mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
Auto-Update: 2024-10-11T22:00:17.668179+00:00
This commit is contained in:
parent
4ecf9f90c1
commit
82587b7962
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-26081",
|
||||
"sourceIdentifier": "security@atlassian.com",
|
||||
"published": "2021-07-20T04:15:09.683",
|
||||
"lastModified": "2022-03-30T13:29:50.043",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-11T21:35:30.537",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-26086",
|
||||
"sourceIdentifier": "security@atlassian.com",
|
||||
"published": "2021-08-16T01:15:06.353",
|
||||
"lastModified": "2022-03-30T13:13:35.317",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-11T21:35:30.887",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -74,6 +94,16 @@
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-39109",
|
||||
"sourceIdentifier": "security@atlassian.com",
|
||||
"published": "2021-09-01T06:15:06.583",
|
||||
"lastModified": "2021-09-10T12:47:12.187",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-11T21:35:31.727",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -74,6 +94,16 @@
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-39113",
|
||||
"sourceIdentifier": "security@atlassian.com",
|
||||
"published": "2021-08-30T07:15:06.737",
|
||||
"lastModified": "2022-03-30T13:29:49.377",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-11T21:35:32.623",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -74,6 +94,16 @@
|
||||
"value": "CWE-613"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-613"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-39115",
|
||||
"sourceIdentifier": "security@atlassian.com",
|
||||
"published": "2021-09-01T23:15:07.430",
|
||||
"lastModified": "2022-04-25T18:16:18.227",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-11T21:35:33.387",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-39119",
|
||||
"sourceIdentifier": "security@atlassian.com",
|
||||
"published": "2021-09-01T23:15:07.480",
|
||||
"lastModified": "2022-07-12T17:42:04.277",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-11T21:35:33.657",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -74,6 +94,16 @@
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-39127",
|
||||
"sourceIdentifier": "security@atlassian.com",
|
||||
"published": "2021-10-21T03:15:07.177",
|
||||
"lastModified": "2022-07-12T17:42:04.277",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-11T21:35:34.470",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-39128",
|
||||
"sourceIdentifier": "security@atlassian.com",
|
||||
"published": "2021-09-16T06:15:06.833",
|
||||
"lastModified": "2022-08-01T16:13:08.583",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-11T21:35:34.647",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-40331",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2023-05-05T08:15:08.683",
|
||||
"lastModified": "2023-05-11T14:14:20.707",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-11T21:35:34.843",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.2
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-4437",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-02-12T20:15:07.993",
|
||||
"lastModified": "2024-05-17T02:03:39.323",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-11T21:57:49.223",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -76,26 +96,59 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://github.com/dbartholomae/lambda-middleware/commit/f689404d830cbc1edd6a1018d3334ff5f44dc6a6",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
"nodes": [
|
||||
{
|
||||
"url": "https://github.com/dbartholomae/lambda-middleware/pull/57",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"url": "https://github.com/dbartholomae/lambda-middleware/releases/tag/%40lambda-middleware%2Fframeguard_v1.1.0",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.253406",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.253406",
|
||||
"source": "cna@vuldb.com"
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:dbartholomae:lambda-middleware:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "1.0.4",
|
||||
"matchCriteriaId": "3E5B585D-EB1B-4559-BD1D-2574968430A6"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/dbartholomae/lambda-middleware/commit/f689404d830cbc1edd6a1018d3334ff5f44dc6a6",
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/dbartholomae/lambda-middleware/pull/57",
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/dbartholomae/lambda-middleware/releases/tag/%40lambda-middleware%2Fframeguard_v1.1.0",
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.253406",
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.253406",
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-47937",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2023-05-15T10:15:10.457",
|
||||
"lastModified": "2024-03-29T10:15:07.963",
|
||||
"lastModified": "2024-10-11T21:35:37.030",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-0604",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2023-08-07T15:15:10.797",
|
||||
"lastModified": "2023-11-07T04:00:58.193",
|
||||
"lastModified": "2024-10-11T21:35:37.363",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-1222",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-03-07T22:15:09.787",
|
||||
"lastModified": "2023-03-11T02:38:47.470",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-11T21:35:37.550",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-1227",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-03-07T22:15:10.087",
|
||||
"lastModified": "2023-03-11T02:37:32.080",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-11T21:35:38.673",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-1228",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-03-07T22:15:10.147",
|
||||
"lastModified": "2023-03-11T02:34:27.697",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-11T21:35:39.530",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-20821",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2023-09-04T03:15:08.480",
|
||||
"lastModified": "2023-09-07T19:14:35.620",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-11T21:35:40.520",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-20822",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2023-09-04T03:15:08.647",
|
||||
"lastModified": "2023-09-07T19:14:27.697",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-11T21:35:40.800",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-21166",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-12-04T23:15:22.477",
|
||||
"lastModified": "2023-12-22T01:15:08.430",
|
||||
"lastModified": "2024-10-11T21:35:42.090",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-25754",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2023-05-08T12:15:09.613",
|
||||
"lastModified": "2023-05-12T01:28:48.043",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-11T21:35:43.887",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-28936",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2023-05-12T08:15:08.857",
|
||||
"lastModified": "2023-05-22T14:52:42.507",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-11T21:35:47.317",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-2843",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2023-08-07T15:15:10.977",
|
||||
"lastModified": "2023-11-07T04:13:25.340",
|
||||
"lastModified": "2024-10-11T21:35:48.967",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-29032",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2023-05-12T08:15:08.930",
|
||||
"lastModified": "2023-05-22T14:54:43.230",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-11T21:35:47.677",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-29246",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2023-05-12T08:15:08.997",
|
||||
"lastModified": "2023-05-22T14:55:15.440",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-11T21:35:48.157",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-30680",
|
||||
"sourceIdentifier": "mobile.security@samsung.com",
|
||||
"published": "2023-08-10T02:15:10.713",
|
||||
"lastModified": "2023-11-07T04:13:53.580",
|
||||
"lastModified": "2024-10-11T21:35:49.307",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -69,6 +69,16 @@
|
||||
"value": "CWE-269"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-266"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-30691",
|
||||
"sourceIdentifier": "mobile.security@samsung.com",
|
||||
"published": "2023-08-10T02:15:11.630",
|
||||
"lastModified": "2023-11-07T04:13:55.870",
|
||||
"lastModified": "2024-10-11T21:35:50.390",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -69,6 +69,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-266"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-31058",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2023-05-22T13:15:09.843",
|
||||
"lastModified": "2023-05-27T00:48:58.773",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-11T21:35:51.460",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-31098",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2023-05-22T16:15:10.150",
|
||||
"lastModified": "2023-05-31T13:55:07.513",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-11T21:35:51.640",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-31103",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2023-05-22T16:15:10.277",
|
||||
"lastModified": "2023-05-27T02:19:27.643",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-11T21:35:51.893",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-31206",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2023-05-22T14:15:09.583",
|
||||
"lastModified": "2023-05-31T01:25:33.760",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-11T21:35:52.067",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-31453",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2023-05-22T14:15:09.643",
|
||||
"lastModified": "2023-05-27T01:20:20.410",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-11T21:35:52.737",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-3365",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2023-08-07T15:15:11.193",
|
||||
"lastModified": "2023-11-07T04:18:36.100",
|
||||
"lastModified": "2024-10-11T21:36:07.410",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.2
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-36655",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-12-06T16:15:07.047",
|
||||
"lastModified": "2023-12-12T16:39:02.243",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-11T21:35:56.680",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-37572",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-12-05T06:15:48.617",
|
||||
"lastModified": "2024-01-25T20:15:35.540",
|
||||
"lastModified": "2024-10-11T21:35:59.080",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-276"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-276"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-42364",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-11-27T23:15:07.313",
|
||||
"lastModified": "2023-11-30T05:07:10.827",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-11T21:36:08.877",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-42740",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-12-04T01:15:11.650",
|
||||
"lastModified": "2023-12-07T17:08:37.267",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-11T21:36:10.030",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-44113",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2023-12-06T09:15:08.113",
|
||||
"lastModified": "2023-12-11T16:15:48.920",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-11T21:36:10.877",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-46818",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-10-27T04:15:10.907",
|
||||
"lastModified": "2023-12-13T00:15:07.247",
|
||||
"lastModified": "2024-10-11T21:36:11.727",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-46886",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-11-29T05:15:07.863",
|
||||
"lastModified": "2023-12-05T13:02:07.903",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-11T21:36:12.497",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.2
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 9.1,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-47016",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-11-22T07:15:07.530",
|
||||
"lastModified": "2023-11-29T18:03:48.853",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-11T21:36:13.327",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-48023",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-11-28T08:15:07.060",
|
||||
"lastModified": "2024-08-02T22:15:27.340",
|
||||
"lastModified": "2024-10-11T21:36:14.160",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [
|
||||
{
|
||||
@ -43,6 +43,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.2
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 9.1,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -56,6 +76,16 @@
|
||||
"value": "CWE-918"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-918"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-48886",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-12-01T23:15:07.920",
|
||||
"lastModified": "2023-12-06T20:20:06.700",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-11T21:36:15.233",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-502"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-502"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-48945",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-11-29T20:15:07.797",
|
||||
"lastModified": "2023-12-05T18:33:48.857",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-11T21:36:15.990",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-49030",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-11-27T21:15:07.820",
|
||||
"lastModified": "2023-12-13T21:22:09.877",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-11T21:36:16.747",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-49040",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-11-27T17:15:08.380",
|
||||
"lastModified": "2023-12-01T20:06:11.127",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-11T21:36:17.520",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-49298",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-11-24T19:15:07.587",
|
||||
"lastModified": "2024-03-18T22:15:07.413",
|
||||
"lastModified": "2024-10-11T21:36:18.810",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-639"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-639"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-6273",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2023-12-06T09:15:08.857",
|
||||
"lastModified": "2023-12-12T18:36:55.433",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-11T21:36:21.740",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-276"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-21534",
|
||||
"sourceIdentifier": "report@snyk.io",
|
||||
"published": "2024-10-11T13:15:15.667",
|
||||
"lastModified": "2024-10-11T13:15:15.667",
|
||||
"lastModified": "2024-10-11T21:36:23.557",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -45,6 +45,16 @@
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-25110",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-02-12T20:15:08.803",
|
||||
"lastModified": "2024-02-12T20:39:09.773",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-11T21:55:24.837",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -51,14 +81,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://github.com/Azure/azure-uamqp-c/commit/30865c9ccedaa32ddb036e87a8ebb52c3f18f695",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
"nodes": [
|
||||
{
|
||||
"url": "https://github.com/Azure/azure-uamqp-c/security/advisories/GHSA-c646-4whf-r67v",
|
||||
"source": "security-advisories@github.com"
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azure:uamqp:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "2023-12-01",
|
||||
"matchCriteriaId": "8AD9A9AD-50B0-4FB1-96AC-0ADE8FB5E04B"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Azure/azure-uamqp-c/commit/30865c9ccedaa32ddb036e87a8ebb52c3f18f695",
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/Azure/azure-uamqp-c/security/advisories/GHSA-c646-4whf-r67v",
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-25825",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-09T16:15:04.277",
|
||||
"lastModified": "2024-10-10T12:51:56.987",
|
||||
"lastModified": "2024-10-11T21:36:24.583",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Se descubri\u00f3 que FydeOS for PC 17.1 R114, FydeOS for VMware 17.0 R114, FydeOS for You 17.1 R114 y OpenFyde R114 estaban configurados con la contrase\u00f1a ra\u00edz guardada como comod\u00edn. Esto permite a los atacantes obtener acceso a la ra\u00edz sin una contrase\u00f1a."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-259"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://fydeos.io/",
|
||||
|
@ -2,24 +2,15 @@
|
||||
"id": "CVE-2024-36051",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-10T13:15:14.187",
|
||||
"lastModified": "2024-10-10T13:15:14.187",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-10-11T21:15:06.843",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In btcd before 0.24.2, removeOpcodeByData mishandles the consensus rules for legacy signature verification. There can be a standard transaction that would be considered valid by Bitcoin Core but invalid by btcd."
|
||||
"value": "Rejected reason: DO NOT USE THIS CVE RECORD. ConsultIDs: CVE-2024-38365. Reason: This record is a duplicate of CVE-2024-38365. Notes: All CVE users should reference CVE-2024-38365 instead of this record. All references and descriptions in this record have been removed to prevent accidental usage."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://delvingbitcoin.org/t/cve-2024-38365-public-disclosure-btcd-findanddelete-bug/1184",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/btcsuite/btcd/releases/tag/v0.24.2",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
"references": []
|
||||
}
|
68
CVE-2024/CVE-2024-383xx/CVE-2024-38365.json
Normal file
68
CVE-2024/CVE-2024-383xx/CVE-2024-38365.json
Normal file
@ -0,0 +1,68 @@
|
||||
{
|
||||
"id": "CVE-2024-38365",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-10-11T20:15:04.733",
|
||||
"lastModified": "2024-10-11T20:15:04.733",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "btcd is an alternative full node bitcoin implementation written in Go (golang). The btcd Bitcoin client (versions 0.10 to 0.24) did not correctly re-implement Bitcoin Core's \"FindAndDelete()\" functionality. This logic is consensus-critical: the difference in behavior with the other Bitcoin clients can lead to btcd clients accepting an invalid Bitcoin block (or rejecting a valid one). This consensus failure can be leveraged to cause a chain split (accepting an invalid Bitcoin block) or be exploited to DoS the btcd nodes (rejecting a valid Bitcoin block). An attacker can create a standard transaction where FindAndDelete doesn't return a match but removeOpCodeByData does making btcd get a different sighash, leading to a chain split. Importantly, this vulnerability can be exploited remotely by any Bitcoin user and does not require any hash power. This is because the difference in behavior can be triggered by a \"standard\" Bitcoin transaction, that is a transaction which gets relayed through the P2P network before it gets included in a Bitcoin block. `removeOpcodeByData(script []byte, dataToRemove []byte)` removes any data pushes from `script` that contain `dataToRemove`. However, `FindAndDelete` only removes exact matches. So for example, with `script = \"<data> <data||foo>\"` and `dataToRemove = \"data\"` btcd will remove both data pushes but Bitcoin Core's `FindAndDelete` only removes the first `<data>` push. This has been patched in btcd version v0.24.2. Users are advised to upgrade. There are no known workarounds for this issue."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.4,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-670"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://delvingbitcoin.org/t/cve-2024-38365-public-disclosure-btcd-findanddelete-bug/1184",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/btcsuite/btcd/commit/04469e600e7d4a58881e2e5447d19024e49800f5",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/btcsuite/btcd/releases/tag/v0.24.2",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/btcsuite/btcd/security/advisories/GHSA-27vh-h6mc-q6g8",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-44414",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-11T17:15:03.880",
|
||||
"lastModified": "2024-10-11T17:15:03.880",
|
||||
"lastModified": "2024-10-11T21:36:31.953",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "A vulnerability was discovered in FBM_292W-21.03.10V, which has been classified as critical. This issue affects the sub_4901E0 function in the msp_info.htm file. Manipulation of the path parameter can lead to command injection."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/IotChan/cve/blob/main/wayos/FBM_292W/CVE-2024-44414",
|
||||
|
25
CVE-2024/CVE-2024-451xx/CVE-2024-45184.json
Normal file
25
CVE-2024/CVE-2024-451xx/CVE-2024-45184.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-45184",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-11T21:15:06.947",
|
||||
"lastModified": "2024-10-11T21:15:06.947",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in Samsung Mobile Processor, Wearable Processor, and Modems with chipset Exynos 9820, 9825, 980, 990, 850, 1080, 2100, 1280, 2200, 1330, 1380, 1480, 2400, 9110, W920, W930, Modem 5123, and Modem 5300. A USAT out-of-bounds write due to a heap buffer overflow can lead to a Denial of Service."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2024-45184/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-45316",
|
||||
"sourceIdentifier": "PSIRT@sonicwall.com",
|
||||
"published": "2024-10-11T13:15:16.010",
|
||||
"lastModified": "2024-10-11T13:15:16.010",
|
||||
"lastModified": "2024-10-11T21:36:32.947",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,30 @@
|
||||
"value": "The Improper link resolution before file access ('Link Following') vulnerability in SonicWall Connect Tunnel (version 12.4.3.271 and earlier of Windows client) allows users with standard privileges to delete arbitrary folders and files, potentially leading to local privilege escalation attack."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "PSIRT@sonicwall.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-45519",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-02T22:15:02.770",
|
||||
"lastModified": "2024-10-10T15:04:49.143",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-11T21:36:33.567",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"cisaExploitAdd": "2024-10-03",
|
||||
"cisaActionDue": "2024-10-24",
|
||||
@ -80,7 +80,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-45746",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-09T17:15:19.727",
|
||||
"lastModified": "2024-10-10T12:51:56.987",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-11T21:36:34.350",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Se descubri\u00f3 un problema en Trusted Firmware-M hasta 2.1.0. Los mensajes de buz\u00f3n proporcionados (y controlados) por el usuario contienen un puntero a una lista de argumentos de entrada (in_vec) y argumentos de salida (out_vec). Estos punteros de lista nunca se validan. Cada lista de argumentos contiene un puntero de b\u00fafer y un campo de longitud de b\u00fafer. Despu\u00e9s de una llamada PSA, la longitud de los argumentos de salida detr\u00e1s del puntero sin marcar se actualiza en mailbox_direct_reply, independientemente del resultado de la llamada. Esto permite que un atacante escriba en cualquier parte del firmware seguro, lo que se puede utilizar para tomar el control del flujo de control, lo que conduce a la ejecuci\u00f3n remota de c\u00f3digo (RCE)."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://trustedfirmware-m.readthedocs.io/en/latest/security/security_advisories/user_pointers_mailbox_vectors_vulnerability.html",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-46088",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-11T16:15:08.357",
|
||||
"lastModified": "2024-10-11T16:15:08.357",
|
||||
"lastModified": "2024-10-11T21:36:35.423",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "An arbitrary file upload vulnerability in the ProductAction.entphone interface of Zhejiang University Entersoft Customer Resource Management System v2002 to v2024 allows attackers to execute arbitrary code via uploading a crafted file."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://zhejiang.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-46307",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-09T17:15:19.813",
|
||||
"lastModified": "2024-10-10T12:51:56.987",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-11T21:36:36.520",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Un vac\u00edo en la l\u00f3gica de pago de Sparkshop v1.16 permite a los atacantes modificar arbitrariamente la cantidad de productos."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-841"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://sparkshop.com",
|
||||
|
25
CVE-2024/CVE-2024-464xx/CVE-2024-46468.json
Normal file
25
CVE-2024/CVE-2024-464xx/CVE-2024-46468.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-46468",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-11T21:15:07.040",
|
||||
"lastModified": "2024-10-11T21:15:07.040",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A Server-Side Request Forgery (SSRF) vulnerability exists in the jpress <= v5.1.1, which can be exploited by an attacker to obtain sensitive information, resulting in an information disclosure."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/ilikeoyt/b396bbb9ef858105c46e999630e7afbe",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/JPressProjects/jpress/issues/190",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-47553",
|
||||
"sourceIdentifier": "productcert@siemens.com",
|
||||
"published": "2024-10-08T09:15:17.847",
|
||||
"lastModified": "2024-10-10T12:56:30.817",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-11T20:04:08.623",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.9,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 6.0
|
||||
},
|
||||
{
|
||||
"source": "productcert@siemens.com",
|
||||
"type": "Secondary",
|
||||
@ -95,10 +115,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://cert-portal.siemens.com/productcert/html/ssa-430425.html",
|
||||
"source": "productcert@siemens.com"
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:siemens:sinec_security_monitor:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "4.9.0",
|
||||
"matchCriteriaId": "BBEABA88-D7CD-47F5-9635-C493A750EFD7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cert-portal.siemens.com/productcert/html/ssa-430425.html",
|
||||
"source": "productcert@siemens.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-47562",
|
||||
"sourceIdentifier": "productcert@siemens.com",
|
||||
"published": "2024-10-08T09:15:18.110",
|
||||
"lastModified": "2024-10-10T12:56:30.817",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-11T20:04:35.480",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.0,
|
||||
"impactScore": 6.0
|
||||
},
|
||||
{
|
||||
"source": "productcert@siemens.com",
|
||||
"type": "Secondary",
|
||||
@ -84,6 +104,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "productcert@siemens.com",
|
||||
"type": "Secondary",
|
||||
@ -95,10 +125,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://cert-portal.siemens.com/productcert/html/ssa-430425.html",
|
||||
"source": "productcert@siemens.com"
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:siemens:sinec_security_monitor:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "4.9.0",
|
||||
"matchCriteriaId": "BBEABA88-D7CD-47F5-9635-C493A750EFD7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cert-portal.siemens.com/productcert/html/ssa-430425.html",
|
||||
"source": "productcert@siemens.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-47563",
|
||||
"sourceIdentifier": "productcert@siemens.com",
|
||||
"published": "2024-10-08T09:15:18.403",
|
||||
"lastModified": "2024-10-10T12:56:30.817",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-11T20:05:05.143",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "productcert@siemens.com",
|
||||
"type": "Secondary",
|
||||
@ -95,10 +115,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://cert-portal.siemens.com/productcert/html/ssa-430425.html",
|
||||
"source": "productcert@siemens.com"
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:siemens:sinec_security_monitor:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "4.9.0",
|
||||
"matchCriteriaId": "BBEABA88-D7CD-47F5-9635-C493A750EFD7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cert-portal.siemens.com/productcert/html/ssa-430425.html",
|
||||
"source": "productcert@siemens.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-47565",
|
||||
"sourceIdentifier": "productcert@siemens.com",
|
||||
"published": "2024-10-08T09:15:18.730",
|
||||
"lastModified": "2024-10-10T12:56:30.817",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-11T20:05:59.237",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "productcert@siemens.com",
|
||||
"type": "Secondary",
|
||||
@ -85,8 +105,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "productcert@siemens.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "productcert@siemens.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -95,10 +125,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://cert-portal.siemens.com/productcert/html/ssa-430425.html",
|
||||
"source": "productcert@siemens.com"
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:siemens:sinec_security_monitor:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "4.9.0",
|
||||
"matchCriteriaId": "BBEABA88-D7CD-47F5-9635-C493A750EFD7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cert-portal.siemens.com/productcert/html/ssa-430425.html",
|
||||
"source": "productcert@siemens.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
82
CVE-2024/CVE-2024-478xx/CVE-2024-47884.json
Normal file
82
CVE-2024/CVE-2024-478xx/CVE-2024-47884.json
Normal file
@ -0,0 +1,82 @@
|
||||
{
|
||||
"id": "CVE-2024-47884",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-10-11T20:15:04.993",
|
||||
"lastModified": "2024-10-11T20:15:04.993",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "foxmarks is a CLI read-only interface for Firefox's bookmarks and history. A temporary file was created under the /tmp directory with read permissions for all users containing a copy of Firefox's database of bookmarks, history, input history, visits counter, use counter, view counter and more confidential information about the history of using Firefox. Permissions default to 0o600 for NamedTempFile. However, after copying the database, its permissions were copied with it resulting in an insecure file with 0x644 permissions. A malicious user is able to read the database when the targeted user executes foxmarks bookmarks or foxmarks history. This vulnerability is patched in v2.1.0."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:L/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "HIGH",
|
||||
"vulnerableSystemIntegrity": "NONE",
|
||||
"vulnerableSystemAvailability": "NONE",
|
||||
"subsequentSystemConfidentiality": "LOW",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 6.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-378"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/zefr0x/foxmarks/commit/c3706bd882b3d61b353e4193f7d2dcfabd0c9a8e",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/zefr0x/foxmarks/security/advisories/GHSA-8rh2-6pwm-5vvq",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-47975",
|
||||
"sourceIdentifier": "f946a70c-00eb-42ce-8e9b-634d1f7b5a6f",
|
||||
"published": "2024-10-07T19:15:10.877",
|
||||
"lastModified": "2024-10-10T12:57:21.987",
|
||||
"lastModified": "2024-10-11T20:15:05.143",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -41,7 +41,7 @@
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://https://www.solidigm.com/support-page/support-security.html",
|
||||
"url": "https://www.solidigm.com/support-page/support-security.html",
|
||||
"source": "f946a70c-00eb-42ce-8e9b-634d1f7b5a6f"
|
||||
}
|
||||
]
|
||||
|
33
CVE-2024/CVE-2024-487xx/CVE-2024-48768.json
Normal file
33
CVE-2024/CVE-2024-487xx/CVE-2024-48768.json
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
"id": "CVE-2024-48768",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-11T20:15:05.253",
|
||||
"lastModified": "2024-10-11T20:15:05.253",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in almaodo GmbH appinventor.ai_google.almando_control 2.3.1 allows a remote attacker to obtain sensitive information via the firmware update process"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://appinventoraigooglealmandocontrol.com",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.almando.com/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/HankJames/Vul-Reports/blob/main/FirmwareLeakage/appinventor.ai_google.almando_control/appinventor.ai_google.almando_control.md",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.almando.com/media/firmware/almando.json",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2024/CVE-2024-487xx/CVE-2024-48769.json
Normal file
29
CVE-2024/CVE-2024-487xx/CVE-2024-48769.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2024-48769",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-11T20:15:05.353",
|
||||
"lastModified": "2024-10-11T20:15:05.353",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in BURG-WCHTER KG de.burgwachter.keyapp.app 4.5.0 allows a remote attacker to obtain sensitve information via the firmware update process."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://burg-wchter.com",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://deburgwachterkeyappapp.com",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/HankJames/Vul-Reports/blob/main/FirmwareLeakage/de.burgwachter.keyapp.app/de.burgwachter.keyapp.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2024/CVE-2024-487xx/CVE-2024-48770.json
Normal file
29
CVE-2024/CVE-2024-487xx/CVE-2024-48770.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2024-48770",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-11T20:15:05.450",
|
||||
"lastModified": "2024-10-11T20:15:05.450",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in Plug n Play Camera com.wisdomcity.zwave 1.1.0 allows a remote attacker to obtain sensitive information via the firmware update process."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://comwisdomcityzwave.com",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://plug.com",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/HankJames/Vul-Reports/blob/main/FirmwareLeakage/com.wisdomcity.zwave/com.wisdomcity.zwave.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-487xx/CVE-2024-48771.json
Normal file
25
CVE-2024/CVE-2024-487xx/CVE-2024-48771.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-48771",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-11T20:15:05.537",
|
||||
"lastModified": "2024-10-11T20:15:05.537",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in almando GmbH Almando Play APP (com.almando.play) 1.8.2 allows a remote attacker to obtain sensitive information via the firmware update process"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://almando.com",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/HankJames/Vul-Reports/blob/main/FirmwareLeakage/com.almando.play/com.almando.play.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2024/CVE-2024-487xx/CVE-2024-48772.json
Normal file
29
CVE-2024/CVE-2024-487xx/CVE-2024-48772.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2024-48772",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-11T21:15:07.127",
|
||||
"lastModified": "2024-10-11T21:15:07.127",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in C-CHIP (com.cchip.cchipamaota) v.1.2.8 allows a remote attacker to obtain sensitive information via the firmware update process."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://comcchipcchipamaota.com",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.c-chip.com.cn/english/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/HankJames/Vul-Reports/blob/main/FirmwareLeakage/com.cchip.cchippamaota/com.cchip.cchipamaota.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2024/CVE-2024-487xx/CVE-2024-48773.json
Normal file
29
CVE-2024/CVE-2024-487xx/CVE-2024-48773.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2024-48773",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-11T20:15:05.637",
|
||||
"lastModified": "2024-10-11T20:15:05.637",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in WoFit v.7.2.3 allows a remote attacker to obtain sensitive information via the firmware update process"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://comchenyumorepro.com",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://wo-smart.com/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/HankJames/Vul-Reports/blob/main/FirmwareLeakage/com.chenyu.morepro/com.chenyu.morepro.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2024/CVE-2024-487xx/CVE-2024-48774.json
Normal file
29
CVE-2024/CVE-2024-487xx/CVE-2024-48774.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2024-48774",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-11T20:15:05.720",
|
||||
"lastModified": "2024-10-11T20:15:05.720",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in Fermax Asia Pacific Pte Ltd com.fermax.vida 2.4.6 allows a remote attacker to obtain sensitve information via the firmware update process."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://comfermaxvida.com",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://fermax.com",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/HankJames/Vul-Reports/blob/main/FirmwareLeakage/com.fermax.vida/com.fermax.vida.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2024/CVE-2024-487xx/CVE-2024-48775.json
Normal file
29
CVE-2024/CVE-2024-487xx/CVE-2024-48775.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2024-48775",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-11T20:15:05.810",
|
||||
"lastModified": "2024-10-11T20:15:05.810",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in Plug n Play Camera com.ezset.delaney 1.2.0 allows a remote attacker to obtain sensitive information via the firmware update process."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://comezsetdelaney.com",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://plug.com",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/HankJames/Vul-Reports/blob/main/FirmwareLeakage/com.ezset.delaney/com.ezset.delaney.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2024/CVE-2024-487xx/CVE-2024-48776.json
Normal file
29
CVE-2024/CVE-2024-487xx/CVE-2024-48776.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2024-48776",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-11T20:15:05.903",
|
||||
"lastModified": "2024-10-11T20:15:05.903",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in Shelly com.home.shelly 1.0.4 allows a remote attacker to obtain sensitive information via the firmware update process"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://comhomeshelly.com",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://shelly.com",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/HankJames/Vul-Reports/blob/main/FirmwareLeakage/com.home.shelly/com.home.shelly.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2024/CVE-2024-487xx/CVE-2024-48777.json
Normal file
29
CVE-2024/CVE-2024-487xx/CVE-2024-48777.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2024-48777",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-11T20:15:05.997",
|
||||
"lastModified": "2024-10-11T20:15:05.997",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "LEDVANCE com.ledvance.smartplus.eu 2.1.10 allows a remote attacker to obtain sensitive information via the firmware update process."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://comledvancesmartpluseu.com",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://ledvance.com",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/HankJames/Vul-Reports/blob/main/FirmwareLeakage/com.ledvance.smartplus.eu/com.ledvance.smartplus.eu.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2024/CVE-2024-487xx/CVE-2024-48778.json
Normal file
29
CVE-2024/CVE-2024-487xx/CVE-2024-48778.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2024-48778",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-11T20:15:06.090",
|
||||
"lastModified": "2024-10-11T20:15:06.090",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in GIANT MANUFACTURING CO., LTD RideLink (tw.giant.ridelink) 2.0.7 allows a remote attacker to obtain sensitive information via the firmware update process."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://giant.com",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://ridelink.com",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/HankJames/Vul-Reports/blob/main/FirmwareLeakage/tw.giant.ridelink/tw.giant.ridelink.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2024/CVE-2024-487xx/CVE-2024-48784.json
Normal file
29
CVE-2024/CVE-2024-487xx/CVE-2024-48784.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2024-48784",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-11T20:15:06.180",
|
||||
"lastModified": "2024-10-11T20:15:06.180",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An Incorrect Access Control issue in SAMPMAX com.sampmax.homemax 2.1.2.7 allows a remote attacker to obtain sensitive information via the firmware update process."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://comsampmaxhomemax.com",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://sampmax.com",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/HankJames/Vul-Reports/blob/main/FirmwareLeakage/com.sampmax.homemax/com.sampmax.homemax.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-487xx/CVE-2024-48786.json
Normal file
25
CVE-2024/CVE-2024-487xx/CVE-2024-48786.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-48786",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-11T20:15:06.277",
|
||||
"lastModified": "2024-10-11T20:15:06.277",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in SWITCHBOT INC SwitchBot (com.theswitchbot.switchbot) 5.0.4 allows a remote attacker to obtain sensitive information via the firmware update process."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://switchbot.com",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/HankJames/Vul-Reports/blob/main/FirmwareLeakage/com.theswitchbot.switchbot/com.theswitchbot.switchbot.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-487xx/CVE-2024-48787.json
Normal file
25
CVE-2024/CVE-2024-487xx/CVE-2024-48787.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-48787",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-11T20:15:06.407",
|
||||
"lastModified": "2024-10-11T20:15:06.407",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in Revic Optics Revic Ops (us.revic.revicops) 1.12.5 allows a remote attacker to obtain sensitive information via the firmware update process."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://revic.com",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/HankJames/Vul-Reports/blob/main/FirmwareLeakage/us.revic.revicops/us.revic.revicops.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-487xx/CVE-2024-48788.json
Normal file
25
CVE-2024/CVE-2024-487xx/CVE-2024-48788.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-48788",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-11T21:15:07.220",
|
||||
"lastModified": "2024-10-11T21:15:07.220",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in YESCAM (com.yescom.YesCam.zwave) 1.0.2 allows a remote attacker to obtain sensitive information via the firmware update process."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://yescam.com",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/HankJames/Vul-Reports/blob/main/FirmwareLeakage/com.yescam.YesCam.zwave/com.yescam.YesCam.zwave.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-48813",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-11T16:15:13.453",
|
||||
"lastModified": "2024-10-11T16:15:13.453",
|
||||
"lastModified": "2024-10-11T21:36:43.527",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "SQL injection vulnerability in employee-management-system-php-and-mysql-free-download.html taskmatic 1.0 allows a remote attacker to execute arbitrary code via the admin_id parameter of the /update-employee.php component."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitee.com/lssrain/taskmatic/issues/IAUXOL",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-48827",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-11T16:15:13.550",
|
||||
"lastModified": "2024-10-11T16:15:13.550",
|
||||
"lastModified": "2024-10-11T21:36:44.280",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "An issue in sbondCo Watcharr v.1.43.0 allows a remote attacker to execute arbitrary code and escalate privileges via the Change Password function."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-613"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/sbondCo/Watcharr",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-48933",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-09T23:15:11.017",
|
||||
"lastModified": "2024-10-10T12:51:56.987",
|
||||
"lastModified": "2024-10-11T21:36:45.080",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Una vulnerabilidad de Cross Site Scripting (XSS) en LemonLDAP::NG anterior a 2.19.3 permite a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios en la p\u00e1gina de inicio de sesi\u00f3n a trav\u00e9s de un nombre de usuario si userControl se ha configurado con un valor no predeterminado que permite caracteres HTML especiales."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/issues/3232",
|
||||
|
29
CVE-2024/CVE-2024-489xx/CVE-2024-48937.json
Normal file
29
CVE-2024/CVE-2024-489xx/CVE-2024-48937.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2024-48937",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-11T21:15:07.307",
|
||||
"lastModified": "2024-10-11T21:15:07.307",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Znuny before LTS 6.5.1 through 6.5.10 and 7.0.1 through 7.0.16 allows XSS. JavaScript code in the short description of the SLA field in Activity Dialogues is executed."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.znuny.com",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.znuny.org/en/advisories",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.znuny.org/en/advisories/zsa-2024-05",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2024/CVE-2024-489xx/CVE-2024-48938.json
Normal file
29
CVE-2024/CVE-2024-489xx/CVE-2024-48938.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2024-48938",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-11T21:15:07.387",
|
||||
"lastModified": "2024-10-11T21:15:07.387",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Znuny before LTS 6.5.1 through 6.5.10 and 7.0.1 through 7.0.16 allows DoS/ReDos via email. Parsing the content of emails where HTML code is copied from Microsoft Word could lead to high CPU usage and block the parsing process."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.znuny.com",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.znuny.org/en/advisories",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.znuny.org/en/advisories/zsa-2024-04",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-48941",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-10T00:15:02.673",
|
||||
"lastModified": "2024-10-11T19:06:20.467",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-11T21:36:46.327",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.5
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 9.1,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-266"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-48942",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-10T00:15:02.737",
|
||||
"lastModified": "2024-10-11T19:10:20.137",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-11T21:36:47.090",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 9.1,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-799"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-48957",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-10T02:15:02.990",
|
||||
"lastModified": "2024-10-11T16:12:54.243",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-11T21:36:47.930",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-48958",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-10T02:15:03.057",
|
||||
"lastModified": "2024-10-11T16:11:55.487",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-11T21:36:48.687",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-48987",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-11T13:15:16.197",
|
||||
"lastModified": "2024-10-11T13:15:16.197",
|
||||
"lastModified": "2024-10-11T21:36:49.470",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,30 @@
|
||||
"value": "Snipe-IT before 7.0.10 allows remote code execution (associated with cookie serialization) when an attacker knows the APP_KEY. This is exacerbated by .env files, available from the product's repository, that have default APP_KEY values."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.6,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.7,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/snipe/snipe-it/releases/tag/v7.0.10",
|
||||
|
76
README.md
76
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-10-11T20:00:17.844245+00:00
|
||||
2024-10-11T22:00:17.668179+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-10-11T19:57:58.937000+00:00
|
||||
2024-10-11T21:57:49.223000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,39 +33,65 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
265396
|
||||
265417
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `11`
|
||||
Recently added CVEs: `21`
|
||||
|
||||
- [CVE-2024-44157](CVE-2024/CVE-2024-441xx/CVE-2024-44157.json) (`2024-10-11T18:15:08.030`)
|
||||
- [CVE-2024-44807](CVE-2024/CVE-2024-448xx/CVE-2024-44807.json) (`2024-10-11T18:15:08.133`)
|
||||
- [CVE-2024-46532](CVE-2024/CVE-2024-465xx/CVE-2024-46532.json) (`2024-10-11T18:15:08.267`)
|
||||
- [CVE-2024-47331](CVE-2024/CVE-2024-473xx/CVE-2024-47331.json) (`2024-10-11T19:15:09.783`)
|
||||
- [CVE-2024-47353](CVE-2024/CVE-2024-473xx/CVE-2024-47353.json) (`2024-10-11T19:15:10.003`)
|
||||
- [CVE-2024-48020](CVE-2024/CVE-2024-480xx/CVE-2024-48020.json) (`2024-10-11T19:15:10.220`)
|
||||
- [CVE-2024-48033](CVE-2024/CVE-2024-480xx/CVE-2024-48033.json) (`2024-10-11T19:15:10.430`)
|
||||
- [CVE-2024-48040](CVE-2024/CVE-2024-480xx/CVE-2024-48040.json) (`2024-10-11T19:15:10.660`)
|
||||
- [CVE-2024-48041](CVE-2024/CVE-2024-480xx/CVE-2024-48041.json) (`2024-10-11T19:15:10.880`)
|
||||
- [CVE-2024-8912](CVE-2024/CVE-2024-89xx/CVE-2024-8912.json) (`2024-10-11T19:15:11.110`)
|
||||
- [CVE-2024-9539](CVE-2024/CVE-2024-95xx/CVE-2024-9539.json) (`2024-10-11T18:15:08.887`)
|
||||
- [CVE-2024-38365](CVE-2024/CVE-2024-383xx/CVE-2024-38365.json) (`2024-10-11T20:15:04.733`)
|
||||
- [CVE-2024-45184](CVE-2024/CVE-2024-451xx/CVE-2024-45184.json) (`2024-10-11T21:15:06.947`)
|
||||
- [CVE-2024-46468](CVE-2024/CVE-2024-464xx/CVE-2024-46468.json) (`2024-10-11T21:15:07.040`)
|
||||
- [CVE-2024-47884](CVE-2024/CVE-2024-478xx/CVE-2024-47884.json) (`2024-10-11T20:15:04.993`)
|
||||
- [CVE-2024-48768](CVE-2024/CVE-2024-487xx/CVE-2024-48768.json) (`2024-10-11T20:15:05.253`)
|
||||
- [CVE-2024-48769](CVE-2024/CVE-2024-487xx/CVE-2024-48769.json) (`2024-10-11T20:15:05.353`)
|
||||
- [CVE-2024-48770](CVE-2024/CVE-2024-487xx/CVE-2024-48770.json) (`2024-10-11T20:15:05.450`)
|
||||
- [CVE-2024-48771](CVE-2024/CVE-2024-487xx/CVE-2024-48771.json) (`2024-10-11T20:15:05.537`)
|
||||
- [CVE-2024-48772](CVE-2024/CVE-2024-487xx/CVE-2024-48772.json) (`2024-10-11T21:15:07.127`)
|
||||
- [CVE-2024-48773](CVE-2024/CVE-2024-487xx/CVE-2024-48773.json) (`2024-10-11T20:15:05.637`)
|
||||
- [CVE-2024-48774](CVE-2024/CVE-2024-487xx/CVE-2024-48774.json) (`2024-10-11T20:15:05.720`)
|
||||
- [CVE-2024-48775](CVE-2024/CVE-2024-487xx/CVE-2024-48775.json) (`2024-10-11T20:15:05.810`)
|
||||
- [CVE-2024-48776](CVE-2024/CVE-2024-487xx/CVE-2024-48776.json) (`2024-10-11T20:15:05.903`)
|
||||
- [CVE-2024-48777](CVE-2024/CVE-2024-487xx/CVE-2024-48777.json) (`2024-10-11T20:15:05.997`)
|
||||
- [CVE-2024-48778](CVE-2024/CVE-2024-487xx/CVE-2024-48778.json) (`2024-10-11T20:15:06.090`)
|
||||
- [CVE-2024-48784](CVE-2024/CVE-2024-487xx/CVE-2024-48784.json) (`2024-10-11T20:15:06.180`)
|
||||
- [CVE-2024-48786](CVE-2024/CVE-2024-487xx/CVE-2024-48786.json) (`2024-10-11T20:15:06.277`)
|
||||
- [CVE-2024-48787](CVE-2024/CVE-2024-487xx/CVE-2024-48787.json) (`2024-10-11T20:15:06.407`)
|
||||
- [CVE-2024-48788](CVE-2024/CVE-2024-487xx/CVE-2024-48788.json) (`2024-10-11T21:15:07.220`)
|
||||
- [CVE-2024-48937](CVE-2024/CVE-2024-489xx/CVE-2024-48937.json) (`2024-10-11T21:15:07.307`)
|
||||
- [CVE-2024-48938](CVE-2024/CVE-2024-489xx/CVE-2024-48938.json) (`2024-10-11T21:15:07.387`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `9`
|
||||
Recently modified CVEs: `69`
|
||||
|
||||
- [CVE-2024-25108](CVE-2024/CVE-2024-251xx/CVE-2024-25108.json) (`2024-10-11T19:31:20.060`)
|
||||
- [CVE-2024-25122](CVE-2024/CVE-2024-251xx/CVE-2024-25122.json) (`2024-10-11T19:15:51.707`)
|
||||
- [CVE-2024-47161](CVE-2024/CVE-2024-471xx/CVE-2024-47161.json) (`2024-10-11T19:54:07.317`)
|
||||
- [CVE-2024-47948](CVE-2024/CVE-2024-479xx/CVE-2024-47948.json) (`2024-10-11T19:56:44.863`)
|
||||
- [CVE-2024-47949](CVE-2024/CVE-2024-479xx/CVE-2024-47949.json) (`2024-10-11T19:57:06.207`)
|
||||
- [CVE-2024-47950](CVE-2024/CVE-2024-479xx/CVE-2024-47950.json) (`2024-10-11T19:57:16.883`)
|
||||
- [CVE-2024-47951](CVE-2024/CVE-2024-479xx/CVE-2024-47951.json) (`2024-10-11T19:57:58.937`)
|
||||
- [CVE-2024-48941](CVE-2024/CVE-2024-489xx/CVE-2024-48941.json) (`2024-10-11T19:06:20.467`)
|
||||
- [CVE-2024-48942](CVE-2024/CVE-2024-489xx/CVE-2024-48942.json) (`2024-10-11T19:10:20.137`)
|
||||
- [CVE-2023-49298](CVE-2023/CVE-2023-492xx/CVE-2023-49298.json) (`2024-10-11T21:36:18.810`)
|
||||
- [CVE-2023-6273](CVE-2023/CVE-2023-62xx/CVE-2023-6273.json) (`2024-10-11T21:36:21.740`)
|
||||
- [CVE-2024-21534](CVE-2024/CVE-2024-215xx/CVE-2024-21534.json) (`2024-10-11T21:36:23.557`)
|
||||
- [CVE-2024-25110](CVE-2024/CVE-2024-251xx/CVE-2024-25110.json) (`2024-10-11T21:55:24.837`)
|
||||
- [CVE-2024-25825](CVE-2024/CVE-2024-258xx/CVE-2024-25825.json) (`2024-10-11T21:36:24.583`)
|
||||
- [CVE-2024-36051](CVE-2024/CVE-2024-360xx/CVE-2024-36051.json) (`2024-10-11T21:15:06.843`)
|
||||
- [CVE-2024-44414](CVE-2024/CVE-2024-444xx/CVE-2024-44414.json) (`2024-10-11T21:36:31.953`)
|
||||
- [CVE-2024-45316](CVE-2024/CVE-2024-453xx/CVE-2024-45316.json) (`2024-10-11T21:36:32.947`)
|
||||
- [CVE-2024-45519](CVE-2024/CVE-2024-455xx/CVE-2024-45519.json) (`2024-10-11T21:36:33.567`)
|
||||
- [CVE-2024-45746](CVE-2024/CVE-2024-457xx/CVE-2024-45746.json) (`2024-10-11T21:36:34.350`)
|
||||
- [CVE-2024-46088](CVE-2024/CVE-2024-460xx/CVE-2024-46088.json) (`2024-10-11T21:36:35.423`)
|
||||
- [CVE-2024-46307](CVE-2024/CVE-2024-463xx/CVE-2024-46307.json) (`2024-10-11T21:36:36.520`)
|
||||
- [CVE-2024-47553](CVE-2024/CVE-2024-475xx/CVE-2024-47553.json) (`2024-10-11T20:04:08.623`)
|
||||
- [CVE-2024-47562](CVE-2024/CVE-2024-475xx/CVE-2024-47562.json) (`2024-10-11T20:04:35.480`)
|
||||
- [CVE-2024-47563](CVE-2024/CVE-2024-475xx/CVE-2024-47563.json) (`2024-10-11T20:05:05.143`)
|
||||
- [CVE-2024-47565](CVE-2024/CVE-2024-475xx/CVE-2024-47565.json) (`2024-10-11T20:05:59.237`)
|
||||
- [CVE-2024-47975](CVE-2024/CVE-2024-479xx/CVE-2024-47975.json) (`2024-10-11T20:15:05.143`)
|
||||
- [CVE-2024-48813](CVE-2024/CVE-2024-488xx/CVE-2024-48813.json) (`2024-10-11T21:36:43.527`)
|
||||
- [CVE-2024-48827](CVE-2024/CVE-2024-488xx/CVE-2024-48827.json) (`2024-10-11T21:36:44.280`)
|
||||
- [CVE-2024-48933](CVE-2024/CVE-2024-489xx/CVE-2024-48933.json) (`2024-10-11T21:36:45.080`)
|
||||
- [CVE-2024-48941](CVE-2024/CVE-2024-489xx/CVE-2024-48941.json) (`2024-10-11T21:36:46.327`)
|
||||
- [CVE-2024-48942](CVE-2024/CVE-2024-489xx/CVE-2024-48942.json) (`2024-10-11T21:36:47.090`)
|
||||
- [CVE-2024-48957](CVE-2024/CVE-2024-489xx/CVE-2024-48957.json) (`2024-10-11T21:36:47.930`)
|
||||
- [CVE-2024-48958](CVE-2024/CVE-2024-489xx/CVE-2024-48958.json) (`2024-10-11T21:36:48.687`)
|
||||
- [CVE-2024-48987](CVE-2024/CVE-2024-489xx/CVE-2024-48987.json) (`2024-10-11T21:36:49.470`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
195
_state.csv
195
_state.csv
@ -171637,12 +171637,12 @@ CVE-2021-26077,0,0,02e08de0d632c624730c8774c99bd24dfe8606653cfd8990192c284751494
|
||||
CVE-2021-26078,0,0,19d44d301c34559aa7e535a2c95a1914b3f243433e99ae8bc66eab6bb04ad7b2,2022-04-22T16:19:22.313000
|
||||
CVE-2021-26079,0,0,84bc5e8ef644ee056dc6f2a6254f08c1d929a10578f87f9698ccea543ceb6e72,2022-03-30T13:29:49.883000
|
||||
CVE-2021-26080,0,0,b53eb4bc325828bd746bf6750d195c14901ce3ded11c10203a211f6729162c7f,2022-05-05T15:39:14.867000
|
||||
CVE-2021-26081,0,0,c19c185db9e7343ca87033abe4c1c941d2dfefde2e0c23a58b6eab66157b0048,2022-03-30T13:29:50.043000
|
||||
CVE-2021-26081,0,1,f2605b0e8babf40cfb8aa75eff0a48f1738b9e911ffe4e9bd1225e0891bfe89d,2024-10-11T21:35:30.537000
|
||||
CVE-2021-26082,0,0,0dc3d9ccd828c4a8758df38110e688698200af9c0035a3012ace93ee51ae6cbc,2022-03-30T13:29:49.920000
|
||||
CVE-2021-26083,0,0,d3a7d29a3a38b4dc9eddd6c5555b9b2f95a558a4ab11a36abea202d9eea7c32e,2022-03-30T13:29:50.080000
|
||||
CVE-2021-26084,0,0,a1656afe81933b1c8c3923e4e66d77b668a59c557cdd4f7efcbaa6552d4b0288,2023-08-08T14:21:49.707000
|
||||
CVE-2021-26085,0,0,11f3b4177eb8408d0910a3035774b54a0a29f0e5252269407ccd5f909211d083,2023-08-08T14:22:24.967000
|
||||
CVE-2021-26086,0,0,63010973af82898017708d16d6c1ae980079877d2dcc811b57763195401368ed,2022-03-30T13:13:35.317000
|
||||
CVE-2021-26086,0,1,d1c64f9ea76a65a71afdc7a24fcf30f7872c74fc93a4f7f790bb9daa276285fe,2024-10-11T21:35:30.887000
|
||||
CVE-2021-26088,0,0,18b02b5f3440df38db64fa8dfdb7678844c837abccb395a9e4d54f83924742c9,2021-08-02T17:48:37.477000
|
||||
CVE-2021-26089,0,0,8b742860ae453e0ed338e655cc73a13e4754396bfee05f9d1b2f874fc3120824,2022-03-30T15:35:48.173000
|
||||
CVE-2021-26090,0,0,914f3b63c4c051b830b9c7ec11628d2c8542a82ededc67fd3e52331171fbfe56,2021-07-13T19:26:47.023000
|
||||
@ -181117,17 +181117,17 @@ CVE-2021-39089,0,0,b3631fcb9efa1715975936eb680017242d9c2c85b9e6537a4e8f14545ec90
|
||||
CVE-2021-3909,0,0,1e115f91e313d788a54a194be8fc7e2e617bccf9c4eba70061cbfb2bf7cc821d,2022-04-04T14:02:00.640000
|
||||
CVE-2021-39090,0,0,6dea48cc6d7341189ab07f71be44fe69be35dda384985a4517f7566da1c162fb,2024-02-29T13:49:29.390000
|
||||
CVE-2021-3910,0,0,6f123e5522f5e164c5e5565cc72d027942b2b3fe8027fe120501878ff25d6d64,2022-04-04T14:02:40.253000
|
||||
CVE-2021-39109,0,0,4c338d8f6f9383be14956e809acbe947fc202696d4ae66ad2e8709d427c9ea7e,2021-09-10T12:47:12.187000
|
||||
CVE-2021-39109,0,1,ad30f1de8a1037bc2581a0c7934909cc8e6f9bddd5b4bd19fdf1397f078d288b,2024-10-11T21:35:31.727000
|
||||
CVE-2021-3911,0,0,bcc49f392d55f1d62b6dd48e57db75eed6b38bedad23a2b1dcca4cfdd87305b8,2022-04-04T14:03:15.373000
|
||||
CVE-2021-39111,0,0,1527d3f5175db995666bb0ad07cb696e76f9d5ce7dd23360522a46e48f55c346,2022-03-30T13:29:49.233000
|
||||
CVE-2021-39112,0,0,7b1bbb2594fba60f65dbb47e921949c584537d87144a6deb2530909a1e66f270,2022-03-30T13:29:49.803000
|
||||
CVE-2021-39113,0,0,34345939136940038ee3a38274e42d15f7902103a3be7e936e7ad75cba80deb2,2022-03-30T13:29:49.377000
|
||||
CVE-2021-39113,0,1,6302ee6a500ea4646823b0cb69be79dcf823e644db3e9240c12e76bf939e77e6,2024-10-11T21:35:32.623000
|
||||
CVE-2021-39114,0,0,91bb300b928a2e7c1d42863cf149e080ec34fb17bb3f12f372376e10a70a3b3e,2024-10-07T19:36:10.220000
|
||||
CVE-2021-39115,0,0,3edadea3bb79510465312b5ed43b357dd9837c0ef0dbf8d050d2cfbe35d4b421,2022-04-25T18:16:18.227000
|
||||
CVE-2021-39115,0,1,e378f669bd801f2158434b04ae6636baef4f6417e3ee2718dc271975e3e38f63,2024-10-11T21:35:33.387000
|
||||
CVE-2021-39116,0,0,a42315d93d2fd10c554b2c15934daf6b946942b74ba2ba4fbf662199cd5b29b6,2022-03-28T16:18:14.047000
|
||||
CVE-2021-39117,0,0,0f5bdd3a21f39c9eaa09674f49f313b346bf46d979c65d077a542c986dc638e1,2021-09-02T02:41:23.137000
|
||||
CVE-2021-39118,0,0,1dca3fcc868d73a6830344f61fc34a24f260e3fea15472c3de321b7e44e97c44,2024-10-10T16:35:00.827000
|
||||
CVE-2021-39119,0,0,19d82c9ad15e2315e337669b0ea8aa57ac063c6e8f2ab13ad8070419810cfcfb,2022-07-12T17:42:04.277000
|
||||
CVE-2021-39119,0,1,63817b7e629a2e47ad527eb1e85cbb021d8a8b1daede521bdda6605fa998aef8,2024-10-11T21:35:33.657000
|
||||
CVE-2021-3912,0,0,e8c5a6132b4c804f3ef396cb77b6bb9032c86570b20db73e367107d41f114ccb,2022-08-09T14:39:02.117000
|
||||
CVE-2021-39121,0,0,633d5656fffda0e45c49d4bc8d151e90cce078ce60d3d369ea3f30579930e1fe,2022-03-30T13:29:49.280000
|
||||
CVE-2021-39122,0,0,26149ef002d4e9a7fb45aff5028aefd1ed4c77fde5f79f78add3a2655fb29488,2024-10-10T16:35:01.610000
|
||||
@ -181135,8 +181135,8 @@ CVE-2021-39123,0,0,d8ded4795afd17038afe886f1f3897d474faab2d00d931d0d440eecea5b8a
|
||||
CVE-2021-39124,0,0,2b58fd447d3cafa91334dabd9357b993b27ae7c16f1985b8ba8afc2558c4088b,2022-02-24T20:18:49.327000
|
||||
CVE-2021-39125,0,0,4c8f1895e82d1bcd913a7b42e9a1b5d82429da426af796f023bfb884e96ba7ec,2024-10-09T17:35:02.380000
|
||||
CVE-2021-39126,0,0,c5fcfc69aba84d73b9f8c74c936a36d81151cadeddc7fa2ff49085a699b83f32,2022-04-15T15:29:12.737000
|
||||
CVE-2021-39127,0,0,3633d3c73b39c6ff31d41b803d67091de27a5d10e7274dd536bd56bf63949af3,2022-07-12T17:42:04.277000
|
||||
CVE-2021-39128,0,0,3afe35281fb278b542f828cba3a2f1783f1fe9e90ef4145351a04c21b5a2970f,2022-08-01T16:13:08.583000
|
||||
CVE-2021-39127,0,1,f10825757c7a91c2861384a0825f649ff45a47ef04df9b84de3b7b39bd226f8b,2024-10-11T21:35:34.470000
|
||||
CVE-2021-39128,0,1,21d96a6ecb1f49c672c9f3f8005674568ca0013ac0525dcbbbd71ccb8aa5a1e9,2024-10-11T21:35:34.647000
|
||||
CVE-2021-3913,0,0,fc2c037c086845d2beb4d0a45f9c1668f832bc18a64296f540c1af7061ff42c0,2023-11-07T03:38:24.337000
|
||||
CVE-2021-39131,0,0,da8a15d9cd66f4a2b12d48578b405671069a05239664ddbd82b3c34fb9b65287,2023-11-07T03:37:32.110000
|
||||
CVE-2021-39132,0,0,2a5aa910692ca0cf14d592b29d972fa780f6efcc218e69787943a33186984dad,2021-09-08T15:08:51.240000
|
||||
@ -182128,7 +182128,7 @@ CVE-2021-40327,0,0,1a7ad4e4ead25409148fd1aa7fa5fa01966e96fa123c3248ea5da0622f288
|
||||
CVE-2021-40329,0,0,97410d5d837dd9d8314134f4f8ece2887d0625a74fea0b74512addf53499b5ea,2023-11-07T03:38:33.140000
|
||||
CVE-2021-4033,0,0,34839132754f35e32f12e219c804a2f594b5526c44317d5f4b100d1d6568236e,2021-12-13T13:35:21.703000
|
||||
CVE-2021-40330,0,0,1f8b0e9115526d0c0ed89b0fda20903ff997dabdd914aa8445c7ba61caf0054d,2022-11-07T18:37:36.590000
|
||||
CVE-2021-40331,0,0,4d719b599bcb0cca1b22ad0fa4bad7e32f35ba67b979380ec0b4b83bfdd4d457,2023-05-11T14:14:20.707000
|
||||
CVE-2021-40331,0,1,f7e43e6cdb8d5a5ff907af7af042cfff038955e44e686c634c12912c32a8d8d3,2024-10-11T21:35:34.843000
|
||||
CVE-2021-40333,0,0,c6050d68128ac5155b38b31b7c93ea8d4f5eb3506ebffe22f328c8f16486308d,2021-12-07T15:37:13.893000
|
||||
CVE-2021-40334,0,0,387ad412be108dcb2c21119e96c8d8bdd71ff1bdc97be9d0bc16cd19c916fde7,2021-12-08T17:15:04.157000
|
||||
CVE-2021-40335,0,0,1376da3bee3ebb9ad85117c52acf4c319af705a158fc667fe21680a5f7fc5d27,2023-04-19T15:32:25.210000
|
||||
@ -185148,7 +185148,7 @@ CVE-2021-44366,0,0,4a89de015bf9b7a66e29757e88272099f01bc3ab2a1487b2fda1ee75ecbc4
|
||||
CVE-2021-44367,0,0,1605d844c9e5db8cbed196052359abac11c94134854fff4bb6ede41f9e8356dd,2022-10-25T17:48:52.363000
|
||||
CVE-2021-44368,0,0,2516ddc19d7d92c05031263e0499dd0f253e4997e5b6b1bf67822c996d1a4fc8,2022-10-25T17:48:45.527000
|
||||
CVE-2021-44369,0,0,77e43fe84b0fb647ad0044b34f1a3492081c5fcc81df21502084b5726ab51197,2022-10-25T17:46:17.980000
|
||||
CVE-2021-4437,0,0,19ffe5992b59a0cb5c2b35a7d9f3bf92723f41217a8431fd2dbb2eda5dab4ac4,2024-05-17T02:03:39.323000
|
||||
CVE-2021-4437,0,1,4307662943a4ae7dc6e4b15c8ff6026a032a0a6d532bcd6d12567d52960c9c97,2024-10-11T21:57:49.223000
|
||||
CVE-2021-44370,0,0,9af46e11bae28fbadb87226907950e88bba28ecc54af1404cab0e34bc39a5874,2022-10-25T17:46:12.847000
|
||||
CVE-2021-44371,0,0,89b52dc690602cbe68b55a87fbd6d72b883452b896f39fccf20c8c348fec061c,2022-10-25T17:46:01.507000
|
||||
CVE-2021-44372,0,0,ac6a9497f723b5624b15f732d0926312adfa142514ab38927a66f85f0aa11fa4,2022-10-25T17:45:53.307000
|
||||
@ -211692,7 +211692,7 @@ CVE-2022-47933,0,0,8575177dcb264fd6409843e6716e0a03011f111fed8a11eae81d0423338da
|
||||
CVE-2022-47934,0,0,7c3386439e3a91acfaf64f61ee3c54bedd66b5a7dde9a16f5388905bf9bfade4,2022-12-30T22:05:01.683000
|
||||
CVE-2022-47935,0,0,1f1e4e55198665e6591aac6b1530e64bc2ff4cafee98113ef0c766b6b849b00e,2023-06-23T16:10:38.623000
|
||||
CVE-2022-47936,0,0,678dc8449eb9b2e8c9d95aae31d2e8ad19ae792b1f5ba5e5e346d28fdc928f8c,2023-02-22T16:12:32.210000
|
||||
CVE-2022-47937,0,0,636176527665617f3facff8634e8954d2158730f82a85997de2b9511eefce0e0,2024-03-29T10:15:07.963000
|
||||
CVE-2022-47937,0,1,71722ce2ff44817cbdd57ad837a627739bb6a685518083ab1c5334482dee4c2e,2024-10-11T21:35:37.030000
|
||||
CVE-2022-47938,0,0,442c25e602433938a9921e75f8e951b83ddd7027b36d46a901abb14bb5ea6d5b,2023-01-23T18:55:50.117000
|
||||
CVE-2022-47939,0,0,9ba60aa5756ff0c30fab8973f90a56883f8c984d8e5f8b0a23e7965824254a07,2023-05-16T11:03:04.080000
|
||||
CVE-2022-4794,0,0,ee360b4b0c4a7c5112485848378596f0e5c13dfd91e03c2acd2d31e120780c38,2023-11-07T03:58:57.833000
|
||||
@ -213172,7 +213172,7 @@ CVE-2023-0599,0,0,5686bc478536d2af4a08a62d479e1ee372e25dfec1430cab955da4964dc416
|
||||
CVE-2023-0600,0,0,2bafcb5a6bec776bb87d12c308d2035da5f53941826f81d73c1665662d2df686,2023-11-07T04:00:57.287000
|
||||
CVE-2023-0602,0,0,6aac3717fe596372d68440bc08a87dd36208833d7b8e2f47242b7013204f6acc,2023-11-07T04:00:57.607000
|
||||
CVE-2023-0603,0,0,cc5a6788d2b5297ba76742466901b67d92f338059a9666645a54913dbf3a18c9,2023-11-07T04:00:57.990000
|
||||
CVE-2023-0604,0,0,b10fdf6da930ab49b7b09213885b95cf3ad6afbd487ba3baf0ad4efe8cada1b3,2023-11-07T04:00:58.193000
|
||||
CVE-2023-0604,0,1,0d9f2a82827dc6d2ca81f952e3a634b3050c6330c65e02df638fe9104b5a9c17,2024-10-11T21:35:37.363000
|
||||
CVE-2023-0605,0,0,b4cdce19dd771047667c5d8484a8eeac4ae7e1a4284b664abfcf5f22d1dc8c0c,2023-11-07T04:00:58.510000
|
||||
CVE-2023-0606,0,0,4fa9daf3dd97b942d572d5fb0fd253099d191b6c3a2c97768f69ca8e52dcef2a,2023-02-07T21:53:01.957000
|
||||
CVE-2023-0607,0,0,0977f17919dae8453974cff4dbdd91e4a0a498dd1397d080af1e4bd67b4f008f,2023-02-08T15:30:47.177000
|
||||
@ -213762,13 +213762,13 @@ CVE-2023-1218,0,0,ec56e0d68eb6a436785dfbe4c3088933562fd74219e7cf2b39837283335654
|
||||
CVE-2023-1219,0,0,e0b63667958055de2e61621f4b2f1c374c934d4bbe27912990905508743e587a,2023-04-10T20:15:08.343000
|
||||
CVE-2023-1220,0,0,f7505c07dea267c6ec67dd3c3a9a00c14e34e9ea02282e8c58bd4c932382f869,2023-04-10T20:15:08.417000
|
||||
CVE-2023-1221,0,0,f18e400dfc0680f68802e6939c519c06d9d3cf47fb6439707c672de2d8bf79b4,2023-03-11T02:39:03.177000
|
||||
CVE-2023-1222,0,0,a3831cef2b104afe45fcbf75e8599f5265c07baa14741962bba753fb390eaa3b,2023-03-11T02:38:47.470000
|
||||
CVE-2023-1222,0,1,190d0da05e93e72aeeebe8898c45012067f66d519dabac52f25cd78ef25d0d0e,2024-10-11T21:35:37.550000
|
||||
CVE-2023-1223,0,0,948ee91eada12d7d20e5b2b1fb298c9e614c851df4f101d24d278c07dc3fa4af,2023-03-11T02:38:37.183000
|
||||
CVE-2023-1224,0,0,83965c642d0895e8d67a8e92ac147fd77b821460f719ee5d81ea3eb1c738667b,2023-03-11T02:38:23.370000
|
||||
CVE-2023-1225,0,0,80c20890a23559bdc5b7fa970d8463f90a69a2c7075b827a51af790020086d1a,2023-03-11T02:38:08.387000
|
||||
CVE-2023-1226,0,0,2ad6b159af45931c53837c91fb91c88edce6b6520870bfe20222d782b9f37bc5,2023-03-11T02:37:54.820000
|
||||
CVE-2023-1227,0,0,5f56cc29a2b284cf3e350a0eae643c83571ac110f0b2e0fbf03592dcffb2b1c1,2023-03-11T02:37:32.080000
|
||||
CVE-2023-1228,0,0,41f4190ab3907addc1aada2a918bc6e878bd253fd272831a8a6149644d34a9b7,2023-03-11T02:34:27.697000
|
||||
CVE-2023-1227,0,1,4416a112bf31ba24906f018a763efd36bf80aa24e3ee9364c649f0ff50d3638f,2024-10-11T21:35:38.673000
|
||||
CVE-2023-1228,0,1,7b874778a82a1d186215c231190a0d7f83dfcce09bc598f78de98453f1e71add,2024-10-11T21:35:39.530000
|
||||
CVE-2023-1229,0,0,ed1fd60ca5ec5b93f7801dfb7d3d96a6422b1a1787005fc60fbf302b8ab00bd5,2023-03-11T02:34:10.100000
|
||||
CVE-2023-1230,0,0,52ed8ce3f4ef971e55f7a79489bbce2bcc33eba8d0ed341a746b46665534af4a,2023-03-11T02:33:48.303000
|
||||
CVE-2023-1231,0,0,6a027ec06b6b49d26db5893b9039be668cba34b98b18258318e070862afed236,2023-03-10T20:44:11.770000
|
||||
@ -215077,8 +215077,8 @@ CVE-2023-20818,0,0,45ae32b47377e91ea351a73468b41994cd1d3b4ec51c18c8865d863ed741c
|
||||
CVE-2023-20819,0,0,c056b87b2ebed256b5107aaf5ce311d220de95b3b3db7b11c4effe7a4eed0352,2024-09-21T16:35:01.573000
|
||||
CVE-2023-2082,0,0,24dcd898b1f3567259f4f6aad9d57c28cbb421cc1896ebbe2df775b7cf6101c6,2023-11-07T04:11:54.467000
|
||||
CVE-2023-20820,0,0,b8ce0f691521cb188b31615a2914ada5344f69549b9bff1e5f48aff8b60d954f,2023-09-07T19:14:49.727000
|
||||
CVE-2023-20821,0,0,56097556eb1ad331e0b189d13a8b1a23a2b3597ff14666e0ee3d23e7f183ab98,2023-09-07T19:14:35.620000
|
||||
CVE-2023-20822,0,0,3b47b6e37180258fa596ce8a0087c8d042ef6b8e78e2889f5bb02fa551389bd3,2023-09-07T19:14:27.697000
|
||||
CVE-2023-20821,0,1,8327befa080929697855725e0adfa9c4c52e91db2435d8ca8eb0b8f8f0fbf0a0,2024-10-11T21:35:40.520000
|
||||
CVE-2023-20822,0,1,1f6ec27ffdb5a941621c6474350c0681bf9aba6107f5e57c20c3f9cc636b94a7,2024-10-11T21:35:40.800000
|
||||
CVE-2023-20823,0,0,e5030abbdc1b76a1fdf724e78a79e9447430af00d8598a10a707b12f48ab94c7,2023-09-07T19:06:39.267000
|
||||
CVE-2023-20824,0,0,6caacf9d3f8a58027c0dab9caf4b9b264fdfa1d70dcd710a95edcc7d198dbed4,2023-09-07T19:06:55.563000
|
||||
CVE-2023-20825,0,0,3b7e714e9925156ab37c943a82248f5bb6cc462ec9ffd9479518f0eaa72d4ea8,2023-09-07T19:14:16.880000
|
||||
@ -215442,7 +215442,7 @@ CVE-2023-21162,0,0,53a8ac5e4c08c742da489aa4a1930121d0240090d407c260527f1733a5605
|
||||
CVE-2023-21163,0,0,e1bf515351b1761cdba7776dedb7ad81d82fdaad5ca8377172cbcfcc0240c5cf,2023-12-22T01:15:08.300000
|
||||
CVE-2023-21164,0,0,01b382fffb5e5d9b3a30dac5d37cea570048c5928ecd40106e3efa2b15b6c909,2023-12-22T01:15:08.367000
|
||||
CVE-2023-21165,0,0,49665acf34e44b9a5db54449c0fd8ec4121198343175bb379f5ff7e055e44d83,2024-08-26T18:35:01.380000
|
||||
CVE-2023-21166,0,0,c1534cec306f9fa0c721b8473b0a23285b1565d6ed8a55331c8871a3ffa16f7d,2023-12-22T01:15:08.430000
|
||||
CVE-2023-21166,0,1,3563bd6cc87d7d516a51625b438f198e468235d9fd72ca0f7d445b9c8fd9e2ad,2024-10-11T21:35:42.090000
|
||||
CVE-2023-21167,0,0,abcd952fac072d0bc1118cbcd9d5548df8e9eed8603f390785dfcfd7e5f1b301,2023-07-06T00:56:31.923000
|
||||
CVE-2023-21168,0,0,45f187edb3d6a556377088ef681aead14d96b9c1cf96ab06f4e5d771a7fe9d68,2023-06-30T18:55:53.630000
|
||||
CVE-2023-21169,0,0,f6358e462e45f570c6fc6c58f703809142b2c766eb204766c16b52b514101016,2023-06-30T17:50:07.150000
|
||||
@ -219277,7 +219277,7 @@ CVE-2023-25750,0,0,32abd5ac7462a7988d6e952dc7c341500f225339c8d9ee8d8c2a9abdd6d7a
|
||||
CVE-2023-25751,0,0,b31def6c0ae5f8e6acffbcb949c9aca0323d89757962bc728dec0dfd07a8f461,2023-06-08T17:14:09.333000
|
||||
CVE-2023-25752,0,0,966be40d80116dc1505f15ee1fa5c94414ca60ef8a285f44f4a4ef96c38ebf29,2023-06-09T18:40:27.807000
|
||||
CVE-2023-25753,0,0,72a2591941e2999ca50ef0826984c1251d9ec22ad17ff67848b12641800a3db4,2023-10-25T17:20:20.830000
|
||||
CVE-2023-25754,0,0,67d382ae20f179948a879a7487097e5a4e610f3cc304f79748d62178f6b262d3,2023-05-12T01:28:48.043000
|
||||
CVE-2023-25754,0,1,52c608b894b14a11459a026abb3e19096de7d0e9506d1f689baa0ac85162faa5,2024-10-11T21:35:43.887000
|
||||
CVE-2023-25755,0,0,2ad8e62512bcab645070be69ed3379e39a05671be85d7b1db198e6bfe107a77f,2023-04-18T17:13:39.970000
|
||||
CVE-2023-25756,0,0,6a076ace74fd00dbb1e543f39927cb4206204e317efa9a6079bf1da5f8304909,2023-12-21T22:15:11.410000
|
||||
CVE-2023-25757,0,0,98490eda1b235a7210d98228f2fa4211cc2f99377e1606feea486f97b0901931,2023-11-07T04:09:10.673000
|
||||
@ -221449,7 +221449,7 @@ CVE-2023-28426,0,0,b0d610d812fdd44aac0d33b8712f468c0ca967ab4b29253831843a96e926e
|
||||
CVE-2023-28427,0,0,a016c28b60c6a524149fffa0a1eae3ceca42ecca3dcd534a4fbf7ef3979b3de4,2023-05-30T06:16:28.550000
|
||||
CVE-2023-28428,0,0,2ff2cf1bce95574395d36e93f1db103830769a43ec6c30927a5bab2fccafef6d,2023-03-24T18:35:15.180000
|
||||
CVE-2023-28429,0,0,fed65bde8b338976aee55f6348d2088e5faa1d87fefbc398b2fdb1e170b398e6,2023-03-23T14:08:30.080000
|
||||
CVE-2023-2843,0,0,1e5ea8676b0de723f3313b924444f2fe84753972ee83d381f9d1f3df302fb961,2023-11-07T04:13:25.340000
|
||||
CVE-2023-2843,0,1,d0c7c231b30766b222d2acfca6b09d89318ffa117ec061cef7af25fa01a8a01b,2024-10-11T21:35:48.967000
|
||||
CVE-2023-28430,0,0,59dc391beaf71ecea58fbe0afc3339d914d596f3da9a1d5d3e39837719a0f1d4,2023-04-03T18:38:13.673000
|
||||
CVE-2023-28431,0,0,f63b509ce3469ae05fc1eead07f88c18ce879e4b4075f298c6a7ae2158a5172b,2023-11-07T04:10:35.300000
|
||||
CVE-2023-28432,0,0,1333b4c2290f0e39ee15c53a791a545a639f60f0d21af5471a2d916ec629ab86,2024-06-27T19:30:51.627000
|
||||
@ -221917,7 +221917,7 @@ CVE-2023-28932,0,0,c27edb7177ffb1e28b222f4c9bea001b1ab4e7dabfe7ec30c9d9613d07224
|
||||
CVE-2023-28933,0,0,5ce46109e79bea8882816ddff82fb199f9ef887c387f06ca945e17126aa66f4e,2023-06-16T03:57:30.010000
|
||||
CVE-2023-28934,0,0,4eab8436dac264b2200990ccb31618c962abf371fe7021d35f56b20df7a84412,2023-08-10T03:49:58.650000
|
||||
CVE-2023-28935,0,0,63d693fd9b62dae4e8403e6669a45bfd676f7312996626e62115ea5b187457dc,2023-11-07T04:10:58.823000
|
||||
CVE-2023-28936,0,0,e3902d009a5044eb7658c42f69eadf603aeaac553b8dcfd8f3ae096639647206,2023-05-22T14:52:42.507000
|
||||
CVE-2023-28936,0,1,999ac9569f4890af2f8cee442eed571b392d2129167cc54e6520c79e6509ca4b,2024-10-11T21:35:47.317000
|
||||
CVE-2023-28937,0,0,49df2c40f793aeab1c1d58cb1954b3d606331d90ad9ced192296130e2c071e4d,2023-06-13T10:15:10.047000
|
||||
CVE-2023-28938,0,0,92210f1f66544f8435cbf427094b0b1ab5ebdd85d822693044e20f1239f1b230,2023-11-07T04:10:58.907000
|
||||
CVE-2023-2894,0,0,6ca89d7459b7b40bb60063165aea0f40ebea74dd437e97c3894273316c03d57b,2023-11-07T04:13:29.760000
|
||||
@ -222004,7 +222004,7 @@ CVE-2023-29029,0,0,5e6e421b33e3e5d9f7cdafb6e12d91df76bc2403d9fc3881c476b9a5cf1f1
|
||||
CVE-2023-2903,0,0,aaea51c0dae990d6dd39141bdd8d94364592da662815c4bbc7055b31bbbee04b,2024-05-17T02:23:21.450000
|
||||
CVE-2023-29030,0,0,e9ef9db54073b4abc8f90733a96671c703c39318b5fe8ad16e23b723f424d5b6,2023-12-20T02:50:13.797000
|
||||
CVE-2023-29031,0,0,6e315e892fd8b32306a207bfcf1ba1a412c9898dcf2cac17776b91000c43d392,2023-12-20T02:52:31.047000
|
||||
CVE-2023-29032,0,0,4b7296c51e4f5aa3e5c99c0c7bf6c40eb9c445fdd877d429aacae75a15835074,2023-05-22T14:54:43.230000
|
||||
CVE-2023-29032,0,1,65652d5939932a58db7c7c31cd4a8c6c8e6eabb81d228696f6adf8ed599048d4,2024-10-11T21:35:47.677000
|
||||
CVE-2023-29033,0,0,4401012f4d52ad7f28d1c206cb19cc0edfb2aae23b2113336a308cca14438a87,2023-11-07T04:11:00.917000
|
||||
CVE-2023-29034,0,0,63627d7e3c954dba61d5a731250c84dbbab4add009f084967b5b07d39c5c695b,2023-11-07T04:11:01.140000
|
||||
CVE-2023-29035,0,0,8ee8460d02c99ad18c91b9fc9d76d40231da08fe8377ffa72b072fbd8445ef2d,2023-11-07T04:11:01.440000
|
||||
@ -222182,7 +222182,7 @@ CVE-2023-29242,0,0,b61b510d1f58b7f0d5a338add68b354218b1c2308336d527a49331a9e2d27
|
||||
CVE-2023-29243,0,0,8725de0b480e293af5f5e87a983092ba629b47c9b3a192ae1fceec5139111ba1,2023-11-07T04:11:08.053000
|
||||
CVE-2023-29244,0,0,fd105b38b3d195c238b5968b40ac7f34e4f4dc15ba8cf11199615ee5ac2d2d49,2024-01-30T15:17:47.337000
|
||||
CVE-2023-29245,0,0,36663441326991b70a4a638f7835ab4b96bdc7534da1afdff5817a73607c1710,2024-09-20T11:15:12.980000
|
||||
CVE-2023-29246,0,0,66dc05c67373539e60513d12bb8d5ea5cbab81162146e8ad3ad6542b8a2951e0,2023-05-22T14:55:15.440000
|
||||
CVE-2023-29246,0,1,6bb7192469082356b1b64076cedd0dcdf9100de4e8ffeab251065485a62fdeed,2024-10-11T21:35:48.157000
|
||||
CVE-2023-29247,0,0,bb0e3571a900cf515f84f932527ebb6318ef77da20d3db85fc0074ca4d75811e,2023-05-11T23:24:54.837000
|
||||
CVE-2023-2925,0,0,6dfd7b78d36e2a725703c314ea807457e2096a4bbbc04df212c7a1d27031a788,2024-05-17T02:23:22.303000
|
||||
CVE-2023-29255,0,0,53fc91dd29a24d530b08bb237aab4984395bd1091218cb2be1e1c61150e68b45,2023-05-11T15:15:11.510000
|
||||
@ -223143,7 +223143,7 @@ CVE-2023-30677,0,0,15b84e220c20ea5b9c5ab958d09338f2a41be1fd2eaa676181325b1bba1ce
|
||||
CVE-2023-30678,0,0,3180130b2ed001edd24ab6ea36d292accf5ada0caaa839819a8019a3801d2b53,2023-11-07T04:13:53.220000
|
||||
CVE-2023-30679,0,0,824006b3a5533c0b45896acf6d107e7102da99ff822ab30a78bfc55516b50948,2023-11-07T04:13:53.373000
|
||||
CVE-2023-3068,0,0,aadb93be9e92cad2116a19c0c6e455a065a2c859817861a18dad816a63b1b9fb,2024-05-17T02:27:14.860000
|
||||
CVE-2023-30680,0,0,3b1636221f6d2e1bb6d88f0b4433ad48be681b133f59045753b44a2db5b8ce1d,2023-11-07T04:13:53.580000
|
||||
CVE-2023-30680,0,1,285d56401f6a07bb921b0d12b0c7e6f43b8f47e4a3e74c093a47dd127d07e321,2024-10-11T21:35:49.307000
|
||||
CVE-2023-30681,0,0,cf6bb0cb53b5344d5fadf0cef7e6b4b3caa76c081889d43d8d2cf22af5eceea0,2023-11-07T04:13:53.780000
|
||||
CVE-2023-30682,0,0,c220bbd4c2fb9521bf7598802a94e2da50eef3c727ad588e10f7c49461aa0af7,2023-11-07T04:13:53.993000
|
||||
CVE-2023-30683,0,0,b4d64ed2cdc4f31fe7ab7ab5a66ef5840da9712e12fcccdd44f20cac7fb08440,2023-11-07T04:13:54.210000
|
||||
@ -223155,7 +223155,7 @@ CVE-2023-30688,0,0,c53151afb5102f3217216532637be1d695ccda2c0b7c2290a68d22084ae1f
|
||||
CVE-2023-30689,0,0,443ba1b08e22c6d35e8db568880e90ee09c679a9b16b8334cb0474df6c175bb3,2023-11-07T04:13:55.497000
|
||||
CVE-2023-3069,0,0,941bf12ae0941b8065c6b0a088eb76a6ba68b4ed708ecd123ceeccfd378cafe8,2023-06-08T17:43:09.440000
|
||||
CVE-2023-30690,0,0,590cc00fc998ed3a3fb346a031e3cb388e44a83e13e3b1943f763131e52c1172,2023-11-07T04:13:55.683000
|
||||
CVE-2023-30691,0,0,f959a3d7646b772ced829b280a5fb3951fbf54514832e59425c5da05d45b28f5,2023-11-07T04:13:55.870000
|
||||
CVE-2023-30691,0,1,e113dbae411ed96797e7c892d0028302a96e366e16b1ec6d8b0402ad2e59b765,2024-10-11T21:35:50.390000
|
||||
CVE-2023-30692,0,0,912c54bc037de3c3810d7245f595df8f5d89fe264b85f3b6fcdf861b5a7a12b2,2023-11-07T04:13:56.050000
|
||||
CVE-2023-30693,0,0,fff97ba59de8d74af7ee96f8c4cdc0ad746e4d49a08891c6d1de3f7bd1fca4de,2023-11-07T04:13:56.233000
|
||||
CVE-2023-30694,0,0,e142299bb0ffa8115187ba86e35c661564aa62bb32dcc5036727d4394b0f27ad,2023-11-07T04:13:56.410000
|
||||
@ -223466,7 +223466,7 @@ CVE-2023-31047,0,0,799c27446196896a2155b4ff736d0e4c98fa4d3a17dd14303b0af7537b3e6
|
||||
CVE-2023-31048,0,0,085198888c668c9620ecdd2cd8b8ba13b5e86067bb31f7fd09ae2d0369478942,2024-10-09T14:35:02.490000
|
||||
CVE-2023-3105,0,0,be99bcf9045a615beffe2a865c2ddddc0783f9f4b672f8174022afca2422f44d,2023-11-07T04:17:55.157000
|
||||
CVE-2023-31056,0,0,4f2fef484ed386abb0f005ab89606a773da4d5a08e2c27112d7f1b7e48a4a1e7,2023-04-29T03:06:14.197000
|
||||
CVE-2023-31058,0,0,ca7da33276284c78442c38f8f57df235ece18c6aca5dbfb6dd049ebe8205ac85,2023-05-27T00:48:58.773000
|
||||
CVE-2023-31058,0,1,ade590edc32ab8e9e54c5074b1bf85ac7bb23f853e8f68d9180b8009050e898b,2024-10-11T21:35:51.460000
|
||||
CVE-2023-31059,0,0,e14e22e75ebb3d0b9350c447e3c85cb104031b5ae3d37a3a2618a4acbf316129,2023-05-02T18:17:24.350000
|
||||
CVE-2023-3106,0,0,62a56ae616a68416c0b18a9575f7bc7ccd3f822655fb78901478f3605c5ced22,2024-02-15T16:03:47.757000
|
||||
CVE-2023-31060,0,0,6f9406e888f485a404f4f8338945073a4e198040211d3022cd3b4f5043d25253,2023-05-02T18:17:13.847000
|
||||
@ -223506,13 +223506,13 @@ CVE-2023-31093,0,0,06983497186135ed5ecfd0305eb5f3e74038e29e3b5223942fd4c72c40255
|
||||
CVE-2023-31094,0,0,3fac97ef9e52114096168bfe7d0ff558d3e5b9fe8637a2dfd95141c8b30bc890,2023-08-23T16:45:37.677000
|
||||
CVE-2023-31095,0,0,98e0f47eba8da250ce26faae77d30e0457e0c45653a31789fae2ad954aab38e8,2024-01-05T16:11:09.767000
|
||||
CVE-2023-31096,0,0,a698767f9322d993190762ac896ddab6d6251e7fd40e72d56e0e836c0e80b816,2023-10-18T20:27:16.947000
|
||||
CVE-2023-31098,0,0,7762b7eafd22172ea8485d8980463d4841a6c3b6a880a4a18cc3ad17d161a68c,2023-05-31T13:55:07.513000
|
||||
CVE-2023-31098,0,1,14eedebe497b043a040aa43f7c4ed51804f7d428c8495f30e932783aa2450352,2024-10-11T21:35:51.640000
|
||||
CVE-2023-31099,0,0,316dca47a441bcbff49b7c01682f0edc834d3579c34610a0d65d4f7cacad7083,2023-05-10T03:53:41.293000
|
||||
CVE-2023-3110,0,0,b29dcd6052905acdf5c62021f47c31535233f1a817dcc0ff8104fbe3e3af0bcc,2024-09-25T16:15:07.760000
|
||||
CVE-2023-31100,0,0,52728b9e8ab26aa70b0ab55039f170907999be466f5e8b560dabc4fb805a29bd,2024-02-01T02:30:22.687000
|
||||
CVE-2023-31101,0,0,77f4e544f11b5e739b1479f6e19b6ccd2456975f67b8561aaa2c58229b75968c,2023-05-27T02:26:38.467000
|
||||
CVE-2023-31102,0,0,5080e71e8f917eeae0dd70983299a81d3f1547c01aad2307d315c1afe001c7a1,2024-09-06T14:35:01.717000
|
||||
CVE-2023-31103,0,0,6ebfd0cb1ac0bdf08f28442094dae38ea2ac9a0d7b487e908849ac1cf56c0fa7,2023-05-27T02:19:27.643000
|
||||
CVE-2023-31103,0,1,809bab36002ef9b1b43b1344077ff28861780b3f6764aa2ad6f32709c882354d,2024-10-11T21:35:51.893000
|
||||
CVE-2023-3111,0,0,88f6d634aaf66868e24baf1dc9c03254a9f0153d8412ca9a1ccbb2e70bf88d7f,2023-11-07T04:17:55.503000
|
||||
CVE-2023-31114,0,0,a2299262529dc59f23001a6935a0db69324f1ad31cfb90d0de3beb6d9fb6507e,2023-06-14T13:43:45.193000
|
||||
CVE-2023-31115,0,0,d960eaeb6dbc21cc73b425e3c0785949186cf6ed6abc9c699693915783165158,2023-06-14T14:20:47.187000
|
||||
@ -223606,7 +223606,7 @@ CVE-2023-31199,0,0,8d7b060eb02713c69989cbab19e9c758ca7c5f6e9ad083c0785dec0d89e5b
|
||||
CVE-2023-3120,0,0,e6895dafe5ff48a74fbb7623bd5f31e99c0aef7c6fb472b6941fbae2bac1c09c,2024-05-17T02:27:17.227000
|
||||
CVE-2023-31200,0,0,b08cfdcc73010ea2925f7f53dcef9219870f8ec80fbf062295b9a648e5236ed2,2023-06-16T14:52:35.283000
|
||||
CVE-2023-31203,0,0,e20ee84ba3753fe4459b52304841db8ed359cfcb0631867aff4534b827d7bfa7,2023-11-21T17:54:07.040000
|
||||
CVE-2023-31206,0,0,a8d72bdc931be244e474c0480916a79eccf4e243c7050b62fa92dd3a089b14e7,2023-05-31T01:25:33.760000
|
||||
CVE-2023-31206,0,1,25e23c13d9831f5998b463b3d2aa2e355f26213068d19caded25aa093420307f,2024-10-11T21:35:52.067000
|
||||
CVE-2023-31207,0,0,547125180cffd0c493ff8787c644b028bd8f18938978f39df407f0a197af0c90,2024-07-23T19:37:16.630000
|
||||
CVE-2023-31208,0,0,95c19457e4d84f3e922d42dc0c6a1550abef2b702e7ba80d1256849ed16f675d,2024-07-23T19:37:16.630000
|
||||
CVE-2023-31209,0,0,b0d163613db3908a63b52fa8aa8684ce97e73a6c6a29472adafd5e4272934788,2024-08-26T10:15:05.083000
|
||||
@ -223757,7 +223757,7 @@ CVE-2023-31449,0,0,3451165bd3ed8d2b6ebe5cc0c3e992059167a53b54f44250d1b558afc42bf
|
||||
CVE-2023-3145,0,0,e4ac08615370eaad33b01386af0172683b8135a7c7e8e0c71f01de69ce50b6a6,2024-05-17T02:27:18.220000
|
||||
CVE-2023-31450,0,0,9e30c992e822d2b68d74d2a8d194f06939e7fdea2fdbdba0e28f76e634fabb13,2023-08-16T12:15:13.460000
|
||||
CVE-2023-31452,0,0,d5233b326dfebf1aec68f02d9fcb6fa1d3bc948b779e40e75772432c36647f0e,2023-08-22T19:16:36.270000
|
||||
CVE-2023-31453,0,0,8c5439c77f5ac70ee7eeca548be6217fdbe67dec5d5b151033909ded4b7f80e5,2023-05-27T01:20:20.410000
|
||||
CVE-2023-31453,0,1,c6756f366ebb475e0422a45205045f225ff03979cfbd40f3f36a03e749cdbc5b,2024-10-11T21:35:52.737000
|
||||
CVE-2023-31454,0,0,65a5c55e0a52a03fb203761aff4e9cd84d1993242224cb54891dd692fb352f80,2024-10-09T18:35:03.897000
|
||||
CVE-2023-31455,0,0,4ccdc62b7d1bc8d7540e6ef563302b5c558316c03f4bb563f04dedd76ece2b0a,2023-12-29T18:37:53.267000
|
||||
CVE-2023-31456,0,0,aaf00595412e051e28f410bb113696538d36695c90fe7a624e06e913e84f09ce,2024-07-17T13:34:20.520000
|
||||
@ -225478,7 +225478,7 @@ CVE-2023-33640,0,0,a2ff624980a241771ec12a877d3503b1209ebab90cc610023c86eb505cac8
|
||||
CVE-2023-33641,0,0,79acf4986f162843691a2b72219151aedf9f149b939d0fc17611dde1c9a5e617,2023-11-07T04:15:21.130000
|
||||
CVE-2023-33642,0,0,72b9c73f13d1abd4404a501a8474d5713a59bbef4a8fe8f0a7849d08f30cf2fd,2023-11-07T04:15:22.083000
|
||||
CVE-2023-33643,0,0,de44da91865bfc44b8599d934b6c5739d22b12e6b538ec5135b80002e7940729,2023-11-07T04:15:23.020000
|
||||
CVE-2023-3365,0,0,658a6717b6ab36667d4a952df4b60c65760e95919c59a50fae5c6c68a12a55a3,2023-11-07T04:18:36.100000
|
||||
CVE-2023-3365,0,1,9c07765ab05709912a68cc259248efc80762531e78ea9b93f41c1cc59dd0cbfe,2024-10-11T21:36:07.410000
|
||||
CVE-2023-33651,0,0,6013bcfe52325757972c756accb5b125c0547eb5545111d63a0789e765f38e90,2023-06-16T16:54:38.667000
|
||||
CVE-2023-33652,0,0,a348c6d06327b6b71d67feb8e70e66deef6cab842010d68767b531e7ed4979a1,2023-06-14T17:25:10.197000
|
||||
CVE-2023-33653,0,0,9b40b09562a22f1c2ca910844c079849ae19d457706a26766d423f43689de011,2023-06-14T17:34:14.437000
|
||||
@ -227570,7 +227570,7 @@ CVE-2023-36650,0,0,be2b71d0d66a16f4c8cd42bdd01be878ce44425525cc93932948793e6c348
|
||||
CVE-2023-36651,0,0,4c1d4adb66cef0eadf148d8f50fc37885bcdb5efb639fc520f869744083f2ddc,2023-12-14T00:12:41.860000
|
||||
CVE-2023-36652,0,0,a2787e5cf53250440611d8133a893e8bdc348b5f2a2db5baf59eb736b7f10dcc,2023-12-13T20:42:54.737000
|
||||
CVE-2023-36654,0,0,b36d6d9f752a5213a6216ce0e4a7d21c2d423b3688fdb6327d6815617611a9b9,2023-12-13T20:51:12.487000
|
||||
CVE-2023-36655,0,0,a89556c902d15f663602ab929246af6ace62c5cd68ff043e1877eb1a1c793186,2023-12-12T16:39:02.243000
|
||||
CVE-2023-36655,0,1,d2d3d645c8a9a2e3b128eb9289690d64304c238f075c4d61d993b422619b22d8,2024-10-11T21:35:56.680000
|
||||
CVE-2023-36656,0,0,735dddcf8910a0866717b6bc8754faf47c7f17448c2036bba3347e6902cc1fc9,2023-07-27T03:41:14.130000
|
||||
CVE-2023-36657,0,0,2588fa2bf8db4eaaf48523a93c92753dbdc20026b1953339c176632f28d2f7ad,2023-09-19T13:09:27.470000
|
||||
CVE-2023-36658,0,0,bdd858a44d8b4e44abb8aef9864e3311714227cf7ece7dea327d0dec04f1ce3c,2023-10-03T15:48:36.427000
|
||||
@ -228300,7 +228300,7 @@ CVE-2023-37569,0,0,be20d0356f2c200800e9a1ff4189db4c145199bfef9933e7503391fe9a342
|
||||
CVE-2023-3757,0,0,1b1f64474dd054615952b29305a209bce29590d122224127f40785e8609d0c45,2024-05-17T02:27:45.957000
|
||||
CVE-2023-37570,0,0,7e289a5a4950965acdd1fd46726f7973787c6dd68d8dab611608d873ea7d2cfb,2023-08-10T18:04:45.327000
|
||||
CVE-2023-37571,0,0,f68e1617c611ca2617b892341a9747e5e63386893a6ded3b46d66fd735976dd0,2024-02-05T18:26:05.757000
|
||||
CVE-2023-37572,0,0,280c7bcd03136a465411f3eccb8bc327a7cad9aec603472f40d1beb0bc76a237,2024-01-25T20:15:35.540000
|
||||
CVE-2023-37572,0,1,5f6e1a2a4673c3299770822fa529112309ba2b5cf7de0bb0f88188f7f34f2d7d,2024-10-11T21:35:59.080000
|
||||
CVE-2023-37573,0,0,243d404588957d91a8c506aa6999786f555598af6bdcb95c82c48037f6a1eeb4,2024-04-09T21:15:12.433000
|
||||
CVE-2023-37574,0,0,83aa5f2ffe12a03679f8cb62a3b0802b5e54dcad0965e9e4263299d7b703d4a3,2024-04-09T21:15:12.523000
|
||||
CVE-2023-37575,0,0,62cd2e14a8fc6c354397e472566b7eef8d6561dc2667760caf079d12d107c6d0,2024-04-09T21:15:12.613000
|
||||
@ -232030,7 +232030,7 @@ CVE-2023-4236,0,0,924b94bd8f0a77971953a5c369ed9c0dcd2eabf4ae855e4fac2037d561c7a8
|
||||
CVE-2023-42361,0,0,980df72722edeff41fc9b24f077dd47835d868523d73c5daeeb0e6e47ec3cab8,2023-11-15T15:36:46.743000
|
||||
CVE-2023-42362,0,0,8b4a6f0f5fcef1b3349470e98c5950e51de404839b937ab34f5ae50f377d54a8,2023-09-19T19:34:03.287000
|
||||
CVE-2023-42363,0,0,180f5da82e3a5c686901ab47f072f1c9e480db17de45e8e75faad3cc96fcbb65,2023-11-30T05:06:49.523000
|
||||
CVE-2023-42364,0,0,db3ea44df92b5966860e81b8cb44bfd7893db544d20f70cc01c6b1c57a525f3f,2023-11-30T05:07:10.827000
|
||||
CVE-2023-42364,0,1,c97fb0877e6ed1a03f89f750771c88d1dd91299c500b1da32c4b44394c8cb2d4,2024-10-11T21:36:08.877000
|
||||
CVE-2023-42365,0,0,b406aedf5cff3690cb0cdced542258b1116fc3739fd082c9556fafea525dcb3b,2023-11-30T05:08:08.770000
|
||||
CVE-2023-42366,0,0,96aa4788059f0643e44792bf7c219cbf02f22946e327a1c617c1427bb3d00c10,2023-11-30T05:08:23.197000
|
||||
CVE-2023-4237,0,0,6cf38aec3bd975284a4d86b8e8e2c267e312c6daf36ee9d95139bc404b921d75,2023-12-01T12:15:07.670000
|
||||
@ -232324,7 +232324,7 @@ CVE-2023-42737,0,0,16bcd45da01433936a127815c41414104fe3f0b940c80d39f9b5a90966e13
|
||||
CVE-2023-42738,0,0,4f4f4f4689ddc0d711dfb1b46996240f8f4fb2d2fed0cbfb0206977ae4a55c17,2023-12-07T16:57:39.837000
|
||||
CVE-2023-42739,0,0,30127b11627b71cbfcc86d1cdb8d285936fe67fcf167f85cd24855089fc0814c,2023-12-07T17:01:41.877000
|
||||
CVE-2023-4274,0,0,8f05f67d174babedda688e67da482c480c7c4b0cf7965a77cd94338132a5cf6d,2023-11-07T04:22:23.610000
|
||||
CVE-2023-42740,0,0,fd80d5b5b1a1ae2f7d8aca555a7691ab4ddb852698639a8eebc66bed4ce65050,2023-12-07T17:08:37.267000
|
||||
CVE-2023-42740,0,1,baf2360aaca910646c7828da5e118e0a2e1cf714b297d951c4a6bf5b7c883a4c,2024-10-11T21:36:10.030000
|
||||
CVE-2023-42741,0,0,6bb339d296bc2b39b0c777989be986cbbb6048bd95584f8743ec496c58805851,2023-12-07T17:48:25.020000
|
||||
CVE-2023-42742,0,0,c26f687aff16d89e309eb82ebfd27427342a6f4b5867fa588d2835cbbeb6fd9c,2023-12-07T17:49:35.703000
|
||||
CVE-2023-42743,0,0,04a69723be349a43806488743a38ddc8014435d25282060f69044cb9eeb00940,2023-12-07T18:34:08.913000
|
||||
@ -233245,7 +233245,7 @@ CVE-2023-4411,0,0,6e725a6355592906aa726b75cfa40dd898dfaa8ce2088ab50158f3f470f027
|
||||
CVE-2023-44110,0,0,6da985b2f0aa8cfb90e8416c0becac5ed4cfc8fa06677e5f03d25c0397429276,2023-10-14T02:19:27.097000
|
||||
CVE-2023-44111,0,0,c0a3e4a60f05f147f7c03f67d5539be0a49fe5e2188c17a95f51935484f99a11,2023-10-16T14:16:11.993000
|
||||
CVE-2023-44112,0,0,9044646509c0033586ef4f69542d901e20ffe7a1a37decb64e02006441036d0c,2024-09-03T20:35:03.557000
|
||||
CVE-2023-44113,0,0,92eceff5133860799bf3cc17863e171f23292cd5506efc657e986d14244904f4,2023-12-11T16:15:48.920000
|
||||
CVE-2023-44113,0,1,90e5ac936d2728795f2e61db5baaf27e79031e66315c049726f9bd7cd5ab4b8d,2024-10-11T21:36:10.877000
|
||||
CVE-2023-44114,0,0,7028f58ee4eb36fe2acab86791256944bcb21b37de97bb881857379a64abfd36,2023-10-13T20:31:20.313000
|
||||
CVE-2023-44115,0,0,b7f7869cb4a1913e0115e8ca5c0b52d2e9d66ae077a332b8410d6be19488c6a6,2024-09-04T19:35:06.837000
|
||||
CVE-2023-44116,0,0,7395e52236a43197316234ce58b9e618c72fd59ec56d0c273504aa334a55e762,2023-10-15T01:49:29.117000
|
||||
@ -235107,7 +235107,7 @@ CVE-2023-46814,0,0,3cecb5f50c237020a17039ffce04adce16d590a4b77f65a0bce23076a5def
|
||||
CVE-2023-46815,0,0,73a8d2839a8f681dd5b4deacb0da64bfc7a2eb89a272b7c57e16fb00a27289cd,2023-11-07T20:46:40.287000
|
||||
CVE-2023-46816,0,0,457f8b7969b679493dd123ee82eb2b848a16353b6b57ef98524a216099740713,2023-11-07T20:47:44.823000
|
||||
CVE-2023-46817,0,0,c622a0bab2dc85efdb3e6cac535b776216f5068d508925e89ceecc35669aaa4c,2024-09-06T14:35:06.507000
|
||||
CVE-2023-46818,0,0,f234f9e3a48282f81299c3ff6ed7b1a1d071eb6e821f675508ca8b30a7e7e109,2023-12-13T00:15:07.247000
|
||||
CVE-2023-46818,0,1,01d2269ae0b39e41d52ff5a3fc19bc5832b5c9076b28f167560a99959d469982,2024-10-11T21:36:11.727000
|
||||
CVE-2023-46819,0,0,b9144c8b43b7e50be02f0a7adb87559b3a81cc8b960f11a9c9b61dc6bebac590,2024-09-04T19:35:08.043000
|
||||
CVE-2023-4682,0,0,c1c0d3bcf2f406c6bcb06b0a440260f9dabf84e5ad23fa025bbfa655e8c647fb,2023-09-05T16:24:54.687000
|
||||
CVE-2023-46820,0,0,aa393ad58ea962d201742c7c0922f5354d3e88c5c877ebf040d42c8c1854c0a0,2023-12-06T17:29:13.157000
|
||||
@ -235148,7 +235148,7 @@ CVE-2023-4687,0,0,354f0681027854970a7f0f0533bc3851ddac446f09d1cbaeefe24a425dff4d
|
||||
CVE-2023-46870,0,0,ff18f06b6c4d39998df5f876e3bd0b3d5c3cee594f43c4568fd49a4689d51e0b,2024-08-20T14:35:03.573000
|
||||
CVE-2023-46871,0,0,cc2b23a2a7c0d7957b39709ec8c2aa588579f2c75f2b7fdd7c7f3d3e75ed4b10,2023-12-12T20:19:53.150000
|
||||
CVE-2023-4688,0,0,985476e8d06e20422659b9d794536014224e53fcc3c17d4243bfab5155c29d50,2023-09-06T20:45:12.027000
|
||||
CVE-2023-46886,0,0,b203c4f31661b6385b16f32ae599f556bf0f1ac3bf629827b03deea7d1699a90,2023-12-05T13:02:07.903000
|
||||
CVE-2023-46886,0,1,287bc75cd1a4dbdaf029391d872f9209d3e2fcda816a0f76342e84c456b66b78,2024-10-11T21:36:12.497000
|
||||
CVE-2023-46887,0,0,ec61bd4cc7b9fd5e65f023c914218af7187f8f9230837439b51c8f659a316456,2023-12-05T14:19:33.893000
|
||||
CVE-2023-46889,0,0,b744010e75c78d2ed0acbd5fd12013a3a7a7541db52eae97c00d7dfb974ac8c9,2024-01-31T16:36:18.020000
|
||||
CVE-2023-4689,0,0,d4a10840539c0269a31b628af9b7dce36883b587501ab931d1721e7b7accc0db,2023-11-21T01:03:38.423000
|
||||
@ -235216,7 +235216,7 @@ CVE-2023-47007,0,0,49f0b3a68efe7b594b8345cc617f72bfd332aea920a34e101aa6c03ece0a2
|
||||
CVE-2023-47008,0,0,e0e309a0a65b9836e68b5ee4cbcb4b9a7e5b6f69ec3a43f0327be97180cbd7d3,2024-01-19T19:15:08.330000
|
||||
CVE-2023-4701,0,0,43ec92fa3ed154d03a458e8422915dc45577247db51777e6112aadb19888d225,2023-11-07T04:22:51.240000
|
||||
CVE-2023-47014,0,0,682694dbf9d4101908e947c17cbd72e7a531426890a47cd106e30625b893fb0c,2023-11-29T02:29:03.067000
|
||||
CVE-2023-47016,0,0,022a565e849362a53cce692564370d7c82a841cb97a3025eed716d8a174e0047,2023-11-29T18:03:48.853000
|
||||
CVE-2023-47016,0,1,cfdc54048014ecbbc02e010d9a7968e2e23f1f8be3787ed93b31bbd7f4a81378,2024-10-11T21:36:13.327000
|
||||
CVE-2023-4702,0,0,e06fb0bf4f4c3d1004eb791d9898a0243b850391adc4c30c6d753399916e9846,2023-11-30T09:15:07.560000
|
||||
CVE-2023-47020,0,0,acb130981e53142228088038570ba24a86616788f4df890f5097a82dd3ab0cde,2024-02-15T03:21:44.417000
|
||||
CVE-2023-47022,0,0,8586e193a772040e8837f9502b0e732b51d694bea22906ffdd22e1a077e4dc8a,2024-02-13T18:14:14.547000
|
||||
@ -235875,7 +235875,7 @@ CVE-2023-4802,0,0,2c1584c4a67b39a645b83631e146797b804919cf6a93945659db703ae55b43
|
||||
CVE-2023-48020,0,0,b777d49d7fd809eed124fea08e8c5e9b16e23f27e9f36139f2a67d2db2a1fade,2023-11-17T21:27:51.187000
|
||||
CVE-2023-48021,0,0,ab9cdbb8af138e4e4cf831360195e597283273a30fb3493658cce65a93e2b463,2023-11-18T03:27:32.867000
|
||||
CVE-2023-48022,0,0,3dccd5ecde72b45982bfeb1b905e4a8f189ed6e6fb8c69446ba7ff664a946b57,2024-08-02T22:15:27.193000
|
||||
CVE-2023-48023,0,0,aff18d87b5001b1c597fc13419d45d5ac5309f6a5de4074a51027abf1b3c8874,2024-08-02T22:15:27.340000
|
||||
CVE-2023-48023,0,1,7ec214c77f08ab7c0eac2ab3c9df7279d18c47bca98e16c5db36d13bb6a11227,2024-10-11T21:36:14.160000
|
||||
CVE-2023-48024,0,0,2269b4005a674f6940ddab7d9b7ebe254d967dce741388b14c84dd975cafd8bc,2023-11-25T02:23:37.257000
|
||||
CVE-2023-48025,0,0,e61bc975fbdaf1e268790a874eba9c57bb1a52c2023b1e744d5f48fa89d23fe9,2023-11-25T01:21:30.640000
|
||||
CVE-2023-48028,0,0,0e1ab4ac014a228cdd818faede93333dad036fb11ec48e54aea7fa9ba944cfce,2023-11-25T02:14:32.110000
|
||||
@ -236615,7 +236615,7 @@ CVE-2023-4888,0,0,f48596506d19a7921bde66b5add4c77321ae9d54b2d07f9e6a73048dc47a7e
|
||||
CVE-2023-48880,0,0,6fcad3f26f96ba1e4ef3a9f940f69a7dd8cf91117756f880f777dc4d4a1faa15,2023-12-05T16:38:50.380000
|
||||
CVE-2023-48881,0,0,0cbaaa1bbb47c786686a6f28b74d3087ab100225b35b19dfb7423e939140bda0,2023-12-05T16:41:54.707000
|
||||
CVE-2023-48882,0,0,cf2277c9dd01257361265dee40dae857ff900487abeed00d8050a6134e220cd9,2023-12-05T16:45:50.737000
|
||||
CVE-2023-48886,0,0,40e7b2171bf655d4eaaafc758adfb6d1dc6cf44b07326f9921a16c820ea9865d,2023-12-06T20:20:06.700000
|
||||
CVE-2023-48886,0,1,85f38ea88b1786d7e9c637c001bdc895a50475bf9aa28ee01776925a8f6f6a88,2024-10-11T21:36:15.233000
|
||||
CVE-2023-48887,0,0,c6554ca244deb7459ceb1d3266c93be31dece4df8d670851d804b3d33fa3817e,2023-12-06T20:14:56.987000
|
||||
CVE-2023-4889,0,0,866a7413fc17b996e93601ed6be945e8f6df9735df666d1f5924384ca7eb7187,2023-11-21T20:28:48.533000
|
||||
CVE-2023-48893,0,0,5043ec8dc2f1768fadeb39d099a00fdee7291c475c685e34a7d4cf80fe0e4a4c,2023-12-31T00:15:44.330000
|
||||
@ -236641,7 +236641,7 @@ CVE-2023-48930,0,0,75a0241af933fadab2c43d5cc139ef80206ba0235f92ea9a2565c6f4f8111
|
||||
CVE-2023-48938,0,0,98f86836ae03a10653170ec5f755b7030d988d78ee243ac1c19e2cbcc7f939f9,2024-04-23T22:15:06.927000
|
||||
CVE-2023-48939,0,0,7e8e8e24234caf6f99bf5bc93e04f2c01c41c03d784bca00c0a0f7f832eba137,2024-04-23T22:15:06.983000
|
||||
CVE-2023-48940,0,0,8e6111884988523f8d5c0aa8bad3ee1d6ab7188e50766b79b1214ce2a8a1c188,2023-12-11T19:43:51.563000
|
||||
CVE-2023-48945,0,0,22f2942ccc6e2b32f23e5b550984b26d0a1bf1df5969c01a52e94990a966f07d,2023-12-05T18:33:48.857000
|
||||
CVE-2023-48945,0,1,acda4f43439f6df637808c06acf1601a3ffffe2ad32251eff961f925975b58b9,2024-10-11T21:36:15.990000
|
||||
CVE-2023-48946,0,0,247eb573f3f05884bec23b778366cb9717fb143e49c04ea7c1a2c333c7aba39b,2023-11-30T22:10:42.030000
|
||||
CVE-2023-48947,0,0,b4d4bd23acb2c8ea68903fb835be8a564702d163029d2e79b5a29499fc98595e,2023-11-30T22:10:49.160000
|
||||
CVE-2023-48948,0,0,fe86ec75533e6aa04f7202e4f111f6d88937587cf5f7b360a54961bce2ba0b66,2023-11-30T22:10:35.630000
|
||||
@ -236678,12 +236678,12 @@ CVE-2023-4902,0,0,1c630014e1f492dc36454d008b93afa0e3495205ff31887e9f7ebd51443239
|
||||
CVE-2023-49028,0,0,fe8fbc5b935280df3e15ff9fbeb139a04b1c5cf428503dc526722e75e3d5e71d,2023-12-13T21:21:46.707000
|
||||
CVE-2023-49029,0,0,99d8eae69fbef2f03c1f635775f53f7d1f003e752878865563c9f1d3e969e543,2023-12-01T20:09:11.957000
|
||||
CVE-2023-4903,0,0,3729bb8198936fea24f72d8f038013b2ff557d3961ef545c8ec32fa2509aad08,2024-01-31T17:15:17.143000
|
||||
CVE-2023-49030,0,0,161162baeab0ace49a87223347116d37e6813a3718821dc72ac83187ce1b3b39,2023-12-13T21:22:09.877000
|
||||
CVE-2023-49030,0,1,cd8137c64604484e5020c8bc92f0d951de1f0a86b5e66b9aaee6957ffa71fa5d,2024-10-11T21:36:16.747000
|
||||
CVE-2023-49032,0,0,f2436d8fab621b1e5a4298543c17126757707cbdaf0da85067715221827cf7d9,2024-01-02T16:31:49.530000
|
||||
CVE-2023-49034,0,0,816645fd7298eed3a2dc63a90d9993dc418475d46d396a4cdeacf4e6f6e778b0,2024-08-29T20:35:37.610000
|
||||
CVE-2023-49038,0,0,33dd36bcea8b024203bc56e9dc0761eb263e731cd037e94d5db258eb90d03006,2024-02-06T16:35:06.483000
|
||||
CVE-2023-4904,0,0,22f0e4ebb1c236a8f4a4174844bf38ca3c3fa7a301baac2a19ad8b895b968130,2024-01-31T17:15:17.417000
|
||||
CVE-2023-49040,0,0,bff653a8d43264473976fccd5a1707295dc84f512c2f76ecd910d80fc1aeefe3,2023-12-01T20:06:11.127000
|
||||
CVE-2023-49040,0,1,22c5aad951ced3f840bf68f97c393d061c14a18365206d352749bf9760be009d,2024-10-11T21:36:17.520000
|
||||
CVE-2023-49042,0,0,9c37d5f1658e04d1a7b873d677708eccedcf69c1a7bbe8a3b05538749713db3f,2023-12-01T20:05:35.273000
|
||||
CVE-2023-49043,0,0,bab12967da04292d10677236191241bb7add573656e588d03a27f1280e988ac6,2023-12-01T02:29:56.040000
|
||||
CVE-2023-49044,0,0,01083404d6542db84d7b1c5fab7dd537e073ed1545ee545b3aae6273dffc3b69,2023-12-01T04:01:05.950000
|
||||
@ -236908,7 +236908,7 @@ CVE-2023-49294,0,0,026c94a6497c707a206c55f90329c31b76e5e8c660ac2ff03e3a53eba6193
|
||||
CVE-2023-49295,0,0,389dcf49dd7093fa28aff07e2fe2daf1b3c94c4d2638dbc0252077cad1cc0e05,2024-02-21T03:15:08.410000
|
||||
CVE-2023-49296,0,0,844860b1330c53f29812313bc41439d8487e47a9ce79b27712557e3e8c46844f,2023-12-19T15:43:13.307000
|
||||
CVE-2023-49297,0,0,80d1ebecc869e8c71166893b32eeac85f1386c27bb00b2290640ae2caf953e1c,2023-12-16T02:15:07.680000
|
||||
CVE-2023-49298,0,0,aa849e15e26e4ce69d7b1aabc72060dde2cd470700d01a170fe51677adb48fa6,2024-03-18T22:15:07.413000
|
||||
CVE-2023-49298,0,1,d7a4880415067d8c3b446d6797a646fb49f10851b1b279e63e476c96d8034c48,2024-10-11T21:36:18.810000
|
||||
CVE-2023-49299,0,0,ada605fd2b85a30076978a2cea5959fe25630ec90635c2c18a60a96527d236ac,2024-08-26T21:35:02.680000
|
||||
CVE-2023-4930,0,0,42c54f6cdb9052f80c7b88bfe87d4a5ab8a2f899d5d2a07a6f5fa45df3083af1,2023-11-14T15:33:54.183000
|
||||
CVE-2023-4931,0,0,b5b8d32009dd89996d453ce70e2aed589da6480c3033a7e9ca915c81e23407de,2023-12-01T19:06:42.203000
|
||||
@ -240378,7 +240378,7 @@ CVE-2023-6269,0,0,0bfa35c6ca8316c74fb5cc127597f80feb0289558fe11e8a4f742ed223ba9b
|
||||
CVE-2023-6270,0,0,d00bdd52db567626fb03ea16d06bfd12d7d4f39059f0134b911e740fab0af4ee,2024-06-27T13:15:54.233000
|
||||
CVE-2023-6271,0,0,717e6a717943e060a373ce872007f05c269902f7664a73fe4041c85411200802,2024-01-08T17:31:37.350000
|
||||
CVE-2023-6272,0,0,b3d74ad4c919a040d83c5a29b80ccb7c9a4c62b82fbdaa1b46a6c93e4299c5de,2023-12-22T18:34:10.253000
|
||||
CVE-2023-6273,0,0,bfe15761d0e2bb921ed3c0d0c2c36c03a1656966fe638d3401638d2cebdb2618,2023-12-12T18:36:55.433000
|
||||
CVE-2023-6273,0,1,75256f527525717ce8c04d11fd8686d46ab3a61f90753d911e4db38480b9c305,2024-10-11T21:36:21.740000
|
||||
CVE-2023-6274,0,0,4f530dd28ac44051dca761bb89d18362b76653c5f1bd1f7f9a0b0b7fc6974e6b,2024-05-17T02:33:36.680000
|
||||
CVE-2023-6275,0,0,1df4a2d506677de951981566edaf40c947c0fb87ae017e4f3b204b0bc3f9bb45,2024-05-17T02:33:36.787000
|
||||
CVE-2023-6276,0,0,24c3dc4dd47e004cfc2d394ab4aa6804146bc09890750cb25a878e0ee9940b41,2024-05-17T02:33:36.890000
|
||||
@ -244248,7 +244248,7 @@ CVE-2024-21530,0,0,1cd9789884a1ce72dfeb1a860d1947cabd2b932563c54dc2308d1b3820957
|
||||
CVE-2024-21531,0,0,556b4244c50c270222e18b4d703d3656d63fc81c95a1cab5391fb75a68df3d26,2024-10-04T13:51:25.567000
|
||||
CVE-2024-21532,0,0,a24d27f47c5298fab706ab72282873a260fc61d5e510f460d432a2b7b9c38bac,2024-10-10T12:57:21.987000
|
||||
CVE-2024-21533,0,0,b6d94b5290ee8a666e06ea3154c21a82f3a037332835b4cbc04bf2409f97ee11,2024-10-10T12:57:21.987000
|
||||
CVE-2024-21534,0,0,e9a2fb876451236a63c5658427831aeaad2a3c760a252645fbb31cc597f5996c,2024-10-11T13:15:15.667000
|
||||
CVE-2024-21534,0,1,7edd88deeb19b219ecc2b90a3976d54902d3b9e86766a1e32c231ec19796b637,2024-10-11T21:36:23.557000
|
||||
CVE-2024-2154,0,0,ab5f0b39bb38e5c25606bad964d563e0edda059ff34db22b99ca2b3670b021ff,2024-05-17T02:38:04.970000
|
||||
CVE-2024-21545,0,0,614ed901d7a98204a096c9331020afa9e58729de6a0c722ccca7898674ea9a4d,2024-09-26T13:32:02.803000
|
||||
CVE-2024-2155,0,0,499612150b3a1be829ef430bb3388eb54a55d7bb52271f37f2a76ceb8af6c56f,2024-05-17T02:38:05.063000
|
||||
@ -246645,10 +246645,10 @@ CVE-2024-25102,0,0,133268ffc984c42d69b4bf70a18b06bfa00e6f9b1a6b7979b0b7751daa3af
|
||||
CVE-2024-25103,0,0,bc16d0a18e5413d69ce0cfa7d659612fbf4d905c382e53747393112e47b23dfa,2024-09-23T12:15:03.290000
|
||||
CVE-2024-25106,0,0,69f4a5df8f9163ba3cc00a57d78f06705015dcf6a2341378521404b16f38f37b,2024-02-15T18:53:44.707000
|
||||
CVE-2024-25107,0,0,2f7af5f36b252a42eb30d1f8972da5732bf420e322522d60adcccf7f4819b86a,2024-02-15T18:52:25.613000
|
||||
CVE-2024-25108,0,1,ea86aeb46132d1436758572e531bfe9d096e1704148614890b5ee2b811e5154b,2024-10-11T19:31:20.060000
|
||||
CVE-2024-25108,0,0,ea86aeb46132d1436758572e531bfe9d096e1704148614890b5ee2b811e5154b,2024-10-11T19:31:20.060000
|
||||
CVE-2024-25109,0,0,c41f7e7a8b0352e7db5bd3620b2014d3afb64c0a666c2f8d504ee8ea7a10e96b,2024-09-05T13:18:39.687000
|
||||
CVE-2024-2511,0,0,e85e202ac0d96bf0165ada9b88f1fcf9a6fbf365413ed057ebdfaf286537c656,2024-05-03T13:15:21.930000
|
||||
CVE-2024-25110,0,0,2ad123d5329d817891e8dc3bae18c16385186216cc417eebddd2d60d9619e7fe,2024-02-12T20:39:09.773000
|
||||
CVE-2024-25110,0,1,d26cbb0693a4d6c53e7081518beb8a84b92d2cd8bf57244ea03bf261dee5ab3f,2024-10-11T21:55:24.837000
|
||||
CVE-2024-25111,0,0,260c08f765b0b23211db8fb3020f7ae46891432e3f36f885aebdb89bc620ed80,2024-06-10T18:15:27.443000
|
||||
CVE-2024-25112,0,0,ffe546871aece44048a968db11eadb8d7bb7f19f007a9d8c711115c5f085f021,2024-02-13T14:01:40.577000
|
||||
CVE-2024-25113,0,0,857a8a6c04923b8f13653e0c0fed4f0ffff75cf90412dfa840a70a6bc18a3ae7,2024-02-17T22:15:46.660000
|
||||
@ -246660,7 +246660,7 @@ CVE-2024-25118,0,0,5a5d87ec39b0263d610d121aff303a2a887b58fc2c2bb0cb82e45c6c39356
|
||||
CVE-2024-25119,0,0,e00eb90c0e2b5f9ee441104e8a867af994d0038db78cdde9e1777dc983844f96,2024-02-14T13:59:35.580000
|
||||
CVE-2024-25120,0,0,22ab495202da9a816053ab6e8432de07c3fd99eeec113249a77e5d6da094b853,2024-02-14T13:59:35.580000
|
||||
CVE-2024-25121,0,0,b0d544a773d2eed790454c3855c0d500355e4c566f69865a021ff361b9749a9b,2024-02-14T13:59:35.580000
|
||||
CVE-2024-25122,0,1,e365e28bb2f56caaa3ef9b80a1cc325b36fe31e51625a47d99ef7167fe1c5bf2,2024-10-11T19:15:51.707000
|
||||
CVE-2024-25122,0,0,e365e28bb2f56caaa3ef9b80a1cc325b36fe31e51625a47d99ef7167fe1c5bf2,2024-10-11T19:15:51.707000
|
||||
CVE-2024-25123,0,0,d91338db3ed95b8913dc378067e1f32dfba4b3ec82603f1ac01d187651acb75a,2024-02-16T13:38:00.047000
|
||||
CVE-2024-25124,0,0,d570849c8f0f5f2638ea1dc3ea0947e3bcb6425f6af78c4802a7a9fc8debac63,2024-02-22T19:07:27.197000
|
||||
CVE-2024-25125,0,0,e8d3e2301ada9acbf67deee26992ba22f050532192238294c0e8c4b124dd2615,2024-02-14T13:59:35.580000
|
||||
@ -247093,7 +247093,7 @@ CVE-2024-25808,0,0,c8b3842916e7c06900b08f9fd62594e0f61e1918f91fddba1f15f9656576b
|
||||
CVE-2024-2581,0,0,41246128334c0147c39b69b67a7b8a68f9df4e44ae695bfb23a0c0e11cadb9ca,2024-05-17T02:38:20.983000
|
||||
CVE-2024-25811,0,0,19975e07ecf1fabf59b175c7c29029eca5183606ae6164f55f4361c17d565764,2024-08-04T12:35:05.137000
|
||||
CVE-2024-25817,0,0,594e7944f467d2705810e71e76846a873167e65fb8715f24384d52ab7508e60a,2024-08-08T21:35:05.550000
|
||||
CVE-2024-25825,0,0,d8471d9f859d921205640c4475c10e3c70e3ce8e50306ca5fe30ffebb185a757,2024-10-10T12:51:56.987000
|
||||
CVE-2024-25825,0,1,6969a65ff32df517f01853ea9bac1c1dcdc285c7b5d509f520f6310a7f1d76ea,2024-10-11T21:36:24.583000
|
||||
CVE-2024-25828,0,0,bb5f11d12010040c46347f1b01567677eceaf6416fc48feec74112280779705c,2024-08-19T21:35:05.027000
|
||||
CVE-2024-2583,0,0,bad6d25a4e56375c530c1d9887ed4d49edf53513d5bb806a8b8436b2ac73bef6,2024-08-01T13:49:48.777000
|
||||
CVE-2024-25830,0,0,71ac0259693b1e35aa4a4da1b197118a1a7a2d7250e15b0af091ae1d4d2bab0f,2024-08-13T19:35:05.710000
|
||||
@ -254656,7 +254656,7 @@ CVE-2024-36048,0,0,5a5a6da2bab77110717de4a83cf2fd38c948b3573f3cee73605d8d6a5534f
|
||||
CVE-2024-36049,0,0,16195e94e554c9cc2e1c5fb6b057cc3b79bc050cdc5b42034b6e0554be23efca,2024-08-26T16:35:09.153000
|
||||
CVE-2024-3605,0,0,905473bba2f4b1f833e3696e0eb3a1556acdfbc79f67c22a9c6f82f499950cc7,2024-07-15T17:12:36.967000
|
||||
CVE-2024-36050,0,0,c50ac6e5d9529aacb1e334d114a2f6f4418d441c20a736ae9e48551abc3029b2,2024-05-22T16:15:10.777000
|
||||
CVE-2024-36051,0,0,5e2f599fa240a78163a70dc813cd791d8cbea53ca2a64bdc9b23f86599d83e21,2024-10-10T13:15:14.187000
|
||||
CVE-2024-36051,0,1,06185d929bcef5b726eebc24c04947ea1ae42bf1c0763bf9aef66e711c162238,2024-10-11T21:15:06.843000
|
||||
CVE-2024-36052,0,0,083dfa6efec8c8b05eaad2f1b8dc2dc652acb748c2d4396b452843d815f40c28,2024-08-20T15:35:18.753000
|
||||
CVE-2024-36053,0,0,2b26adadb1e10190c0e2e5708c64683c631febead0f4dd9529189a0425d50810,2024-07-03T02:02:43.043000
|
||||
CVE-2024-36054,0,0,573acf3e9153a838a6bd1e03653f71db08e33e3b8f5328f3fb3cc099e632a6e2,2024-08-19T19:35:07.003000
|
||||
@ -256274,6 +256274,7 @@ CVE-2024-38360,0,0,62fab844597ca879d16a5f3bb413c82dd98eca8f8a8f42f5a5f8581c90bd1
|
||||
CVE-2024-38361,0,0,f382ebba7fc984c6e86107cb94ceaca8dedca184f9f6123ffedcd7094bb741b0,2024-06-21T11:22:01.687000
|
||||
CVE-2024-38363,0,0,4ba5b34714c88cf806284a26eaf8261d70f03ee7392713aa1b260c885e54e80f,2024-07-09T18:19:14.047000
|
||||
CVE-2024-38364,0,0,2279d9d422aa31a74e603806d16ace0153ff248c4a5fbe8796ad93e25cd4d53d,2024-06-26T12:44:29.693000
|
||||
CVE-2024-38365,1,1,e2d69c29dbd1ce8181392b9491fee732216a7aff80840aa22fe10aaaace6d17a,2024-10-11T20:15:04.733000
|
||||
CVE-2024-38366,0,0,da439faf5ff6d8122b959647a313a26dc3be85c3289475c82985c89c575c78f2,2024-09-18T15:22:55.753000
|
||||
CVE-2024-38367,0,0,ef3b5309f2c711755f4bc1341d871d57dcb340a68f69961e0160dca4bb6dc7ac,2024-09-18T15:16:27.733000
|
||||
CVE-2024-38368,0,0,2f8143f8d00d367476eddebe8b3c5595b38d7c9548f03fa31bf0b2530474a056,2024-09-18T15:23:00.507000
|
||||
@ -259956,7 +259957,7 @@ CVE-2024-44151,0,0,54a719217bc8b8ee4e32503231faaae29cd72902e5e2fca3e1446643fb218
|
||||
CVE-2024-44152,0,0,b3dfe3e6aad4927c4120819b90ad93e4589e439a4acd3f9652fbd2503123fc62,2024-09-24T15:55:06.100000
|
||||
CVE-2024-44153,0,0,b4cd2fe3eed07a503bba11676bf795575e23a0692dcefb729ec0053f448cf187,2024-09-24T16:19:32.593000
|
||||
CVE-2024-44154,0,0,52420e716bdaf0c7fece3d5feef7b52e02f0f1fb32372b8f2d13dde79a13206d,2024-09-24T16:16:39.947000
|
||||
CVE-2024-44157,1,1,a28989cfff089fdc5c64928ba655211032121c3d0b825d46ac43db40236fab2c,2024-10-11T18:15:08.030000
|
||||
CVE-2024-44157,0,0,a28989cfff089fdc5c64928ba655211032121c3d0b825d46ac43db40236fab2c,2024-10-11T18:15:08.030000
|
||||
CVE-2024-44158,0,0,9d7e2fa5cd578734634a4ad7f07935a9c77533bae7cbf9b59ee2c2f082d12524,2024-09-24T15:50:25.083000
|
||||
CVE-2024-44160,0,0,111306ea6d5f4cd614ad1f97ebba8b9ebd1a48c26d38996100c4c5802f2b5bd6,2024-09-20T12:31:20.110000
|
||||
CVE-2024-44161,0,0,7c1aadaed2bcadc65ac3b4a310e13a88d0da6d821bc96d21705d61516e8bb478,2024-09-26T13:56:51.110000
|
||||
@ -260034,7 +260035,7 @@ CVE-2024-4441,0,0,ac0779300bad801b6c25a6a11418596c16f707acafd8505b85edf037d6de9d
|
||||
CVE-2024-44410,0,0,6c57a9bf372d97a29932dc411b42421130ab7221dd0f704bdc840e2d9eac456c,2024-09-10T19:00:29.527000
|
||||
CVE-2024-44411,0,0,598fa2c90c1fcb2e76dc9bbaf4d1053ce6ab00db76daa7f3174af16794b4965c,2024-09-10T14:35:06.690000
|
||||
CVE-2024-44413,0,0,98007b7f42bd9dd2b67db2d4d0a20a162d5bedc49eb5cd3230e65681cbeadef2,2024-10-11T17:15:03.790000
|
||||
CVE-2024-44414,0,0,39bbf18b52ff5a48ec3b4c759e29fd689c05910ff0a09f7c07e099969f878cdb,2024-10-11T17:15:03.880000
|
||||
CVE-2024-44414,0,1,a7b9ca1dd549414d7968613c2793c071af3ecd185bb74b28866d8c4b42541001,2024-10-11T21:36:31.953000
|
||||
CVE-2024-44415,0,0,ad755f39731002ab77617b43d94507b284d67e3ad7779c6cd8a779e287ac63c0,2024-10-11T17:15:03.967000
|
||||
CVE-2024-4442,0,0,9c1eda6fa3435f8c4d08218c5481ff931fe1467531bf106c3f2c1021638ef5a8,2024-05-21T12:37:59.687000
|
||||
CVE-2024-4443,0,0,844cc6ae76fc91b0a9b2c7cc836e7c7382ecc4895f252d76709d68a22aac17cb,2024-05-22T12:46:53.887000
|
||||
@ -260139,7 +260140,7 @@ CVE-2024-44796,0,0,2932c57e25f9e35c74ce36b128d46acb3231e7bd610d9d98769e690ee695d
|
||||
CVE-2024-44797,0,0,045624a726ff5e1b8db30d7af17e11b2221f6b7d4bdca61ca2fe7511b3f6e808,2024-09-06T22:27:16.177000
|
||||
CVE-2024-44798,0,0,52c8ec12ad71f918e4568fe73d09fd21beb43d7a2334844f4fb68f12913c2757,2024-09-16T13:19:38.393000
|
||||
CVE-2024-4480,0,0,046ee1f51773a8c0ac4a6c81ddd78c147b0ada165d730df7b9b8d85146172347,2024-06-17T12:42:04.623000
|
||||
CVE-2024-44807,1,1,810975d199c77bf9871ff49351113ab0bf71110290c932592e13dd1febb2d984,2024-10-11T18:15:08.133000
|
||||
CVE-2024-44807,0,0,810975d199c77bf9871ff49351113ab0bf71110290c932592e13dd1febb2d984,2024-10-11T18:15:08.133000
|
||||
CVE-2024-44808,0,0,53ee5f88da9d15aa3ffd696fc5703153aab92dbb219aaccde4dc48186abdbb68,2024-09-05T12:53:21.110000
|
||||
CVE-2024-44809,0,0,424c650381a963ac60378eaa5a7cd36fd86829e33f994f3d0227dc416ec44e82,2024-09-04T14:35:12.707000
|
||||
CVE-2024-4481,0,0,c2852db732c7c65c13524ea22e5406663429c55dff3bfe0d5bbffa299f48bbd3,2024-05-14T16:11:39.510000
|
||||
@ -260417,6 +260418,7 @@ CVE-2024-4518,0,0,64c3b6e6e74f6d9fd929463119875b686279109a997143c5dd3ad8e2c1af13
|
||||
CVE-2024-45180,0,0,08348c7b1382a66372a71879585bc4b470bbbe0e7bc2a628091dcf790778caba,2024-09-13T19:55:54.477000
|
||||
CVE-2024-45181,0,0,c1b3f50892c5ad2964a42f2f7c4bb1e591fc78d268d80e02244df3b7c3d3d502,2024-09-18T20:26:26.873000
|
||||
CVE-2024-45182,0,0,9a85c862314a6425e6060387f72c5f336d253a6faf88611dfadeddbd5da8c540,2024-09-18T20:26:11.023000
|
||||
CVE-2024-45184,1,1,62cc6d98bd66c7827ea33f57294b4d8f4d5634bae628f9d5a75d79bfa4694c18,2024-10-11T21:15:06.947000
|
||||
CVE-2024-45186,0,0,77c3f8977c3993383fb80894e402f55d5d22584cb41b5e73c31c8d88ae8792cc,2024-10-04T13:50:43.727000
|
||||
CVE-2024-45187,0,0,b29c34a9281e147a1f2b33bdd2a8c272cd39081d36dd9d0273787cf191e54024,2024-08-26T12:47:20.187000
|
||||
CVE-2024-45188,0,0,b715e0fd98dc9de103c52fc47a055822268226fc14af5f0a01f3a3eab3db9def,2024-08-26T12:47:20.187000
|
||||
@ -260506,7 +260508,7 @@ CVE-2024-45312,0,0,ef764c6defa41a6edf70254d24eaf293afa21b3c3fa7a94ab70b620cdfc67
|
||||
CVE-2024-45313,0,0,4968bb4eb1a02bcbcbe90803b30cccb5c26bf5a74af49d29e0350cd8e0738664,2024-09-25T18:12:53.543000
|
||||
CVE-2024-45314,0,0,2f1c9dd8ac80290a1853d4f2b69fb0ae8e68e38eb15e5edeb668cb7a47ecee3c,2024-09-12T16:39:53.690000
|
||||
CVE-2024-45315,0,0,ba3d6bb772ee39d6bc5499016a92ac1f8c569adfb2fb030be2d2783f6d06e78e,2024-10-11T13:15:15.883000
|
||||
CVE-2024-45316,0,0,4e5892b82028d8fdbdd8305179407511ff3766332bf35730ff0ba8e888812f60,2024-10-11T13:15:16.010000
|
||||
CVE-2024-45316,0,1,917b9a2d81b07be65e7e4444a9aa32a338810fa9c3b1c434251c47ee009c89db,2024-10-11T21:36:32.947000
|
||||
CVE-2024-45317,0,0,275e9c03739456c391fe81ca5fee61b756e8c635c4f5a6c7e3a5dd1910911ac8,2024-10-11T13:15:16.103000
|
||||
CVE-2024-4532,0,0,4fd2f02f0358f1c611846b77f1b0e80bcb1985e07f23fa6a21a71cc25593500a,2024-05-28T12:39:28.377000
|
||||
CVE-2024-45321,0,0,385b3d1e3bf54e8ae2af5d5796ef0b1ffaf17d58c18e0fbe7542c0dcea09b2e4,2024-09-06T22:30:19.337000
|
||||
@ -260621,7 +260623,7 @@ CVE-2024-45507,0,0,b2cf0920dcb75db868de7b4afd51449cea360da72164b9b7e7a575176b0c1
|
||||
CVE-2024-45508,0,0,a7bf13ff5f2bf318e53d0cc8b12c1b5ac7eae45f1991e7b683a2e3673a166bb9,2024-09-04T16:44:08.247000
|
||||
CVE-2024-45509,0,0,2da4a07b41eb99a3059398ff74aeb7ba3be7995744fd94f415c5c3e9d41f0b5f,2024-09-04T16:45:08.597000
|
||||
CVE-2024-4551,0,0,f0a0f74f6dfab215971682e84a8c3d35d9da568954bf14d9189d7462b5493bd2,2024-09-20T00:24:08.597000
|
||||
CVE-2024-45519,0,0,8cf7771886ee091236ac393f14fcd9299d951c1d8323e7c75b78becbb53a0cf0,2024-10-10T15:04:49.143000
|
||||
CVE-2024-45519,0,1,d22b7a0d5b70a1457efb1bbf828c84146c84f856205dcaa807aba3ef8eaee5ab,2024-10-11T21:36:33.567000
|
||||
CVE-2024-4552,0,0,a910e848f992d4848b5a9057809234cfe8833a167abb01396097dc34db4ca3d3,2024-06-04T16:57:41.053000
|
||||
CVE-2024-45522,0,0,cfbe5f5b4866198ecf4773ddc4ec07a576ac517554c3c987f558bc88648f0e9a,2024-09-05T14:29:32.737000
|
||||
CVE-2024-45523,0,0,e7d93fa702fd02b5bced215282921c641c45ca521a1d9282d8eeca5a4c9e6cac,2024-09-20T14:35:11.523000
|
||||
@ -260693,7 +260695,7 @@ CVE-2024-45723,0,0,63a77b3806467261b762149cf38436dbbeeccf91520557e4f16dba13005bb
|
||||
CVE-2024-4574,0,0,5bc00996fe57104150ae610f292ff224de65f0948423aca3282fe7d917884520,2024-05-14T16:11:39.510000
|
||||
CVE-2024-45744,0,0,ec4698c6891bd67c723c11e0dc841a026f8c5da574327fdd441b22164fa47c9a,2024-09-30T12:45:57.823000
|
||||
CVE-2024-45745,0,0,095415295fb9e908dbd1bbbd24ecc8e41cf81936c17bbb0aa6290e6785ab228e,2024-09-30T12:45:57.823000
|
||||
CVE-2024-45746,0,0,0480d752d9a964b227e21ac7d8461dc4b3c571e26c192948403806808a22adbc,2024-10-10T12:51:56.987000
|
||||
CVE-2024-45746,0,1,902861897e83a8721d85c8381c9fc33c107d622749f6a985c29d3f01f324f690,2024-10-11T21:36:34.350000
|
||||
CVE-2024-4575,0,0,9d22d248e877183fb374174504fab6bfc500414f16c234b88b687abe10cd48be,2024-05-24T01:15:30.977000
|
||||
CVE-2024-45750,0,0,f86fce6cd4045728a00882dd42402a213a9d23f5fcb44064e442c5967c556b92,2024-09-26T19:35:17.850000
|
||||
CVE-2024-45751,0,0,cc5d68fd09f5f304456a6be90ad821b34bc4a7f1a983b99ed7260cdb2141f184,2024-09-10T12:15:01.857000
|
||||
@ -260834,7 +260836,7 @@ CVE-2024-46083,0,0,73f6a059a5ba6bc696db7247d8909675528ea79771aa3e324116789f85257
|
||||
CVE-2024-46084,0,0,b76e6b13523e15b76b374f65868a92b58cdd010c840abd828b2c93c894b78869,2024-10-04T13:50:43.727000
|
||||
CVE-2024-46085,0,0,c40bf34999e41384db415b4f8361df5bc1a972c059bfcf483e35e9bef50d8457,2024-09-20T12:30:51.220000
|
||||
CVE-2024-46086,0,0,504c7f52322e487d2224c0cc449e69a05fcab67f7a93912f7189c1bccd5d3802,2024-09-25T17:08:41.937000
|
||||
CVE-2024-46088,0,0,8f412cc2c1eb899e794bb30fcae9111259ad7d234fc9926143ae8d038968838c,2024-10-11T16:15:08.357000
|
||||
CVE-2024-46088,0,1,2a3f5b7161cfeaa0d531006e4014cfdcbe258baba00e87c6174d7dbe11360903,2024-10-11T21:36:35.423000
|
||||
CVE-2024-4609,0,0,b6f3fd3db9085553e8d026a562774e21d6dc7bb2eb7a9a6cfeb43138546783c0,2024-05-17T18:36:31.297000
|
||||
CVE-2024-46097,0,0,512a1e36bd43b76dc23993f25084db214121a78b92f1064375f403c11dada0c4,2024-09-30T12:45:57.823000
|
||||
CVE-2024-4610,0,0,43047990281e26a04055de4ace6574603f0b08f61a7727d9acdec64f6d8d9784,2024-08-14T17:06:24.800000
|
||||
@ -260876,7 +260878,7 @@ CVE-2024-46293,0,0,d737b88fa32ca8e9cfa376b7f9d09c4f34ea852ae62d5e06ad40bbb0d6a65
|
||||
CVE-2024-4630,0,0,a8734ce37050a74e4818d023dd3913b4f4405761deda282bae815154e00346af,2024-05-14T16:11:39.510000
|
||||
CVE-2024-46300,0,0,ac737436c281f2a0090533929879a33c37be3bd6f7970fe4b452f2dd4b8cf935,2024-10-10T18:52:42.790000
|
||||
CVE-2024-46304,0,0,b9e25f115f361d29c823a7b9b81ce31b0acdf240794d53b7d2cf265de90467a1,2024-10-10T14:15:05.100000
|
||||
CVE-2024-46307,0,0,2f96c5e3d4f564d8b625e24ebef4044cea9f555c588f949b1c248bfd9bde51be,2024-10-10T12:51:56.987000
|
||||
CVE-2024-46307,0,1,bcefd2fcb5d6dce55411fd3d95145ba5cbfd8953b6d7a19a92e4df75e273bea4,2024-10-11T21:36:36.520000
|
||||
CVE-2024-4631,0,0,d3c7ebdf5d9c31d124bc2c67e858e716a594cef6aa78ec49eddcc538ef63a67e,2024-05-14T15:44:13.487000
|
||||
CVE-2024-46313,0,0,0b29c605876b046853c74672dadf1c8118f0e83614058ed8950277f93a0b2b0a,2024-10-04T13:51:25.567000
|
||||
CVE-2024-46316,0,0,54b9c1fe9acfe98423855e0709c0cdd187e74f76088027a762e1c19f14357911,2024-10-10T12:51:56.987000
|
||||
@ -260921,6 +260923,7 @@ CVE-2024-46451,0,0,d3a56959d528545e5d37d75143f0c1e0141235a2bd503adf0162594e2e188
|
||||
CVE-2024-46453,0,0,f2e65264e0b1a5c3ff7f710d8d23db018673f8328ef08ecc489a300ea4d9bf1f,2024-10-07T13:53:04.767000
|
||||
CVE-2024-4646,0,0,368f6c8b75aa07d035e1b1b12d3ee4faeb304323401bbcc5aa2596217dc42f5b,2024-06-04T19:20:44.390000
|
||||
CVE-2024-46461,0,0,cc86f5c42464c26c4a36c6d59fbb4ac13932ea21683a14dbd86ef949d78638fc,2024-09-26T13:32:02.803000
|
||||
CVE-2024-46468,1,1,677d6c831974a29d35fc0b66c11bf3eda1ab300e218b909f570b915ecb893dd4,2024-10-11T21:15:07.040000
|
||||
CVE-2024-4647,0,0,abfff49b4d0bc1323cd8c136d2663c14e45b73cbc22df4c684f6d02301cae0cc,2024-06-04T19:20:44.487000
|
||||
CVE-2024-46470,0,0,4aeda2c990e579b9008226e62d5cbdc47a22a0fa6603152064e359fb3aa1bf47,2024-09-30T12:45:57.823000
|
||||
CVE-2024-46471,0,0,470c933b4642dc2897ace8d3fcae6cce28009d5c4dc28b3858aee18cd52a08d7,2024-09-30T12:45:57.823000
|
||||
@ -260939,7 +260942,7 @@ CVE-2024-46510,0,0,bb46a7737029f26392a246097a18ec9ca317101031432da9b686fbbec181f
|
||||
CVE-2024-46511,0,0,78cf785de24718da0c0ea71257e191470c834e4be61ca79ad4d72c264c3c4729,2024-10-04T13:51:25.567000
|
||||
CVE-2024-4652,0,0,8fd7af949b4c89aa1e5f9f8bc7784e47292323116a1f6a56ecb880f3c410a541,2024-06-04T19:20:44.873000
|
||||
CVE-2024-4653,0,0,7b6d5c0913690c5b51d844fc9718b4208eaa5f352f244fd41eee7be1add5e3bc,2024-06-04T19:20:44.990000
|
||||
CVE-2024-46532,1,1,3cc4b0eac6406170fdb3268901170209dd1adc3b3b14e5bfd21137ddfc4e89d7,2024-10-11T18:15:08.267000
|
||||
CVE-2024-46532,0,0,3cc4b0eac6406170fdb3268901170209dd1adc3b3b14e5bfd21137ddfc4e89d7,2024-10-11T18:15:08.267000
|
||||
CVE-2024-46539,0,0,2d2c57643421ecf3202df41ca86f61b87e91435ec045a273724c1fd7bed0cf14,2024-10-10T12:56:30.817000
|
||||
CVE-2024-4654,0,0,0088d34096b2578204ff98fe71c1f702e4c8866653411407f72fe940a56448df,2024-06-04T19:20:45.100000
|
||||
CVE-2024-46540,0,0,82bd73e280c5a23d3b35406dd5a042ddc542cc53d99831f15d05d7d862ed5067,2024-10-04T13:51:25.567000
|
||||
@ -261348,7 +261351,7 @@ CVE-2024-4715,0,0,8280b54df57d141f79c5c5ba7edbd4b8610f06a30ecbd5ba39cd6c268b4b3f
|
||||
CVE-2024-47159,0,0,f629ab8645ae2d3b373e84498ebe22f56e42f569db9052d68376aa856c847502,2024-09-24T18:09:50.877000
|
||||
CVE-2024-4716,0,0,17dd73abada87214ed7c4da9787dcdd43aa5089416e4d3395c3029d4b8a776fa,2024-06-04T19:20:47.230000
|
||||
CVE-2024-47160,0,0,c1aad4fed9b1c25a1ac730f435c0afe6164d933ac9e43b9a1caf75e24768ef64,2024-09-24T18:03:48.370000
|
||||
CVE-2024-47161,0,1,b4f14ace0eaf8823c777465f809d23f928c4c28c11d0aa00813c7f2bf032d71e,2024-10-11T19:54:07.317000
|
||||
CVE-2024-47161,0,0,b4f14ace0eaf8823c777465f809d23f928c4c28c11d0aa00813c7f2bf032d71e,2024-10-11T19:54:07.317000
|
||||
CVE-2024-47162,0,0,322233fc16cb60b7afacb06e9a8b8faccd2cf3bd8a5ab8537cf655de3bfbfae0,2024-09-24T17:57:43.827000
|
||||
CVE-2024-47164,0,0,5859bc42ffdd144898177fea7518c38f0b763cb9f31d761bb56378ffa2f03ff9,2024-10-10T22:15:10.437000
|
||||
CVE-2024-47165,0,0,6068da0b880a9925adbf77cd58fd288fd51574aa798be6053315e56aaf5343e3,2024-10-10T22:15:10.680000
|
||||
@ -261430,7 +261433,7 @@ CVE-2024-47327,0,0,e69cbc80f68558286d87724bfb3ff74a4556470fe4bba849a3f65a9c4a316
|
||||
CVE-2024-47329,0,0,959fd16ce295ac73c7340682dfbc4f00abc97a1906e836a2239dfaf44a22cfd5,2024-10-07T17:47:48.410000
|
||||
CVE-2024-4733,0,0,bab73609d3aaa55dacedcdd69b9c9d83fbc709adf98853b3adb423b13daf2498,2024-05-17T18:36:31.297000
|
||||
CVE-2024-47330,0,0,8e1bb94d03c47cc1936bb0a3abc1d94c591039097eebb503639095132d634032,2024-10-02T17:26:49.470000
|
||||
CVE-2024-47331,1,1,596c791ac8b0a95707c17084b5d3daf2eae269336f00917824d2d3797b89022e,2024-10-11T19:15:09.783000
|
||||
CVE-2024-47331,0,0,596c791ac8b0a95707c17084b5d3daf2eae269336f00917824d2d3797b89022e,2024-10-11T19:15:09.783000
|
||||
CVE-2024-47332,0,0,bebcc62121f57accf95efc9e23e2cb785faddb62a35b4509d76c7928e0003c00,2024-10-07T17:47:48.410000
|
||||
CVE-2024-47333,0,0,7b68cade94253428b89f07ec4ddffee957654bcbdc6a580835fa17b2ed55a3db,2024-10-07T17:47:48.410000
|
||||
CVE-2024-47334,0,0,b009b1e08524049ac674c8aea8d43b565f40269928fb41da018eb521c9e21ecc,2024-10-10T12:51:56.987000
|
||||
@ -261453,7 +261456,7 @@ CVE-2024-47349,0,0,e6c8290f3997da4ca5815c85f88c430fa697e63af208e1750b560fe37e4f7
|
||||
CVE-2024-4735,0,0,74f4fbd101bb46efdc880f338cfb70c8fd3a6ef365bd7732d2107c79fb3d78b8,2024-06-04T19:20:48.397000
|
||||
CVE-2024-47350,0,0,09067a079935a016b58f07623b3d09d0a14ce68a8d0e97bc64a38c36b79a09f5,2024-10-07T17:47:48.410000
|
||||
CVE-2024-47352,0,0,594028d39b78ff520b0396c6a3ce285d2e384a0ebe8a52208931d1ced0ad3b29,2024-10-07T17:47:48.410000
|
||||
CVE-2024-47353,1,1,46323252c46ba333ea4f36816ab9a80f2389e9d61296f8594ed082165cdc29c1,2024-10-11T19:15:10.003000
|
||||
CVE-2024-47353,0,0,46323252c46ba333ea4f36816ab9a80f2389e9d61296f8594ed082165cdc29c1,2024-10-11T19:15:10.003000
|
||||
CVE-2024-47354,0,0,d139da9360db9ab0b7a0ad752058da69c1005c00d22b020d554561160c2bccbe,2024-10-10T19:15:16.837000
|
||||
CVE-2024-47355,0,0,cf08585fe7cb6bc0c9335afe55d15aa081a8746842ce9e96d34e20bb3b2de71f,2024-10-07T17:47:48.410000
|
||||
CVE-2024-47356,0,0,cfe95239cc4248246cd874a2cb2d77c8e851cdbbe7ac1a464fc0eb4a3c757f5f,2024-10-07T17:47:48.410000
|
||||
@ -261557,7 +261560,7 @@ CVE-2024-47534,0,0,3fdf39e9d60bdd61b891053803d0cdd86e1d9b2f1594fae7730f1f0f0b99a
|
||||
CVE-2024-47536,0,0,353df15c5abe486c0bd2000eeee4b00375b2403ebe72a10be7f49c66f18c4bd4,2024-10-04T13:51:25.567000
|
||||
CVE-2024-4754,0,0,43efa3a5287d05b500ecfcf4503ad62e1b41a22939150352bf102c1b98a3511a,2024-06-24T12:57:36.513000
|
||||
CVE-2024-4755,0,0,ca5306e45de4985a027d64d4740785092288eb6abbd1ab6d1fda3377d88d4e7e,2024-07-03T02:08:01.477000
|
||||
CVE-2024-47553,0,0,5b7f6e3db0c5d07beacc6c421807da839b923c13d5a21906db06fcdfdd277917,2024-10-10T12:56:30.817000
|
||||
CVE-2024-47553,0,1,2212e0c73d31ee4117260b14c09959b86700d87277dc600c8b069eb02d73b59b,2024-10-11T20:04:08.623000
|
||||
CVE-2024-47554,0,0,ed4aff6ea0e7ac69533e960f0592e4849edcc0303a79e4282ca0e96ec7b37a4c,2024-10-04T13:50:43.727000
|
||||
CVE-2024-47555,0,0,fd6842fa8e3868552d886daf37839c899991f22ed0d1cbcbe8a1f0bc204570fe,2024-10-10T12:57:21.987000
|
||||
CVE-2024-47556,0,0,3777c77a7cfa512177d92b35ad1f5f20e21bfed49853fd196c2ebb401ca7bb5a,2024-10-10T12:57:21.987000
|
||||
@ -261567,9 +261570,9 @@ CVE-2024-47559,0,0,f2239e2603f21aec2e0f34acae5f93ddc2655aaa3a316e518b18ca1d3ff15
|
||||
CVE-2024-4756,0,0,56f5675f964fc18dbd2235a67dc0431c0553314b21f097091d5942b6bc7c2044,2024-08-01T13:59:34.090000
|
||||
CVE-2024-47560,0,0,b8abd4241aae2bbcacde7e0c93543de13fb150a4040a68118a29f4e634e60873,2024-10-04T13:51:25.567000
|
||||
CVE-2024-47561,0,0,1187d18aeddf57f3855631575eec8fc1684027bd65a7263241fe4e3f5d2788bc,2024-10-04T13:50:43.727000
|
||||
CVE-2024-47562,0,0,7ec8f24091ef1db96111468cc50e2d1097289554971c4da35d5316ab458714a9,2024-10-10T12:56:30.817000
|
||||
CVE-2024-47563,0,0,bdbcbbb76e0636e15f56e3d6962c9c91dcec597d600bd2cdefb5a0a54f51e049,2024-10-10T12:56:30.817000
|
||||
CVE-2024-47565,0,0,5141e78676b5af5f42d5e451346796e73dcb18b535173c1b6643180d5ecdafc9,2024-10-10T12:56:30.817000
|
||||
CVE-2024-47562,0,1,f948ab473eac72b74771d65275c3bce022b2870f6200aad718c4a235ef7a7a2b,2024-10-11T20:04:35.480000
|
||||
CVE-2024-47563,0,1,8e14a8aeeab89240dc7f71203e62b9d2c2b2c697ebcb095329938e996837371a,2024-10-11T20:05:05.143000
|
||||
CVE-2024-47565,0,1,1f4de7ea43d4059fde3978664bf9271defcef7d2ededc73cf25a3c2fbdf29d8c,2024-10-11T20:05:59.237000
|
||||
CVE-2024-4757,0,0,8697ca9e70d5ba37736a0a67620900f7a3da7cbcb97e29086de20de73cd3bfef,2024-07-03T02:08:02.463000
|
||||
CVE-2024-4758,0,0,725af37997323245576176c0490558b45926193602683436c3054da734872332,2024-07-03T02:08:02.707000
|
||||
CVE-2024-4759,0,0,88e594c7c898a4e82a1a8532a1f049d1a9fe25baf60278988c21dabe64f2896b,2024-07-03T02:08:02.923000
|
||||
@ -261709,6 +261712,7 @@ CVE-2024-47872,0,0,8471c34cf55992e157ff7eba332e41edd983c92bf011e2e751c8d26e7ec94
|
||||
CVE-2024-47875,0,0,078af0f210e8e30655ff63e30537d1f8dba962d087e301c359afca4f246d0946,2024-10-11T15:15:05.860000
|
||||
CVE-2024-47877,0,0,7531e66ff0397e313d2f97552017c7592a6d7da9498d96e0b29b6c2d6bd21145,2024-10-11T17:15:04.450000
|
||||
CVE-2024-4788,0,0,036e4ce9e476328c73022572d41365684f416f1f77ea3a1f5e72bdd2454ce2ec,2024-08-05T20:23:52.467000
|
||||
CVE-2024-47884,1,1,8ad0ffb865c1d8a187664122ed1b8bd87a0aaa3d88b8a0a88659a06bdd059aed,2024-10-11T20:15:04.993000
|
||||
CVE-2024-4789,0,0,991c3c0809892f7a4ebcc223f96155782fc07af160e30bd64d5fbc63735bec50,2024-05-17T18:35:35.070000
|
||||
CVE-2024-4790,0,0,96aecd7cd4f769c190cdd6309a2627db4d493e5cf9efda536a135cb9a7f4eb96,2024-06-20T20:15:19.883000
|
||||
CVE-2024-4791,0,0,45f7f0badd9eeca0c08f0ffcf78bd3c1e9a171e1e79fba42777d793a804985ff,2024-05-17T02:40:37.090000
|
||||
@ -261718,11 +261722,11 @@ CVE-2024-47913,0,0,7dc94fcd4cdeeb6c0d9aba640aeb2f6806a34afc409a57e9cc79ea392fd74
|
||||
CVE-2024-4792,0,0,d367db616eff60413675ec0cb96dcf5072899c5126e3ab7b85dd0b323d2aa0a3,2024-06-12T20:15:13.643000
|
||||
CVE-2024-4793,0,0,d7ea24a63b045e67640f8521c21cc9fd0113236775183a92ddafb3253726675a,2024-06-04T19:20:49.390000
|
||||
CVE-2024-4794,0,0,ae0da7f20a3f797e26793f17108eae7df40bf3f3b44a06ce135aa4fe4b35db7e,2024-06-04T19:20:49.487000
|
||||
CVE-2024-47948,0,1,aafd0e8fc979ea94b2b8df4bf3f1f60d1fa5454036169ceb387558bd65bac363,2024-10-11T19:56:44.863000
|
||||
CVE-2024-47949,0,1,8ba4c45c98cb1da5a81b6d150df81b78f598bd9353dce1414e0f42eb2bdd7632,2024-10-11T19:57:06.207000
|
||||
CVE-2024-47948,0,0,aafd0e8fc979ea94b2b8df4bf3f1f60d1fa5454036169ceb387558bd65bac363,2024-10-11T19:56:44.863000
|
||||
CVE-2024-47949,0,0,8ba4c45c98cb1da5a81b6d150df81b78f598bd9353dce1414e0f42eb2bdd7632,2024-10-11T19:57:06.207000
|
||||
CVE-2024-4795,0,0,2bcc48011ff4ecb8dd1cdbe375174bc480d75b3ad4f0c787cda1ca7cd904e298,2024-06-04T19:20:49.590000
|
||||
CVE-2024-47950,0,1,0333163b5a9f356fc60964ffdf9e21e2c5a0fd650f8b847ccf42b9907218b9aa,2024-10-11T19:57:16.883000
|
||||
CVE-2024-47951,0,1,e529fafd02710d7ac35ac8b78eedca3443695e348ede4d153aabc61ddef6e118,2024-10-11T19:57:58.937000
|
||||
CVE-2024-47950,0,0,0333163b5a9f356fc60964ffdf9e21e2c5a0fd650f8b847ccf42b9907218b9aa,2024-10-11T19:57:16.883000
|
||||
CVE-2024-47951,0,0,e529fafd02710d7ac35ac8b78eedca3443695e348ede4d153aabc61ddef6e118,2024-10-11T19:57:58.937000
|
||||
CVE-2024-4796,0,0,964ab3d12855a9ebe6833342f869532f4dbb88319fd169505c04f4586bfbb727,2024-06-04T19:20:49.720000
|
||||
CVE-2024-47962,0,0,1c993031245b9205a9445c920e9186968a00d85e81c957a316576d409863e918,2024-10-10T18:15:08.183000
|
||||
CVE-2024-47963,0,0,e68b7121a7e0333c01b2d777a44d55fa8978f9459daf9609f2c28c44e3cd7b30,2024-10-10T18:15:08.330000
|
||||
@ -261737,19 +261741,19 @@ CVE-2024-47971,0,0,534d5d54d79d2918bba754e46b72e551e8a383f4547c31054409d42c67920
|
||||
CVE-2024-47972,0,0,f1d48d54249f69076bba9ceaeedc06de8049ec1414a8288f2e98e1dee9627b00,2024-10-10T12:57:21.987000
|
||||
CVE-2024-47973,0,0,3a0aa017e97ae06d1cf3d1bc086b0dc9ef048219777341e2d17989996ce6923a,2024-10-10T12:57:21.987000
|
||||
CVE-2024-47974,0,0,73b31df01d51a43c652bca2b8914e83bdb8e1c1870716321de5e5fac95abd7a7,2024-10-10T12:57:21.987000
|
||||
CVE-2024-47975,0,0,9ad4ace9a8d8e08788b5e254d7be9129666651b52b755d634ac88116293043c7,2024-10-10T12:57:21.987000
|
||||
CVE-2024-47975,0,1,f2fcfe13d795ec593199978d9bd2ccef6b74c32b8404475a2a1a928dd974eded,2024-10-11T20:15:05.143000
|
||||
CVE-2024-47976,0,0,f9e6b9471c3a11e91c53ef084005aa6ebe42f6aee5aa56fec962d9e8dbc63529,2024-10-10T12:57:21.987000
|
||||
CVE-2024-4798,0,0,a3036cf57ec44ed92aa705d72184468d7b712fcb492c4ff2950b8be117e0106e,2024-06-04T19:20:49.813000
|
||||
CVE-2024-4799,0,0,bef187df7ab031f873bee32f009cee90466081192edf9662131655f9488e20b3,2024-06-04T19:20:49.917000
|
||||
CVE-2024-4800,0,0,46f73cb5132c32f542b67f61b6f2138522f24eb42a7d5cb9e69a7f683ef97724,2024-06-04T19:20:50.013000
|
||||
CVE-2024-4801,0,0,2bcdaba0a3afa2888c47ef732ae4862e81c0c79cd78d2076198cb242d0df3f0e,2024-06-04T19:20:50.120000
|
||||
CVE-2024-4802,0,0,9f23c738b4e7167dada064b214f9ad2d560e5cec48c7eaa4346088c33abc9143,2024-06-04T19:20:50.247000
|
||||
CVE-2024-48020,1,1,829c283ecb63389e2cff1a1741c3e7cb21cdcddc68038d515211bb86aa4c455f,2024-10-11T19:15:10.220000
|
||||
CVE-2024-48020,0,0,829c283ecb63389e2cff1a1741c3e7cb21cdcddc68038d515211bb86aa4c455f,2024-10-11T19:15:10.220000
|
||||
CVE-2024-4803,0,0,9495051e0864e5e76c8973a987e9e6eb1b1cb49bec9a5ab21c9648610125fd4d,2024-06-04T19:20:50.353000
|
||||
CVE-2024-48033,1,1,43f4a76b8fc3610a7c182a16ab14a36b8f68d177db87ed6fd3f19819fe34cc88,2024-10-11T19:15:10.430000
|
||||
CVE-2024-48033,0,0,43f4a76b8fc3610a7c182a16ab14a36b8f68d177db87ed6fd3f19819fe34cc88,2024-10-11T19:15:10.430000
|
||||
CVE-2024-4804,0,0,27889f6e71f31f5b5cb9daf7c221df1ea26a19e5d20319852f304f02b73ccaf6,2024-06-04T19:20:50.450000
|
||||
CVE-2024-48040,1,1,c57148f5b85311d99b66a455ed18d7c7ea6a3284758e530142be56984028b4db,2024-10-11T19:15:10.660000
|
||||
CVE-2024-48041,1,1,7cbfa9b2e3220db83ef3d6eff7a331f4c12bafdd869428a04141ba479dedb179,2024-10-11T19:15:10.880000
|
||||
CVE-2024-48040,0,0,c57148f5b85311d99b66a455ed18d7c7ea6a3284758e530142be56984028b4db,2024-10-11T19:15:10.660000
|
||||
CVE-2024-48041,0,0,7cbfa9b2e3220db83ef3d6eff7a331f4c12bafdd869428a04141ba479dedb179,2024-10-11T19:15:10.880000
|
||||
CVE-2024-4805,0,0,a2ff69b1db9dd7c01e8bcdbe532fffb4f68853ea688982e077b1b01529f57c85,2024-06-04T19:20:50.553000
|
||||
CVE-2024-4806,0,0,f8a0e203429c4f99450a15aa6a4b26ee8c7effa68e79948138bc0eccf2af8e7f,2024-06-04T19:20:50.670000
|
||||
CVE-2024-4807,0,0,e5ccc41d46958232939be978f4766518ab72a806619364a653b00c23b63fbc68,2024-06-04T19:20:50.770000
|
||||
@ -261809,11 +261813,26 @@ CVE-2024-4873,0,0,acc2d485a3cc66f2d361ddda92f62901a8108a4490dc81ea4acfb7f60771d8
|
||||
CVE-2024-4874,0,0,4b5967df7915507c9b0020b0ee4984332d2c23e37a57b9a262a2ae6c5b300f4b,2024-06-24T19:41:12.293000
|
||||
CVE-2024-4875,0,0,5a9bf10de46e2f944321ed00fa6d17c799716a219001f5797c9cce4abb6a2b7b,2024-05-21T12:37:59.687000
|
||||
CVE-2024-4876,0,0,6c7ef7cd93a9d659be2199330000de11a6027348fd6a9308e40ba12083e70d2c,2024-05-21T12:37:59.687000
|
||||
CVE-2024-48768,1,1,f49a3d229d332d1aeaab22a310afec1dc3a25e549cecd7c835037f404c4ef2de,2024-10-11T20:15:05.253000
|
||||
CVE-2024-48769,1,1,f5f7709345dde987cbb78c184038995c0f3efe3656a1fa47254269b76e7f5bd6,2024-10-11T20:15:05.353000
|
||||
CVE-2024-48770,1,1,eaf5f12c2e9d07a9fecc8d94181f5eabee6e28619c96df91735489ba947f01c1,2024-10-11T20:15:05.450000
|
||||
CVE-2024-48771,1,1,a1657baf9f208adee3965a78a9c892c46093c662114a218d0a28379196fe5fe7,2024-10-11T20:15:05.537000
|
||||
CVE-2024-48772,1,1,32f12fd8a1c4a633e62e5136b96048f77dd39e9830a108f380dec8524b539408,2024-10-11T21:15:07.127000
|
||||
CVE-2024-48773,1,1,fb9691a9cbeb3dcf7d35171104667e63d6590496f59d7608ed0f35159a5ac59a,2024-10-11T20:15:05.637000
|
||||
CVE-2024-48774,1,1,e09b2721d24693a01b4152318714272955f6ddb265558eb5b7bdfef8acd488c8,2024-10-11T20:15:05.720000
|
||||
CVE-2024-48775,1,1,b8e85984d5af1131eaf26bd74e5d84ceee535ea1566997eda307a15588016b47,2024-10-11T20:15:05.810000
|
||||
CVE-2024-48776,1,1,6d16bb28cf85e57cb7bf03baf362d7efa13854629c0f178451275913f461e9e1,2024-10-11T20:15:05.903000
|
||||
CVE-2024-48777,1,1,f05bd4946b95fd59502390168a95058f9f6f02568ecf6644e1ddccf18dfd7bc1,2024-10-11T20:15:05.997000
|
||||
CVE-2024-48778,1,1,876de449628179f0742b7e4aa6cb3314ccd387243c9b4fe010bd2b31547ce555,2024-10-11T20:15:06.090000
|
||||
CVE-2024-48784,1,1,413a91fa2c4a61a33f7467c2f5b8058034c18bbf6bb09d8c92a1fe8bc838384d,2024-10-11T20:15:06.180000
|
||||
CVE-2024-48786,1,1,c860c3ab3f85be5742131f9576a41113cc68380c4baa10b74833d50923537b25,2024-10-11T20:15:06.277000
|
||||
CVE-2024-48787,1,1,7a215e7cb70a1e88ac1a7855c7c78ffe9117f0eb6f9844010ee3a49bb152ca60,2024-10-11T20:15:06.407000
|
||||
CVE-2024-48788,1,1,d531b63d24b558dcbfd8469ce1a5194d6aa29d693230d82c5c128cd8fc89dcbd,2024-10-11T21:15:07.220000
|
||||
CVE-2024-4879,0,0,49a8b41ea605df8bd1da4063a7058b50435504f1dbecb0dc4bcc8efa8c8e8867,2024-07-30T15:13:39.720000
|
||||
CVE-2024-4881,0,0,e010a6d611a1aff52f8425d30778d000b18cd2245ae12a3254f16e5b16421da7,2024-06-07T14:56:05.647000
|
||||
CVE-2024-48813,0,0,9334ed90a2bc2f99bdf43ba394cf554b2394a010b57e23c65c6dbd91bcd5211a,2024-10-11T16:15:13.453000
|
||||
CVE-2024-48813,0,1,738900377884500d6e48ef86e8a92a90f8f38c9de5c7e8958544d021c7ce9ab7,2024-10-11T21:36:43.527000
|
||||
CVE-2024-4882,0,0,a4855f599041359b65e48a15f937a27e2ec2e91d9343d627eb58fe60c3b171c1,2024-07-09T18:19:14.047000
|
||||
CVE-2024-48827,0,0,95a05cb105f9089ac3138fdbcd6ebf5bdb0df4dff79ffd2930892d4422629ef7,2024-10-11T16:15:13.550000
|
||||
CVE-2024-48827,0,1,0692485b3e9c4ae06dd4ee6f885c25457f723f018116fcc7fc99c51a1476d31b,2024-10-11T21:36:44.280000
|
||||
CVE-2024-4883,0,0,66fd0c7113b75e4613bf51e6b10a097cc5dcf57aa3f97b3df0e5c31c4210be62,2024-09-06T22:46:17.103000
|
||||
CVE-2024-4884,0,0,a2dcec8e16e916f3e6bf44fbf27e64f395ae27ac96c65779b6d04fbf5173b4c4,2024-09-06T22:45:59.233000
|
||||
CVE-2024-4885,0,0,2608f2aa7fb5189467bda7bb610d4e03f1b43256b775a84e60ba9a3b8ac9b260,2024-09-06T22:44:27.840000
|
||||
@ -261826,18 +261845,20 @@ CVE-2024-48902,0,0,a199409fe89d504d5aac3fbfd93ec8ade919d8618d3b520517113fdc75e03
|
||||
CVE-2024-4891,0,0,f3940d673165429e16eea192398cf8ad711af9d91140d48fc15ea6e438b5c077,2024-05-20T13:00:34.807000
|
||||
CVE-2024-4892,0,0,86d55410ceaf3ecac0b7906bf27b918d65f0ae499a5475505564f001e752dae0,2024-06-13T18:36:09.013000
|
||||
CVE-2024-4893,0,0,c4900f559bdc4a1c952ec15ffc0a407a7d0fc758594c29af597940962bf437f6,2024-05-15T16:40:19.330000
|
||||
CVE-2024-48933,0,0,3003e039111af51a407eaa338f91e1930c9de8b7e22ff78450b42fc9a05e6cc7,2024-10-10T12:51:56.987000
|
||||
CVE-2024-48933,0,1,26e7fffc7245fc28a7fbe658a2efc943aeace159e18ee8e57ad42a85fc085d33,2024-10-11T21:36:45.080000
|
||||
CVE-2024-48937,1,1,3c1c422bd05f20d9fa785840c74e61f1a28cdb3ffb554b324e1e75358cf0328a,2024-10-11T21:15:07.307000
|
||||
CVE-2024-48938,1,1,2e142cf0915aad58cd815110a1eaf58520f2037c9760e54acc76c236a9314228,2024-10-11T21:15:07.387000
|
||||
CVE-2024-4894,0,0,1906244d072f236ffca4e7ab82222b86cb7f201e42e01d4517f3ab933ca907f5,2024-05-15T16:40:19.330000
|
||||
CVE-2024-48941,0,1,35ab7ff258205d0a73a0c5c3a4a13d58fc51339de1c036850059f90cd9a5f81c,2024-10-11T19:06:20.467000
|
||||
CVE-2024-48942,0,1,ea39c98e10a8fc84511a95f9d84a08387c5a9e2c30ccf449a088f0db604ed8ce,2024-10-11T19:10:20.137000
|
||||
CVE-2024-48941,0,1,96d5eae18aed5942dcf07fb408430a3860f6be4f858a12cc1546cac40f719d2f,2024-10-11T21:36:46.327000
|
||||
CVE-2024-48942,0,1,8e0a2bf9dd24a5a385f196f7b0656ab299e53cb741eb92aa617f57ef48ee5dff,2024-10-11T21:36:47.090000
|
||||
CVE-2024-48949,0,0,7d55724ab06b8de7edf1f4b8a08def014420bedd09e2e171d24560c893af6404,2024-10-10T12:51:56.987000
|
||||
CVE-2024-4895,0,0,f6b1e62d3b5bd64aea52e6768b6c469e049c941759a77bf99aa3b85ad7e20caa,2024-05-24T01:15:30.977000
|
||||
CVE-2024-48957,0,0,c46c0ac873aa42c5c5fce51c2fd190551560e6471a3ec20c35231306af233d10,2024-10-11T16:12:54.243000
|
||||
CVE-2024-48958,0,0,78f8ea913e01786dab7124f80bf77d2db49d32828cc7ec77a90c7a2a507ee4f0,2024-10-11T16:11:55.487000
|
||||
CVE-2024-48957,0,1,73c8e1634cf56d3192b3375f11aa72eac69f0bcf8a4cb1f3b137dcc189616d8f,2024-10-11T21:36:47.930000
|
||||
CVE-2024-48958,0,1,92a426e369946b14ff79b98b6fb42dd0c692d3b7d45d68198a4072bdaadf4922,2024-10-11T21:36:48.687000
|
||||
CVE-2024-4896,0,0,20cc2dc19f323150528d4fb3a23b846b2e602fa65e075afe5dc2b86cb95d9c94,2024-05-22T12:46:53.887000
|
||||
CVE-2024-4897,0,0,b80483aa02f533d1f5c4695afa1f7ec5dae4ecfa8b472cf561efa5d05f8ff11d,2024-07-02T17:44:45.700000
|
||||
CVE-2024-4898,0,0,a64ada88476e7dbd5dca1f8ed9406bed15a3acb87fadbe7d9a4f3102502b7a67,2024-07-23T17:50:44.033000
|
||||
CVE-2024-48987,0,0,1b465c51a79913665e7786ff50ee27be5e1d6dd26e7dd86eff14b0f4535bc2bf,2024-10-11T13:15:16.197000
|
||||
CVE-2024-48987,0,1,64f424ee48af139e34e17a3e5ae2f9d63d1fe08eda899c76ffae57a1fbf10f3f,2024-10-11T21:36:49.470000
|
||||
CVE-2024-4899,0,0,7d0ca1543842829897b22c32fd7c3ea389ea1c85b28761d045bc30da0b354462,2024-07-03T02:08:16.280000
|
||||
CVE-2024-4900,0,0,2074e15c0050e8989f750822fa85e67702dc13ece861470c246a4c4acb047889,2024-06-24T12:57:36.513000
|
||||
CVE-2024-4901,0,0,038977315c18c98069a655ab35eb2b501ae92d62e5deb196337fd2891dd989fe,2024-06-28T13:18:19.407000
|
||||
@ -264999,7 +265020,7 @@ CVE-2024-8908,0,0,814a632e733410078b07e9411999ce68ca7ad8b9d3cd0621cbfe771be63227
|
||||
CVE-2024-8909,0,0,164deeef11f6495a80d20f0aa7bd15b53f984d767860039b14665a9aa77c7c0d,2024-09-23T17:51:11.790000
|
||||
CVE-2024-8910,0,0,381e6285f77cbfcd68b12e9f3c36f92b4377fd4642413a4087debb4746eed093,2024-10-03T17:34:27.913000
|
||||
CVE-2024-8911,0,0,3e740b3cf92ecc1f17356bd7912ea5093c6c60b7cb91fb7bff5c155129d89dfe,2024-10-10T12:56:30.817000
|
||||
CVE-2024-8912,1,1,cc754920a66c9505b940e8219b2e4d1d89e8006fc7a2b380aec11b363ea547b9,2024-10-11T19:15:11.110000
|
||||
CVE-2024-8912,0,0,cc754920a66c9505b940e8219b2e4d1d89e8006fc7a2b380aec11b363ea547b9,2024-10-11T19:15:11.110000
|
||||
CVE-2024-8913,0,0,a55fc5932b647838acfa904d967ecbcbbf1a8451e2d81f1f3b7968e9aadf354c,2024-10-11T13:15:17.040000
|
||||
CVE-2024-8914,0,0,c67ce2c8d24044b482c9bbb33384856203ff5bb870309850d7df3d6267c1b679,2024-09-26T13:32:02.803000
|
||||
CVE-2024-8917,0,0,32a69b030ac61cd4e144a233fc55362cc6115ccb6ecca5ec236644320a2aecf1,2024-09-30T14:30:38.687000
|
||||
@ -265307,7 +265328,7 @@ CVE-2024-9534,0,0,c826e79c155e2dcea2a83d95fd56ee360f3177c126ff744e515a5e5c9099e0
|
||||
CVE-2024-9535,0,0,4a71ba0a2572a89f39d0b54033731c76d4c93435778a2b1285d18249bf7f619d,2024-10-09T11:16:35.487000
|
||||
CVE-2024-9536,0,0,56b0d71a5e1f747b35f1ac4fcfd42bf040a735cf796864344938e26d90f6930b,2024-10-07T17:47:48.410000
|
||||
CVE-2024-9538,0,0,09ff8d828136926273e234a7df0de9f7df3e277701497c2d4680e9ae80291314,2024-10-11T13:15:19.373000
|
||||
CVE-2024-9539,1,1,8966fc6636af6152e0414eab130e86797be15626adebb04d75d77ec16901db50,2024-10-11T18:15:08.887000
|
||||
CVE-2024-9539,0,0,8966fc6636af6152e0414eab130e86797be15626adebb04d75d77ec16901db50,2024-10-11T18:15:08.887000
|
||||
CVE-2024-9543,0,0,0c6f45a8dc106427c9aa4a27ce0a99c89f29e67e9019a384d028eb17f2682b51,2024-10-11T13:15:19.577000
|
||||
CVE-2024-9549,0,0,de2015c0f448716988568c7b5dd774c121a80649e44094dfa56d887e4c1906a6,2024-10-10T13:14:51.793000
|
||||
CVE-2024-9550,0,0,910b684d766fc00d3bc835188c16842c5e64a2ca110db17b68c67c53481422d4,2024-10-09T11:15:52.520000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user