mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-08 19:47:09 +00:00
Auto-Update: 2024-11-20T21:00:31.582668+00:00
This commit is contained in:
parent
6fa76129b2
commit
a4e6be1433
@ -2,16 +2,59 @@
|
||||
"id": "CVE-2018-9371",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2024-11-19T20:15:27.843",
|
||||
"lastModified": "2024-11-19T21:56:45.533",
|
||||
"lastModified": "2024-11-20T20:35:02.730",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Mediatek Preloader, there are out of bounds reads and writes due to an exposed interface that allows arbitrary peripheral memory mapping with insufficient blacklisting/whitelisting. This could lead to local elevation of privilege, given physical access to the device with no additional execution privileges needed. User interaction is needed for exploitation."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En Mediatek Preloader, hay lecturas y escrituras fuera de los l\u00edmites debido a una interfaz expuesta que permite la asignaci\u00f3n arbitraria de memoria perif\u00e9rica con listas negras o listas blancas insuficientes. Esto podr\u00eda llevar a una elevaci\u00f3n local de privilegios, dado el acceso f\u00edsico al dispositivo sin necesidad de privilegios de ejecuci\u00f3n adicionales. Se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/2018-06-01",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2018-9409",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2024-11-19T20:15:27.970",
|
||||
"lastModified": "2024-11-19T21:56:45.533",
|
||||
"lastModified": "2024-11-20T20:35:04.480",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In HWCSession::SetColorModeById of hwc_session.cpp, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En HWCSession::SetColorModeById de hwc_session.cpp, existe una posible escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltante. Esto podr\u00eda provocar una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/2018-06-01",
|
||||
|
@ -2,16 +2,43 @@
|
||||
"id": "CVE-2018-9468",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2024-11-20T17:15:08.783",
|
||||
"lastModified": "2024-11-20T17:15:08.783",
|
||||
"lastModified": "2024-11-20T19:35:00.663",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In query of DownloadManager.java, there is a possible read/write of arbitrary files due to a permissions bypass. This could lead to local information disclosure and file rewriting with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En la consulta de DownloadManager.java, existe una posible lectura/escritura de archivos arbitrarios debido a una omisi\u00f3n de permisos. Esto podr\u00eda provocar la divulgaci\u00f3n de informaci\u00f3n local y la reescritura de archivos sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.7,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/2018-09-01",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2018-9469",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2024-11-20T17:15:09.040",
|
||||
"lastModified": "2024-11-20T17:15:09.040",
|
||||
"lastModified": "2024-11-20T19:35:00.937",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In multiple functions of ShortcutService.java, there is a possible creation of a spoofed shortcut due to a missing permission check. This could lead to local escalation of privilege in a privileged app with no additional execution privileges needed. User interaction is needed for exploitation."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En varias funciones de ShortcutService.java, existe la posibilidad de crear un acceso directo falsificado debido a la falta de verificaci\u00f3n de permisos. Esto podr\u00eda provocar una escalada local de privilegios en una aplicaci\u00f3n privilegiada sin necesidad de privilegios de ejecuci\u00f3n adicionales. Se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.4,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/2018-09-01",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2018-9470",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2024-11-20T18:15:19.427",
|
||||
"lastModified": "2024-11-20T18:15:19.427",
|
||||
"lastModified": "2024-11-20T19:35:02.080",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "In bff_Scanner_addOutPos of Scanner.c, there is a possible out-of-bounds write due to an incorrect bounds check. This could lead to remote escalation of privilege in an unprivileged app with no additional execution privileges needed. User interaction is needed for exploitation."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/2018-09-01",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2018-9471",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2024-11-20T18:15:19.500",
|
||||
"lastModified": "2024-11-20T18:15:19.500",
|
||||
"lastModified": "2024-11-20T19:35:03.063",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "In the deserialization constructor of NanoAppFilter.java, there is a possible loss of data due to type confusion. This could lead to local escalation of privilege in the system server with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/2018-09-01",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2018-9472",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2024-11-20T18:15:19.550",
|
||||
"lastModified": "2024-11-20T18:15:19.550",
|
||||
"lastModified": "2024-11-20T19:35:03.980",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "In xmlMemStrdupLoc of xmlmemory.c, there is a possible out-of-bounds write due to an integer overflow. This could lead to remote code execution in an unprivileged process with no additional execution privileges needed. User interaction is needed for exploitation."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-190"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/2018-09-01",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2018-9474",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2024-11-20T18:15:19.610",
|
||||
"lastModified": "2024-11-20T18:15:19.610",
|
||||
"lastModified": "2024-11-20T19:35:04.790",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "In writeToParcel of MediaPlayer.java, there is a possible serialization/deserialization mismatch due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.4,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-502"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/2018-09-01",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2018-9475",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2024-11-20T18:15:19.670",
|
||||
"lastModified": "2024-11-20T18:15:19.670",
|
||||
"lastModified": "2024-11-20T19:35:05.590",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "In HeadsetInterface::ClccResponse of btif_hf.cc, there is a possible out of bounds stack write due to a missing bounds check. This could lead to remote escalation of privilege via Bluetooth, if the recipient has enabled SIP calls with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/2018-09-01",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2018-9477",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2024-11-20T18:15:19.723",
|
||||
"lastModified": "2024-11-20T18:15:19.723",
|
||||
"lastModified": "2024-11-20T19:35:06.410",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "In the development options section of the Settings app, there is a possible authentication bypass due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-294"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/2018-09-01",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2018-9478",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2024-11-20T18:15:19.773",
|
||||
"lastModified": "2024-11-20T18:15:19.773",
|
||||
"lastModified": "2024-11-20T19:35:07.310",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "In process_service_attr_req and process_service_search_attr_req of sdp_server.cc, there is an out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. \u00a0User interaction is not needed for exploitation."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/2018-09-01",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2018-9479",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2024-11-20T18:15:19.830",
|
||||
"lastModified": "2024-11-20T18:15:19.830",
|
||||
"lastModified": "2024-11-20T19:35:08.127",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "In process_service_attr_req and process_service_search_attr_req of sdp_server.cc, there is an out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. \u00a0User interaction is not needed for exploitation."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/2018-09-01",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2018-9480",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2024-11-20T18:15:19.890",
|
||||
"lastModified": "2024-11-20T18:15:19.890",
|
||||
"lastModified": "2024-11-20T19:35:09.023",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "In bta_hd_get_report_act of bta_hd_act.cc, there is a possible out-of-bounds read due to improper input validation. This could lead to remote information disclosure in the Bluetooth service with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/2018-09-01",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2018-9481",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2024-11-20T18:15:19.940",
|
||||
"lastModified": "2024-11-20T18:15:19.940",
|
||||
"lastModified": "2024-11-20T19:35:10.130",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,46 @@
|
||||
"value": "In bta_hd_set_report_act of bta_hd_act.cc, there is a possible out-of-bounds read due to an integer overflow. This could lead to remote information disclosure in the Bluetooth service with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.2,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-190"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/2018-09-01",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2018-9482",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2024-11-20T18:15:20.000",
|
||||
"lastModified": "2024-11-20T18:15:20.000",
|
||||
"lastModified": "2024-11-20T19:35:11.110",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,46 @@
|
||||
"value": "In intr_data_copy_cb of btif_hd.cc, there is a possible out of bounds read due to an integer overflow. This could lead to local information disclosure in the Bluetooth service with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.2,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-190"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/2018-09-01",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2018-9483",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2024-11-20T18:15:20.053",
|
||||
"lastModified": "2024-11-20T18:15:20.053",
|
||||
"lastModified": "2024-11-20T19:35:11.993",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,46 @@
|
||||
"value": "In bta_dm_remove_sec_dev_entry of bta_dm_act.cc, there is a possible out of bounds read due to a use after free. This could lead to remote information disclosure over bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/2018-09-01",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2018-9484",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2024-11-20T18:15:20.107",
|
||||
"lastModified": "2024-11-20T18:15:20.107",
|
||||
"lastModified": "2024-11-20T19:35:12.870",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "In l2cu_send_peer_config_rej of l2c_utils.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/2018-09-01",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2018-9485",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2024-11-20T18:15:20.163",
|
||||
"lastModified": "2024-11-20T18:15:20.163",
|
||||
"lastModified": "2024-11-20T19:35:13.760",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "In l2cble_process_sig_cmd of l2c_ble.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure over bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/2018-09-01",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2018-9486",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2024-11-20T18:15:20.220",
|
||||
"lastModified": "2024-11-20T18:15:20.220",
|
||||
"lastModified": "2024-11-20T19:35:14.657",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "In hidh_l2cif_data_ind of hidh_conn.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure over bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/2018-09-01",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2018-9487",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2024-11-20T18:15:20.277",
|
||||
"lastModified": "2024-11-20T18:15:20.277",
|
||||
"lastModified": "2024-11-20T19:35:15.573",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,30 @@
|
||||
"value": "In setVpnForcedLocked of Vpn.java, there is a possible blocking of internet traffic through vpn due to a bad uid check. This could lead to local denial of service with no additional execution privileges needed. User interaction is needed for exploitation."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/2018-09-01",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-27742",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-16T20:15:09.093",
|
||||
"lastModified": "2023-05-25T16:03:19.983",
|
||||
"lastModified": "2024-11-20T19:56:22.243",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -56,8 +56,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:idurar_project:idurar:1.0.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A6E415AB-4775-4054-BCFF-200F07D738F9"
|
||||
"criteria": "cpe:2.3:a:idurarapp:idurar:1.0.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "225F9DEE-58C6-420B-BF9D-62CC86A2658A"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-52265",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-12-30T23:15:42.620",
|
||||
"lastModified": "2024-01-11T20:17:16.273",
|
||||
"lastModified": "2024-11-20T19:56:22.243",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -60,9 +60,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:idurar_project:idurar:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:a:idurarapp:idurar:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "2.0.1",
|
||||
"matchCriteriaId": "79B1E39B-AFD9-4568-9048-1313A14EDA6E"
|
||||
"matchCriteriaId": "BE66257B-9C39-4205-B2B6-C6D86646DCEC"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-24051",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-06-12T18:15:10.920",
|
||||
"lastModified": "2024-08-26T12:43:44.580",
|
||||
"lastModified": "2024-11-20T19:16:25.340",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -61,8 +61,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:monoprice:select_min_v2_firmware:37.115.32:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "174297BB-58CA-4E5C-B121-D755E395D227"
|
||||
"criteria": "cpe:2.3:o:monoprice:select_mini_3d_printer_v2_firmware:37.115.32:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2D8D610F-4B1E-4736-AB77-311D52AAF424"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -72,8 +72,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:monoprice:select_min_v2:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C3179B43-1DE7-41E9-B4FD-3D6E6FA4F0DB"
|
||||
"criteria": "cpe:2.3:h:monoprice:select_mini_3d_printer_v2:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CCF0FA4C-6C8C-4A3E-BFC7-4973389ED13D"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
21
CVE-2024/CVE-2024-334xx/CVE-2024-33439.json
Normal file
21
CVE-2024/CVE-2024-334xx/CVE-2024-33439.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-33439",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-20T19:15:06.010",
|
||||
"lastModified": "2024-11-20T19:15:06.010",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in Kasda LinkSmart Router KW5515 v1.7 and before allows an authenticated remote attacker to execute arbitrary OS commands via cgi parameters."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/QuartzDust/848acfddff02c881eb86dd302e859e80",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
37
CVE-2024/CVE-2024-455xx/CVE-2024-45510.json
Normal file
37
CVE-2024/CVE-2024-455xx/CVE-2024-45510.json
Normal file
@ -0,0 +1,37 @@
|
||||
{
|
||||
"id": "CVE-2024-45510",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-20T20:15:18.943",
|
||||
"lastModified": "2024-11-20T20:15:18.943",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in Zimbra Collaboration (ZCS) through 10.0. Zimbra Webmail (Modern UI) is vulnerable to a stored Cross-Site Scripting (XSS) attack due to improper sanitization of user input. This allows an attacker to inject malicious code into specific fields of an e-mail message. When the victim adds the attacker to their contacts, the malicious code is stored and executed when viewing the contact list. This can lead to unauthorized actions such as arbitrary mail sending, mailbox exfiltration, profile picture alteration, and other malicious actions. Proper sanitization and escaping of input fields are necessary to mitigate this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wiki.zimbra.com/wiki/Security_Center",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://wiki.zimbra.com/wiki/Zimbra_Releases/10.0.9#Security_Fixes",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://wiki.zimbra.com/wiki/Zimbra_Releases/10.1.1#Security_Fixes",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://wiki.zimbra.com/wiki/Zimbra_Releases/9.0.0/P41#Security_Fixes",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://wiki.zimbra.com/wiki/Zimbra_Responsible_Disclosure_Policy",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
33
CVE-2024/CVE-2024-455xx/CVE-2024-45511.json
Normal file
33
CVE-2024/CVE-2024-455xx/CVE-2024-45511.json
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
"id": "CVE-2024-45511",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-20T19:15:06.123",
|
||||
"lastModified": "2024-11-20T19:15:06.123",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in Zimbra Collaboration (ZCS) through 10.1. A reflected Cross-Site Scripting (XSS) issue exists through the Briefcase module due to improper sanitization of file content by the OnlyOffice formatter. This occurs when the victim opens a crafted URL pointing to a shared folder containing a malicious file uploaded by the attacker. The vulnerability allows the attacker to execute arbitrary JavaScript in the context of the victim's session."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wiki.zimbra.com/wiki/Security_Center",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://wiki.zimbra.com/wiki/Zimbra_Releases/10.0.9#Security_Fixes",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://wiki.zimbra.com/wiki/Zimbra_Releases/10.1.1#Security_Fixes",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://wiki.zimbra.com/wiki/Zimbra_Responsible_Disclosure_Policy",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,16 +2,43 @@
|
||||
"id": "CVE-2024-45689",
|
||||
"sourceIdentifier": "patrick@puiterwijk.org",
|
||||
"published": "2024-11-20T11:15:05.337",
|
||||
"lastModified": "2024-11-20T11:15:05.337",
|
||||
"lastModified": "2024-11-20T20:35:10.157",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A flaw was found in Moodle. Dynamic tables did not enforce capability checks, which resulted in users having the ability to retrieve information they did not have permission to access."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se encontr\u00f3 una falla en Moodle. Las tablas din\u00e1micas no aplicaban comprobaciones de capacidad, lo que provocaba que los usuarios pudieran recuperar informaci\u00f3n a la que no ten\u00edan permiso de acceso."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309941",
|
||||
|
@ -2,16 +2,43 @@
|
||||
"id": "CVE-2024-45691",
|
||||
"sourceIdentifier": "patrick@puiterwijk.org",
|
||||
"published": "2024-11-20T11:15:05.490",
|
||||
"lastModified": "2024-11-20T11:15:05.490",
|
||||
"lastModified": "2024-11-20T20:35:10.377",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A flaw was found in Moodle. When restricting access to a lesson activity with a password, certain passwords could be bypassed or less secure due to a loose comparison in the password-checking logic. This issue only affected passwords set to \"magic hash\" values."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se encontr\u00f3 una falla en Moodle. Al restringir el acceso a una actividad de lecci\u00f3n con una contrase\u00f1a, ciertas contrase\u00f1as pod\u00edan ser ignoradas o menos seguras debido a una comparaci\u00f3n poco precisa en la l\u00f3gica de verificaci\u00f3n de contrase\u00f1as. Este problema solo afectaba a las contrase\u00f1as configuradas con valores de \"hash m\u00e1gico\"."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309940",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-46794",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-09-18T08:15:06.230",
|
||||
"lastModified": "2024-09-20T12:30:51.220",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-11-20T20:56:49.150",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,23 +15,139 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: x86/tdx: Se corrige la fuga de datos en mmio_read() La funci\u00f3n mmio_read() realiza una TDVMCALL para recuperar datos MMIO para una direcci\u00f3n del VMM. Sean not\u00f3 que mmio_read() expone involuntariamente el valor de una variable inicializada (val) en la pila al VMM. Esta variable solo se necesita como valor de salida. No era necesario pasarla al VMM en primer lugar. No env\u00ede el valor original de *val al VMM. [ dhansen: aclare para qu\u00e9 se usa 'val'. ]"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 3.3,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "5.19",
|
||||
"matchCriteriaId": "2100D1B8-9648-47E0-8CA8-90D1FE7C62FD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.1",
|
||||
"versionEndExcluding": "6.1.110",
|
||||
"matchCriteriaId": "FD34EEF6-E0F8-42D6-BF92-8EB851A6ADEC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.6",
|
||||
"versionEndExcluding": "6.6.51",
|
||||
"matchCriteriaId": "25B5F323-C9C2-4F67-BF42-0C5BDD860576"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.10",
|
||||
"versionEndExcluding": "6.10.10",
|
||||
"matchCriteriaId": "D16659A9-BECD-4E13-8994-B096652762E2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4DEB27E7-30AA-45CC-8934-B89263EF3551"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E0005AEF-856E-47EB-BFE4-90C46899394D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "39889A68-6D34-47A6-82FC-CD0BF23D6754"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc5:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B8383ABF-1457-401F-9B61-EE50F4C61F4F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc6:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B77A9280-37E6-49AD-B559-5B23A3B1DC3D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/26c6af49d26ffc377e392e30d4086db19eed0ef7",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/b55ce742afcb8e8189d82f2f1e635ba1b5a461fa",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/b6fb565a2d15277896583d471b21bc14a0c99661",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/ef00818c50cf55a3a56bd9a9fae867c92dfb84e7",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-46812",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-09-27T13:15:14.163",
|
||||
"lastModified": "2024-09-30T12:45:57.823",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-11-20T20:48:48.663",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,23 +15,103 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: Omitir planos inactivos dentro de ModeSupportAndSystemConfiguration [Por qu\u00e9] Coverity informa sobre accesos ilegales a la memoria. [C\u00f3mo] Omitir planos inactivos."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.1",
|
||||
"versionEndExcluding": "6.1.109",
|
||||
"matchCriteriaId": "39357484-8FFF-4FED-BEBE-83FE3BB15077"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.6",
|
||||
"versionEndExcluding": "6.6.50",
|
||||
"matchCriteriaId": "7717901F-E796-498A-B954-A554CDFE5FE4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.10",
|
||||
"versionEndExcluding": "6.10.9",
|
||||
"matchCriteriaId": "3F5B2E4D-6C25-4CEF-B66C-96048941FD98"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/3300a039caf850376bc3416c808cd8879da412bb",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/8406158a546441b73f0b216aedacbf9a1e5748fb",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/a54f7e866cc73a4cb71b8b24bb568ba35c8969df",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/ee9d6df6d9172917d9ddbd948bb882652d5ecd29",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-46827",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-09-27T13:15:15.153",
|
||||
"lastModified": "2024-09-30T12:45:57.823",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-11-20T20:40:40.737",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,19 +15,88 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wifi: ath12k: se corrige el fallo del firmware debido a un peer nss no v\u00e1lido Actualmente, si el punto de acceso recibe una solicitud de asociaci\u00f3n que contiene un elemento de informaci\u00f3n de capacidades HE extendidas con un MCS-NSS no v\u00e1lido, se produce un fallo del firmware. Este problema surge cuando las capacidades EHT-PHY muestran compatibilidad con un ancho de banda y el MCS-NSS configurado para ese ancho de banda en particular se completa con ceros y, debido a esto, el controlador obtiene peer_nss como 0 y el env\u00edo de este valor al firmware provoca un fallo. Aborde este problema implementando un paso de validaci\u00f3n para el valor peer_nss antes de pasarlo al firmware. Si el valor es mayor que cero, proceda a reenviarlo al firmware. Sin embargo, si el valor no es v\u00e1lido, rechace la solicitud de asociaci\u00f3n para evitar posibles fallos del firmware. Probado en: QCN9274 hw2.0 PCI WLAN.WBE.1.0.1-00029-QCAHKSWPL_SILICONZ-1"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.6.51",
|
||||
"matchCriteriaId": "D4954ED0-8229-4D57-B4B3-CB5154734977"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.10",
|
||||
"versionEndExcluding": "6.10.10",
|
||||
"matchCriteriaId": "D16659A9-BECD-4E13-8994-B096652762E2"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/25a15f80253a7c8776e4e4880d797d20ec864154",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/838c2cfdb6be7d7d8c06c711edf893eb34ca2e7c",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/db163a463bb93cd3e37e1e7b10b9726fb6f95857",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,16 +2,43 @@
|
||||
"id": "CVE-2024-48899",
|
||||
"sourceIdentifier": "patrick@puiterwijk.org",
|
||||
"published": "2024-11-20T11:15:05.563",
|
||||
"lastModified": "2024-11-20T11:15:05.563",
|
||||
"lastModified": "2024-11-20T20:35:10.583",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in Moodle. Additional checks are required to ensure users can only fetch the list of course badges for courses that they are intended to have access to."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se encontr\u00f3 una vulnerabilidad en Moodle. Se requieren verificaciones adicionales para garantizar que los usuarios solo puedan obtener la lista de credenciales de los cursos a los que se les pretende dar acceso."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "patrick@puiterwijk.org",
|
||||
|
25
CVE-2024/CVE-2024-489xx/CVE-2024-48981.json
Normal file
25
CVE-2024/CVE-2024-489xx/CVE-2024-48981.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-48981",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-20T20:15:19.097",
|
||||
"lastModified": "2024-11-20T20:15:19.097",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in MBed OS 6.16.0. During processing of HCI packets, the software dynamically determines the length of the packet header by looking up the identifying first byte and matching it against a table of possible lengths. The initial parsing function, hciTrSerialRxIncoming does not drop packets with invalid identifiers but also does not set a safe default for the length of unknown packets' headers, leading to a buffer overflow. This can be leveraged into an arbitrary write by an attacker. It is possible to overwrite the pointer to a not-yet-allocated buffer that is supposed to receive the contents of the packet body. One can then overwrite the state variable used by the function to determine which state of packet parsing is currently occurring. Because the buffer is allocated when the last byte of the header has been copied, the combination of having a bad header length variable that will never match the counter variable and being able to overwrite the state variable with the resulting buffer overflow can be used to advance the function to the next step while skipping the buffer allocation and resulting pointer write. The next 16 bytes from the packet body are then written wherever the corrupted data pointer is pointing."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/mbed-ce/mbed-os/blob/54e8693ef4ff7e025018094f290a1d5cf380941f/connectivity/FEATURE_BLE/source/cordio/stack_adaptation/hci_tr.c#L161",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/mbed-ce/mbed-os/pull/374",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-489xx/CVE-2024-48983.json
Normal file
25
CVE-2024/CVE-2024-489xx/CVE-2024-48983.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-48983",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-20T20:15:19.183",
|
||||
"lastModified": "2024-11-20T20:15:19.183",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in MBed OS 6.16.0. During processing of HCI packets, the software dynamically determines the length of the packet data by reading 2 bytes from the packet header. A buffer is then allocated to contain the entire packet, the size of which is calculated as the length of the packet body determined earlier plus the header length. WsfMsgAlloc then increments this again by sizeof(wsfMsg_t). This may cause an integer overflow that results in the buffer being significantly too small to contain the entire packet. This may cause a buffer overflow of up to 65 KB . This bug is trivial to exploit for a denial of service but can generally not be exploited further because the exploitable buffer is dynamically allocated."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/mbed-ce/mbed-os/blob/54e8693ef4ff7e025018094f290a1d5cf380941f/connectivity/FEATURE_BLE/libraries/cordio_stack/wsf/sources/port/baremetal/wsf_msg.c#L72",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/mbed-ce/mbed-os/pull/388",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-489xx/CVE-2024-48985.json
Normal file
25
CVE-2024/CVE-2024-489xx/CVE-2024-48985.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-48985",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-20T20:15:19.270",
|
||||
"lastModified": "2024-11-20T20:15:19.270",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in MBed OS 6.16.0. During processing of HCI packets, the software dynamically determines the length of the packet data by reading 2 bytes from the packet data. A buffer is then allocated to contain the entire packet, the size of which is calculated as the length of the packet body determined earlier and the header length. If the allocate fails because the specified packet is too large, no exception handling occurs and hciTrSerialRxIncoming continues to write bytes into the 4-byte large temporary header buffer, leading to a buffer overflow. This can be leveraged into an arbitrary write by an attacker. It is possible to overwrite the pointer to the buffer that is supposed to receive the contents of the packet body but which couldn't be allocated. One can then overwrite the state variable used by the function to determine which step of the parsing process is currently being executed. This advances the function to the next state, where it proceeds to copy data to that arbitrary location. The packet body is then written wherever the corrupted data pointer is pointing."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/mbed-ce/mbed-os/blob/54e8693ef4ff7e025018094f290a1d5cf380941f/connectivity/FEATURE_BLE/source/cordio/stack_adaptation/hci_tr.c#L200",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/mbed-ce/mbed-os/pull/384",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-50056",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-10-21T20:15:17.853",
|
||||
"lastModified": "2024-10-23T15:12:34.673",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-11-20T20:18:00.460",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,15 +15,75 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: usb: gadget: uvc: Corrige la desreferenciaci\u00f3n de ERR_PTR en uvc_v4l2.c Corrige la posible desreferenciaci\u00f3n de ERR_PTR() en find_format_by_pix() y uvc_v4l2_enum_format(). Corrige los siguientes errores de coincidencia: drivers/usb/gadget/function/uvc_v4l2.c:124 find_format_by_pix() error: posible desreferenciaci\u00f3n de 'fmtdesc' a ERR_PTR() drivers/usb/gadget/function/uvc_v4l2.c:392 uvc_v4l2_enum_format() error: posible desreferenciaci\u00f3n de 'fmtdesc' a ERR_PTR() Adem\u00e1s, corrige un problema similar en uvc_v4l2_try_format() para una posible desreferenciaci\u00f3n de ERR_PTR()."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.11",
|
||||
"versionEndExcluding": "6.11.4",
|
||||
"matchCriteriaId": "66F99BD9-E74F-4CC8-834E-B73BD4643C7B"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/a7bb96b18864225a694e3887ac2733159489e4b0",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/cedeb36c3ff4acd0f3d09918dfd8ed1df05efdd6",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-50060",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-10-21T20:15:18.117",
|
||||
"lastModified": "2024-10-23T15:12:34.673",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-11-20T20:25:37.210",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,23 +15,103 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: io_uring: comprobar si necesitamos reprogramar durante el vaciado de desbordamiento En t\u00e9rminos de uso normal de la aplicaci\u00f3n, esta lista siempre estar\u00e1 vac\u00eda. Y si una aplicaci\u00f3n se desborda un poco, tendr\u00e1 algunas entradas. Sin embargo, obviamente nada impide que syzbot ejecute un caso de prueba que genere un mont\u00f3n de entradas de desbordamiento, y luego vaciarlas puede llevar bastante tiempo. Verifique la necesidad de reprogramar durante el vaciado y elimine nuestros bloqueos y h\u00e1galo si es necesario. No hay ning\u00fan estado que mantener aqu\u00ed, ya que los desbordamientos siempre se podan desde el principio de la lista, por lo tanto, est\u00e1 bien eliminar y volver a adquirir los bloqueos al final del bucle."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.1",
|
||||
"versionEndExcluding": "6.1.113",
|
||||
"matchCriteriaId": "C9833DA6-D5C8-4B44-9B42-1FF7CB895D7B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.6",
|
||||
"versionEndExcluding": "6.6.57",
|
||||
"matchCriteriaId": "922342C4-A42B-4202-87E5-A5B665F7A490"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.11",
|
||||
"versionEndExcluding": "6.11.4",
|
||||
"matchCriteriaId": "66F99BD9-E74F-4CC8-834E-B73BD4643C7B"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/a2493904e95ce94bbec819d8f7f03b99976eb25c",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/c2eadeafce2d385b3f6d26a7f31fee5aba2bbbb0",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/eac2ca2d682f94f46b1973bdf5e77d85d77b8e53",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/f4ce3b5d26ce149e77e6b8e8f2058aa80e5b034e",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-50065",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-10-21T20:15:18.520",
|
||||
"lastModified": "2024-10-23T15:12:34.673",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-11-20T20:07:01.320",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,19 +15,99 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ntfs3: Cambio a asignaci\u00f3n sin bloqueo en ntfs_d_hash d_hash se realiza mientras se est\u00e1 bajo \"rcu-walk\" y no deber\u00eda estar en suspensi\u00f3n. __get_name() asigna usando GFP_KERNEL, teniendo la posibilidad de estar en suspensi\u00f3n cuando se encuentra bajo presi\u00f3n de memoria. Cambie la asignaci\u00f3n a GFP_NOWAIT."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.6.44",
|
||||
"versionEndExcluding": "6.6.57",
|
||||
"matchCriteriaId": "12B34D9E-C686-4929-A5FB-FA16A379708A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.11",
|
||||
"versionEndExcluding": "6.11.4",
|
||||
"matchCriteriaId": "66F99BD9-E74F-4CC8-834E-B73BD4643C7B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7F361E1D-580F-4A2D-A509-7615F73167A1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "925478D0-3E3D-4E6F-ACD5-09F28D5DF82C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/589996bf8c459deb5bbc9747d8f1c51658608103",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/c556e72cea2a1131ae418be017dd6fc76fffe2fb",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/d0c710372e238510db08ea01e7b8bd81ed995dd6",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,24 +2,129 @@
|
||||
"id": "CVE-2024-52714",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-19T19:15:08.680",
|
||||
"lastModified": "2024-11-19T21:56:45.533",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-11-20T20:35:15.260",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Tenda AC6 v2.0 v15.03.06.50 was discovered to contain a buffer overflow in the function 'fromSetSysTime."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 que Tenda AC6 v2.0 v15.03.06.50 conten\u00eda un desbordamiento de b\u00fafer en la funci\u00f3n 'fromSetSysTime."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:tenda:ac6_firmware:15.03.06.50_multi:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D3EC4D9E-D190-4037-A9DF-9A1575276E73"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:tenda:ac6:2.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E382AD7E-1450-40FC-AE9D-698B491805F0"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://tenda.com",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/CLan-nad/CVE/blob/main/tenda/fromSetSysTime/1.md",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-52739",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-20T18:15:23.393",
|
||||
"lastModified": "2024-11-20T18:15:23.393",
|
||||
"lastModified": "2024-11-20T20:35:16.147",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "D-LINK DI-8400 v16.07.26A1 was discovered to contain multiple remote command execution (RCE) vulnerabilities in the msp_info_htm function via the flag and cmd parameters."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.0,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/faqiadegege/IoTVuln/blob/main/DI_8400_msp_info_htm_rce/detail.md",
|
||||
|
25
CVE-2024/CVE-2024-527xx/CVE-2024-52754.json
Normal file
25
CVE-2024/CVE-2024-527xx/CVE-2024-52754.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-52754",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-20T20:15:19.450",
|
||||
"lastModified": "2024-11-20T20:15:19.450",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "D-LINK DI-8003 v16.07.16A1 was discovered to contain a buffer overflow via the fn parameter in the tgfile_htm function."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/faqiadegege/IoTVuln/blob/main/DI_8003_tgfile_htm_stackoverflow/detail.md",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.dlink.com/en/security-bulletin/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-527xx/CVE-2024-52757.json
Normal file
25
CVE-2024/CVE-2024-527xx/CVE-2024-52757.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-52757",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-20T20:15:19.533",
|
||||
"lastModified": "2024-11-20T20:15:19.533",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "D-LINK DI-8003 v16.07.16A1 was discovered to contain a buffer overflow via the notify parameter in the arp_sys_asp function."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/faqiadegege/IoTVuln/blob/main/DI_8003_arp_sys_asp_stackoverflow/detail.md",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.dlink.com/en/security-bulletin/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,24 +2,99 @@
|
||||
"id": "CVE-2024-52759",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-19T19:15:08.767",
|
||||
"lastModified": "2024-11-19T21:56:45.533",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-11-20T19:04:10.017",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "D-LINK DI-8003 v16.07.26A1 was discovered to contain a buffer overflow via the ip parameter in the ip_position_asp function."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 que D-LINK DI-8003 v16.07.26A1 conten\u00eda un desbordamiento de b\u00fafer a trav\u00e9s del par\u00e1metro ip en la funci\u00f3n ip_position_asp."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:dlink:di-8003_firmware:16.07.16a1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "09B22DC9-F8B2-462A-A64C-5881DC1E3FCD"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:dlink:di-8003:a1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "840B4964-A435-4220-BBCC-08DC344FD7D1"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/faqiadegege/IoTVuln/blob/main/DI_8003_ip_position_asp_stackoverflow/detail.md",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.dlink.com/en/security-bulletin/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-52762",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-19T21:15:06.580",
|
||||
"lastModified": "2024-11-19T21:56:45.533",
|
||||
"lastModified": "2024-11-20T20:35:17.280",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A cross-site scripting (XSS) vulnerability in the component /master/header.php of Ganglia-web v3.73 to v3.76 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the \"tz\" parameter."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad de Cross-Site Scripting (XSS) en el componente /master/header.php de Ganglia-web v3.73 a v3.76 permite a los atacantes ejecutar secuencias de comandos web o HTML arbitrarios a trav\u00e9s de un payload manipulado espec\u00edficamente e inyectado en el par\u00e1metro \"tz\"."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ganglia/ganglia-web/issues/382",
|
||||
|
91
README.md
91
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-11-20T19:00:20.813444+00:00
|
||||
2024-11-20T21:00:31.582668+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-11-20T18:58:42.133000+00:00
|
||||
2024-11-20T20:56:49.150000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,69 +33,52 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
270747
|
||||
270755
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `34`
|
||||
Recently added CVEs: `8`
|
||||
|
||||
- [CVE-2018-9479](CVE-2018/CVE-2018-94xx/CVE-2018-9479.json) (`2024-11-20T18:15:19.830`)
|
||||
- [CVE-2018-9480](CVE-2018/CVE-2018-94xx/CVE-2018-9480.json) (`2024-11-20T18:15:19.890`)
|
||||
- [CVE-2018-9481](CVE-2018/CVE-2018-94xx/CVE-2018-9481.json) (`2024-11-20T18:15:19.940`)
|
||||
- [CVE-2018-9482](CVE-2018/CVE-2018-94xx/CVE-2018-9482.json) (`2024-11-20T18:15:20.000`)
|
||||
- [CVE-2018-9483](CVE-2018/CVE-2018-94xx/CVE-2018-9483.json) (`2024-11-20T18:15:20.053`)
|
||||
- [CVE-2018-9484](CVE-2018/CVE-2018-94xx/CVE-2018-9484.json) (`2024-11-20T18:15:20.107`)
|
||||
- [CVE-2018-9485](CVE-2018/CVE-2018-94xx/CVE-2018-9485.json) (`2024-11-20T18:15:20.163`)
|
||||
- [CVE-2018-9486](CVE-2018/CVE-2018-94xx/CVE-2018-9486.json) (`2024-11-20T18:15:20.220`)
|
||||
- [CVE-2018-9487](CVE-2018/CVE-2018-94xx/CVE-2018-9487.json) (`2024-11-20T18:15:20.277`)
|
||||
- [CVE-2024-11081](CVE-2024/CVE-2024-110xx/CVE-2024-11081.json) (`2024-11-20T18:15:22.340`)
|
||||
- [CVE-2024-11488](CVE-2024/CVE-2024-114xx/CVE-2024-11488.json) (`2024-11-20T17:15:14.097`)
|
||||
- [CVE-2024-11489](CVE-2024/CVE-2024-114xx/CVE-2024-11489.json) (`2024-11-20T17:15:14.847`)
|
||||
- [CVE-2024-11490](CVE-2024/CVE-2024-114xx/CVE-2024-11490.json) (`2024-11-20T17:15:15.637`)
|
||||
- [CVE-2024-11491](CVE-2024/CVE-2024-114xx/CVE-2024-11491.json) (`2024-11-20T17:15:16.397`)
|
||||
- [CVE-2024-11492](CVE-2024/CVE-2024-114xx/CVE-2024-11492.json) (`2024-11-20T18:15:22.403`)
|
||||
- [CVE-2024-11493](CVE-2024/CVE-2024-114xx/CVE-2024-11493.json) (`2024-11-20T18:15:22.700`)
|
||||
- [CVE-2024-29292](CVE-2024/CVE-2024-292xx/CVE-2024-29292.json) (`2024-11-20T18:15:22.970`)
|
||||
- [CVE-2024-51162](CVE-2024/CVE-2024-511xx/CVE-2024-51162.json) (`2024-11-20T17:15:18.120`)
|
||||
- [CVE-2024-51163](CVE-2024/CVE-2024-511xx/CVE-2024-51163.json) (`2024-11-20T17:15:18.417`)
|
||||
- [CVE-2024-52725](CVE-2024/CVE-2024-527xx/CVE-2024-52725.json) (`2024-11-20T17:15:18.867`)
|
||||
- [CVE-2024-52739](CVE-2024/CVE-2024-527xx/CVE-2024-52739.json) (`2024-11-20T18:15:23.393`)
|
||||
- [CVE-2024-52769](CVE-2024/CVE-2024-527xx/CVE-2024-52769.json) (`2024-11-20T17:15:19.907`)
|
||||
- [CVE-2024-52770](CVE-2024/CVE-2024-527xx/CVE-2024-52770.json) (`2024-11-20T17:15:20.200`)
|
||||
- [CVE-2024-52771](CVE-2024/CVE-2024-527xx/CVE-2024-52771.json) (`2024-11-20T17:15:20.637`)
|
||||
- [CVE-2024-52796](CVE-2024/CVE-2024-527xx/CVE-2024-52796.json) (`2024-11-20T17:15:20.953`)
|
||||
- [CVE-2024-33439](CVE-2024/CVE-2024-334xx/CVE-2024-33439.json) (`2024-11-20T19:15:06.010`)
|
||||
- [CVE-2024-45510](CVE-2024/CVE-2024-455xx/CVE-2024-45510.json) (`2024-11-20T20:15:18.943`)
|
||||
- [CVE-2024-45511](CVE-2024/CVE-2024-455xx/CVE-2024-45511.json) (`2024-11-20T19:15:06.123`)
|
||||
- [CVE-2024-48981](CVE-2024/CVE-2024-489xx/CVE-2024-48981.json) (`2024-11-20T20:15:19.097`)
|
||||
- [CVE-2024-48983](CVE-2024/CVE-2024-489xx/CVE-2024-48983.json) (`2024-11-20T20:15:19.183`)
|
||||
- [CVE-2024-48985](CVE-2024/CVE-2024-489xx/CVE-2024-48985.json) (`2024-11-20T20:15:19.270`)
|
||||
- [CVE-2024-52754](CVE-2024/CVE-2024-527xx/CVE-2024-52754.json) (`2024-11-20T20:15:19.450`)
|
||||
- [CVE-2024-52757](CVE-2024/CVE-2024-527xx/CVE-2024-52757.json) (`2024-11-20T20:15:19.533`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `47`
|
||||
|
||||
- [CVE-2024-34365](CVE-2024/CVE-2024-343xx/CVE-2024-34365.json) (`2024-11-20T17:35:27.017`)
|
||||
- [CVE-2024-34487](CVE-2024/CVE-2024-344xx/CVE-2024-34487.json) (`2024-11-20T17:35:27.303`)
|
||||
- [CVE-2024-3471](CVE-2024/CVE-2024-34xx/CVE-2024-3471.json) (`2024-11-20T18:35:22.923`)
|
||||
- [CVE-2024-35283](CVE-2024/CVE-2024-352xx/CVE-2024-35283.json) (`2024-11-20T18:35:20.470`)
|
||||
- [CVE-2024-3629](CVE-2024/CVE-2024-36xx/CVE-2024-3629.json) (`2024-11-20T18:35:23.183`)
|
||||
- [CVE-2024-3644](CVE-2024/CVE-2024-36xx/CVE-2024-3644.json) (`2024-11-20T18:35:23.437`)
|
||||
- [CVE-2024-46768](CVE-2024/CVE-2024-467xx/CVE-2024-46768.json) (`2024-11-20T18:19:35.033`)
|
||||
- [CVE-2024-46771](CVE-2024/CVE-2024-467xx/CVE-2024-46771.json) (`2024-11-20T18:20:03.130`)
|
||||
- [CVE-2024-46774](CVE-2024/CVE-2024-467xx/CVE-2024-46774.json) (`2024-11-20T18:19:00.327`)
|
||||
- [CVE-2024-46775](CVE-2024/CVE-2024-467xx/CVE-2024-46775.json) (`2024-11-20T18:17:13.750`)
|
||||
- [CVE-2024-46776](CVE-2024/CVE-2024-467xx/CVE-2024-46776.json) (`2024-11-20T17:56:57.290`)
|
||||
- [CVE-2024-46777](CVE-2024/CVE-2024-467xx/CVE-2024-46777.json) (`2024-11-20T17:56:02.287`)
|
||||
- [CVE-2024-46778](CVE-2024/CVE-2024-467xx/CVE-2024-46778.json) (`2024-11-20T17:40:37.847`)
|
||||
- [CVE-2024-46780](CVE-2024/CVE-2024-467xx/CVE-2024-46780.json) (`2024-11-20T17:31:54.440`)
|
||||
- [CVE-2024-46789](CVE-2024/CVE-2024-467xx/CVE-2024-46789.json) (`2024-11-20T17:27:03.197`)
|
||||
- [CVE-2024-46815](CVE-2024/CVE-2024-468xx/CVE-2024-46815.json) (`2024-11-20T18:22:12.017`)
|
||||
- [CVE-2024-46816](CVE-2024/CVE-2024-468xx/CVE-2024-46816.json) (`2024-11-20T18:02:52.437`)
|
||||
- [CVE-2024-46817](CVE-2024/CVE-2024-468xx/CVE-2024-46817.json) (`2024-11-20T17:45:43.893`)
|
||||
- [CVE-2024-46820](CVE-2024/CVE-2024-468xx/CVE-2024-46820.json) (`2024-11-20T17:34:05.143`)
|
||||
- [CVE-2024-46825](CVE-2024/CVE-2024-468xx/CVE-2024-46825.json) (`2024-11-20T17:24:04.660`)
|
||||
- [CVE-2024-46826](CVE-2024/CVE-2024-468xx/CVE-2024-46826.json) (`2024-11-20T17:19:00.183`)
|
||||
- [CVE-2024-4705](CVE-2024/CVE-2024-47xx/CVE-2024-4705.json) (`2024-11-20T18:58:42.133`)
|
||||
- [CVE-2024-50968](CVE-2024/CVE-2024-509xx/CVE-2024-50968.json) (`2024-11-20T17:35:28.470`)
|
||||
- [CVE-2024-52613](CVE-2024/CVE-2024-526xx/CVE-2024-52613.json) (`2024-11-20T17:35:28.730`)
|
||||
- [CVE-2024-7193](CVE-2024/CVE-2024-71xx/CVE-2024-7193.json) (`2024-11-20T17:04:07.447`)
|
||||
- [CVE-2024-24051](CVE-2024/CVE-2024-240xx/CVE-2024-24051.json) (`2024-11-20T19:16:25.340`)
|
||||
- [CVE-2024-33014](CVE-2024/CVE-2024-330xx/CVE-2024-33014.json) (`2024-11-20T20:35:37.887`)
|
||||
- [CVE-2024-33015](CVE-2024/CVE-2024-330xx/CVE-2024-33015.json) (`2024-11-20T19:57:11.903`)
|
||||
- [CVE-2024-33018](CVE-2024/CVE-2024-330xx/CVE-2024-33018.json) (`2024-11-20T19:40:37.843`)
|
||||
- [CVE-2024-33019](CVE-2024/CVE-2024-330xx/CVE-2024-33019.json) (`2024-11-20T19:21:14.377`)
|
||||
- [CVE-2024-33020](CVE-2024/CVE-2024-330xx/CVE-2024-33020.json) (`2024-11-20T19:24:57.907`)
|
||||
- [CVE-2024-33021](CVE-2024/CVE-2024-330xx/CVE-2024-33021.json) (`2024-11-20T19:28:00.557`)
|
||||
- [CVE-2024-33022](CVE-2024/CVE-2024-330xx/CVE-2024-33022.json) (`2024-11-20T19:30:31.947`)
|
||||
- [CVE-2024-33023](CVE-2024/CVE-2024-330xx/CVE-2024-33023.json) (`2024-11-20T19:34:07.593`)
|
||||
- [CVE-2024-33024](CVE-2024/CVE-2024-330xx/CVE-2024-33024.json) (`2024-11-20T19:42:03.107`)
|
||||
- [CVE-2024-33025](CVE-2024/CVE-2024-330xx/CVE-2024-33025.json) (`2024-11-20T19:53:16.570`)
|
||||
- [CVE-2024-33026](CVE-2024/CVE-2024-330xx/CVE-2024-33026.json) (`2024-11-20T19:37:28.193`)
|
||||
- [CVE-2024-45689](CVE-2024/CVE-2024-456xx/CVE-2024-45689.json) (`2024-11-20T20:35:10.157`)
|
||||
- [CVE-2024-45691](CVE-2024/CVE-2024-456xx/CVE-2024-45691.json) (`2024-11-20T20:35:10.377`)
|
||||
- [CVE-2024-46794](CVE-2024/CVE-2024-467xx/CVE-2024-46794.json) (`2024-11-20T20:56:49.150`)
|
||||
- [CVE-2024-46812](CVE-2024/CVE-2024-468xx/CVE-2024-46812.json) (`2024-11-20T20:48:48.663`)
|
||||
- [CVE-2024-46827](CVE-2024/CVE-2024-468xx/CVE-2024-46827.json) (`2024-11-20T20:40:40.737`)
|
||||
- [CVE-2024-48899](CVE-2024/CVE-2024-488xx/CVE-2024-48899.json) (`2024-11-20T20:35:10.583`)
|
||||
- [CVE-2024-50056](CVE-2024/CVE-2024-500xx/CVE-2024-50056.json) (`2024-11-20T20:18:00.460`)
|
||||
- [CVE-2024-50060](CVE-2024/CVE-2024-500xx/CVE-2024-50060.json) (`2024-11-20T20:25:37.210`)
|
||||
- [CVE-2024-50065](CVE-2024/CVE-2024-500xx/CVE-2024-50065.json) (`2024-11-20T20:07:01.320`)
|
||||
- [CVE-2024-52714](CVE-2024/CVE-2024-527xx/CVE-2024-52714.json) (`2024-11-20T20:35:15.260`)
|
||||
- [CVE-2024-52739](CVE-2024/CVE-2024-527xx/CVE-2024-52739.json) (`2024-11-20T20:35:16.147`)
|
||||
- [CVE-2024-52759](CVE-2024/CVE-2024-527xx/CVE-2024-52759.json) (`2024-11-20T19:04:10.017`)
|
||||
- [CVE-2024-52762](CVE-2024/CVE-2024-527xx/CVE-2024-52762.json) (`2024-11-20T20:35:17.280`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
226
_state.csv
226
_state.csv
@ -96970,7 +96970,7 @@ CVE-2017-13221,0,0,57e3b08fba40dbad7e13f1ecaef036f44baab1a7137260bac79cedbd0aaba
|
||||
CVE-2017-13222,0,0,ebfdf42baf601798adad1e504ba051d585896884b139bf563ee706b616493897,2018-01-24T16:09:05.727000
|
||||
CVE-2017-13225,0,0,435256662af53bc84b96c8ecfbcc5e36a7df54bbec82fdff4a451c067fc3516f,2018-01-25T14:42:54.447000
|
||||
CVE-2017-13226,0,0,a63799b06443b94461c2cc06e2e1817db591c161b20b7ad48cffc3add8fc02f9,2019-10-03T00:03:26.223000
|
||||
CVE-2017-13227,0,1,298c91cd6525a66e289471e63f3648a2d80772c5e5ecb99bbc80e8ce07d9c1c2,2024-11-20T17:35:01.323000
|
||||
CVE-2017-13227,0,0,298c91cd6525a66e289471e63f3648a2d80772c5e5ecb99bbc80e8ce07d9c1c2,2024-11-20T17:35:01.323000
|
||||
CVE-2017-13228,0,0,d6d00cc11b40a6f7cf8c7c7b74c3a16d54ba4bf0782c9a7d7071e50c41c579df,2018-03-13T14:41:27.033000
|
||||
CVE-2017-13229,0,0,7ebc8fa8286ba1d5821a34ad554783788a44485aedcb5ab1d772a4b9b365c210,2018-03-06T19:52:36.463000
|
||||
CVE-2017-13230,0,0,d8a847f5c7c6d9cdce8e19c6fc7435655e7234b7d29ac67a202b7766226c4533,2018-03-13T14:40:12.123000
|
||||
@ -97063,7 +97063,7 @@ CVE-2017-13311,0,0,55504e7fca37acf50034a712244c28977b52d63a2e0a85783f86e9cd04320
|
||||
CVE-2017-13312,0,0,b6008dd37efed3ed1dd1887cecd96d4e7119296f7daae93046904c3ca18f8781,2024-11-19T16:35:02.293000
|
||||
CVE-2017-13313,0,0,9c6a43618c00c0daf8e78c975c9182c8d073005f306ff0e197206a7550c09d34,2024-11-19T16:35:03.173000
|
||||
CVE-2017-13314,0,0,f15cc076ea1dd87f4d0185b4f5bda3970135144fc10252817f13153eff27c1ae,2024-11-19T16:35:03.990000
|
||||
CVE-2017-13315,0,1,d16ea5a6b80ed40589c9b9f086a0f1c6ce65bee6281581573bcff9f10ee7ebce,2024-11-20T17:35:01.990000
|
||||
CVE-2017-13315,0,0,d16ea5a6b80ed40589c9b9f086a0f1c6ce65bee6281581573bcff9f10ee7ebce,2024-11-20T17:35:01.990000
|
||||
CVE-2017-1332,0,0,784a9ee8c3796f2a11ff24e95ae95a08508911f60f6ead21d91e6503f5824554,2017-08-03T15:46:39.147000
|
||||
CVE-2017-1333,0,0,3ec8913dbfad3ccab38e891f6e15f9a0101bb53e4d210c158476cd692803a999,2017-11-16T17:13:42.270000
|
||||
CVE-2017-1334,0,0,406b3dd86a0e9fb2c9a541dafaa2903ce89044fcfe05700f9700b783b2647a7d,2017-10-10T15:07:22.713000
|
||||
@ -126884,12 +126884,12 @@ CVE-2018-9335,0,0,a4615c2362644f0db16eaee8cf3937ed4f43b5ecf27164e1ed1f54117ac25b
|
||||
CVE-2018-9336,0,0,ece9df721ed9453241003aa3ca14b7e9da806325e2f8fa4c87f2deb09e87e0cc,2018-06-13T14:27:26.440000
|
||||
CVE-2018-9337,0,0,fa1438ef5dec1ff612947292d12b5f781ba1ebd09d4937236a9cc31915af5230,2020-02-17T16:15:25.707000
|
||||
CVE-2018-9338,0,0,40228caba823ad4e1209a735d23de42ebe53e934eb70e92e5f887484ad853af1,2024-11-19T21:56:45.533000
|
||||
CVE-2018-9339,0,1,709efef40e42bc3c2225b57543207441d20c7ae11456afd083c75a2cdc9efcd2,2024-11-20T17:35:03.690000
|
||||
CVE-2018-9340,0,1,e1bd80ee3e5ace41d8144dcb6345ec04b94a8d02c934bd98bf987da3d9907ae8,2024-11-20T17:35:05.083000
|
||||
CVE-2018-9341,0,1,cd9badee59c87b713a540b7c443b6ae5619b04098a98a92b34dccc3138e4e84c,2024-11-20T17:35:06.453000
|
||||
CVE-2018-9344,0,1,65379d2152171423139c5d37a84fb2153c0976314acd795bf036e0babb97c542,2024-11-20T17:35:07.810000
|
||||
CVE-2018-9345,0,1,4ca350d52bd2857345f5bae5382d74c8aba6043d7b12f03b4a66e07250b88245,2024-11-20T17:35:09.167000
|
||||
CVE-2018-9346,0,1,8047424bed92883715de87714aaea146c43861253f77c3ba87eaffe19bc426eb,2024-11-20T17:35:10.507000
|
||||
CVE-2018-9339,0,0,709efef40e42bc3c2225b57543207441d20c7ae11456afd083c75a2cdc9efcd2,2024-11-20T17:35:03.690000
|
||||
CVE-2018-9340,0,0,e1bd80ee3e5ace41d8144dcb6345ec04b94a8d02c934bd98bf987da3d9907ae8,2024-11-20T17:35:05.083000
|
||||
CVE-2018-9341,0,0,cd9badee59c87b713a540b7c443b6ae5619b04098a98a92b34dccc3138e4e84c,2024-11-20T17:35:06.453000
|
||||
CVE-2018-9344,0,0,65379d2152171423139c5d37a84fb2153c0976314acd795bf036e0babb97c542,2024-11-20T17:35:07.810000
|
||||
CVE-2018-9345,0,0,4ca350d52bd2857345f5bae5382d74c8aba6043d7b12f03b4a66e07250b88245,2024-11-20T17:35:09.167000
|
||||
CVE-2018-9346,0,0,8047424bed92883715de87714aaea146c43861253f77c3ba87eaffe19bc426eb,2024-11-20T17:35:10.507000
|
||||
CVE-2018-9347,0,0,004e6ddc7f66bf50b522d5dc4068b89ca2d1ec23406d1738d4ef275b0261e9d4,2018-12-27T13:51:37.067000
|
||||
CVE-2018-9348,0,0,7af83442535298c290a4c9be23d63103bd5378183d38c43ed7368ffef3523d1d,2024-11-20T16:35:02.590000
|
||||
CVE-2018-9355,0,0,e8ee2b8217cc4365fa52ec9ad40dda0902bdca6141010bdb87ba36c76908b916,2018-12-14T21:00:55.643000
|
||||
@ -126908,10 +126908,10 @@ CVE-2018-9367,0,0,6e3d42576b1bba3f49a27b062398e300d1ae34ff95f48a7b310f4e1f7a6a36
|
||||
CVE-2018-9368,0,0,3eed727016aaa1bdb2ab5590e837fbeae320a0018dd2936f380b32a99670cd83,2024-11-19T21:56:45.533000
|
||||
CVE-2018-9369,0,0,9395f39f3513afb7330245b4e0c6e2bb02799fed3ddb0f89583c25ad12118d29,2024-11-19T21:56:45.533000
|
||||
CVE-2018-9370,0,0,80c738099e22390d7e6e0bedd05470d0a35c0f1a435a7004a3ba7f53da24e5b7,2024-11-19T21:56:45.533000
|
||||
CVE-2018-9371,0,0,2fb9e6f1ef7787cbeb22bcd1773478b505435b8f99bc15218d6dfcac4adccdb0,2024-11-19T21:56:45.533000
|
||||
CVE-2018-9371,0,1,391d37936865c68d4397a6dd5a5c14645bbed7006327faadfe06d86fb258ec9f,2024-11-20T20:35:02.730000
|
||||
CVE-2018-9372,0,0,5241fff5e37359ca4d40d4d0ef51eddfb8e42f03921d8e136fe460686e5ef5c0,2024-11-19T21:56:45.533000
|
||||
CVE-2018-9385,0,0,a04751693f742cd9abca42cb6fa43b673fbcc24bbf305f54b6cb4b8b3d812bd4,2018-12-12T21:37:19.207000
|
||||
CVE-2018-9409,0,0,2968adb0075b7a844b1483be93f82fcfba96e3349da8031816178caf69a971d2,2024-11-19T21:56:45.533000
|
||||
CVE-2018-9409,0,1,ebcda6f7e24e6f698fa6ccd47d9f60bf8bc1c7442cbc31f290fa0b923152d8a0,2024-11-20T20:35:04.480000
|
||||
CVE-2018-9410,0,0,45d71f9ef4f84e4fb6ba694e9a2e9b63ef0d6353576e0fc9edb4a0ce290c4c46,2024-11-19T21:56:45.533000
|
||||
CVE-2018-9411,0,0,476b90c439a624a41737123423172fd604476c92ec43d209337f6742c8d2dcd6,2024-11-20T16:35:05.247000
|
||||
CVE-2018-9412,0,0,af0a26cc2a5cb016d9b3edebc5a3654aa65d5ce51220ae84c7907a388e7c6262,2024-11-19T22:15:18.813000
|
||||
@ -126948,26 +126948,26 @@ CVE-2018-9459,0,0,37f92a3a8615ac08ad1157d56af457710a07fd1019b073a6d5f8014670ff75
|
||||
CVE-2018-9465,0,0,3393303102eece75c592f8058027ea52136d9a6fe887ab46a73f746fe5320e57,2018-12-12T14:31:22.043000
|
||||
CVE-2018-9466,0,0,8a0bcf1d1447e0805bae81af54b078ca35801107416c23ddf0d4e34acefc60c4,2024-11-20T16:35:12.150000
|
||||
CVE-2018-9467,0,0,f5a4d9f86c03009f1de6b0f82410445906224b1309bf765545b0d54afac3483c,2024-11-20T00:15:16.820000
|
||||
CVE-2018-9468,1,1,df02ce6b1d3ad6facea805e279cbed7c6c7701712910c294bf68b00df0b469c2,2024-11-20T17:15:08.783000
|
||||
CVE-2018-9469,1,1,9bff9d593879c1fdf78301c90abaa160b90bd6eac95cba15c05faa69eff3a9a4,2024-11-20T17:15:09.040000
|
||||
CVE-2018-9470,1,1,b5cccf8f6b9f73a4a95c37b2bbd0781cd6ba57e39dc5fde7c2c904efbd17f814,2024-11-20T18:15:19.427000
|
||||
CVE-2018-9471,1,1,a25bd887e39eac47b2287f87e3158bc5da1cedaa4466f518bfab743c61723935,2024-11-20T18:15:19.500000
|
||||
CVE-2018-9472,1,1,6d41a1ef8ff54b7645232023c7bd7e12a653214c2489443a595f5949dfe52bb4,2024-11-20T18:15:19.550000
|
||||
CVE-2018-9468,0,1,4ad8c9d864ae31198912ba653d748e3abeed9dd8403ebcf567b0dd50bdaa8c03,2024-11-20T19:35:00.663000
|
||||
CVE-2018-9469,0,1,aa3c8c07cc7eabdc806accba6566a0e861e50384909ef6b1c64352a9ea52614f,2024-11-20T19:35:00.937000
|
||||
CVE-2018-9470,0,1,1edc3c40db1064f64c880c7256f918fce736efafa95e44c73e960d7c43bfd7bf,2024-11-20T19:35:02.080000
|
||||
CVE-2018-9471,0,1,19718f3b157e69037ccdf5119c4fde2ee21decc486e09268e4a137598f6d731f,2024-11-20T19:35:03.063000
|
||||
CVE-2018-9472,0,1,859d9f86c54cb3ac2b3c8eed44babd4c849f22daa60b8841a1970ba7343add05,2024-11-20T19:35:03.980000
|
||||
CVE-2018-9473,0,0,c1bdd895adedc9cea983c10ac747c9f80d48e4298ee85e28850c7d3a483f6fc6,2023-11-07T03:01:36.857000
|
||||
CVE-2018-9474,1,1,9e2b0489401002dd8acaba51c5f85ce9c9ffae27e01c2b081a4bc10aeb07a6f6,2024-11-20T18:15:19.610000
|
||||
CVE-2018-9475,1,1,ca68577f7baec870a17f6b527f53952d05f1ae3256058c0a3bfd1858ed849b51,2024-11-20T18:15:19.670000
|
||||
CVE-2018-9474,0,1,2fc462ca1c99c70e2644d5a4cf7e700117a5d94211c5f9c273211f202b8f442f,2024-11-20T19:35:04.790000
|
||||
CVE-2018-9475,0,1,a33b010c0ffcea3706ecab9f9683c6e2a9a060715eb0b06244d5b86da272af72,2024-11-20T19:35:05.590000
|
||||
CVE-2018-9476,0,0,1a47893a31d348e8886bcf5af0104f1b9d6f9c70018616ac539379931cc12516,2023-11-07T03:01:36.913000
|
||||
CVE-2018-9477,1,1,0b3782d7dea5a5ed303fb6f5a1565051d2a7ee5c5ec41f3b66100968046d3a3a,2024-11-20T18:15:19.723000
|
||||
CVE-2018-9478,1,1,cec0fab52d78d1de919f516142ec6b7848350eee24daa8824c8d1e0c4497c216,2024-11-20T18:15:19.773000
|
||||
CVE-2018-9479,1,1,f22a2731df3aac2b0bdb456ea6856653670bff2ed5601c47970a5d0dbfbf931e,2024-11-20T18:15:19.830000
|
||||
CVE-2018-9480,1,1,ab859b2ce5aefa70c1732d96640459bfc766e2f04074780af897f8f403546339,2024-11-20T18:15:19.890000
|
||||
CVE-2018-9481,1,1,784e23fa20ef2fa61ecdefe55b6081e5aef5f3107dd6f81a5e94a6e1cb094637,2024-11-20T18:15:19.940000
|
||||
CVE-2018-9482,1,1,14d935e2207311ceeb90656bfdedf27cb4585dbf4fa00e0eb424830286d8c440,2024-11-20T18:15:20
|
||||
CVE-2018-9483,1,1,db4653754d1231afdef6b6a1577601d7b9565f52f1a6b26b29b17caa3c98dc32,2024-11-20T18:15:20.053000
|
||||
CVE-2018-9484,1,1,3c612c22c918d7eac7620bc0366fec1f7519f5a9e04df68743e1ad55b47e30e5,2024-11-20T18:15:20.107000
|
||||
CVE-2018-9485,1,1,a6d84f14faaa2d95ec8f919baecaebc6ba9e427635afb4713d0c1a36749252d7,2024-11-20T18:15:20.163000
|
||||
CVE-2018-9486,1,1,7dc0674674af21a0abccc63bc5778a80ab4b376e9a828d2449c08fd30d791ecd,2024-11-20T18:15:20.220000
|
||||
CVE-2018-9487,1,1,d1a184d9c48e59ffed2afaf8c24275fa500657c6b909ce47ee106a6d2e37df55,2024-11-20T18:15:20.277000
|
||||
CVE-2018-9477,0,1,dc13b19992f78434791a0fbc13a8edc462f7906dc94916facd9ae82c958a18d3,2024-11-20T19:35:06.410000
|
||||
CVE-2018-9478,0,1,e62c7e60234a00aab239fe0bf28caf2fee794b5fbe6ede6546cbb5aad76f7733,2024-11-20T19:35:07.310000
|
||||
CVE-2018-9479,0,1,019da2b825e07153cd168d654e8fa2b554132cee5892ca29f3fba26b51246f16,2024-11-20T19:35:08.127000
|
||||
CVE-2018-9480,0,1,7d2bc9d3d402ad7b751be65da82b421799466990f6d6bfffb54761b6d52c46d2,2024-11-20T19:35:09.023000
|
||||
CVE-2018-9481,0,1,2e6e23f49e804ad13c814a4a55ffe419aecc075c670e854d63326bf3024a6da3,2024-11-20T19:35:10.130000
|
||||
CVE-2018-9482,0,1,46da710fbe56476783bc00e35fb2014c86285ab8f035637b7dcf7815f9b954cb,2024-11-20T19:35:11.110000
|
||||
CVE-2018-9483,0,1,84ad1db0d1f7efd9beb78ab661a079e810de5c191e41ebc0e6d40304afa5e585,2024-11-20T19:35:11.993000
|
||||
CVE-2018-9484,0,1,ab9a6d34f3c239a98e606ce81ca46dfdd65bf0dee026aa6d5f426b65c2e5f557,2024-11-20T19:35:12.870000
|
||||
CVE-2018-9485,0,1,578887ca1d1ad14a45310a5538f57217d997a642266c29bee0679734d86c5363,2024-11-20T19:35:13.760000
|
||||
CVE-2018-9486,0,1,9ff7641a6fb9e148057b6696e43d07c1f1cc89ef1e3a5a55f1c75528042ec7a1,2024-11-20T19:35:14.657000
|
||||
CVE-2018-9487,0,1,d8a3a9ce741a4dfc7f600b57fa66cd1d7b625fb2298e8dfc7c4229a76769a452,2024-11-20T19:35:15.573000
|
||||
CVE-2018-9488,0,0,71b6dcf45b61fc203c6b47a6e57d0e676f081e2bcfeee87d14c2243a30065e58,2020-08-24T17:37:01.140000
|
||||
CVE-2018-9489,0,0,0099c3fefae2b8555e406065f8c8cb7b969ba5c3ca27214a0b4864b328f4581b,2018-12-13T15:00:19.263000
|
||||
CVE-2018-9490,0,0,cc042ad56360c2290ea2dde569ff2c97233270532d7564c204f2685c4a8e9dd4,2023-11-07T03:01:36.990000
|
||||
@ -215895,7 +215895,7 @@ CVE-2023-21266,0,0,18d7bcc4c1fdfc1af03411d2e140522d50eb303306a9a01cd215164baa58c
|
||||
CVE-2023-21267,0,0,228f6f7596b6cb97274c6123e77ddff3343b22ba18b10a96e2055db9bcead853,2024-07-03T01:39:20.417000
|
||||
CVE-2023-21268,0,0,7502585c73530dd6ce3c3ff0a870c3ee2c56fd847c4fb3355c51e0a7f0ac2071,2023-11-15T02:55:56.537000
|
||||
CVE-2023-21269,0,0,fece9dff3711fe2af86d775cc74a99bad4829a0075d5a2a32efc6af138cb5008,2024-10-09T16:35:01.057000
|
||||
CVE-2023-21270,0,1,1fe5c2357fd389c2fa26892a2779cf8fae56997897dec89089d61f79d70b9e74,2024-11-20T17:35:18.563000
|
||||
CVE-2023-21270,0,0,1fe5c2357fd389c2fa26892a2779cf8fae56997897dec89089d61f79d70b9e74,2024-11-20T17:35:18.563000
|
||||
CVE-2023-21271,0,0,3086339ffce7fa60dbd215e725bc9394127b3bd1eb1d62f2277d721d350ea6f3,2023-08-18T19:54:05.827000
|
||||
CVE-2023-21272,0,0,8929585c315334a5cf678abc944b74ca2a510b1cfc115c2eab8b9f06cedbaa56,2024-10-09T16:35:02.920000
|
||||
CVE-2023-21273,0,0,1299d8533bbcaea325dcedcf17bc021b0703fb6c70d4dac65290a62467f88245,2023-08-18T19:44:13.167000
|
||||
@ -221153,7 +221153,7 @@ CVE-2023-27733,0,0,222a4bd3533e318360f2e12e34f2a89ae493a553a560ecd9505d00aae2564
|
||||
CVE-2023-27734,0,0,de74baa3a7e7f63dc76bee3aecaffc2b9f06833e06f247af333e54597e51ba31,2023-04-10T18:04:50.560000
|
||||
CVE-2023-27739,0,0,cadbd272261d892e69c16c178cf9831f947c175b35886b62ac2390ecfa232633,2024-01-12T16:06:23.180000
|
||||
CVE-2023-2774,0,0,c810249789d285e6cf04f6bf05015caa1979f9f2d42f50daf612abea1d801a2f,2024-05-17T02:23:15.210000
|
||||
CVE-2023-27742,0,0,32b159e61f8383cd7fcd31819ba01f73b90a78dc2aa9436fa96b64bc3246fb3e,2023-05-25T16:03:19.983000
|
||||
CVE-2023-27742,0,1,a2c1ee8734fba09808e95eec356212903b84f1466473cb02262fed6962e358de,2024-11-20T19:56:22.243000
|
||||
CVE-2023-27744,0,0,b36ff3a0f74800e914d90727c07f269d38ddb402862a1d7510dcd59f6693d3ed,2023-06-09T18:57:44.797000
|
||||
CVE-2023-27745,0,0,b3e512081fcdb9736fa8d8177024cdf8a8c1082eb225d248b40dce224e852988,2023-06-09T19:08:15.767000
|
||||
CVE-2023-27746,0,0,110a7d43283e10ab0b779399e29db689021b5eb4be3f2d5df37751782c96272f,2023-04-21T19:06:09.237000
|
||||
@ -227151,7 +227151,7 @@ CVE-2023-35654,0,0,5ec0257719972615a54320d70abd4585860da16cb9145e7dd4cf2a9de0b38
|
||||
CVE-2023-35655,0,0,46ccfbda32de6d4aaa44064f160c4fe81117afbe213f242d2b419179ac9bae89,2023-10-14T01:44:43.167000
|
||||
CVE-2023-35656,0,0,351408b3f3ce527e3e9ca146a71adca57765b10d14ffc2f2878145486a62e13f,2023-10-25T10:02:58.693000
|
||||
CVE-2023-35658,0,0,8bcf70abab563df9c5ba967b15bc341b1fdf6e9f2ec89ab41d871dfe9fd14b2f,2023-09-14T02:18:53.670000
|
||||
CVE-2023-35659,0,1,31170e6307be117b564d3fd5270e7a03d19c2b548298af8e23e6ce6a501467dd,2024-11-20T17:35:20.210000
|
||||
CVE-2023-35659,0,0,31170e6307be117b564d3fd5270e7a03d19c2b548298af8e23e6ce6a501467dd,2024-11-20T17:35:20.210000
|
||||
CVE-2023-3566,0,0,c2dc7026e794fcf3036669dc6d7e1d3151b5648f6848d46c6c625fc93ddde6f5,2024-05-17T02:27:36.673000
|
||||
CVE-2023-35660,0,0,486a712e4d0f56647a1f8028aec97638904ee0fb3391eb5df721854ed5551546,2023-10-18T01:42:58.543000
|
||||
CVE-2023-35661,0,0,92d005e666e4198e224998a5911b6ec28079a5f8101e9661c640419fbd2863da,2023-10-18T01:45:44.173000
|
||||
@ -227178,7 +227178,7 @@ CVE-2023-35681,0,0,2603f8896e8c125b6797dbd02195d63673d6f51724707bcecf3de29ee5bd3
|
||||
CVE-2023-35682,0,0,8e5be0df20127646df0c428d0877b5f6025db53a632750e4d83bce87d34712e9,2023-09-13T14:39:22.120000
|
||||
CVE-2023-35683,0,0,5a67cee00f3de3a526dd990d465ec70cca53419801a3d26ae9d8d814db70f2e8,2023-09-14T02:00:12.517000
|
||||
CVE-2023-35684,0,0,09ccb465b40d0eb68fba17fcdf270a630f7753abe8e6c5c89ccedcd22bd9e51b,2023-09-14T02:02:15.467000
|
||||
CVE-2023-35686,0,1,34617fa54ac067d67ae07ae5ad3d4a38c50027007110f600a134e523b8321b8c,2024-11-20T17:35:20.610000
|
||||
CVE-2023-35686,0,0,34617fa54ac067d67ae07ae5ad3d4a38c50027007110f600a134e523b8321b8c,2024-11-20T17:35:20.610000
|
||||
CVE-2023-35687,0,0,c28e4b6a4d942f40e08b784a20dfc07c8f0fcc8f7236ef7809c0123c392aa182,2023-09-14T02:03:49.147000
|
||||
CVE-2023-35689,0,0,c77c9e7a23c05ba829d34db48953b7d9e346df1f83dfb61e4b82c0b286c3749f,2023-08-22T01:10:41.940000
|
||||
CVE-2023-3569,0,0,5a78514f93a9c1a429d4db50f2959ea2876b105709fb83ffa2f2296def39f506,2023-08-14T19:15:13.793000
|
||||
@ -239224,7 +239224,7 @@ CVE-2023-5226,0,0,813cfbc02d6e857ea4eb9c4f7b0c665f95722678b412ba7b4768217ecb1ce9
|
||||
CVE-2023-52262,0,0,c1a0e14df800f2a6d2b576d38364858b40d13c4449139f09de1e58f768e99f83,2024-01-09T21:20:26.513000
|
||||
CVE-2023-52263,0,0,d1a953d70f5209ec5975404c6f52a0c966704ac8bdfece382e6f115124fdf088,2024-01-09T21:37:09.483000
|
||||
CVE-2023-52264,0,0,9b2ff78f1b876fa1ed0a22169927fe0b9df14333dbd58be130a0170557049d22,2024-01-05T20:46:48.340000
|
||||
CVE-2023-52265,0,0,d76308d493ddec97e5a9af6160653c91db8aca54e222e0b0f6f03ebefe6a6952,2024-01-11T20:17:16.273000
|
||||
CVE-2023-52265,0,1,74648b0c5a4866a26d1688194f13c820ce8ad530bf73fb4759c3192acca12418,2024-11-20T19:56:22.243000
|
||||
CVE-2023-52266,0,0,392e79410dd28494b88c098222c23fa3ab292d50b98fa168a723aeada84a1be0,2024-09-09T21:35:09.117000
|
||||
CVE-2023-52267,0,0,a333985231dc167d1838ad07c7f5412f41c783b53ac052753e0394b8194796a8,2024-01-09T21:19:32.343000
|
||||
CVE-2023-52268,0,0,d87a3a66864f0939a813dc0ad46f072d4aac6bc928fa03cd8863ddce8fb2a7b5,2024-11-19T17:35:07.247000
|
||||
@ -242863,7 +242863,7 @@ CVE-2024-10379,0,0,214be4d491421db3527c631a39011912a259f53e90e222f386f0e0be59c25
|
||||
CVE-2024-1038,0,0,c7b47d6608546def6f3304631405edc76ac6151bae95644217fe0b19e7498b5e,2024-03-13T18:16:18.563000
|
||||
CVE-2024-10380,0,0,251c7695ebdffe14f2a561bb3be22f7946019d2ec5c5cf9081e853969f1037dd,2024-11-01T16:11:00.217000
|
||||
CVE-2024-10381,0,0,c0308fe75631e6e478c4bb91d489e96b1c2dde80a7b938a5a315dee1135c5bea,2024-11-14T21:44:53.280000
|
||||
CVE-2024-10382,0,1,6cb5ff8e8fbaf6d99ec6d0369d0950b2bb65417500c51e58719c4fb1a4cfecd9,2024-11-20T17:35:22.073000
|
||||
CVE-2024-10382,0,0,6cb5ff8e8fbaf6d99ec6d0369d0950b2bb65417500c51e58719c4fb1a4cfecd9,2024-11-20T17:35:22.073000
|
||||
CVE-2024-10386,0,0,92094aeb70b25026044a453c13f522af4eb391b2229044481dc021518acdc439,2024-11-05T20:07:59.487000
|
||||
CVE-2024-10387,0,0,5a1f42d28f618e614b5301c0b94be55a535432bf7194e0692256ccf6aa332018,2024-11-05T20:05:55.323000
|
||||
CVE-2024-10388,0,0,baa860af3611995aa3b48c2ac11975f858a05164ea5f5d56cfe1775a5d194758,2024-11-19T21:57:32.967000
|
||||
@ -243306,7 +243306,7 @@ CVE-2024-11077,0,0,017b8d255e80754134e620d058a9d65876d81581be37ad0ebd6cdd417d3b7
|
||||
CVE-2024-11078,0,0,d133c6201a7de964272170f882ab0586a90d59fac96ab8e0ce223d3687fb9309,2024-11-12T13:55:21.227000
|
||||
CVE-2024-11079,0,0,d1a710289b6254268300773c7c9b113893f43edc23893d87d06dbeefe81deb1d,2024-11-12T13:55:21.227000
|
||||
CVE-2024-1108,0,0,72e8aa7ee320c630f0cd3020b574b902dcf572a1d2888f0afb29692e74e18247,2024-02-22T19:07:37.840000
|
||||
CVE-2024-11081,1,1,868ddada0bf262c198b91d0f6dc5cc082627c1fafb1bc6c0669f2cc02fb00c28,2024-11-20T18:15:22.340000
|
||||
CVE-2024-11081,0,0,868ddada0bf262c198b91d0f6dc5cc082627c1fafb1bc6c0669f2cc02fb00c28,2024-11-20T18:15:22.340000
|
||||
CVE-2024-11085,0,0,36aaba845c0a90c554661f4023115a3f46c67d2a691dfc21b49793447a4b6d8f,2024-11-18T17:11:17.393000
|
||||
CVE-2024-11086,0,0,f4d7f35e95dad05e023fed49ac9e59da09a947f51bc79e0e10dc6b97e93d7482,2024-11-20T13:15:04.020000
|
||||
CVE-2024-1109,0,0,54a246b33f975a42367e7b2f8f64c59b5c20293302ad365ae743bbdf357522c9,2024-02-10T04:13:21.610000
|
||||
@ -243448,13 +243448,13 @@ CVE-2024-11484,0,0,3aa464aa114e9a16609d997b5976852f2e09e31f2772cc684ca98d8b57443
|
||||
CVE-2024-11485,0,0,06e5567ffff9bf5762cacb559e6f60057c15b345cd5b497e93c1b41dfe58bb98,2024-11-20T16:15:19.990000
|
||||
CVE-2024-11486,0,0,7c15b276c5e10bb30088f41a466046358ea98a2439e6b7be46e2551e1312d436,2024-11-20T16:15:20.273000
|
||||
CVE-2024-11487,0,0,4dc442ecc0e78fa6f11201dcdffd8036378dd9553b06e5d3bd37c1017aa4a005,2024-11-20T16:15:20.543000
|
||||
CVE-2024-11488,1,1,34165f0c813abb9abfee75c83d1b1b40280912f4e239f105712914e94bd63ded,2024-11-20T17:15:14.097000
|
||||
CVE-2024-11489,1,1,d049b5ca44808d39c4b7cf14a9c92d411e742ce240269b63810bd4e5434ce388,2024-11-20T17:15:14.847000
|
||||
CVE-2024-11488,0,0,34165f0c813abb9abfee75c83d1b1b40280912f4e239f105712914e94bd63ded,2024-11-20T17:15:14.097000
|
||||
CVE-2024-11489,0,0,d049b5ca44808d39c4b7cf14a9c92d411e742ce240269b63810bd4e5434ce388,2024-11-20T17:15:14.847000
|
||||
CVE-2024-1149,0,0,b02f2ba30bfd9b077afbf478cdb43cc9b464ca358abc4a5e9f7416d9d1b2fcff,2024-02-15T17:52:08.970000
|
||||
CVE-2024-11490,1,1,d294f3c38443dcd020e5ea017596df459d37913b92096d63a59a27081dd35077,2024-11-20T17:15:15.637000
|
||||
CVE-2024-11491,1,1,02077d131042a2b8c0e7fccccde442b38220ee5d1826aa568f8f9e4b16f9ebb9,2024-11-20T17:15:16.397000
|
||||
CVE-2024-11492,1,1,d4e1d6df577e501fd3b6a404785d87e1988a7abce6229191e4d8c1c008a388dc,2024-11-20T18:15:22.403000
|
||||
CVE-2024-11493,1,1,296e3b8a96345bb7228b40375399765470fa3ea89cf10c3cfe96f69eb025afa1,2024-11-20T18:15:22.700000
|
||||
CVE-2024-11490,0,0,d294f3c38443dcd020e5ea017596df459d37913b92096d63a59a27081dd35077,2024-11-20T17:15:15.637000
|
||||
CVE-2024-11491,0,0,02077d131042a2b8c0e7fccccde442b38220ee5d1826aa568f8f9e4b16f9ebb9,2024-11-20T17:15:16.397000
|
||||
CVE-2024-11492,0,0,d4e1d6df577e501fd3b6a404785d87e1988a7abce6229191e4d8c1c008a388dc,2024-11-20T18:15:22.403000
|
||||
CVE-2024-11493,0,0,296e3b8a96345bb7228b40375399765470fa3ea89cf10c3cfe96f69eb025afa1,2024-11-20T18:15:22.700000
|
||||
CVE-2024-11494,0,0,5890d4fb88df3d8f55b6792aa5c18e107344b1b8b9d64b1485bac263c175d055,2024-11-20T10:15:05.920000
|
||||
CVE-2024-11495,0,0,79062961a6b5f76603192d58576bb23157ae662ae3c66c7b46038e4fdb4d0e00,2024-11-20T13:15:04.197000
|
||||
CVE-2024-1150,0,0,b47a3c09b3a331a50594ab70df2061c7818f30992462806b6f5b7a310a00b60b,2024-02-15T17:42:08.113000
|
||||
@ -246809,7 +246809,7 @@ CVE-2024-23275,0,0,2c9c1f4d2ca81860bcf12d49a2478f6772035d6cdcedc7473a9a2bfb8f8df
|
||||
CVE-2024-23276,0,0,b7fa000b367d55e31a4b1c9fd4a1f238256bf2545a07d5e4a633de96f48c7a44,2024-08-28T16:35:09.187000
|
||||
CVE-2024-23277,0,0,329d44f192e6d8ad64377bfea1b406324a89ddf322f5987758a35ef433724dec,2024-03-14T20:34:31.303000
|
||||
CVE-2024-23278,0,0,766bded776e256695874796c761a698226a698abed559def31f9f418b44fbd0e,2024-08-01T13:47:14.363000
|
||||
CVE-2024-23279,0,1,0cfac59bec6198ae482efa1723b7740dc16ed21f2d64facdb2439aacd6044ab3,2024-11-20T17:35:23.370000
|
||||
CVE-2024-23279,0,0,0cfac59bec6198ae482efa1723b7740dc16ed21f2d64facdb2439aacd6044ab3,2024-11-20T17:35:23.370000
|
||||
CVE-2024-2328,0,0,db4dcfea63581146a34d92e0d3290b1bf593c898de5919596eb70f461d745708,2024-05-02T18:00:37.360000
|
||||
CVE-2024-23280,0,0,ddc6f40a9de9d3a8d8165b26792d447c58ff17ce75e5f106261376a7c5e4a9e1,2024-10-31T17:35:02.803000
|
||||
CVE-2024-23281,0,0,4fecacd73d888b14029108fc1accb8e172c50322968d3c217d22a97f8374b808,2024-11-05T22:35:03.703000
|
||||
@ -247042,7 +247042,7 @@ CVE-2024-23559,0,0,1cfe950943db323f850a4ffa6fa09a9e594439fd864c25048ffda399bb0b3
|
||||
CVE-2024-23560,0,0,611d6f496e671cc0d1d356211a118fce6e543142f0a1a253e80e1a53fcc9dde1,2024-11-06T22:35:04.240000
|
||||
CVE-2024-23561,0,0,05ce6bff2b3c083c40d1cefd8ecfe83b9e8bac92f3576a18d3243c6c46e3bef3,2024-11-04T22:35:03.360000
|
||||
CVE-2024-23562,0,0,4d517ea8a2763e5506a865d21e69db429e3d16d2d215329e0568829328a2181b,2024-10-23T23:15:12.397000
|
||||
CVE-2024-2357,0,1,047100f7d23f6fc4c73eb91b24ba51665a90b521f0f43784e71468339885fec0,2024-11-20T18:35:19.917000
|
||||
CVE-2024-2357,0,0,047100f7d23f6fc4c73eb91b24ba51665a90b521f0f43784e71468339885fec0,2024-11-20T18:35:19.917000
|
||||
CVE-2024-23576,0,0,adfa1bbd41df2580fc9b0c7a87cd6221bc650972fa1b63f1cdf4b78644242d49,2024-08-01T16:35:05.990000
|
||||
CVE-2024-23579,0,0,c21892456c22f0f232ec5c1ceee77db91725955ceae3295921c8e393b52d9988,2024-07-03T01:47:55.687000
|
||||
CVE-2024-2358,0,0,6f4feaa02ea37cd82e67534651d9f0b2cdac6734cb6d67d953e75bc77e24ca55,2024-05-16T13:03:05.353000
|
||||
@ -247171,7 +247171,7 @@ CVE-2024-23710,0,0,bd7284af235de5db2fd51076f2026e0e8319c2a15e9eab609541ac6fe582c
|
||||
CVE-2024-23711,0,0,3b2f25c3bfdf9a198d84e7ce79a3c5bc71465fc8bd3a9e12aa99c3c94a4d9db4,2024-07-11T15:05:25.990000
|
||||
CVE-2024-23712,0,0,99a9a0e98f6ec74442cc23ab4a592b5612be30e655f849926f8cbd43d464cc6c,2024-07-03T01:48:04.970000
|
||||
CVE-2024-23713,0,0,84ac23a9c686e595929bab4dad7b08bca80d94f5a0dad54d418e0bd955964876,2024-07-03T01:48:05.220000
|
||||
CVE-2024-23715,0,1,7243fa8d7c0fc8189b10503618634c6b88707441759db0629ff8ade7ded54469,2024-11-20T17:35:23.597000
|
||||
CVE-2024-23715,0,0,7243fa8d7c0fc8189b10503618634c6b88707441759db0629ff8ade7ded54469,2024-11-20T17:35:23.597000
|
||||
CVE-2024-23716,0,0,72aa4692fe36e515631363961ebc214b187f38d11478c60001fc03eecbbbe02e,2024-09-12T14:35:11.523000
|
||||
CVE-2024-23717,0,0,6ae2f39818716426e507c7fefae1ead3e28d18b5fd2ac50fedfcf5c736aa3969,2024-08-16T19:35:03.877000
|
||||
CVE-2024-23721,0,0,738ea0fe142701915583cf528173779941e7a1ec154f74c48132f1439081fb4a,2024-08-28T15:35:15.520000
|
||||
@ -247445,7 +247445,7 @@ CVE-2024-24042,0,0,b866c3917f18283c11cab3dd04e447f4e26ea64e6c1cb154e64b25a1b7f81
|
||||
CVE-2024-24043,0,0,c9f0291d3b3ea0f3d4660ebdd10587f7bae9e2552aede9432383ad105d2d7da2,2024-08-28T16:35:09.730000
|
||||
CVE-2024-2405,0,0,758f03026c76b7f47d263886ed290a557d382d5cf70707c814c23dc8eb2e5ffc,2024-07-03T01:53:13.110000
|
||||
CVE-2024-24050,0,0,ee5c3af93ac39c1d9242e4e77bb6e2faff5b394550cb3ee7c80d2d31c43d8a98,2024-11-04T16:35:03.377000
|
||||
CVE-2024-24051,0,0,1d91890559076f5980bf15f5e9e94cabb5a5df274a545b95ecd8bd06b33e0e8b,2024-08-26T12:43:44.580000
|
||||
CVE-2024-24051,0,1,c5ed1aba5ac70f550d4f14be8166caf308597328059f7804493b36245a345971,2024-11-20T19:16:25.340000
|
||||
CVE-2024-24059,0,0,cc5e7807b112ca0c0cee68be0235e3c2f7d399e66c70ee9eee946a6792853ade,2024-02-03T00:40:43.793000
|
||||
CVE-2024-2406,0,0,87c2a8b3896489a9b03a37a228da22ed5ee51ad5268683466cf776b61ae5f9e1,2024-05-17T02:38:12.963000
|
||||
CVE-2024-24060,0,0,2e0c6f7f369551ad17564dbd7d463c4c76a814be7028ba2232c5427157eed964,2024-02-03T00:40:48.600000
|
||||
@ -248983,7 +248983,7 @@ CVE-2024-26278,0,0,a4bf5f7d4f5a8cc66cc891c37bd6872984880cd4b8b9e994fb28df36f06ab
|
||||
CVE-2024-26279,0,0,495c848487ea7b68d426f27b99de0402b60520a7c129465843fde2c78b15bbc3,2024-07-19T18:53:34.103000
|
||||
CVE-2024-2628,0,0,09573b659ba12c91153fe41a3eb70641eb4f8cb568e4e66d7b1cdbd070a295c2,2024-08-06T19:35:04.207000
|
||||
CVE-2024-26280,0,0,50ad290499bb0e7f4914845cafc39bb50b8cd84bff7c79192f6c4ba13a4d77b8,2024-11-01T18:35:03.183000
|
||||
CVE-2024-26281,0,1,a849d619186af504504fa06c72a1de5232d101cf0e09841ceadc9c64335b2847,2024-11-20T17:35:24.450000
|
||||
CVE-2024-26281,0,0,a849d619186af504504fa06c72a1de5232d101cf0e09841ceadc9c64335b2847,2024-11-20T17:35:24.450000
|
||||
CVE-2024-26282,0,0,2415bbc5102339f312e8121d8b848d8a0ee85368a51aeb48af30bc997a57bc8a,2024-11-06T23:35:00.770000
|
||||
CVE-2024-26283,0,0,70b62f66f453e79526730a72f92e1afaa7ba86c4fe8f0536398a3c1b2d56ab73,2024-08-29T20:36:24.750000
|
||||
CVE-2024-26284,0,0,ba0c5ee2dd708f43860971c13fc5bba83aa42d583abdba9cf972a949bd992a6b,2024-02-22T19:07:27.197000
|
||||
@ -250078,7 +250078,7 @@ CVE-2024-27572,0,0,021a88f3c1ae2bf66877708ae71a24ab68a5a10fe16311950a18df580d61c
|
||||
CVE-2024-27574,0,0,3445d7e232fea473b297543f2639b454fd942ac9a4758abe8e2e7d31ea60e498,2024-07-03T01:50:42.303000
|
||||
CVE-2024-27575,0,0,be8794a9d53d194bc575e7dee32b34180e95b0c9ca647d9bec212ab94e155297,2024-07-03T01:50:43.093000
|
||||
CVE-2024-2758,0,0,83f18458ab99013ac8c623c0e7eb4bfe2c9f8eaa4e32e7c3d8c905cc1a10e95f,2024-10-30T19:35:10.840000
|
||||
CVE-2024-2759,0,1,8fccf2a38a3368754121197f810ef4f77572bc3639a0dab551027dac0b629c6b,2024-11-20T18:35:20.200000
|
||||
CVE-2024-2759,0,0,8fccf2a38a3368754121197f810ef4f77572bc3639a0dab551027dac0b629c6b,2024-11-20T18:35:20.200000
|
||||
CVE-2024-27592,0,0,2bb1866167f07ee9274a3bf581a1ca5a19a85b09e387c0707a33412074dd7fff,2024-11-14T20:35:16.207000
|
||||
CVE-2024-27593,0,0,029f3c2e91f81eb13ffd203db20809d92acce3f5ac8b5078e84e11d1f4fdb2ab,2024-07-03T01:50:43.897000
|
||||
CVE-2024-2760,0,0,85c06c3412f2f06c20f37186e39e8f13a8e65a1960bf456bbd20de54d50a8907,2024-09-05T23:15:12.103000
|
||||
@ -250450,7 +250450,7 @@ CVE-2024-28064,0,0,5db58ab15827f5d89b98fe3165771037627d7f9c473b580f2abd9ddc572df
|
||||
CVE-2024-28065,0,0,e0f1de1046eacd4012e9d6249d2050e67e395f04094ef510445210074f331722,2024-04-08T18:49:25.863000
|
||||
CVE-2024-28066,0,0,c2a2736221464f46eb769fe0b6456e8f036fffd40dc0d59a61172bd4b1ad730b,2024-08-15T15:35:07.070000
|
||||
CVE-2024-28067,0,0,a4ab36c1a0f02cd85391b8205ae6018b62f1e3ce44037e321802482d111c11e9,2024-10-30T19:35:09.503000
|
||||
CVE-2024-28068,0,1,4fbfbac86c2329a3432aa6f25961e53ef015ff37937ef76408aee78939ca2066,2024-11-20T17:35:25.313000
|
||||
CVE-2024-28068,0,0,4fbfbac86c2329a3432aa6f25961e53ef015ff37937ef76408aee78939ca2066,2024-11-20T17:35:25.313000
|
||||
CVE-2024-28069,0,0,c685346bb55bf7387451d2fbf1405ced89c60d435f78a40193e6458bfa4c25b5,2024-08-02T21:35:20.240000
|
||||
CVE-2024-2807,0,0,72cbbe4530c555d4dd2940aeac6ca3cb99d0e169b305a79bbc9962a7b891ce9f,2024-05-17T02:38:31.100000
|
||||
CVE-2024-28070,0,0,b02bed99aa18fb94d77393e8a0bab2512136cfff81f1cb82c2c934d3f0ee20db,2024-03-17T22:38:29.433000
|
||||
@ -251297,7 +251297,7 @@ CVE-2024-29278,0,0,1c7d83867b262b09f27588e31bf9841e3af6bdfc0d72746f40dee1d45734a
|
||||
CVE-2024-2928,0,0,1d00a619d6223f6fddadfce8ecd76fa5d6f829b8d361b3e4066e910bc6258ce4,2024-10-11T15:28:03.530000
|
||||
CVE-2024-2929,0,0,513249311f09defaddca00249c92a4d2f3037014552979e20d0e342694062636,2024-03-26T17:09:53.043000
|
||||
CVE-2024-29291,0,0,63e881e67f8d85b826801f0c870d1358f1a422a57593ef79bb6bae9024abdbc2,2024-08-02T01:15:58.367000
|
||||
CVE-2024-29292,1,1,f9ce2bfafc7aec21107dd061a2982af230bf54b887c310d3c057e28ff4639d7d,2024-11-20T18:15:22.970000
|
||||
CVE-2024-29292,0,0,f9ce2bfafc7aec21107dd061a2982af230bf54b887c310d3c057e28ff4639d7d,2024-11-20T18:15:22.970000
|
||||
CVE-2024-29296,0,0,196ce9fc64e2de40c4aad14cdb78662ded04058e63416a22f9fb231921284e33,2024-08-01T13:49:29.143000
|
||||
CVE-2024-2930,0,0,2e48243b295a8e93d53a35219b2be0089b750f595ca7624319aaf969e99aaaca,2024-05-17T02:38:37.687000
|
||||
CVE-2024-29301,0,0,fd6e891fb9a2f358e58da35cd58c20873301588e91f1b0a5190d88e70e1e8b21,2024-08-05T15:35:14.157000
|
||||
@ -252175,7 +252175,7 @@ CVE-2024-30473,0,0,cc643ea6610c054923dcda820bdbaeee3470f2fed9befe993862cdd8d5602
|
||||
CVE-2024-30477,0,0,2a9c94bd63166efd66be5d42497334130f49f4b0acff68b2e8385a53a877c218,2024-04-01T01:12:59.077000
|
||||
CVE-2024-30478,0,0,8648debe6405c1216a86c901736f7e8905eccc7e01f0ae6ab2126aef21a3be15,2024-04-01T01:12:59.077000
|
||||
CVE-2024-30479,0,0,dc5972e51ae5c4d9085a312951d31c7a1307033adf582d496a71c4016c267016,2024-05-17T18:36:05.263000
|
||||
CVE-2024-3048,0,1,f9feeaa162c2ed25a6f521625ce5d52a1c23a8331ff895073074f6c4f57088c6,2024-11-20T18:35:21.557000
|
||||
CVE-2024-3048,0,0,f9feeaa162c2ed25a6f521625ce5d52a1c23a8331ff895073074f6c4f57088c6,2024-11-20T18:35:21.557000
|
||||
CVE-2024-30480,0,0,b33b7f57a3321cd5daad33e04d6baf951eb974f794b47e5823d0c4fbb0662cf8,2024-05-17T18:36:05.263000
|
||||
CVE-2024-30481,0,0,f260eed3e75ce7805654963acb1b9a08407e71ffc153893529b554eea634e098,2024-10-08T20:49:44.620000
|
||||
CVE-2024-30482,0,0,10ca3e420c318bd7efd1d9ff7c0685797885e5c3c9336d5f9e0ee32d2856df9c,2024-04-01T01:12:59.077000
|
||||
@ -252400,7 +252400,7 @@ CVE-2024-30736,0,0,2ced33d674490f24caa86d9cd5af28449006fe8e43616ef44cf265003015a
|
||||
CVE-2024-30737,0,0,061625de72d7496c66f4433249e7e460e27160d9df381544095455b128a43032,2024-05-27T01:15:20.303000
|
||||
CVE-2024-3074,0,0,692263c5307e015d32e912e35fe257a32ec29872ecbd1850dca3dc8eb976c202,2024-05-02T18:00:37.360000
|
||||
CVE-2024-3075,0,0,03cbf98d3e79eb701c4183fdc55446e630b64ce247873cfbbe161828125e0010,2024-04-26T12:58:17.720000
|
||||
CVE-2024-3076,0,1,aa6fc3b51d3057a74b1d22b857f3c37eb304520775132fc3224dcd14e2c0d120,2024-11-20T18:35:21.813000
|
||||
CVE-2024-3076,0,0,aa6fc3b51d3057a74b1d22b857f3c37eb304520775132fc3224dcd14e2c0d120,2024-11-20T18:35:21.813000
|
||||
CVE-2024-3077,0,0,13d0f653548f6e08a428cbd5c76a54d70134d49ca71fc1c43b86001e7767738f,2024-03-29T12:45:02.937000
|
||||
CVE-2024-3078,0,0,42b453b3e6a827e37a8a77bcf4c4ca7669e48d95d9df326c975a16f05e6cc7f4,2024-05-17T02:39:42.337000
|
||||
CVE-2024-3079,0,0,f1f95675216f703c162f7205baecbbd680e7e08a69a3f6cb5ab9f6df26e36eab,2024-06-17T12:43:31.090000
|
||||
@ -253877,7 +253877,7 @@ CVE-2024-32806,0,0,03e8d32999c3a5efc79b13bc3e4fb18e94e6d99ea0a7399671612649aa44b
|
||||
CVE-2024-32807,0,0,5fcb2610b0f8f7193730bfceb1c8cf9ee7f988425363a4303f2b55142270c2db,2024-05-17T10:15:10.997000
|
||||
CVE-2024-32808,0,0,0e1a2b235c3b7bd46a18d577ca8639513bc942571c1f797d2fd3e36c55454f3d,2024-04-24T13:39:42.883000
|
||||
CVE-2024-32809,0,0,d55b0fbad69973f351986c9fcc53d0cd143d959400089a8fce8f63772d8e13b1,2024-05-17T18:35:35.070000
|
||||
CVE-2024-3281,0,1,de7ffacc35df72293a3157176532645298406fac4e018f3e7cd35c3df239f98c,2024-11-20T18:35:22.063000
|
||||
CVE-2024-3281,0,0,de7ffacc35df72293a3157176532645298406fac4e018f3e7cd35c3df239f98c,2024-11-20T18:35:22.063000
|
||||
CVE-2024-32810,0,0,6a865bd7e3c08616d003142afb839e5afabf0b835ab7b19d068e7100b21221a2,2024-05-03T12:48:41.067000
|
||||
CVE-2024-32811,0,0,638081b1e5b1b690a9536c1d45979321fbdc88533eddc89e04dcc94ec3198760,2024-06-10T02:52:08.267000
|
||||
CVE-2024-32812,0,0,86238ccef9a58545902a9744b568cff6fc1f9270a86a5025dcc4c13bf66f2c0c,2024-04-24T13:39:42.883000
|
||||
@ -254084,19 +254084,19 @@ CVE-2024-33010,0,0,e00198869c2ea66a1314ffe3bf412f3093fb7a3278c73287d700256b4d598
|
||||
CVE-2024-33011,0,0,cbf49377b15ca0b951fbea2819100320e72a74607f7553c2afc6bcaa9b9a7391,2024-08-06T16:30:24.547000
|
||||
CVE-2024-33012,0,0,4bc8f3dea2723c5fcb6a62672461d04feb3241b18be807657aeefdbc2f2fbe3b,2024-08-06T16:30:24.547000
|
||||
CVE-2024-33013,0,0,1e8badcd9b1e7582698c15c832838b3a3258759bce9d6a4b7896097159c5c1d1,2024-08-06T16:30:24.547000
|
||||
CVE-2024-33014,0,0,8f9120c3394c0a348cc97ec4aacda2572b3da3cf93af4a1acad6f607f123b1c0,2024-08-06T16:30:24.547000
|
||||
CVE-2024-33015,0,0,ce73ea710474934199a1b7316118bad3029df84894826c41295126d49b12424d,2024-08-06T16:30:24.547000
|
||||
CVE-2024-33014,0,1,17e65450462618fd1135ee3cf9ac036700ee9d40a64a41db01cd1bbba939f042,2024-11-20T20:35:37.887000
|
||||
CVE-2024-33015,0,1,a8faf6d542966c6a6bbb9517a15e1af6c045ca706ac2d2c8f4197dbd64d727dd,2024-11-20T19:57:11.903000
|
||||
CVE-2024-33016,0,0,991f608b14254739266aae02c613708ce2455fe761b6eeba78de6d8d7351dede,2024-09-03T12:59:02.453000
|
||||
CVE-2024-33018,0,0,b677fd6b54a53c9fee206f01ccf5cdc56faac0beecc10ec63cf0263aa9b7b8be,2024-08-06T16:30:24.547000
|
||||
CVE-2024-33019,0,0,34a99c9d1b449404e5d8c52c560d1d3907132ed509c8da0b6b1fad284d5628fd,2024-08-06T16:30:24.547000
|
||||
CVE-2024-33018,0,1,5668fd00cc6a4f6e5313830c182c4ab287cb3062984cf4e6c3f55f1036709de8,2024-11-20T19:40:37.843000
|
||||
CVE-2024-33019,0,1,43905da547e20ddc5999184db945c6cc5763f5423f4b90906083cb2057c0dd04,2024-11-20T19:21:14.377000
|
||||
CVE-2024-3302,0,0,10a0a5360346a347e0e1404168c46ba9e22d839c53347c2b379db8443b59f174,2024-07-03T02:06:08.953000
|
||||
CVE-2024-33020,0,0,5b2c148292d798fbf48eb3ae036b19ba78743fd366bcdd6079bd179d27bddd46,2024-08-06T16:30:24.547000
|
||||
CVE-2024-33021,0,0,3a1ba5e7b1ccc84931a210c3aa2fd9306700a856479629c42d72d707fc0b0cef,2024-08-06T16:30:24.547000
|
||||
CVE-2024-33022,0,0,2281f81217bc9f815665dbe8ab2d4a85a82f001011bcba67b813d20c14f8b90e,2024-08-06T16:30:24.547000
|
||||
CVE-2024-33023,0,0,f07c6961c818e42fa07a4c877bc946312ec641a3f9e47b5477d110c399e86fb6,2024-08-06T16:30:24.547000
|
||||
CVE-2024-33024,0,0,4969e5bddaca7911ae4fd3ce18abf8425c6d1ea66030ccd772575a2259497f2a,2024-08-06T16:30:24.547000
|
||||
CVE-2024-33025,0,0,b2224958808cef69179c29751ac5699dda8398fa1ca6d6be644feb0949d642b0,2024-08-06T16:30:24.547000
|
||||
CVE-2024-33026,0,0,298d33f6a8bfb6f36fcf1be4fa982f6af985ae195af9a3a0c45ae097558f81f9,2024-08-06T16:30:24.547000
|
||||
CVE-2024-33020,0,1,a98b30d9430b4e634a6198b5cb02526958ea7702d8e7c8f8c806c0d1284269dd,2024-11-20T19:24:57.907000
|
||||
CVE-2024-33021,0,1,ccd01207b2241212fedfd15a9aa7e1a05983d0c04d0b053228e996edcbdee17f,2024-11-20T19:28:00.557000
|
||||
CVE-2024-33022,0,1,f060fe28200ec9f2009585e6ba8005e628f9fc8acb49fd6512a882e7b277657d,2024-11-20T19:30:31.947000
|
||||
CVE-2024-33023,0,1,2d72e6e33acd2f182cd77b86d2f40ab4dca52bd8febe3b5a3cd995e64aea36f7,2024-11-20T19:34:07.593000
|
||||
CVE-2024-33024,0,1,7b658eb6457893e6692bb760b7ef91b7768c00bde3bd8521c906a131d1b97d00,2024-11-20T19:42:03.107000
|
||||
CVE-2024-33025,0,1,893305928fc94d76559d9da2ebd1b665dd3adfd857cbedb26a1df72241603132,2024-11-20T19:53:16.570000
|
||||
CVE-2024-33026,0,1,9eb82ed6c143fbfb40eba05956705e6f444a64a5c4af3cff6bb7582ba78b80c6,2024-11-20T19:37:28.193000
|
||||
CVE-2024-33027,0,0,26992809153af0a3cde7fd5f54a863ef84036157b94429656d19ba0fceae691f,2024-11-20T14:38:17.037000
|
||||
CVE-2024-33028,0,0,9556e6342bb305ff319688a3dfdbf71c607a65772f46730c46709cc81d9e4868,2024-11-20T14:39:07.953000
|
||||
CVE-2024-33029,0,0,62f4abf9d5534812dcbd495946ad70608b570bfbd1504fa70c29b97162ab7cc8,2024-11-07T19:54:49.197000
|
||||
@ -254289,6 +254289,7 @@ CVE-2024-33435,0,0,7db2665c6496dae0749e042f8d814063672abd8fcceac696d209fd93a501e
|
||||
CVE-2024-33436,0,0,4b7aad63b1a9d18447e5bf42251db2f590710ce8a67d312a75dbe09e1f3c4107,2024-05-01T13:02:20.750000
|
||||
CVE-2024-33437,0,0,98a2b6e10245b112bb331b45bcb3f30a0dabc9110f63c643d94fcc31a61289bb,2024-08-01T13:51:56.957000
|
||||
CVE-2024-33438,0,0,5149b18a46d53268b7670d8b6f23e45b58f0f7e28bd1fbf2d1e49eff1651e3a5,2024-08-01T13:51:57.143000
|
||||
CVE-2024-33439,1,1,cff768f052081c25bf2badebc993fe13750f42919c9e40af177c06d148312b2d,2024-11-20T19:15:06.010000
|
||||
CVE-2024-3344,0,0,70bfed73bbd8c0224afca425b004f1e6ab3832350ac16bb40ba0f3295e2c6f92,2024-04-11T12:47:44.137000
|
||||
CVE-2024-33442,0,0,3bf0c7079aa4cdea0cf4fc3dc62abf7d3d6d92d11b677d6553e5342d569d6775,2024-07-03T01:58:14.593000
|
||||
CVE-2024-33443,0,0,35242e2b0082b15f0bb5de03b6dc07c30701907ec01624317337d782f850f813,2024-07-03T01:58:15.370000
|
||||
@ -254799,7 +254800,7 @@ CVE-2024-34084,0,0,7d9440ddf04c82559a24e924ee696f81ed9dcd7a55ec24907b743742e82c1
|
||||
CVE-2024-34085,0,0,5d94e0e1234d28ea1392eb258fba225a24d0a9939e78b10ffa8b6f875a256c7c,2024-05-14T19:17:55.627000
|
||||
CVE-2024-34086,0,0,104df8351545cea86a5aeab75846aeda1282b00a21f2f9f835c10597aaf719fa,2024-05-14T19:17:55.627000
|
||||
CVE-2024-34087,0,0,b43933510c12517787f75bed2112cdd5360e703f06365c71649e9989d251d8cd,2024-08-28T16:35:22.590000
|
||||
CVE-2024-34088,0,1,a80408224d364ca41e4a201f640dddc7eb78225a35e7bd8d6873b90011d1813f,2024-11-20T17:35:26.147000
|
||||
CVE-2024-34088,0,0,a80408224d364ca41e4a201f640dddc7eb78225a35e7bd8d6873b90011d1813f,2024-11-20T17:35:26.147000
|
||||
CVE-2024-34089,0,0,5e7107f526e1d12d254978d5169bae34a870123e709df2c6ba63a16f1fef24b8,2024-05-06T19:53:38.797000
|
||||
CVE-2024-34090,0,0,bd5741ae5c881eed969a6846397df746acefb1b3b796191e30ee091ebe5a715d,2024-11-01T20:35:10.933000
|
||||
CVE-2024-34091,0,0,316b2e1c1466fafa03f21d7850553c09c4a77fce34562e440629956736be2b9a,2024-07-03T01:59:22.050000
|
||||
@ -254980,7 +254981,7 @@ CVE-2024-34361,0,0,5168cc961b7acd32b3151096d37c0368d10fe552c02e8547e9bea1142d188
|
||||
CVE-2024-34362,0,0,5719c5589fbb1889037578d1ce8361ba73ba257d793c16ea51ae0d2d5ac6391c,2024-06-12T13:29:07.643000
|
||||
CVE-2024-34363,0,0,29fcce7b6e913bdead357ab5b9389335d62a3a260d09f4e099131952c971f5ff,2024-06-11T17:44:14.347000
|
||||
CVE-2024-34364,0,0,16d3b1c447511f5ba065cf18435b78c90cb58ee194acb420be34d56a1e4088a7,2024-06-11T17:20:27.203000
|
||||
CVE-2024-34365,0,1,2a15532a52d93b882067af0f92df755a1c94eaf5d9ad1f120aa56a5cf6419d41,2024-11-20T17:35:27.017000
|
||||
CVE-2024-34365,0,0,2a15532a52d93b882067af0f92df755a1c94eaf5d9ad1f120aa56a5cf6419d41,2024-11-20T17:35:27.017000
|
||||
CVE-2024-34366,0,0,f5fb53fee5d33e6c04dfd75d1bc82cf4356fcf1cec4db7359e4c88746e95e769,2024-05-06T19:53:38.797000
|
||||
CVE-2024-34367,0,0,b938dbe32bc0f2b2b08fe9afbb49f3e7437c5991332ead460ffded5315763ead,2024-05-06T19:53:38.797000
|
||||
CVE-2024-34368,0,0,3be6ba8c94d9b0485281637fbc03b0202fd9deceadc0680ff9568480d31bd12b,2024-05-06T19:53:38.797000
|
||||
@ -255101,7 +255102,7 @@ CVE-2024-34481,0,0,e2a3e65c4103fe32da9193eb433184ea87fbd297993203e84b18d9ad821ef
|
||||
CVE-2024-34483,0,0,6f3bfc57c4ac08b52bc633ea80c521be2c99b03f22d863fb736d441dc611c592,2024-07-03T02:00:16.293000
|
||||
CVE-2024-34484,0,0,1f03b9dcfd21c2d1e1e4109b895d9faab7d5dde86fb48f1db146804d6f2ea32a,2024-05-06T12:44:56.377000
|
||||
CVE-2024-34486,0,0,f93c0e2186ca66e0dc95b1ea19ad0932973e939f81793a6d44ba3fea5b8487f5,2024-08-01T13:52:24.443000
|
||||
CVE-2024-34487,0,1,f8a502380ab1e377fb91e288027c5b0a32280a04c3867681b304cf44a4ef3e0b,2024-11-20T17:35:27.303000
|
||||
CVE-2024-34487,0,0,f8a502380ab1e377fb91e288027c5b0a32280a04c3867681b304cf44a4ef3e0b,2024-11-20T17:35:27.303000
|
||||
CVE-2024-34488,0,0,bd1886e792bd0f0be5174d43785b1ee8c3d2805a0b92328a691bf28c3b9e55ad,2024-07-03T02:00:17.670000
|
||||
CVE-2024-34489,0,0,98fc4bbdad28e1f470f6bbf8edfd27b4d57977594296e589fe4b4857cec1a304,2024-07-03T02:00:18.727000
|
||||
CVE-2024-34490,0,0,8682749851a19fd719239443e2502b58b0b536d71d97e88f6d39bdad053f0e7a,2024-07-03T02:00:19.953000
|
||||
@ -255307,7 +255308,7 @@ CVE-2024-34706,0,0,d37668f824cae92c94d3d4080655a3f7931abe160a13955740cf593692644
|
||||
CVE-2024-34707,0,0,92351a72b9df02ccb187c386dac1b1a7856d7ac67d7318f75d8c78237ff0f469,2024-05-14T16:12:23.490000
|
||||
CVE-2024-34708,0,0,ddcff80f674ca3ed50080eea78a77d561cbc250193cb5d568a1a82a28c5bf6cc,2024-05-14T16:12:23.490000
|
||||
CVE-2024-34709,0,0,adf6d2b81a5e40a88a3da30770e9ce95dbdae2bb46c4d3799e84ccb57fa2d50c,2024-05-14T16:12:23.490000
|
||||
CVE-2024-3471,0,1,73ff09fc2c28ad3524b5b1ca804dca3bd6fc9f46aa8366de3c284efe7aa3af53,2024-11-20T18:35:22.923000
|
||||
CVE-2024-3471,0,0,73ff09fc2c28ad3524b5b1ca804dca3bd6fc9f46aa8366de3c284efe7aa3af53,2024-11-20T18:35:22.923000
|
||||
CVE-2024-34710,0,0,7965ba19eedea6a8e4d4ccc9754ad83b6a2971391afa999b1f4b01b06b69f205,2024-05-21T12:37:59.687000
|
||||
CVE-2024-34712,0,0,3f1dde6d42ea063d9e476d7cbf6f83ce13ff1b68be852ea9528dcb38a2c181a5,2024-05-14T19:17:55.627000
|
||||
CVE-2024-34713,0,0,dade094148c26177c5c5e0a9b6aed3312784fd8ef4a22e49caf276d789f44a17,2024-05-14T19:17:55.627000
|
||||
@ -255663,7 +255664,7 @@ CVE-2024-35272,0,0,4c1a47b56d7417b088998b4603214b936945d403bf6190e9e2c7cd926cf7a
|
||||
CVE-2024-35274,0,0,469db2ced6f82069a481a1e075e780926859c353f46e8b5b311a2688050ba842,2024-11-13T17:01:16.850000
|
||||
CVE-2024-3528,0,0,c96e1e132295c243d4fa4a90d8abf77e41d771305ddbcf81d644bca2cdde7da0,2024-05-17T02:39:59.157000
|
||||
CVE-2024-35282,0,0,fe23f4116601299cd085746b33d91adab4014743ea1af63d79bf69af6ebb68e0,2024-09-20T19:44:17.557000
|
||||
CVE-2024-35283,0,1,ca0b3f00a38824c3aed71cdb1138e6e91cf615412bca500f8e6650cd8dfad427,2024-11-20T18:35:20.470000
|
||||
CVE-2024-35283,0,0,ca0b3f00a38824c3aed71cdb1138e6e91cf615412bca500f8e6650cd8dfad427,2024-11-20T18:35:20.470000
|
||||
CVE-2024-35284,0,0,3a94c448d00dd5059f3fd361118e6cd65d80e9412861f2d6774f390c6aa71d9d,2024-05-29T19:50:25.303000
|
||||
CVE-2024-35285,0,0,76a41b3575cee58df6a92d4d67ad746bb5986287224218feccad1dc78e0acbbc,2024-10-23T15:12:34.673000
|
||||
CVE-2024-35286,0,0,750facd12e2c01a8ba1e0bf72f7c63f3d0fd7caac4133b6f0d25286457d0ae82,2024-10-23T15:12:34.673000
|
||||
@ -256506,7 +256507,7 @@ CVE-2024-36286,0,0,7d09221a564e0c2df0ff5611559a80db23ca3f0bea1adae57d3ef567da0d5
|
||||
CVE-2024-36287,0,0,58cd0f96868d0f87ad27a0900cc18166044a8ed0400369c58b15a0b5d92f53af,2024-08-07T16:13:00.603000
|
||||
CVE-2024-36288,0,0,f27253452fa242bd38d9e8a6852071d40fc41ce412d6b25543b2bb1fcbe8c01c,2024-07-15T07:15:05.230000
|
||||
CVE-2024-36289,0,0,c81e4dcba680502adf1e6cb5fb9cf85188de117b98260b47eb77431186ce409a,2024-07-03T02:03:02.973000
|
||||
CVE-2024-3629,0,1,02f51104eec9b528b26df3269b71deb72cfae6ae02d6f7b5853e996dbdb9db74,2024-11-20T18:35:23.183000
|
||||
CVE-2024-3629,0,0,02f51104eec9b528b26df3269b71deb72cfae6ae02d6f7b5853e996dbdb9db74,2024-11-20T18:35:23.183000
|
||||
CVE-2024-36294,0,0,ab00c27961eace667f9ea5e5ad7b6cd8c0f468a3668d36549eb32d498e33b135,2024-11-15T14:00:09.720000
|
||||
CVE-2024-3630,0,0,bdc2182e4eec98ff9c8b84bc3c1a34a4c9de2619b28e4dcc17481a1a7a7b6f08,2024-11-07T16:35:19.253000
|
||||
CVE-2024-36302,0,0,97f37a0491b91273ea881320e1230a32004b42aecc2ad6ef769b0832e9456ade,2024-07-03T02:03:03.750000
|
||||
@ -256596,7 +256597,7 @@ CVE-2024-36434,0,0,8fba84c9c20ed6e9e38e371f6a7314cc80d9ab38ed1fc3ffdc1e7c8b52186
|
||||
CVE-2024-36435,0,0,42aa941ee425d333c537ed403b5f168d15cf55caec805a299bb4c45521e1c947,2024-08-01T13:52:50.527000
|
||||
CVE-2024-36438,0,0,fcbe2e02dbfe7753ae10ee196c2c3d66e08c15fdea4edc31b3da8e63f435a898,2024-08-01T13:52:51.240000
|
||||
CVE-2024-36439,0,0,53640dcff33bc5be3aae865e96f45e5b04acc4f9a249851cd066fcd8fafec018,2024-08-23T16:18:28.547000
|
||||
CVE-2024-3644,0,1,289cd84d76eba7566a7f3a12e6fe432fd296cc1682decfe552f880b571bb7420,2024-11-20T18:35:23.437000
|
||||
CVE-2024-3644,0,0,289cd84d76eba7566a7f3a12e6fe432fd296cc1682decfe552f880b571bb7420,2024-11-20T18:35:23.437000
|
||||
CVE-2024-36440,0,0,59ab2a39d6c2dd526eff525f8a252fc4b6d83dfd01305d7415645bc4cb89310a,2024-08-23T16:18:28.547000
|
||||
CVE-2024-36441,0,0,2b88ed4b9b9e3ad047e589055d5c5d9766a5fd9d7690c7cf12f1bc3c5c619d9d,2024-08-23T16:18:28.547000
|
||||
CVE-2024-36442,0,0,1c399162807c537e1f340452dbe4754afa92739719bfa0084f2ebab835ea4147,2024-08-23T16:18:28.547000
|
||||
@ -262860,6 +262861,8 @@ CVE-2024-45507,0,0,b2cf0920dcb75db868de7b4afd51449cea360da72164b9b7e7a575176b0c1
|
||||
CVE-2024-45508,0,0,a7bf13ff5f2bf318e53d0cc8b12c1b5ac7eae45f1991e7b683a2e3673a166bb9,2024-09-04T16:44:08.247000
|
||||
CVE-2024-45509,0,0,2da4a07b41eb99a3059398ff74aeb7ba3be7995744fd94f415c5c3e9d41f0b5f,2024-09-04T16:45:08.597000
|
||||
CVE-2024-4551,0,0,f0a0f74f6dfab215971682e84a8c3d35d9da568954bf14d9189d7462b5493bd2,2024-09-20T00:24:08.597000
|
||||
CVE-2024-45510,1,1,512f8eea14a2ce4c554c8faebda6469e621968abeb5177b5849fd159d5e2820a,2024-11-20T20:15:18.943000
|
||||
CVE-2024-45511,1,1,a33b00ed5286e02a99a5d7d32b95a722e842936b42cb3272cb3598da231788bd,2024-11-20T19:15:06.123000
|
||||
CVE-2024-45518,0,0,9735413fa02ac827dc734eb603d392ab15d93caac171e362b785c2b23afa3a6f,2024-10-30T21:23:59.893000
|
||||
CVE-2024-45519,0,0,ba02770fed1525b5b4f0df98b6cf30b24de2e09da9e676dc121caef23db2992b,2024-10-23T15:39:23.220000
|
||||
CVE-2024-4552,0,0,a910e848f992d4848b5a9057809234cfe8833a167abb01396097dc34db4ca3d3,2024-06-04T16:57:41.053000
|
||||
@ -262927,10 +262930,10 @@ CVE-2024-45678,0,0,a1fda46a16546e5971e32d47cf6c55c6e5adf9e7e7bc6498d2c3cdc35ca99
|
||||
CVE-2024-45679,0,0,b98f85803530a208de6f955471a00fda8462357bfd07c53d204959dc086af47d,2024-09-20T12:30:51.220000
|
||||
CVE-2024-4568,0,0,950b62937f2f303cb16f164d002be64527131317e5dfff26daecb96b6bec4236,2024-05-07T13:39:32.710000
|
||||
CVE-2024-45682,0,0,8584442aa3e66ef486ff4d0e65e36dc65b16a5528e312d936a157a665ef44302,2024-09-27T18:54:51.820000
|
||||
CVE-2024-45689,0,0,c7e979f31e1bde92d5b4da5387428b58120f1325596ab42847b6eba43ff3aeb7,2024-11-20T11:15:05.337000
|
||||
CVE-2024-45689,0,1,6e124b6ad87a6e953df96f9e4b72e7f165b5e26f7ae6e42a154710793d167512,2024-11-20T20:35:10.157000
|
||||
CVE-2024-4569,0,0,2e4b27b05be8561bd3f260b3ccf0eed0d11ea74483878f5df5227737faa1c038,2024-06-28T13:10:05.153000
|
||||
CVE-2024-45690,0,0,74454f7c531bfb80a37c3fdc1f763db2a09dcbe2ca0c5bb3597e3500efe2f820,2024-11-20T11:15:05.413000
|
||||
CVE-2024-45691,0,0,ca4f55343dfa025487a6d3aee03385fc29227f8ef98bfe91847acc674bc2317b,2024-11-20T11:15:05.490000
|
||||
CVE-2024-45691,0,1,6cf0734b3b1bbfe46d94206888f2657e4fd0103a6560ef66f8d239ce88dda949,2024-11-20T20:35:10.377000
|
||||
CVE-2024-45692,0,0,281ed60ed9431c734132a4f1fca034600bdda2bdb5b83bc44745bc26a826447d,2024-09-05T21:35:14.337000
|
||||
CVE-2024-45693,0,0,8326a6a6c02d5129a5009d67c10554cd90e2c8aefe000e24bf1668842bfb6519,2024-10-17T20:21:11.913000
|
||||
CVE-2024-45694,0,0,6df0853247a969905230185a9047d7f0b5d3157f1a7bc76614dde5322218c3ae,2024-09-17T18:40:07.243000
|
||||
@ -263450,21 +263453,21 @@ CVE-2024-46764,0,0,12c93d62cf976e0fac2b5ba84bf2f54a4d1d5062174357996a20e7c4bd1fa
|
||||
CVE-2024-46765,0,0,584f96269688e10aedc11057947f82fa03feb9c9ca3ecb2a522bbf502bad2684,2024-09-26T13:24:29.697000
|
||||
CVE-2024-46766,0,0,55d63c81e0644404ba2b3c5eec2e0e368cac985d5fcde38c97950713f33905c3,2024-09-23T16:15:23.823000
|
||||
CVE-2024-46767,0,0,fd3b90678eac65bcb3233c07c19427fffd1566d14f3f9a8041e6042771984f5b,2024-09-20T12:30:51.220000
|
||||
CVE-2024-46768,0,1,ee740127af67ae8086ba37a9f2512a554b9d048c382b04d9070cf9b51579f1a0,2024-11-20T18:19:35.033000
|
||||
CVE-2024-46768,0,0,ee740127af67ae8086ba37a9f2512a554b9d048c382b04d9070cf9b51579f1a0,2024-11-20T18:19:35.033000
|
||||
CVE-2024-46769,0,0,c9bbe9575cc2848fce277d2f64a3b4e07e53acfd7fdf23d95dd87f904a651799,2024-09-30T12:44:27.907000
|
||||
CVE-2024-4677,0,0,06b789b4e22353188f4fa1dbcfc045ef487187889647b738ddd6f1b3dabcd887,2024-06-04T19:20:45.830000
|
||||
CVE-2024-46770,0,0,7f952820dc90535bd167d3f017a589524ac6f56b9d3dfae2b4b9bd0b58f79ea0,2024-09-23T16:13:25.563000
|
||||
CVE-2024-46771,0,1,71a4de85b53379f94526037df901498ea6ac4fdcecd02ba212f18e76a39be045,2024-11-20T18:20:03.130000
|
||||
CVE-2024-46771,0,0,71a4de85b53379f94526037df901498ea6ac4fdcecd02ba212f18e76a39be045,2024-11-20T18:20:03.130000
|
||||
CVE-2024-46772,0,0,a8ae53586f05d332df3222762c5e7961597b69a5b7445f0db6ae4d1db439b4de,2024-09-23T16:52:17.577000
|
||||
CVE-2024-46773,0,0,d50dc13b3db60a3fbb1947c3c76c4140c6ced2f89d983703c7f17bd27e5be084,2024-09-23T16:51:59.983000
|
||||
CVE-2024-46774,0,1,674493f028c34fd9192163f3608c7ec506bedd3e768bd43034605534a0b63a17,2024-11-20T18:19:00.327000
|
||||
CVE-2024-46775,0,1,262156bbdb73176f9653b3b68eae0bc78294be6056ada06350ce5793116d537a,2024-11-20T18:17:13.750000
|
||||
CVE-2024-46776,0,1,b229f205a3358474780929aaa686adb3d080d222663cdf9e1e6c1a3682667d66,2024-11-20T17:56:57.290000
|
||||
CVE-2024-46777,0,1,65946aeaba38bf8caf0ac1d615bdf194883b7f45fa3d6f1a8acae5d588c93e92,2024-11-20T17:56:02.287000
|
||||
CVE-2024-46778,0,1,63f5cb21b3c66a3fbccb3f4f323eed19d16dbd087dd987cb02ef3d17b8ecfb2c,2024-11-20T17:40:37.847000
|
||||
CVE-2024-46774,0,0,674493f028c34fd9192163f3608c7ec506bedd3e768bd43034605534a0b63a17,2024-11-20T18:19:00.327000
|
||||
CVE-2024-46775,0,0,262156bbdb73176f9653b3b68eae0bc78294be6056ada06350ce5793116d537a,2024-11-20T18:17:13.750000
|
||||
CVE-2024-46776,0,0,b229f205a3358474780929aaa686adb3d080d222663cdf9e1e6c1a3682667d66,2024-11-20T17:56:57.290000
|
||||
CVE-2024-46777,0,0,65946aeaba38bf8caf0ac1d615bdf194883b7f45fa3d6f1a8acae5d588c93e92,2024-11-20T17:56:02.287000
|
||||
CVE-2024-46778,0,0,63f5cb21b3c66a3fbccb3f4f323eed19d16dbd087dd987cb02ef3d17b8ecfb2c,2024-11-20T17:40:37.847000
|
||||
CVE-2024-46779,0,0,9459e2bbf4547b8d8450c1952a14b96461b698fba144de37fd66253536f5c10f,2024-09-23T16:37:51.473000
|
||||
CVE-2024-4678,0,0,be695eaab1f72a88b10d5b9b54afd539ecd5dccc02b3dde1eca881aeeba1ff59,2024-06-04T19:20:45.930000
|
||||
CVE-2024-46780,0,1,f11280a31c667cc558d9097b2fdcbf0e351d3b09c3c67c2e9a5986ac93884fb7,2024-11-20T17:31:54.440000
|
||||
CVE-2024-46780,0,0,f11280a31c667cc558d9097b2fdcbf0e351d3b09c3c67c2e9a5986ac93884fb7,2024-11-20T17:31:54.440000
|
||||
CVE-2024-46781,0,0,b7800767661ad72dc7d9b50173ef44ead44890ec84d2e21b5c9fa258abff2f06,2024-09-23T16:37:07.117000
|
||||
CVE-2024-46782,0,0,8fc9ad3608da20697ed5d3ccf36f03f0ef1fd876169984385298851863cf19f3,2024-09-23T16:32:04.373000
|
||||
CVE-2024-46783,0,0,70531073079a8c8ac29e6e1c446f67895f92dfb43b67b6c609e333e90673bcd9,2024-11-20T15:47:35.273000
|
||||
@ -263473,13 +263476,13 @@ CVE-2024-46785,0,0,3c5b13d46d7bf1096dbbf64131b42dd8dc761cb5c75995e3c1cf54795d428
|
||||
CVE-2024-46786,0,0,25c7670eeacc5e83ba81db4459f557d546315f042b4010db6dd6a4480e89f0e5,2024-09-26T12:48:37.447000
|
||||
CVE-2024-46787,0,0,28621b503bd078f2b0141b3d6d74179143aa95798c87759eebe0f345e318857a,2024-11-20T15:33:08.557000
|
||||
CVE-2024-46788,0,0,695266a8c696b6d7e3425cc0a9ed86e76a0329cbee6a482b93b62801857e8044,2024-09-20T12:30:51.220000
|
||||
CVE-2024-46789,0,1,c3269567de8f6eac1c676e3d988c555c4ae91be4c929b335b733006adf2d460d,2024-11-20T17:27:03.197000
|
||||
CVE-2024-46789,0,0,c3269567de8f6eac1c676e3d988c555c4ae91be4c929b335b733006adf2d460d,2024-11-20T17:27:03.197000
|
||||
CVE-2024-4679,0,0,9bfb1104bd992ff014fab2b1166f6f818504f2232183224a6a702e4c44b2119a,2024-07-02T12:09:16.907000
|
||||
CVE-2024-46790,0,0,d27eade819ed2fd15185afc828dfb8999a9cfdae3e96ed34fd07c06d351f85e6,2024-09-20T12:30:51.220000
|
||||
CVE-2024-46791,0,0,2949ee11720d44bcaa052e660ce7fdc2dacadc36031963879d79e5b14b90b05b,2024-09-20T18:21:19.457000
|
||||
CVE-2024-46792,0,0,5038c4c1693692d5253e8551ff854391bb6738497f066bf8f1ac22d03388831f,2024-09-20T12:30:51.220000
|
||||
CVE-2024-46793,0,0,5452cb2817c8065947f735ef97ead551e1c7be7210a5f52312096dcde22888bc,2024-09-24T16:00:17.977000
|
||||
CVE-2024-46794,0,0,4a5040d28c02875cb7f0ceba00353539020b8be79b10a6b6826a3f96b115ba34,2024-09-20T12:30:51.220000
|
||||
CVE-2024-46794,0,1,3bf5f09cc29c70ce8917817495e3813500614f8aceb69ff6239db0d4936483ae,2024-11-20T20:56:49.150000
|
||||
CVE-2024-46795,0,0,55d6e0bba7bd481c945e6a93dbfcd32f89fd250eb3ae7b4fbde929ae04db9d69,2024-09-20T18:21:04.067000
|
||||
CVE-2024-46796,0,0,28472ecdbcd97592496f972f38ed0e2707ca54f7f2402c660d26ed0e341ec07d,2024-09-20T18:20:35.837000
|
||||
CVE-2024-46797,0,0,239bb9221da06bc577ba6d1fb233ef14e7a13537287f8c044cdc8bb4757e9b22,2024-09-29T15:15:15.837000
|
||||
@ -263499,23 +263502,23 @@ CVE-2024-46809,0,0,dcfa6f78752d8dfd4941368385c7effd649ce285f1db49426196bd75d645e
|
||||
CVE-2024-4681,0,0,fe9d790ee9979c1aca5fe28a3e8115d4c327b815a1753595a7df398a95b1856e,2024-06-04T19:20:46.033000
|
||||
CVE-2024-46810,0,0,d6ed42b54ce1c1237fa733d10c7a872f52146f4cfd255a9fa7accbbb83ebd3f2,2024-10-04T17:43:04.277000
|
||||
CVE-2024-46811,0,0,e3c61e9558dd1a3f131364b8d64c8ba6f14ec560c30f285430f0270477a47445,2024-10-07T14:24:56.860000
|
||||
CVE-2024-46812,0,0,134272cc7effe83799d5018c6b8c85291ae3808b9eeebc0177d5fdded748636a,2024-09-30T12:45:57.823000
|
||||
CVE-2024-46812,0,1,ab25e4957fa6f544eaeadbefeeba1fa4f4f4260c5ec7185c361ae61d213dcd85,2024-11-20T20:48:48.663000
|
||||
CVE-2024-46813,0,0,ec855766c2269aedb12237a993dfb5b55059aae43c85d0e5552568c0bcce8660,2024-10-04T17:38:17.740000
|
||||
CVE-2024-46814,0,0,80befd72986fd4035afe06cedc03a7664f2ffcaf670ef7869d07a2b36466e8ce,2024-10-04T17:27:47.450000
|
||||
CVE-2024-46815,0,1,c299d5fd5955b01dea3d800f7bc23cd424d44f684b18d348ce43ae25f9c523b3,2024-11-20T18:22:12.017000
|
||||
CVE-2024-46816,0,1,65fec096967b53105bad0893cdaafe0a8bb3271c2ee45a1b1df56c13edd560fe,2024-11-20T18:02:52.437000
|
||||
CVE-2024-46817,0,1,5a8208eec476849ff25de3af23936cbbaef5ec006d085abcf7c4f9c88ae2e37c,2024-11-20T17:45:43.893000
|
||||
CVE-2024-46815,0,0,c299d5fd5955b01dea3d800f7bc23cd424d44f684b18d348ce43ae25f9c523b3,2024-11-20T18:22:12.017000
|
||||
CVE-2024-46816,0,0,65fec096967b53105bad0893cdaafe0a8bb3271c2ee45a1b1df56c13edd560fe,2024-11-20T18:02:52.437000
|
||||
CVE-2024-46817,0,0,5a8208eec476849ff25de3af23936cbbaef5ec006d085abcf7c4f9c88ae2e37c,2024-11-20T17:45:43.893000
|
||||
CVE-2024-46818,0,0,fe798b484e17caf3bda06ab6aba71d50cbde163879fa6025cdd90b9e91e24bea,2024-10-04T17:18:36.613000
|
||||
CVE-2024-46819,0,0,48d86dbd2f9dcc09d09972864acc79179bab0022e56037f99c750892b571c5b3,2024-10-04T17:11:00.570000
|
||||
CVE-2024-4682,0,0,b188d20fdb53d2324882bc38bcdbd4c51d4b6beb562fc8362c2866e7563895e8,2024-06-04T19:20:46.140000
|
||||
CVE-2024-46820,0,1,530ef5d90934aa384637a2025e464ca9658f0fb315dfe973fa7d8ac7dac79183,2024-11-20T17:34:05.143000
|
||||
CVE-2024-46820,0,0,530ef5d90934aa384637a2025e464ca9658f0fb315dfe973fa7d8ac7dac79183,2024-11-20T17:34:05.143000
|
||||
CVE-2024-46821,0,0,646f132e7ed27c2717e047a01ec92f6d102c4152b9e0279d740913fed403825d,2024-10-04T17:06:43.573000
|
||||
CVE-2024-46822,0,0,c8a3d9e215b85580ec5917e738992b4dc25efcf9e837d449af86f4aa8203218c,2024-10-02T14:24:01.757000
|
||||
CVE-2024-46823,0,0,a167de10545a153c3d95daa6a21be068049a4c361c32c751cae65bc6ee29695c,2024-11-20T13:59:52.723000
|
||||
CVE-2024-46824,0,0,e0a90c0b6b8be6e8cdf7ea82a8f4714c063f5420a085c7bc4fdc88f4640c9615,2024-10-02T14:29:08.417000
|
||||
CVE-2024-46825,0,1,489d14aa4370a6b8abf31f5b609f2e027c90ea80208491ed95bd1ab23466dbec,2024-11-20T17:24:04.660000
|
||||
CVE-2024-46826,0,1,3d93083c38eb2145a4685a9a140cc89964cd35bbc56a9be19b7147ec9ebdc9bd,2024-11-20T17:19:00.183000
|
||||
CVE-2024-46827,0,0,40baba2ef01956ae5817a5c6c5f01915d6c37f21b62c361b4db5d49834b997d9,2024-09-30T12:45:57.823000
|
||||
CVE-2024-46825,0,0,489d14aa4370a6b8abf31f5b609f2e027c90ea80208491ed95bd1ab23466dbec,2024-11-20T17:24:04.660000
|
||||
CVE-2024-46826,0,0,3d93083c38eb2145a4685a9a140cc89964cd35bbc56a9be19b7147ec9ebdc9bd,2024-11-20T17:19:00.183000
|
||||
CVE-2024-46827,0,1,7619714f6336b4f4254cd737da0e51631b98e9b3484c47affc75bb2353c96dcb,2024-11-20T20:40:40.737000
|
||||
CVE-2024-46828,0,0,004223b8b179cc9feb2d2821c2f255bfd0f1e8b6e2ee56da948ed2efdc61c3a4,2024-09-30T12:45:57.823000
|
||||
CVE-2024-46829,0,0,9756f5c42072f53bba1b23c8dae157441c264939ffe910650603ebb072073237,2024-10-02T14:27:57.920000
|
||||
CVE-2024-4683,0,0,f97d6282ccf029728c8ab8e65ca2b64efa101897ef8ccdc22b5456d11d66a8f8,2024-06-04T19:20:46.247000
|
||||
@ -263682,7 +263685,7 @@ CVE-2024-47046,0,0,7869fbf4e097ddf562d122b002ca5484caa2f32ab0ccc92f893d14cc4f35f
|
||||
CVE-2024-47047,0,0,d8855532a1b9b01d9e7fc7225d9d8944472a4e5bcd23ab8d15e96ebcc6becd71,2024-09-27T17:03:35.507000
|
||||
CVE-2024-47048,0,0,3e2f1651277aae0b881ff2293ea5a1adce6f7fca0dbe63c48af088557b921506,2024-09-26T17:12:07.440000
|
||||
CVE-2024-47049,0,0,3e6b2d17b4e33f39069cb56c499a02c9b742796ce9abde4b775c7183f5720e70,2024-09-27T17:09:46.980000
|
||||
CVE-2024-4705,0,1,d259c4d653df071e68c221dae3247d75c673e9cf20139b6f08dcb899bfa4f077,2024-11-20T18:58:42.133000
|
||||
CVE-2024-4705,0,0,d259c4d653df071e68c221dae3247d75c673e9cf20139b6f08dcb899bfa4f077,2024-11-20T18:58:42.133000
|
||||
CVE-2024-47050,0,0,4296aa963533e4a7521fa22cb8b50e427318f2d783af0da7884f907ad4fc085b,2024-09-27T15:29:21.450000
|
||||
CVE-2024-47058,0,0,1e972d8f0df7a48ab103a834b6d9eb8c181e8f51fba2eb0fd8d68faea4946bf9,2024-09-27T15:31:30.917000
|
||||
CVE-2024-47059,0,0,1ded05aa2ea1e0adbe840bc57816abecb4dbdb9b2a551e659bc55563f7788a30,2024-09-20T12:30:17.483000
|
||||
@ -264714,7 +264717,7 @@ CVE-2024-48895,0,0,11f1b544314db3e7a2e2f0ae6118cf9681d6a4928b5a8a68633e1e42e5369
|
||||
CVE-2024-48896,0,0,3369e20ee0c39a35940972233d3a6f057bff00e79eb9a81bb021ceda4d8b9473,2024-11-20T14:47:12.777000
|
||||
CVE-2024-48897,0,0,5a651bf9ceed3dc79bdeab3d379ead0cb2ab30abdd2679a869c88655c07729fc,2024-11-20T14:48:25.373000
|
||||
CVE-2024-48898,0,0,33dcb27cf8e50763240699ca31930c2c749d47d6fae90855cdfb6f7b4010e416,2024-11-20T14:46:16.237000
|
||||
CVE-2024-48899,0,0,0d8ef23611eada8fc0fc63454f34a97709861b32b5e14032cbff7c3fb2b15ca3,2024-11-20T11:15:05.563000
|
||||
CVE-2024-48899,0,1,e2343bc29701c7dd942e081fd9b9c03c8cc3f4c4605751635b0b917daee962c0,2024-11-20T20:35:10.583000
|
||||
CVE-2024-4890,0,0,ee7720239380ab5c638f0803999a779457a74687c16e858d2acf0798605f57a2,2024-10-10T20:11:44.610000
|
||||
CVE-2024-48900,0,0,2b3a5e56342c363922328f10e6f3d06b5c266c3768636276b8919e3a3cee88b7,2024-11-13T17:01:16.850000
|
||||
CVE-2024-48901,0,0,d75b1ce91db0ab482f676e585ae0cc64acc3419cc25fbdc6e4284c75a5d0d1be,2024-11-20T14:45:10.380000
|
||||
@ -264774,6 +264777,9 @@ CVE-2024-48971,0,0,aec61daa8e3e4bc8e82a3ac6302404f969998220414a402a4bfea69832823
|
||||
CVE-2024-48973,0,0,1df97559f56714d73ec761dcc150a7afb6ddaa2583c3474ad5af745f48ebc20c,2024-11-15T13:58:08.913000
|
||||
CVE-2024-48974,0,0,bca1b70ac99b7db7d345213bfc69c0dea4bcbf3438528546c7259844ada903e4,2024-11-15T13:58:08.913000
|
||||
CVE-2024-4898,0,0,a64ada88476e7dbd5dca1f8ed9406bed15a3acb87fadbe7d9a4f3102502b7a67,2024-07-23T17:50:44.033000
|
||||
CVE-2024-48981,1,1,1ae96babf6a4bcc2c78e7f12ca532a4f5fdb10b8ae0b5db7bfe970b52b7f2e55,2024-11-20T20:15:19.097000
|
||||
CVE-2024-48983,1,1,c25b1c5b11a7a174c8828eba698c43d9664ed2267c90e0cfb70c0a5dcb22d464,2024-11-20T20:15:19.183000
|
||||
CVE-2024-48985,1,1,a7fa7a5712b72125cff0256e9fc7f9d4582651fb55335db9b19250ae3ea99a4c,2024-11-20T20:15:19.270000
|
||||
CVE-2024-48987,0,0,bb1285db59c3075341f96aec62f9b4ce4709041d90082c7f3534792a4d32fb84,2024-10-15T12:58:51.050000
|
||||
CVE-2024-48989,0,0,9073e18090b9ae4eb5079758fa48cb03e03a3dcd9dfe9e38f4453d35dfeb5c4c,2024-11-13T17:01:16.850000
|
||||
CVE-2024-4899,0,0,7d0ca1543842829897b22c32fd7c3ea389ea1c85b28761d045bc30da0b354462,2024-07-03T02:08:16.280000
|
||||
@ -265433,17 +265439,17 @@ CVE-2024-5005,0,0,28bdb1683e492d24b33087981d0823dd42f49eeb8c271eabba28b1e925e506
|
||||
CVE-2024-50050,0,0,66652f02df241336011c1992f267ec2c5372a9547dcd28fcca3e67d65a218700,2024-10-24T19:35:08.107000
|
||||
CVE-2024-50052,0,0,bf2b7a67576b83d69e87d14ac4239bf8784a5a388f0a9d54bedc6a322c97af62,2024-10-29T14:34:04.427000
|
||||
CVE-2024-50055,0,0,223ed98e7a7f4160f8634a62679e487b1296c8eb2d61be84de5731c91a2cb49b,2024-10-23T21:45:15.137000
|
||||
CVE-2024-50056,0,0,862ab8ad8b5ca0def367c55982bb2c45b4f93bd3f7f7c0124b0eb400352da0b7,2024-10-23T15:12:34.673000
|
||||
CVE-2024-50056,0,1,65852cd5b35b3778c893416578aa58dff542e751590caba7144c5acde66facb7,2024-11-20T20:18:00.460000
|
||||
CVE-2024-50057,0,0,ba05620682b6a9a556450ee0eed48c115fc6212d5ab9174ae69859e3d6638159,2024-10-24T16:12:52.007000
|
||||
CVE-2024-50058,0,0,62ecfd8d486a96be612bd84ae6d7050123a99c1eeef7fe7df02a5c30cb36a532,2024-11-08T16:15:45.117000
|
||||
CVE-2024-50059,0,0,653291e9f66f3aebf5c844ab31fcc818fd9067a2f5f994c3daf2f8308b7dfe88,2024-11-08T16:15:45.267000
|
||||
CVE-2024-5006,0,0,275a7db4a7750ed7acf4e95109b09b599d0f03c3ae61db2773b61bbc80a38eed,2024-06-11T17:36:24
|
||||
CVE-2024-50060,0,0,eb351b3ab760e96eb16cafe62aff8422358fe64e2442d5ba785b82df12fcb827,2024-10-23T15:12:34.673000
|
||||
CVE-2024-50060,0,1,0f714ff1584d3a2f8e6a3b2a4a13b6b101e6250c6d37b58bad5b19c63cfc75dc,2024-11-20T20:25:37.210000
|
||||
CVE-2024-50061,0,0,adfa4c7105f2a2d6ac6001b08865d994315eaf40295441d8499676332f52333c,2024-10-23T21:48:29.030000
|
||||
CVE-2024-50062,0,0,fb76c5d17773e9b99ba2a7f2c28322bbec6aca19454d77f6ffd53fa694af65b4,2024-10-23T21:48:57.737000
|
||||
CVE-2024-50063,0,0,335825fddda843a4f3cb56868f3f1152d45953fe44c5ec530af3e8acfafdbb95,2024-10-23T15:12:34.673000
|
||||
CVE-2024-50064,0,0,0fbb48f98a0eb4f4ff5ac7ecc0e869de5fbcd36b7eb760b827cf0f646f0d7eab,2024-10-23T21:49:29.423000
|
||||
CVE-2024-50065,0,0,798ea878f6caa10adb303d247fc046bf695b098e873c9993ee906b7bb5d17e5c,2024-10-23T15:12:34.673000
|
||||
CVE-2024-50065,0,1,acca9cf28f900ef40d178c4343451c865da897e4de8fb20ebb290b68db23ec11,2024-11-20T20:07:01.320000
|
||||
CVE-2024-50066,0,0,b3bb02ba0974e5b5a24b8679fabb6bb49ad893447f49a1e1929628709c3f45f4,2024-11-05T20:19:07.983000
|
||||
CVE-2024-50067,0,0,cd7f92b058928f9381866d19ee3707f46c9ff67524491021fd1106cc3aa345e8,2024-11-17T15:15:19.113000
|
||||
CVE-2024-50068,0,0,b357b7d6a2971d612ca74bbd17c1e805d468b220432de66ab123477d4c8a0299,2024-10-30T16:57:35.427000
|
||||
@ -266043,7 +266049,7 @@ CVE-2024-50955,0,0,8157390cc8753ab3c3dc03f615378f98ac2c1983a215bd6243bc7dc27b803
|
||||
CVE-2024-50956,0,0,61199958fcf25ae9206f0f8875ee79a0e783a402692b34e9d18c29f4a470b75f,2024-11-15T13:58:08.913000
|
||||
CVE-2024-5096,0,0,5ed717834c38883681c6d180e391a0fccee5714f6ff3215bd896b6366e61be87,2024-06-04T19:20:58.687000
|
||||
CVE-2024-50966,0,0,c0f005c4299dd685198e56d1be45ab03ba5dbee734217c81e9ee9426dc60d25f,2024-11-08T19:01:03.880000
|
||||
CVE-2024-50968,0,1,865af00b0d3359238b453f9ef69955e0280211f860d95e8839fe9707addc1032,2024-11-20T17:35:28.470000
|
||||
CVE-2024-50968,0,0,865af00b0d3359238b453f9ef69955e0280211f860d95e8839fe9707addc1032,2024-11-20T17:35:28.470000
|
||||
CVE-2024-50969,0,0,f82f81fef8a82d72e4053f9ec8030a8d4d20833c5d6be0f5bb0e03f29d0491f9,2024-11-14T14:47:53.487000
|
||||
CVE-2024-5097,0,0,f8c17c92eeab06c631c7e3bccbcd56a5be798bb0ae3554a5ecf4b2a49f948336,2024-06-04T19:20:58.787000
|
||||
CVE-2024-50970,0,0,8dd8091efad0e3e366d58c3e5e49254ef2beed41cb2828ce8202543afc0c5fb4,2024-11-18T20:35:05.977000
|
||||
@ -266135,8 +266141,8 @@ CVE-2024-51152,0,0,2fc415b0efc6d5417097e1245b382b91c976aaa5917a1040e7761d3f03c4c
|
||||
CVE-2024-51156,0,0,950cb85b625d9788feaa8ca00bca17d1dc7f49ab66d36281c4121d0068dc7fe0,2024-11-18T18:35:06.703000
|
||||
CVE-2024-51157,0,0,113cde3c71891d82bf55f2d0b4674fdfc6000fe1838706cb74a6d985959d76d5,2024-11-18T15:35:13.060000
|
||||
CVE-2024-5116,0,0,8edab88198021b2d3b9901d621d1dabac4b2933945eb225d0257a88c98ac3f15,2024-06-04T19:21:00.430000
|
||||
CVE-2024-51162,1,1,1be07bd670c45a51346041c05a664e0548effc328bc31730e943243cf7caa6dd,2024-11-20T17:15:18.120000
|
||||
CVE-2024-51163,1,1,2ee787ecc47f7f401ec200ba94b7e62bfd2bcdba9d49d68dcab0a0ec8127078a,2024-11-20T17:15:18.417000
|
||||
CVE-2024-51162,0,0,1be07bd670c45a51346041c05a664e0548effc328bc31730e943243cf7caa6dd,2024-11-20T17:15:18.120000
|
||||
CVE-2024-51163,0,0,2ee787ecc47f7f401ec200ba94b7e62bfd2bcdba9d49d68dcab0a0ec8127078a,2024-11-20T17:15:18.417000
|
||||
CVE-2024-51164,0,0,ceab88983ac8f1f076554a5fc06b1fdf761a41119ff559a9cb41cb2ae46055ec,2024-11-18T17:11:56.587000
|
||||
CVE-2024-5117,0,0,8f71e5dda3348556d6b06143dcd47b79229dad0468d30aa7c38f8c5c1ecb8524,2024-06-04T19:21:00.547000
|
||||
CVE-2024-51179,0,0,1ac36b7f8ecbb6442c3e82b8bfc190a784ef1fdb6227f3a1da3d4126f204bf98,2024-11-13T20:35:10.303000
|
||||
@ -266953,7 +266959,7 @@ CVE-2024-52598,0,0,477258740433139def022fa49fc642fb7eea1c94a8945d9797525cab03b12
|
||||
CVE-2024-5260,0,0,1ea9956e2812efb1ad02a50e6e15b3c5419e86ea96923b6afc83449c65511582,2024-07-02T12:09:16.907000
|
||||
CVE-2024-52600,0,0,889882d763fff118298a79c0992b9d094668285ba42b3979d1acce7319312517,2024-11-19T21:56:45.533000
|
||||
CVE-2024-5261,0,0,0592ac8c89e0cb8027f6648912b9536cab36db7fb70868109d4e1f51168ecc2f,2024-06-25T18:50:42.040000
|
||||
CVE-2024-52613,0,1,5250f63c9c5511452022eabcd6488c8c26c81f478ff3445bc230db37173dd9d3,2024-11-20T17:35:28.730000
|
||||
CVE-2024-52613,0,0,5250f63c9c5511452022eabcd6488c8c26c81f478ff3445bc230db37173dd9d3,2024-11-20T17:35:28.730000
|
||||
CVE-2024-52614,0,0,691c38d1248080ff09180daa940a0ea35464380839e23dd93b5188ae19dfbdb8,2024-11-20T06:15:16.023000
|
||||
CVE-2024-5262,0,0,83603483afb7387d019b476baa2cae004e6d4e7f9b65a5997b6545bcd7a41b63,2024-06-11T17:18:50.600000
|
||||
CVE-2024-5263,0,0,997be873c6f28955b5d0d8cb5df3c06ebeb17c50a7068003806eac08a0ed2846,2024-08-07T16:01:35.217000
|
||||
@ -266967,26 +266973,28 @@ CVE-2024-5269,0,0,fcc703e959dc9fcd54d2dba10777aa46d0a7036a8f955bfd8c508426ccf0b2
|
||||
CVE-2024-5270,0,0,7ec6ed8f215026bf9d30718594365eb1a902134340d8c0dfba08c80435c07d35,2024-05-28T12:39:28.377000
|
||||
CVE-2024-5271,0,0,7285855bafca9dd1fc033351db47cae9ea7831aeb2f80b9313f86f9100e15f62,2024-05-31T13:01:46.727000
|
||||
CVE-2024-52711,0,0,78721fa26ebd510269586a73a1d757b8cf5c952035a30436ca3be9b5757e4b65,2024-11-19T21:57:32.967000
|
||||
CVE-2024-52714,0,0,658ca957fccc95dcf66f192b351e1eb1aa79e66fe1fbde58b681eba4d3166214,2024-11-19T21:56:45.533000
|
||||
CVE-2024-52714,0,1,e8174cb74f218481a745eaa4fb4441e2ce8d564c733028629c2c073a4476af1a,2024-11-20T20:35:15.260000
|
||||
CVE-2024-5272,0,0,d387d985ee64cb70308558e1288744b27040b8f28ef99da7e8b0a0af44167dd6,2024-05-28T12:39:28.377000
|
||||
CVE-2024-52725,1,1,33f6fa34c3dd7f326aa8525752182246593fbe26f97c40f7481f5dc188051048,2024-11-20T17:15:18.867000
|
||||
CVE-2024-52725,0,0,33f6fa34c3dd7f326aa8525752182246593fbe26f97c40f7481f5dc188051048,2024-11-20T17:15:18.867000
|
||||
CVE-2024-5273,0,0,098baedadde55d65116b7be974965fe184b3495f86a75c5fc729e60404fd76e0,2024-11-07T15:35:14.380000
|
||||
CVE-2024-52739,1,1,101c0b9876bf858a76409f50d2e2d09af749568b9decaf9de2879046e254c2a3,2024-11-20T18:15:23.393000
|
||||
CVE-2024-52739,0,1,e67c6617d90c4f2c32d6849dbe6387498e43b14fb180727dba9b598a59a70f9d,2024-11-20T20:35:16.147000
|
||||
CVE-2024-5274,0,0,e7d74c38d2c202c949e1ef012213e640b18c31c48483d84bb8a4761d2997d225,2024-08-14T17:07:13.270000
|
||||
CVE-2024-5275,0,0,0a8f92936fd54cfeba80497afbb5044228db5d667d0dcb3a75c34af54c4c0fca,2024-06-20T12:44:01.637000
|
||||
CVE-2024-52759,0,0,80eaed11a6f63280332e88d3cbf4b0530a8471b6b3c6b18c568aa62f2956ad50,2024-11-19T21:56:45.533000
|
||||
CVE-2024-52754,1,1,f9a9821a7161800e5e382614d4d7ebd64c1ef10d8746c92e43100efcef522e7c,2024-11-20T20:15:19.450000
|
||||
CVE-2024-52757,1,1,f5c773b49db1f5dbe859127ff27a4aa4ba75101a64418905cb78d116ea2f4b7d,2024-11-20T20:15:19.533000
|
||||
CVE-2024-52759,0,1,08470462711a12166b9502857167c45e0c73c0f4362bfd9e0cbde5aa910afc64,2024-11-20T19:04:10.017000
|
||||
CVE-2024-5276,0,0,b98c8bf623aeff1994feca32cb34066ea8ef6a81fb35099972c112f59613dd44,2024-06-26T12:44:29.693000
|
||||
CVE-2024-52762,0,0,353c63bf6aa3aeb3f0cdcf47d86962135e93381335c1d6bdfca45cd78f17fe81,2024-11-19T21:56:45.533000
|
||||
CVE-2024-52762,0,1,2da142212af1f3c370b1753b9867e2dc76148c3ba2e7239c746267d4ce514522,2024-11-20T20:35:17.280000
|
||||
CVE-2024-52763,0,0,c5573017d062db00f6bed25c6759761baf5200224a59e32fc8cc1b829343cac2,2024-11-19T21:56:45.533000
|
||||
CVE-2024-52769,1,1,b6cb45d7326db7c74bf072246ac67a1dfffc75d7966f0886ca77640876da3fd2,2024-11-20T17:15:19.907000
|
||||
CVE-2024-52769,0,0,b6cb45d7326db7c74bf072246ac67a1dfffc75d7966f0886ca77640876da3fd2,2024-11-20T17:15:19.907000
|
||||
CVE-2024-5277,0,0,c22b3e398c55d24f660b1a45a3310a9c6b0abef458e72374f87af318fc09202a,2024-10-09T14:49:25.753000
|
||||
CVE-2024-52770,1,1,7aa9649a9670c716ce311ac92684885a9b795e1a2574f48cc59bb70ef562262a,2024-11-20T17:15:20.200000
|
||||
CVE-2024-52771,1,1,5216faefced1eff97e71e61bc18807aec97654fb9fefe72a0573a6ba693a0484,2024-11-20T17:15:20.637000
|
||||
CVE-2024-52770,0,0,7aa9649a9670c716ce311ac92684885a9b795e1a2574f48cc59bb70ef562262a,2024-11-20T17:15:20.200000
|
||||
CVE-2024-52771,0,0,5216faefced1eff97e71e61bc18807aec97654fb9fefe72a0573a6ba693a0484,2024-11-20T17:15:20.637000
|
||||
CVE-2024-5278,0,0,f0307415163f20adf37f2c92a0ed4578caa6aa4e699bedaa3aae52fa3124b77a,2024-10-17T13:56:49.813000
|
||||
CVE-2024-52788,0,0,10422e316ff1cd1c42e0724b49036642b5ea260660f059be4278fcd3695d7b6c,2024-11-19T21:56:45.533000
|
||||
CVE-2024-52789,0,0,f36dc0a54a71530ea75878243901cd19d9ac10d089d77a73bd61490fb92dd90d,2024-11-19T21:56:45.533000
|
||||
CVE-2024-5279,0,0,2c6d1e53ece85fba55c2b83835d7abf75ca4da167ddbecc0aa984e59d469dd0e,2024-06-04T19:21:04.240000
|
||||
CVE-2024-52796,1,1,c4bd427fdb738f1679f0a9210a59387be5f22896c83df074062019be41d6dd7e,2024-11-20T17:15:20.953000
|
||||
CVE-2024-52796,0,0,c4bd427fdb738f1679f0a9210a59387be5f22896c83df074062019be41d6dd7e,2024-11-20T17:15:20.953000
|
||||
CVE-2024-5280,0,0,86594c27d113c80fe7aa0a775d64720f8f3d823c49f62206ae5f1ae12a324b16,2024-08-01T13:59:43.187000
|
||||
CVE-2024-5281,0,0,d8e0f0c592f3cfcf36fc66f961b905d6afba3d53af3789e65e13042755c0a3cb,2024-08-01T13:59:43.367000
|
||||
CVE-2024-5282,0,0,d02e51c4b0ee276cbc37162ff12b0d5f63d5cb6622dea90c00e2302f02b5f264,2024-08-01T13:59:43.553000
|
||||
@ -268698,7 +268706,7 @@ CVE-2024-7189,0,0,ff23bad07ab6275204285dcbecd341c53e0f43077ff255ee222be124d95deb
|
||||
CVE-2024-7190,0,0,6b10a3300e7f1568fb96fd13af7e875d61c31bab7b7b7e6416cbb0109bea73d4,2024-08-23T14:23:56.243000
|
||||
CVE-2024-7191,0,0,05a58f0ea89619617ea6d05464587bd2a57828801e18ec1f64442f7e68c768f8,2024-08-23T14:24:48.103000
|
||||
CVE-2024-7192,0,0,6102e2c061b392d7cc60badb5f7058fe4f352fff0fcb923589fe1aff828e98a0,2024-08-23T14:25:37.527000
|
||||
CVE-2024-7193,0,1,a7792ab358806bb530ac0c5ce816eeadff0824c0332b64e6f400175db8173aba,2024-11-20T17:04:07.447000
|
||||
CVE-2024-7193,0,0,a7792ab358806bb530ac0c5ce816eeadff0824c0332b64e6f400175db8173aba,2024-11-20T17:04:07.447000
|
||||
CVE-2024-7194,0,0,fb8fb327a2568c1f320f1950bfd0d09d6807afbd06bbd21f9382e7a1490f26a5,2024-08-12T14:35:56.040000
|
||||
CVE-2024-7195,0,0,6200e8d18c215bbfa8ef0be79e3a73b7174d7501600a48a5810d4c572cbb7769,2024-08-12T14:35:58.443000
|
||||
CVE-2024-7196,0,0,aa78bda25303d7508f05178076eb7f1847a629e60799ff5c817fd6b3a1be9a5a,2024-08-12T14:36:00.460000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user