mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-08 03:27:17 +00:00
Auto-Update: 2024-05-22T14:01:39.152764+00:00
This commit is contained in:
parent
865d1b4233
commit
6c48f71f4a
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2020-35165",
|
||||
"sourceIdentifier": "security_alert@emc.com",
|
||||
"published": "2024-05-22T06:15:09.317",
|
||||
"lastModified": "2024-05-22T06:15:09.317",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-22T12:46:53.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-47433",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-05-22T07:15:08.347",
|
||||
"lastModified": "2024-05-22T07:15:08.347",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-22T12:46:53.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-47434",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-05-22T07:15:08.707",
|
||||
"lastModified": "2024-05-22T07:15:08.707",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-22T12:46:53.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-47435",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-05-22T07:15:08.790",
|
||||
"lastModified": "2024-05-22T07:15:08.790",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-22T12:46:53.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-47436",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-05-22T07:15:08.883",
|
||||
"lastModified": "2024-05-22T07:15:08.883",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-22T12:46:53.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-47437",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-05-22T07:15:08.997",
|
||||
"lastModified": "2024-05-22T07:15:08.997",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-22T12:46:53.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-47438",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-05-22T07:15:09.080",
|
||||
"lastModified": "2024-05-22T07:15:09.080",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-22T12:46:53.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-47439",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-05-22T07:15:09.163",
|
||||
"lastModified": "2024-05-22T07:15:09.163",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-22T12:46:53.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-47440",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-05-22T07:15:09.250",
|
||||
"lastModified": "2024-05-22T07:15:09.250",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-22T12:46:53.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-47441",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-05-22T07:15:09.340",
|
||||
"lastModified": "2024-05-22T07:15:09.340",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-22T12:46:53.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-47442",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-05-22T07:15:09.430",
|
||||
"lastModified": "2024-05-22T07:15:09.430",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-22T12:46:53.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-47443",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-05-22T07:15:09.570",
|
||||
"lastModified": "2024-05-22T07:15:09.570",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-22T12:46:53.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-47444",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-05-22T07:15:09.660",
|
||||
"lastModified": "2024-05-22T07:15:09.660",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-22T12:46:53.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-47445",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-05-22T07:15:09.733",
|
||||
"lastModified": "2024-05-22T07:15:09.733",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-22T12:46:53.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-47446",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-05-22T07:15:09.820",
|
||||
"lastModified": "2024-05-22T07:15:09.820",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-22T12:46:53.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-47447",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-05-22T07:15:09.897",
|
||||
"lastModified": "2024-05-22T07:15:09.897",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-22T12:46:53.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-47448",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-05-22T07:15:09.970",
|
||||
"lastModified": "2024-05-22T07:15:09.970",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-22T12:46:53.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-47449",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-05-22T07:15:10.050",
|
||||
"lastModified": "2024-05-22T07:15:10.050",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-22T12:46:53.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-47450",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-05-22T07:15:10.143",
|
||||
"lastModified": "2024-05-22T07:15:10.143",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-22T12:46:53.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-47451",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-05-22T07:15:10.220",
|
||||
"lastModified": "2024-05-22T07:15:10.220",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-22T12:46:53.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-47452",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-05-22T07:15:10.300",
|
||||
"lastModified": "2024-05-22T07:15:10.300",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-22T12:46:53.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-47453",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-05-22T07:15:10.380",
|
||||
"lastModified": "2024-05-22T07:15:10.380",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-22T12:46:53.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-47454",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-05-22T07:15:10.453",
|
||||
"lastModified": "2024-05-22T07:15:10.453",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-22T12:46:53.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-47455",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-05-22T07:15:10.530",
|
||||
"lastModified": "2024-05-22T07:15:10.530",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-22T12:46:53.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-47456",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-05-22T07:15:10.627",
|
||||
"lastModified": "2024-05-22T07:15:10.627",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-22T12:46:53.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-47457",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-05-22T07:15:10.710",
|
||||
"lastModified": "2024-05-22T07:15:10.710",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-22T12:46:53.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-47458",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-05-22T07:15:10.780",
|
||||
"lastModified": "2024-05-22T07:15:10.780",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-22T12:46:53.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-47459",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-05-22T07:15:10.863",
|
||||
"lastModified": "2024-05-22T07:15:10.863",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-22T12:46:53.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-47460",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-05-22T07:15:10.940",
|
||||
"lastModified": "2024-05-22T07:15:10.940",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-22T12:46:53.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-47461",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-05-22T07:15:11.040",
|
||||
"lastModified": "2024-05-22T07:15:11.040",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-22T12:46:53.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-47462",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-05-22T07:15:11.117",
|
||||
"lastModified": "2024-05-22T07:15:11.117",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-22T12:46:53.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-47463",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-05-22T07:15:11.193",
|
||||
"lastModified": "2024-05-22T07:15:11.193",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-22T12:46:53.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-47464",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-05-22T07:15:11.287",
|
||||
"lastModified": "2024-05-22T07:15:11.287",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-22T12:46:53.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-47465",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-05-22T07:15:11.367",
|
||||
"lastModified": "2024-05-22T07:15:11.367",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-22T12:46:53.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-47466",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-05-22T07:15:11.450",
|
||||
"lastModified": "2024-05-22T07:15:11.450",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-22T12:46:53.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-47467",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-05-22T07:15:11.533",
|
||||
"lastModified": "2024-05-22T07:15:11.533",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-22T12:46:53.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-47468",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-05-22T07:15:11.603",
|
||||
"lastModified": "2024-05-22T07:15:11.603",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-22T12:46:53.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-47469",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-05-22T07:15:11.690",
|
||||
"lastModified": "2024-05-22T07:15:11.690",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-22T12:46:53.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-47470",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-05-22T07:15:11.763",
|
||||
"lastModified": "2024-05-22T07:15:11.763",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-22T12:46:53.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-47471",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-05-22T07:15:11.847",
|
||||
"lastModified": "2024-05-22T07:15:11.847",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-22T12:46:53.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-47472",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-05-22T07:15:11.927",
|
||||
"lastModified": "2024-05-22T07:15:11.927",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-22T12:46:53.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-47473",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-05-22T07:15:12.027",
|
||||
"lastModified": "2024-05-22T07:15:12.027",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-22T12:46:53.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-47474",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-05-22T09:15:09.287",
|
||||
"lastModified": "2024-05-22T09:15:09.287",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-22T12:46:53.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-47475",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-05-22T09:15:09.370",
|
||||
"lastModified": "2024-05-22T09:15:09.370",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-22T12:46:53.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-47476",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-05-22T09:15:09.470",
|
||||
"lastModified": "2024-05-22T09:15:09.470",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-22T12:46:53.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-47477",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-05-22T09:15:09.677",
|
||||
"lastModified": "2024-05-22T09:15:09.677",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-22T12:46:53.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-47478",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-05-22T09:15:09.747",
|
||||
"lastModified": "2024-05-22T09:15:09.747",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-22T12:46:53.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-47479",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-05-22T09:15:09.817",
|
||||
"lastModified": "2024-05-22T09:15:09.817",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-22T12:46:53.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-47480",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-05-22T09:15:09.907",
|
||||
"lastModified": "2024-05-22T09:15:09.907",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-22T12:46:53.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-47481",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-05-22T09:15:10.070",
|
||||
"lastModified": "2024-05-22T09:15:10.070",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-22T12:46:53.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-47482",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-05-22T09:15:10.150",
|
||||
"lastModified": "2024-05-22T09:15:10.150",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-22T12:46:53.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-47483",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-05-22T09:15:10.227",
|
||||
"lastModified": "2024-05-22T09:15:10.227",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-22T12:46:53.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-47484",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-05-22T09:15:10.317",
|
||||
"lastModified": "2024-05-22T09:15:10.317",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-22T12:46:53.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-47485",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-05-22T09:15:10.503",
|
||||
"lastModified": "2024-05-22T09:15:10.503",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-22T12:46:53.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-47486",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-05-22T09:15:10.573",
|
||||
"lastModified": "2024-05-22T09:15:10.573",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-22T12:46:53.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-47487",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-05-22T09:15:10.633",
|
||||
"lastModified": "2024-05-22T09:15:10.633",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-22T12:46:53.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-47488",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-05-22T09:15:10.700",
|
||||
"lastModified": "2024-05-22T09:15:10.700",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-22T12:46:53.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-47489",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-05-22T09:15:10.770",
|
||||
"lastModified": "2024-05-22T09:15:10.770",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-22T12:46:53.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-47490",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-05-22T09:15:10.837",
|
||||
"lastModified": "2024-05-22T09:15:10.837",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-22T12:46:53.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-47491",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-05-22T09:15:10.917",
|
||||
"lastModified": "2024-05-22T09:15:10.917",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-22T12:46:53.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-47492",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-05-22T09:15:11.030",
|
||||
"lastModified": "2024-05-22T09:15:11.030",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-22T12:46:53.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-47493",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-05-22T09:15:11.100",
|
||||
"lastModified": "2024-05-22T09:15:11.100",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-22T12:46:53.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-47494",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-05-22T09:15:11.270",
|
||||
"lastModified": "2024-05-22T09:15:11.270",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-22T12:46:53.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-47495",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-05-22T09:15:11.353",
|
||||
"lastModified": "2024-05-22T09:15:11.353",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-22T12:46:53.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-47496",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-05-22T09:15:11.447",
|
||||
"lastModified": "2024-05-22T09:15:11.447",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-22T12:46:53.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-47497",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-05-22T09:15:11.513",
|
||||
"lastModified": "2024-05-22T09:15:11.513",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-22T12:46:53.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-47498",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-05-22T09:15:11.673",
|
||||
"lastModified": "2024-05-22T09:15:11.673",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-22T12:46:53.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,47 +2,14 @@
|
||||
"id": "CVE-2023-52830",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-05-21T16:15:20.670",
|
||||
"lastModified": "2024-05-21T16:53:56.550",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-05-22T12:15:09.470",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: Fix double free in hci_conn_cleanup\n\nsyzbot reports a slab use-after-free in hci_conn_hash_flush [1].\nAfter releasing an object using hci_conn_del_sysfs in the\nhci_conn_cleanup function, releasing the same object again\nusing the hci_dev_put and hci_conn_put functions causes a double free.\nHere's a simplified flow:\n\nhci_conn_del_sysfs:\n hci_dev_put\n put_device\n kobject_put\n kref_put\n kobject_release\n kobject_cleanup\n kfree_const\n kfree(name)\n\nhci_dev_put:\n ...\n kfree(name)\n\nhci_conn_put:\n put_device\n ...\n kfree(name)\n\nThis patch drop the hci_dev_put and hci_conn_put function\ncall in hci_conn_cleanup function, because the object is\nfreed in hci_conn_del_sysfs function.\n\nThis patch also fixes the refcounting in hci_conn_add_sysfs() and\nhci_conn_del_sysfs() to take into account device_add() failures.\n\nThis fixes CVE-2023-28464."
|
||||
"value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/3c4236f1b2a715e878a06599fa8b0cc21f165d28",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/53d61daf35b1bbf3ae06e852ee107aa2f05b3776",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/56a4fdde95ed98d864611155f6728983e199e198",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/5c53afc766e07098429520b7677eaa164b593451",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/87624b1f9b781549e69f92db7ede012a21cec275",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/a85fb91e3d728bdfc80833167e8162cce8bc7004",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/ba7088769800d9892a7e4f35c3137a5b3e65410b",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/fc666d1b47518a18519241cae213de1babd4a4ba",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
}
|
||||
]
|
||||
"references": []
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-6487",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-05-22T08:15:08.687",
|
||||
"lastModified": "2024-05-22T08:15:08.687",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-22T12:46:53.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-0451",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-05-22T04:15:09.130",
|
||||
"lastModified": "2024-05-22T04:15:09.130",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-22T12:46:53.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-0452",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-05-22T04:15:09.510",
|
||||
"lastModified": "2024-05-22T04:15:09.510",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-22T12:46:53.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-0453",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-05-22T04:15:09.757",
|
||||
"lastModified": "2024-05-22T04:15:09.757",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-22T12:46:53.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-0632",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-05-22T08:15:08.890",
|
||||
"lastModified": "2024-05-22T08:15:08.890",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-22T12:46:53.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-1446",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-05-22T07:15:12.147",
|
||||
"lastModified": "2024-05-22T07:15:12.147",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-22T12:46:53.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-1762",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-05-22T07:15:12.617",
|
||||
"lastModified": "2024-05-22T07:15:12.617",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-22T12:46:53.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2036",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-05-22T09:15:11.793",
|
||||
"lastModified": "2024-05-22T09:15:11.793",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-22T12:46:53.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2088",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-05-22T07:15:12.907",
|
||||
"lastModified": "2024-05-22T07:15:12.907",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-22T12:46:53.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-21683",
|
||||
"sourceIdentifier": "security@atlassian.com",
|
||||
"published": "2024-05-21T23:15:07.923",
|
||||
"lastModified": "2024-05-21T23:15:07.923",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-22T12:46:53.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2119",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-05-22T08:15:09.083",
|
||||
"lastModified": "2024-05-22T08:15:09.083",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-22T12:46:53.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2163",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-05-22T08:15:09.390",
|
||||
"lastModified": "2024-05-22T08:15:09.390",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-22T12:46:53.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-22273",
|
||||
"sourceIdentifier": "security@vmware.com",
|
||||
"published": "2024-05-21T18:15:08.993",
|
||||
"lastModified": "2024-05-21T18:15:08.993",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-22T12:46:53.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-22274",
|
||||
"sourceIdentifier": "security@vmware.com",
|
||||
"published": "2024-05-21T18:15:09.190",
|
||||
"lastModified": "2024-05-21T18:15:09.190",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-22T12:46:53.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-22275",
|
||||
"sourceIdentifier": "security@vmware.com",
|
||||
"published": "2024-05-21T18:15:09.383",
|
||||
"lastModified": "2024-05-21T18:15:09.383",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-22T12:46:53.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-25724",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-05-21T19:15:09.557",
|
||||
"lastModified": "2024-05-21T19:15:09.557",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-22T12:46:53.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In RTI Connext Professional 5.3.1 through 6.1.0 before 6.1.1, a buffer overflow in XML parsing from Routing Service, Recording Service, Queuing Service, and Cloud Discovery Service allows attackers to execute code with the affected service's privileges, compromise the service's integrity, leak sensitive information, or crash the service. These attacks could be done via a remote malicious RTPS message; a compromised call with malicious parameters to the RTI_RoutingService_new, rti::recording::Service, RTI_QueuingService_new, or RTI_CDS_Service_new public APIs; or a compromised local file system containing a malicious XML file."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En RTI Connext Professional 5.3.1 a 6.1.0 anterior a 6.1.1, un desbordamiento del b\u00fafer en el an\u00e1lisis XML del servicio de enrutamiento, el servicio de grabaci\u00f3n, el servicio de colas y el servicio de descubrimiento en la nube permite a los atacantes ejecutar c\u00f3digo con los privilegios del servicio afectado y comprometer la seguridad del servicio. integridad, filtrar informaci\u00f3n confidencial o bloquear el servicio. Estos ataques podr\u00edan realizarse a trav\u00e9s de un mensaje RTPS malicioso remoto; una llamada comprometida con par\u00e1metros maliciosos a las API p\u00fablicas RTI_RoutingService_new, rti::recording::Service, RTI_QueuingService_new o RTI_CDS_Service_new; o un sistema de archivos local comprometido que contiene un archivo XML malicioso."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2953",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-05-22T08:15:09.587",
|
||||
"lastModified": "2024-05-22T08:15:09.587",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-22T12:46:53.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-30419",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2024-05-22T05:15:52.137",
|
||||
"lastModified": "2024-05-22T05:15:52.137",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-22T12:46:53.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-30420",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2024-05-22T05:15:52.983",
|
||||
"lastModified": "2024-05-22T05:15:52.983",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-22T12:46:53.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-3066",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-05-22T06:15:12.843",
|
||||
"lastModified": "2024-05-22T06:15:12.843",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-22T12:46:53.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-31340",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2024-05-22T06:15:12.350",
|
||||
"lastModified": "2024-05-22T06:15:12.350",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-22T12:46:53.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-31394",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2024-05-22T05:15:53.053",
|
||||
"lastModified": "2024-05-22T05:15:53.053",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-22T12:46:53.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-31395",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2024-05-22T05:15:53.120",
|
||||
"lastModified": "2024-05-22T05:15:53.120",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-22T12:46:53.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-31396",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2024-05-22T05:15:53.183",
|
||||
"lastModified": "2024-05-22T05:15:53.183",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-22T12:46:53.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-31756",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-05-21T20:15:08.733",
|
||||
"lastModified": "2024-05-21T20:15:08.733",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-22T12:46:53.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in MarvinTest Solutions Hardware Access Driver v.5.0.3.0 and before and fixed in v.5.0.4.0 allows a local attacker to escalate privileges via the Hw65.sys component."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": " Un problema en MarvinTest Solutions Hardware Access Driver v.5.0.3.0 y anteriores y solucionado en v.5.0.4.0 permite a un atacante local escalar privilegios a trav\u00e9s del componente Hw65.sys."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-31757",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-05-21T18:15:09.563",
|
||||
"lastModified": "2024-05-21T18:15:09.563",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-22T12:46:53.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-31989",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-05-21T19:15:09.770",
|
||||
"lastModified": "2024-05-21T19:15:09.770",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-22T12:46:53.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. It has been discovered that an unprivileged pod in a different namespace on the same cluster could connect to the Redis server on port 6379. Despite having installed the latest version of the VPC CNI plugin on the EKS cluster, it requires manual enablement through configuration to enforce network policies. This raises concerns that many clients might unknowingly have open access to their Redis servers. This vulnerability could lead to Privilege Escalation to the level of cluster controller, or to information leakage, affecting anyone who does not have strict access controls on their Redis instance. This issue has been patched in version(s) 2.8.19, 2.9.15 and 2.10.10."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Argo CD es una herramienta declarativa de entrega continua de GitOps para Kubernetes. Se ha descubierto que un pod sin privilegios en un espacio de nombres diferente en el mismo cl\u00faster podr\u00eda conectarse al servidor Redis en el puerto 6379. A pesar de haber instalado la \u00faltima versi\u00f3n del complemento VPC CNI en el cl\u00faster EKS, requiere habilitaci\u00f3n manual a trav\u00e9s de la configuraci\u00f3n para aplicar pol\u00edticas de red. Esto genera preocupaci\u00f3n de que muchos clientes, sin saberlo, puedan tener acceso abierto a sus servidores Redis. Esta vulnerabilidad podr\u00eda provocar una escalada de privilegios al nivel del controlador del cl\u00faster o una fuga de informaci\u00f3n, afectando a cualquiera que no tenga controles de acceso estrictos en su instancia de Redis. Este problema se solucion\u00f3 en las versiones 2.8.19, 2.9.15 y 2.10.10."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-3198",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-05-22T07:15:13.167",
|
||||
"lastModified": "2024-05-22T07:15:13.167",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-22T12:46:53.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-32988",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2024-05-22T08:15:10.080",
|
||||
"lastModified": "2024-05-22T08:15:10.080",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-22T12:46:53.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-33525",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-05-21T19:15:10.010",
|
||||
"lastModified": "2024-05-21T19:15:10.010",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-22T12:46:53.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A Stored Cross-site Scripting (XSS) vulnerability in the \"Import of organizational units and title of organizational unit\" feature in ILIAS 7.20 to 7.30 and ILIAS 8.4 to 8.10 as well as ILIAS 9.0 allows remote authenticated attackers with administrative privileges to inject arbitrary web script or HTML via XML file upload."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": " Una vulnerabilidad de Cross Site Scripting Almacenado (XSS) en la funci\u00f3n \"Import of organizational units and title of organizational unit\" en ILIAS 7.20 a 7.30 e ILIAS 8.4 a 8.10, as\u00ed como ILIAS 9.0, permite a atacantes remotos autenticados con privilegios administrativos inyectar archivos web arbitrarios. script o HTML a trav\u00e9s de la carga de archivos XML."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-34240",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-05-21T18:15:09.650",
|
||||
"lastModified": "2024-05-21T18:15:09.650",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-22T12:46:53.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-34274",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-05-21T20:15:08.870",
|
||||
"lastModified": "2024-05-21T20:15:08.870",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-05-22T12:46:53.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "OpenBD 20210306203917-6cbe797 is vulnerable to Deserialization of Untrusted Data. The cookies bdglobals and bdclient_spot of the OpenBD software uses serialized data, which can be used to execute arbitrary code on the system. NOTE: This vulnerability only affects products that are no longer supported by the maintainer."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": " OpenBD 20210306203917-6cbe797 es vulnerable a la deserializaci\u00f3n de datos que no son de confianza. Las cookies bdglobals y bdclient_spot del software OpenBD utilizan datos serializados, que pueden usarse para ejecutar c\u00f3digo arbitrario en el sistema. NOTA: Esta vulnerabilidad solo afecta a productos que ya no son compatibles con el mantenedor."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
x
Reference in New Issue
Block a user