mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
Auto-Update: 2024-11-20T19:00:20.813444+00:00
This commit is contained in:
parent
28cd1071ad
commit
6fa76129b2
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2017-13227",
|
"id": "CVE-2017-13227",
|
||||||
"sourceIdentifier": "security@android.com",
|
"sourceIdentifier": "security@android.com",
|
||||||
"published": "2024-11-14T23:15:05.013",
|
"published": "2024-11-14T23:15:05.013",
|
||||||
"lastModified": "2024-11-19T20:25:24.913",
|
"lastModified": "2024-11-20T17:35:01.323",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -36,6 +36,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 1.8,
|
"exploitabilityScore": 1.8,
|
||||||
"impactScore": 3.6
|
"impactScore": 3.6
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 5.5,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 3.6
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
@ -2,16 +2,55 @@
|
|||||||
"id": "CVE-2017-13315",
|
"id": "CVE-2017-13315",
|
||||||
"sourceIdentifier": "security@android.com",
|
"sourceIdentifier": "security@android.com",
|
||||||
"published": "2024-11-19T18:15:18.613",
|
"published": "2024-11-19T18:15:18.613",
|
||||||
"lastModified": "2024-11-19T21:56:45.533",
|
"lastModified": "2024-11-20T17:35:01.990",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "In writeToParcel and createFromParcel of DcParamObject.java, there is a permission bypass due to a write size mismatch. This could lead to an elevation of privileges where the user can start an activity with system privileges, with no additional execution privileges needed. User interaction is not needed for exploitation."
|
"value": "In writeToParcel and createFromParcel of DcParamObject.java, there is a permission bypass due to a write size mismatch. This could lead to an elevation of privileges where the user can start an activity with system privileges, with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "En writeToParcel y createFromParcel de DcParamObject.java, existe una omisi\u00f3n de permisos debido a una discrepancia en el tama\u00f1o de escritura. Esto podr\u00eda generar una elevaci\u00f3n de privilegios donde el usuario puede iniciar una actividad con privilegios del sistema, sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 7.8,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-131"
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://source.android.com/security/bulletin/2018-05-01",
|
"url": "https://source.android.com/security/bulletin/2018-05-01",
|
||||||
|
@ -2,16 +2,55 @@
|
|||||||
"id": "CVE-2018-9339",
|
"id": "CVE-2018-9339",
|
||||||
"sourceIdentifier": "security@android.com",
|
"sourceIdentifier": "security@android.com",
|
||||||
"published": "2024-11-19T19:15:05.677",
|
"published": "2024-11-19T19:15:05.677",
|
||||||
"lastModified": "2024-11-19T21:56:45.533",
|
"lastModified": "2024-11-20T17:35:03.690",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Undergoing Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "In writeTypedArrayList and readTypedArrayList of Parcel.java, there is a possible escalation of privilege due to type confusion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
|
"value": "In writeTypedArrayList and readTypedArrayList of Parcel.java, there is a possible escalation of privilege due to type confusion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "En writeTypedArrayList y readTypedArrayList de Parcel.java, existe una posible escalada de privilegios debido a una confusi\u00f3n de tipos. Esto podr\u00eda generar una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 7.8,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-704"
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://source.android.com/security/bulletin/2018-06-01",
|
"url": "https://source.android.com/security/bulletin/2018-06-01",
|
||||||
|
@ -2,16 +2,55 @@
|
|||||||
"id": "CVE-2018-9340",
|
"id": "CVE-2018-9340",
|
||||||
"sourceIdentifier": "security@android.com",
|
"sourceIdentifier": "security@android.com",
|
||||||
"published": "2024-11-19T19:15:05.743",
|
"published": "2024-11-19T19:15:05.743",
|
||||||
"lastModified": "2024-11-19T21:56:45.533",
|
"lastModified": "2024-11-20T17:35:05.083",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Undergoing Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "In ResStringPool::setTo of ResourceTypes.cpp, it's possible for an attacker to control the value of mStringPoolSize to be out of bounds, causing information disclosure."
|
"value": "In ResStringPool::setTo of ResourceTypes.cpp, it's possible for an attacker to control the value of mStringPoolSize to be out of bounds, causing information disclosure."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "En ResStringPool::setTo de ResourceTypes.cpp, es posible que un atacante controle que el valor de mStringPoolSize est\u00e9 fuera de los l\u00edmites, lo que provoca la divulgaci\u00f3n de informaci\u00f3n."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 7.5,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-787"
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://source.android.com/security/bulletin/2018-06-01",
|
"url": "https://source.android.com/security/bulletin/2018-06-01",
|
||||||
|
@ -2,16 +2,55 @@
|
|||||||
"id": "CVE-2018-9341",
|
"id": "CVE-2018-9341",
|
||||||
"sourceIdentifier": "security@android.com",
|
"sourceIdentifier": "security@android.com",
|
||||||
"published": "2024-11-19T19:15:05.817",
|
"published": "2024-11-19T19:15:05.817",
|
||||||
"lastModified": "2024-11-19T21:56:45.533",
|
"lastModified": "2024-11-20T17:35:06.453",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Undergoing Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "In impeg2d_mc_fullx_fully of impeg2d_mc.c there is a possible out of bound write due to missing bounds check. This could lead to remote arbitrary code execution with no additional execution privileges needed. User interaction is needed for exploitation."
|
"value": "In impeg2d_mc_fullx_fully of impeg2d_mc.c there is a possible out of bound write due to missing bounds check. This could lead to remote arbitrary code execution with no additional execution privileges needed. User interaction is needed for exploitation."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "En impeg2d_mc_fullx_fully de impeg2d_mc.c existe una posible escritura fuera de los l\u00edmites debido a la falta de verificaci\u00f3n de los l\u00edmites. Esto podr\u00eda provocar la ejecuci\u00f3n remota de c\u00f3digo arbitrario sin necesidad de privilegios de ejecuci\u00f3n adicionales. Se necesita la interacci\u00f3n del usuario para su explotaci\u00f3n."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 9.8,
|
||||||
|
"baseSeverity": "CRITICAL"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-787"
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://source.android.com/security/bulletin/2018-06-01",
|
"url": "https://source.android.com/security/bulletin/2018-06-01",
|
||||||
|
@ -2,16 +2,55 @@
|
|||||||
"id": "CVE-2018-9344",
|
"id": "CVE-2018-9344",
|
||||||
"sourceIdentifier": "security@android.com",
|
"sourceIdentifier": "security@android.com",
|
||||||
"published": "2024-11-19T19:15:05.877",
|
"published": "2024-11-19T19:15:05.877",
|
||||||
"lastModified": "2024-11-19T21:56:45.533",
|
"lastModified": "2024-11-20T17:35:07.810",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Undergoing Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "In several functions of DescramblerImpl.cpp, there is a possible use after free due to improper locking. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
|
"value": "In several functions of DescramblerImpl.cpp, there is a possible use after free due to improper locking. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "En varias funciones de DescramblerImpl.cpp, existe un posible use after free debido a un bloqueo inadecuado. Esto podr\u00eda provocar una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 7.8,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-416"
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://source.android.com/security/bulletin/2018-06-01",
|
"url": "https://source.android.com/security/bulletin/2018-06-01",
|
||||||
|
@ -2,16 +2,55 @@
|
|||||||
"id": "CVE-2018-9345",
|
"id": "CVE-2018-9345",
|
||||||
"sourceIdentifier": "security@android.com",
|
"sourceIdentifier": "security@android.com",
|
||||||
"published": "2024-11-19T19:15:05.937",
|
"published": "2024-11-19T19:15:05.937",
|
||||||
"lastModified": "2024-11-19T21:56:45.533",
|
"lastModified": "2024-11-20T17:35:09.167",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Undergoing Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "In BnAudioPolicyService::onTransact of AudioPolicyService.cpp, there is a possible information disclosure due to uninitialized data. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
|
"value": "In BnAudioPolicyService::onTransact of AudioPolicyService.cpp, there is a possible information disclosure due to uninitialized data. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "En BnAudioPolicyService::onTransact de AudioPolicyService.cpp, existe una posible divulgaci\u00f3n de informaci\u00f3n debido a datos no inicializados. Esto podr\u00eda generar una divulgaci\u00f3n de informaci\u00f3n local sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 5.5,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-908"
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://source.android.com/security/bulletin/2018-06-01",
|
"url": "https://source.android.com/security/bulletin/2018-06-01",
|
||||||
|
@ -2,16 +2,55 @@
|
|||||||
"id": "CVE-2018-9346",
|
"id": "CVE-2018-9346",
|
||||||
"sourceIdentifier": "security@android.com",
|
"sourceIdentifier": "security@android.com",
|
||||||
"published": "2024-11-19T19:15:06.000",
|
"published": "2024-11-19T19:15:06.000",
|
||||||
"lastModified": "2024-11-19T21:56:45.533",
|
"lastModified": "2024-11-20T17:35:10.507",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Undergoing Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "In BnAudioPolicyService::onTransact of AudioPolicyService.cpp, there is a possible information disclosure due to uninitialized data. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
|
"value": "In BnAudioPolicyService::onTransact of AudioPolicyService.cpp, there is a possible information disclosure due to uninitialized data. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "En BnAudioPolicyService::onTransact de AudioPolicyService.cpp, existe una posible divulgaci\u00f3n de informaci\u00f3n debido a datos no inicializados. Esto podr\u00eda generar una divulgaci\u00f3n de informaci\u00f3n local sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 5.5,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-908"
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://source.android.com/security/bulletin/2018-06-01",
|
"url": "https://source.android.com/security/bulletin/2018-06-01",
|
||||||
|
21
CVE-2018/CVE-2018-94xx/CVE-2018-9468.json
Normal file
21
CVE-2018/CVE-2018-94xx/CVE-2018-9468.json
Normal file
@ -0,0 +1,21 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2018-9468",
|
||||||
|
"sourceIdentifier": "security@android.com",
|
||||||
|
"published": "2024-11-20T17:15:08.783",
|
||||||
|
"lastModified": "2024-11-20T17:15:08.783",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In query of DownloadManager.java, there is a possible read/write of arbitrary files due to a permissions bypass. This could lead to local information disclosure and file rewriting with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://source.android.com/security/bulletin/2018-09-01",
|
||||||
|
"source": "security@android.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
21
CVE-2018/CVE-2018-94xx/CVE-2018-9469.json
Normal file
21
CVE-2018/CVE-2018-94xx/CVE-2018-9469.json
Normal file
@ -0,0 +1,21 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2018-9469",
|
||||||
|
"sourceIdentifier": "security@android.com",
|
||||||
|
"published": "2024-11-20T17:15:09.040",
|
||||||
|
"lastModified": "2024-11-20T17:15:09.040",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In multiple functions of ShortcutService.java, there is a possible creation of a spoofed shortcut due to a missing permission check. This could lead to local escalation of privilege in a privileged app with no additional execution privileges needed. User interaction is needed for exploitation."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://source.android.com/security/bulletin/2018-09-01",
|
||||||
|
"source": "security@android.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
21
CVE-2018/CVE-2018-94xx/CVE-2018-9470.json
Normal file
21
CVE-2018/CVE-2018-94xx/CVE-2018-9470.json
Normal file
@ -0,0 +1,21 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2018-9470",
|
||||||
|
"sourceIdentifier": "security@android.com",
|
||||||
|
"published": "2024-11-20T18:15:19.427",
|
||||||
|
"lastModified": "2024-11-20T18:15:19.427",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In bff_Scanner_addOutPos of Scanner.c, there is a possible out-of-bounds write due to an incorrect bounds check. This could lead to remote escalation of privilege in an unprivileged app with no additional execution privileges needed. User interaction is needed for exploitation."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://source.android.com/security/bulletin/2018-09-01",
|
||||||
|
"source": "security@android.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
21
CVE-2018/CVE-2018-94xx/CVE-2018-9471.json
Normal file
21
CVE-2018/CVE-2018-94xx/CVE-2018-9471.json
Normal file
@ -0,0 +1,21 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2018-9471",
|
||||||
|
"sourceIdentifier": "security@android.com",
|
||||||
|
"published": "2024-11-20T18:15:19.500",
|
||||||
|
"lastModified": "2024-11-20T18:15:19.500",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In the deserialization constructor of NanoAppFilter.java, there is a possible loss of data due to type confusion. This could lead to local escalation of privilege in the system server with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://source.android.com/security/bulletin/2018-09-01",
|
||||||
|
"source": "security@android.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
21
CVE-2018/CVE-2018-94xx/CVE-2018-9472.json
Normal file
21
CVE-2018/CVE-2018-94xx/CVE-2018-9472.json
Normal file
@ -0,0 +1,21 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2018-9472",
|
||||||
|
"sourceIdentifier": "security@android.com",
|
||||||
|
"published": "2024-11-20T18:15:19.550",
|
||||||
|
"lastModified": "2024-11-20T18:15:19.550",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In xmlMemStrdupLoc of xmlmemory.c, there is a possible out-of-bounds write due to an integer overflow. This could lead to remote code execution in an unprivileged process with no additional execution privileges needed. User interaction is needed for exploitation."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://source.android.com/security/bulletin/2018-09-01",
|
||||||
|
"source": "security@android.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
21
CVE-2018/CVE-2018-94xx/CVE-2018-9474.json
Normal file
21
CVE-2018/CVE-2018-94xx/CVE-2018-9474.json
Normal file
@ -0,0 +1,21 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2018-9474",
|
||||||
|
"sourceIdentifier": "security@android.com",
|
||||||
|
"published": "2024-11-20T18:15:19.610",
|
||||||
|
"lastModified": "2024-11-20T18:15:19.610",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In writeToParcel of MediaPlayer.java, there is a possible serialization/deserialization mismatch due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://source.android.com/security/bulletin/2018-09-01",
|
||||||
|
"source": "security@android.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
21
CVE-2018/CVE-2018-94xx/CVE-2018-9475.json
Normal file
21
CVE-2018/CVE-2018-94xx/CVE-2018-9475.json
Normal file
@ -0,0 +1,21 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2018-9475",
|
||||||
|
"sourceIdentifier": "security@android.com",
|
||||||
|
"published": "2024-11-20T18:15:19.670",
|
||||||
|
"lastModified": "2024-11-20T18:15:19.670",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In HeadsetInterface::ClccResponse of btif_hf.cc, there is a possible out of bounds stack write due to a missing bounds check. This could lead to remote escalation of privilege via Bluetooth, if the recipient has enabled SIP calls with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://source.android.com/security/bulletin/2018-09-01",
|
||||||
|
"source": "security@android.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
21
CVE-2018/CVE-2018-94xx/CVE-2018-9477.json
Normal file
21
CVE-2018/CVE-2018-94xx/CVE-2018-9477.json
Normal file
@ -0,0 +1,21 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2018-9477",
|
||||||
|
"sourceIdentifier": "security@android.com",
|
||||||
|
"published": "2024-11-20T18:15:19.723",
|
||||||
|
"lastModified": "2024-11-20T18:15:19.723",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In the development options section of the Settings app, there is a possible authentication bypass due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://source.android.com/security/bulletin/2018-09-01",
|
||||||
|
"source": "security@android.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
21
CVE-2018/CVE-2018-94xx/CVE-2018-9478.json
Normal file
21
CVE-2018/CVE-2018-94xx/CVE-2018-9478.json
Normal file
@ -0,0 +1,21 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2018-9478",
|
||||||
|
"sourceIdentifier": "security@android.com",
|
||||||
|
"published": "2024-11-20T18:15:19.773",
|
||||||
|
"lastModified": "2024-11-20T18:15:19.773",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In process_service_attr_req and process_service_search_attr_req of sdp_server.cc, there is an out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. \u00a0User interaction is not needed for exploitation."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://source.android.com/security/bulletin/2018-09-01",
|
||||||
|
"source": "security@android.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
21
CVE-2018/CVE-2018-94xx/CVE-2018-9479.json
Normal file
21
CVE-2018/CVE-2018-94xx/CVE-2018-9479.json
Normal file
@ -0,0 +1,21 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2018-9479",
|
||||||
|
"sourceIdentifier": "security@android.com",
|
||||||
|
"published": "2024-11-20T18:15:19.830",
|
||||||
|
"lastModified": "2024-11-20T18:15:19.830",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In process_service_attr_req and process_service_search_attr_req of sdp_server.cc, there is an out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. \u00a0User interaction is not needed for exploitation."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://source.android.com/security/bulletin/2018-09-01",
|
||||||
|
"source": "security@android.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
21
CVE-2018/CVE-2018-94xx/CVE-2018-9480.json
Normal file
21
CVE-2018/CVE-2018-94xx/CVE-2018-9480.json
Normal file
@ -0,0 +1,21 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2018-9480",
|
||||||
|
"sourceIdentifier": "security@android.com",
|
||||||
|
"published": "2024-11-20T18:15:19.890",
|
||||||
|
"lastModified": "2024-11-20T18:15:19.890",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In bta_hd_get_report_act of bta_hd_act.cc, there is a possible out-of-bounds read due to improper input validation. This could lead to remote information disclosure in the Bluetooth service with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://source.android.com/security/bulletin/2018-09-01",
|
||||||
|
"source": "security@android.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
21
CVE-2018/CVE-2018-94xx/CVE-2018-9481.json
Normal file
21
CVE-2018/CVE-2018-94xx/CVE-2018-9481.json
Normal file
@ -0,0 +1,21 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2018-9481",
|
||||||
|
"sourceIdentifier": "security@android.com",
|
||||||
|
"published": "2024-11-20T18:15:19.940",
|
||||||
|
"lastModified": "2024-11-20T18:15:19.940",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In bta_hd_set_report_act of bta_hd_act.cc, there is a possible out-of-bounds read due to an integer overflow. This could lead to remote information disclosure in the Bluetooth service with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://source.android.com/security/bulletin/2018-09-01",
|
||||||
|
"source": "security@android.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
21
CVE-2018/CVE-2018-94xx/CVE-2018-9482.json
Normal file
21
CVE-2018/CVE-2018-94xx/CVE-2018-9482.json
Normal file
@ -0,0 +1,21 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2018-9482",
|
||||||
|
"sourceIdentifier": "security@android.com",
|
||||||
|
"published": "2024-11-20T18:15:20.000",
|
||||||
|
"lastModified": "2024-11-20T18:15:20.000",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In intr_data_copy_cb of btif_hd.cc, there is a possible out of bounds read due to an integer overflow. This could lead to local information disclosure in the Bluetooth service with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://source.android.com/security/bulletin/2018-09-01",
|
||||||
|
"source": "security@android.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
21
CVE-2018/CVE-2018-94xx/CVE-2018-9483.json
Normal file
21
CVE-2018/CVE-2018-94xx/CVE-2018-9483.json
Normal file
@ -0,0 +1,21 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2018-9483",
|
||||||
|
"sourceIdentifier": "security@android.com",
|
||||||
|
"published": "2024-11-20T18:15:20.053",
|
||||||
|
"lastModified": "2024-11-20T18:15:20.053",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In bta_dm_remove_sec_dev_entry of bta_dm_act.cc, there is a possible out of bounds read due to a use after free. This could lead to remote information disclosure over bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://source.android.com/security/bulletin/2018-09-01",
|
||||||
|
"source": "security@android.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
21
CVE-2018/CVE-2018-94xx/CVE-2018-9484.json
Normal file
21
CVE-2018/CVE-2018-94xx/CVE-2018-9484.json
Normal file
@ -0,0 +1,21 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2018-9484",
|
||||||
|
"sourceIdentifier": "security@android.com",
|
||||||
|
"published": "2024-11-20T18:15:20.107",
|
||||||
|
"lastModified": "2024-11-20T18:15:20.107",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In l2cu_send_peer_config_rej of l2c_utils.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://source.android.com/security/bulletin/2018-09-01",
|
||||||
|
"source": "security@android.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
21
CVE-2018/CVE-2018-94xx/CVE-2018-9485.json
Normal file
21
CVE-2018/CVE-2018-94xx/CVE-2018-9485.json
Normal file
@ -0,0 +1,21 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2018-9485",
|
||||||
|
"sourceIdentifier": "security@android.com",
|
||||||
|
"published": "2024-11-20T18:15:20.163",
|
||||||
|
"lastModified": "2024-11-20T18:15:20.163",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In l2cble_process_sig_cmd of l2c_ble.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure over bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://source.android.com/security/bulletin/2018-09-01",
|
||||||
|
"source": "security@android.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
21
CVE-2018/CVE-2018-94xx/CVE-2018-9486.json
Normal file
21
CVE-2018/CVE-2018-94xx/CVE-2018-9486.json
Normal file
@ -0,0 +1,21 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2018-9486",
|
||||||
|
"sourceIdentifier": "security@android.com",
|
||||||
|
"published": "2024-11-20T18:15:20.220",
|
||||||
|
"lastModified": "2024-11-20T18:15:20.220",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In hidh_l2cif_data_ind of hidh_conn.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure over bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://source.android.com/security/bulletin/2018-09-01",
|
||||||
|
"source": "security@android.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
21
CVE-2018/CVE-2018-94xx/CVE-2018-9487.json
Normal file
21
CVE-2018/CVE-2018-94xx/CVE-2018-9487.json
Normal file
@ -0,0 +1,21 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2018-9487",
|
||||||
|
"sourceIdentifier": "security@android.com",
|
||||||
|
"published": "2024-11-20T18:15:20.277",
|
||||||
|
"lastModified": "2024-11-20T18:15:20.277",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In setVpnForcedLocked of Vpn.java, there is a possible blocking of internet traffic through vpn due to a bad uid check. This could lead to local denial of service with no additional execution privileges needed. User interaction is needed for exploitation."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://source.android.com/security/bulletin/2018-09-01",
|
||||||
|
"source": "security@android.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
@ -2,16 +2,55 @@
|
|||||||
"id": "CVE-2023-21270",
|
"id": "CVE-2023-21270",
|
||||||
"sourceIdentifier": "security@android.com",
|
"sourceIdentifier": "security@android.com",
|
||||||
"published": "2024-11-19T18:15:19.253",
|
"published": "2024-11-19T18:15:19.253",
|
||||||
"lastModified": "2024-11-19T21:56:45.533",
|
"lastModified": "2024-11-20T17:35:18.563",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "In restorePermissionState of PermissionManagerServiceImpl.java, there is a possible way for an app to keep permissions that should be revoked due to incorrect permission flags cleared during an update. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation."
|
"value": "In restorePermissionState of PermissionManagerServiceImpl.java, there is a possible way for an app to keep permissions that should be revoked due to incorrect permission flags cleared during an update. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "En restorePermissionState de PermissionManagerServiceImpl.java, existe una forma posible de que una aplicaci\u00f3n conserve los permisos que deber\u00edan revocarse debido a que se borraron indicadores de permisos incorrectos durante una actualizaci\u00f3n. Esto podr\u00eda provocar una escalada local de privilegios con privilegios de ejecuci\u00f3n de usuario necesarios. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 7.8,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-276"
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://source.android.com/security/bulletin/2023-08-01",
|
"url": "https://source.android.com/security/bulletin/2023-08-01",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2023-35659",
|
"id": "CVE-2023-35659",
|
||||||
"sourceIdentifier": "security@android.com",
|
"sourceIdentifier": "security@android.com",
|
||||||
"published": "2024-11-13T18:15:19.763",
|
"published": "2024-11-13T18:15:19.763",
|
||||||
"lastModified": "2024-11-19T18:31:32.413",
|
"lastModified": "2024-11-20T17:35:20.210",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -36,6 +36,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 1.8,
|
"exploitabilityScore": 1.8,
|
||||||
"impactScore": 5.9
|
"impactScore": 5.9
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 7.8,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 5.9
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2023-35686",
|
"id": "CVE-2023-35686",
|
||||||
"sourceIdentifier": "security@android.com",
|
"sourceIdentifier": "security@android.com",
|
||||||
"published": "2024-11-13T18:15:19.860",
|
"published": "2024-11-13T18:15:19.860",
|
||||||
"lastModified": "2024-11-19T18:09:16.243",
|
"lastModified": "2024-11-20T17:35:20.610",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -36,6 +36,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 1.8,
|
"exploitabilityScore": 1.8,
|
||||||
"impactScore": 5.9
|
"impactScore": 5.9
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 7.8,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 5.9
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-10382",
|
"id": "CVE-2024-10382",
|
||||||
"sourceIdentifier": "cve-coordination@google.com",
|
"sourceIdentifier": "cve-coordination@google.com",
|
||||||
"published": "2024-11-20T11:15:04.280",
|
"published": "2024-11-20T11:15:04.280",
|
||||||
"lastModified": "2024-11-20T11:15:04.280",
|
"lastModified": "2024-11-20T17:35:22.073",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Received",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -55,6 +55,28 @@
|
|||||||
"baseSeverity": "HIGH"
|
"baseSeverity": "HIGH"
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "HIGH",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 7.5,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 0.8,
|
||||||
|
"impactScore": 6.0
|
||||||
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
@ -67,6 +89,16 @@
|
|||||||
"value": "CWE-502"
|
"value": "CWE-502"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-94"
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
|
16
CVE-2024/CVE-2024-110xx/CVE-2024-11081.json
Normal file
16
CVE-2024/CVE-2024-110xx/CVE-2024-11081.json
Normal file
@ -0,0 +1,16 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-11081",
|
||||||
|
"sourceIdentifier": "security@wordfence.com",
|
||||||
|
"published": "2024-11-20T18:15:22.340",
|
||||||
|
"lastModified": "2024-11-20T18:15:22.340",
|
||||||
|
"vulnStatus": "Rejected",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: This candidate was issued in error. Notes: All references and descriptions in this candidate have been removed to prevent accidental usage."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": []
|
||||||
|
}
|
137
CVE-2024/CVE-2024-114xx/CVE-2024-11488.json
Normal file
137
CVE-2024/CVE-2024-114xx/CVE-2024-11488.json
Normal file
@ -0,0 +1,137 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-11488",
|
||||||
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
|
"published": "2024-11-20T17:15:14.097",
|
||||||
|
"lastModified": "2024-11-20T17:15:14.097",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A vulnerability was found in 115cms up to 20240807 and classified as problematic. This issue affects some unknown processing of the file /app/admin/view/web_user.html. The manipulation of the argument ks leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV40": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "4.0",
|
||||||
|
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"attackRequirements": "NONE",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"vulnerableSystemConfidentiality": "NONE",
|
||||||
|
"vulnerableSystemIntegrity": "LOW",
|
||||||
|
"vulnerableSystemAvailability": "NONE",
|
||||||
|
"subsequentSystemConfidentiality": "NONE",
|
||||||
|
"subsequentSystemIntegrity": "NONE",
|
||||||
|
"subsequentSystemAvailability": "NONE",
|
||||||
|
"exploitMaturity": "NOT_DEFINED",
|
||||||
|
"confidentialityRequirements": "NOT_DEFINED",
|
||||||
|
"integrityRequirements": "NOT_DEFINED",
|
||||||
|
"availabilityRequirements": "NOT_DEFINED",
|
||||||
|
"modifiedAttackVector": "NOT_DEFINED",
|
||||||
|
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||||
|
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||||
|
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||||
|
"modifiedUserInteraction": "NOT_DEFINED",
|
||||||
|
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||||
|
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||||
|
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||||
|
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||||
|
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||||
|
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||||
|
"safety": "NOT_DEFINED",
|
||||||
|
"automatable": "NOT_DEFINED",
|
||||||
|
"recovery": "NOT_DEFINED",
|
||||||
|
"valueDensity": "NOT_DEFINED",
|
||||||
|
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||||
|
"providerUrgency": "NOT_DEFINED",
|
||||||
|
"baseScore": 5.3,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 3.5,
|
||||||
|
"baseSeverity": "LOW"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.1,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV2": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "2.0",
|
||||||
|
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
|
||||||
|
"accessVector": "NETWORK",
|
||||||
|
"accessComplexity": "LOW",
|
||||||
|
"authentication": "SINGLE",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "PARTIAL",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 4.0
|
||||||
|
},
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"exploitabilityScore": 8.0,
|
||||||
|
"impactScore": 2.9,
|
||||||
|
"acInsufInfo": false,
|
||||||
|
"obtainAllPrivilege": false,
|
||||||
|
"obtainUserPrivilege": false,
|
||||||
|
"obtainOtherPrivilege": false,
|
||||||
|
"userInteractionRequired": false
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-94"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/Hebing123/cve/issues/70",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?ctiid.285503",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?id.285503",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
137
CVE-2024/CVE-2024-114xx/CVE-2024-11489.json
Normal file
137
CVE-2024/CVE-2024-114xx/CVE-2024-11489.json
Normal file
@ -0,0 +1,137 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-11489",
|
||||||
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
|
"published": "2024-11-20T17:15:14.847",
|
||||||
|
"lastModified": "2024-11-20T17:15:14.847",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A vulnerability was found in 115cms up to 20240807. It has been classified as problematic. Affected is an unknown function of the file /index.php/admin/web/file.html. The manipulation of the argument ks leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV40": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "4.0",
|
||||||
|
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"attackRequirements": "NONE",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"vulnerableSystemConfidentiality": "NONE",
|
||||||
|
"vulnerableSystemIntegrity": "LOW",
|
||||||
|
"vulnerableSystemAvailability": "NONE",
|
||||||
|
"subsequentSystemConfidentiality": "NONE",
|
||||||
|
"subsequentSystemIntegrity": "NONE",
|
||||||
|
"subsequentSystemAvailability": "NONE",
|
||||||
|
"exploitMaturity": "NOT_DEFINED",
|
||||||
|
"confidentialityRequirements": "NOT_DEFINED",
|
||||||
|
"integrityRequirements": "NOT_DEFINED",
|
||||||
|
"availabilityRequirements": "NOT_DEFINED",
|
||||||
|
"modifiedAttackVector": "NOT_DEFINED",
|
||||||
|
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||||
|
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||||
|
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||||
|
"modifiedUserInteraction": "NOT_DEFINED",
|
||||||
|
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||||
|
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||||
|
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||||
|
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||||
|
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||||
|
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||||
|
"safety": "NOT_DEFINED",
|
||||||
|
"automatable": "NOT_DEFINED",
|
||||||
|
"recovery": "NOT_DEFINED",
|
||||||
|
"valueDensity": "NOT_DEFINED",
|
||||||
|
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||||
|
"providerUrgency": "NOT_DEFINED",
|
||||||
|
"baseScore": 5.3,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 3.5,
|
||||||
|
"baseSeverity": "LOW"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.1,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV2": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "2.0",
|
||||||
|
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
|
||||||
|
"accessVector": "NETWORK",
|
||||||
|
"accessComplexity": "LOW",
|
||||||
|
"authentication": "SINGLE",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "PARTIAL",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 4.0
|
||||||
|
},
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"exploitabilityScore": 8.0,
|
||||||
|
"impactScore": 2.9,
|
||||||
|
"acInsufInfo": false,
|
||||||
|
"obtainAllPrivilege": false,
|
||||||
|
"obtainUserPrivilege": false,
|
||||||
|
"obtainOtherPrivilege": false,
|
||||||
|
"userInteractionRequired": false
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-94"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/Hebing123/cve/issues/70",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?ctiid.285504",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?id.285504",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
137
CVE-2024/CVE-2024-114xx/CVE-2024-11490.json
Normal file
137
CVE-2024/CVE-2024-114xx/CVE-2024-11490.json
Normal file
@ -0,0 +1,137 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-11490",
|
||||||
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
|
"published": "2024-11-20T17:15:15.637",
|
||||||
|
"lastModified": "2024-11-20T17:15:15.637",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A vulnerability was found in 115cms up to 20240807. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /index.php/admin/web/set.html. The manipulation of the argument type leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV40": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "4.0",
|
||||||
|
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"attackRequirements": "NONE",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"vulnerableSystemConfidentiality": "NONE",
|
||||||
|
"vulnerableSystemIntegrity": "LOW",
|
||||||
|
"vulnerableSystemAvailability": "NONE",
|
||||||
|
"subsequentSystemConfidentiality": "NONE",
|
||||||
|
"subsequentSystemIntegrity": "NONE",
|
||||||
|
"subsequentSystemAvailability": "NONE",
|
||||||
|
"exploitMaturity": "NOT_DEFINED",
|
||||||
|
"confidentialityRequirements": "NOT_DEFINED",
|
||||||
|
"integrityRequirements": "NOT_DEFINED",
|
||||||
|
"availabilityRequirements": "NOT_DEFINED",
|
||||||
|
"modifiedAttackVector": "NOT_DEFINED",
|
||||||
|
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||||
|
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||||
|
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||||
|
"modifiedUserInteraction": "NOT_DEFINED",
|
||||||
|
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||||
|
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||||
|
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||||
|
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||||
|
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||||
|
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||||
|
"safety": "NOT_DEFINED",
|
||||||
|
"automatable": "NOT_DEFINED",
|
||||||
|
"recovery": "NOT_DEFINED",
|
||||||
|
"valueDensity": "NOT_DEFINED",
|
||||||
|
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||||
|
"providerUrgency": "NOT_DEFINED",
|
||||||
|
"baseScore": 5.3,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 3.5,
|
||||||
|
"baseSeverity": "LOW"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.1,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV2": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "2.0",
|
||||||
|
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
|
||||||
|
"accessVector": "NETWORK",
|
||||||
|
"accessComplexity": "LOW",
|
||||||
|
"authentication": "SINGLE",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "PARTIAL",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 4.0
|
||||||
|
},
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"exploitabilityScore": 8.0,
|
||||||
|
"impactScore": 2.9,
|
||||||
|
"acInsufInfo": false,
|
||||||
|
"obtainAllPrivilege": false,
|
||||||
|
"obtainUserPrivilege": false,
|
||||||
|
"obtainOtherPrivilege": false,
|
||||||
|
"userInteractionRequired": false
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-94"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/Hebing123/cve/issues/70",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?ctiid.285505",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?id.285505",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
137
CVE-2024/CVE-2024-114xx/CVE-2024-11491.json
Normal file
137
CVE-2024/CVE-2024-114xx/CVE-2024-11491.json
Normal file
@ -0,0 +1,137 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-11491",
|
||||||
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
|
"published": "2024-11-20T17:15:16.397",
|
||||||
|
"lastModified": "2024-11-20T17:15:16.397",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A vulnerability was found in 115cms up to 20240807. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /index.php/admin/web/useradmin.html. The manipulation of the argument ks leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV40": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "4.0",
|
||||||
|
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"attackRequirements": "NONE",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"vulnerableSystemConfidentiality": "NONE",
|
||||||
|
"vulnerableSystemIntegrity": "LOW",
|
||||||
|
"vulnerableSystemAvailability": "NONE",
|
||||||
|
"subsequentSystemConfidentiality": "NONE",
|
||||||
|
"subsequentSystemIntegrity": "NONE",
|
||||||
|
"subsequentSystemAvailability": "NONE",
|
||||||
|
"exploitMaturity": "NOT_DEFINED",
|
||||||
|
"confidentialityRequirements": "NOT_DEFINED",
|
||||||
|
"integrityRequirements": "NOT_DEFINED",
|
||||||
|
"availabilityRequirements": "NOT_DEFINED",
|
||||||
|
"modifiedAttackVector": "NOT_DEFINED",
|
||||||
|
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||||
|
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||||
|
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||||
|
"modifiedUserInteraction": "NOT_DEFINED",
|
||||||
|
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||||
|
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||||
|
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||||
|
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||||
|
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||||
|
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||||
|
"safety": "NOT_DEFINED",
|
||||||
|
"automatable": "NOT_DEFINED",
|
||||||
|
"recovery": "NOT_DEFINED",
|
||||||
|
"valueDensity": "NOT_DEFINED",
|
||||||
|
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||||
|
"providerUrgency": "NOT_DEFINED",
|
||||||
|
"baseScore": 5.3,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 3.5,
|
||||||
|
"baseSeverity": "LOW"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.1,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV2": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "2.0",
|
||||||
|
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
|
||||||
|
"accessVector": "NETWORK",
|
||||||
|
"accessComplexity": "LOW",
|
||||||
|
"authentication": "SINGLE",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "PARTIAL",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 4.0
|
||||||
|
},
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"exploitabilityScore": 8.0,
|
||||||
|
"impactScore": 2.9,
|
||||||
|
"acInsufInfo": false,
|
||||||
|
"obtainAllPrivilege": false,
|
||||||
|
"obtainUserPrivilege": false,
|
||||||
|
"obtainOtherPrivilege": false,
|
||||||
|
"userInteractionRequired": false
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-94"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/Hebing123/cve/issues/70",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?ctiid.285506",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?id.285506",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
137
CVE-2024/CVE-2024-114xx/CVE-2024-11492.json
Normal file
137
CVE-2024/CVE-2024-114xx/CVE-2024-11492.json
Normal file
@ -0,0 +1,137 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-11492",
|
||||||
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
|
"published": "2024-11-20T18:15:22.403",
|
||||||
|
"lastModified": "2024-11-20T18:15:22.403",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A vulnerability classified as problematic has been found in 115cms up to 20240807. This affects an unknown part of the file /index.php/admin/web/appurladd.html. The manipulation of the argument tid leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV40": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "4.0",
|
||||||
|
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"attackRequirements": "NONE",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"vulnerableSystemConfidentiality": "NONE",
|
||||||
|
"vulnerableSystemIntegrity": "LOW",
|
||||||
|
"vulnerableSystemAvailability": "NONE",
|
||||||
|
"subsequentSystemConfidentiality": "NONE",
|
||||||
|
"subsequentSystemIntegrity": "NONE",
|
||||||
|
"subsequentSystemAvailability": "NONE",
|
||||||
|
"exploitMaturity": "NOT_DEFINED",
|
||||||
|
"confidentialityRequirements": "NOT_DEFINED",
|
||||||
|
"integrityRequirements": "NOT_DEFINED",
|
||||||
|
"availabilityRequirements": "NOT_DEFINED",
|
||||||
|
"modifiedAttackVector": "NOT_DEFINED",
|
||||||
|
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||||
|
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||||
|
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||||
|
"modifiedUserInteraction": "NOT_DEFINED",
|
||||||
|
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||||
|
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||||
|
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||||
|
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||||
|
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||||
|
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||||
|
"safety": "NOT_DEFINED",
|
||||||
|
"automatable": "NOT_DEFINED",
|
||||||
|
"recovery": "NOT_DEFINED",
|
||||||
|
"valueDensity": "NOT_DEFINED",
|
||||||
|
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||||
|
"providerUrgency": "NOT_DEFINED",
|
||||||
|
"baseScore": 5.3,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 3.5,
|
||||||
|
"baseSeverity": "LOW"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.1,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV2": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "2.0",
|
||||||
|
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
|
||||||
|
"accessVector": "NETWORK",
|
||||||
|
"accessComplexity": "LOW",
|
||||||
|
"authentication": "SINGLE",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "PARTIAL",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 4.0
|
||||||
|
},
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"exploitabilityScore": 8.0,
|
||||||
|
"impactScore": 2.9,
|
||||||
|
"acInsufInfo": false,
|
||||||
|
"obtainAllPrivilege": false,
|
||||||
|
"obtainUserPrivilege": false,
|
||||||
|
"obtainOtherPrivilege": false,
|
||||||
|
"userInteractionRequired": false
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-94"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/Hebing123/cve/issues/70",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?ctiid.285507",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?id.285507",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
141
CVE-2024/CVE-2024-114xx/CVE-2024-11493.json
Normal file
141
CVE-2024/CVE-2024-114xx/CVE-2024-11493.json
Normal file
@ -0,0 +1,141 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-11493",
|
||||||
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
|
"published": "2024-11-20T18:15:22.700",
|
||||||
|
"lastModified": "2024-11-20T18:15:22.700",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A vulnerability classified as problematic was found in 115cms up to 20240807. This vulnerability affects unknown code of the file /index.php/setpage/admin/pageAE.html. The manipulation of the argument tid leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV40": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "4.0",
|
||||||
|
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"attackRequirements": "NONE",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"vulnerableSystemConfidentiality": "NONE",
|
||||||
|
"vulnerableSystemIntegrity": "LOW",
|
||||||
|
"vulnerableSystemAvailability": "NONE",
|
||||||
|
"subsequentSystemConfidentiality": "NONE",
|
||||||
|
"subsequentSystemIntegrity": "NONE",
|
||||||
|
"subsequentSystemAvailability": "NONE",
|
||||||
|
"exploitMaturity": "NOT_DEFINED",
|
||||||
|
"confidentialityRequirements": "NOT_DEFINED",
|
||||||
|
"integrityRequirements": "NOT_DEFINED",
|
||||||
|
"availabilityRequirements": "NOT_DEFINED",
|
||||||
|
"modifiedAttackVector": "NOT_DEFINED",
|
||||||
|
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||||
|
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||||
|
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||||
|
"modifiedUserInteraction": "NOT_DEFINED",
|
||||||
|
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||||
|
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||||
|
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||||
|
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||||
|
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||||
|
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||||
|
"safety": "NOT_DEFINED",
|
||||||
|
"automatable": "NOT_DEFINED",
|
||||||
|
"recovery": "NOT_DEFINED",
|
||||||
|
"valueDensity": "NOT_DEFINED",
|
||||||
|
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||||
|
"providerUrgency": "NOT_DEFINED",
|
||||||
|
"baseScore": 5.3,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 3.5,
|
||||||
|
"baseSeverity": "LOW"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.1,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV2": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "2.0",
|
||||||
|
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
|
||||||
|
"accessVector": "NETWORK",
|
||||||
|
"accessComplexity": "LOW",
|
||||||
|
"authentication": "SINGLE",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "PARTIAL",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 4.0
|
||||||
|
},
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"exploitabilityScore": 8.0,
|
||||||
|
"impactScore": 2.9,
|
||||||
|
"acInsufInfo": false,
|
||||||
|
"obtainAllPrivilege": false,
|
||||||
|
"obtainUserPrivilege": false,
|
||||||
|
"obtainOtherPrivilege": false,
|
||||||
|
"userInteractionRequired": false
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-94"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/Hebing123/cve/issues/70",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?ctiid.285508",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?id.285508",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?submit.442037",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-23279",
|
"id": "CVE-2024-23279",
|
||||||
"sourceIdentifier": "product-security@apple.com",
|
"sourceIdentifier": "product-security@apple.com",
|
||||||
"published": "2024-03-08T02:15:49.693",
|
"published": "2024-03-08T02:15:49.693",
|
||||||
"lastModified": "2024-03-13T21:15:58.063",
|
"lastModified": "2024-11-20T17:35:23.370",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,30 @@
|
|||||||
"value": "Se solucion\u00f3 un problema de privacidad mejorando la redacci\u00f3n de datos privados para las entradas de registro. Este problema se solucion\u00f3 en macOS Sonoma 14.4. Es posible que una aplicaci\u00f3n pueda acceder a datos confidenciales del usuario."
|
"value": "Se solucion\u00f3 un problema de privacidad mejorando la redacci\u00f3n de datos privados para las entradas de registro. Este problema se solucion\u00f3 en macOS Sonoma 14.4. Es posible que una aplicaci\u00f3n pueda acceder a datos confidenciales del usuario."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "LOW",
|
||||||
|
"baseScore": 5.3,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 3.4
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "http://seclists.org/fulldisclosure/2024/Mar/21",
|
"url": "http://seclists.org/fulldisclosure/2024/Mar/21",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-23715",
|
"id": "CVE-2024-23715",
|
||||||
"sourceIdentifier": "security@android.com",
|
"sourceIdentifier": "security@android.com",
|
||||||
"published": "2024-11-13T18:15:20.080",
|
"published": "2024-11-13T18:15:20.080",
|
||||||
"lastModified": "2024-11-19T14:03:09.400",
|
"lastModified": "2024-11-20T17:35:23.597",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -36,6 +36,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 1.8,
|
"exploitabilityScore": 1.8,
|
||||||
"impactScore": 5.9
|
"impactScore": 5.9
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 7.8,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 5.9
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -49,6 +69,16 @@
|
|||||||
"value": "CWE-787"
|
"value": "CWE-787"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-787"
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"configurations": [
|
"configurations": [
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-2357",
|
"id": "CVE-2024-2357",
|
||||||
"sourceIdentifier": "d42dc95b-23f1-4e06-9076-20753a0fb0df",
|
"sourceIdentifier": "d42dc95b-23f1-4e06-9076-20753a0fb0df",
|
||||||
"published": "2024-03-11T20:15:07.867",
|
"published": "2024-03-11T20:15:07.867",
|
||||||
"lastModified": "2024-03-23T03:15:12.690",
|
"lastModified": "2024-11-20T18:35:19.917",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,30 @@
|
|||||||
"value": "Se notific\u00f3 a Libreswan Project sobre un problema que causaba que libreswan se reiniciara en algunos escenarios de retransmisi\u00f3n de IKEv2 cuando una conexi\u00f3n est\u00e1 configurada para usar PreSharedKeys (authby=secret) y la conexi\u00f3n no puede encontrar un secreto configurado coincidente. Cuando dicha conexi\u00f3n se agrega autom\u00e1ticamente al inicio usando la palabra clave auto=, puede causar fallas repetidas que conducen a una denegaci\u00f3n de servicio."
|
"value": "Se notific\u00f3 a Libreswan Project sobre un problema que causaba que libreswan se reiniciara en algunos escenarios de retransmisi\u00f3n de IKEv2 cuando una conexi\u00f3n est\u00e1 configurada para usar PreSharedKeys (authby=secret) y la conexi\u00f3n no puede encontrar un secreto configurado coincidente. Cuando dicha conexi\u00f3n se agrega autom\u00e1ticamente al inicio usando la palabra clave auto=, puede causar fallas repetidas que conducen a una denegaci\u00f3n de servicio."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 6.5,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://libreswan.org/security/CVE-2024-2357",
|
"url": "https://libreswan.org/security/CVE-2024-2357",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-26281",
|
"id": "CVE-2024-26281",
|
||||||
"sourceIdentifier": "security@mozilla.org",
|
"sourceIdentifier": "security@mozilla.org",
|
||||||
"published": "2024-02-22T15:15:08.633",
|
"published": "2024-02-22T15:15:08.633",
|
||||||
"lastModified": "2024-02-22T19:07:27.197",
|
"lastModified": "2024-11-20T17:35:24.450",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,42 @@
|
|||||||
"value": "Al escanear un URI de JavaScript con el esc\u00e1ner de c\u00f3digos QR, un atacante podr\u00eda haber ejecutado scripts no autorizados en los principales sitios de origen actuales en la barra de URL. Esta vulnerabilidad afecta a Firefox para iOS < 123."
|
"value": "Al escanear un URI de JavaScript con el esc\u00e1ner de c\u00f3digos QR, un atacante podr\u00eda haber ejecutado scripts no autorizados en los principales sitios de origen actuales en la barra de URL. Esta vulnerabilidad afecta a Firefox para iOS < 123."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 4.7,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1868005",
|
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1868005",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-2759",
|
"id": "CVE-2024-2759",
|
||||||
"sourceIdentifier": "cvd@cert.pl",
|
"sourceIdentifier": "cvd@cert.pl",
|
||||||
"published": "2024-04-04T14:15:10.220",
|
"published": "2024-04-04T14:15:10.220",
|
||||||
"lastModified": "2024-10-10T16:15:08.360",
|
"lastModified": "2024-11-20T18:35:20.200",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,30 @@
|
|||||||
"value": "Una vulnerabilidad de control de acceso inadecuado en el complemento Apaczka para PrestaShop permite la recopilaci\u00f3n de informaci\u00f3n de plantillas guardadas sin autenticaci\u00f3n. Este problema afecta al complemento Apaczka para PrestaShop desde la v1 hasta la v4."
|
"value": "Una vulnerabilidad de control de acceso inadecuado en el complemento Apaczka para PrestaShop permite la recopilaci\u00f3n de informaci\u00f3n de plantillas guardadas sin autenticaci\u00f3n. Este problema afecta al complemento Apaczka para PrestaShop desde la v1 hasta la v4."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 7.5,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
{
|
{
|
||||||
"source": "cvd@cert.pl",
|
"source": "cvd@cert.pl",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-28068",
|
"id": "CVE-2024-28068",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-07-09T20:15:10.603",
|
"published": "2024-07-09T20:15:10.603",
|
||||||
"lastModified": "2024-07-11T13:06:13.187",
|
"lastModified": "2024-11-20T17:35:25.313",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -39,6 +39,18 @@
|
|||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-476"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/",
|
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/",
|
||||||
|
25
CVE-2024/CVE-2024-292xx/CVE-2024-29292.json
Normal file
25
CVE-2024/CVE-2024-292xx/CVE-2024-29292.json
Normal file
@ -0,0 +1,25 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-29292",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2024-11-20T18:15:22.970",
|
||||||
|
"lastModified": "2024-11-20T18:15:22.970",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Multiple OS Command Injection vulnerabilities affecting Kasda KW6512 router software version KW6512_Linux_V1.0 enable an authenticated remote attacker to execute arbitrary OS commands via Quick Setup and Internet page parameters passed to internet.cgi."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://gist.github.com/QuartzDust/debfd7ddf934a9f5609d7f1a8cd71154",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.kasdanet.com/ENHCSZ/pro_view-120.html",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-3048",
|
"id": "CVE-2024-3048",
|
||||||
"sourceIdentifier": "contact@wpscan.com",
|
"sourceIdentifier": "contact@wpscan.com",
|
||||||
"published": "2024-04-26T05:15:50.280",
|
"published": "2024-04-26T05:15:50.280",
|
||||||
"lastModified": "2024-04-26T12:58:17.720",
|
"lastModified": "2024-11-20T18:35:21.557",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,30 @@
|
|||||||
"value": "El complemento Bannerlid de WordPress hasta la versi\u00f3n 1.1.0 no escapa de las URL generadas antes de mostrarlas en atributos, lo que genera Cross-Site Scripting Reflejado que podr\u00edan usarse contra usuarios con privilegios elevados, como administradores."
|
"value": "El complemento Bannerlid de WordPress hasta la versi\u00f3n 1.1.0 no escapa de las URL generadas antes de mostrarlas en atributos, lo que genera Cross-Site Scripting Reflejado que podr\u00edan usarse contra usuarios con privilegios elevados, como administradores."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 5.5,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.3,
|
||||||
|
"impactScore": 2.7
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://wpscan.com/vulnerability/e179ff7d-137c-48bf-8b18-e874e3f876f4/",
|
"url": "https://wpscan.com/vulnerability/e179ff7d-137c-48bf-8b18-e874e3f876f4/",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-3076",
|
"id": "CVE-2024-3076",
|
||||||
"sourceIdentifier": "contact@wpscan.com",
|
"sourceIdentifier": "contact@wpscan.com",
|
||||||
"published": "2024-04-26T14:15:07.370",
|
"published": "2024-04-26T14:15:07.370",
|
||||||
"lastModified": "2024-04-26T15:32:22.523",
|
"lastModified": "2024-11-20T18:35:21.813",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,30 @@
|
|||||||
"value": "El complemento MM-email2image de WordPress hasta la versi\u00f3n 0.2.5 no tiene verificaci\u00f3n CSRF en algunos lugares y le falta desinfecci\u00f3n y escape, lo que podr\u00eda permitir a los atacantes hacer que el administrador registrado agregue payload XSS Almacenado a trav\u00e9s de un ataque CSRF."
|
"value": "El complemento MM-email2image de WordPress hasta la versi\u00f3n 0.2.5 no tiene verificaci\u00f3n CSRF en algunos lugares y le falta desinfecci\u00f3n y escape, lo que podr\u00eda permitir a los atacantes hacer que el administrador registrado agregue payload XSS Almacenado a trav\u00e9s de un ataque CSRF."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 3.8,
|
||||||
|
"baseSeverity": "LOW"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.2,
|
||||||
|
"impactScore": 2.5
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://wpscan.com/vulnerability/617ec2e9-9058-4a93-8ad4-7ecb85107141/",
|
"url": "https://wpscan.com/vulnerability/617ec2e9-9058-4a93-8ad4-7ecb85107141/",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-3281",
|
"id": "CVE-2024-3281",
|
||||||
"sourceIdentifier": "hp-security-alert@hp.com",
|
"sourceIdentifier": "hp-security-alert@hp.com",
|
||||||
"published": "2024-04-09T16:15:08.510",
|
"published": "2024-04-09T16:15:08.510",
|
||||||
"lastModified": "2024-04-10T13:24:22.187",
|
"lastModified": "2024-11-20T18:35:22.063",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,42 @@
|
|||||||
"value": "Se descubri\u00f3 una vulnerabilidad en las versiones de firmware posteriores a 8.0.2.3267 y anteriores a 8.1.3.1301 en dispositivos CCX. Una falla en el proceso de creaci\u00f3n del firmware no restringi\u00f3 adecuadamente el acceso a un recurso por parte de un actor no autorizado."
|
"value": "Se descubri\u00f3 una vulnerabilidad en las versiones de firmware posteriores a 8.0.2.3267 y anteriores a 8.1.3.1301 en dispositivos CCX. Una falla en el proceso de creaci\u00f3n del firmware no restringi\u00f3 adecuadamente el acceso a un recurso por parte de un actor no autorizado."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:H",
|
||||||
|
"attackVector": "ADJACENT_NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 8.8,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 5.3
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-306"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://support.hp.com/us-en/document/ish_10388650-10388701-16/hpsbpy03929",
|
"url": "https://support.hp.com/us-en/document/ish_10388650-10388701-16/hpsbpy03929",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-34088",
|
"id": "CVE-2024-34088",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-04-30T19:15:23.307",
|
"published": "2024-04-30T19:15:23.307",
|
||||||
"lastModified": "2024-04-30T19:35:36.960",
|
"lastModified": "2024-11-20T17:35:26.147",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,42 @@
|
|||||||
"value": "En FRRouting (FRR) hasta 9.1, es posible que la funci\u00f3n get_edge() en ospf_te.c en el demonio OSPF devuelva un puntero NULL. En los casos en que las funciones de llamada no manejan el valor NULL devuelto, el daemon OSPF falla, lo que lleva a la denegaci\u00f3n de servicio."
|
"value": "En FRRouting (FRR) hasta 9.1, es posible que la funci\u00f3n get_edge() en ospf_te.c en el demonio OSPF devuelva un puntero NULL. En los casos en que las funciones de llamada no manejan el valor NULL devuelto, el daemon OSPF falla, lo que lleva a la denegaci\u00f3n de servicio."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 7.5,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-476"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/FRRouting/frr/pull/15674/commits/34d704fb0ea60dc5063af477a2c11d4884984d4f",
|
"url": "https://github.com/FRRouting/frr/pull/15674/commits/34d704fb0ea60dc5063af477a2c11d4884984d4f",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-34365",
|
"id": "CVE-2024-34365",
|
||||||
"sourceIdentifier": "security@apache.org",
|
"sourceIdentifier": "security@apache.org",
|
||||||
"published": "2024-05-14T15:38:46.400",
|
"published": "2024-05-14T15:38:46.400",
|
||||||
"lastModified": "2024-08-02T03:15:40.200",
|
"lastModified": "2024-11-20T17:35:27.017",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [
|
"cveTags": [
|
||||||
{
|
{
|
||||||
@ -22,7 +22,30 @@
|
|||||||
"value": "** NO SOPORTADO CUANDO EST\u00c1 ASIGNADO ** Vulnerabilidad de validaci\u00f3n de entrada incorrecta en Apache Karaf Cave. Este problema afecta a todas las versiones de Apache Karaf Cave. Como este proyecto est\u00e1 retirado, no planeamos lanzar una versi\u00f3n que solucione este problema. Se recomienda a los usuarios buscar una alternativa o restringir el acceso a la instancia a usuarios confiables. NOTA: Esta vulnerabilidad solo afecta a los productos que ya no son compatibles con el fabricante."
|
"value": "** NO SOPORTADO CUANDO EST\u00c1 ASIGNADO ** Vulnerabilidad de validaci\u00f3n de entrada incorrecta en Apache Karaf Cave. Este problema afecta a todas las versiones de Apache Karaf Cave. Como este proyecto est\u00e1 retirado, no planeamos lanzar una versi\u00f3n que solucione este problema. Se recomienda a los usuarios buscar una alternativa o restringir el acceso a la instancia a usuarios confiables. NOTA: Esta vulnerabilidad solo afecta a los productos que ya no son compatibles con el fabricante."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 9.1,
|
||||||
|
"baseSeverity": "CRITICAL"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 5.2
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
{
|
{
|
||||||
"source": "security@apache.org",
|
"source": "security@apache.org",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-34487",
|
"id": "CVE-2024-34487",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-05-05T03:15:07.167",
|
"published": "2024-05-05T03:15:07.167",
|
||||||
"lastModified": "2024-05-06T12:44:56.377",
|
"lastModified": "2024-11-20T17:35:27.303",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,42 @@
|
|||||||
"value": "OFPFlowStats en parser.py en Faucet SDN Ryu 4.34 permite a los atacantes provocar una denegaci\u00f3n de servicio (bucle infinito) mediante inst.length=0."
|
"value": "OFPFlowStats en parser.py en Faucet SDN Ryu 4.34 permite a los atacantes provocar una denegaci\u00f3n de servicio (bucle infinito) mediante inst.length=0."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 7.5,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-835"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/faucetsdn/ryu/issues/192",
|
"url": "https://github.com/faucetsdn/ryu/issues/192",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-3471",
|
"id": "CVE-2024-3471",
|
||||||
"sourceIdentifier": "contact@wpscan.com",
|
"sourceIdentifier": "contact@wpscan.com",
|
||||||
"published": "2024-05-02T06:15:50.350",
|
"published": "2024-05-02T06:15:50.350",
|
||||||
"lastModified": "2024-05-02T13:27:25.103",
|
"lastModified": "2024-11-20T18:35:22.923",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,30 @@
|
|||||||
"value": "El complemento Button Generator de WordPress anterior a 3.0 no tiene activada la verificaci\u00f3n CSRF durante la eliminaci\u00f3n masiva, lo que podr\u00eda permitir a los atacantes crear botones de eliminaci\u00f3n de un administrador que haya iniciado sesi\u00f3n a trav\u00e9s de un ataque CSRF."
|
"value": "El complemento Button Generator de WordPress anterior a 3.0 no tiene activada la verificaci\u00f3n CSRF durante la eliminaci\u00f3n masiva, lo que podr\u00eda permitir a los atacantes crear botones de eliminaci\u00f3n de un administrador que haya iniciado sesi\u00f3n a trav\u00e9s de un ataque CSRF."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:N/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 3.4,
|
||||||
|
"baseSeverity": "LOW"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.7,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://wpscan.com/vulnerability/a3c282fb-81b8-48bf-8c18-8366ea8ad9af/",
|
"url": "https://wpscan.com/vulnerability/a3c282fb-81b8-48bf-8c18-8366ea8ad9af/",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-35283",
|
"id": "CVE-2024-35283",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-05-29T16:15:10.720",
|
"published": "2024-05-29T16:15:10.720",
|
||||||
"lastModified": "2024-05-29T19:50:25.303",
|
"lastModified": "2024-11-20T18:35:20.470",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,42 @@
|
|||||||
"value": "Una vulnerabilidad en el componente Ignite de Mitel MiContact Center Business hasta la versi\u00f3n 10.0.0.4 podr\u00eda permitir que un atacante no autenticado lleve a cabo un ataque de cross-site scripting (XSS) almacenado debido a una validaci\u00f3n de entrada insuficiente."
|
"value": "Una vulnerabilidad en el componente Ignite de Mitel MiContact Center Business hasta la versi\u00f3n 10.0.0.4 podr\u00eda permitir que un atacante no autenticado lleve a cabo un ataque de cross-site scripting (XSS) almacenado debido a una validaci\u00f3n de entrada insuficiente."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 6.1,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 2.7
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-24-0011",
|
"url": "https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-24-0011",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-3629",
|
"id": "CVE-2024-3629",
|
||||||
"sourceIdentifier": "contact@wpscan.com",
|
"sourceIdentifier": "contact@wpscan.com",
|
||||||
"published": "2024-05-15T06:15:12.567",
|
"published": "2024-05-15T06:15:12.567",
|
||||||
"lastModified": "2024-05-15T16:40:19.330",
|
"lastModified": "2024-11-20T18:35:23.183",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,30 @@
|
|||||||
"value": "El complemento HL Twitter WordPress hasta la versi\u00f3n 2014.1.18 no tiene activada la verificaci\u00f3n CSRF al actualizar su configuraci\u00f3n, lo que podr\u00eda permitir a los atacantes hacer que un administrador que haya iniciado sesi\u00f3n los cambie mediante un ataque CSRF."
|
"value": "El complemento HL Twitter WordPress hasta la versi\u00f3n 2014.1.18 no tiene activada la verificaci\u00f3n CSRF al actualizar su configuraci\u00f3n, lo que podr\u00eda permitir a los atacantes hacer que un administrador que haya iniciado sesi\u00f3n los cambie mediante un ataque CSRF."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 2.4,
|
||||||
|
"baseSeverity": "LOW"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 0.9,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://wpscan.com/vulnerability/c1f6ed2c-0f84-4b13-b39e-5cb91443c2b1/",
|
"url": "https://wpscan.com/vulnerability/c1f6ed2c-0f84-4b13-b39e-5cb91443c2b1/",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-3644",
|
"id": "CVE-2024-3644",
|
||||||
"sourceIdentifier": "contact@wpscan.com",
|
"sourceIdentifier": "contact@wpscan.com",
|
||||||
"published": "2024-05-16T06:15:10.370",
|
"published": "2024-05-16T06:15:10.370",
|
||||||
"lastModified": "2024-05-16T13:03:05.353",
|
"lastModified": "2024-11-20T18:35:23.437",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,30 @@
|
|||||||
"value": "El complemento Newsletter Popup de WordPress hasta la versi\u00f3n 1.2 no desinfecta ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir que usuarios con privilegios elevados, como el administrador, realicen ataques de Cross-Site Scripting Almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n multisitio)."
|
"value": "El complemento Newsletter Popup de WordPress hasta la versi\u00f3n 1.2 no desinfecta ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir que usuarios con privilegios elevados, como el administrador, realicen ataques de Cross-Site Scripting Almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n multisitio)."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 4.8,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.7,
|
||||||
|
"impactScore": 2.7
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://wpscan.com/vulnerability/10eb712a-d9c3-46c9-be6a-02811396fae8/",
|
"url": "https://wpscan.com/vulnerability/10eb712a-d9c3-46c9-be6a-02811396fae8/",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-46768",
|
"id": "CVE-2024-46768",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2024-09-18T08:15:04.853",
|
"published": "2024-09-18T08:15:04.853",
|
||||||
"lastModified": "2024-09-20T12:30:51.220",
|
"lastModified": "2024-11-20T18:19:35.033",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -15,19 +15,119 @@
|
|||||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: hwmon: (hp-wmi-sensors) Verificar si existen datos de eventos de WMI El BIOS puede elegir no devolver datos de eventos en respuesta a un evento de WMI, por lo que el objeto ACPI que se pasa al controlador de notificaciones de WMI puede ser NULL. Verifique si existe tal situaci\u00f3n e ignore el evento en ese caso."
|
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: hwmon: (hp-wmi-sensors) Verificar si existen datos de eventos de WMI El BIOS puede elegir no devolver datos de eventos en respuesta a un evento de WMI, por lo que el objeto ACPI que se pasa al controlador de notificaciones de WMI puede ser NULL. Verifique si existe tal situaci\u00f3n e ignore el evento en ese caso."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
"references": [
|
"cvssMetricV31": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/217539e994e53206bbf3fb330261cc78c480d311",
|
"source": "nvd@nist.gov",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 5.5,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
},
|
},
|
||||||
{
|
"exploitabilityScore": 1.8,
|
||||||
"url": "https://git.kernel.org/stable/c/4b19c83ba108aa66226da5b79810e4d19e005f12",
|
"impactScore": 3.6
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
}
|
||||||
|
]
|
||||||
},
|
},
|
||||||
|
"weaknesses": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/a54da9df75cd1b4b5028f6c60f9a211532680585",
|
"source": "nvd@nist.gov",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-476"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.5",
|
||||||
|
"versionEndExcluding": "6.6.51",
|
||||||
|
"matchCriteriaId": "68960B54-63EE-43D7-A875-28E3ECFA945B"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.7",
|
||||||
|
"versionEndExcluding": "6.10.10",
|
||||||
|
"matchCriteriaId": "ACDEE48C-137A-4731-90D0-A675865E1BED"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "4DEB27E7-30AA-45CC-8934-B89263EF3551"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "E0005AEF-856E-47EB-BFE4-90C46899394D"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "39889A68-6D34-47A6-82FC-CD0BF23D6754"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc5:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "B8383ABF-1457-401F-9B61-EE50F4C61F4F"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc6:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "B77A9280-37E6-49AD-B559-5B23A3B1DC3D"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/217539e994e53206bbf3fb330261cc78c480d311",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/4b19c83ba108aa66226da5b79810e4d19e005f12",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/a54da9df75cd1b4b5028f6c60f9a211532680585",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-46771",
|
"id": "CVE-2024-46771",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2024-09-18T08:15:05.010",
|
"published": "2024-09-18T08:15:05.010",
|
||||||
"lastModified": "2024-09-20T12:30:51.220",
|
"lastModified": "2024-11-20T18:20:03.130",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -15,39 +15,189 @@
|
|||||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: can: bcm: Eliminar entrada proc cuando dev no est\u00e1 registrado. syzkaller inform\u00f3 una advertencia en bcm_connect() a continuaci\u00f3n. [0] La repro llama a connect() a vxcan1, elimina vxcan1 y llama a connect() con ifindex == 0. Llamar a connect() para un socket BCM asigna una entrada proc. Luego, bcm_sk(sk)->bound se establece en 1 para evitar m\u00e1s connect(). Sin embargo, eliminar el dispositivo vinculado restablece bcm_sk(sk)->bound a 0 en bcm_notify(). El segundo connect() intenta asignar una entrada proc con el mismo nombre y establece NULL en bcm_sk(sk)->bcm_proc_read, filtrando la entrada proc original. Dado que la entrada proc solo est\u00e1 disponible para sockets conectados, limpiemos la entrada cuando el netdev vinculado no est\u00e9 registrado. [0]: proc_dir_entry 'can-bcm/2456' ya est\u00e1 registrado ADVERTENCIA: CPU: 1 PID: 394 en fs/proc/generic.c:376 proc_register+0x645/0x8f0 fs/proc/generic.c:375 M\u00f3dulos vinculados en: CPU: 1 PID: 394 Comm: syz-executor403 No contaminado 6.10.0-rc7-g852e42cc2dd4 Nombre del hardware: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014 RIP: 0010:proc_register+0x645/0x8f0 fs/proc/generic.c:375 C\u00f3digo: 00 00 00 00 00 48 85 ed 0f 85 97 02 00 00 4d 85 f6 0f 85 9f 02 00 00 48 c7 c7 9b cb cf 87 48 89 de 4c 89 fa e8 1c 6f eb fe 90 <0f> 0b 90 90 48 c7 c7 98 37 99 89 e8 cb 7e 22 05 bb 00 00 00 10 48 RSP: 0018:ffa0000000cd7c30 EFLAGS: 00010246 RAX: 9e129be1950f0200 RBX: ff1100011b51582c RCX: ff1100011857cd80 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000002 RBP: 0000000000000000 R08: ffd400000000000f R09: ff1100013e78cac0 R10: ffac800000cd7980 R11: ff1100013e12b1f0 R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000000000 R15: ff1100011a99a2ec FS: 00007fbd7086f740(0000) GS:ff1100013fd00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00000000200071c0 CR3: 0000000118556004 CR4: 0000000000771ef0 DR0: 0000000000000000 DR1: 00000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe07f0 DR7: 0000000000000400 PKRU: 55555554 Seguimiento de llamadas: proc_create_net_single+0x144/0x210 fs/proc/proc_net.c:220 bcm_connect+0x472/0x840 net/can/bcm.c:1673 __sys_connect_file net/socket.c:2049 [en l\u00ednea] __sys_connect+0x5d2/0x690 net/socket.c:2066 __do_sys_connect net/socket.c:2076 [en l\u00ednea] __se_sys_connect net/socket.c:2073 [en l\u00ednea] __x64_sys_connect+0x8f/0x100 net/socket.c:2073 do_syscall_x64 arch/x86/entry/common.c:52 [en l\u00ednea] do_syscall_64+0xd9/0x1c0 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x4b/0x53 RIP: 0033:0x7fbd708b0e5d C\u00f3digo: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 73 9f 1b 00 f7 d8 64 89 01 48 RSP: 002b:00007fff8cd33f08 EFLAGS: 00000246 ORIG_RAX: 000000000000002a RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00007fbd708b0e5d RDX: 0000000000000010 RSI: 0000000020000040 RDI: 0000000000000003 RBP: 0000000000000000 R08: 0000000000000040 R09: 0000000000000040 R10: 0000000000000040 R11: 0000000000000246 R12: 00007fff8cd34098 R13: 0000000000401280 R14: 0000000000406de8 R15: 00007fbd70ab9000 remove_proc_entry: elimina el directorio no vac\u00edo 'net/can-bcm', filtrando al menos '2456'"
|
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: can: bcm: Eliminar entrada proc cuando dev no est\u00e1 registrado. syzkaller inform\u00f3 una advertencia en bcm_connect() a continuaci\u00f3n. [0] La repro llama a connect() a vxcan1, elimina vxcan1 y llama a connect() con ifindex == 0. Llamar a connect() para un socket BCM asigna una entrada proc. Luego, bcm_sk(sk)->bound se establece en 1 para evitar m\u00e1s connect(). Sin embargo, eliminar el dispositivo vinculado restablece bcm_sk(sk)->bound a 0 en bcm_notify(). El segundo connect() intenta asignar una entrada proc con el mismo nombre y establece NULL en bcm_sk(sk)->bcm_proc_read, filtrando la entrada proc original. Dado que la entrada proc solo est\u00e1 disponible para sockets conectados, limpiemos la entrada cuando el netdev vinculado no est\u00e9 registrado. [0]: proc_dir_entry 'can-bcm/2456' ya est\u00e1 registrado ADVERTENCIA: CPU: 1 PID: 394 en fs/proc/generic.c:376 proc_register+0x645/0x8f0 fs/proc/generic.c:375 M\u00f3dulos vinculados en: CPU: 1 PID: 394 Comm: syz-executor403 No contaminado 6.10.0-rc7-g852e42cc2dd4 Nombre del hardware: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014 RIP: 0010:proc_register+0x645/0x8f0 fs/proc/generic.c:375 C\u00f3digo: 00 00 00 00 00 48 85 ed 0f 85 97 02 00 00 4d 85 f6 0f 85 9f 02 00 00 48 c7 c7 9b cb cf 87 48 89 de 4c 89 fa e8 1c 6f eb fe 90 <0f> 0b 90 90 48 c7 c7 98 37 99 89 e8 cb 7e 22 05 bb 00 00 00 10 48 RSP: 0018:ffa0000000cd7c30 EFLAGS: 00010246 RAX: 9e129be1950f0200 RBX: ff1100011b51582c RCX: ff1100011857cd80 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000002 RBP: 0000000000000000 R08: ffd400000000000f R09: ff1100013e78cac0 R10: ffac800000cd7980 R11: ff1100013e12b1f0 R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000000000 R15: ff1100011a99a2ec FS: 00007fbd7086f740(0000) GS:ff1100013fd00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00000000200071c0 CR3: 0000000118556004 CR4: 0000000000771ef0 DR0: 0000000000000000 DR1: 00000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe07f0 DR7: 0000000000000400 PKRU: 55555554 Seguimiento de llamadas: proc_create_net_single+0x144/0x210 fs/proc/proc_net.c:220 bcm_connect+0x472/0x840 net/can/bcm.c:1673 __sys_connect_file net/socket.c:2049 [en l\u00ednea] __sys_connect+0x5d2/0x690 net/socket.c:2066 __do_sys_connect net/socket.c:2076 [en l\u00ednea] __se_sys_connect net/socket.c:2073 [en l\u00ednea] __x64_sys_connect+0x8f/0x100 net/socket.c:2073 do_syscall_x64 arch/x86/entry/common.c:52 [en l\u00ednea] do_syscall_64+0xd9/0x1c0 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x4b/0x53 RIP: 0033:0x7fbd708b0e5d C\u00f3digo: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 73 9f 1b 00 f7 d8 64 89 01 48 RSP: 002b:00007fff8cd33f08 EFLAGS: 00000246 ORIG_RAX: 000000000000002a RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00007fbd708b0e5d RDX: 0000000000000010 RSI: 0000000020000040 RDI: 0000000000000003 RBP: 0000000000000000 R08: 0000000000000040 R09: 0000000000000040 R10: 0000000000000040 R11: 0000000000000246 R12: 00007fff8cd34098 R13: 0000000000401280 R14: 0000000000406de8 R15: 00007fbd70ab9000 remove_proc_entry: elimina el directorio no vac\u00edo 'net/can-bcm', filtrando al menos '2456'"
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
"references": [
|
"cvssMetricV31": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/10bfacbd5e8d821011d857bee73310457c9c989a",
|
"source": "nvd@nist.gov",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 5.5,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
},
|
},
|
||||||
{
|
"exploitabilityScore": 1.8,
|
||||||
"url": "https://git.kernel.org/stable/c/33ed4ba73caae39f34ab874ba79138badc2c65dd",
|
"impactScore": 3.6
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
}
|
||||||
|
]
|
||||||
},
|
},
|
||||||
|
"weaknesses": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/3b39dc2901aa7a679a5ca981a3de9f8d5658afe8",
|
"source": "nvd@nist.gov",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"type": "Primary",
|
||||||
},
|
"description": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/4377b79323df62eb5d310354f19b4d130ff58d50",
|
"lang": "en",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"value": "NVD-CWE-noinfo"
|
||||||
},
|
}
|
||||||
{
|
]
|
||||||
"url": "https://git.kernel.org/stable/c/5c680022c4e28ba18ea500f3e29f0428271afa92",
|
}
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
],
|
||||||
},
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/76fe372ccb81b0c89b6cd2fec26e2f38c958be85",
|
"nodes": [
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
{
|
||||||
},
|
"operator": "OR",
|
||||||
{
|
"negate": false,
|
||||||
"url": "https://git.kernel.org/stable/c/abb0a615569ec008e8a93d9f3ab2d5b418ea94d4",
|
"cpeMatch": [
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
{
|
||||||
},
|
"vulnerable": true,
|
||||||
{
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
"url": "https://git.kernel.org/stable/c/aec92dbebdbec7567d9f56d7c9296a572b8fd849",
|
"versionStartIncluding": "2.6.25",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"versionEndExcluding": "4.19.322",
|
||||||
|
"matchCriteriaId": "FDD41833-5EF3-4E8B-BD2B-83D6DF670AAA"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "4.20",
|
||||||
|
"versionEndExcluding": "5.4.284",
|
||||||
|
"matchCriteriaId": "6265A402-9C3C-438F-BFC5-4194B2568B85"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "5.5",
|
||||||
|
"versionEndExcluding": "5.10.226",
|
||||||
|
"matchCriteriaId": "864FC17C-501A-4823-A643-6F35D65D8A97"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "5.11",
|
||||||
|
"versionEndExcluding": "5.15.167",
|
||||||
|
"matchCriteriaId": "043405A4-25FE-45D4-A7BB-2A0C3B7D17C1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "5.16",
|
||||||
|
"versionEndExcluding": "6.1.110",
|
||||||
|
"matchCriteriaId": "6B1A95FC-7E7E-428B-BB59-F76640C652AE"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.2",
|
||||||
|
"versionEndExcluding": "6.6.51",
|
||||||
|
"matchCriteriaId": "E4529134-BAC4-4776-840B-304009E181A0"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.7",
|
||||||
|
"versionEndExcluding": "6.10.10",
|
||||||
|
"matchCriteriaId": "ACDEE48C-137A-4731-90D0-A675865E1BED"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "4DEB27E7-30AA-45CC-8934-B89263EF3551"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "E0005AEF-856E-47EB-BFE4-90C46899394D"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "39889A68-6D34-47A6-82FC-CD0BF23D6754"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc5:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "B8383ABF-1457-401F-9B61-EE50F4C61F4F"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc6:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "B77A9280-37E6-49AD-B559-5B23A3B1DC3D"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/10bfacbd5e8d821011d857bee73310457c9c989a",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/33ed4ba73caae39f34ab874ba79138badc2c65dd",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/3b39dc2901aa7a679a5ca981a3de9f8d5658afe8",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/4377b79323df62eb5d310354f19b4d130ff58d50",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/5c680022c4e28ba18ea500f3e29f0428271afa92",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/76fe372ccb81b0c89b6cd2fec26e2f38c958be85",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/abb0a615569ec008e8a93d9f3ab2d5b418ea94d4",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/aec92dbebdbec7567d9f56d7c9296a572b8fd849",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-46774",
|
"id": "CVE-2024-46774",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2024-09-18T08:15:05.180",
|
"published": "2024-09-18T08:15:05.180",
|
||||||
"lastModified": "2024-09-20T12:30:51.220",
|
"lastModified": "2024-11-20T18:19:00.327",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -15,15 +15,74 @@
|
|||||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: powerpc/rtas: Impedir la construcci\u00f3n del gadget Spectre v1 en sys_rtas() Smatch advierte: arch/powerpc/kernel/rtas.c:1932 __do_sys_rtas() advierte: posible problema de Spectre 'args.args' [r] (cap local) Las variables locales 'nargs' y 'nret' provienen directamente de un b\u00fafer proporcionado por el usuario y se usan como \u00edndices en una peque\u00f1a matriz basada en pila y como entradas para copy_to_user() despu\u00e9s de que est\u00e9n sujetas a verificaciones de l\u00edmites. Utilice array_index_nospec() despu\u00e9s de las verificaciones de l\u00edmites para fijar estos valores para la ejecuci\u00f3n especulativa."
|
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: powerpc/rtas: Impedir la construcci\u00f3n del gadget Spectre v1 en sys_rtas() Smatch advierte: arch/powerpc/kernel/rtas.c:1932 __do_sys_rtas() advierte: posible problema de Spectre 'args.args' [r] (cap local) Las variables locales 'nargs' y 'nret' provienen directamente de un b\u00fafer proporcionado por el usuario y se usan como \u00edndices en una peque\u00f1a matriz basada en pila y como entradas para copy_to_user() despu\u00e9s de que est\u00e9n sujetas a verificaciones de l\u00edmites. Utilice array_index_nospec() despu\u00e9s de las verificaciones de l\u00edmites para fijar estos valores para la ejecuci\u00f3n especulativa."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
"references": [
|
"cvssMetricV31": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/0974d03eb479384466d828d65637814bee6b26d7",
|
"source": "nvd@nist.gov",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 7.1,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
},
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 5.2
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/68d8156480940b79227d58865ec5d2947b9384a8",
|
"source": "nvd@nist.gov",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-787"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "6.10.10",
|
||||||
|
"matchCriteriaId": "75C6119D-9E8D-431D-813F-FE84579072CB"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/0974d03eb479384466d828d65637814bee6b26d7",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/68d8156480940b79227d58865ec5d2947b9384a8",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-46775",
|
"id": "CVE-2024-46775",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2024-09-18T08:15:05.240",
|
"published": "2024-09-18T08:15:05.240",
|
||||||
"lastModified": "2024-09-20T12:30:51.220",
|
"lastModified": "2024-11-20T18:17:13.750",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -15,15 +15,74 @@
|
|||||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: Validar los valores devueltos por la funci\u00f3n [QU\u00c9 Y C\u00d3MO] Los valores devueltos por la funci\u00f3n deben comprobarse antes de que los datos se puedan usar en funciones posteriores. Esto soluciona 4 problemas de CHECKED_RETURN informados por Coverity."
|
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: Validar los valores devueltos por la funci\u00f3n [QU\u00c9 Y C\u00d3MO] Los valores devueltos por la funci\u00f3n deben comprobarse antes de que los datos se puedan usar en funciones posteriores. Esto soluciona 4 problemas de CHECKED_RETURN informados por Coverity."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
"references": [
|
"cvssMetricV31": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/5639a3048c7079803256374204ad55ec52cd0b49",
|
"source": "nvd@nist.gov",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 5.5,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
},
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/673f816b9e1e92d1f70e1bf5f21b531e0ff9ad6c",
|
"source": "nvd@nist.gov",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "NVD-CWE-noinfo"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "6.10.10",
|
||||||
|
"matchCriteriaId": "75C6119D-9E8D-431D-813F-FE84579072CB"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/5639a3048c7079803256374204ad55ec52cd0b49",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/673f816b9e1e92d1f70e1bf5f21b531e0ff9ad6c",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-46776",
|
"id": "CVE-2024-46776",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2024-09-18T08:15:05.287",
|
"published": "2024-09-18T08:15:05.287",
|
||||||
"lastModified": "2024-09-20T12:30:51.220",
|
"lastModified": "2024-11-20T17:56:57.290",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -15,19 +15,88 @@
|
|||||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: ejecutar DC_LOG_DC despu\u00e9s de comprobar link->link_enc [QU\u00c9] DC_LOG_DC debe ejecutarse despu\u00e9s de comprobar link->link_enc, no antes. Esto soluciona un problema de REVERSE_INULL informado por Coverity."
|
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: ejecutar DC_LOG_DC despu\u00e9s de comprobar link->link_enc [QU\u00c9] DC_LOG_DC debe ejecutarse despu\u00e9s de comprobar link->link_enc, no antes. Esto soluciona un problema de REVERSE_INULL informado por Coverity."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
"references": [
|
"cvssMetricV31": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/3a82f62b0d9d7687eac47603bb6cd14a50fa718b",
|
"source": "nvd@nist.gov",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 5.5,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
},
|
},
|
||||||
{
|
"exploitabilityScore": 1.8,
|
||||||
"url": "https://git.kernel.org/stable/c/874e3bb302f97b94ac548959ec4f925b8e7b45e2",
|
"impactScore": 3.6
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
}
|
||||||
|
]
|
||||||
},
|
},
|
||||||
|
"weaknesses": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/adc74d25cdbba978afbb57caec23bbcd0329f7b8",
|
"source": "nvd@nist.gov",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-476"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "6.6.51",
|
||||||
|
"matchCriteriaId": "D4954ED0-8229-4D57-B4B3-CB5154734977"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.7",
|
||||||
|
"versionEndExcluding": "6.10.10",
|
||||||
|
"matchCriteriaId": "ACDEE48C-137A-4731-90D0-A675865E1BED"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/3a82f62b0d9d7687eac47603bb6cd14a50fa718b",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/874e3bb302f97b94ac548959ec4f925b8e7b45e2",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/adc74d25cdbba978afbb57caec23bbcd0329f7b8",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-46777",
|
"id": "CVE-2024-46777",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2024-09-18T08:15:05.330",
|
"published": "2024-09-18T08:15:05.330",
|
||||||
"lastModified": "2024-09-20T12:30:51.220",
|
"lastModified": "2024-11-20T17:56:02.287",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -15,39 +15,158 @@
|
|||||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: udf: evitar particiones de longitud excesiva Evite montar sistemas de archivos en los que la partici\u00f3n supere los 32 bits utilizados para el n\u00famero de bloque. Tambi\u00e9n reh\u00fase montar sistemas de archivos en los que la longitud de la partici\u00f3n sea tan grande que no podamos indexar bits de forma segura en un mapa de bits de bloques."
|
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: udf: evitar particiones de longitud excesiva Evite montar sistemas de archivos en los que la partici\u00f3n supere los 32 bits utilizados para el n\u00famero de bloque. Tambi\u00e9n reh\u00fase montar sistemas de archivos en los que la longitud de la partici\u00f3n sea tan grande que no podamos indexar bits de forma segura en un mapa de bits de bloques."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
"references": [
|
"cvssMetricV31": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/0173999123082280cf904bd640015951f194a294",
|
"source": "nvd@nist.gov",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 5.5,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
},
|
},
|
||||||
{
|
"exploitabilityScore": 1.8,
|
||||||
"url": "https://git.kernel.org/stable/c/1497a4484cdb2cf6c37960d788fb6ba67567bdb7",
|
"impactScore": 3.6
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
}
|
||||||
|
]
|
||||||
},
|
},
|
||||||
|
"weaknesses": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/2ddf831451357c6da4b64645eb797c93c1c054d1",
|
"source": "nvd@nist.gov",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"type": "Primary",
|
||||||
},
|
"description": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/551966371e17912564bc387fbeb2ac13077c3db1",
|
"lang": "en",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"value": "NVD-CWE-noinfo"
|
||||||
},
|
}
|
||||||
{
|
]
|
||||||
"url": "https://git.kernel.org/stable/c/925fd8ee80d5348a5e965548e5484d164d19221d",
|
}
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
],
|
||||||
},
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/a56330761950cb83de1dfb348479f20c56c95f90",
|
"nodes": [
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
{
|
||||||
},
|
"operator": "OR",
|
||||||
{
|
"negate": false,
|
||||||
"url": "https://git.kernel.org/stable/c/c0c23130d38e8bc28e9ef581443de9b1fc749966",
|
"cpeMatch": [
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
{
|
||||||
},
|
"vulnerable": true,
|
||||||
{
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
"url": "https://git.kernel.org/stable/c/ebbe26fd54a9621994bc16b14f2ba8f84c089693",
|
"versionEndExcluding": "4.19.322",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"matchCriteriaId": "29162FB8-5FA4-4DC4-86CE-5EB0CAEEF2F3"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "4.20",
|
||||||
|
"versionEndExcluding": "5.4.284",
|
||||||
|
"matchCriteriaId": "6265A402-9C3C-438F-BFC5-4194B2568B85"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "5.5",
|
||||||
|
"versionEndExcluding": "5.10.226",
|
||||||
|
"matchCriteriaId": "864FC17C-501A-4823-A643-6F35D65D8A97"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "5.11",
|
||||||
|
"versionEndExcluding": "5.15.167",
|
||||||
|
"matchCriteriaId": "043405A4-25FE-45D4-A7BB-2A0C3B7D17C1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "5.16",
|
||||||
|
"versionEndExcluding": "6.1.110",
|
||||||
|
"matchCriteriaId": "6B1A95FC-7E7E-428B-BB59-F76640C652AE"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.2",
|
||||||
|
"versionEndExcluding": "6.6.51",
|
||||||
|
"matchCriteriaId": "E4529134-BAC4-4776-840B-304009E181A0"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.7",
|
||||||
|
"versionEndExcluding": "6.10.10",
|
||||||
|
"matchCriteriaId": "ACDEE48C-137A-4731-90D0-A675865E1BED"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/0173999123082280cf904bd640015951f194a294",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/1497a4484cdb2cf6c37960d788fb6ba67567bdb7",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/2ddf831451357c6da4b64645eb797c93c1c054d1",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/551966371e17912564bc387fbeb2ac13077c3db1",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/925fd8ee80d5348a5e965548e5484d164d19221d",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/a56330761950cb83de1dfb348479f20c56c95f90",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/c0c23130d38e8bc28e9ef581443de9b1fc749966",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/ebbe26fd54a9621994bc16b14f2ba8f84c089693",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-46778",
|
"id": "CVE-2024-46778",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2024-09-18T08:15:05.380",
|
"published": "2024-09-18T08:15:05.380",
|
||||||
"lastModified": "2024-09-20T12:30:51.220",
|
"lastModified": "2024-11-20T17:40:37.847",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -15,15 +15,74 @@
|
|||||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: comprobar el valor de UnboundedRequestEnabled CalculateSwathAndDETConfiguration_params_st's UnboundedRequestEnabled es un puntero (es decir, dml_bool_t *UnboundedRequestEnabled) y, por lo tanto, if (p->UnboundedRequestEnabled) comprueba su direcci\u00f3n, no su valor booleano. Esto soluciona 1 problema de REVERSE_INULL informado por Coverity."
|
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: comprobar el valor de UnboundedRequestEnabled CalculateSwathAndDETConfiguration_params_st's UnboundedRequestEnabled es un puntero (es decir, dml_bool_t *UnboundedRequestEnabled) y, por lo tanto, if (p->UnboundedRequestEnabled) comprueba su direcci\u00f3n, no su valor booleano. Esto soluciona 1 problema de REVERSE_INULL informado por Coverity."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
"references": [
|
"cvssMetricV31": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/4e2b49a85e7974d21364798c5d4aa8070aa864d9",
|
"source": "nvd@nist.gov",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 5.5,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
},
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/a7b38c7852093385d0605aa3c8a2efd6edd1edfd",
|
"source": "nvd@nist.gov",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-476"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "6.10.10",
|
||||||
|
"matchCriteriaId": "75C6119D-9E8D-431D-813F-FE84579072CB"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/4e2b49a85e7974d21364798c5d4aa8070aa864d9",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/a7b38c7852093385d0605aa3c8a2efd6edd1edfd",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-46780",
|
"id": "CVE-2024-46780",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2024-09-18T08:15:05.473",
|
"published": "2024-09-18T08:15:05.473",
|
||||||
"lastModified": "2024-09-20T12:30:51.220",
|
"lastModified": "2024-11-20T17:31:54.440",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -15,39 +15,189 @@
|
|||||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: nilfs2: protege las referencias a los par\u00e1metros de superbloque expuestos en sysfs Los b\u00faferes de superbloque de nilfs2 no solo se pueden sobrescribir en tiempo de ejecuci\u00f3n para modificaciones/reparaciones, sino que tambi\u00e9n se intercambian regularmente, se reemplazan durante el cambio de tama\u00f1o e incluso se abandonan cuando se degradan a un lado debido a problemas con el dispositivo de respaldo. Por lo tanto, acceder a ellos requiere exclusi\u00f3n mutua utilizando el sem\u00e1foro de lectura/escritura \"nilfs->ns_sem\". Algunos m\u00e9todos de demostraci\u00f3n del atributo sysfs leen este b\u00fafer de superbloque sin la exclusi\u00f3n mutua necesaria, lo que puede causar problemas con la desreferenciaci\u00f3n de punteros y el acceso a la memoria, as\u00ed que arr\u00e9glelo."
|
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: nilfs2: protege las referencias a los par\u00e1metros de superbloque expuestos en sysfs Los b\u00faferes de superbloque de nilfs2 no solo se pueden sobrescribir en tiempo de ejecuci\u00f3n para modificaciones/reparaciones, sino que tambi\u00e9n se intercambian regularmente, se reemplazan durante el cambio de tama\u00f1o e incluso se abandonan cuando se degradan a un lado debido a problemas con el dispositivo de respaldo. Por lo tanto, acceder a ellos requiere exclusi\u00f3n mutua utilizando el sem\u00e1foro de lectura/escritura \"nilfs->ns_sem\". Algunos m\u00e9todos de demostraci\u00f3n del atributo sysfs leen este b\u00fafer de superbloque sin la exclusi\u00f3n mutua necesaria, lo que puede causar problemas con la desreferenciaci\u00f3n de punteros y el acceso a la memoria, as\u00ed que arr\u00e9glelo."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
"references": [
|
"cvssMetricV31": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/157c0d94b4c40887329418c70ef4edd1a8d6b4ed",
|
"source": "nvd@nist.gov",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 5.5,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
},
|
},
|
||||||
{
|
"exploitabilityScore": 1.8,
|
||||||
"url": "https://git.kernel.org/stable/c/19cfeba0e4b8eda51484fcf8cf7d150418e1d880",
|
"impactScore": 3.6
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
}
|
||||||
|
]
|
||||||
},
|
},
|
||||||
|
"weaknesses": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/683408258917541bdb294cd717c210a04381931e",
|
"source": "nvd@nist.gov",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"type": "Primary",
|
||||||
},
|
"description": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/8c6e43b3d5f109cf9c61bc188fcc8175404e924f",
|
"lang": "en",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"value": "NVD-CWE-noinfo"
|
||||||
},
|
}
|
||||||
{
|
]
|
||||||
"url": "https://git.kernel.org/stable/c/962562d4c70c5cdeb4e955d63ff2017c4eca1aad",
|
}
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
],
|
||||||
},
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/b14e7260bb691d7f563f61da07d61e3c8b59a614",
|
"nodes": [
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
{
|
||||||
},
|
"operator": "OR",
|
||||||
{
|
"negate": false,
|
||||||
"url": "https://git.kernel.org/stable/c/b90beafac05931cbfcb6b1bd4f67c1923f47040e",
|
"cpeMatch": [
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
{
|
||||||
},
|
"vulnerable": true,
|
||||||
{
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
"url": "https://git.kernel.org/stable/c/ba97ba173f9625d5f34a986088979eae8b80d38e",
|
"versionStartIncluding": "3.17",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"versionEndExcluding": "4.19.322",
|
||||||
|
"matchCriteriaId": "0DF373BC-D49B-4A5C-944C-E227FDEBDFA9"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "4.20",
|
||||||
|
"versionEndExcluding": "5.4.284",
|
||||||
|
"matchCriteriaId": "6265A402-9C3C-438F-BFC5-4194B2568B85"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "5.5",
|
||||||
|
"versionEndExcluding": "5.10.226",
|
||||||
|
"matchCriteriaId": "864FC17C-501A-4823-A643-6F35D65D8A97"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "5.11",
|
||||||
|
"versionEndExcluding": "5.15.167",
|
||||||
|
"matchCriteriaId": "043405A4-25FE-45D4-A7BB-2A0C3B7D17C1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "5.16",
|
||||||
|
"versionEndExcluding": "6.1.110",
|
||||||
|
"matchCriteriaId": "6B1A95FC-7E7E-428B-BB59-F76640C652AE"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.2",
|
||||||
|
"versionEndExcluding": "6.6.51",
|
||||||
|
"matchCriteriaId": "E4529134-BAC4-4776-840B-304009E181A0"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.7",
|
||||||
|
"versionEndExcluding": "6.10.10",
|
||||||
|
"matchCriteriaId": "ACDEE48C-137A-4731-90D0-A675865E1BED"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "4DEB27E7-30AA-45CC-8934-B89263EF3551"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "E0005AEF-856E-47EB-BFE4-90C46899394D"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "39889A68-6D34-47A6-82FC-CD0BF23D6754"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc5:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "B8383ABF-1457-401F-9B61-EE50F4C61F4F"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc6:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "B77A9280-37E6-49AD-B559-5B23A3B1DC3D"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/157c0d94b4c40887329418c70ef4edd1a8d6b4ed",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/19cfeba0e4b8eda51484fcf8cf7d150418e1d880",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/683408258917541bdb294cd717c210a04381931e",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/8c6e43b3d5f109cf9c61bc188fcc8175404e924f",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/962562d4c70c5cdeb4e955d63ff2017c4eca1aad",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/b14e7260bb691d7f563f61da07d61e3c8b59a614",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/b90beafac05931cbfcb6b1bd4f67c1923f47040e",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/ba97ba173f9625d5f34a986088979eae8b80d38e",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-46789",
|
"id": "CVE-2024-46789",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2024-09-18T08:15:05.957",
|
"published": "2024-09-18T08:15:05.957",
|
||||||
"lastModified": "2024-09-20T12:30:51.220",
|
"lastModified": "2024-11-20T17:27:03.197",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -15,15 +15,105 @@
|
|||||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mm/slub: agregar comprobaci\u00f3n de s->flags en alloc_tagging_slab_free_hook Cuando se habilitan CONFIG_MEMCG y CONFIG_KFENCE y CONFIG_KMEMLEAK, siempre aparece la siguiente advertencia. Esto se debe a que se produjo la siguiente pila de llamadas: mem_pool_alloc kmem_cache_alloc_noprof slab_alloc_node kfence_alloc Una vez que la asignaci\u00f3n de kfence es exitosa, slab->obj_exts no estar\u00e1 vac\u00edo, porque ya se le ha asignado un valor en kfence_init_pool. Dado que en la funci\u00f3n prepare_slab_obj_exts_hook, realizamos una comprobaci\u00f3n de s->flags y (SLAB_NO_OBJ_EXT | SLAB_NOLEAKTRACE), la funci\u00f3n alloc_tag_add no se llamar\u00e1 como resultado. Por lo tanto, ref->ct permanece NULL. Sin embargo, cuando llamamos a mem_pool_free, dado que obj_ext no est\u00e1 vac\u00edo, finalmente se invoca el escenario alloc_tag_sub. Aqu\u00ed es donde se produce la advertencia. Por lo tanto, deber\u00edamos agregar las comprobaciones correspondientes en alloc_tagging_slab_free_hook. Para el caso de __GFP_NO_OBJ_EXT, no vi el caso espec\u00edfico en el que se usa kfence, por lo que no agregar\u00e9 la comprobaci\u00f3n correspondiente en alloc_tagging_slab_free_hook por ahora. [ 3.734349] ------------[ cortar aqu\u00ed ]------------ [ 3.734807] alloc_tag no se configur\u00f3 [ 3.735129] ADVERTENCIA: CPU: 4 PID: 40 en ./include/linux/alloc_tag.h:130 kmem_cache_free+0x444/0x574 [ 3.735866] M\u00f3dulos vinculados en: autofs4 [ 3.736211] CPU: 4 UID: 0 PID: 40 Comm: ksoftirqd/4 Contaminado: GW 6.11.0-rc3-dirty #1 [ 3.736969] Contaminado: [W]=WARN [ 3.737258] Nombre del hardware: QEMU KVM Virtual Machine, BIOS desconocido 2/2/2022 [ 3.737875] pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 3.738501] pc : kmem_cache_free+0x444/0x574 [ 3.738951] lr : kmem_cache_free+0x444/0x574 [ 3.739361] sp : ffff80008357bb60 [ 3.739693] x29: ffff80008357bb70 x28: 0000000000000000 x27: 0000000000000000 [ 3.740338] x26: ffff80008207f000 x25: ffff000b2eb2fd60 x24: ffff0000c0005700 [ 3.740982] x23: ffff8000804229e4 x22: ffff800082080000 x21: ffff800081756000 [ 3.741630] x20: fffffd7ff8253360 x19: 00000000000000a8 x18: ffffffffffffffffff [ 3.742274] x17: ffff800ab327f000 x16: ffff800083398000 x15: ffff800081756df0 [ 3.742919] x14: 0000000000000000 x13: 205d344320202020 x12: 5b5d373038343337 [ 3.743560] x11: ffff80008357b650 x10: 000000000000005d x9 : 00000000ff ffffd0 [3.744231] x8: 7f7f7f7f7f7f7f7f x7: ffff80008237bad0 x6: c0000000ffff7fff [3.744907] x5: ffff80008237ba78 x4: ffff8000820bbad0 x3: 00000000000000001 [ 3.745580] x2 : 68d66547c09f7800 x1 : 68d66547c09f7800 x0 : 0000000000000000 [ 3.746255] Rastreo de llamadas: [ 3.746530] kmem_cache_free+0x444/0x574 [ 3.746931] mem_pool_free+0x44/0xf4 [ 3.747306] free_object_rcu+0xc8/0xdc [ 3.747693] rcu_do_batch+0x234/0x8a4 [ 3.748075] rcu_core+0x230/0x3e4 [ 3.748424] rcu_core_si+0x14/0x1c [ 3.748780] handle_softirqs+0x134/0x378 [ 3.749189] run_ksoftirqd+0x70/0x9c [ 3.749560] smpboot_thread_fn+0x148/0x22c [ 3.749978] kthread+0x10c/0x118 [ 3.750323] ret_from_fork+0x10/0x20 [ 3.750696] ---[ fin de seguimiento 0000000000000000 ]---"
|
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mm/slub: agregar comprobaci\u00f3n de s->flags en alloc_tagging_slab_free_hook Cuando se habilitan CONFIG_MEMCG y CONFIG_KFENCE y CONFIG_KMEMLEAK, siempre aparece la siguiente advertencia. Esto se debe a que se produjo la siguiente pila de llamadas: mem_pool_alloc kmem_cache_alloc_noprof slab_alloc_node kfence_alloc Una vez que la asignaci\u00f3n de kfence es exitosa, slab->obj_exts no estar\u00e1 vac\u00edo, porque ya se le ha asignado un valor en kfence_init_pool. Dado que en la funci\u00f3n prepare_slab_obj_exts_hook, realizamos una comprobaci\u00f3n de s->flags y (SLAB_NO_OBJ_EXT | SLAB_NOLEAKTRACE), la funci\u00f3n alloc_tag_add no se llamar\u00e1 como resultado. Por lo tanto, ref->ct permanece NULL. Sin embargo, cuando llamamos a mem_pool_free, dado que obj_ext no est\u00e1 vac\u00edo, finalmente se invoca el escenario alloc_tag_sub. Aqu\u00ed es donde se produce la advertencia. Por lo tanto, deber\u00edamos agregar las comprobaciones correspondientes en alloc_tagging_slab_free_hook. Para el caso de __GFP_NO_OBJ_EXT, no vi el caso espec\u00edfico en el que se usa kfence, por lo que no agregar\u00e9 la comprobaci\u00f3n correspondiente en alloc_tagging_slab_free_hook por ahora. [ 3.734349] ------------[ cortar aqu\u00ed ]------------ [ 3.734807] alloc_tag no se configur\u00f3 [ 3.735129] ADVERTENCIA: CPU: 4 PID: 40 en ./include/linux/alloc_tag.h:130 kmem_cache_free+0x444/0x574 [ 3.735866] M\u00f3dulos vinculados en: autofs4 [ 3.736211] CPU: 4 UID: 0 PID: 40 Comm: ksoftirqd/4 Contaminado: GW 6.11.0-rc3-dirty #1 [ 3.736969] Contaminado: [W]=WARN [ 3.737258] Nombre del hardware: QEMU KVM Virtual Machine, BIOS desconocido 2/2/2022 [ 3.737875] pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 3.738501] pc : kmem_cache_free+0x444/0x574 [ 3.738951] lr : kmem_cache_free+0x444/0x574 [ 3.739361] sp : ffff80008357bb60 [ 3.739693] x29: ffff80008357bb70 x28: 0000000000000000 x27: 0000000000000000 [ 3.740338] x26: ffff80008207f000 x25: ffff000b2eb2fd60 x24: ffff0000c0005700 [ 3.740982] x23: ffff8000804229e4 x22: ffff800082080000 x21: ffff800081756000 [ 3.741630] x20: fffffd7ff8253360 x19: 00000000000000a8 x18: ffffffffffffffffff [ 3.742274] x17: ffff800ab327f000 x16: ffff800083398000 x15: ffff800081756df0 [ 3.742919] x14: 0000000000000000 x13: 205d344320202020 x12: 5b5d373038343337 [ 3.743560] x11: ffff80008357b650 x10: 000000000000005d x9 : 00000000ff ffffd0 [3.744231] x8: 7f7f7f7f7f7f7f7f x7: ffff80008237bad0 x6: c0000000ffff7fff [3.744907] x5: ffff80008237ba78 x4: ffff8000820bbad0 x3: 00000000000000001 [ 3.745580] x2 : 68d66547c09f7800 x1 : 68d66547c09f7800 x0 : 0000000000000000 [ 3.746255] Rastreo de llamadas: [ 3.746530] kmem_cache_free+0x444/0x574 [ 3.746931] mem_pool_free+0x44/0xf4 [ 3.747306] free_object_rcu+0xc8/0xdc [ 3.747693] rcu_do_batch+0x234/0x8a4 [ 3.748075] rcu_core+0x230/0x3e4 [ 3.748424] rcu_core_si+0x14/0x1c [ 3.748780] handle_softirqs+0x134/0x378 [ 3.749189] run_ksoftirqd+0x70/0x9c [ 3.749560] smpboot_thread_fn+0x148/0x22c [ 3.749978] kthread+0x10c/0x118 [ 3.750323] ret_from_fork+0x10/0x20 [ 3.750696] ---[ fin de seguimiento 0000000000000000 ]---"
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
"references": [
|
"cvssMetricV31": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/2d476c86ba4745fcbc912ce4627df4fa80caa9ad",
|
"source": "nvd@nist.gov",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 5.5,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
},
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/ab7ca09520e9c41c219a4427fe0dae24024bfe7f",
|
"source": "nvd@nist.gov",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "NVD-CWE-noinfo"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.10",
|
||||||
|
"versionEndExcluding": "6.10.10",
|
||||||
|
"matchCriteriaId": "D16659A9-BECD-4E13-8994-B096652762E2"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "4DEB27E7-30AA-45CC-8934-B89263EF3551"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "E0005AEF-856E-47EB-BFE4-90C46899394D"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "39889A68-6D34-47A6-82FC-CD0BF23D6754"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc5:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "B8383ABF-1457-401F-9B61-EE50F4C61F4F"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc6:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "B77A9280-37E6-49AD-B559-5B23A3B1DC3D"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/2d476c86ba4745fcbc912ce4627df4fa80caa9ad",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/ab7ca09520e9c41c219a4427fe0dae24024bfe7f",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-46815",
|
"id": "CVE-2024-46815",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2024-09-27T13:15:14.370",
|
"published": "2024-09-27T13:15:14.370",
|
||||||
"lastModified": "2024-09-30T12:45:57.823",
|
"lastModified": "2024-11-20T18:22:12.017",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -15,35 +15,144 @@
|
|||||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: comprobar num_valid_sets antes de acceder a reader_wm_sets[] [POR QU\u00c9 Y C\u00d3MO] Es necesario comprobar num_valid_sets para evitar un \u00edndice negativo al acceder a reader_wm_sets[num_valid_sets - 1]. Esto soluciona un problema de OVERRUN informado por Coverity."
|
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: comprobar num_valid_sets antes de acceder a reader_wm_sets[] [POR QU\u00c9 Y C\u00d3MO] Es necesario comprobar num_valid_sets para evitar un \u00edndice negativo al acceder a reader_wm_sets[num_valid_sets - 1]. Esto soluciona un problema de OVERRUN informado por Coverity."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
"references": [
|
"cvssMetricV31": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/21f9cb44f8c60bf6c26487d428b1a09ad3e8aebf",
|
"source": "nvd@nist.gov",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 7.8,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
},
|
},
|
||||||
{
|
"exploitabilityScore": 1.8,
|
||||||
"url": "https://git.kernel.org/stable/c/6a4a08e45e614cfa7a56498cdfaeb7fae2f07fa0",
|
"impactScore": 5.9
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
}
|
||||||
|
]
|
||||||
},
|
},
|
||||||
|
"weaknesses": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/7c47dd2e92341f2989ab73dbed07f8894593ad7b",
|
"source": "nvd@nist.gov",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"type": "Primary",
|
||||||
},
|
"description": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/a72d4996409569027b4609414a14a87679b12267",
|
"lang": "en",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"value": "NVD-CWE-noinfo"
|
||||||
},
|
}
|
||||||
{
|
]
|
||||||
"url": "https://git.kernel.org/stable/c/b36e9b3104c4ba0f2f5dd083dcf6159cb316c996",
|
}
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
],
|
||||||
},
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/b38a4815f79b87efb196cd5121579fc51e29a7fb",
|
"nodes": [
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
{
|
||||||
},
|
"operator": "OR",
|
||||||
{
|
"negate": false,
|
||||||
"url": "https://git.kernel.org/stable/c/c4a7f7c0062fe2c73f70bb7e335199e25bd71492",
|
"cpeMatch": [
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "5.4.284",
|
||||||
|
"matchCriteriaId": "B1C17E9C-479F-4AE4-8344-B7A213DE3E83"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "5.10",
|
||||||
|
"versionEndExcluding": "5.10.226",
|
||||||
|
"matchCriteriaId": "99182B6F-D005-4EA0-A29E-EE793EAF5494"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "5.11",
|
||||||
|
"versionEndExcluding": "5.15.167",
|
||||||
|
"matchCriteriaId": "043405A4-25FE-45D4-A7BB-2A0C3B7D17C1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "5.16",
|
||||||
|
"versionEndExcluding": "6.1.109",
|
||||||
|
"matchCriteriaId": "790F505A-7933-48F1-B038-380A8BC5C153"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.2",
|
||||||
|
"versionEndExcluding": "6.6.50",
|
||||||
|
"matchCriteriaId": "A56A0460-B122-44D6-B0E6-26CE9C891536"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.7",
|
||||||
|
"versionEndExcluding": "6.10.9",
|
||||||
|
"matchCriteriaId": "F4469C96-A86B-4CC3-B2D5-C21B6B72641B"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/21f9cb44f8c60bf6c26487d428b1a09ad3e8aebf",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/6a4a08e45e614cfa7a56498cdfaeb7fae2f07fa0",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/7c47dd2e92341f2989ab73dbed07f8894593ad7b",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/a72d4996409569027b4609414a14a87679b12267",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/b36e9b3104c4ba0f2f5dd083dcf6159cb316c996",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/b38a4815f79b87efb196cd5121579fc51e29a7fb",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/c4a7f7c0062fe2c73f70bb7e335199e25bd71492",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-46816",
|
"id": "CVE-2024-46816",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2024-09-27T13:15:14.433",
|
"published": "2024-09-27T13:15:14.433",
|
||||||
"lastModified": "2024-09-30T12:45:57.823",
|
"lastModified": "2024-11-20T18:02:52.437",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -15,15 +15,75 @@
|
|||||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: Detener la inicializaci\u00f3n de amdgpu_dm cuando el n\u00famero de enlaces es mayor que max_links [Por qu\u00e9] Advertencia de OVERRUN en el informe de Coverity. Solo hay elementos max_links dentro de dc->links. El recuento de enlaces puede llegar a AMDGPU_DM_MAX_DISPLAY_INDEX 31. [C\u00f3mo] Aseg\u00farese de que el recuento de enlaces sea menor que max_links."
|
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: Detener la inicializaci\u00f3n de amdgpu_dm cuando el n\u00famero de enlaces es mayor que max_links [Por qu\u00e9] Advertencia de OVERRUN en el informe de Coverity. Solo hay elementos max_links dentro de dc->links. El recuento de enlaces puede llegar a AMDGPU_DM_MAX_DISPLAY_INDEX 31. [C\u00f3mo] Aseg\u00farese de que el recuento de enlaces sea menor que max_links."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
"references": [
|
"cvssMetricV31": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/36c39a8dcce210649f2f45f252abaa09fcc1ae87",
|
"source": "nvd@nist.gov",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 5.5,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
},
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/cf8b16857db702ceb8d52f9219a4613363e2b1cf",
|
"source": "nvd@nist.gov",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "NVD-CWE-noinfo"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.10",
|
||||||
|
"versionEndExcluding": "6.10.9",
|
||||||
|
"matchCriteriaId": "3F5B2E4D-6C25-4CEF-B66C-96048941FD98"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/36c39a8dcce210649f2f45f252abaa09fcc1ae87",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/cf8b16857db702ceb8d52f9219a4613363e2b1cf",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-46817",
|
"id": "CVE-2024-46817",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2024-09-27T13:15:14.493",
|
"published": "2024-09-27T13:15:14.493",
|
||||||
"lastModified": "2024-09-30T12:45:57.823",
|
"lastModified": "2024-11-20T17:45:43.893",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -15,35 +15,145 @@
|
|||||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: Detener la inicializaci\u00f3n de amdgpu_dm cuando el n\u00famero de secuencias es mayor que 6 [Por qu\u00e9] Coverity informa una advertencia de OVERRUN. Deber\u00eda abortar la inicializaci\u00f3n de amdgpu_dm. [C\u00f3mo] Devolver el error a amdgpu_dm_init."
|
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: Detener la inicializaci\u00f3n de amdgpu_dm cuando el n\u00famero de secuencias es mayor que 6 [Por qu\u00e9] Coverity informa una advertencia de OVERRUN. Deber\u00eda abortar la inicializaci\u00f3n de amdgpu_dm. [C\u00f3mo] Devolver el error a amdgpu_dm_init."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
"references": [
|
"cvssMetricV31": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/21bbb39863f10f5fb4bf772d15b07d5d13590e9d",
|
"source": "nvd@nist.gov",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 5.5,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
},
|
},
|
||||||
{
|
"exploitabilityScore": 1.8,
|
||||||
"url": "https://git.kernel.org/stable/c/28b515c458aa9c92bfcb99884c94713a5f471cea",
|
"impactScore": 3.6
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
}
|
||||||
|
]
|
||||||
},
|
},
|
||||||
|
"weaknesses": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/754321ed63f0a4a31252ca72e0bd89a9e1888018",
|
"source": "nvd@nist.gov",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"type": "Primary",
|
||||||
},
|
"description": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/84723eb6068c50610c5c0893980d230d7afa2105",
|
"lang": "en",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"value": "NVD-CWE-noinfo"
|
||||||
},
|
}
|
||||||
{
|
]
|
||||||
"url": "https://git.kernel.org/stable/c/94cb77700fa4ae6200486bfa0ba2ac547534afd2",
|
}
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
],
|
||||||
},
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/d398c74c881dee695f6eb6138c9891644e1c3d9d",
|
"nodes": [
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
{
|
||||||
},
|
"operator": "OR",
|
||||||
{
|
"negate": false,
|
||||||
"url": "https://git.kernel.org/stable/c/d619b91d3c4af60ac422f1763ce53d721fb91262",
|
"cpeMatch": [
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "5.4",
|
||||||
|
"versionEndExcluding": "5.4.284",
|
||||||
|
"matchCriteriaId": "6ACBB349-F6C0-4395-8228-F0758C99886A"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "5.10",
|
||||||
|
"versionEndExcluding": "5.10.226",
|
||||||
|
"matchCriteriaId": "99182B6F-D005-4EA0-A29E-EE793EAF5494"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "5.11",
|
||||||
|
"versionEndExcluding": "5.15.167",
|
||||||
|
"matchCriteriaId": "043405A4-25FE-45D4-A7BB-2A0C3B7D17C1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "5.16",
|
||||||
|
"versionEndExcluding": "6.1.109",
|
||||||
|
"matchCriteriaId": "790F505A-7933-48F1-B038-380A8BC5C153"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.2",
|
||||||
|
"versionEndExcluding": "6.6.50",
|
||||||
|
"matchCriteriaId": "A56A0460-B122-44D6-B0E6-26CE9C891536"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.7",
|
||||||
|
"versionEndExcluding": "6.10.9",
|
||||||
|
"matchCriteriaId": "F4469C96-A86B-4CC3-B2D5-C21B6B72641B"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/21bbb39863f10f5fb4bf772d15b07d5d13590e9d",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/28b515c458aa9c92bfcb99884c94713a5f471cea",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/754321ed63f0a4a31252ca72e0bd89a9e1888018",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/84723eb6068c50610c5c0893980d230d7afa2105",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/94cb77700fa4ae6200486bfa0ba2ac547534afd2",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/d398c74c881dee695f6eb6138c9891644e1c3d9d",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/d619b91d3c4af60ac422f1763ce53d721fb91262",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-46820",
|
"id": "CVE-2024-46820",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2024-09-27T13:15:14.707",
|
"published": "2024-09-27T13:15:14.707",
|
||||||
"lastModified": "2024-09-30T12:45:57.823",
|
"lastModified": "2024-11-20T17:34:05.143",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -15,15 +15,75 @@
|
|||||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amdgpu/vcn: eliminar la desactivaci\u00f3n de IRQ en la suspensi\u00f3n de VCN 5 No habilitamos/deshabilitamos directamente la IRQ de VCN en VCN 5.0.0. Y tampoco manejamos el estado de la IRQ. Por lo tanto, se eliminan las llamadas para deshabilitar la IRQ y establecer el estado. Esto elimina de manera efectiva la advertencia de \"WARN_ON(!amdgpu_irq_enabled(adev, src, type))\" en amdgpu_irq_put()."
|
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amdgpu/vcn: eliminar la desactivaci\u00f3n de IRQ en la suspensi\u00f3n de VCN 5 No habilitamos/deshabilitamos directamente la IRQ de VCN en VCN 5.0.0. Y tampoco manejamos el estado de la IRQ. Por lo tanto, se eliminan las llamadas para deshabilitar la IRQ y establecer el estado. Esto elimina de manera efectiva la advertencia de \"WARN_ON(!amdgpu_irq_enabled(adev, src, type))\" en amdgpu_irq_put()."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
"references": [
|
"cvssMetricV31": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/10fe1a79cd1bff3048e13120e93c02f8ecd05e9d",
|
"source": "nvd@nist.gov",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 7.8,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
},
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/aa92264ba6fd4fb570002f69762634221316e7ae",
|
"source": "nvd@nist.gov",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "NVD-CWE-noinfo"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.10",
|
||||||
|
"versionEndExcluding": "6.10.9",
|
||||||
|
"matchCriteriaId": "3F5B2E4D-6C25-4CEF-B66C-96048941FD98"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/10fe1a79cd1bff3048e13120e93c02f8ecd05e9d",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/aa92264ba6fd4fb570002f69762634221316e7ae",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-46825",
|
"id": "CVE-2024-46825",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2024-09-27T13:15:15.027",
|
"published": "2024-09-27T13:15:15.027",
|
||||||
"lastModified": "2024-09-30T12:45:57.823",
|
"lastModified": "2024-11-20T17:24:04.660",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -15,19 +15,89 @@
|
|||||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wifi: iwlwifi: mvm: usar IWL_FW_CHECK para verificar el ID del enlace La funci\u00f3n de b\u00fasqueda iwl_mvm_rcu_fw_link_id_to_link_conf() normalmente se llama con la entrada del firmware, por lo que deber\u00eda usar IWL_FW_CHECK() en lugar de WARN_ON()."
|
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wifi: iwlwifi: mvm: usar IWL_FW_CHECK para verificar el ID del enlace La funci\u00f3n de b\u00fasqueda iwl_mvm_rcu_fw_link_id_to_link_conf() normalmente se llama con la entrada del firmware, por lo que deber\u00eda usar IWL_FW_CHECK() en lugar de WARN_ON()."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
"references": [
|
"cvssMetricV31": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/3cca098c91391b3fa48142bfda57048b985c87f6",
|
"source": "nvd@nist.gov",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 5.5,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
},
|
},
|
||||||
{
|
"exploitabilityScore": 1.8,
|
||||||
"url": "https://git.kernel.org/stable/c/415f3634d53c7fb4cf07d2f5a0be7f2e15e6da33",
|
"impactScore": 3.6
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
}
|
||||||
|
]
|
||||||
},
|
},
|
||||||
|
"weaknesses": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/9215152677d4b321801a92b06f6d5248b2b4465f",
|
"source": "nvd@nist.gov",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "NVD-CWE-noinfo"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.6",
|
||||||
|
"versionEndExcluding": "6.6.51",
|
||||||
|
"matchCriteriaId": "25B5F323-C9C2-4F67-BF42-0C5BDD860576"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.7",
|
||||||
|
"versionEndExcluding": "6.10.10",
|
||||||
|
"matchCriteriaId": "ACDEE48C-137A-4731-90D0-A675865E1BED"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/3cca098c91391b3fa48142bfda57048b985c87f6",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/415f3634d53c7fb4cf07d2f5a0be7f2e15e6da33",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/9215152677d4b321801a92b06f6d5248b2b4465f",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-46826",
|
"id": "CVE-2024-46826",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2024-09-27T13:15:15.087",
|
"published": "2024-09-27T13:15:15.087",
|
||||||
"lastModified": "2024-09-30T12:45:57.823",
|
"lastModified": "2024-11-20T17:19:00.183",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -15,23 +15,102 @@
|
|||||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ELF: se corrige la lectura doble de kernel.randomize_va_space. El cargador ELF utiliza \"randomize_va_space\" dos veces. Es sysctl y puede cambiar en cualquier momento, por lo que, en teor\u00eda, 2 cargas podr\u00edan ver 2 valores diferentes con consecuencias impredecibles. Se debe emitir exactamente una carga para obtener un valor consistente en una ejecuci\u00f3n."
|
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ELF: se corrige la lectura doble de kernel.randomize_va_space. El cargador ELF utiliza \"randomize_va_space\" dos veces. Es sysctl y puede cambiar en cualquier momento, por lo que, en teor\u00eda, 2 cargas podr\u00edan ver 2 valores diferentes con consecuencias impredecibles. Se debe emitir exactamente una carga para obtener un valor consistente en una ejecuci\u00f3n."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
"references": [
|
"cvssMetricV31": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/1cf8cd80903073440b6ea055811d04edd24fe4f7",
|
"source": "nvd@nist.gov",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 5.5,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
},
|
},
|
||||||
{
|
"exploitabilityScore": 1.8,
|
||||||
"url": "https://git.kernel.org/stable/c/1f81d51141a234ad0a3874b4d185dc27a521cd27",
|
"impactScore": 3.6
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
}
|
||||||
|
]
|
||||||
},
|
},
|
||||||
|
"weaknesses": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/2a97388a807b6ab5538aa8f8537b2463c6988bd2",
|
"source": "nvd@nist.gov",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"type": "Primary",
|
||||||
},
|
"description": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/53f17409abf61f66b6f05aff795e938e5ba811d1",
|
"lang": "en",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"value": "NVD-CWE-noinfo"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "6.1.110",
|
||||||
|
"matchCriteriaId": "4B07FE1B-3332-4F75-AABA-811FFB530187"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.2",
|
||||||
|
"versionEndExcluding": "6.6.51",
|
||||||
|
"matchCriteriaId": "E4529134-BAC4-4776-840B-304009E181A0"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.7",
|
||||||
|
"versionEndExcluding": "6.10.10",
|
||||||
|
"matchCriteriaId": "ACDEE48C-137A-4731-90D0-A675865E1BED"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/1cf8cd80903073440b6ea055811d04edd24fe4f7",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/1f81d51141a234ad0a3874b4d185dc27a521cd27",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/2a97388a807b6ab5538aa8f8537b2463c6988bd2",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/53f17409abf61f66b6f05aff795e938e5ba811d1",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-4705",
|
"id": "CVE-2024-4705",
|
||||||
"sourceIdentifier": "security@wordfence.com",
|
"sourceIdentifier": "security@wordfence.com",
|
||||||
"published": "2024-06-06T02:15:53.663",
|
"published": "2024-06-06T02:15:53.663",
|
||||||
"lastModified": "2024-07-23T21:15:15.147",
|
"lastModified": "2024-11-20T18:58:42.133",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -80,9 +80,9 @@
|
|||||||
"cpeMatch": [
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:axelerant:testimonials_widget:*:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:axelerant:testimonials_widget:*:*:*:*:*:wordpress:*:*",
|
||||||
"versionEndIncluding": "4.0.4",
|
"versionEndIncluding": "4.0.4",
|
||||||
"matchCriteriaId": "CA0B05D1-18EA-42D3-BEFA-9A9379B170DC"
|
"matchCriteriaId": "82036303-703C-4012-8F23-D3EDED119C41"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-50968",
|
"id": "CVE-2024-50968",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-11-14T22:15:19.900",
|
"published": "2024-11-14T22:15:19.900",
|
||||||
"lastModified": "2024-11-15T19:55:17.097",
|
"lastModified": "2024-11-20T17:35:28.470",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -36,6 +36,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 3.9,
|
"exploitabilityScore": 3.9,
|
||||||
"impactScore": 3.6
|
"impactScore": 3.6
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 7.5,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 3.6
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
25
CVE-2024/CVE-2024-511xx/CVE-2024-51162.json
Normal file
25
CVE-2024/CVE-2024-511xx/CVE-2024-51162.json
Normal file
@ -0,0 +1,25 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-51162",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2024-11-20T17:15:18.120",
|
||||||
|
"lastModified": "2024-11-20T17:15:18.120",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "An issue in Audimex EE v.15.1.20 and before allows a remote attacker to escalate privileges."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://en.web-audimex.com/ee-auditmanagement",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/Cameleon037/CVEs/blob/main/CVE-2024-51162/README.md",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
21
CVE-2024/CVE-2024-511xx/CVE-2024-51163.json
Normal file
21
CVE-2024/CVE-2024-511xx/CVE-2024-51163.json
Normal file
@ -0,0 +1,21 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-51163",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2024-11-20T17:15:18.417",
|
||||||
|
"lastModified": "2024-11-20T17:15:18.417",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Local File Inclusion vulnerability in Vegam Solutions Vegam 4i v.6.3.47.0 and earlier allows a remote attacker to obtain sensitive information via the print labelling function."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/rahulkadavil/CVEs/tree/main/CVE-2024-51163",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-52613",
|
"id": "CVE-2024-52613",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-11-14T23:15:05.967",
|
"published": "2024-11-14T23:15:05.967",
|
||||||
"lastModified": "2024-11-19T20:39:42.197",
|
"lastModified": "2024-11-20T17:35:28.730",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -36,6 +36,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 1.8,
|
"exploitabilityScore": 1.8,
|
||||||
"impactScore": 3.6
|
"impactScore": 3.6
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 5.5,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 3.6
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -49,6 +69,16 @@
|
|||||||
"value": "CWE-125"
|
"value": "CWE-125"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-125"
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"configurations": [
|
"configurations": [
|
||||||
|
25
CVE-2024/CVE-2024-527xx/CVE-2024-52725.json
Normal file
25
CVE-2024/CVE-2024-527xx/CVE-2024-52725.json
Normal file
@ -0,0 +1,25 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-52725",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2024-11-20T17:15:18.867",
|
||||||
|
"lastModified": "2024-11-20T17:15:18.867",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "SemCms v4.8 was discovered to contain a SQL injection vulnerability. This allows an attacker to execute arbitrary code via the ldgid parameter in the SEMCMS_SeoAndTag.php component."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "http://semcms.com",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/Megrez0423/Seecms",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
25
CVE-2024/CVE-2024-527xx/CVE-2024-52739.json
Normal file
25
CVE-2024/CVE-2024-527xx/CVE-2024-52739.json
Normal file
@ -0,0 +1,25 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-52739",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2024-11-20T18:15:23.393",
|
||||||
|
"lastModified": "2024-11-20T18:15:23.393",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "D-LINK DI-8400 v16.07.26A1 was discovered to contain multiple remote command execution (RCE) vulnerabilities in the msp_info_htm function via the flag and cmd parameters."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/faqiadegege/IoTVuln/blob/main/DI_8400_msp_info_htm_rce/detail.md",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.dlink.com/en/security-bulletin/",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
25
CVE-2024/CVE-2024-527xx/CVE-2024-52769.json
Normal file
25
CVE-2024/CVE-2024-527xx/CVE-2024-52769.json
Normal file
@ -0,0 +1,25 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-52769",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2024-11-20T17:15:19.907",
|
||||||
|
"lastModified": "2024-11-20T17:15:19.907",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "An arbitrary file upload vulnerability in the component /admin/friendlink_edit of DedeBIZ v6.3.0 allows attackers to execute arbitrary code via uploading a crafted file."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://co-a1natas.feishu.cn/docx/Zsd9dnGUvoBW6tx0G5fcVx6vnBb",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/DedeBIZ/DedeV6/",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
25
CVE-2024/CVE-2024-527xx/CVE-2024-52770.json
Normal file
25
CVE-2024/CVE-2024-527xx/CVE-2024-52770.json
Normal file
@ -0,0 +1,25 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-52770",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2024-11-20T17:15:20.200",
|
||||||
|
"lastModified": "2024-11-20T17:15:20.200",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "An arbitrary file upload vulnerability in the component /admin/file_manage_control of DedeBIZ v6.3.0 allows attackers to execute arbitrary code via uploading a crafted file."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://co-a1natas.feishu.cn/docx/Zsd9dnGUvoBW6tx0G5fcVx6vnBb",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/DedeBIZ/DedeV6/",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
25
CVE-2024/CVE-2024-527xx/CVE-2024-52771.json
Normal file
25
CVE-2024/CVE-2024-527xx/CVE-2024-52771.json
Normal file
@ -0,0 +1,25 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-52771",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2024-11-20T17:15:20.637",
|
||||||
|
"lastModified": "2024-11-20T17:15:20.637",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "DedeBIZ v6.3.0 was discovered to contain an arbitrary file deletion vulnerability via the component /admin/file_manage_view."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://co-a1natas.feishu.cn/docx/Zsd9dnGUvoBW6tx0G5fcVx6vnBb",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/DedeBIZ/DedeV6/",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
64
CVE-2024/CVE-2024-527xx/CVE-2024-52796.json
Normal file
64
CVE-2024/CVE-2024-527xx/CVE-2024-52796.json
Normal file
@ -0,0 +1,64 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-52796",
|
||||||
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
|
"published": "2024-11-20T17:15:20.953",
|
||||||
|
"lastModified": "2024-11-20T17:15:20.953",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Password Pusher, an open source application to communicate sensitive information over the web, comes with a configurable rate limiter. In versions prior to v1.49.0, the rate limiter could be bypassed by forging proxy headers allowing bad actors to send unlimited traffic to the site potentially causing a denial of service. In v1.49.0, a fix was implemented to only authorize proxies on local IPs which resolves this issue. As a workaround, one may add rules to one's proxy and/or firewall to not accept external proxy headers such as `X-Forwarded-*` from clients."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "LOW",
|
||||||
|
"baseScore": 5.3,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-770"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://docs.pwpush.com/docs/proxies/#trusted-proxies",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/pglombardo/PasswordPusher/releases/tag/v1.49.0",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/pglombardo/PasswordPusher/security/advisories/GHSA-ffp2-8p2h-4m5j",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-7193",
|
"id": "CVE-2024-7193",
|
||||||
"sourceIdentifier": "cna@vuldb.com",
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
"published": "2024-07-29T10:15:02.107",
|
"published": "2024-07-29T10:15:02.107",
|
||||||
"lastModified": "2024-09-11T16:47:59.613",
|
"lastModified": "2024-11-20T17:04:07.447",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -149,9 +149,9 @@
|
|||||||
"cpeMatch": [
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:florian_heidenreich:mp3tag:*:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:mp3tag:mp3tag:*:*:*:*:*:windows:*:*",
|
||||||
"versionEndExcluding": "3.26d",
|
"versionEndExcluding": "3.26e",
|
||||||
"matchCriteriaId": "F7A4E591-B705-4126-9D1B-27FD015B2734"
|
"matchCriteriaId": "632F068C-952D-473F-A1F5-A1B29FB226BD"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
@ -177,21 +177,24 @@
|
|||||||
"url": "https://vuldb.com/?ctiid.272614",
|
"url": "https://vuldb.com/?ctiid.272614",
|
||||||
"source": "cna@vuldb.com",
|
"source": "cna@vuldb.com",
|
||||||
"tags": [
|
"tags": [
|
||||||
"Permissions Required"
|
"Permissions Required",
|
||||||
|
"VDB Entry"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?id.272614",
|
"url": "https://vuldb.com/?id.272614",
|
||||||
"source": "cna@vuldb.com",
|
"source": "cna@vuldb.com",
|
||||||
"tags": [
|
"tags": [
|
||||||
"Third Party Advisory"
|
"Third Party Advisory",
|
||||||
|
"VDB Entry"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?submit.379523",
|
"url": "https://vuldb.com/?submit.379523",
|
||||||
"source": "cna@vuldb.com",
|
"source": "cna@vuldb.com",
|
||||||
"tags": [
|
"tags": [
|
||||||
"Third Party Advisory"
|
"Third Party Advisory",
|
||||||
|
"VDB Entry"
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
97
README.md
97
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
|||||||
### Last Repository Update
|
### Last Repository Update
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
2024-11-20T17:00:19.994555+00:00
|
2024-11-20T19:00:20.813444+00:00
|
||||||
```
|
```
|
||||||
|
|
||||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
2024-11-20T16:58:35.240000+00:00
|
2024-11-20T18:58:42.133000+00:00
|
||||||
```
|
```
|
||||||
|
|
||||||
### Last Data Feed Release
|
### Last Data Feed Release
|
||||||
@ -33,56 +33,69 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
|||||||
### Total Number of included CVEs
|
### Total Number of included CVEs
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
270713
|
270747
|
||||||
```
|
```
|
||||||
|
|
||||||
### CVEs added in the last Commit
|
### CVEs added in the last Commit
|
||||||
|
|
||||||
Recently added CVEs: `12`
|
Recently added CVEs: `34`
|
||||||
|
|
||||||
- [CVE-2024-10094](CVE-2024/CVE-2024-100xx/CVE-2024-10094.json) (`2024-11-20T15:15:08.083`)
|
- [CVE-2018-9479](CVE-2018/CVE-2018-94xx/CVE-2018-9479.json) (`2024-11-20T18:15:19.830`)
|
||||||
- [CVE-2024-11484](CVE-2024/CVE-2024-114xx/CVE-2024-11484.json) (`2024-11-20T16:15:19.623`)
|
- [CVE-2018-9480](CVE-2018/CVE-2018-94xx/CVE-2018-9480.json) (`2024-11-20T18:15:19.890`)
|
||||||
- [CVE-2024-11485](CVE-2024/CVE-2024-114xx/CVE-2024-11485.json) (`2024-11-20T16:15:19.990`)
|
- [CVE-2018-9481](CVE-2018/CVE-2018-94xx/CVE-2018-9481.json) (`2024-11-20T18:15:19.940`)
|
||||||
- [CVE-2024-11486](CVE-2024/CVE-2024-114xx/CVE-2024-11486.json) (`2024-11-20T16:15:20.273`)
|
- [CVE-2018-9482](CVE-2018/CVE-2018-94xx/CVE-2018-9482.json) (`2024-11-20T18:15:20.000`)
|
||||||
- [CVE-2024-11487](CVE-2024/CVE-2024-114xx/CVE-2024-11487.json) (`2024-11-20T16:15:20.543`)
|
- [CVE-2018-9483](CVE-2018/CVE-2018-94xx/CVE-2018-9483.json) (`2024-11-20T18:15:20.053`)
|
||||||
- [CVE-2024-51208](CVE-2024/CVE-2024-512xx/CVE-2024-51208.json) (`2024-11-20T15:15:08.740`)
|
- [CVE-2018-9484](CVE-2018/CVE-2018-94xx/CVE-2018-9484.json) (`2024-11-20T18:15:20.107`)
|
||||||
- [CVE-2024-51209](CVE-2024/CVE-2024-512xx/CVE-2024-51209.json) (`2024-11-20T15:15:08.830`)
|
- [CVE-2018-9485](CVE-2018/CVE-2018-94xx/CVE-2018-9485.json) (`2024-11-20T18:15:20.163`)
|
||||||
- [CVE-2024-52470](CVE-2024/CVE-2024-524xx/CVE-2024-52470.json) (`2024-11-20T15:15:10.810`)
|
- [CVE-2018-9486](CVE-2018/CVE-2018-94xx/CVE-2018-9486.json) (`2024-11-20T18:15:20.220`)
|
||||||
- [CVE-2024-52471](CVE-2024/CVE-2024-524xx/CVE-2024-52471.json) (`2024-11-20T15:15:11.010`)
|
- [CVE-2018-9487](CVE-2018/CVE-2018-94xx/CVE-2018-9487.json) (`2024-11-20T18:15:20.277`)
|
||||||
- [CVE-2024-52472](CVE-2024/CVE-2024-524xx/CVE-2024-52472.json) (`2024-11-20T15:15:11.237`)
|
- [CVE-2024-11081](CVE-2024/CVE-2024-110xx/CVE-2024-11081.json) (`2024-11-20T18:15:22.340`)
|
||||||
- [CVE-2024-52473](CVE-2024/CVE-2024-524xx/CVE-2024-52473.json) (`2024-11-20T15:15:11.443`)
|
- [CVE-2024-11488](CVE-2024/CVE-2024-114xx/CVE-2024-11488.json) (`2024-11-20T17:15:14.097`)
|
||||||
- [CVE-2024-52598](CVE-2024/CVE-2024-525xx/CVE-2024-52598.json) (`2024-11-20T15:15:11.667`)
|
- [CVE-2024-11489](CVE-2024/CVE-2024-114xx/CVE-2024-11489.json) (`2024-11-20T17:15:14.847`)
|
||||||
|
- [CVE-2024-11490](CVE-2024/CVE-2024-114xx/CVE-2024-11490.json) (`2024-11-20T17:15:15.637`)
|
||||||
|
- [CVE-2024-11491](CVE-2024/CVE-2024-114xx/CVE-2024-11491.json) (`2024-11-20T17:15:16.397`)
|
||||||
|
- [CVE-2024-11492](CVE-2024/CVE-2024-114xx/CVE-2024-11492.json) (`2024-11-20T18:15:22.403`)
|
||||||
|
- [CVE-2024-11493](CVE-2024/CVE-2024-114xx/CVE-2024-11493.json) (`2024-11-20T18:15:22.700`)
|
||||||
|
- [CVE-2024-29292](CVE-2024/CVE-2024-292xx/CVE-2024-29292.json) (`2024-11-20T18:15:22.970`)
|
||||||
|
- [CVE-2024-51162](CVE-2024/CVE-2024-511xx/CVE-2024-51162.json) (`2024-11-20T17:15:18.120`)
|
||||||
|
- [CVE-2024-51163](CVE-2024/CVE-2024-511xx/CVE-2024-51163.json) (`2024-11-20T17:15:18.417`)
|
||||||
|
- [CVE-2024-52725](CVE-2024/CVE-2024-527xx/CVE-2024-52725.json) (`2024-11-20T17:15:18.867`)
|
||||||
|
- [CVE-2024-52739](CVE-2024/CVE-2024-527xx/CVE-2024-52739.json) (`2024-11-20T18:15:23.393`)
|
||||||
|
- [CVE-2024-52769](CVE-2024/CVE-2024-527xx/CVE-2024-52769.json) (`2024-11-20T17:15:19.907`)
|
||||||
|
- [CVE-2024-52770](CVE-2024/CVE-2024-527xx/CVE-2024-52770.json) (`2024-11-20T17:15:20.200`)
|
||||||
|
- [CVE-2024-52771](CVE-2024/CVE-2024-527xx/CVE-2024-52771.json) (`2024-11-20T17:15:20.637`)
|
||||||
|
- [CVE-2024-52796](CVE-2024/CVE-2024-527xx/CVE-2024-52796.json) (`2024-11-20T17:15:20.953`)
|
||||||
|
|
||||||
|
|
||||||
### CVEs modified in the last Commit
|
### CVEs modified in the last Commit
|
||||||
|
|
||||||
Recently modified CVEs: `86`
|
Recently modified CVEs: `47`
|
||||||
|
|
||||||
- [CVE-2024-49574](CVE-2024/CVE-2024-495xx/CVE-2024-49574.json) (`2024-11-20T16:32:37.770`)
|
- [CVE-2024-34365](CVE-2024/CVE-2024-343xx/CVE-2024-34365.json) (`2024-11-20T17:35:27.017`)
|
||||||
- [CVE-2024-49754](CVE-2024/CVE-2024-497xx/CVE-2024-49754.json) (`2024-11-20T15:02:42.683`)
|
- [CVE-2024-34487](CVE-2024/CVE-2024-344xx/CVE-2024-34487.json) (`2024-11-20T17:35:27.303`)
|
||||||
- [CVE-2024-49866](CVE-2024/CVE-2024-498xx/CVE-2024-49866.json) (`2024-11-20T15:56:07.807`)
|
- [CVE-2024-3471](CVE-2024/CVE-2024-34xx/CVE-2024-3471.json) (`2024-11-20T18:35:22.923`)
|
||||||
- [CVE-2024-50149](CVE-2024/CVE-2024-501xx/CVE-2024-50149.json) (`2024-11-20T15:45:13.163`)
|
- [CVE-2024-35283](CVE-2024/CVE-2024-352xx/CVE-2024-35283.json) (`2024-11-20T18:35:20.470`)
|
||||||
- [CVE-2024-50653](CVE-2024/CVE-2024-506xx/CVE-2024-50653.json) (`2024-11-20T15:36:20.257`)
|
- [CVE-2024-3629](CVE-2024/CVE-2024-36xx/CVE-2024-3629.json) (`2024-11-20T18:35:23.183`)
|
||||||
- [CVE-2024-50654](CVE-2024/CVE-2024-506xx/CVE-2024-50654.json) (`2024-11-20T15:27:08.580`)
|
- [CVE-2024-3644](CVE-2024/CVE-2024-36xx/CVE-2024-3644.json) (`2024-11-20T18:35:23.437`)
|
||||||
- [CVE-2024-51814](CVE-2024/CVE-2024-518xx/CVE-2024-51814.json) (`2024-11-20T15:15:09.277`)
|
- [CVE-2024-46768](CVE-2024/CVE-2024-467xx/CVE-2024-46768.json) (`2024-11-20T18:19:35.033`)
|
||||||
- [CVE-2024-52308](CVE-2024/CVE-2024-523xx/CVE-2024-52308.json) (`2024-11-20T15:07:43.127`)
|
- [CVE-2024-46771](CVE-2024/CVE-2024-467xx/CVE-2024-46771.json) (`2024-11-20T18:20:03.130`)
|
||||||
- [CVE-2024-52401](CVE-2024/CVE-2024-524xx/CVE-2024-52401.json) (`2024-11-20T15:15:10.653`)
|
- [CVE-2024-46774](CVE-2024/CVE-2024-467xx/CVE-2024-46774.json) (`2024-11-20T18:19:00.327`)
|
||||||
- [CVE-2024-52419](CVE-2024/CVE-2024-524xx/CVE-2024-52419.json) (`2024-11-20T15:18:20.727`)
|
- [CVE-2024-46775](CVE-2024/CVE-2024-467xx/CVE-2024-46775.json) (`2024-11-20T18:17:13.750`)
|
||||||
- [CVE-2024-52422](CVE-2024/CVE-2024-524xx/CVE-2024-52422.json) (`2024-11-20T15:12:06.680`)
|
- [CVE-2024-46776](CVE-2024/CVE-2024-467xx/CVE-2024-46776.json) (`2024-11-20T17:56:57.290`)
|
||||||
- [CVE-2024-52427](CVE-2024/CVE-2024-524xx/CVE-2024-52427.json) (`2024-11-20T15:29:52.547`)
|
- [CVE-2024-46777](CVE-2024/CVE-2024-467xx/CVE-2024-46777.json) (`2024-11-20T17:56:02.287`)
|
||||||
- [CVE-2024-52428](CVE-2024/CVE-2024-524xx/CVE-2024-52428.json) (`2024-11-20T15:29:38.023`)
|
- [CVE-2024-46778](CVE-2024/CVE-2024-467xx/CVE-2024-46778.json) (`2024-11-20T17:40:37.847`)
|
||||||
- [CVE-2024-52429](CVE-2024/CVE-2024-524xx/CVE-2024-52429.json) (`2024-11-20T15:28:21.680`)
|
- [CVE-2024-46780](CVE-2024/CVE-2024-467xx/CVE-2024-46780.json) (`2024-11-20T17:31:54.440`)
|
||||||
- [CVE-2024-52430](CVE-2024/CVE-2024-524xx/CVE-2024-52430.json) (`2024-11-20T15:27:58.350`)
|
- [CVE-2024-46789](CVE-2024/CVE-2024-467xx/CVE-2024-46789.json) (`2024-11-20T17:27:03.197`)
|
||||||
- [CVE-2024-52431](CVE-2024/CVE-2024-524xx/CVE-2024-52431.json) (`2024-11-20T15:27:25.293`)
|
- [CVE-2024-46815](CVE-2024/CVE-2024-468xx/CVE-2024-46815.json) (`2024-11-20T18:22:12.017`)
|
||||||
- [CVE-2024-52432](CVE-2024/CVE-2024-524xx/CVE-2024-52432.json) (`2024-11-20T15:26:15.960`)
|
- [CVE-2024-46816](CVE-2024/CVE-2024-468xx/CVE-2024-46816.json) (`2024-11-20T18:02:52.437`)
|
||||||
- [CVE-2024-52433](CVE-2024/CVE-2024-524xx/CVE-2024-52433.json) (`2024-11-20T15:25:17.773`)
|
- [CVE-2024-46817](CVE-2024/CVE-2024-468xx/CVE-2024-46817.json) (`2024-11-20T17:45:43.893`)
|
||||||
- [CVE-2024-52434](CVE-2024/CVE-2024-524xx/CVE-2024-52434.json) (`2024-11-20T16:04:10.167`)
|
- [CVE-2024-46820](CVE-2024/CVE-2024-468xx/CVE-2024-46820.json) (`2024-11-20T17:34:05.143`)
|
||||||
- [CVE-2024-52435](CVE-2024/CVE-2024-524xx/CVE-2024-52435.json) (`2024-11-20T16:58:35.240`)
|
- [CVE-2024-46825](CVE-2024/CVE-2024-468xx/CVE-2024-46825.json) (`2024-11-20T17:24:04.660`)
|
||||||
- [CVE-2024-52436](CVE-2024/CVE-2024-524xx/CVE-2024-52436.json) (`2024-11-20T15:24:35.470`)
|
- [CVE-2024-46826](CVE-2024/CVE-2024-468xx/CVE-2024-46826.json) (`2024-11-20T17:19:00.183`)
|
||||||
- [CVE-2024-53050](CVE-2024/CVE-2024-530xx/CVE-2024-53050.json) (`2024-11-20T16:17:12.003`)
|
- [CVE-2024-4705](CVE-2024/CVE-2024-47xx/CVE-2024-4705.json) (`2024-11-20T18:58:42.133`)
|
||||||
- [CVE-2024-53051](CVE-2024/CVE-2024-530xx/CVE-2024-53051.json) (`2024-11-20T16:16:15.217`)
|
- [CVE-2024-50968](CVE-2024/CVE-2024-509xx/CVE-2024-50968.json) (`2024-11-20T17:35:28.470`)
|
||||||
- [CVE-2024-7836](CVE-2024/CVE-2024-78xx/CVE-2024-7836.json) (`2024-11-20T15:09:34.677`)
|
- [CVE-2024-52613](CVE-2024/CVE-2024-526xx/CVE-2024-52613.json) (`2024-11-20T17:35:28.730`)
|
||||||
- [CVE-2024-9356](CVE-2024/CVE-2024-93xx/CVE-2024-9356.json) (`2024-11-20T15:01:41.627`)
|
- [CVE-2024-7193](CVE-2024/CVE-2024-71xx/CVE-2024-7193.json) (`2024-11-20T17:04:07.447`)
|
||||||
|
|
||||||
|
|
||||||
## Download and Usage
|
## Download and Usage
|
||||||
|
324
_state.csv
324
_state.csv
@ -96970,7 +96970,7 @@ CVE-2017-13221,0,0,57e3b08fba40dbad7e13f1ecaef036f44baab1a7137260bac79cedbd0aaba
|
|||||||
CVE-2017-13222,0,0,ebfdf42baf601798adad1e504ba051d585896884b139bf563ee706b616493897,2018-01-24T16:09:05.727000
|
CVE-2017-13222,0,0,ebfdf42baf601798adad1e504ba051d585896884b139bf563ee706b616493897,2018-01-24T16:09:05.727000
|
||||||
CVE-2017-13225,0,0,435256662af53bc84b96c8ecfbcc5e36a7df54bbec82fdff4a451c067fc3516f,2018-01-25T14:42:54.447000
|
CVE-2017-13225,0,0,435256662af53bc84b96c8ecfbcc5e36a7df54bbec82fdff4a451c067fc3516f,2018-01-25T14:42:54.447000
|
||||||
CVE-2017-13226,0,0,a63799b06443b94461c2cc06e2e1817db591c161b20b7ad48cffc3add8fc02f9,2019-10-03T00:03:26.223000
|
CVE-2017-13226,0,0,a63799b06443b94461c2cc06e2e1817db591c161b20b7ad48cffc3add8fc02f9,2019-10-03T00:03:26.223000
|
||||||
CVE-2017-13227,0,0,5f7f7e74107761d5af436ed7ea82d90afdc52ef4ea3a4d4da3872731fe9d2f54,2024-11-19T20:25:24.913000
|
CVE-2017-13227,0,1,298c91cd6525a66e289471e63f3648a2d80772c5e5ecb99bbc80e8ce07d9c1c2,2024-11-20T17:35:01.323000
|
||||||
CVE-2017-13228,0,0,d6d00cc11b40a6f7cf8c7c7b74c3a16d54ba4bf0782c9a7d7071e50c41c579df,2018-03-13T14:41:27.033000
|
CVE-2017-13228,0,0,d6d00cc11b40a6f7cf8c7c7b74c3a16d54ba4bf0782c9a7d7071e50c41c579df,2018-03-13T14:41:27.033000
|
||||||
CVE-2017-13229,0,0,7ebc8fa8286ba1d5821a34ad554783788a44485aedcb5ab1d772a4b9b365c210,2018-03-06T19:52:36.463000
|
CVE-2017-13229,0,0,7ebc8fa8286ba1d5821a34ad554783788a44485aedcb5ab1d772a4b9b365c210,2018-03-06T19:52:36.463000
|
||||||
CVE-2017-13230,0,0,d8a847f5c7c6d9cdce8e19c6fc7435655e7234b7d29ac67a202b7766226c4533,2018-03-13T14:40:12.123000
|
CVE-2017-13230,0,0,d8a847f5c7c6d9cdce8e19c6fc7435655e7234b7d29ac67a202b7766226c4533,2018-03-13T14:40:12.123000
|
||||||
@ -97063,7 +97063,7 @@ CVE-2017-13311,0,0,55504e7fca37acf50034a712244c28977b52d63a2e0a85783f86e9cd04320
|
|||||||
CVE-2017-13312,0,0,b6008dd37efed3ed1dd1887cecd96d4e7119296f7daae93046904c3ca18f8781,2024-11-19T16:35:02.293000
|
CVE-2017-13312,0,0,b6008dd37efed3ed1dd1887cecd96d4e7119296f7daae93046904c3ca18f8781,2024-11-19T16:35:02.293000
|
||||||
CVE-2017-13313,0,0,9c6a43618c00c0daf8e78c975c9182c8d073005f306ff0e197206a7550c09d34,2024-11-19T16:35:03.173000
|
CVE-2017-13313,0,0,9c6a43618c00c0daf8e78c975c9182c8d073005f306ff0e197206a7550c09d34,2024-11-19T16:35:03.173000
|
||||||
CVE-2017-13314,0,0,f15cc076ea1dd87f4d0185b4f5bda3970135144fc10252817f13153eff27c1ae,2024-11-19T16:35:03.990000
|
CVE-2017-13314,0,0,f15cc076ea1dd87f4d0185b4f5bda3970135144fc10252817f13153eff27c1ae,2024-11-19T16:35:03.990000
|
||||||
CVE-2017-13315,0,0,2fbe555c225a62e15b420fd54ea0dfc0dacae80a58e6fd7d7519b9229611b79d,2024-11-19T21:56:45.533000
|
CVE-2017-13315,0,1,d16ea5a6b80ed40589c9b9f086a0f1c6ce65bee6281581573bcff9f10ee7ebce,2024-11-20T17:35:01.990000
|
||||||
CVE-2017-1332,0,0,784a9ee8c3796f2a11ff24e95ae95a08508911f60f6ead21d91e6503f5824554,2017-08-03T15:46:39.147000
|
CVE-2017-1332,0,0,784a9ee8c3796f2a11ff24e95ae95a08508911f60f6ead21d91e6503f5824554,2017-08-03T15:46:39.147000
|
||||||
CVE-2017-1333,0,0,3ec8913dbfad3ccab38e891f6e15f9a0101bb53e4d210c158476cd692803a999,2017-11-16T17:13:42.270000
|
CVE-2017-1333,0,0,3ec8913dbfad3ccab38e891f6e15f9a0101bb53e4d210c158476cd692803a999,2017-11-16T17:13:42.270000
|
||||||
CVE-2017-1334,0,0,406b3dd86a0e9fb2c9a541dafaa2903ce89044fcfe05700f9700b783b2647a7d,2017-10-10T15:07:22.713000
|
CVE-2017-1334,0,0,406b3dd86a0e9fb2c9a541dafaa2903ce89044fcfe05700f9700b783b2647a7d,2017-10-10T15:07:22.713000
|
||||||
@ -126884,14 +126884,14 @@ CVE-2018-9335,0,0,a4615c2362644f0db16eaee8cf3937ed4f43b5ecf27164e1ed1f54117ac25b
|
|||||||
CVE-2018-9336,0,0,ece9df721ed9453241003aa3ca14b7e9da806325e2f8fa4c87f2deb09e87e0cc,2018-06-13T14:27:26.440000
|
CVE-2018-9336,0,0,ece9df721ed9453241003aa3ca14b7e9da806325e2f8fa4c87f2deb09e87e0cc,2018-06-13T14:27:26.440000
|
||||||
CVE-2018-9337,0,0,fa1438ef5dec1ff612947292d12b5f781ba1ebd09d4937236a9cc31915af5230,2020-02-17T16:15:25.707000
|
CVE-2018-9337,0,0,fa1438ef5dec1ff612947292d12b5f781ba1ebd09d4937236a9cc31915af5230,2020-02-17T16:15:25.707000
|
||||||
CVE-2018-9338,0,0,40228caba823ad4e1209a735d23de42ebe53e934eb70e92e5f887484ad853af1,2024-11-19T21:56:45.533000
|
CVE-2018-9338,0,0,40228caba823ad4e1209a735d23de42ebe53e934eb70e92e5f887484ad853af1,2024-11-19T21:56:45.533000
|
||||||
CVE-2018-9339,0,0,54f5417463bea7a3c983ddcd0944219a30f768e67d5011d9d82e7b7aadf28636,2024-11-19T21:56:45.533000
|
CVE-2018-9339,0,1,709efef40e42bc3c2225b57543207441d20c7ae11456afd083c75a2cdc9efcd2,2024-11-20T17:35:03.690000
|
||||||
CVE-2018-9340,0,0,b7f588fa5025f68e8a28700032e9c596814c35c5aa8f289fd258379c686b1d00,2024-11-19T21:56:45.533000
|
CVE-2018-9340,0,1,e1bd80ee3e5ace41d8144dcb6345ec04b94a8d02c934bd98bf987da3d9907ae8,2024-11-20T17:35:05.083000
|
||||||
CVE-2018-9341,0,0,60a00ba92b8099d2baa102c805d547c3b453ab3fe836c50f9b5f9b81d6e8bb27,2024-11-19T21:56:45.533000
|
CVE-2018-9341,0,1,cd9badee59c87b713a540b7c443b6ae5619b04098a98a92b34dccc3138e4e84c,2024-11-20T17:35:06.453000
|
||||||
CVE-2018-9344,0,0,389773b3e9a58e68e8e217f8959fbffbabfe7c425717502deecdcad52c11ca97,2024-11-19T21:56:45.533000
|
CVE-2018-9344,0,1,65379d2152171423139c5d37a84fb2153c0976314acd795bf036e0babb97c542,2024-11-20T17:35:07.810000
|
||||||
CVE-2018-9345,0,0,5ec61c6df398547a1aeb3762168d2b94fb1d6b165bcda7d4c5460c0bc7d6d403,2024-11-19T21:56:45.533000
|
CVE-2018-9345,0,1,4ca350d52bd2857345f5bae5382d74c8aba6043d7b12f03b4a66e07250b88245,2024-11-20T17:35:09.167000
|
||||||
CVE-2018-9346,0,0,717c74ed18492e75e7c08ce32bee403100c5bb6275e7bc7af6ddb9b5072eecc4,2024-11-19T21:56:45.533000
|
CVE-2018-9346,0,1,8047424bed92883715de87714aaea146c43861253f77c3ba87eaffe19bc426eb,2024-11-20T17:35:10.507000
|
||||||
CVE-2018-9347,0,0,004e6ddc7f66bf50b522d5dc4068b89ca2d1ec23406d1738d4ef275b0261e9d4,2018-12-27T13:51:37.067000
|
CVE-2018-9347,0,0,004e6ddc7f66bf50b522d5dc4068b89ca2d1ec23406d1738d4ef275b0261e9d4,2018-12-27T13:51:37.067000
|
||||||
CVE-2018-9348,0,1,7af83442535298c290a4c9be23d63103bd5378183d38c43ed7368ffef3523d1d,2024-11-20T16:35:02.590000
|
CVE-2018-9348,0,0,7af83442535298c290a4c9be23d63103bd5378183d38c43ed7368ffef3523d1d,2024-11-20T16:35:02.590000
|
||||||
CVE-2018-9355,0,0,e8ee2b8217cc4365fa52ec9ad40dda0902bdca6141010bdb87ba36c76908b916,2018-12-14T21:00:55.643000
|
CVE-2018-9355,0,0,e8ee2b8217cc4365fa52ec9ad40dda0902bdca6141010bdb87ba36c76908b916,2018-12-14T21:00:55.643000
|
||||||
CVE-2018-9356,0,0,21c7b89f47d2b248793d1becde812d30b3640d909c40ac658a8c842107272366,2018-12-14T21:00:15.003000
|
CVE-2018-9356,0,0,21c7b89f47d2b248793d1becde812d30b3640d909c40ac658a8c842107272366,2018-12-14T21:00:15.003000
|
||||||
CVE-2018-9357,0,0,b108f834ec62803dd7e497cf27a71d840f665249e07751f13a6e34a3e56225ce,2018-12-12T15:44:27.167000
|
CVE-2018-9357,0,0,b108f834ec62803dd7e497cf27a71d840f665249e07751f13a6e34a3e56225ce,2018-12-12T15:44:27.167000
|
||||||
@ -126901,9 +126901,9 @@ CVE-2018-9360,0,0,3e879d3d70c8f6720dcad88cb01da0ff515e82c70350a6677ccacad3d6e042
|
|||||||
CVE-2018-9361,0,0,a0b72bd155dbecffae08e26bb9051709d54bfb6a88d40757b7a7e8b1476f88b9,2018-12-13T14:13:25.217000
|
CVE-2018-9361,0,0,a0b72bd155dbecffae08e26bb9051709d54bfb6a88d40757b7a7e8b1476f88b9,2018-12-13T14:13:25.217000
|
||||||
CVE-2018-9362,0,0,705f4069c581d00ba5969a5d59a9ac1b41a012bf6bce340bb835c9505bb4298b,2018-12-12T22:15:19.507000
|
CVE-2018-9362,0,0,705f4069c581d00ba5969a5d59a9ac1b41a012bf6bce340bb835c9505bb4298b,2018-12-12T22:15:19.507000
|
||||||
CVE-2018-9363,0,0,1ff56f5d74a0c3a3a4e0210a3e1c49e7031e4ae79d699290af28a0531438e1a5,2023-01-19T16:01:29.963000
|
CVE-2018-9363,0,0,1ff56f5d74a0c3a3a4e0210a3e1c49e7031e4ae79d699290af28a0531438e1a5,2023-01-19T16:01:29.963000
|
||||||
CVE-2018-9364,0,1,73d9627ba781a0fe7e88a96f4cf4211e491783e7e8d348dfae2492b36ea0f49a,2024-11-20T16:35:03.457000
|
CVE-2018-9364,0,0,73d9627ba781a0fe7e88a96f4cf4211e491783e7e8d348dfae2492b36ea0f49a,2024-11-20T16:35:03.457000
|
||||||
CVE-2018-9365,0,0,082b64dfcbf004121db72d3f7546008dddc0a4693a19906808fc4f52a2743e72,2024-11-19T21:56:45.533000
|
CVE-2018-9365,0,0,082b64dfcbf004121db72d3f7546008dddc0a4693a19906808fc4f52a2743e72,2024-11-19T21:56:45.533000
|
||||||
CVE-2018-9366,0,1,0f7c59130f980a3c555b166d8d97d64e42f13ead782c2ea46b10e0bc4d8fd800,2024-11-20T16:35:04.323000
|
CVE-2018-9366,0,0,0f7c59130f980a3c555b166d8d97d64e42f13ead782c2ea46b10e0bc4d8fd800,2024-11-20T16:35:04.323000
|
||||||
CVE-2018-9367,0,0,6e3d42576b1bba3f49a27b062398e300d1ae34ff95f48a7b310f4e1f7a6a367b,2024-11-19T21:56:45.533000
|
CVE-2018-9367,0,0,6e3d42576b1bba3f49a27b062398e300d1ae34ff95f48a7b310f4e1f7a6a367b,2024-11-19T21:56:45.533000
|
||||||
CVE-2018-9368,0,0,3eed727016aaa1bdb2ab5590e837fbeae320a0018dd2936f380b32a99670cd83,2024-11-19T21:56:45.533000
|
CVE-2018-9368,0,0,3eed727016aaa1bdb2ab5590e837fbeae320a0018dd2936f380b32a99670cd83,2024-11-19T21:56:45.533000
|
||||||
CVE-2018-9369,0,0,9395f39f3513afb7330245b4e0c6e2bb02799fed3ddb0f89583c25ad12118d29,2024-11-19T21:56:45.533000
|
CVE-2018-9369,0,0,9395f39f3513afb7330245b4e0c6e2bb02799fed3ddb0f89583c25ad12118d29,2024-11-19T21:56:45.533000
|
||||||
@ -126913,19 +126913,19 @@ CVE-2018-9372,0,0,5241fff5e37359ca4d40d4d0ef51eddfb8e42f03921d8e136fe460686e5ef5
|
|||||||
CVE-2018-9385,0,0,a04751693f742cd9abca42cb6fa43b673fbcc24bbf305f54b6cb4b8b3d812bd4,2018-12-12T21:37:19.207000
|
CVE-2018-9385,0,0,a04751693f742cd9abca42cb6fa43b673fbcc24bbf305f54b6cb4b8b3d812bd4,2018-12-12T21:37:19.207000
|
||||||
CVE-2018-9409,0,0,2968adb0075b7a844b1483be93f82fcfba96e3349da8031816178caf69a971d2,2024-11-19T21:56:45.533000
|
CVE-2018-9409,0,0,2968adb0075b7a844b1483be93f82fcfba96e3349da8031816178caf69a971d2,2024-11-19T21:56:45.533000
|
||||||
CVE-2018-9410,0,0,45d71f9ef4f84e4fb6ba694e9a2e9b63ef0d6353576e0fc9edb4a0ce290c4c46,2024-11-19T21:56:45.533000
|
CVE-2018-9410,0,0,45d71f9ef4f84e4fb6ba694e9a2e9b63ef0d6353576e0fc9edb4a0ce290c4c46,2024-11-19T21:56:45.533000
|
||||||
CVE-2018-9411,0,1,476b90c439a624a41737123423172fd604476c92ec43d209337f6742c8d2dcd6,2024-11-20T16:35:05.247000
|
CVE-2018-9411,0,0,476b90c439a624a41737123423172fd604476c92ec43d209337f6742c8d2dcd6,2024-11-20T16:35:05.247000
|
||||||
CVE-2018-9412,0,0,af0a26cc2a5cb016d9b3edebc5a3654aa65d5ce51220ae84c7907a388e7c6262,2024-11-19T22:15:18.813000
|
CVE-2018-9412,0,0,af0a26cc2a5cb016d9b3edebc5a3654aa65d5ce51220ae84c7907a388e7c6262,2024-11-19T22:15:18.813000
|
||||||
CVE-2018-9415,0,0,ed7c0b7190441eec3d5a1d3e25bd99949f1ee50503dc12cac8466031b55d4227,2018-12-12T21:36:26.237000
|
CVE-2018-9415,0,0,ed7c0b7190441eec3d5a1d3e25bd99949f1ee50503dc12cac8466031b55d4227,2018-12-12T21:36:26.237000
|
||||||
CVE-2018-9417,0,1,cad89e0cf8fc051038cfee3bcefebcea035685758b20e4cd70329109f31d327d,2024-11-20T16:35:06.213000
|
CVE-2018-9417,0,0,cad89e0cf8fc051038cfee3bcefebcea035685758b20e4cd70329109f31d327d,2024-11-20T16:35:06.213000
|
||||||
CVE-2018-9419,0,1,02f586a4a2c00e05c303918b1a88e30161b3c355e9dad6563af3403c62ed7cd2,2024-11-20T16:35:07.070000
|
CVE-2018-9419,0,0,02f586a4a2c00e05c303918b1a88e30161b3c355e9dad6563af3403c62ed7cd2,2024-11-20T16:35:07.070000
|
||||||
CVE-2018-9420,0,1,4244e9b7ba45506dcbb1ac13f9ebc7d60b56060cdbeb8f7bbde68f205292d9b8,2024-11-20T16:35:07.940000
|
CVE-2018-9420,0,0,4244e9b7ba45506dcbb1ac13f9ebc7d60b56060cdbeb8f7bbde68f205292d9b8,2024-11-20T16:35:07.940000
|
||||||
CVE-2018-9421,0,1,54a9a804022b66961a2f89dab10cee1931298e9062d107db078bb888bccbbe90,2024-11-20T16:35:08.780000
|
CVE-2018-9421,0,0,54a9a804022b66961a2f89dab10cee1931298e9062d107db078bb888bccbbe90,2024-11-20T16:35:08.780000
|
||||||
CVE-2018-9422,0,0,b22e8a2bc8d5adc29f8bdfbdd7dc1e05001e055bf24c72ec70cb010b3e16095b,2019-08-19T20:15:10.567000
|
CVE-2018-9422,0,0,b22e8a2bc8d5adc29f8bdfbdd7dc1e05001e055bf24c72ec70cb010b3e16095b,2019-08-19T20:15:10.567000
|
||||||
CVE-2018-9424,0,1,8392e361681b6ffeebb99f65d49311a0cb00b9088034b96a36380ddcdb7ccfcb,2024-11-20T16:35:09.627000
|
CVE-2018-9424,0,0,8392e361681b6ffeebb99f65d49311a0cb00b9088034b96a36380ddcdb7ccfcb,2024-11-20T16:35:09.627000
|
||||||
CVE-2018-9425,0,0,8bb9fe5d8897d0c1ee991ea8f216f809874791aaa9aa06201b1a1ea7da995c7f,2019-10-02T12:37:35.567000
|
CVE-2018-9425,0,0,8bb9fe5d8897d0c1ee991ea8f216f809874791aaa9aa06201b1a1ea7da995c7f,2019-10-02T12:37:35.567000
|
||||||
CVE-2018-9427,0,0,5486e933f7e8fc1bc0bff04d24f293fbfbce11d5548d03ed415827a8763827af,2018-12-18T17:33:53.610000
|
CVE-2018-9427,0,0,5486e933f7e8fc1bc0bff04d24f293fbfbce11d5548d03ed415827a8763827af,2018-12-18T17:33:53.610000
|
||||||
CVE-2018-9428,0,1,7526172b0722af8aa599d12d72e857ede50098dfac4f81f1dcd17f4667e5e95c,2024-11-20T16:35:10.460000
|
CVE-2018-9428,0,0,7526172b0722af8aa599d12d72e857ede50098dfac4f81f1dcd17f4667e5e95c,2024-11-20T16:35:10.460000
|
||||||
CVE-2018-9432,0,1,3d0cf0811ff71e6339ff3a8e156653fbad0df66a3b88267699a739f6f69f0a43,2024-11-20T16:35:11.280000
|
CVE-2018-9432,0,0,3d0cf0811ff71e6339ff3a8e156653fbad0df66a3b88267699a739f6f69f0a43,2024-11-20T16:35:11.280000
|
||||||
CVE-2018-9433,0,0,76ac368e2919f40617375faecbb76eca06fe5380e348f6d4bddf9cf1d776db9b,2024-11-19T22:15:19.307000
|
CVE-2018-9433,0,0,76ac368e2919f40617375faecbb76eca06fe5380e348f6d4bddf9cf1d776db9b,2024-11-19T22:15:19.307000
|
||||||
CVE-2018-9436,0,0,c8a247a24c83592bc549534ae7eaaefb20fd255e25c6b61b4321b051f8f1edfb,2018-12-12T21:25:58.460000
|
CVE-2018-9436,0,0,c8a247a24c83592bc549534ae7eaaefb20fd255e25c6b61b4321b051f8f1edfb,2018-12-12T21:25:58.460000
|
||||||
CVE-2018-9437,0,0,2fe7c032447c4aee2d71cdb7773a63d008648862a1635a0096aea7442fa776a0,2018-12-12T21:23:38.690000
|
CVE-2018-9437,0,0,2fe7c032447c4aee2d71cdb7773a63d008648862a1635a0096aea7442fa776a0,2018-12-12T21:23:38.690000
|
||||||
@ -126946,10 +126946,28 @@ CVE-2018-9457,0,0,4ba55ba142e7078e2f212cda844d0dde689b9f253951c701c7bca4abadf510
|
|||||||
CVE-2018-9458,0,0,1dbbb9d699cf29709cb646fc9beae0f8b0ab2caf8cfb40eec8d64b76e1fb2af0,2019-10-03T00:03:26.223000
|
CVE-2018-9458,0,0,1dbbb9d699cf29709cb646fc9beae0f8b0ab2caf8cfb40eec8d64b76e1fb2af0,2019-10-03T00:03:26.223000
|
||||||
CVE-2018-9459,0,0,37f92a3a8615ac08ad1157d56af457710a07fd1019b073a6d5f8014670ff7598,2019-01-30T20:03:52.930000
|
CVE-2018-9459,0,0,37f92a3a8615ac08ad1157d56af457710a07fd1019b073a6d5f8014670ff7598,2019-01-30T20:03:52.930000
|
||||||
CVE-2018-9465,0,0,3393303102eece75c592f8058027ea52136d9a6fe887ab46a73f746fe5320e57,2018-12-12T14:31:22.043000
|
CVE-2018-9465,0,0,3393303102eece75c592f8058027ea52136d9a6fe887ab46a73f746fe5320e57,2018-12-12T14:31:22.043000
|
||||||
CVE-2018-9466,0,1,8a0bcf1d1447e0805bae81af54b078ca35801107416c23ddf0d4e34acefc60c4,2024-11-20T16:35:12.150000
|
CVE-2018-9466,0,0,8a0bcf1d1447e0805bae81af54b078ca35801107416c23ddf0d4e34acefc60c4,2024-11-20T16:35:12.150000
|
||||||
CVE-2018-9467,0,0,f5a4d9f86c03009f1de6b0f82410445906224b1309bf765545b0d54afac3483c,2024-11-20T00:15:16.820000
|
CVE-2018-9467,0,0,f5a4d9f86c03009f1de6b0f82410445906224b1309bf765545b0d54afac3483c,2024-11-20T00:15:16.820000
|
||||||
|
CVE-2018-9468,1,1,df02ce6b1d3ad6facea805e279cbed7c6c7701712910c294bf68b00df0b469c2,2024-11-20T17:15:08.783000
|
||||||
|
CVE-2018-9469,1,1,9bff9d593879c1fdf78301c90abaa160b90bd6eac95cba15c05faa69eff3a9a4,2024-11-20T17:15:09.040000
|
||||||
|
CVE-2018-9470,1,1,b5cccf8f6b9f73a4a95c37b2bbd0781cd6ba57e39dc5fde7c2c904efbd17f814,2024-11-20T18:15:19.427000
|
||||||
|
CVE-2018-9471,1,1,a25bd887e39eac47b2287f87e3158bc5da1cedaa4466f518bfab743c61723935,2024-11-20T18:15:19.500000
|
||||||
|
CVE-2018-9472,1,1,6d41a1ef8ff54b7645232023c7bd7e12a653214c2489443a595f5949dfe52bb4,2024-11-20T18:15:19.550000
|
||||||
CVE-2018-9473,0,0,c1bdd895adedc9cea983c10ac747c9f80d48e4298ee85e28850c7d3a483f6fc6,2023-11-07T03:01:36.857000
|
CVE-2018-9473,0,0,c1bdd895adedc9cea983c10ac747c9f80d48e4298ee85e28850c7d3a483f6fc6,2023-11-07T03:01:36.857000
|
||||||
|
CVE-2018-9474,1,1,9e2b0489401002dd8acaba51c5f85ce9c9ffae27e01c2b081a4bc10aeb07a6f6,2024-11-20T18:15:19.610000
|
||||||
|
CVE-2018-9475,1,1,ca68577f7baec870a17f6b527f53952d05f1ae3256058c0a3bfd1858ed849b51,2024-11-20T18:15:19.670000
|
||||||
CVE-2018-9476,0,0,1a47893a31d348e8886bcf5af0104f1b9d6f9c70018616ac539379931cc12516,2023-11-07T03:01:36.913000
|
CVE-2018-9476,0,0,1a47893a31d348e8886bcf5af0104f1b9d6f9c70018616ac539379931cc12516,2023-11-07T03:01:36.913000
|
||||||
|
CVE-2018-9477,1,1,0b3782d7dea5a5ed303fb6f5a1565051d2a7ee5c5ec41f3b66100968046d3a3a,2024-11-20T18:15:19.723000
|
||||||
|
CVE-2018-9478,1,1,cec0fab52d78d1de919f516142ec6b7848350eee24daa8824c8d1e0c4497c216,2024-11-20T18:15:19.773000
|
||||||
|
CVE-2018-9479,1,1,f22a2731df3aac2b0bdb456ea6856653670bff2ed5601c47970a5d0dbfbf931e,2024-11-20T18:15:19.830000
|
||||||
|
CVE-2018-9480,1,1,ab859b2ce5aefa70c1732d96640459bfc766e2f04074780af897f8f403546339,2024-11-20T18:15:19.890000
|
||||||
|
CVE-2018-9481,1,1,784e23fa20ef2fa61ecdefe55b6081e5aef5f3107dd6f81a5e94a6e1cb094637,2024-11-20T18:15:19.940000
|
||||||
|
CVE-2018-9482,1,1,14d935e2207311ceeb90656bfdedf27cb4585dbf4fa00e0eb424830286d8c440,2024-11-20T18:15:20
|
||||||
|
CVE-2018-9483,1,1,db4653754d1231afdef6b6a1577601d7b9565f52f1a6b26b29b17caa3c98dc32,2024-11-20T18:15:20.053000
|
||||||
|
CVE-2018-9484,1,1,3c612c22c918d7eac7620bc0366fec1f7519f5a9e04df68743e1ad55b47e30e5,2024-11-20T18:15:20.107000
|
||||||
|
CVE-2018-9485,1,1,a6d84f14faaa2d95ec8f919baecaebc6ba9e427635afb4713d0c1a36749252d7,2024-11-20T18:15:20.163000
|
||||||
|
CVE-2018-9486,1,1,7dc0674674af21a0abccc63bc5778a80ab4b376e9a828d2449c08fd30d791ecd,2024-11-20T18:15:20.220000
|
||||||
|
CVE-2018-9487,1,1,d1a184d9c48e59ffed2afaf8c24275fa500657c6b909ce47ee106a6d2e37df55,2024-11-20T18:15:20.277000
|
||||||
CVE-2018-9488,0,0,71b6dcf45b61fc203c6b47a6e57d0e676f081e2bcfeee87d14c2243a30065e58,2020-08-24T17:37:01.140000
|
CVE-2018-9488,0,0,71b6dcf45b61fc203c6b47a6e57d0e676f081e2bcfeee87d14c2243a30065e58,2020-08-24T17:37:01.140000
|
||||||
CVE-2018-9489,0,0,0099c3fefae2b8555e406065f8c8cb7b969ba5c3ca27214a0b4864b328f4581b,2018-12-13T15:00:19.263000
|
CVE-2018-9489,0,0,0099c3fefae2b8555e406065f8c8cb7b969ba5c3ca27214a0b4864b328f4581b,2018-12-13T15:00:19.263000
|
||||||
CVE-2018-9490,0,0,cc042ad56360c2290ea2dde569ff2c97233270532d7564c204f2685c4a8e9dd4,2023-11-07T03:01:36.990000
|
CVE-2018-9490,0,0,cc042ad56360c2290ea2dde569ff2c97233270532d7564c204f2685c4a8e9dd4,2023-11-07T03:01:36.990000
|
||||||
@ -212409,7 +212427,7 @@ CVE-2022-48642,0,0,46049320411d54d94258eba770b701bfe0b63d116a731b90894f4499a7e7e
|
|||||||
CVE-2022-48643,0,0,f501c66e7560c01128f4bde7ed1c922c51bf2137743e231acbacc80f33921a9a,2024-04-29T12:42:03.667000
|
CVE-2022-48643,0,0,f501c66e7560c01128f4bde7ed1c922c51bf2137743e231acbacc80f33921a9a,2024-04-29T12:42:03.667000
|
||||||
CVE-2022-48644,0,0,aee50eaa1080ba42d663c290ef222665900fa3d1e2dc76a2a113640774c9167b,2024-04-29T12:42:03.667000
|
CVE-2022-48644,0,0,aee50eaa1080ba42d663c290ef222665900fa3d1e2dc76a2a113640774c9167b,2024-04-29T12:42:03.667000
|
||||||
CVE-2022-48645,0,0,1e1822917f82ebc32aaccd859c4caaf954dc1b4f7d1404b6f0133173beec7b08,2024-04-29T12:42:03.667000
|
CVE-2022-48645,0,0,1e1822917f82ebc32aaccd859c4caaf954dc1b4f7d1404b6f0133173beec7b08,2024-04-29T12:42:03.667000
|
||||||
CVE-2022-48646,0,1,8bea7de0422c46737af9f07857644b2d415c6f13cd8219c858b3d30dba8284ff,2024-11-20T15:35:04.650000
|
CVE-2022-48646,0,0,8bea7de0422c46737af9f07857644b2d415c6f13cd8219c858b3d30dba8284ff,2024-11-20T15:35:04.650000
|
||||||
CVE-2022-48647,0,0,63a2d6011a27e3884bbf52c53c04a6667615b24da49dc1b7925f7441f3b1dc19,2024-04-29T12:42:03.667000
|
CVE-2022-48647,0,0,63a2d6011a27e3884bbf52c53c04a6667615b24da49dc1b7925f7441f3b1dc19,2024-04-29T12:42:03.667000
|
||||||
CVE-2022-48648,0,0,dfadd22a87307801d0d16b9b01438d2bba84ad33295315fbb2e82d8be6718c71,2024-04-29T12:42:03.667000
|
CVE-2022-48648,0,0,dfadd22a87307801d0d16b9b01438d2bba84ad33295315fbb2e82d8be6718c71,2024-04-29T12:42:03.667000
|
||||||
CVE-2022-48649,0,0,0a15744c4cfd26154a17feb04c983f0ec779f45173af81b2d41d9c016bdb8dd6,2024-04-29T12:42:03.667000
|
CVE-2022-48649,0,0,0a15744c4cfd26154a17feb04c983f0ec779f45173af81b2d41d9c016bdb8dd6,2024-04-29T12:42:03.667000
|
||||||
@ -212437,7 +212455,7 @@ CVE-2022-48668,0,0,ffa47e0d1e12cf1e004440647944ea09831e32184ce4ba444d32b7e58f5b8
|
|||||||
CVE-2022-48669,0,0,8ce958067a23f607d74ad3dcda99b5322da4d461e9894c58fa34c110f37456b9,2024-10-29T18:35:00.757000
|
CVE-2022-48669,0,0,8ce958067a23f607d74ad3dcda99b5322da4d461e9894c58fa34c110f37456b9,2024-10-29T18:35:00.757000
|
||||||
CVE-2022-4867,0,0,63e49f2f48f56858cc93b1a43514f2600f0d5c18f31355382513a6c3bcb2d646,2023-01-06T21:26:37.597000
|
CVE-2022-4867,0,0,63e49f2f48f56858cc93b1a43514f2600f0d5c18f31355382513a6c3bcb2d646,2023-01-06T21:26:37.597000
|
||||||
CVE-2022-48670,0,0,cddc4d913fc705785aa8a403d73ce736c7d9ddcc87a2c75d21fbd304ce895062,2024-07-03T01:39:06.507000
|
CVE-2022-48670,0,0,cddc4d913fc705785aa8a403d73ce736c7d9ddcc87a2c75d21fbd304ce895062,2024-07-03T01:39:06.507000
|
||||||
CVE-2022-48671,0,1,26a10879293078d6f23578705cdb0c7506c43064a3dd7470bd473270f324811a,2024-11-20T15:35:05.007000
|
CVE-2022-48671,0,0,26a10879293078d6f23578705cdb0c7506c43064a3dd7470bd473270f324811a,2024-11-20T15:35:05.007000
|
||||||
CVE-2022-48672,0,0,4e4a32048fa82f31bfc1bd6cc9b82dab9d13cb9dd263513a93a223d395400a63,2024-05-23T20:26:40.327000
|
CVE-2022-48672,0,0,4e4a32048fa82f31bfc1bd6cc9b82dab9d13cb9dd263513a93a223d395400a63,2024-05-23T20:26:40.327000
|
||||||
CVE-2022-48673,0,0,f4ca107000e65831e0fae0fc2f16ecb6733378d4b0e1cb98a580ffc3a21de7b1,2024-05-23T20:26:54.160000
|
CVE-2022-48673,0,0,f4ca107000e65831e0fae0fc2f16ecb6733378d4b0e1cb98a580ffc3a21de7b1,2024-05-23T20:26:54.160000
|
||||||
CVE-2022-48674,0,0,66af5e576a467c432885af97fab436414fcfc2b2d26a7d233ad109f75295e952,2024-05-23T19:36:25.633000
|
CVE-2022-48674,0,0,66af5e576a467c432885af97fab436414fcfc2b2d26a7d233ad109f75295e952,2024-05-23T19:36:25.633000
|
||||||
@ -212459,7 +212477,7 @@ CVE-2022-48692,0,0,46546614be66817a48b52a16773b86b62dd71ed7709b7cc7f5f2e6be9c7a9
|
|||||||
CVE-2022-48693,0,0,2de2da6c1292fb939817f4985aaa3748704c5e172b80ff619c511ddeeb51fc58,2024-05-23T20:34:08.557000
|
CVE-2022-48693,0,0,2de2da6c1292fb939817f4985aaa3748704c5e172b80ff619c511ddeeb51fc58,2024-05-23T20:34:08.557000
|
||||||
CVE-2022-48694,0,0,c39c541ec46d540d96fddfe1bdcf81c083d74c7bb84ee90738a9b26551466af0,2024-05-23T20:34:12.060000
|
CVE-2022-48694,0,0,c39c541ec46d540d96fddfe1bdcf81c083d74c7bb84ee90738a9b26551466af0,2024-05-23T20:34:12.060000
|
||||||
CVE-2022-48695,0,0,8970459b5cf430fc8f110f8b3b9636df1f2a218eaed323426aa62da1f67d7386,2024-05-06T12:44:56.377000
|
CVE-2022-48695,0,0,8970459b5cf430fc8f110f8b3b9636df1f2a218eaed323426aa62da1f67d7386,2024-05-06T12:44:56.377000
|
||||||
CVE-2022-48696,0,1,e23c474366773c1421aa082864ca5561fd1faf5e520e8db9339604da85db514c,2024-11-20T15:35:05.953000
|
CVE-2022-48696,0,0,e23c474366773c1421aa082864ca5561fd1faf5e520e8db9339604da85db514c,2024-11-20T15:35:05.953000
|
||||||
CVE-2022-48697,0,0,058012f0826b8abde23f1ccf33c26738446f8a972fffb456e5c8d9b2178f21b0,2024-10-30T16:35:05.693000
|
CVE-2022-48697,0,0,058012f0826b8abde23f1ccf33c26738446f8a972fffb456e5c8d9b2178f21b0,2024-10-30T16:35:05.693000
|
||||||
CVE-2022-48698,0,0,fbcd1ab35f418e43551eb49c5375c6b7554cf2d127406f8d425fbb9dcb0403a1,2024-10-30T16:35:06.023000
|
CVE-2022-48698,0,0,fbcd1ab35f418e43551eb49c5375c6b7554cf2d127406f8d425fbb9dcb0403a1,2024-10-30T16:35:06.023000
|
||||||
CVE-2022-48699,0,0,acc89b565cb5cce5b9f8e8bd3da6f880e3d6b9a5e41cd82aa70c3c6804a5dd1a,2024-05-06T12:44:56.377000
|
CVE-2022-48699,0,0,acc89b565cb5cce5b9f8e8bd3da6f880e3d6b9a5e41cd82aa70c3c6804a5dd1a,2024-05-06T12:44:56.377000
|
||||||
@ -215877,7 +215895,7 @@ CVE-2023-21266,0,0,18d7bcc4c1fdfc1af03411d2e140522d50eb303306a9a01cd215164baa58c
|
|||||||
CVE-2023-21267,0,0,228f6f7596b6cb97274c6123e77ddff3343b22ba18b10a96e2055db9bcead853,2024-07-03T01:39:20.417000
|
CVE-2023-21267,0,0,228f6f7596b6cb97274c6123e77ddff3343b22ba18b10a96e2055db9bcead853,2024-07-03T01:39:20.417000
|
||||||
CVE-2023-21268,0,0,7502585c73530dd6ce3c3ff0a870c3ee2c56fd847c4fb3355c51e0a7f0ac2071,2023-11-15T02:55:56.537000
|
CVE-2023-21268,0,0,7502585c73530dd6ce3c3ff0a870c3ee2c56fd847c4fb3355c51e0a7f0ac2071,2023-11-15T02:55:56.537000
|
||||||
CVE-2023-21269,0,0,fece9dff3711fe2af86d775cc74a99bad4829a0075d5a2a32efc6af138cb5008,2024-10-09T16:35:01.057000
|
CVE-2023-21269,0,0,fece9dff3711fe2af86d775cc74a99bad4829a0075d5a2a32efc6af138cb5008,2024-10-09T16:35:01.057000
|
||||||
CVE-2023-21270,0,0,8a339cf3eb459ee43f00f822b6b3616950a89d0287f3432e0e0d80c33aa2c065,2024-11-19T21:56:45.533000
|
CVE-2023-21270,0,1,1fe5c2357fd389c2fa26892a2779cf8fae56997897dec89089d61f79d70b9e74,2024-11-20T17:35:18.563000
|
||||||
CVE-2023-21271,0,0,3086339ffce7fa60dbd215e725bc9394127b3bd1eb1d62f2277d721d350ea6f3,2023-08-18T19:54:05.827000
|
CVE-2023-21271,0,0,3086339ffce7fa60dbd215e725bc9394127b3bd1eb1d62f2277d721d350ea6f3,2023-08-18T19:54:05.827000
|
||||||
CVE-2023-21272,0,0,8929585c315334a5cf678abc944b74ca2a510b1cfc115c2eab8b9f06cedbaa56,2024-10-09T16:35:02.920000
|
CVE-2023-21272,0,0,8929585c315334a5cf678abc944b74ca2a510b1cfc115c2eab8b9f06cedbaa56,2024-10-09T16:35:02.920000
|
||||||
CVE-2023-21273,0,0,1299d8533bbcaea325dcedcf17bc021b0703fb6c70d4dac65290a62467f88245,2023-08-18T19:44:13.167000
|
CVE-2023-21273,0,0,1299d8533bbcaea325dcedcf17bc021b0703fb6c70d4dac65290a62467f88245,2023-08-18T19:44:13.167000
|
||||||
@ -224006,7 +224024,7 @@ CVE-2023-31273,0,0,df29903cdfe2e4639cd01ec0b69ff28a6c8668dacca1bfa79e65f27a55e93
|
|||||||
CVE-2023-31274,0,0,b89ee8f632da93fef49b2f3d613dfb9c880377b8d49fcccc62dc6815bdef2170,2024-01-26T14:59:22.727000
|
CVE-2023-31274,0,0,b89ee8f632da93fef49b2f3d613dfb9c880377b8d49fcccc62dc6815bdef2170,2024-01-26T14:59:22.727000
|
||||||
CVE-2023-31275,0,0,ee9b08bd9bf3c6d757e06df03df44c9f8e957f613ff033d761c05a4a4deeceff,2023-12-01T02:30:35.647000
|
CVE-2023-31275,0,0,ee9b08bd9bf3c6d757e06df03df44c9f8e957f613ff033d761c05a4a4deeceff,2023-12-01T02:30:35.647000
|
||||||
CVE-2023-31277,0,0,cb1d21631c3619a70f0bef39bd2a81b34557f72605d5a8226deca37e7d552ce2,2023-07-13T22:58:25.080000
|
CVE-2023-31277,0,0,cb1d21631c3619a70f0bef39bd2a81b34557f72605d5a8226deca37e7d552ce2,2023-07-13T22:58:25.080000
|
||||||
CVE-2023-31278,0,1,24a5a3af6a026c438962dd77b6767dca44b4602d0816bb1cc6533fbb5b7ecf44,2024-11-20T16:15:19.003000
|
CVE-2023-31278,0,0,24a5a3af6a026c438962dd77b6767dca44b4602d0816bb1cc6533fbb5b7ecf44,2024-11-20T16:15:19.003000
|
||||||
CVE-2023-3128,0,0,4f672b80ccc21c449b1b4f0d2a6f3f252ad8348ddc02f0d1cc42bc1bc7e40f47,2023-07-21T19:19:27.410000
|
CVE-2023-3128,0,0,4f672b80ccc21c449b1b4f0d2a6f3f252ad8348ddc02f0d1cc42bc1bc7e40f47,2023-07-21T19:19:27.410000
|
||||||
CVE-2023-31284,0,0,519ad310a54f4ad97f8450fa1072c98b10591b20f13b4c04c10a5f63a0762511,2023-09-14T18:15:09.147000
|
CVE-2023-31284,0,0,519ad310a54f4ad97f8450fa1072c98b10591b20f13b4c04c10a5f63a0762511,2023-09-14T18:15:09.147000
|
||||||
CVE-2023-31285,0,0,758459fe44f913c095720939040c08acdc1549f15fbd03b79e144f08c344f1b8,2023-05-30T19:15:09.833000
|
CVE-2023-31285,0,0,758459fe44f913c095720939040c08acdc1549f15fbd03b79e144f08c344f1b8,2023-05-30T19:15:09.833000
|
||||||
@ -224606,7 +224624,7 @@ CVE-2023-3220,0,0,3e074125b66b0b5b753fe9c22f3c8d0675e17e6906dbd8adf813bdbd4f9101
|
|||||||
CVE-2023-32200,0,0,6c410962ed2301957690ecb850b2aeb4572768f35e76f9eddc4d1fc62f123dab,2024-10-07T20:35:02.653000
|
CVE-2023-32200,0,0,6c410962ed2301957690ecb850b2aeb4572768f35e76f9eddc4d1fc62f123dab,2024-10-07T20:35:02.653000
|
||||||
CVE-2023-32201,0,0,bbbd1f40b3e964baff177b82fbc31c506c5654d3df5270207b5a325718b81d44,2023-06-26T18:54:56.827000
|
CVE-2023-32201,0,0,bbbd1f40b3e964baff177b82fbc31c506c5654d3df5270207b5a325718b81d44,2023-06-26T18:54:56.827000
|
||||||
CVE-2023-32202,0,0,1f67a765cc23e7a134afa0ba5b2b97afa4766da027639f6264eb1fab6add382e,2023-09-05T14:52:21.310000
|
CVE-2023-32202,0,0,1f67a765cc23e7a134afa0ba5b2b97afa4766da027639f6264eb1fab6add382e,2023-09-05T14:52:21.310000
|
||||||
CVE-2023-32203,0,1,b30deb411ce03b79ace1c1f2260ff8c34e0fb165e85d8d2cf1c9d4e6a9c27f00,2024-11-20T16:15:19.177000
|
CVE-2023-32203,0,0,b30deb411ce03b79ace1c1f2260ff8c34e0fb165e85d8d2cf1c9d4e6a9c27f00,2024-11-20T16:15:19.177000
|
||||||
CVE-2023-32204,0,0,923d34247a22fa43752652a8e6565dd02d26c79829ae38a0bbcde5c196cbe27f,2023-11-21T01:57:53.810000
|
CVE-2023-32204,0,0,923d34247a22fa43752652a8e6565dd02d26c79829ae38a0bbcde5c196cbe27f,2023-11-21T01:57:53.810000
|
||||||
CVE-2023-32205,0,0,643575917471f1b5cbffd14ddb4fc3228daa8acb7feed06170823cc92de48491,2024-01-07T11:15:10.760000
|
CVE-2023-32205,0,0,643575917471f1b5cbffd14ddb4fc3228daa8acb7feed06170823cc92de48491,2024-01-07T11:15:10.760000
|
||||||
CVE-2023-32206,0,0,0d49b7a64d586d5113c17c6e188933356f355a11360378fcad9ef7cc54c4d0f1,2024-01-07T11:15:10.863000
|
CVE-2023-32206,0,0,0d49b7a64d586d5113c17c6e188933356f355a11360378fcad9ef7cc54c4d0f1,2024-01-07T11:15:10.863000
|
||||||
@ -224942,7 +224960,7 @@ CVE-2023-32535,0,0,058eeddf4545c11d3d626bba0b9655a727f877c461f2d33a6918c298313b3
|
|||||||
CVE-2023-32536,0,0,f1d672db7db2a60d1151dbc21f4283da728d1fb5f23a0b3ddaf4c9d446e7c230,2023-06-30T14:37:22.800000
|
CVE-2023-32536,0,0,f1d672db7db2a60d1151dbc21f4283da728d1fb5f23a0b3ddaf4c9d446e7c230,2023-06-30T14:37:22.800000
|
||||||
CVE-2023-32537,0,0,ed0eb84ee80503673e72c5607d3fe3b283d2dc6762b5cc0326b227066cade4da,2023-06-30T14:37:11.727000
|
CVE-2023-32537,0,0,ed0eb84ee80503673e72c5607d3fe3b283d2dc6762b5cc0326b227066cade4da,2023-06-30T14:37:11.727000
|
||||||
CVE-2023-32538,0,0,7bb82e1843fd1202338191f7120f471bf404342b1eecb1489cfdb7d70aa56048,2023-06-27T20:50:08.593000
|
CVE-2023-32538,0,0,7bb82e1843fd1202338191f7120f471bf404342b1eecb1489cfdb7d70aa56048,2023-06-27T20:50:08.593000
|
||||||
CVE-2023-32539,0,1,3a343bf0657586ed1088a8501643f964464b8cc3c8d799afe90104a03337776c,2024-11-20T16:15:19.307000
|
CVE-2023-32539,0,0,3a343bf0657586ed1088a8501643f964464b8cc3c8d799afe90104a03337776c,2024-11-20T16:15:19.307000
|
||||||
CVE-2023-3254,0,0,df6ad2be08945f7087353835740034d3e8f51fc003178c286e6c89fd44070861,2023-11-07T04:18:21.350000
|
CVE-2023-3254,0,0,df6ad2be08945f7087353835740034d3e8f51fc003178c286e6c89fd44070861,2023-11-07T04:18:21.350000
|
||||||
CVE-2023-32540,0,0,fee7c3efac8d431719b8eab52758803b277e2727bc53d0d09846010d339808b5,2023-06-12T16:55:37.857000
|
CVE-2023-32540,0,0,fee7c3efac8d431719b8eab52758803b277e2727bc53d0d09846010d339808b5,2023-06-12T16:55:37.857000
|
||||||
CVE-2023-32541,0,0,d0ab6ff36ceda36233c5b111108f986737f48589d2e4e7bc8dc19fbd6e20b37f,2023-09-28T22:05:22.517000
|
CVE-2023-32541,0,0,d0ab6ff36ceda36233c5b111108f986737f48589d2e4e7bc8dc19fbd6e20b37f,2023-09-28T22:05:22.517000
|
||||||
@ -227133,7 +227151,7 @@ CVE-2023-35654,0,0,5ec0257719972615a54320d70abd4585860da16cb9145e7dd4cf2a9de0b38
|
|||||||
CVE-2023-35655,0,0,46ccfbda32de6d4aaa44064f160c4fe81117afbe213f242d2b419179ac9bae89,2023-10-14T01:44:43.167000
|
CVE-2023-35655,0,0,46ccfbda32de6d4aaa44064f160c4fe81117afbe213f242d2b419179ac9bae89,2023-10-14T01:44:43.167000
|
||||||
CVE-2023-35656,0,0,351408b3f3ce527e3e9ca146a71adca57765b10d14ffc2f2878145486a62e13f,2023-10-25T10:02:58.693000
|
CVE-2023-35656,0,0,351408b3f3ce527e3e9ca146a71adca57765b10d14ffc2f2878145486a62e13f,2023-10-25T10:02:58.693000
|
||||||
CVE-2023-35658,0,0,8bcf70abab563df9c5ba967b15bc341b1fdf6e9f2ec89ab41d871dfe9fd14b2f,2023-09-14T02:18:53.670000
|
CVE-2023-35658,0,0,8bcf70abab563df9c5ba967b15bc341b1fdf6e9f2ec89ab41d871dfe9fd14b2f,2023-09-14T02:18:53.670000
|
||||||
CVE-2023-35659,0,0,d6c763965b197bbfa521fda2c730e984064685d89916f1b70c7225487472804c,2024-11-19T18:31:32.413000
|
CVE-2023-35659,0,1,31170e6307be117b564d3fd5270e7a03d19c2b548298af8e23e6ce6a501467dd,2024-11-20T17:35:20.210000
|
||||||
CVE-2023-3566,0,0,c2dc7026e794fcf3036669dc6d7e1d3151b5648f6848d46c6c625fc93ddde6f5,2024-05-17T02:27:36.673000
|
CVE-2023-3566,0,0,c2dc7026e794fcf3036669dc6d7e1d3151b5648f6848d46c6c625fc93ddde6f5,2024-05-17T02:27:36.673000
|
||||||
CVE-2023-35660,0,0,486a712e4d0f56647a1f8028aec97638904ee0fb3391eb5df721854ed5551546,2023-10-18T01:42:58.543000
|
CVE-2023-35660,0,0,486a712e4d0f56647a1f8028aec97638904ee0fb3391eb5df721854ed5551546,2023-10-18T01:42:58.543000
|
||||||
CVE-2023-35661,0,0,92d005e666e4198e224998a5911b6ec28079a5f8101e9661c640419fbd2863da,2023-10-18T01:45:44.173000
|
CVE-2023-35661,0,0,92d005e666e4198e224998a5911b6ec28079a5f8101e9661c640419fbd2863da,2023-10-18T01:45:44.173000
|
||||||
@ -227160,7 +227178,7 @@ CVE-2023-35681,0,0,2603f8896e8c125b6797dbd02195d63673d6f51724707bcecf3de29ee5bd3
|
|||||||
CVE-2023-35682,0,0,8e5be0df20127646df0c428d0877b5f6025db53a632750e4d83bce87d34712e9,2023-09-13T14:39:22.120000
|
CVE-2023-35682,0,0,8e5be0df20127646df0c428d0877b5f6025db53a632750e4d83bce87d34712e9,2023-09-13T14:39:22.120000
|
||||||
CVE-2023-35683,0,0,5a67cee00f3de3a526dd990d465ec70cca53419801a3d26ae9d8d814db70f2e8,2023-09-14T02:00:12.517000
|
CVE-2023-35683,0,0,5a67cee00f3de3a526dd990d465ec70cca53419801a3d26ae9d8d814db70f2e8,2023-09-14T02:00:12.517000
|
||||||
CVE-2023-35684,0,0,09ccb465b40d0eb68fba17fcdf270a630f7753abe8e6c5c89ccedcd22bd9e51b,2023-09-14T02:02:15.467000
|
CVE-2023-35684,0,0,09ccb465b40d0eb68fba17fcdf270a630f7753abe8e6c5c89ccedcd22bd9e51b,2023-09-14T02:02:15.467000
|
||||||
CVE-2023-35686,0,0,5187321de8af0ba11aaa76804a082d7cef6a77a2be480cbee2a52733235276db,2024-11-19T18:09:16.243000
|
CVE-2023-35686,0,1,34617fa54ac067d67ae07ae5ad3d4a38c50027007110f600a134e523b8321b8c,2024-11-20T17:35:20.610000
|
||||||
CVE-2023-35687,0,0,c28e4b6a4d942f40e08b784a20dfc07c8f0fcc8f7236ef7809c0123c392aa182,2023-09-14T02:03:49.147000
|
CVE-2023-35687,0,0,c28e4b6a4d942f40e08b784a20dfc07c8f0fcc8f7236ef7809c0123c392aa182,2023-09-14T02:03:49.147000
|
||||||
CVE-2023-35689,0,0,c77c9e7a23c05ba829d34db48953b7d9e346df1f83dfb61e4b82c0b286c3749f,2023-08-22T01:10:41.940000
|
CVE-2023-35689,0,0,c77c9e7a23c05ba829d34db48953b7d9e346df1f83dfb61e4b82c0b286c3749f,2023-08-22T01:10:41.940000
|
||||||
CVE-2023-3569,0,0,5a78514f93a9c1a429d4db50f2959ea2876b105709fb83ffa2f2296def39f506,2023-08-14T19:15:13.793000
|
CVE-2023-3569,0,0,5a78514f93a9c1a429d4db50f2959ea2876b105709fb83ffa2f2296def39f506,2023-08-14T19:15:13.793000
|
||||||
@ -235796,7 +235814,7 @@ CVE-2023-47249,0,0,61aae9bac2ccc907d28da4b6b616b00686bd3325bfdc033118e8ed844dda5
|
|||||||
CVE-2023-4725,0,0,1174602c352b76ffc854c95099185c4b198c6993aa8c625a78d2a38905a3b519,2023-11-07T04:22:54.047000
|
CVE-2023-4725,0,0,1174602c352b76ffc854c95099185c4b198c6993aa8c625a78d2a38905a3b519,2023-11-07T04:22:54.047000
|
||||||
CVE-2023-47250,0,0,5bef24162cc3d9b226047adc1ebe914948b1d0069ffbc35a63a6c49e77cb219b,2023-11-30T20:55:39.480000
|
CVE-2023-47250,0,0,5bef24162cc3d9b226047adc1ebe914948b1d0069ffbc35a63a6c49e77cb219b,2023-11-30T20:55:39.480000
|
||||||
CVE-2023-47251,0,0,3f45c0ce5eefd1d79487e5113dbe48ac5f81193341547757a5b32c16c4395937,2023-11-30T20:49:57.593000
|
CVE-2023-47251,0,0,3f45c0ce5eefd1d79487e5113dbe48ac5f81193341547757a5b32c16c4395937,2023-11-30T20:49:57.593000
|
||||||
CVE-2023-47252,0,1,b6c98da65de957145385704404718229c547edee13a89cfc858f16b5a2153ab8,2024-11-20T16:35:15.083000
|
CVE-2023-47252,0,0,b6c98da65de957145385704404718229c547edee13a89cfc858f16b5a2153ab8,2024-11-20T16:35:15.083000
|
||||||
CVE-2023-47253,0,0,fc84329d82e498ae994af02dcaa574e10c189b51d5bb4420e6dc690118399185,2024-09-05T20:35:13.773000
|
CVE-2023-47253,0,0,fc84329d82e498ae994af02dcaa574e10c189b51d5bb4420e6dc690118399185,2024-09-05T20:35:13.773000
|
||||||
CVE-2023-47254,0,0,e86e1f0c274ee09b6e8033be3fda315cae0e0dc7742578f0294843357e11f24a,2023-12-12T22:33:48.820000
|
CVE-2023-47254,0,0,e86e1f0c274ee09b6e8033be3fda315cae0e0dc7742578f0294843357e11f24a,2023-12-12T22:33:48.820000
|
||||||
CVE-2023-47256,0,0,7f49f7889918f7310aac05fd492c0ecdcf70947685b6f4a6783f989c355e44c5,2024-02-15T07:15:08.250000
|
CVE-2023-47256,0,0,7f49f7889918f7310aac05fd492c0ecdcf70947685b6f4a6783f989c355e44c5,2024-02-15T07:15:08.250000
|
||||||
@ -238025,7 +238043,7 @@ CVE-2023-50429,0,0,cf7c3990876d34813be7786260b9d58e3f0ef74bfa3057d97d875c61dd198
|
|||||||
CVE-2023-5043,0,0,24549f6a594c400161517cb178315694a2db415c3b53eae682adf0618aa705bf,2024-03-07T17:15:11.983000
|
CVE-2023-5043,0,0,24549f6a594c400161517cb178315694a2db415c3b53eae682adf0618aa705bf,2024-03-07T17:15:11.983000
|
||||||
CVE-2023-50430,0,0,2b4176ddd3b9eebfdb3313b53fe15bfa66cbccd2433967b694198d372f0d10e8,2023-12-13T19:10:39.247000
|
CVE-2023-50430,0,0,2b4176ddd3b9eebfdb3313b53fe15bfa66cbccd2433967b694198d372f0d10e8,2023-12-13T19:10:39.247000
|
||||||
CVE-2023-50431,0,0,ce67465e9f1496f406cce0377694b14ad4509f4122055381a78462991a530b3a,2024-03-25T01:15:54.980000
|
CVE-2023-50431,0,0,ce67465e9f1496f406cce0377694b14ad4509f4122055381a78462991a530b3a,2024-03-25T01:15:54.980000
|
||||||
CVE-2023-50432,0,1,fa0faddbcef16c5d56a3eb34928fe586c89c5e2a3d1bedf687e91bd5cde3a33a,2024-11-20T16:35:16.027000
|
CVE-2023-50432,0,0,fa0faddbcef16c5d56a3eb34928fe586c89c5e2a3d1bedf687e91bd5cde3a33a,2024-11-20T16:35:16.027000
|
||||||
CVE-2023-50433,0,0,1236cb1d1900890c10f0cec86536128d745a880515430cbaebcfc664a41166fd,2024-11-01T20:35:02.620000
|
CVE-2023-50433,0,0,1236cb1d1900890c10f0cec86536128d745a880515430cbaebcfc664a41166fd,2024-11-01T20:35:02.620000
|
||||||
CVE-2023-50434,0,0,dcae0085efa2a160f35308b2cfed9a6c4c97f96728c51d0e99c64b121bad7ee3,2024-08-01T13:45:24.853000
|
CVE-2023-50434,0,0,dcae0085efa2a160f35308b2cfed9a6c4c97f96728c51d0e99c64b121bad7ee3,2024-08-01T13:45:24.853000
|
||||||
CVE-2023-50436,0,0,ae24d4384178993c11802f29b1b73d6ccd72915a5daa0b3c8c1118e509cedd1f,2024-11-14T20:35:08.293000
|
CVE-2023-50436,0,0,ae24d4384178993c11802f29b1b73d6ccd72915a5daa0b3c8c1118e509cedd1f,2024-11-14T20:35:08.293000
|
||||||
@ -242634,7 +242652,7 @@ CVE-2024-1009,0,0,97af4237278897e4de60a52c929ac5642d8b709167b278dc1af6a70d4d177e
|
|||||||
CVE-2024-10091,0,0,d0b808b13e4ac8a1cdb029b434d2f58c9a91ce65332255a3523a2d40d54e2bbc,2024-10-28T13:58:09.230000
|
CVE-2024-10091,0,0,d0b808b13e4ac8a1cdb029b434d2f58c9a91ce65332255a3523a2d40d54e2bbc,2024-10-28T13:58:09.230000
|
||||||
CVE-2024-10092,0,0,96aeeb96773a5c0a6e4e68b9196f2f369ac89a58107c1085bc8eadc272cfbb94,2024-10-28T13:58:09.230000
|
CVE-2024-10092,0,0,96aeeb96773a5c0a6e4e68b9196f2f369ac89a58107c1085bc8eadc272cfbb94,2024-10-28T13:58:09.230000
|
||||||
CVE-2024-10093,0,0,94a330c294b313c7705272073b44baeb2e1acc1449e78c4e0c252c7b91c53316,2024-11-01T18:07:07.003000
|
CVE-2024-10093,0,0,94a330c294b313c7705272073b44baeb2e1acc1449e78c4e0c252c7b91c53316,2024-11-01T18:07:07.003000
|
||||||
CVE-2024-10094,1,1,2c3da037f182f21a4a0074bb8362ed9f4ab466b113f58753148359eb49c48394,2024-11-20T15:15:08.083000
|
CVE-2024-10094,0,0,2c3da037f182f21a4a0074bb8362ed9f4ab466b113f58753148359eb49c48394,2024-11-20T15:15:08.083000
|
||||||
CVE-2024-10097,0,0,ebed9ad10c7a648598c4572f4800c95ee8b1505f542b8454e9698f3995387b9d,2024-11-06T19:14:22.817000
|
CVE-2024-10097,0,0,ebed9ad10c7a648598c4572f4800c95ee8b1505f542b8454e9698f3995387b9d,2024-11-06T19:14:22.817000
|
||||||
CVE-2024-10099,0,0,f14bdb99d2ca7956ea9400330266332303014dc510bc6e629dc22733e615abb6,2024-10-21T21:03:53.647000
|
CVE-2024-10099,0,0,f14bdb99d2ca7956ea9400330266332303014dc510bc6e629dc22733e615abb6,2024-10-21T21:03:53.647000
|
||||||
CVE-2024-1010,0,0,b9c2292e551f86bb732084025c958f6307d4b05614efbc31206ace678efe61b8,2024-05-17T02:35:09.883000
|
CVE-2024-1010,0,0,b9c2292e551f86bb732084025c958f6307d4b05614efbc31206ace678efe61b8,2024-05-17T02:35:09.883000
|
||||||
@ -242845,7 +242863,7 @@ CVE-2024-10379,0,0,214be4d491421db3527c631a39011912a259f53e90e222f386f0e0be59c25
|
|||||||
CVE-2024-1038,0,0,c7b47d6608546def6f3304631405edc76ac6151bae95644217fe0b19e7498b5e,2024-03-13T18:16:18.563000
|
CVE-2024-1038,0,0,c7b47d6608546def6f3304631405edc76ac6151bae95644217fe0b19e7498b5e,2024-03-13T18:16:18.563000
|
||||||
CVE-2024-10380,0,0,251c7695ebdffe14f2a561bb3be22f7946019d2ec5c5cf9081e853969f1037dd,2024-11-01T16:11:00.217000
|
CVE-2024-10380,0,0,251c7695ebdffe14f2a561bb3be22f7946019d2ec5c5cf9081e853969f1037dd,2024-11-01T16:11:00.217000
|
||||||
CVE-2024-10381,0,0,c0308fe75631e6e478c4bb91d489e96b1c2dde80a7b938a5a315dee1135c5bea,2024-11-14T21:44:53.280000
|
CVE-2024-10381,0,0,c0308fe75631e6e478c4bb91d489e96b1c2dde80a7b938a5a315dee1135c5bea,2024-11-14T21:44:53.280000
|
||||||
CVE-2024-10382,0,0,93ad4e5d158f8a5b418f3ca0d0badac34bde469f4309d8aa47291799d978870e,2024-11-20T11:15:04.280000
|
CVE-2024-10382,0,1,6cb5ff8e8fbaf6d99ec6d0369d0950b2bb65417500c51e58719c4fb1a4cfecd9,2024-11-20T17:35:22.073000
|
||||||
CVE-2024-10386,0,0,92094aeb70b25026044a453c13f522af4eb391b2229044481dc021518acdc439,2024-11-05T20:07:59.487000
|
CVE-2024-10386,0,0,92094aeb70b25026044a453c13f522af4eb391b2229044481dc021518acdc439,2024-11-05T20:07:59.487000
|
||||||
CVE-2024-10387,0,0,5a1f42d28f618e614b5301c0b94be55a535432bf7194e0692256ccf6aa332018,2024-11-05T20:05:55.323000
|
CVE-2024-10387,0,0,5a1f42d28f618e614b5301c0b94be55a535432bf7194e0692256ccf6aa332018,2024-11-05T20:05:55.323000
|
||||||
CVE-2024-10388,0,0,baa860af3611995aa3b48c2ac11975f858a05164ea5f5d56cfe1775a5d194758,2024-11-19T21:57:32.967000
|
CVE-2024-10388,0,0,baa860af3611995aa3b48c2ac11975f858a05164ea5f5d56cfe1775a5d194758,2024-11-19T21:57:32.967000
|
||||||
@ -242944,7 +242962,7 @@ CVE-2024-10507,0,0,f18494a65f96198598cd9275318405539a3d8636ddbe0a37967ba2288eae0
|
|||||||
CVE-2024-10508,0,0,af9f95e5d7d630b3cf33e7ae9f2d3118be1f7da09e31e6491ee65e4e58c1137c,2024-11-12T13:56:24.513000
|
CVE-2024-10508,0,0,af9f95e5d7d630b3cf33e7ae9f2d3118be1f7da09e31e6491ee65e4e58c1137c,2024-11-12T13:56:24.513000
|
||||||
CVE-2024-10509,0,0,a9d05e50f1563ceed5339878fa8c2329eea9e28284f4c0c86984d14b77803f94,2024-11-01T20:52:15.573000
|
CVE-2024-10509,0,0,a9d05e50f1563ceed5339878fa8c2329eea9e28284f4c0c86984d14b77803f94,2024-11-01T20:52:15.573000
|
||||||
CVE-2024-1051,0,0,301df872c002365b13eaea34d02a8084366516306d472e0b862c9b6067f5d33d,2024-04-01T01:12:59.077000
|
CVE-2024-1051,0,0,301df872c002365b13eaea34d02a8084366516306d472e0b862c9b6067f5d33d,2024-04-01T01:12:59.077000
|
||||||
CVE-2024-10515,0,1,907400a34dad51b072b2c37123f6c966421eb7a65eb80907a16cb7d23ffaf400,2024-11-20T16:35:17.020000
|
CVE-2024-10515,0,0,907400a34dad51b072b2c37123f6c966421eb7a65eb80907a16cb7d23ffaf400,2024-11-20T16:35:17.020000
|
||||||
CVE-2024-1052,0,0,2826dc83bebd9032f48348a63ffd25025c2a6126abd483892ed79004a77aef0f,2024-02-15T18:49:40.180000
|
CVE-2024-1052,0,0,2826dc83bebd9032f48348a63ffd25025c2a6126abd483892ed79004a77aef0f,2024-02-15T18:49:40.180000
|
||||||
CVE-2024-10520,0,0,5acdd0c5659959d9ac18fb296c8b0ca775c2f72b2836f5d69fce1935ac3f49b0,2024-11-20T12:15:18.390000
|
CVE-2024-10520,0,0,5acdd0c5659959d9ac18fb296c8b0ca775c2f72b2836f5d69fce1935ac3f49b0,2024-11-20T12:15:18.390000
|
||||||
CVE-2024-10523,0,0,a761a52195ca091ecc100fefe31fd4eadda4d831fe94860e2a159923b6d0d68d,2024-11-08T15:14:30.070000
|
CVE-2024-10523,0,0,a761a52195ca091ecc100fefe31fd4eadda4d831fe94860e2a159923b6d0d68d,2024-11-08T15:14:30.070000
|
||||||
@ -243137,7 +243155,7 @@ CVE-2024-10816,0,0,e858f5d61a9a9365d35b4f1632e08232437088d807fd2da2fd482099073bf
|
|||||||
CVE-2024-1082,0,0,1a3a3ef85a9a06621291f657b27812f6a6be683bc843b0137ba9e53485eee330,2024-10-17T15:46:44.327000
|
CVE-2024-1082,0,0,1a3a3ef85a9a06621291f657b27812f6a6be683bc843b0137ba9e53485eee330,2024-10-17T15:46:44.327000
|
||||||
CVE-2024-10820,0,0,0566121beaf22d29f7b00a50f1224a8b7f80629efb106b01b93307bb617c146c,2024-11-19T17:38:16.363000
|
CVE-2024-10820,0,0,0566121beaf22d29f7b00a50f1224a8b7f80629efb106b01b93307bb617c146c,2024-11-19T17:38:16.363000
|
||||||
CVE-2024-10824,0,0,6eb650dcc5948040831c411456d27fae52cd783d32ad30faaf04938565b810b8,2024-11-08T19:01:03.880000
|
CVE-2024-10824,0,0,6eb650dcc5948040831c411456d27fae52cd783d32ad30faaf04938565b810b8,2024-11-08T19:01:03.880000
|
||||||
CVE-2024-10825,0,1,7ed8d1f6d2803d82be5c697a59d4862641f3db104b57c1ab607c40ebc10f9c43,2024-11-20T15:01:19.507000
|
CVE-2024-10825,0,0,7ed8d1f6d2803d82be5c697a59d4862641f3db104b57c1ab607c40ebc10f9c43,2024-11-20T15:01:19.507000
|
||||||
CVE-2024-10826,0,0,6aa37fdb16b5853a7b5472e25a8ac0220ff66e617581e203df39439d12ed70ca,2024-11-06T18:17:17.287000
|
CVE-2024-10826,0,0,6aa37fdb16b5853a7b5472e25a8ac0220ff66e617581e203df39439d12ed70ca,2024-11-06T18:17:17.287000
|
||||||
CVE-2024-10827,0,0,6577ad366fcac00efbf959f7905ba60a1d9c696b896b68d8b10d38d71dfd5e3b,2024-11-06T18:17:17.287000
|
CVE-2024-10827,0,0,6577ad366fcac00efbf959f7905ba60a1d9c696b896b68d8b10d38d71dfd5e3b,2024-11-06T18:17:17.287000
|
||||||
CVE-2024-10828,0,0,9da06f8abbfbcaacd480e3cb9360e183a4e68531d13b5b9c29e9ebf926bd00cf,2024-11-19T17:41:59.290000
|
CVE-2024-10828,0,0,9da06f8abbfbcaacd480e3cb9360e183a4e68531d13b5b9c29e9ebf926bd00cf,2024-11-19T17:41:59.290000
|
||||||
@ -243172,7 +243190,7 @@ CVE-2024-10884,0,0,af8d0f69b33cc9c8b5f395f0e60a6b7ec1fd0ec15994d8ada3cc1ff2f49e0
|
|||||||
CVE-2024-10887,0,0,6f1c620112f0531885feb58bf605da1bdf3e2be3ee69e7f92d5d01d446076f44,2024-11-13T17:01:16.850000
|
CVE-2024-10887,0,0,6f1c620112f0531885feb58bf605da1bdf3e2be3ee69e7f92d5d01d446076f44,2024-11-13T17:01:16.850000
|
||||||
CVE-2024-1089,0,0,9442709e929187c1b992d082c3eaeec9226480f80fc28198e3a73f4a684640d5,2024-02-29T13:49:29.390000
|
CVE-2024-1089,0,0,9442709e929187c1b992d082c3eaeec9226480f80fc28198e3a73f4a684640d5,2024-02-29T13:49:29.390000
|
||||||
CVE-2024-10891,0,0,75368c42ada2eff64310eb4f2bf04c277030b9ed62814601df628d2e55a629ad,2024-11-20T10:15:05.273000
|
CVE-2024-10891,0,0,75368c42ada2eff64310eb4f2bf04c277030b9ed62814601df628d2e55a629ad,2024-11-20T10:15:05.273000
|
||||||
CVE-2024-10897,0,1,5090338464622dc9d5ece2556a5b89ff3e6aa995d53aa797095eaa9a0db6f534,2024-11-20T16:09:16.643000
|
CVE-2024-10897,0,0,5090338464622dc9d5ece2556a5b89ff3e6aa995d53aa797095eaa9a0db6f534,2024-11-20T16:09:16.643000
|
||||||
CVE-2024-10899,0,0,4368cb3772d2f8c2a1f35ff550289018215916506b0b69e65d8983cd35dad906,2024-11-20T07:15:08.260000
|
CVE-2024-10899,0,0,4368cb3772d2f8c2a1f35ff550289018215916506b0b69e65d8983cd35dad906,2024-11-20T07:15:08.260000
|
||||||
CVE-2024-1090,0,0,2d0b80c82d6d153c4e0b5412c3fcf892da86ac73a72da4cbf84bfbb064bdcb0c,2024-02-29T13:49:29.390000
|
CVE-2024-1090,0,0,2d0b80c82d6d153c4e0b5412c3fcf892da86ac73a72da4cbf84bfbb064bdcb0c,2024-02-29T13:49:29.390000
|
||||||
CVE-2024-10900,0,0,f0a1068a03da92137242d5778d1db0773cba2fb63def13779ff35e3410d8f989,2024-11-20T07:15:08.690000
|
CVE-2024-10900,0,0,f0a1068a03da92137242d5778d1db0773cba2fb63def13779ff35e3410d8f989,2024-11-20T07:15:08.690000
|
||||||
@ -243288,6 +243306,7 @@ CVE-2024-11077,0,0,017b8d255e80754134e620d058a9d65876d81581be37ad0ebd6cdd417d3b7
|
|||||||
CVE-2024-11078,0,0,d133c6201a7de964272170f882ab0586a90d59fac96ab8e0ce223d3687fb9309,2024-11-12T13:55:21.227000
|
CVE-2024-11078,0,0,d133c6201a7de964272170f882ab0586a90d59fac96ab8e0ce223d3687fb9309,2024-11-12T13:55:21.227000
|
||||||
CVE-2024-11079,0,0,d1a710289b6254268300773c7c9b113893f43edc23893d87d06dbeefe81deb1d,2024-11-12T13:55:21.227000
|
CVE-2024-11079,0,0,d1a710289b6254268300773c7c9b113893f43edc23893d87d06dbeefe81deb1d,2024-11-12T13:55:21.227000
|
||||||
CVE-2024-1108,0,0,72e8aa7ee320c630f0cd3020b574b902dcf572a1d2888f0afb29692e74e18247,2024-02-22T19:07:37.840000
|
CVE-2024-1108,0,0,72e8aa7ee320c630f0cd3020b574b902dcf572a1d2888f0afb29692e74e18247,2024-02-22T19:07:37.840000
|
||||||
|
CVE-2024-11081,1,1,868ddada0bf262c198b91d0f6dc5cc082627c1fafb1bc6c0669f2cc02fb00c28,2024-11-20T18:15:22.340000
|
||||||
CVE-2024-11085,0,0,36aaba845c0a90c554661f4023115a3f46c67d2a691dfc21b49793447a4b6d8f,2024-11-18T17:11:17.393000
|
CVE-2024-11085,0,0,36aaba845c0a90c554661f4023115a3f46c67d2a691dfc21b49793447a4b6d8f,2024-11-18T17:11:17.393000
|
||||||
CVE-2024-11086,0,0,f4d7f35e95dad05e023fed49ac9e59da09a947f51bc79e0e10dc6b97e93d7482,2024-11-20T13:15:04.020000
|
CVE-2024-11086,0,0,f4d7f35e95dad05e023fed49ac9e59da09a947f51bc79e0e10dc6b97e93d7482,2024-11-20T13:15:04.020000
|
||||||
CVE-2024-1109,0,0,54a246b33f975a42367e7b2f8f64c59b5c20293302ad365ae743bbdf357522c9,2024-02-10T04:13:21.610000
|
CVE-2024-1109,0,0,54a246b33f975a42367e7b2f8f64c59b5c20293302ad365ae743bbdf357522c9,2024-02-10T04:13:21.610000
|
||||||
@ -243364,8 +243383,8 @@ CVE-2024-11237,0,0,9213e2a4eef9d88853d744219598c19b6ea93ab11d996277723bb7fe3b4da
|
|||||||
CVE-2024-11238,0,0,ce4db66c60999acd981d78df2e1b620167b9a91ec92fb71a2c401cfcff716486,2024-11-19T19:01:13.060000
|
CVE-2024-11238,0,0,ce4db66c60999acd981d78df2e1b620167b9a91ec92fb71a2c401cfcff716486,2024-11-19T19:01:13.060000
|
||||||
CVE-2024-11239,0,0,aefb59a8cfc2086746090c1190902046658072a530e6347767791876e7172fb6,2024-11-19T19:00:43.230000
|
CVE-2024-11239,0,0,aefb59a8cfc2086746090c1190902046658072a530e6347767791876e7172fb6,2024-11-19T19:00:43.230000
|
||||||
CVE-2024-1124,0,0,913ac2351f43d83be68411d873bf568715eb455fa7fe6219a9189bc1238726a9,2024-03-11T01:32:39.697000
|
CVE-2024-1124,0,0,913ac2351f43d83be68411d873bf568715eb455fa7fe6219a9189bc1238726a9,2024-03-11T01:32:39.697000
|
||||||
CVE-2024-11240,0,1,3ba578cb5471b3347c2ba7445ad733fff4562786b84385be246158221344c331,2024-11-20T15:09:05.640000
|
CVE-2024-11240,0,0,3ba578cb5471b3347c2ba7445ad733fff4562786b84385be246158221344c331,2024-11-20T15:09:05.640000
|
||||||
CVE-2024-11241,0,1,871e66d1f90e93c0401c42d346ab079795e0a18eb583e0af35ae18467e55be69,2024-11-20T15:41:34.393000
|
CVE-2024-11241,0,0,871e66d1f90e93c0401c42d346ab079795e0a18eb583e0af35ae18467e55be69,2024-11-20T15:41:34.393000
|
||||||
CVE-2024-11242,0,0,1118fbe40870c73d892fa7961109d02efc9eea6f6992fd659082a2270dd53e3e,2024-11-18T17:11:56.587000
|
CVE-2024-11242,0,0,1118fbe40870c73d892fa7961109d02efc9eea6f6992fd659082a2270dd53e3e,2024-11-18T17:11:56.587000
|
||||||
CVE-2024-11243,0,0,0ff1388c8ef64f270cffe8331915ccacdb089ce7746995fcf71ad3772e821364,2024-11-18T17:11:56.587000
|
CVE-2024-11243,0,0,0ff1388c8ef64f270cffe8331915ccacdb089ce7746995fcf71ad3772e821364,2024-11-18T17:11:56.587000
|
||||||
CVE-2024-11244,0,0,a10509bbd4fa7611874cdfc9b96d4cded99faa29683a34e350fd40f4b0d3b846,2024-11-20T14:36:24.190000
|
CVE-2024-11244,0,0,a10509bbd4fa7611874cdfc9b96d4cded99faa29683a34e350fd40f4b0d3b846,2024-11-20T14:36:24.190000
|
||||||
@ -243394,14 +243413,14 @@ CVE-2024-11303,0,0,9a7b9cae0b372cb4b98a9231cfc4f16e7c249eea5ffb75fac7627cc81c794
|
|||||||
CVE-2024-11304,0,0,22a6a21de6b849517c1b7fe4848b5ad6f5a6501b987b4e9deeeaa72b581b93e9,2024-11-18T17:11:17.393000
|
CVE-2024-11304,0,0,22a6a21de6b849517c1b7fe4848b5ad6f5a6501b987b4e9deeeaa72b581b93e9,2024-11-18T17:11:17.393000
|
||||||
CVE-2024-11305,0,0,84bf85793dd2f7e730f28343594540d39fad7d3215d7e392bc21ef5e70fc3306,2024-11-18T17:11:17.393000
|
CVE-2024-11305,0,0,84bf85793dd2f7e730f28343594540d39fad7d3215d7e392bc21ef5e70fc3306,2024-11-18T17:11:17.393000
|
||||||
CVE-2024-11306,0,0,f96161b1705d1a04826829d256bacb8fbd4c72fb30642fc50a3d8ff6dcf71d2f,2024-11-18T17:11:17.393000
|
CVE-2024-11306,0,0,f96161b1705d1a04826829d256bacb8fbd4c72fb30642fc50a3d8ff6dcf71d2f,2024-11-18T17:11:17.393000
|
||||||
CVE-2024-11308,0,1,6ff9b67de84028aa7763ce5c2e8ff0aec72b200de48a58803396e8f36dec9d6f,2024-11-20T15:17:52.307000
|
CVE-2024-11308,0,0,6ff9b67de84028aa7763ce5c2e8ff0aec72b200de48a58803396e8f36dec9d6f,2024-11-20T15:17:52.307000
|
||||||
CVE-2024-11309,0,1,6e888424e9050c0accba703ff38a56cd409762a0858c79703ae7a989d309e3ea,2024-11-20T15:17:31.497000
|
CVE-2024-11309,0,0,6e888424e9050c0accba703ff38a56cd409762a0858c79703ae7a989d309e3ea,2024-11-20T15:17:31.497000
|
||||||
CVE-2024-11310,0,1,b8736457bbb6711cec3d3dbab8f9f0fd7e15d1cfb620ff3b79626c3336421894,2024-11-20T15:17:14.693000
|
CVE-2024-11310,0,0,b8736457bbb6711cec3d3dbab8f9f0fd7e15d1cfb620ff3b79626c3336421894,2024-11-20T15:17:14.693000
|
||||||
CVE-2024-11311,0,1,8863e400e8ba53ebce56483e3063dde3f1e183df672e0973ba20f57166cff956,2024-11-20T15:17:01.367000
|
CVE-2024-11311,0,0,8863e400e8ba53ebce56483e3063dde3f1e183df672e0973ba20f57166cff956,2024-11-20T15:17:01.367000
|
||||||
CVE-2024-11312,0,1,47c631428ee31ff974ee21755583eeecc572701cd5c627d74250c06df5188776,2024-11-20T15:16:50.943000
|
CVE-2024-11312,0,0,47c631428ee31ff974ee21755583eeecc572701cd5c627d74250c06df5188776,2024-11-20T15:16:50.943000
|
||||||
CVE-2024-11313,0,1,54cbfe18e9f9ec4cec89510df9ece23bf28d5a2015bcc6d7f6abc41521dde19a,2024-11-20T15:16:41.033000
|
CVE-2024-11313,0,0,54cbfe18e9f9ec4cec89510df9ece23bf28d5a2015bcc6d7f6abc41521dde19a,2024-11-20T15:16:41.033000
|
||||||
CVE-2024-11314,0,1,246dedf95548c9e98cc9b4c3a9d38990919f55537fa02d10de1bc950b9d7f7bc,2024-11-20T15:16:25.653000
|
CVE-2024-11314,0,0,246dedf95548c9e98cc9b4c3a9d38990919f55537fa02d10de1bc950b9d7f7bc,2024-11-20T15:16:25.653000
|
||||||
CVE-2024-11315,0,1,1e40368af4a59fc021b722b7bfa068a2b5cf4504701d2e4dd12e6291f7427d58,2024-11-20T15:16:14.550000
|
CVE-2024-11315,0,0,1e40368af4a59fc021b722b7bfa068a2b5cf4504701d2e4dd12e6291f7427d58,2024-11-20T15:16:14.550000
|
||||||
CVE-2024-11318,0,0,9febe7cf088687dfbeb6d2d8f74590e0f8059ffca33de9b68ad34437f87d2118,2024-11-18T17:11:17.393000
|
CVE-2024-11318,0,0,9febe7cf088687dfbeb6d2d8f74590e0f8059ffca33de9b68ad34437f87d2118,2024-11-18T17:11:17.393000
|
||||||
CVE-2024-11319,0,0,10049ab876319f9ecb08a7b21cc61880e37e90d0ecd4d79058dbd3eba0407f5e,2024-11-20T14:59:38.297000
|
CVE-2024-11319,0,0,10049ab876319f9ecb08a7b21cc61880e37e90d0ecd4d79058dbd3eba0407f5e,2024-11-20T14:59:38.297000
|
||||||
CVE-2024-1132,0,0,3de6e62885ac8497a4c1d8f4950ebedc171b13b33dfedd6a9eea9ae164fd993a,2024-07-03T01:45:01.507000
|
CVE-2024-1132,0,0,3de6e62885ac8497a4c1d8f4950ebedc171b13b33dfedd6a9eea9ae164fd993a,2024-07-03T01:45:01.507000
|
||||||
@ -243425,11 +243444,17 @@ CVE-2024-1145,0,0,fa713ba5e7e18de90151eee1a4726d9f9f0863a5fccb48575e3f29ec11b883
|
|||||||
CVE-2024-1146,0,0,c681ac136637104b7d43e23a49d30f381f11dad3f3f7ec48919504256a9e5b2a,2024-03-19T13:26:46
|
CVE-2024-1146,0,0,c681ac136637104b7d43e23a49d30f381f11dad3f3f7ec48919504256a9e5b2a,2024-03-19T13:26:46
|
||||||
CVE-2024-1147,0,0,5da69e40e8a720c3c3c366cde1a8363ffbcff6346e82168cfd4c7602d33328bd,2024-03-21T12:58:51.093000
|
CVE-2024-1147,0,0,5da69e40e8a720c3c3c366cde1a8363ffbcff6346e82168cfd4c7602d33328bd,2024-03-21T12:58:51.093000
|
||||||
CVE-2024-1148,0,0,55b3cfe72144d3f21629750ac052bc7072169844e3b194a6a00d557d611fa424,2024-03-21T12:58:51.093000
|
CVE-2024-1148,0,0,55b3cfe72144d3f21629750ac052bc7072169844e3b194a6a00d557d611fa424,2024-03-21T12:58:51.093000
|
||||||
CVE-2024-11484,1,1,3aa464aa114e9a16609d997b5976852f2e09e31f2772cc684ca98d8b57443e5b,2024-11-20T16:15:19.623000
|
CVE-2024-11484,0,0,3aa464aa114e9a16609d997b5976852f2e09e31f2772cc684ca98d8b57443e5b,2024-11-20T16:15:19.623000
|
||||||
CVE-2024-11485,1,1,06e5567ffff9bf5762cacb559e6f60057c15b345cd5b497e93c1b41dfe58bb98,2024-11-20T16:15:19.990000
|
CVE-2024-11485,0,0,06e5567ffff9bf5762cacb559e6f60057c15b345cd5b497e93c1b41dfe58bb98,2024-11-20T16:15:19.990000
|
||||||
CVE-2024-11486,1,1,7c15b276c5e10bb30088f41a466046358ea98a2439e6b7be46e2551e1312d436,2024-11-20T16:15:20.273000
|
CVE-2024-11486,0,0,7c15b276c5e10bb30088f41a466046358ea98a2439e6b7be46e2551e1312d436,2024-11-20T16:15:20.273000
|
||||||
CVE-2024-11487,1,1,4dc442ecc0e78fa6f11201dcdffd8036378dd9553b06e5d3bd37c1017aa4a005,2024-11-20T16:15:20.543000
|
CVE-2024-11487,0,0,4dc442ecc0e78fa6f11201dcdffd8036378dd9553b06e5d3bd37c1017aa4a005,2024-11-20T16:15:20.543000
|
||||||
|
CVE-2024-11488,1,1,34165f0c813abb9abfee75c83d1b1b40280912f4e239f105712914e94bd63ded,2024-11-20T17:15:14.097000
|
||||||
|
CVE-2024-11489,1,1,d049b5ca44808d39c4b7cf14a9c92d411e742ce240269b63810bd4e5434ce388,2024-11-20T17:15:14.847000
|
||||||
CVE-2024-1149,0,0,b02f2ba30bfd9b077afbf478cdb43cc9b464ca358abc4a5e9f7416d9d1b2fcff,2024-02-15T17:52:08.970000
|
CVE-2024-1149,0,0,b02f2ba30bfd9b077afbf478cdb43cc9b464ca358abc4a5e9f7416d9d1b2fcff,2024-02-15T17:52:08.970000
|
||||||
|
CVE-2024-11490,1,1,d294f3c38443dcd020e5ea017596df459d37913b92096d63a59a27081dd35077,2024-11-20T17:15:15.637000
|
||||||
|
CVE-2024-11491,1,1,02077d131042a2b8c0e7fccccde442b38220ee5d1826aa568f8f9e4b16f9ebb9,2024-11-20T17:15:16.397000
|
||||||
|
CVE-2024-11492,1,1,d4e1d6df577e501fd3b6a404785d87e1988a7abce6229191e4d8c1c008a388dc,2024-11-20T18:15:22.403000
|
||||||
|
CVE-2024-11493,1,1,296e3b8a96345bb7228b40375399765470fa3ea89cf10c3cfe96f69eb025afa1,2024-11-20T18:15:22.700000
|
||||||
CVE-2024-11494,0,0,5890d4fb88df3d8f55b6792aa5c18e107344b1b8b9d64b1485bac263c175d055,2024-11-20T10:15:05.920000
|
CVE-2024-11494,0,0,5890d4fb88df3d8f55b6792aa5c18e107344b1b8b9d64b1485bac263c175d055,2024-11-20T10:15:05.920000
|
||||||
CVE-2024-11495,0,0,79062961a6b5f76603192d58576bb23157ae662ae3c66c7b46038e4fdb4d0e00,2024-11-20T13:15:04.197000
|
CVE-2024-11495,0,0,79062961a6b5f76603192d58576bb23157ae662ae3c66c7b46038e4fdb4d0e00,2024-11-20T13:15:04.197000
|
||||||
CVE-2024-1150,0,0,b47a3c09b3a331a50594ab70df2061c7818f30992462806b6f5b7a310a00b60b,2024-02-15T17:42:08.113000
|
CVE-2024-1150,0,0,b47a3c09b3a331a50594ab70df2061c7818f30992462806b6f5b7a310a00b60b,2024-02-15T17:42:08.113000
|
||||||
@ -244658,14 +244683,14 @@ CVE-2024-20521,0,0,1256f22cccdc014ca7c6dcaf50cda0cfa20b26ee2ae968d316f808a9bafa0
|
|||||||
CVE-2024-20522,0,0,4751fc0b46eb3f3442a4302d9aa0da06e525e7320f0f9f33ce2b1091dde97b23,2024-10-08T13:48:19.060000
|
CVE-2024-20522,0,0,4751fc0b46eb3f3442a4302d9aa0da06e525e7320f0f9f33ce2b1091dde97b23,2024-10-08T13:48:19.060000
|
||||||
CVE-2024-20523,0,0,c7bf45998c89086dd758eb4d3eeb25d63406d90c0a145566280d2888a4fab120,2024-10-08T13:48:29.500000
|
CVE-2024-20523,0,0,c7bf45998c89086dd758eb4d3eeb25d63406d90c0a145566280d2888a4fab120,2024-10-08T13:48:29.500000
|
||||||
CVE-2024-20524,0,0,1ddae342fccf4faf6880cbe25cc035c1903428edec9e63909e1d89933e06b31e,2024-10-08T13:48:58.273000
|
CVE-2024-20524,0,0,1ddae342fccf4faf6880cbe25cc035c1903428edec9e63909e1d89933e06b31e,2024-10-08T13:48:58.273000
|
||||||
CVE-2024-20525,0,1,59dc4aba92abfcc2162ca7b3403ad6b4b9bb6aac36132511b6d9628b03b2cf8f,2024-11-20T16:54:28.817000
|
CVE-2024-20525,0,0,59dc4aba92abfcc2162ca7b3403ad6b4b9bb6aac36132511b6d9628b03b2cf8f,2024-11-20T16:54:28.817000
|
||||||
CVE-2024-20526,0,0,d5fdba07e116955c599b0e877c602ebb6ff11ffa39621c07ebd427a3890514dc,2024-10-31T01:08:26.047000
|
CVE-2024-20526,0,0,d5fdba07e116955c599b0e877c602ebb6ff11ffa39621c07ebd427a3890514dc,2024-10-31T01:08:26.047000
|
||||||
CVE-2024-20527,0,0,5b97cad145233ee1321aefca8fa73ee586d624b90987cf4c6ada4d285abb361e,2024-11-06T18:17:17.287000
|
CVE-2024-20527,0,0,5b97cad145233ee1321aefca8fa73ee586d624b90987cf4c6ada4d285abb361e,2024-11-06T18:17:17.287000
|
||||||
CVE-2024-20528,0,0,b3c3f841fc75125a5205a35ff3690af41e74ca1d30b8dfbe0ccd5e301de276b1,2024-11-06T18:17:17.287000
|
CVE-2024-20528,0,0,b3c3f841fc75125a5205a35ff3690af41e74ca1d30b8dfbe0ccd5e301de276b1,2024-11-06T18:17:17.287000
|
||||||
CVE-2024-20529,0,0,96076969e5241dc9fe05d14b6dc343ccece848b95762ec4c7d4c240c2fed43ff,2024-11-06T18:17:17.287000
|
CVE-2024-20529,0,0,96076969e5241dc9fe05d14b6dc343ccece848b95762ec4c7d4c240c2fed43ff,2024-11-06T18:17:17.287000
|
||||||
CVE-2024-2053,0,0,0d41c4e474c0960eb5e2399ded25845c51347c47ec843b53809f61d1e3d8fe3e,2024-08-06T15:35:13.397000
|
CVE-2024-2053,0,0,0d41c4e474c0960eb5e2399ded25845c51347c47ec843b53809f61d1e3d8fe3e,2024-08-06T15:35:13.397000
|
||||||
CVE-2024-20530,0,1,89f56ca3c78a2bee9efa6414cc4c34aaa02fa012a996513ec972d77798cf94f1,2024-11-20T16:50:11.577000
|
CVE-2024-20530,0,0,89f56ca3c78a2bee9efa6414cc4c34aaa02fa012a996513ec972d77798cf94f1,2024-11-20T16:50:11.577000
|
||||||
CVE-2024-20531,0,1,a1be4e70e21c2b78f27afc6cd1463a9bb057753e7415124d68f04116191b7ac2,2024-11-20T16:45:31.467000
|
CVE-2024-20531,0,0,a1be4e70e21c2b78f27afc6cd1463a9bb057753e7415124d68f04116191b7ac2,2024-11-20T16:45:31.467000
|
||||||
CVE-2024-20532,0,0,c5e3b86428a883a005ddfeab54408d38b0aa49969c41244793809439d0629a98,2024-11-06T18:17:17.287000
|
CVE-2024-20532,0,0,c5e3b86428a883a005ddfeab54408d38b0aa49969c41244793809439d0629a98,2024-11-06T18:17:17.287000
|
||||||
CVE-2024-20533,0,0,2d986cd55ad911e02b6bda820adc74cdaa2d545d64c7c4f647bb7a6457b580de,2024-11-06T18:17:17.287000
|
CVE-2024-20533,0,0,2d986cd55ad911e02b6bda820adc74cdaa2d545d64c7c4f647bb7a6457b580de,2024-11-06T18:17:17.287000
|
||||||
CVE-2024-20534,0,0,4f609adec9e97ecff790786fa44ffb0444b615de359923a987bca63ffbcafec7,2024-11-06T18:17:17.287000
|
CVE-2024-20534,0,0,4f609adec9e97ecff790786fa44ffb0444b615de359923a987bca63ffbcafec7,2024-11-06T18:17:17.287000
|
||||||
@ -245988,7 +246013,7 @@ CVE-2024-22062,0,0,cc06929fe5df33d033a09c6d5b184881dcbf0939fe62637d4555c345e1a11
|
|||||||
CVE-2024-22064,0,0,4ab6f1fd7aac8f5f705eb95fc6fb847518aebb95babd98d77adf15137fe26c27,2024-05-14T16:13:02.773000
|
CVE-2024-22064,0,0,4ab6f1fd7aac8f5f705eb95fc6fb847518aebb95babd98d77adf15137fe26c27,2024-05-14T16:13:02.773000
|
||||||
CVE-2024-22065,0,0,0787c7694397a7c698dcdd055072a6446d70ea428a21429fa1b1a63fb95542eb,2024-10-29T14:34:04.427000
|
CVE-2024-22065,0,0,0787c7694397a7c698dcdd055072a6446d70ea428a21429fa1b1a63fb95542eb,2024-10-29T14:34:04.427000
|
||||||
CVE-2024-22066,0,0,04a1f5193e3d1cd4c2ff5e8b00e85bd78f3fa88fdda81531a689089e114ff7c4,2024-11-08T14:31:32.933000
|
CVE-2024-22066,0,0,04a1f5193e3d1cd4c2ff5e8b00e85bd78f3fa88fdda81531a689089e114ff7c4,2024-11-08T14:31:32.933000
|
||||||
CVE-2024-22067,0,1,c456655c795b0e9f1a95ac9b229d8fa4cec627b3a45c315b13702051fa501216,2024-11-20T16:24:47.843000
|
CVE-2024-22067,0,0,c456655c795b0e9f1a95ac9b229d8fa4cec627b3a45c315b13702051fa501216,2024-11-20T16:24:47.843000
|
||||||
CVE-2024-22068,0,0,0d00619c52fbf410991eb6fb75db8e695c1b871ad9ed5a9a9a67d1976582dc23,2024-10-10T12:51:56.987000
|
CVE-2024-22068,0,0,0d00619c52fbf410991eb6fb75db8e695c1b871ad9ed5a9a9a67d1976582dc23,2024-10-10T12:51:56.987000
|
||||||
CVE-2024-22069,0,0,4264d807f7b5f6c2c545419e352dc9886522b6dff10818d72b9f5fb46c144466,2024-08-20T17:22:39.500000
|
CVE-2024-22069,0,0,4264d807f7b5f6c2c545419e352dc9886522b6dff10818d72b9f5fb46c144466,2024-08-20T17:22:39.500000
|
||||||
CVE-2024-2207,0,0,8ee5e243bdeb55079a285867c41b1d92102261a83307cfe5423cbfee70a33969,2024-11-13T17:01:16.850000
|
CVE-2024-2207,0,0,8ee5e243bdeb55079a285867c41b1d92102261a83307cfe5423cbfee70a33969,2024-11-13T17:01:16.850000
|
||||||
@ -246706,7 +246731,7 @@ CVE-2024-23198,0,0,21e5938f4d74c8281bf8790da1b84875167859241f1d6235396b8f1f5665d
|
|||||||
CVE-2024-23201,0,0,2015a286fe1ca1d8b9078d39d11c89a41b6be37be9d18a49416dd892d150a982,2024-11-01T15:35:09.553000
|
CVE-2024-23201,0,0,2015a286fe1ca1d8b9078d39d11c89a41b6be37be9d18a49416dd892d150a982,2024-11-01T15:35:09.553000
|
||||||
CVE-2024-23203,0,0,35efc69ad503e337d3e396ab83791d4158b674a366899f0534bda8815d3c1835,2024-03-13T22:15:09.117000
|
CVE-2024-23203,0,0,35efc69ad503e337d3e396ab83791d4158b674a366899f0534bda8815d3c1835,2024-03-13T22:15:09.117000
|
||||||
CVE-2024-23204,0,0,afae0f8b3e19ab8973af8b7a3b489e4bd91d0fdadf5faf2aa71183f3a9158566,2024-03-13T23:15:45.887000
|
CVE-2024-23204,0,0,afae0f8b3e19ab8973af8b7a3b489e4bd91d0fdadf5faf2aa71183f3a9158566,2024-03-13T23:15:45.887000
|
||||||
CVE-2024-23205,0,1,4697a73bf9bc3e8ddfb255725f1c8d01e58d660cc4bf4e35d026b49c729dc759,2024-11-20T16:35:17.937000
|
CVE-2024-23205,0,0,4697a73bf9bc3e8ddfb255725f1c8d01e58d660cc4bf4e35d026b49c729dc759,2024-11-20T16:35:17.937000
|
||||||
CVE-2024-23206,0,0,507c84e2d0e52cafc2157e9d16706cbde18b562da92731ec0900997e5c935fac,2024-06-12T10:15:29.787000
|
CVE-2024-23206,0,0,507c84e2d0e52cafc2157e9d16706cbde18b562da92731ec0900997e5c935fac,2024-06-12T10:15:29.787000
|
||||||
CVE-2024-23207,0,0,3409f59ce48ebab075a426e39ec672741159cf18513a93ddf138321de73422df,2024-01-26T21:23:37.840000
|
CVE-2024-23207,0,0,3409f59ce48ebab075a426e39ec672741159cf18513a93ddf138321de73422df,2024-01-26T21:23:37.840000
|
||||||
CVE-2024-23208,0,0,fb50bbc6e7452dfc70caf10aadd5a5063e9a046d2405a71df1d4be3aec2b5c7e,2024-10-21T11:35:04.960000
|
CVE-2024-23208,0,0,fb50bbc6e7452dfc70caf10aadd5a5063e9a046d2405a71df1d4be3aec2b5c7e,2024-10-21T11:35:04.960000
|
||||||
@ -246784,7 +246809,7 @@ CVE-2024-23275,0,0,2c9c1f4d2ca81860bcf12d49a2478f6772035d6cdcedc7473a9a2bfb8f8df
|
|||||||
CVE-2024-23276,0,0,b7fa000b367d55e31a4b1c9fd4a1f238256bf2545a07d5e4a633de96f48c7a44,2024-08-28T16:35:09.187000
|
CVE-2024-23276,0,0,b7fa000b367d55e31a4b1c9fd4a1f238256bf2545a07d5e4a633de96f48c7a44,2024-08-28T16:35:09.187000
|
||||||
CVE-2024-23277,0,0,329d44f192e6d8ad64377bfea1b406324a89ddf322f5987758a35ef433724dec,2024-03-14T20:34:31.303000
|
CVE-2024-23277,0,0,329d44f192e6d8ad64377bfea1b406324a89ddf322f5987758a35ef433724dec,2024-03-14T20:34:31.303000
|
||||||
CVE-2024-23278,0,0,766bded776e256695874796c761a698226a698abed559def31f9f418b44fbd0e,2024-08-01T13:47:14.363000
|
CVE-2024-23278,0,0,766bded776e256695874796c761a698226a698abed559def31f9f418b44fbd0e,2024-08-01T13:47:14.363000
|
||||||
CVE-2024-23279,0,0,04cf6340eed14797588fb60b9db6f98aa22f7faf3625a9866457c3db2729515d,2024-03-13T21:15:58.063000
|
CVE-2024-23279,0,1,0cfac59bec6198ae482efa1723b7740dc16ed21f2d64facdb2439aacd6044ab3,2024-11-20T17:35:23.370000
|
||||||
CVE-2024-2328,0,0,db4dcfea63581146a34d92e0d3290b1bf593c898de5919596eb70f461d745708,2024-05-02T18:00:37.360000
|
CVE-2024-2328,0,0,db4dcfea63581146a34d92e0d3290b1bf593c898de5919596eb70f461d745708,2024-05-02T18:00:37.360000
|
||||||
CVE-2024-23280,0,0,ddc6f40a9de9d3a8d8165b26792d447c58ff17ce75e5f106261376a7c5e4a9e1,2024-10-31T17:35:02.803000
|
CVE-2024-23280,0,0,ddc6f40a9de9d3a8d8165b26792d447c58ff17ce75e5f106261376a7c5e4a9e1,2024-10-31T17:35:02.803000
|
||||||
CVE-2024-23281,0,0,4fecacd73d888b14029108fc1accb8e172c50322968d3c217d22a97f8374b808,2024-11-05T22:35:03.703000
|
CVE-2024-23281,0,0,4fecacd73d888b14029108fc1accb8e172c50322968d3c217d22a97f8374b808,2024-11-05T22:35:03.703000
|
||||||
@ -247017,7 +247042,7 @@ CVE-2024-23559,0,0,1cfe950943db323f850a4ffa6fa09a9e594439fd864c25048ffda399bb0b3
|
|||||||
CVE-2024-23560,0,0,611d6f496e671cc0d1d356211a118fce6e543142f0a1a253e80e1a53fcc9dde1,2024-11-06T22:35:04.240000
|
CVE-2024-23560,0,0,611d6f496e671cc0d1d356211a118fce6e543142f0a1a253e80e1a53fcc9dde1,2024-11-06T22:35:04.240000
|
||||||
CVE-2024-23561,0,0,05ce6bff2b3c083c40d1cefd8ecfe83b9e8bac92f3576a18d3243c6c46e3bef3,2024-11-04T22:35:03.360000
|
CVE-2024-23561,0,0,05ce6bff2b3c083c40d1cefd8ecfe83b9e8bac92f3576a18d3243c6c46e3bef3,2024-11-04T22:35:03.360000
|
||||||
CVE-2024-23562,0,0,4d517ea8a2763e5506a865d21e69db429e3d16d2d215329e0568829328a2181b,2024-10-23T23:15:12.397000
|
CVE-2024-23562,0,0,4d517ea8a2763e5506a865d21e69db429e3d16d2d215329e0568829328a2181b,2024-10-23T23:15:12.397000
|
||||||
CVE-2024-2357,0,0,58f4675a1a89325da5d3ee44283ebc42e89a0cdd69475172a4baac455a4ffac1,2024-03-23T03:15:12.690000
|
CVE-2024-2357,0,1,047100f7d23f6fc4c73eb91b24ba51665a90b521f0f43784e71468339885fec0,2024-11-20T18:35:19.917000
|
||||||
CVE-2024-23576,0,0,adfa1bbd41df2580fc9b0c7a87cd6221bc650972fa1b63f1cdf4b78644242d49,2024-08-01T16:35:05.990000
|
CVE-2024-23576,0,0,adfa1bbd41df2580fc9b0c7a87cd6221bc650972fa1b63f1cdf4b78644242d49,2024-08-01T16:35:05.990000
|
||||||
CVE-2024-23579,0,0,c21892456c22f0f232ec5c1ceee77db91725955ceae3295921c8e393b52d9988,2024-07-03T01:47:55.687000
|
CVE-2024-23579,0,0,c21892456c22f0f232ec5c1ceee77db91725955ceae3295921c8e393b52d9988,2024-07-03T01:47:55.687000
|
||||||
CVE-2024-2358,0,0,6f4feaa02ea37cd82e67534651d9f0b2cdac6734cb6d67d953e75bc77e24ca55,2024-05-16T13:03:05.353000
|
CVE-2024-2358,0,0,6f4feaa02ea37cd82e67534651d9f0b2cdac6734cb6d67d953e75bc77e24ca55,2024-05-16T13:03:05.353000
|
||||||
@ -247146,7 +247171,7 @@ CVE-2024-23710,0,0,bd7284af235de5db2fd51076f2026e0e8319c2a15e9eab609541ac6fe582c
|
|||||||
CVE-2024-23711,0,0,3b2f25c3bfdf9a198d84e7ce79a3c5bc71465fc8bd3a9e12aa99c3c94a4d9db4,2024-07-11T15:05:25.990000
|
CVE-2024-23711,0,0,3b2f25c3bfdf9a198d84e7ce79a3c5bc71465fc8bd3a9e12aa99c3c94a4d9db4,2024-07-11T15:05:25.990000
|
||||||
CVE-2024-23712,0,0,99a9a0e98f6ec74442cc23ab4a592b5612be30e655f849926f8cbd43d464cc6c,2024-07-03T01:48:04.970000
|
CVE-2024-23712,0,0,99a9a0e98f6ec74442cc23ab4a592b5612be30e655f849926f8cbd43d464cc6c,2024-07-03T01:48:04.970000
|
||||||
CVE-2024-23713,0,0,84ac23a9c686e595929bab4dad7b08bca80d94f5a0dad54d418e0bd955964876,2024-07-03T01:48:05.220000
|
CVE-2024-23713,0,0,84ac23a9c686e595929bab4dad7b08bca80d94f5a0dad54d418e0bd955964876,2024-07-03T01:48:05.220000
|
||||||
CVE-2024-23715,0,0,f67a9429a60abeb20fbda725bf24d3fceb209a0fb34d3921cfadf385f0000ac6,2024-11-19T14:03:09.400000
|
CVE-2024-23715,0,1,7243fa8d7c0fc8189b10503618634c6b88707441759db0629ff8ade7ded54469,2024-11-20T17:35:23.597000
|
||||||
CVE-2024-23716,0,0,72aa4692fe36e515631363961ebc214b187f38d11478c60001fc03eecbbbe02e,2024-09-12T14:35:11.523000
|
CVE-2024-23716,0,0,72aa4692fe36e515631363961ebc214b187f38d11478c60001fc03eecbbbe02e,2024-09-12T14:35:11.523000
|
||||||
CVE-2024-23717,0,0,6ae2f39818716426e507c7fefae1ead3e28d18b5fd2ac50fedfcf5c736aa3969,2024-08-16T19:35:03.877000
|
CVE-2024-23717,0,0,6ae2f39818716426e507c7fefae1ead3e28d18b5fd2ac50fedfcf5c736aa3969,2024-08-16T19:35:03.877000
|
||||||
CVE-2024-23721,0,0,738ea0fe142701915583cf528173779941e7a1ec154f74c48132f1439081fb4a,2024-08-28T15:35:15.520000
|
CVE-2024-23721,0,0,738ea0fe142701915583cf528173779941e7a1ec154f74c48132f1439081fb4a,2024-08-28T15:35:15.520000
|
||||||
@ -248242,7 +248267,7 @@ CVE-2024-25390,0,0,63baed82e2e9879c1206709290d2b37ce21350411219653506ba97bb1a93c
|
|||||||
CVE-2024-25391,0,0,f083d5d8cc92a4e93f6f51d3ea7c9f4db1a85aad2a08d21ec44a79a9fc36d60f,2024-08-01T13:47:43.797000
|
CVE-2024-25391,0,0,f083d5d8cc92a4e93f6f51d3ea7c9f4db1a85aad2a08d21ec44a79a9fc36d60f,2024-08-01T13:47:43.797000
|
||||||
CVE-2024-25392,0,0,a206d17696fcf4904f59efd952331512dcb83b18b402273ed46f576aef4a6d5f,2024-07-03T01:48:47.150000
|
CVE-2024-25392,0,0,a206d17696fcf4904f59efd952331512dcb83b18b402273ed46f576aef4a6d5f,2024-07-03T01:48:47.150000
|
||||||
CVE-2024-25393,0,0,a5db428aad7c170c9baea9d18a6180462a997ce75098c3cb1498156e5372e220,2024-07-03T01:48:47.993000
|
CVE-2024-25393,0,0,a5db428aad7c170c9baea9d18a6180462a997ce75098c3cb1498156e5372e220,2024-07-03T01:48:47.993000
|
||||||
CVE-2024-25394,0,1,98b04192db51c94b5b1b0b9a54ff204f5c7c44e447a1e5699b493a7ae5acd0a8,2024-11-20T16:35:18.833000
|
CVE-2024-25394,0,0,98b04192db51c94b5b1b0b9a54ff204f5c7c44e447a1e5699b493a7ae5acd0a8,2024-11-20T16:35:18.833000
|
||||||
CVE-2024-25395,0,0,56e51d7cdf071865c9c3e88e6e5ac096f849119a0a671dbbfc83351b3b934eaa,2024-07-03T01:48:49.520000
|
CVE-2024-25395,0,0,56e51d7cdf071865c9c3e88e6e5ac096f849119a0a671dbbfc83351b3b934eaa,2024-07-03T01:48:49.520000
|
||||||
CVE-2024-25398,0,0,1ca4a836d24b5db40e48b55b365c5f32c1298501340103a0d376f4b670c7179a,2024-08-27T21:35:12.350000
|
CVE-2024-25398,0,0,1ca4a836d24b5db40e48b55b365c5f32c1298501340103a0d376f4b670c7179a,2024-08-27T21:35:12.350000
|
||||||
CVE-2024-25399,0,0,1476dc50a563fb725fe1946b55f2c733462e19d80809e452ba10c245f29defa3,2024-02-28T14:07:00.563000
|
CVE-2024-25399,0,0,1476dc50a563fb725fe1946b55f2c733462e19d80809e452ba10c245f29defa3,2024-02-28T14:07:00.563000
|
||||||
@ -248958,7 +248983,7 @@ CVE-2024-26278,0,0,a4bf5f7d4f5a8cc66cc891c37bd6872984880cd4b8b9e994fb28df36f06ab
|
|||||||
CVE-2024-26279,0,0,495c848487ea7b68d426f27b99de0402b60520a7c129465843fde2c78b15bbc3,2024-07-19T18:53:34.103000
|
CVE-2024-26279,0,0,495c848487ea7b68d426f27b99de0402b60520a7c129465843fde2c78b15bbc3,2024-07-19T18:53:34.103000
|
||||||
CVE-2024-2628,0,0,09573b659ba12c91153fe41a3eb70641eb4f8cb568e4e66d7b1cdbd070a295c2,2024-08-06T19:35:04.207000
|
CVE-2024-2628,0,0,09573b659ba12c91153fe41a3eb70641eb4f8cb568e4e66d7b1cdbd070a295c2,2024-08-06T19:35:04.207000
|
||||||
CVE-2024-26280,0,0,50ad290499bb0e7f4914845cafc39bb50b8cd84bff7c79192f6c4ba13a4d77b8,2024-11-01T18:35:03.183000
|
CVE-2024-26280,0,0,50ad290499bb0e7f4914845cafc39bb50b8cd84bff7c79192f6c4ba13a4d77b8,2024-11-01T18:35:03.183000
|
||||||
CVE-2024-26281,0,0,79880eb9ab547a64badb9469ec54aaf28b8e0e224b4897c69af19cf6a4aea84d,2024-02-22T19:07:27.197000
|
CVE-2024-26281,0,1,a849d619186af504504fa06c72a1de5232d101cf0e09841ceadc9c64335b2847,2024-11-20T17:35:24.450000
|
||||||
CVE-2024-26282,0,0,2415bbc5102339f312e8121d8b848d8a0ee85368a51aeb48af30bc997a57bc8a,2024-11-06T23:35:00.770000
|
CVE-2024-26282,0,0,2415bbc5102339f312e8121d8b848d8a0ee85368a51aeb48af30bc997a57bc8a,2024-11-06T23:35:00.770000
|
||||||
CVE-2024-26283,0,0,70b62f66f453e79526730a72f92e1afaa7ba86c4fe8f0536398a3c1b2d56ab73,2024-08-29T20:36:24.750000
|
CVE-2024-26283,0,0,70b62f66f453e79526730a72f92e1afaa7ba86c4fe8f0536398a3c1b2d56ab73,2024-08-29T20:36:24.750000
|
||||||
CVE-2024-26284,0,0,ba0c5ee2dd708f43860971c13fc5bba83aa42d583abdba9cf972a949bd992a6b,2024-02-22T19:07:27.197000
|
CVE-2024-26284,0,0,ba0c5ee2dd708f43860971c13fc5bba83aa42d583abdba9cf972a949bd992a6b,2024-02-22T19:07:27.197000
|
||||||
@ -250053,7 +250078,7 @@ CVE-2024-27572,0,0,021a88f3c1ae2bf66877708ae71a24ab68a5a10fe16311950a18df580d61c
|
|||||||
CVE-2024-27574,0,0,3445d7e232fea473b297543f2639b454fd942ac9a4758abe8e2e7d31ea60e498,2024-07-03T01:50:42.303000
|
CVE-2024-27574,0,0,3445d7e232fea473b297543f2639b454fd942ac9a4758abe8e2e7d31ea60e498,2024-07-03T01:50:42.303000
|
||||||
CVE-2024-27575,0,0,be8794a9d53d194bc575e7dee32b34180e95b0c9ca647d9bec212ab94e155297,2024-07-03T01:50:43.093000
|
CVE-2024-27575,0,0,be8794a9d53d194bc575e7dee32b34180e95b0c9ca647d9bec212ab94e155297,2024-07-03T01:50:43.093000
|
||||||
CVE-2024-2758,0,0,83f18458ab99013ac8c623c0e7eb4bfe2c9f8eaa4e32e7c3d8c905cc1a10e95f,2024-10-30T19:35:10.840000
|
CVE-2024-2758,0,0,83f18458ab99013ac8c623c0e7eb4bfe2c9f8eaa4e32e7c3d8c905cc1a10e95f,2024-10-30T19:35:10.840000
|
||||||
CVE-2024-2759,0,0,e8d40e2aa3d5ddadb06d4937582d68fa485ec4260787871b32ec114c396183da,2024-10-10T16:15:08.360000
|
CVE-2024-2759,0,1,8fccf2a38a3368754121197f810ef4f77572bc3639a0dab551027dac0b629c6b,2024-11-20T18:35:20.200000
|
||||||
CVE-2024-27592,0,0,2bb1866167f07ee9274a3bf581a1ca5a19a85b09e387c0707a33412074dd7fff,2024-11-14T20:35:16.207000
|
CVE-2024-27592,0,0,2bb1866167f07ee9274a3bf581a1ca5a19a85b09e387c0707a33412074dd7fff,2024-11-14T20:35:16.207000
|
||||||
CVE-2024-27593,0,0,029f3c2e91f81eb13ffd203db20809d92acce3f5ac8b5078e84e11d1f4fdb2ab,2024-07-03T01:50:43.897000
|
CVE-2024-27593,0,0,029f3c2e91f81eb13ffd203db20809d92acce3f5ac8b5078e84e11d1f4fdb2ab,2024-07-03T01:50:43.897000
|
||||||
CVE-2024-2760,0,0,85c06c3412f2f06c20f37186e39e8f13a8e65a1960bf456bbd20de54d50a8907,2024-09-05T23:15:12.103000
|
CVE-2024-2760,0,0,85c06c3412f2f06c20f37186e39e8f13a8e65a1960bf456bbd20de54d50a8907,2024-09-05T23:15:12.103000
|
||||||
@ -250425,7 +250450,7 @@ CVE-2024-28064,0,0,5db58ab15827f5d89b98fe3165771037627d7f9c473b580f2abd9ddc572df
|
|||||||
CVE-2024-28065,0,0,e0f1de1046eacd4012e9d6249d2050e67e395f04094ef510445210074f331722,2024-04-08T18:49:25.863000
|
CVE-2024-28065,0,0,e0f1de1046eacd4012e9d6249d2050e67e395f04094ef510445210074f331722,2024-04-08T18:49:25.863000
|
||||||
CVE-2024-28066,0,0,c2a2736221464f46eb769fe0b6456e8f036fffd40dc0d59a61172bd4b1ad730b,2024-08-15T15:35:07.070000
|
CVE-2024-28066,0,0,c2a2736221464f46eb769fe0b6456e8f036fffd40dc0d59a61172bd4b1ad730b,2024-08-15T15:35:07.070000
|
||||||
CVE-2024-28067,0,0,a4ab36c1a0f02cd85391b8205ae6018b62f1e3ce44037e321802482d111c11e9,2024-10-30T19:35:09.503000
|
CVE-2024-28067,0,0,a4ab36c1a0f02cd85391b8205ae6018b62f1e3ce44037e321802482d111c11e9,2024-10-30T19:35:09.503000
|
||||||
CVE-2024-28068,0,0,bc3074d56d7203ab69c965398848e97ee8558e2f286e7ec5251e1ecf155f732a,2024-07-11T13:06:13.187000
|
CVE-2024-28068,0,1,4fbfbac86c2329a3432aa6f25961e53ef015ff37937ef76408aee78939ca2066,2024-11-20T17:35:25.313000
|
||||||
CVE-2024-28069,0,0,c685346bb55bf7387451d2fbf1405ced89c60d435f78a40193e6458bfa4c25b5,2024-08-02T21:35:20.240000
|
CVE-2024-28069,0,0,c685346bb55bf7387451d2fbf1405ced89c60d435f78a40193e6458bfa4c25b5,2024-08-02T21:35:20.240000
|
||||||
CVE-2024-2807,0,0,72cbbe4530c555d4dd2940aeac6ca3cb99d0e169b305a79bbc9962a7b891ce9f,2024-05-17T02:38:31.100000
|
CVE-2024-2807,0,0,72cbbe4530c555d4dd2940aeac6ca3cb99d0e169b305a79bbc9962a7b891ce9f,2024-05-17T02:38:31.100000
|
||||||
CVE-2024-28070,0,0,b02bed99aa18fb94d77393e8a0bab2512136cfff81f1cb82c2c934d3f0ee20db,2024-03-17T22:38:29.433000
|
CVE-2024-28070,0,0,b02bed99aa18fb94d77393e8a0bab2512136cfff81f1cb82c2c934d3f0ee20db,2024-03-17T22:38:29.433000
|
||||||
@ -251272,6 +251297,7 @@ CVE-2024-29278,0,0,1c7d83867b262b09f27588e31bf9841e3af6bdfc0d72746f40dee1d45734a
|
|||||||
CVE-2024-2928,0,0,1d00a619d6223f6fddadfce8ecd76fa5d6f829b8d361b3e4066e910bc6258ce4,2024-10-11T15:28:03.530000
|
CVE-2024-2928,0,0,1d00a619d6223f6fddadfce8ecd76fa5d6f829b8d361b3e4066e910bc6258ce4,2024-10-11T15:28:03.530000
|
||||||
CVE-2024-2929,0,0,513249311f09defaddca00249c92a4d2f3037014552979e20d0e342694062636,2024-03-26T17:09:53.043000
|
CVE-2024-2929,0,0,513249311f09defaddca00249c92a4d2f3037014552979e20d0e342694062636,2024-03-26T17:09:53.043000
|
||||||
CVE-2024-29291,0,0,63e881e67f8d85b826801f0c870d1358f1a422a57593ef79bb6bae9024abdbc2,2024-08-02T01:15:58.367000
|
CVE-2024-29291,0,0,63e881e67f8d85b826801f0c870d1358f1a422a57593ef79bb6bae9024abdbc2,2024-08-02T01:15:58.367000
|
||||||
|
CVE-2024-29292,1,1,f9ce2bfafc7aec21107dd061a2982af230bf54b887c310d3c057e28ff4639d7d,2024-11-20T18:15:22.970000
|
||||||
CVE-2024-29296,0,0,196ce9fc64e2de40c4aad14cdb78662ded04058e63416a22f9fb231921284e33,2024-08-01T13:49:29.143000
|
CVE-2024-29296,0,0,196ce9fc64e2de40c4aad14cdb78662ded04058e63416a22f9fb231921284e33,2024-08-01T13:49:29.143000
|
||||||
CVE-2024-2930,0,0,2e48243b295a8e93d53a35219b2be0089b750f595ca7624319aaf969e99aaaca,2024-05-17T02:38:37.687000
|
CVE-2024-2930,0,0,2e48243b295a8e93d53a35219b2be0089b750f595ca7624319aaf969e99aaaca,2024-05-17T02:38:37.687000
|
||||||
CVE-2024-29301,0,0,fd6e891fb9a2f358e58da35cd58c20873301588e91f1b0a5190d88e70e1e8b21,2024-08-05T15:35:14.157000
|
CVE-2024-29301,0,0,fd6e891fb9a2f358e58da35cd58c20873301588e91f1b0a5190d88e70e1e8b21,2024-08-05T15:35:14.157000
|
||||||
@ -251993,7 +252019,7 @@ CVE-2024-30310,0,0,21368fdcf4a9e18a31e2b9852298271dcdaa60df59c08c1dc5b448b5ec3f2
|
|||||||
CVE-2024-30311,0,0,9aaaf7a631f27c18ba0d6e026b9e5bc097be151497f5f87035ce25407b016799,2024-06-10T18:15:30.757000
|
CVE-2024-30311,0,0,9aaaf7a631f27c18ba0d6e026b9e5bc097be151497f5f87035ce25407b016799,2024-06-10T18:15:30.757000
|
||||||
CVE-2024-30312,0,0,f08a9328fc0df8fc97205027f081abf4a30dc22420a8570eec8a2d548e77aee7,2024-06-10T18:15:30.880000
|
CVE-2024-30312,0,0,f08a9328fc0df8fc97205027f081abf4a30dc22420a8570eec8a2d548e77aee7,2024-06-10T18:15:30.880000
|
||||||
CVE-2024-30314,0,0,001958112e812873f2afe024af602bc1e18aaeafca421eccd7dc6e99cd4f7d19,2024-05-22T08:15:09.777000
|
CVE-2024-30314,0,0,001958112e812873f2afe024af602bc1e18aaeafca421eccd7dc6e99cd4f7d19,2024-05-22T08:15:09.777000
|
||||||
CVE-2024-3032,0,1,23903a6cbcf453fd38d8d4b287e955f74e9435539a64a2e4e4033c0e9a9a2ffa,2024-11-20T15:09:42.557000
|
CVE-2024-3032,0,0,23903a6cbcf453fd38d8d4b287e955f74e9435539a64a2e4e4033c0e9a9a2ffa,2024-11-20T15:09:42.557000
|
||||||
CVE-2024-30321,0,0,77e82c6b15f80502cfe967b03a0cf5e1edff68cc4e25f0455ce9c65c8c4bfbce,2024-11-12T13:15:07.503000
|
CVE-2024-30321,0,0,77e82c6b15f80502cfe967b03a0cf5e1edff68cc4e25f0455ce9c65c8c4bfbce,2024-11-12T13:15:07.503000
|
||||||
CVE-2024-30322,0,0,f4e26e42e44429b86d19dca1655fc9b0e6d4cf366473cd59d34a3fd4371a1053,2024-04-03T17:24:18.150000
|
CVE-2024-30322,0,0,f4e26e42e44429b86d19dca1655fc9b0e6d4cf366473cd59d34a3fd4371a1053,2024-04-03T17:24:18.150000
|
||||||
CVE-2024-30323,0,0,d6d47200d4c92fd98c85bfb81a96ff4ecd5c84bf8181d1e9578fd9917f267b5b,2024-04-03T17:24:18.150000
|
CVE-2024-30323,0,0,d6d47200d4c92fd98c85bfb81a96ff4ecd5c84bf8181d1e9578fd9917f267b5b,2024-04-03T17:24:18.150000
|
||||||
@ -252149,7 +252175,7 @@ CVE-2024-30473,0,0,cc643ea6610c054923dcda820bdbaeee3470f2fed9befe993862cdd8d5602
|
|||||||
CVE-2024-30477,0,0,2a9c94bd63166efd66be5d42497334130f49f4b0acff68b2e8385a53a877c218,2024-04-01T01:12:59.077000
|
CVE-2024-30477,0,0,2a9c94bd63166efd66be5d42497334130f49f4b0acff68b2e8385a53a877c218,2024-04-01T01:12:59.077000
|
||||||
CVE-2024-30478,0,0,8648debe6405c1216a86c901736f7e8905eccc7e01f0ae6ab2126aef21a3be15,2024-04-01T01:12:59.077000
|
CVE-2024-30478,0,0,8648debe6405c1216a86c901736f7e8905eccc7e01f0ae6ab2126aef21a3be15,2024-04-01T01:12:59.077000
|
||||||
CVE-2024-30479,0,0,dc5972e51ae5c4d9085a312951d31c7a1307033adf582d496a71c4016c267016,2024-05-17T18:36:05.263000
|
CVE-2024-30479,0,0,dc5972e51ae5c4d9085a312951d31c7a1307033adf582d496a71c4016c267016,2024-05-17T18:36:05.263000
|
||||||
CVE-2024-3048,0,0,fa4900ea10dd8f36641da2f2e00eb4a29f244493fbe084bf6e2111bcb8599925,2024-04-26T12:58:17.720000
|
CVE-2024-3048,0,1,f9feeaa162c2ed25a6f521625ce5d52a1c23a8331ff895073074f6c4f57088c6,2024-11-20T18:35:21.557000
|
||||||
CVE-2024-30480,0,0,b33b7f57a3321cd5daad33e04d6baf951eb974f794b47e5823d0c4fbb0662cf8,2024-05-17T18:36:05.263000
|
CVE-2024-30480,0,0,b33b7f57a3321cd5daad33e04d6baf951eb974f794b47e5823d0c4fbb0662cf8,2024-05-17T18:36:05.263000
|
||||||
CVE-2024-30481,0,0,f260eed3e75ce7805654963acb1b9a08407e71ffc153893529b554eea634e098,2024-10-08T20:49:44.620000
|
CVE-2024-30481,0,0,f260eed3e75ce7805654963acb1b9a08407e71ffc153893529b554eea634e098,2024-10-08T20:49:44.620000
|
||||||
CVE-2024-30482,0,0,10ca3e420c318bd7efd1d9ff7c0685797885e5c3c9336d5f9e0ee32d2856df9c,2024-04-01T01:12:59.077000
|
CVE-2024-30482,0,0,10ca3e420c318bd7efd1d9ff7c0685797885e5c3c9336d5f9e0ee32d2856df9c,2024-04-01T01:12:59.077000
|
||||||
@ -252374,7 +252400,7 @@ CVE-2024-30736,0,0,2ced33d674490f24caa86d9cd5af28449006fe8e43616ef44cf265003015a
|
|||||||
CVE-2024-30737,0,0,061625de72d7496c66f4433249e7e460e27160d9df381544095455b128a43032,2024-05-27T01:15:20.303000
|
CVE-2024-30737,0,0,061625de72d7496c66f4433249e7e460e27160d9df381544095455b128a43032,2024-05-27T01:15:20.303000
|
||||||
CVE-2024-3074,0,0,692263c5307e015d32e912e35fe257a32ec29872ecbd1850dca3dc8eb976c202,2024-05-02T18:00:37.360000
|
CVE-2024-3074,0,0,692263c5307e015d32e912e35fe257a32ec29872ecbd1850dca3dc8eb976c202,2024-05-02T18:00:37.360000
|
||||||
CVE-2024-3075,0,0,03cbf98d3e79eb701c4183fdc55446e630b64ce247873cfbbe161828125e0010,2024-04-26T12:58:17.720000
|
CVE-2024-3075,0,0,03cbf98d3e79eb701c4183fdc55446e630b64ce247873cfbbe161828125e0010,2024-04-26T12:58:17.720000
|
||||||
CVE-2024-3076,0,0,f5e4ecd6010f850ce7c9ea3227c722ea9369b54502ce12bf5737b2c25454d1b2,2024-04-26T15:32:22.523000
|
CVE-2024-3076,0,1,aa6fc3b51d3057a74b1d22b857f3c37eb304520775132fc3224dcd14e2c0d120,2024-11-20T18:35:21.813000
|
||||||
CVE-2024-3077,0,0,13d0f653548f6e08a428cbd5c76a54d70134d49ca71fc1c43b86001e7767738f,2024-03-29T12:45:02.937000
|
CVE-2024-3077,0,0,13d0f653548f6e08a428cbd5c76a54d70134d49ca71fc1c43b86001e7767738f,2024-03-29T12:45:02.937000
|
||||||
CVE-2024-3078,0,0,42b453b3e6a827e37a8a77bcf4c4ca7669e48d95d9df326c975a16f05e6cc7f4,2024-05-17T02:39:42.337000
|
CVE-2024-3078,0,0,42b453b3e6a827e37a8a77bcf4c4ca7669e48d95d9df326c975a16f05e6cc7f4,2024-05-17T02:39:42.337000
|
||||||
CVE-2024-3079,0,0,f1f95675216f703c162f7205baecbbd680e7e08a69a3f6cb5ab9f6df26e36eab,2024-06-17T12:43:31.090000
|
CVE-2024-3079,0,0,f1f95675216f703c162f7205baecbbd680e7e08a69a3f6cb5ab9f6df26e36eab,2024-06-17T12:43:31.090000
|
||||||
@ -253851,7 +253877,7 @@ CVE-2024-32806,0,0,03e8d32999c3a5efc79b13bc3e4fb18e94e6d99ea0a7399671612649aa44b
|
|||||||
CVE-2024-32807,0,0,5fcb2610b0f8f7193730bfceb1c8cf9ee7f988425363a4303f2b55142270c2db,2024-05-17T10:15:10.997000
|
CVE-2024-32807,0,0,5fcb2610b0f8f7193730bfceb1c8cf9ee7f988425363a4303f2b55142270c2db,2024-05-17T10:15:10.997000
|
||||||
CVE-2024-32808,0,0,0e1a2b235c3b7bd46a18d577ca8639513bc942571c1f797d2fd3e36c55454f3d,2024-04-24T13:39:42.883000
|
CVE-2024-32808,0,0,0e1a2b235c3b7bd46a18d577ca8639513bc942571c1f797d2fd3e36c55454f3d,2024-04-24T13:39:42.883000
|
||||||
CVE-2024-32809,0,0,d55b0fbad69973f351986c9fcc53d0cd143d959400089a8fce8f63772d8e13b1,2024-05-17T18:35:35.070000
|
CVE-2024-32809,0,0,d55b0fbad69973f351986c9fcc53d0cd143d959400089a8fce8f63772d8e13b1,2024-05-17T18:35:35.070000
|
||||||
CVE-2024-3281,0,0,7a90ab032af4fdd3d116d1ee3cc663c192a5c7c317678b1801d5faf94d6f70aa,2024-04-10T13:24:22.187000
|
CVE-2024-3281,0,1,de7ffacc35df72293a3157176532645298406fac4e018f3e7cd35c3df239f98c,2024-11-20T18:35:22.063000
|
||||||
CVE-2024-32810,0,0,6a865bd7e3c08616d003142afb839e5afabf0b835ab7b19d068e7100b21221a2,2024-05-03T12:48:41.067000
|
CVE-2024-32810,0,0,6a865bd7e3c08616d003142afb839e5afabf0b835ab7b19d068e7100b21221a2,2024-05-03T12:48:41.067000
|
||||||
CVE-2024-32811,0,0,638081b1e5b1b690a9536c1d45979321fbdc88533eddc89e04dcc94ec3198760,2024-06-10T02:52:08.267000
|
CVE-2024-32811,0,0,638081b1e5b1b690a9536c1d45979321fbdc88533eddc89e04dcc94ec3198760,2024-06-10T02:52:08.267000
|
||||||
CVE-2024-32812,0,0,86238ccef9a58545902a9744b568cff6fc1f9270a86a5025dcc4c13bf66f2c0c,2024-04-24T13:39:42.883000
|
CVE-2024-32812,0,0,86238ccef9a58545902a9744b568cff6fc1f9270a86a5025dcc4c13bf66f2c0c,2024-04-24T13:39:42.883000
|
||||||
@ -254773,7 +254799,7 @@ CVE-2024-34084,0,0,7d9440ddf04c82559a24e924ee696f81ed9dcd7a55ec24907b743742e82c1
|
|||||||
CVE-2024-34085,0,0,5d94e0e1234d28ea1392eb258fba225a24d0a9939e78b10ffa8b6f875a256c7c,2024-05-14T19:17:55.627000
|
CVE-2024-34085,0,0,5d94e0e1234d28ea1392eb258fba225a24d0a9939e78b10ffa8b6f875a256c7c,2024-05-14T19:17:55.627000
|
||||||
CVE-2024-34086,0,0,104df8351545cea86a5aeab75846aeda1282b00a21f2f9f835c10597aaf719fa,2024-05-14T19:17:55.627000
|
CVE-2024-34086,0,0,104df8351545cea86a5aeab75846aeda1282b00a21f2f9f835c10597aaf719fa,2024-05-14T19:17:55.627000
|
||||||
CVE-2024-34087,0,0,b43933510c12517787f75bed2112cdd5360e703f06365c71649e9989d251d8cd,2024-08-28T16:35:22.590000
|
CVE-2024-34087,0,0,b43933510c12517787f75bed2112cdd5360e703f06365c71649e9989d251d8cd,2024-08-28T16:35:22.590000
|
||||||
CVE-2024-34088,0,0,6e1eb2987ec69271c7f130ee4d6c05bf54d17671e3eeb9426a758a6cc9ddbdcb,2024-04-30T19:35:36.960000
|
CVE-2024-34088,0,1,a80408224d364ca41e4a201f640dddc7eb78225a35e7bd8d6873b90011d1813f,2024-11-20T17:35:26.147000
|
||||||
CVE-2024-34089,0,0,5e7107f526e1d12d254978d5169bae34a870123e709df2c6ba63a16f1fef24b8,2024-05-06T19:53:38.797000
|
CVE-2024-34089,0,0,5e7107f526e1d12d254978d5169bae34a870123e709df2c6ba63a16f1fef24b8,2024-05-06T19:53:38.797000
|
||||||
CVE-2024-34090,0,0,bd5741ae5c881eed969a6846397df746acefb1b3b796191e30ee091ebe5a715d,2024-11-01T20:35:10.933000
|
CVE-2024-34090,0,0,bd5741ae5c881eed969a6846397df746acefb1b3b796191e30ee091ebe5a715d,2024-11-01T20:35:10.933000
|
||||||
CVE-2024-34091,0,0,316b2e1c1466fafa03f21d7850553c09c4a77fce34562e440629956736be2b9a,2024-07-03T01:59:22.050000
|
CVE-2024-34091,0,0,316b2e1c1466fafa03f21d7850553c09c4a77fce34562e440629956736be2b9a,2024-07-03T01:59:22.050000
|
||||||
@ -254954,7 +254980,7 @@ CVE-2024-34361,0,0,5168cc961b7acd32b3151096d37c0368d10fe552c02e8547e9bea1142d188
|
|||||||
CVE-2024-34362,0,0,5719c5589fbb1889037578d1ce8361ba73ba257d793c16ea51ae0d2d5ac6391c,2024-06-12T13:29:07.643000
|
CVE-2024-34362,0,0,5719c5589fbb1889037578d1ce8361ba73ba257d793c16ea51ae0d2d5ac6391c,2024-06-12T13:29:07.643000
|
||||||
CVE-2024-34363,0,0,29fcce7b6e913bdead357ab5b9389335d62a3a260d09f4e099131952c971f5ff,2024-06-11T17:44:14.347000
|
CVE-2024-34363,0,0,29fcce7b6e913bdead357ab5b9389335d62a3a260d09f4e099131952c971f5ff,2024-06-11T17:44:14.347000
|
||||||
CVE-2024-34364,0,0,16d3b1c447511f5ba065cf18435b78c90cb58ee194acb420be34d56a1e4088a7,2024-06-11T17:20:27.203000
|
CVE-2024-34364,0,0,16d3b1c447511f5ba065cf18435b78c90cb58ee194acb420be34d56a1e4088a7,2024-06-11T17:20:27.203000
|
||||||
CVE-2024-34365,0,0,052a9c55d263d9f6bcc752c0351fe2cc3f1b3f445147e13ea220b1e1890cf169,2024-08-02T03:15:40.200000
|
CVE-2024-34365,0,1,2a15532a52d93b882067af0f92df755a1c94eaf5d9ad1f120aa56a5cf6419d41,2024-11-20T17:35:27.017000
|
||||||
CVE-2024-34366,0,0,f5fb53fee5d33e6c04dfd75d1bc82cf4356fcf1cec4db7359e4c88746e95e769,2024-05-06T19:53:38.797000
|
CVE-2024-34366,0,0,f5fb53fee5d33e6c04dfd75d1bc82cf4356fcf1cec4db7359e4c88746e95e769,2024-05-06T19:53:38.797000
|
||||||
CVE-2024-34367,0,0,b938dbe32bc0f2b2b08fe9afbb49f3e7437c5991332ead460ffded5315763ead,2024-05-06T19:53:38.797000
|
CVE-2024-34367,0,0,b938dbe32bc0f2b2b08fe9afbb49f3e7437c5991332ead460ffded5315763ead,2024-05-06T19:53:38.797000
|
||||||
CVE-2024-34368,0,0,3be6ba8c94d9b0485281637fbc03b0202fd9deceadc0680ff9568480d31bd12b,2024-05-06T19:53:38.797000
|
CVE-2024-34368,0,0,3be6ba8c94d9b0485281637fbc03b0202fd9deceadc0680ff9568480d31bd12b,2024-05-06T19:53:38.797000
|
||||||
@ -255075,7 +255101,7 @@ CVE-2024-34481,0,0,e2a3e65c4103fe32da9193eb433184ea87fbd297993203e84b18d9ad821ef
|
|||||||
CVE-2024-34483,0,0,6f3bfc57c4ac08b52bc633ea80c521be2c99b03f22d863fb736d441dc611c592,2024-07-03T02:00:16.293000
|
CVE-2024-34483,0,0,6f3bfc57c4ac08b52bc633ea80c521be2c99b03f22d863fb736d441dc611c592,2024-07-03T02:00:16.293000
|
||||||
CVE-2024-34484,0,0,1f03b9dcfd21c2d1e1e4109b895d9faab7d5dde86fb48f1db146804d6f2ea32a,2024-05-06T12:44:56.377000
|
CVE-2024-34484,0,0,1f03b9dcfd21c2d1e1e4109b895d9faab7d5dde86fb48f1db146804d6f2ea32a,2024-05-06T12:44:56.377000
|
||||||
CVE-2024-34486,0,0,f93c0e2186ca66e0dc95b1ea19ad0932973e939f81793a6d44ba3fea5b8487f5,2024-08-01T13:52:24.443000
|
CVE-2024-34486,0,0,f93c0e2186ca66e0dc95b1ea19ad0932973e939f81793a6d44ba3fea5b8487f5,2024-08-01T13:52:24.443000
|
||||||
CVE-2024-34487,0,0,b7a87b83db311954746c44c337769c914868432d37c4805fcdfe8c5bb6239462,2024-05-06T12:44:56.377000
|
CVE-2024-34487,0,1,f8a502380ab1e377fb91e288027c5b0a32280a04c3867681b304cf44a4ef3e0b,2024-11-20T17:35:27.303000
|
||||||
CVE-2024-34488,0,0,bd1886e792bd0f0be5174d43785b1ee8c3d2805a0b92328a691bf28c3b9e55ad,2024-07-03T02:00:17.670000
|
CVE-2024-34488,0,0,bd1886e792bd0f0be5174d43785b1ee8c3d2805a0b92328a691bf28c3b9e55ad,2024-07-03T02:00:17.670000
|
||||||
CVE-2024-34489,0,0,98fc4bbdad28e1f470f6bbf8edfd27b4d57977594296e589fe4b4857cec1a304,2024-07-03T02:00:18.727000
|
CVE-2024-34489,0,0,98fc4bbdad28e1f470f6bbf8edfd27b4d57977594296e589fe4b4857cec1a304,2024-07-03T02:00:18.727000
|
||||||
CVE-2024-34490,0,0,8682749851a19fd719239443e2502b58b0b536d71d97e88f6d39bdad053f0e7a,2024-07-03T02:00:19.953000
|
CVE-2024-34490,0,0,8682749851a19fd719239443e2502b58b0b536d71d97e88f6d39bdad053f0e7a,2024-07-03T02:00:19.953000
|
||||||
@ -255281,7 +255307,7 @@ CVE-2024-34706,0,0,d37668f824cae92c94d3d4080655a3f7931abe160a13955740cf593692644
|
|||||||
CVE-2024-34707,0,0,92351a72b9df02ccb187c386dac1b1a7856d7ac67d7318f75d8c78237ff0f469,2024-05-14T16:12:23.490000
|
CVE-2024-34707,0,0,92351a72b9df02ccb187c386dac1b1a7856d7ac67d7318f75d8c78237ff0f469,2024-05-14T16:12:23.490000
|
||||||
CVE-2024-34708,0,0,ddcff80f674ca3ed50080eea78a77d561cbc250193cb5d568a1a82a28c5bf6cc,2024-05-14T16:12:23.490000
|
CVE-2024-34708,0,0,ddcff80f674ca3ed50080eea78a77d561cbc250193cb5d568a1a82a28c5bf6cc,2024-05-14T16:12:23.490000
|
||||||
CVE-2024-34709,0,0,adf6d2b81a5e40a88a3da30770e9ce95dbdae2bb46c4d3799e84ccb57fa2d50c,2024-05-14T16:12:23.490000
|
CVE-2024-34709,0,0,adf6d2b81a5e40a88a3da30770e9ce95dbdae2bb46c4d3799e84ccb57fa2d50c,2024-05-14T16:12:23.490000
|
||||||
CVE-2024-3471,0,0,37d5fa5373c180db4b5cf77800d262ab0cda510764dcc507d47bfcfad5af4b08,2024-05-02T13:27:25.103000
|
CVE-2024-3471,0,1,73ff09fc2c28ad3524b5b1ca804dca3bd6fc9f46aa8366de3c284efe7aa3af53,2024-11-20T18:35:22.923000
|
||||||
CVE-2024-34710,0,0,7965ba19eedea6a8e4d4ccc9754ad83b6a2971391afa999b1f4b01b06b69f205,2024-05-21T12:37:59.687000
|
CVE-2024-34710,0,0,7965ba19eedea6a8e4d4ccc9754ad83b6a2971391afa999b1f4b01b06b69f205,2024-05-21T12:37:59.687000
|
||||||
CVE-2024-34712,0,0,3f1dde6d42ea063d9e476d7cbf6f83ce13ff1b68be852ea9528dcb38a2c181a5,2024-05-14T19:17:55.627000
|
CVE-2024-34712,0,0,3f1dde6d42ea063d9e476d7cbf6f83ce13ff1b68be852ea9528dcb38a2c181a5,2024-05-14T19:17:55.627000
|
||||||
CVE-2024-34713,0,0,dade094148c26177c5c5e0a9b6aed3312784fd8ef4a22e49caf276d789f44a17,2024-05-14T19:17:55.627000
|
CVE-2024-34713,0,0,dade094148c26177c5c5e0a9b6aed3312784fd8ef4a22e49caf276d789f44a17,2024-05-14T19:17:55.627000
|
||||||
@ -255432,7 +255458,7 @@ CVE-2024-34929,0,0,80902861c56fffe184d43b652e5b65da73fb217bc0c681573f8c1d15948cf
|
|||||||
CVE-2024-3493,0,0,066f7bdb112b4eb90ab428a4a7b97610f00d49e6eb62b740b5f6b8c5b5b2b054,2024-04-16T13:24:07.103000
|
CVE-2024-3493,0,0,066f7bdb112b4eb90ab428a4a7b97610f00d49e6eb62b740b5f6b8c5b5b2b054,2024-04-16T13:24:07.103000
|
||||||
CVE-2024-34930,0,0,9fb3b8964b5cccf698fe1af2c09b9ebbf2bbb61e30f2dd6c2b71de12b8d3c46b,2024-07-03T02:00:57.490000
|
CVE-2024-34930,0,0,9fb3b8964b5cccf698fe1af2c09b9ebbf2bbb61e30f2dd6c2b71de12b8d3c46b,2024-07-03T02:00:57.490000
|
||||||
CVE-2024-34931,0,0,6450b229b3dcc76dd273a176e1d510aa697ab04ac79bf201d0e27ca4c52bc840,2024-05-24T01:15:30.977000
|
CVE-2024-34931,0,0,6450b229b3dcc76dd273a176e1d510aa697ab04ac79bf201d0e27ca4c52bc840,2024-05-24T01:15:30.977000
|
||||||
CVE-2024-34932,0,1,b3ae27f61253f7767fbdf3438e64ca1eae22c4d23e1e356e0c8ba8ab5232e6bc,2024-11-20T16:35:19.057000
|
CVE-2024-34932,0,0,b3ae27f61253f7767fbdf3438e64ca1eae22c4d23e1e356e0c8ba8ab5232e6bc,2024-11-20T16:35:19.057000
|
||||||
CVE-2024-34933,0,0,c3dbf950f435984b9b33f4f97b61de10305ed6619e3cc02c8a837894fcd24d4d,2024-07-03T02:00:58.450000
|
CVE-2024-34933,0,0,c3dbf950f435984b9b33f4f97b61de10305ed6619e3cc02c8a837894fcd24d4d,2024-07-03T02:00:58.450000
|
||||||
CVE-2024-34934,0,0,c952d1ae16fc59b4ad6a305c684ff2ae339875de2313f11687526116a6f6a313,2024-08-20T15:35:13.137000
|
CVE-2024-34934,0,0,c952d1ae16fc59b4ad6a305c684ff2ae339875de2313f11687526116a6f6a313,2024-08-20T15:35:13.137000
|
||||||
CVE-2024-34935,0,0,42663e6f26362b7ff61277b99a542a862a8644dcdaf267511fb39a33d8f4245c,2024-08-01T13:52:27.497000
|
CVE-2024-34935,0,0,42663e6f26362b7ff61277b99a542a862a8644dcdaf267511fb39a33d8f4245c,2024-08-01T13:52:27.497000
|
||||||
@ -255637,7 +255663,7 @@ CVE-2024-35272,0,0,4c1a47b56d7417b088998b4603214b936945d403bf6190e9e2c7cd926cf7a
|
|||||||
CVE-2024-35274,0,0,469db2ced6f82069a481a1e075e780926859c353f46e8b5b311a2688050ba842,2024-11-13T17:01:16.850000
|
CVE-2024-35274,0,0,469db2ced6f82069a481a1e075e780926859c353f46e8b5b311a2688050ba842,2024-11-13T17:01:16.850000
|
||||||
CVE-2024-3528,0,0,c96e1e132295c243d4fa4a90d8abf77e41d771305ddbcf81d644bca2cdde7da0,2024-05-17T02:39:59.157000
|
CVE-2024-3528,0,0,c96e1e132295c243d4fa4a90d8abf77e41d771305ddbcf81d644bca2cdde7da0,2024-05-17T02:39:59.157000
|
||||||
CVE-2024-35282,0,0,fe23f4116601299cd085746b33d91adab4014743ea1af63d79bf69af6ebb68e0,2024-09-20T19:44:17.557000
|
CVE-2024-35282,0,0,fe23f4116601299cd085746b33d91adab4014743ea1af63d79bf69af6ebb68e0,2024-09-20T19:44:17.557000
|
||||||
CVE-2024-35283,0,0,517940d61eca1185fcc5d68a59f62111cbe8fdc81301b4e7c0610afefcc22645,2024-05-29T19:50:25.303000
|
CVE-2024-35283,0,1,ca0b3f00a38824c3aed71cdb1138e6e91cf615412bca500f8e6650cd8dfad427,2024-11-20T18:35:20.470000
|
||||||
CVE-2024-35284,0,0,3a94c448d00dd5059f3fd361118e6cd65d80e9412861f2d6774f390c6aa71d9d,2024-05-29T19:50:25.303000
|
CVE-2024-35284,0,0,3a94c448d00dd5059f3fd361118e6cd65d80e9412861f2d6774f390c6aa71d9d,2024-05-29T19:50:25.303000
|
||||||
CVE-2024-35285,0,0,76a41b3575cee58df6a92d4d67ad746bb5986287224218feccad1dc78e0acbbc,2024-10-23T15:12:34.673000
|
CVE-2024-35285,0,0,76a41b3575cee58df6a92d4d67ad746bb5986287224218feccad1dc78e0acbbc,2024-10-23T15:12:34.673000
|
||||||
CVE-2024-35286,0,0,750facd12e2c01a8ba1e0bf72f7c63f3d0fd7caac4133b6f0d25286457d0ae82,2024-10-23T15:12:34.673000
|
CVE-2024-35286,0,0,750facd12e2c01a8ba1e0bf72f7c63f3d0fd7caac4133b6f0d25286457d0ae82,2024-10-23T15:12:34.673000
|
||||||
@ -256480,7 +256506,7 @@ CVE-2024-36286,0,0,7d09221a564e0c2df0ff5611559a80db23ca3f0bea1adae57d3ef567da0d5
|
|||||||
CVE-2024-36287,0,0,58cd0f96868d0f87ad27a0900cc18166044a8ed0400369c58b15a0b5d92f53af,2024-08-07T16:13:00.603000
|
CVE-2024-36287,0,0,58cd0f96868d0f87ad27a0900cc18166044a8ed0400369c58b15a0b5d92f53af,2024-08-07T16:13:00.603000
|
||||||
CVE-2024-36288,0,0,f27253452fa242bd38d9e8a6852071d40fc41ce412d6b25543b2bb1fcbe8c01c,2024-07-15T07:15:05.230000
|
CVE-2024-36288,0,0,f27253452fa242bd38d9e8a6852071d40fc41ce412d6b25543b2bb1fcbe8c01c,2024-07-15T07:15:05.230000
|
||||||
CVE-2024-36289,0,0,c81e4dcba680502adf1e6cb5fb9cf85188de117b98260b47eb77431186ce409a,2024-07-03T02:03:02.973000
|
CVE-2024-36289,0,0,c81e4dcba680502adf1e6cb5fb9cf85188de117b98260b47eb77431186ce409a,2024-07-03T02:03:02.973000
|
||||||
CVE-2024-3629,0,0,e776b351c13d8fab7d20c1d77ce24b1735377c1f0ada7e55eb9590007cc5c2e8,2024-05-15T16:40:19.330000
|
CVE-2024-3629,0,1,02f51104eec9b528b26df3269b71deb72cfae6ae02d6f7b5853e996dbdb9db74,2024-11-20T18:35:23.183000
|
||||||
CVE-2024-36294,0,0,ab00c27961eace667f9ea5e5ad7b6cd8c0f468a3668d36549eb32d498e33b135,2024-11-15T14:00:09.720000
|
CVE-2024-36294,0,0,ab00c27961eace667f9ea5e5ad7b6cd8c0f468a3668d36549eb32d498e33b135,2024-11-15T14:00:09.720000
|
||||||
CVE-2024-3630,0,0,bdc2182e4eec98ff9c8b84bc3c1a34a4c9de2619b28e4dcc17481a1a7a7b6f08,2024-11-07T16:35:19.253000
|
CVE-2024-3630,0,0,bdc2182e4eec98ff9c8b84bc3c1a34a4c9de2619b28e4dcc17481a1a7a7b6f08,2024-11-07T16:35:19.253000
|
||||||
CVE-2024-36302,0,0,97f37a0491b91273ea881320e1230a32004b42aecc2ad6ef769b0832e9456ade,2024-07-03T02:03:03.750000
|
CVE-2024-36302,0,0,97f37a0491b91273ea881320e1230a32004b42aecc2ad6ef769b0832e9456ade,2024-07-03T02:03:03.750000
|
||||||
@ -256570,7 +256596,7 @@ CVE-2024-36434,0,0,8fba84c9c20ed6e9e38e371f6a7314cc80d9ab38ed1fc3ffdc1e7c8b52186
|
|||||||
CVE-2024-36435,0,0,42aa941ee425d333c537ed403b5f168d15cf55caec805a299bb4c45521e1c947,2024-08-01T13:52:50.527000
|
CVE-2024-36435,0,0,42aa941ee425d333c537ed403b5f168d15cf55caec805a299bb4c45521e1c947,2024-08-01T13:52:50.527000
|
||||||
CVE-2024-36438,0,0,fcbe2e02dbfe7753ae10ee196c2c3d66e08c15fdea4edc31b3da8e63f435a898,2024-08-01T13:52:51.240000
|
CVE-2024-36438,0,0,fcbe2e02dbfe7753ae10ee196c2c3d66e08c15fdea4edc31b3da8e63f435a898,2024-08-01T13:52:51.240000
|
||||||
CVE-2024-36439,0,0,53640dcff33bc5be3aae865e96f45e5b04acc4f9a249851cd066fcd8fafec018,2024-08-23T16:18:28.547000
|
CVE-2024-36439,0,0,53640dcff33bc5be3aae865e96f45e5b04acc4f9a249851cd066fcd8fafec018,2024-08-23T16:18:28.547000
|
||||||
CVE-2024-3644,0,0,5fcc1b95c80e82178a2887dd8939047d13c153da230d7e59629dcecf02b1012a,2024-05-16T13:03:05.353000
|
CVE-2024-3644,0,1,289cd84d76eba7566a7f3a12e6fe432fd296cc1682decfe552f880b571bb7420,2024-11-20T18:35:23.437000
|
||||||
CVE-2024-36440,0,0,59ab2a39d6c2dd526eff525f8a252fc4b6d83dfd01305d7415645bc4cb89310a,2024-08-23T16:18:28.547000
|
CVE-2024-36440,0,0,59ab2a39d6c2dd526eff525f8a252fc4b6d83dfd01305d7415645bc4cb89310a,2024-08-23T16:18:28.547000
|
||||||
CVE-2024-36441,0,0,2b88ed4b9b9e3ad047e589055d5c5d9766a5fd9d7690c7cf12f1bc3c5c619d9d,2024-08-23T16:18:28.547000
|
CVE-2024-36441,0,0,2b88ed4b9b9e3ad047e589055d5c5d9766a5fd9d7690c7cf12f1bc3c5c619d9d,2024-08-23T16:18:28.547000
|
||||||
CVE-2024-36442,0,0,1c399162807c537e1f340452dbe4754afa92739719bfa0084f2ebab835ea4147,2024-08-23T16:18:28.547000
|
CVE-2024-36442,0,0,1c399162807c537e1f340452dbe4754afa92739719bfa0084f2ebab835ea4147,2024-08-23T16:18:28.547000
|
||||||
@ -256757,7 +256783,7 @@ CVE-2024-36792,0,0,fabceb2ff375c58d64c9553c86e9784f4de9e6f1c14eeb688305657805693
|
|||||||
CVE-2024-36795,0,0,421d7caed3f1bfdd012cee0400460351c045d5fa781e1724ee2bfb8de7fe2f98,2024-08-22T16:35:04.130000
|
CVE-2024-36795,0,0,421d7caed3f1bfdd012cee0400460351c045d5fa781e1724ee2bfb8de7fe2f98,2024-08-22T16:35:04.130000
|
||||||
CVE-2024-3680,0,0,a00e5c81c2599a81ed1e944ed0d1a6cb38236de396da2ad7b68a4f9ced279cbe,2024-05-14T16:11:39.510000
|
CVE-2024-3680,0,0,a00e5c81c2599a81ed1e944ed0d1a6cb38236de396da2ad7b68a4f9ced279cbe,2024-05-14T16:11:39.510000
|
||||||
CVE-2024-36800,0,0,22057c82ea39171d646a3d69514bfe24d86c6abe66f6737dc702e3f1234458ca,2024-08-22T20:35:16.867000
|
CVE-2024-36800,0,0,22057c82ea39171d646a3d69514bfe24d86c6abe66f6737dc702e3f1234458ca,2024-08-22T20:35:16.867000
|
||||||
CVE-2024-36801,0,1,c2bf531de1c2a610c941483a05d3e24102f19d33b01ad9c68216ac8cb7184acc,2024-11-20T16:35:19.867000
|
CVE-2024-36801,0,0,c2bf531de1c2a610c941483a05d3e24102f19d33b01ad9c68216ac8cb7184acc,2024-11-20T16:35:19.867000
|
||||||
CVE-2024-36802,0,0,d90679a1557e63ced02c20ce3a95d6abd566ddbe5bfb37eb5db0c573c610d3f6,2024-06-26T06:15:15.200000
|
CVE-2024-36802,0,0,d90679a1557e63ced02c20ce3a95d6abd566ddbe5bfb37eb5db0c573c610d3f6,2024-06-26T06:15:15.200000
|
||||||
CVE-2024-3681,0,0,447617aa0ff72974414a3f009efb09a39cced1c45f643ef6f3cd3ded49aa798d,2024-05-02T18:00:37.360000
|
CVE-2024-3681,0,0,447617aa0ff72974414a3f009efb09a39cced1c45f643ef6f3cd3ded49aa798d,2024-05-02T18:00:37.360000
|
||||||
CVE-2024-36811,0,0,76131c787e3111945e406d523b84d2939422072239845f53446869eacd25ad27,2024-10-28T21:15:04.357000
|
CVE-2024-36811,0,0,76131c787e3111945e406d523b84d2939422072239845f53446869eacd25ad27,2024-10-28T21:15:04.357000
|
||||||
@ -258205,7 +258231,7 @@ CVE-2024-38596,0,0,46720e55bcd9267a5978001cdabf468fbd47d88589f87bfbfc0df091a7294
|
|||||||
CVE-2024-38597,0,0,6c358d88ab1cc72ff393aedcd5fe423ee770c5a3f17802265a5743ec277c9cf5,2024-08-27T18:36:47.313000
|
CVE-2024-38597,0,0,6c358d88ab1cc72ff393aedcd5fe423ee770c5a3f17802265a5743ec277c9cf5,2024-08-27T18:36:47.313000
|
||||||
CVE-2024-38598,0,0,6997b64945387348ad35d76369c09957b25bff8d2b24a06e77e40994bcbb476f,2024-08-27T18:36:57.630000
|
CVE-2024-38598,0,0,6997b64945387348ad35d76369c09957b25bff8d2b24a06e77e40994bcbb476f,2024-08-27T18:36:57.630000
|
||||||
CVE-2024-38599,0,0,30a1fe4d2933b9305ccf42078c4cfea08aec9e247b6d735fe9b948c6c8a96f53,2024-07-15T07:15:11.810000
|
CVE-2024-38599,0,0,30a1fe4d2933b9305ccf42078c4cfea08aec9e247b6d735fe9b948c6c8a96f53,2024-07-15T07:15:11.810000
|
||||||
CVE-2024-3860,0,1,27a00d5a454abc1f2004e6a3c559b934aab3ebf6059bf445f877e47a45b5729c,2024-11-20T16:35:21.687000
|
CVE-2024-3860,0,0,27a00d5a454abc1f2004e6a3c559b934aab3ebf6059bf445f877e47a45b5729c,2024-11-20T16:35:21.687000
|
||||||
CVE-2024-38600,0,0,6f01059b0d86b91709f99375fdc625d4b6e89a50ed018f8c1ceded934a4f84b9,2024-08-27T16:02:47.373000
|
CVE-2024-38600,0,0,6f01059b0d86b91709f99375fdc625d4b6e89a50ed018f8c1ceded934a4f84b9,2024-08-27T16:02:47.373000
|
||||||
CVE-2024-38601,0,0,81635fbf930c5251f288be0221fe26c6b2030142ec4fb7ff358af458d07cd268,2024-07-15T07:15:11.943000
|
CVE-2024-38601,0,0,81635fbf930c5251f288be0221fe26c6b2030142ec4fb7ff358af458d07cd268,2024-07-15T07:15:11.943000
|
||||||
CVE-2024-38602,0,0,02eba94a3d2f10d77d81011dc273bd57fbcb7f7a35d7b986e5851a9bec40a4ca,2024-08-27T16:01:39.983000
|
CVE-2024-38602,0,0,02eba94a3d2f10d77d81011dc273bd57fbcb7f7a35d7b986e5851a9bec40a4ca,2024-08-27T16:01:39.983000
|
||||||
@ -258569,7 +258595,7 @@ CVE-2024-39173,0,0,7e7488e695a5a0a1cc2cbfd222ab57477e2c94cef7c8b0522ab4aeea25b8c
|
|||||||
CVE-2024-39174,0,0,e23d16c301dd77bcbf0c998cdb1fd9e2250ff32896205d07ec7d2fbcb29c498f,2024-07-08T15:49:22.437000
|
CVE-2024-39174,0,0,e23d16c301dd77bcbf0c998cdb1fd9e2250ff32896205d07ec7d2fbcb29c498f,2024-07-08T15:49:22.437000
|
||||||
CVE-2024-39178,0,0,4ea8e37dcaacf2f946fe933a466396f81b9c59263d7790c31a4f691099ad2885,2024-11-18T19:15:05.310000
|
CVE-2024-39178,0,0,4ea8e37dcaacf2f946fe933a466396f81b9c59263d7790c31a4f691099ad2885,2024-11-18T19:15:05.310000
|
||||||
CVE-2024-3918,0,0,476a46be6ec9c148a29f5d8b4706a927d6b38a7387c9465eb6003c281a1d7618,2024-05-24T01:15:30.977000
|
CVE-2024-3918,0,0,476a46be6ec9c148a29f5d8b4706a927d6b38a7387c9465eb6003c281a1d7618,2024-05-24T01:15:30.977000
|
||||||
CVE-2024-39181,0,1,53f78d430de1f3c90ced7f4c31b1c88690ce70fb16be77556622db90677ab162,2024-11-20T16:35:20.850000
|
CVE-2024-39181,0,0,53f78d430de1f3c90ced7f4c31b1c88690ce70fb16be77556622db90677ab162,2024-11-20T16:35:20.850000
|
||||||
CVE-2024-39182,0,0,51b32df09d912e550efbb72e5951696c8519aefd089e452500578b0d065b1383,2024-08-08T14:35:05.753000
|
CVE-2024-39182,0,0,51b32df09d912e550efbb72e5951696c8519aefd089e452500578b0d065b1383,2024-08-08T14:35:05.753000
|
||||||
CVE-2024-3919,0,0,33e13c5d81820af884522cd57579a7a0b812a530b82c07df6884548b544ce3e6,2024-08-01T13:56:45.767000
|
CVE-2024-3919,0,0,33e13c5d81820af884522cd57579a7a0b812a530b82c07df6884548b544ce3e6,2024-08-01T13:56:45.767000
|
||||||
CVE-2024-3920,0,0,d2ca1c7329cc368cadc82dfb98e46c7d8057a15d660865d8baa61df971f7435b,2024-08-09T19:35:09.360000
|
CVE-2024-3920,0,0,d2ca1c7329cc368cadc82dfb98e46c7d8057a15d660865d8baa61df971f7435b,2024-08-09T19:35:09.360000
|
||||||
@ -258909,7 +258935,7 @@ CVE-2024-39605,0,0,a5d8e60b596ac98c4205247c388074418dc90b00520b572619e1306394829
|
|||||||
CVE-2024-39607,0,0,82ab1f90403a4f0d3b9e21e2a488cd41b34ece370e96146e9e8729444d740066,2024-08-01T15:35:17.240000
|
CVE-2024-39607,0,0,82ab1f90403a4f0d3b9e21e2a488cd41b34ece370e96146e9e8729444d740066,2024-08-01T15:35:17.240000
|
||||||
CVE-2024-39609,0,0,6fd0567e66080bb3875a46402bc6085cc120cf2d6c3a58856814b6539ff05daa,2024-11-19T19:58:29.653000
|
CVE-2024-39609,0,0,6fd0567e66080bb3875a46402bc6085cc120cf2d6c3a58856814b6539ff05daa,2024-11-19T19:58:29.653000
|
||||||
CVE-2024-3961,0,0,7859b6a2f8e5a01656e72fd209a53f5adaf23f278f08a55d207894f918e1fda9,2024-07-17T13:32:37.647000
|
CVE-2024-3961,0,0,7859b6a2f8e5a01656e72fd209a53f5adaf23f278f08a55d207894f918e1fda9,2024-07-17T13:32:37.647000
|
||||||
CVE-2024-39610,0,1,78a906525eb532418ee6d458c51f035bb8b9505c7b1742d384bf9dfd00e6f9b8,2024-11-20T15:02:14.297000
|
CVE-2024-39610,0,0,78a906525eb532418ee6d458c51f035bb8b9505c7b1742d384bf9dfd00e6f9b8,2024-11-20T15:02:14.297000
|
||||||
CVE-2024-39612,0,0,029b5e043f8fa9387c1e935fd25a69e218f8fd7196fe19845233dbfcda84d17e,2024-09-04T16:38:56.383000
|
CVE-2024-39612,0,0,029b5e043f8fa9387c1e935fd25a69e218f8fd7196fe19845233dbfcda84d17e,2024-09-04T16:38:56.383000
|
||||||
CVE-2024-39613,0,0,a01eb288198c1ee98f509a48683a6028690d03e91539f0fa22857619bc4ca335,2024-09-20T13:59:01.117000
|
CVE-2024-39613,0,0,a01eb288198c1ee98f509a48683a6028690d03e91539f0fa22857619bc4ca335,2024-09-20T13:59:01.117000
|
||||||
CVE-2024-39614,0,0,80fda44b15f74076f020f7bfc25c89db880e93067c83790f059fc3bf750e00f8,2024-08-01T13:55:55.837000
|
CVE-2024-39614,0,0,80fda44b15f74076f020f7bfc25c89db880e93067c83790f059fc3bf750e00f8,2024-08-01T13:55:55.837000
|
||||||
@ -259409,7 +259435,7 @@ CVE-2024-40633,0,0,cb8b1e46d2fb0350ee65397b524eda33b035785c4ff54d8f631326909af07
|
|||||||
CVE-2024-40634,0,0,f0b1b04d49b6a98a87295b9d83a3ab2b8cbfe90c15ea00701d78a02066d0251e,2024-07-24T12:55:13.223000
|
CVE-2024-40634,0,0,f0b1b04d49b6a98a87295b9d83a3ab2b8cbfe90c15ea00701d78a02066d0251e,2024-07-24T12:55:13.223000
|
||||||
CVE-2024-40636,0,0,98744b954b3d196b3f10d684008952126f958b809a4f56d792514a1180b74df0,2024-07-18T12:28:43.707000
|
CVE-2024-40636,0,0,98744b954b3d196b3f10d684008952126f958b809a4f56d792514a1180b74df0,2024-07-18T12:28:43.707000
|
||||||
CVE-2024-40637,0,0,8f01e513c3194bcf30056752321b26e2f21549acaed31b1fc0f5890d359b45ae,2024-07-19T14:37:17.863000
|
CVE-2024-40637,0,0,8f01e513c3194bcf30056752321b26e2f21549acaed31b1fc0f5890d359b45ae,2024-07-19T14:37:17.863000
|
||||||
CVE-2024-40638,0,1,a7bbe91bcfaaa13b7597aadee35238fb0a87f46bd3b256b00e5face88cc00949,2024-11-20T15:30:37.387000
|
CVE-2024-40638,0,0,a7bbe91bcfaaa13b7597aadee35238fb0a87f46bd3b256b00e5face88cc00949,2024-11-20T15:30:37.387000
|
||||||
CVE-2024-40639,0,0,8bbb50b2a25542a9b7af4d56fa6e5b2d2c32a2fc32f95961ce4984af08c80bab,2024-07-17T20:15:06.603000
|
CVE-2024-40639,0,0,8bbb50b2a25542a9b7af4d56fa6e5b2d2c32a2fc32f95961ce4984af08c80bab,2024-07-17T20:15:06.603000
|
||||||
CVE-2024-4064,0,0,3a1a40467a64f04bfa80ae5c066454b06b4092014a9e47cc1a50eb6eb22d315c,2024-05-17T02:40:14.223000
|
CVE-2024-4064,0,0,3a1a40467a64f04bfa80ae5c066454b06b4092014a9e47cc1a50eb6eb22d315c,2024-05-17T02:40:14.223000
|
||||||
CVE-2024-40640,0,0,7e1f28a17873c57850e387e604bc4923eccdf39126e84bd67e6dd03b6e2f6417,2024-07-18T12:28:43.707000
|
CVE-2024-40640,0,0,7e1f28a17873c57850e387e604bc4923eccdf39126e84bd67e6dd03b6e2f6417,2024-07-18T12:28:43.707000
|
||||||
@ -260110,8 +260136,8 @@ CVE-2024-41674,0,0,e673b8205e82a534b9a977608e67254dbf60c56054d2121630b866936cabb
|
|||||||
CVE-2024-41675,0,0,99d7bb404b6db7a620ac267d34a06ef7dcdda9c80bdd1ecb6c741290a9b47f60,2024-08-23T17:07:28.247000
|
CVE-2024-41675,0,0,99d7bb404b6db7a620ac267d34a06ef7dcdda9c80bdd1ecb6c741290a9b47f60,2024-08-23T17:07:28.247000
|
||||||
CVE-2024-41676,0,0,f8c727903895dd3f774fa8fafadf4d13b194d23bd32750d21228bccd7e3862a1,2024-08-23T13:44:42.487000
|
CVE-2024-41676,0,0,f8c727903895dd3f774fa8fafadf4d13b194d23bd32750d21228bccd7e3862a1,2024-08-23T13:44:42.487000
|
||||||
CVE-2024-41677,0,0,350177b79949244cfbc185c5f18aee412a8902a49d36a53e1d4b50536f1effd5,2024-08-12T18:51:29.497000
|
CVE-2024-41677,0,0,350177b79949244cfbc185c5f18aee412a8902a49d36a53e1d4b50536f1effd5,2024-08-12T18:51:29.497000
|
||||||
CVE-2024-41678,0,1,1e1f47e48910b98d19ecebc471d2f196d6713bab2739668c5f8a5fcb169733b5,2024-11-20T15:21:37.683000
|
CVE-2024-41678,0,0,1e1f47e48910b98d19ecebc471d2f196d6713bab2739668c5f8a5fcb169733b5,2024-11-20T15:21:37.683000
|
||||||
CVE-2024-41679,0,1,943f9714b883f0bde50b656d218f57684a4c8b6a4c40de85f830dde5e1325f29,2024-11-20T15:21:19.883000
|
CVE-2024-41679,0,0,943f9714b883f0bde50b656d218f57684a4c8b6a4c40de85f830dde5e1325f29,2024-11-20T15:21:19.883000
|
||||||
CVE-2024-4168,0,0,7f4f833c88738c683a47d814a058bf8a730868170937a9aca799097bc79bf22f,2024-06-04T19:20:31.690000
|
CVE-2024-4168,0,0,7f4f833c88738c683a47d814a058bf8a730868170937a9aca799097bc79bf22f,2024-06-04T19:20:31.690000
|
||||||
CVE-2024-41681,0,0,6dfdc16b96a5715c67e93e3b8e76db2de56f823b305a3ba2f49e1e9df8ebee6d,2024-08-14T18:37:06.540000
|
CVE-2024-41681,0,0,6dfdc16b96a5715c67e93e3b8e76db2de56f823b305a3ba2f49e1e9df8ebee6d,2024-08-14T18:37:06.540000
|
||||||
CVE-2024-41682,0,0,b98500d64915be62a0e5e2d6d50336319231d8c45c711d39d83e7568c61fc3c7,2024-08-14T18:37:24.413000
|
CVE-2024-41682,0,0,b98500d64915be62a0e5e2d6d50336319231d8c45c711d39d83e7568c61fc3c7,2024-08-14T18:37:24.413000
|
||||||
@ -261409,8 +261435,8 @@ CVE-2024-43413,0,0,8e6331055eff0a1fc21c13ac1aa5a910957effe87064f315927a5ac8c4d91
|
|||||||
CVE-2024-43414,0,0,41d126c00be1a75ca1d7b9b05a3a92eaf49a5d7831c24ad21608856181f8c11a,2024-09-12T21:33:40.887000
|
CVE-2024-43414,0,0,41d126c00be1a75ca1d7b9b05a3a92eaf49a5d7831c24ad21608856181f8c11a,2024-09-12T21:33:40.887000
|
||||||
CVE-2024-43415,0,0,33623038bce272467978985c7d034b7fd7d9931154f17ac64d12541af9ed8ac3,2024-11-13T19:15:08.580000
|
CVE-2024-43415,0,0,33623038bce272467978985c7d034b7fd7d9931154f17ac64d12541af9ed8ac3,2024-11-13T19:15:08.580000
|
||||||
CVE-2024-43416,0,0,40511317bce07afc98feefafa1f6dda0a6ec4068936e63f6771ae422dc8a571f,2024-11-19T21:57:56.293000
|
CVE-2024-43416,0,0,40511317bce07afc98feefafa1f6dda0a6ec4068936e63f6771ae422dc8a571f,2024-11-19T21:57:56.293000
|
||||||
CVE-2024-43417,0,1,98a01f3c648d326021ab363d71d2ee86ebc5cec2b438f65b07a29ef7b2ce7848,2024-11-20T15:21:07.650000
|
CVE-2024-43417,0,0,98a01f3c648d326021ab363d71d2ee86ebc5cec2b438f65b07a29ef7b2ce7848,2024-11-20T15:21:07.650000
|
||||||
CVE-2024-43418,0,1,095c8b0beb72bf4abaa49fb253f3464e7bd9bdc9a32b2a0922d4be8248869170,2024-11-20T15:20:43.297000
|
CVE-2024-43418,0,0,095c8b0beb72bf4abaa49fb253f3464e7bd9bdc9a32b2a0922d4be8248869170,2024-11-20T15:20:43.297000
|
||||||
CVE-2024-4342,0,0,2403af0b003f5953a3d2a1b74bf46d64f4a354bc628b01d2ea5f60de4a4002c6,2024-06-03T14:46:24.250000
|
CVE-2024-4342,0,0,2403af0b003f5953a3d2a1b74bf46d64f4a354bc628b01d2ea5f60de4a4002c6,2024-06-03T14:46:24.250000
|
||||||
CVE-2024-43423,0,0,8fb21f51e563dd938c763581007e890cf5873a7efc6a39a36e929ea32ce34c0c,2024-10-01T15:41:32.537000
|
CVE-2024-43423,0,0,8fb21f51e563dd938c763581007e890cf5873a7efc6a39a36e929ea32ce34c0c,2024-10-01T15:41:32.537000
|
||||||
CVE-2024-43424,0,0,6d9ffac7d6eb9e50db381baa418d84f2f5d9932ec78b86526bf799eb43b3b4f3,2024-11-05T19:39:33.873000
|
CVE-2024-43424,0,0,6d9ffac7d6eb9e50db381baa418d84f2f5d9932ec78b86526bf799eb43b3b4f3,2024-11-05T19:39:33.873000
|
||||||
@ -262158,9 +262184,9 @@ CVE-2024-44297,0,0,79b1a7724e5e5ef3ea1a90918f341220daf2a3cd7bb65b3a989c955fd834b
|
|||||||
CVE-2024-4430,0,0,137066e4356a4d04e3ad731fb42c3579f278eca0ad3e41ea882926334c71093f,2024-05-14T16:11:39.510000
|
CVE-2024-4430,0,0,137066e4356a4d04e3ad731fb42c3579f278eca0ad3e41ea882926334c71093f,2024-05-14T16:11:39.510000
|
||||||
CVE-2024-44301,0,0,e57f1a12cf8c57ae2bf8a0deda4abbc44e17e7c3ec00ae41ee84335bdf9af805,2024-10-30T19:35:22.447000
|
CVE-2024-44301,0,0,e57f1a12cf8c57ae2bf8a0deda4abbc44e17e7c3ec00ae41ee84335bdf9af805,2024-10-30T19:35:22.447000
|
||||||
CVE-2024-44302,0,0,8ecfedad59d8a53cf201de7999f2b2a1319aa7dcff5d0590cb4d2b5e11349389,2024-10-30T17:49:53.193000
|
CVE-2024-44302,0,0,8ecfedad59d8a53cf201de7999f2b2a1319aa7dcff5d0590cb4d2b5e11349389,2024-10-30T17:49:53.193000
|
||||||
CVE-2024-44306,0,1,30e6b62b20cb4827539838b9ad1117b1c4caf5a6a100e3fa44a4d9f09dbdd63c,2024-11-20T16:35:23.177000
|
CVE-2024-44306,0,0,30e6b62b20cb4827539838b9ad1117b1c4caf5a6a100e3fa44a4d9f09dbdd63c,2024-11-20T16:35:23.177000
|
||||||
CVE-2024-44307,0,1,9e70c08c83168f1b166f0adb0f44da27d930f75021e34e9c4988cb0e1544104b,2024-11-20T16:35:24.267000
|
CVE-2024-44307,0,0,9e70c08c83168f1b166f0adb0f44da27d930f75021e34e9c4988cb0e1544104b,2024-11-20T16:35:24.267000
|
||||||
CVE-2024-44308,0,1,205e4729d19a62cea7bcf98856c2047767e5032b4dd25faffb0e6baf2e440c71,2024-11-20T16:35:25.583000
|
CVE-2024-44308,0,0,205e4729d19a62cea7bcf98856c2047767e5032b4dd25faffb0e6baf2e440c71,2024-11-20T16:35:25.583000
|
||||||
CVE-2024-44309,0,0,2c94a7a6e5a6d9d107289f79e4276d27e42aa524b614d4dc20aa51903eaface0,2024-11-20T00:15:17.137000
|
CVE-2024-44309,0,0,2c94a7a6e5a6d9d107289f79e4276d27e42aa524b614d4dc20aa51903eaface0,2024-11-20T00:15:17.137000
|
||||||
CVE-2024-4431,0,0,8d95de6ec075320f55907047db89835dd68db45859f7bae49d6625b2a3240b6b,2024-05-24T01:15:30.977000
|
CVE-2024-4431,0,0,8d95de6ec075320f55907047db89835dd68db45859f7bae49d6625b2a3240b6b,2024-05-24T01:15:30.977000
|
||||||
CVE-2024-4432,0,0,492ff6791a7b1a2e081b9c5249b748792a54b9554ba3a2422039c4bfa6a7bf50,2024-05-20T13:00:34.807000
|
CVE-2024-4432,0,0,492ff6791a7b1a2e081b9c5249b748792a54b9554ba3a2422039c4bfa6a7bf50,2024-05-20T13:00:34.807000
|
||||||
@ -262869,7 +262895,7 @@ CVE-2024-45604,0,0,8bf71581fc88ef149abd090a70890b5121cb8944654700250436e6871eed9
|
|||||||
CVE-2024-45605,0,0,e2dcbd09111d51f02ed3dc28b06a6dfe1b2afb4b9e6f7d6992823c9eafceb7dc,2024-09-26T19:14:00.873000
|
CVE-2024-45605,0,0,e2dcbd09111d51f02ed3dc28b06a6dfe1b2afb4b9e6f7d6992823c9eafceb7dc,2024-09-26T19:14:00.873000
|
||||||
CVE-2024-45606,0,0,74770cd60bba1a7e3534716f76d2f24e8f6b5a1c9090e259fc4bcbaa501443fe,2024-09-26T19:16:40.720000
|
CVE-2024-45606,0,0,74770cd60bba1a7e3534716f76d2f24e8f6b5a1c9090e259fc4bcbaa501443fe,2024-09-26T19:16:40.720000
|
||||||
CVE-2024-45607,0,0,9d199e13e4c36b979d30a8467667e188e65d4bf0165b27173d5a6e5dc2ce7529,2024-09-19T02:05:28.707000
|
CVE-2024-45607,0,0,9d199e13e4c36b979d30a8467667e188e65d4bf0165b27173d5a6e5dc2ce7529,2024-09-19T02:05:28.707000
|
||||||
CVE-2024-45608,0,1,af7c58ddb81b1dc0d2d7b2df9f839e7080f0a2b57fe93d1ebdf7a968766ba076,2024-11-20T15:20:27.390000
|
CVE-2024-45608,0,0,af7c58ddb81b1dc0d2d7b2df9f839e7080f0a2b57fe93d1ebdf7a968766ba076,2024-11-20T15:20:27.390000
|
||||||
CVE-2024-45609,0,0,2cb777fb37ad8d39d951bd6b53020cf1935b1072d0433c4260effc918cb4fb96,2024-11-19T21:22:06.043000
|
CVE-2024-45609,0,0,2cb777fb37ad8d39d951bd6b53020cf1935b1072d0433c4260effc918cb4fb96,2024-11-19T21:22:06.043000
|
||||||
CVE-2024-4561,0,0,8ef61ebc386f7e587b6eb6df8054d64514729591e443c5ac6735c0df58420e0f,2024-05-15T16:40:19.330000
|
CVE-2024-4561,0,0,8ef61ebc386f7e587b6eb6df8054d64514729591e443c5ac6735c0df58420e0f,2024-05-15T16:40:19.330000
|
||||||
CVE-2024-45610,0,0,22b945effc1025f70b2432de8172d4793098ff2de11f4912624f5e1a161c565e,2024-11-19T21:07:46.790000
|
CVE-2024-45610,0,0,22b945effc1025f70b2432de8172d4793098ff2de11f4912624f5e1a161c565e,2024-11-19T21:07:46.790000
|
||||||
@ -263424,30 +263450,30 @@ CVE-2024-46764,0,0,12c93d62cf976e0fac2b5ba84bf2f54a4d1d5062174357996a20e7c4bd1fa
|
|||||||
CVE-2024-46765,0,0,584f96269688e10aedc11057947f82fa03feb9c9ca3ecb2a522bbf502bad2684,2024-09-26T13:24:29.697000
|
CVE-2024-46765,0,0,584f96269688e10aedc11057947f82fa03feb9c9ca3ecb2a522bbf502bad2684,2024-09-26T13:24:29.697000
|
||||||
CVE-2024-46766,0,0,55d63c81e0644404ba2b3c5eec2e0e368cac985d5fcde38c97950713f33905c3,2024-09-23T16:15:23.823000
|
CVE-2024-46766,0,0,55d63c81e0644404ba2b3c5eec2e0e368cac985d5fcde38c97950713f33905c3,2024-09-23T16:15:23.823000
|
||||||
CVE-2024-46767,0,0,fd3b90678eac65bcb3233c07c19427fffd1566d14f3f9a8041e6042771984f5b,2024-09-20T12:30:51.220000
|
CVE-2024-46767,0,0,fd3b90678eac65bcb3233c07c19427fffd1566d14f3f9a8041e6042771984f5b,2024-09-20T12:30:51.220000
|
||||||
CVE-2024-46768,0,0,404d33c105e2f2e7a4f6108144330470208ba943ab19e3a7f2654703cb3bf44e,2024-09-20T12:30:51.220000
|
CVE-2024-46768,0,1,ee740127af67ae8086ba37a9f2512a554b9d048c382b04d9070cf9b51579f1a0,2024-11-20T18:19:35.033000
|
||||||
CVE-2024-46769,0,0,c9bbe9575cc2848fce277d2f64a3b4e07e53acfd7fdf23d95dd87f904a651799,2024-09-30T12:44:27.907000
|
CVE-2024-46769,0,0,c9bbe9575cc2848fce277d2f64a3b4e07e53acfd7fdf23d95dd87f904a651799,2024-09-30T12:44:27.907000
|
||||||
CVE-2024-4677,0,0,06b789b4e22353188f4fa1dbcfc045ef487187889647b738ddd6f1b3dabcd887,2024-06-04T19:20:45.830000
|
CVE-2024-4677,0,0,06b789b4e22353188f4fa1dbcfc045ef487187889647b738ddd6f1b3dabcd887,2024-06-04T19:20:45.830000
|
||||||
CVE-2024-46770,0,0,7f952820dc90535bd167d3f017a589524ac6f56b9d3dfae2b4b9bd0b58f79ea0,2024-09-23T16:13:25.563000
|
CVE-2024-46770,0,0,7f952820dc90535bd167d3f017a589524ac6f56b9d3dfae2b4b9bd0b58f79ea0,2024-09-23T16:13:25.563000
|
||||||
CVE-2024-46771,0,0,d3e25589d0aa5cc76f678addd8f11cf59207b44575da23e672799ad7db6233bc,2024-09-20T12:30:51.220000
|
CVE-2024-46771,0,1,71a4de85b53379f94526037df901498ea6ac4fdcecd02ba212f18e76a39be045,2024-11-20T18:20:03.130000
|
||||||
CVE-2024-46772,0,0,a8ae53586f05d332df3222762c5e7961597b69a5b7445f0db6ae4d1db439b4de,2024-09-23T16:52:17.577000
|
CVE-2024-46772,0,0,a8ae53586f05d332df3222762c5e7961597b69a5b7445f0db6ae4d1db439b4de,2024-09-23T16:52:17.577000
|
||||||
CVE-2024-46773,0,0,d50dc13b3db60a3fbb1947c3c76c4140c6ced2f89d983703c7f17bd27e5be084,2024-09-23T16:51:59.983000
|
CVE-2024-46773,0,0,d50dc13b3db60a3fbb1947c3c76c4140c6ced2f89d983703c7f17bd27e5be084,2024-09-23T16:51:59.983000
|
||||||
CVE-2024-46774,0,0,898312b974f7d676e3801eb8898f9749e66804c2df5ac294f95a2f8fc72b8a3a,2024-09-20T12:30:51.220000
|
CVE-2024-46774,0,1,674493f028c34fd9192163f3608c7ec506bedd3e768bd43034605534a0b63a17,2024-11-20T18:19:00.327000
|
||||||
CVE-2024-46775,0,0,39f7e39a0a2b9096f49799d0bab00e7744bc4ac1b71a53fbddef419b6853ebb9,2024-09-20T12:30:51.220000
|
CVE-2024-46775,0,1,262156bbdb73176f9653b3b68eae0bc78294be6056ada06350ce5793116d537a,2024-11-20T18:17:13.750000
|
||||||
CVE-2024-46776,0,0,a99442a67c30f6b8b2c7edd14b057b7025440bebaf3c1a97a251694bd1019ccc,2024-09-20T12:30:51.220000
|
CVE-2024-46776,0,1,b229f205a3358474780929aaa686adb3d080d222663cdf9e1e6c1a3682667d66,2024-11-20T17:56:57.290000
|
||||||
CVE-2024-46777,0,0,64f254a8e69394e560ce14802bd54bf5d7b5322084f6066ae69ad8c2320dab95,2024-09-20T12:30:51.220000
|
CVE-2024-46777,0,1,65946aeaba38bf8caf0ac1d615bdf194883b7f45fa3d6f1a8acae5d588c93e92,2024-11-20T17:56:02.287000
|
||||||
CVE-2024-46778,0,0,42ed538387ee8783838f45ac891015186bc9fe8d2c7a6ed0b3d8d0096eca7842,2024-09-20T12:30:51.220000
|
CVE-2024-46778,0,1,63f5cb21b3c66a3fbccb3f4f323eed19d16dbd087dd987cb02ef3d17b8ecfb2c,2024-11-20T17:40:37.847000
|
||||||
CVE-2024-46779,0,0,9459e2bbf4547b8d8450c1952a14b96461b698fba144de37fd66253536f5c10f,2024-09-23T16:37:51.473000
|
CVE-2024-46779,0,0,9459e2bbf4547b8d8450c1952a14b96461b698fba144de37fd66253536f5c10f,2024-09-23T16:37:51.473000
|
||||||
CVE-2024-4678,0,0,be695eaab1f72a88b10d5b9b54afd539ecd5dccc02b3dde1eca881aeeba1ff59,2024-06-04T19:20:45.930000
|
CVE-2024-4678,0,0,be695eaab1f72a88b10d5b9b54afd539ecd5dccc02b3dde1eca881aeeba1ff59,2024-06-04T19:20:45.930000
|
||||||
CVE-2024-46780,0,0,450748190a91dea98a59a618a62a7f263f80a5e9eca3c0ec693f8e0a9ab81d08,2024-09-20T12:30:51.220000
|
CVE-2024-46780,0,1,f11280a31c667cc558d9097b2fdcbf0e351d3b09c3c67c2e9a5986ac93884fb7,2024-11-20T17:31:54.440000
|
||||||
CVE-2024-46781,0,0,b7800767661ad72dc7d9b50173ef44ead44890ec84d2e21b5c9fa258abff2f06,2024-09-23T16:37:07.117000
|
CVE-2024-46781,0,0,b7800767661ad72dc7d9b50173ef44ead44890ec84d2e21b5c9fa258abff2f06,2024-09-23T16:37:07.117000
|
||||||
CVE-2024-46782,0,0,8fc9ad3608da20697ed5d3ccf36f03f0ef1fd876169984385298851863cf19f3,2024-09-23T16:32:04.373000
|
CVE-2024-46782,0,0,8fc9ad3608da20697ed5d3ccf36f03f0ef1fd876169984385298851863cf19f3,2024-09-23T16:32:04.373000
|
||||||
CVE-2024-46783,0,1,70531073079a8c8ac29e6e1c446f67895f92dfb43b67b6c609e333e90673bcd9,2024-11-20T15:47:35.273000
|
CVE-2024-46783,0,0,70531073079a8c8ac29e6e1c446f67895f92dfb43b67b6c609e333e90673bcd9,2024-11-20T15:47:35.273000
|
||||||
CVE-2024-46784,0,0,0bd6e7334c2f225218ac235c8614917f7b12765c1ee877fde8fe6ea5550d1e04,2024-09-26T13:21:30.657000
|
CVE-2024-46784,0,0,0bd6e7334c2f225218ac235c8614917f7b12765c1ee877fde8fe6ea5550d1e04,2024-09-26T13:21:30.657000
|
||||||
CVE-2024-46785,0,1,3c5b13d46d7bf1096dbbf64131b42dd8dc761cb5c75995e3c1cf54795d42851b,2024-11-20T15:51:33.027000
|
CVE-2024-46785,0,0,3c5b13d46d7bf1096dbbf64131b42dd8dc761cb5c75995e3c1cf54795d42851b,2024-11-20T15:51:33.027000
|
||||||
CVE-2024-46786,0,0,25c7670eeacc5e83ba81db4459f557d546315f042b4010db6dd6a4480e89f0e5,2024-09-26T12:48:37.447000
|
CVE-2024-46786,0,0,25c7670eeacc5e83ba81db4459f557d546315f042b4010db6dd6a4480e89f0e5,2024-09-26T12:48:37.447000
|
||||||
CVE-2024-46787,0,1,28621b503bd078f2b0141b3d6d74179143aa95798c87759eebe0f345e318857a,2024-11-20T15:33:08.557000
|
CVE-2024-46787,0,0,28621b503bd078f2b0141b3d6d74179143aa95798c87759eebe0f345e318857a,2024-11-20T15:33:08.557000
|
||||||
CVE-2024-46788,0,0,695266a8c696b6d7e3425cc0a9ed86e76a0329cbee6a482b93b62801857e8044,2024-09-20T12:30:51.220000
|
CVE-2024-46788,0,0,695266a8c696b6d7e3425cc0a9ed86e76a0329cbee6a482b93b62801857e8044,2024-09-20T12:30:51.220000
|
||||||
CVE-2024-46789,0,0,a571fb0b950e8c979ab026a9fe716bd6ec64ed8b8cb21d6691e8cab8a49ba099,2024-09-20T12:30:51.220000
|
CVE-2024-46789,0,1,c3269567de8f6eac1c676e3d988c555c4ae91be4c929b335b733006adf2d460d,2024-11-20T17:27:03.197000
|
||||||
CVE-2024-4679,0,0,9bfb1104bd992ff014fab2b1166f6f818504f2232183224a6a702e4c44b2119a,2024-07-02T12:09:16.907000
|
CVE-2024-4679,0,0,9bfb1104bd992ff014fab2b1166f6f818504f2232183224a6a702e4c44b2119a,2024-07-02T12:09:16.907000
|
||||||
CVE-2024-46790,0,0,d27eade819ed2fd15185afc828dfb8999a9cfdae3e96ed34fd07c06d351f85e6,2024-09-20T12:30:51.220000
|
CVE-2024-46790,0,0,d27eade819ed2fd15185afc828dfb8999a9cfdae3e96ed34fd07c06d351f85e6,2024-09-20T12:30:51.220000
|
||||||
CVE-2024-46791,0,0,2949ee11720d44bcaa052e660ce7fdc2dacadc36031963879d79e5b14b90b05b,2024-09-20T18:21:19.457000
|
CVE-2024-46791,0,0,2949ee11720d44bcaa052e660ce7fdc2dacadc36031963879d79e5b14b90b05b,2024-09-20T18:21:19.457000
|
||||||
@ -263476,19 +263502,19 @@ CVE-2024-46811,0,0,e3c61e9558dd1a3f131364b8d64c8ba6f14ec560c30f285430f0270477a47
|
|||||||
CVE-2024-46812,0,0,134272cc7effe83799d5018c6b8c85291ae3808b9eeebc0177d5fdded748636a,2024-09-30T12:45:57.823000
|
CVE-2024-46812,0,0,134272cc7effe83799d5018c6b8c85291ae3808b9eeebc0177d5fdded748636a,2024-09-30T12:45:57.823000
|
||||||
CVE-2024-46813,0,0,ec855766c2269aedb12237a993dfb5b55059aae43c85d0e5552568c0bcce8660,2024-10-04T17:38:17.740000
|
CVE-2024-46813,0,0,ec855766c2269aedb12237a993dfb5b55059aae43c85d0e5552568c0bcce8660,2024-10-04T17:38:17.740000
|
||||||
CVE-2024-46814,0,0,80befd72986fd4035afe06cedc03a7664f2ffcaf670ef7869d07a2b36466e8ce,2024-10-04T17:27:47.450000
|
CVE-2024-46814,0,0,80befd72986fd4035afe06cedc03a7664f2ffcaf670ef7869d07a2b36466e8ce,2024-10-04T17:27:47.450000
|
||||||
CVE-2024-46815,0,0,8e2c427d67a958bd4334f2e61500d197e9f6057cf203fc26da513bf775828fa9,2024-09-30T12:45:57.823000
|
CVE-2024-46815,0,1,c299d5fd5955b01dea3d800f7bc23cd424d44f684b18d348ce43ae25f9c523b3,2024-11-20T18:22:12.017000
|
||||||
CVE-2024-46816,0,0,6e1ee4b9a0fc40aba55bc57257790b6850327e05245dce2bb930d1d6b61ecbc7,2024-09-30T12:45:57.823000
|
CVE-2024-46816,0,1,65fec096967b53105bad0893cdaafe0a8bb3271c2ee45a1b1df56c13edd560fe,2024-11-20T18:02:52.437000
|
||||||
CVE-2024-46817,0,0,dc8f68844dd932520dad6317afc3216af6f89b4cba7b42867a432814b5f55ca7,2024-09-30T12:45:57.823000
|
CVE-2024-46817,0,1,5a8208eec476849ff25de3af23936cbbaef5ec006d085abcf7c4f9c88ae2e37c,2024-11-20T17:45:43.893000
|
||||||
CVE-2024-46818,0,0,fe798b484e17caf3bda06ab6aba71d50cbde163879fa6025cdd90b9e91e24bea,2024-10-04T17:18:36.613000
|
CVE-2024-46818,0,0,fe798b484e17caf3bda06ab6aba71d50cbde163879fa6025cdd90b9e91e24bea,2024-10-04T17:18:36.613000
|
||||||
CVE-2024-46819,0,0,48d86dbd2f9dcc09d09972864acc79179bab0022e56037f99c750892b571c5b3,2024-10-04T17:11:00.570000
|
CVE-2024-46819,0,0,48d86dbd2f9dcc09d09972864acc79179bab0022e56037f99c750892b571c5b3,2024-10-04T17:11:00.570000
|
||||||
CVE-2024-4682,0,0,b188d20fdb53d2324882bc38bcdbd4c51d4b6beb562fc8362c2866e7563895e8,2024-06-04T19:20:46.140000
|
CVE-2024-4682,0,0,b188d20fdb53d2324882bc38bcdbd4c51d4b6beb562fc8362c2866e7563895e8,2024-06-04T19:20:46.140000
|
||||||
CVE-2024-46820,0,0,e02b77fbfb7c27b691f35a8ec06822e6f9168446acdd71a423d10b4bf4e98574,2024-09-30T12:45:57.823000
|
CVE-2024-46820,0,1,530ef5d90934aa384637a2025e464ca9658f0fb315dfe973fa7d8ac7dac79183,2024-11-20T17:34:05.143000
|
||||||
CVE-2024-46821,0,0,646f132e7ed27c2717e047a01ec92f6d102c4152b9e0279d740913fed403825d,2024-10-04T17:06:43.573000
|
CVE-2024-46821,0,0,646f132e7ed27c2717e047a01ec92f6d102c4152b9e0279d740913fed403825d,2024-10-04T17:06:43.573000
|
||||||
CVE-2024-46822,0,0,c8a3d9e215b85580ec5917e738992b4dc25efcf9e837d449af86f4aa8203218c,2024-10-02T14:24:01.757000
|
CVE-2024-46822,0,0,c8a3d9e215b85580ec5917e738992b4dc25efcf9e837d449af86f4aa8203218c,2024-10-02T14:24:01.757000
|
||||||
CVE-2024-46823,0,0,a167de10545a153c3d95daa6a21be068049a4c361c32c751cae65bc6ee29695c,2024-11-20T13:59:52.723000
|
CVE-2024-46823,0,0,a167de10545a153c3d95daa6a21be068049a4c361c32c751cae65bc6ee29695c,2024-11-20T13:59:52.723000
|
||||||
CVE-2024-46824,0,0,e0a90c0b6b8be6e8cdf7ea82a8f4714c063f5420a085c7bc4fdc88f4640c9615,2024-10-02T14:29:08.417000
|
CVE-2024-46824,0,0,e0a90c0b6b8be6e8cdf7ea82a8f4714c063f5420a085c7bc4fdc88f4640c9615,2024-10-02T14:29:08.417000
|
||||||
CVE-2024-46825,0,0,aa389e364217a0b9e16c3fcf17f7f0c6382d69ded44339c5aa61a7007a867b8d,2024-09-30T12:45:57.823000
|
CVE-2024-46825,0,1,489d14aa4370a6b8abf31f5b609f2e027c90ea80208491ed95bd1ab23466dbec,2024-11-20T17:24:04.660000
|
||||||
CVE-2024-46826,0,0,be734978861d0287bcd7e4a1cb0186beed982fdcb864acc473dc75997a104c25,2024-09-30T12:45:57.823000
|
CVE-2024-46826,0,1,3d93083c38eb2145a4685a9a140cc89964cd35bbc56a9be19b7147ec9ebdc9bd,2024-11-20T17:19:00.183000
|
||||||
CVE-2024-46827,0,0,40baba2ef01956ae5817a5c6c5f01915d6c37f21b62c361b4db5d49834b997d9,2024-09-30T12:45:57.823000
|
CVE-2024-46827,0,0,40baba2ef01956ae5817a5c6c5f01915d6c37f21b62c361b4db5d49834b997d9,2024-09-30T12:45:57.823000
|
||||||
CVE-2024-46828,0,0,004223b8b179cc9feb2d2821c2f255bfd0f1e8b6e2ee56da948ed2efdc61c3a4,2024-09-30T12:45:57.823000
|
CVE-2024-46828,0,0,004223b8b179cc9feb2d2821c2f255bfd0f1e8b6e2ee56da948ed2efdc61c3a4,2024-09-30T12:45:57.823000
|
||||||
CVE-2024-46829,0,0,9756f5c42072f53bba1b23c8dae157441c264939ffe910650603ebb072073237,2024-10-02T14:27:57.920000
|
CVE-2024-46829,0,0,9756f5c42072f53bba1b23c8dae157441c264939ffe910650603ebb072073237,2024-10-02T14:27:57.920000
|
||||||
@ -263656,7 +263682,7 @@ CVE-2024-47046,0,0,7869fbf4e097ddf562d122b002ca5484caa2f32ab0ccc92f893d14cc4f35f
|
|||||||
CVE-2024-47047,0,0,d8855532a1b9b01d9e7fc7225d9d8944472a4e5bcd23ab8d15e96ebcc6becd71,2024-09-27T17:03:35.507000
|
CVE-2024-47047,0,0,d8855532a1b9b01d9e7fc7225d9d8944472a4e5bcd23ab8d15e96ebcc6becd71,2024-09-27T17:03:35.507000
|
||||||
CVE-2024-47048,0,0,3e2f1651277aae0b881ff2293ea5a1adce6f7fca0dbe63c48af088557b921506,2024-09-26T17:12:07.440000
|
CVE-2024-47048,0,0,3e2f1651277aae0b881ff2293ea5a1adce6f7fca0dbe63c48af088557b921506,2024-09-26T17:12:07.440000
|
||||||
CVE-2024-47049,0,0,3e6b2d17b4e33f39069cb56c499a02c9b742796ce9abde4b775c7183f5720e70,2024-09-27T17:09:46.980000
|
CVE-2024-47049,0,0,3e6b2d17b4e33f39069cb56c499a02c9b742796ce9abde4b775c7183f5720e70,2024-09-27T17:09:46.980000
|
||||||
CVE-2024-4705,0,0,26b272539ad739bf4cdb858b2e8b5e748c64203d796935ad814b34867a2408a1,2024-07-23T21:15:15.147000
|
CVE-2024-4705,0,1,d259c4d653df071e68c221dae3247d75c673e9cf20139b6f08dcb899bfa4f077,2024-11-20T18:58:42.133000
|
||||||
CVE-2024-47050,0,0,4296aa963533e4a7521fa22cb8b50e427318f2d783af0da7884f907ad4fc085b,2024-09-27T15:29:21.450000
|
CVE-2024-47050,0,0,4296aa963533e4a7521fa22cb8b50e427318f2d783af0da7884f907ad4fc085b,2024-09-27T15:29:21.450000
|
||||||
CVE-2024-47058,0,0,1e972d8f0df7a48ab103a834b6d9eb8c181e8f51fba2eb0fd8d68faea4946bf9,2024-09-27T15:31:30.917000
|
CVE-2024-47058,0,0,1e972d8f0df7a48ab103a834b6d9eb8c181e8f51fba2eb0fd8d68faea4946bf9,2024-09-27T15:31:30.917000
|
||||||
CVE-2024-47059,0,0,1ded05aa2ea1e0adbe840bc57816abecb4dbdb9b2a551e659bc55563f7788a30,2024-09-20T12:30:17.483000
|
CVE-2024-47059,0,0,1ded05aa2ea1e0adbe840bc57816abecb4dbdb9b2a551e659bc55563f7788a30,2024-09-20T12:30:17.483000
|
||||||
@ -264157,7 +264183,7 @@ CVE-2024-47716,0,0,7f90c3731e690eada425c700cd2a01b8b54c79669e7a532a03b033a5e0cb5
|
|||||||
CVE-2024-47717,0,0,44f02bbd6ee4d2f5802475a5ee7700159b1fba306e7a83d7aea28954ffd54fae,2024-10-24T14:32:20.817000
|
CVE-2024-47717,0,0,44f02bbd6ee4d2f5802475a5ee7700159b1fba306e7a83d7aea28954ffd54fae,2024-10-24T14:32:20.817000
|
||||||
CVE-2024-47718,0,0,e21581e56d9e82562015055761ff23f151158191b649c5b5e92891e3cb7d24cd,2024-10-24T16:31:01.107000
|
CVE-2024-47718,0,0,e21581e56d9e82562015055761ff23f151158191b649c5b5e92891e3cb7d24cd,2024-10-24T16:31:01.107000
|
||||||
CVE-2024-47719,0,0,8e2d10f10d51b8d1ffdd528a275c798c335f0002db329252bde2bec15f7da284,2024-10-24T16:21:50.937000
|
CVE-2024-47719,0,0,8e2d10f10d51b8d1ffdd528a275c798c335f0002db329252bde2bec15f7da284,2024-10-24T16:21:50.937000
|
||||||
CVE-2024-4772,0,1,7c59402a2f466b2c311d92993f422b7629fb31f1d185026026451499be39f2fe,2024-11-20T16:35:26.540000
|
CVE-2024-4772,0,0,7c59402a2f466b2c311d92993f422b7629fb31f1d185026026451499be39f2fe,2024-11-20T16:35:26.540000
|
||||||
CVE-2024-47720,0,0,5042c4947e2165e57f3040e4c9baad4564addab44bedf4897d2ef5a5f6157f9a,2024-10-23T20:53:54.150000
|
CVE-2024-47720,0,0,5042c4947e2165e57f3040e4c9baad4564addab44bedf4897d2ef5a5f6157f9a,2024-10-23T20:53:54.150000
|
||||||
CVE-2024-47721,0,0,b4c62ba19409dfd2e8a64e410001d91528bd89da7482b214ac6cc576b4cc2348,2024-10-23T20:57:04.897000
|
CVE-2024-47721,0,0,b4c62ba19409dfd2e8a64e410001d91528bd89da7482b214ac6cc576b4cc2348,2024-10-23T20:57:04.897000
|
||||||
CVE-2024-47722,0,0,68c8d2f090df61a9f49a1f01f75a7ac8cda9d407591cfa0dc0a92c1e0656c53f,2024-10-21T13:15:02.360000
|
CVE-2024-47722,0,0,68c8d2f090df61a9f49a1f01f75a7ac8cda9d407591cfa0dc0a92c1e0656c53f,2024-10-21T13:15:02.360000
|
||||||
@ -264394,10 +264420,10 @@ CVE-2024-4806,0,0,f8a0e203429c4f99450a15aa6a4b26ee8c7effa68e79948138bc0eccf2af8e
|
|||||||
CVE-2024-48061,0,0,3afb2ef6eba7f21135f7c2c854e268a2fe30714157a06ae965803eb7d12a5161,2024-11-06T20:35:30.633000
|
CVE-2024-48061,0,0,3afb2ef6eba7f21135f7c2c854e268a2fe30714157a06ae965803eb7d12a5161,2024-11-06T20:35:30.633000
|
||||||
CVE-2024-48063,0,0,7dad3075f35e3bd4e2e591484ba350f38d4e17902517b9e5e6279458bc0b207a,2024-11-01T13:15:12.020000
|
CVE-2024-48063,0,0,7dad3075f35e3bd4e2e591484ba350f38d4e17902517b9e5e6279458bc0b207a,2024-11-01T13:15:12.020000
|
||||||
CVE-2024-48068,0,0,b57c66f0e06cd485d79a2746551ab3ed70890b6a1ad164f0315fd4c2e695ce9c,2024-11-18T17:11:56.587000
|
CVE-2024-48068,0,0,b57c66f0e06cd485d79a2746551ab3ed70890b6a1ad164f0315fd4c2e695ce9c,2024-11-18T17:11:56.587000
|
||||||
CVE-2024-48069,0,1,af73d11a2c5e3c4cb3bd5b8edb1af18611b09068176dd06ea45087761c48ac05,2024-11-20T16:15:21.127000
|
CVE-2024-48069,0,0,af73d11a2c5e3c4cb3bd5b8edb1af18611b09068176dd06ea45087761c48ac05,2024-11-20T16:15:21.127000
|
||||||
CVE-2024-4807,0,0,e5ccc41d46958232939be978f4766518ab72a806619364a653b00c23b63fbc68,2024-06-04T19:20:50.770000
|
CVE-2024-4807,0,0,e5ccc41d46958232939be978f4766518ab72a806619364a653b00c23b63fbc68,2024-06-04T19:20:50.770000
|
||||||
CVE-2024-48070,0,1,a8af1b10ac470446c89d2329f3abc1a5a5e5c27ec1fcb5b205ad2b24dd29f40d,2024-11-20T15:15:08.440000
|
CVE-2024-48070,0,0,a8af1b10ac470446c89d2329f3abc1a5a5e5c27ec1fcb5b205ad2b24dd29f40d,2024-11-20T15:15:08.440000
|
||||||
CVE-2024-48071,0,1,85d607e5b575e124e93fbfc228dc6959f2846f7d1bfd64e4cacda31ad5d5aa7c,2024-11-20T16:15:21.203000
|
CVE-2024-48071,0,0,85d607e5b575e124e93fbfc228dc6959f2846f7d1bfd64e4cacda31ad5d5aa7c,2024-11-20T16:15:21.203000
|
||||||
CVE-2024-48072,0,0,539e77ae1f0d95066a73e72899cd98913ded4c75f5047c35b1c5efcb115d9eb2,2024-11-19T21:56:45.533000
|
CVE-2024-48072,0,0,539e77ae1f0d95066a73e72899cd98913ded4c75f5047c35b1c5efcb115d9eb2,2024-11-19T21:56:45.533000
|
||||||
CVE-2024-48073,0,0,f808f327cec1eb1c4e50210dd8e768204bbea0c1ec8029cba6324c290353d5f5,2024-11-18T15:35:11.227000
|
CVE-2024-48073,0,0,f808f327cec1eb1c4e50210dd8e768204bbea0c1ec8029cba6324c290353d5f5,2024-11-18T15:35:11.227000
|
||||||
CVE-2024-48074,0,0,ad38eed7680db70af45f593399c08c1cb64e93854bc7fa5dd06ea3c6cdff4594,2024-11-08T22:15:20.877000
|
CVE-2024-48074,0,0,ad38eed7680db70af45f593399c08c1cb64e93854bc7fa5dd06ea3c6cdff4594,2024-11-08T22:15:20.877000
|
||||||
@ -265049,7 +265075,7 @@ CVE-2024-49558,0,0,3c676b75de26a8476d548ed8b3e232d51677ecb4a62749082177600c22312
|
|||||||
CVE-2024-4956,0,0,319b39cd7f80ef1a8cfcc633b91e7d5f141facd950994947b42a7565c106a7a4,2024-05-17T18:36:31.297000
|
CVE-2024-4956,0,0,319b39cd7f80ef1a8cfcc633b91e7d5f141facd950994947b42a7565c106a7a4,2024-05-17T18:36:31.297000
|
||||||
CVE-2024-49560,0,0,0903f1d2d4b8ea486a494eda9aaa463e3a0d845c10ed5808d6808c17d2b3d951,2024-11-15T17:35:25.407000
|
CVE-2024-49560,0,0,0903f1d2d4b8ea486a494eda9aaa463e3a0d845c10ed5808d6808c17d2b3d951,2024-11-15T17:35:25.407000
|
||||||
CVE-2024-4957,0,0,e3bb8e47c8dfba146bed7647eff25fc6cc8427bb0bd54429262b4324d627abed,2024-07-03T02:08:22.473000
|
CVE-2024-4957,0,0,e3bb8e47c8dfba146bed7647eff25fc6cc8427bb0bd54429262b4324d627abed,2024-07-03T02:08:22.473000
|
||||||
CVE-2024-49574,0,1,b617967e93da689f445f38134ba47043080cbdf46d6acc332d4ced620bedb693,2024-11-20T16:32:37.770000
|
CVE-2024-49574,0,0,b617967e93da689f445f38134ba47043080cbdf46d6acc332d4ced620bedb693,2024-11-20T16:32:37.770000
|
||||||
CVE-2024-49579,0,0,0f0dd66a3db0fe299ae55b9b0e6c22f11c400dc3ee27d05103041b63e67e9d3e,2024-11-14T19:24:45.603000
|
CVE-2024-49579,0,0,0f0dd66a3db0fe299ae55b9b0e6c22f11c400dc3ee27d05103041b63e67e9d3e,2024-11-14T19:24:45.603000
|
||||||
CVE-2024-4958,0,0,15591ba73d7708bbd560fadc0281274b5c7c2c12545797826fbf6e13e1222639,2024-06-03T14:46:24.250000
|
CVE-2024-4958,0,0,15591ba73d7708bbd560fadc0281274b5c7c2c12545797826fbf6e13e1222639,2024-06-03T14:46:24.250000
|
||||||
CVE-2024-49580,0,0,89085af96d96dbfcdc87aa1d40157bd1a1b8615e2e8f40b207dbbe916ae159de,2024-11-14T19:25:47.433000
|
CVE-2024-49580,0,0,89085af96d96dbfcdc87aa1d40157bd1a1b8615e2e8f40b207dbbe916ae159de,2024-11-14T19:25:47.433000
|
||||||
@ -265162,7 +265188,7 @@ CVE-2024-4975,0,0,d684ecfff12b84901405d8ee54394b9595e6fb8a06328936509cd0d9c15207
|
|||||||
CVE-2024-49750,0,0,a4d8c273c7d01e1dcb69ab54945d9fa3ef0aafd14a5615789a19e3567d7b1d64,2024-11-06T14:58:19.993000
|
CVE-2024-49750,0,0,a4d8c273c7d01e1dcb69ab54945d9fa3ef0aafd14a5615789a19e3567d7b1d64,2024-11-06T14:58:19.993000
|
||||||
CVE-2024-49751,0,0,ff7d052700c88a06f3721dad1b8cfae38c2356a33cba16eba3e8bf2b6f89cf9e,2024-10-25T12:56:36.827000
|
CVE-2024-49751,0,0,ff7d052700c88a06f3721dad1b8cfae38c2356a33cba16eba3e8bf2b6f89cf9e,2024-10-25T12:56:36.827000
|
||||||
CVE-2024-49753,0,0,e48f997c3307c7149c72669441f9343576b6be2cbdb15b89775e89497816dbec,2024-10-28T13:58:09.230000
|
CVE-2024-49753,0,0,e48f997c3307c7149c72669441f9343576b6be2cbdb15b89775e89497816dbec,2024-10-28T13:58:09.230000
|
||||||
CVE-2024-49754,0,1,ed2e0f19406ac25bc76a580dfaa6f8631e78c3cf326ef15ed52393e05cae3361,2024-11-20T15:02:42.683000
|
CVE-2024-49754,0,0,ed2e0f19406ac25bc76a580dfaa6f8631e78c3cf326ef15ed52393e05cae3361,2024-11-20T15:02:42.683000
|
||||||
CVE-2024-49755,0,0,b1c1713e62d1c6cff006bddd32caeacb7a00a5abd98bfdd4887a4a4fcdb0308a,2024-10-29T14:34:50.257000
|
CVE-2024-49755,0,0,b1c1713e62d1c6cff006bddd32caeacb7a00a5abd98bfdd4887a4a4fcdb0308a,2024-10-29T14:34:50.257000
|
||||||
CVE-2024-49756,0,0,17e2aa8675de07a9bb36aad326a0b90c2e6105df968303ed06bc9a1149a476bc,2024-10-25T12:56:36.827000
|
CVE-2024-49756,0,0,17e2aa8675de07a9bb36aad326a0b90c2e6105df968303ed06bc9a1149a476bc,2024-10-25T12:56:36.827000
|
||||||
CVE-2024-49757,0,0,41883c0db2190e07eb75f1500b6be8583d0953bfe5f6820811285d92db2c4bda,2024-10-28T13:58:09.230000
|
CVE-2024-49757,0,0,41883c0db2190e07eb75f1500b6be8583d0953bfe5f6820811285d92db2c4bda,2024-10-28T13:58:09.230000
|
||||||
@ -265207,7 +265233,7 @@ CVE-2024-49862,0,0,e0b25be7c75d96f390f553fe793605e2691bfb34c1e389879a3cd9200ce6c
|
|||||||
CVE-2024-49863,0,0,41eb15cefa65add4e21060b9ff62fd64839f2e02cd81a7af8fe6b7da8453fc42,2024-10-24T19:43:56.103000
|
CVE-2024-49863,0,0,41eb15cefa65add4e21060b9ff62fd64839f2e02cd81a7af8fe6b7da8453fc42,2024-10-24T19:43:56.103000
|
||||||
CVE-2024-49864,0,0,96541b20ea77eed56578d15c758ad186bec1b76c78e0506944db187153986d6b,2024-11-13T14:23:48.437000
|
CVE-2024-49864,0,0,96541b20ea77eed56578d15c758ad186bec1b76c78e0506944db187153986d6b,2024-11-13T14:23:48.437000
|
||||||
CVE-2024-49865,0,0,c4cae66eab62f15595d2364d0fa9447b0b6ab33d31dbe60340c7ef0ef852d1c8,2024-10-24T03:44:33.947000
|
CVE-2024-49865,0,0,c4cae66eab62f15595d2364d0fa9447b0b6ab33d31dbe60340c7ef0ef852d1c8,2024-10-24T03:44:33.947000
|
||||||
CVE-2024-49866,0,1,7be7bec3117c7bf135e3e4e3f53ef9223048093a28ac0b045fb0dfdd87af99c6,2024-11-20T15:56:07.807000
|
CVE-2024-49866,0,0,7be7bec3117c7bf135e3e4e3f53ef9223048093a28ac0b045fb0dfdd87af99c6,2024-11-20T15:56:07.807000
|
||||||
CVE-2024-49867,0,0,8cf0edae8c53a5633dfdab99e974869bd44d9ce40d8ab9b187966727a0a7f801,2024-11-08T16:15:29.037000
|
CVE-2024-49867,0,0,8cf0edae8c53a5633dfdab99e974869bd44d9ce40d8ab9b187966727a0a7f801,2024-11-08T16:15:29.037000
|
||||||
CVE-2024-49868,0,0,37c62afa96c12b59911ddae25d514351b0179ee480e85deb28aec35b35f691a5,2024-11-08T16:15:29.227000
|
CVE-2024-49868,0,0,37c62afa96c12b59911ddae25d514351b0179ee480e85deb28aec35b35f691a5,2024-11-08T16:15:29.227000
|
||||||
CVE-2024-49869,0,0,1ef7e6775f5061caa7e4dead4df8426a79419a75af385b7d702a23087606b23b,2024-10-24T20:28:21.597000
|
CVE-2024-49869,0,0,1ef7e6775f5061caa7e4dead4df8426a79419a75af385b7d702a23087606b23b,2024-10-24T20:28:21.597000
|
||||||
@ -265508,7 +265534,7 @@ CVE-2024-50145,0,0,9aaca4c4bd27c56de1138e3b927e1f83dfbefe24220661e4c64f210cd7f4f
|
|||||||
CVE-2024-50146,0,0,83cb2097aede05a37ed22fe91250148414614fbfbc27a9d9bf4084439218e44f,2024-11-18T21:17:20.177000
|
CVE-2024-50146,0,0,83cb2097aede05a37ed22fe91250148414614fbfbc27a9d9bf4084439218e44f,2024-11-18T21:17:20.177000
|
||||||
CVE-2024-50147,0,0,19cb78047eb77e5af1037ee9fe335e24c06d2ab34710287cdbbbd96f88dc61cf,2024-11-18T21:19:21.917000
|
CVE-2024-50147,0,0,19cb78047eb77e5af1037ee9fe335e24c06d2ab34710287cdbbbd96f88dc61cf,2024-11-18T21:19:21.917000
|
||||||
CVE-2024-50148,0,0,b78a3ca0d8d61b221cf8c735216722e85a5c8281737b5b60308b4cfdcd343cb9,2024-11-18T21:24:05.020000
|
CVE-2024-50148,0,0,b78a3ca0d8d61b221cf8c735216722e85a5c8281737b5b60308b4cfdcd343cb9,2024-11-18T21:24:05.020000
|
||||||
CVE-2024-50149,0,1,891896447125cd04cd8b365cef97b2f51516fbcfe4972f5824a7392d9a8d1ae1,2024-11-20T15:45:13.163000
|
CVE-2024-50149,0,0,891896447125cd04cd8b365cef97b2f51516fbcfe4972f5824a7392d9a8d1ae1,2024-11-20T15:45:13.163000
|
||||||
CVE-2024-5015,0,0,57e7561ea7b4a22dc47e95fb948c2e633eea845a4a10c36b8de173108bb8285f,2024-08-21T13:37:02.370000
|
CVE-2024-5015,0,0,57e7561ea7b4a22dc47e95fb948c2e633eea845a4a10c36b8de173108bb8285f,2024-08-21T13:37:02.370000
|
||||||
CVE-2024-50150,0,0,4196baec43f7736780778c168a778671c8558d06a0e2cf6ab733073a0abb416a,2024-11-08T19:01:03.880000
|
CVE-2024-50150,0,0,4196baec43f7736780778c168a778671c8558d06a0e2cf6ab733073a0abb416a,2024-11-08T19:01:03.880000
|
||||||
CVE-2024-50151,0,0,d9ce0dc9cc067e6fa22cf39a277f3e88a2611e6930bd9b5641d4f23f2714aae3,2024-11-08T19:01:03.880000
|
CVE-2024-50151,0,0,d9ce0dc9cc067e6fa22cf39a277f3e88a2611e6930bd9b5641d4f23f2714aae3,2024-11-08T19:01:03.880000
|
||||||
@ -265944,8 +265970,8 @@ CVE-2024-5065,0,0,0430cc7c42876b1507fe619bbbc6ece1ba2c878f57a5564022a1efa295cd85
|
|||||||
CVE-2024-50650,0,0,79073e45a142b2e7e0b1ffcbc4f3efa33ba6c864e47e5edadaac92d5aa2c4220,2024-11-18T17:11:56.587000
|
CVE-2024-50650,0,0,79073e45a142b2e7e0b1ffcbc4f3efa33ba6c864e47e5edadaac92d5aa2c4220,2024-11-18T17:11:56.587000
|
||||||
CVE-2024-50651,0,0,e1e29eae9615e8af1d8d4e541563c16521fb17dbf6afeff80e640e07c7702ef2,2024-11-18T17:11:56.587000
|
CVE-2024-50651,0,0,e1e29eae9615e8af1d8d4e541563c16521fb17dbf6afeff80e640e07c7702ef2,2024-11-18T17:11:56.587000
|
||||||
CVE-2024-50652,0,0,c46d900b0ec3c3d3dc69c000a8af48eff0cdc2a83f00bffa34618c3851a639e9,2024-11-18T17:11:56.587000
|
CVE-2024-50652,0,0,c46d900b0ec3c3d3dc69c000a8af48eff0cdc2a83f00bffa34618c3851a639e9,2024-11-18T17:11:56.587000
|
||||||
CVE-2024-50653,0,1,351b2ae0bb07d369ff4e76cbcc39f43676534cf729c0eb11791224a2ac34f76b,2024-11-20T15:36:20.257000
|
CVE-2024-50653,0,0,351b2ae0bb07d369ff4e76cbcc39f43676534cf729c0eb11791224a2ac34f76b,2024-11-20T15:36:20.257000
|
||||||
CVE-2024-50654,0,1,852ec98b8770e8761131177d563306c16f9d93ec13622504cc7153f7938dd76e,2024-11-20T15:27:08.580000
|
CVE-2024-50654,0,0,852ec98b8770e8761131177d563306c16f9d93ec13622504cc7153f7938dd76e,2024-11-20T15:27:08.580000
|
||||||
CVE-2024-50655,0,0,d4ec558baa450e21b64b8fb6af74e8e4b7a98438007bcf88b64f95732f73b83a,2024-11-19T21:51:00.987000
|
CVE-2024-50655,0,0,d4ec558baa450e21b64b8fb6af74e8e4b7a98438007bcf88b64f95732f73b83a,2024-11-19T21:51:00.987000
|
||||||
CVE-2024-5066,0,0,afaa043e18b083dd4b11b301517b086f80728c1a74393b687f88875df4970445,2024-05-20T13:00:34.807000
|
CVE-2024-5066,0,0,afaa043e18b083dd4b11b301517b086f80728c1a74393b687f88875df4970445,2024-05-20T13:00:34.807000
|
||||||
CVE-2024-50667,0,0,0dcbd7b35b311fe7a681d780dcbe2293327603709e31a27594acb760866d084d,2024-11-12T17:35:12.270000
|
CVE-2024-50667,0,0,0dcbd7b35b311fe7a681d780dcbe2293327603709e31a27594acb760866d084d,2024-11-12T17:35:12.270000
|
||||||
@ -266017,7 +266043,7 @@ CVE-2024-50955,0,0,8157390cc8753ab3c3dc03f615378f98ac2c1983a215bd6243bc7dc27b803
|
|||||||
CVE-2024-50956,0,0,61199958fcf25ae9206f0f8875ee79a0e783a402692b34e9d18c29f4a470b75f,2024-11-15T13:58:08.913000
|
CVE-2024-50956,0,0,61199958fcf25ae9206f0f8875ee79a0e783a402692b34e9d18c29f4a470b75f,2024-11-15T13:58:08.913000
|
||||||
CVE-2024-5096,0,0,5ed717834c38883681c6d180e391a0fccee5714f6ff3215bd896b6366e61be87,2024-06-04T19:20:58.687000
|
CVE-2024-5096,0,0,5ed717834c38883681c6d180e391a0fccee5714f6ff3215bd896b6366e61be87,2024-06-04T19:20:58.687000
|
||||||
CVE-2024-50966,0,0,c0f005c4299dd685198e56d1be45ab03ba5dbee734217c81e9ee9426dc60d25f,2024-11-08T19:01:03.880000
|
CVE-2024-50966,0,0,c0f005c4299dd685198e56d1be45ab03ba5dbee734217c81e9ee9426dc60d25f,2024-11-08T19:01:03.880000
|
||||||
CVE-2024-50968,0,0,8c4a378aa29139c2d1edfb8be9d371ec199bf37fbc913c101e94bbcd552ffb7c,2024-11-15T19:55:17.097000
|
CVE-2024-50968,0,1,865af00b0d3359238b453f9ef69955e0280211f860d95e8839fe9707addc1032,2024-11-20T17:35:28.470000
|
||||||
CVE-2024-50969,0,0,f82f81fef8a82d72e4053f9ec8030a8d4d20833c5d6be0f5bb0e03f29d0491f9,2024-11-14T14:47:53.487000
|
CVE-2024-50969,0,0,f82f81fef8a82d72e4053f9ec8030a8d4d20833c5d6be0f5bb0e03f29d0491f9,2024-11-14T14:47:53.487000
|
||||||
CVE-2024-5097,0,0,f8c17c92eeab06c631c7e3bccbcd56a5be798bb0ae3554a5ecf4b2a49f948336,2024-06-04T19:20:58.787000
|
CVE-2024-5097,0,0,f8c17c92eeab06c631c7e3bccbcd56a5be798bb0ae3554a5ecf4b2a49f948336,2024-06-04T19:20:58.787000
|
||||||
CVE-2024-50970,0,0,8dd8091efad0e3e366d58c3e5e49254ef2beed41cb2828ce8202543afc0c5fb4,2024-11-18T20:35:05.977000
|
CVE-2024-50970,0,0,8dd8091efad0e3e366d58c3e5e49254ef2beed41cb2828ce8202543afc0c5fb4,2024-11-18T20:35:05.977000
|
||||||
@ -266109,6 +266135,8 @@ CVE-2024-51152,0,0,2fc415b0efc6d5417097e1245b382b91c976aaa5917a1040e7761d3f03c4c
|
|||||||
CVE-2024-51156,0,0,950cb85b625d9788feaa8ca00bca17d1dc7f49ab66d36281c4121d0068dc7fe0,2024-11-18T18:35:06.703000
|
CVE-2024-51156,0,0,950cb85b625d9788feaa8ca00bca17d1dc7f49ab66d36281c4121d0068dc7fe0,2024-11-18T18:35:06.703000
|
||||||
CVE-2024-51157,0,0,113cde3c71891d82bf55f2d0b4674fdfc6000fe1838706cb74a6d985959d76d5,2024-11-18T15:35:13.060000
|
CVE-2024-51157,0,0,113cde3c71891d82bf55f2d0b4674fdfc6000fe1838706cb74a6d985959d76d5,2024-11-18T15:35:13.060000
|
||||||
CVE-2024-5116,0,0,8edab88198021b2d3b9901d621d1dabac4b2933945eb225d0257a88c98ac3f15,2024-06-04T19:21:00.430000
|
CVE-2024-5116,0,0,8edab88198021b2d3b9901d621d1dabac4b2933945eb225d0257a88c98ac3f15,2024-06-04T19:21:00.430000
|
||||||
|
CVE-2024-51162,1,1,1be07bd670c45a51346041c05a664e0548effc328bc31730e943243cf7caa6dd,2024-11-20T17:15:18.120000
|
||||||
|
CVE-2024-51163,1,1,2ee787ecc47f7f401ec200ba94b7e62bfd2bcdba9d49d68dcab0a0ec8127078a,2024-11-20T17:15:18.417000
|
||||||
CVE-2024-51164,0,0,ceab88983ac8f1f076554a5fc06b1fdf761a41119ff559a9cb41cb2ae46055ec,2024-11-18T17:11:56.587000
|
CVE-2024-51164,0,0,ceab88983ac8f1f076554a5fc06b1fdf761a41119ff559a9cb41cb2ae46055ec,2024-11-18T17:11:56.587000
|
||||||
CVE-2024-5117,0,0,8f71e5dda3348556d6b06143dcd47b79229dad0468d30aa7c38f8c5c1ecb8524,2024-06-04T19:21:00.547000
|
CVE-2024-5117,0,0,8f71e5dda3348556d6b06143dcd47b79229dad0468d30aa7c38f8c5c1ecb8524,2024-06-04T19:21:00.547000
|
||||||
CVE-2024-51179,0,0,1ac36b7f8ecbb6442c3e82b8bfc190a784ef1fdb6227f3a1da3d4126f204bf98,2024-11-13T20:35:10.303000
|
CVE-2024-51179,0,0,1ac36b7f8ecbb6442c3e82b8bfc190a784ef1fdb6227f3a1da3d4126f204bf98,2024-11-13T20:35:10.303000
|
||||||
@ -266122,8 +266150,8 @@ CVE-2024-51189,0,0,35e25bc3ffc29f26f90767c986f34840e3ceb43dde83583aa3e60434ef9d4
|
|||||||
CVE-2024-5119,0,0,6bb53ca9f8946448e1a7958af9df5b73fe1f36069f7b2aedbfc033eb827d83be,2024-06-04T19:21:00.657000
|
CVE-2024-5119,0,0,6bb53ca9f8946448e1a7958af9df5b73fe1f36069f7b2aedbfc033eb827d83be,2024-06-04T19:21:00.657000
|
||||||
CVE-2024-51190,0,0,02493ace343d801c2c96f83a09a920c8f88e12adfc58225d3b0b4f5c18c7e600,2024-11-12T13:55:21.227000
|
CVE-2024-51190,0,0,02493ace343d801c2c96f83a09a920c8f88e12adfc58225d3b0b4f5c18c7e600,2024-11-12T13:55:21.227000
|
||||||
CVE-2024-5120,0,0,512e5b032e12a79292f06756f99bf223a47a4b934de5206e20b5529b01ef61b6,2024-06-04T19:21:00.760000
|
CVE-2024-5120,0,0,512e5b032e12a79292f06756f99bf223a47a4b934de5206e20b5529b01ef61b6,2024-06-04T19:21:00.760000
|
||||||
CVE-2024-51208,1,1,df2a346078976c37c3e2589a200578b6dbb4bfd9da8ccfe7b8c6899da1f48450,2024-11-20T15:15:08.740000
|
CVE-2024-51208,0,0,df2a346078976c37c3e2589a200578b6dbb4bfd9da8ccfe7b8c6899da1f48450,2024-11-20T15:15:08.740000
|
||||||
CVE-2024-51209,1,1,5193df27fee0b78bbdc7c2b1f184598c324815ff66602ff4d95528a6d5d80cc4,2024-11-20T15:15:08.830000
|
CVE-2024-51209,0,0,5193df27fee0b78bbdc7c2b1f184598c324815ff66602ff4d95528a6d5d80cc4,2024-11-20T15:15:08.830000
|
||||||
CVE-2024-5121,0,0,98477bc3a7c67683bd43da705ad15db6f590ce85a12aaf89110d94461e6c3bdb,2024-06-04T19:21:00.860000
|
CVE-2024-5121,0,0,98477bc3a7c67683bd43da705ad15db6f590ce85a12aaf89110d94461e6c3bdb,2024-06-04T19:21:00.860000
|
||||||
CVE-2024-51211,0,0,581556a1bd92632bbd04cf9aebe233d1f5e96f417c538ff40e3ed80078a79ca9,2024-11-12T13:56:54.483000
|
CVE-2024-51211,0,0,581556a1bd92632bbd04cf9aebe233d1f5e96f417c538ff40e3ed80078a79ca9,2024-11-12T13:56:54.483000
|
||||||
CVE-2024-51213,0,0,a598a44042c959028b27d1b964937a81a14ecccc57789a4658084176eb433102,2024-11-12T18:35:33.433000
|
CVE-2024-51213,0,0,a598a44042c959028b27d1b964937a81a14ecccc57789a4658084176eb433102,2024-11-12T18:35:33.433000
|
||||||
@ -266504,7 +266532,7 @@ CVE-2024-51810,0,0,549393ef55bfeaa10bacf5eab19a7f288a29ac42cef384d88f5eedcb45180
|
|||||||
CVE-2024-51811,0,0,c3aeb720a545e51755d532198c2abdc83efba780e137ef31bb72259e442a2dac,2024-11-19T21:57:32.967000
|
CVE-2024-51811,0,0,c3aeb720a545e51755d532198c2abdc83efba780e137ef31bb72259e442a2dac,2024-11-19T21:57:32.967000
|
||||||
CVE-2024-51812,0,0,02f43140d289864be158795111468c5df6a7496f2148e1822f8482211ec782b2,2024-11-19T21:57:32.967000
|
CVE-2024-51812,0,0,02f43140d289864be158795111468c5df6a7496f2148e1822f8482211ec782b2,2024-11-19T21:57:32.967000
|
||||||
CVE-2024-51813,0,0,881717fa3ecd7ac7d0617f645bf9efe6c17eaa1fcf36e99fe920e6653b9955d9,2024-11-19T21:57:32.967000
|
CVE-2024-51813,0,0,881717fa3ecd7ac7d0617f645bf9efe6c17eaa1fcf36e99fe920e6653b9955d9,2024-11-19T21:57:32.967000
|
||||||
CVE-2024-51814,0,1,dbff728a4bb725cd61a55f9b86a3b2cfa71283c788fbc8b18818e13bf895164f,2024-11-20T15:15:09.277000
|
CVE-2024-51814,0,0,dbff728a4bb725cd61a55f9b86a3b2cfa71283c788fbc8b18818e13bf895164f,2024-11-20T15:15:09.277000
|
||||||
CVE-2024-51816,0,0,8fc70476a3889656ef33f9afbdbb737c9f6e4b707f3dcc28c9ce574c6061d052,2024-11-19T21:57:32.967000
|
CVE-2024-51816,0,0,8fc70476a3889656ef33f9afbdbb737c9f6e4b707f3dcc28c9ce574c6061d052,2024-11-19T21:57:32.967000
|
||||||
CVE-2024-51817,0,0,20f680e52bd4285719fadbc157e923760b56af7bafeb285f28103b1939afa9d0,2024-11-19T21:57:32.967000
|
CVE-2024-51817,0,0,20f680e52bd4285719fadbc157e923760b56af7bafeb285f28103b1939afa9d0,2024-11-19T21:57:32.967000
|
||||||
CVE-2024-51819,0,0,bec0915328d873462a4ad31df1c7c2e51d312796bf4ba393de43d362e9dec6da,2024-11-19T21:57:32.967000
|
CVE-2024-51819,0,0,bec0915328d873462a4ad31df1c7c2e51d312796bf4ba393de43d362e9dec6da,2024-11-19T21:57:32.967000
|
||||||
@ -266727,7 +266755,7 @@ CVE-2024-52303,0,0,57a6450ca3f2acaad0d7a5708a267a8f541a38de3d501010a97d19dc2553c
|
|||||||
CVE-2024-52304,0,0,0a277b5748fc03086c52a906e139b6d4003ef5456e902af6a142f3fb7ee5873a,2024-11-19T21:57:32.967000
|
CVE-2024-52304,0,0,0a277b5748fc03086c52a906e139b6d4003ef5456e902af6a142f3fb7ee5873a,2024-11-19T21:57:32.967000
|
||||||
CVE-2024-52305,0,0,fb3e1fe1f55433965f9f85cb35ad56a3033a246ddb638ca95e4c6fc4285767e7,2024-11-19T18:04:12.680000
|
CVE-2024-52305,0,0,fb3e1fe1f55433965f9f85cb35ad56a3033a246ddb638ca95e4c6fc4285767e7,2024-11-19T18:04:12.680000
|
||||||
CVE-2024-52306,0,0,dfac1396e024093252f9cdf330e5f0eab10833af9a739a326458e40b25c9c7da,2024-11-19T15:02:45.053000
|
CVE-2024-52306,0,0,dfac1396e024093252f9cdf330e5f0eab10833af9a739a326458e40b25c9c7da,2024-11-19T15:02:45.053000
|
||||||
CVE-2024-52308,0,1,0db58aa0fd04755222aa7bdf601c835c719685fb73c2d21a31da5f6db6051fd8,2024-11-20T15:07:43.127000
|
CVE-2024-52308,0,0,0db58aa0fd04755222aa7bdf601c835c719685fb73c2d21a31da5f6db6051fd8,2024-11-20T15:07:43.127000
|
||||||
CVE-2024-5231,0,0,255bed42ab2a064a39e6f8c88880296d2f7a7d154f3db6dc7f4df2fa244d299f,2024-06-04T19:21:02.640000
|
CVE-2024-5231,0,0,255bed42ab2a064a39e6f8c88880296d2f7a7d154f3db6dc7f4df2fa244d299f,2024-06-04T19:21:02.640000
|
||||||
CVE-2024-52311,0,0,440cc6f6193f2a4b57d7c7c4a4f4b3f01242ca6df6bc89770050e09d3b499acf,2024-11-12T13:56:54.483000
|
CVE-2024-52311,0,0,440cc6f6193f2a4b57d7c7c4a4f4b3f01242ca6df6bc89770050e09d3b499acf,2024-11-12T13:56:54.483000
|
||||||
CVE-2024-52312,0,0,e095caa38b1d55aa1661d9e6b591e2f5164609c3e5c2884b5f60aa22d851bdcc,2024-11-12T13:56:54.483000
|
CVE-2024-52312,0,0,e095caa38b1d55aa1661d9e6b591e2f5164609c3e5c2884b5f60aa22d851bdcc,2024-11-12T13:56:54.483000
|
||||||
@ -266796,7 +266824,7 @@ CVE-2024-52398,0,0,e5bdf8bd1e6e6ba29b95e6bd3948deedce03b788ce3b7c86fbe57b02a2d81
|
|||||||
CVE-2024-52399,0,0,07c7cf273d38fdbaf95ad790ac160d741defdb72f19d4c82c904f30f440acdc0,2024-11-18T17:11:17.393000
|
CVE-2024-52399,0,0,07c7cf273d38fdbaf95ad790ac160d741defdb72f19d4c82c904f30f440acdc0,2024-11-18T17:11:17.393000
|
||||||
CVE-2024-5240,0,0,f498b44970022e280094b55bfe8352214cc561bf319f52e66772660c36836426,2024-06-04T19:21:03.623000
|
CVE-2024-5240,0,0,f498b44970022e280094b55bfe8352214cc561bf319f52e66772660c36836426,2024-06-04T19:21:03.623000
|
||||||
CVE-2024-52400,0,0,44b0790e8e233d5851b26d34fd4519ebdf170be728fb130b9b94645b40759b20,2024-11-18T17:11:17.393000
|
CVE-2024-52400,0,0,44b0790e8e233d5851b26d34fd4519ebdf170be728fb130b9b94645b40759b20,2024-11-18T17:11:17.393000
|
||||||
CVE-2024-52401,0,1,3c7ad87ad1fb28107d2ad7c694246e1a6d2d5c20b770ace549f2906e31aa19ab,2024-11-20T15:15:10.653000
|
CVE-2024-52401,0,0,3c7ad87ad1fb28107d2ad7c694246e1a6d2d5c20b770ace549f2906e31aa19ab,2024-11-20T15:15:10.653000
|
||||||
CVE-2024-52402,0,0,143e1d780eb37d2cde5443a043c2a644572b3c77f04f98f0ee533952e691736e,2024-11-19T21:56:45.533000
|
CVE-2024-52402,0,0,143e1d780eb37d2cde5443a043c2a644572b3c77f04f98f0ee533952e691736e,2024-11-19T21:56:45.533000
|
||||||
CVE-2024-52403,0,0,6aa15ef348a999b51ff4538558f3d975f3457a7b8bb81fab35d4412a585a766a,2024-11-18T17:11:17.393000
|
CVE-2024-52403,0,0,6aa15ef348a999b51ff4538558f3d975f3457a7b8bb81fab35d4412a585a766a,2024-11-18T17:11:17.393000
|
||||||
CVE-2024-52404,0,0,48dc8a2f2e6059d5ac0938582d5d8d22444e4b63438da11dae47f3bbf5cb3c07,2024-11-18T17:11:17.393000
|
CVE-2024-52404,0,0,48dc8a2f2e6059d5ac0938582d5d8d22444e4b63438da11dae47f3bbf5cb3c07,2024-11-18T17:11:17.393000
|
||||||
@ -266815,26 +266843,26 @@ CVE-2024-52415,0,0,f21cef685cb9331554c3a9593db27e3c461879e2157c0326f8a0ec52f296f
|
|||||||
CVE-2024-52416,0,0,772b2f7a98d658000abbec2309afddbd39b233f5dbc3890f465aff8777803c32,2024-11-18T17:11:17.393000
|
CVE-2024-52416,0,0,772b2f7a98d658000abbec2309afddbd39b233f5dbc3890f465aff8777803c32,2024-11-18T17:11:17.393000
|
||||||
CVE-2024-52417,0,0,85192d1e85503352c4fa9586bbe5bef1781cb507ba5ab8dae01705d4a6d80653,2024-11-19T21:57:32.967000
|
CVE-2024-52417,0,0,85192d1e85503352c4fa9586bbe5bef1781cb507ba5ab8dae01705d4a6d80653,2024-11-19T21:57:32.967000
|
||||||
CVE-2024-52418,0,0,cae0ff9c02a75dad97a46113c435b978bb74fdddf4e4c8ecf64aca8dd516f659,2024-11-19T21:57:32.967000
|
CVE-2024-52418,0,0,cae0ff9c02a75dad97a46113c435b978bb74fdddf4e4c8ecf64aca8dd516f659,2024-11-19T21:57:32.967000
|
||||||
CVE-2024-52419,0,1,cea9862b38881ee6b8ea0656d923448e377d2bec00aea399743cad62336d258c,2024-11-20T15:18:20.727000
|
CVE-2024-52419,0,0,cea9862b38881ee6b8ea0656d923448e377d2bec00aea399743cad62336d258c,2024-11-20T15:18:20.727000
|
||||||
CVE-2024-5242,0,0,8cd95bcd77d40a92ee0a6d389bf812b544cb6fb4b8301f7049b84de17fceaeef,2024-05-24T01:15:30.977000
|
CVE-2024-5242,0,0,8cd95bcd77d40a92ee0a6d389bf812b544cb6fb4b8301f7049b84de17fceaeef,2024-05-24T01:15:30.977000
|
||||||
CVE-2024-52420,0,0,2cb30faa86447010f6f2c0a8bab5654f0c634929245006dc4c54ed00602072a3,2024-11-19T21:56:45.533000
|
CVE-2024-52420,0,0,2cb30faa86447010f6f2c0a8bab5654f0c634929245006dc4c54ed00602072a3,2024-11-19T21:56:45.533000
|
||||||
CVE-2024-52421,0,0,62d805b3a16a7d18da43ffdb2dfc842acf3a47153a56546b0066b2d5d56af31f,2024-11-19T21:56:45.533000
|
CVE-2024-52421,0,0,62d805b3a16a7d18da43ffdb2dfc842acf3a47153a56546b0066b2d5d56af31f,2024-11-19T21:56:45.533000
|
||||||
CVE-2024-52422,0,1,2ca19a7331492f34d75873cb2d5c1dafe58aa3a24e659a2cfde08f4411481dc0,2024-11-20T15:12:06.680000
|
CVE-2024-52422,0,0,2ca19a7331492f34d75873cb2d5c1dafe58aa3a24e659a2cfde08f4411481dc0,2024-11-20T15:12:06.680000
|
||||||
CVE-2024-52423,0,0,4396d7f62487e6daaec36d37ec8194b9098b85e3bfa891916208754cb6abb9dd,2024-11-20T14:56:13.147000
|
CVE-2024-52423,0,0,4396d7f62487e6daaec36d37ec8194b9098b85e3bfa891916208754cb6abb9dd,2024-11-20T14:56:13.147000
|
||||||
CVE-2024-52424,0,0,92c7a4f694477b0c4adbf5f52c44f2bc67a72e6754c53ddf12883836fcf8fd5a,2024-11-20T14:47:46.877000
|
CVE-2024-52424,0,0,92c7a4f694477b0c4adbf5f52c44f2bc67a72e6754c53ddf12883836fcf8fd5a,2024-11-20T14:47:46.877000
|
||||||
CVE-2024-52425,0,0,7b79e59d5c7916ff5a38769e37eb8655b09a371aae55a8bf43184161ecda71f0,2024-11-20T14:43:05.467000
|
CVE-2024-52425,0,0,7b79e59d5c7916ff5a38769e37eb8655b09a371aae55a8bf43184161ecda71f0,2024-11-20T14:43:05.467000
|
||||||
CVE-2024-52426,0,0,6b0290274d67e9fe59d70ab5f7cef8b5ed4ca1da67db6eea39b93bfd596fc737,2024-11-20T14:41:43.077000
|
CVE-2024-52426,0,0,6b0290274d67e9fe59d70ab5f7cef8b5ed4ca1da67db6eea39b93bfd596fc737,2024-11-20T14:41:43.077000
|
||||||
CVE-2024-52427,0,1,19fb87879ffe0765091721b1721c69ddde5ae8f201b5abfc1afd7c1d504d191d,2024-11-20T15:29:52.547000
|
CVE-2024-52427,0,0,19fb87879ffe0765091721b1721c69ddde5ae8f201b5abfc1afd7c1d504d191d,2024-11-20T15:29:52.547000
|
||||||
CVE-2024-52428,0,1,fb188838fd4b584d30f7a0b1f1794defe447087a9181233dcfb5d3d6bb70449b,2024-11-20T15:29:38.023000
|
CVE-2024-52428,0,0,fb188838fd4b584d30f7a0b1f1794defe447087a9181233dcfb5d3d6bb70449b,2024-11-20T15:29:38.023000
|
||||||
CVE-2024-52429,0,1,22348abd476cc3deaf038c9d20773ea7e6adc045d0a8ad1a514552038aad0671,2024-11-20T15:28:21.680000
|
CVE-2024-52429,0,0,22348abd476cc3deaf038c9d20773ea7e6adc045d0a8ad1a514552038aad0671,2024-11-20T15:28:21.680000
|
||||||
CVE-2024-5243,0,0,a611ca30664e8a20900f5d6960dcfa388a8eac21aa2051106052824f1ce073bc,2024-05-24T01:15:30.977000
|
CVE-2024-5243,0,0,a611ca30664e8a20900f5d6960dcfa388a8eac21aa2051106052824f1ce073bc,2024-05-24T01:15:30.977000
|
||||||
CVE-2024-52430,0,1,5c8f5e9ed9795fbb23c4b2af30568215fb8e78b82ee4fefcbb6f90468ecba679,2024-11-20T15:27:58.350000
|
CVE-2024-52430,0,0,5c8f5e9ed9795fbb23c4b2af30568215fb8e78b82ee4fefcbb6f90468ecba679,2024-11-20T15:27:58.350000
|
||||||
CVE-2024-52431,0,1,4111ae9ee1fc8271b2e0856133a91dad6a035a0629f2d6af466b323a807dddc2,2024-11-20T15:27:25.293000
|
CVE-2024-52431,0,0,4111ae9ee1fc8271b2e0856133a91dad6a035a0629f2d6af466b323a807dddc2,2024-11-20T15:27:25.293000
|
||||||
CVE-2024-52432,0,1,3d020550d230219b3bf489dbe4f3c6f0330e3ef76b109b62ef57197fa5e4c402,2024-11-20T15:26:15.960000
|
CVE-2024-52432,0,0,3d020550d230219b3bf489dbe4f3c6f0330e3ef76b109b62ef57197fa5e4c402,2024-11-20T15:26:15.960000
|
||||||
CVE-2024-52433,0,1,bf2117fcbe51caaa01114d280e0327217823e633d55614af9e7dacab1dcdb932,2024-11-20T15:25:17.773000
|
CVE-2024-52433,0,0,bf2117fcbe51caaa01114d280e0327217823e633d55614af9e7dacab1dcdb932,2024-11-20T15:25:17.773000
|
||||||
CVE-2024-52434,0,1,c085f289e188d8008b27027b8f717d061311a552ad3167d24e698385cfa3bd00,2024-11-20T16:04:10.167000
|
CVE-2024-52434,0,0,c085f289e188d8008b27027b8f717d061311a552ad3167d24e698385cfa3bd00,2024-11-20T16:04:10.167000
|
||||||
CVE-2024-52435,0,1,d0a29e7c15c68c2532e6f36ed9da42be9924024a5537b89a4d72ef6ecfb3d73a,2024-11-20T16:58:35.240000
|
CVE-2024-52435,0,0,d0a29e7c15c68c2532e6f36ed9da42be9924024a5537b89a4d72ef6ecfb3d73a,2024-11-20T16:58:35.240000
|
||||||
CVE-2024-52436,0,1,e25c8bbc379b77ff7dca583cec44c8ab4569d5bf3e8acf17e857cd5bd01300d7,2024-11-20T15:24:35.470000
|
CVE-2024-52436,0,0,e25c8bbc379b77ff7dca583cec44c8ab4569d5bf3e8acf17e857cd5bd01300d7,2024-11-20T15:24:35.470000
|
||||||
CVE-2024-52437,0,0,919f311130b57eebb1d1dd68fdcabc4aced488ca04d6d661b5497a46423dde5f,2024-11-20T12:15:19.133000
|
CVE-2024-52437,0,0,919f311130b57eebb1d1dd68fdcabc4aced488ca04d6d661b5497a46423dde5f,2024-11-20T12:15:19.133000
|
||||||
CVE-2024-52438,0,0,7cbfd43b78eb199a9384650d6e0ae42f64cd4f7239f83b963194d5c836b70846,2024-11-20T12:15:19.390000
|
CVE-2024-52438,0,0,7cbfd43b78eb199a9384650d6e0ae42f64cd4f7239f83b963194d5c836b70846,2024-11-20T12:15:19.390000
|
||||||
CVE-2024-52439,0,0,6d190c01571ed430526e0001854eecb6d513a994b9acb9f04b30037c5db18ae6,2024-11-20T12:15:19.637000
|
CVE-2024-52439,0,0,6d190c01571ed430526e0001854eecb6d513a994b9acb9f04b30037c5db18ae6,2024-11-20T12:15:19.637000
|
||||||
@ -266854,10 +266882,10 @@ CVE-2024-52450,0,0,002d848f8b202503bc5f349083e6360328b5ca35b8e488d4cb20477667418
|
|||||||
CVE-2024-52451,0,0,c4dda19ad903fd6f4cd91db91be4b7e0b1f40513a3624be5b88bb657ca6869ae,2024-11-20T12:15:22.427000
|
CVE-2024-52451,0,0,c4dda19ad903fd6f4cd91db91be4b7e0b1f40513a3624be5b88bb657ca6869ae,2024-11-20T12:15:22.427000
|
||||||
CVE-2024-5246,0,0,481ebf23b779dd3e32e9e0cda77aaee7d0bfc9eca82266cde6c77415f4c9c730,2024-07-03T02:08:44.767000
|
CVE-2024-5246,0,0,481ebf23b779dd3e32e9e0cda77aaee7d0bfc9eca82266cde6c77415f4c9c730,2024-07-03T02:08:44.767000
|
||||||
CVE-2024-5247,0,0,fdfe6c1388c42f602cdcb0ffda38b56b5f1ed960e60bfada435f42d294b2956e,2024-05-24T01:15:30.977000
|
CVE-2024-5247,0,0,fdfe6c1388c42f602cdcb0ffda38b56b5f1ed960e60bfada435f42d294b2956e,2024-05-24T01:15:30.977000
|
||||||
CVE-2024-52470,1,1,1056a8e921e929245f25b46d1b7e1a435f2ea3ebf136056d5c86cf3721d0fcd8,2024-11-20T15:15:10.810000
|
CVE-2024-52470,0,0,1056a8e921e929245f25b46d1b7e1a435f2ea3ebf136056d5c86cf3721d0fcd8,2024-11-20T15:15:10.810000
|
||||||
CVE-2024-52471,1,1,d8b300ef69bfcbcb29a9b3cfe811f085cc9237972a5d7ecbe7073758ecdf12a9,2024-11-20T15:15:11.010000
|
CVE-2024-52471,0,0,d8b300ef69bfcbcb29a9b3cfe811f085cc9237972a5d7ecbe7073758ecdf12a9,2024-11-20T15:15:11.010000
|
||||||
CVE-2024-52472,1,1,ce2cab3222d8b621b2ba91024fe7494b0185a8ad2ea776f56b82d385cdb5d210,2024-11-20T15:15:11.237000
|
CVE-2024-52472,0,0,ce2cab3222d8b621b2ba91024fe7494b0185a8ad2ea776f56b82d385cdb5d210,2024-11-20T15:15:11.237000
|
||||||
CVE-2024-52473,1,1,5130e33c6a3f3d98a0fc58c19aa3c06c52bf935b44f029d120d52d53c95d1f26,2024-11-20T15:15:11.443000
|
CVE-2024-52473,0,0,5130e33c6a3f3d98a0fc58c19aa3c06c52bf935b44f029d120d52d53c95d1f26,2024-11-20T15:15:11.443000
|
||||||
CVE-2024-5248,0,0,6cfa5cec6de457c13d7096887dc7c2d8bd99f0e898238886822e69d1ee66037e,2024-11-03T17:15:14.860000
|
CVE-2024-5248,0,0,6cfa5cec6de457c13d7096887dc7c2d8bd99f0e898238886822e69d1ee66037e,2024-11-03T17:15:14.860000
|
||||||
CVE-2024-5249,0,0,7881e207dd06fe76500d559735f87b1084a494789351514ee988debe74e79673,2024-10-01T14:26:17.410000
|
CVE-2024-5249,0,0,7881e207dd06fe76500d559735f87b1084a494789351514ee988debe74e79673,2024-10-01T14:26:17.410000
|
||||||
CVE-2024-5250,0,0,b4b370273f1fe30d94b715ad219dda570a7dcb84192abd50c3cb746299bdbb93,2024-10-01T14:33:47.727000
|
CVE-2024-5250,0,0,b4b370273f1fe30d94b715ad219dda570a7dcb84192abd50c3cb746299bdbb93,2024-10-01T14:33:47.727000
|
||||||
@ -266921,11 +266949,11 @@ CVE-2024-52587,0,0,4ff6d32c0cce5d4db211ff88731438a9a256421cd5f2b2cabeafbdadc8a29
|
|||||||
CVE-2024-5259,0,0,b3c664cd11ddb9db1b34b50011b18499fc5ac06e8b6b6a588e8cf7d8bc26fc37,2024-06-11T17:44:42.783000
|
CVE-2024-5259,0,0,b3c664cd11ddb9db1b34b50011b18499fc5ac06e8b6b6a588e8cf7d8bc26fc37,2024-06-11T17:44:42.783000
|
||||||
CVE-2024-52595,0,0,9350e5c85067e132d51c2548051208f53f3e040f154d457bd6c129e1523fcb4c,2024-11-19T22:15:21.120000
|
CVE-2024-52595,0,0,9350e5c85067e132d51c2548051208f53f3e040f154d457bd6c129e1523fcb4c,2024-11-19T22:15:21.120000
|
||||||
CVE-2024-52597,0,0,0dc15f04b10696c300efbe4aac63baeff7d573b005de682671a7397a19d8fe4d,2024-11-20T14:15:17.967000
|
CVE-2024-52597,0,0,0dc15f04b10696c300efbe4aac63baeff7d573b005de682671a7397a19d8fe4d,2024-11-20T14:15:17.967000
|
||||||
CVE-2024-52598,1,1,477258740433139def022fa49fc642fb7eea1c94a8945d9797525cab03b121cb,2024-11-20T15:15:11.667000
|
CVE-2024-52598,0,0,477258740433139def022fa49fc642fb7eea1c94a8945d9797525cab03b121cb,2024-11-20T15:15:11.667000
|
||||||
CVE-2024-5260,0,0,1ea9956e2812efb1ad02a50e6e15b3c5419e86ea96923b6afc83449c65511582,2024-07-02T12:09:16.907000
|
CVE-2024-5260,0,0,1ea9956e2812efb1ad02a50e6e15b3c5419e86ea96923b6afc83449c65511582,2024-07-02T12:09:16.907000
|
||||||
CVE-2024-52600,0,0,889882d763fff118298a79c0992b9d094668285ba42b3979d1acce7319312517,2024-11-19T21:56:45.533000
|
CVE-2024-52600,0,0,889882d763fff118298a79c0992b9d094668285ba42b3979d1acce7319312517,2024-11-19T21:56:45.533000
|
||||||
CVE-2024-5261,0,0,0592ac8c89e0cb8027f6648912b9536cab36db7fb70868109d4e1f51168ecc2f,2024-06-25T18:50:42.040000
|
CVE-2024-5261,0,0,0592ac8c89e0cb8027f6648912b9536cab36db7fb70868109d4e1f51168ecc2f,2024-06-25T18:50:42.040000
|
||||||
CVE-2024-52613,0,0,459074184075f7287395d99f0f5a393f7f6f3bf8fc38dc9383b0dd34b217716c,2024-11-19T20:39:42.197000
|
CVE-2024-52613,0,1,5250f63c9c5511452022eabcd6488c8c26c81f478ff3445bc230db37173dd9d3,2024-11-20T17:35:28.730000
|
||||||
CVE-2024-52614,0,0,691c38d1248080ff09180daa940a0ea35464380839e23dd93b5188ae19dfbdb8,2024-11-20T06:15:16.023000
|
CVE-2024-52614,0,0,691c38d1248080ff09180daa940a0ea35464380839e23dd93b5188ae19dfbdb8,2024-11-20T06:15:16.023000
|
||||||
CVE-2024-5262,0,0,83603483afb7387d019b476baa2cae004e6d4e7f9b65a5997b6545bcd7a41b63,2024-06-11T17:18:50.600000
|
CVE-2024-5262,0,0,83603483afb7387d019b476baa2cae004e6d4e7f9b65a5997b6545bcd7a41b63,2024-06-11T17:18:50.600000
|
||||||
CVE-2024-5263,0,0,997be873c6f28955b5d0d8cb5df3c06ebeb17c50a7068003806eac08a0ed2846,2024-08-07T16:01:35.217000
|
CVE-2024-5263,0,0,997be873c6f28955b5d0d8cb5df3c06ebeb17c50a7068003806eac08a0ed2846,2024-08-07T16:01:35.217000
|
||||||
@ -266941,18 +266969,24 @@ CVE-2024-5271,0,0,7285855bafca9dd1fc033351db47cae9ea7831aeb2f80b9313f86f9100e15f
|
|||||||
CVE-2024-52711,0,0,78721fa26ebd510269586a73a1d757b8cf5c952035a30436ca3be9b5757e4b65,2024-11-19T21:57:32.967000
|
CVE-2024-52711,0,0,78721fa26ebd510269586a73a1d757b8cf5c952035a30436ca3be9b5757e4b65,2024-11-19T21:57:32.967000
|
||||||
CVE-2024-52714,0,0,658ca957fccc95dcf66f192b351e1eb1aa79e66fe1fbde58b681eba4d3166214,2024-11-19T21:56:45.533000
|
CVE-2024-52714,0,0,658ca957fccc95dcf66f192b351e1eb1aa79e66fe1fbde58b681eba4d3166214,2024-11-19T21:56:45.533000
|
||||||
CVE-2024-5272,0,0,d387d985ee64cb70308558e1288744b27040b8f28ef99da7e8b0a0af44167dd6,2024-05-28T12:39:28.377000
|
CVE-2024-5272,0,0,d387d985ee64cb70308558e1288744b27040b8f28ef99da7e8b0a0af44167dd6,2024-05-28T12:39:28.377000
|
||||||
|
CVE-2024-52725,1,1,33f6fa34c3dd7f326aa8525752182246593fbe26f97c40f7481f5dc188051048,2024-11-20T17:15:18.867000
|
||||||
CVE-2024-5273,0,0,098baedadde55d65116b7be974965fe184b3495f86a75c5fc729e60404fd76e0,2024-11-07T15:35:14.380000
|
CVE-2024-5273,0,0,098baedadde55d65116b7be974965fe184b3495f86a75c5fc729e60404fd76e0,2024-11-07T15:35:14.380000
|
||||||
|
CVE-2024-52739,1,1,101c0b9876bf858a76409f50d2e2d09af749568b9decaf9de2879046e254c2a3,2024-11-20T18:15:23.393000
|
||||||
CVE-2024-5274,0,0,e7d74c38d2c202c949e1ef012213e640b18c31c48483d84bb8a4761d2997d225,2024-08-14T17:07:13.270000
|
CVE-2024-5274,0,0,e7d74c38d2c202c949e1ef012213e640b18c31c48483d84bb8a4761d2997d225,2024-08-14T17:07:13.270000
|
||||||
CVE-2024-5275,0,0,0a8f92936fd54cfeba80497afbb5044228db5d667d0dcb3a75c34af54c4c0fca,2024-06-20T12:44:01.637000
|
CVE-2024-5275,0,0,0a8f92936fd54cfeba80497afbb5044228db5d667d0dcb3a75c34af54c4c0fca,2024-06-20T12:44:01.637000
|
||||||
CVE-2024-52759,0,0,80eaed11a6f63280332e88d3cbf4b0530a8471b6b3c6b18c568aa62f2956ad50,2024-11-19T21:56:45.533000
|
CVE-2024-52759,0,0,80eaed11a6f63280332e88d3cbf4b0530a8471b6b3c6b18c568aa62f2956ad50,2024-11-19T21:56:45.533000
|
||||||
CVE-2024-5276,0,0,b98c8bf623aeff1994feca32cb34066ea8ef6a81fb35099972c112f59613dd44,2024-06-26T12:44:29.693000
|
CVE-2024-5276,0,0,b98c8bf623aeff1994feca32cb34066ea8ef6a81fb35099972c112f59613dd44,2024-06-26T12:44:29.693000
|
||||||
CVE-2024-52762,0,0,353c63bf6aa3aeb3f0cdcf47d86962135e93381335c1d6bdfca45cd78f17fe81,2024-11-19T21:56:45.533000
|
CVE-2024-52762,0,0,353c63bf6aa3aeb3f0cdcf47d86962135e93381335c1d6bdfca45cd78f17fe81,2024-11-19T21:56:45.533000
|
||||||
CVE-2024-52763,0,0,c5573017d062db00f6bed25c6759761baf5200224a59e32fc8cc1b829343cac2,2024-11-19T21:56:45.533000
|
CVE-2024-52763,0,0,c5573017d062db00f6bed25c6759761baf5200224a59e32fc8cc1b829343cac2,2024-11-19T21:56:45.533000
|
||||||
|
CVE-2024-52769,1,1,b6cb45d7326db7c74bf072246ac67a1dfffc75d7966f0886ca77640876da3fd2,2024-11-20T17:15:19.907000
|
||||||
CVE-2024-5277,0,0,c22b3e398c55d24f660b1a45a3310a9c6b0abef458e72374f87af318fc09202a,2024-10-09T14:49:25.753000
|
CVE-2024-5277,0,0,c22b3e398c55d24f660b1a45a3310a9c6b0abef458e72374f87af318fc09202a,2024-10-09T14:49:25.753000
|
||||||
|
CVE-2024-52770,1,1,7aa9649a9670c716ce311ac92684885a9b795e1a2574f48cc59bb70ef562262a,2024-11-20T17:15:20.200000
|
||||||
|
CVE-2024-52771,1,1,5216faefced1eff97e71e61bc18807aec97654fb9fefe72a0573a6ba693a0484,2024-11-20T17:15:20.637000
|
||||||
CVE-2024-5278,0,0,f0307415163f20adf37f2c92a0ed4578caa6aa4e699bedaa3aae52fa3124b77a,2024-10-17T13:56:49.813000
|
CVE-2024-5278,0,0,f0307415163f20adf37f2c92a0ed4578caa6aa4e699bedaa3aae52fa3124b77a,2024-10-17T13:56:49.813000
|
||||||
CVE-2024-52788,0,0,10422e316ff1cd1c42e0724b49036642b5ea260660f059be4278fcd3695d7b6c,2024-11-19T21:56:45.533000
|
CVE-2024-52788,0,0,10422e316ff1cd1c42e0724b49036642b5ea260660f059be4278fcd3695d7b6c,2024-11-19T21:56:45.533000
|
||||||
CVE-2024-52789,0,0,f36dc0a54a71530ea75878243901cd19d9ac10d089d77a73bd61490fb92dd90d,2024-11-19T21:56:45.533000
|
CVE-2024-52789,0,0,f36dc0a54a71530ea75878243901cd19d9ac10d089d77a73bd61490fb92dd90d,2024-11-19T21:56:45.533000
|
||||||
CVE-2024-5279,0,0,2c6d1e53ece85fba55c2b83835d7abf75ca4da167ddbecc0aa984e59d469dd0e,2024-06-04T19:21:04.240000
|
CVE-2024-5279,0,0,2c6d1e53ece85fba55c2b83835d7abf75ca4da167ddbecc0aa984e59d469dd0e,2024-06-04T19:21:04.240000
|
||||||
|
CVE-2024-52796,1,1,c4bd427fdb738f1679f0a9210a59387be5f22896c83df074062019be41d6dd7e,2024-11-20T17:15:20.953000
|
||||||
CVE-2024-5280,0,0,86594c27d113c80fe7aa0a775d64720f8f3d823c49f62206ae5f1ae12a324b16,2024-08-01T13:59:43.187000
|
CVE-2024-5280,0,0,86594c27d113c80fe7aa0a775d64720f8f3d823c49f62206ae5f1ae12a324b16,2024-08-01T13:59:43.187000
|
||||||
CVE-2024-5281,0,0,d8e0f0c592f3cfcf36fc66f961b905d6afba3d53af3789e65e13042755c0a3cb,2024-08-01T13:59:43.367000
|
CVE-2024-5281,0,0,d8e0f0c592f3cfcf36fc66f961b905d6afba3d53af3789e65e13042755c0a3cb,2024-08-01T13:59:43.367000
|
||||||
CVE-2024-5282,0,0,d02e51c4b0ee276cbc37162ff12b0d5f63d5cb6622dea90c00e2302f02b5f264,2024-08-01T13:59:43.553000
|
CVE-2024-5282,0,0,d02e51c4b0ee276cbc37162ff12b0d5f63d5cb6622dea90c00e2302f02b5f264,2024-08-01T13:59:43.553000
|
||||||
@ -267010,8 +267044,8 @@ CVE-2024-53047,0,0,a0801a2f6d3c55ef95cce30e94c6ed5a76950eafd193774abe55034cb7349
|
|||||||
CVE-2024-53048,0,0,529447b7e47a46804ce5665f7064fdc0578a20909c47292e6baa06ace21a4eed,2024-11-19T21:56:45.533000
|
CVE-2024-53048,0,0,529447b7e47a46804ce5665f7064fdc0578a20909c47292e6baa06ace21a4eed,2024-11-19T21:56:45.533000
|
||||||
CVE-2024-53049,0,0,44d5e40e9eda60f021fd6c5857150e80b7654dfc6b0568fd979dc505a8f632cc,2024-11-19T21:56:45.533000
|
CVE-2024-53049,0,0,44d5e40e9eda60f021fd6c5857150e80b7654dfc6b0568fd979dc505a8f632cc,2024-11-19T21:56:45.533000
|
||||||
CVE-2024-5305,0,0,d7ef5e26da1b4b55d5a1323c739605451e8b0fffa749e9d5cf8a79ba440fa94f,2024-08-23T15:05:41.013000
|
CVE-2024-5305,0,0,d7ef5e26da1b4b55d5a1323c739605451e8b0fffa749e9d5cf8a79ba440fa94f,2024-08-23T15:05:41.013000
|
||||||
CVE-2024-53050,0,1,20b380eb0c1b82b4c23c14b6a409df233b8c78c5b14431ffad3f70180fc3f0bc,2024-11-20T16:17:12.003000
|
CVE-2024-53050,0,0,20b380eb0c1b82b4c23c14b6a409df233b8c78c5b14431ffad3f70180fc3f0bc,2024-11-20T16:17:12.003000
|
||||||
CVE-2024-53051,0,1,d08b50fe0fbed16215b8e87b88d62e9cfc8b1b1f63adc6052ddeda3f7d9f4025,2024-11-20T16:16:15.217000
|
CVE-2024-53051,0,0,d08b50fe0fbed16215b8e87b88d62e9cfc8b1b1f63adc6052ddeda3f7d9f4025,2024-11-20T16:16:15.217000
|
||||||
CVE-2024-53052,0,0,00a80d5d24696944ad7f2545aeaa0e5e3c340f70db4818e22c43bbf88d353ba0,2024-11-19T21:56:45.533000
|
CVE-2024-53052,0,0,00a80d5d24696944ad7f2545aeaa0e5e3c340f70db4818e22c43bbf88d353ba0,2024-11-19T21:56:45.533000
|
||||||
CVE-2024-53053,0,0,9e6ce7c2ede2f5707b2e28210262ef33b549de207ac6e812772a6b597406567b,2024-11-19T21:56:45.533000
|
CVE-2024-53053,0,0,9e6ce7c2ede2f5707b2e28210262ef33b549de207ac6e812772a6b597406567b,2024-11-19T21:56:45.533000
|
||||||
CVE-2024-53054,0,0,a90bf902c758209738d8e7389175368e1542f41cbbf37e52394bd445b0b8001d,2024-11-19T21:56:45.533000
|
CVE-2024-53054,0,0,a90bf902c758209738d8e7389175368e1542f41cbbf37e52394bd445b0b8001d,2024-11-19T21:56:45.533000
|
||||||
@ -268664,7 +268698,7 @@ CVE-2024-7189,0,0,ff23bad07ab6275204285dcbecd341c53e0f43077ff255ee222be124d95deb
|
|||||||
CVE-2024-7190,0,0,6b10a3300e7f1568fb96fd13af7e875d61c31bab7b7b7e6416cbb0109bea73d4,2024-08-23T14:23:56.243000
|
CVE-2024-7190,0,0,6b10a3300e7f1568fb96fd13af7e875d61c31bab7b7b7e6416cbb0109bea73d4,2024-08-23T14:23:56.243000
|
||||||
CVE-2024-7191,0,0,05a58f0ea89619617ea6d05464587bd2a57828801e18ec1f64442f7e68c768f8,2024-08-23T14:24:48.103000
|
CVE-2024-7191,0,0,05a58f0ea89619617ea6d05464587bd2a57828801e18ec1f64442f7e68c768f8,2024-08-23T14:24:48.103000
|
||||||
CVE-2024-7192,0,0,6102e2c061b392d7cc60badb5f7058fe4f352fff0fcb923589fe1aff828e98a0,2024-08-23T14:25:37.527000
|
CVE-2024-7192,0,0,6102e2c061b392d7cc60badb5f7058fe4f352fff0fcb923589fe1aff828e98a0,2024-08-23T14:25:37.527000
|
||||||
CVE-2024-7193,0,0,dd80ed0d2df4634fbcb8c6fe154f9a55283158b63bfb6074f48bd9b87a10cf87,2024-09-11T16:47:59.613000
|
CVE-2024-7193,0,1,a7792ab358806bb530ac0c5ce816eeadff0824c0332b64e6f400175db8173aba,2024-11-20T17:04:07.447000
|
||||||
CVE-2024-7194,0,0,fb8fb327a2568c1f320f1950bfd0d09d6807afbd06bbd21f9382e7a1490f26a5,2024-08-12T14:35:56.040000
|
CVE-2024-7194,0,0,fb8fb327a2568c1f320f1950bfd0d09d6807afbd06bbd21f9382e7a1490f26a5,2024-08-12T14:35:56.040000
|
||||||
CVE-2024-7195,0,0,6200e8d18c215bbfa8ef0be79e3a73b7174d7501600a48a5810d4c572cbb7769,2024-08-12T14:35:58.443000
|
CVE-2024-7195,0,0,6200e8d18c215bbfa8ef0be79e3a73b7174d7501600a48a5810d4c572cbb7769,2024-08-12T14:35:58.443000
|
||||||
CVE-2024-7196,0,0,aa78bda25303d7508f05178076eb7f1847a629e60799ff5c817fd6b3a1be9a5a,2024-08-12T14:36:00.460000
|
CVE-2024-7196,0,0,aa78bda25303d7508f05178076eb7f1847a629e60799ff5c817fd6b3a1be9a5a,2024-08-12T14:36:00.460000
|
||||||
@ -269201,7 +269235,7 @@ CVE-2024-7832,0,0,d4a13ef09d831987125a8ecb9cb6f57fc4d78d65bea0a84d0e17ca92ee69e7
|
|||||||
CVE-2024-7833,0,0,b984e9fbf1df09267f07d264c50d0ef7583d91d54c2e1f8dd098a2d9fc6334c8,2024-08-19T16:00:21.393000
|
CVE-2024-7833,0,0,b984e9fbf1df09267f07d264c50d0ef7583d91d54c2e1f8dd098a2d9fc6334c8,2024-08-19T16:00:21.393000
|
||||||
CVE-2024-7834,0,0,ebe9de8b36536d4820911cd556ba678f6b7b55833622e60cf4b49b06fccd4ac0,2024-09-05T17:52:06.147000
|
CVE-2024-7834,0,0,ebe9de8b36536d4820911cd556ba678f6b7b55833622e60cf4b49b06fccd4ac0,2024-09-05T17:52:06.147000
|
||||||
CVE-2024-7835,0,0,a98c27e86b496b21f60fe5d08184e2ecc9eaf4566c38f6b900e7048c14c277ba,2024-09-26T13:32:55.343000
|
CVE-2024-7835,0,0,a98c27e86b496b21f60fe5d08184e2ecc9eaf4566c38f6b900e7048c14c277ba,2024-09-26T13:32:55.343000
|
||||||
CVE-2024-7836,0,1,4aa8c455c02fb139d867b1dee10e356cdead87793286ea57d5c4ac5ed708a549,2024-11-20T15:09:34.677000
|
CVE-2024-7836,0,0,4aa8c455c02fb139d867b1dee10e356cdead87793286ea57d5c4ac5ed708a549,2024-11-20T15:09:34.677000
|
||||||
CVE-2024-7838,0,0,27df02a5cc65e831a93d364f5957ee1462f1aebc7844c7c31edfb410cb0a1545,2024-08-20T19:16:59.373000
|
CVE-2024-7838,0,0,27df02a5cc65e831a93d364f5957ee1462f1aebc7844c7c31edfb410cb0a1545,2024-08-20T19:16:59.373000
|
||||||
CVE-2024-7839,0,0,188e96c2e6da74526fb5bd6714aa4962487dce47bff2bfe2c2ee9934d7c43ce6,2024-08-19T21:18:14.097000
|
CVE-2024-7839,0,0,188e96c2e6da74526fb5bd6714aa4962487dce47bff2bfe2c2ee9934d7c43ce6,2024-08-19T21:18:14.097000
|
||||||
CVE-2024-7840,0,0,963356a9762201b3473b18afed67c4be12b6ccd9205428ff0b709dc8e1190467,2024-10-15T14:52:57.110000
|
CVE-2024-7840,0,0,963356a9762201b3473b18afed67c4be12b6ccd9205428ff0b709dc8e1190467,2024-10-15T14:52:57.110000
|
||||||
@ -270297,7 +270331,7 @@ CVE-2024-9351,0,0,33d034faa3e6b0aeb71bafa0ae8b2ea418555ae0b07eef9d890e7c43507fa4
|
|||||||
CVE-2024-9352,0,0,788f5bf16f633f8f02e340b198528b062bcda6aeec70a897601eaf656cd6ab6a,2024-10-18T12:52:33.507000
|
CVE-2024-9352,0,0,788f5bf16f633f8f02e340b198528b062bcda6aeec70a897601eaf656cd6ab6a,2024-10-18T12:52:33.507000
|
||||||
CVE-2024-9353,0,0,64ddffc3239a0d67e3b79e48af9889b2f8d89027aa9c53de3cc5595dbd6f2fd7,2024-10-08T18:50:51.357000
|
CVE-2024-9353,0,0,64ddffc3239a0d67e3b79e48af9889b2f8d89027aa9c53de3cc5595dbd6f2fd7,2024-10-08T18:50:51.357000
|
||||||
CVE-2024-9355,0,0,570ad877d483bb09965789a55ded749f6bf93157d75b7c1bf9e468e102c889b7,2024-11-15T20:15:21.523000
|
CVE-2024-9355,0,0,570ad877d483bb09965789a55ded749f6bf93157d75b7c1bf9e468e102c889b7,2024-11-15T20:15:21.523000
|
||||||
CVE-2024-9356,0,1,29c2a7ef856f7f8c8f9866d78eaa9a05e4ca83219bf1420c5acc0f1b2b458aa2,2024-11-20T15:01:41.627000
|
CVE-2024-9356,0,0,29c2a7ef856f7f8c8f9866d78eaa9a05e4ca83219bf1420c5acc0f1b2b458aa2,2024-11-20T15:01:41.627000
|
||||||
CVE-2024-9357,0,0,ecac5cca1d13ae41e27c64ccd21707ad2b9f6cb13725a3072faecffbc49d78e9,2024-11-12T13:55:21.227000
|
CVE-2024-9357,0,0,ecac5cca1d13ae41e27c64ccd21707ad2b9f6cb13725a3072faecffbc49d78e9,2024-11-12T13:55:21.227000
|
||||||
CVE-2024-9358,0,0,ad1311c8435fb7ce092ff9c8b7c1abe83209465bc92e72b7b733a8ea9fa4bf3c,2024-10-04T13:51:25.567000
|
CVE-2024-9358,0,0,ad1311c8435fb7ce092ff9c8b7c1abe83209465bc92e72b7b733a8ea9fa4bf3c,2024-10-04T13:51:25.567000
|
||||||
CVE-2024-9359,0,0,c3e20cb7feaf9e2d5c48c39f4d484e16226f28d5df197104e70b6a5f0b84dc00,2024-10-04T18:54:12.417000
|
CVE-2024-9359,0,0,c3e20cb7feaf9e2d5c48c39f4d484e16226f28d5df197104e70b6a5f0b84dc00,2024-10-04T18:54:12.417000
|
||||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user