mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
Auto-Update: 2024-10-16T10:00:22.922838+00:00
This commit is contained in:
parent
210ea4e49d
commit
6cf8d62180
76
CVE-2016/CVE-2016-150xx/CVE-2016-15042.json
Normal file
76
CVE-2016/CVE-2016-150xx/CVE-2016-15042.json
Normal file
@ -0,0 +1,76 @@
|
||||
{
|
||||
"id": "CVE-2016-15042",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-10-16T08:15:02.990",
|
||||
"lastModified": "2024-10-16T08:15:02.990",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Frontend File Manager (versions < 4.0), N-Media Post Front-end Form (versions < 1.1) plugins for WordPress are vulnerable to arbitrary file uploads due to missing file type validation via the `nm_filemanager_upload_file` and `nm_postfront_upload_file` AJAX actions. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected sites server which may make remote code execution possible."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wordpress.org/plugins/nmedia-user-file-uploader/#developers",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/052f7d9a-aaff-4fb1-92b7-aeb83cc705a7",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.acunetix.com/vulnerabilities/web/wordpress-plugin-n-media-post-front-end-form-arbitrary-file-upload-1-0/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.pluginvulnerabilities.com/2016/09/19/arbitrary-file-upload-vulnerability-in-front-end-file-upload-and-manager-plugin/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.pluginvulnerabilities.com/2016/09/19/arbitrary-file-upload-vulnerability-in-n-media-post-front-end-form/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2c1e6298-f243-49a5-b1b7-52bd6a6c8858?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
72
CVE-2017/CVE-2017-201xx/CVE-2017-20193.json
Normal file
72
CVE-2017/CVE-2017-201xx/CVE-2017-20193.json
Normal file
@ -0,0 +1,72 @@
|
||||
{
|
||||
"id": "CVE-2017-20193",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-10-16T08:15:03.223",
|
||||
"lastModified": "2024-10-16T08:15:03.223",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Product Vendors is vulnerable to Reflected Cross-Site Scripting via the 'vendor_description' parameter in versions up to, and including, 2.0.35 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://hackerone.com/reports/253313",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://threatpost.com/reflected-xss-bug-patched-in-popular-woocommerce-wordpress-plugin/127744/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://woocommerce.com/products/product-vendors/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.majemedia.com/2017/09/xss-vulnerability-in-woocommerce-product-vendors-plugin/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a224e745-f9c7-4ca6-b656-e94862b1dc57?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2017/CVE-2017-201xx/CVE-2017-20194.json
Normal file
60
CVE-2017/CVE-2017-201xx/CVE-2017-20194.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2017-20194",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-10-16T08:15:03.453",
|
||||
"lastModified": "2024-10-16T08:15:03.453",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Formidable Form Builder plugin for WordPress is vulnerable to Sensitive Data Exposure in versions up to, and including, 2.05.03 via the frm_forms_preview AJAX action. This makes it possible for unauthenticated attackers to export all of the form entries for a given form."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://klikki.fi/formidable-forms-vulnerabilities/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c7600fe1-94e4-4e3e-a9a6-ff3589813715?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2020/CVE-2020-368xx/CVE-2020-36840.json
Normal file
60
CVE-2020/CVE-2020-368xx/CVE-2020-36840.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2020-36840",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-10-16T08:15:03.710",
|
||||
"lastModified": "2024-10-16T08:15:03.710",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Timetable and Event Schedule by MotoPress plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on the wp_ajax_route_url() function called via a nopriv AJAX action in versions up to, and including, 2.3.8. This makes it possible for unauthenticated attackers to call that function and perform a wide variety of actions such as including random template, injecting malicious web scripts, and more."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2288592%40mp-timetable&new=2288592%40mp-timetable&sfp_email=&sfph_mail=",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/988d7b33-f985-4d22-a2db-3922002fcecb?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2020/CVE-2020-368xx/CVE-2020-36842.json
Normal file
64
CVE-2020/CVE-2020-368xx/CVE-2020-36842.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2020-36842",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-10-16T08:15:03.923",
|
||||
"lastModified": "2024-10-16T08:15:03.923",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Migration, Backup, Staging \u2013 WPvivid plugin for WordPress is vulnerable to arbitrary file uploads due to a missing capability check on the wpvivid_upload_import_files and wpvivid_upload_files AJAX actions that allows low-level authenticated attackers to upload zip files that can be subsequently extracted. This affects versions up to, and including 0.9.35."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2261665%40wpvivid-backuprestore%2Ftrunk&old=2252870%40wpvivid-backuprestore%2Ftrunk&sfp_email=&sfph_mail=",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.webarxsecurity.com/vulnerability-in-wpvivid-backup-plugin-can-lead-to-database-leak/?fbclid=IwAR3Ve74ZIvmx-aC0OssIWYwcWEjGq6yU16DcyVGHD1XUT3uYaZ3QyVu_Eos&utm_content=buffer4435b&utm_medium=social&utm_source=facebook.com&utm_campaign=buffer",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/de1da248-2e03-40fa-8997-7176dc06abc9?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
68
CVE-2021/CVE-2021-44xx/CVE-2021-4452.json
Normal file
68
CVE-2021/CVE-2021-44xx/CVE-2021-4452.json
Normal file
@ -0,0 +1,68 @@
|
||||
{
|
||||
"id": "CVE-2021-4452",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-10-16T08:15:04.160",
|
||||
"lastModified": "2024-10-16T08:15:04.160",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Google Language Translator plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via multiple parameters in versions up to, and including, 6.0.9 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. Specifically affects users with older browsers that lack proper URL encoding support."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/2567703",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/2567706",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/1bd8bc19-5a6f-410b-897e-4887c05378ea",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/aa2bd74a-563a-4a2d-b1d7-b3678db82b00?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
104
CVE-2023/CVE-2023-226xx/CVE-2023-22649.json
Normal file
104
CVE-2023/CVE-2023-226xx/CVE-2023-22649.json
Normal file
@ -0,0 +1,104 @@
|
||||
{
|
||||
"id": "CVE-2023-22649",
|
||||
"sourceIdentifier": "meissner@suse.de",
|
||||
"published": "2024-10-16T08:15:04.390",
|
||||
"lastModified": "2024-10-16T08:15:04.390",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability has been identified which may lead to sensitive data being leaked into Rancher's audit logs. [Rancher Audit Logging](https://ranchermanager.docs.rancher.com/how-to-guides/advanced-user-guides/enable-api-audit-log) is an opt-in feature, only deployments that have it enabled and have [AUDIT_LEVEL](https://ranchermanager.docs.rancher.com/how-to-guides/advanced-user-guides/enable-api-audit-log#audit-log-levels) set to `1 or above` are impacted by this issue."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "meissner@suse.de",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:H/VI:N/VA:N/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "PASSIVE",
|
||||
"vulnerableSystemConfidentiality": "HIGH",
|
||||
"vulnerableSystemIntegrity": "NONE",
|
||||
"vulnerableSystemAvailability": "NONE",
|
||||
"subsequentSystemConfidentiality": "HIGH",
|
||||
"subsequentSystemIntegrity": "HIGH",
|
||||
"subsequentSystemAvailability": "HIGH",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 8.4,
|
||||
"baseSeverity": "HIGH"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "meissner@suse.de",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.4,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "meissner@suse.de",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-532"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.suse.com/show_bug.cgi?id=CVE-2023-22649",
|
||||
"source": "meissner@suse.de"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/rancher/rancher/security/advisories/GHSA-xfj7-qf8w-2gcr",
|
||||
"source": "meissner@suse.de"
|
||||
}
|
||||
]
|
||||
}
|
104
CVE-2023/CVE-2023-226xx/CVE-2023-22650.json
Normal file
104
CVE-2023/CVE-2023-226xx/CVE-2023-22650.json
Normal file
@ -0,0 +1,104 @@
|
||||
{
|
||||
"id": "CVE-2023-22650",
|
||||
"sourceIdentifier": "meissner@suse.de",
|
||||
"published": "2024-10-16T09:15:02.957",
|
||||
"lastModified": "2024-10-16T09:15:02.957",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability has been identified in which Rancher does not automatically clean up a user which has been deleted from the configured authentication provider (AP). This characteristic also applies to disabled or revoked users, Rancher will not reflect these modifications which may leave the user\u2019s tokens still usable."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "meissner@suse.de",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "HIGH",
|
||||
"vulnerableSystemIntegrity": "HIGH",
|
||||
"vulnerableSystemAvailability": "HIGH",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 8.7,
|
||||
"baseSeverity": "HIGH"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "meissner@suse.de",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "meissner@suse.de",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-287"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.suse.com/show_bug.cgi?id=CVE-2023-22650",
|
||||
"source": "meissner@suse.de"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/rancher/rancher/security/advisories/GHSA-9ghh-mmcq-8phc",
|
||||
"source": "meissner@suse.de"
|
||||
}
|
||||
]
|
||||
}
|
82
CVE-2023/CVE-2023-321xx/CVE-2023-32188.json
Normal file
82
CVE-2023/CVE-2023-321xx/CVE-2023-32188.json
Normal file
@ -0,0 +1,82 @@
|
||||
{
|
||||
"id": "CVE-2023-32188",
|
||||
"sourceIdentifier": "meissner@suse.de",
|
||||
"published": "2024-10-16T09:15:03.260",
|
||||
"lastModified": "2024-10-16T09:15:03.260",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A user can reverse engineer the JWT token (JSON Web Token) used in authentication for Manager and API access, forging a valid NeuVector Token to perform malicious activity in NeuVector. This can lead to an RCE."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "meissner@suse.de",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "HIGH",
|
||||
"vulnerableSystemIntegrity": "HIGH",
|
||||
"vulnerableSystemAvailability": "HIGH",
|
||||
"subsequentSystemConfidentiality": "HIGH",
|
||||
"subsequentSystemIntegrity": "HIGH",
|
||||
"subsequentSystemAvailability": "HIGH",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 9.4,
|
||||
"baseSeverity": "CRITICAL"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "meissner@suse.de",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-1270"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.suse.com/show_bug.cgi?id=CVE-2023-32188",
|
||||
"source": "meissner@suse.de"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/neuvector/neuvector/security/advisories/GHSA-622h-h2p8-743x",
|
||||
"source": "meissner@suse.de"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2023/CVE-2023-72xx/CVE-2023-7295.json
Normal file
60
CVE-2023/CVE-2023-72xx/CVE-2023-7295.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2023-7295",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-10-16T08:15:04.767",
|
||||
"lastModified": "2024-10-16T08:15:04.767",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Video Grid plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the search_term parameter in versions up to, and including, 1.21 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2824307%40video-grid%2Ftags%2F1.21&new=2900422%40video-grid%2Ftags%2F1.22",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/db5247ad-dbbf-4d8e-92f5-3a673b97d080?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2023/CVE-2023-72xx/CVE-2023-7296.json
Normal file
60
CVE-2023/CVE-2023-72xx/CVE-2023-7296.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2023-7296",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-10-16T08:15:04.977",
|
||||
"lastModified": "2024-10-16T08:15:04.977",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The BigBlueButton plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the the moderator code and viewer code fields in versions up to, and including, 3.0.0-beta.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with author privileges or higher to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/bigbluebutton/trunk/public/partials/bigbluebutton-join-display.php#L26",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5f829d21-5347-46ec-9218-2b3cbe7d7b95?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-21534",
|
||||
"sourceIdentifier": "report@snyk.io",
|
||||
"published": "2024-10-11T13:15:15.667",
|
||||
"lastModified": "2024-10-15T12:58:51.050",
|
||||
"lastModified": "2024-10-16T09:15:03.410",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -66,6 +66,10 @@
|
||||
"url": "https://github.com/JSONPath-Plus/JSONPath/commit/6b2f1b4c234292c75912b790bf7e2d7339d4ccd3",
|
||||
"source": "report@snyk.io"
|
||||
},
|
||||
{
|
||||
"url": "https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-8185019",
|
||||
"source": "report@snyk.io"
|
||||
},
|
||||
{
|
||||
"url": "https://security.snyk.io/vuln/SNYK-JS-JSONPATHPLUS-7945884",
|
||||
"source": "report@snyk.io"
|
||||
|
33
CVE-2024/CVE-2024-452xx/CVE-2024-45216.json
Normal file
33
CVE-2024/CVE-2024-452xx/CVE-2024-45216.json
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
"id": "CVE-2024-45216",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-10-16T08:15:05.233",
|
||||
"lastModified": "2024-10-16T08:15:05.233",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Authentication vulnerability in Apache Solr.\n\nSolr instances using the PKIAuthenticationPlugin, which is enabled by default when Solr Authentication is used, are vulnerable to Authentication bypass.\nA fake ending at the end of any Solr API URL path, will allow requests to skip Authentication while maintaining the API contract with the original URL Path.\nThis fake ending looks like an unprotected API path, however it is stripped off internally after authentication but before API routing.\n\n\nThis issue affects Apache Solr: from 5.3.0 before 8.11.4, from 9.0.0 before 9.7.0.\n\nUsers are recommended to upgrade to version 9.7.0, or 8.11.4, which fix the issue."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@apache.org",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-287"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://solr.apache.org/security.html#cve-2024-45216-apache-solr-authentication-bypass-possible-using-a-fake-url-path-ending",
|
||||
"source": "security@apache.org"
|
||||
}
|
||||
]
|
||||
}
|
33
CVE-2024/CVE-2024-452xx/CVE-2024-45217.json
Normal file
33
CVE-2024/CVE-2024-452xx/CVE-2024-45217.json
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
"id": "CVE-2024-45217",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-10-16T08:15:05.353",
|
||||
"lastModified": "2024-10-16T08:15:05.353",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Insecure Default Initialization of Resource vulnerability in Apache Solr.\n\nNew ConfigSets that are created via a Restore command, which copy a configSet from the backup and give it a new name, are created without setting the \"trusted\" metadata.\nConfigSets that do not contain the flag are trusted implicitly if the metadata is missing, therefore this leads to \"trusted\" ConfigSets that may not have been created with an Authenticated request.\n\"trusted\" ConfigSets are able to load custom code into classloaders, therefore the flag is supposed to only be set when the request that uploads the ConfigSet is Authenticated & Authorized.\n\nThis issue affects Apache Solr: from 6.6.0 before 8.11.4, from 9.0.0 before 9.7.0. This issue does not affect Solr instances that are secured via Authentication/Authorization.\n\nUsers are primarily recommended to use Authentication and Authorization when running Solr. However, upgrading to version 9.7.0, or 8.11.4 will mitigate this issue otherwise."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@apache.org",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-1188"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://solr.apache.org/security.html#cve-2024-45217-apache-solr-configsets-created-during-a-backup-restore-command-are-trusted-implicitly",
|
||||
"source": "security@apache.org"
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2024/CVE-2024-452xx/CVE-2024-45219.json
Normal file
64
CVE-2024/CVE-2024-452xx/CVE-2024-45219.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2024-45219",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-10-16T08:15:05.473",
|
||||
"lastModified": "2024-10-16T08:15:05.473",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Account users in Apache CloudStack by default are allowed to upload and register templates for deploying instances and volumes for attaching them as data disks to their existing instances. Due to missing validation checks for KVM-compatible templates or volumes in CloudStack 4.0.0 through 4.18.2.3 and 4.19.0.0 through 4.19.1.1, an attacker that can upload or register templates and volumes, can use them to deploy malicious instances or attach uploaded volumes to their existing instances on KVM-based environments and exploit this to gain access to the host filesystems that could result in the compromise of resource integrity and confidentiality, data loss, denial of service, and availability of KVM-based infrastructure managed by CloudStack.\n\n\nUsers are recommended to upgrade to Apache CloudStack 4.18.2.4 or 4.19.1.2, or later, which addresses this issue. \n\nAdditionally, all user-uploaded or registered KVM-compatible templates and volumes can be scanned and checked that they are flat files that should not be using any additional or unnecessary features. For example, operators can run this on their secondary storage(s) and inspect output. An empty output for the disk being validated means it has no references to the host filesystems; on the other hand, if the output for the disk being validated is not empty, it might indicate a compromised disk.\n\n\nfor file in $(find /path/to/storage/ -type f -regex [a-f0-9\\-]*.*); do echo \"Retrieving file [$file] info. If the output is not empty, that might indicate a compromised disk; check it carefully.\"; qemu-img info -U $file | grep file: ; printf \"\\n\\n\"; done\nThe command can also be run for the file-based primary storages; however, bear in mind that (i) volumes created from templates will have references for the templates at first and (ii) volumes can be consolidated while migrating, losing their references to the templates. Therefore, the command execution for the primary storages can show both false positives and false negatives.\n\nFor checking the whole template/volume features of each disk, operators can run the following command:\n\n\nfor file in $(find /path/to/storage/ -type f -regex [a-f0-9\\-]*.*); do echo \"Retrieving file [$file] info.\"; qemu-img info -U $file; printf \"\\n\\n\"; done"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@apache.org",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@apache.org",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cloudstack.apache.org/blog/security-release-advisory-4.18.2.4-4.19.1.2",
|
||||
"source": "security@apache.org"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.apache.org/thread/ktsfjcnj22x4kg49ctock3d9tq7jnvlo",
|
||||
"source": "security@apache.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.shapeblue.com/shapeblue-security-advisory-apache-cloudstack-security-releases-4-18-2-4-and-4-19-1-2/",
|
||||
"source": "security@apache.org"
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2024/CVE-2024-454xx/CVE-2024-45461.json
Normal file
64
CVE-2024/CVE-2024-454xx/CVE-2024-45461.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2024-45461",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-10-16T08:15:05.717",
|
||||
"lastModified": "2024-10-16T08:15:05.717",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The CloudStack Quota feature allows cloud administrators to implement a quota or usage limit system for cloud resources, and is disabled by default. In environments where the feature is enabled, due to missing access check enforcements, non-administrative CloudStack user accounts are able to access and modify quota-related configurations and data. This issue affects Apache CloudStack from 4.7.0 through 4.18.2.3; and from 4.19.0.0 through 4.19.1.1, where the Quota feature is enabled.\n\n\n\n\nUsers are recommended to upgrade to Apache CloudStack 4.18.2.4 or 4.19.1.2, or later, which addresses this issue.\u00a0Alternatively, users that do not use the Quota feature are advised to disabled the plugin by setting the global setting \"quota.enable.service\" to \"false\"."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@apache.org",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 5.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.9,
|
||||
"impactScore": 4.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@apache.org",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cloudstack.apache.org/blog/security-release-advisory-4.18.2.4-4.19.1.2",
|
||||
"source": "security@apache.org"
|
||||
},
|
||||
{
|
||||
"url": "https://cloudstack.apache.org/blog/security-release-advisory-4.18.2.4-4.19.1.2",
|
||||
"source": "security@apache.org"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.apache.org/thread/ktsfjcnj22x4kg49ctock3d9tq7jnvlo",
|
||||
"source": "security@apache.org"
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2024/CVE-2024-454xx/CVE-2024-45462.json
Normal file
64
CVE-2024/CVE-2024-454xx/CVE-2024-45462.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2024-45462",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-10-16T08:15:05.933",
|
||||
"lastModified": "2024-10-16T08:15:05.933",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The logout operation in the CloudStack web interface does not expire the user session completely which is valid until expiry by time or restart of the backend service. An attacker that has access to a user's browser can use an unexpired session to gain access to resources owned by the logged out user account. This issue affects Apache CloudStack from 4.15.1.0 through 4.18.2.3; and from 4.19.0.0 through 4.19.1.1.\n\n\n\n\nUsers are recommended to upgrade to Apache CloudStack 4.18.2.4 or 4.19.1.2, or later, which addresses this issue."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@apache.org",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.0,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@apache.org",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-613"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cloudstack.apache.org/blog/security-release-advisory-4.18.2.4-4.19.1.2",
|
||||
"source": "security@apache.org"
|
||||
},
|
||||
{
|
||||
"url": "https://cloudstack.apache.org/blog/security-release-advisory-4.18.2.4-4.19.1.2",
|
||||
"source": "security@apache.org"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.apache.org/thread/ktsfjcnj22x4kg49ctock3d9tq7jnvlo",
|
||||
"source": "security@apache.org"
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2024/CVE-2024-456xx/CVE-2024-45693.json
Normal file
64
CVE-2024/CVE-2024-456xx/CVE-2024-45693.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2024-45693",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-10-16T08:15:06.160",
|
||||
"lastModified": "2024-10-16T08:15:06.160",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Users logged into the Apache CloudStack's web interface can be tricked to submit malicious CSRF requests due to missing validation of the origin of the requests. This can allow an attacker to gain privileges and access to resources of the authenticated users and may lead\u00a0to account takeover,\u00a0disruption, exposure of sensitive data and compromise integrity of the resources owned by the user account that are managed by the platform.\n\nThis issue affects Apache CloudStack from 4.15.1.0 through 4.18.2.3 and 4.19.0.0 through 4.19.1.1\n\n\n\nUsers are recommended to upgrade to Apache CloudStack 4.18.2.4 or 4.19.1.2, or later, which addresses this issue."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@apache.org",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 8.0,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 5.8
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@apache.org",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cloudstack.apache.org/blog/security-release-advisory-4.18.2.4-4.19.1.2",
|
||||
"source": "security@apache.org"
|
||||
},
|
||||
{
|
||||
"url": "https://cloudstack.apache.org/blog/security-release-advisory-4.18.2.4-4.19.1.2",
|
||||
"source": "security@apache.org"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.apache.org/thread/ktsfjcnj22x4kg49ctock3d9tq7jnvlo",
|
||||
"source": "security@apache.org"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-457xx/CVE-2024-45710.json
Normal file
56
CVE-2024/CVE-2024-457xx/CVE-2024-45710.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-45710",
|
||||
"sourceIdentifier": "psirt@solarwinds.com",
|
||||
"published": "2024-10-16T08:15:06.387",
|
||||
"lastModified": "2024-10-16T08:15:06.387",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SolarWinds Platform is susceptible to an Uncontrolled Search Path Element Local Privilege Escalation vulnerability. This requires a low privilege account and local access to the affected node machine."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@solarwinds.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@solarwinds.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-427"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.solarwinds.com/trust-center/security-advisories/CVE-2024-45710",
|
||||
"source": "psirt@solarwinds.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-457xx/CVE-2024-45711.json
Normal file
56
CVE-2024/CVE-2024-457xx/CVE-2024-45711.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-45711",
|
||||
"sourceIdentifier": "psirt@solarwinds.com",
|
||||
"published": "2024-10-16T08:15:06.690",
|
||||
"lastModified": "2024-10-16T08:15:06.690",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SolarWinds Serv-U is vulnerable to a directory traversal vulnerability where remote code execution is possible depending on privileges given to the authenticated user. This issue requires a user to be authenticated and this is present when software environment variables are abused. Authentication is required for this vulnerability"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@solarwinds.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@solarwinds.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.solarwinds.com/trust-center/security-advisories/CVE-2024-45711",
|
||||
"source": "psirt@solarwinds.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-457xx/CVE-2024-45714.json
Normal file
56
CVE-2024/CVE-2024-457xx/CVE-2024-45714.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-45714",
|
||||
"sourceIdentifier": "psirt@solarwinds.com",
|
||||
"published": "2024-10-16T08:15:06.897",
|
||||
"lastModified": "2024-10-16T08:15:06.897",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Application is vulnerable to Cross Site Scripting (XSS) an authenticated attacker with users\u2019 permissions can modify a variable with a payload."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@solarwinds.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@solarwinds.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.solarwinds.com/trust-center/security-advisories/CVE-2024-45714",
|
||||
"source": "psirt@solarwinds.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-457xx/CVE-2024-45715.json
Normal file
56
CVE-2024/CVE-2024-457xx/CVE-2024-45715.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-45715",
|
||||
"sourceIdentifier": "psirt@solarwinds.com",
|
||||
"published": "2024-10-16T08:15:07.110",
|
||||
"lastModified": "2024-10-16T08:15:07.110",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The SolarWinds Platform was susceptible to a Cross-Site Scripting vulnerability when performing an edit function to existing elements."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@solarwinds.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:R/S:C/C:H/I:L/A:L",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.3
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@solarwinds.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.solarwinds.com/trust-center/security-advisories/CVE-2024-45715",
|
||||
"source": "psirt@solarwinds.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-90xx/CVE-2024-9061.json
Normal file
60
CVE-2024/CVE-2024-90xx/CVE-2024-9061.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-9061",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-10-16T08:15:07.323",
|
||||
"lastModified": "2024-10-16T08:15:07.323",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The The WP Popup Builder \u2013 Popup Forms and Marketing Lead Generation plugin for WordPress is vulnerable to arbitrary shortcode execution via the wp_ajax_nopriv_shortcode_Api_Add AJAX action in all versions up to, and including, 1.3.5. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes. NOTE: This vulnerability was partially fixed in version 1.3.5 with a nonce check, which effectively prevented access to the affected function. However, version 1.3.6 incorporates the correct authorization check to prevent unauthorized access."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3166506/wp-popup-builder",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0cac1dc0-87dc-43eb-9db1-638a91200b43?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-95xx/CVE-2024-9540.json
Normal file
60
CVE-2024/CVE-2024-95xx/CVE-2024-9540.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-9540",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-10-16T08:15:07.547",
|
||||
"lastModified": "2024-10-16T08:15:07.547",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Sina Extension for Elementor plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.5.7 via the render function in widgets/advanced/sina-modal-box.php. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract sensitive private, pending, and draft Elementor template data."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3167197/sina-extension-for-elementor",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ab8659e1-5880-4738-99ed-e671449c6878?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
78
CVE-2024/CVE-2024-98xx/CVE-2024-9858.json
Normal file
78
CVE-2024/CVE-2024-98xx/CVE-2024-9858.json
Normal file
@ -0,0 +1,78 @@
|
||||
{
|
||||
"id": "CVE-2024-9858",
|
||||
"sourceIdentifier": "cve-coordination@google.com",
|
||||
"published": "2024-10-16T09:15:03.550",
|
||||
"lastModified": "2024-10-16T09:15:03.550",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "There exists an insecure default user permission in Google Cloud Migrate to containers from version 1.1.0 to 1.2.2 Windows installs. A local \"m2cuser\" was greated with\u00a0administrator privileges. This posed a security risk if the \"analyze\" or \"generate\" commands were interrupted or skipping the action to delete the local user \u201cm2cuser\u201d. We recommend upgrading to\u00a01.2.3 or beyond"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cve-coordination@google.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:P/VC:H/VI:L/VA:L/SC:H/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:P/AU:Y/R:A/V:D/RE:L/U:Green",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "PRESENT",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "PASSIVE",
|
||||
"vulnerableSystemConfidentiality": "HIGH",
|
||||
"vulnerableSystemIntegrity": "LOW",
|
||||
"vulnerableSystemAvailability": "LOW",
|
||||
"subsequentSystemConfidentiality": "HIGH",
|
||||
"subsequentSystemIntegrity": "LOW",
|
||||
"subsequentSystemAvailability": "LOW",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "PRESENT",
|
||||
"automatable": "YES",
|
||||
"recovery": "AUTOMATIC",
|
||||
"valueDensity": "DIFFUSE",
|
||||
"vulnerabilityResponseEffort": "LOW",
|
||||
"providerUrgency": "GREEN",
|
||||
"baseScore": 5.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve-coordination@google.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-276"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cloud.google.com/migrate/containers/docs/m2c-cli-relnotes#october_8_2024",
|
||||
"source": "cve-coordination@google.com"
|
||||
}
|
||||
]
|
||||
}
|
63
README.md
63
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-10-16T08:00:21.081387+00:00
|
||||
2024-10-16T10:00:22.922838+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-10-16T07:15:17.033000+00:00
|
||||
2024-10-16T09:15:03.550000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,47 +33,44 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
265787
|
||||
265811
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `48`
|
||||
Recently added CVEs: `24`
|
||||
|
||||
- [CVE-2021-4447](CVE-2021/CVE-2021-44xx/CVE-2021-4447.json) (`2024-10-16T07:15:10.687`)
|
||||
- [CVE-2021-4448](CVE-2021/CVE-2021-44xx/CVE-2021-4448.json) (`2024-10-16T07:15:10.980`)
|
||||
- [CVE-2021-4449](CVE-2021/CVE-2021-44xx/CVE-2021-4449.json) (`2024-10-16T07:15:11.243`)
|
||||
- [CVE-2021-4450](CVE-2021/CVE-2021-44xx/CVE-2021-4450.json) (`2024-10-16T07:15:11.527`)
|
||||
- [CVE-2021-4451](CVE-2021/CVE-2021-44xx/CVE-2021-4451.json) (`2024-10-16T07:15:11.770`)
|
||||
- [CVE-2022-4971](CVE-2022/CVE-2022-49xx/CVE-2022-4971.json) (`2024-10-16T07:15:12.040`)
|
||||
- [CVE-2022-4972](CVE-2022/CVE-2022-49xx/CVE-2022-4972.json) (`2024-10-16T07:15:12.257`)
|
||||
- [CVE-2022-4973](CVE-2022/CVE-2022-49xx/CVE-2022-4973.json) (`2024-10-16T07:15:12.497`)
|
||||
- [CVE-2022-4974](CVE-2022/CVE-2022-49xx/CVE-2022-4974.json) (`2024-10-16T07:15:12.760`)
|
||||
- [CVE-2023-7286](CVE-2023/CVE-2023-72xx/CVE-2023-7286.json) (`2024-10-16T07:15:13.223`)
|
||||
- [CVE-2023-7287](CVE-2023/CVE-2023-72xx/CVE-2023-7287.json) (`2024-10-16T07:15:13.507`)
|
||||
- [CVE-2023-7288](CVE-2023/CVE-2023-72xx/CVE-2023-7288.json) (`2024-10-16T07:15:13.743`)
|
||||
- [CVE-2023-7289](CVE-2023/CVE-2023-72xx/CVE-2023-7289.json) (`2024-10-16T07:15:14.000`)
|
||||
- [CVE-2023-7290](CVE-2023/CVE-2023-72xx/CVE-2023-7290.json) (`2024-10-16T07:15:14.243`)
|
||||
- [CVE-2023-7291](CVE-2023/CVE-2023-72xx/CVE-2023-7291.json) (`2024-10-16T07:15:14.503`)
|
||||
- [CVE-2023-7292](CVE-2023/CVE-2023-72xx/CVE-2023-7292.json) (`2024-10-16T07:15:14.737`)
|
||||
- [CVE-2023-7293](CVE-2023/CVE-2023-72xx/CVE-2023-7293.json) (`2024-10-16T07:15:14.970`)
|
||||
- [CVE-2023-7294](CVE-2023/CVE-2023-72xx/CVE-2023-7294.json) (`2024-10-16T07:15:15.277`)
|
||||
- [CVE-2024-8507](CVE-2024/CVE-2024-85xx/CVE-2024-8507.json) (`2024-10-16T07:15:16.277`)
|
||||
- [CVE-2024-8746](CVE-2024/CVE-2024-87xx/CVE-2024-8746.json) (`2024-10-16T07:15:16.537`)
|
||||
- [CVE-2024-8918](CVE-2024/CVE-2024-89xx/CVE-2024-8918.json) (`2024-10-16T07:15:16.777`)
|
||||
- [CVE-2024-9582](CVE-2024/CVE-2024-95xx/CVE-2024-9582.json) (`2024-10-16T07:15:17.033`)
|
||||
- [CVE-2024-9873](CVE-2024/CVE-2024-98xx/CVE-2024-9873.json) (`2024-10-16T06:15:02.527`)
|
||||
- [CVE-2024-9888](CVE-2024/CVE-2024-98xx/CVE-2024-9888.json) (`2024-10-16T06:15:03.650`)
|
||||
- [CVE-2024-9937](CVE-2024/CVE-2024-99xx/CVE-2024-9937.json) (`2024-10-16T06:15:04.177`)
|
||||
- [CVE-2016-15042](CVE-2016/CVE-2016-150xx/CVE-2016-15042.json) (`2024-10-16T08:15:02.990`)
|
||||
- [CVE-2017-20193](CVE-2017/CVE-2017-201xx/CVE-2017-20193.json) (`2024-10-16T08:15:03.223`)
|
||||
- [CVE-2017-20194](CVE-2017/CVE-2017-201xx/CVE-2017-20194.json) (`2024-10-16T08:15:03.453`)
|
||||
- [CVE-2020-36840](CVE-2020/CVE-2020-368xx/CVE-2020-36840.json) (`2024-10-16T08:15:03.710`)
|
||||
- [CVE-2020-36842](CVE-2020/CVE-2020-368xx/CVE-2020-36842.json) (`2024-10-16T08:15:03.923`)
|
||||
- [CVE-2021-4452](CVE-2021/CVE-2021-44xx/CVE-2021-4452.json) (`2024-10-16T08:15:04.160`)
|
||||
- [CVE-2023-22649](CVE-2023/CVE-2023-226xx/CVE-2023-22649.json) (`2024-10-16T08:15:04.390`)
|
||||
- [CVE-2023-22650](CVE-2023/CVE-2023-226xx/CVE-2023-22650.json) (`2024-10-16T09:15:02.957`)
|
||||
- [CVE-2023-32188](CVE-2023/CVE-2023-321xx/CVE-2023-32188.json) (`2024-10-16T09:15:03.260`)
|
||||
- [CVE-2023-7295](CVE-2023/CVE-2023-72xx/CVE-2023-7295.json) (`2024-10-16T08:15:04.767`)
|
||||
- [CVE-2023-7296](CVE-2023/CVE-2023-72xx/CVE-2023-7296.json) (`2024-10-16T08:15:04.977`)
|
||||
- [CVE-2024-45216](CVE-2024/CVE-2024-452xx/CVE-2024-45216.json) (`2024-10-16T08:15:05.233`)
|
||||
- [CVE-2024-45217](CVE-2024/CVE-2024-452xx/CVE-2024-45217.json) (`2024-10-16T08:15:05.353`)
|
||||
- [CVE-2024-45219](CVE-2024/CVE-2024-452xx/CVE-2024-45219.json) (`2024-10-16T08:15:05.473`)
|
||||
- [CVE-2024-45461](CVE-2024/CVE-2024-454xx/CVE-2024-45461.json) (`2024-10-16T08:15:05.717`)
|
||||
- [CVE-2024-45462](CVE-2024/CVE-2024-454xx/CVE-2024-45462.json) (`2024-10-16T08:15:05.933`)
|
||||
- [CVE-2024-45693](CVE-2024/CVE-2024-456xx/CVE-2024-45693.json) (`2024-10-16T08:15:06.160`)
|
||||
- [CVE-2024-45710](CVE-2024/CVE-2024-457xx/CVE-2024-45710.json) (`2024-10-16T08:15:06.387`)
|
||||
- [CVE-2024-45711](CVE-2024/CVE-2024-457xx/CVE-2024-45711.json) (`2024-10-16T08:15:06.690`)
|
||||
- [CVE-2024-45714](CVE-2024/CVE-2024-457xx/CVE-2024-45714.json) (`2024-10-16T08:15:06.897`)
|
||||
- [CVE-2024-45715](CVE-2024/CVE-2024-457xx/CVE-2024-45715.json) (`2024-10-16T08:15:07.110`)
|
||||
- [CVE-2024-9061](CVE-2024/CVE-2024-90xx/CVE-2024-9061.json) (`2024-10-16T08:15:07.323`)
|
||||
- [CVE-2024-9540](CVE-2024/CVE-2024-95xx/CVE-2024-9540.json) (`2024-10-16T08:15:07.547`)
|
||||
- [CVE-2024-9858](CVE-2024/CVE-2024-98xx/CVE-2024-9858.json) (`2024-10-16T09:15:03.550`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `3`
|
||||
Recently modified CVEs: `1`
|
||||
|
||||
- [CVE-2024-3727](CVE-2024/CVE-2024-37xx/CVE-2024-3727.json) (`2024-10-16T07:15:15.583`)
|
||||
- [CVE-2024-6508](CVE-2024/CVE-2024-65xx/CVE-2024-6508.json) (`2024-10-16T07:15:16.027`)
|
||||
- [CVE-2024-7489](CVE-2024/CVE-2024-74xx/CVE-2024-7489.json) (`2024-10-16T07:15:16.160`)
|
||||
- [CVE-2024-21534](CVE-2024/CVE-2024-215xx/CVE-2024-21534.json) (`2024-10-16T09:15:03.410`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
128
_state.csv
128
_state.csv
@ -52765,7 +52765,7 @@ CVE-2012-10014,0,0,0bc69fb07d4c2883d1c737af748ae0ee649ea44bdeb6cd1d92e7f604cb18a
|
||||
CVE-2012-10015,0,0,24891fb06d64dcdbe29bc3d68dc58660842ac01174efff223a8a3dc4d809d347,2024-05-17T00:51:46.743000
|
||||
CVE-2012-10016,0,0,50b0be84a632fcfd63c5683132c72829cfbba19e76fa7d1e8b2308b8e62659b3,2024-05-17T00:51:46.860000
|
||||
CVE-2012-10017,0,0,cd8d899c12955d758ae3dba50c52117997a0233c9fcc21f11c8e13713fa40567,2024-05-17T00:51:46.963000
|
||||
CVE-2012-10018,1,1,8aee2edfba1d9679fb581c38f537675cf31a15e2b05654163060d58ff4081d62,2024-10-16T07:15:03.920000
|
||||
CVE-2012-10018,0,0,8aee2edfba1d9679fb581c38f537675cf31a15e2b05654163060d58ff4081d62,2024-10-16T07:15:03.920000
|
||||
CVE-2012-1002,0,0,510ae0fa015c89254219ee968a42064a352242d7e82a140cbbb23a59f8009f93,2017-12-07T02:29:10.350000
|
||||
CVE-2012-1003,0,0,8b64c365043997636a4a30596e670f2397029fa9c3a8b88f62aea985930dc202,2017-08-29T01:31:08.943000
|
||||
CVE-2012-1004,0,0,d8a090792d926eb721787b604fedfde9d2238b34407308a190cfed04a1fe6687,2012-02-08T05:00:00
|
||||
@ -84905,8 +84905,9 @@ CVE-2016-15037,0,0,a24c928d873db9adb04c4c2c7f23b1fdee0c14c814adb63b3935f236dd622
|
||||
CVE-2016-15038,0,0,ab9fe34bbf83cb3f6b12fd6674fbfd88d9bfe6f780bf258a0a29ef7f754a8620,2024-05-17T01:08:11.777000
|
||||
CVE-2016-15039,0,0,dca63ef7677d0bcc98685acf0fdce6ae1800f0ccf649b6f8a11c0d2609e41789,2024-07-11T13:05:54.930000
|
||||
CVE-2016-1504,0,0,9db9ed3c963d84221d49c5bfc988ac2e31a3ff3b1eb26252d985e8597b526dda,2017-09-10T01:29:11.687000
|
||||
CVE-2016-15040,1,1,c916a382cb9299e288a40f3ceeea939f3e8a02d3230790a73299a7a875d7463a,2024-10-16T07:15:04.447000
|
||||
CVE-2016-15041,1,1,d1cfb96fd4f467118e4a31cab33ff9b459712b47abad854ec90bd7985ff03456,2024-10-16T07:15:04.747000
|
||||
CVE-2016-15040,0,0,c916a382cb9299e288a40f3ceeea939f3e8a02d3230790a73299a7a875d7463a,2024-10-16T07:15:04.447000
|
||||
CVE-2016-15041,0,0,d1cfb96fd4f467118e4a31cab33ff9b459712b47abad854ec90bd7985ff03456,2024-10-16T07:15:04.747000
|
||||
CVE-2016-15042,1,1,a949a643db9253c538a89148491885b686d0cc9a14043c1836248c16346d6ea0,2024-10-16T08:15:02.990000
|
||||
CVE-2016-1505,0,0,18ada53cb306192ec9e2ab168c2465cf1d7127037b49b7b97c57ba57c38e5938,2016-11-28T19:59:55.070000
|
||||
CVE-2016-1513,0,0,93511c8c58249078a9702f9c8cf540abf2733d280d18db4cf47b7cbd079e24db,2017-09-01T01:29:04.507000
|
||||
CVE-2016-1514,0,0,b7fef097b48e8e79c45cbf0778b00b6a0da537c685d5ef916a10faf8cfdae6e7,2023-11-07T02:29:56.923000
|
||||
@ -102527,7 +102528,9 @@ CVE-2017-20189,0,0,dce97d2fac31f8ad5a1ef7790c7ca57d8c8e31ae0f291f1158d33fc1a1e4d
|
||||
CVE-2017-2019,0,0,0503760b9e3a588a1928b34508ca8410ada27b38d1650c235dca432cc0f673d6,2023-11-07T02:43:30.710000
|
||||
CVE-2017-20190,0,0,9dd2663b528e5bc8494bcc080744aaaef7094b4400daff7d3432981a0f57ec16,2024-08-12T13:38:08.423000
|
||||
CVE-2017-20191,0,0,c82081004c307230c99856cdb3a9bea1dbe477fc9056adce103f7b0450353360,2024-05-17T01:17:27.427000
|
||||
CVE-2017-20192,1,1,5f665d38e248db098cabad57aad78333c2b0e4b73af03bdd2b5bc507bd7f9d02,2024-10-16T07:15:05.147000
|
||||
CVE-2017-20192,0,0,5f665d38e248db098cabad57aad78333c2b0e4b73af03bdd2b5bc507bd7f9d02,2024-10-16T07:15:05.147000
|
||||
CVE-2017-20193,1,1,f6326d538e041b9c48ba92c31ee7e6a3613921b5619dc9f73c818ee3e95e8d23,2024-10-16T08:15:03.223000
|
||||
CVE-2017-20194,1,1,b2460b42587481aa5a8f5ebd76232e22d691810c19445cefb61141385291d412,2024-10-16T08:15:03.453000
|
||||
CVE-2017-2020,0,0,0176f89e76e77d17aff44beb265bbd6290607491912cdad54f562216e17fef40,2023-11-07T02:43:30.943000
|
||||
CVE-2017-2021,0,0,76f10f5cd36e75a57c68367deb797f3f6432a879d0c98ef2f911f8615c163241,2023-11-07T02:43:31.170000
|
||||
CVE-2017-2022,0,0,9f249157715bb01a33c6885e22f286efa78b6a3306959a78f30cb9dd84a9f46c,2023-11-07T02:43:31.413000
|
||||
@ -121393,7 +121396,7 @@ CVE-2018-25099,0,0,22c87c7789711d5cc0070c0c244e3b7eff042bf6e9bfc44eac77be6b7d7fb
|
||||
CVE-2018-25100,0,0,d942384485e6477ac02d774d7915e3145ff5d011228e897d01068d424d5fde66,2024-08-01T13:41:42.160000
|
||||
CVE-2018-25101,0,0,f5cb23a560b5f7e2ed0bc287e9dbbe48d218ed9a2d3fbe094521b3e09b217300,2024-06-04T19:16:57.060000
|
||||
CVE-2018-25103,0,0,e59105c00442742ab1ecc8faba8dbf0d67b37225837a23e9578526d5287d5f7e,2024-07-09T16:15:02.787000
|
||||
CVE-2018-25105,1,1,d835c3fa94757eebc66cde069811098b280fcd7d949b4852ed44631ae5059025,2024-10-16T07:15:05.467000
|
||||
CVE-2018-25105,0,0,d835c3fa94757eebc66cde069811098b280fcd7d949b4852ed44631ae5059025,2024-10-16T07:15:05.467000
|
||||
CVE-2018-2515,0,0,5409b099d6b1ad12de2273669dad1cdf61ce6e1c2e305b93396a548635b48aa4,2023-11-07T02:57:57.887000
|
||||
CVE-2018-2560,0,0,abeb87aebf654213323bee155595996aacb66704cd990a641203ef8ccfeaa82a,2020-08-24T17:37:01.140000
|
||||
CVE-2018-2561,0,0,6c44c7f29655175e898d7e0c8e9efa3daa6d95623035a440e858ef0262739964,2018-01-25T13:53:15.120000
|
||||
@ -138399,11 +138402,11 @@ CVE-2019-2521,0,0,557cd7afc62b8b0d5545a61da2b67008378b171f216bd58bad5399af268228
|
||||
CVE-2019-25210,0,0,266aa4bd7522d806fa5da076db229c2449a919075778b85ff023cb6f7676cfb1,2024-09-04T18:35:00.600000
|
||||
CVE-2019-25211,0,0,469c1561e074b807caf6701e40210358657a37dbe70bde81f85c8d68a4456e96,2024-08-01T13:41:57.540000
|
||||
CVE-2019-25212,0,0,2a7e2cc8de54fa224ded29f3182e12267199b33c4461fd66ffca600627e7e093,2024-09-26T13:36:48.280000
|
||||
CVE-2019-25213,1,1,c9021488850cf96cd67d0684c1e0ad93a17221fc65907f98197bbaa2ed0caf12,2024-10-16T07:15:05.790000
|
||||
CVE-2019-25214,1,1,2cea621255963c0ef83dd541252554e0249b2b5f247e6fcffc56f1c8c5ae1600,2024-10-16T07:15:06.153000
|
||||
CVE-2019-25215,1,1,417fa4dce61b30bceec93c3c72f9ccc884d93346fa9cb67c3b3aef971ba8f6e9,2024-10-16T07:15:06.467000
|
||||
CVE-2019-25216,1,1,f7850eb53854ebb9e8b70ecf13789cc8b7ce6c80126159b35f204ce2cfe1ed77,2024-10-16T07:15:06.727000
|
||||
CVE-2019-25217,1,1,796f0407440dc50dd1b6e2388d8c012d4093c3e220e0818a1f9800b29f3b68c3,2024-10-16T07:15:07.030000
|
||||
CVE-2019-25213,0,0,c9021488850cf96cd67d0684c1e0ad93a17221fc65907f98197bbaa2ed0caf12,2024-10-16T07:15:05.790000
|
||||
CVE-2019-25214,0,0,2cea621255963c0ef83dd541252554e0249b2b5f247e6fcffc56f1c8c5ae1600,2024-10-16T07:15:06.153000
|
||||
CVE-2019-25215,0,0,417fa4dce61b30bceec93c3c72f9ccc884d93346fa9cb67c3b3aef971ba8f6e9,2024-10-16T07:15:06.467000
|
||||
CVE-2019-25216,0,0,f7850eb53854ebb9e8b70ecf13789cc8b7ce6c80126159b35f204ce2cfe1ed77,2024-10-16T07:15:06.727000
|
||||
CVE-2019-25217,0,0,796f0407440dc50dd1b6e2388d8c012d4093c3e220e0818a1f9800b29f3b68c3,2024-10-16T07:15:07.030000
|
||||
CVE-2019-2522,0,0,438e5228ba492857a388b8016b2219394ce3508b8a36f1f8aede8ea3eeec2072,2020-08-24T17:37:01.140000
|
||||
CVE-2019-2523,0,0,4a0e4915f05e6fa4b1849fafb208e6fb024214d6840b1c8202b1873b064ed383,2020-08-24T17:37:01.140000
|
||||
CVE-2019-2524,0,0,bee2c79f8df3b71e86ab52db9d5dee51c63979ccd70534be30c64d8fa54a9384,2020-08-24T17:37:01.140000
|
||||
@ -159328,16 +159331,18 @@ CVE-2020-36827,0,0,8898188aa97819ee831b61208ffecb850d1c02e65600a28bd33473d687839
|
||||
CVE-2020-36828,0,0,a1b676217510ef46edc1fede0a4eb0bea0bc2e564c4e02f200c27ced72100dc7,2024-05-17T01:48:58.900000
|
||||
CVE-2020-36829,0,0,fa56184e79fbe280b2933bbbe602a49d53f63fd12f0982a754bc29d86839a810,2024-08-26T20:35:00.633000
|
||||
CVE-2020-36830,0,0,61dd7852409cfb39cad21ae3791ff5d5afc0cc5bb4ea791702b1fbd3ac62fda4,2024-09-05T21:47:09.243000
|
||||
CVE-2020-36831,1,1,5fc5cbeb06aff1dd998ede353ed8f966cc530045c726d6eb55c92d2290765540,2024-10-16T07:15:07.280000
|
||||
CVE-2020-36832,1,1,44885128af038984319b548ef6a4d515a25729a50971755951aee68cb8de19bb,2024-10-16T07:15:07.637000
|
||||
CVE-2020-36833,1,1,9fcaa73e236ed40db62c0a0432e9c13fb6ed1cdd3ec075c57506cb1032e701ac,2024-10-16T07:15:07.893000
|
||||
CVE-2020-36834,1,1,a607ba32c4ca47a22b767d2c8eb5f243dfa4318bcd7738688868c71a75188a44,2024-10-16T07:15:08.127000
|
||||
CVE-2020-36835,1,1,9358173c5ae21ccca395ad39a077e5c172f859c65ae5894831f472a69eac5806,2024-10-16T07:15:08.387000
|
||||
CVE-2020-36836,1,1,e7c5aff927b78c5a37750445b50aa86c2ffc36a8b918852e2c11921c4bec6991,2024-10-16T07:15:08.630000
|
||||
CVE-2020-36837,1,1,eb54ab20bbd666451de9a2acf06cac05ca4a8ae756eb124d501330f7edcca6bc,2024-10-16T07:15:08.927000
|
||||
CVE-2020-36838,1,1,3a7d865bc4e5d457aefd7a125a83f9e76c208c4baafa85f9e322ba36857e54dd,2024-10-16T07:15:09.200000
|
||||
CVE-2020-36839,1,1,baa988307e623b23446b2949272b20cbda74bdb8e8bd2f74d8dcfc84a33c3f98,2024-10-16T07:15:09.433000
|
||||
CVE-2020-36831,0,0,5fc5cbeb06aff1dd998ede353ed8f966cc530045c726d6eb55c92d2290765540,2024-10-16T07:15:07.280000
|
||||
CVE-2020-36832,0,0,44885128af038984319b548ef6a4d515a25729a50971755951aee68cb8de19bb,2024-10-16T07:15:07.637000
|
||||
CVE-2020-36833,0,0,9fcaa73e236ed40db62c0a0432e9c13fb6ed1cdd3ec075c57506cb1032e701ac,2024-10-16T07:15:07.893000
|
||||
CVE-2020-36834,0,0,a607ba32c4ca47a22b767d2c8eb5f243dfa4318bcd7738688868c71a75188a44,2024-10-16T07:15:08.127000
|
||||
CVE-2020-36835,0,0,9358173c5ae21ccca395ad39a077e5c172f859c65ae5894831f472a69eac5806,2024-10-16T07:15:08.387000
|
||||
CVE-2020-36836,0,0,e7c5aff927b78c5a37750445b50aa86c2ffc36a8b918852e2c11921c4bec6991,2024-10-16T07:15:08.630000
|
||||
CVE-2020-36837,0,0,eb54ab20bbd666451de9a2acf06cac05ca4a8ae756eb124d501330f7edcca6bc,2024-10-16T07:15:08.927000
|
||||
CVE-2020-36838,0,0,3a7d865bc4e5d457aefd7a125a83f9e76c208c4baafa85f9e322ba36857e54dd,2024-10-16T07:15:09.200000
|
||||
CVE-2020-36839,0,0,baa988307e623b23446b2949272b20cbda74bdb8e8bd2f74d8dcfc84a33c3f98,2024-10-16T07:15:09.433000
|
||||
CVE-2020-3684,0,0,44aa34ae599eab5a673c5cc3034025c1f764a98b61a69b113aa70c68c71a7c49,2020-11-06T16:29:14.480000
|
||||
CVE-2020-36840,1,1,19f312115ec11958b9e6a2d7c5d1461a9b9a720952690bab09ad8fcbc82536d2,2024-10-16T08:15:03.710000
|
||||
CVE-2020-36842,1,1,2b0ab9021e8c3546f5c3ac016af5850bb6ea577b04ff806dd46ba7237500c4c0,2024-10-16T08:15:03.923000
|
||||
CVE-2020-3685,0,0,01cf0158d1e280265cb87314ab78bb48a4960098d5e1ed486f7d5066d87b5a92,2021-01-29T23:46:03.037000
|
||||
CVE-2020-3686,0,0,236df0d6a9e5b4a5d3130dbb24dece9578efd8fc6235301a045f147575f94cf1,2021-01-30T00:10:19.887000
|
||||
CVE-2020-3687,0,0,c13127e6314fa1c7f5be79f0d170282e8a396f8bc554c10a42c33b710015dc5e,2021-01-29T22:33:38.940000
|
||||
@ -185232,7 +185237,7 @@ CVE-2021-44426,0,0,bf6b57725b013a6044de8b7642b1205398baadbe68b7f716f0f53e02dbfef
|
||||
CVE-2021-44427,0,0,783ab76fe28ccce570d29d8c66a408b8ca0bb34f5bf6e84813ccbe2199231d12,2021-11-30T13:41:10.420000
|
||||
CVE-2021-44428,0,0,76724755f2a122986a95c51d3dcc12a0fa10b92686c51c7b4749bd11c22fc8fd,2021-11-30T13:37:17.570000
|
||||
CVE-2021-44429,0,0,587dd6f9b5247698d13ef87c63be2d5aa09d646473aaea92c43d5a7308e07779,2021-11-30T13:36:20.317000
|
||||
CVE-2021-4443,1,1,3ace1904df87cc92e689437799a87cfd007adb259b0cc15e4988a058bd49107a,2024-10-16T07:15:09.713000
|
||||
CVE-2021-4443,0,0,3ace1904df87cc92e689437799a87cfd007adb259b0cc15e4988a058bd49107a,2024-10-16T07:15:09.713000
|
||||
CVE-2021-44430,0,0,3ccff7839f65b11012b2019e299a651a1a17f2885eedffa9b9ec86da31611366,2021-12-14T19:21:12.880000
|
||||
CVE-2021-44431,0,0,2e91f2763edc27376940aa47a9d7ab53556daddc2ad1a88e7ef2f6781fce4591,2021-12-14T17:47:20.180000
|
||||
CVE-2021-44432,0,0,cd0a316a7386777a874880c1121c3553a3950ff2e437c34667d62e28d050422c,2021-12-14T17:53:03.413000
|
||||
@ -185243,7 +185248,7 @@ CVE-2021-44436,0,0,048c6caebfcf7ab113da66a41bb26b2e0e70f5b8984a7c1a06881d2739d02
|
||||
CVE-2021-44437,0,0,8a90d342aeb0cad87d32332c31581acd0f43c4a26aa09ef1140c37671bf5f20b,2021-12-14T19:13:02.280000
|
||||
CVE-2021-44438,0,0,f9c77e7d144a7d50606e49c0f020b58e9e86bc0d05d5051b4ae94f067cdfe7b7,2021-12-14T19:13:48.997000
|
||||
CVE-2021-44439,0,0,2aec4cc9f5f9a164a5548cc985fffb27b760329eb4143a8dcf9cc767d6fba58e,2021-12-14T19:13:27.520000
|
||||
CVE-2021-4444,1,1,11465f71823e867d0991718317b3c621418f5cacbb65ad9b37515c018e9d1f87,2024-10-16T07:15:09.960000
|
||||
CVE-2021-4444,0,0,11465f71823e867d0991718317b3c621418f5cacbb65ad9b37515c018e9d1f87,2024-10-16T07:15:09.960000
|
||||
CVE-2021-44440,0,0,ef5b4a328b3ec30165d26a37452b2792e7c38d4a44aaadf6785ec52f7882ffa1,2021-12-14T19:03:15.087000
|
||||
CVE-2021-44441,0,0,022e3584046d89a11fa3be90acd6668a02a2a92ca85fe3c62a731255fe77064b,2021-12-14T19:11:58.420000
|
||||
CVE-2021-44442,0,0,b6cffb64f2da0ca8a4ec309d90afdac29f72df45be3daf155c6544991fcde95c,2021-12-14T19:12:44.137000
|
||||
@ -185254,14 +185259,14 @@ CVE-2021-44446,0,0,675abf2c9d1ddbbbfb7eede0bc3602140400072bc0b231ff5a10a1676baeb
|
||||
CVE-2021-44447,0,0,93ef1e3910fa7102abd2f9702876c40b3e58e9d0ed8f3d3538e8bd3261689298,2021-12-14T19:17:47.723000
|
||||
CVE-2021-44448,0,0,b01d9542808ee630f6aefba5237f5068238285fa517e68fb8f9e00d5878be7cb,2021-12-14T19:18:17.553000
|
||||
CVE-2021-44449,0,0,c405e6578ea25a9896061f4ed02c4a77707a77d09ddf2691e57e0aedcb094da6,2021-12-14T19:18:57.800000
|
||||
CVE-2021-4445,1,1,2b12b88721aae8bbf3bc61b7fb0361751a30fa52d7d43a69870400fda1c9dcb7,2024-10-16T07:15:10.193000
|
||||
CVE-2021-4445,0,0,2b12b88721aae8bbf3bc61b7fb0361751a30fa52d7d43a69870400fda1c9dcb7,2024-10-16T07:15:10.193000
|
||||
CVE-2021-44450,0,0,d5a43b418b439f4f8014f1828747af423a8377d6775795e6603d47519342268f,2021-12-14T17:24:55.260000
|
||||
CVE-2021-44451,0,0,64e256f598449eb16a9a352e1f50cc92084a6a20874366d23dca4c7763685e20,2022-02-05T02:06:44.807000
|
||||
CVE-2021-44453,0,0,04e583c25b1f2414923ac33503e872a613a811300a0da768cdaadd532f88e20f,2022-01-05T19:03:39.660000
|
||||
CVE-2021-44454,0,0,72264a6cead2b9958d8f2b0e48dfdb458a983d383bcf8105200dae54fdf2a17f,2022-02-16T14:34:19.853000
|
||||
CVE-2021-44457,0,0,c8432866d17694d2e8559b1902d29956d945569a8d05aa7b9afb0be1ff50de3d,2024-05-17T02:02:17.200000
|
||||
CVE-2021-44458,0,0,91539b14cf8e9d7a6d40bf519e12077ba54b4d46db9df621c0914a80c10792ea,2022-08-09T00:51:42.403000
|
||||
CVE-2021-4446,1,1,9dbd8a1aef156af69285a89e8e7602256f1cae0553a0bfe33bdd59fc6f2fac25,2024-10-16T07:15:10.447000
|
||||
CVE-2021-4446,0,0,9dbd8a1aef156af69285a89e8e7602256f1cae0553a0bfe33bdd59fc6f2fac25,2024-10-16T07:15:10.447000
|
||||
CVE-2021-44460,0,0,91b42a7a3efb9da8dec18db1d14c6cefea2b38c03b66d30e24112a66fe273a06,2024-07-15T02:15:03.363000
|
||||
CVE-2021-44461,0,0,7dc941f5a6643886eaebd18adbe4501e760fbb54d562083a44ffba8dcb1ba015,2024-07-15T02:15:03.457000
|
||||
CVE-2021-44462,0,0,28c37d96a23a332e4387295f29ae0af534ae561a8321e12cf19712bf4778f18e,2022-04-04T15:38:59.057000
|
||||
@ -185270,14 +185275,14 @@ CVE-2021-44464,0,0,ee767844e25ca947b4eaba9073fe808069921fbe5c56b123e7252d8d65655
|
||||
CVE-2021-44465,0,0,14f6bf0c1d10be913fa0fb8873231995b4e1af285efdb408357af10f77cba4b4,2024-07-15T02:15:03.533000
|
||||
CVE-2021-44466,0,0,a1a2cb3cba7adf6029dbf608607b8d21b39603b1ba2c4dff1356169abf0ac25b,2022-07-12T17:42:04.277000
|
||||
CVE-2021-44467,0,0,af2ebaaccfd6798ad3cbe410ec38c4b5d82f125ea8c7851703ed78c73d7a4dd8,2024-09-30T15:15:04.563000
|
||||
CVE-2021-4447,1,1,4dc6b573d477cf51bda4169a22d676f14f1b956afe7c3ed2b2e7cbf827e4c916,2024-10-16T07:15:10.687000
|
||||
CVE-2021-4447,0,0,4dc6b573d477cf51bda4169a22d676f14f1b956afe7c3ed2b2e7cbf827e4c916,2024-10-16T07:15:10.687000
|
||||
CVE-2021-44470,0,0,bf65356876fadd1e4bbcdca9a11a5da49fc1164e8405c0765b86a57037d02fed,2022-08-19T18:34:58.277000
|
||||
CVE-2021-44471,0,0,e9bb470313aa03110af56de4588b2a051a21c5b54cc2f1053c5abc56bb7075e5,2021-12-28T14:46:12.543000
|
||||
CVE-2021-44476,0,0,398362e6030dea7ee9aefc21638361a67f4ab579aa9d4980350cb25266bbdf29,2024-07-15T02:15:03.617000
|
||||
CVE-2021-44477,0,0,8059f08690d70d464f9a6a49458bee5cc6ff0a947abf25f59957ab405e2daf7b,2022-04-04T14:30:52.257000
|
||||
CVE-2021-44478,0,0,c89e69a0e964419c068765deaec3ff1e239e6f118958dbe52e02236674e17c7e,2022-07-28T18:12:36.160000
|
||||
CVE-2021-44479,0,0,8cea3450cf8bac0a6e4a6300cc359f9a7c00b5b6bea31be6f8e8b19c33781aca,2021-12-16T18:17:26.373000
|
||||
CVE-2021-4448,1,1,17710524d0b4575dd834a6a96d8f4c877991197f85fd68775acf487a43de1bfa,2024-10-16T07:15:10.980000
|
||||
CVE-2021-4448,0,0,17710524d0b4575dd834a6a96d8f4c877991197f85fd68775acf487a43de1bfa,2024-10-16T07:15:10.980000
|
||||
CVE-2021-44480,0,0,ddea244291b0724396d82dc4281cc3c83442a2fc58c58c2e60bc63edd247b296,2022-07-12T17:42:04.277000
|
||||
CVE-2021-44481,0,0,dbcfe1893eb2f7985aefe165b81e9828ea61d702498caab8e3bd89688cb1d9bc,2022-04-22T17:20:15.950000
|
||||
CVE-2021-44482,0,0,fd07f92c02617685f2f0d51129d25a98428904018ae992cb5341865e68692d10,2022-04-22T17:20:33.857000
|
||||
@ -185288,7 +185293,7 @@ CVE-2021-44486,0,0,27651a6cdbc22fd811c396815fcd58c7e9df9e9f02efddd164029d4bd79fd
|
||||
CVE-2021-44487,0,0,ce0f49aeeb21b12eb994e31f9dc8ea4fe493e2fe9799304f6f5aad363af30a48,2022-04-22T18:01:28.737000
|
||||
CVE-2021-44488,0,0,bc8fc47b2dc1fbdd2ff6796c164eebb69dd5e7769c2abff2f3b40703b1585918,2023-08-08T14:21:49.707000
|
||||
CVE-2021-44489,0,0,fc081116b281e7438a800f81bf67993d6eaa9a04d13c5b0ce5603c38a8798416,2022-04-22T18:07:30.377000
|
||||
CVE-2021-4449,1,1,cafc795192522c5eda50913bfabcb0ed6b016dad21948f9f80806f768449507c,2024-10-16T07:15:11.243000
|
||||
CVE-2021-4449,0,0,cafc795192522c5eda50913bfabcb0ed6b016dad21948f9f80806f768449507c,2024-10-16T07:15:11.243000
|
||||
CVE-2021-44490,0,0,51f6af39f7e9972b590a3dbba460e49e28124b6ab2ac9cafcc1c5568b297a218,2022-04-22T18:09:36.837000
|
||||
CVE-2021-44491,0,0,724834766a658e6af5246aa62e8b332579badff28d2a1ca2e55cfbfb4cacb43d,2022-04-22T18:10:27.727000
|
||||
CVE-2021-44492,0,0,a173c7c4257b833737dbbd312753d696476e51ef65f5326b2a29e920081a90a5,2022-04-22T17:35:22.267000
|
||||
@ -185299,7 +185304,7 @@ CVE-2021-44496,0,0,a07c07b6904c144bd70645c1900f72e0a5308f16f5c8420754481bf17edd8
|
||||
CVE-2021-44497,0,0,948a4f8a98e6d117d49b08d1c2fa9965216be8b16c34304f2be2dfe99b7b45a6,2022-04-22T15:57:06.907000
|
||||
CVE-2021-44498,0,0,c81b74e5f1199a3a2e4776dfaa85d0faa4c68db76a10423d7a5f2d91f494dcf5,2022-04-22T15:58:01.770000
|
||||
CVE-2021-44499,0,0,8c6047bfb74db5465d98b5344cfe14293befc2375500f0f94b07a920dcf8b7b4,2022-04-22T16:10:34.870000
|
||||
CVE-2021-4450,1,1,4370356082b20811b7627b73474e264d06eed946d644db3c645463a1064affc2,2024-10-16T07:15:11.527000
|
||||
CVE-2021-4450,0,0,4370356082b20811b7627b73474e264d06eed946d644db3c645463a1064affc2,2024-10-16T07:15:11.527000
|
||||
CVE-2021-44500,0,0,025bfd6caf5a2b7ad2796c2ed667f9f1b2ed0b57a8e1158094e8cd856a2925a8,2022-04-22T16:11:19.893000
|
||||
CVE-2021-44501,0,0,8865bba6dd75ef7675fb9be6a3ca0476f574dcc24bb3fbedb17e1dd48b2e17e1,2022-04-22T17:32:13.303000
|
||||
CVE-2021-44502,0,0,81821cd79b4d30f62969daad02d568ded97c95de61241e894ca7a3b889192d79,2022-04-22T16:13:14.973000
|
||||
@ -185310,7 +185315,7 @@ CVE-2021-44506,0,0,58aea1c6e9a257ce746f10c108c19ad7fec6cb4b1c3efb015f5efff33d4ea
|
||||
CVE-2021-44507,0,0,aebde9357e585eff7a908d0de741a5e2985f463655b48ff7bcf113e5f679573e,2022-04-22T17:33:03.377000
|
||||
CVE-2021-44508,0,0,c6792eaf6eb2a60c5e6ecdad5a800d632bb5b7ce863a54c68f8e7ac2a06ffd14,2022-04-22T15:16:26.873000
|
||||
CVE-2021-44509,0,0,f649a3c99dfb2035d5f2555476d3723c6b7a288e6f77c9ccc7c73904b306808f,2022-04-22T15:24:17.437000
|
||||
CVE-2021-4451,1,1,b358e155ee8534204ca81ba9155df685e8a41db3914ed87ff845cb56387fec64,2024-10-16T07:15:11.770000
|
||||
CVE-2021-4451,0,0,b358e155ee8534204ca81ba9155df685e8a41db3914ed87ff845cb56387fec64,2024-10-16T07:15:11.770000
|
||||
CVE-2021-44510,0,0,dfa3f0eec83167d212f23d0e1521038a3d1d2b98db47c6c7c2dc0e3c17256d77,2022-04-22T15:30:29.873000
|
||||
CVE-2021-44512,0,0,9ea723d5afac9658d5da6130a4b16112f4aad592a684696723d489c785f3a5b6,2022-05-03T16:04:40.443000
|
||||
CVE-2021-44513,0,0,1652b513dfbea72dbecb281e6d0e273723050582e745fe46b7e47813c9a3bc54,2021-12-08T14:27:43.643000
|
||||
@ -185318,6 +185323,7 @@ CVE-2021-44514,0,0,2a7086d1d54601eed770c0454ba29e18c0e1f41fa1b58e45f7ebbd09a20aa
|
||||
CVE-2021-44515,0,0,a65db06535f8b4773d2daf0133304ead4b1fddcb4c7f082e1d77b40dfd421d31,2022-07-12T17:42:04.277000
|
||||
CVE-2021-44518,0,0,6a19081138328f03517640b5c96243598b3cb901fb1ceb955c9e8d22a7e1dae7,2022-10-27T19:02:42.367000
|
||||
CVE-2021-44519,0,0,5d73bf5c61aacc79bc9b1378ba7e93da4b38fa87a7610cea8485b03f5bcaeb05,2022-12-02T22:41:25.380000
|
||||
CVE-2021-4452,1,1,35e4569dbe860d84dc0415bd5cb4bfac4c6ababf277a376b027fcd4c2cd6f438,2024-10-16T08:15:04.160000
|
||||
CVE-2021-44520,0,0,8d7ae8652eba2a0efbd36203eb59dc7a9c75f2ef5b741c6daec860d078052e63,2022-07-12T17:42:04.277000
|
||||
CVE-2021-44521,0,0,a386c301b2435823e8baf3812cb1ebfee9d09544605bd5c15eec2dfa07791349,2022-08-09T00:39:07.850000
|
||||
CVE-2021-44522,0,0,9a3dee88c414ef86293eaef6059ce8b99d1d61c06b661eb2e9d7e479ab95e389,2021-12-17T02:06:42.010000
|
||||
@ -212622,10 +212628,10 @@ CVE-2022-4966,0,0,d7772092edb1c4f6ea77758ef1a2b38cc5d3bd7ded1e7c81a0173f7456d0da
|
||||
CVE-2022-4967,0,0,acbcdcd64f9485d059508255d49aabf4f78227f1537ec6f5aeb5af6241be26cb,2024-06-14T13:15:49.633000
|
||||
CVE-2022-4968,0,0,e0fb0f21bd0757ce18bf39146f9d80fa921c9791f06b9f657a0acbeb470dddd2,2024-06-27T22:15:10.033000
|
||||
CVE-2022-4969,0,0,6da77d75911b6f9f4d4eed5e8e9a02ef51bdb2636c0fddb313d49f06fb600e32,2024-06-06T16:15:10.250000
|
||||
CVE-2022-4971,1,1,ba68a66890cd2489331f782a9f3d14687fb64709c4084be2263fdfb9d006e43f,2024-10-16T07:15:12.040000
|
||||
CVE-2022-4972,1,1,8766b8c9ef7f8198234b3fdbcef1d352638b90e67611351ed50be5c078fa203e,2024-10-16T07:15:12.257000
|
||||
CVE-2022-4973,1,1,a01e901900f241608c4733092a96e8e51faff4f3fbaeaa96a4efb5e034e13c66,2024-10-16T07:15:12.497000
|
||||
CVE-2022-4974,1,1,b23fa8d9e7f67244e89725af4bc1b87ed53c84fe972309e895baf9a33ec42c52,2024-10-16T07:15:12.760000
|
||||
CVE-2022-4971,0,0,ba68a66890cd2489331f782a9f3d14687fb64709c4084be2263fdfb9d006e43f,2024-10-16T07:15:12.040000
|
||||
CVE-2022-4972,0,0,8766b8c9ef7f8198234b3fdbcef1d352638b90e67611351ed50be5c078fa203e,2024-10-16T07:15:12.257000
|
||||
CVE-2022-4973,0,0,a01e901900f241608c4733092a96e8e51faff4f3fbaeaa96a4efb5e034e13c66,2024-10-16T07:15:12.497000
|
||||
CVE-2022-4974,0,0,b23fa8d9e7f67244e89725af4bc1b87ed53c84fe972309e895baf9a33ec42c52,2024-10-16T07:15:12.760000
|
||||
CVE-2023-0001,0,0,89cc7c25326dd5727e94c3abe5ce2365a868c05aa8d47b4c236024303b20e03e,2024-01-12T22:10:50.817000
|
||||
CVE-2023-0002,0,0,85151726e26db3dd412b666129cc1146d77d486c542304fa6aa1433f4f16452f,2023-11-07T03:59:26.433000
|
||||
CVE-2023-0003,0,0,0f4cd63b6620e63a4c26b7158c334115eb4a14a033fde970e1fda8144d0dfe5d,2024-02-16T17:04:22.737000
|
||||
@ -216858,7 +216864,9 @@ CVE-2023-22644,0,0,2e4e89ceb342737c49170c7c0542da6c5a09f3dc7477231f3f78658177ecd
|
||||
CVE-2023-22645,0,0,98c54d8f7492de84ea534bda447d0a2e6c33352ecae4e300edd6bdf72922ced2,2023-04-29T02:15:41.093000
|
||||
CVE-2023-22647,0,0,0681a89ef45e77cb88370b6be3b7fa1bc36fb3f322132affe5240d43f6147e4b,2024-10-09T09:15:03.133000
|
||||
CVE-2023-22648,0,0,efcbdf59a79cc8b674d3df58e9203094276b2160da909666a01d8f83b10e10b0,2024-10-09T09:15:04.260000
|
||||
CVE-2023-22649,1,1,d4ebf42ad718951503cab5c9b7b7a3e67f336adaccd056c63ea4e50903ae1ff3,2024-10-16T08:15:04.390000
|
||||
CVE-2023-2265,0,0,6f6b69921089c30ff5335917053cb9d5a1a7f59a21a953d6d1041152fa7874ac,2023-12-06T00:35:41.900000
|
||||
CVE-2023-22650,1,1,580262d04ddf34ae6b0fb497a834627526d09ac5a6bb987876be1c2a568653b7,2024-10-16T09:15:02.957000
|
||||
CVE-2023-22651,0,0,6d0f20aeda01e69ecd80dc8867cf7c9b361c7ee144fe7c3ff65cbb9e3210ad1c,2023-05-10T18:08:49.957000
|
||||
CVE-2023-22652,0,0,b96b1da985da20364c0e2e7f35e5ae49a780ad08eb5a89d6ab26c66053650903,2023-09-13T03:15:07.693000
|
||||
CVE-2023-22653,0,0,3d72c27281a8ea8408016eac6c592251cdcbf44d004ab30840957e6a323b7ed4,2023-08-02T15:34:59.683000
|
||||
@ -224280,6 +224288,7 @@ CVE-2023-32183,0,0,89db0e51560cda7144a4bc04901d7db9ee2db289560d2b478872936494607
|
||||
CVE-2023-32184,0,0,123bec51d72ff65d7213bf06e3d98dc3786350eb64238bdb1de857862a0ef22c,2023-09-22T15:23:52.010000
|
||||
CVE-2023-32186,0,0,e06556634f58d819dfae5b78cb8714f5c9bc5370508503590046fde23b8885e0,2023-09-22T02:00:06.313000
|
||||
CVE-2023-32187,0,0,604bbf8f396584f0efa1594da6fe3c409bf951238cacbb8e57499c590e5e3fd1,2023-09-21T15:21:31.567000
|
||||
CVE-2023-32188,1,1,414806e16a24df1ecbb6aadbe57c9884e174210dd398c42b014e332ad5c10d7d,2024-10-16T09:15:03.260000
|
||||
CVE-2023-3219,0,0,6eb56310ef4fd619262ae96943204b765f45a221a776e69bfc250b710761d69b,2023-11-07T04:18:14.830000
|
||||
CVE-2023-3220,0,0,3e074125b66b0b5b753fe9c22f3c8d0675e17e6906dbd8adf813bdbd4f910122,2023-06-27T12:44:47.967000
|
||||
CVE-2023-32200,0,0,6c410962ed2301957690ecb850b2aeb4572768f35e76f9eddc4d1fc62f123dab,2024-10-07T20:35:02.653000
|
||||
@ -241287,15 +241296,17 @@ CVE-2023-7273,0,0,774cfced0b2ee4833f367ba7f35fc76f033b87073fddd91ce6539024f87d7d
|
||||
CVE-2023-7279,0,0,f98ffb9aa7111762ac351724f18f9d9ee505a1023f26a13d8e9efc5698c9c712,2024-09-05T21:59:17.957000
|
||||
CVE-2023-7281,0,0,0790d4bfb469f439660a23ce8eab8f87d3be095fc643fdfe8eec46cdbb17ca3a,2024-09-26T13:32:55.343000
|
||||
CVE-2023-7282,0,0,f4fc1de03735b00b3526c9c4836a11bcc7904328f1e64bbcb0646541be7349bd,2024-09-26T13:32:55.343000
|
||||
CVE-2023-7286,1,1,f8c5ecb1a96ceefb733f652ca7d2ac290a293dd6476bd4cb3e1b9ac6bf41c551,2024-10-16T07:15:13.223000
|
||||
CVE-2023-7287,1,1,a5f45e98ba672295fe732ed480c7c3adff2570375965aa5b0c14e8368887aade,2024-10-16T07:15:13.507000
|
||||
CVE-2023-7288,1,1,f8570d17517116b7ca85153cc7ef91db8295791fe1557b9d53e570a0f2e1bb49,2024-10-16T07:15:13.743000
|
||||
CVE-2023-7289,1,1,0945637520f108d05c0727db0b1b22decd89ebf9c98f2b72c43ee7aa8cd37169,2024-10-16T07:15:14
|
||||
CVE-2023-7290,1,1,1e4d8363d283f5afd307bf62ea4b56c99c4c216c9d280b35c2fb724f60ff7977,2024-10-16T07:15:14.243000
|
||||
CVE-2023-7291,1,1,ef9826823269a63449c680b1fd36f980392c8c03638d8541a289f67e25afefbc,2024-10-16T07:15:14.503000
|
||||
CVE-2023-7292,1,1,7a8fe156abe76013973de0181b135aba33babcf286649d4a9c9a86373c6a9d8f,2024-10-16T07:15:14.737000
|
||||
CVE-2023-7293,1,1,673f003595e117fb5e010a499c08e675f325e27ef80171be3f6d6becd71daa1e,2024-10-16T07:15:14.970000
|
||||
CVE-2023-7294,1,1,8f7a0b4dcaedad6035ae3a7fa1755e6699ca8385c85027fe80bbc613dc0fefda,2024-10-16T07:15:15.277000
|
||||
CVE-2023-7286,0,0,f8c5ecb1a96ceefb733f652ca7d2ac290a293dd6476bd4cb3e1b9ac6bf41c551,2024-10-16T07:15:13.223000
|
||||
CVE-2023-7287,0,0,a5f45e98ba672295fe732ed480c7c3adff2570375965aa5b0c14e8368887aade,2024-10-16T07:15:13.507000
|
||||
CVE-2023-7288,0,0,f8570d17517116b7ca85153cc7ef91db8295791fe1557b9d53e570a0f2e1bb49,2024-10-16T07:15:13.743000
|
||||
CVE-2023-7289,0,0,0945637520f108d05c0727db0b1b22decd89ebf9c98f2b72c43ee7aa8cd37169,2024-10-16T07:15:14
|
||||
CVE-2023-7290,0,0,1e4d8363d283f5afd307bf62ea4b56c99c4c216c9d280b35c2fb724f60ff7977,2024-10-16T07:15:14.243000
|
||||
CVE-2023-7291,0,0,ef9826823269a63449c680b1fd36f980392c8c03638d8541a289f67e25afefbc,2024-10-16T07:15:14.503000
|
||||
CVE-2023-7292,0,0,7a8fe156abe76013973de0181b135aba33babcf286649d4a9c9a86373c6a9d8f,2024-10-16T07:15:14.737000
|
||||
CVE-2023-7293,0,0,673f003595e117fb5e010a499c08e675f325e27ef80171be3f6d6becd71daa1e,2024-10-16T07:15:14.970000
|
||||
CVE-2023-7294,0,0,8f7a0b4dcaedad6035ae3a7fa1755e6699ca8385c85027fe80bbc613dc0fefda,2024-10-16T07:15:15.277000
|
||||
CVE-2023-7295,1,1,dfcfcc824f1b0ac8779a698b90931483f9c10f5426b460a0db0d036d6c004cb5,2024-10-16T08:15:04.767000
|
||||
CVE-2023-7296,1,1,6467a9345706e9c70c0741441611fd5024e17ea9f00c22f856e5bc8ed9fc5642,2024-10-16T08:15:04.977000
|
||||
CVE-2024-0001,0,0,ddc97ec95f63469ba72943e3a1a3c2055a0f787a376d00af08b9e1c9de1e66b0,2024-09-27T14:08:57.327000
|
||||
CVE-2024-0002,0,0,8eba00d67fa29dcfc182e2e2367ab4a3c005649f9c2970e7f365907a3a42b06a,2024-09-27T14:13:24.427000
|
||||
CVE-2024-0003,0,0,46c85e4a496f19260982bccddc0ca5126276fd9fc3f3c6d4be9e905c5a7e34b8,2024-09-27T14:23:58.243000
|
||||
@ -244381,7 +244392,7 @@ CVE-2024-21530,0,0,1cd9789884a1ce72dfeb1a860d1947cabd2b932563c54dc2308d1b3820957
|
||||
CVE-2024-21531,0,0,556b4244c50c270222e18b4d703d3656d63fc81c95a1cab5391fb75a68df3d26,2024-10-04T13:51:25.567000
|
||||
CVE-2024-21532,0,0,a24d27f47c5298fab706ab72282873a260fc61d5e510f460d432a2b7b9c38bac,2024-10-10T12:57:21.987000
|
||||
CVE-2024-21533,0,0,b6d94b5290ee8a666e06ea3154c21a82f3a037332835b4cbc04bf2409f97ee11,2024-10-10T12:57:21.987000
|
||||
CVE-2024-21534,0,0,fbfd2c9efbdef3792dc1f4e6bcdeb527f71693fa6f6530e9cd12d16dcbf1069d,2024-10-15T12:58:51.050000
|
||||
CVE-2024-21534,0,1,b752ab4dc63cdf4c5681dd0e8f0538c7b04ba97e65d41096c405fe76b964ca23,2024-10-16T09:15:03.410000
|
||||
CVE-2024-21535,0,0,dd690d7709ed4ced0a9a8cbf1f59dfc2612ba8c6a810d6d21ffc9a3f5e9a7d9a,2024-10-15T12:57:46.880000
|
||||
CVE-2024-2154,0,0,ab5f0b39bb38e5c25606bad964d563e0edda059ff34db22b99ca2b3670b021ff,2024-05-17T02:38:04.970000
|
||||
CVE-2024-21545,0,0,614ed901d7a98204a096c9331020afa9e58729de6a0c722ccca7898674ea9a4d,2024-09-26T13:32:02.803000
|
||||
@ -255622,7 +255633,7 @@ CVE-2024-37265,0,0,15f68b41e4db6ae6ccda7f80b0a70abe19004015dbcf0d1246d37335388c5
|
||||
CVE-2024-37266,0,0,44943b1bec747c3c4ecddbc943aaff365210584d2dac21ff41065ed54e40dcb1,2024-08-29T18:59:40.057000
|
||||
CVE-2024-37267,0,0,0d692f1d5fdd2443078b17f2b54167a732ba33e5479382e14b7e2bd4b6ec49a8,2024-07-25T13:47:43.833000
|
||||
CVE-2024-37268,0,0,32108042cd6042edb5d9a980c4bc9e7e171800cf8a42366d53d95c0b76a50314,2024-08-29T18:56:01.267000
|
||||
CVE-2024-3727,0,1,ed44f253572252eb15ee966703d1a76f4efe48b3e89b2596353950937d8c7ded,2024-10-16T07:15:15.583000
|
||||
CVE-2024-3727,0,0,ed44f253572252eb15ee966703d1a76f4efe48b3e89b2596353950937d8c7ded,2024-10-16T07:15:15.583000
|
||||
CVE-2024-37270,0,0,09adf8729d6feae3191994dc6f2b286449a8e4d910f8c343a3a9496ea050a29f,2024-07-11T13:05:54.930000
|
||||
CVE-2024-37271,0,0,82adde283ff9dacc0f77be200c055ea2f2c58a80387c070880c7d1f2c1068d32,2024-07-25T13:46:39.273000
|
||||
CVE-2024-37273,0,0,2a85b1da0ca6e483bcfb6dea755537146c70a6967cba53f16b02bbb377a77813,2024-08-15T14:35:03.053000
|
||||
@ -260589,6 +260600,9 @@ CVE-2024-45200,0,0,c755ac93f1b17cd8efb21d298d911a4f5dcab9011db4f75e5e04cf5d33a0f
|
||||
CVE-2024-45201,0,0,83db05d7484ca5c2638e18e64e3b5c06d28a9caaae332ad6d01f844ea902b04a,2024-08-23T16:18:28.547000
|
||||
CVE-2024-45203,0,0,0a34ec3cf21e7526a71f11433fb5593e3ea52ee9638fd0c30ca94a57eb961782,2024-09-16T13:27:19.190000
|
||||
CVE-2024-4521,0,0,a1d240438f25322e21494c2ddd2f5ee26b23410f012534bc2c27a0a49b09a860,2024-06-04T19:20:41.223000
|
||||
CVE-2024-45216,1,1,847241c32163fa2f1da44e964dd82e09a72e1b9e33fe800bf971295cc5f43631,2024-10-16T08:15:05.233000
|
||||
CVE-2024-45217,1,1,39e9fcd4bde0ccbb93f23fb3a4d5a3075f7982e2b29366e996c36d7651f566cc,2024-10-16T08:15:05.353000
|
||||
CVE-2024-45219,1,1,06b619a7ceeb8d6cb7f11a182142d97bca23ca2b11f4b8ef3e2808092ace22d3,2024-10-16T08:15:05.473000
|
||||
CVE-2024-4522,0,0,acd0b6b231758473c48ed22daa75c2f0d87280406667aa3ced0f39aaa73cb777,2024-06-04T19:20:41.320000
|
||||
CVE-2024-45229,0,0,9c8c70fcda9c99c754f0fdd9cd19b64ab40d1023f96876f950167f9ed6ee6a43,2024-09-26T13:32:55.343000
|
||||
CVE-2024-4523,0,0,e149ff229bd41b5a453469b36d558b5c1f467161b85c2884a74fe2177217c73a,2024-06-04T19:20:41.420000
|
||||
@ -260753,6 +260767,8 @@ CVE-2024-45458,0,0,a61716ce0d3fef0ec6cc594d56bae2d0a9a90d5b7d46e3aad6884d33d8f55
|
||||
CVE-2024-45459,0,0,9b179c3f3fb0a5657b063c5e1d95801691f8f9a5515abf4db8b2da6f6597452a,2024-09-27T14:46:32.483000
|
||||
CVE-2024-4546,0,0,b54fd960b0f682682e91f5a439869fe44d7d9c83b2d79e063c1697b7441a9761,2024-05-16T13:03:05.353000
|
||||
CVE-2024-45460,0,0,b05278f65cfdb1f7853ef120543347199a3969bb30d487211ecff7d9eae8c937,2024-09-27T14:51:08.120000
|
||||
CVE-2024-45461,1,1,faed0db56c27b3ef74d610140abacd74da969db5207083f811208f75d998496d,2024-10-16T08:15:05.717000
|
||||
CVE-2024-45462,1,1,45f22b46d2b8bea7546b2a7b05fd01cd8ec47bd42cd7404ed91727ebeff8fd56,2024-10-16T08:15:05.933000
|
||||
CVE-2024-45463,0,0,a9a5f56b759215b2281ec627fe0c607aa07ab62cdff5847ecbdaa1e6768d0035,2024-10-15T17:35:51.263000
|
||||
CVE-2024-45464,0,0,8b929b4e136ea61613724435daa38f3adbab6eb0ab0969f0cee83dc792efc84a,2024-10-15T17:35:33.887000
|
||||
CVE-2024-45465,0,0,810f47d979302bb0c310fa31cc05b9821ef43ec873eb81fa46fb54894361c8d3,2024-10-15T17:35:22.230000
|
||||
@ -260843,6 +260859,7 @@ CVE-2024-4568,0,0,950b62937f2f303cb16f164d002be64527131317e5dfff26daecb96b6bec42
|
||||
CVE-2024-45682,0,0,8584442aa3e66ef486ff4d0e65e36dc65b16a5528e312d936a157a665ef44302,2024-09-27T18:54:51.820000
|
||||
CVE-2024-4569,0,0,2e4b27b05be8561bd3f260b3ccf0eed0d11ea74483878f5df5227737faa1c038,2024-06-28T13:10:05.153000
|
||||
CVE-2024-45692,0,0,281ed60ed9431c734132a4f1fca034600bdda2bdb5b83bc44745bc26a826447d,2024-09-05T21:35:14.337000
|
||||
CVE-2024-45693,1,1,e6dae0ca07bcafa329f0219f5f3de89f23ee3660c7e568b52ee1f50938babc10,2024-10-16T08:15:06.160000
|
||||
CVE-2024-45694,0,0,6df0853247a969905230185a9047d7f0b5d3157f1a7bc76614dde5322218c3ae,2024-09-17T18:40:07.243000
|
||||
CVE-2024-45695,0,0,da601d84ea417c0c9279d85654ade81af5192308ba1ba5409f7a2b21c121a433,2024-09-17T18:40:38.573000
|
||||
CVE-2024-45696,0,0,15dc5b5bd95cf2badd72adb77d96e01d4ef86e61af344574364ee75cad060ea9,2024-09-19T21:42:36.557000
|
||||
@ -260850,6 +260867,10 @@ CVE-2024-45697,0,0,f5a37290219fae59e8d61a5bcf73769a3b20c61fab40a7e37a2a1d321507c
|
||||
CVE-2024-45698,0,0,f6526298a3f199ded6c907356b8dd6f5db94f0696639cd8ae5a504a08cbeae04,2024-10-15T10:15:02.853000
|
||||
CVE-2024-4570,0,0,c1cc5ae154200d1c8cbc554d2bd91b7f0d0e2fb1c25faf550303ad23eb2c106c,2024-06-28T13:38:13.630000
|
||||
CVE-2024-4571,0,0,76823bb120333d1d68e24e57a18868a62bd826931cb118db3f1630877d1250ae,2024-05-14T15:44:05.750000
|
||||
CVE-2024-45710,1,1,6b23b070c353040a5c1ff63de53fdc7e006ecfebbb63edd81f77a770e7e538f1,2024-10-16T08:15:06.387000
|
||||
CVE-2024-45711,1,1,5fa7b955f441fc449a6d055cdd4a0a305b2241253e21ae0f9a82864b8f0dc705,2024-10-16T08:15:06.690000
|
||||
CVE-2024-45714,1,1,fddccf934ff5cfed6ab2883c33c973a4a8eb0984ee03efe9b85c7e509d97cc5e,2024-10-16T08:15:06.897000
|
||||
CVE-2024-45715,1,1,701e82d31c5ef34eaf266be991461f01e406af5d4df14e149ae62858110921f3,2024-10-16T08:15:07.110000
|
||||
CVE-2024-4572,0,0,6754f54e88e479a744a4367c8d1d2577fd697a90d0783dabcb9fc508df61090e,2024-05-14T15:44:06.153000
|
||||
CVE-2024-45720,0,0,9a958c282ef360c53e2ab2db366594f7b62a7ef8d528ac6998de122fd3a653b0,2024-10-10T12:51:56.987000
|
||||
CVE-2024-45723,0,0,63a77b3806467261b762149cf38436dbbeeccf91520557e4f16dba13005bb2d7,2024-10-07T17:43:52.783000
|
||||
@ -263516,7 +263537,7 @@ CVE-2024-6504,0,0,6666bb3ba2314d1147da34b1413146555668de024ce515e1e34c91b1fe3247
|
||||
CVE-2024-6505,0,0,2472b280b959c45a84076dc8298b1f0ea15132bfdd2f045bf3ab100aab446db1,2024-09-19T06:15:03.463000
|
||||
CVE-2024-6506,0,0,58310ca3e68e3dacb16dafd9b32db187bdf111a88d3da008267c8c84bbec48d6,2024-07-05T12:55:51.367000
|
||||
CVE-2024-6507,0,0,4e3b24fd61e25de66a6840473e4d19109a713188592b0f05efa1cbb9de33936e,2024-07-08T14:19:21.610000
|
||||
CVE-2024-6508,0,1,d23055a39e1df773d98780577d434c72bc67df9f2fd0b90538a160cf45e32579,2024-10-16T07:15:16.027000
|
||||
CVE-2024-6508,0,0,d23055a39e1df773d98780577d434c72bc67df9f2fd0b90538a160cf45e32579,2024-10-16T07:15:16.027000
|
||||
CVE-2024-6509,0,0,7eb4fc03788f01fd646b7975c190061926ae41b355a82f9aed0c1fc50ccfb715,2024-09-10T12:09:50.377000
|
||||
CVE-2024-6510,0,0,5e8ec1aef4696d364d1cf0507192e6236a7f19c30decdfeea7966d96cda0feda,2024-10-02T17:17:46.450000
|
||||
CVE-2024-6511,0,0,053f3089b06a0cd915df79eb3301836b5db5c9fe4d3ed571ee6923d36f4d1832,2024-07-05T12:55:51.367000
|
||||
@ -264294,7 +264315,7 @@ CVE-2024-7481,0,0,029caf1b5321966d6fff7b258f5edb21656af3703408123f2c0a2bb28c2a7f
|
||||
CVE-2024-7484,0,0,922e65f90a754867bdae2807b60c4750519990bf6adcc62fb148334df21e54c7,2024-08-06T16:30:24.547000
|
||||
CVE-2024-7485,0,0,0b34fc91c3d825ea4087a792a0e5c6d839cf66a581a05d0c60df64b0af48f97e,2024-08-06T16:30:24.547000
|
||||
CVE-2024-7486,0,0,e2579b82a31704160b51da6f8b3285ef5bff1d765f5e0369c7378c4f856658fb,2024-08-08T13:04:18.753000
|
||||
CVE-2024-7489,0,1,a911c458f8c85ecb33feabe2fee5828bb307bd0fdaa5447d2dc32acdf03946c2,2024-10-16T07:15:16.160000
|
||||
CVE-2024-7489,0,0,a911c458f8c85ecb33feabe2fee5828bb307bd0fdaa5447d2dc32acdf03946c2,2024-10-16T07:15:16.160000
|
||||
CVE-2024-7490,0,0,2dbd6717a12bca522d1065ac017f63874351831b0b05b9f6e750116d667cf962,2024-08-12T15:22:20.267000
|
||||
CVE-2024-7491,0,0,d689a374fb3537e15633f4540eb868e4dc80670c3ee0d8274c63d44d12227824,2024-09-26T13:32:02.803000
|
||||
CVE-2024-7492,0,0,6476a74ce2975ad097c7a45c1f2f905cc77480bec2260de48447ae3a8b41df62,2024-08-08T13:04:18.753000
|
||||
@ -265053,7 +265074,7 @@ CVE-2024-8499,0,0,a066f12eb0db45b577c1044e88855b3e531b0d4e8e1575f5845b6487effebb
|
||||
CVE-2024-8503,0,0,9f803200a857fcdb413b5557fdfb30066c33963fff9f6132df8887c5f7ded0b9,2024-09-11T16:26:11.920000
|
||||
CVE-2024-8504,0,0,8357da8291f04353fac31874868f2eb40b31e26be1555ef771437bf9554e80e3,2024-09-12T14:35:23.173000
|
||||
CVE-2024-8505,0,0,1c04e90354babae2df3035dc354852183330b8445c04d1f2331a89a32b3e4a48,2024-10-07T19:26:53
|
||||
CVE-2024-8507,1,1,92659dc14de63bdd971bb2b8cd9dcbd96ec45d659353901efc35a70fd03146d9,2024-10-16T07:15:16.277000
|
||||
CVE-2024-8507,0,0,92659dc14de63bdd971bb2b8cd9dcbd96ec45d659353901efc35a70fd03146d9,2024-10-16T07:15:16.277000
|
||||
CVE-2024-8508,0,0,095cff01fb00165e2108ed0a6b3f940edeffb7916515f1cc0f2ea48f2031a7c8,2024-10-04T13:50:43.727000
|
||||
CVE-2024-8509,0,0,72b678ade46a23d1db65e1dfb65526568e7875d83752ef0a47b4a7edfeaf5ddf,2024-09-09T19:15:14.837000
|
||||
CVE-2024-8513,0,0,910ae7d47a27f3be55b8ebbee4133c06edee61ebde300e418feb96105acdd2ce,2024-10-15T13:33:14.333000
|
||||
@ -265210,7 +265231,7 @@ CVE-2024-8738,0,0,8d7254f4f1af2919bab9c4b9c8e7ac85cdc1b41f46ed454e2ea854234d64d1
|
||||
CVE-2024-8741,0,0,b4e1d7f7dfc20b3d40ed40689f6d2a74196871e98895f038c49cf39f3f685863,2024-10-02T16:37:16.407000
|
||||
CVE-2024-8742,0,0,22ad08a64cc55234113e83ee811bd639e6d0a7f5c2878d141833012213ce6335,2024-09-27T16:28:07.827000
|
||||
CVE-2024-8743,0,0,65920323e1d664fd8f354bc76b73276103c2d19a537eecec01fa5cc8c5638d58,2024-10-07T17:48:28.117000
|
||||
CVE-2024-8746,1,1,2adbd9e55fcc7075a1cff31cd1a1b9830f00a38e64a33dd240261d3beed9461f,2024-10-16T07:15:16.537000
|
||||
CVE-2024-8746,0,0,2adbd9e55fcc7075a1cff31cd1a1b9830f00a38e64a33dd240261d3beed9461f,2024-10-16T07:15:16.537000
|
||||
CVE-2024-8747,0,0,c8071dd8d89406610db13dc6a04dbbb98461ebd7257641ae31a11de6b1ad5c9f,2024-09-26T19:23:12.477000
|
||||
CVE-2024-8749,0,0,dc7dd50ec6adedb45c385a82f706a7ab45f55e506e70a64a626b0d8f521f6289,2024-09-18T18:53:54.860000
|
||||
CVE-2024-8750,0,0,6aa000b45a0c694359dda91e7e992492dcd4e93d6e7b8c131ee0a86fa36b5620,2024-09-18T20:38:42.123000
|
||||
@ -265296,7 +265317,7 @@ CVE-2024-8913,0,0,fca416d77c5623788a9db07f1a3764802595b9fed9406445b458bbb4d1cd4d
|
||||
CVE-2024-8914,0,0,c67ce2c8d24044b482c9bbb33384856203ff5bb870309850d7df3d6267c1b679,2024-09-26T13:32:02.803000
|
||||
CVE-2024-8915,0,0,80988e61f2deb23ce0d3db6a9db0275f7f6c7eec9c9b53e27317ff9faa29da01,2024-10-15T12:57:46.880000
|
||||
CVE-2024-8917,0,0,32a69b030ac61cd4e144a233fc55362cc6115ccb6ecca5ec236644320a2aecf1,2024-09-30T14:30:38.687000
|
||||
CVE-2024-8918,1,1,084bd8c5ed92875e6f88d442f38453599e3b598184441c66b1a4885b965a4813,2024-10-16T07:15:16.777000
|
||||
CVE-2024-8918,0,0,084bd8c5ed92875e6f88d442f38453599e3b598184441c66b1a4885b965a4813,2024-10-16T07:15:16.777000
|
||||
CVE-2024-8919,0,0,e01b61fd584c4fffdfd8e5db7a09e1be1033f5c7df5b5418d10948726a2bc540,2024-09-30T15:08:14.077000
|
||||
CVE-2024-8922,0,0,8e0e34187cf2453e3fbc920fc9b2ec5c27a6978605c90cb2daa5d0ef90213fbe,2024-10-04T19:11:47.217000
|
||||
CVE-2024-8925,0,0,573fa9fc5dcadaf344ac622d80d126966b00ab4fb4c5a5f790f844b7bfe8b0ca,2024-10-10T12:57:21.987000
|
||||
@ -265375,6 +265396,7 @@ CVE-2024-9051,0,0,e0f892f6090989bc65bfe2c27d48e7e51216899c12a8aa5d44d38bf2b4829d
|
||||
CVE-2024-9054,0,0,632533b0b073919c9f25cb14ed4a8d11056b8ec4f59845703ce4b59b194b976c,2024-10-10T18:46:08.743000
|
||||
CVE-2024-9057,0,0,1e7730ffd6c424e386d911bdf2bfee9e4291e522521f210193a354376f62eabc,2024-10-15T13:58:19.960000
|
||||
CVE-2024-9060,0,0,362dff7d92c4f79cdb773c7965db43bbd7eb0923ce5f0445c06b15d2c9fc0e79,2024-10-04T13:51:25.567000
|
||||
CVE-2024-9061,1,1,562c310fa8881d33082aa6f79185fddd34abe9046bbc5c1d456162d7271bc94b,2024-10-16T08:15:07.323000
|
||||
CVE-2024-9063,0,0,df96d256cb802a721004c9ac9223f80a26c192f9136fb3599130ecff1f9d6c94,2024-09-25T01:15:48.670000
|
||||
CVE-2024-9064,0,0,4bd835018f8ee84a333231ae5a909dfea000d9b5863547b4810da47567f71043,2024-10-15T14:11:11.790000
|
||||
CVE-2024-9065,0,0,9f19d6078338677f112d6f1d89cff294845d2bd1abe5e252fa8925e15f71d1bc,2024-10-15T14:14:18.590000
|
||||
@ -265612,6 +265634,7 @@ CVE-2024-9535,0,0,4a71ba0a2572a89f39d0b54033731c76d4c93435778a2b1285d18249bf7f61
|
||||
CVE-2024-9536,0,0,56b0d71a5e1f747b35f1ac4fcfd42bf040a735cf796864344938e26d90f6930b,2024-10-07T17:47:48.410000
|
||||
CVE-2024-9538,0,0,11f6571425b77352661bef56e196d840faf334a919cdd5771fb07fb3f313a4e6,2024-10-15T12:58:51.050000
|
||||
CVE-2024-9539,0,0,a0cbd26a327675fb40fcaea93c0a3ea911dbc683021df526355995459666c7a0,2024-10-15T12:57:46.880000
|
||||
CVE-2024-9540,1,1,9e4922d87ea2ee3572be93d179833331fe4596b65ad6d5de59d2554ecb210480,2024-10-16T08:15:07.547000
|
||||
CVE-2024-9543,0,0,2a7de8e1e43a15761699f58c8b8bbb57c7e560a2fb555c13127ead0f3f3c7fd9,2024-10-15T12:58:51.050000
|
||||
CVE-2024-9546,0,0,bf353c5a5978f7f8468721bb633c8599b93f34e5026cc20c4dc4e5683c7393da,2024-10-15T12:57:46.880000
|
||||
CVE-2024-9548,0,0,c926d1965d0fc43d341cc5174337c64b2123a47e21014504a2a02f5aaf1cda9c,2024-10-15T12:57:46.880000
|
||||
@ -265644,7 +265667,7 @@ CVE-2024-9574,0,0,a60670a65a4470a80e62c618e77fec3e5e5071e32e3c874874eb23f89671df
|
||||
CVE-2024-9575,0,0,902a179ba291c73f1ff19f974c0569ed05c8dbb3d8914c4f7409455feb2bd5d7,2024-10-14T08:15:02.970000
|
||||
CVE-2024-9576,0,0,7a96a155cd09492144b259aa00c523497a7aeb66fdb84ed492d68f7654aa3880,2024-10-07T17:47:48.410000
|
||||
CVE-2024-9581,0,0,fb1d34fab9f94525003a0f26c830b830dcb7b4bdc92dd8a95590c26db891e7c3,2024-10-15T14:28:35.283000
|
||||
CVE-2024-9582,1,1,6f9edfac65352910eb4469af0c7a4c3dab761a8e62e31b1b92c75db9096c1974,2024-10-16T07:15:17.033000
|
||||
CVE-2024-9582,0,0,6f9edfac65352910eb4469af0c7a4c3dab761a8e62e31b1b92c75db9096c1974,2024-10-16T07:15:17.033000
|
||||
CVE-2024-9586,0,0,a482a25f032ea940edbd74f8dc11272d0d4fecf517c5613466c04b8bd798dc3e,2024-10-15T12:58:51.050000
|
||||
CVE-2024-9587,0,0,081ae6ebdba381265a40b327141c3458d6ec1c5b94d7fb86236bf633a93923d3,2024-10-15T12:58:51.050000
|
||||
CVE-2024-9592,0,0,6f7f83fab1eebba9a1f954ec84a1bbaa3c51a5f9b9c0e4a02c7010d63a53fba8,2024-10-15T12:57:46.880000
|
||||
@ -265721,11 +265744,12 @@ CVE-2024-9824,0,0,0b6b46e52b34b071e6f48e5304d76a541526a4368e490338503476fca42489
|
||||
CVE-2024-9837,0,0,bb8fbc31e530027dfddbaf6dae2f5d1b4333d91b7cafcea32a3d82a1ea54dea9,2024-10-15T12:57:46.880000
|
||||
CVE-2024-9855,0,0,f4067d5f9739a4a46f27ed071acd023bca1d9a27db9968d98f329af2e8d70e8b,2024-10-15T12:58:51.050000
|
||||
CVE-2024-9856,0,0,531963d8959dcaa0b68edaa5a63ce972541a941d9ad2303b1c288946d989ee89,2024-10-15T12:58:51.050000
|
||||
CVE-2024-9858,1,1,739e2f5935100ddc3d64a1f7fc2fb460fdc295e6845bb9ad27c16b38943f183c,2024-10-16T09:15:03.550000
|
||||
CVE-2024-9859,0,0,144046db89cc7a1614c278bf90f5b4cc56b3ffdbde195acab46c61c2bc1b4092,2024-10-15T19:35:46.273000
|
||||
CVE-2024-9860,0,0,5146b7a0224d680f933516d3f319e5a1a7abd782ae32358fb855e1c62c4df555,2024-10-15T12:57:46.880000
|
||||
CVE-2024-9869,0,0,2195387ef9aab560e210893ad1e9f3295c5808c9d50c0ada4fa1d17778d3d1ae,2024-10-11T15:15:06.500000
|
||||
CVE-2024-9873,1,1,cd4ff22f11313acb0d82df82e47be4f4940aecb8b45f90ef5f3e186f0e33c740,2024-10-16T06:15:02.527000
|
||||
CVE-2024-9888,1,1,68fc5031c0a52291fb2b329f8fc062d33bbb29cbbfbe4c31c17b0360603a1eae,2024-10-16T06:15:03.650000
|
||||
CVE-2024-9873,0,0,cd4ff22f11313acb0d82df82e47be4f4940aecb8b45f90ef5f3e186f0e33c740,2024-10-16T06:15:02.527000
|
||||
CVE-2024-9888,0,0,68fc5031c0a52291fb2b329f8fc062d33bbb29cbbfbe4c31c17b0360603a1eae,2024-10-16T06:15:03.650000
|
||||
CVE-2024-9891,0,0,4c8a9a58887e98726942bc0a2fd35c0c88241c217c7fd52663f3ef69115d2406,2024-10-16T02:15:08.333000
|
||||
CVE-2024-9894,0,0,14c1a187244ef98f70dad85c66b4e9e50b1523e45b13c684f05d8920a1d43b87,2024-10-15T12:57:46.880000
|
||||
CVE-2024-9895,0,0,1804aadc601cefc0a637c4245324ad03665b7298686ff057930daf35aa0b9bfa,2024-10-15T12:57:46.880000
|
||||
@ -265751,7 +265775,7 @@ CVE-2024-9923,0,0,1744d806aab87c1cbef5524d43cf9cad10cdae75dc6a2cfd8b34f2d3877dca
|
||||
CVE-2024-9924,0,0,4d0aa49bc1047e2e0a23ab80e176dbdf70a0af5e82bea53f63a116cd5905286e,2024-10-15T12:57:46.880000
|
||||
CVE-2024-9925,0,0,40ec06885e2cf941cc3fd6c1effc99e4018421341691aa45ec80f48176ade482,2024-10-15T12:57:46.880000
|
||||
CVE-2024-9936,0,0,9b9410743fe1ca2f5a844c24ad20043ec989ced54414fa626e93bdc74b6425ff,2024-10-15T12:57:46.880000
|
||||
CVE-2024-9937,1,1,fc21cd16c574ce1a245aba103e1615576201cab8b5d108df1842ab1a89488a60,2024-10-16T06:15:04.177000
|
||||
CVE-2024-9937,0,0,fc21cd16c574ce1a245aba103e1615576201cab8b5d108df1842ab1a89488a60,2024-10-16T06:15:04.177000
|
||||
CVE-2024-9944,0,0,0105315be1482473acf9cccf2807cd53dd651f41a7a3739bca8c3d692de03102,2024-10-15T12:57:46.880000
|
||||
CVE-2024-9952,0,0,75bf1164383c64f84aaae3ebb54926536c4d8cc1bc9810fac6b8f11ba1e426eb,2024-10-15T12:57:46.880000
|
||||
CVE-2024-9953,0,0,d4420057cd6ff540e58057e827a120bd402b45b9e9ab6580a72e462bb02065ee,2024-10-15T15:15:13.660000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user