mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-21 17:41:05 +00:00
Auto-Update: 2024-08-08T14:00:17.615016+00:00
This commit is contained in:
parent
518b04cae3
commit
71185be6a9
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-42983",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-10-17T07:15:08.973",
|
||||
"lastModified": "2022-10-20T14:38:47.777",
|
||||
"lastModified": "2024-08-08T12:05:04.450",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -60,8 +60,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:anji-plus:report:0.9.8.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "603D42DF-154E-422A-A166-BEB24D207410"
|
||||
"criteria": "cpe:2.3:a:anji-plus:aj-report:0.9.8.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "280D610F-A7F7-42A4-8A25-A8D2963B1B0C"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-46973",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-03-03T22:15:09.427",
|
||||
"lastModified": "2023-03-10T14:22:22.767",
|
||||
"lastModified": "2024-08-08T12:05:04.450",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -56,8 +56,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:anji-plus:report:0.9.8.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "603D42DF-154E-422A-A166-BEB24D207410"
|
||||
"criteria": "cpe:2.3:a:anji-plus:aj-report:0.9.8.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "280D610F-A7F7-42A4-8A25-A8D2963B1B0C"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2023-7265",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2024-08-08T08:15:04.740",
|
||||
"lastModified": "2024-08-08T08:15:04.740",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-08T13:04:18.753",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Permission verification vulnerability in the lock screen module\nImpact: Successful exploitation of this vulnerability may affect availability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de verificaci\u00f3n de permisos en el m\u00f3dulo de pantalla de bloqueo Impacto: la explotaci\u00f3n exitosa de esta vulnerabilidad puede afectar la disponibilidad"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-21302",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2024-08-08T02:15:37.827",
|
||||
"lastModified": "2024-08-08T10:15:06.203",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-08T13:04:18.753",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Summary:\nMicrosoft was notified that an elevation of privilege vulnerability exists in Windows based systems supporting Virtualization Based Security (VBS) including a subset of Azure Virtual Machine SKUS; enabling an attacker with administrator privileges to replace current versions of Windows system files with outdated versions. By exploiting this vulnerability, an attacker could reintroduce previously mitigated vulnerabilities, circumvent some features of VBS, and exfiltrate data protected by VBS. For more information on Windows versions and VM SKUs supporting VBS, reference: Virtualization-based Security (VBS) | Microsoft Learn..\nMicrosoft is developing a security update to mitigate this vulnerability, but it is not yet available. Guidance to help customers reduce the risks associated with this vulnerability and to protect their systems until the mitigation is available in a Windows security update is provided in the Recommended Actions section of this CVE.\nThis CVE will be updated when the mitigation is available in a Windows security update. We highly encourage customers to subscribe to Security Update Guide notifications to receive an alert when this update occurs.\nDetails:\nA security researcher informed Microsoft of an elevation of privilege vulnerability in Windows 10, Windows 11, Windows Server 2016, Windows Server 2019, Windows Server 2022 , and a subset of Azure Virtual Machines (VM) SKUs with a Windows based guestOS supporting VBS. For more information on Windows versions and VM SKUs supporting VBS, reference: Virtualization-based Security (VBS) | Microsoft Learn.\nThe vulnerability enables an attacker with administrator privileges on the target system to replace current Windows system files with outdated versions. Successful exploitation provides an attacker with the ability to reintroduce previously mitigated vulnerabilities, circumvent VBS security features, and exfiltrate data protected by VBS.\nMicrosoft is developing a security update that will revoke outdated, unpatched VBS system files to mitigate this vulnerability, but it is not yet available. Due to the complexity of blocking such a large quantity of files, rigorous testing is required to avoid integration failures or regressions. This CVE will be updated with new information and links to the security updates once available. We highly encourage customers subscribe to Security Update Guide notifications to be alerted of updates. See Microsoft Technical Security Notifications and Security Update Guide Notification System News: Create your profile now \u2013 Microsoft Security Response Center.\nMicrosoft is not aware of any attempts to exploit this vulnerability. However, a public presentation regarding this vulnerability was hosted at BlackHat on August 07th, 2024. The presentation was appropriately coordinated with Microsoft but may change the threat landscape. Customers concerned with these risks should reference the guidance provided in the Recommended Actions section of this CVE to protect their systems.\nRecommended Actions:\nThe following recommendations do not mitigate the vulnerability but can be used to reduce the risk of exploitation until the security update is available.\n\nConfigure \u201cAudit Object Access\u201d settings to monitor attempts to access files, such as handle creation, read / write operations, or modifications to security descriptors.\n\nAudit File System - Windows 10 | Microsoft Learn\nApply a basic audit policy on a file or folder - Windows 10 | Microsoft Learn\n\n\nAuditing sensitive privileges used to identify access, modification, or replacement of VBS related files could help indicacte attempts to exploit this vulnerability.\n\nAudit Sensitive Privilege Use - Windows 10 | Microsoft Learn\n\n\nProtect your Azure tenant by investigating administrators and users flagged for risky sign-ins and rotating their credentials.\n\nInvestigate risk Microsoft Entra ID Protection - Microsoft Entra ID Protection | Microsoft Learn\n\n\nEnabling Multi-Factor Authentication can also help alleviate concerns about compromised accounts or exposure.\n\nEnforce multifactor..."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Resumen: Se notific\u00f3 a Microsoft que existe una vulnerabilidad de elevaci\u00f3n de privilegios en sistemas basados en Windows que admiten seguridad basada en virtualizaci\u00f3n (VBS), incluido un subconjunto de SKUS de m\u00e1quinas virtuales de Azure; permitir que un atacante con privilegios de administrador reemplace las versiones actuales de los archivos del sistema de Windows con versiones obsoletas. Al explotar esta vulnerabilidad, un atacante podr\u00eda reintroducir vulnerabilidades previamente mitigadas, eludir algunas caracter\u00edsticas de VBS y filtrar datos protegidos por VBS. Microsoft est\u00e1 desarrollando una actualizaci\u00f3n de seguridad para mitigar esta amenaza, pero a\u00fan no est\u00e1 disponible. En la secci\u00f3n Acciones recomendadas de este CVE se proporciona orientaci\u00f3n para ayudar a los clientes a reducir los riesgos asociados con esta vulnerabilidad y proteger sus sistemas hasta que la mitigaci\u00f3n est\u00e9 disponible en una actualizaci\u00f3n de seguridad de Windows. Este CVE se actualizar\u00e1 cuando la mitigaci\u00f3n est\u00e9 disponible en una actualizaci\u00f3n de seguridad de Windows. Recomendamos encarecidamente a los clientes que se suscriban a las notificaciones de la Gu\u00eda de actualizaci\u00f3n de seguridad para recibir una alerta cuando se produzca esta actualizaci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-22069",
|
||||
"sourceIdentifier": "psirt@zte.com.cn",
|
||||
"published": "2024-08-08T08:15:05.123",
|
||||
"lastModified": "2024-08-08T08:15:05.123",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-08T13:04:18.753",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "There is a permission and access control vulnerability of ZTE's ZXV10 XT802/ET301 product.Attackers with common permissions can log in the terminal web and change the password of the administrator illegally by intercepting requests to change the passwords."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Existe una vulnerabilidad de permiso y control de acceso del producto ZXV10 XT802/ET301 de ZTE. Los atacantes con permisos comunes pueden iniciar sesi\u00f3n en la web del terminal y cambiar la contrase\u00f1a del administrador ilegalmente interceptando solicitudes para cambiar las contrase\u00f1as."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-2800",
|
||||
"sourceIdentifier": "cve@gitlab.com",
|
||||
"published": "2024-08-08T11:15:12.210",
|
||||
"lastModified": "2024-08-08T11:15:12.210",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-08T13:04:18.753",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "ReDoS flaw in RefMatcher when matching branch names using wildcards in GitLab EE/CE affecting all versions from 11.3 prior to 17.0.6, 17.1 prior to 17.1.4, and 17.2 prior to 17.2.2 allows denial of service via Regex backtracking."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La falla de ReDoS en RefMatcher al hacer coincidir nombres de ramas usando comodines en GitLab EE/CE que afecta a todas las versiones desde 11.3 antes de 17.0.6, 17.1 antes de 17.1.4 y 17.2 antes de 17.2.2 permite la denegaci\u00f3n de servicio a trav\u00e9s del retroceso de Regex."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-3035",
|
||||
"sourceIdentifier": "cve@gitlab.com",
|
||||
"published": "2024-08-08T11:15:12.503",
|
||||
"lastModified": "2024-08-08T11:15:12.503",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-08T13:04:18.753",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A permission check vulnerability in GitLab CE/EE affecting all versions starting from 8.12 prior to 17.0.6, 17.1 prior to 17.1.4, and 17.2 prior to 17.2.2 allowed for LFS tokens to read and write to the user owned repositories."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad de verificaci\u00f3n de permisos en GitLab CE/EE que afecta a todas las versiones desde 8.12 anterior a 17.0.6, 17.1 anterior a 17.1.4 y 17.2 anterior a 17.2.2 permiti\u00f3 que los tokens LFS leyeran y escribieran en los repositorios propiedad del usuario."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-3114",
|
||||
"sourceIdentifier": "cve@gitlab.com",
|
||||
"published": "2024-08-08T11:15:12.733",
|
||||
"lastModified": "2024-08-08T11:15:12.733",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-08T13:04:18.753",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in GitLab CE/EE affecting all versions starting from 11.10 prior to 17.0.6, 17.1 prior to 17.1.4, and 17.2 prior to 17.2.2, with the processing logic for parsing invalid commits can lead to a regular expression DoS attack on the server."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 un problema en GitLab CE/EE que afecta a todas las versiones desde la 11.10 anterior a la 17.0.6, la 17.1 anterior a la 17.1.4 y la 17.2 anterior a la 17.2.2, y la l\u00f3gica de procesamiento para analizar confirmaciones no v\u00e1lidas puede provocar un ataque DoS de expresi\u00f3n regular en el servidor."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-32113",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-05-08T15:15:10.227",
|
||||
"lastModified": "2024-08-08T01:00:01.727",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-08T13:38:57.533",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"cisaExploitAdd": "2024-08-07",
|
||||
"cisaActionDue": "2024-08-28",
|
||||
@ -21,6 +21,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -55,26 +75,59 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:ofbiz:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "18.12.13",
|
||||
"matchCriteriaId": "B182D3A9-6FB2-4EE7-B053-BEA62755FC9D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/05/09/1",
|
||||
"source": "security@apache.org"
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://issues.apache.org/jira/browse/OFBIZ-13006",
|
||||
"source": "security@apache.org"
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.apache.org/thread/w6s60okgkxp2th1sr8vx0ndmgk68fqrd",
|
||||
"source": "security@apache.org"
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://ofbiz.apache.org/download.html",
|
||||
"source": "security@apache.org"
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://ofbiz.apache.org/security.html",
|
||||
"source": "security@apache.org"
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
37
CVE-2024/CVE-2024-36xx/CVE-2024-3659.json
Normal file
37
CVE-2024/CVE-2024-36xx/CVE-2024-3659.json
Normal file
@ -0,0 +1,37 @@
|
||||
{
|
||||
"id": "CVE-2024-3659",
|
||||
"sourceIdentifier": "cvd@cert.pl",
|
||||
"published": "2024-08-08T13:15:13.823",
|
||||
"lastModified": "2024-08-08T13:15:13.823",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Firmware in KAON\u00a0AR2140 routers prior to version 4.2.16 is vulnerable to a shell command injection via sending a crafted request to one of the endpoints.\nIn order to exploit this vulnerability, one has to have access to the administrative portal of the router."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cvd@cert.pl",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cert.pl/en/posts/2024/08/CVE-2024-3659",
|
||||
"source": "cvd@cert.pl"
|
||||
},
|
||||
{
|
||||
"url": "https://cert.pl/posts/2024/08/CVE-2024-3659",
|
||||
"source": "cvd@cert.pl"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-38202",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2024-08-08T02:15:38.180",
|
||||
"lastModified": "2024-08-08T10:15:06.550",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-08T13:04:18.753",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Summary\nMicrosoft was notified that an elevation of privilege vulnerability exists in Windows Backup, potentially enabling an attacker with basic user privileges to reintroduce previously mitigated vulnerabilities or circumvent some features of Virtualization Based Security (VBS). However, an attacker attempting to exploit this vulnerability requires additional interaction by a privileged user to be successful.\nMicrosoft is developing a security update to mitigate this threat, but it is not yet available. Guidance to help customers reduce the risks associated with this vulnerability and to protect their systems until the mitigation is available in a Windows security update is provided in the Recommended Actions section of this CVE.\nThis CVE will be updated, and customers will be notified when the official mitigation is available in a Windows security update. We highly encourage customers to subscribe to Security Update Guide notifications to receive an alert when this update occurs.\nDetails\nA security researcher informed Microsoft of an elevation of privilege vulnerability in Windows Backup potentially enabling an attacker with basic user privileges to reintroduce previously mitigated vulnerabilities or circumvent some features of VBS. For exploitation to succeed, an attacker must trick or convince an Administrator or a user with delegated permissions into performing a system restore which inadvertently triggers the vulnerability.\nMicrosoft is developing a security update that will mitigate this vulnerability, but it is not yet available. This CVE will be updated with new information and links to the security updates once available. We highly encourage customers subscribe to Security Update Guide notifications to be alerted of updates. See Microsoft Technical Security Notifications and Security Update Guide Notification System News: Create your profile now \u2013 Microsoft Security Response Center.\nMicrosoft is not aware of any attempts to exploit this vulnerability. However, a public presentation regarding this vulnerability was hosted at BlackHat on August 7, 2024. The presentation was appropriately coordinated with Microsoft but may change the threat landscape. Customers concerned with these risks should reference the guidance provided in the Recommended Actions section to protect their systems.\nRecommended Actions\nThe following recommendations do not mitigate the vulnerability but can be used to reduce the risk of exploitation until the security update is available.\n\nConfigure \u201cAudit Object Access\u201d settings to monitor attempts to access files, such as handle creation, read / write operations, or modifications to security descriptors.\n\nAudit File System - Windows 10 | Microsoft Learn\nApply a basic audit policy on a file or folder - Windows 10 | Microsoft Learn\n\n\nAudit users with permission to perform Backup and Restore operations to ensure only the appropriate users can perform these operations.\n\nAudit: Audit the use of Backup and Restore privilege (Windows 10) - Windows 10 | Microsoft Learn\n\n\nImplement an Access Control List or Discretionary Access Control Lists to restrict the access or modification of Backup files and perform Restore operations to appropriate users, for example administrators only.\n\nAccess Control overview | Microsoft Learn\nDiscretionary Access Control Lists (DACL)\n\n\nAuditing sensitive privileges used to identify access, modification, or replacement of Backup related files could help indicate attempts to exploit this vulnerability.\n\nAudit Sensitive Privilege Use - Windows 10 | Microsoft Learn"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Resumen: Se notific\u00f3 a Microsoft que existe una vulnerabilidad de elevaci\u00f3n de privilegios en Copias de seguridad de Windows, lo que podr\u00eda permitir que un atacante con privilegios de usuario b\u00e1sicos reintroduzca vulnerabilidades previamente mitigadas o eluda algunas caracter\u00edsticas de Seguridad basada en virtualizaci\u00f3n (VBS). Sin embargo, un atacante que intente aprovechar esta vulnerabilidad requiere interacci\u00f3n adicional por parte de un usuario privilegiado para tener \u00e9xito. Microsoft est\u00e1 desarrollando una actualizaci\u00f3n de seguridad para mitigar esta amenaza, pero a\u00fan no est\u00e1 disponible. En la secci\u00f3n acciones recomendadas de este CVE se proporciona orientaci\u00f3n para ayudar a los clientes a reducir los riesgos asociados con esta vulnerabilidad y proteger sus sistemas hasta que la mitigaci\u00f3n est\u00e9 disponible en una actualizaci\u00f3n de seguridad de Windows. Este CVE se actualizar\u00e1 y se notificar\u00e1 a los clientes cuando la mitigaci\u00f3n oficial est\u00e9 disponible en una actualizaci\u00f3n de seguridad de Windows. Recomendamos encarecidamente a los clientes que se suscriban a las notificaciones de la Gu\u00eda de actualizaci\u00f3n de seguridad para recibir una alerta cuando se produzca esta actualizaci\u00f3n. Detalles Un investigador de seguridad inform\u00f3 a Microsoft sobre una vulnerabilidad de elevaci\u00f3n de privilegios en Windows Backup que podr\u00eda permitir a un atacante con privilegios de usuario b\u00e1sicos reintroducir vulnerabilidades previamente mitigadas o eludir algunas caracter\u00edsticas de VBS. Para que la explotaci\u00f3n tenga \u00e9xito, un atacante debe enga\u00f1ar o convencer a un administrador o usuario con permisos delegados para que realice una restauraci\u00f3n del sistema, lo que inadvertidamente desencadena la vulnerabilidad. Microsoft est\u00e1 desarrollando una actualizaci\u00f3n de seguridad que mitigar\u00e1 esta vulnerabilidad, pero a\u00fan no est\u00e1 disponible. Este CVE se actualizar\u00e1 con nueva informaci\u00f3n y enlaces a las actualizaciones de seguridad una vez que est\u00e9n disponibles. Recomendamos encarecidamente a los clientes que se suscriban a las notificaciones de la Gu\u00eda de actualizaciones de seguridad para recibir alertas sobre las actualizaciones. Consulte la Gu\u00eda de actualizaciones de seguridad y notificaciones t\u00e9cnicas de seguridad de Microsoft. Noticias del sistema de notificaciones: cree su perfil ahora: Centro de respuestas de seguridad de Microsoft. Microsoft no tiene conocimiento de ning\u00fan intento de aprovechar esta vulnerabilidad. Sin embargo, el 7 de agosto de 2024 se realiz\u00f3 una presentaci\u00f3n p\u00fablica sobre esta vulnerabilidad en BlackHat. La presentaci\u00f3n se coordin\u00f3 adecuadamente con Microsoft, pero puede cambiar el panorama de amenazas. Los clientes preocupados por estos riesgos deben consultar la gu\u00eda proporcionada en la secci\u00f3n Acciones recomendadas para proteger sus sistemas. Acciones recomendadas Las siguientes recomendaciones no mitigan la vulnerabilidad, pero pueden usarse para reducir el riesgo de explotaci\u00f3n hasta que la actualizaci\u00f3n de seguridad est\u00e9 disponible. Audite a los usuarios con permiso para realizar operaciones de copia de seguridad y restauraci\u00f3n para garantizar que solo los usuarios adecuados puedan realizar estas operaciones. Auditor\u00eda: Audite el uso del privilegio de Copia de seguridad y restauraci\u00f3n (Windows 10) - Windows 10 | Microsoft Learn Implemente una lista de control de acceso o listas de control de acceso discrecionales para restringir el acceso o la modificaci\u00f3n de los archivos de copia de seguridad y realizar operaciones de restauraci\u00f3n para los usuarios adecuados, por ejemplo, solo administradores. Descripci\u00f3n general del control de acceso | Listas de control de acceso discrecional (DACL) de Microsoft Learn La auditor\u00eda de los privilegios confidenciales utilizados para identificar el acceso, la modificaci\u00f3n o el reemplazo de archivos relacionados con la copia de seguridad podr\u00eda ayudar a indicar intentos de aprovechar esta vulnerabilidad. Auditar el uso de privilegios confidenciales - Windows 10 | Microsoft aprende"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-38983",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-30T21:15:09.700",
|
||||
"lastModified": "2024-08-01T13:55:11.147",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-08T13:58:47.040",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-1321"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,30 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:alykoshin:mini-deep-assign:0.0.8:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CAF293A7-7473-46B5-8A70-AB68DE2C1651"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/mestrtee/f82d0c3a8fe3a125f06425caef5d22ed",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-3958",
|
||||
"sourceIdentifier": "cve@gitlab.com",
|
||||
"published": "2024-08-08T11:15:12.967",
|
||||
"lastModified": "2024-08-08T11:15:12.967",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-08T13:04:18.753",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue has been discovered in GitLab CE/EE affecting all versions before 17.0.6, 17.1 prior to 17.1.4, and 17.2 prior to 17.2.2. An issue was found that allows someone to abuse a discrepancy between the Web application display and the git command line interface to social engineer victims into cloning non-trusted code."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 un problema en GitLab CE/EE que afecta a todas las versiones anteriores a 17.0.6, 17.1 anterior a 17.1.4 y 17.2 anterior a 17.2.2. Se encontr\u00f3 un problema que permite a alguien abusar de una discrepancia entre la visualizaci\u00f3n de la aplicaci\u00f3n web y la interfaz de l\u00ednea de comando de git para realizar ingenier\u00eda social a las v\u00edctimas para clonar c\u00f3digo no confiable."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-41237",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-07T19:15:48.033",
|
||||
"lastModified": "2024-08-07T19:15:48.033",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-08T13:04:18.753",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A SQL injection vulnerability in /smsa/teacher_login.php in Kashipara Responsive School Management System v1.0 allows an attacker to execute arbitrary SQL commands via the \"username\" parameter."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad de inyecci\u00f3n SQL en /smsa/teacher_login.php en Kashipara Responsive School Management System v1.0 permite a un atacante ejecutar comandos SQL arbitrarios a trav\u00e9s del par\u00e1metro \"nombre de usuario\"."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-41239",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-07T19:15:48.093",
|
||||
"lastModified": "2024-08-07T19:35:07.057",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-08T13:04:18.753",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A Stored Cross Site Scripting (XSS) vulnerability was found in \"/smsa/add_class_submit.php\" in Kashipara Responsive School Management System v1.0, which allows remote attackers to execute arbitrary code via \"class_name\" parameter field."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se encontr\u00f3 una vulnerabilidad de Cross Site Scripting (XSS) Almacenado en \"/smsa/add_class_submit.php\" en Kashipara Responsive School Management System v1.0, que permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s del campo de par\u00e1metro \"class_name\"."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-41912",
|
||||
"sourceIdentifier": "hp-security-alert@hp.com",
|
||||
"published": "2024-08-07T20:15:50.877",
|
||||
"lastModified": "2024-08-07T20:15:50.877",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-08T13:04:18.753",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was discovered in the firmware builds up to 10.10.2.2 in Poly Clariti Manager devices. The firmware flaw does not properly implement access controls."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 una vulnerabilidad en las versiones de firmware hasta 10.10.2.2 en dispositivos Poly Clariti Manager. La falla del firmware no implementa adecuadamente los controles de acceso."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-42030",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2024-08-08T09:15:07.290",
|
||||
"lastModified": "2024-08-08T09:15:07.290",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-08T13:04:18.753",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Access permission verification vulnerability in the content sharing pop-up module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de verificaci\u00f3n de permisos de acceso en el m\u00f3dulo emergente para compartir contenido. Impacto: la explotaci\u00f3n exitosa de esta vulnerabilidad puede afectar la confidencialidad del servicio."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-42031",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2024-08-08T09:15:07.630",
|
||||
"lastModified": "2024-08-08T09:15:07.630",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-08T13:04:18.753",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Access permission verification vulnerability in the Settings module.\nImpact: Successful exploitation of this vulnerability may affect service confidentiality."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de verificaci\u00f3n de permisos de acceso en el m\u00f3dulo de Configuraci\u00f3n. Impacto: La explotaci\u00f3n exitosa de esta vulnerabilidad puede afectar la confidencialidad del servicio."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-42032",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2024-08-08T09:15:07.740",
|
||||
"lastModified": "2024-08-08T09:15:07.740",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-08T13:04:18.753",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Access permission verification vulnerability in the Contacts module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de verificaci\u00f3n de permisos de acceso en el m\u00f3dulo Contactos Impacto: la explotaci\u00f3n exitosa de esta vulnerabilidad puede afectar la confidencialidad del servicio."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-42033",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2024-08-08T10:15:06.813",
|
||||
"lastModified": "2024-08-08T10:15:06.813",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-08T13:04:18.753",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Access control vulnerability in the security verification module\nmpact: Successful exploitation of this vulnerability will affect integrity and confidentiality."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de control de acceso en el m\u00f3dulo de verificaci\u00f3n de seguridad mpact: La explotaci\u00f3n exitosa de esta vulnerabilidad afectar\u00e1 la integridad y la confidencialidad."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-42034",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2024-08-08T10:15:07.223",
|
||||
"lastModified": "2024-08-08T10:15:07.223",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-08T13:04:18.753",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "LaunchAnywhere vulnerability in the account module.\nImpact: Successful exploitation of this vulnerability may affect service confidentiality."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de LaunchAnywhere en el m\u00f3dulo de cuenta. Impacto: La explotaci\u00f3n exitosa de esta vulnerabilidad puede afectar la confidencialidad del servicio."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-42035",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2024-08-08T10:15:07.637",
|
||||
"lastModified": "2024-08-08T10:15:07.637",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-08T13:04:18.753",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Permission control vulnerability in the App Multiplier module\nImpact:Successful exploitation of this vulnerability may affect functionality and confidentiality."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de control de permisos en el m\u00f3dulo App Multiplier Impacto: la explotaci\u00f3n exitosa de esta vulnerabilidad puede afectar la funcionalidad y la confidencialidad."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-42036",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2024-08-08T10:15:07.967",
|
||||
"lastModified": "2024-08-08T10:15:07.967",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-08T13:04:18.753",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Access permission verification vulnerability in the Notepad module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de verificaci\u00f3n de permisos de acceso en el m\u00f3dulo Bloc de notas Impacto: la explotaci\u00f3n exitosa de esta vulnerabilidad puede afectar la confidencialidad del servicio."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-42037",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2024-08-08T10:15:08.323",
|
||||
"lastModified": "2024-08-08T10:15:08.323",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-08T13:04:18.753",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Vulnerability of uncaught exceptions in the Graphics module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de excepciones no detectadas en el m\u00f3dulo de gr\u00e1ficos Impacto: la explotaci\u00f3n exitosa de esta vulnerabilidad puede afectar la confidencialidad del servicio."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-42038",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2024-08-08T10:15:08.700",
|
||||
"lastModified": "2024-08-08T10:15:08.700",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-08T13:04:18.753",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Vulnerability of PIN enhancement failures in the screen lock module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality, integrity, and availability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de fallas de mejora del PIN en el m\u00f3dulo de bloqueo de pantalla Impacto: la explotaci\u00f3n exitosa de esta vulnerabilidad puede afectar la confidencialidad, integridad y disponibilidad del servicio."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-42153",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-07-30T08:15:06.847",
|
||||
"lastModified": "2024-07-30T13:32:45.943",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-08T12:51:49.873",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,39 +15,197 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: i2c: pnx: corrige la advertencia de posible interbloqueo de la llamada del_timer_sync() en isr Cuando se llama a del_timer_sync() en un contexto de interrupci\u00f3n, genera una advertencia debido a un posible interbloqueo. El temporizador se usa solo para salir de wait_for_completion() despu\u00e9s de un tiempo de espera, por lo que reemplazar la llamada con wait_for_completion_timeout() permite eliminar por completo el temporizador problem\u00e1tico y sus funciones relacionadas."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-667"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2.6.20",
|
||||
"versionEndExcluding": "4.19.318",
|
||||
"matchCriteriaId": "0DFB121B-ECCE-4A7A-A2F7-D6D7437BC6A6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.20",
|
||||
"versionEndExcluding": "5.4.280",
|
||||
"matchCriteriaId": "625DBFAB-C3D0-4309-A27F-12D6428FB38F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.5",
|
||||
"versionEndExcluding": "5.10.222",
|
||||
"matchCriteriaId": "00696AC5-EE29-437F-97F9-C4D66608B327"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11",
|
||||
"versionEndExcluding": "5.15.163",
|
||||
"matchCriteriaId": "A97DEB09-4927-40F8-B5C6-F5BD5EAE0CFD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "6.1.98",
|
||||
"matchCriteriaId": "E09E92A5-27EF-40E4-926A-B1CDC8270551"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2",
|
||||
"versionEndExcluding": "6.6.39",
|
||||
"matchCriteriaId": "29E894E4-668F-4DB0-81F7-4FB5F698E970"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.9.9",
|
||||
"matchCriteriaId": "ADCC1407-0CB3-4C8F-B4C5-07F682CD7085"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2EBB4392-5FA6-4DA9-9772-8F9C750109FA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "331C2F14-12C7-45D5-893D-8C52EE38EA10"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3173713D-909A-4DD3-9DD4-1E171EB057EE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "79F18AFA-40F7-43F0-BA30-7BDB65F918B9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc5:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BD973AA4-A789-49BD-8D57-B2846935D3C7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc6:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8F3E9E0C-AC3E-4967-AF80-6483E8AB0078"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/27cd3873fa76ebeb9f948baae40cb9a6d8692289",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/2849a1b747cf37aa5b684527104d3a53f1e296d2",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/3503372d0bf7b324ec0bd6b90606703991426176",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/3d32327f5cfc087ee3922a3bcdcc29880dcdb50f",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/92e494a7568b60ae80d57fc0deafcaf3a4029ab3",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/a349e5ab4dc9954746e836cd10b407ce48f9b2f6",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/effe0500afda017a86c94482b1e36bc37586c9af",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/f63b94be6942ba82c55343e196bd09b53227618e",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-42251",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-08-08T09:15:08.070",
|
||||
"lastModified": "2024-08-08T09:15:08.070",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-08T13:04:18.753",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm: page_ref: remove folio_try_get_rcu()\n\nThe below bug was reported on a non-SMP kernel:\n\n[ 275.267158][ T4335] ------------[ cut here ]------------\n[ 275.267949][ T4335] kernel BUG at include/linux/page_ref.h:275!\n[ 275.268526][ T4335] invalid opcode: 0000 [#1] KASAN PTI\n[ 275.269001][ T4335] CPU: 0 PID: 4335 Comm: trinity-c3 Not tainted 6.7.0-rc4-00061-gefa7df3e3bb5 #1\n[ 275.269787][ T4335] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 04/01/2014\n[ 275.270679][ T4335] RIP: 0010:try_get_folio (include/linux/page_ref.h:275 (discriminator 3) mm/gup.c:79 (discriminator 3))\n[ 275.272813][ T4335] RSP: 0018:ffffc90005dcf650 EFLAGS: 00010202\n[ 275.273346][ T4335] RAX: 0000000000000246 RBX: ffffea00066e0000 RCX: 0000000000000000\n[ 275.274032][ T4335] RDX: fffff94000cdc007 RSI: 0000000000000004 RDI: ffffea00066e0034\n[ 275.274719][ T4335] RBP: ffffea00066e0000 R08: 0000000000000000 R09: fffff94000cdc006\n[ 275.275404][ T4335] R10: ffffea00066e0037 R11: 0000000000000000 R12: 0000000000000136\n[ 275.276106][ T4335] R13: ffffea00066e0034 R14: dffffc0000000000 R15: ffffea00066e0008\n[ 275.276790][ T4335] FS: 00007fa2f9b61740(0000) GS:ffffffff89d0d000(0000) knlGS:0000000000000000\n[ 275.277570][ T4335] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 275.278143][ T4335] CR2: 00007fa2f6c00000 CR3: 0000000134b04000 CR4: 00000000000406f0\n[ 275.278833][ T4335] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n[ 275.279521][ T4335] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n[ 275.280201][ T4335] Call Trace:\n[ 275.280499][ T4335] <TASK>\n[ 275.280751][ T4335] ? die (arch/x86/kernel/dumpstack.c:421 arch/x86/kernel/dumpstack.c:434 arch/x86/kernel/dumpstack.c:447)\n[ 275.281087][ T4335] ? do_trap (arch/x86/kernel/traps.c:112 arch/x86/kernel/traps.c:153)\n[ 275.281463][ T4335] ? try_get_folio (include/linux/page_ref.h:275 (discriminator 3) mm/gup.c:79 (discriminator 3))\n[ 275.281884][ T4335] ? try_get_folio (include/linux/page_ref.h:275 (discriminator 3) mm/gup.c:79 (discriminator 3))\n[ 275.282300][ T4335] ? do_error_trap (arch/x86/kernel/traps.c:174)\n[ 275.282711][ T4335] ? try_get_folio (include/linux/page_ref.h:275 (discriminator 3) mm/gup.c:79 (discriminator 3))\n[ 275.283129][ T4335] ? handle_invalid_op (arch/x86/kernel/traps.c:212)\n[ 275.283561][ T4335] ? try_get_folio (include/linux/page_ref.h:275 (discriminator 3) mm/gup.c:79 (discriminator 3))\n[ 275.283990][ T4335] ? exc_invalid_op (arch/x86/kernel/traps.c:264)\n[ 275.284415][ T4335] ? asm_exc_invalid_op (arch/x86/include/asm/idtentry.h:568)\n[ 275.284859][ T4335] ? try_get_folio (include/linux/page_ref.h:275 (discriminator 3) mm/gup.c:79 (discriminator 3))\n[ 275.285278][ T4335] try_grab_folio (mm/gup.c:148)\n[ 275.285684][ T4335] __get_user_pages (mm/gup.c:1297 (discriminator 1))\n[ 275.286111][ T4335] ? __pfx___get_user_pages (mm/gup.c:1188)\n[ 275.286579][ T4335] ? __pfx_validate_chain (kernel/locking/lockdep.c:3825)\n[ 275.287034][ T4335] ? mark_lock (kernel/locking/lockdep.c:4656 (discriminator 1))\n[ 275.287416][ T4335] __gup_longterm_locked (mm/gup.c:1509 mm/gup.c:2209)\n[ 275.288192][ T4335] ? __pfx___gup_longterm_locked (mm/gup.c:2204)\n[ 275.288697][ T4335] ? __pfx_lock_acquire (kernel/locking/lockdep.c:5722)\n[ 275.289135][ T4335] ? __pfx___might_resched (kernel/sched/core.c:10106)\n[ 275.289595][ T4335] pin_user_pages_remote (mm/gup.c:3350)\n[ 275.290041][ T4335] ? __pfx_pin_user_pages_remote (mm/gup.c:3350)\n[ 275.290545][ T4335] ? find_held_lock (kernel/locking/lockdep.c:5244 (discriminator 1))\n[ 275.290961][ T4335] ? mm_access (kernel/fork.c:1573)\n[ 275.291353][ T4335] process_vm_rw_single_vec+0x142/0x360\n[ 275.291900][ T4335] ? __pfx_process_vm_rw_single_vec+0x10/0x10\n[ 275.292471][ T4335] ? mm_access (kernel/fork.c:1573)\n[ 275.292859][ T4335] process_vm_rw_core+0x272/0x4e0\n[ 275.293384][ T4335] ? hlock_class (a\n---truncated---"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: mm: page_ref: remove folio_try_get_rcu() El siguiente error se inform\u00f3 en un kernel que no es SMP: [ 275.267158][ T4335] ------------ [cortar aqu\u00ed]------------ [275.267949][T4335] \u00a1ERROR del kernel en include/linux/page_ref.h:275! [ 275.268526][ T4335] c\u00f3digo de operaci\u00f3n no v\u00e1lido: 0000 [#1] KASAN PTI [ 275.269001][ T4335] CPU: 0 PID: 4335 Comm: trinity-c3 No contaminado 6.7.0-rc4-00061-gefa7df3e3bb5 #1 [ 275.269787][ T4335] Nombre de hardware: PC est\u00e1ndar QEMU (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 01/04/2014 [ 275.270679][ T4335] RIP: 0010:try_get_folio (include/linux/page_ref .h:275 (discriminador 3) mm/gup.c:79 (discriminador 3)) [ 275.272813][ T4335] RSP: 0018:ffffc90005dcf650 EFLAGS: 00010202 [ 275.273346][ T4335] RAX: 00000000000000246 RBX: ffffea00066e0000 RCX: 0000000000000000 [ 275.274032][T4335] RDX: fffff94000cdc007 RSI: 0000000000000004 RDI: ffffea00066e0034 [ 275.274719][ T4335] RBP: ffffea00066e0000 R08: 000000 R09: fffff94000cdc006 [ 275.275404][ T4335] R10: ffffea00066e0037 R11: 00000000000000000 R12: 0000000000000136 [ 275.276106][ T4335] R13: ffffea00066e0034 R14: dffffc0000000000 R15: ffffea00066e0008 [ 275.276790][ T4335] FS: 00007fa2f9b61740(0000) GS:ffffffff89d0d000(0000) 0000000000000000 [ 275.277570][ T4335] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 275.278143 ][ T4335] CR2: 00007fa2f6c00000 CR3: 0000000134b04000 CR4: 00000000000406f0 [ 275.278833][ T4335] DR0: 0000000000000000 DR1: 000 DR2: 0000000000000000 [ 275.279521][ T4335] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 00000000000000400 [ 275.280201][ T4335] Llamada Seguimiento: [ 275.280499][ T4335] [ 275.280751][ T4335] ? morir (arch/x86/kernel/dumpstack.c:421 arch/x86/kernel/dumpstack.c:434 arch/x86/kernel/dumpstack.c:447) [275.281087][T4335]? do_trap (arch/x86/kernel/traps.c:112 arch/x86/kernel/traps.c:153) [ 275.281463][ T4335] ? try_get_folio (include/linux/page_ref.h:275 (discriminador 3) mm/gup.c:79 (discriminador 3)) [ 275.281884][ T4335] ? try_get_folio (include/linux/page_ref.h:275 (discriminador 3) mm/gup.c:79 (discriminador 3)) [ 275.282300][ T4335] ? do_error_trap (arch/x86/kernel/traps.c:174) [275.282711][T4335]? try_get_folio (include/linux/page_ref.h:275 (discriminador 3) mm/gup.c:79 (discriminador 3)) [ 275.283129][ T4335] ? handle_invalid_op (arch/x86/kernel/traps.c:212) [275.283561][T4335]? try_get_folio (include/linux/page_ref.h:275 (discriminador 3) mm/gup.c:79 (discriminador 3)) [ 275.283990][ T4335] ? exc_invalid_op (arch/x86/kernel/traps.c:264) [275.284415][T4335]? asm_exc_invalid_op (arch/x86/include/asm/idtentry.h:568) [275.284859][T4335]? try_get_folio (include/linux/page_ref.h:275 (discriminador 3) mm/gup.c:79 (discriminador 3)) [ 275.285278][ T4335] try_grab_folio (mm/gup.c:148) [ 275.285684][ T4335] __get_user_pages (mm/gup.c:1297 (discriminador 1)) [275.286111][T4335] ? __pfx___get_user_pages (mm/gup.c:1188) [ 275.286579][ T4335] ? __pfx_validate_chain (kernel/locking/lockdep.c:3825) [275.287034][T4335]? mark_lock (kernel/locking/lockdep.c:4656 (discriminador 1)) [ 275.287416][ T4335] __gup_longterm_locked (mm/gup.c:1509 mm/gup.c:2209) [ 275.288192][ T4335] ? __pfx___gup_longterm_locked (mm/gup.c:2204) [ 275.288697][ T4335] ? __pfx_lock_acquire (kernel/locking/lockdep.c:5722) [275.289135][T4335]? __pfx___might_resched (kernel/sched/core.c:10106) [ 275.289595][ T4335] pin_user_pages_remote (mm/gup.c:3350) [ 275.290041][ T4335] ? __pfx_pin_user_pages_remote (mm/gup.c:3350) [275.290545][T4335]? find_held_lock (kernel/locking/lockdep.c:5244 (discriminador 1)) [275.290961][T4335]? mm_access (kernel/fork.c:1573) [275.291353][ T4335] Process_vm_rw_single_vec+0x142/0x360 [275.291900][ T4335] ? __pfx_process_vm_rw_single_vec+0x10/0x10 [275.292471][T4335]? mm_access (kernel/fork.c:1573) [275.292859][ T4335] Process_vm_rw_core+0x272/0x4e0 [275.293384][ T4335] ? hlock_class (a ---truncado---"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-42252",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-08-08T09:15:08.150",
|
||||
"lastModified": "2024-08-08T09:15:08.150",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-08T13:04:18.753",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nclosures: Change BUG_ON() to WARN_ON()\n\nIf a BUG_ON() can be hit in the wild, it shouldn't be a BUG_ON()\n\nFor reference, this has popped up once in the CI, and we'll need more\ninfo to debug it:\n\n03240 ------------[ cut here ]------------\n03240 kernel BUG at lib/closure.c:21!\n03240 kernel BUG at lib/closure.c:21!\n03240 Internal error: Oops - BUG: 00000000f2000800 [#1] SMP\n03240 Modules linked in:\n03240 CPU: 15 PID: 40534 Comm: kworker/u80:1 Not tainted 6.10.0-rc4-ktest-ga56da69799bd #25570\n03240 Hardware name: linux,dummy-virt (DT)\n03240 Workqueue: btree_update btree_interior_update_work\n03240 pstate: 00001005 (nzcv daif -PAN -UAO -TCO -DIT +SSBS BTYPE=--)\n03240 pc : closure_put+0x224/0x2a0\n03240 lr : closure_put+0x24/0x2a0\n03240 sp : ffff0000d12071c0\n03240 x29: ffff0000d12071c0 x28: dfff800000000000 x27: ffff0000d1207360\n03240 x26: 0000000000000040 x25: 0000000000000040 x24: 0000000000000040\n03240 x23: ffff0000c1f20180 x22: 0000000000000000 x21: ffff0000c1f20168\n03240 x20: 0000000040000000 x19: ffff0000c1f20140 x18: 0000000000000001\n03240 x17: 0000000000003aa0 x16: 0000000000003ad0 x15: 1fffe0001c326974\n03240 x14: 0000000000000a1e x13: 0000000000000000 x12: 1fffe000183e402d\n03240 x11: ffff6000183e402d x10: dfff800000000000 x9 : ffff6000183e402e\n03240 x8 : 0000000000000001 x7 : 00009fffe7c1bfd3 x6 : ffff0000c1f2016b\n03240 x5 : ffff0000c1f20168 x4 : ffff6000183e402e x3 : ffff800081391954\n03240 x2 : 0000000000000001 x1 : 0000000000000000 x0 : 00000000a8000000\n03240 Call trace:\n03240 closure_put+0x224/0x2a0\n03240 bch2_check_for_deadlock+0x910/0x1028\n03240 bch2_six_check_for_deadlock+0x1c/0x30\n03240 six_lock_slowpath.isra.0+0x29c/0xed0\n03240 six_lock_ip_waiter+0xa8/0xf8\n03240 __bch2_btree_node_lock_write+0x14c/0x298\n03240 bch2_trans_lock_write+0x6d4/0xb10\n03240 __bch2_trans_commit+0x135c/0x5520\n03240 btree_interior_update_work+0x1248/0x1c10\n03240 process_scheduled_works+0x53c/0xd90\n03240 worker_thread+0x370/0x8c8\n03240 kthread+0x258/0x2e8\n03240 ret_from_fork+0x10/0x20\n03240 Code: aa1303e0 d63f0020 a94363f7 17ffff8c (d4210000)\n03240 ---[ end trace 0000000000000000 ]---\n03240 Kernel panic - not syncing: Oops - BUG: Fatal exception\n03240 SMP: stopping secondary CPUs\n03241 SMP: failed to stop secondary CPUs 13,15\n03241 Kernel Offset: disabled\n03241 CPU features: 0x00,00000003,80000008,4240500b\n03241 Memory Limit: none\n03241 ---[ end Kernel panic - not syncing: Oops - BUG: Fatal exception ]---\n03246 ========= FAILED TIMEOUT copygc_torture_no_checksum in 7200s"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: cierres: Cambie BUG_ON() a WARN_ON() Si se puede acceder a un BUG_ON() en estado salvaje, no deber\u00eda ser un BUG_ON() Como referencia, ha aparecido esto una vez en el CI, y necesitaremos m\u00e1s informaci\u00f3n para depurarlo: 03240 ------------[ cortar aqu\u00ed ]------------ 03240 ERROR del kernel en lib /cierre.c:21! 03240 ERROR del kernel en lib/closure.c:21! 03240 Error interno: Ups - ERROR: 00000000f2000800 [#1] SMP 03240 M\u00f3dulos vinculados en: 03240 CPU: 15 PID: 40534 Comm: kworker/u80:1 No contaminado 6.10.0-rc4-ktest-ga56da69799bd #25570 Nombre del hardware: linux,dummy-virt (DT) 03240 Cola de trabajo: btree_update btree_interior_update_work 03240 pstate: 00001005 (nzcv daif -PAN -UAO -TCO -DIT +SSBS BTYPE=--) 03240 pc: cierre_put+0x224/0x2a0 03240 lr: cierre_put+0x24/ 0x2a0 03240 sp: ffff0000d12071c0 03240 x29: ffff0000d12071c0 x28: dfff800000000000 x27: ffff0000d1207360 03240 x26: 0000000000000040 0000000000000040 x24: 0000000000000040 03240 x23: ffff0000c1f20180 x22: 0000000000000000 x21: ffff0000c1f20168 03240 x20: 000000 x19: ffff0000c1f20140 x18: 0000000000000001 03240 x17: 0000000000003aa0 x16 : 0000000000003ad0 x15: 1fffe0001c326974 03240 x14: 0000000000000a1e x13: 0000000000000000 x12: 1fffe000183e402d 03240 x11: e402d x10: dfff800000000000 x9: ffff6000183e402e 03240 x8: 0000000000000001 x7: 00009fffe7c1bfd3 x6: ffff0000c1f2016b 03240 x5: 0168 x4: ffff6000183e402e x3: ffff800081391954 03240 x2: 0000000000000001 x1 : 0000000000000000 x0 : 00000000a8000000 03240 Rastreo de llamadas: 03240 cierre_put+0x224/0x2a0 03240 bch2_check_for_deadlock+0x910/0x1028 03240 bch2_six_check_for_deadlock+0x1c /0x30 03240 six_lock_slowpath.isra.0+0x29c/0xed0 03240 six_lock_ip_waiter+0xa8/0xf8 03240 __bch2_btree_node_lock_write+0x14c/0x298 03240 bch2_trans_lock_write+0x6d4/0xb10 03240 __bch2_trans_commit+0x135c/0x5520 03240 btree_interior_update_work+0x1248/0x1c10 03240 Process_scheduled_works+0x53c/0xd90 03240 trabajador_thread+0x37 0/0x8c8 03240 kthread+0x258/0x2e8 03240 ret_from_fork+0x10/0x20 03240 C\u00f3digo: aa1303e0 d63f0020 a94363f7 17ffff8c (d4210000 ) 03240 ---[ seguimiento final 0000000000000000 ]--- 03240 P\u00e1nico del kernel - no se sincroniza: Ups - ERROR: Excepci\u00f3n fatal 03240 SMP: deteniendo las CPU secundarias 03241 SMP: no se pudieron detener las CPU secundarias 13,15 03241 Desplazamiento del kernel: deshabilitado 03241 CPU caracter\u00edsticas: 0x00,00000003,80000008,4240500b 03241 L\u00edmite de memoria: ninguno 03241 ---[ fin del p\u00e1nico del kernel - no se sincroniza: Ups - ERROR: excepci\u00f3n fatal ]--- 03246 ========= TIEMPO DE ESPERA FALLIDO copygc_torture_no_checksum en 7200"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-42253",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-08-08T09:15:08.220",
|
||||
"lastModified": "2024-08-08T09:15:08.220",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-08T13:04:18.753",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ngpio: pca953x: fix pca953x_irq_bus_sync_unlock race\n\nEnsure that `i2c_lock' is held when setting interrupt latch and mask in\npca953x_irq_bus_sync_unlock() in order to avoid races.\n\nThe other (non-probe) call site pca953x_gpio_set_multiple() ensures the\nlock is held before calling pca953x_write_regs().\n\nThe problem occurred when a request raced against irq_bus_sync_unlock()\napproximately once per thousand reboots on an i.MX8MP based system.\n\n * Normal case\n\n 0-0022: write register AI|3a {03,02,00,00,01} Input latch P0\n 0-0022: write register AI|49 {fc,fd,ff,ff,fe} Interrupt mask P0\n 0-0022: write register AI|08 {ff,00,00,00,00} Output P3\n 0-0022: write register AI|12 {fc,00,00,00,00} Config P3\n\n * Race case\n\n 0-0022: write register AI|08 {ff,00,00,00,00} Output P3\n 0-0022: write register AI|08 {03,02,00,00,01} *** Wrong register ***\n 0-0022: write register AI|12 {fc,00,00,00,00} Config P3\n 0-0022: write register AI|49 {fc,fd,ff,ff,fe} Interrupt mask P0"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: gpio: pca953x: corrige la ejecuci\u00f3n pca953x_irq_bus_sync_unlock Aseg\u00farese de que se mantenga `i2c_lock' al configurar el bloqueo de interrupci\u00f3n y la m\u00e1scara en pca953x_irq_bus_sync_unlock() para evitar ejecuciones. El otro sitio de llamada (que no es de sonda) pca953x_gpio_set_multiple() garantiza que el bloqueo se mantenga antes de llamar a pca953x_write_regs(). El problema ocurri\u00f3 cuando una solicitud corri\u00f3 contra irq_bus_sync_unlock() aproximadamente una vez por cada mil reinicios en un sistema basado en i.MX8MP. * Caso normal 0-0022: escribir registro AI|3a {03,02,00,00,01} Enclavamiento de entrada P0 0-0022: escribir registro AI|49 {fc,fd,ff,ff,fe} M\u00e1scara de interrupci\u00f3n P0 0 -0022: escribir registro AI|08 {ff,00,00,00,00} Salida P3 0-0022: escribir registro AI|12 {fc,00,00,00,00} Configuraci\u00f3n P3 * Caso de ejecuci\u00f3n 0-0022: escribir registro AI|08 {ff,00,00,00,00} Salida P3 0-0022: escribir registro AI|08 {03,02,00,00,01} *** Registro incorrecto *** 0-0022: escribir registro AI|12 {fc,00,00,00,00} Config P3 0-0022: escribir registro AI|49 {fc,fd,ff,ff,fe} M\u00e1scara de interrupci\u00f3n P0"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-42254",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-08-08T09:15:08.290",
|
||||
"lastModified": "2024-08-08T09:15:08.290",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-08T13:04:18.753",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nio_uring: fix error pbuf checking\n\nSyz reports a problem, which boils down to NULL vs IS_ERR inconsistent\nerror handling in io_alloc_pbuf_ring().\n\nKASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]\nRIP: 0010:__io_remove_buffers+0xac/0x700 io_uring/kbuf.c:341\nCall Trace:\n <TASK>\n io_put_bl io_uring/kbuf.c:378 [inline]\n io_destroy_buffers+0x14e/0x490 io_uring/kbuf.c:392\n io_ring_ctx_free+0xa00/0x1070 io_uring/io_uring.c:2613\n io_ring_exit_work+0x80f/0x8a0 io_uring/io_uring.c:2844\n process_one_work kernel/workqueue.c:3231 [inline]\n process_scheduled_works+0xa2c/0x1830 kernel/workqueue.c:3312\n worker_thread+0x86d/0xd40 kernel/workqueue.c:3390\n kthread+0x2f0/0x390 kernel/kthread.c:389\n ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147\n ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: io_uring: corrige el error pbuf comprobando Syz informa un problema, que se reduce a un manejo inconsistente de errores NULL vs IS_ERR en io_alloc_pbuf_ring(). KASAN: null-ptr-deref en el rango [0x0000000000000000-0x0000000000000007] RIP: 0010:__io_remove_buffers+0xac/0x700 io_uring/kbuf.c:341 Seguimiento de llamadas: io_put_bl io_uring/kbuf.c:378 l\u00ednea] io_destroy_buffers+0x14e /0x490 io_uring/kbuf.c:392 io_ring_ctx_free+0xa00/0x1070 io_uring/io_uring.c:2613 io_ring_exit_work+0x80f/0x8a0 io_uring/io_uring.c:2844 Process_one_work kernel/workqueue.c:3231 [en l\u00ednea] N\u00facleo 0xa2c/0x1830 /workqueue.c:3312 trabajador_thread+0x86d/0xd40 kernel/workqueue.c:3390 kthread+0x2f0/0x390 kernel/kthread.c:389 ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/ 0x30 arco/x86/entrada/entry_64.S:244"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-42255",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-08-08T09:15:08.470",
|
||||
"lastModified": "2024-08-08T09:15:08.470",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-08T13:04:18.753",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ntpm: Use auth only after NULL check in tpm_buf_check_hmac_response()\n\nDereference auth after NULL check in tpm_buf_check_hmac_response().\nOtherwise, unless tpm2_sessions_init() was called, a call can cause NULL\ndereference, when TCG_TPM2_HMAC is enabled.\n\n[jarkko: adjusted the commit message.]"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: tpm: use autenticaci\u00f3n solo despu\u00e9s de la verificaci\u00f3n NULL en tpm_buf_check_hmac_response() Desreferenciar la autenticaci\u00f3n despu\u00e9s de la verificaci\u00f3n NULL en tpm_buf_check_hmac_response(). De lo contrario, a menos que se haya llamado a tpm2_sessions_init(), una llamada puede causar una desreferencia NULL, cuando TCG_TPM2_HMAC est\u00e1 habilitado. [jarkko: ajust\u00f3 el mensaje de confirmaci\u00f3n.]"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-42256",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-08-08T09:15:08.553",
|
||||
"lastModified": "2024-08-08T09:15:08.553",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-08T13:04:18.753",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ncifs: Fix server re-repick on subrequest retry\n\nWhen a subrequest is marked for needing retry, netfs will call\ncifs_prepare_write() which will make cifs repick the server for the op\nbefore renegotiating credits; it then calls cifs_issue_write() which\ninvokes smb2_async_writev() - which re-repicks the server.\n\nIf a different server is then selected, this causes the increment of\nserver->in_flight to happen against one record and the decrement to happen\nagainst another, leading to misaccounting.\n\nFix this by just removing the repick code in smb2_async_writev(). As this\nis only called from netfslib-driven code, cifs_prepare_write() should\nalways have been called first, and so server should never be NULL and the\npreparatory step is repeated in the event that we do a retry.\n\nThe problem manifests as a warning looking something like:\n\n WARNING: CPU: 4 PID: 72896 at fs/smb/client/smb2ops.c:97 smb2_add_credits+0x3f0/0x9e0 [cifs]\n ...\n RIP: 0010:smb2_add_credits+0x3f0/0x9e0 [cifs]\n ...\n smb2_writev_callback+0x334/0x560 [cifs]\n cifs_demultiplex_thread+0x77a/0x11b0 [cifs]\n kthread+0x187/0x1d0\n ret_from_fork+0x34/0x60\n ret_from_fork_asm+0x1a/0x30\n\nWhich may be triggered by a number of different xfstests running against an\nAzure server in multichannel mode. generic/249 seems the most repeatable,\nbut generic/215, generic/249 and generic/308 may also show it."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: cifs: corrige la repetici\u00f3n del servidor en el reintento de subrequest Cuando se marca una subrequest para necesitar un reintento, netfs llamar\u00e1 a cifs_prepare_write(), lo que har\u00e1 que cifs vuelva a seleccionar el servidor para la operaci\u00f3n antes de renegociar los cr\u00e9ditos; luego llama a cifs_issue_write(), que invoca a smb2_async_writev(), que vuelve a seleccionar el servidor. Si luego se selecciona un servidor diferente, esto hace que el incremento de server->in_flight ocurra en un registro y la disminuci\u00f3n en otro, lo que lleva a una contabilidad err\u00f3nea. Solucione este problema simplemente eliminando el c\u00f3digo de repetici\u00f3n en smb2_async_writev(). Como esto solo se llama desde c\u00f3digo controlado por netfslib, siempre se deber\u00eda haber llamado primero a cifs_prepare_write(), por lo que el servidor nunca deber\u00eda ser NULL y el paso preparatorio se repite en caso de que hagamos un reintento. El problema se manifiesta como una advertencia similar a: ADVERTENCIA: CPU: 4 PID: 72896 en fs/smb/client/smb2ops.c:97 smb2_add_credits+0x3f0/0x9e0 [cifs] ... RIP: 0010:smb2_add_credits+0x3f0/0x9e0 [cifs] ... smb2_writev_callback+0x334/0x560 [cifs] cifs_demultiplex_thread+0x77a/0x11b0 [cifs] kthread+0x187/0x1d0 ret_from_fork+0x34/0x60 ret_from_fork_asm+0x1a/0x30 Que puede ser activado por varios xfstests corriendo contra un Servidor Azure en modo multicanal. generic/249 parece el m\u00e1s repetible, pero generic/215, generic/249 y generic/308 tambi\u00e9n pueden mostrarlo."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-42257",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-08-08T09:15:08.623",
|
||||
"lastModified": "2024-08-08T09:15:08.623",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-08T13:04:18.753",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: use memtostr_pad() for s_volume_name\n\nAs with the other strings in struct ext4_super_block, s_volume_name is\nnot NUL terminated. The other strings were marked in commit 072ebb3bffe6\n(\"ext4: add nonstring annotations to ext4.h\"). Using strscpy() isn't\nthe right replacement for strncpy(); it should use memtostr_pad()\ninstead."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: ext4: use memtostr_pad() para s_volume_name Al igual que con las otras cadenas en la estructura ext4_super_block, s_volume_name no tiene terminaci\u00f3n NUL. Las otras cadenas se marcaron en el commit 072ebb3bffe6 (\"ext4: agregue anotaciones que no sean cadenas a ext4.h\"). Usar strscpy() no es el reemplazo adecuado para strncpy(); deber\u00eda usar memtostr_pad() en su lugar."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-4207",
|
||||
"sourceIdentifier": "cve@gitlab.com",
|
||||
"published": "2024-08-08T11:15:13.183",
|
||||
"lastModified": "2024-08-08T11:15:13.183",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-08T13:04:18.753",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A cross-site scripting issue has been discovered in GitLab affecting all versions starting from 5.1 prior 17.0.6, starting from 17.1 prior to 17.1.4, and starting from 17.2 prior to 17.2.2. When viewing an XML file in a repository in raw mode, it can be made to render as HTML if viewed under specific circumstances."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 un problema de cross-site scripting en GitLab que afecta a todas las versiones a partir de 5.1 anteriores a 17.0.6, a partir de 17.1 anteriores a 17.1.4 y a partir de 17.2 anteriores a 17.2.2. Al visualizar un archivo XML en un repositorio en modo sin formato, se puede hacer que se represente como HTML si se ve en circunstancias espec\u00edficas."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-4210",
|
||||
"sourceIdentifier": "cve@gitlab.com",
|
||||
"published": "2024-08-08T10:15:09.040",
|
||||
"lastModified": "2024-08-08T10:15:09.040",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-08T13:04:18.753",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A Denial of Service (DoS) condition has been discovered in GitLab CE/EE affecting all versions starting with 12.6 before 17.0.6, 17.1 prior to 17.1.4, and 17.2 prior to 17.2.2. It is possible for an attacker to cause a denial of service using crafted adoc files."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 una condici\u00f3n de denegaci\u00f3n de servicio (DoS) en GitLab CE/EE que afecta a todas las versiones comenzando con 12.6 anterior a 17.0.6, 17.1 anterior a 17.1.4 y 17.2 anterior a 17.2.2. Es posible que un atacante provoque una denegaci\u00f3n de servicio utilizando archivos adoc manipulados."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-4784",
|
||||
"sourceIdentifier": "cve@gitlab.com",
|
||||
"published": "2024-08-08T10:15:09.390",
|
||||
"lastModified": "2024-08-08T10:15:09.390",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-08T13:04:18.753",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in GitLab EE starting from version 16.7 before 17.0.6, version 17.1 before 17.1.4 and 17.2 before 17.2.2 that allowed bypassing the password re-entry requirement to approve a policy."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 un problema en GitLab EE a partir de la versi\u00f3n 16.7 anterior a 17.0.6, la versi\u00f3n 17.1 anterior a 17.1.4 y la 17.2 anterior a 17.2.2 que permit\u00eda omitir el requisito de reingreso de contrase\u00f1a para aprobar una pol\u00edtica."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-5226",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-08-08T06:15:40.383",
|
||||
"lastModified": "2024-08-08T06:15:40.383",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-08T13:04:18.753",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Fuse Social Floating Sidebar plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the file upload functionality in all versions up to, and including, 5.4.10 due to insufficient validation of SVG files. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento Fuse Social Floating Sidebar para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s de la funcionalidad de carga de archivos en todas las versiones hasta la 5.4.10 incluida debido a una validaci\u00f3n insuficiente de los archivos SVG. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-5423",
|
||||
"sourceIdentifier": "cve@gitlab.com",
|
||||
"published": "2024-08-08T11:15:13.410",
|
||||
"lastModified": "2024-08-08T11:15:13.410",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-08T13:04:18.753",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Multiple Denial of Service (DoS) conditions has been discovered in GitLab CE/EE affecting all versions starting from 1.0 prior to 17.0.6, starting from 17.1 prior to 17.1.4, and starting from 17.2 prior to 17.2.2 which allowed an attacker to cause resource exhaustion via banzai pipeline."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubrieron m\u00faltiples condiciones de denegaci\u00f3n de servicio (DoS) en GitLab CE/EE que afectan a todas las versiones desde 1.0 anterior a 17.0.6, desde 17.1 anterior a 17.1.4 y desde 17.2 anterior a 17.2.2, lo que permiti\u00f3 a un atacante para causar el agotamiento de los recursos a trav\u00e9s del oleoducto banzai."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-5668",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-08-08T05:15:50.203",
|
||||
"lastModified": "2024-08-08T05:15:50.203",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-08T13:04:18.753",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Lightbox & Modal Popup WordPress Plugin \u2013 FooBox plugin for WordPress is vulnerable to DOM-based Stored Cross-Site Scripting via HTML data attributes in all versions up to, and including, 2.7.28 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento Lightbox & Modal Popup WordPress Plugin \u2013 FooBox para WordPress es vulnerable a Cross-Site Scripting Almacenado basados en DOM a trav\u00e9s de atributos de datos HTML en todas las versiones hasta la 2.7.28 incluida debido a una desinfecci\u00f3n de entrada insuficiente y a un escape de salida proporcionado por el usuario. atributos. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-6254",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-08-08T04:17:06.983",
|
||||
"lastModified": "2024-08-08T04:17:06.983",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-08T13:04:18.753",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Brizy \u2013 Page Builder plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.5.1. This is due to missing or incorrect nonce validation on form submissions. This makes it possible for unauthenticated attackers to submit forms intended for public use as another user via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. On sites where unfiltered_html is enabled, this can lead to the admin unknowingly adding a Stored Cross-Site Scripting payload."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento Brizy \u2013 Page Builder para WordPress es vulnerable a Cross-Site Request Forgery en todas las versiones hasta la 2.5.1 incluida. Esto se debe a una validaci\u00f3n nonce faltante o incorrecta en los env\u00edos de formularios. Esto hace posible que atacantes no autenticados env\u00eden formularios destinados a uso p\u00fablico como otro usuario a trav\u00e9s de una solicitud falsificada, siempre que puedan enga\u00f1ar al administrador del sitio para que realice una acci\u00f3n como hacer clic en un enlace. En sitios donde unfiltered_html est\u00e1 habilitado, esto puede llevar a que el administrador agregue, sin saberlo, un payload de Cross Site Scripting (XSS) Almacenado."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-6329",
|
||||
"sourceIdentifier": "cve@gitlab.com",
|
||||
"published": "2024-08-08T10:15:09.857",
|
||||
"lastModified": "2024-08-08T10:15:09.857",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-08T13:04:18.753",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in GitLab CE/EE affecting all versions starting from 8.16 prior to 17.0.6, starting from 17.1 prior to 17.1.4, and starting from 17.2 prior to 17.2.2, which causes the web interface to fail to render the diff correctly when the path is encoded."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 un problema en GitLab CE/EE que afecta a todas las versiones desde 8.16 anterior a 17.0.6, desde 17.1 anterior a 17.1.4 y desde 17.2 anterior a 17.2.2, lo que provoca que la interfaz web no pueda representar el diff correctamente cuando la ruta est\u00e1 codificada."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-6481",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-08-08T06:15:40.917",
|
||||
"lastModified": "2024-08-08T06:15:40.917",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-08T13:04:18.753",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Search & Filter Pro WordPress plugin before 2.5.18 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento Search & Filter Pro de WordPress anterior a 2.5.18 no desinfecta ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con privilegios elevados, como el administrador, realizar ataques de Cross Site Scripting (XSS) Almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n multisitio)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-6552",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-08-08T04:17:08.573",
|
||||
"lastModified": "2024-08-08T04:17:08.573",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-08T13:04:18.753",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Booking for Appointments and Events Calendar \u2013 Amelia plugin for WordPress is vulnerable to Full Path Disclosure in all versions up to, and including, 1.2. This is due to the plugin utilizing Symfony and leaving display_errors on within test files. This makes it possible for unauthenticated attackers to retrieve the full path of the web application, which can be used to aid other attacks. The information displayed is not useful on its own, and requires another vulnerability to be present for damage to an affected website."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento Booking for Appointments and Events Calendar \u2013 Amelia para WordPress es vulnerable a la divulgaci\u00f3n de ruta completa en todas las versiones hasta la 1.2 incluida. Esto se debe a que el complemento utiliza Symfony y deja display_errors dentro de los archivos de prueba. Esto hace posible que atacantes no autenticados recuperen la ruta completa de la aplicaci\u00f3n web, que puede usarse para ayudar en otros ataques. La informaci\u00f3n mostrada no es \u00fatil por s\u00ed sola y requiere que est\u00e9 presente otra vulnerabilidad para da\u00f1ar un sitio web afectado."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-6706",
|
||||
"sourceIdentifier": "bbf0bd87-ece2-41be-b873-96928ee8fab9",
|
||||
"published": "2024-08-07T23:15:41.350",
|
||||
"lastModified": "2024-08-07T23:15:41.350",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-08T13:04:18.753",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Attackers can craft a malicious prompt that coerces the language model into executing arbitrary JavaScript in the context of the web page."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Los atacantes pueden crear un mensaje malicioso que obligue al modelo de lenguaje a ejecutar JavaScript arbitrario en el contexto de la p\u00e1gina web."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-6707",
|
||||
"sourceIdentifier": "bbf0bd87-ece2-41be-b873-96928ee8fab9",
|
||||
"published": "2024-08-07T23:15:41.457",
|
||||
"lastModified": "2024-08-07T23:15:41.457",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-08T13:04:18.753",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Attacker controlled files can be uploaded to arbitrary locations on the web server's filesystem by abusing a path traversal vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Los archivos controlados por un atacante se pueden cargar en ubicaciones arbitrarias en el sistema de archivos del servidor web abusando de una vulnerabilidad de path traversal."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-6824",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-08-08T06:15:41.067",
|
||||
"lastModified": "2024-08-08T06:15:41.067",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-08T13:04:18.753",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Premium Addons for Elementor plugin for WordPress is vulnerable to unauthorized modification and loss of data due to a missing capability check on the 'check_temp_validity' and 'update_template_title' functions in all versions up to, and including, 4.10.38. This makes it possible for authenticated attackers, with Contributor-level access and above, to delete arbitrary content and update post and page titles."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Los complementos Premium Addons for Elementor para WordPress son vulnerables a modificaciones no autorizadas y p\u00e9rdida de datos debido a una falta de verificaci\u00f3n de capacidad en las funciones 'check_temp_validity' y 'update_template_title' en todas las versiones hasta la 4.10.38 incluida. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, eliminen contenido arbitrario y actualicen t\u00edtulos de publicaciones y p\u00e1ginas."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-6869",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-08-08T05:15:50.473",
|
||||
"lastModified": "2024-08-08T05:15:50.473",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-08T13:04:18.753",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Falang multilanguage for WordPress plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on several functions in all versions up to, and including, 1.3.52. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update and delete translations and expose the administrator email address."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento Falang multilenguaje para WordPress para WordPress es vulnerable a modificaciones no autorizadas de datos debido a una falta de verificaci\u00f3n de capacidad en varias funciones en todas las versiones hasta la 1.3.52 incluida. Esto hace posible que atacantes autenticados, con acceso de nivel de suscriptor y superior, actualicen y eliminen traducciones y expongan la direcci\u00f3n de correo electr\u00f3nico del administrador."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-6884",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-08-08T06:15:41.603",
|
||||
"lastModified": "2024-08-08T06:15:41.603",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-08T13:04:18.753",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Gutenberg Blocks with AI by Kadence WP WordPress plugin before 3.2.39 does not validate and escape some of its block options before outputting them back in a page/post where the block is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento Gutenberg Blocks with AI by Kadence WP WordPress anterior a 3.2.39 no valida ni escapa algunas de sus opciones de bloqueo antes de devolverlas a una p\u00e1gina/publicaci\u00f3n donde est\u00e1 incrustado el bloque, lo que podr\u00eda permitir a los usuarios con el rol de colaborador y superiores realizar ataques de Cross-Site Scripting Almacenado"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-6890",
|
||||
"sourceIdentifier": "bbf0bd87-ece2-41be-b873-96928ee8fab9",
|
||||
"published": "2024-08-07T23:15:41.543",
|
||||
"lastModified": "2024-08-08T00:15:40.507",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-08T13:04:18.753",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Password reset tokens are generated using an insecure source of randomness. Attackers who know the username of the Journyx installation user can bruteforce the password reset and change the administrator password."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Los tokens de restablecimiento de contrase\u00f1a se generan utilizando una fuente aleatoria insegura. Los atacantes que conocen el nombre de usuario del usuario de instalaci\u00f3n de Journyx pueden forzar el restablecimiento de contrase\u00f1a y cambiar la contrase\u00f1a de administrador."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-6891",
|
||||
"sourceIdentifier": "bbf0bd87-ece2-41be-b873-96928ee8fab9",
|
||||
"published": "2024-08-08T00:15:40.603",
|
||||
"lastModified": "2024-08-08T00:15:40.603",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-08T13:04:18.753",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Attackers with a valid username and password can exploit a python code injection vulnerability during the natural login flow."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Los atacantes con un nombre de usuario y contrase\u00f1a v\u00e1lidos pueden aprovechar una vulnerabilidad de inyecci\u00f3n de c\u00f3digo Python durante el flujo de inicio de sesi\u00f3n natural."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-6892",
|
||||
"sourceIdentifier": "bbf0bd87-ece2-41be-b873-96928ee8fab9",
|
||||
"published": "2024-08-08T00:15:40.707",
|
||||
"lastModified": "2024-08-08T00:15:40.707",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-08T13:04:18.753",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Attackers can craft a malicious link that once clicked will execute arbitrary JavaScript in the context of the Journyx web application."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Los atacantes pueden crear un enlace malicioso que, una vez hecho clic, ejecutar\u00e1 JavaScript arbitrario en el contexto de la aplicaci\u00f3n web Journyx."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-6893",
|
||||
"sourceIdentifier": "bbf0bd87-ece2-41be-b873-96928ee8fab9",
|
||||
"published": "2024-08-08T00:15:40.793",
|
||||
"lastModified": "2024-08-08T00:15:40.793",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-08T13:04:18.753",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The \"soap_cgi.pyc\" API handler allows the XML body of SOAP requests to contain references to external entities. This allows an unauthenticated attacker to read local files, perform server-side request forgery, and overwhelm the web server resources."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El controlador API \"soap_cgi.pyc\" permite que el cuerpo XML de las solicitudes SOAP contenga referencias a entidades externas. Esto permite que un atacante no autenticado lea archivos locales, falsifique solicitudes del lado del servidor y abrume los recursos del servidor web."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-6987",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-08-08T05:15:50.700",
|
||||
"lastModified": "2024-08-08T05:15:50.700",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-08T13:04:18.753",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Orchid Store theme for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'orchid_store_activate_plugin' function in all versions up to, and including, 1.5.6. This makes it possible for authenticated attackers, with Subscriber-level access and above, to activate the Addonify Floating Cart For WooCommerce plugin if it is installed."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El tema Orchid Store para WordPress es vulnerable a modificaciones no autorizadas de datos debido a una falta de verificaci\u00f3n de capacidad en la funci\u00f3n 'orchid_store_activate_plugin' en todas las versiones hasta la 1.5.6 incluida. Esto hace posible que atacantes autenticados, con acceso de nivel de suscriptor y superior, activen el complemento Addonify Floating Cart For WooCommerce si est\u00e1 instalado."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-7150",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-08-08T06:15:41.727",
|
||||
"lastModified": "2024-08-08T06:15:41.727",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-08T13:04:18.753",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Slider by 10Web \u2013 Responsive Image Slider plugin for WordPress is vulnerable to time-based SQL Injection via the 'id' parameter in all versions up to, and including, 1.2.57 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Contributor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento Slider by 10Web \u2013 Responsive Image Slider para WordPress es vulnerable a la inyecci\u00f3n SQL basada en tiempo a trav\u00e9s del par\u00e1metro 'id' en todas las versiones hasta la 1.2.57 incluida debido a un escape insuficiente en el par\u00e1metro proporcionado por el usuario y a la falta de suficiente preparaci\u00f3n de la consulta SQL existente. Esto hace posible que los atacantes autenticados, con acceso de nivel de colaborador y superior, agreguen consultas SQL adicionales a consultas ya existentes que pueden usarse para extraer informaci\u00f3n confidencial de la base de datos."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-7154",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-07-28T10:15:01.897",
|
||||
"lastModified": "2024-07-29T14:12:08.783",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-08T12:38:38.570",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -110,8 +130,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-306"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -120,22 +150,64 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:totolink:a3700r_firmware:9.1.2u.5822_b20200513:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C3F5D7B3-9362-4A1F-A53C-8B7DA8CAFAA0"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:totolink:a3700r:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "05777EB4-0963-4317-AB0B-287A2140915D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/A3700R/setWizardCfg_changepw.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.272568",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.272568",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.377463",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-7155",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-07-28T10:15:03.053",
|
||||
"lastModified": "2024-07-29T14:12:08.783",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-08T12:34:01.330",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.0,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -109,6 +129,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-798"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -120,22 +150,64 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:totolink:a3300r_firmware:17.0.0cu.557_b20221024:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DD39B647-3419-4C6D-A6A2-30F40822A27D"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:totolink:a3300r:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7F723A73-4B32-4F9E-B5DA-80134D4711C1"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/A3300R/shadow.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.272569",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.272569",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.377465",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-7156",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-07-28T11:15:11.820",
|
||||
"lastModified": "2024-07-29T14:12:08.783",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-08T12:20:39.150",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -110,8 +130,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -120,22 +150,65 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:totolink:a3700r_firmware:9.1.2u.5822_b20200513:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C3F5D7B3-9362-4A1F-A53C-8B7DA8CAFAA0"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:totolink:a3700r:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "05777EB4-0963-4317-AB0B-287A2140915D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/A3700R/ExportSettings.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.272570",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.272570",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.377473",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-7157",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-07-28T11:15:12.107",
|
||||
"lastModified": "2024-07-29T14:12:08.783",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-08T12:17:46.953",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -120,22 +140,64 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:totolink:a3100r_firmware:4.1.2cu.5050_b20200504:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0BD0B6FC-5C4F-4547-883D-7B9C03B45523"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:totolink:a3100r:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "40729E79-9D89-440F-B38D-E62D310E27F9"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/A3100R/getSaveConfig.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.272571",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.272571",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.377542",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-7158",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-07-28T14:15:11.303",
|
||||
"lastModified": "2024-07-29T14:12:08.783",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-08T12:17:08.037",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -120,22 +140,64 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:totolink:a3100r_firmware:4.1.2cu.5050_b20200504:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0BD0B6FC-5C4F-4547-883D-7B9C03B45523"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:totolink:a3100r:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "40729E79-9D89-440F-B38D-E62D310E27F9"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/A3100R/setTelnetCfg.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.272572",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.272572",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.377543",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-7159",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-07-28T15:15:09.897",
|
||||
"lastModified": "2024-07-29T14:12:08.783",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-08T12:15:56.080",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -120,22 +140,65 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:totolink:a3600r_firmware:4.1.2cu.5182_b20201102:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "03658809-4127-4409-AD55-0700186EAFBD"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:totolink:a3600r:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F10B282D-E388-4A52-B7F8-D08C83CF0D62"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/A3600R/product.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.272573",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.272573",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.377942",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-7170",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-07-28T22:15:01.820",
|
||||
"lastModified": "2024-07-29T14:12:08.783",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-08T12:46:18.550",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -110,8 +130,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-798"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -120,22 +150,63 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:totolink:a3000ru_firmware:5.9c.5185_b20201128:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "79DE76F9-7FFB-4862-AD73-BD2ACA15EBAB"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:totolink:a3000ru:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FD355C8B-CA00-4093-BB2A-D3EC6EC64053"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/A3000RU/product.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.272591",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.272591",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.377957",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-7171",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-07-28T23:15:09.837",
|
||||
"lastModified": "2024-07-29T14:12:08.783",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-08T12:39:09.323",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -109,6 +129,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -120,22 +150,63 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:totolink:a3600r_firmware:4.1.2cu.5182_b20201102:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "03658809-4127-4409-AD55-0700186EAFBD"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:totolink:a3600r:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F10B282D-E388-4A52-B7F8-D08C83CF0D62"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/A3600R/NTPSyncWithHost.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.272592",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.272592",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.378038",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-7279",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-07-31T01:15:10.410",
|
||||
"lastModified": "2024-07-31T12:57:02.300",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-08T13:57:09.313",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -120,22 +140,53 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oretnom23:lot_reservation_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F61C368A-A454-463C-A457-2863C4B7623F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/topsky979/8eb5a3711f4802b2b05ae3702addb61e",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.273148",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.273148",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.381195",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-7280",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-07-31T01:15:10.687",
|
||||
"lastModified": "2024-07-31T12:57:02.300",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-08T13:56:04.987",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -120,22 +140,52 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oretnom23:lot_reservation_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F61C368A-A454-463C-A457-2863C4B7623F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/topsky979/c4e972f03739833ad2d111493f44138b",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.273149",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.273149",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.381196",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-7281",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-07-31T02:15:02.003",
|
||||
"lastModified": "2024-07-31T12:57:02.300",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-08T13:55:33.463",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -120,22 +140,53 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oretnom23:lot_reservation_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F61C368A-A454-463C-A457-2863C4B7623F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/topsky979/13cfd55966ffe12c8904de995400fc33",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.273150",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.273150",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.381197",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-7282",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-07-31T02:15:02.383",
|
||||
"lastModified": "2024-07-31T12:57:02.300",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-08T13:54:32.003",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -120,22 +140,52 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oretnom23:lot_reservation_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F61C368A-A454-463C-A457-2863C4B7623F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/topsky979/16181c02e770952091a36784da530eab",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.273151",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.273151",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.381198",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-7283",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-07-31T03:15:01.717",
|
||||
"lastModified": "2024-07-31T12:57:02.300",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-08T13:52:03.277",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -109,6 +129,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -120,22 +150,52 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oretnom23:lot_reservation_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F61C368A-A454-463C-A457-2863C4B7623F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/topsky979/0cda40ceee628634e4bc984cc5651b51",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.273152",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.273152",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.381199",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-7284",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-07-31T03:15:02.077",
|
||||
"lastModified": "2024-07-31T12:57:02.300",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-08T13:49:32.727",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -120,22 +140,52 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oretnom23:lot_reservation_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F61C368A-A454-463C-A457-2863C4B7623F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/topsky979/16da371a38fd91d64765fd16ed3d049e",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.273153",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.273153",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.381223",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-73xx/CVE-2024-7348.json
Normal file
56
CVE-2024/CVE-2024-73xx/CVE-2024-7348.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-7348",
|
||||
"sourceIdentifier": "f86ef6dc-4d3a-42ad-8f28-e6d5547a5007",
|
||||
"published": "2024-08-08T13:15:14.007",
|
||||
"lastModified": "2024-08-08T13:15:14.007",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Time-of-check Time-of-use (TOCTOU) race condition in pg_dump in PostgreSQL allows an object creator to execute arbitrary SQL functions as the user running pg_dump, which is often a superuser. The attack involves replacing another relation type with a view or foreign table. The attack requires waiting for pg_dump to start, but winning the race condition is trivial if the attacker retains an open transaction. Versions before PostgreSQL 16.4, 15.8, 14.13, 13.16, and 12.20 are affected."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "f86ef6dc-4d3a-42ad-8f28-e6d5547a5007",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "f86ef6dc-4d3a-42ad-8f28-e6d5547a5007",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-367"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.postgresql.org/support/security/CVE-2024-7348/",
|
||||
"source": "f86ef6dc-4d3a-42ad-8f28-e6d5547a5007"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-7350",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-08-08T03:15:34.800",
|
||||
"lastModified": "2024-08-08T03:15:34.800",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-08T13:04:18.753",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Appointment Booking Calendar Plugin and Online Scheduling Plugin \u2013 BookingPress plugin for WordPress is vulnerable to authentication bypass in versions 1.1.6 to 1.1.7. This is due to the plugin not properly verifying a user's identity prior to logging them in when completing a booking. This makes it possible for unauthenticated attackers to log in as registered users, including administrators, if they have access to that user's email. This is only exploitable when the 'Auto login user after successful booking' setting is enabled."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento Appointment Booking Calendar Plugin and Online Scheduling Plugin \u2013 BookingPress para WordPress es vulnerable a la omisi\u00f3n de autenticaci\u00f3n en las versiones 1.1.6 a 1.1.7. Esto se debe a que el complemento no verifica adecuadamente la identidad del usuario antes de iniciar sesi\u00f3n al completar una reserva. Esto hace posible que atacantes no autenticados inicien sesi\u00f3n como usuarios registrados, incluidos administradores, si tienen acceso al correo electr\u00f3nico de ese usuario. Esto solo se puede explotar cuando la configuraci\u00f3n \"Inicio de sesi\u00f3n autom\u00e1tico de usuario despu\u00e9s de una reserva exitosa\" est\u00e1 habilitada."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-7486",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-08-08T02:15:38.577",
|
||||
"lastModified": "2024-08-08T02:15:38.577",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-08T13:04:18.753",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The MultiPurpose theme for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.2.0 via deserialization of untrusted input through the 'wpeden_post_meta' post meta. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El tema MultiPurpose para WordPress es vulnerable a la inyecci\u00f3n de objetos PHP en todas las versiones hasta la 1.2.0 incluida a trav\u00e9s de la deserializaci\u00f3n de entradas que no son de confianza a trav\u00e9s del meta de publicaci\u00f3n 'wpeden_post_meta'. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten un objeto PHP. No hay ninguna cadena POP conocida presente en el software vulnerable. Si hay una cadena POP presente a trav\u00e9s de un complemento o tema adicional instalado en el sistema de destino, podr\u00eda permitir al atacante eliminar archivos arbitrarios, recuperar datos confidenciales o ejecutar c\u00f3digo."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-7492",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-08-08T03:15:35.027",
|
||||
"lastModified": "2024-08-08T03:15:35.027",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-08T13:04:18.753",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The MainWP Child Reports plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.2. This is due to missing or incorrect nonce validation on the network_options_action() function. This makes it possible for unauthenticated attackers to update arbitrary options that can be leveraged for privilege escalation via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. This is only exploitable on multisite instances."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento MainWP Child Reports para WordPress es vulnerable a Cross-Site Request Forgery en todas las versiones hasta la 2.2 incluida. Esto se debe a una validaci\u00f3n nonce faltante o incorrecta en la funci\u00f3n network_options_action(). Esto hace posible que atacantes no autenticados actualicen opciones arbitrarias que pueden aprovecharse para escalar privilegios a trav\u00e9s de una solicitud falsificada, siempre que puedan enga\u00f1ar a un administrador del sitio para que realice una acci\u00f3n como hacer clic en un enlace. Esto s\u00f3lo es explotable en instancias multisitio."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-7548",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-08-08T06:15:42.170",
|
||||
"lastModified": "2024-08-08T06:15:42.170",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-08T13:04:18.753",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The LearnPress \u2013 WordPress LMS Plugin plugin for WordPress is vulnerable to time-based SQL Injection via the 'order' parameter in all versions up to, and including, 4.2.6.9.3 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Contributor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento LearnPress \u2013 WordPress LMS Plugin para WordPress es vulnerable a la inyecci\u00f3n SQL basada en tiempo a trav\u00e9s del par\u00e1metro 'order' en todas las versiones hasta la 4.2.6.9.3 incluida debido a un escape insuficiente en el par\u00e1metro proporcionado por el usuario y a la falta de suficiente preparaci\u00f3n de la consulta SQL existente. Esto hace posible que los atacantes autenticados, con acceso de nivel de colaborador y superior, agreguen consultas SQL adicionales a consultas ya existentes que pueden usarse para extraer informaci\u00f3n confidencial de la base de datos."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-7554",
|
||||
"sourceIdentifier": "cve@gitlab.com",
|
||||
"published": "2024-08-08T11:15:13.633",
|
||||
"lastModified": "2024-08-08T11:15:13.633",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-08T13:04:18.753",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue has been discovered in GitLab CE/EE affecting all versions starting from 13.9 before 17.0.6, all versions starting from 17.1 before 17.1.4, all versions starting from 17.2 before 17.2.2. Under certain conditions, access tokens may have been logged when an API request was made in a specific manner."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 un problema en GitLab CE/EE que afecta a todas las versiones desde 13.9 anteriores a 17.0.6, todas las versiones desde 17.1 anteriores a 17.1.4, todas las versiones desde 17.2 anteriores a 17.2.2. Bajo ciertas condiciones, es posible que se hayan registrado tokens de acceso cuando se realiz\u00f3 una solicitud de API de una manera espec\u00edfica."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-7560",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-08-08T02:15:38.797",
|
||||
"lastModified": "2024-08-08T02:15:38.797",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-08T13:04:18.753",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The News Flash theme for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.1.0 via deserialization of untrusted input from the newsflash_post_meta meta value. This makes it possible for authenticated attackers, with Editor-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El tema News Flash para WordPress es vulnerable a la inyecci\u00f3n de objetos PHP en todas las versiones hasta la 1.1.0 incluida a trav\u00e9s de la deserializaci\u00f3n de entradas no confiables del metavalor newsflash_post_meta. Esto hace posible que atacantes autenticados, con acceso a nivel de editor y superior, inyecten un objeto PHP. No hay ninguna cadena POP conocida presente en el software vulnerable. Si hay una cadena POP presente a trav\u00e9s de un complemento o tema adicional instalado en el sistema de destino, podr\u00eda permitir al atacante eliminar archivos arbitrarios, recuperar datos confidenciales o ejecutar c\u00f3digo."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-7561",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-08-08T02:15:39.017",
|
||||
"lastModified": "2024-08-08T02:15:39.017",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-08T13:04:18.753",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The The Next theme for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.1.0 via deserialization of untrusted input from the wpeden_post_meta post meta value. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El tema The Next para WordPress es vulnerable a la inyecci\u00f3n de objetos PHP en todas las versiones hasta la 1.1.0 incluida a trav\u00e9s de la deserializaci\u00f3n de entradas no confiables del metavalor de la publicaci\u00f3n wpeden_post_meta. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten un objeto PHP. No hay ninguna cadena POP conocida presente en el software vulnerable. Si hay una cadena POP presente a trav\u00e9s de un complemento o tema adicional instalado en el sistema de destino, podr\u00eda permitir al atacante eliminar archivos arbitrarios, recuperar datos confidenciales o ejecutar c\u00f3digo."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-7610",
|
||||
"sourceIdentifier": "cve@gitlab.com",
|
||||
"published": "2024-08-08T11:15:13.857",
|
||||
"lastModified": "2024-08-08T11:15:13.857",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-08-08T13:04:18.753",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A Denial of Service (DoS) condition has been discovered in GitLab CE/EE affecting all versions starting with 15.9 before 17.0.6, 17.1 prior to 17.1.4, and 17.2 prior to 17.2.2. It is possible for an attacker to cause catastrophic backtracking while parsing results from Elasticsearch."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 una condici\u00f3n de denegaci\u00f3n de servicio (DoS) en GitLab CE/EE que afecta a todas las versiones comenzando con 15.9 anterior a 17.0.6, 17.1 anterior a 17.1.4 y 17.2 anterior a 17.2.2. Es posible que un atacante provoque un retroceso catastr\u00f3fico mientras analiza los resultados de Elasticsearch."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
59
README.md
59
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-08-08T12:00:16.726716+00:00
|
||||
2024-08-08T14:00:17.615016+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-08-08T11:59:02.483000+00:00
|
||||
2024-08-08T13:58:47.040000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,41 +33,46 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
259351
|
||||
259353
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `17`
|
||||
Recently added CVEs: `2`
|
||||
|
||||
- [CVE-2024-2800](CVE-2024/CVE-2024-28xx/CVE-2024-2800.json) (`2024-08-08T11:15:12.210`)
|
||||
- [CVE-2024-3035](CVE-2024/CVE-2024-30xx/CVE-2024-3035.json) (`2024-08-08T11:15:12.503`)
|
||||
- [CVE-2024-3114](CVE-2024/CVE-2024-31xx/CVE-2024-3114.json) (`2024-08-08T11:15:12.733`)
|
||||
- [CVE-2024-3958](CVE-2024/CVE-2024-39xx/CVE-2024-3958.json) (`2024-08-08T11:15:12.967`)
|
||||
- [CVE-2024-42033](CVE-2024/CVE-2024-420xx/CVE-2024-42033.json) (`2024-08-08T10:15:06.813`)
|
||||
- [CVE-2024-42034](CVE-2024/CVE-2024-420xx/CVE-2024-42034.json) (`2024-08-08T10:15:07.223`)
|
||||
- [CVE-2024-42035](CVE-2024/CVE-2024-420xx/CVE-2024-42035.json) (`2024-08-08T10:15:07.637`)
|
||||
- [CVE-2024-42036](CVE-2024/CVE-2024-420xx/CVE-2024-42036.json) (`2024-08-08T10:15:07.967`)
|
||||
- [CVE-2024-42037](CVE-2024/CVE-2024-420xx/CVE-2024-42037.json) (`2024-08-08T10:15:08.323`)
|
||||
- [CVE-2024-42038](CVE-2024/CVE-2024-420xx/CVE-2024-42038.json) (`2024-08-08T10:15:08.700`)
|
||||
- [CVE-2024-4207](CVE-2024/CVE-2024-42xx/CVE-2024-4207.json) (`2024-08-08T11:15:13.183`)
|
||||
- [CVE-2024-4210](CVE-2024/CVE-2024-42xx/CVE-2024-4210.json) (`2024-08-08T10:15:09.040`)
|
||||
- [CVE-2024-4784](CVE-2024/CVE-2024-47xx/CVE-2024-4784.json) (`2024-08-08T10:15:09.390`)
|
||||
- [CVE-2024-5423](CVE-2024/CVE-2024-54xx/CVE-2024-5423.json) (`2024-08-08T11:15:13.410`)
|
||||
- [CVE-2024-6329](CVE-2024/CVE-2024-63xx/CVE-2024-6329.json) (`2024-08-08T10:15:09.857`)
|
||||
- [CVE-2024-7554](CVE-2024/CVE-2024-75xx/CVE-2024-7554.json) (`2024-08-08T11:15:13.633`)
|
||||
- [CVE-2024-7610](CVE-2024/CVE-2024-76xx/CVE-2024-7610.json) (`2024-08-08T11:15:13.857`)
|
||||
- [CVE-2024-3659](CVE-2024/CVE-2024-36xx/CVE-2024-3659.json) (`2024-08-08T13:15:13.823`)
|
||||
- [CVE-2024-7348](CVE-2024/CVE-2024-73xx/CVE-2024-7348.json) (`2024-08-08T13:15:14.007`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `5`
|
||||
Recently modified CVEs: `75`
|
||||
|
||||
- [CVE-2024-21302](CVE-2024/CVE-2024-213xx/CVE-2024-21302.json) (`2024-08-08T10:15:06.203`)
|
||||
- [CVE-2024-38166](CVE-2024/CVE-2024-381xx/CVE-2024-38166.json) (`2024-08-08T10:15:06.427`)
|
||||
- [CVE-2024-38202](CVE-2024/CVE-2024-382xx/CVE-2024-38202.json) (`2024-08-08T10:15:06.550`)
|
||||
- [CVE-2024-38206](CVE-2024/CVE-2024-382xx/CVE-2024-38206.json) (`2024-08-08T10:15:06.697`)
|
||||
- [CVE-2024-7160](CVE-2024/CVE-2024-71xx/CVE-2024-7160.json) (`2024-08-08T11:59:02.483`)
|
||||
- [CVE-2024-6893](CVE-2024/CVE-2024-68xx/CVE-2024-6893.json) (`2024-08-08T13:04:18.753`)
|
||||
- [CVE-2024-6987](CVE-2024/CVE-2024-69xx/CVE-2024-6987.json) (`2024-08-08T13:04:18.753`)
|
||||
- [CVE-2024-7150](CVE-2024/CVE-2024-71xx/CVE-2024-7150.json) (`2024-08-08T13:04:18.753`)
|
||||
- [CVE-2024-7154](CVE-2024/CVE-2024-71xx/CVE-2024-7154.json) (`2024-08-08T12:38:38.570`)
|
||||
- [CVE-2024-7155](CVE-2024/CVE-2024-71xx/CVE-2024-7155.json) (`2024-08-08T12:34:01.330`)
|
||||
- [CVE-2024-7156](CVE-2024/CVE-2024-71xx/CVE-2024-7156.json) (`2024-08-08T12:20:39.150`)
|
||||
- [CVE-2024-7157](CVE-2024/CVE-2024-71xx/CVE-2024-7157.json) (`2024-08-08T12:17:46.953`)
|
||||
- [CVE-2024-7158](CVE-2024/CVE-2024-71xx/CVE-2024-7158.json) (`2024-08-08T12:17:08.037`)
|
||||
- [CVE-2024-7159](CVE-2024/CVE-2024-71xx/CVE-2024-7159.json) (`2024-08-08T12:15:56.080`)
|
||||
- [CVE-2024-7170](CVE-2024/CVE-2024-71xx/CVE-2024-7170.json) (`2024-08-08T12:46:18.550`)
|
||||
- [CVE-2024-7171](CVE-2024/CVE-2024-71xx/CVE-2024-7171.json) (`2024-08-08T12:39:09.323`)
|
||||
- [CVE-2024-7279](CVE-2024/CVE-2024-72xx/CVE-2024-7279.json) (`2024-08-08T13:57:09.313`)
|
||||
- [CVE-2024-7280](CVE-2024/CVE-2024-72xx/CVE-2024-7280.json) (`2024-08-08T13:56:04.987`)
|
||||
- [CVE-2024-7281](CVE-2024/CVE-2024-72xx/CVE-2024-7281.json) (`2024-08-08T13:55:33.463`)
|
||||
- [CVE-2024-7282](CVE-2024/CVE-2024-72xx/CVE-2024-7282.json) (`2024-08-08T13:54:32.003`)
|
||||
- [CVE-2024-7283](CVE-2024/CVE-2024-72xx/CVE-2024-7283.json) (`2024-08-08T13:52:03.277`)
|
||||
- [CVE-2024-7284](CVE-2024/CVE-2024-72xx/CVE-2024-7284.json) (`2024-08-08T13:49:32.727`)
|
||||
- [CVE-2024-7350](CVE-2024/CVE-2024-73xx/CVE-2024-7350.json) (`2024-08-08T13:04:18.753`)
|
||||
- [CVE-2024-7486](CVE-2024/CVE-2024-74xx/CVE-2024-7486.json) (`2024-08-08T13:04:18.753`)
|
||||
- [CVE-2024-7492](CVE-2024/CVE-2024-74xx/CVE-2024-7492.json) (`2024-08-08T13:04:18.753`)
|
||||
- [CVE-2024-7548](CVE-2024/CVE-2024-75xx/CVE-2024-7548.json) (`2024-08-08T13:04:18.753`)
|
||||
- [CVE-2024-7554](CVE-2024/CVE-2024-75xx/CVE-2024-7554.json) (`2024-08-08T13:04:18.753`)
|
||||
- [CVE-2024-7560](CVE-2024/CVE-2024-75xx/CVE-2024-7560.json) (`2024-08-08T13:04:18.753`)
|
||||
- [CVE-2024-7561](CVE-2024/CVE-2024-75xx/CVE-2024-7561.json) (`2024-08-08T13:04:18.753`)
|
||||
- [CVE-2024-7610](CVE-2024/CVE-2024-76xx/CVE-2024-7610.json) (`2024-08-08T13:04:18.753`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
158
_state.csv
158
_state.csv
@ -208254,7 +208254,7 @@ CVE-2022-42979,0,0,a341ae8cb8358006fa5b6ea453b9fbc6994cf58db511056b6e86ceb786e26
|
||||
CVE-2022-4298,0,0,0e4354cd13b331473f7420cb6bde4747d46c386a1fc5c06b776042a9d08b9728,2023-11-07T03:57:28.077000
|
||||
CVE-2022-42980,0,0,ecd3a3323b54796d26bf171a9bb28f377774dedd9a3fdb981b703eb18c54ce95,2022-10-20T14:40:09.223000
|
||||
CVE-2022-42982,0,0,0a1b65f038053f572b1866bd293c70ceada940a5cbbcf31eb0167d7a5c12b360,2022-11-21T19:41:39.717000
|
||||
CVE-2022-42983,0,0,95139778a8aac8ea546c850b0072bd79bfd457743b4dcad69a3f58a5959f42de,2022-10-20T14:38:47.777000
|
||||
CVE-2022-42983,0,1,09ab46c7c42021d6f406e0dda287e886be78e2e1753279104966dafffa1c3a0d,2024-08-08T12:05:04.450000
|
||||
CVE-2022-42984,0,0,701a476158a86299daa065ec15f7478b8c7d0e6c311fa0c90adeb5635bf80c4c,2022-11-17T04:51:42.140000
|
||||
CVE-2022-42985,0,0,918a67c01e7af41b37e917c6e357222949a6fabdecb0ff63040565a8f3ee680a,2022-11-17T22:26:44.417000
|
||||
CVE-2022-42986,0,0,e8c3c30f82ae751725e0f1a4959865d5d7d4f14ba6546aa469c2aaa927cbcaf7,2023-11-07T03:53:42.750000
|
||||
@ -211042,7 +211042,7 @@ CVE-2022-46966,0,0,e68da19fdccc93c97706b064420d206374084e04c937d12ed5ab06a46a3c4
|
||||
CVE-2022-46967,0,0,9572805631f610a74c883b0693db943523725dabcbabfa968253ab234c05852f,2023-02-03T14:17:09.377000
|
||||
CVE-2022-46968,0,0,1a945de866bfd00108efe2c436bcebdda0e2da771cca9890173917e557fc5489,2023-02-06T15:15:02.717000
|
||||
CVE-2022-4697,0,0,a66e0076ef73cd748b7c128873e5a3e534d56c18268c236c95fbed3885d36558,2023-11-07T03:58:36.550000
|
||||
CVE-2022-46973,0,0,d3937c5c8dcfd192610c9b042c05a114ef5315c2fcd63777e41d7b170cbd4861,2023-03-10T14:22:22.767000
|
||||
CVE-2022-46973,0,1,810a6d6a0568b019ba85a1c532c6e2822355c49eb9280a26dd1904a49f1e40e0,2024-08-08T12:05:04.450000
|
||||
CVE-2022-4698,0,0,f5529e0ed81ef536a04530cdd36988f7886fa5c049e30ddc13f8b55d348e3914,2023-11-07T03:58:36.790000
|
||||
CVE-2022-4699,0,0,5140be803800286837d95278ddd796c0023b375ea26312058b085b6f87033cb4,2023-11-07T03:58:37.027000
|
||||
CVE-2022-46996,0,0,d2087b26e1c8dc282700c4b10eb1eca00afd5dd7520d25f35aa12ac06c0ca9ca,2022-12-16T18:46:14.857000
|
||||
@ -240876,7 +240876,7 @@ CVE-2023-7258,0,0,743a17302c5d0deefce3c9c18515bc1a780c1d3e967dd943e69bc9c091c417
|
||||
CVE-2023-7259,0,0,4927c73cd38943cc915f51b0766c09a76100affe33b1049612344f19331c1f96,2024-08-02T09:15:55.730000
|
||||
CVE-2023-7261,0,0,44080cc2bc0d6a25d80bc7855327b03309b2d9def17d97f1c55e50122c67ac97,2024-07-03T01:44:30.563000
|
||||
CVE-2023-7264,0,0,51dd8b83703649c91504628a1d95022ef41c77d28d8363a527e775cafaba1511,2024-06-11T13:54:12.057000
|
||||
CVE-2023-7265,0,0,890ec57e66f396f1f0bed86289111ee4178d84475c1ba3c564d24c4cac68b141,2024-08-08T08:15:04.740000
|
||||
CVE-2023-7265,0,1,f2f550eec8eb52e2d7c6d4751c88c82f6bbba78e56c41a54eac7449c27df676c,2024-08-08T13:04:18.753000
|
||||
CVE-2023-7268,0,0,cddf00fb75fb363308068c92d4a58df3d516324074a1a2ced29fd3b08d0ccedc,2024-08-01T13:45:52.747000
|
||||
CVE-2023-7269,0,0,110b6fee8b2eb3cb456f239293a3205ab38d8cdb9856a830f8977329472aa48f,2024-08-01T13:45:52.937000
|
||||
CVE-2023-7270,0,0,c4a95bbd7a0e223852dd2f2d2c06a04667d14324aaf73c1dbbc09c6df6d4237c,2024-08-01T13:45:53.123000
|
||||
@ -243493,7 +243493,7 @@ CVE-2024-2127,0,0,fee555ba22c69f33931ace66815b77d0a5796e2ad55c5d25b843a412734e73
|
||||
CVE-2024-2128,0,0,ad241575873847a0cb8491370112d4603dbee504ed1e31d448d346ee3b31a6d6,2024-03-08T14:02:57.420000
|
||||
CVE-2024-2129,0,0,4e7afd99b608981f119f3e5da184ba51484f21aa33b32d2a6446850d6a9f1652,2024-03-20T13:00:16.367000
|
||||
CVE-2024-2130,0,0,949f4490e30f20ac86b94271cd74ebfff8857dc5306a19f843591857ffe5e5d6,2024-03-13T12:33:51.697000
|
||||
CVE-2024-21302,0,1,9052b1631dc308c3997a1797724332da21e9257136934a08d7b00079fdb14102,2024-08-08T10:15:06.203000
|
||||
CVE-2024-21302,0,1,7f6be6351d47c6a64561e28034d49c773122587883b9b42530ed13522aa84047,2024-08-08T13:04:18.753000
|
||||
CVE-2024-21303,0,0,d58ef53ce2250cc88ff41c4958354d161d0e089fca6702a30570cf750b5a8215,2024-07-09T18:18:38.713000
|
||||
CVE-2024-21304,0,0,aee35375e056bcda8357796076fddae312bf87811aac2cea1256e28fc4176e51,2024-06-11T15:15:58.253000
|
||||
CVE-2024-21305,0,0,53ae725a4db9001e5894d4654d0d4d95d10acc8936d902ba245a4100e59e1d3e,2024-06-11T15:15:58.433000
|
||||
@ -244060,7 +244060,7 @@ CVE-2024-22060,0,0,c7ff273a679d964f52a0555cc6f7fed8e0bf8a1a9d58b589cfa2ca0ee90c6
|
||||
CVE-2024-22061,0,0,a2f8b1edabd606da9b855ff3e3612ece1cc2a51d553a7dadaf2301f49cdc94da,2024-07-03T01:47:02.763000
|
||||
CVE-2024-22062,0,0,cc06929fe5df33d033a09c6d5b184881dcbf0939fe62637d4555c345e1a11ac3,2024-07-09T18:19:14.047000
|
||||
CVE-2024-22064,0,0,4ab6f1fd7aac8f5f705eb95fc6fb847518aebb95babd98d77adf15137fe26c27,2024-05-14T16:13:02.773000
|
||||
CVE-2024-22069,0,0,4f7edb7ea6d8912dcefd9b24095c287add73b63c843ed25146ac0c322f48366b,2024-08-08T08:15:05.123000
|
||||
CVE-2024-22069,0,1,8736d3376ede1cdd91f0d1f324b2a4a6d69da2d548a6d3cef750a255a951f6db,2024-08-08T13:04:18.753000
|
||||
CVE-2024-22074,0,0,a1a776748154594eabd5bedbe0254430e590ea44ffb88bfb446bfd71a59f69e3,2024-06-07T14:56:05.647000
|
||||
CVE-2024-22075,0,0,a5af4a36684a159511579f89d3ce85206e57c3558ab3a4b37d02f2a846a5e5f1,2024-01-10T15:06:42.563000
|
||||
CVE-2024-22076,0,0,ad579321d212e2fb374b8124959febe687d1d1197907430ed2ba5046da4cb421,2024-02-22T02:15:49.207000
|
||||
@ -248202,7 +248202,7 @@ CVE-2024-27996,0,0,5aaae661a6fb92b939550d770c3ab033edc85310e1d2be696c3be929f4996
|
||||
CVE-2024-27997,0,0,38211b675f4409064c6233281099da5f5fa00ff059690325dad2c59b915c01fd,2024-03-20T13:00:16.367000
|
||||
CVE-2024-27998,0,0,4b6f230fe964647fb680f6367b279bba522ac93005c2e8f6d523205374f3e144,2024-03-20T13:00:16.367000
|
||||
CVE-2024-27999,0,0,eb71f5e78ce23e710caf587ffd7cde1246a6fc9b58a11c7b1c6cbe38842e0f52,2024-03-28T12:42:56.150000
|
||||
CVE-2024-2800,1,1,0acf6b56c9395a561dcf6a077e02644bc065648cc9996514087e41c77fbb718e,2024-08-08T11:15:12.210000
|
||||
CVE-2024-2800,0,1,74596529ca280c923328b734bd86866fc7dbc2558ef74b7cae183f2eae3e1b3f,2024-08-08T13:04:18.753000
|
||||
CVE-2024-28001,0,0,769e60058cb29be891e3bd26013be397b6ae5a2c1de4b96ae3237e85af5cdd26,2024-03-28T12:42:56.150000
|
||||
CVE-2024-28002,0,0,979c468740a66c74eeb1c5784ee90077b381a78255d231d99fff807000c5cb6b,2024-03-28T12:42:56.150000
|
||||
CVE-2024-28003,0,0,bcd81510a407f30bd1be1a23c4e2407dda3d4099189594d6f9ca0831debc8ffd,2024-03-28T12:42:56.150000
|
||||
@ -249762,7 +249762,7 @@ CVE-2024-30346,0,0,5b5a05e58b1d0147ecf944d685aa2cb684c437094256980b72baf598e0e39
|
||||
CVE-2024-30347,0,0,3832109021fb5377af15708c62232a57c5d24e9d2ff3a0f47b969600fc56c7e2,2024-04-03T12:38:04.840000
|
||||
CVE-2024-30348,0,0,b7419de89d8ae654b53594301d010d5fddf20c53591f31b58044cfc4d2546f37,2024-04-03T12:38:04.840000
|
||||
CVE-2024-30349,0,0,25aa9323693beb08b7ab8bd5f7a119ec8b674d7e4855843e08ed1d40130ed8a9,2024-04-03T12:38:04.840000
|
||||
CVE-2024-3035,1,1,9f952d7a1eb9c5ddc56eb45b6b9cf43a4f7e39e00c5088af8aa50ab213f7e90f,2024-08-08T11:15:12.503000
|
||||
CVE-2024-3035,0,1,1eb71686f7d169d2f070e3b826cb80e794b941d16a1a29f646e66e13567128fd,2024-08-08T13:04:18.753000
|
||||
CVE-2024-30350,0,0,8e1b9e28a9318580e1c2a60beb33a603136695646ec8eec64233a58463351c70,2024-04-03T12:38:04.840000
|
||||
CVE-2024-30351,0,0,ecc0a626d0b84c1ea6187fb97e8580125e971055c09fe20b6f73f3ab539147d2,2024-04-03T12:38:04.840000
|
||||
CVE-2024-30352,0,0,5f84adb833e26addccbf839c02a46013d238d5f13fa74ae57d6b24ed1b254339,2024-04-03T12:38:04.840000
|
||||
@ -250295,7 +250295,7 @@ CVE-2024-31136,0,0,fc3cbe768e48d4625e33825c87e8160fa75cbd797dbb2249521e321016035
|
||||
CVE-2024-31137,0,0,24dca0985c04b079d91e4a71b8f459f589e7387b6e8baa6268bf1899b5ce24d9,2024-04-08T22:41:02.117000
|
||||
CVE-2024-31138,0,0,e862c1086da58a416fbb8daccc103d417726a0d0d62aa3907b1f09b19f01be5e,2024-04-08T22:41:43.087000
|
||||
CVE-2024-31139,0,0,1f981793bc0ffd1f30ec0eaae2f049959f8e2058241da40737858920eb14a44c,2024-03-28T16:07:30.893000
|
||||
CVE-2024-3114,1,1,fc62a3b70ff34887d133e1073ef72a41c208bac035cce96bc556ed442c446244,2024-08-08T11:15:12.733000
|
||||
CVE-2024-3114,0,1,28e81e315d786a9cdf65dd8197fff4b783e384b8bebbc1c25a3f01ac8969fa0a,2024-08-08T13:04:18.753000
|
||||
CVE-2024-31140,0,0,1880c35ac5ba5af45eb21413401eeeaab09be8abf223654f6041d65ff3324893,2024-03-28T16:07:30.893000
|
||||
CVE-2024-31142,0,0,16502fe8420294098dded506476ced118645fadee97cfcf27213cce5ae7650bd,2024-05-16T15:44:44.683000
|
||||
CVE-2024-31143,0,0,eabf4443a972046b843b5c51a5a64a52c1ff6d2355a7d22418dbd22e53cf86f5,2024-07-19T13:01:44.567000
|
||||
@ -250963,7 +250963,7 @@ CVE-2024-32109,0,0,08894c4e3a57f86b6284b26a282c6968448945ec563ccb9866a89bb950091
|
||||
CVE-2024-3211,0,0,cd4ac0d8519912a13a0d0c08b18443c6072dad701720ee4a4ed76f2f811381f8,2024-04-12T12:43:46.210000
|
||||
CVE-2024-32111,0,0,36d25ebb6a4d3cdecc46a227566c18afac6c12223eb1db73c0460a8cc71431b6,2024-06-25T18:50:42.040000
|
||||
CVE-2024-32112,0,0,f9404c5b848522fc2ea82100e298d27e46d5e23ef3e92373a4c86a5207d51496,2024-04-11T12:47:44.137000
|
||||
CVE-2024-32113,0,0,55765dc25a8cf13c7063df53a471cd0e6aed1392ea3fb3f2a5df04fe5f4dfc8c,2024-08-08T01:00:01.727000
|
||||
CVE-2024-32113,0,1,033af325abbe7cbcad6e1b8efeddc40601a2c3b9d5dcb5001318869b3b455a0d,2024-08-08T13:38:57.533000
|
||||
CVE-2024-32114,0,0,0a1004ba7b41008e227d6b2bdcd73bdfb692f643fe06a5069723fec32f720edf,2024-05-02T13:27:25.103000
|
||||
CVE-2024-32125,0,0,a446a01590e1b118a7d25d957642229fd41ce3f6d80dd7a23c882dbf2c72c5ed,2024-04-15T13:15:31.997000
|
||||
CVE-2024-32126,0,0,16f5b1c04f8ae363897666f54d65b10d9319b0b987a3dd5aab35faf530ed8b78,2024-04-18T13:04:28.900000
|
||||
@ -253986,6 +253986,7 @@ CVE-2024-36586,0,0,4099f0afde3003a22e36cee4a4d1bf00ae6ce9b2ce9c60b9b6a1b88a3ec1a
|
||||
CVE-2024-36587,0,0,bf71d7e5e004f256f035927236d4ac896369318476be83b9c18caf685fe047c0,2024-08-01T13:53:10.050000
|
||||
CVE-2024-36588,0,0,c219e8a7875d89e66958dab0789f7691c4be3c0c05f3a68bfc6f3a9b60c1ba97,2024-06-17T12:43:31.090000
|
||||
CVE-2024-36589,0,0,7d8241af3cf4fd123efae48d04ebf204edc6e9689a6c5e93ab29d83bac6ea2c1,2024-06-17T12:43:31.090000
|
||||
CVE-2024-3659,1,1,1d34bf7355b013422952bf67c386f54e14c9b4604c4a867162c8c281b327570e,2024-08-08T13:15:13.823000
|
||||
CVE-2024-36597,0,0,98c2dc3423defc3b8028c6c9b71ffc307577eb360e61d0feea8867a8ccf6c346,2024-06-17T12:42:04.623000
|
||||
CVE-2024-36598,0,0,00d0a8090fa16fe89aa3866d79b98c53443431993afed273e14298b9e0b2a6a8,2024-07-03T02:03:23.817000
|
||||
CVE-2024-36599,0,0,2b2bc07f90b37a08fed3176237d4d673945409fdbbe06bfa5eecf36828a7ec56,2024-08-01T20:31:01.340000
|
||||
@ -254921,15 +254922,15 @@ CVE-2024-3815,0,0,55e2d42c0e61accee69ffa342efcde0fddef3a4ea430c0440620925be3cd14
|
||||
CVE-2024-38156,0,0,b24436c85d01ced9aa10bffdcc3048064061e2106e9f06caaac14532dc6e9f6d,2024-07-19T13:01:44.567000
|
||||
CVE-2024-3816,0,0,75ffa648a8fdfd5e75d27a5c1f7d2535fe4ef8b6da1bbd82db22ae48c443785a,2024-08-01T13:56:42.403000
|
||||
CVE-2024-38164,0,0,61f090a580db18da87c17a5aaaecf0d4c74a1627bb07a737232d22421913c30c,2024-08-02T04:17:24.557000
|
||||
CVE-2024-38166,0,1,586e4ce0bd2bea9e2f091122623e7474c7b6ecb28400edb449a9b39d548d353e,2024-08-08T10:15:06.427000
|
||||
CVE-2024-38166,0,0,586e4ce0bd2bea9e2f091122623e7474c7b6ecb28400edb449a9b39d548d353e,2024-08-08T10:15:06.427000
|
||||
CVE-2024-3817,0,0,4cefb34eb15d4ef81a2470a00ac0f43601ef6263c0fd4425e7542c27d02dfa54,2024-04-18T13:04:28.900000
|
||||
CVE-2024-38176,0,0,9b2b21b2ffaaf0c79ea2462db71750a351bbe8e9b4ac053f46219745b5043ccf,2024-08-02T04:17:24.717000
|
||||
CVE-2024-3818,0,0,b4c982a18364880791124fa7ba25840b7eb37a53aa1551fa23324d948b6ddd3f,2024-04-19T13:10:25.637000
|
||||
CVE-2024-38182,0,0,b4d26c4f4cbe1c2272cffdb42dee316497d9ebef820b6332d9e510a850c3591f,2024-08-02T04:17:24.853000
|
||||
CVE-2024-3819,0,0,c25bdc543ba06fd05ac51b0b8912467c3fc6d8848be54d697bfdb5995b1a7e51,2024-05-02T18:00:37.360000
|
||||
CVE-2024-3820,0,0,8985e7d1e7aecc5fe081b43705d723ec0ca067093ca4a65f30dd280cab84082f,2024-06-03T14:46:24.250000
|
||||
CVE-2024-38202,0,1,496cc8bcfe99d8b2671ddc698861000b905c5cce56449cb45f4241246c68dbca,2024-08-08T10:15:06.550000
|
||||
CVE-2024-38206,0,1,dd175e037cab9dc4093e3378ea7bcc26247bba568e32cb7ce786ec2d3fcb8f36,2024-08-08T10:15:06.697000
|
||||
CVE-2024-38202,0,1,5f1ef47a3badff97031fb210a5df27c56cf4132700b07b21ac067d757e50d1a2,2024-08-08T13:04:18.753000
|
||||
CVE-2024-38206,0,0,dd175e037cab9dc4093e3378ea7bcc26247bba568e32cb7ce786ec2d3fcb8f36,2024-08-08T10:15:06.697000
|
||||
CVE-2024-3821,0,0,3ffbadbdaf34f564e9c498f1baa8fe758531e73989a1bbb861692bcbfdfc262c,2024-06-03T14:46:24.250000
|
||||
CVE-2024-3822,0,0,51b0f82a9028abb2f3a6ab312236a4c8392000a211092257ada320c541b18cc9,2024-05-15T16:40:19.330000
|
||||
CVE-2024-3823,0,0,53ae63b27eb43a6740a92f1ff13f05ddd2a8941167fdfb2924cdfa6b561369e6,2024-05-15T16:40:19.330000
|
||||
@ -255378,7 +255379,7 @@ CVE-2024-3897,0,0,5a8068a855e86bb89a1451de196d4bad1fbc355f1787f3259631c60aae1e07
|
||||
CVE-2024-38970,0,0,eb04e06c9fbc74e88c4fcf5d6eeffbd442cec39d7eaf1361f68ecba935eabe9c,2024-07-12T14:51:48.070000
|
||||
CVE-2024-38971,0,0,46979c6cce7787051e40b62dba0207d3f5f20f29a3ce299a21265249d3eebf4c,2024-07-12T14:50:45.817000
|
||||
CVE-2024-38972,0,0,266b969944e47c34c5065969d4aa9af417e70cd96f058167cecf53341667f408,2024-07-11T15:06:04.187000
|
||||
CVE-2024-38983,0,0,a5442b1984e0d0de26c8eca3180d57b550588c3c5f3a863ee99288d39dd8ef1b,2024-08-01T13:55:11.147000
|
||||
CVE-2024-38983,0,1,b4007717ba4ecdcb9f705c2dcea6a2ebbf6e393e28ab95db12566748e89540ae,2024-08-08T13:58:47.040000
|
||||
CVE-2024-38984,0,0,7bcc8b86e146f67837a8ed887841cfa296e4ad0addf7783bc6340007d6dd2381,2024-08-01T13:55:12.530000
|
||||
CVE-2024-38986,0,0,7fc0e0968bd6d64c26cb3a9fe1b3810c84d7529fc5008249a7c3069e057d06f0,2024-08-01T13:55:13.857000
|
||||
CVE-2024-38987,0,0,0c71f898711274c7ac1489fe714f2d31dbe2fc7f130139d062fe917d9ea47c74,2024-07-11T15:06:05.027000
|
||||
@ -255683,7 +255684,7 @@ CVE-2024-3957,0,0,6be73190d0db646071e408d26fd6054938440e63fb695d16249857bd780649
|
||||
CVE-2024-39570,0,0,477f2cc2b899254fd1996622a7d04056a7ae423def8bf935cbc64caf51d26e12,2024-07-09T18:19:14.047000
|
||||
CVE-2024-39571,0,0,5f5a00a374a36754f81b606fe5b7617af673280667e3ded939b747c7e23ff34f,2024-07-09T18:19:14.047000
|
||||
CVE-2024-39573,0,0,66fc7feceb0e35a8b2e536fb0fe145ff47c70fa679791c05a2dafe67c9ad9e6e,2024-07-12T14:15:16.400000
|
||||
CVE-2024-3958,1,1,b96b699b59e7932d6bd12a899daace96e5a433127b7ddbae4827d9eef989af8b,2024-08-08T11:15:12.967000
|
||||
CVE-2024-3958,0,1,6a863b448c805f7bc2ecb55496071d989e4d5758f7f91c3bce9d94ca75a26261,2024-08-08T13:04:18.753000
|
||||
CVE-2024-3959,0,0,1ce1302f5c536ae0ba1596a30e53c3274b88d91eb780326b1103788329e8cf86,2024-06-28T13:21:52.223000
|
||||
CVE-2024-39592,0,0,092a544949de7319ae89291bc739a96163c6c0d37a46e6cc9f12df6e56b452d2,2024-07-09T18:19:14.047000
|
||||
CVE-2024-39593,0,0,51f4661ccbaba7452aac7223f24d0b1eb585ba800f6962a627249fa8658c86e6,2024-07-09T18:19:14.047000
|
||||
@ -256443,8 +256444,8 @@ CVE-2024-4121,0,0,62ca255cdda2e26a7a0224389681466727634cf0831afab2f14e58a1cb5bd9
|
||||
CVE-2024-4122,0,0,3d81c7d42348f56045cc538515e4a2e136e243adec928773370fb697e11bd281,2024-06-04T19:20:30.560000
|
||||
CVE-2024-41226,0,0,6ac606c534a1a3e96605c70bf25a1ba8496294ecd8aacdd4b27089458c8c2495,2024-08-06T16:30:24.547000
|
||||
CVE-2024-4123,0,0,b9879b7d0937c162f61c7aeebe9319c3ee0d2290b23cb569d74c82da57c569d5,2024-06-04T19:20:30.660000
|
||||
CVE-2024-41237,0,0,bac7c81fa19fc121080c3bbb5cda6ada878710dee6a0b910fcbf40987430cfcd,2024-08-07T19:15:48.033000
|
||||
CVE-2024-41239,0,0,47c65b94aab221f330e1609dcd75c347ed59b7465fa15a9578fded0c414c3639,2024-08-07T19:35:07.057000
|
||||
CVE-2024-41237,0,1,341cbe1b5af6ffff81b3fd90638af3087cd0e9b741250d0c46d50747e72dc452,2024-08-08T13:04:18.753000
|
||||
CVE-2024-41239,0,1,adf670735c7ceebbef13764d2688de43ef7a5c56a813a8d8300861cc79bf2917,2024-08-08T13:04:18.753000
|
||||
CVE-2024-4124,0,0,a8707e0967c681f9085483c77f4dbcbac39e7eb8e57f061d5b5c7f920dc545dd,2024-06-04T19:20:30.760000
|
||||
CVE-2024-41240,0,0,288df0d36c20fd0657eae76cdc2df4c49c2d8f13255fa6ca065020f7cee26106,2024-08-07T21:35:06.560000
|
||||
CVE-2024-41241,0,0,005ea512fa30eb38ff43e1ecd39d28abe28962fb66c33ef0639c83b5bad47451,2024-08-07T19:09:46.290000
|
||||
@ -256660,7 +256661,7 @@ CVE-2024-41889,0,0,afc718e09b38fea98bf4af598c03af33eb38888a59959d88ad94aa8810cd5
|
||||
CVE-2024-4190,0,0,937461468fcd73b26e47070e7d0620ac3009210ef2f47e2156f0b87dd1c21bc4,2024-06-13T18:36:09.013000
|
||||
CVE-2024-41910,0,0,e2cd81d24447e4d89c8ac09bae9292e65e7f5ac19eb040a94f73395e4ca32d36,2024-08-06T16:30:24.547000
|
||||
CVE-2024-41911,0,0,ea799ed6f6f9ce65028cdbe045f892be03084ec1245d47535ccbe7b5bf6048c3,2024-08-06T16:30:24.547000
|
||||
CVE-2024-41912,0,0,fa5ba93e052f7b92456e3c4757fc990c10dcb7428f9a2b7476acd63130ab67de,2024-08-07T20:15:50.877000
|
||||
CVE-2024-41912,0,1,1adae7c062cc193d9cda59c9b448e43f505db490975548e118eb851dae368d94,2024-08-08T13:04:18.753000
|
||||
CVE-2024-41913,0,0,c5a05750f27b10355d3f766241d60c814ca86a61249995cbd8064da18910e8f7,2024-08-06T16:30:24.547000
|
||||
CVE-2024-41914,0,0,cbc550b915270d7e2f2879c2f4d0216e7f6bd6d1cd3a3c180c2f13327702487c,2024-08-01T13:59:14.250000
|
||||
CVE-2024-41915,0,0,79e27d81a466e27de33128fccf775ada519c090b73b4d198c18c4a0be866e968,2024-08-01T13:59:14.947000
|
||||
@ -256710,15 +256711,15 @@ CVE-2024-42010,0,0,473a8e996e0306946759862f1a62bb818641d9cba2a711ec27286414dbf29
|
||||
CVE-2024-4202,0,0,614a40ef1052d861451b397b9533024f5e9aecccff7f20e945fab06926a9f188,2024-05-15T18:35:11.453000
|
||||
CVE-2024-42029,0,0,b7c83a25bc8a9601f6f3c6ebb603ce94146556b10d1f548176b0b38619ce3b21,2024-08-01T13:59:17.407000
|
||||
CVE-2024-4203,0,0,52cf8a9be62388459acdc9c8c655685172127a00eca72ac9344c4d8920cfc78f,2024-05-02T18:00:37.360000
|
||||
CVE-2024-42030,0,0,94561bb1e2517c067b66e210c682348f762e843f787852b7fea3b0f67eb53df6,2024-08-08T09:15:07.290000
|
||||
CVE-2024-42031,0,0,83ac20bdb3df5735abb4ce0f3bd6f26a076409b38c49e9880daeb73e705cbb3e,2024-08-08T09:15:07.630000
|
||||
CVE-2024-42032,0,0,1a707656fc40446e74fde41df0e411d232fbfc64b011b0c0dac0acba50e79fef,2024-08-08T09:15:07.740000
|
||||
CVE-2024-42033,1,1,185921280880703f71cb46983bd7d83f51c11795a672d557b8718f0bad0e5b55,2024-08-08T10:15:06.813000
|
||||
CVE-2024-42034,1,1,973d8108490489454e0bf9ea085ec9fbd1eb59923cca4bb1821a03827d61fa9f,2024-08-08T10:15:07.223000
|
||||
CVE-2024-42035,1,1,ad2f03d2693ce1f1315e8156ac48e8107de4937d9ea1f42b12356f7033882064,2024-08-08T10:15:07.637000
|
||||
CVE-2024-42036,1,1,46b43b353e63f07e15ba7473a5649e68b7d14c15995c19d75c8aa919a2145003,2024-08-08T10:15:07.967000
|
||||
CVE-2024-42037,1,1,6845898e4d00b9a87a823329c695ccba8957518e014455bc1bb5719a6df90cb0,2024-08-08T10:15:08.323000
|
||||
CVE-2024-42038,1,1,28b28da814d0b8eaea3e8df15e6486f862415ceb74f6344d6232bae188c2ae4e,2024-08-08T10:15:08.700000
|
||||
CVE-2024-42030,0,1,13b95ff5889f46645a02503ffe69c893dd20282d8dbe0fede0671f7d8b6aca3f,2024-08-08T13:04:18.753000
|
||||
CVE-2024-42031,0,1,fab582503a87e3c4010ebef1638ede87a36eeb649c02612722675a6ee422675d,2024-08-08T13:04:18.753000
|
||||
CVE-2024-42032,0,1,4c403a367edf68cf97724460c167b0e3fae9d1824b0a21acf4ae5b30f9b2af4c,2024-08-08T13:04:18.753000
|
||||
CVE-2024-42033,0,1,8feffb3f2afc3beee121279f3bc570fc6fc3693729729372cc925e758e532912,2024-08-08T13:04:18.753000
|
||||
CVE-2024-42034,0,1,bd47bd5dc59489e46936e6dd9e44d501adbd2411db264ef24a1e3d1029408870,2024-08-08T13:04:18.753000
|
||||
CVE-2024-42035,0,1,764616794b6fce0627d1d4797c77368a622f05f48f657b5127d8db267813c928,2024-08-08T13:04:18.753000
|
||||
CVE-2024-42036,0,1,d4e9f4d6b0b437112c7e6d204454e2aaed1e4ddc5442f0b2b56a0d76a61adf59,2024-08-08T13:04:18.753000
|
||||
CVE-2024-42037,0,1,2fc802a0a8d0a2b7d546af29ccb70ed71fa3455a869f2fcf49f956c280d22319,2024-08-08T13:04:18.753000
|
||||
CVE-2024-42038,0,1,7292e28c197db0884cb3a78f6d2f1f93f2b0517615dd459b21628efb6250e1ed,2024-08-08T13:04:18.753000
|
||||
CVE-2024-4204,0,0,862cae0d91d079678d989fc30b77e9abff361be6cebd83fcf5dbeecd5c0be203,2024-05-17T18:36:05.263000
|
||||
CVE-2024-42049,0,0,9abf5139ab1afe8d55de5e333c97afa73e09c57ae34abc37f55eb8e975c40df6,2024-08-01T13:59:18.253000
|
||||
CVE-2024-4205,0,0,3bc679c8856618cb4acfda15e793a18c79adc1e7d27d459136a04f77802a5775,2024-05-31T13:01:46.727000
|
||||
@ -256737,7 +256738,7 @@ CVE-2024-42066,0,0,13367e8042c7deb50de62c4bc97d68b98aeec4d6d8b79660880bbd2b9f975
|
||||
CVE-2024-42067,0,0,76b8a48a5c9c39c834303c1ab49427d9ea91f3b40b52494de61b4b6e2c5fda5d,2024-07-30T19:02:20.687000
|
||||
CVE-2024-42068,0,0,1a160585aaee5b8057f9754dd933ab025ae98bb2f1265de1f07411334b3b7824,2024-07-30T19:02:12.100000
|
||||
CVE-2024-42069,0,0,60fa9d91087c81456e7c5fb921427aaf3b5afe0a67efd57dd11a894c17fbb41c,2024-07-30T19:01:58.623000
|
||||
CVE-2024-4207,1,1,a3fd528aeb6936c82ad85e780b2940441bff6e9fa460564e4b8ba06ee6a559c3,2024-08-08T11:15:13.183000
|
||||
CVE-2024-4207,0,1,3d30ebfd6837b8277b07a3fed2c75ebb61b9f051246fbebc82a1eae77ac7777f,2024-08-08T13:04:18.753000
|
||||
CVE-2024-42070,0,0,e64f943ce3129e4d8ae036dffdbca01cf0dc26f8755575b087b493eb24d90087,2024-07-30T19:01:47.300000
|
||||
CVE-2024-42071,0,0,ff080b79e51ffa2c8ca921ced41476b4268b9bbb102ab5b0e74f4466a89e1962,2024-07-30T19:01:26.950000
|
||||
CVE-2024-42072,0,0,0b4090285289756aa6386870bfb03879aa1c74b07de9263b8ad88a48de945c2e,2024-07-30T19:01:12.833000
|
||||
@ -256770,7 +256771,7 @@ CVE-2024-42096,0,0,a51020378e9a53609e2b9850304f0387470e69965face3c10e6612960442f
|
||||
CVE-2024-42097,0,0,daadf967612be031bceee3a5cf360a6b7c8656301780004df63ba219cd6f1380,2024-07-30T13:33:30.653000
|
||||
CVE-2024-42098,0,0,8a4ff599a1d3537153a17ab56baf7b7f5c48f0c9fee61b69ebcae9dd8a773bcb,2024-07-30T13:33:30.653000
|
||||
CVE-2024-42099,0,0,3238974df1fe016605810e840ae3252de7cbfd02bda034d599f06c9b461b006a,2024-07-30T13:32:45.943000
|
||||
CVE-2024-4210,1,1,02d453700834387bc607882aeafe8f920690f681564ae65990b3eb3cf7539306,2024-08-08T10:15:09.040000
|
||||
CVE-2024-4210,0,1,3de0526bc7ee4d2ee3e85387e784b47b575c14d9043bdb29c130980f21c212c3,2024-08-08T13:04:18.753000
|
||||
CVE-2024-42100,0,0,9f2359920901de15a72f82c74dd31f7cfd476c8a0553c2aa7b3605f8c3eb567f,2024-07-30T13:32:45.943000
|
||||
CVE-2024-42101,0,0,6d069e38aa3f18a2a0a6e9be9f28470a6cc7ed22cac8ea0737ad55264e1063cf,2024-07-30T13:32:45.943000
|
||||
CVE-2024-42102,0,0,b393750cc98fbc2e434d92ada85c648c1e90398cfa4c8b1d811e7cdf1188cc46,2024-07-30T13:32:45.943000
|
||||
@ -256828,7 +256829,7 @@ CVE-2024-4215,0,0,9e7e3a04514a4f3c8325efbee683d76ee50f1989bb723741735a5cc60f766f
|
||||
CVE-2024-42150,0,0,b0367ccbbd7e8c81c36eb7016e076190b057ac84efe63dcc25d8aac079dad32d,2024-07-30T13:32:45.943000
|
||||
CVE-2024-42151,0,0,fdb3fba7028cbe28580e674b99b9030e1b9e9a62c2e7f59da9e900cf53455fd9,2024-07-30T13:32:45.943000
|
||||
CVE-2024-42152,0,0,cf7897733bea0728a109fc5e6bd10f12dc7e878ac6bdef95ec146d648e8c50e6,2024-07-30T13:32:45.943000
|
||||
CVE-2024-42153,0,0,0465b75eb4ad67223ef39c0739fecb9c856eb8c91ec6c9984d8d2985a3310e3e,2024-07-30T13:32:45.943000
|
||||
CVE-2024-42153,0,1,fcc644e98f47bf80a615aace1a6ace900e6f19b9ce88641e6a917689ff1d51b4,2024-08-08T12:51:49.873000
|
||||
CVE-2024-42154,0,0,d416af6795b48e43f1a1c8940ad0d35468a0d12993b2375e6c6034cd5a1c934a,2024-07-30T13:32:45.943000
|
||||
CVE-2024-42155,0,0,3c5c132dfa3d8fc2716ad525960ef85ad7bf6a714edaf72c82d542c3f61e5e8e,2024-07-30T13:32:45.943000
|
||||
CVE-2024-42156,0,0,3e3b593a088f7c0fa294387fa1377c62b099a10750cb61c9f552055051d6684b,2024-08-02T14:31:53.660000
|
||||
@ -256878,13 +256879,13 @@ CVE-2024-42248,0,0,9daba88013a62f39f5836d2ca2738ebe99311dc207e5be6d1a23f2affcf30
|
||||
CVE-2024-42249,0,0,bf365edc2c96a4876083f80ea351bf6e74bd1f39215b48e95af26a5324f39b9e,2024-08-07T19:09:46.290000
|
||||
CVE-2024-4225,0,0,91f68c0336340065fb4af26f099ffa4f82ba2dd159bb3bc13f7cb1abcd1de276,2024-04-30T13:11:16.690000
|
||||
CVE-2024-42250,0,0,dfd6a9d9259f9bcb46737f53714c27140f6ba7141f4054a83b1176fd288dd5ec,2024-08-07T19:09:46.290000
|
||||
CVE-2024-42251,0,0,7f7af6d431c08fbcc40bd3d68cd140d90d9fe2cb09665042e4ef59c79a8127d5,2024-08-08T09:15:08.070000
|
||||
CVE-2024-42252,0,0,529d646fabbb82236681e08658cd9b17e79fccf2c3021c0f9c9e9376eea0ab9b,2024-08-08T09:15:08.150000
|
||||
CVE-2024-42253,0,0,3814e17c32947bba23c733aaf3ed825eb5fc25c2c917d90019bfd98692998134,2024-08-08T09:15:08.220000
|
||||
CVE-2024-42254,0,0,4f38ff5b2aa4dd6a863e782eaf6c92509770d5616de4d628f3ca5287c16555b6,2024-08-08T09:15:08.290000
|
||||
CVE-2024-42255,0,0,02f1c51e544ecf0e0927dd4a3124a16bc6a23c978d646cfc52678c714b99519e,2024-08-08T09:15:08.470000
|
||||
CVE-2024-42256,0,0,6e47fcebc446699493597f465b2bc1e43627a651371449b196097e116eedf5c7,2024-08-08T09:15:08.553000
|
||||
CVE-2024-42257,0,0,fa7262574e2d2cad98271f0bba286834c39f233e6b3d62fbae7e1039c01d15f6,2024-08-08T09:15:08.623000
|
||||
CVE-2024-42251,0,1,9b1443129a58369f223ce9211fcacb89bca25929ae14228a775106359b13b990,2024-08-08T13:04:18.753000
|
||||
CVE-2024-42252,0,1,b821d07b5bf5bee048c28561a74457d556fd9d0ceebeb99bfd9b5a58471abeef,2024-08-08T13:04:18.753000
|
||||
CVE-2024-42253,0,1,acfac192925c972e021028901ef1846e104d7f7f457e000983c2cb6592d3dfe9,2024-08-08T13:04:18.753000
|
||||
CVE-2024-42254,0,1,4c21db62b8fef15a8d4e2f4b1a5153b64df67323b2d9eda3f839d5b6b50bc050,2024-08-08T13:04:18.753000
|
||||
CVE-2024-42255,0,1,fc422f8e4f441193acc70cb76260d4458bc236831fc1ac0e46e7857f3491b1e0,2024-08-08T13:04:18.753000
|
||||
CVE-2024-42256,0,1,c93d1f5597bc678cda18929e1b987988db71de242a8bc859001c0ee64669f796,2024-08-08T13:04:18.753000
|
||||
CVE-2024-42257,0,1,069b5a4e96675c66db46a639aa141686ff5530ef6ed9e06efaaa21582e67ad7d,2024-08-08T13:04:18.753000
|
||||
CVE-2024-4226,0,0,5a1ca6b12b6f72b0f4206f29fce66dc2868959ed888bfbcbc74131b5725a94eb,2024-04-30T13:11:16.690000
|
||||
CVE-2024-4228,0,0,22331e972270e81a8a4d9238da77e1f1eab8644e20c13e517da1e3ed609f3be8,2024-06-27T12:47:19.847000
|
||||
CVE-2024-4231,0,0,c87a42b4dfede9046d13b34e260c0c7ec4e51f68f0fbfb8755010b78e39f405d,2024-08-01T13:59:28.843000
|
||||
@ -257408,7 +257409,7 @@ CVE-2024-4778,0,0,e3020a287fa6ceae8ff9c78434f10af4d17cf4058dd5bf80208c921b6bc68b
|
||||
CVE-2024-4779,0,0,7a9d6158e8d260b03b3581dd37b23bd10d59ba6243714ad236ba79968e8d9b16,2024-05-24T01:15:30.977000
|
||||
CVE-2024-4780,0,0,4aec24b958d50bff73d14c7bd2f67b2a9793d4893d5ddbdba18f0fb02ea18cc9,2024-07-16T13:43:58.773000
|
||||
CVE-2024-4783,0,0,413c0436e6758a988a0c847533b21e34b17a9d936626eba8cda1a5d1f87e0181,2024-05-24T01:15:30.977000
|
||||
CVE-2024-4784,1,1,3884e014a45e7ad2daf855c26d0edc6a097ef647b76020b65a3f1333a50f8c54,2024-08-08T10:15:09.390000
|
||||
CVE-2024-4784,0,1,9aaebc683fa580787b3fd96a509a375fe0be341d6b1720ff572edca3637a16b2,2024-08-08T13:04:18.753000
|
||||
CVE-2024-4786,0,0,bbc8c5b9b549878acd4ee1e5896d7add0ba995b55e84e619083dd37cca26f8f1,2024-07-29T14:12:08.783000
|
||||
CVE-2024-4787,0,0,6e9b8652de9328ef9248746b2fe52f715cb97566c59048ae6277a1aaed304f45,2024-06-20T12:44:01.637000
|
||||
CVE-2024-4788,0,0,036e4ce9e476328c73022572d41365684f416f1f77ea3a1f5e72bdd2454ce2ec,2024-08-05T20:23:52.467000
|
||||
@ -257781,7 +257782,7 @@ CVE-2024-5222,0,0,9e62f5017a27f5b75e3db6f1fda7f6f91a6137f47a67048efce27cf33a6525
|
||||
CVE-2024-5223,0,0,e1518fa1e9fb0970a33863c1b1a7313f3247c5958916de9a4b07f2b8f6f2eb0c,2024-05-30T13:15:41.297000
|
||||
CVE-2024-5224,0,0,db9f297ce85558665780a2b5ea4fe3a1e31ac4d111566a8ba052aeb7472c35ff,2024-07-23T21:04:43.353000
|
||||
CVE-2024-5225,0,0,0b1cbbce30104cfacd8449d451f1ff1a7894d94838c6bc15be56e2aa5eecee62,2024-06-07T14:56:05.647000
|
||||
CVE-2024-5226,0,0,9fac854c9383fc11fb63ab147b006707d6ad9a89ff6a94a3b80551dcb2d9b3b9,2024-08-08T06:15:40.383000
|
||||
CVE-2024-5226,0,1,343bea1ef6104d1a60d532c3087e707033a7d2cea2eb006f3e8cf7d609df1199,2024-08-08T13:04:18.753000
|
||||
CVE-2024-5227,0,0,782d407fd59442ae1cd49577c63d7b8236dddc237a48b5fa6a3df2e3ceec540d,2024-05-24T01:15:30.977000
|
||||
CVE-2024-5228,0,0,d7fb18ef663e7fbb963ee04e575f2bc258b900955c0912600676521519fad837,2024-05-24T01:15:30.977000
|
||||
CVE-2024-5229,0,0,787c92e076dbd9dca682f832ee22f0e31b439c91ed2d6b58a8c544f86d4189c3,2024-07-03T02:08:42.827000
|
||||
@ -257963,7 +257964,7 @@ CVE-2024-5419,0,0,0d1c725f53c48278ea7823202c4adf24cf8a04c4aff5d8363f101c1d9f2798
|
||||
CVE-2024-5420,0,0,3867de6c80eaebb04ae4def03e9baadba6a4785f9b7d05c922afac144ffa3470,2024-06-10T18:15:38.367000
|
||||
CVE-2024-5421,0,0,687f3a5898a97c7e4a575e3431d3fe4a696cee8599b8881eabbed4fc7122e815,2024-06-10T18:15:38.447000
|
||||
CVE-2024-5422,0,0,a7ac042f03539b57f700d43aa5929a4431fad7f2a64327cabdefb452ddb8c884,2024-06-10T18:15:38.520000
|
||||
CVE-2024-5423,1,1,9a01d19b4b7e07b6878a92a46c0afb6ae89730701eac721255acca49235f0207,2024-08-08T11:15:13.410000
|
||||
CVE-2024-5423,0,1,3ebe73162170e483086416dc2dda29c80f332f5c6250eb9547577483f9b66dae,2024-08-08T13:04:18.753000
|
||||
CVE-2024-5424,0,0,dd542e2b4b449f200a4b1a82e6055968c0edff7c6325ff444ef99264bbf9b209,2024-06-28T10:27:00.920000
|
||||
CVE-2024-5425,0,0,6a4e5f79f55def4d138c1c07874dfb0365b816ea97355d904460c326f384651d,2024-06-07T14:56:05.647000
|
||||
CVE-2024-5426,0,0,34afa7194afb894f777aa3dfb9357e73895bc2898fe4d0744eeb7d3dbc6f96b2,2024-06-11T18:03:58.213000
|
||||
@ -258149,7 +258150,7 @@ CVE-2024-5663,0,0,bb880da64d53311a8a310f135d9a5689f60a63ae397c005441eb1cf59738b6
|
||||
CVE-2024-5664,0,0,15d6d3474356777a172880e6c9174f79c431df5a540b6c11d12c2ee9d4a776e5,2024-07-30T21:00:44.357000
|
||||
CVE-2024-5665,0,0,ee434c76bce552b377f6919bf1c15ee1f70c912b781038fb2d7ab59e3f11029d,2024-06-11T17:47:45.033000
|
||||
CVE-2024-5666,0,0,7006ce848fb9e9b356f5212c7fbbc0eb7f55baad3faadc27e1a556ebbb32858d,2024-08-01T17:14:36.077000
|
||||
CVE-2024-5668,0,0,26945c78486889aeb09d6bb344ddd8c2b9b333507b37383a19375a45583d0b04,2024-08-08T05:15:50.203000
|
||||
CVE-2024-5668,0,1,e1fb9f8f5d17071ecb817cbfe9be324d67b5f94b87ad038c45b92e9cf04060e2,2024-08-08T13:04:18.753000
|
||||
CVE-2024-5669,0,0,ddd7772a6277d903bcf1d89da44667af6e9a3df4fd3440e71ca75c5d1aad7a37,2024-07-09T18:19:14.047000
|
||||
CVE-2024-5670,0,0,e086cd448637a314471956eede56ff43db7897b544771c39e00cd0183fd60523,2024-07-29T14:12:08.783000
|
||||
CVE-2024-5671,0,0,6eae1974e5cd4b5512fcce37ac22f34a170160764d56f46700a3bb82153dc238,2024-06-17T12:42:04.623000
|
||||
@ -258581,7 +258582,7 @@ CVE-2024-6250,0,0,65144edeea3f44f34a4643fe614f57e1f379d6c9ac265963a9d3e1dd464fb7
|
||||
CVE-2024-6251,0,0,4ff3c6977b6838552fca6fd96450148c0a810a0b49d59064a41fd5d7df8c3900,2024-06-24T12:57:36.513000
|
||||
CVE-2024-6252,0,0,f925951499780a86ba894fc39baf0f6088fcb6c4e2787ea242a732a2e35ea460,2024-06-26T19:15:14.383000
|
||||
CVE-2024-6253,0,0,d70df9ffdc81f7d3511638a8a32373070f208c5646ec9496ca814b85bf15f7ca,2024-06-25T18:15:12
|
||||
CVE-2024-6254,0,0,f6c3ff6758a3723db26dfef0103b4fe989a085248ff52f33e164942334751242,2024-08-08T04:17:06.983000
|
||||
CVE-2024-6254,0,1,fde0fafe626682898f8bbfd16af33ff0c947c80d91ffee5375f17b755d365a35,2024-08-08T13:04:18.753000
|
||||
CVE-2024-6255,0,0,e1d734d895b3a29f6316eafd094e7328f4f79610057d4f34d1702aae39837690,2024-07-31T12:57:02.300000
|
||||
CVE-2024-6256,0,0,cd0156365b21d4bea53ae3ad70dcec4b1c8c7fe2a610d4e79db68145fb523cc9,2024-07-12T16:53:35.083000
|
||||
CVE-2024-6257,0,0,9068db2cec3557427b4184684513a4bf48773ad544b747d98a6b6caebef9018b,2024-06-25T18:50:42.040000
|
||||
@ -258646,7 +258647,7 @@ CVE-2024-6325,0,0,3ea6578ebdd2a7633259d686c429ab9b3e7708f0e981d10184478f4442c008
|
||||
CVE-2024-6326,0,0,e689387b2cb49e7365da7fd7c751e52e0ede20a7a6c6966f5f5b92a6b53089de,2024-07-16T18:00:02.110000
|
||||
CVE-2024-6327,0,0,2921f8f8780ecccf64e99daaa57d4495895350cac37fbdf3fcfbbaadf3869269,2024-07-26T13:03:00.473000
|
||||
CVE-2024-6328,0,0,1dc9c3c4a448080717651ebabfb2fc281b4a1c036cabba31a96124b6cb4e8cbc,2024-07-12T12:49:07.030000
|
||||
CVE-2024-6329,1,1,4fef9b54eea2874ea4f191a88492c92ea651530baef86bc6334869582db02482,2024-08-08T10:15:09.857000
|
||||
CVE-2024-6329,0,1,0297471d5ff859b5002d32cf7c9376114df7d0652dd734345b853093c75ae3a1,2024-08-08T13:04:18.753000
|
||||
CVE-2024-6331,0,0,4986de562cc692d17d21a95afc199859f7d03ef9d364d260decf275bef80e946,2024-08-05T12:41:45.957000
|
||||
CVE-2024-6334,0,0,3daf0dfe09252e7765ca30c739cfcc033a43a657c17c0275e173ac670504522a,2024-07-09T18:19:14.047000
|
||||
CVE-2024-6336,0,0,1df5fc72f07b093cfd11ea9b65ef147e8130715026fca7ff47fd924988f45532,2024-07-17T13:34:20.520000
|
||||
@ -258739,7 +258740,7 @@ CVE-2024-6470,0,0,c9a33c23ec7370c50b4df58ad71ec5e181cf8d29947a984c43804e0a58dc77
|
||||
CVE-2024-6471,0,0,f732e100289c893532526b33b46541a39ba52ce518f7e90d2f97ec4bb67cf877,2024-07-05T12:55:51.367000
|
||||
CVE-2024-6472,0,0,06cfc3c26e9764572c1adb3e446cad13cb9599b02c4c47946f6698a134e25867,2024-08-06T16:31:05.780000
|
||||
CVE-2024-6477,0,0,af465e59718721c7b727c1ec6a265ade947c829c05464c1090814aa1a74a6b13,2024-08-05T12:41:45.957000
|
||||
CVE-2024-6481,0,0,5fe9b75e639cdfb17c504af3723d731acfb8c6ffe369d50db35bd8cbb4a5c148,2024-08-08T06:15:40.917000
|
||||
CVE-2024-6481,0,1,2dc0b3fe3cdaf2ae7e5e60f84c471ea08e3ec95a0b267a0c2cc8b964985ce0e2,2024-08-08T13:04:18.753000
|
||||
CVE-2024-6484,0,0,bc633abd6bfb9da06585afdfb273066dfbc508847026385eb612d46f7c70ed29,2024-07-11T18:09:58.777000
|
||||
CVE-2024-6485,0,0,b143d2f5de1cad2c57f83d18fe64abfe0ba2da69210341aec4863f07cdd850cb,2024-07-11T18:09:58.777000
|
||||
CVE-2024-6487,0,0,ade8feb977b02299075dd869ca65fb48f198290ee8a478009ada36ae91b54213,2024-08-01T14:00:24
|
||||
@ -258783,7 +258784,7 @@ CVE-2024-6547,0,0,18c84e0486ad4b936dd6fb72fb2fdab2178f5a996a76eecb6a226aad2d913b
|
||||
CVE-2024-6548,0,0,60bfc667942bf486cd849da3893b7634ce066ff37e0b88eef507e7c2b2252b95,2024-07-29T14:12:08.783000
|
||||
CVE-2024-6549,0,0,cc28409fa4123f9cfa0020a8bd1acbb74b9f694b50039e5c195a43b7390fbf1b,2024-07-29T14:12:08.783000
|
||||
CVE-2024-6550,0,0,6c4bb046e65a00df1f67c81af4edc0fc3847fdca60c1beea606bf943b5851318,2024-07-11T13:05:54.930000
|
||||
CVE-2024-6552,0,0,591f4f1b57d7b62b94db3135b87988ef3c7c5b03201aa47c05adf9179bbf4e51,2024-08-08T04:17:08.573000
|
||||
CVE-2024-6552,0,1,c69fea586ad13db8e0f17f3e790d1787fb8eede20c8e873ffff0211dfcfe53f9,2024-08-08T13:04:18.753000
|
||||
CVE-2024-6553,0,0,8a5d95f9a9340732b68e040cf34cd3feae3ce046430b36cadf8644d55781cab3,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6554,0,0,c39b715167392909a130cc6479af2acca1cb23375ca0bdab5b0fb951f0bce662,2024-07-12T17:01:48.353000
|
||||
CVE-2024-6555,0,0,bf68ef8f1bd3876021fc33b504457daba53832080530806ef27f797ea5536a0b,2024-07-12T12:49:07.030000
|
||||
@ -258873,8 +258874,8 @@ CVE-2024-6699,0,0,9d9db768b9c88d760728ad43f917f22b5e5ff8a9965264fbc4d242d1015fef
|
||||
CVE-2024-6703,0,0,58688b231f5fc6deacad90c54b9ce0876a71daf3ee0061b5562a2bcbb8052bf3,2024-07-29T14:12:08.783000
|
||||
CVE-2024-6704,0,0,32c1d6f59091f2a85229ee95d1e57c685e7e8aed9f15efe17b9f77a5487e60e3,2024-08-02T12:59:43.990000
|
||||
CVE-2024-6705,0,0,1e166467558902cf3ff2211f8b1aa347feb308f999c65053186e5a13806e8368,2024-07-18T12:28:43.707000
|
||||
CVE-2024-6706,0,0,d4c866de32ee3cdcdd75b4775da901e32b1f6ba2954a3e2eaac7b9bbd4c3d632,2024-08-07T23:15:41.350000
|
||||
CVE-2024-6707,0,0,ab279cc6e0364a9afdac684dc51c34e8473e4ee7e1571c2ec3efc14a4c0442dc,2024-08-07T23:15:41.457000
|
||||
CVE-2024-6706,0,1,f842031f38d24519dbaa950a03754a115247fc5d18a8c1f880a5ee26c9bd8557,2024-08-08T13:04:18.753000
|
||||
CVE-2024-6707,0,1,e20eb1cee96b55a161d624e022576889c966342bd1be8bf67269b0db627fb80c,2024-08-08T13:04:18.753000
|
||||
CVE-2024-6709,0,0,6fe2e770615cb1cdf14ac6a1be894b0afc1b11da8138a88bedb96b5baf70b602,2024-08-05T12:41:45.957000
|
||||
CVE-2024-6710,0,0,4e918da09846cceb474e5a8b11ef31c34f74c44e6fb5c62544fbedf363b9f5e1,2024-08-07T21:35:11.673000
|
||||
CVE-2024-6714,0,0,11b717ebe6f787348133e2783f9d140b140bb610f91df0dde9f6c41f4dbdce83,2024-07-24T12:55:13.223000
|
||||
@ -258939,7 +258940,7 @@ CVE-2024-6805,0,0,df9c24152184824aaec79a13a2bf3e8af4b412b0a659321142aa5850936d97
|
||||
CVE-2024-6806,0,0,ee5c95118c41ce11e7d4b52c5bbead77dffa73ecabb9abea55db46ee557c211f,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6807,0,0,e4d3dc581aa656108086542a60085fb674561ed6b78bc58e0e899b44edae1d40,2024-08-06T11:16:07.450000
|
||||
CVE-2024-6808,0,0,2df5a702fa4af6687f0c8dc8e100812ff9b6b346801edb239f41e0ca638c0076,2024-07-19T15:04:43.837000
|
||||
CVE-2024-6824,0,0,f1d797816848100ba31c2e799c4299649551dade4e79433a3db30cff1a79bc94,2024-08-08T06:15:41.067000
|
||||
CVE-2024-6824,0,1,2b5b10cc415939a34f32e5b37be54f877a179f9144de8a5e8476b884ab80faa8,2024-08-08T13:04:18.753000
|
||||
CVE-2024-6828,0,0,5e3bce0050be5ef41f841daf735b80af46e729368278d26d6a7ddc5bbbdee66f,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6830,0,0,66325e33317c6fde8b929b285667c5104c4ae04492532b5067560968ff36e7fb,2024-07-18T12:28:43.707000
|
||||
CVE-2024-6833,0,0,b0ea48d29166f6347ac218b4f9f93d3f7fc599fd932b64c35cfa55e5a1a94672,2024-07-18T12:28:43.707000
|
||||
@ -258947,18 +258948,18 @@ CVE-2024-6834,0,0,23e85f57c9b7230818a4425261a24fd150d79ea72676d6bce04d47efdd6963
|
||||
CVE-2024-6836,0,0,94c1bcaa18f7036265464de8eba36ccdaae9b63d5d20f60a8cc42904bb485160,2024-07-29T20:20:30.867000
|
||||
CVE-2024-6848,0,0,e171c12c58967922126feefb09977b436bb9e206684562a37899ca6ed3e35d20,2024-07-22T13:00:31.330000
|
||||
CVE-2024-6865,0,0,cb8e3c3258edaecfb2408f04adfa69a3419179f287cf4fd0248689bfb8e952c7,2024-08-05T14:15:34.847000
|
||||
CVE-2024-6869,0,0,59571be303487950559a97380697d6d30672ecab704ea09a098624299e3670f3,2024-08-08T05:15:50.473000
|
||||
CVE-2024-6869,0,1,cc765e0741eb808a23e90ee3171ba570febcbdba6db7038c79938ac8aebc9baa,2024-08-08T13:04:18.753000
|
||||
CVE-2024-6872,0,0,9eb628e3a6d1ea0380e94dd099512f5a2f74ddb0ba75bf9a102e83ab13e260f5,2024-08-05T12:41:45.957000
|
||||
CVE-2024-6873,0,0,8e5db8bfa0491746f29814d1d8249a1850325cbcdbd09b52dbf90709e95d212c,2024-08-01T16:45:25.400000
|
||||
CVE-2024-6874,0,0,dbf80741a5dbaf69dfea3d6102d0d56a1052d5bac2fe6cc0bc24819c43cddd92,2024-08-01T14:00:45.683000
|
||||
CVE-2024-6881,0,0,c7a593beeaed093fd14dcd15598a09b93989985caddc31a572979478e4fff1ed,2024-07-29T14:12:08.783000
|
||||
CVE-2024-6884,0,0,45c631b67844b8c25e693a6853f35a159a13c48134a3a2e7d94e024229df4b40,2024-08-08T06:15:41.603000
|
||||
CVE-2024-6884,0,1,1ab82a5f63c30a2091b7b058cafc8d62a5f67aa78df5b8c418a856100b70a5fa,2024-08-08T13:04:18.753000
|
||||
CVE-2024-6885,0,0,820342a8aad3354940c223afe57157bbf13eee743fbe19265a63d35dde973086,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6886,0,0,fbca102ce434786c03a8469f687e67e8b7739ad3b6f0519e88d819189fb30d7c,2024-08-06T16:30:24.547000
|
||||
CVE-2024-6890,0,0,1d036609c9f25af31d40d2b91e6f8ff28f9ce5ca96b0ee9d7f5fbbfab69567db,2024-08-08T00:15:40.507000
|
||||
CVE-2024-6891,0,0,b78d8d7c5775140b87f3fda708ea6b092e483c2eefc1c29985f968ef265136c3,2024-08-08T00:15:40.603000
|
||||
CVE-2024-6892,0,0,0e1186dc5cf324aa7bf4fc165c14b0cef8e1ef40e1c7a500f935403e0fcfd4e2,2024-08-08T00:15:40.707000
|
||||
CVE-2024-6893,0,0,185fe1e1cab3a4b3d9bd09acd7e2a56eace5c28592ae4cf72b5779375fe26318,2024-08-08T00:15:40.793000
|
||||
CVE-2024-6890,0,1,8f7fda7338ee2ee3c7bead2dd70427897932190e5db8f14ba7703fa2797d292e,2024-08-08T13:04:18.753000
|
||||
CVE-2024-6891,0,1,56d21b5ac0d2135ea78d754ee2c465c7857f0f218cd66b118bfad8d193c7c1d4,2024-08-08T13:04:18.753000
|
||||
CVE-2024-6892,0,1,bc0d9068ca32a5801c1d63fe6f4795dc5c08dc9fc9ea0bef7783b53d20a45087,2024-08-08T13:04:18.753000
|
||||
CVE-2024-6893,0,1,38d6bcec597f06973625f886034bab1f3d38eef8991a3e1d0c81316f639c24dc,2024-08-08T13:04:18.753000
|
||||
CVE-2024-6895,0,0,ba732cd0d0196677d9fba02b4344054d4844d09e5d174114e4dcf4446ecf9262,2024-07-22T13:00:53.287000
|
||||
CVE-2024-6896,0,0,801c74edfd9bf4c5786030707fac190d86b113e6627f16ad4c2e5810705558a7,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6897,0,0,0bc0c3c85d38c464186c16b9bc40451a421eb7b428d66cf1c3a2509fdf188e66,2024-07-29T14:12:08.783000
|
||||
@ -259027,7 +259028,7 @@ CVE-2024-6977,0,0,581c8cdfdfeb82af68c8689432d86b8be0c3f45442112c85b954569b41cd04
|
||||
CVE-2024-6978,0,0,aa71215d41abe7b7e6f6bff5080b4c986f22761adf5de92aeb36f54acec24a60,2024-08-01T12:42:36.933000
|
||||
CVE-2024-6980,0,0,f6625eb84b24e1b38c56cc3bb53a8be195d62bb4e9db2a7b8e6feb6123dc7610,2024-07-31T12:57:02.300000
|
||||
CVE-2024-6984,0,0,70dfda1fc41774868bc9c54996b49ac58100ddec2443c12ad657af853bca03be,2024-07-29T16:21:52.517000
|
||||
CVE-2024-6987,0,0,d03c1c5cc2056ece76945092f2d08ff2f7ed6462228fa4ab9b468352b4a2a756,2024-08-08T05:15:50.700000
|
||||
CVE-2024-6987,0,1,330d8660e6c8d71a307c7f147e933f5e3b64b2ed81a202f0c00b33c60663824c,2024-08-08T13:04:18.753000
|
||||
CVE-2024-6988,0,0,7c7b8d3e1cf6e7ad313fbb0065550bb07b14482a1596e2d1017c6e1750b4a915,2024-08-07T20:51:56.167000
|
||||
CVE-2024-6989,0,0,ade79451132400d31d7ae605ff13fce7650d6dfcad5f07960cf60cc71279c505,2024-08-07T22:10:20.423000
|
||||
CVE-2024-6990,0,0,af78978331551e601c74e65678c49159db8dbbe52afb220c54529e9bbfddee69,2024-08-03T18:35:02.320000
|
||||
@ -259084,17 +259085,17 @@ CVE-2024-7127,0,0,2d5095b19bb58c78333178ffe1af1d8a0764d078ec0f076ba87011d70eec91
|
||||
CVE-2024-7128,0,0,22b40e3236f05da8de2b73f629340b5796a3b45429dedc50864bf862ccb583f9,2024-07-29T14:12:08.783000
|
||||
CVE-2024-7135,0,0,31437d1db396166831d3abd18bbeb77eef50ad11110b9df0f25d86e90a9b1fe1,2024-07-31T12:57:02.300000
|
||||
CVE-2024-7143,0,0,6a2c0c6ff3e4150031595148957b3619267db857b2cf406d2e3ba35ece648959,2024-08-07T19:09:46.290000
|
||||
CVE-2024-7150,0,0,0a913202566838d0e914f0d52d2925455b114bfb55c2e179041d3ab379b90cca,2024-08-08T06:15:41.727000
|
||||
CVE-2024-7150,0,1,c7aa662c62f137fc9f5e7c2c4fa11d684ce4d74402782286c7770e7f6bcc041e,2024-08-08T13:04:18.753000
|
||||
CVE-2024-7151,0,0,27748e77ac666f37b5ea95444b5871c2d624c12d124d7b3d9588f7bd43672a12,2024-07-29T14:12:08.783000
|
||||
CVE-2024-7152,0,0,dcb2ef4ff482b2e3310b87257a8cfd0ded02bb0f2f9cc18d404e9808150d9dbb,2024-07-29T14:12:08.783000
|
||||
CVE-2024-7153,0,0,9aefcf5212f7daa00d220d7b2b9f573be0a36b383139766fde3ad17e71ad7b77,2024-07-29T14:12:08.783000
|
||||
CVE-2024-7154,0,0,c4877af6f0f1d9badd5877f96c865212ecd80856f1bba48b44a6bc252bd67be2,2024-07-29T14:12:08.783000
|
||||
CVE-2024-7155,0,0,00ae35729f7efa70b9e9a0053d17c0f5d011aeb14328040786cb900c89deda41,2024-07-29T14:12:08.783000
|
||||
CVE-2024-7156,0,0,6a53f69f84040ffce7173b21790e83616284ff242a58b9eb143d86d28bd080cb,2024-07-29T14:12:08.783000
|
||||
CVE-2024-7157,0,0,836f9f624768493b472613aa13824be2823cb6224ccf39d26fbb2c9e52660f92,2024-07-29T14:12:08.783000
|
||||
CVE-2024-7158,0,0,793ada3591847e31d76f8a9cb327d0114a8efecba6a45eabf7fe3415c2ce972c,2024-07-29T14:12:08.783000
|
||||
CVE-2024-7159,0,0,126404475b52662f6be2a9b0fe73c669b02b4551a2de8ba0dfd0f5f735003c10,2024-07-29T14:12:08.783000
|
||||
CVE-2024-7160,0,1,39a8904dc42c635e004cd5b1ab82a58f9270ee9d90f27eafd7b2f7a3d898d30e,2024-08-08T11:59:02.483000
|
||||
CVE-2024-7154,0,1,e57552471881e1a14b1caaa59dc9c6ca8d39660d594fa4a96870a943590cfe91,2024-08-08T12:38:38.570000
|
||||
CVE-2024-7155,0,1,d3b42df8fa657b068a2699b0f85a79ef3700beb3c8554ee0b8f9e9692503ef7b,2024-08-08T12:34:01.330000
|
||||
CVE-2024-7156,0,1,f489b8f22e3dd6d02b0020ed1867f3dc9ef2cd5a4278066223c348cc9346a440,2024-08-08T12:20:39.150000
|
||||
CVE-2024-7157,0,1,9e30e01fcdbedf62d054cf0b58b65c274f081f0580446efd16c51d91512f81b9,2024-08-08T12:17:46.953000
|
||||
CVE-2024-7158,0,1,de1251913d32f09ebf146d3caba8eb4082f416dd26479860a8836c5214682fe6,2024-08-08T12:17:08.037000
|
||||
CVE-2024-7159,0,1,f161368513fe8c60cf535ac3569767e9554d24847438af2d30a2a459d733b0c7,2024-08-08T12:15:56.080000
|
||||
CVE-2024-7160,0,0,39a8904dc42c635e004cd5b1ab82a58f9270ee9d90f27eafd7b2f7a3d898d30e,2024-08-08T11:59:02.483000
|
||||
CVE-2024-7161,0,0,3a84ea99e48e8a8d8048664ee759fce102c4899e7bf3a25b129131d6e118a2d3,2024-07-29T14:12:08.783000
|
||||
CVE-2024-7162,0,0,89a4bb0daa62a108ba37ba1cd76131a6b4592ff5908e4382e3ba0ccae44d808b,2024-07-29T14:12:08.783000
|
||||
CVE-2024-7163,0,0,81c756b3132cc48183d1a3c3acfd78fbea5503464491879bb3d1859dc5f53baf,2024-07-29T14:12:08.783000
|
||||
@ -259104,8 +259105,8 @@ CVE-2024-7166,0,0,2471fc9d9b4adea2a4a21ba89c51e6bd9133a6eafa6ec94da9724ccb80314f
|
||||
CVE-2024-7167,0,0,8e381ee0ac8313f716191f3edc8c82f168cf4449672c922534642a842be91b2f,2024-07-29T14:12:08.783000
|
||||
CVE-2024-7168,0,0,910224f79b3b67b053997cba38db0b80d710f3c8549be559cd68336fed4d2890,2024-07-29T14:12:08.783000
|
||||
CVE-2024-7169,0,0,f5980a4e5d2ccbce4c06d69d429b6969821394672e47084769e90ea39f080d62,2024-07-29T14:12:08.783000
|
||||
CVE-2024-7170,0,0,c911de3ed6eb8f888dabc0e3c5c43c4020953d0677c78f27e334ac1aaf9f28b3,2024-07-29T14:12:08.783000
|
||||
CVE-2024-7171,0,0,f9af9fb0c23fb7b822f7b4be7ea437b892bcf51d425201c5590fc38d73eb9531,2024-07-29T14:12:08.783000
|
||||
CVE-2024-7170,0,1,603f43696ee0ec9295da3bc03045332c3d9e7acd2fe26079660e5663d42c5dd9,2024-08-08T12:46:18.550000
|
||||
CVE-2024-7171,0,1,036dca614a1e9364d4eaff90070fc761bebdde7d325345f14ced7c694364a4d1,2024-08-08T12:39:09.323000
|
||||
CVE-2024-7172,0,0,bf11000a25aa390d844559afe580f0fa7d2d19a89cd008853f409aa8d14dd751,2024-08-06T12:51:40.243000
|
||||
CVE-2024-7173,0,0,6bb8cb47776fd61e45ff0c4670a366d389e4ca60f59d7257e1318c9d7c651362,2024-08-06T12:52:46.230000
|
||||
CVE-2024-7174,0,0,d36abd9cd6510076e70dd71c93b10f1e4d1fed543c9c27e06453ada743b13a00,2024-08-06T13:14:59.030000
|
||||
@ -259176,12 +259177,12 @@ CVE-2024-7275,0,0,73b728508a2e1fb139a6a6d96a6d39cb0fa47f6c3f9b9fdd8e3fc0433fa4a3
|
||||
CVE-2024-7276,0,0,47e0b22a39db4f3b96cb4674341816fecd6f82abeb59da97b1db22588166f635,2024-07-31T12:57:02.300000
|
||||
CVE-2024-7277,0,0,5e0b2075ce51543b4c24a0811908a6d5869c5676c5475ad8483a70814ea56a50,2024-07-31T12:57:02.300000
|
||||
CVE-2024-7278,0,0,9b390c5e32596c3a3cae5987d14eb37eb25956fed0fc10ed4854ba30802f1826,2024-07-31T12:57:02.300000
|
||||
CVE-2024-7279,0,0,46fae554a8eef870f134fffed708a79f08f89ec900ac2473cef2e46f74eacef8,2024-07-31T12:57:02.300000
|
||||
CVE-2024-7280,0,0,8eb6344acdc1694f969ab16301b70ee59188af384fc481ea9f830b000f173c32,2024-07-31T12:57:02.300000
|
||||
CVE-2024-7281,0,0,430818638539663c9ae07375f8e166f36e41d54b69a80c574ed1bf221809e990,2024-07-31T12:57:02.300000
|
||||
CVE-2024-7282,0,0,c15de1d5ace0f759c82fe636d0f239e027ecb7448ab049e9f2254cc44ad64a06,2024-07-31T12:57:02.300000
|
||||
CVE-2024-7283,0,0,5f59892389924cd896cab7a37d4f6d6b83ea0899e2134ca1b70418a4fc3071da,2024-07-31T12:57:02.300000
|
||||
CVE-2024-7284,0,0,abe27cd957ac6213cd9664cfded5ccc6d254ca85463730859995b7e4ee06c2b5,2024-07-31T12:57:02.300000
|
||||
CVE-2024-7279,0,1,0669689475561d3aca3e4342518c7c69803b8b0cff0c068ccf405f54015dec07,2024-08-08T13:57:09.313000
|
||||
CVE-2024-7280,0,1,48c575b4cf6652b58b84c63bbac6d4cc21fdeb7bed014958b4338538c7c0bccc,2024-08-08T13:56:04.987000
|
||||
CVE-2024-7281,0,1,878e786a4e433c6961a4936be4f0b9e2a9c535f1f3ea5308fabfdd12b567700f,2024-08-08T13:55:33.463000
|
||||
CVE-2024-7282,0,1,c8e44d7a08364e2e7fcb0a9314f8f52cc9787c21b4a2c9997ab91df79d9d7cf6,2024-08-08T13:54:32.003000
|
||||
CVE-2024-7283,0,1,0840157a9698278fccd84198279898afd79cbfedc16de1455ebae08e4d0168cf,2024-08-08T13:52:03.277000
|
||||
CVE-2024-7284,0,1,9bb087c7df17035abb573b3e7d617459334ebe99db4ac37ee1531c6a63296161,2024-08-08T13:49:32.727000
|
||||
CVE-2024-7285,0,0,f176cd8bc9982c902f8148328ffeb1793b66a515e1ed05b4abf708d186bdc53a,2024-07-31T12:57:02.300000
|
||||
CVE-2024-7286,0,0,70d99fdc0b8d2008b914ab6038a14d141c68a00138a428f2d97a34ab20236ac1,2024-07-31T12:57:02.300000
|
||||
CVE-2024-7287,0,0,d86206b0da6dbc58cd5747d4f785e5c1bd67b4856741e26966a99b3096234454,2024-07-31T12:57:02.300000
|
||||
@ -259225,7 +259226,8 @@ CVE-2024-7339,0,0,b22bc8c3b0525a6c98a03e6df13c491f10ced24284b84aa3889a1e52c55f16
|
||||
CVE-2024-7340,0,0,a3f98c82759b3c1463da2160a8c456e9c18de4cdd89227049824622069589bfd,2024-08-01T14:01:07.677000
|
||||
CVE-2024-7342,0,0,b2aae5a9033c72e024dcd6167950e24730a1a54d1040d58948e1e0708313f38d,2024-08-01T12:42:36.933000
|
||||
CVE-2024-7343,0,0,81acd094d4fc0681dfbdfb7143ed5e48e10c433b5dcce0c0a370d97e4141e1d6,2024-08-01T12:42:36.933000
|
||||
CVE-2024-7350,0,0,7376eedd7de24c10ce228d12b76e0f428eab38ad81d067ab3383e676b7e2bb53,2024-08-08T03:15:34.800000
|
||||
CVE-2024-7348,1,1,5ca9526ad20bc138a06c68a8e97c44a143c674bf56abfce73a881ed42401af92,2024-08-08T13:15:14.007000
|
||||
CVE-2024-7350,0,1,d4174556ac92d5e9a2a8dc8d5eec461477866543996df72c5d41b5df846ab0dc,2024-08-08T13:04:18.753000
|
||||
CVE-2024-7353,0,0,3261e094ba804f70c4c538de9d35bf008a53b0271751e64c6aecf340751dd360,2024-08-07T15:17:46.717000
|
||||
CVE-2024-7355,0,0,77eb32dc1810199d8dfd56b790a0cc073bb577f44b08cc26474823d677f5cfc6,2024-08-07T15:17:46.717000
|
||||
CVE-2024-7356,0,0,422e8f0e5351e2aaa94610787f75fca2971bce2e8243e94e1dab25149b00bf15,2024-08-05T12:41:45.957000
|
||||
@ -259290,8 +259292,8 @@ CVE-2024-7469,0,0,9480167bec5dcea6298d57f7311e33d09ca16fde559c0d2101bf57fd073ab0
|
||||
CVE-2024-7470,0,0,c378df60a1369914caa48d0c9b95c12c12b8030c63ff1d7f88f18ec0798c6329,2024-08-06T17:37:07.923000
|
||||
CVE-2024-7484,0,0,922e65f90a754867bdae2807b60c4750519990bf6adcc62fb148334df21e54c7,2024-08-06T16:30:24.547000
|
||||
CVE-2024-7485,0,0,0b34fc91c3d825ea4087a792a0e5c6d839cf66a581a05d0c60df64b0af48f97e,2024-08-06T16:30:24.547000
|
||||
CVE-2024-7486,0,0,a93f19031e9cacfcb521f51b21120568a6a9961babba3a25f4d91f40d89b23a1,2024-08-08T02:15:38.577000
|
||||
CVE-2024-7492,0,0,67f70fbea55f7cc4df630769c5d133a5830c10d221e156fd4afc33d816ed8208,2024-08-08T03:15:35.027000
|
||||
CVE-2024-7486,0,1,e2579b82a31704160b51da6f8b3285ef5bff1d765f5e0369c7378c4f856658fb,2024-08-08T13:04:18.753000
|
||||
CVE-2024-7492,0,1,6476a74ce2975ad097c7a45c1f2f905cc77480bec2260de48447ae3a8b41df62,2024-08-08T13:04:18.753000
|
||||
CVE-2024-7494,0,0,03118698edd12e94cf1110a03a023e325330cda1b40488ab50e531b2e6ace73f,2024-08-06T16:30:24.547000
|
||||
CVE-2024-7495,0,0,1d4e0bc3bd3cd1f2a04f242134024d84adf5fd40eab5c711a130f9e16780f0f1,2024-08-06T16:30:24.547000
|
||||
CVE-2024-7496,0,0,cd37afa0ba16d30d19318e89864195c5a3a1f3e971d1523ca4f93f707ed439d2,2024-08-06T16:30:24.547000
|
||||
@ -259332,14 +259334,14 @@ CVE-2024-7544,0,0,46916680993124ee8225685556f0e86002fa1598c424122f56da4660c1fd96
|
||||
CVE-2024-7545,0,0,3f097ebbd611ad4138ec1a3955ea96d707ad40d33be8dbb703c606b41a0411e2,2024-08-06T16:30:24.547000
|
||||
CVE-2024-7546,0,0,a0b520d000dce64c3863ed1b5eb696449d97e5ef3503a621e0cf62f26b7a1008,2024-08-06T16:30:24.547000
|
||||
CVE-2024-7547,0,0,a7dc0beedfe6604b5fe50ab4a1b4247c2920dee27f624b3cc2ef87158404641f,2024-08-06T16:30:24.547000
|
||||
CVE-2024-7548,0,0,954a9865ab53b14c8702b4852b9d51b3a40ae4296e316893376bcb8eb2e0d520,2024-08-08T06:15:42.170000
|
||||
CVE-2024-7548,0,1,a83134ab837c1f044f7727880755ec030be1b2bfb863a86ddf4e4c1bc02ee770,2024-08-08T13:04:18.753000
|
||||
CVE-2024-7550,0,0,5e19df9a1f8f540b00c55c515f79f184b598900dde8d5e8ce5b38708b290962c,2024-08-07T20:35:28.567000
|
||||
CVE-2024-7551,0,0,dbf9dc23563c066041d8414a99ca777ad2503e471da2fdcd73e493acc61d27d2,2024-08-06T16:30:24.547000
|
||||
CVE-2024-7552,0,0,811aa90d2d18bb406f73befc3765a8f78539782307b57a4dcd481925c3ed1f73,2024-08-07T21:29:57.417000
|
||||
CVE-2024-7553,0,0,8cae8dc852bea792d4c2710f2c690bc41b1ce3a8862535bcae9ff87aa3b3b09b,2024-08-07T15:17:46.717000
|
||||
CVE-2024-7554,1,1,6e5dd25771b29c06956ec863d136fc8d8e298f9a2f688fe94452db99739fa3c8,2024-08-08T11:15:13.633000
|
||||
CVE-2024-7560,0,0,e571f6da4f32049855c1b8111c98aaef8eea1643cf2b512d998f681a56a9abb7,2024-08-08T02:15:38.797000
|
||||
CVE-2024-7561,0,0,3a8313cf11cbdbf7ca13762654b4aa6c4a784b06b6c5fa2638cdcd51c7cec6d2,2024-08-08T02:15:39.017000
|
||||
CVE-2024-7554,0,1,4a573fb2ab24355a17092729215e215195bfd8edf91c08645b945dde25aae201,2024-08-08T13:04:18.753000
|
||||
CVE-2024-7560,0,1,69bf0d3c1d2353061d3a66813d4df2a8a02417391648b6018a10fb1d777785c6,2024-08-08T13:04:18.753000
|
||||
CVE-2024-7561,0,1,4f145ac8bff9e09f18481f098864cf0c68d07bfaa0facd60438519477eaf9cd1,2024-08-08T13:04:18.753000
|
||||
CVE-2024-7564,0,0,9647575e3fbd33f04dc9f7112e25f0abbbf3e6266c5fe28f9ec18868dfbd0106,2024-08-07T19:59:36.240000
|
||||
CVE-2024-7578,0,0,b6bbbe6806d90851e9605226b169eb3886b74a9a004ee0ed2d1a7a6c6021a17c,2024-08-07T15:17:46.717000
|
||||
CVE-2024-7579,0,0,817d773679e171b3efe6c6fcafc252202771d29e88541ab785b97216648f2295,2024-08-07T15:17:46.717000
|
||||
@ -259349,4 +259351,4 @@ CVE-2024-7582,0,0,b2d3b66c4626672326cfa5879fd1bb0c567c41ab2acaf7c209fbd5f365a390
|
||||
CVE-2024-7583,0,0,bc6ffa2c62b37fdf56f2749a782cbb82d0821bb8b7c19b37f044ef4c72e8c76b,2024-08-07T19:09:46.290000
|
||||
CVE-2024-7584,0,0,4fcdc2a13c9feca59db2e84c5a59d4157b22ea97693367754e992172fea915a0,2024-08-07T19:09:46.290000
|
||||
CVE-2024-7585,0,0,f430436cbc2d07d02eb06f2560db059a8be4c4fc5fe45b044f21a316cfb5ecfc,2024-08-07T19:09:46.290000
|
||||
CVE-2024-7610,1,1,42d00e8652249cc45c9cfe5c108609f87705bb37ca86d0ed210177227c3f82b8,2024-08-08T11:15:13.857000
|
||||
CVE-2024-7610,0,1,a10689bea1d0fbdec4f1b8819e74182773158d5010cb9fbea2ce46532922c645,2024-08-08T13:04:18.753000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user