mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-07 19:16:29 +00:00
Auto-Update: 2024-09-25T14:00:17.899529+00:00
This commit is contained in:
parent
baa2be55c8
commit
791558267f
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2015-1383",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2015-02-02T15:59:04.113",
|
||||
"lastModified": "2015-02-04T05:20:19.657",
|
||||
"lastModified": "2024-09-25T13:10:58.457",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -63,9 +63,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:geo_mashup_project:geo_mashup:*:*:*:*:*:wordpress:*:*",
|
||||
"criteria": "cpe:2.3:a:cyberhobo:geo_mashup:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "1.8.2",
|
||||
"matchCriteriaId": "69C403D6-40BB-4B50-94BE-39488F1D83A0"
|
||||
"matchCriteriaId": "F4BC455A-460F-4518-8FC7-C609C5367714"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2018-14071",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2018-07-16T13:29:00.397",
|
||||
"lastModified": "2018-09-12T19:06:15.137",
|
||||
"lastModified": "2024-09-25T13:10:58.457",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -85,9 +85,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:geo_mashup_project:geo_mashup:*:*:*:*:*:wordpress:*:*",
|
||||
"criteria": "cpe:2.3:a:cyberhobo:geo_mashup:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "1.10.4",
|
||||
"matchCriteriaId": "BF48E8F7-B887-4AF7-AFE5-B276E65A7725"
|
||||
"matchCriteriaId": "CEE4754C-5FAB-4490-BA1C-120C2C87F2B1"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-26570",
|
||||
"sourceIdentifier": "vdp@themissinglink.com.au",
|
||||
"published": "2023-10-25T18:17:25.337",
|
||||
"lastModified": "2023-10-28T03:20:26.277",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-25T12:15:03.550",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -76,7 +76,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-287"
|
||||
"value": "CWE-306"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-26571",
|
||||
"sourceIdentifier": "vdp@themissinglink.com.au",
|
||||
"published": "2023-10-25T18:17:25.397",
|
||||
"lastModified": "2023-10-28T03:20:31.930",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-25T12:15:03.693",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -76,7 +76,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-287"
|
||||
"value": "CWE-306"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-26573",
|
||||
"sourceIdentifier": "vdp@themissinglink.com.au",
|
||||
"published": "2023-10-25T18:17:25.513",
|
||||
"lastModified": "2023-10-28T03:22:35.543",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-25T12:15:03.787",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -76,7 +76,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-287"
|
||||
"value": "CWE-306"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-26574",
|
||||
"sourceIdentifier": "vdp@themissinglink.com.au",
|
||||
"published": "2023-10-25T18:17:25.577",
|
||||
"lastModified": "2023-10-28T03:22:50.603",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-25T12:15:03.890",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -76,7 +76,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-287"
|
||||
"value": "CWE-306"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-26575",
|
||||
"sourceIdentifier": "vdp@themissinglink.com.au",
|
||||
"published": "2023-10-25T18:17:25.650",
|
||||
"lastModified": "2023-10-28T03:22:26.930",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-25T12:15:03.983",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -76,7 +76,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-287"
|
||||
"value": "CWE-306"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-26576",
|
||||
"sourceIdentifier": "vdp@themissinglink.com.au",
|
||||
"published": "2023-10-25T18:17:25.720",
|
||||
"lastModified": "2023-10-28T03:22:20.050",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-25T12:15:04.070",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -76,7 +76,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-287"
|
||||
"value": "CWE-306"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-27256",
|
||||
"sourceIdentifier": "vdp@themissinglink.com.au",
|
||||
"published": "2023-10-25T18:17:26.353",
|
||||
"lastModified": "2023-10-28T03:23:01.543",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-25T12:15:04.160",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -76,7 +76,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-287"
|
||||
"value": "CWE-306"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-27257",
|
||||
"sourceIdentifier": "vdp@themissinglink.com.au",
|
||||
"published": "2023-10-25T18:17:26.410",
|
||||
"lastModified": "2023-10-28T03:19:47.833",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-25T12:15:04.267",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -76,7 +76,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-287"
|
||||
"value": "CWE-306"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-27258",
|
||||
"sourceIdentifier": "vdp@themissinglink.com.au",
|
||||
"published": "2023-10-25T18:17:26.470",
|
||||
"lastModified": "2023-10-28T03:19:57.333",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-25T12:15:04.347",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -76,7 +76,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-287"
|
||||
"value": "CWE-306"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-27259",
|
||||
"sourceIdentifier": "vdp@themissinglink.com.au",
|
||||
"published": "2023-10-25T18:17:26.527",
|
||||
"lastModified": "2023-10-28T03:20:02.377",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-25T12:15:04.440",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -76,7 +76,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-287"
|
||||
"value": "CWE-306"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-27261",
|
||||
"sourceIdentifier": "vdp@themissinglink.com.au",
|
||||
"published": "2023-10-25T18:17:26.657",
|
||||
"lastModified": "2023-10-28T03:23:33.637",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-25T12:15:04.520",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -76,7 +76,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-287"
|
||||
"value": "CWE-306"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-27375",
|
||||
"sourceIdentifier": "vdp@themissinglink.com.au",
|
||||
"published": "2023-10-25T18:17:26.773",
|
||||
"lastModified": "2023-10-28T03:23:15.667",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-25T12:15:04.620",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -76,7 +76,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-287"
|
||||
"value": "CWE-306"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-27376",
|
||||
"sourceIdentifier": "vdp@themissinglink.com.au",
|
||||
"published": "2023-10-25T18:17:26.837",
|
||||
"lastModified": "2023-10-28T03:23:11.250",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-25T12:15:04.703",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -76,7 +76,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-287"
|
||||
"value": "CWE-306"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-27377",
|
||||
"sourceIdentifier": "vdp@themissinglink.com.au",
|
||||
"published": "2023-10-25T18:17:26.897",
|
||||
"lastModified": "2023-10-28T03:23:47.653",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-25T12:15:04.797",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -76,7 +76,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-287"
|
||||
"value": "CWE-306"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-28324",
|
||||
"sourceIdentifier": "support@hackerone.com",
|
||||
"published": "2023-07-01T00:15:10.103",
|
||||
"lastModified": "2023-07-10T17:46:59.287",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-25T13:35:00.443",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.2,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.5,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-20"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-41311",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2023-09-27T15:19:29.137",
|
||||
"lastModified": "2023-09-28T15:56:31.800",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-25T13:35:01.407",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -49,6 +49,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-4393",
|
||||
"sourceIdentifier": "vdp@themissinglink.com.au",
|
||||
"published": "2023-10-30T00:15:39.237",
|
||||
"lastModified": "2023-11-08T20:56:59.690",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-25T12:15:04.887",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -80,11 +80,11 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
"value": "CWE-116"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-74"
|
||||
"value": "CWE-147"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-40856",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-09-17T00:15:49.490",
|
||||
"lastModified": "2024-09-20T12:31:20.110",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-25T13:43:40.657",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,19 +15,96 @@
|
||||
"value": "Se solucion\u00f3 un problema de integridad con Beacon Protection. Este problema se solucion\u00f3 en iOS 18 y iPadOS 18, tvOS 18 y macOS Sequoia 15. Un atacante podr\u00eda forzar a un dispositivo a desconectarse de una red segura."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "18.0",
|
||||
"matchCriteriaId": "ACD3B3B0-329C-413B-BDF7-6B1C6298846E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "18.0",
|
||||
"matchCriteriaId": "2222A2EE-00FA-4019-8779-13B82A4F9DD0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "15.0",
|
||||
"matchCriteriaId": "E8017C16-A17E-4AE7-9A0B-1295200A3A45"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/121238",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/121248",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/121250",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-40857",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-09-17T00:15:49.537",
|
||||
"lastModified": "2024-09-20T12:31:20.110",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-25T13:41:41.843",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,31 +15,144 @@
|
||||
"value": "Este problema se solucion\u00f3 mediante una mejor gesti\u00f3n del estado. Este problema se solucion\u00f3 en Safari 18, visionOS 2, watchOS 11, macOS Sequoia 15, iOS 18, iPadOS 18 y tvOS 18. El procesamiento de contenido web manipulado con fines malintencionados puede provocar un ataque de cross site scripting."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "18.0",
|
||||
"matchCriteriaId": "0DCB4657-8F40-418E-8E98-743C271E4CDE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "18.0",
|
||||
"matchCriteriaId": "ACD3B3B0-329C-413B-BDF7-6B1C6298846E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "18.0",
|
||||
"matchCriteriaId": "2222A2EE-00FA-4019-8779-13B82A4F9DD0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "15.0",
|
||||
"matchCriteriaId": "E8017C16-A17E-4AE7-9A0B-1295200A3A45"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "18.0",
|
||||
"matchCriteriaId": "F34BD4C1-5C6A-4C6D-BD96-8CC3F3CBFF74"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "2.0",
|
||||
"matchCriteriaId": "A6AE7B0F-C356-4601-9636-617CDD09F009"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "11.0",
|
||||
"matchCriteriaId": "05C212C2-3E65-47DB-A0AE-417A8178ADC6"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/121238",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/121240",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/121241",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/121248",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/121249",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/121250",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-40860",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-09-17T00:15:49.640",
|
||||
"lastModified": "2024-09-20T12:31:20.110",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-25T13:41:05.177",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,15 +15,76 @@
|
||||
"value": "Se solucion\u00f3 un problema de l\u00f3gica con comprobaciones mejoradas. Este problema se solucion\u00f3 en macOS Sonoma 14.7 y macOS Sequoia 15. Es posible que una aplicaci\u00f3n pueda modificar partes protegidas del sistema de archivos."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "14.7",
|
||||
"matchCriteriaId": "A25F3F21-0F63-4241-8C67-50A1169FA52D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/121238",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/121247",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-40863",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-09-17T00:15:49.793",
|
||||
"lastModified": "2024-09-20T12:31:20.110",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-25T13:40:28.967",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,11 +15,74 @@
|
||||
"value": "Este problema se solucion\u00f3 con una protecci\u00f3n de datos mejorada. Este problema se solucion\u00f3 en iOS 18 y iPadOS 18. Una aplicaci\u00f3n puede filtrar informaci\u00f3n confidencial del usuario."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "18.0",
|
||||
"matchCriteriaId": "ACD3B3B0-329C-413B-BDF7-6B1C6298846E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "18.0",
|
||||
"matchCriteriaId": "2222A2EE-00FA-4019-8779-13B82A4F9DD0"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/121250",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-43988",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-09-18T00:15:07.953",
|
||||
"lastModified": "2024-09-20T12:30:51.220",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-25T13:55:55.460",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:digitalnature:mystique:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "2.5.7",
|
||||
"matchCriteriaId": "0D974FC4-53BD-4F3A-990E-65243BAC70F0"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/mystique/wordpress-mystique-theme-2-5-7-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-43991",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-09-18T00:15:08.147",
|
||||
"lastModified": "2024-09-20T12:30:51.220",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-25T13:53:50.107",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:webdzier:hotel_galaxy:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "4.4.24",
|
||||
"matchCriteriaId": "EADF02A6-E89B-4CF3-B7E7-721E19A5A72A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/hotel-galaxy/wordpress-hotel-galaxy-theme-4-4-24-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-43992",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-09-18T00:15:08.343",
|
||||
"lastModified": "2024-09-20T12:30:51.220",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-25T13:47:17.277",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:latepoint:latepoint:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "4.9.91",
|
||||
"matchCriteriaId": "143A1E51-6A6F-4AC3-88C5-AE8A51E7E601"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/latepoint/wordpress-latepoint-plugin-4-9-91-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-43993",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-09-18T00:15:08.530",
|
||||
"lastModified": "2024-09-20T12:30:51.220",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-25T13:44:39.917",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cryoutcreations:liquido:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "1.0.1.2",
|
||||
"matchCriteriaId": "D35FD9AD-5E75-44E8-91AD-78099B045D40"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/liquido/wordpress-liquido-theme-1-0-1-2-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-44125",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-09-17T00:15:49.940",
|
||||
"lastModified": "2024-09-20T12:31:20.110",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-25T13:30:11.570",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,15 +15,76 @@
|
||||
"value": "El problema se solucion\u00f3 con comprobaciones mejoradas. Este problema se solucion\u00f3 en macOS Sonoma 14.7 y macOS Sequoia 15. Una aplicaci\u00f3n maliciosa podr\u00eda filtrar informaci\u00f3n confidencial del usuario."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "14.7",
|
||||
"matchCriteriaId": "A25F3F21-0F63-4241-8C67-50A1169FA52D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/121238",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/121247",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-44128",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-09-17T00:15:50.040",
|
||||
"lastModified": "2024-09-20T12:31:20.110",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-25T13:29:42.343",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,19 +15,91 @@
|
||||
"value": "Este problema se solucion\u00f3 agregando un mensaje adicional para el consentimiento del usuario. Este problema se solucion\u00f3 en macOS Ventura 13.7, macOS Sonoma 14.7 y macOS Sequoia 15. Es posible que un flujo de trabajo de acci\u00f3n r\u00e1pida de Automator pueda omitir Gatekeeper."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "13.7",
|
||||
"matchCriteriaId": "74CD5775-17B0-4158-AED7-ABA27A4393CA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "14.0",
|
||||
"versionEndExcluding": "14.7",
|
||||
"matchCriteriaId": "06F1EED8-2BB5-4768-908B-83AF76DE7B5F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/121234",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/121238",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/121247",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-44129",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-09-17T00:15:50.090",
|
||||
"lastModified": "2024-09-20T12:31:20.110",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-25T13:28:21.447",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,15 +15,76 @@
|
||||
"value": "El problema se solucion\u00f3 con comprobaciones mejoradas. Este problema se solucion\u00f3 en macOS Ventura 13.7 y macOS Sequoia 15. Es posible que una aplicaci\u00f3n filtre informaci\u00f3n confidencial del usuario."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "13.7",
|
||||
"matchCriteriaId": "74CD5775-17B0-4158-AED7-ABA27A4393CA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/121234",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/121238",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-44135",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-09-17T00:15:50.393",
|
||||
"lastModified": "2024-09-20T12:31:20.110",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-25T13:28:09.067",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,15 +15,76 @@
|
||||
"value": "Se solucion\u00f3 un problema de permisos con restricciones adicionales. Este problema se solucion\u00f3 en macOS Sonoma 14.7 y macOS Sequoia 15. Una aplicaci\u00f3n puede acceder a archivos protegidos dentro de un contenedor de App Sandbox."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "14.7",
|
||||
"matchCriteriaId": "A25F3F21-0F63-4241-8C67-50A1169FA52D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/121238",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/121247",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-44176",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-09-17T00:15:51.573",
|
||||
"lastModified": "2024-09-20T12:31:20.110",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-25T13:27:13.333",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,39 +15,161 @@
|
||||
"value": "Se solucion\u00f3 un problema de acceso fuera de los l\u00edmites con una verificaci\u00f3n de los l\u00edmites mejorada. Este problema se solucion\u00f3 en macOS Ventura 13.7, iOS 17.7 y iPadOS 17.7, visionOS 2, watchOS 11, macOS Sequoia 15, iOS 18 y iPadOS 18, macOS Sonoma 14.7 y tvOS 18. El procesamiento de una imagen puede provocar una denegaci\u00f3n de servicio."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "17.7",
|
||||
"matchCriteriaId": "064488F4-456F-4C5D-B325-4F1FCDF2D432"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "17.7",
|
||||
"matchCriteriaId": "B8542FD9-368A-4A38-965E-47AE279208F1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "13.7",
|
||||
"matchCriteriaId": "74CD5775-17B0-4158-AED7-ABA27A4393CA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "14.0",
|
||||
"versionEndExcluding": "14.7",
|
||||
"matchCriteriaId": "06F1EED8-2BB5-4768-908B-83AF76DE7B5F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "18.0",
|
||||
"matchCriteriaId": "F34BD4C1-5C6A-4C6D-BD96-8CC3F3CBFF74"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "2.0",
|
||||
"matchCriteriaId": "A6AE7B0F-C356-4601-9636-617CDD09F009"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "11.0",
|
||||
"matchCriteriaId": "05C212C2-3E65-47DB-A0AE-417A8178ADC6"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/121234",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/121238",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/121240",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/121246",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/121247",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/121248",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/121249",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/121250",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-44187",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-09-17T00:15:52.037",
|
||||
"lastModified": "2024-09-20T12:31:20.110",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-25T13:25:52.043",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,31 +15,144 @@
|
||||
"value": "Exist\u00eda un problema de origen cruzado con los elementos \"iframe\". Esto se solucion\u00f3 mejorando el seguimiento de los or\u00edgenes de seguridad. Este problema se solucion\u00f3 en Safari 18, visionOS 2, watchOS 11, macOS Sequoia 15, iOS 18, iPadOS 18 y tvOS 18. Un sitio web malicioso puede filtrar datos de origen cruzado."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-346"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "18.0",
|
||||
"matchCriteriaId": "0DCB4657-8F40-418E-8E98-743C271E4CDE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "18.0",
|
||||
"matchCriteriaId": "ACD3B3B0-329C-413B-BDF7-6B1C6298846E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "18.0",
|
||||
"matchCriteriaId": "2222A2EE-00FA-4019-8779-13B82A4F9DD0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "15.0",
|
||||
"matchCriteriaId": "E8017C16-A17E-4AE7-9A0B-1295200A3A45"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "18.0",
|
||||
"matchCriteriaId": "F34BD4C1-5C6A-4C6D-BD96-8CC3F3CBFF74"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "2.0",
|
||||
"matchCriteriaId": "A6AE7B0F-C356-4601-9636-617CDD09F009"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "11.0",
|
||||
"matchCriteriaId": "05C212C2-3E65-47DB-A0AE-417A8178ADC6"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/121238",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/121240",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/121241",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/121248",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/121249",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/121250",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-44191",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-09-17T00:15:52.263",
|
||||
"lastModified": "2024-09-20T12:31:20.110",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-25T13:24:42.380",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,35 +15,152 @@
|
||||
"value": "Este problema se solucion\u00f3 mediante una mejor gesti\u00f3n del estado. Este problema se solucion\u00f3 en iOS 17.7 y iPadOS 17.7, Xcode 16, visionOS 2, watchOS 11, macOS Sequoia 15, iOS 18 y iPadOS 18, tvOS 18. Una aplicaci\u00f3n puede obtener acceso no autorizado a Bluetooth."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apple:xcode:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "16.0",
|
||||
"matchCriteriaId": "E511C5FC-9B13-4AD5-ABBE-4DED7CD4A0DD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "17.7",
|
||||
"matchCriteriaId": "064488F4-456F-4C5D-B325-4F1FCDF2D432"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "17.7",
|
||||
"matchCriteriaId": "B8542FD9-368A-4A38-965E-47AE279208F1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "15.0",
|
||||
"matchCriteriaId": "E8017C16-A17E-4AE7-9A0B-1295200A3A45"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "18.0",
|
||||
"matchCriteriaId": "F34BD4C1-5C6A-4C6D-BD96-8CC3F3CBFF74"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "2.0",
|
||||
"matchCriteriaId": "A6AE7B0F-C356-4601-9636-617CDD09F009"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "11.0",
|
||||
"matchCriteriaId": "05C212C2-3E65-47DB-A0AE-417A8178ADC6"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/121238",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/121239",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/121240",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/121246",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/121248",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/121249",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/121250",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
78
CVE-2024/CVE-2024-46xx/CVE-2024-4657.json
Normal file
78
CVE-2024/CVE-2024-46xx/CVE-2024-4657.json
Normal file
@ -0,0 +1,78 @@
|
||||
{
|
||||
"id": "CVE-2024-4657",
|
||||
"sourceIdentifier": "iletisim@usom.gov.tr",
|
||||
"published": "2024-09-25T13:15:04.110",
|
||||
"lastModified": "2024-09-25T13:15:04.110",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Talent Software BAP Automation allows Stored XSS.This issue affects BAP Automation: before 30840."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "iletisim@usom.gov.tr",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "HIGH",
|
||||
"vulnerableSystemIntegrity": "HIGH",
|
||||
"vulnerableSystemAvailability": "HIGH",
|
||||
"subsequentSystemConfidentiality": "LOW",
|
||||
"subsequentSystemIntegrity": "LOW",
|
||||
"subsequentSystemAvailability": "LOW",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 9.3,
|
||||
"baseSeverity": "CRITICAL"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "iletisim@usom.gov.tr",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.usom.gov.tr/bildirim/tr-24-1536",
|
||||
"source": "iletisim@usom.gov.tr"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-65xx/CVE-2024-6592.json
Normal file
56
CVE-2024/CVE-2024-65xx/CVE-2024-6592.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-6592",
|
||||
"sourceIdentifier": "5d1c2695-1a31-4499-88ae-e847036fd7e3",
|
||||
"published": "2024-09-25T12:15:05.027",
|
||||
"lastModified": "2024-09-25T12:15:05.027",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Incorrect Authorization vulnerability in the protocol communication between the WatchGuard Authentication Gateway (aka Single Sign-On Agent) on Windows and the WatchGuard Single Sign-On Client on Windows and MacOS allows Authentication Bypass.This issue affects the Authentication Gateway: through 12.10.2; Windows Single Sign-On Client: through 12.7; MacOS Single Sign-On Client: through 12.5.4."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "5d1c2695-1a31-4499-88ae-e847036fd7e3",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 9.1,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "5d1c2695-1a31-4499-88ae-e847036fd7e3",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2024-00014",
|
||||
"source": "5d1c2695-1a31-4499-88ae-e847036fd7e3"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-65xx/CVE-2024-6593.json
Normal file
56
CVE-2024/CVE-2024-65xx/CVE-2024-6593.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-6593",
|
||||
"sourceIdentifier": "5d1c2695-1a31-4499-88ae-e847036fd7e3",
|
||||
"published": "2024-09-25T12:15:05.217",
|
||||
"lastModified": "2024-09-25T12:15:05.217",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Incorrect Authorization vulnerability in WatchGuard Authentication Gateway (aka Single Sign-On Agent) on Windows allows an attacker with network access to execute restricted management commands.\nThis issue affects Authentication Gateway: through 12.10.2."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "5d1c2695-1a31-4499-88ae-e847036fd7e3",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 9.1,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "5d1c2695-1a31-4499-88ae-e847036fd7e3",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2024-00015",
|
||||
"source": "5d1c2695-1a31-4499-88ae-e847036fd7e3"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-65xx/CVE-2024-6594.json
Normal file
56
CVE-2024/CVE-2024-65xx/CVE-2024-6594.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-6594",
|
||||
"sourceIdentifier": "5d1c2695-1a31-4499-88ae-e847036fd7e3",
|
||||
"published": "2024-09-25T12:15:05.397",
|
||||
"lastModified": "2024-09-25T12:15:05.397",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Handling of Exceptional Conditions vulnerability in the WatchGuard Single Sign-On Client on Windows causes the client to crash while handling malformed commands. An attacker with network access to the client could create a denial of service condition for the Single Sign-On service by repeatedly issuing malformed commands.\n\nThis issue affects Single Sign-On Client: through 12.7."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "5d1c2695-1a31-4499-88ae-e847036fd7e3",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "5d1c2695-1a31-4499-88ae-e847036fd7e3",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-755"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2024-00016",
|
||||
"source": "5d1c2695-1a31-4499-88ae-e847036fd7e3"
|
||||
}
|
||||
]
|
||||
}
|
72
CVE-2024/CVE-2024-85xx/CVE-2024-8546.json
Normal file
72
CVE-2024/CVE-2024-85xx/CVE-2024-8546.json
Normal file
@ -0,0 +1,72 @@
|
||||
{
|
||||
"id": "CVE-2024-8546",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-09-25T13:15:04.313",
|
||||
"lastModified": "2024-09-25T13:15:04.313",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The ElementsKit Elementor addons plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Video widget in all versions up to, and including, 3.2.7 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/elementskit-lite/trunk/widgets/video/parts/video-button.php#L10",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3155880/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3155880/elementskit-lite/trunk/widgets/video/video.php",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://wordpress.org/plugins/elementskit-lite/#developers",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d21aeeb6-2e7d-426e-82c5-ff65e33bc5cb?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
49
README.md
49
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-09-25T12:00:20.055507+00:00
|
||||
2024-09-25T14:00:17.899529+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-09-25T11:15:12.730000+00:00
|
||||
2024-09-25T13:55:55.460000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,28 +33,49 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
263732
|
||||
263737
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `6`
|
||||
Recently added CVEs: `5`
|
||||
|
||||
- [CVE-2024-31145](CVE-2024/CVE-2024-311xx/CVE-2024-31145.json) (`2024-09-25T11:15:12.133`)
|
||||
- [CVE-2024-31146](CVE-2024/CVE-2024-311xx/CVE-2024-31146.json) (`2024-09-25T11:15:12.220`)
|
||||
- [CVE-2024-45817](CVE-2024/CVE-2024-458xx/CVE-2024-45817.json) (`2024-09-25T11:15:12.277`)
|
||||
- [CVE-2024-7479](CVE-2024/CVE-2024-74xx/CVE-2024-7479.json) (`2024-09-25T11:15:12.330`)
|
||||
- [CVE-2024-7481](CVE-2024/CVE-2024-74xx/CVE-2024-7481.json) (`2024-09-25T11:15:12.553`)
|
||||
- [CVE-2024-8858](CVE-2024/CVE-2024-88xx/CVE-2024-8858.json) (`2024-09-25T11:15:12.730`)
|
||||
- [CVE-2024-4657](CVE-2024/CVE-2024-46xx/CVE-2024-4657.json) (`2024-09-25T13:15:04.110`)
|
||||
- [CVE-2024-6592](CVE-2024/CVE-2024-65xx/CVE-2024-6592.json) (`2024-09-25T12:15:05.027`)
|
||||
- [CVE-2024-6593](CVE-2024/CVE-2024-65xx/CVE-2024-6593.json) (`2024-09-25T12:15:05.217`)
|
||||
- [CVE-2024-6594](CVE-2024/CVE-2024-65xx/CVE-2024-6594.json) (`2024-09-25T12:15:05.397`)
|
||||
- [CVE-2024-8546](CVE-2024/CVE-2024-85xx/CVE-2024-8546.json) (`2024-09-25T13:15:04.313`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `3`
|
||||
Recently modified CVEs: `34`
|
||||
|
||||
- [CVE-2022-1778](CVE-2022/CVE-2022-17xx/CVE-2022-1778.json) (`2024-09-25T11:15:11.090`)
|
||||
- [CVE-2022-2277](CVE-2022/CVE-2022-22xx/CVE-2022-2277.json) (`2024-09-25T11:15:11.927`)
|
||||
- [CVE-2024-9169](CVE-2024/CVE-2024-91xx/CVE-2024-9169.json) (`2024-09-25T09:15:03.380`)
|
||||
- [CVE-2023-27257](CVE-2023/CVE-2023-272xx/CVE-2023-27257.json) (`2024-09-25T12:15:04.267`)
|
||||
- [CVE-2023-27258](CVE-2023/CVE-2023-272xx/CVE-2023-27258.json) (`2024-09-25T12:15:04.347`)
|
||||
- [CVE-2023-27259](CVE-2023/CVE-2023-272xx/CVE-2023-27259.json) (`2024-09-25T12:15:04.440`)
|
||||
- [CVE-2023-27261](CVE-2023/CVE-2023-272xx/CVE-2023-27261.json) (`2024-09-25T12:15:04.520`)
|
||||
- [CVE-2023-27375](CVE-2023/CVE-2023-273xx/CVE-2023-27375.json) (`2024-09-25T12:15:04.620`)
|
||||
- [CVE-2023-27376](CVE-2023/CVE-2023-273xx/CVE-2023-27376.json) (`2024-09-25T12:15:04.703`)
|
||||
- [CVE-2023-27377](CVE-2023/CVE-2023-273xx/CVE-2023-27377.json) (`2024-09-25T12:15:04.797`)
|
||||
- [CVE-2023-28324](CVE-2023/CVE-2023-283xx/CVE-2023-28324.json) (`2024-09-25T13:35:00.443`)
|
||||
- [CVE-2023-41311](CVE-2023/CVE-2023-413xx/CVE-2023-41311.json) (`2024-09-25T13:35:01.407`)
|
||||
- [CVE-2023-4393](CVE-2023/CVE-2023-43xx/CVE-2023-4393.json) (`2024-09-25T12:15:04.887`)
|
||||
- [CVE-2024-40856](CVE-2024/CVE-2024-408xx/CVE-2024-40856.json) (`2024-09-25T13:43:40.657`)
|
||||
- [CVE-2024-40857](CVE-2024/CVE-2024-408xx/CVE-2024-40857.json) (`2024-09-25T13:41:41.843`)
|
||||
- [CVE-2024-40860](CVE-2024/CVE-2024-408xx/CVE-2024-40860.json) (`2024-09-25T13:41:05.177`)
|
||||
- [CVE-2024-40863](CVE-2024/CVE-2024-408xx/CVE-2024-40863.json) (`2024-09-25T13:40:28.967`)
|
||||
- [CVE-2024-43988](CVE-2024/CVE-2024-439xx/CVE-2024-43988.json) (`2024-09-25T13:55:55.460`)
|
||||
- [CVE-2024-43991](CVE-2024/CVE-2024-439xx/CVE-2024-43991.json) (`2024-09-25T13:53:50.107`)
|
||||
- [CVE-2024-43992](CVE-2024/CVE-2024-439xx/CVE-2024-43992.json) (`2024-09-25T13:47:17.277`)
|
||||
- [CVE-2024-43993](CVE-2024/CVE-2024-439xx/CVE-2024-43993.json) (`2024-09-25T13:44:39.917`)
|
||||
- [CVE-2024-44125](CVE-2024/CVE-2024-441xx/CVE-2024-44125.json) (`2024-09-25T13:30:11.570`)
|
||||
- [CVE-2024-44128](CVE-2024/CVE-2024-441xx/CVE-2024-44128.json) (`2024-09-25T13:29:42.343`)
|
||||
- [CVE-2024-44129](CVE-2024/CVE-2024-441xx/CVE-2024-44129.json) (`2024-09-25T13:28:21.447`)
|
||||
- [CVE-2024-44135](CVE-2024/CVE-2024-441xx/CVE-2024-44135.json) (`2024-09-25T13:28:09.067`)
|
||||
- [CVE-2024-44176](CVE-2024/CVE-2024-441xx/CVE-2024-44176.json) (`2024-09-25T13:27:13.333`)
|
||||
- [CVE-2024-44187](CVE-2024/CVE-2024-441xx/CVE-2024-44187.json) (`2024-09-25T13:25:52.043`)
|
||||
- [CVE-2024-44191](CVE-2024/CVE-2024-441xx/CVE-2024-44191.json) (`2024-09-25T13:24:42.380`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
91
_state.csv
91
_state.csv
@ -74913,7 +74913,7 @@ CVE-2015-1379,0,0,1b953d1ae89c6c481112b181f3d965974511a137bacd640c146d9fed522857
|
||||
CVE-2015-1380,0,0,4ad7fb032dd720555eacdff92c0a6152162ca1d6e2b045abafde727628cce99e,2018-10-30T16:27:35.843000
|
||||
CVE-2015-1381,0,0,1f367f9ad0221485a6817f831fe7ef1290ec7919efe893bbd9e7ab7ccaf4f3d5,2018-10-30T16:27:35.843000
|
||||
CVE-2015-1382,0,0,d447253463e0b96c2ea9e8b317321c2892edbb738fc2b47a788a17b4de0da8a1,2018-10-30T16:27:35.843000
|
||||
CVE-2015-1383,0,0,22ee87b67d910e9504fcd6ce33f4688e59b5f068393c73bf8e5beda7679b1afe,2015-02-04T05:20:19.657000
|
||||
CVE-2015-1383,0,1,162301886a671c085e33ad34a0954037e4a0941474dca7ba6f588369e3c3134c,2024-09-25T13:10:58.457000
|
||||
CVE-2015-1384,0,0,cd9b8dd636cee83624f561a5fcdefe401c750b28230944273a94bed8894e1871,2018-10-09T19:55:49.513000
|
||||
CVE-2015-1385,0,0,1cb965c5ee98441680d3c1f1c7768517246a8cfe484410abdeba1ebdb7eb0ca5,2023-06-15T19:57:37.947000
|
||||
CVE-2015-1386,0,0,16974db8920b7aaf9a998c51b8b141893d1526a6715c870f1289136b2fabe30a,2017-08-31T19:01:00.123000
|
||||
@ -114897,7 +114897,7 @@ CVE-2018-14067,0,0,2a2d411621e57c68cb32bec00024c7d96a5b3e8780cc1a4378ff2a9dca9a0
|
||||
CVE-2018-14068,0,0,73ca0c3535752c9ab01d98ea5d8042c8ed5153e006781c7c2386d3be071dd417,2018-09-10T15:00:32.600000
|
||||
CVE-2018-14069,0,0,a5a916c2fd1682ab6edefb82af335e5d17cebb1dbdff86d04abe83a98816b676,2018-09-10T15:19:36.250000
|
||||
CVE-2018-1407,0,0,26764cf337365d0810fd3a33ec5dd61fdeb20cc3c6e1c809e1e5d1c5f21a76a8,2019-10-09T23:38:24.913000
|
||||
CVE-2018-14071,0,0,89676043e35ab071f97ba6dda83beef1221a29cf859c6b61182d760cfabb045c,2018-09-12T19:06:15.137000
|
||||
CVE-2018-14071,0,1,0decc732c0d07636ab40a37a15200c60f96a8548d379962919db82a7d51049e3,2024-09-25T13:10:58.457000
|
||||
CVE-2018-14072,0,0,e08434ec000b275e2e1da7580a4753d3ba8f85ca7ffd332d413a5e348218f61d,2019-10-03T00:03:26.223000
|
||||
CVE-2018-14073,0,0,f7dbef298e90943523b352eb0f45996d8ba189895a2fcaf16bd65a139e9d0022,2019-10-03T00:03:26.223000
|
||||
CVE-2018-14077,0,0,be39c7b2d1c2f42d10df91767af8cfb8294ae86fd410aca9d7e0d334de66bfe5,2020-08-24T17:37:01.140000
|
||||
@ -189161,7 +189161,7 @@ CVE-2022-1774,0,0,bb72968dc351fc81cbc6770dbb6b410f69431145c40a6612fe00040d9473e6
|
||||
CVE-2022-1775,0,0,11d3ff145b18a5433d3822918999b159882e908bcef93221ae007d64364221ed,2022-06-02T13:41:24.440000
|
||||
CVE-2022-1776,0,0,45ff09ebfa9351b95dce217be52f895437f4dc058808af9def4df1f2d707f8d3,2022-07-06T18:36:53.747000
|
||||
CVE-2022-1777,0,0,da12cc138ec62e8f53be839fb1e2025f503fae83d7926f36868d4e27dec446e2,2022-06-21T18:02:15.357000
|
||||
CVE-2022-1778,0,1,ed4948a8469fa7931c0b8ac7a61c084ed5b7ce7da7f8a8982de5423a183302ba,2024-09-25T11:15:11.090000
|
||||
CVE-2022-1778,0,0,ed4948a8469fa7931c0b8ac7a61c084ed5b7ce7da7f8a8982de5423a183302ba,2024-09-25T11:15:11.090000
|
||||
CVE-2022-1779,0,0,cdb9fbac32084f1304d63cc7d0982f77dfa3fa92952bbb8a03d5afc2314a3811,2022-06-21T17:16:38.210000
|
||||
CVE-2022-1780,0,0,8aef82816c3364aa8da1a6065d52f004d12980f5a99d94bd303d09ff29459f0a,2022-06-21T17:19:10.827000
|
||||
CVE-2022-1781,0,0,35737d9ed29fa4df56cfcd617f1abb58ea3db6cbaa46c65d2eb71c96c52fec96,2022-06-21T17:20:34.937000
|
||||
@ -192048,7 +192048,7 @@ CVE-2022-22765,0,0,223da71eef385cf824baf5782bfc0f793a53ad289f92fd859bdc084d29016
|
||||
CVE-2022-22766,0,0,5d92e36149dd1bf75b820beb8f931e05ac6702d1a8d2fcf47ef8b83e7df83ca9,2022-05-11T14:59:38.777000
|
||||
CVE-2022-22767,0,0,979ca06484886a2f8b1ee997a52bab84af07e5d00b130033df9ce41559ec4bc5,2022-06-11T00:53:59.060000
|
||||
CVE-2022-22769,0,0,6ebde0cb7891473452986109c550748499597b0d5d5bd613d387a41b22d58e92,2022-01-26T15:30:15.380000
|
||||
CVE-2022-2277,0,1,210da0cf862ae57c32f7202472236509df0a3259274d8ec5390979bd86be79f1,2024-09-25T11:15:11.927000
|
||||
CVE-2022-2277,0,0,210da0cf862ae57c32f7202472236509df0a3259274d8ec5390979bd86be79f1,2024-09-25T11:15:11.927000
|
||||
CVE-2022-22770,0,0,8cb61b4df56b0f1709476610617a7ceb3cb2a32d820a168a0e847d759fb3dea6,2022-02-23T20:47:45.877000
|
||||
CVE-2022-22771,0,0,3bbac9c57cdd0768331a9373cd0f728e9a74d379c56e1ae62761d9c762fc4d68,2023-11-07T03:43:59.253000
|
||||
CVE-2022-22772,0,0,ad137c3f591cdd5f3cab8fc7664444a0ec3334db8e085f3cd682913415378008,2022-04-07T19:26:22.550000
|
||||
@ -220002,13 +220002,13 @@ CVE-2023-26567,0,0,2fdafb05923d5e9dda63087161b051ed776db5e87ba1f7f5bfb489fc31847
|
||||
CVE-2023-26568,0,0,6977224c632433016d8ff2d2cb19348688d720856f15a54184e408bd244d7fb6,2023-10-28T03:20:16.467000
|
||||
CVE-2023-26569,0,0,b1c8a19955ca28ef62fa087fa8ee5e319de6bb8443600fd874df9551a81f0caf,2023-10-28T03:20:20.530000
|
||||
CVE-2023-2657,0,0,6bb86c6b8f97221a5a3adfae4b8836a1c6086c7469330d39586eadc2437a6979,2024-05-17T02:23:07.787000
|
||||
CVE-2023-26570,0,0,985268058af4df2a5de0dbd43820c01c3d2d2152a8f395d7991b35230b4b7cd1,2023-10-28T03:20:26.277000
|
||||
CVE-2023-26571,0,0,6ad7675087e078232159804d80694d014dc8c7b22ea14d122eef01cac63c681e,2023-10-28T03:20:31.930000
|
||||
CVE-2023-26570,0,1,e062e418dd4e60d0b4cf3c642e7cac18b0e244ddcc351bdd312b7f2a949babe6,2024-09-25T12:15:03.550000
|
||||
CVE-2023-26571,0,1,145d3254e3704347d146630b5cbea35d3f024d32b548b4a25088f6b90a9989d2,2024-09-25T12:15:03.693000
|
||||
CVE-2023-26572,0,0,c838711d5ca1fe934b2a4e03300483cc4194eae1ad2a456ebcf41b09d402922d,2023-10-28T03:22:43.037000
|
||||
CVE-2023-26573,0,0,01a914f4371792455febcc8174bf98bcd51aec779c56c2ca0074f0ca61d3e4e1,2023-10-28T03:22:35.543000
|
||||
CVE-2023-26574,0,0,0179031543c96ae920852f26c5684c0c43fee85db82468af977566e1a399447f,2023-10-28T03:22:50.603000
|
||||
CVE-2023-26575,0,0,bf6c9b9cfddb3c772bca12484c3efcbde61bca6309c9ab9d0e9e39f457fd0393,2023-10-28T03:22:26.930000
|
||||
CVE-2023-26576,0,0,4c76572eff5449357691c7ddc739b83a906b752e39a31542ad7971d0566fe7ad,2023-10-28T03:22:20.050000
|
||||
CVE-2023-26573,0,1,620e021ab2e2304942e3aa88633c0deb0898c915ed47fe74b5310c0f4bf465b7,2024-09-25T12:15:03.787000
|
||||
CVE-2023-26574,0,1,99add887cfb1560d349baef59823dab84742049e28265b7ba9e9ffe7302cb766,2024-09-25T12:15:03.890000
|
||||
CVE-2023-26575,0,1,773bffa73411451a82a68c7b90f228333cb4a2be04850f5e157b73b19a20294a,2024-09-25T12:15:03.983000
|
||||
CVE-2023-26576,0,1,b6e4356178fb45cc8e4d0c09980afc7b5bfc85c28cf8478dc60cbc9b6512c719,2024-09-25T12:15:04.070000
|
||||
CVE-2023-26577,0,0,e387b43db07597111e29d303d9128e385187422549d09a38938ea31e04f41f85,2023-10-28T03:22:14.633000
|
||||
CVE-2023-26578,0,0,ba6419d6cd9adc08f3d9d2b1b07f4e78f6960abb31d0e4463f52347de7929d39,2023-10-28T03:22:06.693000
|
||||
CVE-2023-26579,0,0,0d11d6d0470d7c1fea00625466cfa4bdfd047a078ae6785854c8528b0760a70e,2023-10-28T03:21:34.177000
|
||||
@ -220375,13 +220375,13 @@ CVE-2023-27250,0,0,9a38b5d3d9104ffd11b543000f80c6f407e3c0edaf3802060491a056f2089
|
||||
CVE-2023-27253,0,0,9208d75df1005d2bd5e7abb6ff00cd1294d8c7da73f06e3279890d8e23280f2b,2023-07-13T23:15:10.157000
|
||||
CVE-2023-27254,0,0,41059f30436b4f8a4c052c41ad0605125a704f6391cfee8ca7e05b9c82853509,2023-10-28T03:20:53.253000
|
||||
CVE-2023-27255,0,0,ac8c553e15a265f318ec023b2438a45227b1a06a8912b67f24cc5919737c478f,2023-10-28T03:22:55.287000
|
||||
CVE-2023-27256,0,0,8f5b794448494ade40a75e67fcc4ac2960d26fdb7ffe1476d2270416f8c2a4a0,2023-10-28T03:23:01.543000
|
||||
CVE-2023-27257,0,0,fe2b1d3edd9a911c3e0f7a2e2234f5c230e7201ce3ab724d116af175137f6347,2023-10-28T03:19:47.833000
|
||||
CVE-2023-27258,0,0,99fcfba955ec1244ee0267478c560ef8a7793f8288adb2048cd9638e8f7ab69a,2023-10-28T03:19:57.333000
|
||||
CVE-2023-27259,0,0,7d1c433cc856bf3dc4b3fb61013b33a1abf7f11f36edfc92cc099b9b98c7effa,2023-10-28T03:20:02.377000
|
||||
CVE-2023-27256,0,1,65aa31ff10449c505609fa6dc86cd0ce71b9464d92443f742e70e56db5b8cc6f,2024-09-25T12:15:04.160000
|
||||
CVE-2023-27257,0,1,dd21dff6561509ce5912a1e54a8494f7ac6d838d3edd51a6844968ba9d55300a,2024-09-25T12:15:04.267000
|
||||
CVE-2023-27258,0,1,3d2cc14947fb15410b195fd019558a596fe6f41cf3fe89c69df802dc54ff70dc,2024-09-25T12:15:04.347000
|
||||
CVE-2023-27259,0,1,62c6250b4c4d2c26b196bdaf9fe19261fea853d5cc27169219feee671bb62433,2024-09-25T12:15:04.440000
|
||||
CVE-2023-2726,0,0,a676b363020363c4c1f0ad8a6a07b45ba0a1aa75ce1af10a307a407938214927,2023-11-25T11:15:15.500000
|
||||
CVE-2023-27260,0,0,5e6bdc7d9b83cbf41fe216801b3bb189101a053484437d15f2f76068f948fce4,2023-10-28T03:20:11.070000
|
||||
CVE-2023-27261,0,0,bbe1b63cda47d1d243102dd0fd751f232eedd66da7924ae0d27ab0c2e5677b4f,2023-10-28T03:23:33.637000
|
||||
CVE-2023-27261,0,1,b7c595a3152e75ec79d1f521d5381ab1d36c6c1db00e2729792677404f9ed106,2024-09-25T12:15:04.520000
|
||||
CVE-2023-27262,0,0,caac8ec50512eb671360f25fa34045881c38191f203fca0faa1ae5fbb8afcbf6,2023-10-28T03:23:20.260000
|
||||
CVE-2023-27263,0,0,7321fe736df422d5ab6748f2b41cffe795165e7103b6523cef8ecc079ad10836,2023-11-07T04:09:53.167000
|
||||
CVE-2023-27264,0,0,5012d9666f52e1d64d2e30de42d2c1ad57116ad5fa028f3ae006f653e3465e0c,2023-11-07T04:09:53.240000
|
||||
@ -220489,9 +220489,9 @@ CVE-2023-27370,0,0,8a51074535677b5a5ddfb77e2d5ed90aa22f20fb837425866fcd0b638d93a
|
||||
CVE-2023-27371,0,0,bc1427797625faaaa1b1c13746235a3a4dee21b87bb2c971edcaf9ba15a6b470,2023-03-31T00:15:06.447000
|
||||
CVE-2023-27372,0,0,140377125b71fa708eece5718b16a779b6bc4519b4b6307b0e12f0baa25e9109,2023-06-21T18:15:12.797000
|
||||
CVE-2023-27373,0,0,0c5a6e2505edc294683fadbae329757286d6d5e9667ace25401a379f6857078f,2023-08-15T14:29:28.147000
|
||||
CVE-2023-27375,0,0,64a4fdc53d160459875d0ab4aa3ef8ecae11faa6a959ce2aff63a955d1135599,2023-10-28T03:23:15.667000
|
||||
CVE-2023-27376,0,0,34491057d9db3ee5ddec301a0a54d6413b97cb2c7df6d0a0aa915ca7464198c6,2023-10-28T03:23:11.250000
|
||||
CVE-2023-27377,0,0,4663f74df7a2c23281f6a0ddd1e1f09d9134c83b0695205af8eff89000f2bdc4,2023-10-28T03:23:47.653000
|
||||
CVE-2023-27375,0,1,5d4b5b038016121cc6c3c56d10c4fe48caf0a990b127afa54730ed1590ae0c1a,2024-09-25T12:15:04.620000
|
||||
CVE-2023-27376,0,1,fe181908091c98d121d69936eff1bbfb60a8170aba03ae0a6afd90c1c8ae0366,2024-09-25T12:15:04.703000
|
||||
CVE-2023-27377,0,1,b89077a4f13f1b1a2d61bc944066e1bbbaaa3e23fda0850aebd072bee6454136,2024-09-25T12:15:04.797000
|
||||
CVE-2023-27378,0,0,31482c383e817f9d20b7bd76da956e9bad2eb654b8fe59b6a3bd6c47ff64305d,2023-05-10T18:42:24.563000
|
||||
CVE-2023-27379,0,0,10d7b013cf0d14a894592dd7963a20baf17263cd521b117e31cd210f91544e11,2023-07-26T21:01:27.943000
|
||||
CVE-2023-2738,0,0,255759be26e7795447f0c9a8ed26b9b32d3fb8b8611259cfdd49e891c8f110cf,2024-05-17T02:23:13.270000
|
||||
@ -221328,7 +221328,7 @@ CVE-2023-28320,0,0,5227e72069a84089f10fac1339bbb3457663967a9fe65f4cfcdbbe543fe69
|
||||
CVE-2023-28321,0,0,7ab7e472a08cbfbcee1cffe766366f8afabb5fa1fb871361581640f837006d09,2023-11-07T04:10:28.670000
|
||||
CVE-2023-28322,0,0,e6f8a76dbfdaa1843cff4928586c0e102202ae87109018408c12011fd0e73a40,2023-12-22T16:15:07.493000
|
||||
CVE-2023-28323,0,0,45a7580f5caaf370f52fa79201231573e457be28510d4650ecf80ae2fe96b361,2023-07-10T15:55:23.607000
|
||||
CVE-2023-28324,0,0,7695c0797fe1bfec180932bce1dfd95a1dffa988f4d7567e1a1129cd7e1eaa11,2023-07-10T17:46:59.287000
|
||||
CVE-2023-28324,0,1,9aea6ad31e5715b0a7ecba6b2b0f7468ba0870be2dca0f7bc052bb6544030f3e,2024-09-25T13:35:00.443000
|
||||
CVE-2023-28325,0,0,4fd6e0b0b7c505c2fd43504d4b63a966dc708437fb5467ce1e281a243ba9f9bf,2023-05-22T14:29:00.840000
|
||||
CVE-2023-28326,0,0,0c7b7956b8940c0928a48d68076b8f428679c68ea4c7d44789f578c2e29f73c0,2023-11-07T04:10:28.880000
|
||||
CVE-2023-28327,0,0,b6f0484e5b7bfca56361e43c7bf8608f46ecfd24e3583be1082bf3cc2207865b,2023-04-29T03:12:41.973000
|
||||
@ -231314,7 +231314,7 @@ CVE-2023-41307,0,0,b40206db3f664c3741f7b63048e1db296007a1580fe2faf85cefb526ef104
|
||||
CVE-2023-41308,0,0,6835c8dc26ef7b1d8628f4b4565cdf08b38c79279b9714ee93f6f62ea090cff6,2024-09-25T01:36:05.800000
|
||||
CVE-2023-41309,0,0,154e293d9c3d937fb04656c30c71ffaf7386d4b8e6863bd96a3d8a11bae1f2cc,2023-09-28T16:07:39.257000
|
||||
CVE-2023-41310,0,0,baed8ce68083b6dbb90f516f90b0902dd047c6d89511f25ca69a36ee0c1ce871,2023-09-28T16:03:40.263000
|
||||
CVE-2023-41311,0,0,7909df55551b90d7519f1d4404d50e09981c58eafcce58048025ceb8c809f7de,2023-09-28T15:56:31.800000
|
||||
CVE-2023-41311,0,1,f9c60ca46138b44e528cc98d7a1515cebcbabbf569867d9c50588e1fe283bb03,2024-09-25T13:35:01.407000
|
||||
CVE-2023-41312,0,0,58f8c57ed7582d0a806011fae75a0fa65cb09fde370ec1d14463d9b06219a7e6,2023-09-28T15:55:47.057000
|
||||
CVE-2023-41313,0,0,30321f3e06cb0e59bba66fb59410219af7cd6bc368d72f5cfa5a6534ea657ffb,2024-08-05T18:35:02.890000
|
||||
CVE-2023-41314,0,0,231103ce18fbd562745e97d45033e3484f45e746fb68dafcef5ec6dd9e6c6ec7,2023-12-22T17:19:15.287000
|
||||
@ -233114,7 +233114,7 @@ CVE-2023-43906,0,0,ff14d8a22a132aecd242d338700d98c93de3c23cabb88a79d907b46e4d330
|
||||
CVE-2023-43907,0,0,96d826a1afbfe78d28e5fc62e2d4cba36335d098a0b61b1aa2fe33b1754fdddf,2024-09-23T17:35:08.737000
|
||||
CVE-2023-43909,0,0,2a52e5f92b53304c7bc4e54ac24676fe4e46f8d985d61293ac477491967852dc,2023-10-02T19:40:04.803000
|
||||
CVE-2023-4392,0,0,1d3f2d738afdf027eae4b211f2e571cffa584d21a99ee02b4525f798db1c03e9,2024-05-17T02:31:31.610000
|
||||
CVE-2023-4393,0,0,3e4c4292b8ee7f2ba488c5eb3a1cd28c34640bf970163ba9017f285851ab4040,2023-11-08T20:56:59.690000
|
||||
CVE-2023-4393,0,1,c5af9a9c16a1e9bbc22080d93f65c06d20e60bb1e00e4221a8aa5681e06de445,2024-09-25T12:15:04.887000
|
||||
CVE-2023-4394,0,0,1f57bf1c0cd94fb3a96400a16dd6f87e9c0313e4ee9e7f85cc8cb9e838e908d9,2023-11-07T04:22:31.487000
|
||||
CVE-2023-43944,0,0,444cb16bb521303bb044c64676fbd90beb0aac62b40598010588900ff85bf29b,2023-10-02T19:37:07.767000
|
||||
CVE-2023-4395,0,0,78dc7c95316407c5e68a1106c7fbdadf01339b63c6724f1e4f6fa4838b57b003,2023-08-22T00:55:09.250000
|
||||
@ -250907,8 +250907,8 @@ CVE-2024-3114,0,0,438316d71fe40cf2421f9ff6deaed7eac6b8aea65c739d1fa5d800504a4d2a
|
||||
CVE-2024-31140,0,0,1880c35ac5ba5af45eb21413401eeeaab09be8abf223654f6041d65ff3324893,2024-03-28T16:07:30.893000
|
||||
CVE-2024-31142,0,0,16502fe8420294098dded506476ced118645fadee97cfcf27213cce5ae7650bd,2024-05-16T15:44:44.683000
|
||||
CVE-2024-31143,0,0,1f98a77fde40be218a5d12e6b00af8f536e83110a5110bb36201081d2e6f449f,2024-08-21T14:35:09.100000
|
||||
CVE-2024-31145,1,1,14bfd56957753a972b7293ba7d385ff3b3ae21a7f1330a21b84b6023b5b6fe39,2024-09-25T11:15:12.133000
|
||||
CVE-2024-31146,1,1,5a631a88a6c48f9d5e2ebbcb599a1dfab46a04f08bc06cfe015b638853ef34e5,2024-09-25T11:15:12.220000
|
||||
CVE-2024-31145,0,0,14bfd56957753a972b7293ba7d385ff3b3ae21a7f1330a21b84b6023b5b6fe39,2024-09-25T11:15:12.133000
|
||||
CVE-2024-31146,0,0,5a631a88a6c48f9d5e2ebbcb599a1dfab46a04f08bc06cfe015b638853ef34e5,2024-09-25T11:15:12.220000
|
||||
CVE-2024-3115,0,0,5c883fd956848ebd732b9328b2a6f07d0a52d1e0d056f15c570d933f5c859482,2024-08-30T14:15:16.060000
|
||||
CVE-2024-31156,0,0,0196e496a3b7a6255c15a0e2200e98a2f53059591b5db0d973b7d4520d1de2fe,2024-05-08T17:05:24.083000
|
||||
CVE-2024-31159,0,0,1cdbc9c62e9fa77de1f1d4073e38d32145ad47af8833ae9b854fc846b51fea1e,2024-08-16T20:27:40.107000
|
||||
@ -257451,14 +257451,14 @@ CVE-2024-40848,0,0,7ab28782bb21d2f3b29c42ec6d7a69b6a3d16784ab458e6dd25f268e7916d
|
||||
CVE-2024-4085,0,0,7aad6a4056b6c332cceb43166a488ef1c1b3002f44d4bee7dddba365a66e15ea,2024-05-02T18:00:37.360000
|
||||
CVE-2024-40850,0,0,7d15ba2596e6638a9baa06d58c5470198e88fecf8047b38bd33f0680a13c813a,2024-09-24T15:41:22.803000
|
||||
CVE-2024-40852,0,0,3de957ce6dc717c4eca0b29db3655ade9659ced84b056b000601bcd50e3e4584,2024-09-20T12:31:20.110000
|
||||
CVE-2024-40856,0,0,c53b64bcb96ffb53e7c5a3c98eae693333efe12e0fd41b0de336502a91b09e8c,2024-09-20T12:31:20.110000
|
||||
CVE-2024-40857,0,0,49afbef84ab3139bba403d8137a9332468e61958e86197138141f0362c1b3d27,2024-09-20T12:31:20.110000
|
||||
CVE-2024-40856,0,1,d1c395cfb081223f2e2dfeb53f10a6fd746e5cb54023878ed4edffc6317ff1c1,2024-09-25T13:43:40.657000
|
||||
CVE-2024-40857,0,1,f2e2a807b57a9e2f285ea0e786a7b34a2d2aa721fddb70aba2e62035d4b0c8f7,2024-09-25T13:41:41.843000
|
||||
CVE-2024-40859,0,0,e6bef66eff66d00ffd29922d241a25fd31e85836830114d7614152c90136861b,2024-09-24T20:31:34.780000
|
||||
CVE-2024-4086,0,0,4591112164bebe25a6e3755e5f7d7b3acd1442e1405281bbc9f49b1286c02b38,2024-05-02T18:00:37.360000
|
||||
CVE-2024-40860,0,0,95ecf460e2c86924b53fb7d3aa5f8264e4519b36b6fe383f1caae112d3199182,2024-09-20T12:31:20.110000
|
||||
CVE-2024-40860,0,1,e5ead227110aa19c4042e26e364c8228b4489bfdf6f0431771df4e3ccb8a59ef,2024-09-25T13:41:05.177000
|
||||
CVE-2024-40861,0,0,7204d4c395d904aba2687d268d077938e2cf1cd101497574171fb4f0b590be98,2024-09-20T12:31:20.110000
|
||||
CVE-2024-40862,0,0,0525786495a6d1734dd38aea7fe1aa5e14f710766343f641e193e4a65abe834e,2024-09-20T12:31:20.110000
|
||||
CVE-2024-40863,0,0,6d19988e7f98214ad02b31d8b0b7ea2f69e12db56e9a0545de8d6a7e8a3a5527,2024-09-20T12:31:20.110000
|
||||
CVE-2024-40863,0,1,3ea35050167861a83960968323563384b01739f65920198953c160f9bccf9a87,2024-09-25T13:40:28.967000
|
||||
CVE-2024-40865,0,0,86a860e5905b6728c79a2b0220fe6fe620623c98d110f80f056e40b418685ee4,2024-09-19T17:58:37.370000
|
||||
CVE-2024-40866,0,0,b70b7495abe739ca87ac99d55432fe61ef90e14c7b56889eeedb3e6da6ebe6de,2024-09-24T19:02:09.850000
|
||||
CVE-2024-4087,0,0,559dc8fcb531eb7d96e390fa33463b50a20c5a688e8dbefeb3187bf1d2c5f774,2024-06-03T14:46:24.250000
|
||||
@ -259357,12 +259357,12 @@ CVE-2024-43983,0,0,1129654801fd3266f7fe50d30c14628ba8e34277b02cfc392393ce4aaa513
|
||||
CVE-2024-43985,0,0,b30648ddb1d2b11b33385d41d42e62d1ebe2261e3847ee7222ca30a44e15ddae,2024-09-24T19:33:16.910000
|
||||
CVE-2024-43986,0,0,9478adfda55868d7b94f2eea7c2c936b95469666be97191a74de84a03c2187a9,2024-08-29T13:25:27.537000
|
||||
CVE-2024-43987,0,0,5f2ad565a5d32bae37360bc37876e8a6cdef75055ca9a1d57a5047cb69a7250c,2024-09-20T12:30:51.220000
|
||||
CVE-2024-43988,0,0,58810a59167a152a28df3aac148f6a81b7e962eeb8f36cca2c04029c80f728ba,2024-09-20T12:30:51.220000
|
||||
CVE-2024-43988,0,1,43ffe19e41988c419aca249be075847312c9c8cd41c433297d22c781cef44325,2024-09-25T13:55:55.460000
|
||||
CVE-2024-43989,0,0,9f19cbbd07eac2d4997a02808c8ed7b359c9c31bd68dd720d1ab97474c15e7dd,2024-09-23T00:15:10.800000
|
||||
CVE-2024-4399,0,0,037b40419d6c617c61ec971c9e0affd6b35920b718c94b9e88ff7a43f16d3faf,2024-07-03T02:07:31.827000
|
||||
CVE-2024-43991,0,0,dda8dfaf96eadcbed1e5201447898b359abd71dadd4fa20fb8b97e3a369fa7a3,2024-09-20T12:30:51.220000
|
||||
CVE-2024-43992,0,0,ce482abec0688eb2a57431414e5c7c14ed21653accf87cc53624b71f8332ee14,2024-09-20T12:30:51.220000
|
||||
CVE-2024-43993,0,0,8429fddc72b66938c1cabc2c62cfe7b55cdfd9517ee1a2cff304c65b1cd15c63,2024-09-20T12:30:51.220000
|
||||
CVE-2024-43991,0,1,62375b0bd15282a5169a9db83c3c584ee6643c24a05676f00ee713a46015a5a5,2024-09-25T13:53:50.107000
|
||||
CVE-2024-43992,0,1,e9a152f92c5b0e9db22adc26709ee0e8b5e307e1de9d16d60489758c638181ee,2024-09-25T13:47:17.277000
|
||||
CVE-2024-43993,0,1,c2d6d52348aca85630fcb2a37f72e9ad613ffd4f41ea865abac1f2b4dc17f7fc,2024-09-25T13:44:39.917000
|
||||
CVE-2024-43994,0,0,92a57f752ce2faa73917c46fd03cd7058c3f4fe6668ac24e011d5cce000e100c,2024-09-20T12:30:51.220000
|
||||
CVE-2024-43995,0,0,d2bc15228a0936c9d52925ee78d8f61fa4f243d84362a990cf6cd93f080ed156,2024-09-20T12:30:51.220000
|
||||
CVE-2024-43996,0,0,d7156f428d1448ad8b6ccd44d882e30f14df1390e059d6ddfa9925733f3aeac4,2024-09-23T01:15:11.510000
|
||||
@ -259428,17 +259428,17 @@ CVE-2024-44117,0,0,f5e51fd4c1c072e4ebc183a03cfbd5abdf4c1e3554f96913f31f5eae6bad0
|
||||
CVE-2024-44120,0,0,e512bb8c5b42763893890ed03b7785da148b231d68bd53abc475cbbb6b528a5f,2024-09-10T12:09:50.377000
|
||||
CVE-2024-44121,0,0,bad946f7ab72ac1b9d199f1a920dd1390631dbfc9489b17da06c05da204a16aa,2024-09-10T12:09:50.377000
|
||||
CVE-2024-44124,0,0,44c7ca8146afbbf39c096f933ced467146f947fcf582f4483eb2ab72de8f0e4d,2024-09-20T12:31:20.110000
|
||||
CVE-2024-44125,0,0,9e664118d2ae4edc8a767eed4bd017c05d52d36e00239c51040c0b095af7ae9c,2024-09-20T12:31:20.110000
|
||||
CVE-2024-44125,0,1,2a52003a3bce56ec678ccb08ea5263fde16f13ab11416a9f08770bae07d00ea4,2024-09-25T13:30:11.570000
|
||||
CVE-2024-44127,0,0,dd0c6b9721104380f6a5b85cab540e81cef5152e26883b5789fde70c5e555690,2024-09-20T12:31:20.110000
|
||||
CVE-2024-44128,0,0,0d066e39a9d2e85c653bba4cb69edb057d90c1a06e2e2de543fb82ec551e1666,2024-09-20T12:31:20.110000
|
||||
CVE-2024-44129,0,0,e53a9ce09955a665419f7026ace3914c7b269c25d0abbbe77b9d291ebff0baa1,2024-09-20T12:31:20.110000
|
||||
CVE-2024-44128,0,1,31555c43ca60d63549870b44df4840a93ce230d541458f545dde00e85aa241af,2024-09-25T13:29:42.343000
|
||||
CVE-2024-44129,0,1,c8270bbae401ab1d5afde2ca2f0a32e9c92767e5f49c7b8de1d49243ede89f42,2024-09-25T13:28:21.447000
|
||||
CVE-2024-4413,0,0,63e6df043fde5eb9cf937a1f1c34414009dec10f116b4c7a5421dbd8a403038d,2024-05-14T16:11:39.510000
|
||||
CVE-2024-44130,0,0,f4e89b68598385cc10c7257ab5a15425ed9bf99a914c2f9da983ff94c809a0d7,2024-09-24T18:49:47.557000
|
||||
CVE-2024-44131,0,0,e8738fd0c6ae001394ef8981882c811c82e7272ea012840137fc1618fe06c3bc,2024-09-24T19:01:55.470000
|
||||
CVE-2024-44132,0,0,025bc39178c8aaeeedde19fa86578cab56517e73471c42ea3a47af8718cfd908,2024-09-20T12:31:20.110000
|
||||
CVE-2024-44133,0,0,37c73fbc80b87f8103d86196f929aadb6f994b40eadcbf5f51a2a2f17f44fe6e,2024-09-24T18:24:44.733000
|
||||
CVE-2024-44134,0,0,6acd0998d9e90144e37860d44f416ff49a5729889dc934ad2ba9b80a8196fb3c,2024-09-24T18:26:26.963000
|
||||
CVE-2024-44135,0,0,5965a57b9acfdbabd92fe864390d08c378d2b08941f576cb0b1177942ddb4946,2024-09-20T12:31:20.110000
|
||||
CVE-2024-44135,0,1,2e30daeacd1c058db0b211917dd4f5e9ef4b14081fb1be4edc5057672e88cbd8,2024-09-25T13:28:09.067000
|
||||
CVE-2024-44139,0,0,1e5a55dd4e3bf6761362df168af8ec5360faa5b360c06fdbf37c0f9ce70d7baf,2024-09-24T18:30:34.863000
|
||||
CVE-2024-44146,0,0,c66454fdf1b0d7a7564849f02f2f09da6c49b1097620ca2f5b88a9c465a751e4,2024-09-24T16:14:02.090000
|
||||
CVE-2024-44147,0,0,8d82d5566ea29b70940c9c9f21d951cc6eb5498675d184ba22b8d555bbcad202,2024-09-20T12:31:20.110000
|
||||
@ -259462,7 +259462,7 @@ CVE-2024-44169,0,0,1984dc39e10d51ae75d1eb4ce71ed44a0e161e0da261bb6e58a46f9336bba
|
||||
CVE-2024-4417,0,0,9b4dc22c7f1e74f381016fafb921403ecdaeb7b3b80aa5fc2130db180ef5935c,2024-05-14T16:11:39.510000
|
||||
CVE-2024-44170,0,0,ad9c7ebf0677867158c66367ee67fb353ce44ea245452aff8d81c248a025d15c,2024-09-20T12:31:20.110000
|
||||
CVE-2024-44171,0,0,8849ab93a4e3d95b8d0c07b2a5929755d0774e3c1ebcd6d4c47f015cff90ac49,2024-09-24T16:22:38.880000
|
||||
CVE-2024-44176,0,0,ba7f8b73267c9c45a3d8e8ca5968b7373044b3082c40552641c913654fc3e7d6,2024-09-20T12:31:20.110000
|
||||
CVE-2024-44176,0,1,5b6fb86a9ad1c810cf7d21dda6f46ac369e13568efffc12218acbb73a0a9f505,2024-09-25T13:27:13.333000
|
||||
CVE-2024-44177,0,0,4b644fb54bfe5bad82f56bfb2ac65172a558203c45040f662484a2178ef047ba,2024-09-24T16:28:09.853000
|
||||
CVE-2024-44178,0,0,8f3bedb3f1854b823e7d7c5ff9360a99b55c0a468dfebda9287f95f4dbce5848,2024-09-24T16:28:40.960000
|
||||
CVE-2024-4418,0,0,b4bbbecff5b748c422c3d0ed121fdcb8cd9b2330acacbc04d39874726279d92b,2024-09-13T22:15:02.123000
|
||||
@ -259472,12 +259472,12 @@ CVE-2024-44182,0,0,c8405a3d9209d8acdecd393b8c354b0a78369af6884ff3ac8bf0fb4d77988
|
||||
CVE-2024-44183,0,0,57b9818651cb417289cf4085c7f242935e44b16eacbd02a55d723c9720089da4,2024-09-24T19:04:51.030000
|
||||
CVE-2024-44184,0,0,2b4c62cacdeb539e2524aa34af1a6c1e7c1594f87082a2353399d1dc98f019f0,2024-09-24T19:03:08.110000
|
||||
CVE-2024-44186,0,0,0a6ed69346f4ae3547e173619f5fb32c164a57eccfeb66e3a57b038524695fd7,2024-09-24T18:03:45.513000
|
||||
CVE-2024-44187,0,0,b2cacf02341e442dbf4e00cfcfa5cbe1b0a709de7f1ce9cb6d9bd942234b3b65,2024-09-20T12:31:20.110000
|
||||
CVE-2024-44187,0,1,d2d2c28ca4949100ff21bfe0c88cdee4654cdb1db67fcca21321bb7541d90ded,2024-09-25T13:25:52.043000
|
||||
CVE-2024-44188,0,0,d9b3eca877b183751dacb80ba82d47175b17c9197d2f1bc3c870ce12e136ffb2,2024-09-24T20:38:27.090000
|
||||
CVE-2024-44189,0,0,e2ab737161ad2da12e67ce91184b5117737604e14075d78e50c43a3e20db6842,2024-09-24T18:33:02.477000
|
||||
CVE-2024-4419,0,0,918f3c0166609f9f9b771eac1f6aa12d317d90973a2d5ca4b8b94efa19c28169,2024-05-29T13:02:09.280000
|
||||
CVE-2024-44190,0,0,5081ce2fbdd1649caaed595db236986bbee24e3cff5adfb1ad5f115afe6eab20,2024-09-24T18:02:25.313000
|
||||
CVE-2024-44191,0,0,9e7190477f5b53cdae1382f8881362b81dc3dc904a3ab39bb84ac8eeaa1923a3,2024-09-20T12:31:20.110000
|
||||
CVE-2024-44191,0,1,fd90f1ba5d10f528b1625af58577f983572aef3fdc720edeeb57922b3d21d47c,2024-09-25T13:24:42.380000
|
||||
CVE-2024-44198,0,0,a791372ee4d27381da793bfaa9ff3602c34f52c134516fb46328053cb2cef47f,2024-09-24T15:45:32.787000
|
||||
CVE-2024-4420,0,0,02a774e6911ba5e1ba33187a3301eb3f9ee3d8fd212c89cee791dd002410f381,2024-05-21T12:37:59.687000
|
||||
CVE-2024-44202,0,0,e17cdcd52ced4944b3cb8ebf1e0107ecaca0e3b137318260a8309f5868dfd271,2024-09-20T12:31:20.110000
|
||||
@ -260100,7 +260100,7 @@ CVE-2024-45812,0,0,489679080c302c07130a30d30d7a91b5b88da7ba1022d4140c8924855fd12
|
||||
CVE-2024-45813,0,0,98386851201b0e15badf0fa3bf589a7fa5db9873ebefbf247a44caa5f088f23f,2024-09-20T12:30:17.483000
|
||||
CVE-2024-45815,0,0,06eeda73da6aeda58a6c8960f205d7a720011d27a4bce46e59b74e204055e7cb,2024-09-23T18:31:37.277000
|
||||
CVE-2024-45816,0,0,405ccbf15ea8ae9fcc093aec52f9637ed1c1902b9f58c1816b340eb464d6fa85,2024-09-23T18:41:15.603000
|
||||
CVE-2024-45817,1,1,cda843af3c32b899959725e5bf3ccbd79fb1b4d1dcca6576639ab61a17455e96,2024-09-25T11:15:12.277000
|
||||
CVE-2024-45817,0,0,cda843af3c32b899959725e5bf3ccbd79fb1b4d1dcca6576639ab61a17455e96,2024-09-25T11:15:12.277000
|
||||
CVE-2024-4582,0,0,44a298c10fdfe0ab8acf9c943d89720dd7bed9fa14549ad9833d5c0a75c14780,2024-06-04T19:20:42.750000
|
||||
CVE-2024-45823,0,0,54a17f937d68305d32d91930064931beaa080879f88a3df13aee6b9073c444aa,2024-09-12T18:14:03.913000
|
||||
CVE-2024-45824,0,0,10e16d904d2154d7119c6df05a22810044cd3b50093fd71dfd8bbe566411a270,2024-09-12T18:14:03.913000
|
||||
@ -260234,6 +260234,7 @@ CVE-2024-46565,0,0,66b2d0d6228a7c5a2d4ccc7ad93a78f84212bb6cc08e71806aef1bcd5a1e1
|
||||
CVE-2024-46566,0,0,ef325864839d5d2a7c7484211bd16ddf5a2b8bc0be80252bca80b3d5f7f77da3,2024-09-24T16:41:58.953000
|
||||
CVE-2024-46567,0,0,dedf59b7bdc5b2e51a36cbc666014cae7f626ef481966bf02a77cd072fada268,2024-09-24T16:42:00.340000
|
||||
CVE-2024-46568,0,0,2301bebc09919b1fb68167c3b63854080045492699033fe0b4e9e2e63dbdb0e5,2024-09-24T16:42:01.687000
|
||||
CVE-2024-4657,1,1,eae89e8fcad590b7fe7133398ad07a355faf27158c77572d59c838a0e84149cb,2024-09-25T13:15:04.110000
|
||||
CVE-2024-46571,0,0,d8c3af383191fcf5562e605a727b1592f14cb20acc9bc8714597971ea66958fd,2024-09-24T16:42:03.157000
|
||||
CVE-2024-46580,0,0,4ef81a3a666be4ae5d59b8240dbfdd552f675698f9d209378d8692d698660973,2024-09-24T16:42:09.207000
|
||||
CVE-2024-46581,0,0,16117c2b2643f1e7cb6f228f7ad68d76a739f5581aa486deed15d00461c03fe3,2024-09-24T16:41:36.533000
|
||||
@ -262126,6 +262127,9 @@ CVE-2024-6588,0,0,67672e854c20766f2e15151fa1e111ec8310b7083a57f535c99159d2ce6e5a
|
||||
CVE-2024-6589,0,0,786a762dda95a3db4c9cdc907a3a2b97d61313e4f2473ece396d13a201bdbeba,2024-08-26T16:21:36.530000
|
||||
CVE-2024-6590,0,0,d599bcb4d0f25ca739f37db31b680f97bc141672263ff713109907df31ecad32,2024-09-25T03:15:02.830000
|
||||
CVE-2024-6591,0,0,ba434f770e77a561bd09877a3c29228f51c9818a995d0175b55ef4d80494af35,2024-07-29T14:12:08.783000
|
||||
CVE-2024-6592,1,1,ea91eabcca4cd25be833adbe59cc5a3b48b1040680a1ad6ced0fe29bc04503af,2024-09-25T12:15:05.027000
|
||||
CVE-2024-6593,1,1,9edeef2aea70d3eeaf2b3af59cc3d2a0656100b969bbb83ab66dd314d2313b25,2024-09-25T12:15:05.217000
|
||||
CVE-2024-6594,1,1,ecaec2014a1041aad6bda6271b8cc0fb6dba7d6d7a643e1049fc3aadca6b34ae,2024-09-25T12:15:05.397000
|
||||
CVE-2024-6595,0,0,1592dd03cd1b2c459ee5de6a924fab7f4c8bad5124f72f8b639c71537346952d,2024-08-30T14:15:17.063000
|
||||
CVE-2024-6596,0,0,fbc52d4ad7cc3809cd1ad61f11ddbbe24543620b93977b9bbe0dc2fc14b26149,2024-09-10T12:09:50.377000
|
||||
CVE-2024-6598,0,0,fb802128b1cfc176540749693b684b4374936099ab1c7948c1ec819266291908,2024-07-09T18:19:14.047000
|
||||
@ -262790,9 +262794,9 @@ CVE-2024-7468,0,0,beaf0f0ce0713b119a6aad075faba99ddbbf9b51410059760701d7a29a28a4
|
||||
CVE-2024-7469,0,0,9480167bec5dcea6298d57f7311e33d09ca16fde559c0d2101bf57fd073ab050,2024-08-06T17:36:19.150000
|
||||
CVE-2024-7470,0,0,c378df60a1369914caa48d0c9b95c12c12b8030c63ff1d7f88f18ec0798c6329,2024-08-06T17:37:07.923000
|
||||
CVE-2024-7477,0,0,b965ae55657c73e31f78218a320569adb7f93e50d4b13da2aa9ac96583a28b42,2024-09-11T15:03:06.637000
|
||||
CVE-2024-7479,1,1,2c8805ea505fc48a0a1b3d384b08626d15f99209d9dcc6a4a8572d8d1fa024cb,2024-09-25T11:15:12.330000
|
||||
CVE-2024-7479,0,0,2c8805ea505fc48a0a1b3d384b08626d15f99209d9dcc6a4a8572d8d1fa024cb,2024-09-25T11:15:12.330000
|
||||
CVE-2024-7480,0,0,3513e9b1b40322abc4857852444e6547d08e759bdd020204145d34efe837e109,2024-09-11T15:03:37.293000
|
||||
CVE-2024-7481,1,1,a0a2d601a6957cfe47817d74542037be5dff828d6c06a2c0847ebcc05c623714,2024-09-25T11:15:12.553000
|
||||
CVE-2024-7481,0,0,a0a2d601a6957cfe47817d74542037be5dff828d6c06a2c0847ebcc05c623714,2024-09-25T11:15:12.553000
|
||||
CVE-2024-7484,0,0,922e65f90a754867bdae2807b60c4750519990bf6adcc62fb148334df21e54c7,2024-08-06T16:30:24.547000
|
||||
CVE-2024-7485,0,0,0b34fc91c3d825ea4087a792a0e5c6d839cf66a581a05d0c60df64b0af48f97e,2024-08-06T16:30:24.547000
|
||||
CVE-2024-7486,0,0,e2579b82a31704160b51da6f8b3285ef5bff1d765f5e0369c7378c4f856658fb,2024-08-08T13:04:18.753000
|
||||
@ -263488,6 +263492,7 @@ CVE-2024-8533,0,0,ceba1d609043d018dd2a5c62af783c64aebd2125e63ee811ba18e8a1d6a851
|
||||
CVE-2024-8538,0,0,cdc95bc68a4038527ba5cf51b0a8358b05e3a1650fc8124f586021fbca5ad9b3,2024-09-09T13:03:38.303000
|
||||
CVE-2024-8543,0,0,e190cfdf6def9f928d16ce7c20119d5fac7745c9206ec7d9500145321b367e4b,2024-09-10T12:09:50.377000
|
||||
CVE-2024-8544,0,0,b92ed2b51bae3f52bc853d79bde121bda69091c5cde9cc12e546571a35641dfd,2024-09-24T02:15:03.687000
|
||||
CVE-2024-8546,1,1,72dd0e8b3978c165f9beb60b55e8d42aa02c7869febf0ff1b80c593288834bb9,2024-09-25T13:15:04.313000
|
||||
CVE-2024-8549,0,0,fcd242b6ea38a056c01db9880c2a52a409c7d0c95c3a6f9a54b5be14b01f3eaf,2024-09-25T03:15:05.393000
|
||||
CVE-2024-8554,0,0,46c32adbe15332664cfc930fe8c32bff96db8190902ab789492b593fa03348f1,2024-09-10T13:52:23.250000
|
||||
CVE-2024-8555,0,0,0c0685cb1cca90ba97dbbe7724af46b71d0ab057cb41b6cc62e81df56a2985b7,2024-09-10T13:53:11.847000
|
||||
@ -263623,7 +263628,7 @@ CVE-2024-8797,0,0,ba4df0bb11568fe010be4c16334a8844a03d9d0d5268879bae12ea87dcdf4b
|
||||
CVE-2024-8801,0,0,f1edc9c7bb1482d2f7aa53a58527c89ff09517b0d8b72cf3ccbe7bbb09f96d53,2024-09-25T01:15:47.050000
|
||||
CVE-2024-8850,0,0,16d3ef25e9e3c3a395e24ef62b53309c976d74bdad746efe4904407697f24dbe,2024-09-20T12:30:17.483000
|
||||
CVE-2024-8853,0,0,9f4483af2fc4525065d6409c29e78f86f7ea099a8bfb3db8a350d2fbd96a1485,2024-09-20T12:30:17.483000
|
||||
CVE-2024-8858,1,1,0d529df68aab7882afa1c5531609cd4c3cd7930c85ebac7f6f37123e0eea3aa1,2024-09-25T11:15:12.730000
|
||||
CVE-2024-8858,0,0,0d529df68aab7882afa1c5531609cd4c3cd7930c85ebac7f6f37123e0eea3aa1,2024-09-25T11:15:12.730000
|
||||
CVE-2024-8862,0,0,d2fbbde6c386af624a5ae935a7a4eac6c09ff6dabefe8b3cf0bd8d2bf80b0d66,2024-09-20T15:47:10.697000
|
||||
CVE-2024-8863,0,0,1a5131e94b007579c37dce9de5dfd5f9d496b886a484aa9376e9e793818d4aa7,2024-09-20T15:43:43.927000
|
||||
CVE-2024-8864,0,0,3bc8b301985cc40353022de4e4744e73398cd0188f617195b9d24ac6f8e8e30d,2024-09-17T10:38:13.410000
|
||||
@ -263730,4 +263735,4 @@ CVE-2024-9123,0,0,172c86ced5df086b16e63a8a266a4c5ff3fe491725d35f3cb8541fcec31e93
|
||||
CVE-2024-9141,0,0,97f84a42cf7f2b9f57889b2bac4e897bf7424fe08455ac2a5757a2f7675a5b26,2024-09-25T01:15:48.980000
|
||||
CVE-2024-9142,0,0,b03e9d1b56d58ec574118dab2b1ce3d1ed2fc8b91f932eace62a06c5ffb66458,2024-09-25T01:37:10.240000
|
||||
CVE-2024-9148,0,0,476f188a7cb9a6ff6b5d6b29c0400e1d253afd3805ffb422b248b0b3633cd7e2,2024-09-25T01:15:49.297000
|
||||
CVE-2024-9169,0,1,9ade5656a55df3bdd926cb6199a2755f77bced759ae3ff6b46fec0c99536503c,2024-09-25T09:15:03.380000
|
||||
CVE-2024-9169,0,0,9ade5656a55df3bdd926cb6199a2755f77bced759ae3ff6b46fec0c99536503c,2024-09-25T09:15:03.380000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user