mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-07 19:16:29 +00:00
Auto-Update: 2024-07-19T20:00:18.321575+00:00
This commit is contained in:
parent
ffdbb37dd2
commit
70e7b8e70f
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-3163",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2021-04-12T21:15:14.340",
|
||||
"lastModified": "2024-05-17T02:00:18.753",
|
||||
"lastModified": "2024-07-19T19:15:06.277",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [
|
||||
{
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-33026",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2021-05-13T23:15:07.367",
|
||||
"lastModified": "2024-05-17T01:57:47.060",
|
||||
"lastModified": "2024-07-19T19:15:05.890",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [
|
||||
{
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-35196",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2021-06-21T23:15:10.723",
|
||||
"lastModified": "2024-05-17T01:58:33.717",
|
||||
"lastModified": "2024-07-19T19:15:06.043",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [
|
||||
{
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-38614",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2021-08-12T23:15:09.143",
|
||||
"lastModified": "2024-05-17T01:59:41.637",
|
||||
"lastModified": "2024-07-19T18:15:04.450",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [
|
||||
{
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-41503",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2021-09-24T20:15:07.373",
|
||||
"lastModified": "2024-05-17T02:01:13.137",
|
||||
"lastModified": "2024-07-19T18:15:04.580",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [
|
||||
{
|
||||
|
@ -2,36 +2,116 @@
|
||||
"id": "CVE-2022-48834",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-07-16T13:15:10.983",
|
||||
"lastModified": "2024-07-16T13:43:58.773",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-19T18:00:51.173",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: usbtmc: Fix bug in pipe direction for control transfers\n\nThe syzbot fuzzer reported a minor bug in the usbtmc driver:\n\nusb 5-1: BOGUS control dir, pipe 80001e80 doesn't match bRequestType 0\nWARNING: CPU: 0 PID: 3813 at drivers/usb/core/urb.c:412\nusb_submit_urb+0x13a5/0x1970 drivers/usb/core/urb.c:410\nModules linked in:\nCPU: 0 PID: 3813 Comm: syz-executor122 Not tainted\n5.17.0-rc5-syzkaller-00306-g2293be58d6a1 #0\n...\nCall Trace:\n <TASK>\n usb_start_wait_urb+0x113/0x530 drivers/usb/core/message.c:58\n usb_internal_control_msg drivers/usb/core/message.c:102 [inline]\n usb_control_msg+0x2a5/0x4b0 drivers/usb/core/message.c:153\n usbtmc_ioctl_request drivers/usb/class/usbtmc.c:1947 [inline]\n\nThe problem is that usbtmc_ioctl_request() uses usb_rcvctrlpipe() for\nall of its transfers, whether they are in or out. It's easy to fix."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: usb: usbtmc: corrige un error en la direcci\u00f3n de la tuber\u00eda para las transferencias de control. El syzbot fuzzer inform\u00f3 un error menor en el controlador usbtmc: usb 5-1: directorio de control BOGUS, la tuber\u00eda 80001e80 no coincide con bRequestType 0 ADVERTENCIA: CPU: 0 PID: 3813 en drivers/usb/core/urb.c:412 usb_submit_urb+0x13a5/0x1970 drivers/usb/core/urb.c:410 M\u00f3dulos vinculados en: CPU: 0 PID: 3813 Comm : syz-executor122 No contaminado 5.17.0-rc5-syzkaller-00306-g2293be58d6a1 #0 ... Seguimiento de llamadas: usb_start_wait_urb+0x113/0x530 drivers/usb/core/message.c:58 usb_internal_control_msg drivers/usb/core /message.c:102 [en l\u00ednea] usb_control_msg+0x2a5/0x4b0 drivers/usb/core/message.c:153 usbtmc_ioctl_request drivers/usb/class/usbtmc.c:1947 [en l\u00ednea] El problema es que usbtmc_ioctl_request() usa usb_rcvctrlpipe( ) para todas sus transferencias, ya sean de entrada o de salida. Es f\u00e1cil de arreglar."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.4.187",
|
||||
"versionEndExcluding": "5.10.108",
|
||||
"matchCriteriaId": "5F01618E-D6DB-46C8-B08C-503F1C05D234"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11",
|
||||
"versionEndExcluding": "5.15.31",
|
||||
"matchCriteriaId": "F25C317E-A673-47D1-844E-171C9BFDF352"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/10a805334a11acd547602d6c4cf540a0f6ab5c6e",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/5f6a2d63c68c12cf61259df7c3527a0e05dce952",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/700a0715854c1e79a73341724ce4f5bb01abc016",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/c69aef9db878ab277068a8cc1b4bf0cf309dc2b7",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/e9b667a82cdcfe21d590344447d65daed52b353b",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,92 +2,15 @@
|
||||
"id": "CVE-2024-22682",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-01-30T01:16:00.020",
|
||||
"lastModified": "2024-07-19T17:15:02.603",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [
|
||||
{
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"tags": [
|
||||
"disputed"
|
||||
]
|
||||
}
|
||||
],
|
||||
"lastModified": "2024-07-19T19:15:08.093",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "DuckDB <=0.9.2 and DuckDB extension-template <=0.9.2 are vulnerable to malicious extension injection via the custom extension feature. NOTE: this is disputed by the vendor because the report only demonstrates that an attacker with access to a victim's privileges can replace any file with any other file."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "DuckDB <=0.9.2 y DuckDB extension-template <=0.9.2 son vulnerables a la inyecci\u00f3n de extensiones maliciosas a trav\u00e9s de la funci\u00f3n de extensi\u00f3n personalizada."
|
||||
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:duckdb:duckdb:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "0.9.2",
|
||||
"matchCriteriaId": "B85FB41B-1FBC-427C-AC66-7FC42EB7EB9A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Tu0Laj1/database_test",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/duckdb/duckdb/discussions/12893",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-26278",
|
||||
"sourceIdentifier": "security@joomla.org",
|
||||
"published": "2024-07-09T17:15:14.970",
|
||||
"lastModified": "2024-07-09T18:18:38.713",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-19T18:53:12.727",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,8 +15,41 @@
|
||||
"value": "El componente Custom Fields no filtra correctamente las entradas, lo que genera un vector XSS."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security@joomla.org",
|
||||
"type": "Secondary",
|
||||
@ -28,10 +61,46 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:joomla:joomla\\!:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.7.0",
|
||||
"versionEndExcluding": "3.10.16",
|
||||
"matchCriteriaId": "45B2F66C-96AF-453F-8C06-B17A15595924"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:joomla:joomla\\!:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.0.0",
|
||||
"versionEndExcluding": "4.4.6",
|
||||
"matchCriteriaId": "039D1E9C-9564-41C8-8D02-77A9B9677540"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:joomla:joomla\\!:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.0.0",
|
||||
"versionEndExcluding": "5.1.2",
|
||||
"matchCriteriaId": "797E36B6-6CB9-4D30-8B13-33333BDBC71F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://developer.joomla.org/security-centre/939-20240705-core-xss-in-com-fields-default-field-value.html",
|
||||
"source": "security@joomla.org"
|
||||
"source": "security@joomla.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-26279",
|
||||
"sourceIdentifier": "security@joomla.org",
|
||||
"published": "2024-07-09T17:15:15.047",
|
||||
"lastModified": "2024-07-10T09:15:02.400",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-19T18:53:34.103",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,8 +15,41 @@
|
||||
"value": "El filtrado de contenido inadecuado genera vulnerabilidades XSS en varios componentes."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security@joomla.org",
|
||||
"type": "Secondary",
|
||||
@ -28,10 +61,46 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:joomla:joomla\\!:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.0.0",
|
||||
"versionEndExcluding": "3.10.16",
|
||||
"matchCriteriaId": "7800ED00-61B2-45F7-929F-3464D2E83CDD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:joomla:joomla\\!:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.0.0",
|
||||
"versionEndExcluding": "4.4.6",
|
||||
"matchCriteriaId": "039D1E9C-9564-41C8-8D02-77A9B9677540"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:joomla:joomla\\!:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.0.0",
|
||||
"versionEndExcluding": "5.1.2",
|
||||
"matchCriteriaId": "797E36B6-6CB9-4D30-8B13-33333BDBC71F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://developer.joomla.org/security-centre/938-20240704-core-xss-in-wrapper-extensions.html",
|
||||
"source": "security@joomla.org"
|
||||
"source": "security@joomla.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-30105",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2024-07-09T17:15:17.200",
|
||||
"lastModified": "2024-07-09T18:18:38.713",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-19T18:59:11.433",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -40,6 +40,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +61,61 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.0.0",
|
||||
"versionEndIncluding": "8.0.7",
|
||||
"matchCriteriaId": "2260CD28-E80F-4FFC-B8DA-44CC726FBD83"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "17.4.0",
|
||||
"versionEndExcluding": "17.4.21",
|
||||
"matchCriteriaId": "9079F629-6958-469E-AF83-8030B145E354"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "17.6.0",
|
||||
"versionEndExcluding": "17.6.17",
|
||||
"matchCriteriaId": "B1C74913-B238-4B3C-8F2D-37FFCCAB5E9E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "17.8.0",
|
||||
"versionEndIncluding": "17.8.12",
|
||||
"matchCriteriaId": "C4D4B43A-9B2F-4FCC-8A24-11F102A42BCB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "17.10.0",
|
||||
"versionEndIncluding": "17.10.4",
|
||||
"matchCriteriaId": "A4CAA048-BCAA-4CBA-81DA-E8748C441017"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30105",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,20 +2,91 @@
|
||||
"id": "CVE-2024-33180",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-16T16:15:04.767",
|
||||
"lastModified": "2024-07-16T18:00:02.110",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-19T18:56:27.127",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Tenda AC18 V15.03.3.10_EN was discovered to contain a stack-based buffer overflow vulnerability via the deviceId parameter at ip/goform/saveParentControlInfo."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 que Tenda AC18 V15.03.3.10_EN contiene una vulnerabilidad de desbordamiento del b\u00fafer basada en pila a trav\u00e9s del par\u00e1metro deviceId en ip/goform/saveParentControlInfo."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:tendacn:ac18_firmware:15.03.3.10:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "330A6DE5-8F04-492C-B167-0071ACDBF7AC"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:tendacn:ac18:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FCF0F551-6E6C-48D6-9C2A-740B84AF0349"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://palm-vertebra-fe9.notion.site/saveParentControlInfo_1-7c9695d0251945ae8006db705b9b80ac",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,20 +2,91 @@
|
||||
"id": "CVE-2024-33182",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-16T16:15:04.850",
|
||||
"lastModified": "2024-07-16T18:00:02.110",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-19T18:56:50.050",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Tenda AC18 V15.03.3.10_EN was discovered to contain a stack-based buffer overflow vulnerability via the deviceId parameter at ip/goform/addWifiMacFilter."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 que Tenda AC18 V15.03.3.10_EN contiene una vulnerabilidad de desbordamiento del b\u00fafer basada en pila a trav\u00e9s del par\u00e1metro deviceId en ip/goform/addWifiMacFilter."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:tendacn:ac18_firmware:15.03.3.10:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "330A6DE5-8F04-492C-B167-0071ACDBF7AC"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:tendacn:ac18:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FCF0F551-6E6C-48D6-9C2A-740B84AF0349"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://palm-vertebra-fe9.notion.site/addWifiMacFilter_1-067fa6984f0d4933b88c63efd7486479",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-34113",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-06-13T12:15:11.110",
|
||||
"lastModified": "2024-06-13T18:35:19.777",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-07-19T18:36:42.237",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Secondary",
|
||||
@ -41,8 +61,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-326"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -51,10 +81,126 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AFD05E3A-10F9-4C75-9710-BA46B66FF6E6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update10:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F1FC7D1D-6DD2-48B2-980F-B001B0F24473"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update11:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1FA19E1D-61C2-4640-AF06-4BCFE750BDF3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update12:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3F331DEA-F3D0-4B13-AB1E-6FE39B2BB55D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update13:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "63D5CF84-4B0D-48AE-95D6-262AEA2FFDE8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D57C8681-AC68-47DF-A61E-B5C4B4A47663"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "75608383-B727-48D6-8FFA-D552A338A562"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7773DB68-414A-4BA9-960F-52471A784379"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update5:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B38B9E86-BCD5-4BCA-8FB7-EC55905184E6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update6:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5E7BAB80-8455-4570-A2A2-8F40469EE9CC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update7:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F9D645A2-E02D-4E82-A2BD-0A7DE5B8FBCC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update8:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6E22D701-B038-4795-AA32-A18BC93C2B6F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update9:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CAC4A0EC-C3FC-47D8-86CE-0E6A87A7F0B0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:coldfusion:2023:update1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0AA3D302-CFEE-4DFD-AB92-F53C87721BFF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:coldfusion:2023:update2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EB88D4FE-5496-4639-BAF2-9F29F24ABF29"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:coldfusion:2023:update3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "43E0ED98-2C1F-40B8-AF60-FEB1D85619C0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:coldfusion:2023:update4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "76204873-C6E0-4202-8A03-0773270F1802"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:coldfusion:2023:update5:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C1A22BE9-0D47-4BA8-8BDB-9B12D7A0F7C7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:coldfusion:2023:update6:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E3A83642-BF14-4C37-BD94-FA76AABE8ADC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:coldfusion:2023:update7:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A892E1DC-F2C8-4F53-8580-A2D1BEED5A25"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/coldfusion/apsb24-41.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-34115",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-06-13T12:15:11.360",
|
||||
"lastModified": "2024-06-13T18:35:19.777",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-07-19T18:02:32.427",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:substance_3d_stager:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "3.0.2",
|
||||
"matchCriteriaId": "C38C603E-F1D7-422F-89B9-0A84B1D9BE4F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/substance3d_stager/apsb24-43.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-35264",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2024-07-09T17:15:18.213",
|
||||
"lastModified": "2024-07-09T18:18:38.713",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-19T18:59:28.370",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -40,6 +40,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +61,61 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.0.0",
|
||||
"versionEndExcluding": "8.0.7",
|
||||
"matchCriteriaId": "223CB8C9-39B9-44E2-83AA-79F7C2B45D67"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "17.4.0",
|
||||
"versionEndExcluding": "17.4.21",
|
||||
"matchCriteriaId": "9079F629-6958-469E-AF83-8030B145E354"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "17.6.0",
|
||||
"versionEndExcluding": "17.6.17",
|
||||
"matchCriteriaId": "B1C74913-B238-4B3C-8F2D-37FFCCAB5E9E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "17.8.0",
|
||||
"versionEndExcluding": "17.8.12",
|
||||
"matchCriteriaId": "547E0354-EE7E-43BA-B3C7-E4A59C414312"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "17.10.0",
|
||||
"versionEndExcluding": "17.10.4",
|
||||
"matchCriteriaId": "BA8A2DA8-D24E-4AB5-8685-A42EB33E1D6D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35264",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,20 +2,92 @@
|
||||
"id": "CVE-2024-35338",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-16T16:15:04.933",
|
||||
"lastModified": "2024-07-16T18:00:02.110",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-19T18:58:08.977",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Tenda i29V1.0 V1.0.0.5 was discovered to contain a hardcoded password for root."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 que Tenda i29V1.0 V1.0.0.5 conten\u00eda una contrase\u00f1a codificada para root."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-798"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:tendacn:i29_firmware:1.0.0.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6C1D8B10-FF4D-4FCD-8A93-901F4407B9F6"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:tendacn:i29:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1BD6AAAA-C953-4BD9-AD42-D5C883F39728"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://palm-vertebra-fe9.notion.site/hardcode_i29-e1ed38dde00145d9a6be1ad2b4581259",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-35753",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-06-08T11:15:49.193",
|
||||
"lastModified": "2024-06-10T02:52:08.267",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-19T18:31:44.157",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:templatesnext:templatesnext_onepager:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "1.3.3",
|
||||
"matchCriteriaId": "7E584626-F9B4-43C2-BAC0-2BBDC3FE079C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/templatesnext-onepager/wordpress-templatesnext-onepager-plugin-1-3-3-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-35756",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-06-08T11:15:50.007",
|
||||
"lastModified": "2024-06-10T02:52:08.267",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-19T18:45:25.210",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ceikay:tooltip_ck:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "2.2.15",
|
||||
"matchCriteriaId": "6F4B9440-0E08-4235-BEDC-32A3C70A1FDC"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/tooltip-ck/wordpress-tooltip-ck-plugin-2-2-15-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-36395",
|
||||
"sourceIdentifier": "cna@cyber.gov.il",
|
||||
"published": "2024-06-13T13:15:49.793",
|
||||
"lastModified": "2024-06-13T18:35:19.777",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-19T18:34:58.837",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "cna@cyber.gov.il",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,30 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:verint:workforce_optimization:15.2.918.262:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3276E28F-7F40-4743-A9AE-262F62E170D6"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.gov.il/en/Departments/faq/cve_advisories",
|
||||
"source": "cna@cyber.gov.il"
|
||||
"source": "cna@cyber.gov.il",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-37843",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-06-25T21:15:59.770",
|
||||
"lastModified": "2024-06-26T12:44:29.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-19T18:37:07.720",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,11 +15,67 @@
|
||||
"value": "Se descubri\u00f3 que Craft CMS hasta v3.7.31 conten\u00eda una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del endpoint de la API GraphQL."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:craftcms:craft_cms:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "3.7.31",
|
||||
"matchCriteriaId": "C8AAE5DF-2812-42E9-B484-A194A4DD3C99"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://blog.smithsecurity.biz/craft-cms-unauthenticated-sqli-via-graphql",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-404xx/CVE-2024-40400.json
Normal file
21
CVE-2024/CVE-2024-404xx/CVE-2024-40400.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-40400",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-19T19:15:09.147",
|
||||
"lastModified": "2024-07-19T19:15:09.147",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An arbitrary file upload vulnerability in the image upload function of Automad v2.0.0 allows attackers to execute arbitrary code via a crafted file."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/marcantondahmen/automad/issues/106",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-41007",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-07-15T09:15:02.803",
|
||||
"lastModified": "2024-07-18T12:15:03.357",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-07-19T18:24:59.197",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,39 +15,152 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: tcp: evitar demasiados paquetes de retransmisi\u00f3n Si un socket TCP est\u00e1 usando TCP_USER_TIMEOUT y el otro par retrajo su ventana a cero, tcp_retransmit_timer() puede retransmitir un paquete cada dos santiam\u00e9n (2 ms). para HZ=1000), durante aproximadamente 4 minutos despu\u00e9s de que TCP_USER_TIMEOUT haya 'expirado'. La soluci\u00f3n es asegurarse de que tcp_rtx_probe0_timed_out() tenga en cuenta icsk->icsk_user_timeout. Antes de el commit culpable, el socket no expiraba despu\u00e9s de icsk->icsk_user_timeout, sino que usaba un retroceso exponencial est\u00e1ndar para las retransmisiones. Tambi\u00e9n vale la pena se\u00f1alar que antes de commit e89688e3e978 (\"net: tcp: fix unexcepted socket die cuando snd_wnd es 0\"), el problema durar\u00eda 2 minutos en lugar de 4."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 3.3,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.19",
|
||||
"versionEndExcluding": "5.4.280",
|
||||
"matchCriteriaId": "EDB3F5FC-7B58-42A1-96EF-E53AF464227C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.5",
|
||||
"versionEndExcluding": "5.10.222",
|
||||
"matchCriteriaId": "00696AC5-EE29-437F-97F9-C4D66608B327"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11",
|
||||
"versionEndExcluding": "5.15.163",
|
||||
"matchCriteriaId": "A97DEB09-4927-40F8-B5C6-F5BD5EAE0CFD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "6.1.100",
|
||||
"matchCriteriaId": "100CDF74-4DB5-4FC6-A54B-BDBDB0C27137"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2",
|
||||
"versionEndExcluding": "6.6.41",
|
||||
"matchCriteriaId": "96AC42B8-D66D-4AC5-B466-E9BA7910FA29"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.9.10",
|
||||
"matchCriteriaId": "AB2E8DEC-CFD5-4C2B-981D-E7E45A36C352"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/04317a2471c2f637b4c49cbd0e9c0d04a519f570",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/5d7e64d70a11d988553a08239c810a658e841982",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/66cb64a1d2239cd0309f9b5038b05462570a5be1",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/7bb7670f92bfbd05fc41a8f9a8f358b7ffed65f4",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/97a9063518f198ec0adb2ecb89789de342bb8283",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/d2346fca5bed130dc712f276ac63450201d52969",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/dfcdd7f89e401d2c6616be90c76c2fac3fa98fde",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/e113cddefa27bbf5a79f72387b8fbd432a61a466",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-416xx/CVE-2024-41600.json
Normal file
21
CVE-2024/CVE-2024-416xx/CVE-2024-41600.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-41600",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-19T18:15:05.727",
|
||||
"lastModified": "2024-07-19T18:15:05.727",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Insecure Permissions vulnerability in lin-CMS Springboot v.0.2.1 and before allows a remote attacker to obtain sensitive information via the login method in the UserController.java component."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/topsky979/Security-Collections/tree/main/CVE-2024-41600",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-4146",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2024-06-08T20:15:52.117",
|
||||
"lastModified": "2024-06-10T02:52:08.267",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-19T19:03:00.867",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -16,6 +16,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
@ -41,8 +63,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -51,14 +83,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:lunary:lunary:1.2.13:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7223CE59-4E84-4008-9E35-D2B9D25ADD1E"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/lunary-ai/lunary/commit/c43b6c62035f32ca455f66d5fd22ba661648cde7",
|
||||
"source": "security@huntr.dev"
|
||||
"source": "security@huntr.dev",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://huntr.com/bounties/a749e696-b398-4260-b2d0-b0054b9fffa7",
|
||||
"source": "security@huntr.dev"
|
||||
"source": "security@huntr.dev",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-4680",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2024-06-08T20:15:52.347",
|
||||
"lastModified": "2024-06-10T02:52:08.267",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-19T18:51:53.003",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -16,6 +16,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
@ -51,10 +73,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:zenml:zenml:0.56.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "50342A08-B715-4C14-BB9E-F6C8D2C6A683"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://huntr.com/bounties/c88f6bd2-490d-4930-98dd-03651b20230a",
|
||||
"source": "security@huntr.dev"
|
||||
"source": "security@huntr.dev",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-5402",
|
||||
"sourceIdentifier": "cybersecurity@ch.abb.com",
|
||||
"published": "2024-07-15T12:15:02.340",
|
||||
"lastModified": "2024-07-15T13:00:34.853",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-19T18:03:55.583",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Unquoted Search Path or Element vulnerability in ABB Mint Workbench.\n\n\n\nA local attacker who successfully exploited this vulnerability could gain elevated privileges by inserting an executable file in the path of the affected service.\n\n\nThis issue affects Mint Workbench I versions: from 5866 before 5868."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de elemento o ruta de b\u00fasqueda sin comillas en ABB Mint Workbench. Un atacante local que aprovechara con \u00e9xito esta vulnerabilidad podr\u00eda obtener privilegios elevados insertando un archivo ejecutable en la ruta del servicio afectado. Este problema afecta a las versiones de Mint Workbench I: desde 5866 antes de 5868."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -57,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cybersecurity@ch.abb.com",
|
||||
"type": "Secondary",
|
||||
@ -91,10 +115,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:abb:mint_workbench:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5866",
|
||||
"versionEndIncluding": "5868",
|
||||
"matchCriteriaId": "2D3943DF-0CD6-4CB6-A713-3C8308A03F52"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://search.abb.com/library/Download.aspx?DocumentID=9AKK108469A7912&LanguageCode=en&DocumentPartId=1&Action=Launch",
|
||||
"source": "cybersecurity@ch.abb.com"
|
||||
"source": "cybersecurity@ch.abb.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-5478",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2024-06-06T19:16:08.933",
|
||||
"lastModified": "2024-06-07T14:56:05.647",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-19T18:29:50.137",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -16,6 +16,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
],
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
@ -51,10 +73,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:lunary:lunary:1.2.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2C7BA1F3-A202-4EB0-A119-9DD2B776A50F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://huntr.com/bounties/e899f496-d493-4c06-b596-cb0a88ad451b",
|
||||
"source": "security@huntr.dev"
|
||||
"source": "security@huntr.dev",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-5759",
|
||||
"sourceIdentifier": "vulnreport@tenable.com",
|
||||
"published": "2024-06-12T16:15:12.550",
|
||||
"lastModified": "2024-06-13T18:36:09.010",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-19T18:40:53.863",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "vulnreport@tenable.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "vulnreport@tenable.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:tenable:security_center:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "6.3.0",
|
||||
"matchCriteriaId": "B72B29DA-43D5-45D0-9413-320FDD421BB7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.tenable.com/security/tns-2024-10",
|
||||
"source": "vulnreport@tenable.com"
|
||||
"source": "vulnreport@tenable.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-5977",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-07-19T11:15:03.873",
|
||||
"lastModified": "2024-07-19T13:01:44.567",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-19T18:27:34.967",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -13,6 +13,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.5
|
||||
},
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
@ -36,6 +56,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-639"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
@ -47,18 +77,45 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:givewp:givewp:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "3.14.0",
|
||||
"matchCriteriaId": "2FC88AD4-201C-4434-A52B-5B295F79E6E9"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/give/trunk/src/DonationForms/V2/Endpoints/FormActions.php#L96",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3120745/",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2dca6c29-9f05-4d82-90e3-834f1dd8005a?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,17 +2,41 @@
|
||||
"id": "CVE-2024-6398",
|
||||
"sourceIdentifier": "trellixpsirt@trellix.com",
|
||||
"published": "2024-07-15T09:15:02.870",
|
||||
"lastModified": "2024-07-15T13:00:34.853",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-19T18:25:44.247",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An information disclosure vulnerability in SWG in versions 12.x prior to 12.2.10 and 11.x prior to 11.2.24 allows information stored in a customizable block page to be disclosed to third-party websites due to Same Origin Policy Bypass of browsers in certain scenarios. The risk is low, because other recommended default security policies such as URL categorization and GTI are in place in most policies to block access to uncategorized/high risk websites. Any information disclosed depends on how the customers have customized the block pages."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n en SWG en las versiones 12.x anteriores a 12.2.10 y 11.x anteriores a 11.2.24 permite que la informaci\u00f3n almacenada en una p\u00e1gina de bloqueo personalizable se divulgue a sitios web de terceros debido a la omisi\u00f3n de la pol\u00edtica del mismo origen de los navegadores en ciertos escenarios. El riesgo es bajo, porque otras pol\u00edticas de seguridad predeterminadas recomendadas, como la categorizaci\u00f3n de URL y GTI, est\u00e1n implementadas en la mayor\u00eda de las pol\u00edticas para bloquear el acceso a sitios web sin categorizar o de alto riesgo. Cualquier informaci\u00f3n divulgada depende de c\u00f3mo los clientes hayan personalizado las p\u00e1ginas de bloqueo."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "trellixpsirt@trellix.com",
|
||||
"type": "Secondary",
|
||||
@ -37,8 +61,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "trellixpsirt@trellix.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "trellixpsirt@trellix.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -47,10 +81,39 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:skyhighsecurity:secure_web_gateway:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "11.0.0",
|
||||
"versionEndExcluding": "11.2.24",
|
||||
"matchCriteriaId": "043B932C-C0D9-4BEB-96E6-BD21ED869724"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:skyhighsecurity:secure_web_gateway:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "12.0.0",
|
||||
"versionEndExcluding": "12.2.10",
|
||||
"matchCriteriaId": "ED7160EF-0984-47EE-94EB-A22A4D4452C0"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://thrive.trellix.com/s/article/000013694",
|
||||
"source": "trellixpsirt@trellix.com"
|
||||
"source": "trellixpsirt@trellix.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,20 +2,44 @@
|
||||
"id": "CVE-2024-6741",
|
||||
"sourceIdentifier": "twcert@cert.org.tw",
|
||||
"published": "2024-07-15T09:15:03.117",
|
||||
"lastModified": "2024-07-15T13:00:34.853",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-19T18:23:40.233",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Openfind's Mail2000 has a vulnerability that allows the HttpOnly flag to be bypassed. Unauthenticated remote attackers can exploit this vulnerability using specific JavaScript code to obtain the session cookie with the HttpOnly flag enabled."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Mail2000 de Openfind tiene una vulnerabilidad que permite omitir el indicador HttpOnly. Los atacantes remotos no autenticados pueden aprovechar esta vulnerabilidad utilizando c\u00f3digo JavaScript espec\u00edfico para obtener la cookie de sesi\u00f3n con el indicador HttpOnly habilitado."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "twcert@cert.org.tw",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "twcert@cert.org.tw",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
|
||||
@ -37,8 +61,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "twcert@cert.org.tw",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "twcert@cert.org.tw",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -47,18 +81,49 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:openfind:mail2000:7.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1762976A-2372-49D5-BD94-77F8C0C86DC2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:openfind:mail2000:8.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DC17A2D8-B006-4738-A6CB-F6B277460B6B"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.openfind.com.tw/taiwan/download/Openfind_OF-ISAC-24-007.pdf",
|
||||
"source": "twcert@cert.org.tw"
|
||||
"source": "twcert@cert.org.tw",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.twcert.org.tw/en/cp-139-7941-b66e7-2.html",
|
||||
"source": "twcert@cert.org.tw"
|
||||
"source": "twcert@cert.org.tw",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.twcert.org.tw/tw/cp-132-7940-0177a-1.html",
|
||||
"source": "twcert@cert.org.tw"
|
||||
"source": "twcert@cert.org.tw",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-6745",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-07-15T11:15:02.450",
|
||||
"lastModified": "2024-07-15T13:00:34.853",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-19T18:04:47.363",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as critical has been found in code-projects Simple Ticket Booking 1.0. Affected is an unknown function of the file adminauthenticate.php of the component Login. The manipulation of the argument email/password leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-271476."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad clasificada como cr\u00edtica ha sido encontrada en code-projects Simple Ticket Booking 1.0. Una funci\u00f3n desconocida del archivo adminauthenticate.php del componente Login es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento correo electr\u00f3nico/contrase\u00f1a conduce a la inyecci\u00f3n de SQL. Es posible lanzar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador de esta vulnerabilidad es VDB-271476."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -57,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -116,22 +140,54 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:code-projects:simple_ticket_booking:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D14B5958-44A0-40EB-A3EC-02065AFD7652"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/xzyxiaohaha/cve/issues/2",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.271476",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.271476",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.374770",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-6746",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-07-15T12:15:02.707",
|
||||
"lastModified": "2024-07-15T13:00:34.853",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-19T18:02:29.417",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as problematic was found in NaiboWang EasySpider 0.6.2 on Windows. Affected by this vulnerability is an unknown functionality of the file \\EasySpider\\resources\\app\\server.js of the component HTTP GET Request Handler. The manipulation with the input /../../../../../../../../../Windows/win.ini leads to path traversal: '../filedir'. The attack needs to be done within the local network. The exploit has been disclosed to the public and may be used. The identifier VDB-271477 was assigned to this vulnerability. NOTE: The code maintainer explains, that this is not a big issue \"because the default is that the software runs locally without going through the Internet\"."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad fue encontrada en NaiboWang EasySpider 0.6.2 en Windows y clasificada como problem\u00e1tica. Una funci\u00f3n desconocida del archivo \\EasySpider\\resources\\app\\server.js del componente HTTP GET Request Handler es afectada por esta vulnerabilidad. La manipulaci\u00f3n con la entrada /../../../../../../../../../Windows/win.ini conduce al path traversal: '../filedir'. El ataque debe realizarse dentro de la red local. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-271477. NOTA: El encargado del c\u00f3digo explica que esto no es un gran problema \"porque el valor predeterminado es que el software se ejecuta localmente sin pasar por Internet\"."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -57,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -105,6 +129,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -116,22 +150,66 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:easyspider:easyspider:0.6.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "99029D7E-D899-4908-819E-BCE6EA9944DE"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/NaiboWang/EasySpider/issues/466",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.271477",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.271477",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.371998",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-6900",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-07-19T07:15:02.083",
|
||||
"lastModified": "2024-07-19T13:01:44.567",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-19T19:54:20.537",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -57,6 +57,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -116,22 +136,52 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:jkev:record_managment_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8A1D0389-96B4-43AE-B089-19085B91C0E9"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/netmanzhang/VUL/blob/main/Record-Management-System-03.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.271925",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.271925",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.375193",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-6901",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-07-19T07:15:02.757",
|
||||
"lastModified": "2024-07-19T13:01:44.567",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-19T19:55:00.210",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -57,6 +57,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -116,22 +136,52 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:jkev:record_managment_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8A1D0389-96B4-43AE-B089-19085B91C0E9"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/netmanzhang/VUL/blob/main/Record-Management-System-04.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.271926",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.271926",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.375194",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-6902",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-07-19T08:15:03.853",
|
||||
"lastModified": "2024-07-19T13:01:44.567",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-19T19:10:24.903",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -57,6 +57,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -116,22 +136,52 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:jkev:record_managment_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8A1D0389-96B4-43AE-B089-19085B91C0E9"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/netmanzhang/VUL/blob/main/Record-Management-System-05.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.271927",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.271927",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.375195",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-6903",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-07-19T08:15:04.683",
|
||||
"lastModified": "2024-07-19T13:01:44.567",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-19T19:51:55.617",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -57,6 +57,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -116,22 +136,52 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:jkev:record_managment_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8A1D0389-96B4-43AE-B089-19085B91C0E9"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/netmanzhang/VUL/blob/main/Record-Management-System-06.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.271928",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.271928",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.375206",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
65
README.md
65
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-07-19T18:00:18.771575+00:00
|
||||
2024-07-19T20:00:18.321575+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-07-19T17:59:52.237000+00:00
|
||||
2024-07-19T19:55:00.210000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,47 +33,46 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
257512
|
||||
257514
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `7`
|
||||
Recently added CVEs: `2`
|
||||
|
||||
- [CVE-2024-24970](CVE-2024/CVE-2024-249xx/CVE-2024-24970.json) (`2024-07-19T17:15:02.983`)
|
||||
- [CVE-2024-29080](CVE-2024/CVE-2024-290xx/CVE-2024-29080.json) (`2024-07-19T17:15:03.107`)
|
||||
- [CVE-2024-41281](CVE-2024/CVE-2024-412xx/CVE-2024-41281.json) (`2024-07-19T17:15:03.330`)
|
||||
- [CVE-2024-41492](CVE-2024/CVE-2024-414xx/CVE-2024-41492.json) (`2024-07-19T17:15:03.410`)
|
||||
- [CVE-2024-41601](CVE-2024/CVE-2024-416xx/CVE-2024-41601.json) (`2024-07-19T17:15:03.490`)
|
||||
- [CVE-2024-41602](CVE-2024/CVE-2024-416xx/CVE-2024-41602.json) (`2024-07-19T17:15:03.570`)
|
||||
- [CVE-2024-41603](CVE-2024/CVE-2024-416xx/CVE-2024-41603.json) (`2024-07-19T17:15:03.640`)
|
||||
- [CVE-2024-40400](CVE-2024/CVE-2024-404xx/CVE-2024-40400.json) (`2024-07-19T19:15:09.147`)
|
||||
- [CVE-2024-41600](CVE-2024/CVE-2024-416xx/CVE-2024-41600.json) (`2024-07-19T18:15:05.727`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `21`
|
||||
Recently modified CVEs: `35`
|
||||
|
||||
- [CVE-2023-51524](CVE-2023/CVE-2023-515xx/CVE-2023-51524.json) (`2024-07-19T17:34:12.537`)
|
||||
- [CVE-2023-52291](CVE-2023/CVE-2023-522xx/CVE-2023-52291.json) (`2024-07-19T16:10:22.473`)
|
||||
- [CVE-2024-22682](CVE-2024/CVE-2024-226xx/CVE-2024-22682.json) (`2024-07-19T17:15:02.603`)
|
||||
- [CVE-2024-29737](CVE-2024/CVE-2024-297xx/CVE-2024-29737.json) (`2024-07-19T16:11:25.013`)
|
||||
- [CVE-2024-3242](CVE-2024/CVE-2024-32xx/CVE-2024-3242.json) (`2024-07-19T16:24:02.483`)
|
||||
- [CVE-2024-34116](CVE-2024/CVE-2024-341xx/CVE-2024-34116.json) (`2024-07-19T17:40:23.473`)
|
||||
- [CVE-2024-34129](CVE-2024/CVE-2024-341xx/CVE-2024-34129.json) (`2024-07-19T17:30:15.177`)
|
||||
- [CVE-2024-34130](CVE-2024/CVE-2024-341xx/CVE-2024-34130.json) (`2024-07-19T17:28:29.150`)
|
||||
- [CVE-2024-35682](CVE-2024/CVE-2024-356xx/CVE-2024-35682.json) (`2024-07-19T17:36:29.837`)
|
||||
- [CVE-2024-37224](CVE-2024/CVE-2024-372xx/CVE-2024-37224.json) (`2024-07-19T17:59:52.237`)
|
||||
- [CVE-2024-37471](CVE-2024/CVE-2024-374xx/CVE-2024-37471.json) (`2024-07-19T17:02:31.163`)
|
||||
- [CVE-2024-37472](CVE-2024/CVE-2024-374xx/CVE-2024-37472.json) (`2024-07-19T17:04:42.343`)
|
||||
- [CVE-2024-37476](CVE-2024/CVE-2024-374xx/CVE-2024-37476.json) (`2024-07-19T16:52:39.713`)
|
||||
- [CVE-2024-37629](CVE-2024/CVE-2024-376xx/CVE-2024-37629.json) (`2024-07-19T16:13:17.120`)
|
||||
- [CVE-2024-39863](CVE-2024/CVE-2024-398xx/CVE-2024-39863.json) (`2024-07-19T16:01:24.143`)
|
||||
- [CVE-2024-39877](CVE-2024/CVE-2024-398xx/CVE-2024-39877.json) (`2024-07-19T16:04:04.003`)
|
||||
- [CVE-2024-5457](CVE-2024/CVE-2024-54xx/CVE-2024-5457.json) (`2024-07-19T17:55:55.343`)
|
||||
- [CVE-2024-5564](CVE-2024/CVE-2024-55xx/CVE-2024-5564.json) (`2024-07-19T16:15:03.193`)
|
||||
- [CVE-2024-5582](CVE-2024/CVE-2024-55xx/CVE-2024-5582.json) (`2024-07-19T16:05:10.290`)
|
||||
- [CVE-2024-5703](CVE-2024/CVE-2024-57xx/CVE-2024-5703.json) (`2024-07-19T16:05:42.090`)
|
||||
- [CVE-2024-6220](CVE-2024/CVE-2024-62xx/CVE-2024-6220.json) (`2024-07-19T16:07:05.057`)
|
||||
- [CVE-2024-33180](CVE-2024/CVE-2024-331xx/CVE-2024-33180.json) (`2024-07-19T18:56:27.127`)
|
||||
- [CVE-2024-33182](CVE-2024/CVE-2024-331xx/CVE-2024-33182.json) (`2024-07-19T18:56:50.050`)
|
||||
- [CVE-2024-34113](CVE-2024/CVE-2024-341xx/CVE-2024-34113.json) (`2024-07-19T18:36:42.237`)
|
||||
- [CVE-2024-34115](CVE-2024/CVE-2024-341xx/CVE-2024-34115.json) (`2024-07-19T18:02:32.427`)
|
||||
- [CVE-2024-35264](CVE-2024/CVE-2024-352xx/CVE-2024-35264.json) (`2024-07-19T18:59:28.370`)
|
||||
- [CVE-2024-35338](CVE-2024/CVE-2024-353xx/CVE-2024-35338.json) (`2024-07-19T18:58:08.977`)
|
||||
- [CVE-2024-35753](CVE-2024/CVE-2024-357xx/CVE-2024-35753.json) (`2024-07-19T18:31:44.157`)
|
||||
- [CVE-2024-35756](CVE-2024/CVE-2024-357xx/CVE-2024-35756.json) (`2024-07-19T18:45:25.210`)
|
||||
- [CVE-2024-36395](CVE-2024/CVE-2024-363xx/CVE-2024-36395.json) (`2024-07-19T18:34:58.837`)
|
||||
- [CVE-2024-37843](CVE-2024/CVE-2024-378xx/CVE-2024-37843.json) (`2024-07-19T18:37:07.720`)
|
||||
- [CVE-2024-41007](CVE-2024/CVE-2024-410xx/CVE-2024-41007.json) (`2024-07-19T18:24:59.197`)
|
||||
- [CVE-2024-4146](CVE-2024/CVE-2024-41xx/CVE-2024-4146.json) (`2024-07-19T19:03:00.867`)
|
||||
- [CVE-2024-4680](CVE-2024/CVE-2024-46xx/CVE-2024-4680.json) (`2024-07-19T18:51:53.003`)
|
||||
- [CVE-2024-5402](CVE-2024/CVE-2024-54xx/CVE-2024-5402.json) (`2024-07-19T18:03:55.583`)
|
||||
- [CVE-2024-5478](CVE-2024/CVE-2024-54xx/CVE-2024-5478.json) (`2024-07-19T18:29:50.137`)
|
||||
- [CVE-2024-5759](CVE-2024/CVE-2024-57xx/CVE-2024-5759.json) (`2024-07-19T18:40:53.863`)
|
||||
- [CVE-2024-5977](CVE-2024/CVE-2024-59xx/CVE-2024-5977.json) (`2024-07-19T18:27:34.967`)
|
||||
- [CVE-2024-6398](CVE-2024/CVE-2024-63xx/CVE-2024-6398.json) (`2024-07-19T18:25:44.247`)
|
||||
- [CVE-2024-6741](CVE-2024/CVE-2024-67xx/CVE-2024-6741.json) (`2024-07-19T18:23:40.233`)
|
||||
- [CVE-2024-6745](CVE-2024/CVE-2024-67xx/CVE-2024-6745.json) (`2024-07-19T18:04:47.363`)
|
||||
- [CVE-2024-6746](CVE-2024/CVE-2024-67xx/CVE-2024-6746.json) (`2024-07-19T18:02:29.417`)
|
||||
- [CVE-2024-6900](CVE-2024/CVE-2024-69xx/CVE-2024-6900.json) (`2024-07-19T19:54:20.537`)
|
||||
- [CVE-2024-6901](CVE-2024/CVE-2024-69xx/CVE-2024-6901.json) (`2024-07-19T19:55:00.210`)
|
||||
- [CVE-2024-6902](CVE-2024/CVE-2024-69xx/CVE-2024-6902.json) (`2024-07-19T19:10:24.903`)
|
||||
- [CVE-2024-6903](CVE-2024/CVE-2024-69xx/CVE-2024-6903.json) (`2024-07-19T19:51:55.617`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
126
_state.csv
126
_state.csv
@ -175566,7 +175566,7 @@ CVE-2021-31618,0,0,73d7e89ab608128df4530a3e31dcc9f38d0019ebbcf13ed27a6c07f673284
|
||||
CVE-2021-3162,0,0,91aa628f46c6f1edfcf47e9c1ae768fe2f228cb6afcaa514d0af2f66f854a3b4,2022-07-12T17:42:04.277000
|
||||
CVE-2021-31624,0,0,f9bb064f6b75a55ae23dbaab9b493874f3477bdd756e005d28e0ddd202fa3dd8,2021-11-02T17:11:52.207000
|
||||
CVE-2021-31627,0,0,b983abe15279ebeb536ac81adde0c0b9689c9f760389f7ac3b66ec14c701ab45,2021-11-03T12:18:22.917000
|
||||
CVE-2021-3163,0,0,b6e43415005d1b8648a7ef37f87deff33254beacfa8f7905f3338ea032829c29,2024-05-17T02:00:18.753000
|
||||
CVE-2021-3163,0,1,bda245d6ab28018888afc4fec64d1bb8208ace93861f535e2d61010555932c29,2024-07-19T19:15:06.277000
|
||||
CVE-2021-31630,0,0,93c7a1da8d5d487512cf8a33c3ec73387c3509a9a3dc3421321cfea5271501d6,2022-05-03T16:04:40.443000
|
||||
CVE-2021-31631,0,0,e4685f84a5797c763b0e66c36a5ba70eed0e1714a692dde8526e51ca26b8ff7d,2021-12-07T14:02:09.200000
|
||||
CVE-2021-31632,0,0,e692188d243a7872a36e5424d25a260426040a6c83172902699779720b13cc77,2021-12-07T14:03:06.170000
|
||||
@ -176597,7 +176597,7 @@ CVE-2021-33022,0,0,12387620eb30ab39a033a98a69d8adf5e0c7f3aa2f0730cdba76bdbda3df0
|
||||
CVE-2021-33023,0,0,84957ca62689d40114d714b0c9d1a223287a39086e70ca61881201e2684877ed,2021-10-20T22:16:01.683000
|
||||
CVE-2021-33024,0,0,b6524dbe4a1cd7bf93fdbf13b8840b0b97d76ac7145f02c41a784cf3ed6c1b59,2022-04-08T20:44:38.887000
|
||||
CVE-2021-33025,0,0,21fd0dace77928df316063f32312d1acf81d9ac5df72b0121053b1830e1c6991,2022-05-25T14:42:57.127000
|
||||
CVE-2021-33026,0,0,50be2db47f839656204543c9c117d45f021ff3e9aa6d17c591353f32cf918ac2,2024-05-17T01:57:47.060000
|
||||
CVE-2021-33026,0,1,e1c89680bcc6e7153f0139150f21f658e25d33aa5318f35ddeb9f649599b096c,2024-07-19T19:15:05.890000
|
||||
CVE-2021-33027,0,0,0801bc34fc460d7a6d4506776bdc66ae449fd654eec6748996397180c19cdd01,2021-07-28T19:39:16.430000
|
||||
CVE-2021-33031,0,0,510b4ee13ad9642728234f837e85ce4e18a9e35b7795bd363872b93ef9b01a8e,2021-06-22T18:29:56.030000
|
||||
CVE-2021-33032,0,0,3d7de3fb5f01a40c864db1d961772ba77a2ef2eb768b56aa55c2492a69cdfeee,2021-09-21T16:18:17.080000
|
||||
@ -178281,7 +178281,7 @@ CVE-2021-3517,0,0,a1d962dfb005b2e5b98c5af02df290ef64262857839ca532498beca7ccdbdd
|
||||
CVE-2021-3518,0,0,a76e97de17ac8f24c61961e5a7d8254226f8468d4aec699c6b57a015dd8e1e0a,2023-11-07T03:38:04.050000
|
||||
CVE-2021-3519,0,0,10977120fb7b4b66273cf50940e4d6bd76a1a997aa363c6e358c8486afb107c4,2021-11-19T22:04:31.987000
|
||||
CVE-2021-35193,0,0,a162afbc7a5171c627141e195f850061f3e08439984b46f73143e95bd5312c58,2021-08-11T15:25:11.357000
|
||||
CVE-2021-35196,0,0,251ce9d2b2ff85ca316b30d87455bf9fa9202dba59245295da222f08023368e2,2024-05-17T01:58:33.717000
|
||||
CVE-2021-35196,0,1,51115fe02c24dd9aa5f1b59d96aabf0d1c32122a5416e1f669f2347c49a27313,2024-07-19T19:15:06.043000
|
||||
CVE-2021-35197,0,0,22e8eda6d6da7bd81b1e3317fa4ee52603241e7efeefe5b25be85876bc1a8b43,2023-11-07T03:36:30.150000
|
||||
CVE-2021-35198,0,0,cc19841f95cab4d85eab6ca777ade77a70d4e0471df59e5b70b5b81f5d971646,2021-10-04T17:33:36.207000
|
||||
CVE-2021-35199,0,0,8e943a274ef674f856afd4581cd12225bc3ccb44bd8eaac54942c11c734cb67b,2021-10-04T17:34:23.810000
|
||||
@ -180725,7 +180725,7 @@ CVE-2021-3861,0,0,d96c927b4ce8a2c2584938d898f7247493a7a11b1c9168a50ee73528787262
|
||||
CVE-2021-38611,0,0,facd38ca235b5190c149ab951e02227e8e39012fb5f93c6ec8be351d9b2836f4,2021-08-31T11:30:40.837000
|
||||
CVE-2021-38612,0,0,291d09919a2d4e076f51c41552434ace4e345360004390eba05af900524cf7d3,2021-08-31T11:31:18.017000
|
||||
CVE-2021-38613,0,0,15f7f15d144dc659400000a596d12b65d4001066898169998efb6fa4be89003e,2021-10-05T15:38:00.637000
|
||||
CVE-2021-38614,0,0,9f4951a337de4c6fe13cfc65bdf2752c5d069df0ae5396000d0c8b738daa89b9,2024-05-17T01:59:41.637000
|
||||
CVE-2021-38614,0,1,3c6cdc8aaf419aa0dd08384359d72862e67f3a9da2f1567cbda6404d54ccd61b,2024-07-19T18:15:04.450000
|
||||
CVE-2021-38615,0,0,05c8f60751f80d9360d4c188fdf5dcc5bc0216124ec7f5af113d9d463264c0eb,2022-07-12T17:42:04.277000
|
||||
CVE-2021-38616,0,0,cdd69265ff2e527ac9e39b2cad636e30599eb5d07c5ec90c1463a359fc40ab09,2022-07-12T17:42:04.277000
|
||||
CVE-2021-38617,0,0,505127447e69a7d6e20623bf518d01e3a284c60816be7323a42675dd8361e6fe,2022-07-12T17:42:04.277000
|
||||
@ -183064,7 +183064,7 @@ CVE-2021-41499,0,0,4533365444b601534321d4d5de70f1946f80a8336beda80700193c685d9cf
|
||||
CVE-2021-4150,0,0,0d0b7965b219bc0ddf1a71b047245b29307a4594165e78413979a713c60d4cbf,2022-06-22T15:55:44.063000
|
||||
CVE-2021-41500,0,0,eaef38d53f541677aa204a9ebc1602de2c37f11789109a34722a5d88a6dcfe34,2023-11-07T03:38:57.167000
|
||||
CVE-2021-41502,0,0,b724d6ba66b92ba8c6b97cade3706ad4a07572464937ce6bfbf2977f2e864a29,2022-06-17T17:31:33.673000
|
||||
CVE-2021-41503,0,0,3e2728b4840773067a21c2bfcfefe506bc05ff32e54e1a8ca7d06c2069777cf6,2024-05-17T02:01:13.137000
|
||||
CVE-2021-41503,0,1,507044a732cba75567c9200de5f96b200fca3f8bf0bec202815e9a93f937e02a,2024-07-19T18:15:04.580000
|
||||
CVE-2021-41504,0,0,fb1adfb7674ffa96cc983b72eff36e98681ffceec30954458e632d5d81177850,2024-05-17T02:01:13.233000
|
||||
CVE-2021-41506,0,0,01d8b9a3a83b6e4dd58b7f9cb9f746d4b0cc6e281fbbd19de359fa7a4a03956e,2023-08-08T14:22:24.967000
|
||||
CVE-2021-41511,0,0,6299aae48910aa774784abd64e72607fa5e292e1f043623428d5d9d2ecdb4eb6,2021-11-30T22:39:04.107000
|
||||
@ -212287,7 +212287,7 @@ CVE-2022-48830,0,0,e22e2e0887b0b86eb4cf324cb4a9f7a83e6b7926d3beca11ffca268260854
|
||||
CVE-2022-48831,0,0,351602b86da3ea07115bf6f723f7380003eff65b8aede2b909ab31a6e1b9ff33,2024-07-16T13:43:58.773000
|
||||
CVE-2022-48832,0,0,0a5e163c028cd3d25fc5acb6c8965020bb8461631f62ab5431623b874d61e765,2024-07-16T13:43:58.773000
|
||||
CVE-2022-48833,0,0,d3249b6f1f8afc394f753bdd0cb4f946023d7de7e66839f5269338ef343a4377,2024-07-16T13:43:58.773000
|
||||
CVE-2022-48834,0,0,eb0b0b412a992033cc1ccff0c2fe442c6d58b137207c30c834c3ef3f7db02dae,2024-07-16T13:43:58.773000
|
||||
CVE-2022-48834,0,1,3fb7de4eb75ae6cee58aac6782b7ecb504ead7c703df9b113b93be65a47f5989,2024-07-19T18:00:51.173000
|
||||
CVE-2022-48835,0,0,2479254d1fbe0dc2b5306c0fd9d9d0164d10c20462ce8b7a8e261d762dd9b069,2024-07-16T13:43:58.773000
|
||||
CVE-2022-48836,0,0,fc888f24293335e1fd6f0258311ddaf2aaf3aa4461faee55b6cb3f00722e9478,2024-07-16T13:43:58.773000
|
||||
CVE-2022-48837,0,0,6ba0c2c49c8b0fc22b8aa3e7bd58e22713beeb87b8a880fecfa58840737e2898,2024-07-18T16:07:46.433000
|
||||
@ -237899,7 +237899,7 @@ CVE-2023-51520,0,0,fa83905e551c0f1871442257a4349a3f47d49f0c9a9a63d95c309c60b1ea7
|
||||
CVE-2023-51521,0,0,a06ff29eb3f01599f1af5c5654640aba0c00f73ab1f91907aa68cf552ac1d8be,2024-03-17T22:38:29.433000
|
||||
CVE-2023-51522,0,0,c9f487ed15b8fe1544b64035598e9977ad6f2bc9c247bbeccf09ca8a090b58f3,2024-03-15T16:26:49.320000
|
||||
CVE-2023-51523,0,0,8f7539940b5487a4df93510946d4f5efc99f8581b96de29f580f4e789b594e16,2024-06-17T12:43:31.090000
|
||||
CVE-2023-51524,0,1,d800c5821592dba1b3c1879095154e138bc54e57bc330b0d05f7b049703f21f2,2024-07-19T17:34:12.537000
|
||||
CVE-2023-51524,0,0,d800c5821592dba1b3c1879095154e138bc54e57bc330b0d05f7b049703f21f2,2024-07-19T17:34:12.537000
|
||||
CVE-2023-51525,0,0,872b78291c393b7b0f809b690427095d99e4b9d587b6ad9e5c335d85a728a1c9,2024-03-15T16:26:49.320000
|
||||
CVE-2023-51526,0,0,7401816abf99d4a162f81c4a64497409f17996ee97dfb971aaac55bd5051b4b0,2024-06-13T18:36:09.010000
|
||||
CVE-2023-51527,0,0,ddfd9dc2bd6a5bcc26be050c33905dbd44ba492da91baba9f7e606359932d93a,2024-01-05T18:13:46.270000
|
||||
@ -238461,7 +238461,7 @@ CVE-2023-52288,0,0,297c3e93d2578fa4354d42073bbfcc9c84a93418874a891bfd157ba56fb9c
|
||||
CVE-2023-52289,0,0,b0b62bf64cde12eff577800bdca9d7c0c719bc9a23d6c24a235e18254584af67,2024-01-24T18:48:24.283000
|
||||
CVE-2023-5229,0,0,96ae4a14c7f75bcf2b6cbe69f7946f8795ec64211a57e06d1e0d2d6ff05a7656,2023-11-08T18:35:10.590000
|
||||
CVE-2023-52290,0,0,b027d3a77e3918cc6823c1648721e9d0ca22799d7375d42fe7f068b3c1f18fba,2024-07-16T13:43:58.773000
|
||||
CVE-2023-52291,0,1,7772cf09da97597a918a9150daed1859a98d6c45b4018d585ba5a188af883777,2024-07-19T16:10:22.473000
|
||||
CVE-2023-52291,0,0,7772cf09da97597a918a9150daed1859a98d6c45b4018d585ba5a188af883777,2024-07-19T16:10:22.473000
|
||||
CVE-2023-52296,0,0,85a5b959f2db874145dc7271afa4c982911881063ce8b8741fd891792d7a0806,2024-06-10T17:16:16.537000
|
||||
CVE-2023-5230,0,0,a536f5ec0e596e59d6ed211c038722ef9594f65abf67a435dc22663a31135f5f,2023-11-07T04:23:38.493000
|
||||
CVE-2023-52302,0,0,22ea8ee42f1d0c97611b1d0c11616324d4f2cec9c11a2c69cd863452202dca24,2024-01-05T12:14:39.403000
|
||||
@ -244409,7 +244409,7 @@ CVE-2024-22663,0,0,1df834bd60409bcfdc952b1d16a72a2b79aa4833b641f5c26890355046fa7
|
||||
CVE-2024-22667,0,0,7f56d340505b9c3137def4c421a855d45fd7bbe83810d24f76e0d49e0f8614f2,2024-02-23T16:15:48.487000
|
||||
CVE-2024-2267,0,0,2beab3e4260cef721297cd0e9cb16cbb758be6b3109196be8212a33811ea4f06,2024-05-17T02:38:07.740000
|
||||
CVE-2024-2268,0,0,e2a7dcfd73ad41fec77d11c0ea586fcbb84dfae867d0aa7884e9bac53d173362,2024-05-17T02:38:07.847000
|
||||
CVE-2024-22682,0,1,c1404a1205884a361a894ae22aa1c3d2c5d53e44fb2248c4bfc089a944299c07,2024-07-19T17:15:02.603000
|
||||
CVE-2024-22682,0,1,5a340c1b31b6e259c63ff9afdb9ddfaa7ba2e6d870ae0776db25aa39ef718055,2024-07-19T19:15:08.093000
|
||||
CVE-2024-2269,0,0,716bb232865d4622770d80e3ad9b9f6636d31addbbd5842da0c4461f410c04dd,2024-05-17T02:38:07.940000
|
||||
CVE-2024-22699,0,0,a5781608ff1e46696ffacdee768d3d0c988970ac4c163d777ce0ccca4285198e,2024-01-23T14:22:44.407000
|
||||
CVE-2024-2270,0,0,4e7a65f130d23c4c767220472a54f1e1a694a674ca4896ba97c8a2bb99f01cc1,2024-05-17T02:38:08.043000
|
||||
@ -245800,7 +245800,7 @@ CVE-2024-24963,0,0,5d6e1af856b22054c356418d49796e2363906ed1aaaf2259e78ef057612da
|
||||
CVE-2024-24964,0,0,453b708cc71a26e1c2e6a095353d8c5371dcecf82b39d783f4d95f24daf1a4b0,2024-03-12T12:40:13.500000
|
||||
CVE-2024-24966,0,0,596d9f70ed531a9ce913b647600f9cfc649827cf292b66c3b67d74e0809d7525,2024-02-14T18:04:45.380000
|
||||
CVE-2024-2497,0,0,0abba4a60a0501980b979aaaf4b97236170cb15ea02aea63aa677f7cf3690b8f,2024-05-17T02:38:15.830000
|
||||
CVE-2024-24970,1,1,893ae421113022b9f5e6e7aad009917f97446326454722cb23f7783cc9a9e949,2024-07-19T17:15:02.983000
|
||||
CVE-2024-24970,0,0,893ae421113022b9f5e6e7aad009917f97446326454722cb23f7783cc9a9e949,2024-07-19T17:15:02.983000
|
||||
CVE-2024-24974,0,0,58746381295b34b611cdb4edd106ea5da27c78c578480d54a0db25ca5467d003,2024-07-11T14:47:54.920000
|
||||
CVE-2024-24975,0,0,e45e77656a6eb7775bbf17ad859bf5d3a4697e166584b896665ee19b46725872,2024-03-15T12:53:06.423000
|
||||
CVE-2024-24976,0,0,7e14392294efbbf37c55b7bae98233e6ba32f6560de82ec908c819c3c8f743ff,2024-04-03T17:24:18.150000
|
||||
@ -246718,8 +246718,8 @@ CVE-2024-26270,0,0,2370bdb7a99956787a3745aa3f3e8554faf5c6062fbc90c3c2a2f302e3ff3
|
||||
CVE-2024-26275,0,0,21e67c06e24d408ad1a549f766b54f5dfd1b4842df576d827b739e2a28d49505,2024-06-11T12:15:14.017000
|
||||
CVE-2024-26276,0,0,7406f6551c3634363606a828a01f36a4203616ca4676532db244783183501388,2024-06-11T12:15:14.153000
|
||||
CVE-2024-26277,0,0,53da675804208a63e801a731a45b8146add8b1e603e83f9c176483f042fa922f,2024-06-11T12:15:14.273000
|
||||
CVE-2024-26278,0,0,5986564f5c39d94f87f9494805b5faa83d3851b974cedd3e7f1a4eaf4df96ffe,2024-07-09T18:18:38.713000
|
||||
CVE-2024-26279,0,0,5bb6c47fa83d2cfe0b536ce92f13c6139ec1adf5e91efd22c3f866b53c3e15df,2024-07-10T09:15:02.400000
|
||||
CVE-2024-26278,0,1,a4bf5f7d4f5a8cc66cc891c37bd6872984880cd4b8b9e994fb28df36f06ab446,2024-07-19T18:53:12.727000
|
||||
CVE-2024-26279,0,1,495c848487ea7b68d426f27b99de0402b60520a7c129465843fde2c78b15bbc3,2024-07-19T18:53:34.103000
|
||||
CVE-2024-2628,0,0,3eb383942c41e553b12d37d763a3ecf0b59954bbb778306cb6907ca273bdbf0e,2024-04-01T15:23:07.793000
|
||||
CVE-2024-26280,0,0,1f3fc8cd8b6e3eb3dd36bd8ce4d8f8a9e24e131da3be579fb8d9bdda224678f9,2024-05-01T18:15:15.537000
|
||||
CVE-2024-26281,0,0,79880eb9ab547a64badb9469ec54aaf28b8e0e224b4897c69af19cf6a4aea84d,2024-02-22T19:07:27.197000
|
||||
@ -248709,7 +248709,7 @@ CVE-2024-29072,0,0,50e2db556663c43fd665c3ae801a5bd36f73f0e7479a230bf4ff9553f9fcd
|
||||
CVE-2024-29074,0,0,dae045c5f696de776b77da3987f8405651ce1bf4fa99e4d5313acc43e5165076,2024-04-02T12:50:42.233000
|
||||
CVE-2024-29078,0,0,a4fab3b35091f8fd08881f2bf49d899dc5478faeb8df15472b3560684c1a5420,2024-05-28T12:39:28.377000
|
||||
CVE-2024-2908,0,0,3845fc124bc9f710736d5363f9b086190df4e2925cb4e5b4a7eb9455fd55b3c6,2024-07-03T01:53:38.703000
|
||||
CVE-2024-29080,1,1,8a46f3e344c1eaf92b123fc0843d07f3e2398685a54e541c242233bbbbfee34c,2024-07-19T17:15:03.107000
|
||||
CVE-2024-29080,0,0,8a46f3e344c1eaf92b123fc0843d07f3e2398685a54e541c242233bbbbfee34c,2024-07-19T17:15:03.107000
|
||||
CVE-2024-29086,0,0,a506e441c3bf25764a8b903d5765d986b768db67b23cfb3ff53fe13b9a27e4ba,2024-04-02T12:50:42.233000
|
||||
CVE-2024-29089,0,0,0e8f97a635f9f0c1a64450754b2a18a9e0c4596034f0fadf2dfda26a23dacbbd,2024-03-20T13:00:16.367000
|
||||
CVE-2024-2909,0,0,0e3061bf6a0e2ec3e09b8019aa64a03564628e11a8822cb14e5d6cf0553832b0,2024-05-17T02:38:36.843000
|
||||
@ -249008,7 +249008,7 @@ CVE-2024-29733,0,0,0811972ef853088b726fd2b07316244d1d628e55e310910ac8174bd65d097
|
||||
CVE-2024-29734,0,0,65bb1ba04f673142d3081922c5e4533cd4af140db3cdfbbce09ab73848e3b6c3,2024-04-03T12:38:04.840000
|
||||
CVE-2024-29735,0,0,1c27e1fe9dbb50907062f908fab6fbb55a16239f685d6be40b04c11200e2a361,2024-05-01T19:15:23.573000
|
||||
CVE-2024-29736,0,0,a7b73099f01cfc61426635b9d2fd7a10ea2008e8a44cb47bcf89de564b7f1392,2024-07-19T13:01:44.567000
|
||||
CVE-2024-29737,0,1,a77df9c668115e88f32080717a7a08c909bf33e8a8b6486eca536ea661fccb1f,2024-07-19T16:11:25.013000
|
||||
CVE-2024-29737,0,0,a77df9c668115e88f32080717a7a08c909bf33e8a8b6486eca536ea661fccb1f,2024-07-19T16:11:25.013000
|
||||
CVE-2024-29738,0,0,1c3e1564461702d87cd213d777f3523814ac3c73b5cc61bff5ae595e06e0fbeb,2024-04-08T18:49:25.863000
|
||||
CVE-2024-29739,0,0,ff7d8db191ec3bc24b9fd0a0e51d4426e2f32708f8ba1a8e8a840affcd32aeb7,2024-04-08T18:49:25.863000
|
||||
CVE-2024-2974,0,0,f10703d4490e9d3ed63c6b4abd6c9bf87d6d9b2c11e56d030e360944602d03aa,2024-04-10T13:23:38.787000
|
||||
@ -249385,7 +249385,7 @@ CVE-2024-30101,0,0,7930ed1d01b5b02ebc919bac3d4e56f05b80c135c47d9aae654fe173e1327
|
||||
CVE-2024-30102,0,0,319135154fd92fe7d8106fde2ca3c4802e21706ca62151c235c5521e4367379c,2024-06-20T17:24:52.287000
|
||||
CVE-2024-30103,0,0,cbcd73720f86b02c166360f547f14e75567d871ea6a9bb35fd8a94c030f28d7b,2024-06-20T17:26:40.603000
|
||||
CVE-2024-30104,0,0,0d6554d17808fae404c18fd87f0cb343eeacec3983f90ccf7acd89f92adcb133,2024-06-20T17:27:01.447000
|
||||
CVE-2024-30105,0,0,078b2e18b0eeac9c8390325264d70460d1239a379abb18d69f8a888c569adbbc,2024-07-09T18:18:38.713000
|
||||
CVE-2024-30105,0,1,177f59806b90f7454e05eec5de7f6b4d6c52d371716d38a2a5174f4a99a6d6ad,2024-07-19T18:59:11.433000
|
||||
CVE-2024-30107,0,0,d3b5ab85a30627420755b961fce34a4b2d10a642f6dfcc200d0ec65e71213655,2024-07-03T01:53:50.107000
|
||||
CVE-2024-30109,0,0,04881debc711277dac69677e9ba1bd3a604eac95048cd8a9d9b601fb19907fcf,2024-06-28T10:27:00.920000
|
||||
CVE-2024-3011,0,0,c4846fd2702ef9f4bfa13037695154c3570856acd954e92705194ddf5482466d,2024-05-17T02:39:40.533000
|
||||
@ -250922,7 +250922,7 @@ CVE-2024-32407,0,0,fbfaf7068ca597095592e38589ff8309655659ac5408bc5050ead219b55bb
|
||||
CVE-2024-32409,0,0,cdbdcb7de47ba32c82cee0bb38b83e5519f96f658f96608562f1e326a9e11332,2024-07-03T01:56:34.063000
|
||||
CVE-2024-3241,0,0,30b752b6ef5f38382b5d572e3de76b73f3f6fe3c9ee69699b564850e70a0c6b3,2024-05-14T19:17:55.627000
|
||||
CVE-2024-32418,0,0,8172cdb05b747b2afd259a179cd5212ac2debbeaf77726c784f5b816cfdb0abc,2024-07-03T01:56:34.817000
|
||||
CVE-2024-3242,0,1,0753c592a4141511b7b3f4c81254cd267743cc6b5e9ea8c66b642642aec73f3f,2024-07-19T16:24:02.483000
|
||||
CVE-2024-3242,0,0,0753c592a4141511b7b3f4c81254cd267743cc6b5e9ea8c66b642642aec73f3f,2024-07-19T16:24:02.483000
|
||||
CVE-2024-32428,0,0,e92a586d0042e2a50a8472dedb0e8a402fc021118b6e178b0be2f35b18ed1a72,2024-04-15T13:15:31.997000
|
||||
CVE-2024-32429,0,0,08bf59fbf8ca8215ee905eedbc96639cdf782abe560db5472396d2a8508a1db9,2024-04-15T13:15:31.997000
|
||||
CVE-2024-3243,0,0,b3be2b5736d16e5fdb86721d9ee927a8c62b47b675a9c47320a4673743e48844,2024-04-16T13:24:07.103000
|
||||
@ -251501,9 +251501,9 @@ CVE-2024-33161,0,0,7c862270cd8db5129099f6546f3d477eb1434dd611bb5f19fdd029c5b8f8a
|
||||
CVE-2024-33164,0,0,c1a8c6145de610892a7bb74e83180ec7a64a9f7db7bc45d4e35a23e8ebd4b541,2024-07-03T01:57:35.293000
|
||||
CVE-2024-3317,0,0,15025142ba0ff8fc3f744db50ac9158b6bcb9b6d5a57142218ea92afecce54a1,2024-05-15T16:40:19.330000
|
||||
CVE-2024-3318,0,0,71502ae7f4475eb417a0f66428af131ecf9e20dfbae9cc78fb40285e74c55810,2024-05-15T16:40:19.330000
|
||||
CVE-2024-33180,0,0,6562ac8d4986d8f67087ecd4402a9c0cccda3a7addddbdcd0de9052ac369e373,2024-07-16T18:00:02.110000
|
||||
CVE-2024-33180,0,1,be009f10bcebf1e98910a8635d0e84bddf7114d6da1db43077d57e11c3875055,2024-07-19T18:56:27.127000
|
||||
CVE-2024-33181,0,0,77250253d08a3feb8fbbde7865e83c75f042d3ca6fd20c862b5cca96419dc488,2024-07-17T13:34:20.520000
|
||||
CVE-2024-33182,0,0,5a56c714f351b63cd170f43a4b8811af0dd95f7067666d5d531a9d0912fb541d,2024-07-16T18:00:02.110000
|
||||
CVE-2024-33182,0,1,5c7ef37a480fd030990cd949b2c37482b68e7bad26bc93f18c84eca3078bea91,2024-07-19T18:56:50.050000
|
||||
CVE-2024-3319,0,0,3b63602fbf088f6ff76602ae3f5143e8ab646a9d9d32adce3daded5265d3ba0c,2024-05-15T16:40:19.330000
|
||||
CVE-2024-3320,0,0,00dd140c669ed55b9724819953be5e5ab674983ce3dcac0f7cca51e60d13bb6e,2024-05-17T02:39:50.797000
|
||||
CVE-2024-3321,0,0,c2a87eddc88d30331563f9d17a640b75164460d2c5dacd42388be73c643c2230,2024-05-17T02:39:50.900000
|
||||
@ -252061,17 +252061,17 @@ CVE-2024-3411,0,0,c5534494d0c0f328f6dd6a29b2c75cf0917384aed2d3044a8f39c15c542a25
|
||||
CVE-2024-34110,0,0,c15838464fcaf085b2c09e471beb2e732398e46cad7f992477efffffb5459007,2024-07-09T15:09:42.910000
|
||||
CVE-2024-34111,0,0,4a9af478fa0b194ac18b28c5d5f631624ab8b5f4cddcd67eee0080f90cb10414,2024-07-09T15:24:38.657000
|
||||
CVE-2024-34112,0,0,e62a170073c335d4b2fa523b231a2040753ea6d61925540b759aae879b0a33d7,2024-06-13T18:35:19.777000
|
||||
CVE-2024-34113,0,0,7b6843edfcd14fb8a7629765448f30a61e7beb403d308d90890d18f8360ddf9e,2024-06-13T18:35:19.777000
|
||||
CVE-2024-34115,0,0,1b054e2e34ac02d99381d8e9ef3dc5dff53c1ced25c5dcc74c0f1f19d8805b38,2024-06-13T18:35:19.777000
|
||||
CVE-2024-34116,0,1,09fbac3718cdfc715ab3de1929ed1cef43d5ef1bea636640bb6faeb5c824040f,2024-07-19T17:40:23.473000
|
||||
CVE-2024-34113,0,1,0f7d0a8eb1af93d43a3d745444146bc9527531bee6c987cddc2959cabac9896d,2024-07-19T18:36:42.237000
|
||||
CVE-2024-34115,0,1,cc8b9b55a33ad4e137b074effd11699dd96f8494f93e6413f33a6c251661c876,2024-07-19T18:02:32.427000
|
||||
CVE-2024-34116,0,0,09fbac3718cdfc715ab3de1929ed1cef43d5ef1bea636640bb6faeb5c824040f,2024-07-19T17:40:23.473000
|
||||
CVE-2024-34119,0,0,b18bee7f46141710c36322baeea2f2f79cc2cfb9042e189f93a16a755c8d108c,2024-06-14T20:03:08.293000
|
||||
CVE-2024-3412,0,0,e50c7e3ae6f10b261f3da66fd6437a79038925b3952464be81ac0e7b8712c198,2024-05-29T13:02:09.280000
|
||||
CVE-2024-34120,0,0,59b2d9c769f5e7837181f42b948f1f4d6a71599cbcd1b502e5c0f6b22b12ebe5,2024-06-14T20:02:45.567000
|
||||
CVE-2024-34122,0,0,1f1afdb8bcd7920872d40bc049791e258094ad813a8f738f73973f16e8f185df,2024-07-02T17:44:45.700000
|
||||
CVE-2024-34123,0,0,60f48b7c1a1214b049b9220d35589296122b7174f3f0274e4f9438886e7fb319,2024-07-11T13:06:13.187000
|
||||
CVE-2024-34129,0,1,4b371bd2ce78a755ab5bce8486ffc40418a5eef964d8e637f4bd806924a46c43,2024-07-19T17:30:15.177000
|
||||
CVE-2024-34129,0,0,4b371bd2ce78a755ab5bce8486ffc40418a5eef964d8e637f4bd806924a46c43,2024-07-19T17:30:15.177000
|
||||
CVE-2024-3413,0,0,393490437f33ce616f0a6848540c1c0d3eed8ed2038327f28efd50e305f3828b,2024-05-17T02:39:54.073000
|
||||
CVE-2024-34130,0,1,39c33a1c2e45222da36d81ad20fcf2f2dae4088c0999d560d63f2526f4c81a40,2024-07-19T17:28:29.150000
|
||||
CVE-2024-34130,0,0,39c33a1c2e45222da36d81ad20fcf2f2dae4088c0999d560d63f2526f4c81a40,2024-07-19T17:28:29.150000
|
||||
CVE-2024-34139,0,0,31d5c4a8a58cc938349a57ec1f1fa8db5c0718d4f925f1121432b335f8c9c667,2024-07-11T13:06:13.187000
|
||||
CVE-2024-3414,0,0,85e73a02de53c5bccb3cd76452d1972fd78b5413987e018bf8d64db8ededd514,2024-05-17T02:39:54.160000
|
||||
CVE-2024-34140,0,0,d42a485cda9b4c14ee3827526c2ca3f4dbd317f45889049c0298065354f30d82,2024-07-11T13:06:13.187000
|
||||
@ -252716,7 +252716,7 @@ CVE-2024-3526,0,0,3b86e48cdd64c94b1957dd961f1ea8a5609328c0a5fd236d499daf2f49d2a8
|
||||
CVE-2024-35260,0,0,bae5987a3d9c4653f4a8ff7faa6c237ff82527372850961d3f63629ac612e217,2024-06-28T23:15:11.457000
|
||||
CVE-2024-35261,0,0,9d9063b6e7979be3a79ef13bd9cc70b3fb0340950dd44d60d9d3d687415ebbe0,2024-07-17T15:48:39.097000
|
||||
CVE-2024-35263,0,0,f00bc0132870d05293845d05b9562badae38c6c7b9bb0d9a00ba1c99b84818b6,2024-06-20T16:32:31.287000
|
||||
CVE-2024-35264,0,0,93e7c701e1ef80d310b24809194d2644700ad22a6619971e5ca319f8f5a7b423,2024-07-09T18:18:38.713000
|
||||
CVE-2024-35264,0,1,40d724389414ca4fabf1feae652fc23d2bbd2b3015de995d803ac6656e74295d,2024-07-19T18:59:28.370000
|
||||
CVE-2024-35265,0,0,66f306784b0cec4cac480e0b04ab07434b85a607c811d4eded9bc25afd0a65fe,2024-06-20T16:33:28.080000
|
||||
CVE-2024-35266,0,0,72f85b66607ed3ec09a2f90bfb8b5421fbcbe1083bf3c8d31d5232091779c5c4,2024-07-17T15:03:10.610000
|
||||
CVE-2024-35267,0,0,8d2f4a11b808fec8563f241fc658cf43f5e54d7aaadc09b793c2bc37e252ec9d,2024-07-17T15:02:22.937000
|
||||
@ -252753,7 +252753,7 @@ CVE-2024-35328,0,0,fb4ef24959ef3b86e1d1e2a626668146540c0ab6d259d48f6d635a7a92dd5
|
||||
CVE-2024-35329,0,0,4292102d3fac0226e3e155445f438715ce7df9eb09ed90a898e6b306574b942f,2024-06-12T22:15:18.400000
|
||||
CVE-2024-3533,0,0,488bd266f4041c85454e2052fe9f29a33b96935dc189b43a270de9d8362e90d3,2024-05-17T02:39:59.617000
|
||||
CVE-2024-35333,0,0,a56b2cbb1d825bab243b29d0e8302efa743a6d64a0ad5ee6a14e21ffdd4302cd,2024-05-29T19:50:25.303000
|
||||
CVE-2024-35338,0,0,4f89874487ceb85f057c56000ca48a188a2db440489d06ff770502776eda00c8,2024-07-16T18:00:02.110000
|
||||
CVE-2024-35338,0,1,41104e352664b04e28e033aa02c5869f3a89a42461e39bce966f727fb8f2d51d,2024-07-19T18:58:08.977000
|
||||
CVE-2024-35339,0,0,bda26dbfd7448a5a1d77a8cc49c3bca16a6f7dd67b8f4622c92179451c9d0982,2024-05-24T18:09:20.027000
|
||||
CVE-2024-3534,0,0,a24b539c4ddbcbbbcd76a0a70e496243d7203c000aa2dbf195c274be99bd3f1c,2024-05-17T02:39:59.703000
|
||||
CVE-2024-35340,0,0,208fd1528799a390da0274829910466a1b7fd43365d7d44eef3241578a979281,2024-05-24T18:09:20.027000
|
||||
@ -252927,7 +252927,7 @@ CVE-2024-35679,0,0,e3874d05dedaa5997bd52774985048fece90019c44680ab2e261aaece615d
|
||||
CVE-2024-3568,0,0,2f548317b29c37ed58ca4217ab349f9e591fac213b693fb6a25d52bf2ee21f1c,2024-04-10T19:49:51.183000
|
||||
CVE-2024-35680,0,0,30b3a69a697953774910476dc31463038ad8b473ba7596113f1d83c92dbcc601,2024-06-12T17:49:56.670000
|
||||
CVE-2024-35681,0,0,5816248594069c5b872a449cf953d1983d148a3e6df5e63b1c0a9449611baf05,2024-07-18T19:16:42.277000
|
||||
CVE-2024-35682,0,1,e3065bea188f47617d60d5ec78ff5563173441e56553fbc4305bfb9f6b8b0f5f,2024-07-19T17:36:29.837000
|
||||
CVE-2024-35682,0,0,e3065bea188f47617d60d5ec78ff5563173441e56553fbc4305bfb9f6b8b0f5f,2024-07-19T17:36:29.837000
|
||||
CVE-2024-35683,0,0,35d7e7c403c9e1a0af5b15ee529f21dfe95dd77d68bca956781c650575c54c30,2024-06-13T18:36:45.417000
|
||||
CVE-2024-35684,0,0,73ceea3685cab6d12bcc00b1be64bf260bc52647423fb13caa461de77b765285,2024-07-18T19:15:49.853000
|
||||
CVE-2024-35685,0,0,139851b07c410dda78a8d072ad9e34deae44fbd00bd025834cea54049b4e0532,2024-06-11T13:54:12.057000
|
||||
@ -253003,10 +253003,10 @@ CVE-2024-3575,0,0,7b73b64d176ee42e3f815efb129e0a4e8daabc141e22843995ce1432261811
|
||||
CVE-2024-35750,0,0,337904e02d48eff7e7f71ff4e0b4d15f230905a46ebf33e9ed3f06ed45b6365c,2024-06-10T02:52:08.267000
|
||||
CVE-2024-35751,0,0,2f4b51636ece37d50579e65fb58d2700611ff65fd14c4b21be633ae796fa0057,2024-06-10T02:52:08.267000
|
||||
CVE-2024-35752,0,0,062777696b3e277bdd4663be2181ce3994f39fef6908c28ebd787d505d32576b,2024-06-10T02:52:08.267000
|
||||
CVE-2024-35753,0,0,4bb4696f328f0e4e7859efe7b659bb97bc3f928fa53d27e62e615360845e3fbd,2024-06-10T02:52:08.267000
|
||||
CVE-2024-35753,0,1,4ad7364fde338b1172d3912b082d48ff9c7e6bb90d9788eb462ee65f933adbdc,2024-07-19T18:31:44.157000
|
||||
CVE-2024-35754,0,0,6542d4ccfbee23f434dbe55310367fe2a58769f4413cd83c76145804203a6991,2024-06-12T18:19:06.043000
|
||||
CVE-2024-35755,0,0,a8c10fddaac41070d5fe50fd470da1315522de64d4a44961b0b2aff5b7478232,2024-06-10T02:52:08.267000
|
||||
CVE-2024-35756,0,0,bd881757a8569f9b1783d5914550f75d4f6836125b5d758f1013fcd5113dc831,2024-06-10T02:52:08.267000
|
||||
CVE-2024-35756,0,1,544619c9ecc5325b30fd6bce5cf3678837c7f45621d4b9369a6b2ab863337f02,2024-07-19T18:45:25.210000
|
||||
CVE-2024-35757,0,0,1783dc94b696b52627bcb10bcd86c9195ecb7dd5f909ee1c78c7f825973d91cd,2024-06-24T19:19:01.097000
|
||||
CVE-2024-35758,0,0,c003876eab7b54fdade1783d14653406500e6822c823598d393dc5d8fd37a00a,2024-06-24T19:19:51.957000
|
||||
CVE-2024-35759,0,0,e957a3d510ea6fb897a8dc7146e8bb7eefa5cb0f601b99033133995f35de7948,2024-06-24T19:20:39.243000
|
||||
@ -253548,7 +253548,7 @@ CVE-2024-36391,0,0,77310a97703465811c5ddd3ebe2104670dbc28c3dea8fc35d729dda239044
|
||||
CVE-2024-36392,0,0,f8ffad51e43f014822bc8d56227eafc027d77ce4af9f8ddb281e1dd26642b42e,2024-06-03T14:46:24.250000
|
||||
CVE-2024-36393,0,0,66cc85a4816620185dd811312e53841307ae83d95e0a80e5417b0f2e7ce598f0,2024-06-11T17:46:59.160000
|
||||
CVE-2024-36394,0,0,ce487e69c50908b259342c996fd749aeec003c1cc9ebc8d7c04cb76587e4b2a6,2024-06-11T17:46:38.227000
|
||||
CVE-2024-36395,0,0,c6034266d05648a78d5a6c28cb5264c7e8bba765bd3ba32ef65dbbdf3138f011,2024-06-13T18:35:19.777000
|
||||
CVE-2024-36395,0,1,f89c2edf8412c7a856779bf7bdcd2dc639ea5537dbb90aaf5a59ca64c625227c,2024-07-19T18:34:58.837000
|
||||
CVE-2024-36396,0,0,0e6924514e3a92d628b298cd68bd36948dbb22e9cbe90a69cf64659cd177b86d,2024-06-13T18:35:19.777000
|
||||
CVE-2024-36397,0,0,188c11e4d152fc37a7853e376b1b43fe1b9cf304441640b2de09cf263ffc914e,2024-06-17T12:42:04.623000
|
||||
CVE-2024-36399,0,0,343a0b337c47a08f8ef5da762844b89fa9f0783d7ae2cdee4dacb27b86b494cf,2024-06-07T14:56:05.647000
|
||||
@ -254014,7 +254014,7 @@ CVE-2024-37212,0,0,1da1545884710cf41d492815f0c054f5d2977dca844bcd810f9fc3aadcdd7
|
||||
CVE-2024-37213,0,0,21a78712c2c218b3b0b384a5d4240b3e62e3d159fc9e12c6e7a55a9b4833902f,2024-07-12T16:34:58.687000
|
||||
CVE-2024-3722,0,0,9dc3cd0859a6ddeaf0632839a465d86a9a29445f6ee77561de6f569ccc572620,2024-05-14T16:11:39.510000
|
||||
CVE-2024-37222,0,0,635e8498a543c26c1589880d4834a9aa974ef1739df3bbdce179ff0012928442,2024-06-20T16:07:50.417000
|
||||
CVE-2024-37224,0,1,2df65ebcbcc9902f80631b03b15abc6d30e5ffeaacc8e5755dc9efbfd99df9cf,2024-07-19T17:59:52.237000
|
||||
CVE-2024-37224,0,0,2df65ebcbcc9902f80631b03b15abc6d30e5ffeaacc8e5755dc9efbfd99df9cf,2024-07-19T17:59:52.237000
|
||||
CVE-2024-37225,0,0,179ee80c42794d6e0c60673ab266af3489a613462005d715fc62812821eb180b,2024-07-09T18:19:14.047000
|
||||
CVE-2024-37227,0,0,8976611308ba369d49147eef8d8ea5d2a5131539396f1b2753e8184974920298,2024-06-24T18:55:44.513000
|
||||
CVE-2024-37228,0,0,50dbfc0262e032fcd024e283ea4d2f5dc7a22bd356a2985f5a28238a3bd731e1,2024-06-24T19:26:47.037000
|
||||
@ -254142,10 +254142,10 @@ CVE-2024-3746,0,0,b404a3f5af28975fb4e5d0eb577c67fe9710274ad0c55beaeeb6ef81bbf0e3
|
||||
CVE-2024-37462,0,0,44cdd4da08aa3278c309c9b230a9ebcb29a8195fe20831e74a9775071dc13635,2024-07-09T18:19:14.047000
|
||||
CVE-2024-37464,0,0,d5dd0cd8721de83e6db957b2a4c4526c848f707b5f4204dfeac1e6b719416e1f,2024-07-09T18:19:14.047000
|
||||
CVE-2024-3747,0,0,3219ce820822d72e46103b803901087d25784fb8e92da6509df83502f94f1ce3,2024-05-02T18:00:37.360000
|
||||
CVE-2024-37471,0,1,d465bdcae3c1ad0d7280b371addcc2292b7e76a7a90d8614a04cd4784c1cba62,2024-07-19T17:02:31.163000
|
||||
CVE-2024-37472,0,1,0212378c488764d33b1d17de1bc88a5356a23ba19a78046e8c133cfbba541862,2024-07-19T17:04:42.343000
|
||||
CVE-2024-37471,0,0,d465bdcae3c1ad0d7280b371addcc2292b7e76a7a90d8614a04cd4784c1cba62,2024-07-19T17:02:31.163000
|
||||
CVE-2024-37472,0,0,0212378c488764d33b1d17de1bc88a5356a23ba19a78046e8c133cfbba541862,2024-07-19T17:04:42.343000
|
||||
CVE-2024-37474,0,0,e29b3ccf1312f58f8b90ea5bf768b9e4ab78293e46701b43859d8d72f1b6ca41,2024-07-19T15:34:49.460000
|
||||
CVE-2024-37476,0,1,beaa8c83ba0e39b20623f48990395c389b87f4d82490a453165560bffd5535b0,2024-07-19T16:52:39.713000
|
||||
CVE-2024-37476,0,0,beaa8c83ba0e39b20623f48990395c389b87f4d82490a453165560bffd5535b0,2024-07-19T16:52:39.713000
|
||||
CVE-2024-37479,0,0,b47f15244b7d8bdc435b7b058e1a43515a90d9355fb7c5cb51f1025055601a89,2024-07-02T12:09:16.907000
|
||||
CVE-2024-3748,0,0,130f91484f33c46b6a8a1b827c41c8bedf887e9f91a42beeaa1df38ecf15e978,2024-07-03T02:06:31.737000
|
||||
CVE-2024-37484,0,0,5aa19fbeade225427f8be4047b53cf5aa423ef4d4466f797804f490d4e5cd642,2024-07-09T18:19:14.047000
|
||||
@ -254198,7 +254198,7 @@ CVE-2024-37623,0,0,b515ba49cdad646a6e4424a0af8caad03b3eeb5dcc7461835b4fa847ff81d
|
||||
CVE-2024-37624,0,0,c8b41555fa1b5545381823af8d22868fb77fdcda0648f938a956fe7589aa93b7,2024-07-18T20:58:16.307000
|
||||
CVE-2024-37625,0,0,edc6c7ada3ab39a077d81e5fed77b0c921f58ec6eccf265b1a8392c99d85829c,2024-07-18T20:57:39.087000
|
||||
CVE-2024-37626,0,0,67f0e21678f6260b33b002fa2f7c441578e8bb71c1b35d831202b3d9d14d22d7,2024-07-03T02:04:23.230000
|
||||
CVE-2024-37629,0,1,c452ca69266bafb149b8a8c25dc755c132605c57e188dcb250482aa14f3f8d70,2024-07-19T16:13:17.120000
|
||||
CVE-2024-37629,0,0,c452ca69266bafb149b8a8c25dc755c132605c57e188dcb250482aa14f3f8d70,2024-07-19T16:13:17.120000
|
||||
CVE-2024-3763,0,0,cd55c084ec54d3c0946f7ee5493c1963824aa0176b48aa87ed4ff8f27854003d,2024-06-05T20:15:13.530000
|
||||
CVE-2024-37630,0,0,dee490b16555575e984fef6b53d7765fc875bc84b7dc261110f314722879b3fc,2024-06-13T18:35:19.777000
|
||||
CVE-2024-37631,0,0,a5cd8ddcd7ce699acdac9f3f2fda8f6d11cc509e6dadfd80153c488cb1c74926,2024-07-03T02:04:24.127000
|
||||
@ -254285,7 +254285,7 @@ CVE-2024-37830,0,0,e0109fbeb8288904c31bfa3039a4919b2d322bf3da95ef389b8c5d886122a
|
||||
CVE-2024-37831,0,0,dd81b6f858235d5d174850c3a09cd3119f2c9ef6775cb735f933a9db7d0b2fca,2024-06-17T12:42:04.623000
|
||||
CVE-2024-3784,0,0,f0c80c77a0788aa17bf80578f54749ae490fe23c5161f7f9c165d9871caa60a2,2024-04-15T19:12:25.887000
|
||||
CVE-2024-37840,0,0,1ea05f0cae39cea91919dabf259bc43d4d53a339aa6352e9633c1155c24e02e9,2024-07-03T02:04:49.190000
|
||||
CVE-2024-37843,0,0,e001b9d240edef8099e10a7171d942636ce9089616c2693526efb6abefecb980,2024-06-26T12:44:29.693000
|
||||
CVE-2024-37843,0,1,50fea0e4f3bac899fad47ec99906b1fa57df0775a56839eb833074fee5a84870,2024-07-19T18:37:07.720000
|
||||
CVE-2024-37848,0,0,b9654691620e5501baad2d1771338ac2aedaf89f42fcedfa6b269a2de242ad76,2024-07-03T02:04:49.977000
|
||||
CVE-2024-37849,0,0,4ee4d4574c1172cb3abdf8336968f4a7fdf4de3cfa287b589ecffd9b4f74d6e9,2024-06-13T18:35:19.777000
|
||||
CVE-2024-3785,0,0,e84209989b24c941d7c6f3eae4d5a1283a6975747744d670fcd7c761c7276a68,2024-04-15T19:12:25.887000
|
||||
@ -255158,7 +255158,7 @@ CVE-2024-39846,0,0,cc3d14fb15e20c985bb7fdeb359e7a12ea1918f79b7c4c3ac03373ad528c6
|
||||
CVE-2024-39848,0,0,8178bbb2814e5fa60c3351f00827b86e4d6b7b334f71560f5ea323ec84986fcf,2024-07-03T02:05:53.147000
|
||||
CVE-2024-3985,0,0,ceb8b898ec23867d1efcc4d7f7a630f584432f67007c6b07d5fd8199e1841622,2024-05-02T18:00:37.360000
|
||||
CVE-2024-39853,0,0,0a0a7ef09f69a0d0504c74e5034409e9f17837e69e722a4f1f3c2adcfb998667,2024-07-03T02:05:53.353000
|
||||
CVE-2024-39863,0,1,0f3b8fe12602984e778937df2bc3cf3bc21c3e0630f0f0f2248c583f86f727f0,2024-07-19T16:01:24.143000
|
||||
CVE-2024-39863,0,0,0f3b8fe12602984e778937df2bc3cf3bc21c3e0630f0f0f2248c583f86f727f0,2024-07-19T16:01:24.143000
|
||||
CVE-2024-39864,0,0,d53cf864986adcf58f762cd7c857169d0cf77d7c01b84f977b101e751257847c,2024-07-08T15:47:10.990000
|
||||
CVE-2024-39865,0,0,1431947f48c63c3f2f289bcb05288d0cda08dff5370e915fbcca9f419224f5d7,2024-07-09T18:19:14.047000
|
||||
CVE-2024-39866,0,0,4ed5613c5836c63f5d6549bcb87208902b3beb2ec94b1529e5dacfcf651468b3,2024-07-09T18:19:14.047000
|
||||
@ -255173,7 +255173,7 @@ CVE-2024-39873,0,0,1a658b8037abfbe3e91b7510442ac4e5e9ef0d1495c2ad87b92c1ad50704c
|
||||
CVE-2024-39874,0,0,14f6ca6c361900eb9cffe6fab1a9a6cec695e772018ab46292846bfaeafee4e4,2024-07-09T18:19:14.047000
|
||||
CVE-2024-39875,0,0,7360bfd27b057e62564bd92359532fb7ec6b0e60daa411b44b0868522210c380,2024-07-09T18:19:14.047000
|
||||
CVE-2024-39876,0,0,b618a8de6e7bfd8c90ec2968f20d226ce35ab815fa49f40d9bc6faad3fe37973,2024-07-09T18:19:14.047000
|
||||
CVE-2024-39877,0,1,6700bf0d65ab8e68f72101ebd7eced49b767ebe26614d7171c2aa65b5fa09310,2024-07-19T16:04:04.003000
|
||||
CVE-2024-39877,0,0,6700bf0d65ab8e68f72101ebd7eced49b767ebe26614d7171c2aa65b5fa09310,2024-07-19T16:04:04.003000
|
||||
CVE-2024-39878,0,0,038c252a5df59aef0ff494dd466e8c23160164cb5ac894aeb1a33e06001b79d4,2024-07-02T12:09:16.907000
|
||||
CVE-2024-39879,0,0,1b030ce3798bca0bad33a3937cca95b776786d7918bf02f25bff668e667acaa0,2024-07-02T12:09:16.907000
|
||||
CVE-2024-3988,0,0,517f8158b252993c28722d017d1da97b60c9d30d3cb2f421d187823784125569,2024-04-25T13:18:13.537000
|
||||
@ -255283,6 +255283,7 @@ CVE-2024-40392,0,0,24aff9cfa4b3c4d20ed420b107a0e9e4a1c46fd98a294b11a12a988b54b03
|
||||
CVE-2024-40393,0,0,9a9cff313cd70f992ba5494f376cc0670f6ad08ca64711bf1142f1c34830e20a,2024-07-17T13:34:20.520000
|
||||
CVE-2024-40394,0,0,17c458164baf1b329619113e6ff542879ba6819d1fa6a5d27ed04ca607ebcdcf,2024-07-17T13:34:20.520000
|
||||
CVE-2024-4040,0,0,4c2ad1f11d479d0071ddbaeb3523edde6a0cd9c4e74c065c69d4bb5c9b1ac029,2024-04-26T15:25:47.270000
|
||||
CVE-2024-40400,1,1,9eb6c2f93d706174f27bfc0dd5f74962384212a4ac44f32aa31dbee34f0af251,2024-07-19T19:15:09.147000
|
||||
CVE-2024-40402,0,0,ea107e33c479f886c634a214935ebe7cdf707506e77c26fcea709812bfb0a8f8,2024-07-18T12:28:43.707000
|
||||
CVE-2024-4041,0,0,bd71d95aba274d30d448ad146bc23c848b8a3b9576dc252f709372f143cb7780,2024-05-14T16:11:39.510000
|
||||
CVE-2024-40412,0,0,ee1648a619ace402a2695f357644480cca061a0b71a8c8619f0a343e150121f2,2024-07-15T17:15:02.723000
|
||||
@ -255529,7 +255530,7 @@ CVE-2024-41003,0,0,169fbc8d8f219b490cf3dfcf7244032fd260a4649a745984b83708bf36e0d
|
||||
CVE-2024-41004,0,0,0147872dc41ee82345f1b96b142030c80a622f5d5ebc79db0dff57faab054509,2024-07-12T16:34:58.687000
|
||||
CVE-2024-41005,0,0,95f568882fd1e16260f486a6121f76b4a7b47a9225c03cbcf7d46d652c71fb30,2024-07-12T16:34:58.687000
|
||||
CVE-2024-41006,0,0,58bd6c502a79651b26621eacf2c0dc46dab924e02809c912fba2631a5541c0df,2024-07-12T16:34:58.687000
|
||||
CVE-2024-41007,0,0,3a5f8217b27f31f94659ee14ad4d3eb5769831e9479c2468b28332be75d954c4,2024-07-18T12:15:03.357000
|
||||
CVE-2024-41007,0,1,557d3d79f36960ef2852244da6d9d8db811ba2a987274c1ebfaa71dd3034b15a,2024-07-19T18:24:59.197000
|
||||
CVE-2024-41008,0,0,44accff6edd09848f65c4ea30c272c9f4e4cafd7e8013f5ed231ff575ad7b53e,2024-07-16T13:43:58.773000
|
||||
CVE-2024-41009,0,0,b973764a3f5390614759bf6dad52e86dad86b20c98263f759698c0703f8fb179,2024-07-19T15:06:23.827000
|
||||
CVE-2024-41010,0,0,ae8d1d1b3ebaab40dc6ac6afde49ce66895bb7f4e7ee92f295ff5ca1fa79b217,2024-07-19T15:24:59.137000
|
||||
@ -255562,7 +255563,7 @@ CVE-2024-4125,0,0,16553edd1211e1aa2542535f3455b94ede37886029935c5af09bcd7638eded
|
||||
CVE-2024-4126,0,0,eeea001e03fa6fec03fbd996718e983ff172445a96f3b74ca8247477394c3911,2024-06-04T19:20:30.860000
|
||||
CVE-2024-4127,0,0,13aabefe1ea17c857d1bb509e28f374ee8245c3658c3b51912d597c1f898ece0,2024-06-04T19:20:30.957000
|
||||
CVE-2024-4128,0,0,68bc0506eec8fccf6c4228f6f90915fa5b089633c8bc20338b2c6bd4b4236a0b,2024-05-02T18:00:37.360000
|
||||
CVE-2024-41281,1,1,b01d929d8f131ac1ed987e9f46da5818bc6a76b21067c1fd92736952a44e81a2,2024-07-19T17:15:03.330000
|
||||
CVE-2024-41281,0,0,b01d929d8f131ac1ed987e9f46da5818bc6a76b21067c1fd92736952a44e81a2,2024-07-19T17:15:03.330000
|
||||
CVE-2024-4129,0,0,f2fba94e29dd925b8a56a23f2711717731ea628ca4457222b442fc21c3f8c80a,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4133,0,0,809a3aebbf4e63405fb2f0740c9908f3dfcf1d711b93379e5d465ea9e56d3cba,2024-05-02T18:00:37.360000
|
||||
CVE-2024-4135,0,0,3adddfced77f8fc8630aec5e175734a40783e3f6b247cb0614a312485a8097a3,2024-05-08T13:15:00.690000
|
||||
@ -255574,10 +255575,10 @@ CVE-2024-4142,0,0,15f953d52654601c03ad89c9ea21867b549a2aa12635e109fbf9627466e8a2
|
||||
CVE-2024-4143,0,0,e6d56e099b9443f818cba12ec6584b2ae78b4e2e6fa1554ff08fbd2e8dc736a0,2024-07-16T13:43:58.773000
|
||||
CVE-2024-4144,0,0,f950a1b03316faa802a71776ce4e62cc15162cc9cec7d4c30c76255605b1c1fc,2024-05-14T19:17:55.627000
|
||||
CVE-2024-4145,0,0,704254773246494130c81e0600984df247a970411736d475449e315ca595ee9b,2024-07-03T02:07:08.133000
|
||||
CVE-2024-4146,0,0,7a45e9aef6cf9c090b751fcb577cc1c9faf666f2c92f3640bfe899e75605148e,2024-06-10T02:52:08.267000
|
||||
CVE-2024-4146,0,1,5bcf92f96755106fd9c198be9e70039e9dbd3f86c15b09e938b03dc5a47e5822,2024-07-19T19:03:00.867000
|
||||
CVE-2024-4148,0,0,71d4cc4cd9749254e9c2938609496cfae5673c1a094b971881b54b705d48028f,2024-06-03T14:46:24.250000
|
||||
CVE-2024-4149,0,0,28fd6853c4bd2a7bfb26cdd043f9abfc9e17f0ae1c9764bac61fec52fa0d04ad,2024-07-02T14:44:29.993000
|
||||
CVE-2024-41492,1,1,df5dc6152d8b7f9016d691345ca41000789321f2336459b6d5b196f16f0ba6eb,2024-07-19T17:15:03.410000
|
||||
CVE-2024-41492,0,0,df5dc6152d8b7f9016d691345ca41000789321f2336459b6d5b196f16f0ba6eb,2024-07-19T17:15:03.410000
|
||||
CVE-2024-4150,0,0,6620986a45cd70dd6d417a583c6a5ddd7d1307e119d46c0f4cd76fea931ab7e8,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4151,0,0,184358b81eb9acee20577f584c8b5e1a6db85454c76256d1b84c36d7ab6c85e5,2024-05-20T15:17:54.513000
|
||||
CVE-2024-4152,0,0,36a0d7cfd7ae4093c14018eeecb901f1be03f5ffbcf2f6180fccbe34da83a1ec,2024-06-07T17:15:51.580000
|
||||
@ -255589,9 +255590,10 @@ CVE-2024-4157,0,0,ac5ec2e690c76b81403cfa49bc63d1a8caa2fb9d97d28a1055398849720db7
|
||||
CVE-2024-4158,0,0,9bd0a38e47c5b6d26f1e587737a0ffeb7c251278f38061995fc29ba309646aa6,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4159,0,0,72a4ec46db1a22f62474bfa22a14f37a28a6ceba3042de92b905fca6cc58c082,2024-04-25T23:15:47.087000
|
||||
CVE-2024-4160,0,0,02cbb5178621697de395e5bf97f83709ae910ce21eba24af27e6bc1b3971ae89,2024-05-31T13:01:46.727000
|
||||
CVE-2024-41601,1,1,346a350f43cc75f6197ce50f796f5c3c3054d176e1b80e37e03376e5e3d38a33,2024-07-19T17:15:03.490000
|
||||
CVE-2024-41602,1,1,321201a0937930bf35589a600482c1b1af97360b03457a5a65e6829dc457eac2,2024-07-19T17:15:03.570000
|
||||
CVE-2024-41603,1,1,6a7507291c8b57ee5956dc2f44ac7781896d1044f85ac59aec3e0a282217d111,2024-07-19T17:15:03.640000
|
||||
CVE-2024-41600,1,1,f2b932f624dfd0458e745bcd1483aa62906a0984e1310058a8424a219fa01fef,2024-07-19T18:15:05.727000
|
||||
CVE-2024-41601,0,0,346a350f43cc75f6197ce50f796f5c3c3054d176e1b80e37e03376e5e3d38a33,2024-07-19T17:15:03.490000
|
||||
CVE-2024-41602,0,0,321201a0937930bf35589a600482c1b1af97360b03457a5a65e6829dc457eac2,2024-07-19T17:15:03.570000
|
||||
CVE-2024-41603,0,0,6a7507291c8b57ee5956dc2f44ac7781896d1044f85ac59aec3e0a282217d111,2024-07-19T17:15:03.640000
|
||||
CVE-2024-4161,0,0,818606f25cf93cd94814d58a9247fa25de635b9142e537f83382fb857b8b71ef,2024-04-25T13:18:13.537000
|
||||
CVE-2024-4162,0,0,1a4f39929c1df6d420ff35b2d8de51a57c5e5378a57b6e7a1a35abc1b5a3dc57,2024-05-08T13:15:00.690000
|
||||
CVE-2024-4163,0,0,69022c7df60536fa7bdfb20d2705efebe8d2d6c2c39bf59b2dcb5940921dba2c,2024-07-03T02:07:10.047000
|
||||
@ -256042,7 +256044,7 @@ CVE-2024-4676,0,0,36c2a5f720119d264342d4d9b8586d4aebc357e75b49de4b862f0e7d867ff3
|
||||
CVE-2024-4677,0,0,06b789b4e22353188f4fa1dbcfc045ef487187889647b738ddd6f1b3dabcd887,2024-06-04T19:20:45.830000
|
||||
CVE-2024-4678,0,0,be695eaab1f72a88b10d5b9b54afd539ecd5dccc02b3dde1eca881aeeba1ff59,2024-06-04T19:20:45.930000
|
||||
CVE-2024-4679,0,0,9bfb1104bd992ff014fab2b1166f6f818504f2232183224a6a702e4c44b2119a,2024-07-02T12:09:16.907000
|
||||
CVE-2024-4680,0,0,99fffd1c928dc99074fe8bf01e4d5a3f58492e3c404d5bbd6910f8eacee3490c,2024-06-10T02:52:08.267000
|
||||
CVE-2024-4680,0,1,0c8976c1b63cea89edb43ad9d9b81fc90d65237e24435549d62994fa7d6af35d,2024-07-19T18:51:53.003000
|
||||
CVE-2024-4681,0,0,fe9d790ee9979c1aca5fe28a3e8115d4c327b815a1753595a7df398a95b1856e,2024-06-04T19:20:46.033000
|
||||
CVE-2024-4682,0,0,b188d20fdb53d2324882bc38bcdbd4c51d4b6beb562fc8362c2866e7563895e8,2024-06-04T19:20:46.140000
|
||||
CVE-2024-4683,0,0,f97d6282ccf029728c8ab8e65ca2b64efa101897ef8ccdc22b5456d11d66a8f8,2024-06-04T19:20:46.247000
|
||||
@ -256658,7 +256660,7 @@ CVE-2024-5397,0,0,79c82f6af34f5d76edc0fe512c9b3e616bf4c7ca15c122380ba9806c73a591
|
||||
CVE-2024-5398,0,0,1fca9edd99ff7753e0d36d6f4d73a5a23ccf8ab9dd992541f79488471e393289,2024-06-11T10:15:13.690000
|
||||
CVE-2024-5399,0,0,6f591a4ee360dfdb4118262029ef6ec2f3647ffdfa160e81ed9cdadb88ac0f1d,2024-05-28T12:39:28.377000
|
||||
CVE-2024-5400,0,0,094967d50b5003fa8a1a95a7cd40ccdb2300c03695bb818acf6e11d6054c6ffe,2024-05-28T12:39:28.377000
|
||||
CVE-2024-5402,0,0,f9eeaef9d858d50b0dc8b7830c1c6e37f908d2aebea96748bdfca508ff29c76a,2024-07-15T13:00:34.853000
|
||||
CVE-2024-5402,0,1,a5e55a0c84701c59a5f5d7ada1c30ecac8bd71919dc47c454e4a5ba90cd9220e,2024-07-19T18:03:55.583000
|
||||
CVE-2024-5403,0,0,2e916307137919215633d6a47f3e654241b49fba1a899d76e9efd2abd496b6ad,2024-05-28T12:39:28.377000
|
||||
CVE-2024-5404,0,0,9555ba3a9174cf37744b3f17110afa21577889d292df132a8c1f8da3c56bf2a0,2024-06-03T14:46:24.250000
|
||||
CVE-2024-5405,0,0,c7e95a2942d42700f7e78ab698eaffdd8aeff4f1adde3aec6c39fd8479ab2700,2024-05-28T12:39:28.377000
|
||||
@ -256703,7 +256705,7 @@ CVE-2024-5452,0,0,78c116a6a9dc3570ee7c04955c3fdb947d6a087a3e839a7cc2b81e0409d936
|
||||
CVE-2024-5453,0,0,b20a0834ca5689b452f6b7173de63ab33385cf72d5d8c59a0cf15e703dd6a33b,2024-06-11T17:34:52.263000
|
||||
CVE-2024-5455,0,0,504a2312040d893e95d789f867e1d4122509ea9da589bac420b384edcb7af3cf,2024-07-17T13:46:09.660000
|
||||
CVE-2024-5456,0,0,4fbbd7e22723b0ac292a15510bd5e2f1843cb88c35dba173a43ab7680f62380a,2024-07-09T18:19:14.047000
|
||||
CVE-2024-5457,0,1,4bd3534e5c8e3846c6373878cbe704c78d4a9804975dea52f238f183cca2c68c,2024-07-19T17:55:55.343000
|
||||
CVE-2024-5457,0,0,4bd3534e5c8e3846c6373878cbe704c78d4a9804975dea52f238f183cca2c68c,2024-07-19T17:55:55.343000
|
||||
CVE-2024-5458,0,0,ecce33b383e3250d0d6482d44440ec6cfd4fced73f96f924c4a6b853790d20fc,2024-06-18T10:15:10.870000
|
||||
CVE-2024-5459,0,0,c2af4e92b1764c27a294b8b9210b2518bf4b2703cdeb9e4502885231e13d99a3,2024-06-13T19:35:55.083000
|
||||
CVE-2024-5460,0,0,4e099435e4545094901bd58b61fc926119ab5684f745a9d9aa540744798c104f,2024-06-26T12:44:29.693000
|
||||
@ -256717,7 +256719,7 @@ CVE-2024-5471,0,0,b5058f52e9634b68f4d4000cb97858db03cd2fac3d75cd140cb047a19da1c6
|
||||
CVE-2024-5472,0,0,5266d0242327561f219784f0c46dd50d182936ab4a103ea249459b5dcb746156,2024-07-15T13:00:34.853000
|
||||
CVE-2024-5473,0,0,7a9289264d1a834c0b8e9151c353ddcb7a22a22f6b7d360897c02053aaaeb88c,2024-07-03T02:08:57.860000
|
||||
CVE-2024-5475,0,0,e09a66bd4d026df38a62a9d0642b82f2a5b9bf49c6a2d9e0e1e141414790fdd3,2024-07-03T02:08:58.050000
|
||||
CVE-2024-5478,0,0,f98bb962ebdc689e4533f9bc6000e2923314fc7e209e4220035a196848b232b3,2024-06-07T14:56:05.647000
|
||||
CVE-2024-5478,0,1,c601a39452cb705e9035daa72131a8a960693dee4deccdae668f9ad5d8466d4f,2024-07-19T18:29:50.137000
|
||||
CVE-2024-5479,0,0,7bf7a94732a4ce28b83209c9d21f799503dcb5933696ba21b8f4bc98737c6d69,2024-07-09T18:19:14.047000
|
||||
CVE-2024-5480,0,0,e3b751f5e1aae9a001af5fbca0b04d0edc5a2fa5a73d6ec1b3a09941cad9078b,2024-06-07T14:56:05.647000
|
||||
CVE-2024-5481,0,0,32222ebb3f7a972393fb918a0cdb6b7e38cf91a107006665f6c1b1bad41a3e4f,2024-06-11T18:00:09.740000
|
||||
@ -256783,7 +256785,7 @@ CVE-2024-5557,0,0,e58f4a9974ae6a6ad512e69202e5dee259550c69c446c060784da606557be5
|
||||
CVE-2024-5558,0,0,f5606f757a3846688e526f8e8c7b353ed841a6a8222c822314196faac2c09cd1,2024-06-13T18:36:09.010000
|
||||
CVE-2024-5559,0,0,0c59604cbf219c2ba1c247f52c304752b12dd0f3c92c8b3c96e21ad233f99b0a,2024-06-13T18:36:09.010000
|
||||
CVE-2024-5560,0,0,3f42aec8823e745767fb091b3297e1872303ba832aca849be344540d1aa59c5f,2024-06-13T18:36:09.010000
|
||||
CVE-2024-5564,0,1,582ae8d6e013444879054c957a9f974e1fbdab4bea18417275b8c53698226d12,2024-07-19T16:15:03.193000
|
||||
CVE-2024-5564,0,0,582ae8d6e013444879054c957a9f974e1fbdab4bea18417275b8c53698226d12,2024-07-19T16:15:03.193000
|
||||
CVE-2024-5565,0,0,e1d36fa68b4a73d6b78bd8eb39c3f27f14d8d32dc884b4fdfa0f8545d690e8d1,2024-07-03T02:09:05.567000
|
||||
CVE-2024-5566,0,0,a945a0a6dfd60ba4f2475074f739c9c903faf3b04e2fc6dbcbd43f919a80fa3c,2024-07-17T13:34:20.520000
|
||||
CVE-2024-5569,0,0,b9fd3bed59b5f668c54b0264622201b8600e789b08e0f56eae05ce6b6e8c76ce,2024-07-09T18:19:14.047000
|
||||
@ -256793,7 +256795,7 @@ CVE-2024-5573,0,0,250942dd398584b07af081969c90c51eb870e472776aa0a5f143054241cd8a
|
||||
CVE-2024-5574,0,0,e718295307eca06b04fb56f70dfb8daf0ce4b10163936e86fc3b21a6f71a4423,2024-06-20T12:44:01.637000
|
||||
CVE-2024-5575,0,0,0d0faeec0f613a9625ccc8cb2724627ce688cebf183de5add4fa7e9fd84a3054,2024-07-15T13:00:34.853000
|
||||
CVE-2024-5577,0,0,5dd16baf94f18e7abae39f40d89c75af3dba9492f2b1af50e3d8516c5413b1e4,2024-06-17T12:42:04.623000
|
||||
CVE-2024-5582,0,1,3868d6c914880d2428453bd960a7aeb89cb5bb99f0fc09b9de444e14a34c6012,2024-07-19T16:05:10.290000
|
||||
CVE-2024-5582,0,0,3868d6c914880d2428453bd960a7aeb89cb5bb99f0fc09b9de444e14a34c6012,2024-07-19T16:05:10.290000
|
||||
CVE-2024-5584,0,0,7705ff7ae1b4fd1342d12756cedf379ac85bb5a3b8398b6b986f5e220e43afde,2024-06-11T13:54:12.057000
|
||||
CVE-2024-5585,0,0,9e089b029f69ddc50638e027531ef06d5e8acf986dd2efdfe6f9d39673e035c3,2024-06-13T04:15:17.407000
|
||||
CVE-2024-5587,0,0,6b9958828217f46ad00f93a8982028b537e303232ee58bb83f00389806575abd,2024-06-03T14:46:24.250000
|
||||
@ -256887,7 +256889,7 @@ CVE-2024-5699,0,0,c6a42ec507c58416dc30ca6ed956f1ded247800b2c9b3cf1e9a175eb88ff9b
|
||||
CVE-2024-5700,0,0,75281b3d92ab48138fa84376c62cf06e3b235ecbf0492685b83c4b5de8ec6545,2024-07-03T02:09:12.470000
|
||||
CVE-2024-5701,0,0,50132399b0866a3a39154eec031eecee61c5e1b87964f02e5d6e5dcb69b1128f,2024-06-11T13:54:12.057000
|
||||
CVE-2024-5702,0,0,38c1097fef455f8c14a4a11698b056f16759fa186a63b78823c287fecdc7ce07,2024-06-19T10:15:11.583000
|
||||
CVE-2024-5703,0,1,5ca9c34d8a3be3710e16eaa453823ef22cf36c499d35ca66a69839485dd178a3,2024-07-19T16:05:42.090000
|
||||
CVE-2024-5703,0,0,5ca9c34d8a3be3710e16eaa453823ef22cf36c499d35ca66a69839485dd178a3,2024-07-19T16:05:42.090000
|
||||
CVE-2024-5704,0,0,be55689131fc57547da71e8726572a7a1a86cf57932558d33666ec0b15eef9b9,2024-07-09T18:19:14.047000
|
||||
CVE-2024-5710,0,0,bbba5caf4cb4f465fb2a1f44424b7af778bd56d5f1b17eb3b38248b8a0397322,2024-07-01T10:15:30.183000
|
||||
CVE-2024-5711,0,0,463604f6d6d272196433a5bb7494f0542e749e8811ac98ab1c08049581f8b425,2024-07-11T21:15:12.787000
|
||||
@ -256921,7 +256923,7 @@ CVE-2024-5755,0,0,18288403f67281063c09c8ff29d182967f82bf6bbbadea2fe8a94bcd12e5aa
|
||||
CVE-2024-5756,0,0,8f9e9c6b47319f2e6056e0eeab0b95c7967e08ebf1f00846244d8a548a26a9af,2024-07-17T13:52:08.350000
|
||||
CVE-2024-5757,0,0,5cb8c18a619114307d2634441346064118b79a7aeac4723897e195eaa5132dad,2024-07-02T14:42:05.977000
|
||||
CVE-2024-5758,0,0,c078716fbf80b259c8ceac06415d3d039d4ef773f8ae701649c6b0b1483ee99e,2024-06-13T21:15:57.543000
|
||||
CVE-2024-5759,0,0,73a17b75680273fdfd9d017a3a63edc01419b26c432a0c56c3db7da8682d5fb2,2024-06-13T18:36:09.010000
|
||||
CVE-2024-5759,0,1,63cf4f5f11600a3e2abf833e3aff1a738015e39c1ce27037c94f84f83452efea,2024-07-19T18:40:53.863000
|
||||
CVE-2024-5761,0,0,1fdad964c86313b412878f67fac5999c9a1ea015b844614bc58b000414661a53,2024-06-07T19:15:24.467000
|
||||
CVE-2024-5766,0,0,1263d0917882c36f131e194bb6b44630da06ab1a17b9faa93d76c1b934e8029c,2024-06-10T02:52:08.267000
|
||||
CVE-2024-5767,0,0,946a7a6edb6231f843cc8c36568eec07c01ffe4bb17f732fe05d02ccf6a0e4bc,2024-07-09T16:23:07.280000
|
||||
@ -257060,7 +257062,7 @@ CVE-2024-5971,0,0,357987ac7415afbcb31d94ddf79e1610c1e4bcbc7b687b78aa636fbb9a4c84
|
||||
CVE-2024-5972,0,0,3700c5b3eb4bcd1d3bafe18b568e7aab0a0471128c3ce92a2f73ba8aa9a9cb4f,2024-06-28T19:15:07.500000
|
||||
CVE-2024-5974,0,0,fd52c68141e6ff6d700f6466616845a44fbd39c5ab415ece01ca8d456d4e8b30,2024-07-09T18:19:14.047000
|
||||
CVE-2024-5976,0,0,0d4a23e2583616de98536e1ad4d7b2a882021b32cad502d23a934bbf343ef666,2024-06-17T12:43:31.090000
|
||||
CVE-2024-5977,0,0,727b1e5bc9a2fdbbe2a201a80b666337239515f573706de037d068dde3bc3f8c,2024-07-19T13:01:44.567000
|
||||
CVE-2024-5977,0,1,7de0cc63740102074a24c1686c7837a6d04da6c097ad8d0ab882790d8002a494,2024-07-19T18:27:34.967000
|
||||
CVE-2024-5979,0,0,2890db7bdc2045eea751460532af007391576d7da8d9f838bf14583c0290ae73,2024-06-27T19:25:12.067000
|
||||
CVE-2024-5980,0,0,915920a5c8bdff0e9b559c6fdf1db06079562e1ee1f1333b9d9e824a78939fce,2024-06-27T19:25:12.067000
|
||||
CVE-2024-5981,0,0,6efd4ce65d0be4286973240a22b49938ee7da116677222eebd9958d92f31bba4,2024-06-17T12:43:31.090000
|
||||
@ -257227,7 +257229,7 @@ CVE-2024-6215,0,0,720f1739703095287552164316882a6b926c156c15e89c7dc7084a2a8b1f11
|
||||
CVE-2024-6216,0,0,99a638bb9b091862ee1125e5c2af18142e9f2a446dc1f5e54add6d69d774b8bc,2024-06-24T20:15:11.177000
|
||||
CVE-2024-6217,0,0,caeef107ec037a20535b69bf461e75c9da91ce4fd887edb01336f60c235444b1,2024-06-21T11:22:01.687000
|
||||
CVE-2024-6218,0,0,3cb8a30d4ddfe61bdea61d401bfb5f7d243e9ab40309c0377a9f4fcd89ff6826,2024-06-21T15:15:16.547000
|
||||
CVE-2024-6220,0,1,b8f7be72e11caf0a6de2963374978a31527ab96f2e76d2ac8d3bbf41bd4c9d7f,2024-07-19T16:07:05.057000
|
||||
CVE-2024-6220,0,0,b8f7be72e11caf0a6de2963374978a31527ab96f2e76d2ac8d3bbf41bd4c9d7f,2024-07-19T16:07:05.057000
|
||||
CVE-2024-6222,0,0,7da69ce6fbc5989cf8dc00c0967cc47c0670f03447330ea36d4de40ed4ce08ae,2024-07-12T17:05:39.070000
|
||||
CVE-2024-6225,0,0,510a69cec2d5d6c6d036e0951030f27f3f34bcc77e3448a2bbf2dbc18120fe93,2024-06-24T19:21:28.450000
|
||||
CVE-2024-6227,0,0,6448b237469b4af8add5bea6ce3efd3ec79e9126dca5090705d4ceeb86be54e2,2024-07-09T18:19:14.047000
|
||||
@ -257334,7 +257336,7 @@ CVE-2024-6392,0,0,f361942df6276a0c96574512bc05717f2075a1be2cafe6840357bf3e68ede9
|
||||
CVE-2024-6395,0,0,2a18837f9b52736b65326c96554b2a3dce564d78893cb5d5644f7daa6a7748b8,2024-07-17T13:34:20.520000
|
||||
CVE-2024-6396,0,0,9e4b547b4d90c33704c90a7cfe67a136b4a49a6d0168d4ba570b6960a74fd1cc,2024-07-12T12:49:07.030000
|
||||
CVE-2024-6397,0,0,69c6adc6e74f8320b438655fc21122936f7ec03e924b3cf51bf011308451b2af,2024-07-12T17:02:56.110000
|
||||
CVE-2024-6398,0,0,46dda7a5b4fe3cfc91f44f053e8ea205ce4ce2d1760fdb643ea6bf53ab588331,2024-07-15T13:00:34.853000
|
||||
CVE-2024-6398,0,1,5e78ff46f697643e5cc753102552fe7954080f3b71babda50e4591659f0fb988,2024-07-19T18:25:44.247000
|
||||
CVE-2024-6402,0,0,795485c4534407e246daec51c1daaa33b95f6651688fed743a8fb9054cdaedba,2024-07-01T12:37:24.220000
|
||||
CVE-2024-6403,0,0,e44b9cfa8d9ae367e624a8cdf179ef52ea1e98c2115d7a956299d17747a6a56b,2024-07-01T12:37:24.220000
|
||||
CVE-2024-6405,0,0,fdb62e3d2213e21f6cf3d269e158ee31cc07c01f1a5a460b466ccce5203f82ee,2024-07-01T12:37:24.220000
|
||||
@ -257473,12 +257475,12 @@ CVE-2024-6737,0,0,8702e57b452a150308d6299787708abc780fef0e416c70970908b3d0d87bc7
|
||||
CVE-2024-6738,0,0,3a61a9d0dff57bd9a24abf3ccb065f63726018d20fe8e9197bc7bc11863de922,2024-07-16T14:06:27.810000
|
||||
CVE-2024-6739,0,0,ff130f606a3e8a51263eb79c0c10405a59fd6ec00a9a26fc959f88e93b41ffd0,2024-07-16T18:02:40.327000
|
||||
CVE-2024-6740,0,0,d308678365582cc0cd3506da47feaac1bc28b638b68ea34f78ba187ccd8f0bc0,2024-07-16T18:04:27.443000
|
||||
CVE-2024-6741,0,0,b79b37b238cd50da835ed0a026304117c198db84ec9f205daded4f74e448a08b,2024-07-15T13:00:34.853000
|
||||
CVE-2024-6741,0,1,9b56d0b03e3ffc096ead1a054aba81fcde4d9f0941a6e35a1c411f336b0f48e5,2024-07-19T18:23:40.233000
|
||||
CVE-2024-6742,0,0,68316e77653ac592b1c728d700048d14f2f4d999c5b5bc0e6fa5293bbd87d387,2024-07-16T18:07:58.773000
|
||||
CVE-2024-6743,0,0,d20423ae34ef7edd843a6cb67ab6563bdeae21fb73206254415d2c0219c744cd,2024-07-16T18:07:47.567000
|
||||
CVE-2024-6744,0,0,db4e7b937d3d03ea3e3b2b15edbfe780a0b875b3fdcc47905faa685f3164112e,2024-07-16T18:06:51.390000
|
||||
CVE-2024-6745,0,0,707134dd0252b920cb08895baec52c5557bd805c744814b8ecb19c1d5a8e997c,2024-07-15T13:00:34.853000
|
||||
CVE-2024-6746,0,0,5be3956d6b4bf01a386e4ceaf78307e768b453c5db30b63143d293a79513dc46,2024-07-15T13:00:34.853000
|
||||
CVE-2024-6745,0,1,1617c1b62a6985e7cfd1493a4e6106081b5b226c76f4caaa1064224772ef702b,2024-07-19T18:04:47.363000
|
||||
CVE-2024-6746,0,1,a07904c7ab441e8aefcdf67187efe0701752648d282a9adf495048d9805d0f66,2024-07-19T18:02:29.417000
|
||||
CVE-2024-6765,0,0,582116fb1612a7c43e0b570dc3dd773f185a6bed827d147d00793764d2f2774e,2024-07-17T14:15:04.327000
|
||||
CVE-2024-6772,0,0,7a4dce423c8b75d7fc80a06f5d75b304a1c3cb61b88f44b30dd94156af9ab8e1,2024-07-17T13:34:20.520000
|
||||
CVE-2024-6773,0,0,654a62798e16ce714df475111f6e31ff6e77aaddc1afe3d8197169aa0cc75c10,2024-07-17T13:34:20.520000
|
||||
@ -257501,10 +257503,10 @@ CVE-2024-6834,0,0,9b06026f568f95c4c2a4be9208340b1bc5ab27fea601ce9296ee0a0b671ec6
|
||||
CVE-2024-6895,0,0,0c486e88c5dc57ed2713d59c6e5f599844da09fd6e820a24b10235451464145d,2024-07-19T15:15:10.547000
|
||||
CVE-2024-6898,0,0,98dae2dc951da0c9f1ac4e695a7ad38573b2abb15f5508f51642ed9635c194c6,2024-07-19T13:01:44.567000
|
||||
CVE-2024-6899,0,0,862a9d8e40eab426823cca194fdd307dafe70d2837c62b14a818c2e38cfb311c,2024-07-19T13:01:44.567000
|
||||
CVE-2024-6900,0,0,f9a0db97abb2b7a030f206724ca09833acdf6dd97e33de095d4cd3f3b37ccb05,2024-07-19T13:01:44.567000
|
||||
CVE-2024-6901,0,0,e54159de50db3a8be34eb97b9e3f649430e41359e21d071d1c89b458210a168d,2024-07-19T13:01:44.567000
|
||||
CVE-2024-6902,0,0,495ce6a6d90db5ffc5fcf4c35200d986c6bd9aea37bed0cdf107762f60a152ec,2024-07-19T13:01:44.567000
|
||||
CVE-2024-6903,0,0,458cf84eca0cf9431d58c9dde569871b33a0e0cb2c0e1a1544d8b15458d5e52b,2024-07-19T13:01:44.567000
|
||||
CVE-2024-6900,0,1,fbb8aa8415260c9b1e26455be1910b1083e8bf94841d4f12f5417011c57ac42e,2024-07-19T19:54:20.537000
|
||||
CVE-2024-6901,0,1,c28b23edd1f3046de2a52da537dee85028a9b3d9f213ffb3130989af23e1c1c1,2024-07-19T19:55:00.210000
|
||||
CVE-2024-6902,0,1,f926fb22c680b61739989f51b7f1eaf6c4ea518a5e1bc277f5ef3101be83da21,2024-07-19T19:10:24.903000
|
||||
CVE-2024-6903,0,1,adc23f247bb0a7d879884222f6215ed295391e32456516ddcf4324ccbf8de103,2024-07-19T19:51:55.617000
|
||||
CVE-2024-6904,0,0,7a4b54dc15a07a62a46eb4054278ab061629c71b06171b5dc53981c366a15e59,2024-07-19T13:01:44.567000
|
||||
CVE-2024-6905,0,0,93733b32b43103d2e6f495524d768f1986f9f809f44d345a79d9a3c82c1dfb61,2024-07-19T13:01:44.567000
|
||||
CVE-2024-6906,0,0,bd3edaa779f3d24c608497477495531b8c58c3f636652b3dd6d229b39e74ed48,2024-07-19T13:01:44.567000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user