mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
Auto-Update: 2024-03-08T19:00:38.279177+00:00
This commit is contained in:
parent
1b07af7a24
commit
9de1b6308c
59
CVE-2022/CVE-2022-438xx/CVE-2022-43855.json
Normal file
59
CVE-2022/CVE-2022-438xx/CVE-2022-43855.json
Normal file
@ -0,0 +1,59 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2022-43855",
|
||||||
|
"sourceIdentifier": "psirt@us.ibm.com",
|
||||||
|
"published": "2024-03-08T18:15:48.283",
|
||||||
|
"lastModified": "2024-03-08T18:15:48.283",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "IBM SPSS Statistics 26.0, 27.0.1, and 28.0 could allow a local user to create multiple files that could exhaust the file handles capacity and cause a denial of service. IBM X-Force ID: 230235."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "psirt@us.ibm.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 6.2,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.5,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "psirt@us.ibm.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-399"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/239235",
|
||||||
|
"source": "psirt@us.ibm.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.ibm.com/support/pages/node/7130881",
|
||||||
|
"source": "psirt@us.ibm.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
55
CVE-2023/CVE-2023-329xx/CVE-2023-32969.json
Normal file
55
CVE-2023/CVE-2023-329xx/CVE-2023-32969.json
Normal file
@ -0,0 +1,55 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2023-32969",
|
||||||
|
"sourceIdentifier": "security@qnapsecurity.com.tw",
|
||||||
|
"published": "2024-03-08T17:15:21.613",
|
||||||
|
"lastModified": "2024-03-08T17:15:21.613",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A cross-site scripting (XSS) vulnerability has been reported to affect Network & Virtual Switch. If exploited, the vulnerability could allow authenticated administrators to inject malicious code via a network.\n\nWe have already fixed the vulnerability in the following versions:\nQuTScloud c5.1.5.2651 and later\nQTS 5.1.4.2596 build 20231128 and later\nQuTS hero h5.1.4.2596 build 20231128 and later\n"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security@qnapsecurity.com.tw",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 4.9,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.2,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security@qnapsecurity.com.tw",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://www.qnap.com/en/security-advisory/qsa-24-11",
|
||||||
|
"source": "security@qnapsecurity.com.tw"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
@ -2,12 +2,12 @@
|
|||||||
"id": "CVE-2023-34975",
|
"id": "CVE-2023-34975",
|
||||||
"sourceIdentifier": "security@qnapsecurity.com.tw",
|
"sourceIdentifier": "security@qnapsecurity.com.tw",
|
||||||
"published": "2023-10-13T20:15:10.153",
|
"published": "2023-10-13T20:15:10.153",
|
||||||
"lastModified": "2023-10-18T19:54:57.237",
|
"lastModified": "2024-03-08T17:15:21.860",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "A SQL injection vulnerability has been reported to affect Video Station. If exploited, the vulnerability could allow authenticated users to inject malicious code via a network.\n\nWe have already fixed the vulnerability in the following version:\nVideo Station 5.7.0 ( 2023/07/27 ) and later\n"
|
"value": "An OS command injection vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated administrators to execute commands via a network.\nQuTScloud c5.1.x is not affected.\n\nWe have already fixed the vulnerability in the following versions:\nQuTS hero h4.5.4.2626 build 20231225 and later\nQTS 4.5.4.2627 build 20231225 and later\n"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"lang": "es",
|
"lang": "es",
|
||||||
@ -41,36 +41,36 @@
|
|||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L",
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L",
|
||||||
"attackVector": "NETWORK",
|
"attackVector": "NETWORK",
|
||||||
"attackComplexity": "LOW",
|
"attackComplexity": "LOW",
|
||||||
"privilegesRequired": "LOW",
|
"privilegesRequired": "HIGH",
|
||||||
"userInteraction": "NONE",
|
"userInteraction": "NONE",
|
||||||
"scope": "CHANGED",
|
"scope": "CHANGED",
|
||||||
"confidentialityImpact": "LOW",
|
"confidentialityImpact": "LOW",
|
||||||
"integrityImpact": "LOW",
|
"integrityImpact": "LOW",
|
||||||
"availabilityImpact": "LOW",
|
"availabilityImpact": "LOW",
|
||||||
"baseScore": 7.4,
|
"baseScore": 6.6,
|
||||||
"baseSeverity": "HIGH"
|
"baseSeverity": "MEDIUM"
|
||||||
},
|
},
|
||||||
"exploitabilityScore": 3.1,
|
"exploitabilityScore": 2.3,
|
||||||
"impactScore": 3.7
|
"impactScore": 3.7
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
{
|
{
|
||||||
"source": "nvd@nist.gov",
|
"source": "security@qnapsecurity.com.tw",
|
||||||
"type": "Primary",
|
"type": "Primary",
|
||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "CWE-89"
|
"value": "CWE-78"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"source": "security@qnapsecurity.com.tw",
|
"source": "nvd@nist.gov",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
@ -100,11 +100,8 @@
|
|||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://www.qnap.com/en/security-advisory/qsa-23-52",
|
"url": "https://www.qnap.com/en/security-advisory/qsa-24-12",
|
||||||
"source": "security@qnapsecurity.com.tw",
|
"source": "security@qnapsecurity.com.tw"
|
||||||
"tags": [
|
|
||||||
"Vendor Advisory"
|
|
||||||
]
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
55
CVE-2023/CVE-2023-349xx/CVE-2023-34980.json
Normal file
55
CVE-2023/CVE-2023-349xx/CVE-2023-34980.json
Normal file
@ -0,0 +1,55 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2023-34980",
|
||||||
|
"sourceIdentifier": "security@qnapsecurity.com.tw",
|
||||||
|
"published": "2024-03-08T17:15:22.117",
|
||||||
|
"lastModified": "2024-03-08T17:15:22.117",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "An OS command injection vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated administrators to execute commands via a network.\n\nWe have already fixed the vulnerability in the following versions:\nQTS 4.5.4.2627 build 20231225 and later\nQuTS hero h4.5.4.2626 build 20231225 and later\n"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security@qnapsecurity.com.tw",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "LOW",
|
||||||
|
"baseScore": 5.9,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.7,
|
||||||
|
"impactScore": 3.7
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security@qnapsecurity.com.tw",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-78"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://www.qnap.com/en/security-advisory/qsa-24-12",
|
||||||
|
"source": "security@qnapsecurity.com.tw"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
@ -2,12 +2,16 @@
|
|||||||
"id": "CVE-2023-38559",
|
"id": "CVE-2023-38559",
|
||||||
"sourceIdentifier": "secalert@redhat.com",
|
"sourceIdentifier": "secalert@redhat.com",
|
||||||
"published": "2023-08-01T17:15:09.890",
|
"published": "2023-08-01T17:15:09.890",
|
||||||
"lastModified": "2023-12-21T01:39:50.027",
|
"lastModified": "2024-03-08T18:19:03.450",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Analyzed",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "A buffer overflow flaw was found in base/gdevdevn.c:1973 in devn_pcx_write_rle() in ghostscript. This issue may allow a local attacker to cause a denial of service via outputting a crafted PDF file for a DEVN device with gs."
|
"value": "A buffer overflow flaw was found in base/gdevdevn.c:1973 in devn_pcx_write_rle() in ghostscript. This issue may allow a local attacker to cause a denial of service via outputting a crafted PDF file for a DEVN device with gs."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Se ha encontrado un fallo de desbordamiento de b\u00fafer en base/gdevdevn.c:1973 en devn_pcx_write_rle() en ghostscript. Este problema puede permitir a un atacante local provocar una denegaci\u00f3n de servicio mediante la salida de un archivo PDF manipulado para un dispositivo DEVN con gs."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
@ -85,8 +89,9 @@
|
|||||||
"cpeMatch": [
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:artifex:ghostscript:-:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "E4876A23-725C-450E-B988-32FFF4DF53C1"
|
"versionEndExcluding": "10.02.0",
|
||||||
|
"matchCriteriaId": "EBC6F542-8555-4F26-9DE8-79EE02705173"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
55
CVE-2023/CVE-2023-472xx/CVE-2023-47221.json
Normal file
55
CVE-2023/CVE-2023-472xx/CVE-2023-47221.json
Normal file
@ -0,0 +1,55 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2023-47221",
|
||||||
|
"sourceIdentifier": "security@qnapsecurity.com.tw",
|
||||||
|
"published": "2024-03-08T17:15:22.350",
|
||||||
|
"lastModified": "2024-03-08T17:15:22.350",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A path traversal vulnerability has been reported to affect Photo Station. If exploited, the vulnerability could allow authenticated administrators to read the contents of unexpected files and expose sensitive data via a network.\n\nWe have already fixed the vulnerability in the following version:\nPhoto Station 6.4.2 ( 2023/12/15 ) and later\n"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security@qnapsecurity.com.tw",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:L/A:L",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "LOW",
|
||||||
|
"baseScore": 5.5,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.3,
|
||||||
|
"impactScore": 2.7
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security@qnapsecurity.com.tw",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-22"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://www.qnap.com/en/security-advisory/qsa-24-13",
|
||||||
|
"source": "security@qnapsecurity.com.tw"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2023-6693",
|
"id": "CVE-2023-6693",
|
||||||
"sourceIdentifier": "secalert@redhat.com",
|
"sourceIdentifier": "secalert@redhat.com",
|
||||||
"published": "2024-01-02T10:15:08.930",
|
"published": "2024-01-02T10:15:08.930",
|
||||||
"lastModified": "2024-02-20T03:15:07.750",
|
"lastModified": "2024-03-08T17:57:54.067",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Analyzed",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
@ -89,8 +89,9 @@
|
|||||||
"cpeMatch": [
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:qemu:qemu:-:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "6D9E0C78-9678-4CEE-9389-962CF618A51F"
|
"versionEndExcluding": "8.2.1",
|
||||||
|
"matchCriteriaId": "EF658C4B-28B2-4514-A3E6-8AE0F8028C53"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
@ -120,6 +121,21 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
@ -140,11 +156,18 @@
|
|||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OYGUN5HVOXESW7MSNM44E4AE2VNXQB6Y/",
|
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OYGUN5HVOXESW7MSNM44E4AE2VNXQB6Y/",
|
||||||
"source": "secalert@redhat.com"
|
"source": "secalert@redhat.com",
|
||||||
|
"tags": [
|
||||||
|
"Mailing List",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://security.netapp.com/advisory/ntap-20240208-0004/",
|
"url": "https://security.netapp.com/advisory/ntap-20240208-0004/",
|
||||||
"source": "secalert@redhat.com"
|
"source": "secalert@redhat.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
55
CVE-2024/CVE-2024-218xx/CVE-2024-21899.json
Normal file
55
CVE-2024/CVE-2024-218xx/CVE-2024-21899.json
Normal file
@ -0,0 +1,55 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-21899",
|
||||||
|
"sourceIdentifier": "security@qnapsecurity.com.tw",
|
||||||
|
"published": "2024-03-08T17:15:22.587",
|
||||||
|
"lastModified": "2024-03-08T17:15:22.587",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "An improper authentication vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow users to compromise the security of the system via a network.\n\nWe have already fixed the vulnerability in the following versions:\nQTS 5.1.3.2578 build 20231110 and later\nQTS 4.5.4.2627 build 20231225 and later\nQuTS hero h5.1.3.2578 build 20231110 and later\nQuTS hero h4.5.4.2626 build 20231225 and later\nQuTScloud c5.1.5.2651 and later\n"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security@qnapsecurity.com.tw",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 9.8,
|
||||||
|
"baseSeverity": "CRITICAL"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security@qnapsecurity.com.tw",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-287"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://www.qnap.com/en/security-advisory/qsa-24-09",
|
||||||
|
"source": "security@qnapsecurity.com.tw"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
55
CVE-2024/CVE-2024-219xx/CVE-2024-21900.json
Normal file
55
CVE-2024/CVE-2024-219xx/CVE-2024-21900.json
Normal file
@ -0,0 +1,55 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-21900",
|
||||||
|
"sourceIdentifier": "security@qnapsecurity.com.tw",
|
||||||
|
"published": "2024-03-08T17:15:22.793",
|
||||||
|
"lastModified": "2024-03-08T17:15:22.793",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "An injection vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated users to execute commands via a network.\n\nWe have already fixed the vulnerability in the following versions:\nQTS 5.1.3.2578 build 20231110 and later\nQuTS hero h5.1.3.2578 build 20231110 and later\nQuTScloud c5.1.5.2651 and later\n"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security@qnapsecurity.com.tw",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 4.3,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security@qnapsecurity.com.tw",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-74"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://www.qnap.com/en/security-advisory/qsa-24-09",
|
||||||
|
"source": "security@qnapsecurity.com.tw"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
55
CVE-2024/CVE-2024-219xx/CVE-2024-21901.json
Normal file
55
CVE-2024/CVE-2024-219xx/CVE-2024-21901.json
Normal file
@ -0,0 +1,55 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-21901",
|
||||||
|
"sourceIdentifier": "security@qnapsecurity.com.tw",
|
||||||
|
"published": "2024-03-08T17:15:23.060",
|
||||||
|
"lastModified": "2024-03-08T17:15:23.060",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A SQL injection vulnerability has been reported to affect myQNAPcloud. If exploited, the vulnerability could allow authenticated administrators to inject malicious code via a network.\n\nWe have already fixed the vulnerability in the following versions:\nmyQNAPcloud 1.0.52 ( 2023/11/24 ) and later\nQTS 4.5.4.2627 build 20231225 and later\n"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security@qnapsecurity.com.tw",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "LOW",
|
||||||
|
"baseScore": 4.7,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.2,
|
||||||
|
"impactScore": 3.4
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security@qnapsecurity.com.tw",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-89"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://www.qnap.com/en/security-advisory/qsa-24-09",
|
||||||
|
"source": "security@qnapsecurity.com.tw"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
21
README.md
21
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
|||||||
### Last Repository Update
|
### Last Repository Update
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
2024-03-08T17:00:30.814419+00:00
|
2024-03-08T19:00:38.279177+00:00
|
||||||
```
|
```
|
||||||
|
|
||||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
2024-03-08T16:15:45.327000+00:00
|
2024-03-08T18:19:03.450000+00:00
|
||||||
```
|
```
|
||||||
|
|
||||||
### Last Data Feed Release
|
### Last Data Feed Release
|
||||||
@ -29,20 +29,29 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
|||||||
### Total Number of included CVEs
|
### Total Number of included CVEs
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
240903
|
240910
|
||||||
```
|
```
|
||||||
|
|
||||||
### CVEs added in the last Commit
|
### CVEs added in the last Commit
|
||||||
|
|
||||||
Recently added CVEs: `0`
|
Recently added CVEs: `7`
|
||||||
|
|
||||||
|
* [CVE-2022-43855](CVE-2022/CVE-2022-438xx/CVE-2022-43855.json) (`2024-03-08T18:15:48.283`)
|
||||||
|
* [CVE-2023-32969](CVE-2023/CVE-2023-329xx/CVE-2023-32969.json) (`2024-03-08T17:15:21.613`)
|
||||||
|
* [CVE-2023-34980](CVE-2023/CVE-2023-349xx/CVE-2023-34980.json) (`2024-03-08T17:15:22.117`)
|
||||||
|
* [CVE-2023-47221](CVE-2023/CVE-2023-472xx/CVE-2023-47221.json) (`2024-03-08T17:15:22.350`)
|
||||||
|
* [CVE-2024-21899](CVE-2024/CVE-2024-218xx/CVE-2024-21899.json) (`2024-03-08T17:15:22.587`)
|
||||||
|
* [CVE-2024-21900](CVE-2024/CVE-2024-219xx/CVE-2024-21900.json) (`2024-03-08T17:15:22.793`)
|
||||||
|
* [CVE-2024-21901](CVE-2024/CVE-2024-219xx/CVE-2024-21901.json) (`2024-03-08T17:15:23.060`)
|
||||||
|
|
||||||
|
|
||||||
### CVEs modified in the last Commit
|
### CVEs modified in the last Commit
|
||||||
|
|
||||||
Recently modified CVEs: `1`
|
Recently modified CVEs: `3`
|
||||||
|
|
||||||
* [CVE-2023-40834](CVE-2023/CVE-2023-408xx/CVE-2023-40834.json) (`2024-03-08T16:15:45.327`)
|
* [CVE-2023-34975](CVE-2023/CVE-2023-349xx/CVE-2023-34975.json) (`2024-03-08T17:15:21.860`)
|
||||||
|
* [CVE-2023-38559](CVE-2023/CVE-2023-385xx/CVE-2023-38559.json) (`2024-03-08T18:19:03.450`)
|
||||||
|
* [CVE-2023-6693](CVE-2023/CVE-2023-66xx/CVE-2023-6693.json) (`2024-03-08T17:57:54.067`)
|
||||||
|
|
||||||
|
|
||||||
## Download and Usage
|
## Download and Usage
|
||||||
|
15
_state.csv
15
_state.csv
@ -208201,6 +208201,7 @@ CVE-2022-43844,0,0,64b52e46485da277d23f45c74a497e84916aaeb51aa28b04d2a390ae43725
|
|||||||
CVE-2022-43848,0,0,fac31056597308c762268366ea7a297addf705fa1f73d9908447a73f4e53bb06,2023-11-07T03:54:05.370000
|
CVE-2022-43848,0,0,fac31056597308c762268366ea7a297addf705fa1f73d9908447a73f4e53bb06,2023-11-07T03:54:05.370000
|
||||||
CVE-2022-43849,0,0,7c426fb70bdad93cdcad7681114de041b9f72f571f626be13225e0b19e263a3f,2023-11-07T03:54:05.460000
|
CVE-2022-43849,0,0,7c426fb70bdad93cdcad7681114de041b9f72f571f626be13225e0b19e263a3f,2023-11-07T03:54:05.460000
|
||||||
CVE-2022-4385,0,0,4f0a7db659419811c611b703a580d64e3b846cb87691d4e5770205d4041c9bde,2023-11-07T03:57:43.257000
|
CVE-2022-4385,0,0,4f0a7db659419811c611b703a580d64e3b846cb87691d4e5770205d4041c9bde,2023-11-07T03:57:43.257000
|
||||||
|
CVE-2022-43855,1,1,cd56058316caa82a53c6a06f392aef9b8fa30f90ff8da28d97f7750f8f65577b,2024-03-08T18:15:48.283000
|
||||||
CVE-2022-43857,0,0,61a05df5bf9237fda8c303f460ad812542beb3d319544641b53e5b02a3c8e216,2023-11-07T03:54:05.533000
|
CVE-2022-43857,0,0,61a05df5bf9237fda8c303f460ad812542beb3d319544641b53e5b02a3c8e216,2023-11-07T03:54:05.533000
|
||||||
CVE-2022-43858,0,0,83764c4299953aa63641ddd4ca02bc0c14e1042f90b572c06b146b3872395a56,2023-11-07T03:54:05.623000
|
CVE-2022-43858,0,0,83764c4299953aa63641ddd4ca02bc0c14e1042f90b572c06b146b3872395a56,2023-11-07T03:54:05.623000
|
||||||
CVE-2022-43859,0,0,518a89bad4a28252257d5c43eeb66bd5f1c269428dbacbb5b1ea16e90ac70381,2023-11-07T03:54:05.727000
|
CVE-2022-43859,0,0,518a89bad4a28252257d5c43eeb66bd5f1c269428dbacbb5b1ea16e90ac70381,2023-11-07T03:54:05.727000
|
||||||
@ -223427,6 +223428,7 @@ CVE-2023-32965,0,0,235dc50e34d94fda53fd52cf92e59d0a6810fc2fcfcde4d1fc415ac28cbc1
|
|||||||
CVE-2023-32966,0,0,597e67fb688c3b6382c2106e1864f1a7b972f2d5942d7651ace5d9d760eb8195,2023-11-16T18:19:15.237000
|
CVE-2023-32966,0,0,597e67fb688c3b6382c2106e1864f1a7b972f2d5942d7651ace5d9d760eb8195,2023-11-16T18:19:15.237000
|
||||||
CVE-2023-32967,0,0,181b27218357b9534779cdb617a10e522383a0b923ba29f6df31973b04619e04,2024-02-08T03:55:41.193000
|
CVE-2023-32967,0,0,181b27218357b9534779cdb617a10e522383a0b923ba29f6df31973b04619e04,2024-02-08T03:55:41.193000
|
||||||
CVE-2023-32968,0,0,e0e3203932bd5c2cae4d597f6fb3464bec9a76376136463bc5f51f591c37c0b0,2023-12-13T16:04:28.430000
|
CVE-2023-32968,0,0,e0e3203932bd5c2cae4d597f6fb3464bec9a76376136463bc5f51f591c37c0b0,2023-12-13T16:04:28.430000
|
||||||
|
CVE-2023-32969,1,1,cd37904b09791fc4524c274d32267eb91ae0efdb611f001cd34e31155dddd066,2024-03-08T17:15:21.613000
|
||||||
CVE-2023-3297,0,0,bdc2281cfc41023b838180c774157d8a716a3d7af337bc811f0341db96b22aaf,2023-09-07T19:24:36.467000
|
CVE-2023-3297,0,0,bdc2281cfc41023b838180c774157d8a716a3d7af337bc811f0341db96b22aaf,2023-09-07T19:24:36.467000
|
||||||
CVE-2023-32970,0,0,510cae4df1837a83975acd1b60d22acd8dd436252d3a4bc93464dae609ac7c96,2023-10-19T15:42:09.663000
|
CVE-2023-32970,0,0,510cae4df1837a83975acd1b60d22acd8dd436252d3a4bc93464dae609ac7c96,2023-10-19T15:42:09.663000
|
||||||
CVE-2023-32971,0,0,f4d4844ce6c5516bfbfe1e633ad9133a7a48dc4282d0a6faf0732a1c98152faf,2023-10-11T17:38:24.087000
|
CVE-2023-32971,0,0,f4d4844ce6c5516bfbfe1e633ad9133a7a48dc4282d0a6faf0732a1c98152faf,2023-10-11T17:38:24.087000
|
||||||
@ -224806,9 +224808,10 @@ CVE-2023-34970,0,0,4338100854cf10b564e95a512a7f16493468b899a841304dd3e6e766ac806
|
|||||||
CVE-2023-34971,0,0,fc24a749d08fa8a1ce3a8b95ddc241081bbfe4207e7d3bb1855243b62e63b7f9,2023-08-31T18:00:43.533000
|
CVE-2023-34971,0,0,fc24a749d08fa8a1ce3a8b95ddc241081bbfe4207e7d3bb1855243b62e63b7f9,2023-08-31T18:00:43.533000
|
||||||
CVE-2023-34972,0,0,69a26211f51476ee392b7d4abd057d2f7828c64868a7de05c101f0625f9a9c9d,2023-08-31T18:03:09.587000
|
CVE-2023-34972,0,0,69a26211f51476ee392b7d4abd057d2f7828c64868a7de05c101f0625f9a9c9d,2023-08-31T18:03:09.587000
|
||||||
CVE-2023-34973,0,0,f68aca85275ce05f0fbe531390442b3da71ac526666e52c19361f7783ee94e7c,2023-08-31T12:53:25.140000
|
CVE-2023-34973,0,0,f68aca85275ce05f0fbe531390442b3da71ac526666e52c19361f7783ee94e7c,2023-08-31T12:53:25.140000
|
||||||
CVE-2023-34975,0,0,152cfc98acf9051aa9b7c08c131e4535af07e0c20f615362725ff3dee3164641,2023-10-18T19:54:57.237000
|
CVE-2023-34975,0,1,c2f8cc61527c3d551065566a9240619a988c176b62484cbdc024fe0a860ca45b,2024-03-08T17:15:21.860000
|
||||||
CVE-2023-34976,0,0,5131001d44215fbf6567ba24da1cee337910bce34005877b45a52b53b568190b,2023-10-18T19:56:09.990000
|
CVE-2023-34976,0,0,5131001d44215fbf6567ba24da1cee337910bce34005877b45a52b53b568190b,2023-10-18T19:56:09.990000
|
||||||
CVE-2023-34977,0,0,f407e0e78bac8cdac4341b319096090890204efa811b94d7dc7e015e84f7275b,2023-10-14T01:49:11.190000
|
CVE-2023-34977,0,0,f407e0e78bac8cdac4341b319096090890204efa811b94d7dc7e015e84f7275b,2023-10-14T01:49:11.190000
|
||||||
|
CVE-2023-34980,1,1,30af64598e02d65243adab4976fcf5959f2d7ec4bdb6cb16b9719edd85f575fd,2024-03-08T17:15:22.117000
|
||||||
CVE-2023-34981,0,0,062ef46b163862296e9ed1bca5960ed7403a1b91cf881145504cee2406f2d679,2023-07-21T19:20:13.337000
|
CVE-2023-34981,0,0,062ef46b163862296e9ed1bca5960ed7403a1b91cf881145504cee2406f2d679,2023-07-21T19:20:13.337000
|
||||||
CVE-2023-34982,0,0,1643d79bda64e9dba285225b355d6509894d92e2ff5521c5d9e6ac2ed2a3bebc,2023-12-08T18:53:18.187000
|
CVE-2023-34982,0,0,1643d79bda64e9dba285225b355d6509894d92e2ff5521c5d9e6ac2ed2a3bebc,2023-12-08T18:53:18.187000
|
||||||
CVE-2023-34983,0,0,9a814cf966879a80d37c939cbcec047f54a7ba180a88458acb5b920f76cf4013,2024-02-14T15:01:51.137000
|
CVE-2023-34983,0,0,9a814cf966879a80d37c939cbcec047f54a7ba180a88458acb5b920f76cf4013,2024-02-14T15:01:51.137000
|
||||||
@ -227249,7 +227252,7 @@ CVE-2023-38555,0,0,8c8405db2d409590a65b4fc183f4e0340e2ffd7dfe59ee42a9144196bfab5
|
|||||||
CVE-2023-38556,0,0,abb1cdb6f951547c2308b8a14c846037b57f3821eae2758105bc9aeb55abe8ff,2023-08-07T19:24:44.253000
|
CVE-2023-38556,0,0,abb1cdb6f951547c2308b8a14c846037b57f3821eae2758105bc9aeb55abe8ff,2023-08-07T19:24:44.253000
|
||||||
CVE-2023-38557,0,0,3c02d41c246562bab51c2e54590175d287a509af53f67aced5ca9057d122a041,2023-09-21T16:12:01.620000
|
CVE-2023-38557,0,0,3c02d41c246562bab51c2e54590175d287a509af53f67aced5ca9057d122a041,2023-09-21T16:12:01.620000
|
||||||
CVE-2023-38558,0,0,4b4ac2e45027370ce8b0c900380bc2c1308eafaecf4666a56a6f8d66b7525a1b,2023-09-20T14:03:07.620000
|
CVE-2023-38558,0,0,4b4ac2e45027370ce8b0c900380bc2c1308eafaecf4666a56a6f8d66b7525a1b,2023-09-20T14:03:07.620000
|
||||||
CVE-2023-38559,0,0,a025f6953bde0030c0d82905db765c802b244bcb2473329b7dec00d94963c0b5,2023-12-21T01:39:50.027000
|
CVE-2023-38559,0,1,d6209645fdbc9479f4db40b83a3b04c2f2d0bd0b9ab92683e1cb3ed7c0ca52d8,2024-03-08T18:19:03.450000
|
||||||
CVE-2023-3856,0,0,ae1a03c45d46ce9fd2c906750e7d6d401a3fb13d0940c838eaeef2a84c1fc522,2024-02-29T01:40:47.847000
|
CVE-2023-3856,0,0,ae1a03c45d46ce9fd2c906750e7d6d401a3fb13d0940c838eaeef2a84c1fc522,2024-02-29T01:40:47.847000
|
||||||
CVE-2023-38560,0,0,12cc2e71fa2e51110c6b29060fa7fd5a72de9613fcbaa08910fd8eeafbf412b8,2023-11-07T04:17:21.293000
|
CVE-2023-38560,0,0,12cc2e71fa2e51110c6b29060fa7fd5a72de9613fcbaa08910fd8eeafbf412b8,2023-11-07T04:17:21.293000
|
||||||
CVE-2023-38561,0,0,e014827b302d3427e7d59be3221147ac78547bbe2c1b58cb1de40fbae2ba6b8c,2024-02-14T15:01:46.050000
|
CVE-2023-38561,0,0,e014827b302d3427e7d59be3221147ac78547bbe2c1b58cb1de40fbae2ba6b8c,2024-02-14T15:01:46.050000
|
||||||
@ -228857,7 +228860,7 @@ CVE-2023-40828,0,0,e590f3c1b22f85cd3298ee83689b29f544f9ef4d07425a62c409a3f5b33df
|
|||||||
CVE-2023-40829,0,0,fd3bcb485c64eaefc8e88c81ac3a4cab0a66e348cda55eb02c240e28ce95748d,2023-10-24T12:43:04.760000
|
CVE-2023-40829,0,0,fd3bcb485c64eaefc8e88c81ac3a4cab0a66e348cda55eb02c240e28ce95748d,2023-10-24T12:43:04.760000
|
||||||
CVE-2023-40830,0,0,7cebaa8f9657a38661861c1593f9f9f87a5249ada51c574d117156cdd308dbca,2023-10-06T15:28:43.257000
|
CVE-2023-40830,0,0,7cebaa8f9657a38661861c1593f9f9f87a5249ada51c574d117156cdd308dbca,2023-10-06T15:28:43.257000
|
||||||
CVE-2023-40833,0,0,ab918ac3c6894844f8a1303498908d5db5b58827dccfbce9bc4ab34a4c014ac1,2023-12-07T15:11:51.220000
|
CVE-2023-40833,0,0,ab918ac3c6894844f8a1303498908d5db5b58827dccfbce9bc4ab34a4c014ac1,2023-12-07T15:11:51.220000
|
||||||
CVE-2023-40834,0,1,a8b960e975c57058f119d92bbe4214c3030a030b22f31b7f82e1c728bcd333a4,2024-03-08T16:15:45.327000
|
CVE-2023-40834,0,0,a8b960e975c57058f119d92bbe4214c3030a030b22f31b7f82e1c728bcd333a4,2024-03-08T16:15:45.327000
|
||||||
CVE-2023-40837,0,0,97c19b4ff5d71c9deb91e578d4be0cd3e2646e9f79c75cec925ee0e39f1c089b,2023-09-01T20:23:05.050000
|
CVE-2023-40837,0,0,97c19b4ff5d71c9deb91e578d4be0cd3e2646e9f79c75cec925ee0e39f1c089b,2023-09-01T20:23:05.050000
|
||||||
CVE-2023-40838,0,0,3649882edbdcddad2a93bc8348753323676b137f52594777c96ed1aa0be27636,2023-09-01T20:12:42.427000
|
CVE-2023-40838,0,0,3649882edbdcddad2a93bc8348753323676b137f52594777c96ed1aa0be27636,2023-09-01T20:12:42.427000
|
||||||
CVE-2023-40839,0,0,8ae3c259aade103219cfaf6e42605d961991f26a5490668fef781a8fe225def2,2023-09-07T14:14:25.523000
|
CVE-2023-40839,0,0,8ae3c259aade103219cfaf6e42605d961991f26a5490668fef781a8fe225def2,2023-09-07T14:14:25.523000
|
||||||
@ -232784,6 +232787,7 @@ CVE-2023-47217,0,0,0de7f48fcd98fcf3c2b428cc85ea9683bfce2c5cb7bddb251389bffcb6bfe
|
|||||||
CVE-2023-47218,0,0,83f8f641f2a43b3801eefd155daa6a42bde9110b4e0363a3c306f27bd77e53d2,2024-02-15T06:15:45.653000
|
CVE-2023-47218,0,0,83f8f641f2a43b3801eefd155daa6a42bde9110b4e0363a3c306f27bd77e53d2,2024-02-15T06:15:45.653000
|
||||||
CVE-2023-47219,0,0,e8eae84b161278342455d307aea60fa5f5d2ae8ca233b52f68827fe747f9943a,2024-01-10T16:53:51.923000
|
CVE-2023-47219,0,0,e8eae84b161278342455d307aea60fa5f5d2ae8ca233b52f68827fe747f9943a,2024-01-10T16:53:51.923000
|
||||||
CVE-2023-4722,0,0,ef30ac71f129b079c192b6627a10abdaff5edc734b113ae24fd97006cd6f3afa,2023-09-06T00:15:42.687000
|
CVE-2023-4722,0,0,ef30ac71f129b079c192b6627a10abdaff5edc734b113ae24fd97006cd6f3afa,2023-09-06T00:15:42.687000
|
||||||
|
CVE-2023-47221,1,1,c2955f57f45ef0b979c5a139e027d69e33621605d507a830040dd09decc5de4a,2024-03-08T17:15:22.350000
|
||||||
CVE-2023-47223,0,0,c7133be7f530791bf8f940b059f72ce830c1340409edd7f4402c7f0942a2d39e,2023-11-14T21:10:45.890000
|
CVE-2023-47223,0,0,c7133be7f530791bf8f940b059f72ce830c1340409edd7f4402c7f0942a2d39e,2023-11-14T21:10:45.890000
|
||||||
CVE-2023-47226,0,0,fc7520a0436a6f4a15179889507edc640f761b4dd395a1c99c7fbc0f33f7e05c,2023-11-14T21:10:29.973000
|
CVE-2023-47226,0,0,fc7520a0436a6f4a15179889507edc640f761b4dd395a1c99c7fbc0f33f7e05c,2023-11-14T21:10:29.973000
|
||||||
CVE-2023-47227,0,0,fc63057c5f7821e0b870c05e89e2cc15692adaa2baed471ae1e046f579540bb9,2023-11-14T21:10:01.587000
|
CVE-2023-47227,0,0,fc63057c5f7821e0b870c05e89e2cc15692adaa2baed471ae1e046f579540bb9,2023-11-14T21:10:01.587000
|
||||||
@ -237107,7 +237111,7 @@ CVE-2023-6687,0,0,815f0c1fb11575859202e4f8339ba0c892dff8a36cd30b831f453e8fce3948
|
|||||||
CVE-2023-6689,0,0,f525637daa23406ff158ff2d4d69ed0fb36c36685b0e4e4782d2006f17da667c,2023-12-29T19:29:33.807000
|
CVE-2023-6689,0,0,f525637daa23406ff158ff2d4d69ed0fb36c36685b0e4e4782d2006f17da667c,2023-12-29T19:29:33.807000
|
||||||
CVE-2023-6690,0,0,4a0a71b1ead07e18f281fc4661b8ad9c1c5894485cf3fc449f0f62ac342ca884,2023-12-29T19:21:45.180000
|
CVE-2023-6690,0,0,4a0a71b1ead07e18f281fc4661b8ad9c1c5894485cf3fc449f0f62ac342ca884,2023-12-29T19:21:45.180000
|
||||||
CVE-2023-6691,0,0,4508ab5df364506b806420a77fca83d065a1d8f25fe3acc54e1f9c114307cf91,2023-12-28T18:28:00.493000
|
CVE-2023-6691,0,0,4508ab5df364506b806420a77fca83d065a1d8f25fe3acc54e1f9c114307cf91,2023-12-28T18:28:00.493000
|
||||||
CVE-2023-6693,0,0,5cec3dd57ff3c1a646aad7fbe80cb339517da93176489f822da46dd45287e724,2024-02-20T03:15:07.750000
|
CVE-2023-6693,0,1,6873a264484b094c8ce71cc1218181d85ec7b1708eb4e4c0806f70e884fa33d8,2024-03-08T17:57:54.067000
|
||||||
CVE-2023-6697,0,0,e4339138bfdad4a40ac5f595e1eff8e88fb25ea1f60bcfd83302475d5a5a44cb,2024-01-30T20:25:21.367000
|
CVE-2023-6697,0,0,e4339138bfdad4a40ac5f595e1eff8e88fb25ea1f60bcfd83302475d5a5a44cb,2024-01-30T20:25:21.367000
|
||||||
CVE-2023-6699,0,0,9a17c40ae044b87058ba5cf6f205be27efddf5ec08f4e3c0c855e1346e832f36,2024-01-17T00:02:15.700000
|
CVE-2023-6699,0,0,9a17c40ae044b87058ba5cf6f205be27efddf5ec08f4e3c0c855e1346e832f36,2024-01-17T00:02:15.700000
|
||||||
CVE-2023-6700,0,0,febd44b44e68931da5556e3850b52d8ad5facf8c9b194d0da3f6a8bc0608cdf3,2024-02-09T16:38:05.687000
|
CVE-2023-6700,0,0,febd44b44e68931da5556e3850b52d8ad5facf8c9b194d0da3f6a8bc0608cdf3,2024-02-09T16:38:05.687000
|
||||||
@ -239207,6 +239211,9 @@ CVE-2024-21891,0,0,cb8571e56627caa87ef673c91152fcd88080674b3913f379f1f0ca0227546
|
|||||||
CVE-2024-21892,0,0,e9e7cd547b9c865ef0f7d643a8d56e423d474c52d8079510bad9fcfef1233a4d,2024-02-20T19:50:53.960000
|
CVE-2024-21892,0,0,e9e7cd547b9c865ef0f7d643a8d56e423d474c52d8079510bad9fcfef1233a4d,2024-02-20T19:50:53.960000
|
||||||
CVE-2024-21893,0,0,2d188d3c7852b895bab2eb60f33b22f9fc7e1606c5595723c82f7fae54df9f67,2024-02-01T02:00:01.187000
|
CVE-2024-21893,0,0,2d188d3c7852b895bab2eb60f33b22f9fc7e1606c5595723c82f7fae54df9f67,2024-02-01T02:00:01.187000
|
||||||
CVE-2024-21896,0,0,f2e89bd11f46e09b5e1cac8d09f61e5326ff446268c7f7ea5ae718519ecd8d4a,2024-02-20T19:50:53.960000
|
CVE-2024-21896,0,0,f2e89bd11f46e09b5e1cac8d09f61e5326ff446268c7f7ea5ae718519ecd8d4a,2024-02-20T19:50:53.960000
|
||||||
|
CVE-2024-21899,1,1,58e53b91b481300fa98fc0614570a92ad74c2eddbc5731a10af3ad8bf24f3c0e,2024-03-08T17:15:22.587000
|
||||||
|
CVE-2024-21900,1,1,9bb3d0d8ea20c68238e85cf6d41192f9737f7878fdd9bcf6f1608ccb0ac40dc0,2024-03-08T17:15:22.793000
|
||||||
|
CVE-2024-21901,1,1,22348be6c7a2d713a5ebde4e8209ab5d7dbd087c85edb3acb5b09250b6627be3,2024-03-08T17:15:23.060000
|
||||||
CVE-2024-21907,0,0,e97acedaa5fff8f35a2639917d8b0e8affd6b5d126dc549f4b2d35936c62833b,2024-01-17T15:24:07.360000
|
CVE-2024-21907,0,0,e97acedaa5fff8f35a2639917d8b0e8affd6b5d126dc549f4b2d35936c62833b,2024-01-17T15:24:07.360000
|
||||||
CVE-2024-21908,0,0,329abb805b48ea46c40d9625a0e5a18857ae42d6b89a82f5c3cf797095821263,2024-01-08T19:46:41.157000
|
CVE-2024-21908,0,0,329abb805b48ea46c40d9625a0e5a18857ae42d6b89a82f5c3cf797095821263,2024-01-08T19:46:41.157000
|
||||||
CVE-2024-21909,0,0,1862a33cb8cb7c096543042cface003ed2658c185ec7603674a262510a57f13e,2024-02-08T02:15:40.883000
|
CVE-2024-21909,0,0,1862a33cb8cb7c096543042cface003ed2658c185ec7603674a262510a57f13e,2024-02-08T02:15:40.883000
|
||||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user