mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-06 18:52:58 +00:00
Auto-Update: 2024-08-30T16:00:18.181842+00:00
This commit is contained in:
parent
52f73c05b9
commit
a6ca0c6ca1
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-20123",
|
||||
"sourceIdentifier": "vulnreport@tenable.com",
|
||||
"published": "2021-10-13T16:15:07.350",
|
||||
"lastModified": "2022-07-12T17:42:04.277",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-08-30T14:35:00.660",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -74,6 +94,16 @@
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,17 +2,41 @@
|
||||
"id": "CVE-2022-39996",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-27T18:15:13.197",
|
||||
"lastModified": "2024-08-27T21:35:01.140",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-30T15:17:40.717",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross Site Scripting vulnerability in Teldats Router RS123, RS123w allows attacker to execute arbitrary code via the cmdcookie parameter to the upgrade/query.php page."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de Cross Site Scripting en Teldats Router RS123, RS123w permite a un atacante ejecutar c\u00f3digo arbitrario a trav\u00e9s del par\u00e1metro cmdcookie en la p\u00e1gina update/query.php."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -36,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -47,14 +81,77 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:teldat:rs123_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "28C8CB3D-CC02-4AED-BE15-702BC0B612FC"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:teldat:rs123:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "391CFA3B-4398-4F81-91B8-0C870157437A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:teldat:rs123w_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CAF4A004-1961-4216-80F5-3466F3EB749C"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:teldat:rs123w:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "72494BF0-1083-47AE-81B3-9A6C931F9F35"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/uyhacked/Teldat-s-Router/blob/main/Teldat",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/uyhacked/Teldat-s-Router/blob/main/Teldat%27s%20Router%20Vulnerability.md",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-6955",
|
||||
"sourceIdentifier": "cve@gitlab.com",
|
||||
"published": "2024-01-12T14:15:49.233",
|
||||
"lastModified": "2024-01-18T21:16:42.053",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-08-30T14:15:14.797",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -76,7 +76,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-7028",
|
||||
"sourceIdentifier": "cve@gitlab.com",
|
||||
"published": "2024-01-12T14:15:49.420",
|
||||
"lastModified": "2024-08-14T17:00:51.773",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-08-30T14:15:14.943",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"cisaExploitAdd": "2024-05-01",
|
||||
"cisaActionDue": "2024-05-22",
|
||||
@ -80,7 +80,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
"value": "CWE-640"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-1493",
|
||||
"sourceIdentifier": "cve@gitlab.com",
|
||||
"published": "2024-06-27T00:15:10.283",
|
||||
"lastModified": "2024-06-28T13:24:27.063",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-08-30T14:15:15.167",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -76,7 +76,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-400"
|
||||
"value": "CWE-1333"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-1495",
|
||||
"sourceIdentifier": "cve@gitlab.com",
|
||||
"published": "2024-06-12T23:15:49.130",
|
||||
"lastModified": "2024-07-18T19:52:21.503",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-08-30T14:15:15.293",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -76,7 +76,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-400"
|
||||
"value": "CWE-1333"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-1736",
|
||||
"sourceIdentifier": "cve@gitlab.com",
|
||||
"published": "2024-06-12T23:15:49.440",
|
||||
"lastModified": "2024-07-18T19:50:31.223",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-08-30T14:15:15.450",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -76,7 +76,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-400"
|
||||
"value": "CWE-1333"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-1963",
|
||||
"sourceIdentifier": "cve@gitlab.com",
|
||||
"published": "2024-06-12T23:15:49.670",
|
||||
"lastModified": "2024-07-18T19:46:01.863",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-08-30T14:15:15.577",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -76,7 +76,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-400"
|
||||
"value": "CWE-1333"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2800",
|
||||
"sourceIdentifier": "cve@gitlab.com",
|
||||
"published": "2024-08-08T11:15:12.210",
|
||||
"lastModified": "2024-08-23T17:03:41.320",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-08-30T14:15:15.760",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -76,7 +76,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-400"
|
||||
"value": "CWE-1333"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,17 +2,41 @@
|
||||
"id": "CVE-2024-29723",
|
||||
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||
"published": "2024-08-29T11:15:24.160",
|
||||
"lastModified": "2024-08-29T13:25:27.537",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-30T15:51:01.163",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SQL injection vulnerabilities in SportsNET affecting version 4.0.1. These vulnerabilities could allow an attacker to retrieve, update and delete all information in the database by sending a specially crafted SQL query: https://XXXXXXX.saludydesafio.com/conexiones/ax/openTracExt/, parameter categoria;."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidades de inyecci\u00f3n SQL en SportsNET que afectan a la versi\u00f3n 4.0.1. Estas vulnerabilidades podr\u00edan permitir a un atacante recuperar, actualizar y eliminar toda la informaci\u00f3n de la base de datos mediante el env\u00edo de una consulta SQL especialmente manipulada: https://XXXXXXX.saludydesafio.com/conexiones/ax/openTracExt/, par\u00e1metro categoria;."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Secondary",
|
||||
@ -47,10 +71,30 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sportsnet:sportsnet:4.0.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "542C4524-A8F3-44DD-98F4-7DF96B6C91F0"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-sportsnet",
|
||||
"source": "cve-coordination@incibe.es"
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,17 +2,41 @@
|
||||
"id": "CVE-2024-29724",
|
||||
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||
"published": "2024-08-29T11:15:24.383",
|
||||
"lastModified": "2024-08-29T13:25:27.537",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-30T15:50:50.157",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SQL injection vulnerabilities in SportsNET affecting version 4.0.1. These vulnerabilities could allow an attacker to retrieve, update and delete all information in the database by sending a specially crafted SQL query: https://XXXXXXX.saludydesafio.com/ax/registerSp/, parameter idDesafio."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidades de inyecci\u00f3n SQL en SportsNET que afectan a la versi\u00f3n 4.0.1. Estas vulnerabilidades podr\u00edan permitir a un atacante recuperar, actualizar y eliminar toda la informaci\u00f3n de la base de datos mediante el env\u00edo de una consulta SQL especialmente manipulada: https://XXXXXXX.saludydesafio.com/ax/registerSp/, par\u00e1metro idDesafio."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Secondary",
|
||||
@ -47,10 +71,30 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sportsnet:sportsnet:4.0.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "542C4524-A8F3-44DD-98F4-7DF96B6C91F0"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-sportsnet",
|
||||
"source": "cve-coordination@incibe.es"
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,17 +2,41 @@
|
||||
"id": "CVE-2024-29725",
|
||||
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||
"published": "2024-08-29T11:15:24.573",
|
||||
"lastModified": "2024-08-29T13:25:27.537",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-30T15:50:40.927",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SQL injection vulnerabilities in SportsNET affecting version 4.0.1. These vulnerabilities could allow an attacker to retrieve, update and delete all information in the database by sending a specially crafted SQL query: https://XXXXXXX.saludydesafio.com/app/ax/sort_bloques/, parameter list."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidades de inyecci\u00f3n SQL en SportsNET que afectan a la versi\u00f3n 4.0.1. Estas vulnerabilidades podr\u00edan permitir a un atacante recuperar, actualizar y eliminar toda la informaci\u00f3n de la base de datos mediante el env\u00edo de una consulta SQL especialmente manipulada: https://XXXXXXX.saludydesafio.com/app/ax/sort_bloques/, lista de par\u00e1metros."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Secondary",
|
||||
@ -47,10 +71,30 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sportsnet:sportsnet:4.0.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "542C4524-A8F3-44DD-98F4-7DF96B6C91F0"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-sportsnet",
|
||||
"source": "cve-coordination@incibe.es"
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,17 +2,41 @@
|
||||
"id": "CVE-2024-29726",
|
||||
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||
"published": "2024-08-29T11:15:24.767",
|
||||
"lastModified": "2024-08-29T13:25:27.537",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-30T15:50:30.467",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SQL injection vulnerabilities in SportsNET affecting version 4.0.1. These vulnerabilities could allow an attacker to retrieve, update and delete all information in the database by sending a specially crafted SQL query: https://XXXXXXX.saludydesafio.com/app/ax/setAsRead/, parameter id."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidades de inyecci\u00f3n SQL en SportsNET que afectan a la versi\u00f3n 4.0.1. Estas vulnerabilidades podr\u00edan permitir a un atacante recuperar, actualizar y eliminar toda la informaci\u00f3n de la base de datos mediante el env\u00edo de una consulta SQL especialmente manipulada: https://XXXXXXX.saludydesafio.com/app/ax/setAsRead/, par\u00e1metro id."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Secondary",
|
||||
@ -47,10 +71,30 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sportsnet:sportsnet:4.0.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "542C4524-A8F3-44DD-98F4-7DF96B6C91F0"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-sportsnet",
|
||||
"source": "cve-coordination@incibe.es"
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,17 +2,41 @@
|
||||
"id": "CVE-2024-29727",
|
||||
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||
"published": "2024-08-29T11:15:24.977",
|
||||
"lastModified": "2024-08-29T13:25:27.537",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-30T15:43:13.940",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SQL injection vulnerabilities in SportsNET affecting version 4.0.1. These vulnerabilities could allow an attacker to retrieve, update and delete all information in the database by sending a specially crafted SQL query: https://XXXXXXX.saludydesafio.com/app/ax/sendParticipationRemember/ , parameter send."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidades de inyecci\u00f3n SQL en SportsNET que afectan a la versi\u00f3n 4.0.1. Estas vulnerabilidades podr\u00edan permitir a un atacante recuperar, actualizar y eliminar toda la informaci\u00f3n de la base de datos mediante el env\u00edo de una consulta SQL especialmente manipulada: https://XXXXXXX.saludydesafio.com/app/ax/sendParticipationRemember/ , par\u00e1metro send."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Secondary",
|
||||
@ -47,10 +71,30 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sportsnet:sportsnet:4.0.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "542C4524-A8F3-44DD-98F4-7DF96B6C91F0"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-sportsnet",
|
||||
"source": "cve-coordination@incibe.es"
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,17 +2,41 @@
|
||||
"id": "CVE-2024-29728",
|
||||
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||
"published": "2024-08-29T11:15:25.163",
|
||||
"lastModified": "2024-08-29T13:25:27.537",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-30T15:49:53.347",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SQL injection vulnerabilities in SportsNET affecting version 4.0.1. These vulnerabilities could allow an attacker to retrieve, update and delete all information in the database by sending a specially crafted SQL query: https://XXXXXXX.saludydesafio.com/app/ax/inscribeUsuario/ , parameter idDesafio."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidades de inyecci\u00f3n SQL en SportsNET que afectan a la versi\u00f3n 4.0.1. Estas vulnerabilidades podr\u00edan permitir a un atacante recuperar, actualizar y eliminar toda la informaci\u00f3n de la base de datos mediante el env\u00edo de una consulta SQL especialmente manipulada: https://XXXXXXX.saludydesafio.com/app/ax/inscribeUsuario/ , par\u00e1metro idDesafio."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Secondary",
|
||||
@ -47,10 +71,30 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sportsnet:sportsnet:4.0.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "542C4524-A8F3-44DD-98F4-7DF96B6C91F0"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-sportsnet",
|
||||
"source": "cve-coordination@incibe.es"
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,17 +2,41 @@
|
||||
"id": "CVE-2024-29729",
|
||||
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||
"published": "2024-08-29T11:15:25.357",
|
||||
"lastModified": "2024-08-29T13:25:27.537",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-30T15:49:44.607",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SQL injection vulnerabilities in SportsNET affecting version 4.0.1. These vulnerabilities could allow an attacker to retrieve, update and delete all information in the database by sending a specially crafted SQL query: https://XXXXXXX.saludydesafio.com/app/ax/generateShortURL/, parameter url."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidades de inyecci\u00f3n SQL en SportsNET que afectan a la versi\u00f3n 4.0.1. Estas vulnerabilidades podr\u00edan permitir a un atacante recuperar, actualizar y eliminar toda la informaci\u00f3n de la base de datos mediante el env\u00edo de una consulta SQL especialmente manipulada: https://XXXXXXX.saludydesafio.com/app/ax/generateShortURL/, par\u00e1metro url."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Secondary",
|
||||
@ -47,10 +71,30 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sportsnet:sportsnet:4.0.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "542C4524-A8F3-44DD-98F4-7DF96B6C91F0"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-sportsnet",
|
||||
"source": "cve-coordination@incibe.es"
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,17 +2,41 @@
|
||||
"id": "CVE-2024-29730",
|
||||
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||
"published": "2024-08-29T11:15:25.547",
|
||||
"lastModified": "2024-08-29T13:25:27.537",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-30T15:49:36.833",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SQL injection vulnerabilities in SportsNET affecting version 4.0.1. These vulnerabilities could allow an attacker to retrieve, update and delete all information in the database by sending a specially crafted SQL query:\u00a0 https://XXXXXXX.saludydesafio.com/app/ax/consejoRandom/ , parameter idCat;."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidades de inyecci\u00f3n SQL en SportsNET que afectan a la versi\u00f3n 4.0.1. Estas vulnerabilidades podr\u00edan permitir a un atacante recuperar, actualizar y eliminar toda la informaci\u00f3n de la base de datos mediante el env\u00edo de una consulta SQL especialmente manipulada: https://XXXXXXX.saludydesafio.com/app/ax/consejoRandom/ , par\u00e1metro idCat;."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Secondary",
|
||||
@ -47,10 +71,30 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sportsnet:sportsnet:4.0.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "542C4524-A8F3-44DD-98F4-7DF96B6C91F0"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-sportsnet",
|
||||
"source": "cve-coordination@incibe.es"
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,17 +2,41 @@
|
||||
"id": "CVE-2024-29731",
|
||||
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||
"published": "2024-08-29T11:15:25.760",
|
||||
"lastModified": "2024-08-29T13:25:27.537",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-30T15:49:30.047",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SQL injection vulnerabilities in SportsNET affecting version 4.0.1. These vulnerabilities could allow an attacker to retrieve, update and delete all information in the database by sending a specially crafted SQL query:\u00a0 https://XXXXXXX.saludydesafio.com/app/ax/checkBlindFields/ , parameters idChallenge and idEmpresa."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidades de inyecci\u00f3n SQL en SportsNET que afectan a la versi\u00f3n 4.0.1. Estas vulnerabilidades podr\u00edan permitir a un atacante recuperar, actualizar y eliminar toda la informaci\u00f3n de la base de datos mediante el env\u00edo de una consulta SQL especialmente manipulada: https://XXXXXXX.saludydesafio.com/app/ax/checkBlindFields/ , par\u00e1metros idChallenge e idEmpresa."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Secondary",
|
||||
@ -47,10 +71,30 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sportsnet:sportsnet:4.0.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "542C4524-A8F3-44DD-98F4-7DF96B6C91F0"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-sportsnet",
|
||||
"source": "cve-coordination@incibe.es"
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-3114",
|
||||
"sourceIdentifier": "cve@gitlab.com",
|
||||
"published": "2024-08-08T11:15:12.733",
|
||||
"lastModified": "2024-08-23T17:04:56.070",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-08-30T14:15:15.937",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -76,7 +76,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-400"
|
||||
"value": "CWE-1333"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-3115",
|
||||
"sourceIdentifier": "cve@gitlab.com",
|
||||
"published": "2024-06-27T00:15:11.190",
|
||||
"lastModified": "2024-06-28T13:22:33.400",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-08-30T14:15:16.060",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -76,7 +76,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-34195",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-28T20:15:07.580",
|
||||
"lastModified": "2024-08-29T13:25:27.537",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-30T15:59:08.873",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,43 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:totolink:a3002r_firmware:1.1.1-b20200824:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "90D879E5-4A5A-4CB9-BE87-BAC3847B445C"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:totolink:a3002r:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2CBBBC48-8918-4D59-8059-285404AE7716"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/Swind1er/84161b607d06d060fba5adcdd92bceb4",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,17 +2,41 @@
|
||||
"id": "CVE-2024-36068",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-27T18:15:14.427",
|
||||
"lastModified": "2024-08-27T19:35:27.183",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-30T15:26:36.340",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An incorrect access control vulnerability in Rubrik CDM versions prior to 9.1.2-p1, 9.0.3-p6 and 8.1.3-p12, allows an attacker with network access to execute arbitrary code."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad de control de acceso incorrecto en las versiones de Rubrik CDM anteriores a 9.1.2-p1, 9.0.3-p6 y 8.1.3-p12 permite que un atacante con acceso a la red ejecute c\u00f3digo arbitrario."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -36,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -47,14 +81,92 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:rubrik:cloud_data_management:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "8.1.3",
|
||||
"matchCriteriaId": "93A0E043-BB09-4209-A277-50D04477011E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:rubrik:cloud_data_management:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "9.0.0",
|
||||
"versionEndExcluding": "9.0.3",
|
||||
"matchCriteriaId": "1CC02F46-57CC-4765-BEA8-C3F9A8F4937F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:rubrik:cloud_data_management:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "9.1.0",
|
||||
"versionEndExcluding": "9.1.2",
|
||||
"matchCriteriaId": "64ADC7BF-2346-43BF-8920-58ED6B2827F7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:rubrik:cloud_data_management:8.1.3:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "11EFA06F-95C2-486B-AC65-1918BE3131F9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:rubrik:cloud_data_management:8.1.3:p1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "897D0C31-F8AB-43E6-98F6-20C4CBF2C422"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:rubrik:cloud_data_management:8.1.3:p2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C1E20D7A-DA49-426D-84ED-C50B7D84587C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:rubrik:cloud_data_management:8.1.3:p3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "87AA4058-2E0C-454D-AC03-D965FD705A87"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:rubrik:cloud_data_management:8.1.3:p4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "18256AD7-CB64-4ED3-A5E9-D2F841DF4775"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:rubrik:cloud_data_management:8.1.3:p5:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4EF17515-9F1C-4580-B5FA-D140D1D4B51E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:rubrik:cloud_data_management:9.0.3:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8A257802-5FAE-410F-890F-F021FA46D902"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:rubrik:cloud_data_management:9.1.2:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "ABE70F33-F2FE-4287-B232-67B0B6450E73"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.rubrik.com/advisories/rbk-20240619-v0044",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.rubrik.com/products/cloud-data-management",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-39300",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2024-08-30T07:15:11.837",
|
||||
"lastModified": "2024-08-30T13:00:05.390",
|
||||
"lastModified": "2024-08-30T15:35:03.273",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Existe una vulnerabilidad de falta de autenticaci\u00f3n en la funci\u00f3n Telnet de WAB-I1750-PS v1.5.10 y versiones anteriores. Cuando la funci\u00f3n Telnet del producto est\u00e1 habilitada, un atacante remoto puede iniciar sesi\u00f3n en el producto sin autenticaci\u00f3n y alterar la configuraci\u00f3n del producto."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-306"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://jvn.jp/en/jp/JVN24885537/",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-39713",
|
||||
"sourceIdentifier": "support@hackerone.com",
|
||||
"published": "2024-08-05T05:15:39.297",
|
||||
"lastModified": "2024-08-05T12:41:45.957",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-30T15:47:55.637",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -16,6 +16,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 8.6,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 4.0
|
||||
}
|
||||
],
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "support@hackerone.com",
|
||||
@ -39,10 +61,44 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-918"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:rocket.chat:rocket.chat:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.10.1",
|
||||
"matchCriteriaId": "2386061B-F94D-44C0-B373-8A1BF27DC6EA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://hackerone.com/reports/1886954",
|
||||
"source": "support@hackerone.com"
|
||||
"source": "support@hackerone.com",
|
||||
"tags": [
|
||||
"Issue Tracking",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,20 +2,79 @@
|
||||
"id": "CVE-2024-40395",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-27T16:15:07.583",
|
||||
"lastModified": "2024-08-27T18:33:14.247",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-30T14:35:38.087",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An Insecure Direct Object Reference (IDOR) in PTC ThingWorx v9.5.0 allows attackers to view sensitive information, including PII, regardless of access level."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una referencia de objeto directa insegura (IDOR) en PTC ThingWorx v9.5.0 permite a los atacantes ver informaci\u00f3n confidencial, incluida la PII, independientemente del nivel de acceso."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-639"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ptc:thingworx:9.5.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "904E0A5E-8ED5-46EC-B309-20B5DBDFDFBE"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://pastebin.com/9dc4LYGA",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-4011",
|
||||
"sourceIdentifier": "cve@gitlab.com",
|
||||
"published": "2024-06-27T00:15:11.643",
|
||||
"lastModified": "2024-06-28T13:21:27.280",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-08-30T14:15:16.590",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -76,7 +76,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-41346",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-29T20:15:08.483",
|
||||
"lastModified": "2024-08-30T13:00:05.390",
|
||||
"lastModified": "2024-08-30T14:35:04.550",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "El commit 5234b5b de openflights es vulnerable a Cross Site Scripting (XSS) a trav\u00e9s de php/submit.php"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/jpatokal/openflights/issues/1479",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-41347",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-29T20:15:08.573",
|
||||
"lastModified": "2024-08-30T13:00:05.390",
|
||||
"lastModified": "2024-08-30T14:35:05.457",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "El commit 5234b5b de openflights es vulnerable a Cross Site Scripting (XSS) a trav\u00e9s de php/settings.php"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/jpatokal/openflights/issues/1477",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-41348",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-29T20:15:08.667",
|
||||
"lastModified": "2024-08-30T13:00:05.390",
|
||||
"lastModified": "2024-08-30T14:35:06.393",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "El commit 5234b5b de openflights es vulnerable a Cross Site Scripting (XSS) a trav\u00e9s de php/alsearch.php"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/jpatokal/openflights/issues/1478",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-41361",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-29T20:15:08.953",
|
||||
"lastModified": "2024-08-30T13:00:05.390",
|
||||
"lastModified": "2024-08-30T15:35:04.133",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Se descubri\u00f3 que RPi-Jukebox-RFID v2.7.0 contiene una vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo (RCE) a trav\u00e9s de htdocs\\manageFilesFolders.php"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2398",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-41364",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-29T20:15:09.033",
|
||||
"lastModified": "2024-08-30T13:00:05.390",
|
||||
"lastModified": "2024-08-30T15:35:05.150",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Se descubri\u00f3 que RPi-Jukebox-RFID v2.7.0 contiene una vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo (RCE) a trav\u00e9s de htdocs\\trackEdit.php"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2400",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-41366",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-29T20:15:09.113",
|
||||
"lastModified": "2024-08-30T13:00:05.390",
|
||||
"lastModified": "2024-08-30T15:35:06.153",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Se descubri\u00f3 que RPi-Jukebox-RFID v2.7.0 contiene una vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo (RCE) a trav\u00e9s de htdocs\\userScripts.php"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2399",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-41367",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-29T20:15:09.193",
|
||||
"lastModified": "2024-08-30T13:00:05.390",
|
||||
"lastModified": "2024-08-30T15:35:07.170",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Se descubri\u00f3 que RPi-Jukebox-RFID v2.7.0 contiene una vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo (RCE) a trav\u00e9s de htdocs\\api\\playlist\\appendFileToPlaylist.php"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2397",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-41368",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-29T20:15:09.277",
|
||||
"lastModified": "2024-08-30T13:00:05.390",
|
||||
"lastModified": "2024-08-30T15:35:08.497",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Se descubri\u00f3 que RPi-Jukebox-RFID v2.7.0 contiene una vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo (RCE) a trav\u00e9s de htdocs\\inc.setWlanIpMail.php"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2396",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-41369",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-29T20:15:09.350",
|
||||
"lastModified": "2024-08-30T13:00:05.390",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-30T15:35:09.570",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Se descubri\u00f3 que RPi-Jukebox-RFID v2.7.0 contiene una vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo (RCE) a trav\u00e9s de htdocs\\inc.setWifi.php"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2401",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-41370",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-29T20:15:09.433",
|
||||
"lastModified": "2024-08-30T13:00:05.390",
|
||||
"lastModified": "2024-08-30T14:35:07.547",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [
|
||||
{
|
||||
@ -22,7 +22,42 @@
|
||||
"value": "Se descubri\u00f3 que Organizr v1.90 conten\u00eda una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s de chat/setlike.php."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/causefx/Organizr",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-41371",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-29T20:15:09.493",
|
||||
"lastModified": "2024-08-30T13:00:05.390",
|
||||
"lastModified": "2024-08-30T15:35:10.803",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [
|
||||
{
|
||||
@ -22,7 +22,42 @@
|
||||
"value": "Organizr v1.90 es vulnerable a Cross Site Scripting (XSS) a trav\u00e9s de api.php."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/causefx/Organizr",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-41372",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-29T20:15:09.553",
|
||||
"lastModified": "2024-08-30T13:00:05.390",
|
||||
"lastModified": "2024-08-30T14:35:08.307",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [
|
||||
{
|
||||
@ -22,7 +22,42 @@
|
||||
"value": "Se descubri\u00f3 que Organizr v1.90 conten\u00eda una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s de chat/settyping.php."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/causefx/Organizr",
|
||||
|
@ -2,17 +2,41 @@
|
||||
"id": "CVE-2024-41622",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-27T16:15:07.673",
|
||||
"lastModified": "2024-08-27T18:35:10.613",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-30T14:55:54.423",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "D-Link DIR-846W A1 FW100A43 was discovered to contain a remote command execution (RCE) vulnerability via the tomography_ping_address parameter in /HNAP1/ interface."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 que D-Link DIR-846W A1 FW100A43 conten\u00eda una vulnerabilidad de ejecuci\u00f3n remota de comandos (RCE) a trav\u00e9s del par\u00e1metro tomography_ping_address en la interfaz /HNAP1/."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -36,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -47,18 +81,56 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:dlink:dir-846w_firmware:fw100a43:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7B2A2F4B-19A5-4104-8B4E-E49A6B439B9D"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:dlink:dir-846w:a1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7E5A1770-BD33-440E-ABDF-877E6023DD7A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.dlink.com.cn/techsupport/ProductInfo.aspx?m=DIR-846W",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yali-1002/some-poc/blob/main/CVE-2024-41622",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.dlink.com/en/security-bulletin/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Not Applicable"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-42793",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-28T20:15:07.707",
|
||||
"lastModified": "2024-08-29T13:25:27.537",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-30T15:56:51.510",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.0,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -51,14 +81,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:lopalopa:music_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B9E63270-AF05-41C1-8464-61ECA2425ABA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Music%20Management%20System%20v1.0/CSRF%20-%20Edit%20User.pdf",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.kashipara.com/project/php/12978/music-management-system-in-php-php-project-source-code",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-42851",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-27T18:15:14.993",
|
||||
"lastModified": "2024-08-28T20:15:07.787",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-30T15:30:44.113",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:aertherwide:exiftags:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "1.01",
|
||||
"matchCriteriaId": "0C1BD64D-093C-4E1F-8748-FEF06E523F86"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/T1anyang/fuzzing/tree/main/exiftags",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,17 +2,41 @@
|
||||
"id": "CVE-2024-43788",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-08-27T17:15:07.967",
|
||||
"lastModified": "2024-08-27T18:33:14.247",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-30T15:13:21.340",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Webpack is a module bundler. Its main purpose is to bundle JavaScript files for usage in a browser, yet it is also capable of transforming, bundling, or packaging just about any resource or asset. The webpack developers have discovered a DOM Clobbering vulnerability in Webpack\u2019s `AutoPublicPathRuntimeModule`. The DOM Clobbering gadget in the module can lead to cross-site scripting (XSS) in web pages where scriptless attacker-controlled HTML elements (e.g., an `img` tag with an unsanitized `name` attribute) are present. Real-world exploitation of this gadget has been observed in the Canvas LMS which allows a XSS attack to happen through a javascript code compiled by Webpack (the vulnerable part is from Webpack). DOM Clobbering is a type of code-reuse attack where the attacker first embeds a piece of non-script, seemingly benign HTML markups in the webpage (e.g. through a post or comment) and leverages the gadgets (pieces of js code) living in the existing javascript code to transform it into executable code. This vulnerability can lead to cross-site scripting (XSS) on websites that include Webpack-generated files and allow users to inject certain scriptless HTML tags with improperly sanitized name or id attributes. This issue has been addressed in release version 5.94.0. All users are advised to upgrade. There are no known workarounds for this issue."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Webpack es un paquete de m\u00f3dulos. Su objetivo principal es agrupar archivos JavaScript para su uso en un navegador, pero tambi\u00e9n es capaz de transformar, agrupar o empaquetar casi cualquier recurso o activo. Los desarrolladores del paquete web han descubierto una vulnerabilidad de DOM Clobbering en `AutoPublicPathRuntimeModule` de Webpack. El gadget DOM Clobbering en el m\u00f3dulo puede conducir a cross site scripting (XSS) en p\u00e1ginas web donde est\u00e1n presentes elementos HTML controlados por atacantes sin secuencias de comandos (por ejemplo, una etiqueta `img` con un atributo `name` no desinfectado). Se ha observado una explotaci\u00f3n de este dispositivo en el mundo real en Canvas LMS, lo que permite que se produzca un ataque XSS a trav\u00e9s de un c\u00f3digo javascript compilado por Webpack (la parte vulnerable es de Webpack). DOM Clobbering es un tipo de ataque de reutilizaci\u00f3n de c\u00f3digo en el que el atacante primero incrusta un fragmento de marcas HTML aparentemente benignas y sin script en la p\u00e1gina web (por ejemplo, a trav\u00e9s de una publicaci\u00f3n o comentario) y aprovecha los gadgets (fragmentos de c\u00f3digo js) que se encuentran en el c\u00f3digo javascript existente para transformarlo en c\u00f3digo ejecutable. Esta vulnerabilidad puede provocar cross site scripting (XSS) en sitios web que incluyen archivos generados por Webpack y permiten a los usuarios inyectar ciertas etiquetas HTML sin secuencias de comandos con nombres o atributos de identificaci\u00f3n desinfectados incorrectamente. Este problema se solucion\u00f3 en la versi\u00f3n 5.94.0. Se recomienda a todos los usuarios que actualicen. No se conocen workarounds para este problema."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -36,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -47,22 +81,57 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:webpack.js:webpack:*:*:*:*:*:node.js:*:*",
|
||||
"versionEndExcluding": "5.94.0",
|
||||
"matchCriteriaId": "10BD162E-912D-4458-A67B-F7BC3602FDC5"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/webpack/webpack/commit/955e057abc6cc83cbc3fa1e1ef67a49758bf5a61",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/webpack/webpack/security/advisories/GHSA-4vvj-4cpr-p986",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://research.securitum.com/xss-in-amp4email-dom-clobbering",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://scnps.co/papers/sp23_domclob.pdf",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Mitigation",
|
||||
"Technical Description",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-43805",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-08-28T20:15:07.963",
|
||||
"lastModified": "2024-08-29T13:25:27.537",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-30T15:56:16.477",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,45 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:jupyter:jupyterlab:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "3.6.8",
|
||||
"matchCriteriaId": "337133F2-7029-423A-A338-3C776D6C591F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:jupyter:jupyterlab:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.0.0",
|
||||
"versionEndExcluding": "4.2.5",
|
||||
"matchCriteriaId": "57D35DC3-6F2E-43D7-B761-6580FF1A91B8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:jupyter:notebook:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "7.0.0",
|
||||
"versionEndExcluding": "7.2.2",
|
||||
"matchCriteriaId": "19F56C5F-64AF-4D64-8E01-DB00496E9555"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/jupyterlab/jupyterlab/security/advisories/GHSA-9q39-rmj3-p4r2",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-4341",
|
||||
"sourceIdentifier": "iletisim@usom.gov.tr",
|
||||
"published": "2024-07-08T14:15:03.167",
|
||||
"lastModified": "2024-07-08T15:49:22.437",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-30T15:44:26.727",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 2.5
|
||||
},
|
||||
{
|
||||
"source": "iletisim@usom.gov.tr",
|
||||
"type": "Secondary",
|
||||
@ -41,8 +61,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "iletisim@usom.gov.tr",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "iletisim@usom.gov.tr",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -51,10 +81,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:extremepacs:extreme_xds:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "3928",
|
||||
"matchCriteriaId": "3914A05B-2151-4A27-8832-438B94445887"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.usom.gov.tr/bildirim/tr-24-0893",
|
||||
"source": "iletisim@usom.gov.tr"
|
||||
"source": "iletisim@usom.gov.tr",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,17 +2,41 @@
|
||||
"id": "CVE-2024-44340",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-27T16:15:07.760",
|
||||
"lastModified": "2024-08-27T18:35:11.777",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-30T14:56:38.207",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "D-Link DIR-846W A1 FW100A43 was discovered to contain a remote command execution (RCE) vulnerability via keys smartqos_express_devices and smartqos_normal_devices in SetSmartQoSSettings."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 que D-Link DIR-846W A1 FW100A43 contiene una vulnerabilidad de ejecuci\u00f3n remota de comandos (RCE) a trav\u00e9s de las claves smartqos_express_devices y smartqos_normal_devices en SetSmartQoSSettings."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -36,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -47,18 +81,56 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:dlink:dir-846w_firmware:fw100a43:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7B2A2F4B-19A5-4104-8B4E-E49A6B439B9D"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:dlink:dir-846w:a1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7E5A1770-BD33-440E-ABDF-877E6023DD7A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.dlink.com.cn/techsupport/ProductInfo.aspx?m=DIR-846W",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yali-1002/some-poc/blob/main/CVE-2024-44340",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.dlink.com/en/security-bulletin/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Not Applicable"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,17 +2,41 @@
|
||||
"id": "CVE-2024-44341",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-27T16:15:07.860",
|
||||
"lastModified": "2024-08-27T18:35:12.540",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-30T14:57:07.260",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "D-Link DIR-846W A1 FW100A43 was discovered to contain a remote command execution (RCE) vulnerability via the lan(0)_dhcps_staticlist parameter. This vulnerability is exploited via a crafted POST request."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 que D-Link DIR-846W A1 FW100A43 conten\u00eda una vulnerabilidad de ejecuci\u00f3n remota de comandos (RCE) a trav\u00e9s del par\u00e1metro lan(0)_dhcps_staticlist. Esta vulnerabilidad se explota mediante una solicitud POST manipulada."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -36,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -47,18 +81,56 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:dlink:dir-846w_firmware:fw100a43:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7B2A2F4B-19A5-4104-8B4E-E49A6B439B9D"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:dlink:dir-846w:a1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7E5A1770-BD33-440E-ABDF-877E6023DD7A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.dlink.com.cn/techsupport/ProductInfo.aspx?m=DIR-846W",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yali-1002/some-poc/blob/main/CVE-2024-44341",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.dlink.com/en/security-bulletin/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Not Applicable"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,17 +2,41 @@
|
||||
"id": "CVE-2024-44342",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-27T16:15:07.993",
|
||||
"lastModified": "2024-08-27T18:35:13.327",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-30T14:57:40.020",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "D-Link DIR-846W A1 FW100A43 was discovered to contain a remote command execution (RCE) vulnerability via the wl(0).(0)_ssid parameter. This vulnerability is exploited via a crafted POST request."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 que D-Link DIR-846W A1 FW100A43 conten\u00eda una vulnerabilidad de ejecuci\u00f3n remota de comandos (RCE) a trav\u00e9s del par\u00e1metro wl(0).(0)_ssid. Esta vulnerabilidad se explota mediante una solicitud POST manipulada."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -36,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -47,18 +81,56 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:dlink:dir-846w_firmware:fw100a43:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7B2A2F4B-19A5-4104-8B4E-E49A6B439B9D"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:dlink:dir-846w:a1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7E5A1770-BD33-440E-ABDF-877E6023DD7A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.dlink.com.cn/techsupport/ProductInfo.aspx?m=DIR-846W",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yali-1002/some-poc/blob/main/CVE-2024-44342",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.dlink.com/en/security-bulletin/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Not Applicable"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-44760",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-28T20:15:08.230",
|
||||
"lastModified": "2024-08-29T13:25:27.537",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-30T15:55:41.137",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sunmochina:enterprise_management_system:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.0",
|
||||
"versionEndIncluding": "18.8",
|
||||
"matchCriteriaId": "C8BE774B-FF08-4853-9FA1-9929D2FB2036"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/WarmBrew/web_vul/blob/main/SunmoEMS/SunmoEMS-info.md",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-4428",
|
||||
"sourceIdentifier": "iletisim@usom.gov.tr",
|
||||
"published": "2024-08-29T11:15:27.200",
|
||||
"lastModified": "2024-08-29T13:25:27.537",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-30T15:49:16.927",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Privilege Management vulnerability in Menulux Information Technologies Managment Portal allows Collect Data as Provided by Users.This issue affects Managment Portal: through 21.05.2024."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La vulnerabilidad de administraci\u00f3n de privilegios incorrecta en el portal de administraci\u00f3n de Menulux Information Technologies permite recopilar datos proporcionados por los usuarios. Este problema afecta al portal de administraci\u00f3n: hasta el 21.05.2024."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -55,12 +59,44 @@
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "iletisim@usom.gov.tr",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "iletisim@usom.gov.tr",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -69,10 +105,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:menulux:managment_portal:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "21.05.2024",
|
||||
"matchCriteriaId": "F4A4E289-EF05-4422-8345-67A29FF7D76E"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.usom.gov.tr/bildirim/tr-24-1356",
|
||||
"source": "iletisim@usom.gov.tr"
|
||||
"source": "iletisim@usom.gov.tr",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,17 +2,41 @@
|
||||
"id": "CVE-2024-45264",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-27T16:15:08.070",
|
||||
"lastModified": "2024-08-27T18:33:14.247",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-30T15:02:34.610",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A cross-site request forgery (CSRF) vulnerability in the admin panel in SkySystem Arfa-CMS before 5.1.3124 allows remote attackers to add a new administrator, leading to escalation of privileges."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad de cross-site request forgery (CSRF) en el panel de administraci\u00f3n de SkySystem Arfa-CMS anterior a 5.1.3124 permite a atacantes remotos agregar un nuevo administrador, lo que lleva a una escalada de privilegios."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -36,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -47,14 +81,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:skyss:arfa-cms:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "5.1.3124",
|
||||
"matchCriteriaId": "5F33C964-5020-491B-A046-A1C61F494BCB"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/TheHermione/CVE-2024-45264",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://skyss.ru",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-45491",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-30T03:15:03.850",
|
||||
"lastModified": "2024-08-30T13:00:05.390",
|
||||
"lastModified": "2024-08-30T14:35:09.057",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Se descubri\u00f3 un problema en libexpat anterior a 2.6.3. dtdCopy en xmlparse.c puede tener un desbordamiento de entero para nDefaultAtts en plataformas de 32 bits (donde UINT_MAX es igual a SIZE_MAX)."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-190"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/libexpat/libexpat/issues/888",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-45492",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-30T03:15:03.930",
|
||||
"lastModified": "2024-08-30T13:00:05.390",
|
||||
"lastModified": "2024-08-30T14:35:09.790",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Se descubri\u00f3 un problema en libexpat antes de 2.6.3. nextScaffoldPart en xmlparse.c puede tener un desbordamiento de entero para m_groupSize en plataformas de 32 bits (donde UINT_MAX es igual a SIZE_MAX)."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-190"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/libexpat/libexpat/issues/889",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-5469",
|
||||
"sourceIdentifier": "cve@gitlab.com",
|
||||
"published": "2024-06-14T04:15:43.120",
|
||||
"lastModified": "2024-08-16T19:59:15.573",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-08-30T14:15:16.703",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -76,7 +76,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-400"
|
||||
"value": "CWE-754"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2024-5651",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-08-12T13:38:37.863",
|
||||
"lastModified": "2024-08-19T17:15:10.320",
|
||||
"lastModified": "2024-08-30T14:15:16.820",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A flaw was found in fence agents that rely on SSH/Telnet. This vulnerability can allow a Remote Code Execution (RCE) primitive by supplying an arbitrary command to execute in the --ssh-path/--telnet-path arguments. A low-privilege user, for example, a user with developer access, can create a specially crafted FenceAgentsRemediation for a fence agent supporting\u00a0 --ssh-path/--telnet-path arguments to execute arbitrary commands on the operator's pod. This RCE leads to a privilege escalation, first as the service account running the operator, then to another service account with cluster-admin privileges."
|
||||
"value": "A flaw was found in the Fence Agents Remediation operator. This vulnerability can allow a Remote Code Execution (RCE) primitive by supplying an arbitrary command to execute in the --ssh-path/--telnet-path arguments. A low-privilege user, for example, a user with developer access, can create a specially crafted FenceAgentsRemediation for a fence agent supporting\u00a0 --ssh-path/--telnet-path arguments to execute arbitrary commands on the operator's pod. This RCE leads to a privilege escalation, first as the service account running the operator, then to another service account with cluster-admin privileges."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-6323",
|
||||
"sourceIdentifier": "cve@gitlab.com",
|
||||
"published": "2024-06-27T00:15:13.130",
|
||||
"lastModified": "2024-06-28T13:15:19.317",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-08-30T14:15:16.947",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -76,7 +76,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-653"
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-6595",
|
||||
"sourceIdentifier": "cve@gitlab.com",
|
||||
"published": "2024-07-17T02:15:10.130",
|
||||
"lastModified": "2024-07-19T14:52:54.943",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-08-30T14:15:17.063",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -76,7 +76,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-427"
|
||||
"value": "CWE-451"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,17 +2,41 @@
|
||||
"id": "CVE-2024-6632",
|
||||
"sourceIdentifier": "df4dee71-de3a-4139-9588-11b62fe6c0ff",
|
||||
"published": "2024-08-27T15:15:17.300",
|
||||
"lastModified": "2024-08-27T15:52:01.317",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-30T14:07:18.443",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability exists in FileCatalyst Workflow whereby a field accessible to the super admin can be used to perform an SQL injection attack which can lead to a loss of confidentiality, integrity, and availability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Existe una vulnerabilidad en FileCatalyst Workflow por la cual un campo al que puede acceder el superadministrador se puede utilizar para realizar un ataque de inyecci\u00f3n SQL que puede provocar una p\u00e9rdida de confidencialidad, integridad y disponibilidad."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "df4dee71-de3a-4139-9588-11b62fe6c0ff",
|
||||
"type": "Secondary",
|
||||
@ -36,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "df4dee71-de3a-4139-9588-11b62fe6c0ff",
|
||||
"type": "Secondary",
|
||||
@ -47,10 +81,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fortra:filecatalyst_workflow:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.0.4",
|
||||
"versionEndExcluding": "5.1.7",
|
||||
"matchCriteriaId": "6CDAAF1B-D610-4238-8372-8A6DD3C2FC57"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.fortra.com/security/advisories/product-security/fi-2024-010",
|
||||
"source": "df4dee71-de3a-4139-9588-11b62fe6c0ff"
|
||||
"source": "df4dee71-de3a-4139-9588-11b62fe6c0ff",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,17 +2,41 @@
|
||||
"id": "CVE-2024-6633",
|
||||
"sourceIdentifier": "df4dee71-de3a-4139-9588-11b62fe6c0ff",
|
||||
"published": "2024-08-27T15:15:17.513",
|
||||
"lastModified": "2024-08-27T15:52:01.317",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-30T14:11:45.287",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The default credentials for the setup HSQL database (HSQLDB) for FileCatalyst Workflow are published in a vendor knowledgebase article. Misuse of these credentials could lead to a compromise of confidentiality, integrity, or availability of the software.\n\nThe HSQLDB is only included to facilitate installation, has been deprecated, and is not intended for production use per vendor guides. However, users who have not configured FileCatalyst Workflow to use an alternative database per recommendations are vulnerable to attack from any source that can reach the HSQLDB."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Las credenciales predeterminadas para la configuraci\u00f3n de la base de datos HSQL (HSQLDB) para FileCatalyst Workflow se publican en un art\u00edculo de la base de conocimientos del proveedor. El uso indebido de estas credenciales podr\u00eda comprometer la confidencialidad, la integridad o la disponibilidad del software. HSQLDB solo se incluye para facilitar la instalaci\u00f3n, ha quedado obsoleto y no est\u00e1 dise\u00f1ado para uso en producci\u00f3n seg\u00fan las gu\u00edas del proveedor. Sin embargo, los usuarios que no han configurado FileCatalyst Workflow para utilizar una base de datos alternativa seg\u00fan las recomendaciones son vulnerables a ataques desde cualquier fuente que pueda llegar a HSQLDB."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "df4dee71-de3a-4139-9588-11b62fe6c0ff",
|
||||
"type": "Secondary",
|
||||
@ -36,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-798"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "df4dee71-de3a-4139-9588-11b62fe6c0ff",
|
||||
"type": "Secondary",
|
||||
@ -47,10 +81,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fortra:filecatalyst_workflow:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.0.4",
|
||||
"versionEndExcluding": "5.1.7",
|
||||
"matchCriteriaId": "6CDAAF1B-D610-4238-8372-8A6DD3C2FC57"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.fortra.com/security/advisories/product-security/fi-2024-011",
|
||||
"source": "df4dee71-de3a-4139-9588-11b62fe6c0ff"
|
||||
"source": "df4dee71-de3a-4139-9588-11b62fe6c0ff",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-6783",
|
||||
"sourceIdentifier": "36c7be3b-2937-45df-85ea-ca7133ea542c",
|
||||
"published": "2024-07-23T15:15:06.210",
|
||||
"lastModified": "2024-07-24T12:55:13.223",
|
||||
"lastModified": "2024-08-30T15:15:18.623",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -53,7 +53,7 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.herodevs.com/vulnerability-directory/cve-2024-6783---vue-client-side-xss",
|
||||
"url": "https://www.herodevs.com/vulnerability-directory/cve-2024-6783",
|
||||
"source": "36c7be3b-2937-45df-85ea-ca7133ea542c"
|
||||
}
|
||||
]
|
||||
|
@ -2,20 +2,44 @@
|
||||
"id": "CVE-2024-7606",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-08-29T11:15:28.757",
|
||||
"lastModified": "2024-08-29T13:25:27.537",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-30T15:43:41.773",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Front End Users plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'user-search' shortcode in all versions up to, and including, 3.2.28 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento Front End Users para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del c\u00f3digo abreviado \"user-search\" del complemento en todas las versiones hasta la 3.2.28 incluida, debido a una desinfecci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n siempre que un usuario acceda a una p\u00e1gina inyectada."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
@ -47,22 +71,52 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:etoilewebdesign:front_end_users:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "3.2.29",
|
||||
"matchCriteriaId": "9ECEB3A6-5913-40C8-9DE9-9CC10FA5DD93"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/front-end-only-users/trunk/Shortcodes/Insert_User_Search.php#L106",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/front-end-only-users/trunk/Shortcodes/Insert_User_Search.php#L80",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3142978/",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/048ea84c-0d53-434b-ae49-d804ec1de8c4?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-7607",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-08-29T11:15:28.963",
|
||||
"lastModified": "2024-08-29T13:25:27.537",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-30T15:41:02.407",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Front End Users plugin for WordPress is vulnerable to time-based SQL Injection via the \u2018order\u2019 parameter in all versions up to, and including, 3.2.28 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Contributor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento Front End Users para WordPress es vulnerable a la inyecci\u00f3n SQL basada en tiempo a trav\u00e9s del par\u00e1metro 'order' en todas las versiones hasta la 3.2.28 incluida, debido a un escape insuficiente en el par\u00e1metro proporcionado por el usuario y a la falta de preparaci\u00f3n suficiente en la consulta SQL existente. Esto permite que los atacantes autenticados, con acceso de nivel de colaborador y superior, agreguen consultas SQL adicionales a las consultas ya existentes que se pueden usar para extraer informaci\u00f3n confidencial de la base de datos."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -47,30 +51,66 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:etoilewebdesign:front_end_users:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "3.2.29",
|
||||
"matchCriteriaId": "9ECEB3A6-5913-40C8-9DE9-9CC10FA5DD93"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/front-end-only-users/trunk/html/UsersPage.php#L42",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/front-end-only-users/trunk/html/UsersPage.php#L60",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/front-end-only-users/trunk/html/UsersPage.php#L63",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/front-end-only-users/trunk/html/UsersPage.php#L76",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3142978/",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ec162cdc-d4cd-47d9-b941-24bfee6c48fd?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-8193",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2024-08-28T23:15:05.477",
|
||||
"lastModified": "2024-08-29T20:37:09.290",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-30T15:52:33.747",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"type": "Secondary",
|
||||
@ -61,14 +91,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "128.0.6613.113",
|
||||
"matchCriteriaId": "011E99EA-D99F-4382-8AA1-C1E58952549A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop_28.html",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://issues.chromium.org/issues/360265320",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-8198",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2024-08-28T23:15:06.243",
|
||||
"lastModified": "2024-08-29T20:37:11.403",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-30T15:52:02.687",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"type": "Secondary",
|
||||
@ -61,14 +91,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "128.0.6613.113",
|
||||
"matchCriteriaId": "011E99EA-D99F-4382-8AA1-C1E58952549A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop_28.html",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://issues.chromium.org/issues/360758697",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-8199",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-08-27T16:15:08.173",
|
||||
"lastModified": "2024-08-27T18:33:14.247",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-30T15:04:28.803",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Reviews Feed \u2013 Add Testimonials and Customer Reviews From Google Reviews, Yelp, TripAdvisor, and More plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'update_api_key' function in all versions up to, and including, 1.1.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update API Key options."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento Reviews Feed \u2013 Add Testimonials and Customer Reviews From Google Reviews, Yelp, TripAdvisor, and More para WordPress es vulnerable a modificaciones no autorizadas de datos debido a una falta de verificaci\u00f3n de capacidad en la funci\u00f3n 'update_api_key' en todas las versiones hasta, e incluyendo, 1.1.2. Esto hace posible que los atacantes autenticados, con acceso a nivel de suscriptor y superior, actualicen las opciones de clave API."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -36,6 +40,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
@ -47,18 +61,46 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:smashballoon:reviews_feed:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "1.2.0",
|
||||
"matchCriteriaId": "E1638189-CC41-45D9-94DC-2EE63BFB2387"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/reviews-feed/tags/1.1.2/class/Common/Builder/SBR_Feed_Saver_Manager.php#L699",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3125315/",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/dc3e89e5-2e7e-497e-b340-b787ebdf3711?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-8200",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-08-27T16:15:08.383",
|
||||
"lastModified": "2024-08-27T18:33:14.247",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-30T15:08:24.643",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Reviews Feed \u2013 Add Testimonials and Customer Reviews From Google Reviews, Yelp, TripAdvisor, and More plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.1.2. This is due to missing or incorrect nonce validation on the 'update_api_key' function. This makes it possible for unauthenticated attackers to update an API key via a forged request granted they can trick a site administrator into performing an action such as clicking on a link."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento Reviews Feed \u2013 Add Testimonials and Customer Reviews From Google Reviews, Yelp, TripAdvisor, and More para WordPress es vulnerable a Cross-Site Request Forgery en todas las versiones hasta la 1.1.2 incluida. Esto se debe a una validaci\u00f3n nonce faltante o incorrecta en la funci\u00f3n 'update_api_key'. Esto hace posible que atacantes no autenticados actualicen una clave API a trav\u00e9s de una solicitud falsificada, siempre que puedan enga\u00f1ar al administrador del sitio para que realice una acci\u00f3n como hacer clic en un enlace."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -36,6 +40,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
@ -47,18 +61,46 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:smashballoon:reviews_feed:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "1.2.0",
|
||||
"matchCriteriaId": "E1638189-CC41-45D9-94DC-2EE63BFB2387"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/reviews-feed/tags/1.1.2/class/Common/Builder/SBR_Feed_Saver_Manager.php#L699",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3125315/",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5d9e20f7-813c-4691-bce4-d0ff4774ae48?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-8294",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-08-29T11:15:29.603",
|
||||
"lastModified": "2024-08-29T13:25:27.537",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-30T15:38:13.437",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as critical, was found in FeehiCMS up to 2.1.1. This affects the function update of the file /admin/index.php?r=friendly-link%2Fupdate. The manipulation of the argument FriendlyLink[image] leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha detectado una vulnerabilidad clasificada como cr\u00edtica en FeehiCMS hasta la versi\u00f3n 2.1.1. Afecta a la funci\u00f3n de actualizaci\u00f3n del archivo /admin/index.php?r=friendly-link%2Fupdate. La manipulaci\u00f3n del argumento FriendlyLink[image] permite la carga sin restricciones. Es posible iniciar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -57,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -116,22 +140,55 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:feehi:feehicms:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "2.1.1",
|
||||
"matchCriteriaId": "BC1BB163-E338-4110-A6B8-0AF9510EDE25"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitee.com/A0kooo/cve_article/blob/master/feehi_cms/Fichkems%20Friendley-Link%20file%20upload%20vulnerability.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.276069",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.276069",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.394556",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-8295",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-08-29T12:15:04.537",
|
||||
"lastModified": "2024-08-29T13:25:27.537",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-30T15:37:41.510",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability has been found in FeehiCMS up to 2.1.1 and classified as critical. This vulnerability affects the function createBanner of the file /admin/index.php?r=banner%2Fbanner-create. The manipulation of the argument BannerForm[img] leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha encontrado una vulnerabilidad en FeehiCMS hasta la versi\u00f3n 2.1.1 y se ha clasificado como cr\u00edtica. Esta vulnerabilidad afecta a la funci\u00f3n createBanner del archivo /admin/index.php?r=banner%2Fbanner-create. La manipulaci\u00f3n del argumento BannerForm[img] provoca una carga sin restricciones. El ataque se puede iniciar de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -57,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -116,22 +140,55 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:feehi:feehicms:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "2.1.1",
|
||||
"matchCriteriaId": "BC1BB163-E338-4110-A6B8-0AF9510EDE25"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitee.com/A0kooo/cve_article/blob/master/feehi_cms/file_upload2/Fichkems%20banner%20file%20upload%20vulnerability.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.276070",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.276070",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.394560",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-8296",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-08-29T13:15:07.087",
|
||||
"lastModified": "2024-08-29T13:25:27.537",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-30T15:36:36.383",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in FeehiCMS up to 2.1.1 and classified as critical. This issue affects the function insert of the file /admin/index.php?r=user%2Fcreate. The manipulation of the argument User[avatar] leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha detectado una vulnerabilidad en FeehiCMS hasta la versi\u00f3n 2.1.1 y se ha clasificado como cr\u00edtica. Este problema afecta a la funci\u00f3n de inserci\u00f3n del archivo /admin/index.php?r=user%2Fcreate. La manipulaci\u00f3n del argumento User[avatar] provoca una carga sin restricciones. El ataque puede iniciarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -57,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -116,22 +140,55 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:feehi:feehicms:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "2.1.1",
|
||||
"matchCriteriaId": "BC1BB163-E338-4110-A6B8-0AF9510EDE25"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitee.com/A0kooo/cve_article/blob/master/feehi_cms/file_upload3/Fichkems%20user%20file%20upload%20vulnerability.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.276071",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.276071",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.394568",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-8297",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-08-29T13:15:07.370",
|
||||
"lastModified": "2024-08-29T13:25:27.537",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-30T15:28:50.863",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in kitsada8621 Digital Library Management System 1.0. It has been classified as problematic. Affected is the function JwtRefreshAuth of the file middleware/jwt_refresh_token_middleware.go. The manipulation of the argument Authorization leads to improper output neutralization for logs. It is possible to launch the attack remotely. The name of the patch is 81b3336b4c9240f0bf50c13cb8375cf860d945f1. It is recommended to apply a patch to fix this issue."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha encontrado una vulnerabilidad en kitsada8621 Digital Library Management System 1.0. Se ha clasificado como problem\u00e1tica. La funci\u00f3n afectada es JwtRefreshAuth del archivo middleware/jwt_refresh_token_middleware.go. La manipulaci\u00f3n del argumento Authorization provoca una neutralizaci\u00f3n incorrecta de la salida de los registros. Es posible lanzar el ataque de forma remota. El nombre del parche es 81b3336b4c9240f0bf50c13cb8375cf860d945f1. Se recomienda aplicar un parche para solucionar este problema."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -57,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -106,8 +130,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-116"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -116,26 +150,62 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:kitsada8621:digital_library_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D1405CD5-ECA2-4027-B5A3-89E60FDF28E4"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/kitsada8621/Digital-Library-Management-System/commit/81b3336b4c9240f0bf50c13cb8375cf860d945f1",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/kitsada8621/Digital-Library-Management-System/issues/1",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Issue Tracking",
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.276072",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.276072",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.394613",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-8301",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-08-29T13:15:07.660",
|
||||
"lastModified": "2024-08-29T13:25:27.537",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-30T15:24:09.830",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in dingfanzu CMS up to 29d67d9044f6f93378e6eb6ff92272217ff7225c. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /ajax/checkin.php. The manipulation of the argument username leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se encontr\u00f3 una vulnerabilidad en dingfanzu CMS hasta 29d67d9044f6f93378e6eb6ff92272217ff7225c. Se ha declarado como cr\u00edtica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /ajax/checkin.php. La manipulaci\u00f3n del argumento username provoca una inyecci\u00f3n SQL. El ataque se puede ejecutar de forma remota. La vulnerabilidad se ha divulgado al p\u00fablico y puede utilizarse. Este producto adopta el enfoque de lanzamientos continuos para proporcionar una entrega continua. Por lo tanto, no est\u00e1n disponibles los detalles de las versiones afectadas y actualizadas. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -57,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -116,22 +140,54 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gitapp:dingfanzu:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "2024-01-31",
|
||||
"matchCriteriaId": "30474E6F-0652-4900-91C6-609EE709C503"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Xor-Gerke/webray.com.cn/blob/main/cve/dingfanzu-CMS/dingfanzu-CMS%20checkin.php%20username%20SQL-inject.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.276073",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.276073",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.396294",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
141
CVE-2024/CVE-2024-83xx/CVE-2024-8336.json
Normal file
141
CVE-2024/CVE-2024-83xx/CVE-2024-8336.json
Normal file
@ -0,0 +1,141 @@
|
||||
{
|
||||
"id": "CVE-2024-8336",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-08-30T14:15:17.840",
|
||||
"lastModified": "2024-08-30T14:15:17.840",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as critical was found in SourceCodester Music Gallery Site 1.0. Affected by this vulnerability is an unknown functionality of the file /php-music/classes/Master.php?f=delete_music. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "LOW",
|
||||
"vulnerableSystemIntegrity": "LOW",
|
||||
"vulnerableSystemAvailability": "LOW",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 6.5
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/LiuHaoBin6/cve/blob/main/sql5.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.276211",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.276211",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.399039",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.sourcecodester.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
137
CVE-2024/CVE-2024-83xx/CVE-2024-8337.json
Normal file
137
CVE-2024/CVE-2024-83xx/CVE-2024-8337.json
Normal file
@ -0,0 +1,137 @@
|
||||
{
|
||||
"id": "CVE-2024-8337",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-08-30T14:15:18.297",
|
||||
"lastModified": "2024-08-30T14:15:18.297",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as problematic, has been found in SourceCodester Contact Manager with Export to VCF 1.0. Affected by this issue is some unknown functionality of the file index.html. The manipulation of the argument contact_name leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "NONE",
|
||||
"vulnerableSystemIntegrity": "LOW",
|
||||
"vulnerableSystemAvailability": "NONE",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 3.5,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.0
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.276212",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.276212",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.399338",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.sourcecodester.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
144
CVE-2024/CVE-2024-83xx/CVE-2024-8338.json
Normal file
144
CVE-2024/CVE-2024-83xx/CVE-2024-8338.json
Normal file
@ -0,0 +1,144 @@
|
||||
{
|
||||
"id": "CVE-2024-8338",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-08-30T15:15:19.973",
|
||||
"lastModified": "2024-08-30T15:15:19.973",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [
|
||||
{
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"unsupported-when-assigned"
|
||||
]
|
||||
}
|
||||
],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in HFO4 shudong-share 2.4.7. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /includes/fileReceive.php of the component File Extension Handler. The manipulation of the argument file leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. NOTE: This vulnerability only affects products that are no longer supported by the maintainer."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "LOW",
|
||||
"vulnerableSystemIntegrity": "LOW",
|
||||
"vulnerableSystemAvailability": "LOW",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 6.5
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/enjoyworld/webray.com.cn/blob/main/cves/shudong-share%20Any%20File%20Upload.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.276217",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.276217",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.399538",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
141
CVE-2024/CVE-2024-83xx/CVE-2024-8339.json
Normal file
141
CVE-2024/CVE-2024-83xx/CVE-2024-8339.json
Normal file
@ -0,0 +1,141 @@
|
||||
{
|
||||
"id": "CVE-2024-8339",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-08-30T15:15:20.453",
|
||||
"lastModified": "2024-08-30T15:15:20.453",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in SourceCodester Electric Billing Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /?page=tracks of the component Connection Code Handler. The manipulation of the argument code leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "LOW",
|
||||
"vulnerableSystemIntegrity": "LOW",
|
||||
"vulnerableSystemAvailability": "LOW",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 6.5
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/enjoyworld/webray.com.cn/blob/main/cves/Electric%20Billing%20Management%20System/Electric%20Billing%20Managemen%20SQL-inject%20System%20tracks.php%20SQL-inject.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.276218",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.276218",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.399540",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.sourcecodester.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
141
CVE-2024/CVE-2024-83xx/CVE-2024-8340.json
Normal file
141
CVE-2024/CVE-2024-83xx/CVE-2024-8340.json
Normal file
@ -0,0 +1,141 @@
|
||||
{
|
||||
"id": "CVE-2024-8340",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-08-30T15:15:20.903",
|
||||
"lastModified": "2024-08-30T15:15:20.903",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as critical has been found in SourceCodester Electric Billing Management System 1.0. This affects an unknown part of the file /Actions.php?a=login. The manipulation of the argument username leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "LOW",
|
||||
"vulnerableSystemIntegrity": "LOW",
|
||||
"vulnerableSystemAvailability": "LOW",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 6.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 7.5
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 10.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/enjoyworld/webray.com.cn/blob/main/cves/Electric%20Billing%20Management%20System/Electric%20Billing%20Managemen%20SQL-inject%20System%20Action.php%20SQL-inject.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.276219",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.276219",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.399548",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.sourcecodester.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
141
CVE-2024/CVE-2024-83xx/CVE-2024-8341.json
Normal file
141
CVE-2024/CVE-2024-83xx/CVE-2024-8341.json
Normal file
@ -0,0 +1,141 @@
|
||||
{
|
||||
"id": "CVE-2024-8341",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-08-30T15:15:21.340",
|
||||
"lastModified": "2024-08-30T15:15:21.340",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as critical was found in SourceCodester Petshop Management System 1.0. This vulnerability affects unknown code of the file /controllers/add_user.php. The manipulation of the argument avatar leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "LOW",
|
||||
"vulnerableSystemIntegrity": "LOW",
|
||||
"vulnerableSystemAvailability": "LOW",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 6.5
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/enjoyworld/webray.com.cn/blob/main/cves/Petshop_Management_System/Petshop_Management_System%20add_user.php%20any%20file%20upload.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.276220",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.276220",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.399661",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.sourcecodester.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
70
README.md
70
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-08-30T14:00:18.315797+00:00
|
||||
2024-08-30T16:00:18.181842+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-08-30T13:56:33.083000+00:00
|
||||
2024-08-30T15:59:08.873000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,48 +33,50 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
261579
|
||||
261585
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `4`
|
||||
Recently added CVEs: `6`
|
||||
|
||||
- [CVE-2024-8260](CVE-2024/CVE-2024-82xx/CVE-2024-8260.json) (`2024-08-30T13:15:12.347`)
|
||||
- [CVE-2024-8332](CVE-2024/CVE-2024-83xx/CVE-2024-8332.json) (`2024-08-30T12:15:04.657`)
|
||||
- [CVE-2024-8334](CVE-2024/CVE-2024-83xx/CVE-2024-8334.json) (`2024-08-30T13:15:12.587`)
|
||||
- [CVE-2024-8335](CVE-2024/CVE-2024-83xx/CVE-2024-8335.json) (`2024-08-30T13:15:13.103`)
|
||||
- [CVE-2024-8336](CVE-2024/CVE-2024-83xx/CVE-2024-8336.json) (`2024-08-30T14:15:17.840`)
|
||||
- [CVE-2024-8337](CVE-2024/CVE-2024-83xx/CVE-2024-8337.json) (`2024-08-30T14:15:18.297`)
|
||||
- [CVE-2024-8338](CVE-2024/CVE-2024-83xx/CVE-2024-8338.json) (`2024-08-30T15:15:19.973`)
|
||||
- [CVE-2024-8339](CVE-2024/CVE-2024-83xx/CVE-2024-8339.json) (`2024-08-30T15:15:20.453`)
|
||||
- [CVE-2024-8340](CVE-2024/CVE-2024-83xx/CVE-2024-8340.json) (`2024-08-30T15:15:20.903`)
|
||||
- [CVE-2024-8341](CVE-2024/CVE-2024-83xx/CVE-2024-8341.json) (`2024-08-30T15:15:21.340`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `135`
|
||||
Recently modified CVEs: `70`
|
||||
|
||||
- [CVE-2024-6650](CVE-2024/CVE-2024-66xx/CVE-2024-6650.json) (`2024-08-30T12:53:58.763`)
|
||||
- [CVE-2024-6670](CVE-2024/CVE-2024-66xx/CVE-2024-6670.json) (`2024-08-30T13:00:05.390`)
|
||||
- [CVE-2024-6671](CVE-2024/CVE-2024-66xx/CVE-2024-6671.json) (`2024-08-30T13:00:05.390`)
|
||||
- [CVE-2024-6672](CVE-2024/CVE-2024-66xx/CVE-2024-6672.json) (`2024-08-30T13:00:05.390`)
|
||||
- [CVE-2024-7071](CVE-2024/CVE-2024-70xx/CVE-2024-7071.json) (`2024-08-30T13:56:33.083`)
|
||||
- [CVE-2024-7122](CVE-2024/CVE-2024-71xx/CVE-2024-7122.json) (`2024-08-30T13:00:05.390`)
|
||||
- [CVE-2024-7523](CVE-2024/CVE-2024-75xx/CVE-2024-7523.json) (`2024-08-30T12:59:29.710`)
|
||||
- [CVE-2024-7858](CVE-2024/CVE-2024-78xx/CVE-2024-7858.json) (`2024-08-30T13:00:05.390`)
|
||||
- [CVE-2024-8016](CVE-2024/CVE-2024-80xx/CVE-2024-8016.json) (`2024-08-30T13:00:05.390`)
|
||||
- [CVE-2024-8181](CVE-2024/CVE-2024-81xx/CVE-2024-8181.json) (`2024-08-30T13:53:29.953`)
|
||||
- [CVE-2024-8182](CVE-2024/CVE-2024-81xx/CVE-2024-8182.json) (`2024-08-30T13:53:52.197`)
|
||||
- [CVE-2024-8207](CVE-2024/CVE-2024-82xx/CVE-2024-8207.json) (`2024-08-30T13:07:46.613`)
|
||||
- [CVE-2024-8234](CVE-2024/CVE-2024-82xx/CVE-2024-8234.json) (`2024-08-30T13:00:05.390`)
|
||||
- [CVE-2024-8252](CVE-2024/CVE-2024-82xx/CVE-2024-8252.json) (`2024-08-30T13:00:05.390`)
|
||||
- [CVE-2024-8255](CVE-2024/CVE-2024-82xx/CVE-2024-8255.json) (`2024-08-30T13:00:05.390`)
|
||||
- [CVE-2024-8274](CVE-2024/CVE-2024-82xx/CVE-2024-8274.json) (`2024-08-30T13:00:05.390`)
|
||||
- [CVE-2024-8302](CVE-2024/CVE-2024-83xx/CVE-2024-8302.json) (`2024-08-30T13:00:05.390`)
|
||||
- [CVE-2024-8303](CVE-2024/CVE-2024-83xx/CVE-2024-8303.json) (`2024-08-30T13:00:05.390`)
|
||||
- [CVE-2024-8304](CVE-2024/CVE-2024-83xx/CVE-2024-8304.json) (`2024-08-30T13:00:05.390`)
|
||||
- [CVE-2024-8319](CVE-2024/CVE-2024-83xx/CVE-2024-8319.json) (`2024-08-30T13:00:05.390`)
|
||||
- [CVE-2024-8327](CVE-2024/CVE-2024-83xx/CVE-2024-8327.json) (`2024-08-30T13:00:05.390`)
|
||||
- [CVE-2024-8328](CVE-2024/CVE-2024-83xx/CVE-2024-8328.json) (`2024-08-30T13:00:05.390`)
|
||||
- [CVE-2024-8329](CVE-2024/CVE-2024-83xx/CVE-2024-8329.json) (`2024-08-30T13:00:05.390`)
|
||||
- [CVE-2024-8330](CVE-2024/CVE-2024-83xx/CVE-2024-8330.json) (`2024-08-30T13:00:05.390`)
|
||||
- [CVE-2024-8331](CVE-2024/CVE-2024-83xx/CVE-2024-8331.json) (`2024-08-30T13:00:05.390`)
|
||||
- [CVE-2024-44340](CVE-2024/CVE-2024-443xx/CVE-2024-44340.json) (`2024-08-30T14:56:38.207`)
|
||||
- [CVE-2024-44341](CVE-2024/CVE-2024-443xx/CVE-2024-44341.json) (`2024-08-30T14:57:07.260`)
|
||||
- [CVE-2024-44342](CVE-2024/CVE-2024-443xx/CVE-2024-44342.json) (`2024-08-30T14:57:40.020`)
|
||||
- [CVE-2024-44760](CVE-2024/CVE-2024-447xx/CVE-2024-44760.json) (`2024-08-30T15:55:41.137`)
|
||||
- [CVE-2024-45264](CVE-2024/CVE-2024-452xx/CVE-2024-45264.json) (`2024-08-30T15:02:34.610`)
|
||||
- [CVE-2024-45491](CVE-2024/CVE-2024-454xx/CVE-2024-45491.json) (`2024-08-30T14:35:09.057`)
|
||||
- [CVE-2024-45492](CVE-2024/CVE-2024-454xx/CVE-2024-45492.json) (`2024-08-30T14:35:09.790`)
|
||||
- [CVE-2024-5469](CVE-2024/CVE-2024-54xx/CVE-2024-5469.json) (`2024-08-30T14:15:16.703`)
|
||||
- [CVE-2024-5651](CVE-2024/CVE-2024-56xx/CVE-2024-5651.json) (`2024-08-30T14:15:16.820`)
|
||||
- [CVE-2024-6323](CVE-2024/CVE-2024-63xx/CVE-2024-6323.json) (`2024-08-30T14:15:16.947`)
|
||||
- [CVE-2024-6595](CVE-2024/CVE-2024-65xx/CVE-2024-6595.json) (`2024-08-30T14:15:17.063`)
|
||||
- [CVE-2024-6632](CVE-2024/CVE-2024-66xx/CVE-2024-6632.json) (`2024-08-30T14:07:18.443`)
|
||||
- [CVE-2024-6633](CVE-2024/CVE-2024-66xx/CVE-2024-6633.json) (`2024-08-30T14:11:45.287`)
|
||||
- [CVE-2024-6783](CVE-2024/CVE-2024-67xx/CVE-2024-6783.json) (`2024-08-30T15:15:18.623`)
|
||||
- [CVE-2024-7606](CVE-2024/CVE-2024-76xx/CVE-2024-7606.json) (`2024-08-30T15:43:41.773`)
|
||||
- [CVE-2024-7607](CVE-2024/CVE-2024-76xx/CVE-2024-7607.json) (`2024-08-30T15:41:02.407`)
|
||||
- [CVE-2024-8193](CVE-2024/CVE-2024-81xx/CVE-2024-8193.json) (`2024-08-30T15:52:33.747`)
|
||||
- [CVE-2024-8198](CVE-2024/CVE-2024-81xx/CVE-2024-8198.json) (`2024-08-30T15:52:02.687`)
|
||||
- [CVE-2024-8199](CVE-2024/CVE-2024-81xx/CVE-2024-8199.json) (`2024-08-30T15:04:28.803`)
|
||||
- [CVE-2024-8200](CVE-2024/CVE-2024-82xx/CVE-2024-8200.json) (`2024-08-30T15:08:24.643`)
|
||||
- [CVE-2024-8294](CVE-2024/CVE-2024-82xx/CVE-2024-8294.json) (`2024-08-30T15:38:13.437`)
|
||||
- [CVE-2024-8295](CVE-2024/CVE-2024-82xx/CVE-2024-8295.json) (`2024-08-30T15:37:41.510`)
|
||||
- [CVE-2024-8296](CVE-2024/CVE-2024-82xx/CVE-2024-8296.json) (`2024-08-30T15:36:36.383`)
|
||||
- [CVE-2024-8297](CVE-2024/CVE-2024-82xx/CVE-2024-8297.json) (`2024-08-30T15:28:50.863`)
|
||||
- [CVE-2024-8301](CVE-2024/CVE-2024-83xx/CVE-2024-8301.json) (`2024-08-30T15:24:09.830`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
394
_state.csv
394
_state.csv
@ -166434,7 +166434,7 @@ CVE-2021-2012,0,0,a7497abc79a132cbd33fc617e50925f2242fda24645cad961e1ea637ac2286
|
||||
CVE-2021-20120,0,0,fc42e2fcc67c6abc4f94788f41d9fdadbae18c36b471de42b55c6234c4410cc7,2021-10-27T12:19:28.913000
|
||||
CVE-2021-20121,0,0,c2d936c682cb4b093e51b4f8ec52f1c64330b86cc67891ab1a0ca5b68295cc37,2021-10-18T18:44:13.643000
|
||||
CVE-2021-20122,0,0,b4fb94bc0a558b850232f8792e2996ff453015fcafdf1875ab2f6621f59911b9,2022-06-28T14:11:45.273000
|
||||
CVE-2021-20123,0,0,046ac39f74dd41f7cc68bc3d081d7b26daf3f7c77c4b48e630d3caa15f9d9175,2022-07-12T17:42:04.277000
|
||||
CVE-2021-20123,0,1,1de84df3032ac94928739eb9069b2969a5f97ec63f0863ede977079c3531b210,2024-08-30T14:35:00.660000
|
||||
CVE-2021-20124,0,0,5d999e0933e2aac28e4400be99a3b6228da04904846c7adcfdba0c4a87edd059,2022-07-12T17:42:04.277000
|
||||
CVE-2021-20125,0,0,53f895aeed66324b20a83d10d5f271d8f051f6cc798daa7850821732c14258d9,2021-10-19T16:53:47.787000
|
||||
CVE-2021-20126,0,0,06315eba694191411cf0fddf956e398a37b8e3cf205d58b10a4327d33930199b,2021-10-19T17:38:16.187000
|
||||
@ -205865,7 +205865,7 @@ CVE-2022-39987,0,0,935e129be5736816f1f64b48bbd72f708d4658000d85ae733b0eebdff57e6
|
||||
CVE-2022-39988,0,0,9f069419049172b539dd2423b25d3d05c1cc2c011ba2c6a9dcec6c5b14ff3854,2022-10-06T23:35:22.903000
|
||||
CVE-2022-39989,0,0,7ffdce84d8cd26b98c707b03c57c173dd5d7b41678d150601e81ecbc1bbf6f23,2023-05-04T19:49:24.510000
|
||||
CVE-2022-3999,0,0,56326c6b077d7a3c7ca90954778c1f40832d60973c4c7842e4f24fc67bbe6eef,2023-11-07T03:52:05.753000
|
||||
CVE-2022-39996,0,0,515d89341d75fc891c2495715479db343fbd6a795549afa8dc6e58128081b767,2024-08-27T21:35:01.140000
|
||||
CVE-2022-39996,0,1,e3bdff178a99add8306a65002c53a9cfcfa62f90b9d0f047f17a48ae32323404,2024-08-30T15:17:40.717000
|
||||
CVE-2022-39997,0,0,c4be36e10992cb34e24c9e36e48466b46176d35b275196043e4e9383a4fda946,2024-08-28T14:35:01.570000
|
||||
CVE-2022-4000,0,0,293c79822977efd995079bd9f91c2bb859b092b412fd024b23d45cadf6837091,2023-11-07T03:56:39.273000
|
||||
CVE-2022-40000,0,0,b2c90b4cd331ea48eb1c696df1cfed736f89b655e360d832a043e7696dd829cb,2022-12-19T16:23:40.887000
|
||||
@ -212468,7 +212468,7 @@ CVE-2022-48940,0,0,6f15a6b4fa7f43e99852715a17fcd420a06e24b0776b09d707d9bdb81ddea
|
||||
CVE-2022-48941,0,0,723bbba9bcccbd20edb366905d194ad938e20cb00b782a5e655658df54707693,2024-08-22T18:41:37.090000
|
||||
CVE-2022-48942,0,0,2cf46354691478839d2223efa2eaa869b06a9729fd72ecdcbb1c9e9660f0aaa9,2024-08-22T18:25:14.867000
|
||||
CVE-2022-48943,0,0,a7018e1dbe7c5677e235ba4ed082a73fce76282052204bd38ca850f621dffe72,2024-08-22T18:27:42.807000
|
||||
CVE-2022-48944,0,1,53e7cdc2fb003c3ce9c55f7c5334ab4f61ad58f54e78b8f7cdb5e525a1e82817,2024-08-30T13:00:05.390000
|
||||
CVE-2022-48944,0,0,53e7cdc2fb003c3ce9c55f7c5334ab4f61ad58f54e78b8f7cdb5e525a1e82817,2024-08-30T13:00:05.390000
|
||||
CVE-2022-4895,0,0,0efd54174b680d04b5646c623fd6b294801b419a72088921312b45e7bb6c068f,2023-11-07T03:59:15.667000
|
||||
CVE-2022-4896,0,0,04cb60ab8732a1bfba8bf7d8a4df08b8371cdecc380fd455d1b928e8213822e1,2023-09-15T15:18:10.843000
|
||||
CVE-2022-4897,0,0,0a243664793293bb535173693d8b2bb850e8caf27eb71e5f98003bf4c293392a,2023-11-07T03:59:15.853000
|
||||
@ -217942,7 +217942,7 @@ CVE-2023-24134,0,0,156ab157adf7bea50d09283df2ade9a297a32775320b7cec25ccfc7fb542f
|
||||
CVE-2023-24135,0,0,e617c1724856d088d5cc329b45e241d37f9534b3d6a8a97093b73ecbf55778db,2024-01-29T18:26:55.150000
|
||||
CVE-2023-24138,0,0,5b7b4eed5ad17ad5d610f0397312d19e35fb7d1fd6a184ba16bfd3270f0568bd,2023-02-10T13:35:38.923000
|
||||
CVE-2023-24139,0,0,53816b7896c1c11d8bc05b9b44f21b4abe54647cc0a96564d3ec1f5a0cce190b,2023-02-10T13:42:03.507000
|
||||
CVE-2023-2414,0,1,ed13805ea28566b817b12fac5805b103edc457707077bcea1d492a4bf412d082,2024-08-30T13:54:57.143000
|
||||
CVE-2023-2414,0,0,ed13805ea28566b817b12fac5805b103edc457707077bcea1d492a4bf412d082,2024-08-30T13:54:57.143000
|
||||
CVE-2023-24140,0,0,6ee553cec2b3ac94e943b071aad246c56375fdd51aba502c03438bacafe76632,2023-02-10T13:43:19.697000
|
||||
CVE-2023-24141,0,0,7ccb11f0350331595054bb9e5b1aec18672af9e9180eb391dd46a5e43d35ddf3,2023-02-10T14:57:23.833000
|
||||
CVE-2023-24142,0,0,1cdc5afc5198434b944003549fe2c8c28a2a72388079de1ab5132c34fdc24e52,2023-02-10T14:58:39.327000
|
||||
@ -240824,7 +240824,7 @@ CVE-2023-6950,0,0,2ea33d6aa9986466b9dcd4e1cdc7f6b7576fa990477f369fd2576954029da4
|
||||
CVE-2023-6951,0,0,2d0b3112fa249cad8de506992400bfeb297240f38415795d6179d5ede864bd9a,2024-04-02T12:50:42.233000
|
||||
CVE-2023-6953,0,0,049acf0127c7ad8d23801ce9be6768c1adc281ba394b914bdc6c40e63b989b4b,2024-02-22T03:39:59.017000
|
||||
CVE-2023-6954,0,0,38083f7de1fe9a5b161f9cbaae0c7bbc9ee6d77a4ee5f94afc743432cd2c4b87,2024-03-13T18:16:18.563000
|
||||
CVE-2023-6955,0,0,48126bb551422467b3568598ebaa0d72aa6095218839bb560cfb40be4786f7dd,2024-01-18T21:16:42.053000
|
||||
CVE-2023-6955,0,1,f07930d72215dd47b2562b244dca586d4bff972348a319e8508326b1d31762e7,2024-08-30T14:15:14.797000
|
||||
CVE-2023-6956,0,0,ebab8c4d5b24405f0d58e5a99fa9a736eda2c65adad9bc90f9186d3a4f452f2e,2024-07-18T15:59:12.007000
|
||||
CVE-2023-6957,0,0,07959fb3f32e925a62f4301abfce36bb0dff388d72f0d4f67e8b6a8fe0020487,2024-03-13T18:16:18.563000
|
||||
CVE-2023-6958,0,0,dfa9f23d52119de772dd91366d6bc1b2e70ca715d55949e74432bb3d34dda7cd,2024-01-24T20:47:14.900000
|
||||
@ -240891,7 +240891,7 @@ CVE-2023-7024,0,0,0b0d6e2cd8a55b4494cdd2b77e9f647f33c47f79573c34c6c5e8c28805a72b
|
||||
CVE-2023-7025,0,0,e7834d97731a235cf0f177f71735e5ca7d5fcff5ac726923c8b5198da81ec286,2024-05-17T02:34:03.957000
|
||||
CVE-2023-7026,0,0,1cc936e616463b5ff1b033dcc860db201e66a8dd5c5dbaeca22f086a6f79ffd6,2024-05-17T02:34:04.063000
|
||||
CVE-2023-7027,0,0,fc1293543654e15b720c38a66bb6f2ec15c9fc5eb3fe91f4129c0466a44102c9,2024-02-02T16:30:28.857000
|
||||
CVE-2023-7028,0,0,edb50b2554d53d01a187f80b6d9c853f81792e44d556d8a569e3078b0628cd62,2024-08-14T17:00:51.773000
|
||||
CVE-2023-7028,0,1,f40a12927af87d10b267447cacfa464009eae7fa88a59d293cbd140eb4ecada9,2024-08-30T14:15:14.943000
|
||||
CVE-2023-7029,0,0,0b2077503389563a2cf8a194211de95f4cbe22ad4680ab3928b7bbbf465fb95d,2024-02-13T18:49:46.303000
|
||||
CVE-2023-7030,0,0,f49772cf48990c4178ee421660106a6fa59de551116b4fc6d8b00fd41a2d7e54,2024-05-02T18:00:37.360000
|
||||
CVE-2023-7031,0,0,fd21885ac32f4e4ebf79a0a01265d00a38f09b08812eedc920f03ba00e1c3538,2024-01-25T16:32:53.153000
|
||||
@ -241436,7 +241436,7 @@ CVE-2024-0417,0,0,dd9f5b322df69964a4ff21bad59f48ca63754b7b36fe14548e6b078637e05b
|
||||
CVE-2024-0418,0,0,a4d9fbd34c009dab9cb5735c654e6c369935a35e5792215200e6e54bdff97075,2024-05-17T02:34:36.367000
|
||||
CVE-2024-0419,0,0,b26f506c542016202acd62fe2049c0517bdb04542f856ac6e321d59e26235ae3,2024-05-17T02:34:36.473000
|
||||
CVE-2024-0420,0,0,f49e633be5c20416d50985e6763051bdeaa8d72b9657373079b003fa91212024,2024-02-12T17:31:21.670000
|
||||
CVE-2024-0421,0,1,06a40c6b323589fae4631172f03a5b95bdd41abf530e3a8ae3e0dec393bfabab,2024-08-30T13:15:12.090000
|
||||
CVE-2024-0421,0,0,06a40c6b323589fae4631172f03a5b95bdd41abf530e3a8ae3e0dec393bfabab,2024-08-30T13:15:12.090000
|
||||
CVE-2024-0422,0,0,9cfa967cc909d15fe78a7b5720604ab45742fcfb00d763be2ad0b04675c6426c,2024-05-17T02:34:36.623000
|
||||
CVE-2024-0423,0,0,82c7d2be58d44b88362ceb305fae745283a21d0b0ea8ac15b16bb0efb465e76f,2024-05-17T02:34:36.727000
|
||||
CVE-2024-0424,0,0,d81f5c72aac7353b02fad1af88851a7a044a95832f1d95e68c059f7a2da0088b,2024-05-17T02:34:36.843000
|
||||
@ -241867,7 +241867,7 @@ CVE-2024-0873,0,0,0d017532f0822fb01a43bd5a5b6fb8ed2d6c3075b76ac0b6436fcb6d890c94
|
||||
CVE-2024-0874,0,0,0d06d41ad980e2c2fabe0273b7dabf70fd4ee5748515375a76f42170d33e1729,2024-08-02T13:16:02.740000
|
||||
CVE-2024-0879,0,0,40ca4d922e04a74721c93cda9d6ef307a09b39f845db5f9dd6db6b694e034cf2,2024-01-31T19:16:07.630000
|
||||
CVE-2024-0880,0,0,44431bf4f01e73978bc2a282db63f61857269e71b91d3e3d902140e76c6dd1ce,2024-05-17T02:35:00.317000
|
||||
CVE-2024-0881,0,1,98f221da2ce5b910f526cf4601e71f3a4679fdd70405fdedbf2c41fb491a9b53,2024-08-30T13:15:12.190000
|
||||
CVE-2024-0881,0,0,98f221da2ce5b910f526cf4601e71f3a4679fdd70405fdedbf2c41fb491a9b53,2024-08-30T13:15:12.190000
|
||||
CVE-2024-0882,0,0,84f9ccec11ac50ed76f1b2b2a213c4de6a55caf9106a40c86eeec8ed6146aa41,2024-05-17T02:35:00.453000
|
||||
CVE-2024-0883,0,0,1770a78a30c574d0609966466d73d5fca219f70c80b5926c2f2202433ad0de4d,2024-05-17T02:35:00.570000
|
||||
CVE-2024-0884,0,0,02bf1f09acddc232b1af1ecd3b28d9f047cb5419ab322210f451d56e705b4b96,2024-05-17T02:35:00.677000
|
||||
@ -242033,7 +242033,7 @@ CVE-2024-1052,0,0,2826dc83bebd9032f48348a63ffd25025c2a6126abd483892ed79004a77aef
|
||||
CVE-2024-1053,0,0,3d9e5b8218feb39348551f4e96f20fbacd04f2b39830165bb00a553a3d3c5ccf,2024-02-22T19:07:27.197000
|
||||
CVE-2024-1054,0,0,f8e7e53b5707aaecdfe1ea6fba53413ba04bed5cdf673762252b510775f984b1,2024-02-29T13:49:29.390000
|
||||
CVE-2024-1055,0,0,ccc78f7d4bd63bcc448b5e62f7789de0e1a26ab036272b89eca521cba41a35e3,2024-02-14T18:59:33.780000
|
||||
CVE-2024-1056,0,1,3f0ae96bf4ebeb3b3813aeccdecafbe25c8987ddc39c4b092ee6d08b0af2523f,2024-08-30T13:00:05.390000
|
||||
CVE-2024-1056,0,0,3f0ae96bf4ebeb3b3813aeccdecafbe25c8987ddc39c4b092ee6d08b0af2523f,2024-08-30T13:00:05.390000
|
||||
CVE-2024-1057,0,0,afa16fae44234143422d3d8f32f1ab0c34f389c2f0ebb0a7139bb0ca7e4b1769,2024-04-22T13:28:43.747000
|
||||
CVE-2024-1058,0,0,6b5e9e2c8572168cf164dc3fe2cb55f99ab49ff2791e71ab226d135ab3271443,2024-02-29T13:49:29.390000
|
||||
CVE-2024-1059,0,0,76d1b9b40438f497b680a6494941e57752e942263b38e7996980a78bf67b658a,2024-02-05T20:50:26.783000
|
||||
@ -242053,7 +242053,7 @@ CVE-2024-1072,0,0,d1340477909607c729b87fb4231ec3eb5b83c947dd2f9537edfb72049dfc44
|
||||
CVE-2024-1073,0,0,39b7dc528198b2afbafa91161478b052efb2c858a3c417cf6368bfe809460c5d,2024-02-07T20:56:30.313000
|
||||
CVE-2024-1074,0,0,dead9100582cc2974c0c91196eb84b5d13c4d6e306ff1bc10a509afe7df361d3,2024-03-13T18:16:18.563000
|
||||
CVE-2024-1075,0,0,b19be1823ece9ac4ec825cefa6ea1c80de9a3ed97dd278442b9d4fd30da7b4c5,2024-02-13T19:43:13.480000
|
||||
CVE-2024-1076,0,1,1eec5a2aed6def26ca78a00c90cdc2a9e26a823100b6419a30b16c630a915a03,2024-08-30T13:15:12.257000
|
||||
CVE-2024-1076,0,0,1eec5a2aed6def26ca78a00c90cdc2a9e26a823100b6419a30b16c630a915a03,2024-08-30T13:15:12.257000
|
||||
CVE-2024-1077,0,0,9052c519c4a7de5cf3516fc923116c25b788d5b36a137a2e416fb3d37403344d,2024-07-03T01:44:58.330000
|
||||
CVE-2024-1078,0,0,88568fa2f20f5ea8de25fda48576808429bbc616448df571a879f056db565620,2024-02-14T18:39:51.437000
|
||||
CVE-2024-1079,0,0,0a964f4e43e1a2d85a40a4753c5354fe293facf65d0ebcc06031e68ccad95a0f,2024-02-14T19:33:09.977000
|
||||
@ -242451,8 +242451,8 @@ CVE-2024-1488,0,0,882c78fbd7b0e9fe7403aeecbc9ce3b63d8e8855dfc05e684b04e2f8c2e6ba
|
||||
CVE-2024-1489,0,0,a34275ea6c4bb8516e035d729e8f7c545dca1bcc4ae724ed4234bb24b7160ab5,2024-03-13T18:15:58.530000
|
||||
CVE-2024-1491,0,0,4902ce9a581ddd4666d08b211372eca700dbe290cec1b79a72d1103d94b7a724,2024-05-28T17:15:09.103000
|
||||
CVE-2024-1492,0,0,842fd2ad2d3b77be2ed098e72c6e674500bb67958325ad29b19d2b30460d5fb9,2024-02-29T13:49:29.390000
|
||||
CVE-2024-1493,0,0,14f9de221ca66918d8bb965d46137a71933927256deda2fdf3c9e0cd51c79b69,2024-06-28T13:24:27.063000
|
||||
CVE-2024-1495,0,0,8367726a38b11f45fbdf96aef36328fbf6173c74b29fab47df243ada31185a63,2024-07-18T19:52:21.503000
|
||||
CVE-2024-1493,0,1,94e2ffd39271bbaa34f23c89909bb2cd1862573d5d6899e5e494b694638f268e,2024-08-30T14:15:15.167000
|
||||
CVE-2024-1495,0,1,d5112f9ba0843e4274caef5c7ec135de9dd03baeb09c42d5b844478309614199,2024-08-30T14:15:15.293000
|
||||
CVE-2024-1496,0,0,6d82aec60af8d476c91ca34384ad10e78487be89418dc120e728f3cc21539daa,2024-02-29T13:49:29.390000
|
||||
CVE-2024-1497,0,0,84872ffc192cc6e6ec0b81370997b466156a4cb279965af745199f9ad4beea1a,2024-03-13T18:15:58.530000
|
||||
CVE-2024-1498,0,0,94d0064bdd5fe476a6746d7b679a0e3488837d916d20f3fa70fb1f3acb6bc5ca,2024-04-10T13:24:00.070000
|
||||
@ -242493,9 +242493,9 @@ CVE-2024-1537,0,0,0fbbb428e5d6117794e506ac85f652d85cda102f4ab0cd6387f39041bf7253
|
||||
CVE-2024-1538,0,0,9fc7289e31e07bb56b9eb9128e9d1b6ba097152ab59ee8378f006443d204bcca,2024-03-21T12:58:51.093000
|
||||
CVE-2024-1540,0,0,8f40fefee3c1d81db1cb09d26a976b077353ff3be5e21ad7faf7c16fdb309e83,2024-04-16T12:15:09.617000
|
||||
CVE-2024-1541,0,0,b86c8271de1114c26151c28b4a73ced0b46884833e2a03ab8cf945b436dc1143,2024-03-13T18:15:58.530000
|
||||
CVE-2024-1543,0,1,f09e8bd144932cbfd26fcb94293719e93ce0739ea4f1a19f44970a086a000e18,2024-08-30T13:00:05.390000
|
||||
CVE-2024-1543,0,0,f09e8bd144932cbfd26fcb94293719e93ce0739ea4f1a19f44970a086a000e18,2024-08-30T13:00:05.390000
|
||||
CVE-2024-1544,0,0,265716934ae5f78af4714ddd5770ee1721802c8c59f6325c2998c6704d523a66,2024-08-28T12:57:39.090000
|
||||
CVE-2024-1545,0,1,55d071a8f91f9fe9a6e28ba79bbc4b5afe73a0bde3190b952d49fd581990a5ce,2024-08-30T13:00:05.390000
|
||||
CVE-2024-1545,0,0,55d071a8f91f9fe9a6e28ba79bbc4b5afe73a0bde3190b952d49fd581990a5ce,2024-08-30T13:00:05.390000
|
||||
CVE-2024-1546,0,0,25cf53baa34bb0b4805c5fe628b82b62aabfaaa6638a62497af9e0de14b093ff,2024-03-04T09:15:37.650000
|
||||
CVE-2024-1547,0,0,8590deab7ee2956de6a0ef76618a6a96ff52727cdbc8e57258f00f60bb5d5bd4,2024-03-04T09:15:37.740000
|
||||
CVE-2024-1548,0,0,6eee3f01728ed0fd4a2424a0afe7c369619c5f5c30c8c9a39afa9061aca1df3f,2024-03-04T09:15:37.787000
|
||||
@ -242663,7 +242663,7 @@ CVE-2024-1731,0,0,6081722b0fe7c7148e0b5194379412103d8160c8fab19963501893765ed8f7
|
||||
CVE-2024-1732,0,0,834564798b34803457a0ec9cad4eefb5bcc466f88b5c86130580cd8ef81bdf66,2024-04-02T12:50:42.233000
|
||||
CVE-2024-1733,0,0,1de98e53179418755768544ec663a550e1c566834940320a34ae086f141e0f3f,2024-03-17T22:38:29.433000
|
||||
CVE-2024-1735,0,0,d5d30fc000c2cb1bb165a9c01c00d55a797d1a347c4b21fcf662bb09cf8edd31,2024-08-26T17:35:03.340000
|
||||
CVE-2024-1736,0,0,a622ca00070de7a96b73d1a11c2dcf2634e69d5606345f8f86e99a97ccacdaf4,2024-07-18T19:50:31.223000
|
||||
CVE-2024-1736,0,1,0135c1eb1397a994768a81e9e9f4e835fac116fc8b4d5445ab136b9d3489ccb5,2024-08-30T14:15:15.450000
|
||||
CVE-2024-1737,0,0,431ef45da0f4b4670d42afc3c1240d1e4f77449968f30478ad5d3ddba17c5c7f,2024-08-01T13:46:11.850000
|
||||
CVE-2024-1738,0,0,65086d20a025a8acdbd054263ca4cd14eb5b5ba61d808610c94ef2eec44edd2f,2024-05-15T16:15:09.807000
|
||||
CVE-2024-1739,0,0,0f6aa88dfc12de7693a69727eb574af9b67e4c54140ec3c21c30b657e8fcbacf,2024-07-03T01:45:31.133000
|
||||
@ -242879,7 +242879,7 @@ CVE-2024-1959,0,0,20773b09a03765316a8a30eab375cea71fea1425346dc1ce35f18b661dfaac
|
||||
CVE-2024-1960,0,0,c755cb8cb954b0b1fd45e3b2b2de1bed153c08b47450f36752ad68952963c3e6,2024-04-10T13:23:38.787000
|
||||
CVE-2024-1961,0,0,dc2f9d3f3b67fb9e1c6125531b0d8e4d845cdbbf4294ea07c79e7fd65b2f59e9,2024-04-16T13:24:07.103000
|
||||
CVE-2024-1962,0,0,476e6b66d2ca2741a53c9d27ba89ea688db749fb510d2b8ea19c7c65ad5b2d5e,2024-08-28T14:35:06.573000
|
||||
CVE-2024-1963,0,0,497da3e0c849986f6d35bf596bea7f2a65b5687d8cd64468172b927cfb094a60,2024-07-18T19:46:01.863000
|
||||
CVE-2024-1963,0,1,6490d3cda92d4283b18d317f0502737ed9712d406302073ebfd8b50283399244,2024-08-30T14:15:15.577000
|
||||
CVE-2024-1965,0,0,5cf0344d0ba6ffdf46e178c3a3f0a22dafc37cdaf493620506aae0773081ac04,2024-02-28T14:06:45.783000
|
||||
CVE-2024-1968,0,0,5d386d638a6745d5972e3da785c6fa3ef4f25b00eef921490d278858d9e57670,2024-05-20T13:00:04.957000
|
||||
CVE-2024-1969,0,0,f69c98da43c82ba0223a7bad81bd76b37ab27a86dfdf24f5ab1b3124adecbf86,2024-04-30T13:11:16.690000
|
||||
@ -246258,7 +246258,7 @@ CVE-2024-25009,0,0,7a49371ecff66a731dba9be39b6c36a2872e7617aa621569c85562cb428fb
|
||||
CVE-2024-2501,0,0,6ce26352b8e14756a33573972eeb4c8a06096eee07ab0fb0ebb1c9238a943b1a,2024-04-10T13:23:38.787000
|
||||
CVE-2024-25015,0,0,4c1212c8f769823bd4e7049fb129f848dc20c143fc1cc72b02abca5f7451e069,2024-05-01T19:50:25.633000
|
||||
CVE-2024-25016,0,0,0e9311458b59df4142779e7a8b1d9bd170deea1a4bb4a555b03bbf822c263b92,2024-03-04T13:58:23.447000
|
||||
CVE-2024-2502,0,1,5db5ed3649b395e84b1ef1ea57e3373879dc28bf7136036f8d40e08ab963dda1,2024-08-30T13:00:05.390000
|
||||
CVE-2024-2502,0,0,5db5ed3649b395e84b1ef1ea57e3373879dc28bf7136036f8d40e08ab963dda1,2024-08-30T13:00:05.390000
|
||||
CVE-2024-25021,0,0,8332f86306f4ceab760e5f5e3a003f3f5c62fd1b6b574c6e3af70a41de71cd64,2024-02-22T19:07:27.197000
|
||||
CVE-2024-25023,0,0,3b6e01d80c9261e3c9d5f00ef664e0cb38b680e426f57b9aa0b21aa4414e149e,2024-07-11T13:05:54.930000
|
||||
CVE-2024-25024,0,0,c5213c97e29706cc8502e6ba764e983599ae5293cf5cf0bdf7f7d6886ba77ef4,2024-08-28T21:53:10.720000
|
||||
@ -247683,7 +247683,7 @@ CVE-2024-26936,0,0,8ecacf5676e1acdd53a4a6ff4e5fbeac9c5b7e2b8ed353407d3491dd67ba9
|
||||
CVE-2024-26937,0,0,33130fd04e0fa99aeccf3a69a79fa96a77ec456d0858750d9a99028babebdacc,2024-06-25T22:15:26.440000
|
||||
CVE-2024-26938,0,0,96ac3ebb354ca4dfcb1c66c1b68ad4ffcd043cacfbf00b0352d68804b44cf1b2,2024-05-01T13:02:20.750000
|
||||
CVE-2024-26939,0,0,3127531537fc8434c8a8153e0717ce9c8f7520225ded802370bdb01946c9c847,2024-07-03T01:50:03.663000
|
||||
CVE-2024-2694,0,1,0c490f0ad6db5784ec3549878448e3e4260d8e3217ff1684555de4ce549572f9,2024-08-30T13:00:05.390000
|
||||
CVE-2024-2694,0,0,0c490f0ad6db5784ec3549878448e3e4260d8e3217ff1684555de4ce549572f9,2024-08-30T13:00:05.390000
|
||||
CVE-2024-26940,0,0,c72295abdaad32ca77e2301d4de8375912e37850cee76d101c0ad3f77fa78c4a,2024-05-01T13:02:20.750000
|
||||
CVE-2024-26941,0,0,2a1089d0f00712d14223399449bc2078dc16c4aec3f3fa2e0d76cbb9292aff72,2024-05-01T13:02:20.750000
|
||||
CVE-2024-26942,0,0,2d57b93ce0dd646b07d92a214c08685384cf52a1b44011b76a4f0a2c97f50567,2024-07-03T01:50:04.523000
|
||||
@ -247852,7 +247852,7 @@ CVE-2024-27091,0,0,a32ccfce666ff1be4618293cf3ba2c75087f6f37e9f33ffc93d8bcfc104b6
|
||||
CVE-2024-27092,0,0,7afb53ca77fdb77be30f12b0325753fb11fe2c1f8043376fbcee997bba1e94ce,2024-02-29T13:49:29.390000
|
||||
CVE-2024-27093,0,0,68ac07bd1697ef5aa74f15090ede0a7a288f8b97dc5d4ef86c27ec1c314209cf,2024-02-27T14:20:06.637000
|
||||
CVE-2024-27094,0,0,3992f5f1e6195c58366531a147c93051408717361e7f160908a17922878989bd,2024-03-21T12:58:51.093000
|
||||
CVE-2024-27095,0,1,79ee6259c9ad608e49ff3f6ba25a9ac74880a6b56639e4840bd2deb9fc9f17bc,2024-08-30T12:57:40.090000
|
||||
CVE-2024-27095,0,0,79ee6259c9ad608e49ff3f6ba25a9ac74880a6b56639e4840bd2deb9fc9f17bc,2024-08-30T12:57:40.090000
|
||||
CVE-2024-27096,0,0,cdf0052df42db3f9c870bcc188485a5483cc4540a06ab8159c2caff762810d89,2024-03-18T19:40:00.173000
|
||||
CVE-2024-27097,0,0,9f8d1c5492fd15c3d9f01df94888c0ee28b70f3b5f8d6c71914b2d4c98cf23d7,2024-03-14T12:52:16.723000
|
||||
CVE-2024-27098,0,0,92b02759759827738902e5fc122ab6ec767f29e19b55e2aa6a9cd3c02abd0e05,2024-03-18T19:40:00.173000
|
||||
@ -248539,7 +248539,7 @@ CVE-2024-27996,0,0,5aaae661a6fb92b939550d770c3ab033edc85310e1d2be696c3be929f4996
|
||||
CVE-2024-27997,0,0,38211b675f4409064c6233281099da5f5fa00ff059690325dad2c59b915c01fd,2024-03-20T13:00:16.367000
|
||||
CVE-2024-27998,0,0,4b6f230fe964647fb680f6367b279bba522ac93005c2e8f6d523205374f3e144,2024-03-20T13:00:16.367000
|
||||
CVE-2024-27999,0,0,eb71f5e78ce23e710caf587ffd7cde1246a6fc9b58a11c7b1c6cbe38842e0f52,2024-03-28T12:42:56.150000
|
||||
CVE-2024-2800,0,0,721139b51a7197ab0f6c1e7bbb5ac713ef73404a77d2aeeff042ff2442b8050e,2024-08-23T17:03:41.320000
|
||||
CVE-2024-2800,0,1,ea2a35c266bf0a55163052690a6364650b6a2a82a790e86495e46ba622554f64,2024-08-30T14:15:15.760000
|
||||
CVE-2024-28000,0,0,dcbcdb07e783b0eac6cec7509b17aba150c696f13ae2755e18949eb0be1e9868,2024-08-21T16:06:23.153000
|
||||
CVE-2024-28001,0,0,769e60058cb29be891e3bd26013be397b6ae5a2c1de4b96ae3237e85af5cdd26,2024-03-28T12:42:56.150000
|
||||
CVE-2024-28002,0,0,979c468740a66c74eeb1c5784ee90077b381a78255d231d99fff807000c5cb6b,2024-03-28T12:42:56.150000
|
||||
@ -248994,7 +248994,7 @@ CVE-2024-2880,0,0,c617aabe27a476530f11dd1aff9d0e70b8bc9314c3647a1cac79a81958f4d9
|
||||
CVE-2024-28804,0,0,f7e3d6c3e14215e831a96b931ea15f5f72cb16cc7bfabd09d8b34530beca586f,2024-08-01T13:49:18.607000
|
||||
CVE-2024-28805,0,0,57ffe0c5396b469d1d6aea3771a149218b95fafbad9b52c6f522fc5113787118,2024-08-01T13:49:19.450000
|
||||
CVE-2024-28806,0,0,b0870c92c612bc52e55ac5da958c74e320d7e205346206836a7ae598363f9d27,2024-08-05T11:35:01.757000
|
||||
CVE-2024-2881,0,1,05339d01a8e56f6d1bb06e81e53d928f3840cfb3810d654bd254a6621dd66fa6,2024-08-30T13:00:05.390000
|
||||
CVE-2024-2881,0,0,05339d01a8e56f6d1bb06e81e53d928f3840cfb3810d654bd254a6621dd66fa6,2024-08-30T13:00:05.390000
|
||||
CVE-2024-28815,0,0,a66a592511ffd5b563fa083295811494fe79ce7c34bc79ae02ae7f38cd9af9c2,2024-08-01T13:49:20.227000
|
||||
CVE-2024-28816,0,0,6ee14c0c184476ced399e15a2ac6d0162b81cd21899a98e17bebc5eeaa09e33f,2024-03-11T12:47:42.653000
|
||||
CVE-2024-28818,0,0,553ea080520e3ef7d7c194b1130a084d77d8e937a2b2bb8942609e2870cc98f5,2024-06-27T16:43:48.633000
|
||||
@ -249523,16 +249523,16 @@ CVE-2024-2969,0,0,8544d89f42684c11ff0ce4f59b9b332aa5f1a74abb30a148c14e95ecc35686
|
||||
CVE-2024-2970,0,0,fc9de7221826a902f3a6cf19f3180d33eaf927389762bf1e23aea5c70762ccb6,2024-03-29T12:45:02.937000
|
||||
CVE-2024-2971,0,0,9515cf628b34137ac014a8bc7d614bd445c5e05c6a07bb53515b2fc0d7b4fdaa,2024-03-27T12:29:30.307000
|
||||
CVE-2024-2972,0,0,3771d0e64c82e60dbf132bba6647e15b9ad9d47823c5e525c2ccab39d1c1d845,2024-04-24T13:39:42.883000
|
||||
CVE-2024-29723,0,0,d90d18dec68160096d5d8dfe7291ac2e321173ef407f20893c32353a492b1783,2024-08-29T13:25:27.537000
|
||||
CVE-2024-29724,0,0,55655e448ac09ab62187148fa49304ecc7878e3b2b7b6bc9fc75847841293ed5,2024-08-29T13:25:27.537000
|
||||
CVE-2024-29725,0,0,3f7e2d552b76ccb793380759acba73813ddbaa0ce872bd5b5729858789152967,2024-08-29T13:25:27.537000
|
||||
CVE-2024-29726,0,0,15877539f604c4c9a4319a993203b09105efe869fa020d0830ed7a0da78c5686,2024-08-29T13:25:27.537000
|
||||
CVE-2024-29727,0,0,3ebc5b72e65bb2a0e3db865ba91cf7f4a915534ffbfb9b1c9d1f1f67a509b586,2024-08-29T13:25:27.537000
|
||||
CVE-2024-29728,0,0,d8db5affb7332777d23394f536be22de3927aaef635ddf8abf3a63082c848d6a,2024-08-29T13:25:27.537000
|
||||
CVE-2024-29729,0,0,d1a3d1fc41f2cf0d86e0e8c32a9b9571ffe5e52fe18df687a65eb45214502a58,2024-08-29T13:25:27.537000
|
||||
CVE-2024-29723,0,1,b7139407866a4d0c3c74493e169fad2361c20cb65140190a37dca61872dd4fc8,2024-08-30T15:51:01.163000
|
||||
CVE-2024-29724,0,1,ceacd4a2f791def541ffe93f6110a7b011c520d0699a7865293966ac2a1edd5f,2024-08-30T15:50:50.157000
|
||||
CVE-2024-29725,0,1,7a66c63e1611b48a173971a6d4aa0ccd80d620484476d04f91be7b57e4aa5ad6,2024-08-30T15:50:40.927000
|
||||
CVE-2024-29726,0,1,b9573a94243a04ee9f4901fcc1ba164353789bfea88d854275ba4b3d401fa67f,2024-08-30T15:50:30.467000
|
||||
CVE-2024-29727,0,1,928793bbf242c5ebc924ddc94d5acb0d7c315f917cc7e946d52f2558a921a4a5,2024-08-30T15:43:13.940000
|
||||
CVE-2024-29728,0,1,8a4f66f2ea0931cf994552e7dc167997ac8de7dfe3210c4e841b68f25111578f,2024-08-30T15:49:53.347000
|
||||
CVE-2024-29729,0,1,65b4933dcb11ea77f23be30eacdbe6b3edfd98fa2606c87c0f9dfc4e81ea4e17,2024-08-30T15:49:44.607000
|
||||
CVE-2024-2973,0,0,e93d65866932c82af8b50e3b7af91564bce393a65c7a315e9b3d7b174fddfb22,2024-06-28T10:27:00.920000
|
||||
CVE-2024-29730,0,0,36c18e11ec13d9f9f90cb1346b81c447389c8ad15e99cd575ebececc4b9d01d8,2024-08-29T13:25:27.537000
|
||||
CVE-2024-29731,0,0,0b7c738426eb2fe72ee45316055d3d3e2c8fef65d55c114a3114215f778fb60c,2024-08-29T13:25:27.537000
|
||||
CVE-2024-29730,0,1,b186c5b3880379c585659498d231a4340abc326b0fc3ca68ca709580571956e0,2024-08-30T15:49:36.833000
|
||||
CVE-2024-29731,0,1,68b136b744379f26748e41e0fdbaa75d019b3aa6b49c48f975004138369bd863,2024-08-30T15:49:30.047000
|
||||
CVE-2024-29732,0,0,e30fc06180575c1796869bb0b4fa02497c40c6d7939d34aba0362f12c2710f0b,2024-03-21T12:58:51.093000
|
||||
CVE-2024-29733,0,0,0811972ef853088b726fd2b07316244d1d628e55e310910ac8174bd65d097612,2024-07-03T01:52:30.320000
|
||||
CVE-2024-29734,0,0,65bb1ba04f673142d3081922c5e4533cd4af140db3cdfbbce09ab73848e3b6c3,2024-04-03T12:38:04.840000
|
||||
@ -250662,11 +250662,11 @@ CVE-2024-31136,0,0,fc3cbe768e48d4625e33825c87e8160fa75cbd797dbb2249521e321016035
|
||||
CVE-2024-31137,0,0,24dca0985c04b079d91e4a71b8f459f589e7387b6e8baa6268bf1899b5ce24d9,2024-04-08T22:41:02.117000
|
||||
CVE-2024-31138,0,0,e862c1086da58a416fbb8daccc103d417726a0d0d62aa3907b1f09b19f01be5e,2024-04-08T22:41:43.087000
|
||||
CVE-2024-31139,0,0,1f981793bc0ffd1f30ec0eaae2f049959f8e2058241da40737858920eb14a44c,2024-03-28T16:07:30.893000
|
||||
CVE-2024-3114,0,0,4568a18fb8588d4be1f890fb37ddb68ac84f02ef7275dbee1bb09a2a30ae323d,2024-08-23T17:04:56.070000
|
||||
CVE-2024-3114,0,1,438316d71fe40cf2421f9ff6deaed7eac6b8aea65c739d1fa5d800504a4d2afd,2024-08-30T14:15:15.937000
|
||||
CVE-2024-31140,0,0,1880c35ac5ba5af45eb21413401eeeaab09be8abf223654f6041d65ff3324893,2024-03-28T16:07:30.893000
|
||||
CVE-2024-31142,0,0,16502fe8420294098dded506476ced118645fadee97cfcf27213cce5ae7650bd,2024-05-16T15:44:44.683000
|
||||
CVE-2024-31143,0,0,1f98a77fde40be218a5d12e6b00af8f536e83110a5110bb36201081d2e6f449f,2024-08-21T14:35:09.100000
|
||||
CVE-2024-3115,0,0,ce15a233f41ff0461e80772019f46030689b0b2d2d5c745fde6ced2663519f76,2024-06-28T13:22:33.400000
|
||||
CVE-2024-3115,0,1,5c883fd956848ebd732b9328b2a6f07d0a52d1e0d056f15c570d933f5c859482,2024-08-30T14:15:16.060000
|
||||
CVE-2024-31156,0,0,0196e496a3b7a6255c15a0e2200e98a2f53059591b5db0d973b7d4520d1de2fe,2024-05-08T17:05:24.083000
|
||||
CVE-2024-31159,0,0,1cdbc9c62e9fa77de1f1d4073e38d32145ad47af8833ae9b854fc846b51fea1e,2024-08-16T20:27:40.107000
|
||||
CVE-2024-3116,0,0,9b51187c570a5abfd3b1d9bb042dab999267b982fd372840204c0edfde974aa9,2024-04-23T02:15:48.310000
|
||||
@ -252637,9 +252637,9 @@ CVE-2024-34010,0,0,e5242e4e175689c741a04991b05d676f9e3bda064e1a681e08ea1b95446de
|
||||
CVE-2024-34011,0,0,1cdf95201b7c3fac8642eb93e0c0ec77c02ae32f22e51c68db8a6f76ced93031,2024-04-30T13:11:16.690000
|
||||
CVE-2024-34012,0,0,5230526342507ce0f85dd47c2323d42603a1fbec4e476f393dfaf1722db209eb,2024-08-07T15:33:46.150000
|
||||
CVE-2024-34013,0,0,31f555436f56628c9b80feda54af6c121f0002b6c021c0928728c76ed328d68f,2024-07-19T13:01:44.567000
|
||||
CVE-2024-34017,0,1,12f62c6c21261e6b73cbce4c5f9908ee0fb6d6077ab2d3e027ceb794f07185b0,2024-08-30T13:00:05.390000
|
||||
CVE-2024-34018,0,1,078d6dca119258a7eaa7af08879d98ee48bd7060cb85c9fe84f262898bda1e2b,2024-08-30T13:00:05.390000
|
||||
CVE-2024-34019,0,1,89b6a20a694ace75daaf840e6e69f04e434002b2b83358fe8c15a15c8fefa39d,2024-08-30T13:00:05.390000
|
||||
CVE-2024-34017,0,0,12f62c6c21261e6b73cbce4c5f9908ee0fb6d6077ab2d3e027ceb794f07185b0,2024-08-30T13:00:05.390000
|
||||
CVE-2024-34018,0,0,078d6dca119258a7eaa7af08879d98ee48bd7060cb85c9fe84f262898bda1e2b,2024-08-30T13:00:05.390000
|
||||
CVE-2024-34019,0,0,89b6a20a694ace75daaf840e6e69f04e434002b2b83358fe8c15a15c8fefa39d,2024-08-30T13:00:05.390000
|
||||
CVE-2024-3402,0,0,860d32d94b28d3118ff3553c4f964ad26b3d56a8c45fca055d79619e6385e5e0,2024-06-07T14:56:05.647000
|
||||
CVE-2024-34020,0,0,c4663f98778b76c33582b9d015039d06540b400c550bf7c9ee3e5b98d9ff425a,2024-07-03T01:59:16.227000
|
||||
CVE-2024-34021,0,0,ba9a52b25c7a77dfa7bf1a07f5ab53755e56e707c7456547716a3d28e95401ca,2024-08-01T14:35:09.920000
|
||||
@ -252768,7 +252768,7 @@ CVE-2024-3418,0,0,502fc54d23469afbe964523306f6a78a43aa4bbda684d42d8a15714665a919
|
||||
CVE-2024-3419,0,0,55e9e939cce7031c82bff2b248ad3247eb5f6b71fadfe890fcd9e67ed87233e2,2024-05-17T02:39:54.607000
|
||||
CVE-2024-34191,0,0,bd52790a370d66146af5913c4f73ac5963a55bf27933a93d7abd4c4f67c70b7f,2024-08-29T20:36:44.733000
|
||||
CVE-2024-34193,0,0,e28053bd0a22d022848badc9c3f75e2fb164790fa29e948e479e4871e120d21a,2024-08-20T15:35:11.077000
|
||||
CVE-2024-34195,0,0,185ac0e1be787dd0b34c0629906ac5b9a248622f89ad1f748020dcdc7c100cd2,2024-08-29T13:25:27.537000
|
||||
CVE-2024-34195,0,1,e936f15231dfa4d6a6e17686f81aced8b75779a489cec0fad79bd9273174e57c,2024-08-30T15:59:08.873000
|
||||
CVE-2024-34196,0,0,fa10f060dde56de72ad527f194a43f50d5d3befcfd4eea3294712a1774de38b0,2024-08-01T13:52:15.947000
|
||||
CVE-2024-34198,0,0,64762b78b18144217b11a78982a1bc311c217ced71d9dd99c5d6d58d14f2ea5c,2024-08-29T20:36:45.497000
|
||||
CVE-2024-34199,0,0,27f51e6e9a085d1edb0a1380e0bfff4433e52f8f9e25d5bec96a743b9a9ffd85,2024-07-03T01:59:29.647000
|
||||
@ -253041,7 +253041,7 @@ CVE-2024-34572,0,0,da6acb8cd40dcbf6d2323bd9254a7bc18f8453b6d03d8a57301b37dd8d671
|
||||
CVE-2024-34573,0,0,82ca0b9b260238fc8193bf82f5bea85dcdeb8c8fd722769c69f6849636d7fcda,2024-05-08T13:15:00.690000
|
||||
CVE-2024-34574,0,0,3e74c1beadff3fd890d2b5da4de2565dbad760d56326afd390946b5e96fda210,2024-05-08T13:15:00.690000
|
||||
CVE-2024-34575,0,0,393b99ab99d08853751fd9680d36e14a49cd8e34f0aeacbb783a82d97ec9bda1,2024-05-17T18:36:05.263000
|
||||
CVE-2024-34577,0,1,e91124d48b2c1f2825a6692536a3542469325123dd9645348cb6157705a0d141,2024-08-30T13:00:05.390000
|
||||
CVE-2024-34577,0,0,e91124d48b2c1f2825a6692536a3542469325123dd9645348cb6157705a0d141,2024-08-30T13:00:05.390000
|
||||
CVE-2024-3458,0,0,87e528d305caa39d9a35bfd4c8efb11949cfac496f77400f61f34f91d68ca048,2024-05-17T02:39:57.243000
|
||||
CVE-2024-34580,0,0,b13d0d10186fa8ce8e24199cc1dc2d80b13694b6d8eff194e8908c96c81a6c72,2024-08-08T18:15:10.157000
|
||||
CVE-2024-34581,0,0,0413ed27e2fcdfc3f06c8169658e624099f91a9321af4014b7ce969f11436f7e,2024-07-03T02:00:40.357000
|
||||
@ -253343,12 +253343,12 @@ CVE-2024-35108,0,0,26473bc212f25b793c66f492376510c497f3c8040fd855e035e2125e4662c
|
||||
CVE-2024-35109,0,0,5c37b5989db27d73a1b7673ab81df5907cc813f794f46739f6fbd9e9480590e6,2024-07-03T02:01:24.210000
|
||||
CVE-2024-35110,0,0,a7533a91a83d0fe952e3715e535df8909054daffc452227b1e477f75ac3a9863,2024-07-03T02:01:24.987000
|
||||
CVE-2024-35116,0,0,a563a8223baddb703f5fd1f07e904d7e927e5f21b3c89fcbd6f74db44a319ee0,2024-08-21T14:46:12.917000
|
||||
CVE-2024-35118,0,1,fc5202003aa1d6f3bf0145a543beb8458da067fc8f1bf4009a966b46e3937752,2024-08-30T13:00:05.390000
|
||||
CVE-2024-35118,0,0,fc5202003aa1d6f3bf0145a543beb8458da067fc8f1bf4009a966b46e3937752,2024-08-30T13:00:05.390000
|
||||
CVE-2024-35119,0,0,0e35a45c77b11b12852790cdf89b3d7024286bc6ab2025f024aa0adc87ff155a,2024-07-31T19:13:41.383000
|
||||
CVE-2024-3512,0,0,d94170bf3eeacc29f71f3655c6497a6a8a80969c9ad074c1a71bef4e5d51d46d,2024-04-25T13:15:51.663000
|
||||
CVE-2024-35124,0,0,934ed896994f221011d9d1e9fbaaa9455cb54cf4e40c6476e9a006a5cb4b67ea,2024-08-22T13:31:16.353000
|
||||
CVE-2024-3513,0,0,6ae7ede11126213bb060be770e97c10b68188b12ba1d1172b48d8935fa9e965c,2024-07-05T14:25:33.193000
|
||||
CVE-2024-35133,0,1,e6e600efbe6019a46042b8497356765bfde6faebef1427fb84fa89f43d45b975,2024-08-30T13:00:05.390000
|
||||
CVE-2024-35133,0,0,e6e600efbe6019a46042b8497356765bfde6faebef1427fb84fa89f43d45b975,2024-08-30T13:00:05.390000
|
||||
CVE-2024-35136,0,0,3020783d3d271d3fdae4d9e8c7d963280063bef97bcec52f880461e4f52c833a,2024-08-23T19:08:06.993000
|
||||
CVE-2024-35137,0,0,77d476f5836ab7384f0bcce22116f35eb05878c239523b7719df59e2f7ac06d3,2024-07-31T20:48:10.727000
|
||||
CVE-2024-35139,0,0,b5d718d7cbc653a303c73da7348779dc88225aa141c22d6520f3ad7270cc6a42,2024-08-01T17:27:13.030000
|
||||
@ -254074,7 +254074,7 @@ CVE-2024-36055,0,0,9a65ac3e65fa237426eeec0a5393b74ddf0f405783f600502382f8e03d635
|
||||
CVE-2024-36056,0,0,1ad654e1db1ea66b26b566d0bde36516eb16d5510c8338c17ed9148cd915ff94,2024-07-03T02:02:43.870000
|
||||
CVE-2024-36059,0,0,1bfcf57b05ec1b5718039a8c5e3ecbe365e021b33c057bee57a114304a3b8db6,2024-07-09T16:22:38.580000
|
||||
CVE-2024-3606,0,0,d0a3a8d7c3b8995b719f693dd3907a6cc0220e7bd0b5d59f68093556b8c3a6af,2024-05-02T18:00:37.360000
|
||||
CVE-2024-36068,0,0,ff69b14eb3faffb5ef1fff6430c37e2dc6ce15280c21edfd6026d88004d8d5d7,2024-08-27T19:35:27.183000
|
||||
CVE-2024-36068,0,1,8b31731eb347ae7e58833061fb99c12a798a6414a234257a762115bc06cf53d3,2024-08-30T15:26:36.340000
|
||||
CVE-2024-3607,0,0,bb41f416bf193e789c6c3a3e947ee7231c896c3b9ba6bc5f3e43284359c7ea80,2024-05-02T18:00:37.360000
|
||||
CVE-2024-36070,0,0,beb228b364090611e3dd2a48abbf51047e75d9810a4335130915a1f3e879cf31,2024-05-20T13:00:04.957000
|
||||
CVE-2024-36071,0,0,1cf2d6d0e0350fe3ce54f2fd88bd10faece00caba8178bec17a18cc8abef5c43,2024-07-03T02:02:44.693000
|
||||
@ -254489,7 +254489,7 @@ CVE-2024-3671,0,0,721f7e6a346cf74d875b2c4c41e32228fcdbc5d546ba420f9052982bd9032d
|
||||
CVE-2024-3672,0,0,3f4375d3f925965eedd3021149cf89991af4643d3a1e99168ddd0533ac28ffa8,2024-04-16T13:24:07.103000
|
||||
CVE-2024-36728,0,0,685c6307c04e58fb91aa1cd3d8196094b317c76e0e4421d5d65d9f3c42021678,2024-07-03T02:03:33.547000
|
||||
CVE-2024-36729,0,0,d45877829f45f72a36efe808f4ab30639504f5ee409a1f4bbca4482bbbc7cd52,2024-07-03T02:03:34.353000
|
||||
CVE-2024-3673,0,1,03a06add3eba3e24336ba492ab7b76bdf85a4330bb5d226b27b54c6fdc533b36,2024-08-30T13:00:05.390000
|
||||
CVE-2024-3673,0,0,03a06add3eba3e24336ba492ab7b76bdf85a4330bb5d226b27b54c6fdc533b36,2024-08-30T13:00:05.390000
|
||||
CVE-2024-36730,0,0,64a3dffa7bbe9fe7e69b7699e79bca595a078505b7c29c8334f44bb856a96c39,2024-06-07T14:56:05.647000
|
||||
CVE-2024-36732,0,0,89ef79acf914e7fa79f0997bbb77dd27a533cae855c7319e0da9cc89d060d11c,2024-08-01T13:53:14.287000
|
||||
CVE-2024-36734,0,0,37607296c2114d18eb9371884ac39d9c7abe072eefba87ba6dd89607d9b61cc6,2024-08-20T14:35:24.830000
|
||||
@ -255715,8 +255715,8 @@ CVE-2024-38558,0,0,1aa2549c42096077d056cbab0d2e9ea0b310080aca3669912ae89eed3d6cb
|
||||
CVE-2024-38559,0,0,b96b7c35bc3ad4a6d38252f41dda2f4035549c1ee79f2b0b6bfd337e890cae05,2024-07-15T07:15:09.480000
|
||||
CVE-2024-3856,0,0,482d8b25f5b5638fd64d9a56239e94492af3cb0af9f1d72d8413b4ef40835dd2,2024-08-12T21:35:10.110000
|
||||
CVE-2024-38560,0,0,3086c0b91464fe0367141879739cef78605c1804b40cadc67e3fc19a9fbfa410,2024-07-15T07:15:09.567000
|
||||
CVE-2024-38561,0,1,1c8c0672a9fdea5f019022cf73461d36b1e2ae9db7077bcfacb0c34b923b0077,2024-08-30T12:45:05.240000
|
||||
CVE-2024-38562,0,1,50585ce267d6bc82a6f46826e9518812fe5dc521b2ba3d562eab23dbb2aef87a,2024-08-30T12:47:20.287000
|
||||
CVE-2024-38561,0,0,1c8c0672a9fdea5f019022cf73461d36b1e2ae9db7077bcfacb0c34b923b0077,2024-08-30T12:45:05.240000
|
||||
CVE-2024-38562,0,0,50585ce267d6bc82a6f46826e9518812fe5dc521b2ba3d562eab23dbb2aef87a,2024-08-30T12:47:20.287000
|
||||
CVE-2024-38563,0,0,2850526344dff5424a0f3fc4b987496ff663d09fdcc426618a04c6a40ef59861,2024-08-01T20:14:43.607000
|
||||
CVE-2024-38564,0,0,6fd50c2edcba2a8aacaa9d9261d553e77f7ce6acf1928cffdd38a0bed6267cc5,2024-06-20T12:44:01.637000
|
||||
CVE-2024-38565,0,0,7b0c7f68aea83caebfc83e01c484a69bdba5e7b4bbba4af7b03a82174b1cdde5,2024-07-15T07:15:09.853000
|
||||
@ -255834,7 +255834,7 @@ CVE-2024-38688,0,0,6c1e1c63760b8f330227267f950d647098745020ef3d161e16c9e453d5d48
|
||||
CVE-2024-38689,0,0,0d7351b68eb1ca333a04fe4331d97d8f3d9e657db2a8d3347ae1c4f5a70fdfb8,2024-07-22T13:00:53.287000
|
||||
CVE-2024-3869,0,0,48f9071a6f5d125b2c43fec069da722b087f824997b9c50ca7b95aad4aebfb77,2024-04-16T13:24:07.103000
|
||||
CVE-2024-38692,0,0,761911cf70aa71c41ae3228fdbacf4aede8e08f3f941d9d59231e75b06896f24,2024-08-14T16:48:07.087000
|
||||
CVE-2024-38693,0,1,6476a6419e0cd2b5e82644101ce643e9cc3dbe6c526c03cd5b64964fc39d3f6e,2024-08-30T13:00:05.390000
|
||||
CVE-2024-38693,0,0,6476a6419e0cd2b5e82644101ce643e9cc3dbe6c526c03cd5b64964fc39d3f6e,2024-08-30T13:00:05.390000
|
||||
CVE-2024-38694,0,0,1103efc1e9ce360d7ec82a8f19753cbf3cd40623925b6ee52c38a61d5ffa04b9,2024-07-22T13:00:53.287000
|
||||
CVE-2024-38696,0,0,35a6f879eecff675c7fba5d08cbcc5ee7b43f7f2731c3465b1a4e88bbc0e1ff7,2024-07-22T13:00:53.287000
|
||||
CVE-2024-38697,0,0,a46892050e5f82faaa0e187700d3448b5b1a8ffbf648c825fc5ce00de9ddfef8,2024-07-22T13:00:53.287000
|
||||
@ -255908,8 +255908,8 @@ CVE-2024-38787,0,0,0f1e7f4afcb5fbe9535514f1a824c8730251f75282d7daebf1c4763462ac4
|
||||
CVE-2024-38788,0,0,d7426c90cb2d8e681f652bb3f7653d0e61fa19ddfa46c34abe44c6c5e4e37176,2024-08-02T05:15:30.283000
|
||||
CVE-2024-3879,0,0,a6db760401fb215a79d8f48992cc838e1a5c23839a86defd39dd342ef1c5f8a8,2024-05-17T02:40:10.177000
|
||||
CVE-2024-38791,0,0,5a7109970d4cb90cfbe2865705276e5511d9a261f6cba475b72302a204ad6517,2024-08-02T12:59:43.990000
|
||||
CVE-2024-38793,0,1,a8fd48aed5b75b541d296823be3a1e58abe69599744d420c44bb0f22ac5d40d7,2024-08-30T13:00:05.390000
|
||||
CVE-2024-38795,0,1,e01c3b081ed49f9384d7469e99dab9c7ed6c3989c91fb0152edf9c1ae6b6c6cc,2024-08-30T13:00:05.390000
|
||||
CVE-2024-38793,0,0,a8fd48aed5b75b541d296823be3a1e58abe69599744d420c44bb0f22ac5d40d7,2024-08-30T13:00:05.390000
|
||||
CVE-2024-38795,0,0,e01c3b081ed49f9384d7469e99dab9c7ed6c3989c91fb0152edf9c1ae6b6c6cc,2024-08-30T13:00:05.390000
|
||||
CVE-2024-3880,0,0,6dd5da57a8412b823038a64a32d07af4547e4dfdd637b54b90b4556bfd34431d,2024-06-04T19:20:26
|
||||
CVE-2024-38806,0,0,aa1ff0885d521aab036aaf6506258a484aa869322b524482869e0e1df3ac4a48,2024-07-19T13:01:44.567000
|
||||
CVE-2024-38807,0,0,6663b89433c5ca3162ac8e0676fc16d9b92af7b1823f84debbce11cbc23a4743,2024-08-23T16:18:28.547000
|
||||
@ -256109,7 +256109,7 @@ CVE-2024-39293,0,0,1fec2940f1bd80b7fcd0ef6093774070c9cb79d5cc06d154bd66dc488c943
|
||||
CVE-2024-39296,0,0,1505e8dd09a63330ec5436e9f86022e9b63137e3bb41d294e6c4ca091f2e08ed,2024-06-25T18:50:42.040000
|
||||
CVE-2024-39298,0,0,ebc8c1ac57b6c8432c32f877ad1093e868a3d2381cb98ee4d7cf51055258ad60,2024-06-25T18:50:42.040000
|
||||
CVE-2024-3930,0,0,54b8e4aa07087aa149fa9bad599c7a18dec56c1b93dd2d2499327bc3c7940bbd,2024-07-31T12:57:02.300000
|
||||
CVE-2024-39300,0,1,89607efe937cb834e7f431341e0464cef54031a8306779f8ce446c571a19827d,2024-08-30T13:00:05.390000
|
||||
CVE-2024-39300,0,1,7f09a8e374c1c79c4b6cbf0d170fb946832af7b3ecb8528ee4eb570ef71b1e11,2024-08-30T15:35:03.273000
|
||||
CVE-2024-39301,0,0,72934b8f63bc52924fc16a3afe1a18dbebdfa8998d51203c594a2fbcffcac42e,2024-06-25T18:50:42.040000
|
||||
CVE-2024-39302,0,0,946c3f23cfe199dda1010c0ea47b1d5e32454ef20b5307dfd8e2dc92485c1baa,2024-07-01T12:37:24.220000
|
||||
CVE-2024-39303,0,0,e1d113aa825245b6d1e52862ebbf0ca8379af72327c1818fa556c736e7b07e25,2024-08-21T15:54:35.650000
|
||||
@ -256351,9 +256351,9 @@ CVE-2024-3961,0,0,7859b6a2f8e5a01656e72fd209a53f5adaf23f278f08a55d207894f918e1fd
|
||||
CVE-2024-39614,0,0,80fda44b15f74076f020f7bfc25c89db880e93067c83790f059fc3bf750e00f8,2024-08-01T13:55:55.837000
|
||||
CVE-2024-39619,0,0,eba9a3263593a35724815600925b04c780a0fc23aea386d231775aed259a1e52,2024-08-02T12:59:43.990000
|
||||
CVE-2024-3962,0,0,48687fe56cf9bd40f5a5971493143104fa6812806c2dc18cc2c914079c1544b9,2024-04-26T12:58:17.720000
|
||||
CVE-2024-39620,0,1,e76d50d823e813bcb01060bb3e9df6cbf737da7218616b86379de2a6474e16bc,2024-08-30T13:00:05.390000
|
||||
CVE-2024-39620,0,0,e76d50d823e813bcb01060bb3e9df6cbf737da7218616b86379de2a6474e16bc,2024-08-30T13:00:05.390000
|
||||
CVE-2024-39621,0,0,0c249e1c45f38e7803d96351e629758e9c24acaebc0fdee9ecbe6f2310164e1b,2024-08-02T12:59:43.990000
|
||||
CVE-2024-39622,0,1,9b892abdf85a2d6b1e68529dfd5cf24434be8220c37475ddf087071daf308215,2024-08-30T13:00:05.390000
|
||||
CVE-2024-39622,0,0,9b892abdf85a2d6b1e68529dfd5cf24434be8220c37475ddf087071daf308215,2024-08-30T13:00:05.390000
|
||||
CVE-2024-39624,0,0,61c5c17120773e760fbae9a7958d22954be8f7c181114c13133411959f35ed43,2024-08-02T12:59:43.990000
|
||||
CVE-2024-39626,0,0,d18b40bac7879d91efce41316f457b002a06c0098fd8a51342c25f4f7011fae6,2024-08-02T12:59:43.990000
|
||||
CVE-2024-39627,0,0,f6ecb8eb87a0844a06d33fd61ce1655e1dc35cf5d41af8bf595cbdcdb232937f,2024-08-02T12:59:43.990000
|
||||
@ -256366,7 +256366,7 @@ CVE-2024-39633,0,0,fc0971d1bc8793039b4953353803c462b62ac233474e83dd34dde3ab57042
|
||||
CVE-2024-39634,0,0,b68dbc093c134ffec6acb55cc59fb6f5bc0edd749d548af565529e002e00c7c7,2024-08-02T12:59:43.990000
|
||||
CVE-2024-39636,0,0,356132dd8c4585470fbd20a2862e8961fed4fe21f88d52a87134f7776cb4d243,2024-08-02T12:59:43.990000
|
||||
CVE-2024-39637,0,0,c9cd93cf93f9c41475771220e56072736d7ef7107ab49d4cf3bf3069940988e9,2024-08-02T12:59:43.990000
|
||||
CVE-2024-39638,0,1,b708d1261370fc3f0692854d113a322acff3b49b0b1b2201dc7ef4d9e9d46c5f,2024-08-30T13:00:05.390000
|
||||
CVE-2024-39638,0,0,b708d1261370fc3f0692854d113a322acff3b49b0b1b2201dc7ef4d9e9d46c5f,2024-08-30T13:00:05.390000
|
||||
CVE-2024-3964,0,0,9f7a9dcb99a6b1dda9d890f7e0a024c114babf4cc61dfd04fd66f31288d98320,2024-08-01T13:56:47.440000
|
||||
CVE-2024-39641,0,0,82efe19acefcd120a9c9ff4b95bce8c452c5423902a3f6b1c0041639db255e62,2024-08-27T13:02:05.683000
|
||||
CVE-2024-39642,0,0,a5907a7ba9601cb47d5213c09a225012a1c028d8945a3fe4fa6d61abfa537ebb,2024-08-13T12:58:25.437000
|
||||
@ -256380,11 +256380,11 @@ CVE-2024-39649,0,0,fbd73aadfe0b4a459c28dd4d378a42dbf18f4c17162b2c287c459e7740d56
|
||||
CVE-2024-3965,0,0,ca98c8c8f38859cd31112b30cbcab1577d0379601171e9b943854dcc0ce8c1f6,2024-07-03T02:06:56.690000
|
||||
CVE-2024-39651,0,0,7d85dfbdb174a6f544eaa1e3819a7aaa062f2afb0dc7664ef14d20fe53cd5df3,2024-08-13T12:58:25.437000
|
||||
CVE-2024-39652,0,0,f0c2e1305e128fc4254bcfdadc56a769f26cdafb9e9828cd6a3d3d5cb0f0b69f,2024-08-02T12:59:43.990000
|
||||
CVE-2024-39653,0,1,3b9192512d2bd4d66fefb28d926bbba0397594eb815c203f53000e1287f9b68d,2024-08-30T13:00:05.390000
|
||||
CVE-2024-39653,0,0,3b9192512d2bd4d66fefb28d926bbba0397594eb815c203f53000e1287f9b68d,2024-08-30T13:00:05.390000
|
||||
CVE-2024-39655,0,0,e8990ae109997ce183e7ec6503e4dae3b8dd97111e423903b7d9d645e6d064e4,2024-08-02T12:59:43.990000
|
||||
CVE-2024-39656,0,0,41595071b9c98d363bce33f052284f93eb7b68d4fe24b85d68eae6cad1c3cf98,2024-08-02T12:59:43.990000
|
||||
CVE-2024-39657,0,0,5011bc23ca38c6d5baf0733a7f30352cc204af31d9e0f5e595f8e34352825b69,2024-08-27T13:02:05.683000
|
||||
CVE-2024-39658,0,1,8f36edf605ee9460e46f3a0a3f5179f856e2c4fc857d30940562971fc3d8006c,2024-08-30T13:00:05.390000
|
||||
CVE-2024-39658,0,0,8f36edf605ee9460e46f3a0a3f5179f856e2c4fc857d30940562971fc3d8006c,2024-08-30T13:00:05.390000
|
||||
CVE-2024-39659,0,0,a80d18e493149233fc317020eaf978d1056512cfa7b08cba1fd89af8c4735b0a,2024-08-02T12:59:43.990000
|
||||
CVE-2024-3966,0,0,f4286335c18162e5dbc573cbc605017489ac12efad77a1ff38ff47be3739d726,2024-07-29T16:52:33.533000
|
||||
CVE-2024-39660,0,0,2b50deef651f27c87abd29110a94a6037b7dd1c45da64101f17c9a9b365c5efb,2024-08-02T12:59:43.990000
|
||||
@ -256436,7 +256436,7 @@ CVE-2024-39704,0,0,1d59c065d69d465eb86bf6114b5299aaf44c728f69d6748df6b6bd65077d4
|
||||
CVE-2024-39705,0,0,e4b6d32dbf56290b80b8c0b89889459c855e182d434956c162d34a43f4f676db,2024-08-26T16:15:08.633000
|
||||
CVE-2024-39708,0,0,2eafb164d29e8efc470b1c615a7a961efa5060a31edd6795a1174fbb57cde7b9,2024-08-15T16:15:20.100000
|
||||
CVE-2024-3971,0,0,232de18e9e74ddfe0c81af44fc47161b6db81bcc698685ef24ea3f7084d9ef87,2024-07-29T16:51:34.570000
|
||||
CVE-2024-39713,0,0,99e8a316dad486c18bb302062018548767182c9767b7c9ef5e1c3b6a3cdb13f2,2024-08-05T12:41:45.957000
|
||||
CVE-2024-39713,0,1,b3e3e0d8b3515d4d46b8be4682c466cda0b8a7349b24f7e16d49f1073ff7de9b,2024-08-30T15:47:55.637000
|
||||
CVE-2024-39717,0,0,5c727700f5fb9ffcdff7d74de82f8cc7669d0dbb9bbb395cb4e4ef77f2b2701c,2024-08-28T19:47:25.410000
|
||||
CVE-2024-3972,0,0,0caddd7b34d493c3554c875afe72275890f23d83038241874e85ef811a9076b6,2024-08-01T13:56:47.637000
|
||||
CVE-2024-39723,0,0,003097d794792a3e1194202f71608927b35e402887d5f5ddf07d35b5dd183916,2024-07-11T14:54:10.243000
|
||||
@ -256585,7 +256585,7 @@ CVE-2024-39950,0,0,e409eeb254f44b3d4b51e7d07bbd7f9da83c77ebb8ace38fad3cc5b35bcdf
|
||||
CVE-2024-39962,0,0,88f72130b2e330c20b5ac0702cd6d158cd0cb6e08e9ed8a9d4ac60ee5a0c3f4d,2024-08-01T13:56:13.933000
|
||||
CVE-2024-39963,0,0,1997a2314271fe57eb41207372bb6a5b6d64581c5e6f0763f5bbf0ba4916f0ef,2024-08-01T13:56:15.110000
|
||||
CVE-2024-3997,0,0,1f2576b07f1c26f802b0f1e551eeeee57100d1eaa419296265017e09a1456b97,2024-05-24T01:15:30.977000
|
||||
CVE-2024-3998,0,1,5ddd78ac0a9932d35c55ee9f115db244f2dff45f93f0d1fb150b29e6b5da32a0,2024-08-30T13:00:05.390000
|
||||
CVE-2024-3998,0,0,5ddd78ac0a9932d35c55ee9f115db244f2dff45f93f0d1fb150b29e6b5da32a0,2024-08-30T13:00:05.390000
|
||||
CVE-2024-3999,0,0,4248dd2372447004bc43614b1896e27a040049c0dba411de9512ee0e6f816fb7,2024-07-03T15:44:56.130000
|
||||
CVE-2024-4000,0,0,7c8c2f5334fecf0f2ab22d97b46108b7e41243cb0a54444d2343bca0b6a11052,2024-05-02T18:00:37.360000
|
||||
CVE-2024-4001,0,0,e4615d75e04f4d27b9b19fee2d8e1d5957aea8692a6a32e57d41a2be5a0dead2,2024-06-11T17:27:53.637000
|
||||
@ -256608,7 +256608,7 @@ CVE-2024-40094,0,0,5d1ab4fa5a1484beb0714ef3fcebe3147b446e4d722942df6d84c0a1bd2dd
|
||||
CVE-2024-40096,0,0,f4d93815f52e3c16c28040ba21795a35002b57c191156f911baad6e63290a17a,2024-08-22T20:15:09.340000
|
||||
CVE-2024-4010,0,0,6f96a951ba4d658f2d216c10726beef3ec3f9c518875bc1c492ed89999ff3fc2,2024-05-15T16:40:19.330000
|
||||
CVE-2024-40101,0,0,886521863c96c11be959a1cf217c3eefcb0791bdf3b877e4dc348f32f4062dae,2024-08-29T16:57:16.727000
|
||||
CVE-2024-4011,0,0,3791d0b8fb3f4c8257f00293727675eba680b52984c90b375af59f25fe8844d5,2024-06-28T13:21:27.280000
|
||||
CVE-2024-4011,0,1,1484f28c8125b702be19148770f89c8b6b993aafff3c3ded37de5b6fc9a35488,2024-08-30T14:15:16.590000
|
||||
CVE-2024-40110,0,0,68d861d5d10a023f1915f02afcd75d8882ae33a201769ba967017148b1a5c0b1,2024-08-01T13:56:50.340000
|
||||
CVE-2024-40111,0,0,1a3d3f73f416ea4e786f4d30c6c4afa24719f06341ce4e72c0f952d62f0ca1da,2024-08-26T17:35:05.733000
|
||||
CVE-2024-40116,0,0,eb70c9a9b1b545c9ad476d8d1542c9445241ad3bd4f0dd5767e3b25e7e8e8497,2024-08-01T13:56:51.153000
|
||||
@ -256653,7 +256653,7 @@ CVE-2024-4039,0,0,b18b8aac4336f296c5655f645710463e48a4544089b8c4c20638e847b5c746
|
||||
CVE-2024-40392,0,0,4fca88dff401a8138459da84bc3f01447997dddad0d6609e6db41057956be98a,2024-08-01T13:57:14.083000
|
||||
CVE-2024-40393,0,0,9b92da21177fe8aa44a5e39548076593e5725a02c42ea3793eafd13d4eb2e51a,2024-08-21T18:13:42.670000
|
||||
CVE-2024-40394,0,0,6a6373d6840a53222337e137dc03e4cb2a60579893b62069f0f6025fffca56b3,2024-08-01T13:57:15.033000
|
||||
CVE-2024-40395,0,0,2b3d55ea035ce2287aba45bb5c2769693f25b512e41e3ae4fa90ba0cd02e10b8,2024-08-27T18:33:14.247000
|
||||
CVE-2024-40395,0,1,3ba6dbce46079967e0577ccca7056038a218abcb260e702c86d066887bd846b4,2024-08-30T14:35:38.087000
|
||||
CVE-2024-4040,0,0,4c2ad1f11d479d0071ddbaeb3523edde6a0cd9c4e74c065c69d4bb5c9b1ac029,2024-04-26T15:25:47.270000
|
||||
CVE-2024-40400,0,0,aec60b9f9f600363c457f651ff723a62cac6ef548b5399a3264322f4567e7220,2024-08-01T13:57:15.850000
|
||||
CVE-2024-40402,0,0,8f3b56ab0ece8779de55d2a1e01ca402786b5a92667e8e6ee5b5e922914d1480,2024-08-01T13:57:16.643000
|
||||
@ -257218,29 +257218,29 @@ CVE-2024-41320,0,0,6629b2c1bbc9cd1b160b7b0f9c935334633b6b47708e3a65ad0ff69abde9e
|
||||
CVE-2024-4133,0,0,809a3aebbf4e63405fb2f0740c9908f3dfcf1d711b93379e5d465ea9e56d3cba,2024-05-02T18:00:37.360000
|
||||
CVE-2024-41332,0,0,0c297902d1fd2e33f0ac4f9fcf27ea849083281238ee0df040d97531f7646dbb,2024-08-21T18:53:15.927000
|
||||
CVE-2024-41333,0,0,cddcfe88014fc883d7c26828c1a1c1f213d8d1e951fc2a526ac4569575e77f96,2024-08-07T20:54:44.060000
|
||||
CVE-2024-41345,0,1,ebfe2de1698c778225ce129d764399fd9c8e2701cd9f886e923d11bdfb8b2cb1,2024-08-30T13:00:05.390000
|
||||
CVE-2024-41346,0,1,262ef413ff7791e650f4895ef375bf72120716f01b2af522f5df62a4db516c09,2024-08-30T13:00:05.390000
|
||||
CVE-2024-41347,0,1,c30f6d7b7241bec26d1e61eba2e9e3d257f9f9441160244348ac9ddeeeea00d3,2024-08-30T13:00:05.390000
|
||||
CVE-2024-41348,0,1,0fd305b7ba5b3815d2292f746aad9ca219af9c0b2cb596251853a4eef80c6e02,2024-08-30T13:00:05.390000
|
||||
CVE-2024-41349,0,1,5767b39a74561aab777e8dd33eef996bd5af8a9d2851fc6c6d2dcaa58b11af06,2024-08-30T13:00:05.390000
|
||||
CVE-2024-41345,0,0,ebfe2de1698c778225ce129d764399fd9c8e2701cd9f886e923d11bdfb8b2cb1,2024-08-30T13:00:05.390000
|
||||
CVE-2024-41346,0,1,42661e5058004473797db6f1d9dbf113bd8033baec39d03e654b0a8142c6b669,2024-08-30T14:35:04.550000
|
||||
CVE-2024-41347,0,1,89a9504ea9ee2a5c8ecde7062a87dadb645c768c7135b7d1367bd472cc86fc01,2024-08-30T14:35:05.457000
|
||||
CVE-2024-41348,0,1,50ed5721bc7d3535ca5c903d1069021e321cb28c79b83af6694b32cbc2906455,2024-08-30T14:35:06.393000
|
||||
CVE-2024-41349,0,0,5767b39a74561aab777e8dd33eef996bd5af8a9d2851fc6c6d2dcaa58b11af06,2024-08-30T13:00:05.390000
|
||||
CVE-2024-4135,0,0,3adddfced77f8fc8630aec5e175734a40783e3f6b247cb0614a312485a8097a3,2024-05-08T13:15:00.690000
|
||||
CVE-2024-41350,0,1,c6cafe3c7aa4cd07ee3fb46385537ce7354b4a494fea1c69adc3b04b374595f5,2024-08-30T13:00:05.390000
|
||||
CVE-2024-41351,0,1,be5ba2fc0ace2f7a2101fc74192056633ef58754d613eadc82de9edcc4a9c88f,2024-08-30T13:00:05.390000
|
||||
CVE-2024-41350,0,0,c6cafe3c7aa4cd07ee3fb46385537ce7354b4a494fea1c69adc3b04b374595f5,2024-08-30T13:00:05.390000
|
||||
CVE-2024-41351,0,0,be5ba2fc0ace2f7a2101fc74192056633ef58754d613eadc82de9edcc4a9c88f,2024-08-30T13:00:05.390000
|
||||
CVE-2024-41353,0,0,283f710ae1d74e1c389a6d83c71bf34f8cb957eca1e713efb25da5fc972611a3,2024-08-01T13:58:33.490000
|
||||
CVE-2024-41354,0,0,6f441613a698798917b5e857f890766e0d2b7679cbcf5bdceb5fbd991d62b2f2,2024-08-01T13:58:34.267000
|
||||
CVE-2024-41355,0,0,767668ff7ebdee8b739a5a908dea06e5bc0b0c20c93aa5d0d74d6f0af3b47f96,2024-08-01T13:58:35.033000
|
||||
CVE-2024-41356,0,0,d47682e9106c793d1fcf2a2f339a3fd1e5f827ed311819123df3924448767650,2024-08-01T13:58:35.803000
|
||||
CVE-2024-41357,0,0,0e1eb56990d81b0e95b5da12b2577b60f5c4a370d94ba23fe25086e49a9417c2,2024-08-01T13:58:36.627000
|
||||
CVE-2024-41358,0,1,4fbb66c56c60bd3542dceed6bf39a9339e2ab98767e13b23c055f4a2ea0f7dc3,2024-08-30T13:00:05.390000
|
||||
CVE-2024-41361,0,1,ed2f063477942e8525e4ca09163f69da582dbde8ff84b537414a8da90047cee9,2024-08-30T13:00:05.390000
|
||||
CVE-2024-41364,0,1,980837796418c5a4952b4fded8aef49496f332efc3a5cb058d99e1003724b9d5,2024-08-30T13:00:05.390000
|
||||
CVE-2024-41366,0,1,16036a1a063b7e0ce3ae103b64ca8fa49382d329ca24ead6029a136fa9762a1c,2024-08-30T13:00:05.390000
|
||||
CVE-2024-41367,0,1,d971598de3d0cf3bb71a15f8a3894582ce8befe57d541367c041591824ac777f,2024-08-30T13:00:05.390000
|
||||
CVE-2024-41368,0,1,4ee075b25e7b7cb318ba1ccc4608ef785920c7d3af9795cf20435370fc325eb0,2024-08-30T13:00:05.390000
|
||||
CVE-2024-41369,0,1,eb1e4e1c18f650a4ed667388a4674a26b7b9702e902e43dacb8db059119439d2,2024-08-30T13:00:05.390000
|
||||
CVE-2024-41370,0,1,9017d4554bbe34e9354096e4c3611671708235e2b66807d6ecd5155399a38a71,2024-08-30T13:00:05.390000
|
||||
CVE-2024-41371,0,1,18b2fcb5a4991d9888892e76e474acc1a4d13f11674b61a2a0a71e23544408f5,2024-08-30T13:00:05.390000
|
||||
CVE-2024-41372,0,1,3ce0ede3a57aef6427b3a0de111a78ce493a0fe67d6155fbef37958fb501ba42,2024-08-30T13:00:05.390000
|
||||
CVE-2024-41358,0,0,4fbb66c56c60bd3542dceed6bf39a9339e2ab98767e13b23c055f4a2ea0f7dc3,2024-08-30T13:00:05.390000
|
||||
CVE-2024-41361,0,1,9b63532534a357866c517cb3f1e731a56d47e38e24268e5ebb5e8dc6d0f4294e,2024-08-30T15:35:04.133000
|
||||
CVE-2024-41364,0,1,45937b95344ee2b4062cece0526795bc8603ddb0a52a6d146d2940f1a8f5df1e,2024-08-30T15:35:05.150000
|
||||
CVE-2024-41366,0,1,dd5dfac884d29b20b8511d6688144e432242ddf4af2a298f3c9ffd2d1f1bfb7e,2024-08-30T15:35:06.153000
|
||||
CVE-2024-41367,0,1,3b2dec504f8e36a8b04fd28240dda396cc189e208b46f2a68f6b65a8dd06dcff,2024-08-30T15:35:07.170000
|
||||
CVE-2024-41368,0,1,9301acccc1aaace6545f9b83cc1f2926b82f14a7de0e72e4763697d4097f1725,2024-08-30T15:35:08.497000
|
||||
CVE-2024-41369,0,1,3dc6349ecf352e26029c1056e7b0099a336d9585ee19e84aaa0a52e84286aa8f,2024-08-30T15:35:09.570000
|
||||
CVE-2024-41370,0,1,0991748eaf86e034f410fa985babcc5ae3d444100a6df7fe2828d979778ffddd,2024-08-30T14:35:07.547000
|
||||
CVE-2024-41371,0,1,6730c9a8cf444fa509c755d3e78d034a549b65c09d0acdbc55e36d8f56b5ca92,2024-08-30T15:35:10.803000
|
||||
CVE-2024-41372,0,1,6a72cdb3a2a01c1388d381d41904962acf5958e9dc7a54764166c2bc484f1a91,2024-08-30T14:35:08.307000
|
||||
CVE-2024-41373,0,0,529d42be06af1c8cedd9a8d606fcdb9f3c484729e69057461e74c09cda6cdb4d,2024-08-01T13:58:37.403000
|
||||
CVE-2024-41374,0,0,9bef11df38a244f32a4572e98232b7466fb732ad8e92ed12a90e2f30a0970836,2024-08-01T13:58:38.380000
|
||||
CVE-2024-41375,0,0,454a14cadb578cd2f6f20f7a0316c6f62edc522562d34d42ff53a951c64bda15,2024-08-01T13:58:39.487000
|
||||
@ -257314,7 +257314,7 @@ CVE-2024-41613,0,0,775a6c9724ba70bc56dce8939e74722c2b403153bd1f36f976e189d003a6a
|
||||
CVE-2024-41614,0,0,97dd4cb6722c16dd67b90bd84237880c8504a680bb995ffa9e8927a86d821a05,2024-08-14T18:14:16.073000
|
||||
CVE-2024-41616,0,0,a87f80cfe19fdc1adad71691ba6015b314ae0892eefb4d086c289749db2f63df,2024-08-07T20:54:20.793000
|
||||
CVE-2024-4162,0,0,1a4f39929c1df6d420ff35b2d8de51a57c5e5378a57b6e7a1a35abc1b5a3dc57,2024-05-08T13:15:00.690000
|
||||
CVE-2024-41622,0,0,231621349909b4fe02afa7565e30fabb6d0f669719678c04b94764b05c01b9de,2024-08-27T18:35:10.613000
|
||||
CVE-2024-41622,0,1,44ca2934b754519243a779c6615220559421c07f2d4e7de3fb58db6e584b3b36,2024-08-30T14:55:54.423000
|
||||
CVE-2024-41623,0,0,c5ad0592f1bc8234d1c1b4349fa5edc0884d162d738c86d78b923fc809fc8e63,2024-08-23T15:35:07.653000
|
||||
CVE-2024-41624,0,0,300a907d59c60bf938fbbe11abf1d1dd305a7cd2619bf29e5e11f38514dc3443,2024-07-29T16:21:52.517000
|
||||
CVE-2024-41628,0,0,3f95419a732116ba5016aeec3d83a528b6096a3cc023e4d133c06f26311a9cae,2024-08-06T21:16:03.323000
|
||||
@ -257531,7 +257531,7 @@ CVE-2024-4196,0,0,2bee927395e72028cfccdf65300c6a2b8979e20b943a96185278ab936245f1
|
||||
CVE-2024-41960,0,0,c90236af24fb252306d67097fab9fe370c116a0fe898aae960bb109a3075d5cd,2024-08-06T16:30:24.547000
|
||||
CVE-2024-41961,0,0,3c3cbde88cd825de8bae83de9e23bceebed48c0b620332721ebe0297499b9cbf,2024-08-01T16:45:25.400000
|
||||
CVE-2024-41962,0,0,db50354a8566471f488ea803a7a6894035b73491a2359165637f817d330c25eb,2024-08-16T16:34:48.873000
|
||||
CVE-2024-41964,0,1,00845ae65bb3534784c9b8fbbb60096d7620e97ac61d54d3b5042120c50027b6,2024-08-30T13:00:05.390000
|
||||
CVE-2024-41964,0,0,00845ae65bb3534784c9b8fbbb60096d7620e97ac61d54d3b5042120c50027b6,2024-08-30T13:00:05.390000
|
||||
CVE-2024-41965,0,0,2d1c3b12d760b98aa2eaba7bc040a10a4b90c52e44f9dfa32fdcb4160559d799,2024-08-09T14:09:32.507000
|
||||
CVE-2024-4197,0,0,45da0b07f911473fe59b939894a184bd20b4010bb74cc514ccd6533e9d15c77b,2024-06-25T12:24:17.873000
|
||||
CVE-2024-41976,0,0,28d622db4b0702423d465fd5f760fc3d4baf285e2f7024720bdb5fee42ef0c33,2024-08-23T18:40:16.173000
|
||||
@ -257861,7 +257861,7 @@ CVE-2024-42400,0,0,bada445f5210525c2b124a846736c128f6bdefeabff1b80f8c8c07a166ac6
|
||||
CVE-2024-42408,0,0,4d58de4373d6b44540fc0d8799a258082f4b72e8c10ed3de4134395815aaf808,2024-08-29T14:22:45.603000
|
||||
CVE-2024-4241,0,0,1e8cfaace7e8ae3194846b1351a77e14aef6cd3a07b429e780198fa55ccad7c3,2024-05-17T02:40:19.957000
|
||||
CVE-2024-42411,0,0,3fcf900cd705b45045cb94d8edb3d48eeb6b58809490fd9c74760d8ca62aa9ff,2024-08-23T16:04:26.227000
|
||||
CVE-2024-42412,0,1,67c8c41f59733c60f8d0af86f2ecdf00cd4cc74955b03971857f701856eb8dc1,2024-08-30T13:00:05.390000
|
||||
CVE-2024-42412,0,0,67c8c41f59733c60f8d0af86f2ecdf00cd4cc74955b03971857f701856eb8dc1,2024-08-30T13:00:05.390000
|
||||
CVE-2024-42418,0,0,cd8cebc8a20c18f0027a896396b37c57ee369fd63657ca2801f50759cb9c420b,2024-08-23T16:18:28.547000
|
||||
CVE-2024-4242,0,0,9c58e9b9e77452c845f3c5179c3be4415982efd0430d3da14ab0345d444eccfb,2024-06-04T19:20:33.363000
|
||||
CVE-2024-4243,0,0,d19512e4db8434daba47c490442c83df13ecbcadaf4fb9c501fe6a2c921256d5,2024-06-04T19:20:33.497000
|
||||
@ -258074,7 +258074,7 @@ CVE-2024-4279,0,0,dfbad3c4052d0097199e5a57f42abb52975c0de3af4475a04c90870b0d97f0
|
||||
CVE-2024-42790,0,0,7510b4b53ddc671a204c6c9918e039c11322e8be8788350ff1b1615bcf8a1bd2,2024-08-27T14:35:06.047000
|
||||
CVE-2024-42791,0,0,229b4927d8c73b78aebdb2269dabb59bb0e6061ec8574ac1a3619991917c1649,2024-08-26T19:35:30.910000
|
||||
CVE-2024-42792,0,0,4eaaa19a355275b40166aa1a2acd468fef8bb5420612bb7385f6e2e1abaacd08,2024-08-26T19:10:09.607000
|
||||
CVE-2024-42793,0,0,510cd9c4d588635a50ff7dc67e5ffcd96c59095ddc7f9dfa239f2609e8b57d87,2024-08-29T13:25:27.537000
|
||||
CVE-2024-42793,0,1,c34b0c01a33da3f3b96951729540996987faac6763a3b4211067000d740419d1,2024-08-30T15:56:51.510000
|
||||
CVE-2024-4280,0,0,f46c38f13eff52b4d020fb374e18f92e6528a4bade2042627b2165ccf7b62772,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4281,0,0,cb48c26c252b1c83fb4810210335ce05e1fcbd94e5804419418b4f73b9d5c028,2024-05-08T13:15:00.690000
|
||||
CVE-2024-42812,0,0,d754a1b3fa22845b1ec28a5e3b423343f3a09420e9ed62b3cb19e2fa117c33b2,2024-08-20T15:44:20.567000
|
||||
@ -258087,7 +258087,7 @@ CVE-2024-42843,0,0,147a94e278dd08ceb9ff0b00f505eb868d7a1e59c01ddecc9d1420e344e9e
|
||||
CVE-2024-42845,0,0,f506b40591f84fe588a1ebf10f79903d4e58b530d7a712a8d7ac529b24aba892,2024-08-28T16:35:23.650000
|
||||
CVE-2024-42849,0,0,476a8b05abd0e5119b7af3cdc63ecacc25e4b753be03084352759f8b34a540b8,2024-08-19T13:00:23.117000
|
||||
CVE-2024-42850,0,0,a72d6cc9fb65147822ff703ae140dbf9bc418b2813da9b6084ec42fe436f4f06,2024-08-19T16:35:24.160000
|
||||
CVE-2024-42851,0,0,00274099170db6704046005a45a40a4a9a23778f1139c6df90d1c8a79410eb5f,2024-08-28T20:15:07.787000
|
||||
CVE-2024-42851,0,1,f841f745f513412557e0c00ae557a507c262bbcf9e2f6ddfb2d4220b405d360a,2024-08-30T15:30:44.113000
|
||||
CVE-2024-42852,0,0,a01c2a98e1188b6b13c1dcf03329d746e5ba476590f73862f604a3ade35f9775,2024-08-23T19:35:15.240000
|
||||
CVE-2024-4286,0,0,4b983e074dfcf6df9bba7e92a07b4865c0022e26c41bba4144154cfeae541d31,2024-05-28T12:39:28.377000
|
||||
CVE-2024-4287,0,0,e4eaa9cc0eedd48e962bf47bbdeb2988e2d50ccd6011525ef3609c758b0c263c,2024-05-20T15:17:54.513000
|
||||
@ -258191,7 +258191,7 @@ CVE-2024-43129,0,0,31c20babbf5c34491baa27c55ebc5586c6252f19bd444c66f49a6914d67b1
|
||||
CVE-2024-4313,0,0,04786fcee0b11c58facf347077c0fb8e17faddbc064f2c4dc547a3be70193e4e,2024-06-24T20:01:09.330000
|
||||
CVE-2024-43130,0,0,8ac60d1cc8aa75b0576e9410e6684738dc0975304323a1567a1f0eb99e4d577f,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43131,0,0,8591ee6c3e77a5a691612e6bee62ebc0760a7b8123e10043f1c0be2a86a8517c,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43132,0,1,b1908cbb92808ef861707413b2658c36c7e6188fd47994cd788d35df559d4e4a,2024-08-30T13:00:05.390000
|
||||
CVE-2024-43132,0,0,b1908cbb92808ef861707413b2658c36c7e6188fd47994cd788d35df559d4e4a,2024-08-30T13:00:05.390000
|
||||
CVE-2024-43133,0,0,9e3f4ff9c8102da720c262ea41d7de033957edff3ff57332662b4c6a475cc118,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43135,0,0,1848aed765bf1b3f105991b4b7c25107cc56730f5bab291f1691a8e7e95da171,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43137,0,0,8de1b2565c6057c436104ee14f3d6e8ca057aac92c9a82c9e40b213e90604b29,2024-08-13T12:58:25.437000
|
||||
@ -258200,7 +258200,7 @@ CVE-2024-43139,0,0,c74c0f3dde7756ee6f145dfa944df2bddeeb719e29cd3b22fb911239d7691
|
||||
CVE-2024-4314,0,0,5b91c731cc96c112e4837604681a355586cd629f1c71449572dfc7eb6fafd4a6,2024-05-14T16:11:39.510000
|
||||
CVE-2024-43140,0,0,ddd9555407bf13c17882395b6a58ab3090224c7fbcadd5faeeb830d264aad29c,2024-08-29T16:04:30.370000
|
||||
CVE-2024-43141,0,0,f29f7de7eae578d120c59b0305acaad325acb97a127ccd6d6289a33a71c747b6,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43144,0,1,6fcfaa431361ce8223dfbc4fac119766e1d5192a78548ba806a01ea1f1fff533,2024-08-30T13:00:05.390000
|
||||
CVE-2024-43144,0,0,6fcfaa431361ce8223dfbc4fac119766e1d5192a78548ba806a01ea1f1fff533,2024-08-30T13:00:05.390000
|
||||
CVE-2024-43145,0,0,7ccb83b884d8dc58ceb4932d45768a752924d5c2938e5a3f671a778aaba995f8,2024-08-19T12:59:59.177000
|
||||
CVE-2024-43147,0,0,667e4e165f9113b4fe4ef729d1c96bbd751ca2d031ec283022e85cfd98eae7e3,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43148,0,0,cff5965efef0a90e2b87f245b5b8084669061ce4646f39e1c94e0f70b2166d42,2024-08-13T12:58:25.437000
|
||||
@ -258386,7 +258386,7 @@ CVE-2024-43406,0,0,854367aefb2456ec94d3be7f3dee319c12b7f5f1a1af5dbd89c34dcd70789
|
||||
CVE-2024-43407,0,0,e2ea80f87c66143027da11cf79f2cd80121ef59cc1cf87c24a28fe2c518a474a,2024-08-23T16:20:42.363000
|
||||
CVE-2024-43408,0,0,d4537cc05369b1073eab6be6b0c0270081103ca8bf402f8fafe9ed3f7a29471a,2024-08-21T12:30:33.697000
|
||||
CVE-2024-43409,0,0,a42b7406eee825ee22fc12b5886825141398e49597504678e6e46efb8ce725f2,2024-08-26T18:31:26.197000
|
||||
CVE-2024-4341,0,0,60a5b39ccdef4d059dc8073670ab0aea750a7880bf4e71543025f3d18b32ff1e,2024-07-08T15:49:22.437000
|
||||
CVE-2024-4341,0,1,c1be2299b8a85166f5701f470f8a0c3853c6b802dab3cad3703461b748b378a9,2024-08-30T15:44:26.727000
|
||||
CVE-2024-43410,0,0,34c0de7d3aba2e2bf754c89b4a746899ed92baa2a863da3cba07091015a18558,2024-08-21T17:25:08.560000
|
||||
CVE-2024-43411,0,0,17fae2b6c19a1c99d860c5f9c414f25b1a9d716a3875184bd3648e5d7c5063c5,2024-08-21T17:25:08.560000
|
||||
CVE-2024-43414,0,0,480c6b9e5d15f4492b80d223686b068600d65271b741c851d7e1d6b64a6b2b74,2024-08-27T18:33:14.247000
|
||||
@ -258438,15 +258438,15 @@ CVE-2024-43782,0,0,640aa820b0ca467d38719c873a53febd1944feccce46dcf0202ccc162637d
|
||||
CVE-2024-43783,0,0,68cfe59aff11ea0ac165b5589cd2ccc9f899d9b23a7fe8b7accfeb70a176ce47,2024-08-27T18:33:14.247000
|
||||
CVE-2024-43785,0,0,865f9ddb4537abd892462a2be2c5b215baf0c6c5f01c60dc5f4805d59a23b528,2024-08-23T16:18:28.547000
|
||||
CVE-2024-43787,0,0,2409e45336c28eaec7950310efc31a1dfcd5144f7967b659eb1779c444e8beaf,2024-08-23T16:18:28.547000
|
||||
CVE-2024-43788,0,0,6ba7a069df1deadaf8a9df8f1dfeeeb285101da52fcf4af6ac8d627260dab172,2024-08-27T18:33:14.247000
|
||||
CVE-2024-43788,0,1,6f75ff333beaf8829a6a1bc6651ce3043a53e6a3c4b202b90d5574c9a5264bae,2024-08-30T15:13:21.340000
|
||||
CVE-2024-4379,0,0,21c1593ccdc9c542b9ca9b0ba403ad32afbc0c98a6b0c8f514039e188e2373a7,2024-05-31T13:01:46.727000
|
||||
CVE-2024-43790,0,0,c3cb5748c434505823d489a50a95032a1f25244b73b9e74701de9974c3846229,2024-08-23T16:18:28.547000
|
||||
CVE-2024-43791,0,0,343f2e18bef5efeacf2cd8005024025a5d76578a60f2c9c2f207bc81f2ca8e37,2024-08-23T16:18:28.547000
|
||||
CVE-2024-43794,0,0,896bb2e8ce2811b7436ee4acf4b9708cca2e72737878d04fdbf593ce2a59df9c,2024-08-23T18:46:31.730000
|
||||
CVE-2024-43798,0,0,0f4c51b4b2459096a21f79a4c43df1119a11b4e9a3f2bc6fda3ce5410f7de574,2024-08-27T13:01:37.913000
|
||||
CVE-2024-43802,0,0,e6e6b0823c543afdd24537863512362b0ca92682a64b51ee319640612d5e52b9,2024-08-27T13:02:05.683000
|
||||
CVE-2024-43804,0,1,cbb7ec4946a5d9c01d82297dcb2398ad33b946487bfc0cd1cf2a7bd29341d9b7,2024-08-30T13:00:05.390000
|
||||
CVE-2024-43805,0,0,e9de3af7500f4b69c1539a4468aa5c023c43f557b57ab88b796f849dd26b41b4,2024-08-29T13:25:27.537000
|
||||
CVE-2024-43804,0,0,cbb7ec4946a5d9c01d82297dcb2398ad33b946487bfc0cd1cf2a7bd29341d9b7,2024-08-30T13:00:05.390000
|
||||
CVE-2024-43805,0,1,8cc69a52f61e705cc1b61f3c5982ec9f82234c4fd7aecf6c96d7c935acee4e24,2024-08-30T15:56:16.477000
|
||||
CVE-2024-43806,0,0,541f1dd38cc99ea47f0a1d3247e689afdaff86c352817f08eb0b94af02655385,2024-08-27T13:02:05.683000
|
||||
CVE-2024-43807,0,0,3f91dd87019f53cf891d3a83100dd5c601626acd9f1336f0bde904afb8c4caa9,2024-08-19T21:09:42.313000
|
||||
CVE-2024-43808,0,0,5904dacb826507090b9d583058f58aa9b73c36079d8a4861440bfd52d34f3890,2024-08-19T21:10:14.093000
|
||||
@ -258566,42 +258566,42 @@ CVE-2024-43913,0,0,5c9c2c963f30f56673884f817fecf35fdb8c9c609214d88499e445eaad74d
|
||||
CVE-2024-43914,0,0,6abd174237c3162d43a4c80a18de042ce09386ce614128479039a4b09b208b5e,2024-08-26T12:47:20.187000
|
||||
CVE-2024-43915,0,0,d179827f4a2239697e62ac501a97b8b3109220e3bde2278c20f3a196442ad24d,2024-08-28T17:44:45.193000
|
||||
CVE-2024-43916,0,0,f029d23d9b2bb2878425bf53ff3e166ae08ff9834b0ced7b956909e8c596933c,2024-08-27T13:01:37.913000
|
||||
CVE-2024-43917,0,1,763320422d1f5f6b627e67997133b73d2d81c353f19b439bce5f72673e32a57d,2024-08-30T13:00:05.390000
|
||||
CVE-2024-43918,0,1,6f6745b88f3678813198257c945602dc7ab029c467f62ff1519da2102b72bdb4,2024-08-30T13:00:05.390000
|
||||
CVE-2024-43917,0,0,763320422d1f5f6b627e67997133b73d2d81c353f19b439bce5f72673e32a57d,2024-08-30T13:00:05.390000
|
||||
CVE-2024-43918,0,0,6f6745b88f3678813198257c945602dc7ab029c467f62ff1519da2102b72bdb4,2024-08-30T13:00:05.390000
|
||||
CVE-2024-4392,0,0,5c82c123a66d3444e81adbb958bd6b8cf11e432e36668571a78dbfc8c82c1c37,2024-05-14T19:17:55.627000
|
||||
CVE-2024-43920,0,1,a695b54b1880d4ad16b5fca3a028d8998ad113b1206f302d672996fdee5a3625,2024-08-30T13:00:05.390000
|
||||
CVE-2024-43921,0,1,4ac16237b70ac91152081ef9ca629f09fcd83b198259a5ccaf7180a65dd90db1,2024-08-30T13:00:05.390000
|
||||
CVE-2024-43922,0,1,4db0f3ea885d72565e9f11bea2f1b6d243fb7f7791c6b176e0c5482e9efab43f,2024-08-30T13:00:05.390000
|
||||
CVE-2024-43926,0,1,1a959b9a4eb38d5a776445b49b8499fff82eae5d45fd890479dff6eb17008a9c,2024-08-30T13:00:05.390000
|
||||
CVE-2024-43920,0,0,a695b54b1880d4ad16b5fca3a028d8998ad113b1206f302d672996fdee5a3625,2024-08-30T13:00:05.390000
|
||||
CVE-2024-43921,0,0,4ac16237b70ac91152081ef9ca629f09fcd83b198259a5ccaf7180a65dd90db1,2024-08-30T13:00:05.390000
|
||||
CVE-2024-43922,0,0,4db0f3ea885d72565e9f11bea2f1b6d243fb7f7791c6b176e0c5482e9efab43f,2024-08-30T13:00:05.390000
|
||||
CVE-2024-43926,0,0,1a959b9a4eb38d5a776445b49b8499fff82eae5d45fd890479dff6eb17008a9c,2024-08-30T13:00:05.390000
|
||||
CVE-2024-4393,0,0,4e00802830a11f2dfec38985ebf8ec82363098448bfe6d2b274aa9f7d7f56b33,2024-05-08T13:15:00.690000
|
||||
CVE-2024-43931,0,1,d74e610d5124f68f8bec4cb90dab68421bf7defe29841aa92d1066c54a657ddf,2024-08-30T13:00:05.390000
|
||||
CVE-2024-43934,0,1,02ae49237eb0ca3ddb69bb7c0c18623c302f35abdd4f5fc93e679bbccb4705a3,2024-08-30T13:00:05.390000
|
||||
CVE-2024-43935,0,1,e264478e8dfe41ac236d9dd1e1917ef755cbbc7ac4a0fd933ae3529845ae8469,2024-08-30T13:00:05.390000
|
||||
CVE-2024-43936,0,1,c3d56486fd2b8cfcea44bfd8e51042faa595caea22c6c1ac30db5d582f68982e,2024-08-30T13:00:05.390000
|
||||
CVE-2024-43939,0,1,732edb5d83a185c1ff0679cde7caea1837ef16b9217770aff51844261e5dce67,2024-08-30T13:00:05.390000
|
||||
CVE-2024-43940,0,1,2f2e305e339a2e6cfbb7c4d905d7e80e6712a317a468b4dddc205c3917f95623,2024-08-30T13:00:05.390000
|
||||
CVE-2024-43941,0,1,51da6628d50618fc8f152eebc9db91e71523891a7db90b265f812b78f3b13ead,2024-08-30T13:00:05.390000
|
||||
CVE-2024-43942,0,1,e407f19e5fd9829011f6787f9c7691b398ead09a08db45a3953ea472df2a562a,2024-08-30T13:00:05.390000
|
||||
CVE-2024-43943,0,1,3e393391698d09fd81d5d7be23db1feaee575a46747a1104ac77289691928f07,2024-08-30T13:00:05.390000
|
||||
CVE-2024-43944,0,1,3b43949b67e3b5293c2c106f6d4c5bf9b7b47da0cd6c64d08fad13e8014c08a4,2024-08-30T13:00:05.390000
|
||||
CVE-2024-43946,0,1,e18dc84f73cee454a6c00b237a9cea37e087af1191a8fa9e86b5330e7988cc5b,2024-08-30T13:00:05.390000
|
||||
CVE-2024-43947,0,1,edb3b36ddc37170b66cbc416c5321e1a097a5eee8071b3a104c96d4792d08460,2024-08-30T13:00:05.390000
|
||||
CVE-2024-43948,0,1,62da4ce69bd218a239dde32118aa73fdff38cb0b8d3274452c2e2a35eb6ccfc7,2024-08-30T13:00:05.390000
|
||||
CVE-2024-43949,0,1,53cb787590ba7708354e80461e922b0cc2c1c65c512885ec8763c3e6ed5e1fb7,2024-08-30T13:00:05.390000
|
||||
CVE-2024-43931,0,0,d74e610d5124f68f8bec4cb90dab68421bf7defe29841aa92d1066c54a657ddf,2024-08-30T13:00:05.390000
|
||||
CVE-2024-43934,0,0,02ae49237eb0ca3ddb69bb7c0c18623c302f35abdd4f5fc93e679bbccb4705a3,2024-08-30T13:00:05.390000
|
||||
CVE-2024-43935,0,0,e264478e8dfe41ac236d9dd1e1917ef755cbbc7ac4a0fd933ae3529845ae8469,2024-08-30T13:00:05.390000
|
||||
CVE-2024-43936,0,0,c3d56486fd2b8cfcea44bfd8e51042faa595caea22c6c1ac30db5d582f68982e,2024-08-30T13:00:05.390000
|
||||
CVE-2024-43939,0,0,732edb5d83a185c1ff0679cde7caea1837ef16b9217770aff51844261e5dce67,2024-08-30T13:00:05.390000
|
||||
CVE-2024-43940,0,0,2f2e305e339a2e6cfbb7c4d905d7e80e6712a317a468b4dddc205c3917f95623,2024-08-30T13:00:05.390000
|
||||
CVE-2024-43941,0,0,51da6628d50618fc8f152eebc9db91e71523891a7db90b265f812b78f3b13ead,2024-08-30T13:00:05.390000
|
||||
CVE-2024-43942,0,0,e407f19e5fd9829011f6787f9c7691b398ead09a08db45a3953ea472df2a562a,2024-08-30T13:00:05.390000
|
||||
CVE-2024-43943,0,0,3e393391698d09fd81d5d7be23db1feaee575a46747a1104ac77289691928f07,2024-08-30T13:00:05.390000
|
||||
CVE-2024-43944,0,0,3b43949b67e3b5293c2c106f6d4c5bf9b7b47da0cd6c64d08fad13e8014c08a4,2024-08-30T13:00:05.390000
|
||||
CVE-2024-43946,0,0,e18dc84f73cee454a6c00b237a9cea37e087af1191a8fa9e86b5330e7988cc5b,2024-08-30T13:00:05.390000
|
||||
CVE-2024-43947,0,0,edb3b36ddc37170b66cbc416c5321e1a097a5eee8071b3a104c96d4792d08460,2024-08-30T13:00:05.390000
|
||||
CVE-2024-43948,0,0,62da4ce69bd218a239dde32118aa73fdff38cb0b8d3274452c2e2a35eb6ccfc7,2024-08-30T13:00:05.390000
|
||||
CVE-2024-43949,0,0,53cb787590ba7708354e80461e922b0cc2c1c65c512885ec8763c3e6ed5e1fb7,2024-08-30T13:00:05.390000
|
||||
CVE-2024-4395,0,0,7eb8bb55518c25270e2cdb5da345e646a2437fce6bdd0ba1dda9f1e27539a52c,2024-07-03T02:07:30.800000
|
||||
CVE-2024-43950,0,1,5dcee2167846f38650b3d090f4a0c9103e3c4a1e410765c04983b930548ca5c5,2024-08-30T13:00:05.390000
|
||||
CVE-2024-43951,0,1,49964c0b7bf80dc4e8e6905f7ea49831ad0597f4604030a0e24dc1ad68f6cc34,2024-08-30T13:00:05.390000
|
||||
CVE-2024-43952,0,1,8873b39785b32134b23b4d7dcc05271947a1b44e14c12829224434691047b82c,2024-08-30T13:00:05.390000
|
||||
CVE-2024-43953,0,1,486651833eff44984b45841925bd08fd4a3dd26beb47ddf79f817bcbd72b5e8d,2024-08-30T13:00:05.390000
|
||||
CVE-2024-43954,0,1,6608795c7257d6e02220fae7308a5949f52a183b99417ac6b6c9e3d7ac103720,2024-08-30T13:00:05.390000
|
||||
CVE-2024-43955,0,1,50e08f0ae36f84c332d90222555687c8f5c3b715aa2776d89030e9054a3570e1,2024-08-30T13:00:05.390000
|
||||
CVE-2024-43957,0,1,58ecfe6fe3943775d4c6ef06e67cd4ae5d3c7397b5566e3b648b22f38e8b8fe6,2024-08-30T13:00:05.390000
|
||||
CVE-2024-43958,0,1,0a63803aef631af335eb5495d2c89a2ed2078ddbce150957a088a76ee1e971e1,2024-08-30T13:00:05.390000
|
||||
CVE-2024-43960,0,1,d4fe49466974e72c9189f1649edc829bafbb59db29327bd88076dd3f1488e630,2024-08-30T13:00:05.390000
|
||||
CVE-2024-43961,0,1,fc0c25e77def1081886110717c1745e96221babc8d9d376dd02221e26610d343,2024-08-30T13:00:05.390000
|
||||
CVE-2024-43963,0,1,3f357b8e2df137098008e54ef730d46165e201ce25650fb33973b7ba954221ca,2024-08-30T13:00:05.390000
|
||||
CVE-2024-43964,0,1,bc32f4a153e6dcf4e86584279d8891537ac8aafde77ba6c4ee6c0bc4b7914cd2,2024-08-30T13:00:05.390000
|
||||
CVE-2024-43965,0,1,08b6ad4a1a4b1ffdd93dbbd7fa720075997c0aeeaa32e6ecff18f58a8c42dd84,2024-08-30T13:00:05.390000
|
||||
CVE-2024-43950,0,0,5dcee2167846f38650b3d090f4a0c9103e3c4a1e410765c04983b930548ca5c5,2024-08-30T13:00:05.390000
|
||||
CVE-2024-43951,0,0,49964c0b7bf80dc4e8e6905f7ea49831ad0597f4604030a0e24dc1ad68f6cc34,2024-08-30T13:00:05.390000
|
||||
CVE-2024-43952,0,0,8873b39785b32134b23b4d7dcc05271947a1b44e14c12829224434691047b82c,2024-08-30T13:00:05.390000
|
||||
CVE-2024-43953,0,0,486651833eff44984b45841925bd08fd4a3dd26beb47ddf79f817bcbd72b5e8d,2024-08-30T13:00:05.390000
|
||||
CVE-2024-43954,0,0,6608795c7257d6e02220fae7308a5949f52a183b99417ac6b6c9e3d7ac103720,2024-08-30T13:00:05.390000
|
||||
CVE-2024-43955,0,0,50e08f0ae36f84c332d90222555687c8f5c3b715aa2776d89030e9054a3570e1,2024-08-30T13:00:05.390000
|
||||
CVE-2024-43957,0,0,58ecfe6fe3943775d4c6ef06e67cd4ae5d3c7397b5566e3b648b22f38e8b8fe6,2024-08-30T13:00:05.390000
|
||||
CVE-2024-43958,0,0,0a63803aef631af335eb5495d2c89a2ed2078ddbce150957a088a76ee1e971e1,2024-08-30T13:00:05.390000
|
||||
CVE-2024-43960,0,0,d4fe49466974e72c9189f1649edc829bafbb59db29327bd88076dd3f1488e630,2024-08-30T13:00:05.390000
|
||||
CVE-2024-43961,0,0,fc0c25e77def1081886110717c1745e96221babc8d9d376dd02221e26610d343,2024-08-30T13:00:05.390000
|
||||
CVE-2024-43963,0,0,3f357b8e2df137098008e54ef730d46165e201ce25650fb33973b7ba954221ca,2024-08-30T13:00:05.390000
|
||||
CVE-2024-43964,0,0,bc32f4a153e6dcf4e86584279d8891537ac8aafde77ba6c4ee6c0bc4b7914cd2,2024-08-30T13:00:05.390000
|
||||
CVE-2024-43965,0,0,08b6ad4a1a4b1ffdd93dbbd7fa720075997c0aeeaa32e6ecff18f58a8c42dd84,2024-08-30T13:00:05.390000
|
||||
CVE-2024-43966,0,0,cd3d16dd9709908a4a64e6a13b6fef840bd6c4e6049b114619dc3ea375d7306a,2024-08-26T15:15:23.727000
|
||||
CVE-2024-43967,0,0,dd198820d01657feb4461b4126ff9f2ed88f09f4d5c22ed753dc2e0d9ac5168d,2024-08-26T19:10:09.607000
|
||||
CVE-2024-4397,0,0,e58140e99ddfaf8bde684cb5f7b842244f11804dcdfb8070d80437acbcb292f3,2024-05-14T16:11:39.510000
|
||||
@ -258609,7 +258609,7 @@ CVE-2024-4398,0,0,fee297010492d7a9d0bd198f00369fbc7ee85eff508879444e062d535e0abd
|
||||
CVE-2024-43986,0,0,8c6098ff4ca468ef6cb988aff8c48a1d885b4130f177878606668301c5eb4e22,2024-08-29T13:25:27.537000
|
||||
CVE-2024-4399,0,0,037b40419d6c617c61ec971c9e0affd6b35920b718c94b9e88ff7a43f16d3faf,2024-07-03T02:07:31.827000
|
||||
CVE-2024-4400,0,0,387fe642c8f26702c425b79a01d9b1ba308ec0bd188f1564ff2c490875133119,2024-05-16T13:03:05.353000
|
||||
CVE-2024-4401,0,1,2ed184a8338a261d4b70ca8ae7248d5bf67aa2a87f738c5fae28a2a86cef6ed1,2024-08-30T13:00:05.390000
|
||||
CVE-2024-4401,0,0,2ed184a8338a261d4b70ca8ae7248d5bf67aa2a87f738c5fae28a2a86cef6ed1,2024-08-30T13:00:05.390000
|
||||
CVE-2024-4403,0,0,07b387e13ed3d47c920433d5f499100d4d5e53ffefe1712d98753a4da5408fe2,2024-06-10T18:06:22.600000
|
||||
CVE-2024-4404,0,0,3ae3ea086edb9bd484931090d5df4b9ee138a4bfd155faf3c535f115da6a15de,2024-06-17T12:42:04.623000
|
||||
CVE-2024-4405,0,0,45cc63f187ac8ca241b3f6f4ea8115546cfb9789c95e5b84e970d2850f40bb92,2024-05-02T18:00:37.360000
|
||||
@ -258634,16 +258634,16 @@ CVE-2024-4424,0,0,f0ec85c26b242f03f1dda01796c703344a9d3cb93681b5b37fa83e955b9558
|
||||
CVE-2024-4425,0,0,42da9fd06b4c286cf2ec4b279ef4c006e94043f167bd5abbfb6b02300a24e0e6,2024-07-03T02:07:33.267000
|
||||
CVE-2024-4426,0,0,438c7e77bba5537169c045ba2dc210873849174945e68052d5a8bbbd94b93b11,2024-05-30T13:15:41.297000
|
||||
CVE-2024-4427,0,0,80d5c9824f4d390f5c719cacd09f3ea81ff1def48bdeaace03a047150cb666b0,2024-05-30T13:15:41.297000
|
||||
CVE-2024-4428,0,0,2b4b41fe258d57ee7da92c1cce391c13b13ef10754a34280666a4b4743351809,2024-08-29T13:25:27.537000
|
||||
CVE-2024-4428,0,1,a6da5e3db14ee64a55bd0d7000ef1cdcb0310671965cf729d94b935d780a379a,2024-08-30T15:49:16.927000
|
||||
CVE-2024-4429,0,0,f3c6ad6c7fc3529e6805efa10bcecee8b01db9336bcb1f88fdc476ffd1173766,2024-05-28T17:11:55.903000
|
||||
CVE-2024-4430,0,0,137066e4356a4d04e3ad731fb42c3579f278eca0ad3e41ea882926334c71093f,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4431,0,0,8d95de6ec075320f55907047db89835dd68db45859f7bae49d6625b2a3240b6b,2024-05-24T01:15:30.977000
|
||||
CVE-2024-4432,0,0,492ff6791a7b1a2e081b9c5249b748792a54b9554ba3a2422039c4bfa6a7bf50,2024-05-20T13:00:34.807000
|
||||
CVE-2024-4433,0,0,29650c676957862ed8f96380f29298acd09e1ae0c4c0eae7a19f73eb896474af,2024-05-02T18:00:37.360000
|
||||
CVE-2024-4434,0,0,20236f1809b1e5babc738bee4dccd8edc7c4530b36b3cb8640798a5fece3dc01,2024-05-14T16:11:39.510000
|
||||
CVE-2024-44340,0,0,5530dc35edef952e8711559e514fbfa321059e19ea9cf4113733712ccfcddacd,2024-08-27T18:35:11.777000
|
||||
CVE-2024-44341,0,0,4394a7ab623822c8d7ae8a40120209f3c34ef26ebd88a169d40d7905474e555f,2024-08-27T18:35:12.540000
|
||||
CVE-2024-44342,0,0,d2c4a0923b5d002fea6dcefb46d4dbdd0a4fe3471bd6be04a38a6c07b2608317,2024-08-27T18:35:13.327000
|
||||
CVE-2024-44340,0,1,d9735b689087fe69bacf9d01f51df4eff217f92bad40f97e93a199106e1c72ba,2024-08-30T14:56:38.207000
|
||||
CVE-2024-44341,0,1,6f1abe8a37dcd02ea1515f2f8b8a8861a5b44588bacc4edb6b1f9eb0f68ae2d0,2024-08-30T14:57:07.260000
|
||||
CVE-2024-44342,0,1,5125cb4fc3697f3398817220a22114141d35ae892a172c5acf5a4a5249bb76b2,2024-08-30T14:57:40.020000
|
||||
CVE-2024-4435,0,0,de8e3bf570f6ad4a46d29ba9fea181676ce0f6a2152ced144579ea87a60a7929,2024-05-21T12:37:59.687000
|
||||
CVE-2024-4436,0,0,17e0d77b7422c134d8a6b2f19c763597337490777ba51623e74515d13a757b13,2024-05-30T02:15:47.300000
|
||||
CVE-2024-4437,0,0,8daf6b009e7d35d5422b21cbeb277c609e9541d61900da1da050701f495da62e,2024-05-30T02:15:47.433000
|
||||
@ -258694,18 +258694,18 @@ CVE-2024-4468,0,0,b3276ced4484e0a6677a57dac2ac7e9a5b704e2ae059b48a7256dc6a67d6da
|
||||
CVE-2024-4469,0,0,8f4eafe1629cfec30e07bc480cd9bd60074526e695dc3e7699a9034cc841795d,2024-05-31T13:01:46.727000
|
||||
CVE-2024-4470,0,0,3c0fcce343f2a1d09f74dfb9be1570b18bd3555368134445c358e736dab037c4,2024-05-21T12:37:59.687000
|
||||
CVE-2024-4471,0,0,44899070168831f8c9dbf9959b26f4abead5dc804569bf5f22dbe3807408cb0d,2024-05-24T01:15:30.977000
|
||||
CVE-2024-44716,0,1,02e3d7babc62c8f42dbca2c8825df8517009101b3d1d6afa8e0e3e2356687be3,2024-08-30T13:00:05.390000
|
||||
CVE-2024-44717,0,1,dee9b73c7e1050c45e1039cf251f198a0d3363f43b50bb034142fe420de59848,2024-08-30T13:00:05.390000
|
||||
CVE-2024-44716,0,0,02e3d7babc62c8f42dbca2c8825df8517009101b3d1d6afa8e0e3e2356687be3,2024-08-30T13:00:05.390000
|
||||
CVE-2024-44717,0,0,dee9b73c7e1050c45e1039cf251f198a0d3363f43b50bb034142fe420de59848,2024-08-30T13:00:05.390000
|
||||
CVE-2024-4473,0,0,8a0cf4a98efdbfb5770862e11c920028f2e3a9a43c44eb843685fb5ef0c3f72b,2024-05-14T19:17:55.627000
|
||||
CVE-2024-4474,0,0,f8c1a36ad14efe96f98dae06e1720ed737c744e50cd9a9e3991eaed9f98aef96,2024-07-17T02:48:04.213000
|
||||
CVE-2024-4475,0,0,b199ea7732b827fa53d53ebb43badb03a8dff248a786cc8d7d2459800e62c08e,2024-07-17T02:47:07.620000
|
||||
CVE-2024-44760,0,0,3a00b65146802967692858d01e10be80e485d57c9e1bc6037d8c115ef89dc218,2024-08-29T13:25:27.537000
|
||||
CVE-2024-44760,0,1,0d252ff08482783aaee88c027910c09101e7f32f15f52b69e5e2b4482012606e,2024-08-30T15:55:41.137000
|
||||
CVE-2024-44761,0,0,a7d79c4d2b06f52558db31c99909309cd5baa976e0824d4726ec990dfa036bf1,2024-08-29T13:25:27.537000
|
||||
CVE-2024-4477,0,0,b275cf91a81ef0e33ced77c1c5ba5e17245e6b33fc991fd87901e463b723d83e,2024-07-12T16:12:03.717000
|
||||
CVE-2024-44776,0,1,28ae5db6f882f425142c0c1059cbd5a1c8ad65f7a4cfef3ef61dc0e39bea3c2e,2024-08-30T13:00:05.390000
|
||||
CVE-2024-44777,0,1,cde3cdcf6f920db7b620a51993a8b22bac61a970df2497f8ed04c8a930b1d684,2024-08-30T13:00:05.390000
|
||||
CVE-2024-44778,0,1,b9a70f6baf6650c2b46a06a0e800c00e23e3974e584b00056b1edabec019ca8a,2024-08-30T13:00:05.390000
|
||||
CVE-2024-44779,0,1,d8dca58f9573a9e3148ac3bd2a234855a27b46badb233b8d9f53c3bb1a39ecbc,2024-08-30T13:00:05.390000
|
||||
CVE-2024-44776,0,0,28ae5db6f882f425142c0c1059cbd5a1c8ad65f7a4cfef3ef61dc0e39bea3c2e,2024-08-30T13:00:05.390000
|
||||
CVE-2024-44777,0,0,cde3cdcf6f920db7b620a51993a8b22bac61a970df2497f8ed04c8a930b1d684,2024-08-30T13:00:05.390000
|
||||
CVE-2024-44778,0,0,b9a70f6baf6650c2b46a06a0e800c00e23e3974e584b00056b1edabec019ca8a,2024-08-30T13:00:05.390000
|
||||
CVE-2024-44779,0,0,d8dca58f9573a9e3148ac3bd2a234855a27b46badb233b8d9f53c3bb1a39ecbc,2024-08-30T13:00:05.390000
|
||||
CVE-2024-4478,0,0,df092e6d564da1ba274f237ab38d20f4d3626835a8920b1b768f819806d6fce1,2024-05-16T13:03:05.353000
|
||||
CVE-2024-4479,0,0,19a5d52fe32f562c79c648f88a021706b773334e3193aa8af739d9d0094fe357,2024-07-26T13:35:32.397000
|
||||
CVE-2024-44793,0,0,2168e0c02c7a858cbaff9cee44bb5e6a195abfb08b3b31876bea7f6d43977fff,2024-08-27T13:02:05.683000
|
||||
@ -258728,10 +258728,10 @@ CVE-2024-4491,0,0,fec0fa99feb905362d1059ae18d849f25d02b15efc10c179ce136112d1e088
|
||||
CVE-2024-44913,0,0,b6a472d5fd19f3234cb94f535078ee5f4ccf42464ba38a6cbd2f0b0b0d56c911,2024-08-29T13:25:27.537000
|
||||
CVE-2024-44914,0,0,cdab06c38600f9663e7e3d6a83c73bbea13a8eac91f638774262eedf9129b83e,2024-08-29T13:25:27.537000
|
||||
CVE-2024-44915,0,0,189fc1c6cfc0d9d55a03d683dcd4ceecbf61c3a051a5df8bd60ce5a5dfbbadd4,2024-08-29T13:25:27.537000
|
||||
CVE-2024-44919,0,1,faaee9efffcc723471cf86e5cf371ac1454f294b893a4a81dd04344d800c2658,2024-08-30T13:00:05.390000
|
||||
CVE-2024-44919,0,0,faaee9efffcc723471cf86e5cf371ac1454f294b893a4a81dd04344d800c2658,2024-08-30T13:00:05.390000
|
||||
CVE-2024-4492,0,0,0237cea7742a82f916a95c7121fd101b19e30a52d4f326fc68f5db785a621a29,2024-06-04T19:20:39.047000
|
||||
CVE-2024-4493,0,0,890374eb1d5a1051bad1d8c630ec03ea130ffcf654be5d03c4d1c85a0ebc3c87,2024-06-04T19:20:39.143000
|
||||
CVE-2024-44930,0,1,7742e471af6d813844c83bc1edc4d2c34bd92450c44640698d5e16549d2fbbfc,2024-08-30T13:00:05.390000
|
||||
CVE-2024-44930,0,0,7742e471af6d813844c83bc1edc4d2c34bd92450c44640698d5e16549d2fbbfc,2024-08-30T13:00:05.390000
|
||||
CVE-2024-44931,0,0,a811432be893129eec1153f2a1f5cf79e00f6cda4409f2898f7f29e87e49d41f,2024-08-26T12:47:20.187000
|
||||
CVE-2024-44932,0,0,34330dfb165e1fba6e46b58c01253474b02f0143013b4d7b232046de617ca50b,2024-08-27T16:08:45.020000
|
||||
CVE-2024-44933,0,0,4b8d6d8796496a10942df74ea36b0343a95a4c8e561f02a6a6cf79113627fbd2,2024-08-27T16:08:38.973000
|
||||
@ -258746,7 +258746,7 @@ CVE-2024-44940,0,0,6d3559648bdfa621b46434f9855de2178fa1de08defe3fd31c71176641a2c
|
||||
CVE-2024-44941,0,0,15a1c7001949731e4df03f4a864ae7a9e64adc22c4c644da2de0836d77651385,2024-08-26T12:47:20.187000
|
||||
CVE-2024-44942,0,0,17b37362bd3ba24b1a5ce481b72105519e3d684fbcb26bdd0327529225c432f3,2024-08-27T16:09:10.010000
|
||||
CVE-2024-44943,0,0,5bf597bf2fa044f6eb0ba2afa66eeb4ae405658ddc3b2a597c7fedca3c5f2035,2024-08-28T12:57:17.117000
|
||||
CVE-2024-44944,0,1,2311e8e140052a8ffceda234565ab592ce1eef31ad86de13e1707e1e1dd9a467,2024-08-30T13:00:05.390000
|
||||
CVE-2024-44944,0,0,2311e8e140052a8ffceda234565ab592ce1eef31ad86de13e1707e1e1dd9a467,2024-08-30T13:00:05.390000
|
||||
CVE-2024-4495,0,0,cb1d8bc801c43f7ab8180176a646c9e39a56603c1305eac804522af3adac0fa8,2024-05-17T02:40:25.167000
|
||||
CVE-2024-4496,0,0,6e858d3d5b48b877aff577f900a80fd10c799bd74cdf4188d346fa0d13641a80,2024-06-04T19:20:39.340000
|
||||
CVE-2024-4497,0,0,6a1d6365c146727895628930cc6e441179a183396cbc0224f0d3e640240772d3,2024-06-04T19:20:39.437000
|
||||
@ -258761,13 +258761,13 @@ CVE-2024-45037,0,0,0a75dee24a9a0746d4b594073f73eebe38a0d6b0ee92331f507c53bf54c31
|
||||
CVE-2024-45038,0,0,9bc86932f350806c3a4bfe09c65e8bf9ee10a426832d16050cb88cd3f58d1bd8,2024-08-28T12:57:39.090000
|
||||
CVE-2024-4504,0,0,db7504bed7bbf326ed6569d421c20101dbf56fa9ab20eccbe7468f7c026f345b,2024-06-04T19:20:39.947000
|
||||
CVE-2024-45043,0,0,813b7117a1d59d56cbce89ce53b65dfc1ca707523a63233a1be8257ae8cc6c73,2024-08-29T13:25:27.537000
|
||||
CVE-2024-45045,0,1,a2c6a8d3ca359aad7e3c010bad910cf2259709611515d3a05c1006324ee49723,2024-08-30T13:00:05.390000
|
||||
CVE-2024-45045,0,0,a2c6a8d3ca359aad7e3c010bad910cf2259709611515d3a05c1006324ee49723,2024-08-30T13:00:05.390000
|
||||
CVE-2024-45046,0,0,4d7016da74eaf67c450dc439af799ed2952384706074b1964aaa74d9bd45c737,2024-08-29T13:25:27.537000
|
||||
CVE-2024-45048,0,0,f84a03b52c4e4737f004ef4638c6c48a715aa1051c897955680d1101538ffe4e,2024-08-29T13:25:27.537000
|
||||
CVE-2024-45049,0,0,2db7654aac013903b19c74b15111e80acc65bf9e641d52dffa75f446b2d1ef2f,2024-08-28T12:57:39.090000
|
||||
CVE-2024-4505,0,0,4ef7357f00ff85be3b87c4353ae099f1aed84eaee3f1c1bda33ed5ec6e115293,2024-06-04T19:20:40.050000
|
||||
CVE-2024-45054,0,0,b9a631b4140dc3b625193d3b302c7a5fbf5e7defa5c6f149bad3cc57b44dfb5d,2024-08-29T13:25:27.537000
|
||||
CVE-2024-45056,0,1,29d6558d4fdadb0b4630bd61dae664f7deade4df9a7d85fb49ad8563bd328e6c,2024-08-30T13:00:05.390000
|
||||
CVE-2024-45056,0,0,29d6558d4fdadb0b4630bd61dae664f7deade4df9a7d85fb49ad8563bd328e6c,2024-08-30T13:00:05.390000
|
||||
CVE-2024-45057,0,0,9d8b06345321949fa48379fc2183ae1808eec74c9e7dce5df7d16d85f9e3fc50,2024-08-29T13:25:27.537000
|
||||
CVE-2024-45058,0,0,7787e6673db22abfd684889eec25f0d15a1228d1d6048ef359937e89120200d3,2024-08-29T13:25:27.537000
|
||||
CVE-2024-45059,0,0,1db4a990b2e27521ef605a35909b28cc3d1be1d4c9ec2ad338f6d6fa0c866be3,2024-08-29T13:25:27.537000
|
||||
@ -258819,13 +258819,13 @@ CVE-2024-4525,0,0,dfe2a87106534aea559d2a64c000518f6d0b8952ad5d7b752f8fc10ec2414d
|
||||
CVE-2024-45256,0,0,4a4b83adefef92d16e6e4183f85729c0b386c1024d8d0fd2baaf64a1cf5545c2,2024-08-26T13:35:02.937000
|
||||
CVE-2024-45258,0,0,20ee97d2eb3a83f8d2a7be46b53936d32dfd424c455ff5dc5358a331a56dedc1,2024-08-26T14:35:08.627000
|
||||
CVE-2024-4526,0,0,87a45e4eb41404ceb4b9ba3ca9513f18cac2687a381a0d6211a80485bbac625a,2024-06-04T19:20:41.720000
|
||||
CVE-2024-45264,0,0,bd0d2a78e6450ea9b4acfe4451f605c0cc149ce794d1dfe127d00787aadcafbc,2024-08-27T18:33:14.247000
|
||||
CVE-2024-45264,0,1,822145f9a1da648532bc7a1b41e14edccb94fd2d8996f04c204c8fc97c8f117a,2024-08-30T15:02:34.610000
|
||||
CVE-2024-45265,0,0,32b1057978cea9d5f5845b9f4e3926bb7432d8755213d6bbe9f6e3c948032919,2024-08-27T14:35:12.220000
|
||||
CVE-2024-4527,0,0,c7ad79186f39af6c4287cf90f197f2ec298291b738fc5af7e4ddede8b4e9adfb,2024-06-04T19:20:41.810000
|
||||
CVE-2024-4528,0,0,7b720d00d965c73e07e6aefd4c36ac932b079840a05c5efc530ca8c4800fb595,2024-06-04T19:20:41.917000
|
||||
CVE-2024-4529,0,0,5fbb4c14219ef7d51954458b7780a68dbee769876e9489db6e9ba34bd68834fa,2024-07-03T02:07:42.220000
|
||||
CVE-2024-4530,0,0,6b78f15ba2a60e96a20ff176cd49d228ee37f0e30a4b3e696092a717f8a23e27,2024-05-28T12:39:28.377000
|
||||
CVE-2024-45302,0,1,81d543b8058ec9a64648a785b7fa014c697fce5846d6cc78b75fe051c3ed2104,2024-08-30T13:00:05.390000
|
||||
CVE-2024-45302,0,0,81d543b8058ec9a64648a785b7fa014c697fce5846d6cc78b75fe051c3ed2104,2024-08-30T13:00:05.390000
|
||||
CVE-2024-4531,0,0,5dc1dd0922f3418ce95c33a9fc334c76453bfc98ac8636a0eebb27c9c952bb3f,2024-07-03T02:07:42.610000
|
||||
CVE-2024-4532,0,0,4fd2f02f0358f1c611846b77f1b0e80bcb1985e07f23fa6a21a71cc25593500a,2024-05-28T12:39:28.377000
|
||||
CVE-2024-45321,0,0,37b6c3801843cd19376dfc008024087eb46b0d9a726e5ad21af320498cf91f40,2024-08-27T14:35:13.357000
|
||||
@ -258849,11 +258849,11 @@ CVE-2024-4545,0,0,864a22773c6eaa7a20fdb4cf4c4b7a2709a2c8e64cfe98132d05364d67e97a
|
||||
CVE-2024-4546,0,0,da973c82a9042d639d29e7a0c2ffb48d440dea200e6df21027887041c43a68db,2024-05-16T13:03:05.353000
|
||||
CVE-2024-4547,0,0,e03413ba2a3d643e986abd6a70d4989a4412faae98e55cc280c4859673ba647d,2024-05-06T16:00:59.253000
|
||||
CVE-2024-4548,0,0,c312b0154ade9cb7e93b29cf6468875ea09abcdae811bc20c1f6b28cb1f08ef2,2024-05-06T16:00:59.253000
|
||||
CVE-2024-45488,0,1,a51189d35a08d4e93065317ae409e3cc6b796679c34f65f5440d918b8fe0bb24,2024-08-30T13:00:05.390000
|
||||
CVE-2024-45488,0,0,a51189d35a08d4e93065317ae409e3cc6b796679c34f65f5440d918b8fe0bb24,2024-08-30T13:00:05.390000
|
||||
CVE-2024-4549,0,0,e09f9cdaebb6118867e13a9d3ab643eb98c9f9e356cd137ad04d5c4afde15796,2024-07-03T02:07:44.057000
|
||||
CVE-2024-45490,0,1,6e2855e694873f311778105c33853c5a1aaaaf3146958c0e6ada3573a0d2b524,2024-08-30T13:00:05.390000
|
||||
CVE-2024-45491,0,1,72f0ae7fbefaa80c510a9c0bad5115bac93f07dffa4c154e6414b6d0a1a93d8c,2024-08-30T13:00:05.390000
|
||||
CVE-2024-45492,0,1,c9a43695a436226363bf3c380d3acaabcaa5504437df55357c6e5188876fe8a5,2024-08-30T13:00:05.390000
|
||||
CVE-2024-45490,0,0,6e2855e694873f311778105c33853c5a1aaaaf3146958c0e6ada3573a0d2b524,2024-08-30T13:00:05.390000
|
||||
CVE-2024-45491,0,1,d50817a58309934ce1e6c9f069c18968451a3af67ad0b3f9c4ed58ff8571c85d,2024-08-30T14:35:09.057000
|
||||
CVE-2024-45492,0,1,cab4c5ca84baf34dea16b84281c2356a238ac9571c230c2d937a4646809be15a,2024-08-30T14:35:09.790000
|
||||
CVE-2024-4551,0,0,5eadeaa2a7f21f0b3297f45277617c137a52e984170b931f9145e745d378c040,2024-06-17T12:42:04.623000
|
||||
CVE-2024-4552,0,0,a910e848f992d4848b5a9057809234cfe8833a167abb01396097dc34db4ca3d3,2024-06-04T16:57:41.053000
|
||||
CVE-2024-4553,0,0,a1e8f5bd1acd4a97b93bbbe85c146f94099965137fad1ebd49acd106c4b8e00a,2024-05-21T12:37:59.687000
|
||||
@ -259269,7 +259269,7 @@ CVE-2024-5019,0,0,208ddc99e1f67b7d6822e7ee095131f1b9c059678d4d2eeb2b2f9eae704845
|
||||
CVE-2024-5021,0,0,38505cbaa011793e28d7950a2ea2daf96aac6ed3db846bcaf517334c4dc7fa50,2024-06-20T12:44:01.637000
|
||||
CVE-2024-5022,0,0,0ed043d616e9fb9347e4abec6b2a3f19c9cd15ea7715d52174611d64d6e50bde,2024-05-20T13:00:34.807000
|
||||
CVE-2024-5023,0,0,63ebd4218020d01998ceddb622d35154b9496df68f9db12eb6b4711fe09e7d24,2024-05-17T18:36:31.297000
|
||||
CVE-2024-5024,0,1,ae4133b2dede2e4674bb925706d556d1f2e66905e29e2d3db9a09c8acda5e292,2024-08-30T13:00:05.390000
|
||||
CVE-2024-5024,0,0,ae4133b2dede2e4674bb925706d556d1f2e66905e29e2d3db9a09c8acda5e292,2024-08-30T13:00:05.390000
|
||||
CVE-2024-5025,0,0,5975a4de967bb092ff1a32c8663c734972c139617eb709a92a7c0cc78b284359,2024-05-22T12:46:53.887000
|
||||
CVE-2024-5028,0,0,6e4747168a055d3478d0389157f1378a0e5efd7245fc9814fa65e0cf7f805db7,2024-08-01T13:59:38.360000
|
||||
CVE-2024-5031,0,0,5b0fce1eabb88a37a871d927606cb4ca5166c3808ddca60f777848c692bab12e,2024-05-22T12:46:53.887000
|
||||
@ -259296,11 +259296,11 @@ CVE-2024-5051,0,0,f233f4614a9daf0499b6db53ac9877312730fd59d85cfffcfb1c75738230a7
|
||||
CVE-2024-5052,0,0,1db4612270fc4085b1cc808dfe93eaa2dc99045707c3296716068fcb2c40c936,2024-05-17T18:35:35.070000
|
||||
CVE-2024-5055,0,0,346404cc585681a2fe5319ad3cd387f2171e7718710adaf135152ad352635ebd,2024-05-17T18:35:35.070000
|
||||
CVE-2024-5056,0,0,b09a6a74de5b053675f9afc4f104e067ee8a59f791091ecbf85080c4327f1e74,2024-08-23T16:04:14.643000
|
||||
CVE-2024-5057,0,1,c0d10c4c25e360562127c2fe43924c46cc30a5bcbfa180d7e1005fe098c65edd,2024-08-30T13:00:05.390000
|
||||
CVE-2024-5057,0,0,c0d10c4c25e360562127c2fe43924c46cc30a5bcbfa180d7e1005fe098c65edd,2024-08-30T13:00:05.390000
|
||||
CVE-2024-5058,0,0,d66647bea5b47dc02b284e54d31404fc6795bd8a11a408fc146959769533c076,2024-06-24T19:18:35.517000
|
||||
CVE-2024-5059,0,0,b0901ef33b8b4d50fbd07542bb49b954ef3e45e5d8bea77c76cb9c3c21bd9422,2024-06-24T18:49:29.467000
|
||||
CVE-2024-5060,0,0,70a4b23a22f78db2884c1ce0fa906b767ee25d155e7de23427bff751940319e4,2024-05-24T13:03:05.093000
|
||||
CVE-2024-5061,0,1,e821117df274a77dab65a79df8ed485d6164b12336d55ddd51a3c0271e21ce3c,2024-08-30T13:00:05.390000
|
||||
CVE-2024-5061,0,0,e821117df274a77dab65a79df8ed485d6164b12336d55ddd51a3c0271e21ce3c,2024-08-30T13:00:05.390000
|
||||
CVE-2024-5062,0,0,1dce1f93ce1b9242e76ae9cf090eb76ee6afadb656622c6eb5a578a5eb76013f,2024-08-20T14:14:35.717000
|
||||
CVE-2024-5063,0,0,3ea00cb3f53084b2393e5a818811e5957f116b348338ce87a59f64292b187a9f,2024-06-04T19:20:57.760000
|
||||
CVE-2024-5064,0,0,d857d2e0ee5316e135c4045ce3a7ab1579933a9b029d66480995681ffcc21c71,2024-06-04T19:20:57.870000
|
||||
@ -259670,7 +259670,7 @@ CVE-2024-5465,0,0,c54306dfcc71e50bcd77c603fadee0b02af76d4cc30340f017524a72c7deac
|
||||
CVE-2024-5466,0,0,7210eb30821301ab6ac0b6aaa79a17e39c84346dbb1ec0b37d3f9aca66c7a349,2024-08-27T13:32:50.803000
|
||||
CVE-2024-5467,0,0,d5f2177f9d3ea444dfbcd8018e7c02f38607b067be38c512aaf8da3b2751677c,2024-08-27T14:35:48.977000
|
||||
CVE-2024-5468,0,0,a9b6881473aab66cd93b6151044b19528c011d8001f0e2556b425e826958e7fb,2024-06-13T18:36:09.010000
|
||||
CVE-2024-5469,0,0,379bb9230b13b3cc6c5badc54ed7dbfea438613371475736e27add03b9354c6d,2024-08-16T19:59:15.573000
|
||||
CVE-2024-5469,0,1,2b1f02bc4b651b767de9138333ca1493d00343771be32540c7c4d36f10b2a10e,2024-08-30T14:15:16.703000
|
||||
CVE-2024-5470,0,0,6ad8fffdbc9fc3c2ca94bc381d3be223e310676e26148212c497e243b6c17473,2024-07-12T16:52:52.883000
|
||||
CVE-2024-5471,0,0,b5058f52e9634b68f4d4000cb97858db03cd2fac3d75cd140cb047a19da1c69c,2024-07-18T14:09:17.740000
|
||||
CVE-2024-5472,0,0,cbeafb08776655e35d6e47fe8a75d08cb39135639adca55be0cfb4cff69e0ec6,2024-08-01T13:59:47.140000
|
||||
@ -259818,7 +259818,7 @@ CVE-2024-5646,0,0,54dff546debf316c7620aa15614b89fe6dc050f45cfaa67554d377c50ceda1
|
||||
CVE-2024-5648,0,0,015c05f38e8cff192a455edd246e167c4bc53044f1d944054e7ecfcb7dfdfccb,2024-07-09T18:19:14.047000
|
||||
CVE-2024-5649,0,0,34e3eeab6e168b1c5f2adbcb96ea45c2ac0ef86ad5d890f401ea3f073a254f2e,2024-08-16T20:35:08.120000
|
||||
CVE-2024-5650,0,0,c39b4a582c551c0a2a7178518ad417e8ac9a87e5b86c36cc6d93d2e99ad988c5,2024-06-17T12:42:04.623000
|
||||
CVE-2024-5651,0,0,abb73abfb565ad81900f991c25e56f02b075b931b9b9396bb041a089c7f5e14d,2024-08-19T17:15:10.320000
|
||||
CVE-2024-5651,0,1,6054d1145665813088d11bcbaf4142da6b639bd5a41aba674876b0270b505add,2024-08-30T14:15:16.820000
|
||||
CVE-2024-5652,0,0,7e423119960d286a82f2194dff7590cb101783621bba898f5af7050faa75102a,2024-07-12T17:14:32.033000
|
||||
CVE-2024-5653,0,0,b1d5d7ca6c03c0860bfa9c89a981cb1e40654b9c0dd686ee52416437c8a7183f,2024-07-25T12:45:19.830000
|
||||
CVE-2024-5654,0,0,be6d98376b5bde79348830f6677e04bc437e5abfb9a06a2bd0a591f9c8d1c938,2024-06-10T02:52:08.267000
|
||||
@ -259927,7 +259927,7 @@ CVE-2024-5780,0,0,8f257920278f73ebde8da2f9da9c11fb9d019685aae47ae6d2026dc0531949
|
||||
CVE-2024-5781,0,0,69395241527fa89308022b467956bfc8d570e92d8c337ad970260c71cef498ec,2024-06-12T08:15:51.363000
|
||||
CVE-2024-5782,0,0,3007fa9c37260ea7caeb87e42b238e099fb02a0dcdaea4137ab796f4ff5698b0,2024-06-12T08:15:51.423000
|
||||
CVE-2024-5783,0,0,457a67b18c53addb8fb271e75294a5e3a7e25c57923089dcfbdfc7dbab590f38,2024-06-12T08:15:51.480000
|
||||
CVE-2024-5784,0,1,dffe9698df8abba1bdbc9cdda15a3c8e938bf7941a418afa20ee99319d4592a1,2024-08-30T13:00:05.390000
|
||||
CVE-2024-5784,0,0,dffe9698df8abba1bdbc9cdda15a3c8e938bf7941a418afa20ee99319d4592a1,2024-08-30T13:00:05.390000
|
||||
CVE-2024-5785,0,0,dc6d45b7d431fa01cffad050f9b1ed8783982500c2abb201fde782838f7bdc88,2024-06-10T18:06:22.600000
|
||||
CVE-2024-5786,0,0,1233e460fa7cda61e9d3e93297506b964839931070503c5991d84e0c8efc6254,2024-06-10T18:06:22.600000
|
||||
CVE-2024-5787,0,0,7676e1b0ab184e8654efc91f56a8d84cd9d6d539bf642c0a4ff7f743a62b9daf,2024-07-02T14:41:54.887000
|
||||
@ -260004,7 +260004,7 @@ CVE-2024-5866,0,0,dcb091b491607b6fa4e644115dbd76fe9fe06b2f0bf1b83685c3a237070dac
|
||||
CVE-2024-5868,0,0,9a8536b47a27c25b7062405f8aad2263147d3121835e9d2d4eb9b37e61c344ed,2024-06-17T12:42:04.623000
|
||||
CVE-2024-5871,0,0,bfc23a1063e8c2c3d98988ddd8df8ea7002d8802bf04bd4c0c941cb9250f6a3f,2024-06-17T12:42:04.623000
|
||||
CVE-2024-5873,0,0,5735eb2853c46a5b255fc10b814ec1b6c4f29d136a3521fa8f4d7be256150249,2024-06-12T08:15:51.550000
|
||||
CVE-2024-5879,0,1,7a137847d68cd570b8cf8f294135f15e17807d0751740bcbd83fe2085467dfb9,2024-08-30T13:00:05.390000
|
||||
CVE-2024-5879,0,0,7a137847d68cd570b8cf8f294135f15e17807d0751740bcbd83fe2085467dfb9,2024-08-30T13:00:05.390000
|
||||
CVE-2024-5880,0,0,ba1ed54b40d42e877081166356a11c64c8cd8d08513a1ac6c742fc002810239c,2024-08-21T12:30:33.697000
|
||||
CVE-2024-5881,0,0,3ae006c5e782ce634c6c6fd24fda313894dca095797874331692050dc97499bf,2024-07-09T18:19:14.047000
|
||||
CVE-2024-5882,0,0,9790fb22da231882b81afb2259612f6848f747553cc5560caa274dd01996ad4d,2024-08-01T14:00:04.947000
|
||||
@ -260268,7 +260268,7 @@ CVE-2024-6206,0,0,6f603126f815a80c6debdb2c8fc884bf16912b4470febb5eed843e2704856d
|
||||
CVE-2024-6208,0,0,b702d385d6dc69624ae253d69a727703b76fa8f218fc0fa3e0a52d494810eb10,2024-08-01T12:42:36.933000
|
||||
CVE-2024-6209,0,0,dde817e69ddab612402867a39af366fc36713e43c4758f0a34432256fd885f93,2024-07-08T15:35:25.837000
|
||||
CVE-2024-6210,0,0,d08d160d43811c5bb8dcf64fef0c280a0a7b1e98d094babc485e09ce9fa86125,2024-07-11T13:05:54.930000
|
||||
CVE-2024-6212,0,1,34100fe8f5d25d02ced89b925f9fc5057176ae86a6f223c0ad2c25b7a8b4f213,2024-08-30T13:54:53.043000
|
||||
CVE-2024-6212,0,0,34100fe8f5d25d02ced89b925f9fc5057176ae86a6f223c0ad2c25b7a8b4f213,2024-08-30T13:54:53.043000
|
||||
CVE-2024-6213,0,0,b88bd076337ef2a1e33e32994c835aeb58f4bcee4d9f1f644c98407fae8b17dd,2024-08-23T02:14:56.413000
|
||||
CVE-2024-6214,0,0,a8e239af08d0ab1246993374aef8204661658830db0ca6fca456fce88752f617,2024-08-23T02:14:34.340000
|
||||
CVE-2024-6215,0,0,d01466c5e4679da2e3cdde9d249cad88f46489a58c2f36859f7f149e67c89660,2024-08-23T02:14:03.990000
|
||||
@ -260348,7 +260348,7 @@ CVE-2024-6303,0,0,6baba87ebef380da9b7b68ccb75fb7650d40ef7ddb3237802c8e0923b7cd88
|
||||
CVE-2024-6305,0,0,87f4eab923a348ce2da7e5df1ccd921242bd2eeb6bab5e4beeb71bb03d817e81,2024-06-25T17:15:11.020000
|
||||
CVE-2024-6306,0,0,9afef2f765ecf08b1d6c75a6e5cb3afa373820869b5e2eced2eb43fea970c328,2024-06-25T17:15:11.107000
|
||||
CVE-2024-6307,0,0,a6037df0fa8617c9aaeffdc703000fa7423e885d439338f30eb38eb0279e87b9,2024-06-28T13:15:03.453000
|
||||
CVE-2024-6308,0,1,cf3335932895cc5b7b30298253b1ad27ca784bca4cc44021e5d9d879a9556c6a,2024-08-30T13:54:49.400000
|
||||
CVE-2024-6308,0,0,cf3335932895cc5b7b30298253b1ad27ca784bca4cc44021e5d9d879a9556c6a,2024-08-30T13:54:49.400000
|
||||
CVE-2024-6309,0,0,81d9ed106c3d88c28590c6ed22c5b32147121a952907a1333c0b11de5b47c5b3,2024-07-09T18:19:14.047000
|
||||
CVE-2024-6310,0,0,c979f814f3e48b96dc9635b552e8c56621ee7c90068be27a9e484f3e9730aa89,2024-07-09T18:19:14.047000
|
||||
CVE-2024-6311,0,0,43ed4cd2e3b736026c6c6822a2a9a27bcf942d5fa1856d8c3b333f30284585f6,2024-08-28T12:57:17.117000
|
||||
@ -260363,7 +260363,7 @@ CVE-2024-6319,0,0,a7e6ba0611df1872f885f28b22290254a0a0617427fbf4cb3644f1333e4d6a
|
||||
CVE-2024-6320,0,0,283f9bb36ccc5b92b087cc9c4a1fe708efc80654f72e1f9e7ff8264ce58552c9,2024-07-09T18:19:14.047000
|
||||
CVE-2024-6321,0,0,23af826e4693bc2738f8ec7dcb0f933eeef79b645dd2f2305f1f94359ced507d,2024-07-09T18:19:14.047000
|
||||
CVE-2024-6322,0,0,8d7a1084476b1bbfe0beb3b2fb5fe7b67eda10da654967af54513f67a857c5e5,2024-08-21T12:30:33.697000
|
||||
CVE-2024-6323,0,0,16f93962f537d8478d96317e8b0d9cad0e3aee225ed0ebdb8d6f6bf214bb804e,2024-06-28T13:15:19.317000
|
||||
CVE-2024-6323,0,1,a8c029b32e829c43ccf3c11a8270c2ae0731a8026bd5838a4f5f1ead94546347,2024-08-30T14:15:16.947000
|
||||
CVE-2024-6325,0,0,3ea6578ebdd2a7633259d686c429ab9b3e7708f0e981d10184478f4442c00880,2024-07-16T18:00:02.110000
|
||||
CVE-2024-6326,0,0,e689387b2cb49e7365da7fd7c751e52e0ede20a7a6c6966f5f5b92a6b53089de,2024-07-16T18:00:02.110000
|
||||
CVE-2024-6327,0,0,2921f8f8780ecccf64e99daaa57d4495895350cac37fbdf3fcfbbaadf3869269,2024-07-26T13:03:00.473000
|
||||
@ -260559,7 +260559,7 @@ CVE-2024-6580,0,0,d43dfa58651574c4447e8f323f3cb1f6a00d6bdef0613d5834aefccecf968c
|
||||
CVE-2024-6588,0,0,67672e854c20766f2e15151fa1e111ec8310b7083a57f535c99159d2ce6e5af7,2024-07-12T12:49:07.030000
|
||||
CVE-2024-6589,0,0,786a762dda95a3db4c9cdc907a3a2b97d61313e4f2473ece396d13a201bdbeba,2024-08-26T16:21:36.530000
|
||||
CVE-2024-6591,0,0,ba434f770e77a561bd09877a3c29228f51c9818a995d0175b55ef4d80494af35,2024-07-29T14:12:08.783000
|
||||
CVE-2024-6595,0,0,97cf6a37af39b7f5832976478077fe225f57d63ffd9a5f39caf9eca8e3545339,2024-07-19T14:52:54.943000
|
||||
CVE-2024-6595,0,1,1592dd03cd1b2c459ee5de6a924fab7f4c8bad5124f72f8b639c71537346952d,2024-08-30T14:15:17.063000
|
||||
CVE-2024-6598,0,0,fb802128b1cfc176540749693b684b4374936099ab1c7948c1ec819266291908,2024-07-09T18:19:14.047000
|
||||
CVE-2024-6599,0,0,6a69a16a0a8781527f95db9310983c42c357e28a72f780fd79d80c9654364b86,2024-07-18T12:28:43.707000
|
||||
CVE-2024-6600,0,0,8a7bdd7b6969fa6cd69a1854f6f2130a9698184b9485e28b1c9cbb32470416d8,2024-07-16T18:15:08.737000
|
||||
@ -260588,8 +260588,8 @@ CVE-2024-6627,0,0,c1ab91b855386d03fb23ec47d7ea95469618609ded94a66bedffee95371608
|
||||
CVE-2024-6629,0,0,e7fb6a99ed3ad0ead40ca75ee8e19034c6248a18a082e5cb8e8eaa0368a38b0a,2024-08-14T19:26:41.113000
|
||||
CVE-2024-6630,0,0,7742b604143993a9d769b9ab9c3e5aab85337a51e6772bb186961af80d29fee2,2024-07-10T18:15:05.407000
|
||||
CVE-2024-6631,0,0,1e6b5531619b1da5a2d5ea58f6eb35ebd283fdf27dc23509e38939480091d853,2024-08-26T12:47:20.187000
|
||||
CVE-2024-6632,0,0,c8d6583fed11502272ee79a18d8cb2823c399fbf47ffdb9c5058b746056174d8,2024-08-27T15:52:01.317000
|
||||
CVE-2024-6633,0,0,232bda3653ec683349c8973239586e5047851cf81752c2edf78d3e9f92fdc078,2024-08-27T15:52:01.317000
|
||||
CVE-2024-6632,0,1,ada138b2fbfd07ba035d896141eaa720e349f3be9aa07f06088ed0728152f096,2024-08-30T14:07:18.443000
|
||||
CVE-2024-6633,0,1,afac48b93e561cf4f6db84286248ec51c5cf09c5c99b62a4cc541b38805f1970,2024-08-30T14:11:45.287000
|
||||
CVE-2024-6634,0,0,20e842ed204ff1f080594226c009c0585274acd37661b69fb1d6603728f53ffe,2024-07-29T14:12:08.783000
|
||||
CVE-2024-6635,0,0,97d6e55960f6f2e5010584395fc193a0feb186e4d795b57d89159c3132b84fff,2024-07-22T13:00:31.330000
|
||||
CVE-2024-6636,0,0,b927f4aba2100824a9064e3c9444e3f54a47671d743161ced3b5a100a38b49ab,2024-07-22T13:00:31.330000
|
||||
@ -260604,7 +260604,7 @@ CVE-2024-6645,0,0,7709f10426c0d613ccf6f32b2adb3ff90e0557b8221acd969c94e4ad9a6fd5
|
||||
CVE-2024-6646,0,0,a88f9e9daa434a5107be71c0c1db1a6acb029566ba77a9e2207d6608da22b1a0,2024-07-11T13:05:54.930000
|
||||
CVE-2024-6647,0,0,09a83ea8e48b51cdfaabb2b40d44883a6e2661cca1813e6ce1c2298d3fc73eb9,2024-08-01T22:15:46.930000
|
||||
CVE-2024-6649,0,0,5cdb5b2e28b9bfeb7fd4f19389db074d98b3a7e19ad14500f164241f41fa57a0,2024-07-11T13:05:54.930000
|
||||
CVE-2024-6650,0,1,06d380480b3184a2b1dceb59084b40d2dcd977ecfc30eac16df686ef247b8949,2024-08-30T12:53:58.763000
|
||||
CVE-2024-6650,0,0,06d380480b3184a2b1dceb59084b40d2dcd977ecfc30eac16df686ef247b8949,2024-08-30T12:53:58.763000
|
||||
CVE-2024-6651,0,0,ea873d27b7e6cf0926f77a6ff240509b7d4aeaa1088e1cf3aab190452e4555ee,2024-08-06T16:30:24.547000
|
||||
CVE-2024-6652,0,0,8978a0baa082505b94e778186034022d155714d2d8ee4e86dbb9cc40d29251d6,2024-08-08T16:43:37.053000
|
||||
CVE-2024-6653,0,0,d93d31cbf15b722e8213bd0a1f350049b73a325a73fea026c81bdae5013a3c4f,2024-07-11T13:15:10.147000
|
||||
@ -260615,9 +260615,9 @@ CVE-2024-6663,0,0,7facb2637e12709d4a455340194f194dba2537cb44d31c2262ed1aa6b9ebcf
|
||||
CVE-2024-6664,0,0,7dcdbd9efac1143da422ef778b0a605b2e75ff3874c65ca5b8e519e1d8523278,2024-07-10T21:15:11.520000
|
||||
CVE-2024-6666,0,0,6ade2353732c66fc20367582756530c33ec26bf7f6989700bd337bd969227f22,2024-07-12T16:46:48.387000
|
||||
CVE-2024-6669,0,0,87233746e73dcd3cc336669e330764691e93b16935dab43ac512a989f6e36eb0,2024-07-19T15:56:47.190000
|
||||
CVE-2024-6670,0,1,c7aab235f5523c8cca855eac0187db93fcb9a02d74ddfe109f0b8410dd670d5d,2024-08-30T13:00:05.390000
|
||||
CVE-2024-6671,0,1,b885ca7bc1aa2b73fde42f7ffc6bcebf037d1997b209727772d02de2abbeb61c,2024-08-30T13:00:05.390000
|
||||
CVE-2024-6672,0,1,ee4e0f300056a093eb851ed0e23fc509fcabd94f369802fd235ad4106a6f365f,2024-08-30T13:00:05.390000
|
||||
CVE-2024-6670,0,0,c7aab235f5523c8cca855eac0187db93fcb9a02d74ddfe109f0b8410dd670d5d,2024-08-30T13:00:05.390000
|
||||
CVE-2024-6671,0,0,b885ca7bc1aa2b73fde42f7ffc6bcebf037d1997b209727772d02de2abbeb61c,2024-08-30T13:00:05.390000
|
||||
CVE-2024-6672,0,0,ee4e0f300056a093eb851ed0e23fc509fcabd94f369802fd235ad4106a6f365f,2024-08-30T13:00:05.390000
|
||||
CVE-2024-6675,0,0,efdcf1bd038d8c9716519636ba8adbdaf757c6f9212f3c0c6f277c3b8045a346,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6676,0,0,b617e99f4ff839e117300b1a5f3c494dc1ceb13864a576e2b1519c7ec5960d34,2024-07-11T13:05:54.930000
|
||||
CVE-2024-6677,0,0,d8004a1441e952f05633a34727a4f9223ac5077c2123fd1507a1955287de18f3,2024-07-12T12:49:07.030000
|
||||
@ -260698,7 +260698,7 @@ CVE-2024-6779,0,0,fe5ad1222b3723da7c0ac78d266b4f175bcea5cc66ba78d4d443b970252070
|
||||
CVE-2024-6780,0,0,ad87716761d57bba157b9bc6302fd56c93db87ccc83552a263372092cb4e844e,2024-08-21T06:15:09.290000
|
||||
CVE-2024-6781,0,0,678fc4d6db3dccbbb40576923dc15e296dd0a3cca23bbb526dd93d0dbc8a0cec,2024-08-19T17:15:34.797000
|
||||
CVE-2024-6782,0,0,623508ea52e56d6a6e227168366ca2cd7770a1a0850e95e080f5f12fc915b728,2024-08-06T16:30:24.547000
|
||||
CVE-2024-6783,0,0,02ffa81303e2d0b2c8d5ada15cd1c5a0e17971825cf42319819acea737c80823,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6783,0,1,6f1f4a0fa578d50da4a4853fdfd24c63ba19a8604300ab142edf0f6cb8d9a812,2024-08-30T15:15:18.623000
|
||||
CVE-2024-6788,0,0,55fb0d510962e755b83a0ccc2efad4312001b246df777a622c08f48560e29a88,2024-08-13T17:11:53.553000
|
||||
CVE-2024-6789,0,0,231bd77c8db40b763ff18cdedd6d2a472872c681c24ea5a4e63b0563b010d2cc,2024-08-27T13:01:37.913000
|
||||
CVE-2024-6791,0,0,530a9e011d938f884a817484b487117900f43c2f83e7c51084019bfb404fc80f,2024-07-24T12:55:13.223000
|
||||
@ -260858,7 +260858,7 @@ CVE-2024-7066,0,0,8c5c53ac4131ac7de0832bfc6be834864b18719d408b4b18b0bbc9b024e03f
|
||||
CVE-2024-7067,0,0,edbddb223a917ac8e1a9e4a55d4a5029d93724357fc61dc50ee8384e13f8f4e7,2024-07-26T13:14:31.417000
|
||||
CVE-2024-7068,0,0,d3dd5dc06b13cea6ca5e0ca06538fc2c3e10b3dda31b16ef6e21ea77c7fa728b,2024-07-25T17:47:18.717000
|
||||
CVE-2024-7069,0,0,739e886131312a7d1c8ccd6a4f98d25c3687954f1471fb4fef37a66c2cb88966,2024-07-25T17:33:53.777000
|
||||
CVE-2024-7071,0,1,aa4d5566fa9986369b04898e3cb9a48a60e9dce9bca40572b84743b3df14ef33,2024-08-30T13:56:33.083000
|
||||
CVE-2024-7071,0,0,aa4d5566fa9986369b04898e3cb9a48a60e9dce9bca40572b84743b3df14ef33,2024-08-30T13:56:33.083000
|
||||
CVE-2024-7079,0,0,432b6c38d04c17da8e2aeea6e5677915e33a84f70f04ebe0988a953bc8892b6d,2024-07-26T10:15:02.840000
|
||||
CVE-2024-7080,0,0,e8f51ead66f7469f7e63dc63102236554262bdfa2e68b9dc33e11c14a1ca04d2,2024-07-26T13:22:43.387000
|
||||
CVE-2024-7081,0,0,6a139e489a9ff084a663269dd9c842c08d77e29c45f0c2d71d596839a517bb01,2024-07-26T13:18:21.957000
|
||||
@ -260883,7 +260883,7 @@ CVE-2024-7118,0,0,1f0a957064f55aa50018b5743e93b26ea81b9fa6087c0d5ec8ed17e492201a
|
||||
CVE-2024-7119,0,0,6b773d2ee0198b8c2555adc9c1a3fd196ed4373805abfd3c2f3d4a0da9be4440,2024-08-08T19:01:17.340000
|
||||
CVE-2024-7120,0,0,dd88c4d4f5099fe6bbb2fa59d0942931f85db230d235608307fdbb069312e6ec,2024-08-13T14:06:57.033000
|
||||
CVE-2024-7121,0,0,fdae6687b65374b6aec5500198958517002acfa86b757e82c1fe85c4c568e879,2024-08-08T17:15:19.820000
|
||||
CVE-2024-7122,0,1,762af90f45a0e3806716ebd187cca041ed4d366fa409e9d7ed7f8a662fad2d1a,2024-08-30T13:00:05.390000
|
||||
CVE-2024-7122,0,0,762af90f45a0e3806716ebd187cca041ed4d366fa409e9d7ed7f8a662fad2d1a,2024-08-30T13:00:05.390000
|
||||
CVE-2024-7123,0,0,9cd56c5d21be01850838f11a2df252558cd6c9b176bc2485ad2b1b549f072ade,2024-08-08T17:15:19.970000
|
||||
CVE-2024-7125,0,0,eeabb5486a5ad2f2094206d4f0142bb635fc7a57bcd2279354b026b1e44628c1,2024-08-27T13:01:37.913000
|
||||
CVE-2024-7127,0,0,2842be40cd41bba2687b1d2d238a3a521369bfe05553f868496bd1f3f7f4951f,2024-08-23T14:00:59.740000
|
||||
@ -261163,7 +261163,7 @@ CVE-2024-7519,0,0,d6b76960785055c5e3c2658ffad1f8ba4c01f9383c9459dab1efa4da327376
|
||||
CVE-2024-7520,0,0,f9e9090d09f3e3bdf7bb5b1e415fd5962f71ad30fc0e4e64eb0eb80aba152203,2024-08-12T16:04:46.790000
|
||||
CVE-2024-7521,0,0,93e518aa5fe4de4582901fabd10f56f08fc773ab920d9d06860ccc32d826d11d,2024-08-12T16:05:10.907000
|
||||
CVE-2024-7522,0,0,8cb3e499c594094550f4257bf1be1fb169aadf72b2b6dad6246a075ed4ee872d,2024-08-12T16:06:05.300000
|
||||
CVE-2024-7523,0,1,a0f308b16d5ebbedc56cd7091bbb85d180c4d81896244879e7fd734fc3c8496f,2024-08-30T12:59:29.710000
|
||||
CVE-2024-7523,0,0,a0f308b16d5ebbedc56cd7091bbb85d180c4d81896244879e7fd734fc3c8496f,2024-08-30T12:59:29.710000
|
||||
CVE-2024-7524,0,0,55b2959f46d5a03cc7e4bb47de03aeac574cf3416fb0ebbf64758ff53e5fdcb3,2024-08-29T17:35:34.820000
|
||||
CVE-2024-7525,0,0,0f44155e5b1b275dd77c786a7ef323cd6045a6d2a2adbf5e4f560db015c1f014,2024-08-12T16:07:19.537000
|
||||
CVE-2024-7526,0,0,718006135a6a1c568dedda22ff0d54a97e1bc5accec99de9b33ac5ed305a3aef,2024-08-12T16:07:50.743000
|
||||
@ -261223,8 +261223,8 @@ CVE-2024-7601,0,0,db9958425836572eda0b52c7e651aff0e41e4dc47ec55ea348bc5752e1b198
|
||||
CVE-2024-7602,0,0,1295ede0549ca488da522cbefe2db5abad88498e69c53af1f38f0ee81eb69b62,2024-08-23T16:36:11.690000
|
||||
CVE-2024-7603,0,0,026c301c8508bb2890d37936199245036e5a5160d5195c848eb9252477eef559,2024-08-23T16:36:28.327000
|
||||
CVE-2024-7604,0,0,2ca377c2d37b9340c6f7d1612379ed11f338df19f0e6ffae40ca1da8c016df51,2024-08-23T16:37:09.107000
|
||||
CVE-2024-7606,0,0,a274c3cb55abf1d09b9eed03004046b3bab57ca9c346c9c7f8eb3d1a43589575,2024-08-29T13:25:27.537000
|
||||
CVE-2024-7607,0,0,a22f9e92f7acda9358a9e1022b2325b742d117f4b1e701544a71613f7628ae8f,2024-08-29T13:25:27.537000
|
||||
CVE-2024-7606,0,1,d1994339c445d05a7d0516150729b84de3d1d7c8a4d08e8012b40ecbd6deed28,2024-08-30T15:43:41.773000
|
||||
CVE-2024-7607,0,1,1fc6dc2de47de502ba4dba054f1982731028b52bc9234ef0062aa94d686e06ad,2024-08-30T15:41:02.407000
|
||||
CVE-2024-7608,0,0,b8872988f702757177432eab77e95a14e7cc629ce3c064dd49371a09c8fc5a16,2024-08-28T12:15:06.900000
|
||||
CVE-2024-7610,0,0,b0ce86cdbef2b0081b727d87f884505d4aea23572226b0988a51de68f40b68a6,2024-08-29T15:45:27.523000
|
||||
CVE-2024-7613,0,0,595ae1d3f56b81eeb34ef1e184ddf7962f3a8fbfc042ff77a8fcf0bd3f10f263,2024-08-21T18:47:11.523000
|
||||
@ -261366,7 +261366,7 @@ CVE-2024-7853,0,0,90e064ba16388d2c255ea61f6d50069bab92e333b7116c2e5b296230c0d537
|
||||
CVE-2024-7854,0,0,c7d42abb2b322c04201a8af34648ccfdb0ede7da24776e4c0b3ca238a25bf3a0,2024-08-21T12:30:33.697000
|
||||
CVE-2024-7856,0,0,33feb207767ca0a7c11c844a262a4c47fe31800a079ccc95735f9fe6bb170e1c,2024-08-29T13:25:27.537000
|
||||
CVE-2024-7857,0,0,b74961afa7dd10dda782bf64e146bf5117eb37327cdce5dd6f430c037eea52b1,2024-08-29T13:25:27.537000
|
||||
CVE-2024-7858,0,1,f2d78178d05b26ae04f6e3a63066f14e6bfc844a6218f8cd47cd31de7eaa700c,2024-08-30T13:00:05.390000
|
||||
CVE-2024-7858,0,0,f2d78178d05b26ae04f6e3a63066f14e6bfc844a6218f8cd47cd31de7eaa700c,2024-08-30T13:00:05.390000
|
||||
CVE-2024-7866,0,0,4c0cb0c858c0ff2de3d3bc9c6187348080bb51d5934bb16167513e626d441be5,2024-08-20T19:23:02.780000
|
||||
CVE-2024-7867,0,0,cc4e8e2cbae6cc9c2393332b56b3dc1a7160836d4b3b7919e8d1234e73599a3b,2024-08-28T21:59:33.973000
|
||||
CVE-2024-7868,0,0,426aac72107d4f020c4b4c2ec1e49b6873953f44556989351b1605a1e98035d8,2024-08-19T13:00:23.117000
|
||||
@ -261450,7 +261450,7 @@ CVE-2024-8003,0,0,1eb6cc8bd16248d54ed281136e233da0a723cb74879af6e3337c9532a3caf8
|
||||
CVE-2024-8005,0,0,c059370cb975aea915e5671e32cb80d879151797480dbd5423b1593aeba96675,2024-08-21T15:49:59.470000
|
||||
CVE-2024-8007,0,0,52ca9c0e82e8a1b579386af92379a7290d3dc66a84196be21e42591213ed68f8,2024-08-23T17:06:04.643000
|
||||
CVE-2024-8011,0,0,b9eccdb873cdee0aa4aaf727a8d55e87a8f1a6dcd35fe88e6cae24de39ee4994,2024-08-26T12:47:20.187000
|
||||
CVE-2024-8016,0,1,e8fc7f9e515028b88b5c11cef0ac53bce768682cb6309710aba6fdc7e0b7b354,2024-08-30T13:00:05.390000
|
||||
CVE-2024-8016,0,0,e8fc7f9e515028b88b5c11cef0ac53bce768682cb6309710aba6fdc7e0b7b354,2024-08-30T13:00:05.390000
|
||||
CVE-2024-8022,0,0,469d074c70ed4d6e1b7ca7023005d3bb3e3f23419b5a39b3540fd69e34fadcaa,2024-08-21T12:30:33.697000
|
||||
CVE-2024-8023,0,0,7f1c10536d9d4e1a728f09b10c1ff35f77d0bba503a7c61c411fbfd5f6584d46,2024-08-21T12:30:33.697000
|
||||
CVE-2024-8030,0,0,b6f55198da4c8a890918e236b9cb91502d6b60f60aed340690526a7aff836eb3,2024-08-28T12:57:27.610000
|
||||
@ -261520,17 +261520,17 @@ CVE-2024-8171,0,0,799233d1b504a7fe9d2115d4edb9b50fc766ecc29c803bfb00827a455960ad
|
||||
CVE-2024-8172,0,0,0f560f815e4f982c5fa8dce4e33b1159bf9bccf943a059983fd049dd30da680a,2024-08-27T16:01:35.047000
|
||||
CVE-2024-8173,0,0,df3f4daf54afccb31b2d0dbd1ade86a4fd2b61ea5ed1b3d3f6de3c93aae29da5,2024-08-26T19:10:09.607000
|
||||
CVE-2024-8174,0,0,8543f0d8f92ea7727c4605df4b165224a3b6d137f11ee710b81d48c311ac7b21,2024-08-27T14:32:08.607000
|
||||
CVE-2024-8181,0,1,118bc11b2b4900ec5fff0bf86d3a0383942e5b4916d0cc73cb03ffe17b7de9f2,2024-08-30T13:53:29.953000
|
||||
CVE-2024-8182,0,1,9ca161eed16086dd999c3dcdddb12be07c44a0882f46a0d2167122ca829615b9,2024-08-30T13:53:52.197000
|
||||
CVE-2024-8181,0,0,118bc11b2b4900ec5fff0bf86d3a0383942e5b4916d0cc73cb03ffe17b7de9f2,2024-08-30T13:53:29.953000
|
||||
CVE-2024-8182,0,0,9ca161eed16086dd999c3dcdddb12be07c44a0882f46a0d2167122ca829615b9,2024-08-30T13:53:52.197000
|
||||
CVE-2024-8188,0,0,bf948f939efb55d2700c81c8fb5cefa3fc31038462bfeb7ac3e161719faca6b2,2024-08-26T20:15:08.760000
|
||||
CVE-2024-8193,0,0,2c8c03272040bf0762fd51db16903037338eed1eca91c96340cd3a3792988d33,2024-08-29T20:37:09.290000
|
||||
CVE-2024-8193,0,1,2f2a75e240e354e8f0e14f5f9d5e6a02eb535e669399224b9d10e7e4f72f0d51,2024-08-30T15:52:33.747000
|
||||
CVE-2024-8194,0,0,ac19fba88b406af144043fab3f5eab659bb55ee6761ad0917efa47742f410e15,2024-08-29T20:37:10.630000
|
||||
CVE-2024-8195,0,0,690850dad9e9debe83e3b31934e05f3d048da18a5a72ab008b4259527f1aad61,2024-08-28T14:31:24.487000
|
||||
CVE-2024-8197,0,0,60c1dd5a1a3c5aad3ac938fab8c46d1fa7e711c4df3249376b3e24407eb9fe54,2024-08-27T13:01:37.913000
|
||||
CVE-2024-8198,0,0,66da6b1d11b428319f14e579089d97ac9740a6652813e0469d038fd8f3fdb09f,2024-08-29T20:37:11.403000
|
||||
CVE-2024-8199,0,0,e4e155faf7982af494f6088e1ddff038dcc1d62a5700003ee5b4a40cfdce83b8,2024-08-27T18:33:14.247000
|
||||
CVE-2024-8200,0,0,d43bb5c61e83498550affa212dfef3001c48e0b48cb46337b88a2d4649830cd9,2024-08-27T18:33:14.247000
|
||||
CVE-2024-8207,0,1,8c9895649b6f3ddbe54a742e7758748700be0de26d40f4212a560e46ba28d1e1,2024-08-30T13:07:46.613000
|
||||
CVE-2024-8198,0,1,ae88aaa83fc11075d32a275c58ebf5badbfadaf84787111050f38bf28c955c58,2024-08-30T15:52:02.687000
|
||||
CVE-2024-8199,0,1,7b5202bc541243d8e740bbcd5073b5b7be00bce7ffd00083423898ed42012b72,2024-08-30T15:04:28.803000
|
||||
CVE-2024-8200,0,1,94c62dce4d246efe9142b24670f17ae1bfd93e135c6c83ca7322f2e39d21a126,2024-08-30T15:08:24.643000
|
||||
CVE-2024-8207,0,0,8c9895649b6f3ddbe54a742e7758748700be0de26d40f4212a560e46ba28d1e1,2024-08-30T13:07:46.613000
|
||||
CVE-2024-8208,0,0,3f393cbce0f1d113de710d532681141cada8ef6f9dabc882bcef6792a38ba6dd,2024-08-29T17:27:02.397000
|
||||
CVE-2024-8209,0,0,011c93b978693cad1f1840a0255528b9ea24513efb93d121a5e919ef5bade0bf,2024-08-29T17:23:42.873000
|
||||
CVE-2024-8210,0,0,ac28e7311389cbf5c8425b33e7b199665a7b3d5ab76ba6a58fa3d14c45f9ee55,2024-08-29T16:04:45.310000
|
||||
@ -261554,27 +261554,33 @@ CVE-2024-8228,0,0,93a2ed289eaee58adcb93cda42520d2efec521ebb9601fd9e70d3a991a36c9
|
||||
CVE-2024-8229,0,0,b4e82f248689c551a8c2d56510132af8816aa6c16d8f7b5aa18c38850899c5a7,2024-08-29T00:10:09.807000
|
||||
CVE-2024-8230,0,0,51972d3a01eef60d4ec2fcebcc43d9f517d40a0a396b61ca7c24bdef0d5fcb4e,2024-08-29T00:08:24.643000
|
||||
CVE-2024-8231,0,0,19b769716e3fff898a72bf0ee7d68779b61ab99af63bed31a0498759613ebd4e,2024-08-28T12:57:27.610000
|
||||
CVE-2024-8234,0,1,870a131a53db84d6497bde7de38de6b7411ad7686be0738cd78fff93fab14909,2024-08-30T13:00:05.390000
|
||||
CVE-2024-8234,0,0,870a131a53db84d6497bde7de38de6b7411ad7686be0738cd78fff93fab14909,2024-08-30T13:00:05.390000
|
||||
CVE-2024-8250,0,0,74fb86f8fe2035c18dd497ff04e870378212b13108551159d2a1c3008bad35b8,2024-08-29T13:25:27.537000
|
||||
CVE-2024-8252,0,1,f4e1dbfa0b6d48720eeed9955e08877eeab027a9e95da449606e54f658411a7b,2024-08-30T13:00:05.390000
|
||||
CVE-2024-8255,0,1,6c498c108684434305256b803e17a8c75dfbb80191f87c9993edaaba373ae570,2024-08-30T13:00:05.390000
|
||||
CVE-2024-8260,1,1,f101d670db69158c5137b9cf48a8e7cb0ec0fce3493e5bb1cee914b2ce3bf746,2024-08-30T13:15:12.347000
|
||||
CVE-2024-8274,0,1,2e72bc43a203eeb2ca1fcfae541f54785b8e5b3521a9432105d2a793d09a50c0,2024-08-30T13:00:05.390000
|
||||
CVE-2024-8294,0,0,4dbc4ed3db14d85852b6f7a6aa39a58fb9813e3a468ce2496730622a4e7e8e20,2024-08-29T13:25:27.537000
|
||||
CVE-2024-8295,0,0,f8b1eacce92adcda34eadca7b6a5f9b0537bcb1008b6d197cf25cbc03f38d464,2024-08-29T13:25:27.537000
|
||||
CVE-2024-8296,0,0,66346d5f20138091aa1a5c7abd768c7cc1b063d98b4b8f55461cfa2a34a9e06b,2024-08-29T13:25:27.537000
|
||||
CVE-2024-8297,0,0,be3630f7076c181ff3a7dd53d449891a972e9958d66bbbdeb816e8e8d932d822,2024-08-29T13:25:27.537000
|
||||
CVE-2024-8301,0,0,a320b86a1c6d3602618f46f60fc09d8dff020322bb7a7b0e43fc9a496aef7f93,2024-08-29T13:25:27.537000
|
||||
CVE-2024-8302,0,1,bda50b555854cd31882c0ef2167f779bd3ff1746a67f4e225a03fe8a32f42f3f,2024-08-30T13:00:05.390000
|
||||
CVE-2024-8303,0,1,7d291660edacb98ef58ef33c4f7785c68c1ad74e546b2f9d99bc765dad9ef6ed,2024-08-30T13:00:05.390000
|
||||
CVE-2024-8304,0,1,02fe3479f6e17fb07e472eabe123127bcfa4991aa0aa38b065a739eef0a9393c,2024-08-30T13:00:05.390000
|
||||
CVE-2024-8319,0,1,17168a5a136d846656fb5205b1bc05d8c120468c8d1daabe6f480cadd82445f0,2024-08-30T13:00:05.390000
|
||||
CVE-2024-8327,0,1,90ce1c0d5f2bf16169e6685e1181bb32bc7482e79f281a32577436dff63843d4,2024-08-30T13:00:05.390000
|
||||
CVE-2024-8328,0,1,5f490374d5b11796dfce2078f9042be0941b35283306bedbe7ef168cf9839d70,2024-08-30T13:00:05.390000
|
||||
CVE-2024-8329,0,1,7ba7a0e6a1a272c4c31ea51643a4fe86d206714a3976a3e4e0fe1f38b2e9c68f,2024-08-30T13:00:05.390000
|
||||
CVE-2024-8330,0,1,782e580a39ccfd83684b4457f3125a705ab0e04b1e538fee1c67877e5bf8efaf,2024-08-30T13:00:05.390000
|
||||
CVE-2024-8331,0,1,343124d7b1806dffa96e90fffc1d8372d0b74589151a57c1b2882deb4a0d4fe5,2024-08-30T13:00:05.390000
|
||||
CVE-2024-8332,1,1,fd3412423441f0861e5abc670422141a85b6dd6226a10ba7ddbbe277f10d6048,2024-08-30T13:00:05.390000
|
||||
CVE-2024-8252,0,0,f4e1dbfa0b6d48720eeed9955e08877eeab027a9e95da449606e54f658411a7b,2024-08-30T13:00:05.390000
|
||||
CVE-2024-8255,0,0,6c498c108684434305256b803e17a8c75dfbb80191f87c9993edaaba373ae570,2024-08-30T13:00:05.390000
|
||||
CVE-2024-8260,0,0,f101d670db69158c5137b9cf48a8e7cb0ec0fce3493e5bb1cee914b2ce3bf746,2024-08-30T13:15:12.347000
|
||||
CVE-2024-8274,0,0,2e72bc43a203eeb2ca1fcfae541f54785b8e5b3521a9432105d2a793d09a50c0,2024-08-30T13:00:05.390000
|
||||
CVE-2024-8294,0,1,76cafe7a1838d9cd0244706a299f12cd4ba69ef653952654db2fa070ca07bd0d,2024-08-30T15:38:13.437000
|
||||
CVE-2024-8295,0,1,907331a3a97a6618443e3aff92f4e758c3135b25ca0d9fb01d74d067e9cd6716,2024-08-30T15:37:41.510000
|
||||
CVE-2024-8296,0,1,e31c225486c181d770097ee2f86386b9a5d776a033c8c4a5860d3ba550c9de51,2024-08-30T15:36:36.383000
|
||||
CVE-2024-8297,0,1,cc2df51be4ac5261775d9a448c17018496059825966f6585d5dfd052f6e898fe,2024-08-30T15:28:50.863000
|
||||
CVE-2024-8301,0,1,517ca402c22af2219c7d5e72c26f25471bc06be609f1fc004544a29726452fb8,2024-08-30T15:24:09.830000
|
||||
CVE-2024-8302,0,0,bda50b555854cd31882c0ef2167f779bd3ff1746a67f4e225a03fe8a32f42f3f,2024-08-30T13:00:05.390000
|
||||
CVE-2024-8303,0,0,7d291660edacb98ef58ef33c4f7785c68c1ad74e546b2f9d99bc765dad9ef6ed,2024-08-30T13:00:05.390000
|
||||
CVE-2024-8304,0,0,02fe3479f6e17fb07e472eabe123127bcfa4991aa0aa38b065a739eef0a9393c,2024-08-30T13:00:05.390000
|
||||
CVE-2024-8319,0,0,17168a5a136d846656fb5205b1bc05d8c120468c8d1daabe6f480cadd82445f0,2024-08-30T13:00:05.390000
|
||||
CVE-2024-8327,0,0,90ce1c0d5f2bf16169e6685e1181bb32bc7482e79f281a32577436dff63843d4,2024-08-30T13:00:05.390000
|
||||
CVE-2024-8328,0,0,5f490374d5b11796dfce2078f9042be0941b35283306bedbe7ef168cf9839d70,2024-08-30T13:00:05.390000
|
||||
CVE-2024-8329,0,0,7ba7a0e6a1a272c4c31ea51643a4fe86d206714a3976a3e4e0fe1f38b2e9c68f,2024-08-30T13:00:05.390000
|
||||
CVE-2024-8330,0,0,782e580a39ccfd83684b4457f3125a705ab0e04b1e538fee1c67877e5bf8efaf,2024-08-30T13:00:05.390000
|
||||
CVE-2024-8331,0,0,343124d7b1806dffa96e90fffc1d8372d0b74589151a57c1b2882deb4a0d4fe5,2024-08-30T13:00:05.390000
|
||||
CVE-2024-8332,0,0,fd3412423441f0861e5abc670422141a85b6dd6226a10ba7ddbbe277f10d6048,2024-08-30T13:00:05.390000
|
||||
CVE-2024-8333,0,0,6f1ea39c4f9d2633b88ba89972fd9ac57009b75876255dbdb47a9abfdb00a2be,2024-08-30T06:15:05.577000
|
||||
CVE-2024-8334,1,1,56add0acfdbbbc32d47b30be9758fffde7851e815211184cb90be071dc7a30a3,2024-08-30T13:15:12.587000
|
||||
CVE-2024-8335,1,1,35650854e0043a380afe9fb8312433f837d6652c9df3661d058dac021b52b290,2024-08-30T13:15:13.103000
|
||||
CVE-2024-8334,0,0,56add0acfdbbbc32d47b30be9758fffde7851e815211184cb90be071dc7a30a3,2024-08-30T13:15:12.587000
|
||||
CVE-2024-8335,0,0,35650854e0043a380afe9fb8312433f837d6652c9df3661d058dac021b52b290,2024-08-30T13:15:13.103000
|
||||
CVE-2024-8336,1,1,eaead2264f253b84d864af9faf927dcd685bb56b3ed81d74db3d5cb877fd2047,2024-08-30T14:15:17.840000
|
||||
CVE-2024-8337,1,1,ad9482cb832e8390add2705561b5fdd17032f9e6f9c92626adedb2d4bb2265fd,2024-08-30T14:15:18.297000
|
||||
CVE-2024-8338,1,1,834d33b33067d3480ef10d62893e58a6036b3c2ffc4c06acca37e9736fceaae9,2024-08-30T15:15:19.973000
|
||||
CVE-2024-8339,1,1,4ed6ada317f3a70da083604c7a00f5fb95deb7a091b1dbf1025e0e9cf02ddcb8,2024-08-30T15:15:20.453000
|
||||
CVE-2024-8340,1,1,704ecf5af235a98587ea2c8151afe4c231ebf634efb263f92476eb538836232c,2024-08-30T15:15:20.903000
|
||||
CVE-2024-8341,1,1,f55dd9e1356807e4ab4994d2c62c5ad3cff3007eaadbf27aee274c7155b25b5e,2024-08-30T15:15:21.340000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user