mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
Auto-Update: 2024-09-12T18:00:18.901635+00:00
This commit is contained in:
parent
f501e156ee
commit
a7f6963a39
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2016-10221",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2017-04-03T05:59:00.473",
|
||||
"lastModified": "2017-07-01T01:29:32.593",
|
||||
"lastModified": "2024-09-12T17:15:02.657",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -94,6 +94,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.ghostscript.com/cgi-bin/findgit.cgi?2590fed7a355a421f062ebd4293df892800fa7ac",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://bugs.ghostscript.com/show_bug.cgi?id=697400",
|
||||
"source": "cve@mitre.org",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2016-10246",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2017-03-16T14:59:00.157",
|
||||
"lastModified": "2023-11-07T02:29:33.387",
|
||||
"lastModified": "2024-09-12T17:15:02.827",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -131,6 +131,10 @@
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://bugs.ghostscript.com/show_bug.cgi?id=697020",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00013.html",
|
||||
"source": "cve@mitre.org",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2016-10247",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2017-03-16T14:59:00.207",
|
||||
"lastModified": "2023-11-07T02:29:33.453",
|
||||
"lastModified": "2024-09-12T17:15:02.977",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -139,6 +139,10 @@
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://bugs.ghostscript.com/show_bug.cgi?id=697021",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00013.html",
|
||||
"source": "cve@mitre.org",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2018-1000036",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2018-05-24T13:29:00.337",
|
||||
"lastModified": "2024-07-15T21:15:02.777",
|
||||
"lastModified": "2024-09-12T17:15:03.130",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -123,6 +123,10 @@
|
||||
"url": "https://bugs.ghostscript.com/show_bug.cgi?id=698887",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://cgit.ghostscript.com/cgi-bin/cgit.cgi/mupdf.git/commit/?id=8aa2bd34065d2844aae778bd4cc20c74bbcd9406",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00013.html",
|
||||
"source": "cve@mitre.org",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2018-10289",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2018-04-22T05:29:00.207",
|
||||
"lastModified": "2021-12-14T21:46:13.693",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-12T17:15:03.270",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -109,6 +109,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.ghostscript.com/cgi-bin/findgit.cgi?2e43685dc8a8a886fc9df9b3663cf199404f7637",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://bugs.ghostscript.com/show_bug.cgi?id=699271",
|
||||
"source": "cve@mitre.org",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2018-16647",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2018-09-06T23:29:01.820",
|
||||
"lastModified": "2020-07-26T00:15:11.727",
|
||||
"lastModified": "2024-09-12T17:15:03.387",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -102,6 +102,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://cgit.ghostscript.com/cgi-bin/cgit.cgi/mupdf.git/commit/?id=351c99d8ce23bbf7099dbd52771a095f67e45a2c",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/07/msg00019.html",
|
||||
"source": "cve@mitre.org"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2018-16648",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2018-09-06T23:29:01.927",
|
||||
"lastModified": "2020-07-26T00:15:12.040",
|
||||
"lastModified": "2024-09-12T17:15:03.493",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -102,6 +102,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://cgit.ghostscript.com/cgi-bin/cgit.cgi/mupdf.git/commit/?id=38f883fe129a5e89306252a4676eaaf4bc968824",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/07/msg00019.html",
|
||||
"source": "cve@mitre.org"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2018-18662",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2018-10-26T14:29:02.817",
|
||||
"lastModified": "2020-07-26T00:15:12.117",
|
||||
"lastModified": "2024-09-12T17:15:03.587",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -110,6 +110,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://cgit.ghostscript.com/cgi-bin/cgit.cgi/mupdf.git/commit/?id=164ddc22ee0d5b63a81d5148f44c37dd132a9356",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/TeamSeri0us/pocs/tree/master/mupdf",
|
||||
"source": "cve@mitre.org",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2018-19777",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2018-11-30T10:29:00.210",
|
||||
"lastModified": "2023-11-07T02:55:44.053",
|
||||
"lastModified": "2024-09-12T17:15:03.700",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -114,6 +114,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.ghostscript.com/cgi-bin/findgit.cgi?754ac68f119e0c25cd33c5d652d8aabd533a9fb3",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://bugs.ghostscript.com/show_bug.cgi?id=700301",
|
||||
"source": "cve@mitre.org",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2018-19881",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2018-12-06T00:29:00.237",
|
||||
"lastModified": "2023-11-07T02:55:45.590",
|
||||
"lastModified": "2024-09-12T17:15:03.807",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -102,6 +102,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://cgit.ghostscript.com/cgi-bin/cgit.cgi/mupdf.git/commit/?id=a7f7d91cdff8d303c11d458fa8b802776f73c8cc",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/TeamSeri0us/pocs/tree/master/mupdf/20181203",
|
||||
"source": "cve@mitre.org",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2018-19882",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2018-12-06T00:29:00.283",
|
||||
"lastModified": "2023-11-07T02:55:45.653",
|
||||
"lastModified": "2024-09-12T17:15:03.913",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -94,6 +94,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.ghostscript.com/cgi-bin/findgit.cgi?a7f7d91cdff8d303c11d458fa8b802776f73c8cc",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://bugs.ghostscript.com/show_bug.cgi?id=700342",
|
||||
"source": "cve@mitre.org",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2018-5686",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2018-01-14T02:29:05.213",
|
||||
"lastModified": "2020-01-30T18:05:04.663",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-12T17:15:03.987",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -123,6 +123,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://cgit.ghostscript.com/cgi-bin/cgit.cgi/mupdf.git/commit/?id=b70eb93f6936c03d8af52040bbca4d4a7db39079",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2019/06/msg00027.html",
|
||||
"source": "cve@mitre.org",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-38120",
|
||||
"sourceIdentifier": "security@opentext.com",
|
||||
"published": "2024-08-28T07:15:07.303",
|
||||
"lastModified": "2024-08-28T12:57:17.117",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-12T17:41:59.920",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "security@opentext.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security@opentext.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microfocus:netiq_advance_authentication:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.3.5.1",
|
||||
"matchCriteriaId": "1F2A4172-AF21-41D3-9B1B-E4BE59842E0F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.netiq.com/documentation/advanced-authentication-63/advanced-authentication-releasenotes-6351/data/advanced-authentication-releasenotes-6351.html",
|
||||
"source": "security@opentext.com"
|
||||
"source": "security@opentext.com",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-38121",
|
||||
"sourceIdentifier": "security@opentext.com",
|
||||
"published": "2024-08-28T07:15:07.807",
|
||||
"lastModified": "2024-08-28T12:57:17.117",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-12T16:16:45.357",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "security@opentext.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-326"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security@opentext.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opentext:netiq_advance_authentication:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.3.5.1",
|
||||
"matchCriteriaId": "B37C4B8A-B724-4C7C-98E6-9BE7B476BBCB"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.netiq.com/documentation/advanced-authentication-63/advanced-authentication-releasenotes-6351/data/advanced-authentication-releasenotes-6351.html",
|
||||
"source": "security@opentext.com"
|
||||
"source": "security@opentext.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-4442",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-08-29T11:15:23.413",
|
||||
"lastModified": "2024-08-29T13:25:27.537",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-12T16:58:07.427",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,27 +15,132 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: tcp: agregar pruebas de cordura a TCP_QUEUE_SEQ Qingyu Li inform\u00f3 un error de syzkaller donde la reproducci\u00f3n cambia RCV SEQ _despu\u00e9s_ de restaurar datos en la cola de recepci\u00f3n. mprotect(0x4aa000, 12288, PROT_LECTURA) = 0 mmap(0x1ffff000, 4096, PROT_NINGUNO, MAPA_PRIVADO|MAPA_FIJO|MAPA_AN\u00d3NIMO, -1, 0) = 0x1ffff000 mmap(0x20000000, 16777216, PROT_LECTURA|PROT_ESCRITURA|PROT_EJECUCI\u00d3N, MAPA_PRIVADO|MAPA_FIJO|MAPA_AN\u00d3NIMO, -1, 0) = 0x20000000 mmap(0x21000000, 4096, PROT_NINGUNO, MAPA_PRIVADO|MAPA_FIJO|MAPA_AN\u00d3NIMO, -1, 0) = 0x21000000 socket(AF_INET6, SOCK_STREAM, IPPROTO_IP) = 3 setsockopt(3, SOL_TCP, TCP_REPAIR, [1], 4) = 0 connect(3, {sa_family=AF_INET6, sin6_port=htons(0), sin6_flowinfo=htonl(0), inet_pton(AF_INET6, \"::1\", &sin6_addr), sin6_scope_id=0}, 28) = 0 setsockopt(3, SOL_TCP, TCP_REPAIR_QUEUE, [1], 4) = 0 sendmsg(3, {msg_name=NULL, msg_namelen=0, msg_iov=[{iov_base=\"0x0000000000000003\\0\\0\", iov_len=20}], msg_iovlen=1, msg_controllen=0, msg_flags=0}, 0) = 20 setsockopt(3, SOL_TCP, TCP_REPAIR, [0], 4) = 0 setsockopt(3, SOL_TCP, TCP_QUEUE_SEQ, [128], 4) = 0 recvfrom(3, NULL, 20, 0, NULL, NULL) = -1 ECONNRESET (Conexi\u00f3n restablecida por el par) syslog muestra: [ 111.205099] TCP recvmsg seq # error 2: copiado 80, seq 0, rcvnxt 80, fl 0 [ 111.207894] ADVERTENCIA: CPU: 1 PID: 356 en net/ipv4/tcp.c:2343 tcp_recvmsg_locked+0x90e/0x29a0 Esto no deber\u00eda estar permitido. TCP_QUEUE_SEQ solo se debe utilizar cuando las colas est\u00e1n vac\u00edas. Este parche corrige este caso y tambi\u00e9n la ruta de transmisi\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.5",
|
||||
"versionEndExcluding": "4.19.181",
|
||||
"matchCriteriaId": "58EB7158-A900-4601-8CF0-D19F3929BBED"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.20",
|
||||
"versionEndExcluding": "5.4.106",
|
||||
"matchCriteriaId": "2A66FDC0-50BA-4BCC-8BFE-2209436DDBF7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.5",
|
||||
"versionEndExcluding": "5.10.24",
|
||||
"matchCriteriaId": "1E692548-C944-4984-9823-EE1EC83F4F2A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11",
|
||||
"versionEndExcluding": "5.11.7",
|
||||
"matchCriteriaId": "F83144BB-4FAB-40A1-8F52-8690FF516A33"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:5.12:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "07875739-0CCB-4F48-9330-3D4B6A4064FA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:5.12:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DA09B732-04F8-452C-94CF-97644E78684D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/046f3c1c2ff450fb7ae53650e9a95e0074a61f3e",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/319f460237fc2965a80aa9a055044e1da7b3692a",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/3b72d5a703842f582502d97906f17d6ee122dac2",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/3bf899438c123c444f6b644a57784dfbb6b15ad6",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/8811f4a9836e31c14ecdf79d9f3cb7c5d463265d",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-26321",
|
||||
"sourceIdentifier": "security@xiaomi.com",
|
||||
"published": "2024-08-28T08:15:06.083",
|
||||
"lastModified": "2024-08-28T12:57:17.117",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-12T16:29:14.277",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "security@xiaomi.com",
|
||||
"type": "Secondary",
|
||||
@ -39,10 +59,42 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mi:file_manager:1-210567:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8010BDED-A28F-468D-A92C-3D2FAF09D29A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://trust.mi.com/misrc/bulletins/advisory?cveId=541",
|
||||
"source": "security@xiaomi.com"
|
||||
"source": "security@xiaomi.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-26322",
|
||||
"sourceIdentifier": "security@xiaomi.com",
|
||||
"published": "2024-08-28T08:15:06.263",
|
||||
"lastModified": "2024-08-28T14:35:02.847",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-12T17:27:10.637",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "security@xiaomi.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mi:getapps:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "31.2.5.0",
|
||||
"versionEndExcluding": "32.0.0.1",
|
||||
"matchCriteriaId": "9765252A-895A-406A-A53D-4D64628F30F4"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://trust.mi.com/misrc/bulletins/advisory?cveId=542",
|
||||
"source": "security@xiaomi.com"
|
||||
"source": "security@xiaomi.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-26323",
|
||||
"sourceIdentifier": "security@xiaomi.com",
|
||||
"published": "2024-08-28T08:15:06.427",
|
||||
"lastModified": "2024-08-28T12:57:17.117",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-12T17:22:31.193",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "security@xiaomi.com",
|
||||
"type": "Secondary",
|
||||
@ -39,10 +59,44 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mi:app_market:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.57.4",
|
||||
"versionEndExcluding": "4.58.2",
|
||||
"matchCriteriaId": "B37C7C21-5A9B-4A9B-841F-A1CAFDBF2616"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://trust.mi.com/misrc/bulletins/advisory?cveId=543",
|
||||
"source": "security@xiaomi.com"
|
||||
"source": "security@xiaomi.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-26324",
|
||||
"sourceIdentifier": "security@xiaomi.com",
|
||||
"published": "2024-08-28T08:15:06.600",
|
||||
"lastModified": "2024-08-28T14:35:04.193",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-12T17:27:12.117",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "security@xiaomi.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mi:getapps:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "30.6.0.2",
|
||||
"matchCriteriaId": "567F657F-A051-4E58-95D6-D74EDE2A6540"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://https://trust.mi.com/misrc/bulletins/advisory?cveId=544",
|
||||
"source": "security@xiaomi.com"
|
||||
"source": "security@xiaomi.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-39735",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-10-25T18:17:29.337",
|
||||
"lastModified": "2023-10-31T18:47:10.027",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-12T16:35:01.147",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 4.2
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 8.2,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 4.2
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-39736",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-10-25T18:17:29.380",
|
||||
"lastModified": "2023-10-31T18:46:29.183",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-12T16:35:02.410",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 4.2
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 8.2,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 4.2
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-39737",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-10-25T18:17:29.423",
|
||||
"lastModified": "2023-10-31T18:46:19.250",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-12T16:35:03.280",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 4.2
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 8.2,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 4.2
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-39739",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-10-25T18:17:29.470",
|
||||
"lastModified": "2023-10-31T18:45:58.823",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-12T16:35:04.037",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 4.2
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 8.2,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 4.2
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-4027",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-08-17T08:15:05.703",
|
||||
"lastModified": "2024-08-19T13:00:23.117",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-12T17:53:23.627",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -40,6 +40,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
@ -51,22 +61,52 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:softlabbd:radio_player:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "2.0.73",
|
||||
"matchCriteriaId": "FF44223C-188A-481F-B083-A7CE7BF8369B"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.svn.wordpress.org/radio-player/tags/2.0.7/readme.txt",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/2942906/radio-player/trunk/includes/class-ajax.php",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3050056/radio-player/tags/2.0.74/includes/class-ajax.php?old=2986565&old_path=radio-player%2Ftags%2F2.0.73%2Fincludes%2Fclass-ajax.php",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2cc9f75d-f1a6-486b-b924-76ec618c5314?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-45966",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-10-23T21:15:08.847",
|
||||
"lastModified": "2023-10-30T11:36:04.983",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-12T16:35:06.080",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-918"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-918"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-46319",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-10-23T00:15:08.467",
|
||||
"lastModified": "2023-10-28T03:24:08.903",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-12T16:35:07.170",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -49,6 +49,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-288"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-51712",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-05T16:15:06.970",
|
||||
"lastModified": "2024-09-05T17:44:56.007",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-12T17:11:22.360",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,15 +15,75 @@
|
||||
"value": "Se descubri\u00f3 un problema en Trusted Firmware-M hasta la versi\u00f3n 2.0.0. La falta de verificaci\u00f3n de argumentos en el subsistema de registro permite a los atacantes leer datos confidenciales a trav\u00e9s de la funci\u00f3n de inicio de sesi\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N",
|
||||
"attackVector": "PHYSICAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.3,
|
||||
"impactScore": 4.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:arm:trusted_firmware-m:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "2.0.0",
|
||||
"matchCriteriaId": "50324DBE-9C90-4774-AFC8-D76506DD9D9D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.trustedfirmware.org/TF-M/trusted-firmware-m.git/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://trustedfirmware-m.readthedocs.io/en/latest/security/security_advisories/debug_log_vulnerability.html",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mitigation",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-52904",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-08-21T07:15:06.540",
|
||||
"lastModified": "2024-08-21T12:30:33.697",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-12T17:22:46.040",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,15 +15,73 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ALSA: usb-audio: corrige la posible desreferencia del puntero NULL en snd_usb_pcm_has_fixed_rate() El argumento de la funci\u00f3n subs puede ser NULL, as\u00ed que no lo use antes de la verificaci\u00f3n NULL."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/92a9c0ad86d47ff4cce899012e355c400f02cfb8",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/a474d4ad59cd4642d1b7e3a6c08cef9eca0992c8",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-52907",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-08-21T07:15:06.733",
|
||||
"lastModified": "2024-08-21T12:30:33.697",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-12T16:06:17.460",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,35 +15,160 @@
|
||||
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: nfc: pn533: espere a que se complete out_urb en pn533_usb_send_frame() Se corrige un use-after-free que ocurre en hcd cuando in_urb enviado desde pn533_usb_send_frame() se completa antes que out_urb. Su devoluci\u00f3n de llamada libera los datos de skb en pn533_send_async_complete() que se utilizan como b\u00fafer de transferencia de out_urb. Espere antes de enviar in_urb hasta que se llame a la devoluci\u00f3n de llamada de out_urb. Para modificar la devoluci\u00f3n de llamada de out_urb solo, separe la funci\u00f3n completa de out_urb y ack_urb. Encontrado por una versi\u00f3n modificada de syzkaller. ERROR: KASAN: use-after-free en dummy_timer Rastreo de llamadas: memcpy (mm/kasan/shadow.c:65) dummy_perform_transfer (drivers/usb/gadget/udc/dummy_hcd.c:1352) transfer (drivers/usb/gadget/ udc/dummy_hcd.c:1453) dummy_timer (drivers/usb/gadget/udc/dummy_hcd.c:1972) arch_static_branch (arch/x86/include/asm/jump_label.h:27) static_key_false (include/linux/jump_label.h: 207) timer_expire_exit (include/trace/events/timer.h:127) call_timer_fn (kernel/time/timer.c:1475) expire_timers (kernel/time/timer.c:1519) __run_timers (kernel/time/timer.c: 1790) run_timer_softirq (n\u00facleo/hora/timer.c:1803)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.1",
|
||||
"versionEndExcluding": "4.14.303",
|
||||
"matchCriteriaId": "832DF899-7836-4E2B-B197-9DC370060351"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.15",
|
||||
"versionEndExcluding": "4.19.270",
|
||||
"matchCriteriaId": "AE8904A3-99BE-4E49-9682-1F90A6373F4F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.20",
|
||||
"versionEndExcluding": "5.4.229",
|
||||
"matchCriteriaId": "A0C0D95E-414A-445E-941B-3EF6A4D3A093"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.5",
|
||||
"versionEndExcluding": "5.10.164",
|
||||
"matchCriteriaId": "CA742E66-32D2-459E-AB19-171C4DB3B1F4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11",
|
||||
"versionEndExcluding": "5.15.89",
|
||||
"matchCriteriaId": "E706841F-E788-4316-9B05-DA8EB60CE6B3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "6.1.7",
|
||||
"matchCriteriaId": "9275C81F-AE96-4CDB-AD20-7DBD36E5D909"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FF501633-2F44-4913-A8EE-B021929F49F6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2BDA597B-CAC1-4DF0-86F0-42E142C654E9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "725C78C9-12CE-406F-ABE8-0813A01D66E8"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/0ca78c99656f5c448567db1e148367aa3b01c80a",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/321db5131c92983dac4f3338e8fbb6df214238c0",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/35529d6b827eedb6bf7e81130e4b7e0aba9e58d2",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/39ae73e581112cfe27ba50aecb1c891ce57cecb1",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/8998db5021a28ad67aa8d627bdb4226e4046ccc4",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/9424d2205fe94a095fb9365ec0c6137f0b394a2b",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/9dab880d675b9d0dd56c6428e4e8352a3339371d",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-20505",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-09-04T22:15:03.887",
|
||||
"lastModified": "2024-09-05T12:53:21.110",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-12T17:28:47.010",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
@ -39,10 +59,63 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "0.103.12",
|
||||
"matchCriteriaId": "C21D8C4B-CEBE-422C-A103-B516EBCC34B6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "0.104.0",
|
||||
"versionEndExcluding": "1.0.7",
|
||||
"matchCriteriaId": "8D3AF611-42CD-4EC8-9A2A-89AEC62A3D6E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "1.2.0",
|
||||
"versionEndExcluding": "1.3.2",
|
||||
"matchCriteriaId": "DD0EA13B-FFC9-4385-8691-38A90DCE774F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:clamav:clamav:1.4.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9D7F43F7-EF41-4CB7-A013-6A8F274F973D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://blog.clamav.net/2024/09/clamav-141-132-107-and-010312-security.html",
|
||||
"source": "ykramarz@cisco.com"
|
||||
"source": "ykramarz@cisco.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-20506",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-09-04T22:15:04.083",
|
||||
"lastModified": "2024-09-05T12:53:21.110",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-12T17:26:37.643",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 4.2
|
||||
},
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
@ -39,10 +59,62 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-754"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "0.103.12",
|
||||
"matchCriteriaId": "C21D8C4B-CEBE-422C-A103-B516EBCC34B6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "0.104.0",
|
||||
"versionEndExcluding": "1.0.7",
|
||||
"matchCriteriaId": "8D3AF611-42CD-4EC8-9A2A-89AEC62A3D6E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "1.2.0",
|
||||
"versionEndExcluding": "1.3.2",
|
||||
"matchCriteriaId": "DD0EA13B-FFC9-4385-8691-38A90DCE774F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:clamav:clamav:1.4.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9D7F43F7-EF41-4CB7-A013-6A8F274F973D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://blog.clamav.net/2024/09/clamav-141-132-107-and-010312-security.html",
|
||||
"source": "ykramarz@cisco.com"
|
||||
"source": "ykramarz@cisco.com",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2166",
|
||||
"sourceIdentifier": "psirt@forcepoint.com",
|
||||
"published": "2024-09-04T22:15:04.260",
|
||||
"lastModified": "2024-09-05T12:53:21.110",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-12T17:19:43.607",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "psirt@forcepoint.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "psirt@forcepoint.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,36 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:forcepoint:email_security:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "8.5.5",
|
||||
"matchCriteriaId": "E0679763-2B2A-463B-A010-700681AFA2D7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:forcepoint:email_security:8.5.5:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5EB5F047-ACD1-48CD-939C-D5C4AAD7DD90"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.forcepoint.com/s/article/000042397",
|
||||
"source": "psirt@forcepoint.com"
|
||||
"source": "psirt@forcepoint.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-27xx/CVE-2024-2743.json
Normal file
60
CVE-2024/CVE-2024-27xx/CVE-2024-2743.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-2743",
|
||||
"sourceIdentifier": "cve@gitlab.com",
|
||||
"published": "2024-09-12T17:15:04.177",
|
||||
"lastModified": "2024-09-12T17:15:04.177",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in GitLab-EE starting with version 13.3 before 17.1.7, 17.2 before 17.2.5, and 17.3 before 17.3.2 that would allow an attacker to modify an on-demand DAST scan without permissions and leak variables."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@gitlab.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve@gitlab.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/451014",
|
||||
"source": "cve@gitlab.com"
|
||||
},
|
||||
{
|
||||
"url": "https://hackerone.com/reports/2411756",
|
||||
"source": "cve@gitlab.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-34017",
|
||||
"sourceIdentifier": "security@acronis.com",
|
||||
"published": "2024-08-29T20:15:07.743",
|
||||
"lastModified": "2024-08-30T13:00:05.390",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-12T17:16:09.890",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -16,6 +16,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.3,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "security@acronis.com",
|
||||
@ -51,10 +73,51 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:acronis:snap_deploy:*:*:*:*:*:windows:*:*",
|
||||
"versionEndExcluding": "6",
|
||||
"matchCriteriaId": "E3653927-4EF6-4508-92E7-F2EB2C418A00"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:acronis:snap_deploy:6:-:*:*:*:windows:*:*",
|
||||
"matchCriteriaId": "A12AF81B-8339-4F72-A30E-D5126B0BACE6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:acronis:snap_deploy:6:update1:*:*:*:windows:*:*",
|
||||
"matchCriteriaId": "5AD3DAEE-A07B-47B6-A072-171E571F7B6D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:acronis:snap_deploy:6:update1.1:*:*:*:windows:*:*",
|
||||
"matchCriteriaId": "9D953C3D-25D4-4C30-826A-D5E002A5CF78"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:acronis:snap_deploy:6:update1.2:*:*:*:windows:*:*",
|
||||
"matchCriteriaId": "BF1C1F42-7A5F-43AC-8E49-06F336605421"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security-advisory.acronis.com/advisories/SEC-4505",
|
||||
"source": "security@acronis.com"
|
||||
"source": "security@acronis.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-34018",
|
||||
"sourceIdentifier": "security@acronis.com",
|
||||
"published": "2024-08-29T20:15:07.997",
|
||||
"lastModified": "2024-08-30T13:00:05.390",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-12T17:17:20.873",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -16,6 +16,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
],
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "security@acronis.com",
|
||||
@ -51,10 +73,51 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:acronis:snap_deploy:*:*:*:*:*:windows:*:*",
|
||||
"versionEndExcluding": "6",
|
||||
"matchCriteriaId": "E3653927-4EF6-4508-92E7-F2EB2C418A00"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:acronis:snap_deploy:6:-:*:*:*:windows:*:*",
|
||||
"matchCriteriaId": "A12AF81B-8339-4F72-A30E-D5126B0BACE6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:acronis:snap_deploy:6:update1:*:*:*:windows:*:*",
|
||||
"matchCriteriaId": "5AD3DAEE-A07B-47B6-A072-171E571F7B6D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:acronis:snap_deploy:6:update1.1:*:*:*:windows:*:*",
|
||||
"matchCriteriaId": "9D953C3D-25D4-4C30-826A-D5E002A5CF78"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:acronis:snap_deploy:6:update1.2:*:*:*:windows:*:*",
|
||||
"matchCriteriaId": "BF1C1F42-7A5F-43AC-8E49-06F336605421"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security-advisory.acronis.com/advisories/SEC-4196",
|
||||
"source": "security@acronis.com"
|
||||
"source": "security@acronis.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-34019",
|
||||
"sourceIdentifier": "security@acronis.com",
|
||||
"published": "2024-08-29T20:15:08.193",
|
||||
"lastModified": "2024-08-30T13:00:05.390",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-12T17:18:07.163",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -16,6 +16,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.3,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "security@acronis.com",
|
||||
@ -51,10 +73,51 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:acronis:snap_deploy:*:*:*:*:*:windows:*:*",
|
||||
"versionEndExcluding": "6",
|
||||
"matchCriteriaId": "E3653927-4EF6-4508-92E7-F2EB2C418A00"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:acronis:snap_deploy:6:-:*:*:*:windows:*:*",
|
||||
"matchCriteriaId": "A12AF81B-8339-4F72-A30E-D5126B0BACE6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:acronis:snap_deploy:6:update1:*:*:*:windows:*:*",
|
||||
"matchCriteriaId": "5AD3DAEE-A07B-47B6-A072-171E571F7B6D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:acronis:snap_deploy:6:update1.1:*:*:*:windows:*:*",
|
||||
"matchCriteriaId": "9D953C3D-25D4-4C30-826A-D5E002A5CF78"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:acronis:snap_deploy:6:update1.2:*:*:*:windows:*:*",
|
||||
"matchCriteriaId": "BF1C1F42-7A5F-43AC-8E49-06F336605421"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security-advisory.acronis.com/advisories/SEC-3079",
|
||||
"source": "security@acronis.com"
|
||||
"source": "security@acronis.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-38313",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-06-13T20:15:15.450",
|
||||
"lastModified": "2024-06-17T12:43:31.090",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-12T17:48:33.947",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,15 +15,75 @@
|
||||
"value": "En ciertos escenarios, un sitio web malicioso podr\u00eda intentar mostrar una barra de URL de ubicaci\u00f3n falsa que podr\u00eda enga\u00f1ar a los usuarios en cuanto a la direcci\u00f3n real del sitio web. Esta vulnerabilidad afecta a Firefox para iOS < 127."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:iphone_os:*:*",
|
||||
"versionEndExcluding": "127.0",
|
||||
"matchCriteriaId": "57B76457-E6EC-4AB3-B106-98E824196C1A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1878489",
|
||||
"source": "security@mozilla.org"
|
||||
"source": "security@mozilla.org",
|
||||
"tags": [
|
||||
"Issue Tracking",
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-27/",
|
||||
"source": "security@mozilla.org"
|
||||
"source": "security@mozilla.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-3986",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-07-30T06:15:02.617",
|
||||
"lastModified": "2024-07-30T13:32:45.943",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-12T16:52:07.150",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,11 +15,68 @@
|
||||
"value": " El complemento SportsPress WordPress anterior a la versi\u00f3n 2.7.22 no sanitiza ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con privilegios elevados, como el administrador, realizar ataques de Cross Site Scripting almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n multisitio)."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:themeboy:sportspress:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "2.7.22",
|
||||
"matchCriteriaId": "92C0432B-891A-4730-A6A8-958B5F255E51"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/76c78f8e-e3da-47d9-9bf4-70e9dd125b82/",
|
||||
"source": "contact@wpscan.com"
|
||||
"source": "contact@wpscan.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-40457",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-12T14:16:06.780",
|
||||
"lastModified": "2024-09-12T14:16:06.780",
|
||||
"lastModified": "2024-09-12T17:35:00.590",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [
|
||||
{
|
||||
@ -18,7 +18,42 @@
|
||||
"value": "No-IP Dynamic Update Client (DUC) v3.x uses cleartext credentials that may occur on a command line or in a file. NOTE: the vendor's position is that cleartext in /etc/default/noip-duc is recommended and is the intentional behavior."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.1,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-313"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.noip.com/support/knowledgebase/install-linux-3-x-dynamic-update-client-duc",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-4081",
|
||||
"sourceIdentifier": "security@ni.com",
|
||||
"published": "2024-07-23T14:15:14.837",
|
||||
"lastModified": "2024-07-24T12:55:13.223",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-12T16:43:42.490",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "security@ni.com",
|
||||
"type": "Secondary",
|
||||
@ -84,6 +104,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security@ni.com",
|
||||
"type": "Secondary",
|
||||
@ -95,10 +125,71 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ni:labview:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "2020",
|
||||
"matchCriteriaId": "E9BBCA76-7B4C-4CC5-A782-489CA4223C04"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ni:labview:2021:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9F184512-5D11-47F4-8555-EA6FF93C106F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ni:labview:2021:sp1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BF28259A-30A6-4BB1-B262-A006AB74AFFA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ni:labview:2022:q1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4D12D6CF-802F-47BA-ADF9-9E52C071BD7F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ni:labview:2022:q3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "340F61E5-D1ED-4C29-A894-8BC5C5B90ACE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ni:labview:2023:q1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D7DD2022-CFB7-4F38-B459-C1AFB55B5B68"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ni:labview:2023:q3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "18AB0B07-72FE-4861-B69D-AD2E87C5382E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ni:labview:2023:q3_patch2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "044C4B51-C641-41F2-ACA0-834C99D63285"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ni:labview:2024:q1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7753CCDF-BAF8-4F91-B85B-EBB2B88F6F30"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/memory-corruption-issues-due-to-improper-length-checks-in-labview.html",
|
||||
"source": "security@ni.com"
|
||||
"source": "security@ni.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-42259",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-08-14T15:15:31.673",
|
||||
"lastModified": "2024-08-19T05:15:07.053",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-12T16:00:55.537",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,39 +15,159 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/i915/gem: Arreglar el c\u00e1lculo de los l\u00edmites del mapeo de la memoria virtual. El c\u00e1lculo del tama\u00f1o del \u00e1rea mapeada como el valor menor entre el tama\u00f1o solicitado y el tama\u00f1o real no considera el desplazamiento del mapeo parcial. . Esto puede provocar un error de acceso a la p\u00e1gina. Corrija el c\u00e1lculo de las direcciones inicial y final; el tama\u00f1o total ahora se deduce de la diferencia entre las direcciones final e inicial. Adem\u00e1s, los c\u00e1lculos se han reescrito de una forma m\u00e1s clara y comprensible. [Joonas: Add Requires: tag] Requiere: 60a2066c5005 (\"drm/i915/gem: Ajustar el desplazamiento de vma para el desplazamiento de mmap del framebuffer\") (seleccionado de la confirmaci\u00f3n 97b6784753da06d9d40232328efc5c5367e53417)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-131"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.9",
|
||||
"versionEndExcluding": "4.19.320",
|
||||
"matchCriteriaId": "F30738D4-FF99-4B8F-A798-76B5C6F59C79"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.20",
|
||||
"versionEndExcluding": "5.4.282",
|
||||
"matchCriteriaId": "A8961D98-9ACF-4188-BA88-44038B14BC28"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.5",
|
||||
"versionEndExcluding": "5.10.224",
|
||||
"matchCriteriaId": "5CCEDF13-293D-4E64-B501-4409D0365AFE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11",
|
||||
"versionEndExcluding": "5.15.165",
|
||||
"matchCriteriaId": "B4E2B568-3171-41DE-B519-F2B1A3600D94"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "6.1.106",
|
||||
"matchCriteriaId": "3F3AF3DA-1553-4AB8-97CC-7D0C91E4E23F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2",
|
||||
"versionEndExcluding": "6.6.46",
|
||||
"matchCriteriaId": "FA11941E-81FB-484C-B583-881EEB488340"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.10.5",
|
||||
"matchCriteriaId": "D074AE50-4A5E-499C-A2FD-75FD60DEA560"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/3e06073d24807f04b4694108a8474decb7b99e60",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/4b09513ce93b3dcb590baaaff2ce96f2d098312d",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/50111a8098fb9ade621eeff82228a997d42732ab",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/8bdd9ef7e9b1b2a73e394712b72b22055e0e26c3",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/911f8055f175c82775d0fd8cedcd0b75413f4ba7",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/a256d019eaf044864c7e50312f0a65b323c24f39",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/e8a68aa842d3f8dd04a46b9d632e5f67fde1da9b",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/ead9289a51ea82eb5b27029fcf4c34b2dd60cf06",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-42468",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-08-12T13:38:34.970",
|
||||
"lastModified": "2024-08-12T13:41:36.517",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-12T16:01:42.113",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -51,18 +81,45 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:openhab:openhab:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "4.2.1",
|
||||
"matchCriteriaId": "8140B9BF-E3FB-4946-80AE-90E607364AB2"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/openhab/openhab-webui/blob/1c03c60f84388b9d7da0231df2d4ebb1e17d3fcf/bundles/org.openhab.ui.cometvisu/src/main/java/org/openhab/ui/cometvisu/internal/servlet/CometVisuServlet.java#L75",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/openhab/openhab-webui/commit/630e8525835c698cf58856aa43782d92b18087f2",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/openhab/openhab-webui/security/advisories/GHSA-pcwp-26pw-j98w",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-42469",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-08-12T13:38:35.187",
|
||||
"lastModified": "2024-08-12T13:41:36.517",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-12T16:02:35.023",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -51,14 +81,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:openhab:openhab:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "4.2.1",
|
||||
"matchCriteriaId": "8140B9BF-E3FB-4946-80AE-90E607364AB2"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/openhab/openhab-webui/commit/630e8525835c698cf58856aa43782d92b18087f2",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/openhab/openhab-webui/security/advisories/GHSA-f729-58x4-gqgf",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-42470",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-08-12T13:38:35.440",
|
||||
"lastModified": "2024-08-12T13:41:36.517",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-12T16:04:23.273",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 9.1,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.2
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -51,14 +81,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:openhab:openhab:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "4.2.1",
|
||||
"matchCriteriaId": "8140B9BF-E3FB-4946-80AE-90E607364AB2"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/openhab/openhab-webui/commit/630e8525835c698cf58856aa43782d92b18087f2",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/openhab/openhab-webui/security/advisories/GHSA-3g4c-hjhr-73rj",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-42760",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-11T19:15:14.983",
|
||||
"lastModified": "2024-09-12T12:35:54.013",
|
||||
"lastModified": "2024-09-12T16:35:07.910",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "La vulnerabilidad de inyecci\u00f3n SQL en Ellevo v.6.2.0.38160 permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s del componente /api/mob/instrucao/conta/destinatarios."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://csflabs.github.io/cve/2024/09/10/cve-2024-42760-sql-injection-in-ellevo-API.html",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-43264",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-08-26T21:15:26.360",
|
||||
"lastModified": "2024-08-27T13:01:52.723",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-12T16:50:07.000",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -41,8 +61,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -51,10 +81,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mediavine:create:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "1.9.8",
|
||||
"matchCriteriaId": "A00AD5DE-D76A-4222-A12F-FAB2A02684FF"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/mediavine-create/wordpress-create-by-mediavine-plugin-1-9-7-sensitive-data-exposure-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-43308",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-08-18T15:15:03.920",
|
||||
"lastModified": "2024-08-19T12:59:59.177",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-12T16:30:02.100",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gutentor:gutentor:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "3.3.5",
|
||||
"matchCriteriaId": "D77E6B78-AA22-4DE4-BCEF-69FE7A79FDF5"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/gutentor/wordpress-gutentor-gutenberg-blocks-page-builder-for-gutenberg-editor-plugin-3-3-5-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-43309",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-08-18T15:15:04.110",
|
||||
"lastModified": "2024-08-19T12:59:59.177",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-12T16:39:09.187",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:wpsocio:wp_telegram_widget_and_join_link:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "2.1.28",
|
||||
"matchCriteriaId": "40BA3EC1-7661-489B-A28D-061B4C76DB8D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/wptelegram-widget/wordpress-wp-telegram-widget-and-join-link-plugin-2-1-27-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-43313",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-08-18T15:15:04.310",
|
||||
"lastModified": "2024-08-19T12:59:59.177",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-12T16:40:07.057",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:formfacade:formfacade:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "1.3.3",
|
||||
"matchCriteriaId": "990D7BDB-9591-41F5-93F7-6CEA34A25881"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/formfacade/wordpress-formfacade-wordpress-plugin-for-google-forms-plugin-1-3-2-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-43318",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-08-18T15:15:04.500",
|
||||
"lastModified": "2024-08-19T12:59:59.177",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-12T16:24:35.640",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:e2pdf:e2pdf:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "1.25.11",
|
||||
"matchCriteriaId": "B76A9237-9653-447C-ADF1-5F5287019173"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/e2pdf/wordpress-e2pdf-export-to-pdf-tool-for-wordpress-plugin-1-25-05-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-43916",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-08-26T21:15:29.563",
|
||||
"lastModified": "2024-08-27T13:01:37.913",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-12T16:21:19.030",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 4.2
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:dylanjkotze:zephyr_project_manager:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "3.3.103",
|
||||
"matchCriteriaId": "F3837AA4-4B1E-4312-8989-9CCD5B4A51D2"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/zephyr-project-manager/wordpress-zephyr-project-manager-plugin-3-3-102-insecure-direct-object-references-idor-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,17 +2,41 @@
|
||||
"id": "CVE-2024-44401",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-06T16:15:03.110",
|
||||
"lastModified": "2024-09-06T21:35:13.733",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-12T16:09:45.050",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "D-Link DI-8100G 17.12.20A1 is vulnerable to Command Injection via sub47A60C function in the upgrade_filter.asp file"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "D-Link DI-8100G 17.12.20A1 es vulnerable a la inyecci\u00f3n de comandos a trav\u00e9s de la funci\u00f3n sub47A60C en el archivo upgrade_filter.asp"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -36,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -47,14 +81,50 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:dlink:di-8100g_firmware:17.12.20a1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A134EE00-C43F-41CC-9F7C-B94EA94E2113"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:dlink:di-8100g:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DAA6037E-C080-4254-BDEC-1B5DFC64B937"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/lonelylonglong/openfile-/blob/main/D-link_DI_8100GA1_Command_Injection.md/CVE-2024-44401",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/lonelylonglong/openfile-/blob/main/D-link_DI_8100GA1_Command_Injection.md/D-link_DI_8100GA1_Command_Injection.md",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,17 +2,41 @@
|
||||
"id": "CVE-2024-44837",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-06T14:15:12.517",
|
||||
"lastModified": "2024-09-06T16:46:26.830",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-12T16:17:57.797",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A cross-site scripting (XSS) vulnerability in the component \\bean\\Manager.java of Drug v1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the user parameter."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad de cross site scripting (XSS) en el componente \\bean\\Manager.java de Drug v1.0 permite a los atacantes ejecutar script web o HTML arbitrario a trav\u00e9s de un payload especialmente manipulado inyectado en el par\u00e1metro del usuario."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -36,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -47,10 +81,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:deathbreak:drug:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A0DE330D-C20E-433E-9968-B8B646C90FF7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://kaput-raptorex-7c1.notion.site/drug-1-0-DOM-based-cross-site-scripting-fae620f769304f67a7488a961d048672",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-45054",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-08-28T20:15:08.547",
|
||||
"lastModified": "2024-08-29T13:25:27.537",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-12T17:50:11.233",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -51,26 +81,59 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hwameistor:hwameistor:*:*:*:*:*:go:*:*",
|
||||
"versionEndExcluding": "0.14.6",
|
||||
"matchCriteriaId": "789E23CD-2922-45F8-BD3A-AD17E16D06CA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/hwameistor/hwameistor/blob/main/helm/hwameistor/templates/clusterrole.yaml",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/hwameistor/hwameistor/commit/edf4cebed73cadd230bf97eab65c5311f2858450",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/hwameistor/hwameistor/issues/1457",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/hwameistor/hwameistor/issues/1460",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/hwameistor/hwameistor/security/advisories/GHSA-mgwr-h7mv-fh29",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-45157",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-05T19:15:12.960",
|
||||
"lastModified": "2024-09-06T12:08:21.290",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-12T16:29:42.717",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,19 +15,89 @@
|
||||
"value": "Se descubri\u00f3 un problema en Mbed TLS anterior a la versi\u00f3n 2.28.9 y en la versi\u00f3n 3.x anterior a la 3.6.1, en el que no se utiliza el algoritmo seleccionado por el usuario. A diferencia de lo documentado anteriormente, habilitar MBEDTLS_PSA_HMAC_DRBG_MD_TYPE no hace que el subsistema PSA utilice HMAC_DRBG: utiliza HMAC_DRBG solo cuando MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG y MBEDTLS_CTR_DRBG_C est\u00e1n deshabilitados."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.4,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:arm:mbed_tls:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2.26.0",
|
||||
"versionEndExcluding": "2.28.9",
|
||||
"matchCriteriaId": "30B556DF-F66C-4B0F-9897-D2E224A7B23B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:arm:mbed_tls:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.2.0",
|
||||
"versionEndExcluding": "3.6.1",
|
||||
"matchCriteriaId": "21841FE2-FFD3-4EF1-9257-7A31C00B14C2"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Mbed-TLS/mbedtls/releases/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://mbed-tls.readthedocs.io/en/latest/security-advisories/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2024-08-1/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-45244",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-25T02:15:03.383",
|
||||
"lastModified": "2024-08-26T12:47:20.187",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-12T16:07:49.530",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,11 +15,67 @@
|
||||
"value": "Hyperledger Fabric hasta 2.5.9 no verifica que una solicitud tenga una marca de tiempo dentro del per\u00edodo de tiempo esperado."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hyperledger:fabric:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "2.5.9",
|
||||
"matchCriteriaId": "C7161F83-ADAD-487E-BB51-B09E6C15D526"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/hyperledger/fabric/commit/155457a6624b3c74b22e5729c35c8499bfe952cd",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-45314",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-09-04T16:15:08.833",
|
||||
"lastModified": "2024-09-05T12:53:21.110",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-12T16:39:53.690",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -51,14 +81,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:dpgaspar:flask_app_builder:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "4.5.1",
|
||||
"matchCriteriaId": "C3DCADA8-B241-4FC2-899E-520EEB2640FE"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/dpgaspar/Flask-AppBuilder/commit/3030e881d2e44f4021764e18e489fe940a9b3636",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/dpgaspar/Flask-AppBuilder/security/advisories/GHSA-fw5r-6m3x-rh7p",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -1,9 +1,9 @@
|
||||
{
|
||||
"id": "CVE-2024-45440",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"sourceIdentifier": "mlhess@drupal.org",
|
||||
"published": "2024-08-29T11:15:27.083",
|
||||
"lastModified": "2024-09-03T18:15:08.967",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-12T16:15:06.943",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -19,11 +19,11 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "https://senscybersecurity.nl/CVE-2024-45440-Explained/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "mlhess@drupal.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.drupal.org/project/drupal/issues/3457781",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "mlhess@drupal.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-45589",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-05T16:15:08.737",
|
||||
"lastModified": "2024-09-05T18:35:13.200",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-12T16:54:09.467",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-307"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -51,14 +81,45 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:identityautomation:rapididentity:*:*:*:*:lts:*:*:*",
|
||||
"versionEndIncluding": "2023.0.2",
|
||||
"matchCriteriaId": "70E86D76-6BBC-4B58-8BAC-E6A0137C35E4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:identityautomation:rapididentity:*:*:*:*:cloud:*:*:*",
|
||||
"versionEndIncluding": "2024.08.0",
|
||||
"matchCriteriaId": "FE040CBA-BD47-4E66-B9DA-737EF3CDA8BD"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://benrogozinski.github.io/CVE-2024-45589/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://help.rapididentity.com/docs/rapididentity-lts-release-notes",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-46xx/CVE-2024-4612.json
Normal file
60
CVE-2024/CVE-2024-46xx/CVE-2024-4612.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-4612",
|
||||
"sourceIdentifier": "cve@gitlab.com",
|
||||
"published": "2024-09-12T17:15:04.740",
|
||||
"lastModified": "2024-09-12T17:15:04.740",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue has been discovered in GitLab EE affecting all versions starting from 12.9 before 17.1.7, 17.2 before 17.2.5, and 17.3 before 17.3.2. Under certain conditions an open redirect vulnerability could allow for an account takeover by breaking the OAuth flow."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@gitlab.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve@gitlab.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-601"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/460707",
|
||||
"source": "cve@gitlab.com"
|
||||
},
|
||||
{
|
||||
"url": "https://hackerone.com/reports/2479857",
|
||||
"source": "cve@gitlab.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-46xx/CVE-2024-4660.json
Normal file
60
CVE-2024/CVE-2024-46xx/CVE-2024-4660.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-4660",
|
||||
"sourceIdentifier": "cve@gitlab.com",
|
||||
"published": "2024-09-12T17:15:04.937",
|
||||
"lastModified": "2024-09-12T17:15:04.937",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue has been discovered in GitLab EE affecting all versions starting from 11.2 before 17.1.7, all versions starting from 17.2 before 17.2.5, all versions starting from 17.3 before 17.3.2. It was possible for a guest to read the source code of a private project by using group templates."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@gitlab.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve@gitlab.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/460892",
|
||||
"source": "cve@gitlab.com"
|
||||
},
|
||||
{
|
||||
"url": "https://hackerone.com/reports/2480126",
|
||||
"source": "cve@gitlab.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-54xx/CVE-2024-5435.json
Normal file
60
CVE-2024/CVE-2024-54xx/CVE-2024-5435.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-5435",
|
||||
"sourceIdentifier": "cve@gitlab.com",
|
||||
"published": "2024-09-12T17:15:05.147",
|
||||
"lastModified": "2024-09-12T17:15:05.147",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue has been discovered discovered in GitLab EE/CE affecting all versions starting from 15.10 before 17.1.7, all versions starting from 17.2 before 17.2.5, all versions starting from 17.3 before 17.3.2 will disclose user password from repository mirror configuration."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@gitlab.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve@gitlab.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-209"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/464044",
|
||||
"source": "cve@gitlab.com"
|
||||
},
|
||||
{
|
||||
"url": "https://hackerone.com/reports/2520722",
|
||||
"source": "cve@gitlab.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-5694",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-06-11T13:15:50.933",
|
||||
"lastModified": "2024-06-11T13:54:12.057",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-12T17:28:47.137",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,15 +15,75 @@
|
||||
"value": "Un atacante podr\u00eda haber provocado que un use-after-free en el motor de JavaScript leyera la memoria en la secci\u00f3n de cadena de JavaScript del mont\u00f3n. Esta vulnerabilidad afecta a Firefox < 127."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "127.0",
|
||||
"matchCriteriaId": "4CF5E7C8-8673-4B56-AF92-44C08B086E02"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1895055",
|
||||
"source": "security@mozilla.org"
|
||||
"source": "security@mozilla.org",
|
||||
"tags": [
|
||||
"Issue Tracking",
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-25/",
|
||||
"source": "security@mozilla.org"
|
||||
"source": "security@mozilla.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-6311",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-08-28T07:15:10.800",
|
||||
"lastModified": "2024-08-28T12:57:17.117",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-12T16:46:57.037",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,18 +51,45 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:funnelforms:funnelforms_free:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "3.7.3.2",
|
||||
"matchCriteriaId": "14DBAD3D-0900-4D6C-99FF-953E6BDF344F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/funnelforms-free/tags/3.7.3.2/admin/menu_ajax_functions/formularbuilder_fonts.php#L47",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/funnelforms-free/tags/3.7.4.1/admin/menu_ajax_functions/formularbuilder_fonts.php?rev=3141470#L50",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/cbd42fc4-ab4a-4053-b765-18272eacd2bc?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-6312",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-08-28T07:15:11.413",
|
||||
"lastModified": "2024-08-28T12:57:17.117",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-12T16:47:21.140",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,18 +51,45 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:funnelforms:funnelforms_free:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "3.7.3.2",
|
||||
"matchCriteriaId": "14DBAD3D-0900-4D6C-99FF-953E6BDF344F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/funnelforms-free/tags/3.7.3.2/admin/menu_ajax_functions/formularbuilder_fonts.php#L59",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/funnelforms-free/tags/3.7.4.1/admin/menu_ajax_functions/formularbuilder_fonts.php?rev=3141470#L17",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/3e815531-f966-44a1-a037-8077a40c83b0?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-63xx/CVE-2024-6389.json
Normal file
60
CVE-2024/CVE-2024-63xx/CVE-2024-6389.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-6389",
|
||||
"sourceIdentifier": "cve@gitlab.com",
|
||||
"published": "2024-09-12T17:15:05.340",
|
||||
"lastModified": "2024-09-12T17:15:05.340",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in GitLab-CE/EE affecting all versions starting with 17.0 before 17.1.7, 17.2 before 17.2.5, and 17.3 before 17.3.2. An attacker as a guest user was able to access commit information via the release Atom endpoint, contrary to permissions."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@gitlab.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve@gitlab.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-497"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/469367",
|
||||
"source": "cve@gitlab.com"
|
||||
},
|
||||
{
|
||||
"url": "https://hackerone.com/reports/2573397",
|
||||
"source": "cve@gitlab.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-6445",
|
||||
"sourceIdentifier": "iletisim@usom.gov.tr",
|
||||
"published": "2024-09-06T14:15:12.683",
|
||||
"lastModified": "2024-09-09T09:15:02.513",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-12T16:14:51.480",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -59,6 +59,28 @@
|
||||
"baseSeverity": "CRITICAL"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
@ -73,10 +95,33 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:dataflowx:datadiodex:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.0.0",
|
||||
"versionEndExcluding": "3.1.7",
|
||||
"matchCriteriaId": "08BA7A27-BCC6-49F9-8A6B-77D745EAA617"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.usom.gov.tr/bildirim/tr-24-1409",
|
||||
"source": "iletisim@usom.gov.tr"
|
||||
"source": "iletisim@usom.gov.tr",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-64xx/CVE-2024-6446.json
Normal file
60
CVE-2024/CVE-2024-64xx/CVE-2024-6446.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-6446",
|
||||
"sourceIdentifier": "cve@gitlab.com",
|
||||
"published": "2024-09-12T17:15:05.557",
|
||||
"lastModified": "2024-09-12T17:15:05.557",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue has been discovered in GitLab affecting all versions starting from 17.1 to 17.1.7, 17.2 prior to 17.2.5 and 17.3 prior to 17.3.2. A crafted URL could be used to trick a victim to trust an attacker controlled application."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@gitlab.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 3.5,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve@gitlab.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-840"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/470144",
|
||||
"source": "cve@gitlab.com"
|
||||
},
|
||||
{
|
||||
"url": "https://hackerone.com/reports/2573481",
|
||||
"source": "cve@gitlab.com"
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2024/CVE-2024-68xx/CVE-2024-6840.json
Normal file
64
CVE-2024/CVE-2024-68xx/CVE-2024-6840.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2024-6840",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-09-12T17:15:05.773",
|
||||
"lastModified": "2024-09-12T17:15:05.773",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An improper authorization flaw exists in the Ansible Automation Controller. This flaw allows an attacker using the k8S API server to send an HTTP request with a service account token mounted via `automountServiceAccountToken: true`, resulting in privilege escalation to a service account."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.6,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.3,
|
||||
"impactScore": 4.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-285"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:6428",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2024-6840",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2298492",
|
||||
"source": "secalert@redhat.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-7733",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-08-13T18:15:32.883",
|
||||
"lastModified": "2024-08-14T02:07:05.410",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-12T16:20:49.503",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -120,18 +140,49 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xjd2020:fastcms:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "0.1.5",
|
||||
"matchCriteriaId": "E975CC3A-12D8-4B37-98CD-C473711ED0FE"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitee.com/xjd2020/fastcms/issues/IAI8T6",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.274350",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.274350",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-81xx/CVE-2024-8124.json
Normal file
60
CVE-2024/CVE-2024-81xx/CVE-2024-8124.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-8124",
|
||||
"sourceIdentifier": "cve@gitlab.com",
|
||||
"published": "2024-09-12T17:15:06.007",
|
||||
"lastModified": "2024-09-12T17:15:06.007",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in GitLab CE/EE affecting all versions starting from 16.4 prior to 17.1.7, starting from 17.2 prior to 17.2.5, starting from 17.3 prior to 17.3.2 which could cause Denial of Service via sending a large `glm_source` parameter."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@gitlab.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve@gitlab.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-1333"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/480533",
|
||||
"source": "cve@gitlab.com"
|
||||
},
|
||||
{
|
||||
"url": "https://hackerone.com/reports/2634880",
|
||||
"source": "cve@gitlab.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-8391",
|
||||
"sourceIdentifier": "emo@eclipse.org",
|
||||
"published": "2024-09-04T16:15:09.253",
|
||||
"lastModified": "2024-09-05T12:53:21.110",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-12T16:44:01.247",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -59,9 +59,41 @@
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-770"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "emo@eclipse.org",
|
||||
"type": "Secondary",
|
||||
@ -73,14 +105,40 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:eclipse:vert.x:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.3.0",
|
||||
"versionEndExcluding": "4.5.10",
|
||||
"matchCriteriaId": "9A26F841-8F44-472F-B3CA-561D561DF1F4"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/eclipse-vertx/vertx-grpc/issues/113",
|
||||
"source": "emo@eclipse.org"
|
||||
"source": "emo@eclipse.org",
|
||||
"tags": [
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/31",
|
||||
"source": "emo@eclipse.org"
|
||||
"source": "emo@eclipse.org",
|
||||
"tags": [
|
||||
"Issue Tracking",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-8412",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-09-04T16:15:09.393",
|
||||
"lastModified": "2024-09-05T12:53:21.110",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-12T16:47:19.140",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -120,30 +140,68 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:linuxos:shakal-ng:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "1.3.3",
|
||||
"matchCriteriaId": "F6248D95-9207-49D3-BD21-0A8003C1F0BF"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/LinuxOSsk/Shakal-NG/commit/ebd1c2cba59cbac198bf2fd5a10565994d4f02cb",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/LinuxOSsk/Shakal-NG/issues/202",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/LinuxOSsk/Shakal-NG/issues/202#issuecomment-2325187434",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.276492",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.276492",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.400792",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-8461",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-09-05T13:15:11.690",
|
||||
"lastModified": "2024-09-05T17:45:07.877",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-12T17:17:57.733",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [
|
||||
{
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
@ -68,6 +68,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -117,8 +137,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -127,30 +157,78 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:dlink:dns-320_firmware:2.02b01:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F6E90A65-4000-458D-B401-60C1BA3F88EE"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:dlink:dns-320:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A0F5355E-F68D-49FE-9793-1FD9BD9AF3E1"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/leetsun/IoT-Vuls/tree/main/Dlink-dns320/4",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10383",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Not Applicable"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.276627",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.276627",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.401300",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.dlink.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-8463",
|
||||
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||
"published": "2024-09-05T13:15:12.440",
|
||||
"lastModified": "2024-09-05T17:45:07.877",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-12T17:15:02.230",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,30 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:phpgurukul:job_portal:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F4C12CCE-8671-4C69-A7BF-91D14FB9BC51"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-job-portal",
|
||||
"source": "cve-coordination@incibe.es"
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-86xx/CVE-2024-8631.json
Normal file
60
CVE-2024/CVE-2024-86xx/CVE-2024-8631.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-8631",
|
||||
"sourceIdentifier": "cve@gitlab.com",
|
||||
"published": "2024-09-12T17:15:06.230",
|
||||
"lastModified": "2024-09-12T17:15:06.230",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A privilege escalation issue has been discovered in GitLab EE affecting all versions starting from 16.6 prior to 17.1.7, from 17.2 prior to 17.2.5, and from 17.3 prior to 17.3.2. A user assigned the Admin Group Member custom role could have escalated their privileges to include other custom roles."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@gitlab.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 4.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve@gitlab.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-267"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/462665",
|
||||
"source": "cve@gitlab.com"
|
||||
},
|
||||
{
|
||||
"url": "https://hackerone.com/reports/2478469",
|
||||
"source": "cve@gitlab.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-86xx/CVE-2024-8635.json
Normal file
56
CVE-2024/CVE-2024-86xx/CVE-2024-8635.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-8635",
|
||||
"sourceIdentifier": "cve@gitlab.com",
|
||||
"published": "2024-09-12T17:15:06.437",
|
||||
"lastModified": "2024-09-12T17:15:06.437",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A server-side request forgery issue has been discovered in GitLab EE affecting all versions starting from 16.8 prior to 17.1.7, from 17.2 prior to 17.2.5, and from 17.3 prior to 17.3.2. It was possible for an attacker to make requests to internal resources using a custom Maven Dependency Proxy URL"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@gitlab.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.7,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 4.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve@gitlab.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-918"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/455273",
|
||||
"source": "cve@gitlab.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-86xx/CVE-2024-8640.json
Normal file
60
CVE-2024/CVE-2024-86xx/CVE-2024-8640.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-8640",
|
||||
"sourceIdentifier": "cve@gitlab.com",
|
||||
"published": "2024-09-12T17:15:06.647",
|
||||
"lastModified": "2024-09-12T17:15:06.647",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue has been discovered in GitLab EE affecting all versions starting from 16.11 prior to 17.1.7, from 17.2 prior to 17.2.5, and from 17.3 prior to 17.3.2. Due to incomplete input filtering, it was possible to inject commands into a connected Cube server."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@gitlab.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve@gitlab.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/486213",
|
||||
"source": "cve@gitlab.com"
|
||||
},
|
||||
{
|
||||
"url": "https://hackerone.com/reports/2687770",
|
||||
"source": "cve@gitlab.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-87xx/CVE-2024-8754.json
Normal file
56
CVE-2024/CVE-2024-87xx/CVE-2024-8754.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-8754",
|
||||
"sourceIdentifier": "cve@gitlab.com",
|
||||
"published": "2024-09-12T17:15:06.917",
|
||||
"lastModified": "2024-09-12T17:15:06.917",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue has been discovered in GitLab EE/CE affecting all versions from 16.9.7 prior to 17.1.7, 17.2 prior to 17.2.5, and 17.3 prior to 17.3.2. An improper input validation error allows attacker to squat on accounts via linking arbitrary unclaimed provider identities when JWT authentication is configured."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@gitlab.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve@gitlab.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-642"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/464062",
|
||||
"source": "cve@gitlab.com"
|
||||
}
|
||||
]
|
||||
}
|
86
README.md
86
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-09-12T16:00:32.041579+00:00
|
||||
2024-09-12T18:00:18.901635+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-09-12T15:58:26.700000+00:00
|
||||
2024-09-12T17:53:23.627000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,58 +33,56 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
262677
|
||||
262689
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `14`
|
||||
Recently added CVEs: `12`
|
||||
|
||||
- [CVE-2024-28990](CVE-2024/CVE-2024-289xx/CVE-2024-28990.json) (`2024-09-12T14:16:06.273`)
|
||||
- [CVE-2024-28991](CVE-2024/CVE-2024-289xx/CVE-2024-28991.json) (`2024-09-12T14:16:06.540`)
|
||||
- [CVE-2024-40457](CVE-2024/CVE-2024-404xx/CVE-2024-40457.json) (`2024-09-12T14:16:06.780`)
|
||||
- [CVE-2024-42483](CVE-2024/CVE-2024-424xx/CVE-2024-42483.json) (`2024-09-12T15:18:22.093`)
|
||||
- [CVE-2024-42484](CVE-2024/CVE-2024-424xx/CVE-2024-42484.json) (`2024-09-12T15:18:22.320`)
|
||||
- [CVE-2024-45823](CVE-2024/CVE-2024-458xx/CVE-2024-45823.json) (`2024-09-12T15:18:22.547`)
|
||||
- [CVE-2024-45824](CVE-2024/CVE-2024-458xx/CVE-2024-45824.json) (`2024-09-12T14:16:06.953`)
|
||||
- [CVE-2024-45825](CVE-2024/CVE-2024-458xx/CVE-2024-45825.json) (`2024-09-12T15:18:23.387`)
|
||||
- [CVE-2024-45826](CVE-2024/CVE-2024-458xx/CVE-2024-45826.json) (`2024-09-12T15:18:24.287`)
|
||||
- [CVE-2024-6510](CVE-2024/CVE-2024-65xx/CVE-2024-6510.json) (`2024-09-12T15:18:26.347`)
|
||||
- [CVE-2024-6658](CVE-2024/CVE-2024-66xx/CVE-2024-6658.json) (`2024-09-12T15:18:26.543`)
|
||||
- [CVE-2024-6700](CVE-2024/CVE-2024-67xx/CVE-2024-6700.json) (`2024-09-12T15:18:26.757`)
|
||||
- [CVE-2024-6701](CVE-2024/CVE-2024-67xx/CVE-2024-6701.json) (`2024-09-12T15:18:26.953`)
|
||||
- [CVE-2024-6702](CVE-2024/CVE-2024-67xx/CVE-2024-6702.json) (`2024-09-12T15:18:27.133`)
|
||||
- [CVE-2024-2743](CVE-2024/CVE-2024-27xx/CVE-2024-2743.json) (`2024-09-12T17:15:04.177`)
|
||||
- [CVE-2024-4612](CVE-2024/CVE-2024-46xx/CVE-2024-4612.json) (`2024-09-12T17:15:04.740`)
|
||||
- [CVE-2024-4660](CVE-2024/CVE-2024-46xx/CVE-2024-4660.json) (`2024-09-12T17:15:04.937`)
|
||||
- [CVE-2024-5435](CVE-2024/CVE-2024-54xx/CVE-2024-5435.json) (`2024-09-12T17:15:05.147`)
|
||||
- [CVE-2024-6389](CVE-2024/CVE-2024-63xx/CVE-2024-6389.json) (`2024-09-12T17:15:05.340`)
|
||||
- [CVE-2024-6446](CVE-2024/CVE-2024-64xx/CVE-2024-6446.json) (`2024-09-12T17:15:05.557`)
|
||||
- [CVE-2024-6840](CVE-2024/CVE-2024-68xx/CVE-2024-6840.json) (`2024-09-12T17:15:05.773`)
|
||||
- [CVE-2024-8124](CVE-2024/CVE-2024-81xx/CVE-2024-8124.json) (`2024-09-12T17:15:06.007`)
|
||||
- [CVE-2024-8631](CVE-2024/CVE-2024-86xx/CVE-2024-8631.json) (`2024-09-12T17:15:06.230`)
|
||||
- [CVE-2024-8635](CVE-2024/CVE-2024-86xx/CVE-2024-8635.json) (`2024-09-12T17:15:06.437`)
|
||||
- [CVE-2024-8640](CVE-2024/CVE-2024-86xx/CVE-2024-8640.json) (`2024-09-12T17:15:06.647`)
|
||||
- [CVE-2024-8754](CVE-2024/CVE-2024-87xx/CVE-2024-8754.json) (`2024-09-12T17:15:06.917`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `71`
|
||||
Recently modified CVEs: `67`
|
||||
|
||||
- [CVE-2024-41839](CVE-2024/CVE-2024-418xx/CVE-2024-41839.json) (`2024-09-12T15:58:11.690`)
|
||||
- [CVE-2024-43040](CVE-2024/CVE-2024-430xx/CVE-2024-43040.json) (`2024-09-12T14:35:15.010`)
|
||||
- [CVE-2024-43214](CVE-2024/CVE-2024-432xx/CVE-2024-43214.json) (`2024-09-12T14:17:59.390`)
|
||||
- [CVE-2024-44938](CVE-2024/CVE-2024-449xx/CVE-2024-44938.json) (`2024-09-12T14:05:44.310`)
|
||||
- [CVE-2024-44940](CVE-2024/CVE-2024-449xx/CVE-2024-44940.json) (`2024-09-12T14:10:00.857`)
|
||||
- [CVE-2024-4554](CVE-2024/CVE-2024-45xx/CVE-2024-4554.json) (`2024-09-12T15:01:12.217`)
|
||||
- [CVE-2024-4555](CVE-2024/CVE-2024-45xx/CVE-2024-4555.json) (`2024-09-12T15:13:25.520`)
|
||||
- [CVE-2024-4556](CVE-2024/CVE-2024-45xx/CVE-2024-4556.json) (`2024-09-12T15:09:55.107`)
|
||||
- [CVE-2024-45624](CVE-2024/CVE-2024-456xx/CVE-2024-45624.json) (`2024-09-12T15:35:48.600`)
|
||||
- [CVE-2024-6449](CVE-2024/CVE-2024-64xx/CVE-2024-6449.json) (`2024-09-12T15:32:19.680`)
|
||||
- [CVE-2024-6450](CVE-2024/CVE-2024-64xx/CVE-2024-6450.json) (`2024-09-12T15:42:45.430`)
|
||||
- [CVE-2024-6929](CVE-2024/CVE-2024-69xx/CVE-2024-6929.json) (`2024-09-12T14:32:51.000`)
|
||||
- [CVE-2024-7605](CVE-2024/CVE-2024-76xx/CVE-2024-7605.json) (`2024-09-12T14:24:03.833`)
|
||||
- [CVE-2024-7816](CVE-2024/CVE-2024-78xx/CVE-2024-7816.json) (`2024-09-12T14:35:15.873`)
|
||||
- [CVE-2024-7817](CVE-2024/CVE-2024-78xx/CVE-2024-7817.json) (`2024-09-12T14:35:16.087`)
|
||||
- [CVE-2024-7818](CVE-2024/CVE-2024-78xx/CVE-2024-7818.json) (`2024-09-12T14:35:16.877`)
|
||||
- [CVE-2024-7820](CVE-2024/CVE-2024-78xx/CVE-2024-7820.json) (`2024-09-12T14:35:17.657`)
|
||||
- [CVE-2024-7822](CVE-2024/CVE-2024-78xx/CVE-2024-7822.json) (`2024-09-12T14:35:18.437`)
|
||||
- [CVE-2024-7859](CVE-2024/CVE-2024-78xx/CVE-2024-7859.json) (`2024-09-12T14:35:19.213`)
|
||||
- [CVE-2024-7860](CVE-2024/CVE-2024-78xx/CVE-2024-7860.json) (`2024-09-12T14:35:19.980`)
|
||||
- [CVE-2024-7861](CVE-2024/CVE-2024-78xx/CVE-2024-7861.json) (`2024-09-12T14:35:20.767`)
|
||||
- [CVE-2024-7862](CVE-2024/CVE-2024-78xx/CVE-2024-7862.json) (`2024-09-12T14:35:21.530`)
|
||||
- [CVE-2024-8054](CVE-2024/CVE-2024-80xx/CVE-2024-8054.json) (`2024-09-12T14:35:22.300`)
|
||||
- [CVE-2024-8504](CVE-2024/CVE-2024-85xx/CVE-2024-8504.json) (`2024-09-12T14:35:23.173`)
|
||||
- [CVE-2024-8707](CVE-2024/CVE-2024-87xx/CVE-2024-8707.json) (`2024-09-12T15:18:27.333`)
|
||||
- [CVE-2024-42470](CVE-2024/CVE-2024-424xx/CVE-2024-42470.json) (`2024-09-12T16:04:23.273`)
|
||||
- [CVE-2024-42760](CVE-2024/CVE-2024-427xx/CVE-2024-42760.json) (`2024-09-12T16:35:07.910`)
|
||||
- [CVE-2024-43264](CVE-2024/CVE-2024-432xx/CVE-2024-43264.json) (`2024-09-12T16:50:07.000`)
|
||||
- [CVE-2024-43308](CVE-2024/CVE-2024-433xx/CVE-2024-43308.json) (`2024-09-12T16:30:02.100`)
|
||||
- [CVE-2024-43309](CVE-2024/CVE-2024-433xx/CVE-2024-43309.json) (`2024-09-12T16:39:09.187`)
|
||||
- [CVE-2024-43313](CVE-2024/CVE-2024-433xx/CVE-2024-43313.json) (`2024-09-12T16:40:07.057`)
|
||||
- [CVE-2024-43318](CVE-2024/CVE-2024-433xx/CVE-2024-43318.json) (`2024-09-12T16:24:35.640`)
|
||||
- [CVE-2024-43916](CVE-2024/CVE-2024-439xx/CVE-2024-43916.json) (`2024-09-12T16:21:19.030`)
|
||||
- [CVE-2024-44401](CVE-2024/CVE-2024-444xx/CVE-2024-44401.json) (`2024-09-12T16:09:45.050`)
|
||||
- [CVE-2024-44837](CVE-2024/CVE-2024-448xx/CVE-2024-44837.json) (`2024-09-12T16:17:57.797`)
|
||||
- [CVE-2024-45054](CVE-2024/CVE-2024-450xx/CVE-2024-45054.json) (`2024-09-12T17:50:11.233`)
|
||||
- [CVE-2024-45157](CVE-2024/CVE-2024-451xx/CVE-2024-45157.json) (`2024-09-12T16:29:42.717`)
|
||||
- [CVE-2024-45244](CVE-2024/CVE-2024-452xx/CVE-2024-45244.json) (`2024-09-12T16:07:49.530`)
|
||||
- [CVE-2024-45314](CVE-2024/CVE-2024-453xx/CVE-2024-45314.json) (`2024-09-12T16:39:53.690`)
|
||||
- [CVE-2024-45440](CVE-2024/CVE-2024-454xx/CVE-2024-45440.json) (`2024-09-12T16:15:06.943`)
|
||||
- [CVE-2024-45589](CVE-2024/CVE-2024-455xx/CVE-2024-45589.json) (`2024-09-12T16:54:09.467`)
|
||||
- [CVE-2024-5694](CVE-2024/CVE-2024-56xx/CVE-2024-5694.json) (`2024-09-12T17:28:47.137`)
|
||||
- [CVE-2024-6311](CVE-2024/CVE-2024-63xx/CVE-2024-6311.json) (`2024-09-12T16:46:57.037`)
|
||||
- [CVE-2024-6312](CVE-2024/CVE-2024-63xx/CVE-2024-6312.json) (`2024-09-12T16:47:21.140`)
|
||||
- [CVE-2024-6445](CVE-2024/CVE-2024-64xx/CVE-2024-6445.json) (`2024-09-12T16:14:51.480`)
|
||||
- [CVE-2024-7733](CVE-2024/CVE-2024-77xx/CVE-2024-7733.json) (`2024-09-12T16:20:49.503`)
|
||||
- [CVE-2024-8391](CVE-2024/CVE-2024-83xx/CVE-2024-8391.json) (`2024-09-12T16:44:01.247`)
|
||||
- [CVE-2024-8412](CVE-2024/CVE-2024-84xx/CVE-2024-8412.json) (`2024-09-12T16:47:19.140`)
|
||||
- [CVE-2024-8461](CVE-2024/CVE-2024-84xx/CVE-2024-8461.json) (`2024-09-12T17:17:57.733`)
|
||||
- [CVE-2024-8463](CVE-2024/CVE-2024-84xx/CVE-2024-8463.json) (`2024-09-12T17:15:02.230`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
314
_state.csv
314
_state.csv
@ -36,7 +36,7 @@ CVE-1999-0034,0,0,43bb5bdf16feb1716fd4c515e99849db419fb22188c6e9f91b6c40a76e52d2
|
||||
CVE-1999-0035,0,0,2b77a0699cc5e5ebdeb4870fddbdffd7df51c593a91f98e3b0f2c9ae32fb185f,2022-08-17T07:15:08.930000
|
||||
CVE-1999-0036,0,0,540dc95d7f883d3820afffca88e7f789f702102237b5bb4ca3cb0c1f50f38459,2024-08-01T20:35:05.300000
|
||||
CVE-1999-0037,0,0,d38bd6b9e0375b7fa44485e0d1d6c73541ae8bce5f8d9e8d5d51c4af1812b56d,2022-08-17T07:15:08.993000
|
||||
CVE-1999-0038,0,1,0e695c6ea4468dc7260d5239b78b551040c17942d36f3c7876221e3099aafb7e,2024-09-12T15:35:31.693000
|
||||
CVE-1999-0038,0,0,0e695c6ea4468dc7260d5239b78b551040c17942d36f3c7876221e3099aafb7e,2024-09-12T15:35:31.693000
|
||||
CVE-1999-0039,0,0,663ca0cbe1947ed25ded76a3fcb97f2a9ac70d43241bfe92c0b4661e5f666022,2018-05-03T01:29:01.223000
|
||||
CVE-1999-0040,0,0,a84d03ec8353b15fecb32d6cce6c89013d4deb319f44cc51d7a56c36cb8cb7fe,2022-08-17T07:15:09.177000
|
||||
CVE-1999-0041,0,0,53c5f3b22e946cd681d04783ff577d50057fc9ccd66163b1ccd983fcc9ac9d07,2022-08-17T07:15:09.257000
|
||||
@ -83548,7 +83548,7 @@ CVE-2016-10218,0,0,5723cb6302292814371ee84b7f62e86ab1f97872d1014e15c783a88aed71e
|
||||
CVE-2016-10219,0,0,a62c3e88e8ddd6bec84dac2a034fa2e9dcd8c134d61661b704f99434fec53318,2017-11-04T01:29:16.600000
|
||||
CVE-2016-1022,0,0,fc10f16c326647ab3d10535b9b43c1d9f1f268a17aef8ce456beeeed40a653f3,2023-01-26T19:50:06.910000
|
||||
CVE-2016-10220,0,0,8342159f7ddca49392e29b7b29a56a77ef06616b9e5bdf79aa63f19ed8bdd01e,2017-11-04T01:29:16.677000
|
||||
CVE-2016-10221,0,0,c41fd0c31e2d19964acbe4989617938f83edee7cb042acf1cfcac777460c1741,2017-07-01T01:29:32.593000
|
||||
CVE-2016-10221,0,1,273803941eab621cb748fc40e862be64f168b13eb3cb35f5b031dc45cf64302c,2024-09-12T17:15:02.657000
|
||||
CVE-2016-10222,0,0,6c997a33b73f92ca762f9b90de14184ee8e709b19f72a6f44978e783f1f03c0e,2017-04-11T01:09:00.023000
|
||||
CVE-2016-10223,0,0,228afddf46a0d5a9093386ca2e59d8d2f112f2848475f3fe7078a11d79f13a2d,2017-02-16T13:34:03.120000
|
||||
CVE-2016-10224,0,0,5d1affa9fb41a776648aff1831bd50661e82ce95f0b3fbcb1a442dbe2db6a3c0,2021-08-31T19:57:23.857000
|
||||
@ -83573,8 +83573,8 @@ CVE-2016-10242,0,0,6faef0e9cd84471688c8d3fced2182edfea55009cdd26177c1eaa83b2019a
|
||||
CVE-2016-10243,0,0,317f4d30f76f6dea99b0d225bae3ccac765f3166558864fffaf003efcfd54e90,2023-11-07T02:29:33.290000
|
||||
CVE-2016-10244,0,0,12dbda35562b1dc383e8344a9b7157ae7b0bb66074edde3cf184464c97e6a0d3,2021-01-26T12:33:27.803000
|
||||
CVE-2016-10245,0,0,95577f7f530d132a0c8f16a068cffc70e8e60a6b03437f3084524c49960c2ad0,2019-06-03T15:29:00.310000
|
||||
CVE-2016-10246,0,0,7205c97a40bb5901136ab565d7cd3c878cc35d33bce9ecb59f0eeb4238dc6bdb,2023-11-07T02:29:33.387000
|
||||
CVE-2016-10247,0,0,ef8b123014361ecdc9d12a144cede90e6fa1742421cb0d473c7b80e965f241dc,2023-11-07T02:29:33.453000
|
||||
CVE-2016-10246,0,1,be5bb79412069ab3711e8fa0d78cfe2de5c2f0f7f14d94ed165a7d10a6e25fd4,2024-09-12T17:15:02.827000
|
||||
CVE-2016-10247,0,1,f663d467cf63b570a4754a5f3009a4044ab94c0c0a7267de1bb34fee4719c237,2024-09-12T17:15:02.977000
|
||||
CVE-2016-10248,0,0,9c7a6159cc971e15f7ed06d4bb16949ff7058b155a8d44456a5b87b2d7f84ca4,2018-06-29T01:29:00.533000
|
||||
CVE-2016-10249,0,0,3eefa638aa2ccc50aadd023c6e319f357cf89d342830070dce795cd3eb458aff,2018-01-05T02:30:32.527000
|
||||
CVE-2016-1025,0,0,db428b6d27a0a1287a82032c3d5c5835b37044c4c39aac42ca8396ec23eeb1de,2023-01-26T20:32:55.033000
|
||||
@ -110720,7 +110720,7 @@ CVE-2018-1000032,0,0,f83e4699aacc29de346641084aee293233bff330301ec8f389819600642
|
||||
CVE-2018-1000033,0,0,858f48a27cfc6cd6d38e2a781fd60cdb956846a6a7c628da28b0249b3e0fbd5e,2018-02-26T18:41:29.290000
|
||||
CVE-2018-1000034,0,0,9f046a3ae33c12eb65a81471eae361c3c96c94d7941f77661d1067393a31b9d4,2018-02-26T19:11:58.640000
|
||||
CVE-2018-1000035,0,0,f3ac17321769176439c0dad8e3b5075b803f2592212d8b46134ec73584b72275,2020-08-24T17:37:01.140000
|
||||
CVE-2018-1000036,0,0,9c7069ad9539e5ac71c6df2912bc9b5184a459cd394083481a163973b41f5c3a,2024-07-15T21:15:02.777000
|
||||
CVE-2018-1000036,0,1,1883289fc3aaee37e3baf47555e7801de4d25e150cc42be38586fabee7ac59a6,2024-09-12T17:15:03.130000
|
||||
CVE-2018-1000037,0,0,27ca64f2cffd813816e345cb550071151a5a2faed9a4e94e92efdb588391d46e,2024-08-01T13:41:36.483000
|
||||
CVE-2018-1000038,0,0,b454f40c0c455deb6991c79687c6bdeb2e53142a93c425761594677e384c6dfa,2024-07-15T21:15:02.963000
|
||||
CVE-2018-1000039,0,0,edf6f44c4fdf4e6a4a530dad1ede9a8d7fccf68640f370ffef2a6e604a7ba536,2024-07-15T21:15:03.053000
|
||||
@ -111428,7 +111428,7 @@ CVE-2018-10283,0,0,a43e50046802425c93792b8a2045d5921f52f5c35c5714163eb2a958d3602
|
||||
CVE-2018-10284,0,0,e88e9f859acc7741ef29137cb44394e60310192a2624ac60336fafa9a69428fc,2018-06-13T16:49:05.767000
|
||||
CVE-2018-10285,0,0,0d9a8d9ac31aed8e33346faf6fdb0fe397e995510f52b0939d091d77c5c31e5d,2019-10-03T00:03:26.223000
|
||||
CVE-2018-10286,0,0,96a16b149101ef04e65f76bdcc7c6c3c5cc570880395a1c33c904ab293f07199,2019-10-03T00:03:26.223000
|
||||
CVE-2018-10289,0,0,89aebf8b7acc44c6f33e900c055b80173c6993730be87afb54825fbe3c3caab2,2021-12-14T21:46:13.693000
|
||||
CVE-2018-10289,0,1,8ffccbae2a3ea7557581181571294fa1f65a0eaeecd194151f4cc6af8a4398a2,2024-09-12T17:15:03.270000
|
||||
CVE-2018-1029,0,0,f8fe97c2c24d927b3d000db4a1db43c1cf1da7cedc86281fd25d851a71e4e5e6,2023-10-03T15:38:36.353000
|
||||
CVE-2018-10294,0,0,0aead357edd8a0be14c2f26edd9878c991df2cbfbc397b76cc5e93e49612a910,2018-06-04T13:50:15.887000
|
||||
CVE-2018-10295,0,0,d60a98af43576083d16ea268a0eccfa541cb64daaaf3c30224b0a4254298b23d,2018-05-25T14:25:26.723000
|
||||
@ -116969,8 +116969,8 @@ CVE-2018-16643,0,0,8bc2719dfcad13bc05f65e295c274a9c3fb600239c0d3091d3d8f5eeae53b
|
||||
CVE-2018-16644,0,0,36b0cc6eba0101bb2650f8ec48c63501d5a61415b3739ec801a882aeee5997ee,2020-08-24T17:37:01.140000
|
||||
CVE-2018-16645,0,0,1e9bfef115da28ec334f8433d4c7f86b4a3d16cfd7cd1ff9e3991299f5e6c738,2019-10-03T00:03:26.223000
|
||||
CVE-2018-16646,0,0,e593637b784c992ff778c3f6081e60bb2b06171b0b72f8a3dee691a231f7ec57,2020-07-23T12:15:12.210000
|
||||
CVE-2018-16647,0,0,611eca5acedcc38f8099185b7208e5d07bc373fc13fb32526673849428c2d9d3,2020-07-26T00:15:11.727000
|
||||
CVE-2018-16648,0,0,e00b5cb9d84a923194dbbe44056dade3dab0d51fc977f4f1d7af44d97bd1b3a0,2020-07-26T00:15:12.040000
|
||||
CVE-2018-16647,0,1,1653036e53a71ea553b7e88187b648881fd5814aa76db0225f534fa9101ed43c,2024-09-12T17:15:03.387000
|
||||
CVE-2018-16648,0,1,460428bf17adfefdac9291c17245805a41dc5cab7d1f9b73792a167a9dd3a164,2024-09-12T17:15:03.493000
|
||||
CVE-2018-1665,0,0,c310b8f31aafdc70e14facb11cc59217c1489e9ad718be4cae09ca49c8636768,2019-10-09T23:38:50.650000
|
||||
CVE-2018-16650,0,0,7d9a4c2f8b8116b6e73afe8dc94841a22f37f054550d9c67a9f8c6eb5825c904,2018-11-02T13:44:02.710000
|
||||
CVE-2018-16651,0,0,790525e7b94b8d75e4e3b095da1223d8a79ade6a9c6ef34175eeeae2d26354f5,2020-08-24T17:37:01.140000
|
||||
@ -118571,7 +118571,7 @@ CVE-2018-18658,0,0,a4ff5c76a4fef0295a7e4bff874082d00389e9fd4901205c48b8f10041d10
|
||||
CVE-2018-18659,0,0,599fcdde8a1554213aadfb233ebb1d990811f5e92b4cf605158076a767d1a106,2018-12-06T15:58:31.047000
|
||||
CVE-2018-18660,0,0,c70db6559ad8fff65772f86cbb813f235b7258c7a43a22bc5ac05afcdd5516d2,2019-09-19T16:47:31.287000
|
||||
CVE-2018-18661,0,0,b10e8f8f42f7af0af8280049e58258f0c7a3330c75cb68f35b77ba3d36d0f050,2019-08-06T17:15:32.007000
|
||||
CVE-2018-18662,0,0,bb8523d5167d32f0e689ebdef16f1c2e2ca0846d16f5b7722686e72b326d4f93,2020-07-26T00:15:12.117000
|
||||
CVE-2018-18662,0,1,61d793824950e08659a5e6067b7a4377799331f5e3a37aee4b6613b9845db16e,2024-09-12T17:15:03.587000
|
||||
CVE-2018-18665,0,0,70c1af116dce7576ec784f49af161bada6890600c6b1e21dbd7fde5e1dd956e7,2019-01-11T20:34:45.270000
|
||||
CVE-2018-18666,0,0,e3dcf221645b96b703f55ecfece18d25dd77a568dd70673f2e5077e3497d1f50,2019-01-11T20:29:54.217000
|
||||
CVE-2018-18667,0,0,77d261c1562180793b28d4254dff8dafc7b1cc1d269d70dc354a393d3140f567,2019-01-11T20:14:03.017000
|
||||
@ -119506,7 +119506,7 @@ CVE-2018-19772,0,0,c39dfd0c52da771cc5e9c7b88ad86ed566d7902096a55c967b98a3635e2eb
|
||||
CVE-2018-19773,0,0,ec3f291298c73cfcd90dfd7d3b298733b527ef02cbd81e1d352bbe1f85aab687,2019-01-03T15:53:05.240000
|
||||
CVE-2018-19774,0,0,19424e6a5aa50b18e108465e8b5a16b904d058f36e0a838fe6d9ce25068e91df,2019-01-02T20:07:32.593000
|
||||
CVE-2018-19775,0,0,e5aaff25be386653be7f82aee3e8b5ffd6772331d0e3e9abd1e80a410a4b54fd,2019-01-02T20:06:39.997000
|
||||
CVE-2018-19777,0,0,4c51e7f1c80282497ca456d422c908ea93d77deb5e9ed8644756576411165a26,2023-11-07T02:55:44.053000
|
||||
CVE-2018-19777,0,1,6ff601158325738a1ef43d94d6e95a793f653e7c31c11302eaeeff775a0ce3b7,2024-09-12T17:15:03.700000
|
||||
CVE-2018-1978,0,0,4a558931e0d8260f803b024b0d9bf70dcefc453b3011fc27dbea02bfc86d1f27,2019-10-09T23:39:27.870000
|
||||
CVE-2018-19782,0,0,2209a5e3878265408c54f91ee624ec51bae3ee99a8d24775470fa6c75c25b2c6,2019-01-30T17:58:04.513000
|
||||
CVE-2018-19783,0,0,babb6cd01eac6e1917ad4555673734989180b94fbe611d4c2c2eee79811283df,2019-03-27T17:26:20.477000
|
||||
@ -119593,8 +119593,8 @@ CVE-2018-19876,0,0,bd7257880582194ee30e0eaa0398eac2c7e849e2254c04fdf42a58ca66c1a
|
||||
CVE-2018-19877,0,0,b8296caa1b998bef50a9f1696c6fd66885b47e195becab23cd6590a23b57f675,2018-12-27T17:19:37.770000
|
||||
CVE-2018-19878,0,0,9088408490ca5198c36f7460a62a71620ba6019b88d212ce0f35705cd605c5d8,2019-06-21T16:36:31.940000
|
||||
CVE-2018-19879,0,0,3d6d26695399e9f41637d1b2c3e11877ded92a9e02a35fe9a1dc41dbbf76e1be,2020-08-24T17:37:01.140000
|
||||
CVE-2018-19881,0,0,e9d1cabb7d3d1d2541c32bea484cff84e1f1083b3fe099f57bdb11637800e7e0,2023-11-07T02:55:45.590000
|
||||
CVE-2018-19882,0,0,837ac35baeaca4a2e9fb1844357143803902a6fc540475b71ec6fa8e2ab89772,2023-11-07T02:55:45.653000
|
||||
CVE-2018-19881,0,1,d4f23fca009e3aa44c14c85f7bc286a485ea8d4c191d04e1cdf5c3cf8f064714,2024-09-12T17:15:03.807000
|
||||
CVE-2018-19882,0,1,9aa39022ccbb2561f1a1a371677c67572d3c9585e4cb8106ec05294a15fab099,2024-09-12T17:15:03.913000
|
||||
CVE-2018-19886,0,0,a85a0096d30ab1f315d45d65bceac5d8326d930f4544d19ec015e6d863f97efe,2023-02-03T21:04:08.397000
|
||||
CVE-2018-19887,0,0,12017df69c9430cf0d0d2a8c6ca9aaadaf69ff8b9382cecb191020e005427c5b,2018-12-28T13:44:15.497000
|
||||
CVE-2018-19888,0,0,6104e9d7a98bda3ce6066ada4c46e30e3cedd6720a37be30fa3eba74583f91f9,2018-12-28T13:44:19.587000
|
||||
@ -124044,7 +124044,7 @@ CVE-2018-5682,0,0,47396987299b8b3b5e1c9edb11b9078830fe3698a6206c60e25e451f62b19a
|
||||
CVE-2018-5683,0,0,76c17eb3b870fd0bf422efe1850399106ab13d2194888814b8596e6be1599795,2020-10-15T13:28:17.440000
|
||||
CVE-2018-5684,0,0,8cb6121b7e914886fa8d6ecff753c763f9f72bb8278b71a3ba17c42a42f8e002,2018-02-02T16:04:34.173000
|
||||
CVE-2018-5685,0,0,1feeca8fc1bc02a8ec2a414e107223e4a5c7f9c8c69133961540c5209e4770ad,2019-10-03T00:03:26.223000
|
||||
CVE-2018-5686,0,0,65f2233a6c7733a1bb563eb6f2f473724da4b51c3c3370ab3934ccfba4b827e0,2020-01-30T18:05:04.663000
|
||||
CVE-2018-5686,0,1,7f4700803871364825d59c011846acaf2bc905cc20365576e640e831e96f2774,2024-09-12T17:15:03.987000
|
||||
CVE-2018-5687,0,0,cfff31b4a7c11c3643857271d20fa464e26fc2fce099317cb66d7287700813a5,2018-02-02T16:56:20.080000
|
||||
CVE-2018-5688,0,0,19ed16cde0bfcc858f651ca9135c348ce7293fb8fff736bad637c75e8cc13fb2,2018-02-05T21:45:16.563000
|
||||
CVE-2018-5689,0,0,b5af826fd9582ff3d5f839bfb0a8fc45258121f0b12bff1edb5b41eabd06f948,2018-01-31T18:30:45.803000
|
||||
@ -168729,7 +168729,7 @@ CVE-2021-22505,0,0,675e854cabcaeacf3b78a58593a856837df3f64f635c2f4dd4c947fa88d2f
|
||||
CVE-2021-22506,0,0,7377ec998ae060ed34b511d8dd7b1645447b5531a985bd6c0ecd5db299ab8c1d,2024-07-26T20:01:47.710000
|
||||
CVE-2021-22507,0,0,49a8df4354221c1d979c5377b3f9b1248fa19b8c379d04eb8b6a4dc3660b49f5,2023-11-07T03:30:15.790000
|
||||
CVE-2021-22508,0,0,67652588d6598b9dba62407096c17326f8c4c524d1709ce1b654eeddc41e3e93,2024-05-20T13:00:24.667000
|
||||
CVE-2021-22509,0,1,45c1433e689547227726662bdca4754fdcaffc1bb813ad8d9669da0eb0c812d2,2024-09-12T15:22:30.923000
|
||||
CVE-2021-22509,0,0,45c1433e689547227726662bdca4754fdcaffc1bb813ad8d9669da0eb0c812d2,2024-09-12T15:22:30.923000
|
||||
CVE-2021-2251,0,0,4286961cf0137de4568c5f4c5b69bb31850c9f2bab612da4f72c39c76dba0177,2021-04-29T12:58:39.193000
|
||||
CVE-2021-22510,0,0,dcc596e7382beb136aa69c33e161a613333c65851d59175ffc16ad5915f58f7e,2023-11-07T03:30:16.050000
|
||||
CVE-2021-22511,0,0,f41f49f6ec16503a60944cca593f738d35701c43b2681c82c497e647c5c624c7,2023-11-07T03:30:16.310000
|
||||
@ -168750,7 +168750,7 @@ CVE-2021-22525,0,0,296450ca1e1233adcf3143ac5bdea72d2264725eafb87a4c07a15b7b7e801
|
||||
CVE-2021-22526,0,0,e31e530327ad3bebc011bfe3d7d9a24dcf8f77efdd622cf1af58a96cf7283010,2023-11-07T03:30:19.707000
|
||||
CVE-2021-22527,0,0,bc0c2ffc8677e4ec8b64c8e43d2a38fc47ca1cbe2713f899b24a62400ab1a12f,2023-11-07T03:30:19.927000
|
||||
CVE-2021-22528,0,0,5bf59e7d54e0ee9528364054296e2d9a2de193e1d8cb55d017d3177f24ebff26,2023-11-07T03:30:20.143000
|
||||
CVE-2021-22529,0,1,7394ff287ac4cce16d1cd97d869612465af7e01e7b2e7aed1a1c341a8ead78b0,2024-09-12T14:55:31.813000
|
||||
CVE-2021-22529,0,0,7394ff287ac4cce16d1cd97d869612465af7e01e7b2e7aed1a1c341a8ead78b0,2024-09-12T14:55:31.813000
|
||||
CVE-2021-2253,0,0,9e2be9bb813a2e3899ee4a36c9db4012f6aae0eed717889a70a4a84f203004b0,2021-04-29T12:57:58.230000
|
||||
CVE-2021-22530,0,0,00e01806384084e8163bc8f5510cf7ff9efd69cfedee055cdd090e19ae62e25f,2024-08-28T12:57:17.117000
|
||||
CVE-2021-22531,0,0,2ffef1a3095a1f67c14a48602d93f0c886d38c01b7653274771e69e8e9e12dcb,2023-11-07T03:30:20.380000
|
||||
@ -180324,9 +180324,9 @@ CVE-2021-38113,0,0,a1fa7ef31580e0e2fae651fffb9fa372b4cee32d23a47ce868d9acaf00240
|
||||
CVE-2021-38114,0,0,f5bbfabbe38c5644e8cd21108a48b05b9d6c1f858bde8c7bb7493de97f4f5d70,2023-11-07T03:37:13.900000
|
||||
CVE-2021-38115,0,0,0d4529d2dc20d029bb9ee8663c7b78d5bfa9be575f5879ed777d4526582a3d07,2024-04-07T01:17:53.337000
|
||||
CVE-2021-3812,0,0,afacf08a6926dd761cd14ea7be38b0c773f7d4e31838aabc34b4a238033af577,2021-09-28T02:32:32.737000
|
||||
CVE-2021-38120,0,0,c4d3d2007fda774ae5dce33557525b106d9347eeda948f9121626daac0306b9c,2024-08-28T12:57:17.117000
|
||||
CVE-2021-38121,0,0,7af46a1fe507acc66bc52087f8889865a9e583d0432869b8c31b39e0930bd1a6,2024-08-28T12:57:17.117000
|
||||
CVE-2021-38122,0,1,c35b5e4ca68e4ae920718e14108be3a5dc7334324b8910186d07de2161762de3,2024-09-12T15:05:51.547000
|
||||
CVE-2021-38120,0,1,7c6006ec47a6020566ff154e2d8b43e710a4eb8ac69dd341c782be4ec8810ce7,2024-09-12T17:41:59.920000
|
||||
CVE-2021-38121,0,1,bfc8d90428d775df14e892ef7b1323b36eb185b6f3466739755182e26f7b5cf3,2024-09-12T16:16:45.357000
|
||||
CVE-2021-38122,0,0,c35b5e4ca68e4ae920718e14108be3a5dc7334324b8910186d07de2161762de3,2024-09-12T15:05:51.547000
|
||||
CVE-2021-38123,0,0,733f1d31597cbc536fab4d2ae9084a85932eb1447339cd96f79697cf7ce2cf3d,2023-11-07T03:37:14.523000
|
||||
CVE-2021-38124,0,0,f2fcd4839f48ca621d12d11b2f6b8169a58cfe9389901fc30c449c923b2bbef3,2023-11-07T03:37:15.587000
|
||||
CVE-2021-38125,0,0,cca5fea4853ef2eaacee614aaf6f07a8d197ea57c437239ce440cbbd8a6e3f17,2023-11-07T03:37:16.490000
|
||||
@ -185195,7 +185195,7 @@ CVE-2021-44416,0,0,372a7a47904a006de375c34cee672a832db0dfbab964ded7dec098507fa57
|
||||
CVE-2021-44417,0,0,9c36d12be034c139930a87f51b578ba028993c44da9104d4c126e6bba02ffd2c,2022-10-25T17:30:47.387000
|
||||
CVE-2021-44418,0,0,648d66faa7f00266afc7968ca015d44a8fb0bd01a7644bca834c8ee2dd52940e,2022-10-07T17:27:03.357000
|
||||
CVE-2021-44419,0,0,bd976456f08eed6a2c5c817220dcab8a42904ee48415770dd148ee6a19ed6a4a,2022-10-25T17:30:06.647000
|
||||
CVE-2021-4442,0,0,0df992d5c7f036f90bd8ef19071729e4daa3bc825e896af6b84dbd7cebe8b362,2024-08-29T13:25:27.537000
|
||||
CVE-2021-4442,0,1,ab6be27f24926a482d6e413b3a9dd1b8bc18149a66ebd9e946532c41bcc5aa10,2024-09-12T16:58:07.427000
|
||||
CVE-2021-44420,0,0,a602170b9adad3b521d3da8453af30ed03e707b53334cbc72e0352c14922570a,2023-11-07T03:39:38.700000
|
||||
CVE-2021-44421,0,0,1476e1370ffcc53e6e2d74dfc9f360009856c28d2e2306f672b781fbbed28609,2022-03-15T15:22:28.337000
|
||||
CVE-2021-44422,0,0,68849cc8e1629494b81252315c457dc197d34a62815659c7039c6e8862cb146d,2021-12-27T20:24:38.683000
|
||||
@ -202529,7 +202529,7 @@ CVE-2022-35555,0,0,54dd80abd32f1b045b99445ad8a17b6e26366f233f98bf175b2ec0d82094b
|
||||
CVE-2022-35557,0,0,a26a613f14b6013c2adebb7757bc05b2e82720db64bf863f9777cab0ab7acad0,2022-08-16T14:50:03.940000
|
||||
CVE-2022-35558,0,0,85d270bf05e5de9a8abfe49de3e5007366b5142b7b88a679442802bae082e824,2022-08-16T14:50:37.237000
|
||||
CVE-2022-35559,0,0,ad484c442f27b298d07835a74a3872b2a9074daf4041cd8517e66c509d578008,2022-08-16T14:52:03
|
||||
CVE-2022-3556,0,1,6860859eb0b25a33790f5c242078b2a7a28c62255d70382572a669a4a702de73,2024-09-12T14:30:58.577000
|
||||
CVE-2022-3556,0,0,6860859eb0b25a33790f5c242078b2a7a28c62255d70382572a669a4a702de73,2024-09-12T14:30:58.577000
|
||||
CVE-2022-35560,0,0,ad411e1a4c9e75e590e9900fe20e530d5834900e4c78eb482c3cc47a349779e7,2022-08-16T14:53:02.307000
|
||||
CVE-2022-35561,0,0,2b87c7f060bbe3f8bee04908b1ca80cd11fc98e51c654001a9f356f5ab3b0cda,2022-08-16T14:53:31.823000
|
||||
CVE-2022-35569,0,0,60515d9ccf8c6a0e62faa38e7539e843741fe488d102594b0eeec3196f5d3a93,2022-07-27T17:19:13.727000
|
||||
@ -204766,7 +204766,7 @@ CVE-2022-38379,0,0,9eb70de0c72565c49201ab1fc48e6de31cbb23bd0ef17c431d4cd96f5e78e
|
||||
CVE-2022-3838,0,0,b6c87f6371b3c42529104fa7683905834b7f4d26db23a4d8470e1e7da69bdcdb,2023-11-07T03:51:51.887000
|
||||
CVE-2022-38380,0,0,bd883f9c774317159de2534f7103c0f6276317266728ea8b96d8dc126654e307,2022-11-04T14:56:46.817000
|
||||
CVE-2022-38381,0,0,33ab62a56155391eb2d41b3ba9666f38dda60cd0a3cd9ef1e728baa24c1b8bac,2022-11-04T15:03:40.800000
|
||||
CVE-2022-38382,0,1,3caf80f95152461b2bbfefb30d37536b3ea8031842563d7040c007dde28ad6c6,2024-09-12T15:37:51.147000
|
||||
CVE-2022-38382,0,0,3caf80f95152461b2bbfefb30d37536b3ea8031842563d7040c007dde28ad6c6,2024-09-12T15:37:51.147000
|
||||
CVE-2022-38383,0,0,c6f707ee147e1c14c9059720db840b81389d2405c75180fb0f2c0e4d4d08569f,2024-08-01T17:57:30.093000
|
||||
CVE-2022-38385,0,0,e5ce73aa67e344471446b9267cebeab2bedbacce8ae377f39c844e85d6dedb4e,2023-11-07T03:50:07.243000
|
||||
CVE-2022-38386,0,0,cd5b6a6598df693531015e8583f683aad3b24e500fbcaa6ba22ce0152abd819c,2024-05-01T19:50:25.633000
|
||||
@ -209880,7 +209880,7 @@ CVE-2022-45280,0,0,dd48ae4a337a29dedb0da94bb275f1b511181faf6aa6b0b03a0b432586ed3
|
||||
CVE-2022-45283,0,0,8fb1ca8fbc8b78b46c1cc9704b85fcd0bcb62515874d297dbc58d4f996229a22,2023-05-27T04:15:22.423000
|
||||
CVE-2022-45285,0,0,98469622e68d7b7b4f0593bd1b0b6280c3b54f83b534d00bbb34748245e2d667,2023-02-22T22:30:01.127000
|
||||
CVE-2022-45287,0,0,4507538752624b6694a989860cfcc119cc790a2c88190e10e866db826d481d73,2023-06-28T17:33:09.597000
|
||||
CVE-2022-4529,0,1,827c341bcb5157de19eaff9964c0b04d1ad630d5feabbb5239a55c196957621b,2024-09-12T14:29:03.923000
|
||||
CVE-2022-4529,0,0,827c341bcb5157de19eaff9964c0b04d1ad630d5feabbb5239a55c196957621b,2024-09-12T14:29:03.923000
|
||||
CVE-2022-45290,0,0,1574103282ae0ba4c544426a685aefbe2bca03b480d5c7259efeea41df9cc296,2022-12-12T17:40:32.867000
|
||||
CVE-2022-45291,0,0,744b5c2cd77ef0b567a922de6e418842cfc53f9b272dffaa39d394499f5cc9e1,2023-05-04T19:57:26.577000
|
||||
CVE-2022-45292,0,0,464c0966b0e0b437ee2cdd1bbe16fe01734b7f530f9395828bb2786e8d86fe64,2022-12-13T00:36:18.090000
|
||||
@ -212444,8 +212444,8 @@ CVE-2022-48898,0,0,9d5dd8e327564f897f54b9b96edffffc8bfcf745dcbb3b6158a8c1b6ec465
|
||||
CVE-2022-48899,0,0,b259a9d35504eacb9390e4c82acd7d334eb4dd0d897a0af2ebaa062eea49f3a9,2024-09-11T16:22:26.583000
|
||||
CVE-2022-4890,0,0,6681cfa53e1bf5f370bc8c8bc62693e3d5b22cda3aa6b9f40531dae97a716dfa,2024-05-17T02:17:01.647000
|
||||
CVE-2022-48900,0,0,3d3abc510bd2bdcb727ecba5ff8ee20443365f0e7442b7ce50fe28fe2c089d32,2024-08-22T08:15:04.233000
|
||||
CVE-2022-48901,0,1,8f3f220ebd5cd5dabd5d5f6f89faab641ff2958472a57e8bd94c79e8f761227c,2024-09-12T14:05:35.127000
|
||||
CVE-2022-48902,0,1,25bb67eadd44bf8fb78f197e6e0494e0c319a2004c5b28c0cdd71455b92a4091,2024-09-12T14:01:44.523000
|
||||
CVE-2022-48901,0,0,8f3f220ebd5cd5dabd5d5f6f89faab641ff2958472a57e8bd94c79e8f761227c,2024-09-12T14:05:35.127000
|
||||
CVE-2022-48902,0,0,25bb67eadd44bf8fb78f197e6e0494e0c319a2004c5b28c0cdd71455b92a4091,2024-09-12T14:01:44.523000
|
||||
CVE-2022-48903,0,0,075f468f96cfd244098a03984ad1bc5d8eafa109acdf3d1fcbe6d48dc2a8d6f9,2024-09-12T13:58:48.473000
|
||||
CVE-2022-48904,0,0,f02beac0acb507eb492011f9936eac015b9f07536ccf213556f84d686cf19d34,2024-09-12T13:55:34.123000
|
||||
CVE-2022-48905,0,0,87f979d82f30ebdaf7907a93f1fe7e9d6135ba45f78bf986e8ab97814763e212,2024-09-12T13:44:45.753000
|
||||
@ -219726,10 +219726,10 @@ CVE-2023-26318,0,0,d49830620df46f2dde3da449a5ab4d59351f38e41e437bccf559cb5c96c8a
|
||||
CVE-2023-26319,0,0,3dd6441fbb2cf89b0e957e6f3f556dd38ea034f50ae932ae756d43f14248f8cd,2023-10-16T19:02:59.867000
|
||||
CVE-2023-2632,0,0,301898869b5a60457376f20e3b7ea036dcafa847ec705a351ca3cee971a25c85,2023-05-25T16:08:28.660000
|
||||
CVE-2023-26320,0,0,ce18ada0dab81b6e3cbb23f236fe2120ff674b38177ae9eb5db23adbd1986f1c,2023-10-16T19:04:10.920000
|
||||
CVE-2023-26321,0,0,b75b605fdb8ac99bba7cd33bc5a27b0464761915d8e051cc7391f87c31191bc9,2024-08-28T12:57:17.117000
|
||||
CVE-2023-26322,0,0,ae8c5667c11735312321cb181d2196f18f33751c8d17700350b90e39fb0c2fbd,2024-08-28T14:35:02.847000
|
||||
CVE-2023-26323,0,0,484add0c04d4a78cede6c93a8c8952694f596119aecb48ac15eaa55dd3b75254,2024-08-28T12:57:17.117000
|
||||
CVE-2023-26324,0,0,8b1c94ee76ce1b7d9628f12727c64bd99e209245cf657c110e5b9f5e4629b4f9,2024-08-28T14:35:04.193000
|
||||
CVE-2023-26321,0,1,d33084a4619b34020e5cad70ec2c1cf000cd57168b5863ef38a39364048a08a8,2024-09-12T16:29:14.277000
|
||||
CVE-2023-26322,0,1,7bfce7769c57a91c13e4f0ae7c8ba9525aa8629acd1f5559ebc1673e457d1d75,2024-09-12T17:27:10.637000
|
||||
CVE-2023-26323,0,1,7d157615101d10b408ff5af4493116b92ed7ccc634823db09988eba40db04634,2024-09-12T17:22:31.193000
|
||||
CVE-2023-26324,0,1,f0566e65924efd225beb51622ade22fc5edf7560c5ec39e261da9dae7fe7a94c,2024-09-12T17:27:12.117000
|
||||
CVE-2023-26325,0,0,0815d0f5538437b0c1a37e2d30e66d4594a1f33bad8ba20cf36ef6d2f6c24077,2023-04-13T20:15:09.657000
|
||||
CVE-2023-26326,0,0,7a94421fc97dc2e69220f52c8149f79ba5e3f607156d057693f823cb0ba1ecd2,2023-03-03T16:46:29.717000
|
||||
CVE-2023-26327,0,0,1cc55ebadf8900607cbb779734840e485cf992ab645ea88d7f35d67b7049a018,2023-04-03T18:42:37.320000
|
||||
@ -228398,7 +228398,7 @@ CVE-2023-37828,0,0,bf6a1407c8b34f46c140cf1a2f9b73c79c4d85d3b34c5cf464bd96d03c099
|
||||
CVE-2023-37829,0,0,4e3024f184f6c79c43d20da08e3015e450fa53465ecc48ef44006870903af901,2023-09-07T13:03:28.967000
|
||||
CVE-2023-3783,0,0,632e03463e5006933a845fca75e703681bf8efa47d5bce9e8e8afdad626c1b2d,2024-05-17T02:27:47.243000
|
||||
CVE-2023-37830,0,0,618747257c0fe30bcb989a9dbeef6c8e17afa497ae818f4be6defc128f575805,2023-09-07T12:58:00.423000
|
||||
CVE-2023-37831,0,1,8001b5e1a8e92daa387401dfc409ca74fab192f55f8c78a6c4244a6cde8e473b,2024-09-12T14:35:05.870000
|
||||
CVE-2023-37831,0,0,8001b5e1a8e92daa387401dfc409ca74fab192f55f8c78a6c4244a6cde8e473b,2024-09-12T14:35:05.870000
|
||||
CVE-2023-37832,0,0,ae2d69a4488ceb1c8be012aed4d2ed85b3c5c81415777316f1e364f31a6ec92b,2023-11-08T18:16:33.060000
|
||||
CVE-2023-37833,0,0,157f6c3a403e63b59a54cea4bfd76586c9515a0df4218d8ec5b111168ec50972,2023-11-08T23:09:11.267000
|
||||
CVE-2023-37835,0,0,4b792765894220971f4886dc774ec100596558d9483d39c501bed264fe8b3634,2023-11-07T20:15:08.150000
|
||||
@ -229298,10 +229298,10 @@ CVE-2023-3884,0,0,082cb264ff5a70ab211c510fedd1897f7c990119b677602aa33773e5cb53ea
|
||||
CVE-2023-38840,0,0,452514f9b9b2356986e8beb24f51c7e9224b6a85e5b75a8d7e1584bb4d157947,2023-08-22T14:58:17.927000
|
||||
CVE-2023-38843,0,0,e657cf40a1d798c726d7148667811c9550fb1ef28510a892e2f8120d2edd7183,2023-08-23T16:52:08.800000
|
||||
CVE-2023-38844,0,0,ff193c55c187072f96aca2f504742892510c2e1694b0794c192fe172313299c7,2024-08-29T20:35:14.163000
|
||||
CVE-2023-38845,0,1,9197e582cec346db6e961671f9951df06bdedf541c22494133dc3ba63b5da72e,2024-09-12T15:35:33.573000
|
||||
CVE-2023-38846,0,1,9e734f347c011f35ce479609ffdbe0eeb9e9f5ad63675525e8b0641a94f7058e,2024-09-12T15:35:34.370000
|
||||
CVE-2023-38847,0,1,ffeaeb25d9f6ec36a28795714b2364023fbbe5826dd1053bb7efbab8bcd9ac0e,2024-09-12T15:35:35.200000
|
||||
CVE-2023-38848,0,1,772b0e4f131dc937392f438e6f03452b93e2bc4bf5ad6de6bbfaaeeba7a136d7,2024-09-12T15:35:36.227000
|
||||
CVE-2023-38845,0,0,9197e582cec346db6e961671f9951df06bdedf541c22494133dc3ba63b5da72e,2024-09-12T15:35:33.573000
|
||||
CVE-2023-38846,0,0,9e734f347c011f35ce479609ffdbe0eeb9e9f5ad63675525e8b0641a94f7058e,2024-09-12T15:35:34.370000
|
||||
CVE-2023-38847,0,0,ffeaeb25d9f6ec36a28795714b2364023fbbe5826dd1053bb7efbab8bcd9ac0e,2024-09-12T15:35:35.200000
|
||||
CVE-2023-38848,0,0,772b0e4f131dc937392f438e6f03452b93e2bc4bf5ad6de6bbfaaeeba7a136d7,2024-09-12T15:35:36.227000
|
||||
CVE-2023-38849,0,0,7ea1d4699319115186509e7d15bffcd656d3de2a0061786cf9b170d98c962579,2024-09-11T19:35:02.600000
|
||||
CVE-2023-3885,0,0,346256803e6015564c007c1923f28009955d02721d2abddcbca5617f0b721d01,2024-05-17T02:27:56.590000
|
||||
CVE-2023-38850,0,0,ddd8bae1435588d60992e38b1dfa56c1cc4b6ce696296078d7ef0ffc4c05e8fe,2023-08-22T13:30:25.907000
|
||||
@ -229999,10 +229999,10 @@ CVE-2023-39731,0,0,db542271a824cb9d05840914758d30baeba58e2db3921b968e5c28fa1cead
|
||||
CVE-2023-39732,0,0,4f152494971a0e92525ccac8230401364b939183ed252e817052ce094dbffbb5,2024-09-11T19:35:03.440000
|
||||
CVE-2023-39733,0,0,7b550bfaba770810e663b70c0317ef7238c892e25f230bef49452e9ba583ddf9,2024-09-11T19:35:04.137000
|
||||
CVE-2023-39734,0,0,66cb613afb473b9c43e8faf6c870b3e66e8b837e6970cb145a7b6b6499bebbf6,2024-09-11T19:35:04.820000
|
||||
CVE-2023-39735,0,0,0e8f9cf010090b99ae5770a585ef1abe748196df33735f514919e721839c1c70,2023-10-31T18:47:10.027000
|
||||
CVE-2023-39736,0,0,b45a21693a831027d1c24e6ddd72e3a4914cafeb4b326c371393b0546b583260,2023-10-31T18:46:29.183000
|
||||
CVE-2023-39737,0,0,85fcb0e741ec9a44767ceb30057b73b2743141bc3523c8d6e6aeec3ebf013b5e,2023-10-31T18:46:19.250000
|
||||
CVE-2023-39739,0,0,259685396069f81b50b4b8348dd2ce06b24a699adf41c693af31fdc71073a530,2023-10-31T18:45:58.823000
|
||||
CVE-2023-39735,0,1,d03d53e4e94a3e32637abf17dfb565c1bd020d32299730ef6dd35b53ffc023e9,2024-09-12T16:35:01.147000
|
||||
CVE-2023-39736,0,1,7421a53cbb5a197c708fd062ba31c5924ac4e4db5fe0d6c881a0c0155eef58bb,2024-09-12T16:35:02.410000
|
||||
CVE-2023-39737,0,1,070393cd2c0fce27d8d6e85702b77cd52afbae1ed3ccec1215e900de82f285e6,2024-09-12T16:35:03.280000
|
||||
CVE-2023-39739,0,1,fa88bb708cbe9fa5160b4c90c9a0cbe68ede33ad2aded349e46537e8686f6e47,2024-09-12T16:35:04.037000
|
||||
CVE-2023-3974,0,0,8b688f456910f2cf7bfca891d7695f41910802751855ed9c01e20eacfcf7494b,2023-08-03T13:31:54.147000
|
||||
CVE-2023-39740,0,0,fad2dc8469ef56fed18f549197f0b0cf43c37cb949dd15dda2349f4bac0bba13,2024-09-11T19:35:05.497000
|
||||
CVE-2023-39741,0,0,7750f31bf1b9fd68df2b72799a10a05fc573a4363927f2defe47d863a35910cf,2023-08-25T14:15:09.287000
|
||||
@ -230392,7 +230392,7 @@ CVE-2023-40264,0,0,f7a83c86b7c4bdbb55bbbd88d882459ecf055d59ca4c58a5bc50d5b8349b6
|
||||
CVE-2023-40265,0,0,b59c543cc5b09af03e01ed9b9f3f9838d7903e246783bb57b9f4b1acf6f0f4cf,2024-02-15T16:00:56.367000
|
||||
CVE-2023-40266,0,0,8a54bbbbfd159b9c6bdc998a626464ca6764bb6d908665f4cc16e35354912fcf,2024-02-15T16:00:49.647000
|
||||
CVE-2023-40267,0,0,56572919214891c41bf23bf9a2a8facbc146568509a54758466f00ffb956e391,2023-11-07T04:20:10.150000
|
||||
CVE-2023-4027,0,0,7aa3b52c5485900c72a848ec40ca56646b88387bfd8211e66927ef6c0ab877c5,2024-08-19T13:00:23.117000
|
||||
CVE-2023-4027,0,1,48dd689c0965b18792f4cfccdc2c7158758924f1ef3e29f58ca27c4d96ee8917,2024-09-12T17:53:23.627000
|
||||
CVE-2023-40270,0,0,bfe775aa3824e231981669c54daa4b3626fdef3730529a7294f128db1bc3f6b9,2023-11-07T04:20:11.150000
|
||||
CVE-2023-40271,0,0,6b7cac9f3aa7106de89543b184fd87ed595daa98acee7e01c87cb1a2e5f2240d,2023-09-13T02:27:16.427000
|
||||
CVE-2023-40272,0,0,dc2163a711fa92f8bca2bd6cb8aeefb8d5caede053b4827a4026ffd948affedb,2023-08-24T17:00:07.203000
|
||||
@ -232662,7 +232662,7 @@ CVE-2023-43344,0,0,e14fdfeb61156b2c96ea7f9ecfd98c220cb0718e6e3b3b6539125c4c67722
|
||||
CVE-2023-43345,0,0,c46de3fecebad3f129c80a4e4bf46d6ac9aaf1f7fe76d9dbb5b60986a583e480,2023-10-27T15:13:29.200000
|
||||
CVE-2023-43346,0,0,a750d41ce2f42d6122eceec1e6768134d9dfa79dd9bae2c584c48ab746e3b85c,2023-10-25T09:54:11.453000
|
||||
CVE-2023-4335,0,0,3768dc96b0e0f82db9d8d26fd06c4ce7894a160ff7d6eccf3398b4865e036f89,2023-08-21T18:45:53.070000
|
||||
CVE-2023-43352,0,1,fff2c76577b63bd4638ac5ec70892c98d7195b44c39a3fdc0a104ada0a2211ff,2024-09-12T15:35:38.720000
|
||||
CVE-2023-43352,0,0,fff2c76577b63bd4638ac5ec70892c98d7195b44c39a3fdc0a104ada0a2211ff,2024-09-12T15:35:38.720000
|
||||
CVE-2023-43353,0,0,6810287ac5359552ba48c9b5be75b218bd7b822b83bd59379b45e32152af3860,2023-10-25T09:55:23.023000
|
||||
CVE-2023-43354,0,0,218d273d7c27ef15c0cb6e46a796efe360114facafc61ab9dbbc505367ac92bc,2023-10-25T09:55:06.573000
|
||||
CVE-2023-43355,0,0,c4b117c9804944c75cd5dc5b66ef9822dd7d587eb07f60aff552edf28fd17ac5,2023-10-25T09:54:56.877000
|
||||
@ -233585,7 +233585,7 @@ CVE-2023-44771,0,0,759f5caa4ff312adc1844eacc372b48edd64e9bbd76e6d932dfda8d616c83
|
||||
CVE-2023-4478,0,0,5348235a48a55f31c4572d4018dc627b4d33591f8c27dad039edc84a4b665d59,2023-08-31T17:44:40.807000
|
||||
CVE-2023-4479,0,0,6818bfd5bbc7a4a78de9639bab341181d3652d7bc8d8f1a6a93b644473398db0,2024-08-28T09:15:09.450000
|
||||
CVE-2023-44793,0,0,94e699c7a5c1e5050c78917e026942966ba2334ee7cc3325919c619a07556029,2023-11-07T04:21:40.633000
|
||||
CVE-2023-44794,0,1,44795488961ab454b7c5d150748d935e69cf855973febc03e5526823a71329a8,2024-09-12T15:35:40.080000
|
||||
CVE-2023-44794,0,0,44795488961ab454b7c5d150748d935e69cf855973febc03e5526823a71329a8,2024-09-12T15:35:40.080000
|
||||
CVE-2023-44796,0,0,4682972f268622535ca980cffce83dc3b08ecad74ff376fd2971fa55a6a27574,2024-01-10T03:15:43.313000
|
||||
CVE-2023-4480,0,0,8f720a32700f0dcf88298f81723ae2c513370bf9c361e1a327c21e8404982fd9,2023-09-08T17:26:45.223000
|
||||
CVE-2023-44807,0,0,cc9fa087fd498d5c0142310406c2f8e5ac715823650cae019eedc78dd30884f7,2023-10-10T20:16:41.627000
|
||||
@ -234305,7 +234305,7 @@ CVE-2023-45862,0,0,a3fb90f83c4489594bd26a84b93eb5897361e2bdfb615fcafc80fdd37f3c6
|
||||
CVE-2023-45863,0,0,cf6fae54a14f38a06c16e080afb9ebbb51eb002a14bcbc450a25d2e79b041be0,2024-01-11T21:15:10.273000
|
||||
CVE-2023-45864,0,0,49d0683abe5283d204b1632f92af572fad99867fbce0bd9d10ff82475a42f2b9,2023-12-15T19:18:31.150000
|
||||
CVE-2023-45866,0,0,d3ec482177bb59545008c255cf987cfa8286ec66b1b42630424b6b7203f4a174,2024-01-05T13:15:08.603000
|
||||
CVE-2023-45867,0,1,0314c515880fb017d31649ac97dfd1a27739fb723da54b4f85c7ca0a77c36aaa,2024-09-12T15:35:41.190000
|
||||
CVE-2023-45867,0,0,0314c515880fb017d31649ac97dfd1a27739fb723da54b4f85c7ca0a77c36aaa,2024-09-12T15:35:41.190000
|
||||
CVE-2023-45868,0,0,df1b586624033c287b172839b213cbc8ec979ba18d71fde3b01da0f77fe96b10,2024-02-22T19:06:44.663000
|
||||
CVE-2023-45869,0,0,ae0033b8875e66831bd0fa49aa37f059d0cc638339d10a85f589d8c5031628cb,2023-11-14T17:40:53.637000
|
||||
CVE-2023-4587,0,0,2d9161b0ba4b4b9f51444521be9ee96176e07c56f44d6bd3c1d677910159fe30,2024-08-02T08:15:22.973000
|
||||
@ -234374,7 +234374,7 @@ CVE-2023-45957,0,0,6175ce3b1e45971f6e2a2c9f88c5f21794d52c1769ee81bdac848e9039848
|
||||
CVE-2023-45958,0,0,c6fef7bc85dc9c8a2330a16c9a8490d558f33ea61ebf1ae9a20b3868c37cbe7a,2023-10-25T15:02:45.697000
|
||||
CVE-2023-4596,0,0,c074b782ca2a76b4fa42b4223ff71f26324c1a7e580e997dcd7c87a76f0fee3f,2023-11-07T04:22:46.670000
|
||||
CVE-2023-45960,0,0,b60ca086d7e781b599600f55c001e52e60402b7c8b53d659fb0d7e14822742ac,2023-11-22T16:15:09.180000
|
||||
CVE-2023-45966,0,0,5770c23d7a1055925da75e30237365daf9b25eb3ab24d68eff7bd1883a3acb1f,2023-10-30T11:36:04.983000
|
||||
CVE-2023-45966,0,1,e394c87cd748b674315d6db998b2dff0e6bff7bbdb77467fc97e80093731d69f,2024-09-12T16:35:06.080000
|
||||
CVE-2023-4597,0,0,37f4e825d223bcac78b0fd4971391bf181b167c9f77973cf513b20328d557be7,2023-11-07T04:22:46.810000
|
||||
CVE-2023-4598,0,0,30ecfcece6a135395d77ec5bd149a9e9f7764624b99ed4b4eb6f0fdef4a87984,2023-11-07T04:22:46.967000
|
||||
CVE-2023-45984,0,0,3350883358c9cbe745683f8800ad354769be613f75b3c9d0bbff66cfa5d239b5,2024-09-12T13:35:15.987000
|
||||
@ -234612,7 +234612,7 @@ CVE-2023-46266,0,0,0cca64c4da0074c979fd0ea9f81014c10bea066b722fef62e45896591292d
|
||||
CVE-2023-46267,0,0,56d82f2136293ec805643b7aa2c34e057834346a4d6f8a282f29d606a8893e13,2023-11-07T04:21:53.713000
|
||||
CVE-2023-4627,0,0,c3f215d7266421d11303f9b598a6cce58aa44785825679007cc56bf5ea031cd8,2024-03-12T12:40:13.500000
|
||||
CVE-2023-46270,0,0,a78f63a0a6ef56712302cf2b6a08a466f7d890fbbfb5f306dc50afda07c2bc31,2024-04-30T13:11:16.690000
|
||||
CVE-2023-46277,0,1,be6fe4d0b7cb70dd6214423a62fcfe115996bdd636e939e24cf7a25f94904c74,2024-09-12T15:35:41.900000
|
||||
CVE-2023-46277,0,0,be6fe4d0b7cb70dd6214423a62fcfe115996bdd636e939e24cf7a25f94904c74,2024-09-12T15:35:41.900000
|
||||
CVE-2023-46278,0,0,283a5f4d3b1f995039a2ae4f0ff4efe94da460721819375532b8f8104a5b1ff6,2023-11-08T23:22:08.177000
|
||||
CVE-2023-46279,0,0,cad5cbf92c67be5e79c0f7d5a9fbe732104c543f1cf9a464893a67bc498495cf,2023-12-19T17:40:49.427000
|
||||
CVE-2023-4628,0,0,9dd80f318e00bb6d35ea5e4f6175e104ad476846cbe758532913d6d17d532560,2024-03-12T12:40:13.500000
|
||||
@ -234648,7 +234648,7 @@ CVE-2023-46313,0,0,59a05b9f3e3499434a9cd3bbbc14eb4c6cf3c8f415b66a8709f39690dfb66
|
||||
CVE-2023-46315,0,0,2bc011068680b0a8fb9e53f4ea1b475f4d82ff44a301e51f40b82156f4195ce4,2023-10-30T19:09:47.337000
|
||||
CVE-2023-46316,0,0,3c376a76d803d7925f6a44c2a01182f2c03d5cd7f395048cd866af0f844b7ef7,2024-07-03T01:42:02.420000
|
||||
CVE-2023-46317,0,0,5d790ea76648f325f5cd13aad0596c2c993f7cd4154bea2daeb5c0d77ee8735c,2023-11-01T14:29:58.033000
|
||||
CVE-2023-46319,0,0,62934f46c5682cc932e84c7352481a3e3afa70a64e8c2a3e97c82694978731dc,2023-10-28T03:24:08.903000
|
||||
CVE-2023-46319,0,1,658e6a4a05f3f168b5f0380546d431a26831ec65a3eaae2cd377d55f9731e5f3,2024-09-12T16:35:07.170000
|
||||
CVE-2023-4632,0,0,434b8e050518df858df551bf005d8fda536e823ef37132c3577d7214c10cd447,2023-11-16T17:33:06.617000
|
||||
CVE-2023-46321,0,0,5a3e9cfed927d1f3d2ab17d84f30d798fe499f217a80cc3731ba359a90816b73,2024-09-11T21:35:04.030000
|
||||
CVE-2023-46322,0,0,f9269c3e7bced6d22bc2ac5edf05f8f7d35b5da29d4d7c900d61ed8c03ca5ef9,2024-09-11T21:35:04.767000
|
||||
@ -234701,7 +234701,7 @@ CVE-2023-46386,0,0,ed3371f1b68dd0ea202a314511605831267cce9e9adf81b603f147a07204c
|
||||
CVE-2023-46387,0,0,8909e4e6027bceb8d25cfe981ba526efce9f661777a2154ed032efdeacf43fda,2023-12-14T08:15:42.770000
|
||||
CVE-2023-46388,0,0,8190be35a3b345538acc3354fcd61fe26280e3abff77a39556a10284b12b4d0c,2023-12-14T08:15:42.987000
|
||||
CVE-2023-46389,0,0,580ab66b7131dede6fb282d42df59a76c2bde1dda748a78e2c687f185e5e8319,2023-12-14T08:15:43.187000
|
||||
CVE-2023-46393,0,1,ddccba58ba518df9c7b69b1f4bedd8c88454a3b9557da36fba8ad9c40f0bdd93,2024-09-12T15:35:42.627000
|
||||
CVE-2023-46393,0,0,ddccba58ba518df9c7b69b1f4bedd8c88454a3b9557da36fba8ad9c40f0bdd93,2024-09-12T15:35:42.627000
|
||||
CVE-2023-46394,0,0,a4de4800ba9072f54d1bc0271928ac028c9cbec6c3baa0f74abcd72cfb575146,2023-11-03T21:34:46.077000
|
||||
CVE-2023-46396,0,0,74f481bd37b42e6c5810d0851c91d8d9d55975de01fc2eeba4f5140ada061430,2023-11-02T15:03:59.683000
|
||||
CVE-2023-4640,0,0,ef517ea28d5508716f101ef0a0cba846372ee2fe78cf6a3f47954c41f51018f6,2023-09-05T15:22:15.190000
|
||||
@ -234776,9 +234776,9 @@ CVE-2023-46502,0,0,d3babc7cf842caba025a854cc8650858396278f2df3b763f1a40e3007bb10
|
||||
CVE-2023-46503,0,0,6aad2b11adbdf63ee2b98f2f9874d22294e8a21b124457d8975e7ab396baabb6,2023-11-03T21:50:17.803000
|
||||
CVE-2023-46504,0,0,b1a792f6a001c3d4624673f603358c1faf3cbc35add3c27ad7ea5f5fb8811653,2023-11-03T21:49:46.150000
|
||||
CVE-2023-46505,0,0,73642bb3b3e8d529ba4d3c5fa261eed03dce9b0a346af67bd48472e1f53469b4,2023-11-03T20:05:18.503000
|
||||
CVE-2023-46509,0,1,1af3627fc1d236005c3182504e0bd51fe2b97fb35469ff44084fffdce0628b8d,2024-09-12T15:35:43.353000
|
||||
CVE-2023-46509,0,0,1af3627fc1d236005c3182504e0bd51fe2b97fb35469ff44084fffdce0628b8d,2024-09-12T15:35:43.353000
|
||||
CVE-2023-4651,0,0,5e40b8eb508a481ec27d34bd3bf988326bcfa73d1715fcd3bc452e4e1523793c,2023-09-01T14:50:55.347000
|
||||
CVE-2023-46510,0,1,bf712f9cf3d8f34dc25ce1740e093b9e206f31740e4413d03b57e112a7a603d5,2024-09-12T15:35:44.080000
|
||||
CVE-2023-46510,0,0,bf712f9cf3d8f34dc25ce1740e093b9e206f31740e4413d03b57e112a7a603d5,2024-09-12T15:35:44.080000
|
||||
CVE-2023-46517,0,0,b081a7170d3ca581d01a8ada8dfefe1c35f98b29ee4f5c66c49934bd23cc6bbf,2023-11-07T04:21:57
|
||||
CVE-2023-46518,0,0,50a6b72c9eca27d9118865834eb8eeb2d6571605663676a98cbc4bc277ffc33d,2023-11-01T20:15:22.357000
|
||||
CVE-2023-4652,0,0,5222738c738474475cc77f6118c2f194c8e026777ab00d0851e9cdbfda77bd35,2023-09-01T18:39:07.780000
|
||||
@ -238382,7 +238382,7 @@ CVE-2023-51708,0,0,0dfdbb5d7cb1389f759816e9ad4172bb998d429b0df64366077376582584d
|
||||
CVE-2023-5171,0,0,8948c3d814290078c1c43176052421493848da5536f54700b55247d4792fc4ee,2023-10-12T02:52:09.820000
|
||||
CVE-2023-51710,0,0,79ce6e5c96d55165aab5c91dac2a06a015fe7d1749cae928be620bf7f109c0a4,2024-07-03T01:43:17.330000
|
||||
CVE-2023-51711,0,0,f4ab5b198dd0eb861779e76dca93509630faca36266948295b7495303f7c685b,2024-01-30T21:10:53.387000
|
||||
CVE-2023-51712,0,0,a10a74aa9882ded5917b4cedaa6a07193461b8359913c6d3c43eb47668353217,2024-09-05T17:44:56.007000
|
||||
CVE-2023-51712,0,1,cacd0b8bc034830eb00cfed3668fcd538f144726f75a66645eb868f5914c8458,2024-09-12T17:11:22.360000
|
||||
CVE-2023-51713,0,0,fdd6a3aefaeb63afebacb6e639ea6879a7a88ac0ffa6f2349591e85a6c3dc899,2024-01-08T19:06:50.837000
|
||||
CVE-2023-51714,0,0,a476f3917c564d9c6b203fc32aafdf2c3833beb73f4e6eda8679d21661ce79ce,2024-05-01T01:15:06.390000
|
||||
CVE-2023-51717,0,0,0e2a37f76ad2a0357193c8d2d90c0f37b2227f38264031d1f3750abc9dcb17d0,2024-01-12T15:17:16.457000
|
||||
@ -239382,18 +239382,18 @@ CVE-2023-52900,0,0,620b8be36b8f2b58ff94b9a8f25827c3618e3fea7a6035146e1faae9c9b58
|
||||
CVE-2023-52901,0,0,c28d4e6473323a17dd90c14eabe37b54b6af385fb8bee09eb798db503194bd64,2024-08-21T12:30:33.697000
|
||||
CVE-2023-52902,0,0,b345f17ddc9484e396839ef01e7e490db98cc6cf2ec0ff1caae9c3d445b09c55,2024-08-21T12:30:33.697000
|
||||
CVE-2023-52903,0,0,d922c0b6c6ba3ec4c40fc116bfc41efaafcb21134cb7a8690210dc69e5586347,2024-08-21T12:30:33.697000
|
||||
CVE-2023-52904,0,0,6a62cac2e74e694a7019d2b3113a49f6f191f6af788282fe6177012b7b8b2079,2024-08-21T12:30:33.697000
|
||||
CVE-2023-52904,0,1,62544b3a8012d31e091228e7522ebe54f4eb49d347fb9beb25c7e58fc8e46ebf,2024-09-12T17:22:46.040000
|
||||
CVE-2023-52905,0,0,03dfd45469c5dbe0fccc3e21152dd6845f9d3290abc3f07c2476edbdd31ead32,2024-08-21T12:30:33.697000
|
||||
CVE-2023-52906,0,0,5be340f900a447b138c7a11c9c32330c21841a8c27915ba1003ccfb90f2f3116,2024-08-21T12:30:33.697000
|
||||
CVE-2023-52907,0,0,9fc91f9b6f469ee2c7d90e8be3c4bf2080716d7f1aa948d846045c5b2b5687a3,2024-08-21T12:30:33.697000
|
||||
CVE-2023-52908,0,1,531fb64c1bafc6ed44bf1e0f48c909a289409c64299751ace32af4157b44a112,2024-09-12T14:54:41.943000
|
||||
CVE-2023-52909,0,1,d5706817190bc5ee11d87d5ab7bd4d1a37d41b6be25533876d8fa9a349e63a04,2024-09-12T14:52:54.573000
|
||||
CVE-2023-52907,0,1,ad58a061f060cfc772ad70fe84fc42f9f57329722dd517b009a22d763de1643e,2024-09-12T16:06:17.460000
|
||||
CVE-2023-52908,0,0,531fb64c1bafc6ed44bf1e0f48c909a289409c64299751ace32af4157b44a112,2024-09-12T14:54:41.943000
|
||||
CVE-2023-52909,0,0,d5706817190bc5ee11d87d5ab7bd4d1a37d41b6be25533876d8fa9a349e63a04,2024-09-12T14:52:54.573000
|
||||
CVE-2023-5291,0,0,9fbf4165ef098167a71fe88b00d2bfc45902a0f6c10baa2f3dd4bdabd4d91739,2023-11-07T04:23:48.757000
|
||||
CVE-2023-52910,0,1,69eda1973b13cfadaf8b20a334fd599e0379ee79db2182529ec79266ddfae5a8,2024-09-12T14:47:08.540000
|
||||
CVE-2023-52911,0,1,8f960710719c78a6de7f250dad79de80fd560c1357dff4d16b798919567c9b16,2024-09-12T14:49:30.220000
|
||||
CVE-2023-52912,0,1,f73b559c46c779fc7572cade474bf3639785ae5be9b2a49b2309827f935357b8,2024-09-12T14:35:58.593000
|
||||
CVE-2023-52913,0,1,0dff51631ec1ab5b0464af1dd4af3149cc942bacf8d31e47da582f111f384c57,2024-09-12T14:38:40.430000
|
||||
CVE-2023-52914,0,1,3e2f63e6fcc2429a7a056b2f17033ece733c3917a2a011b1363b92bf8c84ed22,2024-09-12T14:07:17.137000
|
||||
CVE-2023-52910,0,0,69eda1973b13cfadaf8b20a334fd599e0379ee79db2182529ec79266ddfae5a8,2024-09-12T14:47:08.540000
|
||||
CVE-2023-52911,0,0,8f960710719c78a6de7f250dad79de80fd560c1357dff4d16b798919567c9b16,2024-09-12T14:49:30.220000
|
||||
CVE-2023-52912,0,0,f73b559c46c779fc7572cade474bf3639785ae5be9b2a49b2309827f935357b8,2024-09-12T14:35:58.593000
|
||||
CVE-2023-52913,0,0,0dff51631ec1ab5b0464af1dd4af3149cc942bacf8d31e47da582f111f384c57,2024-09-12T14:38:40.430000
|
||||
CVE-2023-52914,0,0,3e2f63e6fcc2429a7a056b2f17033ece733c3917a2a011b1363b92bf8c84ed22,2024-09-12T14:07:17.137000
|
||||
CVE-2023-52915,0,0,ce3c89a4bf7cab80e859d29c06c18dc19c9bdeb973ab832dffae6eeb3861fdf4,2024-09-10T17:12:41.607000
|
||||
CVE-2023-52916,0,0,5bbab86a5a2f596b1e1ed53b9221822f4b413f719a69472a8344983675045bd3,2024-09-06T12:08:04.550000
|
||||
CVE-2023-5292,0,0,214d7ae5654e29ed0e372211abf39e379cdbd830eab553609e162ffb791fd787,2023-11-07T04:23:48.910000
|
||||
@ -239731,7 +239731,7 @@ CVE-2023-5650,0,0,f6e0dc230c0b540535b0b9ebae2d319657337868df469dae78545850c2347a
|
||||
CVE-2023-5651,0,0,0a8a2bfd51bc8a7e45f7e7f896e8a88e87c7b037e9759e8639c46f9ebe17aa97,2023-11-27T16:30:23.423000
|
||||
CVE-2023-5652,0,0,0dc4a6ccbcf18205eb94eb075191d5829689d47529037094e238a68cef8bbe4e,2023-11-27T16:30:00.860000
|
||||
CVE-2023-5653,0,0,bd8fafc0cbf5d974cd3e86abf449c0cb7a4f03cf033b27e863aa08c089812366,2023-12-04T14:53:32.297000
|
||||
CVE-2023-5654,0,1,e307ffc3c443daefe760a1f786b6aac20080c65ed168c23ed909e1f3506c0a6e,2024-09-12T15:35:44.870000
|
||||
CVE-2023-5654,0,0,e307ffc3c443daefe760a1f786b6aac20080c65ed168c23ed909e1f3506c0a6e,2024-09-12T15:35:44.870000
|
||||
CVE-2023-5655,0,0,e756830a1ea64e50929cb41df3818e46d7b47e803847a9c5c85371b0c4620df7,2024-01-23T23:15:08.403000
|
||||
CVE-2023-5656,0,0,b6036d2812962d949d768e5f714bae5314833cb32311ee092a1a1c60d5aa04bf,2024-01-23T23:15:08.440000
|
||||
CVE-2023-5658,0,0,d87976ce58d5ca8f83fab98d8ff2d1b0dd2be7169175e47ab628824cd6110289,2023-11-14T18:12:25.910000
|
||||
@ -239746,7 +239746,7 @@ CVE-2023-5666,0,0,f2483079ef5e97ae7a96cbca91496e168943ff44509841e8947dbd9938d11d
|
||||
CVE-2023-5667,0,0,fbfb8124df78a0e2dcd7753130f3011a0359b4cb50cba47b2030ab1ae3cf7f4a,2023-11-28T19:22:46.013000
|
||||
CVE-2023-5668,0,0,ceb0ea397eb6f67ac3a609571d1cca2680e2c13d72754d3b95dbf74e9c4230a0,2023-11-07T04:24:14.117000
|
||||
CVE-2023-5669,0,0,91ba468ea593cd8a4d3235d0fca65ed4fcc5e76b9f18600fd8a4e14c058f2ee4,2023-11-20T13:15:07.450000
|
||||
CVE-2023-5671,0,1,d06dece2faf0b0f0a3880639de29344b329ad68581d3c506172ab800ce17d806,2024-09-12T15:35:45.620000
|
||||
CVE-2023-5671,0,0,d06dece2faf0b0f0a3880639de29344b329ad68581d3c506172ab800ce17d806,2024-09-12T15:35:45.620000
|
||||
CVE-2023-5672,0,0,3a02ae788e6479b0973d2859fc92f0f3aa5f1eacc4aeaf95969cc73a95f6377c,2024-01-04T17:08:45.617000
|
||||
CVE-2023-5673,0,0,0790e42d3f7d18a38cdd70e6e65a841d138cd94613d9381c2d41690098ccc5b6,2024-01-04T17:09:37.303000
|
||||
CVE-2023-5674,0,0,ad6a524623973b785443ed5ef1d7ce3fc434ea992e37165634367ac391476b75,2024-01-04T18:49:34.613000
|
||||
@ -239810,7 +239810,7 @@ CVE-2023-5731,0,0,c1daf03dfeb34a82b6a0b38106668813b5fe61b49c93910bf8ca3f99cff3dc
|
||||
CVE-2023-5732,0,0,70b33167b6b01f2251a02426109b1eedfb791dcbe336442b3d2c1f20e22c9c08,2023-11-01T19:28:03.360000
|
||||
CVE-2023-5737,0,0,5c2d05865ebc989c4a5d9700001e6aa67213d28f02f590a163cf65d99187f862,2023-12-01T20:41:26.787000
|
||||
CVE-2023-5738,0,0,6ce9454bd5480ab30028052ddfdee5279d5fd437e35db346ad8fcae48841253f,2023-12-02T04:36:42.670000
|
||||
CVE-2023-5739,0,1,9d44d1528d73b42485a3cf4fc5d45d60f79ca4338a50d00aa694b0e679b70237,2024-09-12T14:35:09.683000
|
||||
CVE-2023-5739,0,0,9d44d1528d73b42485a3cf4fc5d45d60f79ca4338a50d00aa694b0e679b70237,2024-09-12T14:35:09.683000
|
||||
CVE-2023-5740,0,0,f30072a29f5167bf376bd50aa2cbaf094aff4de0aaf054eb6eb5c0cc77fa5116,2023-11-07T04:24:19.073000
|
||||
CVE-2023-5741,0,0,9850a98399f209bcc9e7f4faae817c7e054fbc36458fba5e3a11bdc874730c27,2023-11-17T13:57:53.227000
|
||||
CVE-2023-5742,0,0,56ceb169baeebffcf4fdc4a61f6cae8babcffcdb84d9c703297e86bc2a6a599a,2023-11-27T21:40:48.237000
|
||||
@ -243254,8 +243254,8 @@ CVE-2024-2049,0,0,398a9eaf0287296877598afba029844504bbde28a3270479d8cbbb594cc11b
|
||||
CVE-2024-20497,0,0,422eb4ecec5d7dd92ef5d49505af3bc2f0e220b53f5fa76471b6dd3d460b94cb,2024-09-05T12:53:21.110000
|
||||
CVE-2024-2050,0,0,309a92deb7dc6d1c9b389273f8521ce493fa3e8c536f740883081c4cdf858e77,2024-03-18T19:40:00.173000
|
||||
CVE-2024-20503,0,0,662cc732650dda28ab2703286f0582f4e58a6d70d143b5f65fcd06a40d8aa08f,2024-09-05T12:53:21.110000
|
||||
CVE-2024-20505,0,0,cc322a4cc1627118dacb8de24183b29d3e80d8949dfedc78334283fe5382787f,2024-09-05T12:53:21.110000
|
||||
CVE-2024-20506,0,0,2f9d671a14bafe4ceeaf1ce445ed21491acc731516c0d729215eb33bebf175ca,2024-09-05T12:53:21.110000
|
||||
CVE-2024-20505,0,1,3cc28c634084a10df250df318d1f65f6c920a21d5650beb89eb991b35e09151f,2024-09-12T17:28:47.010000
|
||||
CVE-2024-20506,0,1,b3839959ba904d7db54237791da3f84bfa0eea3b79a536a06b85b587186e3413,2024-09-12T17:26:37.643000
|
||||
CVE-2024-2051,0,0,7b283f8057b783b668166a17f1e1ff3c63b74d0e0fa3f6b8acdcd7e3ce5a09c9,2024-03-18T19:40:00.173000
|
||||
CVE-2024-2052,0,0,b3dd7173b956ed9ab7dfaa381fa39b77e63aea1f604a72f8ac014b370895d6ab,2024-03-18T19:40:00.173000
|
||||
CVE-2024-2053,0,0,0d41c4e474c0960eb5e2399ded25845c51347c47ec843b53809f61d1e3d8fe3e,2024-08-06T15:35:13.397000
|
||||
@ -243838,7 +243838,7 @@ CVE-2024-2127,0,0,fee555ba22c69f33931ace66815b77d0a5796e2ad55c5d25b843a412734e73
|
||||
CVE-2024-2128,0,0,ad241575873847a0cb8491370112d4603dbee504ed1e31d448d346ee3b31a6d6,2024-03-08T14:02:57.420000
|
||||
CVE-2024-2129,0,0,4e7afd99b608981f119f3e5da184ba51484f21aa33b32d2a6446850d6a9f1652,2024-03-20T13:00:16.367000
|
||||
CVE-2024-2130,0,0,949f4490e30f20ac86b94271cd74ebfff8857dc5306a19f843591857ffe5e5d6,2024-03-13T12:33:51.697000
|
||||
CVE-2024-21302,0,1,f41e35b670099b969d37a43978e4938e033f0e174348b929aecd112a84c90a1b,2024-09-12T15:06:55.120000
|
||||
CVE-2024-21302,0,0,f41e35b670099b969d37a43978e4938e033f0e174348b929aecd112a84c90a1b,2024-09-12T15:06:55.120000
|
||||
CVE-2024-21303,0,0,31305e4f13f06e014520a5c4242d36bb9f7e995e328fd8a39c76a2a5f7c7bab2,2024-09-10T17:49:31.897000
|
||||
CVE-2024-21304,0,0,aee35375e056bcda8357796076fddae312bf87811aac2cea1256e28fc4176e51,2024-06-11T15:15:58.253000
|
||||
CVE-2024-21305,0,0,53ae725a4db9001e5894d4654d0d4d95d10acc8936d902ba245a4100e59e1d3e,2024-06-11T15:15:58.433000
|
||||
@ -244160,7 +244160,7 @@ CVE-2024-21653,0,0,ce4af85c3427e8e239faa818c1af79d7b1adc1dc1f140ac9db4d80e88fa50
|
||||
CVE-2024-21654,0,0,ff7ec2b8812a327818c17013b24cdd0ef431c4abd14d7dd5a8537adb8ccd1d32,2024-01-22T19:45:11.213000
|
||||
CVE-2024-21655,0,0,e05ae57984fd3423a83e9c7cb5d50a52bb4d06f33337e122d8d866553309143d,2024-01-25T15:36:21.337000
|
||||
CVE-2024-21658,0,0,22e5e8cc10afa93809b8c28027ffdea5956dc4bcf07294bc4314615b494c0e4d,2024-09-05T14:39:07.033000
|
||||
CVE-2024-2166,0,0,651e410f5b4ea0b3943d06a6e46ddd95872e5dcbe581801bc1f0f91614300ff5,2024-09-05T12:53:21.110000
|
||||
CVE-2024-2166,0,1,56b4755f03205365cb4650b778f24bbf9e5f1db18f9397e5eccfc994ba003c89,2024-09-12T17:19:43.607000
|
||||
CVE-2024-21661,0,0,d5e0d946b3d41760ea6570a14473ae0108c9da74849db85d955568f34a0a7e8b,2024-03-18T19:40:00.173000
|
||||
CVE-2024-21662,0,0,6c6f15e19e16a5ef9a32b04238e6288a5bcabd1c5ac78c1dc5b6aa6699d17dcf,2024-03-18T19:40:00.173000
|
||||
CVE-2024-21663,0,0,722c9f68e0462dda2a873b80565815f1b1146bfc9206245ea518f4fde9529f1f,2024-01-12T15:22:42.607000
|
||||
@ -245564,7 +245564,7 @@ CVE-2024-23710,0,0,bd7284af235de5db2fd51076f2026e0e8319c2a15e9eab609541ac6fe582c
|
||||
CVE-2024-23711,0,0,3b2f25c3bfdf9a198d84e7ce79a3c5bc71465fc8bd3a9e12aa99c3c94a4d9db4,2024-07-11T15:05:25.990000
|
||||
CVE-2024-23712,0,0,99a9a0e98f6ec74442cc23ab4a592b5612be30e655f849926f8cbd43d464cc6c,2024-07-03T01:48:04.970000
|
||||
CVE-2024-23713,0,0,84ac23a9c686e595929bab4dad7b08bca80d94f5a0dad54d418e0bd955964876,2024-07-03T01:48:05.220000
|
||||
CVE-2024-23716,0,1,72aa4692fe36e515631363961ebc214b187f38d11478c60001fc03eecbbbe02e,2024-09-12T14:35:11.523000
|
||||
CVE-2024-23716,0,0,72aa4692fe36e515631363961ebc214b187f38d11478c60001fc03eecbbbe02e,2024-09-12T14:35:11.523000
|
||||
CVE-2024-23717,0,0,6ae2f39818716426e507c7fefae1ead3e28d18b5fd2ac50fedfcf5c736aa3969,2024-08-16T19:35:03.877000
|
||||
CVE-2024-23721,0,0,738ea0fe142701915583cf528173779941e7a1ec154f74c48132f1439081fb4a,2024-08-28T15:35:15.520000
|
||||
CVE-2024-23722,0,0,af1e6a2b53efd211283ec4f6a153b9c2bd466feef4ec2b55fd6db947ef4fb0f6,2024-08-06T14:35:05.600000
|
||||
@ -247994,7 +247994,7 @@ CVE-2024-2711,0,0,50ffd1863952a28cb20d757a1f3a8a646342dad98b8dd38660e5f271553772
|
||||
CVE-2024-27110,0,0,cbd5f20a9295447075c0d9ddae39d8a0518f51482cf9653676931acac4a2af17,2024-05-14T19:17:55.627000
|
||||
CVE-2024-27112,0,0,41c14305ce29ba929571729adf6232d512555280634d6a8770ba26178a7c6ad3,2024-09-11T16:26:11.920000
|
||||
CVE-2024-27113,0,0,2c82b79fa533bf59473fa978b81949df2d6b2c94e8681438945525d1559125f7,2024-09-11T16:26:11.920000
|
||||
CVE-2024-27114,0,1,3e1fae20c9adad815745a794b2932d5ca31de37ce5dbae672cdbb468f3bcdcfb,2024-09-12T14:35:12.397000
|
||||
CVE-2024-27114,0,0,3e1fae20c9adad815745a794b2932d5ca31de37ce5dbae672cdbb468f3bcdcfb,2024-09-12T14:35:12.397000
|
||||
CVE-2024-27115,0,0,8ce6819b2281b5044808d901b951c9af48fcfc88b1321324751d7dfba9f3dbde,2024-09-11T16:26:11.920000
|
||||
CVE-2024-2712,0,0,12d5f119117cab5321059a19687d0b6e7d22fe860cd65815723e1f9810583e44,2024-06-27T19:15:13.167000
|
||||
CVE-2024-27120,0,0,4abe17d3c70fcebeaed9cfc849b5af8035eacfb7b2d62a88500c7d222ad02f14,2024-08-20T19:08:54.490000
|
||||
@ -248306,6 +248306,7 @@ CVE-2024-27426,0,0,f5fc7da5f09fbdadb762a21224b0dbb5a41a24dae16f449b1011805d51278
|
||||
CVE-2024-27427,0,0,1b1c30f81afe26e3ae33e5d69b384adaf853c97d03be79d51f3ab8607e145d9b,2024-05-25T14:15:52.570000
|
||||
CVE-2024-27428,0,0,20f753b8956754951db33f225c8ba9e79d8568aee28b82d82684ff12e52c1002,2024-05-25T14:15:52.687000
|
||||
CVE-2024-27429,0,0,8ca6c37d4e86d1cce3febff9172b7aee5b4414a06f6c93a7cb5ad84a8d3b710b,2024-05-21T15:15:28.810000
|
||||
CVE-2024-2743,1,1,3367fb2777669173fbc56792f4d2915c4f16f5bb9edc21f630de6a46cfc48da3,2024-09-12T17:15:04.177000
|
||||
CVE-2024-27430,0,0,bcfe1dc31df623eedee5bd152c119180c00cd65ea96cab3b1e49e2927a247d51,2024-05-25T14:15:52.803000
|
||||
CVE-2024-27431,0,0,f0b943d0779f4c0250316bc3e4f86930ac87e351769e7377bcc9a253794ae476,2024-07-03T01:50:40.003000
|
||||
CVE-2024-27432,0,0,5adfd53e7c7b1e4e0cdd83f244838b35ae843625de51e278b8673967226dec4c,2024-05-17T18:35:35.070000
|
||||
@ -249288,8 +249289,8 @@ CVE-2024-28984,0,0,276bc8c54cf8ee7419930c3e9177a9acf5146d6167c989ef6d1387fafadac
|
||||
CVE-2024-28986,0,0,1bc724868f1fc8a3c45a5557a2e0154a8318c8e26360517fdaccaced6288454f,2024-08-16T15:04:28.150000
|
||||
CVE-2024-28987,0,0,a8b388aa0866daa044867e0e7549769a8c4ba15acabd6bd0464b05f5ad13c511,2024-08-22T12:48:02.790000
|
||||
CVE-2024-2899,0,0,0be0fb50fdcc13228c9b49554460e4a306be4c6e83ee7f9bfb94b945f4f9e595,2024-05-17T02:38:36.220000
|
||||
CVE-2024-28990,1,1,cd6567be02208b6875f7a000e666b2f87973688091040f2ad26d5a47849b73d5,2024-09-12T14:16:06.273000
|
||||
CVE-2024-28991,1,1,fe172b3d1d36356b2503dace310ce527cff2cf2c967a2ad87b9ae9d09f6ec917,2024-09-12T14:16:06.540000
|
||||
CVE-2024-28990,0,0,cd6567be02208b6875f7a000e666b2f87973688091040f2ad26d5a47849b73d5,2024-09-12T14:16:06.273000
|
||||
CVE-2024-28991,0,0,fe172b3d1d36356b2503dace310ce527cff2cf2c967a2ad87b9ae9d09f6ec917,2024-09-12T14:16:06.540000
|
||||
CVE-2024-28992,0,0,dcb8c493077168591aebe4d60d7719870f581d45ce48e73108abe9067fb629eb,2024-08-22T15:56:58.207000
|
||||
CVE-2024-28993,0,0,9c5125da7327315f017a58b350f8b638b25e9c0dcede224162aff682993b7d59,2024-08-22T15:54:56.087000
|
||||
CVE-2024-28995,0,0,23c52fbffb3e9fb74833a00e094548a239a07eefa8716c4e259000599c6e6a05,2024-07-18T01:00:03.197000
|
||||
@ -250966,7 +250967,7 @@ CVE-2024-31332,0,0,fe533958eb1f5014a983744e26d4dc56008592fb4b2dc96ebd425a317d9ee
|
||||
CVE-2024-31333,0,0,fffa52c47c5b8e1c2bcdc9fe3c080f43dd069e7ef7813f142892cae434fbd8ff,2024-08-19T13:00:23.117000
|
||||
CVE-2024-31334,0,0,69828e729ce39e0f18173fda19e01cf9f4d39333d7345a58dacf94a302bbacd6,2024-07-11T15:05:41.960000
|
||||
CVE-2024-31335,0,0,3a5c3c43b9344b158e79d76d5bd0e2d36d3e7822b50bec9afc211045c26c9812,2024-08-01T13:50:52.347000
|
||||
CVE-2024-31336,0,1,3fabf9b98cda8744ca51bd8782251957978d895be1926c83ec7e0b7664011a38,2024-09-12T14:35:13.360000
|
||||
CVE-2024-31336,0,0,3fabf9b98cda8744ca51bd8782251957978d895be1926c83ec7e0b7664011a38,2024-09-12T14:35:13.360000
|
||||
CVE-2024-31339,0,0,cd4c96aade7176a5aa7427f1e13d7eb03c1e703de2eb92c3c6c97472cece1e5c,2024-07-12T16:11:34.910000
|
||||
CVE-2024-3134,0,0,29c3b545a5da0a472480af2af3f9f3acedbe4b841a8f6f121606a369bcd8fa7c,2024-05-17T18:36:05.263000
|
||||
CVE-2024-31340,0,0,69d2a170836208f6faad46a647a02e1d14f5dbc15c6da296b85bfb3a229fe567,2024-07-03T01:54:45.633000
|
||||
@ -251180,7 +251181,7 @@ CVE-2024-31626,0,0,6d48ca244a7fb039538d6e9b26f71170e207ffafb08843b89ee3ec2f370dd
|
||||
CVE-2024-31627,0,0,5c857ff477019105381749492d85a34695636b9db0c5f4e905fef7028afdac5f,2024-06-05T17:15:12.817000
|
||||
CVE-2024-31628,0,0,d1e1002cfeaa20bb2521d6174b8a95169d4f2c09dd222e852d091ee789ef0ab3,2024-06-05T17:15:12.890000
|
||||
CVE-2024-31629,0,0,553c81e4d5a1720d369cb037cd3d3fdc00a0ab2d6da0b4add50845296fba4630,2024-06-05T17:15:12.960000
|
||||
CVE-2024-3163,0,1,1535c9efcaa1d6891b6aa3f21424f4ecb2cb747a2a55ebb48ec46194778426b2,2024-09-12T15:35:47.627000
|
||||
CVE-2024-3163,0,0,1535c9efcaa1d6891b6aa3f21424f4ecb2cb747a2a55ebb48ec46194778426b2,2024-09-12T15:35:47.627000
|
||||
CVE-2024-31630,0,0,2bd16e3fcef7bda0b7ed937f45148dde60c59ea9d09224ef4dc76dc8aeb1eb7a,2024-06-05T17:15:13.040000
|
||||
CVE-2024-31631,0,0,189299e833a9bdec5625f34c9b7af7b60646f6c7b2cd4586dea999ec400d5e00,2024-06-05T17:15:13.130000
|
||||
CVE-2024-31634,0,0,cd6336332928e139372eaeb7f2fa7bd12555d147721492304ddeef71595ef37a,2024-04-16T13:24:07.103000
|
||||
@ -252203,7 +252204,7 @@ CVE-2024-33001,0,0,e89dbc37b1bbada386268abb25bbfd26ba11d29f63337f64d12b9c9ded295
|
||||
CVE-2024-33002,0,0,bbd8f2f002227dcd69fa7ae031c0a1ecfe37f7776553c4961a527a6eaa21d480,2024-05-14T19:17:55.627000
|
||||
CVE-2024-33003,0,0,225d205f470d78d7f04a914fc9cc66b403650d1c92e0d55240ac67f1bd989660,2024-08-13T12:58:25.437000
|
||||
CVE-2024-33004,0,0,fd3947efc9f6a79b80c112947403a2b0a9c6fdaf32bf5c0bd7b38f5115845055,2024-07-03T01:57:23.963000
|
||||
CVE-2024-33005,0,1,b6e8581506b98b3d048c876ef09153cc5329e2b3c294dcc9c0512597d7564067,2024-09-12T14:39:03.480000
|
||||
CVE-2024-33005,0,0,b6e8581506b98b3d048c876ef09153cc5329e2b3c294dcc9c0512597d7564067,2024-09-12T14:39:03.480000
|
||||
CVE-2024-33006,0,0,36d8448e64529b3242e1d14d3223c50e6fc2fd869abf9e54a01bde3e4dc1ca08,2024-05-14T19:17:55.627000
|
||||
CVE-2024-33007,0,0,8e38d5b6d2b9eb1b80b7c4b68a0aa966535c1221f485493f9e187b5af17c2ba9,2024-07-03T01:57:24.730000
|
||||
CVE-2024-33008,0,0,0bcdb3b7e19679fd6080e0c5f4ecdde63f1bf333ca492bd35c2d1bf34e5150a9,2024-05-14T19:17:55.627000
|
||||
@ -252817,9 +252818,9 @@ CVE-2024-34010,0,0,e5242e4e175689c741a04991b05d676f9e3bda064e1a681e08ea1b95446de
|
||||
CVE-2024-34011,0,0,1cdf95201b7c3fac8642eb93e0c0ec77c02ae32f22e51c68db8a6f76ced93031,2024-04-30T13:11:16.690000
|
||||
CVE-2024-34012,0,0,5230526342507ce0f85dd47c2323d42603a1fbec4e476f393dfaf1722db209eb,2024-08-07T15:33:46.150000
|
||||
CVE-2024-34013,0,0,31f555436f56628c9b80feda54af6c121f0002b6c021c0928728c76ed328d68f,2024-07-19T13:01:44.567000
|
||||
CVE-2024-34017,0,0,07f270efde708660fd67b8a72605e7e3819b90c7d552863afbc3235051dbad75,2024-08-30T13:00:05.390000
|
||||
CVE-2024-34018,0,0,51328581cdcd6fd8ed567b1d7a910536343218c66d5c817cb9b9c30ec02d1d91,2024-08-30T13:00:05.390000
|
||||
CVE-2024-34019,0,0,1a88442be28040d4222b4fec162e7814c8f79baa666a24cb16d1c72e031e7bb1,2024-08-30T13:00:05.390000
|
||||
CVE-2024-34017,0,1,379da20aff6514952cc55653119ad0cbc16efa57414348c26e21b9e45ed9a8a1,2024-09-12T17:16:09.890000
|
||||
CVE-2024-34018,0,1,85758f76e2c70fa3c1ddd863e0fd37888b91679fea3b3a22992906144958936b,2024-09-12T17:17:20.873000
|
||||
CVE-2024-34019,0,1,ff720c73d7b799cb466f79ed87b9acbf36d22c868dd2f8e93b3f0bc554584400,2024-09-12T17:18:07.163000
|
||||
CVE-2024-3402,0,0,860d32d94b28d3118ff3553c4f964ad26b3d56a8c45fca055d79619e6385e5e0,2024-06-07T14:56:05.647000
|
||||
CVE-2024-34020,0,0,c4663f98778b76c33582b9d015039d06540b400c550bf7c9ee3e5b98d9ff425a,2024-07-03T01:59:16.227000
|
||||
CVE-2024-34021,0,0,ba9a52b25c7a77dfa7bf1a07f5ab53755e56e707c7456547716a3d28e95401ca,2024-08-01T14:35:09.920000
|
||||
@ -252916,7 +252917,7 @@ CVE-2024-34124,0,0,1560ff2926f27a69ce258f83d62b0151a5e1ff052db9746c4e37b847f7058
|
||||
CVE-2024-34125,0,0,3248ba4e13305da4d550ff294e0777762ef3209cea1ba47228c44abb8259e093,2024-08-19T18:56:17.350000
|
||||
CVE-2024-34126,0,0,9812afe65ee02221e5fd8a63677b5e9e3deeafed44b12298eb7011278c0e0e90,2024-08-19T18:55:47.043000
|
||||
CVE-2024-34127,0,0,06c2fc49cbcf18b0add9499f10b3a0814654b0e291f183a8ee09c382b3d1ec3c,2024-08-16T18:22:57.230000
|
||||
CVE-2024-34128,0,1,940538d1064063913156106c2ac294bfa9095d326a70437d66729f6036d7973a,2024-09-12T15:58:26.700000
|
||||
CVE-2024-34128,0,0,940538d1064063913156106c2ac294bfa9095d326a70437d66729f6036d7973a,2024-09-12T15:58:26.700000
|
||||
CVE-2024-34129,0,0,c47df7ddf934177974799de9912c4e8ae1e6353624749fd9b063535c8cf739aa,2024-08-07T15:15:55.070000
|
||||
CVE-2024-3413,0,0,393490437f33ce616f0a6848540c1c0d3eed8ed2038327f28efd50e305f3828b,2024-05-17T02:39:54.073000
|
||||
CVE-2024-34130,0,0,29b15cda4f7383fc7738011069e5f5981ecee8f8ebe6f1acd48c5ae17439fbe8,2024-08-07T15:15:55.287000
|
||||
@ -255201,7 +255202,7 @@ CVE-2024-3739,0,0,ba8b07349fdcbf4927f1d53be7924c0ba58d0f09900d65fe34757229d7b34b
|
||||
CVE-2024-37391,0,0,e99f92be626b4b841a6b299b2728912f45fefbd409010bfee05135471d62af01,2024-07-31T18:33:47.383000
|
||||
CVE-2024-37392,0,0,0ae8929f71fb71c8f43226023298d80c9dbf69da2ed93f7866d1e406015cec5e,2024-08-26T12:47:20.187000
|
||||
CVE-2024-37393,0,0,b93d796f3c4283b87dfd22c20f36a8116f582a381c44650f39c5ea43e6b806f2,2024-07-03T02:04:18.707000
|
||||
CVE-2024-37397,0,1,557830eddad0f86f90e2eef46dd2538b16d13b90e5d40a6045c541b4adc38609,2024-09-12T15:35:46.803000
|
||||
CVE-2024-37397,0,0,557830eddad0f86f90e2eef46dd2538b16d13b90e5d40a6045c541b4adc38609,2024-09-12T15:35:46.803000
|
||||
CVE-2024-37399,0,0,308e730bcc199d112d6cfe8bdbdbf7120fa96451bfff020b7962dbf1afddf5e4,2024-08-15T17:31:49.067000
|
||||
CVE-2024-3740,0,0,cf4cd6bcfe639a4f771a19ddc36f820864da86f0d9d9f91c68694d8633fab251,2024-05-17T02:40:06.170000
|
||||
CVE-2024-37403,0,0,82a2fe28b07e6e9fe5e86dff02fa8c242d19ac626eea029ca875aeaf76338b4d,2024-08-12T18:55:15.890000
|
||||
@ -255734,7 +255735,7 @@ CVE-2024-38199,0,0,642a12aa02f5e7b673baecdb6185f8efbceb0f3cbe1ac18a60e869ce79b2e
|
||||
CVE-2024-3820,0,0,8985e7d1e7aecc5fe081b43705d723ec0ca067093ca4a65f30dd280cab84082f,2024-06-03T14:46:24.250000
|
||||
CVE-2024-38200,0,0,d566a27ccd0b19f8229e9b6ce0a19c6b80662cfcd111693b799cdefa30455084,2024-08-13T18:15:29.720000
|
||||
CVE-2024-38201,0,0,53005100dd7a84f045f26370f955e41247a7f9394ca3dbb51556ee597d1af3a2,2024-08-15T20:30:00.737000
|
||||
CVE-2024-38202,0,1,e7eadf2aa03d0772605750e940cfb378e16a9e72bdbea5747d3c43f7807b7c12,2024-09-12T15:09:04.470000
|
||||
CVE-2024-38202,0,0,e7eadf2aa03d0772605750e940cfb378e16a9e72bdbea5747d3c43f7807b7c12,2024-09-12T15:09:04.470000
|
||||
CVE-2024-38206,0,0,159422281702f43b217eea303b5c7354ebb2179d51ac658c6c0c018b5ec16a40,2024-08-14T00:15:08.213000
|
||||
CVE-2024-38207,0,0,a33038bbdf8e1de24b0ec1ff70f0030afb50f5d8993af830215c5c1e88e41f0d,2024-08-27T14:50:40.303000
|
||||
CVE-2024-38208,0,0,3f330e6b999623cf1daf7ef78e19b91e45bf2d522b8d21d8758840717d25aa36,2024-08-29T21:53:38.903000
|
||||
@ -255824,7 +255825,7 @@ CVE-2024-38305,0,0,ee5caad84873fbd92352a0446fe4dbaa8294a3e8c08e38b564114b506da28
|
||||
CVE-2024-38306,0,0,302c251894cd8175c95dcaa248535d0e8a6962400e46ca01099390440f888d26,2024-06-25T18:50:42.040000
|
||||
CVE-2024-3831,0,0,50e818929dc56e84afc0dd8fe8fae7a8b323529f272034386ddae5543191124f,2024-05-14T16:11:39.510000
|
||||
CVE-2024-38312,0,0,1eb38797c2d82d591d8abe57f1d4573a3412cb86f39c7ea700474f2d0b5ea92a,2024-08-07T17:47:36.897000
|
||||
CVE-2024-38313,0,0,99d0ffe48700cf0aafe0ab7664577089c510c6757d7ad1e1517ef516a283543d,2024-06-17T12:43:31.090000
|
||||
CVE-2024-38313,0,1,6104dc2b29b4c8ac118d88c83436ea8db6780255231d99b7909daa998f4d9c3c,2024-09-12T17:48:33.947000
|
||||
CVE-2024-38319,0,0,baca4c6dd463198ff6e83e4d1d026e029418f6c2a504c13c76e1be823b804509,2024-06-24T12:57:36.513000
|
||||
CVE-2024-3832,0,0,9a695728462575e75497ca13bb41d4307d467f786773e32ceb92b024954b50b9,2024-08-14T20:35:21.240000
|
||||
CVE-2024-38321,0,0,2710f443b4070c40eb4ddb90b32a5c6553d12d8c8899edd19abf3192e0c71b2d,2024-09-06T14:50:53.583000
|
||||
@ -256823,7 +256824,7 @@ CVE-2024-39846,0,0,cc3d14fb15e20c985bb7fdeb359e7a12ea1918f79b7c4c3ac03373ad528c6
|
||||
CVE-2024-39848,0,0,8178bbb2814e5fa60c3351f00827b86e4d6b7b334f71560f5ea323ec84986fcf,2024-07-03T02:05:53.147000
|
||||
CVE-2024-3985,0,0,ceb8b898ec23867d1efcc4d7f7a630f584432f67007c6b07d5fd8199e1841622,2024-05-02T18:00:37.360000
|
||||
CVE-2024-39853,0,0,0a0a7ef09f69a0d0504c74e5034409e9f17837e69e722a4f1f3c2adcfb998667,2024-07-03T02:05:53.353000
|
||||
CVE-2024-3986,0,0,f831ed7921be7c8dd7c23fd078f7bb708ba961923f567ec2fde6e41a687370b3,2024-07-30T13:32:45.943000
|
||||
CVE-2024-3986,0,1,7dde2b2fa1083777e51a9517749b6491f1632dd62b3da52344cfe107791d10f6,2024-09-12T16:52:07.150000
|
||||
CVE-2024-39863,0,0,c951398f9fd72a9dfacd7010e5dd70d2523f65e226c113ed4d14cefbbdbc7a2c,2024-08-01T13:55:59.780000
|
||||
CVE-2024-39864,0,0,d53cf864986adcf58f762cd7c857169d0cf77d7c01b84f977b101e751257847c,2024-07-08T15:47:10.990000
|
||||
CVE-2024-39865,0,0,2c7e8bebc57f85d46c59ac0674616508fa14610c3ed1fc7f548593921bc83a1a,2024-09-09T15:12:08.177000
|
||||
@ -256996,7 +256997,7 @@ CVE-2024-4045,0,0,2ae0d8f233b2cc7f6d27d9d81b74b74fd6cc2876f88a425dbeb60d35e4802b
|
||||
CVE-2024-40453,0,0,4483c5209dc00972ed35087fa7a57143bcc3f4e4c2aa05f9c16e6199d4acac45,2024-08-23T17:35:05.463000
|
||||
CVE-2024-40455,0,0,2b4af03841b1088e106e2c8470bdfc3454c77a8d4b576f687e8da463b4385ab7,2024-08-01T13:57:29.287000
|
||||
CVE-2024-40456,0,0,f1acaf3e46ce38cdd4b72320186132bab37cc38f6f4c796e31eaece0545a5e4c,2024-08-01T13:57:29.487000
|
||||
CVE-2024-40457,1,1,b80c7ac717e5ba03b3dbc096c1279b0c37cda1d124f6541ab88502f2f9ad3fcf,2024-09-12T14:16:06.780000
|
||||
CVE-2024-40457,0,1,54f2e87c9b3115b5c06d1cdbc757708bf935f80483ecfcf110e998260f3b08f6,2024-09-12T17:35:00.590000
|
||||
CVE-2024-4046,0,0,b162bb54ae31ac06a54238ce430265f513a39f78ee0aa36d5d6ff941168dcdb1,2024-05-14T16:11:39.510000
|
||||
CVE-2024-40464,0,0,566a84364894c87cd293e303f1f3b91278da64a57babcc563f0c2d0eca7b55aa,2024-08-15T13:02:33
|
||||
CVE-2024-40465,0,0,d1f805e9dd9512e63091b4cd71cf57cffa5f52934bb1bfd71a75623426707138,2024-08-15T13:11:07.570000
|
||||
@ -257101,7 +257102,7 @@ CVE-2024-40645,0,0,c5d696c93dacee54aa97dfea7bb392eb61945c1f1d80336104e770237e779
|
||||
CVE-2024-40647,0,0,20e5e587d0777d0bcce77df9be17d322be6b8b310278f85b131c82750480c300,2024-07-19T13:01:44.567000
|
||||
CVE-2024-40648,0,0,e2349aa5f69c8421d1802e501ed70a5d9670cb28532fa26d74d83879e98ba750,2024-07-19T13:01:44.567000
|
||||
CVE-2024-4065,0,0,e9243298c32ccba8ab1ac6d427150517ee98217790d2dec0b1b5ec685d8cbc83,2024-06-04T19:20:29.227000
|
||||
CVE-2024-40650,0,1,84d69f74023b7625d57fbc8106fe861d15f00562153a0ec27f968621fa8a16e3,2024-09-12T14:35:14.240000
|
||||
CVE-2024-40650,0,0,84d69f74023b7625d57fbc8106fe861d15f00562153a0ec27f968621fa8a16e3,2024-09-12T14:35:14.240000
|
||||
CVE-2024-40652,0,0,0dc9a34620355d1a82f6409ecc9e9411449a2ec7843cc6a278a0f0f3b1b9a70e,2024-09-11T21:35:09.017000
|
||||
CVE-2024-40654,0,0,89d13eda0f67a3a9a7b2cedb1fd2e93ba750322387fa1a658c26c352ad7fc226,2024-09-11T16:26:11.920000
|
||||
CVE-2024-40655,0,0,f9e742a073d4783d6e3e69c7c29dfc537f097ccbb827a6e63290bf1fc0f97f80,2024-09-11T16:26:11.920000
|
||||
@ -257199,7 +257200,7 @@ CVE-2024-40805,0,0,4c83496c1a4cb9a07935586f696b204e1383baaded642bf1ae2b05e48dccd
|
||||
CVE-2024-40806,0,0,de19bdc26ad947be78b25439a4c081cef03a9ac0cf8596ce40e06ed6659063cd,2024-08-15T16:42:08.780000
|
||||
CVE-2024-40807,0,0,a57ec3a3bb089ed252f2f8c175043165750e676422e4f67fbb537c1821f4ad1a,2024-08-15T16:35:50.210000
|
||||
CVE-2024-40809,0,0,9737181761f09811942af1648871be698e164a1e26e2d7cb09625587b1583d46,2024-08-15T16:26:51.523000
|
||||
CVE-2024-4081,0,0,77403bc4e39d99faa287fafa839f1a6d63d345772e0d811ac0d6dfa57d929537,2024-07-24T12:55:13.223000
|
||||
CVE-2024-4081,0,1,2b1a13825488c3123a899d577616f27ebfa5f72481cbd0378e19b046630c7604,2024-09-12T16:43:42.490000
|
||||
CVE-2024-40811,0,0,58a2466a72dd67097326f2c18b9b99f24e15edfadd201715f3a11dc5fe430f0a,2024-08-01T13:58:09.693000
|
||||
CVE-2024-40812,0,0,c246dcffc924270886f6bb5d99cc189e11e554cbf0acf5a0b6d7c76bf5b7cabf,2024-08-15T16:26:53.560000
|
||||
CVE-2024-40813,0,0,eaec9d679620cbe04b5224752ba0981027a92f3e1bca89f18faeb08b9aaf1ce7,2024-08-15T16:15:52.613000
|
||||
@ -257360,7 +257361,7 @@ CVE-2024-41008,0,0,86de6e2be092cac70f5596fb96d0253f26291855f34ae4ddc015775261181
|
||||
CVE-2024-41009,0,0,c4729b5cb64b59a8130835040cce4fcac734ad6152593d4547aa0a45482d47fd,2024-07-29T07:15:04.560000
|
||||
CVE-2024-41010,0,0,ae8d1d1b3ebaab40dc6ac6afde49ce66895bb7f4e7ee92f295ff5ca1fa79b217,2024-07-19T15:24:59.137000
|
||||
CVE-2024-41011,0,0,0ea0f8cc21c6447d8c7d604f8cb128d5314c6d4d9477517c491af1541a3fc28d,2024-09-06T13:19:10.197000
|
||||
CVE-2024-41012,0,1,0fb60422840407ec3f93b63d0852cd513977e14ce53be0635ab74a9fae88aeea,2024-09-12T15:28:48.250000
|
||||
CVE-2024-41012,0,0,0fb60422840407ec3f93b63d0852cd513977e14ce53be0635ab74a9fae88aeea,2024-09-12T15:28:48.250000
|
||||
CVE-2024-41013,0,0,e60bba3e408ef7ae0e4e783aa0f35051774aa2a8d236b750438ef4fbd7846f74,2024-07-29T14:12:08.783000
|
||||
CVE-2024-41014,0,0,705963fa55cb8c9deb35bac026b5f0f3c8c6d9abda445da5a02c7d95e767c33f,2024-07-29T14:12:08.783000
|
||||
CVE-2024-41015,0,0,91a1e3d42b94aa1fa04960f80c1d9c387f924861296d16a8769f7bf7292df329,2024-07-29T14:12:08.783000
|
||||
@ -257500,10 +257501,10 @@ CVE-2024-4117,0,0,439d2da59fd01a25f254df6698027149837f261eb1a16ba5752d7e62667d1b
|
||||
CVE-2024-41170,0,0,817fea013dbb80aba74cedd999d41f457edab776da0940277c0a8d6917a3fea3,2024-09-10T12:09:50.377000
|
||||
CVE-2024-41171,0,0,21e8211c0e8b04d22b03b4933a02a2ed4c14686c5cf3c857123c3bdfefc5823a,2024-09-10T12:09:50.377000
|
||||
CVE-2024-41172,0,0,7f370211b6a2ed7e58844e8bf12bc0dae731f676537ceaaec3667e5da63dc1de,2024-08-07T20:16:45.237000
|
||||
CVE-2024-41173,0,1,2a967ba5e095ab1e47f786a956c1f076df7830bb3f39a08c0b36771178149730,2024-09-12T14:52:20.820000
|
||||
CVE-2024-41174,0,1,46f7512448f854e48ad9da184e7c8ef9b0c8ebf22c2d6d526796b00f1d907a8d,2024-09-12T14:33:54.917000
|
||||
CVE-2024-41175,0,1,35e860a2d31eb21e3779e1686be69664a02d6ab1bab83d6168914f472f9b9f73,2024-09-12T14:25:10.307000
|
||||
CVE-2024-41176,0,1,9617663e2578b6f0fb4f568d478dd287853a4464c7fe3c6dcc4d7c2bd5bf268c,2024-09-12T14:26:00.527000
|
||||
CVE-2024-41173,0,0,2a967ba5e095ab1e47f786a956c1f076df7830bb3f39a08c0b36771178149730,2024-09-12T14:52:20.820000
|
||||
CVE-2024-41174,0,0,46f7512448f854e48ad9da184e7c8ef9b0c8ebf22c2d6d526796b00f1d907a8d,2024-09-12T14:33:54.917000
|
||||
CVE-2024-41175,0,0,35e860a2d31eb21e3779e1686be69664a02d6ab1bab83d6168914f472f9b9f73,2024-09-12T14:25:10.307000
|
||||
CVE-2024-41176,0,0,9617663e2578b6f0fb4f568d478dd287853a4464c7fe3c6dcc4d7c2bd5bf268c,2024-09-12T14:26:00.527000
|
||||
CVE-2024-41178,0,0,5da27e6bd4cfecb3274c0413ac77a628456bf2e70cb97b3347c2830cb191bae8,2024-08-01T13:58:24.173000
|
||||
CVE-2024-4118,0,0,261b7c2db2db4c5bd0863007ba022afd6141eeb3c40d43094e801a457a5edb93,2024-06-04T19:20:30.147000
|
||||
CVE-2024-41184,0,0,460d3d6d07916ac0f7c6ce162599c802c196ea0f25bca5ddf54b8e8b249634fe,2024-08-02T05:15:47.217000
|
||||
@ -257797,7 +257798,7 @@ CVE-2024-41833,0,0,85fc1d4f81094922dce51fd479c7b435396bc7c4f95057b5b31db4afd23d3
|
||||
CVE-2024-41834,0,0,13eed51b4e049020c7f638e068eae53ccda0a6881cd4fb5749936291f43eb8d6,2024-08-15T17:13:25.090000
|
||||
CVE-2024-41835,0,0,79c86df6665f091ccf38637e3904931e0a79e20c4f60784272f388a048f561fd,2024-08-15T17:13:11.837000
|
||||
CVE-2024-41836,0,0,447eeb0d32c0b3fbb708b5b9d75636c09225896b7443055b6e14477ceb9e8a2d,2024-07-24T12:55:13.223000
|
||||
CVE-2024-41839,0,1,5ef460cfd4cab1da61d6ea06c2a0157d7dd82f5004a20224cb3c7be32bb81d0c,2024-09-12T15:58:11.690000
|
||||
CVE-2024-41839,0,0,5ef460cfd4cab1da61d6ea06c2a0157d7dd82f5004a20224cb3c7be32bb81d0c,2024-09-12T15:58:11.690000
|
||||
CVE-2024-41840,0,0,3f28aebde978cc1f8839cc676dd62bb75d63b90fe1295e0e4ccf51b0e1e39f51,2024-08-19T18:54:02.200000
|
||||
CVE-2024-41841,0,0,b3d7229e1df9655b819c6cdfc619b24790032230acf9c060fa1958fc581d2315,2024-08-26T14:08:05.547000
|
||||
CVE-2024-41842,0,0,081439e1e1c0c36fa35dfc90cd7c1dab0afb799471eb093958cbeb73afdd7760,2024-08-26T14:08:17.263000
|
||||
@ -258109,7 +258110,7 @@ CVE-2024-42255,0,0,34fe6ca394a4d37dfeae64c43b4e81284ae1fd88f707998530c97485d0508
|
||||
CVE-2024-42256,0,0,f03d3d34e99a43b4ab4d3700a1810230a20f71fae4e12698f26d3c94c2fbe1db,2024-09-06T13:56:00.207000
|
||||
CVE-2024-42257,0,0,dd66a8bc9ea528d2f2ed1dbef8528f021678b42931c435b735ebdb99ef0374d3,2024-09-06T14:12:22.577000
|
||||
CVE-2024-42258,0,0,6b21eaebf58128d72e1ceab7d48900d2d3972b04dba8579ddc705c6be6f5d3cd,2024-08-14T14:15:27.727000
|
||||
CVE-2024-42259,0,0,29b4a2e7ef9e0c3eb8144aa95f30b45d14ba1954b7d6ca5651fd3521fa620dbb,2024-08-19T05:15:07.053000
|
||||
CVE-2024-42259,0,1,5c4b8fe30a6d77353cf244a11829b4c27a691877886da7c2bafdbc3323ccf418,2024-09-12T16:00:55.537000
|
||||
CVE-2024-4226,0,0,5a1ca6b12b6f72b0f4206f29fce66dc2868959ed888bfbcbc74131b5725a94eb,2024-04-30T13:11:16.690000
|
||||
CVE-2024-42260,0,0,eb52125b7ac8aa328b971df28fae3672970357ac79f1958c3b76d2a4939b79fc,2024-08-19T12:59:59.177000
|
||||
CVE-2024-42261,0,0,72fe870a41ca864453ed4788fd4a91439d6c4b246a2a5f09a56b04af1e7ecbf8,2024-08-19T12:59:59.177000
|
||||
@ -258271,10 +258272,10 @@ CVE-2024-42464,0,0,c028981b0f05209b8f9398c3d10076a5d141612668af4661ca8e9b565e3a5
|
||||
CVE-2024-42465,0,0,cc1706811a59c806dba0a5fe5e46aaf63eb46135d4336575a42fc94641a6632d,2024-08-28T20:32:31.737000
|
||||
CVE-2024-42466,0,0,b147a6143c0f1b29bc81d9c541a33cc57bd399450bc78084e7c0d7553a8f8a24,2024-08-28T20:48:14.917000
|
||||
CVE-2024-42467,0,0,66b04633a9e7d48f7fdda11dcba365569847fef4d628314bc09c6b60fb102d1c,2024-08-29T16:26:43.947000
|
||||
CVE-2024-42468,0,0,20ab5d9f17a6b01a0da06bad1509e9a4dc8119cebd6158ac0abf8cefec4df7e5,2024-08-12T13:41:36.517000
|
||||
CVE-2024-42469,0,0,30cb7e23c62f8ac5ce9bc45ebb27cbde0a399d6ba51c92609f7c3b2c2f4965cc,2024-08-12T13:41:36.517000
|
||||
CVE-2024-42468,0,1,2bb1ec6a12d1e493e990e505d75a1c051bc50efb129f4d285b42d249546e8460,2024-09-12T16:01:42.113000
|
||||
CVE-2024-42469,0,1,8b0a252110d0dc27bfa7cceaf7062e44d1027416eeb9de0f3d007a09037425e9,2024-09-12T16:02:35.023000
|
||||
CVE-2024-4247,0,0,e85864e661a2b1d9942e48a3c52bc53fc949e702c33b68de4ade6b9cd86f67dd,2024-06-04T19:20:33.897000
|
||||
CVE-2024-42470,0,0,ba1121ba4123cc21b3c9eb920545b590c6cd45b604c8e84823a57bd68abf8f95,2024-08-12T13:41:36.517000
|
||||
CVE-2024-42470,0,1,2551589b1228b4a193f06647a431e38919ef03a66b4d8da3d720aed70dc94a29,2024-09-12T16:04:23.273000
|
||||
CVE-2024-42471,0,0,6f780d29fd10d2cfd52fece487eaa99e86e081a58f146bb8fc344f7c7f56f9f6,2024-09-03T12:59:02.453000
|
||||
CVE-2024-42472,0,0,7ab57564efdc72933310d3a5f9856c0205ef1bb0a8b6f4b7c4270b076011eb97,2024-08-19T13:00:23.117000
|
||||
CVE-2024-42473,0,0,4c7c671ee00009c6a5c03d538a956eb7febcd1530231ce4a9c79893c5aea342c,2024-08-12T13:41:36.517000
|
||||
@ -258288,8 +258289,8 @@ CVE-2024-4248,0,0,ae8e3a45d49ca48b9dcec0ca557a7d91d483e50d5e5d3f5d5f7e2c0dd6ffe3
|
||||
CVE-2024-42480,0,0,a493fdcfd2cab0bed771f4294216832fdd84bd63bcd8976ed48629d61d56dc9b,2024-08-16T16:24:40.430000
|
||||
CVE-2024-42481,0,0,f17bd96b5dbaec9cba44d498d9c9262bc86fc96c852d5e4344475a0f54baa696,2024-08-12T18:57:29.247000
|
||||
CVE-2024-42482,0,0,ee38da65f82c804eaedcf134ace0faf2e2bb9182856f5a242f4e6a9a1c05ab47,2024-08-12T18:57:17.383000
|
||||
CVE-2024-42483,1,1,1d06307bfa3f6a5de26b6507724fa4de8dc1f951a458e9ced7b465b45fd6ee98,2024-09-12T15:18:22.093000
|
||||
CVE-2024-42484,1,1,22ea8933942c555c6d111b7dae168cbf868b4e00e48d29f033b6edd6f10f9f3c,2024-09-12T15:18:22.320000
|
||||
CVE-2024-42483,0,0,1d06307bfa3f6a5de26b6507724fa4de8dc1f951a458e9ced7b465b45fd6ee98,2024-09-12T15:18:22.093000
|
||||
CVE-2024-42484,0,0,22ea8933942c555c6d111b7dae168cbf868b4e00e48d29f033b6edd6f10f9f3c,2024-09-12T15:18:22.320000
|
||||
CVE-2024-42485,0,0,b09b549a640b11a354d44b9475923cc6fe2bb8793f6b86eac9ba8078a1b1156d,2024-08-12T18:57:17.383000
|
||||
CVE-2024-42486,0,0,a989fdd89a78984e53108438ae1d4599e890f4b44bbe2719c613b74d6b8f2b23,2024-08-19T13:00:23.117000
|
||||
CVE-2024-42487,0,0,2efeb3a744823d93cb77dca921c5d1e1876bd604d6d9b9e3d12e2ec5d005b3d2,2024-08-19T13:00:23.117000
|
||||
@ -258433,7 +258434,7 @@ CVE-2024-42756,0,0,ce5af71546f0263f395c227c3cfac6fe59ce60f8865d3d0ed46c37703f4af
|
||||
CVE-2024-42757,0,0,7f6ba25a82908bfc7acb20e761fdbba6f23f597232f39843fc1cc43949e3074d,2024-08-20T15:35:25.190000
|
||||
CVE-2024-42758,0,0,78591070e9343c09b0ea814d5b331b967691862f9b02d6e8c624fb011530a86d,2024-08-19T18:35:14.237000
|
||||
CVE-2024-42759,0,0,83ca77ff674de3e3917aa205efaf61575c9c366960c9df81199b2455f1152daa,2024-09-10T16:35:05.400000
|
||||
CVE-2024-42760,0,0,85ab4e0edf9f9f4f30f7c0bbfa280d9fb232762dd5bc9865dc15792ebefac07f,2024-09-12T12:35:54.013000
|
||||
CVE-2024-42760,0,1,cf945ddb7d92332fe15337c80f2b6ea0d1eec9745956d3d66c31b61d7265bd36,2024-09-12T16:35:07.910000
|
||||
CVE-2024-42761,0,0,33c8e57e29c80d5ab961692c95c32ec38cca8789d3650f2c188fd350c643ff13,2024-08-23T16:18:28.547000
|
||||
CVE-2024-42762,0,0,72ec602fc53ee57aef43714af8d33108807c25cff9ab4122dccfb6373af1e78c,2024-08-23T16:18:28.547000
|
||||
CVE-2024-42763,0,0,a111402090b60e50fe4bee869a5fbabeff40957f7ec249ab20f07b5214e58d6c,2024-08-23T17:35:06.477000
|
||||
@ -258563,7 +258564,7 @@ CVE-2024-43031,0,0,c3ec426a9c2d322dc356eb4fe356a9e19c60505e16e054c91bc62d391f448
|
||||
CVE-2024-43032,0,0,8850a9c656ae281e32b28ba33f2ad3aef6596a2affc3579c53c1b92b428efb34,2024-08-23T18:15:07.550000
|
||||
CVE-2024-43033,0,0,fd57d359a27fcaf19587aca04a23681152ba867b02d3eb512220398c8467fb35,2024-08-22T16:35:08.663000
|
||||
CVE-2024-4304,0,0,cc036c021f3a6e70e19e6533fc0c5b7e8e9615d68f40d67450c876ce97ebcd8f,2024-04-29T12:42:03.667000
|
||||
CVE-2024-43040,0,1,1da4fee0ec9b26a667b61884070b050a8f4bcf13a2b21e01185cd5279abd34cd,2024-09-12T14:35:15.010000
|
||||
CVE-2024-43040,0,0,1da4fee0ec9b26a667b61884070b050a8f4bcf13a2b21e01185cd5279abd34cd,2024-09-12T14:35:15.010000
|
||||
CVE-2024-43042,0,0,b853bda14fa02964a16c19d1896f72364ccfb9e1c7f5c0faac2a5ae6d185d191,2024-08-19T13:00:23.117000
|
||||
CVE-2024-43044,0,0,0f847f7b25552f59db6fe108bc5868ae7095ef3bf92eb01d14caa8a1c32e542a,2024-08-16T17:19:30.643000
|
||||
CVE-2024-43045,0,0,0dfb92f72f0dbde6ae96c501ce5cc9672bcd5c0db43f23e4e6beeb976b582ca3,2024-08-16T17:21:26.803000
|
||||
@ -258633,7 +258634,7 @@ CVE-2024-43207,0,0,e22c5710770b6cfc075b06ecdaad97a6d82c458382d84efdd62d5cddbde66
|
||||
CVE-2024-4321,0,0,9cab2a859d144dd765da27aaa03d49bb12083c0b11abfa900a9b065f4ea718e1,2024-05-16T13:03:05.353000
|
||||
CVE-2024-43210,0,0,38b1ddd569737ddf84a414c75c09c54bffe5570d779b3b2b7d84160c7c88ff6c,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43213,0,0,6c696e57f95479918ef25ca22ce88cf027f14ad7abeabc2f23e004d6693a5cce,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43214,0,1,e772b18793672d06b1bfe4d88f116d9521d26ae1727a72efbef192814b0907e8,2024-09-12T14:17:59.390000
|
||||
CVE-2024-43214,0,0,e772b18793672d06b1bfe4d88f116d9521d26ae1727a72efbef192814b0907e8,2024-09-12T14:17:59.390000
|
||||
CVE-2024-43216,0,0,b986dc9a8b3b2203463866beb8a53631207ae789a2b2f2fe22846d054a89bfa2,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43217,0,0,f82c4fc5d8211638ca35d56d40ca602f216f2cb77b05fbf9169296f7ea83635e,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43218,0,0,7211cf498c311837d292e9f824bafb9f3bdd8538b1ebf61d4a91523261453a7b,2024-08-13T12:58:25.437000
|
||||
@ -258675,7 +258676,7 @@ CVE-2024-4326,0,0,d965aff3554882d9e9e5ba1861fcd18121a605b5a6347dc41a19bd090bda9a
|
||||
CVE-2024-43261,0,0,7e3a09c15994d8b37652b6cbdd566fcd6029259bdaea29b270586a7bb2f271dc,2024-08-19T18:36:07.297000
|
||||
CVE-2024-43262,0,0,ee2d00bd7b26cdad642ada4c4b2d7bc02c0ccfbce8aef1634bfd7f75ad8dd06b,2024-08-19T12:59:59.177000
|
||||
CVE-2024-43263,0,0,cf9b7583314454065255b112c0283ce49c3cc8a3b709e9840e4d308ff741cc3e,2024-08-19T12:59:59.177000
|
||||
CVE-2024-43264,0,0,9aaedb6f14c9dcfcf10cc557bb83952a6b4bf42097f9ab37774f1bd3230eec59,2024-08-27T13:01:52.723000
|
||||
CVE-2024-43264,0,1,b88bb3d3a4de20d0209617126f4d0e47ca340d513ed1b239990af72b80309034,2024-09-12T16:50:07
|
||||
CVE-2024-43265,0,0,84c0f71c024a7e499f61cc0e71f320645c6577ad5ad92a323348bdd90b90c8a9,2024-08-27T13:01:52.723000
|
||||
CVE-2024-43266,0,0,751fa9ab2a13f701be885e7a1662c496db49511ced127e99a8ff80c20e1ffede,2024-08-19T12:59:59.177000
|
||||
CVE-2024-43267,0,0,5b844fafa4776837e860aa27df30c3483f35542b577634e0b86bc9628cc0c001,2024-08-19T12:59:59.177000
|
||||
@ -258710,15 +258711,15 @@ CVE-2024-43304,0,0,0198c9c448bd60be5feef590d21005c81d3809f24efdc4b5ed5165051bdc5
|
||||
CVE-2024-43305,0,0,6bccf6d377d1be8be62035a992eba5e29974b8b5e3f639507282b3c5fef7f322,2024-08-19T12:59:59.177000
|
||||
CVE-2024-43306,0,0,750952469de85379e535e7fe36ecde4cfe7585cff9fc420db3ff5b1672090ebd,2024-08-19T12:59:59.177000
|
||||
CVE-2024-43307,0,0,756435dd685e6ec1730a305e988ba2e01786ffce6cef7ad1c53c4b8372b4d97c,2024-08-19T12:59:59.177000
|
||||
CVE-2024-43308,0,0,ebc63275258c9a5dca6f47485ddf5e389da2ac26b8328a077611ae405b4283d6,2024-08-19T12:59:59.177000
|
||||
CVE-2024-43309,0,0,003237d65446b9dcf255e912f95cf699caa93d1fa11786346494b4856ac89d8e,2024-08-19T12:59:59.177000
|
||||
CVE-2024-43308,0,1,a877913f6f52f25f4de880fc802fae074159a8e8758942c49b34a7aeae2ea006,2024-09-12T16:30:02.100000
|
||||
CVE-2024-43309,0,1,b5ff7496a58101d5fd9edfa847ee5a94e2e6a966282e37cd22c76f6492329cd0,2024-09-12T16:39:09.187000
|
||||
CVE-2024-4331,0,0,f83a1d11dfb2c744e38bc97e75352f54247538f697e111d3b125724e343ab75a,2024-07-03T02:07:25.070000
|
||||
CVE-2024-43311,0,0,a0f8b12007c335b7c931dc515cccbc7b0ce9a673d7ae4a860b8788ba11cdc88d,2024-08-20T15:44:20.567000
|
||||
CVE-2024-43313,0,0,068150560cc2fdf1ef93276f9d6d30b8c87b2fb6306d83317458677f7f96ce3e,2024-08-19T12:59:59.177000
|
||||
CVE-2024-43313,0,1,28b2739b642f0c4b535269ec6c48c2b0871041982feec101264e49bbd04e2f69,2024-09-12T16:40:07.057000
|
||||
CVE-2024-43315,0,0,e6014d85dffd349f3b2ce7320cc3098b6f662e4bd5c45fdcd4617c84b6eaae10,2024-08-19T12:59:59.177000
|
||||
CVE-2024-43316,0,0,859beb015ceda90e0f8ce70ffd30731915df67bb7d6915a72a823922602d200d,2024-08-27T13:01:52.723000
|
||||
CVE-2024-43317,0,0,deae729303ac5b60aa6b622a0415dd60fbdfaaee209a8500c7d589c2c68b55ac,2024-08-20T15:44:20.567000
|
||||
CVE-2024-43318,0,0,929d3c206b8b7d7e6d217d9ac27be25d174c7af4dc7a3c56899a36e2bf514c54,2024-08-19T12:59:59.177000
|
||||
CVE-2024-43318,0,1,a856cfdbf2429d7580e20fb9529b824ae922af53d6f3c0585726a57776fa42b7,2024-09-12T16:24:35.640000
|
||||
CVE-2024-43319,0,0,6004ed3d2c0da8ee736b223c8dbfe8e62afa0793dbd44d176eeb15c8c1e15788,2024-08-26T19:10:09.607000
|
||||
CVE-2024-4332,0,0,229e2a44f62342d9fecf4d77bd1ae1368633da9c89a437515cafc4b1ffcbd9b7,2024-06-03T19:23:17.807000
|
||||
CVE-2024-43320,0,0,ccee38afc2a835bb009830c4531368282e9727bc0052e4d4c17d31bfd55ad002,2024-08-19T12:59:59.177000
|
||||
@ -259018,7 +259019,7 @@ CVE-2024-43912,0,0,1b5f8cbe48a45565b6e53eaf1fe9841ae7c6fee05a68cb38187e11b5ac523
|
||||
CVE-2024-43913,0,0,1c9fd1b4295df0d3d5ed94da6708f3aa88fdfeb6b586d9b4c06ecb1ea382472b,2024-09-05T18:12:55.680000
|
||||
CVE-2024-43914,0,0,cecc040296533d16ec68f112b8d7429d7c31abfac86050a6f05da890be7d265c,2024-09-05T18:03:49.997000
|
||||
CVE-2024-43915,0,0,d179827f4a2239697e62ac501a97b8b3109220e3bde2278c20f3a196442ad24d,2024-08-28T17:44:45.193000
|
||||
CVE-2024-43916,0,0,6612225837a19168a64141162b749a0d0aafe22662aa9dc1991debdff2c1d059,2024-08-27T13:01:37.913000
|
||||
CVE-2024-43916,0,1,31042afa408fe94b440478a73ae72a8d0da3ebc3aa7dccb541b916eb98fd8b0e,2024-09-12T16:21:19.030000
|
||||
CVE-2024-43917,0,0,24cdbe475912047a546c5d424d36145b60978d1605bec7e3b2ca4ce00758ae54,2024-08-30T13:00:05.390000
|
||||
CVE-2024-43918,0,0,ddd56bcf8df0ced2fd43f465099ef1734f47f7e198c9ebd8d1474897ffb0a07e,2024-09-06T15:51:25.957000
|
||||
CVE-2024-4392,0,0,5c82c123a66d3444e81adbb958bd6b8cf11e432e36668571a78dbfc8c82c1c37,2024-05-14T19:17:55.627000
|
||||
@ -259131,7 +259132,7 @@ CVE-2024-4439,0,0,18d544a04352d4558f54a1793cd800ab605d9132c8464460d2f7ebbde183ef
|
||||
CVE-2024-44390,0,0,6367b383b322d2f53bd8e6d4e8d76904ca1c75a20fddee8fd1295aedac6b8243,2024-08-27T14:48:18.393000
|
||||
CVE-2024-4440,0,0,32e49728cdc055a1dbfbd90b8e03664859c56d56e36afdc46644ff6b145c71da,2024-05-14T19:17:55.627000
|
||||
CVE-2024-44400,0,0,46cca54dff368c30e19e4d79a9e5fc6607a7b0ccd1e0fdcd2b02aab471f7abd6,2024-09-06T16:15:03.030000
|
||||
CVE-2024-44401,0,0,ee2c4a2267c2b730b2023e7d052b9b36658db4f1e83370dcd2c9795a645f41ae,2024-09-06T21:35:13.733000
|
||||
CVE-2024-44401,0,1,2f36533a57388286555f9f485bd7670fff32aaf299129a39b7844538812793db,2024-09-12T16:09:45.050000
|
||||
CVE-2024-44402,0,0,d4acc0243f99ebb558313eb78384bfd5d19c34bc0f46a33cc4ea78c414c927b9,2024-09-10T16:58:57.847000
|
||||
CVE-2024-44408,0,0,bceaf662d92e59640c5be45332f34cf4bf71aab9d4c102f8b4268d666b8b75b2,2024-09-10T17:01:55.630000
|
||||
CVE-2024-4441,0,0,ac0779300bad801b6c25a6a11418596c16f707acafd8505b85edf037d6de9dc4,2024-05-14T16:11:39.510000
|
||||
@ -259230,7 +259231,7 @@ CVE-2024-4482,0,0,30c719bdf44110f5d77595f668147507c21a010645f412257434e159bd101a
|
||||
CVE-2024-44820,0,0,23715176f3bb998fe09881aa49c8309f9c9998e3ed78bd103540e1e82782315e,2024-09-04T19:35:13.010000
|
||||
CVE-2024-44821,0,0,ff3428c7064f35632ec8516d4f1ffbf8326fb53cbc8ff73f0451f03ff4bad1c7,2024-09-05T12:53:21.110000
|
||||
CVE-2024-4483,0,0,d9fadea227cf106e149715592d31bb2d237147d959617b97c9049a0f6f95d28f,2024-08-01T13:59:31.397000
|
||||
CVE-2024-44837,0,0,af289e308b7ef679646ea84b321f67c69f09e8e064f0783e312580da955007a4,2024-09-06T16:46:26.830000
|
||||
CVE-2024-44837,0,1,18c58708dc7b004f14a9bc90ac21fd88d28a642d1b4f00511d7bd006e7eb4f62,2024-09-12T16:17:57.797000
|
||||
CVE-2024-44838,0,0,bdab5f75d8cb8f6b0603423cee486234c8e916846deeaf4e5d878bd69f318676,2024-09-09T14:35:06.773000
|
||||
CVE-2024-44839,0,0,885e68fd6f69d801656f2631b61b0e83db0adf5a0433070a496847aecb0b73e1,2024-09-09T15:35:10.797000
|
||||
CVE-2024-4484,0,0,f8c7c7a90ad9fb2504d28a2d6c05b973f8e6ce86f54104c89b314d37b71fcc46,2024-05-24T13:03:05.093000
|
||||
@ -259269,10 +259270,10 @@ CVE-2024-44934,0,0,c02ef0b8f3f4254298df3ea9cd3b57ad77027d83bf4e5f989954ab58227e0
|
||||
CVE-2024-44935,0,0,d95aec9e91962acc52eb3e384a6783d63909024bc92ab328e0dd424f360e30ba,2024-08-27T16:09:01.633000
|
||||
CVE-2024-44936,0,0,f9815d599f28fad94981996d900e9d02a0d2f13fbfa06d4ba10d6ebc83ea02d0,2024-09-05T17:53:43.867000
|
||||
CVE-2024-44937,0,0,d456b794ce05568f4cfe23042c645d8e132bd17f43b2774d90973742618e150d,2024-08-27T16:10:11.423000
|
||||
CVE-2024-44938,0,1,cac367901b693b8791f0dd02822a4a05e43218fd4c6b94a799c4fec632e7e7e6,2024-09-12T14:05:44.310000
|
||||
CVE-2024-44938,0,0,cac367901b693b8791f0dd02822a4a05e43218fd4c6b94a799c4fec632e7e7e6,2024-09-12T14:05:44.310000
|
||||
CVE-2024-44939,0,0,77e340056998b85a0edb6eda2bb5776e7eba0084412d6173fbb841dbdf80b07a,2024-08-29T17:15:08.837000
|
||||
CVE-2024-4494,0,0,48359226f338c9b2ea2806c2c68d5e2ef65a24ac708162309f084eae0ceb81a4,2024-06-04T19:20:39.240000
|
||||
CVE-2024-44940,0,1,3d7a36ee27f7c290f32cda36725439925cd59b4b1a4b081b71d7802f9cb5b9bf,2024-09-12T14:10:00.857000
|
||||
CVE-2024-44940,0,0,3d7a36ee27f7c290f32cda36725439925cd59b4b1a4b081b71d7802f9cb5b9bf,2024-09-12T14:10:00.857000
|
||||
CVE-2024-44941,0,0,20521e6b3375de1ef5f8d927ded27494829abd96af181743a86f9f68bd518b56,2024-08-26T12:47:20.187000
|
||||
CVE-2024-44942,0,0,17b37362bd3ba24b1a5ce481b72105519e3d684fbcb26bdd0327529225c432f3,2024-08-27T16:09:10.010000
|
||||
CVE-2024-44943,0,0,283eaecb4a15bfc58a84156c8fa38a69ba8363c53f00af38995bb3b34fd2d3c5,2024-09-10T18:12:43.380000
|
||||
@ -259392,7 +259393,7 @@ CVE-2024-4505,0,0,4ef7357f00ff85be3b87c4353ae099f1aed84eaee3f1c1bda33ed5ec6e1152
|
||||
CVE-2024-45050,0,0,df9b4eec2db8faa9598e51ddf6755fc85d9bbe27148ae6e75c24afdc28423065,2024-09-05T12:53:21.110000
|
||||
CVE-2024-45052,0,0,8b5354ce3732be9a4ec5c7e0d7652b2053216fa0d00ab80b71e08b5337152575,2024-09-06T18:18:59.710000
|
||||
CVE-2024-45053,0,0,f91ffa38b1f1473a6604647a2be1fa377450e287db4b7cdb71eb6f698ce9f726,2024-09-06T18:20:35.430000
|
||||
CVE-2024-45054,0,0,2d3e64287c98bd3c39f95869bc8d62375342ccfec14429b476f82286ec431f93,2024-08-29T13:25:27.537000
|
||||
CVE-2024-45054,0,1,ff75628d00a407a70c7f6309d50fc58f4f9685e929e8ef8f6791dc204e0cadd5,2024-09-12T17:50:11.233000
|
||||
CVE-2024-45056,0,0,691057e2a8bd235b7cec2ff9d1864de57863221b46b0db10be9809732ea41217,2024-09-03T15:14:54.877000
|
||||
CVE-2024-45057,0,0,103b6de50ea8c78a895eccb4e8970b15e6d1e5c072b0541da4b181b9fbcee5a8,2024-09-06T20:15:04.443000
|
||||
CVE-2024-45058,0,0,e14ae7cd8c630ee9558396031b963ae5f55888ff4a83970664d1742bc54c6950,2024-09-06T20:15:04.547000
|
||||
@ -259415,7 +259416,7 @@ CVE-2024-4512,0,0,26a6b6bccaf4c25a8f55831184ccf900ec4db9044766abdc62f8dfefbc7cb5
|
||||
CVE-2024-4513,0,0,6c3f318b0d8a8c538c1f3920692d132bd9a92a5cfece17f174b91ed826f80818,2024-06-04T19:20:40.633000
|
||||
CVE-2024-4514,0,0,385303b4c456222ef36bff0fbd012efb4cf0e7eb509cfab25e182e333e168c36,2024-06-04T19:20:40.733000
|
||||
CVE-2024-4515,0,0,745b5001aba1f09f57fb481d2a3d2000635a4a96793fd9115da6678f1f7fddb3,2024-06-04T19:20:40.830000
|
||||
CVE-2024-45157,0,0,a70ea8a136cde7120f4896a24b05f80d08c43354a230d4aa23a7495393f28366,2024-09-06T12:08:21.290000
|
||||
CVE-2024-45157,0,1,63dadaa4025af01917ecdee4f3056de9070f640b6e5412ee381e40dd74f61d1e,2024-09-12T16:29:42.717000
|
||||
CVE-2024-45158,0,0,f4aff4de2d03b3142e6ab8f036af352cca5d7617879cb7e89e1ecc71620fc908,2024-09-06T19:35:26.390000
|
||||
CVE-2024-45159,0,0,536b41a2ee45b72a77485ff00b0df03c600eee1ed452fbccbec7bdbd95c0104a,2024-09-06T12:08:04.550000
|
||||
CVE-2024-4516,0,0,7413b58d03a0a8938a8f9c3b85a26b19cfb41e2c50a00216b0df80496b4b87e3,2024-06-04T19:20:40.930000
|
||||
@ -259463,7 +259464,7 @@ CVE-2024-45239,0,0,c3ffeaf25be7007252e004249861dec4385985427eba5bc5855dd2ae53128
|
||||
CVE-2024-4524,0,0,8e732eea1a281702bf1b965cf73e8243f70f2376e5e0521757bce6618382002a,2024-06-04T19:20:41.520000
|
||||
CVE-2024-45240,0,0,71d060de9ce29049494d6966979673903641ebddefc965fc9df5c7a08f6ba1cb,2024-08-26T12:47:20.187000
|
||||
CVE-2024-45241,0,0,db0315abb9e90395d374e44a8c98955e324445d54e9a189001fc6da18a250f14,2024-08-26T16:35:14.650000
|
||||
CVE-2024-45244,0,0,04ec371a5ec295d1c0097b651a975d789e4ec204f1b83d9502ae173dda06f874,2024-08-26T12:47:20.187000
|
||||
CVE-2024-45244,0,1,a9f691efb65025129369bbba49bc88f6c172529b68c55b8214f47c2d49100aff,2024-09-12T16:07:49.530000
|
||||
CVE-2024-4525,0,0,dfe2a87106534aea559d2a64c000518f6d0b8952ad5d7b752f8fc10ec2414d43,2024-06-04T19:20:41.620000
|
||||
CVE-2024-45256,0,0,1ad6eb17928348883dd9cb354722f92894049d9e7bbed38aa0c5260ca73ab2c4,2024-08-26T13:35:02.937000
|
||||
CVE-2024-45258,0,0,20ee97d2eb3a83f8d2a7be46b53936d32dfd424c455ff5dc5358a331a56dedc1,2024-08-26T14:35:08.627000
|
||||
@ -259501,7 +259502,7 @@ CVE-2024-45310,0,0,b4f994e38147edf9427b72be6b743ed0caed3e55fb540eb2ac96b6f81ac20
|
||||
CVE-2024-45311,0,0,e1c89e007360c82e1c247aeb49c5c1a5ea2214c99aed5f47bced78ef186e4d38,2024-09-03T12:59:02.453000
|
||||
CVE-2024-45312,0,0,4476866c9a0b7f514de1f948afa080c627a68be3fca1f01a9754ac6804bbd59a,2024-09-03T12:59:02.453000
|
||||
CVE-2024-45313,0,0,82e38f6d2921c3b3e9a238db6883354f1d86d2d1f780a332f8c54bf5a5667942,2024-09-03T12:59:02.453000
|
||||
CVE-2024-45314,0,0,47c1d25a326359dbe89a889c7d5cd18acfac2ad247faa78128dabc37aa838fbc,2024-09-05T12:53:21.110000
|
||||
CVE-2024-45314,0,1,2f1c9dd8ac80290a1853d4f2b69fb0ae8e68e38eb15e5edeb668cb7a47ecee3c,2024-09-12T16:39:53.690000
|
||||
CVE-2024-4532,0,0,4fd2f02f0358f1c611846b77f1b0e80bcb1985e07f23fa6a21a71cc25593500a,2024-05-28T12:39:28.377000
|
||||
CVE-2024-45321,0,0,385b3d1e3bf54e8ae2af5d5796ef0b1ffaf17d58c18e0fbe7542c0dcea09b2e4,2024-09-06T22:30:19.337000
|
||||
CVE-2024-45323,0,0,bf6d6a90ce60904b71685f4c528b1a89b3acc23eb6b2486df987dee7a750f76a,2024-09-10T15:50:47.237000
|
||||
@ -259539,7 +259540,7 @@ CVE-2024-4543,0,0,cda17786b919b03cc3eee3c735d905916723b9b88a929a8c3a419843d78bdd
|
||||
CVE-2024-45435,0,0,927041b8e7c5f8f0713d2961d74ba13597912bf3d79d8a6803fd6f88a7797c28,2024-09-03T17:23:36.073000
|
||||
CVE-2024-45436,0,0,285ce8c7d8a1a73359dbcdd8ed12fdef35f675e020b230adf62e4aee88352a8c,2024-08-30T16:08:54.840000
|
||||
CVE-2024-4544,0,0,15f8e020f3ae5b19c85909c1ae8a806386c0b6da2837ebed60d92355c70c1564,2024-05-24T13:03:11.993000
|
||||
CVE-2024-45440,0,0,9239656ddb6aeda0c2c6efeace5c8dd620d5a27bf71f1e1bdb521249d601edd3,2024-09-03T18:15:08.967000
|
||||
CVE-2024-45440,0,1,c212cd083658441929c3f1a8546e70b24f36c134158f1e036b3763b55d3f6ae5,2024-09-12T16:15:06.943000
|
||||
CVE-2024-45441,0,0,c6377f5d102c4756f95fa84a891ef49c20b089eeb607315c413e8236a877973d,2024-09-04T13:05:36.067000
|
||||
CVE-2024-45442,0,0,5eda813700f2425d469ff2e0d5f1be3312e2c5087e15cc68d790cc3e9fc8aaa5,2024-09-04T13:05:36.067000
|
||||
CVE-2024-45443,0,0,162552df88a79f08b277538012a14f30ef91af105cdfa5945ebbfc7ec02b8e03,2024-09-06T13:33:10.347000
|
||||
@ -259571,15 +259572,15 @@ CVE-2024-45522,0,0,cfbe5f5b4866198ecf4773ddc4ec07a576ac517554c3c987f558bc88648f0
|
||||
CVE-2024-45527,0,0,0ed4b7876171a991bf7220f1ee96f2007c9fed522b397370892e632e0f15c024,2024-09-03T15:35:13.673000
|
||||
CVE-2024-45528,0,0,b726a60695697377572ea54be1902b1c537e8da89a7623e441b7aa9130d0fc17,2024-09-03T15:35:14.480000
|
||||
CVE-2024-4553,0,0,a1e8f5bd1acd4a97b93bbbe85c146f94099965137fad1ebd49acd106c4b8e00a,2024-05-21T12:37:59.687000
|
||||
CVE-2024-4554,0,1,92f30e92e4fc7deaf96b5e461132de3163a1189a641d3cd890f26d9e64523486,2024-09-12T15:01:12.217000
|
||||
CVE-2024-4555,0,1,c6e5ee837600c596327a91768410832a19be004b920151e53620c97a72516b9c,2024-09-12T15:13:25.520000
|
||||
CVE-2024-4556,0,1,32422e1a58fd58f5056dd13adba171d2a9e41531acfe1ea2f85efa6ba6a345d7,2024-09-12T15:09:55.107000
|
||||
CVE-2024-4554,0,0,92f30e92e4fc7deaf96b5e461132de3163a1189a641d3cd890f26d9e64523486,2024-09-12T15:01:12.217000
|
||||
CVE-2024-4555,0,0,c6e5ee837600c596327a91768410832a19be004b920151e53620c97a72516b9c,2024-09-12T15:13:25.520000
|
||||
CVE-2024-4556,0,0,32422e1a58fd58f5056dd13adba171d2a9e41531acfe1ea2f85efa6ba6a345d7,2024-09-12T15:09:55.107000
|
||||
CVE-2024-4557,0,0,66c84ceab02c8adff7c7e309e3c388a17800860cf81ce53b59e1c60dda9ffb15,2024-06-28T13:19:24.767000
|
||||
CVE-2024-4558,0,0,f33120bad100499bf0c3c5e20b119cff8d6ade1c8324fe8cac904ff1ff2e147b,2024-07-30T02:15:08.293000
|
||||
CVE-2024-45586,0,0,e206a9f9f52d6df31e8745674bc07b4799319b79462f9d7a84cd2e9a2bd105dc,2024-09-04T12:15:05.320000
|
||||
CVE-2024-45587,0,0,0131eba1114d110e01e395a66f8c68816d231f10bed8e8f9e00161c4edaf0484,2024-09-04T12:15:05.530000
|
||||
CVE-2024-45588,0,0,7fb04f846e0d14b9a2876b98b70ef6e3701ca14d55fb8c54290d798cd0a7dd22,2024-09-04T12:15:05.673000
|
||||
CVE-2024-45589,0,0,4ca23375507ab51a842804ba26891083e8122cc3612ead88b2e19a5895b5de2c,2024-09-05T18:35:13.200000
|
||||
CVE-2024-45589,0,1,d76925ef744d303f201169eea84f44a09193171a206cae996e6096b9a83e51a6,2024-09-12T16:54:09.467000
|
||||
CVE-2024-4559,0,0,bf46d9d7302afe42ee4323175537eeb1eb701f6d945f2b96b5e6acc4bfa04589,2024-07-03T02:07:46.003000
|
||||
CVE-2024-45590,0,0,33a9284ad7b072af3e12ec0d98b0ff5436fee16440e3416e3f86164583a7abc2,2024-09-10T17:43:14.410000
|
||||
CVE-2024-45591,0,0,3095138b46301853b277bd15d48e13d638424600951e5440ccaed7e7cbce6a5f,2024-09-10T17:43:14.410000
|
||||
@ -259600,7 +259601,7 @@ CVE-2024-45620,0,0,79d0fcf4ffd9e5c58086135dfac2f9737c74cc4ac6ac6ca9de004adbc8816
|
||||
CVE-2024-45621,0,0,14a519a8f510b3c3b7a6df78c35235d4501d8bcffdb6cf42158adb38aa1e44bd,2024-09-03T12:59:02.453000
|
||||
CVE-2024-45622,0,0,a33339926b8b20e966e52f22a13007f367a7fdd9b0655040e29ed073b9b76629,2024-09-03T16:35:09.647000
|
||||
CVE-2024-45623,0,0,6e76d49f362c221a481237923ca3f07ce122524ae0700d93b755e69d33328599,2024-09-03T15:35:15.360000
|
||||
CVE-2024-45624,0,1,7a0e35c55ac45641bb752e88253516bf9e2f94ec9e17765278ecb76cea70fa1a,2024-09-12T15:35:48.600000
|
||||
CVE-2024-45624,0,0,7a0e35c55ac45641bb752e88253516bf9e2f94ec9e17765278ecb76cea70fa1a,2024-09-12T15:35:48.600000
|
||||
CVE-2024-45625,0,0,3e5f2d639aef0e82608d7bd80d0e32d86a25b4046e30921cb8739a9c3be44b6a,2024-09-10T11:19:40.113000
|
||||
CVE-2024-4563,0,0,a90af34c00297497a78ff72a2c306ea2262a49c5811c3b8bcaed5ddcefc9b6fb,2024-05-23T16:15:08.867000
|
||||
CVE-2024-4564,0,0,045273651cbda7642192b25b1ce14ee6220cb16969b1d2c569252c03c480a950,2024-06-13T18:36:09.013000
|
||||
@ -259631,10 +259632,10 @@ CVE-2024-45790,0,0,bc78a0525fb1c487c69a01d2acc05058c08f308e130aa06c5852c7814b827
|
||||
CVE-2024-4580,0,0,975d7d3fa65fc4746aeff6882996f0991cc57002c73b964b5a97c9777b6d66f5,2024-05-16T13:03:05.353000
|
||||
CVE-2024-4581,0,0,87f8fe03f507957c50ab3e12c65c26f01a42761aed681f779ccb3bf731c25cc4,2024-06-04T16:57:41.053000
|
||||
CVE-2024-4582,0,0,44a298c10fdfe0ab8acf9c943d89720dd7bed9fa14549ad9833d5c0a75c14780,2024-06-04T19:20:42.750000
|
||||
CVE-2024-45823,1,1,f13d03868cb026f29630cd792bf573f593ab91c5ce2ad974f966afcbd08cd596,2024-09-12T15:18:22.547000
|
||||
CVE-2024-45824,1,1,9f4189ea7a7c8c0c8b8535dc50c0b71c9f56154c000c77147005429a4a6e7ed8,2024-09-12T14:16:06.953000
|
||||
CVE-2024-45825,1,1,dcb5296500b63cc6be85906a3b9f3804850d62137628f6063e29b25c9b14d20d,2024-09-12T15:18:23.387000
|
||||
CVE-2024-45826,1,1,b3cdb428c266c4a9e5b87979609897020541adf3487c772725f0f8c0555b1655,2024-09-12T15:18:24.287000
|
||||
CVE-2024-45823,0,0,f13d03868cb026f29630cd792bf573f593ab91c5ce2ad974f966afcbd08cd596,2024-09-12T15:18:22.547000
|
||||
CVE-2024-45824,0,0,9f4189ea7a7c8c0c8b8535dc50c0b71c9f56154c000c77147005429a4a6e7ed8,2024-09-12T14:16:06.953000
|
||||
CVE-2024-45825,0,0,dcb5296500b63cc6be85906a3b9f3804850d62137628f6063e29b25c9b14d20d,2024-09-12T15:18:23.387000
|
||||
CVE-2024-45826,0,0,b3cdb428c266c4a9e5b87979609897020541adf3487c772725f0f8c0555b1655,2024-09-12T15:18:24.287000
|
||||
CVE-2024-4583,0,0,80422ff6020fca1720c5a88e28ab76aaa9a918b3afa6700e13782e64857c6739,2024-06-04T19:20:42.857000
|
||||
CVE-2024-4584,0,0,4d639afeee5354fec0a7cf3023bb849f2437d78f7cd875e4a49ac03b46b9ec82,2024-06-17T19:15:58.903000
|
||||
CVE-2024-45845,0,0,4d1151a3b662098d77e53a9c7dae2a157920328f9101b07db6113969fbede812,2024-09-10T14:35:08.550000
|
||||
@ -259676,6 +259677,7 @@ CVE-2024-4608,0,0,6b948b515db267f779f431dbe386ca01ccd7f50a9fc569455bb84149dca963
|
||||
CVE-2024-4609,0,0,b6f3fd3db9085553e8d026a562774e21d6dc7bb2eb7a9a6cfeb43138546783c0,2024-05-17T18:36:31.297000
|
||||
CVE-2024-4610,0,0,43047990281e26a04055de4ace6574603f0b08f61a7727d9acdec64f6d8d9784,2024-08-14T17:06:24.800000
|
||||
CVE-2024-4611,0,0,51a3d5438728b832e97210e2f9860d8c98e7a9272bd8319e6cdccdf57653adc1,2024-05-29T13:02:09.280000
|
||||
CVE-2024-4612,1,1,f022b1f6201b8e9dbf797bb7ea25123f21da60bf3888fbf8977e25589cc90b9b,2024-09-12T17:15:04.740000
|
||||
CVE-2024-4614,0,0,eca609b72f6d0dbdf3e2930a517382c618b783ca5f3bbd2f9a2c62afa1f7de10,2024-05-14T15:44:12.883000
|
||||
CVE-2024-4615,0,0,7b5276905c165aa4f37a2a2e956283f0d8e2b47a85a8c0a930e4cc6ae0292a24,2024-07-02T14:51:50.013000
|
||||
CVE-2024-4616,0,0,cb1145576a9fadb27b9b56693aa172c2cd4c0e400aa0e13b3db507a976467534,2024-08-09T19:35:10.193000
|
||||
@ -259716,6 +259718,7 @@ CVE-2024-4653,0,0,7b6d5c0913690c5b51d844fc9718b4208eaa5f352f244fd41eee7be1add5e3
|
||||
CVE-2024-4654,0,0,0088d34096b2578204ff98fe71c1f702e4c8866653411407f72fe940a56448df,2024-06-04T19:20:45.100000
|
||||
CVE-2024-4655,0,0,95970f39f135367edf16c40c69bbdd98999f38726ef0802da749dedbafaa6dbb,2024-08-01T13:59:32.490000
|
||||
CVE-2024-4656,0,0,32c9d7e0c2f1168ca7d7381e4fab827ca08fdbd964272924da1671d43db7cf43,2024-05-15T16:40:19.330000
|
||||
CVE-2024-4660,1,1,1b4648870ed7203dfb4a78a16db095a51762d760d9cf0a2e952a86a170a0f0e4,2024-09-12T17:15:04.937000
|
||||
CVE-2024-4661,0,0,f19406aac3e0e4dd229494d2c7f4a9ae6fd94c8256be755b3955222db7d3bf70,2024-06-10T02:52:08.267000
|
||||
CVE-2024-4662,0,0,42d3ec88d759fc9bf88fc92972e0c9891830916b90a0cdbb0331ad5486f420dd,2024-05-24T01:15:30.977000
|
||||
CVE-2024-4663,0,0,26abfae0d13c9db7079b41941554710f5ceae1c12961c27d4c50148758e145c4,2024-06-20T12:44:01.637000
|
||||
@ -260413,6 +260416,7 @@ CVE-2024-5431,0,0,c05cafcca4db035c01a1ef8070f41d696cf1ed72d29d4b28e570debbe2ef62
|
||||
CVE-2024-5432,0,0,ab16c13801145bb5eaae071d9c21b29aca78e7920ad4908920a2f03fb30ba995,2024-07-15T16:53:35.600000
|
||||
CVE-2024-5433,0,0,cf9a3f50aa3044d0d1df4fa80d5f9a0105faaa25fcb8a234110d2fd0fcff2ef0,2024-05-29T13:02:09.280000
|
||||
CVE-2024-5434,0,0,bd01f6ae7a25122b4c9cfb7b6da0885ad33a7f141dec8df17c44747d924fac75,2024-05-29T13:02:09.280000
|
||||
CVE-2024-5435,1,1,a0ec9b15f8067f40870cadbb35ed32f8db168ba5e18c986e9749f0397ade39e6,2024-09-12T17:15:05.147000
|
||||
CVE-2024-5436,0,0,1f0ff22e526bae999a5752534900397469f10984712d6e1a281251b3244c7ffe,2024-05-31T13:01:46.727000
|
||||
CVE-2024-5437,0,0,b00058f5764b16d4661c63f1983ab9dae77d46bb23d9cbf0d57b3c9fafbd7a4a,2024-06-04T19:21:09.363000
|
||||
CVE-2024-5438,0,0,beb1b61cb3794f25e50aa4c7911116dbbb532eaf0bf3366ce9bd52ca79f18ec6,2024-06-11T18:26:45.147000
|
||||
@ -260630,7 +260634,7 @@ CVE-2024-5690,0,0,d97da1ed16aadcb18dbcdccf4095ed3e100e24ec0426a177c2c96faa76e14b
|
||||
CVE-2024-5691,0,0,5f94a4cdfecfdccc98e41d19459a5804c0a9703c03d05b1e9ae63480a42a1f11,2024-08-16T14:44:05.733000
|
||||
CVE-2024-5692,0,0,da86a3e71defc1a5762f0a215e21c8d6ad0bb48702dddd9796e84e537e21cbce,2024-08-01T13:59:56.967000
|
||||
CVE-2024-5693,0,0,0c0efe07ae7eccba3dbeb9fe7241e864745aeb8b41f02dc5d33a8371321e7469,2024-07-03T02:09:11.353000
|
||||
CVE-2024-5694,0,0,275b578189d93f8e1ff5fb24ee08b4deeac272512e00405f2d220d413d57023d,2024-06-11T13:54:12.057000
|
||||
CVE-2024-5694,0,1,ace63644ca0f81e92cb2ca8bc5ddbc74d0ec729be67dab24c15a205f095281dc,2024-09-12T17:28:47.137000
|
||||
CVE-2024-5695,0,0,5c1c35f0ec6580e07f73e1a07a8ae630ee78fe7f1d5e3c7dbc856e78693a01eb,2024-06-11T13:54:12.057000
|
||||
CVE-2024-5696,0,0,fa7fca85e8582886b101603c50bdb44ca98f1e5885ef874b4a6ee74a96bce0a1,2024-08-01T13:59:57.203000
|
||||
CVE-2024-5697,0,0,06452bf48aa37ad04061ffb4c87c934e4b6e078d1729c773deb048b1e305163c,2024-08-23T15:53:28.170000
|
||||
@ -261138,8 +261142,8 @@ CVE-2024-6307,0,0,a6037df0fa8617c9aaeffdc703000fa7423e885d439338f30eb38eb0279e87
|
||||
CVE-2024-6308,0,0,cf3335932895cc5b7b30298253b1ad27ca784bca4cc44021e5d9d879a9556c6a,2024-08-30T13:54:49.400000
|
||||
CVE-2024-6309,0,0,81d9ed106c3d88c28590c6ed22c5b32147121a952907a1333c0b11de5b47c5b3,2024-07-09T18:19:14.047000
|
||||
CVE-2024-6310,0,0,c979f814f3e48b96dc9635b552e8c56621ee7c90068be27a9e484f3e9730aa89,2024-07-09T18:19:14.047000
|
||||
CVE-2024-6311,0,0,f04e13573c749cfeca452e618b936eb1c8a63cb8fc23e98f232d1bf163e9d4cb,2024-08-28T12:57:17.117000
|
||||
CVE-2024-6312,0,0,92cdb70548bb645a49de038a8864b14342ec73c98f015bc67f1942a2cebbc302,2024-08-28T12:57:17.117000
|
||||
CVE-2024-6311,0,1,aed03755bfe746e535a25860f296755213a056b301f44c22b5088a4935a314bd,2024-09-12T16:46:57.037000
|
||||
CVE-2024-6312,0,1,d1934e932f29edf80f866d5e08d254eb0d49236f2b27869aa29a009ed7295881,2024-09-12T16:47:21.140000
|
||||
CVE-2024-6313,0,0,3f3a1eb3f6568b25e7e4a0a5a221dc14475a69801be2f42305fb08dd6e12247b,2024-07-09T18:19:14.047000
|
||||
CVE-2024-6314,0,0,d18fb3c15bbc48d64598d0e894895cc32debae6dd1aff2381c9e4370989d88ec,2024-07-09T18:19:14.047000
|
||||
CVE-2024-6315,0,0,fab08e85f8b8e3173e728e58aba1b4c74bfe4a8ce767294e3e8e784d2124e746,2024-08-06T16:30:24.547000
|
||||
@ -261206,6 +261210,7 @@ CVE-2024-6385,0,0,13d2095bcd11ed43b6c47262c7b96c8a9e162b20cb975895bc98c3af67d39f
|
||||
CVE-2024-6386,0,0,9164927dbad6e7427231be8044dd2ccc9162f1a1173b863f2e4642cbddb16648,2024-08-22T12:48:02.790000
|
||||
CVE-2024-6387,0,0,db893df8e717a9bd82383b1c159531d9bd008b0dedb866ba3b332081811995f1,2024-07-30T02:15:08.387000
|
||||
CVE-2024-6388,0,0,0ce37f83493b5d79bb3fdc963327390bc09266ac17f5f1de660cf43d4cdce70d,2024-06-27T17:11:52.390000
|
||||
CVE-2024-6389,1,1,393701da79284033f22bcf52bb016890f887a395a0ddd2053135633fc21e3e56,2024-09-12T17:15:05.340000
|
||||
CVE-2024-6390,0,0,a350381d3f247972bbe468db9ec2332b3c135e89cdf36bdf1358f9f5965e67ff,2024-08-05T14:35:08.267000
|
||||
CVE-2024-6391,0,0,f39301e9680e09028795caddd1f0219ac421e8fbe3773aa2e024531728c8f9e1,2024-07-09T18:19:14.047000
|
||||
CVE-2024-6392,0,0,edc3ee0e5658afb33c71de43cf2ca6ea07650ea12323a6b995125316053d44cb,2024-08-15T14:56:16.490000
|
||||
@ -261244,11 +261249,12 @@ CVE-2024-6438,0,0,dda5c3ef0b29175f6296e0b89d7c12c3e07fe51c2f0cc30ea59ffede8f2663
|
||||
CVE-2024-6439,0,0,17c8c0dedf84f798cc0f5ae1eb12bcfee8d03a9530b75eee07a6ecb983f8a09a,2024-07-02T17:58:39.773000
|
||||
CVE-2024-6440,0,0,2c5be04f311531a7679fd469afc24458b735968d4c5b698cdcf03804f39d3eef,2024-07-02T17:58:15.410000
|
||||
CVE-2024-6441,0,0,15383e1684ea64dc1d374e71fe60467b8bfc18bde94b0e73415ebe68688c2118,2024-07-02T17:44:45.700000
|
||||
CVE-2024-6445,0,0,4e18706ab2589cd20aaa85711db9c589c570ed71d832abb3de9a8a627170f6bf,2024-09-09T09:15:02.513000
|
||||
CVE-2024-6445,0,1,d4bd07ae9eba462d90eb79dcc7204c56bd4679ce8063eb2ebe32db5f30ce9fc7,2024-09-12T16:14:51.480000
|
||||
CVE-2024-6446,1,1,0b9944b31feafa16c8bb1f706ff12830b7eca22763677938003648f2a0087628,2024-09-12T17:15:05.557000
|
||||
CVE-2024-6447,0,0,45fe1e3b45bb9052a54143ac6931092e1b37ff897cd56aa11e3df59780bc06cb,2024-07-11T13:05:54.930000
|
||||
CVE-2024-6448,0,0,29c9fba3b86c8e9eb615a2e1f73377ed9eea71e4eb21902a2662b1cd45074970,2024-08-28T12:57:27.610000
|
||||
CVE-2024-6449,0,1,3f5ac8d5827bd74c021dab1f3c742a29223bd99b31b5ea254ad3baff099e2a5a,2024-09-12T15:32:19.680000
|
||||
CVE-2024-6450,0,1,8d55cc6d4f12f29394d3b3a50861abb969afc8594b50e7d3b980816f16d7521e,2024-09-12T15:42:45.430000
|
||||
CVE-2024-6449,0,0,3f5ac8d5827bd74c021dab1f3c742a29223bd99b31b5ea254ad3baff099e2a5a,2024-09-12T15:32:19.680000
|
||||
CVE-2024-6450,0,0,8d55cc6d4f12f29394d3b3a50861abb969afc8594b50e7d3b980816f16d7521e,2024-09-12T15:42:45.430000
|
||||
CVE-2024-6451,0,0,6a9c0fb65fad3a5f99e557f5250ddd026fdc81cb51b281650e16075ca1a8cd9e,2024-08-19T17:35:23.417000
|
||||
CVE-2024-6452,0,0,c694c1bdf54902e69172121aae2a54d0747cfc16750499c01d3cf3c9c6ef3263,2024-07-03T12:53:24.977000
|
||||
CVE-2024-6453,0,0,997e33861988fe67139dbc94cb45099acca0539b377b12d39324c5c718a66e9d,2024-08-21T14:37:10.103000
|
||||
@ -261294,7 +261300,7 @@ CVE-2024-6506,0,0,58310ca3e68e3dacb16dafd9b32db187bdf111a88d3da008267c8c84bbec48
|
||||
CVE-2024-6507,0,0,4e3b24fd61e25de66a6840473e4d19109a713188592b0f05efa1cbb9de33936e,2024-07-08T14:19:21.610000
|
||||
CVE-2024-6508,0,0,5773cbe3ab2c4eb69c1efc3c03d7ae03bdf5d1ca7c49c5fd875f2b2bd8e08dcb,2024-08-21T12:30:33.697000
|
||||
CVE-2024-6509,0,0,7eb4fc03788f01fd646b7975c190061926ae41b355a82f9aed0c1fc50ccfb715,2024-09-10T12:09:50.377000
|
||||
CVE-2024-6510,1,1,1a7f2b9b3813d26bb892d1d258cbccea18800f922723ddf82973d996fc2807a8,2024-09-12T15:18:26.347000
|
||||
CVE-2024-6510,0,0,1a7f2b9b3813d26bb892d1d258cbccea18800f922723ddf82973d996fc2807a8,2024-09-12T15:18:26.347000
|
||||
CVE-2024-6511,0,0,053f3089b06a0cd915df79eb3301836b5db5c9fe4d3ed571ee6923d36f4d1832,2024-07-05T12:55:51.367000
|
||||
CVE-2024-6513,0,0,bb977a38eaef5aa918756b3907c97d9805111d3bc118dcf2b0096d1bbd202aea,2024-07-04T16:15:03.103000
|
||||
CVE-2024-6518,0,0,7382529f36b9b37e0acec24889e25676a677588945f854438be53c4cb8bd58b0,2024-08-27T13:15:20.033000
|
||||
@ -261407,7 +261413,7 @@ CVE-2024-6651,0,0,ea873d27b7e6cf0926f77a6ff240509b7d4aeaa1088e1cf3aab190452e4555
|
||||
CVE-2024-6652,0,0,8978a0baa082505b94e778186034022d155714d2d8ee4e86dbb9cc40d29251d6,2024-08-08T16:43:37.053000
|
||||
CVE-2024-6653,0,0,d93d31cbf15b722e8213bd0a1f350049b73a325a73fea026c81bdae5013a3c4f,2024-07-11T13:15:10.147000
|
||||
CVE-2024-6655,0,0,485f585861c9543e180875e8c8a03aa176dd69bb5a21887c98c071d6ec8a6317,2024-07-16T18:00:02.110000
|
||||
CVE-2024-6658,1,1,88d4f113ec5158cc5c4cc53e75f426e08a746bd6f63deb6c7f9bed34ce79e989,2024-09-12T15:18:26.543000
|
||||
CVE-2024-6658,0,0,88d4f113ec5158cc5c4cc53e75f426e08a746bd6f63deb6c7f9bed34ce79e989,2024-09-12T15:18:26.543000
|
||||
CVE-2024-6660,0,0,caad23d7b98522c6f22294c27dcab3f8925f974b7a7faae66643c3e06a0d6672,2024-07-19T15:48:14.040000
|
||||
CVE-2024-6661,0,0,b1af44a52f9370b6a9eee52c0900f8f875202dae713119fd68b00889cf9d23b8,2024-07-29T14:12:08.783000
|
||||
CVE-2024-6663,0,0,7facb2637e12709d4a455340194f194dba2537cb44d31c2262ed1aa6b9ebcf89,2024-07-10T21:15:11.463000
|
||||
@ -261433,9 +261439,9 @@ CVE-2024-6694,0,0,7d61bbb6e4266a8c90354c9d0cb6da1ede156f667671ed3e7d5507b5e685e0
|
||||
CVE-2024-6695,0,0,99ceef595ada6c305df9cf6da95af28747b0bb8e4a9bd8bdcd9193a7cc73001a,2024-08-01T14:00:34.400000
|
||||
CVE-2024-6698,0,0,89497c4dbd46e9ca69b6c9e20c77840978d4a56c74e425e3a4babf4cd1ed1264,2024-08-01T12:42:36.933000
|
||||
CVE-2024-6699,0,0,929cadbaac0006065219cd2b58294432166a6b8d9db788d9ac82ec21bf2caeb7,2024-08-23T13:55:41.357000
|
||||
CVE-2024-6700,1,1,9cddcbcc5dd8708cfb9526736d117eccdde6e09220af7190cdc4417c727cb02b,2024-09-12T15:18:26.757000
|
||||
CVE-2024-6701,1,1,66cafa8df65827722c832b2e483ed7dd2614d803de8c3c0f73c3baa398f2043d,2024-09-12T15:18:26.953000
|
||||
CVE-2024-6702,1,1,5bcc988f869becfb1576a0ff22d3a4f9c4a84e9d0e524652bfcc1095813e7a74,2024-09-12T15:18:27.133000
|
||||
CVE-2024-6700,0,0,9cddcbcc5dd8708cfb9526736d117eccdde6e09220af7190cdc4417c727cb02b,2024-09-12T15:18:26.757000
|
||||
CVE-2024-6701,0,0,66cafa8df65827722c832b2e483ed7dd2614d803de8c3c0f73c3baa398f2043d,2024-09-12T15:18:26.953000
|
||||
CVE-2024-6702,0,0,5bcc988f869becfb1576a0ff22d3a4f9c4a84e9d0e524652bfcc1095813e7a74,2024-09-12T15:18:27.133000
|
||||
CVE-2024-6703,0,0,58688b231f5fc6deacad90c54b9ce0876a71daf3ee0061b5562a2bcbb8052bf3,2024-07-29T14:12:08.783000
|
||||
CVE-2024-6704,0,0,32c1d6f59091f2a85229ee95d1e57c685e7e8aed9f15efe17b9f77a5487e60e3,2024-08-02T12:59:43.990000
|
||||
CVE-2024-6705,0,0,1e166467558902cf3ff2211f8b1aa347feb308f999c65053186e5a13806e8368,2024-07-18T12:28:43.707000
|
||||
@ -261532,6 +261538,7 @@ CVE-2024-6833,0,0,b0ea48d29166f6347ac218b4f9f93d3f7fc599fd932b64c35cfa55e5a1a946
|
||||
CVE-2024-6834,0,0,23e85f57c9b7230818a4425261a24fd150d79ea72676d6bce04d47efdd69630e,2024-08-01T14:00:44.750000
|
||||
CVE-2024-6835,0,0,41865b692717ae9a44a610e23697ffc045f0e55e3b334eff49e1f6de97130779,2024-09-11T16:32:16.247000
|
||||
CVE-2024-6836,0,0,94c1bcaa18f7036265464de8eba36ccdaae9b63d5d20f60a8cc42904bb485160,2024-07-29T20:20:30.867000
|
||||
CVE-2024-6840,1,1,ae66930204c9920d51dcf867c286054ee06d6bc90d9754de7b9824191f2ced7d,2024-09-12T17:15:05.773000
|
||||
CVE-2024-6843,0,0,aec077e7d49dac8e1cb0382a7568b4a4d58cd66583979c6d1347903e4ac17bee,2024-08-21T15:35:12.407000
|
||||
CVE-2024-6846,0,0,3f14d31d382a54a260125fd51294d960031d5921ae608f837ae240e5738c3bfd,2024-09-05T14:35:26.730000
|
||||
CVE-2024-6847,0,0,3aed5f2ad75c2a50eaefca5c72002315f9d747456f8615efa188f54be39bf54d,2024-08-20T19:35:15.040000
|
||||
@ -261596,7 +261603,7 @@ CVE-2024-6925,0,0,a5a12bc5a2ee9232c227f40ad6ea986ccef3d40fedc40c2c7add12df1c65a1
|
||||
CVE-2024-6926,0,0,8f7a980eaebe48aff3a265873ac088d8aab7ac9e61e313ad47eb901f8ccee0e3,2024-09-04T15:35:26.253000
|
||||
CVE-2024-6927,0,0,e148b46f63346622a06f6186d016b89227da86b491e3aa4a6ce8be2d756e1768,2024-08-29T20:37:07.310000
|
||||
CVE-2024-6928,0,0,04e0edb45267f653103b1b4b8ed00c7e0e3fce07f9c3ed23eb9bfbde1bd8f41d,2024-09-10T14:35:09.507000
|
||||
CVE-2024-6929,0,1,8bfdfdeee5eedcabcdc8115a8b9e0de4383a4f6cebfda630b8dc6730a4ae0a8c,2024-09-12T14:32:51
|
||||
CVE-2024-6929,0,0,8bfdfdeee5eedcabcdc8115a8b9e0de4383a4f6cebfda630b8dc6730a4ae0a8c,2024-09-12T14:32:51
|
||||
CVE-2024-6930,0,0,1339dcde2064efad12400b33b71bb10f58bb3894621d0a104ecb7e997db508bc,2024-08-08T20:06:49.207000
|
||||
CVE-2024-6932,0,0,b45f238b66342b8a7c2c79c0dddcacbab87276fdb0cd01ae77c1653350b609b3,2024-09-10T20:24:40.790000
|
||||
CVE-2024-6933,0,0,31e003a378d639e27641dced44e726d35d058acd0301a48a16d76976ef2aa1ee,2024-07-22T13:00:31.330000
|
||||
@ -262076,7 +262083,7 @@ CVE-2024-7601,0,0,db9958425836572eda0b52c7e651aff0e41e4dc47ec55ea348bc5752e1b198
|
||||
CVE-2024-7602,0,0,1295ede0549ca488da522cbefe2db5abad88498e69c53af1f38f0ee81eb69b62,2024-08-23T16:36:11.690000
|
||||
CVE-2024-7603,0,0,026c301c8508bb2890d37936199245036e5a5160d5195c848eb9252477eef559,2024-08-23T16:36:28.327000
|
||||
CVE-2024-7604,0,0,2ca377c2d37b9340c6f7d1612379ed11f338df19f0e6ffae40ca1da8c016df51,2024-08-23T16:37:09.107000
|
||||
CVE-2024-7605,0,1,bc09a75b7c45de231dc015ea353239dfd63eba4bd43fa0fa35326485eaab33fa,2024-09-12T14:24:03.833000
|
||||
CVE-2024-7605,0,0,bc09a75b7c45de231dc015ea353239dfd63eba4bd43fa0fa35326485eaab33fa,2024-09-12T14:24:03.833000
|
||||
CVE-2024-7606,0,0,d1994339c445d05a7d0516150729b84de3d1d7c8a4d08e8012b40ecbd6deed28,2024-08-30T15:43:41.773000
|
||||
CVE-2024-7607,0,0,1fc6dc2de47de502ba4dba054f1982731028b52bc9234ef0062aa94d686e06ad,2024-08-30T15:41:02.407000
|
||||
CVE-2024-7608,0,0,b8872988f702757177432eab77e95a14e7cc629ce3c064dd49371a09c8fc5a16,2024-08-28T12:15:06.900000
|
||||
@ -262179,7 +262186,7 @@ CVE-2024-7728,0,0,6e291d9f53263e2fb59ac76ca77cbca952de50403aadce3c0e948994f87ca9
|
||||
CVE-2024-7729,0,0,2bbcc23121d3cbbbfd7b7747e3325c391cd14964f404891acd614a24c4694f71,2024-08-14T13:00:37.107000
|
||||
CVE-2024-7731,0,0,e84a2998e171304858ad1fb8b038e10b362c1589200ef021af448b39d41434b9,2024-08-22T14:40:00.913000
|
||||
CVE-2024-7732,0,0,d07658c10ed57e2a3eecd9b14e76e8eed0b7a7133550030a1f5039eb59d98d22,2024-08-14T13:00:37.107000
|
||||
CVE-2024-7733,0,0,d6f0b33872e43d23ba993c9827febac1a615268a96a44f431f426f7460340dba,2024-08-14T02:07:05.410000
|
||||
CVE-2024-7733,0,1,6e2d7bf1ae3b63c8d3634c7048b79cd280171ae70720629e0842a624f33387c9,2024-09-12T16:20:49.503000
|
||||
CVE-2024-7734,0,0,ecf2761e7c92c768ea860282a3ce0e06a2c71cea4892b743b02acfaa994cd50a,2024-09-10T12:09:50.377000
|
||||
CVE-2024-7738,0,0,9abbf70090d4bac2436939ae1d7e5b66071c9e95d911875233a210759cede2ef,2024-08-14T02:07:05.410000
|
||||
CVE-2024-7739,0,0,48d24e6c734bdd0aabede58961a2ddba8bd9566478ef049fa21ee7be6d7677d2,2024-08-14T02:07:05.410000
|
||||
@ -262226,12 +262233,12 @@ CVE-2024-7812,0,0,7d23c7651a18766135526d086e05755f7342e9775f0f39e533e1590484eb2e
|
||||
CVE-2024-7813,0,0,660725c7439a0ec1a8a527e4f36d939d7005bd8e1713b07e4bd27cf3728c3f7f,2024-08-19T18:16:48.327000
|
||||
CVE-2024-7814,0,0,77d672b90a1329b486901cf23b6e584004769dc821cc49b3c03fcd61d7b51c38,2024-08-19T18:31:16.473000
|
||||
CVE-2024-7815,0,0,414a9ddc4da9ca2a40da2f6f1d9c0348a16eb40238a0ca5a655b1ae9bc8cc665,2024-08-19T18:32:00.617000
|
||||
CVE-2024-7816,0,1,9bbdc6d3b66b6f672d49ba4a67f36364b89c37cffb4ca5a35dc1298dbac2cf28,2024-09-12T14:35:15.873000
|
||||
CVE-2024-7817,0,1,05db7239cf0d9449e8a908421caed43ff0a27fd4a5864d6e460eaeeafce59522,2024-09-12T14:35:16.087000
|
||||
CVE-2024-7818,0,1,3d9e002b3cacb59291792ccb3901427c448dbca6f4632cfbe55bd76f7812334f,2024-09-12T14:35:16.877000
|
||||
CVE-2024-7820,0,1,edc132d96b3e34e547f2b473b9f16032278da6025751b3ece4954d1d1dab7e87,2024-09-12T14:35:17.657000
|
||||
CVE-2024-7816,0,0,9bbdc6d3b66b6f672d49ba4a67f36364b89c37cffb4ca5a35dc1298dbac2cf28,2024-09-12T14:35:15.873000
|
||||
CVE-2024-7817,0,0,05db7239cf0d9449e8a908421caed43ff0a27fd4a5864d6e460eaeeafce59522,2024-09-12T14:35:16.087000
|
||||
CVE-2024-7818,0,0,3d9e002b3cacb59291792ccb3901427c448dbca6f4632cfbe55bd76f7812334f,2024-09-12T14:35:16.877000
|
||||
CVE-2024-7820,0,0,edc132d96b3e34e547f2b473b9f16032278da6025751b3ece4954d1d1dab7e87,2024-09-12T14:35:17.657000
|
||||
CVE-2024-7821,0,0,a6cbf4229b3ac9caad2c13358d94e9d25b2f946f0353199ff2ed2717953ff2a4,2024-09-04T10:15:03.553000
|
||||
CVE-2024-7822,0,1,86171139f93ec13a09ebceea06c77303b50df913b56e35d49321070793f7d6c6,2024-09-12T14:35:18.437000
|
||||
CVE-2024-7822,0,0,86171139f93ec13a09ebceea06c77303b50df913b56e35d49321070793f7d6c6,2024-09-12T14:35:18.437000
|
||||
CVE-2024-7827,0,0,20afe3aa4a313fb97b1d97a1cbf5257a0701f273bd3d99d4148b86bfbef51981,2024-08-20T15:44:20.567000
|
||||
CVE-2024-7828,0,0,e3115575bb7dae7cb27cdf5edd1f5d03fa0744cba105509a33368f4e132d9ca7,2024-08-19T18:33:17.583000
|
||||
CVE-2024-7829,0,0,3634da4931045efa2221e4dd20ed9805c5f347e47423b6602d3467d4b2db62e9,2024-08-19T18:34:00.040000
|
||||
@ -262258,10 +262265,10 @@ CVE-2024-7854,0,0,c7d42abb2b322c04201a8af34648ccfdb0ede7da24776e4c0b3ca238a25bf3
|
||||
CVE-2024-7856,0,0,4c18a2db12636b3d9ab7f571b553f307088acfa3032a3727cdd03791c5b56b45,2024-08-29T13:25:27.537000
|
||||
CVE-2024-7857,0,0,b74961afa7dd10dda782bf64e146bf5117eb37327cdce5dd6f430c037eea52b1,2024-08-29T13:25:27.537000
|
||||
CVE-2024-7858,0,0,dbe22e1f02da632a108fdb9c096b7008488e7f6cd1024c2ca6a33d2456cc067c,2024-09-03T14:34:09.017000
|
||||
CVE-2024-7859,0,1,2e9efdc14165216e115d44a68371c6f167a605d4d7db791f71b61c4268679b75,2024-09-12T14:35:19.213000
|
||||
CVE-2024-7860,0,1,6478691d52b931fe14a87d864f1defb31ceb3c959fc542786a5c247463eccd66,2024-09-12T14:35:19.980000
|
||||
CVE-2024-7861,0,1,7dc841d67f7cbf14766a683bac9706b93075a04167273c804ada991b965813f0,2024-09-12T14:35:20.767000
|
||||
CVE-2024-7862,0,1,ab3213803d3b49b6ac19aa8c58cc004e989e60ff7f240b01de14d09685981992,2024-09-12T14:35:21.530000
|
||||
CVE-2024-7859,0,0,2e9efdc14165216e115d44a68371c6f167a605d4d7db791f71b61c4268679b75,2024-09-12T14:35:19.213000
|
||||
CVE-2024-7860,0,0,6478691d52b931fe14a87d864f1defb31ceb3c959fc542786a5c247463eccd66,2024-09-12T14:35:19.980000
|
||||
CVE-2024-7861,0,0,7dc841d67f7cbf14766a683bac9706b93075a04167273c804ada991b965813f0,2024-09-12T14:35:20.767000
|
||||
CVE-2024-7862,0,0,ab3213803d3b49b6ac19aa8c58cc004e989e60ff7f240b01de14d09685981992,2024-09-12T14:35:21.530000
|
||||
CVE-2024-7866,0,0,4c0cb0c858c0ff2de3d3bc9c6187348080bb51d5934bb16167513e626d441be5,2024-08-20T19:23:02.780000
|
||||
CVE-2024-7867,0,0,cc4e8e2cbae6cc9c2393332b56b3dc1a7160836d4b3b7919e8d1234e73599a3b,2024-08-28T21:59:33.973000
|
||||
CVE-2024-7868,0,0,c4ea1bb97a13baa8d231995b3d29c0db15f328b428d9b25a1a7a0b4c8b9c1d1a,2024-09-11T12:40:01.817000
|
||||
@ -262373,7 +262380,7 @@ CVE-2024-8041,0,0,d1a08eb64fa9104259a4b82950c39baccb3cd8ac76a0f9fe28938628a68983
|
||||
CVE-2024-8042,0,0,fe11fe06852bd8872b8038bbdb1b59f9abf17559f4fd0139db22bc4b00f3a1bd,2024-09-09T18:30:12.050000
|
||||
CVE-2024-8045,0,0,05d36d75d042c2c9517546223100d3f67299fb6baf521e764ed39ac43e964a74,2024-09-11T16:26:11.920000
|
||||
CVE-2024-8046,0,0,b737fce0801d82db74076beb4b2a2085f8323b47e71780060f37f6f5c3050f1a,2024-08-27T13:01:37.913000
|
||||
CVE-2024-8054,0,1,cd3f21fbab232193f2e1023cd4fdcf2e5fe80aa9a017de7b992adfbc243b258d,2024-09-12T14:35:22.300000
|
||||
CVE-2024-8054,0,0,cd3f21fbab232193f2e1023cd4fdcf2e5fe80aa9a017de7b992adfbc243b258d,2024-09-12T14:35:22.300000
|
||||
CVE-2024-8056,0,0,5fb88a6ca250e6ff67f8a1ef0c841abbb4c8f2529c05613c2143403e703e96cb,2024-09-12T13:35:23.340000
|
||||
CVE-2024-8064,0,0,9afbec42e91ccdf5ae5f9527bb691367cd47bbf3ee2caa0cb5423b43e5fdd860,2024-08-30T16:15:11.120000
|
||||
CVE-2024-8071,0,0,ac7c2c7e7df896f6bfe7f17a6e74f8de236e5ec843865384cdf53fde1e533098,2024-08-23T15:34:53.913000
|
||||
@ -262406,6 +262413,7 @@ CVE-2024-8119,0,0,209c67cb8bfc8afcb7a4732dcac7c96ef9caf231c5c5c990646aa6c9fa1680
|
||||
CVE-2024-8120,0,0,e3b9aaa878f2134b92d705f69a9facea2737a7bdb56611a3217b2f8626f847c1,2024-08-26T12:47:20.187000
|
||||
CVE-2024-8121,0,0,ff1e52368219900437efe7b0d09c59c3cd45c1a8ee1d51b7c00a17f9caa0d460,2024-09-06T16:20:59.767000
|
||||
CVE-2024-8123,0,0,0c7aca2112819fbb5f60b01b3de749c0321788022ccd287129bcc300c493718d,2024-09-06T17:20:28.600000
|
||||
CVE-2024-8124,1,1,1cb64cbccdb32ba0fbb08a7ecdd5f9bf241f4901230bfbc0fdd908eb483f18a2,2024-09-12T17:15:06.007000
|
||||
CVE-2024-8127,0,0,5102baf959cfebdfcce1f9ebf5537e39c68d598c19a75f9e8284fbe283c6efe3,2024-08-27T14:53:45.257000
|
||||
CVE-2024-8128,0,0,d07e75d47fb86cf66a48a7ed0955a75ebdca9af77e0b6c43500f577ad4f51a7f,2024-08-27T15:32:47.997000
|
||||
CVE-2024-8129,0,0,39dbf19e98dba6341432a7bc1b8c1b6b77a667d2938ed3ce971d1f146a38e875,2024-08-27T15:33:23.187000
|
||||
@ -262563,7 +262571,7 @@ CVE-2024-8386,0,0,8b34d4ba1d63296afda5e75e2a105c44c8fe2c828a5521a3c426a1f456b14d
|
||||
CVE-2024-8387,0,0,0236f6236e30b259f0ad5d7ef58b73e88f9716952aaecf201cfb31f83aed0c30,2024-09-06T17:15:18.253000
|
||||
CVE-2024-8388,0,0,c9864eb6d3c315590c52d0b0a1a482222ad75576dc8d176a33dcc59976d2f97c,2024-09-04T15:49:19.170000
|
||||
CVE-2024-8389,0,0,b86f9dffcb24008ea2fc4581b98019930f23a761524133d12e1b7b2aa1f8008a,2024-09-04T15:50:02.933000
|
||||
CVE-2024-8391,0,0,5bd08b18ac433cde09363f315177dc23a8e8f006a5caceda77295698d66d7d2f,2024-09-05T12:53:21.110000
|
||||
CVE-2024-8391,0,1,e4a53876b2b078fcdc3ea9cb2dcdd9122c87a07a74293148b584a5df448e0076,2024-09-12T16:44:01.247000
|
||||
CVE-2024-8394,0,0,537ec046b9d95c9c611478000abd6dd7551041a1f2ea81cd7e79459ae0e45ad8,2024-09-11T16:25:44.833000
|
||||
CVE-2024-8395,0,0,480d042a5c72097c1b9eeb3ece44eb267c07f48edf022a545c49392ffb4e36a0,2024-09-06T12:08:04.550000
|
||||
CVE-2024-8399,0,0,a078080a08061bf31e935f5665595dbeb479ce34672e558d767724f4eab00569,2024-09-04T13:05:36.067000
|
||||
@ -262572,7 +262580,7 @@ CVE-2024-8408,0,0,9f87fcd812f2a0614c81edf26c59a3fd5158e6ac48b1ed6a5cdb904e931cd1
|
||||
CVE-2024-8409,0,0,9f46c5adb31a6d87824a8eab48e9d2e947ae9b31368ae468d358816a64d27b2e,2024-09-05T14:20:27.397000
|
||||
CVE-2024-8410,0,0,2e5ace471a9894647ef29b6ebd87c70c70869b886444866dda4ae993cd050d69,2024-09-05T14:20:08.100000
|
||||
CVE-2024-8411,0,0,b4f7e89f5a480939e3a01a132dc8fe8e09d6e0d2ced62a743c053df55b7374b3,2024-09-05T14:19:38.377000
|
||||
CVE-2024-8412,0,0,280ee790a2c7611fa0d5a39932bdd613bbe89ba14aace5f344932fb434f8fa7c,2024-09-05T12:53:21.110000
|
||||
CVE-2024-8412,0,1,5d4578377f95a733275980f469e691a400489bc0661af83e1b8890bc31bac3bf,2024-09-12T16:47:19.140000
|
||||
CVE-2024-8413,0,0,c7339b673131014f9dfb6c78c5b0192adccb852147a0c7cbd0ff5fa07a785425,2024-09-05T17:40:36.953000
|
||||
CVE-2024-8414,0,0,40169a23a4033486754844c64fbfe06d703efd0c5e76953cc0d7fdb87952af16,2024-09-06T16:44:04.583000
|
||||
CVE-2024-8415,0,0,ab2184731c9f97a955dc07eba7cdff71ad9ccc33249e750d3db8dd063bdd30fc,2024-09-06T16:40:06.120000
|
||||
@ -262587,9 +262595,9 @@ CVE-2024-8441,0,0,75bcbf016b1064ffa10f954a12d17bdf7a49aca9b32da47c4c769029d1d185
|
||||
CVE-2024-8443,0,0,621bd25e7d9546c644348ac90f0deeaf8d46e336b2b394eb76981445962692b5,2024-09-10T15:50:57.713000
|
||||
CVE-2024-8445,0,0,27d6183cbf221ef18e3639e3533cc8ca212a51b0f7239a93c253eea652cb910f,2024-09-05T17:44:56.007000
|
||||
CVE-2024-8460,0,0,21c8cc38664ba19f902747cfc2492ea27c718e3ca35401645ae4d1c6ff7413b5,2024-09-06T16:30:54.027000
|
||||
CVE-2024-8461,0,0,3a6140152ccac3c7afb990181dca0d64f3ce128b6b2641b9dac80f5a038f3edb,2024-09-05T17:45:07.877000
|
||||
CVE-2024-8461,0,1,b8d6008c0677dd1308b9960cd16592ca94dc9bda7b3637748d1d22aa5c67576f,2024-09-12T17:17:57.733000
|
||||
CVE-2024-8462,0,0,f8474602b1827b45bf4e783834309517ba415e30cec135f1beb9e6ec5ff83e07,2024-09-05T17:45:07.877000
|
||||
CVE-2024-8463,0,0,5c299986f53528ffe093965c300a442641e6c51fdb8894b2848f526363a96204,2024-09-05T17:45:07.877000
|
||||
CVE-2024-8463,0,1,475ab0c571e2b57d179e5131b115912b96c0330e4c6df96bb2c054a4fb250687,2024-09-12T17:15:02.230000
|
||||
CVE-2024-8464,0,0,306072cc62171a91575aff98e7e7c673b1c296dd35f21e7878df1a0f6a86e1a0,2024-09-06T11:15:05.877000
|
||||
CVE-2024-8465,0,0,5e7a50f6a81766242fc1e7d1265fac7a936d9436fbc5ad8b3d73005d56c64663,2024-09-06T11:16:51.187000
|
||||
CVE-2024-8466,0,0,f70f9b315bc6e2a3723ef59440825587d300ee593269c6cbef19336d1a3d7861,2024-09-06T11:24:34.280000
|
||||
@ -262603,7 +262611,7 @@ CVE-2024-8473,0,0,0d318dfea88475fed5cabdbe761e188358c3ae35cd6d226ef3fe46f2f9041c
|
||||
CVE-2024-8478,0,0,e333806b3f124cdccad931974c458d04f248d7fe56143afacc5e05746f5f352e,2024-09-10T12:09:50.377000
|
||||
CVE-2024-8480,0,0,6f63c0c2b913be669f1e72f74bb0555ea9046fdf00f5eabae51a6bc6bb95358b,2024-09-06T12:08:04.550000
|
||||
CVE-2024-8503,0,0,9f803200a857fcdb413b5557fdfb30066c33963fff9f6132df8887c5f7ded0b9,2024-09-11T16:26:11.920000
|
||||
CVE-2024-8504,0,1,8357da8291f04353fac31874868f2eb40b31e26be1555ef771437bf9554e80e3,2024-09-12T14:35:23.173000
|
||||
CVE-2024-8504,0,0,8357da8291f04353fac31874868f2eb40b31e26be1555ef771437bf9554e80e3,2024-09-12T14:35:23.173000
|
||||
CVE-2024-8509,0,0,72b678ade46a23d1db65e1dfb65526568e7875d83752ef0a47b4a7edfeaf5ddf,2024-09-09T19:15:14.837000
|
||||
CVE-2024-8517,0,0,3800f6b128aab40f688c971c9a9e47c0b6a42cbdd5c8d94b7cf3eaf620f48fad,2024-09-09T16:15:03.053000
|
||||
CVE-2024-8521,0,0,65485edaf907369f60ded6330bfa86fc3cb4b0554a8f781a990c000b1998cccb,2024-09-09T13:03:38.303000
|
||||
@ -262649,10 +262657,13 @@ CVE-2024-8605,0,0,05de9fb886966e208a1d4ea135c5ccec7205233c650e87f0027c612a995758
|
||||
CVE-2024-8610,0,0,473e0782947d4bb5808f93b8ea2243b42a4e82997b690a69a9a95368e1eef9c1,2024-09-10T12:09:50.377000
|
||||
CVE-2024-8611,0,0,a2b44027b2072954b313d2459899e49857f8f44440a8eb23f45a13a7d9867cef,2024-09-10T12:09:50.377000
|
||||
CVE-2024-8622,0,0,8c0d8566c114d14578f376fb46a83dd09ecfc9aef59b4f73eead49a6f9d03ae6,2024-09-12T12:35:54.013000
|
||||
CVE-2024-8631,1,1,a41f5999b49e3acc2f53183c13a134fec201aa8a2308743cd274f48a6e5eaed6,2024-09-12T17:15:06.230000
|
||||
CVE-2024-8635,1,1,26817c8716926fb481c19500094d4fce7f0faca84d5b0a495b546a112b87e477,2024-09-12T17:15:06.437000
|
||||
CVE-2024-8636,0,0,1fce08eacd28ea201b49c51bbbe6640d913856ecc862b2d4d147e1ce65553f9b,2024-09-12T13:35:12.283000
|
||||
CVE-2024-8637,0,0,ac92961bb4ed2faff9b7ef10f0821d9ddbc9ee1668c3f32d4b8d09b16b66238f,2024-09-12T13:35:17.667000
|
||||
CVE-2024-8638,0,0,6660ce0c8303b28e97b2338846b62bf9e59e68569fb97659fa18a1f737cc3bbe,2024-09-12T13:35:04.660000
|
||||
CVE-2024-8639,0,0,627e02193a00a5e3c929cb67718006d1c4138ffc299ed37a7b4aab2c7edb9fd8,2024-09-12T13:35:02.863000
|
||||
CVE-2024-8640,1,1,05aa998b718594f6bd7a5d9c09d04cd279e32a26929081361e25b93842f6733f,2024-09-12T17:15:06.647000
|
||||
CVE-2024-8642,0,0,0d7698e3a321d872dd4620edf9b803daeb8e08e2d186a2da501f5948a83a77e6,2024-09-11T16:26:11.920000
|
||||
CVE-2024-8645,0,0,a9ec59eb761dcf7b03b051641e3314ff9102e8e55de30e4e3a512e1bddcece61,2024-09-10T12:09:50.377000
|
||||
CVE-2024-8646,0,0,19fa9f650168d587e83426e12fdaf58fb8d99e18fbbdb4568c4c398d745e4ed2,2024-09-11T16:26:11.920000
|
||||
@ -262669,10 +262680,11 @@ CVE-2024-8693,0,0,0bf9bf9fae22897a2e08c32b35e067d4cd5332929319ef0efd3cac78490dae
|
||||
CVE-2024-8694,0,0,2e1993ee271c7157fceb04bc71a63e2f464fbf1cced51f76c6346163fc12348e,2024-09-12T12:35:54.013000
|
||||
CVE-2024-8705,0,0,cb97dc5a896b102e020f4c6f7ce9db0475b1546a38609fc8cb74768e11db5694,2024-09-12T12:35:54.013000
|
||||
CVE-2024-8706,0,0,6f71e5876a7dec7ae56fc457ee5142cb7cf0075ec2e95d2e16cb7162a3c7da96,2024-09-12T12:35:54.013000
|
||||
CVE-2024-8707,0,1,53b8f536d953dccbee27f563b6dc5109a4e216dbbeb04b8d1e78c2b9c947dcb4,2024-09-12T15:18:27.333000
|
||||
CVE-2024-8707,0,0,53b8f536d953dccbee27f563b6dc5109a4e216dbbeb04b8d1e78c2b9c947dcb4,2024-09-12T15:18:27.333000
|
||||
CVE-2024-8708,0,0,5ef2b50614a0df8bc885350592e6748544bb35fd26cfadc248f257341a211827,2024-09-12T12:35:54.013000
|
||||
CVE-2024-8709,0,0,002b3fdc4504e3a8e90cfb73cfd92235f00c2180db683f0a52dbc2dfe0eff62b,2024-09-12T12:35:54.013000
|
||||
CVE-2024-8710,0,0,5201612712a005197694d95d57304261dfb33fc9c18e66babb635a0037176679,2024-09-12T12:35:54.013000
|
||||
CVE-2024-8711,0,0,b7bac1cd180aad7dc32fae997a12eb16b0ac91bf4702c25ed2514ca60e9a05c4,2024-09-12T12:35:54.013000
|
||||
CVE-2024-8749,0,0,6c300bdfd0775f414e5e2003c3bfef67fe867038e6f1a0c3495f0a7e6012e1de,2024-09-12T12:35:54.013000
|
||||
CVE-2024-8750,0,0,418fabeb18e7b297a31252c3e8fef09ccda76bf14212f7478abfd99c5bae6ae6,2024-09-12T12:35:54.013000
|
||||
CVE-2024-8754,1,1,178e2f404f9645dace0a33baa3bb82de4a3b561ba56ff891189e01e7bddcd416,2024-09-12T17:15:06.917000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user