mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
Auto-Update: 2024-10-02T18:00:19.734939+00:00
This commit is contained in:
parent
ce357bf17e
commit
722b9ed3d4
File diff suppressed because it is too large
Load Diff
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-3426",
|
||||
"sourceIdentifier": "security@liferay.com",
|
||||
"published": "2023-08-02T10:15:09.887",
|
||||
"lastModified": "2023-08-05T03:45:57.627",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-02T16:15:08.500",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -76,7 +76,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
"value": "CWE-425"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-39059",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-28T22:15:08.983",
|
||||
"lastModified": "2023-08-30T00:30:06.513",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-02T16:35:25.547",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -45,6 +45,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-39508",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2023-08-05T07:15:43.607",
|
||||
"lastModified": "2023-08-09T17:52:57.137",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-02T17:35:14.147",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-45640",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-10-25T18:17:33.567",
|
||||
"lastModified": "2023-11-01T16:19:20.753",
|
||||
"lastModified": "2024-10-02T17:44:06.180",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -80,9 +80,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:technowich:wp_ulike_-_most_advanced_wordpress_marketing_toolkit:*:*:*:*:*:wordpress:*:*",
|
||||
"criteria": "cpe:2.3:a:technowich:wp_ulike:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "4.6.8",
|
||||
"matchCriteriaId": "9581A6A3-6F20-469C-BAB4-34352C5C6B39"
|
||||
"matchCriteriaId": "5F73BFF4-FB94-4C8E-892E-7576F05ADA5B"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-51157",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-25T19:15:04.453",
|
||||
"lastModified": "2024-09-26T13:32:02.803",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-02T16:58:20.160",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://infosecwriteups.com/xss-store-in-zkteco-welcome-to-wdms-3d5c8e1113f0",
|
||||
"source": "cve@mitre.org"
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:zkteco:wdms:5.1.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "24D5B083-72D5-4C4B-8902-FDED10E702F6"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://infosecwriteups.com/xss-store-in-zkteco-welcome-to-wdms-3d5c8e1113f0",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-203xx/CVE-2024-20365.json
Normal file
56
CVE-2024/CVE-2024-203xx/CVE-2024-20365.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-20365",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-10-02T17:15:14.863",
|
||||
"lastModified": "2024-10-02T17:15:14.863",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the Redfish API of Cisco UCS B-Series, Cisco UCS Managed C-Series, and Cisco UCS X-Series Servers could allow an authenticated, remote attacker with administrative privileges to perform command injection attacks on an affected system and elevate privileges to root.\r\n\r\nThis vulnerability is due to insufficient input validation. An attacker with administrative privileges could exploit this vulnerability by sending crafted commands through the Redfish API on an affected device. A successful exploit could allow the attacker to elevate privileges to root."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cimc-redfish-cominj-sbkv5ZZ",
|
||||
"source": "ykramarz@cisco.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-203xx/CVE-2024-20385.json
Normal file
56
CVE-2024/CVE-2024-203xx/CVE-2024-20385.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-20385",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-10-02T17:15:15.110",
|
||||
"lastModified": "2024-10-02T17:15:15.110",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the SSL/TLS implementation of Cisco Nexus Dashboard Orchestrator (NDO) could allow an unauthenticated, remote attacker to intercept sensitive information from an affected device. \r\n\r\nThis vulnerability exists because the Cisco NDO Validate Peer Certificate site management feature validates the certificates for Cisco Application Policy Infrastructure Controller (APIC), Cisco Cloud Network Controller (CNC), and Cisco Nexus Dashboard only when a new site is added or an existing one is reregistered. An attacker could exploit this vulnerability by using machine-in-the-middle techniques to intercept the traffic between the affected device and Cisco NDO and then using a crafted certificate to impersonate the affected device. A successful exploit could allow the attacker to learn sensitive information during communications between these devices."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-295"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndo-tlsvld-FdUF3cpw",
|
||||
"source": "ykramarz@cisco.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-203xx/CVE-2024-20393.json
Normal file
56
CVE-2024/CVE-2024-203xx/CVE-2024-20393.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-20393",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-10-02T17:15:15.337",
|
||||
"lastModified": "2024-10-02T17:15:15.337",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the web-based management interface of Cisco Small Business RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers could allow an authenticated, remote attacker to elevate privileges on an affected device.\r\n\r\nThis vulnerability exists because the web-based management interface discloses sensitive information. An attacker could exploit this vulnerability by sending crafted HTTP input to an affected device. A successful exploit could allow an attacker to elevate privileges from guest to admin."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-285"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv34x-privesc-rce-qE33TCms",
|
||||
"source": "ykramarz@cisco.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-204xx/CVE-2024-20432.json
Normal file
56
CVE-2024/CVE-2024-204xx/CVE-2024-20432.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-20432",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-10-02T17:15:15.550",
|
||||
"lastModified": "2024-10-02T17:15:15.550",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the REST API and web UI of Cisco Nexus Dashboard Fabric Controller (NDFC) could allow an authenticated, low-privileged, remote attacker to perform a command injection attack against an affected device.\r\n \r\nThis vulnerability is due to improper user authorization and insufficient validation of command arguments. An attacker could exploit this vulnerability by submitting crafted commands to an affected REST API endpoint or through the web UI. A successful exploit could allow the attacker to execute arbitrary commands on the CLI of a Cisco NDFC-managed device with network-admin privileges.\r\n \r\nNote: This vulnerability does not affect Cisco NDFC when it is configured for storage area network (SAN) controller deployment."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.9,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndfc-cmdinj-UvYZrKfr",
|
||||
"source": "ykramarz@cisco.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-204xx/CVE-2024-20438.json
Normal file
56
CVE-2024/CVE-2024-204xx/CVE-2024-20438.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-20438",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-10-02T17:15:15.753",
|
||||
"lastModified": "2024-10-02T17:15:15.753",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the REST API endpoints of Cisco NDFC could allow an authenticated, low-privileged, remote attacker to read or write files on an affected device.\r\n\r\nThis vulnerability exists because of missing authorization controls on some REST API endpoints. An attacker could exploit this vulnerability by sending crafted API requests to an affected endpoint. A successful exploit could allow the attacker to perform limited network-admin functions such as reading device configuration information, uploading files, and modifying uploaded files.\r\nNote: This vulnerability only affects a subset of REST API endpoints and does not affect the web-based management interface."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-693"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndhs-uaapi-Jh4V6zpN",
|
||||
"source": "ykramarz@cisco.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-204xx/CVE-2024-20441.json
Normal file
56
CVE-2024/CVE-2024-204xx/CVE-2024-20441.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-20441",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-10-02T17:15:15.967",
|
||||
"lastModified": "2024-10-02T17:15:15.967",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in a specific REST API endpoint of Cisco NDFC could allow an authenticated, low-privileged, remote attacker to learn sensitive information on an affected device.\r\n\r\nThis vulnerability is due to insufficient authorization controls on the affected REST API endpoint. An attacker could exploit this vulnerability by sending crafted API requests to the affected endpoint. A successful exploit could allow the attacker to download config only or full backup files and learn sensitive configuration information. This vulnerability only affects a specific REST API endpoint and does not affect the web-based management interface."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-285"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndhs-uaapi-Jh4V6zpN",
|
||||
"source": "ykramarz@cisco.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-204xx/CVE-2024-20442.json
Normal file
56
CVE-2024/CVE-2024-204xx/CVE-2024-20442.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-20442",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-10-02T17:15:16.177",
|
||||
"lastModified": "2024-10-02T17:15:16.177",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the REST API endpoints of Cisco Nexus Dashboard could allow an authenticated, low-privileged, remote attacker to perform limited Administrator actions on an affected device.\r\n\r\nThis vulnerability is due to insufficient authorization controls on some REST API endpoints. An attacker could exploit this vulnerability by sending crafted API requests to an affected endpoint. A successful exploit could allow the attacker to perform limited Administrator functions such as viewing portions of the web UI, generating config only or full backup files, and deleting tech support files. This vulnerability only affects a subset of REST API endpoints and does not affect the web-based management interface."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndhs-uaapi-Jh4V6zpN",
|
||||
"source": "ykramarz@cisco.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-204xx/CVE-2024-20444.json
Normal file
56
CVE-2024/CVE-2024-204xx/CVE-2024-20444.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-20444",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-10-02T17:15:16.390",
|
||||
"lastModified": "2024-10-02T17:15:16.390",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in Cisco Nexus Dashboard Fabric Controller (NDFC), formerly Cisco Data Center Network Manager (DCNM), could allow an authenticated, remote attacker with network-admin privileges to perform a command injection attack against an affected device.\r\n \r\nThis vulnerability is due to insufficient validation of command arguments. An attacker could exploit this vulnerability by submitting crafted command arguments to a specific REST API endpoint. A successful exploit could allow the attacker to overwrite sensitive files or crash a specific container, which would restart on its own, causing a low-impact denial of service (DoS) condition."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 4.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-88"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndfc-raci-T46k3jnN",
|
||||
"source": "ykramarz@cisco.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-204xx/CVE-2024-20448.json
Normal file
56
CVE-2024/CVE-2024-204xx/CVE-2024-20448.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-20448",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-10-02T17:15:16.597",
|
||||
"lastModified": "2024-10-02T17:15:16.597",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the Cisco Nexus Dashboard Fabric Controller (NDFC) software, formerly Cisco Data Center Network Manager (DCNM), could allow an attacker with access to a backup file to view sensitive information.\r\n\r\nThis vulnerability is due to the improper storage of sensitive information within config only and full backup files. An attacker could exploit this vulnerability by parsing the contents of a backup file that is generated from an affected device. A successful exploit could allow the attacker to access sensitive information, including NDFC-connected device credentials, the NDFC site manager private key, and the scheduled backup file encryption key."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 4.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-313"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndfc-cidv-XvyX2wLj",
|
||||
"source": "ykramarz@cisco.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-204xx/CVE-2024-20449.json
Normal file
56
CVE-2024/CVE-2024-204xx/CVE-2024-20449.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-20449",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-10-02T17:15:16.820",
|
||||
"lastModified": "2024-10-02T17:15:16.820",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in Cisco Nexus Dashboard Fabric Controller (NDFC) could allow an authenticated, remote attacker with low privileges to execute arbitrary code on an affected device.\r\n\r\nThis vulnerability is due to improper path validation. An attacker could exploit this vulnerability by using the Secure Copy Protocol (SCP) to upload malicious code to an affected device using path traversal techniques. A successful exploit could allow the attacker to execute arbitrary code in a specific container with the privileges of root."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-23"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndfc-ptrce-BUSHLbp",
|
||||
"source": "ykramarz@cisco.com"
|
||||
}
|
||||
]
|
||||
}
|
33
CVE-2024/CVE-2024-204xx/CVE-2024-20470.json
Normal file
33
CVE-2024/CVE-2024-204xx/CVE-2024-20470.json
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
"id": "CVE-2024-20470",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-10-02T17:15:17.027",
|
||||
"lastModified": "2024-10-02T17:15:17.027",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the web-based management interface of Cisco Small Business RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers could allow an authenticated, remote attacker to execute arbitrary code on an affected device. In order to exploit this vulnerability, the attacker must have valid admin credentials.\r\n\r\nThis vulnerability exists because the web-based management interface does not sufficiently validate user-supplied input. An attacker could exploit this vulnerability by sending crafted HTTP input to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-146"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv34x-privesc-rce-qE33TCms",
|
||||
"source": "ykramarz@cisco.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-204xx/CVE-2024-20477.json
Normal file
56
CVE-2024/CVE-2024-204xx/CVE-2024-20477.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-20477",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-10-02T17:15:17.130",
|
||||
"lastModified": "2024-10-02T17:15:17.130",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in a specific REST API endpoint of Cisco NDFC could allow an authenticated, low-privileged, remote attacker to upload or delete files on an affected device.\r\n\r\nThis vulnerability exists because of missing authorization controls on the affected REST API endpoint. An attacker could exploit this vulnerability by sending crafted API requests to the affected endpoint. A successful exploit could allow the attacker to upload files into a specific container or delete files from a specific folder within that container. This vulnerability only affects a specific REST API endpoint and does not affect the web-based management interface."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndhs-uaapi-Jh4V6zpN",
|
||||
"source": "ykramarz@cisco.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-204xx/CVE-2024-20490.json
Normal file
56
CVE-2024/CVE-2024-204xx/CVE-2024-20490.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-20490",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-10-02T17:15:17.350",
|
||||
"lastModified": "2024-10-02T17:15:17.350",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in a logging function of Cisco Nexus Dashboard Fabric Controller (NDFC) and Cisco Nexus Dashboard Orchestrator (NDO) could allow an attacker with access to a tech support file to view sensitive information.\r\n\r\nThis vulnerability exists because HTTP proxy credentials could be recorded in an internal log that is stored in the tech support file. An attacker could exploit this vulnerability by accessing a tech support file that is generated from an affected system. A successful exploit could allow the attacker to view HTTP proxy server admin credentials in clear text that are configured on Nexus Dashboard to reach an external network.\r\nNote: Best practice is to store debug logs and tech support files safely and to share them only with trusted parties because they may contain sensitive information."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 4.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndhs-idv-Bk8VqEDc",
|
||||
"source": "ykramarz@cisco.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-204xx/CVE-2024-20491.json
Normal file
56
CVE-2024/CVE-2024-204xx/CVE-2024-20491.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-20491",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-10-02T17:15:17.563",
|
||||
"lastModified": "2024-10-02T17:15:17.563",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in a logging function of Cisco Nexus Dashboard Insights could allow an attacker with access to a tech support file to view sensitive information.\r\n\r\nThis vulnerability exists because remote controller credentials are recorded in an internal log that is stored in the tech support file. An attacker could exploit this vulnerability by accessing a tech support file that is generated from an affected system. A successful exploit could allow the attacker to view remote controller admin credentials in clear text.\r\nNote: Best practice is to store debug logs and tech support files safely and to share them only with trusted parties because they may contain sensitive information."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 4.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndhs-idv-Bk8VqEDc",
|
||||
"source": "ykramarz@cisco.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-204xx/CVE-2024-20492.json
Normal file
56
CVE-2024/CVE-2024-204xx/CVE-2024-20492.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-20492",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-10-02T17:15:17.763",
|
||||
"lastModified": "2024-10-02T17:15:17.763",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the restricted shell of Cisco Expressway Series could allow an authenticated, local attacker to perform command injection attacks on the underlying operating system and elevate privileges to root. To exploit this vulnerability, the attacker must have Administrator-level credentials with read-write privileges on an affected device.\r\n\r\nThis vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by submitting a series of crafted CLI commands. A successful exploit could allow the attacker to escape the restricted shell and gain root privileges on the underlying operating system of the affected device.\r\nNote: Cisco Expressway Series refers to Cisco Expressway Control (Expressway-C) devices and Cisco Expressway Edge (Expressway-E) devices."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.0,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-expw-escalation-3bkz77bD",
|
||||
"source": "ykramarz@cisco.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-205xx/CVE-2024-20515.json
Normal file
56
CVE-2024/CVE-2024-205xx/CVE-2024-20515.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-20515",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-10-02T17:15:17.973",
|
||||
"lastModified": "2024-10-02T17:15:17.973",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to obtain sensitive information from an affected device.\r\n\r\nThis vulnerability is due to a lack of proper data protection mechanisms for certain configuration settings. An attacker with Read-Only Administrator privileges could exploit this vulnerability by browsing to a page that contains sensitive data. A successful exploit could allow the attacker to view device credentials that are normally not visible to Read-Only Administrators."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-311"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-info-disc-ZYF2nEEX",
|
||||
"source": "ykramarz@cisco.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-205xx/CVE-2024-20516.json
Normal file
56
CVE-2024/CVE-2024-205xx/CVE-2024-20516.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-20516",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-10-02T17:15:18.200",
|
||||
"lastModified": "2024-10-02T17:15:18.200",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the web-based management interface of Cisco Small Business RV042, RV042G, RV320, and RV325 Routers could allow an authenticated, Administrator-level, remote attacker to cause an unexpected reload of an affected device, resulting in a denial of service (DoS) condition. To exploit this vulnerability, an attacker would need to have valid Administrator credentials on the affected device.\r\n \r\nThis vulnerability is due to improper validation of user input that is in incoming HTTP packets. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web-based management interface of the affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a DoS condition."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 4.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-122"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv04x_rv32x_vulns-yJ2OSDhV",
|
||||
"source": "ykramarz@cisco.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-205xx/CVE-2024-20517.json
Normal file
56
CVE-2024/CVE-2024-205xx/CVE-2024-20517.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-20517",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-10-02T17:15:18.417",
|
||||
"lastModified": "2024-10-02T17:15:18.417",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the web-based management interface of Cisco Small Business RV042, RV042G, RV320, and RV325 Routers could allow an authenticated, Administrator-level, remote attacker to cause an unexpected reload of an affected device, resulting in a denial of service (DoS) condition. To exploit this vulnerability, an attacker would need to have valid Administrator credentials on the affected device.\r\n \r\nThis vulnerability is due to improper validation of user input that is in incoming HTTP packets. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web-based management interface of the affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a DoS condition."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 4.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-122"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv04x_rv32x_vulns-yJ2OSDhV",
|
||||
"source": "ykramarz@cisco.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-205xx/CVE-2024-20518.json
Normal file
56
CVE-2024/CVE-2024-205xx/CVE-2024-20518.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-20518",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-10-02T17:15:18.637",
|
||||
"lastModified": "2024-10-02T17:15:18.637",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the web-based management interface of Cisco Small Business RV042, RV042G, RV320, and RV325 Routers could allow an authenticated, Administrator-level, remote attacker to execute arbitrary code as the root user. To exploit this vulnerability, an attacker would need to have valid Administrator credentials on the affected device.\r\n \r\nThis vulnerability is due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit this vulnerability by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code on the underlying operating system as the root user."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv04x_rv32x_vulns-yJ2OSDhV",
|
||||
"source": "ykramarz@cisco.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-205xx/CVE-2024-20519.json
Normal file
56
CVE-2024/CVE-2024-205xx/CVE-2024-20519.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-20519",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-10-02T17:15:18.837",
|
||||
"lastModified": "2024-10-02T17:15:18.837",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the web-based management interface of Cisco Small Business RV042, RV042G, RV320, and RV325 Routers could allow an authenticated, Administrator-level, remote attacker to execute arbitrary code as the root user. To exploit this vulnerability, an attacker would need to have valid Administrator credentials on the affected device.\r\n \r\nThis vulnerability is due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit this vulnerability by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code on the underlying operating system as the root user."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv04x_rv32x_vulns-yJ2OSDhV",
|
||||
"source": "ykramarz@cisco.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-205xx/CVE-2024-20520.json
Normal file
56
CVE-2024/CVE-2024-205xx/CVE-2024-20520.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-20520",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-10-02T17:15:19.050",
|
||||
"lastModified": "2024-10-02T17:15:19.050",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the web-based management interface of Cisco Small Business RV042, RV042G, RV320, and RV325 Routers could allow an authenticated, Administrator-level, remote attacker to execute arbitrary code as the root user. To exploit this vulnerability, an attacker would need to have valid Administrator credentials on the affected device.\r\n \r\nThis vulnerability is due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit this vulnerability by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code on the underlying operating system as the root user."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv04x_rv32x_vulns-yJ2OSDhV",
|
||||
"source": "ykramarz@cisco.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-205xx/CVE-2024-20521.json
Normal file
56
CVE-2024/CVE-2024-205xx/CVE-2024-20521.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-20521",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-10-02T17:15:19.280",
|
||||
"lastModified": "2024-10-02T17:15:19.280",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the web-based management interface of Cisco Small Business RV042, RV042G, RV320, and RV325 Routers could allow an authenticated, Administrator-level, remote attacker to execute arbitrary code as the root user. To exploit this vulnerability, an attacker would need to have valid Administrator credentials on the affected device.\r\n \r\nThis vulnerability is due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit this vulnerability by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code on the underlying operating system as the root user."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv04x_rv32x_vulns-yJ2OSDhV",
|
||||
"source": "ykramarz@cisco.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-205xx/CVE-2024-20522.json
Normal file
56
CVE-2024/CVE-2024-205xx/CVE-2024-20522.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-20522",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-10-02T17:15:19.490",
|
||||
"lastModified": "2024-10-02T17:15:19.490",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the web-based management interface of Cisco Small Business RV042, RV042G, RV320, and RV325 Routers could allow an authenticated, Administrator-level, remote attacker to cause an unexpected reload of an affected device, resulting in a denial of service (DoS) condition. To exploit this vulnerability, an attacker would need to have valid Administrator credentials on the affected device.\r\n \r\nThis vulnerability is due to improper validation of user input that is in incoming HTTP packets. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web-based management interface of the affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a DoS condition."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-122"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv04x_rv32x_vulns-yJ2OSDhV",
|
||||
"source": "ykramarz@cisco.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-205xx/CVE-2024-20523.json
Normal file
56
CVE-2024/CVE-2024-205xx/CVE-2024-20523.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-20523",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-10-02T17:15:19.707",
|
||||
"lastModified": "2024-10-02T17:15:19.707",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the web-based management interface of Cisco Small Business RV042, RV042G, RV320, and RV325 Routers could allow an authenticated, Administrator-level, remote attacker to cause an unexpected reload of an affected device, resulting in a denial of service (DoS) condition. To exploit this vulnerability, an attacker would need to have valid Administrator credentials on the affected device.\r\n \r\nThis vulnerability is due to improper validation of user input that is in incoming HTTP packets. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web-based management interface of the affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a DoS condition."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 4.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv04x_rv32x_vulns-yJ2OSDhV",
|
||||
"source": "ykramarz@cisco.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-205xx/CVE-2024-20524.json
Normal file
56
CVE-2024/CVE-2024-205xx/CVE-2024-20524.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-20524",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-10-02T17:15:19.930",
|
||||
"lastModified": "2024-10-02T17:15:19.930",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the web-based management interface of Cisco Small Business RV042, RV042G, RV320, and RV325 Routers could allow an authenticated, Administrator-level, remote attacker to cause an unexpected reload of an affected device, resulting in a denial of service (DoS) condition. To exploit this vulnerability, an attacker would need to have valid Administrator credentials on the affected device.\r\n \r\nThis vulnerability is due to improper validation of user input that is in incoming HTTP packets. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web-based management interface of the affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a DoS condition."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 4.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv04x_rv32x_vulns-yJ2OSDhV",
|
||||
"source": "ykramarz@cisco.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-25143",
|
||||
"sourceIdentifier": "security@liferay.com",
|
||||
"published": "2024-02-07T15:15:08.907",
|
||||
"lastModified": "2024-02-07T17:04:54.407",
|
||||
"lastModified": "2024-10-02T16:15:09.833",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -46,7 +46,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-400"
|
||||
"value": "CWE-770"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-25144",
|
||||
"sourceIdentifier": "security@liferay.com",
|
||||
"published": "2024-02-08T04:15:07.763",
|
||||
"lastModified": "2024-02-15T04:36:24.350",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-02T16:15:09.950",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -76,7 +76,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-834"
|
||||
"value": "CWE-835"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-25148",
|
||||
"sourceIdentifier": "security@liferay.com",
|
||||
"published": "2024-02-08T04:15:08.240",
|
||||
"lastModified": "2024-02-15T04:37:31.957",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-02T16:15:10.087",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -76,7 +76,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
"value": "CWE-201"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-26265",
|
||||
"sourceIdentifier": "security@liferay.com",
|
||||
"published": "2024-02-20T13:15:08.673",
|
||||
"lastModified": "2024-02-20T19:50:53.960",
|
||||
"lastModified": "2024-10-02T16:15:10.190",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -46,7 +46,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-400"
|
||||
"value": "CWE-770"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
21
CVE-2024/CVE-2024-332xx/CVE-2024-33209.json
Normal file
21
CVE-2024/CVE-2024-332xx/CVE-2024-33209.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-33209",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-02T16:15:10.300",
|
||||
"lastModified": "2024-10-02T16:15:10.300",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "FlatPress v1.3 is vulnerable to Cross Site Scripting (XSS). An attacker can inject malicious JavaScript code into the \"Add New Entry\" section, which allows them to execute arbitrary code in the context of a victim's web browser."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/paragbagul111/CVE-2024-33209",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-332xx/CVE-2024-33210.json
Normal file
56
CVE-2024/CVE-2024-332xx/CVE-2024-33210.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-33210",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-02T16:15:10.383",
|
||||
"lastModified": "2024-10-02T16:35:30.553",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A cross-site scripting (XSS) vulnerability has been identified in Flatpress 1.3. This vulnerability allows an attacker to inject malicious scripts into web pages viewed by other users."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/paragbagul111/CVE-2024-33210",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-412xx/CVE-2024-41290.json
Normal file
21
CVE-2024/CVE-2024-412xx/CVE-2024-41290.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-41290",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-02T17:15:20.217",
|
||||
"lastModified": "2024-10-02T17:15:20.217",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "FlatPress CMS v1.3.1 1.3 was discovered to use insecure methods to store authentication data via the cookie's component."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/paragbagul111/CVE-2024-41290",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-44097",
|
||||
"sourceIdentifier": "dsap-vuln-management@google.com",
|
||||
"published": "2024-10-02T14:15:05.670",
|
||||
"lastModified": "2024-10-02T14:15:05.670",
|
||||
"lastModified": "2024-10-02T17:35:15.257",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,30 @@
|
||||
"value": "According to the researcher: \"The TLS connections are encrypted against tampering or eavesdropping. However, the application does not validate the server certificate properly while initializing the TLS connection. This allows for a network attacker to intercept the connection and read the data. The attacker could the either send the client a malicious response, or forward the (possibly modified) data to the real server.\""
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "dsap-vuln-management@google.com",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-46080",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-01T21:15:06.767",
|
||||
"lastModified": "2024-10-01T21:15:06.767",
|
||||
"lastModified": "2024-10-02T16:35:31.633",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Scriptcase v9.10.023 and before is vulnerable to Remote Code Execution (RCE) via the nm_zip function."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Scriptcase v9.10.023 y anteriores son vulnerables a la ejecuci\u00f3n remota de c\u00f3digo (RCE) a trav\u00e9s de la funci\u00f3n nm_zip."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.0,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://blog.hawktesters.com/zero-day-alert-scriptcase-vulnerabilities-rce/",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-46082",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-01T21:15:06.857",
|
||||
"lastModified": "2024-10-01T21:15:06.857",
|
||||
"lastModified": "2024-10-02T16:35:32.440",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Scriptcase v.9.10.023 and before is vulnerable to Cross Site Scripting (XSS) in nm_cor.php via the form and field parameters."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Scriptcase v.9.10.023 y anteriores son vulnerables a Cross Site Scripting (XSS) en nm_cor.php a trav\u00e9s de los par\u00e1metros de formulario y campo."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://blog.hawktesters.com/zero-day-alert-scriptcase-vulnerabilities-rce/",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-46084",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-01T21:15:06.950",
|
||||
"lastModified": "2024-10-01T21:15:06.950",
|
||||
"lastModified": "2024-10-02T16:35:33.230",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Scriptcase 9.10.023 and before is vulnerable to Remote Code Execution (RCE) via the nm_unzip function."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Scriptcase 9.10.023 y anteriores son vulnerables a la ejecuci\u00f3n remota de c\u00f3digo (RCE) a trav\u00e9s de la funci\u00f3n nm_unzip."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.0,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://scriptcase.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-46488",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-25T18:15:05.143",
|
||||
"lastModified": "2024-09-26T13:32:02.803",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-02T16:21:36.507",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,30 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://github.com/VulnSphere/LLMVulnSphere/blob/main/VectorDB/sqlite-vec/OOBR_2.md",
|
||||
"source": "cve@mitre.org"
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:asg017:sqlite-vec:0.1.1:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "15891C1C-178A-4DA1-AA12-80E555327942"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/VulnSphere/LLMVulnSphere/blob/main/VectorDB/sqlite-vec/OOBR_2.md",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-46489",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-25T18:15:05.227",
|
||||
"lastModified": "2024-09-26T16:35:24.797",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-02T16:24:32.300",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,30 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://github.com/VulnSphere/LLMVulnSphere/blob/main/Prompt/promptr/RCE_FC_6.0.7.md",
|
||||
"source": "cve@mitre.org"
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ferrislucas:promptr:6.0.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B4444BC2-DC3A-4DBA-A023-6220D94D03FB"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/VulnSphere/LLMVulnSphere/blob/main/Prompt/promptr/RCE_FC_6.0.7.md",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-466xx/CVE-2024-46626.json
Normal file
56
CVE-2024/CVE-2024-466xx/CVE-2024-46626.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-46626",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-02T17:15:20.320",
|
||||
"lastModified": "2024-10-02T17:35:15.457",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "OS4ED openSIS-Classic v9.1 was discovered to contain a SQL injection vulnerability via a crafted payload."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/d0ub1edd/CVE-Reference/blob/main/CVE-2024-46626.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-47197",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-09-26T08:15:06.587",
|
||||
"lastModified": "2024-09-26T13:32:02.803",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-02T17:25:36.990",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,11 +15,44 @@
|
||||
"value": "Exposici\u00f3n de informaci\u00f3n confidencial a un actor no autorizado, vulnerabilidad de almacenamiento inseguro de informaci\u00f3n confidencial en el complemento Maven Archetype. Este problema afecta al complemento Maven Archetype: desde la versi\u00f3n 3.2.1 hasta la 3.3.0. Se recomienda a los usuarios que actualicen a la versi\u00f3n 3.3.0, que soluciona el problema. Las pruebas de integraci\u00f3n de Archetype crean un archivo llamado ./target/classes/archetype-it/archetype-settings.xml. Este archivo contiene todo el contenido del archivo ~/.m2/settings.xml de los usuarios, que a menudo contiene informaci\u00f3n que no desean publicar. Esperamos que en muchas m\u00e1quinas de desarrolladores, esto tambi\u00e9n contenga credenciales. Cuando el usuario ejecuta mvn verificar nuevamente (sin un mvn clean), este archivo se convierte en parte del artefacto final. Si un desarrollador publicara esto en Maven Central o cualquier otro repositorio remoto (ya sea como una versi\u00f3n o una instant\u00e1nea), sus credenciales se publicar\u00edan sin que ellos lo supieran."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@apache.org",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-922"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security@apache.org",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -32,10 +65,30 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://lists.apache.org/thread/ftg81np183wnyk0kg4ks95dvgxdrof96",
|
||||
"source": "security@apache.org"
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:maven_archetype:3.2.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A159A60A-09F5-49B5-A159-E530CACDA1B9"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://lists.apache.org/thread/ftg81np183wnyk0kg4ks95dvgxdrof96",
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-47305",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-09-25T18:15:05.617",
|
||||
"lastModified": "2024-09-26T13:32:02.803",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-02T16:35:40.077",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/use-any-font/wordpress-use-any-font-plugin-6-3-08-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:dineshkarki:use_any_font:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "6.3.09",
|
||||
"matchCriteriaId": "069F1F5A-EE12-476C-A65E-CA57760269E6"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/use-any-font/wordpress-use-any-font-plugin-6-3-08-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-47330",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-09-26T03:15:02.670",
|
||||
"lastModified": "2024-09-26T13:32:02.803",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-02T17:26:49.470",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -51,14 +71,44 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/slider-by-supsystic/wordpress-slider-by-supsystic-plugin-1-8-6-broken-access-control-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:supsystic:slider:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "1.8.7",
|
||||
"matchCriteriaId": "21F2152C-561F-4210-9FC1-42D1150AEAB0"
|
||||
},
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/social-share-buttons-by-supsystic/wordpress-social-share-buttons-by-supsystic-plugin-2-2-9-broken-access-control-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:supsystic:social_share_buttons:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "2.2.9",
|
||||
"matchCriteriaId": "963DF36C-363D-4EA8-A988-466FC0213E69"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/slider-by-supsystic/wordpress-slider-by-supsystic-plugin-1-8-6-broken-access-control-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/social-share-buttons-by-supsystic/wordpress-social-share-buttons-by-supsystic-plugin-2-2-9-broken-access-control-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-47611",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-10-02T15:15:14.980",
|
||||
"lastModified": "2024-10-02T15:15:14.980",
|
||||
"lastModified": "2024-10-02T16:35:34.060",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -55,6 +55,28 @@
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 0.0,
|
||||
"baseSeverity": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 0.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
|
21
CVE-2024/CVE-2024-478xx/CVE-2024-47803.json
Normal file
21
CVE-2024/CVE-2024-478xx/CVE-2024-47803.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-47803",
|
||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||
"published": "2024-10-02T16:15:10.630",
|
||||
"lastModified": "2024-10-02T16:15:10.630",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Jenkins 2.478 and earlier, LTS 2.462.2 and earlier does not redact multi-line secret values in error messages generated for form submissions involving the `secretTextarea` form field."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.jenkins.io/security/advisory/2024-10-02/#SECURITY-3451",
|
||||
"source": "jenkinsci-cert@googlegroups.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-478xx/CVE-2024-47804.json
Normal file
21
CVE-2024/CVE-2024-478xx/CVE-2024-47804.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-47804",
|
||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||
"published": "2024-10-02T16:15:10.697",
|
||||
"lastModified": "2024-10-02T16:15:10.697",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "If an attempt is made to create an item of a type prohibited by `ACL#hasCreatePermission2` or `TopLevelItemDescriptor#isApplicableIn(ItemGroup)` through the Jenkins CLI or the REST API and either of these checks fail, Jenkins 2.478 and earlier, LTS 2.462.2 and earlier creates the item in memory, only deleting it from disk, allowing attackers with Item/Configure permission to save the item to persist it, effectively bypassing the item creation restriction."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.jenkins.io/security/advisory/2024-10-02/#SECURITY-3448",
|
||||
"source": "jenkinsci-cert@googlegroups.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-478xx/CVE-2024-47805.json
Normal file
21
CVE-2024/CVE-2024-478xx/CVE-2024-47805.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-47805",
|
||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||
"published": "2024-10-02T16:15:10.753",
|
||||
"lastModified": "2024-10-02T16:15:10.753",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Jenkins Credentials Plugin 1380.va_435002fa_924 and earlier, except 1371.1373.v4eb_fa_b_7161e9, does not redact encrypted values of credentials using the `SecretBytes` type when accessing item `config.xml` via REST API or CLI."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.jenkins.io/security/advisory/2024-10-02/#SECURITY-3373",
|
||||
"source": "jenkinsci-cert@googlegroups.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-478xx/CVE-2024-47806.json
Normal file
56
CVE-2024/CVE-2024-478xx/CVE-2024-47806.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-47806",
|
||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||
"published": "2024-10-02T16:15:10.807",
|
||||
"lastModified": "2024-10-02T17:35:16.567",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Jenkins OpenId Connect Authentication Plugin 4.354.v321ce67a_1de8 and earlier does not check the `aud` (Audience) claim of an ID Token, allowing attackers to subvert the authentication flow, potentially gaining administrator access to Jenkins."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-287"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.jenkins.io/security/advisory/2024-10-02/#SECURITY-3441%20(1)",
|
||||
"source": "jenkinsci-cert@googlegroups.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-478xx/CVE-2024-47807.json
Normal file
56
CVE-2024/CVE-2024-478xx/CVE-2024-47807.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-47807",
|
||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||
"published": "2024-10-02T16:15:10.857",
|
||||
"lastModified": "2024-10-02T17:35:17.357",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Jenkins OpenId Connect Authentication Plugin 4.354.v321ce67a_1de8 and earlier does not check the `iss` (Issuer) claim of an ID Token, allowing attackers to subvert the authentication flow, potentially gaining administrator access to Jenkins."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-287"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.jenkins.io/security/advisory/2024-10-02/#SECURITY-3441%20(2)",
|
||||
"source": "jenkinsci-cert@googlegroups.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,59 +2,15 @@
|
||||
"id": "CVE-2024-5480",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2024-06-06T19:16:09.177",
|
||||
"lastModified": "2024-06-07T14:56:05.647",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-02T16:15:10.913",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the PyTorch's torch.distributed.rpc framework, specifically in versions prior to 2.2.2, allows for remote code execution (RCE). The framework, which is used in distributed training scenarios, does not properly verify the functions being called during RPC (Remote Procedure Call) operations. This oversight permits attackers to execute arbitrary commands by leveraging built-in Python functions such as eval during multi-cpu RPC communication. The vulnerability arises from the lack of restriction on function calls when a worker node serializes and sends a PythonUDF (User Defined Function) to the master node, which then deserializes and executes the function without validation. This flaw can be exploited to compromise master nodes initiating distributed training, potentially leading to the theft of sensitive AI-related data."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad en el framework torch.distributed.rpc de PyTorch, espec\u00edficamente en versiones anteriores a la 2.2.2, permite la ejecuci\u00f3n remota de c\u00f3digo (RCE). El framework, que se utiliza en escenarios de capacitaci\u00f3n distribuida, no verifica adecuadamente las funciones que se llaman durante las operaciones RPC (llamada a procedimiento remoto). Esta supervisi\u00f3n permite a los atacantes ejecutar comandos arbitrarios aprovechando las funciones integradas de Python, como la evaluaci\u00f3n, durante la comunicaci\u00f3n RPC entre m\u00faltiples CPU. La vulnerabilidad surge de la falta de restricci\u00f3n en las llamadas a funciones cuando un nodo trabajador serializa y env\u00eda una PythonUDF (funci\u00f3n definida por el usuario) al nodo maestro, que luego deserializa y ejecuta la funci\u00f3n sin validaci\u00f3n. Esta falla puede explotarse para comprometer los nodos maestros que inician el entrenamiento distribuido, lo que podr\u00eda conducir al robo de datos confidenciales relacionados con la IA."
|
||||
"value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 10.0,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://huntr.com/bounties/39811836-c5b3-4999-831e-46fee8fcade3",
|
||||
"source": "security@huntr.dev"
|
||||
}
|
||||
]
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-6094",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-07-24T06:15:01.903",
|
||||
"lastModified": "2024-08-01T14:00:11.220",
|
||||
"lastModified": "2024-10-02T17:44:06.180",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -80,9 +80,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:technowich:wp_ulike_-_most_advanced_wordpress_marketing_toolkit:*:*:*:*:*:wordpress:*:*",
|
||||
"criteria": "cpe:2.3:a:technowich:wp_ulike:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "4.7.1",
|
||||
"matchCriteriaId": "FB57C794-CD8E-4682-AB5F-E8D8131583FC"
|
||||
"matchCriteriaId": "1EF5D0F2-4301-4698-BDFC-D4DC0A0FD21F"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
78
CVE-2024/CVE-2024-63xx/CVE-2024-6360.json
Normal file
78
CVE-2024/CVE-2024-63xx/CVE-2024-6360.json
Normal file
@ -0,0 +1,78 @@
|
||||
{
|
||||
"id": "CVE-2024-6360",
|
||||
"sourceIdentifier": "security@opentext.com",
|
||||
"published": "2024-10-02T16:15:11.103",
|
||||
"lastModified": "2024-10-02T16:15:11.103",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Incorrect Permission Assignment for Critical Resource vulnerability in OpenText\u2122 Vertica could allow Privilege Abuse and result in\u00a0unauthorized access or privileges to Vertica agent apikey.\nThis issue affects Vertica: from 10.0 through 10.X, from 11.0 through 11.X, from 12.0 through 12.X, from 23.0 through 23.X, from 24.0 through 24.X."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "security@opentext.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:L/VI:N/VA:H/SC:L/SI:N/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:U/V:X/RE:L/U:Green",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "LOW",
|
||||
"vulnerableSystemIntegrity": "NONE",
|
||||
"vulnerableSystemAvailability": "HIGH",
|
||||
"subsequentSystemConfidentiality": "LOW",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "HIGH",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "YES",
|
||||
"recovery": "USER",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "LOW",
|
||||
"providerUrgency": "GREEN",
|
||||
"baseScore": 6.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@opentext.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-732"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://portal.microfocus.com/s/article/KM000033373?language=en_US",
|
||||
"source": "security@opentext.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-6510",
|
||||
"sourceIdentifier": "a341c0d1-ebf7-493f-a84e-38cf86618674",
|
||||
"published": "2024-09-12T15:18:26.347",
|
||||
"lastModified": "2024-09-12T18:14:03.913",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-02T17:17:46.450",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "a341c0d1-ebf7-493f-a84e-38cf86618674",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-427"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "a341c0d1-ebf7-493f-a84e-38cf86618674",
|
||||
"type": "Secondary",
|
||||
@ -59,10 +89,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://www.cirosec.de/sa/sa-2023-008",
|
||||
"source": "a341c0d1-ebf7-493f-a84e-38cf86618674"
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:avg:internet_security:*:*:*:*:*:windows:*:*",
|
||||
"versionEndExcluding": "24.1",
|
||||
"matchCriteriaId": "CC4689F8-6777-46DE-8C27-4C2AA3E4F4E6"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.cirosec.de/sa/sa-2023-008",
|
||||
"source": "a341c0d1-ebf7-493f-a84e-38cf86618674",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-6517",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-09-26T06:15:04.767",
|
||||
"lastModified": "2024-09-26T13:32:02.803",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-02T17:15:56.760",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,11 +15,68 @@
|
||||
"value": "El complemento Contact Form 7 Math Captcha de WordPress hasta la versi\u00f3n 2.0.1 no desinfecta ni escapa un par\u00e1metro antes de mostrarlo nuevamente en la p\u00e1gina, lo que genera un Cross-Site Scripting reflejado que podr\u00eda usarse contra usuarios con altos privilegios."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/d04bab9c-7cb4-4d21-b70b-a4a7fabc3c20/",
|
||||
"source": "contact@wpscan.com"
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:dotsquares:contact_form_7_math_captcha:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "2.0.1",
|
||||
"matchCriteriaId": "C2758702-3B5A-4311-8892-007C9F51A336"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/d04bab9c-7cb4-4d21-b70b-a4a7fabc3c20/",
|
||||
"source": "contact@wpscan.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,16 +2,43 @@
|
||||
"id": "CVE-2024-7315",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-10-02T06:15:09.963",
|
||||
"lastModified": "2024-10-02T06:15:09.963",
|
||||
"lastModified": "2024-10-02T17:35:18.430",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Migration, Backup, Staging WordPress plugin before 0.9.106 does not use sufficient randomness in the filename that is created when generating a backup, which could be bruteforced by attackers to leak sensitive information about said backups."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento Migration, Backup, Staging de WordPress anterior a 0.9.106 no utiliza suficiente aleatoriedad en el nombre del archivo que se crea al generar una copia de seguridad, lo que podr\u00eda ser forzado por atacantes para filtrar informaci\u00f3n confidencial sobre dichas copias de seguridad."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/456b728b-a451-4afb-895f-850ddc4fb589/",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-7617",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-09-25T03:15:03.603",
|
||||
"lastModified": "2024-09-26T13:32:02.803",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-02T16:02:25.020",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -18,8 +18,28 @@
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N",
|
||||
@ -51,14 +71,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/contact-form-to-any-api/trunk/admin/partials/cf7-to-any-api-admin-entries.php",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
"nodes": [
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/39487908-5cc5-42ac-8af4-65626694b1e4?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:itpathsolutions:contact_form_to_any_api:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "1.2.2",
|
||||
"matchCriteriaId": "F83A9C7A-EEE3-49E0-AF36-F4D244EC7FAA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/contact-form-to-any-api/trunk/admin/partials/cf7-to-any-api-admin-entries.php",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/39487908-5cc5-42ac-8af4-65626694b1e4?source=cve",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-7772",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-09-26T05:15:12.263",
|
||||
"lastModified": "2024-09-26T13:32:02.803",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-02T16:10:49.387",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,18 +51,45 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/jupiterx-core/trunk/includes/extensions/raven/includes/modules/forms/classes/ajax-handler.php",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
"nodes": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3139412/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5b546d24-82c1-4598-8926-6e73a4784b38?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:artbees:jupiter_x_core:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "4.6.6",
|
||||
"matchCriteriaId": "C23104B4-E4D5-4CE0-8133-566FBC08A12B"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/jupiterx-core/trunk/includes/extensions/raven/includes/modules/forms/classes/ajax-handler.php",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3139412/",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5b546d24-82c1-4598-8926-6e73a4784b38?source=cve",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-7781",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-09-26T05:15:12.470",
|
||||
"lastModified": "2024-09-26T13:32:02.803",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-02T16:21:03.113",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -18,8 +18,28 @@
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
@ -41,8 +61,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-306"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -51,22 +81,52 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/jupiterx-core/trunk/includes/extensions/raven/includes/modules/forms/classes/social-login-handler/facebook.php",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
"nodes": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/jupiterx-core/trunk/includes/extensions/raven/includes/modules/forms/classes/social-login-handler/google.php",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3153667/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/efd279c2-9e95-45bd-9494-fb53a6333c65?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:artbees:jupiter_x_core:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "4.7.8",
|
||||
"matchCriteriaId": "60704039-8642-47A2-8565-56462D56EEDC"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/jupiterx-core/trunk/includes/extensions/raven/includes/modules/forms/classes/social-login-handler/facebook.php",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/jupiterx-core/trunk/includes/extensions/raven/includes/modules/forms/classes/social-login-handler/google.php",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3153667/",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/efd279c2-9e95-45bd-9494-fb53a6333c65?source=cve",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-7878",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-09-25T06:15:05.650",
|
||||
"lastModified": "2024-09-26T13:32:02.803",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-02T17:41:44.133",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -39,10 +59,44 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
"weaknesses": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/9166cf91-69e5-4786-a6a9-816db7d47b07/",
|
||||
"source": "contact@wpscan.com"
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:technowich:wp_ulike:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "4.7.4",
|
||||
"matchCriteriaId": "78CD85C5-753B-467E-B391-828CB365E34D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/9166cf91-69e5-4786-a6a9-816db7d47b07/",
|
||||
"source": "contact@wpscan.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-8349",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-09-25T03:15:03.817",
|
||||
"lastModified": "2024-09-26T13:32:02.803",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-02T16:50:09.673",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,14 +51,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://github.com/karlemilnikka/CVE-2024-8349-and-CVE-2024-8350",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
"nodes": [
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/64cf0ae2-8d66-40d1-8bb6-0cab1dafab0d?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:uncannyowl:uncanny_groups_for_learndash:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "6.1.1",
|
||||
"matchCriteriaId": "A6B478AF-801A-43B4-AF80-EA80339FE5C8"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/karlemilnikka/CVE-2024-8349-and-CVE-2024-8350",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/64cf0ae2-8d66-40d1-8bb6-0cab1dafab0d?source=cve",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-8350",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-09-25T03:15:04.013",
|
||||
"lastModified": "2024-09-26T13:32:02.803",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-02T17:10:47.267",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,14 +51,39 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://github.com/karlemilnikka/CVE-2024-8349-and-CVE-2024-8350",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
"nodes": [
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a38a58de-5f7d-4033-9a65-41b590b7d510?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:uncannyowl:uncanny_groups_for_learndash:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "6.1.1",
|
||||
"matchCriteriaId": "A6B478AF-801A-43B4-AF80-EA80339FE5C8"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/karlemilnikka/CVE-2024-8349-and-CVE-2024-8350",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a38a58de-5f7d-4033-9a65-41b590b7d510?source=cve",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-8434",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-09-25T03:15:04.213",
|
||||
"lastModified": "2024-09-26T13:32:02.803",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-02T17:25:30.140",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,26 +51,59 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3156084/themehunk-megamenu-plus/tags/1.1.0/inc/megamenu-base.php",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
"nodes": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3156084/themehunk-megamenu-plus/tags/1.1.0/inc/megamenu-nav-menu-settings.php",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3156084/themehunk-megamenu-plus/tags/1.1.0/inc/megamenu-setting.php",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3156084/themehunk-megamenu-plus/tags/1.1.0/inc/megamenu-widgets.php",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/be3869a9-f72d-4bbb-ba51-d2761ca761f2?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:themehunk:easy_mega_menu_plugin:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "1.1.0",
|
||||
"matchCriteriaId": "A0A3958A-90B9-48C9-8BDB-4E310B2318E8"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3156084/themehunk-megamenu-plus/tags/1.1.0/inc/megamenu-base.php",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3156084/themehunk-megamenu-plus/tags/1.1.0/inc/megamenu-nav-menu-settings.php",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3156084/themehunk-megamenu-plus/tags/1.1.0/inc/megamenu-setting.php",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3156084/themehunk-megamenu-plus/tags/1.1.0/inc/megamenu-widgets.php",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/be3869a9-f72d-4bbb-ba51-d2761ca761f2?source=cve",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-8476",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-09-25T03:15:04.403",
|
||||
"lastModified": "2024-09-26T13:32:02.803",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-02T17:31:00.583",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,22 +51,52 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/easy-paypal-events-tickets/tags/1.2.1/includes/private_buttons.php#L273",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
"nodes": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/easy-paypal-events-tickets/tags/1.2.1/includes/private_buttons.php#L5",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3155809/easy-paypal-events-tickets/trunk/includes/private_buttons.php",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/602d337e-0778-4182-8e77-0eb3b37d5a7a?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:wpplugin:easy_paypal_events:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "1.2.2",
|
||||
"matchCriteriaId": "5FB75C60-E23F-4B67-94AD-1C2A06823371"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/easy-paypal-events-tickets/tags/1.2.1/includes/private_buttons.php#L273",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/easy-paypal-events-tickets/tags/1.2.1/includes/private_buttons.php#L5",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3155809/easy-paypal-events-tickets/trunk/includes/private_buttons.php",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/602d337e-0778-4182-8e77-0eb3b37d5a7a?source=cve",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-8481",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-09-25T03:15:04.593",
|
||||
"lastModified": "2024-09-26T13:32:02.803",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-02T17:59:52.013",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,14 +51,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/wp-special-textboxes/trunk/stb-class.php#L36",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
"nodes": [
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/15b2a08f-2122-4eaf-ab46-1945cf6a68ca?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:blogcoding:special_text_boxes:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "6.2.2",
|
||||
"matchCriteriaId": "90B9CFDE-2767-423D-9FD4-71355C89D99C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/wp-special-textboxes/trunk/stb-class.php#L36",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/15b2a08f-2122-4eaf-ab46-1945cf6a68ca?source=cve",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-8483",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-09-25T03:15:04.790",
|
||||
"lastModified": "2024-09-26T13:32:02.803",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-02T16:42:30.347",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -18,8 +18,28 @@
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
@ -41,8 +61,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -51,18 +81,45 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/mas-static-content/tags/1.0.8/includes/class-mas-static-content-shortcodes.php#L35",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
"nodes": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3151679%40mas-static-content&new=3151679%40mas-static-content&sfp_email=&sfph_mail=",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/794bc5cd-c9ac-4583-ae3d-a92361374b5f?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:madrasthemes:mas_static_content:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "1.0.9",
|
||||
"matchCriteriaId": "C0922AA1-EEE0-4C46-8513-A82BBAFBF6F1"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/mas-static-content/tags/1.0.8/includes/class-mas-static-content-shortcodes.php#L35",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3151679%40mas-static-content&new=3151679%40mas-static-content&sfp_email=&sfph_mail=",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/794bc5cd-c9ac-4583-ae3d-a92361374b5f?source=cve",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-8484",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-09-25T03:15:04.990",
|
||||
"lastModified": "2024-09-26T13:32:02.803",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-02T17:44:13.687",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -40,6 +40,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
@ -51,14 +61,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/rest-api-to-miniprogram/tags/4.7.0/includes/api/ram-rest-comments-controller.php#L247",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
"nodes": [
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6e0945eb-ceec-4536-822a-fe864c21b580?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:jianbo:rest_api_to_miniprogram:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "4.7.1",
|
||||
"matchCriteriaId": "3B85C713-4794-4A95-B021-7B8375DA22C3"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/rest-api-to-miniprogram/tags/4.7.0/includes/api/ram-rest-comments-controller.php#L247",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6e0945eb-ceec-4536-822a-fe864c21b580?source=cve",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-8485",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-09-25T03:15:05.190",
|
||||
"lastModified": "2024-09-26T13:32:02.803",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-02T16:19:15.993",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,14 +51,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/rest-api-to-miniprogram/tags/4.7.0/includes/api/ram-rest-weixin-controller.php#L264",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
"nodes": [
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b53066d3-2ff3-4460-896a-facd77455914?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:jianbo:rest_api_to_miniprogram:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "4.7.1",
|
||||
"matchCriteriaId": "3B85C713-4794-4A95-B021-7B8375DA22C3"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/rest-api-to-miniprogram/tags/4.7.0/includes/api/ram-rest-weixin-controller.php#L264",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b53066d3-2ff3-4460-896a-facd77455914?source=cve",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-8549",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-09-25T03:15:05.393",
|
||||
"lastModified": "2024-09-26T13:32:02.803",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-02T16:04:41.970",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
@ -51,18 +71,45 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3156894/google-calendar-events/trunk/includes/admin/notices.php",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
"nodes": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3156894%40google-calendar-events&new=3156894%40google-calendar-events&sfp_email=&sfph_mail=",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/17ae3f22-6426-48f7-93e6-c0ad515b329a?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xtendify:simple_calendar:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "3.4.3",
|
||||
"matchCriteriaId": "CE693C78-B144-4CA0-929F-8BD6FD78F7DA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3156894/google-calendar-events/trunk/includes/admin/notices.php",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3156894%40google-calendar-events&new=3156894%40google-calendar-events&sfp_email=&sfph_mail=",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/17ae3f22-6426-48f7-93e6-c0ad515b329a?source=cve",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-8552",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-09-26T03:15:03.000",
|
||||
"lastModified": "2024-09-26T13:32:02.803",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-02T17:00:45.083",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,18 +51,45 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/download-monitor/tags/5.0.8/src/AjaxHandler.php#L317",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
"nodes": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3157424/#file17",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/3acaedff-f616-4b66-9208-f7e6a4df920d?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:wpchill:download_monitor:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "5.0.10",
|
||||
"matchCriteriaId": "0787A2E6-9163-4688-8F8B-CF25D7AEE349"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/download-monitor/tags/5.0.8/src/AjaxHandler.php#L317",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3157424/#file17",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/3acaedff-f616-4b66-9208-f7e6a4df920d?source=cve",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-8621",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-09-25T03:15:05.600",
|
||||
"lastModified": "2024-09-26T13:32:02.803",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-02T16:10:27.313",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -18,8 +18,28 @@
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
|
||||
@ -51,18 +71,45 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/daily-prayer-time-for-mosques/tags/2024.08.26/Models/QuranADay/QuranDB.php#L72",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
"nodes": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3151906/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/866e4bc3-080a-4498-b210-e692d72d3db0?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mmrs151:daily_prayer_time:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "2024.09.14",
|
||||
"matchCriteriaId": "377D8F00-A04A-4EE9-8F6B-F08A25A9A19F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/daily-prayer-time-for-mosques/tags/2024.08.26/Models/QuranADay/QuranDB.php#L72",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3151906/",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/866e4bc3-080a-4498-b210-e692d72d3db0?source=cve",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-8713",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-09-25T03:15:05.840",
|
||||
"lastModified": "2024-09-26T13:32:02.803",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-02T16:22:33.487",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,14 +51,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/kodex-posts-likes/trunk/admin/partials/settings.php#L14",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
"nodes": [
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/44780988-cadf-4ff2-9ba9-148b7b6650df?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:pierros:kodex_posts_likes:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "2.5.0",
|
||||
"matchCriteriaId": "8449A154-3564-4BF9-ADFB-91D2F7593113"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/kodex-posts-likes/trunk/admin/partials/settings.php#L14",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/44780988-cadf-4ff2-9ba9-148b7b6650df?source=cve",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-8723",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-09-26T03:15:03.310",
|
||||
"lastModified": "2024-09-26T13:32:02.803",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-02T17:00:23.603",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -18,8 +18,28 @@
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
@ -51,14 +71,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://plugins.svn.wordpress.org/012-ps-multi-languages/trunk/includes/ps-multilingual-edit-post.php",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
"nodes": [
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/30a1517e-5ea5-47a1-afe8-9543e1ffd199?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:wangbin:012_ps_multi_languages:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "1.6",
|
||||
"matchCriteriaId": "39330F28-2539-410D-B71A-5DDE1ED4B065"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.svn.wordpress.org/012-ps-multi-languages/trunk/includes/ps-multilingual-edit-post.php",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/30a1517e-5ea5-47a1-afe8-9543e1ffd199?source=cve",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-8741",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-09-25T03:15:06.037",
|
||||
"lastModified": "2024-09-26T13:32:02.803",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-02T16:37:16.407",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,18 +51,45 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/beam-me-up-scotty/tags/1.0.21/library/template-parts/tabs.php#L27",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
"nodes": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3156146/beam-me-up-scotty/trunk/library/template-parts/tabs.php",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/3428bc71-64f9-4f8d-85c8-7dda81b2ac18?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:outtheboxthemes:beam_me_up_scotty:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "1.0.22",
|
||||
"matchCriteriaId": "EC91F8D0-E5B9-428C-AE03-2316BFEB1B4C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/beam-me-up-scotty/tags/1.0.21/library/template-parts/tabs.php#L27",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3156146/beam-me-up-scotty/trunk/library/template-parts/tabs.php",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/3428bc71-64f9-4f8d-85c8-7dda81b2ac18?source=cve",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-8803",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-09-26T03:15:03.640",
|
||||
"lastModified": "2024-09-26T13:32:02.803",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-02T17:15:12.677",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,18 +51,45 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/bulk-noindex-nofollow-toolkit-by-mad-fish/trunk/inc/bulk-noindex-toolkit-class.php?rev=3047303#L452",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
"nodes": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3157176/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d6e1cc0d-2c5f-4e34-bd19-d7c90cd4dff6?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:madfishdigital:bulk_noindex_\\&_nofollow_toolkit:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "2.16",
|
||||
"matchCriteriaId": "5DFED2FC-61BD-4776-84F2-E3CA78EE5F40"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/bulk-noindex-nofollow-toolkit-by-mad-fish/trunk/inc/bulk-noindex-toolkit-class.php?rev=3047303#L452",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3157176/",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d6e1cc0d-2c5f-4e34-bd19-d7c90cd4dff6?source=cve",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-94xx/CVE-2024-9423.json
Normal file
56
CVE-2024/CVE-2024-94xx/CVE-2024-9423.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-9423",
|
||||
"sourceIdentifier": "hp-security-alert@hp.com",
|
||||
"published": "2024-10-02T16:15:11.250",
|
||||
"lastModified": "2024-10-02T16:15:11.250",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Certain HP LaserJet printers may potentially experience a denial of service when a user sends a raw JPEG file to the printer. The printer displays a \u201cJPEG Unsupported\u201d message which may not clear, potentially blocking queued print jobs."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "hp-security-alert@hp.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "hp-security-alert@hp.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-241"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.hp.com/us-en/document/ish_11266441-11266463-16/hpsbpi03976",
|
||||
"source": "hp-security-alert@hp.com"
|
||||
}
|
||||
]
|
||||
}
|
89
README.md
89
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-10-02T16:00:17.859417+00:00
|
||||
2024-10-02T18:00:19.734939+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-10-02T15:40:36.090000+00:00
|
||||
2024-10-02T17:59:52.013000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,48 +33,69 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
264319
|
||||
264355
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `4`
|
||||
Recently added CVEs: `36`
|
||||
|
||||
- [CVE-2024-44097](CVE-2024/CVE-2024-440xx/CVE-2024-44097.json) (`2024-10-02T14:15:05.670`)
|
||||
- [CVE-2024-44193](CVE-2024/CVE-2024-441xx/CVE-2024-44193.json) (`2024-10-02T15:15:14.920`)
|
||||
- [CVE-2024-47611](CVE-2024/CVE-2024-476xx/CVE-2024-47611.json) (`2024-10-02T15:15:14.980`)
|
||||
- [CVE-2024-47612](CVE-2024/CVE-2024-476xx/CVE-2024-47612.json) (`2024-10-02T15:15:15.133`)
|
||||
- [CVE-2024-20477](CVE-2024/CVE-2024-204xx/CVE-2024-20477.json) (`2024-10-02T17:15:17.130`)
|
||||
- [CVE-2024-20490](CVE-2024/CVE-2024-204xx/CVE-2024-20490.json) (`2024-10-02T17:15:17.350`)
|
||||
- [CVE-2024-20491](CVE-2024/CVE-2024-204xx/CVE-2024-20491.json) (`2024-10-02T17:15:17.563`)
|
||||
- [CVE-2024-20492](CVE-2024/CVE-2024-204xx/CVE-2024-20492.json) (`2024-10-02T17:15:17.763`)
|
||||
- [CVE-2024-20515](CVE-2024/CVE-2024-205xx/CVE-2024-20515.json) (`2024-10-02T17:15:17.973`)
|
||||
- [CVE-2024-20516](CVE-2024/CVE-2024-205xx/CVE-2024-20516.json) (`2024-10-02T17:15:18.200`)
|
||||
- [CVE-2024-20517](CVE-2024/CVE-2024-205xx/CVE-2024-20517.json) (`2024-10-02T17:15:18.417`)
|
||||
- [CVE-2024-20518](CVE-2024/CVE-2024-205xx/CVE-2024-20518.json) (`2024-10-02T17:15:18.637`)
|
||||
- [CVE-2024-20519](CVE-2024/CVE-2024-205xx/CVE-2024-20519.json) (`2024-10-02T17:15:18.837`)
|
||||
- [CVE-2024-20520](CVE-2024/CVE-2024-205xx/CVE-2024-20520.json) (`2024-10-02T17:15:19.050`)
|
||||
- [CVE-2024-20521](CVE-2024/CVE-2024-205xx/CVE-2024-20521.json) (`2024-10-02T17:15:19.280`)
|
||||
- [CVE-2024-20522](CVE-2024/CVE-2024-205xx/CVE-2024-20522.json) (`2024-10-02T17:15:19.490`)
|
||||
- [CVE-2024-20523](CVE-2024/CVE-2024-205xx/CVE-2024-20523.json) (`2024-10-02T17:15:19.707`)
|
||||
- [CVE-2024-20524](CVE-2024/CVE-2024-205xx/CVE-2024-20524.json) (`2024-10-02T17:15:19.930`)
|
||||
- [CVE-2024-33209](CVE-2024/CVE-2024-332xx/CVE-2024-33209.json) (`2024-10-02T16:15:10.300`)
|
||||
- [CVE-2024-33210](CVE-2024/CVE-2024-332xx/CVE-2024-33210.json) (`2024-10-02T16:15:10.383`)
|
||||
- [CVE-2024-41290](CVE-2024/CVE-2024-412xx/CVE-2024-41290.json) (`2024-10-02T17:15:20.217`)
|
||||
- [CVE-2024-46626](CVE-2024/CVE-2024-466xx/CVE-2024-46626.json) (`2024-10-02T17:15:20.320`)
|
||||
- [CVE-2024-47803](CVE-2024/CVE-2024-478xx/CVE-2024-47803.json) (`2024-10-02T16:15:10.630`)
|
||||
- [CVE-2024-47804](CVE-2024/CVE-2024-478xx/CVE-2024-47804.json) (`2024-10-02T16:15:10.697`)
|
||||
- [CVE-2024-47805](CVE-2024/CVE-2024-478xx/CVE-2024-47805.json) (`2024-10-02T16:15:10.753`)
|
||||
- [CVE-2024-47806](CVE-2024/CVE-2024-478xx/CVE-2024-47806.json) (`2024-10-02T16:15:10.807`)
|
||||
- [CVE-2024-47807](CVE-2024/CVE-2024-478xx/CVE-2024-47807.json) (`2024-10-02T16:15:10.857`)
|
||||
- [CVE-2024-6360](CVE-2024/CVE-2024-63xx/CVE-2024-6360.json) (`2024-10-02T16:15:11.103`)
|
||||
- [CVE-2024-9423](CVE-2024/CVE-2024-94xx/CVE-2024-9423.json) (`2024-10-02T16:15:11.250`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `40`
|
||||
Recently modified CVEs: `44`
|
||||
|
||||
- [CVE-2024-0132](CVE-2024/CVE-2024-01xx/CVE-2024-0132.json) (`2024-10-02T14:45:36.160`)
|
||||
- [CVE-2024-0133](CVE-2024/CVE-2024-01xx/CVE-2024-0133.json) (`2024-10-02T14:43:22.433`)
|
||||
- [CVE-2024-2698](CVE-2024/CVE-2024-26xx/CVE-2024-2698.json) (`2024-10-02T15:15:14.603`)
|
||||
- [CVE-2024-3635](CVE-2024/CVE-2024-36xx/CVE-2024-3635.json) (`2024-10-02T14:30:24.627`)
|
||||
- [CVE-2024-38380](CVE-2024/CVE-2024-383xx/CVE-2024-38380.json) (`2024-10-02T14:22:25.323`)
|
||||
- [CVE-2024-38812](CVE-2024/CVE-2024-388xx/CVE-2024-38812.json) (`2024-10-02T14:16:47.610`)
|
||||
- [CVE-2024-45186](CVE-2024/CVE-2024-451xx/CVE-2024-45186.json) (`2024-10-02T14:35:06.610`)
|
||||
- [CVE-2024-45823](CVE-2024/CVE-2024-458xx/CVE-2024-45823.json) (`2024-10-02T14:49:59.157`)
|
||||
- [CVE-2024-45825](CVE-2024/CVE-2024-458xx/CVE-2024-45825.json) (`2024-10-02T14:43:08.720`)
|
||||
- [CVE-2024-45826](CVE-2024/CVE-2024-458xx/CVE-2024-45826.json) (`2024-10-02T14:35:38.017`)
|
||||
- [CVE-2024-46655](CVE-2024/CVE-2024-466xx/CVE-2024-46655.json) (`2024-10-02T15:40:36.090`)
|
||||
- [CVE-2024-46808](CVE-2024/CVE-2024-468xx/CVE-2024-46808.json) (`2024-10-02T14:23:39.863`)
|
||||
- [CVE-2024-46822](CVE-2024/CVE-2024-468xx/CVE-2024-46822.json) (`2024-10-02T14:24:01.757`)
|
||||
- [CVE-2024-46824](CVE-2024/CVE-2024-468xx/CVE-2024-46824.json) (`2024-10-02T14:29:08.417`)
|
||||
- [CVE-2024-46829](CVE-2024/CVE-2024-468xx/CVE-2024-46829.json) (`2024-10-02T14:27:57.920`)
|
||||
- [CVE-2024-46831](CVE-2024/CVE-2024-468xx/CVE-2024-46831.json) (`2024-10-02T14:26:13.807`)
|
||||
- [CVE-2024-46835](CVE-2024/CVE-2024-468xx/CVE-2024-46835.json) (`2024-10-02T14:24:18.930`)
|
||||
- [CVE-2024-46844](CVE-2024/CVE-2024-468xx/CVE-2024-46844.json) (`2024-10-02T14:22:50.533`)
|
||||
- [CVE-2024-46845](CVE-2024/CVE-2024-468xx/CVE-2024-46845.json) (`2024-10-02T14:18:32.923`)
|
||||
- [CVE-2024-46847](CVE-2024/CVE-2024-468xx/CVE-2024-46847.json) (`2024-10-02T14:16:08.180`)
|
||||
- [CVE-2024-46860](CVE-2024/CVE-2024-468xx/CVE-2024-46860.json) (`2024-10-02T14:04:38.863`)
|
||||
- [CVE-2024-47609](CVE-2024/CVE-2024-476xx/CVE-2024-47609.json) (`2024-10-02T14:35:07.770`)
|
||||
- [CVE-2024-8885](CVE-2024/CVE-2024-88xx/CVE-2024-8885.json) (`2024-10-02T14:15:05.927`)
|
||||
- [CVE-2024-9198](CVE-2024/CVE-2024-91xx/CVE-2024-9198.json) (`2024-10-02T14:33:52.780`)
|
||||
- [CVE-2024-9199](CVE-2024/CVE-2024-91xx/CVE-2024-9199.json) (`2024-10-02T14:33:54.607`)
|
||||
- [CVE-2024-47611](CVE-2024/CVE-2024-476xx/CVE-2024-47611.json) (`2024-10-02T16:35:34.060`)
|
||||
- [CVE-2024-5480](CVE-2024/CVE-2024-54xx/CVE-2024-5480.json) (`2024-10-02T16:15:10.913`)
|
||||
- [CVE-2024-6094](CVE-2024/CVE-2024-60xx/CVE-2024-6094.json) (`2024-10-02T17:44:06.180`)
|
||||
- [CVE-2024-6510](CVE-2024/CVE-2024-65xx/CVE-2024-6510.json) (`2024-10-02T17:17:46.450`)
|
||||
- [CVE-2024-6517](CVE-2024/CVE-2024-65xx/CVE-2024-6517.json) (`2024-10-02T17:15:56.760`)
|
||||
- [CVE-2024-7315](CVE-2024/CVE-2024-73xx/CVE-2024-7315.json) (`2024-10-02T17:35:18.430`)
|
||||
- [CVE-2024-7617](CVE-2024/CVE-2024-76xx/CVE-2024-7617.json) (`2024-10-02T16:02:25.020`)
|
||||
- [CVE-2024-7772](CVE-2024/CVE-2024-77xx/CVE-2024-7772.json) (`2024-10-02T16:10:49.387`)
|
||||
- [CVE-2024-7781](CVE-2024/CVE-2024-77xx/CVE-2024-7781.json) (`2024-10-02T16:21:03.113`)
|
||||
- [CVE-2024-7878](CVE-2024/CVE-2024-78xx/CVE-2024-7878.json) (`2024-10-02T17:41:44.133`)
|
||||
- [CVE-2024-8349](CVE-2024/CVE-2024-83xx/CVE-2024-8349.json) (`2024-10-02T16:50:09.673`)
|
||||
- [CVE-2024-8350](CVE-2024/CVE-2024-83xx/CVE-2024-8350.json) (`2024-10-02T17:10:47.267`)
|
||||
- [CVE-2024-8434](CVE-2024/CVE-2024-84xx/CVE-2024-8434.json) (`2024-10-02T17:25:30.140`)
|
||||
- [CVE-2024-8476](CVE-2024/CVE-2024-84xx/CVE-2024-8476.json) (`2024-10-02T17:31:00.583`)
|
||||
- [CVE-2024-8481](CVE-2024/CVE-2024-84xx/CVE-2024-8481.json) (`2024-10-02T17:59:52.013`)
|
||||
- [CVE-2024-8483](CVE-2024/CVE-2024-84xx/CVE-2024-8483.json) (`2024-10-02T16:42:30.347`)
|
||||
- [CVE-2024-8484](CVE-2024/CVE-2024-84xx/CVE-2024-8484.json) (`2024-10-02T17:44:13.687`)
|
||||
- [CVE-2024-8485](CVE-2024/CVE-2024-84xx/CVE-2024-8485.json) (`2024-10-02T16:19:15.993`)
|
||||
- [CVE-2024-8549](CVE-2024/CVE-2024-85xx/CVE-2024-8549.json) (`2024-10-02T16:04:41.970`)
|
||||
- [CVE-2024-8552](CVE-2024/CVE-2024-85xx/CVE-2024-8552.json) (`2024-10-02T17:00:45.083`)
|
||||
- [CVE-2024-8621](CVE-2024/CVE-2024-86xx/CVE-2024-8621.json) (`2024-10-02T16:10:27.313`)
|
||||
- [CVE-2024-8713](CVE-2024/CVE-2024-87xx/CVE-2024-8713.json) (`2024-10-02T16:22:33.487`)
|
||||
- [CVE-2024-8723](CVE-2024/CVE-2024-87xx/CVE-2024-8723.json) (`2024-10-02T17:00:23.603`)
|
||||
- [CVE-2024-8741](CVE-2024/CVE-2024-87xx/CVE-2024-8741.json) (`2024-10-02T16:37:16.407`)
|
||||
- [CVE-2024-8803](CVE-2024/CVE-2024-88xx/CVE-2024-8803.json) (`2024-10-02T17:15:12.677`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
208
_state.csv
208
_state.csv
@ -138850,7 +138850,7 @@ CVE-2019-3004,0,0,2efc7f7d88f5aff516fa57b9566a0d09c25f9cec93e6d5a20fbd6c3e4b7e69
|
||||
CVE-2019-3005,0,0,5fd2eab716b73f493b782c4947c1f9f5075a8998f20980c68330830c02645397,2021-02-22T14:41:07.527000
|
||||
CVE-2019-3008,0,0,4a9acb031316e7185b1ecbabc7f0a6b6ad53b785e5f0e71f4ce9ab56458db4bd,2019-10-21T15:20:06.707000
|
||||
CVE-2019-3009,0,0,4b79fade18b2303017cee0d6f5907b663b8230787a2be51018dd366fb572f2fc,2023-11-07T03:09:46.080000
|
||||
CVE-2019-3010,0,1,4d15bb06f6997745b751cdf536d342473965ea1ee277a8a9821f8fd7d948243f,2024-10-02T14:26:24.847000
|
||||
CVE-2019-3010,0,0,4d15bb06f6997745b751cdf536d342473965ea1ee277a8a9821f8fd7d948243f,2024-10-02T14:26:24.847000
|
||||
CVE-2019-3011,0,0,6c3ce7483f4c5da6d34e8f6b398287be5326f52b1289caa022ba543249611bb3,2023-11-07T03:09:46.160000
|
||||
CVE-2019-3012,0,0,e8dad39d8c9a365595bf46c3c95802f5a2984e0853cb1909aa108af5a330b544,2019-10-21T15:21:29.617000
|
||||
CVE-2019-3014,0,0,f1f960b6d836340bbdc087c522e457af239e88af8692e227a8fe8e387245ab71,2019-10-21T13:16:25.453000
|
||||
@ -154746,7 +154746,7 @@ CVE-2020-25533,0,0,22b0472be3f7a02ec2f0d0ad18465cceb9b38a6dc078a221c80f4709f5177
|
||||
CVE-2020-25537,0,0,079e520785884b60c6c94552474278f37b9d9064b531f7b9bef0271a3c3726d7,2020-12-04T16:01:49.357000
|
||||
CVE-2020-25538,0,0,5332fc9b37432e8c9ab81b8f5bce073530a235c7cacfe55a7b93c4c73aae58d4,2021-07-21T11:39:23.747000
|
||||
CVE-2020-25540,0,0,2ca248b357bd039497f25236f818e4ee81410cbfbcdb2bd5023e29cde2c96a87,2023-12-07T14:22:18.950000
|
||||
CVE-2020-2555,0,1,9e0b1acf4abe21f9ece6ed27e21fd73331510c130cc5290041b586bca6f48be9,2024-10-02T14:24:50.520000
|
||||
CVE-2020-2555,0,0,9e0b1acf4abe21f9ece6ed27e21fd73331510c130cc5290041b586bca6f48be9,2024-10-02T14:24:50.520000
|
||||
CVE-2020-25557,0,0,ba7e6e69e9eb291583fa26ec421902479a3af8435a3ba56dad4071d2f9cf8c8a,2021-07-21T11:39:23.747000
|
||||
CVE-2020-25559,0,0,4bccb58c8c9c8959436042e779063f9c0f8e5febd5ef5ab5053dd6f27d4d4b14,2020-09-21T15:19:30.877000
|
||||
CVE-2020-2556,0,0,d33e26f0b2b7738761c45d3cab98c1b1ea0d45fbd62d16082aeb66e6210120ea,2022-10-25T17:57:43.913000
|
||||
@ -168741,7 +168741,7 @@ CVE-2021-22514,0,0,8e3a075292032f763628c85554f5c2f69f3a2119c7d4d915625b0f6c61d01
|
||||
CVE-2021-22515,0,0,d5d9c4633cb99577d00912a48205489b53f3ad8216660fc95e68df9cb4700418,2023-11-07T03:30:17.387000
|
||||
CVE-2021-22516,0,0,360fc4a2a6473080797119cb4592870152572368993c6eb823854ef0d1d34fac,2023-11-07T03:30:17.613000
|
||||
CVE-2021-22517,0,0,3f8db58a324ed832f25a5c30c02cf604eadc18ad7b27ab795858edb5dc2a1474,2023-11-07T03:30:17.900000
|
||||
CVE-2021-22518,0,1,94a182ef95da3b6df3464b445a6e337e37bf8ebbe7672ce4b9ddd87c67d9c8a9,2024-10-02T15:10:41.610000
|
||||
CVE-2021-22518,0,0,94a182ef95da3b6df3464b445a6e337e37bf8ebbe7672ce4b9ddd87c67d9c8a9,2024-10-02T15:10:41.610000
|
||||
CVE-2021-22519,0,0,9e3616afe340966651f08a0581129e9a33a0208f1e92c7b863668a89efe71aaf,2023-11-07T03:30:18.160000
|
||||
CVE-2021-2252,0,0,f732e389d5f0da8a27d20c1ea9b59e42162179f0f11af0391630f653380a4d63,2021-04-29T12:58:18.223000
|
||||
CVE-2021-22521,0,0,520037ed9a82a64b433b975e996f24f9dc1e905547ecb64e14a0ed212673c8fb,2023-11-07T03:30:18.417000
|
||||
@ -172859,7 +172859,7 @@ CVE-2021-27912,0,0,19148a6b4be6511067ebb8120b362588e1573f54967fc3540726b708fba4e
|
||||
CVE-2021-27913,0,0,167d05a43c4b8a3a9a5f9095ae1170cc5f9466459db5849cf91ef768c53d596c,2021-09-03T16:43:47.267000
|
||||
CVE-2021-27914,0,0,675b39026c04fc757a33b18eab7c2aa058775623331c1d7c9d085c842a052b1d,2022-06-08T18:45:22.737000
|
||||
CVE-2021-27915,0,0,aa4b9f4c69d7d5ac6f5dbddcc007e3027f3bc066eee27bd2a695f6cfc3b6d157,2024-09-29T00:22:31.787000
|
||||
CVE-2021-27916,0,1,553745efa02c296e12860271d4afc5e607d72abe30d8e6b9c112f9ed77eecd96,2024-10-02T14:29:42.407000
|
||||
CVE-2021-27916,0,0,553745efa02c296e12860271d4afc5e607d72abe30d8e6b9c112f9ed77eecd96,2024-10-02T14:29:42.407000
|
||||
CVE-2021-27917,0,0,5465a3d7f25a5154d30a82cd6f06e15430a49f302876406aa605d64d13a082bc,2024-09-27T15:13:58.927000
|
||||
CVE-2021-27918,0,0,0518da32da0b62ea5fcb12a67bfb4a45de87702f6745ca2fb1540144faa372aa,2022-12-13T16:28:13.860000
|
||||
CVE-2021-27919,0,0,ff72fa8dcdbe5235ea458afc8e87af812a5a4a7f37cb1ded6eeda83ce3037733,2023-11-07T03:32:02.603000
|
||||
@ -182223,7 +182223,7 @@ CVE-2021-40423,0,0,e70e7b6c63f7747ab6d60cb7eaca40f23cfcf6f4031a82b5a9e5bc13c852d
|
||||
CVE-2021-40424,0,0,6cc9f49e082e3140aee85ce6a2c7035115acb383bfe5dffbaec66b3dd76ae3a8,2022-04-22T18:59:38.313000
|
||||
CVE-2021-40425,0,0,986c807d5d980cb91d8cccc408073c21b5a6706f05cca05fa89896fb2c9a146d,2022-04-21T15:47:50.853000
|
||||
CVE-2021-40426,0,0,5d72a17907f1725e43fb0aab61001410ddfaa528a0774ae1abefe783386aca67,2023-02-23T00:15:10.890000
|
||||
CVE-2021-4043,0,1,0bfab4fb689e8679f38fbb30b1e5e7858abc28c11dd0358aada30d2c0341cc95,2024-10-02T14:26:43.490000
|
||||
CVE-2021-4043,0,0,0bfab4fb689e8679f38fbb30b1e5e7858abc28c11dd0358aada30d2c0341cc95,2024-10-02T14:26:43.490000
|
||||
CVE-2021-40438,0,0,5414e0c1495a90d6f42b1bae6a30b531da4e2d738b2ecf4184cc8a70d5198a3d,2024-07-24T17:08:07.093000
|
||||
CVE-2021-40439,0,0,2a8b255e58952b8e3bc2fe39246b2c6164ca9e4eabf1fba2b4937eec3211dc19,2023-11-07T03:38:35.240000
|
||||
CVE-2021-4044,0,0,063b69fc68b4e42b2f1ddc7170cc4d1cada10e4b27aa7dc6eec919242eaaa7d1,2023-11-09T14:44:33.733000
|
||||
@ -195096,7 +195096,7 @@ CVE-2022-26317,0,0,9c3778762ebd62b5c88b18d617a321f87f2f3cd2e79d6a4238ec738f50f6b
|
||||
CVE-2022-26318,0,0,3164c0ae6f338172eda55b12f58a3708a3217e7c65e42299722e7024448c4e8e,2023-08-08T14:21:49.707000
|
||||
CVE-2022-26319,0,0,df89539e33ae729765bbf5708419e9238cd5395f00f3879c2a7d76f26e1eb725,2022-03-19T23:55:42.653000
|
||||
CVE-2022-26320,0,0,0821ab29948bcb8ff6394127add06f2455ef2463ce545b333685d1b7d5e7ee9b,2022-03-23T15:02:20.840000
|
||||
CVE-2022-26322,0,1,84f8c164b41682263e956a9ba382aa197b0de6ad62d3cd0de407813d0934663e,2024-10-02T15:03:41.997000
|
||||
CVE-2022-26322,0,0,84f8c164b41682263e956a9ba382aa197b0de6ad62d3cd0de407813d0934663e,2024-10-02T15:03:41.997000
|
||||
CVE-2022-26325,0,0,71c58e61480c4b27374f3a990d8a54d98de2bdee3e9fb84b64281d4b075b3b7a,2023-11-07T03:44:56.980000
|
||||
CVE-2022-26326,0,0,9ad27885fa0c540266ca1167975a0cab125c731a5ab45882b07301ce6001b68d,2023-11-07T03:44:57.197000
|
||||
CVE-2022-26327,0,0,7940acac4e72dc19f89caa27a931bc65c9c7e042d50d2b29976f338f3c1d6aed,2024-08-21T17:25:08.560000
|
||||
@ -203634,7 +203634,7 @@ CVE-2022-3680,0,0,4045a251fd074dc1e78a757b3250a9f45dbb1c048a72547f43ae93ad5dd948
|
||||
CVE-2022-36800,0,0,dd1af9dfe900eb3e2d7479d8dda8d0887ce7def8c5fc17c6c520bcbd1cb0496b,2023-08-08T14:22:24.967000
|
||||
CVE-2022-36801,0,0,6ee5b9b9e2a587ee6808d637ba4173972a9016f471a78c39081d815f64f7b29a,2022-08-12T17:38:37.907000
|
||||
CVE-2022-36802,0,0,3502c01758a1fbb120eb1199a3a435b4eaa88bb4300cfcf4c2a8cb28d6077b9d,2022-10-17T15:08:01.323000
|
||||
CVE-2022-36803,0,1,8bf391ac2eb3e6ee9d8828e1361ac87e802988d8d37cb0a535af2291dbd1c770,2024-10-02T15:35:01.363000
|
||||
CVE-2022-36803,0,0,8bf391ac2eb3e6ee9d8828e1361ac87e802988d8d37cb0a535af2291dbd1c770,2024-10-02T15:35:01.363000
|
||||
CVE-2022-36804,0,0,0ca1f04aaa3e26878886d510c1f32bf471ffd055bf07c2485f77648a7440ec06,2024-06-28T13:57:13.930000
|
||||
CVE-2022-3681,0,0,1233abe7c4aafe7eacd841955e89714c7f64b04fb29227eb9e9865f916fa993c,2023-11-07T19:41:49.927000
|
||||
CVE-2022-36816,0,0,b89d07853852f63402717c19ee118a9de73ed0e7e365ca4c6f66e736a6bff74d,2023-11-09T05:15:09.047000
|
||||
@ -208954,8 +208954,8 @@ CVE-2022-43778,0,0,4ffedd6ef15aa68b1f76290cb40f93173a989ab39e1c9a29be9185def3ad2
|
||||
CVE-2022-43779,0,0,ac7258ee065eeae3f2bf2159db27a71db91fb9574201804606ee3ffa98c3a4a0,2023-02-21T21:15:29.363000
|
||||
CVE-2022-4378,0,0,9488633d6af78a0385852c5ee7d85cb1cdede0fd5deafc39814648ca4fd73e71,2023-11-07T03:57:42.020000
|
||||
CVE-2022-43780,0,0,67e9f2507e99989c68962e08b111d075a78382033c9d8f577c31ab5768a4c0a1,2022-12-14T21:28:00.977000
|
||||
CVE-2022-43781,0,1,f7564d3900e6b6c513af8d4b923e6fffc8487a97c96e96fbc5a708a0a969e0e4,2024-10-02T15:35:02.723000
|
||||
CVE-2022-43782,0,1,6c2d60a58890ad311a32b31e022e89f7347b3c9809b612f3df6dc2cd477d6070,2024-10-02T15:35:03.590000
|
||||
CVE-2022-43781,0,0,f7564d3900e6b6c513af8d4b923e6fffc8487a97c96e96fbc5a708a0a969e0e4,2024-10-02T15:35:02.723000
|
||||
CVE-2022-43782,0,0,6c2d60a58890ad311a32b31e022e89f7347b3c9809b612f3df6dc2cd477d6070,2024-10-02T15:35:03.590000
|
||||
CVE-2022-43783,0,0,30a2cfa25cbd2ef42b6241aafb23a57c895fa79e502d250ebdf143065bf0de2f,2023-11-15T07:15:07.320000
|
||||
CVE-2022-43784,0,0,572c4a443dfbc984c09b87b5ea7bee4f603c5ffd7f01185882cf67bb7c1fe356,2023-11-15T07:15:07.620000
|
||||
CVE-2022-43785,0,0,0a6076ba241cde2b011f8a567255044938473bf5e7e94b4e1840c6184f433283,2023-11-15T07:15:07.667000
|
||||
@ -214847,7 +214847,7 @@ CVE-2023-20570,0,0,dfe48ab7be186e12e0df2907f1611ee83f54971ec11802e508a83413b0802
|
||||
CVE-2023-20571,0,0,96f212f661726a3c476a2fb295d8da706572d89ee10f136777356539fdf55e7c,2023-11-28T18:05:25.177000
|
||||
CVE-2023-20573,0,0,ad0019707ea1d3be9aafe200900d990babb7fbdcc22ca2cce433aaa0fd946615,2024-01-18T17:39:02.430000
|
||||
CVE-2023-20575,0,0,2e65bf0d5b77958c50a50d7734bf1302e45afedfe49795c175183e4bccf178d7,2023-07-19T18:32:04.807000
|
||||
CVE-2023-20578,0,0,0a9c6b1ac58ffe336f69161832ca2f5abd3de5034b5ba44c81c718f1dcfd9dad,2024-08-14T02:07:05.410000
|
||||
CVE-2023-20578,0,1,e2aae81ed2b9fe5469de595a7d4e7bc7f74e6a04f637c722d6521fd97e68f844,2024-10-02T17:35:44.117000
|
||||
CVE-2023-20579,0,0,b4a70474e393f8888455713a6b442ef3e5379ac960e74bb0629b9958558f0077,2024-02-14T13:59:35.580000
|
||||
CVE-2023-2058,0,0,0c817ab6ea98d27963a0bdd6b94d4e88089c1ee4704beb5ad1d7199dfd901fb8,2024-05-17T02:22:37.783000
|
||||
CVE-2023-20583,0,0,a212d56af862f7656348d6c69619b40cd14646d40284557522dffd91a69163f7,2023-08-04T17:31:53.953000
|
||||
@ -225994,7 +225994,7 @@ CVE-2023-34256,0,0,06e655546c54f56248a7bbbb0bd9dfe93b8c16a4183434e9ab515b7b0eb05
|
||||
CVE-2023-34257,0,0,0320d12b069a7394c51c703bc5f9098562946b70a12bfe53ad75f5a07d652796,2024-08-02T16:16:11.363000
|
||||
CVE-2023-34258,0,0,2e656b6b465dd8addf89d28d27a2f63785e04de044f2ca4973a2e285fba2546b,2023-06-08T17:26:19.893000
|
||||
CVE-2023-34259,0,0,710e591d41187a09c0c879c2b28e77b17f59e8df4a70e82104fd10051415f806,2024-09-06T14:35:03.133000
|
||||
CVE-2023-3426,0,0,935e9c3168851c6b164d09f4971cdc352a7eb4e1fb48d323d9ca5e3f69c4f253,2023-08-05T03:45:57.627000
|
||||
CVE-2023-3426,0,1,07a43f31a932247ee02fb8af2b49e82b8d9f9dbafa6d1a14a263c24c5cfe3593,2024-10-02T16:15:08.500000
|
||||
CVE-2023-34260,0,0,c253d0086191543f48833b7cd2c6b64feac20efd450b29e43c25d5bd3f3dfe93,2023-11-13T17:38:02.170000
|
||||
CVE-2023-34261,0,0,1729daad30a7372c87b9ad3bf7407e2b7cbc075d6b545c22578d51675898073f,2024-09-05T15:35:08.697000
|
||||
CVE-2023-34262,0,0,e781415bd7c8ab28701dd349c10478f0e9c97337cc272573568c5630115e9d21,2024-05-03T12:50:34.250000
|
||||
@ -229516,7 +229516,7 @@ CVE-2023-39054,0,0,f833ae43e0ade72388da1f9c7c8f6fb4e7cdfde8ad9a67b03dab336fcef59
|
||||
CVE-2023-39056,0,0,a31be9e1f2f2ce024577389a44b0d64791d4f8214fe68fa844dd6e3e825d2389,2023-09-19T21:25:03.967000
|
||||
CVE-2023-39057,0,0,601d99c09f27b5ba170ec8ad96aa1bdfa16724520be499f1107219c96e2eca70,2024-09-05T16:35:13.513000
|
||||
CVE-2023-39058,0,0,c859360d758c635b4461bde9305dfc7f921e430c4f43b04685530cd4ee9bde54,2023-09-21T19:33:37.093000
|
||||
CVE-2023-39059,0,0,d03db2419f848e834209670dfaa88b40205ec6bc4b60cbbbae6e240d2976015d,2023-08-30T00:30:06.513000
|
||||
CVE-2023-39059,0,1,d6ad793b1e30fb5a4d810fed87734b42d3814a1eff91b596267a1270d867e801,2024-10-02T16:35:25.547000
|
||||
CVE-2023-3906,0,0,0ea4f9c458c7cefbf14811ad5f7e6a91096f5efdcc77090d83066140a3405bde,2023-10-02T19:42:18.340000
|
||||
CVE-2023-39061,0,0,9dfe3616284c4b6a06d602215c89caae5dd22e63bafe5de26477f48449ad0a2b,2023-08-24T21:05:08.520000
|
||||
CVE-2023-39062,0,0,1b3e02272dd236f49ba8355d88521d297ed47d621a736a2c7fbac748a9f65c3a,2023-08-29T23:40:24.717000
|
||||
@ -229903,7 +229903,7 @@ CVE-2023-39504,0,0,98e25b8b4c93afa9b617aacdfaa97a07977cfc3118c1b43d834ba9f6312af
|
||||
CVE-2023-39505,0,0,887b872aec02a21bb8065c0c7bd8588eda69ec0b4c2d5ba1f644df3556beb18d,2024-05-03T12:50:12.213000
|
||||
CVE-2023-39506,0,0,f60dbdbbfbe509aa3c77ae412d5d35a06b8548b148ea5113391dede7f2942898,2024-05-03T12:50:12.213000
|
||||
CVE-2023-39507,0,0,932000ee6c05e0ab417b82c0122256dfab7c4426eee6d2ce22c53e3b0dd2ba54,2023-08-22T16:54:49.080000
|
||||
CVE-2023-39508,0,0,d83cff5c7a9f39581c7213135aaaae08a82f50b2357e90ccaedcad4c42ed5b26,2023-08-09T17:52:57.137000
|
||||
CVE-2023-39508,0,1,0475dc7a3c76146c461d057ef4794deff2fb0d66986569c6bd72034b25d8d2a3,2024-10-02T17:35:14.147000
|
||||
CVE-2023-39509,0,0,81753f4ec30f3ee72106ba4d88c503fb5b7f0ae91ea64c932d500cc56d115ab6,2023-12-22T19:45:01.103000
|
||||
CVE-2023-39510,0,0,0c2f76b2427a8d8df6ec4c504402ea4f6e0208187521d62f9166f6770c6f220a,2023-11-09T05:15:10.427000
|
||||
CVE-2023-39511,0,0,81ff1805f1766f9b1a656e89cd0072d87bbb33d5412916577d40ce5bb5525760,2023-11-03T21:15:15.240000
|
||||
@ -231027,7 +231027,7 @@ CVE-2023-40997,0,0,dece227e404a159aaa40a2b1c2185c27c7fc67a7d474fb6b6ca1b3a1165b7
|
||||
CVE-2023-40998,0,0,bc3fb678d532ebde1a82e61a18ed44acade69d14d10ebc19fb9bff309e0cdc2f,2023-12-14T08:15:40.460000
|
||||
CVE-2023-4100,0,0,fa22ea8a138e16722e3a417d2a7e9fbb233887c8a39e7dc8c61b9ee97c02de35,2023-10-04T21:27:54.943000
|
||||
CVE-2023-41000,0,0,d4b8fd436935dcbb6e6c0d9e1ff2b8c51ed8a590b0dcf579368c06082d37efcc,2023-09-13T17:56:45.940000
|
||||
CVE-2023-41005,0,1,3daaf64f7f524c91c07117e8cf34166e8ffdbe5acf507dc276539eac6b6645de,2024-10-02T15:35:08.587000
|
||||
CVE-2023-41005,0,0,3daaf64f7f524c91c07117e8cf34166e8ffdbe5acf507dc276539eac6b6645de,2024-10-02T15:35:08.587000
|
||||
CVE-2023-41009,0,0,bab7e6af797997c9d8e91e6ad13bb34a2b0f541f389f29191222f82ffdfaf308,2023-09-08T16:51:19.520000
|
||||
CVE-2023-4101,0,0,7d42de21f526b12720e2f221bcd7b07a3e448f58519099a893632db895d1f5b0,2023-10-10T14:26:51.557000
|
||||
CVE-2023-41010,0,0,57d782f3c378b7f881c1d1b707976bd9fa2294337386be7a963ca7c0036f4888,2023-09-19T02:17:50.343000
|
||||
@ -231386,7 +231386,7 @@ CVE-2023-41372,0,0,35677ebd042661e79325ccc23249826f0e6827b72e19c266e97d4bd4197a6
|
||||
CVE-2023-41373,0,0,5f858e0195caa8aa2a8c7543f70062980d9188f53cffba696962fcc32c2ea8a9,2023-10-17T20:15:51.720000
|
||||
CVE-2023-41374,0,0,b864fcf3ca00311d710c6c0797be775b4f55280cea90725da2f952400c671bb8,2023-09-22T16:32:30.470000
|
||||
CVE-2023-41375,0,0,4caaa89bdaf6fc373f3aa10e01d6183849538d31e03e375f5636c002b49579ab,2023-09-22T16:31:50.917000
|
||||
CVE-2023-41376,0,1,c4558ae758060816ad43837b68ee4ebe6503a51389f228498c1381a71b3c4bd7,2024-10-02T15:35:09.327000
|
||||
CVE-2023-41376,0,0,c4558ae758060816ad43837b68ee4ebe6503a51389f228498c1381a71b3c4bd7,2024-10-02T15:35:09.327000
|
||||
CVE-2023-41377,0,0,20fe65dce688a5c8814f6a060b1896579ae2dcc89be369ecab60330310b67f0b,2023-11-07T04:20:59.033000
|
||||
CVE-2023-41378,0,0,ba961345e0136f6a60fcac5e9ee9fe21f16c70a1865b4d2513e303e9f2222eb5,2023-11-14T17:48:01.570000
|
||||
CVE-2023-4138,0,0,a5bf3d6644739a9ac794c17bb10baedf889afaf83b38a1d9add5981825ea5495,2023-08-08T19:39:05.930000
|
||||
@ -234163,7 +234163,7 @@ CVE-2023-45637,0,0,c2102573a58b7f61128f6708ee3dce28b4eda5296a931ce506187a6d5a8de
|
||||
CVE-2023-45638,0,0,6df0e645e66ef324c17833ab8b07fa38ea477fc98fc12ef701def438c3cf757b,2023-10-18T22:46:07.233000
|
||||
CVE-2023-45639,0,0,09a43d88ae7f3eb21f87388095cc506b7cf82cea9c4eaa2c8bdec0bbf15f54ba,2023-10-19T17:44:02.860000
|
||||
CVE-2023-4564,0,0,b127f10b71c0cf46376e4cce21da60250007071625a35d82d3184bcd3210d33f,2024-10-01T11:15:11.710000
|
||||
CVE-2023-45640,0,0,6bf3f98302880e07e863237068f3348202a18ebfe439f2d6882c6e9553a84f19,2023-11-01T16:19:20.753000
|
||||
CVE-2023-45640,0,1,0217b4a0cbfd4469d891614da2897a0768356aa9241ddec77558ef374f5f1a43,2024-10-02T17:44:06.180000
|
||||
CVE-2023-45641,0,0,6adff5e3699983b9eacf89f0f7a340ba3721c212f78c4da7c13fa3a0174d2fb4,2023-10-19T18:19:25.680000
|
||||
CVE-2023-45642,0,0,ac1742b6c5c96baf0e87c66e370b2b9ecbf2f7f1e99e7a9d808246155f9331cf,2023-10-19T18:56:54.393000
|
||||
CVE-2023-45643,0,0,4487aa9880e87f7ccba9d4d1a5ee925bdcd1e35a7eb22d0a0864b7ff83e6d50a,2023-10-19T20:29:06.500000
|
||||
@ -238042,7 +238042,7 @@ CVE-2023-51147,0,0,75e5ad9e43cde03291b18d115e151db0aadaa5d5d0263e6c24a28fb6db5ae
|
||||
CVE-2023-51148,0,0,bce6f23f629ff4a4d092df77207bd3625ab8bab51457c9d3b72eb9275af90b21,2024-08-03T19:35:01.547000
|
||||
CVE-2023-5115,0,0,14c531f4587abd09fae2cb04ef8d601a42e68cf9b74459554a2ea4cdee69467d,2024-09-16T15:15:15.890000
|
||||
CVE-2023-51154,0,0,733ec9b18ea85f01f34e9765897ada4e832b65ac33fdca877dda8af7f30fd092,2024-01-10T15:58:18.733000
|
||||
CVE-2023-51157,0,0,f217a5eb5347bd845b55f58f96ca86920fea3bf514334f71b05b4b52c85d689e,2024-09-26T13:32:02.803000
|
||||
CVE-2023-51157,0,1,8f9b732372eef7b0a17c80ee530e72ee53023301d6e9793fef1728afd0fae67b,2024-10-02T16:58:20.160000
|
||||
CVE-2023-5116,0,0,591765d4d588c72144ede930c6a51f214c6b6a2dea94dcfbd541442fb6e59c4b,2023-11-07T04:23:28.397000
|
||||
CVE-2023-5118,0,0,d240cca45e4e2f327ad2cb7dc08143e95ad38b48016fa92edb8ad9cf216f86ce,2024-01-18T16:01:37.653000
|
||||
CVE-2023-5119,0,0,2d2d0554c11c06d2226e53937c1b8bc6add5c04011b3ac8deec483b514b75e12,2023-11-27T16:33:20.673000
|
||||
@ -239461,11 +239461,11 @@ CVE-2023-5292,0,0,214d7ae5654e29ed0e372211abf39e379cdbd830eab553609e162ffb791fd7
|
||||
CVE-2023-5293,0,0,37b5570c94c226fac17bbeba13451e285dd87937cebf55577645a70e3fbcf851,2024-05-17T02:32:58.843000
|
||||
CVE-2023-5294,0,0,91871d88408d7e2bcaad4b05fb484ac2315248d3665cd88ba6ae47f2da8d5f16,2024-05-17T02:32:58.950000
|
||||
CVE-2023-52946,0,0,20e045551a05525bd02d771d699e1c8ac48012af353f0f8ecae8c441edb3d8bd,2024-09-26T13:32:02.803000
|
||||
CVE-2023-52947,0,1,63d645c926faea55b9fdad340f3f464b9fdc9faedf4a6e963e4826e43b2cd432,2024-10-02T15:26:28.213000
|
||||
CVE-2023-52948,0,1,f79919aed1747abb868b7504103d5ade0b888b12580c06d7084afbaa6db543f5,2024-10-02T15:26:30.160000
|
||||
CVE-2023-52949,0,1,57e7b479eb0b4cd4da85e5578fdc01b85634bb050edda133619d47c1369d88c5,2024-10-02T15:26:32.077000
|
||||
CVE-2023-52947,0,0,63d645c926faea55b9fdad340f3f464b9fdc9faedf4a6e963e4826e43b2cd432,2024-10-02T15:26:28.213000
|
||||
CVE-2023-52948,0,0,f79919aed1747abb868b7504103d5ade0b888b12580c06d7084afbaa6db543f5,2024-10-02T15:26:30.160000
|
||||
CVE-2023-52949,0,0,57e7b479eb0b4cd4da85e5578fdc01b85634bb050edda133619d47c1369d88c5,2024-10-02T15:26:32.077000
|
||||
CVE-2023-5295,0,0,41c6baf71065d9210a6020c54df01a479effe3ab43eb4f6a24f246bdbfb6c99e,2023-11-07T04:23:49.733000
|
||||
CVE-2023-52950,0,1,8f3573aeaa08ecbde7fa2e7d1621b857fef69d5f70409675af871fb9ea9d77f3,2024-10-02T15:26:33.837000
|
||||
CVE-2023-52950,0,0,8f3573aeaa08ecbde7fa2e7d1621b857fef69d5f70409675af871fb9ea9d77f3,2024-10-02T15:26:33.837000
|
||||
CVE-2023-5296,0,0,476d33b024be332ac896dbf35bcf9a4f784c8ee1e5e045f6783134e6c34f6d9c,2024-05-17T02:32:59.083000
|
||||
CVE-2023-5297,0,0,ae358353c2ceed16fa9e9e76c2608b86123b91774a8853eb6bb1140ab0dca019,2024-05-17T02:32:59.190000
|
||||
CVE-2023-5298,0,0,b737514e302eee8d165af79674626b1e30c9fc6b7145814e6b6dce9deaaa8577,2024-05-17T02:32:59.290000
|
||||
@ -241337,8 +241337,8 @@ CVE-2024-0111,0,0,745fe4fa8ac2297a871814d16ec0cf5bf56a98c3501448d82308b7dc75a74f
|
||||
CVE-2024-0113,0,0,30ea5d78769c707d77ab5e88a1087a3bf4be86e316909498095d743b94b19e08,2024-09-11T17:34:37.667000
|
||||
CVE-2024-0115,0,0,90525cb6d1df6f268f81b58c98763d2a78ce3017a9779cdc04eec9f2dd2bca4d,2024-09-11T17:24:27.393000
|
||||
CVE-2024-0116,0,0,adad8d5a6569e5102a9d95bdf9068d17c8ef5bd5a7c84947191f2698e1d6ce25,2024-10-01T05:15:11.920000
|
||||
CVE-2024-0132,0,1,f1d27ee91d38f95f18265c56576359c7b74449c09c2448ac9270cfde0a145c24,2024-10-02T14:45:36.160000
|
||||
CVE-2024-0133,0,1,1869d101f5a07bee8a308ca6354c7bbc691223866612cf3986da3052ed18f6e1,2024-10-02T14:43:22.433000
|
||||
CVE-2024-0132,0,0,f1d27ee91d38f95f18265c56576359c7b74449c09c2448ac9270cfde0a145c24,2024-10-02T14:45:36.160000
|
||||
CVE-2024-0133,0,0,1869d101f5a07bee8a308ca6354c7bbc691223866612cf3986da3052ed18f6e1,2024-10-02T14:43:22.433000
|
||||
CVE-2024-0151,0,0,e688008e47f7f2b2995cf15f9fce74bb525b3898f5e47db0ad5b6ce2aa86a255,2024-08-09T19:35:02.910000
|
||||
CVE-2024-0153,0,0,27805279095cb051183cab09aac75c2d46b1759d5204833928b95d85cf667e87,2024-07-03T01:44:37.677000
|
||||
CVE-2024-0154,0,0,e0c538dbc1a8e60b09b037cacd452435c496c209b1106146ca859e110f3efaa6,2024-03-13T18:15:58.530000
|
||||
@ -243273,6 +243273,7 @@ CVE-2024-20360,0,0,b9376885f3bd33f8b376cfcd9d1a4c2997937c1a075603d8638d862812d3e
|
||||
CVE-2024-20361,0,0,8fc8c6bd1287a52550fd38650e66a5006a20e7eae1aa8f8c99b728af1c48ddd5,2024-05-22T18:59:20.240000
|
||||
CVE-2024-20362,0,0,0fe85dbbc396fc356835f570820efb6142358d26355d59753469b06ab8b1d26f,2024-04-03T17:24:18.150000
|
||||
CVE-2024-20363,0,0,fd62098992468346229d2c9f8f88c3a0bdc7312cacd90d8bf7a2b7925976c048,2024-07-03T01:46:06.070000
|
||||
CVE-2024-20365,1,1,9ac35643a14b4115b7c187beac895c8d8c440eb3244ed73c9e636f89defa28a7,2024-10-02T17:15:14.863000
|
||||
CVE-2024-20366,0,0,ce7e4ab0363f4b2934fc27a08480c4ec05827340dd08325d4de96e54b996f48f,2024-05-15T18:35:11.453000
|
||||
CVE-2024-20367,0,0,0d59cd325b5448a23ac62ba4d011225bdec20c6d4a20e9044f14a66801d9654b,2024-04-03T17:24:18.150000
|
||||
CVE-2024-20368,0,0,11ba77e6ca928b43fcf33bd9b64c67655ca382b15bfec85a328bbca787a43cf3,2024-04-03T17:24:18.150000
|
||||
@ -243284,11 +243285,13 @@ CVE-2024-2038,0,0,84783e34583c406994ceb062343516951516f0b07f0d721026ee845e3108d0
|
||||
CVE-2024-20380,0,0,ed7ad99e229e06574506624c01ede2d6fb857cd8a1e722ec6a335ed1ef4a76e1,2024-04-19T13:10:25.637000
|
||||
CVE-2024-20381,0,0,1d137d93b0598fd47692ad3c3d2e46a37f7acfa84f78f58b2c3c09528c8e86fc,2024-09-25T17:15:15.240000
|
||||
CVE-2024-20383,0,0,3adbaddaf4554eb7166804e65fe9fdbf83fea813b82dd738821e310951cf1618,2024-05-15T19:15:07.900000
|
||||
CVE-2024-20385,1,1,681f7a9dddec2cafc08e3e1ee3d5736115f7fe839148bd2db8a126953b48d445,2024-10-02T17:15:15.110000
|
||||
CVE-2024-20389,0,0,160949b8c6cf6fc5f7f18a2471e2354fcd0f701247dfba3a85f25095732dcffa,2024-05-16T15:44:44.683000
|
||||
CVE-2024-2039,0,0,0fb3eb6d9df1cb8dd04206e4fde20555dc794b24595aa985157932f2a933450d,2024-04-10T13:23:38.787000
|
||||
CVE-2024-20390,0,0,5a2907cab8e9bf15e845ea050c44bed3aeb43d2fce6592a7a3404a48f7d61dbb,2024-09-12T12:35:54.013000
|
||||
CVE-2024-20391,0,0,901fcf36cebee039d4f38edb4044ef84c4f44829a18fc236320c17fd1b5f7286,2024-05-15T18:35:11.453000
|
||||
CVE-2024-20392,0,0,94a9ebb2bcbc95d69522cf1a691e2eef5f012e7892caae86240bb4af40e4b8c2,2024-05-15T18:35:11.453000
|
||||
CVE-2024-20393,1,1,6a8ae6a5d98b5a27852168969ae6d1daa91d258030662c336f6a3ac851bb7ba3,2024-10-02T17:15:15.337000
|
||||
CVE-2024-20394,0,0,ef9256f36e7609b8b050262ee885b4f4c47119c80c5a1a8288a0a5eef0d4f23d,2024-05-15T18:35:11.453000
|
||||
CVE-2024-20395,0,0,28ce7d382757f62de6c6fa8be8ab2c7d5b7fe481f67f112d437fdc5648f5ed0d,2024-07-18T12:28:43.707000
|
||||
CVE-2024-20396,0,0,ab24e73adad18da7437bdd92525b27eaf5bf0f1df88229897bcf01b790a24b3d,2024-07-18T12:28:43.707000
|
||||
@ -243311,16 +243314,23 @@ CVE-2024-2042,0,0,148bfce3b5f48e2144e9167826ed5f6f120e539bf15296a435b2ce580e8b1f
|
||||
CVE-2024-20429,0,0,f467ae3dedce5a1f38518317999bbc8fc79bc2960eb95679505ee1fcb992ae20,2024-07-18T12:28:43.707000
|
||||
CVE-2024-2043,0,0,7a3896d230f6f1ae602a08f92e2eaaa644b5893021849dee8a675eb9b7c81e88,2024-05-02T18:00:37.360000
|
||||
CVE-2024-20430,0,0,10fa05ef1e262e03d3ec6f9856a4fd60e476d60000f282e33b3976f1a0227974,2024-09-18T18:56:05.510000
|
||||
CVE-2024-20432,1,1,9afe8e56de2f474245e53b7438e12b65e4560d02a3f69fb1fa2454f77ac4ba13,2024-10-02T17:15:15.550000
|
||||
CVE-2024-20433,0,0,cac88c988c19685837ee5dbc2d656503922c9f0b9e71ea73ee8edd842ba62056,2024-09-26T13:32:02.803000
|
||||
CVE-2024-20434,0,0,880e05acefa3209e23abe1c6ab99bf4f9ab4fd2e1403678e2af13f0c181f3b38,2024-09-26T13:32:02.803000
|
||||
CVE-2024-20435,0,0,bea0a896db86de220514ce1618de53b05523503910f680b3361f4c8bb8734dd9,2024-07-18T12:28:43.707000
|
||||
CVE-2024-20436,0,0,41bc6e4345819d91a4b8a7e2df98b24823b53ecbe6191936af5242501e9ac76c,2024-09-26T13:32:02.803000
|
||||
CVE-2024-20437,0,0,180b6b0015b269c98df26bf106a68aa4ffa1964219b67b451003fdc3def577fa,2024-09-26T13:32:02.803000
|
||||
CVE-2024-20438,1,1,f3d6c5fb0395310f3106449e7d7514e80194fac91de81eefde865f13ecb37ec7,2024-10-02T17:15:15.753000
|
||||
CVE-2024-20439,0,0,d6b5bcbae917ca310708f2b3bf5f6e48a7ee01ce537e933ecbd837bca81ceec5,2024-09-13T19:35:32.477000
|
||||
CVE-2024-2044,0,0,20580816ecbcb2d456bf5030911ad2dbba893322604e54631bb30d65d5e1ff74,2024-08-01T13:49:39.293000
|
||||
CVE-2024-20440,0,0,c9c53dc5c2cee258d8848cdc1782766d626f4ac361af7ec1e658341d1dc604f2,2024-09-19T13:42:41.017000
|
||||
CVE-2024-20441,1,1,ea7ec35099b3479b4a42dc1cec8b048cb09038cde53348977420d31e6502eef4,2024-10-02T17:15:15.967000
|
||||
CVE-2024-20442,1,1,dce46f9f985e9e115d9996e7eefe607767c670f164ae30e0b6a0d6faadde003c,2024-10-02T17:15:16.177000
|
||||
CVE-2024-20443,0,0,272afbe0465f6648950651b716899dcfcb722318ac954aaaf0e63544fb83de9e,2024-08-23T15:18:06.347000
|
||||
CVE-2024-20444,1,1,bbe205adb01d80650f424c608a627fdcc9c45f394d384bea90f956f34c6ed80e,2024-10-02T17:15:16.390000
|
||||
CVE-2024-20446,0,0,e9357eb0aa4f61946fea3c9e67283cca574773e1e525326f07a38ede4840249f,2024-08-29T13:25:27.537000
|
||||
CVE-2024-20448,1,1,9c2556f7d1f0f64d32fa6bc38cdd8bff54cfbeaea06b86b28528329d348a558b,2024-10-02T17:15:16.597000
|
||||
CVE-2024-20449,1,1,841aae85b390779b5a1b3e9e068174d54cac131c7c210518d30c93691fa5019b,2024-10-02T17:15:16.820000
|
||||
CVE-2024-2045,0,0,711ac9453656184dc732c4f4633f4f7bda646ec847d7f0c1c60c568976f58aa0,2024-03-01T14:04:26.010000
|
||||
CVE-2024-20450,0,0,a40597aa01c7c808e6329a0cff711d7709db0a15729885e98911c863c6fe701c,2024-08-23T18:14:43.787000
|
||||
CVE-2024-20451,0,0,616ab4cb2b50cee49c462941d4d3e48792a6a3c09b725bd97a134b2f4a53bec9,2024-08-23T18:14:11.137000
|
||||
@ -243333,7 +243343,9 @@ CVE-2024-20466,0,0,1f67211864766033ae7df34d7b817672b03d47284d690437051f747cfe419
|
||||
CVE-2024-20467,0,0,e522c87bb5703dc456a43be83e9a8d8f7e55a99582e1fa59e471a197999a14be,2024-09-26T13:32:02.803000
|
||||
CVE-2024-20469,0,0,394110c2afcd5812c9d147805c76bc56d743563b5c07576e0d27ad32427aafe0,2024-09-20T16:58:14.327000
|
||||
CVE-2024-2047,0,0,65f16d2420b90c918e9e57877aac5f0440eb772d779ccbd58288e6312f3c8025,2024-04-01T01:12:59.077000
|
||||
CVE-2024-20470,1,1,0c6df7dcadd459068a09105d73d9b9cc9b5e48af790790caa4837dada6103d64,2024-10-02T17:15:17.027000
|
||||
CVE-2024-20475,0,0,41064f149816a8d964e76d7aae3e94d00a39e375d0b6b927e67dd24f6bcf5eaa,2024-09-26T13:32:02.803000
|
||||
CVE-2024-20477,1,1,c50f95b5999c3ee6cce4ec009056fa2b4185b6ff8a367d09599ec578443f8d8d,2024-10-02T17:15:17.130000
|
||||
CVE-2024-20478,0,0,7159d6f0353997233b844f180b9acaa4a22410a663dfe8445f14235dd4611029,2024-08-29T13:25:27.537000
|
||||
CVE-2024-20479,0,0,ced5b461eb6ab05478119ddf8b399bbc19a6ff248adc19d6fde8eab586c6db76,2024-08-23T15:14:45.913000
|
||||
CVE-2024-2048,0,0,3fe9d949673d5eedf190595df45c4c7d30c6a66a4722ea0631f740f815dd3cc0,2024-06-10T17:16:25.067000
|
||||
@ -243343,6 +243355,9 @@ CVE-2024-20486,0,0,1ec7a6c2a991b67e11827b3b316fed30b5b5340988b303f9088e0f10e2e89
|
||||
CVE-2024-20488,0,0,b3c319abc05ee7d52fc498f08ba4c2d91fe7b6f1527a7957b5c4a113170ee559,2024-09-06T17:18:11.813000
|
||||
CVE-2024-20489,0,0,21cc73253209554f6b4b15a9223bc3f2b9ae3b7c0f2dd8d7b8823af1edcfee1e,2024-09-12T12:35:54.013000
|
||||
CVE-2024-2049,0,0,398a9eaf0287296877598afba029844504bbde28a3270479d8cbbb594cc11b40,2024-03-12T16:02:33.900000
|
||||
CVE-2024-20490,1,1,ec927651c32c903b11e9798fae33257de45aefb41a28e42aba7eeae99644d03a,2024-10-02T17:15:17.350000
|
||||
CVE-2024-20491,1,1,447e13224740a72f3cf370277e4a25a3f94d2b6121177e45dd771d452eb8b07c,2024-10-02T17:15:17.563000
|
||||
CVE-2024-20492,1,1,133fac4f14030aac16725c48ad6e12cc8163d4bd26fcc24e348b091eb8be4c04,2024-10-02T17:15:17.763000
|
||||
CVE-2024-20496,0,0,127f60097f974f24aadc62900a388547cdf18c3a62d9e6416696d085e67625df,2024-09-26T13:32:02.803000
|
||||
CVE-2024-20497,0,0,422eb4ecec5d7dd92ef5d49505af3bc2f0e220b53f5fa76471b6dd3d460b94cb,2024-09-05T12:53:21.110000
|
||||
CVE-2024-2050,0,0,309a92deb7dc6d1c9b389273f8521ce493fa3e8c536f740883081c4cdf858e77,2024-03-18T19:40:00.173000
|
||||
@ -243352,7 +243367,17 @@ CVE-2024-20506,0,0,b3839959ba904d7db54237791da3f84bfa0eea3b79a536a06b85b587186e3
|
||||
CVE-2024-20508,0,0,a4fe0896946d7cf41903535dbf2f0ff3799c2bdde7a0579e98abf95ba0605e78,2024-09-26T13:32:02.803000
|
||||
CVE-2024-2051,0,0,7b283f8057b783b668166a17f1e1ff3c63b74d0e0fa3f6b8acdcd7e3ce5a09c9,2024-03-18T19:40:00.173000
|
||||
CVE-2024-20510,0,0,77e73cd6363cb5f1f2bcc9093ebb94dae24f275478be794b11c101171344660f,2024-09-26T13:32:02.803000
|
||||
CVE-2024-20515,1,1,0d1ea5fc0395aeba8d912b33829b73c6e969e0e6b8085212bd58f0a2b6be4bc3,2024-10-02T17:15:17.973000
|
||||
CVE-2024-20516,1,1,07c81f6263ffabf8b1d2a73001a0fcf7e8a4965f15caa0bb6884fc278b2b4a16,2024-10-02T17:15:18.200000
|
||||
CVE-2024-20517,1,1,969af6eead693d2fcb8ede1efbf6a0f6bb85028e0ee6315d2fb937e7bc3da884,2024-10-02T17:15:18.417000
|
||||
CVE-2024-20518,1,1,a53e69d54de767534e5b85992f4736a54495e651d0cc9e7ba20057e6b1917cfb,2024-10-02T17:15:18.637000
|
||||
CVE-2024-20519,1,1,03929cac62fa50b8991b095c6ab97754cbf7b1971bb4fac47b68e70d367a28a2,2024-10-02T17:15:18.837000
|
||||
CVE-2024-2052,0,0,b3dd7173b956ed9ab7dfaa381fa39b77e63aea1f604a72f8ac014b370895d6ab,2024-03-18T19:40:00.173000
|
||||
CVE-2024-20520,1,1,06d0bc3faa846706c688273d17cb961483e7a5d4478394e43483da9fee14e442,2024-10-02T17:15:19.050000
|
||||
CVE-2024-20521,1,1,516d9d1c2d87560684d5a622f6b1e5604f449cf1f4aedad1c3a8810b8e801cb9,2024-10-02T17:15:19.280000
|
||||
CVE-2024-20522,1,1,feb40575a0c32d2adb983c9b84f5d6f10aadd63215236f2284e450fd3982d5d3,2024-10-02T17:15:19.490000
|
||||
CVE-2024-20523,1,1,8c45695f65f7576d13a20c6cdc2eb52929e511b8ef2b7253add70c9a5f4302f4,2024-10-02T17:15:19.707000
|
||||
CVE-2024-20524,1,1,cefcbef896e744cbccb73890a15b1caf90e8cad7faa4e5f01be7bdda92685a1a,2024-10-02T17:15:19.930000
|
||||
CVE-2024-2053,0,0,0d41c4e474c0960eb5e2399ded25845c51347c47ec843b53809f61d1e3d8fe3e,2024-08-06T15:35:13.397000
|
||||
CVE-2024-2054,0,0,5af7272a2140be959232b9c889b5facdacd3c4cf8342e14293010d7ec8d01b60,2024-08-05T20:35:09.723000
|
||||
CVE-2024-2055,0,0,07b933beaff1c6c6636c1d85ffcd111ff83285195075526678d7cb747831ae01,2024-08-26T16:35:08.047000
|
||||
@ -246596,12 +246621,12 @@ CVE-2024-2514,0,0,956e72a82145af5df3731620e2db9c4a0fa06ee5f96614ef673f99b0f16dc3
|
||||
CVE-2024-25140,0,0,02a3bba96efcbad73ad6520b616dcfe50317ca878d5df8798f56ac79d62fc648,2024-08-29T20:36:15.900000
|
||||
CVE-2024-25141,0,0,8a66a513cc3d5a929dbc0c208ddda5ccbe2cb769979056b34d518690cf1f89c1,2024-08-15T20:35:03.310000
|
||||
CVE-2024-25142,0,0,19d4bb5bd9d9370afd571c0a6d80ffe65e65cfd553d5b4ccef4ef771df0d1e04,2024-06-17T12:42:04.623000
|
||||
CVE-2024-25143,0,0,10a6bb922da86e2acb7fedc41f329f10932019b09aa65cbea04bcb9e229da526,2024-02-07T17:04:54.407000
|
||||
CVE-2024-25144,0,0,8416cb9676120788fbc94760aa779f11f83eeafe55e75ecc3de9574dca979c73,2024-02-15T04:36:24.350000
|
||||
CVE-2024-25143,0,1,31d25cf0fb6ca436405cd759cee1d69276c6aefe963bad6366e8c8192c1421e9,2024-10-02T16:15:09.833000
|
||||
CVE-2024-25144,0,1,e105222f7a750ee8fa3f0de9d118bf1e3ac02f5c85afcbf968453073cccaf090,2024-10-02T16:15:09.950000
|
||||
CVE-2024-25145,0,0,019019fbbbd35f7bb94f83f848a86247a2567342a1d429cff7e78b25bbb4c980,2024-02-15T15:10:35.503000
|
||||
CVE-2024-25146,0,0,2df270f52850547876c3822e2ea04ebd4280017868acba4a2703de60feb94949,2024-02-15T04:37:12.337000
|
||||
CVE-2024-25147,0,0,5f589c94d4539a75e7bd13c4a6e3893feb672773db12c998a1191bd7d8e5d6df,2024-02-22T19:07:37.840000
|
||||
CVE-2024-25148,0,0,1bb9b4d761d3b47398fbe7e9fb558a373f38d4df7189bcdd55e4764ee660a73a,2024-02-15T04:37:31.957000
|
||||
CVE-2024-25148,0,1,12cf371e60d0fe8beb6847bfd3ee7abc066265872293d2f0ff3d19c190e10c32,2024-10-02T16:15:10.087000
|
||||
CVE-2024-25149,0,0,0dcfefe4eb72411e258f347a5e85512d947dc552eaf5a2d3bf9f1091ea5082e7,2024-02-20T19:50:53.960000
|
||||
CVE-2024-2515,0,0,d53a54e6a2a251d59bea1146e400f57238ec6368cfc33345b9fce382f9f57216,2024-05-17T02:38:16.260000
|
||||
CVE-2024-25150,0,0,b41fd0065cf0c548a9bf97e8fc529393a18612fd746cbcce411c874e683aa818,2024-02-20T19:50:53.960000
|
||||
@ -247418,7 +247443,7 @@ CVE-2024-26261,0,0,513bda7a092399193b5a95cba8191ef907d5160f5f00ea0bdca470614c45d
|
||||
CVE-2024-26262,0,0,477ca5f77e6d6ee11fb6414baf836a33792fc56d3dd35a0da6288b09c184bb21,2024-02-15T06:23:39.303000
|
||||
CVE-2024-26263,0,0,652374740b3eebe8eb0261cbf85b2a6a1582520a998306145fd8c761f4f86104,2024-02-15T06:23:39.303000
|
||||
CVE-2024-26264,0,0,bf52114dfe3cf3dd2fc7560bc6730e53c624d928ff0554d70b0919142e972a3c,2024-02-15T06:23:39.303000
|
||||
CVE-2024-26265,0,0,4355cf6e870d853a3433153da6bd074bb1138daae6af3eca76056ab318abbd4e,2024-02-20T19:50:53.960000
|
||||
CVE-2024-26265,0,1,48d2b9174778d4a475c5945869a28953f11cb3bc76a0cba653842a8fa9da595b,2024-10-02T16:15:10.190000
|
||||
CVE-2024-26266,0,0,cd4c3538fa5abe1895c4c4433d10b2216b10f5bef416f2e6936da725b6d985af,2024-02-22T19:07:37.840000
|
||||
CVE-2024-26267,0,0,526b093bece853e53698efa67210e9eb2a6f80299ca5ca39b60b96f837bf6a69,2024-02-20T19:50:53.960000
|
||||
CVE-2024-26268,0,0,a834c6859c82fe01c7319b79ec743ac2e1e48384520fe6bc3af73c96ba93cc1f,2024-02-20T19:50:53.960000
|
||||
@ -247989,7 +248014,7 @@ CVE-2024-26976,0,0,30943d015d6f9e470cbf6f9a436113a4fc8c476dd148f5ad8d13b404e4bae
|
||||
CVE-2024-26977,0,0,1ebc6c5c595b695887aee884e1b3633cb0833cb65f13c96d7b2e671b86068f61,2024-05-01T13:02:20.750000
|
||||
CVE-2024-26978,0,0,b62ba10e220aee05c207f27d9ce90b8810a5ae9c8aebf27ac3c64683154dd1d6,2024-07-03T01:50:11.337000
|
||||
CVE-2024-26979,0,0,33d8a117099141e9ac17b778389695861dbfcb2a950ec3472e402d03bd709b88,2024-06-12T16:15:11.147000
|
||||
CVE-2024-2698,0,1,40bd5a1cdf4bb74113246fbb824eb2e69afabe86a31672736550bc5463d9a867,2024-10-02T15:15:14.603000
|
||||
CVE-2024-2698,0,0,40bd5a1cdf4bb74113246fbb824eb2e69afabe86a31672736550bc5463d9a867,2024-10-02T15:15:14.603000
|
||||
CVE-2024-26980,0,0,66004865e97bac01ca2fcc8b2212adb69ec738c42c9473f52383ac2219c51794,2024-05-17T11:15:08.357000
|
||||
CVE-2024-26981,0,0,d2097042ff43763161fba07eb2edb36cfb373acac608a1af8d5b7b1aed54db35,2024-06-27T12:15:23.460000
|
||||
CVE-2024-26982,0,0,1a2169fa3b40190b3ed39d1072c0508ff86c68871ae50c9090fd9edb12452c09,2024-05-03T06:15:10.953000
|
||||
@ -252496,7 +252521,9 @@ CVE-2024-33181,0,0,050373cfb1c1e53ba8267dbc3fabd7fa63ef5d1b950dbe9c6f1ffa2007dbe
|
||||
CVE-2024-33182,0,0,85cf52b790aabe853226358e7739617cb8f2d818ce16c35309a03355724b6ba5,2024-08-01T13:51:45.673000
|
||||
CVE-2024-3319,0,0,3b63602fbf088f6ff76602ae3f5143e8ab646a9d9d32adce3daded5265d3ba0c,2024-05-15T16:40:19.330000
|
||||
CVE-2024-3320,0,0,00dd140c669ed55b9724819953be5e5ab674983ce3dcac0f7cca51e60d13bb6e,2024-05-17T02:39:50.797000
|
||||
CVE-2024-33209,1,1,097f8cdeebb5719cc6dca525a22d2c26b06526a45c93f45fb4dbe02ed149fcdb,2024-10-02T16:15:10.300000
|
||||
CVE-2024-3321,0,0,c2a87eddc88d30331563f9d17a640b75164460d2c5dacd42388be73c643c2230,2024-05-17T02:39:50.900000
|
||||
CVE-2024-33210,1,1,ea119992daacb8d52af556b012e2d35a09b3683a173069df0c6e1c2c4f9d3945,2024-10-02T16:35:30.553000
|
||||
CVE-2024-33211,0,0,46152f7fae2f0904bdc8d43eed72ce61042ffe07ea20488d0724e6d357feeeca,2024-07-03T01:57:35.503000
|
||||
CVE-2024-33212,0,0,e1465636a9a0085dbcb931f6bf0bf00f21c6133d537bb14ffddf0238c4968d35,2024-08-16T16:35:11.323000
|
||||
CVE-2024-33213,0,0,535ed6b61a2defaf607542370541a34cb9da6a875bd2f52f1cf422d4fb6cc3a0,2024-07-03T01:57:36.257000
|
||||
@ -254724,7 +254751,7 @@ CVE-2024-3631,0,0,2d02e6433eb5754f41661766194384a96e84152255ba4510c23359c3175c97
|
||||
CVE-2024-3632,0,0,b5152c6f3734461efaf203a246eaafe8ef0e2600523c2de907e61dd2f01c5bfc,2024-08-01T13:56:37.647000
|
||||
CVE-2024-3633,0,0,56839b289684cefae86bb3dbba78c89cd0cc4141e4ff321380a2afe97575b1d3,2024-07-03T02:06:26
|
||||
CVE-2024-3634,0,0,5d02e3f893ea5650c3ad2b96f123134b624618fa357ff3bdcb3a7b4c93242ece,2024-05-15T16:40:19.330000
|
||||
CVE-2024-3635,0,1,b778d7b498dcea7fa24c3ef8d2fdc2e16efa86aeebfac3bfee1e098824c6eea4,2024-10-02T14:30:24.627000
|
||||
CVE-2024-3635,0,0,b778d7b498dcea7fa24c3ef8d2fdc2e16efa86aeebfac3bfee1e098824c6eea4,2024-10-02T14:30:24.627000
|
||||
CVE-2024-36358,0,0,af47b72fb8afb1752f05b722e59135646af27eabe6a52a7a346d1b2f983dd9bc,2024-06-11T13:54:12.057000
|
||||
CVE-2024-36359,0,0,f23101db48854affc5e103b47d6b2305b7e6ac13ffa7941483a75abefead3f7b,2024-06-11T13:54:12.057000
|
||||
CVE-2024-3636,0,0,4d79aacd53f2ff2167f5a1fa2a92eed22c11ede875a2d9112617f861658a4106,2024-08-07T16:35:14.110000
|
||||
@ -256119,7 +256146,7 @@ CVE-2024-38374,0,0,b039c6889e3b25105130cda3cb4d6252830c58349362eac54e70e39939e4b
|
||||
CVE-2024-38375,0,0,626cc37017b5b99d342165d2bf910513bdb2fdf5a18a0e825a4ce243860e1792,2024-06-27T12:47:19.847000
|
||||
CVE-2024-38379,0,0,24d3b7135776280dd8cbf565222ffc49917d8846e2a67b6430e1fef8b4588944,2024-09-19T16:46:38.287000
|
||||
CVE-2024-3838,0,0,19b80bb7728999ff8307a96193e2751434e29b0f17864fd13990588a7832d07b,2024-08-06T19:35:06.410000
|
||||
CVE-2024-38380,0,1,772c1db87e773ec094b30af8e675fcdb7ae8ec5c736b7a94607b2b1a80aeb8ac,2024-10-02T14:22:25.323000
|
||||
CVE-2024-38380,0,0,772c1db87e773ec094b30af8e675fcdb7ae8ec5c736b7a94607b2b1a80aeb8ac,2024-10-02T14:22:25.323000
|
||||
CVE-2024-38381,0,0,5a68653a08804721325cf4b769157d8413d44196c0ae824bb1098e9e93c70b8a,2024-09-09T13:37:39.093000
|
||||
CVE-2024-38382,0,0,5eb9605172a2cc2881cc14a987b3697e7a685364bc9cd84ed64848cef9c33fdc,2024-09-04T17:10:56.497000
|
||||
CVE-2024-38384,0,0,ae2be85d9f39947f564fb161f1fe1f488208e4ae714d2807653ca1b96b2300ca,2024-07-03T02:04:57.820000
|
||||
@ -256474,7 +256501,7 @@ CVE-2024-38809,0,0,3253fab0ee312e8a4e0cc4bceda27a807a19a408952e7e246fe3ca5d4d34e
|
||||
CVE-2024-3881,0,0,3699310594a82ce285b52bf9c21755fa8173160a66408c76064512e538b3fcc8,2024-05-17T02:40:10.360000
|
||||
CVE-2024-38810,0,0,a8d05ba61ad79ab8e573251f3391c7e33071f14ecb67883defa939520cad5b0a,2024-08-20T15:44:20.567000
|
||||
CVE-2024-38811,0,0,7963530e20965c3e978de3e3d7e692a26c21382a2c5c912f03ba846ab4c56eb4,2024-09-17T13:33:32.957000
|
||||
CVE-2024-38812,0,1,34d8657a2d86accb47b9e7e7219bd48126133821add77e5ea4911708e30f2104,2024-10-02T14:16:47.610000
|
||||
CVE-2024-38812,0,0,34d8657a2d86accb47b9e7e7219bd48126133821add77e5ea4911708e30f2104,2024-10-02T14:16:47.610000
|
||||
CVE-2024-38813,0,0,3d08a10b622d3af5696a9ed2c2a45317011023f873f91120d4c5c5927c60a9b1,2024-10-02T13:59:52.887000
|
||||
CVE-2024-38816,0,0,6659455d4c0832fae3abce29bdd91d446a380e8317fc9229e602957b66269232,2024-09-13T14:06:04.777000
|
||||
CVE-2024-3882,0,0,8cf286ca42c3a62eccb821d9ac0678dabad594eee248c127390ddaf169987d46,2024-05-17T02:40:10.457000
|
||||
@ -257891,6 +257918,7 @@ CVE-2024-4128,0,0,68bc0506eec8fccf6c4228f6f90915fa5b089633c8bc20338b2c6bd4b4236a
|
||||
CVE-2024-41281,0,0,acd5274a5314a460f4482234d2c8af8da53f6324e375946a6feb8a82983d1186,2024-08-01T13:58:25.943000
|
||||
CVE-2024-41285,0,0,f9d8e2fe08b82d3f5c7f4ac42e37bd0268ac10deb583909c52659b72a2361eca,2024-08-27T16:03:16.043000
|
||||
CVE-2024-4129,0,0,f2fba94e29dd925b8a56a23f2711717731ea628ca4457222b442fc21c3f8c80a,2024-05-14T16:11:39.510000
|
||||
CVE-2024-41290,1,1,c3129718b4e2614ba7f02c883e3040dce1f0d9288913fd384da98563a7fa2fa5,2024-10-02T17:15:20.217000
|
||||
CVE-2024-41304,0,0,97c8e67643f8470191a2e05ce641725b816a8cc5ff59a9e38a00154810fc7f9e,2024-08-23T16:35:06.883000
|
||||
CVE-2024-41305,0,0,44375e3d9aedae768570d453a5746b314221c07760efe679991b65a52a72cbb1,2024-08-08T14:36:06.423000
|
||||
CVE-2024-41308,0,0,0cfb1f5a539d1b3ab56fa248bc4e6b56744120f3ffd7eb646c940bb1f8d27a55,2024-08-08T15:04:28.510000
|
||||
@ -259540,7 +259568,7 @@ CVE-2024-44093,0,0,6e42d0c910911c845327d3b84b7e4c2d7f7d958e5900913b50cb61055b864
|
||||
CVE-2024-44094,0,0,745c42fe2d315a5bcee63bacf45ed85a137f90126e69b7519e917691efb9901c,2024-09-18T13:37:12.887000
|
||||
CVE-2024-44095,0,0,e0006363027abcd9487b2555f5c10f6b2763af7e9102189a399193814a56d2b1,2024-09-18T13:34:31.617000
|
||||
CVE-2024-44096,0,0,d8c4df36682fa8ff2c29981f1e88279da6a08cd48c4fd6b3719d80ee95e04fe2,2024-09-18T13:33:37.863000
|
||||
CVE-2024-44097,1,1,a065476bacab76518a8237c8819efbf4009f746d42ba2a0a7004b317d4355f61,2024-10-02T14:15:05.670000
|
||||
CVE-2024-44097,0,1,f41d5fa67208a9b458a91150035acf19555d230546c738fc3f37c0daec84b350,2024-10-02T17:35:15.257000
|
||||
CVE-2024-4410,0,0,ca43b98286a78ab63b5139b50b93fc074ee9aec4c16e78097aa3514c43622322,2024-07-29T14:12:08.783000
|
||||
CVE-2024-44103,0,0,709653e0e681c50169d2a31a1ca4fa07ba0b9e103bee0789c715365497e0794a,2024-09-18T17:18:39.040000
|
||||
CVE-2024-44104,0,0,929a3e88a508b197778cb9d698752e7d95d2a1fd6ba54e089d4187ada17accb8,2024-09-18T17:33:06.413000
|
||||
@ -259607,7 +259635,7 @@ CVE-2024-44189,0,0,e2ab737161ad2da12e67ce91184b5117737604e14075d78e50c43a3e20db6
|
||||
CVE-2024-4419,0,0,918f3c0166609f9f9b771eac1f6aa12d317d90973a2d5ca4b8b94efa19c28169,2024-05-29T13:02:09.280000
|
||||
CVE-2024-44190,0,0,5081ce2fbdd1649caaed595db236986bbee24e3cff5adfb1ad5f115afe6eab20,2024-09-24T18:02:25.313000
|
||||
CVE-2024-44191,0,0,fd90f1ba5d10f528b1625af58577f983572aef3fdc720edeeb57922b3d21d47c,2024-09-25T13:24:42.380000
|
||||
CVE-2024-44193,1,1,731a8455ca405a13d2cad952c5793257b9b4090d0ffd26a9fb96713cef9f2fd8,2024-10-02T15:15:14.920000
|
||||
CVE-2024-44193,0,0,731a8455ca405a13d2cad952c5793257b9b4090d0ffd26a9fb96713cef9f2fd8,2024-10-02T15:15:14.920000
|
||||
CVE-2024-44198,0,0,a791372ee4d27381da793bfaa9ff3602c34f52c134516fb46328053cb2cef47f,2024-09-24T15:45:32.787000
|
||||
CVE-2024-4420,0,0,02a774e6911ba5e1ba33187a3301eb3f9ee3d8fd212c89cee791dd002410f381,2024-05-21T12:37:59.687000
|
||||
CVE-2024-44202,0,0,e17cdcd52ced4944b3cb8ebf1e0107ecaca0e3b137318260a8309f5868dfd271,2024-09-20T12:31:20.110000
|
||||
@ -259983,7 +260011,7 @@ CVE-2024-4518,0,0,64c3b6e6e74f6d9fd929463119875b686279109a997143c5dd3ad8e2c1af13
|
||||
CVE-2024-45180,0,0,08348c7b1382a66372a71879585bc4b470bbbe0e7bc2a628091dcf790778caba,2024-09-13T19:55:54.477000
|
||||
CVE-2024-45181,0,0,c1b3f50892c5ad2964a42f2f7c4bb1e591fc78d268d80e02244df3b7c3d3d502,2024-09-18T20:26:26.873000
|
||||
CVE-2024-45182,0,0,9a85c862314a6425e6060387f72c5f336d253a6faf88611dfadeddbd5da8c540,2024-09-18T20:26:11.023000
|
||||
CVE-2024-45186,0,1,dd0cb6069a7a3676314323dba5e5a8af7d4dda1193d70390cbae04ecfb4affaa,2024-10-02T14:35:06.610000
|
||||
CVE-2024-45186,0,0,dd0cb6069a7a3676314323dba5e5a8af7d4dda1193d70390cbae04ecfb4affaa,2024-10-02T14:35:06.610000
|
||||
CVE-2024-45187,0,0,b29c34a9281e147a1f2b33bdd2a8c272cd39081d36dd9d0273787cf191e54024,2024-08-26T12:47:20.187000
|
||||
CVE-2024-45188,0,0,b715e0fd98dc9de103c52fc47a055822268226fc14af5f0a01f3a3eab3db9def,2024-08-26T12:47:20.187000
|
||||
CVE-2024-45189,0,0,b34fadec0fb3db465bf6b7b191f2d87a7b9589d6e1c6f03c86e02522d36fb854,2024-09-12T20:42:30.850000
|
||||
@ -260255,10 +260283,10 @@ CVE-2024-45815,0,0,06eeda73da6aeda58a6c8960f205d7a720011d27a4bce46e59b74e204055e
|
||||
CVE-2024-45816,0,0,405ccbf15ea8ae9fcc093aec52f9637ed1c1902b9f58c1816b340eb464d6fa85,2024-09-23T18:41:15.603000
|
||||
CVE-2024-45817,0,0,e07d99c01a67ff9168fe9a30ba6036e488afb3a202828a218275538560c3273c,2024-09-26T13:32:02.803000
|
||||
CVE-2024-4582,0,0,44a298c10fdfe0ab8acf9c943d89720dd7bed9fa14549ad9833d5c0a75c14780,2024-06-04T19:20:42.750000
|
||||
CVE-2024-45823,0,1,69c87ecc16422910e33b859f46eb5ec7fd2de42f8535f15441d6fdd097693e33,2024-10-02T14:49:59.157000
|
||||
CVE-2024-45823,0,0,69c87ecc16422910e33b859f46eb5ec7fd2de42f8535f15441d6fdd097693e33,2024-10-02T14:49:59.157000
|
||||
CVE-2024-45824,0,0,10e16d904d2154d7119c6df05a22810044cd3b50093fd71dfd8bbe566411a270,2024-09-12T18:14:03.913000
|
||||
CVE-2024-45825,0,1,772075ec5deeaf7c7029f931ec15621230c7b2330dcd87b5ccf7ab7721cf06f6,2024-10-02T14:43:08.720000
|
||||
CVE-2024-45826,0,1,09e161f625f954ed804a43ac07521f29edea4489bb062a3b0321529236e21762,2024-10-02T14:35:38.017000
|
||||
CVE-2024-45825,0,0,772075ec5deeaf7c7029f931ec15621230c7b2330dcd87b5ccf7ab7721cf06f6,2024-10-02T14:43:08.720000
|
||||
CVE-2024-45826,0,0,09e161f625f954ed804a43ac07521f29edea4489bb062a3b0321529236e21762,2024-10-02T14:35:38.017000
|
||||
CVE-2024-4583,0,0,80422ff6020fca1720c5a88e28ab76aaa9a918b3afa6700e13782e64857c6739,2024-06-04T19:20:42.857000
|
||||
CVE-2024-45833,0,0,d66bcdb35ef05ab6c240a22f01c308be4dcef309fd562be6507d54a47e85401a,2024-09-23T13:43:42.073000
|
||||
CVE-2024-45835,0,0,2bbb89ffd28b8dc1adee7dde89d168866e6c50e525c50f0b4fc33c67b9ff7524,2024-09-17T12:11:48.833000
|
||||
@ -260327,11 +260355,11 @@ CVE-2024-4606,0,0,f985d30934b7c1f8930bf2267fb972a68a7301f3b4fab17a99fda7060e053c
|
||||
CVE-2024-4607,0,0,26d7fb8a60d9724fbac67d9d15e472fd268b8645ac384c2f62b0c7323928361f,2024-09-10T15:03:24.710000
|
||||
CVE-2024-46079,0,0,de738a0bd882f39ea47b8b780287948857238b9c551e4d68f6db004a475649c2,2024-10-01T20:35:15.110000
|
||||
CVE-2024-4608,0,0,6b948b515db267f779f431dbe386ca01ccd7f50a9fc569455bb84149dca96357,2024-07-24T17:59:54.607000
|
||||
CVE-2024-46080,0,0,fc601b9ca1b02c7d9ec64ffd3e18ec37b90c292805b3e0ba6020447020b8c32c,2024-10-01T21:15:06.767000
|
||||
CVE-2024-46080,0,1,f0f886b5c60d620e0a3763900e062e8d713a9754171e96277dfc24d03f0b830b,2024-10-02T16:35:31.633000
|
||||
CVE-2024-46081,0,0,ce234681fd295fa30b0365e788d91f8af933d72fe65b9789b0e2a2d1afc6dfb2,2024-10-01T20:35:15.930000
|
||||
CVE-2024-46082,0,0,d95641b6e12ce4e2c315980636fb143c9979cbf517556c795f433f4f608511d1,2024-10-01T21:15:06.857000
|
||||
CVE-2024-46082,0,1,dbbad918d972834efcdd6cc5d1be5c5f58c54cd9d7a61b0321ac2e925a0ee93b,2024-10-02T16:35:32.440000
|
||||
CVE-2024-46083,0,0,9a57be1cd20a7d38e5aef4fd8fde4bd404240de87843aaaa1ae4ab3787c965a8,2024-10-01T20:35:16.743000
|
||||
CVE-2024-46084,0,0,03932b1e786313bde47afcea58437164dbad1a2165bf11903e8b6ec41ebf5c6d,2024-10-01T21:15:06.950000
|
||||
CVE-2024-46084,0,1,1afba640ca072b9ac5b46978318c5ed068f301a6f2980e4922a8af26224f7bc5,2024-10-02T16:35:33.230000
|
||||
CVE-2024-46085,0,0,c40bf34999e41384db415b4f8361df5bc1a972c059bfcf483e35e9bef50d8457,2024-09-20T12:30:51.220000
|
||||
CVE-2024-46086,0,0,504c7f52322e487d2224c0cc449e69a05fcab67f7a93912f7189c1bccd5d3802,2024-09-25T17:08:41.937000
|
||||
CVE-2024-4609,0,0,b6f3fd3db9085553e8d026a562774e21d6dc7bb2eb7a9a6cfeb43138546783c0,2024-05-17T18:36:31.297000
|
||||
@ -260415,8 +260443,8 @@ CVE-2024-46472,0,0,905efea5ffd69a3fd22b9ebc43e76cd3335e2f2038a60c220dd9d439817a4
|
||||
CVE-2024-46475,0,0,f67981ea4dc5deb130e35e5981398b3bd014da3c6f6093379b2c49fae0dcdd4f,2024-09-30T18:35:09.327000
|
||||
CVE-2024-4648,0,0,911dfdcd448576dec5371ac5fe5f3ab9d434d7a73d2296063b028e9785e0deda,2024-06-04T19:20:44.580000
|
||||
CVE-2024-46485,0,0,904850996ff0ccd2e4983d6545a4277eb41afbf1d891eac2f17d8f906616c485,2024-09-26T13:32:02.803000
|
||||
CVE-2024-46488,0,0,3defdc280bdac468f540802333e8c8fef11bc704f85948e63bbf4df7cfe91eb5,2024-09-26T13:32:02.803000
|
||||
CVE-2024-46489,0,0,8b9d2d65fe9d89854929481ea662e27274eb10088356e47bf59cefd0f4ce4dee,2024-09-26T16:35:24.797000
|
||||
CVE-2024-46488,0,1,41c2092a15aede67b224d6f9481dd8740d600089d5047373dfa98024a8d780a7,2024-10-02T16:21:36.507000
|
||||
CVE-2024-46489,0,1,0556d6a2fec67f99959df88dbf0bb95ed9722504d8b825a29e35fd84905c2afd,2024-10-02T16:24:32.300000
|
||||
CVE-2024-4649,0,0,bfe7ccbfc3404b8c708ca02f740529df891f18569fdd41077ac7c5a370b61531,2024-06-04T19:20:44.677000
|
||||
CVE-2024-4650,0,0,f0fa9488793eee2640aafba918929101f3b3115e92dd694b2dacbccfd4d6c179,2024-06-04T19:20:44.773000
|
||||
CVE-2024-46503,0,0,4ac1b38036fe75f045c23095200c8437ffa99be96a41471b5f7bf60edd9894cc,2024-10-01T15:35:15.667000
|
||||
@ -260477,6 +260505,7 @@ CVE-2024-4661,0,0,f19406aac3e0e4dd229494d2c7f4a9ae6fd94c8256be755b3955222db7d3bf
|
||||
CVE-2024-46610,0,0,dfd11b66ad880194d4e8759fea756317b6075d327e3519259cd11f18ae0f4b82,2024-09-30T16:30:50.833000
|
||||
CVE-2024-46612,0,0,a589f709811c7445ac7df28a3a7782b0e1ab03ae28a72339e484d8d02cc7d048,2024-09-26T13:32:02.803000
|
||||
CVE-2024-4662,0,0,42d3ec88d759fc9bf88fc92972e0c9891830916b90a0cdbb0331ad5486f420dd,2024-05-24T01:15:30.977000
|
||||
CVE-2024-46626,1,1,b4c0ee4e29af16d2e43907e99e25ce6985822dbfcb4efcef23652ddba549adc0,2024-10-02T17:35:15.457000
|
||||
CVE-2024-46627,0,0,4cc8890cea4e8322a4c476b42c8fefe2b4b66b62a78446cc66eb2d1a373670f4,2024-09-30T12:46:20.237000
|
||||
CVE-2024-46628,0,0,f50f1f0723583928f80e0fb1e30a1b830ba848791b571a0759dc9426674fa140,2024-09-30T12:46:20.237000
|
||||
CVE-2024-4663,0,0,26abfae0d13c9db7079b41941554710f5ceae1c12961c27d4c50148758e145c4,2024-06-20T12:44:01.637000
|
||||
@ -260493,7 +260522,7 @@ CVE-2024-46648,0,0,634f7d679e68e222ea2e94cd89bc02a5346db8ce64e1a6f0ded51b9c29194
|
||||
CVE-2024-46649,0,0,2f03d297d29de9b605649bc98c942e9f2148e6f94209c6c18583bdb8afcc27d4,2024-09-26T13:32:55.343000
|
||||
CVE-2024-46652,0,0,4b3d12d4ca4fe0d1464490ffd2a8b0a83e7537df776bf6ec5250968017288c8b,2024-09-26T13:32:55.343000
|
||||
CVE-2024-46654,0,0,2f7453f2aae63e8bba7fabf459346ff6b4ea9f03b817ee7480b6439401e40c66,2024-09-26T13:32:55.343000
|
||||
CVE-2024-46655,0,1,697c64074c19e469267289c3c91c136c8f9dbd6565ff633ca73da48524a9c0e1,2024-10-02T15:40:36.090000
|
||||
CVE-2024-46655,0,0,697c64074c19e469267289c3c91c136c8f9dbd6565ff633ca73da48524a9c0e1,2024-10-02T15:40:36.090000
|
||||
CVE-2024-4666,0,0,574e789fc18a09e540199055631026983551e2de180e4487a378ddd991d469a5,2024-05-15T16:40:19.330000
|
||||
CVE-2024-4667,0,0,5f6a087811f370dc89d31ef88ad63586b7ea4db405d3be18d05609409a87488f,2024-07-12T14:25:13.923000
|
||||
CVE-2024-46672,0,0,2e3294d68f2514ca48393470be5abdd07b9de47f0436f7ee27b5dadd28da80e2,2024-09-13T16:29:17.123000
|
||||
@ -260645,7 +260674,7 @@ CVE-2024-46804,0,0,2fde954d7701fe2244ffccb1e1435e60de864c686b315e9228ec7893126c8
|
||||
CVE-2024-46805,0,0,5159fe471f89438fefa0d5d140686d61da2d0cea3c78eb408a0a4757fbac85e9,2024-10-02T12:58:59.767000
|
||||
CVE-2024-46806,0,0,ed4e1fd2116041561a62c2ee66c4e33780a9a4381fdf02b9a845a019cc19fcf8,2024-10-02T13:17:04.640000
|
||||
CVE-2024-46807,0,0,b76c0c8bfa99626db7385b1837463a89a2e9018b1d828861a724cca1379fa995,2024-09-30T12:45:57.823000
|
||||
CVE-2024-46808,0,1,088bcd1b8f3aeced54cc16a0776395f8722d270bfa484c0611e347ee4f8d57a9,2024-10-02T14:23:39.863000
|
||||
CVE-2024-46808,0,0,088bcd1b8f3aeced54cc16a0776395f8722d270bfa484c0611e347ee4f8d57a9,2024-10-02T14:23:39.863000
|
||||
CVE-2024-46809,0,0,76e7d93e2fcac77b727fe55d77bd4ffccf126388001c0509474bbeb489abf906,2024-09-30T12:45:57.823000
|
||||
CVE-2024-4681,0,0,fe9d790ee9979c1aca5fe28a3e8115d4c327b815a1753595a7df398a95b1856e,2024-06-04T19:20:46.033000
|
||||
CVE-2024-46810,0,0,a004c05f40757352e590e4add8906fd2708235fe021561ff9969f78d0a01b392,2024-09-30T12:45:57.823000
|
||||
@ -260661,21 +260690,21 @@ CVE-2024-46819,0,0,a7df575d1b5203b7d18b4381810a990ecbae0552b68c1b660793d4465a3dd
|
||||
CVE-2024-4682,0,0,b188d20fdb53d2324882bc38bcdbd4c51d4b6beb562fc8362c2866e7563895e8,2024-06-04T19:20:46.140000
|
||||
CVE-2024-46820,0,0,e02b77fbfb7c27b691f35a8ec06822e6f9168446acdd71a423d10b4bf4e98574,2024-09-30T12:45:57.823000
|
||||
CVE-2024-46821,0,0,a58e1f258f369639bd3c99b89ead13b97a56b7b3683a78b0943484df7d677421,2024-09-30T12:45:57.823000
|
||||
CVE-2024-46822,0,1,c8a3d9e215b85580ec5917e738992b4dc25efcf9e837d449af86f4aa8203218c,2024-10-02T14:24:01.757000
|
||||
CVE-2024-46822,0,0,c8a3d9e215b85580ec5917e738992b4dc25efcf9e837d449af86f4aa8203218c,2024-10-02T14:24:01.757000
|
||||
CVE-2024-46823,0,0,74e6b65053b916be51d6af5908af9de8bcd9c2ddf8063fe700f6963a1faa4849,2024-09-30T12:45:57.823000
|
||||
CVE-2024-46824,0,1,e0a90c0b6b8be6e8cdf7ea82a8f4714c063f5420a085c7bc4fdc88f4640c9615,2024-10-02T14:29:08.417000
|
||||
CVE-2024-46824,0,0,e0a90c0b6b8be6e8cdf7ea82a8f4714c063f5420a085c7bc4fdc88f4640c9615,2024-10-02T14:29:08.417000
|
||||
CVE-2024-46825,0,0,aa389e364217a0b9e16c3fcf17f7f0c6382d69ded44339c5aa61a7007a867b8d,2024-09-30T12:45:57.823000
|
||||
CVE-2024-46826,0,0,be734978861d0287bcd7e4a1cb0186beed982fdcb864acc473dc75997a104c25,2024-09-30T12:45:57.823000
|
||||
CVE-2024-46827,0,0,40baba2ef01956ae5817a5c6c5f01915d6c37f21b62c361b4db5d49834b997d9,2024-09-30T12:45:57.823000
|
||||
CVE-2024-46828,0,0,004223b8b179cc9feb2d2821c2f255bfd0f1e8b6e2ee56da948ed2efdc61c3a4,2024-09-30T12:45:57.823000
|
||||
CVE-2024-46829,0,1,9756f5c42072f53bba1b23c8dae157441c264939ffe910650603ebb072073237,2024-10-02T14:27:57.920000
|
||||
CVE-2024-46829,0,0,9756f5c42072f53bba1b23c8dae157441c264939ffe910650603ebb072073237,2024-10-02T14:27:57.920000
|
||||
CVE-2024-4683,0,0,f97d6282ccf029728c8ab8e65ca2b64efa101897ef8ccdc22b5456d11d66a8f8,2024-06-04T19:20:46.247000
|
||||
CVE-2024-46830,0,0,5a3220ccf0c3370380e51de1b5caff7b25885a9b9d75271a4ec592a9375f4960,2024-09-30T12:45:57.823000
|
||||
CVE-2024-46831,0,1,14ae7f8e12870e945bdd58f18dc055e43068d59dc30de785d452dc677b096ef6,2024-10-02T14:26:13.807000
|
||||
CVE-2024-46831,0,0,14ae7f8e12870e945bdd58f18dc055e43068d59dc30de785d452dc677b096ef6,2024-10-02T14:26:13.807000
|
||||
CVE-2024-46832,0,0,8056b5e14167e4606637fcebc8226e228ba73f7d145bd772a270292fde9f772f,2024-09-30T12:45:57.823000
|
||||
CVE-2024-46833,0,0,fae6ea6196846013711f1d6709341f19b674b8cfa05631975d23add168bca551,2024-09-30T12:45:57.823000
|
||||
CVE-2024-46834,0,0,dfbe2716c14d1826440661fb87f8c8d7efb813d6e40029f94868f663adf505ad,2024-09-30T12:45:57.823000
|
||||
CVE-2024-46835,0,1,496f6218adc12a648799c8b8c9fb7dccdd2a7aad915e4acf068fab956eb83221,2024-10-02T14:24:18.930000
|
||||
CVE-2024-46835,0,0,496f6218adc12a648799c8b8c9fb7dccdd2a7aad915e4acf068fab956eb83221,2024-10-02T14:24:18.930000
|
||||
CVE-2024-46836,0,0,b54d41ae5ec465d61622911e4de8c30a51746c8af7c3149de1568c26e0143a26,2024-09-30T12:45:57.823000
|
||||
CVE-2024-46837,0,0,973e22b93c60a220a53fc9bfa0f28bffad9d8b2bb149dda4f854bc862f5ccb09,2024-09-30T12:45:57.823000
|
||||
CVE-2024-46838,0,0,9183a6da766b06f913d1a3a8712e6c6d56d2e3592b7da6af3b2719974e1942f7,2024-09-30T12:45:57.823000
|
||||
@ -260685,10 +260714,10 @@ CVE-2024-46840,0,0,d8e5431b753614a53a08cede9d1dc8d8174b6d84df5473ed659ee61687059
|
||||
CVE-2024-46841,0,0,89d23cf5d6a67427b3a52d9320f801118193f51775c7e9f100ee3dbac22f74cd,2024-09-30T12:45:57.823000
|
||||
CVE-2024-46842,0,0,22faf02261aa59d11cf2767b0d7c9469127ac25d1afcaba10a2d060d376b0a90,2024-09-30T12:45:57.823000
|
||||
CVE-2024-46843,0,0,eb3231d989152db17c7206ea44c2fc597f70c097ca38cf8e226bf5d34b414947,2024-09-30T12:45:57.823000
|
||||
CVE-2024-46844,0,1,68130d99ba2d9b6411c30fe89ce02f5f664105b08e8d9b6d10d8d24d40fbca31,2024-10-02T14:22:50.533000
|
||||
CVE-2024-46845,0,1,775e48219f57ae411a9fd39af0ffe3f35a42c275a25b80d4e64503a6fc153604,2024-10-02T14:18:32.923000
|
||||
CVE-2024-46844,0,0,68130d99ba2d9b6411c30fe89ce02f5f664105b08e8d9b6d10d8d24d40fbca31,2024-10-02T14:22:50.533000
|
||||
CVE-2024-46845,0,0,775e48219f57ae411a9fd39af0ffe3f35a42c275a25b80d4e64503a6fc153604,2024-10-02T14:18:32.923000
|
||||
CVE-2024-46846,0,0,90e473ff3287976c7a74ed9b83a018488b7185ddf6d520cb6c65035a8de1c7f9,2024-09-30T12:45:57.823000
|
||||
CVE-2024-46847,0,1,c7a299dfd11a6ada51f8fcb0d442182a51fbf3432bebe2696fbf544d4f917c06,2024-10-02T14:16:08.180000
|
||||
CVE-2024-46847,0,0,c7a299dfd11a6ada51f8fcb0d442182a51fbf3432bebe2696fbf544d4f917c06,2024-10-02T14:16:08.180000
|
||||
CVE-2024-46848,0,0,75be985f4c307071e6330022d7ad7e21418ad2edaa3f1ab8b4ddbeb44c053e41,2024-09-30T12:45:57.823000
|
||||
CVE-2024-46849,0,0,7b1f01f53478d25b12adf0d307135ae5baaf89880e33ec19f4066834baf76dc3,2024-10-02T13:25:27.163000
|
||||
CVE-2024-4685,0,0,38350af74ad68911fd851342727812175d5d39b6f847c1ca12945db68e23926c,2024-06-04T19:20:46.443000
|
||||
@ -260703,7 +260732,7 @@ CVE-2024-46857,0,0,8dec4e3463ee57c87efc640c94114393b6fa85793860c8b91fb9a36833ad8
|
||||
CVE-2024-46858,0,0,49cb83621376018f4b52cc3254920fbddd535744ae8d27d488860900395f707b,2024-10-01T17:10:14.703000
|
||||
CVE-2024-46859,0,0,219881cf57e0abd9fdd1246bb95fa67acffa1997ce6f943edb640b7145167614,2024-09-30T12:45:57.823000
|
||||
CVE-2024-4686,0,0,7fade2d4b0959e1a2b3034c64ee7734431bcab648eb69e4bd96a18330c891096,2024-06-20T20:15:19.483000
|
||||
CVE-2024-46860,0,1,da16c5af34531df299c8ad7ccf3e24722b563106cc1b923e33d44e44e1ad84df,2024-10-02T14:04:38.863000
|
||||
CVE-2024-46860,0,0,da16c5af34531df299c8ad7ccf3e24722b563106cc1b923e33d44e44e1ad84df,2024-10-02T14:04:38.863000
|
||||
CVE-2024-46861,0,0,c6ebac6253a83dc2f920da893d314648878d5859bee9d7cdfe7dfd4445c9abef,2024-09-30T12:45:57.823000
|
||||
CVE-2024-46862,0,0,8ed5b69c03f390ff3625d3e803e9cc39c3a1ad18d3dc6c15990d96abef3f3d32,2024-09-30T12:45:57.823000
|
||||
CVE-2024-46863,0,0,d79d5950a88e299aa0f19f6f5fd912414b163ffb8236ed8adb506b0f7f1da245,2024-09-30T12:45:57.823000
|
||||
@ -260829,7 +260858,7 @@ CVE-2024-47182,0,0,e6d6599745fb7b6ca571eb228e79e45bdc8c54e3ef9ca737532323ab39f37
|
||||
CVE-2024-47184,0,0,8c33cb631f21c310fa82c8b5254a8b4bd69f77d420e21f25811748f0f58bb5de,2024-09-30T12:45:57.823000
|
||||
CVE-2024-47186,0,0,85f9ee5a5901f7a68ce64fa53ba9991136dfecf88b48bceba5f09bc991f04ddc,2024-09-30T12:45:57.823000
|
||||
CVE-2024-4719,0,0,5f15010ce3da97593d62bd8e5cbd7e4df0db8fec077945fcbb72e898184ff8a0,2024-06-20T20:15:19.763000
|
||||
CVE-2024-47197,0,0,e744485fe82b2c7f5b7c9d650df3296f2a00094efea0a5ed0597ce38048212b5,2024-09-26T13:32:02.803000
|
||||
CVE-2024-47197,0,1,e4a1d8789bd0c967523f7418fe544ba10b0b511b96a39b8a241e5a1afb5230b4,2024-10-02T17:25:36.990000
|
||||
CVE-2024-4720,0,0,eb5b6c06efbc2e8e5b700d46905e09781ba603e4dc4e18ff8664640e85fa6762,2024-06-04T19:20:47.440000
|
||||
CVE-2024-4721,0,0,58190a4c7e114543454f0451ab9386f5b2fe1b56ab67d3c8b011dbecb251f4fd,2024-05-17T02:40:34.750000
|
||||
CVE-2024-47210,0,0,ca2b900fbd9eb194b293e1ce40d6ad1fe1c427789838eaeabb19878edb5f2c77,2024-09-26T13:32:55.343000
|
||||
@ -260856,12 +260885,12 @@ CVE-2024-47294,0,0,616aaa0c0c25f743060360eec6e57e8d54e0c598ed571a7197a1a16575817
|
||||
CVE-2024-47295,0,0,c93abca76c7aa66145a5a013b2ec6fc0d6f01bbea875548408ba1b2806e98d17,2024-10-01T14:35:03.430000
|
||||
CVE-2024-4730,0,0,055c30f8bd03259d264f17e44955582c75615e93d958180e12436700bac392ab,2024-06-12T20:15:13.300000
|
||||
CVE-2024-47303,0,0,4fd81bf971579cf0e00271b5e072c908021bfefdc76c11f84286ad7788e9cb34,2024-09-26T13:32:02.803000
|
||||
CVE-2024-47305,0,0,2c8f799a296592421ee25aa9899e311f2f61ad0eb53c72b4da9231822f1148ec,2024-09-26T13:32:02.803000
|
||||
CVE-2024-47305,0,1,7c018d03a71f28200e41a87d693293b1e365b3b52710d7dc9c8bc548afdcc447,2024-10-02T16:35:40.077000
|
||||
CVE-2024-4731,0,0,ff0f4697afac2eb26d16b700c40cb0a3947b6039ec9b762c8c08a8e49bc998ce,2024-06-04T19:20:48.130000
|
||||
CVE-2024-47315,0,0,f8fc8e04ef461f394697878d14c77fa20555585c6db931561c38f9edd4a9ab5c,2024-09-30T18:06:36.060000
|
||||
CVE-2024-4732,0,0,2f9d1622a74bcf5d144d47d69a297d840c0353e903036f272ef15e7560aa5dbf,2024-06-04T19:20:48.237000
|
||||
CVE-2024-4733,0,0,bab73609d3aaa55dacedcdd69b9c9d83fbc709adf98853b3adb423b13daf2498,2024-05-17T18:36:31.297000
|
||||
CVE-2024-47330,0,0,a0e4c848573d9b135f4e2651c83b6b523e8c5bd0ca01b687162a3441017ae278,2024-09-26T13:32:02.803000
|
||||
CVE-2024-47330,0,1,8e1bb94d03c47cc1936bb0a3abc1d94c591039097eebb503639095132d634032,2024-10-02T17:26:49.470000
|
||||
CVE-2024-47337,0,0,3f50b583aae71c6f8cadac0ae6ee64e91fb1dabd9a75ac191a842163ad487c42,2024-09-26T13:32:02.803000
|
||||
CVE-2024-4734,0,0,0eefea1299cd16be8adb4bc3a22d24ee524acae6c15e2191dca2420e7021d6ef,2024-05-15T16:40:19.330000
|
||||
CVE-2024-4735,0,0,74f4fbd101bb46efdc880f338cfb70c8fd3a6ef365bd7732d2107c79fb3d78b8,2024-06-04T19:20:48.397000
|
||||
@ -260902,10 +260931,10 @@ CVE-2024-4759,0,0,88e594c7c898a4e82a1a8532a1f049d1a9fe25baf60278988c21dabe64f289
|
||||
CVE-2024-4760,0,0,68ac2eabdd1ace978fad05fc48c22bb964a87e93631e50aa97e53cb7b4952d59,2024-05-16T15:44:44.683000
|
||||
CVE-2024-47604,0,0,b6b4fc903f99b2043f88ddbd3163a454dae216b1bade4187e503e59baa13044e,2024-10-01T16:15:10.003000
|
||||
CVE-2024-47608,0,0,183b8f26709f0bb4c9315ae5ac8f0737eedb89fb07f4c926502b272e6d5567a7,2024-10-01T17:15:08.970000
|
||||
CVE-2024-47609,0,1,555d6b2b05ef097d6f46eab3f45f164bfb9fab39f1ce72e0c1426713e9aa488b,2024-10-02T14:35:07.770000
|
||||
CVE-2024-47609,0,0,555d6b2b05ef097d6f46eab3f45f164bfb9fab39f1ce72e0c1426713e9aa488b,2024-10-02T14:35:07.770000
|
||||
CVE-2024-4761,0,0,490aec64931f999440aa7ba804cefb45baa762d4b1b18a12f1a0ce61a5d54b49,2024-08-14T17:06:52.260000
|
||||
CVE-2024-47611,1,1,5ab68f9c4958181cdd0e1935d8e73708b53540cfb109e2caf4693dd5d7fc6ffa,2024-10-02T15:15:14.980000
|
||||
CVE-2024-47612,1,1,1981a610491546210a30a6a2dd9f593698e6ec4275e7e7b83130f7f983dd1587,2024-10-02T15:15:15.133000
|
||||
CVE-2024-47611,0,1,b926e9df1217329843befb987d6ebbb03fb5af9de6c2becfc5849934dc4fb029,2024-10-02T16:35:34.060000
|
||||
CVE-2024-47612,0,0,1981a610491546210a30a6a2dd9f593698e6ec4275e7e7b83130f7f983dd1587,2024-10-02T15:15:15.133000
|
||||
CVE-2024-4763,0,0,674813a6ab24bd703f885b42dfe132f3057b83ab6d40519e0af01ad0b69a7ece,2024-08-19T13:00:23.117000
|
||||
CVE-2024-4764,0,0,d4513c07467374a5b389bb93120fcb2ac353ef34ecf409f85646dd7a83574a17,2024-07-03T02:08:04.193000
|
||||
CVE-2024-47641,0,0,d8a923752c07b02ea5386415a7b0ad8cc8f9093d938474666f31f411f6951ce8,2024-09-30T13:15:02.570000
|
||||
@ -260925,6 +260954,11 @@ CVE-2024-4777,0,0,96d0d896ebb105a32ed437e794c8fc4ba926ad921436ba17bdb49a1a49737b
|
||||
CVE-2024-4778,0,0,e3020a287fa6ceae8ff9c78434f10af4d17cf4058dd5bf80208c921b6bc68bef,2024-07-03T02:08:09.053000
|
||||
CVE-2024-4779,0,0,7a9d6158e8d260b03b3581dd37b23bd10d59ba6243714ad236ba79968e8d9b16,2024-05-24T01:15:30.977000
|
||||
CVE-2024-4780,0,0,4aec24b958d50bff73d14c7bd2f67b2a9793d4893d5ddbdba18f0fb02ea18cc9,2024-07-16T13:43:58.773000
|
||||
CVE-2024-47803,1,1,a9a67b61fdcb4757c6e6d3bc6151177c2c973b5e0c1d174afc8511a1486e7b9e,2024-10-02T16:15:10.630000
|
||||
CVE-2024-47804,1,1,5eaf8294cfcd4a5d65dc8d9fb1b6d4ecd42b0948f1ec1702cde5a1152ffc7e83,2024-10-02T16:15:10.697000
|
||||
CVE-2024-47805,1,1,ded7232315a4d8c49b960c86dc1c18b5736d1b2cce6e8cb380ebda3a9f4d22dd,2024-10-02T16:15:10.753000
|
||||
CVE-2024-47806,1,1,fdec1ce2d6768d8f1e400b23e12eedeca48d26ee6da805999377b112efa98557,2024-10-02T17:35:16.567000
|
||||
CVE-2024-47807,1,1,fbf2b5641e02496ca57a08a6b36ab0493bfa73ffbb1f158c0fd3bb3a55b43be4,2024-10-02T17:35:17.357000
|
||||
CVE-2024-4781,0,0,75b4bbbeaedf32c6df964ae89a5896455d04ecbdf24f849877528cd42d17cfaf,2024-08-19T13:00:23.117000
|
||||
CVE-2024-4782,0,0,37dcdb14f7d23ae467b62646ac8eb504448e2a7781e3c175892c72dc54d3aebf,2024-08-19T13:00:23.117000
|
||||
CVE-2024-4783,0,0,413c0436e6758a988a0c847533b21e34b17a9d936626eba8cda1a5d1f87e0181,2024-05-24T01:15:30.977000
|
||||
@ -261548,7 +261582,7 @@ CVE-2024-5473,0,0,7a9289264d1a834c0b8e9151c353ddcb7a22a22f6b7d360897c02053aaaeb8
|
||||
CVE-2024-5475,0,0,e09a66bd4d026df38a62a9d0642b82f2a5b9bf49c6a2d9e0e1e141414790fdd3,2024-07-03T02:08:58.050000
|
||||
CVE-2024-5478,0,0,c601a39452cb705e9035daa72131a8a960693dee4deccdae668f9ad5d8466d4f,2024-07-19T18:29:50.137000
|
||||
CVE-2024-5479,0,0,7bf7a94732a4ce28b83209c9d21f799503dcb5933696ba21b8f4bc98737c6d69,2024-07-09T18:19:14.047000
|
||||
CVE-2024-5480,0,0,e3b751f5e1aae9a001af5fbca0b04d0edc5a2fa5a73d6ec1b3a09941cad9078b,2024-06-07T14:56:05.647000
|
||||
CVE-2024-5480,0,1,dcddee05a122e48deec7dd054d03a98cfc3767234733af70ab63ade31364815f,2024-10-02T16:15:10.913000
|
||||
CVE-2024-5481,0,0,32222ebb3f7a972393fb918a0cdb6b7e38cf91a107006665f6c1b1bad41a3e4f,2024-06-11T18:00:09.740000
|
||||
CVE-2024-5482,0,0,3b1b42d732a855ed8e91ef26579f45fec6ebdee965d18872f2c0403904f8cdcc,2024-06-07T14:56:05.647000
|
||||
CVE-2024-5483,0,0,2e97255179d42c1fdc159b28df8a118b6b7a66fe00e7310d283bd122fc23ff3b,2024-06-11T17:19:17.143000
|
||||
@ -262068,7 +262102,7 @@ CVE-2024-6088,0,0,ed650bb4582239ce54305f8b10efe45d50e8cb6f1aa2aa30a6eb4b92f9ce96
|
||||
CVE-2024-6089,0,0,fa11ebbd3c2f4a5c1117ab55af0cf255d158d35dec5a0296617f7f6f3c04b619,2024-09-10T14:05:16.183000
|
||||
CVE-2024-6090,0,0,97ec0efad50117bd537daa7e8cf0d79ae16e3a9835d40dc90b67ac25a55b7eab,2024-06-27T19:25:12.067000
|
||||
CVE-2024-6091,0,0,bb7b961b168ed94110b11915eb6181b2a134b2679cab348c5f10ff830194015b,2024-09-18T18:41:31.247000
|
||||
CVE-2024-6094,0,0,c88417a3a0b84de6c71136c141990a312384401ffa03a26b016fd58bc4fbac2f,2024-08-01T14:00:11.220000
|
||||
CVE-2024-6094,0,1,a9245b81080ea9d563a7d1371ac80737595d4976477fa1dd135b34ffbaefce92,2024-10-02T17:44:06.180000
|
||||
CVE-2024-6095,0,0,1bbfd7c9b87c44d08a43ff0a5e8179e2c5df6e66e4cde292cf2d451628bbb0a8,2024-07-09T17:41:10.523000
|
||||
CVE-2024-6096,0,0,6b5f1375532be5fbd8f0909be12e0ecac09c21eb2b2624e229274d814c555540,2024-07-26T12:57:36.633000
|
||||
CVE-2024-6098,0,0,1e4b831acb54559fe2b2c3035d21285846ee1f7c1168caf02f0b4b909cceaf4f,2024-08-19T13:00:23.117000
|
||||
@ -262300,6 +262334,7 @@ CVE-2024-6355,0,0,7f4c7fb5a41a7b4cf241f6b370777bf2a8cf0ede73cf75d47093e841c71a69
|
||||
CVE-2024-6357,0,0,d17a8b9a4a9bc17bd90a79ef1b2a022c26416b8ede91adaf116bd0fc1d0de886,2024-08-19T17:23:16.973000
|
||||
CVE-2024-6358,0,0,3e184968ad38f7e6dfc49915eadebc5cb02badfeeeea523a574397eb20c849cc,2024-08-19T17:31:29.647000
|
||||
CVE-2024-6359,0,0,093dea73109d9b2f23d9e6885d4ebbb2b84fce28b7a075a363fc879a286259cb,2024-08-19T17:30:31.880000
|
||||
CVE-2024-6360,1,1,a6ef0453763d95703475c0dd0195f8c2e77e9db2febc3a4a627687c5fe42e38d,2024-10-02T16:15:11.103000
|
||||
CVE-2024-6361,0,0,a3e4bbdd0f4905fca66747fb0442673a0924c1ae81b12b0ea7c60a6803fd61d3,2024-08-28T18:17:35.497000
|
||||
CVE-2024-6362,0,0,aeb770c7b39ef36db7bd4a49056b449aeba256942be50c6b83f329d15f15257d,2024-08-01T14:00:20.147000
|
||||
CVE-2024-6363,0,0,455979652b8642d7eb5b747949e6f02be3f028b83d7cfc357521a34bb9d7438e,2024-08-01T17:00:53.130000
|
||||
@ -262422,11 +262457,11 @@ CVE-2024-6506,0,0,58310ca3e68e3dacb16dafd9b32db187bdf111a88d3da008267c8c84bbec48
|
||||
CVE-2024-6507,0,0,4e3b24fd61e25de66a6840473e4d19109a713188592b0f05efa1cbb9de33936e,2024-07-08T14:19:21.610000
|
||||
CVE-2024-6508,0,0,5773cbe3ab2c4eb69c1efc3c03d7ae03bdf5d1ca7c49c5fd875f2b2bd8e08dcb,2024-08-21T12:30:33.697000
|
||||
CVE-2024-6509,0,0,7eb4fc03788f01fd646b7975c190061926ae41b355a82f9aed0c1fc50ccfb715,2024-09-10T12:09:50.377000
|
||||
CVE-2024-6510,0,0,271701171f98244795ebd972ebc5048aac2cefcf02c3610beea189409c6fb6ff,2024-09-12T18:14:03.913000
|
||||
CVE-2024-6510,0,1,5e8ec1aef4696d364d1cf0507192e6236a7f19c30decdfeea7966d96cda0feda,2024-10-02T17:17:46.450000
|
||||
CVE-2024-6511,0,0,053f3089b06a0cd915df79eb3301836b5db5c9fe4d3ed571ee6923d36f4d1832,2024-07-05T12:55:51.367000
|
||||
CVE-2024-6512,0,0,906938fa7a056c51f95f91dd79dd34ac36ca181a28b11365ac04b0f9d5c62236,2024-10-01T16:36:43.733000
|
||||
CVE-2024-6513,0,0,bb977a38eaef5aa918756b3907c97d9805111d3bc118dcf2b0096d1bbd202aea,2024-07-04T16:15:03.103000
|
||||
CVE-2024-6517,0,0,284a9e11267ab25537790597701cb80256104a9ef1a0a6406ea3f17ec8a06130,2024-09-26T13:32:02.803000
|
||||
CVE-2024-6517,0,1,f170167d48def43eb19df077ff3ef68c655e06896ed245e4dd4a412fc6b98463,2024-10-02T17:15:56.760000
|
||||
CVE-2024-6518,0,0,7382529f36b9b37e0acec24889e25676a677588945f854438be53c4cb8bd58b0,2024-08-27T13:15:20.033000
|
||||
CVE-2024-6520,0,0,788783a471766cea8e4d7400c47ef97ab3609f9b749a996b82510813b15dd35e,2024-08-27T13:15:39.697000
|
||||
CVE-2024-6521,0,0,3aa5a2c2ac838fced00e2bfb97108d19e91480ed8940bd254983de5af0ee5d87,2024-08-27T13:14:02.300000
|
||||
@ -263039,7 +263074,7 @@ CVE-2024-7311,0,0,b37b59792dd58cee524c8ffe58ffad74a44a459beeecd4500b7db56eb7cdda
|
||||
CVE-2024-7312,0,0,dc3f367e0f0a86ec8a8ee4af9b89c7ef895e4bddfa2b420824b06225d6049fc1,2024-09-13T16:27:50.577000
|
||||
CVE-2024-7313,0,0,d7b0f37e48710e5f5a7b78ed26ce477c46ecddb143fdd8dc8ca6d6152120ce70,2024-08-26T18:35:13.207000
|
||||
CVE-2024-7314,0,0,64aaecd133deeb35ae51feed7f4d71099832a2945a1861cec1e5be771eb8caf9,2024-09-17T15:45:01.970000
|
||||
CVE-2024-7315,0,0,c76281c597cfe81f1f3116f1e5bb315d0944617079208c3562ff072b668f5bf4,2024-10-02T06:15:09.963000
|
||||
CVE-2024-7315,0,1,b057ae02c6cc52cf777ade7c122b7553edb576e1de9f895eb67f853c43c86693,2024-10-02T17:35:18.430000
|
||||
CVE-2024-7317,0,0,d290990c88ffba5acfc4fa1e36f444dec67bc90a1513331480ff821c55d2a98f,2024-08-06T16:30:24.547000
|
||||
CVE-2024-7318,0,0,3b07c549e5fb2dfd376a8d14b85e9bdf6d56cc8a33e82cf1a53a16bb45702ca6,2024-09-20T16:02:06.977000
|
||||
CVE-2024-7319,0,0,91324dd5cce8fc33151e2efd0732f449f761808f1b2abe94f46ca69302c16039,2024-09-24T17:00:00.917000
|
||||
@ -263281,7 +263316,7 @@ CVE-2024-7613,0,0,595ae1d3f56b81eeb34ef1e184ddf7962f3a8fbfc042ff77a8fcf0bd3f10f2
|
||||
CVE-2024-7614,0,0,70ea68e630891f9909a0a8afd3fe5566dad840edc8df033b5c308064cf074a69,2024-08-21T18:48:47.273000
|
||||
CVE-2024-7615,0,0,bdb4e2a47bb0b635ad5424e7dee382fdbc667ab1983b9e7b4b79b80817773efa,2024-08-21T18:48:19.590000
|
||||
CVE-2024-7616,0,0,240142a7cf93711d379b14c2a6284d004fd0a2d1c674fc02d32efdd57aa3e2bd,2024-08-13T16:59:39.517000
|
||||
CVE-2024-7617,0,0,409a017f77e68a0b333125e7ee4e0eae38f8476b171c8d41c358d00abeebdfba,2024-09-26T13:32:02.803000
|
||||
CVE-2024-7617,0,1,f10dacf5f8900d3fef92c918260a2e6611d516244a821eb5484728f5e78850cb,2024-10-02T16:02:25.020000
|
||||
CVE-2024-7618,0,0,e379ad82065f512d4128a18f1f44cca9c9ed5e25a8aa7122c36d82acf515d6a2,2024-09-19T18:20:00
|
||||
CVE-2024-7619,0,0,52e157835f9b49014d03653876a6177ba54feacc6eb580f7a52506ce1aa54bb3,2024-09-03T18:15:09.223000
|
||||
CVE-2024-7620,0,0,2469206363fd07a16a5de81f046bd6f1d56a8441f8330f436267f4dce05a3b0c,2024-09-09T13:03:38.303000
|
||||
@ -263408,12 +263443,12 @@ CVE-2024-7756,0,0,1b8e4c66c7bf8f5bb87e6dc0c53f1d7bb597ab897e7e923ca54d526835e888
|
||||
CVE-2024-7757,0,0,ca7d079474a8e4f4b2f55e1721105da3a15a9e1d63f2bd4356eaaa03e8d55f39,2024-08-21T09:15:04.973000
|
||||
CVE-2024-7766,0,0,4e35bee576a6abfaafa62da3f1b54e408714e45f4e43f63a810722c69e36afe2,2024-09-26T20:37:18.900000
|
||||
CVE-2024-7770,0,0,c7cdbe9f10cd7fded45408e87450036bd23da653083b9d55869a5992b7da25b8,2024-09-26T17:49:17.457000
|
||||
CVE-2024-7772,0,0,c8a2214184ae5302e25d01656ca4793d6f8521697bc26b9cba85e2932172367a,2024-09-26T13:32:02.803000
|
||||
CVE-2024-7772,0,1,10ae3b8ddfb97cd1facaede4399b22bddced2619c3d70ce3a321e07353f3ff86,2024-10-02T16:10:49.387000
|
||||
CVE-2024-7775,0,0,e75f99322bf942cd40c2d94981e16e48a8ebca7abec8ba8da6e02adea2112f97,2024-08-26T18:18:22.887000
|
||||
CVE-2024-7777,0,0,4a2d78b8605a3d4db2907c7fe28bc447e2c0379246d7b81936de12aa55ddf523,2024-08-26T18:19:19.507000
|
||||
CVE-2024-7778,0,0,2fe0c9b8600c103dc69d73ebe792b6f5d96c6eaccbc88de74e66c7097ae3a047,2024-09-26T22:22:04.053000
|
||||
CVE-2024-7780,0,0,45e331e41470c18e0d898be4bc1931dca39faf6b7f4d412a460044104575abbc,2024-08-26T18:19:59.907000
|
||||
CVE-2024-7781,0,0,82f0f06f464f4c11f034a45b76a02bf3fd17c439601993902c095779d8e71986,2024-09-26T13:32:02.803000
|
||||
CVE-2024-7781,0,1,195406e4d26756061eec11348aa250b24d79fc541f740fe89b1afbbb454c19eb,2024-10-02T16:21:03.113000
|
||||
CVE-2024-7782,0,0,9772cfc0cffb104f900f553126e5bb2a4b326e29588ceccc59352666287dfd99,2024-08-26T18:21:12.203000
|
||||
CVE-2024-7784,0,0,a1673633f8befe483b8c481cae0c04073b4df8acf7cf90d7ad7fd806da35778c,2024-09-10T12:09:50.377000
|
||||
CVE-2024-7785,0,0,a72f8e02860a571fa21aeee74639693caaa851e87622e48dd31b51d79a961437,2024-09-20T12:30:17.483000
|
||||
@ -263486,7 +263521,7 @@ CVE-2024-7869,0,0,45609c63caff2a26adcc7ef2195d5ac5e058ebc9157c26bc66abdd8f75364a
|
||||
CVE-2024-7870,0,0,4141f264a23149fdea486ca620816f1c3f41138cabf6c23297e955fee3254fb2,2024-09-04T13:05:36.067000
|
||||
CVE-2024-7871,0,0,d47ede6ca23d1578a9b705a8257da890832c1e69392e6414a190c6fb054ce14f,2024-09-04T17:34:14.630000
|
||||
CVE-2024-7873,0,0,206d8282726d748a6a41b367b674a966213f9d6e3053dc261b740ef29ffe8ab7,2024-09-20T12:30:51.220000
|
||||
CVE-2024-7878,0,0,139e3daa6f4fd230b34cc8d339a87a35cd26f13df528a2d86f4bf5e471de4cb8,2024-09-26T13:32:02.803000
|
||||
CVE-2024-7878,0,1,1d855258734eb9301ec3064cb052aacfe2a08aa75ea8a20fdcb8aa8f30181ac0,2024-10-02T17:41:44.133000
|
||||
CVE-2024-7884,0,0,785c516d1dabe55fa31f7695706ba6a05f994a8f8d63c46081a0777ad4e173ab,2024-09-12T20:47:13.387000
|
||||
CVE-2024-7885,0,0,00a94d4ae6360fffd4cee9a0730f977e7daf66b2923a263383684377db4f8a54,2024-10-01T11:15:11.850000
|
||||
CVE-2024-7886,0,0,b8c1f856b8479c6982faa8a2fc4a6d8b2480e045b8b096d9bd3b8640a06eb6f3,2024-08-19T13:00:23.117000
|
||||
@ -263809,8 +263844,8 @@ CVE-2024-8345,0,0,bea7763926b715c0e51801ea13b0e6641ca2b2321817703caee6bafdff4fc9
|
||||
CVE-2024-8346,0,0,b4457249ac6e42b712016be7384df47b946c6e796e6e27191d31db6f56c0933d,2024-09-04T16:37:22.077000
|
||||
CVE-2024-8347,0,0,14715b4855076c65c4bf21be6c68b62e0d22e8650a0e63bf9f5074414663f3cb,2024-09-04T16:42:49.037000
|
||||
CVE-2024-8348,0,0,d08ea1deaed5cbc2f4a773e843468145326bb3a1da186780c7ff7b6cd74aae9b,2024-09-04T16:43:30.310000
|
||||
CVE-2024-8349,0,0,66c929a2bd31259ac7f99499cacb7946e158950a66ce33bab4e6efb6d8c7636a,2024-09-26T13:32:02.803000
|
||||
CVE-2024-8350,0,0,f8ffd63945ba91a36195e839079351a67afb6a0aef5d0bff0efca569bbd0260e,2024-09-26T13:32:02.803000
|
||||
CVE-2024-8349,0,1,c5156d79e59cd80a9f637ce807d739d5f9bbbaf01e3f3140af43137a484694a9,2024-10-02T16:50:09.673000
|
||||
CVE-2024-8350,0,1,c0d58d04c994f4448c198b4f5c8008888aa77e46ed6f78c2de3ffb535372e657,2024-10-02T17:10:47.267000
|
||||
CVE-2024-8353,0,0,dcc35089fec5ab9bf27f5fe03523b4e62e247a4803b51263049a1132141d0f36,2024-10-01T14:31:21.430000
|
||||
CVE-2024-8354,0,0,cccb2137017cf69831f7ecbf78dca654eaa8501214a295601783df83128f0494,2024-10-01T13:15:02.903000
|
||||
CVE-2024-8362,0,0,54abf718b9bfba93199694e9f50bfa28d6dfde9a56fb3c77d91594ed8cbda92f,2024-09-04T14:35:16.777000
|
||||
@ -263861,7 +263896,7 @@ CVE-2024-8427,0,0,57dcbf97b68dfdac544ef9faf52bed3587edeaacde16f067da968796778028
|
||||
CVE-2024-8428,0,0,224fe311bf12d06d4c690b8d9ea3bc4f42261bcb370dc3457883b86fb932f74d,2024-09-26T21:58:45.393000
|
||||
CVE-2024-8430,0,0,de3b67a4916feceb0eaac5d01380b94825ca04564095cedc02abe04981e18fc5,2024-10-01T09:15:03.790000
|
||||
CVE-2024-8432,0,0,8868d9b36bd238df6f75f7287d6bafac4ff3b898eed233d7b4ed5ce985d677d0,2024-09-27T12:58:58.433000
|
||||
CVE-2024-8434,0,0,a7dd938925c560d2c4358a00a748e9c070db95d94d7906c441d33bc026b679c8,2024-09-26T13:32:02.803000
|
||||
CVE-2024-8434,0,1,f17fd5eecfec4b6092d883a27ff9fa9dfcb00839b391edc337e18ff19734c460,2024-10-02T17:25:30.140000
|
||||
CVE-2024-8436,0,0,0d153a053863f3621c53c1e26deb2ddde74385c0ccdd737c792b34eb9af883c1,2024-09-26T13:32:02.803000
|
||||
CVE-2024-8437,0,0,e197ee77442bbe9c0c205a562fa2fee4cf9645f10acbb85445e512103cf01a70,2024-09-26T13:32:02.803000
|
||||
CVE-2024-8439,0,0,b4eacb6a11dc14d7212cfdbe9629a765b4f24ad00bc9c4fc2289184c4fdae508,2024-09-06T22:15:02.320000
|
||||
@ -263895,14 +263930,14 @@ CVE-2024-8470,0,0,bea6b0b968688b42b5644ab4cec20c893536d252388507a633ee5ebbe07507
|
||||
CVE-2024-8471,0,0,d4cac4daadf018326a13905f788e8fc27e503497a3cff6ab0ea980773a6f76cb,2024-09-06T11:44:22.510000
|
||||
CVE-2024-8472,0,0,a896e0fd54ff62d16feed47be0f08dd27e23a8a4def269ca8073766b75918cef,2024-09-06T11:44:34.543000
|
||||
CVE-2024-8473,0,0,0d318dfea88475fed5cabdbe761e188358c3ae35cd6d226ef3fe46f2f9041c00,2024-09-06T11:44:45.017000
|
||||
CVE-2024-8476,0,0,be59b11c1279f7ecf320b80a6c3e28b451b362fed6870ef30fbe31812ac167ae,2024-09-26T13:32:02.803000
|
||||
CVE-2024-8476,0,1,092ef960d66528d11d9417cebbf68782d16f414858b72459c24698ae73498ac1,2024-10-02T17:31:00.583000
|
||||
CVE-2024-8478,0,0,175c7b9f94662d755813fa2228cd0539f44691d1180c4633af22a35129eb9a32,2024-09-26T15:53:44.297000
|
||||
CVE-2024-8479,0,0,895a7d94fd595e323b99eff6522688473ca450b242af8c3d5ea382e2a282a9b2,2024-09-27T16:12:10.427000
|
||||
CVE-2024-8480,0,0,73de76891190d432c360d36e1da93720f2abf11adbca08499bebf4ffb87eb2bd,2024-09-26T18:13:58.470000
|
||||
CVE-2024-8481,0,0,67325c0356d12406e49fab472e21b05bb6061508372f0502a0ce3d40d30f14ca,2024-09-26T13:32:02.803000
|
||||
CVE-2024-8483,0,0,32ab224ff359b84d82ed4ce77aef264a7f492427c24d93140e77029461e7169c,2024-09-26T13:32:02.803000
|
||||
CVE-2024-8484,0,0,d0fccdedacf4dc6329ba9866ef74b74fbb5f8d079ba99b2fc034c60f4afe6c85,2024-09-26T13:32:02.803000
|
||||
CVE-2024-8485,0,0,2d19876b7de8e9f56ec7e63c79b17d47547448dd4997ef0bac6df72b646b7654,2024-09-26T13:32:02.803000
|
||||
CVE-2024-8481,0,1,f7ded0bc8510c8370341acc7cc1290a608973497f13c998f4c94b53ba9c9ee83,2024-10-02T17:59:52.013000
|
||||
CVE-2024-8483,0,1,7b9d62ad2c15cc912981452040d1345e4ce933202d5b94754bb2f4a4c6c39a92,2024-10-02T16:42:30.347000
|
||||
CVE-2024-8484,0,1,f455d9eda6cfa730254e6d1c54e42895291597af75d213a155b8f2778e2c53b8,2024-10-02T17:44:13.687000
|
||||
CVE-2024-8485,0,1,a23363c7e119dcd66690422c5888ab97f710d472d308cfeb1e931d4e39313163,2024-10-02T16:19:15.993000
|
||||
CVE-2024-8490,0,0,5ff62dababbd8edfb72d0a97e4807df424b78f87491e2373479d6c84fbd14d32,2024-09-27T18:36:00.053000
|
||||
CVE-2024-8497,0,0,903ccc83158de7417bc6f3ffdca83d1bf1fc40ad14228b01a3e1e063e242f9a9,2024-09-26T13:32:02.803000
|
||||
CVE-2024-8503,0,0,9f803200a857fcdb413b5557fdfb30066c33963fff9f6132df8887c5f7ded0b9,2024-09-11T16:26:11.920000
|
||||
@ -263925,8 +263960,8 @@ CVE-2024-8544,0,0,029a23631e96ee15c1045dd3fa22aca85d39405998de7d891aefcd30e632fd
|
||||
CVE-2024-8546,0,0,21c437f0d9de25e8960a2d9fbc9927a015111c992509c4b53747f59b9615f4f7,2024-09-26T13:32:02.803000
|
||||
CVE-2024-8547,0,0,a5c726f624e35e2e38ae2311e7ed395da023cf1c888c1c750584ab5f9e849229,2024-10-01T14:32:43.330000
|
||||
CVE-2024-8548,0,0,cca495c452a8db9d34b67e92dde5b83e8275bbf017fdb41e2dc638aa49309d62,2024-10-01T08:15:03.400000
|
||||
CVE-2024-8549,0,0,26824bba4a7be5d3e1980cceb3f14676382c512f326742b207079a7edab4cb14,2024-09-26T13:32:02.803000
|
||||
CVE-2024-8552,0,0,6594d79506dd28071c715cfa6c7597507b339576bdff1f377ea688092ea69413,2024-09-26T13:32:02.803000
|
||||
CVE-2024-8549,0,1,9d15342b3eb4ac6ebd08188bbf5727cd19e2d1db961fed83db600a8a3150700d,2024-10-02T16:04:41.970000
|
||||
CVE-2024-8552,0,1,ab7cb4c880b3ec4297f7ff802068bed1b689ce05b544a01cb748e0f63a229aea,2024-10-02T17:00:45.083000
|
||||
CVE-2024-8554,0,0,46c32adbe15332664cfc930fe8c32bff96db8190902ab789492b593fa03348f1,2024-09-10T13:52:23.250000
|
||||
CVE-2024-8555,0,0,0c0685cb1cca90ba97dbbe7724af46b71d0ab057cb41b6cc62e81df56a2985b7,2024-09-10T13:53:11.847000
|
||||
CVE-2024-8557,0,0,86ab04a42076aa0fe9f792cba1f27d54b98becfc358809b664a63ce528fde776,2024-09-10T14:19:36.280000
|
||||
@ -263968,7 +264003,7 @@ CVE-2024-8609,0,0,fe7ca13c3d9b9fe01af247daf88d9820e61ee6ae3eab253016b6fdcb76d719
|
||||
CVE-2024-8610,0,0,9284b474db1beea95bd52a2a34ba37d6ccf26129d36f3b91404a653005c49f87,2024-09-17T18:48:12.130000
|
||||
CVE-2024-8611,0,0,3d63bb09edc11ef6327fe857dfe381551fd3ed233dd119eaa741dce3b9b25e8e,2024-09-18T17:24:34.163000
|
||||
CVE-2024-8612,0,0,7904070a64ce6b0c617a391de31eeccb03d9f0e9421f89781a9fa23b513c6a78,2024-09-26T13:32:55.343000
|
||||
CVE-2024-8621,0,0,dcbb859ce5593edd8e79faad0107a5a3ad583b9f901a844fb2c6407d40470a96,2024-09-26T13:32:02.803000
|
||||
CVE-2024-8621,0,1,da11617ee187bea39361c3e736358efdd8e000970ca04e836eaac8c5eeb75dea,2024-10-02T16:10:27.313000
|
||||
CVE-2024-8622,0,0,3dd68829fc11e22f0c21c42ebfb82eece7f179bcaa47d99ccdf324ecdb81f1e2,2024-09-26T14:59:27.770000
|
||||
CVE-2024-8623,0,0,b38d11e5ea040f7d1c1df76eb8b329847342918d3746a88d315f2eac79041136,2024-09-26T16:46:28.590000
|
||||
CVE-2024-8624,0,0,1732629a73b0f7a73256425937c92b86f35ca441eabdeb398d592189eec06617,2024-09-26T16:45:40.470000
|
||||
@ -264031,13 +264066,13 @@ CVE-2024-8709,0,0,c4b78e9440da9a95da6880cb2eb594efc3dc26da0951b28cab597493ad1bb0
|
||||
CVE-2024-8710,0,0,4c5169ef585cdb335030b939d5748b4dbbc0a0ee6166dc565231ca1259e5b90c,2024-09-13T16:25:47.510000
|
||||
CVE-2024-8711,0,0,0a0fc486d277b8c36cfb49b6365925dae98dcfc88dd0e7309623a05e1f41ecb4,2024-09-13T16:18:15.670000
|
||||
CVE-2024-8712,0,0,2cf01b3948959a9bde5d2a30913b311e3b77a5b6a2ce30febed88c3b53c36dc6,2024-09-30T12:45:57.823000
|
||||
CVE-2024-8713,0,0,77e6eb32497c4838ab6eff0729860dc19e9280431833bec790cbdd0c191045a7,2024-09-26T13:32:02.803000
|
||||
CVE-2024-8713,0,1,83e5cc73079f308b101a704f144a5b41b482803341d183db1c76abb1d6f85d87,2024-10-02T16:22:33.487000
|
||||
CVE-2024-8714,0,0,2bf1d2039d26904f97b1e8fc522abe5916905f0e0d26ed18e01afb2d802fce13,2024-09-26T20:06:46.330000
|
||||
CVE-2024-8715,0,0,f0a4fb777a1271394a60c2f9ce37f6ba7325c02d49be07fd888bdf4eaa659dd6,2024-10-01T14:37:08.807000
|
||||
CVE-2024-8716,0,0,1bb41aeeebe4e896420adf3cdaff53e3d88a64a7e4d1f07d25f8bcb2da122bf8,2024-09-26T17:03:05.487000
|
||||
CVE-2024-8718,0,0,52332c777c4318a883c04078e91634a6ef8ae6a5900124887917d48dd5005b5e,2024-10-01T08:15:04.030000
|
||||
CVE-2024-8720,0,0,289b8fb0fc4d8050af052d36e1efbd05b6c287bfb2c648706b6f45f067f38dc4,2024-10-01T08:15:04.237000
|
||||
CVE-2024-8723,0,0,778d0a0398aed78fe986c3e106c93b2232e3d42b0102981078399ce3c143c0f8,2024-09-26T13:32:02.803000
|
||||
CVE-2024-8723,0,1,730229d7deadc7b514e5d898656fee12ba111958411cb7eec6e86089a429ce7e,2024-10-02T17:00:23.603000
|
||||
CVE-2024-8724,0,0,41e3dd453fbe3c0072e7ab470e5d529ac122f059bb60a2be671564b989c49676,2024-09-27T15:56:00.073000
|
||||
CVE-2024-8725,0,0,bda4a6515a704fa51f2d759f535270e57676d8c1b87d3a5cc5dc6f9e3d99ebf6,2024-10-01T14:16:42.727000
|
||||
CVE-2024-8727,0,0,dbb2d03b3a0ceaa8f4191f7e51c855a7d6e37cf9570fe18e85d885b4a36917be,2024-10-01T08:15:04.433000
|
||||
@ -264048,7 +264083,7 @@ CVE-2024-8732,0,0,fdb5356750581bee2cd15ce9454648108e6d01424f144ebcf561e47c2245ea
|
||||
CVE-2024-8734,0,0,df9336f51fe9af5a1ddacc740bf3abe8991041c91d1f44bc6bec3f0ce7eaa8b2,2024-09-26T19:30:03.503000
|
||||
CVE-2024-8737,0,0,a8f5a9ac08b3915d238b7b0f4fdae19f4d9de463f7b6e5257b850817c52f3420,2024-09-26T19:18:36.097000
|
||||
CVE-2024-8738,0,0,8d7254f4f1af2919bab9c4b9c8e7ac85cdc1b41f46ed454e2ea854234d64d13d,2024-09-26T16:48:19.490000
|
||||
CVE-2024-8741,0,0,ebfff4bd34d6f1e59ccb711fa16a5a762da7637ea4f4dc16823735f487b153a0,2024-09-26T13:32:02.803000
|
||||
CVE-2024-8741,0,1,b4e1d7f7dfc20b3d40ed40689f6d2a74196871e98895f038c49cf39f3f685863,2024-10-02T16:37:16.407000
|
||||
CVE-2024-8742,0,0,22ad08a64cc55234113e83ee811bd639e6d0a7f5c2878d141833012213ce6335,2024-09-27T16:28:07.827000
|
||||
CVE-2024-8747,0,0,c8071dd8d89406610db13dc6a04dbbb98461ebd7257641ae31a11de6b1ad5c9f,2024-09-26T19:23:12.477000
|
||||
CVE-2024-8749,0,0,dc7dd50ec6adedb45c385a82f706a7ab45f55e506e70a64a626b0d8f521f6289,2024-09-18T18:53:54.860000
|
||||
@ -264084,7 +264119,7 @@ CVE-2024-8797,0,0,bc71120ba9c562037001bef5ed49069a2fb96f9263b3c8e2a617e34946a91f
|
||||
CVE-2024-8799,0,0,00121647efdfbda1953f2b1e9dcd564fbf00607f157bcfec6188d74e35b1233b,2024-10-01T09:15:05.220000
|
||||
CVE-2024-8800,0,0,d956ac136643b04f0243a452c8ccfdf197118d0e853c27476b810517af98011a,2024-10-02T08:15:02.510000
|
||||
CVE-2024-8801,0,0,b5bc4f982a594acb6aaf56b2e8a82653b32de0b2ae7bfdf440e37c28bdd34de7,2024-09-30T14:23:46.140000
|
||||
CVE-2024-8803,0,0,1e21e2187793442a371c4b65c97d90253ace224e18e6d0a30f5421631b4c2a19,2024-09-26T13:32:02.803000
|
||||
CVE-2024-8803,0,1,1e0c20c4da3042f287bedde6aa980588230b643699023347d741bb81db132ef8,2024-10-02T17:15:12.677000
|
||||
CVE-2024-8850,0,0,60f99c260767f82bf00cc7954ec3e058985003b965020b8d3dac7a45b3ea5f64,2024-09-25T18:49:53.397000
|
||||
CVE-2024-8853,0,0,b5a3b0675f8f2657c7381537f08c47ae3a3694c18acf1b18976370e35c278f0e,2024-09-25T17:49:25.653000
|
||||
CVE-2024-8858,0,0,7079c00755886d6a772dfe4739e2ab877421c8ca6f44d64619219a76da96e341,2024-09-26T13:32:02.803000
|
||||
@ -264104,7 +264139,7 @@ CVE-2024-8877,0,0,072c8e486444961bae4945079e8c7eda87a37fe8ff462296a0eff944cb3f18
|
||||
CVE-2024-8878,0,0,d355a1999baf0c8606d16796b1d3b0e1dca83258ab14464d5a94be439e5488d1,2024-09-30T15:21:31.693000
|
||||
CVE-2024-8880,0,0,4890b5d8ccfd73a7de9d70be358a6aa9c5c8f4db772389c703fb4d83ffb621f1,2024-09-20T16:41:38.030000
|
||||
CVE-2024-8883,0,0,d39bf3fdabe814eab7383cf7d0056d70749ac8a21f6ccaada9d165b73ef13b6c,2024-10-01T13:15:03.313000
|
||||
CVE-2024-8885,0,1,0da336e48d8fed3d105ca935ca0555e852ee8f847a7fb52241b5e47fe0bb5262,2024-10-02T14:15:05.927000
|
||||
CVE-2024-8885,0,0,0da336e48d8fed3d105ca935ca0555e852ee8f847a7fb52241b5e47fe0bb5262,2024-10-02T14:15:05.927000
|
||||
CVE-2024-8887,0,0,0407ca62fcbad308289f29aa7a81815bcc03d59968582f8cfbf5cd23bcc12817,2024-10-01T17:30:07.597000
|
||||
CVE-2024-8888,0,0,3a815de886bf077ac63d6810f20ea887274d5ca628e3e664db2efb49b96f7c7b,2024-10-01T19:30:35.400000
|
||||
CVE-2024-8889,0,0,409f189e1cc8763baf41f6d7663087a2138f3ee0ecad616a441fc7d44385c004,2024-09-20T12:30:51.220000
|
||||
@ -264236,8 +264271,8 @@ CVE-2024-9174,0,0,b84c9c7a9f9cd2234390c1ae1f1de568c65321ae63b8ba2386d7dc05a06798
|
||||
CVE-2024-9177,0,0,538b136929b66f2da77b71c4f345460987a86315e3e44122bd269ab3a2a9e52e,2024-09-30T12:46:20.237000
|
||||
CVE-2024-9189,0,0,6fc70667b6c052aedd9065fd849720c6949b418d7c844ad831e0ce3249ae6d1c,2024-09-30T12:45:57.823000
|
||||
CVE-2024-9194,0,0,24e26748ef3bff41d7a06efd6c027f138154eafd040f89b986b59a112235298b,2024-10-01T15:35:17.550000
|
||||
CVE-2024-9198,0,1,f43e7cbf5ad8264654a856d8df5069cea0145a66becd85052219123b3f2b7d6c,2024-10-02T14:33:52.780000
|
||||
CVE-2024-9199,0,1,0d70434db3b8e5067294d8da03c36e695141f2bf7d8322fbb68a3bc3177abf45,2024-10-02T14:33:54.607000
|
||||
CVE-2024-9198,0,0,f43e7cbf5ad8264654a856d8df5069cea0145a66becd85052219123b3f2b7d6c,2024-10-02T14:33:52.780000
|
||||
CVE-2024-9199,0,0,0d70434db3b8e5067294d8da03c36e695141f2bf7d8322fbb68a3bc3177abf45,2024-10-02T14:33:54.607000
|
||||
CVE-2024-9202,0,0,808b8091e3582386849f2f7767feb40805cba585b6581ba135c1d621ab219188,2024-09-30T12:46:20.237000
|
||||
CVE-2024-9203,0,0,e6eb6874bd83da6550f594261cd60c3d082a0ed5dbc17d4c1b083dd114dee5d8,2024-09-30T12:46:20.237000
|
||||
CVE-2024-9209,0,0,7d3bad6781486e2f4da7df129717b8a491edccf73b369d5a2d34b95179369883,2024-10-01T09:15:06.110000
|
||||
@ -264317,4 +264352,5 @@ CVE-2024-9403,0,0,66d9e463986ac67ad9bceb6cae4045b10ea740cc9a13552aa6348c37ab2ae3
|
||||
CVE-2024-9405,0,0,e9703465f499653ca07470a1ffd16e91f994c6f46933e9f402589910617b650e,2024-10-01T12:15:03.893000
|
||||
CVE-2024-9407,0,0,844e60b42bd22ac882920576f0244b4221aa1cb4e0aeb01caf7aa58317c74c32,2024-10-01T21:15:08.530000
|
||||
CVE-2024-9411,0,0,0ed7229fadcaa0ba2be6aae3ed0a903fea8ee7057f413ca8d29b7080b09aae26,2024-10-01T21:35:07.620000
|
||||
CVE-2024-9423,1,1,c94940e86c4d0857c214a72b7785993b36e482d8dc6d4d5d12ed70a35b4f0f3b,2024-10-02T16:15:11.250000
|
||||
CVE-2024-9429,0,0,db0d8ee6274f5889e645bc8f06bc2c127c429edd7f6e0ee6aa8f7a2649e83d4c,2024-10-02T13:15:12.617000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user