mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-21 17:41:05 +00:00
Auto-Update: 2024-11-20T15:01:00.197718+00:00
This commit is contained in:
parent
35acd40696
commit
86db3bbb19
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2020-8156",
|
||||
"sourceIdentifier": "support@hackerone.com",
|
||||
"published": "2020-05-12T13:15:13.187",
|
||||
"lastModified": "2023-11-07T03:26:17.397",
|
||||
"lastModified": "2024-11-20T14:49:11.963",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -95,9 +95,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nextcloud:nextcloud_mail:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:a:nextcloud:mail:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "1.1.4",
|
||||
"matchCriteriaId": "18DBCD66-C196-4225-996B-DF83B0AD70EE"
|
||||
"matchCriteriaId": "CD7DB214-639A-4E44-B78F-C2D9753C8D8D"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-32652",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2021-06-01T19:15:07.510",
|
||||
"lastModified": "2021-06-14T17:28:54.357",
|
||||
"lastModified": "2024-11-20T14:49:11.963",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -115,16 +115,16 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nextcloud:nextcloud_mail:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:a:nextcloud:mail:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "1.4.3",
|
||||
"matchCriteriaId": "8F153D12-86FF-459E-BB04-F7082A999B6F"
|
||||
"matchCriteriaId": "BE859DE8-CEF9-4301-B200-CBEFC9903A93"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nextcloud:nextcloud_mail:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:a:nextcloud:mail:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "1.5.5",
|
||||
"versionEndExcluding": "1.8.2",
|
||||
"matchCriteriaId": "E2380FEB-95A0-4B9C-8BEF-5FAB28B9BCFA"
|
||||
"matchCriteriaId": "A3BCBA4C-862E-4DB7-ABEB-5E5005F035AA"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-32707",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2021-07-12T19:15:10.227",
|
||||
"lastModified": "2022-10-25T15:41:29.900",
|
||||
"lastModified": "2024-11-20T14:49:11.963",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -119,9 +119,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nextcloud:nextcloud_mail:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:a:nextcloud:mail:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "1.9.6",
|
||||
"matchCriteriaId": "A9B63965-1AE4-4D3C-B926-FA35314CD585"
|
||||
"matchCriteriaId": "3FB68076-7D5E-4E82-9BDD-548C92BD7447"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-32104",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-07-11T13:15:09.687",
|
||||
"lastModified": "2023-07-18T18:22:27.863",
|
||||
"lastModified": "2024-11-20T14:34:41.430",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -76,9 +76,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mycurator_content_curation_project:mycurator_content_curation:*:*:*:*:*:wordpress:*:*",
|
||||
"criteria": "cpe:2.3:a:target-info:mycurator_content_curation:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "3.74",
|
||||
"matchCriteriaId": "FBEC86B9-D989-4D49-8B6F-8D8CCE6CB7EF"
|
||||
"matchCriteriaId": "5C64DE6B-D61C-4F1A-A3F2-C8D69932584A"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-33184",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2023-05-27T05:15:09.980",
|
||||
"lastModified": "2023-06-02T18:52:18.290",
|
||||
"lastModified": "2024-11-20T14:49:11.963",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -86,24 +86,24 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nextcloud:nextcloud_mail:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:a:nextcloud:mail:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "1.13.0",
|
||||
"versionEndExcluding": "1.15.3",
|
||||
"matchCriteriaId": "506B11C3-92C7-4603-92D3-2744B109B020"
|
||||
"matchCriteriaId": "10ED288F-DD07-4B60-AE0F-786BF82F4ADB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nextcloud:nextcloud_mail:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:a:nextcloud:mail:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2.2.0",
|
||||
"versionEndExcluding": "2.2.5",
|
||||
"matchCriteriaId": "B7A32987-2AE3-4752-BF1D-30CABED09667"
|
||||
"matchCriteriaId": "A87F4309-C10F-41AC-B5BB-0DC0585AB5E1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nextcloud:nextcloud_mail:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:a:nextcloud:mail:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2.3.0",
|
||||
"versionEndExcluding": "3.0.2",
|
||||
"matchCriteriaId": "873B8F92-E210-4354-9CF7-5D97365E0A9E"
|
||||
"matchCriteriaId": "C30FC59F-1EEF-452F-B2E0-3E2B22F2CB02"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
64
CVE-2024/CVE-2024-109xx/CVE-2024-10913.json
Normal file
64
CVE-2024/CVE-2024-109xx/CVE-2024-10913.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2024-10913",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-11-20T14:15:17.253",
|
||||
"lastModified": "2024-11-20T14:15:17.253",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Clone plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 2.4.6 via deserialization of untrusted input in the 'recursive_unserialized_replace' function. This makes it possible for unauthenticated attackers to inject a PHP Object. No known POP chain is present in the vulnerable software. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-502"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/wp-clone-by-wp-academy//tags/2.4.6/lib/icit_srdb_replacer.php#L24",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/wp-clone-by-wp-academy/tags/2.4.7/lib/icit_srdb_replacer.php#L24",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/16569267-ab52-4b96-86f0-d37c470a3938?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-10924",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-11-15T04:15:03.613",
|
||||
"lastModified": "2024-11-19T14:15:17.187",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-11-20T14:44:47.350",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
@ -41,8 +61,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-306"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -51,30 +81,81 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:really-simple-plugins:really_simple_security:*:*:*:*:-:wordpress:*:*",
|
||||
"versionStartIncluding": "9.0.0",
|
||||
"versionEndExcluding": "9.1.2",
|
||||
"matchCriteriaId": "2BD11D73-4867-4592-BFCE-16777EFCB18A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:really-simple-plugins:really_simple_security:*:*:*:*:pro:wordpress:*:*",
|
||||
"versionStartIncluding": "9.0.0",
|
||||
"versionEndExcluding": "9.1.2",
|
||||
"matchCriteriaId": "47BB227E-A208-49DE-8FC8-F62EC99D7818"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:really-simple-plugins:really_simple_security:*:*:*:*:pro_multisite:wordpress:*:*",
|
||||
"versionStartIncluding": "9.0.0",
|
||||
"versionEndExcluding": "9.1.2",
|
||||
"matchCriteriaId": "9FAA4AD2-27FA-4DEA-BDB2-DE61EE6A0A7F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/really-simple-ssl/tags/9.1.1.1/security/wordpress/two-fa/class-rsssl-two-factor-on-board-api.php#L277",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/really-simple-ssl/tags/9.1.1.1/security/wordpress/two-fa/class-rsssl-two-factor-on-board-api.php#L278",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/really-simple-ssl/tags/9.1.1.1/security/wordpress/two-fa/class-rsssl-two-factor-on-board-api.php#L67",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3188431/really-simple-ssl",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/blog/2024/11/really-simple-security-vulnerability/",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7d5d05ad-1a7a-43d2-bbbf-597e975446be?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
16
CVE-2024/CVE-2024-110xx/CVE-2024-11086.json
Normal file
16
CVE-2024/CVE-2024-110xx/CVE-2024-11086.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2024-11086",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-11-20T13:15:04.020",
|
||||
"lastModified": "2024-11-20T13:15:04.020",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: This candidate was issued in error. Notes: All references and descriptions in this candidate have been removed to prevent accidental usage."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
68
CVE-2024/CVE-2024-111xx/CVE-2024-11154.json
Normal file
68
CVE-2024/CVE-2024-111xx/CVE-2024-11154.json
Normal file
@ -0,0 +1,68 @@
|
||||
{
|
||||
"id": "CVE-2024-11154",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-11-20T14:15:17.500",
|
||||
"lastModified": "2024-11-20T14:15:17.500",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The PublishPress Revisions: Duplicate Posts, Submit, Approve and Schedule Content Changes plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.5.15 via the 'actAjaxRevisionDiffs' function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to extract sensitive data including revisions of posts and pages."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/publishpress/PublishPress-Revisions/blob/master/admin/history_rvy.php#L322",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/revisionary/trunk/admin/history_rvy.php#L322",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3192492/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c785b7a0-5091-4d89-87d3-cd7d9984553e?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-11244",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-11-15T16:15:32.790",
|
||||
"lastModified": "2024-11-18T17:11:56.587",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-11-20T14:36:24.190",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -110,8 +130,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -124,26 +154,63 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:anisha:farmacia:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B8C68FD0-0D27-4525-8289-0526E4F5B6E6"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://code-projects.org/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/zsx020121/cve/blob/main/sql.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.284680",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.284680",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.443177",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-11245",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-11-15T16:15:33.153",
|
||||
"lastModified": "2024-11-18T17:11:56.587",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-11-20T14:36:11.557",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -110,8 +130,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -124,26 +154,63 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:anisha:farmacia:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B8C68FD0-0D27-4525-8289-0526E4F5B6E6"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://code-projects.org/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/WEFNNTT/cve/blob/main/sql.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.284681",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.284681",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.443188",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-11246",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-11-15T16:15:33.593",
|
||||
"lastModified": "2024-11-18T17:11:56.587",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-11-20T14:35:51.070",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -110,8 +130,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -124,26 +154,62 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:anisha:farmacia:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B8C68FD0-0D27-4525-8289-0526E4F5B6E6"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://code-projects.org/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/curry136/cve/blob/main/xss8.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.284682",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.284682",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.443189",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-11319",
|
||||
"sourceIdentifier": "iletisim@usom.gov.tr",
|
||||
"published": "2024-11-18T12:15:17.853",
|
||||
"lastModified": "2024-11-20T08:15:14.350",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-11-20T14:59:38.297",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -62,8 +62,28 @@
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "iletisim@usom.gov.tr",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "iletisim@usom.gov.tr",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N",
|
||||
@ -83,7 +103,7 @@
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
|
||||
@ -115,22 +135,66 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:django-cms:django_cms:3.11.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8C7A895F-6104-4C5B-80E1-6904CE725135"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:django-cms:django_cms:3.11.8:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4CE4E0AB-00D9-4903-BF59-AE59032AEB10"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:django-cms:django_cms:4.1.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "911EF8C6-5F3D-4810-8D53-870C6E4BE2E7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:django-cms:django_cms:4.1.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6D28F950-5E1C-4AE7-80B4-2DFC4A96829F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/django-cms/django-cms/commit/241d1cbe47a68f5d271ce4d27ad5e32e2c360ec3",
|
||||
"source": "iletisim@usom.gov.tr"
|
||||
"source": "iletisim@usom.gov.tr",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://iltosec.com/blog/post/django-cms-413-stored-xss-vulnerability-exploiting-the-page-title-field/",
|
||||
"source": "iletisim@usom.gov.tr"
|
||||
"source": "iletisim@usom.gov.tr",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.django-cms.org/en/blog/2024/11/13/django-cms-security-update/",
|
||||
"source": "iletisim@usom.gov.tr"
|
||||
"source": "iletisim@usom.gov.tr",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.usom.gov.tr/bildirim/tr-24-1859",
|
||||
"source": "iletisim@usom.gov.tr"
|
||||
"source": "iletisim@usom.gov.tr",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-11404",
|
||||
"sourceIdentifier": "iletisim@usom.gov.tr",
|
||||
"published": "2024-11-20T12:15:18.640",
|
||||
"lastModified": "2024-11-20T12:15:18.640",
|
||||
"lastModified": "2024-11-20T14:15:17.750",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -57,7 +57,7 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://iltosec.com/blog/post/djangocms-attributes-field-300-stored-xss-vulnerability/",
|
||||
"url": "https://iltosec.com/blog/post/cve-2024-11404-medium-severity-file-upload-vulnerabilities-in-django-filer-323/",
|
||||
"source": "iletisim@usom.gov.tr"
|
||||
},
|
||||
{
|
||||
|
56
CVE-2024/CVE-2024-114xx/CVE-2024-11495.json
Normal file
56
CVE-2024/CVE-2024-114xx/CVE-2024-11495.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-11495",
|
||||
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||
"published": "2024-11-20T13:15:04.197",
|
||||
"lastModified": "2024-11-20T13:15:04.197",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Buffer overflow vulnerability in OllyDbg, version 1.10, which could allow a local attacker to execute arbitrary code due to lack of proper bounds checking."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-119"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/buffer-overflow-ollydbg",
|
||||
"source": "cve-coordination@incibe.es"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-20538",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-11-06T17:15:19.563",
|
||||
"lastModified": "2024-11-06T18:17:17.287",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-11-20T14:36:01.810",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,175 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.0.0:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A1063044-BCD7-487F-9880-141C30547E36"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DA42E65A-7207-48B8-BE1B-0B352201BC09"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "75DDAF38-4D5F-4EE4-A428-68D28FC0DA96"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C5FB6AA6-F8C9-48A6-BDDA-1D25C43564EB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2B3A267A-5FEA-426D-903E-BD3F4F94A1A4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch5:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B1B3207B-1B9C-41AA-8EF6-8478458462E7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch6:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C5B9E7F3-B0F2-4A6A-B939-A62E9B12CCEB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch7:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EF4C5A58-D0AE-48D6-9757-18C1D5BE5070"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch8:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0DB3133B-FBE4-47F3-88FD-9AC02AFB7EBB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7A789B44-7E6C-4FE9-BD40-702A871AB8AC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "93920663-445E-4456-A905-81CEC6CA1833"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "33DA5BB8-4CFE-44BD-9CEB-BC26577E8477"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D3AEFA85-66B5-4145-A4AD-96D1FF86B46D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7A6A0697-6A9E-48EF-82D8-36C75E0CDFDC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch5:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E939B65A-7912-4C36-8799-03A1526D7BD3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch6:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "833B438F-0869-4C0D-9952-750C00702E8D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch7:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E8B2588D-01F9-450B-B2E3-ADC4125E354E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch8:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E41016C0-19E6-4BCC-A8DD-F6C9A2B0003E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch9:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "654E946A-07C5-4036-BC54-85EF42B808DD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7932D5D5-83E1-4BEF-845A-D0783D4BB750"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1B818846-4A6E-4256-B344-281E8C786C43"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A44858A2-922A-425A-8B38-0C47DB911A3C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "53484A32-757B-42F8-B655-554C34222060"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0CCAC61F-C273-49B3-A631-31D3AE3EB148"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch5:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "51AEFCE6-FB4A-4B1C-A23D-83CC3CF3FBBD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch6:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B452B4F0-8510-475E-9AE8-B48FABB4D7D3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.3.0:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F1B9C2C1-59A4-49A0-9B74-83CCB063E55D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.3.0:patch1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DFD29A0B-0D75-4EAB-BCE0-79450EC75DD0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.3.0:patch2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E6C94CC4-CC08-4DAF-A606-FDAFC92720A9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.3.0:patch3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BB069EA3-7B8C-42B5-8035-2EE5ED3F56E4"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-auth-bypass-BBRf7mkE",
|
||||
"source": "ykramarz@cisco.com"
|
||||
"source": "ykramarz@cisco.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-41784",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-11-15T16:15:34.240",
|
||||
"lastModified": "2024-11-18T17:11:56.587",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-11-20T14:35:10.117",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -41,8 +41,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -51,10 +61,50 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:sterling_secure_proxy:6.0.0.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9D950A8E-5DCF-4EA2-B99F-D5B7FF3A99BC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:sterling_secure_proxy:6.0.1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "87CFA6CB-3A0A-4B86-A0AA-CA71E800606E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:sterling_secure_proxy:6.0.2.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "405F0826-9205-48F8-9664-800212ECD411"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:sterling_secure_proxy:6.0.3.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "69654CFD-6AB4-419C-AE91-C9FBF689A23B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:sterling_secure_proxy:6.1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E0B0F6B8-AA14-4594-87C5-168550B633F2"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7173631",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-46823",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-09-27T13:15:14.897",
|
||||
"lastModified": "2024-09-30T12:45:57.823",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-11-20T13:59:52.723",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,15 +15,89 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: kunit/overflow: Arreglar UB en overflow_allocation_test La matriz 'device_name' no existe fuera del \u00e1mbito de la funci\u00f3n 'overflow_allocation_test'. Sin embargo, se est\u00e1 utilizando como nombre de controlador al llamar a 'kunit_driver_create' desde 'kunit_device_register'. Produce el p\u00e1nico del kernel con KASAN habilitado. Dado que esta variable se utiliza en un solo lugar, elim\u00ednela y pase el nombre del dispositivo a kunit_device_register directamente como una cadena ascii."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.10.10",
|
||||
"matchCriteriaId": "75C6119D-9E8D-431D-813F-FE84579072CB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4DEB27E7-30AA-45CC-8934-B89263EF3551"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E0005AEF-856E-47EB-BFE4-90C46899394D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/92e9bac18124682c4b99ede9ee3bcdd68f121e92",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/d1207f07decc66546a7fa463d2f335a856c986ef",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-48896",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-11-18T12:15:18.093",
|
||||
"lastModified": "2024-11-18T17:11:17.393",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-11-20T14:47:12.777",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,52 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "4.1.14",
|
||||
"matchCriteriaId": "A2D74BD7-3907-49E1-B2FC-A45108CB5AF0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.2.0",
|
||||
"versionEndIncluding": "4.2.11",
|
||||
"matchCriteriaId": "CCE4F475-9272-4891-B690-3AB9720CD2D8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.3.0",
|
||||
"versionEndIncluding": "4.3.8",
|
||||
"matchCriteriaId": "A6A31566-F7AD-4FD4-82A6-CCE0D52123B8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.4.0",
|
||||
"versionEndIncluding": "4.4.4",
|
||||
"matchCriteriaId": "E073E9C6-D72C-4C82-92AF-6C02B81EB28B"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318822",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Issue Tracking"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-48897",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-11-18T12:15:18.243",
|
||||
"lastModified": "2024-11-19T15:35:09.867",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-11-20T14:48:25.373",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -41,8 +61,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -51,10 +81,52 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "4.1.14",
|
||||
"matchCriteriaId": "A2D74BD7-3907-49E1-B2FC-A45108CB5AF0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.2.0",
|
||||
"versionEndIncluding": "4.2.11",
|
||||
"matchCriteriaId": "CCE4F475-9272-4891-B690-3AB9720CD2D8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.3.0",
|
||||
"versionEndIncluding": "4.3.8",
|
||||
"matchCriteriaId": "A6A31566-F7AD-4FD4-82A6-CCE0D52123B8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.4.0",
|
||||
"versionEndIncluding": "4.4.4",
|
||||
"matchCriteriaId": "E073E9C6-D72C-4C82-92AF-6C02B81EB28B"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318821",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Issue Tracking"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-48898",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-11-18T12:15:18.363",
|
||||
"lastModified": "2024-11-18T17:11:17.393",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-11-20T14:46:16.237",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,52 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "4.1.14",
|
||||
"matchCriteriaId": "A2D74BD7-3907-49E1-B2FC-A45108CB5AF0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.2.0",
|
||||
"versionEndIncluding": "4.2.11",
|
||||
"matchCriteriaId": "CCE4F475-9272-4891-B690-3AB9720CD2D8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.3.0",
|
||||
"versionEndIncluding": "4.3.8",
|
||||
"matchCriteriaId": "A6A31566-F7AD-4FD4-82A6-CCE0D52123B8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.4.0",
|
||||
"versionEndIncluding": "4.4.4",
|
||||
"matchCriteriaId": "E073E9C6-D72C-4C82-92AF-6C02B81EB28B"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318820",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Issue Tracking"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-48901",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-11-18T12:15:18.493",
|
||||
"lastModified": "2024-11-18T17:11:17.393",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-11-20T14:45:10.380",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -41,8 +61,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -51,10 +81,52 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "4.1.14",
|
||||
"matchCriteriaId": "A2D74BD7-3907-49E1-B2FC-A45108CB5AF0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.2.0",
|
||||
"versionEndIncluding": "4.2.11",
|
||||
"matchCriteriaId": "CCE4F475-9272-4891-B690-3AB9720CD2D8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.3.0",
|
||||
"versionEndIncluding": "4.3.8",
|
||||
"matchCriteriaId": "A6A31566-F7AD-4FD4-82A6-CCE0D52123B8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.4.0",
|
||||
"versionEndIncluding": "4.4.4",
|
||||
"matchCriteriaId": "E073E9C6-D72C-4C82-92AF-6C02B81EB28B"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318817",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Issue Tracking"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-49758",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-11-15T16:15:34.880",
|
||||
"lastModified": "2024-11-18T17:11:56.587",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-11-20T14:40:36.990",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -51,14 +71,39 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:librenms:librenms:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "24.10.0",
|
||||
"matchCriteriaId": "B4BD88D2-5DA7-450B-AEFA-33BCA61685A7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/librenms/librenms/commit/24b142d753898e273ec20b542a27dd6eb530c7d8",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/librenms/librenms/security/advisories/GHSA-c86q-rj37-8f85",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-49759",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-11-15T16:15:35.100",
|
||||
"lastModified": "2024-11-18T17:11:56.587",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-11-20T14:40:17.500",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -51,14 +71,39 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:librenms:librenms:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "24.10.0",
|
||||
"matchCriteriaId": "B4BD88D2-5DA7-450B-AEFA-33BCA61685A7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/librenms/librenms/commit/237f4d2e818170171dfad6efad36a275cd2ba8d0",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/librenms/librenms/security/advisories/GHSA-888j-pjqh-fx58",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-49764",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-11-15T16:15:35.323",
|
||||
"lastModified": "2024-11-18T17:11:56.587",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-11-20T14:40:02.630",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -51,14 +71,39 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:librenms:librenms:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "24.10.0",
|
||||
"matchCriteriaId": "B4BD88D2-5DA7-450B-AEFA-33BCA61685A7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/librenms/librenms/commit/af15eabbb1752985d36f337cecf137a947e170f6",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/librenms/librenms/security/advisories/GHSA-rmr4-x6c9-jc68",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-50156",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-11-07T10:15:07.127",
|
||||
"lastModified": "2024-11-08T19:01:03.880",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-11-20T13:58:04.447",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,27 +15,132 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/msm: Evitar la desreferenciaci\u00f3n NULL en msm_disp_state_print_regs() Si la asignaci\u00f3n en msm_disp_state_dump_regs() falla, entonces `block->state` puede ser NULL. La funci\u00f3n msm_disp_state_print_regs() _s\u00ed_ tiene c\u00f3digo para intentar manejarlo con: if (*reg) dump_addr = *reg; ...pero como \"dump_addr\" se inicializa a NULL, lo anterior es en realidad un noop. Luego, el c\u00f3digo contin\u00faa para desreferenciar `dump_addr`. Haga que la funci\u00f3n imprima \"Registros no almacenados\" cuando vea un NULL para resolver esto. Ya que estamos tocando el c\u00f3digo, arregle msm_disp_state_print_regs() para que no tome un puntero doble sin sentido y marque correctamente el puntero como `const`. Parche: https://patchwork.freedesktop.org/patch/619657/"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.14",
|
||||
"versionEndExcluding": "5.15.170",
|
||||
"matchCriteriaId": "53E8194F-DD7E-4112-80DD-3E7EF9172D6D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "6.1.115",
|
||||
"matchCriteriaId": "C08A77A6-E42E-4EFD-B5A1-2BF6CBBB42AE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2",
|
||||
"versionEndExcluding": "6.6.59",
|
||||
"matchCriteriaId": "5D15CA59-D15C-4ACD-8B03-A072DEAD2081"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.11.6",
|
||||
"matchCriteriaId": "E4486B12-007B-4794-9857-F07145637AA1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7F361E1D-580F-4A2D-A509-7615F73167A1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "925478D0-3E3D-4E6F-ACD5-09F28D5DF82C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3C95E234-D335-4B6C-96BF-E2CEBD8654ED"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/293f53263266bc4340d777268ab4328a97f041fa",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/42cf045086feae77b212f0f66e742b91a5b566b7",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/563aa81fd66a4e7e6e551a0e02bcc23957cafe2f",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/e8e9f2a12a6214080c8ea83220a596f6e1dedc6c",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/f7ad916273483748582d97cfa31054ccb19224f3",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-50350",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-11-15T16:15:35.537",
|
||||
"lastModified": "2024-11-18T17:11:56.587",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-11-20T14:39:51.533",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -51,14 +71,39 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:librenms:librenms:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "24.10.0",
|
||||
"matchCriteriaId": "B4BD88D2-5DA7-450B-AEFA-33BCA61685A7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/librenms/librenms/commit/82a744bfe29017b8b58b5752ab9e1b335bedf0a0",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/librenms/librenms/security/advisories/GHSA-xh4g-c9p6-5jxg",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-50352",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-11-15T16:15:35.960",
|
||||
"lastModified": "2024-11-18T17:11:56.587",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-11-20T14:37:42.660",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -51,14 +71,39 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:librenms:librenms:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "24.10.0",
|
||||
"matchCriteriaId": "B4BD88D2-5DA7-450B-AEFA-33BCA61685A7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/librenms/librenms/commit/b4af778ca42c5839801f16ece53505bb7fa1e7bc",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/librenms/librenms/security/advisories/GHSA-qr8f-5qqg-j3wg",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-50355",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-11-15T16:15:36.160",
|
||||
"lastModified": "2024-11-18T17:11:56.587",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-11-20T14:39:36.550",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -51,14 +81,39 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:librenms:librenms:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "24.10.0",
|
||||
"matchCriteriaId": "B4BD88D2-5DA7-450B-AEFA-33BCA61685A7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/librenms/librenms/commit/bb4731419b592867bf974dde525e536606a52976",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/librenms/librenms/security/advisories/GHSA-4m5r-w2rq-q54q",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-51494",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-11-15T16:15:37.140",
|
||||
"lastModified": "2024-11-18T17:11:56.587",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-11-20T14:40:56.067",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -51,14 +71,39 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:librenms:librenms:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "24.10.0",
|
||||
"matchCriteriaId": "B4BD88D2-5DA7-450B-AEFA-33BCA61685A7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/librenms/librenms/commit/82a744bfe29017b8b58b5752ab9e1b335bedf0a0",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/librenms/librenms/security/advisories/GHSA-7663-37rg-c377",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-51495",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-11-15T16:15:37.343",
|
||||
"lastModified": "2024-11-18T17:11:56.587",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-11-20T14:41:07.960",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -51,14 +71,39 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:librenms:librenms:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "24.10.0",
|
||||
"matchCriteriaId": "B4BD88D2-5DA7-450B-AEFA-33BCA61685A7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/librenms/librenms/commit/4568188ce9097a2e3a3b563311077f2bb82455c0",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/librenms/librenms/security/advisories/GHSA-p66q-ppwr-q5j8",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-51497",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-11-15T16:15:37.770",
|
||||
"lastModified": "2024-11-18T17:11:56.587",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-11-20T14:41:19.953",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -51,14 +71,39 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:librenms:librenms:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "24.10.0",
|
||||
"matchCriteriaId": "B4BD88D2-5DA7-450B-AEFA-33BCA61685A7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/librenms/librenms/commit/42b156e42a3811c23758772ce8c63d4d3eaba59b",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/librenms/librenms/security/advisories/GHSA-gv4m-f6fx-859x",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-52423",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-11-18T16:15:26.160",
|
||||
"lastModified": "2024-11-18T17:11:17.393",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-11-20T14:56:13.147",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:themify:builder:*:*:*:*:-:wordpress:*:*",
|
||||
"versionEndIncluding": "7.6.3",
|
||||
"matchCriteriaId": "63EC51F8-AE05-4994-924D-7AA2D8ECE697"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/themify-builder/wordpress-themify-builder-plugin-7-6-3-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-52424",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-11-18T16:15:26.380",
|
||||
"lastModified": "2024-11-18T17:11:17.393",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-11-20T14:47:46.877",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,30 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sureshkumar:wp-login_customizer:1.0:*:*:*:*:wordpress:*:*",
|
||||
"matchCriteriaId": "F32E2827-38B9-4250-AC3B-2CFEAD6E5ECF"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/wp-login-customizer/wordpress-wp-login-customizer-plugin-1-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-52425",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-11-18T16:15:26.600",
|
||||
"lastModified": "2024-11-18T17:11:17.393",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-11-20T14:43:05.467",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:urchenko:drozd:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "1.1.1",
|
||||
"matchCriteriaId": "C552CBF6-F527-43EB-9556-143FE2A5FD4B"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/drozd-addons-for-elementor/wordpress-drozd-addons-for-elementor-plugin-1-1-1-stored-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-52426",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-11-18T16:15:26.830",
|
||||
"lastModified": "2024-11-18T17:11:17.393",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-11-20T14:41:43.077",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:linear:linear:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "2.7.11",
|
||||
"matchCriteriaId": "50A20817-4FAD-43BB-BBEC-DEAAADAB10A3"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/linear/wordpress-linear-plugin-2-7-11-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-52526",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-11-15T16:15:38.107",
|
||||
"lastModified": "2024-11-18T17:11:56.587",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-11-20T14:39:19.647",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -51,14 +71,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:librenms:librenms:24.10.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9FF645CB-ED81-4015-837B-85149178D0EC"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/librenms/librenms/commit/30e522c29bbb1f9b72951025e7049a26c7e1d76e",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/librenms/librenms/security/advisories/GHSA-8fh4-942r-jf2g",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-52565",
|
||||
"sourceIdentifier": "productcert@siemens.com",
|
||||
"published": "2024-11-18T16:15:27.020",
|
||||
"lastModified": "2024-11-18T17:11:17.393",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-11-20T14:33:29.197",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -95,10 +95,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:siemens:tecnomatix_plant_simulation:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "2302.0018",
|
||||
"matchCriteriaId": "9CB96290-C77A-4C14-9E5B-4F99DB187B31"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:siemens:tecnomatix_plant_simulation:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2404.0",
|
||||
"versionEndExcluding": "2404.0007",
|
||||
"matchCriteriaId": "49153630-5A8F-429E-A5AA-8D0C1737D166"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cert-portal.siemens.com/productcert/html/ssa-824503.html",
|
||||
"source": "productcert@siemens.com"
|
||||
"source": "productcert@siemens.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-52566",
|
||||
"sourceIdentifier": "productcert@siemens.com",
|
||||
"published": "2024-11-18T16:15:27.287",
|
||||
"lastModified": "2024-11-18T17:11:17.393",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-11-20T14:33:20.813",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -95,10 +95,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:siemens:tecnomatix_plant_simulation:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "2302.0018",
|
||||
"matchCriteriaId": "9CB96290-C77A-4C14-9E5B-4F99DB187B31"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:siemens:tecnomatix_plant_simulation:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2404.0",
|
||||
"versionEndExcluding": "2404.0007",
|
||||
"matchCriteriaId": "49153630-5A8F-429E-A5AA-8D0C1737D166"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cert-portal.siemens.com/productcert/html/ssa-824503.html",
|
||||
"source": "productcert@siemens.com"
|
||||
"source": "productcert@siemens.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-52567",
|
||||
"sourceIdentifier": "productcert@siemens.com",
|
||||
"published": "2024-11-18T16:15:27.537",
|
||||
"lastModified": "2024-11-18T17:11:17.393",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-11-20T14:33:09.433",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -95,10 +95,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:siemens:tecnomatix_plant_simulation:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "2302.0018",
|
||||
"matchCriteriaId": "9CB96290-C77A-4C14-9E5B-4F99DB187B31"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:siemens:tecnomatix_plant_simulation:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2404.0",
|
||||
"versionEndExcluding": "2404.0007",
|
||||
"matchCriteriaId": "49153630-5A8F-429E-A5AA-8D0C1737D166"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cert-portal.siemens.com/productcert/html/ssa-824503.html",
|
||||
"source": "productcert@siemens.com"
|
||||
"source": "productcert@siemens.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-52568",
|
||||
"sourceIdentifier": "productcert@siemens.com",
|
||||
"published": "2024-11-18T16:15:27.773",
|
||||
"lastModified": "2024-11-18T17:11:17.393",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-11-20T14:32:58.637",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -95,10 +95,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:siemens:tecnomatix_plant_simulation:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "2302.0018",
|
||||
"matchCriteriaId": "9CB96290-C77A-4C14-9E5B-4F99DB187B31"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:siemens:tecnomatix_plant_simulation:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2404.0",
|
||||
"versionEndExcluding": "2404.0007",
|
||||
"matchCriteriaId": "49153630-5A8F-429E-A5AA-8D0C1737D166"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cert-portal.siemens.com/productcert/html/ssa-824503.html",
|
||||
"source": "productcert@siemens.com"
|
||||
"source": "productcert@siemens.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-52569",
|
||||
"sourceIdentifier": "productcert@siemens.com",
|
||||
"published": "2024-11-18T16:15:28.063",
|
||||
"lastModified": "2024-11-18T17:11:17.393",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-11-20T14:32:48.897",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -95,10 +95,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:siemens:tecnomatix_plant_simulation:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "2302.0018",
|
||||
"matchCriteriaId": "9CB96290-C77A-4C14-9E5B-4F99DB187B31"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:siemens:tecnomatix_plant_simulation:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2404.0",
|
||||
"versionEndExcluding": "2404.0007",
|
||||
"matchCriteriaId": "49153630-5A8F-429E-A5AA-8D0C1737D166"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cert-portal.siemens.com/productcert/html/ssa-824503.html",
|
||||
"source": "productcert@siemens.com"
|
||||
"source": "productcert@siemens.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-52570",
|
||||
"sourceIdentifier": "productcert@siemens.com",
|
||||
"published": "2024-11-18T16:15:28.300",
|
||||
"lastModified": "2024-11-18T17:11:17.393",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-11-20T14:32:38.000",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -95,10 +95,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:siemens:tecnomatix_plant_simulation:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "2302.0018",
|
||||
"matchCriteriaId": "9CB96290-C77A-4C14-9E5B-4F99DB187B31"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:siemens:tecnomatix_plant_simulation:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2404.0",
|
||||
"versionEndExcluding": "2404.0007",
|
||||
"matchCriteriaId": "49153630-5A8F-429E-A5AA-8D0C1737D166"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cert-portal.siemens.com/productcert/html/ssa-824503.html",
|
||||
"source": "productcert@siemens.com"
|
||||
"source": "productcert@siemens.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-52571",
|
||||
"sourceIdentifier": "productcert@siemens.com",
|
||||
"published": "2024-11-18T16:15:28.533",
|
||||
"lastModified": "2024-11-18T17:11:17.393",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-11-20T14:32:29.867",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -95,10 +95,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:siemens:tecnomatix_plant_simulation:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "2302.0018",
|
||||
"matchCriteriaId": "9CB96290-C77A-4C14-9E5B-4F99DB187B31"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:siemens:tecnomatix_plant_simulation:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2404.0",
|
||||
"versionEndExcluding": "2404.0007",
|
||||
"matchCriteriaId": "49153630-5A8F-429E-A5AA-8D0C1737D166"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cert-portal.siemens.com/productcert/html/ssa-824503.html",
|
||||
"source": "productcert@siemens.com"
|
||||
"source": "productcert@siemens.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-52572",
|
||||
"sourceIdentifier": "productcert@siemens.com",
|
||||
"published": "2024-11-18T16:15:28.767",
|
||||
"lastModified": "2024-11-18T17:11:17.393",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-11-20T14:32:21.533",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "productcert@siemens.com",
|
||||
"type": "Secondary",
|
||||
@ -85,8 +105,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "productcert@siemens.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "productcert@siemens.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -95,10 +125,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:siemens:tecnomatix_plant_simulation:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "2302.0018",
|
||||
"matchCriteriaId": "9CB96290-C77A-4C14-9E5B-4F99DB187B31"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:siemens:tecnomatix_plant_simulation:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2404.0",
|
||||
"versionEndExcluding": "2404.0007",
|
||||
"matchCriteriaId": "49153630-5A8F-429E-A5AA-8D0C1737D166"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cert-portal.siemens.com/productcert/html/ssa-824503.html",
|
||||
"source": "productcert@siemens.com"
|
||||
"source": "productcert@siemens.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-52573",
|
||||
"sourceIdentifier": "productcert@siemens.com",
|
||||
"published": "2024-11-18T16:15:29.110",
|
||||
"lastModified": "2024-11-18T17:11:17.393",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-11-20T14:32:11.853",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -95,10 +95,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:siemens:tecnomatix_plant_simulation:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "2302.0018",
|
||||
"matchCriteriaId": "9CB96290-C77A-4C14-9E5B-4F99DB187B31"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:siemens:tecnomatix_plant_simulation:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2404.0",
|
||||
"versionEndExcluding": "2404.0007",
|
||||
"matchCriteriaId": "49153630-5A8F-429E-A5AA-8D0C1737D166"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cert-portal.siemens.com/productcert/html/ssa-824503.html",
|
||||
"source": "productcert@siemens.com"
|
||||
"source": "productcert@siemens.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-52574",
|
||||
"sourceIdentifier": "productcert@siemens.com",
|
||||
"published": "2024-11-18T16:15:29.400",
|
||||
"lastModified": "2024-11-18T17:11:17.393",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-11-20T14:31:47.103",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -95,10 +95,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:siemens:tecnomatix_plant_simulation:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "2302.0018",
|
||||
"matchCriteriaId": "9CB96290-C77A-4C14-9E5B-4F99DB187B31"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:siemens:tecnomatix_plant_simulation:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2404.0",
|
||||
"versionEndExcluding": "2404.0007",
|
||||
"matchCriteriaId": "49153630-5A8F-429E-A5AA-8D0C1737D166"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cert-portal.siemens.com/productcert/html/ssa-824503.html",
|
||||
"source": "productcert@siemens.com"
|
||||
"source": "productcert@siemens.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2024/CVE-2024-525xx/CVE-2024-52597.json
Normal file
64
CVE-2024/CVE-2024-525xx/CVE-2024-52597.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2024-52597",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-11-20T14:15:17.967",
|
||||
"lastModified": "2024-11-20T14:15:17.967",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "2FAuth is a web app to manage Two-Factor Authentication (2FA) accounts and generate their security codes. Versions prior to 5.4.1 are vulnerable to stored cross-site scripting due to improper headers in direct access to uploaded SVGs. The application allows uploading images in several places. One of the accepted types of image is SVG, which allows JS scripting. Therefore, by uploading a malicious SVG which contains JS code, an attacker which is able to drive a victim to the uploaded image could compromise that victim's session and access to their tokens. Version 5.4.1 contains a patch for the issue."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-80"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Bubka/2FAuth/commit/93c508e118f483f3c93ac36e1f91face95af642d",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/Bubka/2FAuth/security/advisories/GHSA-q5p4-6q4v-gqg3",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
78
CVE-2024/CVE-2024-94xx/CVE-2024-9478.json
Normal file
78
CVE-2024/CVE-2024-94xx/CVE-2024-9478.json
Normal file
@ -0,0 +1,78 @@
|
||||
{
|
||||
"id": "CVE-2024-9478",
|
||||
"sourceIdentifier": "80f39f49-2521-4ee7-9e17-af5d55e8032f",
|
||||
"published": "2024-11-20T14:15:18.207",
|
||||
"lastModified": "2024-11-20T14:15:18.207",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Privilege Management vulnerability in upKeeper Solutions upKeeper Instant Privilege Access allows Privilege Escalation.This issue affects upKeeper Instant Privilege Access: before 1.2."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "80f39f49-2521-4ee7-9e17-af5d55e8032f",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "HIGH",
|
||||
"vulnerableSystemIntegrity": "HIGH",
|
||||
"vulnerableSystemAvailability": "HIGH",
|
||||
"subsequentSystemConfidentiality": "HIGH",
|
||||
"subsequentSystemIntegrity": "HIGH",
|
||||
"subsequentSystemAvailability": "HIGH",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 10.0,
|
||||
"baseSeverity": "CRITICAL"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "80f39f49-2521-4ee7-9e17-af5d55e8032f",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.upkeeper.se/hc/en-us/articles/17007638130716-CVE-2024-9478-Improper-Privilege-Management-Process",
|
||||
"source": "80f39f49-2521-4ee7-9e17-af5d55e8032f"
|
||||
}
|
||||
]
|
||||
}
|
78
CVE-2024/CVE-2024-94xx/CVE-2024-9479.json
Normal file
78
CVE-2024/CVE-2024-94xx/CVE-2024-9479.json
Normal file
@ -0,0 +1,78 @@
|
||||
{
|
||||
"id": "CVE-2024-9479",
|
||||
"sourceIdentifier": "80f39f49-2521-4ee7-9e17-af5d55e8032f",
|
||||
"published": "2024-11-20T14:15:18.350",
|
||||
"lastModified": "2024-11-20T14:15:18.350",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Privilege Management vulnerability in upKeeper Solutions upKeeper Instant Privilege Access allows Privilege Escalation.This issue affects upKeeper Instant Privilege Access: before 1.2."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "80f39f49-2521-4ee7-9e17-af5d55e8032f",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "HIGH",
|
||||
"vulnerableSystemIntegrity": "HIGH",
|
||||
"vulnerableSystemAvailability": "HIGH",
|
||||
"subsequentSystemConfidentiality": "HIGH",
|
||||
"subsequentSystemIntegrity": "HIGH",
|
||||
"subsequentSystemAvailability": "HIGH",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 10.0,
|
||||
"baseSeverity": "CRITICAL"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "80f39f49-2521-4ee7-9e17-af5d55e8032f",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.upkeeper.se/hc/en-us/articles/17007729905436-CVE-2024-9479-Improper-Privilege-Management-Subprocess",
|
||||
"source": "80f39f49-2521-4ee7-9e17-af5d55e8032f"
|
||||
}
|
||||
]
|
||||
}
|
72
README.md
72
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-11-20T13:00:28.558888+00:00
|
||||
2024-11-20T15:01:00.197718+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-11-20T12:45:36.293000+00:00
|
||||
2024-11-20T14:59:38.297000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,49 +33,51 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
270694
|
||||
270701
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `24`
|
||||
Recently added CVEs: `7`
|
||||
|
||||
- [CVE-2024-10382](CVE-2024/CVE-2024-103xx/CVE-2024-10382.json) (`2024-11-20T11:15:04.280`)
|
||||
- [CVE-2024-10520](CVE-2024/CVE-2024-105xx/CVE-2024-10520.json) (`2024-11-20T12:15:18.390`)
|
||||
- [CVE-2024-10872](CVE-2024/CVE-2024-108xx/CVE-2024-10872.json) (`2024-11-20T11:15:04.927`)
|
||||
- [CVE-2024-11404](CVE-2024/CVE-2024-114xx/CVE-2024-11404.json) (`2024-11-20T12:15:18.640`)
|
||||
- [CVE-2024-11406](CVE-2024/CVE-2024-114xx/CVE-2024-11406.json) (`2024-11-20T12:15:18.890`)
|
||||
- [CVE-2024-45689](CVE-2024/CVE-2024-456xx/CVE-2024-45689.json) (`2024-11-20T11:15:05.337`)
|
||||
- [CVE-2024-45690](CVE-2024/CVE-2024-456xx/CVE-2024-45690.json) (`2024-11-20T11:15:05.413`)
|
||||
- [CVE-2024-45691](CVE-2024/CVE-2024-456xx/CVE-2024-45691.json) (`2024-11-20T11:15:05.490`)
|
||||
- [CVE-2024-48899](CVE-2024/CVE-2024-488xx/CVE-2024-48899.json) (`2024-11-20T11:15:05.563`)
|
||||
- [CVE-2024-52437](CVE-2024/CVE-2024-524xx/CVE-2024-52437.json) (`2024-11-20T12:15:19.133`)
|
||||
- [CVE-2024-52438](CVE-2024/CVE-2024-524xx/CVE-2024-52438.json) (`2024-11-20T12:15:19.390`)
|
||||
- [CVE-2024-52439](CVE-2024/CVE-2024-524xx/CVE-2024-52439.json) (`2024-11-20T12:15:19.637`)
|
||||
- [CVE-2024-52440](CVE-2024/CVE-2024-524xx/CVE-2024-52440.json) (`2024-11-20T12:15:19.870`)
|
||||
- [CVE-2024-52441](CVE-2024/CVE-2024-524xx/CVE-2024-52441.json) (`2024-11-20T12:15:20.110`)
|
||||
- [CVE-2024-52442](CVE-2024/CVE-2024-524xx/CVE-2024-52442.json) (`2024-11-20T12:15:20.370`)
|
||||
- [CVE-2024-52443](CVE-2024/CVE-2024-524xx/CVE-2024-52443.json) (`2024-11-20T12:15:20.620`)
|
||||
- [CVE-2024-52444](CVE-2024/CVE-2024-524xx/CVE-2024-52444.json) (`2024-11-20T12:15:20.857`)
|
||||
- [CVE-2024-52445](CVE-2024/CVE-2024-524xx/CVE-2024-52445.json) (`2024-11-20T12:15:21.093`)
|
||||
- [CVE-2024-52446](CVE-2024/CVE-2024-524xx/CVE-2024-52446.json) (`2024-11-20T12:15:21.303`)
|
||||
- [CVE-2024-52447](CVE-2024/CVE-2024-524xx/CVE-2024-52447.json) (`2024-11-20T12:15:21.523`)
|
||||
- [CVE-2024-52448](CVE-2024/CVE-2024-524xx/CVE-2024-52448.json) (`2024-11-20T12:15:21.753`)
|
||||
- [CVE-2024-52449](CVE-2024/CVE-2024-524xx/CVE-2024-52449.json) (`2024-11-20T12:15:21.980`)
|
||||
- [CVE-2024-52450](CVE-2024/CVE-2024-524xx/CVE-2024-52450.json) (`2024-11-20T12:15:22.203`)
|
||||
- [CVE-2024-52451](CVE-2024/CVE-2024-524xx/CVE-2024-52451.json) (`2024-11-20T12:15:22.427`)
|
||||
- [CVE-2024-10913](CVE-2024/CVE-2024-109xx/CVE-2024-10913.json) (`2024-11-20T14:15:17.253`)
|
||||
- [CVE-2024-11086](CVE-2024/CVE-2024-110xx/CVE-2024-11086.json) (`2024-11-20T13:15:04.020`)
|
||||
- [CVE-2024-11154](CVE-2024/CVE-2024-111xx/CVE-2024-11154.json) (`2024-11-20T14:15:17.500`)
|
||||
- [CVE-2024-11495](CVE-2024/CVE-2024-114xx/CVE-2024-11495.json) (`2024-11-20T13:15:04.197`)
|
||||
- [CVE-2024-52597](CVE-2024/CVE-2024-525xx/CVE-2024-52597.json) (`2024-11-20T14:15:17.967`)
|
||||
- [CVE-2024-9478](CVE-2024/CVE-2024-94xx/CVE-2024-9478.json) (`2024-11-20T14:15:18.207`)
|
||||
- [CVE-2024-9479](CVE-2024/CVE-2024-94xx/CVE-2024-9479.json) (`2024-11-20T14:15:18.350`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `6`
|
||||
Recently modified CVEs: `46`
|
||||
|
||||
- [CVE-2018-11525](CVE-2018/CVE-2018-115xx/CVE-2018-11525.json) (`2024-11-20T12:45:36.293`)
|
||||
- [CVE-2020-11727](CVE-2020/CVE-2020-117xx/CVE-2020-11727.json) (`2024-11-20T12:45:36.293`)
|
||||
- [CVE-2021-24169](CVE-2021/CVE-2021-241xx/CVE-2021-24169.json) (`2024-11-20T12:45:36.293`)
|
||||
- [CVE-2021-27349](CVE-2021/CVE-2021-273xx/CVE-2021-27349.json) (`2024-11-20T12:45:36.293`)
|
||||
- [CVE-2022-35275](CVE-2022/CVE-2022-352xx/CVE-2022-35275.json) (`2024-11-20T12:45:36.293`)
|
||||
- [CVE-2022-40128](CVE-2022/CVE-2022-401xx/CVE-2022-40128.json) (`2024-11-20T12:45:36.293`)
|
||||
- [CVE-2024-49758](CVE-2024/CVE-2024-497xx/CVE-2024-49758.json) (`2024-11-20T14:40:36.990`)
|
||||
- [CVE-2024-49759](CVE-2024/CVE-2024-497xx/CVE-2024-49759.json) (`2024-11-20T14:40:17.500`)
|
||||
- [CVE-2024-49764](CVE-2024/CVE-2024-497xx/CVE-2024-49764.json) (`2024-11-20T14:40:02.630`)
|
||||
- [CVE-2024-50156](CVE-2024/CVE-2024-501xx/CVE-2024-50156.json) (`2024-11-20T13:58:04.447`)
|
||||
- [CVE-2024-50350](CVE-2024/CVE-2024-503xx/CVE-2024-50350.json) (`2024-11-20T14:39:51.533`)
|
||||
- [CVE-2024-50352](CVE-2024/CVE-2024-503xx/CVE-2024-50352.json) (`2024-11-20T14:37:42.660`)
|
||||
- [CVE-2024-50355](CVE-2024/CVE-2024-503xx/CVE-2024-50355.json) (`2024-11-20T14:39:36.550`)
|
||||
- [CVE-2024-51494](CVE-2024/CVE-2024-514xx/CVE-2024-51494.json) (`2024-11-20T14:40:56.067`)
|
||||
- [CVE-2024-51495](CVE-2024/CVE-2024-514xx/CVE-2024-51495.json) (`2024-11-20T14:41:07.960`)
|
||||
- [CVE-2024-51497](CVE-2024/CVE-2024-514xx/CVE-2024-51497.json) (`2024-11-20T14:41:19.953`)
|
||||
- [CVE-2024-52423](CVE-2024/CVE-2024-524xx/CVE-2024-52423.json) (`2024-11-20T14:56:13.147`)
|
||||
- [CVE-2024-52424](CVE-2024/CVE-2024-524xx/CVE-2024-52424.json) (`2024-11-20T14:47:46.877`)
|
||||
- [CVE-2024-52425](CVE-2024/CVE-2024-524xx/CVE-2024-52425.json) (`2024-11-20T14:43:05.467`)
|
||||
- [CVE-2024-52426](CVE-2024/CVE-2024-524xx/CVE-2024-52426.json) (`2024-11-20T14:41:43.077`)
|
||||
- [CVE-2024-52526](CVE-2024/CVE-2024-525xx/CVE-2024-52526.json) (`2024-11-20T14:39:19.647`)
|
||||
- [CVE-2024-52565](CVE-2024/CVE-2024-525xx/CVE-2024-52565.json) (`2024-11-20T14:33:29.197`)
|
||||
- [CVE-2024-52566](CVE-2024/CVE-2024-525xx/CVE-2024-52566.json) (`2024-11-20T14:33:20.813`)
|
||||
- [CVE-2024-52567](CVE-2024/CVE-2024-525xx/CVE-2024-52567.json) (`2024-11-20T14:33:09.433`)
|
||||
- [CVE-2024-52568](CVE-2024/CVE-2024-525xx/CVE-2024-52568.json) (`2024-11-20T14:32:58.637`)
|
||||
- [CVE-2024-52569](CVE-2024/CVE-2024-525xx/CVE-2024-52569.json) (`2024-11-20T14:32:48.897`)
|
||||
- [CVE-2024-52570](CVE-2024/CVE-2024-525xx/CVE-2024-52570.json) (`2024-11-20T14:32:38.000`)
|
||||
- [CVE-2024-52571](CVE-2024/CVE-2024-525xx/CVE-2024-52571.json) (`2024-11-20T14:32:29.867`)
|
||||
- [CVE-2024-52572](CVE-2024/CVE-2024-525xx/CVE-2024-52572.json) (`2024-11-20T14:32:21.533`)
|
||||
- [CVE-2024-52573](CVE-2024/CVE-2024-525xx/CVE-2024-52573.json) (`2024-11-20T14:32:11.853`)
|
||||
- [CVE-2024-52574](CVE-2024/CVE-2024-525xx/CVE-2024-52574.json) (`2024-11-20T14:31:47.103`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
157
_state.csv
157
_state.csv
@ -112554,7 +112554,7 @@ CVE-2018-11518,0,0,28620014c01f1b73bb84113be10d0d8b542595efbcad3eb84c8dee56d8d50
|
||||
CVE-2018-1152,0,0,4cd9213fa236f2e53e636ad0b8b986bd1d146488bb5196f3296e5d8252383191,2020-07-31T21:15:12.170000
|
||||
CVE-2018-11522,0,0,6fd6cc029fb6c35cf86434a6720411c3ba72fea5411d6db303d8987d687fb459,2018-07-03T15:26:04.650000
|
||||
CVE-2018-11523,0,0,e19222637a1afc892dca5208b57fc44d2d6889beec6077362ec1bef3e3df8bee,2018-06-29T18:04:13.867000
|
||||
CVE-2018-11525,0,1,1582a8fa42dd0ace5f49cf06f5b4ee173bc3266d155ab155d6eba21796d3746c,2024-11-20T12:45:36.293000
|
||||
CVE-2018-11525,0,0,1582a8fa42dd0ace5f49cf06f5b4ee173bc3266d155ab155d6eba21796d3746c,2024-11-20T12:45:36.293000
|
||||
CVE-2018-11526,0,0,9943a2985a28f120c96998a78f749c2d591bfdbc654d0fbd2fd5961849ea8db7,2020-08-24T17:37:01.140000
|
||||
CVE-2018-11527,0,0,cfa43309f91b9cca6c79dfbf232cb23bbeb61f86a91c15c319e96748924a4c52,2018-06-29T13:26:50.290000
|
||||
CVE-2018-11528,0,0,97496262fbf9064bf512b6eb58d12583d73b8dc3d3b87c51bb82f42ee7228c8d,2018-06-28T13:23:05.870000
|
||||
@ -146782,7 +146782,7 @@ CVE-2020-11722,0,0,854500225422db3dfa44d653ad94ce36957c1f55b29b59dd9171606c59158
|
||||
CVE-2020-11723,0,0,160a5bd81bae1c4467e1de4dc046ed2bf84614f1d368f483a3f904096699d565,2020-04-22T16:59:05.253000
|
||||
CVE-2020-11724,0,0,0baa9b23e7980313ed19d111405cb5585663c3e5235129b20b5fc712b1b5a64b,2021-01-29T16:33:01.957000
|
||||
CVE-2020-11725,0,0,485b6938757ed573e1970511976719adabbe29c5548785fc4bfdef13a398e4dc,2024-08-04T12:15:35.630000
|
||||
CVE-2020-11727,0,1,cd70d22e8c88f74abcead34cfc8d1f6da9e845b882488b907d97bd7f192ca90e,2024-11-20T12:45:36.293000
|
||||
CVE-2020-11727,0,0,cd70d22e8c88f74abcead34cfc8d1f6da9e845b882488b907d97bd7f192ca90e,2024-11-20T12:45:36.293000
|
||||
CVE-2020-11728,0,0,c7fc17449fde5142efc845f8b4961f509068750e19ad86f5bfb25788bac308d5,2020-09-28T18:15:18.177000
|
||||
CVE-2020-11729,0,0,2c267e069a634258d2d04a3f06c624d15fc687a806e170bcd5e568e387447ff6,2020-08-18T15:05:57.953000
|
||||
CVE-2020-1173,0,0,e4d15fc933b72ca184eacc719d7008abad57b29cef62e8279d513ec030d61c44,2020-05-27T16:56:44.557000
|
||||
@ -163144,7 +163144,7 @@ CVE-2020-8152,0,0,2157b9905fc97aaf58cb97915f23233f1352480de56de7b9f192f302114e3b
|
||||
CVE-2020-8153,0,0,cfe25d45697ad3154608c88cc1391def2bfe555013f7e4c5ab7e9278bedd2f11,2023-11-07T03:26:17.073000
|
||||
CVE-2020-8154,0,0,2882b28cfa192cc2a1e225437871a5a1178ae3c7576c6f30fe81a48c253f5efd,2023-11-07T03:26:17.143000
|
||||
CVE-2020-8155,0,0,3a365474b7bbe2172914f2d55597bcba858956f60f565bc2a0afb04b8e548aee,2023-11-07T03:26:17.243000
|
||||
CVE-2020-8156,0,0,9550b147646d6ae88e4673ab6f4cdf68a5d9461f84d5e818fd06f577b035e8c8,2023-11-07T03:26:17.397000
|
||||
CVE-2020-8156,0,1,e78f4440907395cbc9b2dfcae0c419b7f39601d484e083a01926322f88a1834f,2024-11-20T14:49:11.963000
|
||||
CVE-2020-8157,0,0,35cdd2af42da5051417fdca6b65931e1185f21bf6a35ed8a6699323e7e60a041,2020-05-07T18:59:41.407000
|
||||
CVE-2020-8158,0,0,5498299a0157d7f2e437cc76e8ab694c3a0f8974f96f14caf601132353eb10e5,2022-08-05T19:31:00.747000
|
||||
CVE-2020-8159,0,0,cb54ef59fbeb76e73b1feb03f471fce55ea738c42073c44aad53ce7ee8bdd098,2023-11-07T03:26:17.570000
|
||||
@ -170118,7 +170118,7 @@ CVE-2021-24165,0,0,95f929fc30f7c0c2f87369e9b0554857e8b46bf94e92a9f35699ba920a4ac
|
||||
CVE-2021-24166,0,0,7295a9e2a303893028e33202f410f6c7a0b964cef7d31d681ad7a4bc51e78516,2021-04-09T15:22:45.803000
|
||||
CVE-2021-24167,0,0,44edbe5d36cb698dc1ac178e403d937048d4424974e7e8a4291d219ac995a52e,2023-11-07T03:31:07.063000
|
||||
CVE-2021-24168,0,0,9ffd1d11393e7892f78db2bbcdbbdf91a3fb185fcfbdf7421b2d6645e97b37a3,2021-04-09T14:56:56.993000
|
||||
CVE-2021-24169,0,1,677a62b1d06271f40840aeab51c5c0422799e65298f12bbbeb4e792f2dcdcb9f,2024-11-20T12:45:36.293000
|
||||
CVE-2021-24169,0,0,677a62b1d06271f40840aeab51c5c0422799e65298f12bbbeb4e792f2dcdcb9f,2024-11-20T12:45:36.293000
|
||||
CVE-2021-2417,0,0,e64e51808263b781ee5f2732a8dd7f73478d6d7a77a36de892782836dc00cab8,2021-07-26T17:32:02.827000
|
||||
CVE-2021-24170,0,0,e9b9a25144017b8f8b095e0ea80aa86cf42dc21bde9e6f79b6b176f26edb6841,2021-04-09T19:34:59.337000
|
||||
CVE-2021-24171,0,0,e70ce2cc69da6df5d1dcc971c230874a8172e79495d937703f0b55a7dcd0f3e5,2022-10-24T17:15:39.613000
|
||||
@ -172602,7 +172602,7 @@ CVE-2021-27342,0,0,090c125ac182d70b49035ec07ef9ea7721468eb72cf15d87f2bd57dac7662
|
||||
CVE-2021-27343,0,0,832bb7fee5c0f9e3a0dc509e410e958411deb12dcf3f989bf4b854e893609ee1,2022-12-08T18:55:41.790000
|
||||
CVE-2021-27345,0,0,87e104d2d8df80dad4ab089d59e41459174e2badd76249afa3216a7da22b893a,2022-04-27T17:06:54.547000
|
||||
CVE-2021-27347,0,0,b58aedc650ac8f0f6e67ef65b090cdcc4557c7027b4e81d071a53ac20b25bd5b,2022-04-27T17:12:53.903000
|
||||
CVE-2021-27349,0,1,e035ab3c6a9ce22468f04974f2aba515c7affee3cd75e3e409d9fc2c2a18dcba,2024-11-20T12:45:36.293000
|
||||
CVE-2021-27349,0,0,e035ab3c6a9ce22468f04974f2aba515c7affee3cd75e3e409d9fc2c2a18dcba,2024-11-20T12:45:36.293000
|
||||
CVE-2021-27351,0,0,8a485d9b4386c04a50a028e5fdce8921fa7ff42a756440d276d0393b01f75a67,2022-05-23T22:18:15.767000
|
||||
CVE-2021-27352,0,0,b9c6127899b298e03829981a6389a711a604aa172678ed911487e80bfa43e4d0,2021-06-03T18:12:04.617000
|
||||
CVE-2021-27357,0,0,87e6e41ae512ffc574a36aa4fe2c1f00c7f24cbd187d4f8cd1529124f6a724aa,2021-04-09T18:07:44.027000
|
||||
@ -176392,7 +176392,7 @@ CVE-2021-32648,0,0,7531f51d6b199a572d23299ee12d9907d669f7138e84dfc868aa9fd2bd888
|
||||
CVE-2021-32649,0,0,9aa71cff50757f6cf53c6600283fb68efb3fbdfb7b34252ed7b2838e847d87b2,2022-08-05T11:31:40.157000
|
||||
CVE-2021-32650,0,0,9f70808bab43ebba3a2330c08fae97255322e9b992420b87b40f5b5f558d83c8,2022-08-05T11:09:41.153000
|
||||
CVE-2021-32651,0,0,4b5fdce798f34d570870c553e6ab20d2970d41196df0b70fa8460cb7feaba68d,2021-06-16T14:28:20.197000
|
||||
CVE-2021-32652,0,0,abfab6fd89b91c3ddba5e0a619fe2340dcd23da1a28a7e2084db99cdb5a715d5,2021-06-14T17:28:54.357000
|
||||
CVE-2021-32652,0,1,915485f6c3cea790f71dc3407e6ebb787110be9cfa83142b610d2c899c3c4217,2024-11-20T14:49:11.963000
|
||||
CVE-2021-32653,0,0,778550545eef7f434e8e5284d53783432ae2f767ea0bf129821f627b79715a3e,2022-10-26T14:09:34.487000
|
||||
CVE-2021-32654,0,0,322f9e13f1f306cc9a8ff8b8b4b41c3bafbc9cb7cace08c1a08770e3b6013163,2022-10-26T14:09:39.250000
|
||||
CVE-2021-32655,0,0,3f695e591bb35e99185aea508adf812112ee7379b86803103a016df03da2dfce,2022-10-26T14:09:43.607000
|
||||
@ -176448,7 +176448,7 @@ CVE-2021-32703,0,0,635fe049aba8016411da5e0630a2ff70edf8d370c402994225b430eebbe6b
|
||||
CVE-2021-32704,0,0,47ea80e444cbfb7c6cdbcc8c658f57a1af10eff51b072ac376ae2f018b868685,2021-07-08T14:09:07.430000
|
||||
CVE-2021-32705,0,0,2b994ec5f68986f89d15b585cf0dcd5b0df04be27b63de956903ae33fdfb29be,2023-11-07T03:35:24.297000
|
||||
CVE-2021-32706,0,0,6753ca80f1091627deaee0391d77d5ebd34888236a31cb9b182e2ecbecfc066f,2022-04-25T19:55:34.857000
|
||||
CVE-2021-32707,0,0,d39671a6c8188df42afb34c3db24bee92f0f74c3c90be6f74c48805c7dd45199,2022-10-25T15:41:29.900000
|
||||
CVE-2021-32707,0,1,40d7522bdb960329f72d2965016bf40a02c0ce6cdb036c985a0e3e09721c3b63,2024-11-20T14:49:11.963000
|
||||
CVE-2021-32708,0,0,bc89d0a5d02f9a6acf43ab328e241c95c7a4fc71829d2fa132acb66dff96fd84,2023-11-07T03:35:24.547000
|
||||
CVE-2021-32709,0,0,ea6ce7b20009263a07482a6f865640e784d1b5e5bf74168f0a1349698ec8c0aa,2021-07-01T13:58:11.200000
|
||||
CVE-2021-3271,0,0,70d5140acc42695fc6225a0f79eefa79f1084c164040e6645efe4a26080b332f,2021-02-24T14:45:03.650000
|
||||
@ -202513,7 +202513,7 @@ CVE-2022-35270,0,0,df06261f24c2cc206e99c7c44ac9e5d32870e52931b225863c7ecf37ac923
|
||||
CVE-2022-35271,0,0,c73a07d2a58e05e39ba42f01369acf058797efa2084aa1b79c237e67c21a206d,2023-02-23T23:49:35.503000
|
||||
CVE-2022-35272,0,0,28b3688ffc8c77c3dd43cbca4557e62bb2e32081a0a7b05a07d439aca2fdf445,2022-08-10T19:18:49.673000
|
||||
CVE-2022-35273,0,0,37e0a67be41d4d57ea0eea6547e501ee02bbba1978cbedd77b0555aa44749e24,2022-09-13T15:04:09.180000
|
||||
CVE-2022-35275,0,1,ba59134f035965387423088d6daecdf57cfe01345b3f2820fe6f6e5715291841,2024-11-20T12:45:36.293000
|
||||
CVE-2022-35275,0,0,ba59134f035965387423088d6daecdf57cfe01345b3f2820fe6f6e5715291841,2024-11-20T12:45:36.293000
|
||||
CVE-2022-35276,0,0,c3e73246a4694a0727af64865f51d28e6ce7f443989746283615dba0643e09a7,2022-11-16T18:56:08.900000
|
||||
CVE-2022-35277,0,0,6b43c06f34da2a896add35c50bba3f8c3b4c87cfec10480067878619bd017121,2022-09-10T03:53:19.877000
|
||||
CVE-2022-35278,0,0,f9369402514282d91fdc9732a8cbf568356c121282738727e30dacd4d696de97,2022-12-13T01:59:50.587000
|
||||
@ -206205,7 +206205,7 @@ CVE-2022-40122,0,0,53231e7d91e0446b0935a46bdb5502c1efa214bcbca5603169e444690ad0f
|
||||
CVE-2022-40123,0,0,684ee396689269c179d4f6c66838bb4407bda2f68fedf332bb39e4b625234fdd,2022-10-05T13:01:36.207000
|
||||
CVE-2022-40126,0,0,fe2b273ee374dda35683011bfd4579f22913fcf68241239318c68fea8e40081b,2022-10-04T12:30:35.917000
|
||||
CVE-2022-40127,0,0,504ee37f555a1bf4ee6aeffa6178b0666198cf0c51659d5c35d10c5317e1c93d,2022-11-16T18:53:05.167000
|
||||
CVE-2022-40128,0,1,dc6a79b61d3400cacd8f4d55c7fcd4ac275837c95a0b39f6aafddfb933b615bc,2024-11-20T12:45:36.293000
|
||||
CVE-2022-40128,0,0,dc6a79b61d3400cacd8f4d55c7fcd4ac275837c95a0b39f6aafddfb933b615bc,2024-11-20T12:45:36.293000
|
||||
CVE-2022-40129,0,0,04aa07e2375aebbe2fd10962bf0301de5356355838fab707b7d882417361e77e,2022-11-22T01:07:11.007000
|
||||
CVE-2022-4013,0,0,803366dcbb2b4bdf5190bb86cd2d8bb83c3f3d4414b49440a4c72173780e7391,2023-11-07T03:56:41.073000
|
||||
CVE-2022-40130,0,0,24eec0c61128a0766ccd1a906df7b967fcde3babef1e2a57e55c6c9466b78684,2022-11-21T01:17:26.170000
|
||||
@ -224506,7 +224506,7 @@ CVE-2023-32100,0,0,03d1d7348ff3074cd33e44da200ef8e628532b8b9fc6d20d9d16bddc4c66d
|
||||
CVE-2023-32101,0,0,fadfff1c8250ad02270383fef167ffe2f9180ff38713fd95610c7140bb91dffc,2024-01-05T16:14:34.587000
|
||||
CVE-2023-32102,0,0,a2ce73f1cf0ac3390c846641219003dc9af258c5c3e580951781df991d51be3e,2023-09-06T22:33:02.990000
|
||||
CVE-2023-32103,0,0,3f6dcd6d9a3860118fab5c5619e0f4dc7f0e8fe5638b6e27d4f83d67ee10f510,2023-08-23T18:12:05.373000
|
||||
CVE-2023-32104,0,0,66904b195fff8fa38eea65141bc9c1f93aec7cafa9e61a764c6c0b21258ed424,2023-07-18T18:22:27.863000
|
||||
CVE-2023-32104,0,1,7277862d44454deaeb3901907eb690b81777ac4e971f31353b904c44dc67abe9,2024-11-20T14:34:41.430000
|
||||
CVE-2023-32105,0,0,7c487940a28f72ea0650ebb221a21da7d58751272684ed5674cb214d6fd993d5,2023-08-23T18:22:31.213000
|
||||
CVE-2023-32106,0,0,982693e0c599599739ecd35dcd81e21273c121a4aa4a52e0168d94a65ff89ca1,2023-08-23T19:34:10.143000
|
||||
CVE-2023-32107,0,0,28c192f4ea4f0d11d8e15836781c4da36c1d45038847687e1aaaa0a6c484a529,2023-08-23T17:08:29.897000
|
||||
@ -225528,7 +225528,7 @@ CVE-2023-33180,0,0,dc5b9a996e95da53c1d61c35aaf3d2fbbdb7d7994d0410a7b6181404b1d9f
|
||||
CVE-2023-33181,0,0,3bb7910d1656a70f98ed3c7d5af3bff9a160ef8caa11392247219a1d3f34d554,2023-06-06T01:15:10.333000
|
||||
CVE-2023-33182,0,0,8a0e692153ec9aecfaf34e1d3200d12a5e0b919a4c4573466ad310e1f7be6d18,2023-06-06T13:47:28.927000
|
||||
CVE-2023-33183,0,0,57d66ef297f7cb0f14fecc29131033d3eb0efa4529112aeeab57318b7ca9a656,2023-06-05T18:11:44.057000
|
||||
CVE-2023-33184,0,0,2aa46df074e83f0b36bda02e0b706c1ad8465c7b41cc34c98261bab74b1b9667,2023-06-02T18:52:18.290000
|
||||
CVE-2023-33184,0,1,3127ed1efcef92ddd170e4e0b7c12d38bce3133f600a6334e19300a8cbfec8af,2024-11-20T14:49:11.963000
|
||||
CVE-2023-33185,0,0,a7fb14eaea07e234dd2f32049ed9bc2b754066b476fb880dc129f0f06086c1da,2023-06-06T18:09:12.467000
|
||||
CVE-2023-33186,0,0,f0bf1abe0caa1ca06eefa86a6dfff9531a43d48c24639816098b2be4996551ee,2023-11-06T19:15:08.923000
|
||||
CVE-2023-33187,0,0,80948af77a6fdb7af5f13266af834f0aebde82afa3f68ff85a8c31c237efefc3,2023-06-05T13:50:24.813000
|
||||
@ -242844,7 +242844,7 @@ CVE-2024-10379,0,0,214be4d491421db3527c631a39011912a259f53e90e222f386f0e0be59c25
|
||||
CVE-2024-1038,0,0,c7b47d6608546def6f3304631405edc76ac6151bae95644217fe0b19e7498b5e,2024-03-13T18:16:18.563000
|
||||
CVE-2024-10380,0,0,251c7695ebdffe14f2a561bb3be22f7946019d2ec5c5cf9081e853969f1037dd,2024-11-01T16:11:00.217000
|
||||
CVE-2024-10381,0,0,c0308fe75631e6e478c4bb91d489e96b1c2dde80a7b938a5a315dee1135c5bea,2024-11-14T21:44:53.280000
|
||||
CVE-2024-10382,1,1,93ad4e5d158f8a5b418f3ca0d0badac34bde469f4309d8aa47291799d978870e,2024-11-20T11:15:04.280000
|
||||
CVE-2024-10382,0,0,93ad4e5d158f8a5b418f3ca0d0badac34bde469f4309d8aa47291799d978870e,2024-11-20T11:15:04.280000
|
||||
CVE-2024-10386,0,0,92094aeb70b25026044a453c13f522af4eb391b2229044481dc021518acdc439,2024-11-05T20:07:59.487000
|
||||
CVE-2024-10387,0,0,5a1f42d28f618e614b5301c0b94be55a535432bf7194e0692256ccf6aa332018,2024-11-05T20:05:55.323000
|
||||
CVE-2024-10388,0,0,baa860af3611995aa3b48c2ac11975f858a05164ea5f5d56cfe1775a5d194758,2024-11-19T21:57:32.967000
|
||||
@ -242945,7 +242945,7 @@ CVE-2024-10509,0,0,a9d05e50f1563ceed5339878fa8c2329eea9e28284f4c0c86984d14b77803
|
||||
CVE-2024-1051,0,0,301df872c002365b13eaea34d02a8084366516306d472e0b862c9b6067f5d33d,2024-04-01T01:12:59.077000
|
||||
CVE-2024-10515,0,0,95b093829d5f65eddf31cc2d74b4687e2e05262ee824501db195970644d9d2ed,2024-11-20T06:15:15.777000
|
||||
CVE-2024-1052,0,0,2826dc83bebd9032f48348a63ffd25025c2a6126abd483892ed79004a77aef0f,2024-02-15T18:49:40.180000
|
||||
CVE-2024-10520,1,1,5acdd0c5659959d9ac18fb296c8b0ca775c2f72b2836f5d69fce1935ac3f49b0,2024-11-20T12:15:18.390000
|
||||
CVE-2024-10520,0,0,5acdd0c5659959d9ac18fb296c8b0ca775c2f72b2836f5d69fce1935ac3f49b0,2024-11-20T12:15:18.390000
|
||||
CVE-2024-10523,0,0,a761a52195ca091ecc100fefe31fd4eadda4d831fe94860e2a159923b6d0d68d,2024-11-08T15:14:30.070000
|
||||
CVE-2024-10524,0,0,d6a77c8f99978db429152e8948353f8166b552c9c91594d95f4a0f83de9c3b77,2024-11-19T21:57:32.967000
|
||||
CVE-2024-10525,0,0,cfad79154f466fe96736eabfa65cac8f6409e21deb7f07d79c02c68ee3f19eb2,2024-11-01T12:57:03.417000
|
||||
@ -243160,7 +243160,7 @@ CVE-2024-1086,0,0,3e819e2fff80149e3f377751fd1fb28a52f8791d9e5d08990c549613b15214
|
||||
CVE-2024-10861,0,0,0e475116cbc916b1684eb819921303de89576e8768786550a96cf2c67b7dbecb,2024-11-18T17:11:17.393000
|
||||
CVE-2024-1087,0,0,9751a2fe52b8f14e0fc1c9d86ee656c42465ba61ef03201895b6c1868f5679fd,2024-01-31T13:15:11.030000
|
||||
CVE-2024-10871,0,0,68bab79b21893b436f4ab4e6d9a6ec3633c42e31b376d40213e506317551e1bb,2024-11-12T13:56:24.513000
|
||||
CVE-2024-10872,1,1,8405e7ff84d6b1dadb55fb727cbebd904b1c5b7b5d08d6be546207b2803f1c61,2024-11-20T11:15:04.927000
|
||||
CVE-2024-10872,0,0,8405e7ff84d6b1dadb55fb727cbebd904b1c5b7b5d08d6be546207b2803f1c61,2024-11-20T11:15:04.927000
|
||||
CVE-2024-10875,0,0,f25d99b636c46f59305dd89e678091362bb421c122afe8c605690d8f28fedaa5,2024-11-18T17:11:17.393000
|
||||
CVE-2024-10876,0,0,bbf9ae62b029e2f20c90d639924bd19ca16772574bbaf6f19776b0310de3890f,2024-11-12T13:56:24.513000
|
||||
CVE-2024-10877,0,0,301531ad65e2e5f16ea91c20f67a17c0b37faac5d5c530e39dd36f416491799c,2024-11-19T15:52:44.487000
|
||||
@ -243176,6 +243176,7 @@ CVE-2024-10899,0,0,4368cb3772d2f8c2a1f35ff550289018215916506b0b69e65d8983cd35dad
|
||||
CVE-2024-1090,0,0,2d0b80c82d6d153c4e0b5412c3fcf892da86ac73a72da4cbf84bfbb064bdcb0c,2024-02-29T13:49:29.390000
|
||||
CVE-2024-10900,0,0,f0a1068a03da92137242d5778d1db0773cba2fb63def13779ff35e3410d8f989,2024-11-20T07:15:08.690000
|
||||
CVE-2024-1091,0,0,54ee7e9ca708166212a73aaa10e4715176fe17b55fbce1ee0ea8f95d289d46a5,2024-02-29T13:49:29.390000
|
||||
CVE-2024-10913,1,1,4e9b29333972ed20a30c4eccde2c9645761370bd1f3d0211dcdd27a3f9c3d9cf,2024-11-20T14:15:17.253000
|
||||
CVE-2024-10914,0,0,a19349a4797c04ddb77f70975a0145b559e2c17ff8d6db53557df6669e0449a1,2024-11-08T19:53:04.793000
|
||||
CVE-2024-10915,0,0,b06bfc4427bf3f30a98b7ce390941759d780f67755e284354baa2af5087ffe27,2024-11-08T20:11:10.973000
|
||||
CVE-2024-10916,0,0,bc544f9bd284df1d2cb2c93c5b72a85d457acf8720f73da6b50b8a164264f036,2024-11-08T20:11:37.567000
|
||||
@ -243186,7 +243187,7 @@ CVE-2024-10920,0,0,2cf9a2b6fa319444c301d4d5e50d2260546d202b9ce9ceed0622f32574438
|
||||
CVE-2024-10921,0,0,e4551a7fb6e9a47101373d83ae7e9c0677be8ee1bd96c33a43c9b04fcf7dfcf8,2024-11-15T13:58:08.913000
|
||||
CVE-2024-10922,0,0,2e8ad1bbe2c22b2f860e82caba9eca723e865a4e9bffae87682e3cfa53e59e0d,2024-11-08T19:01:25.633000
|
||||
CVE-2024-10923,0,0,a52ee7279b45f6cbb4af1bcb280dc131fb026565d6c8cec2e60c88cc2adb08c1,2024-11-13T21:35:04.867000
|
||||
CVE-2024-10924,0,0,f04c8f210dbd43873edd1c965424c63b0a41e700e87767db1cdda51a1251ec4f,2024-11-19T14:15:17.187000
|
||||
CVE-2024-10924,0,1,149cf1838947afb3a5a8e8ef2d9e3c6e29182b7321d442c2e87f9957410e2f81,2024-11-20T14:44:47.350000
|
||||
CVE-2024-10926,0,0,d4b8448490b176d20ac7d5dd5d9abfb0445d0f8f33211ac22e460a561e976123,2024-11-08T19:01:25.633000
|
||||
CVE-2024-10927,0,0,89d2896b297590d0b070dc2d6fc3af12d21eeade74b7d5af5a8c30243a174669,2024-11-08T19:01:25.633000
|
||||
CVE-2024-10928,0,0,d7b9ae13d8f86fa638d0e1d42acef5c90ca0f7e31aac0a4c1ed2473457ce5298,2024-11-08T19:01:25.633000
|
||||
@ -243287,6 +243288,7 @@ CVE-2024-11078,0,0,d133c6201a7de964272170f882ab0586a90d59fac96ab8e0ce223d3687fb9
|
||||
CVE-2024-11079,0,0,d1a710289b6254268300773c7c9b113893f43edc23893d87d06dbeefe81deb1d,2024-11-12T13:55:21.227000
|
||||
CVE-2024-1108,0,0,72e8aa7ee320c630f0cd3020b574b902dcf572a1d2888f0afb29692e74e18247,2024-02-22T19:07:37.840000
|
||||
CVE-2024-11085,0,0,36aaba845c0a90c554661f4023115a3f46c67d2a691dfc21b49793447a4b6d8f,2024-11-18T17:11:17.393000
|
||||
CVE-2024-11086,1,1,f4d7f35e95dad05e023fed49ac9e59da09a947f51bc79e0e10dc6b97e93d7482,2024-11-20T13:15:04.020000
|
||||
CVE-2024-1109,0,0,54a246b33f975a42367e7b2f8f64c59b5c20293302ad365ae743bbdf357522c9,2024-02-10T04:13:21.610000
|
||||
CVE-2024-11092,0,0,e9f7e804f043cae81931fc37547f9a5b6c886cc0c38e1290ab1e0b94e6cf7e70,2024-11-18T17:11:17.393000
|
||||
CVE-2024-11094,0,0,96d31b5c75c99258f7a77fadd259d6f2363d98a6ce11e212a75b9e3f71f6de55,2024-11-18T17:11:17.393000
|
||||
@ -243325,6 +243327,7 @@ CVE-2024-1114,0,0,4ba1cd03fbc35862ac6b2ce79da50122dd303ea22f4f4a45a352ffb5be12a8
|
||||
CVE-2024-11143,0,0,96ffaa2455664e18d60b42605835ada70f7b0d6d8faec6d0bfd534d22c653ec3,2024-11-18T15:03:56.927000
|
||||
CVE-2024-1115,0,0,4dae9d3d8bef65fab3d547368288cc3126446be18b7fc740123f9a96bd6241e2,2024-05-17T02:35:14.880000
|
||||
CVE-2024-11150,0,0,a42c681646aa4974b2ce83b0b93c5af4c26316891f1e3dd7bf6a226e6b2cf362,2024-11-19T16:57:05.407000
|
||||
CVE-2024-11154,1,1,9c2f24e5b2c6bb0a1acf0aba74e4e593d635b23a924a1df484d24fc0dc0da623,2024-11-20T14:15:17.500000
|
||||
CVE-2024-11159,0,0,e73f6fc4616381942ffbf159704beae47fa0fb666e23bdbb04e5afc5533ba424,2024-11-19T14:56:37.800000
|
||||
CVE-2024-1116,0,0,4196b5c71a0d802f4c1e9b3a43ac71c958f929e96b26e1ebb01241c6bd176fa3,2024-05-17T02:35:14.983000
|
||||
CVE-2024-11165,0,0,95fe2b7c203ba5cc9c6e4fb2522e665475ea40e75b68e18a56b9dddf3a00ff2f,2024-11-14T16:35:05.493000
|
||||
@ -243364,9 +243367,9 @@ CVE-2024-11240,0,0,93637d2306a8d43a17d83278050b9edbdf92fa9a36ba40ce0cf8eee6e495f
|
||||
CVE-2024-11241,0,0,89a43b7ea914041a6f59db91c5557f8d5d759fd281e085f89e9191527fb126cb,2024-11-18T17:11:56.587000
|
||||
CVE-2024-11242,0,0,1118fbe40870c73d892fa7961109d02efc9eea6f6992fd659082a2270dd53e3e,2024-11-18T17:11:56.587000
|
||||
CVE-2024-11243,0,0,0ff1388c8ef64f270cffe8331915ccacdb089ce7746995fcf71ad3772e821364,2024-11-18T17:11:56.587000
|
||||
CVE-2024-11244,0,0,7ddefaa41e9ccb977d7c85039db793bbdf53d3725f9912f40eac2a4aaf17a727,2024-11-18T17:11:56.587000
|
||||
CVE-2024-11245,0,0,29f44cb172625fff08f5e77fefde944c87d3d58c7aadda73adcfd106f2856643,2024-11-18T17:11:56.587000
|
||||
CVE-2024-11246,0,0,fc4921d438ebd3fd188ca2ff821c79198283500fed96f617ac0353e98fc4be48,2024-11-18T17:11:56.587000
|
||||
CVE-2024-11244,0,1,a10509bbd4fa7611874cdfc9b96d4cded99faa29683a34e350fd40f4b0d3b846,2024-11-20T14:36:24.190000
|
||||
CVE-2024-11245,0,1,e4e8186ceb4441a170d4952248b1956d0d2c24ed89149a271a88dcd411a28d58,2024-11-20T14:36:11.557000
|
||||
CVE-2024-11246,0,1,cfb50779870406feb995e205891de59a3d2e7328080ec4d7e93b3cb669bc7310,2024-11-20T14:35:51.070000
|
||||
CVE-2024-11247,0,0,418d44bf835e45a5b168d4261f2e26177ac6498bf3284a972817ac9ff0985433,2024-11-19T21:55:35.283000
|
||||
CVE-2024-11248,0,0,4b443be48ce8c0ac739bd8e1e543cf49244a70dde1362a8604cecd8601bec3be,2024-11-19T21:51:57.467000
|
||||
CVE-2024-1125,0,0,f1d015036f4cdda32f03ba210c93a8838e991a1e1d168cce1bd81d56428097c5,2024-03-11T01:32:39.697000
|
||||
@ -243399,7 +243402,7 @@ CVE-2024-11313,0,0,53f6d870fb2b566376144eec19fd000dcd1bbd56287bcfae6e64830305fb2
|
||||
CVE-2024-11314,0,0,fd61a9a66be641c7049e49341e5fdeb338e9cb7eca6b01cbdfb607612f91e206,2024-11-18T17:11:17.393000
|
||||
CVE-2024-11315,0,0,6b86b9992261d4d3decee865ca7eb6d2eb680713a5739af8b2abb878a6176443,2024-11-18T17:11:17.393000
|
||||
CVE-2024-11318,0,0,9febe7cf088687dfbeb6d2d8f74590e0f8059ffca33de9b68ad34437f87d2118,2024-11-18T17:11:17.393000
|
||||
CVE-2024-11319,0,0,ff0c95c473ba86d1f66245794d17080f6ea8b5ebf358a4bdd279d07b1075e1d0,2024-11-20T08:15:14.350000
|
||||
CVE-2024-11319,0,1,10049ab876319f9ecb08a7b21cc61880e37e90d0ecd4d79058dbd3eba0407f5e,2024-11-20T14:59:38.297000
|
||||
CVE-2024-1132,0,0,3de6e62885ac8497a4c1d8f4950ebedc171b13b33dfedd6a9eea9ae164fd993a,2024-07-03T01:45:01.507000
|
||||
CVE-2024-1133,0,0,b8b851364368259dd533f1c71b437f741276dcf99770b03558b5d9cd5d3f095a,2024-02-29T13:49:29.390000
|
||||
CVE-2024-1134,0,0,92ca7b611a6a52333e888fa3a581b5dbc5c29b22a5e7e62eb553cb40e2cb6d77,2024-05-24T13:03:05.093000
|
||||
@ -243411,8 +243414,8 @@ CVE-2024-1139,0,0,3dc684f5c9c2296003368c61d669c2f327953a7aefcd4f9a72abdc4b058cbe
|
||||
CVE-2024-11395,0,0,e97b88024677a483ae4a42afe9a8440978faa48e4e721bb1c822953f8252b946,2024-11-19T21:56:45.533000
|
||||
CVE-2024-1140,0,0,346c2ed0aaabc419b4aefe2cf8513b81b972566618f29982168bc7166c832ab2,2024-02-27T19:17:32.253000
|
||||
CVE-2024-11400,0,0,68517feb9a17e8334cb49d2e9635846cb9ffcbcacaf62470ee1bd79105ecd1d9,2024-11-19T22:15:19.740000
|
||||
CVE-2024-11404,1,1,91a6a83594728f7d9ab87a97157e934bf45f5ea8491058deca799f43b765f939,2024-11-20T12:15:18.640000
|
||||
CVE-2024-11406,1,1,d4abbee85b1f77460ba170fa7cbcf81435244eeb65babfc1772879a68307a74f,2024-11-20T12:15:18.890000
|
||||
CVE-2024-11404,0,1,525efe85caba48797a4f541c0d9d8e5e1135b7d4afff8a5c0abba9ca32591f5c,2024-11-20T14:15:17.750000
|
||||
CVE-2024-11406,0,0,d4abbee85b1f77460ba170fa7cbcf81435244eeb65babfc1772879a68307a74f,2024-11-20T12:15:18.890000
|
||||
CVE-2024-1141,0,0,31012446f41a8e14cd01fac5beb57c8618f6593d63d8f6abd3fca30a025146cd,2024-05-22T22:15:08.627000
|
||||
CVE-2024-1142,0,0,444665e5d63ad8c810b6738875a9c2a9c27bc01781467ef31bed70fec17787e6,2024-03-21T12:58:51.093000
|
||||
CVE-2024-1143,0,0,b8d0c26da5a42e6a02317cbe9672f530b65f02168ce7a3fde71211ebe1a9550d,2024-02-09T19:08:27.423000
|
||||
@ -243423,6 +243426,7 @@ CVE-2024-1147,0,0,5da69e40e8a720c3c3c366cde1a8363ffbcff6346e82168cfd4c7602d33328
|
||||
CVE-2024-1148,0,0,55b3cfe72144d3f21629750ac052bc7072169844e3b194a6a00d557d611fa424,2024-03-21T12:58:51.093000
|
||||
CVE-2024-1149,0,0,b02f2ba30bfd9b077afbf478cdb43cc9b464ca358abc4a5e9f7416d9d1b2fcff,2024-02-15T17:52:08.970000
|
||||
CVE-2024-11494,0,0,5890d4fb88df3d8f55b6792aa5c18e107344b1b8b9d64b1485bac263c175d055,2024-11-20T10:15:05.920000
|
||||
CVE-2024-11495,1,1,79062961a6b5f76603192d58576bb23157ae662ae3c66c7b46038e4fdb4d0e00,2024-11-20T13:15:04.197000
|
||||
CVE-2024-1150,0,0,b47a3c09b3a331a50594ab70df2061c7818f30992462806b6f5b7a310a00b60b,2024-02-15T17:42:08.113000
|
||||
CVE-2024-1151,0,0,7121c04433e319cadf01da487c5bbfa2040f1a20de12a9b96c3c123bdd1e595e,2024-11-12T16:15:21.213000
|
||||
CVE-2024-1153,0,0,ef044a07a9d08d9e4b985a54be5b7192d28514cd606cdbcd1ece01d4ab3f4a43,2024-09-16T17:39:45.023000
|
||||
@ -244662,7 +244666,7 @@ CVE-2024-20533,0,0,2d986cd55ad911e02b6bda820adc74cdaa2d545d64c7c4f647bb7a6457b58
|
||||
CVE-2024-20534,0,0,4f609adec9e97ecff790786fa44ffb0444b615de359923a987bca63ffbcafec7,2024-11-06T18:17:17.287000
|
||||
CVE-2024-20536,0,0,92a69429348f505a2f19cddc24c074862025ce005e80fdfc6c493e8025ca7175,2024-11-06T18:17:17.287000
|
||||
CVE-2024-20537,0,0,8eb54de049a25db81afc091e04bd2d7999434d41275b165cf1444fcf31d57296,2024-11-06T18:17:17.287000
|
||||
CVE-2024-20538,0,0,d3ec081680e8110d616ef631755f3861235961769fb7ab4a001026017157c8a8,2024-11-06T18:17:17.287000
|
||||
CVE-2024-20538,0,1,b1eff7ad5bb95b77965efbefe5ba3e342c8a162cc8fa62ad96f9243cc1985968,2024-11-20T14:36:01.810000
|
||||
CVE-2024-20539,0,0,6e27ce1f08f4699f40ff9b4c4b8e67f82d60924ed0624143d18142d08e653aec,2024-11-06T18:17:17.287000
|
||||
CVE-2024-2054,0,0,5af7272a2140be959232b9c889b5facdacd3c4cf8342e14293010d7ec8d01b60,2024-08-05T20:35:09.723000
|
||||
CVE-2024-20540,0,0,a0c0570bee7ec580676398059fb604cec9f30d8b31bae7978e74a064fbdb94ec,2024-11-06T18:17:17.287000
|
||||
@ -254062,14 +254066,14 @@ CVE-2024-33023,0,0,f07c6961c818e42fa07a4c877bc946312ec641a3f9e47b5477d110c399e86
|
||||
CVE-2024-33024,0,0,4969e5bddaca7911ae4fd3ce18abf8425c6d1ea66030ccd772575a2259497f2a,2024-08-06T16:30:24.547000
|
||||
CVE-2024-33025,0,0,b2224958808cef69179c29751ac5699dda8398fa1ca6d6be644feb0949d642b0,2024-08-06T16:30:24.547000
|
||||
CVE-2024-33026,0,0,298d33f6a8bfb6f36fcf1be4fa982f6af985ae195af9a3a0c45ae097558f81f9,2024-08-06T16:30:24.547000
|
||||
CVE-2024-33027,0,0,cc2e5aea91d0b51c006f2b36474a376cee8428cecc94d1a162b764842c335f3c,2024-08-06T16:30:24.547000
|
||||
CVE-2024-33028,0,0,9632bd9093b259716a8b9578d714120e37db12b0d16b9cf18505d5f86f8aeb5e,2024-08-06T16:30:24.547000
|
||||
CVE-2024-33027,0,1,26992809153af0a3cde7fd5f54a863ef84036157b94429656d19ba0fceae691f,2024-11-20T14:38:17.037000
|
||||
CVE-2024-33028,0,1,9556e6342bb305ff319688a3dfdbf71c607a65772f46730c46709cc81d9e4868,2024-11-20T14:39:07.953000
|
||||
CVE-2024-33029,0,0,62f4abf9d5534812dcbd495946ad70608b570bfbd1504fa70c29b97162ab7cc8,2024-11-07T19:54:49.197000
|
||||
CVE-2024-33030,0,0,6786bcd5f91e0222db6d4fee0ca52594e1eddb6ea4d24b69732bcfb924d01779,2024-11-07T20:04:32.803000
|
||||
CVE-2024-33031,0,0,2c6043e95fe57fcb75fcdc9e0de7b6eea7069d7adcef487c3c372f038ded1501,2024-11-07T20:02:31.203000
|
||||
CVE-2024-33032,0,0,98ee54090123171615e158b27044fae77331db53953631f8b90c74c1f7493104,2024-11-07T19:59:54.363000
|
||||
CVE-2024-33033,0,0,4ecde980d061a097abb6c1ea846d9ab81a0ba801acd0bcdb214e87c679daef4c,2024-11-07T19:39:24.863000
|
||||
CVE-2024-33034,0,0,54ed6e7d2fd983f237005bb3e1f82ed940ac2231de49deea5f0abbc3e6097779,2024-08-06T16:30:24.547000
|
||||
CVE-2024-33034,0,1,e88e5493c643619d79b7a0e6414306006539dc4b0eb6352ed218b58798008272,2024-11-20T13:54:40.360000
|
||||
CVE-2024-33035,0,0,a2cbf1ac3ca408060419991a03b24932660c70b02e16b8809b1fde0e9b502e88,2024-09-03T12:59:02.453000
|
||||
CVE-2024-33038,0,0,d174e8cb32f352bb37d4cf42fb06ed39c66af4e6d398e5501824f9508319fcd5,2024-09-04T17:21:28.943000
|
||||
CVE-2024-33042,0,0,4b177417250f6f5481ff89aae684855afcf48f2fdcb2418d54c43ca978dae432,2024-09-04T17:08:07.433000
|
||||
@ -260175,7 +260179,7 @@ CVE-2024-4176,0,0,2a1e283cc95c7d3d47b09f457f96512613ab4fb1878e9b333c02ce78f75d83
|
||||
CVE-2024-4177,0,0,e1d6d87dc8ef62b0d8de94cfe98a875b1cbd39c3640e8e02d8d5a4e8bb3cca88,2024-06-11T17:53:13.710000
|
||||
CVE-2024-41773,0,0,73b68ae1e3819b7d1bac9bdaf38a7a90512524d32ae7dfbb950bef5b99d479bb,2024-08-26T18:33:07.997000
|
||||
CVE-2024-41774,0,0,efcbfdf7ce18fcd97c6ecc860adabe2a80f23f77068d5d032fbe380664ccfbc3,2024-08-24T11:15:05.670000
|
||||
CVE-2024-41784,0,0,5fc6951c75d6283f66bb0ac59ed75c07ae4781461c6d985f4211d4d21a88721d,2024-11-18T17:11:56.587000
|
||||
CVE-2024-41784,0,1,8c6624e71cb1eed477e47e819c637ab44c35481822d3a957ec1d5eebd3832ab4,2024-11-20T14:35:10.117000
|
||||
CVE-2024-41785,0,0,da47a1916cf1b10014edcaabaa2e2bd599b3d785ebf02c8852bcdaa044613044,2024-11-18T17:11:56.587000
|
||||
CVE-2024-41798,0,0,0376144119ee906fa3756a5ffda1af85d3678e11ad2cbd0913fd4be38d98ecf1,2024-10-10T12:56:30.817000
|
||||
CVE-2024-41799,0,0,7695f1ee4025235dd7412142131ce8d75a7b17a18d3cf669cff383f93f7dba19,2024-07-29T16:21:52.517000
|
||||
@ -262892,10 +262896,10 @@ CVE-2024-45678,0,0,a1fda46a16546e5971e32d47cf6c55c6e5adf9e7e7bc6498d2c3cdc35ca99
|
||||
CVE-2024-45679,0,0,b98f85803530a208de6f955471a00fda8462357bfd07c53d204959dc086af47d,2024-09-20T12:30:51.220000
|
||||
CVE-2024-4568,0,0,950b62937f2f303cb16f164d002be64527131317e5dfff26daecb96b6bec4236,2024-05-07T13:39:32.710000
|
||||
CVE-2024-45682,0,0,8584442aa3e66ef486ff4d0e65e36dc65b16a5528e312d936a157a665ef44302,2024-09-27T18:54:51.820000
|
||||
CVE-2024-45689,1,1,c7e979f31e1bde92d5b4da5387428b58120f1325596ab42847b6eba43ff3aeb7,2024-11-20T11:15:05.337000
|
||||
CVE-2024-45689,0,0,c7e979f31e1bde92d5b4da5387428b58120f1325596ab42847b6eba43ff3aeb7,2024-11-20T11:15:05.337000
|
||||
CVE-2024-4569,0,0,2e4b27b05be8561bd3f260b3ccf0eed0d11ea74483878f5df5227737faa1c038,2024-06-28T13:10:05.153000
|
||||
CVE-2024-45690,1,1,74454f7c531bfb80a37c3fdc1f763db2a09dcbe2ca0c5bb3597e3500efe2f820,2024-11-20T11:15:05.413000
|
||||
CVE-2024-45691,1,1,ca4f55343dfa025487a6d3aee03385fc29227f8ef98bfe91847acc674bc2317b,2024-11-20T11:15:05.490000
|
||||
CVE-2024-45690,0,0,74454f7c531bfb80a37c3fdc1f763db2a09dcbe2ca0c5bb3597e3500efe2f820,2024-11-20T11:15:05.413000
|
||||
CVE-2024-45691,0,0,ca4f55343dfa025487a6d3aee03385fc29227f8ef98bfe91847acc674bc2317b,2024-11-20T11:15:05.490000
|
||||
CVE-2024-45692,0,0,281ed60ed9431c734132a4f1fca034600bdda2bdb5b83bc44745bc26a826447d,2024-09-05T21:35:14.337000
|
||||
CVE-2024-45693,0,0,8326a6a6c02d5129a5009d67c10554cd90e2c8aefe000e24bf1668842bfb6519,2024-10-17T20:21:11.913000
|
||||
CVE-2024-45694,0,0,6df0853247a969905230185a9047d7f0b5d3157f1a7bc76614dde5322218c3ae,2024-09-17T18:40:07.243000
|
||||
@ -263476,7 +263480,7 @@ CVE-2024-4682,0,0,b188d20fdb53d2324882bc38bcdbd4c51d4b6beb562fc8362c2866e7563895
|
||||
CVE-2024-46820,0,0,e02b77fbfb7c27b691f35a8ec06822e6f9168446acdd71a423d10b4bf4e98574,2024-09-30T12:45:57.823000
|
||||
CVE-2024-46821,0,0,646f132e7ed27c2717e047a01ec92f6d102c4152b9e0279d740913fed403825d,2024-10-04T17:06:43.573000
|
||||
CVE-2024-46822,0,0,c8a3d9e215b85580ec5917e738992b4dc25efcf9e837d449af86f4aa8203218c,2024-10-02T14:24:01.757000
|
||||
CVE-2024-46823,0,0,74e6b65053b916be51d6af5908af9de8bcd9c2ddf8063fe700f6963a1faa4849,2024-09-30T12:45:57.823000
|
||||
CVE-2024-46823,0,1,a167de10545a153c3d95daa6a21be068049a4c361c32c751cae65bc6ee29695c,2024-11-20T13:59:52.723000
|
||||
CVE-2024-46824,0,0,e0a90c0b6b8be6e8cdf7ea82a8f4714c063f5420a085c7bc4fdc88f4640c9615,2024-10-02T14:29:08.417000
|
||||
CVE-2024-46825,0,0,aa389e364217a0b9e16c3fcf17f7f0c6382d69ded44339c5aa61a7007a867b8d,2024-09-30T12:45:57.823000
|
||||
CVE-2024-46826,0,0,be734978861d0287bcd7e4a1cb0186beed982fdcb864acc473dc75997a104c25,2024-09-30T12:45:57.823000
|
||||
@ -264676,13 +264680,13 @@ CVE-2024-48878,0,0,2b15f82c5be65c88d261c3882a75397babc580305d6a252ad1dbf2de5b500
|
||||
CVE-2024-4888,0,0,ad5e456877e6c4225b3f983ebfcea1f0af64a03667e43f1cd6a0842bed4216c0,2024-11-03T17:15:14.137000
|
||||
CVE-2024-4889,0,0,98c988bc305180dfde4233cdb25b83940a2a23ecd5fc7825e58f1cc0fbfe5628,2024-10-15T19:00:09.633000
|
||||
CVE-2024-48895,0,0,11f1b544314db3e7a2e2f0ae6118cf9681d6a4928b5a8a68633e1e42e5369cf1,2024-11-20T08:15:15.190000
|
||||
CVE-2024-48896,0,0,b992316378dc674c4f86c74292b7b1938dedf579a456c4b81377a2d803cc86e3,2024-11-18T17:11:17.393000
|
||||
CVE-2024-48897,0,0,fb7520e1e59589ecdc201007a2560e0bbe0080044e959003906b061ba053cf71,2024-11-19T15:35:09.867000
|
||||
CVE-2024-48898,0,0,8529d519dd40a302fbe6ba08ef52420551e621ec79dd55c48ad2c7b84db09711,2024-11-18T17:11:17.393000
|
||||
CVE-2024-48899,1,1,0d8ef23611eada8fc0fc63454f34a97709861b32b5e14032cbff7c3fb2b15ca3,2024-11-20T11:15:05.563000
|
||||
CVE-2024-48896,0,1,3369e20ee0c39a35940972233d3a6f057bff00e79eb9a81bb021ceda4d8b9473,2024-11-20T14:47:12.777000
|
||||
CVE-2024-48897,0,1,5a651bf9ceed3dc79bdeab3d379ead0cb2ab30abdd2679a869c88655c07729fc,2024-11-20T14:48:25.373000
|
||||
CVE-2024-48898,0,1,33dcb27cf8e50763240699ca31930c2c749d47d6fae90855cdfb6f7b4010e416,2024-11-20T14:46:16.237000
|
||||
CVE-2024-48899,0,0,0d8ef23611eada8fc0fc63454f34a97709861b32b5e14032cbff7c3fb2b15ca3,2024-11-20T11:15:05.563000
|
||||
CVE-2024-4890,0,0,ee7720239380ab5c638f0803999a779457a74687c16e858d2acf0798605f57a2,2024-10-10T20:11:44.610000
|
||||
CVE-2024-48900,0,0,2b3a5e56342c363922328f10e6f3d06b5c266c3768636276b8919e3a3cee88b7,2024-11-13T17:01:16.850000
|
||||
CVE-2024-48901,0,0,d55eab1e1ed71395f22d7b632d754e2124bf5bf64f441bf3db31551da986d202,2024-11-18T17:11:17.393000
|
||||
CVE-2024-48901,0,1,d75b1ce91db0ab482f676e585ae0cc64acc3419cc25fbdc6e4284c75a5d0d1be,2024-11-20T14:45:10.380000
|
||||
CVE-2024-48902,0,0,fed2bf5b719b321f64381a649376d7e0618bda5baab6f732c38dcd1211106c26,2024-10-16T16:57:23.463000
|
||||
CVE-2024-48903,0,0,af1ee698040ee7f8c19b83dd0eb3404cde07c42231b0e3832a1aa5561c10194f,2024-10-23T15:12:34.673000
|
||||
CVE-2024-48904,0,0,56bc56ed1722c08287266703a07bddbd88211e3eebee5fa1d299ad65c198bf37,2024-10-23T15:12:34.673000
|
||||
@ -265157,13 +265161,13 @@ CVE-2024-49754,0,0,3d60a382d225af27e4e427016264fe0ef977537e441dcf7550bd5a624c929
|
||||
CVE-2024-49755,0,0,b1c1713e62d1c6cff006bddd32caeacb7a00a5abd98bfdd4887a4a4fcdb0308a,2024-10-29T14:34:50.257000
|
||||
CVE-2024-49756,0,0,17e2aa8675de07a9bb36aad326a0b90c2e6105df968303ed06bc9a1149a476bc,2024-10-25T12:56:36.827000
|
||||
CVE-2024-49757,0,0,41883c0db2190e07eb75f1500b6be8583d0953bfe5f6820811285d92db2c4bda,2024-10-28T13:58:09.230000
|
||||
CVE-2024-49758,0,0,144418e92fcd1536b54ea88fa2b7ea4a2c74e2686cf4ba46e82bbe4783267704,2024-11-18T17:11:56.587000
|
||||
CVE-2024-49759,0,0,6c97d9af5ed8bddeeec5129fe83aa52bf854bc9b63c657870bb061cf83f575b6,2024-11-18T17:11:56.587000
|
||||
CVE-2024-49758,0,1,a4718be4def45c610bf8df475381d937b986afb384bb9a21b8fe25995a729225,2024-11-20T14:40:36.990000
|
||||
CVE-2024-49759,0,1,2f35c7ffafe10f3fd820a893196b34ccb3b081cb325a0c4faa09162b95bca5c5,2024-11-20T14:40:17.500000
|
||||
CVE-2024-4976,0,0,fc4df77a0f9a74699614d42497ce42eb6f6db7897f4ce74b0071ab4cbdb2d9cf,2024-05-16T13:03:05.353000
|
||||
CVE-2024-49760,0,0,ab1d2b1d3d6f87001d0ec0c674554d145fba544f43978860ab9f315317a9615d,2024-11-06T15:01:01.013000
|
||||
CVE-2024-49761,0,0,cc77d1f33b16264261b43a7d1baebc02063ded1f31c9ab42da049e2bed05a708,2024-11-05T16:41:46.660000
|
||||
CVE-2024-49762,0,0,e267f4df9b55b0cddd8b82283d5a577158c52194b354f86421be17fb0c5fcf65,2024-10-25T12:56:07.750000
|
||||
CVE-2024-49764,0,0,ef6d29f89e0455861a138ef1625f43e061a379304014eb9cc9cfb1da449b9684,2024-11-18T17:11:56.587000
|
||||
CVE-2024-49764,0,1,35742a982a82bfbac3ba89ac10d6a85fed15175d4d482af0c8f4cf2b3fa6e2cc,2024-11-20T14:40:02.630000
|
||||
CVE-2024-49766,0,0,555038e30b17856b98b1634207b04f50d3fce08a3c00047a5f41e29a9d10d5d9,2024-10-28T13:58:09.230000
|
||||
CVE-2024-49767,0,0,b1abfb6c942255ecba6af733c92d4d0cb5e1d316b2b9040982ab9c6769c6893b,2024-11-05T20:03:04.847000
|
||||
CVE-2024-49768,0,0,d1c7bee24c60a7682e6a57ee28bfb0a2fbc48c379b23053fbff091516cb1e066,2024-11-07T17:28:02.853000
|
||||
@ -265507,7 +265511,7 @@ CVE-2024-50152,0,0,2c96ab518a9215c0d0e79f80a961320abfaaa147496070ea4893a223a0ff5
|
||||
CVE-2024-50153,0,0,5f6d0a7fb1773f81b91ac445e6aae318d6060320ea428ea0efdab2d109fa9dd3,2024-11-13T15:23:49.717000
|
||||
CVE-2024-50154,0,0,dd1e5f68aa038faa5d37972a828cf787243b5c34b51d1496a78801ba4944c9ea,2024-11-13T16:17:12.473000
|
||||
CVE-2024-50155,0,0,5747f9cf1aa53c1e6a78fde055a5d938a23ef7a9d8e0d83af3e149b9b3f45e42,2024-11-08T19:01:03.880000
|
||||
CVE-2024-50156,0,0,ed997ebe9a2b402a27fae0483970aab9a25073ff36ff717ae62fdc40d861b7ba,2024-11-08T19:01:03.880000
|
||||
CVE-2024-50156,0,1,10ddfc87e8be2ff73c45c1e079383de2ccb15433a8e7a479ab6f1cad4cb391ed,2024-11-20T13:58:04.447000
|
||||
CVE-2024-50157,0,0,831c798ea992786f323335d193dc3ef349a34b53fcca1479c8f7474757c08c4f,2024-11-08T19:01:03.880000
|
||||
CVE-2024-50158,0,0,9a6dda59860d55e42f9cf894dffd100a5d82221731fe812097f3aaee313e0486,2024-11-08T19:01:03.880000
|
||||
CVE-2024-50159,0,0,def37e8a35c0dac6f559b833c2d259adb7d51c4315f5392fefa9b6d81411da78,2024-11-19T02:16:18.443000
|
||||
@ -265708,12 +265712,12 @@ CVE-2024-50346,0,0,fb25cbb7b8a23f8bc4a8f048afe511d7d942fe5a9bb027a602dbfa956ec82
|
||||
CVE-2024-50347,0,0,27f16939f93088b46ca4735812513cca765a91a390b88a1aa60491d8fb6217f3,2024-11-01T12:57:03.417000
|
||||
CVE-2024-50348,0,0,fa8a8e9e48d227df1afdc378e4ee00ffda2dd051bb15c8b477e290549096cb45,2024-11-06T14:49:46.073000
|
||||
CVE-2024-5035,0,0,592ce94ebba91d65c9cac29085dbc465d14be23d13ac08f1e0101f9ce552a856,2024-05-29T05:16:08.793000
|
||||
CVE-2024-50350,0,0,e57f4a922e1c79b0180c3e0592329ef6fa2f99c33aa6b49b9847573b9eb154a7,2024-11-18T17:11:56.587000
|
||||
CVE-2024-50350,0,1,d2e00ecdb094f626cb988c81f0e09e733ae8e8f2c0ade9144a9043d9fde996a4,2024-11-20T14:39:51.533000
|
||||
CVE-2024-50351,0,0,9945f6315496e7ffef292cb6bb254851f7ffc08bf0016a8aaa4ebfb81815189c,2024-11-18T17:11:56.587000
|
||||
CVE-2024-50352,0,0,276319a772cc6b9c79af7c6a81a9d32a71ed55878cf5ece133a4c8f2dece885c,2024-11-18T17:11:56.587000
|
||||
CVE-2024-50352,0,1,e93a42474be1a92a1b7dfed7e5da4fde21b1fa5b690a7f9a24d3d7535c444c73,2024-11-20T14:37:42.660000
|
||||
CVE-2024-50353,0,0,ccbaa89f0150ad038f7930bf7da95bdebd48b8dd8438583bd87ed80c0a277898,2024-11-13T15:15:19.900000
|
||||
CVE-2024-50354,0,0,5fe2cfed42eb75a8865a8b156fa958f7af02063c60312ccd6714684eb18cee96,2024-11-01T12:57:03.417000
|
||||
CVE-2024-50355,0,0,fdf0f4898bc3208a4640ca7d84f1eaa6d82a458d706df006a383628856cba927,2024-11-18T17:11:56.587000
|
||||
CVE-2024-50355,0,1,34115e6fc2dfb50aaa39c5215f32063396760871c9e910082b3fe697717e7871,2024-11-20T14:39:36.550000
|
||||
CVE-2024-50356,0,0,1007ed397ecbfac0c7e4779187113696b4d36207eb77ee96ff22c8fde6a29757,2024-11-01T14:35:08.330000
|
||||
CVE-2024-5036,0,0,e97b40bd40cf208c311323e6564cb1ded96d8cc433059436a8705289f1e02a66,2024-06-20T12:43:25.663000
|
||||
CVE-2024-5037,0,0,46d4a5c4b83922b1ee19bcb8bbc97a0a290a2086fb5a073395bdb9a5e03441e0,2024-08-19T17:15:09.807000
|
||||
@ -266207,10 +266211,10 @@ CVE-2024-5149,0,0,35aba13432990695b4ab26ada33d31578be519ff456b8edf807a15027d0b18
|
||||
CVE-2024-51490,0,0,ce278c5bd11182b0f76e1306bfd4f5475ffe3bef255b34a2e09a247de41ed216,2024-11-14T20:13:01.587000
|
||||
CVE-2024-51492,0,0,0a58c7013d2cd1abea36461b62b0843b3a8fe747b96ce2f6ac388e3c542b0b6c,2024-11-01T21:15:15.080000
|
||||
CVE-2024-51493,0,0,905ca061a7e2249944cb0aec37c9054b75e237343bc05a733cf47492ea8f9f1d,2024-11-06T18:17:17.287000
|
||||
CVE-2024-51494,0,0,768d94c39977f281a9540a82a00ca9b85738d8e30ad5f5d9b39024226fed849c,2024-11-18T17:11:56.587000
|
||||
CVE-2024-51495,0,0,3aac532ebc83170fd4cdcd9b274e0e501971f24b62c956648aa38b4122350852,2024-11-18T17:11:56.587000
|
||||
CVE-2024-51494,0,1,6b2edaa05d2b59becf7c9d69d40516d1a0ed53a03f04b0082e28e05aaa8aaebe,2024-11-20T14:40:56.067000
|
||||
CVE-2024-51495,0,1,3ad1bf88596b0fcf4fd73fbdddab13bcdbce97c0e3285716d95520c68d531e7f,2024-11-20T14:41:07.960000
|
||||
CVE-2024-51496,0,0,5c3e7be7ec9a4a69a1b4281bdab16f27a5c3b5479253ca9e63bbb38f107e808e,2024-11-18T17:11:56.587000
|
||||
CVE-2024-51497,0,0,127d4c66ad34629669c91d690522d14baeaed8083c201258d7ffba47bba9e734,2024-11-18T17:11:56.587000
|
||||
CVE-2024-51497,0,1,1ca243749022146567df864212c7a3780a224cce9626607c0752e9eeb09667d9,2024-11-20T14:41:19.953000
|
||||
CVE-2024-51498,0,0,a215c64a461c357224f24d4e16a3f3f3214ac081278e197bc9556945ad303f5e,2024-11-05T16:04:26.053000
|
||||
CVE-2024-51499,0,0,aadd7e216a0f6786d88300be7bb6878349c5223bcb926905b51bbdf8d5a62edb,2024-11-19T21:57:32.967000
|
||||
CVE-2024-5150,0,0,af277f2642e60b6f0769d64573990279b6b64286b8d76d1359b09a52e223643b,2024-05-29T13:02:09.280000
|
||||
@ -266809,10 +266813,10 @@ CVE-2024-5242,0,0,8cd95bcd77d40a92ee0a6d389bf812b544cb6fb4b8301f7049b84de17fceae
|
||||
CVE-2024-52420,0,0,2cb30faa86447010f6f2c0a8bab5654f0c634929245006dc4c54ed00602072a3,2024-11-19T21:56:45.533000
|
||||
CVE-2024-52421,0,0,62d805b3a16a7d18da43ffdb2dfc842acf3a47153a56546b0066b2d5d56af31f,2024-11-19T21:56:45.533000
|
||||
CVE-2024-52422,0,0,2338bf2241d55f21a0c12dd5371bf65c250271e7243d67a0c51ed3280ad36d5e,2024-11-18T17:11:17.393000
|
||||
CVE-2024-52423,0,0,e0267840452833f2602fa1538625cfaf00251d143bc98b03d0ffc2dfae044e02,2024-11-18T17:11:17.393000
|
||||
CVE-2024-52424,0,0,8f1a40ffb810b1929a5badb494d0d5ab038ffbe605791144ff2da2a70673d505,2024-11-18T17:11:17.393000
|
||||
CVE-2024-52425,0,0,1e8d79e08f50b586b95f6ee20208415f780a72b35c6f1c2b04c8a6f0c29628c5,2024-11-18T17:11:17.393000
|
||||
CVE-2024-52426,0,0,bc937c236b052035f692c226bb49fe12719017b192fbfd2e7dc10c7b11ca4bf2,2024-11-18T17:11:17.393000
|
||||
CVE-2024-52423,0,1,4396d7f62487e6daaec36d37ec8194b9098b85e3bfa891916208754cb6abb9dd,2024-11-20T14:56:13.147000
|
||||
CVE-2024-52424,0,1,92c7a4f694477b0c4adbf5f52c44f2bc67a72e6754c53ddf12883836fcf8fd5a,2024-11-20T14:47:46.877000
|
||||
CVE-2024-52425,0,1,7b79e59d5c7916ff5a38769e37eb8655b09a371aae55a8bf43184161ecda71f0,2024-11-20T14:43:05.467000
|
||||
CVE-2024-52426,0,1,6b0290274d67e9fe59d70ab5f7cef8b5ed4ca1da67db6eea39b93bfd596fc737,2024-11-20T14:41:43.077000
|
||||
CVE-2024-52427,0,0,866e4edd9e1fba728e7340c7a93fd27c5bf44b0d9d2e1cbdabf851459b72f4a8,2024-11-18T17:11:17.393000
|
||||
CVE-2024-52428,0,0,4633554ebde5e68989b49a82bd94448b35796df1b77fa9a1ec75af4b6d67f998,2024-11-18T17:11:17.393000
|
||||
CVE-2024-52429,0,0,c582d392044ddc28766e57e153fc30c77d12461c131aceb4b6a2f035e5669085,2024-11-18T17:11:17.393000
|
||||
@ -266824,23 +266828,23 @@ CVE-2024-52433,0,0,7af8352b850dc6bbe5e7c25336ff4f6146705481d29b93e916a52482d7bff
|
||||
CVE-2024-52434,0,0,4c32114cc1ffe7fa4eb0add4d2567f663664a8d84321168452bc394f84e5e4d1,2024-11-18T17:11:17.393000
|
||||
CVE-2024-52435,0,0,1f9ab96c0d2886426dd4cb517eb16222ad8517fb43cb5d699370815204faf867,2024-11-18T17:11:17.393000
|
||||
CVE-2024-52436,0,0,371b1a4e00d4cd9b234014c0116bb9bfcf6e0ca82600c4ebf1e4512134bffa8b,2024-11-18T17:11:17.393000
|
||||
CVE-2024-52437,1,1,919f311130b57eebb1d1dd68fdcabc4aced488ca04d6d661b5497a46423dde5f,2024-11-20T12:15:19.133000
|
||||
CVE-2024-52438,1,1,7cbfd43b78eb199a9384650d6e0ae42f64cd4f7239f83b963194d5c836b70846,2024-11-20T12:15:19.390000
|
||||
CVE-2024-52439,1,1,6d190c01571ed430526e0001854eecb6d513a994b9acb9f04b30037c5db18ae6,2024-11-20T12:15:19.637000
|
||||
CVE-2024-52437,0,0,919f311130b57eebb1d1dd68fdcabc4aced488ca04d6d661b5497a46423dde5f,2024-11-20T12:15:19.133000
|
||||
CVE-2024-52438,0,0,7cbfd43b78eb199a9384650d6e0ae42f64cd4f7239f83b963194d5c836b70846,2024-11-20T12:15:19.390000
|
||||
CVE-2024-52439,0,0,6d190c01571ed430526e0001854eecb6d513a994b9acb9f04b30037c5db18ae6,2024-11-20T12:15:19.637000
|
||||
CVE-2024-5244,0,0,3de36675ae2f0b5e30ad70179a948c0cef684a516575b6f4510d379552ecc6bb,2024-05-24T01:15:30.977000
|
||||
CVE-2024-52440,1,1,c141409e3e457d18e6d0ffb1b705918854a92b812667b34c8e1a3a47af488008,2024-11-20T12:15:19.870000
|
||||
CVE-2024-52441,1,1,72ee951bedebbcbba59663bb2fd7a9cd7c5858c354badf6a2f74aa939df79f61,2024-11-20T12:15:20.110000
|
||||
CVE-2024-52442,1,1,4ca917fff479c5bbc724330c9b438f190b2db6ac6129c8eeb6127a11a23827cb,2024-11-20T12:15:20.370000
|
||||
CVE-2024-52443,1,1,a595a5f1f2d92564d08157befe48b5c8eb375e631a641e9843ddb74d30bd3467,2024-11-20T12:15:20.620000
|
||||
CVE-2024-52444,1,1,4ecd826f113e281302ec6f3be47f92c3d3f4cf00b4b29f65a35a8d30498e7a1d,2024-11-20T12:15:20.857000
|
||||
CVE-2024-52445,1,1,1696328045fcd63ab1e10bd80450254fd76ed39b87b620daf65a946d19fa2d24,2024-11-20T12:15:21.093000
|
||||
CVE-2024-52446,1,1,e2e88ed5a96a71dedd7966b0603094e0b8ae64302c883b7ca0e8f4429cc899cd,2024-11-20T12:15:21.303000
|
||||
CVE-2024-52447,1,1,f08507ad0b51b6897e689d22236e737fb0dbba9475b46ca0407da7f65de6fb00,2024-11-20T12:15:21.523000
|
||||
CVE-2024-52448,1,1,6979d3133fe019c3078442e46701f2a78bdc8422772f47efa8563f2df9f74a9f,2024-11-20T12:15:21.753000
|
||||
CVE-2024-52449,1,1,ce90d5d55e8436b94a304efc19163b49c2f5473c38f99b1a35c1d69e333131c0,2024-11-20T12:15:21.980000
|
||||
CVE-2024-52440,0,0,c141409e3e457d18e6d0ffb1b705918854a92b812667b34c8e1a3a47af488008,2024-11-20T12:15:19.870000
|
||||
CVE-2024-52441,0,0,72ee951bedebbcbba59663bb2fd7a9cd7c5858c354badf6a2f74aa939df79f61,2024-11-20T12:15:20.110000
|
||||
CVE-2024-52442,0,0,4ca917fff479c5bbc724330c9b438f190b2db6ac6129c8eeb6127a11a23827cb,2024-11-20T12:15:20.370000
|
||||
CVE-2024-52443,0,0,a595a5f1f2d92564d08157befe48b5c8eb375e631a641e9843ddb74d30bd3467,2024-11-20T12:15:20.620000
|
||||
CVE-2024-52444,0,0,4ecd826f113e281302ec6f3be47f92c3d3f4cf00b4b29f65a35a8d30498e7a1d,2024-11-20T12:15:20.857000
|
||||
CVE-2024-52445,0,0,1696328045fcd63ab1e10bd80450254fd76ed39b87b620daf65a946d19fa2d24,2024-11-20T12:15:21.093000
|
||||
CVE-2024-52446,0,0,e2e88ed5a96a71dedd7966b0603094e0b8ae64302c883b7ca0e8f4429cc899cd,2024-11-20T12:15:21.303000
|
||||
CVE-2024-52447,0,0,f08507ad0b51b6897e689d22236e737fb0dbba9475b46ca0407da7f65de6fb00,2024-11-20T12:15:21.523000
|
||||
CVE-2024-52448,0,0,6979d3133fe019c3078442e46701f2a78bdc8422772f47efa8563f2df9f74a9f,2024-11-20T12:15:21.753000
|
||||
CVE-2024-52449,0,0,ce90d5d55e8436b94a304efc19163b49c2f5473c38f99b1a35c1d69e333131c0,2024-11-20T12:15:21.980000
|
||||
CVE-2024-5245,0,0,8367cc316d7fd622697ed020483e2edc6264aea8aa776978b7228518baa31702,2024-05-24T01:15:30.977000
|
||||
CVE-2024-52450,1,1,002d848f8b202503bc5f349083e6360328b5ca35b8e488d4cb20477667418239,2024-11-20T12:15:22.203000
|
||||
CVE-2024-52451,1,1,c4dda19ad903fd6f4cd91db91be4b7e0b1f40513a3624be5b88bb657ca6869ae,2024-11-20T12:15:22.427000
|
||||
CVE-2024-52450,0,0,002d848f8b202503bc5f349083e6360328b5ca35b8e488d4cb20477667418239,2024-11-20T12:15:22.203000
|
||||
CVE-2024-52451,0,0,c4dda19ad903fd6f4cd91db91be4b7e0b1f40513a3624be5b88bb657ca6869ae,2024-11-20T12:15:22.427000
|
||||
CVE-2024-5246,0,0,481ebf23b779dd3e32e9e0cda77aaee7d0bfc9eca82266cde6c77415f4c9c730,2024-07-03T02:08:44.767000
|
||||
CVE-2024-5247,0,0,fdfe6c1388c42f602cdcb0ffda38b56b5f1ed960e60bfada435f42d294b2956e,2024-05-24T01:15:30.977000
|
||||
CVE-2024-5248,0,0,6cfa5cec6de457c13d7096887dc7c2d8bd99f0e898238886822e69d1ee66037e,2024-11-03T17:15:14.860000
|
||||
@ -266869,7 +266873,7 @@ CVE-2024-52522,0,0,edf7004ccd6336646bd62897c72f173949a7bccd13754c42d91ebe1cf4291
|
||||
CVE-2024-52523,0,0,b39a07e2092398c505e1cd9be8c756d4bf2594c64c511dd2bd5163c1956a2cb0,2024-11-18T17:11:56.587000
|
||||
CVE-2024-52524,0,0,0291fb2989ba5bd963e5ba7b16897e7b20eac1eef7056f852252def8abaaa70e,2024-11-18T21:35:08.980000
|
||||
CVE-2024-52525,0,0,87d8daa94d9c7b3468acdf4310326eea5f93ca728ee9d3040ae0a2505b89ffac,2024-11-18T17:11:56.587000
|
||||
CVE-2024-52526,0,0,ba0ff75a3b36626b2771509f60c7f01aa4dce06b627b1d265467a40470309dff,2024-11-18T17:11:56.587000
|
||||
CVE-2024-52526,0,1,3ff8576252c4638e87e23c9cbf14531bcd7f764e2544e8015e850cb9c0cd5650,2024-11-20T14:39:19.647000
|
||||
CVE-2024-52528,0,0,357b5377315c119aee7d7f03933ac3191b35ccfd203197b2c4dbf611d4131383,2024-11-18T17:11:56.587000
|
||||
CVE-2024-5253,0,0,73f9562f224a9a11b8b8279a7bf00d920003fa046cb7c88a3a55caf281adabe4,2024-07-19T15:30:34.717000
|
||||
CVE-2024-52530,0,0,9accb3b51708da4056e1b2d60bf748a8c8f27363e68e7120159317514b4fed53,2024-11-12T19:35:14.927000
|
||||
@ -266886,17 +266890,17 @@ CVE-2024-52553,0,0,11348c28b862f60d8b3c8dc11ab0fb5f1e53e1358b82b1f8a97199c0de1f5
|
||||
CVE-2024-52554,0,0,6589eaee43c4794afc2869f1e1fb69f264d40d3a38b215d2e67a517b5a3abbef,2024-11-15T13:58:08.913000
|
||||
CVE-2024-52555,0,0,c97d8ff69d857d692c46704b7ff49ed428a5a26328d189c8729b526799d5895f,2024-11-18T17:11:56.587000
|
||||
CVE-2024-5256,0,0,c0c79be075ef53b66bd4c726b840e366d70c6f0c56013178c0440e2e2bf91c1e,2024-09-24T18:41:40.007000
|
||||
CVE-2024-52565,0,0,b8ddc414603ab1b65edee888c801830a5e19005ef67a36e46ef7dc6bf1cb03e1,2024-11-18T17:11:17.393000
|
||||
CVE-2024-52566,0,0,4c13e09f11387ccf8204db5c6e2f2b0b9d003220b5d6cdffabf419e9af11b119,2024-11-18T17:11:17.393000
|
||||
CVE-2024-52567,0,0,7883c82724df84f093775c49944ad85eb5bbd4258b9fb33951822f94c96ef518,2024-11-18T17:11:17.393000
|
||||
CVE-2024-52568,0,0,6260cbd1933620aec5cd1dee5797dfd7f6edc01e0eca5718b09efb9115a73a0f,2024-11-18T17:11:17.393000
|
||||
CVE-2024-52569,0,0,e7e8237ba9de48172fb8671bb46c84de374aea7b7d0d05db890f1a0152fc2615,2024-11-18T17:11:17.393000
|
||||
CVE-2024-52565,0,1,fac10903d391ff827ff014e5a95deca40d1f2e18da523c49b30be0512dcf1829,2024-11-20T14:33:29.197000
|
||||
CVE-2024-52566,0,1,d10b255a94ff44786570176fc140bc95e575e386efb795bde0c1402a587d6201,2024-11-20T14:33:20.813000
|
||||
CVE-2024-52567,0,1,9cf3af2e46b3841bed2eadd127e126772d6c66c831ace68475e4f96d1a032f91,2024-11-20T14:33:09.433000
|
||||
CVE-2024-52568,0,1,7cbe3b6b2e1be110c13f39df4cc5dd6f38049b9ce1b1997ffd869829b65e9a25,2024-11-20T14:32:58.637000
|
||||
CVE-2024-52569,0,1,223e62b63b867f2d4646b12e55c93d78cba3ef316cc70d2b7d316a2c576a3ed8,2024-11-20T14:32:48.897000
|
||||
CVE-2024-5257,0,0,e4fba0a5c9dc635ae9582dcee356a08c90165a6e8c8a0a01b6dfbef5e885cd24,2024-07-12T16:54:34.517000
|
||||
CVE-2024-52570,0,0,dbef6001e10b52ffe3b74f97547d009fa042e896dc36ce77b58cdd068ec9584f,2024-11-18T17:11:17.393000
|
||||
CVE-2024-52571,0,0,dc54a6ca892fbf2447eec49bac5f3db2ae9d3b0e04f28a30f186a2e020da0d94,2024-11-18T17:11:17.393000
|
||||
CVE-2024-52572,0,0,ebb7d32af991ea946ce7b08397e09643d24f4d57c60b8d5741c60f1a71b90137,2024-11-18T17:11:17.393000
|
||||
CVE-2024-52573,0,0,cce17e8c7eac72f4f0bd4de019ed716652f5c5bc2155e2ccd9cbdc8c71188bd0,2024-11-18T17:11:17.393000
|
||||
CVE-2024-52574,0,0,f9f905d7d81dd0480b5a16770f5f6f4db17a72ca814858644fca40063e1c8a42,2024-11-18T17:11:17.393000
|
||||
CVE-2024-52570,0,1,a14c936aa883c438534ea173c5acaffbd78758366bc0015583ec8b87659fed4c,2024-11-20T14:32:38
|
||||
CVE-2024-52571,0,1,d83cc3b0516545ebca24319bf204b841191fc25d01f2e654cf6272193a5c7fa5,2024-11-20T14:32:29.867000
|
||||
CVE-2024-52572,0,1,c0e0fc96131cfde3245d161e47af7d9dec01580e56aa338c8a414865df238124,2024-11-20T14:32:21.533000
|
||||
CVE-2024-52573,0,1,7ffccf8870901c006a7f33dc1d8f91b9d66ed7ff0d296ac84a25af9c21b99120,2024-11-20T14:32:11.853000
|
||||
CVE-2024-52574,0,1,08a31b1207ac9954890db3514da1b5bfbbffb60d94a65f2e19cf3704e3894c71,2024-11-20T14:31:47.103000
|
||||
CVE-2024-5258,0,0,51134eb56f05332c584317818ff995de56b2de598a9752cb1990f31f73c535e3,2024-05-24T01:15:30.977000
|
||||
CVE-2024-52582,0,0,062f12e1e823d51d2f1a33f66443e047c3af587e7890e11c0a77ee9784e71f0b,2024-11-19T21:57:32.967000
|
||||
CVE-2024-52583,0,0,331a75eedc8c50395b086e90133cf1403c288043391a827605fb5f0e36a935a2,2024-11-19T21:57:32.967000
|
||||
@ -266905,6 +266909,7 @@ CVE-2024-52585,0,0,ae573765d0059b6c237eb866187766f9c4c0b67ec566925f547df71f0cc9a
|
||||
CVE-2024-52587,0,0,4ff6d32c0cce5d4db211ff88731438a9a256421cd5f2b2cabeafbdadc8a29ef5,2024-11-19T21:57:32.967000
|
||||
CVE-2024-5259,0,0,b3c664cd11ddb9db1b34b50011b18499fc5ac06e8b6b6a588e8cf7d8bc26fc37,2024-06-11T17:44:42.783000
|
||||
CVE-2024-52595,0,0,9350e5c85067e132d51c2548051208f53f3e040f154d457bd6c129e1523fcb4c,2024-11-19T22:15:21.120000
|
||||
CVE-2024-52597,1,1,0dc15f04b10696c300efbe4aac63baeff7d573b005de682671a7397a19d8fe4d,2024-11-20T14:15:17.967000
|
||||
CVE-2024-5260,0,0,1ea9956e2812efb1ad02a50e6e15b3c5419e86ea96923b6afc83449c65511582,2024-07-02T12:09:16.907000
|
||||
CVE-2024-52600,0,0,889882d763fff118298a79c0992b9d094668285ba42b3979d1acce7319312517,2024-11-19T21:56:45.533000
|
||||
CVE-2024-5261,0,0,0592ac8c89e0cb8027f6648912b9536cab36db7fb70868109d4e1f51168ecc2f,2024-06-25T18:50:42.040000
|
||||
@ -270370,6 +270375,8 @@ CVE-2024-9474,0,0,3fef1f3c76f5f634d1a88c922559de94af3e45f4090a5ae04eeaeea76b5e73
|
||||
CVE-2024-9475,0,0,273622ecfea8dd0cb8d3a034084a5946e50b2bee83443e844bae24857067e968,2024-10-28T13:58:09.230000
|
||||
CVE-2024-9476,0,0,e9d7dbd43229ebc9ea9972271d753666a58d144ea232688064d92b4b52fc9277,2024-11-15T14:00:09.720000
|
||||
CVE-2024-9477,0,0,cf43e95350fa7037b016e95ffdd76723a0091878a7d1f39dfbb116076ef07df2,2024-11-15T22:54:21.233000
|
||||
CVE-2024-9478,1,1,5901822e0f11d4c7bfd53c41723c68e59ca8e13f7197d8389dbae01e09ff41b9,2024-11-20T14:15:18.207000
|
||||
CVE-2024-9479,1,1,9acd2098f4317e27c4c72b01eadeb69aed04a53c1a35830814708147eb67743e,2024-11-20T14:15:18.350000
|
||||
CVE-2024-9481,0,0,00fc2967ba19d907f5a39395cc30079db3ef641b613179e4b9951bd38c8d6817,2024-11-08T20:49:03.597000
|
||||
CVE-2024-9482,0,0,761865a3338cb95ad6952db46fced2e0b200e6722c7208c63ea4447e2930458e,2024-11-08T20:49:58.077000
|
||||
CVE-2024-9483,0,0,ad5fedd0cd72fbc18365b7b114267513d576cf1b98379267d7018d384a26ba96,2024-11-08T20:54:30.980000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user