0fb4d77988b16,2024-09-24T16:52:49.767000
|
||||
CVE-2024-44183,0,1,57b9818651cb417289cf4085c7f242935e44b16eacbd02a55d723c9720089da4,2024-09-24T19:04:51.030000
|
||||
CVE-2024-44184,0,1,2b4c62cacdeb539e2524aa34af1a6c1e7c1594f87082a2353399d1dc98f019f0,2024-09-24T19:03:08.110000
|
||||
CVE-2024-44186,0,1,0a6ed69346f4ae3547e173619f5fb32c164a57eccfeb66e3a57b038524695fd7,2024-09-24T18:03:45.513000
|
||||
CVE-2024-44187,0,0,b2cacf02341e442dbf4e00cfcfa5cbe1b0a709de7f1ce9cb6d9bd942234b3b65,2024-09-20T12:31:20.110000
|
||||
CVE-2024-44188,0,0,b2a3440baa16b57b0f734e737116e183650ca151c23c24ec7f3d1fde7d469ffd,2024-09-20T12:31:20.110000
|
||||
CVE-2024-44189,0,0,b81a0689db3aa4d1ebc169753f537d3e975cec8700a8abdf977615cf7b4c20d4,2024-09-20T12:31:20.110000
|
||||
CVE-2024-44189,0,1,e2ab737161ad2da12e67ce91184b5117737604e14075d78e50c43a3e20db6842,2024-09-24T18:33:02.477000
|
||||
CVE-2024-4419,0,0,918f3c0166609f9f9b771eac1f6aa12d317d90973a2d5ca4b8b94efa19c28169,2024-05-29T13:02:09.280000
|
||||
CVE-2024-44190,0,0,b33e490c672cf3dd084cec78eb2c7f8f03f5e9bf01c53fb5a8f2e5da6b7e809d,2024-09-20T12:31:20.110000
|
||||
CVE-2024-44190,0,1,5081ce2fbdd1649caaed595db236986bbee24e3cff5adfb1ad5f115afe6eab20,2024-09-24T18:02:25.313000
|
||||
CVE-2024-44191,0,0,9e7190477f5b53cdae1382f8881362b81dc3dc904a3ab39bb84ac8eeaa1923a3,2024-09-20T12:31:20.110000
|
||||
CVE-2024-44198,0,0,a791372ee4d27381da793bfaa9ff3602c34f52c134516fb46328053cb2cef47f,2024-09-24T15:45:32.787000
|
||||
CVE-2024-4420,0,0,02a774e6911ba5e1ba33187a3301eb3f9ee3d8fd212c89cee791dd002410f381,2024-05-21T12:37:59.687000
|
||||
@ -259909,9 +259909,9 @@ CVE-2024-45391,0,0,c0652f1ec0e9dea0f39468d3c42e674057f9b22af075a6d571376b54ca58c
|
||||
CVE-2024-45392,0,0,9fbc5e30fa3bc562debe7349b4449c2781517f74b4c1565d7b7acedf814cb2c0,2024-09-06T13:24:34.353000
|
||||
CVE-2024-45393,0,0,6f436bc32d420db4f8aef33efc64d5a86243ff621c73802c298c0db31d80b7a3,2024-09-10T15:50:47.237000
|
||||
CVE-2024-45394,0,0,bfa856fd3910cd158abdb0649aaa3b144a57df0415e22d97c0d54c8ae8371de9,2024-09-17T13:26:42.567000
|
||||
CVE-2024-45395,0,1,5d56a4af61ec059101686b1e7cb37e5e2b811fdef7d02e3f80cc3ab9c9de60ec,2024-09-24T16:50:07.930000
|
||||
CVE-2024-45395,0,0,5d56a4af61ec059101686b1e7cb37e5e2b811fdef7d02e3f80cc3ab9c9de60ec,2024-09-24T16:50:07.930000
|
||||
CVE-2024-45398,0,0,8276e24674af00e92c8170d01c29766b42947cb457801bfc8ec4aa9033ee4a96,2024-09-20T12:30:51.220000
|
||||
CVE-2024-45399,0,1,00e25ddf2914c9fa87aad2e5386f06040c0acda61d936c8ae5f89b710f3a24c9,2024-09-24T16:48:10.083000
|
||||
CVE-2024-45399,0,0,00e25ddf2914c9fa87aad2e5386f06040c0acda61d936c8ae5f89b710f3a24c9,2024-09-24T16:48:10.083000
|
||||
CVE-2024-4540,0,0,56ac6cff101cc91d96d8daf4bfda0c052b655471dc0698e77d798366d59b9124,2024-06-03T23:15:08.930000
|
||||
CVE-2024-45400,0,0,23d149ef7bada976fce9d2c89ea0cb38e5ff315577519b49e805da7db09942df,2024-09-19T18:04:36.627000
|
||||
CVE-2024-45401,0,0,954ab622986edfe93d770dee5aae8a96aecaff4645097c85021d65007f0d9f05,2024-09-19T18:12:52.220000
|
||||
@ -260066,7 +260066,7 @@ CVE-2024-45807,0,0,0583ab979f5125f3c1777b86424a8cca2418c3c516284529f50828ffaa393
|
||||
CVE-2024-45808,0,0,fcd02d4bc62e64bc1e1b5e25085baa0bdf51fdc7c6386ccd327c0759771739d2,2024-09-20T12:30:17.483000
|
||||
CVE-2024-45809,0,0,e9f04b8fbdb0116d6fc70686fc64f2e85ea2b3e5d7f14284dfca7d48a3e43728,2024-09-20T12:30:17.483000
|
||||
CVE-2024-4581,0,0,87f8fe03f507957c50ab3e12c65c26f01a42761aed681f779ccb3bf731c25cc4,2024-06-04T16:57:41.053000
|
||||
CVE-2024-45810,0,0,fbc1b372e94f52e52e639a410bd94bf265367e88af6bb1312efb3b744cdf26c5,2024-09-20T12:30:17.483000
|
||||
CVE-2024-45810,0,1,2c07def9e565fb1be9ff61f66b9422d8dc435c56937db2ea8df79036719b50e7,2024-09-24T19:48:22.993000
|
||||
CVE-2024-45811,0,0,f51e9eeb83849f3505d43c222760648244f1cc1e2124b122ea4b078bd6eb7f1d,2024-09-20T12:30:51.220000
|
||||
CVE-2024-45812,0,0,489679080c302c07130a30d30d7a91b5b88da7ba1022d4140c8924855fd12313,2024-09-20T12:30:51.220000
|
||||
CVE-2024-45813,0,0,98386851201b0e15badf0fa3bf589a7fa5db9873ebefbf247a44caa5f088f23f,2024-09-20T12:30:17.483000
|
||||
@ -260163,7 +260163,7 @@ CVE-2024-46374,0,0,6b3bef89b591c7aace46c8ec89775c521763f5b17ab41ae31cfbeab497067
|
||||
CVE-2024-46375,0,0,efaf3c452fc78cd47f1de30f27156020a55e9f97430000be5918d84fee1dff32,2024-09-20T12:30:17.483000
|
||||
CVE-2024-46376,0,0,f3c4758540f2ac7c03838f8eccd3f67c9d25fd080cb7169c664824c92406ddbc,2024-09-20T12:30:17.483000
|
||||
CVE-2024-46377,0,0,dbd66064786bd129c8f0daf0f8e37ec51d021bf976974fef51557cd63106242d,2024-09-20T12:30:17.483000
|
||||
CVE-2024-4638,0,1,fdd077899626129e208d16f53a9a5482358eca01d91f2895388a2a3863f13467,2024-09-24T17:13:43.997000
|
||||
CVE-2024-4638,0,0,fdd077899626129e208d16f53a9a5482358eca01d91f2895388a2a3863f13467,2024-09-24T17:13:43.997000
|
||||
CVE-2024-46382,0,0,d58e1ea27f21cfd47bdd0489944511f3488ae805b6df4b21cae37b2aaa67b3bc,2024-09-20T12:30:17.483000
|
||||
CVE-2024-4639,0,0,63d049eee594beebe77a9774e9d66b077e03fa99e5b29364c893c36c24e6ccaf,2024-09-18T15:46:04.960000
|
||||
CVE-2024-46394,0,0,0cb3fe3a4b01a54d8b30c75c71beb8830d2ea64caa3449cc0a9fec5e06be42b1,2024-09-20T12:30:17.483000
|
||||
@ -260187,43 +260187,43 @@ CVE-2024-4653,0,0,7b6d5c0913690c5b51d844fc9718b4208eaa5f352f244fd41eee7be1add5e3
|
||||
CVE-2024-4654,0,0,0088d34096b2578204ff98fe71c1f702e4c8866653411407f72fe940a56448df,2024-06-04T19:20:45.100000
|
||||
CVE-2024-46544,0,0,d47ff95af97ce8e0d20920cd73cfea5ffcd92c9a1e859a54b085761d2e60fda3,2024-09-23T11:15:10.563000
|
||||
CVE-2024-4655,0,0,95970f39f135367edf16c40c69bbdd98999f38726ef0802da749dedbafaa6dbb,2024-08-01T13:59:32.490000
|
||||
CVE-2024-46550,0,1,fabf02166a8c8c33c1e426eb484bdd92b929c3c43f794ca555b97f11e025fe2e,2024-09-24T16:42:25.057000
|
||||
CVE-2024-46551,0,1,7660e44e84b32e009845871d8384f85d8a68355b89c08ffdaab432d6ee39b978,2024-09-24T16:41:38.327000
|
||||
CVE-2024-46552,0,1,b9f9fd3817fa3d5ac47213ff13148a07dd4cc5b0cfc6c6190e57ca296b612b4b,2024-09-24T16:41:40.170000
|
||||
CVE-2024-46553,0,1,22409a4939fdb12d94454c5f996764c485d76b0c0b97059d1ae56c9ffb358ae6,2024-09-24T16:41:41.600000
|
||||
CVE-2024-46554,0,1,6d2667102ba3d9b74b2734a930dc0b7b5c334335984771b31148ea3d7e61b049,2024-09-24T16:41:42.943000
|
||||
CVE-2024-46555,0,1,5ecb06ce94c0d4beaeb03f95babc2d042a0a162793d1df5a508283e08dc31dd0,2024-09-24T16:41:44.893000
|
||||
CVE-2024-46556,0,1,b4c79c0fa90c3f60b9d6af5211b5faa11accf02d88884ad66b5a38bd183ee2a6,2024-09-24T16:41:46.957000
|
||||
CVE-2024-46557,0,1,4dd988b920124916df7b740d8eefc1d27409f6ce14ae30d9a74e1440a0d2f9c3,2024-09-24T16:41:48.527000
|
||||
CVE-2024-46558,0,1,178347c8dbea68035a89ad98dcdaae7f811c6faadc8f61f464eb2d4ca0d08efb,2024-09-24T16:41:49.970000
|
||||
CVE-2024-46559,0,1,3f9106956e08313f4f66a11df62a54a96ae5b966c7411863468584677fbbf946,2024-09-24T16:41:51.380000
|
||||
CVE-2024-46550,0,0,fabf02166a8c8c33c1e426eb484bdd92b929c3c43f794ca555b97f11e025fe2e,2024-09-24T16:42:25.057000
|
||||
CVE-2024-46551,0,0,7660e44e84b32e009845871d8384f85d8a68355b89c08ffdaab432d6ee39b978,2024-09-24T16:41:38.327000
|
||||
CVE-2024-46552,0,0,b9f9fd3817fa3d5ac47213ff13148a07dd4cc5b0cfc6c6190e57ca296b612b4b,2024-09-24T16:41:40.170000
|
||||
CVE-2024-46553,0,0,22409a4939fdb12d94454c5f996764c485d76b0c0b97059d1ae56c9ffb358ae6,2024-09-24T16:41:41.600000
|
||||
CVE-2024-46554,0,0,6d2667102ba3d9b74b2734a930dc0b7b5c334335984771b31148ea3d7e61b049,2024-09-24T16:41:42.943000
|
||||
CVE-2024-46555,0,0,5ecb06ce94c0d4beaeb03f95babc2d042a0a162793d1df5a508283e08dc31dd0,2024-09-24T16:41:44.893000
|
||||
CVE-2024-46556,0,0,b4c79c0fa90c3f60b9d6af5211b5faa11accf02d88884ad66b5a38bd183ee2a6,2024-09-24T16:41:46.957000
|
||||
CVE-2024-46557,0,0,4dd988b920124916df7b740d8eefc1d27409f6ce14ae30d9a74e1440a0d2f9c3,2024-09-24T16:41:48.527000
|
||||
CVE-2024-46558,0,0,178347c8dbea68035a89ad98dcdaae7f811c6faadc8f61f464eb2d4ca0d08efb,2024-09-24T16:41:49.970000
|
||||
CVE-2024-46559,0,0,3f9106956e08313f4f66a11df62a54a96ae5b966c7411863468584677fbbf946,2024-09-24T16:41:51.380000
|
||||
CVE-2024-4656,0,0,32c9d7e0c2f1168ca7d7381e4fab827ca08fdbd964272924da1671d43db7cf43,2024-05-15T16:40:19.330000
|
||||
CVE-2024-46560,0,1,9128b5d94a716a8c813ddac77c0f4dd402a4ad4aeb57649e305cd3f7c443d776,2024-09-24T16:41:52.840000
|
||||
CVE-2024-46561,0,1,097969747683fff09623c9f2ae2f2765925fc75cc99773c5749b5ae3fffe8c07,2024-09-24T16:41:54.337000
|
||||
CVE-2024-46564,0,1,67c242fef917b635d154166c2bd18bc319e38137e8cd296915cc6755f1ab43a3,2024-09-24T16:41:55.907000
|
||||
CVE-2024-46565,0,1,66b2d0d6228a7c5a2d4ccc7ad93a78f84212bb6cc08e71806aef1bcd5a1e1645,2024-09-24T16:41:57.440000
|
||||
CVE-2024-46566,0,1,ef325864839d5d2a7c7484211bd16ddf5a2b8bc0be80252bca80b3d5f7f77da3,2024-09-24T16:41:58.953000
|
||||
CVE-2024-46567,0,1,dedf59b7bdc5b2e51a36cbc666014cae7f626ef481966bf02a77cd072fada268,2024-09-24T16:42:00.340000
|
||||
CVE-2024-46568,0,1,2301bebc09919b1fb68167c3b63854080045492699033fe0b4e9e2e63dbdb0e5,2024-09-24T16:42:01.687000
|
||||
CVE-2024-46571,0,1,d8c3af383191fcf5562e605a727b1592f14cb20acc9bc8714597971ea66958fd,2024-09-24T16:42:03.157000
|
||||
CVE-2024-46580,0,1,4ef81a3a666be4ae5d59b8240dbfdd552f675698f9d209378d8692d698660973,2024-09-24T16:42:09.207000
|
||||
CVE-2024-46581,0,1,16117c2b2643f1e7cb6f228f7ad68d76a739f5581aa486deed15d00461c03fe3,2024-09-24T16:41:36.533000
|
||||
CVE-2024-46582,0,1,4dc729b9802e75f61b77ace705aeb5edeb4d2f366d0a6bce4afc576e2ee3fa8e,2024-09-24T16:41:29.377000
|
||||
CVE-2024-46583,0,1,65c93973030940c83ab7dd845ef9bcb5526b511795d240e1432a58a0c7b33dbb,2024-09-24T16:40:48.437000
|
||||
CVE-2024-46584,0,1,bbdf8514671d494027aa75057cd6837f682ac1339d12f17b2ded2bff8b3fab7d,2024-09-24T16:40:50.223000
|
||||
CVE-2024-46585,0,1,e7ad1ff8df7840bc670010c022032d2550a6e2180dabed1bd9cae3378122597f,2024-09-24T16:40:52.817000
|
||||
CVE-2024-46586,0,1,833589886fc2c04bae2b847602220cea0488e52d6ba1bd422cdca799676b533c,2024-09-24T16:40:54.183000
|
||||
CVE-2024-46588,0,1,7cc6766d0037114ad39936ae333d3937ff51c07ed14776be693cc7a6a6f4ccfb,2024-09-24T16:40:55.433000
|
||||
CVE-2024-46589,0,1,a232d99c4f7a78659e1e7c4f240651f73f5dc2ccaa1ae924cea96528c6900ee9,2024-09-24T16:40:56.763000
|
||||
CVE-2024-46560,0,0,9128b5d94a716a8c813ddac77c0f4dd402a4ad4aeb57649e305cd3f7c443d776,2024-09-24T16:41:52.840000
|
||||
CVE-2024-46561,0,0,097969747683fff09623c9f2ae2f2765925fc75cc99773c5749b5ae3fffe8c07,2024-09-24T16:41:54.337000
|
||||
CVE-2024-46564,0,0,67c242fef917b635d154166c2bd18bc319e38137e8cd296915cc6755f1ab43a3,2024-09-24T16:41:55.907000
|
||||
CVE-2024-46565,0,0,66b2d0d6228a7c5a2d4ccc7ad93a78f84212bb6cc08e71806aef1bcd5a1e1645,2024-09-24T16:41:57.440000
|
||||
CVE-2024-46566,0,0,ef325864839d5d2a7c7484211bd16ddf5a2b8bc0be80252bca80b3d5f7f77da3,2024-09-24T16:41:58.953000
|
||||
CVE-2024-46567,0,0,dedf59b7bdc5b2e51a36cbc666014cae7f626ef481966bf02a77cd072fada268,2024-09-24T16:42:00.340000
|
||||
CVE-2024-46568,0,0,2301bebc09919b1fb68167c3b63854080045492699033fe0b4e9e2e63dbdb0e5,2024-09-24T16:42:01.687000
|
||||
CVE-2024-46571,0,0,d8c3af383191fcf5562e605a727b1592f14cb20acc9bc8714597971ea66958fd,2024-09-24T16:42:03.157000
|
||||
CVE-2024-46580,0,0,4ef81a3a666be4ae5d59b8240dbfdd552f675698f9d209378d8692d698660973,2024-09-24T16:42:09.207000
|
||||
CVE-2024-46581,0,0,16117c2b2643f1e7cb6f228f7ad68d76a739f5581aa486deed15d00461c03fe3,2024-09-24T16:41:36.533000
|
||||
CVE-2024-46582,0,0,4dc729b9802e75f61b77ace705aeb5edeb4d2f366d0a6bce4afc576e2ee3fa8e,2024-09-24T16:41:29.377000
|
||||
CVE-2024-46583,0,0,65c93973030940c83ab7dd845ef9bcb5526b511795d240e1432a58a0c7b33dbb,2024-09-24T16:40:48.437000
|
||||
CVE-2024-46584,0,0,bbdf8514671d494027aa75057cd6837f682ac1339d12f17b2ded2bff8b3fab7d,2024-09-24T16:40:50.223000
|
||||
CVE-2024-46585,0,0,e7ad1ff8df7840bc670010c022032d2550a6e2180dabed1bd9cae3378122597f,2024-09-24T16:40:52.817000
|
||||
CVE-2024-46586,0,0,833589886fc2c04bae2b847602220cea0488e52d6ba1bd422cdca799676b533c,2024-09-24T16:40:54.183000
|
||||
CVE-2024-46588,0,0,7cc6766d0037114ad39936ae333d3937ff51c07ed14776be693cc7a6a6f4ccfb,2024-09-24T16:40:55.433000
|
||||
CVE-2024-46589,0,0,a232d99c4f7a78659e1e7c4f240651f73f5dc2ccaa1ae924cea96528c6900ee9,2024-09-24T16:40:56.763000
|
||||
CVE-2024-46590,0,0,a6b25664b93f68894ffc206b74bc4224b8926e6d56d3d0e4f1fbd23ae41d0f56,2024-09-24T15:23:47.237000
|
||||
CVE-2024-46591,0,1,9fee9cd4e22e56d7419ab5a0575e86c1f61adce0bbef224bb096f32b9d5e0cdb,2024-09-24T16:40:58.790000
|
||||
CVE-2024-46592,0,1,7c172fcd5fb31284b05e2918a6ddae86232b5bf425db59a5b035a07950038cc1,2024-09-24T16:41:00.260000
|
||||
CVE-2024-46593,0,1,e3da7c49a603ee2b0e2b1db240fcae5e0278eabbf2a77561a274557f4f79994d,2024-09-24T16:41:02.327000
|
||||
CVE-2024-46594,0,1,eec34225fe0762b510492fcf8aa01a24274b3f14427ee03e6664e4b96a715db4,2024-09-24T16:41:04.160000
|
||||
CVE-2024-46595,0,1,9d5a3921d4e1c9ff2060231027e6cde8b490b1d5bd0dcf9e981bc4821bbe47fe,2024-09-24T16:41:05.947000
|
||||
CVE-2024-46596,0,1,ad9c8b28bdb98700f500b3744a438a4de82660bb3bab40faf707c89a0cad0921,2024-09-24T16:41:07.350000
|
||||
CVE-2024-46597,0,1,8f236358fa12b20d7d532e9a104df6fc7e0ce7ec4a140308bc23ebcdc16146c6,2024-09-24T16:41:09.457000
|
||||
CVE-2024-46598,0,1,3f997be93c6377cc697c394dfc90ddad6cd8938191b35fea7934308cfcf432e0,2024-09-24T16:37:39.833000
|
||||
CVE-2024-46591,0,0,9fee9cd4e22e56d7419ab5a0575e86c1f61adce0bbef224bb096f32b9d5e0cdb,2024-09-24T16:40:58.790000
|
||||
CVE-2024-46592,0,0,7c172fcd5fb31284b05e2918a6ddae86232b5bf425db59a5b035a07950038cc1,2024-09-24T16:41:00.260000
|
||||
CVE-2024-46593,0,0,e3da7c49a603ee2b0e2b1db240fcae5e0278eabbf2a77561a274557f4f79994d,2024-09-24T16:41:02.327000
|
||||
CVE-2024-46594,0,0,eec34225fe0762b510492fcf8aa01a24274b3f14427ee03e6664e4b96a715db4,2024-09-24T16:41:04.160000
|
||||
CVE-2024-46595,0,0,9d5a3921d4e1c9ff2060231027e6cde8b490b1d5bd0dcf9e981bc4821bbe47fe,2024-09-24T16:41:05.947000
|
||||
CVE-2024-46596,0,0,ad9c8b28bdb98700f500b3744a438a4de82660bb3bab40faf707c89a0cad0921,2024-09-24T16:41:07.350000
|
||||
CVE-2024-46597,0,0,8f236358fa12b20d7d532e9a104df6fc7e0ce7ec4a140308bc23ebcdc16146c6,2024-09-24T16:41:09.457000
|
||||
CVE-2024-46598,0,0,3f997be93c6377cc697c394dfc90ddad6cd8938191b35fea7934308cfcf432e0,2024-09-24T16:37:39.833000
|
||||
CVE-2024-4660,0,0,e2da4ceee6df96a1cb7e9b187d6ffc85e3946e3cc1d921567db2bce412f91772,2024-09-14T14:57:01.130000
|
||||
CVE-2024-4661,0,0,f19406aac3e0e4dd229494d2c7f4a9ae6fd94c8256be755b3955222db7d3bf70,2024-06-10T02:52:08.267000
|
||||
CVE-2024-4662,0,0,42d3ec88d759fc9bf88fc92972e0c9891830916b90a0cdbb0331ad5486f420dd,2024-05-24T01:15:30.977000
|
||||
@ -260374,7 +260374,7 @@ CVE-2024-4679,0,0,9bfb1104bd992ff014fab2b1166f6f818504f2232183224a6a702e4c44b211
|
||||
CVE-2024-46790,0,0,d27eade819ed2fd15185afc828dfb8999a9cfdae3e96ed34fd07c06d351f85e6,2024-09-20T12:30:51.220000
|
||||
CVE-2024-46791,0,0,2949ee11720d44bcaa052e660ce7fdc2dacadc36031963879d79e5b14b90b05b,2024-09-20T18:21:19.457000
|
||||
CVE-2024-46792,0,0,5038c4c1693692d5253e8551ff854391bb6738497f066bf8f1ac22d03388831f,2024-09-20T12:30:51.220000
|
||||
CVE-2024-46793,0,1,5452cb2817c8065947f735ef97ead551e1c7be7210a5f52312096dcde22888bc,2024-09-24T16:00:17.977000
|
||||
CVE-2024-46793,0,0,5452cb2817c8065947f735ef97ead551e1c7be7210a5f52312096dcde22888bc,2024-09-24T16:00:17.977000
|
||||
CVE-2024-46794,0,0,4a5040d28c02875cb7f0ceba00353539020b8be79b10a6b6826a3f96b115ba34,2024-09-20T12:30:51.220000
|
||||
CVE-2024-46795,0,0,55d6e0bba7bd481c945e6a93dbfcd32f89fd250eb3ae7b4fbde929ae04db9d69,2024-09-20T18:21:04.067000
|
||||
CVE-2024-46796,0,0,28472ecdbcd97592496f972f38ed0e2707ca54f7f2402c660d26ed0e341ec07d,2024-09-20T18:20:35.837000
|
||||
@ -260414,8 +260414,8 @@ CVE-2024-46982,0,0,3d9f669d24afb928408eff7284c81bba148f4b4b0d8de4608d668ca1c9286
|
||||
CVE-2024-46983,0,0,acaa55f24871e509b77d1e06f663550a224b0f8e1fdd17d482c575b8d54a8432,2024-09-20T12:30:17.483000
|
||||
CVE-2024-46984,0,0,a2d03b7a5561555bfe246598e474bdc74be23a5595876ca1a73ac153425b0c5b,2024-09-20T12:30:17.483000
|
||||
CVE-2024-46985,0,0,152de56e5c06dc44c656be325fda3eba217d7b9fb216b9fe4063b28a1b887280,2024-09-23T16:15:06.097000
|
||||
CVE-2024-46986,0,1,b1e8ecab8ee8344e09d3e8f66f5ec81add204bc763f66591964d8fcd8895b71d,2024-09-24T16:30:55.167000
|
||||
CVE-2024-46987,0,1,3e51e4a66f91f3c1a320e0df76dd0f9bd2a4c4e56143ff227719b395a8a10371,2024-09-24T16:27:30.457000
|
||||
CVE-2024-46986,0,0,b1e8ecab8ee8344e09d3e8f66f5ec81add204bc763f66591964d8fcd8895b71d,2024-09-24T16:30:55.167000
|
||||
CVE-2024-46987,0,0,3e51e4a66f91f3c1a320e0df76dd0f9bd2a4c4e56143ff227719b395a8a10371,2024-09-24T16:27:30.457000
|
||||
CVE-2024-46989,0,0,fa29cba3c1dce457e1dbba7936349383199f9bdd1c6535b099705e0bc06fa139,2024-09-20T12:30:17.483000
|
||||
CVE-2024-4699,0,0,094a3293d1ad6c00b8f42deb1643b829befd633ab0dcef49a183da331debaad7,2024-08-06T19:15:57.580000
|
||||
CVE-2024-46990,0,0,a651df2006ba8ce24b06699e6e89ccb4decc32abf73ae7975ae4d0581b357bf8,2024-09-20T12:30:17.483000
|
||||
@ -260455,10 +260455,10 @@ CVE-2024-4712,0,0,8c9912a72fdb973e445c03f0c431e473f67586d80716ea23b3c04f9af648d8
|
||||
CVE-2024-4713,0,0,a3c96b0a67396332ccb3b3b7da032ec990741228737b0623d292fd0ff6dd150b,2024-06-04T19:20:46.913000
|
||||
CVE-2024-4714,0,0,d7e9d9d95d84a12a856ae94c0b47f221a8b241db6b1f0d94ea74b84fa1b36764,2024-06-04T19:20:47.027000
|
||||
CVE-2024-4715,0,0,8280b54df57d141f79c5c5ba7edbd4b8610f06a30ecbd5ba39cd6c268b4b3f05,2024-06-04T19:20:47.130000
|
||||
CVE-2024-47159,0,0,f184375d75f9237e6adcbcce4893d4eb720e06b1b14cb5ccab6f769fb0c8dfd3,2024-09-20T12:30:17.483000
|
||||
CVE-2024-47159,0,1,f629ab8645ae2d3b373e84498ebe22f56e42f569db9052d68376aa856c847502,2024-09-24T18:09:50.877000
|
||||
CVE-2024-4716,0,0,17dd73abada87214ed7c4da9787dcdd43aa5089416e4d3395c3029d4b8a776fa,2024-06-04T19:20:47.230000
|
||||
CVE-2024-47160,0,0,1bf51944cdbcb8016704530bf19bf5d8a509ca38f53f68892781dc69ccca39d8,2024-09-20T12:30:17.483000
|
||||
CVE-2024-47162,0,1,322233fc16cb60b7afacb06e9a8b8faccd2cf3bd8a5ab8537cf655de3bfbfae0,2024-09-24T17:57:43.827000
|
||||
CVE-2024-47160,0,1,c1aad4fed9b1c25a1ac730f435c0afe6164d933ac9e43b9a1caf75e24768ef64,2024-09-24T18:03:48.370000
|
||||
CVE-2024-47162,0,0,322233fc16cb60b7afacb06e9a8b8faccd2cf3bd8a5ab8537cf655de3bfbfae0,2024-09-24T17:57:43.827000
|
||||
CVE-2024-4717,0,0,7921e256cd1b57dcd690590999b44ca8d29db58a18405deda5f12fdfca691aaa,2024-05-17T02:40:34.317000
|
||||
CVE-2024-4718,0,0,2fda56f630ea417950b3260007ed553b407a44c514b05be289e283a21ee915c1,2024-06-06T20:15:14.717000
|
||||
CVE-2024-4719,0,0,5f15010ce3da97593d62bd8e5cbd7e4df0db8fec077945fcbb72e898184ff8a0,2024-06-20T20:15:19.763000
|
||||
@ -260944,7 +260944,7 @@ CVE-2024-5252,0,0,1b28d536afc88eae5088fe06ff49428bbad5ffcb2aa7139fe40c4c06d26014
|
||||
CVE-2024-5253,0,0,73f9562f224a9a11b8b8279a7bf00d920003fa046cb7c88a3a55caf281adabe4,2024-07-19T15:30:34.717000
|
||||
CVE-2024-5254,0,0,78882d871be0a19bc95888168cf12372f503de77ac359f287536c8f062c38532,2024-07-19T15:32:05.560000
|
||||
CVE-2024-5255,0,0,a9d47c22e8985fc8d8b40f4bef3272595484bdbc8485e44830cb58ee997ab90f,2024-07-19T15:32:18.850000
|
||||
CVE-2024-5256,0,0,5619000034c6176b4769ef36da5b4a995b1823fe79ca40c8a9d48815dc8505d1,2024-06-07T14:56:05.647000
|
||||
CVE-2024-5256,0,1,c0c79be075ef53b66bd4c726b840e366d70c6f0c56013178c0440e2e2bf91c1e,2024-09-24T18:41:40.007000
|
||||
CVE-2024-5257,0,0,e4fba0a5c9dc635ae9582dcee356a08c90165a6e8c8a0a01b6dfbef5e885cd24,2024-07-12T16:54:34.517000
|
||||
CVE-2024-5258,0,0,51134eb56f05332c584317818ff995de56b2de598a9752cb1990f31f73c535e3,2024-05-24T01:15:30.977000
|
||||
CVE-2024-5259,0,0,b3c664cd11ddb9db1b34b50011b18499fc5ac06e8b6b6a588e8cf7d8bc26fc37,2024-06-11T17:44:42.783000
|
||||
@ -260955,9 +260955,9 @@ CVE-2024-5263,0,0,997be873c6f28955b5d0d8cb5df3c06ebeb17c50a7068003806eac08a0ed28
|
||||
CVE-2024-5264,0,0,7660c1edaddd779c29789898410be8f6784b9b682f1b3f0cb339e7e58b29768e,2024-06-21T17:18:00.973000
|
||||
CVE-2024-5265,0,0,23ae6b699421b146407b64fc352f84f4385a86a37bc2f3798f85fec07534db6d,2024-07-02T14:51:36.407000
|
||||
CVE-2024-5266,0,0,0ac195748009e62b525761c49acf97f593b0c2f3ac01d138f9c93c4ef03661dd,2024-07-23T20:17:55.073000
|
||||
CVE-2024-5267,0,0,a769516b22167ee0870c637d71724e53d55e177aa4e722dd0e5f1a6f0131df75,2024-06-07T14:56:05.647000
|
||||
CVE-2024-5268,0,0,38f4dd509c8fb39492dd4dfed4d2becaa86b08bce6e26c84a406e821317bbb8b,2024-06-07T14:56:05.647000
|
||||
CVE-2024-5269,0,1,fcc703e959dc9fcd54d2dba10777aa46d0a7036a8f955bfd8c508426ccf0b225,2024-09-24T17:50:07.957000
|
||||
CVE-2024-5267,0,1,46668d154f6ef78d29586983d5d2edaa995ecd77518ea035f59ce7176b7147a1,2024-09-24T18:56:10.507000
|
||||
CVE-2024-5268,0,1,a6d8167214bc75f9071a59fc8bc107cab067c253ba36f8c70c02e602f94a1506,2024-09-24T18:47:03.597000
|
||||
CVE-2024-5269,0,0,fcc703e959dc9fcd54d2dba10777aa46d0a7036a8f955bfd8c508426ccf0b225,2024-09-24T17:50:07.957000
|
||||
CVE-2024-5270,0,0,7ec6ed8f215026bf9d30718594365eb1a902134340d8c0dfba08c80435c07d35,2024-05-28T12:39:28.377000
|
||||
CVE-2024-5271,0,0,7285855bafca9dd1fc033351db47cae9ea7831aeb2f80b9313f86f9100e15f62,2024-05-31T13:01:46.727000
|
||||
CVE-2024-5272,0,0,d387d985ee64cb70308558e1288744b27040b8f28ef99da7e8b0a0af44167dd6,2024-05-28T12:39:28.377000
|
||||
@ -262158,7 +262158,7 @@ CVE-2024-6679,0,0,193698b3a519c2de1af0fd23f7e404e2d54c730e4704d97d0092b63ef1c812
|
||||
CVE-2024-6680,0,0,131299d0989a76f846afb0c8ae15f4692f1a0fdd9931fad30c165660cd1232fc,2024-07-11T18:09:58.777000
|
||||
CVE-2024-6681,0,0,fd87484dafd740c0f788720b14149eb40f6b6d8ce371416d0e039ce9acf82071,2024-07-11T18:09:58.777000
|
||||
CVE-2024-6684,0,0,5077927f346cf8d394fd9a76287141cc3d9bbdc383e5155cbda2006a142ade04,2024-08-13T21:15:16.377000
|
||||
CVE-2024-6685,0,1,3e95e4b4cb3ba58e6a1b2640a09d0de9c483459f972256a859c95b3567460c86,2024-09-24T16:48:24.497000
|
||||
CVE-2024-6685,0,0,3e95e4b4cb3ba58e6a1b2640a09d0de9c483459f972256a859c95b3567460c86,2024-09-24T16:48:24.497000
|
||||
CVE-2024-6687,0,0,ff47b1397711b8cc3d93cfe454be390cc9012eec28a4b5d25b3eacdb0bcb37ed,2024-08-01T12:42:36.933000
|
||||
CVE-2024-6688,0,0,f3f1be58bd1e1f5bb790bc2c9a8d143be302970d5943f04009242d4003685b5b,2024-08-27T13:01:37.913000
|
||||
CVE-2024-6689,0,0,d40d4a6e022419e83ed34bb3a74eb0d24556e6d76f7b0a592f90775a9d52873c,2024-07-16T13:43:58.773000
|
||||
@ -262623,7 +262623,7 @@ CVE-2024-7313,0,0,d7b0f37e48710e5f5a7b78ed26ce477c46ecddb143fdd8dc8ca6d6152120ce
|
||||
CVE-2024-7314,0,0,64aaecd133deeb35ae51feed7f4d71099832a2945a1861cec1e5be771eb8caf9,2024-09-17T15:45:01.970000
|
||||
CVE-2024-7317,0,0,d290990c88ffba5acfc4fa1e36f444dec67bc90a1513331480ff821c55d2a98f,2024-08-06T16:30:24.547000
|
||||
CVE-2024-7318,0,0,3b07c549e5fb2dfd376a8d14b85e9bdf6d56cc8a33e82cf1a53a16bb45702ca6,2024-09-20T16:02:06.977000
|
||||
CVE-2024-7319,0,1,91324dd5cce8fc33151e2efd0732f449f761808f1b2abe94f46ca69302c16039,2024-09-24T17:00:00.917000
|
||||
CVE-2024-7319,0,0,91324dd5cce8fc33151e2efd0732f449f761808f1b2abe94f46ca69302c16039,2024-09-24T17:00:00.917000
|
||||
CVE-2024-7320,0,0,a6345ced50bd1b25dc54bd951c2133e1d51c039a215f4119dbfe976f4ac4ed65,2024-08-12T16:47:36.887000
|
||||
CVE-2024-7321,0,0,42cb7d687a3ea14a5f795d2e8dc1d36894e3cc4a44b6104596b7ddb427645e4e,2024-08-12T16:49:01.887000
|
||||
CVE-2024-7323,0,0,32d3f5cc66e0a9c10f985d2976b96494dd80ce13754e7e5d1a52713a0319dd02,2024-09-11T14:22:46.903000
|
||||
@ -263209,7 +263209,7 @@ CVE-2024-8141,0,0,d494eb4aa5e779d518a311786c18c827e0ced59860399587e09c025afdbaf1
|
||||
CVE-2024-8142,0,0,d4b24d12d326b40d1c063c9a3edca906c8e404b0436fcc16715466b79bbf260c,2024-08-26T19:08:38.493000
|
||||
CVE-2024-8144,0,0,8c217cf77629850f2a31ec00f7904f772883a591a54b72411e3d3cd24bcf1f00,2024-09-18T18:24:46.730000
|
||||
CVE-2024-8145,0,0,bd81408bdf46da0e2582ac2e30e29c3e5c1bfb2c062e1e74f1ce357731354e4f,2024-09-18T15:34:47.007000
|
||||
CVE-2024-8146,0,1,a2a80ffef156fb85ffee90216beed89480bdca821cd7147cd0b42bd2951a2961,2024-09-24T17:00:38.933000
|
||||
CVE-2024-8146,0,0,a2a80ffef156fb85ffee90216beed89480bdca821cd7147cd0b42bd2951a2961,2024-09-24T17:00:38.933000
|
||||
CVE-2024-8147,0,0,ec07f8c3276e9a222de07865fca93dea2ccb4507aaa042530afe8cfe5642dbe8,2024-09-11T18:37:20.670000
|
||||
CVE-2024-8150,0,0,ec5d1f8699fbdf60c07977f622d12947268f6e6a471ea831b69250e74a2f851f,2024-09-12T21:01:57.790000
|
||||
CVE-2024-8151,0,0,26d8e3379a0c527fc4fb8a6574b59e528f30af25daf5368f41a4697b5bf405ba,2024-08-26T19:07:54.247000
|
||||
@ -263583,7 +263583,7 @@ CVE-2024-8957,0,0,479bb87a5ce094312d7bf571ad4a1b1d6922673dde5733f096aa7041bc35da
|
||||
CVE-2024-8963,0,0,67fe8ea90f3163df4929d6782956d377bcadef461d17352cf475deabaa8fd4ad,2024-09-20T16:32:02.563000
|
||||
CVE-2024-8969,0,0,98dd6be27cce2c3412495467ecb9257ef6e673bce29c0f376bf0c342ca11f9e9,2024-09-20T12:30:51.220000
|
||||
CVE-2024-8986,0,0,072cf1f180fb390d1b4b3d2d50dea4c4259a9c38757ddb70b883e21ef9d81f01,2024-09-20T12:30:17.483000
|
||||
CVE-2024-9001,0,1,3414d6649893c69be27afcf1e3dc2327433e2ecaa7ac9013879a0b1b05bf0f03,2024-09-24T16:14:30.190000
|
||||
CVE-2024-9001,0,0,3414d6649893c69be27afcf1e3dc2327433e2ecaa7ac9013879a0b1b05bf0f03,2024-09-24T16:14:30.190000
|
||||
CVE-2024-9003,0,0,89e492cdf9625bcd402f2d372b84ed9d063d82d6c6e605d6ac046e5c4fddcb18,2024-09-20T12:30:17.483000
|
||||
CVE-2024-9004,0,0,94d0f2582229b176f297294b273867d83b4f75c60353b6fab8e5029183cf84e7,2024-09-23T17:29:20.827000
|
||||
CVE-2024-9006,0,0,805559a09583efeb06925be384f63cc093facd6e855c0ba9fc2043765aba904e,2024-09-20T12:30:17.483000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user