mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-21 17:41:05 +00:00
Auto-Update: 2024-07-17T18:00:18.559637+00:00
This commit is contained in:
parent
7523cc83bf
commit
8c97b46944
78
CVE-2023/CVE-2023-49xx/CVE-2023-4976.json
Normal file
78
CVE-2023/CVE-2023-49xx/CVE-2023-4976.json
Normal file
@ -0,0 +1,78 @@
|
||||
{
|
||||
"id": "CVE-2023-4976",
|
||||
"sourceIdentifier": "psirt@purestorage.com",
|
||||
"published": "2024-07-17T16:15:03.233",
|
||||
"lastModified": "2024-07-17T16:15:03.233",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A flaw exists in Purity//FB whereby a local account is permitted to authenticate to the management interface using an unintended method that allows an attacker to gain privileged access to the array."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "psirt@purestorage.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "HIGH",
|
||||
"vulnerableSystemIntegrity": "HIGH",
|
||||
"vulnerableSystemAvailability": "HIGH",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 9.3,
|
||||
"baseSeverity": "CRITICAL"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@purestorage.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://purestorage.com/security",
|
||||
"source": "psirt@purestorage.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-1394",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-03-21T13:00:08.037",
|
||||
"lastModified": "2024-07-16T22:15:04.100",
|
||||
"lastModified": "2024-07-17T16:15:03.460",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -168,6 +168,10 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:4581",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:4591",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2024-1394",
|
||||
"source": "secalert@redhat.com"
|
||||
|
56
CVE-2024/CVE-2024-202xx/CVE-2024-20296.json
Normal file
56
CVE-2024/CVE-2024-202xx/CVE-2024-20296.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-20296",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-07-17T17:15:12.367",
|
||||
"lastModified": "2024-07-17T17:15:12.367",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to upload arbitrary files to an affected device. To exploit this vulnerability, an attacker would need at least valid Policy Admin credentials on the affected device.\r\n\r This vulnerability is due to improper validation of files that are uploaded to the web-based management interface. An attacker could exploit this vulnerability by uploading arbitrary files to an affected device. A successful exploit could allow the attacker to store malicious files on the system, execute arbitrary commands on the operating system, and elevate privileges to root."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 4.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-file-upload-krW2TxA9",
|
||||
"source": "ykramarz@cisco.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-203xx/CVE-2024-20323.json
Normal file
56
CVE-2024/CVE-2024-203xx/CVE-2024-20323.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-20323",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-07-17T17:15:12.607",
|
||||
"lastModified": "2024-07-17T17:15:12.607",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in Cisco Intelligent Node (iNode) Software could allow an unauthenticated, remote attacker to hijack the TLS connection between Cisco iNode Manager and associated intelligent nodes and send arbitrary traffic to an affected device.\r\n\r This vulnerability is due to the presence of hard-coded cryptographic material. An attacker in a man-in-the-middle position between Cisco iNode Manager and associated deployed nodes could exploit this vulnerability by using the static cryptographic key to generate a trusted certificate and impersonate an affected device. A successful exploit could allow the attacker to read data that is meant for a legitimate device, modify the startup configuration of an associated node, and, consequently, cause a denial of service (DoS) condition for downstream devices that are connected to the affected node."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 4.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-321"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-inode-static-key-VUVCeynn",
|
||||
"source": "ykramarz@cisco.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-203xx/CVE-2024-20395.json
Normal file
56
CVE-2024/CVE-2024-203xx/CVE-2024-20395.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-20395",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-07-17T17:15:12.833",
|
||||
"lastModified": "2024-07-17T17:15:12.833",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the media retrieval functionality of Cisco Webex App could allow an unauthenticated, adjacent attacker to gain access to sensitive session information.\r\n\r This vulnerability is due to insecure transmission of requests to backend services when the app accesses embedded media, such as images. An attacker could exploit this vulnerability by sending a message with embedded media that is stored on a messaging server to a targeted user. If the attacker can observe transmitted traffic in a privileged network position, a successful exploit could allow the attacker to capture session token information from insecurely transmitted requests and possibly reuse the captured session information to take further actions as the targeted user."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-523"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-app-ZjNm8X8j",
|
||||
"source": "ykramarz@cisco.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-203xx/CVE-2024-20396.json
Normal file
56
CVE-2024/CVE-2024-203xx/CVE-2024-20396.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-20396",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-07-17T17:15:13.070",
|
||||
"lastModified": "2024-07-17T17:15:13.070",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the protocol handlers of Cisco Webex App could allow an unauthenticated, remote attacker to gain access to sensitive information.\r\n\r This vulnerability exists because the affected application does not safely handle file protocol handlers. An attacker could exploit this vulnerability by persuading a user to follow a link that is designed to cause the application to send requests. If the attacker can observe transmitted traffic in a privileged network position, a successful exploit could allow the attacker to capture sensitive information, including credential information, from the requests."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-app-ZjNm8X8j",
|
||||
"source": "ykramarz@cisco.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-204xx/CVE-2024-20400.json
Normal file
56
CVE-2024/CVE-2024-204xx/CVE-2024-20400.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-20400",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-07-17T17:15:13.300",
|
||||
"lastModified": "2024-07-17T17:15:13.300",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the web-based management interface of Cisco Expressway Series could allow an unauthenticated, remote attacker to redirect a user to a malicious web page.\r\n\r This vulnerability is due to improper input validation of HTTP request parameters. An attacker could exploit this vulnerability by intercepting and modifying an HTTP request from a user. A successful exploit could allow the attacker to redirect the user to a malicious web page.\r\n\r Note: Cisco Expressway Series refers to Cisco Expressway Control (Expressway-C) devices and Cisco Expressway Edge (Expressway-E) devices."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-601"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-expressway-redirect-KJsFuXgj",
|
||||
"source": "ykramarz@cisco.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-204xx/CVE-2024-20401.json
Normal file
56
CVE-2024/CVE-2024-204xx/CVE-2024-20401.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-20401",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-07-17T17:15:13.540",
|
||||
"lastModified": "2024-07-17T17:15:13.540",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the content scanning and message filtering features of Cisco Secure Email Gateway could allow an unauthenticated, remote attacker to overwrite arbitrary files on the underlying operating system.\r\n\r This vulnerability is due to improper handling of email attachments when file analysis and content filters are enabled. An attacker could exploit this vulnerability by sending an email that contains a crafted attachment through an affected device. A successful exploit could allow the attacker to replace any file on the underlying file system. The attacker could then perform any of the following actions: add users with root privileges, modify the device configuration, execute arbitrary code, or cause a permanent denial of service (DoS) condition on the affected device.\r\n\r Note: Manual intervention is required to recover from the DoS condition. Customers are advised to contact the Cisco Technical Assistance Center (TAC) to help recover a device in this condition."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-36"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-afw-bGG2UsjH",
|
||||
"source": "ykramarz@cisco.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-204xx/CVE-2024-20416.json
Normal file
56
CVE-2024/CVE-2024-204xx/CVE-2024-20416.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-20416",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-07-17T17:15:13.877",
|
||||
"lastModified": "2024-07-17T17:15:13.877",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the upload module of Cisco RV340 and RV345 Dual WAN Gigabit VPN Routers could allow an authenticated, remote attacker to execute arbitrary code on an affected device.\r\n\r This vulnerability is due to insufficient boundary checks when processing specific HTTP requests. An attacker could exploit this vulnerability by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system of the device."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-130"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv34x-rce-7pqFU2e",
|
||||
"source": "ykramarz@cisco.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-204xx/CVE-2024-20419.json
Normal file
56
CVE-2024/CVE-2024-204xx/CVE-2024-20419.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-20419",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-07-17T17:15:14.143",
|
||||
"lastModified": "2024-07-17T17:15:14.143",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the authentication system of Cisco Smart Software Manager On-Prem (SSM On-Prem) could allow an unauthenticated, remote attacker to change the password of any user, including administrative users.\r\n\r This vulnerability is due to improper implementation of the password-change process. An attacker could exploit this vulnerability by sending crafted HTTP requests to an affected device. A successful exploit could allow an attacker to access the web UI or API with the privileges of the compromised user."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 10.0,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-620"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cssm-auth-sLw3uhUy",
|
||||
"source": "ykramarz@cisco.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-204xx/CVE-2024-20429.json
Normal file
56
CVE-2024/CVE-2024-204xx/CVE-2024-20429.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-20429",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-07-17T17:15:14.497",
|
||||
"lastModified": "2024-07-17T17:15:14.497",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the web-based management interface of Cisco AsyncOS for Secure Email Gateway could allow an authenticated, remote attacker to execute arbitrary system commands on an affected device.\r\n\r This vulnerability is due to insufficient input validation in certain portions of the web-based management interface. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with root privileges. To successfully exploit this vulnerability, an attacker would need at least valid Operator credentials."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-74"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-priv-esc-ssti-xNO2EOGZ",
|
||||
"source": "ykramarz@cisco.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-204xx/CVE-2024-20435.json
Normal file
56
CVE-2024/CVE-2024-204xx/CVE-2024-20435.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-20435",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-07-17T17:15:14.787",
|
||||
"lastModified": "2024-07-17T17:15:14.787",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the CLI of Cisco AsyncOS for Secure Web Appliance could allow an authenticated, local attacker to execute arbitrary commands and elevate privileges to root.\r\n\r This vulnerability is due to insufficient validation of user-supplied input for the CLI. An attacker could exploit this vulnerability by authenticating to the system and executing a crafted command on the affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system and elevate privileges to root. To successfully exploit this vulnerability, an attacker would need at least guest credentials."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.0,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-250"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-swa-priv-esc-7uHpZsCC",
|
||||
"source": "ykramarz@cisco.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-29120",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-07-17T15:15:14.090",
|
||||
"lastModified": "2024-07-17T15:15:14.090",
|
||||
"lastModified": "2024-07-17T16:15:04.157",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -25,6 +25,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/07/17/4",
|
||||
"source": "security@apache.org"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.apache.org/thread/y3oqz7l8vd7jxxx3z2khgl625nvfr60j",
|
||||
"source": "security@apache.org"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-35056",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-05-21T18:15:09.737",
|
||||
"lastModified": "2024-05-22T12:46:53.887",
|
||||
"lastModified": "2024-07-17T17:15:15.263",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -17,6 +17,10 @@
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/advisories/GHSA-gpgj-xrgw-8mx2",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.linkedin.com/pulse/remote-code-execution-via-man-in-the-middle-more-ujkze",
|
||||
"source": "cve@mitre.org"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-35057",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-05-21T18:15:09.820",
|
||||
"lastModified": "2024-07-03T02:01:16.030",
|
||||
"lastModified": "2024-07-17T16:15:04.577",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -52,6 +52,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/advisories/GHSA-jf28-v5f6-cvpr",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.linkedin.com/pulse/remote-code-execution-via-man-in-the-middle-more-ujkze",
|
||||
"source": "cve@mitre.org"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-35058",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-05-21T18:15:09.903",
|
||||
"lastModified": "2024-07-03T02:01:16.830",
|
||||
"lastModified": "2024-07-17T16:15:04.673",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -52,6 +52,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/advisories/GHSA-4gxj-5mmr-7pxq",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.linkedin.com/pulse/remote-code-execution-via-man-in-the-middle-more-ujkze",
|
||||
"source": "cve@mitre.org"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-35059",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-05-21T19:15:10.240",
|
||||
"lastModified": "2024-07-03T02:01:17.657",
|
||||
"lastModified": "2024-07-17T16:15:04.743",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -52,6 +52,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/advisories/GHSA-jqff-8g2v-642h",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.linkedin.com/pulse/remote-code-execution-via-man-in-the-middle-more-ujkze",
|
||||
"source": "cve@mitre.org"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-35060",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-05-21T19:15:10.313",
|
||||
"lastModified": "2024-07-03T02:01:18.427",
|
||||
"lastModified": "2024-07-17T16:15:04.813",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -52,6 +52,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/advisories/GHSA-45q4-h8rr-hgx2",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.linkedin.com/pulse/remote-code-execution-via-man-in-the-middle-more-ujkze",
|
||||
"source": "cve@mitre.org"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-35061",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-05-21T19:15:10.390",
|
||||
"lastModified": "2024-07-03T02:01:19.220",
|
||||
"lastModified": "2024-07-17T16:15:04.877",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -52,6 +52,14 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/advisories/GHSA-jqff-8g2v-642h",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/advisories/GHSA-qv6x-53jj-vw59",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.linkedin.com/pulse/remote-code-execution-via-man-in-the-middle-more-ujkze",
|
||||
"source": "cve@mitre.org"
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-36082",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2024-06-07T04:15:30.357",
|
||||
"lastModified": "2024-06-07T14:56:05.647",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-07-17T17:36:42.157",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,19 +15,81 @@
|
||||
"value": "Vulnerabilidad de inyecci\u00f3n SQL en Music Store - WordPress eCommerce anteriores a la 1.1.14 permiten que un atacante remoto autenticado con privilegios administrativos ejecute comandos SQL arbitrarios. El atacante puede obtener o modificar la informaci\u00f3n almacenada en la base de datos."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"url": "https://jvn.jp/en/jp/JVN79213252/",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?new=3085975%40music-store%2Ftrunk%2Fmusic-store.php&old=3079647%40music-store%2Ftrunk%2Fmusic-store.php",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"url": "https://wordpress.org/plugins/music-store/",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:codepeople:music_store:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "1.1.14",
|
||||
"matchCriteriaId": "0EFA9577-4E22-45D4-B166-E8E2404CB09C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://jvn.jp/en/jp/JVN79213252/",
|
||||
"source": "vultures@jpcert.or.jp",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?new=3085975%40music-store%2Ftrunk%2Fmusic-store.php&old=3079647%40music-store%2Ftrunk%2Fmusic-store.php",
|
||||
"source": "vultures@jpcert.or.jp",
|
||||
"tags": [
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://wordpress.org/plugins/music-store/",
|
||||
"source": "vultures@jpcert.or.jp",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-36965",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-06-08T13:15:57.820",
|
||||
"lastModified": "2024-06-10T02:52:08.267",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-07-17T17:32:46.323",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,31 +15,131 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: remoteproc: mediatek: aseg\u00farese de que el b\u00fafer IPI encaje en L2TCM. La ubicaci\u00f3n del b\u00fafer IPI se lee desde el firmware que cargamos en el procesador System Companion, y no se garantiza que tanto la SRAM ( L2TCM) que se define en el nodo del \u00e1rbol de dispositivos es lo suficientemente grande para eso, y si bien esto es especialmente cierto para SCP de m\u00faltiples n\u00facleos, tambi\u00e9n es \u00fatil verificar las variantes de un solo n\u00facleo. No realizar esta verificaci\u00f3n puede hacer que este controlador realice operaciones de lectura y escritura fuera del l\u00edmite L2TCM, lo que resultar\u00e1 (en el mejor de los casos) en un p\u00e1nico en el kernel. Para solucionarlo, verifique que el b\u00fafer IPI encaje; de lo contrario, devolver\u00e1 una falla y se negar\u00e1 a iniciar el n\u00facleo SCP relevante (o el SCP en absoluto, si es de un solo n\u00facleo)."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/00548ac6b14428719c970ef90adae2b3b48c0cdf",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/1d9e2de24533daca36cbf09e8d8596bf72b526b2",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/26c6d7dc8c6a9fde9d362ab2eef6390efeff145e",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/331f91d86f71d0bb89a44217cc0b2a22810bbd42",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/36c79eb4845551e9f6d28c663b38ce0ab03b84a9",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/838b49e211d59fa827ff9df062d4020917cffbdf",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11",
|
||||
"versionEndIncluding": "5.15.160",
|
||||
"matchCriteriaId": "EB1227F5-B622-45F2-80C8-F94E3F45859D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndIncluding": "6.1.92",
|
||||
"matchCriteriaId": "D7E75569-629C-4E66-840F-75A9E1A870CB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2",
|
||||
"versionEndIncluding": "6.6.32",
|
||||
"matchCriteriaId": "9E9EFAF5-AF5B-459D-B215-645B1CE4A579"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndIncluding": "6.8.11",
|
||||
"matchCriteriaId": "73BBA055-7988-4EAB-8218-196DA874ED2A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.9",
|
||||
"versionEndIncluding": "6.9.2",
|
||||
"matchCriteriaId": "6539B4CE-9805-42AB-AEAF-91ED579F0F01"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/00548ac6b14428719c970ef90adae2b3b48c0cdf",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/1d9e2de24533daca36cbf09e8d8596bf72b526b2",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/26c6d7dc8c6a9fde9d362ab2eef6390efeff145e",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/331f91d86f71d0bb89a44217cc0b2a22810bbd42",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/36c79eb4845551e9f6d28c663b38ce0ab03b84a9",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/838b49e211d59fa827ff9df062d4020917cffbdf",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-36967",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-06-08T13:15:58.000",
|
||||
"lastModified": "2024-06-10T02:52:08.267",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-07-17T17:03:53.860",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,31 +15,131 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: KEYS: confiable: corrige la p\u00e9rdida de memoria en tpm2_key_encode() 'scratch' nunca se libera. Solucione este problema llamando a kfree() en caso de \u00e9xito y de error."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/189c768932d435045b1fae12bf63e53866f06a28",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/1e6914fa8e7798bcf3ce4a5b96ea4ac1d5571cdf",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/5d91238b590bd883c86ba7707c5c9096469c08b7",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/cf26a92f560eed5d6ddc3d441cc645950cbabc56",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/e62835264d0352be6086975f18fdfed2b5520b13",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/ffcaa2172cc1a85ddb8b783de96d38ca8855e248",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"lang": "en",
|
||||
"value": "CWE-401"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.13",
|
||||
"versionEndExcluding": "5.15.160",
|
||||
"matchCriteriaId": "795AB883-0972-406E-AFB1-7410C2556E94"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "6.1.92",
|
||||
"matchCriteriaId": "4E8DFDEB-F911-42FB-A55F-B84A9C556F01"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2",
|
||||
"versionEndExcluding": "6.6.32",
|
||||
"matchCriteriaId": "18199311-EF79-4480-85B0-6AD00C70A7BE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.8.11",
|
||||
"matchCriteriaId": "3B75CBAF-FD3C-40AE-85BB-0525E142C4C8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.9",
|
||||
"versionEndExcluding": "6.9.2",
|
||||
"matchCriteriaId": "197A592B-2A2B-4A2F-8856-22638007413E"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/189c768932d435045b1fae12bf63e53866f06a28",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/1e6914fa8e7798bcf3ce4a5b96ea4ac1d5571cdf",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/5d91238b590bd883c86ba7707c5c9096469c08b7",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/cf26a92f560eed5d6ddc3d441cc645950cbabc56",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/e62835264d0352be6086975f18fdfed2b5520b13",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/ffcaa2172cc1a85ddb8b783de96d38ca8855e248",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-36968",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-06-08T13:15:58.093",
|
||||
"lastModified": "2024-06-12T10:15:31.153",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-07-17T16:59:39.987",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,27 +15,114 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: Bluetooth: L2CAP: corrige div-by-zero en l2cap_le_flowctl_init() l2cap_le_flowctl_init() puede causar tanto div-by-zero como un desbordamiento de enteros ya que hdev->le_mtu puede no caer el rango v\u00e1lido. Mueva MTU de hci_dev a hci_conn para validar MTU y detener el proceso de conexi\u00f3n antes si MTU no es v\u00e1lido. Adem\u00e1s, agregue una validaci\u00f3n faltante en read_buffer_size() y haga que devuelva un valor de error si la validaci\u00f3n falla. Ahora hci_conn_add() devuelve ERR_PTR() ya que puede fallar debido a una falla de kzalloc y un valor de MTU no v\u00e1lido. error de divisi\u00f3n: 0000 [#1] PREEMPT SMP KASAN NOPTI CPU: 0 PID: 67 Comm: kworker/u5:0 Tainted: GW 6.9.0-rc5+ #20 Nombre de hardware: PC est\u00e1ndar QEMU (i440FX + PIIX, 1996), BIOS 1.15.0-1 01/04/2014 Cola de trabajo: hci0 hci_rx_work RIP: 0010:l2cap_le_flowctl_init+0x19e/0x3f0 net/bluetooth/l2cap_core.c:547 C\u00f3digo: e8 17 17 0c 00 66 41 89 9f 84 00 00 novio 01 00 00 00 41 b8 02 00 00 00 4c 89 fe 4c 89 e2 89 d9 e8 27 17 0c 00 44 89 f0 31 d2 <66> f7 f3 89 c3 ff c3 4d 8d b7 88 00 00 00 4c 89 f0 48 c1 e8 03 42 RSP: 0018:ffff88810bc0f858 EFLAGS: 00010246 RAX: 00000000000002a0 RBX: 0000000000000000 RCX: dffffc0000000000 RDX: 0000000000000000 RSI: 810bc0f7c0 RDI: ffffc90002dcb66f RBP: ffff88810bc0f880 R08: aa69db2dda70ff01 R09: 0000ffaaaaaaaaaa R10: 0084000000ffaaaa R11: 0000000000000000 R12 : ffff88810d65a084 R13: dffffc0000000000 R14: 00000000000002a0 R15: ffff88810d65a000 FS: 0000000000000000(0000) GS:ffff88811ac00000(0000) knlGS:00000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 50033 CR2: 0000000020000100 CR3: 0000000103268003 CR4: 0000000000770ef0 PKRU: 55555554 Seguimiento de llamadas: l2cap_le_connect_req net /bluetooth/l2cap_core.c:4902 [en l\u00ednea] l2cap_le_sig_cmd net/bluetooth/l2cap_core.c:5420 [en l\u00ednea] l2cap_le_sig_channel net/bluetooth/l2cap_core.c:5486 [en l\u00ednea] l2cap_recv_frame+0xe59d/0x11710 net/bluetooth/l2cap_core.c: 6809 l2cap_recv_acldata+0x544/0x10a0 net/bluetooth/l2cap_core.c:7506 hci_acldata_packet net/bluetooth/hci_core.c:3939 [en l\u00ednea] hci_rx_work+0x5e5/0xb20 net/bluetooth/hci_core.c:4176 Process_one_work kernel/workqueue.c: 3254 [en l\u00ednea] Process_scheduled_works+0x90f/0x1530 kernel/workqueue.c:3335 trabajador_thread+0x926/0xe70 kernel/workqueue.c:3416 kthread+0x2e3/0x380 kernel/kthread.c:388 ret_from_fork+0x5c/0x90 arch/x86/kernel/ Process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 M\u00f3dulos vinculados en: ---[ end trace 0000000000000000 ]---"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/4d3dbaa252257d20611c3647290e6171f1bbd6c8",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.0,
|
||||
"impactScore": 4.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-190"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/a5b862c6a221459d54e494e88965b48dcfa6cc44",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/ad3f7986c5a0f82b8b66a0afe1cc1f5421e1d674",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/d2b2f7d3936dc5990549bc36ab7ac7ac37f22c30",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/dfece2b4e3759759b2bdfac2cd6d0ee9fbf055f3",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"lang": "en",
|
||||
"value": "CWE-369"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2.6.39",
|
||||
"versionEndExcluding": "6.6.32",
|
||||
"matchCriteriaId": "503F0681-1131-42FA-98C3-26C06727BBCC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.8.11",
|
||||
"matchCriteriaId": "3B75CBAF-FD3C-40AE-85BB-0525E142C4C8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.9",
|
||||
"versionEndExcluding": "6.9.2",
|
||||
"matchCriteriaId": "197A592B-2A2B-4A2F-8856-22638007413E"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/4d3dbaa252257d20611c3647290e6171f1bbd6c8",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/a5b862c6a221459d54e494e88965b48dcfa6cc44",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/ad3f7986c5a0f82b8b66a0afe1cc1f5421e1d674",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/d2b2f7d3936dc5990549bc36ab7ac7ac37f22c30",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/dfece2b4e3759759b2bdfac2cd6d0ee9fbf055f3",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-36969",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-06-08T13:15:58.170",
|
||||
"lastModified": "2024-06-10T02:52:08.267",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-07-17T16:50:29.427",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,31 +15,130 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: corrige la divisi\u00f3n por cero en setup_dsc_config Cuando slice_height es 0, la divisi\u00f3n por slice_height en el c\u00e1lculo del n\u00famero de sectores provocar\u00e1 un bloqueo del controlador de divisi\u00f3n por cero. Esto deja el kernel en un estado que requiere un reinicio. Este parche a\u00f1ade un check para evitar la divisi\u00f3n por cero. El seguimiento de la pila a continuaci\u00f3n es para el kernel 6.8.4. Reproduje el problema en un Thinkpad Lenovo Z16 Gen 2 con un monitor Apple Studio Display conectado a trav\u00e9s de Thunderbolt. El controlador amdgpu fall\u00f3 con esta excepci\u00f3n cuando reinici\u00e9 el sistema con el monitor conectado. kernel: ? die (arch/x86/kernel/dumpstack.c:421 arch/x86/kernel/dumpstack.c:434 arch/x86/kernel/dumpstack.c:447) kernel:? do_trap (arch/x86/kernel/traps.c:113 arch/x86/kernel/traps.c:154) kernel: ? setup_dsc_config (drivers/gpu/drm/amd/amdgpu/../display/dc/dsc/dc_dsc.c:1053) n\u00facleo amdgpu:? do_error_trap (./arch/x86/include/asm/traps.h:58 arch/x86/kernel/traps.c:175) kernel:? setup_dsc_config (drivers/gpu/drm/amd/amdgpu/../display/dc/dsc/dc_dsc.c:1053) n\u00facleo amdgpu:? exc_divide_error (arch/x86/kernel/traps.c:194 (discriminador 2)) kernel:? setup_dsc_config (drivers/gpu/drm/amd/amdgpu/../display/dc/dsc/dc_dsc.c:1053) n\u00facleo amdgpu:? asm_exc_divide_error (./arch/x86/include/asm/idtentry.h:548) n\u00facleo:? setup_dsc_config (drivers/gpu/drm/amd/amdgpu/../display/dc/dsc/dc_dsc.c:1053) kernel amdgpu: dc_dsc_compute_config (drivers/gpu/drm/amd/amdgpu/../display/dc/dsc /dc_dsc.c:1109) amdgpu Despu\u00e9s de aplicar este parche, el controlador ya no falla cuando se conecta el monitor y se reinicia el sistema. Creo que este es el mismo problema informado para 3113."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/130afc8a886183a94cf6eab7d24f300014ff87ba",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/308de6be0c9c7ba36915c0d398e771725c0ea911",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/7e4f50dfc98c49b3dc6875a35c3112522fb25639",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/91402e0e5de9124a3108db7a14163fcf9a6d322f",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/a32c8f951c8a456c1c251e1dcdf21787f8066445",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/f187fcbbb8f8bf10c6687f0beae22509369f7563",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"lang": "en",
|
||||
"value": "CWE-369"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "5.15.160",
|
||||
"matchCriteriaId": "A357705C-6EC2-43FB-8A62-037B6F823106"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "6.1.92",
|
||||
"matchCriteriaId": "4E8DFDEB-F911-42FB-A55F-B84A9C556F01"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2",
|
||||
"versionEndExcluding": "6.6.32",
|
||||
"matchCriteriaId": "18199311-EF79-4480-85B0-6AD00C70A7BE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.8.11",
|
||||
"matchCriteriaId": "3B75CBAF-FD3C-40AE-85BB-0525E142C4C8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.9",
|
||||
"versionEndExcluding": "6.9.2",
|
||||
"matchCriteriaId": "197A592B-2A2B-4A2F-8856-22638007413E"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/130afc8a886183a94cf6eab7d24f300014ff87ba",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/308de6be0c9c7ba36915c0d398e771725c0ea911",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/7e4f50dfc98c49b3dc6875a35c3112522fb25639",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/91402e0e5de9124a3108db7a14163fcf9a6d322f",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/a32c8f951c8a456c1c251e1dcdf21787f8066445",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/f187fcbbb8f8bf10c6687f0beae22509369f7563",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-384xx/CVE-2024-38446.json
Normal file
21
CVE-2024/CVE-2024-384xx/CVE-2024-38446.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-38446",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-17T17:15:15.340",
|
||||
"lastModified": "2024-07-17T17:15:15.340",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NATO NCI ANET 3.4.1 mishandles report ownership. A user can create a report and, despite the restrictions imposed by the UI, change the author of that report to an arbitrary user (without their consent or knowledge) via a modified UUID in a POST request."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.linkedin.com/pulse/idors-ncia-anet-v341-visionspace-technologies-hepxe",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-388xx/CVE-2024-38870.json
Normal file
56
CVE-2024/CVE-2024-388xx/CVE-2024-38870.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-38870",
|
||||
"sourceIdentifier": "0fc0942c-577d-436f-ae8e-945763c79b02",
|
||||
"published": "2024-07-17T17:15:15.407",
|
||||
"lastModified": "2024-07-17T17:15:15.407",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Zohocorp ManageEngine OpManager, OpManager Plus, OpManager MSP and OpManager Enterprise Edition versions before 128104, from 128151 before 128238, from 128247 before 128250 are vulnerable to Stored XSS vulnerability in reports module."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "0fc0942c-577d-436f-ae8e-945763c79b02",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 3.5,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 0.9,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "0fc0942c-577d-436f-ae8e-945763c79b02",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.manageengine.com/network-monitoring/security-updates/cve-2024-38870.html",
|
||||
"source": "0fc0942c-577d-436f-ae8e-945763c79b02"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-5042",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-05-17T14:15:21.123",
|
||||
"lastModified": "2024-05-20T06:15:08.723",
|
||||
"lastModified": "2024-07-17T16:15:05.160",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -52,6 +52,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:4591",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2024-5042",
|
||||
"source": "secalert@redhat.com"
|
||||
|
137
CVE-2024/CVE-2024-68xx/CVE-2024-6830.json
Normal file
137
CVE-2024/CVE-2024-68xx/CVE-2024-6830.json
Normal file
@ -0,0 +1,137 @@
|
||||
{
|
||||
"id": "CVE-2024-6830",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-07-17T16:15:05.540",
|
||||
"lastModified": "2024-07-17T16:15:05.540",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as critical, was found in SourceCodester Simple Inventory Management System 1.0. Affected is an unknown function of the file action.php of the component Order Handler. The manipulation of the argument order_id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-271812."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "LOW",
|
||||
"vulnerableSystemIntegrity": "LOW",
|
||||
"vulnerableSystemAvailability": "LOW",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 6.5
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Xu-Mingming/cve/blob/main/sql1.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.271812",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.271812",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.375233",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
81
README.md
81
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-07-17T16:00:19.050379+00:00
|
||||
2024-07-17T18:00:18.559637+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-07-17T15:48:39.097000+00:00
|
||||
2024-07-17T17:36:42.157000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,62 +33,47 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
257381
|
||||
257395
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `18`
|
||||
Recently added CVEs: `14`
|
||||
|
||||
- [CVE-2023-7272](CVE-2023/CVE-2023-72xx/CVE-2023-7272.json) (`2024-07-17T15:15:10.457`)
|
||||
- [CVE-2024-23465](CVE-2024/CVE-2024-234xx/CVE-2024-23465.json) (`2024-07-17T15:15:10.977`)
|
||||
- [CVE-2024-23466](CVE-2024/CVE-2024-234xx/CVE-2024-23466.json) (`2024-07-17T15:15:11.270`)
|
||||
- [CVE-2024-23467](CVE-2024/CVE-2024-234xx/CVE-2024-23467.json) (`2024-07-17T15:15:11.500`)
|
||||
- [CVE-2024-23468](CVE-2024/CVE-2024-234xx/CVE-2024-23468.json) (`2024-07-17T15:15:11.730`)
|
||||
- [CVE-2024-23469](CVE-2024/CVE-2024-234xx/CVE-2024-23469.json) (`2024-07-17T15:15:11.947`)
|
||||
- [CVE-2024-23470](CVE-2024/CVE-2024-234xx/CVE-2024-23470.json) (`2024-07-17T15:15:12.167`)
|
||||
- [CVE-2024-23471](CVE-2024/CVE-2024-234xx/CVE-2024-23471.json) (`2024-07-17T15:15:12.403`)
|
||||
- [CVE-2024-23472](CVE-2024/CVE-2024-234xx/CVE-2024-23472.json) (`2024-07-17T15:15:12.627`)
|
||||
- [CVE-2024-23474](CVE-2024/CVE-2024-234xx/CVE-2024-23474.json) (`2024-07-17T15:15:12.840`)
|
||||
- [CVE-2024-23475](CVE-2024/CVE-2024-234xx/CVE-2024-23475.json) (`2024-07-17T15:15:13.057`)
|
||||
- [CVE-2024-28074](CVE-2024/CVE-2024-280xx/CVE-2024-28074.json) (`2024-07-17T15:15:13.417`)
|
||||
- [CVE-2024-28992](CVE-2024/CVE-2024-289xx/CVE-2024-28992.json) (`2024-07-17T15:15:13.623`)
|
||||
- [CVE-2024-28993](CVE-2024/CVE-2024-289xx/CVE-2024-28993.json) (`2024-07-17T15:15:13.860`)
|
||||
- [CVE-2024-29120](CVE-2024/CVE-2024-291xx/CVE-2024-29120.json) (`2024-07-17T15:15:14.090`)
|
||||
- [CVE-2024-6765](CVE-2024/CVE-2024-67xx/CVE-2024-6765.json) (`2024-07-17T14:15:04.327`)
|
||||
- [CVE-2024-6833](CVE-2024/CVE-2024-68xx/CVE-2024-6833.json) (`2024-07-17T15:15:14.783`)
|
||||
- [CVE-2024-6834](CVE-2024/CVE-2024-68xx/CVE-2024-6834.json) (`2024-07-17T15:15:14.970`)
|
||||
- [CVE-2023-4976](CVE-2023/CVE-2023-49xx/CVE-2023-4976.json) (`2024-07-17T16:15:03.233`)
|
||||
- [CVE-2024-20296](CVE-2024/CVE-2024-202xx/CVE-2024-20296.json) (`2024-07-17T17:15:12.367`)
|
||||
- [CVE-2024-20323](CVE-2024/CVE-2024-203xx/CVE-2024-20323.json) (`2024-07-17T17:15:12.607`)
|
||||
- [CVE-2024-20395](CVE-2024/CVE-2024-203xx/CVE-2024-20395.json) (`2024-07-17T17:15:12.833`)
|
||||
- [CVE-2024-20396](CVE-2024/CVE-2024-203xx/CVE-2024-20396.json) (`2024-07-17T17:15:13.070`)
|
||||
- [CVE-2024-20400](CVE-2024/CVE-2024-204xx/CVE-2024-20400.json) (`2024-07-17T17:15:13.300`)
|
||||
- [CVE-2024-20401](CVE-2024/CVE-2024-204xx/CVE-2024-20401.json) (`2024-07-17T17:15:13.540`)
|
||||
- [CVE-2024-20416](CVE-2024/CVE-2024-204xx/CVE-2024-20416.json) (`2024-07-17T17:15:13.877`)
|
||||
- [CVE-2024-20419](CVE-2024/CVE-2024-204xx/CVE-2024-20419.json) (`2024-07-17T17:15:14.143`)
|
||||
- [CVE-2024-20429](CVE-2024/CVE-2024-204xx/CVE-2024-20429.json) (`2024-07-17T17:15:14.497`)
|
||||
- [CVE-2024-20435](CVE-2024/CVE-2024-204xx/CVE-2024-20435.json) (`2024-07-17T17:15:14.787`)
|
||||
- [CVE-2024-38446](CVE-2024/CVE-2024-384xx/CVE-2024-38446.json) (`2024-07-17T17:15:15.340`)
|
||||
- [CVE-2024-38870](CVE-2024/CVE-2024-388xx/CVE-2024-38870.json) (`2024-07-17T17:15:15.407`)
|
||||
- [CVE-2024-6830](CVE-2024/CVE-2024-68xx/CVE-2024-6830.json) (`2024-07-17T16:15:05.540`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `29`
|
||||
Recently modified CVEs: `14`
|
||||
|
||||
- [CVE-2017-16531](CVE-2017/CVE-2017-165xx/CVE-2017-16531.json) (`2024-07-17T15:31:25.197`)
|
||||
- [CVE-2017-16532](CVE-2017/CVE-2017-165xx/CVE-2017-16532.json) (`2024-07-17T15:30:45.170`)
|
||||
- [CVE-2023-52291](CVE-2023/CVE-2023-522xx/CVE-2023-52291.json) (`2024-07-17T14:15:03.083`)
|
||||
- [CVE-2024-26184](CVE-2024/CVE-2024-261xx/CVE-2024-26184.json) (`2024-07-17T14:58:41.847`)
|
||||
- [CVE-2024-28899](CVE-2024/CVE-2024-288xx/CVE-2024-28899.json) (`2024-07-17T14:58:25.510`)
|
||||
- [CVE-2024-29737](CVE-2024/CVE-2024-297xx/CVE-2024-29737.json) (`2024-07-17T14:15:03.677`)
|
||||
- [CVE-2024-30013](CVE-2024/CVE-2024-300xx/CVE-2024-30013.json) (`2024-07-17T14:53:41.397`)
|
||||
- [CVE-2024-30061](CVE-2024/CVE-2024-300xx/CVE-2024-30061.json) (`2024-07-17T15:22:46.897`)
|
||||
- [CVE-2024-30071](CVE-2024/CVE-2024-300xx/CVE-2024-30071.json) (`2024-07-17T15:22:16.003`)
|
||||
- [CVE-2024-30079](CVE-2024/CVE-2024-300xx/CVE-2024-30079.json) (`2024-07-17T15:21:48.743`)
|
||||
- [CVE-2024-30081](CVE-2024/CVE-2024-300xx/CVE-2024-30081.json) (`2024-07-17T15:20:04.197`)
|
||||
- [CVE-2024-30098](CVE-2024/CVE-2024-300xx/CVE-2024-30098.json) (`2024-07-17T15:17:02.427`)
|
||||
- [CVE-2024-32987](CVE-2024/CVE-2024-329xx/CVE-2024-32987.json) (`2024-07-17T15:12:16.427`)
|
||||
- [CVE-2024-35261](CVE-2024/CVE-2024-352xx/CVE-2024-35261.json) (`2024-07-17T15:48:39.097`)
|
||||
- [CVE-2024-35266](CVE-2024/CVE-2024-352xx/CVE-2024-35266.json) (`2024-07-17T15:03:10.610`)
|
||||
- [CVE-2024-35267](CVE-2024/CVE-2024-352xx/CVE-2024-35267.json) (`2024-07-17T15:02:22.937`)
|
||||
- [CVE-2024-35270](CVE-2024/CVE-2024-352xx/CVE-2024-35270.json) (`2024-07-17T15:00:46.870`)
|
||||
- [CVE-2024-36823](CVE-2024/CVE-2024-368xx/CVE-2024-36823.json) (`2024-07-17T14:41:44.227`)
|
||||
- [CVE-2024-37984](CVE-2024/CVE-2024-379xx/CVE-2024-37984.json) (`2024-07-17T15:48:09.993`)
|
||||
- [CVE-2024-4390](CVE-2024/CVE-2024-43xx/CVE-2024-4390.json) (`2024-07-17T14:10:55.550`)
|
||||
- [CVE-2024-4565](CVE-2024/CVE-2024-45xx/CVE-2024-4565.json) (`2024-07-17T14:14:08.750`)
|
||||
- [CVE-2024-5213](CVE-2024/CVE-2024-52xx/CVE-2024-5213.json) (`2024-07-17T14:36:39.397`)
|
||||
- [CVE-2024-5605](CVE-2024/CVE-2024-56xx/CVE-2024-5605.json) (`2024-07-17T14:02:16.537`)
|
||||
- [CVE-2024-5686](CVE-2024/CVE-2024-56xx/CVE-2024-5686.json) (`2024-07-17T14:00:51.097`)
|
||||
- [CVE-2024-6716](CVE-2024/CVE-2024-67xx/CVE-2024-6716.json) (`2024-07-17T14:15:04.210`)
|
||||
- [CVE-2024-1394](CVE-2024/CVE-2024-13xx/CVE-2024-1394.json) (`2024-07-17T16:15:03.460`)
|
||||
- [CVE-2024-29120](CVE-2024/CVE-2024-291xx/CVE-2024-29120.json) (`2024-07-17T16:15:04.157`)
|
||||
- [CVE-2024-35056](CVE-2024/CVE-2024-350xx/CVE-2024-35056.json) (`2024-07-17T17:15:15.263`)
|
||||
- [CVE-2024-35057](CVE-2024/CVE-2024-350xx/CVE-2024-35057.json) (`2024-07-17T16:15:04.577`)
|
||||
- [CVE-2024-35058](CVE-2024/CVE-2024-350xx/CVE-2024-35058.json) (`2024-07-17T16:15:04.673`)
|
||||
- [CVE-2024-35059](CVE-2024/CVE-2024-350xx/CVE-2024-35059.json) (`2024-07-17T16:15:04.743`)
|
||||
- [CVE-2024-35060](CVE-2024/CVE-2024-350xx/CVE-2024-35060.json) (`2024-07-17T16:15:04.813`)
|
||||
- [CVE-2024-35061](CVE-2024/CVE-2024-350xx/CVE-2024-35061.json) (`2024-07-17T16:15:04.877`)
|
||||
- [CVE-2024-36082](CVE-2024/CVE-2024-360xx/CVE-2024-36082.json) (`2024-07-17T17:36:42.157`)
|
||||
- [CVE-2024-36965](CVE-2024/CVE-2024-369xx/CVE-2024-36965.json) (`2024-07-17T17:32:46.323`)
|
||||
- [CVE-2024-36967](CVE-2024/CVE-2024-369xx/CVE-2024-36967.json) (`2024-07-17T17:03:53.860`)
|
||||
- [CVE-2024-36968](CVE-2024/CVE-2024-369xx/CVE-2024-36968.json) (`2024-07-17T16:59:39.987`)
|
||||
- [CVE-2024-36969](CVE-2024/CVE-2024-369xx/CVE-2024-36969.json) (`2024-07-17T16:50:29.427`)
|
||||
- [CVE-2024-5042](CVE-2024/CVE-2024-50xx/CVE-2024-5042.json) (`2024-07-17T16:15:05.160`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
134
_state.csv
134
_state.csv
@ -73188,7 +73188,7 @@ CVE-2014-9706,0,0,dab087de637f6b43c09aedf7472b036f0a3d789fc04a22c39262cd1c4a35c9
|
||||
CVE-2014-9707,0,0,f3f0da0dd23176009bff7b48793751e03810f0cb1f74e70d9f379145a5f7b68d,2018-10-09T19:55:10.497000
|
||||
CVE-2014-9708,0,0,a58485dd5d13f63313201e171ccbf4c7071f2f78afb86fdda3d0c62c0b05a8ea,2023-06-22T19:49:41.650000
|
||||
CVE-2014-9709,0,0,522fd8cb1ed3ac15385200e838c2f111b54be02bf3dbdc2c42e4561b41bea449,2022-11-09T03:04:19.033000
|
||||
CVE-2014-9710,0,1,f514e062cb8031246b8fab363c970bc7255f8574eab40cdc6d15e956627c3fbf,2024-07-17T15:28:07.730000
|
||||
CVE-2014-9710,0,0,f514e062cb8031246b8fab363c970bc7255f8574eab40cdc6d15e956627c3fbf,2024-07-17T15:28:07.730000
|
||||
CVE-2014-9711,0,0,74ddc290b0d1e2a5603379cbfcfe3b06afce0cdd6e5c04339b6543682c30ea3b,2018-10-09T19:55:11.637000
|
||||
CVE-2014-9712,0,0,35c320e642c4b46324ab583a30f538ccf7280d37fff2ebe44a09a52d0a4799e0,2016-06-23T12:00:12.700000
|
||||
CVE-2014-9713,0,0,74f4c7c34888648b86caaa075d3e9cf7c284e774722aeec4d6562e6b7b33af53,2016-12-22T02:59:22.157000
|
||||
@ -74941,7 +74941,7 @@ CVE-2015-1415,0,0,27e2033e7708e4292f45315d9efacf9ba2357e40053e705ee349e51776068b
|
||||
CVE-2015-1416,0,0,e78d9818ce7f02ac252b29f7ebb59bb505db486527f79515b54ba2201040f66e,2018-03-13T19:53:21.370000
|
||||
CVE-2015-1417,0,0,a713a1ab4bd04039083c62289ba181a9e17107cba005092cefee267e62fc949c,2019-03-20T13:14:14.760000
|
||||
CVE-2015-1418,0,0,04da0bc1ffe67b74f0d82eda4e20fdb936dfa45de6969a561c537a291fb7af5a,2018-04-07T01:29:00.797000
|
||||
CVE-2015-1419,0,1,71bb42f98c277af7ba19dc3cb196797209eb411d4a05b574de1f736927e30233,2024-07-17T15:31:01.647000
|
||||
CVE-2015-1419,0,0,71bb42f98c277af7ba19dc3cb196797209eb411d4a05b574de1f736927e30233,2024-07-17T15:31:01.647000
|
||||
CVE-2015-1420,0,0,c70b358eaeeca6a9b12930ef5b666d981eba8b52cafe5aa1bf2d98fb7d7215ee,2016-12-28T02:59:03.993000
|
||||
CVE-2015-1421,0,0,d5af7249a77359d287124baab3d49fe5adefb485af5bae54f795a8716ff8bd45,2023-11-07T02:24:49.410000
|
||||
CVE-2015-1422,0,0,3d4a7635e292a4fc28b2f7e515ea195e9aeacfafdb4698ba46a457f4f1c10f6f,2017-09-08T01:29:48.590000
|
||||
@ -76318,7 +76318,7 @@ CVE-2015-2918,0,0,c5245d3a26f0c6a68a5c625e920d0810e8a3635cf19c7aa98da2dbcaad8e2a
|
||||
CVE-2015-2922,0,0,c0dc316ab84447b71020dd57885a3479764daba11aa959b88217d58d987c9354,2023-11-07T02:25:27.527000
|
||||
CVE-2015-2923,0,0,33dd8ca4615352fb493502fa36d142a93a656d58526c085aae03d656d816b628,2020-02-28T16:22:06.510000
|
||||
CVE-2015-2924,0,0,e84980de3880a13f53e750257c73f750c29fa2061c377f71bc7be6b2a31f11e9,2016-12-07T18:10:51.847000
|
||||
CVE-2015-2925,0,1,3c28180a24aa89b9c75cb270e0ad02c91d307eeaff5053993709348b82e9ff48,2024-07-17T15:29:49.973000
|
||||
CVE-2015-2925,0,0,3c28180a24aa89b9c75cb270e0ad02c91d307eeaff5053993709348b82e9ff48,2024-07-17T15:29:49.973000
|
||||
CVE-2015-2926,0,0,69d172d0b77f69b932f80d09c94f134dc86fbbdb77a842f4bdab90e12e731dc8,2018-10-09T19:56:33.577000
|
||||
CVE-2015-2927,0,0,ffd7ce087dfc59efe5f3d6125dca76b5a742860c486d2ef8d889285d921f86ff,2023-11-07T02:25:27.703000
|
||||
CVE-2015-2928,0,0,b6faa23d4a4831562f8f330fb27e2484439c80f79aa6bfe750bfe0e228f24be4,2020-02-01T16:12:19.540000
|
||||
@ -80424,7 +80424,7 @@ CVE-2015-7609,0,0,b3ed793e317b388e4df3c4254c9fd73168dba5ccf7cfe4e0a006ec63fdd329
|
||||
CVE-2015-7610,0,0,7f7d199eab0f8e668767075f26785d2d7eb1038a4eff38b9de50136621e92e94,2020-06-04T12:32:29.300000
|
||||
CVE-2015-7611,0,0,d378e5c062d9dd631447cf9e8a348f5456ab262df8836d37cd6121c2a326fa99,2018-10-09T19:58:15.847000
|
||||
CVE-2015-7612,0,0,3c03e1a393d0da175e1f53969884063953eae98bbcfaabecc1a377a1c26a0bcb,2015-10-02T20:41:02.967000
|
||||
CVE-2015-7613,0,1,ea176d4e582d6f3613fe74428e81d1cc8f3fa11daefbccbe8faeca9f24496017,2024-07-17T15:30:18.973000
|
||||
CVE-2015-7613,0,0,ea176d4e582d6f3613fe74428e81d1cc8f3fa11daefbccbe8faeca9f24496017,2024-07-17T15:30:18.973000
|
||||
CVE-2015-7614,0,0,e8e90f026ea013adb76beb3f4e6ef849639271285d18ce67da27fa78ea0561f7,2021-09-08T17:19:32.473000
|
||||
CVE-2015-7615,0,0,bfc98948031926b140f767798f01d41790e7c6e15ef264a16b22a44d6a399012,2021-09-08T17:19:32.493000
|
||||
CVE-2015-7616,0,0,6e65c0a9c608a3693fe140889452347283c1b5c7b17d3c2a46b39159263ff1de,2021-09-08T17:19:32.520000
|
||||
@ -99907,8 +99907,8 @@ CVE-2017-16528,0,0,237b3a2ee754e48698ebaa6cd26aea81efd1e7fff70138cd43fc84d6b36c3
|
||||
CVE-2017-16529,0,0,2b3941077a92e4ed0b4011c2f57bae3e61c49cee86471aaf37c82a576b6a5c9d,2024-03-14T19:58:06.937000
|
||||
CVE-2017-1653,0,0,8ab21d9a1331a4d095d829a637ba01b8d9157939795ade2d4075c21fb428c10a,2018-02-09T20:06:20.293000
|
||||
CVE-2017-16530,0,0,50fd66f706bdcb993e18c5bfc3c3a62fbc421e149bb50c5c3608e38a541c8dae,2024-03-14T19:57:49.287000
|
||||
CVE-2017-16531,0,1,976f745a3c0092480b539393bf29511fcc3986a459796883946c7e4b965b7134,2024-07-17T15:31:25.197000
|
||||
CVE-2017-16532,0,1,213881c9e987797335665db708986449bcb186d4878330af326c2d59db46e607,2024-07-17T15:30:45.170000
|
||||
CVE-2017-16531,0,0,976f745a3c0092480b539393bf29511fcc3986a459796883946c7e4b965b7134,2024-07-17T15:31:25.197000
|
||||
CVE-2017-16532,0,0,213881c9e987797335665db708986449bcb186d4878330af326c2d59db46e607,2024-07-17T15:30:45.170000
|
||||
CVE-2017-16533,0,0,7c64f19973f9ebdf8a6947b62af74ad333316d704521a748acd5b7fb29af8566,2024-03-12T17:38:46.927000
|
||||
CVE-2017-16534,0,0,e9dbfe036bb34aa2fcb4c43386f348d2e09f0253e02e3e633c22f6485a5de9a1,2024-02-16T18:54:37.580000
|
||||
CVE-2017-16535,0,0,6620f681481fb3ae54c2dfde88a506872957e8a6b8b1c9dde17a859f19229d17,2018-08-24T10:29:01.163000
|
||||
@ -236822,6 +236822,7 @@ CVE-2023-49751,0,0,d66e187adcfb0f3f264a3e475492bf374826e35a8fde24bd18ae6e258db35
|
||||
CVE-2023-49752,0,0,8f7e4984dc1eed4166d4c69d35220ef08212b1cfdb0c5ac668f3f9f2ec5cfdda,2023-12-30T03:13:36.437000
|
||||
CVE-2023-49753,0,0,089fb4a8ca464297348c1d7baf66332d8a87b277f25d1ba0398acaed5e7c446e,2024-05-17T18:36:05.263000
|
||||
CVE-2023-49759,0,0,7151cd9cab4ee2f6b2a6c617750d4e1c2871172704f111ef4a22e0fedc83ee27,2023-12-21T04:56:56.160000
|
||||
CVE-2023-4976,1,1,f6247632809e53e13a67a506da682aaef52d38db41f83c4664009b0e197116c9,2024-07-17T16:15:03.233000
|
||||
CVE-2023-49760,0,0,00db1e11f20a615e84ea6f027680da52f5eebadc8eaf9cc28c10b4e3d1fd846b,2023-12-21T04:57:19.577000
|
||||
CVE-2023-49761,0,0,c2890b9a47c12957c2b3369e4854a28b3ae644be248b250f495c7bf4f2e083d7,2023-12-21T04:55:01.263000
|
||||
CVE-2023-49762,0,0,b5e808d7b4edd56804efe5478c0dd690eacc474add793a15fdb6b2630c383c08,2023-12-29T03:47:20.780000
|
||||
@ -238453,7 +238454,7 @@ CVE-2023-52288,0,0,297c3e93d2578fa4354d42073bbfcc9c84a93418874a891bfd157ba56fb9c
|
||||
CVE-2023-52289,0,0,b0b62bf64cde12eff577800bdca9d7c0c719bc9a23d6c24a235e18254584af67,2024-01-24T18:48:24.283000
|
||||
CVE-2023-5229,0,0,96ae4a14c7f75bcf2b6cbe69f7946f8795ec64211a57e06d1e0d2d6ff05a7656,2023-11-08T18:35:10.590000
|
||||
CVE-2023-52290,0,0,b027d3a77e3918cc6823c1648721e9d0ca22799d7375d42fe7f068b3c1f18fba,2024-07-16T13:43:58.773000
|
||||
CVE-2023-52291,0,1,d44513110b3abde7b95c470c0ec221718d8a2ddfa2c61afda0ba26cf36a11001,2024-07-17T14:15:03.083000
|
||||
CVE-2023-52291,0,0,d44513110b3abde7b95c470c0ec221718d8a2ddfa2c61afda0ba26cf36a11001,2024-07-17T14:15:03.083000
|
||||
CVE-2023-52296,0,0,85a5b959f2db874145dc7271afa4c982911881063ce8b8741fd891792d7a0806,2024-06-10T17:16:16.537000
|
||||
CVE-2023-5230,0,0,a536f5ec0e596e59d6ed211c038722ef9594f65abf67a435dc22663a31135f5f,2023-11-07T04:23:38.493000
|
||||
CVE-2023-52302,0,0,22ea8ee42f1d0c97611b1d0c11616324d4f2cec9c11a2c69cd863452202dca24,2024-01-05T12:14:39.403000
|
||||
@ -240813,7 +240814,7 @@ CVE-2023-7259,0,0,48e34f6790939be91bf1f945206235146161db18f274c444cfe683dbe37045
|
||||
CVE-2023-7261,0,0,44080cc2bc0d6a25d80bc7855327b03309b2d9def17d97f1c55e50122c67ac97,2024-07-03T01:44:30.563000
|
||||
CVE-2023-7264,0,0,51dd8b83703649c91504628a1d95022ef41c77d28d8363a527e775cafaba1511,2024-06-11T13:54:12.057000
|
||||
CVE-2023-7270,0,0,3d7ad3a206c04c3798343468b0d534eca04f86eefe46ec321113ac7e2ecdcd6a,2024-07-04T07:15:10.497000
|
||||
CVE-2023-7272,1,1,ae2ee3a0e6eeeceac88d7f0f726112744f2985f44308818239d9a83fc4a998fc,2024-07-17T15:15:10.457000
|
||||
CVE-2023-7272,0,0,ae2ee3a0e6eeeceac88d7f0f726112744f2985f44308818239d9a83fc4a998fc,2024-07-17T15:15:10.457000
|
||||
CVE-2024-0007,0,0,7ce6d28a77975ceb6f0211a30f9905d648e1a7e8a675821fe7be046691ac9f83,2024-02-15T06:23:39.303000
|
||||
CVE-2024-0008,0,0,899bae3dea0b6932a6d046356f47764b32f025595d0eef60d8e0e433b2b04007,2024-02-15T06:23:39.303000
|
||||
CVE-2024-0009,0,0,31a37345511ab8f9e782cdcb9d09dfe3dad4751b5c25ab7a9b1c5c74d0c64c05,2024-02-15T06:23:39.303000
|
||||
@ -242050,7 +242051,7 @@ CVE-2024-1390,0,0,f2a25975c3042e30a42c5fcd19f4c398992a4b35179f84e0b51a1c441a4e4d
|
||||
CVE-2024-1391,0,0,50e2fbe1cc7d386fd26fed3bf083598946d64d5314a6236ebb9200766cf4f837,2024-03-13T18:15:58.530000
|
||||
CVE-2024-1392,0,0,8db7abe472b85e00e4ae726e30591de82c7d16f05d2f6d5459004c50d152a5c0,2024-03-13T18:15:58.530000
|
||||
CVE-2024-1393,0,0,4f5797aa4dbf368118dda7b12f73418a8cf88d40cd13e8c8978941ce6c41ad41,2024-03-13T18:15:58.530000
|
||||
CVE-2024-1394,0,0,6f0e92f47ef2345a2d749a80c5d074999c4de135a0d0479ae3bac3f052ef68c4,2024-07-16T22:15:04.100000
|
||||
CVE-2024-1394,0,1,0068af5eef87733e8d147d39dd3361c5a47e23ae2b95306fe985857bc8bb4088,2024-07-17T16:15:03.460000
|
||||
CVE-2024-1395,0,0,9f5cead23576320934b06ae7650426cd28c58ea3927d599eb3ccbebbf15a3072,2024-07-03T01:45:14.570000
|
||||
CVE-2024-1396,0,0,0697e623a8579806097bf49373d31640770e9cf97f78e16b0038cfa8bc55a349,2024-05-02T18:00:37.360000
|
||||
CVE-2024-1397,0,0,8da6b20072e696017f2fea6d653b85b1ce227e84921025d1f452d353bbc1383a,2024-03-13T12:33:51.697000
|
||||
@ -242732,6 +242733,7 @@ CVE-2024-20292,0,0,9fda1d46c19c90bac6f8d81c3a2ae5d97f0e489d0e9bdc7810f6ed453d2cc
|
||||
CVE-2024-20293,0,0,616028e08a52b8ee6918b00b66aa203f272bb9f0716f3e2ece06ab3be6edaad2,2024-05-22T18:59:20.240000
|
||||
CVE-2024-20294,0,0,742861094e87571e845203e831bfb7a087118860ed05792647beba51da9e1c54,2024-02-29T13:49:29.390000
|
||||
CVE-2024-20295,0,0,440a3fe735baf91af4ba8e7f15eaba3890b664a180f3cc6b1b84c3c2ae93a20b,2024-04-25T13:18:20.370000
|
||||
CVE-2024-20296,1,1,7a9d3c5fd0eab4e4556236179228065ba6842463882109a1e8fbd1a86b4a2493,2024-07-17T17:15:12.367000
|
||||
CVE-2024-2030,0,0,f47e609ec6da92e4d0f51eb73197726fa40c04bd5fba84d7e80690a86556bbc1,2024-03-13T18:15:58.530000
|
||||
CVE-2024-20301,0,0,ee58125f54e59b57e5b1ea49a524ecc5e7feeaab3c308ff448cca9b61624ff41,2024-03-07T13:52:27.110000
|
||||
CVE-2024-20302,0,0,bb282df08e1d4adc1029a76ce336553cafd173c3d92914cdfd5b12151cc62afc,2024-04-03T17:24:18.150000
|
||||
@ -242755,6 +242757,7 @@ CVE-2024-2032,0,0,6c9fab941a4b444e93407737c1e5c294d8f201f8109308d2a41aae9e970336
|
||||
CVE-2024-20320,0,0,fd0786fa2f7ef51279d0c4fc73d926adfc689f7fdd27a0ba95adedfd6d2d5266,2024-03-13T18:15:58.530000
|
||||
CVE-2024-20321,0,0,9f164e85a915a5a4f862704d6bb8cef452f44797e3d6049905a588daf1644aa7,2024-03-04T22:45:23.647000
|
||||
CVE-2024-20322,0,0,5515197bc9b4076f0571c114c5eb66a73e81fb48b28f32d0ba7271f33bf23fb1,2024-03-13T18:15:58.530000
|
||||
CVE-2024-20323,1,1,299af4dba1ed5ac758a8bf330e33abe550470127982dafa5b55c53160fbeacac,2024-07-17T17:15:12.607000
|
||||
CVE-2024-20324,0,0,16b07310c8a18de284f24c33796dfd7cb4fe5472c0d1e88f721937f9ace3fe69,2024-03-27T17:48:21.140000
|
||||
CVE-2024-20325,0,0,54ea99e12b48a3199864bbc6b8e057b2420390f797e4ed26add8a6233c894845,2024-02-22T19:07:27.197000
|
||||
CVE-2024-20326,0,0,fc15c10256dd5a166a1027ec5ae4c1e91a980e0789f9cd1c71ded8bffcb2bc99,2024-07-03T01:46:03.803000
|
||||
@ -242801,13 +242804,21 @@ CVE-2024-2039,0,0,0fb3eb6d9df1cb8dd04206e4fde20555dc794b24595aa985157932f2a93345
|
||||
CVE-2024-20391,0,0,901fcf36cebee039d4f38edb4044ef84c4f44829a18fc236320c17fd1b5f7286,2024-05-15T18:35:11.453000
|
||||
CVE-2024-20392,0,0,94a9ebb2bcbc95d69522cf1a691e2eef5f012e7892caae86240bb4af40e4b8c2,2024-05-15T18:35:11.453000
|
||||
CVE-2024-20394,0,0,ef9256f36e7609b8b050262ee885b4f4c47119c80c5a1a8288a0a5eef0d4f23d,2024-05-15T18:35:11.453000
|
||||
CVE-2024-20395,1,1,ad42781652d3f722616a76e3dd30d1ff5168c930794164deec1985af6c7b5436,2024-07-17T17:15:12.833000
|
||||
CVE-2024-20396,1,1,3f437c5a90d6c3836c59fa0dfaadd99cad2dadd82b171a91795c543a6c9974ce,2024-07-17T17:15:13.070000
|
||||
CVE-2024-20399,0,0,3444b8848702aea256ab827839689885201c8a881aff9e7e34cb07cc0d115aad,2024-07-10T19:15:09.840000
|
||||
CVE-2024-2040,0,0,84818b4f00c676396e69702449b7daec96ba4021835b05a5adb074a919ab8480,2024-07-08T14:18:10.367000
|
||||
CVE-2024-20400,1,1,7091da83dbd9e48a9acbcefe8d4a95daea5bbb17ddd36efe5556e162c7749eb9,2024-07-17T17:15:13.300000
|
||||
CVE-2024-20401,1,1,83fa2701255e55c2c2313048194daa5b041cf42625adaca90019b4bc478cd0db,2024-07-17T17:15:13.540000
|
||||
CVE-2024-20404,0,0,9ff8f593f71d4a0ff7aecb6b668971610942799ed16450e68ad59cf7f0b9f5af,2024-06-13T20:25:46.837000
|
||||
CVE-2024-20405,0,0,2fa5b4e65c2f399507a2e57227d51876c94b3517d024d761ea8ec8bc4f4a8a91,2024-06-18T18:04:04.497000
|
||||
CVE-2024-2041,0,0,7b4fc911113d944c485bed2a7f958b069e0536bf197811dc0e3dcb8018df3bd7,2024-05-06T14:15:07.747000
|
||||
CVE-2024-20416,1,1,431aeafb72e36e0d87b738d751078c83d193479cd7dfe1b8095037f503d85a61,2024-07-17T17:15:13.877000
|
||||
CVE-2024-20419,1,1,8a3761f71894e42f8b34c340cecf09bf611c6689d9bff7eaa5c76756b6d30192,2024-07-17T17:15:14.143000
|
||||
CVE-2024-2042,0,0,148bfce3b5f48e2144e9167826ed5f6f120e539bf15296a435b2ce580e8b1f74,2024-03-17T22:38:29.433000
|
||||
CVE-2024-20429,1,1,9a8820753052a21887447bdde9162b68861fba053fac5c2b962b383a81479ebd,2024-07-17T17:15:14.497000
|
||||
CVE-2024-2043,0,0,7a3896d230f6f1ae602a08f92e2eaaa644b5893021849dee8a675eb9b7c81e88,2024-05-02T18:00:37.360000
|
||||
CVE-2024-20435,1,1,e28fa6d2c159a87fe6e0ebdeeca010e9fd913877c8c0ef99e2204fc0fecc06bd,2024-07-17T17:15:14.787000
|
||||
CVE-2024-2044,0,0,18ef6f7655f9f95707cfbf1a13de0d80a7ff66dee83ae08307be87037636e53d,2024-03-23T03:15:12.063000
|
||||
CVE-2024-2045,0,0,711ac9453656184dc732c4f4633f4f7bda646ec847d7f0c1c60c568976f58aa0,2024-03-01T14:04:26.010000
|
||||
CVE-2024-20456,0,0,bf56f0f0f8d3ed0f6616c43fc8ca6a47b6257ec17aaac25185ba7a05790b5cc9,2024-07-11T13:05:54.930000
|
||||
@ -244814,18 +244825,18 @@ CVE-2024-2346,0,0,640c5da33542a8ab660efed3d2946f8775e8451ffcd15e019bca38e32d876d
|
||||
CVE-2024-23461,0,0,72d0c2f7bbc9dd939c336de42f6456e6f6d8135fca52976b9db25f6fb6a54540,2024-05-02T13:27:25.103000
|
||||
CVE-2024-23462,0,0,89eee1bc8417ec5c165498a10c45118559ef0ab7b53f75c35dd8c8aeefb822d1,2024-05-02T13:27:25.103000
|
||||
CVE-2024-23463,0,0,3757d1676f1ef0efc7fd06c5dbfd1e77b5a81f192ccd6411055b5756d98980c9,2024-04-30T17:52:35.057000
|
||||
CVE-2024-23465,1,1,f1ec77c661799102a7b1421cce4cd375c01d8bf91a971d7fd09209c9de34c392,2024-07-17T15:15:10.977000
|
||||
CVE-2024-23466,1,1,fed74f7f59c72c6e4fdc811eccb5bde2d6654847f1822e33536cbdf79d893c79,2024-07-17T15:15:11.270000
|
||||
CVE-2024-23467,1,1,949a6280921197210225f26cc891195222cc4a3db86bbe4240a9a9a3b22cac1f,2024-07-17T15:15:11.500000
|
||||
CVE-2024-23468,1,1,272480792e95f7111308dfb6ea4bc9e5ddb5d50935493c3e4f42d43bce1702d1,2024-07-17T15:15:11.730000
|
||||
CVE-2024-23469,1,1,1b44b465b8d57cdd083c9fc728844632fcc9d4c7c068d0fefcf1e3b567bdbb8f,2024-07-17T15:15:11.947000
|
||||
CVE-2024-23465,0,0,f1ec77c661799102a7b1421cce4cd375c01d8bf91a971d7fd09209c9de34c392,2024-07-17T15:15:10.977000
|
||||
CVE-2024-23466,0,0,fed74f7f59c72c6e4fdc811eccb5bde2d6654847f1822e33536cbdf79d893c79,2024-07-17T15:15:11.270000
|
||||
CVE-2024-23467,0,0,949a6280921197210225f26cc891195222cc4a3db86bbe4240a9a9a3b22cac1f,2024-07-17T15:15:11.500000
|
||||
CVE-2024-23468,0,0,272480792e95f7111308dfb6ea4bc9e5ddb5d50935493c3e4f42d43bce1702d1,2024-07-17T15:15:11.730000
|
||||
CVE-2024-23469,0,0,1b44b465b8d57cdd083c9fc728844632fcc9d4c7c068d0fefcf1e3b567bdbb8f,2024-07-17T15:15:11.947000
|
||||
CVE-2024-2347,0,0,639c42723b33042f97a80a4a3a2bc3546c4d216290aee32968515b2758b6d986,2024-04-10T13:23:38.787000
|
||||
CVE-2024-23470,1,1,5eabfe63c8ba98278ac23e30a2492bccbdff433e73fb512dd704f644a43bb45b,2024-07-17T15:15:12.167000
|
||||
CVE-2024-23471,1,1,eeb79ead1eaa99467929603e528a9ba9d65bd27cb882a7e17f3bbe7402b2037c,2024-07-17T15:15:12.403000
|
||||
CVE-2024-23472,1,1,43d514c4def55a5eb486f68f7bd824677d6635efe7be4b4c49b9a6da09f141ab,2024-07-17T15:15:12.627000
|
||||
CVE-2024-23470,0,0,5eabfe63c8ba98278ac23e30a2492bccbdff433e73fb512dd704f644a43bb45b,2024-07-17T15:15:12.167000
|
||||
CVE-2024-23471,0,0,eeb79ead1eaa99467929603e528a9ba9d65bd27cb882a7e17f3bbe7402b2037c,2024-07-17T15:15:12.403000
|
||||
CVE-2024-23472,0,0,43d514c4def55a5eb486f68f7bd824677d6635efe7be4b4c49b9a6da09f141ab,2024-07-17T15:15:12.627000
|
||||
CVE-2024-23473,0,0,fcdf3057371442a23acb771e071986edb9353b73cf0334bd53b552c2669c7305,2024-05-14T16:13:02.773000
|
||||
CVE-2024-23474,1,1,7af299bd4bf325489dc4a3f21f783c968098487d372dd1902f3b19a37320d0d5,2024-07-17T15:15:12.840000
|
||||
CVE-2024-23475,1,1,427781f3a8683b3d7f3db9124024942f38d9011fe6a74edacfa85b9ca77a7945,2024-07-17T15:15:13.057000
|
||||
CVE-2024-23474,0,0,7af299bd4bf325489dc4a3f21f783c968098487d372dd1902f3b19a37320d0d5,2024-07-17T15:15:12.840000
|
||||
CVE-2024-23475,0,0,427781f3a8683b3d7f3db9124024942f38d9011fe6a74edacfa85b9ca77a7945,2024-07-17T15:15:13.057000
|
||||
CVE-2024-23476,0,0,a2c65553196c393fba0546e96e2c79c80a38d2a88710430b47bc32db3cc80706,2024-02-20T20:39:10.033000
|
||||
CVE-2024-23477,0,0,e880885242607136a306f6f57a9dc9e7844660b8142f6c1ca2dcb4c28aff7c18,2024-02-20T20:38:43.587000
|
||||
CVE-2024-23478,0,0,3a3388743ecb2899ec7137490ac6797073063468079fd9a11b0d285be141ba41,2024-02-20T20:39:52.377000
|
||||
@ -246600,7 +246611,7 @@ CVE-2024-26180,0,0,9000d855a74862f32d3fa0ed30042aefa93c161366835c3c92187e7b78b64
|
||||
CVE-2024-26181,0,0,f85adedc45ce0ef17d2924f5d1f3eede91ec057ddbc953f28c8597cd9192de3d,2024-06-11T16:15:20.530000
|
||||
CVE-2024-26182,0,0,2dd8ff2b71d4772f8e1652bd45aa416135058f5ea1a2de181bc25a4627f2ba81,2024-04-11T20:15:34.707000
|
||||
CVE-2024-26183,0,0,4d74cd74f15c42ef83e07da0fea854b9308a2d6867480d27e88f16b8021a572d,2024-04-10T13:24:00.070000
|
||||
CVE-2024-26184,0,1,9a9469b525a1c0948733fdbbefd0c134cd0d1bfb19cc88ca9e1172b5dc220da3,2024-07-17T14:58:41.847000
|
||||
CVE-2024-26184,0,0,9a9469b525a1c0948733fdbbefd0c134cd0d1bfb19cc88ca9e1172b5dc220da3,2024-07-17T14:58:41.847000
|
||||
CVE-2024-26185,0,0,9feef43ee36b690f774d8b3be3682410d3a24414bd3e53eb7eb31b5bf9351714,2024-05-29T00:15:37.420000
|
||||
CVE-2024-26188,0,0,f211739728663bae1418bea21124610d1eca871de3fac0df538712e0d37e5a9a,2024-06-11T15:16:04.713000
|
||||
CVE-2024-26189,0,0,2a49ee8d4a0ba2f801fc699ef40f2bf3b0913e4387987b37ad42d4a5aa46f00e,2024-04-10T13:24:00.070000
|
||||
@ -248079,7 +248090,7 @@ CVE-2024-2807,0,0,72cbbe4530c555d4dd2940aeac6ca3cb99d0e169b305a79bbc9962a7b891ce
|
||||
CVE-2024-28070,0,0,b02bed99aa18fb94d77393e8a0bab2512136cfff81f1cb82c2c934d3f0ee20db,2024-03-17T22:38:29.433000
|
||||
CVE-2024-28072,0,0,0388ddd739145e873f566e470af31e5a6e103b572069aea4be2de66f0edda6c1,2024-05-03T12:48:41.067000
|
||||
CVE-2024-28073,0,0,cadc3783842c38ba6ba61a0c45fedc9b4d6302da33bfc50f751b346c540f6d66,2024-04-17T20:08:21.887000
|
||||
CVE-2024-28074,1,1,5027b3400d78cb486d814a3b9c5ed2ca869be4bc800d385392a6b3906b93934e,2024-07-17T15:15:13.417000
|
||||
CVE-2024-28074,0,0,5027b3400d78cb486d814a3b9c5ed2ca869be4bc800d385392a6b3906b93934e,2024-07-17T15:15:13.417000
|
||||
CVE-2024-28075,0,0,acb66f607b88e170574f583eec5f7c1a4911ba67af1b2bf08e9d24973400217b,2024-05-14T16:13:02.773000
|
||||
CVE-2024-28076,0,0,7c257d304897e65890bc306f57dddbb8d08174369e3efd3f8b92793bad3c8aa3,2024-04-19T14:15:11.080000
|
||||
CVE-2024-2808,0,0,e0d3d3b9e325ca6ee7276bd88e3baf37c479e9082bd582fafdd638b137fbd54f,2024-05-17T02:38:31.233000
|
||||
@ -248525,7 +248536,7 @@ CVE-2024-28895,0,0,7f60c42026f8919d7327f07078b6071429a47272f57bf3ec7d964752af390
|
||||
CVE-2024-28896,0,0,82c8e7dd995d4781c98f0d7c761e7b443ea0ceb397f6b58ed2e6c96c2843e057,2024-04-10T13:24:00.070000
|
||||
CVE-2024-28897,0,0,f9f596567c4f5a1d1ef0ea2267dd4bdd40c07a7d3f8bde3d914da43c8724226d,2024-04-10T13:24:00.070000
|
||||
CVE-2024-28898,0,0,e62fdbb651dac3d1f5bd9c36f1fb9b36d2bc8afc331691f95d20f220846dce98,2024-04-10T13:24:00.070000
|
||||
CVE-2024-28899,0,1,fe8eba7dbe9024e13ed7d63297296d3985c62f24be0c5c9749515ed49342aa50,2024-07-17T14:58:25.510000
|
||||
CVE-2024-28899,0,0,fe8eba7dbe9024e13ed7d63297296d3985c62f24be0c5c9749515ed49342aa50,2024-07-17T14:58:25.510000
|
||||
CVE-2024-2890,0,0,9145153c62723ee7e49f3ca1acfeda5a8485eb432feca5d0a512548ba9b8f021,2024-03-28T12:42:56.150000
|
||||
CVE-2024-28900,0,0,2bc55895bc4ad7b643642c3643964561a9ea84ad48c52a8b405f069c5af07b45,2024-04-10T13:24:00.070000
|
||||
CVE-2024-28901,0,0,7ccda862f4452d0cfeec56bcbe787ffa93cef01fb8ea325187c1a29815bd0d34,2024-04-10T13:24:00.070000
|
||||
@ -248604,8 +248615,8 @@ CVE-2024-28982,0,0,4cfbf3591cf96f37013314412d2a968313b4953b63ec28142d546cf8f6808
|
||||
CVE-2024-28983,0,0,57b7369f9816fa1a55923b116dcbb27a793b7aad06b7761c68b9fcd8c194e8f4,2024-06-27T12:47:19.847000
|
||||
CVE-2024-28984,0,0,276bc8c54cf8ee7419930c3e9177a9acf5146d6167c989ef6d1387fafadac995,2024-06-27T12:47:19.847000
|
||||
CVE-2024-2899,0,0,0be0fb50fdcc13228c9b49554460e4a306be4c6e83ee7f9bfb94b945f4f9e595,2024-05-17T02:38:36.220000
|
||||
CVE-2024-28992,1,1,19a63c4052cdaff0d7746db7eeae97f54e5681bf9669cce818ddbbe24f83c37f,2024-07-17T15:15:13.623000
|
||||
CVE-2024-28993,1,1,eb2584493870b2cc973f87466125031a7ce8888dd862a361e8286f2ec84e3c54,2024-07-17T15:15:13.860000
|
||||
CVE-2024-28992,0,0,19a63c4052cdaff0d7746db7eeae97f54e5681bf9669cce818ddbbe24f83c37f,2024-07-17T15:15:13.623000
|
||||
CVE-2024-28993,0,0,eb2584493870b2cc973f87466125031a7ce8888dd862a361e8286f2ec84e3c54,2024-07-17T15:15:13.860000
|
||||
CVE-2024-28995,0,0,676b16f660765af69774a2536c884c955247c2299098c9e12021fd7eab69b47f,2024-06-11T17:47:22.867000
|
||||
CVE-2024-28996,0,0,09468fc42886d2b9d5b470ae44f5a5cbca16443960a600683fb24e9570dc922c,2024-06-06T16:23:24.377000
|
||||
CVE-2024-28999,0,0,768d1b3fe866566c9082c710789c8fcaa529e82f91bdfdec236693dabe93837d,2024-06-06T19:06:50.923000
|
||||
@ -248715,7 +248726,7 @@ CVE-2024-29116,0,0,d85dc6ae194d83c2dbd05b4e1cc8c25eaf9e91cd72cd7e6ae549c7eb131b7
|
||||
CVE-2024-29117,0,0,7cbc86fd47b57aac5bdcb66853eac01c2823bf8c332ca79b8820d49cc7cba209,2024-03-19T16:33:58.680000
|
||||
CVE-2024-29118,0,0,1cf920921a96fd5f0eb418dbd890604a04de50213d4066e1f2401f217f180df5,2024-03-19T16:33:58.680000
|
||||
CVE-2024-2912,0,0,f62836a8afe15e49afc11abef746f6e05f5ae0f68099e584fae53277c8c9f769,2024-05-22T16:15:09.713000
|
||||
CVE-2024-29120,1,1,57c69d0a65b3be3d0141e020fc6744b979b3f4106915daeb8a4d6dccf1146ae4,2024-07-17T15:15:14.090000
|
||||
CVE-2024-29120,0,1,1564385a8634243b0bf6719fe348c3c8819fbd8e4f6ed133da34ee226bba0ad6,2024-07-17T16:15:04.157000
|
||||
CVE-2024-29121,0,0,6325c10b522d77de76e2af8d35d0ad7dde2dffd7703677e5c3f9cd67ab864731,2024-03-19T16:33:58.680000
|
||||
CVE-2024-29122,0,0,661ef3e986563bd80f846a4ddab64b8b192e2d4e3524465144ceb6bed1a37def,2024-03-19T16:33:58.680000
|
||||
CVE-2024-29123,0,0,ebf9249691adeb2d60017b147325d5448759ac253d439ee41cb427cd5527b99e,2024-03-19T16:33:58.680000
|
||||
@ -248976,7 +248987,7 @@ CVE-2024-29732,0,0,e30fc06180575c1796869bb0b4fa02497c40c6d7939d34aba0362f12c2710
|
||||
CVE-2024-29733,0,0,0811972ef853088b726fd2b07316244d1d628e55e310910ac8174bd65d097612,2024-07-03T01:52:30.320000
|
||||
CVE-2024-29734,0,0,65bb1ba04f673142d3081922c5e4533cd4af140db3cdfbbce09ab73848e3b6c3,2024-04-03T12:38:04.840000
|
||||
CVE-2024-29735,0,0,1c27e1fe9dbb50907062f908fab6fbb55a16239f685d6be40b04c11200e2a361,2024-05-01T19:15:23.573000
|
||||
CVE-2024-29737,0,1,905f9624f62391e71e59e29113bc18cf160be44a2207e2f0ce7231f623f92d4a,2024-07-17T14:15:03.677000
|
||||
CVE-2024-29737,0,0,905f9624f62391e71e59e29113bc18cf160be44a2207e2f0ce7231f623f92d4a,2024-07-17T14:15:03.677000
|
||||
CVE-2024-29738,0,0,1c3e1564461702d87cd213d777f3523814ac3c73b5cc61bff5ae595e06e0fbeb,2024-04-08T18:49:25.863000
|
||||
CVE-2024-29739,0,0,ff7d8db191ec3bc24b9fd0a0e51d4426e2f32708f8ba1a8e8a840affcd32aeb7,2024-04-08T18:49:25.863000
|
||||
CVE-2024-2974,0,0,f10703d4490e9d3ed63c6b4abd6c9bf87d6d9b2c11e56d030e360944602d03aa,2024-04-10T13:23:38.787000
|
||||
@ -249254,7 +249265,7 @@ CVE-2024-3001,0,0,157ee6d688c61b76ec7ba619d8738893e2c3dd046dfcff3cfe2620de606162
|
||||
CVE-2024-30010,0,0,960cee1392de0c41bedaaa06380ebec569c80eb1e0c43d5be6b9f599be25316a,2024-05-14T19:17:55.627000
|
||||
CVE-2024-30011,0,0,38c790406b87ab6b2ddbb41025ef4821371b3f2d3c13d0b393df41ab8dbbad42,2024-05-14T19:17:55.627000
|
||||
CVE-2024-30012,0,0,89616779728136c0e63e8233b5f02065551f689a98f1954d65a3da837e43a7e5,2024-05-14T19:17:55.627000
|
||||
CVE-2024-30013,0,1,f478157eeb1833ae51e2ac0ceb6afdb627ef67dde6d178eb99f5ca6d25e1ddb1,2024-07-17T14:53:41.397000
|
||||
CVE-2024-30013,0,0,f478157eeb1833ae51e2ac0ceb6afdb627ef67dde6d178eb99f5ca6d25e1ddb1,2024-07-17T14:53:41.397000
|
||||
CVE-2024-30014,0,0,99781d294061af674406e31c02c7e8e39a8b8590cdd6b6fcdac0c38c893838d9,2024-05-14T19:17:55.627000
|
||||
CVE-2024-30015,0,0,ad2627333c54aa111a2c46b1d45b1e88ff33bfeb60da921a4a7323324f35b320,2024-05-14T19:17:55.627000
|
||||
CVE-2024-30016,0,0,6be84956c51ebe9ac11523a4363502971eaa1a12ef6e760cd6ca43427e081ae1,2024-05-14T19:17:55.627000
|
||||
@ -249306,7 +249317,7 @@ CVE-2024-30058,0,0,a1a511e081de1359a5c8e8dfcd73ce56d4990c75e99ccab65e8b03e7960f4
|
||||
CVE-2024-30059,0,0,63a2dab80c660c9c44dee394d6c5e0990ac774d032d077b9543992d53c1c870c,2024-05-14T19:17:55.627000
|
||||
CVE-2024-3006,0,0,ec8b37c3fe07f44a3179e7ebf781c249c3b3c8917cb2a412d723e57af1e94421,2024-05-17T02:39:40.117000
|
||||
CVE-2024-30060,0,0,170f06dd18b0242e35e93fc627100402871706522f8f1a46d4997e07766785e5,2024-05-17T18:36:05.263000
|
||||
CVE-2024-30061,0,1,47e89b718a221df676ebdc38f53a8432f70601d8b30297d685a6b467348435f5,2024-07-17T15:22:46.897000
|
||||
CVE-2024-30061,0,0,47e89b718a221df676ebdc38f53a8432f70601d8b30297d685a6b467348435f5,2024-07-17T15:22:46.897000
|
||||
CVE-2024-30062,0,0,4bfd7750976332cbf3138fa7bc5c8220095dd88b267408654f472c79216ff00b,2024-07-02T14:23:40.820000
|
||||
CVE-2024-30063,0,0,a6c18ee19af78813a7336be786c53d09e4ab4504175485aac84c4fe78f9e753b,2024-07-02T14:17:47.710000
|
||||
CVE-2024-30064,0,0,7a179afa450eed85d7ee628ffb2feb5ee613adc6c371f16fb51f2d7c19805799,2024-07-02T13:51:08.770000
|
||||
@ -249317,17 +249328,17 @@ CVE-2024-30068,0,0,40e0501da9121c8921f48e54ff9fa8bfd0e783172677a105bbf10481729a1
|
||||
CVE-2024-30069,0,0,deb50ce8845cbfc107c18b1f615c5e79d1900e91fb30c5e5400bb2a0a03756b4,2024-06-24T20:53:31.637000
|
||||
CVE-2024-3007,0,0,e54b5032410fd6611f6f329a659224824e2d3526a1f829a3bd944d33dfe7d4c8,2024-05-17T02:39:40.200000
|
||||
CVE-2024-30070,0,0,adcd33c65d2107ae368f3f42d041f903793454e0586bb07bd95af34f1010c4e3,2024-06-24T20:57:17.147000
|
||||
CVE-2024-30071,0,1,44d2f1eb1bb49f1e98b0a0f9d04ebf8c83efe40aeafeb84e5e474c59a9ceb532,2024-07-17T15:22:16.003000
|
||||
CVE-2024-30071,0,0,44d2f1eb1bb49f1e98b0a0f9d04ebf8c83efe40aeafeb84e5e474c59a9ceb532,2024-07-17T15:22:16.003000
|
||||
CVE-2024-30072,0,0,97d5f63ada8ab1315d025e356ee152997d3218d241b1f758da64c2c6bba26351,2024-06-24T20:57:43.443000
|
||||
CVE-2024-30074,0,0,ee343b6e3d8710663ab4373173304b773ce84c2ec9a4e2e7e71a3ef83693d6a1,2024-06-24T20:52:05.630000
|
||||
CVE-2024-30075,0,0,20afea693ae588057c67b37c402ad96cc0e98db5bd0babb8ba4d0c72bc655415,2024-06-24T20:52:28.660000
|
||||
CVE-2024-30076,0,0,31ac0642686a106a28c09e097ab78925435d7322de2d4346e2edff0182857b6f,2024-06-21T19:41:03.030000
|
||||
CVE-2024-30077,0,0,9a30770d4bf93041f649ff379997b0a3f4cc9a380975d61cb6c6f7f6e9014e8b,2024-06-21T19:47:55.517000
|
||||
CVE-2024-30078,0,0,4b74deca517b3ec468c53d0180c45487018849a36429ef886b99be12d4a468a0,2024-06-21T19:48:29.993000
|
||||
CVE-2024-30079,0,1,660c9b7657fdec59db5564b153edc9c4243fb2af5ed73417166113ba6323c7af,2024-07-17T15:21:48.743000
|
||||
CVE-2024-30079,0,0,660c9b7657fdec59db5564b153edc9c4243fb2af5ed73417166113ba6323c7af,2024-07-17T15:21:48.743000
|
||||
CVE-2024-3008,0,0,aa1ee66fe6c6288575f75f6aed231bba9bb6b91d0c1d395345dcded74ac78eb9,2024-05-17T02:39:40.280000
|
||||
CVE-2024-30080,0,0,4b4af52675429142241752bb6e7498a5bdc562b265b368499568e94d687a9e67,2024-06-12T14:19:52.130000
|
||||
CVE-2024-30081,0,1,2fdbba21e85b2e93940a1c7176943daeaab2e69717246f7e1024195ac06a6f83,2024-07-17T15:20:04.197000
|
||||
CVE-2024-30081,0,0,2fdbba21e85b2e93940a1c7176943daeaab2e69717246f7e1024195ac06a6f83,2024-07-17T15:20:04.197000
|
||||
CVE-2024-30082,0,0,ea52be258af0ce937157d122cbbf2c3c68f6371dd3a4567cc0c605f77673a9c1,2024-06-21T19:49:24.627000
|
||||
CVE-2024-30083,0,0,ba9e747112ee6bd7a6e7408864801325657bb33753f6ea63b5d9a9dce79423cd,2024-06-21T19:02:52.253000
|
||||
CVE-2024-30084,0,0,2ff230b9f7ca79d2e13580712575b84ad5e2b5c2664fbf927cd3b01799152a96,2024-06-21T19:03:20.890000
|
||||
@ -249344,7 +249355,7 @@ CVE-2024-30094,0,0,514619b1cab4b16ee2b8cc0a712a19212d3722a46e562ecc92a699aeb81d9
|
||||
CVE-2024-30095,0,0,3ca723811cbcc22a7cbe54c86ce8532c877297a00e3a867feee4bb18679188e3,2024-06-20T18:07:39
|
||||
CVE-2024-30096,0,0,c59073294a7980b121661d62726a35e5b0fa89f36897dbefb926306f5bb60913,2024-06-20T18:07:54.607000
|
||||
CVE-2024-30097,0,0,f361afbd70ccc890d692f083fd284f120dfac451b933c5b40f4e41c071d8eca6,2024-06-20T17:51:00.143000
|
||||
CVE-2024-30098,0,1,09c5b6409d3e95ced7b00a5061b997d5ad6d5a991002dfb4be505b85d375aa03,2024-07-17T15:17:02.427000
|
||||
CVE-2024-30098,0,0,09c5b6409d3e95ced7b00a5061b997d5ad6d5a991002dfb4be505b85d375aa03,2024-07-17T15:17:02.427000
|
||||
CVE-2024-30099,0,0,db3c3d3c9e3886f5309ac400fba039a8c973cea5a32a1f27eb983b80e99639dd,2024-06-20T17:48:07.827000
|
||||
CVE-2024-3010,0,0,668693db697792f1de7ebacb601ecaac4e994b5f7b4a01f36e6acdb1feb8c944,2024-05-17T02:39:40.450000
|
||||
CVE-2024-30100,0,0,14f6b9813ac638b86d717febb4a15a85c4096212ce5140313ca121a45e513d65,2024-06-20T17:31:07.867000
|
||||
@ -251401,7 +251412,7 @@ CVE-2024-32983,0,0,7489fbad6376785f49f56ce362b652d6fa65a99d3abef06273a5e7cd5b544
|
||||
CVE-2024-32984,0,0,cf23c5c25b44382dc62969ab40994ebd20f92f606203e0df0758e1f5fd04d250,2024-05-01T13:01:51.263000
|
||||
CVE-2024-32985,0,0,97f6a9c9297a9183e90a31c05f9f9e4b47eb6199c5c52e0c990fbed76f951b64,2024-05-14T16:12:23.490000
|
||||
CVE-2024-32986,0,0,671f263f68a441853ebd089c75e8acc8cd4334ffc16795c16c078d2e79568d60,2024-05-03T12:48:41.067000
|
||||
CVE-2024-32987,0,1,3dbdad061c9240280d4dc8231b0393e26308cad2764cd77f3d1444baaef0b376,2024-07-17T15:12:16.427000
|
||||
CVE-2024-32987,0,0,3dbdad061c9240280d4dc8231b0393e26308cad2764cd77f3d1444baaef0b376,2024-07-17T15:12:16.427000
|
||||
CVE-2024-32988,0,0,b75452c4939042145070e3930ee08a16366c08052457addaa745b6ead2778cf4,2024-07-03T01:57:22.273000
|
||||
CVE-2024-32989,0,0,930c4066a7d7ffe138e3e94b521b0b534bff3256282035d886a74b2481f4351c,2024-06-14T08:15:40.147000
|
||||
CVE-2024-3299,0,0,0bc35e84cd3916be2956d4a01095bdb7e2b9b6d734c61138badfae1815ded68d,2024-04-04T16:33:06.610000
|
||||
@ -252546,12 +252557,12 @@ CVE-2024-35048,0,0,7d2e40c430e02cb68d065988844aba370a92c807c6984a33499abbf4ef502
|
||||
CVE-2024-35049,0,0,7f4be420d91d9a8f87262bac46be64324b444d7ac3ac1587575b0d32b81ff685,2024-07-03T02:01:14.393000
|
||||
CVE-2024-3505,0,0,07b0949681fcc5ca8054aa7f9f47a8f95432c3a4c9c46506fc21cb30ad4bc3b4,2024-04-15T13:15:31.997000
|
||||
CVE-2024-35050,0,0,b0236daac2c3966aba94745c646c21ffa4a26fe8fffa2e95528779869a71d061,2024-07-03T02:01:15.190000
|
||||
CVE-2024-35056,0,0,16dc4275b0cfbca58cc27c0abc7f1bb6be6c851eb5ff9928c2e1727e56db4f0b,2024-05-22T12:46:53.887000
|
||||
CVE-2024-35057,0,0,47daba873776057e2d4f676fce8093d9bdbcad7aad68b4565ea6ee9e1578c2b8,2024-07-03T02:01:16.030000
|
||||
CVE-2024-35058,0,0,4c978a9f2fc0df6f46d5cd8467aac76a67a01324702f33fa24c016ab3c438d5f,2024-07-03T02:01:16.830000
|
||||
CVE-2024-35059,0,0,32912879e1c71e5bdf72eb54227af1385b5c1aeaf3f83f89bda60480d159c776,2024-07-03T02:01:17.657000
|
||||
CVE-2024-35060,0,0,dc3ef8cd004453780e3b8edd242ed99b58513de18965db0f3e2846c3a0b0c40c,2024-07-03T02:01:18.427000
|
||||
CVE-2024-35061,0,0,1c542ec6e66af9696bb08f80c7cf7f3caa0aed339c06075b5f11bddb7ba214b6,2024-07-03T02:01:19.220000
|
||||
CVE-2024-35056,0,1,8565a05e21722b6468100569afab64d032af5dd0d84afa306557ca3914cda2b4,2024-07-17T17:15:15.263000
|
||||
CVE-2024-35057,0,1,d8b1391320f9fe3f708b665b55b5674c28a9f0e4154226e928eddc897ac177b6,2024-07-17T16:15:04.577000
|
||||
CVE-2024-35058,0,1,04c708d4f2b869ae5964d1930cfec2987e068cdd18122deca793d922c4c5f892,2024-07-17T16:15:04.673000
|
||||
CVE-2024-35059,0,1,dfcf8d668815ccc0d32854da2c20a083e119b7332e8581c76bd10f4eac9a5fc5,2024-07-17T16:15:04.743000
|
||||
CVE-2024-35060,0,1,afba2b727938592df1bdc4e63013255006d044a72a697f992c598613bec84c11,2024-07-17T16:15:04.813000
|
||||
CVE-2024-35061,0,1,0df2890e20c38a1c44b9989903bccbfb46c27c7aacdaa254a5eaf724f2825eba,2024-07-17T16:15:04.877000
|
||||
CVE-2024-3507,0,0,e1e1d417278f9c0917e2f747f1a5409d7cbe66638a172abe25b5d37d3cb7fea7,2024-05-09T09:15:09.623000
|
||||
CVE-2024-35079,0,0,e84edcd2514df6046335465f030b9492060083fdead2f3e795ca695702202f46,2024-05-24T01:15:30.977000
|
||||
CVE-2024-3508,0,0,2b43f9e122cbb6c5d0ee83530dba132ab3fde8d83c6c2582c0a69215807219e4,2024-07-03T02:06:18.367000
|
||||
@ -252670,13 +252681,13 @@ CVE-2024-35255,0,0,dd2820217033d300b334ae05889b3c3f413c0da4e96707fa039fcafe96b24
|
||||
CVE-2024-35256,0,0,f2176a2df1a1016e0c34600dbc0c04e96b8b2ff9ee36a42a63c8d07aa875d956,2024-07-09T18:18:38.713000
|
||||
CVE-2024-3526,0,0,3b86e48cdd64c94b1957dd961f1ea8a5609328c0a5fd236d499daf2f49d2a875,2024-05-17T02:39:59.067000
|
||||
CVE-2024-35260,0,0,bae5987a3d9c4653f4a8ff7faa6c237ff82527372850961d3f63629ac612e217,2024-06-28T23:15:11.457000
|
||||
CVE-2024-35261,0,1,9d9063b6e7979be3a79ef13bd9cc70b3fb0340950dd44d60d9d3d687415ebbe0,2024-07-17T15:48:39.097000
|
||||
CVE-2024-35261,0,0,9d9063b6e7979be3a79ef13bd9cc70b3fb0340950dd44d60d9d3d687415ebbe0,2024-07-17T15:48:39.097000
|
||||
CVE-2024-35263,0,0,f00bc0132870d05293845d05b9562badae38c6c7b9bb0d9a00ba1c99b84818b6,2024-06-20T16:32:31.287000
|
||||
CVE-2024-35264,0,0,93e7c701e1ef80d310b24809194d2644700ad22a6619971e5ca319f8f5a7b423,2024-07-09T18:18:38.713000
|
||||
CVE-2024-35265,0,0,66f306784b0cec4cac480e0b04ab07434b85a607c811d4eded9bc25afd0a65fe,2024-06-20T16:33:28.080000
|
||||
CVE-2024-35266,0,1,72f85b66607ed3ec09a2f90bfb8b5421fbcbe1083bf3c8d31d5232091779c5c4,2024-07-17T15:03:10.610000
|
||||
CVE-2024-35267,0,1,8d2f4a11b808fec8563f241fc658cf43f5e54d7aaadc09b793c2bc37e252ec9d,2024-07-17T15:02:22.937000
|
||||
CVE-2024-35270,0,1,d1dc880d5375baa19c5c22ae22578f8e8a49aa76e4f7bae55a316a718926e765,2024-07-17T15:00:46.870000
|
||||
CVE-2024-35266,0,0,72f85b66607ed3ec09a2f90bfb8b5421fbcbe1083bf3c8d31d5232091779c5c4,2024-07-17T15:03:10.610000
|
||||
CVE-2024-35267,0,0,8d2f4a11b808fec8563f241fc658cf43f5e54d7aaadc09b793c2bc37e252ec9d,2024-07-17T15:02:22.937000
|
||||
CVE-2024-35270,0,0,d1dc880d5375baa19c5c22ae22578f8e8a49aa76e4f7bae55a316a718926e765,2024-07-17T15:00:46.870000
|
||||
CVE-2024-35271,0,0,ee259a85b11b42f5d67859c38048c87bcc97aeeff99de7fbccf3c51a87496287,2024-07-09T18:18:38.713000
|
||||
CVE-2024-35272,0,0,55d3634b78756e5083c3b18df66ba37f596f725525c674e71f12fc5934283aaf,2024-07-09T18:18:38.713000
|
||||
CVE-2024-3528,0,0,c96e1e132295c243d4fa4a90d8abf77e41d771305ddbcf81d644bca2cdde7da0,2024-05-17T02:39:59.157000
|
||||
@ -253295,7 +253306,7 @@ CVE-2024-36079,0,0,1e2dcd2fe0cc0022dd8426ccc07dbea151a33827bd6b4942f04e6d514f334
|
||||
CVE-2024-3608,0,0,75396bd996e12a3ce8a9ff63abbadebbd8d739cc9bf3ff2fa94cd5f3927fb0bc,2024-07-09T18:19:14.047000
|
||||
CVE-2024-36080,0,0,da30944dd5f9aaf294ce90387953495c39dbdb27b4381b7b68cb89306c216ee7,2024-05-20T13:00:04.957000
|
||||
CVE-2024-36081,0,0,c544e7869c5ec75fe9184642046715e701981d636db6ea51043baf583a03d0a7,2024-05-20T13:00:04.957000
|
||||
CVE-2024-36082,0,0,b8e7b6d9e14eaf4d125a408e307f9f5abe41cd99981b6293786ad11f7aff5d20,2024-06-07T14:56:05.647000
|
||||
CVE-2024-36082,0,1,f7d91a74fa3aead10b2ec52a9288bf7d0bfd73f843bd97503d83eff0dca4633d,2024-07-17T17:36:42.157000
|
||||
CVE-2024-3609,0,0,98f712ab6d3428e860037aa84c451c639120d9d1fac4fc19a3b7a77c0372bf73,2024-05-17T18:36:05.263000
|
||||
CVE-2024-3610,0,0,10f31cdf4f921aa769d51886cc413a224f2abfc93c76d4774c45d5585f195bb4,2024-07-17T03:06:50.080000
|
||||
CVE-2024-36103,0,0,fcc35d49dc45666e220585dc55b1ab5f98eb767c9d2a7ebae31a9f259d616b20,2024-07-08T14:18:36.887000
|
||||
@ -253693,7 +253704,7 @@ CVE-2024-36811,0,0,f90db255bac241fb3eb4c4274fa7aa4f43fe1ecaa498e979225312b15e44d
|
||||
CVE-2024-36819,0,0,b06c755f900c06f50434f89b91de559393300344dda01bbc662266b5fc611e52,2024-06-26T12:44:29.693000
|
||||
CVE-2024-3682,0,0,aebee2feda89d709e11e9bec3e1c17ca0ae10ff39719e7f62be10e1e27b06dc2,2024-04-26T12:58:17.720000
|
||||
CVE-2024-36821,0,0,bcd10931e6c0a8f8cf295a0a0e9e50fc33c10d8062ba9f55622804927e2b8c50,2024-06-17T21:15:50.960000
|
||||
CVE-2024-36823,0,1,73764c9f34abc877735e2a683a3be5f7a3435e84b5edb7f300e1e086f31dcd65,2024-07-17T14:41:44.227000
|
||||
CVE-2024-36823,0,0,73764c9f34abc877735e2a683a3be5f7a3435e84b5edb7f300e1e086f31dcd65,2024-07-17T14:41:44.227000
|
||||
CVE-2024-36827,0,0,d5b65af3d7b9322aad3b5478f72ede9b79c676edb352f8fbc888d8aac5e59f92,2024-06-07T19:24:09.243000
|
||||
CVE-2024-36829,0,0,28d6b2d4311b85588cbd36851085bf0d595d08bf8e4f0076b3a54116663e3c85,2024-06-27T12:47:19.847000
|
||||
CVE-2024-36837,0,0,bcb13008fecb3ca83d2c91f29752567c7b7ae53837e580080105d1fb590b60cf,2024-07-03T02:03:38.687000
|
||||
@ -253800,11 +253811,11 @@ CVE-2024-36961,0,0,4e4b446649db320a139f4aa3bca09c9bc55ac839253094093faf8717c1669
|
||||
CVE-2024-36962,0,0,59e83fa3c9b67ee4ca190998e86f2192864a4ec787e1574961ab1bfb7f8942b2,2024-06-03T14:46:24.250000
|
||||
CVE-2024-36963,0,0,9babc41f15278c97e25649f1d781a93b01c025406e91090bbc0d7680e835d154,2024-06-03T14:46:24.250000
|
||||
CVE-2024-36964,0,0,49af3173fdbcf36d2da73042cc4bf87777abec14f46c8d6af8dee65266d543cb,2024-06-27T12:15:28.493000
|
||||
CVE-2024-36965,0,0,f5d385c4e0bd3f04df0a14fe5ec7122b321dc981e94b27b487212e71aecb371a,2024-06-10T02:52:08.267000
|
||||
CVE-2024-36965,0,1,f3145e6076d1b300dfd59296285f95e07925904a4fe3d12b79e2e88ad523ab1d,2024-07-17T17:32:46.323000
|
||||
CVE-2024-36966,0,0,326aa1456c7d6a589fd3d080fdabfec28366683a9b29eb8845eaaecfa92989d4,2024-06-10T02:52:08.267000
|
||||
CVE-2024-36967,0,0,e7a974a7fd2dc60a097bc75137c728f9243c3523fb643de85996d962d67d6606,2024-06-10T02:52:08.267000
|
||||
CVE-2024-36968,0,0,a0da1398753fc8cfd97d5d7debc45c35c6f32a9f14377a9e19abee766fb7a4c7,2024-06-12T10:15:31.153000
|
||||
CVE-2024-36969,0,0,676b08aa072aadbde6876e459297c3d8e0afc87c846527c689dd2f6bcfff6567,2024-06-10T02:52:08.267000
|
||||
CVE-2024-36967,0,1,5a5412327937f70e23b817f9208c62be87df3af9d3355a5d62da2596debd75c7,2024-07-17T17:03:53.860000
|
||||
CVE-2024-36968,0,1,a995bed3e48bd8c81f02b7e9d11197af7d121a937f63236c67c72482dd84f10b,2024-07-17T16:59:39.987000
|
||||
CVE-2024-36969,0,1,e622ab8131a3dbc40ec2fb2b416de8073d7058b237c224b8ddf44dea78c18b59,2024-07-17T16:50:29.427000
|
||||
CVE-2024-3697,0,0,6e56c636d90d09536d9c0a6418223e2755a5c4ad9d107f96b9c5e19a7cee17c5,2024-06-04T19:20:23.323000
|
||||
CVE-2024-36970,0,0,0be07b4bb0193dcb8a27320342404deac5519d2395e7535b8d9bd5f09d14f42b,2024-06-10T02:52:08.267000
|
||||
CVE-2024-36971,0,0,de65a190b8fa52a05c781885192c5cd5695d332f2566b571c1075e1e0d1946f8,2024-07-15T07:15:06.480000
|
||||
@ -254308,7 +254319,7 @@ CVE-2024-37977,0,0,fc6cdf1fcb13c0b297637d2640fd367e1afe7a1dfb5055043578b69faed9f
|
||||
CVE-2024-37978,0,0,a3d0955f8e935b6424318b62f7dfa6459b27869862422e3f5ad0e3ba6b11fd8e,2024-07-16T16:39:11.783000
|
||||
CVE-2024-3798,0,0,0b85fa9696a9b911425afa5f1da8b23352f77c3b644e418948a0e7e752003573,2024-07-12T10:15:01.757000
|
||||
CVE-2024-37981,0,0,21e2c6f93736909ccf452ff971bb58314fc8d03f8877901219941882d1cdb65e,2024-07-16T16:38:46.800000
|
||||
CVE-2024-37984,0,1,795bbd0d983da96a0e51622d507b54846875127f8b996aff715bb2b9778cfcc2,2024-07-17T15:48:09.993000
|
||||
CVE-2024-37984,0,0,795bbd0d983da96a0e51622d507b54846875127f8b996aff715bb2b9778cfcc2,2024-07-17T15:48:09.993000
|
||||
CVE-2024-37986,0,0,2487af021a0226ccec4882899dac83c56eac5cd7eeb2fa0beb7fe3b7d12bbdce,2024-07-12T18:59:41.357000
|
||||
CVE-2024-37987,0,0,f4bc331a9b09a336ebf69cac5128f3ddb41a4064b564c097fc6645464fecd53a,2024-07-12T18:51:17.253000
|
||||
CVE-2024-37988,0,0,c86291a0f061c05259fe7a7336e8616b7d2b496dae2d1e3292124af3161a49e9,2024-07-12T19:01:50.753000
|
||||
@ -254500,6 +254511,7 @@ CVE-2024-3844,0,0,13c07c552898deff764ecc147d4cf01f9d640dbd85df9d011bb4595782c8d9
|
||||
CVE-2024-38440,0,0,6eeed0e96f15416f894572035c480d139cdee0086e466e03019ce412c35c715a,2024-06-30T12:15:02.377000
|
||||
CVE-2024-38441,0,0,a973f5143c6734e984ff9aea01be1b9a40b4154f243a146a34adc1cd56beda46,2024-07-03T02:05:01.423000
|
||||
CVE-2024-38443,0,0,f13f48a0a21a67520512a3ec2ab6e073a68af4c8b774478a4c1ef20277a5f7ac,2024-07-03T02:05:02.417000
|
||||
CVE-2024-38446,1,1,b04d7515b675c405f0f45f4e3ae58147e1e5c76f8dea8c6f0942db8e3e7e52a0,2024-07-17T17:15:15.340000
|
||||
CVE-2024-38448,0,0,ba1871b7e0fa187923744d63be4c60396badf8afd9c3275c2e47e89175ed02ba,2024-07-03T02:05:03.433000
|
||||
CVE-2024-38449,0,0,8da6f80ac88bb7ae3e1140e6ee8382a2d6cd1d0a7f86d02f23b41c1048f2d2ac,2024-06-20T12:44:22.977000
|
||||
CVE-2024-3845,0,0,a979e2b537f528e4ac50f6006d078d735fa62fe4b7376a25443b79e4c194cadd,2024-07-03T02:06:42.887000
|
||||
@ -254715,6 +254727,7 @@ CVE-2024-3885,0,0,9b28a2ee85edfe77753e71858fb1438bd68a9b6ee299843f3a5752cca4753d
|
||||
CVE-2024-38857,0,0,857bbf4d5ee889c68ec1450930f0cf323232ab2d5a162824c8153ee668a7e638,2024-07-02T12:09:16.907000
|
||||
CVE-2024-38867,0,0,4bc8a346a92423127914d7bd932870dc2a7efecb39fecaf6981a89bcdb11978c,2024-07-09T18:19:14.047000
|
||||
CVE-2024-3887,0,0,7992ee60f5f26d3f15d818db21e67277dbf02ae9d208c24a54e5c01935424c21,2024-05-16T13:03:05.353000
|
||||
CVE-2024-38870,1,1,fb5c3c06e47864ea011fc924b12dcd6de68c4dd7aef6db354e1586605c77e41d,2024-07-17T17:15:15.407000
|
||||
CVE-2024-38873,0,0,6889a908915a370dc32eb3b9351070cdb3a634a1b8f52aac6863c833e22f79b2,2024-07-03T02:05:21.267000
|
||||
CVE-2024-38874,0,0,1c1b28247d06b02b2f044fb942d8a6aa89aab3909bc7e48738a346b7a68e1cc9,2024-06-21T11:22:01.687000
|
||||
CVE-2024-38875,0,0,d18c0c1f05faa02ef048ee622890d874b54f8d91a4409a82414c9856f7ccdec0,2024-07-12T16:11:48.453000
|
||||
@ -255695,7 +255708,7 @@ CVE-2024-4385,0,0,77dea89143b3a0633a6b8d90c0521dc82338402099ab7a378f8d43e8fe04ec
|
||||
CVE-2024-4386,0,0,731d04018d6299c9e1d8f7a212148a53db39578a94a703a0b90337f63dd3089f,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4387,0,0,e174205a853415a731f22788a3c678b3fe9a7067078ee3c331ab7c9e4e787abd,2024-06-11T10:15:13.637000
|
||||
CVE-2024-4388,0,0,4ca48ea0d089cba19e1c949c534ac5647f38f1d5d242799ab5ca49dfb89ed80c,2024-07-03T02:07:30.200000
|
||||
CVE-2024-4390,0,1,e7e7976abdd60c38776b1ca6e6489a541123a6d22aaefce9d02ee1d97e2bf9c9,2024-07-17T14:10:55.550000
|
||||
CVE-2024-4390,0,0,e7e7976abdd60c38776b1ca6e6489a541123a6d22aaefce9d02ee1d97e2bf9c9,2024-07-17T14:10:55.550000
|
||||
CVE-2024-4391,0,0,3c50ad807a6efe83c676c20cbd033bdfc9a5c436710b6a08536dff480db62e6d,2024-05-16T13:03:05.353000
|
||||
CVE-2024-4392,0,0,5c82c123a66d3444e81adbb958bd6b8cf11e432e36668571a78dbfc8c82c1c37,2024-05-14T19:17:55.627000
|
||||
CVE-2024-4393,0,0,4e00802830a11f2dfec38985ebf8ec82363098448bfe6d2b274aa9f7d7f56b33,2024-05-08T13:15:00.690000
|
||||
@ -255846,7 +255859,7 @@ CVE-2024-4561,0,0,8ef61ebc386f7e587b6eb6df8054d64514729591e443c5ac6735c0df58420e
|
||||
CVE-2024-4562,0,0,e0a783b0d1c16da234e0fe3d351cbae7a089d075739ba22ec0641c397b879b0f,2024-05-15T16:40:19.330000
|
||||
CVE-2024-4563,0,0,a90af34c00297497a78ff72a2c306ea2262a49c5811c3b8bcaed5ddcefc9b6fb,2024-05-23T16:15:08.867000
|
||||
CVE-2024-4564,0,0,045273651cbda7642192b25b1ce14ee6220cb16969b1d2c569252c03c480a950,2024-06-13T18:36:09.013000
|
||||
CVE-2024-4565,0,1,15260fda70e8733111d52b1dae1a14ee33f22d1739a2e8de851c031d5bec2fb8,2024-07-17T14:14:08.750000
|
||||
CVE-2024-4565,0,0,15260fda70e8733111d52b1dae1a14ee33f22d1739a2e8de851c031d5bec2fb8,2024-07-17T14:14:08.750000
|
||||
CVE-2024-4566,0,0,c4354a4e62a03c97286174a61ad4d2f3843d01589ace1532dbd5a5f84743d16c,2024-05-21T12:37:59.687000
|
||||
CVE-2024-4567,0,0,55b6508070b71672e22c57660afab28e7ebc1a40a37655965c41825cdc3bc17a,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4568,0,0,950b62937f2f303cb16f164d002be64527131317e5dfff26daecb96b6bec4236,2024-05-07T13:39:32.710000
|
||||
@ -256248,7 +256261,7 @@ CVE-2024-5038,0,0,99b942f340bd77179350025250d1eccbd97ee2b6f6339af49bfd1a72be63cb
|
||||
CVE-2024-5039,0,0,d4eca04aa1b7f16d8be388592f13108d7bb098b959dcbbbcd1cb04ce7429f2b9,2024-05-29T15:18:26.427000
|
||||
CVE-2024-5040,0,0,28e80b4d31908c888f58e8aabf481f59f60dc445c02b92b96b8990cba6ed3432,2024-05-22T12:46:53.887000
|
||||
CVE-2024-5041,0,0,50ceb705fe91e3598f01bb8363d7099f99df3d44a38bb258c5294ff805069b46,2024-05-31T13:01:46.727000
|
||||
CVE-2024-5042,0,0,c3d6fb16f7772dc95314f5d39db0c2c7a2e9ceddf7ac90a69b75b86287dc9853,2024-05-20T06:15:08.723000
|
||||
CVE-2024-5042,0,1,94f87ab7ec94fdfd62be1f748dc3eabc441b5ca85cd66d27e43bb6f6e1a4ec28,2024-07-17T16:15:05.160000
|
||||
CVE-2024-5043,0,0,e8af684a96b52a20f139d3c6a27bd63fd7606ea9b2bbde97322bc475920cc410,2024-06-04T19:20:57.007000
|
||||
CVE-2024-5044,0,0,a4e177741479e530ad4105167bd81efc2f0690ac50664dc5a5f1c197ba9e227b,2024-06-04T19:20:57.117000
|
||||
CVE-2024-5045,0,0,2cc3bc060710a5f4f076b17bfc4c763ffc9b4201a30a5ba725a69c9c0d38befe,2024-06-20T20:15:20.153000
|
||||
@ -256392,7 +256405,7 @@ CVE-2024-5206,0,0,1edbf7ffa84186215d61e0a6ea0414ae2bae29f22b2d9bacc791d12b11ca44
|
||||
CVE-2024-5207,0,0,181dd5a561a1ca6cee33a4a5369908472f122edb94b0d0fa7d6cd5b5e2958e5a,2024-05-30T13:15:41.297000
|
||||
CVE-2024-5208,0,0,1cccb0861be6781d1738a6540c67013b2ca290af7bc911f2a2acee7d44fa67ac,2024-06-20T12:44:01.637000
|
||||
CVE-2024-5211,0,0,98a88a37609463fc748729234fb7fa88ed6b19a9a862440dab2a89ae616c7fd0,2024-06-13T18:36:09.010000
|
||||
CVE-2024-5213,0,1,d0914ed8289e640566cb58700956c5d2665253a06d0896526d4a9160af504e00,2024-07-17T14:36:39.397000
|
||||
CVE-2024-5213,0,0,d0914ed8289e640566cb58700956c5d2665253a06d0896526d4a9160af504e00,2024-07-17T14:36:39.397000
|
||||
CVE-2024-5214,0,0,63d7572dfe3fc62d2b94f5bd6d323fcf441de42b521ffae91ecf8348de5e238f,2024-06-03T19:15:09.360000
|
||||
CVE-2024-5215,0,0,000fc07f4cc70899827567e140fa6ed8e48b521d55f3767b5621ab75b67abf1a,2024-06-26T12:44:29.693000
|
||||
CVE-2024-5216,0,0,fd1f829df1b42ba5feaed9e36309904905f430fd7293476e8efb99a6adc245e7,2024-06-25T12:24:17.873000
|
||||
@ -256707,7 +256720,7 @@ CVE-2024-5598,0,0,dea97cf43130ffc7ec8c1e0439cc4a1d595d430c970e2a6bb452f71273924c
|
||||
CVE-2024-5599,0,0,e2a52dc8fb81a6d016503d8fbd621cff191add725c15ae779eff77632921d437,2024-06-11T18:24:39.057000
|
||||
CVE-2024-5600,0,0,cbb44154b53a9ff19bb9b8607051bff7897a220aae51af46369a9f79546fe419,2024-07-09T18:19:14.047000
|
||||
CVE-2024-5601,0,0,e22064ef868b7763ab6a035a66dc94fbf47f776f059b7b471d5873c49e582f7a,2024-06-28T13:25:40.677000
|
||||
CVE-2024-5605,0,1,e4ab13f44aee681834db0b09d11c486a794d1d811bed7db97810cd3bad2b3e86,2024-07-17T14:02:16.537000
|
||||
CVE-2024-5605,0,0,e4ab13f44aee681834db0b09d11c486a794d1d811bed7db97810cd3bad2b3e86,2024-07-17T14:02:16.537000
|
||||
CVE-2024-5606,0,0,954b2855130670426569975aef75e63a345bb5d86a76ecc86734db71e762262f,2024-07-08T14:19:15.450000
|
||||
CVE-2024-5607,0,0,ae3ce9023a2ae1c6b37a7951db185bd6eb638714bf41f7bd2c0952a16523527d,2024-06-07T14:56:05.647000
|
||||
CVE-2024-5609,0,0,4c03a855f07c8ea18d8e7a70e1e2d3467f32254daea5abf62f130fb919fa93d1,2024-06-06T19:16:09.920000
|
||||
@ -256766,7 +256779,7 @@ CVE-2024-5681,0,0,ba69ac569d7576d195fd1b6967a53d4cc4e5811e9ef97dab1bfc2916a40205
|
||||
CVE-2024-5683,0,0,d868b38bbdf38c932e73ada9d6770c9e54d9ba7e4690e6e76a9813e02684500a,2024-06-24T12:57:36.513000
|
||||
CVE-2024-5684,0,0,6dc10e55a9350eba996ce70432d644a2a60e5231b687551b107b8ab41fb44f1c,2024-06-11T18:13:30.163000
|
||||
CVE-2024-5685,0,0,08c398f5d772f4e953acbb7297cc0e7eb76495399d04b916942753d822d0eb8a,2024-06-19T09:15:12.173000
|
||||
CVE-2024-5686,0,1,cbff644a511c56c86a9bc5a9eadb1558b8ef31726954231e162a4de347930b71,2024-07-17T14:00:51.097000
|
||||
CVE-2024-5686,0,0,cbff644a511c56c86a9bc5a9eadb1558b8ef31726954231e162a4de347930b71,2024-07-17T14:00:51.097000
|
||||
CVE-2024-5687,0,0,20e940b5eb34eeb2ca33bc2ed1420b0aebfdd0f1b1da393415c2caf461a27a49,2024-07-03T02:09:09.507000
|
||||
CVE-2024-5688,0,0,378fe065c1c96c80f8fcd92ad9e23dd5031fac1fb881139af57f2ca0f8af6f7d,2024-07-03T02:09:10.300000
|
||||
CVE-2024-5689,0,0,4a110f75db5aeecb8ba897daed59c54700fc78a15415c63a015a6e971aa1956d,2024-06-11T13:54:12.057000
|
||||
@ -257342,7 +257355,7 @@ CVE-2024-6679,0,0,193698b3a519c2de1af0fd23f7e404e2d54c730e4704d97d0092b63ef1c812
|
||||
CVE-2024-6680,0,0,131299d0989a76f846afb0c8ae15f4692f1a0fdd9931fad30c165660cd1232fc,2024-07-11T18:09:58.777000
|
||||
CVE-2024-6681,0,0,fd87484dafd740c0f788720b14149eb40f6b6d8ce371416d0e039ce9acf82071,2024-07-11T18:09:58.777000
|
||||
CVE-2024-6689,0,0,d40d4a6e022419e83ed34bb3a74eb0d24556e6d76f7b0a592f90775a9d52873c,2024-07-16T13:43:58.773000
|
||||
CVE-2024-6716,0,1,8ffb92442f0506288b44c8e147b3f474301f4b7d486d9477f8f7548823d67c07,2024-07-17T14:15:04.210000
|
||||
CVE-2024-6716,0,0,8ffb92442f0506288b44c8e147b3f474301f4b7d486d9477f8f7548823d67c07,2024-07-17T14:15:04.210000
|
||||
CVE-2024-6721,0,0,20bc3ac9fd25b0ef666ff8f606cfc8f742981337efa5a16bd2cfa701fac87a51,2024-07-15T16:15:03.467000
|
||||
CVE-2024-6728,0,0,9abe0a9570ded71226f4ac9c9c5189516c258bbe0afa1c3fa1605041ef7aae25,2024-07-15T13:00:34.853000
|
||||
CVE-2024-6729,0,0,1a9a5aa4be1b6eedd35b675a6eb0b49764f594d7ab81dc654f200200596f44a5,2024-07-15T13:00:34.853000
|
||||
@ -257363,7 +257376,7 @@ CVE-2024-6743,0,0,d20423ae34ef7edd843a6cb67ab6563bdeae21fb73206254415d2c0219c744
|
||||
CVE-2024-6744,0,0,db4e7b937d3d03ea3e3b2b15edbfe780a0b875b3fdcc47905faa685f3164112e,2024-07-16T18:06:51.390000
|
||||
CVE-2024-6745,0,0,707134dd0252b920cb08895baec52c5557bd805c744814b8ecb19c1d5a8e997c,2024-07-15T13:00:34.853000
|
||||
CVE-2024-6746,0,0,5be3956d6b4bf01a386e4ceaf78307e768b453c5db30b63143d293a79513dc46,2024-07-15T13:00:34.853000
|
||||
CVE-2024-6765,1,1,582116fb1612a7c43e0b570dc3dd773f185a6bed827d147d00793764d2f2774e,2024-07-17T14:15:04.327000
|
||||
CVE-2024-6765,0,0,582116fb1612a7c43e0b570dc3dd773f185a6bed827d147d00793764d2f2774e,2024-07-17T14:15:04.327000
|
||||
CVE-2024-6772,0,0,7a4dce423c8b75d7fc80a06f5d75b304a1c3cb61b88f44b30dd94156af9ab8e1,2024-07-17T13:34:20.520000
|
||||
CVE-2024-6773,0,0,654a62798e16ce714df475111f6e31ff6e77aaddc1afe3d8197169aa0cc75c10,2024-07-17T13:34:20.520000
|
||||
CVE-2024-6774,0,0,0f3cc582272659253674ecee7c57df9b3dd3beface4cf327560cfa540ecb6546,2024-07-17T13:34:20.520000
|
||||
@ -257378,5 +257391,6 @@ CVE-2024-6802,0,0,386226bce7b12b7500a7728e6323db5d69291b7883c492fa520631c141d51c
|
||||
CVE-2024-6803,0,0,698fb954222e7db5d1598623eedb3617e795f993f29a35b3e0ac7c1569604491,2024-07-17T13:34:20.520000
|
||||
CVE-2024-6807,0,0,60acf58925408625a444a0bb6ffc77398b3b984199e5b0e4e7ba5e371b31f55b,2024-07-17T13:34:20.520000
|
||||
CVE-2024-6808,0,0,3a00e9424f53f949f24f8fa3178541f767416b62c1774aa92b0bd33913b590b8,2024-07-17T13:34:20.520000
|
||||
CVE-2024-6833,1,1,3413cde71be04af9401438f2e88082472da182157d5228c0b22197695cc5f3e4,2024-07-17T15:15:14.783000
|
||||
CVE-2024-6834,1,1,99f8ea29fa03e31a6af2ce064aa9fd7b4382ba6feca62446a99f21c128c9ffca,2024-07-17T15:15:14.970000
|
||||
CVE-2024-6830,1,1,60f28c1fb50141725412922ce0efd210649f557c584d5f897664d0d4bae9b210,2024-07-17T16:15:05.540000
|
||||
CVE-2024-6833,0,0,3413cde71be04af9401438f2e88082472da182157d5228c0b22197695cc5f3e4,2024-07-17T15:15:14.783000
|
||||
CVE-2024-6834,0,0,99f8ea29fa03e31a6af2ce064aa9fd7b4382ba6feca62446a99f21c128c9ffca,2024-07-17T15:15:14.970000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user