Auto-Update: 2024-10-08T16:00:20.002746+00:00

This commit is contained in:
cad-safe-bot 2024-10-08 16:03:21 +00:00
parent 47cd210e60
commit 9867b3b572
70 changed files with 5216 additions and 580 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2012-6716",
"sourceIdentifier": "cve@mitre.org",
"published": "2019-08-22T13:15:11.073",
"lastModified": "2019-08-26T12:46:34.933",
"lastModified": "2024-10-08T14:03:10.323",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -85,9 +85,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wp-events-plugin:events_manager:*:*:*:*:*:wordpress:*:*",
"criteria": "cpe:2.3:a:pixelite:events_manager:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "5.1.7",
"matchCriteriaId": "2ED43500-95B8-4AB5-A66D-0FEAA006DF80"
"matchCriteriaId": "F2C20BF2-BE56-4820-AA11-A68AB35A4C4E"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2013-7477",
"sourceIdentifier": "cve@mitre.org",
"published": "2019-08-22T13:15:11.167",
"lastModified": "2019-08-26T12:47:58.503",
"lastModified": "2024-10-08T14:03:10.323",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -85,9 +85,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wp-events-plugin:events_manager:*:*:*:*:*:wordpress:*:*",
"criteria": "cpe:2.3:a:pixelite:events_manager:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "5.5.2",
"matchCriteriaId": "24EE8275-9622-407E-86E2-A7EDF14F6934"
"matchCriteriaId": "A5401C8D-3B93-43C2-87BC-2252AC6700F0"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2013-7478",
"sourceIdentifier": "cve@mitre.org",
"published": "2019-08-22T13:15:11.217",
"lastModified": "2019-08-26T12:49:29.667",
"lastModified": "2024-10-08T14:03:10.323",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -85,9 +85,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wp-events-plugin:events_manager:*:*:*:*:*:wordpress:*:*",
"criteria": "cpe:2.3:a:pixelite:events_manager:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "5.5",
"matchCriteriaId": "4B7D9135-28DC-4645-AA88-D7DB6089DCB9"
"matchCriteriaId": "2C18CA33-B500-4499-8347-CD3DDDA3AF13"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2013-7479",
"sourceIdentifier": "cve@mitre.org",
"published": "2019-08-22T13:15:11.277",
"lastModified": "2019-08-26T12:52:43.477",
"lastModified": "2024-10-08T14:03:10.323",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -85,9 +85,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wp-events-plugin:events_manager:*:*:*:*:*:wordpress:*:*",
"criteria": "cpe:2.3:a:pixelite:events_manager:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "5.3.9",
"matchCriteriaId": "140450C1-7B96-414D-BBE2-4DF55A72EB81"
"matchCriteriaId": "5DE62B46-4457-4E42-9DCF-1C2990B79D2D"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2013-7480",
"sourceIdentifier": "cve@mitre.org",
"published": "2019-08-22T13:15:11.340",
"lastModified": "2019-08-26T12:51:36.020",
"lastModified": "2024-10-08T14:03:10.323",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -85,9 +85,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wp-events-plugin:events_manager:*:*:*:*:*:wordpress:*:*",
"criteria": "cpe:2.3:a:pixelite:events_manager:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "5.3.6.1",
"matchCriteriaId": "6A3B4EB5-1FC6-4ABD-897C-1F464A819A01"
"matchCriteriaId": "045A9B5B-1A49-4993-95F3-BDFF6874C735"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2015-9297",
"sourceIdentifier": "cve@mitre.org",
"published": "2019-08-13T17:15:11.890",
"lastModified": "2023-03-01T02:43:37.110",
"lastModified": "2024-10-08T14:03:10.323",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -85,9 +85,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wp-events-plugin:events_manager:*:*:*:*:*:wordpress:*:*",
"criteria": "cpe:2.3:a:pixelite:events_manager:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "5.6",
"matchCriteriaId": "DF5D637C-3679-495A-95AE-36C735EB5D16"
"matchCriteriaId": "76EB2055-3DA6-415E-B09F-42784AF8597E"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2015-9298",
"sourceIdentifier": "cve@mitre.org",
"published": "2019-08-13T17:15:11.953",
"lastModified": "2023-03-01T02:50:04.407",
"lastModified": "2024-10-08T14:03:10.323",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -85,9 +85,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wp-events-plugin:events_manager:*:*:*:*:*:wordpress:*:*",
"criteria": "cpe:2.3:a:pixelite:events_manager:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "5.6",
"matchCriteriaId": "DF5D637C-3679-495A-95AE-36C735EB5D16"
"matchCriteriaId": "76EB2055-3DA6-415E-B09F-42784AF8597E"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2015-9299",
"sourceIdentifier": "cve@mitre.org",
"published": "2019-08-13T17:15:12.000",
"lastModified": "2019-08-16T01:53:43.837",
"lastModified": "2024-10-08T14:03:10.323",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -85,9 +85,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wp-events-plugin:events_manager:*:*:*:*:*:wordpress:*:*",
"criteria": "cpe:2.3:a:pixelite:events_manager:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "5.5.7.1",
"matchCriteriaId": "A63D92EB-2801-4FE5-9281-7D19FF921DEC"
"matchCriteriaId": "6ABAB1FF-B6FA-4C74-9447-6193C71DDE7D"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2015-9300",
"sourceIdentifier": "cve@mitre.org",
"published": "2019-08-13T17:15:12.063",
"lastModified": "2019-08-16T01:53:15.930",
"lastModified": "2024-10-08T14:03:10.323",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -85,9 +85,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wp-events-plugin:events_manager:*:*:*:*:*:wordpress:*:*",
"criteria": "cpe:2.3:a:pixelite:events_manager:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "5.5.7",
"matchCriteriaId": "DB0D8B02-063D-4F92-90FA-BF3B5F210179"
"matchCriteriaId": "3D46F850-FFFC-4620-87D9-49A302787BCD"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2016-3427",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2016-04-21T11:00:21.667",
"lastModified": "2024-06-27T19:23:19.670",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-08T15:35:00.827",
"vulnStatus": "Modified",
"cveTags": [],
"cisaExploitAdd": "2023-05-12",
"cisaActionDue": "2023-06-02",
@ -40,6 +40,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -77,6 +97,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2018-0576",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2018-05-14T13:29:00.757",
"lastModified": "2020-01-10T01:15:09.350",
"lastModified": "2024-10-08T14:03:10.323",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -85,9 +85,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wp-events-plugin:events_manager:*:*:*:*:*:wordpress:*:*",
"criteria": "cpe:2.3:a:pixelite:events_manager:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "5.9",
"matchCriteriaId": "73EF284E-72F6-460B-9735-5B6249C53091"
"matchCriteriaId": "3C5C261E-5EDC-4E08-BFD1-D64B9A138C88"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2018-13137",
"sourceIdentifier": "cve@mitre.org",
"published": "2019-04-12T18:29:00.367",
"lastModified": "2019-08-23T11:15:10.450",
"lastModified": "2024-10-08T14:03:10.323",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -85,8 +85,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wp-events-plugin:events_manager:5.9.4:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "26E26E94-C9C0-4F5F-AACD-1338F7E2EF31"
"criteria": "cpe:2.3:a:pixelite:events_manager:5.9.4:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "5CA63A5D-D932-41F7-BC3C-3594FE5647E4"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2018-9020",
"sourceIdentifier": "cve@mitre.org",
"published": "2018-03-26T02:29:00.290",
"lastModified": "2018-04-18T14:31:16.717",
"lastModified": "2024-10-08T14:03:10.323",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -85,9 +85,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:events_manager_project:events_manager:*:*:*:*:*:wordpress:*:*",
"criteria": "cpe:2.3:a:pixelite:events_manager:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "5.8.1.2",
"matchCriteriaId": "BACA3556-7F7D-46EE-BF39-F4B154231BCB"
"matchCriteriaId": "2FEB3F45-BD3C-43AD-965A-26502762B275"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2019-16523",
"sourceIdentifier": "cve@mitre.org",
"published": "2019-10-16T15:15:15.397",
"lastModified": "2019-10-18T20:25:36.000",
"lastModified": "2024-10-08T14:03:10.323",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -85,9 +85,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wp-events-plugin:events_manager:*:*:*:*:*:wordpress:*:*",
"criteria": "cpe:2.3:a:pixelite:events_manager:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "5.9.5",
"matchCriteriaId": "B40544BB-DFC4-407B-9D05-DBCE949D7784"
"matchCriteriaId": "7773E1B7-88C5-44FA-A76F-5AC5FA29AC37"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2020-35012",
"sourceIdentifier": "contact@wpscan.com",
"published": "2021-12-01T23:15:07.367",
"lastModified": "2021-12-03T13:39:58.817",
"lastModified": "2024-10-08T14:03:10.323",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -85,9 +85,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wp-events-plugin:events_manager:*:*:*:*:*:wordpress:*:*",
"criteria": "cpe:2.3:a:pixelite:events_manager:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "5.9.8",
"matchCriteriaId": "27B9F853-317E-46AE-8D9D-D2CA52084659"
"matchCriteriaId": "43C2B490-5C45-4B12-8C53-CC6FC50B2F6D"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2020-35037",
"sourceIdentifier": "contact@wpscan.com",
"published": "2021-12-01T23:15:07.460",
"lastModified": "2021-12-03T16:30:42.443",
"lastModified": "2024-10-08T14:03:10.323",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -85,9 +85,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wp-events-plugin:events_manager:*:*:*:*:*:wordpress:*:*",
"criteria": "cpe:2.3:a:pixelite:events_manager:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "5.9.8",
"matchCriteriaId": "27B9F853-317E-46AE-8D9D-D2CA52084659"
"matchCriteriaId": "43C2B490-5C45-4B12-8C53-CC6FC50B2F6D"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-43947",
"sourceIdentifier": "security@atlassian.com",
"published": "2022-01-06T01:15:07.917",
"lastModified": "2022-03-30T13:29:49.470",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-08T15:35:02.707",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
],
"cvssMetricV2": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-32626",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2023-08-18T10:15:09.617",
"lastModified": "2023-08-23T16:49:06.603",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-08T15:35:03.850",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -49,6 +49,16 @@
"value": "NVD-CWE-Other"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-36106",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-17T20:15:10.213",
"lastModified": "2023-08-23T14:33:07.907",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-08T15:35:04.673",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -49,6 +49,16 @@
"value": "NVD-CWE-Other"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-36674",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-20T18:15:09.930",
"lastModified": "2023-11-07T04:16:41.150",
"lastModified": "2024-10-08T15:35:09.850",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -49,6 +49,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38132",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2023-08-18T10:15:11.370",
"lastModified": "2023-08-24T18:19:28.707",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-08T15:35:11.083",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -49,6 +49,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38576",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2023-08-18T10:15:11.427",
"lastModified": "2023-08-24T18:26:00.547",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-08T15:35:12.007",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -49,6 +49,16 @@
"value": "NVD-CWE-Other"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-39445",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2023-08-18T10:15:12.037",
"lastModified": "2023-08-24T18:30:33.000",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-08T15:35:13.413",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -49,6 +49,16 @@
"value": "NVD-CWE-Other"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-40630",
"sourceIdentifier": "security@joomla.org",
"published": "2023-12-14T09:15:41.630",
"lastModified": "2023-12-20T20:13:31.610",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-08T15:35:15.080",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-40921",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-12-14T00:15:43.443",
"lastModified": "2023-12-18T19:31:35.590",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-08T15:35:15.913",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-89"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-42183",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-12-15T01:15:08.047",
"lastModified": "2023-12-28T18:11:09.047",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-08T15:35:17.213",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-116"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-116"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-44709",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-12-14T06:15:42.743",
"lastModified": "2023-12-19T19:09:19.230",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-08T15:35:18.137",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-190"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-190"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-47578",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-12-13T02:15:07.800",
"lastModified": "2023-12-18T15:09:42.753",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-08T15:35:19.093",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-352"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-48326",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-30T12:15:09.523",
"lastModified": "2023-12-05T19:22:14.360",
"lastModified": "2024-10-08T14:03:10.323",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -80,9 +80,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wp-events-plugin:events_manager:*:*:*:*:*:wordpress:*:*",
"criteria": "cpe:2.3:a:pixelite:events_manager:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "6.4.5",
"matchCriteriaId": "F1647976-33FA-493B-A468-9521FA46464B"
"matchCriteriaId": "61669E93-8D26-43BB-A731-7B1CE4316E33"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-50564",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-12-14T15:15:10.360",
"lastModified": "2023-12-18T19:49:40.313",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-08T15:35:20.180",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-434"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-50766",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2023-12-13T18:15:43.840",
"lastModified": "2023-12-18T18:20:37.413",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-08T15:35:21.173",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-352"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-52946",
"sourceIdentifier": "security@synology.com",
"published": "2024-09-26T04:15:05.863",
"lastModified": "2024-09-26T13:32:02.803",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-10-08T15:55:07.543",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "HIGH",
"baseScore": 8.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 4.2
},
{
"source": "security@synology.com",
"type": "Secondary",
@ -41,7 +61,7 @@
},
"weaknesses": [
{
"source": "security@synology.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@ -49,12 +69,43 @@
"value": "CWE-120"
}
]
},
{
"source": "security@synology.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:synology:drive_client:*:*:*:*:*:desktop:*:*",
"versionEndExcluding": "3.5.0-16084",
"matchCriteriaId": "FA63ED01-FFC4-4304-B511-8FF3260AEF74"
}
]
}
]
}
],
"references": [
{
"url": "https://www.synology.com/en-global/security/advisory/Synology_SA_24_10",
"source": "security@synology.com"
"source": "security@synology.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-6702",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-12-14T22:15:44.387",
"lastModified": "2024-01-31T17:15:26.693",
"lastModified": "2024-10-08T15:35:22.107",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-843"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-843"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-20365",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-10-02T17:15:14.863",
"lastModified": "2024-10-04T13:50:43.727",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-10-08T14:28:42.727",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
},
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
},
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
@ -51,10 +81,240 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_computing_system:4.1\\(2a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "CB04F9F4-A379-4B0F-ABDA-6118D3A0A7A2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_computing_system:4.1\\(2b\\):*:*:*:*:*:*:*",
"matchCriteriaId": "CBCCFCCA-A90C-4CDF-84BE-208F52CA6B6F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_computing_system:4.1\\(2c\\):*:*:*:*:*:*:*",
"matchCriteriaId": "7E8A143C-9DB6-43EC-92A7-D253137F991A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_computing_system:4.1\\(3a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "6BAD3C39-376C-4353-BE7C-1D410EA68D27"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_computing_system:4.1\\(3b\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2DCDB7FF-4095-48DF-B2A5-F934EDDE8451"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_computing_system:4.1\\(3c\\):*:*:*:*:*:*:*",
"matchCriteriaId": "12AA385D-152F-4C4E-865C-D266B97915A8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_computing_system:4.1\\(3d\\):*:*:*:*:*:*:*",
"matchCriteriaId": "03C5D98C-2CAC-43F1-B52B-57E4722BA7AB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_computing_system:4.1\\(3e\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C4277F6F-5DA0-4109-B890-60B9E89E72DB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_computing_system:4.1\\(3f\\):*:*:*:*:*:*:*",
"matchCriteriaId": "9FCC1C6A-DAD2-45BE-A3A7-DD89BB2FB59A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_computing_system:4.1\\(3h\\):*:*:*:*:*:*:*",
"matchCriteriaId": "83109B12-A9FD-48AB-B658-523A368EBF07"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_computing_system:4.1\\(3i\\):*:*:*:*:*:*:*",
"matchCriteriaId": "220FBC66-C17E-433A-B5D3-87ED8D971639"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_computing_system:4.1\\(3j\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B2FA7A5B-4A4C-4F44-95C9-7026E4BB9715"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_computing_system:4.1\\(3k\\):*:*:*:*:*:*:*",
"matchCriteriaId": "8037F2FA-60A2-4589-BF71-481F1A8B65ED"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_computing_system:4.1\\(3l\\):*:*:*:*:*:*:*",
"matchCriteriaId": "50C3B4EE-88E7-4FC5-BE86-9ED89B90AA3C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_computing_system:4.1\\(3m\\):*:*:*:*:*:*:*",
"matchCriteriaId": "96A701FA-6A56-4C47-A84E-48AC635E959C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_computing_system:4.1\\(4a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "FB110E18-D3B6-4759-9766-D80324233A08"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_computing_system:4.2\\(1c\\):*:*:*:*:*:*:*",
"matchCriteriaId": "7FFA5A44-790F-45BD-987A-95E52CC829F0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_computing_system:4.2\\(1d\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3AFF7EA7-7360-4B9B-94EC-08D109B3F6DD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_computing_system:4.2\\(1f\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A00A126E-BC7F-4C75-896A-C8B0DA0B925D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_computing_system:4.2\\(1i\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B711E297-EFA6-43CA-A086-A1810F937101"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_computing_system:4.2\\(1k\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2D8B97A1-47CA-4336-BA0A-06A131907B91"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_computing_system:4.2\\(1l\\):*:*:*:*:*:*:*",
"matchCriteriaId": "550D6CF1-A6E8-45AD-81A3-AF00BD847702"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_computing_system:4.2\\(1m\\):*:*:*:*:*:*:*",
"matchCriteriaId": "8F744FE0-7CD9-4ECD-AD31-65C10A671FA5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_computing_system:4.2\\(1n\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A0088576-161D-4A1A-A360-B61D4E36FDEF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_computing_system:4.2\\(2a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "6146B191-2B42-4EB9-97E3-08F4B9447E0D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_computing_system:4.2\\(2c\\):*:*:*:*:*:*:*",
"matchCriteriaId": "8EDBDA0B-C31F-4F8D-BCA2-CA0E419E8064"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_computing_system:4.2\\(2d\\):*:*:*:*:*:*:*",
"matchCriteriaId": "23DAA93F-202F-405C-BCB4-E15F1684145A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_computing_system:4.2\\(2e\\):*:*:*:*:*:*:*",
"matchCriteriaId": "537D24CC-52C4-4A35-BF4C-57AAB1B81D3C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_computing_system:4.2\\(3b\\):*:*:*:*:*:*:*",
"matchCriteriaId": "AFB3EEB2-49B2-4850-B2E7-771D1694CD66"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_computing_system:4.2\\(3d\\):*:*:*:*:*:*:*",
"matchCriteriaId": "34D07D7C-CD97-4B9A-8265-E40A22D7AEE1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_computing_system:4.2\\(3e\\):*:*:*:*:*:*:*",
"matchCriteriaId": "97B88CF8-4E88-429B-BDBA-7991CB7D032B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_computing_system:4.2\\(3g\\):*:*:*:*:*:*:*",
"matchCriteriaId": "6A7C816E-3191-4D44-AB8B-4719EC642742"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_computing_system:4.2\\(3h\\):*:*:*:*:*:*:*",
"matchCriteriaId": "64713265-61F4-44D0-B1B4-6609A837F718"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_computing_system:4.2\\(3i\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A488703E-EB6E-49BE-86A5-0DE444460417"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_computing_system:4.2\\(3j\\):*:*:*:*:*:*:*",
"matchCriteriaId": "50CD6F2E-DDC8-4A6A-B2AD-20419A3A119C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_computing_system:4.2\\(3k\\):*:*:*:*:*:*:*",
"matchCriteriaId": "35D30644-51F0-46AD-A278-DC673FA930C0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_computing_system:4.3\\(2b\\):*:*:*:*:*:*:*",
"matchCriteriaId": "38EC1F78-F348-4596-A476-AAD3A57F7118"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_computing_system:4.3\\(2c\\):*:*:*:*:*:*:*",
"matchCriteriaId": "4AACFE13-7B14-46F3-8848-3FAF04DAB94C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_computing_system:4.3\\(2e\\):*:*:*:*:*:*:*",
"matchCriteriaId": "415BBE11-58EE-4CF5-95A1-E3092B4A45A7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_computing_system:4.3\\(3a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B192EED9-CB4E-4282-B922-1B1BF11D9F8E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_computing_system:4.3\\(3c\\):*:*:*:*:*:*:*",
"matchCriteriaId": "6FBCCF76-ADB4-4992-91B1-D88BA58B9A17"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_computing_system:4.3\\(4a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "14649A49-AAF7-4912-B881-51AD97D64238"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_computing_system:4.3\\(4b\\):*:*:*:*:*:*:*",
"matchCriteriaId": "DA0D61B6-EC73-49B5-B53D-693D5F7F5EEF"
}
]
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cimc-redfish-cominj-sbkv5ZZ",
"source": "ykramarz@cisco.com"
"source": "ykramarz@cisco.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-20385",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-10-02T17:15:15.110",
"lastModified": "2024-10-04T13:50:43.727",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-10-08T14:22:34.120",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6
},
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-295"
}
]
},
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
@ -51,10 +81,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:nexus_dashboard_orchestrator:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.2\\(3o\\)",
"matchCriteriaId": "7FF72593-7A82-48A4-B3C7-1B12EFDC44A1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:nexus_dashboard_orchestrator:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.3.0",
"versionEndExcluding": "4.4\\(1.1009\\)",
"matchCriteriaId": "F14B8041-A456-4D24-B56E-DD41366A8613"
}
]
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndo-tlsvld-FdUF3cpw",
"source": "ykramarz@cisco.com"
"source": "ykramarz@cisco.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-20393",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-10-02T17:15:15.337",
"lastModified": "2024-10-04T13:50:43.727",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-10-08T14:37:39.713",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
@ -51,10 +81,503 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.00.29:*:*:*:*:*:*:*",
"matchCriteriaId": "EBAD013E-3550-4157-B52A-F045DEFB0810"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.00.33:*:*:*:*:*:*:*",
"matchCriteriaId": "566AF5EF-B7BD-4F4A-9D5E-82588207C80E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.01.16:*:*:*:*:*:*:*",
"matchCriteriaId": "C0B4BB7F-FE4B-404D-9977-AAA3D492634B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.01.17:*:*:*:*:*:*:*",
"matchCriteriaId": "F6BCBFF6-9A31-48BD-B93D-598564A3BB30"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.01.18:*:*:*:*:*:*:*",
"matchCriteriaId": "DB20575D-3E22-49CA-91DE-CBACF2146D3E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.01.20:*:*:*:*:*:*:*",
"matchCriteriaId": "8836DC95-1076-4CC4-8A6C-34F3ACCA312A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.02.16:*:*:*:*:*:*:*",
"matchCriteriaId": "45488336-CAF5-4F15-BB6E-5BEBD87A4F97"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.03.15:*:*:*:*:*:*:*",
"matchCriteriaId": "BB498AAC-2FAC-4FCC-B644-1180627A5D1F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.03.16:*:*:*:*:*:*:*",
"matchCriteriaId": "744B76F8-1276-42ED-8913-5FC9E11F2F2E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.03.17:*:*:*:*:*:*:*",
"matchCriteriaId": "1A4D7663-50E6-45B1-8701-2DF2D7F744AB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.03.18:*:*:*:*:*:*:*",
"matchCriteriaId": "C0E4341D-9FD4-4AAD-A5BE-35B0909A8FE8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.03.19:*:*:*:*:*:*:*",
"matchCriteriaId": "33A1EFF8-024B-46F6-A7E3-FCC593314B1A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.03.20:*:*:*:*:*:*:*",
"matchCriteriaId": "D0D4C611-38FD-4BF1-B478-03F01283EAC5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.03.21:*:*:*:*:*:*:*",
"matchCriteriaId": "4788385E-133A-4908-97A0-135403424DA9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.03.22:*:*:*:*:*:*:*",
"matchCriteriaId": "150DE44A-A558-4C15-8028-C301259E5ABF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.03.24:*:*:*:*:*:*:*",
"matchCriteriaId": "3B5E8D98-570C-49A1-9934-45BBCD02AB6A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.03.26:*:*:*:*:*:*:*",
"matchCriteriaId": "6D9FF79A-BEE5-4204-B2C5-E0943DCD7773"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.03.27:*:*:*:*:*:*:*",
"matchCriteriaId": "F15F5D4D-A256-4A2E-9873-F0514F81CA77"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.03.28:*:*:*:*:*:*:*",
"matchCriteriaId": "9ACFBF35-E5B2-4807-AC7D-E3021EAAEE94"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.03.29:*:*:*:*:*:*:*",
"matchCriteriaId": "EA1379E9-D147-48F4-AE3A-860B49EFA497"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:rv340_dual_wan_gigabit_vpn_router:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C6822600-E716-4F22-AF34-AD2914D6C128"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.00.29:*:*:*:*:*:*:*",
"matchCriteriaId": "5BC16280-4809-4B2C-825C-76A99392F95F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.00.33:*:*:*:*:*:*:*",
"matchCriteriaId": "9A112271-F32C-49F5-B6DA-4DDBBB146106"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.01.16:*:*:*:*:*:*:*",
"matchCriteriaId": "133E4C64-B9C8-4B65-927D-39B7BDF89AC2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.01.17:*:*:*:*:*:*:*",
"matchCriteriaId": "ACD9ECA7-1DC4-4122-9D02-B258A62A2FA9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.01.18:*:*:*:*:*:*:*",
"matchCriteriaId": "53A19846-F451-4578-A25B-F3777BE90C35"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.01.20:*:*:*:*:*:*:*",
"matchCriteriaId": "A69964DE-67E6-4B1C-B3D2-C9177A891C40"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.02.16:*:*:*:*:*:*:*",
"matchCriteriaId": "FB3346A2-D0FB-4AE7-87C0-793DE49D555B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.03.15:*:*:*:*:*:*:*",
"matchCriteriaId": "40B366BB-EC50-4C1A-ACFA-61C86714FE1A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.03.16:*:*:*:*:*:*:*",
"matchCriteriaId": "29C253B5-DAAD-45F0-8A45-B6F44FC74DAD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.03.17:*:*:*:*:*:*:*",
"matchCriteriaId": "4893D744-9041-4C89-A33C-8BB989B3FDFA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.03.18:*:*:*:*:*:*:*",
"matchCriteriaId": "2AB31F2B-3A74-45DD-B21E-A698E321BA6B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.03.19:*:*:*:*:*:*:*",
"matchCriteriaId": "CCE2B1CD-E350-4C5D-BAA6-17138A8343F5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.03.20:*:*:*:*:*:*:*",
"matchCriteriaId": "03FFDBF2-939C-46A3-BA90-6DED64474338"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.03.21:*:*:*:*:*:*:*",
"matchCriteriaId": "426C4FDC-AAF3-4726-80D0-7C48B06A7E65"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.03.22:*:*:*:*:*:*:*",
"matchCriteriaId": "E08A813B-630D-4EF4-812B-9E81A48A1DC7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.03.24:*:*:*:*:*:*:*",
"matchCriteriaId": "F27B5644-BA7B-4442-A539-337F93238479"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.03.26:*:*:*:*:*:*:*",
"matchCriteriaId": "9504523A-37F0-417A-99B4-CABE21E5E744"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.03.27:*:*:*:*:*:*:*",
"matchCriteriaId": "BE54D030-093B-4267-8169-C2DCF72605D3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.03.28:*:*:*:*:*:*:*",
"matchCriteriaId": "D70E0828-1150-44FD-82C2-C441A3ACF644"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.03.29:*:*:*:*:*:*:*",
"matchCriteriaId": "F1C0171B-4C5D-4C15-84DD-E556C5AFDCBA"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E7E29320-5668-4F48-9BA1-DC81B256320B"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.00.29:*:*:*:*:*:*:*",
"matchCriteriaId": "85C44874-31B8-4872-9973-4444D15B09B7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.00.33:*:*:*:*:*:*:*",
"matchCriteriaId": "005FADE6-BF4F-416A-965A-46BF5F6C6D0A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.01.16:*:*:*:*:*:*:*",
"matchCriteriaId": "0F78C801-EC2A-4B28-9ED1-A30E3589C3F0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.01.17:*:*:*:*:*:*:*",
"matchCriteriaId": "2218EEEA-BB4D-4343-BB9F-3C01EA473342"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.01.18:*:*:*:*:*:*:*",
"matchCriteriaId": "609583B2-4D32-4E76-AA9B-DA24A1BAFB16"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.01.20:*:*:*:*:*:*:*",
"matchCriteriaId": "59D15056-B04A-40F1-A6D4-66A91FCE5A75"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.02.16:*:*:*:*:*:*:*",
"matchCriteriaId": "217B02B2-B4E6-40E7-993C-238D7FBEBFF9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.03.15:*:*:*:*:*:*:*",
"matchCriteriaId": "5659BD61-EE0C-49BF-8484-034A58BA32E2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.03.16:*:*:*:*:*:*:*",
"matchCriteriaId": "3B9B65AE-D6EF-4A2E-9C2D-D96E64506080"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.03.17:*:*:*:*:*:*:*",
"matchCriteriaId": "383D6202-4215-46F5-9AA8-F7348997B99A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.03.18:*:*:*:*:*:*:*",
"matchCriteriaId": "55939AC6-77E2-43E6-956C-B0B99CEAB315"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.03.19:*:*:*:*:*:*:*",
"matchCriteriaId": "2385BD9B-80C6-4E54-A4A9-EEA724E58FE0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.03.20:*:*:*:*:*:*:*",
"matchCriteriaId": "64CA692C-2D66-483B-A440-746A998CED07"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.03.21:*:*:*:*:*:*:*",
"matchCriteriaId": "1D4AEE39-5EE2-43C7-80DC-B078A9953D4F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.03.22:*:*:*:*:*:*:*",
"matchCriteriaId": "85FA6AFD-7A8E-4505-8E4F-3A06199E6697"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.03.24:*:*:*:*:*:*:*",
"matchCriteriaId": "36FE60B1-EE9F-4034-9612-482E2EECFBEA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.03.26:*:*:*:*:*:*:*",
"matchCriteriaId": "DCCD1FC1-6029-4DDC-898C-169E429D1FA1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.03.27:*:*:*:*:*:*:*",
"matchCriteriaId": "1C1E99B3-ACEA-48C1-A649-497D5960F215"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.03.28:*:*:*:*:*:*:*",
"matchCriteriaId": "53A69806-3B9F-46E5-877B-9477E3AF0A34"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.03.29:*:*:*:*:*:*:*",
"matchCriteriaId": "95D01F5A-1CC5-4C52-AB70-5DF41588EF98"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:rv345_dual_wan_gigabit_vpn_router:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5DF1ED87-3FDB-42CA-AA96-508B5F7B9206"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.00.29:*:*:*:*:*:*:*",
"matchCriteriaId": "D2812299-2A3C-49AA-9E81-BE4AA50F0D8A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.00.33:*:*:*:*:*:*:*",
"matchCriteriaId": "20569E42-E769-401B-8163-3981C7905943"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.01.16:*:*:*:*:*:*:*",
"matchCriteriaId": "105566D1-80A2-4545-9BF9-B3382162CA48"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.01.17:*:*:*:*:*:*:*",
"matchCriteriaId": "A468D852-CA7F-4561-9F0E-DB6A056A5F31"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.01.18:*:*:*:*:*:*:*",
"matchCriteriaId": "C72F80EF-787D-4A5E-9B03-5215AD400571"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.01.20:*:*:*:*:*:*:*",
"matchCriteriaId": "66D7C66E-AF9E-4419-B6CE-3489DC19212E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.02.16:*:*:*:*:*:*:*",
"matchCriteriaId": "041D9323-A320-4492-BAC7-4E0B06FF56E1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.03.15:*:*:*:*:*:*:*",
"matchCriteriaId": "2D047F9E-7BCE-4F7E-B334-426F46CFCE66"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.03.16:*:*:*:*:*:*:*",
"matchCriteriaId": "77E8D977-F28F-46D9-8DA2-7A1746F4278F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.03.17:*:*:*:*:*:*:*",
"matchCriteriaId": "A87D53D4-AF6F-4E5C-A7A4-099294029C59"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.03.18:*:*:*:*:*:*:*",
"matchCriteriaId": "42672D7D-5265-4323-A284-F36722F7C36A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.03.19:*:*:*:*:*:*:*",
"matchCriteriaId": "A71CFA39-CF25-4B37-855A-7816770633ED"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.03.20:*:*:*:*:*:*:*",
"matchCriteriaId": "2649FFCF-D9E1-466A-A7ED-4A2653259A3E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.03.21:*:*:*:*:*:*:*",
"matchCriteriaId": "743D74FF-2334-4C16-BDDD-FDFD4EEBF9EF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.03.22:*:*:*:*:*:*:*",
"matchCriteriaId": "29AF1721-2676-4FDA-97E0-55E53A03AC16"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.03.24:*:*:*:*:*:*:*",
"matchCriteriaId": "C3005E36-D17A-498B-9BF4-1D972FA03553"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.03.26:*:*:*:*:*:*:*",
"matchCriteriaId": "EFD115E4-53C8-4E3C-9024-4AE5F1F5DFB0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.03.27:*:*:*:*:*:*:*",
"matchCriteriaId": "1D0231F8-CC96-4F02-9737-654FECFCF624"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.03.28:*:*:*:*:*:*:*",
"matchCriteriaId": "9C600D9E-4DDF-45A2-8760-749F0FB06513"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.03.29:*:*:*:*:*:*:*",
"matchCriteriaId": "B675841D-7591-492F-BCF0-E63D416C7F1E"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:rv345p_dual_wan_gigabit_poe_vpn_router:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BF972452-70D7-4026-A326-ACDD7446DD9B"
}
]
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv34x-privesc-rce-qE33TCms",
"source": "ykramarz@cisco.com"
"source": "ykramarz@cisco.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-20432",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-10-02T17:15:15.550",
"lastModified": "2024-10-04T13:50:43.727",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-10-08T14:10:35.317",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
},
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
@ -51,10 +81,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:nexus_dashboard_fabric_controller:*:*:*:*:*:*:*:*",
"versionStartIncluding": "12.0.0",
"versionEndExcluding": "12.2.2",
"matchCriteriaId": "64448F53-1135-4A69-8FBC-100258CE76BF"
}
]
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndfc-cmdinj-UvYZrKfr",
"source": "ykramarz@cisco.com"
"source": "ykramarz@cisco.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-20444",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-10-02T17:15:16.390",
"lastModified": "2024-10-04T13:50:43.727",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-10-08T15:26:38.527",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "LOW",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 4.2
},
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-88"
}
]
},
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
@ -51,10 +81,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:nexus_dashboard_fabric_controller:*:*:*:*:*:*:*:*",
"versionEndExcluding": "12.2.2",
"matchCriteriaId": "9E78B4AC-793B-4405-896F-31398AF7CBD2"
}
]
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndfc-raci-T46k3jnN",
"source": "ykramarz@cisco.com"
"source": "ykramarz@cisco.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-20448",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-10-02T17:15:16.597",
"lastModified": "2024-10-04T13:50:43.727",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-10-08T15:25:47.053",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 8.6,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 4.0
},
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-312"
}
]
},
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
@ -51,10 +81,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:nexus_dashboard_fabric_controller:*:*:*:*:*:*:*:*",
"versionEndExcluding": "12.2.2",
"matchCriteriaId": "9E78B4AC-793B-4405-896F-31398AF7CBD2"
}
]
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndfc-cidv-XvyX2wLj",
"source": "ykramarz@cisco.com"
"source": "ykramarz@cisco.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-20449",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-10-02T17:15:16.820",
"lastModified": "2024-10-04T13:50:43.727",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-10-08T15:33:29.210",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
},
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
@ -51,10 +81,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:nexus_dashboard_fabric_controller:*:*:*:*:*:*:*:*",
"versionStartIncluding": "12.0.0",
"versionEndIncluding": "12.2.2",
"matchCriteriaId": "A412AB60-1932-4696-9506-9F0994831E4D"
}
]
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndfc-ptrce-BUSHLbp",
"source": "ykramarz@cisco.com"
"source": "ykramarz@cisco.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-20490",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-10-02T17:15:17.350",
"lastModified": "2024-10-04T13:50:43.727",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-10-08T15:15:39.160",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 8.6,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 4.0
},
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-532"
}
]
},
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
@ -51,10 +81,58 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:nexus_dashboard_fabric_controller:*:*:*:*:*:*:*:*",
"versionStartIncluding": "12.1.0",
"versionEndExcluding": "12.2.2.241",
"matchCriteriaId": "6641D0DD-C16A-40E9-B30E-A1827333026C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:nexus_dashboard_insights:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.4.0",
"matchCriteriaId": "E263CD38-1453-4C37-8F72-F3CEBF74B18D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:nexus_dashboard_insights:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.5.0",
"versionEndExcluding": "6.5.1.32",
"matchCriteriaId": "FBA8D1B4-0D0D-4221-9CFC-9D28BB3952F5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:nexus_dashboard_orchestrator:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.2\\(3o\\)",
"matchCriteriaId": "7FF72593-7A82-48A4-B3C7-1B12EFDC44A1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:nexus_dashboard_orchestrator:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.4.0",
"versionEndExcluding": "4.4.1.1012",
"matchCriteriaId": "EB6CF0D7-782B-4B66-9BEA-67A7D3592CCB"
}
]
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndhs-idv-Bk8VqEDc",
"source": "ykramarz@cisco.com"
"source": "ykramarz@cisco.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-20491",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-10-02T17:15:17.563",
"lastModified": "2024-10-04T13:50:43.727",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-10-08T15:55:08.933",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 8.6,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 4.0
},
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-532"
}
]
},
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
@ -51,10 +81,58 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:nexus_dashboard_fabric_controller:*:*:*:*:*:*:*:*",
"versionStartIncluding": "12.1.0",
"versionEndExcluding": "12.2.2.241",
"matchCriteriaId": "6641D0DD-C16A-40E9-B30E-A1827333026C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:nexus_dashboard_insights:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.4.0",
"matchCriteriaId": "E263CD38-1453-4C37-8F72-F3CEBF74B18D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:nexus_dashboard_insights:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.5.0",
"versionEndExcluding": "6.5.1.32",
"matchCriteriaId": "FBA8D1B4-0D0D-4221-9CFC-9D28BB3952F5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:nexus_dashboard_orchestrator:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.2\\(3o\\)",
"matchCriteriaId": "7FF72593-7A82-48A4-B3C7-1B12EFDC44A1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:nexus_dashboard_orchestrator:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.4.0",
"versionEndExcluding": "4.4.1.1012",
"matchCriteriaId": "EB6CF0D7-782B-4B66-9BEA-67A7D3592CCB"
}
]
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndhs-idv-Bk8VqEDc",
"source": "ykramarz@cisco.com"
"source": "ykramarz@cisco.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28888",
"sourceIdentifier": "talos-cna@cisco.com",
"published": "2024-10-02T21:15:13.430",
"lastModified": "2024-10-04T13:50:43.727",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-10-08T14:14:55.637",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:foxit:pdf_reader:2024.1.0.23997:*:*:*:*:*:*:*",
"matchCriteriaId": "30C57D5F-A2A9-4D45-A9E2-744DB55ECF2F"
}
]
}
]
}
],
"references": [
{
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1967",
"source": "talos-cna@cisco.com"
"source": "talos-cna@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://www.foxit.com/support/security-bulletins.html",
"source": "talos-cna@cisco.com"
"source": "talos-cna@cisco.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-33506",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2024-10-08T15:15:14.717",
"lastModified": "2024-10-08T15:15:14.717",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An exposure of sensitive information to an unauthorized actor vulnerability [CWE-200] in FortiManager 7.4.2 and below, 7.2.5 and below, 7.0.12 and below allows a remote authenticated attacker assigned to an Administrative Domain (ADOM) to access device summary of unauthorized ADOMs via crafted HTTP requests."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@fortinet.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "psirt@fortinet.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [
{
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-23-472",
"source": "psirt@fortinet.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-41163",
"sourceIdentifier": "talos-cna@cisco.com",
"published": "2024-10-03T16:15:05.427",
"lastModified": "2024-10-04T13:50:43.727",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-10-08T14:47:56.787",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:veertu:anka_build_cloud:1.42.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DA553BA9-4893-4500-B0FB-7ACF869B790A"
}
]
}
]
}
],
"references": [
{
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-2059",
"source": "talos-cna@cisco.com"
"source": "talos-cna@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-41587",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-03T19:15:04.310",
"lastModified": "2024-10-07T16:16:13.173",
"lastModified": "2024-10-08T15:32:18.313",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -87,286 +87,6 @@
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:draytek:vigor3220_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.9.8.2",
"matchCriteriaId": "0F1ADAFE-5F59-4617-A20D-68675AE4AA61"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:draytek:vigor3220:-:*:*:*:*:*:*:*",
"matchCriteriaId": "64955940-3998-4B76-92D1-D9F3FAB874B4"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:draytek:vigor2952_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.9.8.2",
"matchCriteriaId": "4137F610-B3BE-4B74-8409-B91E61C4EEEE"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:draytek:vigor2952:-:*:*:*:*:*:*:*",
"matchCriteriaId": "167336E2-AAA8-4424-AB07-2D7C9E1542B3"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:draytek:vigor2926_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.9.9.5",
"matchCriteriaId": "36FE9F0A-223F-42DC-BCB6-4A7A24A65130"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:draytek:vigor2926:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AF1B117B-603D-493C-A804-C18ED332A221"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:draytek:vigor2925_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.9.8",
"matchCriteriaId": "43C713BB-02A0-4CD4-A27F-943D5D538444"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:draytek:vigor2925:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7536B29C-2030-4331-B8BF-D269D86D199B"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:draytek:vigor2862_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.9.9.5",
"matchCriteriaId": "765C62A0-BE3E-4661-8FD6-E9566B7C3C28"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:draytek:vigor2862:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8B01EDAE-BB9E-4431-BE8C-6505BA7CA42D"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:draytek:vigor2860_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.9.8",
"matchCriteriaId": "02588C38-E98C-4553-93C0-535A0C129783"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:draytek:vigor2860:-:*:*:*:*:*:*:*",
"matchCriteriaId": "266C73DE-BFC6-4F3E-B022-559B3971CA44"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:draytek:vigor2832_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.9.9",
"matchCriteriaId": "D46E5FF5-6521-4A10-8CC5-34518A38ECFA"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:draytek:vigor2832:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B0978465-D59F-4C0A-A29F-5D7BE58BA557"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:draytek:vigor2762_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.9.9",
"matchCriteriaId": "3B69D1EC-7C33-4367-80BA-4008E8C9A4BE"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:draytek:vigor2762:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3873B2B9-95C1-4F00-9165-7C4D2A90CDE5"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:draytek:vigor2133_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.9.9",
"matchCriteriaId": "E0813DB7-4B52-40E1-9D5C-DBF9FA74EFD0"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:draytek:vigor2133:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1878E59C-FB40-435D-940A-8952C56FA88B"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:draytek:vigorlte200_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.9.8.9",
"matchCriteriaId": "E7845410-6E90-4E92-8029-964A7F77EC57"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:draytek:vigorlte200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4DBF2015-9315-44C8-A9FE-E86146F1958E"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
@ -727,8 +447,7 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:o:draytek:vigor2620_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.9.8.9",
"matchCriteriaId": "4C7DD492-4294-484D-A4D2-BCCCA152D57F"
"matchCriteriaId": "289E3E0B-6BA4-44B8-968A-AC374B15B631"
}
]
},
@ -744,6 +463,276 @@
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:draytek:vigorlte200_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E1BD8E59-6C67-4C80-B25F-2C5814A8CF0E"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:draytek:vigorlte200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4DBF2015-9315-44C8-A9FE-E86146F1958E"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:draytek:vigor2133_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "43265128-7E8E-4FE2-8488-AC5734A4AF70"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:draytek:vigor2133:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1878E59C-FB40-435D-940A-8952C56FA88B"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:draytek:vigor2762_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "52F71B18-89B5-42C7-B4B7-448844D6AFBC"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:draytek:vigor2762:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3873B2B9-95C1-4F00-9165-7C4D2A90CDE5"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:draytek:vigor2832_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A96F64C0-09DD-4553-AC5F-D722B8321B0D"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:draytek:vigor2832:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B0978465-D59F-4C0A-A29F-5D7BE58BA557"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:draytek:vigor2860_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F2C4077B-C73F-4431-9103-C09960E203E1"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:draytek:vigor2860:-:*:*:*:*:*:*:*",
"matchCriteriaId": "266C73DE-BFC6-4F3E-B022-559B3971CA44"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:draytek:vigor2862_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9D081E5D-7A68-47A0-9EFE-1FC01DA2FF23"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:draytek:vigor2862:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8B01EDAE-BB9E-4431-BE8C-6505BA7CA42D"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:draytek:vigor2925_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6C470B04-BD57-429B-80FC-328A7D2E35E5"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:draytek:vigor2925:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7536B29C-2030-4331-B8BF-D269D86D199B"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:draytek:vigor2926_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3A688631-4B36-43CC-AEF8-D390081F01DC"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:draytek:vigor2926:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AF1B117B-603D-493C-A804-C18ED332A221"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:draytek:vigor2952_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E207BB52-29F8-4F2F-AA06-855B38E22958"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:draytek:vigor2952:-:*:*:*:*:*:*:*",
"matchCriteriaId": "167336E2-AAA8-4424-AB07-2D7C9E1542B3"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:draytek:vigor3220_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CD8437FD-65E2-4203-82B9-8FC32444204A"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:draytek:vigor3220:-:*:*:*:*:*:*:*",
"matchCriteriaId": "64955940-3998-4B76-92D1-D9F3FAB874B4"
}
]
}
]
}
],
"references": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-41591",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-03T19:15:04.560",
"lastModified": "2024-10-04T13:50:43.727",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-10-08T15:34:46.453",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,15 +15,742 @@
"value": "Los dispositivos DrayTek Vigor3910 hasta 4.3.2.6 permiten XSS reflejado basado en DOM no autenticado."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:draytek:vigor2620_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "289E3E0B-6BA4-44B8-968A-AC374B15B631"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:draytek:vigor2620:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5D98663B-F2F5-4ADC-9FD5-75846890EEBA"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:draytek:vigor2915_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.4.5.3",
"matchCriteriaId": "E6E55BCE-BBF0-454B-AE86-45B7298888B3"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:draytek:vigor2915:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5860CBE4-328E-418D-9E81-1D3AF7DB8F2B"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:draytek:vigor2866_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.4.5.2",
"matchCriteriaId": "89461FD4-897D-44F1-8486-4BCCDE3772DD"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:draytek:vigor2866:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0D0D2760-739F-4C79-AEDC-8B2CCCA2FF53"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:draytek:vigor2766_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.4.5.3",
"matchCriteriaId": "8F87D851-15BC-4FC1-8AB7-D5C15B2B74F0"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:draytek:vigor2766:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C0AB3C84-67CA-4531-85FB-1A56F3C93ABF"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:draytek:vigor2865_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.4.5.2",
"matchCriteriaId": "C3D46DEC-06AB-489F-A0B5-10C31F80A8C1"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:draytek:vigor2865:-:*:*:*:*:*:*:*",
"matchCriteriaId": "871448C6-9183-4828-A287-05F5EC6A44F6"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:draytek:vigor2765_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.4.5.3",
"matchCriteriaId": "1B1826F9-0258-44DD-A471-113CF55CE563"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:draytek:vigor2765:-:*:*:*:*:*:*:*",
"matchCriteriaId": "60657812-D3A8-4B1B-B7BE-F629991CB053"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:draytek:vigor2763_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.4.5.3",
"matchCriteriaId": "1A559F44-80F8-44B7-B70F-BA0B78C85283"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:draytek:vigor2763:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9EA9DF5D-6651-455A-9305-C42C0FF51F01"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:draytek:vigor2135_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.4.5.3",
"matchCriteriaId": "B4AB3320-27F8-4359-AEF8-6B1FDBA67111"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:draytek:vigor2135:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AEDC8A7F-08CF-44D2-A9A5-A1353AF35B45"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:draytek:vigor166_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.2.7",
"matchCriteriaId": "08B9436B-B2FE-4644-BB06-B0537EC23A71"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:draytek:vigor166:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7E33E647-5883-44FA-9915-34B89090D4E4"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:draytek:vigor1000b_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.3.2.8",
"matchCriteriaId": "CDBC681E-CD03-49E5-BC3A-E4A7654975A3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:draytek:vigor1000b_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.4.0.0",
"versionEndExcluding": "4.4.3.1",
"matchCriteriaId": "ABDC93B5-DC0A-4AA4-A340-382F108AE80B"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:draytek:vigor1000b:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9FF86645-253A-4BA3-BA2A-2725575C390D"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:draytek:vigor165_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.2.7",
"matchCriteriaId": "59521C99-00BA-4503-823E-3FEA44F8DDA0"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:draytek:vigor165:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8E644893-0457-43A9-98AB-9DB37A5C415C"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:draytek:vigor3910_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.3.2.8",
"matchCriteriaId": "B937F11C-FC86-4D6E-A46B-BA2CA0FFCEF7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:draytek:vigor3910_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.4.0.0",
"versionEndExcluding": "4.4.3.1",
"matchCriteriaId": "2602941C-255F-4289-9043-D396CC4B3192"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:draytek:vigor3910:-:*:*:*:*:*:*:*",
"matchCriteriaId": "894E4DDA-D9BE-441D-B447-B1CE52959347"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:draytek:vigor2962_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.3.2.8",
"matchCriteriaId": "0549C870-BE10-441A-B07D-0701915E5A9E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:draytek:vigor2962_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.4.0.0",
"versionEndExcluding": "4.4.3.1",
"matchCriteriaId": "0D1A9825-E419-4740-996A-5928D207FCB6"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:draytek:vigor2962:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BD0C9A21-7CFE-452F-8505-834AB8579D9B"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:draytek:vigor3912_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.3.6.1",
"matchCriteriaId": "84670562-F228-40A0-A38D-144EA62556D3"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:draytek:vigor3912:-:*:*:*:*:*:*:*",
"matchCriteriaId": "282E5318-DAA8-4AA2-8E7D-4B8BD9162153"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:draytek:vigorlte200_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E1BD8E59-6C67-4C80-B25F-2C5814A8CF0E"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:draytek:vigorlte200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4DBF2015-9315-44C8-A9FE-E86146F1958E"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:draytek:vigor2133_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "43265128-7E8E-4FE2-8488-AC5734A4AF70"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:draytek:vigor2133:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1878E59C-FB40-435D-940A-8952C56FA88B"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:draytek:vigor2762_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "52F71B18-89B5-42C7-B4B7-448844D6AFBC"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:draytek:vigor2762:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3873B2B9-95C1-4F00-9165-7C4D2A90CDE5"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:draytek:vigor2832_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A96F64C0-09DD-4553-AC5F-D722B8321B0D"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:draytek:vigor2832:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B0978465-D59F-4C0A-A29F-5D7BE58BA557"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:draytek:vigor2860_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F2C4077B-C73F-4431-9103-C09960E203E1"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:draytek:vigor2860:-:*:*:*:*:*:*:*",
"matchCriteriaId": "266C73DE-BFC6-4F3E-B022-559B3971CA44"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:draytek:vigor2862_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9D081E5D-7A68-47A0-9EFE-1FC01DA2FF23"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:draytek:vigor2862:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8B01EDAE-BB9E-4431-BE8C-6505BA7CA42D"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:draytek:vigor2925_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6C470B04-BD57-429B-80FC-328A7D2E35E5"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:draytek:vigor2925:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7536B29C-2030-4331-B8BF-D269D86D199B"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:draytek:vigor2926_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3A688631-4B36-43CC-AEF8-D390081F01DC"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:draytek:vigor2926:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AF1B117B-603D-493C-A804-C18ED332A221"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:draytek:vigor2952_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E207BB52-29F8-4F2F-AA06-855B38E22958"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:draytek:vigor2952:-:*:*:*:*:*:*:*",
"matchCriteriaId": "167336E2-AAA8-4424-AB07-2D7C9E1542B3"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:draytek:vigor3220_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CD8437FD-65E2-4203-82B9-8FC32444204A"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:draytek:vigor3220:-:*:*:*:*:*:*:*",
"matchCriteriaId": "64955940-3998-4B76-92D1-D9F3FAB874B4"
}
]
}
]
}
],
"references": [
{
"url": "https://www.forescout.com/resources/draybreak-draytek-research/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mitigation",
"Technical Description",
"Third Party Advisory"
]
},
{
"url": "https://www.forescout.com/resources/draytek14-vulnerabilities",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-41593",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-03T19:15:04.740",
"lastModified": "2024-10-04T13:50:43.727",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-10-08T15:35:04.583",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,15 +15,742 @@
"value": "Los dispositivos DrayTek Vigor310 hasta 4.3.2.6 permiten a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de la funci\u00f3n ft_payload_dns(), porque se produce una operaci\u00f3n de extensi\u00f3n de signo de byte para el argumento de longitud de una llamada _memcpy, lo que lleva a un desbordamiento de b\u00fafer basado en el mont\u00f3n."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:draytek:vigor3912_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.3.6.1",
"matchCriteriaId": "84670562-F228-40A0-A38D-144EA62556D3"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:draytek:vigor3912:-:*:*:*:*:*:*:*",
"matchCriteriaId": "282E5318-DAA8-4AA2-8E7D-4B8BD9162153"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:draytek:vigor2962_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.3.2.8",
"matchCriteriaId": "0549C870-BE10-441A-B07D-0701915E5A9E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:draytek:vigor2962_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.4.0.0",
"versionEndExcluding": "4.4.3.1",
"matchCriteriaId": "0D1A9825-E419-4740-996A-5928D207FCB6"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:draytek:vigor2962:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BD0C9A21-7CFE-452F-8505-834AB8579D9B"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:draytek:vigor3910_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.3.2.8",
"matchCriteriaId": "B937F11C-FC86-4D6E-A46B-BA2CA0FFCEF7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:draytek:vigor3910_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.4.0.0",
"versionEndExcluding": "4.4.3.1",
"matchCriteriaId": "2602941C-255F-4289-9043-D396CC4B3192"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:draytek:vigor3910:-:*:*:*:*:*:*:*",
"matchCriteriaId": "894E4DDA-D9BE-441D-B447-B1CE52959347"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:draytek:vigor165_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.2.7",
"matchCriteriaId": "59521C99-00BA-4503-823E-3FEA44F8DDA0"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:draytek:vigor165:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8E644893-0457-43A9-98AB-9DB37A5C415C"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:draytek:vigor1000b_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.3.2.8",
"matchCriteriaId": "CDBC681E-CD03-49E5-BC3A-E4A7654975A3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:draytek:vigor1000b_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.4.0.0",
"versionEndExcluding": "4.4.3.1",
"matchCriteriaId": "ABDC93B5-DC0A-4AA4-A340-382F108AE80B"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:draytek:vigor1000b:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9FF86645-253A-4BA3-BA2A-2725575C390D"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:draytek:vigor166_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.2.7",
"matchCriteriaId": "08B9436B-B2FE-4644-BB06-B0537EC23A71"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:draytek:vigor166:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7E33E647-5883-44FA-9915-34B89090D4E4"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:draytek:vigor2135_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.4.5.3",
"matchCriteriaId": "B4AB3320-27F8-4359-AEF8-6B1FDBA67111"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:draytek:vigor2135:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AEDC8A7F-08CF-44D2-A9A5-A1353AF35B45"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:draytek:vigor2763_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.4.5.3",
"matchCriteriaId": "1A559F44-80F8-44B7-B70F-BA0B78C85283"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:draytek:vigor2763:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9EA9DF5D-6651-455A-9305-C42C0FF51F01"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:draytek:vigor2765_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.4.5.3",
"matchCriteriaId": "1B1826F9-0258-44DD-A471-113CF55CE563"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:draytek:vigor2765:-:*:*:*:*:*:*:*",
"matchCriteriaId": "60657812-D3A8-4B1B-B7BE-F629991CB053"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:draytek:vigor2865_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.4.5.2",
"matchCriteriaId": "C3D46DEC-06AB-489F-A0B5-10C31F80A8C1"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:draytek:vigor2865:-:*:*:*:*:*:*:*",
"matchCriteriaId": "871448C6-9183-4828-A287-05F5EC6A44F6"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:draytek:vigor2766_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.4.5.3",
"matchCriteriaId": "8F87D851-15BC-4FC1-8AB7-D5C15B2B74F0"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:draytek:vigor2766:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C0AB3C84-67CA-4531-85FB-1A56F3C93ABF"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:draytek:vigor2866_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.4.5.2",
"matchCriteriaId": "89461FD4-897D-44F1-8486-4BCCDE3772DD"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:draytek:vigor2866:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0D0D2760-739F-4C79-AEDC-8B2CCCA2FF53"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:draytek:vigor2915_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.4.5.3",
"matchCriteriaId": "E6E55BCE-BBF0-454B-AE86-45B7298888B3"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:draytek:vigor2915:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5860CBE4-328E-418D-9E81-1D3AF7DB8F2B"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:draytek:vigor2620_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "289E3E0B-6BA4-44B8-968A-AC374B15B631"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:draytek:vigor2620:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5D98663B-F2F5-4ADC-9FD5-75846890EEBA"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:draytek:vigorlte200_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E1BD8E59-6C67-4C80-B25F-2C5814A8CF0E"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:draytek:vigorlte200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4DBF2015-9315-44C8-A9FE-E86146F1958E"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:draytek:vigor2133_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "43265128-7E8E-4FE2-8488-AC5734A4AF70"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:draytek:vigor2133:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1878E59C-FB40-435D-940A-8952C56FA88B"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:draytek:vigor2762_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "52F71B18-89B5-42C7-B4B7-448844D6AFBC"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:draytek:vigor2762:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3873B2B9-95C1-4F00-9165-7C4D2A90CDE5"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:draytek:vigor2832_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A96F64C0-09DD-4553-AC5F-D722B8321B0D"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:draytek:vigor2832:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B0978465-D59F-4C0A-A29F-5D7BE58BA557"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:draytek:vigor2860_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F2C4077B-C73F-4431-9103-C09960E203E1"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:draytek:vigor2860:-:*:*:*:*:*:*:*",
"matchCriteriaId": "266C73DE-BFC6-4F3E-B022-559B3971CA44"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:draytek:vigor2862_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9D081E5D-7A68-47A0-9EFE-1FC01DA2FF23"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:draytek:vigor2862:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8B01EDAE-BB9E-4431-BE8C-6505BA7CA42D"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:draytek:vigor2925_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6C470B04-BD57-429B-80FC-328A7D2E35E5"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:draytek:vigor2925:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7536B29C-2030-4331-B8BF-D269D86D199B"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:draytek:vigor2926_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3A688631-4B36-43CC-AEF8-D390081F01DC"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:draytek:vigor2926:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AF1B117B-603D-493C-A804-C18ED332A221"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:draytek:vigor2952_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E207BB52-29F8-4F2F-AA06-855B38E22958"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:draytek:vigor2952:-:*:*:*:*:*:*:*",
"matchCriteriaId": "167336E2-AAA8-4424-AB07-2D7C9E1542B3"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:draytek:vigor3220_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CD8437FD-65E2-4203-82B9-8FC32444204A"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:draytek:vigor3220:-:*:*:*:*:*:*:*",
"matchCriteriaId": "64955940-3998-4B76-92D1-D9F3FAB874B4"
}
]
}
]
}
],
"references": [
{
"url": "https://www.forescout.com/resources/draybreak-draytek-research/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mitigation",
"Technical Description",
"Third Party Advisory"
]
},
{
"url": "https://www.forescout.com/resources/draytek14-vulnerabilities",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-41594",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-03T19:15:04.800",
"lastModified": "2024-10-04T13:50:43.727",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-10-08T15:31:47.907",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,15 +15,742 @@
"value": "Un problema en los dispositivos DrayTek Vigor310 hasta la versi\u00f3n 4.3.2.6 permite a un atacante obtener informaci\u00f3n confidencial porque el servidor httpd de la interfaz de administraci\u00f3n de Vigor utiliza una cadena est\u00e1tica para inicializar el PRNG de OpenSSL."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-326"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:draytek:vigor2620_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "289E3E0B-6BA4-44B8-968A-AC374B15B631"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:draytek:vigor2620:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5D98663B-F2F5-4ADC-9FD5-75846890EEBA"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:draytek:vigor2915_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.4.5.3",
"matchCriteriaId": "E6E55BCE-BBF0-454B-AE86-45B7298888B3"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:draytek:vigor2915:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5860CBE4-328E-418D-9E81-1D3AF7DB8F2B"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:draytek:vigor2866_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.4.5.2",
"matchCriteriaId": "89461FD4-897D-44F1-8486-4BCCDE3772DD"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:draytek:vigor2866:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0D0D2760-739F-4C79-AEDC-8B2CCCA2FF53"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:draytek:vigor2766_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.4.5.3",
"matchCriteriaId": "8F87D851-15BC-4FC1-8AB7-D5C15B2B74F0"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:draytek:vigor2766:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C0AB3C84-67CA-4531-85FB-1A56F3C93ABF"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:draytek:vigor2865_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.4.5.2",
"matchCriteriaId": "C3D46DEC-06AB-489F-A0B5-10C31F80A8C1"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:draytek:vigor2865:-:*:*:*:*:*:*:*",
"matchCriteriaId": "871448C6-9183-4828-A287-05F5EC6A44F6"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:draytek:vigor2765_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.4.5.3",
"matchCriteriaId": "1B1826F9-0258-44DD-A471-113CF55CE563"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:draytek:vigor2765:-:*:*:*:*:*:*:*",
"matchCriteriaId": "60657812-D3A8-4B1B-B7BE-F629991CB053"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:draytek:vigor2763_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.4.5.3",
"matchCriteriaId": "1A559F44-80F8-44B7-B70F-BA0B78C85283"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:draytek:vigor2763:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9EA9DF5D-6651-455A-9305-C42C0FF51F01"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:draytek:vigor2135_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.4.5.3",
"matchCriteriaId": "B4AB3320-27F8-4359-AEF8-6B1FDBA67111"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:draytek:vigor2135:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AEDC8A7F-08CF-44D2-A9A5-A1353AF35B45"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:draytek:vigor166_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.2.7",
"matchCriteriaId": "08B9436B-B2FE-4644-BB06-B0537EC23A71"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:draytek:vigor166:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7E33E647-5883-44FA-9915-34B89090D4E4"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:draytek:vigor1000b_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.3.2.8",
"matchCriteriaId": "CDBC681E-CD03-49E5-BC3A-E4A7654975A3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:draytek:vigor1000b_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.4.0.0",
"versionEndExcluding": "4.4.3.1",
"matchCriteriaId": "ABDC93B5-DC0A-4AA4-A340-382F108AE80B"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:draytek:vigor1000b:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9FF86645-253A-4BA3-BA2A-2725575C390D"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:draytek:vigor165_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.2.7",
"matchCriteriaId": "59521C99-00BA-4503-823E-3FEA44F8DDA0"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:draytek:vigor165:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8E644893-0457-43A9-98AB-9DB37A5C415C"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:draytek:vigor3910_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.3.2.8",
"matchCriteriaId": "B937F11C-FC86-4D6E-A46B-BA2CA0FFCEF7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:draytek:vigor3910_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.4.0.0",
"versionEndExcluding": "4.4.3.1",
"matchCriteriaId": "2602941C-255F-4289-9043-D396CC4B3192"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:draytek:vigor3910:-:*:*:*:*:*:*:*",
"matchCriteriaId": "894E4DDA-D9BE-441D-B447-B1CE52959347"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:draytek:vigor2962_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.3.2.8",
"matchCriteriaId": "0549C870-BE10-441A-B07D-0701915E5A9E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:draytek:vigor2962_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.4.0.0",
"versionEndExcluding": "4.4.3.1",
"matchCriteriaId": "0D1A9825-E419-4740-996A-5928D207FCB6"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:draytek:vigor2962:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BD0C9A21-7CFE-452F-8505-834AB8579D9B"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:draytek:vigor3912_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.3.6.1",
"matchCriteriaId": "84670562-F228-40A0-A38D-144EA62556D3"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:draytek:vigor3912:-:*:*:*:*:*:*:*",
"matchCriteriaId": "282E5318-DAA8-4AA2-8E7D-4B8BD9162153"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:draytek:vigorlte200_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E1BD8E59-6C67-4C80-B25F-2C5814A8CF0E"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:draytek:vigorlte200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4DBF2015-9315-44C8-A9FE-E86146F1958E"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:draytek:vigor2133_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "43265128-7E8E-4FE2-8488-AC5734A4AF70"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:draytek:vigor2133:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1878E59C-FB40-435D-940A-8952C56FA88B"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:draytek:vigor2762_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "52F71B18-89B5-42C7-B4B7-448844D6AFBC"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:draytek:vigor2762:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3873B2B9-95C1-4F00-9165-7C4D2A90CDE5"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:draytek:vigor2832_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A96F64C0-09DD-4553-AC5F-D722B8321B0D"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:draytek:vigor2832:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B0978465-D59F-4C0A-A29F-5D7BE58BA557"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:draytek:vigor2860_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F2C4077B-C73F-4431-9103-C09960E203E1"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:draytek:vigor2860:-:*:*:*:*:*:*:*",
"matchCriteriaId": "266C73DE-BFC6-4F3E-B022-559B3971CA44"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:draytek:vigor2862_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9D081E5D-7A68-47A0-9EFE-1FC01DA2FF23"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:draytek:vigor2862:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8B01EDAE-BB9E-4431-BE8C-6505BA7CA42D"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:draytek:vigor2925_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6C470B04-BD57-429B-80FC-328A7D2E35E5"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:draytek:vigor2925:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7536B29C-2030-4331-B8BF-D269D86D199B"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:draytek:vigor2926_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3A688631-4B36-43CC-AEF8-D390081F01DC"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:draytek:vigor2926:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AF1B117B-603D-493C-A804-C18ED332A221"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:draytek:vigor2952_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E207BB52-29F8-4F2F-AA06-855B38E22958"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:draytek:vigor2952:-:*:*:*:*:*:*:*",
"matchCriteriaId": "167336E2-AAA8-4424-AB07-2D7C9E1542B3"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:draytek:vigor3220_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CD8437FD-65E2-4203-82B9-8FC32444204A"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:draytek:vigor3220:-:*:*:*:*:*:*:*",
"matchCriteriaId": "64955940-3998-4B76-92D1-D9F3FAB874B4"
}
]
}
]
}
],
"references": [
{
"url": "https://www.forescout.com/resources/draybreak-draytek-research/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mitigation",
"Technical Description",
"Third Party Advisory"
]
},
{
"url": "https://www.forescout.com/resources/draytek14-vulnerabilities",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-41922",
"sourceIdentifier": "talos-cna@cisco.com",
"published": "2024-10-03T16:15:05.640",
"lastModified": "2024-10-04T13:50:43.727",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-10-08T14:48:47.087",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:veertu:anka_build_cloud:1.42.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DA553BA9-4893-4500-B0FB-7ACF869B790A"
}
]
}
]
}
],
"references": [
{
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-2061",
"source": "talos-cna@cisco.com"
"source": "talos-cna@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-42417",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2024-10-03T23:15:03.230",
"lastModified": "2024-10-04T13:50:43.727",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-10-08T15:43:05.720",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
@ -95,14 +115,39 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:deltaww:diaenergie:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.10.01.008",
"matchCriteriaId": "943337C9-A696-4CAB-9041-E1DAF4C83712"
}
]
}
]
}
],
"references": [
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-277-03",
"source": "ics-cert@hq.dhs.gov"
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Third Party Advisory",
"US Government Resource"
]
},
{
"url": "https://www.deltaww.com/en-US/Cybersecurity_Advisory",
"source": "ics-cert@hq.dhs.gov"
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-43699",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2024-10-03T23:15:03.490",
"lastModified": "2024-10-04T13:50:43.727",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-10-08T15:44:29.183",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
@ -95,14 +115,39 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:deltaww:diaenergie:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.10.01.008",
"matchCriteriaId": "943337C9-A696-4CAB-9041-E1DAF4C83712"
}
]
}
]
}
],
"references": [
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-277-03",
"source": "ics-cert@hq.dhs.gov"
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Third Party Advisory",
"US Government Resource"
]
},
{
"url": "https://www.deltaww.com/en-US/Cybersecurity_Advisory",
"source": "ics-cert@hq.dhs.gov"
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-43795",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-10-02T20:15:10.927",
"lastModified": "2024-10-04T13:50:43.727",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-10-08T14:01:16.883",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -59,6 +59,28 @@
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
@ -73,14 +95,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openc3:cosmos:*:*:*:*:open_source:*:*:*",
"versionEndExcluding": "5.19.0",
"matchCriteriaId": "04505723-F91D-400B-9AF7-F1524D21B3A4"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/OpenC3/cosmos/commit/762d7e0e93bdc2f340b1e42acccedc78994a576e",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/OpenC3/cosmos/security/advisories/GHSA-vfj8-5pj7-2f9g",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-45330",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2024-10-08T15:15:15.010",
"lastModified": "2024-10-08T15:15:15.010",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A use of externally-controlled format string in Fortinet FortiAnalyzer versions 7.4.0 through 7.4.3, 7.2.2 through 7.2.5 allows attacker to escalate its privileges via specially crafted requests."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@fortinet.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@fortinet.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-134"
}
]
}
],
"references": [
{
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-196",
"source": "psirt@fortinet.com"
}
]
}

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-45873",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-07T22:15:02.993",
"lastModified": "2024-10-07T22:15:02.993",
"lastModified": "2024-10-08T14:35:03.647",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A DLL hijacking vulnerability in VegaBird Yaazhini 2.0.2 allows attackers to execute arbitrary code / maintain persistence via placing a crafted DLL file in the same directory as Yaazhini.exe."
},
{
"lang": "es",
"value": "Una vulnerabilidad de secuestro de DLL en VegaBird Yaazhini 2.0.2 permite a los atacantes ejecutar c\u00f3digo arbitrario/mantener la persistencia colocando un archivo DLL manipulado en el mismo directorio que Yaazhini.exe."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"metrics": {},
"references": [
{
"url": "http://vegabird.com",

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-45874",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-07T22:15:03.077",
"lastModified": "2024-10-07T22:15:03.077",
"lastModified": "2024-10-08T14:35:04.530",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A DLL hijacking vulnerability in VegaBird Vooki 5.2.9 allows attackers to execute arbitrary code / maintain persistence via placing a crafted DLL file in the same directory as Vooki.exe."
},
{
"lang": "es",
"value": "Una vulnerabilidad de secuestro de DLL en VegaBird Vooki 5.2.9 permite a los atacantes ejecutar c\u00f3digo arbitrario/mantener la persistencia colocando un archivo DLL manipulado en el mismo directorio que Vooki.exe."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"metrics": {},
"references": [
{
"url": "http://vegabird.com",

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-45880",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-08T15:15:15.217",
"lastModified": "2024-10-08T15:15:15.217",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A command injection vulnerability exists in Motorola CX2L router v1.0.2 and below. The vulnerability is present in the SetStationSettings function. The system directly invokes the system function to execute commands for setting parameters such as MAC address without proper input filtering. This allows malicious users to inject and execute arbitrary commands."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/N1nEmAn/wp/blob/main/m0tOrol%40-Cx2l.pdf",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-45919",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-07T21:15:18.083",
"lastModified": "2024-10-07T21:15:18.083",
"lastModified": "2024-10-08T14:35:05.300",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A security flaw has been discovered in Solvait version 24.4.2 that allows an attacker to elevate their privileges. By manipulating the Request ID and Action Type parameters in /AssignToMe/SetAction, an attacker can bypass approval workflows leading to unauthorized access to sensitive information or approval of fraudulent requests."
},
{
"lang": "es",
"value": "Se ha descubierto una falla de seguridad en la versi\u00f3n 24.4.2 de Solvait que permite a un atacante elevar sus privilegios. Al manipular los par\u00e1metros Request ID y Action Type en /AssignToMe/SetAction, un atacante puede eludir los flujos de trabajo de aprobaci\u00f3n, lo que da lugar a un acceso no autorizado a informaci\u00f3n confidencial o a la aprobaci\u00f3n de solicitudes fraudulentas."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-269"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/ipxsec/28afaf965389283a68433c7afd54d17a",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-46977",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-10-02T20:15:11.400",
"lastModified": "2024-10-04T13:50:43.727",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-10-08T14:02:04.173",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -59,6 +59,28 @@
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
@ -73,14 +95,44 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openc3:cosmos:*:*:*:*:enterprise:*:*:*",
"versionEndExcluding": "5.19.0",
"matchCriteriaId": "E5BC5315-3D19-458F-ADBA-A32FE7C160A8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openc3:cosmos:*:*:*:*:open_source:*:*:*",
"versionEndExcluding": "5.19.0",
"matchCriteriaId": "04505723-F91D-400B-9AF7-F1524D21B3A4"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/OpenC3/cosmos/commit/a34e61aea5a465f0ab3e57d833ae7ff4cafd710b",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/OpenC3/cosmos/security/advisories/GHSA-8jxr-mccc-mwg8",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-47617",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-10-03T15:15:14.937",
"lastModified": "2024-10-04T13:50:43.727",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-10-08T14:23:38.597",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -51,18 +71,49 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sulu:sulu:2.5.20:*:*:*:*:*:*:*",
"matchCriteriaId": "E7EFCD27-01AC-4C20-9F92-E1F1F0D9DFE4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sulu:sulu:2.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "C2DEEB21-3616-43D0-935D-95FDCFC361F7"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/sulu/sulu/commit/a5a5ae555d282e88ff8559d38cfb46dea7939bda",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Product"
]
},
{
"url": "https://github.com/sulu/sulu/commit/eeacd14b6cf55f710084788140d40ebb00314b29",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/sulu/sulu/security/advisories/GHSA-6784-9c82-vr85",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-47618",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-10-03T15:15:15.147",
"lastModified": "2024-10-04T13:50:43.727",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-10-08T14:31:08.180",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -59,6 +59,28 @@
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
@ -73,14 +95,59 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sulu:sulu:*:*:*:*:*:*:*:*",
"versionStartExcluding": "2.0.0",
"versionEndExcluding": "2.6.5",
"matchCriteriaId": "7B65140D-3A0E-4E34-8E65-36936BF03195"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sulu:sulu:2.0.0:-:*:*:*:*:*:*",
"matchCriteriaId": "22FC3A80-4377-439B-93A6-8FF2EB7BA9F0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sulu:sulu:2.0.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "712ADF94-5F2D-4347-B6E8-704FBBF097DF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sulu:sulu:2.0.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "6BD27DD5-D0BB-40A9-AFD7-881B66E54D2B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sulu:sulu:2.0.0:rc3:*:*:*:*:*:*",
"matchCriteriaId": "A8043D82-A8C5-4927-B605-C72D6947A5AB"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/sulu/sulu/commit/ca72f75eebe41ea7726624d8aea7da6c425f1eb9",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/sulu/sulu/security/advisories/GHSA-255w-87rh-rg44",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-47817",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-10-07T22:15:03.913",
"lastModified": "2024-10-07T22:15:03.913",
"lastModified": "2024-10-08T15:35:24.303",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Lara-zeus Dynamic Dashboard simple way to manage widgets for your website landing page, and filament dashboard and Lara-zeus artemis is a collection of themes for the lara-zeus ecosystem. If values passed to a paragraph widget are not valid and contain a specific set of characters, applications are vulnerable to XSS attack against a user who opens a page on which a paragraph widget is rendered. Users are advised to upgrade to the appropriate fix versions detailed in the advisory metadata. There are no known workarounds for this vulnerability."
},
{
"lang": "es",
"value": "Lara-zeus Dynamic Dashboard una forma sencilla de administrar los widgets de la p\u00e1gina de inicio de su sitio web, el panel de control de filament y Lara-zeus Artemis es una colecci\u00f3n de temas para el ecosistema de Lara-zeus. Si los valores que se pasan a un widget de p\u00e1rrafo no son v\u00e1lidos y contienen un conjunto espec\u00edfico de caracteres, las aplicaciones son vulnerables a ataques XSS contra un usuario que abre una p\u00e1gina en la que se muestra un widget de p\u00e1rrafo. Se recomienda a los usuarios que actualicen a las versiones de correcci\u00f3n adecuadas que se detallan en los metadatos del aviso. No existen workarounds conocidas para esta vulnerabilidad."
}
],
"metrics": {
@ -55,6 +59,28 @@
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-8352",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-10-03T04:15:04.613",
"lastModified": "2024-10-04T13:50:43.727",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-08T14:17:34.707",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,18 +51,45 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hypestudio:social_web_suite:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "4.1.12",
"matchCriteriaId": "47BB1625-E11B-4228-80E2-51BB00FAEC4D"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/social-web-suite/trunk/includes/libs/class-socialwebsuite-log.php#L78",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3155593/social-web-suite/trunk?old=3068377&old_path=%2Fsocial-web-suite%2Ftrunk",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/78ba132c-b5b4-4999-a0ec-67d17ae2857f?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-9210",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-10-02T08:15:03.180",
"lastModified": "2024-10-04T13:50:43.727",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-08T15:34:42.060",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,18 +51,45 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibericode:mailchimp_top_bar:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.6.1",
"matchCriteriaId": "0B50DEF1-33EF-439C-9DF4-EA0CCC9D853C"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/mailchimp-top-bar/tags/1.6.0/views/settings-page.php#L40",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/mailchimp-top-bar/tags/1.6.1/views/settings-page.php#L40",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b45ba98f-4cd1-406a-8661-e19d5b4c3ba8?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-9218",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-10-02T09:15:02.837",
"lastModified": "2024-10-04T13:50:43.727",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-08T15:33:58.617",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,18 +51,45 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:themegrill:magazine_blocks:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.3.15",
"matchCriteriaId": "A8BF9387-E61F-4648-BDF9-E7CD76962F68"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/magazine-blocks/tags/1.3.14/includes/Blocks.php#L334",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3161000/#file13",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e4c27225-f9db-4ae5-bb1f-ce8648c216eb?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-9222",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-10-02T08:15:03.380",
"lastModified": "2024-10-04T13:50:43.727",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-08T15:34:13.250",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,18 +51,45 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cozmoslabs:membership_\\&_content_restriction_-_paid_member_subscriptions:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "2.12.9",
"matchCriteriaId": "A0CF090D-406D-4163-9467-6F41BB7A30BA"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/paid-member-subscriptions/tags/2.12.8/includes/admin/class-admin-payments-list-table.php#L155",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3160323/#file10",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6d43235b-9c5e-4d7f-99f0-28dcab4b2a91?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-9344",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-10-02T09:15:03.570",
"lastModified": "2024-10-04T13:50:43.727",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-08T15:06:57.470",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "security@wordfence.com",
"type": "Secondary",
@ -51,18 +71,45 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:berqier:berqwp:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "2.1.2",
"matchCriteriaId": "298BBDAF-538B-440C-B512-0BAC33CE5953"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/searchpro/trunk/simplehtmldom/example/scraping/example_scraping_general.php?rev=3138385",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3160806%40searchpro&new=3160806%40searchpro&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/01d5e5b5-033c-4690-9857-3339e2831340?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-9460",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-10-03T15:15:15.750",
"lastModified": "2024-10-04T13:50:43.727",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-10-08T14:33:42.703",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,22 +140,55 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:codezips:online_shopping_portal:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "755F393E-3C39-4717-A053-6820CD4965B2"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/ppp-src/CVE/issues/8",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Broken Link"
]
},
{
"url": "https://vuldb.com/?ctiid.279132",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.279132",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.417052",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-10-08T14:00:56.160664+00:00
2024-10-08T16:00:20.002746+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-10-08T13:54:46.450000+00:00
2024-10-08T15:55:08.933000+00:00
```
### Last Data Feed Release
@ -33,34 +33,47 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
264875
264878
```
### CVEs added in the last Commit
Recently added CVEs: `2`
Recently added CVEs: `3`
- [CVE-2024-8431](CVE-2024/CVE-2024-84xx/CVE-2024-8431.json) (`2024-10-08T12:15:02.810`)
- [CVE-2024-8482](CVE-2024/CVE-2024-84xx/CVE-2024-8482.json) (`2024-10-08T12:15:03.043`)
- [CVE-2024-33506](CVE-2024/CVE-2024-335xx/CVE-2024-33506.json) (`2024-10-08T15:15:14.717`)
- [CVE-2024-45330](CVE-2024/CVE-2024-453xx/CVE-2024-45330.json) (`2024-10-08T15:15:15.010`)
- [CVE-2024-45880](CVE-2024/CVE-2024-458xx/CVE-2024-45880.json) (`2024-10-08T15:15:15.217`)
### CVEs modified in the last Commit
Recently modified CVEs: `13`
Recently modified CVEs: `65`
- [CVE-2023-40313](CVE-2023/CVE-2023-403xx/CVE-2023-40313.json) (`2024-10-08T13:35:02.093`)
- [CVE-2024-20438](CVE-2024/CVE-2024-204xx/CVE-2024-20438.json) (`2024-10-08T13:54:46.450`)
- [CVE-2024-20441](CVE-2024/CVE-2024-204xx/CVE-2024-20441.json) (`2024-10-08T13:45:07.300`)
- [CVE-2024-20516](CVE-2024/CVE-2024-205xx/CVE-2024-20516.json) (`2024-10-08T13:44:10.840`)
- [CVE-2024-20517](CVE-2024/CVE-2024-205xx/CVE-2024-20517.json) (`2024-10-08T13:47:52.483`)
- [CVE-2024-20518](CVE-2024/CVE-2024-205xx/CVE-2024-20518.json) (`2024-10-08T13:50:14.730`)
- [CVE-2024-20519](CVE-2024/CVE-2024-205xx/CVE-2024-20519.json) (`2024-10-08T13:50:35.507`)
- [CVE-2024-20520](CVE-2024/CVE-2024-205xx/CVE-2024-20520.json) (`2024-10-08T13:50:48.337`)
- [CVE-2024-20521](CVE-2024/CVE-2024-205xx/CVE-2024-20521.json) (`2024-10-08T13:50:57.163`)
- [CVE-2024-20522](CVE-2024/CVE-2024-205xx/CVE-2024-20522.json) (`2024-10-08T13:48:19.060`)
- [CVE-2024-20523](CVE-2024/CVE-2024-205xx/CVE-2024-20523.json) (`2024-10-08T13:48:29.500`)
- [CVE-2024-20524](CVE-2024/CVE-2024-205xx/CVE-2024-20524.json) (`2024-10-08T13:48:58.273`)
- [CVE-2024-9207](CVE-2024/CVE-2024-92xx/CVE-2024-9207.json) (`2024-10-08T11:15:13.870`)
- [CVE-2024-20490](CVE-2024/CVE-2024-204xx/CVE-2024-20490.json) (`2024-10-08T15:15:39.160`)
- [CVE-2024-20491](CVE-2024/CVE-2024-204xx/CVE-2024-20491.json) (`2024-10-08T15:55:08.933`)
- [CVE-2024-28888](CVE-2024/CVE-2024-288xx/CVE-2024-28888.json) (`2024-10-08T14:14:55.637`)
- [CVE-2024-41163](CVE-2024/CVE-2024-411xx/CVE-2024-41163.json) (`2024-10-08T14:47:56.787`)
- [CVE-2024-41587](CVE-2024/CVE-2024-415xx/CVE-2024-41587.json) (`2024-10-08T15:32:18.313`)
- [CVE-2024-41591](CVE-2024/CVE-2024-415xx/CVE-2024-41591.json) (`2024-10-08T15:34:46.453`)
- [CVE-2024-41593](CVE-2024/CVE-2024-415xx/CVE-2024-41593.json) (`2024-10-08T15:35:04.583`)
- [CVE-2024-41594](CVE-2024/CVE-2024-415xx/CVE-2024-41594.json) (`2024-10-08T15:31:47.907`)
- [CVE-2024-41922](CVE-2024/CVE-2024-419xx/CVE-2024-41922.json) (`2024-10-08T14:48:47.087`)
- [CVE-2024-42417](CVE-2024/CVE-2024-424xx/CVE-2024-42417.json) (`2024-10-08T15:43:05.720`)
- [CVE-2024-43699](CVE-2024/CVE-2024-436xx/CVE-2024-43699.json) (`2024-10-08T15:44:29.183`)
- [CVE-2024-43795](CVE-2024/CVE-2024-437xx/CVE-2024-43795.json) (`2024-10-08T14:01:16.883`)
- [CVE-2024-45873](CVE-2024/CVE-2024-458xx/CVE-2024-45873.json) (`2024-10-08T14:35:03.647`)
- [CVE-2024-45874](CVE-2024/CVE-2024-458xx/CVE-2024-45874.json) (`2024-10-08T14:35:04.530`)
- [CVE-2024-45919](CVE-2024/CVE-2024-459xx/CVE-2024-45919.json) (`2024-10-08T14:35:05.300`)
- [CVE-2024-46977](CVE-2024/CVE-2024-469xx/CVE-2024-46977.json) (`2024-10-08T14:02:04.173`)
- [CVE-2024-47617](CVE-2024/CVE-2024-476xx/CVE-2024-47617.json) (`2024-10-08T14:23:38.597`)
- [CVE-2024-47618](CVE-2024/CVE-2024-476xx/CVE-2024-47618.json) (`2024-10-08T14:31:08.180`)
- [CVE-2024-47817](CVE-2024/CVE-2024-478xx/CVE-2024-47817.json) (`2024-10-08T15:35:24.303`)
- [CVE-2024-8352](CVE-2024/CVE-2024-83xx/CVE-2024-8352.json) (`2024-10-08T14:17:34.707`)
- [CVE-2024-9210](CVE-2024/CVE-2024-92xx/CVE-2024-9210.json) (`2024-10-08T15:34:42.060`)
- [CVE-2024-9218](CVE-2024/CVE-2024-92xx/CVE-2024-9218.json) (`2024-10-08T15:33:58.617`)
- [CVE-2024-9222](CVE-2024/CVE-2024-92xx/CVE-2024-9222.json) (`2024-10-08T15:34:13.250`)
- [CVE-2024-9344](CVE-2024/CVE-2024-93xx/CVE-2024-9344.json) (`2024-10-08T15:06:57.470`)
- [CVE-2024-9460](CVE-2024/CVE-2024-94xx/CVE-2024-9460.json) (`2024-10-08T14:33:42.703`)
## Download and Usage

View File

@ -57696,7 +57696,7 @@ CVE-2012-6712,0,0,fea67aeec6bfb437e5bbbf61612f61be5817060ae71f29adff92a6a16ad7cb
CVE-2012-6713,0,0,8e78c41cf37196fe690c75e0d151b4665941115914aa9cb490b5c36cf2917d3d,2019-08-16T12:43:14.863000
CVE-2012-6714,0,0,0d26ab81fa0d08750506b398fd79690e0fc9a8db7e8af352052cb4d425743b23,2019-08-22T18:48:28.723000
CVE-2012-6715,0,0,acac1344a2fece8291d3236a0e888ac50de5604c056f7e08b1e21778d6dc7534,2019-08-22T18:48:23.957000
CVE-2012-6716,0,0,2f2b37a0580f2c485b7b22270c9f5a476f5c4a75eb024c88c8534e64de66c9b9,2019-08-26T12:46:34.933000
CVE-2012-6716,0,1,dd19be3d6a6b8d7d81719aa011cf031595811a6795a3cd0053c2b23bcb507dfa,2024-10-08T14:03:10.323000
CVE-2012-6717,0,0,907f3bb02239aa3deb76ca17eea3af26dc2323b4010ed27fa690ad99aad9ec7e,2019-08-30T20:16:31.407000
CVE-2012-6718,0,0,6e4a6ff3b27ac4b0352851f586e54a3bd445b48e9746720a77848eed83fdf964,2019-08-28T22:02:24.167000
CVE-2012-6719,0,0,0238e8012603d25a6650a360bca72659e45e5bb1ad618281f10424acab357ff2,2019-08-28T22:02:59.513000
@ -64467,10 +64467,10 @@ CVE-2013-7473,0,0,eaa40e1ac74ece646d5511e664f7de6ff1acad0adf0045807e9fb3f7bba9fc
CVE-2013-7474,0,0,204b6f852433e6e6a52be5a2ccde425469565220f9b6e20a391b2c9bd04e2f4e,2019-08-06T12:19:27.310000
CVE-2013-7475,0,0,1b2b3417415e5378c5798e9d3c162e15e1fb210651616346f80d15f4d7687f6b,2019-08-16T02:06:17.230000
CVE-2013-7476,0,0,932d0a08295a626c66a6692048203ded269dbdd790c7615a6f31d10886e011d1,2019-08-20T15:46:45.173000
CVE-2013-7477,0,0,2669200113148f69e6ae522cbce7d57bdd01de3407f476629e662ea4634bea10,2019-08-26T12:47:58.503000
CVE-2013-7478,0,0,bb9aead0f209fd6e82383121503a06cab809ce939d5fe6699886e169490111a4,2019-08-26T12:49:29.667000
CVE-2013-7479,0,0,95d29e5336b4e987912bc0882993c18c4fdce61446896cd86eefb47bfb65e9dd,2019-08-26T12:52:43.477000
CVE-2013-7480,0,0,ff412d00869669473e2fde2373246b70196a555167a1dfc5098f7af4c9344876,2019-08-26T12:51:36.020000
CVE-2013-7477,0,1,3853d48088e580734a7c8bbb97025c2186efa8e9ae791097177cabd64bb692f4,2024-10-08T14:03:10.323000
CVE-2013-7478,0,1,7e752bb66fc0a04e0c6996290e397bb5a2262f6ac76c327956ffb382d56579b5,2024-10-08T14:03:10.323000
CVE-2013-7479,0,1,c80bc6023055cd18a18c95ec7cffcc6c53e524cbace5210f0eeb96c54edb519e,2024-10-08T14:03:10.323000
CVE-2013-7480,0,1,0901440da71ccb205539ab51704e56d507bff1c4ca4d0c230aa992dc487ad802,2024-10-08T14:03:10.323000
CVE-2013-7481,0,0,e588358c6594f38974f7ccc59bf852b76c31ea6093a4a37b6b5724f08779c45c,2019-08-26T13:44:35.073000
CVE-2013-7482,0,0,d08b968b420d482d3adbf98ed0f191ad033762109cdf1aba8d553fc3325be99e,2019-08-26T17:30:25.260000
CVE-2013-7483,0,0,201e7c5368a83a415ce838ba6cb3eb2abf7ae692a437b7e153c481cfc750f722,2019-08-29T12:53:47.557000
@ -81956,10 +81956,10 @@ CVE-2015-9293,0,0,f722908f843412029c6283024b15fec75243a0730ac144305243aafcc95d80
CVE-2015-9294,0,0,942b46a83da511ca07573d6928bd536028cfeaa81a397ec213524edea483f9d4,2019-08-16T02:05:34.933000
CVE-2015-9295,0,0,a0a8117230a64c846ec962ed035b109fdb8db1a949badf030304258939c444a5,2019-08-16T01:59:24.713000
CVE-2015-9296,0,0,064ca7caa82ba4c0cbca268896c680d4a55a9f1f1850508bf43d1161dc24838a,2019-08-16T12:41:07.637000
CVE-2015-9297,0,0,d0b80fd91acd02a1b6e18138acb2ff62495d46e5f804213dbfad23e976354d53,2023-03-01T02:43:37.110000
CVE-2015-9298,0,0,5bab195511e47e83af1be996e9885f826e4ca56a42550ac0d005d56335a3dd03,2023-03-01T02:50:04.407000
CVE-2015-9299,0,0,dd7ca76c10d32af88f35ae6c58f72fdf1d942c54997f6363b714728604dadd76,2019-08-16T01:53:43.837000
CVE-2015-9300,0,0,826f14df5fd7accccccdd698837769e8b16373a14812cc4dbab00b239d1ab1a3,2019-08-16T01:53:15.930000
CVE-2015-9297,0,1,e105a85a95fa9cc9b23dc1553c1d494e31596e88adbe09f00a6a488f2981d879,2024-10-08T14:03:10.323000
CVE-2015-9298,0,1,b032e7b3fe57a1f0999d238d8d9851bf736b712b71e6c2da70013d1d17315297,2024-10-08T14:03:10.323000
CVE-2015-9299,0,1,6ec8316e366bbab7d42f8aa05d79ad37d16d9ac590d39fff5d3195f8c90e4072,2024-10-08T14:03:10.323000
CVE-2015-9300,0,1,5723f82c6e7473948b743f970d400ff3f0063ba5959dd50cd180da33b59fa12a,2024-10-08T14:03:10.323000
CVE-2015-9301,0,0,276dd7fbd38b1c3c46d0b94e962f96f535d8c3ddd7965fb2400d7bcf20dc9e69,2019-09-09T13:52:44.973000
CVE-2015-9302,0,0,71719f22a9552c078e85c1c9ccd272971c1b84525e4a75dd68ae74851cc256b0,2023-03-01T02:55:21.820000
CVE-2015-9303,0,0,9a10143f43efc15e3bd93deba79f4819d47834ba56f015f17450fcf296ddb3cb,2019-08-16T20:01:54.770000
@ -86706,7 +86706,7 @@ CVE-2016-3423,0,0,f488c6c7a9631fd699fa9b57b56b86988d635c1dd450226500d2cde596b29c
CVE-2016-3424,0,0,12a2452cd8236b7b003af717b552b17c568dc6ad2276770c6c815ab727a09268,2017-09-01T01:29:08.757000
CVE-2016-3425,0,0,3980fcdd6b582f77d8738e3fb3c3014b69a3c5f69786134c7feef1ed5c568ff2,2022-05-13T14:57:21.280000
CVE-2016-3426,0,0,22a611d74ba5653e7d51a013d889a6174c468db31a3d4254b64f3e36ce9fb63f,2022-05-13T14:57:21.287000
CVE-2016-3427,0,0,2c4c76fd744902e7698cd71e2c1f067caf965db1a98bbdac94e4085a09ba009b,2024-06-27T19:23:19.670000
CVE-2016-3427,0,1,3c26976c655fb8986613f82077701e8cb5ceed9f9827c279533f38f1d1d89b5c,2024-10-08T15:35:00.827000
CVE-2016-3428,0,0,821ab93ab9f9b7c000b0a0e3558ee4082ee77c196fd17fb39cef9ad80c3ee75d,2017-09-03T01:29:06.407000
CVE-2016-3429,0,0,298e0976d614f443bc0690c14bd472e228c05ff2e8969750c9f5d2b91da29469,2016-12-03T03:26:54.870000
CVE-2016-3431,0,0,e79081d1162d89c9389fa396cfaa769607de656a51ddc125cd694172e6d287ff,2017-09-03T01:29:06.453000
@ -110285,7 +110285,7 @@ CVE-2018-0572,0,0,55fa2c32858ac4b7e4a407247a54448912655adf98fe360b71b3b7357fd855
CVE-2018-0573,0,0,d62dd63f45312c87f4d08ddad7aeb5b17733edf03bf37a9c112f3ed9e3e9c635,2019-10-03T00:03:26.223000
CVE-2018-0574,0,0,2d9dbb2c0e301b001b1076d73115f6ad550c5a782f44d7762b21c36aaa7feb00,2018-08-21T12:37:27.360000
CVE-2018-0575,0,0,d7b229dbe0c3f84bb28baa739b0c9ca9c813faef14dfb871e568218d26aadd14,2018-08-21T12:37:35.893000
CVE-2018-0576,0,0,8956f7e06cf37a52430430c091279e466f68a475fd7691f2d31194e1d280daf4,2020-01-10T01:15:09.350000
CVE-2018-0576,0,1,7c73d2bce74299ba49ce0ee7bf19d7f3ba1abf44674b20864709cdb914849e2a,2024-10-08T14:03:10.323000
CVE-2018-0577,0,0,8c2416cf577d42d47509cdec290ab25589f6b1ec9708e1dbd6a57a05c58ff38d,2023-05-26T15:04:42.427000
CVE-2018-0578,0,0,6b692ab380b53522a821cc598a6bced07196f1260947bfa45a49ac845c0af297,2018-06-13T16:58:04.207000
CVE-2018-0579,0,0,38b948c45b50d2ca2068829788b915d19f016f3122883ec4ab6b859260eb384d,2018-06-19T16:21:01.873000
@ -113989,7 +113989,7 @@ CVE-2018-13132,0,0,5e8ef7e7daa8dc965753a57466e5bb71f54de11e63b597e47e2ebd6daa312
CVE-2018-13133,0,0,6db7a16db38c5ff9d73289b26ae02bd76589b2c4f0eb96435fd8fea57a03d220,2018-09-06T18:03:58.940000
CVE-2018-13134,0,0,bdc8ba5878d3af9afa836ffad5108d61abd3e609661c3ec4b86ad2554b45a5cc,2019-03-28T16:50:48.340000
CVE-2018-13136,0,0,e4f4347c2ac6380810868ef6821a07e55f1dce1195133ce09d226ee2f195de10,2019-09-18T06:15:10.120000
CVE-2018-13137,0,0,96714d0dccc8c9ab67bbbc6f97968e7574982c35f68558f244408d22466f2a04,2019-08-23T11:15:10.450000
CVE-2018-13137,0,1,f7258b1723f3b64474f3166d8c18c2fbe72d4fbaeb7e10bc819044e3fa87f8ed,2024-10-08T14:03:10.323000
CVE-2018-13139,0,0,4fd67f2d933ef3137c2e50e1238a5e1cce7f0c01ad3c77c6a2de4ca5916785ec,2020-08-24T17:37:01.140000
CVE-2018-1314,0,0,944e6b63519313f1b7e2da9d6bf61d8bb6060c637021a11f7c9578f677ff2563,2023-11-07T02:55:57.473000
CVE-2018-13140,0,0,8a1977e0f38976cbed5cae8c32a7b044cdda55f357b01254ec9f560c4a3831fc,2019-10-03T00:03:26.223000
@ -126633,7 +126633,7 @@ CVE-2018-9016,0,0,a31720ff1c65b4e02359e87911e103554822005dd7719d7609f595908b1db6
CVE-2018-9017,0,0,c3b9d8ffb0ca09d4a169a19e009d2e8ba5f052fb491b48f3bd3e76e57e7c847a,2018-04-18T01:27:51.957000
CVE-2018-9018,0,0,337e0399b3687e9aa8483bb8c7f9bf3838bed5e800b97b0d3ce60d00b25ed468,2023-11-07T03:01:32.350000
CVE-2018-9019,0,0,4ab893a114b8633871f0e647e76a1cc31e0c22ccbe0c07e736c07cfe207310b3,2021-01-30T02:36:52.037000
CVE-2018-9020,0,0,5a8be40b26287aa21e96feb11507683ad375f0690215789d6989c16073d93fac,2018-04-18T14:31:16.717000
CVE-2018-9020,0,1,7d5c20c78613c83a49f2f2002d7bc483021f60c62977f8f17f755160d8011617,2024-10-08T14:03:10.323000
CVE-2018-9021,0,0,be8bde5da6bd794170bd384754187a22a60d92407d1de775ad8238e28084daf6,2021-04-13T20:23:49.383000
CVE-2018-9022,0,0,896f2b765457082fd902e7a9aad62e3832b94d147ee6c5e0eb7c35b3fc3943b5,2021-04-13T20:24:17.933000
CVE-2018-9023,0,0,93ace0a5687980d181a98369b8920d8a65e4392a4619cb02fb4d58c769cbb33d,2021-04-12T13:40:44.337000
@ -134222,7 +134222,7 @@ CVE-2019-1652,0,0,b7c230db50ecd8679bc76e17a8cddc532e062f94276746b7bc2c035d845365
CVE-2019-16520,0,0,8530ec651f53fe71e4e3557184e3fe5dce9f6df1063aea8136757697025dd6bd,2019-10-18T20:22:28.553000
CVE-2019-16521,0,0,e1d25327f8ca832ac39c31ba7a6cfbf686ebed371e748036fcb310f4b4c9a433,2019-10-18T20:24:32.450000
CVE-2019-16522,0,0,abb515b5d25ea25feee783d6602457cb080d8cf99c7e61398fd28e8cb29df2f8,2019-10-20T22:19:38.167000
CVE-2019-16523,0,0,577902c1ef21928be1d99416096146499164d290b532aef454184883f0303c6b,2019-10-18T20:25:36
CVE-2019-16523,0,1,20ba1be1c41b905902382990f9234a363b514d61a2f57ef4b8ad566393acba1c,2024-10-08T14:03:10.323000
CVE-2019-16524,0,0,127e34041e0d36851de3093a9de484f99a0708cb57709188ec396024c90b3e5b,2019-10-01T14:05:12.320000
CVE-2019-16525,0,0,55daa8e48c219b43811e6f13af2c9ce4a2cb7d85f60ecf9b2a2463d5d07be895,2019-09-20T14:55:17.993000
CVE-2019-16528,0,0,5ccb09375071fa903e23bbd06ed48db483d22d7cc5eea087e80e09939e42e2e2,2021-07-21T11:39:23.747000
@ -157963,10 +157963,10 @@ CVE-2020-3498,0,0,9b8266ce646bbd797d51b71d793130ff53131bf078eaa2864fb730dea52122
CVE-2020-3499,0,0,77cc0759b20eefd41abc9ed43d45a21d35b25bc844c12ee022fc99d76c872b25,2022-10-29T02:41:29.650000
CVE-2020-3500,0,0,c94d1f534dd8374c9e1bb358d0c2b7cd651113b2b3bbf46661240e46bec53a54,2023-11-07T03:22:48.680000
CVE-2020-3501,0,0,f589f870391256874c75871a4bd1ed6fbbdacfc22b1b8a6d778ba311790dce55,2023-11-07T03:22:48.857000
CVE-2020-35012,0,0,d690f40217f83575b48e56474ef2529ed81b8b9df6dda2f495af0e098f838cae,2021-12-03T13:39:58.817000
CVE-2020-35012,0,1,4fd0cd243ef5d706a0793f2db1b22b15ab2380941a356dbb4c281e075a796d42,2024-10-08T14:03:10.323000
CVE-2020-3502,0,0,e7ce2c6b29140f9f49e26a549bbacb564d7d2f9c95e9afcda81c4e467eaa5504,2023-11-07T03:22:49.040000
CVE-2020-3503,0,0,7ac871ccff03bfb5899f62e0fa430df69ef933e6857ab3ffc2a5add8626932a9,2023-11-07T03:22:49.220000
CVE-2020-35037,0,0,67ef0edc7a000aadf805273065eed1653ed10f8f5fe5b07dcdc97246595466dd,2021-12-03T16:30:42.443000
CVE-2020-35037,0,1,4932400c9ef86c5bdd63a5f828a4c442cd773e3bc0704ed0f0d7d7d5690114ec,2024-10-08T14:03:10.323000
CVE-2020-3504,0,0,753682fd2455742fd21a90cef952f396bc59bf7c7c08008022b1e83e86ec685c,2023-11-07T03:22:49.407000
CVE-2020-3505,0,0,2d7d6fb583c7487794cc36002bc2235ab6eb4a4e5b22ae34b3247400b0837b80,2023-11-07T03:22:49.610000
CVE-2020-3506,0,0,9b0b0aa4673dfac7729233fa4da8c2acefa3cafef21abd4fc6e14a864c0ef324,2023-11-07T03:22:49.783000
@ -184831,7 +184831,7 @@ CVE-2021-43943,0,0,467e76f9e6b395a3c1e73a4638ce536f02b59a6cf0b1cfe30f34b17590c7c
CVE-2021-43944,0,0,9de7d1e0d407cd64a44e65d7887d3c404efa8a613b44275f93107fcd73740502,2024-10-07T19:36:12.070000
CVE-2021-43945,0,0,0866d071bf2f9f2ec6c6326ea2483361c8576488b7c370ca8971ed0ad9cb08c8,2022-03-08T17:17:57.177000
CVE-2021-43946,0,0,1a14949279061e32d77c8f3348ef3c327d470dc5f717dc44cb0d5f0725a9a7a1,2023-02-24T14:11:14.347000
CVE-2021-43947,0,0,70f9a92cd7bbd54f2e81e8a4a3ef0b929377aeb71300bf56391d3c8cdbc15b48,2022-03-30T13:29:49.470000
CVE-2021-43947,0,1,1a7d25337441460af30824c8cc6b6240c24c4e4d88e9575ede1d9289ef141904,2024-10-08T15:35:02.707000
CVE-2021-43948,0,0,98ee5a735144f7eef7611b5af741a8e572ab25bc0215586b6f9210edda0d78f1,2022-07-12T17:42:04.277000
CVE-2021-43949,0,0,97f6bd9cfb6879891ab8052281fce2b452531563b44f1ae6fae0e2d5ed76975f,2022-03-04T15:30:36.943000
CVE-2021-4395,0,0,5d895816c1211e6062d02d2b1808806460c24902a3a640e88f71900a1317b51c,2023-11-07T03:40:51.350000
@ -224672,7 +224672,7 @@ CVE-2023-32622,0,0,71747ab46c33456aed476e4425613d72e88f3406e6c48f880eedf8e6b8a2c
CVE-2023-32623,0,0,30ff1279195a6636057104c5dab6bf90f9094c454e8c98830e8ff9889b1dbcea,2023-07-21T19:19:23.793000
CVE-2023-32624,0,0,b7f16c801dcd157fb7ede4a52f1e7501cafb88f6b0e5e589e72ddfda3a58cce4,2023-08-07T19:32:10.417000
CVE-2023-32625,0,0,8b56ef61f638262055fb85e3f151f40250cb418f506a6b1e66b6d000f1dce0e0,2023-08-07T19:33:29.343000
CVE-2023-32626,0,0,bfa8e616218a50b40b0a4104457fe0d2591b90cab9910fb6de164a34329b9c42,2023-08-23T16:49:06.603000
CVE-2023-32626,0,1,aae0b3d3db8a6f8f8124a6face73b7b994e56be03e80e4a1c3a301e5a48e9b7e,2024-10-08T15:35:03.850000
CVE-2023-32627,0,0,8825e9c17f15ca79ee491a29095467cfcfb0d2f269da133cb725409597563a61,2023-11-07T04:14:38.113000
CVE-2023-32628,0,0,34390445b330a341408fd3970e484b7a57a2397009f222a8d008d32e5d2d337f,2023-06-12T16:53:19.953000
CVE-2023-32629,0,0,93677c1ca189924cb0aae873bfbf6afd35bc73047cc3230089c6ba99cde67511,2023-09-11T19:15:42.233000
@ -227164,7 +227164,7 @@ CVE-2023-36097,0,0,d69938fc728da34d8768a0c5fff74b9f5fdf3c3a2579ad3f611d775612b75
CVE-2023-3610,0,0,64c0e8d2425050cc67fb6bf5e0c9fc93a2196e61379b8959e14e5951d7558153,2023-12-29T16:05:32.897000
CVE-2023-36100,0,0,01dbce6a25d542551aa3012a83e55a5651b09bcdfe5ee1fa0fa701c6386b6ca8,2024-10-01T17:35:23.277000
CVE-2023-36103,0,0,e23d9a2dd86cb9355cdbf5242465c87caaa1af25f65237f20a1638f8c876293e,2024-09-24T18:10:16.207000
CVE-2023-36106,0,0,b4d24519cb6404a5e8ee83f274be002cd600bd9db8f91c065889d76d5476c9aa,2023-08-23T14:33:07.907000
CVE-2023-36106,0,1,d7e5399c01f5b61313db82f293207021b73fa550d30206ec057d5ebb9587589f,2024-10-08T15:35:04.673000
CVE-2023-36109,0,0,2905c47f1f22b864042595a1a3690775764e8e0cf79a8f06d31d838015bda409,2023-09-22T02:12:15.177000
CVE-2023-3611,0,0,3276ea952612bf8ce9f28e73d33d9668ae065819920d37d3d7dd3deee2d0f859,2024-08-22T20:25:34.373000
CVE-2023-36118,0,0,bff10a029ac853a7f4d10cc995c3c5052dcacfa8824027454be423de12359dc1,2023-11-07T04:16:09.273000
@ -227587,7 +227587,7 @@ CVE-2023-36670,0,0,cdeffc453c289674efaf8d400d99bacb5d90dafa830d78a7b4110d79be2ee
CVE-2023-36671,0,0,7ba2cbd36cf494003f31e9f8061c34f283054b4a843133a6b3a5558202190f37,2023-10-31T09:15:08.210000
CVE-2023-36672,0,0,0b437c7f228042e22c4f8d314d930a5f7b09ede3e5cf22aa693cfc66240e4631,2023-10-31T09:15:08.277000
CVE-2023-36673,0,0,a12f7249f363726adad8b584d5dd5a49c39eb47b074fc8406f71b668e7664739,2023-10-31T09:15:08.337000
CVE-2023-36674,0,0,fe86697de9b18a95f92deb90589b41424edbd135f36d0c5658d0733faf8e2b7a,2023-11-07T04:16:41.150000
CVE-2023-36674,0,1,b8de70a8102b854de0fa5d92320e6318094f6978bf5be9e8435328a2af93e692,2024-10-08T15:35:09.850000
CVE-2023-36675,0,0,5c1bed2b433b860e794759988c06c2540aa0155cb90f88dce1df7acae30c9a95,2023-11-07T04:16:42.083000
CVE-2023-36676,0,0,4a9258f5e078288b069b3a1e582c048d74b4404fdc2a2003de0065aa04460858,2024-09-20T23:11:18.563000
CVE-2023-36677,0,0,447e129853788da008a3219fe85e6391cc9b944061e22512652e363c1bbae1f4,2024-09-05T20:35:08.677000
@ -228728,7 +228728,7 @@ CVE-2023-38128,0,0,26a0debb8cabffee8b8367649a58d878163ee71b554db80bfd63f3d4df285
CVE-2023-3813,0,0,04a01b3796549c657ab9aeb084e803f298cc5d0becbfee58f6abe65042e7d6a0,2023-11-07T04:19:44.197000
CVE-2023-38130,0,0,a4d937a40ab1906cc70a377b2965fb97adc8d21f6a7f14d60e6427d2863f3fc3,2023-11-22T00:06:35.717000
CVE-2023-38131,0,0,f92c1cb176fd142005f4dc8e0e46e473f799f5268800d2a119ca21923a92c65b,2023-11-17T04:12:48.530000
CVE-2023-38132,0,0,a963d356a1d4c22b8d32e98dfc6c17af6696e7bd25bd4d4e7cceaa32988844f2,2023-08-24T18:19:28.707000
CVE-2023-38132,0,1,2e29d7e4390895d75db8d14175ecf954c2b73938ed2c37d00fe12fa95aed044a,2024-10-08T15:35:11.083000
CVE-2023-38133,0,0,af06ef913649a6ee499e8e12b5e3cc4498907d0af745e1aa77e34a778995abf1,2024-01-05T14:15:47.027000
CVE-2023-38135,0,0,7749fcad167ae61d0a929abd3f0312ffd64f30caed31dcd80ffa2deee6ad5f51,2024-02-14T15:01:46.050000
CVE-2023-38136,0,0,554f39e979a0861d4175b39a9164da3690299a760aaac82981d94d1c4d3b2c13,2023-08-03T16:56:20.357000
@ -229156,7 +229156,7 @@ CVE-2023-38572,0,0,095f4a1650c1258d21d2bd89eff16cb949e92bd0db6699139bbfd64d38f58
CVE-2023-38573,0,0,9284613890955f35266f5a038af553d1c6518006d618e683173a669d5c7929c0,2023-12-01T20:52:57.627000
CVE-2023-38574,0,0,be1718a413780ef4a67153dccf5e742c8c6e2db9a93bba86e60b588a4cf3b3e9,2023-09-11T12:50:00.413000
CVE-2023-38575,0,0,a2a62c14b18d5d6e72e55dd2228218039fe03286a40fd85bc2093505775241ea,2024-05-04T16:15:15.077000
CVE-2023-38576,0,0,4995d408b725b98e4724b01c0557548d336084bf69fd1ce204bac0513df24b7e,2023-08-24T18:26:00.547000
CVE-2023-38576,0,1,b070d47cf8cdd2ea78bf642fd8fce449746b72146b572582bf95dde16d8aa325,2024-10-08T15:35:12.007000
CVE-2023-38579,0,0,35e0e7fa02a2c19a6dffba238690e8a535caae80c453960e8036a3c2a6e312aa,2024-02-13T21:56:17.013000
CVE-2023-3858,0,0,84a2a2ec597d7f802c1e46ca1be4abb1e9f4c7b542aaeb019150940619497334,2024-05-17T02:27:54.297000
CVE-2023-38580,0,0,03c40dd50e0cda15ee5026886f4afc199596d5811ca57ce883c4d5b436bfdef4,2023-08-03T13:56:23.460000
@ -229842,7 +229842,7 @@ CVE-2023-39440,0,0,6a2f84855caa69d956f5aa7ff3d81683e8055e06632176c19aacf42c40cf5
CVE-2023-39441,0,0,1524af4c21eae8180b90656f56e4a47c0f827b489d48bce7311f67eaeb7fc6cb,2023-08-29T15:48:57.633000
CVE-2023-39443,0,0,1a26c9a28c096baa05119ad2798651f43ab2b06c68ce772bef1bd6a634d5fb42,2024-04-09T21:15:15.770000
CVE-2023-39444,0,0,8b67b0a3f75b53fd0b4a8e0d327154f6629b9f5e5973540fb30aa61cc1ab9e84,2024-04-09T21:15:15.873000
CVE-2023-39445,0,0,983afe996d4f4439daa5563ceb5da3b9ad261dac1ed024189a46e0ea2271735f,2023-08-24T18:30:33
CVE-2023-39445,0,1,b59f8a538f9f341dffcf0fd44d7bdd5f3b126cc29fcfbea219260f08a757db96,2024-10-08T15:35:13.413000
CVE-2023-39446,0,0,6bec4c33fea1962dade9865606bfaa213fd3a72b8642609b288b9f925eadb0e6,2024-08-02T18:16:11.603000
CVE-2023-39447,0,0,a853582eae41440f4b71b9985cb4a254460904904aa413a4ec0a7a0872d32890,2023-10-16T18:40:24.253000
CVE-2023-39448,0,0,b0ddc370dc153673b546283e7efcf7187e96d3fe1f8753890834d7c84f026b0e,2023-09-08T16:48:17.617000
@ -230488,7 +230488,7 @@ CVE-2023-40309,0,0,1b0bc6771b82c947113ef68944a1650f468aef63818b03d82f35201b0306c
CVE-2023-40310,0,0,aafae91f872ed8196d989ce6f92724af64aa9c420d18d46f56352ee69e0632df,2023-10-11T19:10:10.253000
CVE-2023-40311,0,0,97ab1d90ac0eabc8fe9eefc1eb35bce10058e81ca86a8abc18ac988d8880435a,2023-08-23T17:04:28.627000
CVE-2023-40312,0,0,acc8e0b15b4384682b1bc786a01efe9878d67c6d102843423d8c8719fa2528cf,2023-08-23T16:58:38.697000
CVE-2023-40313,0,1,e0797fb9f65fc6658da2eaec771bfcf170ad45730c3cb448819ebb4c34bf7886,2024-10-08T13:35:02.093000
CVE-2023-40313,0,0,e0797fb9f65fc6658da2eaec771bfcf170ad45730c3cb448819ebb4c34bf7886,2024-10-08T13:35:02.093000
CVE-2023-40314,0,0,8d4dcdd53a1a6b1fb37d7ad52dde6c9c8bd82488990d2632bad071fa93704977,2023-11-25T02:16:16.133000
CVE-2023-40315,0,0,9fada42fe0828132cc9de13b1a9c76dd93e6e0a6f9e422b1c09c395999209520,2023-08-23T21:06:43.453000
CVE-2023-40328,0,0,e76364db84caf1c35c82da1c81afeac6be00ae8ef4c82886760486f8348151a8,2023-09-08T21:27:34.837000
@ -230785,7 +230785,7 @@ CVE-2023-40627,0,0,a8f4ecf528ac7602e6ec83be1a3322bfd2929fcb336490d206ea3415b1b34
CVE-2023-40628,0,0,b7c0784ac8cfc520a57db6d4f425b6ce0a963f06f0abc3d386c6241225c9cfbc,2023-12-18T20:00:24.987000
CVE-2023-40629,0,0,acc5397a1aed74aa7cf18af9e37e6cd0a5ef3b76ffa3dcbfbb7b588465cbd93f,2023-12-19T17:18:40.347000
CVE-2023-4063,0,0,e240d8049faf6302c5618010fd13e58245c8d0d673aeb1bcf039293265ece8ac,2024-03-22T19:02:10.300000
CVE-2023-40630,0,0,6b294e3a14db2ca465e2ea6fdf6968034edf6ef48d64aa7dc46a3ad78f35db81,2023-12-20T20:13:31.610000
CVE-2023-40630,0,1,a92de187dc59a9b6704a03d68819912986d9003e613622a363d5b1416b0d2bc4,2024-10-08T15:35:15.080000
CVE-2023-40631,0,0,3d031b89eb8571b9eeb31f193e36a2093f33e2855254a1a01f0ccddf675db18c,2023-10-11T17:30:22.077000
CVE-2023-40632,0,0,b0474c162759aa7d418b13f64497b8a457dda1b79fd59c9465ba9982a1ce9d41,2023-10-11T17:30:35.847000
CVE-2023-40633,0,0,31c3dacbaa20865297f1ac6a0e4fe3efafcb5ef217123e42578d149a31927c3c,2023-10-11T17:30:45.107000
@ -230988,7 +230988,7 @@ CVE-2023-40915,0,0,924135b83c37dfb32e8e4a8213481ae4ff212f967d627d3fbc626bff3fc54
CVE-2023-40918,0,0,fc090dba4a7f04d782d401de76c13cc5fa72b866aa75e7bf2cda17b838246fd5,2023-09-08T14:26:06.590000
CVE-2023-4092,0,0,5f31fed2eab5b0f348baf91fdb36ca5a5c02cd3313e242f154778e0217ad366a,2023-09-21T13:13:44.877000
CVE-2023-40920,0,0,ed4cd416951d4081f8432a4ebfdf927305fcbacbdf0df8dc7ce85070cee84b58,2024-09-19T21:35:03.493000
CVE-2023-40921,0,0,2b146a84f7ce0a5839ef49947387f7f6957f6be4863120e88ced540c04ee7150,2023-12-18T19:31:35.590000
CVE-2023-40921,0,1,5edab77be34d83ed8db9dba9d8630a0837428f9332ac7f069718b4e13b170c03,2024-10-08T15:35:15.913000
CVE-2023-40922,0,0,dd40a0a468b1bd7ff4b99edc96361008b5a99f036dabadf2e5b4d99cea0eb8d8,2023-11-13T19:34:31.343000
CVE-2023-40923,0,0,60ed4f36513d088660a805b25e6ab52170a4dea6e1ff217b52fd7d05d000a9e3,2023-11-21T02:28:24.897000
CVE-2023-40924,0,0,15937ffb272841fdc72d363c3e397712755babe13146b87d826bc9a5ff106fc3,2023-09-19T13:47:13.017000
@ -231968,7 +231968,7 @@ CVE-2023-4217,0,0,3b66e4c2db95e463abc0913bf8cff4560b7a5e48b1cf7e8e52cd797b0c5d83
CVE-2023-42178,0,0,344a598e076c834e23b6be3cc32b4131760070e66f3b068a6c5956c5e566d8d5,2023-09-19T02:11:38.890000
CVE-2023-4218,0,0,6e4902ceddd34ec7c6848eb210276af9251afa467329d21a0e3f3fa2b8fa129c,2023-11-24T18:25:48.900000
CVE-2023-42180,0,0,cf0c1c802225bb6346a28aa702c60a5aafe9fa0a2230952f947c846a310d0d19,2023-09-19T17:09:40.980000
CVE-2023-42183,0,0,dc005f121074d120e9deb82ab8478d6df6ead9bf9a5911fdf2d87c6748137007,2023-12-28T18:11:09.047000
CVE-2023-42183,0,1,a1133a066130689693857f816b38cf3c17525657b8faccef176eb95854765a74,2024-10-08T15:35:17.213000
CVE-2023-42188,0,0,77a2cbfaf3adf1178e78d13dc96d6ab39ad9829f805e561026314dd6cf6d9430,2023-11-03T20:34:28.027000
CVE-2023-42189,0,0,779bf22e6a73fc0c2318d23fd00b794d65764c35af72ecd70d35c2b37346a139,2024-02-15T19:44:54.227000
CVE-2023-4219,0,0,7d233cb52a89b518b4279b7545fd0ebb9fec39343ac53656ad8f59df23239851,2024-05-17T02:31:26.743000
@ -233621,7 +233621,7 @@ CVE-2023-4469,0,0,7580644e4adfe189476d806108af5a3a910709ef63727c942853da5dad8cbb
CVE-2023-44690,0,0,c6a2a8257d63a863717f767bbac6f983a285710a356a275ddde04031975cd054,2023-10-25T20:32:47.147000
CVE-2023-44693,0,0,0429f874de4bfe4a92bb74269a073df9f4bbf6a3e382be7b3d453594995bc411,2023-10-20T18:10:26.627000
CVE-2023-44694,0,0,4c0cf01795a61c2ae0628e96bbe22380b35ad54b81a65ce76288c76555daf4ad,2023-10-20T18:10:35.700000
CVE-2023-44709,0,0,85cfa2c2c7dfbc0ce407ae8000258b3aeb16aefea9eb1548b8fa1a593a06c21c,2023-12-19T19:09:19.230000
CVE-2023-44709,0,1,7494efa9e0ff76458caf57b5966ffad110637477a5c3f1f74ad1afd6175370ff,2024-10-08T15:35:18.137000
CVE-2023-4471,0,0,44264d3ae1f44a8ba1b89c5d364bdb2eedffe35ceec2ae2a74f33989f8b286a6,2023-11-07T04:22:39.037000
CVE-2023-4472,0,0,8e88bd547863dd848f5545bc9daf80599ec09c97ee2a919d4d237de27d94293b,2024-02-09T19:49:05.873000
CVE-2023-4473,0,0,7f9dac7cb04a96fc565d97c99667ee1eda825fe5e34fa387501c3331bef9d669,2023-12-06T02:15:07.063000
@ -235604,7 +235604,7 @@ CVE-2023-47574,0,0,e5b2817b9b7b7265cc255b353956c50f5dc2587dfe440d88621c1a1cad897
CVE-2023-47575,0,0,30cf6be65abd61448a4a89a9b72de85e929953eb93306b378cfacaff6d87cbd7,2023-12-18T15:01:02.337000
CVE-2023-47576,0,0,b658502efe54d9b05c4f426be235a8b40d293e00fdab9f01c40b60b57e7ef3f8,2023-12-18T15:01:53.273000
CVE-2023-47577,0,0,c0f13ddb15e49455530054095cc0266851552b5d13fc042a223643cd9df0b789,2023-12-18T15:08:42.737000
CVE-2023-47578,0,0,8bf0aae804a5d895a13b8eaa8706ff025054dd6e316ca1b2834837b692a8f7bf,2023-12-18T15:09:42.753000
CVE-2023-47578,0,1,ef045d13e95e2c586f03051aacd5aeca98b41994adacf8297fc253108079f65f,2024-10-08T15:35:19.093000
CVE-2023-47579,0,0,0bc8ca0bdf2b7d7cbafb94bed8df43d5e20d7b33eda5789e01e7640552057e07,2024-08-28T15:35:05.660000
CVE-2023-4758,0,0,713db879644d26febfa528fa3b5a32eaa4d032e64a180d47e3477adfad42aa0a,2023-09-06T20:43:43.440000
CVE-2023-47580,0,0,1046d1b7ec521db48bb6fc1bed5767243c03c220591fb511a40a277d8666b4e6,2024-08-14T19:35:12.147000
@ -236075,7 +236075,7 @@ CVE-2023-48321,0,0,cfbb4818ad6df672bab7d7e079b5f53bf4c70443bd68d2f959ac12a2b28ce
CVE-2023-48322,0,0,d697053dee5a62a4985e1c575006e608f81298f9ea415a03ec908284cb682343,2023-12-05T19:22:49.677000
CVE-2023-48323,0,0,f3bfa524105a4fe1f1a60eb78ec6b0abb2981c140d32cd78522bfaef7358b997,2023-12-05T02:00:16.967000
CVE-2023-48325,0,0,5c23307afeaae88101ea85b31af8160ba0baebf4185700367a0030ed7db41498,2023-12-12T16:53:19.390000
CVE-2023-48326,0,0,22b84f0db892c08d52791404d12dd97d1447eaf265300674663d7684143c8bf9,2023-12-05T19:22:14.360000
CVE-2023-48326,0,1,ddc48aaf4613e82cca9ce4631b4ce91dedb3cbb121d77b466253590f26d72d69,2024-10-08T14:03:10.323000
CVE-2023-48327,0,0,e1b7d84c4255656c26577b42d70dec092c2127828ef97a70d26a6f2c54364053,2023-12-29T17:05:45.677000
CVE-2023-48328,0,0,8b8f393babf03820a7f30b8e4ee8c681809dfee4dd512b2d8b5f39c4a890f24b,2023-12-06T00:38:56.337000
CVE-2023-48329,0,0,829f9d24c66826bd90c1bd5cf166c3fea561640c6f611de05ce042bc02eefe94,2023-12-05T19:20:15.773000
@ -237683,7 +237683,7 @@ CVE-2023-50550,0,0,44e430b08e9975570f62c119d5c2a1a9a495fe727df7e6498a46393b98888
CVE-2023-50559,0,0,de447039cb5266aa717edc27eb1977ed0e846e77da68daebf06cfa36fc2df160,2024-01-05T23:14:41.273000
CVE-2023-5056,0,0,da6a6df64835f811e5d1998175c8d1df0fa5120b5f35b95bf3cb2069a9a955f4,2023-12-29T18:14:30.437000
CVE-2023-50563,0,0,c0949a7803a78e6bdccaf158722f9f5ef648f63b62a2f9b2dd07b712d53ac4d3,2023-12-18T19:50:04.110000
CVE-2023-50564,0,0,2fe33553a67c53bffc26ebb1380252caf59e7ec42cbd1de7316ceef8418b3856,2023-12-18T19:49:40.313000
CVE-2023-50564,0,1,723ab5777fb8d734bbf67cf6e3d710b0738433e6b348c6da86fbe4cb9a506928,2024-10-08T15:35:20.180000
CVE-2023-50565,0,0,029c18972243cdbeacdccb769910b874abc335ae45d5bfdaa56bc3ad4e17c907,2023-12-18T19:48:40
CVE-2023-50566,0,0,7200a7f7a9f3c342ab6eaac55fd785cd40074045d8cf9ea9ee9abf54685ef508,2023-12-27T19:33:05.677000
CVE-2023-50569,0,0,867c7b6348a088e402df901906c79c1e617d0d1056d26bbddc129bdd3fdf5a3c,2024-08-15T16:15:17.360000
@ -237769,7 +237769,7 @@ CVE-2023-50762,0,0,1f6280ecb5466998c2de88fdbd8269fa769331b5a5d1fdcd8e4c176d77703
CVE-2023-50763,0,0,ea8513ed901de013d34cf1152079c5f96667271ee4bac811154720a2f5cbde61,2024-06-11T13:54:12.057000
CVE-2023-50764,0,0,5c47d6239f3ced10df17d0dbb613a1877aa35c1dd18d2c265853c86f904c20ca,2023-12-18T18:27:13.043000
CVE-2023-50765,0,0,a972b3d422aa9e361600a49239f723e7fc28e6e3a49d701a8de2e98224fed5a7,2023-12-18T18:22:39.187000
CVE-2023-50766,0,0,e17724b5fd94a06b700d30628021b2af9b0a38d92d904a8023202e456b862ef0,2023-12-18T18:20:37.413000
CVE-2023-50766,0,1,f12901d6a76f7ceb3303ec35502f314336720d093c7646885e024afae35aa141,2024-10-08T15:35:21.173000
CVE-2023-50767,0,0,12c0bb735e4804a7f62ba2fd19ac33e875fc23a26bfed4495a69935746a1a8bc,2023-12-18T18:19:52.590000
CVE-2023-50768,0,0,a14ce2c566268d7795db7864005ac678e5f82247de8caf997643b04b287d74c1,2023-12-18T18:18:11.293000
CVE-2023-50769,0,0,173e2fc8312f1862b75291d0be8a26f7f7ec0cdf4bef05369468b3a9c1eea401,2023-12-18T18:17:24.077000
@ -239464,7 +239464,7 @@ CVE-2023-52916,0,0,bebcac5d0a36cd875bff11f8b42fd7bc5076a3c1c94e9b8c44be74509c12a
CVE-2023-5292,0,0,214d7ae5654e29ed0e372211abf39e379cdbd830eab553609e162ffb791fd787,2023-11-07T04:23:48.910000
CVE-2023-5293,0,0,37b5570c94c226fac17bbeba13451e285dd87937cebf55577645a70e3fbcf851,2024-05-17T02:32:58.843000
CVE-2023-5294,0,0,91871d88408d7e2bcaad4b05fb484ac2315248d3665cd88ba6ae47f2da8d5f16,2024-05-17T02:32:58.950000
CVE-2023-52946,0,0,20e045551a05525bd02d771d699e1c8ac48012af353f0f8ecae8c441edb3d8bd,2024-09-26T13:32:02.803000
CVE-2023-52946,0,1,43d8c575418a7f78a11e9526af607aac1baa72cf0563b1f4b331156f6ceab810,2024-10-08T15:55:07.543000
CVE-2023-52947,0,0,63d645c926faea55b9fdad340f3f464b9fdc9faedf4a6e963e4826e43b2cd432,2024-10-02T15:26:28.213000
CVE-2023-52948,0,0,f79919aed1747abb868b7504103d5ade0b888b12580c06d7084afbaa6db543f5,2024-10-02T15:26:30.160000
CVE-2023-52949,0,0,57e7b479eb0b4cd4da85e5578fdc01b85634bb050edda133619d47c1369d88c5,2024-10-02T15:26:32.077000
@ -240732,7 +240732,7 @@ CVE-2023-6697,0,0,12c273f1379c4db348aacab8ec27f123afa97fabdba674ad7bddd52c916085
CVE-2023-6699,0,0,4a8624b4b6ea31b8237e0eb30e2c836ee2648ac75d07c3c9236303c77756ccbc,2024-01-17T00:02:15.700000
CVE-2023-6700,0,0,f0219c5bfda6880f7a4b7dfd99547dcb7d3f941c1a23751cf1548d4fdf181ac9,2024-02-09T16:38:05.687000
CVE-2023-6701,0,0,e7b9da218402eb475c88893181134a1075091971f38b27717010b5f52631c905,2024-02-09T17:08:07.160000
CVE-2023-6702,0,0,9b9fb88788ff06a5081113f676d923d5aa30da5701cd1996f3e947173d3834dd,2024-01-31T17:15:26.693000
CVE-2023-6702,0,1,6bf675bd4a37853b89b1aeb12421ec3df28608d32412ac4aac16f28bbf7aafa5,2024-10-08T15:35:22.107000
CVE-2023-6703,0,0,2c84ff0729cfb6e8075930d8c84b6489bd81b1e94481e1ea921218b795abe78e,2024-01-31T17:15:27.123000
CVE-2023-6704,0,0,e9d4a9e8bc4460346c077611a0951d8e678776d3d70b8711ff361cf57741f314,2024-01-31T17:15:27.477000
CVE-2023-6705,0,0,cc96fda9cfa36906542c74189dd45f7ff7ce84800173cd0f06e50e437fe77a01,2024-01-31T17:15:27.870000
@ -243297,7 +243297,7 @@ CVE-2024-20360,0,0,b9376885f3bd33f8b376cfcd9d1a4c2997937c1a075603d8638d862812d3e
CVE-2024-20361,0,0,8fc8c6bd1287a52550fd38650e66a5006a20e7eae1aa8f8c99b728af1c48ddd5,2024-05-22T18:59:20.240000
CVE-2024-20362,0,0,0fe85dbbc396fc356835f570820efb6142358d26355d59753469b06ab8b1d26f,2024-04-03T17:24:18.150000
CVE-2024-20363,0,0,fd62098992468346229d2c9f8f88c3a0bdc7312cacd90d8bf7a2b7925976c048,2024-07-03T01:46:06.070000
CVE-2024-20365,0,0,807a30df40cd0d1707a3b8cc25dcaca25514941c759fac262bb9aeaaf958906e,2024-10-04T13:50:43.727000
CVE-2024-20365,0,1,b941e81c62a5622fb3207cd284578983abbf20cf62d6c3be738ab76890047c8c,2024-10-08T14:28:42.727000
CVE-2024-20366,0,0,ce7e4ab0363f4b2934fc27a08480c4ec05827340dd08325d4de96e54b996f48f,2024-05-15T18:35:11.453000
CVE-2024-20367,0,0,0d59cd325b5448a23ac62ba4d011225bdec20c6d4a20e9044f14a66801d9654b,2024-04-03T17:24:18.150000
CVE-2024-20368,0,0,11ba77e6ca928b43fcf33bd9b64c67655ca382b15bfec85a328bbca787a43cf3,2024-04-03T17:24:18.150000
@ -243309,13 +243309,13 @@ CVE-2024-2038,0,0,84783e34583c406994ceb062343516951516f0b07f0d721026ee845e3108d0
CVE-2024-20380,0,0,ed7ad99e229e06574506624c01ede2d6fb857cd8a1e722ec6a335ed1ef4a76e1,2024-04-19T13:10:25.637000
CVE-2024-20381,0,0,464812231d2b2817edfcae33ccc382745503263af9ca1893bfbdb856a7d08246,2024-09-25T17:15:15.240000
CVE-2024-20383,0,0,3adbaddaf4554eb7166804e65fe9fdbf83fea813b82dd738821e310951cf1618,2024-05-15T19:15:07.900000
CVE-2024-20385,0,0,ac34eca4134e041b362acdb109c604ab9bd907ddd4e704a49dd876f99e05859d,2024-10-04T13:50:43.727000
CVE-2024-20385,0,1,acb41bb9b0e8de27149b5546043f469887d2173135754c6ef5f9970c450eec9d,2024-10-08T14:22:34.120000
CVE-2024-20389,0,0,160949b8c6cf6fc5f7f18a2471e2354fcd0f701247dfba3a85f25095732dcffa,2024-05-16T15:44:44.683000
CVE-2024-2039,0,0,0fb3eb6d9df1cb8dd04206e4fde20555dc794b24595aa985157932f2a933450d,2024-04-10T13:23:38.787000
CVE-2024-20390,0,0,7596f8a252957b7a86b18b13b44a3f994e7e9bd3a3934d5a22e0cf6b5c4165f3,2024-10-07T17:51:37.197000
CVE-2024-20391,0,0,901fcf36cebee039d4f38edb4044ef84c4f44829a18fc236320c17fd1b5f7286,2024-05-15T18:35:11.453000
CVE-2024-20392,0,0,94a9ebb2bcbc95d69522cf1a691e2eef5f012e7892caae86240bb4af40e4b8c2,2024-05-15T18:35:11.453000
CVE-2024-20393,0,0,ae5fc493814f778185cb18ed4bcd9507eb86d2da5d4a9af0c4d58f8e26b306d5,2024-10-04T13:50:43.727000
CVE-2024-20393,0,1,56f0c590f5a1758c31f0f3dee030b0ef35919d5814194a1fa7e6d81db08805c8,2024-10-08T14:37:39.713000
CVE-2024-20394,0,0,ef9256f36e7609b8b050262ee885b4f4c47119c80c5a1a8288a0a5eef0d4f23d,2024-05-15T18:35:11.453000
CVE-2024-20395,0,0,28ce7d382757f62de6c6fa8be8ab2c7d5b7fe481f67f112d437fdc5648f5ed0d,2024-07-18T12:28:43.707000
CVE-2024-20396,0,0,ab24e73adad18da7437bdd92525b27eaf5bf0f1df88229897bcf01b790a24b3d,2024-07-18T12:28:43.707000
@ -243338,23 +243338,23 @@ CVE-2024-2042,0,0,148bfce3b5f48e2144e9167826ed5f6f120e539bf15296a435b2ce580e8b1f
CVE-2024-20429,0,0,f467ae3dedce5a1f38518317999bbc8fc79bc2960eb95679505ee1fcb992ae20,2024-07-18T12:28:43.707000
CVE-2024-2043,0,0,7a3896d230f6f1ae602a08f92e2eaaa644b5893021849dee8a675eb9b7c81e88,2024-05-02T18:00:37.360000
CVE-2024-20430,0,0,10fa05ef1e262e03d3ec6f9856a4fd60e476d60000f282e33b3976f1a0227974,2024-09-18T18:56:05.510000
CVE-2024-20432,0,0,e6fd2ccdec3413ba7d0454aacac5a373aff82e8d4e95305d73c6d014c9c95234,2024-10-04T13:50:43.727000
CVE-2024-20432,0,1,7fd746c387447b9ece17aaab52e949ef84dfd8dfcd9de8216b6df6b205f1574f,2024-10-08T14:10:35.317000
CVE-2024-20433,0,0,5e566651815d3cb842d80bb54328b0e8280ee578655d8a254f288aa4418bce20,2024-10-03T13:34:37.547000
CVE-2024-20434,0,0,0cb17e35dccf65c93ef1b906404233c0df16e7c48c45f3c6354901aff0f73ccd,2024-09-26T13:32:02.803000
CVE-2024-20435,0,0,bea0a896db86de220514ce1618de53b05523503910f680b3361f4c8bb8734dd9,2024-07-18T12:28:43.707000
CVE-2024-20436,0,0,3c7df02e33d61650d38d57d2c6990631b27a955f7a69744385ef6542a639f024,2024-09-26T13:32:02.803000
CVE-2024-20437,0,0,3588a74a4857b2b89502e176f099e98223e6ee3f1fc87f57deb9e52b3c2e63bf,2024-09-26T13:32:02.803000
CVE-2024-20438,0,1,a9dc208e682d6b275639ddea51e6d0791542b6ddcec3dc7b8e7fc31fc89eece9,2024-10-08T13:54:46.450000
CVE-2024-20438,0,0,a9dc208e682d6b275639ddea51e6d0791542b6ddcec3dc7b8e7fc31fc89eece9,2024-10-08T13:54:46.450000
CVE-2024-20439,0,0,d6b5bcbae917ca310708f2b3bf5f6e48a7ee01ce537e933ecbd837bca81ceec5,2024-09-13T19:35:32.477000
CVE-2024-2044,0,0,20580816ecbcb2d456bf5030911ad2dbba893322604e54631bb30d65d5e1ff74,2024-08-01T13:49:39.293000
CVE-2024-20440,0,0,c9c53dc5c2cee258d8848cdc1782766d626f4ac361af7ec1e658341d1dc604f2,2024-09-19T13:42:41.017000
CVE-2024-20441,0,1,d55f8099b608b8adfd1a6d0d43acd3f45d687b76b8525513869a95df6ac3c297,2024-10-08T13:45:07.300000
CVE-2024-20441,0,0,d55f8099b608b8adfd1a6d0d43acd3f45d687b76b8525513869a95df6ac3c297,2024-10-08T13:45:07.300000
CVE-2024-20442,0,0,805aefb18c510621a81c52eaa48c4a81152e7d64b4a9afb06dafc5cccb2f219c,2024-10-07T20:11:48.687000
CVE-2024-20443,0,0,272afbe0465f6648950651b716899dcfcb722318ac954aaaf0e63544fb83de9e,2024-08-23T15:18:06.347000
CVE-2024-20444,0,0,3f42239b351772ea690503f050be631b7fcc8fc87f9213fb75edbbb0d9dd8dbd,2024-10-04T13:50:43.727000
CVE-2024-20444,0,1,a12fb2570a5698911d0cc6e07bb095dabf95fbf72a3c4e45b591e21f1703dac8,2024-10-08T15:26:38.527000
CVE-2024-20446,0,0,e9357eb0aa4f61946fea3c9e67283cca574773e1e525326f07a38ede4840249f,2024-08-29T13:25:27.537000
CVE-2024-20448,0,0,75dcea547794c5d1571fb02d5435e00fd51b5cbc567d093ecb9d8c52cd81ba90,2024-10-04T13:50:43.727000
CVE-2024-20449,0,0,d7cbb0ac1742a840b6ac7ab61fbf513feaf09cce790ccbc78621f2cf5a1ae460,2024-10-04T13:50:43.727000
CVE-2024-20448,0,1,565fdf482c77d5556490294526189aac22203bda3136e1e644d46324e48508c6,2024-10-08T15:25:47.053000
CVE-2024-20449,0,1,316480c4331efb1b0699079802002acf63f93477d88f4712b7f6bca9f927ba75,2024-10-08T15:33:29.210000
CVE-2024-2045,0,0,711ac9453656184dc732c4f4633f4f7bda646ec847d7f0c1c60c568976f58aa0,2024-03-01T14:04:26.010000
CVE-2024-20450,0,0,a40597aa01c7c808e6329a0cff711d7709db0a15729885e98911c863c6fe701c,2024-08-23T18:14:43.787000
CVE-2024-20451,0,0,616ab4cb2b50cee49c462941d4d3e48792a6a3c09b725bd97a134b2f4a53bec9,2024-08-23T18:14:11.137000
@ -243379,8 +243379,8 @@ CVE-2024-20486,0,0,1ec7a6c2a991b67e11827b3b316fed30b5b5340988b303f9088e0f10e2e89
CVE-2024-20488,0,0,b3c319abc05ee7d52fc498f08ba4c2d91fe7b6f1527a7957b5c4a113170ee559,2024-09-06T17:18:11.813000
CVE-2024-20489,0,0,d68cce5506ad42f67e500e952ef8846db91b43a7e51bd083fc776681145c15d8,2024-10-03T01:40:11.637000
CVE-2024-2049,0,0,398a9eaf0287296877598afba029844504bbde28a3270479d8cbbb594cc11b40,2024-03-12T16:02:33.900000
CVE-2024-20490,0,0,a4ef2b3994fbd0df05bb314a8570e6c1fa7d03ec66193c21272d8756b7d8fc77,2024-10-04T13:50:43.727000
CVE-2024-20491,0,0,2a897c5ead85c8a19f222b2ca09b5d1c92535360c3f94139fb41d677ce37f4ff,2024-10-04T13:50:43.727000
CVE-2024-20490,0,1,35fe5d8ca4a68248677c43c34084b321931d0d2945ab4df4da8782f5e23eb605,2024-10-08T15:15:39.160000
CVE-2024-20491,0,1,a6a1b451f6dda658d800035b80719f5bd0d6502321ff1f094bbee2194c64d03b,2024-10-08T15:55:08.933000
CVE-2024-20492,0,0,3f9685b0b1be7777a7f6564fba92e81c4939ec6ce44efaf33ca23f14213d7a2e,2024-10-04T13:50:43.727000
CVE-2024-20496,0,0,f5b0a0efe19b6b0db008e04fb71a9ea99e46afaadc250932e3e257a3123133bb,2024-09-26T13:32:02.803000
CVE-2024-20497,0,0,422eb4ecec5d7dd92ef5d49505af3bc2f0e220b53f5fa76471b6dd3d460b94cb,2024-09-05T12:53:21.110000
@ -243399,16 +243399,16 @@ CVE-2024-2051,0,0,7b283f8057b783b668166a17f1e1ff3c63b74d0e0fa3f6b8acdcd7e3ce5a09
CVE-2024-20510,0,0,6fbdd0fde11e7a17f48951ee8a4206d5b5c8d1dcebb95035b098d9f8dc980dca,2024-10-03T14:52:22.627000
CVE-2024-20513,0,0,74f5044a10c6af04d90e400086824cc149d8a5254bc476b504929f4525101c4e,2024-10-04T13:50:43.727000
CVE-2024-20515,0,0,8a62e6fc2239e2194580ca9bf583d26f95de684e4e5664da5cf57f3e5dce8559,2024-10-04T13:50:43.727000
CVE-2024-20516,0,1,38173375d3e97a2ca4a3ada633aa8363dffa90658c88f70a1b4706a56888fef7,2024-10-08T13:44:10.840000
CVE-2024-20517,0,1,e16ec70f044330107de46d11fc56880c1e349bbc113ae734e245e91f648488a8,2024-10-08T13:47:52.483000
CVE-2024-20518,0,1,8e8380063b7bae86a06b52e48e7b616d3efda15d98a84f667c17186639d1ad43,2024-10-08T13:50:14.730000
CVE-2024-20519,0,1,30dade602bbeeea204e6e5cebf39404ee2ebdd7e5a8f94fc74e259c9f32bcd88,2024-10-08T13:50:35.507000
CVE-2024-20516,0,0,38173375d3e97a2ca4a3ada633aa8363dffa90658c88f70a1b4706a56888fef7,2024-10-08T13:44:10.840000
CVE-2024-20517,0,0,e16ec70f044330107de46d11fc56880c1e349bbc113ae734e245e91f648488a8,2024-10-08T13:47:52.483000
CVE-2024-20518,0,0,8e8380063b7bae86a06b52e48e7b616d3efda15d98a84f667c17186639d1ad43,2024-10-08T13:50:14.730000
CVE-2024-20519,0,0,30dade602bbeeea204e6e5cebf39404ee2ebdd7e5a8f94fc74e259c9f32bcd88,2024-10-08T13:50:35.507000
CVE-2024-2052,0,0,b3dd7173b956ed9ab7dfaa381fa39b77e63aea1f604a72f8ac014b370895d6ab,2024-03-18T19:40:00.173000
CVE-2024-20520,0,1,005cc535be51bd15c4a288c137ad33d6eb70cf813b3854cbb5d3767c48d302c8,2024-10-08T13:50:48.337000
CVE-2024-20521,0,1,1256f22cccdc014ca7c6dcaf50cda0cfa20b26ee2ae968d316f808a9bafa04f6,2024-10-08T13:50:57.163000
CVE-2024-20522,0,1,4751fc0b46eb3f3442a4302d9aa0da06e525e7320f0f9f33ce2b1091dde97b23,2024-10-08T13:48:19.060000
CVE-2024-20523,0,1,c7bf45998c89086dd758eb4d3eeb25d63406d90c0a145566280d2888a4fab120,2024-10-08T13:48:29.500000
CVE-2024-20524,0,1,1ddae342fccf4faf6880cbe25cc035c1903428edec9e63909e1d89933e06b31e,2024-10-08T13:48:58.273000
CVE-2024-20520,0,0,005cc535be51bd15c4a288c137ad33d6eb70cf813b3854cbb5d3767c48d302c8,2024-10-08T13:50:48.337000
CVE-2024-20521,0,0,1256f22cccdc014ca7c6dcaf50cda0cfa20b26ee2ae968d316f808a9bafa04f6,2024-10-08T13:50:57.163000
CVE-2024-20522,0,0,4751fc0b46eb3f3442a4302d9aa0da06e525e7320f0f9f33ce2b1091dde97b23,2024-10-08T13:48:19.060000
CVE-2024-20523,0,0,c7bf45998c89086dd758eb4d3eeb25d63406d90c0a145566280d2888a4fab120,2024-10-08T13:48:29.500000
CVE-2024-20524,0,0,1ddae342fccf4faf6880cbe25cc035c1903428edec9e63909e1d89933e06b31e,2024-10-08T13:48:58.273000
CVE-2024-2053,0,0,0d41c4e474c0960eb5e2399ded25845c51347c47ec843b53809f61d1e3d8fe3e,2024-08-06T15:35:13.397000
CVE-2024-2054,0,0,5af7272a2140be959232b9c889b5facdacd3c4cf8342e14293010d7ec8d01b60,2024-08-05T20:35:09.723000
CVE-2024-2055,0,0,07b933beaff1c6c6636c1d85ffcd111ff83285195075526678d7cb747831ae01,2024-08-26T16:35:08.047000
@ -249429,7 +249429,7 @@ CVE-2024-28882,0,0,1c2deedb6322663ef74bf2fde692de72490de1c075113953e26f68fdd4a28
CVE-2024-28883,0,0,7608553831e95dbd64a1629b16235d631ce647c64db4d36e5f31f95004223611,2024-05-08T17:05:24.083000
CVE-2024-28886,0,0,c5e838328be71c5eb5c783cfb3d7b29e0393c19c1f2fbf543fbfcbc9ad011077,2024-07-03T01:51:54.130000
CVE-2024-28887,0,0,02788ece8fafa84414db815e90d6fbdcb64e36e799546da1d80bab49ab148ef2,2024-09-12T18:51:49.010000
CVE-2024-28888,0,0,46275f531e0638feef0602d7c1faa1755a5f8021b36e078a8dd5defc66af73b7,2024-10-04T13:50:43.727000
CVE-2024-28888,0,1,0ce7c4f34166b44c7b4d23f6df0c163925bca0768a3984a15ef4f99dab43af91,2024-10-08T14:14:55.637000
CVE-2024-28889,0,0,75e96a359aa914e62263deca001066e2c2cef2ce9a8bba57feb8d1aeb144a69f,2024-05-08T17:05:24.083000
CVE-2024-2889,0,0,28ef4975b1d9f79ab7d0703313acc039b0acfd9d3a75a1a425d92dbe5c73a986,2024-03-26T12:55:05.010000
CVE-2024-28890,0,0,75d08f12fbd468307e29dd7cbe4c7c3d5acf11ae18647e40fe18f61a37a2bd23,2024-07-03T01:51:54.973000
@ -252733,6 +252733,7 @@ CVE-2024-33498,0,0,4ba880f4da642b35a01b59acc526b8efa609f227ba180bef70cff2474457f
CVE-2024-33499,0,0,e1c6b22865cd9e8e386bae301b66bd9b73b37abc782106e33f7da12179559c10,2024-06-11T12:15:15.850000
CVE-2024-3350,0,0,73390a7fa244b3222b6af399a560b7e7938ab475c75bc9de2220d3279630acc8,2024-05-17T02:39:51.583000
CVE-2024-33500,0,0,951d86a0511934af03ca85b48f9110bb08038dc052f2625d3ab09642d8ba80a9,2024-06-11T13:54:12.057000
CVE-2024-33506,1,1,72b74996bfe2d45f9f7b275001eb973d1722cd3f9f0e9e3042ae3b21f6a8aa4a,2024-10-08T15:15:14.717000
CVE-2024-33508,0,0,d23a8b5401a28ba62ac0963d4eaed374c04d8dedc9f220c45a2db9dd2382c9ce,2024-09-20T19:48:06.197000
CVE-2024-33509,0,0,6b9621bd236ae3fb7e5746778fba5a74fec5e03470e8fd83d110500351f31c12,2024-09-09T17:06:37.737000
CVE-2024-3351,0,0,2d444d04a071c972bf019c9f444260881949f9b31576f665a6e90d6ec68f63c1,2024-05-17T02:39:51.683000
@ -257954,7 +257955,7 @@ CVE-2024-4116,0,0,6ee64e85b69f8f11f599040da371bf02d3a94742e1ecd0f467d9a48f262434
CVE-2024-41160,0,0,4405f1fa554ba7d9df44bc4bbb96ea93e068b229b76d85cd7934b300d79543d0,2024-09-09T12:21:53.383000
CVE-2024-41161,0,0,9b33361091df6923832caa53c78a9e46bbbedfd096d5512869c0f1eed0413824,2024-08-20T17:09:50.647000
CVE-2024-41162,0,0,e54fc1a9823f936d00354799974ba06adb4cc451d56f48d5711fb6c0d45b612e,2024-09-04T17:03:53.010000
CVE-2024-41163,0,0,bd90001e8871fa4f44e3acfa1594f5e80d7203dd2c1a86bfd9b09c10d0b945af,2024-10-04T13:50:43.727000
CVE-2024-41163,0,1,27e4d5214b7422b34fa104447f5b61de05cea94735fc481acd43b25292b276a1,2024-10-08T14:47:56.787000
CVE-2024-41164,0,0,c5521af658e92e64cee6bd40535b27065e46248fed1bc5e43067dc57eef0c4d6,2024-08-19T18:39:06.157000
CVE-2024-4117,0,0,439d2da59fd01a25f254df6698027149837f261eb1a16ba5752d7e62667d1bfc,2024-06-04T19:20:30.043000
CVE-2024-41170,0,0,817fea013dbb80aba74cedd999d41f457edab776da0940277c0a8d6917a3fea3,2024-09-10T12:09:50.377000
@ -258124,15 +258125,15 @@ CVE-2024-41583,0,0,1f005d1031fdcb8c9fbd4906210734632d6902f2542d73f974724022c9aa8
CVE-2024-41584,0,0,68b94596ec41fb07148f3ccd64f3f267bab10beb49b58cefc1308a96f8b6488a,2024-10-04T13:50:43.727000
CVE-2024-41585,0,0,eeea4c108dbb2dac54e81fd473e2f3e107b47c0414ed5a60775a9a2eb5295c17,2024-10-07T19:37:13.900000
CVE-2024-41586,0,0,837f69300649f91553628210cc544eb3742b53056d8761afc7c78beb5b8a3c63,2024-10-04T13:50:43.727000
CVE-2024-41587,0,0,3f6f27d86d0c6537ef26b946989ef901b7b5d9adb2a16b5639d51eed4e89227e,2024-10-07T16:16:13.173000
CVE-2024-41587,0,1,2117db0c5d43fb4969d619b3d399c1877698054ee611d4c38da346c9431235f9,2024-10-08T15:32:18.313000
CVE-2024-41588,0,0,d3171451841d54cc8701d78143ba90f1e69577d24f358df37b30520acd50c7ae,2024-10-07T19:37:15.063000
CVE-2024-41589,0,0,04f9923f1d234a8dd6e0bf13471b52d9382898606729d057bb8885e65bf1609d,2024-10-04T13:50:43.727000
CVE-2024-4159,0,0,72a4ec46db1a22f62474bfa22a14f37a28a6ceba3042de92b905fca6cc58c082,2024-04-25T23:15:47.087000
CVE-2024-41590,0,0,d9e01f1710ca2fb6ae50a41d8a8ab885b0163706b9348a2a519cd117acbe24d1,2024-10-07T19:37:16.150000
CVE-2024-41591,0,0,4dbb05a7e84a4f0b6b26e891988c700436ff9d20da9231a9e940c7951eba29c5,2024-10-04T13:50:43.727000
CVE-2024-41591,0,1,b601ac74fd37298e2fc5ed9a0bbbd65797d2e8f8115d8ad1b7cd224f9a1c6a69,2024-10-08T15:34:46.453000
CVE-2024-41592,0,0,f6de19b04cf0bb9aa23a631a0152acf3c16683ccba4ebd341bd77b629281497b,2024-10-04T13:50:43.727000
CVE-2024-41593,0,0,834069b217a0abcbd2f89bb720e1df043efdc6899dddaebb802b901a2a0f8bd5,2024-10-04T13:50:43.727000
CVE-2024-41594,0,0,9b5fd7e1403b47b2197ef5b185ba107f20f63b3a518370b523de2a20e86cdc81,2024-10-04T13:50:43.727000
CVE-2024-41593,0,1,a189f5d55756489fda0fc936cd73dd6693efd45f78ff053d92f5617bf449bc53,2024-10-08T15:35:04.583000
CVE-2024-41594,0,1,d9714c7600399689b54c6aedb499a5881aaf286dbf7c701ddb5d0df945056ef2,2024-10-08T15:31:47.907000
CVE-2024-41595,0,0,f4fa709962dab0c7305f9f36894e62c834649fae846a2fd438d736156c5061dc,2024-10-04T13:50:43.727000
CVE-2024-41596,0,0,07ef332ab0c1cc02af1af9479944d0586c6d5e720d06e9433d72b4111aba2578,2024-10-04T13:50:43.727000
CVE-2024-41597,0,0,7bc1c683ecc7754ef9a4accb42f1f9f659f54572a438343a1c4fabae2a9dfaf6,2024-08-01T13:58:54.793000
@ -258357,7 +258358,7 @@ CVE-2024-41915,0,0,79e27d81a466e27de33128fccf775ada519c090b73b4d198c18c4a0be866e
CVE-2024-41916,0,0,066c2f671cf06af6f38789b8644af442aa1cd06119863d905974296f8fe86611,2024-09-11T14:25:46.180000
CVE-2024-41918,0,0,444713f57f29ae6ab3503ccd6ce1c7bde4d2698bbfadab74cd1692649dedb241,2024-08-30T16:05:23.737000
CVE-2024-4192,0,0,0768e429bccaed861e82d220deefd437e5feb26a94e95c7a121626318970662c,2024-05-01T13:02:20.750000
CVE-2024-41922,0,0,edba3d4aabb4355ea70076456ae31be198517407ef727225e03d7c7157372cae,2024-10-04T13:50:43.727000
CVE-2024-41922,0,1,e74eafa8dae3435748ffca19fa95b96197b916af17ab6ca60fc1f7456a8ceeb3,2024-10-08T14:48:47.087000
CVE-2024-41924,0,0,06cc2d8c551d8fd39f4e2ff31447bb4070ddde2d992cf8f0c8cb1b0035280973,2024-08-01T13:59:15.743000
CVE-2024-41925,0,0,bfb2b8699763360b751a0b9d4cd96dc0b4b643c91e40e4714e322c144c6bed9a,2024-10-04T13:50:43.727000
CVE-2024-41926,0,0,d7564816d433232552fda23a5f10a79963d6c502f628c4841f8484c17aa4f54f,2024-09-04T16:55:35.570000
@ -258763,7 +258764,7 @@ CVE-2024-42411,0,0,3fcf900cd705b45045cb94d8edb3d48eeb6b58809490fd9c74760d8ca62aa
CVE-2024-42412,0,0,7ea410a30890f641de68bc8b7a39cf35396bac17868b4fd498b764e1359ef0b7,2024-09-03T14:55:58.757000
CVE-2024-42415,0,0,4839bf77179277d2cfa194bfc1f048a9b9d9e918e55805643fbe033d66c830d0,2024-10-04T13:50:43.727000
CVE-2024-42416,0,0,0c0ba6b9334c7e838b8d455f49871ca47f5d5630f34ccb39214f945ba545086b,2024-09-05T21:25:09.273000
CVE-2024-42417,0,0,e6462b50f5ebabb350e0c5859722ea14c65f85ac14cbefad99078d1f7b744deb,2024-10-04T13:50:43.727000
CVE-2024-42417,0,1,97db2e1cae78c6c5b15ff9e0f09e1c2fc00065af3496103746ac59f2d9475a69,2024-10-08T15:43:05.720000
CVE-2024-42418,0,0,1170a194d58fc93f3e0e1a535dff12de506530448528f0fff3eaea817d001f8b,2024-09-04T18:22:22.583000
CVE-2024-4242,0,0,9c58e9b9e77452c845f3c5179c3be4415982efd0430d3da14ab0345d444eccfb,2024-06-04T19:20:33.363000
CVE-2024-42423,0,0,d28867b0d8eebf1aff8bd3b42424cd5e577a7dd9340d9f0359d41e2fac4ef5ea,2024-09-20T19:42:20.417000
@ -259431,7 +259432,7 @@ CVE-2024-43693,0,0,86a2418e4d1748f5ff1d2c010cf8ecb2f43f15c3955c5a628ff84ac9fa94c
CVE-2024-43694,0,0,1f38ed43c98bb35b4ccdf138bc4e0fc802b17a5cb43658b2fe1564d43a70cd61,2024-10-07T19:40:04.147000
CVE-2024-43696,0,0,836cbdd93481f79b0376c146c7b443dbf891e4bf0fab15650f321deba707f358,2024-10-08T04:15:07.680000
CVE-2024-43697,0,0,e124d7e703440f5967c60e0f2f0a8b1b2278f58414864320362c8e94b9551b09,2024-10-08T04:15:07.913000
CVE-2024-43699,0,0,14b85c1a4eb2aa9f5fd810b399c7ef00695e4179167efc84645dfcab7d4547a4,2024-10-04T13:50:43.727000
CVE-2024-43699,0,1,78534d33d290678062dddcdfe24e803feecb99e21dbcb3ac97f746608e5c52e4,2024-10-08T15:44:29.183000
CVE-2024-4370,0,0,3c1f5b342c087fc6587c8bc9012541b58d80e50fdee9d14eea44daecdec82901,2024-05-15T16:40:19.330000
CVE-2024-43700,0,0,7d9ad3bdf541499d627305e5fd2f4d5ebf1292f98ea79760d8a63eda3d4aed15,2024-09-06T22:52:41.727000
CVE-2024-4371,0,0,a0b0e0fb8c98057b2328743d7da5c32e9a585001a67e08f1632ceab0df487dfa,2024-07-15T16:42:39.107000
@ -259466,7 +259467,7 @@ CVE-2024-43791,0,0,2bd2bc46ca8d9e06de5a015638de614e582ba6d4dc15a542dfa7ce0b054d1
CVE-2024-43792,0,0,5dfd532d611c334ef7463fb3ed0a1e3a14dcc1ccfb2dfd854fb0c34158bf7c9e,2024-09-16T16:26:18.063000
CVE-2024-43793,0,0,28f7d2c5a02a2888bcaeed49e9492d6763c121916beec115ab73cecaf6424a4a,2024-09-16T16:28:45.233000
CVE-2024-43794,0,0,012282e0e09ace65c9817dd3efc52ee0130360e07c8e8e9b08cf3adc91c29f00,2024-08-23T18:46:31.730000
CVE-2024-43795,0,0,bc6df37910f5fc808f1ee7891a9f26ba61c99bc347e0f4e8a5624732b69262a5,2024-10-04T13:50:43.727000
CVE-2024-43795,0,1,7be53d0aea9a821ac901ee206df09b530ade8b5a6941bca83727a0eababcf814,2024-10-08T14:01:16.883000
CVE-2024-43796,0,0,7eab0f98e9cc4b529e67976e2e3e5108a50bbe0663aaa9206477dd6bf141453b,2024-09-20T16:07:47.997000
CVE-2024-43797,0,0,93bf50c44e46a55d09c378845b20b036c0751fae29a6426402d2fc53d3595af8,2024-09-13T19:49:33.803000
CVE-2024-43798,0,0,0f4c51b4b2459096a21f79a4c43df1119a11b4e9a3f2bc6fda3ce5410f7de574,2024-08-27T13:01:37.913000
@ -260280,6 +260281,7 @@ CVE-2024-45321,0,0,385b3d1e3bf54e8ae2af5d5796ef0b1ffaf17d58c18e0fbe7542c0dcea09b
CVE-2024-45323,0,0,c7408403154d2d18fc914b88a9df254c03b0863b353ec16a1e5cdd4039b8f75b,2024-09-20T16:23:51.397000
CVE-2024-45327,0,0,34cd0fc64fb19ec545d442f8caf6da026f7560c6302dd0f3b1f687d00148ed60,2024-09-11T16:26:11.920000
CVE-2024-4533,0,0,aca3a412ead1ce1343d6f498450801be5e059db6302d74881039b5fe75fb6c09,2024-05-28T12:39:28.377000
CVE-2024-45330,1,1,6b509b82c72aeb53d4058cf040cfa8f4a1daa414ee8b4544b7dbe85ebddc83f7,2024-10-08T15:15:15.010000
CVE-2024-4534,0,0,527a3127a7586bdf18d80cd2b5b17fe74ac5ed6a2aa4ee562148173cc1d9d3e9,2024-08-09T19:35:09.923000
CVE-2024-45346,0,0,2f7f906fa8e830e09f5dc1994b30102df77aeab36a86b7c31755a212ce377dbe,2024-08-29T03:15:05.247000
CVE-2024-45348,0,0,f8397568e636cad274a96a56fcdbc01af3feb6775d5986faa9442985588b0658,2024-09-26T13:32:55.343000
@ -260529,14 +260531,15 @@ CVE-2024-4587,0,0,ccb551f2bab92e34c98709c8a5231b1e8778dd90f0d16bd4ac4c665438d47b
CVE-2024-45870,0,0,f92d175154659b1ccfde1cb7d2443c500aaf2564bba36f9202b2dbe5a7292031,2024-10-04T13:50:43.727000
CVE-2024-45871,0,0,728c8e6e25f852a5194b96b816339c6dea2f278495c76d4d9d6d904a9357f28f,2024-10-04T13:50:43.727000
CVE-2024-45872,0,0,8e87b92fe22bbef6284d58a5e62493b4717b48305cf479255ef9a674e1d360d9,2024-10-04T13:50:43.727000
CVE-2024-45873,0,0,bc738bab2e79f697a6dd355db39b2b57758a077402bca0f8748c4aecd153f0ce,2024-10-07T22:15:02.993000
CVE-2024-45874,0,0,a7d53e32c4b871847a525c7abaa581499a2db12000b12a00974d104c35cfd8f8,2024-10-07T22:15:03.077000
CVE-2024-45873,0,1,e0117a2bb2b64d2b34ea5d363eeffff9da792173a59d3c86c557ce95c4ed4cea,2024-10-08T14:35:03.647000
CVE-2024-45874,0,1,d4b19b90aa9b804fe8840615965a6df7afef07416e84bb9113973355b1bd8c7f,2024-10-08T14:35:04.530000
CVE-2024-4588,0,0,9198a141cbfd67d79271a90e0ce19e828dccb043a1ec84b18e696744e0f31db8,2024-06-04T19:20:43.163000
CVE-2024-45880,1,1,2caea1ecc913db5d4edcc53f7e6f558b8069e0ff24869808fba176320409f547,2024-10-08T15:15:15.217000
CVE-2024-4589,0,0,4328e8e6c3737b332b5624dfb7ea03e7812e5262794529580dcb4596fe3e40c9,2024-06-04T19:20:43.257000
CVE-2024-45894,0,0,cc1b0068c433f6523cffdce49c1faf5c71294267a8da0701d851750ddd0859a0,2024-10-07T19:15:09.980000
CVE-2024-4590,0,0,8ca402987898b35fa6dccf6a68bedf09dff404f8ccc3b30e4b5d3617c810458c,2024-06-04T19:20:43.350000
CVE-2024-4591,0,0,932b05f4c05f6cec282455aa1d3695481031502fa6f9d1dddbe95851cbcfc0be,2024-06-04T19:20:43.450000
CVE-2024-45919,0,0,8ef3cf9cc48c37b72663804f7aba21482cf48bedffbbcd23585452a8ab2aeac4,2024-10-07T21:15:18.083000
CVE-2024-45919,0,1,552b9322f64bef2610b09f931b72a22433f0955d738ffab82033309ab72bc0d0,2024-10-08T14:35:05.300000
CVE-2024-4592,0,0,14c53bd50ede1a956ff9d7a3d25f38fbc0411a373abc96f1d6d1bef77fb32c4e,2024-06-04T19:20:43.560000
CVE-2024-45920,0,0,ea56e67e89fba77fab53ce0c18965669797ee29dd0e8472343575caa10980571,2024-10-04T13:51:25.567000
CVE-2024-4593,0,0,94ecb7e459fb704ab815ca1814a0a7a4397cf6e067d30b0e365dc0bb2101508b,2024-06-20T20:15:19.237000
@ -261002,7 +261005,7 @@ CVE-2024-4696,0,0,b8ce6d89da084f88972905e9878372f109e48889eae7d9f95b30ecbbc63816
CVE-2024-4697,0,0,3bc62a9bb9952d026af8ecd13a98f81fa60290945109a2f6023ef384956822fe,2024-06-04T16:57:41.053000
CVE-2024-46970,0,0,6ef16041ee18068670ae3579af5d9c59d6c6488d479945d9220353b5e1ab4205,2024-09-20T13:23:29.700000
CVE-2024-46976,0,0,02f78d527d01c9aa774dc796f1ceed3fea7faea62af60e78d26c9cc8325cba03,2024-09-23T18:27:05.920000
CVE-2024-46977,0,0,473e5e0a27f525ecc713eba63c72ebcdd97f15efa3d205f1495c2cae8380c514,2024-10-04T13:50:43.727000
CVE-2024-46977,0,1,5fe07ded9851f376d26307ff56bac27430f6dca48e690a88893ad782618f46ca,2024-10-08T14:02:04.173000
CVE-2024-46978,0,0,3012612591065cdf72fb760bb9d34692ccfd8a93c66cdc7533522797108e3ef1,2024-09-20T12:30:17.483000
CVE-2024-46979,0,0,bd5b4b491d76f1da7f15e1f5aed6e68afd31ea61b239078722a0e41874b565fd,2024-09-20T12:30:17.483000
CVE-2024-4698,0,0,9dba1ffb097faf0537551ac7612916f547965c7b253baf1637388ba1ee83ae86,2024-05-20T13:00:34.807000
@ -261276,8 +261279,8 @@ CVE-2024-47611,0,0,0f71d2d3efa3e10b2943a85569330dc65bf1be2a06e9f4bba711a7ffd62c7
CVE-2024-47612,0,0,d7d4b9bef3eb832e4635f62133a590b34d92b314497901a1cf4e0bce3640a5d9,2024-10-04T13:50:43.727000
CVE-2024-47614,0,0,5fe3af92e23232b8b36de76214704cdba0d6642b9d9b0303d25099dae284db0c,2024-10-04T13:50:43.727000
CVE-2024-47616,0,0,858e2824018889ba67f8cabdb1c66da573f6d5732aaa656ab4224aec4de643a1,2024-10-04T13:50:43.727000
CVE-2024-47617,0,0,86d640c59908103a5e6bb243accef471e7407fdb3039dc5a22881f02e86320bc,2024-10-04T13:50:43.727000
CVE-2024-47618,0,0,78568952a6d2371c857ad34b0d08b273326e66993281d3a892d90ca4bdc21219,2024-10-04T13:50:43.727000
CVE-2024-47617,0,1,893202612bb2cbe992d30dda8f1578f8d9ef69378c0888fbaac381961f242589,2024-10-08T14:23:38.597000
CVE-2024-47618,0,1,68976b00387b110cbd1e20513b5a971bd128fd97cc106896c4afbee985714757,2024-10-08T14:31:08.180000
CVE-2024-47621,0,0,e8b43c6946cd89c946e6f0e8241753ff7dff16af1bee79786407ce0f97d0689b,2024-10-07T17:47:48.410000
CVE-2024-47622,0,0,2e8247e218d8e217900d3be88f2df495717b0afb1aba9ab912a35f4769d9020e,2024-10-07T17:47:48.410000
CVE-2024-47623,0,0,79b2aba30289ad0615e4cf02860068fc1310e91c8af2ef3dbee425a81c5a0707,2024-10-07T17:47:48.410000
@ -261343,7 +261346,7 @@ CVE-2024-47806,0,0,7da0bb8e7fc9c3b1d389ccbc624a09ba22b5eddfdda079b80b993589f773a
CVE-2024-47807,0,0,6f73fcbd170bbcb4214e07d010ddde34567b580923105f0e5418ba9615969635,2024-10-04T13:50:43.727000
CVE-2024-4781,0,0,75b4bbbeaedf32c6df964ae89a5896455d04ecbdf24f849877528cd42d17cfaf,2024-08-19T13:00:23.117000
CVE-2024-47814,0,0,f8dd235a57639bef21bfc7a4761f0e828d8ef79df395aec1e49ec750d206ccbf,2024-10-07T22:15:03.657000
CVE-2024-47817,0,0,31c75877b31c067b6d19b93a69af435a91f408d8a284c0169b9836f7577ba9dc,2024-10-07T22:15:03.913000
CVE-2024-47817,0,1,a8978e2cff17b63ee249f998983f4eff08d98ca0b11639ba8434d107030ba806,2024-10-08T15:35:24.303000
CVE-2024-47818,0,0,598d35845d5c9531ef399cca4570ef2326935f542cd6df2c80239a96fe7c21e2,2024-10-07T22:15:04.037000
CVE-2024-4782,0,0,37dcdb14f7d23ae467b62646ac8eb504448e2a7781e3c175892c72dc54d3aebf,2024-08-19T13:00:23.117000
CVE-2024-4783,0,0,413c0436e6758a988a0c847533b21e34b17a9d936626eba8cda1a5d1f87e0181,2024-05-24T01:15:30.977000
@ -264266,7 +264269,7 @@ CVE-2024-8347,0,0,14715b4855076c65c4bf21be6c68b62e0d22e8650a0e63bf9f5074414663f3
CVE-2024-8348,0,0,d08ea1deaed5cbc2f4a773e843468145326bb3a1da186780c7ff7b6cd74aae9b,2024-09-04T16:43:30.310000
CVE-2024-8349,0,0,c5156d79e59cd80a9f637ce807d739d5f9bbbaf01e3f3140af43137a484694a9,2024-10-02T16:50:09.673000
CVE-2024-8350,0,0,c0d58d04c994f4448c198b4f5c8008888aa77e46ed6f78c2de3ffb535372e657,2024-10-02T17:10:47.267000
CVE-2024-8352,0,0,167d44a71d01339f72eda36595bf2ebc800f1f94cdaa9cd71f073a0d43bfb4ba,2024-10-04T13:50:43.727000
CVE-2024-8352,0,1,5a5f68f5ec484916db4444535073a8328ae60240cafa9ec29cea43f16684fb68,2024-10-08T14:17:34.707000
CVE-2024-8353,0,0,dcc35089fec5ab9bf27f5fe03523b4e62e247a4803b51263049a1132141d0f36,2024-10-01T14:31:21.430000
CVE-2024-8354,0,0,cccb2137017cf69831f7ecbf78dca654eaa8501214a295601783df83128f0494,2024-10-01T13:15:02.903000
CVE-2024-8362,0,0,54abf718b9bfba93199694e9f50bfa28d6dfde9a56fb3c77d91594ed8cbda92f,2024-09-04T14:35:16.777000
@ -264317,7 +264320,7 @@ CVE-2024-8422,0,0,d68ef00b938d487b56e122f31bdfd52b0522be0b4b66f65b169f377743e315
CVE-2024-8427,0,0,57dcbf97b68dfdac544ef9faf52bed3587edeaacde16f067da96879677802837,2024-09-11T17:41:18.733000
CVE-2024-8428,0,0,224fe311bf12d06d4c690b8d9ea3bc4f42261bcb370dc3457883b86fb932f74d,2024-09-26T21:58:45.393000
CVE-2024-8430,0,0,55a9f0c318551ddd036fdf97a76cda9a73c7561d06c4df941f7c206a6547670b,2024-10-04T13:51:25.567000
CVE-2024-8431,1,1,7baecc9e8e571af318f8cd87d02a90614d0fd988e01a43285ee3d4b0eaf0a5c8,2024-10-08T12:15:02.810000
CVE-2024-8431,0,0,7baecc9e8e571af318f8cd87d02a90614d0fd988e01a43285ee3d4b0eaf0a5c8,2024-10-08T12:15:02.810000
CVE-2024-8432,0,0,8868d9b36bd238df6f75f7287d6bafac4ff3b898eed233d7b4ed5ce985d677d0,2024-09-27T12:58:58.433000
CVE-2024-8433,0,0,b410fce8b64e3c94f4a4ed487938b497d560f921639293b9c2ddd22885e8694f,2024-10-08T10:15:05.110000
CVE-2024-8434,0,0,f17fd5eecfec4b6092d883a27ff9fa9dfcb00839b391edc337e18ff19734c460,2024-10-02T17:25:30.140000
@ -264359,7 +264362,7 @@ CVE-2024-8478,0,0,175c7b9f94662d755813fa2228cd0539f44691d1180c4633af22a35129eb9a
CVE-2024-8479,0,0,895a7d94fd595e323b99eff6522688473ca450b242af8c3d5ea382e2a282a9b2,2024-09-27T16:12:10.427000
CVE-2024-8480,0,0,73de76891190d432c360d36e1da93720f2abf11adbca08499bebf4ffb87eb2bd,2024-09-26T18:13:58.470000
CVE-2024-8481,0,0,f7ded0bc8510c8370341acc7cc1290a608973497f13c998f4c94b53ba9c9ee83,2024-10-02T17:59:52.013000
CVE-2024-8482,1,1,fce7ebc9b1704c805b121acb7f0b84e2cc1df78a7e51c3c273833a7ea02373aa,2024-10-08T12:15:03.043000
CVE-2024-8482,0,0,fce7ebc9b1704c805b121acb7f0b84e2cc1df78a7e51c3c273833a7ea02373aa,2024-10-08T12:15:03.043000
CVE-2024-8483,0,0,7b9d62ad2c15cc912981452040d1345e4ce933202d5b94754bb2f4a4c6c39a92,2024-10-02T16:42:30.347000
CVE-2024-8484,0,0,f455d9eda6cfa730254e6d1c54e42895291597af75d213a155b8f2778e2c53b8,2024-10-02T17:44:13.687000
CVE-2024-8485,0,0,a23363c7e119dcd66690422c5888ab97f710d472d308cfeb1e931d4e39313163,2024-10-02T16:19:15.993000
@ -264729,12 +264732,12 @@ CVE-2024-9199,0,0,0d70434db3b8e5067294d8da03c36e695141f2bf7d8322fbb68a3bc3177abf
CVE-2024-9202,0,0,808b8091e3582386849f2f7767feb40805cba585b6581ba135c1d621ab219188,2024-09-30T12:46:20.237000
CVE-2024-9203,0,0,e6eb6874bd83da6550f594261cd60c3d082a0ed5dbc17d4c1b083dd114dee5d8,2024-09-30T12:46:20.237000
CVE-2024-9204,0,0,8709d8f31d12084fc2eba23d41169bb9ba345e1a3d3bed7d676463fdbec26c9b,2024-10-04T13:50:43.727000
CVE-2024-9207,0,1,5836b45f1e3b6f3c0b90cd0a57c81bf3d815110bb015ec2874126aceaef92c8b,2024-10-08T11:15:13.870000
CVE-2024-9207,0,0,5836b45f1e3b6f3c0b90cd0a57c81bf3d815110bb015ec2874126aceaef92c8b,2024-10-08T11:15:13.870000
CVE-2024-9209,0,0,02f8d10156b55c480185cf79dd6fdc61c3ca58517fd3619bf848f85895c40b93,2024-10-07T19:20:32.777000
CVE-2024-9210,0,0,0d87b122885ffeb5086d09957ff6c721d923789c7bea701de793ea02c19d5b92,2024-10-04T13:50:43.727000
CVE-2024-9218,0,0,a5f4d5993537e8f3ac852d48ac4c9a547a54d7a91e49aaaff900ba227521827f,2024-10-04T13:50:43.727000
CVE-2024-9210,0,1,3a96d77d31ae9d7d03fb36944bbc08403b6a23f29847ff9570c75435783fa55d,2024-10-08T15:34:42.060000
CVE-2024-9218,0,1,1fe5a0dc5cbc5663db71bfb2b02fdc2baeca2012618f21fc2618b5a68d78cab6,2024-10-08T15:33:58.617000
CVE-2024-9220,0,0,6bac7ddea6b917eb69cb1f74123e8b2dddc4799202193b6b6e16b0128e05e777,2024-10-07T19:19:59.487000
CVE-2024-9222,0,0,2a16e61f203d89577759b3079c645bfab646818b88f2af60656391fbb98aa805,2024-10-04T13:50:43.727000
CVE-2024-9222,0,1,aa75daaaa6f167f771e02be32b7ac6d9115eba757cf38ea3ae7fe336f82931ef,2024-10-08T15:34:13.250000
CVE-2024-9224,0,0,1efb870d30ff5afb9078703fdeff1bc29463ebfa0c91ad435c25d902219ffec9,2024-10-07T19:19:38.157000
CVE-2024-9225,0,0,d9b0065994459fe38d594a136ae9cff90cf19d12b5b0208b359cee9d6c2409ea,2024-10-07T20:24:41.420000
CVE-2024-9228,0,0,cb0dad29f14eeb8fed9baf1de8b4ba619c5e35c4fffb0932ef40f0c6748e195d,2024-10-07T19:01:04.960000
@ -264793,7 +264796,7 @@ CVE-2024-9328,0,0,a5f7378f6f2f1cd502f7cde1b5f6090c2d79ebec3e3af2aa2eaafb1f04d0c3
CVE-2024-9329,0,0,45383f73609cef2d97bbcc2a37f0da26902c147f00f71a92dd725b6696a1e709,2024-10-07T15:52:47.267000
CVE-2024-9333,0,0,29d3d497691b594c7c49948d48e229bbe8c23108f2eef552b2f92cd89acf1f06,2024-10-04T13:50:43.727000
CVE-2024-9341,0,0,6f06f8dbcaa27a536f49e7e7f0e59eeeae4e39f281abffa47a8e4056674c26ad,2024-10-04T13:51:25.567000
CVE-2024-9344,0,0,c8b7b78d2c8550e1f7ac90ab31d3ccd451ea906d2e1b378b917a05c8f6be0088,2024-10-04T13:50:43.727000
CVE-2024-9344,0,1,d870e129ed50c7683cdbbee07d60a73dcd8b852b9805e9d5932c8a41008c379e,2024-10-08T15:06:57.470000
CVE-2024-9345,0,0,f92a961dbc4f0c8ba79f679ac584baeb5523dd310ce30414d422a425c8fd1782,2024-10-04T13:50:43.727000
CVE-2024-9349,0,0,d93ebf21205a68549107b9eb4027ef2497abf7f2b80843c1be13a041c232bc94,2024-10-04T13:50:43.727000
CVE-2024-9353,0,0,b924aba767123c53d0fe02fb416cc00784b5397574d1ca21e990936e9a08f0ad,2024-10-04T13:50:43.727000
@ -264833,7 +264836,7 @@ CVE-2024-9440,0,0,843a4b0691140c8544f03abfab0d72b48e96752c7147156cb98041d58d09b9
CVE-2024-9441,0,0,1eef796e7a879df6819e9c253093e433508e2bb2fbba7042830a70bc7a4951a7,2024-10-04T13:50:43.727000
CVE-2024-9445,0,0,0c93ce7f42df628ab9963b0c4991253722d7526551714beaaf6a06be3b0d53b0,2024-10-04T13:50:43.727000
CVE-2024-9455,0,0,ca7310e762dfcd09cbb5f1358b0e3644684d54725bcf9d8ec53a1dfcee667610,2024-10-07T17:48:28.117000
CVE-2024-9460,0,0,207b483b341482a3da637fd727759c983bd72baaa4cf54783a03ee0a36230604,2024-10-04T13:50:43.727000
CVE-2024-9460,0,1,d6ff22c922d7573d861145a9f9c7a3aa2a44b6806bef76282f2615732b02479a,2024-10-08T14:33:42.703000
CVE-2024-9481,0,0,d47799c935f3894a1eb77a57851e2857614dcde60b18ca54bd2e7df5819c5f83,2024-10-04T13:50:43.727000
CVE-2024-9482,0,0,f3165a4a24a2f9114d882c0f7f29d9fd657c327243b8585b7ba3adb352065c7e,2024-10-04T13:50:43.727000
CVE-2024-9483,0,0,3a05dd369a56fa7d8019ce26b0a40ec5faf2156ca92b0ceaf0493b163c999d00,2024-10-04T13:50:43.727000

Can't render this file because it is too large.