mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
Auto-Update: 2024-10-31T21:00:20.265569+00:00
This commit is contained in:
parent
05eb7a0990
commit
b3844e60a5
@ -2,10 +2,10 @@
|
||||
"id": "CVE-2014-9804",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2017-03-30T15:59:00.170",
|
||||
"lastModified": "2017-04-03T14:22:18.733",
|
||||
"lastModified": "2024-10-31T19:52:55.157",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"evaluatorComment": "<a href=\"http://cwe.mitre.org/data/definitions/835.html\">CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop')</a>",
|
||||
"evaluatorComment": "CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop')",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -17,13 +17,13 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
@ -86,8 +86,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65"
|
||||
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.9.4-0",
|
||||
"matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2014-9805",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2017-03-30T15:59:00.217",
|
||||
"lastModified": "2017-04-04T15:31:36.767",
|
||||
"lastModified": "2024-10-31T19:52:32.510",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -16,13 +16,13 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
@ -85,8 +85,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65"
|
||||
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.9.4-0",
|
||||
"matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2014-9806",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2017-03-30T15:59:00.250",
|
||||
"lastModified": "2017-04-04T15:33:36.053",
|
||||
"lastModified": "2024-10-31T19:52:23.440",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -16,13 +16,13 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
@ -85,8 +85,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65"
|
||||
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.9.4-0",
|
||||
"matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2014-9807",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2017-03-30T15:59:00.297",
|
||||
"lastModified": "2017-04-04T15:34:05.697",
|
||||
"lastModified": "2024-10-31T19:50:31.553",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -16,13 +16,13 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
@ -85,8 +85,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65"
|
||||
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.9.4-0",
|
||||
"matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2014-9808",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2017-03-30T15:59:00.327",
|
||||
"lastModified": "2017-04-04T15:34:30.633",
|
||||
"lastModified": "2024-10-31T19:49:00.877",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -16,13 +16,13 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
@ -85,8 +85,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65"
|
||||
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.9.4-0",
|
||||
"matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2014-9809",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2017-03-30T15:59:00.360",
|
||||
"lastModified": "2017-04-04T15:35:18.700",
|
||||
"lastModified": "2024-10-31T19:53:30.847",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -16,13 +16,13 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
@ -85,8 +85,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65"
|
||||
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.9.4-0",
|
||||
"matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2014-9810",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2017-03-30T15:59:00.407",
|
||||
"lastModified": "2017-04-04T15:35:52.280",
|
||||
"lastModified": "2024-10-31T19:53:36.977",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -16,13 +16,13 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
@ -85,8 +85,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65"
|
||||
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.9.4-0",
|
||||
"matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2014-9811",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2017-03-30T15:59:00.437",
|
||||
"lastModified": "2017-04-04T15:36:27.390",
|
||||
"lastModified": "2024-10-31T19:53:42.617",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -16,13 +16,13 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
@ -85,8 +85,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65"
|
||||
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.9.4-0",
|
||||
"matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2014-9812",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2017-03-30T15:59:00.500",
|
||||
"lastModified": "2017-04-04T15:36:56.970",
|
||||
"lastModified": "2024-10-31T19:53:49.987",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -16,13 +16,13 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
@ -85,8 +85,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65"
|
||||
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.9.4-0",
|
||||
"matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2014-9813",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2017-03-30T15:59:00.517",
|
||||
"lastModified": "2017-04-04T15:40:29.073",
|
||||
"lastModified": "2024-10-31T19:53:55.630",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -16,13 +16,13 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
@ -85,8 +85,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65"
|
||||
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.9.4-0",
|
||||
"matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2014-9814",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2017-03-30T15:59:00.563",
|
||||
"lastModified": "2017-04-04T15:40:49.197",
|
||||
"lastModified": "2024-10-31T19:54:43.970",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -16,13 +16,13 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
@ -85,8 +85,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65"
|
||||
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.9.4-0",
|
||||
"matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2014-9815",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2017-03-30T15:59:00.593",
|
||||
"lastModified": "2017-04-04T15:37:35.503",
|
||||
"lastModified": "2024-10-31T19:55:48.687",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -16,13 +16,13 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
@ -85,8 +85,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65"
|
||||
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.9.4-0",
|
||||
"matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2014-9816",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2017-03-30T15:59:00.640",
|
||||
"lastModified": "2017-04-04T15:41:53.687",
|
||||
"lastModified": "2024-10-31T19:55:54.603",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -16,13 +16,13 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
@ -85,8 +85,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65"
|
||||
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.9.4-0",
|
||||
"matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2014-9817",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2017-03-30T15:59:00.687",
|
||||
"lastModified": "2017-04-04T15:42:20.873",
|
||||
"lastModified": "2024-10-31T19:56:03.530",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -16,13 +16,13 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
@ -85,8 +85,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65"
|
||||
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.9.4-0",
|
||||
"matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2014-9818",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2017-03-30T15:59:00.717",
|
||||
"lastModified": "2017-04-04T15:43:36.660",
|
||||
"lastModified": "2024-10-31T19:56:08.477",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -16,13 +16,13 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
@ -85,8 +85,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65"
|
||||
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.9.4-0",
|
||||
"matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2014-9819",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2017-03-30T15:59:00.750",
|
||||
"lastModified": "2017-04-04T15:44:17.503",
|
||||
"lastModified": "2024-10-31T19:56:16.343",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -16,13 +16,13 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
@ -85,8 +85,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65"
|
||||
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.9.4-0",
|
||||
"matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2014-9820",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2017-03-30T15:59:00.797",
|
||||
"lastModified": "2017-04-04T15:44:40.317",
|
||||
"lastModified": "2024-10-31T19:56:38.033",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -16,13 +16,13 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
@ -85,8 +85,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65"
|
||||
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.9.4-0",
|
||||
"matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2014-9821",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2017-03-30T15:59:00.827",
|
||||
"lastModified": "2017-04-04T15:45:03.570",
|
||||
"lastModified": "2024-10-31T19:56:44.357",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -16,13 +16,13 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
@ -85,8 +85,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65"
|
||||
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.9.4-0",
|
||||
"matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2014-9822",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2017-03-30T15:59:00.873",
|
||||
"lastModified": "2017-04-04T15:45:25.163",
|
||||
"lastModified": "2024-10-31T19:56:51.983",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -16,13 +16,13 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
@ -85,8 +85,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65"
|
||||
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.9.4-0",
|
||||
"matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2014-9823",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2017-03-30T15:59:00.907",
|
||||
"lastModified": "2017-04-06T13:13:37.330",
|
||||
"lastModified": "2024-10-31T19:56:59.013",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -16,13 +16,13 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
@ -85,8 +85,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65"
|
||||
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.9.4-0",
|
||||
"matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2014-9824",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2017-03-30T15:59:00.937",
|
||||
"lastModified": "2017-04-06T12:56:39.363",
|
||||
"lastModified": "2024-10-31T19:57:06.380",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -16,13 +16,13 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
@ -85,8 +85,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65"
|
||||
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.9.4-0",
|
||||
"matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-49100",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-21T16:15:49.457",
|
||||
"lastModified": "2024-02-22T19:07:27.197",
|
||||
"lastModified": "2024-10-31T20:35:01.123",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Trusted Firmware-A (TF-A) anterior a 2.10 tiene una posible lectura fuera de los l\u00edmites en el servicio SDEI. El par\u00e1metro de entrada pasado en el registro x1 no est\u00e1 suficientemente validado en la funci\u00f3n sdei_interrupt_bind. El par\u00e1metro se pasa a una llamada a plat_ic_get_interrupt_type. Puede ser cualquier valor arbitrario que pase las comprobaciones en la funci\u00f3n plat_ic_is_sgi. Un Normal World (kernel de Linux) comprometido puede permitir que un atacante con privilegios de root emita llamadas SMC arbitrarias. Usando esta primitiva, puede controlar el contenido de los registros x0 a x6, que se utilizan para enviar par\u00e1metros a TF-A. Las direcciones fuera de los l\u00edmites se pueden leer en el contexto de TF-A (EL3). Debido a que el valor le\u00eddo nunca se devuelve a la memoria no segura o a los registros, no es posible ninguna fuga. Sin embargo, un atacante a\u00fan puede bloquear TF-A."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 4.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ARM-software/arm-trusted-firmware/blob/a05414bedc9b1cc35cf0795ce641b6b4db5bc97e/services/std_svc/sdei/sdei_main.c#L708",
|
||||
|
21
CVE-2023/CVE-2023-520xx/CVE-2023-52044.json
Normal file
21
CVE-2023/CVE-2023-520xx/CVE-2023-52044.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2023-52044",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-31T19:15:12.347",
|
||||
"lastModified": "2024-10-31T19:15:12.347",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Studio-42 eLfinder 2.1.62 is vulnerable to Remote Code Execution (RCE) as there is no restriction for uploading files with the .php8 extension."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Studio-42/elFinder/issues/3615",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2023/CVE-2023-520xx/CVE-2023-52045.json
Normal file
21
CVE-2023/CVE-2023-520xx/CVE-2023-52045.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2023-52045",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-31T19:15:12.450",
|
||||
"lastModified": "2024-10-31T19:15:12.450",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Studio-42 eLfinder 2.1.62 contains a filename restriction bypass leading to a persistent Cross-site Scripting (XSS) vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Studio-42/elFinder/issues/3617",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-52613",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-03-18T11:15:08.477",
|
||||
"lastModified": "2024-03-18T12:38:25.490",
|
||||
"lastModified": "2024-10-31T20:35:02.680",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,30 @@
|
||||
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: drivers/thermal/loongson2_thermal: corrige el juicio PTR_ERR() incorrecto. PTR_ERR() devuelve -ENODEV cuando las zonas t\u00e9rmicas no est\u00e1n definidas y necesitamos -ENODEV como el valor correcto para comparar. De lo contrario, tz->type es NULL cuando las zonas t\u00e9rmicas no est\u00e1n definidas, lo que genera el siguiente error: [12.290030] CPU 1 No se puede manejar la solicitud de paginaci\u00f3n del kernel en la direcci\u00f3n virtual ffffffffffffffff1, era == 900000000355f410, ra == 90000000031579b8 [ 12.302877] Ups [#1]: [ 12.305190] CPU: 1 PID: 181 Comm: systemd-udevd No contaminado 6.6.0-rc7+ #5385 [ 12.312304] pc 900000000355f410 ra 90000000031579b8 tp 90000001069e8000 sp 90000001069eba10 [ 12.320739] a0 0000000000000000 a1 ffffffffffffffff1 a2 0000000000000014 a3 0000000000000001 [ 12.329173] a4 90000001069eb990 a5 0000000000000001 a6 0000000000001001 a7 900000010003431c [ 12.337606] t0 ffffffffffffffff1 t1 54567fd5da9b 4fd4 t2 900000010614ec40 t3 00000000000dc901 [ 12.346041] t4 0000000000000000 t5 00000000000000004 t6 900000010614ee20 t7 900000000d00b 790 [ 12.354472] t8 00000000000dc901 u0 54567fd5da9b4fd4 s9 900000000402ae10 s0 900000010614ec40 [ 12.362916] s1 90000000039fced0 s2 ffffffffffffffff s3 ffffffffffffffff s4 9000000003acc000 [ 12.362931] s5 0000000000000004 s6 fffffffffffff000 s7 0000000000000490 s8 90000001028b2ec8 [ 12.362938] ra: 90000000031579b8 Thermal_add_hwmon_sysfs+0x258/0x300 [ 12.386411] ERA: 900000000355f410 strscpy+0xf0/0x160 [ 12.391626] CRMD: 00000 0b0 (PLV0 -IE -DA +PG DACF=CC DACM=CC -WE) [ 12.397898] PRMD: 00000004 (PPLV0 +PIE -PWE) [ 12.403678] EUEN: 00000000 (-FPE -SXE -ASXE -BTE) [ 12.409859] ECFG: 00071c1c (LIE=2 -4,10-12 vs = 7) [12.415882] ESTAT: 00010000 [PIL] (IS = ECODE = 1 ESUBCODE = 0) [12.415907] BADV: FFFFFFFFFFFFFF1 [12.415911] PRID: 0014A000 (Loongson-64bit, Loongson-24000) [12.415917] M\u00f3dulos vinculados en: loongson2_thermal(+) vfat fat uio_pdrv_genirq uio fuse zram zsmalloc [12.415950] Proceso systemd-udevd (pid: 181, threadinfo=00000000358b9718, task=00000000ace72fe3) [ 12.415961] Pila: 0000000000000dc0 54567fd5da9b4fd4 900000000402ae10 9000000002df9358 [12.415982] ffffffffffffff 0000000000000004 9000000107a10aa8 90000001002a3410 [ 12.415999] ffffffffffffff ffffffffffffff 9000000107a11268 9000000003157ab0 [ 12.416016] 9000000107a10aa8 ffffff80020fc0c8 90000001002a3410 ffffffffffffffed [ 12.416032] 00000000000000024 ffffff80020cc1e8 900000000402b2 a0 9000000003acc000 [ 12.416048] 90000001002a3410 0000000000000000 ffffff80020f4030 90000001002a3410 [ 12.416065] 00000000000000000 9000000002df6808 90000001002a3410 0000000000000000 [ 12.416081] ffffff80020f4030 00000000000000000 90000001002a3410 9000000002df2ba 8 [ 12.416097] 00000000000000b4 90000001002a34f4 90000001002a3410 0000000000000002 [ 12.416114] ffffff80020f4030 ffffffffffffff0 90000001002a3410 9000000002df2f30 [ 12 .416131] ... [ 12.416138] Seguimiento de llamadas: [ 12.416142] [<900000000355f410>] strscpy+0xf0/0x160 [ 12.416167] [<90000000031579b8>] Thermal_add_hwmon_sysfs+0x258/0 x300 [12.416183 ] [<9000000003157ab0>] devm_thermal_add_hwmon_sysfs+0x50/0xe0 [ 12.416200] [] loongson2_thermal_probe+0x128/0x200 [loongson2_thermal] [ 12.416232] [<9 000000002df6808>] plataforma_probe+0x68/0x140 [ 12.416249] [<9000000002df2ba8>] realmente_probe+ 0xc8/0x3c0 [ 12.416269] [<9000000002df2f30>] __driver_probe_device+0x90/0x180 [ 12.416286] [<9000000002df3058>] driver_probe_device+0x38/0x160 [ 12.41630 2] [<9000000002df33a8>] __driver_attach+0xa8/0x200 [ 12.416314] [<9000000002deffec>] bus_for_each_dev+0x8c/0x120 [ 12.416330] [<9000000002df198c>] bus_add_driver+0x10c/0x2a0 [ 12.416346] [<9000000002df46b4>] driver_register+0x74/0x160 [ 12.41 6358] [<90000000022201a4>] do_one_initcall+0x84/0x220 [ 12.416372] [<90000000022f3ab8 >] do_init_module+0x58/0x2c0 [ ---truncado---"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/15ef92e9c41124ee9d88b01208364f3fe1f45f84",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-52704",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-05-21T16:15:12.760",
|
||||
"lastModified": "2024-05-21T16:53:56.550",
|
||||
"lastModified": "2024-10-31T20:35:02.910",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,30 @@
|
||||
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: freezer,umh: Fix call_usermode_helper_exec() vs SIGKILL .Tetsuo-San not\u00f3 que la confirmaci\u00f3n f5d39b020809 (\"freezer,sched: Rewrite core freezer logic\") rompi\u00f3 call_usermodehelper_exec() para el caso KILLABLE. Espec\u00edficamente, se pas\u00f3 por alto que el segundo wait_for_completion() incondicional no era opcional y garantiza que la finalizaci\u00f3n en la pila no se utilice antes de salir del alcance."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/7f9f6c54da876b3f0bece2b569456ceb96965ed7",
|
||||
|
64
CVE-2024/CVE-2024-105xx/CVE-2024-10573.json
Normal file
64
CVE-2024/CVE-2024-105xx/CVE-2024-10573.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2024-10573",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-10-31T19:15:12.540",
|
||||
"lastModified": "2024-10-31T19:15:12.540",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An out-of-bounds write flaw was found in mpg123 when handling crafted streams. When decoding PCM, the libmpg123 may write past the end of a heap-located buffer. Consequently, heap corruption may happen, and arbitrary code execution is not discarded. The complexity required to exploit this flaw is considered high as the payload must be validated by the MPEG decoder and the PCM synth before execution. Additionally, to successfully execute the attack, the user must scan through the stream, making web live stream content (such as web radios) a very unlikely attack vector."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2024-10573",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2322980",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://mpg123.org/cgi-bin/news.cgi#2024-10-26",
|
||||
"source": "secalert@redhat.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-20264",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-10-23T17:15:14.180",
|
||||
"lastModified": "2024-10-25T12:56:36.827",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-31T19:04:42.863",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
@ -51,18 +81,119 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DAEC54E5-91D8-48AB-A890-5841A158839F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A58A2DA5-3EE7-408D-AAFA-82330F0325B2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7FA98EEC-2059-4CA9-92F1-72C1E0BB7EC6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F4C51EE7-866B-410C-B75E-EF260D5062B0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5F1FFD07-B874-4D3C-8E2C-9A204F1E994E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FB5ACB9E-86AF-4EC1-9F36-A202429CD0F4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.0.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AD1E4527-AAE2-4DA9-AFDA-6375839F7843"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2F0AF047-EAE9-4C77-BCEF-5CB26F84C742"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2ED03874-4071-4382-8A46-8B3A59E601FF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BF84E043-DF3C-4A95-8FDA-B0FDCD795377"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.3.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B9498087-9642-4A86-B3EE-1513C55A86E2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "36C229AB-2851-48D4-815A-63AAB4462A24"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.4.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6DA4BCFC-8237-4F5C-9863-523EE7D8619B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "07693A92-7D84-45A1-ACD6-D83AE41D504B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.5.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2C78050A-A5FB-427B-BF0D-0353B240A4FF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.5.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "85E76AE7-12AC-4419-AE66-43730B173B4E"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-M446vbEO",
|
||||
"source": "ykramarz@cisco.com"
|
||||
"source": "ykramarz@cisco.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-dhJxQYZs",
|
||||
"source": "ykramarz@cisco.com"
|
||||
"source": "ykramarz@cisco.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75300",
|
||||
"source": "ykramarz@cisco.com"
|
||||
"source": "ykramarz@cisco.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-20269",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-10-23T17:15:14.610",
|
||||
"lastModified": "2024-10-25T12:56:36.827",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-31T19:35:03.420",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
@ -51,18 +81,454 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6175407A-207E-4844-B150-EA0129C4CBBD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "45B6E615-F42A-468F-8E40-AD28994B4B1D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C4B08264-DA65-4BFF-A973-FF733C7325B1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CE2A5330-8180-48CE-B22A-1CF24B7B1631"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "ACC1D72F-9542-4A62-AA90-C0E6B2095068"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E4F3A97A-3359-40C7-95B0-2AB41C067141"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B68BA14B-1752-4F05-9331-D556247462C3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1DE72ABB-B573-43CC-A2AC-D81807970BD4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.8:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "535E8ECF-5CE5-4E78-A9EF-6167F4C59C45"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.9:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3AE3F1C4-8C7A-48AA-83E5-6F832FA94DD3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.10:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C40B7DC8-220C-4C34-A370-F1EB4B3F9EF1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.11:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5DB186DC-6C03-4868-8218-06BEFC0CE400"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.12:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B29670B8-F2D3-46D7-8F34-F44B320DD6FE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.13:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2F04DDF5-2058-4208-A608-3673872450EA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.14:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C9A483AC-A8CF-439C-9009-4DFAB0484BCE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.15:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "94E7D836-46E5-4CD5-8BDC-4697D915FE05"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.16:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "06220CB8-7F16-4D3C-A835-558D5F4D97ED"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.17:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "82917F5C-CF20-4D97-A981-FE3F8476CCFE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.18:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "47E42025-1D1E-4390-AC21-9A1B0FBE8D82"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "52651664-CA65-4812-8226-E104E1BE7864"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "64E0FDB2-D5A4-4749-A182-B0B145DC00D3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "23B58490-C403-44D5-BDB9-88FAD19ABC2B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DE33A280-84E4-4B5B-AB31-7A78754413F9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BA3F9410-02E1-4FE9-9A4B-E504515F4615"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8AAAF924-1ADE-4267-9957-DF060D1D3538"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4D02863A-1355-4FFE-A6BD-C912697774A0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "704E4D3D-D1D2-48D8-A68C-227CC92A1C1D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.8:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "80A3D0F1-DA29-4A66-A698-082DB0CFA4B0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.9:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C6B9B536-ADF9-4CE1-86EC-07BCDD65FB92"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.10:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1755E718-C726-442B-B203-E9536C546DF9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.11:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AB80FC39-0FCE-49F7-9A28-CE733DBB3572"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.12:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F61496C8-9ADE-4A4E-9788-447050691727"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.13:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E0780AD6-4F38-4400-AA63-E41879F74B68"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.14:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "86BA5BA6-1F79-4C89-A3F4-A56E2B664AED"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.15:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "52C7994F-AA17-467B-919E-A49F0CC9DB47"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.16:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9F007F6B-1EAA-468C-8159-78B020DF1E58"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.17:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C9053FDE-A6BE-4535-AE36-A323F8B7ACA4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "81F9AF68-70BD-46DE-B7F2-97C9BD5182A9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.0.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D1D808CD-B030-4334-A286-9B3A1D35C61D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0DFE9115-3E32-4A55-AB5A-83513322FE97"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "09BD6616-B2B9-49B1-AD20-9B13D93C8F2C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "35A9634E-FCF4-4C67-A463-6BA5F63DD2A5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2D8CF5AA-7B41-4E98-8E7E-A399AAA510B9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8452BA9A-F56C-48E0-BDBA-9095AF78F521"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B2CE3B06-353C-4623-9EF4-78814DCB0D7D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FD968EA0-616D-4A22-A15D-C66918E71761"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.7.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BE45FF20-1E52-46B6-9B38-07E5A6D6FD6D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.7.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "249F9108-758A-4118-94C1-BAC747AF45ED"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "978284EE-8BE8-43ED-ADA0-B90151D83EA5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0BA140F9-4706-4B05-826E-962A277E625A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5E7D3C93-B0FC-475E-9CCA-AA8A2101781D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "270CA092-1AF1-48D4-8695-E7DB694969C5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DFA94312-376E-4785-888F-3C07612E1DF7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.0.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "29E73FBF-2579-4660-AFFA-7F9607004226"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "87FAAFFB-0589-441B-8289-8B8A6E18F705"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.1.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "73B92119-793D-4A43-A056-24DB6826E759"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "093A0BC2-037C-463F-AFC5-EF11C2954EAD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.2.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C4F434FC-CAA4-4DBB-8094-C4ECC28B31E7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "68C70BB3-33B3-4E7E-99D5-FF76D4ED96AE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B881B8DF-A96D-4B64-B98A-71F0D3388641"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F6A97625-D39C-42D5-89E4-415A868A0972"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5E4D83B4-9697-4071-AC9F-7ADC86A6B529"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.6.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8F81F708-ACED-4E42-8CA9-116B5C4F5141"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A58A2DA5-3EE7-408D-AAFA-82330F0325B2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7FA98EEC-2059-4CA9-92F1-72C1E0BB7EC6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F4C51EE7-866B-410C-B75E-EF260D5062B0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5F1FFD07-B874-4D3C-8E2C-9A204F1E994E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FB5ACB9E-86AF-4EC1-9F36-A202429CD0F4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.0.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AD1E4527-AAE2-4DA9-AFDA-6375839F7843"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2F0AF047-EAE9-4C77-BCEF-5CB26F84C742"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2ED03874-4071-4382-8A46-8B3A59E601FF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BF84E043-DF3C-4A95-8FDA-B0FDCD795377"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.3.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B9498087-9642-4A86-B3EE-1513C55A86E2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "36C229AB-2851-48D4-815A-63AAB4462A24"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.4.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6DA4BCFC-8237-4F5C-9863-523EE7D8619B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "07693A92-7D84-45A1-ACD6-D83AE41D504B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.5.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2C78050A-A5FB-427B-BF0D-0353B240A4FF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.5.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "85E76AE7-12AC-4419-AE66-43730B173B4E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5D401072-6709-4921-8918-720F28D61E24"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C0EA3467-4205-4C41-AF24-689330F7396B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9BE94E38-5F29-4AE1-8129-7F7582C2CC75"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FEF603AD-D69B-4DD8-A7F4-6BEFD355EF29"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.4.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D6BD1665-7824-4D98-A930-432CBDA4EAD5"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-M446vbEO",
|
||||
"source": "ykramarz@cisco.com"
|
||||
"source": "ykramarz@cisco.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-dhJxQYZs",
|
||||
"source": "ykramarz@cisco.com"
|
||||
"source": "ykramarz@cisco.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75300",
|
||||
"source": "ykramarz@cisco.com"
|
||||
"source": "ykramarz@cisco.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-20273",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-10-23T17:15:14.813",
|
||||
"lastModified": "2024-10-25T12:56:36.827",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-31T19:09:24.687",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
@ -51,18 +81,454 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6175407A-207E-4844-B150-EA0129C4CBBD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "45B6E615-F42A-468F-8E40-AD28994B4B1D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C4B08264-DA65-4BFF-A973-FF733C7325B1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CE2A5330-8180-48CE-B22A-1CF24B7B1631"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "ACC1D72F-9542-4A62-AA90-C0E6B2095068"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E4F3A97A-3359-40C7-95B0-2AB41C067141"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B68BA14B-1752-4F05-9331-D556247462C3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1DE72ABB-B573-43CC-A2AC-D81807970BD4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.8:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "535E8ECF-5CE5-4E78-A9EF-6167F4C59C45"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.9:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3AE3F1C4-8C7A-48AA-83E5-6F832FA94DD3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.10:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C40B7DC8-220C-4C34-A370-F1EB4B3F9EF1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.11:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5DB186DC-6C03-4868-8218-06BEFC0CE400"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.12:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B29670B8-F2D3-46D7-8F34-F44B320DD6FE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.13:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2F04DDF5-2058-4208-A608-3673872450EA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.14:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C9A483AC-A8CF-439C-9009-4DFAB0484BCE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.15:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "94E7D836-46E5-4CD5-8BDC-4697D915FE05"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.16:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "06220CB8-7F16-4D3C-A835-558D5F4D97ED"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.17:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "82917F5C-CF20-4D97-A981-FE3F8476CCFE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.18:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "47E42025-1D1E-4390-AC21-9A1B0FBE8D82"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "52651664-CA65-4812-8226-E104E1BE7864"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "64E0FDB2-D5A4-4749-A182-B0B145DC00D3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "23B58490-C403-44D5-BDB9-88FAD19ABC2B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DE33A280-84E4-4B5B-AB31-7A78754413F9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BA3F9410-02E1-4FE9-9A4B-E504515F4615"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8AAAF924-1ADE-4267-9957-DF060D1D3538"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4D02863A-1355-4FFE-A6BD-C912697774A0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "704E4D3D-D1D2-48D8-A68C-227CC92A1C1D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.8:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "80A3D0F1-DA29-4A66-A698-082DB0CFA4B0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.9:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C6B9B536-ADF9-4CE1-86EC-07BCDD65FB92"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.10:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1755E718-C726-442B-B203-E9536C546DF9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.11:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AB80FC39-0FCE-49F7-9A28-CE733DBB3572"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.12:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F61496C8-9ADE-4A4E-9788-447050691727"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.13:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E0780AD6-4F38-4400-AA63-E41879F74B68"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.14:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "86BA5BA6-1F79-4C89-A3F4-A56E2B664AED"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.15:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "52C7994F-AA17-467B-919E-A49F0CC9DB47"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.16:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9F007F6B-1EAA-468C-8159-78B020DF1E58"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.17:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C9053FDE-A6BE-4535-AE36-A323F8B7ACA4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "81F9AF68-70BD-46DE-B7F2-97C9BD5182A9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.0.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D1D808CD-B030-4334-A286-9B3A1D35C61D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0DFE9115-3E32-4A55-AB5A-83513322FE97"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "09BD6616-B2B9-49B1-AD20-9B13D93C8F2C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "35A9634E-FCF4-4C67-A463-6BA5F63DD2A5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2D8CF5AA-7B41-4E98-8E7E-A399AAA510B9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8452BA9A-F56C-48E0-BDBA-9095AF78F521"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B2CE3B06-353C-4623-9EF4-78814DCB0D7D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FD968EA0-616D-4A22-A15D-C66918E71761"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.7.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BE45FF20-1E52-46B6-9B38-07E5A6D6FD6D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.7.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "249F9108-758A-4118-94C1-BAC747AF45ED"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "978284EE-8BE8-43ED-ADA0-B90151D83EA5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0BA140F9-4706-4B05-826E-962A277E625A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5E7D3C93-B0FC-475E-9CCA-AA8A2101781D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "270CA092-1AF1-48D4-8695-E7DB694969C5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DFA94312-376E-4785-888F-3C07612E1DF7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.0.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "29E73FBF-2579-4660-AFFA-7F9607004226"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "87FAAFFB-0589-441B-8289-8B8A6E18F705"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.1.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "73B92119-793D-4A43-A056-24DB6826E759"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "093A0BC2-037C-463F-AFC5-EF11C2954EAD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.2.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C4F434FC-CAA4-4DBB-8094-C4ECC28B31E7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "68C70BB3-33B3-4E7E-99D5-FF76D4ED96AE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B881B8DF-A96D-4B64-B98A-71F0D3388641"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F6A97625-D39C-42D5-89E4-415A868A0972"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5E4D83B4-9697-4071-AC9F-7ADC86A6B529"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.6.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8F81F708-ACED-4E42-8CA9-116B5C4F5141"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A58A2DA5-3EE7-408D-AAFA-82330F0325B2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7FA98EEC-2059-4CA9-92F1-72C1E0BB7EC6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F4C51EE7-866B-410C-B75E-EF260D5062B0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5F1FFD07-B874-4D3C-8E2C-9A204F1E994E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FB5ACB9E-86AF-4EC1-9F36-A202429CD0F4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.0.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AD1E4527-AAE2-4DA9-AFDA-6375839F7843"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2F0AF047-EAE9-4C77-BCEF-5CB26F84C742"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2ED03874-4071-4382-8A46-8B3A59E601FF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BF84E043-DF3C-4A95-8FDA-B0FDCD795377"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.3.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B9498087-9642-4A86-B3EE-1513C55A86E2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "36C229AB-2851-48D4-815A-63AAB4462A24"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.4.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6DA4BCFC-8237-4F5C-9863-523EE7D8619B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "07693A92-7D84-45A1-ACD6-D83AE41D504B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.5.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2C78050A-A5FB-427B-BF0D-0353B240A4FF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.5.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "85E76AE7-12AC-4419-AE66-43730B173B4E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5D401072-6709-4921-8918-720F28D61E24"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C0EA3467-4205-4C41-AF24-689330F7396B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9BE94E38-5F29-4AE1-8129-7F7582C2CC75"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FEF603AD-D69B-4DD8-A7F4-6BEFD355EF29"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.4.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D6BD1665-7824-4D98-A930-432CBDA4EAD5"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-M446vbEO",
|
||||
"source": "ykramarz@cisco.com"
|
||||
"source": "ykramarz@cisco.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-dhJxQYZs",
|
||||
"source": "ykramarz@cisco.com"
|
||||
"source": "ykramarz@cisco.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75300",
|
||||
"source": "ykramarz@cisco.com"
|
||||
"source": "ykramarz@cisco.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-20298",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-10-23T17:15:15.710",
|
||||
"lastModified": "2024-10-25T12:56:36.827",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-31T19:25:31.523",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
@ -51,18 +81,74 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5D401072-6709-4921-8918-720F28D61E24"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C0EA3467-4205-4C41-AF24-689330F7396B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9BE94E38-5F29-4AE1-8129-7F7582C2CC75"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FEF603AD-D69B-4DD8-A7F4-6BEFD355EF29"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.4.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D6BD1665-7824-4D98-A930-432CBDA4EAD5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.4.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F8056E69-22FA-4935-A576-916805D90C62"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.4.1.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6A80BBBE-DB5E-460A-8621-6E28D2BD6E44"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-M446vbEO",
|
||||
"source": "ykramarz@cisco.com"
|
||||
"source": "ykramarz@cisco.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-dhJxQYZs",
|
||||
"source": "ykramarz@cisco.com"
|
||||
"source": "ykramarz@cisco.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75300",
|
||||
"source": "ykramarz@cisco.com"
|
||||
"source": "ykramarz@cisco.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-20364",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-10-23T18:15:05.427",
|
||||
"lastModified": "2024-10-25T12:56:36.827",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-31T19:36:32.277",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,235 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "978284EE-8BE8-43ED-ADA0-B90151D83EA5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0BA140F9-4706-4B05-826E-962A277E625A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5E7D3C93-B0FC-475E-9CCA-AA8A2101781D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "270CA092-1AF1-48D4-8695-E7DB694969C5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DFA94312-376E-4785-888F-3C07612E1DF7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.0.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "29E73FBF-2579-4660-AFFA-7F9607004226"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "87FAAFFB-0589-441B-8289-8B8A6E18F705"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.1.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "73B92119-793D-4A43-A056-24DB6826E759"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "093A0BC2-037C-463F-AFC5-EF11C2954EAD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.2.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C4F434FC-CAA4-4DBB-8094-C4ECC28B31E7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "68C70BB3-33B3-4E7E-99D5-FF76D4ED96AE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B881B8DF-A96D-4B64-B98A-71F0D3388641"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F6A97625-D39C-42D5-89E4-415A868A0972"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5E4D83B4-9697-4071-AC9F-7ADC86A6B529"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.6.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8F81F708-ACED-4E42-8CA9-116B5C4F5141"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.6.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3C86116B-8475-40A0-A507-D4A7947F5F2C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A58A2DA5-3EE7-408D-AAFA-82330F0325B2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7FA98EEC-2059-4CA9-92F1-72C1E0BB7EC6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F4C51EE7-866B-410C-B75E-EF260D5062B0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5F1FFD07-B874-4D3C-8E2C-9A204F1E994E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FB5ACB9E-86AF-4EC1-9F36-A202429CD0F4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.0.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AD1E4527-AAE2-4DA9-AFDA-6375839F7843"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2F0AF047-EAE9-4C77-BCEF-5CB26F84C742"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2ED03874-4071-4382-8A46-8B3A59E601FF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BF84E043-DF3C-4A95-8FDA-B0FDCD795377"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.3.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B9498087-9642-4A86-B3EE-1513C55A86E2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "36C229AB-2851-48D4-815A-63AAB4462A24"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.4.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6DA4BCFC-8237-4F5C-9863-523EE7D8619B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "07693A92-7D84-45A1-ACD6-D83AE41D504B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.5.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2C78050A-A5FB-427B-BF0D-0353B240A4FF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.5.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "85E76AE7-12AC-4419-AE66-43730B173B4E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4D803EC9-26EE-4799-A435-C782C92739CF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6EEF87CD-2335-4886-A65C-4E33775AEC52"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.8:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "953EB81A-1B53-4A57-9F59-D4A7D37E657E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.8.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1CB534BC-3E4D-4484-AFD0-69524B1F07F9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5D401072-6709-4921-8918-720F28D61E24"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C0EA3467-4205-4C41-AF24-689330F7396B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9BE94E38-5F29-4AE1-8129-7F7582C2CC75"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FEF603AD-D69B-4DD8-A7F4-6BEFD355EF29"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.4.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D6BD1665-7824-4D98-A930-432CBDA4EAD5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.4.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F8056E69-22FA-4935-A576-916805D90C62"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.4.1.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6A80BBBE-DB5E-460A-8621-6E28D2BD6E44"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-dhJxQYZs",
|
||||
"source": "ykramarz@cisco.com"
|
||||
"source": "ykramarz@cisco.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-20415",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-10-23T18:15:09.713",
|
||||
"lastModified": "2024-10-25T12:56:36.827",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-31T19:17:54.273",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,480 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:firepower_management_center:6.2.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DB01FA17-68F7-47E6-9D94-AC3C290F62AE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:firepower_management_center:6.2.3.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "08F0F58D-C859-400F-88D4-38C84584BACF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:firepower_management_center:6.2.3.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "73D28E1C-B26F-4BD8-8F21-2AFA1E1B881D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:firepower_management_center:6.2.3.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4DF3D576-7922-4FB4-9C8B-2E31E29A4FEF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:firepower_management_center:6.2.3.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DE852669-316E-4710-A964-91B17CBA75FF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:firepower_management_center:6.2.3.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D64651BA-33A1-4DD9-B23C-577543D45534"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:firepower_management_center:6.2.3.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E44687A2-D460-4CD7-91E1-4535B4A71698"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:firepower_management_center:6.2.3.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4C312686-8739-4B48-9476-3D65200B3216"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:firepower_management_center:6.2.3.8:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "059D7FFF-94B6-400A-A939-498BDBB18FED"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:firepower_management_center:6.2.3.9:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B4204464-BF24-4596-8AE2-4D98EC817234"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:firepower_management_center:6.2.3.10:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DF0B67CC-FFEA-4A22-A79F-6DB1C826CECE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:firepower_management_center:6.2.3.11:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "13744A3B-7F48-49B1-8263-012456E27ACD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:firepower_management_center:6.2.3.12:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0E0CC829-ED28-435B-9826-6CDB4BB2F0EF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:firepower_management_center:6.2.3.13:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1732AC85-09E3-43E2-B624-87E537EB6F03"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:firepower_management_center:6.2.3.14:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "85986C19-4819-4F02-9873-A42D4277D3A8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:firepower_management_center:6.2.3.15:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "11BEDD8B-DB02-4E8D-B2BF-2B7BE190AF6D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:firepower_management_center:6.2.3.16:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B0E13E7F-BDA9-49DF-BA43-CB812BC0D384"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:firepower_management_center:6.2.3.17:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "47FDAAB6-EC1B-4759-8B8A-55748C39AFFC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:firepower_management_center:6.2.3.18:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E3C97C0B-509E-4AE2-9EDB-BDC0436E05A1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:firepower_management_center:6.4.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DA61E6F5-FFFD-4D4E-9AA3-94F827A79F4C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:firepower_management_center:6.4.0.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "80EC515D-6051-472A-92F4-ED4385FEDEC7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:firepower_management_center:6.4.0.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F7E83830-B9CA-425D-BFD3-7F8FD1114950"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:firepower_management_center:6.4.0.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "91F862F9-40FE-42E9-86B2-BD9350B118D4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:firepower_management_center:6.4.0.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "857A0C11-1456-4F1A-A812-E93B829F13DF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:firepower_management_center:6.4.0.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "93828989-2731-4DCE-9FBB-5ABB5A660A9D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:firepower_management_center:6.4.0.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "83B99522-B80A-4998-971B-F3C45EB104F0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:firepower_management_center:6.4.0.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F286FD7B-E588-4DCC-B41F-AD9E4A49B8ED"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:firepower_management_center:6.4.0.8:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3908BF04-0869-4F4D-9BC4-411F56AC8092"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:firepower_management_center:6.4.0.9:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "227799AC-75DF-4B3F-A7EF-063D8D8C2EC1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:firepower_management_center:6.4.0.10:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FB72A64E-7B19-4A96-809C-287E391DFA44"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:firepower_management_center:6.4.0.11:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4630DEB7-BEE7-4247-9536-C35887A807C3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:firepower_management_center:6.4.0.12:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2E7BC07A-1C33-46FB-9ABF-C98A46BE6AD3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:firepower_management_center:6.4.0.13:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0F3B8077-2DD6-491F-9F0E-D977E7A4AB08"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:firepower_management_center:6.4.0.14:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CEAD4CD3-FBF1-43BC-A14F-6375E4B784AE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:firepower_management_center:6.4.0.15:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5662EBCF-13F5-4CE6-8E3D-B23B73AF4633"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:firepower_management_center:6.4.0.16:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "817E7CDB-5CDC-44A9-92D0-4364A08302BD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:firepower_management_center:6.4.0.17:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9A95D8B6-2D90-4EA8-B468-356EB396A273"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:firepower_management_center:6.4.0.18:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1CDEF2CC-D485-4E66-9818-7C9740F37840"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:firepower_management_center:6.6.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "30AE7CB7-86F5-4B80-9179-1C2DF4E8E7B5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:firepower_management_center:6.6.0.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1931C431-3452-4FE1-870A-16700553BDAE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:firepower_management_center:6.6.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "490C91AC-9437-43DA-99AF-0DF8A0E5EEB5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:firepower_management_center:6.6.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "22913221-9B69-451A-8442-C65091DFAFD2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:firepower_management_center:6.6.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1488A64D-E0ED-4E88-92E9-D8E38A2CB080"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:firepower_management_center:6.6.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9FF58049-7F1B-425B-A2A7-5974080625F3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:firepower_management_center:6.6.5.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4DA72515-66E1-4811-ADDA-B2F9B6A4B737"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:firepower_management_center:6.6.5.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "606C631F-5A30-4A07-A761-29B31D09C66A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:firepower_management_center:6.6.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0DA2A011-FAE4-4741-AA37-1F4F17471381"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:firepower_management_center:6.6.7.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0B57A678-E534-472C-8B45-F6A1E027248C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:firepower_management_center:6.6.7.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2D748B16-1C2A-4E00-807F-647569C271D1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:firepower_management_center:6.7.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "853866E2-1BCC-4A81-907A-ABA8648D8C57"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:firepower_management_center:6.7.0.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9B0B5925-0336-4F56-9D9A-777687DF3B22"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:firepower_management_center:6.7.0.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F406CDA3-08B9-4C13-B6F5-C83978239623"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:firepower_management_center:6.7.0.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "108BFA85-BB6B-420A-911D-B2731CB05289"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.0.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0FEE4092-0EAD-48DA-92EB-82DD4EB43E49"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.0.0.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7B8DF2E2-848A-4616-AEF0-1EFE68A900C1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.0.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "387E34BD-913B-4CB7-9230-81B283E92A9B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.0.1.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FFE8B3DC-9865-4845-B989-FB41D6FE085E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.0.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BC98B2C9-2F78-4DB5-97D7-78D584CEBE87"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.0.2.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "44CEED06-6E18-4961-BD69-8BF3E7A6D59C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.0.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D815D562-D60A-4AD1-9243-8167B244882E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.0.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FA91AC4A-77D5-4C41-BD63-4E8F3BA4FF84"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.0.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A5808D1C-6D6E-403D-8904-147B66B50385"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.0.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FD9A750B-7C84-484C-94F3-FB66EF6296E6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.0.6.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "62950A6C-8467-4215-BCD1-010B8C491714"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.0.6.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6D97494F-BA89-4E95-A01F-C2CE02505A27"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "21D28D33-2B3C-4695-9137-7C4AC6BA2D7D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.1.0.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3DCA8FE8-D0BC-4B6C-8E15-0DC5D0EF515F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.1.0.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "62213974-B025-4A76-87CD-025C84389A2B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.1.0.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A876A2A0-0973-481C-A63A-1A5761015308"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.2.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E6671431-4FE3-4D7D-9F46-445A1A6B7EEF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.2.0.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E2757987-7648-4BE1-AE91-99F1FC95C8C5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.2.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "841C3C05-7289-46CC-A610-5A5BFC81FD42"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.2.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "91599B30-27D5-450A-A565-A65BF940C30C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.2.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "71802FFD-A173-4F21-87C8-495D8F95A176"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.2.3.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8B9CD6DE-EE1E-4FF4-8DF5-7F9DA36AFCFD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.2.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E0EF1B4E-3E42-4C42-9981-2BC17F22BA2D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.2.4.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "30E26E7E-F6D8-4A89-85F7-42FCB0E37AD6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.2.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E2A7E707-6CBB-42E3-BE90-72E835156DB9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.2.5.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4BB537CA-0E37-471E-8DD3-7710A443224A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.2.5.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F9022BCA-EDBF-4FD1-B427-573CA07E5134"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.2.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "23BA0BE4-B06D-45AE-9C9D-280F1BFA7EDA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.2.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3B79ABCC-C95B-45AB-BE9D-454BD8174651"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.2.8:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A4FD7D25-704B-47EB-AF36-DC684AD07807"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.2.8.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3D33E431-39F5-4F73-99A1-19A05A594C90"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.3.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7A6F69A3-E15F-43C9-8B9C-A30E057C4FD0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.3.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "602535DE-ED32-4805-85EF-940955459B34"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.3.1.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "17727E39-1612-4433-AC23-CBC852B392C2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.3.1.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D5894CEC-AB1C-44F2-A977-FE74897A24A6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.4.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "579DC0CE-1CEA-449F-BF76-AD7087573ACD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.4.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EB3E28C0-675B-4C30-B248-BE1EB5E961C4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.4.1.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2C7E7A89-A9CA-45DA-8378-A50B1F9D260E"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-dhJxQYZs",
|
||||
"source": "ykramarz@cisco.com"
|
||||
"source": "ykramarz@cisco.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-21099",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2024-04-16T22:15:30.723",
|
||||
"lastModified": "2024-04-17T12:48:31.863",
|
||||
"lastModified": "2024-10-31T19:35:02.343",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -39,6 +39,18 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-24093",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-12T21:15:58.370",
|
||||
"lastModified": "2024-03-13T12:33:51.697",
|
||||
"lastModified": "2024-10-31T20:35:03.523",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Vulnerabilidad de inyecci\u00f3n SQL en Code-projects Scholars Tracking System 1.0 permite a atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de informaci\u00f3n de actualizaci\u00f3n de informaci\u00f3n personal."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ASR511-OO7/CVE-2024-24093/blob/main/CVE-10",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-27279",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2024-03-12T09:15:10.070",
|
||||
"lastModified": "2024-03-12T12:40:13.500",
|
||||
"lastModified": "2024-10-31T19:35:03.510",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Existe una vulnerabilidad de Directory traversal en a-blog cms Serie Ver.3.1.x Ver.3.1.9 y anteriores, Serie Ver.3.0.x Ver.3.0.30 y anteriores, Serie Ver.2.11.x Ver.2.11.59 y anteriores, Serie Ver.2.10.x Ver.2.10.51 y anteriores, y Ver.2.9 y versiones anteriores. Si se explota esta vulnerabilidad, un usuario con privilegios de editor o superiores que pueda iniciar sesi\u00f3n en el producto puede obtener archivos arbitrarios en el servidor, incluidos archivos de contrase\u00f1as."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://developer.a-blogcms.jp/blog/news/JVN-48443978.html",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-28303",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-19T19:15:06.913",
|
||||
"lastModified": "2024-03-20T13:00:16.367",
|
||||
"lastModified": "2024-10-31T19:35:06.587",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Se descubri\u00f3 que Open Source Medicine Ordering System v1.0 contiene una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro de fecha en /admin/reports/index.php."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/onurkarasalihoglu/vulnerability-disclosures/blob/main/omos-sql-injection.md",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-3592",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-06-07T06:15:10.960",
|
||||
"lastModified": "2024-06-07T14:56:05.647",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-31T19:40:34.747",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -18,8 +18,28 @@
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
|
||||
@ -39,14 +59,50 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:expresstech:quiz_and_survey_master:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "9.0.2",
|
||||
"matchCriteriaId": "57725447-AB0A-4B25-BB23-9292AFA5FB01"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3097878/quiz-master-next/trunk/php/admin/options-page-questions-tab.php",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/fc085413-db43-43e3-9b60-aeb341eed4e1?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-37162",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-06-07T15:15:50.617",
|
||||
"lastModified": "2024-06-07T19:24:09.243",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-31T19:43:26.800",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-209"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -51,14 +81,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:idopesok:zsa:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "0.3.3",
|
||||
"matchCriteriaId": "4DDAA2C4-0E79-46B0-BE82-73B86D8B383A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/IdoPesok/zsa/commit/86b86b282bde6780963f62406cc8bc65f2c86f3a",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/IdoPesok/zsa/security/advisories/GHSA-wjmj-h3xc-hxp8",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-393xx/CVE-2024-39332.json
Normal file
21
CVE-2024/CVE-2024-393xx/CVE-2024-39332.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-39332",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-31T19:15:12.897",
|
||||
"lastModified": "2024-10-31T19:15:12.897",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Webswing 23.2.2 allows remote attackers to modify client-side JavaScript code to achieve path traversal, likely leading to remote code execution via modification of shell scripts on the server."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://herolab.usd.de/security-advisories/usd-2024-0008/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-397xx/CVE-2024-39719.json
Normal file
21
CVE-2024/CVE-2024-397xx/CVE-2024-39719.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-39719",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-31T20:15:04.770",
|
||||
"lastModified": "2024-10-31T20:15:04.770",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in Ollama through 0.3.14. File existence disclosure can occur via api/create. When calling the CreateModel route with a path parameter that does not exist, it reflects the \"File does not exist\" error message to the attacker, providing a primitive for file existence on the server."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://oligosecurity.webflow.io/blog/more-models-more-probllms",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-397xx/CVE-2024-39720.json
Normal file
25
CVE-2024/CVE-2024-397xx/CVE-2024-39720.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-39720",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-31T20:15:04.877",
|
||||
"lastModified": "2024-10-31T20:15:04.877",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in Ollama before 0.1.46. An attacker can use two HTTP requests to upload a malformed GGUF file containing just 4 bytes starting with the GGUF custom magic header. By leveraging a custom Modelfile that includes a FROM statement pointing to the attacker-controlled blob file, the attacker can crash the application through the CreateModel route, leading to a segmentation fault (signal SIGSEGV: segmentation violation)."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ollama/ollama/compare/v0.1.45...v0.1.46#diff-782c2737eecfa83b7cb46a77c8bdaf40023e7067baccd4f806ac5517b4563131L417",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://oligosecurity.webflow.io/blog/more-models-more-probllms",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2024/CVE-2024-397xx/CVE-2024-39721.json
Normal file
29
CVE-2024/CVE-2024-397xx/CVE-2024-39721.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2024-39721",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-31T20:15:04.993",
|
||||
"lastModified": "2024-10-31T20:15:04.993",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in Ollama before 0.1.34. The CreateModelHandler function uses os.Open to read a file until completion. The req.Path parameter is user-controlled and can be set to /dev/random, which is blocking, causing the goroutine to run infinitely (even after the HTTP request is aborted by the client)."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ollama/ollama/blob/9164b0161bcb24e543cba835a8863b80af2c0c21/server/routes.go#L557",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/ollama/ollama/blob/adeb40eaf29039b8964425f69a9315f9f1694ba8/server/routes.go#L536",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://oligosecurity.webflow.io/blog/more-models-more-probllms",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-397xx/CVE-2024-39722.json
Normal file
21
CVE-2024/CVE-2024-397xx/CVE-2024-39722.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-39722",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-31T20:15:05.080",
|
||||
"lastModified": "2024-10-31T20:15:05.080",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in Ollama before 0.1.46. It exposes which files exist on the server on which it is deployed via path traversal in the api/push route."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://oligosecurity.webflow.io/blog/more-models-more-probllms",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-40457",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-12T14:16:06.780",
|
||||
"lastModified": "2024-10-24T17:35:07.660",
|
||||
"lastModified": "2024-10-31T20:15:05.173",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [
|
||||
{
|
||||
@ -59,6 +59,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/jeppojeps/CVE-2024-40457-PoC",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.noip.com/support/knowledgebase/install-linux-3-x-dynamic-update-client-duc",
|
||||
"source": "cve@mitre.org"
|
||||
|
29
CVE-2024/CVE-2024-425xx/CVE-2024-42515.json
Normal file
29
CVE-2024/CVE-2024-425xx/CVE-2024-42515.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2024-42515",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-31T19:15:12.983",
|
||||
"lastModified": "2024-10-31T19:15:12.983",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Glossarizer through 1.5.2 improperly tries to convert text into HTML. Even though the application itself escapes special characters (e.g., <>), the underlying library converts these encoded characters into legitimate HTML, thereby possibly causing stored XSS. Attackers can append a XSS payload to a word that has a corresponding glossary entry."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/PebbleRoad/glossarizer",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://herolab.usd.de/security-advisories/usd-2024-0011/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.npmjs.com/package/glossarizer",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-42835",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-31T14:15:05.610",
|
||||
"lastModified": "2024-10-31T14:15:05.610",
|
||||
"lastModified": "2024-10-31T19:35:08.113",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,30 @@
|
||||
"value": "langflow v1.0.12 was discovered to contain a remote code execution (RCE) vulnerability via the PythonCodeTool component."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/langflow-ai/langflow/issues/2908",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-42934",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-09T05:15:13.270",
|
||||
"lastModified": "2024-10-10T12:51:56.987",
|
||||
"lastModified": "2024-10-31T20:35:05.250",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "OpenIPMI anterior a 2.0.36 tiene un acceso a una matriz fuera de los l\u00edmites (para el tipo de autenticaci\u00f3n) en el simulador ipmi_sim, lo que resulta en una denegaci\u00f3n de servicio o (con muy baja probabilidad) en la omisi\u00f3n de la autenticaci\u00f3n o la ejecuci\u00f3n del c\u00f3digo."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 5.0,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2308375",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-45165",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-22T04:15:22.310",
|
||||
"lastModified": "2024-08-22T12:48:02.790",
|
||||
"lastModified": "2024-10-31T19:35:08.327",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Se descubri\u00f3 un problema en UCI IDOL 2 (tambi\u00e9n conocido como uciIDOL o IDOL2) hasta 2.12. Los datos se env\u00edan entre el cliente y el servidor con cifrado. Sin embargo, la clave se deriva de la cadena \"(c)2007 UCI Software GmbH B.Boll\" (sin comillas). La clave es est\u00e1tica y est\u00e1 codificada. Con el acceso a los mensajes, esto da como resultado que un atacante descifre y cifre los mensajes. Por lo tanto, permite ataques de intermediario pasivos y activos."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-798"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://download.uci.de/idol2/idol2Client_2_12.exe",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-46544",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-09-23T11:15:10.563",
|
||||
"lastModified": "2024-09-26T13:32:55.343",
|
||||
"lastModified": "2024-10-31T20:35:06.390",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,30 @@
|
||||
"value": "La vulnerabilidad de permisos predeterminados incorrectos en los conectores Apache Tomcat permite a los usuarios locales ver y modificar la memoria compartida que contiene la configuraci\u00f3n de mod_jk, lo que puede provocar la divulgaci\u00f3n de informaci\u00f3n o la denegaci\u00f3n de servicio. Este problema afecta a los conectores Apache Tomcat: desde la versi\u00f3n 1.2.9-beta hasta la 1.2.49. Solo se ve afectado mod_jk en sistemas tipo Unix. Ni el redirector ISAPI ni mod_jk en Windows se ven afectados. Se recomienda a los usuarios que actualicen a la versi\u00f3n 1.2.50, que soluciona el problema."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 5.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@apache.org",
|
||||
|
25
CVE-2024/CVE-2024-482xx/CVE-2024-48200.json
Normal file
25
CVE-2024/CVE-2024-482xx/CVE-2024-48200.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-48200",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-31T19:15:13.150",
|
||||
"lastModified": "2024-10-31T19:15:13.150",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in MobaXterm v24.2 allows a local attacker to escalate privileges and execute arbitrary code via the remove function of the MobaXterm MSI is spawning one Administrative cmd (conhost.exe)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/ahmedsherif/ad56cd3a9ef86cdc05175fb591804c64",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://mobaxterm.mobatek.net/download-home-edition.html",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-48307",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-31T01:15:14.803",
|
||||
"lastModified": "2024-10-31T01:15:14.803",
|
||||
"lastModified": "2024-10-31T19:35:09.203",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "JeecgBoot v3.7.1 was discovered to contain a SQL injection vulnerability via the component /onlDragDatasetHead/getTotalData."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 que JeecgBoot v3.7.1 conten\u00eda una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del componente /onlDragDatasetHead/getTotalData."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/jeecgboot",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-48346",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-30T21:15:14.450",
|
||||
"lastModified": "2024-10-30T21:15:14.450",
|
||||
"lastModified": "2024-10-31T19:35:10.023",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "xtreme1 <= v0.9.1 contains a Server-Side Request Forgery (SSRF) vulnerability in the /api/data/upload path. The vulnerability is triggered through the fileUrl parameter, which allows an attacker to make arbitrary requests to internal or external systems."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "xtreme1 <= v0.9.1 contiene una vulnerabilidad de Server-Side Request Forgery (SSRF) en la ruta /api/data/upload. La vulnerabilidad se activa a trav\u00e9s del par\u00e1metro fileUrl, que permite a un atacante realizar solicitudes arbitrarias a sistemas internos o externos."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-918"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/xtreme1-io/xtreme1/issues/284",
|
||||
|
21
CVE-2024/CVE-2024-483xx/CVE-2024-48359.json
Normal file
21
CVE-2024/CVE-2024-483xx/CVE-2024-48359.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-48359",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-31T20:15:05.340",
|
||||
"lastModified": "2024-10-31T20:15:05.340",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Qualitor v8.24 was discovered to contain a remote code execution (RCE) vulnerability via the gridValoresPopHidden parameter."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/OpenXP-Research/CVE-2024-48359",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-483xx/CVE-2024-48360.json
Normal file
25
CVE-2024/CVE-2024-483xx/CVE-2024-48360.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-48360",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-31T20:15:05.420",
|
||||
"lastModified": "2024-10-31T20:15:05.420",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Qualitor v8.24 was discovered to contain a Server-Side Request Forgery (SSRF) via the component /request/viewValidacao.php."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/OpenXP-Research/CVE-2024-48360",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.qualitor.com.br/qualitor-8-20",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-48735",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-30T21:15:14.620",
|
||||
"lastModified": "2024-10-30T21:15:14.620",
|
||||
"lastModified": "2024-10-31T20:35:06.767",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Directory Traversal in /SASStudio/sasexec/sessions/{sessionID}/workspace/{InternalPath} in SAS Studio 9.4 allows remote attacker to access internal files by manipulating default path during file download."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Directory Traversal en /SASStudio/sasexec/sessions/{sessionID}/workspace/{InternalPath} en SAS Studio 9.4 permite a un atacante remoto acceder a archivos internos manipulando la ruta predeterminada durante la descarga de archivos."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.7,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 4.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://sas.com",
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2024-48955",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-29T18:15:05.690",
|
||||
"lastModified": "2024-10-30T15:35:22.063",
|
||||
"lastModified": "2024-10-31T20:15:05.530",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In NetAdmin 4.0.30319, an attacker can steal a valid session cookie and inject it into another device, granting unauthorized access. This type of attack is commonly referred to as session hijacking."
|
||||
"value": "Broken access control in NetAdmin 4.030319 returns data with functionalities on the endpoint that \"assembles\" the functionalities menus, the return of this call is not encrypted and as the system does not validate the session authorization, an attacker can copy the content of the browser of a user with greater privileges having access to the functionalities of the user that the code was copied."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-50356",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-10-31T18:15:05.750",
|
||||
"lastModified": "2024-10-31T18:15:05.750",
|
||||
"lastModified": "2024-10-31T20:35:07.840",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 0.0
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
|
25
CVE-2024/CVE-2024-508xx/CVE-2024-50801.json
Normal file
25
CVE-2024/CVE-2024-508xx/CVE-2024-50801.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-50801",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-31T19:15:13.313",
|
||||
"lastModified": "2024-10-31T19:15:13.313",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A SQL Injection vulnerability was discovered in AbanteCart 1.4.0 in the update() function in public_html/admin/controller/responses/listing_grid/collections.php. The vulnerability is exploitable via the id parameter."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chiggerlor.substack.com/p/cve-2024-50801-and-and-cve-2024-50802",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/abantecart/abantecart-src",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-508xx/CVE-2024-50802.json
Normal file
25
CVE-2024/CVE-2024-508xx/CVE-2024-50802.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-50802",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-31T19:15:13.413",
|
||||
"lastModified": "2024-10-31T19:15:13.413",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A SQL Injection vulnerability was discovered in AbanteCart 1.4.0 in the update() function in public_html/admin/controller/responses/listing_grid/email_templates.php. The vulnerability is exploitable via the id parameter."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chiggerlor.substack.com/p/cve-2024-50801-and-and-cve-2024-50802",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/abantecart/abantecart-src",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-510xx/CVE-2024-51060.json
Normal file
25
CVE-2024/CVE-2024-510xx/CVE-2024-51060.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-51060",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-31T19:15:13.500",
|
||||
"lastModified": "2024-10-31T19:15:13.500",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Projectworlds Online Admission System v1 is vulnerable to SQL Injection in index.php via the 'a_id' parameter."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://projectworld.com",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/0x1c1ph3r/CVEs/tree/main/CVE-2024-51060",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-510xx/CVE-2024-51063.json
Normal file
25
CVE-2024/CVE-2024-510xx/CVE-2024-51063.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-51063",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-31T19:15:13.610",
|
||||
"lastModified": "2024-10-31T19:15:13.610",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Phpgurukul Teachers Record Management System v2.1 is vulnerable to SQL Injection in add-teacher.php via the mobile number or email parameter."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://phpgurukul.com",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/0x1c1ph3r/CVEs/tree/main/CVE-2024-51063",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-510xx/CVE-2024-51064.json
Normal file
25
CVE-2024/CVE-2024-510xx/CVE-2024-51064.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-51064",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-31T19:15:13.700",
|
||||
"lastModified": "2024-10-31T19:15:13.700",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Phpgurukul Teachers Record Management System v2.1 is vulnerable to SQL Injection via the tid parameter to admin/queries.php."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://phpgurukul.com",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/0x1c1ph3r/CVEs/tree/main/CVE-2024-51064",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-510xx/CVE-2024-51065.json
Normal file
25
CVE-2024/CVE-2024-510xx/CVE-2024-51065.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-51065",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-31T19:15:13.780",
|
||||
"lastModified": "2024-10-31T19:15:13.780",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Phpgurukul Beauty Parlour Management System v1.1 is vulnerable to SQL Injection in admin/index.php via the the username parameter."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://phpgurukul.com",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/0x1c1ph3r/CVEs/tree/main/CVE-2024-51065",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-510xx/CVE-2024-51066.json
Normal file
25
CVE-2024/CVE-2024-510xx/CVE-2024-51066.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-51066",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-31T19:15:13.860",
|
||||
"lastModified": "2024-10-31T19:15:13.860",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An Insecure Direct Object Reference (IDOR) vulnerability in appointment-detail.php in Phpgurukul's Beauty Parlour Management System v1.1 allows unauthorized access to the Personally Identifiable Information (PII) of other customers."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://phpgurukul.com",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/0x1c1ph3r/CVEs/tree/main/CVE-2024-51066",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-51255",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-31T16:15:06.033",
|
||||
"lastModified": "2024-10-31T16:15:06.033",
|
||||
"lastModified": "2024-10-31T19:35:10.837",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "DrayTek Vigor3900 1.5.1.3 allows attackers to inject malicious commands into mainfunction.cgi and execute arbitrary commands by calling the ruequest_certificate function."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/fu37kola/cve/blob/main/DrayTek/Vigor3900/1.5.1.3/DrayTek_Vigor_3900_1.5.1.3.pdf",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-51259",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-31T14:15:06.260",
|
||||
"lastModified": "2024-10-31T14:15:06.260",
|
||||
"lastModified": "2024-10-31T19:35:11.680",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "DrayTek Vigor3900 1.5.1.3 allows attackers to inject malicious commands into mainfunction.cgi and execute arbitrary commands by calling the setup_cacertificate function."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/fu37kola/cve/blob/main/DrayTek/Vigor3900/1.5.1.3/DrayTek_Vigor_3900_1.5.1.3.pdf",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-51260",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-31T16:15:06.113",
|
||||
"lastModified": "2024-10-31T16:15:06.113",
|
||||
"lastModified": "2024-10-31T19:35:12.607",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "DrayTek Vigor3900 1.5.1.3 allows attackers to inject malicious commands into mainfunction.cgi and execute arbitrary commands by calling the acme_process function."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/fu37kola/cve/blob/main/DrayTek/Vigor3900/1.5.1.3/DrayTek_Vigor_3900_1.5.1.3.pdf",
|
||||
|
86
README.md
86
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-10-31T19:00:20.333660+00:00
|
||||
2024-10-31T21:00:20.265569+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-10-31T18:48:20.883000+00:00
|
||||
2024-10-31T20:35:07.840000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,51 +33,63 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
267742
|
||||
267761
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `7`
|
||||
Recently added CVEs: `19`
|
||||
|
||||
- [CVE-2024-50347](CVE-2024/CVE-2024-503xx/CVE-2024-50347.json) (`2024-10-31T18:15:05.600`)
|
||||
- [CVE-2024-50356](CVE-2024/CVE-2024-503xx/CVE-2024-50356.json) (`2024-10-31T18:15:05.750`)
|
||||
- [CVE-2024-51430](CVE-2024/CVE-2024-514xx/CVE-2024-51430.json) (`2024-10-31T17:15:13.403`)
|
||||
- [CVE-2024-51478](CVE-2024/CVE-2024-514xx/CVE-2024-51478.json) (`2024-10-31T17:15:13.500`)
|
||||
- [CVE-2024-51481](CVE-2024/CVE-2024-514xx/CVE-2024-51481.json) (`2024-10-31T17:15:13.723`)
|
||||
- [CVE-2024-51482](CVE-2024/CVE-2024-514xx/CVE-2024-51482.json) (`2024-10-31T18:15:05.997`)
|
||||
- [CVE-2024-7883](CVE-2024/CVE-2024-78xx/CVE-2024-7883.json) (`2024-10-31T17:15:14.013`)
|
||||
- [CVE-2023-52044](CVE-2023/CVE-2023-520xx/CVE-2023-52044.json) (`2024-10-31T19:15:12.347`)
|
||||
- [CVE-2023-52045](CVE-2023/CVE-2023-520xx/CVE-2023-52045.json) (`2024-10-31T19:15:12.450`)
|
||||
- [CVE-2024-10573](CVE-2024/CVE-2024-105xx/CVE-2024-10573.json) (`2024-10-31T19:15:12.540`)
|
||||
- [CVE-2024-39332](CVE-2024/CVE-2024-393xx/CVE-2024-39332.json) (`2024-10-31T19:15:12.897`)
|
||||
- [CVE-2024-39719](CVE-2024/CVE-2024-397xx/CVE-2024-39719.json) (`2024-10-31T20:15:04.770`)
|
||||
- [CVE-2024-39720](CVE-2024/CVE-2024-397xx/CVE-2024-39720.json) (`2024-10-31T20:15:04.877`)
|
||||
- [CVE-2024-39721](CVE-2024/CVE-2024-397xx/CVE-2024-39721.json) (`2024-10-31T20:15:04.993`)
|
||||
- [CVE-2024-39722](CVE-2024/CVE-2024-397xx/CVE-2024-39722.json) (`2024-10-31T20:15:05.080`)
|
||||
- [CVE-2024-42515](CVE-2024/CVE-2024-425xx/CVE-2024-42515.json) (`2024-10-31T19:15:12.983`)
|
||||
- [CVE-2024-48200](CVE-2024/CVE-2024-482xx/CVE-2024-48200.json) (`2024-10-31T19:15:13.150`)
|
||||
- [CVE-2024-48359](CVE-2024/CVE-2024-483xx/CVE-2024-48359.json) (`2024-10-31T20:15:05.340`)
|
||||
- [CVE-2024-48360](CVE-2024/CVE-2024-483xx/CVE-2024-48360.json) (`2024-10-31T20:15:05.420`)
|
||||
- [CVE-2024-50801](CVE-2024/CVE-2024-508xx/CVE-2024-50801.json) (`2024-10-31T19:15:13.313`)
|
||||
- [CVE-2024-50802](CVE-2024/CVE-2024-508xx/CVE-2024-50802.json) (`2024-10-31T19:15:13.413`)
|
||||
- [CVE-2024-51060](CVE-2024/CVE-2024-510xx/CVE-2024-51060.json) (`2024-10-31T19:15:13.500`)
|
||||
- [CVE-2024-51063](CVE-2024/CVE-2024-510xx/CVE-2024-51063.json) (`2024-10-31T19:15:13.610`)
|
||||
- [CVE-2024-51064](CVE-2024/CVE-2024-510xx/CVE-2024-51064.json) (`2024-10-31T19:15:13.700`)
|
||||
- [CVE-2024-51065](CVE-2024/CVE-2024-510xx/CVE-2024-51065.json) (`2024-10-31T19:15:13.780`)
|
||||
- [CVE-2024-51066](CVE-2024/CVE-2024-510xx/CVE-2024-51066.json) (`2024-10-31T19:15:13.860`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `44`
|
||||
Recently modified CVEs: `49`
|
||||
|
||||
- [CVE-2024-34002](CVE-2024/CVE-2024-340xx/CVE-2024-34002.json) (`2024-10-31T18:35:12.750`)
|
||||
- [CVE-2024-34537](CVE-2024/CVE-2024-345xx/CVE-2024-34537.json) (`2024-10-31T17:15:12.903`)
|
||||
- [CVE-2024-35989](CVE-2024/CVE-2024-359xx/CVE-2024-35989.json) (`2024-10-31T18:35:12.980`)
|
||||
- [CVE-2024-37763](CVE-2024/CVE-2024-377xx/CVE-2024-37763.json) (`2024-10-31T18:35:13.207`)
|
||||
- [CVE-2024-40680](CVE-2024/CVE-2024-406xx/CVE-2024-40680.json) (`2024-10-31T17:15:12.990`)
|
||||
- [CVE-2024-40681](CVE-2024/CVE-2024-406xx/CVE-2024-40681.json) (`2024-10-31T17:15:13.143`)
|
||||
- [CVE-2024-4468](CVE-2024/CVE-2024-44xx/CVE-2024-4468.json) (`2024-10-31T18:40:45.817`)
|
||||
- [CVE-2024-46528](CVE-2024/CVE-2024-465xx/CVE-2024-46528.json) (`2024-10-31T17:15:13.250`)
|
||||
- [CVE-2024-4661](CVE-2024/CVE-2024-46xx/CVE-2024-4661.json) (`2024-10-31T18:21:43.683`)
|
||||
- [CVE-2024-47640](CVE-2024/CVE-2024-476xx/CVE-2024-47640.json) (`2024-10-31T17:39:28.907`)
|
||||
- [CVE-2024-48213](CVE-2024/CVE-2024-482xx/CVE-2024-48213.json) (`2024-10-31T18:35:14.040`)
|
||||
- [CVE-2024-48569](CVE-2024/CVE-2024-485xx/CVE-2024-48569.json) (`2024-10-31T18:35:14.873`)
|
||||
- [CVE-2024-48646](CVE-2024/CVE-2024-486xx/CVE-2024-48646.json) (`2024-10-31T18:35:15.693`)
|
||||
- [CVE-2024-48647](CVE-2024/CVE-2024-486xx/CVE-2024-48647.json) (`2024-10-31T18:35:16.527`)
|
||||
- [CVE-2024-48648](CVE-2024/CVE-2024-486xx/CVE-2024-48648.json) (`2024-10-31T17:35:03.713`)
|
||||
- [CVE-2024-49643](CVE-2024/CVE-2024-496xx/CVE-2024-49643.json) (`2024-10-31T18:48:20.883`)
|
||||
- [CVE-2024-49645](CVE-2024/CVE-2024-496xx/CVE-2024-49645.json) (`2024-10-31T17:59:25.867`)
|
||||
- [CVE-2024-50074](CVE-2024/CVE-2024-500xx/CVE-2024-50074.json) (`2024-10-31T18:23:21.567`)
|
||||
- [CVE-2024-5087](CVE-2024/CVE-2024-50xx/CVE-2024-5087.json) (`2024-10-31T18:26:54.500`)
|
||||
- [CVE-2024-5613](CVE-2024/CVE-2024-56xx/CVE-2024-5613.json) (`2024-10-31T18:31:30.757`)
|
||||
- [CVE-2024-5638](CVE-2024/CVE-2024-56xx/CVE-2024-5638.json) (`2024-10-31T18:38:33.640`)
|
||||
- [CVE-2024-5823](CVE-2024/CVE-2024-58xx/CVE-2024-5823.json) (`2024-10-31T18:05:00.637`)
|
||||
- [CVE-2024-7042](CVE-2024/CVE-2024-70xx/CVE-2024-7042.json) (`2024-10-31T18:36:30.140`)
|
||||
- [CVE-2024-7472](CVE-2024/CVE-2024-74xx/CVE-2024-7472.json) (`2024-10-31T18:46:32.497`)
|
||||
- [CVE-2024-9675](CVE-2024/CVE-2024-96xx/CVE-2024-9675.json) (`2024-10-31T17:15:14.250`)
|
||||
- [CVE-2024-20264](CVE-2024/CVE-2024-202xx/CVE-2024-20264.json) (`2024-10-31T19:04:42.863`)
|
||||
- [CVE-2024-20269](CVE-2024/CVE-2024-202xx/CVE-2024-20269.json) (`2024-10-31T19:35:03.420`)
|
||||
- [CVE-2024-20273](CVE-2024/CVE-2024-202xx/CVE-2024-20273.json) (`2024-10-31T19:09:24.687`)
|
||||
- [CVE-2024-20298](CVE-2024/CVE-2024-202xx/CVE-2024-20298.json) (`2024-10-31T19:25:31.523`)
|
||||
- [CVE-2024-20364](CVE-2024/CVE-2024-203xx/CVE-2024-20364.json) (`2024-10-31T19:36:32.277`)
|
||||
- [CVE-2024-20415](CVE-2024/CVE-2024-204xx/CVE-2024-20415.json) (`2024-10-31T19:17:54.273`)
|
||||
- [CVE-2024-21099](CVE-2024/CVE-2024-210xx/CVE-2024-21099.json) (`2024-10-31T19:35:02.343`)
|
||||
- [CVE-2024-24093](CVE-2024/CVE-2024-240xx/CVE-2024-24093.json) (`2024-10-31T20:35:03.523`)
|
||||
- [CVE-2024-27279](CVE-2024/CVE-2024-272xx/CVE-2024-27279.json) (`2024-10-31T19:35:03.510`)
|
||||
- [CVE-2024-28303](CVE-2024/CVE-2024-283xx/CVE-2024-28303.json) (`2024-10-31T19:35:06.587`)
|
||||
- [CVE-2024-3592](CVE-2024/CVE-2024-35xx/CVE-2024-3592.json) (`2024-10-31T19:40:34.747`)
|
||||
- [CVE-2024-37162](CVE-2024/CVE-2024-371xx/CVE-2024-37162.json) (`2024-10-31T19:43:26.800`)
|
||||
- [CVE-2024-40457](CVE-2024/CVE-2024-404xx/CVE-2024-40457.json) (`2024-10-31T20:15:05.173`)
|
||||
- [CVE-2024-42835](CVE-2024/CVE-2024-428xx/CVE-2024-42835.json) (`2024-10-31T19:35:08.113`)
|
||||
- [CVE-2024-42934](CVE-2024/CVE-2024-429xx/CVE-2024-42934.json) (`2024-10-31T20:35:05.250`)
|
||||
- [CVE-2024-45165](CVE-2024/CVE-2024-451xx/CVE-2024-45165.json) (`2024-10-31T19:35:08.327`)
|
||||
- [CVE-2024-46544](CVE-2024/CVE-2024-465xx/CVE-2024-46544.json) (`2024-10-31T20:35:06.390`)
|
||||
- [CVE-2024-48307](CVE-2024/CVE-2024-483xx/CVE-2024-48307.json) (`2024-10-31T19:35:09.203`)
|
||||
- [CVE-2024-48346](CVE-2024/CVE-2024-483xx/CVE-2024-48346.json) (`2024-10-31T19:35:10.023`)
|
||||
- [CVE-2024-48735](CVE-2024/CVE-2024-487xx/CVE-2024-48735.json) (`2024-10-31T20:35:06.767`)
|
||||
- [CVE-2024-48955](CVE-2024/CVE-2024-489xx/CVE-2024-48955.json) (`2024-10-31T20:15:05.530`)
|
||||
- [CVE-2024-50356](CVE-2024/CVE-2024-503xx/CVE-2024-50356.json) (`2024-10-31T20:35:07.840`)
|
||||
- [CVE-2024-51255](CVE-2024/CVE-2024-512xx/CVE-2024-51255.json) (`2024-10-31T19:35:10.837`)
|
||||
- [CVE-2024-51259](CVE-2024/CVE-2024-512xx/CVE-2024-51259.json) (`2024-10-31T19:35:11.680`)
|
||||
- [CVE-2024-51260](CVE-2024/CVE-2024-512xx/CVE-2024-51260.json) (`2024-10-31T19:35:12.607`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
217
_state.csv
217
_state.csv
@ -73275,27 +73275,27 @@ CVE-2014-9800,0,0,5a5a4caa864f170145d3d3c2cef91d6a105d9c27e5979024bb27b2243fcae0
|
||||
CVE-2014-9801,0,0,1632540904b59372b0937a913ed314f49f06e11045ff36a91a4ed621725d10dd,2016-11-28T19:15:01.527000
|
||||
CVE-2014-9802,0,0,c812564621033150916f42aac79f2698926d15b085312424d75021440bbff317,2016-11-28T19:15:03.480000
|
||||
CVE-2014-9803,0,0,a2478c6d1e6f3041773bb070f3f3b9904a1d7b690d9a97506297f13ed8f70f2f,2016-07-12T13:52:16.203000
|
||||
CVE-2014-9804,0,0,ad4dedba68bd3053f066b8b1f0d89c444bfdf38c3b7a5ea4946f4d3bb2d7650e,2017-04-03T14:22:18.733000
|
||||
CVE-2014-9805,0,0,330da34b38d54ee62f8d3cf6a2a933971ddb744855dc603f2fa7d443a4de7e11,2017-04-04T15:31:36.767000
|
||||
CVE-2014-9806,0,0,e21b133a5eac0a80ab22760c2f60c3237696daddf986c70e40d2f09bb85fb286,2017-04-04T15:33:36.053000
|
||||
CVE-2014-9807,0,0,df1f9a731df9a13615d1544ecfe138c76866a45dbda1835a7cff07f4c28d11e6,2017-04-04T15:34:05.697000
|
||||
CVE-2014-9808,0,0,b34a941f4ade405a5d28b62c2ee38a379b9f94272673d9dc2423a7d5c20d1d2e,2017-04-04T15:34:30.633000
|
||||
CVE-2014-9809,0,0,12677cc5ad11f3e1a5e13fe7ad563d74722dc9a2b15c4669d8de1739e5fead6b,2017-04-04T15:35:18.700000
|
||||
CVE-2014-9810,0,0,95525fdf158239b5a029c5300907655548f37d93c1b1fc4b23537e6b265d799a,2017-04-04T15:35:52.280000
|
||||
CVE-2014-9811,0,0,64870a14f9f7c3edcc13df1686d77917831b067b8c431bdfe2eb4e32b35287a6,2017-04-04T15:36:27.390000
|
||||
CVE-2014-9812,0,0,c25870f3a844dc9effe98495014f545d0b9e0fe6e63fff3d54bf1afa828cc885,2017-04-04T15:36:56.970000
|
||||
CVE-2014-9813,0,0,24e9e4082bdca46e8bfe4a98b1b5fadba694bb215207ff49458b5e75500141d4,2017-04-04T15:40:29.073000
|
||||
CVE-2014-9814,0,0,b85f938833a829768ab481fc9b95f84115a9026ee4b5b37ad1756bf9a83706c3,2017-04-04T15:40:49.197000
|
||||
CVE-2014-9815,0,0,a56dac9e5a9de69a8bd722e3a4a89dfba5ee981ca5c6a51444121f7dc5e8ee49,2017-04-04T15:37:35.503000
|
||||
CVE-2014-9816,0,0,adeeabc78eebb947eb6dc904a2c2e4e1a255d94259978f9334f024d244d0a7ef,2017-04-04T15:41:53.687000
|
||||
CVE-2014-9817,0,0,85a51fcd6a6ba0cee57abe66363e64849bfd4a278b8bd53b020f2a0b7b5961ef,2017-04-04T15:42:20.873000
|
||||
CVE-2014-9818,0,0,de2c45f22182a9991941376d08025f771ba33ce1e8ec37c2b37592ab70084179,2017-04-04T15:43:36.660000
|
||||
CVE-2014-9819,0,0,364c6cf57238651521357ba73a0f336d71e2c3d85553482f8934f8338ef3707b,2017-04-04T15:44:17.503000
|
||||
CVE-2014-9820,0,0,492552a29d67be31a426d74eb0bd40cb53b39064400431f5bfb7975015e1a0b5,2017-04-04T15:44:40.317000
|
||||
CVE-2014-9821,0,0,1758f5d664083d79525847eb41480da5bf9118e3b80e8fe8a0450868cf2993f2,2017-04-04T15:45:03.570000
|
||||
CVE-2014-9822,0,0,4aa3bd1a0fb69395bf79bbac626bcfc39d0b3f5497821d8e063fceeb00c3a0c8,2017-04-04T15:45:25.163000
|
||||
CVE-2014-9823,0,0,ddea5c479e0c8d1d994d5d9a2b99250d4536b667e5a3f79f06ec846411bb65c4,2017-04-06T13:13:37.330000
|
||||
CVE-2014-9824,0,0,0e30988fe3dcfc6859693e222c8b97c18513bdd5803e04b361fbef882073ebaa,2017-04-06T12:56:39.363000
|
||||
CVE-2014-9804,0,1,e91abc5317f3dd6a61d112140713bda18190887b23301502361db203e46f2fab,2024-10-31T19:52:55.157000
|
||||
CVE-2014-9805,0,1,8d799c79b4e98651438a627176de8797474805e051d27113e738c202cfc04ae5,2024-10-31T19:52:32.510000
|
||||
CVE-2014-9806,0,1,8f6683f5e43c1382008fefcd38f8207c37702af514d92e32647e90d503827408,2024-10-31T19:52:23.440000
|
||||
CVE-2014-9807,0,1,acdcdb0ba1d877ac849da63c95f360a3e65ef13f63c8f66cd7665ef51028adf4,2024-10-31T19:50:31.553000
|
||||
CVE-2014-9808,0,1,3c866a8f8f5402b2b473b204e6ea72eae1bace3708bdc9b228029e8be3a19348,2024-10-31T19:49:00.877000
|
||||
CVE-2014-9809,0,1,e8edd4040de62a49eeca10486192e0abc4a4e1fbfb79000c3b5d730fe0dcdd19,2024-10-31T19:53:30.847000
|
||||
CVE-2014-9810,0,1,a86ff86bbf2c4dce78f36c2647f40c802873f4e9cefb05b5ea585a36b18e46d0,2024-10-31T19:53:36.977000
|
||||
CVE-2014-9811,0,1,62917c172530c17be604a34be9376a3c8e6cc75283d4fc8f7cd41ef43c8717e7,2024-10-31T19:53:42.617000
|
||||
CVE-2014-9812,0,1,4d17d93ae70bd0f61ebab65bfcaf28a9cb8429747704dcef47ad7aecaa91b626,2024-10-31T19:53:49.987000
|
||||
CVE-2014-9813,0,1,d2267edf875d3e0bdff891b5d576381d4d47e20482ad1aa00ebe9e4312faffdb,2024-10-31T19:53:55.630000
|
||||
CVE-2014-9814,0,1,473ecd328284cb333a1d54bf92d641f8df49a55a689505600aa001a90e5782c9,2024-10-31T19:54:43.970000
|
||||
CVE-2014-9815,0,1,366903ea62fc4fc1cdc40c7cd554f2e23f25655b223404cbf14bf0d3a26ba32b,2024-10-31T19:55:48.687000
|
||||
CVE-2014-9816,0,1,b5594db52659d9a21d2cc7fcd8fbd17bec3a74fdbcf5fc7c35a6091f2e08ecbe,2024-10-31T19:55:54.603000
|
||||
CVE-2014-9817,0,1,10c6f791006f3a8ac3773bc23ec6540b11d82c81f3f8828b8bc8db0cd43fac6d,2024-10-31T19:56:03.530000
|
||||
CVE-2014-9818,0,1,dc423dfd595b96cbfa7a1ebd05ea5b0a421ac36bd0a24e14e9c6b4502c52f798,2024-10-31T19:56:08.477000
|
||||
CVE-2014-9819,0,1,473793bf658321322268d488fa2c67a6b33786ace725e10e292edfbb2698f7a2,2024-10-31T19:56:16.343000
|
||||
CVE-2014-9820,0,1,315f84d6e11a761cad3cb3d42be0d251c84b1b2c5aa2677bf149d91cb2996bae,2024-10-31T19:56:38.033000
|
||||
CVE-2014-9821,0,1,a10b48c2cb08a38b661a78e7ffe89d9338aaea4c031262e788484d74d6c19610,2024-10-31T19:56:44.357000
|
||||
CVE-2014-9822,0,1,1b7a686e93975c0ed2ea9590e1f4a4becfcc480eb5e7c0da7b10f83a3454a55b,2024-10-31T19:56:51.983000
|
||||
CVE-2014-9823,0,1,5b4f713b1aa371727f052d1e24491ccb5acf554c78179b76d7033ebe478b1155,2024-10-31T19:56:59.013000
|
||||
CVE-2014-9824,0,1,a381cf0247b001d2b073d67346571aa1dc1560c09759e173df27875b30a4c9c9,2024-10-31T19:57:06.380000
|
||||
CVE-2014-9825,0,0,8237657f1bc545991336e8373e80d977dec8ae49fdc4a04e44914118dadb3791,2017-04-10T22:31:05.007000
|
||||
CVE-2014-9826,0,0,860ab0020773466be74236a4548947dce8cf843f8de8cac7e27b4d6c73bb939a,2017-04-04T15:09:57.817000
|
||||
CVE-2014-9827,0,0,ca945600dc5be9a5edda22d9a67746fe77c869edcce014d962be9a7759e736ab,2017-08-08T16:22:13.923000
|
||||
@ -153325,7 +153325,7 @@ CVE-2020-22533,0,0,8cf73333b4ebcde6d608738a7182e3a0c8935887ec73faac29a965d055d3e
|
||||
CVE-2020-22535,0,0,3d39b81bb0c64f73d36642872de8b40a5e64321679c1a0ef90beeaf09e6bae1a,2021-07-13T18:58:42.140000
|
||||
CVE-2020-22539,0,0,15bbe4ba3bc7be73f3da6475e511295156ebfd2ea390b950930b64bf8492d8d8,2024-08-22T19:35:00.877000
|
||||
CVE-2020-2254,0,0,e7830526f9ccb1eacc81ed0b7e7bba867a9db0d3b245b1c38b997be50037937f,2023-10-25T18:16:39.377000
|
||||
CVE-2020-22540,0,1,2fb8725f767918adecfe8cb48c4fc4a0c7e6d2066fd5ddbbd756e7f2dae8c28d,2024-10-31T18:35:00.647000
|
||||
CVE-2020-22540,0,0,2fb8725f767918adecfe8cb48c4fc4a0c7e6d2066fd5ddbbd756e7f2dae8c28d,2024-10-31T18:35:00.647000
|
||||
CVE-2020-2255,0,0,38e94953c094aa7fe06618634ee9c7f217363a9813b7dc4898775e41721a0fda,2023-10-25T18:16:39.430000
|
||||
CVE-2020-22550,0,0,b2541e5db171a2b4b2a6b543f805ad79596e468be356d0e2f4c25df75af7bda5,2021-01-06T20:18:38.987000
|
||||
CVE-2020-22552,0,0,448e4b0e2dc89c0747016e9852b20e9a1bad400b91a89d483e626626c874899c,2024-02-14T01:17:43.863000
|
||||
@ -187361,7 +187361,7 @@ CVE-2021-47435,0,0,d063dc53db995430cfda65e2466747fb8cd69b46d7ca5747554bea3cb1814
|
||||
CVE-2021-47436,0,0,b07b3ca60638009afe7b8ad03ab6f8c7f867d2b372ffcdb5a5c46b33ba8a7bbb,2024-05-22T12:46:53.887000
|
||||
CVE-2021-47437,0,0,c5633153b363975c954f650a3f16f0487d2c2be89412326f4804204a77330d89,2024-05-22T12:46:53.887000
|
||||
CVE-2021-47438,0,0,8fc8c2f554fc412ce79ea1489c7728dd7270136493967e52dca18fb315318ceb,2024-05-22T12:46:53.887000
|
||||
CVE-2021-47439,0,1,deb4030b8ddd9f57e2809b987e15ae912806fd170e3bd972e39b8f64188da933,2024-10-31T18:35:01.573000
|
||||
CVE-2021-47439,0,0,deb4030b8ddd9f57e2809b987e15ae912806fd170e3bd972e39b8f64188da933,2024-10-31T18:35:01.573000
|
||||
CVE-2021-47440,0,0,8f56806f540953d7423426b7ab25880635b68c589690247fc00393ff0efa2ea0,2024-05-22T12:46:53.887000
|
||||
CVE-2021-47441,0,0,0f3b983feef84ab521b403aca7907c792115b545aee8b57acd22e8325593d7f9,2024-07-03T01:37:55.917000
|
||||
CVE-2021-47442,0,0,ea327f347d948a1a55388d77debcd85955a3e437785ae68f3946bb6c997710a7,2024-05-22T12:46:53.887000
|
||||
@ -230475,7 +230475,7 @@ CVE-2023-40100,0,0,d865222f08aa85ede2d3681caf9207be6bcb8c87eca41307d9aef1926195b
|
||||
CVE-2023-40101,0,0,3ce51d90b0e7e589809d744dc88bb96b7c66c60685aebf47c83df3167c5dd843,2023-11-07T00:52:28.560000
|
||||
CVE-2023-40103,0,0,450c3a391def7a8afcbefb17dfde1c695cebaffcfd18ba45db0f0094ffb67ee0,2024-02-02T03:14:29.707000
|
||||
CVE-2023-40104,0,0,0cf270b8607bfa9d4e1d8714c505120c5fc75b5ddb276c75d9c23f91e95a9b08,2024-08-01T13:44:27.157000
|
||||
CVE-2023-40105,0,1,341bc94e60af694de4a4f122a999c4e6272d2c33c08a679715c8c4adab940e4b,2024-10-31T17:35:01.983000
|
||||
CVE-2023-40105,0,0,341bc94e60af694de4a4f122a999c4e6272d2c33c08a679715c8c4adab940e4b,2024-10-31T17:35:01.983000
|
||||
CVE-2023-40106,0,0,0475b08be04d4153a33f08c726f5ef91351480d0fc8d62866c8273b0b5a46d11,2024-08-27T19:35:06.100000
|
||||
CVE-2023-40107,0,0,9b5d8c411184c5b318513e2f9308b05cbf529a3dea80774c590446ec7489cece,2024-08-21T21:35:01.720000
|
||||
CVE-2023-40109,0,0,418785915c5c782eaecea452fe3e0bcad27a28cd6d2cb7fa6c5725ebb93ef7e2,2024-08-16T16:35:00.740000
|
||||
@ -234579,7 +234579,7 @@ CVE-2023-45911,0,0,54489a6451274c125be8c762d8cc98dd3a8a21909c6da94287975a7cc96d5
|
||||
CVE-2023-45912,0,0,b0bca1440f9e631c57e26e1e5113ad8d18938fc54eb7d0e4574e0ea800836ce0,2023-10-25T13:49:52.877000
|
||||
CVE-2023-45913,0,0,2d4a210c00002764f5901b52e62a4b6fa406024d19769e4d12ade6afd30659cc,2024-08-02T21:15:46.620000
|
||||
CVE-2023-45916,0,0,834ea3e5a22f0efcea772023be38e172d408424245dbd32ed5dbd163255ec8e0,2024-01-29T09:15:42.327000
|
||||
CVE-2023-45918,0,1,8cd030886569abe4c5bac597ccc443fb96b747b0a3c95e3a0ae15b024b62b623,2024-10-31T18:35:03.080000
|
||||
CVE-2023-45918,0,0,8cd030886569abe4c5bac597ccc443fb96b747b0a3c95e3a0ae15b024b62b623,2024-10-31T18:35:03.080000
|
||||
CVE-2023-45919,0,0,eddc98d70c2ada443cead3f2c0b843b797378561c0ad845479dc9591db603015,2024-08-02T21:15:46.747000
|
||||
CVE-2023-4592,0,0,ceac01107db2a306b25bb0c94e7b73f947e2ed1609e834ceaf5b2024be55f03b,2023-11-13T18:46:52.950000
|
||||
CVE-2023-45920,0,0,bfbc186b7f8b580702dc2e2c120be4b3adcaf65a26e1af7f9e78ba083c35fb83,2024-08-02T21:15:46.837000
|
||||
@ -236898,7 +236898,7 @@ CVE-2023-49097,0,0,56a490d001ba2f79efb1ede445c5d17ca49ddb338a58b3ec14e52c3204d09
|
||||
CVE-2023-49098,0,0,b47da9d751d1c4be45c45f01dbd7d6f779e951f94b7a99f9a01abbc3ccfe09b8,2024-01-25T15:44:43.440000
|
||||
CVE-2023-49099,0,0,301fa9c02d1a71b653baa225e03f055435f4d6d084453b84ad6cc6bb2b096548,2024-01-25T15:32:52.503000
|
||||
CVE-2023-4910,0,0,6d05c75a9e17e3ccd981e8ee7bf1e2ab24479ee1803438deab4de1edd175eda3,2023-12-13T08:15:51.190000
|
||||
CVE-2023-49100,0,0,4342e3e7d8dd4345e0c20aeab7fe640a8d12b302cf8c05308020afa470c9f95d,2024-02-22T19:07:27.197000
|
||||
CVE-2023-49100,0,1,4f3418882c9e26f673e47663df91cae8ea633910906ff7513c6422262cb91044,2024-10-31T20:35:01.123000
|
||||
CVE-2023-49101,0,0,cdb3a0b6538f74622160c1a1e285d5c5fd7fe14c11635bb1fd24e2fb54c0dcca,2024-02-15T16:00:44.567000
|
||||
CVE-2023-49102,0,0,395e472a244baf1edeece4e64436ae0c9e04ac589e63b4e437cc5efd790f937f,2024-08-02T22:15:58.190000
|
||||
CVE-2023-49103,0,0,2ae024b709386837fb69f63c039bd694c6f8061cfc7156b399598900d8cede10,2024-09-05T13:30:10.023000
|
||||
@ -238811,6 +238811,8 @@ CVE-2023-52040,0,0,762939d11515580f100465151a16fe161b0f305136b11d8c988a24ca3b912
|
||||
CVE-2023-52041,0,0,d822171150327a12062651891084a07154ed2e15efb3b51e285b66f24f49d7e8,2024-01-19T20:39:37.587000
|
||||
CVE-2023-52042,0,0,d63c4bc544afb86a58bb15680099cbb76d2fb1c561f2e9993a893dae4d480107,2024-08-30T19:35:04.953000
|
||||
CVE-2023-52043,0,0,2598b3da2f921eccbd3a41321ff24953e0fd67e0dc8e0987c81c7b871cbfaaa7,2024-09-06T17:35:03.427000
|
||||
CVE-2023-52044,1,1,7aa317278ff2994366571ddbcb030926a3e9d6311257c49404418e0c4b474d29,2024-10-31T19:15:12.347000
|
||||
CVE-2023-52045,1,1,9c9e6d02e7b026eab5e1d09490bba1de7042dd5d02a944639d1c3f465bd37801,2024-10-31T19:15:12.450000
|
||||
CVE-2023-52046,0,0,9b8f5c0f61db55c891d556798c9c9da378945fb25af6cd3feea31d7ec4cb7ccf,2024-02-13T16:05:49.580000
|
||||
CVE-2023-52047,0,0,0a58a1c6d75330480a1c8c9c493c63f296c64ed482e86c7d753ecc6c013c567f,2024-08-13T20:35:05.050000
|
||||
CVE-2023-52048,0,0,e51406b0a7e0f54ab5f0d8fcca043edf25903f6ec066c183786088e2dc13a5e3,2024-02-29T13:49:47.277000
|
||||
@ -239233,7 +239235,7 @@ CVE-2023-52539,0,0,b821de3cf6dac9b6ca9186886c6757cf361cf7e1b3be10c27145c9e496b92
|
||||
CVE-2023-5254,0,0,5f7cee797c6f86eb738b8a7c6816dfcd5a4e6f8647e76dd5bd92cb5b95399be3,2023-11-07T04:23:40.643000
|
||||
CVE-2023-52540,0,0,6043f7b2833db7ef103b97561cb4ef82751086dbea7d4957ecb9ee6908b9f107,2024-04-08T18:48:40.217000
|
||||
CVE-2023-52541,0,0,05a922d703fe178ffe3ffcc50d7254491f88bf17e762cb3f58c17de2d7f44cb8,2024-10-31T15:35:12.207000
|
||||
CVE-2023-52542,0,1,bc3b88aa47baacfeee22c5097944807475e5f67a82e59ee630b579b0961a4395,2024-10-31T18:35:03.870000
|
||||
CVE-2023-52542,0,0,bc3b88aa47baacfeee22c5097944807475e5f67a82e59ee630b579b0961a4395,2024-10-31T18:35:03.870000
|
||||
CVE-2023-52543,0,0,41aac44c8931668192d5fa3c95aa2b64b2f3c224e1cf1305a133dfd5df96c932,2024-04-08T18:48:40.217000
|
||||
CVE-2023-52544,0,0,27963c836572979af4e49300b2561228946c4d3cae999b213a50ec0f6bccbf4e,2024-04-08T18:48:40.217000
|
||||
CVE-2023-52545,0,0,7c866bf49e9ed6314cdc69e05703bc4aa26b629aa7be4fc7e540db613309f921,2024-08-26T17:35:01.777000
|
||||
@ -239311,7 +239313,7 @@ CVE-2023-5261,0,0,71874624632ecec272a9360963ac2693f66de572bbfd95d6dcec21b319e84b
|
||||
CVE-2023-52610,0,0,b7b80996cd5faeb262b37131a8e9fe77951e34c0a9446ba895663b1f4c9aec48,2024-03-18T12:38:25.490000
|
||||
CVE-2023-52611,0,0,0229496230b0e92530b8865128ce3370378ae8dd4f4713dcc80fb1771ff668a8,2024-03-18T12:38:25.490000
|
||||
CVE-2023-52612,0,0,c40e760ea5d1e6955be22b3c2c70cf6597bf643feaac02231bf846e9b5d11e3a,2024-06-27T13:15:53.470000
|
||||
CVE-2023-52613,0,0,4dcb86489bae6af27d6a3a92a58c01948ee7bd34d4b1aadf14a7de570d57fa1c,2024-03-18T12:38:25.490000
|
||||
CVE-2023-52613,0,1,778078997a00f1311f0c70b13d6d85511c04605ce3d0b8faa02d02da19118ca4,2024-10-31T20:35:02.680000
|
||||
CVE-2023-52614,0,0,8ee84d07fbe93a723185433e1f443e071e1b6576f617cf55d35e50f3e317f3db,2024-06-25T22:15:15.793000
|
||||
CVE-2023-52615,0,0,124e1995c8a6a67390ea92195fefeeb05b7cfb8e05fddbb368a599eb724339a6,2024-06-27T12:15:15.583000
|
||||
CVE-2023-52616,0,0,8ddda269abaeba5f1aed89367ae82d93cda73f0a5b631176a7ef3aaa8dc137fc,2024-06-25T22:15:15.973000
|
||||
@ -239411,7 +239413,7 @@ CVE-2023-52700,0,0,cc55aed5c1d15adca3cae6d82533e785ba818e8d7784f9796166d9eb880ee
|
||||
CVE-2023-52701,0,0,677100564637bdf0af06f27033c00966698848f746d9ec1a45da915d615f9d0e,2024-05-21T16:53:56.550000
|
||||
CVE-2023-52702,0,0,b2e8f62250efb7d825a81d0942184d9e9d88d741263380f5b5947ac07366415b,2024-05-21T16:53:56.550000
|
||||
CVE-2023-52703,0,0,9a5f1701acfe47b75bd2aae3b80b45b36bdc1bef661725a649671bd38d55592d,2024-05-21T16:53:56.550000
|
||||
CVE-2023-52704,0,0,2e831189e023e362d3dfdedd4eea45d5198c1c9b6d32543c6826da9f9ef9b7b1,2024-05-21T16:53:56.550000
|
||||
CVE-2023-52704,0,1,9a1e560d3f3d9d43bfcff569880a48160a561d854512da83fb51353297122af4,2024-10-31T20:35:02.910000
|
||||
CVE-2023-52705,0,0,e0e7e3d50f6a0ba6a1fa2b6f11b4a84fb685696b90642bf7cc71cd16ca5855b0,2024-05-21T16:53:56.550000
|
||||
CVE-2023-52706,0,0,8b37f3ec912d4dd819fdbc4c9acfa204e7a0af66839e63b9ecf7fb3314fc2625,2024-05-21T16:53:56.550000
|
||||
CVE-2023-52707,0,0,0ebfb049bafb9ad593bae37805df61fafd234e39ccd40c877b5cd08f88684ffe,2024-05-21T16:53:56.550000
|
||||
@ -242615,10 +242617,10 @@ CVE-2024-10452,0,0,b9c0cdbb1129f4d2a683c96007a5a37f3de5a0f61940081281473b3662384
|
||||
CVE-2024-10454,0,0,00a532df7fc763ef532ba53fc65d3c8c542dd62967499eae25b9ca1ff4ccf09a,2024-10-31T13:15:14.580000
|
||||
CVE-2024-10455,0,0,9f18b197c1829a5ecbaa5a69cd0dd4162e3d6f6c6818ccd45083d33b92cd8ac7,2024-10-29T14:34:50.257000
|
||||
CVE-2024-10456,0,0,4e8313f83dd74eaf01a85b0e2c8241c892546e7f6f740c8d60482cb697257f25,2024-10-30T18:15:05.123000
|
||||
CVE-2024-10458,0,1,74ca3b5ff0d83b1a9172f91e6aeac1c2c334f5a37d9d050a2b4a8dbda73ae0a5,2024-10-31T18:35:04.080000
|
||||
CVE-2024-10459,0,1,41e5d3d1c5717bfbf938efdb318a0912b0d67ff5e837610ea3b33ef2a35c4dbe,2024-10-31T18:35:04.883000
|
||||
CVE-2024-10458,0,0,74ca3b5ff0d83b1a9172f91e6aeac1c2c334f5a37d9d050a2b4a8dbda73ae0a5,2024-10-31T18:35:04.080000
|
||||
CVE-2024-10459,0,0,41e5d3d1c5717bfbf938efdb318a0912b0d67ff5e837610ea3b33ef2a35c4dbe,2024-10-31T18:35:04.883000
|
||||
CVE-2024-1046,0,0,2cc4ec780c94e2fc2c5a11377d58ffcde319d06f8567f8dea25dd56811075522,2024-02-13T19:44:34.880000
|
||||
CVE-2024-10460,0,1,1e6ac243751ca3e1851b6072183d5e5d23cf85f0aea7a57550ac0919c45e3382,2024-10-31T18:35:05.703000
|
||||
CVE-2024-10460,0,0,1e6ac243751ca3e1851b6072183d5e5d23cf85f0aea7a57550ac0919c45e3382,2024-10-31T18:35:05.703000
|
||||
CVE-2024-10461,0,0,e62c3d73f027c24aa214194489d2f7ea4cb1a239ca62c4ab4737708ca7ae2098,2024-10-29T14:35:16.270000
|
||||
CVE-2024-10462,0,0,4a226303b41a8ef14593df9ad4016e062b22cd4809d4e55cc19ac201172497f0,2024-10-29T15:35:12.370000
|
||||
CVE-2024-10463,0,0,49a4454e7924bd767d5f280eb17ebe85a54b4c9d8efa81e94d360039ec5e86c3,2024-10-29T15:35:13.493000
|
||||
@ -242661,6 +242663,7 @@ CVE-2024-10559,0,0,b15c5cef48b19793cc135dcefcd31a7ae1cf1d0b293c280fd67bc092c8b80
|
||||
CVE-2024-1056,0,0,7aa227b1313326ef7e8b583bc7a3f0e84afbbd1f0f46388543b54cca53251293,2024-09-19T22:06:32.340000
|
||||
CVE-2024-10561,0,0,adc1b5788a7e287d410d5756cb2c8086d994832c36b5729249aa613428559544,2024-10-31T02:15:03.680000
|
||||
CVE-2024-1057,0,0,afa16fae44234143422d3d8f32f1ab0c34f389c2f0ebb0a7139bb0ca7e4b1769,2024-04-22T13:28:43.747000
|
||||
CVE-2024-10573,1,1,b38ef3f6c3eadff638aac2b1e2e94dea1b67cb67b399073de7c8b41bfb551c32,2024-10-31T19:15:12.540000
|
||||
CVE-2024-1058,0,0,6b5e9e2c8572168cf164dc3fe2cb55f99ab49ff2791e71ab226d135ab3271443,2024-02-29T13:49:29.390000
|
||||
CVE-2024-1059,0,0,76d1b9b40438f497b680a6494941e57752e942263b38e7996980a78bf67b658a,2024-02-05T20:50:26.783000
|
||||
CVE-2024-1060,0,0,d653064ebc7376d659eeceb53018669b809b93fa1e3915db85367d79da8fa5c6,2024-02-05T20:49:55.413000
|
||||
@ -243681,17 +243684,17 @@ CVE-2024-20260,0,0,e1fb5372ebeb2821531f3a082b09e7e0c81c08aa5e7c68ae16a7295e0b5db
|
||||
CVE-2024-20261,0,0,5c65061910678ae58b328f6a0e37c321fe1bf57a9d47085baeb418960297a3d6,2024-05-22T18:59:20.240000
|
||||
CVE-2024-20262,0,0,d20e355bf64045bb726321c22659f6c213d6a34b5f8360db4262a3c1acced6db,2024-03-13T18:15:58.530000
|
||||
CVE-2024-20263,0,0,a03c106a8ca3bb4647e4caa99728a3814edbbe0073eadd982e4b8d15f1108007,2024-02-06T19:23:20.600000
|
||||
CVE-2024-20264,0,0,5609462932f15c597bbf504d3d594975ad6434ea487e9719e65ddd4489d8efe2,2024-10-25T12:56:36.827000
|
||||
CVE-2024-20264,0,1,854619aca0dd20e60ee9b3dc419e3ad96f086a2fd7fe0b996bc5b7f02f0f3673,2024-10-31T19:04:42.863000
|
||||
CVE-2024-20265,0,0,405f08c8e7e8849163f2eb6a8e5eb3eed5d428c9d5f1700fe4a57c86124fbf2c,2024-03-27T17:48:21.140000
|
||||
CVE-2024-20266,0,0,6dbb5ce45980d47bf7eb6b4f22011bf963dd46d368a6ae781e4da8879de7a610,2024-03-13T18:15:58.530000
|
||||
CVE-2024-20267,0,0,49082794ba6fffb4cd0ccafc96537e8303023b31c83143a02b2c16e741876cc2,2024-03-04T22:45:43.893000
|
||||
CVE-2024-20268,0,0,7759be7dd4a356ca6b6a1b7455ca1dbb1f9d36388e26159b0a01ddd63697ab84,2024-10-25T12:56:36.827000
|
||||
CVE-2024-20269,0,0,88cd558963686c8b9cab30a70eeb1a0bd7a6f2c656c08d7e9d1afca9fd10068d,2024-10-25T12:56:36.827000
|
||||
CVE-2024-20269,0,1,18ed918c88bc4666e37665fe708c91bfd217fd78c72c1d9a5647d5c25c8f9909,2024-10-31T19:35:03.420000
|
||||
CVE-2024-2027,0,0,8a6da780f00ef83adadf5b93e79e41584ae4ce15f32aba2548f6552eaa755565,2024-04-10T13:23:38.787000
|
||||
CVE-2024-20270,0,0,eb515a12dde6cc2ab0dfdeee187efe297a3536ebbda30c8e847c7138ffa84d0d,2024-02-02T16:15:54.227000
|
||||
CVE-2024-20271,0,0,9bce8a64e9296ad22ee19fd2c64f9f191014f0d9052b00608129f7da079ff720,2024-03-27T17:48:21.140000
|
||||
CVE-2024-20272,0,0,9a8b431abc55ae18c0094ec2d1030d59c5263518a92577c729598443278bbea6,2024-02-02T16:15:54.683000
|
||||
CVE-2024-20273,0,0,8b112f4b02470eba863801e1e42e3a98c5ae162f3044482e8541663023d9c97c,2024-10-25T12:56:36.827000
|
||||
CVE-2024-20273,0,1,26c3c26c607841698dc1cf329a5a133b83df05d5a153dcbaa4eb0f4ddb7caa4e,2024-10-31T19:09:24.687000
|
||||
CVE-2024-20274,0,0,25e605d9d54d4da58104cfd092dd6dbcffc594540622946f0085313336b1d18e,2024-10-25T12:56:36.827000
|
||||
CVE-2024-20275,0,0,d642880c67354f21dd660d8005bc15eea0945814b36b39237dce1aa9d5118339,2024-10-25T12:56:36.827000
|
||||
CVE-2024-20276,0,0,77220479d2c4e0a0ce7772faba7bb9374ec34b0cd2307655f714f3eba6dc1b93,2024-03-27T17:48:21.140000
|
||||
@ -243717,7 +243720,7 @@ CVE-2024-20294,0,0,742861094e87571e845203e831bfb7a087118860ed05792647beba51da9e1
|
||||
CVE-2024-20295,0,0,440a3fe735baf91af4ba8e7f15eaba3890b664a180f3cc6b1b84c3c2ae93a20b,2024-04-25T13:18:20.370000
|
||||
CVE-2024-20296,0,0,40bbd38e07d81658299d895ad9afa6a2a8c553e04b04f72d9f3dda0ddd6b036f,2024-07-18T12:28:43.707000
|
||||
CVE-2024-20297,0,0,76d14dfa0f9509c5a289050d83c9a1077f8a1eeb56a70f5510a545859db5b18f,2024-10-25T12:56:36.827000
|
||||
CVE-2024-20298,0,0,d7b78fb64fa5c6dd7ebb9f35d881d018ce49ab3417e1e31c1e9af7349e826844,2024-10-25T12:56:36.827000
|
||||
CVE-2024-20298,0,1,01695f1182050adcd993e50d5c7f72e0f5795d1ad885d2ade8480d82ecdc8b98,2024-10-31T19:25:31.523000
|
||||
CVE-2024-20299,0,0,ea63fdda38ab3c5e4dfbc8dc2825b521c61b9797c2ccf660e32cd8336c48d5df,2024-10-25T12:56:36.827000
|
||||
CVE-2024-2030,0,0,f47e609ec6da92e4d0f51eb73197726fa40c04bd5fba84d7e80690a86556bbc1,2024-03-13T18:15:58.530000
|
||||
CVE-2024-20300,0,0,2c6145cb8a8bdce4d25bc4fb0d9158de2182f6c4b0288358081ef17d8ec8c1e8,2024-10-25T12:56:36.827000
|
||||
@ -243788,7 +243791,7 @@ CVE-2024-20360,0,0,b9376885f3bd33f8b376cfcd9d1a4c2997937c1a075603d8638d862812d3e
|
||||
CVE-2024-20361,0,0,8fc8c6bd1287a52550fd38650e66a5006a20e7eae1aa8f8c99b728af1c48ddd5,2024-05-22T18:59:20.240000
|
||||
CVE-2024-20362,0,0,0fe85dbbc396fc356835f570820efb6142358d26355d59753469b06ab8b1d26f,2024-04-03T17:24:18.150000
|
||||
CVE-2024-20363,0,0,fd62098992468346229d2c9f8f88c3a0bdc7312cacd90d8bf7a2b7925976c048,2024-07-03T01:46:06.070000
|
||||
CVE-2024-20364,0,0,f39734b291125d567a56f80d651e614675a81ffedf7761321cf4d60c9969f754,2024-10-25T12:56:36.827000
|
||||
CVE-2024-20364,0,1,a47617c767c4786facdb367d77b019465e9a2bf635bd17c71b1a524f335a7780,2024-10-31T19:36:32.277000
|
||||
CVE-2024-20365,0,0,b941e81c62a5622fb3207cd284578983abbf20cf62d6c3be738ab76890047c8c,2024-10-08T14:28:42.727000
|
||||
CVE-2024-20366,0,0,ce7e4ab0363f4b2934fc27a08480c4ec05827340dd08325d4de96e54b996f48f,2024-05-15T18:35:11.453000
|
||||
CVE-2024-20367,0,0,0d59cd325b5448a23ac62ba4d011225bdec20c6d4a20e9044f14a66801d9654b,2024-04-03T17:24:18.150000
|
||||
@ -243840,7 +243843,7 @@ CVE-2024-20411,0,0,4f003e5090f28bf95bd35a4fbdae5180d9a8ba20c425549807eec3131f67c
|
||||
CVE-2024-20412,0,0,98fe7a5862ce0435e94f459cc380f6731f224b2de6aaf35729ca1e7ed37af631,2024-10-25T12:56:36.827000
|
||||
CVE-2024-20413,0,0,eef91fa550f9bdcbf9b050eb11a257fdd75cd91f9c74286f67575b2cf9d8093e,2024-08-29T13:25:27.537000
|
||||
CVE-2024-20414,0,0,18adcabc3ea83c021e3e42e80805abb0da254bdf76c23740c5471d9c9fa12ab4,2024-10-02T20:02:22.740000
|
||||
CVE-2024-20415,0,0,ace1385581011ed019184aa3fb43120119a465cbfa23a70765745569ce25b180,2024-10-25T12:56:36.827000
|
||||
CVE-2024-20415,0,1,877e94faab6d2266c2faaa313bee5ba7676639f7c6928a7d38493bfe98132d17,2024-10-31T19:17:54.273000
|
||||
CVE-2024-20416,0,0,36fba5d0b9a663051d43c2072f34c721bf06b423d2ffa103fc7cf93ef9750d67,2024-07-18T12:28:43.707000
|
||||
CVE-2024-20417,0,0,2b2621922f4e9896d58ad85f7dd970402245ce4da0539fb0012d7404735b7f45,2024-08-22T12:48:02.790000
|
||||
CVE-2024-20419,0,0,0795f6e87845f9b46dc3400495c49fb48a047d8ed4e9d1842a04ff7724f0ad68,2024-08-13T17:15:22.787000
|
||||
@ -244419,7 +244422,7 @@ CVE-2024-21095,0,0,71837bbaf2bea328402990b14e523963606d49d2731911e5f425e34df69f4
|
||||
CVE-2024-21096,0,0,6aea65a83e2d5b0b6b2c176040905d4617084dd4a49f2855ae52e067c47fcfb6,2024-06-18T02:15:09.823000
|
||||
CVE-2024-21097,0,0,180e09f8ab03fa9202c965312463df6de0d343b6920ea63f93e36f9d95609d57,2024-04-17T12:48:31.863000
|
||||
CVE-2024-21098,0,0,6d4c7c29d84d44117c2ddddd591dc940d4aab6a0b106a5d85613f57420b56b9f,2024-04-17T12:48:31.863000
|
||||
CVE-2024-21099,0,0,eef26a141d604a9279a80dedd8237a72c532b1ff86bc60304cf5993304ffbb22,2024-04-17T12:48:31.863000
|
||||
CVE-2024-21099,0,1,18ee7f90aec4d9c34bf08ab839549123e62f8937c0d3b02741d81fa2e6dfe88e,2024-10-31T19:35:02.343000
|
||||
CVE-2024-2110,0,0,1270b7a979206100ed725d968c0cf72fd1f82b851f2f2372b42faaa8d203e40d,2024-03-28T12:42:56.150000
|
||||
CVE-2024-21100,0,0,a46a163d2ef0a0b6b1fddd7395d7d5cb51902aea83a18389f53792a38f659f53,2024-04-17T12:48:31.863000
|
||||
CVE-2024-21101,0,0,91755928d5ed81eb1c0b6d3faaf85c7a1a9acb13a679b76992a144a90a15ac62,2024-04-26T09:15:11.750000
|
||||
@ -244456,7 +244459,7 @@ CVE-2024-2113,0,0,d820f9174045c4a91c8de22b2f318d393b16e5183ad826479f5c93fd64192d
|
||||
CVE-2024-21130,0,0,13e5e480b47df9c035f480a63cbeba0c6ce05798db1fa3dc667fa306c070c11b,2024-10-17T16:58:22.037000
|
||||
CVE-2024-21131,0,0,02165835cc6f0e203728409c02066c414e0700a6416e43c004ac7c1741f0e57f,2024-07-19T14:15:05.180000
|
||||
CVE-2024-21132,0,0,683d4a8132332ad86fddc10cd15bb59076d052bf865226f7944ae794277a5d4e,2024-08-28T17:40:31.727000
|
||||
CVE-2024-21133,0,1,a9876891a6c2a6c3d77b30af6f76ad94e03c5c4618a7edf1f3af119bbca64cb8,2024-10-31T18:35:06.540000
|
||||
CVE-2024-21133,0,0,a9876891a6c2a6c3d77b30af6f76ad94e03c5c4618a7edf1f3af119bbca64cb8,2024-10-31T18:35:06.540000
|
||||
CVE-2024-21134,0,0,8b2526b0e292ceacbf0cc57aaf65cf091a298a6098fd630f182d8f8af262d4ce,2024-10-17T16:58:38.650000
|
||||
CVE-2024-21135,0,0,ba0250ef42fd2872339c049bf92d12e0db71762fc207c75bb73b68f494e9f6b5,2024-10-17T16:58:53.687000
|
||||
CVE-2024-21136,0,0,0b3d31fd31b74b67777283c1c23811ac7b0b473c6d3e3e94fd2f66077b9a369c,2024-08-28T17:59:36.023000
|
||||
@ -245968,7 +245971,7 @@ CVE-2024-23227,0,0,76df15f6bc2ca6b12012309a52c71fb5a4f3228c7f6483628fc9bf7ed873f
|
||||
CVE-2024-23228,0,0,cc53be31cb9d833cc5f783d1b1a5baa2ef8daadab372d7bfd86c3142f74dcac9,2024-07-03T01:47:38.910000
|
||||
CVE-2024-23229,0,0,561351da6f91af092533ed5801a4de12d08e4fb8a08cae5fec6b16d788979c5a,2024-10-30T20:35:08.097000
|
||||
CVE-2024-23230,0,0,0ce355c026a81eb330cd3a55adfdd58c7b28ad2193d6045812672f59d130ef9d,2024-10-31T15:35:27.513000
|
||||
CVE-2024-23231,0,1,0e1f04616cdf41b71be7b9218a6fca56d6aa4937cf846479ddbe6f0c5832b513,2024-10-31T18:35:07.310000
|
||||
CVE-2024-23231,0,0,0e1f04616cdf41b71be7b9218a6fca56d6aa4937cf846479ddbe6f0c5832b513,2024-10-31T18:35:07.310000
|
||||
CVE-2024-23232,0,0,9e7b49448cac16c45fbeaf042c9f71b2d8db550fb449e33aa9abdc891de85b63,2024-03-13T21:15:56.087000
|
||||
CVE-2024-23233,0,0,313670ac068b12d9fa516d4a3c082e80e45b5e5dbe4efd3c4e89ac3ce5144465,2024-03-13T21:15:56.140000
|
||||
CVE-2024-23234,0,0,cf9cee47c5ddf4443c90581bef409e0907a72ec2106ee4166332684023ebc090,2024-08-27T16:35:08.620000
|
||||
@ -246022,7 +246025,7 @@ CVE-2024-23277,0,0,329d44f192e6d8ad64377bfea1b406324a89ddf322f5987758a35ef433724
|
||||
CVE-2024-23278,0,0,766bded776e256695874796c761a698226a698abed559def31f9f418b44fbd0e,2024-08-01T13:47:14.363000
|
||||
CVE-2024-23279,0,0,04cf6340eed14797588fb60b9db6f98aa22f7faf3625a9866457c3db2729515d,2024-03-13T21:15:58.063000
|
||||
CVE-2024-2328,0,0,db4dcfea63581146a34d92e0d3290b1bf593c898de5919596eb70f461d745708,2024-05-02T18:00:37.360000
|
||||
CVE-2024-23280,0,1,ddc6f40a9de9d3a8d8165b26792d447c58ff17ce75e5f106261376a7c5e4a9e1,2024-10-31T17:35:02.803000
|
||||
CVE-2024-23280,0,0,ddc6f40a9de9d3a8d8165b26792d447c58ff17ce75e5f106261376a7c5e4a9e1,2024-10-31T17:35:02.803000
|
||||
CVE-2024-23281,0,0,ebcc57daef885f64cd010edceca3c55445d6724dba570bb6546aefcf9b9ee767,2024-03-13T21:15:58.150000
|
||||
CVE-2024-23282,0,0,489c27c47de53736ddacfdf8fc0d1e5b925b36d05a9df8057651dd26f3053be5,2024-10-30T20:35:10.147000
|
||||
CVE-2024-23283,0,0,7718a2900f8b37b1392ccbf676493a05796a6de981b49f31d382de7bc4b9d364,2024-10-27T14:35:04.903000
|
||||
@ -246656,7 +246659,7 @@ CVE-2024-2408,0,0,e2c01a5c34540ebb0aeec1f86c6fa49f65e11bad86d0e423ba6a7c8c1306c7
|
||||
CVE-2024-2409,0,0,40134401d2d9db58f61c794cf0f4f791968f8a191847ffa4ae84dc193442f258,2024-03-29T12:45:02.937000
|
||||
CVE-2024-24091,0,0,5abca135be2b48f97a9b4ee4284b135e3c993507c7ae94228dbfeca849094700,2024-09-05T12:57:51.890000
|
||||
CVE-2024-24092,0,0,85255eb7350c088041b14db17806ac0275bf0f870c5dc0846dac7ef708da600c,2024-08-05T14:35:03.843000
|
||||
CVE-2024-24093,0,0,14e5230c16c4af460c68647fa9203bde6e56c21bc1a3208cb017e8bb36864636,2024-03-13T12:33:51.697000
|
||||
CVE-2024-24093,0,1,fb5ed7dd5447f2f3646a43ede6e27e58ea7347516d0a38f6974af6473303761c,2024-10-31T20:35:03.523000
|
||||
CVE-2024-24095,0,0,a293063a01db5092273515cc6c1fbe86e89299406200e6a2f03c1a4a2a21fbc6,2024-02-27T14:20:06.637000
|
||||
CVE-2024-24096,0,0,be98bfd34c594b5bc2f148848abf51a12eec4301e64123b58bf793ff254827e3,2024-02-27T14:20:06.637000
|
||||
CVE-2024-24097,0,0,fac0898f527625e2c3336ba1bc4bf6bd2a8e244bb9d5499d446769299fde892b,2024-03-13T12:33:51.697000
|
||||
@ -247416,7 +247419,7 @@ CVE-2024-25316,0,0,dc0ffcbd049ed752bddaf4851795a99ca233f2e28b2566ba55c9e2779a3d0
|
||||
CVE-2024-25318,0,0,816caedc6e45e8daf872d525cbac5de4c424378189abd90933e824060204bf71,2024-02-12T21:37:44.753000
|
||||
CVE-2024-2532,0,0,dbd2e90a8b9f0e6a244b6c6163b20f8979fc7a3177b780d02e1509ee97c26b6a,2024-05-17T02:38:17.753000
|
||||
CVE-2024-25320,0,0,3f240c7b2117cfbcf6abd7fcdad0bf99eb1b4e31e2d00516b72afdecb9c7c27c,2024-08-20T19:35:02.513000
|
||||
CVE-2024-25325,0,1,d37e96d75312f2e4bcc77f54d4abb9879ca7992c01d4a551d01083c5bf6ed837,2024-10-31T18:35:07.527000
|
||||
CVE-2024-25325,0,0,d37e96d75312f2e4bcc77f54d4abb9879ca7992c01d4a551d01083c5bf6ed837,2024-10-31T18:35:07.527000
|
||||
CVE-2024-25327,0,0,9be8a5c5832d3bb0b7e516f20a61af14feb4f1acbdf8b85612033608526c3789,2024-08-15T21:35:07.617000
|
||||
CVE-2024-2533,0,0,6520d041e2b7ba39d1700487d120781106e9a9e9b41da5c3ad12ec52a81a1e5b,2024-05-17T02:38:17.843000
|
||||
CVE-2024-25331,0,0,4f27830f39927c3895bcf33b02286589a44e6189e721c70e2368b6ca05c425b4,2024-08-05T15:35:11.043000
|
||||
@ -247883,7 +247886,7 @@ CVE-2024-26007,0,0,55d7b1fce907ea25befd432aea4727d2b4a2ea48da2392fbb80290b5b9503
|
||||
CVE-2024-26010,0,0,0e2e4323cef6d8344800a888bb1e02076ffd37daaab8c643e84c0ccb4ef637e8,2024-06-13T18:36:45.417000
|
||||
CVE-2024-26015,0,0,eda3ef05e78350dbdf4bafb3ceec1e42a75ece53c103b8d65ceafa697330841d,2024-09-09T16:12:36.640000
|
||||
CVE-2024-26016,0,0,53e5a707ce7137aca290d896e582e8d2a49565424594d76b59ea5a9464cdabc2,2024-02-28T15:15:09.320000
|
||||
CVE-2024-26018,0,1,3b204ab00ea9e5a4e89dbbd72602f66cfac87fb0fd92b5110c31c614c83a90a6,2024-10-31T18:35:08.353000
|
||||
CVE-2024-26018,0,0,3b204ab00ea9e5a4e89dbbd72602f66cfac87fb0fd92b5110c31c614c83a90a6,2024-10-31T18:35:08.353000
|
||||
CVE-2024-26019,0,0,c8f3817ebef24fc08c083645b2146c067190c6ce99f258e914d83a748ccfa09f,2024-04-11T12:47:44.137000
|
||||
CVE-2024-2602,0,0,68545756683921883a71e009514104eaecb0a76db274a20107afd513be41a06e,2024-07-12T16:39:51.080000
|
||||
CVE-2024-26020,0,0,72caf6bcbf6e85532315d41141700a256acdb0b9130ff5b3cf9c47d5b4a216d7,2024-09-11T14:53:51.013000
|
||||
@ -248454,7 +248457,7 @@ CVE-2024-26741,0,0,e3c248718399fd38da7f7e0290c551d82b46ab3d7aa0a320a11762dcc655c
|
||||
CVE-2024-26742,0,0,d7af6623131612fa1c7fd4e052a63ef79bda58184e37bad2d9cdda66dda9e08a,2024-04-03T17:24:18.150000
|
||||
CVE-2024-26743,0,0,324882ef91c0c28f79351ba6298feb9fe20c713336fb2f56a3a9c16ca464e41a,2024-06-25T22:15:21.600000
|
||||
CVE-2024-26744,0,0,f902dd3c251462aa381ae89d57defec93703dfa0c7e8a0c7eb1bbbb723405b07,2024-06-27T12:15:20.400000
|
||||
CVE-2024-26745,0,1,122c004116025bf61ab1b820e4608632aeed8cec5ef7c9fee61ffd6ee6d9d826,2024-10-31T18:35:09.190000
|
||||
CVE-2024-26745,0,0,122c004116025bf61ab1b820e4608632aeed8cec5ef7c9fee61ffd6ee6d9d826,2024-10-31T18:35:09.190000
|
||||
CVE-2024-26746,0,0,503c547cde060b718fd5c822ced0ef17967b19427780440c26d09b063f4a1e1e,2024-04-04T12:48:41.700000
|
||||
CVE-2024-26747,0,0,41706fd8dc5e74253554934fe0898878e3cbaaff07076ca69a602b3caff1d7d4,2024-06-25T22:15:21.727000
|
||||
CVE-2024-26748,0,0,281d1dba5fb38f324f1cb82b7adebdd7a556b7307a202c472b084466cdd8b3ba,2024-06-25T21:15:58.480000
|
||||
@ -248812,7 +248815,7 @@ CVE-2024-27069,0,0,a22027ac3b10d55994fd9ee439f06fab2d3cfb6ef2219ded791dee150a4b9
|
||||
CVE-2024-2707,0,0,85c775d4cadcd703355fe22885699e6d3b33832ba1bf4a0f012eb92a76bd3649,2024-05-17T02:38:26.230000
|
||||
CVE-2024-27070,0,0,9019d5d00e2e557d6bbee725ec44c36e787b905ee46e216a705cd23f704a5b7b,2024-05-01T19:50:25.633000
|
||||
CVE-2024-27071,0,0,4eba7924eed5d4a7c52b628064790bf6088c813be987aa811365f6d878e7223a,2024-05-01T19:50:25.633000
|
||||
CVE-2024-27072,0,1,21e910cf50ea565953242c80b6cde258546166e0d36d0f32695af1f87df3652c,2024-10-31T17:35:03.127000
|
||||
CVE-2024-27072,0,0,21e910cf50ea565953242c80b6cde258546166e0d36d0f32695af1f87df3652c,2024-10-31T17:35:03.127000
|
||||
CVE-2024-27073,0,0,aa56aa24ed3402425b89f05f26a164f223361d7a41c480cd79d50873842fdafb,2024-06-25T23:15:29.397000
|
||||
CVE-2024-27074,0,0,072997e51d8edffff051f12b48b4b43375560402b726f9e882d033665b9beae3,2024-06-27T12:15:24.360000
|
||||
CVE-2024-27075,0,0,c2d1c4caa012ebbe4b9cc25a1abce424572ea3928a347ee6dda4b1356be42ff1,2024-06-27T12:15:24.443000
|
||||
@ -249008,7 +249011,7 @@ CVE-2024-27273,0,0,1883394ce1d8806bd11210fe51eb11ce8dfd12292901a019c597affe48b40
|
||||
CVE-2024-27275,0,0,d9b1bd93ca49fd30306bdac7c9fca8c9103b11d35bbca79555aa44d5c5b40d20,2024-08-03T12:15:16.637000
|
||||
CVE-2024-27277,0,0,f7c03e6067da94f951cda60e6021ff6f9b34cbe0c7b10bf24b9533f86379c99e,2024-03-21T19:47:03.943000
|
||||
CVE-2024-27278,0,0,7e076b94bb346aa71a90c33bb12c519e49b2bf85e0c9c8c5e64524bb6308a9a5,2024-03-06T15:18:08.093000
|
||||
CVE-2024-27279,0,0,25e76b48db9e541084b8b1f041be7e5bed145e75da72a0fa7da4b1fa0a0fcfeb,2024-03-12T12:40:13.500000
|
||||
CVE-2024-27279,0,1,45d9cf9b4657f679bfdecf614626efcef42c4497cc06c2cffcb81cc8aeefa06e,2024-10-31T19:35:03.510000
|
||||
CVE-2024-2728,0,0,894b3321a99e458969cde3c150a59b05eb4a60d79495148d5d2320daac930a32,2024-03-22T15:34:43.663000
|
||||
CVE-2024-27280,0,0,06be16cf339e78f4b79ae71bca9b88fd97cb5e827ebeaaec64aef2e8ba93add4,2024-07-03T01:50:29.333000
|
||||
CVE-2024-27281,0,0,7f2b0f122766f676aed91ef9250b5865f45069fd8c6cab642c57fb3b624ebb3f,2024-08-20T14:35:05.757000
|
||||
@ -249530,7 +249533,7 @@ CVE-2024-2797,0,0,3ecce6a8722880a2243bbe9b30e433c013fbca5e6e5042e5546c00d6fc1c8e
|
||||
CVE-2024-27970,0,0,8fa01250d8db9eeb3b212337b9d1be29c16b8c201ca0f2959158cd129e92a4db,2024-04-11T12:47:44.137000
|
||||
CVE-2024-27971,0,0,4e59811e16516bf26b4f57d974f22c7799182d070eb9cc6b599373a1878a2735,2024-05-17T18:36:05.263000
|
||||
CVE-2024-27972,0,0,e344ab228b851967a3812eb892a2a3bb991b85dd672139f09da75b3b6d47f2b6,2024-04-03T12:38:04.840000
|
||||
CVE-2024-27974,0,1,6b89cdde751f959824cfee213190c11e47af5cb911873e94ab60379407af0911,2024-10-31T18:35:09.403000
|
||||
CVE-2024-27974,0,0,6b89cdde751f959824cfee213190c11e47af5cb911873e94ab60379407af0911,2024-10-31T18:35:09.403000
|
||||
CVE-2024-27975,0,0,628fa6593d5d98fbf43326e7307f982b7a57304446d55cc554f5b8b82b744b9b,2024-07-03T01:51:20.333000
|
||||
CVE-2024-27976,0,0,f6d7730a29882f81108291258e14f13d29a2159cf5abda97fb8b7490244dab5e,2024-07-03T01:51:21.030000
|
||||
CVE-2024-27977,0,0,09cebd1c563d6c711f33424e2c16188d6c5dfd54056f5a0f51dbb6772ec18b17,2024-07-03T01:51:21.727000
|
||||
@ -249793,7 +249796,7 @@ CVE-2024-28294,0,0,78f4f9cea2d4a1ca93d50c609f48582229009802769f67fd7dc526cc547f6
|
||||
CVE-2024-28297,0,0,a4b240f33a30c881b1a926a2c492c4fd59edb741a84b1b986f2bad529bc90472,2024-08-05T12:41:45.957000
|
||||
CVE-2024-28298,0,0,3bc67ac88076195fad9cdc6e8b44ccb13643ba94f3e6354bb8ca3a126daef414,2024-09-11T14:54:30.973000
|
||||
CVE-2024-2830,0,0,8c004c1c8fc1f8388803620250a49c9771d371ad920b272b660e7e2337499741,2024-04-04T12:48:41.700000
|
||||
CVE-2024-28303,0,0,a65712a928f1b4a2335837c36c349f7d018e1f7b9e70b27cb7f99f12d8cf7ee1,2024-03-20T13:00:16.367000
|
||||
CVE-2024-28303,0,1,af4aa568624893c6edae905ba1ab7c2b6062f8fdb400c84636436a5bb0b395f2,2024-10-31T19:35:06.587000
|
||||
CVE-2024-2831,0,0,643c5a916b3e7dd2e502ec8b69ecf4eaeb51af43509d8dd9dee1849a2f658d24,2024-05-02T18:00:37.360000
|
||||
CVE-2024-28318,0,0,f72243df63cfb9dbefaca38a7feaf78eb687b6b96d16642d331d371362d80952,2024-08-29T20:36:35.373000
|
||||
CVE-2024-28319,0,0,e2ecd3b9d2b64cdb4e4a7ac8ae7f5ebb928d0580b7f60b7a323aa1f0897ead1a,2024-08-19T20:35:09.997000
|
||||
@ -249869,7 +249872,7 @@ CVE-2024-2848,0,0,f7b0b78cfc60ee643c1f8f38f0fd87579fa7a84e7f638d990edaa8c649bd1e
|
||||
CVE-2024-2849,0,0,7ddd80bf2dddeeb49b4f7c75b1bb53734965b8214d690d5f80f092578b7cf001,2024-05-17T02:38:33.723000
|
||||
CVE-2024-2850,0,0,aa087e8105e87f804b43529eb18757f7a4acf7dbdd8f4604dc208cac4ea95437,2024-05-17T02:38:33.820000
|
||||
CVE-2024-2851,0,0,5b5b2abe0cec799e0c475c24a1ca157de3540e7eb560494a6cfd6aff8f806a99,2024-05-17T02:38:34.107000
|
||||
CVE-2024-28515,0,1,d06ae9a8ead8315626cdf61b8978f26a9ce985b41fd2a3e04591cf3fbd5fd73d,2024-10-31T18:35:10.233000
|
||||
CVE-2024-28515,0,0,d06ae9a8ead8315626cdf61b8978f26a9ce985b41fd2a3e04591cf3fbd5fd73d,2024-10-31T18:35:10.233000
|
||||
CVE-2024-28519,0,0,8e20e3d590247971a9d8000bfa92fdfdad67e4416371af4c691b0cf99deea50c,2024-08-15T19:35:08.117000
|
||||
CVE-2024-2852,0,0,ce3b26e82372ba3a1ea7a513f638a60f6b521dabbda2b7b15730e3be31569c45,2024-05-17T02:38:34.220000
|
||||
CVE-2024-28520,0,0,0d1f20f1f11c459c615732a3ae08b6276ad3a3ce7691c30492f9301c8f89ba87,2024-08-01T14:35:07.467000
|
||||
@ -253400,7 +253403,7 @@ CVE-2024-33454,0,0,74b0a1930570ffdd0fe139f1c45084400e123a1a6e46097c3427b727b87e1
|
||||
CVE-2024-3346,0,0,5fe2388e7081d85802d7eeef70ad8fdaa632fc14126ef86b4921587d73e76418,2024-06-04T19:20:19.553000
|
||||
CVE-2024-33465,0,0,7dc8798fe71a3f778010ed5d146c9c87c91ee3709364cd2f1c6196073e9c2579,2024-08-01T13:51:59.690000
|
||||
CVE-2024-3347,0,0,9b199e7d34c12b794e3fcb3e483a1e015cb7f912cd5ad3bc6b26d3e5c6f61a14,2024-05-17T02:39:51.303000
|
||||
CVE-2024-33470,0,1,771c577f183751e6420d1c6480af6691c3e4a28f80f7d3d238fdff0f7f6bae54,2024-10-31T18:35:11.050000
|
||||
CVE-2024-33470,0,0,771c577f183751e6420d1c6480af6691c3e4a28f80f7d3d238fdff0f7f6bae54,2024-10-31T18:35:11.050000
|
||||
CVE-2024-33471,0,0,9cda120795d2cb05432987cf2342b219933f08e34a97af932899d7da68c284f6,2024-05-28T12:39:42.673000
|
||||
CVE-2024-3348,0,0,97ca04a7554d65fa257eb4c451e7902d3ec9ae4405cb6edeb14744741600e6d7,2024-05-17T02:39:51.403000
|
||||
CVE-2024-33485,0,0,545a3ddb2c081ca34ecb0c2a68c90fa3f095f3607dce687f15a518e34a732453,2024-07-03T01:58:17.873000
|
||||
@ -253687,7 +253690,7 @@ CVE-2024-33865,0,0,391ace89bfab037aeb96ecc08885288ffa4894e995837787f29e0c72dd461
|
||||
CVE-2024-33866,0,0,d5c0ae9c1054b27c6d97a10401ff0b5290f4f00dd396ff666764314ce3a33269,2024-05-14T19:17:55.627000
|
||||
CVE-2024-33867,0,0,0f6e6b0818e1248c04a728bd3994286d3ee2c473217dff20f3ca244eaa919d7a,2024-07-03T01:59:03.697000
|
||||
CVE-2024-33868,0,0,a040237e401755b6e7cf08ea98d144311aa33b6e7bad9424eb98907745e6b269,2024-09-15T19:35:03.093000
|
||||
CVE-2024-33869,0,1,85f56872fe381951ae3590fbe2dc88998bde5846ab8de98f9d97e4f171cb53af,2024-10-31T18:35:11.883000
|
||||
CVE-2024-33869,0,0,85f56872fe381951ae3590fbe2dc88998bde5846ab8de98f9d97e4f171cb53af,2024-10-31T18:35:11.883000
|
||||
CVE-2024-3387,0,0,5fff34d5a94da2ef9e974ff962e10f544b17f2456fda9d5054eee7f811dd1ba7,2024-04-10T19:49:51.183000
|
||||
CVE-2024-33870,0,0,6aab1c2dce9666081caef7bc83c709784103f6ae03f40bf6f9b61a08ab839221,2024-07-05T12:55:51.367000
|
||||
CVE-2024-33871,0,0,6ef1078e0ab851992d6f76ec41fcc0f1160d67fe72b7159cf03aaec7c63364be,2024-07-08T14:18:32.130000
|
||||
@ -253810,7 +253813,7 @@ CVE-2024-33999,0,0,9ff412930445f4c469385132086f7d2514cfafda5bf0ca410efabaa361c1a
|
||||
CVE-2024-3400,0,0,ac7236e657f4c64879864508ce5e161ec2ccd4c7e837c165c57bf7e10fe0f424,2024-05-29T16:00:24.093000
|
||||
CVE-2024-34000,0,0,fb3f0c7c5c0722f41326f2a505dd1954bc7a0d5fa27bb17709829c52d90f5034,2024-06-03T14:46:24.250000
|
||||
CVE-2024-34001,0,0,f47716837d9d4b12395545e21b0b97bd8f96773591892a37286f525df4cfafaf,2024-07-03T01:59:15.240000
|
||||
CVE-2024-34002,0,1,7d5aad854779b78532969fe54f5cfd243c35b0bc72cafa02f18bbd3a15fadf2f,2024-10-31T18:35:12.750000
|
||||
CVE-2024-34002,0,0,7d5aad854779b78532969fe54f5cfd243c35b0bc72cafa02f18bbd3a15fadf2f,2024-10-31T18:35:12.750000
|
||||
CVE-2024-34003,0,0,90a6a853bacd211ad5804ef76935f128bcaaaf61c4c03698fbfba711ec694089,2024-07-03T01:59:15.440000
|
||||
CVE-2024-34004,0,0,24178f5485fdf0519088f22aa01cad458eacee6bf779a59579fc437dca127b5c,2024-06-03T14:46:24.250000
|
||||
CVE-2024-34005,0,0,3cc41e8d5cf47efd2659de94be11f3633627e887af28aa45c65ebef356741180,2024-08-01T13:52:13.690000
|
||||
@ -254205,7 +254208,7 @@ CVE-2024-34532,0,0,dcb761bea457268d59c0be9416083baced4fef01729f53184cc4673fe1957
|
||||
CVE-2024-34533,0,0,8566d0e8dbd9cd4017bd3a534ac0fd9822a90bf76d2b3f6401a871fd79682bfc,2024-07-03T02:00:33.137000
|
||||
CVE-2024-34534,0,0,bc0f446d96fd1bff04cb40a3d47d7cedb5384511135e58f39b13d3fecfe87cc4,2024-07-03T02:00:34.370000
|
||||
CVE-2024-34535,0,0,83aae08bc421f9eef8621f242b24214806a581d0b260711ffa707015c3215f8f,2024-10-04T13:50:43.727000
|
||||
CVE-2024-34537,0,1,aa8d887b54254363340bc9478cf814aad60caefe8559038d897113fab5bc7ce3,2024-10-31T17:15:12.903000
|
||||
CVE-2024-34537,0,0,aa8d887b54254363340bc9478cf814aad60caefe8559038d897113fab5bc7ce3,2024-10-31T17:15:12.903000
|
||||
CVE-2024-34538,0,0,feba2430cb16511882082bb58c8b82ea01c0b09af4d84fa976b42058411470a6,2024-07-03T02:00:35.197000
|
||||
CVE-2024-34539,0,0,9ef63927e8927d2fb2816c186d7e6407d6365bb9385ba11a715c86bc1697a83f,2024-07-03T02:00:36.057000
|
||||
CVE-2024-3454,0,0,f566b799730d97b5188e88dce61422723578c42a47e0d20db27696cb277428f1,2024-09-10T15:40:28.457000
|
||||
@ -255193,7 +255196,7 @@ CVE-2024-35916,0,0,2804419c9273825473495dd74a79a9135bb83063013a6adcfc0c986f1e68a
|
||||
CVE-2024-35917,0,0,ef28657905524f9b7f229abe3cf11569c21934c08ac9147215aa72d97ba1ce78,2024-05-20T13:00:04.957000
|
||||
CVE-2024-35918,0,0,b84a4a8eaff0e9aa0772539706471f0485db8b7ae1e504faf03291dd1bedbcb8,2024-07-30T05:15:09.763000
|
||||
CVE-2024-35919,0,0,1e1ce71ee56e5a8256ab06fb6ff47a0c0719c60214f9cbd9c98efbe37f1c4237,2024-10-31T14:35:15.330000
|
||||
CVE-2024-3592,0,0,06f19b0f4030aa5db1e2c8d8139272dad226c0945ae251432ae728d2bb8e4467,2024-06-07T14:56:05.647000
|
||||
CVE-2024-3592,0,1,a467a0becb7a7c1893912c4a012a5ba189ea79070fd21967dce0459666c03be8,2024-10-31T19:40:34.747000
|
||||
CVE-2024-35920,0,0,e038127788e84b65006b7bac3b3d638e07acf776aced57ca59ab8396cc9131a0,2024-05-20T13:00:04.957000
|
||||
CVE-2024-35921,0,0,86f3f43aed64babe95e54be060b922943333fbafaebdf08ad2eaefa3d9aa11af,2024-05-20T13:00:04.957000
|
||||
CVE-2024-35922,0,0,a3848c52df3a62f38c8911dc80247747492d0166db32c357f2fbfaf1c915f7b2,2024-06-27T12:15:26.323000
|
||||
@ -255269,7 +255272,7 @@ CVE-2024-35985,0,0,6a0ec59d3e51fdf53bb1ddc338ad85428352a8c3d8fca537814e3edb294fd
|
||||
CVE-2024-35986,0,0,233bf34b93f6b6b3cb174407b52ced003b0cd3d3120afc7209f6ec63dacd4e33,2024-10-29T20:35:23.230000
|
||||
CVE-2024-35987,0,0,6cfebc44336088901ce4a0eaab623f6c781664328e18b6c07774b9d25b96510a,2024-05-20T13:00:04.957000
|
||||
CVE-2024-35988,0,0,9e4aa3541b4f8c9746b0897daa431b666a7015d508272fc87df5f96bb5f44395,2024-06-25T23:15:31.573000
|
||||
CVE-2024-35989,0,1,e4a6f65f2b8a28629768c5c72c5f7751ef9aa532d3cf28f68cbe11794178c21b,2024-10-31T18:35:12.980000
|
||||
CVE-2024-35989,0,0,e4a6f65f2b8a28629768c5c72c5f7751ef9aa532d3cf28f68cbe11794178c21b,2024-10-31T18:35:12.980000
|
||||
CVE-2024-3599,0,0,6f9a87b43db25a2abff9773940ab4f1d2aba1d6b675d22095616527a9cc731b0,2024-05-02T18:00:37.360000
|
||||
CVE-2024-35990,0,0,cf5bd99b0200a582d3ca9c6976894c42986b8f909be16ec7492dbf916bda46ba,2024-06-25T22:15:34.330000
|
||||
CVE-2024-35991,0,0,95c2d74b3c18b9eb777211ce3882aff6b10bc936ddb3cc6ba231cd94286d1648,2024-05-20T13:00:04.957000
|
||||
@ -256080,7 +256083,7 @@ CVE-2024-37159,0,0,29983f96449420557db1b3112a95ba2589dbf1f20f2491176bacc2d05dea9
|
||||
CVE-2024-3716,0,0,645c39d852b6d0900252700ce7c6aa7da7b0e8e8528414b76049b939646330f6,2024-06-18T18:53:28.927000
|
||||
CVE-2024-37160,0,0,244bd54ee6562bb7c87780ac681fb6725c85e3313649f8ee9d22f3f6a28cc85a,2024-06-11T18:22:50.097000
|
||||
CVE-2024-37161,0,0,2a94f421c449e5230ce5f6bf577049502e74931a566a6f5900713655d6199d0d,2024-06-13T18:36:45.417000
|
||||
CVE-2024-37162,0,0,322a3e89c574071625f48e86e0af7a8ea0c5c421b1ad849d66b531a5ef4a0395,2024-06-07T19:24:09.243000
|
||||
CVE-2024-37162,0,1,d187b793c58199cbc2898a7a072f3ac3c5ef9e78e8300197de9218f7bf28c884,2024-10-31T19:43:26.800000
|
||||
CVE-2024-37163,0,0,e299ba511d4c0e736a670743e9375ac75a6321837800583d9d327792c0552ded,2024-06-07T19:24:09.243000
|
||||
CVE-2024-37164,0,0,9bb663a219137e8dd0a97eda1376d9c5548e255ee1c6292d4793648cf6ed6f5f,2024-06-13T18:35:19.777000
|
||||
CVE-2024-37165,0,0,6480a9385974854bcbb243b4e0731864b039fe2224efee48b2a5f08ca4ebe426,2024-09-11T13:52:20.730000
|
||||
@ -256462,7 +256465,7 @@ CVE-2024-3775,0,0,b7d2a473bac9537035a8d6df6a365ee3b93ba49aa9ce7163db0aba168893a5
|
||||
CVE-2024-37759,0,0,fcc8ead5df9d431db40c232755b8d406131bfe6bf2637fa79e9581b47deb8f46,2024-07-03T02:04:41.510000
|
||||
CVE-2024-3776,0,0,5922bebf01d008693e127ff3a5039fdad8dc9d22a230cf3268767563dfe95a49,2024-04-15T13:15:31.997000
|
||||
CVE-2024-37762,0,0,cd5f303513eb0960063d0e2c99c901a56ff1296cae29c33693c5d7fa45ee86e8,2024-07-09T16:22:43.123000
|
||||
CVE-2024-37763,0,1,c5847d0bf810662fadf186aeecdc436730aa2d2ec83ee9913c6e6a93f68b6126,2024-10-31T18:35:13.207000
|
||||
CVE-2024-37763,0,0,c5847d0bf810662fadf186aeecdc436730aa2d2ec83ee9913c6e6a93f68b6126,2024-10-31T18:35:13.207000
|
||||
CVE-2024-37764,0,0,bfe8048822739aebe754250a3774cdfd451761171493fc8c02a0e45a49f5a4e6,2024-07-03T02:04:42.317000
|
||||
CVE-2024-37765,0,0,746df602d2e258f449976f05b63742f035e40ff54b364ebcd32658a0b67b7135,2024-08-01T13:54:14.823000
|
||||
CVE-2024-37767,0,0,7877c2515670214a904346d470123e251242a9f2784362e3de48ee06ec75e5c5,2024-07-08T15:49:22.437000
|
||||
@ -257580,6 +257583,7 @@ CVE-2024-39329,0,0,5aa2655955d12cfc04b5cd596dd516d231115449b8be168ee40469f865a39
|
||||
CVE-2024-3933,0,0,92b73bce365e98fcc06e62daf24ff5ae07fa4b0e34a70b4d4c68931454994bbe,2024-05-28T12:39:28.377000
|
||||
CVE-2024-39330,0,0,df282f57bb00a86772e9e77e51a445a51be95fedbc3011c51977bbb06b0f309e,2024-07-11T13:05:54.930000
|
||||
CVE-2024-39331,0,0,e27921e016dec51173f86ad420de9e9174de4baa540da3f53e6e1157ef72adc9,2024-07-03T02:05:47.260000
|
||||
CVE-2024-39332,1,1,02c815ccdcead4ab9a75b85b431c56edd6baeae5a003187d7f3998feda147758,2024-10-31T19:15:12.897000
|
||||
CVE-2024-39334,0,0,94cae5ba65ec50bed6d17b2b54650000947aeee42b8249838d1ebdc24642a191,2024-06-24T12:57:36.513000
|
||||
CVE-2024-39337,0,0,ae96e6e5658ac679eff4c9acfa518814cd5ee8874dd941939a565173aee28094,2024-06-24T12:57:36.513000
|
||||
CVE-2024-39338,0,0,224e3a3c09358e014697d42ae118e958b11cd83a92fda65e581c38eeeb8c28af,2024-08-23T18:35:36.313000
|
||||
@ -257926,7 +257930,11 @@ CVE-2024-39714,0,0,4056f55d0df430f8323fee2d9091569bd1a5c6627633d4c031ced4b047459
|
||||
CVE-2024-39715,0,0,15f33b0904bec8d29ab0aa789fb7bca5f17b446aa8a06884e3c4dec4fda56438,2024-09-09T16:35:04.780000
|
||||
CVE-2024-39717,0,0,5c727700f5fb9ffcdff7d74de82f8cc7669d0dbb9bbb395cb4e4ef77f2b2701c,2024-08-28T19:47:25.410000
|
||||
CVE-2024-39718,0,0,116d4c704ecdda3f39d6049d166eceb718bb7e8447d879858815362938f8cf09,2024-09-09T13:03:38.303000
|
||||
CVE-2024-39719,1,1,55c0fe4231ea450fd9f9bd61b34566b93becc23a462714378436cabf84a325c3,2024-10-31T20:15:04.770000
|
||||
CVE-2024-3972,0,0,0caddd7b34d493c3554c875afe72275890f23d83038241874e85ef811a9076b6,2024-08-01T13:56:47.637000
|
||||
CVE-2024-39720,1,1,5d12fc2ee7e4d9b3dc0b31df402e7f9ab521670e316e8f3b2d06befa43297f5c,2024-10-31T20:15:04.877000
|
||||
CVE-2024-39721,1,1,21c376a4118d478bd951a487fcc6c37edc42d010d1757ffc540bbeeccc034e6b,2024-10-31T20:15:04.993000
|
||||
CVE-2024-39722,1,1,fa0eccacaad1353a36670c74071a2f5eaaad1233da2ab863fd98dc8f49b574fe,2024-10-31T20:15:05.080000
|
||||
CVE-2024-39723,0,0,003097d794792a3e1194202f71608927b35e402887d5f5ddf07d35b5dd183916,2024-07-11T14:54:10.243000
|
||||
CVE-2024-39728,0,0,fba26233ce0c4692619efffa132c45bfb836485ad2132e6f2e6d7ce0ec6f97d0,2024-07-16T13:57:37.203000
|
||||
CVE-2024-39729,0,0,bfb0ee29aaef980e2b91ef648868f4c0e36729a7e019c3fc9d2073fdf0f8ba3f,2024-07-16T14:02:53.577000
|
||||
@ -258194,7 +258202,7 @@ CVE-2024-4045,0,0,2ae0d8f233b2cc7f6d27d9d81b74b74fd6cc2876f88a425dbeb60d35e4802b
|
||||
CVE-2024-40453,0,0,4483c5209dc00972ed35087fa7a57143bcc3f4e4c2aa05f9c16e6199d4acac45,2024-08-23T17:35:05.463000
|
||||
CVE-2024-40455,0,0,2b4af03841b1088e106e2c8470bdfc3454c77a8d4b576f687e8da463b4385ab7,2024-08-01T13:57:29.287000
|
||||
CVE-2024-40456,0,0,f1acaf3e46ce38cdd4b72320186132bab37cc38f6f4c796e31eaece0545a5e4c,2024-08-01T13:57:29.487000
|
||||
CVE-2024-40457,0,0,c48d41bd96fb4d23a817f2df64b770558b35704c52871238cdfde186fa28f2e5,2024-10-24T17:35:07.660000
|
||||
CVE-2024-40457,0,1,cf5d2fb5573b78b24a73103f4faaeb1de1b6bbe985b93c5ecbdd9bf464b5504d,2024-10-31T20:15:05.173000
|
||||
CVE-2024-4046,0,0,b162bb54ae31ac06a54238ce430265f513a39f78ee0aa36d5d6ff941168dcdb1,2024-05-14T16:11:39.510000
|
||||
CVE-2024-40464,0,0,566a84364894c87cd293e303f1f3b91278da64a57babcc563f0c2d0eca7b55aa,2024-08-15T13:02:33
|
||||
CVE-2024-40465,0,0,d1f805e9dd9512e63091b4cd71cf57cffa5f52934bb1bfd71a75623426707138,2024-08-15T13:11:07.570000
|
||||
@ -258323,8 +258331,8 @@ CVE-2024-4066,0,0,5674d1317b0a03adb324e31f70d35a87031f26ca2ea2869349483359d081bd
|
||||
CVE-2024-40662,0,0,158da2f06a1d27615161cee7fe7341ef1e87f2062801f47e3e4f4b1d6a1663ec,2024-09-11T16:26:11.920000
|
||||
CVE-2024-4067,0,0,cb2492818fe81f39be6108b3726f1fbc34af211b5be3405ee7a17904cdbd58f2,2024-08-28T00:15:04.130000
|
||||
CVE-2024-4068,0,0,bb45b0f3c24ec800e9c86d4119a908807b555886bbc03073bf2175c668679f63,2024-07-03T02:07:03.943000
|
||||
CVE-2024-40680,0,1,6a7d82455fef21e03a575dce9fc7ae88a549fdf8ecdf4b4bb72b8cebe35b53d9,2024-10-31T17:15:12.990000
|
||||
CVE-2024-40681,0,1,fac9532bdd8d5b6d1b1f49e08b67a17d3abcf6f9f6c80d971ff62d66179abc1a,2024-10-31T17:15:13.143000
|
||||
CVE-2024-40680,0,0,6a7d82455fef21e03a575dce9fc7ae88a549fdf8ecdf4b4bb72b8cebe35b53d9,2024-10-31T17:15:12.990000
|
||||
CVE-2024-40681,0,0,fac9532bdd8d5b6d1b1f49e08b67a17d3abcf6f9f6c80d971ff62d66179abc1a,2024-10-31T17:15:13.143000
|
||||
CVE-2024-40689,0,0,d72047a797aad87fd24dc95664d6dde0e77455bde7da3b63cb978ce1844a86ec,2024-10-19T00:30:36.680000
|
||||
CVE-2024-4069,0,0,fc5a2986d6746eec6d2dc8871a19fd31bd3dae122b27ac5ac325372fce08edbe,2024-06-04T19:20:29.457000
|
||||
CVE-2024-40690,0,0,90531c3f5bf2655a59eec8750bd49d0d616cedd303a52fde5af4cabda07abfea,2024-09-10T16:16:41.940000
|
||||
@ -259652,6 +259660,7 @@ CVE-2024-42507,0,0,b57055df85850f2ee370e2a3273bd68424b888342bc78e94d00bb50912492
|
||||
CVE-2024-42508,0,0,2c3ef74dc61a212f49afeae18d3d774e8682eccbc5f7d8b0e3beb27e142f7cd6,2024-10-29T17:38:49.330000
|
||||
CVE-2024-4251,0,0,4911c8bef2a1e60ace7e3694403733ed66cd48ed80870211c4240e0e24584389,2024-06-04T19:20:34.297000
|
||||
CVE-2024-42514,0,0,a1f5f6b924755707c5bb385a67dc5d2ee260ba09c0f77899dd6a3e1d47eee9c5,2024-10-07T19:37:19.973000
|
||||
CVE-2024-42515,1,1,d9febc8d36f1e0fec5b8c3628e4df89ea40dc83420c169fad7a81aebf15f35af,2024-10-31T19:15:12.983000
|
||||
CVE-2024-4252,0,0,9237a844d9d9b4c175441eb52c39ce07fc14167f47531df4616e5c1079e2e93b,2024-05-17T02:40:21.053000
|
||||
CVE-2024-42520,0,0,64dffe6569e4f4099d9df2249ffa95a5cd3b2fdfe3c5c543c43632b62f26d14c,2024-08-13T15:35:16.110000
|
||||
CVE-2024-42523,0,0,e7f13531824456b37c381b164195bec4f01c74ddaa27da31139f6cf4c536fef0,2024-08-23T18:35:03.563000
|
||||
@ -259835,7 +259844,7 @@ CVE-2024-42816,0,0,8dd1ae8820cfa39b8949229a5b0a0fd0a511af977924a1929a9dcb8553f95
|
||||
CVE-2024-42818,0,0,694f268c461684854315b7e46e53659be0c6525c36cb73fb82a2ea42f888fdd3,2024-08-26T19:10:18.890000
|
||||
CVE-2024-4283,0,0,0b01382e91d2d3830bdcadad6ff16c4cbf45d62064e6424171f058dd71657988,2024-09-24T16:51:23.193000
|
||||
CVE-2024-42831,0,0,81c8fba77a06683f68ef3418776fd6a90738b17ea781218e5200d9ee57eaad3f,2024-10-10T12:57:21.987000
|
||||
CVE-2024-42835,0,0,be8a15032d8b7e2767c06844b2c610cc3d4f02c091e6e878f9c0ddb188a4332c,2024-10-31T14:15:05.610000
|
||||
CVE-2024-42835,0,1,62c3bb1040503fe108596a1c1ad34679c80451382f26381de785bebf9971f9b2,2024-10-31T19:35:08.113000
|
||||
CVE-2024-4284,0,0,4fbe27a80563712e41b6422ac48754a31c657da862cab89b959335ecaf13d90e,2024-05-20T13:00:04.957000
|
||||
CVE-2024-42843,0,0,147a94e278dd08ceb9ff0b00f505eb868d7a1e59c01ddecc9d1420e344e9ec86,2024-08-19T19:35:09.180000
|
||||
CVE-2024-42845,0,0,f506b40591f84fe588a1ebf10f79903d4e58b530d7a712a8d7ac529b24aba892,2024-08-28T16:35:23.650000
|
||||
@ -259866,7 +259875,7 @@ CVE-2024-42919,0,0,9d550152ff2dbb619a2352d654d17d8b55fb6100bbcd2b5aebd58ed74198a
|
||||
CVE-2024-4292,0,0,3da8afef6eac3f0e74c17cae2760dab77b8f6d77627214b0783fc9bf5f2f59b0,2024-06-04T19:20:35.097000
|
||||
CVE-2024-4293,0,0,32ea35cbc5ba91cf83ff71be9c2b19347dd1b3b0949ec88573415a66fabe3aec,2024-06-04T19:20:35.203000
|
||||
CVE-2024-42930,0,0,784a232fe23e7bbafc9832760208fa74cd8fc994e46ea9d1216f27649a38c7a5,2024-10-30T21:35:04.850000
|
||||
CVE-2024-42934,0,0,5b485bf0fdf98b0bf0cffd2e2fdf9041db2ed703f1341f5eedd90fef284d1734,2024-10-10T12:51:56.987000
|
||||
CVE-2024-42934,0,1,cce541bdc57df7c6b631cc18206bacac2c59fa39a67506fa82352f8df4b8ac0e,2024-10-31T20:35:05.250000
|
||||
CVE-2024-42939,0,0,de039fed771097613977a1859b988b285b10e3afaa2ac25fdead7645e1c3a33c,2024-08-31T02:58:34.660000
|
||||
CVE-2024-4294,0,0,0a6adde2b8f93d4c8d3c3070f48f62e5ef1709fd02553117d08b35488342d14f,2024-06-04T19:20:35.300000
|
||||
CVE-2024-42940,0,0,460809cfcb551dcde52417163d4e7b810c2b7db0714b9f924b6035176c36051d,2024-09-03T19:35:15.163000
|
||||
@ -260947,7 +260956,7 @@ CVE-2024-44674,0,0,78532ab5feb22da158d1ca77bfa4a9481318fd90b7728fb7942741a2fe563
|
||||
CVE-2024-44676,0,0,b0f0617031a60967a8b797cadadb8c5f870cf4ed39d40d10e892a55bec1fea8b,2024-09-25T19:20:25.073000
|
||||
CVE-2024-44677,0,0,b3010270d0be534cbe0fd14032547bfe302a60106c2515252734805cedbdf65e,2024-09-25T19:19:24.007000
|
||||
CVE-2024-44678,0,0,6e57560ccb7f7726a96b187fa0940b079eab34be5f5aa788f0964af3dd2ca471,2024-09-26T14:35:14.687000
|
||||
CVE-2024-4468,0,1,23515c86973ba697e8140aba7b457c632f3ea3f82a64c6f661f01b74003b55b7,2024-10-31T18:40:45.817000
|
||||
CVE-2024-4468,0,0,23515c86973ba697e8140aba7b457c632f3ea3f82a64c6f661f01b74003b55b7,2024-10-31T18:40:45.817000
|
||||
CVE-2024-44682,0,0,5c1099c9946a7bbad39157bc8cb36499b7070c93884284356ba775c02b16ef60,2024-09-04T16:38:36.817000
|
||||
CVE-2024-44683,0,0,3331119c07881f90997c72dc65301a112931dc9af3d318f7996e768fd590a104,2024-09-04T16:41:01.467000
|
||||
CVE-2024-44684,0,0,3eb9301d11d089b3ca5e5bb482a6ce2aed822a3ab4934c267af6f311a660b8c1,2024-09-04T16:42:01.137000
|
||||
@ -261255,7 +261264,7 @@ CVE-2024-45159,0,0,315bbe3853593d217ddbcd9fba2e9d9003cbd4c00b52b441be6179268e6c4
|
||||
CVE-2024-4516,0,0,7413b58d03a0a8938a8f9c3b85a26b19cfb41e2c50a00216b0df80496b4b87e3,2024-06-04T19:20:40.930000
|
||||
CVE-2024-45160,0,0,5448512f93e2c872a5532bb6e7925e6443ae5601b38aa00ad59c4de27ffce9e0,2024-10-10T12:51:56.987000
|
||||
CVE-2024-45163,0,0,d1b8d71b55c9c05a6535a6d473b973daf564bdfb091297232be0a5c5759d6390,2024-08-22T15:35:12.750000
|
||||
CVE-2024-45165,0,0,b001eacfea75d370a82a50b82205930e70aa975a85c81e49480bf2cbd2fdd05a,2024-08-22T12:48:02.790000
|
||||
CVE-2024-45165,0,1,c95c37e8403c42b6535ee3db172ebed1de2af8ddabba72579971a9771877b8f5,2024-10-31T19:35:08.327000
|
||||
CVE-2024-45166,0,0,a776bd2559e4bed9a84a577a682c1ac93ea07fab716da8fcb660f8b43cc91ea2,2024-08-22T14:35:13.183000
|
||||
CVE-2024-45167,0,0,6f3847a892b75be18a24e1374ef352424a8d56284d9550373f08d0a52ea49aa9,2024-08-22T20:35:24.417000
|
||||
CVE-2024-45168,0,0,6124dea0f408bc63748f989f7ce4cf06d1deb9da69f42ab4bdcfa64b8daa0ab1,2024-08-22T14:35:13.957000
|
||||
@ -261861,7 +261870,7 @@ CVE-2024-4651,0,0,745218d04b1207995e3df340bed9abda2dd0952b7a1b22fcaaa17a8ad8b7b0
|
||||
CVE-2024-46510,0,0,bb46a7737029f26392a246097a18ec9ca317101031432da9b686fbbec181f9e7,2024-10-04T13:51:25.567000
|
||||
CVE-2024-46511,0,0,78cf785de24718da0c0ea71257e191470c834e4be61ca79ad4d72c264c3c4729,2024-10-04T13:51:25.567000
|
||||
CVE-2024-4652,0,0,8fd7af949b4c89aa1e5f9f8bc7784e47292323116a1f6a56ecb880f3c410a541,2024-06-04T19:20:44.873000
|
||||
CVE-2024-46528,0,1,4d04b74cf43234afd60aee245e40ab967d12ed0a23a16922ce62a9e56a7cfb68,2024-10-31T17:15:13.250000
|
||||
CVE-2024-46528,0,0,4d04b74cf43234afd60aee245e40ab967d12ed0a23a16922ce62a9e56a7cfb68,2024-10-31T17:15:13.250000
|
||||
CVE-2024-4653,0,0,7b6d5c0913690c5b51d844fc9718b4208eaa5f352f244fd41eee7be1add5e3bc,2024-06-04T19:20:44.990000
|
||||
CVE-2024-46531,0,0,878a7e01df4c686cd7cdf931908bd2db34d00b16932fa7e72aa7bf69654762d4,2024-10-31T16:35:16.453000
|
||||
CVE-2024-46532,0,0,28e90e41b88b199c93bd44748203fc4edc0b214d52c53df9729e48aaafb51060,2024-10-16T18:35:05.480000
|
||||
@ -261870,7 +261879,7 @@ CVE-2024-46538,0,0,dfc9741b1ceb0c2e645ed8952810cc1343c34577d0526c0ae91f23ea6649c
|
||||
CVE-2024-46539,0,0,2d2c57643421ecf3202df41ca86f61b87e91435ec045a273724c1fd7bed0cf14,2024-10-10T12:56:30.817000
|
||||
CVE-2024-4654,0,0,0088d34096b2578204ff98fe71c1f702e4c8866653411407f72fe940a56448df,2024-06-04T19:20:45.100000
|
||||
CVE-2024-46540,0,0,82bd73e280c5a23d3b35406dd5a042ddc542cc53d99831f15d05d7d862ed5067,2024-10-04T13:51:25.567000
|
||||
CVE-2024-46544,0,0,7c690592f3c3aad53f638c9c118a2efde53f0542c00b3644e612a6801f3cf547,2024-09-26T13:32:55.343000
|
||||
CVE-2024-46544,0,1,b18ab032b67182bdfd9cf5b4990f62b6cf345d5567b676ce2f4c2b86a93274c5,2024-10-31T20:35:06.390000
|
||||
CVE-2024-46548,0,0,a76db6350fd9cf17eb17ea692a21b280803fa9cd2f4c425127b2376fbb1ea301,2024-10-04T13:51:25.567000
|
||||
CVE-2024-46549,0,0,a58dc99fbe7a6733f6bee128f5732a51ff2defe2296e61fdd35f50a9a237365d,2024-10-04T13:51:25.567000
|
||||
CVE-2024-4655,0,0,95970f39f135367edf16c40c69bbdd98999f38726ef0802da749dedbafaa6dbb,2024-08-01T13:59:32.490000
|
||||
@ -261919,7 +261928,7 @@ CVE-2024-46605,0,0,cd741604be9f1b11329c686e775aac657866e26a3c66d9c2707d0c286f14f
|
||||
CVE-2024-46606,0,0,8a59186f6e37a35a98df2212faf251342d973be335e26a6de0511db920fb3694,2024-10-18T12:53:04.627000
|
||||
CVE-2024-46607,0,0,19b52a4f221a81e7b0e70e694b13b9c3dc0a4fb6554fee97e54b7afadc8502a3,2024-09-26T13:32:02.803000
|
||||
CVE-2024-46609,0,0,867378c24ca26a245e4713a4ba27c2af9d0d9faadf75c67789542038576759bd,2024-09-27T16:35:03.627000
|
||||
CVE-2024-4661,0,1,c3df946503e9b828d76c6d82332cda3e4be930bda3f80537afbf8f2ae2d7bc25,2024-10-31T18:21:43.683000
|
||||
CVE-2024-4661,0,0,c3df946503e9b828d76c6d82332cda3e4be930bda3f80537afbf8f2ae2d7bc25,2024-10-31T18:21:43.683000
|
||||
CVE-2024-46610,0,0,dfd11b66ad880194d4e8759fea756317b6075d327e3519259cd11f18ae0f4b82,2024-09-30T16:30:50.833000
|
||||
CVE-2024-46612,0,0,a589f709811c7445ac7df28a3a7782b0e1ab03ae28a72339e484d8d02cc7d048,2024-09-26T13:32:02.803000
|
||||
CVE-2024-4662,0,0,42d3ec88d759fc9bf88fc92972e0c9891830916b90a0cdbb0331ad5486f420dd,2024-05-24T01:15:30.977000
|
||||
@ -262605,7 +262614,7 @@ CVE-2024-47637,0,0,e4b543420eae93f2afe4e99f554aa703bb23d396109484c61c62fa5d0986a
|
||||
CVE-2024-47638,0,0,f0c22183891875150f00de26c51ae04bc878b43d7b02fc8f2c1801fe764630f5,2024-10-07T17:47:48.410000
|
||||
CVE-2024-47639,0,0,4ec7325cbe24ae0ca33ddb45827142885ef58b3113bb6ddb4d5e479f788b21cb,2024-10-07T17:47:48.410000
|
||||
CVE-2024-4764,0,0,d4513c07467374a5b389bb93120fcb2ac353ef34ecf409f85646dd7a83574a17,2024-07-03T02:08:04.193000
|
||||
CVE-2024-47640,0,1,a1e01ed5a492a5aded34eda294dc6bd58a5227b3728268dbd61f0874f5c8395b,2024-10-31T17:39:28.907000
|
||||
CVE-2024-47640,0,0,a1e01ed5a492a5aded34eda294dc6bd58a5227b3728268dbd61f0874f5c8395b,2024-10-31T17:39:28.907000
|
||||
CVE-2024-47641,0,0,20121fa3c4c5a3e4a909974f90b64e2e442d0d40e7dbc52d4d9a68852218f553,2024-10-04T13:51:25.567000
|
||||
CVE-2024-47642,0,0,e0dd8bf4e7cdbede3134dd86ccb7de1e590ba6182abfb8f96b44dafe6cbb1c08,2024-10-07T17:47:48.410000
|
||||
CVE-2024-47643,0,0,8a3ec59bba07c503924b1001c49d13f876ea3327bd5600be5208638f48d0f661,2024-10-07T17:47:48.410000
|
||||
@ -262937,12 +262946,13 @@ CVE-2024-48192,0,0,50ca3857fa6f25fe2966bfab9679a90bf80eec0b1a66f64f4eaab1d030168
|
||||
CVE-2024-48195,0,0,624eed9854f46ef9dafc813bcbfebca0bf2ab48de4eb64a4aa5f0a1ddeec9a89,2024-10-30T18:35:14.433000
|
||||
CVE-2024-48196,0,0,06085a08add8a4f4e1622d4b148953be486d5c8e3772fc9fb5febed91d95829e,2024-10-30T18:35:15.220000
|
||||
CVE-2024-4820,0,0,832738c431d4032e72cf5367ea2c2310b7c6cd840d9bc0fc3f10b9e1f0e05ed2,2024-06-04T19:20:51.710000
|
||||
CVE-2024-48200,1,1,d522cdb51427320f6247dedfc0f6e6c39b657ec64c121a0c5e19815e9e23a09f,2024-10-31T19:15:13.150000
|
||||
CVE-2024-48202,0,0,6a991d4260ecb620082a50303e3e09368ecc201c8b57a4ee048562622acb1335,2024-10-31T15:35:38.390000
|
||||
CVE-2024-48204,0,0,69679e584cfff362cbf75841399d234bf7f34f17f0a6df889a2bd0d1f27ec83d,2024-10-28T13:58:09.230000
|
||||
CVE-2024-48206,0,0,6817b9ae5feb72d446c529ddcda9c3a6e3777ee388634567e44646cfb7309cbb,2024-10-30T15:35:19.677000
|
||||
CVE-2024-48208,0,0,4cb069f7302b809408534c2d4d84e19f7a8371042576c478cf8a47f5a05c9a1b,2024-10-28T19:35:28.037000
|
||||
CVE-2024-4821,0,0,dc7d4132f68a39a1fe6c6bac80c0ac3156e2e90bf5e433ad24749311cb9093af,2024-06-11T17:29:33.213000
|
||||
CVE-2024-48213,0,1,5f8713bffe18994daa14febc6bb0ad9b0b79a213338e08da6c4d569a2dd47e80,2024-10-31T18:35:14.040000
|
||||
CVE-2024-48213,0,0,5f8713bffe18994daa14febc6bb0ad9b0b79a213338e08da6c4d569a2dd47e80,2024-10-31T18:35:14.040000
|
||||
CVE-2024-48214,0,0,78cdef8b5cf77a590137f1180c767a14d73d8882d8f7bf7b4722d04546484757,2024-10-31T16:35:17.260000
|
||||
CVE-2024-48218,0,0,4b803b4002b5edc5abb8b754e173e0e42c64b19814d1d2b7448b5a518c468f92,2024-10-31T15:44:18.777000
|
||||
CVE-2024-4822,0,0,35737e7a1acb373d4b9b0a7db2a81b8ded4d641f08c88a2e676b684417908472,2024-05-14T16:11:39.510000
|
||||
@ -262984,14 +262994,16 @@ CVE-2024-48280,0,0,3fccbb43adc0eac89fff4a77fa6463e9ab8591cb5e7aecf8a80efbe6484b9
|
||||
CVE-2024-48282,0,0,053fa49ae9967fbc35cea64fb50742395541b443f63ba6361e4836107ed1b694,2024-10-16T16:38:43.170000
|
||||
CVE-2024-48283,0,0,c5c95d36f4cc9b3b4716d94f26715484ab471510ba26541a1f3c47bce371907e,2024-10-16T16:38:43.170000
|
||||
CVE-2024-48291,0,0,3c4533b920a9f2edb3f01b1757898b30516db1528ffb114ee1df5dcc338084ea,2024-10-29T14:34:50.257000
|
||||
CVE-2024-48307,0,0,df3a00e7bacafe2786ff0786147fc98c044a5f54c62a06ecd6885c5296cde834,2024-10-31T01:15:14.803000
|
||||
CVE-2024-48307,0,1,81ecd37001e0e72c6ea88f5f6ed123050a0306524d9298167287539fbf37725b,2024-10-31T19:35:09.203000
|
||||
CVE-2024-48311,0,0,d7c0370dd0b10cfc270efb9e368b85a66e3d825eb9e86a9a918e49a33499f4e2,2024-10-31T16:35:19.993000
|
||||
CVE-2024-48343,0,0,6b50c2f4f6b1096ee0c17db257557835a9194bfca6ac184c217bfb38c59667b0,2024-10-29T19:35:23.657000
|
||||
CVE-2024-48346,0,0,e9ae7cc0b0e1a356f05a97d8deeb8d9dc84f4c9c61fc4af7c52397b9719f02d9,2024-10-30T21:15:14.450000
|
||||
CVE-2024-48346,0,1,685dc3b8b4a0617d3bba24133a1b9cfcfa941dbeb1368f1bd1acdbd1ea270b87,2024-10-31T19:35:10.023000
|
||||
CVE-2024-4835,0,0,b63c1e2c2f2232a6ba415444f30303ee4e5ea1a45d737d79b2133d2755ec709c,2024-05-24T01:15:30.977000
|
||||
CVE-2024-48356,0,0,d61948bf2095cc3d150baaa31fe05023f5cd4e2dab12daf4f3dc83771432fb5f,2024-10-30T17:35:12.420000
|
||||
CVE-2024-48357,0,0,dba1c026ce12a35ee6a885944cea646b76fb79069c0e7307a1deb45a88532ca1,2024-10-30T17:35:13.203000
|
||||
CVE-2024-48359,1,1,f826addd6d537acf42a92e0cbf0efa9eb4e62d83f789d88f644862fda35249dd,2024-10-31T20:15:05.340000
|
||||
CVE-2024-4836,0,0,6397d82c08a27dc6d1e4828623f7dccd401e56dd97e62d291cde8c73c9f6f8bd,2024-07-02T12:09:16.907000
|
||||
CVE-2024-48360,1,1,1b5a1633c2541f80a1d590704a304549571b2ffc5dedb093276c0fb3a82b0781,2024-10-31T20:15:05.420000
|
||||
CVE-2024-4837,0,0,e7f6212a3767856f93e80078aa36a8d58ae9b0d6d87727b0b71ea9bfd6a3b44b,2024-05-15T18:35:11.453000
|
||||
CVE-2024-4838,0,0,18fa2348db877da11c5078171d002c78cc86239f9092091ea1ecb3106ab22873,2024-05-16T13:03:05.353000
|
||||
CVE-2024-4839,0,0,b71f0924b0409cbf87c224c453882d6c9b4eee1b8a725627eb630ec6587a6e2b,2024-06-24T19:26:47.037000
|
||||
@ -263040,7 +263052,7 @@ CVE-2024-48547,0,0,9db332cc676278e21a081b803d57f1c54b011fe5dd42093550c345ebe0949
|
||||
CVE-2024-48548,0,0,ec80620fd2405092cb652dc2117913ce945d52911c33fb7583254b23a981c173,2024-10-25T12:56:07.750000
|
||||
CVE-2024-4855,0,0,c93719b20367086f39a585784c8fe87b51678f3d6fabb283bc26fc5dedf0f872,2024-08-29T15:15:31.893000
|
||||
CVE-2024-4856,0,0,01234b09ea1a4585c989c1dc87d23ed182241e8a50536214983ade66b15e19f8,2024-06-04T16:57:41.053000
|
||||
CVE-2024-48569,0,1,363defbdf09420190878aeae0a2fca5d0c5aa0c8ac5165dd56ab5fe6856327cb,2024-10-31T18:35:14.873000
|
||||
CVE-2024-48569,0,0,363defbdf09420190878aeae0a2fca5d0c5aa0c8ac5165dd56ab5fe6856327cb,2024-10-31T18:35:14.873000
|
||||
CVE-2024-4857,0,0,1a28f92c79b598b55521235359a1d50b478306861b37a5a0ef0abc4d3160ef4c,2024-06-04T16:57:41.053000
|
||||
CVE-2024-48570,0,0,7446ae4df00f32873e4ee72b4a315b4accd5c33a83ff9b6be395bc57cb3e12c5,2024-10-25T18:59:22.033000
|
||||
CVE-2024-48572,0,0,80073f63de1b6b029056367f8422bcae6c5c4185d84c98ab62ad2ed7d0192815,2024-10-30T15:35:20.497000
|
||||
@ -263071,9 +263083,9 @@ CVE-2024-48637,0,0,d42c2fa4f588b75285bfd9e74cf828ce6be24d319097efc6470bbe43fee07
|
||||
CVE-2024-48638,0,0,93a9606c88551eca2a43d58a9a18871f8de782bd448d66dc6474dd57c860ad86,2024-10-18T12:52:33.507000
|
||||
CVE-2024-48644,0,0,767bea0974441fd2cc19792b3d98e4d360220265a6636145290e8043d3dbc5a5,2024-10-23T19:35:12.593000
|
||||
CVE-2024-48645,0,0,68a6d6f0e4b4f7bc96fb65a4350b69a13ff6b55f133c0422ecbf10590166619b,2024-10-23T15:12:34.673000
|
||||
CVE-2024-48646,0,1,2c72755711774d9ce5210ca99838e837ec7f18163059771ae42741fa88e99c51,2024-10-31T18:35:15.693000
|
||||
CVE-2024-48647,0,1,92cd0668411b861dcce5bb2a87a5095ba9c782585782d8cbac588c674c005357,2024-10-31T18:35:16.527000
|
||||
CVE-2024-48648,0,1,56cc0d5ae63142abad3a70ff465753bf85416d54651366afa742cc2bf17f0169,2024-10-31T17:35:03.713000
|
||||
CVE-2024-48646,0,0,2c72755711774d9ce5210ca99838e837ec7f18163059771ae42741fa88e99c51,2024-10-31T18:35:15.693000
|
||||
CVE-2024-48647,0,0,92cd0668411b861dcce5bb2a87a5095ba9c782585782d8cbac588c674c005357,2024-10-31T18:35:16.527000
|
||||
CVE-2024-48648,0,0,56cc0d5ae63142abad3a70ff465753bf85416d54651366afa742cc2bf17f0169,2024-10-31T17:35:03.713000
|
||||
CVE-2024-4865,0,0,df8706c5d26e485ec9b623150b314bb58c6338346ba72ce79d78a6dbca58bc77,2024-05-20T13:00:34.807000
|
||||
CVE-2024-48652,0,0,de9357326c4ec67fec06a2f6916117e7d67385a63ec8c48f3929233398d3928a,2024-10-25T16:51:57.013000
|
||||
CVE-2024-48654,0,0,b1175c42eb9b6ad703f77f6cacd261d0eb5f65c9d2e13e20c8b31a8501988240,2024-10-28T13:58:09.230000
|
||||
@ -263099,7 +263111,7 @@ CVE-2024-4872,0,0,549af6d3c4facab0e0ed80259f11ae3b62839f464bd03f4ae7443d031f1f20
|
||||
CVE-2024-4873,0,0,acc2d485a3cc66f2d361ddda92f62901a8108a4490dc81ea4acfb7f60771d88d,2024-06-20T12:44:01.637000
|
||||
CVE-2024-48733,0,0,e873e270c7250d836beb5a5d9d75c5d243594eecb9071602bcc17cc41d90fc1f,2024-10-30T21:15:14.507000
|
||||
CVE-2024-48734,0,0,95db6671e3d0be41a6b06bc9e7fabfe49fbe14fcdbfc14f9c0975bea17995851,2024-10-30T21:15:14.563000
|
||||
CVE-2024-48735,0,0,e72a9afea9ee46bb4bcc6f4f09600aed5e7e8192111e03331a7e65ffe3fdfe1d,2024-10-30T21:15:14.620000
|
||||
CVE-2024-48735,0,1,5dee0ec0e0374b22f065cb26fb1b8c24e4784dd8a396c35339c7279fbec892bb,2024-10-31T20:35:06.767000
|
||||
CVE-2024-4874,0,0,4b5967df7915507c9b0020b0ee4984332d2c23e37a57b9a262a2ae6c5b300f4b,2024-06-24T19:41:12.293000
|
||||
CVE-2024-48743,0,0,e34f375e468f7c410c7d8c60761e70f3ee3d5b15b7109d5d939d88a21b51dbc6,2024-10-29T19:35:25.777000
|
||||
CVE-2024-48744,0,0,424c481c5fd1d12d1736019bf9f8804bc723e4ae30a5fde28dbb02cb380182de,2024-10-16T18:35:07.013000
|
||||
@ -263190,7 +263202,7 @@ CVE-2024-48942,0,0,8e0a2bf9dd24a5a385f196f7b0656ab299e53cb741eb92aa617f57ef48ee5
|
||||
CVE-2024-48948,0,0,6468ccc34445744b46aaa46da604a8323b3afae5876966b014aee375073e1d6b,2024-10-16T16:38:43.170000
|
||||
CVE-2024-48949,0,0,a2a3af77c2ec8dfe23cb3bfb50401d91f40f6be7761d017f52ac86b99455f8e7,2024-10-15T14:07:04.057000
|
||||
CVE-2024-4895,0,0,f6b1e62d3b5bd64aea52e6768b6c469e049c941759a77bf99aa3b85ad7e20caa,2024-05-24T01:15:30.977000
|
||||
CVE-2024-48955,0,0,6a753515eadee4efaaa9ce7d086aaac0fd1d1f88a870f6a34578f374c110a15f,2024-10-30T15:35:22.063000
|
||||
CVE-2024-48955,0,1,0a2a2b978cdc62d5d96adf19c8bb21d2cc19e4c4b5bc967c351e4b9474bfeb45,2024-10-31T20:15:05.530000
|
||||
CVE-2024-48957,0,0,73c8e1634cf56d3192b3375f11aa72eac69f0bcf8a4cb1f3b137dcc189616d8f,2024-10-11T21:36:47.930000
|
||||
CVE-2024-48958,0,0,92a426e369946b14ff79b98b6fb42dd0c692d3b7d45d68198a4072bdaadf4922,2024-10-11T21:36:48.687000
|
||||
CVE-2024-4896,0,0,20cc2dc19f323150528d4fb3a23b846b2e602fa65e075afe5dc2b86cb95d9c94,2024-05-22T12:46:53.887000
|
||||
@ -263448,8 +263460,8 @@ CVE-2024-4964,0,0,786ceb95d48675f478c0edd25187f0304d39eb81096edb79d2e9ae0401f68b
|
||||
CVE-2024-49640,0,0,becbe9cd8e4562101ae9f0fd4aeb9f5d80e9d81b9046f0c79b66a78a4ae5a7e8,2024-10-31T16:04:01.113000
|
||||
CVE-2024-49641,0,0,0c76c83cf503f374bc615797049759b6f98944a9c823b145687554c637514560,2024-10-31T16:05:44.353000
|
||||
CVE-2024-49642,0,0,2938115e957c516a2204660e9dee7ba3c340bc4776e855853c758dc52a1a7e6c,2024-10-29T14:34:04.427000
|
||||
CVE-2024-49643,0,1,6284c6900c7970034a8944b3460134452480aca131e8b373807c5239438cf826,2024-10-31T18:48:20.883000
|
||||
CVE-2024-49645,0,1,ca9e8de021aa76294f349f1480f6770ba9607afe63354f1726992ea9d42eab18,2024-10-31T17:59:25.867000
|
||||
CVE-2024-49643,0,0,6284c6900c7970034a8944b3460134452480aca131e8b373807c5239438cf826,2024-10-31T18:48:20.883000
|
||||
CVE-2024-49645,0,0,ca9e8de021aa76294f349f1480f6770ba9607afe63354f1726992ea9d42eab18,2024-10-31T17:59:25.867000
|
||||
CVE-2024-49646,0,0,494afe5cb42a3659410b30eebe3ebd4867d873db4432f980b767a7abcb0bd3a7,2024-10-29T14:34:04.427000
|
||||
CVE-2024-49647,0,0,e60b9143544a8c8127edc259fcd544ebde14e3b3a21fa4bf3041175f98777227,2024-10-29T14:34:04.427000
|
||||
CVE-2024-49648,0,0,882728f062a6477fd5d5596cbadd02c75634cd7d8a2e421ad711333bc5f1d005,2024-10-29T14:34:04.427000
|
||||
@ -263761,7 +263773,7 @@ CVE-2024-50070,0,0,a93237e500fada4b88abb4aa778a5f3c2cf8813abaffa45e0eeec4d5a914d
|
||||
CVE-2024-50071,0,0,ca95de15815d680369f3146cc2915571a1b4f1c26211b6f5790ba4ff0facd2a6,2024-10-30T17:02:34.740000
|
||||
CVE-2024-50072,0,0,d234ae692cf6ab3c0d4120deeeee388838384d41a26d87045a3f6220157fcdde,2024-10-29T14:34:04.427000
|
||||
CVE-2024-50073,0,0,3ac354f0a571c346e70d9b14ed507d0361e0d40b760fe5591a7f7878e93be242,2024-10-29T14:34:04.427000
|
||||
CVE-2024-50074,0,1,5fea9fa631fbe2046f51821253354eac87649cdd334e0aa7bed64a71b94bc645,2024-10-31T18:23:21.567000
|
||||
CVE-2024-50074,0,0,5fea9fa631fbe2046f51821253354eac87649cdd334e0aa7bed64a71b94bc645,2024-10-31T18:23:21.567000
|
||||
CVE-2024-50075,0,0,f254549f01ba2f5ee239dee6fc0e7ecbe8fe1b2c6da566e1dc2c41565299fc49,2024-10-29T14:34:04.427000
|
||||
CVE-2024-50076,0,0,960b5306eb9d7d5b99e64da9813531f1a11820802abfb99e23dd9c044d60901e,2024-10-29T14:34:04.427000
|
||||
CVE-2024-50077,0,0,6ccef6c49c4eb4414f8a4b868e27c1decea0e3b4db33c98cce1cc8afd4299d1e,2024-10-29T14:34:04.427000
|
||||
@ -263803,12 +263815,12 @@ CVE-2024-5033,0,0,34cd1f889798bbfeb338d8d711a920994993596df17d9daf9b428477bffed7
|
||||
CVE-2024-50334,0,0,e5afd12be3769678c4d0afd24ca9f86adfc7c8adcd7a12eb57abf0e3b514a033,2024-10-29T15:15:12.560000
|
||||
CVE-2024-5034,0,0,ecc1ebd0e8a7a2aea01c9ce5ac07669525947175e7e55790f4a8e8a0b317bae8,2024-08-01T13:59:38.920000
|
||||
CVE-2024-50344,0,0,93395b02a9e3e381ddc8a3070f13b915f9e8cd62d8e0f5a4556777cec89a5a2b,2024-10-30T16:15:04.763000
|
||||
CVE-2024-50347,1,1,ed16d14b70cf3d7686a2254299d7869880decc6158040c4e8ffd6c4d37591aca,2024-10-31T18:15:05.600000
|
||||
CVE-2024-50347,0,0,ed16d14b70cf3d7686a2254299d7869880decc6158040c4e8ffd6c4d37591aca,2024-10-31T18:15:05.600000
|
||||
CVE-2024-50348,0,0,08d996230fa601a51dc4ce7290dfd8c5c344e9cd2fb7716f4e499eeaa4bf6b24,2024-10-29T23:15:03.863000
|
||||
CVE-2024-5035,0,0,592ce94ebba91d65c9cac29085dbc465d14be23d13ac08f1e0101f9ce552a856,2024-05-29T05:16:08.793000
|
||||
CVE-2024-50353,0,0,ce993db7dd8b2e688fe3051b6a9bf88cf5e983902433f1fe7fb795b54f262c07,2024-10-30T14:15:07.790000
|
||||
CVE-2024-50354,0,0,1f20ca590c38e43a7f364e4a76d630df65540096d85e4f8894633db095556fa8,2024-10-31T16:15:05.763000
|
||||
CVE-2024-50356,1,1,1fef0c6d5035aacf7f26a2c53b0d2c6111ad3896b8b9aa474c64b30562d696cd,2024-10-31T18:15:05.750000
|
||||
CVE-2024-50356,0,1,1c3aa41523b3d8fc957ae37821a636851ed23c168cf4d4bfeac1115b833bd28d,2024-10-31T20:35:07.840000
|
||||
CVE-2024-5036,0,0,e97b40bd40cf208c311323e6564cb1ded96d8cc433059436a8705289f1e02a66,2024-06-20T12:43:25.663000
|
||||
CVE-2024-5037,0,0,46d4a5c4b83922b1ee19bcb8bbc97a0a290a2086fb5a073395bdb9a5e03441e0,2024-08-19T17:15:09.807000
|
||||
CVE-2024-5038,0,0,99b942f340bd77179350025250d1eccbd97ee2b6f6339af49bfd1a72be63cbf5,2024-06-11T17:41:37.883000
|
||||
@ -263972,11 +263984,13 @@ CVE-2024-5076,0,0,de640e02cf3b45a3c273aa587ea62260b6bf3eea8d977ac9f3e7280d3f5d4b
|
||||
CVE-2024-5077,0,0,58d61679dec16d0807ee3c6d8f70abda23dd3b8ef542c3a47286601f3d544039,2024-08-01T13:59:40.333000
|
||||
CVE-2024-5079,0,0,03cab751fae6538cdd3ee0f9a467090b1b9dca8ded972c9a24812d90a2b62ab7,2024-08-01T13:59:40.517000
|
||||
CVE-2024-5080,0,0,88ae00b43e12b64ab9ecc2d4c4ea1fe4d89b86d4c131aa05e4a989c5a4e3b207,2024-08-01T13:59:40.707000
|
||||
CVE-2024-50801,1,1,b8874f741b3ac3d4e0411e961bf871ceba705f8f639471838bd72ebc36785c6d,2024-10-31T19:15:13.313000
|
||||
CVE-2024-50802,1,1,f24e292e6e8704f5d40bd8576e7700ff6bc9c2fbf554c1d2d83e9f06d65c1a14,2024-10-31T19:15:13.413000
|
||||
CVE-2024-5081,0,0,0bebffdc717b25462ccb5a198cb29076c0fa0475011c795b0df7ab25d1acf197,2024-08-05T15:35:16.180000
|
||||
CVE-2024-5084,0,0,79705ce3d53f6e7c72da00fccc935c6da44be9bf4354c31cd8528afb5e0a643e,2024-05-24T01:15:30.977000
|
||||
CVE-2024-5085,0,0,6942e3068671e85a9578eddbb7240c8706dd53cd6ec5670c5d4ddd91c950a30a,2024-05-24T01:15:30.977000
|
||||
CVE-2024-5086,0,0,cace1182cf9be3136b0c613ecdabc086a9a0b40661f04ebd6e230acc3565cbb0,2024-05-29T13:02:09.280000
|
||||
CVE-2024-5087,0,1,1746857b68833d8900979ac8a67f81e6079dce1463e5a3122487cb2b7b074692,2024-10-31T18:26:54.500000
|
||||
CVE-2024-5087,0,0,1746857b68833d8900979ac8a67f81e6079dce1463e5a3122487cb2b7b074692,2024-10-31T18:26:54.500000
|
||||
CVE-2024-5088,0,0,cba5e9039c2295e22c8cb155a75af3aef347c6e9813c2bf0c73f71f25ef00106,2024-05-20T13:00:34.807000
|
||||
CVE-2024-5089,0,0,305706c4595c847ac9cbba52082727d9aefdb687316aa25305e2ea82257716b3,2024-06-06T09:15:14.897000
|
||||
CVE-2024-5090,0,0,be816c3666262b2758beb88ae86bd9e45d3334ddca99a5e32c28feea44799dd8,2024-06-11T13:54:12.057000
|
||||
@ -263996,6 +264010,11 @@ CVE-2024-5103,0,0,aef0baf1fd7c527670ecf099c59b541b0a60e91a3e6b8de1c582546f74d7df
|
||||
CVE-2024-5104,0,0,8d4ff1d965ca43b16b77c8055dc82631e6e8123b480d913038100bbc16c5fc14,2024-06-04T19:20:59.397000
|
||||
CVE-2024-5105,0,0,c1afcbdfab9cbf8b7401c36e665ea5449fdb0423f5baf719d1747abc02484d12,2024-06-04T19:20:59.500000
|
||||
CVE-2024-5106,0,0,0c609f41f655027086ae34a799c5dba7518161802bc29d490607b24bb6cca58b,2024-05-20T13:00:04.957000
|
||||
CVE-2024-51060,1,1,6954fe4f4c979bac5ff347a737765282b77d34b22daafc7cbe923362e4a739b4,2024-10-31T19:15:13.500000
|
||||
CVE-2024-51063,1,1,83d14fce1e9aba85cc79c57d7ea6b3af3164f1724c2fc0eca657961c44180c77,2024-10-31T19:15:13.610000
|
||||
CVE-2024-51064,1,1,aede5da59a3b7d23cb6f435a779455219269bdbc5b84078b53f3427c0165d351,2024-10-31T19:15:13.700000
|
||||
CVE-2024-51065,1,1,2e7b751ebd5e167556d945b03efd6c3f054ad6056d4c14633dc247533df24b1c,2024-10-31T19:15:13.780000
|
||||
CVE-2024-51066,1,1,ee9694dead26536b4b5b9f9e8adea8e7ec593b9553bbcff0acf6476edcf63459,2024-10-31T19:15:13.860000
|
||||
CVE-2024-5107,0,0,f5453befe05d8931f9c9a9c4f41bacf3f3f4a7efb50cfd25019760201fcefc62,2024-06-04T19:20:59.600000
|
||||
CVE-2024-51075,0,0,552465fb7c055ecfb398f22c9432551758d85e6dc6767f3b187c510f15761dd9,2024-10-29T20:35:35.130000
|
||||
CVE-2024-51076,0,0,3a12fe30660d75d0270cdd7bd56ceece76ba34d3765c2f273f497b6ff97fc1c5,2024-10-29T20:35:35.890000
|
||||
@ -264021,12 +264040,12 @@ CVE-2024-5124,0,0,c7015fc65f4e276c0cbb38596091155495fc50548eef3d0d6bdd3dfed49927
|
||||
CVE-2024-51242,0,0,12f705da9022a8e38ebd9ee7e7e6ac01dfd058f24c1a03edec744b643eba3520,2024-10-31T16:35:20.873000
|
||||
CVE-2024-51243,0,0,800270ed7103621b26b8eae536fb3a8968dff426a0791be494e93fac6c2df32a,2024-10-31T15:35:40.967000
|
||||
CVE-2024-51254,0,0,f20ab585f3fe372c65595856805921bb8d2b22af7824679356ebca594f108d37,2024-10-31T15:35:41.800000
|
||||
CVE-2024-51255,0,0,e1cbafeb091e663b926de7b59cdcd9a21fea2bea834bdd892b0fb1b83916d910,2024-10-31T16:15:06.033000
|
||||
CVE-2024-51255,0,1,235a83f99ee2b484c839d657b09596aa17973f52fcb5a6a16e0bbd6f5eafb8de,2024-10-31T19:35:10.837000
|
||||
CVE-2024-51257,0,0,29ad8b0137a8baebd65102b3b2a8b1d79f8cad235c4dd225c313b0295438f266,2024-10-30T16:35:28.993000
|
||||
CVE-2024-51258,0,0,8552984991114543bb72db401d789b000ecda7ab1e49c15b21f3ab9c1d4b407b,2024-10-30T18:35:17.040000
|
||||
CVE-2024-51259,0,0,6d702cbaf70c10cfdda0a7abce448d3145a25d2256f8a60137d2335418de4f22,2024-10-31T14:15:06.260000
|
||||
CVE-2024-51259,0,1,6ece1df8b0d21af9bb887582666dedab51f593b9a20998980ded2314d5db896a,2024-10-31T19:35:11.680000
|
||||
CVE-2024-5126,0,0,04ff4a563e301de69d63a906163bcc7b9149a0fc439aa3db44fa193023df5115,2024-10-03T16:52:45.027000
|
||||
CVE-2024-51260,0,0,671bfb7984aca048f642929131c3bdfc6798158fd3f798eefbd06d5d50e126ba,2024-10-31T16:15:06.113000
|
||||
CVE-2024-51260,0,1,586901ac7a360d1796cf0d0876f6961325f47aad5a0d2fd09476e3b6ab8c144d,2024-10-31T19:35:12.607000
|
||||
CVE-2024-5127,0,0,3b08ea85b89bf08b7ac589e3aa718857524fafebf4ce0fa847d24755edc03403,2024-10-09T13:38:49.307000
|
||||
CVE-2024-5128,0,0,9fcc5cef7e8f556e2bf8719670c94f779c2307d32f054ea85c0fee175fdcf878,2024-09-23T15:11:09.923000
|
||||
CVE-2024-5129,0,0,775c71113c1b7299300ab83c8a34b391b75dc55b55486fb0ef4553cde0b68e06,2024-10-03T16:56:02.837000
|
||||
@ -264054,14 +264073,14 @@ CVE-2024-51425,0,0,833bdc625e1a738ada7ad7d5f55c83a7b1c7a93226be1681295fc3cb6fe3b
|
||||
CVE-2024-51426,0,0,e6101206ecf4337bb6318e551c0f2f3f51553eecbb2541547a51b5d27151fe70,2024-10-31T15:35:43.373000
|
||||
CVE-2024-51427,0,0,fcfe3e7677db4a7b336b2247c857e7519564993e67b9bed1d6a6e1e171a8c15f,2024-10-31T15:35:44.180000
|
||||
CVE-2024-5143,0,0,5ac39d02075c8e32566e12e6b75645e72f6b53d1cd5d8a84d8661f31cb199459,2024-10-31T15:35:44.950000
|
||||
CVE-2024-51430,1,1,3157d8015fa87efc2891316f9d6d859c0d52a688a574b364f2c6e2727bcd1cc2,2024-10-31T17:35:04.600000
|
||||
CVE-2024-51430,0,0,3157d8015fa87efc2891316f9d6d859c0d52a688a574b364f2c6e2727bcd1cc2,2024-10-31T17:35:04.600000
|
||||
CVE-2024-5144,0,0,6bbfaf13c1764c4fefc00893d80de8b864d8af9b05653210d129c904ab48e8ed,2024-05-31T18:15:13.217000
|
||||
CVE-2024-5145,0,0,e9d5b011678068f9e46540aba9b4c166c9546581cf81cda6f6984ec899d8b7b6,2024-06-04T19:21:01.520000
|
||||
CVE-2024-5147,0,0,67fd758fa3d69d8e32fe541a58ba746107ffb7370fa9ddd99ec9988f56fe738f,2024-05-22T12:46:53.887000
|
||||
CVE-2024-51478,1,1,acd4bb31c48b5a4cf83924eba9a0379b0f9346e05b21361d2a15e88f0862bf56,2024-10-31T17:15:13.500000
|
||||
CVE-2024-51478,0,0,acd4bb31c48b5a4cf83924eba9a0379b0f9346e05b21361d2a15e88f0862bf56,2024-10-31T17:15:13.500000
|
||||
CVE-2024-5148,0,0,bd5836562cd7c4456364427f29f33cc1c67447ccbfc1a9320a1023f854c7eb77,2024-09-03T12:59:02.453000
|
||||
CVE-2024-51481,1,1,f2651a488920fe3fdbbcf0e515a1d10e5430b723396d938341b75258b7a7411d,2024-10-31T17:15:13.723000
|
||||
CVE-2024-51482,1,1,5178c636b46c83fa7b2098922ca9a091994ec1b35ba1dadca37cf3d150c89227,2024-10-31T18:15:05.997000
|
||||
CVE-2024-51481,0,0,f2651a488920fe3fdbbcf0e515a1d10e5430b723396d938341b75258b7a7411d,2024-10-31T17:15:13.723000
|
||||
CVE-2024-51482,0,0,5178c636b46c83fa7b2098922ca9a091994ec1b35ba1dadca37cf3d150c89227,2024-10-31T18:15:05.997000
|
||||
CVE-2024-5149,0,0,35aba13432990695b4ab26ada33d31578be519ff456b8edf807a15027d0b18f5,2024-06-06T14:15:01.960000
|
||||
CVE-2024-5150,0,0,af277f2642e60b6f0769d64573990279b6b64286b8d76d1359b09a52e223643b,2024-05-29T13:02:09.280000
|
||||
CVE-2024-51506,0,0,aeb585d1723ff2c89aafbc7f5be7b06442a99eb384784bc9840750395f547af1,2024-10-29T19:35:28.723000
|
||||
@ -264487,7 +264506,7 @@ CVE-2024-5608,0,0,91d3b8760217c3d2e17ddc8bd099d48bf3bda4341e3d053182f418df616ce5
|
||||
CVE-2024-5609,0,0,4c03a855f07c8ea18d8e7a70e1e2d3467f32254daea5abf62f130fb919fa93d1,2024-06-06T19:16:09.920000
|
||||
CVE-2024-5611,0,0,257f707c49e1adeab5f30937de3668453c65dc87c2e8ac71cda38f1fe1bbc4e5,2024-06-17T12:42:04.623000
|
||||
CVE-2024-5612,0,0,28ceb837b16c04d60c80c2106288728343a6af941bee1c42d1e76e6ac30c4a71,2024-10-29T18:05:42.823000
|
||||
CVE-2024-5613,0,1,2286e4c53cf8b075a4bf811beabba10c7d0ce41c40591dd19c0ccb642bdd2197,2024-10-31T18:31:30.757000
|
||||
CVE-2024-5613,0,0,2286e4c53cf8b075a4bf811beabba10c7d0ce41c40591dd19c0ccb642bdd2197,2024-10-31T18:31:30.757000
|
||||
CVE-2024-5614,0,0,3235a098278ef12466faacc7eb682cba1cb99cc913b9ed567c082bb65c13d254,2024-07-29T14:12:08.783000
|
||||
CVE-2024-5615,0,0,0b80425a78ce7696e161012e7d95058779d0861d3b6927cc392e7a553c227a9e,2024-06-11T17:55:16.103000
|
||||
CVE-2024-5616,0,0,5078c1aa917db98652cc6ffd2b310b244194da0fcbabfd9d4ed8ccf7b99de509,2024-07-08T15:49:22.437000
|
||||
@ -264510,7 +264529,7 @@ CVE-2024-5634,0,0,00eb3cdc892a411ea249c0c861bb9c39f15a25ea90327bdcc836d54ed90e08
|
||||
CVE-2024-5635,0,0,cc8d1362a9a889fd4ce6da7f46e39b1117534a16d1469408f00bcbe886f319fd,2024-06-11T16:47:04.413000
|
||||
CVE-2024-5636,0,0,11453de0b2b9e33715d95748660a81de0651a58507f354b8a49561ef7d2587ac,2024-06-11T17:23:29.670000
|
||||
CVE-2024-5637,0,0,eeb41901e681579a29d0676f0c70bb8e6e3be08e91c4d1d1a3396dc5dea508cd,2024-06-11T18:31:54.787000
|
||||
CVE-2024-5638,0,1,68ca32104039c555501740b79d9d053899dfa4f77cf28bfda3416440a76684f3,2024-10-31T18:38:33.640000
|
||||
CVE-2024-5638,0,0,68ca32104039c555501740b79d9d053899dfa4f77cf28bfda3416440a76684f3,2024-10-31T18:38:33.640000
|
||||
CVE-2024-5639,0,0,492ad0d47d56549888d5f48237edc279d0d32d853604c73193623cce2eae0704,2024-06-24T19:24:23.883000
|
||||
CVE-2024-5640,0,0,8f33c54e7012000a851267741a433d3aa85134979ee0675a7c8c94bf7d26740a,2024-10-28T18:32:59.690000
|
||||
CVE-2024-5641,0,0,1f23612877686d6e5143238f62dc02125c3d0a0d8a2499e0ec524473edb424e6,2024-07-05T17:14:44.840000
|
||||
@ -264672,7 +264691,7 @@ CVE-2024-5819,0,0,ff5f9599a99761c75338a6f351d5018b6b4257daf87dc238a533c6ea2133dd
|
||||
CVE-2024-5820,0,0,4c9e3224ff2f58cd9b00410a197234419444c7f4cb436de63372b9de4c6303c2,2024-07-12T08:15:11.560000
|
||||
CVE-2024-5821,0,0,14c66e5b9fe266ccf4bf59e0254237da8c439f65c9de7d774ed6c1950ac6b04a,2024-07-12T08:15:11.640000
|
||||
CVE-2024-5822,0,0,baf10ed90614f0ff900c6a4bdea84fcaae14f3f7ead2ea1122c706f066c79b96,2024-06-27T19:25:12.067000
|
||||
CVE-2024-5823,0,1,50ef10262f89eb8063a87ceb928d6e6bd5e644a01c19f98e2fa47e0e16572aff,2024-10-31T18:05:00.637000
|
||||
CVE-2024-5823,0,0,50ef10262f89eb8063a87ceb928d6e6bd5e644a01c19f98e2fa47e0e16572aff,2024-10-31T18:05:00.637000
|
||||
CVE-2024-5824,0,0,a626487511d1e6b65da2c7fdc7f30939ba46505ead241212d2b122818200e9ab,2024-06-27T19:25:12.067000
|
||||
CVE-2024-5825,0,0,682d9c8db78e32760516d35e8d80736a485272125d13ba44bf7f0b379940e54f,2024-06-11T10:15:13.960000
|
||||
CVE-2024-5826,0,0,ab74f2650ad7ec867beb938c7b9b39007cedba2567b06756b5e245e8edb717b0,2024-06-27T19:25:12.067000
|
||||
@ -265705,7 +265724,7 @@ CVE-2024-7032,0,0,c9fbd7c25c8986098b0db02c8f6b35abbde59d7f3338b2f6bf6ad9dd6ca450
|
||||
CVE-2024-7037,0,0,dd49934fb89a4cd9156479561f4579716c8bbefb475939312544c6bfe1fd2c69,2024-10-10T12:51:56.987000
|
||||
CVE-2024-7038,0,0,c6c61a8209299a027f404e23e0f880dbd94e569f03cadf08307c0ee843f5816f,2024-10-15T19:04:48.627000
|
||||
CVE-2024-7041,0,0,dcc586a9589d4da0815c96bc2883ae49d30920986ca4c102055deacb752acc00,2024-10-10T12:51:56.987000
|
||||
CVE-2024-7042,0,1,cb1e3b618862b496bd13b244398afe81ffff2552b15227836e0acd820bc3de3c,2024-10-31T18:36:30.140000
|
||||
CVE-2024-7042,0,0,cb1e3b618862b496bd13b244398afe81ffff2552b15227836e0acd820bc3de3c,2024-10-31T18:36:30.140000
|
||||
CVE-2024-7047,0,0,21985a71701c23251b30e756f6f2c4f75baa147c34a8c282b34b811aa42e2336,2024-08-26T16:07:27.837000
|
||||
CVE-2024-7048,0,0,89e7f79a80eda12c2b26c43fb062e41b4f4492714694bac6a9f3919e1af92730,2024-10-10T12:51:56.987000
|
||||
CVE-2024-7049,0,0,0a245acb222c9415b34bdd2b50731367d88750a93745ace19c048218b6b8c0be,2024-10-17T14:22:44.653000
|
||||
@ -266048,7 +266067,7 @@ CVE-2024-7467,0,0,1635aa1540733ea32e6f2c1b73b541d5af5dfcd94c3797172bd89de0083b56
|
||||
CVE-2024-7468,0,0,beaf0f0ce0713b119a6aad075faba99ddbbf9b51410059760701d7a29a28a4df,2024-08-06T17:35:40.080000
|
||||
CVE-2024-7469,0,0,9480167bec5dcea6298d57f7311e33d09ca16fde559c0d2101bf57fd073ab050,2024-08-06T17:36:19.150000
|
||||
CVE-2024-7470,0,0,c378df60a1369914caa48d0c9b95c12c12b8030c63ff1d7f88f18ec0798c6329,2024-08-06T17:37:07.923000
|
||||
CVE-2024-7472,0,1,cfb9d72479737a220f88555f5248b8b3adcebcdf0dd499def604c090ee01833e,2024-10-31T18:46:32.497000
|
||||
CVE-2024-7472,0,0,cfb9d72479737a220f88555f5248b8b3adcebcdf0dd499def604c090ee01833e,2024-10-31T18:46:32.497000
|
||||
CVE-2024-7473,0,0,20168a95c050c826b36808d062806e3ad8c89fac510d32acafd85084e3f5514a,2024-10-31T15:11:45.557000
|
||||
CVE-2024-7474,0,0,fd603ba5192c32c81661db241a24a16d96938f0a539e4ad024748791a7268266,2024-10-29T14:35:21.207000
|
||||
CVE-2024-7475,0,0,2b037db3837162a776e57f7b2c7175870a05e0cd0e7064c84fd1c023e8b92b59,2024-10-29T14:35:21.403000
|
||||
@ -266382,7 +266401,7 @@ CVE-2024-7870,0,0,2836216d393e794b4828cb37dfdee043bfdf58d1b6ab4bb6d4918022aecdc9
|
||||
CVE-2024-7871,0,0,d47ede6ca23d1578a9b705a8257da890832c1e69392e6414a190c6fb054ce14f,2024-09-04T17:34:14.630000
|
||||
CVE-2024-7873,0,0,206d8282726d748a6a41b367b674a966213f9d6e3053dc261b740ef29ffe8ab7,2024-09-20T12:30:51.220000
|
||||
CVE-2024-7878,0,0,1d855258734eb9301ec3064cb052aacfe2a08aa75ea8a20fdcb8aa8f30181ac0,2024-10-02T17:41:44.133000
|
||||
CVE-2024-7883,1,1,a0d02461ab906696f5db8c8f3e3571e988cb43aab47f453d7c53bf3a19ae3b1f,2024-10-31T17:15:14.013000
|
||||
CVE-2024-7883,0,0,a0d02461ab906696f5db8c8f3e3571e988cb43aab47f453d7c53bf3a19ae3b1f,2024-10-31T17:15:14.013000
|
||||
CVE-2024-7884,0,0,785c516d1dabe55fa31f7695706ba6a05f994a8f8d63c46081a0777ad4e173ab,2024-09-12T20:47:13.387000
|
||||
CVE-2024-7885,0,0,e2150db115995e6873d7f6cbf78400b2118c17b58478683565f8b50d49fc70e9,2024-10-07T21:15:19.217000
|
||||
CVE-2024-7886,0,0,b8c1f856b8479c6982faa8a2fc4a6d8b2480e045b8b096d9bd3b8640a06eb6f3,2024-08-19T13:00:23.117000
|
||||
@ -267573,7 +267592,7 @@ CVE-2024-9656,0,0,0baa2843f7043c4ebd829d23f2741f972b762b755442a0f0f83539eb776103
|
||||
CVE-2024-9670,0,0,f306c0fbbcbde1e6a65006fd3bdd50d366f02be816ff2a6f00ef3348b3b76328,2024-10-15T12:57:46.880000
|
||||
CVE-2024-9671,0,0,421f1b0ad6825ff096efd81ac122f33bafcdf7b21693a85f65613389bca55f89,2024-10-10T12:51:56.987000
|
||||
CVE-2024-9674,0,0,99b8206db3c3741ff50725aa3969c36280edf4a37082b6473da1336e00a39d59,2024-10-22T14:02:50.473000
|
||||
CVE-2024-9675,0,1,62113804dce80364e0c34f410a374324b1967014a2528b04188a6bdc38b497f9,2024-10-31T17:15:14.250000
|
||||
CVE-2024-9675,0,0,62113804dce80364e0c34f410a374324b1967014a2528b04188a6bdc38b497f9,2024-10-31T17:15:14.250000
|
||||
CVE-2024-9676,0,0,24ed9ba905e617fe373fd7817b3453536089b8c2e8edbf0e6624a0d55077f74d,2024-10-31T05:15:05.860000
|
||||
CVE-2024-9677,0,0,944e049c847e061867c66e6b586a0cd99260b04bc2e2059d736567bf47cae00c,2024-10-23T15:12:34.673000
|
||||
CVE-2024-9680,0,0,db0e4e19e09673238ffe3dfbb8e95974e9346a75b4fd6d9319c03e5970bb644e,2024-10-16T15:07:36.123000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user