mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-07 19:16:29 +00:00
Auto-Update: 2024-09-18T18:00:18.842448+00:00
This commit is contained in:
parent
b84c21a834
commit
9044c68e19
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-3156",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2021-01-26T21:15:12.987",
|
||||
"lastModified": "2024-07-09T18:27:53.967",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-18T17:15:13.843",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"cisaExploitAdd": "2022-04-06",
|
||||
"cisaActionDue": "2022-04-27",
|
||||
@ -757,6 +757,10 @@
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.vicarius.io/vsociety/posts/sudoedit-pwned-cve-2021-3156",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-4439",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-06-20T12:15:10.447",
|
||||
"lastModified": "2024-06-20T12:43:25.663",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-18T16:34:18.960",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,39 +15,183 @@
|
||||
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: isdn: cpai: verifique ctr->cnr para evitar que el \u00edndice de matriz est\u00e9 fuera de l\u00edmite. cmtp_add_connection() agregar\u00eda una sesi\u00f3n cmtp a un controlador y ejecutar\u00eda un subproceso del kernel para procesar cmtp. __module_get(ESTE_M\u00d3DULO); sesi\u00f3n->tarea = kthread_run(cmtp_session, sesi\u00f3n, \"kcmtpd_ctr_%d\", sesi\u00f3n->num); Durante este proceso, el hilo del n\u00facleo llamar\u00eda a detach_capi_ctr() para desconectar un controlador de registro. Si el controlador a\u00fan no estaba conectado, detach_capi_ctr() desencadenar\u00eda un error de los l\u00edmites de \u00edndice de matriz. [ 46.866069][ T6479] UBSAN: \u00edndice de matriz fuera de los l\u00edmites en drivers/isdn/capi/kcapi.c:483:21 [ 46.867196][ T6479] el \u00edndice -1 est\u00e1 fuera de rango para el tipo 'capi_ctr *[ 32]' [ 46.867982][ T6479] CPU: 1 PID: 6479 Comm: kcmtpd_ctr_0 No contaminado 5.15.0-rc2+ #8 [ 46.869002][ T6479] Nombre de hardware: PC est\u00e1ndar QEMU (i440FX + PIIX, 1996), BIOS 1.14. 0-2 01/04/2014 [ 46.870107][ T6479] Seguimiento de llamadas: [ 46.870473][ T6479] dump_stack_lvl+0x57/0x7d [ 46.870974][ T6479] ubsan_epilogue+0x5/0x40 [ 46.871458][ T6479 ] __ubsan_handle_out_of_bounds.cold+0x43 /0x48 [ 46.872135][ T6479] detach_capi_ctr+0x64/0xc0 [ 46.872639][ T6479] cmtp_session+0x5c8/0x5d0 [ 46.873131][ T6479] ? __init_waitqueue_head+0x60/0x60 [ 46.873712][ T6479] ? cmtp_add_msgpart+0x120/0x120 [ 46.874256][ T6479] kthread+0x147/0x170 [ 46.874709][ T6479] ? set_kthread_struct+0x40/0x40 [ 46.875248][ T6479] ret_from_fork+0x1f/0x30 [ 46.875773][ T6479]"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-129"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "4.4.290",
|
||||
"matchCriteriaId": "C56A8089-600C-4D13-B0BD-0B3B87CAAAEC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.5",
|
||||
"versionEndExcluding": "4.9.288",
|
||||
"matchCriteriaId": "F99C0BFE-2803-4525-BA2B-EA4F42F8CADE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.10",
|
||||
"versionEndExcluding": "4.14.253",
|
||||
"matchCriteriaId": "1830428A-CB40-4E7F-A4F9-177A0B9614D2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.15",
|
||||
"versionEndExcluding": "4.19.214",
|
||||
"matchCriteriaId": "8491C8F9-93D0-4314-BD59-65E3038494EA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.20",
|
||||
"versionEndExcluding": "5.4.156",
|
||||
"matchCriteriaId": "03015A9C-56AA-4210-9491-CF2FB0F45B9A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.5",
|
||||
"versionEndExcluding": "5.10.76",
|
||||
"matchCriteriaId": "E61528CE-9083-425B-AE36-3791232BF780"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11",
|
||||
"versionEndExcluding": "5.14.15",
|
||||
"matchCriteriaId": "63BD46C4-473F-45F9-93E9-F67D955321D8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:5.15:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E46C74C6-B76B-4C94-A6A4-FD2FFF62D644"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:5.15:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "60134C3A-06E4-48C1-B04F-2903732A4E56"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:5.15:rc3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0460DA88-8FE1-46A2-9DDA-1F1ABA552E71"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:5.15:rc4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AF55383D-4DF2-45DC-93F7-571F4F978EAB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:5.15:rc5:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9E9481B2-8AA6-4CBD-B5D3-C10F51FF6D01"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/1f3e2e97c003f80c4b087092b225c8787ff91e4d",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/24219a977bfe3d658687e45615c70998acdbac5a",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/285e9210b1fab96a11c0be3ed5cea9dd48b6ac54",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/7d91adc0ccb060ce564103315189466eb822cc6a",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/7f221ccbee4ec662e2292d490a43ce6c314c4594",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/9b6b2db77bc3121fe435f1d4b56e34de443bec75",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/cc20226e218a2375d50dd9ac14fb4121b43375ff",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/e8b8de17e164c9f1b7777f1c6f99d05539000036",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-47617",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-06-20T11:15:54.317",
|
||||
"lastModified": "2024-06-20T12:43:25.663",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-18T17:46:30.413",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,31 +15,131 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: PCI: pciehp: soluciona el bucle infinito en el controlador IRQ ante un fallo de alimentaci\u00f3n. El bit de fallo de alimentaci\u00f3n detectado en el registro de estado de la ranura se diferencia de todos los dem\u00e1s eventos de conexi\u00f3n en caliente en que es fijo: solo puede borrarse despu\u00e9s de apagar la alimentaci\u00f3n de la ranura. Por PCIe r5.0, seg. 6.7.1.8: Si un controlador de energ\u00eda detecta una falla de energ\u00eda principal en la ranura de conexi\u00f3n en caliente, debe configurar autom\u00e1ticamente su pestillo interno de falla de energ\u00eda principal [...]. El bloqueo de fallo de alimentaci\u00f3n principal se borra cuando el software corta la alimentaci\u00f3n a la ranura de conexi\u00f3n en caliente. La rigidez sol\u00eda causar tormentas de interrupci\u00f3n y bucles infinitos que se solucionaron en 2009 mediante los commits 5651c48cfafe (\"PCI pciehp: solucionar el problema de la tormenta de interrupci\u00f3n por falla de energ\u00eda\") y 99f0169c17f3 (\"PCI: pciehp: habilitar la notificaci\u00f3n de software en ranuras vac\u00edas\"). Desafortunadamente, en 2020, el problema del bucle infinito se reintrodujo inadvertidamente mediante el commit 8edf5332c393 (\"PCI: pciehp: arreglar carrera de interrupci\u00f3n MSI\"): el controlador hardirq pciehp_isr() borra el bit PFD hasta que se establece el indicador power_fault_detected de pciehp. Eso sucede en el hilo IRQ pciehp_ist(), que nunca se entera del evento porque el controlador hardirq est\u00e1 atrapado en un bucle infinito. Para solucionarlo, configure el indicador power_fault_detected que ya est\u00e1 en el controlador hardirq."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-835"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.19.149",
|
||||
"versionEndExcluding": "4.19.233",
|
||||
"matchCriteriaId": "4C4F4C94-0B11-4523-8E15-6809491F03E7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.4.69",
|
||||
"versionEndExcluding": "5.4.177",
|
||||
"matchCriteriaId": "CC6656B0-C3FE-4435-AE38-F8C01F20D481"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.7",
|
||||
"versionEndExcluding": "5.10.97",
|
||||
"matchCriteriaId": "AE8E786E-EFD7-410D-96DA-B24D81B51B12"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11",
|
||||
"versionEndExcluding": "5.15.20",
|
||||
"matchCriteriaId": "C68FC5B4-CC13-45E9-8050-EF9025F7A9B7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "5.16.6",
|
||||
"matchCriteriaId": "6739D89E-32C3-479D-B5F6-6865C5061FA5"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/1db58c6584a72102e98af2e600ea184ddaf2b8af",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/23584c1ed3e15a6f4bfab8dc5a88d94ab929ee12",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/3b4c966fb156ff3e70b2526d964952ff7c1574d9",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/464da38ba827f670deac6500a1de9a4f0f44c41d",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/6d6f1f0dac3e3441ecdb1103d4efb11b9ed24dd5",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/ff27f7d0333cff89ec85c419f431aca1b38fb16a",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-47619",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-06-20T11:15:54.560",
|
||||
"lastModified": "2024-06-20T12:43:25.663",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-18T17:08:45.593",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,31 +15,136 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: i40e: Arreglar la reserva de colas para XDP Cuando se configur\u00f3 XDP en un sistema con una gran cantidad de CPU y NIC X722, hubo un seguimiento de llamada con desreferencia de puntero NULL. i40e 0000:87:00.0: no se pudo obtener el seguimiento de 256 colas para VSI 0 err -12 i40e 0000:87:00.0: fall\u00f3 la configuraci\u00f3n de VSI PRINCIPAL ERROR: desreferencia del puntero NULL del kernel, direcci\u00f3n: 00000000000000000 RIP: 0010:i40e_xdp+0xea/ 0x1b0 [i40e] Seguimiento de llamadas:? i40e_reconfig_rss_queues+0x130/0x130 [i40e] dev_xdp_install+0x61/0xe0 dev_xdp_attach+0x18a/0x4c0 dev_change_xdp_fd+0x1e6/0x220 do_setlink+0x616/0x1030 ? ahci_port_stop+0x80/0x80? ata_qc_issue+0x107/0x1e0? lock_timer_base+0x61/0x80? __mod_timer+0x202/0x380 rtnl_setlink+0xe5/0x170 ? bpf_lsm_binder_transaction+0x10/0x10? capacidad_seguridad+0x36/0x50 rtnetlink_rcv_msg+0x121/0x350 ? rtnl_calcit.isra.0+0x100/0x100 netlink_rcv_skb+0x50/0xf0 netlink_unicast+0x1d3/0x2a0 netlink_sendmsg+0x22a/0x440 sock_sendmsg+0x5e/0x60 __sys_sendto+0xf0/0x160 ? __sys_getsockname+0x7e/0xc0 ? _copia_de_usuario+0x3c/0x80 ? __sys_setsockopt+0xc8/0x1a0 __x64_sys_sendto+0x20/0x30 do_syscall_64+0x33/0x40 Entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7f83fa7a39e0 Esto fue causado por la fragmentaci\u00f3n de la pila de cola PF debido al flujo La cola VSI del director se coloca justo despu\u00e9s de la VSI principal. Debido a esto, la VSI principal no pudo cambiar el tama\u00f1o de su asignaci\u00f3n de cola para XDP, lo que provoc\u00f3 que no se asignaran colas para la VSI principal cuando se activ\u00f3 XDP. Solucione este problema asignando siempre la \u00faltima cola en la pila de colas PF para una VSI de director de flujo."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.12",
|
||||
"versionEndExcluding": "4.19.228",
|
||||
"matchCriteriaId": "0177A6E3-0FFC-45AB-AD5C-41704A375FDA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.20",
|
||||
"versionEndExcluding": "5.4.176",
|
||||
"matchCriteriaId": "581D4C61-D3FC-4DB2-85E3-EE596EEBA89E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.5",
|
||||
"versionEndExcluding": "5.10.96",
|
||||
"matchCriteriaId": "27A6621A-A196-4220-957F-334B9124E477"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11",
|
||||
"versionEndExcluding": "5.15.19",
|
||||
"matchCriteriaId": "DF69DD7C-FD57-4914-ABB0-FAEF87B0289D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "5.16.5",
|
||||
"matchCriteriaId": "1AD9E77E-B27E-450C-8FD8-B64EC5FB002D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:5.17:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7BD5F8D9-54FA-4CB0-B4F0-CB0471FDDB2D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/00eddb0e4ea115154581d1049507a996acfc2d3e",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/4b3aa858268b7b9aeef02e5f9c4cd8f8fac101c8",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/768eb705e6381f0c70ca29d4e66f19790d5d19a1",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/92947844b8beee988c0ce17082b705c2f75f0742",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/be6998f232b8e4ca8225029e305b8329d89bfd59",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/d46fa4ea9756ef6cbcf9752d0832cc66e2d7121b",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-47620",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-06-20T11:15:54.653",
|
||||
"lastModified": "2024-06-20T12:43:25.663",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-18T17:07:27.603",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,43 +15,172 @@
|
||||
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: Bluetooth: refactorizaci\u00f3n de verificaci\u00f3n de datos publicitarios maliciosos. Se estaba realizando una verificaci\u00f3n de lectura fuera de los l\u00edmites al final del bucle while num_reports y llenar\u00eda el diario con falsos positivos. Se agreg\u00f3 una verificaci\u00f3n al comienzo del procesamiento del bucle para que no se verifique despu\u00e9s de que se haya avanzado ptr."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "4.4.302",
|
||||
"matchCriteriaId": "09609993-CA3F-47E6-ABB6-BF512D8AFF65"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.5",
|
||||
"versionEndExcluding": "4.9.300",
|
||||
"matchCriteriaId": "A3BD638C-9597-4C2B-8024-32F57E1B53E3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.10",
|
||||
"versionEndExcluding": "4.14.265",
|
||||
"matchCriteriaId": "4F849B5B-93E9-438A-AE05-0380EC168436"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.15",
|
||||
"versionEndExcluding": "4.19.228",
|
||||
"matchCriteriaId": "87288F16-8DE4-4680-95D9-8601B47620D7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.20",
|
||||
"versionEndExcluding": "5.4.176",
|
||||
"matchCriteriaId": "581D4C61-D3FC-4DB2-85E3-EE596EEBA89E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.5",
|
||||
"versionEndExcluding": "5.10.96",
|
||||
"matchCriteriaId": "27A6621A-A196-4220-957F-334B9124E477"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11",
|
||||
"versionEndExcluding": "5.15.19",
|
||||
"matchCriteriaId": "DF69DD7C-FD57-4914-ABB0-FAEF87B0289D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "5.16.5",
|
||||
"matchCriteriaId": "1AD9E77E-B27E-450C-8FD8-B64EC5FB002D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/305e92f525450f3e1b5f5c9dc7eadb152d66a082",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/5a539c08d743d9910631448da78af5e961664c0e",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/5c968affa804ba98c3c603f37ffea6fba618025e",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/7889b38a7f21ed19314f83194622b195d328465c",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/835d3706852537bf92eb23eb8635b8dee0c0aa67",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/83d5196b65d1b29e27d7dd16a3b9b439fb1d2dba",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/8819f93cd4a443dfe547aa622b21f723757df3fb",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/899663be5e75dc0174dc8bda0b5e6826edf0b29a",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/bcea886771c3f22a590c8c8b9139a107bd7f1e1c",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2022/CVE-2022-257xx/CVE-2022-25777.json
Normal file
56
CVE-2022/CVE-2022-257xx/CVE-2022-25777.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2022-25777",
|
||||
"sourceIdentifier": "security@mautic.org",
|
||||
"published": "2024-09-18T16:15:04.980",
|
||||
"lastModified": "2024-09-18T16:15:04.980",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Prior to the patched version, an authenticated user of Mautic could read system files and access the internal addresses of the application due to a Server-Side Request Forgery (SSRF) vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@mautic.org",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@mautic.org",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-918"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/mautic/mautic/security/advisories/GHSA-mgv8-w49f-822w",
|
||||
"source": "security@mautic.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-48718",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-06-20T11:15:55.373",
|
||||
"lastModified": "2024-06-20T12:43:25.663",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-18T16:59:04.887",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,19 +15,99 @@
|
||||
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: drm: mxsfb: corrige la desreferencia del puntero NULL. mxsfb nunca deber\u00eda desreferenciar el puntero NULL que drm_atomic_get_new_bridge_state puede devolver. En su lugar, asuma un formato fijo."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.15",
|
||||
"versionEndExcluding": "5.15.27",
|
||||
"matchCriteriaId": "90FEE683-4391-493D-BA9C-23143EEBF6C6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "5.16.8",
|
||||
"matchCriteriaId": "0623892A-E3E4-44E6-8A5E-39A0B47AF782"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:5.17:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7BD5F8D9-54FA-4CB0-B4F0-CB0471FDDB2D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:5.17:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E6E34B23-78B4-4516-9BD8-61B33F4AC49A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/622c9a3a7868e1eeca39c55305ca3ebec4742b64",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/6f9267e01cca749137349d8ffb0d0ebbadf567f4",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/86a337bb803040e4401b87c974a7fb92efe3d0e1",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-48719",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-06-20T11:15:55.470",
|
||||
"lastModified": "2024-06-20T12:43:25.663",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-18T16:58:08.113",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,15 +15,85 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net, neigh: no activar sondas inmediatas en NUD_FAILED desde neigh_managed_work syzkaller pudo activar un punto muerto para las entradas NTF_MANAGED [0]: kworker/0:16/14617 est\u00e1 intentando adquirir bloqueo: ffffffff8d4dd370 (&tbl->lock){++-.}-{2:2}, en: ___neigh_create+0x9e1/0x2990 net/core/neighbour.c:652 [...] pero la tarea ya mantiene el bloqueo: ffffffff8d4dd370 (&tbl->lock){++-.}-{2:2}, en: neigh_managed_work+0x35/0x250 net/core/neighbour.c:1572 La entrada del vecino pas\u00f3 al estado NUD_FAILED, donde __neigh_event_send() desencaden\u00f3 una Sondeo inmediato seg\u00fan el commit cd28ca0a3dd1 (\"relincho: reducir la latencia de arp\") a trav\u00e9s de neigh_probe() dado que se mantuvo el bloqueo de la tabla. Una opci\u00f3n para solucionar esta situaci\u00f3n es posponer neigh_probe() nuevamente a neigh_timer_handler() de manera similar a como se hac\u00eda antes de cd28ca0a3dd1. Para el caso de NTF_MANAGED, este aplazamiento es aceptable dado que esto solo ocurre en el estado de falla real y el estado normal/esperado es NUD_VALID con la entrada ya presente. La soluci\u00f3n agrega un par\u00e1metro a __neigh_event_send() para comunicar si se permite o no la sonda inmediata. Los sitios de llamadas existentes de neigh_event_send() est\u00e1n predeterminados tal cual para la investigaci\u00f3n inmediata. Sin embargo, neigh_managed_work() lo desactiva mediante el uso de neigh_event_send_probe(). [0] __dump_stack lib/dump_stack.c:88 [en l\u00ednea] dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106 print_deadlock_bug kernel/locking/lockdep.c:2956 [en l\u00ednea] check_deadlock kernel/locking/lockdep.c :2999 [en l\u00ednea] validar_chain kernel/locking/lockdep.c:3788 [en l\u00ednea] __lock_acquire.cold+0x149/0x3ab kernel/locking/lockdep.c:5027 lock_acquire kernel/locking/lockdep.c:5639 [en l\u00ednea] lock_acquire+0x1ab /0x510 kernel/locking/lockdep.c:5604 __raw_write_lock_bh include/linux/rwlock_api_smp.h:202 [en l\u00ednea] _raw_write_lock_bh+0x2f/0x40 kernel/locking/spinlock.c:334 ___neigh_create+0x9e1/0x2990 net/core/neighbour.c :652 ip6_finish_output2+0x1070/0x14f0 net/ipv6/ip6_output.c:123 __ip6_finish_output net/ipv6/ip6_output.c:191 [en l\u00ednea] __ip6_finish_output+0x61e/0xe90 net/ipv6/ip6_output.c:170 poner+0x32/0x200 neto/ ipv6/ip6_output.c:201 NF_HOOK_COND include/linux/netfilter.h:296 [en l\u00ednea] ip6_output+0x1e4/0x530 net/ipv6/ip6_output.c:224 dst_output include/net/dst.h:451 [en l\u00ednea] NF_HOOK include/ linux/netfilter.h:307 [en l\u00ednea] ndisc_send_skb+0xa99/0x17f0 net/ipv6/ndisc.c:508 ndisc_send_ns+0x3a9/0x840 net/ipv6/ndisc.c:650 ndisc_solicit+0x2cd/0x4f0 net/ipv6/ndisc.c :742 neigh_probe+0xc2/0x110 net/core/neighbour.c:1040 __neigh_event_send+0x37d/0x1570 net/core/neighbour.c:1201 neigh_event_send include/net/neighbour.h:470 [en l\u00ednea] neigh_managed_work+0x162/0x250 net/ core/neighbour.c:1574 Process_one_work+0x9ac/0x1650 kernel/workqueue.c:2307 trabajador_thread+0x657/0x1110 kernel/workqueue.c:2454 kthread+0x2e9/0x3a0 kernel/kthread.c:377 ret_from_fork+0x1f/0x30 arch/ x86/entry/entry_64.S:295 "
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-667"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "5.16.8",
|
||||
"matchCriteriaId": "0623892A-E3E4-44E6-8A5E-39A0B47AF782"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:5.17:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7BD5F8D9-54FA-4CB0-B4F0-CB0471FDDB2D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:5.17:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E6E34B23-78B4-4516-9BD8-61B33F4AC49A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/203a35ebb49cdce377416b0690215d3ce090d364",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/4a81f6da9cb2d1ef911131a6fd8bd15cb61fc772",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-48723",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-06-20T11:15:55.820",
|
||||
"lastModified": "2024-06-20T12:43:25.663",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-18T17:46:50.220",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,23 +15,113 @@
|
||||
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: spi: uniphier: corrige la fuga del recuento de referencias en uniphier_spi_probe() El problema ocurre en varias rutas de error en uniphier_spi_probe(). Cuando dma_get_slave_caps() o devm_spi_register_master() devuelven un c\u00f3digo de error, la funci\u00f3n se olvida de disminuir el recuento de los objetos `dma_rx` y `dma_tx`, lo que puede provocar fugas de recuento. Corr\u00edjalo disminuyendo el recuento de referencias de objetos espec\u00edficos en esas rutas de error."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.6",
|
||||
"versionEndExcluding": "5.10.99",
|
||||
"matchCriteriaId": "B69CC532-C65F-4966-A226-22878B182DF5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11",
|
||||
"versionEndExcluding": "5.15.22",
|
||||
"matchCriteriaId": "74528AA6-B524-4C3F-B188-1194235FE47D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "5.16.8",
|
||||
"matchCriteriaId": "0623892A-E3E4-44E6-8A5E-39A0B47AF782"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:5.17:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7BD5F8D9-54FA-4CB0-B4F0-CB0471FDDB2D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:5.17:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E6E34B23-78B4-4516-9BD8-61B33F4AC49A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/37c2c83ca4f1ef4b6908181ac98e18360af89b42",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/447c3d4046d7b54052d07d8b27e15e6edea5662c",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/dd00b4f8f768d81c3788a8ac88fdb3d745e55ea3",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/e895e067d73e154b1ebc84a124e00831e311d9b0",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-48724",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-06-20T12:15:10.900",
|
||||
"lastModified": "2024-06-20T12:43:25.663",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-18T16:19:25.430",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,35 +15,162 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: iommu/vt-d: soluciona una posible p\u00e9rdida de memoria en intel_setup_irq_remapping() despu\u00e9s del commit e3beca48a45b (\"irqdomain/treewide: mantiene el nodo de firmware asignado incondicionalmente\"). Para el escenario de desmontaje, fn solo se libera despu\u00e9s de que no se puede asignar ir_domain, aunque tambi\u00e9n debe liberarse en caso de que dmar_enable_qi devuelva un error. Adem\u00e1s de free fn, irq_domain e ir_msi_domain tambi\u00e9n deben eliminarse si intel_setup_irq_remapping no logra habilitar la invalidaci\u00f3n en cola. Mejore la ruta de rebobinado agregando las etiquetas out_free_ir_domain y out_free_fwnode seg\u00fan la sugerencia de Baolu."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-401"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.14.190",
|
||||
"versionEndExcluding": "4.14.265",
|
||||
"matchCriteriaId": "BA40F961-E64D-4826-AEA2-A045C11BF07B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.19.135",
|
||||
"versionEndExcluding": "4.19.228",
|
||||
"matchCriteriaId": "22AF2090-4DCE-439F-BEA5-21158821FA0D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.4.54",
|
||||
"versionEndExcluding": "5.4.178",
|
||||
"matchCriteriaId": "0ECB3887-292E-4352-91FF-5A9DAF2DB2F0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.7.11",
|
||||
"versionEndExcluding": "5.8",
|
||||
"matchCriteriaId": "4BA1C188-F80B-4209-9D5D-6AA4BAFB916B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.8",
|
||||
"versionEndExcluding": "5.10.99",
|
||||
"matchCriteriaId": "539F713A-F940-4698-BC87-245228B4AB3D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11",
|
||||
"versionEndExcluding": "5.15.22",
|
||||
"matchCriteriaId": "74528AA6-B524-4C3F-B188-1194235FE47D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "5.16.8",
|
||||
"matchCriteriaId": "0623892A-E3E4-44E6-8A5E-39A0B47AF782"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:5.17:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7BD5F8D9-54FA-4CB0-B4F0-CB0471FDDB2D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:5.17:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E6E34B23-78B4-4516-9BD8-61B33F4AC49A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/336d096b62bdc673e852b6b80d5072d7888ce85d",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/5c43d46daa0d2928234dd2792ebebc35d29ee2d1",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/99e675d473eb8cf2deac1376a0f840222fc1adcf",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/9d9995b0371e4e8c18d4f955479e5d47efe7b2d4",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/a0c685ba99961b1dd894b2e470e692a539770f6d",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/a31cb1f0fb6caf46ffe88c41252b6b7a4ee062d9",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/b62eceb5f8f08815fe3f945fc55bbf997c344ecd",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-48725",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-06-20T12:15:10.997",
|
||||
"lastModified": "2024-06-20T12:43:25.663",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-18T16:10:22.077",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,19 +15,99 @@
|
||||
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: RDMA/siw: corrige la fuga de recuento en siw_create_qp() Atomic_inc() debe emparejarse con atomic_dec() en la ruta de error."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.15",
|
||||
"versionEndExcluding": "5.15.22",
|
||||
"matchCriteriaId": "45FC18C9-B41A-4F4B-B072-1DEBBF661BB7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "5.16.8",
|
||||
"matchCriteriaId": "0623892A-E3E4-44E6-8A5E-39A0B47AF782"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:5.17:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7BD5F8D9-54FA-4CB0-B4F0-CB0471FDDB2D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:5.17:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E6E34B23-78B4-4516-9BD8-61B33F4AC49A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/2989ba9532babac66e79997ccff73c015b69700c",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/a75badebfdc0b3823054bedf112edb54d6357c75",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/fa3b844a50845c817660146c27c0fc29b08d3116",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-48726",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-06-20T12:15:11.077",
|
||||
"lastModified": "2024-06-20T12:43:25.663",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-18T16:09:15.723",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,23 +15,113 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: RDMA/ucma: protege mc durante las salidas simult\u00e1neas de multidifusi\u00f3n. Revierta parcialmente la confirmaci\u00f3n mencionada en la l\u00ednea Correcciones para asegurarse de que la asignaci\u00f3n y el borrado de la estructura de multidifusi\u00f3n est\u00e9n bloqueados. ERROR: KASAN: use-after-free en ucma_cleanup_multicast drivers/infiniband/core/ucma.c:491 [en l\u00ednea] ERROR: KASAN: use-after-free en ucma_destroy_private_ctx+0x914/0xb70 drivers/infiniband/core/ucma.c: 579 Lectura de tama\u00f1o 8 en la direcci\u00f3n ffff88801bb74b00 mediante la tarea syz-executor.1/25529 CPU: 0 PID: 25529 Comm: syz-executor.1 No contaminado 5.16.0-rc7-syzkaller #0 Nombre de hardware: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Seguimiento de llamadas: __dump_stack lib/dump_stack.c:88 [en l\u00ednea] dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106 print_address_description.constprop.0.cold+0x8d/0x320 mm/kasan /report.c:247 __kasan_report mm/kasan/report.c:433 [en l\u00ednea] kasan_report.cold+0x83/0xdf mm/kasan/report.c:450 ucma_cleanup_multicast drivers/infiniband/core/ucma.c:491 [en l\u00ednea] ucma_destroy_private_ctx+0x914/0xb70 controladores/infiniband/core/ucma.c:579 ucma_destroy_id+0x1e6/0x280 controladores/infiniband/core/ucma.c:614 ucma_write+0x25c/0x350 controladores/infiniband/core/ucma.c:1732 vfs_write+ 0x28e/0xae0 fs/read_write.c:588 ksys_write+0x1ee/0x250 fs/read_write.c:643 do_syscall_x64 arch/x86/entry/common.c:50 [en l\u00ednea] do_syscall_64+0x35/0xb0 arch/x86/entry/common. c:80 Entry_SYSCALL_64_after_hwframe+0x44/0xae Actualmente, la b\u00fasqueda de xarray puede tocar un mc que se libera simult\u00e1neamente ya que xa_for_each() no est\u00e1 rodeado por ning\u00fan candado. En lugar de mantener el bloqueo durante un escaneo completo, mant\u00e9ngalo solo para los elementos afectados, que generalmente son una lista vac\u00eda."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.10",
|
||||
"versionEndExcluding": "5.10.99",
|
||||
"matchCriteriaId": "3E812CCF-4A89-422A-B105-BAD11567643C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11",
|
||||
"versionEndExcluding": "5.15.22",
|
||||
"matchCriteriaId": "74528AA6-B524-4C3F-B188-1194235FE47D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "5.16.8",
|
||||
"matchCriteriaId": "0623892A-E3E4-44E6-8A5E-39A0B47AF782"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:5.17:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7BD5F8D9-54FA-4CB0-B4F0-CB0471FDDB2D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:5.17:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E6E34B23-78B4-4516-9BD8-61B33F4AC49A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/2923948ffe0835f7114e948b35bcc42bc9b3baa1",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/36e8169ec973359f671f9ec7213547059cae972e",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/75c610212b9f1756b9384911d3a2c347eee8031c",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/ee2477e8ccd3d978eeac0dc5a981b286d9bb7b0a",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-48728",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-06-20T12:15:11.253",
|
||||
"lastModified": "2024-06-20T12:43:25.663",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-18T16:07:21.097",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,23 +15,113 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: IB/hfi1: corrige el p\u00e1nico de inicio temprano de AIP Una falla temprana en hfi1_ipoib_setup_rn() puede provocar el siguiente p\u00e1nico: ERROR: no se puede manejar la desreferencia del puntero NULL del kernel en 00000000000001b0 PGD 0 P4D 0 Vaya: 0002 [#1] Cola de trabajo SMP NOPTI: eventos work_for_cpu_fn RIP: 0010:try_to_grab_pending+0x2b/0x140 C\u00f3digo: 1f 44 00 00 41 55 41 54 55 48 89 d5 53 48 89 fb 9c 58 0f 1f 4 00 00 48 89 c2 fa 66 0f 1f 44 00 00 48 89 55 00 40 84 f6 75 77 48 0f ba 2b 00 72 09 31 c0 5b 5d 41 5c 41 5d c3 48 89 df e8 6c RSP 0018:ffffb6b3cf7 cfa48 EFLAGS: 00010046 RAX: 0000000000000246 RBX: 00000000000001b0 RCX: 0000000000000000 RDX: 0000000000000246 RSI: 00000000000000000 RDI: 00000000000001b0 RBP: ffffb6b3cf7cfa70 R08: 0000000000000f09 R09: 0000000000000001 R10: 0000000000000000 R11: 00000000000000001 R12: 0000000000000000 R13: b6b3cf7cfa90 R14: ffffffff9b2fbfc0 R15: ffff8a4fdf244690 FS: 0000000000000000(0000) GS :ffff8a527f400000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00000000000001b0 CR3: CR4: 00000000007706f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 00000000000000000 DR6: 00000000ffe0ff0 DR7: 000 0000000000400 PKRU: 55555554 Seguimiento de llamadas: __cancel_work_timer+0x42/0x190 ? dev_printk_emit+0x4e/0x70 iowait_cancel_work+0x15/0x30 [hfi1] hfi1_ipoib_txreq_deinit+0x5a/0x220 [hfi1] ? dev_err+0x6c/0x90 hfi1_ipoib_netdev_dtor+0x15/0x30 [hfi1] hfi1_ipoib_setup_rn+0x10e/0x150 [hfi1] rdma_init_netdev+0x5a/0x80 [ib_core] ? hfi1_ipoib_free_rdma_netdev+0x20/0x20 [hfi1] ipoib_intf_init+0x6c/0x350 [ib_ipoib] ipoib_intf_alloc+0x5c/0xc0 [ib_ipoib] ipoib_add_one+0xbe/0x300 [ib_ipoib] 0x1a0 [ib_core] enable_device_and_get+0xdc/0x1d0 [ib_core] ib_register_device+ 0x572/0x6b0 [ib_core] rvt_register_device+0x11b/0x220 [rdmavt] hfi1_register_ib_device+0x6b4/0x770 [hfi1] do_init_one.isra.20+0x3e3/0x680 [hfi1] local_pci_probe+0x41/0x90 cpu_fn+0x16/0x20 proceso_one_work+0x1a7/0x360 ? create_worker+0x1a0/0x1a0 trabajador_thread+0x1cf/0x390? create_worker+0x1a0/0x1a0 kthread+0x116/0x130? kthread_flush_work_fn+0x10/0x10 ret_from_fork+0x1f/0x40 El p\u00e1nico ocurre en hfi1_ipoib_txreq_deinit() porque hay una deref NULL cuando se llama a hfi1_ipoib_netdev_dtor() en este caso de error. hfi1_ipoib_txreq_init() y hfi1_ipoib_rxq_init() se desenrollan autom\u00e1ticamente, as\u00ed que corrija ajustando las rutas de error en consecuencia. Otros cambios: - hfi1_ipoib_free_rdma_netdev() se elimina incluyendo free_netdev() ya que el c\u00f3digo central de netdev elimina las llamadas free_netdev() - El cambio a las entradas aceleradas se mueve a la ruta de \u00e9xito."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.8",
|
||||
"versionEndExcluding": "5.10.99",
|
||||
"matchCriteriaId": "539F713A-F940-4698-BC87-245228B4AB3D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11",
|
||||
"versionEndExcluding": "5.15.22",
|
||||
"matchCriteriaId": "74528AA6-B524-4C3F-B188-1194235FE47D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "5.16.8",
|
||||
"matchCriteriaId": "0623892A-E3E4-44E6-8A5E-39A0B47AF782"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:5.17:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7BD5F8D9-54FA-4CB0-B4F0-CB0471FDDB2D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:5.17:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E6E34B23-78B4-4516-9BD8-61B33F4AC49A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/1899c3cad265c4583658aed5293d02e8af84276b",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/4a9bd1e6780fc59f81466ec3489d5ad535a37190",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/5f8f55b92edd621f056bdf09e572092849fabd83",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/a3dd4d2682f2a796121609e5f3bbeb1243198c53",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-48729",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-06-20T12:15:11.343",
|
||||
"lastModified": "2024-06-20T12:43:25.663",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-18T16:06:21.790",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,15 +15,85 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: IB/hfi1: Corrija el p\u00e1nico con ipoib send_queue_size m\u00e1s grande Cuando ipoib send_queue_size aumenta respecto del valor predeterminado, ocurre el siguiente p\u00e1nico: RIP: 0010:hfi1_ipoib_drain_tx_ring+0x45/0xf0 [hfi1] C\u00f3digo: 31 e4 eb 0f 8b 85 c8 02 00 00 41 83 c4 01 44 39 e0 76 60 8b 8d cc 02 00 00 44 89 e3 be 01 00 00 00 d3 e3 48 03 9d c0 02 00 00 83 8 01 00 00 00 00 00 00 48 8b bb 30 01 00 00 e8 25 af a7 e0 RSP: 0018:ffffc9000798f4a0 EFLAGS: 00010286 RAX: 00000000000008000 RBX: ffffc9000aa0f000 RCX: 000000000000000f RDX: 00000000000000000 RSI: 0000000000000001 RDI: 0000000000000000 RBP: ffff88810ff08000 R08: ffff88889476d900 R09: 0000000000000101 R10: 0000000000000000 R11: ffffc90006590ff8 R12: 0000000000000200 R13: ffffc9000798fba8 R14: 0000000000000000 R15: 00000000000001 FS: 00007fd0f79cc3c0(0000) GS:ffff88885fb00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR 2: ffffc9000aa0f118 CR3 : 0000000889c84001 CR4: 00000000001706e0 Seguimiento de llamadas: hfi1_ipoib_napi_tx_disable+0x45/0x60 [hfi1] hfi1_ipoib_dev_stop+0x18/0x80 [hfi1] [ib_ipoib] ipoib_stop+0x48/0xc0 [ib_ipoib] __dev_close_many+0x9e/0x110 __dev_change_flags+ 0xd9/0x210 dev_change_flags+0x21/0x60 do_setlink+0x31c/0x10f0? __nla_validate_parse+0x12d/0x1a0 ? __nla_parse+0x21/0x30? inet6_validate_link_af+0x5e/0xf0? cpumask_next+0x1f/0x20 ? __snmp6_fill_stats64.isra.53+0xbb/0x140 ? __nla_validate_parse+0x47/0x1a0 __rtnl_newlink+0x530/0x910 ? pskb_expand_head+0x73/0x300? __kmalloc_node_track_caller+0x109/0x280 ? __nla_put+0xc/0x20 ? cpumask_next_and+0x20/0x30? update_sd_lb_stats.constprop.144+0xd3/0x820? _raw_spin_unlock_irqrestore+0x25/0x37? __wake_up_common_lock+0x87/0xc0? kmem_cache_alloc_trace+0x3d/0x3d0 rtnl_newlink+0x43/0x60 El problema ocurre cuando el cambio que deber\u00eda haber sido una funci\u00f3n del tama\u00f1o del elemento txq us\u00f3 por error el tama\u00f1o del anillo. Arreglar usando el tama\u00f1o del elemento."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "5.16.8",
|
||||
"matchCriteriaId": "0623892A-E3E4-44E6-8A5E-39A0B47AF782"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:5.17:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7BD5F8D9-54FA-4CB0-B4F0-CB0471FDDB2D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:5.17:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E6E34B23-78B4-4516-9BD8-61B33F4AC49A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/1530d84fba1e459ba55f46aa42649b88773210e7",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/8c83d39cc730378bbac64d67a551897b203a606e",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-48749",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-06-20T12:15:13.143",
|
||||
"lastModified": "2024-06-20T12:43:25.663",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-18T16:05:04.623",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,23 +15,108 @@
|
||||
"value": "En el kernel de Linux se ha resuelto la siguiente vulnerabilidad: drm/msm/dpu: comprobaci\u00f3n de par\u00e1metro no v\u00e1lido en dpu_setup_dspp_pcc La funci\u00f3n realiza una comprobaci\u00f3n del par\u00e1metro de entrada \"ctx\", sin embargo, se utiliza antes de la comprobaci\u00f3n. Inicialice la variable \"base\" despu\u00e9s de la verificaci\u00f3n de cordura para evitar una posible desreferencia del puntero NULL. Direcciones-Coverity-ID: 1493866 (\"Desreferencia de puntero nulo\")"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.8",
|
||||
"versionEndExcluding": "5.10.96",
|
||||
"matchCriteriaId": "109892DA-3CB1-4C6F-9865-8B8B5EC444F4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11",
|
||||
"versionEndExcluding": "5.15.19",
|
||||
"matchCriteriaId": "DF69DD7C-FD57-4914-ABB0-FAEF87B0289D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "5.16.5",
|
||||
"matchCriteriaId": "1AD9E77E-B27E-450C-8FD8-B64EC5FB002D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:5.17:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7BD5F8D9-54FA-4CB0-B4F0-CB0471FDDB2D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/170b22234d5495f5e0844246e23f004639ee89ba",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/1ebc18836d5df09061657f8c548e594cbb519476",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/8f069f6dde518dfebe86e848508c07e497bd9298",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/93a6e920d8ccb4df846c03b6e72f7e08843d294c",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,28 +2,93 @@
|
||||
"id": "CVE-2022-48750",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-06-20T12:15:13.223",
|
||||
"lastModified": "2024-06-24T16:15:10.050",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-18T16:04:21.597",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nhwmon: (nct6775) Fix crash in clear_caseopen\n\nPawe\u0142 Marciniak reports the following crash, observed when clearing\nthe chassis intrusion alarm.\n\nBUG: kernel NULL pointer dereference, address: 0000000000000028\nPGD 0 P4D 0\nOops: 0000 [#1] PREEMPT SMP PTI\nCPU: 3 PID: 4815 Comm: bash Tainted: G S 5.16.2-200.fc35.x86_64 #1\nHardware name: To Be Filled By O.E.M. To Be Filled By O.E.M./Z97 Extreme4, BIOS P2.60A 05/03/2018\nRIP: 0010:clear_caseopen+0x5a/0x120 [nct6775]\nCode: 68 70 e8 e9 32 b1 e3 85 c0 0f 85 d2 00 00 00 48 83 7c 24 ...\nRSP: 0018:ffffabcb02803dd8 EFLAGS: 00010246\nRAX: 0000000000000000 RBX: 0000000000000002 RCX: 0000000000000000\nRDX: ffff8e8808192880 RSI: 0000000000000000 RDI: ffff8e87c7509a68\nRBP: 0000000000000000 R08: 0000000000000001 R09: 000000000000000a\nR10: 000000000000000a R11: f000000000000000 R12: 000000000000001f\nR13: ffff8e87c7509828 R14: ffff8e87c7509a68 R15: ffff8e88494527a0\nFS: 00007f4db9151740(0000) GS:ffff8e8ebfec0000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000000000000028 CR3: 0000000166b66001 CR4: 00000000001706e0\nCall Trace:\n <TASK>\n kernfs_fop_write_iter+0x11c/0x1b0\n new_sync_write+0x10b/0x180\n vfs_write+0x209/0x2a0\n ksys_write+0x4f/0xc0\n do_syscall_64+0x3b/0x90\n entry_SYSCALL_64_after_hwframe+0x44/0xae\n\nThe problem is that the device passed to clear_caseopen() is the hwmon\ndevice, not the platform device, and the platform data is not set in the\nhwmon device. Store the pointer to sio_data in struct nct6775_data and\nget if from there if needed."
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nhwmon: (nct6775) Fix crash in clear_caseopen\n\nPawe? Marciniak reports the following crash, observed when clearing\nthe chassis intrusion alarm.\n\nBUG: kernel NULL pointer dereference, address: 0000000000000028\nPGD 0 P4D 0\nOops: 0000 [#1] PREEMPT SMP PTI\nCPU: 3 PID: 4815 Comm: bash Tainted: G S 5.16.2-200.fc35.x86_64 #1\nHardware name: To Be Filled By O.E.M. To Be Filled By O.E.M./Z97 Extreme4, BIOS P2.60A 05/03/2018\nRIP: 0010:clear_caseopen+0x5a/0x120 [nct6775]\nCode: 68 70 e8 e9 32 b1 e3 85 c0 0f 85 d2 00 00 00 48 83 7c 24 ...\nRSP: 0018:ffffabcb02803dd8 EFLAGS: 00010246\nRAX: 0000000000000000 RBX: 0000000000000002 RCX: 0000000000000000\nRDX: ffff8e8808192880 RSI: 0000000000000000 RDI: ffff8e87c7509a68\nRBP: 0000000000000000 R08: 0000000000000001 R09: 000000000000000a\nR10: 000000000000000a R11: f000000000000000 R12: 000000000000001f\nR13: ffff8e87c7509828 R14: ffff8e87c7509a68 R15: ffff8e88494527a0\nFS: 00007f4db9151740(0000) GS:ffff8e8ebfec0000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000000000000028 CR3: 0000000166b66001 CR4: 00000000001706e0\nCall Trace:\n <TASK>\n kernfs_fop_write_iter+0x11c/0x1b0\n new_sync_write+0x10b/0x180\n vfs_write+0x209/0x2a0\n ksys_write+0x4f/0xc0\n do_syscall_64+0x3b/0x90\n entry_SYSCALL_64_after_hwframe+0x44/0xae\n\nThe problem is that the device passed to clear_caseopen() is the hwmon\ndevice, not the platform device, and the platform data is not set in the\nhwmon device. Store the pointer to sio_data in struct nct6775_data and\nget if from there if needed."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En el kernel de Linux se ha resuelto la siguiente vulnerabilidad: hwmon: (nct6775) \u00bfReparar fallo en clear_caseopen Pawe? Marciniak informa del siguiente accidente, observado al borrar la alarma de intrusi\u00f3n en el chasis. ERROR: desreferencia del puntero NULL del kernel, direcci\u00f3n: 00000000000000028 PGD 0 P4D 0 Ups: 0000 [#1] PREEMPT SMP PTI CPU: 3 PID: 4815 Comm: bash Contaminado: GS 5.16.2-200.fc35.x86_64 #1 Nombre de hardware: Para ser completado por OEM Para ser completado por OEM/Z97 Extreme4, BIOS P2.60A 03/05/2018 RIP: 0010:clear_caseopen+0x5a/0x120 [nct6775] C\u00f3digo: 68 70 e8 e9 32 b1 e3 85 c0 0f 85 d2 00 00 00 48 83 7c 24 ... RSP: 0018:ffffabcb02803dd8 EFLAGS: 00010246 RAX: 0000000000000000 RBX: 00000000000000002 RCX: 0000000000000000 RDX: 8808192880 RSI: 0000000000000000 RDI: ffff8e87c7509a68 RBP: 0000000000000000 R08: 0000000000000001 R09: 000000000000000a R10: 000000a R11: f000000000000000 R12: 000000000000001f R13: ffff8e87c7509828 R14: ffff8e87c7509a68 R15: ffff8e88494527a0 FS: 00007f4db9151740(0000) GS:ffff8e8ebfec0000(0000) nlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000000028 CR3: 0000000166b66001 CR4: 00000000001706e0 : kernfs_fop_write_iter+0x11c/0x1b0 new_sync_write+0x10b/0x180 vfs_write+0x209/0x2a0 ksys_write+0x4f/0xc0 do_syscall_64+0x3b/0x90 Entry_SYSCALL_64_after_hwframe+0x44/0xae El problema es que el dispositivo pasado a clear_caseopen() es el dispositivo hwmon, no el dispositivo de plataforma y los datos de la plataforma no est\u00e1n configurados en el dispositivo hwmon. Guarde el puntero a sio_data en la estructura nct6775_data y obtengalo desde all\u00ed si es necesario."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "5.16.5",
|
||||
"matchCriteriaId": "1AD9E77E-B27E-450C-8FD8-B64EC5FB002D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:5.17:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7BD5F8D9-54FA-4CB0-B4F0-CB0471FDDB2D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/79da533d3cc717ccc05ddbd3190da8a72bc2408b",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/cfb7d12f2e4a4d694f49e9b4ebb352f7b67cdfbb",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-48753",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-06-20T12:15:13.480",
|
||||
"lastModified": "2024-06-20T12:43:25.663",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-18T16:03:25.617",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,15 +15,80 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: bloque: corrige la p\u00e9rdida de memoria en disk_register_independent_access_ranges kobject_init_and_add() toma referencia incluso cuando falla. Seg\u00fan el documento de kobject_init_and_add() Si esta funci\u00f3n devuelve un error, se debe llamar a kobject_put() para limpiar adecuadamente la memoria asociada con el objeto. Solucione este problema agregando kobject_put(). La funci\u00f3n de devoluci\u00f3n de llamada blk_ia_ranges_sysfs_release() en kobject_put() puede manejar el puntero \"iars\" correctamente."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-401"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "5.16.5",
|
||||
"matchCriteriaId": "1AD9E77E-B27E-450C-8FD8-B64EC5FB002D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:5.17:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7BD5F8D9-54FA-4CB0-B4F0-CB0471FDDB2D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/83114df32ae779df57e0af99a8ba6c3968b2ba3d",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/fe4214a07e0b53d2af711f57519e33739c5df23f",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-37233",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-10T16:15:18.570",
|
||||
"lastModified": "2024-09-10T21:35:02.950",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-18T16:10:23.187",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-611"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -51,18 +81,45 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:loftware:spectrum:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "4.6_hf14",
|
||||
"matchCriteriaId": "5CE63328-FC1D-43B9-89DD-428A271559F3"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://code-white.com",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Not Applicable"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://code-white.com/public-vulnerability-list/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://docs.loftware.com/spectrum-releasenotes/Content/Hotfix/4.6_HF14.htm",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-37234",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-10T16:15:18.647",
|
||||
"lastModified": "2024-09-11T15:35:04.903",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-18T16:05:50.257",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -51,14 +81,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:loftware:spectrum:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "4.6",
|
||||
"matchCriteriaId": "A52A66B4-E2ED-498B-8D00-FCC80577738A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://code-white.com",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Not Applicable"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://code-white.com/public-vulnerability-list/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-44093",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2023-10-11T11:15:13.423",
|
||||
"lastModified": "2023-10-16T19:18:41.647",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-18T16:35:02.680",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -49,6 +49,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-44106",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2023-10-11T12:15:11.570",
|
||||
"lastModified": "2023-10-15T01:47:39.467",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-18T16:35:04.117",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -49,6 +49,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
25
CVE-2023/CVE-2023-471xx/CVE-2023-47105.json
Normal file
25
CVE-2023/CVE-2023-471xx/CVE-2023-47105.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2023-47105",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-18T17:15:18.277",
|
||||
"lastModified": "2024-09-18T17:15:18.277",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "exec.CommandContext in Chaosblade 0.3 through 1.7.3, when server mode is used, allows OS command execution via the cmd parameter without authentication."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/chaosblade-io/chaosblade/blob/0a07380c9899febb2b544132783b376b44226cca/exec/os/executor.go#L68",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://narrow-oatmeal-0c0.notion.site/ChaosBlade-Remote-Command-Execution-CVE-2023-47105-4f5459046488436caaec2bced6ff26d7",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-39628",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-08-26T21:15:23.430",
|
||||
"lastModified": "2024-08-27T13:02:05.683",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-18T16:59:33.293",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ninjaforms:ninja_forms:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "3.8.7",
|
||||
"matchCriteriaId": "0D048C93-62B6-4AC0-A8E4-668736E658C6"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/ninja-forms/wordpress-ninja-forms-plugin-3-8-6-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-39641",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-08-26T21:15:23.657",
|
||||
"lastModified": "2024-08-27T13:02:05.683",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-18T16:57:25.417",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:thimpress:learnpress:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "4.2.6.9",
|
||||
"matchCriteriaId": "3DCD3576-A5FB-4E56-8281-F179E05E3817"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/learnpress/wordpress-learnpress-plugin-4-2-6-8-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-39645",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-08-26T21:15:23.873",
|
||||
"lastModified": "2024-08-27T13:02:05.683",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-18T16:46:57.470",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:themeum:tutor_lms:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "2.7.3",
|
||||
"matchCriteriaId": "1EB20081-939F-4B43-A6AC-6A572C2DEBE0"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/tutor/wordpress-tutor-lms-plugin-2-7-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-39657",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-08-26T21:15:24.083",
|
||||
"lastModified": "2024-08-27T13:02:05.683",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-18T16:25:32.703",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sender:sender:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "2.6.19",
|
||||
"matchCriteriaId": "4EAE99D6-BDFA-4669-AE30-D3B571DE709B"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/sender-net-automated-emails/wordpress-sender-newsletter-sms-and-email-marketing-automation-for-woocommerce-plugin-2-6-18-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-41929",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2024-09-18T07:15:02.847",
|
||||
"lastModified": "2024-09-18T07:15:02.847",
|
||||
"lastModified": "2024-09-18T16:35:07.527",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "Improper authentication vulnerability in multiple digital video recorders provided by TAKENAKA ENGINEERING CO., LTD. allows a remote authenticated attacker to execute an arbitrary OS command on the device or alter the device settings."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-287"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://jvn.jp/en/vu/JVNVU90142679/",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-42404",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2024-09-18T06:15:02.223",
|
||||
"lastModified": "2024-09-18T06:15:02.223",
|
||||
"lastModified": "2024-09-18T16:35:08.267",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "SQL injection vulnerability in Welcart e-Commerce prior to 2.11.2 allows an attacker who can login to the product to obtain or alter the information stored in the database."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://jvn.jp/en/jp/JVN19766555/",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-42795",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-16T20:15:46.830",
|
||||
"lastModified": "2024-09-16T20:15:46.830",
|
||||
"lastModified": "2024-09-18T16:35:09.097",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An Incorrect Access Control vulnerability was found in /music/view_user.php?id=3 and /music/controller.php?page=edit_user&id=3 in Kashipara Music Management System v1.0. This vulnerability allows an unauthenticated attacker to view valid user details."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se encontr\u00f3 una vulnerabilidad de control de acceso incorrecto en /music/view_user.php?id=3 y /music/controller.php?page=edit_user&id=3 en Kashipara Music Management System v1.0. Esta vulnerabilidad permite que un atacante no autenticado vea detalles v\u00e1lidos de un usuario."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 4.2,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Music%20Management%20System%20v1.0/Broken%20Access%20Control%20-%20View%20User.pdf",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-42796",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-16T20:15:46.890",
|
||||
"lastModified": "2024-09-16T20:15:46.890",
|
||||
"lastModified": "2024-09-18T16:35:09.880",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An Incorrect Access Control vulnerability was found in /music/ajax.php?action=delete_genre in Kashipara Music Management System v1.0. This vulnerability allows an unauthenticated attacker to delete the valid music genre entries."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se encontr\u00f3 una vulnerabilidad de control de acceso incorrecto en /music/ajax.php?action=delete_genre en Kashipara Music Management System v1.0. Esta vulnerabilidad permite que un atacante no autenticado elimine las entradas v\u00e1lidas de g\u00e9nero musical."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 5.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Music%20Management%20System%20v1.0/Broken%20Access%20Control%20-%20Delete%20Genre.pdf",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-42798",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-16T20:15:46.957",
|
||||
"lastModified": "2024-09-16T20:15:46.957",
|
||||
"lastModified": "2024-09-18T16:35:10.637",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An Incorrect Access Control vulnerability was found in /music/index.php?page=user_list and /music/index.php?page=edit_user in Kashipara Music Management System v1.0. This allows a low privileged attacker to take over the administrator account."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se encontr\u00f3 una vulnerabilidad de control de acceso incorrecto en /music/index.php?page=user_list y /music/index.php?page=edit_user en Kashipara Music Management System v1.0. Esto permite que un atacante con pocos privilegios tome el control de la cuenta de administrador."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.6,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 4.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Music%20Management%20System%20v1.0/Broken%20Access%20Control%20-%20Priv%20Esc%20-%20Save%20Edit%20User%20-%20AC%20Takeover.pdf",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-43116",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-08-26T21:15:24.360",
|
||||
"lastModified": "2024-08-27T13:02:05.683",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-18T16:22:14.880",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:10up:simple_local_avatars:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "2.7.11",
|
||||
"matchCriteriaId": "329BD9EE-E55B-4A1F-807A-0E2080C94163"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/simple-local-avatars/wordpress-simple-local-avatars-plugin-2-7-10-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-43117",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-08-26T21:15:24.560",
|
||||
"lastModified": "2024-08-27T13:02:05.683",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-18T16:15:04.373",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:wpmudev:hummingbird:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "3.9.2",
|
||||
"matchCriteriaId": "766C4431-7453-4416-BBAA-1A174BEC104C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/hummingbird-performance/wordpress-hummingbird-plugin-3-9-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-43230",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-08-26T21:15:24.987",
|
||||
"lastModified": "2024-08-27T13:01:52.723",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-18T16:10:30.317",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sharedfilespro:shared_files:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "1.7.29",
|
||||
"matchCriteriaId": "2ADD092B-555C-4950-92F2-8C093BE76F85"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/shared-files/wordpress-shared-files-premium-download-manager-secure-file-sharing-with-frontend-file-upload-plugin-1-7-28-sensitive-data-exposure-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-43327",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-08-18T14:15:07.197",
|
||||
"lastModified": "2024-08-19T12:59:59.177",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-18T17:07:45.553",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:teleogistic:invite_anyone:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "1.4.8",
|
||||
"matchCriteriaId": "9CEC5D99-6625-4FCF-8712-C2E735EA8EDF"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/invite-anyone/wordpress-invite-anyone-plugin-1-4-7-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-43967",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-08-26T16:15:10.107",
|
||||
"lastModified": "2024-08-26T19:10:09.607",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-18T17:00:57.497",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:starkdigital:wp_testimonial_widget:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "3.1",
|
||||
"matchCriteriaId": "D8AEB3E2-E2D8-4EDC-B5D7-E8160A8DB97A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/wp-testimonial-widget/wordpress-wp-testimonial-widget-plugin-3-1-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-44103",
|
||||
"sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
|
||||
"published": "2024-09-10T21:15:13.547",
|
||||
"lastModified": "2024-09-11T16:26:11.920",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-18T17:18:39.040",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-426"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:workspace_control:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.18.99.0",
|
||||
"matchCriteriaId": "21D83B80-CA53-4122-864F-7CD27A212A4A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Workspace-Control-IWC",
|
||||
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75"
|
||||
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-44104",
|
||||
"sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
|
||||
"published": "2024-09-10T21:15:13.727",
|
||||
"lastModified": "2024-09-11T16:26:11.920",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-18T17:33:06.413",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-290"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:workspace_control:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.18.99.0",
|
||||
"matchCriteriaId": "21D83B80-CA53-4122-864F-7CD27A212A4A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Workspace-Control-IWC",
|
||||
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75"
|
||||
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-44105",
|
||||
"sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
|
||||
"published": "2024-09-10T21:15:13.917",
|
||||
"lastModified": "2024-09-11T16:26:11.920",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-18T17:48:11.193",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-319"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:workspace_control:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.18.99.0",
|
||||
"matchCriteriaId": "21D83B80-CA53-4122-864F-7CD27A212A4A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Workspace-Control-IWC",
|
||||
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75"
|
||||
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-44106",
|
||||
"sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
|
||||
"published": "2024-09-10T21:15:14.110",
|
||||
"lastModified": "2024-09-11T16:26:11.920",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-18T17:50:40.660",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:workspace_control:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.18.99.0",
|
||||
"matchCriteriaId": "21D83B80-CA53-4122-864F-7CD27A212A4A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Workspace-Control-IWC",
|
||||
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75"
|
||||
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-44107",
|
||||
"sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
|
||||
"published": "2024-09-10T21:15:14.283",
|
||||
"lastModified": "2024-09-11T16:26:11.920",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-18T17:52:50.990",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-427"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:workspace_control:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.18.99.0",
|
||||
"matchCriteriaId": "21D83B80-CA53-4122-864F-7CD27A212A4A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Workspace-Control-IWC",
|
||||
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75"
|
||||
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-45041",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-09-09T15:15:11.940",
|
||||
"lastModified": "2024-09-09T18:30:12.050",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-18T17:31:53.903",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -41,8 +61,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-732"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -51,14 +81,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:external-secrets:external_secrets_operator:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "0.10.2",
|
||||
"matchCriteriaId": "E9FE8A81-3B52-4ACB-A0C0-32008302E35A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/external-secrets/external-secrets/commit/428a452fd2ad45935312f2c2c0d40bc37ce6e67c",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/external-secrets/external-secrets/security/advisories/GHSA-qwgc-rr35-h4x9",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-452xx/CVE-2024-45298.json
Normal file
60
CVE-2024/CVE-2024-452xx/CVE-2024-45298.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-45298",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-09-18T17:15:18.570",
|
||||
"lastModified": "2024-09-18T17:15:18.570",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Wiki.js is an open source wiki app built on Node.js. A disabled user can still gain access to a wiki by abusing the password reset function. While setting up SMTP e-mail's on my server, I tested said e-mails by performing a password reset with my test user. To my shock, not only did it let me reset my password, but after resetting my password I can get into the wiki I was locked out of. The ramifications of this bug is a user can **bypass an account disabling by requesting their password be reset**. All users of wiki.js version `2.5.303` who use any account restrictions and have disabled user are affected. This issue has been addressed in version 2.5.304 and all users are advised to upgrade. There are no known workarounds for this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-670"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/requarks/wiki/commit/b9fb17d4d4a0956ec35e8c73cc85192552fb8d16",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/requarks/wiki/security/advisories/GHSA-vwww-c5vg-xgfc",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-45413",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-16T21:15:45.833",
|
||||
"lastModified": "2024-09-16T21:15:45.833",
|
||||
"lastModified": "2024-09-18T16:35:11.470",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The HTTPD binary in multiple ZTE routers has a stack-based buffer overflow vulnerability in rsa_decrypt function. This function is an API wrapper for LUA to decrypt RSA encrypted ciphertext, the decrypted data is stored on the stack without checking its length. An authenticated attacker can get RCE as root by exploiting this vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El binario HTTPD en varios enrutadores ZTE tiene una vulnerabilidad de desbordamiento de b\u00fafer basada en pila en la funci\u00f3n rsa_decrypt. Esta funci\u00f3n es un contenedor de API para LUA para descifrar texto cifrado RSA; los datos descifrados se almacenan en la pila sin verificar su longitud. Un atacante autenticado puede obtener RCE como superusuario al explotar esta vulnerabilidad."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wr3nchsr.github.io/zte-multiple-routers-httpd-vulnerabilities-advisory/",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-45414",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-16T21:15:45.890",
|
||||
"lastModified": "2024-09-16T21:15:45.890",
|
||||
"lastModified": "2024-09-18T16:35:12.227",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The HTTPD binary in multiple ZTE routers has a stack-based buffer overflow vulnerability in webPrivateDecrypt function. This function is responsible for decrypting RSA encrypted ciphertext, the encrypted data is supplied base64 encoded. The decoded ciphertext is stored on the stack without checking its length. An unauthenticated attacker can get RCE as root by exploiting this vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El binario HTTPD en varios enrutadores ZTE tiene una vulnerabilidad de desbordamiento de b\u00fafer basada en pila en la funci\u00f3n webPrivateDecrypt. Esta funci\u00f3n es responsable de descifrar el texto cifrado RSA; los datos cifrados se suministran codificados en base64. El texto cifrado descodificado se almacena en la pila sin verificar su longitud. Un atacante no autenticado puede obtener RCE como superusuario explotando esta vulnerabilidad."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wr3nchsr.github.io/zte-multiple-routers-httpd-vulnerabilities-advisory/",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-45415",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-16T21:15:45.943",
|
||||
"lastModified": "2024-09-16T21:15:45.943",
|
||||
"lastModified": "2024-09-18T16:35:12.983",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The HTTPD binary in multiple ZTE routers has a stack-based buffer overflow vulnerability in check_data_integrity function. This function is responsible for validating the checksum of data in post request. The checksum is sent encrypted in the request, the function decrypts it and stores the checksum on the stack without validating it. An unauthenticated attacker can get RCE as root by exploiting this vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El binario HTTPD en varios enrutadores ZTE tiene una vulnerabilidad de desbordamiento de b\u00fafer basada en pila en la funci\u00f3n check_data_integrity. Esta funci\u00f3n es responsable de validar la suma de comprobaci\u00f3n de los datos en la solicitud posterior. La suma de comprobaci\u00f3n se env\u00eda cifrada en la solicitud, la funci\u00f3n la descifra y almacena la suma de comprobaci\u00f3n en la pila sin validarla. Un atacante no autenticado puede obtener RCE como superusuario explotando esta vulnerabilidad."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wr3nchsr.github.io/zte-multiple-routers-httpd-vulnerabilities-advisory/",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-45416",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-16T21:15:46.003",
|
||||
"lastModified": "2024-09-16T21:15:46.003",
|
||||
"lastModified": "2024-09-18T16:35:13.743",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The HTTPD binary in multiple ZTE routers has a local file inclusion vulnerability in session_init function. The session -LUA- files are stored in the directory /var/lua_session, the function iterates on all files in this directory and executes them using the function dofile without any validation if it is a valid session file or not. An attacker who is able to write a malicious file in the sessions directory can get RCE as root."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El binario HTTPD en varios enrutadores ZTE tiene una vulnerabilidad de inclusi\u00f3n de archivos locales en la funci\u00f3n session_init. Los archivos de sesi\u00f3n -LUA- se almacenan en el directorio /var/lua_session, la funci\u00f3n itera sobre todos los archivos de este directorio y los ejecuta utilizando la funci\u00f3n dofile sin ninguna validaci\u00f3n si es un archivo de sesi\u00f3n v\u00e1lido o no. Un atacante que pueda escribir un archivo malicioso en el directorio sessions puede obtener RCE como superusuario."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-829"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wr3nchsr.github.io/zte-multiple-routers-httpd-vulnerabilities-advisory/",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-45679",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2024-09-18T04:15:42.080",
|
||||
"lastModified": "2024-09-18T04:15:42.080",
|
||||
"lastModified": "2024-09-18T16:35:14.530",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "Heap-based buffer overflow vulnerability in Assimp versions prior to 5.4.3 allows a local attacker to execute arbitrary code by importing a specially crafted file into the product."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.4,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-122"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/assimp/assimp/releases/tag/v5.4.3",
|
||||
|
64
CVE-2024/CVE-2024-458xx/CVE-2024-45813.json
Normal file
64
CVE-2024/CVE-2024-458xx/CVE-2024-45813.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2024-45813",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-09-18T17:15:19.163",
|
||||
"lastModified": "2024-09-18T17:15:19.163",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "find-my-way is a fast, open source HTTP router, internally using a Radix Tree (aka compact Prefix Tree), supports route params, wildcards, and it's framework independent. A bad regular expression is generated any time one has two parameters within a single segment, when adding a `-` at the end, like `/:a-:b-`. This may cause a denial of service in some instances. Users are advised to update to find-my-way v8.2.2 or v9.0.1. or subsequent versions. There are no known workarounds for this issue."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-1333"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://blakeembrey.com/posts/2024-09-web-redos",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/delvedor/find-my-way/commit/5e9e0eb5d8d438e06a185d5e536a896572dd0440",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/delvedor/find-my-way/security/advisories/GHSA-rrr8-f88r-h8q6",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-460xx/CVE-2024-46086.json
Normal file
21
CVE-2024/CVE-2024-460xx/CVE-2024-46086.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-46086",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-18T16:15:06.160",
|
||||
"lastModified": "2024-09-18T16:15:06.160",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "FrogCMS V0.9.5 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/?/plugin/file_manager/delete/123"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/PG2Stom/cms/tree/main/12/readme.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
72
CVE-2024/CVE-2024-469xx/CVE-2024-46990.json
Normal file
72
CVE-2024/CVE-2024-469xx/CVE-2024-46990.json
Normal file
@ -0,0 +1,72 @@
|
||||
{
|
||||
"id": "CVE-2024-46990",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-09-18T17:15:19.687",
|
||||
"lastModified": "2024-09-18T17:15:19.687",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Directus is a real-time API and App dashboard for managing SQL database content. When relying on blocking access to localhost using the default `0.0.0.0` filter a user may bypass this block by using other registered loopback devices (like `127.0.0.2` - `127.127.127.127`). This issue has been addressed in release versions 10.13.3 and 11.1.0. Users are advised to upgrade. Users unable to upgrade may block this bypass by manually adding the `127.0.0.0/8` CIDR range which will block access to any `127.X.X.X` ip instead of just `127.0.0.1`."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.0,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/directus/directus/commit/4aace0bbe57232e38cd6a287ee475293e46dc91b",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/directus/directus/commit/769fa22797bff5a9231599883b391e013f122e52",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/directus/directus/commit/8cbf943b65fd4a763d09a5fdbba8996b1e7797ff",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/directus/directus/commit/c1f3ccc681595038d094ce110ddeee38cb38f431",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/directus/directus/security/advisories/GHSA-68g8-c275-xf2m",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-47001",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2024-09-18T07:15:04.220",
|
||||
"lastModified": "2024-09-18T07:15:04.220",
|
||||
"lastModified": "2024-09-18T16:35:16.540",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "Hidden functionality issue in multiple digital video recorders provided by TAKENAKA ENGINEERING CO., LTD. allows a remote authenticated attacker to execute an arbitrary OS command on the device or alter the device settings."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-912"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://jvn.jp/en/vu/JVNVU90142679/",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-8012",
|
||||
"sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
|
||||
"published": "2024-09-10T21:15:14.510",
|
||||
"lastModified": "2024-09-11T16:26:11.920",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-18T17:53:47.860",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-306"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:workspace_control:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.18.99.0",
|
||||
"matchCriteriaId": "21D83B80-CA53-4122-864F-7CD27A212A4A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Workspace-Control-IWC",
|
||||
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75"
|
||||
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-8611",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-09-09T21:15:13.377",
|
||||
"lastModified": "2024-09-10T12:09:50.377",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-18T17:24:34.163",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -109,6 +129,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -120,26 +150,59 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:angeljudesuarez:tailoring_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D6D27827-5554-4FAB-8460-52599930F4FF"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/elegant228/cve/issues/1",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://itsourcecode.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.276841",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.276841",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.404875",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,16 +2,43 @@
|
||||
"id": "CVE-2024-8904",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2024-09-17T21:15:12.980",
|
||||
"lastModified": "2024-09-17T21:15:12.980",
|
||||
"lastModified": "2024-09-18T16:35:17.877",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Type Confusion in V8 in Google Chrome prior to 129.0.6668.58 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La confusi\u00f3n de tipos en la versi\u00f3n 8 de Google Chrome anterior a la 129.0.6668.58 permit\u00eda a un atacante remoto explotar potencialmente la corrupci\u00f3n del mont\u00f3n a trav\u00e9s de una p\u00e1gina HTML manipulada. (Gravedad de seguridad de Chromium: alta)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
@ -22,6 +49,16 @@
|
||||
"value": "CWE-843"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-843"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-8905",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2024-09-17T21:15:13.080",
|
||||
"lastModified": "2024-09-17T21:15:13.080",
|
||||
"lastModified": "2024-09-18T16:35:18.640",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Inappropriate implementation in V8 in Google Chrome prior to 129.0.6668.58 allowed a remote attacker to potentially exploit stack corruption via a crafted HTML page. (Chromium security severity: Medium)"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una implementaci\u00f3n inadecuada en la versi\u00f3n 8 de Google Chrome anterior a la 129.0.6668.58 permiti\u00f3 que un atacante remoto pudiera explotar la corrupci\u00f3n de la pila a trav\u00e9s de una p\u00e1gina HTML manipulada. (Gravedad de seguridad de Chromium: media)"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-122"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2024/09/stable-channel-update-for-desktop_17.html",
|
||||
|
91
README.md
91
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-09-18T16:00:48.018437+00:00
|
||||
2024-09-18T18:00:18.842448+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-09-18T15:59:50.983000+00:00
|
||||
2024-09-18T17:53:47.860000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,69 +33,50 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
263381
|
||||
263387
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `98`
|
||||
Recently added CVEs: `6`
|
||||
|
||||
- [CVE-2024-46571](CVE-2024/CVE-2024-465xx/CVE-2024-46571.json) (`2024-09-18T15:15:17.530`)
|
||||
- [CVE-2024-46580](CVE-2024/CVE-2024-465xx/CVE-2024-46580.json) (`2024-09-18T15:15:17.580`)
|
||||
- [CVE-2024-46581](CVE-2024/CVE-2024-465xx/CVE-2024-46581.json) (`2024-09-18T15:15:17.630`)
|
||||
- [CVE-2024-46582](CVE-2024/CVE-2024-465xx/CVE-2024-46582.json) (`2024-09-18T15:15:17.680`)
|
||||
- [CVE-2024-46583](CVE-2024/CVE-2024-465xx/CVE-2024-46583.json) (`2024-09-18T15:15:17.723`)
|
||||
- [CVE-2024-46584](CVE-2024/CVE-2024-465xx/CVE-2024-46584.json) (`2024-09-18T15:15:17.790`)
|
||||
- [CVE-2024-46585](CVE-2024/CVE-2024-465xx/CVE-2024-46585.json) (`2024-09-18T15:15:17.847`)
|
||||
- [CVE-2024-46586](CVE-2024/CVE-2024-465xx/CVE-2024-46586.json) (`2024-09-18T15:15:17.900`)
|
||||
- [CVE-2024-46588](CVE-2024/CVE-2024-465xx/CVE-2024-46588.json) (`2024-09-18T15:15:17.957`)
|
||||
- [CVE-2024-46589](CVE-2024/CVE-2024-465xx/CVE-2024-46589.json) (`2024-09-18T15:15:18.007`)
|
||||
- [CVE-2024-46590](CVE-2024/CVE-2024-465xx/CVE-2024-46590.json) (`2024-09-18T15:15:18.067`)
|
||||
- [CVE-2024-46591](CVE-2024/CVE-2024-465xx/CVE-2024-46591.json) (`2024-09-18T15:15:18.117`)
|
||||
- [CVE-2024-46592](CVE-2024/CVE-2024-465xx/CVE-2024-46592.json) (`2024-09-18T15:15:18.170`)
|
||||
- [CVE-2024-46593](CVE-2024/CVE-2024-465xx/CVE-2024-46593.json) (`2024-09-18T15:15:18.220`)
|
||||
- [CVE-2024-46594](CVE-2024/CVE-2024-465xx/CVE-2024-46594.json) (`2024-09-18T15:15:18.263`)
|
||||
- [CVE-2024-46595](CVE-2024/CVE-2024-465xx/CVE-2024-46595.json) (`2024-09-18T15:15:18.307`)
|
||||
- [CVE-2024-46596](CVE-2024/CVE-2024-465xx/CVE-2024-46596.json) (`2024-09-18T15:15:18.353`)
|
||||
- [CVE-2024-46597](CVE-2024/CVE-2024-465xx/CVE-2024-46597.json) (`2024-09-18T15:15:18.400`)
|
||||
- [CVE-2024-46598](CVE-2024/CVE-2024-465xx/CVE-2024-46598.json) (`2024-09-18T15:15:18.453`)
|
||||
- [CVE-2024-5958](CVE-2024/CVE-2024-59xx/CVE-2024-5958.json) (`2024-09-18T15:15:18.510`)
|
||||
- [CVE-2024-5959](CVE-2024/CVE-2024-59xx/CVE-2024-5959.json) (`2024-09-18T15:15:18.623`)
|
||||
- [CVE-2024-5960](CVE-2024/CVE-2024-59xx/CVE-2024-5960.json) (`2024-09-18T15:15:18.740`)
|
||||
- [CVE-2024-6877](CVE-2024/CVE-2024-68xx/CVE-2024-6877.json) (`2024-09-18T15:15:18.860`)
|
||||
- [CVE-2024-6878](CVE-2024/CVE-2024-68xx/CVE-2024-6878.json) (`2024-09-18T15:15:18.970`)
|
||||
- [CVE-2024-8891](CVE-2024/CVE-2024-88xx/CVE-2024-8891.json) (`2024-09-18T14:15:20.187`)
|
||||
- [CVE-2022-25777](CVE-2022/CVE-2022-257xx/CVE-2022-25777.json) (`2024-09-18T16:15:04.980`)
|
||||
- [CVE-2023-47105](CVE-2023/CVE-2023-471xx/CVE-2023-47105.json) (`2024-09-18T17:15:18.277`)
|
||||
- [CVE-2024-45298](CVE-2024/CVE-2024-452xx/CVE-2024-45298.json) (`2024-09-18T17:15:18.570`)
|
||||
- [CVE-2024-45813](CVE-2024/CVE-2024-458xx/CVE-2024-45813.json) (`2024-09-18T17:15:19.163`)
|
||||
- [CVE-2024-46086](CVE-2024/CVE-2024-460xx/CVE-2024-46086.json) (`2024-09-18T16:15:06.160`)
|
||||
- [CVE-2024-46990](CVE-2024/CVE-2024-469xx/CVE-2024-46990.json) (`2024-09-18T17:15:19.687`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `39`
|
||||
Recently modified CVEs: `50`
|
||||
|
||||
- [CVE-2024-37991](CVE-2024/CVE-2024-379xx/CVE-2024-37991.json) (`2024-09-18T15:29:44.390`)
|
||||
- [CVE-2024-37992](CVE-2024/CVE-2024-379xx/CVE-2024-37992.json) (`2024-09-18T15:31:27.597`)
|
||||
- [CVE-2024-37993](CVE-2024/CVE-2024-379xx/CVE-2024-37993.json) (`2024-09-18T15:32:26.037`)
|
||||
- [CVE-2024-37994](CVE-2024/CVE-2024-379xx/CVE-2024-37994.json) (`2024-09-18T15:35:17.403`)
|
||||
- [CVE-2024-37995](CVE-2024/CVE-2024-379xx/CVE-2024-37995.json) (`2024-09-18T15:37:15.130`)
|
||||
- [CVE-2024-38018](CVE-2024/CVE-2024-380xx/CVE-2024-38018.json) (`2024-09-18T15:04:58.240`)
|
||||
- [CVE-2024-38045](CVE-2024/CVE-2024-380xx/CVE-2024-38045.json) (`2024-09-18T15:04:07.700`)
|
||||
- [CVE-2024-38046](CVE-2024/CVE-2024-380xx/CVE-2024-38046.json) (`2024-09-18T15:02:15.300`)
|
||||
- [CVE-2024-38366](CVE-2024/CVE-2024-383xx/CVE-2024-38366.json) (`2024-09-18T15:22:55.753`)
|
||||
- [CVE-2024-38367](CVE-2024/CVE-2024-383xx/CVE-2024-38367.json) (`2024-09-18T15:16:27.733`)
|
||||
- [CVE-2024-38368](CVE-2024/CVE-2024-383xx/CVE-2024-38368.json) (`2024-09-18T15:23:00.507`)
|
||||
- [CVE-2024-42501](CVE-2024/CVE-2024-425xx/CVE-2024-42501.json) (`2024-09-18T15:35:05.747`)
|
||||
- [CVE-2024-42502](CVE-2024/CVE-2024-425xx/CVE-2024-42502.json) (`2024-09-18T15:35:06.550`)
|
||||
- [CVE-2024-42503](CVE-2024/CVE-2024-425xx/CVE-2024-42503.json) (`2024-09-18T15:35:10.277`)
|
||||
- [CVE-2024-43482](CVE-2024/CVE-2024-434xx/CVE-2024-43482.json) (`2024-09-18T14:11:50.303`)
|
||||
- [CVE-2024-43487](CVE-2024/CVE-2024-434xx/CVE-2024-43487.json) (`2024-09-18T14:10:20.320`)
|
||||
- [CVE-2024-43778](CVE-2024/CVE-2024-437xx/CVE-2024-43778.json) (`2024-09-18T15:35:11.213`)
|
||||
- [CVE-2024-4639](CVE-2024/CVE-2024-46xx/CVE-2024-4639.json) (`2024-09-18T15:46:04.960`)
|
||||
- [CVE-2024-4640](CVE-2024/CVE-2024-46xx/CVE-2024-4640.json) (`2024-09-18T15:48:43.557`)
|
||||
- [CVE-2024-4641](CVE-2024/CVE-2024-46xx/CVE-2024-4641.json) (`2024-09-18T15:52:41.237`)
|
||||
- [CVE-2024-5682](CVE-2024/CVE-2024-56xx/CVE-2024-5682.json) (`2024-09-18T14:35:06.033`)
|
||||
- [CVE-2024-8144](CVE-2024/CVE-2024-81xx/CVE-2024-8144.json) (`2024-09-18T15:31:17.277`)
|
||||
- [CVE-2024-8145](CVE-2024/CVE-2024-81xx/CVE-2024-8145.json) (`2024-09-18T15:34:47.007`)
|
||||
- [CVE-2024-8242](CVE-2024/CVE-2024-82xx/CVE-2024-8242.json) (`2024-09-18T15:47:56.553`)
|
||||
- [CVE-2024-8269](CVE-2024/CVE-2024-82xx/CVE-2024-8269.json) (`2024-09-18T15:20:44.553`)
|
||||
- [CVE-2024-42404](CVE-2024/CVE-2024-424xx/CVE-2024-42404.json) (`2024-09-18T16:35:08.267`)
|
||||
- [CVE-2024-42795](CVE-2024/CVE-2024-427xx/CVE-2024-42795.json) (`2024-09-18T16:35:09.097`)
|
||||
- [CVE-2024-42796](CVE-2024/CVE-2024-427xx/CVE-2024-42796.json) (`2024-09-18T16:35:09.880`)
|
||||
- [CVE-2024-42798](CVE-2024/CVE-2024-427xx/CVE-2024-42798.json) (`2024-09-18T16:35:10.637`)
|
||||
- [CVE-2024-43116](CVE-2024/CVE-2024-431xx/CVE-2024-43116.json) (`2024-09-18T16:22:14.880`)
|
||||
- [CVE-2024-43117](CVE-2024/CVE-2024-431xx/CVE-2024-43117.json) (`2024-09-18T16:15:04.373`)
|
||||
- [CVE-2024-43230](CVE-2024/CVE-2024-432xx/CVE-2024-43230.json) (`2024-09-18T16:10:30.317`)
|
||||
- [CVE-2024-43327](CVE-2024/CVE-2024-433xx/CVE-2024-43327.json) (`2024-09-18T17:07:45.553`)
|
||||
- [CVE-2024-43967](CVE-2024/CVE-2024-439xx/CVE-2024-43967.json) (`2024-09-18T17:00:57.497`)
|
||||
- [CVE-2024-44103](CVE-2024/CVE-2024-441xx/CVE-2024-44103.json) (`2024-09-18T17:18:39.040`)
|
||||
- [CVE-2024-44104](CVE-2024/CVE-2024-441xx/CVE-2024-44104.json) (`2024-09-18T17:33:06.413`)
|
||||
- [CVE-2024-44105](CVE-2024/CVE-2024-441xx/CVE-2024-44105.json) (`2024-09-18T17:48:11.193`)
|
||||
- [CVE-2024-44106](CVE-2024/CVE-2024-441xx/CVE-2024-44106.json) (`2024-09-18T17:50:40.660`)
|
||||
- [CVE-2024-44107](CVE-2024/CVE-2024-441xx/CVE-2024-44107.json) (`2024-09-18T17:52:50.990`)
|
||||
- [CVE-2024-45041](CVE-2024/CVE-2024-450xx/CVE-2024-45041.json) (`2024-09-18T17:31:53.903`)
|
||||
- [CVE-2024-45413](CVE-2024/CVE-2024-454xx/CVE-2024-45413.json) (`2024-09-18T16:35:11.470`)
|
||||
- [CVE-2024-45414](CVE-2024/CVE-2024-454xx/CVE-2024-45414.json) (`2024-09-18T16:35:12.227`)
|
||||
- [CVE-2024-45415](CVE-2024/CVE-2024-454xx/CVE-2024-45415.json) (`2024-09-18T16:35:12.983`)
|
||||
- [CVE-2024-45416](CVE-2024/CVE-2024-454xx/CVE-2024-45416.json) (`2024-09-18T16:35:13.743`)
|
||||
- [CVE-2024-45679](CVE-2024/CVE-2024-456xx/CVE-2024-45679.json) (`2024-09-18T16:35:14.530`)
|
||||
- [CVE-2024-47001](CVE-2024/CVE-2024-470xx/CVE-2024-47001.json) (`2024-09-18T16:35:16.540`)
|
||||
- [CVE-2024-8012](CVE-2024/CVE-2024-80xx/CVE-2024-8012.json) (`2024-09-18T17:53:47.860`)
|
||||
- [CVE-2024-8611](CVE-2024/CVE-2024-86xx/CVE-2024-8611.json) (`2024-09-18T17:24:34.163`)
|
||||
- [CVE-2024-8904](CVE-2024/CVE-2024-89xx/CVE-2024-8904.json) (`2024-09-18T16:35:17.877`)
|
||||
- [CVE-2024-8905](CVE-2024/CVE-2024-89xx/CVE-2024-8905.json) (`2024-09-18T16:35:18.640`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
380
_state.csv
380
_state.csv
@ -175554,7 +175554,7 @@ CVE-2021-31555,0,0,7de5df80bc06456a2bd06cb1ed2fa6bf25b8a0e66ee1e2ceff5a7504cc2b9
|
||||
CVE-2021-31556,0,0,93b949700d04612fa67f7aa21454bcfa0dedb54b45feb534dfde6a346bbdbf4e,2023-11-07T03:34:58.647000
|
||||
CVE-2021-31558,0,0,ceed4d2a05c41f9fdd58ce2921315e67a6e46f1c89b4c2da0bce257ffbc7f901,2021-12-28T14:54:32.527000
|
||||
CVE-2021-31559,0,0,c056101e3a724e5296c3096cffa3217710e8d3f22622b1fbc675682800b56fdf,2022-10-25T16:42:38.307000
|
||||
CVE-2021-3156,0,0,806c2a3a0ff7fe53659d566e9bdf18f925a9ebcb66e6a0ff40da7c6bfa4c4f40,2024-07-09T18:27:53.967000
|
||||
CVE-2021-3156,0,1,756a4c61ba757c306e336a56d1a3eabd3a978cd9871d60b7e3550598effb17de,2024-09-18T17:15:13.843000
|
||||
CVE-2021-31562,0,0,ac50e4387893ec363455949ced3c17ca407e9a27f3f2c3f523390c3482b094df,2022-01-28T15:55:53.923000
|
||||
CVE-2021-31566,0,0,801f1236a607222712dc7741b61bbdda3061d826b7fd22f878d0c5c45a130a15,2024-03-27T16:04:30.260000
|
||||
CVE-2021-31567,0,0,0da3da305c7b1718259a905dc09c36fc318ae57a531df276f807be7858b88fad,2022-02-03T17:09:44.553000
|
||||
@ -185165,7 +185165,7 @@ CVE-2021-44386,0,0,c7a8e786c9ce5934fc402773c471d2a12262151e8fc565444fc2144ac181f
|
||||
CVE-2021-44387,0,0,fabc139e1f85cfa88528c19fca0f1bc78eb0fe30fe316bdfaa7f89835abfac5f,2022-10-25T17:43:35.947000
|
||||
CVE-2021-44388,0,0,3dcfd88f5acdaf90a435be2f8258f09ae02ea037b0a541345e60e2924e1ecb14,2022-10-25T17:43:28.293000
|
||||
CVE-2021-44389,0,0,eab304468bce6b27476ecc311a2d45e089d60148a6143553219ed0a865fd93f0,2022-10-25T17:43:23.320000
|
||||
CVE-2021-4439,0,0,2877623506623609eaaf429f2f2cf99ff5181f0c0c48124e542d3322f8097bb1,2024-06-20T12:43:25.663000
|
||||
CVE-2021-4439,0,1,7496e4c229713a1108169323523b60c6f81ce22d5aa6968a0e27470dbbd3ded0,2024-09-18T16:34:18.960000
|
||||
CVE-2021-44390,0,0,66390a2bd3a7fe49801e32199ec52e7a2aefb72b4413e531f48a71660b19bcab,2022-10-25T17:43:18.373000
|
||||
CVE-2021-44391,0,0,5b977c68bde6a7b9ce717e629efa137c50bc8bdf7ace5dcd740bb98570d1f8ce,2022-10-25T17:43:13.387000
|
||||
CVE-2021-44392,0,0,df0247b73a347802891c2a1a6ad5403f865c16563cfef3bcb1fb92386b0bcdfd,2022-10-25T17:43:02.037000
|
||||
@ -187485,10 +187485,10 @@ CVE-2021-47613,0,0,642703d9671fc407abe219c3770e567651dc20dc07d591d5ba5177a9d5d4e
|
||||
CVE-2021-47614,0,0,ef802c1c34c90a0409b0849796fe5ab3fdfe8e1064cf9d9b5bcc370d68a7918d,2024-08-27T16:14:06.177000
|
||||
CVE-2021-47615,0,0,3bc3df92b69fdab3bdde99978f3d8804c002c34343decddd85839db0c37e920e,2024-06-20T12:43:25.663000
|
||||
CVE-2021-47616,0,0,df02274307ce6160ecca6b3896e04e852b158704d05111c568a6cd060f1afb3e,2024-08-27T16:13:59.120000
|
||||
CVE-2021-47617,0,0,174885baf195ea856ab0f44445ac6a3f70dd31281a9cea4d13f0e12108a3d3c2,2024-06-20T12:43:25.663000
|
||||
CVE-2021-47617,0,1,f701c4b9ceb190096ace90035e3ee735a9ba3198d4f5aae57c90972417326e44,2024-09-18T17:46:30.413000
|
||||
CVE-2021-47618,0,0,2a314532463f641de5a1abcd70cc0a94c3a5563bdb37f6cd3ebfada5f84160e6,2024-06-20T12:43:25.663000
|
||||
CVE-2021-47619,0,0,3423ea9cbab93af03ecb9855e0285f5e2851c0e4b6812bafeb4e82921247592c,2024-06-20T12:43:25.663000
|
||||
CVE-2021-47620,0,0,fb48237cc161b8d736f32b3c4687ae5c6d236eb8a2b8089bbf75bcca0c16df9e,2024-06-20T12:43:25.663000
|
||||
CVE-2021-47619,0,1,038ae55e86cea289a2c13d6822057614864308e714603d25972607093ce9572c,2024-09-18T17:08:45.593000
|
||||
CVE-2021-47620,0,1,eb4d580227848fa1a691113178ce258643d92e4b77639d956836ec159d2f88f5,2024-09-18T17:07:27.603000
|
||||
CVE-2021-47621,0,0,e2a12dc01cb26b616b467be0797cdc4becade42dc6473a1cfae1a845981be942,2024-08-19T17:35:03.327000
|
||||
CVE-2021-47622,0,0,1d63636624695cdf93325419218fd644932a974f7e674106d3329295d563b92a,2024-08-21T17:31:30.087000
|
||||
CVE-2021-47623,0,0,51281b2f0091c3f4d7a64df3b524258b3de520fa994b2caf678cd311e53f80eb,2024-07-16T13:43:58.773000
|
||||
@ -194663,12 +194663,13 @@ CVE-2022-25763,0,0,f36a89526be5572d2d9c611d221dd3b3c258194aac38cd956d5c0a334ae80
|
||||
CVE-2022-25765,0,0,bc5460bb4643fd4c858b78ef1f90248807fe33e394e3b9ca3e1285b35c5a0727,2023-11-07T03:44:49.920000
|
||||
CVE-2022-25766,0,0,9c9eff15468e46e0d8fd364a8a8ff59474a4c5800e69ce89b7195191e92ce00f,2023-08-08T14:21:49.707000
|
||||
CVE-2022-25767,0,0,9c7e47a7f32ad24819f31562ff54850c26f7314d814cab84c6713ce436000d52,2022-05-11T16:19:05.967000
|
||||
CVE-2022-25769,1,1,49c2fe6bbcc4dd18d3ac4c13713a4ad2cfb810bf9c9a1e9e202814edcb46964d,2024-09-18T15:15:13.060000
|
||||
CVE-2022-25769,0,0,49c2fe6bbcc4dd18d3ac4c13713a4ad2cfb810bf9c9a1e9e202814edcb46964d,2024-09-18T15:15:13.060000
|
||||
CVE-2022-2577,0,0,87c803484cf61dec9e54055b4599e6f4b1ddfe755fed9fabbd2408fb332046f5,2023-11-07T03:46:40.493000
|
||||
CVE-2022-25772,0,0,95d681186a9c51133bf3638b33bba1dd8f63cdc4f434660afa0e726ca2c437ec,2023-05-09T19:15:11.413000
|
||||
CVE-2022-25774,1,1,d128421aa7601ab16044dac15490c25c6c2e690412ad3801950f706eb5056b33,2024-09-18T15:15:13.253000
|
||||
CVE-2022-25775,1,1,2d1d71ffaee7c477f923babb3051dba7e000633b4437cb8d189bac24751d255c,2024-09-18T15:15:13.440000
|
||||
CVE-2022-25776,1,1,9fbe8029aae3d5b21da2ffbfb3fcbb3c0b1cccf869457ebde978fe0e2ec23da5,2024-09-18T15:15:13.620000
|
||||
CVE-2022-25774,0,0,d128421aa7601ab16044dac15490c25c6c2e690412ad3801950f706eb5056b33,2024-09-18T15:15:13.253000
|
||||
CVE-2022-25775,0,0,2d1d71ffaee7c477f923babb3051dba7e000633b4437cb8d189bac24751d255c,2024-09-18T15:15:13.440000
|
||||
CVE-2022-25776,0,0,9fbe8029aae3d5b21da2ffbfb3fcbb3c0b1cccf869457ebde978fe0e2ec23da5,2024-09-18T15:15:13.620000
|
||||
CVE-2022-25777,1,1,49e0e38926654b75fb3f04a59e2899d0c331df0eddbdcebb6c3062ad4ede895e,2024-09-18T16:15:04.980000
|
||||
CVE-2022-25778,0,0,d33a6c464736dc83925f8894577efd1831139b6d537692d92f0faae224736b0b,2022-05-11T18:44:34.810000
|
||||
CVE-2022-25779,0,0,4cc25f73bf46ee90d0c51c55921c8d5948f913da4b37f33496b30f1a0b932974,2022-05-11T18:46:38.337000
|
||||
CVE-2022-2578,0,0,b5c8c05b6b5124894234e43a50f3c3ee7f866a667a1b26bbcfea5883e5cf23dd,2022-08-05T15:57:17.487000
|
||||
@ -212253,19 +212254,19 @@ CVE-2022-48714,0,0,d3e55637265824378aa3c7bae71a7fa48c76755872399adfb8504da466ec1
|
||||
CVE-2022-48715,0,0,f18f19ec8c35a04457834d24c1dea742a22a4a63333ab01494f99ae0f13cdfc2,2024-06-20T12:43:25.663000
|
||||
CVE-2022-48716,0,0,1288d286656db17c43b8e3c9f6eb25225ae1da1a6ef842eb6115eda843ed17f2,2024-07-03T01:39:11.570000
|
||||
CVE-2022-48717,0,0,86a2a3ebc53327241887d545f56bda97dca42955623d95429ba56e19538b7f24,2024-06-20T12:43:25.663000
|
||||
CVE-2022-48718,0,0,29d0bc28b04857e3904355fbdbb3a7f30c84b05120a226cf7aa7386304ca27af,2024-06-20T12:43:25.663000
|
||||
CVE-2022-48719,0,0,f4d51b48d0dceb84a522e3aacc839d18f98a71faf7abac46c5bbdcfdb4b5afdf,2024-06-20T12:43:25.663000
|
||||
CVE-2022-48718,0,1,7640e71d116145a3f3baf171d8d00574222355d0ce42a26218a607f2bdb73992,2024-09-18T16:59:04.887000
|
||||
CVE-2022-48719,0,1,316edab43602fc55750f273da69e714df52365401eb5ac657e2fe8a4bcfe1f73,2024-09-18T16:58:08.113000
|
||||
CVE-2022-4872,0,0,9a9357361bb7ab0b9cd8fd203b7948e3be5bc59908cc06b6955da5855c1684a0,2023-11-07T03:59:09.100000
|
||||
CVE-2022-48720,0,0,90eecdc30f7ea6aa4c33f904804e5a2a970f90cd660766e7e51c0e99d0d283dc,2024-06-20T12:43:25.663000
|
||||
CVE-2022-48721,0,0,050d67aa22d23f52c6bfdf27fb0dc60c5583d1190669a1dd29e753c31f9f5371,2024-06-20T12:43:25.663000
|
||||
CVE-2022-48722,0,0,ea737430afb48ab135cc3263437bb0afa8bac793959b1846321b80c9fbaa56b9,2024-06-20T12:43:25.663000
|
||||
CVE-2022-48723,0,0,74fc8411c4c047c20c11517d9586a3cbcfa15e2c7c8edd39563e37dfe8b56993,2024-06-20T12:43:25.663000
|
||||
CVE-2022-48724,0,0,247d020517680aed066af9ab23965c200dc5d8430f0241c7ac512d609f9a87ee,2024-06-20T12:43:25.663000
|
||||
CVE-2022-48725,0,0,bb33091cc6e03426d56dc75e8241d9fedd164f2b50b31af14d7aa34a115be593,2024-06-20T12:43:25.663000
|
||||
CVE-2022-48726,0,0,13d9e26f791db435236ed77456318001cd395744c82ddac4d9bd60d5f2aaf8e9,2024-06-20T12:43:25.663000
|
||||
CVE-2022-48723,0,1,31cdc2db64a35923c1a712c4774ac8edcb2377a04366b4a6056b99d2c47c0aca,2024-09-18T17:46:50.220000
|
||||
CVE-2022-48724,0,1,7b6cf7dc90513be1fa438fe83b37531e293362add72b90daae0676b2be96e5bc,2024-09-18T16:19:25.430000
|
||||
CVE-2022-48725,0,1,133e21ffa0572c196cd2e5655d8a14e74ebedf557d8de3be913efb6c476781f8,2024-09-18T16:10:22.077000
|
||||
CVE-2022-48726,0,1,f0c473cd5b90d99544fd8497f3d5a186d1f94df3a66471f05e08b5c89f94da9f,2024-09-18T16:09:15.723000
|
||||
CVE-2022-48727,0,0,f49ef1fb21fb3a5154a951dedd828fe63b6b99b0d08022a9c1020655344e026f,2024-06-20T12:43:25.663000
|
||||
CVE-2022-48728,0,0,0ee1a9100f0733ab20840f81047b6476227058b77a458193e2d7dd0e521f2898,2024-06-20T12:43:25.663000
|
||||
CVE-2022-48729,0,0,ad165dff3bcf3425e94d56121d561de71f8056af16b12ad5ad3979c56f1e6474,2024-06-20T12:43:25.663000
|
||||
CVE-2022-48728,0,1,4a8f54abce7793b55609eeea23d6695dfc0efb1124e2970f715dffaecbf7ce80,2024-09-18T16:07:21.097000
|
||||
CVE-2022-48729,0,1,2ec8bbf1a94ac413f484d3017e3caf03362964faaf54596abc7c0a0fcb29209f,2024-09-18T16:06:21.790000
|
||||
CVE-2022-4873,0,0,9266192fd5e17bc961f9039902c555ad69216beb20dfd48249e4f37501df9445,2023-11-07T03:59:09.310000
|
||||
CVE-2022-48730,0,0,927e7fae9500f7d1d76c595495e5d68ddde80a2da0a22ed9d01a96f4a588ddf8,2024-06-20T12:43:25.663000
|
||||
CVE-2022-48731,0,0,f2137fdaa4becb4ed0190377e8df6f4b116a98b0fb57b5a4ce7886128d2a2fb4,2024-06-20T12:43:25.663000
|
||||
@ -212287,15 +212288,15 @@ CVE-2022-48745,0,0,41db11ed51a619f18bf8566d3a9646fcce3f1ca7e8c8d1b8f24a053db7635
|
||||
CVE-2022-48746,0,0,e0fa12e9f2d5b9a8bc1db423dcc6c83d2f1745d072ea799cb50d0201d1a5ab3d,2024-06-20T12:43:25.663000
|
||||
CVE-2022-48747,0,0,aa1cb9efcca7c13891b9cc3d8cd2d307d24734d06b6fc90bb25e227010e2f6e5,2024-07-03T01:39:13.487000
|
||||
CVE-2022-48748,0,0,8ceaaf6df6e057efbae67972ff0fd4ea5b5ca2de3f69a0edbfbd5849c7be6738,2024-07-03T01:39:14.287000
|
||||
CVE-2022-48749,0,0,00b215b6ee07fdcbfc058e227b96710b2be12391f1bea669a0a9b96b66e61bfa,2024-06-20T12:43:25.663000
|
||||
CVE-2022-48749,0,1,a342016d18ed2373bdc88047bdeebb213977ad81378c82786c0d196af2420260,2024-09-18T16:05:04.623000
|
||||
CVE-2022-4875,0,0,0248cb7e88a64eaf1154285e30f722a7ce5832425ab7216a34bbdccf82920b19,2024-05-17T02:17:00.353000
|
||||
CVE-2022-48750,0,0,e83e1b8ccbc49d38eaf206de239f3f32cc3ed6a97c7ddcc921f710c0e2c28341,2024-06-24T16:15:10.050000
|
||||
CVE-2022-48750,0,1,55afd22040c9a204644583104b9b0ba5a5b6f53a98ecd72808a82376e1affbba,2024-09-18T16:04:21.597000
|
||||
CVE-2022-48751,0,0,be32087ff7da3afc8bbd26738891fe8c820998963c64317e4b1afedf242a7fee,2024-06-20T12:43:25.663000
|
||||
CVE-2022-48752,0,0,38cf75d35e9d1cb0a011fd7ff84616d4bbbc7cc6cd1186a506f033bb40c015f3,2024-06-20T12:43:25.663000
|
||||
CVE-2022-48753,0,0,37ca66b2c74f69f4b107b0ee874cb120fc105d7ed208fcf6a99eb46d7672250f,2024-06-20T12:43:25.663000
|
||||
CVE-2022-48753,0,1,fee8018edcf35100134efb8c5bdeee9c5abc917f17d652dbef1321e8083108a6,2024-09-18T16:03:25.617000
|
||||
CVE-2022-48754,0,0,5e2ca936305382512d4f653834ab56313ed29fa4ae7f0616f9271b8d0d1471f0,2024-07-03T01:39:15.380000
|
||||
CVE-2022-48755,0,0,30010b42de97147ea0203eebb224554207374f1ac961584225a137f3aa742eee,2024-06-20T12:43:25.663000
|
||||
CVE-2022-48756,0,1,ba335ca06870d086c208a4b61d6e4ff2c3db981eb9732fbe19a2518767ecf69b,2024-09-18T15:59:50.983000
|
||||
CVE-2022-48756,0,0,ba335ca06870d086c208a4b61d6e4ff2c3db981eb9732fbe19a2518767ecf69b,2024-09-18T15:59:50.983000
|
||||
CVE-2022-48757,0,0,67cd6f9d2cbeafd944b878e5f6949333e743aa9eebb191d8f592fea932734deb,2024-06-20T12:43:25.663000
|
||||
CVE-2022-48758,0,0,2390cac20b5fb952629cce9f98f33922ffc2f9637f8248dc4bb4782f5e162dcc,2024-06-20T12:43:25.663000
|
||||
CVE-2022-48759,0,0,7962889d3c432d97af1edc38f6b3670b53bb47c561e33f1c213dfd68840532fe,2024-06-20T12:43:25.663000
|
||||
@ -221442,11 +221443,11 @@ CVE-2023-28447,0,0,6367186976f27827261c19bd8919f6ea82651685bddf6890d58adc5cfc17d
|
||||
CVE-2023-28448,0,0,ebc63ef0aa5992d3b1b222c457f8387f360915a33d538a72c217fd6a5a4cb59f,2023-11-07T04:10:37.130000
|
||||
CVE-2023-2845,0,0,0fa9122be7638e783829920da4cebd575a75f9f5dbfa9888210728f2e9226a90,2023-05-30T21:57:09.587000
|
||||
CVE-2023-28450,0,0,5c2253d4a287fe441625ee366deb367c57e306635c3cd3c5dc9109a263b491de,2023-11-07T04:10:37.277000
|
||||
CVE-2023-28451,1,1,170966e5e173d4e65f372992311e8581a69664e2757bb13f7362729781a9ce18,2024-09-18T15:15:13.900000
|
||||
CVE-2023-28452,1,1,75ad47e85685d8552bee5909bb140451cfae4a0b1e8874a03a2dc5e39b6b73ec,2024-09-18T15:15:13.957000
|
||||
CVE-2023-28455,1,1,ccfc9fec366d02b520fd6a525e39b67a89882c218eac90da8171f00b7cf8aae8,2024-09-18T15:15:14.020000
|
||||
CVE-2023-28456,1,1,16af9b073234d9431a66dff2494f29e4e5942374fcaebea8a3e86268bc8de8ea,2024-09-18T15:15:14.083000
|
||||
CVE-2023-28457,1,1,7c664c02f976855c7c8bb4e46f66badc003fbae5b354bb1525ddecad4d08db9e,2024-09-18T15:15:14.143000
|
||||
CVE-2023-28451,0,0,170966e5e173d4e65f372992311e8581a69664e2757bb13f7362729781a9ce18,2024-09-18T15:15:13.900000
|
||||
CVE-2023-28452,0,0,75ad47e85685d8552bee5909bb140451cfae4a0b1e8874a03a2dc5e39b6b73ec,2024-09-18T15:15:13.957000
|
||||
CVE-2023-28455,0,0,ccfc9fec366d02b520fd6a525e39b67a89882c218eac90da8171f00b7cf8aae8,2024-09-18T15:15:14.020000
|
||||
CVE-2023-28456,0,0,16af9b073234d9431a66dff2494f29e4e5942374fcaebea8a3e86268bc8de8ea,2024-09-18T15:15:14.083000
|
||||
CVE-2023-28457,0,0,7c664c02f976855c7c8bb4e46f66badc003fbae5b354bb1525ddecad4d08db9e,2024-09-18T15:15:14.143000
|
||||
CVE-2023-28458,0,0,ef73a1fa781dc427433a4344f064cf2c5d295719475229911a534302acd48e97,2023-05-04T12:38:48.727000
|
||||
CVE-2023-28459,0,0,ff6d9b0d2a61636a2216f5ca3eebb22b60bf4cdf2177e93c8efd3097129af8b8,2023-05-04T12:38:31.430000
|
||||
CVE-2023-2846,0,0,9aab683976373505e029cb617089a2ec5cce34a049b1b52d471de12eae663bf2,2023-07-10T18:51:01.550000
|
||||
@ -227944,9 +227945,9 @@ CVE-2023-37228,0,0,643ba6d022c49330496a6c23ea43a1b4794516f1d1a88ce155ebc80364021
|
||||
CVE-2023-37229,0,0,0bf9ee820ee2e4bae8a90eb97071f74d16b3541ed4020bba6ca4e1b6978a80cf,2024-09-10T17:35:05.483000
|
||||
CVE-2023-37230,0,0,16174e82af28a8c8963476ae3fb392aa6acdeee683bd62908e45c74a0ebfcfa6,2024-09-10T17:35:06.247000
|
||||
CVE-2023-37231,0,0,757cf6f1665639ceecb704c0774fd206eedf5d3bd12cf5ae4032e15afcc04854,2024-09-10T17:35:07.017000
|
||||
CVE-2023-37232,0,1,9bbc1589348f85aa082942bf7fa6ae735252fd46b1bd07a607ac32b8b94abb97,2024-09-18T15:55:43.113000
|
||||
CVE-2023-37233,0,0,120068bb041f7af670705dfe493d36e42df20bf51600bd27072eed84ea0e9b22,2024-09-10T21:35:02.950000
|
||||
CVE-2023-37234,0,0,a4892170539d390c3ff9f5ad886d03b91d4cc152d6eb72dfb908c93a7af7b078,2024-09-11T15:35:04.903000
|
||||
CVE-2023-37232,0,0,9bbc1589348f85aa082942bf7fa6ae735252fd46b1bd07a607ac32b8b94abb97,2024-09-18T15:55:43.113000
|
||||
CVE-2023-37233,0,1,255b420d42e0ea95c75fa873cdfc752a4caaa6059c742b38d452988c30760f93,2024-09-18T16:10:23.187000
|
||||
CVE-2023-37234,0,1,e11780f5438cafc52856a9c5ca2622f3b4e2e3fa3f837a68eb5e6fb9854bde46,2024-09-18T16:05:50.257000
|
||||
CVE-2023-37237,0,0,29a5f3af5199aad5af4f0fdd6511141f4d2b435f709fd260dd5041911ad086ec,2023-07-07T16:00:14.390000
|
||||
CVE-2023-37238,0,0,8c5d217b62a8efe0c30f15bea3a5d6293d9c6e0abe28ac04e3704ef99c34ccb0,2023-07-12T22:51:22.043000
|
||||
CVE-2023-37239,0,0,2a2a4e372334e66e5f41ce012a4e3ce6edee956c498345781b72b50751b6e2f3,2023-07-12T18:57:30.653000
|
||||
@ -233184,7 +233185,7 @@ CVE-2023-4409,0,0,b72041b7f9cdfeef3718fabf187518ca48bca6924a33bd70ada5c1504adb23
|
||||
CVE-2023-44090,0,0,47c75449add0b7fa37849b999ed6e0e6a64eb722b158a9f4459f02eb302bcd2e,2024-03-20T13:00:16.367000
|
||||
CVE-2023-44091,0,0,b03d92935285487dd076e8aadcfbe0c313379212aa4e98b4cdcf457770b8f294,2024-03-20T13:00:16.367000
|
||||
CVE-2023-44092,0,0,aa6e6f00f8a3f49239128f4a154a6bec06baf6c601d319d2e607057c67bb62f3,2024-03-20T13:00:16.367000
|
||||
CVE-2023-44093,0,0,13b01a23ebec6e0887a12824c4a172886d9269a32c136bffee22057cb7c6afc0,2023-10-16T19:18:41.647000
|
||||
CVE-2023-44093,0,1,e6da90eaebeb20364420a7cc2f5826477bc43f97ab85f7cdf1d00f3dc4eafb81,2024-09-18T16:35:02.680000
|
||||
CVE-2023-44094,0,0,2e86b5f5609b87be9f2024ac48f911303bc99dfc7d7b51a18450901077de9b3e,2023-10-17T20:15:37.950000
|
||||
CVE-2023-44095,0,0,20cd361979a28419df77e65a9d79a673c474997897db21263296b74b0b7b429c,2023-10-18T19:56:03.400000
|
||||
CVE-2023-44096,0,0,376479ad73f7acdbf488fb24d5d155cb6eaa77c417dfeb1a01ffe235128cbbed,2023-10-16T16:44:13.867000
|
||||
@ -233198,7 +233199,7 @@ CVE-2023-44102,0,0,cb2c868cef22e209bfc7e8d44d79d4722862c6534c56fc66469929f763337
|
||||
CVE-2023-44103,0,0,36561301bd440c63608dff916e3e1c64b9e4381f5d67ed6d05df42070870c437,2023-10-16T14:09:47.430000
|
||||
CVE-2023-44104,0,0,741ba87bf07130e8062c2028b84be5fff78da6b429799f8e51783319789c4a54,2023-10-16T14:12:54.343000
|
||||
CVE-2023-44105,0,0,48f70b07e55100e2c888adbd99b3bca701ceb55c7df33fd1d42bf5b1ee2317fe,2023-10-13T20:05:12.087000
|
||||
CVE-2023-44106,0,0,f73d098de6ace271290166a7c33237e318dd36252000c469186fd9b47d0acac3,2023-10-15T01:47:39.467000
|
||||
CVE-2023-44106,0,1,6213f30ff4b50712e15cd496746091d5f8c742003a5f8ddf4cabe372228cf928,2024-09-18T16:35:04.117000
|
||||
CVE-2023-44107,0,0,539be1c7479f708064fe24db4c75d1cfe383994d92e0303441ac804c74817aa4,2023-10-15T01:38:58.053000
|
||||
CVE-2023-44108,0,0,4d0e8048b91bebdd1711ad1e3a3e93e8b14e509db45311931d92fbfe7ac430a5,2023-10-15T01:44:06.033000
|
||||
CVE-2023-44109,0,0,7c8fba7c91631df7d6a54ae11b9d62d838ed25609d02c64b3e08c5c02ad588df,2024-02-01T01:09:11.587000
|
||||
@ -235246,6 +235247,7 @@ CVE-2023-47100,0,0,ff970e0bbee0da60d74f669b9fb5cb216763ce026187e12f8579e05200812
|
||||
CVE-2023-47101,0,0,8e6edd25cda6a591046fe983528e0a18fc64caa5bb33128c51155cd1de08a87e,2024-09-09T21:35:04.033000
|
||||
CVE-2023-47102,0,0,bb32c5cb2274f695bb77b1dcabc1de081035b480bea1daa5bd9c69bcfd55cd77,2024-09-05T15:35:18.967000
|
||||
CVE-2023-47104,0,0,a37a236519348a3781a21a1de0f9441014abbe03c8d36d3b50f8a015a7854ef5,2024-09-09T21:35:05.027000
|
||||
CVE-2023-47105,1,1,ed4d429e6fc34c3e324554afa56e02385162776339c8a283c4c19e5411e48ae3,2024-09-18T17:15:18.277000
|
||||
CVE-2023-47106,0,0,274f9f8003b54fe6ff33410b194e51c238d7f0e1d1e6019e27d3ee23d36974d3,2023-12-07T21:01:57.647000
|
||||
CVE-2023-47107,0,0,62b3eb30757fd38e881b6505c45a9191d7dd7c665bbdd43f636c7f315820da31,2023-11-16T14:27:03.320000
|
||||
CVE-2023-47108,0,0,e1878aaf9ec42eaeb46d72dc6612bfb6a1c8ce4d93ded369cdc526dd853945a6,2023-11-20T19:34:26.493000
|
||||
@ -236777,7 +236779,7 @@ CVE-2023-49195,0,0,239193d980cfd4324773344b0a932e91919adfb3eac7f01f4cac2dbd41501
|
||||
CVE-2023-49197,0,0,87fee8cafa9bc5eebe7f1b14f5bce64e09cfb3c60a34a1183c07dca6faf91be6,2023-12-21T17:26:04.913000
|
||||
CVE-2023-49198,0,0,ac19da202070e70cbe33e0e7f0d8ec06a1ef23f683cbf1d8c569adca8420cbd3,2024-08-23T16:56:50.683000
|
||||
CVE-2023-4920,0,0,750757ff4ce213882eeb3b1cbdf16aac49f85b0688b4847bcc0bc2036d6471f3,2023-11-07T04:23:10.193000
|
||||
CVE-2023-49203,1,1,5d66f4e0a7f6892566206caf2d40cd3786f36a7125124f48fe8018bd3fa054d9,2024-09-18T15:15:14.513000
|
||||
CVE-2023-49203,0,0,5d66f4e0a7f6892566206caf2d40cd3786f36a7125124f48fe8018bd3fa054d9,2024-09-18T15:15:14.513000
|
||||
CVE-2023-49208,0,0,2a9e047f121c5391d797b355b9800029d03397ffa5606d306303c89458886565,2023-11-30T20:47:45.190000
|
||||
CVE-2023-4921,0,0,f6caa99aaa8bd9b77f1b8ba6041c425c337fb5660ab8fed5a711e5fb5a689b43,2024-08-26T16:06:55.377000
|
||||
CVE-2023-49210,0,0,9b911dd5ab2028f37c1c50f777fb24f7d718b5c731a8746dbf32546fd1c0fe16,2024-08-02T22:16:01.363000
|
||||
@ -241281,9 +241283,9 @@ CVE-2024-0103,0,0,eebac6a0b28b06a0ab4b619fce7f6cf8faf596bcdcd276c9218b76333b76bf
|
||||
CVE-2024-0104,0,0,ea7f385fc9a8d99548e260cd2bb85f1591e8d85d5187529e2ca94577bba79fd1,2024-09-11T17:40:35.430000
|
||||
CVE-2024-0107,0,0,825deb4e82dfaf0b98f1fe2772df92223b06ae0e932511c6a748f272f8b997c9,2024-09-17T12:10:22.063000
|
||||
CVE-2024-0108,0,0,66f975a41bb5f0143618b7229f9a8d90fdad314725e86f6c633b765a762e46f3,2024-09-16T19:27:19.833000
|
||||
CVE-2024-0109,0,1,e71ce20ade0f58519f6e876bddeb521bd39d5584f365e91fb0be43461eeae6aa,2024-09-18T15:18:06.117000
|
||||
CVE-2024-0110,0,1,9d3ea028d3dde672136c07e8d052ddc3ffee906b5f050cc97127e00fa31f77fb,2024-09-18T15:16:37.990000
|
||||
CVE-2024-0111,0,1,745fe4fa8ac2297a871814d16ec0cf5bf56a98c3501448d82308b7dc75a74f20,2024-09-18T15:22:14.727000
|
||||
CVE-2024-0109,0,0,e71ce20ade0f58519f6e876bddeb521bd39d5584f365e91fb0be43461eeae6aa,2024-09-18T15:18:06.117000
|
||||
CVE-2024-0110,0,0,9d3ea028d3dde672136c07e8d052ddc3ffee906b5f050cc97127e00fa31f77fb,2024-09-18T15:16:37.990000
|
||||
CVE-2024-0111,0,0,745fe4fa8ac2297a871814d16ec0cf5bf56a98c3501448d82308b7dc75a74f20,2024-09-18T15:22:14.727000
|
||||
CVE-2024-0113,0,0,30ea5d78769c707d77ab5e88a1087a3bf4be86e316909498095d743b94b19e08,2024-09-11T17:34:37.667000
|
||||
CVE-2024-0115,0,0,90525cb6d1df6f268f81b58c98763d2a78ce3017a9779cdc04eec9f2dd2bca4d,2024-09-11T17:24:27.393000
|
||||
CVE-2024-0151,0,0,e688008e47f7f2b2995cf15f9fce74bb525b3898f5e47db0ad5b6ce2aa86a255,2024-08-09T19:35:02.910000
|
||||
@ -243808,8 +243810,8 @@ CVE-2024-21140,0,0,4152c752f631d64c27b06e5115099663133590db63a2cfff7e518248f96c3
|
||||
CVE-2024-21141,0,0,f6351581c68c52a0fcae66a77dd601ef15127184835385b5e0479a9d14461be6,2024-08-28T17:58:43.457000
|
||||
CVE-2024-21142,0,0,f819d3a8ba6f5d3f6da22376ee3aac7e9c1012257d5ae28b11f63731d1547f92,2024-07-17T13:34:20.520000
|
||||
CVE-2024-21143,0,0,00d3158bf58fdef1b0ea359eb4fd1877d407a38c8141a35ed2d92f7d5fd7ff90,2024-07-17T13:34:20.520000
|
||||
CVE-2024-21144,0,1,47e09fd5fcc37ec82730b14b6c143601a9e80d79dcae6217efe43cc12a904fd4,2024-09-18T15:15:42.963000
|
||||
CVE-2024-21145,0,1,a189157c8426d8ad6971ad9843f06a52e2ba533f8f4d8f95883f50413386394e,2024-09-18T15:16:36.450000
|
||||
CVE-2024-21144,0,0,47e09fd5fcc37ec82730b14b6c143601a9e80d79dcae6217efe43cc12a904fd4,2024-09-18T15:15:42.963000
|
||||
CVE-2024-21145,0,0,a189157c8426d8ad6971ad9843f06a52e2ba533f8f4d8f95883f50413386394e,2024-09-18T15:16:36.450000
|
||||
CVE-2024-21146,0,0,c75b160e4e3c99880ff62d36e7e801ade0e912daea3b1e5430c44ac99095338a,2024-07-17T13:34:20.520000
|
||||
CVE-2024-21147,0,0,d581db22cc70629aa91eb51c988684be29e1ff1430ebd94500067b05edd568f0,2024-08-13T00:49:47.367000
|
||||
CVE-2024-21148,0,0,5e054bb367a8e9656b43550b5962eaa7f739f26520f7472e3f916549fb13304b,2024-08-28T16:56:18.687000
|
||||
@ -245791,8 +245793,8 @@ CVE-2024-23911,0,0,fdddcb19f4466c54e569787b1df836a5978efd401f095a2d3642663fd0df9
|
||||
CVE-2024-23912,0,0,210cf35daf58146f5a2ec254acd74292d26b1663729ba2d0483f8b346b0042f9,2024-05-03T12:48:41.067000
|
||||
CVE-2024-23913,0,0,32316a55a8e1da81d9abb95b33e0db8e8724ab28f77e16dfed40dc690a6cb334,2024-05-03T12:48:41.067000
|
||||
CVE-2024-23914,0,0,ef84d8471f9b2e6f74b964fa20e89b8542f1e03d544d051711757b2a10104df2,2024-05-03T12:48:41.067000
|
||||
CVE-2024-23915,1,1,bfaf13cc3d81ee197c7c42941f9ada8654f71cd3575d80c6205f4892fac909df,2024-09-18T14:15:12.580000
|
||||
CVE-2024-23916,1,1,e0f51db3387bcf7f07716f24446a7c339e129071ba14113b232fe38f391ff77d,2024-09-18T14:15:12.790000
|
||||
CVE-2024-23915,0,0,bfaf13cc3d81ee197c7c42941f9ada8654f71cd3575d80c6205f4892fac909df,2024-09-18T14:15:12.580000
|
||||
CVE-2024-23916,0,0,e0f51db3387bcf7f07716f24446a7c339e129071ba14113b232fe38f391ff77d,2024-09-18T14:15:12.790000
|
||||
CVE-2024-23917,0,0,f3236f3886ac3a298029762564187aed866f84d01e9365abb654a21b0d966829,2024-02-09T01:05:22.180000
|
||||
CVE-2024-2392,0,0,a1f238224b889878ea8101bb03eb85f7363cbe3f032b78dbb59584257d093c6d,2024-03-22T12:45:36.130000
|
||||
CVE-2024-2393,0,0,df74eedb2cf97a7cc02bf0873514b7acec290c6b3a77795cc7def5200bf6c3d3,2024-05-17T02:38:12.530000
|
||||
@ -249335,9 +249337,9 @@ CVE-2024-28978,0,0,4f3d3e4cd04d1637d7e0c8567c10bca3a3eac8362091f1c3bdfba2d85e114
|
||||
CVE-2024-28979,0,0,94e9b6c95a24be8b1cdd5a15709ed8083c2893ee5b5273129b8771382be39a15,2024-08-20T17:15:18.597000
|
||||
CVE-2024-2898,0,0,7dabbc345008f13b8373a1a2d71ee4344db041576d9ae3f0290950d4a3a3f396,2024-05-17T02:38:36.130000
|
||||
CVE-2024-28981,0,0,cd4c5692c9a70928a3c82dd2dfe70b15e0b1849d79bf5c6ce297f02b6b1c1728,2024-09-12T12:35:54.013000
|
||||
CVE-2024-28982,0,1,a19015356d660d2e2e0aa0476b84c95e664ecbb510badb624ee4eb55091f610d,2024-09-18T14:36:53.710000
|
||||
CVE-2024-28983,0,1,703d0fea3e992e6c157faf14895b95484e69f73d18d43a1bdd6448ade19b1d58,2024-09-18T14:36:16.267000
|
||||
CVE-2024-28984,0,1,061a156a04ab4e4c76d21331d25299f4cff837eab5762774bbd4e38e96a6350a,2024-09-18T15:22:51.163000
|
||||
CVE-2024-28982,0,0,a19015356d660d2e2e0aa0476b84c95e664ecbb510badb624ee4eb55091f610d,2024-09-18T14:36:53.710000
|
||||
CVE-2024-28983,0,0,703d0fea3e992e6c157faf14895b95484e69f73d18d43a1bdd6448ade19b1d58,2024-09-18T14:36:16.267000
|
||||
CVE-2024-28984,0,0,061a156a04ab4e4c76d21331d25299f4cff837eab5762774bbd4e38e96a6350a,2024-09-18T15:22:51.163000
|
||||
CVE-2024-28986,0,0,1bc724868f1fc8a3c45a5557a2e0154a8318c8e26360517fdaccaced6288454f,2024-08-16T15:04:28.150000
|
||||
CVE-2024-28987,0,0,a8b388aa0866daa044867e0e7549769a8c4ba15acabd6bd0464b05f5ad13c511,2024-08-22T12:48:02.790000
|
||||
CVE-2024-2899,0,0,0be0fb50fdcc13228c9b49554460e4a306be4c6e83ee7f9bfb94b945f4f9e595,2024-05-17T02:38:36.220000
|
||||
@ -250875,44 +250877,44 @@ CVE-2024-31160,0,0,df48ab606466bd66cd539890b6337283ccfce4c5ec6123b8878b9c85f80b7
|
||||
CVE-2024-31161,0,0,e2a703e9c6723f5d19e07dd73456c0b2e468812b0ceb5c32a330b1990e29f3ea,2024-08-16T20:25:11.357000
|
||||
CVE-2024-31162,0,0,927e844bb935e8a83ed32cc3c84a6f15334c1e57e0cf01b6b414adaae6ba411c,2024-06-17T12:42:04.623000
|
||||
CVE-2024-31163,0,0,4c747f1ff7fba8b05c1cafd42ad5f820c8955e2e4c4106c43c9e7bc300a75bf4,2024-06-17T12:42:04.623000
|
||||
CVE-2024-31164,1,1,c31b82645418851da3e0edabc7e4d5071eabe5f845fbd8f4f6b205109747c4b6,2024-09-18T14:15:12.967000
|
||||
CVE-2024-31165,1,1,9d05742e13e78115d4d423bb99553d2fe3001a9e5466a8b01f0828e634ebacd7,2024-09-18T14:15:13.147000
|
||||
CVE-2024-31166,1,1,4bea6bd1219047d024cc0579e0b9437ed45429ed986b56a128972b83fbbc9f2b,2024-09-18T14:15:13.327000
|
||||
CVE-2024-31167,1,1,15a65f49b8557ea77743da49f4df4c0dc27f1439a2be849fb2c9af7d7f116de2,2024-09-18T14:15:13.507000
|
||||
CVE-2024-31168,1,1,540cfb1c83f1df566d69c3293f51799c1b055bd30a97afbddbbe0c9121df35e5,2024-09-18T14:15:13.683000
|
||||
CVE-2024-31169,1,1,af81bab79f7fabeaef003625021ed74f5891103d1fe91b0ecbf45dc1e74e94a6,2024-09-18T14:15:13.860000
|
||||
CVE-2024-31164,0,0,c31b82645418851da3e0edabc7e4d5071eabe5f845fbd8f4f6b205109747c4b6,2024-09-18T14:15:12.967000
|
||||
CVE-2024-31165,0,0,9d05742e13e78115d4d423bb99553d2fe3001a9e5466a8b01f0828e634ebacd7,2024-09-18T14:15:13.147000
|
||||
CVE-2024-31166,0,0,4bea6bd1219047d024cc0579e0b9437ed45429ed986b56a128972b83fbbc9f2b,2024-09-18T14:15:13.327000
|
||||
CVE-2024-31167,0,0,15a65f49b8557ea77743da49f4df4c0dc27f1439a2be849fb2c9af7d7f116de2,2024-09-18T14:15:13.507000
|
||||
CVE-2024-31168,0,0,540cfb1c83f1df566d69c3293f51799c1b055bd30a97afbddbbe0c9121df35e5,2024-09-18T14:15:13.683000
|
||||
CVE-2024-31169,0,0,af81bab79f7fabeaef003625021ed74f5891103d1fe91b0ecbf45dc1e74e94a6,2024-09-18T14:15:13.860000
|
||||
CVE-2024-3117,0,0,35e12b7e221f89a241b3455a68aa778ef5d3a027d9a06e657b81a15f70aaf730,2024-05-17T02:39:43.503000
|
||||
CVE-2024-31170,1,1,ca418f5911b1e212ec8914bce681c4686729e9c3db178f57fec894c541a1840b,2024-09-18T14:15:14.037000
|
||||
CVE-2024-31171,1,1,d768219951f605bd690e1e7d362d130553932e51a761b64fc6d5a7dbab9a2760,2024-09-18T14:15:14.210000
|
||||
CVE-2024-31172,1,1,01c25fc4a52950f8612e98e64d2b01a58f3b33c5aa8f48f4c31bdf2c4705584f,2024-09-18T14:15:14.387000
|
||||
CVE-2024-31173,1,1,4a949cd93d1a79573ff33bf547957ff75f4ecffdaf5b2a19916f002234bb2062,2024-09-18T14:15:14.557000
|
||||
CVE-2024-31174,1,1,d27a64f748aeadd7bfe99d4647b6e68131695ff559348e3b46a20768f7159d5d,2024-09-18T14:15:14.730000
|
||||
CVE-2024-31175,1,1,6cde8b626cae2eb202493369da7ff4bbbe87b3b81dde198d24fbae8afe4345f5,2024-09-18T14:15:14.927000
|
||||
CVE-2024-31176,1,1,b8a95593f7db06f8652a428962955cffc0e1a960bf44c175d377ef6605d8618c,2024-09-18T14:15:15.100000
|
||||
CVE-2024-31177,1,1,51670217cf9d2ae9f802d269dc598f80bf1f0f2ba1915d8ba50dd6275d98c0bf,2024-09-18T14:15:15.283000
|
||||
CVE-2024-31178,1,1,9d0f2245d96562f70f54ac79257cfc07d1f77e249c9ed1d245c44226a6cae37c,2024-09-18T14:15:15.460000
|
||||
CVE-2024-31179,1,1,70619dc93c7aede9d3ae9833f26080d27bca0532d07260995432933a0d055494,2024-09-18T14:15:15.633000
|
||||
CVE-2024-31170,0,0,ca418f5911b1e212ec8914bce681c4686729e9c3db178f57fec894c541a1840b,2024-09-18T14:15:14.037000
|
||||
CVE-2024-31171,0,0,d768219951f605bd690e1e7d362d130553932e51a761b64fc6d5a7dbab9a2760,2024-09-18T14:15:14.210000
|
||||
CVE-2024-31172,0,0,01c25fc4a52950f8612e98e64d2b01a58f3b33c5aa8f48f4c31bdf2c4705584f,2024-09-18T14:15:14.387000
|
||||
CVE-2024-31173,0,0,4a949cd93d1a79573ff33bf547957ff75f4ecffdaf5b2a19916f002234bb2062,2024-09-18T14:15:14.557000
|
||||
CVE-2024-31174,0,0,d27a64f748aeadd7bfe99d4647b6e68131695ff559348e3b46a20768f7159d5d,2024-09-18T14:15:14.730000
|
||||
CVE-2024-31175,0,0,6cde8b626cae2eb202493369da7ff4bbbe87b3b81dde198d24fbae8afe4345f5,2024-09-18T14:15:14.927000
|
||||
CVE-2024-31176,0,0,b8a95593f7db06f8652a428962955cffc0e1a960bf44c175d377ef6605d8618c,2024-09-18T14:15:15.100000
|
||||
CVE-2024-31177,0,0,51670217cf9d2ae9f802d269dc598f80bf1f0f2ba1915d8ba50dd6275d98c0bf,2024-09-18T14:15:15.283000
|
||||
CVE-2024-31178,0,0,9d0f2245d96562f70f54ac79257cfc07d1f77e249c9ed1d245c44226a6cae37c,2024-09-18T14:15:15.460000
|
||||
CVE-2024-31179,0,0,70619dc93c7aede9d3ae9833f26080d27bca0532d07260995432933a0d055494,2024-09-18T14:15:15.633000
|
||||
CVE-2024-3118,0,0,b601d08053b91d1b775fc21940190bf1fa2c378ab81a4eb84232fb172e159127,2024-05-17T02:39:43.597000
|
||||
CVE-2024-31180,1,1,cfacdba32ba604792dde61ea5192bd3f0a68f3fbb29ed64cf58dfe7831d1f419,2024-09-18T14:15:15.820000
|
||||
CVE-2024-31181,1,1,835c2c118ecc75a224ce2ae148955df018fed2deac0092ed030ea33c2a75721d,2024-09-18T14:15:16
|
||||
CVE-2024-31182,1,1,c950fadc93e3ea16ef98cfe6a331915a214b53e804ba89a6f7ab843515de72d6,2024-09-18T14:15:16.193000
|
||||
CVE-2024-31183,1,1,35c375a6d68274d7c3eb49021a7356a3af376af0ffc335c06845584d31d29b26,2024-09-18T14:15:16.377000
|
||||
CVE-2024-31184,1,1,b7c59920550422dd2bd0d8e2e7ffe3978ae0b9d37ba35120d4fca1e99fe9546a,2024-09-18T14:15:16.550000
|
||||
CVE-2024-31185,1,1,11d4d1e3baafe683ba9ec71aae73f9602dfc15b6d6ba9731880b66695bd26581,2024-09-18T14:15:16.727000
|
||||
CVE-2024-31186,1,1,3dfad5d77e47c755381a80fcf6aef35eccd2a92f4143249975a0b864eebf2297,2024-09-18T14:15:16.953000
|
||||
CVE-2024-31187,1,1,826688efd6bf65a94bf2ee884e30740211a6e5f630a046477f540511e2f38366,2024-09-18T14:15:17.173000
|
||||
CVE-2024-31188,1,1,13bd237d18c099469e9d00bce8c8a046b9f3c5286d7ad8a0cd9a1cc0397c165e,2024-09-18T14:15:17.403000
|
||||
CVE-2024-31189,1,1,6858f5708e98abf5595fb2684a87eb00c16f0ed553e5fd3ffcbc43256f89c04e,2024-09-18T14:15:17.593000
|
||||
CVE-2024-31180,0,0,cfacdba32ba604792dde61ea5192bd3f0a68f3fbb29ed64cf58dfe7831d1f419,2024-09-18T14:15:15.820000
|
||||
CVE-2024-31181,0,0,835c2c118ecc75a224ce2ae148955df018fed2deac0092ed030ea33c2a75721d,2024-09-18T14:15:16
|
||||
CVE-2024-31182,0,0,c950fadc93e3ea16ef98cfe6a331915a214b53e804ba89a6f7ab843515de72d6,2024-09-18T14:15:16.193000
|
||||
CVE-2024-31183,0,0,35c375a6d68274d7c3eb49021a7356a3af376af0ffc335c06845584d31d29b26,2024-09-18T14:15:16.377000
|
||||
CVE-2024-31184,0,0,b7c59920550422dd2bd0d8e2e7ffe3978ae0b9d37ba35120d4fca1e99fe9546a,2024-09-18T14:15:16.550000
|
||||
CVE-2024-31185,0,0,11d4d1e3baafe683ba9ec71aae73f9602dfc15b6d6ba9731880b66695bd26581,2024-09-18T14:15:16.727000
|
||||
CVE-2024-31186,0,0,3dfad5d77e47c755381a80fcf6aef35eccd2a92f4143249975a0b864eebf2297,2024-09-18T14:15:16.953000
|
||||
CVE-2024-31187,0,0,826688efd6bf65a94bf2ee884e30740211a6e5f630a046477f540511e2f38366,2024-09-18T14:15:17.173000
|
||||
CVE-2024-31188,0,0,13bd237d18c099469e9d00bce8c8a046b9f3c5286d7ad8a0cd9a1cc0397c165e,2024-09-18T14:15:17.403000
|
||||
CVE-2024-31189,0,0,6858f5708e98abf5595fb2684a87eb00c16f0ed553e5fd3ffcbc43256f89c04e,2024-09-18T14:15:17.593000
|
||||
CVE-2024-3119,0,0,16d9b0b62041b85fa76fcca7b5e07a91c83d46800d8aa92445727479f196ac02,2024-04-10T13:23:38.787000
|
||||
CVE-2024-31190,1,1,ce0c3e890053515769f29fa22e74a8de151d8da0147f071125c0db25f36d69dc,2024-09-18T14:15:18.017000
|
||||
CVE-2024-31191,1,1,a4d10ca4c696a3db04b0edfc419cdbca368aaa4b4c78e9ba6c345dff8f10a6a9,2024-09-18T14:15:18.290000
|
||||
CVE-2024-31192,1,1,289f5e2d106293ea39c4810610d87921d25d6ab088db17fe30bd25565068942d,2024-09-18T14:15:18.470000
|
||||
CVE-2024-31193,1,1,7ab06ff6e25bfd3f3867ff9470327d461530eb5f3894616027e85a54b55e94de,2024-09-18T14:15:18.647000
|
||||
CVE-2024-31194,1,1,3fc4e91387ff8533e1fa478f0f6bd1752499fcbcddbae2a0d9a2149c2752f6b2,2024-09-18T14:15:18.827000
|
||||
CVE-2024-31195,1,1,15b3500d03e4e5504f75e47d8733a1e8bcd30b5d1408093425f409afc2d48fe4,2024-09-18T14:15:19
|
||||
CVE-2024-31196,1,1,9382617c194e077793340f8ac2054c713e5a71348db2cce2af098cd753f9cb51,2024-09-18T14:15:19.190000
|
||||
CVE-2024-31197,1,1,7680017e7ce340cf67fbf325ac8633257516c0b4e2c22c2a148f3f99845bc099,2024-09-18T14:15:19.367000
|
||||
CVE-2024-31198,1,1,71ac53ff8bb624763e7a7bc93361d32bf31ce4455cab897dd0f84546125b6a01,2024-09-18T14:15:19.550000
|
||||
CVE-2024-31190,0,0,ce0c3e890053515769f29fa22e74a8de151d8da0147f071125c0db25f36d69dc,2024-09-18T14:15:18.017000
|
||||
CVE-2024-31191,0,0,a4d10ca4c696a3db04b0edfc419cdbca368aaa4b4c78e9ba6c345dff8f10a6a9,2024-09-18T14:15:18.290000
|
||||
CVE-2024-31192,0,0,289f5e2d106293ea39c4810610d87921d25d6ab088db17fe30bd25565068942d,2024-09-18T14:15:18.470000
|
||||
CVE-2024-31193,0,0,7ab06ff6e25bfd3f3867ff9470327d461530eb5f3894616027e85a54b55e94de,2024-09-18T14:15:18.647000
|
||||
CVE-2024-31194,0,0,3fc4e91387ff8533e1fa478f0f6bd1752499fcbcddbae2a0d9a2149c2752f6b2,2024-09-18T14:15:18.827000
|
||||
CVE-2024-31195,0,0,15b3500d03e4e5504f75e47d8733a1e8bcd30b5d1408093425f409afc2d48fe4,2024-09-18T14:15:19
|
||||
CVE-2024-31196,0,0,9382617c194e077793340f8ac2054c713e5a71348db2cce2af098cd753f9cb51,2024-09-18T14:15:19.190000
|
||||
CVE-2024-31197,0,0,7680017e7ce340cf67fbf325ac8633257516c0b4e2c22c2a148f3f99845bc099,2024-09-18T14:15:19.367000
|
||||
CVE-2024-31198,0,0,71ac53ff8bb624763e7a7bc93361d32bf31ce4455cab897dd0f84546125b6a01,2024-09-18T14:15:19.550000
|
||||
CVE-2024-31199,0,0,f3513dbb2e38c737351617d6df9633ea3366e0b40c895fa30b09af179d75918a,2024-08-12T18:21:54.667000
|
||||
CVE-2024-3120,0,0,d7f7bfc68dc8954b2db64a2bd8494c9672b3ed1aa5b73de4b1ce504de0f2d9cd,2024-04-10T13:23:38.787000
|
||||
CVE-2024-31200,0,0,3e257c032de46c54255a51950a6b372e410cf7a344a9022e8fd6b6600c793cf5,2024-08-12T18:25:44.547000
|
||||
@ -252923,7 +252925,7 @@ CVE-2024-34020,0,0,c4663f98778b76c33582b9d015039d06540b400c550bf7c9ee3e5b98d9ff4
|
||||
CVE-2024-34021,0,0,ba9a52b25c7a77dfa7bf1a07f5ab53755e56e707c7456547716a3d28e95401ca,2024-08-01T14:35:09.920000
|
||||
CVE-2024-34024,0,0,0a0d832c0db4d58a70ccecce54b6344b3f181daaf3ed5285ed66313a40334a22,2024-06-20T12:44:01.637000
|
||||
CVE-2024-34025,0,0,edd2792f368696b38d90328f1c1ccaaade65bc2e70f896834331ba779fb27dd0,2024-05-16T13:03:05.353000
|
||||
CVE-2024-34026,1,1,58ee2841a850b4e76f28c7c90f2fd356dc26d929a71043daf3fbccab680e8ad9,2024-09-18T15:15:14.623000
|
||||
CVE-2024-34026,0,0,58ee2841a850b4e76f28c7c90f2fd356dc26d929a71043daf3fbccab680e8ad9,2024-09-18T15:15:14.623000
|
||||
CVE-2024-34027,0,0,a46473315ff7fae435c2b21f290e2c9550c38dfa46dbd2afc2165efc005d2aa6,2024-06-24T19:26:47.037000
|
||||
CVE-2024-34029,0,0,f5d25bd32468c541a51740035f23234d8d5f3f16a79d2529894430e4831fa01a,2024-05-28T12:39:28.377000
|
||||
CVE-2024-3403,0,0,b6e0e9c5c8bbba14526747c5960a7a5699ede8dea782a1ab2b3e6a77206d4587,2024-05-16T13:03:05.353000
|
||||
@ -253750,7 +253752,7 @@ CVE-2024-35229,0,0,eaa6af525ef117788c7c2de550a028a47738c31d4d17cd7f70ecf3b93005c
|
||||
CVE-2024-3523,0,0,7df45990ada619b152a3f8bd7779ad1da608ef93087816155d547c3076b3dd2d,2024-05-17T02:39:58.793000
|
||||
CVE-2024-35231,0,0,ca19bcc2576ba8b0f106295303d1b03d4d67477db1ee11ed30e35ba727239d12,2024-05-28T12:39:28.377000
|
||||
CVE-2024-35232,0,0,14685d83263ebe7a96d6e60b653269bedfa54d5fdd442776bc8a5c4f98b8d414,2024-05-28T12:39:42.673000
|
||||
CVE-2024-35234,0,1,6b803788194fa17ee1a73887dd959902c34169c216412c7e21055156960ebdc1,2024-09-18T14:47:38.370000
|
||||
CVE-2024-35234,0,0,6b803788194fa17ee1a73887dd959902c34169c216412c7e21055156960ebdc1,2024-09-18T14:47:38.370000
|
||||
CVE-2024-35235,0,0,f2d8f8caa4850f8384544159cf6299dc7619d54c9571e0f4f4f09c37444ceffb,2024-06-14T03:15:13.393000
|
||||
CVE-2024-35236,0,0,64a53255024cbec5e616dbed7137d09a4d9af28ca23ba225de34ffc5dc323a19,2024-05-28T12:39:28.377000
|
||||
CVE-2024-35237,0,0,d0692c9b636c1dac1f0b0323a67ffda842c0f89267a4c70f57e28d02bdbab234,2024-05-28T12:39:28.377000
|
||||
@ -253886,7 +253888,7 @@ CVE-2024-3551,0,0,66b014d685e7b98f0edafdd7cdd0ca69eb0c14e102cb460567e00480c77071
|
||||
CVE-2024-35510,0,0,caaffeb522a9243cb4a1bb41637eced11d63455c55d5f889189d39467161eb6a,2024-07-03T02:01:46.810000
|
||||
CVE-2024-35511,0,0,0925e571054fff897af51a6c91c2579c2749b26c74104183a16b37d4fa6c6517,2024-07-03T02:01:47.583000
|
||||
CVE-2024-35512,0,0,b896e4527afcecfdf8ee8b9a5d8645a7997efcebb8181c42302f1215247b04ab,2024-08-22T21:35:05.483000
|
||||
CVE-2024-35515,1,1,9a5b085b0e8562065965ac0ac128d7b82a96100a6af3e3ce88a5ba2a2f78dbfd,2024-09-18T15:15:14.843000
|
||||
CVE-2024-35515,0,0,9a5b085b0e8562065965ac0ac128d7b82a96100a6af3e3ce88a5ba2a2f78dbfd,2024-09-18T15:15:14.843000
|
||||
CVE-2024-3552,0,0,b573d704f72bfadd96d903b41988b7617b9a930535c0b223b9c260b4778dcd0d,2024-07-02T14:45:34.543000
|
||||
CVE-2024-35526,0,0,45f791392c66ed8c499767ccc3e4221d8293b29407aac62d7317c3cd0f64f171,2024-06-26T12:44:29.693000
|
||||
CVE-2024-35527,0,0,72600462defbad3d94b9b914561cd106abcd4f14940c552d4d0bd67292ce0acb,2024-08-12T19:35:08.817000
|
||||
@ -254426,7 +254428,7 @@ CVE-2024-3611,0,0,b6dd7cd7d7815f4cbb48b9149fec55f286cfb6042c7393dd23d868b1e93589
|
||||
CVE-2024-36110,0,0,ae199b3fa22fadc918d8c236ca5c5c8f2be6b34351afd72d5f50bac8a0f84267,2024-05-29T13:02:09.280000
|
||||
CVE-2024-36111,0,0,e4ed842e7daf22cadca9568503ece6f7b8750cda7f44279b6399e91b52a76ea7,2024-07-26T12:38:41.683000
|
||||
CVE-2024-36112,0,0,3d827ea0c3eaea362d7174c518f3ef1a48183f26c82b6430e889bcf33729a066,2024-05-29T13:02:09.280000
|
||||
CVE-2024-36113,0,1,bd0f172ed061f2563f819d35f44c783c215c944968e504df51b3e976b592c55a,2024-09-18T14:44:33.187000
|
||||
CVE-2024-36113,0,0,bd0f172ed061f2563f819d35f44c783c215c944968e504df51b3e976b592c55a,2024-09-18T14:44:33.187000
|
||||
CVE-2024-36114,0,0,5e400f6e1accfe4ee34afe11a2ba03b10596fa4481251b5d420288b4320d1b3a,2024-05-30T13:15:41.297000
|
||||
CVE-2024-36115,0,0,f8ba661b18a24aa8a9d37cbb77cc6240a2c56bf800de38ea5defb142197d0446,2024-06-20T12:43:25.663000
|
||||
CVE-2024-36116,0,0,3e18cd044e5ac4fbf5437d214cb9f9e5fd21bda7e634efa12dbd7a1ca2e9815a,2024-06-20T12:43:25.663000
|
||||
@ -254823,7 +254825,7 @@ CVE-2024-36730,0,0,64a3dffa7bbe9fe7e69b7699e79bca595a078505b7c29c8334f44bb856a96
|
||||
CVE-2024-36732,0,0,89ef79acf914e7fa79f0997bbb77dd27a533cae855c7319e0da9cc89d060d11c,2024-08-01T13:53:14.287000
|
||||
CVE-2024-36734,0,0,37607296c2114d18eb9371884ac39d9c7abe072eefba87ba6dd89607d9b61cc6,2024-08-20T14:35:24.830000
|
||||
CVE-2024-36735,0,0,77219f23e41303fab14d55459858c38b6f21ffff484d41fa2056fc07bdcb508f,2024-06-07T14:56:05.647000
|
||||
CVE-2024-36736,0,1,c50cb1cf13d661e9b33a59110518d0f4be71f27e3bfa5afa7ea981ac29d9a915,2024-09-18T15:06:23.837000
|
||||
CVE-2024-36736,0,0,c50cb1cf13d661e9b33a59110518d0f4be71f27e3bfa5afa7ea981ac29d9a915,2024-09-18T15:06:23.837000
|
||||
CVE-2024-36737,0,0,057f118c82edd0aa1d4131fe214e85ce5f2a6c68abed48ab267123bdfcc3df73,2024-08-20T16:35:19.277000
|
||||
CVE-2024-3674,0,0,03b7d2663970c659e666aededf211d9dc4cf0601da686d1d01e4f2350a35269d,2024-05-02T18:00:37.360000
|
||||
CVE-2024-36740,0,0,b8d6e8bca7b91dd7c523241570682574ea3e2e1025716afa76fbc7a7c4de936f,2024-08-22T20:35:15.900000
|
||||
@ -254984,8 +254986,8 @@ CVE-2024-36977,0,0,2fe5f328cd77d8e3e2ff7d8822b2b0f7e95a6c6361c8a1a46715f250c7c3d
|
||||
CVE-2024-36978,0,0,dcc0f04e3fc2821d8402c617b55b3d37be597fffff7df9cf9ec9b8398c9978a0,2024-08-19T18:31:13.670000
|
||||
CVE-2024-36979,0,0,74019e1aa595a3039a2ef9ada77a4c2c93d1adcdba69fbae833dd0529f479347,2024-08-26T12:48:19.597000
|
||||
CVE-2024-3698,0,0,1636f30943e700f62090e4fa161d7d9dd9aa51f3d552ed312bd5146a81f86c91,2024-05-17T02:40:04.800000
|
||||
CVE-2024-36980,1,1,d87fcd7202fe440666e3cf046b80bfe9a91078ba660326153ae920da5896640b,2024-09-18T15:15:14.903000
|
||||
CVE-2024-36981,1,1,29a4084fb1d51ae1956ba3b6937f0912bb9fb3b3053c7e9358f1e243c79a81fe,2024-09-18T15:15:15.110000
|
||||
CVE-2024-36980,0,0,d87fcd7202fe440666e3cf046b80bfe9a91078ba660326153ae920da5896640b,2024-09-18T15:15:14.903000
|
||||
CVE-2024-36981,0,0,29a4084fb1d51ae1956ba3b6937f0912bb9fb3b3053c7e9358f1e243c79a81fe,2024-09-18T15:15:15.110000
|
||||
CVE-2024-36982,0,0,aa7c6f6fb5fb0c2be2ff96348e0ea696169b845aaba61abec5ab8d5dad3d35cc,2024-08-02T15:27:14.607000
|
||||
CVE-2024-36983,0,0,e2f2eb32ae3cfffdff5d7dfbfdef5f12a2b42788ca5c6f7f7a02f6e1986f58cd,2024-07-08T14:18:39.520000
|
||||
CVE-2024-36984,0,0,e0e9241900a224e3ad6fe1ba063f84bef1aef3bc909574846a1878b8e10e5d08,2024-07-03T02:03:57.773000
|
||||
@ -255653,12 +255655,12 @@ CVE-2024-37987,0,0,f4bc331a9b09a336ebf69cac5128f3ddb41a4064b564c097fc6645464fecd
|
||||
CVE-2024-37988,0,0,c86291a0f061c05259fe7a7336e8616b7d2b496dae2d1e3292124af3161a49e9,2024-07-12T19:01:50.753000
|
||||
CVE-2024-37989,0,0,3b94113ccd1695e55c704a3f38d763d5ec54c44f354e4b1fe1efc7884dacd2de,2024-07-12T18:52:38.387000
|
||||
CVE-2024-3799,0,0,099fb34e0ee28d9311fbf29cfaad6b5950bd5e198b1ff9c15d8b2a88d4538973,2024-07-12T10:15:02.353000
|
||||
CVE-2024-37990,0,1,97bfcbe2fc9ad088748ecc04df4e6487dea35480acf15f9326483cf77afb402d,2024-09-18T15:27:53.563000
|
||||
CVE-2024-37991,0,1,d1a99a969a61e1b8353d8aaaec469508eb439ea1684668c0de80a1e79299b131,2024-09-18T15:29:44.390000
|
||||
CVE-2024-37992,0,1,6cf5910b8bbfc6e4bbf8511b3622b0bb295aa3b8b1ce93a159c1abe8bc1e57e2,2024-09-18T15:31:27.597000
|
||||
CVE-2024-37993,0,1,ccdbccfd8d20c45e847ed3305bd3d1d68f634bb8b22e3e08af2c388cfb81c3e4,2024-09-18T15:32:26.037000
|
||||
CVE-2024-37994,0,1,f6c2b537912c7f76236be34918e554ed4af1a8005c652c14c816895c9d7442f1,2024-09-18T15:35:17.403000
|
||||
CVE-2024-37995,0,1,7823f83a92d1c5d9fcab4eff076ef9a6f54ea81c7f492fff881334a568a7b5e6,2024-09-18T15:37:15.130000
|
||||
CVE-2024-37990,0,0,97bfcbe2fc9ad088748ecc04df4e6487dea35480acf15f9326483cf77afb402d,2024-09-18T15:27:53.563000
|
||||
CVE-2024-37991,0,0,d1a99a969a61e1b8353d8aaaec469508eb439ea1684668c0de80a1e79299b131,2024-09-18T15:29:44.390000
|
||||
CVE-2024-37992,0,0,6cf5910b8bbfc6e4bbf8511b3622b0bb295aa3b8b1ce93a159c1abe8bc1e57e2,2024-09-18T15:31:27.597000
|
||||
CVE-2024-37993,0,0,ccdbccfd8d20c45e847ed3305bd3d1d68f634bb8b22e3e08af2c388cfb81c3e4,2024-09-18T15:32:26.037000
|
||||
CVE-2024-37994,0,0,f6c2b537912c7f76236be34918e554ed4af1a8005c652c14c816895c9d7442f1,2024-09-18T15:35:17.403000
|
||||
CVE-2024-37995,0,0,7823f83a92d1c5d9fcab4eff076ef9a6f54ea81c7f492fff881334a568a7b5e6,2024-09-18T15:37:15.130000
|
||||
CVE-2024-37996,0,0,e39e1581961cad8f5d5dd910100078a11657ad2090cbed7264c9a8bad1310bf5,2024-07-09T18:19:14.047000
|
||||
CVE-2024-37997,0,0,880ea769e8919f97f57b9878ce449ed40b5cbca31c8883be4629ac4f6a893243,2024-07-09T18:19:14.047000
|
||||
CVE-2024-37998,0,0,f74f0aee21c1d0ed189b1b53893b54b9b769e53300f2261ee57ad9c992f023c0,2024-07-24T12:55:13.223000
|
||||
@ -255671,7 +255673,7 @@ CVE-2024-38013,0,0,0a18606eaff9f516ff72b6e0417c94b62f282527a7fb5284ff29917a0162a
|
||||
CVE-2024-38014,0,0,667a2ca3aa42729c9c1f636c1bc19b21cfc3cbfc4eb15603accaad3e335421c5,2024-09-12T01:00:01.133000
|
||||
CVE-2024-38015,0,0,5b1426585b115ad720503cf293b548c59cb7459bc19ab9bc440800c3121fe7f4,2024-07-11T16:18:10.113000
|
||||
CVE-2024-38017,0,0,b2da9df045e49b65d6e2e15b7cfe34dfa17f558263037e08e7692bad9d214937,2024-07-11T16:20:51.827000
|
||||
CVE-2024-38018,0,1,60b7566e82c4496b0dca7d4fdef697c13c6221141b8468138e42395de75492a1,2024-09-18T15:04:58.240000
|
||||
CVE-2024-38018,0,0,60b7566e82c4496b0dca7d4fdef697c13c6221141b8468138e42395de75492a1,2024-09-18T15:04:58.240000
|
||||
CVE-2024-38019,0,0,da6757aee92bad96249ea36fde1018805a15808ac2fa25fa1dd2f958ebdbe19f,2024-07-11T16:21:19.367000
|
||||
CVE-2024-3802,0,0,1c8b217f2decaf0481a00e93032897e3d653a5edca1ed0ff18938471d432312f,2024-06-04T02:15:49.290000
|
||||
CVE-2024-38020,0,0,25b61b5f1a6adfe4617d71f8aaecdffc9abacbc0c88d9ab31bd18a3dd6ca187d,2024-07-11T16:49:29.490000
|
||||
@ -255692,8 +255694,8 @@ CVE-2024-3804,0,0,670259bb9deba1dd09e2fd5f21b522d9251378214c2f8d4e9a81f125a92ebb
|
||||
CVE-2024-38041,0,0,f4a3a12f8b0083cabe34ce18f7650953aa9c869c7e1908b1e136d7159a58fbbc,2024-07-11T16:25:14.153000
|
||||
CVE-2024-38043,0,0,678d7239712daaa20be0694f0d9a87623bf13f4e650f026e0e7dc828486931e4,2024-07-11T16:25:00.517000
|
||||
CVE-2024-38044,0,0,c3503c93ef40bb7d47f5a9bf23be6e47e665166216973f3f0d25fcf29360c08f,2024-07-11T18:11:30.147000
|
||||
CVE-2024-38045,0,1,671bc130f79e1b331825df7116cb434d38876967c34de9b7e84df83242353575,2024-09-18T15:04:07.700000
|
||||
CVE-2024-38046,0,1,3da08d85ebd439a78b5e62e70a3a96810d562bf4c5e0e78ddd293ae1d6453887,2024-09-18T15:02:15.300000
|
||||
CVE-2024-38045,0,0,671bc130f79e1b331825df7116cb434d38876967c34de9b7e84df83242353575,2024-09-18T15:04:07.700000
|
||||
CVE-2024-38046,0,0,3da08d85ebd439a78b5e62e70a3a96810d562bf4c5e0e78ddd293ae1d6453887,2024-09-18T15:02:15.300000
|
||||
CVE-2024-38047,0,0,523e9f5be841cdbc7f183589a93ba548dfc85d0135f48313667d43c75a93c4e3,2024-07-11T18:11:42.987000
|
||||
CVE-2024-38048,0,0,4d0004e4afcbac434a57cc09e10ac783b3b4c06f9c1cc3d469f5712885a25ea0,2024-07-11T18:12:40.407000
|
||||
CVE-2024-38049,0,0,5c24278de8ab02f50a0b9861aad4792c351b7c4acdb29064e6a1be3719e07cf4,2024-07-11T18:13:53.890000
|
||||
@ -255966,9 +255968,9 @@ CVE-2024-38360,0,0,62fab844597ca879d16a5f3bb413c82dd98eca8f8a8f42f5a5f8581c90bd1
|
||||
CVE-2024-38361,0,0,f382ebba7fc984c6e86107cb94ceaca8dedca184f9f6123ffedcd7094bb741b0,2024-06-21T11:22:01.687000
|
||||
CVE-2024-38363,0,0,4ba5b34714c88cf806284a26eaf8261d70f03ee7392713aa1b260c885e54e80f,2024-07-09T18:19:14.047000
|
||||
CVE-2024-38364,0,0,2279d9d422aa31a74e603806d16ace0153ff248c4a5fbe8796ad93e25cd4d53d,2024-06-26T12:44:29.693000
|
||||
CVE-2024-38366,0,1,da439faf5ff6d8122b959647a313a26dc3be85c3289475c82985c89c575c78f2,2024-09-18T15:22:55.753000
|
||||
CVE-2024-38367,0,1,ef3b5309f2c711755f4bc1341d871d57dcb340a68f69961e0160dca4bb6dc7ac,2024-09-18T15:16:27.733000
|
||||
CVE-2024-38368,0,1,2f8143f8d00d367476eddebe8b3c5595b38d7c9548f03fa31bf0b2530474a056,2024-09-18T15:23:00.507000
|
||||
CVE-2024-38366,0,0,da439faf5ff6d8122b959647a313a26dc3be85c3289475c82985c89c575c78f2,2024-09-18T15:22:55.753000
|
||||
CVE-2024-38367,0,0,ef3b5309f2c711755f4bc1341d871d57dcb340a68f69961e0160dca4bb6dc7ac,2024-09-18T15:16:27.733000
|
||||
CVE-2024-38368,0,0,2f8143f8d00d367476eddebe8b3c5595b38d7c9548f03fa31bf0b2530474a056,2024-09-18T15:23:00.507000
|
||||
CVE-2024-38369,0,0,8244568cb54133bd4b7c000807714a4126c5f985c9bed4f8d225a3d939b43204,2024-06-26T14:47:05.077000
|
||||
CVE-2024-3837,0,0,83b07e73fbcd3bdc07d74ecd9200ace8bc3f655fb5ef786e0fb5447a3f989592,2024-07-03T02:06:37.303000
|
||||
CVE-2024-38371,0,0,89525bd0cac36f8169b7c7660aac33ce1fe77dbe859f180f5d0a019c34cd3913,2024-07-01T12:37:24.220000
|
||||
@ -256445,7 +256447,7 @@ CVE-2024-3907,0,0,60bf8190dbda2edec5350cbb8e8b6403fcf0516c947d67022ad2b560cf30b6
|
||||
CVE-2024-39071,0,0,195ebf652ba5fdec3966b79507d582422df3145f15e690eeba2499c0a1d26f77,2024-07-11T15:06:07.560000
|
||||
CVE-2024-39072,0,0,59efd5c73004670f8c574450bf52f5ef6a3e1b857b7881899bb9399c029104b4,2024-08-01T13:55:22.510000
|
||||
CVE-2024-3908,0,0,42c7c9b2b31f61816d945d69672e5e24b20e282cc849fd87286a4170779d810f,2024-06-04T19:20:26.660000
|
||||
CVE-2024-39081,1,1,8b2b4e7e422c554909306a37995905327ab813ab04e65228f24375905f38d918,2024-09-18T14:15:19.757000
|
||||
CVE-2024-39081,0,0,8b2b4e7e422c554909306a37995905327ab813ab04e65228f24375905f38d918,2024-09-18T14:15:19.757000
|
||||
CVE-2024-3909,0,0,ea272c17ff869087d9799ba3efa606456d1ea78a711f72e5984479fd9f006e55,2024-06-04T19:20:26.763000
|
||||
CVE-2024-39090,0,0,4ea45c01dc94b6a5905ea4f25d30b677051f8a6abd6f770805bb3d0f6dca7071,2024-08-01T13:55:23.317000
|
||||
CVE-2024-39091,0,0,f4a8f0933c6d25f598eacdb963a85c2dcd7a3357118123548313549391b5d7d0,2024-08-13T21:35:02.617000
|
||||
@ -256773,9 +256775,9 @@ CVE-2024-39582,0,0,6ec9b04450f9c5ce2a1563682764e2f7b34da0f9eb482017ce73088ac186f
|
||||
CVE-2024-39583,0,0,ac1320c69e7204d43ee10370ec071062ec88b9a1106bd39584f09ed060befd2b,2024-09-16T15:42:06.347000
|
||||
CVE-2024-39584,0,0,1d0a6aff0073f4836d9654764326ceeb368acd09f92344e463ab3214871c70e5,2024-08-28T12:57:27.610000
|
||||
CVE-2024-39585,0,0,b162f39d96cc79baeee026e4bc649d0b5cf545dfb2bc7af993a786e27782c34f,2024-09-17T02:15:49.397000
|
||||
CVE-2024-39589,1,1,4dda280d459f2c83fb515eb738c1769721cc7bda40bbc4958283b700ad43213e,2024-09-18T15:15:15.333000
|
||||
CVE-2024-39589,0,0,4dda280d459f2c83fb515eb738c1769721cc7bda40bbc4958283b700ad43213e,2024-09-18T15:15:15.333000
|
||||
CVE-2024-3959,0,0,1ce1302f5c536ae0ba1596a30e53c3274b88d91eb780326b1103788329e8cf86,2024-06-28T13:21:52.223000
|
||||
CVE-2024-39590,1,1,417ce99ee91588e3028d6edcab9748cbf8e9952d8643590fbef8107932c73210,2024-09-18T15:15:15.540000
|
||||
CVE-2024-39590,0,0,417ce99ee91588e3028d6edcab9748cbf8e9952d8643590fbef8107932c73210,2024-09-18T15:15:15.540000
|
||||
CVE-2024-39591,0,0,7234f5f72639a034d956dd5df541035bcac3a09d36d7ba9ed10f23ab4dd7d7f9,2024-09-12T13:29:47.207000
|
||||
CVE-2024-39592,0,0,541b14c1914f7693bac69344218050bd21bf7511f9226d6471041f73dd5bbff5,2024-08-29T19:25:41.740000
|
||||
CVE-2024-39593,0,0,f64d4a9107e758157cf94d8020a15d87354768c39cc9030a607faa8c819f82ce,2024-08-29T19:08:19.200000
|
||||
@ -256800,7 +256802,7 @@ CVE-2024-39622,0,0,5e7d7bcbe4d60960bcc7d0a35a948631371ae2277c1c9eb9831f372ee1fb9
|
||||
CVE-2024-39624,0,0,61c5c17120773e760fbae9a7958d22954be8f7c181114c13133411959f35ed43,2024-08-02T12:59:43.990000
|
||||
CVE-2024-39626,0,0,1b1d91def172e0cc6e757efcafa7943028f614721770775c3d1407b25fc30784,2024-09-17T15:07:49.433000
|
||||
CVE-2024-39627,0,0,07e13c8e7805345d34bba365100ff9d8fb4b41c5994c06908b9aa5fcd6462ce6,2024-09-11T17:35:37.523000
|
||||
CVE-2024-39628,0,0,8abf80664dfce5db89bc155c2700a612a9b6bae119e72b4395dc2ca2da475311,2024-08-27T13:02:05.683000
|
||||
CVE-2024-39628,0,1,21626311e4f7b272abd1ea9e299b3f571edb31807e706badf26ecd129be6fd97,2024-09-18T16:59:33.293000
|
||||
CVE-2024-39629,0,0,69d55baba09f40a0592a3b91cd4c35fb4ccff70560751062aa75ee5152b4ad51,2024-09-11T17:35:06.743000
|
||||
CVE-2024-3963,0,0,51376b7b644c18cc44faec2c04d1e94caccf8dc59a8984cdfb5fb430015f77f8,2024-08-01T13:56:47.180000
|
||||
CVE-2024-39630,0,0,b9a415bc4650f8f2437ab21ad7881d5052dc8b427d419e2888cd7dd33acceea7,2024-08-02T12:59:43.990000
|
||||
@ -256811,11 +256813,11 @@ CVE-2024-39636,0,0,356132dd8c4585470fbd20a2862e8961fed4fe21f88d52a87134f7776cb4d
|
||||
CVE-2024-39637,0,0,c9cd93cf93f9c41475771220e56072736d7ef7107ab49d4cf3bf3069940988e9,2024-08-02T12:59:43.990000
|
||||
CVE-2024-39638,0,0,cf36aae6a91cc72ba13b071b9e149e2fa798a9f572f58ede9d761408ecfcdde9,2024-09-13T21:00:44.173000
|
||||
CVE-2024-3964,0,0,9f7a9dcb99a6b1dda9d890f7e0a024c114babf4cc61dfd04fd66f31288d98320,2024-08-01T13:56:47.440000
|
||||
CVE-2024-39641,0,0,82efe19acefcd120a9c9ff4b95bce8c452c5423902a3f6b1c0041639db255e62,2024-08-27T13:02:05.683000
|
||||
CVE-2024-39641,0,1,ca72e5c4e3f4eb62161dc132924c5912f001d38eb9b77d0e12deb21361b22d88,2024-09-18T16:57:25.417000
|
||||
CVE-2024-39642,0,0,a5907a7ba9601cb47d5213c09a225012a1c028d8945a3fe4fa6d61abfa537ebb,2024-08-13T12:58:25.437000
|
||||
CVE-2024-39643,0,0,1dded6874da74e5afbb63537b6a34aae6868db25023597eaaaf8ae23d994ee0d,2024-09-11T17:33:14.787000
|
||||
CVE-2024-39644,0,0,c5dc47fbf8d1981e87e457a3ee41781a683fa403d50a7465ba17272c13e17f0d,2024-09-11T17:31:27.760000
|
||||
CVE-2024-39645,0,0,9d264356cb3c50b50ea46e6a6a0ecae0e3898eabe4f8946365594a1394079519,2024-08-27T13:02:05.683000
|
||||
CVE-2024-39645,0,1,d170ecd8e413b5eeda4dbeb25d9b709e95c517b112d5e6fc26c8b8ee1c85901c,2024-09-18T16:46:57.470000
|
||||
CVE-2024-39646,0,0,ebb1a6c9a40f2bab7c106d16a488a2c959fc892d9540eb6de01a5701473447cf,2024-09-11T17:31:00.847000
|
||||
CVE-2024-39647,0,0,76302d6bbf2afe03f0e6f6bafa6326bb4eb55afa326a015b16287c96fa3fb250,2024-09-11T17:30:17.807000
|
||||
CVE-2024-39648,0,0,ab9faea09f5f33bcf9880e5ab21b0ae5b90092067a818bd60c5199b0cda605b7,2024-08-02T12:59:43.990000
|
||||
@ -256826,7 +256828,7 @@ CVE-2024-39652,0,0,f0c2e1305e128fc4254bcfdadc56a769f26cdafb9e9828cd6a3d3d5cb0f0b
|
||||
CVE-2024-39653,0,0,0026393f263db329d590d78b1320546a7038443749754db62f750d848ebdd5ca,2024-09-13T21:03:21.327000
|
||||
CVE-2024-39655,0,0,e8990ae109997ce183e7ec6503e4dae3b8dd97111e423903b7d9d645e6d064e4,2024-08-02T12:59:43.990000
|
||||
CVE-2024-39656,0,0,41595071b9c98d363bce33f052284f93eb7b68d4fe24b85d68eae6cad1c3cf98,2024-08-02T12:59:43.990000
|
||||
CVE-2024-39657,0,0,5011bc23ca38c6d5baf0733a7f30352cc204af31d9e0f5e595f8e34352825b69,2024-08-27T13:02:05.683000
|
||||
CVE-2024-39657,0,1,c6d102523d8502c5965e9c05065be9a6968ad4f166e3ac731a39908b2a4154bb,2024-09-18T16:25:32.703000
|
||||
CVE-2024-39658,0,0,59024863d94402504392beec22150a3bf1bdca7d2eb9671b61535a10b50beb2c,2024-09-13T21:04:24.760000
|
||||
CVE-2024-39659,0,0,a80d18e493149233fc317020eaf978d1056512cfa7b08cba1fd89af8c4735b0a,2024-08-02T12:59:43.990000
|
||||
CVE-2024-3966,0,0,f4286335c18162e5dbc573cbc605017489ac12efad77a1ff38ff47be3739d726,2024-07-29T16:52:33.533000
|
||||
@ -258033,7 +258035,7 @@ CVE-2024-41924,0,0,06cc2d8c551d8fd39f4e2ff31447bb4070ddde2d992cf8f0c8cb1b0035280
|
||||
CVE-2024-41926,0,0,d7564816d433232552fda23a5f10a79963d6c502f628c4841f8484c17aa4f54f,2024-09-04T16:55:35.570000
|
||||
CVE-2024-41927,0,0,f4ba4a6c9a9886f976121a9d30837f6ba4dc4ccf9fc0f7a56ac6b8acaf04eb66,2024-09-04T13:05:36.067000
|
||||
CVE-2024-41928,0,0,fac45a5eba953351f64e8420aefaa828221c1e8b109e75da05d07c8ee7a8c443,2024-09-06T17:35:13.400000
|
||||
CVE-2024-41929,0,0,25f7e24f5bee5963e177d6e85983211e56e869e6611a491dedac239b6f50e148,2024-09-18T07:15:02.847000
|
||||
CVE-2024-41929,0,1,f66edb594830fee28d517259603e349f287170e8380c3a0dd626c454c5a95631,2024-09-18T16:35:07.527000
|
||||
CVE-2024-4193,0,0,4d4f4fcde78b01b33e30a077c434c1714d01a9ac9cd58d916bc86b963b6ddbd7,2024-05-14T16:11:39.510000
|
||||
CVE-2024-41936,0,0,d330b2a32a604797fc4eb94f395ba3140911090caf0d19e4d7603d421735298b,2024-08-20T16:26:54.663000
|
||||
CVE-2024-41937,0,0,17d01be9af92612ee6b4d89126a811836507d3fbf35417e172928be42551212a,2024-08-23T16:21:21.893000
|
||||
@ -258414,7 +258416,7 @@ CVE-2024-42398,0,0,ecec97745a6273f6b5e5720bfa1d0ff4b8e46532c92273931272e35e326b7
|
||||
CVE-2024-42399,0,0,b2d8d291d138c04491424e6796bb04940f5bfb5f03fc0a00b681faa84689b158,2024-08-23T15:06:13.350000
|
||||
CVE-2024-4240,0,0,c278b752586c1bf53091999087140c7ddb924945ab9e2c19f82d090171b2b4e6,2024-06-04T19:20:33.263000
|
||||
CVE-2024-42400,0,0,bada445f5210525c2b124a846736c128f6bdefeabff1b80f8c8c07a166ac65a5,2024-08-23T15:06:00
|
||||
CVE-2024-42404,0,0,c54f40e946bc7f12e50d8450bfb496ff304e1510d799bbbe2fb7fc352b6de97f,2024-09-18T06:15:02.223000
|
||||
CVE-2024-42404,0,1,c3d405c66f64f609aeb5baff872af9267b9c990f0513561cef9ea13fa0b12c83,2024-09-18T16:35:08.267000
|
||||
CVE-2024-42408,0,0,4d58de4373d6b44540fc0d8799a258082f4b72e8c10ed3de4134395815aaf808,2024-08-29T14:22:45.603000
|
||||
CVE-2024-4241,0,0,1e8cfaace7e8ae3194846b1351a77e14aef6cd3a07b429e780198fa55ccad7c3,2024-05-17T02:40:19.957000
|
||||
CVE-2024-42411,0,0,3fcf900cd705b45045cb94d8edb3d48eeb6b58809490fd9c74760d8ca62aa9ff,2024-08-23T16:04:26.227000
|
||||
@ -258481,9 +258483,9 @@ CVE-2024-42495,0,0,ec6874fdfc9b12ec8ef1020de6e62e8d7226ab1ffee9b169624f6e5854e00
|
||||
CVE-2024-42497,0,0,262b8d15cef13f44f6c11c9732e86216b599547f262ceb2ec772c87233738fc0,2024-08-23T16:18:28.547000
|
||||
CVE-2024-4250,0,0,29d8096febeb47af7a705b5c5f44b0e0121b5483d3074c39ff1bff1155e9a3a5,2024-06-04T19:20:34.200000
|
||||
CVE-2024-42500,0,0,f0bcaea9090b49f77db24a21554ec397886059105966434018e3d2adca5c9151,2024-09-10T12:09:50.377000
|
||||
CVE-2024-42501,0,1,55667a47577b4f33bade3778f805c6b25ee72bbe08adc8c60302f0e4a051bbca,2024-09-18T15:35:05.747000
|
||||
CVE-2024-42502,0,1,286a9e13771c1363a765da26fcc8ddd07276a18a92df69ef87a1dce41a5bad6c,2024-09-18T15:35:06.550000
|
||||
CVE-2024-42503,0,1,e6317a3d02a192c10f37b8028a1025f7e876d341b9032ffb250619df7d81df4d,2024-09-18T15:35:10.277000
|
||||
CVE-2024-42501,0,0,55667a47577b4f33bade3778f805c6b25ee72bbe08adc8c60302f0e4a051bbca,2024-09-18T15:35:05.747000
|
||||
CVE-2024-42502,0,0,286a9e13771c1363a765da26fcc8ddd07276a18a92df69ef87a1dce41a5bad6c,2024-09-18T15:35:06.550000
|
||||
CVE-2024-42503,0,0,e6317a3d02a192c10f37b8028a1025f7e876d341b9032ffb250619df7d81df4d,2024-09-18T15:35:10.277000
|
||||
CVE-2024-4251,0,0,4911c8bef2a1e60ace7e3694403733ed66cd48ed80870211c4240e0e24584389,2024-06-04T19:20:34.297000
|
||||
CVE-2024-4252,0,0,9237a844d9d9b4c175441eb52c39ce07fc14167f47531df4616e5c1079e2e93b,2024-05-17T02:40:21.053000
|
||||
CVE-2024-42520,0,0,64dffe6569e4f4099d9df2249ffa95a5cd3b2fdfe3c5c543c43632b62f26d14c,2024-08-13T15:35:16.110000
|
||||
@ -258651,9 +258653,9 @@ CVE-2024-42791,0,0,873fa7cb6896c8581c416ecabe3256bd4629f0e8a1bc57f85a270c46751d9
|
||||
CVE-2024-42792,0,0,3d5171455e36c62db86c3f1d03eab38bfdac82c0ed4f595e590432a1180621b9,2024-09-05T18:35:24.220000
|
||||
CVE-2024-42793,0,0,c34b0c01a33da3f3b96951729540996987faac6763a3b4211067000d740419d1,2024-08-30T15:56:51.510000
|
||||
CVE-2024-42794,0,0,4471ffaa94a53e2c1d0bf1c485dce30ffce070e4aeb3674c8eb03f6213838ad4,2024-09-16T20:15:46.770000
|
||||
CVE-2024-42795,0,0,8d41d5d69dadb883fa6e8ee8789613671c5e71d13695226dafbc334c122236f6,2024-09-16T20:15:46.830000
|
||||
CVE-2024-42796,0,0,6ae6d20749a7a5a140772e646ff6b0393306bc0a7a63ded8e6162aa502c5b171,2024-09-16T20:15:46.890000
|
||||
CVE-2024-42798,0,0,bb6fd3a17239923a3b1354b11e7bd8934e1dfed5fb6fb21be20a8115850331bd,2024-09-16T20:15:46.957000
|
||||
CVE-2024-42795,0,1,1d997e9d14176ef254b42c361912cf5551190a9f849a5555e9c4177c4c0cc790,2024-09-18T16:35:09.097000
|
||||
CVE-2024-42796,0,1,16f5cd05439d1b237921448aa907dc570179b25700b07d315993f5965c2c174a,2024-09-18T16:35:09.880000
|
||||
CVE-2024-42798,0,1,768baaf558340f9c8a5ae318b32d8a63bdf51ca24716c46c177a94e6fed69da4,2024-09-18T16:35:10.637000
|
||||
CVE-2024-4280,0,0,f46c38f13eff52b4d020fb374e18f92e6528a4bade2042627b2165ccf7b62772,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4281,0,0,cb48c26c252b1c83fb4810210335ce05e1fcbd94e5804419418b4f73b9d5c028,2024-05-08T13:15:00.690000
|
||||
CVE-2024-42812,0,0,d754a1b3fa22845b1ec28a5e3b423343f3a09420e9ed62b3cb19e2fa117c33b2,2024-08-20T15:44:20.567000
|
||||
@ -258767,8 +258769,8 @@ CVE-2024-43111,0,0,45754d9244b10ae48023a8465600f12d5ca692d4146e1c9ba1d4a0e6fcd07
|
||||
CVE-2024-43112,0,0,72269ebdb7b810fe860916d34468320e2e91d1a609ed10c8290e69cc95ee1d45,2024-08-29T16:51:55.937000
|
||||
CVE-2024-43113,0,0,7e6f0ba01b475bb6cfca73e8eda2423288e38b8146984d081803bef7596c3140,2024-08-29T16:51:33.367000
|
||||
CVE-2024-43114,0,0,00a7e03d6d46ea413486af76a04e2163909eb9aea862c173dd501cac60ab9e3d,2024-09-11T19:11:11.257000
|
||||
CVE-2024-43116,0,0,94cb738117c364125cdbbaaf42fcfa3d1fe11aaa7081e49de319178ad8cee60b,2024-08-27T13:02:05.683000
|
||||
CVE-2024-43117,0,0,05a8c9c88ed7d8baa1ba7cda12219cce1f916317ccf5f0825de6fdf0716e21e8,2024-08-27T13:02:05.683000
|
||||
CVE-2024-43116,0,1,cc0346e2fffb3d2e9e7819fd9105c9b799a7ef170e103991490ffc5ef5ca8367,2024-09-18T16:22:14.880000
|
||||
CVE-2024-43117,0,1,745d28d8f65b32535ad91ee9bfd0009d1fb808a4a68c830aa6c4c6c97d69d777,2024-09-18T16:15:04.373000
|
||||
CVE-2024-4312,0,0,82451935a132459ec3a52babe511fed0dc0447cacf13fc78eab91e8a5c0d303b,2024-05-14T16:11:39.510000
|
||||
CVE-2024-43121,0,0,884448e43dc9ae9d5a0252fdc685aaca71ba0c463694388bbaecb1cd420cb155,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43123,0,0,c02677ef8b7b9e2229cb24b37119fdc9650c80bd850d720e8d21ae9a3d07a645,2024-08-13T12:58:25.437000
|
||||
@ -258834,7 +258836,7 @@ CVE-2024-43225,0,0,785bc4278a6946ee9d6c10021191a3cce1fc98e617438c82e5e4e3f2e0cd0
|
||||
CVE-2024-43226,0,0,a338b4ee27e9fc08682f17c2b31584264a82f90f5a7fca9fd60ce6764ef33c2e,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43227,0,0,ad1f6a93845342802a80b9924c653d05f8aded241d8c4fe476abc24eaae6fcd1,2024-08-13T12:58:25.437000
|
||||
CVE-2024-4323,0,0,8795dbc0ef00377d638f97794032c86e045103be19a16a47714b9d0a60088551,2024-05-20T13:00:04.957000
|
||||
CVE-2024-43230,0,0,28e16fe103499ce33c930eb9da10b803f85344eab6eada981abbfacdedf0e7a1,2024-08-27T13:01:52.723000
|
||||
CVE-2024-43230,0,1,6e32073c9e6e9999512638555ce6fd7c64bd9478a9ea47e2925b530a1a97b393,2024-09-18T16:10:30.317000
|
||||
CVE-2024-43231,0,0,576ae207e6ba8489a6ff51c30718ab9a1cd372eb2df3fcba4d400349b580379a,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43232,0,0,c4f0a290d3d0b6195154848d04103c9516440693673d84bd0355907b0f850350,2024-08-19T18:36:07.297000
|
||||
CVE-2024-43233,0,0,1b4af7770e832b42b8de9434c8175a113ca03ccd398ae87b3d3135806048f23d,2024-08-13T12:58:25.437000
|
||||
@ -258916,7 +258918,7 @@ CVE-2024-43322,0,0,e2ca647ab771c590c5e49dd4792b17cb2a82d2c1efaab05806782389dbebd
|
||||
CVE-2024-43324,0,0,3fca11ef3a0d0aca94e1720b1500c02c9dcd66fee91e5ec95a4010a171418c83,2024-09-17T20:04:28.360000
|
||||
CVE-2024-43325,0,0,c7e71f31efef4adfd7b652340fa8f95169ea702400525766f98d28f2dbed3aec,2024-09-12T21:28:20.137000
|
||||
CVE-2024-43326,0,0,4b4201c18581215a5b56fb12e75b3d09f6bbdb92546d9bf78577651d9ba94f8c,2024-08-20T15:44:20.567000
|
||||
CVE-2024-43327,0,0,acd099b8109083e63b5d816040ddc307da420ff33ea37d9f6c3f5b17cd1e029a,2024-08-19T12:59:59.177000
|
||||
CVE-2024-43327,0,1,8c996e6da0b19402c98e43e1219ae705f2e7b89a77f2de30ee9e74c1e4aa4a90,2024-09-18T17:07:45.553000
|
||||
CVE-2024-43328,0,0,45b76704130d3d162b10a10d0e1610ea82761ed70e22ff8c701dd47566965f65,2024-08-20T15:44:20.567000
|
||||
CVE-2024-43329,0,0,2d889991c7054adfc3510a6f2a36341cd1187c790fca1d7653a4d88b7b6182fe,2024-09-17T19:59:39.933000
|
||||
CVE-2024-4333,0,0,640575820e0b30891814a5a9385bc808a4cb1fa6f8846116192c877d2f9953e9,2024-05-14T19:17:55.627000
|
||||
@ -259023,8 +259025,8 @@ CVE-2024-43476,0,0,91c0c8137c4b1b747f13b499f046afb02d7a7bef84fdde3fa148c5435a3aa
|
||||
CVE-2024-43477,0,0,d50cbeb6e00e9871b6577501fc388e557638d61c564a40e04e41a194af066632,2024-09-10T18:15:13.970000
|
||||
CVE-2024-43479,0,0,313bbcabdd9b44fdcc219a1bba9045a367d02f58a01b8953aabace95c227c905,2024-09-13T14:38:13.873000
|
||||
CVE-2024-4348,0,0,6e86bc5560fea8dde0d2ebca4133582cb5d1167a5aec18ad6c6b9b23741c69df,2024-06-04T19:20:36.223000
|
||||
CVE-2024-43482,0,1,d8f402bc0f3ce251083854e9d472514518876444465b9e6fddf99899cdf432df,2024-09-18T14:11:50.303000
|
||||
CVE-2024-43487,0,1,b1bbbe6f3eeb8f594d4cca9a1e5f97347bd8ae24b6674c21dd2e36175fe4aaad,2024-09-18T14:10:20.320000
|
||||
CVE-2024-43482,0,0,d8f402bc0f3ce251083854e9d472514518876444465b9e6fddf99899cdf432df,2024-09-18T14:11:50.303000
|
||||
CVE-2024-43487,0,0,b1bbbe6f3eeb8f594d4cca9a1e5f97347bd8ae24b6674c21dd2e36175fe4aaad,2024-09-18T14:10:20.320000
|
||||
CVE-2024-4349,0,0,a8b03025f36b8713c52951e7ebcf312d165d904bb8cd188665520ff04ec5e58b,2024-06-04T19:20:36.340000
|
||||
CVE-2024-43491,0,0,66848b924ef1e3bbbd3e0b208cbe28d68dfcc77f6e79bf211914ea2a59716ae8,2024-09-12T01:00:01.133000
|
||||
CVE-2024-43492,0,0,af0e73844988f19d42832ecb20006b5ce23817c5aa51bd592ac57ea711827c4a,2024-09-18T13:57:22.880000
|
||||
@ -259070,7 +259072,7 @@ CVE-2024-43773,0,0,8c0c6d6cc6b93c34cfa09ef3705fb324f136fe885f1952674b354433c7d54
|
||||
CVE-2024-43774,0,0,8a1a7395e0266f26fabce42b3d201bdd365872f3bb986b16a4813718545afbb5,2024-09-04T12:26:42.387000
|
||||
CVE-2024-43775,0,0,386009b272e00dd7e320eaa82eec20a93bfce64d4bcdb8a26930d34c6fe0dc22,2024-09-04T12:27:22.670000
|
||||
CVE-2024-43776,0,0,27e4419e8ce01901c27e76cb21d9618c21e34d6a14d012499c61adf6cf980a12,2024-09-04T12:27:40.113000
|
||||
CVE-2024-43778,0,1,7561834736f08cf1293ccbd41f2cf3fda7ff5c7b5aaf1c8e3860ee5f6b05470f,2024-09-18T15:35:11.213000
|
||||
CVE-2024-43778,0,0,7561834736f08cf1293ccbd41f2cf3fda7ff5c7b5aaf1c8e3860ee5f6b05470f,2024-09-18T15:35:11.213000
|
||||
CVE-2024-4378,0,0,09f9e04bae659373b82712486e7efa4baa3211e21ee904b68f572ef978953753,2024-05-24T01:15:30.977000
|
||||
CVE-2024-43780,0,0,5217ce0351fcb75bd7982f01c3d436316e02e5a2bb3d0e7b3ad2fd10f4519787,2024-08-23T16:18:28.547000
|
||||
CVE-2024-43781,0,0,fe4ff27a41c5a2d11128d539a346b2aa7ff5522b07e03c5290a837b9cf154eca,2024-09-10T12:09:50.377000
|
||||
@ -259252,7 +259254,7 @@ CVE-2024-43963,0,0,8cafba6a4e67df3e09626ea7dfefbf7e4a0c7f737e6ec03304fa7b4223f26
|
||||
CVE-2024-43964,0,0,a296e79bf666a02822318fa0afa97e1b25cabc20d3cd08936c2b6152e8d8f9a3,2024-09-03T18:30:23.437000
|
||||
CVE-2024-43965,0,0,878d660798d5f5ce29d081268f89e41be6b018fcbed5e4625677b64fd6bbb9af,2024-09-04T16:02:57.427000
|
||||
CVE-2024-43966,0,0,2901acb1eb63b7a55cb46d133ca8742f966f34bb1db4feb1259a3cd63030f204,2024-09-13T16:01:42.997000
|
||||
CVE-2024-43967,0,0,058d81312da48659f7d07dbe37562102bf6a7259028130f2d17364cdc71b5244,2024-08-26T19:10:09.607000
|
||||
CVE-2024-43967,0,1,efb5ab215f4087a53f8dcd252d52ef141005b5764a5e2b6c3ee9faa1675f0e1c,2024-09-18T17:00:57.497000
|
||||
CVE-2024-43969,0,0,e26f311e05eb6990dcc6348fd6e980e4dcceb0042db2094a3923d85c868f6220,2024-09-17T23:15:18.253000
|
||||
CVE-2024-4397,0,0,e58140e99ddfaf8bde684cb5f7b842244f11804dcdfb8070d80437acbcb292f3,2024-05-14T16:11:39.510000
|
||||
CVE-2024-43970,0,0,c88394c37ec2dcfe0730bc24e755f0a41287abbc542ba8a5971f52b1fece2bd4,2024-09-18T00:15:06.683000
|
||||
@ -259320,11 +259322,11 @@ CVE-2024-44094,0,0,745c42fe2d315a5bcee63bacf45ed85a137f90126e69b7519e917691efb99
|
||||
CVE-2024-44095,0,0,e0006363027abcd9487b2555f5c10f6b2763af7e9102189a399193814a56d2b1,2024-09-18T13:34:31.617000
|
||||
CVE-2024-44096,0,0,d8c4df36682fa8ff2c29981f1e88279da6a08cd48c4fd6b3719d80ee95e04fe2,2024-09-18T13:33:37.863000
|
||||
CVE-2024-4410,0,0,ca43b98286a78ab63b5139b50b93fc074ee9aec4c16e78097aa3514c43622322,2024-07-29T14:12:08.783000
|
||||
CVE-2024-44103,0,0,403f28363473fe16513a32f4bbf3e3e9147062f1518a63808c0d4d4119c7e973,2024-09-11T16:26:11.920000
|
||||
CVE-2024-44104,0,0,e8fd670a684426b8559a3a5d3eab3a06a900216e6d9ef789bdb8ae5bbf1f43cd,2024-09-11T16:26:11.920000
|
||||
CVE-2024-44105,0,0,732efd8b7b918ab23d0e2a071a94c93fdba681f2365382a534af5bafc6e773f9,2024-09-11T16:26:11.920000
|
||||
CVE-2024-44106,0,0,3c50b4b5c0e6d1f0435f895c3826f50e9a92d18d859ecefef1e7c93db6dccb98,2024-09-11T16:26:11.920000
|
||||
CVE-2024-44107,0,0,644000594cec0b1adbbf9e9faad5bbcf891d9610a285582e61915e4d6806c350,2024-09-11T16:26:11.920000
|
||||
CVE-2024-44103,0,1,709653e0e681c50169d2a31a1ca4fa07ba0b9e103bee0789c715365497e0794a,2024-09-18T17:18:39.040000
|
||||
CVE-2024-44104,0,1,929a3e88a508b197778cb9d698752e7d95d2a1fd6ba54e089d4187ada17accb8,2024-09-18T17:33:06.413000
|
||||
CVE-2024-44105,0,1,6ace8c54c3fc6c9b1684fd8d42f178f1cce19bf6d08f58b02fdc3857633db641,2024-09-18T17:48:11.193000
|
||||
CVE-2024-44106,0,1,e983d995182598f38184dac72eed7851e8d11230fc7bd4aeffd6778b0b4524e5,2024-09-18T17:50:40.660000
|
||||
CVE-2024-44107,0,1,6f5162177bce60f39767687033803f63e81f183af4eb4e7c061e6f2de6ca1db7,2024-09-18T17:52:50.990000
|
||||
CVE-2024-4411,0,0,9d1b27ccac7555d95c6be5f4488ca4d9772a0570efc26fe6a3f3d131fd0aea06,2024-05-14T16:11:39.510000
|
||||
CVE-2024-44112,0,0,0b8bf5761fae1061c83dd7332f5b3027481f791877934ad1d55322c5110d025b,2024-09-16T14:19:24.917000
|
||||
CVE-2024-44113,0,0,74d2cd3604829033f201ba9d0769b1dcbd2b028e1d8a51bacee7bb51b45ebac7,2024-09-10T12:09:50.377000
|
||||
@ -259446,7 +259448,7 @@ CVE-2024-4452,0,0,8393f4e948f53b2fbde25aaf7f55c55c1f0989c48fbd4a40cb4c1f768b7a8d
|
||||
CVE-2024-4453,0,0,bc1bfc8908fbb505485206b11e5cc2278d2416192493c6c78b1ac2e39a46d4c3,2024-06-10T17:16:33.460000
|
||||
CVE-2024-4454,0,0,ef12942a51bdcd592bf2170096c1c09a451df07ea3cdb4fb15fcced864f88fa2,2024-05-24T01:15:30.977000
|
||||
CVE-2024-44541,0,0,3a1e561d6510cb46fc3025d4e567327c4a8fc313204436661e66190b9e443f5d,2024-09-12T12:35:54.013000
|
||||
CVE-2024-44542,1,1,f93229d37283118781232129d8f9c882e16cd0c21ad787838ba28665ebb68239,2024-09-18T15:15:16.137000
|
||||
CVE-2024-44542,0,0,f93229d37283118781232129d8f9c882e16cd0c21ad787838ba28665ebb68239,2024-09-18T15:15:16.137000
|
||||
CVE-2024-44549,0,0,95d002d4c0f2cba16cd184ab62e810c42d47abc2b51570dfaaedb60ad257bca3,2024-08-27T14:28:55.157000
|
||||
CVE-2024-4455,0,0,266cd4e6dd8917294ad9c9f8fba8b2f0acb52688c86d3ca408cceaa482353b44,2024-05-24T13:03:05.093000
|
||||
CVE-2024-44550,0,0,9f267ccbfa739b7dd965bc2964320acade2cb81782d1bf956b8f3a920e81fa22,2024-08-27T14:29:02.370000
|
||||
@ -259679,7 +259681,7 @@ CVE-2024-45038,0,0,9bc86932f350806c3a4bfe09c65e8bf9ee10a426832d16050cb88cd3f58d1
|
||||
CVE-2024-45039,0,0,de4a003efa5d5cc4fff1702d34e9342efe96cd22e4f37086455d2a3139d95387,2024-09-06T16:46:26.830000
|
||||
CVE-2024-4504,0,0,db7504bed7bbf326ed6569d421c20101dbf56fa9ab20eccbe7468f7c026f345b,2024-06-04T19:20:39.947000
|
||||
CVE-2024-45040,0,0,a463c1b68aa3e0a6cac5952f8376f49671ce87f0c4707125eaab268596a57de6,2024-09-06T16:46:26.830000
|
||||
CVE-2024-45041,0,0,4d6fb0ce5785ad504b9620b1d4a73974bd0ebe4cf6991515fde24c1123f91bea,2024-09-09T18:30:12.050000
|
||||
CVE-2024-45041,0,1,1e2da4c1302b38fb57fb38280037032da391876c3275a0d8eb8672700cab0b97,2024-09-18T17:31:53.903000
|
||||
CVE-2024-45043,0,0,813b7117a1d59d56cbce89ce53b65dfc1ca707523a63233a1be8257ae8cc6c73,2024-08-29T13:25:27.537000
|
||||
CVE-2024-45044,0,0,2ed42d19dae2f6825c5977ea48282a4184680e7c5fcc5191852ec831d989e86c,2024-09-10T15:50:47.237000
|
||||
CVE-2024-45045,0,0,c746f1c0e6db0596dc093f08d310bbebe72a6c977f5bda8337efa37c3e8dcc04,2024-09-03T15:13:16.580000
|
||||
@ -259797,6 +259799,7 @@ CVE-2024-4529,0,0,5fbb4c14219ef7d51954458b7780a68dbee769876e9489db6e9ba34bd68834
|
||||
CVE-2024-45294,0,0,571ccadaa63af3685b6ee82cf020ce004878004e5a04088787ea6924189ffc78,2024-09-06T17:15:16.977000
|
||||
CVE-2024-45295,0,0,9cbcd7c9c4357757a60245b46b7ad7987cdeaebea00bcdcc3890fa90524c0282,2024-09-06T17:15:17.053000
|
||||
CVE-2024-45296,0,0,49181c4036a3982c1d4d8e879ccd14076733bcb79f94fe42ac7b08410afb4b40,2024-09-10T12:09:50.377000
|
||||
CVE-2024-45298,1,1,6778b5969d1a96041077fbe293ccb84a0a03abbad60216232d94385551983c96,2024-09-18T17:15:18.570000
|
||||
CVE-2024-45299,0,0,1dc20bab2e5804f3b833440e86d8fa4e2d640a2a31779b302ea51c7be7ad4d71,2024-09-06T16:46:26.830000
|
||||
CVE-2024-4530,0,0,6b78f15ba2a60e96a20ff176cd49d228ee37f0e30a4b3e696092a717f8a23e27,2024-05-28T12:39:28.377000
|
||||
CVE-2024-45300,0,0,371ea055cbd370f2315f57d501b2d8bde7fe9993dc271953659e5b000db99936,2024-09-06T16:46:26.830000
|
||||
@ -259849,10 +259852,10 @@ CVE-2024-45409,0,0,e8a57f681223d5d4d86ed3700b6bbf47ebb91cc7ae4b5cd7db2b29b0bb144
|
||||
CVE-2024-4541,0,0,3195b1a81526d9da93cf28b1e1f763238ece2897561011f493b9a3c77f12398c,2024-06-20T12:44:01.637000
|
||||
CVE-2024-45411,0,0,73f9cc9a45fb9019dfacefd1c32caeadc6f839e3ee71584e1458f0e26c536208,2024-09-10T12:09:50.377000
|
||||
CVE-2024-45412,0,0,68bd5e75f1c3c7017abcc752fdd96b826ed1ef4251ed03428fdbd5051759e5da,2024-09-10T17:43:14.410000
|
||||
CVE-2024-45413,0,0,ec02e46e9e7fd029707aa2a2bf4f3c28dd5fd70bed3505501350c9438fad6e58,2024-09-16T21:15:45.833000
|
||||
CVE-2024-45414,0,0,a9f08eb10c4590024ebfde45cfdf2d42aead345785d68ee11ce8ca32cb324c57,2024-09-16T21:15:45.890000
|
||||
CVE-2024-45415,0,0,78a82d63f13c77794c18e94aeb534cc6676f865ce6cd73bf302a9bb8065c6818,2024-09-16T21:15:45.943000
|
||||
CVE-2024-45416,0,0,853a5d5c6bc98cf813ea817f38e987a82cef00775e62ddfd842c6fb99f24abe1,2024-09-16T21:15:46.003000
|
||||
CVE-2024-45413,0,1,3cc285414744f60efccd03699e55ff34dac4157bc03bfc377bc6534ddca8a4f3,2024-09-18T16:35:11.470000
|
||||
CVE-2024-45414,0,1,ea9e5d910110decb98e2bd5c89cc9f29dc679ec390f973c1296ad46e2bbe0d8f,2024-09-18T16:35:12.227000
|
||||
CVE-2024-45415,0,1,a6fabe6bf38a72092e23cb8ceb357418f175cf0c07979f8a62bb321584367184,2024-09-18T16:35:12.983000
|
||||
CVE-2024-45416,0,1,714211c19307b08eb58a343ae24c2a0b4c29773c82270b525ccb56dae3192098,2024-09-18T16:35:13.743000
|
||||
CVE-2024-4542,0,0,188546ca483f93e7131261a5bd57b93b03491de5e62247759ac8c05b93c8f51b,2024-05-16T14:15:08.980000
|
||||
CVE-2024-45429,0,0,cb79d4cb1119eef526a53ffe42933f2c5d8ecfb1b3eb67e65dd167ddf505fc2d,2024-09-13T20:48:05.387000
|
||||
CVE-2024-4543,0,0,cda17786b919b03cc3eee3c735d905916723b9b88a929a8c3a419843d78bdd6c,2024-07-03T18:23:54.237000
|
||||
@ -259944,7 +259947,7 @@ CVE-2024-4565,0,0,15260fda70e8733111d52b1dae1a14ee33f22d1739a2e8de851c031d5bec2f
|
||||
CVE-2024-4566,0,0,c4354a4e62a03c97286174a61ad4d2f3843d01589ace1532dbd5a5f84743d16c,2024-05-21T12:37:59.687000
|
||||
CVE-2024-4567,0,0,55b6508070b71672e22c57660afab28e7ebc1a40a37655965c41825cdc3bc17a,2024-05-14T16:11:39.510000
|
||||
CVE-2024-45678,0,0,a1fda46a16546e5971e32d47cf6c55c6e5adf9e7e7bc6498d2c3cdc35ca99a2c,2024-09-12T20:07:09.640000
|
||||
CVE-2024-45679,0,0,a78fe9a0c393ad2299db108df7105d5af9c75d4303ab21775725a885720a997b,2024-09-18T04:15:42.080000
|
||||
CVE-2024-45679,0,1,24fe5e8b07957bef72ba6b8d0da3520fbc3692507139f06d451cd33c077c5a94,2024-09-18T16:35:14.530000
|
||||
CVE-2024-4568,0,0,950b62937f2f303cb16f164d002be64527131317e5dfff26daecb96b6bec4236,2024-05-07T13:39:32.710000
|
||||
CVE-2024-45682,0,0,0a3a96f00baaac84815943dcdccfa17287729c7fa491cf17cf5846701260505e,2024-09-17T18:15:04.893000
|
||||
CVE-2024-4569,0,0,2e4b27b05be8561bd3f260b3ccf0eed0d11ea74483878f5df5227737faa1c038,2024-06-28T13:10:05.153000
|
||||
@ -259981,6 +259984,7 @@ CVE-2024-45804,0,0,9c3150fd449f47d5e8da1aa073c6ed29687a211817f4370f22049a4ad2a93
|
||||
CVE-2024-4581,0,0,87f8fe03f507957c50ab3e12c65c26f01a42761aed681f779ccb3bf731c25cc4,2024-06-04T16:57:41.053000
|
||||
CVE-2024-45811,0,0,f0df0a439acb31f6186bb710f50e08de1db9507a40924c9c8e01331981994a78,2024-09-17T20:15:05.800000
|
||||
CVE-2024-45812,0,0,5296a33ded9dac212f5f77eaf6bb8e39d45694864c0a4631f697e8131e868b30,2024-09-17T20:15:06.037000
|
||||
CVE-2024-45813,1,1,0eadbef1de308ef8515c0af27022620f76b7b1a7b20031c5ee8c246824fc0e60,2024-09-18T17:15:19.163000
|
||||
CVE-2024-45815,0,0,6121c6708e592c490155dce1fe575882728b0a6c1af42d4541c312ae5b01ce7e,2024-09-17T21:15:12.320000
|
||||
CVE-2024-45816,0,0,bd13ff224f761096d12293be0d33d1aab90974326ea62d89cf84a16485cf8833,2024-09-17T21:15:12.553000
|
||||
CVE-2024-4582,0,0,44a298c10fdfe0ab8acf9c943d89720dd7bed9fa14549ad9833d5c0a75c14780,2024-06-04T19:20:42.750000
|
||||
@ -260006,7 +260010,7 @@ CVE-2024-45854,0,0,5f2ec656fa84647920a6b33fa5c2d62d11148d85f4c62c01feffe9bb5b57c
|
||||
CVE-2024-45855,0,0,b8b3a725ae8bf0f62655fdebc48ac0030507baf797da7b56c3156e7506de5acf,2024-09-16T18:03:27.970000
|
||||
CVE-2024-45856,0,0,0d2d555a4be2f7d0582132e7868cb1ae44e7be28b33194ae92062d7b37f54103,2024-09-16T18:04:07.503000
|
||||
CVE-2024-45857,0,0,baf58007ae785d8a411fcf58ab797e8aa621cae99978a873f3918c60d00cf497,2024-09-12T18:14:03.913000
|
||||
CVE-2024-45858,1,1,26e716964960a7625743254ab836d7c358ad6927670be1bca3f8d6e0ddda0dbf,2024-09-18T15:15:16.333000
|
||||
CVE-2024-45858,0,0,26e716964960a7625743254ab836d7c358ad6927670be1bca3f8d6e0ddda0dbf,2024-09-18T15:15:16.333000
|
||||
CVE-2024-4586,0,0,308ac0f257920a7bf6e50f46839419870b7e733c7917681ea48f64312191a5cb,2024-06-04T19:20:42.953000
|
||||
CVE-2024-4587,0,0,ccb551f2bab92e34c98709c8a5231b1e8778dd90f0d16bd4ac4c665438d47b6c,2024-06-04T19:20:43.057000
|
||||
CVE-2024-4588,0,0,9198a141cbfd67d79271a90e0ce19e828dccb043a1ec84b18e696744e0f31db8,2024-06-04T19:20:43.163000
|
||||
@ -260036,6 +260040,7 @@ CVE-2024-4606,0,0,f985d30934b7c1f8930bf2267fb972a68a7301f3b4fab17a99fda7060e053c
|
||||
CVE-2024-4607,0,0,26d7fb8a60d9724fbac67d9d15e472fd268b8645ac384c2f62b0c7323928361f,2024-09-10T15:03:24.710000
|
||||
CVE-2024-4608,0,0,6b948b515db267f779f431dbe386ca01ccd7f50a9fc569455bb84149dca96357,2024-07-24T17:59:54.607000
|
||||
CVE-2024-46085,0,0,4bcdae61af1b4709b2602a60bed18e8d14f66a9e47eac90a75adf8f8594192f4,2024-09-17T18:35:01.317000
|
||||
CVE-2024-46086,1,1,4af7903ddb29d8d7dc2f9165fb1ab2e72953018208f733aa4da3b701e8170b77,2024-09-18T16:15:06.160000
|
||||
CVE-2024-4609,0,0,b6f3fd3db9085553e8d026a562774e21d6dc7bb2eb7a9a6cfeb43138546783c0,2024-05-17T18:36:31.297000
|
||||
CVE-2024-4610,0,0,43047990281e26a04055de4ace6574603f0b08f61a7727d9acdec64f6d8d9784,2024-08-14T17:06:24.800000
|
||||
CVE-2024-4611,0,0,51a3d5438728b832e97210e2f9860d8c98e7a9272bd8319e6cdccdf57653adc1,2024-05-29T13:02:09.280000
|
||||
@ -260063,9 +260068,9 @@ CVE-2024-4636,0,0,5f6d994195b0d258cedd76eef14490d422ed4d9e1ed2778ad911a6f2ded3ef
|
||||
CVE-2024-46362,0,0,19797b772fedfa56b8ab1944bfa10d47aee5c75ee333d19ae89a45da58afb3c6,2024-09-17T18:35:02.140000
|
||||
CVE-2024-4637,0,0,feac91fbe82af9a41f47d1c690f7cb9ac382f5ae365379b4bab97a7b08b57d3e,2024-06-04T16:57:41.053000
|
||||
CVE-2024-4638,0,0,a819fdfba96fa18a2f7909a394b6447b878ef2488f2357c7db7b0cfcaa9db703,2024-06-25T12:24:17.873000
|
||||
CVE-2024-4639,0,1,d09b63781578ea43d80f90bc1869913d7850dd4433262c761e06a825045658ac,2024-09-18T15:46:04.960000
|
||||
CVE-2024-4640,0,1,561eb45560c6a2512cf49113a4a8a4e86a4cf3daabba823a155e6305f710bfc9,2024-09-18T15:48:43.557000
|
||||
CVE-2024-4641,0,1,d2927a28c50e25615b8d9b87dbdc2988c0bb0a134e471834d0fabc4f24e49cb1,2024-09-18T15:52:41.237000
|
||||
CVE-2024-4639,0,0,d09b63781578ea43d80f90bc1869913d7850dd4433262c761e06a825045658ac,2024-09-18T15:46:04.960000
|
||||
CVE-2024-4640,0,0,561eb45560c6a2512cf49113a4a8a4e86a4cf3daabba823a155e6305f710bfc9,2024-09-18T15:48:43.557000
|
||||
CVE-2024-4641,0,0,d2927a28c50e25615b8d9b87dbdc2988c0bb0a134e471834d0fabc4f24e49cb1,2024-09-18T15:52:41.237000
|
||||
CVE-2024-46419,0,0,75fafdfe43d678734223982a9d05d92176b9e138ef313759af24f79de1b289e9,2024-09-17T14:35:29.797000
|
||||
CVE-2024-4642,0,0,feffee00bc573269c6a6673aa02a71420853934841cc7ed393cab7b6bdc385e1,2024-05-20T17:15:09.667000
|
||||
CVE-2024-46424,0,0,46898876dcaeac361faa83e092e89c9c35f949e2ef780f98d9a42ea4cbe250aa,2024-09-17T14:35:30.557000
|
||||
@ -260083,43 +260088,43 @@ CVE-2024-4652,0,0,8fd7af949b4c89aa1e5f9f8bc7784e47292323116a1f6a56ecb880f3c410a5
|
||||
CVE-2024-4653,0,0,7b6d5c0913690c5b51d844fc9718b4208eaa5f352f244fd41eee7be1add5e3bc,2024-06-04T19:20:44.990000
|
||||
CVE-2024-4654,0,0,0088d34096b2578204ff98fe71c1f702e4c8866653411407f72fe940a56448df,2024-06-04T19:20:45.100000
|
||||
CVE-2024-4655,0,0,95970f39f135367edf16c40c69bbdd98999f38726ef0802da749dedbafaa6dbb,2024-08-01T13:59:32.490000
|
||||
CVE-2024-46550,1,1,aa050264d9c75e0eaf28944c9ca950f4fef57fa00bd271bdc9470a72e8d92779,2024-09-18T15:15:16.533000
|
||||
CVE-2024-46551,1,1,fcc68f84a59b25c736446d685841bc48e7e1c08b935a05835a527ba9f0068aad,2024-09-18T15:15:16.590000
|
||||
CVE-2024-46552,1,1,4ae72437d53be5c53f87fd86447519952146284f253b00894fe6f6ee36afc075,2024-09-18T15:15:16.650000
|
||||
CVE-2024-46553,1,1,a24adcaea8735b1c5bc528a60e7f02527cf2400261bfc7352812b8f5da038499,2024-09-18T15:15:16.720000
|
||||
CVE-2024-46554,1,1,ff9a9a690bae5595b61975c9783973f24a76e4da8d91f653300ef9eb17ec908e,2024-09-18T15:15:16.783000
|
||||
CVE-2024-46555,1,1,b2f0f82493457739a95559ebe2860e9b0a286a704737f1c4920620f2f735b473,2024-09-18T15:15:16.837000
|
||||
CVE-2024-46556,1,1,6f237c3dcfeb013f44fd59ac69b0ed4c776bc80c4979643671f66c59014ebb6d,2024-09-18T15:15:16.910000
|
||||
CVE-2024-46557,1,1,e72d40316a8dd14fd51f98ff60889639ed433426e9340d188fd5b0b9f865e394,2024-09-18T15:15:16.983000
|
||||
CVE-2024-46558,1,1,1e4b9db0244226da4b652846ba62e062409aaa4336ec7927d034ecfdab1d030e,2024-09-18T15:15:17.033000
|
||||
CVE-2024-46559,1,1,66ba1cadc0fa9983f2e6258b53180181a5940d101a31445d7c6382c8089bd458,2024-09-18T15:15:17.097000
|
||||
CVE-2024-46550,0,0,aa050264d9c75e0eaf28944c9ca950f4fef57fa00bd271bdc9470a72e8d92779,2024-09-18T15:15:16.533000
|
||||
CVE-2024-46551,0,0,fcc68f84a59b25c736446d685841bc48e7e1c08b935a05835a527ba9f0068aad,2024-09-18T15:15:16.590000
|
||||
CVE-2024-46552,0,0,4ae72437d53be5c53f87fd86447519952146284f253b00894fe6f6ee36afc075,2024-09-18T15:15:16.650000
|
||||
CVE-2024-46553,0,0,a24adcaea8735b1c5bc528a60e7f02527cf2400261bfc7352812b8f5da038499,2024-09-18T15:15:16.720000
|
||||
CVE-2024-46554,0,0,ff9a9a690bae5595b61975c9783973f24a76e4da8d91f653300ef9eb17ec908e,2024-09-18T15:15:16.783000
|
||||
CVE-2024-46555,0,0,b2f0f82493457739a95559ebe2860e9b0a286a704737f1c4920620f2f735b473,2024-09-18T15:15:16.837000
|
||||
CVE-2024-46556,0,0,6f237c3dcfeb013f44fd59ac69b0ed4c776bc80c4979643671f66c59014ebb6d,2024-09-18T15:15:16.910000
|
||||
CVE-2024-46557,0,0,e72d40316a8dd14fd51f98ff60889639ed433426e9340d188fd5b0b9f865e394,2024-09-18T15:15:16.983000
|
||||
CVE-2024-46558,0,0,1e4b9db0244226da4b652846ba62e062409aaa4336ec7927d034ecfdab1d030e,2024-09-18T15:15:17.033000
|
||||
CVE-2024-46559,0,0,66ba1cadc0fa9983f2e6258b53180181a5940d101a31445d7c6382c8089bd458,2024-09-18T15:15:17.097000
|
||||
CVE-2024-4656,0,0,32c9d7e0c2f1168ca7d7381e4fab827ca08fdbd964272924da1671d43db7cf43,2024-05-15T16:40:19.330000
|
||||
CVE-2024-46560,1,1,37da0c86e41fc40c51a23b7f6a7b240acdf885adb21893ecaa6f897d1dd88785,2024-09-18T15:15:17.160000
|
||||
CVE-2024-46561,1,1,827610d713c85938edcd0a672f3b80989b8c1603e1ec2096d515c8f1170c5ad3,2024-09-18T15:15:17.210000
|
||||
CVE-2024-46564,1,1,9c53abc4290095ef9c94b8caa6151b1582d026c56de5ba2cd9b9332a36672a98,2024-09-18T15:15:17.263000
|
||||
CVE-2024-46565,1,1,561c47320a036b7b30a61f0ef3bbd0d90faf83f4491fcff8c9e4f46a1e316d4b,2024-09-18T15:15:17.313000
|
||||
CVE-2024-46566,1,1,15038b0259be6ed1c83206e5ca18daab2195f1035bd94d1c801bed7080ca14e0,2024-09-18T15:15:17.367000
|
||||
CVE-2024-46567,1,1,44339a18e76c5d329445112c0f2a519b76b8cc97c1f690731297cc4f99a31fa1,2024-09-18T15:15:17.420000
|
||||
CVE-2024-46568,1,1,05fa5319f0d6b7344bf7591c14d218b1e6beee6ec4ddb07a35b64cced2067e93,2024-09-18T15:15:17.480000
|
||||
CVE-2024-46571,1,1,e147345ced5c037c296665623edee70a8ff952e5f4fcfef2bee5357d86b43a4b,2024-09-18T15:15:17.530000
|
||||
CVE-2024-46580,1,1,8a7cc23843ab7532bc4e099084ca1b38d8dfcf5f163b1bb3e99eab8c8ac72ae9,2024-09-18T15:15:17.580000
|
||||
CVE-2024-46581,1,1,1a036e61c05d9d99887e7d746c30ab4284053b1827b71ef577771edfcec73f46,2024-09-18T15:15:17.630000
|
||||
CVE-2024-46582,1,1,6ee4cb064a18113fc6425d973eefd431c1555a88498d2efdabc5b4d31b23f054,2024-09-18T15:15:17.680000
|
||||
CVE-2024-46583,1,1,508d7037cd9a3fa45380a1ca74eaea66ed78dc6a2a8be1ffd7894b484b48a76f,2024-09-18T15:15:17.723000
|
||||
CVE-2024-46584,1,1,34fa714c00f27ad0f9a3f20e7b04852da2c076b04a454c4756d287d37e8e355b,2024-09-18T15:15:17.790000
|
||||
CVE-2024-46585,1,1,ba843aa332ed1b6f4d5a208bd96955eb825f18ff133704cd63952e11387f48bc,2024-09-18T15:15:17.847000
|
||||
CVE-2024-46586,1,1,08a48d19535eb5815c7ce6f65e01510f51e72c874c4516a2435fa8010ff5b366,2024-09-18T15:15:17.900000
|
||||
CVE-2024-46588,1,1,ff98a8a93245f9c4378c483d60cd2119fb71c96600bf3b5852f0b765014eb8fd,2024-09-18T15:15:17.957000
|
||||
CVE-2024-46589,1,1,2ccd47f6dde4cb9bd5a952c0acce27bec1df77ff8e3ebd0de81f26c955d68dd3,2024-09-18T15:15:18.007000
|
||||
CVE-2024-46590,1,1,3c98dd0cb0cdc1588f2b8481c088df10a5bb6b24dfe436e35ed185ca33e9d88b,2024-09-18T15:15:18.067000
|
||||
CVE-2024-46591,1,1,7ff9db331a08522ac36f6b43693e46370b7012e0693f21c83b5069be6ac29210,2024-09-18T15:15:18.117000
|
||||
CVE-2024-46592,1,1,e65fbc2fdacf3a4508ae490381ebfac511e16cad69e7ab7fe064e842b3950547,2024-09-18T15:15:18.170000
|
||||
CVE-2024-46593,1,1,6cb9d636a3fe6e5a69f34f615afd793e995b7794da720f7ed13ee9358943e1d7,2024-09-18T15:15:18.220000
|
||||
CVE-2024-46594,1,1,1427e388d15f33e0b70e916c025c4e148e9ed15a1c578a27a75c8212070e236a,2024-09-18T15:15:18.263000
|
||||
CVE-2024-46595,1,1,c899a8cf55794b9fcb48be5696c7fdeeb5e92162dce0b2bdbbfc91e998231fe2,2024-09-18T15:15:18.307000
|
||||
CVE-2024-46596,1,1,e16790bb87529e3fa3cb3cf96e2e3f0675ec1ed29d7419b87fded006ce573939,2024-09-18T15:15:18.353000
|
||||
CVE-2024-46597,1,1,3b9086fd52147db347360741cdd07d08edd41d7cfccca81420fdb015dad854f8,2024-09-18T15:15:18.400000
|
||||
CVE-2024-46598,1,1,b528b31684949ece420878ed09068cc05a18e9683ebc282b3aff4d118a5ba696,2024-09-18T15:15:18.453000
|
||||
CVE-2024-46560,0,0,37da0c86e41fc40c51a23b7f6a7b240acdf885adb21893ecaa6f897d1dd88785,2024-09-18T15:15:17.160000
|
||||
CVE-2024-46561,0,0,827610d713c85938edcd0a672f3b80989b8c1603e1ec2096d515c8f1170c5ad3,2024-09-18T15:15:17.210000
|
||||
CVE-2024-46564,0,0,9c53abc4290095ef9c94b8caa6151b1582d026c56de5ba2cd9b9332a36672a98,2024-09-18T15:15:17.263000
|
||||
CVE-2024-46565,0,0,561c47320a036b7b30a61f0ef3bbd0d90faf83f4491fcff8c9e4f46a1e316d4b,2024-09-18T15:15:17.313000
|
||||
CVE-2024-46566,0,0,15038b0259be6ed1c83206e5ca18daab2195f1035bd94d1c801bed7080ca14e0,2024-09-18T15:15:17.367000
|
||||
CVE-2024-46567,0,0,44339a18e76c5d329445112c0f2a519b76b8cc97c1f690731297cc4f99a31fa1,2024-09-18T15:15:17.420000
|
||||
CVE-2024-46568,0,0,05fa5319f0d6b7344bf7591c14d218b1e6beee6ec4ddb07a35b64cced2067e93,2024-09-18T15:15:17.480000
|
||||
CVE-2024-46571,0,0,e147345ced5c037c296665623edee70a8ff952e5f4fcfef2bee5357d86b43a4b,2024-09-18T15:15:17.530000
|
||||
CVE-2024-46580,0,0,8a7cc23843ab7532bc4e099084ca1b38d8dfcf5f163b1bb3e99eab8c8ac72ae9,2024-09-18T15:15:17.580000
|
||||
CVE-2024-46581,0,0,1a036e61c05d9d99887e7d746c30ab4284053b1827b71ef577771edfcec73f46,2024-09-18T15:15:17.630000
|
||||
CVE-2024-46582,0,0,6ee4cb064a18113fc6425d973eefd431c1555a88498d2efdabc5b4d31b23f054,2024-09-18T15:15:17.680000
|
||||
CVE-2024-46583,0,0,508d7037cd9a3fa45380a1ca74eaea66ed78dc6a2a8be1ffd7894b484b48a76f,2024-09-18T15:15:17.723000
|
||||
CVE-2024-46584,0,0,34fa714c00f27ad0f9a3f20e7b04852da2c076b04a454c4756d287d37e8e355b,2024-09-18T15:15:17.790000
|
||||
CVE-2024-46585,0,0,ba843aa332ed1b6f4d5a208bd96955eb825f18ff133704cd63952e11387f48bc,2024-09-18T15:15:17.847000
|
||||
CVE-2024-46586,0,0,08a48d19535eb5815c7ce6f65e01510f51e72c874c4516a2435fa8010ff5b366,2024-09-18T15:15:17.900000
|
||||
CVE-2024-46588,0,0,ff98a8a93245f9c4378c483d60cd2119fb71c96600bf3b5852f0b765014eb8fd,2024-09-18T15:15:17.957000
|
||||
CVE-2024-46589,0,0,2ccd47f6dde4cb9bd5a952c0acce27bec1df77ff8e3ebd0de81f26c955d68dd3,2024-09-18T15:15:18.007000
|
||||
CVE-2024-46590,0,0,3c98dd0cb0cdc1588f2b8481c088df10a5bb6b24dfe436e35ed185ca33e9d88b,2024-09-18T15:15:18.067000
|
||||
CVE-2024-46591,0,0,7ff9db331a08522ac36f6b43693e46370b7012e0693f21c83b5069be6ac29210,2024-09-18T15:15:18.117000
|
||||
CVE-2024-46592,0,0,e65fbc2fdacf3a4508ae490381ebfac511e16cad69e7ab7fe064e842b3950547,2024-09-18T15:15:18.170000
|
||||
CVE-2024-46593,0,0,6cb9d636a3fe6e5a69f34f615afd793e995b7794da720f7ed13ee9358943e1d7,2024-09-18T15:15:18.220000
|
||||
CVE-2024-46594,0,0,1427e388d15f33e0b70e916c025c4e148e9ed15a1c578a27a75c8212070e236a,2024-09-18T15:15:18.263000
|
||||
CVE-2024-46595,0,0,c899a8cf55794b9fcb48be5696c7fdeeb5e92162dce0b2bdbbfc91e998231fe2,2024-09-18T15:15:18.307000
|
||||
CVE-2024-46596,0,0,e16790bb87529e3fa3cb3cf96e2e3f0675ec1ed29d7419b87fded006ce573939,2024-09-18T15:15:18.353000
|
||||
CVE-2024-46597,0,0,3b9086fd52147db347360741cdd07d08edd41d7cfccca81420fdb015dad854f8,2024-09-18T15:15:18.400000
|
||||
CVE-2024-46598,0,0,b528b31684949ece420878ed09068cc05a18e9683ebc282b3aff4d118a5ba696,2024-09-18T15:15:18.453000
|
||||
CVE-2024-4660,0,0,e2da4ceee6df96a1cb7e9b187d6ffc85e3946e3cc1d921567db2bce412f91772,2024-09-14T14:57:01.130000
|
||||
CVE-2024-4661,0,0,f19406aac3e0e4dd229494d2c7f4a9ae6fd94c8256be755b3955222db7d3bf70,2024-06-10T02:52:08.267000
|
||||
CVE-2024-4662,0,0,42d3ec88d759fc9bf88fc92972e0c9891830916b90a0cdbb0331ad5486f420dd,2024-05-24T01:15:30.977000
|
||||
@ -260294,8 +260299,9 @@ CVE-2024-46976,0,0,f3786e54e8d51b8dd39dbbbd9771974fd9112681cfc7638f96badfdf4c35d
|
||||
CVE-2024-4698,0,0,9dba1ffb097faf0537551ac7612916f547965c7b253baf1637388ba1ee83ae86,2024-05-20T13:00:34.807000
|
||||
CVE-2024-46982,0,0,ea2fe597553d263f2cd1280d984988f3dd8bd84e5f24bd16a84753abcca26655,2024-09-17T22:15:02.273000
|
||||
CVE-2024-4699,0,0,094a3293d1ad6c00b8f42deb1643b829befd633ab0dcef49a183da331debaad7,2024-08-06T19:15:57.580000
|
||||
CVE-2024-46990,1,1,0086cd506cde60b64c95cfd59e3cef371a66ac89f344398a809e570bfb502034,2024-09-18T17:15:19.687000
|
||||
CVE-2024-4700,0,0,fa1a582bbd6e4a675ead2d89728236d2ca7c92c15fe998cffa14cb24a4febb9d,2024-05-21T12:37:59.687000
|
||||
CVE-2024-47001,0,0,094e9aa8d79eefa5514e8d3a7817f886863a81c7b672996006f51769cece0126,2024-09-18T07:15:04.220000
|
||||
CVE-2024-47001,0,1,83229a19d20eee81e566ef79ab83e90e0827d76bd000b5c84838a15b7c996890,2024-09-18T16:35:16.540000
|
||||
CVE-2024-4701,0,0,5f841f0540b46f49c80d409ca526b0c08d190fe4f1f5bc2d7cfb115b5ba38647,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4702,0,0,dd020b59844aa3c2b904a852a1e5f578b8784127317756ef97f595c083848ea0,2024-05-15T16:40:19.330000
|
||||
CVE-2024-4703,0,0,7e57d47de6048bcd912b4c77aa51d488946887d89315e68305481f1a25780324,2024-06-11T18:06:31.967000
|
||||
@ -261169,7 +261175,7 @@ CVE-2024-5678,0,0,afe74031d89f42a567cee8ccb637e89bb2adfa159544a8b4a6426bad0bf894
|
||||
CVE-2024-5679,0,0,0839965cde25fea3aa350fa717eb81302bb5423efd743b60fd44dbd620732a01,2024-07-12T16:38:44.027000
|
||||
CVE-2024-5680,0,0,4b89f5f26e3b07478091cc4705b6bf03eb5b6d7ef8a454176f219f6262119e02,2024-07-12T16:38:49.670000
|
||||
CVE-2024-5681,0,0,ba69ac569d7576d195fd1b6967a53d4cc4e5811e9ef97dab1bfc2916a4020575,2024-07-12T16:37:40.303000
|
||||
CVE-2024-5682,0,1,969b6f3cda4ea4b8882cd9ee8eb2594b87a5596afb164c53f79c5e3a897da379,2024-09-18T14:35:06.033000
|
||||
CVE-2024-5682,0,0,969b6f3cda4ea4b8882cd9ee8eb2594b87a5596afb164c53f79c5e3a897da379,2024-09-18T14:35:06.033000
|
||||
CVE-2024-5683,0,0,d868b38bbdf38c932e73ada9d6770c9e54d9ba7e4690e6e76a9813e02684500a,2024-06-24T12:57:36.513000
|
||||
CVE-2024-5684,0,0,6dc10e55a9350eba996ce70432d644a2a60e5231b687551b107b8ab41fb44f1c,2024-06-11T18:13:30.163000
|
||||
CVE-2024-5685,0,0,08c398f5d772f4e953acbb7297cc0e7eb76495399d04b916942753d822d0eb8a,2024-06-19T09:15:12.173000
|
||||
@ -261399,9 +261405,9 @@ CVE-2024-5952,0,0,4b0244413edcc544ed5c05479b5dbc3eeb5d75652ce440b39e8ad3eb0aaa28
|
||||
CVE-2024-5953,0,0,0b3a2e806b18666b2c6a15758894da60b95802ead709b5c7200c052eff2cbfed,2024-09-11T11:15:11.350000
|
||||
CVE-2024-5956,0,0,420ebddf13dc6945f3b24acaba57b0a6b03370d22cfc4e076d52d9e45c18f699,2024-09-06T16:25:19.253000
|
||||
CVE-2024-5957,0,0,c06bad62b3a76beb3abdcaffc89e2e904ca620c6e7deccb3fcebfda71eaf22f8,2024-09-06T16:24:23.317000
|
||||
CVE-2024-5958,1,1,eb1f208f756febdf31da5f71c45b0e34465f30babc97c88a7e7c51e662e6457d,2024-09-18T15:15:18.510000
|
||||
CVE-2024-5959,1,1,95bf313e7e72966f30a3e12fd340025779a485583f7f275e9527de048f4965de,2024-09-18T15:15:18.623000
|
||||
CVE-2024-5960,1,1,3c93a6aa2927884a82438d1c0ef1d4ab36a1bcd826d98efeecd74446d52f871f,2024-09-18T15:15:18.740000
|
||||
CVE-2024-5958,0,0,eb1f208f756febdf31da5f71c45b0e34465f30babc97c88a7e7c51e662e6457d,2024-09-18T15:15:18.510000
|
||||
CVE-2024-5959,0,0,95bf313e7e72966f30a3e12fd340025779a485583f7f275e9527de048f4965de,2024-09-18T15:15:18.623000
|
||||
CVE-2024-5960,0,0,3c93a6aa2927884a82438d1c0ef1d4ab36a1bcd826d98efeecd74446d52f871f,2024-09-18T15:15:18.740000
|
||||
CVE-2024-5961,0,0,458be8cb6fdb0d558a4d51d11b5f294250dd9695661afd805b88290bb2df249d,2024-06-17T12:42:04.623000
|
||||
CVE-2024-5963,0,0,a4cccf44b2eb0314cba658473713210aafeaf2066181b69f96f839930da4f321,2024-08-06T16:30:24.547000
|
||||
CVE-2024-5964,0,0,d6f5f38a4c6449f04f742ee04a5db3f604bc83ddff32647d9051bd1d156e71e9,2024-07-18T12:28:43.707000
|
||||
@ -262137,8 +262143,8 @@ CVE-2024-6872,0,0,9eb628e3a6d1ea0380e94dd099512f5a2f74ddb0ba75bf9a102e83ab13e260
|
||||
CVE-2024-6873,0,0,8e5db8bfa0491746f29814d1d8249a1850325cbcdbd09b52dbf90709e95d212c,2024-08-01T16:45:25.400000
|
||||
CVE-2024-6874,0,0,805a0b27cbdf811d96209b292e2d5909e967f9d3161226db1f6fe45d6b995555,2024-09-10T15:27:04.190000
|
||||
CVE-2024-6876,0,0,743577dc92893ad331003e5e7d748a3bee9fa96e904d71b602ea86d0aeed6917,2024-09-10T17:43:14.410000
|
||||
CVE-2024-6877,1,1,c778de9272c5a8813b8beccd6fc852d9bef42e13437f5fac87efcad188a03490,2024-09-18T15:15:18.860000
|
||||
CVE-2024-6878,1,1,db12157b937b7fc348973352c9cf8dbecbecf18ce1feaf5ec1dfd1582a4ca22f,2024-09-18T15:15:18.970000
|
||||
CVE-2024-6877,0,0,c778de9272c5a8813b8beccd6fc852d9bef42e13437f5fac87efcad188a03490,2024-09-18T15:15:18.860000
|
||||
CVE-2024-6878,0,0,db12157b937b7fc348973352c9cf8dbecbecf18ce1feaf5ec1dfd1582a4ca22f,2024-09-18T15:15:18.970000
|
||||
CVE-2024-6879,0,0,6dd99f7574923c6a0220f28a1253b4ac8ff29b09a2650b86b7b021e79b9e4f08,2024-08-28T15:35:24.120000
|
||||
CVE-2024-6881,0,0,9eb1bb1325feedc0a442bcf6c20b4ef8c1194f18829a36ce47ae950cf638d18d,2024-08-27T11:15:04.740000
|
||||
CVE-2024-6883,0,0,17af31f8537d0ebfdcc29735e63f85da6d525c783f08d8df80e6d71ccea2f1ba,2024-08-21T12:30:33.697000
|
||||
@ -262964,7 +262970,7 @@ CVE-2024-8005,0,0,c059370cb975aea915e5671e32cb80d879151797480dbd5423b1593aeba966
|
||||
CVE-2024-8006,0,0,092177f7b5a6e786b0c334d1c1238c9acce1b59320806ff7e04615edaed13d55,2024-09-03T12:59:02.453000
|
||||
CVE-2024-8007,0,0,d4843ecbff9c18b0a3733961009c3b0a5fd18a5329783b13479a12d64d8f35f3,2024-09-18T08:15:06.990000
|
||||
CVE-2024-8011,0,0,47ed34213e682e27e1c9cff56ca191160c24a6476f0554888eb469f5be11be06,2024-09-11T18:15:02.023000
|
||||
CVE-2024-8012,0,0,077057538036fd2de7e2ef46ba096dfeb2616c8d077a9c28a57acea505ab6056,2024-09-11T16:26:11.920000
|
||||
CVE-2024-8012,0,1,8a1525213894489e4e1b5228ce01d263a380f2eb822086dfeb6cd3303970b800,2024-09-18T17:53:47.860000
|
||||
CVE-2024-8016,0,0,2657510d64afe84d5852969b1e9344475f01e752907a5430dff930bc1f486129,2024-09-03T14:51:16.470000
|
||||
CVE-2024-8022,0,0,469d074c70ed4d6e1b7ca7023005d3bb3e3f23419b5a39b3540fd69e34fadcaa,2024-08-21T12:30:33.697000
|
||||
CVE-2024-8023,0,0,7f1c10536d9d4e1a728f09b10c1ff35f77d0bba503a7c61c411fbfd5f6584d46,2024-08-21T12:30:33.697000
|
||||
@ -263037,8 +263043,8 @@ CVE-2024-8139,0,0,30a28567f99fee6c1c6f825267497f95b5b28ab0436eee99757c8433aaff2e
|
||||
CVE-2024-8140,0,0,5905102d90fa9e01c1c294a1e12efca1eb0a1890a608c263dfef788228e71855,2024-08-26T19:09:52.653000
|
||||
CVE-2024-8141,0,0,d494eb4aa5e779d518a311786c18c827e0ced59860399587e09c025afdbaf176,2024-08-26T19:09:16.763000
|
||||
CVE-2024-8142,0,0,d4b24d12d326b40d1c063c9a3edca906c8e404b0436fcc16715466b79bbf260c,2024-08-26T19:08:38.493000
|
||||
CVE-2024-8144,0,1,b4ff9146db613e3c52e5250545428280bf39cf0da8707bed207da37f08dd2db5,2024-09-18T15:31:17.277000
|
||||
CVE-2024-8145,0,1,bd81408bdf46da0e2582ac2e30e29c3e5c1bfb2c062e1e74f1ce357731354e4f,2024-09-18T15:34:47.007000
|
||||
CVE-2024-8144,0,0,b4ff9146db613e3c52e5250545428280bf39cf0da8707bed207da37f08dd2db5,2024-09-18T15:31:17.277000
|
||||
CVE-2024-8145,0,0,bd81408bdf46da0e2582ac2e30e29c3e5c1bfb2c062e1e74f1ce357731354e4f,2024-09-18T15:34:47.007000
|
||||
CVE-2024-8146,0,0,502bd763591d1b91f8fa47be050033990936c92c3733fdcfd7eebfdf8d4cb42d,2024-08-26T12:47:20.187000
|
||||
CVE-2024-8147,0,0,ec07f8c3276e9a222de07865fca93dea2ccb4507aaa042530afe8cfe5642dbe8,2024-09-11T18:37:20.670000
|
||||
CVE-2024-8150,0,0,ec5d1f8699fbdf60c07977f622d12947268f6e6a471ea831b69250e74a2f851f,2024-09-12T21:01:57.790000
|
||||
@ -263103,7 +263109,7 @@ CVE-2024-8232,0,0,5572b7d7bb007c2d5d81196fae90ff25fc17db53d2496173f3c02b5439ff52
|
||||
CVE-2024-8234,0,0,870a131a53db84d6497bde7de38de6b7411ad7686be0738cd78fff93fab14909,2024-08-30T13:00:05.390000
|
||||
CVE-2024-8235,0,0,7072b68d002bcf4f9595f61b4137bd3d5b31c93ce76df9863ff0a1c3da8ed948,2024-09-03T12:59:02.453000
|
||||
CVE-2024-8241,0,0,35ebd2ab4c68ddc81effc80c2cf2eb8cf12caf111e7ab884d603a2c6bde8e766,2024-09-10T12:09:50.377000
|
||||
CVE-2024-8242,0,1,0ef1d79e78cd55267ee51ab0995f6e2480e4463ebaece6d40e7de318a22ccc8c,2024-09-18T15:47:56.553000
|
||||
CVE-2024-8242,0,0,0ef1d79e78cd55267ee51ab0995f6e2480e4463ebaece6d40e7de318a22ccc8c,2024-09-18T15:47:56.553000
|
||||
CVE-2024-8246,0,0,a0ea161f5af79b55120d32f423f12e116b18daee2ae5761519d4b26baee6c795,2024-09-14T11:47:14.677000
|
||||
CVE-2024-8247,0,0,36bcccbd4379b767a875eb8f1ec2f968d10cef13982c1f246ceec18e09fed9fa,2024-09-06T12:08:04.550000
|
||||
CVE-2024-8250,0,0,9b93a65d8c7dcee06e07a2e2b390d716b51503d05b493ec48aa5a8756ae94b8c,2024-08-30T16:32:16.917000
|
||||
@ -263113,7 +263119,7 @@ CVE-2024-8255,0,0,c6874ac38c80acc73ad7edcdfa1b6810f24be9f578842829800024511d128d
|
||||
CVE-2024-8258,0,0,f89f58eb5f0b3759dea8f0dae08eaa2a66704ca0d9d3594730a9f2f38b881d1e,2024-09-10T12:09:50.377000
|
||||
CVE-2024-8260,0,0,812d2a62f9a14f293d2814006504d857c705848c99804aae9066abfa5d1408ba,2024-09-03T12:59:02.453000
|
||||
CVE-2024-8268,0,0,ceeeab380c4c185371d3b97780ec883236427fb28d279219c56301bfbb794609,2024-09-10T12:09:50.377000
|
||||
CVE-2024-8269,0,1,1cde71886327f84d38bc524bb03f145915447114bd4b7b254fb181f8027e91d6,2024-09-18T15:20:44.553000
|
||||
CVE-2024-8269,0,0,1cde71886327f84d38bc524bb03f145915447114bd4b7b254fb181f8027e91d6,2024-09-18T15:20:44.553000
|
||||
CVE-2024-8271,0,0,3562c0d9d060a8b2f43387dce3941b2ee080bc34564191358e2afbabb30a0397,2024-09-14T11:47:14.677000
|
||||
CVE-2024-8274,0,0,81f15088246893eaf3249a3304ee5d5199071263c8883a7f9f22c293a16a376a,2024-09-03T14:28:06.853000
|
||||
CVE-2024-8276,0,0,3274d76cbc571327fcfea77f70e01de12a7ccc769cbd3850878973b51b7dc40b,2024-09-13T19:19:42.293000
|
||||
@ -263274,7 +263280,7 @@ CVE-2024-8601,0,0,350a6e2c691d4290217990f07e5aa1eab0aea03118253c9c9cd54625cff0b3
|
||||
CVE-2024-8604,0,0,011a82fa33d28627d93910a4b1b240e8b61f649834230335b18a4a93ce8a99bf,2024-09-10T19:14:57.017000
|
||||
CVE-2024-8605,0,0,2abdfde3fad91633012e2fbc4796f8bda82aa939ecbbf9c2890b650d01ffd42b,2024-09-13T15:31:52.140000
|
||||
CVE-2024-8610,0,0,9284b474db1beea95bd52a2a34ba37d6ccf26129d36f3b91404a653005c49f87,2024-09-17T18:48:12.130000
|
||||
CVE-2024-8611,0,0,a2b44027b2072954b313d2459899e49857f8f44440a8eb23f45a13a7d9867cef,2024-09-10T12:09:50.377000
|
||||
CVE-2024-8611,0,1,3d63bb09edc11ef6327fe857dfe381551fd3ed233dd119eaa741dce3b9b25e8e,2024-09-18T17:24:34.163000
|
||||
CVE-2024-8622,0,0,8c0d8566c114d14578f376fb46a83dd09ecfc9aef59b4f73eead49a6f9d03ae6,2024-09-12T12:35:54.013000
|
||||
CVE-2024-8631,0,0,ec0f3e499204fe8b3096f23de4c15b4f57ab537964111dc6b7313fbad5d35ea5,2024-09-14T15:22:31.717000
|
||||
CVE-2024-8635,0,0,7a33169aa1c56166fecdf7f4d906662353a5e22f1362c34800f026c91df08470,2024-09-14T15:24:45.657000
|
||||
@ -263359,12 +263365,12 @@ CVE-2024-8887,0,0,3a4ee8c7c72402467690a1d5baf4ee46122c1a9bd1979c36a47f557846bba5
|
||||
CVE-2024-8888,0,0,1e74f6eae96ea2bc3e4d1e807f25808d32b7d4278014e4cabc70fec925ff3214,2024-09-18T12:15:03.520000
|
||||
CVE-2024-8889,0,0,d14885671be48487e73dc26a56497c68dd08124696a268e049900425bd24a291,2024-09-18T12:15:03.710000
|
||||
CVE-2024-8890,0,0,855b827c685ae1eb47e1ce00665defd0cd149a05c8eda3283f4806fe62a00f74,2024-09-18T13:15:03.620000
|
||||
CVE-2024-8891,1,1,66ee1e3a5770b3f6e09e8b032a6124a31192085197984368a464d9541bf3af69,2024-09-18T14:15:20.187000
|
||||
CVE-2024-8891,0,0,66ee1e3a5770b3f6e09e8b032a6124a31192085197984368a464d9541bf3af69,2024-09-18T14:15:20.187000
|
||||
CVE-2024-8892,0,0,b8b5b660b06202667c5cd07cec126cd880bab05613441d7293a44f11f3e1c023,2024-09-18T13:15:03.907000
|
||||
CVE-2024-8897,0,0,b99b42e128a3a937599a5ee8c7a3b275ca81dee2198a043376f3ec3c0daeea34,2024-09-17T13:15:04.423000
|
||||
CVE-2024-8900,0,0,f58f5185481b4f9d895145fbfe2d15f4fe9fa908c07bf76713d81ef85bc63469,2024-09-17T19:15:29.163000
|
||||
CVE-2024-8904,0,0,ce74e59d7cc6aefa4bdd9474354070b40a396e35a6b9e3e411821983b2305342,2024-09-17T21:15:12.980000
|
||||
CVE-2024-8905,0,0,42232b47781127da504ce11f730ec8a0335185eb290dfa96eacff6a9acc97c02,2024-09-17T21:15:13.080000
|
||||
CVE-2024-8904,0,1,154b42e06b3eec9dd6263288069b5cac3c6ac5013e0c0ce81a0319625e4f3176,2024-09-18T16:35:17.877000
|
||||
CVE-2024-8905,0,1,f4bcda9cc4c1bd1ffbda7130fd2d6fba2d07ae19df57b92968e0e6b8f6a2196a,2024-09-18T16:35:18.640000
|
||||
CVE-2024-8906,0,0,a825cb604140b0e13ad78ca82d1d231a96e53bbe511215a792b4240c110540db,2024-09-17T21:15:13.140000
|
||||
CVE-2024-8907,0,0,64dc4dc8a4d40c7e225809d67f10cc92608ae63c53341c28f0018040d67ff7cd,2024-09-17T21:15:13.193000
|
||||
CVE-2024-8908,0,0,5ad2b20eaf7b11cce42e37ec1af63dc38b712b10d9cb0d1e4c7b4750e472beb6,2024-09-17T21:15:13.247000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user