mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
Auto-Update: 2024-09-27T16:00:19.047040+00:00
This commit is contained in:
parent
83869aff46
commit
b7e58bcb4d
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-27917",
|
||||
"sourceIdentifier": "security@mautic.org",
|
||||
"published": "2024-09-18T22:15:03.577",
|
||||
"lastModified": "2024-09-20T12:30:17.483",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-27T15:13:58.927",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "security@mautic.org",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security@mautic.org",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,69 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:acquia:mautic:*:*:*:*:*:*:*:*",
|
||||
"versionStartExcluding": "1.0.0",
|
||||
"versionEndExcluding": "4.4.13",
|
||||
"matchCriteriaId": "2F3CFAD0-A8EE-42B3-B30C-3D428E0DB029"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:acquia:mautic:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.0.0",
|
||||
"versionEndExcluding": "5.1.1",
|
||||
"matchCriteriaId": "FC060988-1D0C-4CB2-A052-A0BCCD236381"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:acquia:mautic:1.0.0:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "99718D48-5C19-41C5-84E1-52E95F012830"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:acquia:mautic:1.0.0:beta4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4E35B0F0-9BF1-45FA-8954-B8BFB7389C4D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:acquia:mautic:1.0.0:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "213A9276-B9D1-4B4D-BBE9-FC42B6D63DE1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:acquia:mautic:1.0.0:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F366E4D8-1515-4E5F-8551-4C8D9E00D0D9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:acquia:mautic:1.0.0:rc3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B4234B41-F219-45B7-83A1-8F0F652F2A8B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:acquia:mautic:1.0.0:rc4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DA028F70-6020-47D6-BEC0-6FC0C7E18420"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/mautic/mautic/security/advisories/GHSA-xpc5-rr39-v8v2",
|
||||
"source": "security@mautic.org"
|
||||
"source": "security@mautic.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2023-22862",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2023-06-05T00:15:09.703",
|
||||
"lastModified": "2023-06-09T22:54:45.870",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-27T15:15:13.980",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM Aspera Connect 4.2.5 and IBM Aspera Cargo 4.2.5 transmits authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval. IBM X-Force ID: 244107."
|
||||
"value": "IBM Aspera Connect 4.2.5 and IBM Aspera Cargo 4.2.5 transmits authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -61,17 +61,17 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-522"
|
||||
"value": "CWE-523"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
@ -106,14 +106,6 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/244107",
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"VDB Entry",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7001053",
|
||||
"source": "psirt@us.ibm.com",
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2023-28956",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2023-06-22T02:15:48.717",
|
||||
"lastModified": "2023-06-28T14:51:02.947",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-27T14:15:03.340",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM Spectrum Protect Backup-Archive Client 8.1.0.0 through 8.1.17.2 may allow a local user to escalate their privileges due to improper access controls. IBM X-Force ID: 251767."
|
||||
"value": "IBM Spectrum Protect Backup-Archive Client 8.1.0.0 through 8.1.17.2 may allow a local user to escalate their privileges due to improper access controls."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -57,8 +57,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-266"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -99,14 +109,6 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/251767",
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"VDB Entry",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7005519",
|
||||
"source": "psirt@us.ibm.com",
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2023-33850",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2023-08-22T21:15:07.837",
|
||||
"lastModified": "2024-09-19T16:15:04.047",
|
||||
"lastModified": "2024-09-27T14:15:03.540",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM GSKit-Crypto could allow a remote attacker to obtain sensitive information, caused by a timing-based side channel in the RSA Decryption implementation. By sending an overly large number of trial messages for decryption, an attacker could exploit this vulnerability to obtain sensitive information. IBM X-Force ID: 257132."
|
||||
"value": "IBM GSKit-Crypto could allow a remote attacker to obtain sensitive information, caused by a timing-based side channel in the RSA Decryption implementation. By sending an overly large number of trial messages for decryption, an attacker could exploit this vulnerability to obtain sensitive information."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -218,14 +218,6 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/257132",
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"VDB Entry",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7010369",
|
||||
"source": "psirt@us.ibm.com",
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2023-47140",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-01-08T03:15:13.283",
|
||||
"lastModified": "2024-01-11T16:58:30.733",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-27T14:15:03.827",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM CICS Transaction Gateway 9.3 could allow a user to transfer or view files due to improper access controls. IBM X-Force ID: 270259."
|
||||
"value": "IBM CICS Transaction Gateway 9.3 could allow a user to transfer or view files due to improper access controls."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -61,8 +61,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-266"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -89,14 +99,6 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/270259",
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"VDB Entry",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://https://www.ibm.com/support/pages/node/7105094",
|
||||
"source": "psirt@us.ibm.com",
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2023-47152",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-01-22T20:15:46.890",
|
||||
"lastModified": "2024-03-07T17:15:11.063",
|
||||
"lastModified": "2024-09-27T14:15:03.993",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 11.5 is vulnerable to an insecure cryptographic algorithm and to information disclosure in stack trace under exceptional conditions. IBM X-Force ID: 270730."
|
||||
"value": "IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 11.5 is vulnerable to an insecure cryptographic algorithm and to information disclosure in stack trace under exceptional conditions."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -61,8 +61,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-209"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -117,14 +127,6 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/270730",
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"VDB Entry",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240307-0001/",
|
||||
"source": "psirt@us.ibm.com"
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-0001",
|
||||
"sourceIdentifier": "psirt@purestorage.com",
|
||||
"published": "2024-09-23T18:15:04.070",
|
||||
"lastModified": "2024-09-26T13:32:55.343",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-27T14:08:57.327",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "psirt@purestorage.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-1188"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "psirt@purestorage.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,39 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:purestorage:purity\\/\\/fa:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.3.0",
|
||||
"versionEndIncluding": "6.3.14",
|
||||
"matchCriteriaId": "A81E5420-C4D6-42CD-93EB-0B0BCB01F918"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:purestorage:purity\\/\\/fa:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.4.0",
|
||||
"versionEndIncluding": "6.4.10",
|
||||
"matchCriteriaId": "07C73EC4-5F8C-422B-971F-0C8445E72145"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://purestorage.com/security",
|
||||
"source": "psirt@purestorage.com"
|
||||
"source": "psirt@purestorage.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-0002",
|
||||
"sourceIdentifier": "psirt@purestorage.com",
|
||||
"published": "2024-09-23T18:15:04.410",
|
||||
"lastModified": "2024-09-26T13:32:55.343",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-27T14:13:24.427",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "psirt@purestorage.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "psirt@purestorage.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,72 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:purestorage:purity\\/\\/fa:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.3.17",
|
||||
"versionEndIncluding": "5.3.21",
|
||||
"matchCriteriaId": "CC18D0BC-EB2B-421A-AB24-4D6BA574C214"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:purestorage:purity\\/\\/fa:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.0.7",
|
||||
"versionEndIncluding": "6.0.9",
|
||||
"matchCriteriaId": "1E1003E6-BED7-4DE7-9511-1348E0A90587"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:purestorage:purity\\/\\/fa:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.1.8",
|
||||
"versionEndIncluding": "6.1.25",
|
||||
"matchCriteriaId": "4B4EE750-7E14-4C4B-8C83-55F10ADC209B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:purestorage:purity\\/\\/fa:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2.0",
|
||||
"versionEndIncluding": "6.2.17",
|
||||
"matchCriteriaId": "3311847D-BE5E-4435-9B1B-DF8824DF55B4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:purestorage:purity\\/\\/fa:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.3.0",
|
||||
"versionEndIncluding": "6.3.14",
|
||||
"matchCriteriaId": "A81E5420-C4D6-42CD-93EB-0B0BCB01F918"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:purestorage:purity\\/\\/fa:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.4.0",
|
||||
"versionEndIncluding": "6.4.10",
|
||||
"matchCriteriaId": "07C73EC4-5F8C-422B-971F-0C8445E72145"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:purestorage:purity\\/\\/fa:6.5.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6B75DE0E-3A1F-401A-85B0-EB7B7C8248D9"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://purestorage.com/security",
|
||||
"source": "psirt@purestorage.com"
|
||||
"source": "psirt@purestorage.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-0003",
|
||||
"sourceIdentifier": "psirt@purestorage.com",
|
||||
"published": "2024-09-23T18:15:04.697",
|
||||
"lastModified": "2024-09-26T13:32:55.343",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-27T14:23:58.243",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "psirt@purestorage.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "psirt@purestorage.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,72 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:purestorage:purity\\/\\/fa:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.3.17",
|
||||
"versionEndIncluding": "5.3.21",
|
||||
"matchCriteriaId": "CC18D0BC-EB2B-421A-AB24-4D6BA574C214"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:purestorage:purity\\/\\/fa:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.0.7",
|
||||
"versionEndIncluding": "6.0.9",
|
||||
"matchCriteriaId": "1E1003E6-BED7-4DE7-9511-1348E0A90587"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:purestorage:purity\\/\\/fa:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.1.8",
|
||||
"versionEndIncluding": "6.1.25",
|
||||
"matchCriteriaId": "4B4EE750-7E14-4C4B-8C83-55F10ADC209B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:purestorage:purity\\/\\/fa:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2.0",
|
||||
"versionEndIncluding": "6.2.17",
|
||||
"matchCriteriaId": "3311847D-BE5E-4435-9B1B-DF8824DF55B4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:purestorage:purity\\/\\/fa:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.3.0",
|
||||
"versionEndIncluding": "6.3.14",
|
||||
"matchCriteriaId": "A81E5420-C4D6-42CD-93EB-0B0BCB01F918"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:purestorage:purity\\/\\/fa:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.4.0",
|
||||
"versionEndIncluding": "6.4.10",
|
||||
"matchCriteriaId": "07C73EC4-5F8C-422B-971F-0C8445E72145"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:purestorage:purity\\/\\/fa:6.5.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6B75DE0E-3A1F-401A-85B0-EB7B7C8248D9"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://purestorage.com/security",
|
||||
"source": "psirt@purestorage.com"
|
||||
"source": "psirt@purestorage.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-0004",
|
||||
"sourceIdentifier": "psirt@purestorage.com",
|
||||
"published": "2024-09-23T18:15:04.973",
|
||||
"lastModified": "2024-09-26T13:32:55.343",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-27T14:24:41.277",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "psirt@purestorage.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "psirt@purestorage.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,93 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:purestorage:purity\\/\\/fa:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.0.0",
|
||||
"versionEndIncluding": "5.0.11",
|
||||
"matchCriteriaId": "DB4713BD-F013-4129-B3B8-0B95CE69D8A6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:purestorage:purity\\/\\/fa:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.1.0",
|
||||
"versionEndIncluding": "5.1.17",
|
||||
"matchCriteriaId": "D5C7A1D2-E2AE-4737-AF3D-B46AFA52DBD7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:purestorage:purity\\/\\/fa:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.2.0",
|
||||
"versionEndIncluding": "5.2.7",
|
||||
"matchCriteriaId": "FA0303FA-81E7-41F8-B8F4-AD571E2B8D13"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:purestorage:purity\\/\\/fa:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.3.0",
|
||||
"versionEndIncluding": "5.3.21",
|
||||
"matchCriteriaId": "A1077938-9AEC-446A-BF07-ECEF798889E1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:purestorage:purity\\/\\/fa:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.0.0",
|
||||
"versionEndIncluding": "6.0.9",
|
||||
"matchCriteriaId": "DA37DE8B-32EB-4BDD-808B-0DDF18ADC33C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:purestorage:purity\\/\\/fa:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.1.0",
|
||||
"versionEndIncluding": "6.1.25",
|
||||
"matchCriteriaId": "C01E4DAE-CAA7-4EF9-B47D-B400E36B97F2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:purestorage:purity\\/\\/fa:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2.0",
|
||||
"versionEndIncluding": "6.2.17",
|
||||
"matchCriteriaId": "3311847D-BE5E-4435-9B1B-DF8824DF55B4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:purestorage:purity\\/\\/fa:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.3.0",
|
||||
"versionEndIncluding": "6.3.14",
|
||||
"matchCriteriaId": "A81E5420-C4D6-42CD-93EB-0B0BCB01F918"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:purestorage:purity\\/\\/fa:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.4.0",
|
||||
"versionEndIncluding": "6.4.10",
|
||||
"matchCriteriaId": "07C73EC4-5F8C-422B-971F-0C8445E72145"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:purestorage:purity\\/\\/fa:6.5.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6B75DE0E-3A1F-401A-85B0-EB7B7C8248D9"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://purestorage.com/security",
|
||||
"source": "psirt@purestorage.com"
|
||||
"source": "psirt@purestorage.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-0005",
|
||||
"sourceIdentifier": "psirt@purestorage.com",
|
||||
"published": "2024-09-23T18:15:05.233",
|
||||
"lastModified": "2024-09-26T13:32:55.343",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-27T15:25:40.980",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "psirt@purestorage.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "psirt@purestorage.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,167 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:purestorage:purity\\/\\/fa:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.0.0",
|
||||
"versionEndIncluding": "5.0.11",
|
||||
"matchCriteriaId": "DB4713BD-F013-4129-B3B8-0B95CE69D8A6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:purestorage:purity\\/\\/fa:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.1.0",
|
||||
"versionEndIncluding": "5.1.17",
|
||||
"matchCriteriaId": "D5C7A1D2-E2AE-4737-AF3D-B46AFA52DBD7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:purestorage:purity\\/\\/fa:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.2.0",
|
||||
"versionEndIncluding": "5.2.7",
|
||||
"matchCriteriaId": "FA0303FA-81E7-41F8-B8F4-AD571E2B8D13"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:purestorage:purity\\/\\/fa:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.3.0",
|
||||
"versionEndIncluding": "5.3.21",
|
||||
"matchCriteriaId": "A1077938-9AEC-446A-BF07-ECEF798889E1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:purestorage:purity\\/\\/fa:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.0.0",
|
||||
"versionEndIncluding": "6.0.9",
|
||||
"matchCriteriaId": "DA37DE8B-32EB-4BDD-808B-0DDF18ADC33C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:purestorage:purity\\/\\/fa:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.1.0",
|
||||
"versionEndIncluding": "6.1.25",
|
||||
"matchCriteriaId": "C01E4DAE-CAA7-4EF9-B47D-B400E36B97F2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:purestorage:purity\\/\\/fa:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2.0",
|
||||
"versionEndIncluding": "6.2.17",
|
||||
"matchCriteriaId": "3311847D-BE5E-4435-9B1B-DF8824DF55B4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:purestorage:purity\\/\\/fa:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.3.0",
|
||||
"versionEndIncluding": "6.3.14",
|
||||
"matchCriteriaId": "A81E5420-C4D6-42CD-93EB-0B0BCB01F918"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:purestorage:purity\\/\\/fa:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.4.0",
|
||||
"versionEndIncluding": "6.4.10",
|
||||
"matchCriteriaId": "07C73EC4-5F8C-422B-971F-0C8445E72145"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:purestorage:purity\\/\\/fa:6.5.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6B75DE0E-3A1F-401A-85B0-EB7B7C8248D9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:purestorage:purity\\/\\/fa:6.6.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4BDB3666-13AA-4908-9CB9-4426A7F6ED56"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:purestorage:purity\\/\\/fb:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.0.0",
|
||||
"versionEndIncluding": "3.0.9",
|
||||
"matchCriteriaId": "2A921EA5-4877-4CA2-AA23-801C56890632"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:purestorage:purity\\/\\/fb:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.1.0",
|
||||
"versionEndIncluding": "3.1.5",
|
||||
"matchCriteriaId": "06BC3E85-9263-4BA8-9B6B-2FCEC0620746"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:purestorage:purity\\/\\/fb:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.2.0",
|
||||
"versionEndIncluding": "3.2.10",
|
||||
"matchCriteriaId": "8BD275B2-1F43-4B7B-9E68-49E0D07FA5B6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:purestorage:purity\\/\\/fb:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.3.0",
|
||||
"versionEndIncluding": "3.3.11",
|
||||
"matchCriteriaId": "46E8FF81-4F41-4B5D-B602-5C32B1B57602"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:purestorage:purity\\/\\/fb:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.0.0",
|
||||
"versionEndIncluding": "4.0.6",
|
||||
"matchCriteriaId": "6491F180-CB5E-4790-B7EF-618840C71E06"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:purestorage:purity\\/\\/fb:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.1.0",
|
||||
"versionEndIncluding": "4.1.10",
|
||||
"matchCriteriaId": "5B9D88CE-6331-4E11-B4C0-5DAD0B73911A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:purestorage:purity\\/\\/fb:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.2.0",
|
||||
"versionEndIncluding": "4.2.3",
|
||||
"matchCriteriaId": "202A85B4-5F81-4559-9326-12830063D99F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:purestorage:purity\\/\\/fb:4.3.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6F372AC2-12D1-4CD7-923E-C8650C102C6C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:purestorage:purity\\/\\/fb:4.3.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D4CEF944-7552-41DF-993E-6D3B1463B548"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://purestorage.com/security",
|
||||
"source": "psirt@purestorage.com"
|
||||
"source": "psirt@purestorage.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
78
CVE-2024/CVE-2024-33xx/CVE-2024-3373.json
Normal file
78
CVE-2024/CVE-2024-33xx/CVE-2024-3373.json
Normal file
@ -0,0 +1,78 @@
|
||||
{
|
||||
"id": "CVE-2024-3373",
|
||||
"sourceIdentifier": "iletisim@usom.gov.tr",
|
||||
"published": "2024-09-27T15:15:14.577",
|
||||
"lastModified": "2024-09-27T15:15:14.577",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in RSM Design Website Template allows SQL Injection.This issue affects Website Template: before 1.2."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "iletisim@usom.gov.tr",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:H/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "HIGH",
|
||||
"vulnerableSystemIntegrity": "LOW",
|
||||
"vulnerableSystemAvailability": "NONE",
|
||||
"subsequentSystemConfidentiality": "HIGH",
|
||||
"subsequentSystemIntegrity": "LOW",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 9.2,
|
||||
"baseSeverity": "CRITICAL"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "iletisim@usom.gov.tr",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.usom.gov.tr/bildirim/tr-24-1563",
|
||||
"source": "iletisim@usom.gov.tr"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-36426",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-05-27T22:15:08.507",
|
||||
"lastModified": "2024-07-03T02:03:11.237",
|
||||
"lastModified": "2024-09-27T15:15:14.377",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -56,6 +56,10 @@
|
||||
"url": "https://community.targit.com/hc/en-us/articles/12618082416028-Change-Log-On-prem",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://community.targit.com/hc/en-us/articles/16112758176156-Vulnerabilities",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/DMCERTCE/DecisionSuite_Token_in_Url",
|
||||
"source": "cve@mitre.org"
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2024-36427",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-05-29T16:15:11.090",
|
||||
"lastModified": "2024-07-03T02:03:12.033",
|
||||
"lastModified": "2024-09-27T15:15:14.483",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The file-serving function in TARGIT Decision Suite 23.2.15007 allows authenticated attackers to read or write to server files via a crafted file request. This can allow code execution via a .xview file."
|
||||
"value": "The file-serving function in TARGIT Decision Suite before 24.06.19002 (TARGIT Decision Suite 2024 \u2013 June) allows authenticated attackers to read or write to server files via a crafted file request. This can allow code execution via a .xview file."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -56,6 +56,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://community.targit.com/hc/en-us/articles/16112758176156-Vulnerabilities",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/DMCERTCE/DecisionSuite_Path_Traversal_SSRF",
|
||||
"source": "cve@mitre.org"
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-36491",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2024-07-17T09:15:03.090",
|
||||
"lastModified": "2024-08-01T13:52:56.787",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-27T14:05:54.037",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -51,18 +81,407 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:centurysys:futurenet_nxr-1300_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "7.4.10",
|
||||
"matchCriteriaId": "93E1B6BE-9BC9-42A1-BAAD-F3B77480E39E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:centurysys:futurenet_nxr-155\\/c_firmware:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CB857995-8BB6-43D8-8312-A07A9B0406EE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:centurysys:futurenet_nxr-610x_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "21.14.11c",
|
||||
"matchCriteriaId": "DAE4D3F9-8AD2-4E7F-A775-C7F9CDB2AF86"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:centurysys:futurenet_nxr-g050_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "21.12.10",
|
||||
"matchCriteriaId": "0A13E427-5D4C-438F-8138-32CFB0891B4A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:centurysys:futurenet_nxr-g060_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "21.15.6",
|
||||
"matchCriteriaId": "201D26E0-8485-4BBD-B5CB-AFAB668A3BCB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:centurysys:futurenet_nxr-g100_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.23.11",
|
||||
"matchCriteriaId": "4236D6DC-2190-4280-9667-DFF95C065800"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:centurysys:futurenet_nxr-g110_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "21.7.32",
|
||||
"matchCriteriaId": "1C488D0A-3B6E-4C8B-9C05-C68E67A26E51"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:centurysys:futurenet_nxr-g120_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "21.15.2c",
|
||||
"matchCriteriaId": "10F93F4E-CFA1-4FE4-9FDB-D9C58B5967A4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:centurysys:futurenet_nxr-g200_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "9.12.16",
|
||||
"matchCriteriaId": "7016BF10-A68A-489E-AEE8-92B7CE768190"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:centurysys:futurenet_vxr-x64:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "21.7.32",
|
||||
"matchCriteriaId": "C4218167-7FDF-4ED7-B776-724504E8E5AF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:centurysys:futurenet_vxr-x86:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.1.5",
|
||||
"matchCriteriaId": "663661B7-9552-4E05-952F-3BD491B30B20"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:centurysys:futurenet_nxr-160\\/lw_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "21.8.4",
|
||||
"matchCriteriaId": "A03D7A97-5D7B-4A10-A83E-07DDEBC5F1F2"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:centurysys:futurenet_nxr-160\\/lw:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "87410133-A2F3-4592-A808-04AFA816953C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:centurysys:futurenet_nxr-230\\/c_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "5.30.13",
|
||||
"matchCriteriaId": "85AD66C6-DF0F-4BC1-B979-C2BB8F09CBC9"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:centurysys:futurenet_nxr-230\\/c:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B8FE0C63-8CF3-485C-8E8E-7C39AA07006F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:centurysys:futurenet_nxr-350\\/c_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "5.30.9c",
|
||||
"matchCriteriaId": "6A40EC07-7E1F-40F8-BE4B-DF03ED12E913"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:centurysys:futurenet_nxr-350\\/c:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B0B53442-E424-4FA2-9049-B66AF2B39200"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:centurysys:futurenet_nxr-530_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "21.11.14",
|
||||
"matchCriteriaId": "CBB1B1A5-A8FF-47E4-B544-407D7EFD39D7"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:centurysys:futurenet_nxr-530:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "35845A42-42A5-4042-BCEA-8015F8CB5C37"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:centurysys:futurenet_nxr-650_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "21.16.2",
|
||||
"matchCriteriaId": "DBFB68AA-BA4A-4DF6-916A-D2597C1B65AE"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:centurysys:futurenet_nxr-650_firmware:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "52675FC8-8A10-4B7F-9581-E7E7A9A79002"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:centurysys:futurenet_nxr-g180\\/l-ca_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "21.7.28c",
|
||||
"matchCriteriaId": "58FE55C1-3266-4183-8DD7-9F73F4B18446"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:centurysys:futurenet_nxr-g180\\/l-ca:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6A0AEA14-2DF2-4E0E-AB16-49DC74F6CC78"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:centurysys:futurenet_nxr-130\\/c_firmware:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E78D5D52-53FD-4F1A-9B39-F43A6A718082"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:centurysys:futurenet_nxr-130\\/c:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E9AE2019-F134-4D0C-991E-613BED91BB7B"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:centurysys:futurenet_nxr-125\\/cx_firmware:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B54CBE1A-E6E0-4C94-A187-B3B16BAF09A8"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:centurysys:futurenet_nxr-125\\/cx_firmware:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B54CBE1A-E6E0-4C94-A187-B3B16BAF09A8"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:centurysys:futurenet_nxr-120\\/c_firmware:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "955F9BBA-FDA1-46C5-ACD9-86661D7C6027"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:centurysys:futurenet_nxr-120\\/c:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EFF4A7DC-3DBB-4CCD-B8B0-F4BFB188C135"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:centurysys:futurenet_wxr-250_firmware:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9F62ECC5-D4AA-4C75-AD1D-8C130E9C7118"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:centurysys:futurenet_wxr-250:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "44B45729-2265-4DB0-BD01-F133C7B2C857"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:centurysys:futurenet_nxr-1200_firmware:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "55D6BD64-221C-48A1-8A54-F41BDDE0A199"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:centurysys:futurenet_nxr-1200:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "70F6FF8E-4303-4213-9603-B81ACA9CEE8E"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://jvn.jp/en/vu/JVNVU96424864/",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
"source": "vultures@jpcert.or.jp",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.centurysys.co.jp/backnumber/nxr_common/20240716-01.html",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
"source": "vultures@jpcert.or.jp",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.centurysys.co.jp/backnumber/nxr_common/20240716-03.html",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
"source": "vultures@jpcert.or.jp",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-37779",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-23T20:15:04.637",
|
||||
"lastModified": "2024-09-26T13:32:55.343",
|
||||
"lastModified": "2024-09-27T14:35:03.517",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -22,20 +22,20 @@
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:L",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 5.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 0.9,
|
||||
"impactScore": 4.7
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -44,6 +44,10 @@
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-75"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
|
25
CVE-2024/CVE-2024-405xx/CVE-2024-40509.json
Normal file
25
CVE-2024/CVE-2024-405xx/CVE-2024-40509.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-40509",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-27T15:15:14.740",
|
||||
"lastModified": "2024-09-27T15:15:14.740",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross Site Scripting vulnerability in openPetra v.2023.02 allows a remote attacker to obtain sensitive information via the serverMFinDev.asmx function."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Jansen-C-Moreira/CVE-2024-40509",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/openpetra/openpetra",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-405xx/CVE-2024-40510.json
Normal file
25
CVE-2024/CVE-2024-405xx/CVE-2024-40510.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-40510",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-27T15:15:14.820",
|
||||
"lastModified": "2024-09-27T15:15:14.820",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross Site Scripting vulnerability in openPetra v.2023.02 allows a remote attacker to obtain sensitive information via the serverMCommon.asmx function."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Jansen-C-Moreira/CVE-2024-405010",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/openpetra/openpetra",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-405xx/CVE-2024-40511.json
Normal file
25
CVE-2024/CVE-2024-405xx/CVE-2024-40511.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-40511",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-27T14:15:04.343",
|
||||
"lastModified": "2024-09-27T14:15:04.343",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross Site Scripting vulnerability in openPetra v.2023.02 allows a remote attacker to obtain sensitive information via the serverMServerAdmin.asmx function."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Jansen-C-Moreira/CVE-2024-40511",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/openpetra/openpetra",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-405xx/CVE-2024-40512.json
Normal file
21
CVE-2024/CVE-2024-405xx/CVE-2024-40512.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-40512",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-27T14:15:04.423",
|
||||
"lastModified": "2024-09-27T14:15:04.423",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross Site Scripting vulnerability in openPetra v.2023.02 allows a remote attacker to obtain sensitive information via the serverMReporting.asmx function."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Jansen-C-Moreira/CVE-2024-40512",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-44053",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-09-15T09:15:02.013",
|
||||
"lastModified": "2024-09-16T15:30:28.733",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-27T15:32:14.153",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mohammadarif:opor_ayam:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "1.8",
|
||||
"matchCriteriaId": "91BB325B-6A20-4D42-83ED-284F10DE5F4E"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/opor-ayam/wordpress-opor-ayam-theme-1-8-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-44059",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-09-15T09:15:04.613",
|
||||
"lastModified": "2024-09-16T15:30:28.733",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-27T15:33:52.013",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mediaron:custom_query_blocks:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "5.3.1",
|
||||
"matchCriteriaId": "E4B9DCA2-83A7-4C4E-B654-71E3753E53D9"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/post-type-archive-mapping/wordpress-custom-query-blocks-plugin-5-3-1-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-44060",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-09-15T08:15:11.367",
|
||||
"lastModified": "2024-09-16T15:30:28.733",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-27T14:04:50.977",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:jenniferhall:filmix:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "1.1",
|
||||
"matchCriteriaId": "9681A64E-012D-485E-A0E6-3F4977F8C687"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/filmix/wordpress-filmix-theme-1-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-44062",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-09-15T08:15:12.710",
|
||||
"lastModified": "2024-09-16T15:30:28.733",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-27T15:49:46.487",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:wpgogo:custom_field_template:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "2.6.6",
|
||||
"matchCriteriaId": "DD78810F-0AAC-4987-AEF0-45F2981DF3CC"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/custom-field-template/wordpress-custom-field-template-plugin-2-6-5-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-44063",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-09-15T08:15:12.940",
|
||||
"lastModified": "2024-09-16T15:30:28.733",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-27T14:31:05.703",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:happyforms:happyforms:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "1.26.1",
|
||||
"matchCriteriaId": "1E36425F-A1F9-4D54-BFA7-6ABF1F342DD7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/happyforms/wordpress-happyforms-plugin-1-26-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-449xx/CVE-2024-44910.json
Normal file
25
CVE-2024/CVE-2024-449xx/CVE-2024-44910.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-44910",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-27T15:15:14.907",
|
||||
"lastModified": "2024-09-27T15:15:14.907",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NASA CryptoLib v1.3.0 was discovered to contain an Out-of-Bounds read via the AOS subsystem (crypto_aos.c)."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/nasa/CryptoLib/issues/268",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://visionspace.com/crashing-cryptolib/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-449xx/CVE-2024-44911.json
Normal file
25
CVE-2024/CVE-2024-449xx/CVE-2024-44911.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-44911",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-27T15:15:14.990",
|
||||
"lastModified": "2024-09-27T15:15:14.990",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NASA CryptoLib v1.3.0 was discovered to contain an Out-of-Bounds read via the TC subsystem (crypto_aos.c)."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/nasa/CryptoLib/issues/268",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://visionspace.com/crashing-cryptolib/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-449xx/CVE-2024-44912.json
Normal file
25
CVE-2024/CVE-2024-449xx/CVE-2024-44912.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-44912",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-27T15:15:15.063",
|
||||
"lastModified": "2024-09-27T15:15:15.063",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NASA CryptoLib v1.3.0 was discovered to contain an Out-of-Bounds read via the TM subsystem (crypto_tm.c)."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/nasa/CryptoLib/issues/268",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://visionspace.com/crashing-cryptolib/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-45459",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-09-15T08:15:13.963",
|
||||
"lastModified": "2024-09-16T15:30:28.733",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-27T14:46:32.483",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:pickplugins:product_slider_for_woocommerce:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "1.13.51",
|
||||
"matchCriteriaId": "9ECBECF4-D49F-4F6C-B48E-62F8CE0C1CC7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/woocommerce-products-slider/wordpress-product-slider-for-woocommerce-by-pickplugins-plugin-1-13-50-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-45460",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-09-15T08:15:14.173",
|
||||
"lastModified": "2024-09-16T15:30:28.733",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-27T14:51:08.120",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:info-d-74:flipping_cards:*:*:*:*:free:wordpress:*:*",
|
||||
"versionEndExcluding": "1.31",
|
||||
"matchCriteriaId": "5C84EBBB-A08E-456D-B040-BBA02ED6D201"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/flipping-cards/wordpress-flipping-cards-plugin-1-30-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
44
CVE-2024/CVE-2024-457xx/CVE-2024-45773.json
Normal file
44
CVE-2024/CVE-2024-457xx/CVE-2024-45773.json
Normal file
@ -0,0 +1,44 @@
|
||||
{
|
||||
"id": "CVE-2024-45773",
|
||||
"sourceIdentifier": "cve-assign@fb.com",
|
||||
"published": "2024-09-27T14:15:04.503",
|
||||
"lastModified": "2024-09-27T15:35:02.620",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A use-after-free vulnerability involving upgradeToRocket requests can cause the application to crash or potentially result in code execution or other undesirable effects. This issue affects Facebook Thrift prior to v2024.09.09.00."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.facebook.com/security/advisories/cve-2024-45773",
|
||||
"source": "cve-assign@fb.com"
|
||||
}
|
||||
]
|
||||
}
|
44
CVE-2024/CVE-2024-458xx/CVE-2024-45863.json
Normal file
44
CVE-2024/CVE-2024-458xx/CVE-2024-45863.json
Normal file
@ -0,0 +1,44 @@
|
||||
{
|
||||
"id": "CVE-2024-45863",
|
||||
"sourceIdentifier": "cve-assign@fb.com",
|
||||
"published": "2024-09-27T14:15:04.567",
|
||||
"lastModified": "2024-09-27T15:35:02.800",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A null-dereference vulnerability involving parsing requests specifying invalid protocols can cause the application to crash or potentially result in other undesirable effects. This issue affects Facebook Thrift from v2024.09.09.00 until v2024.09.23.00."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.facebook.com/security/advisories/cve-2024-45863",
|
||||
"source": "cve-assign@fb.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-45989",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-26T18:15:08.667",
|
||||
"lastModified": "2024-09-26T18:15:08.667",
|
||||
"lastModified": "2024-09-27T15:35:02.983",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Monica AI Assistant desktop application v2.3.0 is vulnerable to Exposure of Sensitive Information to an Unauthorized Actor. A prompt injection allows an attacker to modify chatbot answer with an unloaded image that exfiltrates the user's sensitive chat data of the current session to a malicious third-party or attacker-controlled server."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La aplicaci\u00f3n de escritorio Monica AI Assistant v2.3.0 es vulnerable a la exposici\u00f3n de informaci\u00f3n confidencial a un actor no autorizado. Una inyecci\u00f3n r\u00e1pida permite a un atacante modificar la respuesta del chatbot con una imagen no cargada que filtra los datos confidenciales del chat del usuario de la sesi\u00f3n actual a un servidor malicioso de terceros o controlado por el atacante."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.0,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/soursec/CVEs/tree/main/CVE-2024-45989",
|
||||
|
21
CVE-2024/CVE-2024-463xx/CVE-2024-46331.json
Normal file
21
CVE-2024/CVE-2024-463xx/CVE-2024-46331.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-46331",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-27T15:15:15.200",
|
||||
"lastModified": "2024-09-27T15:15:15.200",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "ModStartCMS v8.8.0 was discovered to contain an open redirect vulnerability in the redirect parameter at /admin/login. This vulnerability allows attackers to redirect users to an arbitrary website via a crafted URL."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/whiteshark2k/ModStartCMS-OpenRedirect/blob/main/ModStartCMS-OpenRedirect.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-463xx/CVE-2024-46333.json
Normal file
21
CVE-2024/CVE-2024-463xx/CVE-2024-46333.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-46333",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-27T15:15:15.283",
|
||||
"lastModified": "2024-09-27T15:15:15.283",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An authenticated cross-site scripting (XSS) vulnerability in Piwigo v14.5.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Album Name parameter under the Add Album function."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/whiteshark2k/Piwigo-XSS/blob/main/Piwigo-XSS.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-46441",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-27T13:15:13.397",
|
||||
"lastModified": "2024-09-27T13:15:13.397",
|
||||
"lastModified": "2024-09-27T15:35:03.803",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "An arbitrary file upload vulnerability in YPay 1.2.0 allows attackers to execute arbitrary code via a ZIP archive to themePutFile in app/common/util/Upload.php (called from app/admin/controller/ypay/Home.php). The file extension of an uncompressed file is not checked."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/kacins/YPay/issues/4",
|
||||
|
25
CVE-2024/CVE-2024-464xx/CVE-2024-46470.json
Normal file
25
CVE-2024/CVE-2024-464xx/CVE-2024-46470.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-46470",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-27T15:15:15.393",
|
||||
"lastModified": "2024-09-27T15:15:15.393",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross Site Scripting vulnerability in CodeAstro Membership Management System 1.0 allows attackers to run malicious JavaScript via the membership_type field in the edit-type.php component."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://codeastro.com/membership-management-system-in-php-with-source-code/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/JonMoriSenpai/CVE-WriteUps/blob/main/CodeAstro%20-%20MembershipM-PHP/CVE-2024-46470/writeup.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-464xx/CVE-2024-46471.json
Normal file
25
CVE-2024/CVE-2024-464xx/CVE-2024-46471.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-46471",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-27T15:15:15.483",
|
||||
"lastModified": "2024-09-27T15:15:15.483",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Directory Listing in /uploads/ Folder in CodeAstro Membership Management System 1.0 exposes the structure and contents of directories, potentially revealing sensitive information."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://codeastro.com/membership-management-system-in-php-with-source-code/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/JonMoriSenpai/CVE-WriteUps/blob/main/CodeAstro%20-%20MembershipM-PHP/CVE-2024-46471/writeup.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-464xx/CVE-2024-46472.json
Normal file
25
CVE-2024/CVE-2024-464xx/CVE-2024-46472.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-46472",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-27T15:15:15.567",
|
||||
"lastModified": "2024-09-27T15:15:15.567",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CodeAstro Membership Management System 1.0 is vulnerable to SQL Injection via the parameter 'email' in the Login Page."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://codeastro.com/membership-management-system-in-php-with-source-code/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/JonMoriSenpai/CVE-WriteUps/blob/main/CodeAstro%20-%20MembershipM-PHP/CVE-2024-46472/writeup.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-46627",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-26T17:15:04.190",
|
||||
"lastModified": "2024-09-26T17:15:04.190",
|
||||
"lastModified": "2024-09-27T15:35:04.583",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Incorrect access control in BECN DATAGERRY v2.2 allows attackers to execute arbitrary commands via crafted web requests."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El control de acceso incorrecto en BECN DATAGERRY v2.2 permite a los atacantes ejecutar comandos arbitrarios a trav\u00e9s de solicitudes web manipuladas."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 9.1,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://daly.wtf/cve-2024-46627-incorrect-access-control-in-becn-datagerry-v2-2-allows-attackers-to-execute-arbitrary-commands-via-crafted-web-requests/",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-47050",
|
||||
"sourceIdentifier": "security@mautic.org",
|
||||
"published": "2024-09-18T21:15:13.743",
|
||||
"lastModified": "2024-09-20T12:30:17.483",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-27T15:29:21.450",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "security@mautic.org",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security@mautic.org",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,39 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:acquia:mautic:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2.6.0",
|
||||
"versionEndExcluding": "4.4.13",
|
||||
"matchCriteriaId": "BE9F17BE-23A1-4088-9B04-27DE04CC756E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:acquia:mautic:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.0.0",
|
||||
"versionEndExcluding": "5.1.1",
|
||||
"matchCriteriaId": "FC060988-1D0C-4CB2-A052-A0BCCD236381"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/mautic/mautic/security/advisories/GHSA-73gr-32wg-qhh7",
|
||||
"source": "security@mautic.org"
|
||||
"source": "security@mautic.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-47058",
|
||||
"sourceIdentifier": "security@mautic.org",
|
||||
"published": "2024-09-18T21:15:13.923",
|
||||
"lastModified": "2024-09-20T12:30:17.483",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-27T15:31:30.917",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "security@mautic.org",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security@mautic.org",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,39 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:acquia:mautic:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "1.0.0",
|
||||
"versionEndExcluding": "4.4.13",
|
||||
"matchCriteriaId": "E6555B3F-97C3-4192-BB29-BEDD3C63C4AB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:acquia:mautic:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.0.0",
|
||||
"versionEndExcluding": "5.1.1",
|
||||
"matchCriteriaId": "FC060988-1D0C-4CB2-A052-A0BCCD236381"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/mautic/mautic/security/advisories/GHSA-xv68-rrmw-9xwf",
|
||||
"source": "security@mautic.org"
|
||||
"source": "security@mautic.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-471xx/CVE-2024-47182.json
Normal file
60
CVE-2024/CVE-2024-471xx/CVE-2024-47182.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-47182",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-09-27T14:15:04.620",
|
||||
"lastModified": "2024-09-27T14:15:04.620",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Dozzle is a realtime log viewer for docker containers. Before version 8.5.3, the app uses sha-256 as the hash for passwords, which leaves users susceptible to rainbow table attacks. The app switches to bcrypt, a more appropriate hash for passwords, in version 8.5.3."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-328"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/amir20/dozzle/commit/de79f03aa3dbe5bb1e154a7e8d3dccbd229f3ea3",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/amir20/dozzle/security/advisories/GHSA-w7qr-q9fh-fj35",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2024/CVE-2024-471xx/CVE-2024-47184.json
Normal file
64
CVE-2024/CVE-2024-471xx/CVE-2024-47184.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2024-47184",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-09-27T14:15:04.833",
|
||||
"lastModified": "2024-09-27T14:15:04.833",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Ampache is a web based audio/video streaming application and file manager. Prior to version 6.6.0, the Democratic Playlist Name is vulnerable to a stored cross-site scripting. Version 6.6.0 fixes this issue."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ampache/ampache/blob/ff332c9810e493fd51b258f5e53119fad86c23bf/public/templates/show_democratic.inc.php#L36",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/ampache/ampache/commit/7e64d140dafcbe0d61f1a07e94486f6ed67932d6",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/ampache/ampache/security/advisories/GHSA-f99r-gv34-v46f",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-6339",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-08-21T08:15:04.333",
|
||||
"lastModified": "2024-08-21T12:30:33.697",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-27T14:04:31.700",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -40,6 +40,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
@ -51,18 +61,45 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:averta:phlox:*:*:*:*:pro:wordpress:*:*",
|
||||
"versionEndExcluding": "5.16.5",
|
||||
"matchCriteriaId": "FE39DFDE-C634-4941-AFE2-B9E6A861B4DB"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/skmorshed75/ferdykorp/blob/9176d0782558ac2bd620777174e942cefc27fb21/wp-content/themes/phlox/templates/theme-parts/entry/search-advanced.php#L69",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://owasp.org/www-community/attacks/xss/",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Technical Description"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2b5ad113-f739-455a-9db6-b4f300b92837?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
80
CVE-2024/CVE-2024-71xx/CVE-2024-7149.json
Normal file
80
CVE-2024/CVE-2024-71xx/CVE-2024-7149.json
Normal file
@ -0,0 +1,80 @@
|
||||
{
|
||||
"id": "CVE-2024-7149",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-09-27T14:15:05.043",
|
||||
"lastModified": "2024-09-27T14:15:05.043",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Event Manager, Events Calendar, Tickets, Registrations \u2013 Eventin plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 4.0.8 via multiple style parameters. This makes it possible for authenticated attackers, with Contributor-level access and above, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other \u201csafe\u201d file types can be uploaded and included."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/wp-event-solution/trunk/widgets/events-tab/style/tab-1.php#L42",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/wp-event-solution/trunk/widgets/events/events.php#L754",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/wp-event-solution/trunk/widgets/schedule-list/schedule-list.php#L293",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/wp-event-solution/trunk/widgets/schedule/schedule.php#L368",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/wp-event-solution/trunk/widgets/speakers/speakers.php#L483",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3157415/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/75537b61-5622-4b35-b80e-389526bd99f0?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-8724",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-09-14T04:15:05.210",
|
||||
"lastModified": "2024-09-14T11:47:14.677",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-27T15:56:00.073",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,18 +51,45 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xootix:waitlist_woocommerce:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "2.7.6",
|
||||
"matchCriteriaId": "27DAA46C-B938-4473-B208-9E65695FB375"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/waitlist-woocommerce/trunk/admin/templates/xoo-wl-import-form.php#L8",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3151186%40waitlist-woocommerce&new=3151186%40waitlist-woocommerce&sfp_email=&sfph_mail=",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c298c87e-cf3c-4b72-bb0e-a01ca2dfe52f?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-8758",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-09-23T06:15:04.310",
|
||||
"lastModified": "2024-09-26T13:32:55.343",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-27T14:29:23.157",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,11 +15,67 @@
|
||||
"value": "El complemento Quiz and Survey Master (QSM) de WordPress anterior a la versi\u00f3n 9.1.3 no desinfecta ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir que usuarios con privilegios elevados, como el administrador, realicen ataques de cross site scripting almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n multisitio)."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:expresstech:quiz_and_survey_master:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "9.1.3",
|
||||
"matchCriteriaId": "80FE4D50-5C5B-4EE9-BE6E-F2CC7CA7E814"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/d74ecae2-3a1e-4fc7-9dd3-04cef631ecd9/",
|
||||
"source": "contact@wpscan.com"
|
||||
"source": "contact@wpscan.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-8797",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-09-14T06:15:10.317",
|
||||
"lastModified": "2024-09-14T11:47:14.677",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-27T14:02:23.700",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,18 +51,45 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:wpbookingsystem:wp_booking_system:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "2.0.19.9",
|
||||
"matchCriteriaId": "EAF5634D-A93B-49F2-A435-0EF0B563B767"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/wp-booking-system/tags/2.0.19.10/includes/modules/update-checker/views/view-register-website.php#L21",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3150487%40wp-booking-system&new=3150487%40wp-booking-system&sfp_email=&sfph_mail=",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1bea55b5-b2d7-4eaf-8868-d2645ce18619?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-9033",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-09-20T15:15:18.037",
|
||||
"lastModified": "2024-09-26T13:32:55.343",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-27T15:56:35.317",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -120,26 +140,63 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mayurik:best_house_rental_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A7D6CEC7-5EE1-4052-B0E2-093C40418760"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/para-paradise/webray.com.cn/blob/main/Best%20house%20rental%20management%20system%20project%20in%20php/Best%20house%20rental%20management%20system%20project%20in%20php%20Stored%20Cross-Site%20Scripting(XSS)%20vulnerability.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.278203",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.278203",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.410977",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.sourcecodester.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-9039",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-09-20T16:15:06.153",
|
||||
"lastModified": "2024-09-26T13:32:55.343",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-27T15:58:22.493",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -120,26 +140,63 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mayurik:best_house_rental_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A7D6CEC7-5EE1-4052-B0E2-093C40418760"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/para-paradise/webray.com.cn/blob/main/Best%20house%20rental%20management%20system%20project%20in%20php/Best%20house%20rental%20management%20system%20signup%20time-based%20SQL%20Injection%20Vulnerability.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.278210",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.278210",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.411471",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.sourcecodester.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-9040",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-09-20T17:15:15.240",
|
||||
"lastModified": "2024-09-26T13:32:55.343",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-27T15:53:28.333",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -110,8 +130,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-312"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -120,18 +150,47 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:code-projects:blood_bank_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0E2D99E2-B236-4096-ACA2-8907C29756B6"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://code-projects.org/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.278211",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.278211",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-9041",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-09-20T17:15:15.507",
|
||||
"lastModified": "2024-09-26T13:32:55.343",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-27T15:57:55.073",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -109,6 +129,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -120,26 +150,63 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mayurik:best_house_rental_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A7D6CEC7-5EE1-4052-B0E2-093C40418760"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/para-paradise/webray.com.cn/blob/main/Best%20house%20rental%20management%20system%20project%20in%20php/Best%20house%20rental%20management%20system%20update_account%20time-based%20SQL%20Injection%20Vulnerability.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.278212",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.278212",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.411502",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.sourcecodester.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-9094",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-09-23T02:15:02.290",
|
||||
"lastModified": "2024-09-26T13:32:55.343",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-27T15:54:09.463",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -120,26 +140,63 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:code-projects:blood_bank_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CB3CB4C2-E5C6-4136-B3A8-418484B48FD2"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://code-projects.org/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/ByKevin1/CVE/blob/main/sql1.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.278272",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.278272",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.412254",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
137
CVE-2024/CVE-2024-92xx/CVE-2024-9283.json
Normal file
137
CVE-2024/CVE-2024-92xx/CVE-2024-9283.json
Normal file
@ -0,0 +1,137 @@
|
||||
{
|
||||
"id": "CVE-2024-9283",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-09-27T14:15:05.330",
|
||||
"lastModified": "2024-09-27T14:15:05.330",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as problematic has been found in RelaxedJS ReLaXed up to 0.2.2. Affected is an unknown function of the component Pug to PDF Converter. The manipulation leads to cross site scripting. An attack has to be approached locally. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "NONE",
|
||||
"vulnerableSystemIntegrity": "LOW",
|
||||
"vulnerableSystemAvailability": "NONE",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 3.3,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:L/AC:L/Au:S/C:N/I:P/A:N",
|
||||
"accessVector": "LOCAL",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 1.7
|
||||
},
|
||||
"baseSeverity": "LOW",
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://drive.google.com/file/d/1Ll1dRwQds8987S-l5o2iJu4MQRG-p4-A/view?usp=sharing",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.278676",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.278676",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.411185",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
104
README.md
104
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-09-27T14:00:19.191603+00:00
|
||||
2024-09-27T16:00:19.047040+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-09-27T13:58:36.483000+00:00
|
||||
2024-09-27T15:58:22.493000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,69 +33,63 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
264013
|
||||
264032
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `77`
|
||||
Recently added CVEs: `19`
|
||||
|
||||
- [CVE-2024-46853](CVE-2024/CVE-2024-468xx/CVE-2024-46853.json) (`2024-09-27T13:15:16.997`)
|
||||
- [CVE-2024-46854](CVE-2024/CVE-2024-468xx/CVE-2024-46854.json) (`2024-09-27T13:15:17.063`)
|
||||
- [CVE-2024-46855](CVE-2024/CVE-2024-468xx/CVE-2024-46855.json) (`2024-09-27T13:15:17.133`)
|
||||
- [CVE-2024-46856](CVE-2024/CVE-2024-468xx/CVE-2024-46856.json) (`2024-09-27T13:15:17.210`)
|
||||
- [CVE-2024-46857](CVE-2024/CVE-2024-468xx/CVE-2024-46857.json) (`2024-09-27T13:15:17.277`)
|
||||
- [CVE-2024-46858](CVE-2024/CVE-2024-468xx/CVE-2024-46858.json) (`2024-09-27T13:15:17.353`)
|
||||
- [CVE-2024-46859](CVE-2024/CVE-2024-468xx/CVE-2024-46859.json) (`2024-09-27T13:15:17.430`)
|
||||
- [CVE-2024-46860](CVE-2024/CVE-2024-468xx/CVE-2024-46860.json) (`2024-09-27T13:15:17.493`)
|
||||
- [CVE-2024-46861](CVE-2024/CVE-2024-468xx/CVE-2024-46861.json) (`2024-09-27T13:15:17.563`)
|
||||
- [CVE-2024-46862](CVE-2024/CVE-2024-468xx/CVE-2024-46862.json) (`2024-09-27T13:15:17.627`)
|
||||
- [CVE-2024-46863](CVE-2024/CVE-2024-468xx/CVE-2024-46863.json) (`2024-09-27T13:15:17.690`)
|
||||
- [CVE-2024-46864](CVE-2024/CVE-2024-468xx/CVE-2024-46864.json) (`2024-09-27T13:15:17.747`)
|
||||
- [CVE-2024-46865](CVE-2024/CVE-2024-468xx/CVE-2024-46865.json) (`2024-09-27T13:15:17.820`)
|
||||
- [CVE-2024-46866](CVE-2024/CVE-2024-468xx/CVE-2024-46866.json) (`2024-09-27T13:15:17.887`)
|
||||
- [CVE-2024-46867](CVE-2024/CVE-2024-468xx/CVE-2024-46867.json) (`2024-09-27T13:15:17.937`)
|
||||
- [CVE-2024-46868](CVE-2024/CVE-2024-468xx/CVE-2024-46868.json) (`2024-09-27T13:15:18.007`)
|
||||
- [CVE-2024-8607](CVE-2024/CVE-2024-86xx/CVE-2024-8607.json) (`2024-09-27T12:15:03.617`)
|
||||
- [CVE-2024-8608](CVE-2024/CVE-2024-86xx/CVE-2024-8608.json) (`2024-09-27T12:15:03.823`)
|
||||
- [CVE-2024-8609](CVE-2024/CVE-2024-86xx/CVE-2024-8609.json) (`2024-09-27T12:15:03.997`)
|
||||
- [CVE-2024-8643](CVE-2024/CVE-2024-86xx/CVE-2024-8643.json) (`2024-09-27T12:15:04.210`)
|
||||
- [CVE-2024-8644](CVE-2024/CVE-2024-86xx/CVE-2024-8644.json) (`2024-09-27T12:15:04.390`)
|
||||
- [CVE-2024-9279](CVE-2024/CVE-2024-92xx/CVE-2024-9279.json) (`2024-09-27T12:15:04.857`)
|
||||
- [CVE-2024-9280](CVE-2024/CVE-2024-92xx/CVE-2024-9280.json) (`2024-09-27T12:15:05.227`)
|
||||
- [CVE-2024-9281](CVE-2024/CVE-2024-92xx/CVE-2024-9281.json) (`2024-09-27T13:15:18.153`)
|
||||
- [CVE-2024-9282](CVE-2024/CVE-2024-92xx/CVE-2024-9282.json) (`2024-09-27T13:15:18.443`)
|
||||
- [CVE-2024-3373](CVE-2024/CVE-2024-33xx/CVE-2024-3373.json) (`2024-09-27T15:15:14.577`)
|
||||
- [CVE-2024-40509](CVE-2024/CVE-2024-405xx/CVE-2024-40509.json) (`2024-09-27T15:15:14.740`)
|
||||
- [CVE-2024-40510](CVE-2024/CVE-2024-405xx/CVE-2024-40510.json) (`2024-09-27T15:15:14.820`)
|
||||
- [CVE-2024-40511](CVE-2024/CVE-2024-405xx/CVE-2024-40511.json) (`2024-09-27T14:15:04.343`)
|
||||
- [CVE-2024-40512](CVE-2024/CVE-2024-405xx/CVE-2024-40512.json) (`2024-09-27T14:15:04.423`)
|
||||
- [CVE-2024-44910](CVE-2024/CVE-2024-449xx/CVE-2024-44910.json) (`2024-09-27T15:15:14.907`)
|
||||
- [CVE-2024-44911](CVE-2024/CVE-2024-449xx/CVE-2024-44911.json) (`2024-09-27T15:15:14.990`)
|
||||
- [CVE-2024-44912](CVE-2024/CVE-2024-449xx/CVE-2024-44912.json) (`2024-09-27T15:15:15.063`)
|
||||
- [CVE-2024-45773](CVE-2024/CVE-2024-457xx/CVE-2024-45773.json) (`2024-09-27T14:15:04.503`)
|
||||
- [CVE-2024-45863](CVE-2024/CVE-2024-458xx/CVE-2024-45863.json) (`2024-09-27T14:15:04.567`)
|
||||
- [CVE-2024-46331](CVE-2024/CVE-2024-463xx/CVE-2024-46331.json) (`2024-09-27T15:15:15.200`)
|
||||
- [CVE-2024-46333](CVE-2024/CVE-2024-463xx/CVE-2024-46333.json) (`2024-09-27T15:15:15.283`)
|
||||
- [CVE-2024-46470](CVE-2024/CVE-2024-464xx/CVE-2024-46470.json) (`2024-09-27T15:15:15.393`)
|
||||
- [CVE-2024-46471](CVE-2024/CVE-2024-464xx/CVE-2024-46471.json) (`2024-09-27T15:15:15.483`)
|
||||
- [CVE-2024-46472](CVE-2024/CVE-2024-464xx/CVE-2024-46472.json) (`2024-09-27T15:15:15.567`)
|
||||
- [CVE-2024-47182](CVE-2024/CVE-2024-471xx/CVE-2024-47182.json) (`2024-09-27T14:15:04.620`)
|
||||
- [CVE-2024-47184](CVE-2024/CVE-2024-471xx/CVE-2024-47184.json) (`2024-09-27T14:15:04.833`)
|
||||
- [CVE-2024-7149](CVE-2024/CVE-2024-71xx/CVE-2024-7149.json) (`2024-09-27T14:15:05.043`)
|
||||
- [CVE-2024-9283](CVE-2024/CVE-2024-92xx/CVE-2024-9283.json) (`2024-09-27T14:15:05.330`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `25`
|
||||
Recently modified CVEs: `36`
|
||||
|
||||
- [CVE-2018-20072](CVE-2018/CVE-2018-200xx/CVE-2018-20072.json) (`2024-09-27T13:46:14.200`)
|
||||
- [CVE-2022-2654](CVE-2022/CVE-2022-26xx/CVE-2022-2654.json) (`2024-09-27T12:41:32.027`)
|
||||
- [CVE-2022-2655](CVE-2022/CVE-2022-26xx/CVE-2022-2655.json) (`2024-09-27T12:41:32.027`)
|
||||
- [CVE-2023-3410](CVE-2023/CVE-2023-34xx/CVE-2023-3410.json) (`2024-09-27T13:58:36.483`)
|
||||
- [CVE-2023-37387](CVE-2023/CVE-2023-373xx/CVE-2023-37387.json) (`2024-09-27T12:41:32.027`)
|
||||
- [CVE-2023-43667](CVE-2023/CVE-2023-436xx/CVE-2023-43667.json) (`2024-09-27T12:15:02.820`)
|
||||
- [CVE-2024-0607](CVE-2024/CVE-2024-06xx/CVE-2024-0607.json) (`2024-09-27T13:15:12.057`)
|
||||
- [CVE-2024-41605](CVE-2024/CVE-2024-416xx/CVE-2024-41605.json) (`2024-09-27T13:15:13.227`)
|
||||
- [CVE-2024-6386](CVE-2024/CVE-2024-63xx/CVE-2024-6386.json) (`2024-09-27T13:25:43.077`)
|
||||
- [CVE-2024-6482](CVE-2024/CVE-2024-64xx/CVE-2024-6482.json) (`2024-09-27T13:54:53.837`)
|
||||
- [CVE-2024-7258](CVE-2024/CVE-2024-72xx/CVE-2024-7258.json) (`2024-09-27T13:05:06.930`)
|
||||
- [CVE-2024-7351](CVE-2024/CVE-2024-73xx/CVE-2024-7351.json) (`2024-09-27T12:48:20.803`)
|
||||
- [CVE-2024-7384](CVE-2024/CVE-2024-73xx/CVE-2024-7384.json) (`2024-09-27T13:15:28.443`)
|
||||
- [CVE-2024-7836](CVE-2024/CVE-2024-78xx/CVE-2024-7836.json) (`2024-09-27T12:53:58.200`)
|
||||
- [CVE-2024-7888](CVE-2024/CVE-2024-78xx/CVE-2024-7888.json) (`2024-09-27T13:45:33.030`)
|
||||
- [CVE-2024-8432](CVE-2024/CVE-2024-84xx/CVE-2024-8432.json) (`2024-09-27T12:58:58.433`)
|
||||
- [CVE-2024-8544](CVE-2024/CVE-2024-85xx/CVE-2024-8544.json) (`2024-09-27T12:57:21.617`)
|
||||
- [CVE-2024-8657](CVE-2024/CVE-2024-86xx/CVE-2024-8657.json) (`2024-09-27T12:56:20.197`)
|
||||
- [CVE-2024-8662](CVE-2024/CVE-2024-86xx/CVE-2024-8662.json) (`2024-09-27T12:54:36.160`)
|
||||
- [CVE-2024-8664](CVE-2024/CVE-2024-86xx/CVE-2024-8664.json) (`2024-09-27T13:48:58.270`)
|
||||
- [CVE-2024-8680](CVE-2024/CVE-2024-86xx/CVE-2024-8680.json) (`2024-09-27T13:53:47.910`)
|
||||
- [CVE-2024-8770](CVE-2024/CVE-2024-87xx/CVE-2024-8770.json) (`2024-09-27T13:49:29.690`)
|
||||
- [CVE-2024-9029](CVE-2024/CVE-2024-90xx/CVE-2024-9029.json) (`2024-09-27T13:15:18.060`)
|
||||
- [CVE-2024-9276](CVE-2024/CVE-2024-92xx/CVE-2024-9276.json) (`2024-09-27T12:15:04.590`)
|
||||
- [CVE-2024-9277](CVE-2024/CVE-2024-92xx/CVE-2024-9277.json) (`2024-09-27T12:15:04.733`)
|
||||
- [CVE-2024-36426](CVE-2024/CVE-2024-364xx/CVE-2024-36426.json) (`2024-09-27T15:15:14.377`)
|
||||
- [CVE-2024-36427](CVE-2024/CVE-2024-364xx/CVE-2024-36427.json) (`2024-09-27T15:15:14.483`)
|
||||
- [CVE-2024-36491](CVE-2024/CVE-2024-364xx/CVE-2024-36491.json) (`2024-09-27T14:05:54.037`)
|
||||
- [CVE-2024-37779](CVE-2024/CVE-2024-377xx/CVE-2024-37779.json) (`2024-09-27T14:35:03.517`)
|
||||
- [CVE-2024-44053](CVE-2024/CVE-2024-440xx/CVE-2024-44053.json) (`2024-09-27T15:32:14.153`)
|
||||
- [CVE-2024-44059](CVE-2024/CVE-2024-440xx/CVE-2024-44059.json) (`2024-09-27T15:33:52.013`)
|
||||
- [CVE-2024-44060](CVE-2024/CVE-2024-440xx/CVE-2024-44060.json) (`2024-09-27T14:04:50.977`)
|
||||
- [CVE-2024-44062](CVE-2024/CVE-2024-440xx/CVE-2024-44062.json) (`2024-09-27T15:49:46.487`)
|
||||
- [CVE-2024-44063](CVE-2024/CVE-2024-440xx/CVE-2024-44063.json) (`2024-09-27T14:31:05.703`)
|
||||
- [CVE-2024-45459](CVE-2024/CVE-2024-454xx/CVE-2024-45459.json) (`2024-09-27T14:46:32.483`)
|
||||
- [CVE-2024-45460](CVE-2024/CVE-2024-454xx/CVE-2024-45460.json) (`2024-09-27T14:51:08.120`)
|
||||
- [CVE-2024-45989](CVE-2024/CVE-2024-459xx/CVE-2024-45989.json) (`2024-09-27T15:35:02.983`)
|
||||
- [CVE-2024-46441](CVE-2024/CVE-2024-464xx/CVE-2024-46441.json) (`2024-09-27T15:35:03.803`)
|
||||
- [CVE-2024-46627](CVE-2024/CVE-2024-466xx/CVE-2024-46627.json) (`2024-09-27T15:35:04.583`)
|
||||
- [CVE-2024-47050](CVE-2024/CVE-2024-470xx/CVE-2024-47050.json) (`2024-09-27T15:29:21.450`)
|
||||
- [CVE-2024-47058](CVE-2024/CVE-2024-470xx/CVE-2024-47058.json) (`2024-09-27T15:31:30.917`)
|
||||
- [CVE-2024-6339](CVE-2024/CVE-2024-63xx/CVE-2024-6339.json) (`2024-09-27T14:04:31.700`)
|
||||
- [CVE-2024-8724](CVE-2024/CVE-2024-87xx/CVE-2024-8724.json) (`2024-09-27T15:56:00.073`)
|
||||
- [CVE-2024-8758](CVE-2024/CVE-2024-87xx/CVE-2024-8758.json) (`2024-09-27T14:29:23.157`)
|
||||
- [CVE-2024-8797](CVE-2024/CVE-2024-87xx/CVE-2024-8797.json) (`2024-09-27T14:02:23.700`)
|
||||
- [CVE-2024-9033](CVE-2024/CVE-2024-90xx/CVE-2024-9033.json) (`2024-09-27T15:56:35.317`)
|
||||
- [CVE-2024-9039](CVE-2024/CVE-2024-90xx/CVE-2024-9039.json) (`2024-09-27T15:58:22.493`)
|
||||
- [CVE-2024-9040](CVE-2024/CVE-2024-90xx/CVE-2024-9040.json) (`2024-09-27T15:53:28.333`)
|
||||
- [CVE-2024-9041](CVE-2024/CVE-2024-90xx/CVE-2024-9041.json) (`2024-09-27T15:57:55.073`)
|
||||
- [CVE-2024-9094](CVE-2024/CVE-2024-90xx/CVE-2024-9094.json) (`2024-09-27T15:54:09.463`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
293
_state.csv
293
_state.csv
@ -119804,7 +119804,7 @@ CVE-2018-20069,0,0,11bc93eea8bb89572a3bd36663041753b964c1c6d0a90165ac577803d8a50
|
||||
CVE-2018-2007,0,0,565467276fe44a3f15a91812729e4906725f8695b7cf0f77483bbe03d129ee49,2019-10-09T23:39:52.730000
|
||||
CVE-2018-20070,0,0,03232b88ab51a82264c607ac6ddda028d6465275684647122ee5364cac67abd0,2023-11-07T02:56:10.180000
|
||||
CVE-2018-20071,0,0,90965273047f10e0d8d69b9c814771631b60b51165a9de872bb0ed9ef11095f1,2023-11-07T02:56:10.587000
|
||||
CVE-2018-20072,0,1,66895fe5dbbefb976e51c639bf2287e2f7530704c434a3c39bb782fac3372a20,2024-09-27T13:46:14.200000
|
||||
CVE-2018-20072,0,0,66895fe5dbbefb976e51c639bf2287e2f7530704c434a3c39bb782fac3372a20,2024-09-27T13:46:14.200000
|
||||
CVE-2018-20073,0,0,bc57833279c555f0e533969c7045cf9a8e9407b023f53f7ee293163f1ee32b6c,2023-11-07T02:56:11.007000
|
||||
CVE-2018-2008,0,0,07a804601246a33e30397a194dbd639013dc206b3cb23cc4623aa0a99dd0630f,2019-06-21T08:15:09.263000
|
||||
CVE-2018-2009,0,0,4c00f8e3d18d8dc4e0cbb9b0148327ad6c8a63123dc008abedfcc4523c43385e,2019-10-09T23:39:52.963000
|
||||
@ -172860,7 +172860,7 @@ CVE-2021-27913,0,0,167d05a43c4b8a3a9a5f9095ae1170cc5f9466459db5849cf91ef768c53d5
|
||||
CVE-2021-27914,0,0,675b39026c04fc757a33b18eab7c2aa058775623331c1d7c9d085c842a052b1d,2022-06-08T18:45:22.737000
|
||||
CVE-2021-27915,0,0,42170d064d1b01652cdc11eb30f626387eda85d27a5f861e99cddbeae26cfb9b,2024-09-20T12:30:51.220000
|
||||
CVE-2021-27916,0,0,17a56e0b9e95a77b85369601e6daab8e12801e4f3a1e07f75ef096207d8313df,2024-09-20T12:30:51.220000
|
||||
CVE-2021-27917,0,0,91b2b1a67d397df9112f7f1e87e1fdf982c5590731c372073735b88709378af9,2024-09-20T12:30:17.483000
|
||||
CVE-2021-27917,0,1,5465a3d7f25a5154d30a82cd6f06e15430a49f302876406aa605d64d13a082bc,2024-09-27T15:13:58.927000
|
||||
CVE-2021-27918,0,0,0518da32da0b62ea5fcb12a67bfb4a45de87702f6745ca2fb1540144faa372aa,2022-12-13T16:28:13.860000
|
||||
CVE-2021-27919,0,0,ff72fa8dcdbe5235ea458afc8e87af812a5a4a7f37cb1ded6eeda83ce3037733,2023-11-07T03:32:02.603000
|
||||
CVE-2021-27921,0,0,b11f4653b3d8f81de77297ff4168966513573360c29446471f5cf2f2df9fb5e0,2023-11-07T03:32:02.670000
|
||||
@ -195290,9 +195290,9 @@ CVE-2022-26532,0,0,ef1f53bec7cd938f0fc7efa86c052e137d736ccccadff52fb6a13546be412
|
||||
CVE-2022-26533,0,0,bb92300777958a5a7510dcaeeef8ce7b67362c1a7a1b915428c93b3d7bb7e66f,2022-03-18T19:58:14.610000
|
||||
CVE-2022-26534,0,0,7607f3f2030ed7a621be029b2845faa377ce78bdd1fde2d378108d5b725cf8e4,2022-03-28T16:54:25.937000
|
||||
CVE-2022-26536,0,0,48cfdf45132d6db4b74c639dca3c8a127553777c461cb23d81065c74ca7e9e9d,2023-08-08T14:21:49.707000
|
||||
CVE-2022-2654,0,1,f396027d6b6cb31c17eecd41823687a0c5ff9b697f666b6aa2e725954f8ea619,2024-09-27T12:41:32.027000
|
||||
CVE-2022-2654,0,0,f396027d6b6cb31c17eecd41823687a0c5ff9b697f666b6aa2e725954f8ea619,2024-09-27T12:41:32.027000
|
||||
CVE-2022-26546,0,0,70d97b0459ba7ac38ffb449469c101683bd6595e3838ee0f52b348a6ea3a0c10,2022-05-12T19:35:07.200000
|
||||
CVE-2022-2655,0,1,60e16880aa17bb9f0220460048bf959621589bcf00b392ee2c95e1531d9d2fe3,2024-09-27T12:41:32.027000
|
||||
CVE-2022-2655,0,0,60e16880aa17bb9f0220460048bf959621589bcf00b392ee2c95e1531d9d2fe3,2024-09-27T12:41:32.027000
|
||||
CVE-2022-26555,0,0,6c5f8f57b2b5a4ade345ca0403b4cdd1b48ce7ee8309194cd709ddd0c76a598e,2022-03-28T19:06:36.367000
|
||||
CVE-2022-2656,0,0,d353fd96bf9e318a4657ba3af12eec0f939fd7ca4776c9e36cc4e3bb543a712c,2022-08-10T13:49:53.237000
|
||||
CVE-2022-26562,0,0,d2c5bef243485f583f5bb14c442b3fbd66b4dbfe5ec07ff1c48fc480990b11db,2023-05-11T16:15:09.383000
|
||||
@ -217028,7 +217028,7 @@ CVE-2023-22857,0,0,c355620e2479df747f0589cb26b3d2704bc4ddc70516b9d833a2fb3cdbb1b
|
||||
CVE-2023-22858,0,0,c51b1c58373447736b339979c0cd8eec35b38a042f18766d2b1fd49498a95aaf,2023-03-13T17:10:21.097000
|
||||
CVE-2023-2286,0,0,1f3353a3a315adb845529330015e9ce8864f0158ed8ab4c7cb3d2cfcc0ca3389,2023-11-07T04:12:19.830000
|
||||
CVE-2023-22860,0,0,e5e135b9674556a090cbecca9fa7c567b235bca14cbb34e3eb90aa72a2160933,2023-11-07T04:07:28.347000
|
||||
CVE-2023-22862,0,0,05449e51595973893d8a13c570399c0a2b9b1df6cf4a71fa04b4a2b53c158d53,2023-06-09T22:54:45.870000
|
||||
CVE-2023-22862,0,1,f7a792581d09834d560f331e1a7daa8fabe3535c3a2819a7176f525c510d8a7b,2024-09-27T15:15:13.980000
|
||||
CVE-2023-22863,0,0,eef13872dcc72c29441a13e545d52e388fbbb82264278ec473965ca583f73a1e,2023-11-07T04:07:28.470000
|
||||
CVE-2023-22868,0,0,fb313b905f7277fd22744805199c6cdc3dd75128e6089a55e506c1a8c3c89032,2023-11-07T04:07:28.557000
|
||||
CVE-2023-22869,0,0,0b1c932385533c41094a23d57a51a60252be8b5ce8ca76a98f2df3005d5300d7,2024-04-19T16:19:49.043000
|
||||
@ -221922,7 +221922,7 @@ CVE-2023-28950,0,0,9133c3c97285d27a9c361338788bfba5bbe876a6ea55c9317154f247d2ab3
|
||||
CVE-2023-28952,0,0,7bb7b02237cc68b28c2b8c1c921a60e0855068ce1576afd1477241c9719e30ef,2024-05-06T12:44:56.377000
|
||||
CVE-2023-28953,0,0,9152bad62701af3dcb4a06b73561f371a642d3ba8e03588f162fd93ea98fb557,2023-08-14T19:15:10.920000
|
||||
CVE-2023-28955,0,0,3e244298f322008056261d3880e4eb3494c2c0616dd04376eb8f67759d88a60b,2023-07-13T19:20:17.480000
|
||||
CVE-2023-28956,0,0,9fe9052f1d4ce9f854c1f204f10a7b1c11248ffad32bcc5e7ccc2468ef144211,2023-06-28T14:51:02.947000
|
||||
CVE-2023-28956,0,1,ab5cf6ffbd43159b44cd3913a21ecafe2bafd08c86ac8625b76025c7d3a630ce,2024-09-27T14:15:03.340000
|
||||
CVE-2023-28958,0,0,66cbf0468ddb2f2a8a12cfed2cc67512ea0b7b40c244bf41465f6a2b8878dc1f,2023-07-13T19:19:02.813000
|
||||
CVE-2023-28959,0,0,d676622adadbd13f5eba57f8812a68b3cef023f63ef7021b1b817ff8b42d220a,2023-04-28T14:28:28.117000
|
||||
CVE-2023-2896,0,0,d0f59aeefb6d6075f87fd9ec981b25b7cfb33c39f420586df0cdc64d329fb811,2023-11-07T04:13:30.123000
|
||||
@ -225596,7 +225596,7 @@ CVE-2023-33847,0,0,82ca8aa0bc2d03362319c542ea5b2770d3d85f3edc1d48ee0a623bf42e800
|
||||
CVE-2023-33848,0,0,8c230bcaf355a577515ed758441936574666148d6f8eb2c4fef9542b77704701,2023-06-15T15:08:53.457000
|
||||
CVE-2023-33849,0,0,cee19490ece517fd373f4e7e8ed6adf35f850894b189fbcc578bbd8d63ec8305,2023-06-15T16:56:56.460000
|
||||
CVE-2023-3385,0,0,9500094f984a4b5d1e66b5fa4a2c7e1b713d3f8f392f6fc06da408d890552a37,2023-08-04T19:19:04.697000
|
||||
CVE-2023-33850,0,0,fbba5b69c67c9acf3b1ad18d606a9ab31046ef79599a8260c291e9eb0693cf7e,2024-09-19T16:15:04.047000
|
||||
CVE-2023-33850,0,1,a1cb002652a06aa9677606001c5bee20afb631caa66fa206af330309abdf3d63,2024-09-27T14:15:03.540000
|
||||
CVE-2023-33851,0,0,4ac32a90038a96c4290f8386bc4de44c14e956a2c207f0eac7a85d82111f6074,2024-02-12T19:54:23.117000
|
||||
CVE-2023-33852,0,0,bc3c73250f73c64645e886b9ff4fe0ce89bb90d67afa464822661d78d1e66b51,2023-08-29T04:43:06.033000
|
||||
CVE-2023-33855,0,0,aa3542d64ac11799927f1e76ad33cc287cefdca6570205fddaaa45ff2dc14b58,2024-03-26T17:09:53.043000
|
||||
@ -225826,7 +225826,7 @@ CVE-2023-34096,0,0,a7690eebb3bc64442760da7ed701080c41f77033ae0b34a6a91f6ad0d81a8
|
||||
CVE-2023-34097,0,0,6b29394d3580120fb1a7c5a38fea249ce4a1b763c7ea32f4e7dbc5873a1f9df0,2023-06-13T17:20:19.417000
|
||||
CVE-2023-34098,0,0,c5a8a91b34b516e94baaf6097a90812d9e70f98fadfec216f20d24e25a701dac,2023-07-05T16:25:47.773000
|
||||
CVE-2023-34099,0,0,b1df5159c8920200f27f31c41b92b0fb6d8023282833687e4a7aa665b6253580,2023-07-06T15:58:20.110000
|
||||
CVE-2023-3410,0,1,7a4e36aeb0f5ba519d59cf68683fb0a867b4c08cc26e39d8889bb3dfa7187dc0,2024-09-27T13:58:36.483000
|
||||
CVE-2023-3410,0,0,7a4e36aeb0f5ba519d59cf68683fb0a867b4c08cc26e39d8889bb3dfa7187dc0,2024-09-27T13:58:36.483000
|
||||
CVE-2023-34100,0,0,cc7ac8fd6507b425cd5f13b9db4c9315fd8649bbd1eef955b75034313ab8f832,2023-06-21T13:18:46.317000
|
||||
CVE-2023-34101,0,0,67b3988a94e482e2776cf4a140651f0ee77d4af4cf7aa6a15d2f30b3cfc85f3d,2023-06-23T18:18:09.143000
|
||||
CVE-2023-34102,0,0,1e279c26e0db6ec4921dd6d242f20193d8a0dd467559b3603450b2787a808fab,2023-06-12T16:46:32.247000
|
||||
@ -228126,7 +228126,7 @@ CVE-2023-37379,0,0,78500cde02bbf9b55e8b5c8dfb6567fbf086ee965c1c2974eaf1d329c52a5
|
||||
CVE-2023-3738,0,0,1e174d3fc000c16581c450af71ca1e0c2e4f3d89e66d0141370d0b4640c69678,2024-01-31T17:15:13.183000
|
||||
CVE-2023-37385,0,0,faa09cc1c20d2c90272c449bae45c1af3cc3f94697e33b3bf7810a9f5a76d274,2024-05-17T18:36:05.263000
|
||||
CVE-2023-37386,0,0,6b236f6835dca11da0bfebd0cabb4f2d3c3f7825a7a624f305d68d874246e262,2023-07-26T01:10:16.190000
|
||||
CVE-2023-37387,0,1,2f9f52a5a7474d10b7dd4e8e9b63b149294317380b1c5af2b1d1a6ee616deec4,2024-09-27T12:41:32.027000
|
||||
CVE-2023-37387,0,0,2f9f52a5a7474d10b7dd4e8e9b63b149294317380b1c5af2b1d1a6ee616deec4,2024-09-27T12:41:32.027000
|
||||
CVE-2023-37388,0,0,aa8b02c1e7a11675b29e2dd8328993b09354d84f97dc0b6a7de4f71d138538aa,2023-08-15T13:30:26.467000
|
||||
CVE-2023-37389,0,0,51ea0ebe7e017bcc141a5b953abc2fbb91063ba4778be275c47f9aa6d140afeb,2024-05-17T18:36:05.263000
|
||||
CVE-2023-3739,0,0,87992f652db7b0aba9cb9f1ba0e0b3ead5af9c97713db66047b7d2f338613d84,2023-08-15T16:03:21.510000
|
||||
@ -232926,7 +232926,7 @@ CVE-2023-43663,0,0,22e6dae31721c17c7a22b7251427578d93416b3c5e5d9d11fbbd99dcfbe39
|
||||
CVE-2023-43664,0,0,58843f50c87eccbf59079d1647a1fc10e1aaf0357332e6c8c463e3435b87c5e7,2023-10-03T00:18:35.847000
|
||||
CVE-2023-43665,0,0,a0ac86ce37cf036951caa34e565540e22f34be1bc3013e8a45f2054625777303,2024-05-01T17:15:25.800000
|
||||
CVE-2023-43666,0,0,d15cdd2495edd9df805ffce79ff016e00c14d83e938e7c3f532542a7b47fceaf,2023-10-18T19:57:44.023000
|
||||
CVE-2023-43667,0,1,8d7062d5ac51a925790762e965fe8b66acce3cd0e28ce803d2ab3b08e3796698,2024-09-27T12:15:02.820000
|
||||
CVE-2023-43667,0,0,8d7062d5ac51a925790762e965fe8b66acce3cd0e28ce803d2ab3b08e3796698,2024-09-27T12:15:02.820000
|
||||
CVE-2023-43668,0,0,864f92a41191db760a24be1e7c34a371ab625342ba8747fc974997cd53560bb2,2023-11-14T10:15:30.143000
|
||||
CVE-2023-43669,0,0,bdcd0256bf304e8bba3cb8bfc3927b556ce767b960195089b0b7e15b33087673,2024-02-16T17:56:45.190000
|
||||
CVE-2023-4367,0,0,6325c01bdaab0a12ddff714b2fa3b5c79f1212f60c2f63c3cb2e26b57df60642,2024-01-31T17:15:15.890000
|
||||
@ -235309,7 +235309,7 @@ CVE-2023-47130,0,0,99626e1381150c1e09884dff49fd6c2f723ae167bcc9874cd57b5ba796b23
|
||||
CVE-2023-47131,0,0,1f17bcf165c617ab98fe27cd04d2840b3530e5c7f34a2f6195d222315c628fe3,2024-08-19T17:35:06.470000
|
||||
CVE-2023-47132,0,0,22b04133394aba0611c16459db9562b2470a75c51e301523cdef08bb1020505d,2024-08-27T21:35:02.060000
|
||||
CVE-2023-4714,0,0,88791e8df305497262c231049cee74da124b9dd8910a01ba3e741344ccddea8e,2024-05-17T02:31:44.550000
|
||||
CVE-2023-47140,0,0,27ac9d4e4f9c1df9620d5c2f8730221eb8cdfd60197a593e16c9afa644305be0,2024-01-11T16:58:30.733000
|
||||
CVE-2023-47140,0,1,0888970767b71c5c675a9658b2b738d4dce55ae6b99af51c76153c755f54d92b,2024-09-27T14:15:03.827000
|
||||
CVE-2023-47141,0,0,ec41362211d80a8593662ce89c33cab67b4bbfc76d91426d6bca35fdc27513b3,2024-03-07T17:15:10.847000
|
||||
CVE-2023-47142,0,0,057572cbe8eb0ff2516aa108fc6f46043b22f41eaf1d6810bf33d8b2c4a85ee9,2024-09-20T19:15:14.380000
|
||||
CVE-2023-47143,0,0,4940703f7efc54194faeb4b79c3a01c8e24005ecbdd6e751e286a6df5a832415,2024-02-08T20:00:13.007000
|
||||
@ -235319,7 +235319,7 @@ CVE-2023-47146,0,0,86c1cd92289602e0efcf8321ace1ed61060cd5794976dfacbbea4121a4613
|
||||
CVE-2023-47147,0,0,cce79f55aade00b43e6a51f7575242a88657b053b340c26a135a026254461808,2024-03-19T17:31:22.997000
|
||||
CVE-2023-47148,0,0,7d5d9cb629db9cb7164701646ac2ea968a56247f3b4151536df386351785cd82,2024-02-08T19:58:30.023000
|
||||
CVE-2023-47150,0,0,34e13c8facf7249357943371549813b834aff9a06467c895eea021e27b809159,2024-03-26T17:09:53.043000
|
||||
CVE-2023-47152,0,0,03afd452611f02dedef0b10863c2935da1bb8b1da61a69e81c9df56215e71f46,2024-03-07T17:15:11.063000
|
||||
CVE-2023-47152,0,1,9eea60faef287e4d902c8adce05bee6fc9f38fc588129cbaf0f698a6de3b8223,2024-09-27T14:15:03.993000
|
||||
CVE-2023-47158,0,0,072bd65823b5631b33870dcfdff533993e7a31a255a5f570d9069f0a1b5d8be1,2024-03-07T17:15:11.147000
|
||||
CVE-2023-4716,0,0,032ab074d8425fbc2edaf9c554205d201e67bbfa0c9d7ff9b3c43c4ca041abbe,2023-11-07T04:22:53.527000
|
||||
CVE-2023-47161,0,0,3df147993872a3a8a7211af1c2c970c1494cb8aace730e0ec52cc75a7ff20d99,2023-12-27T18:41:28.277000
|
||||
@ -241233,11 +241233,11 @@ CVE-2023-7272,0,0,cc43888de86ffd529fd218a38f2e0a497e79588d2ca6b5dec5063052cab77d
|
||||
CVE-2023-7279,0,0,f98ffb9aa7111762ac351724f18f9d9ee505a1023f26a13d8e9efc5698c9c712,2024-09-05T21:59:17.957000
|
||||
CVE-2023-7281,0,0,0790d4bfb469f439660a23ce8eab8f87d3be095fc643fdfe8eec46cdbb17ca3a,2024-09-26T13:32:55.343000
|
||||
CVE-2023-7282,0,0,f4fc1de03735b00b3526c9c4836a11bcc7904328f1e64bbcb0646541be7349bd,2024-09-26T13:32:55.343000
|
||||
CVE-2024-0001,0,0,ec89b0250605194e4b2ffc00792fa942d3c0959950283e05683347ce9527983a,2024-09-26T13:32:55.343000
|
||||
CVE-2024-0002,0,0,ff04b358d00838ac4fe1d9a0ffa6c309e6e3b75c26bd3550690edfe55d2c5d3f,2024-09-26T13:32:55.343000
|
||||
CVE-2024-0003,0,0,6d193ce8b52ca5ce4204641471b1428620c8f28297b585f1c840544b8c7a473f,2024-09-26T13:32:55.343000
|
||||
CVE-2024-0004,0,0,d8297ccdd545cffce8beff6a82a70db71049faf18433ee6e437540b0593c8ea3,2024-09-26T13:32:55.343000
|
||||
CVE-2024-0005,0,0,35b5c0606d19acaa84ac05b5682675fc4c62c8263088a28ce1c1f8c256ec596e,2024-09-26T13:32:55.343000
|
||||
CVE-2024-0001,0,1,ddc97ec95f63469ba72943e3a1a3c2055a0f787a376d00af08b9e1c9de1e66b0,2024-09-27T14:08:57.327000
|
||||
CVE-2024-0002,0,1,8eba00d67fa29dcfc182e2e2367ab4a3c005649f9c2970e7f365907a3a42b06a,2024-09-27T14:13:24.427000
|
||||
CVE-2024-0003,0,1,46c85e4a496f19260982bccddc0ca5126276fd9fc3f3c6d4be9e905c5a7e34b8,2024-09-27T14:23:58.243000
|
||||
CVE-2024-0004,0,1,e06f06042c281ea249e16043f1b9aa83cc9542a4deac4ea3878afe1de9e34e4e,2024-09-27T14:24:41.277000
|
||||
CVE-2024-0005,0,1,2d1595c322868a34d9b757a1279fc9035613c2eca38df11db881a489dcaeda61,2024-09-27T15:25:40.980000
|
||||
CVE-2024-0006,0,0,ad936d6110273ab63552e81bb6d0ac8ad8706e8706811fa2ef455d43c6091213,2024-07-22T13:00:53.287000
|
||||
CVE-2024-0007,0,0,7ce6d28a77975ceb6f0211a30f9905d648e1a7e8a675821fe7be046691ac9f83,2024-02-15T06:23:39.303000
|
||||
CVE-2024-0008,0,0,899bae3dea0b6932a6d046356f47764b32f025595d0eef60d8e0e433b2b04007,2024-02-15T06:23:39.303000
|
||||
@ -241757,7 +241757,7 @@ CVE-2024-0603,0,0,69da2959c58a849df80992399c0ae4fc3bb43bd0808c5e3baf757cc40a9113
|
||||
CVE-2024-0604,0,0,372538ac2eac987cba4891011b719253c3d05cb7d3aa7347327f87d4259822b5,2024-02-29T13:49:29.390000
|
||||
CVE-2024-0605,0,0,9df1cd483cbf4605667600542fb2bef389cd0397c4220c040adf3c7591da3c1c,2024-01-30T15:19:19.787000
|
||||
CVE-2024-0606,0,0,d9c54d14c251870a0c63fc840686ca7ac32e21eeaf6c950c2eee47a3ad3f7670,2024-01-30T15:18:57.190000
|
||||
CVE-2024-0607,0,1,749ba8c44704f92cef5042d2ffb7f0b4165bad41cb70178b67e2df98a4d9f1df,2024-09-27T13:15:12.057000
|
||||
CVE-2024-0607,0,0,749ba8c44704f92cef5042d2ffb7f0b4165bad41cb70178b67e2df98a4d9f1df,2024-09-27T13:15:12.057000
|
||||
CVE-2024-0608,0,0,0250a1da296ec5102313d6e452d7e96af5395bed49f3ec343ccec9d230952988,2024-03-29T12:45:02.937000
|
||||
CVE-2024-0609,0,0,271096fa2c410e8a64d8fb61f1faad02d256c1e6f7a84686e9cec4830375dd33,2024-03-29T12:45:02.937000
|
||||
CVE-2024-0610,0,0,3e87b17b6f7dd27279d67f3be868598345c1da5103c9935b1ce85e0f86843dbf,2024-02-20T19:50:53.960000
|
||||
@ -252781,6 +252781,7 @@ CVE-2024-33697,0,0,4a571113caa6ccf495d29be30608c42f9dddf9084d1562bed260e698c04aa
|
||||
CVE-2024-33698,0,0,a8c5e7c040b3c6d1c0f9bc21543a8682893b5aa4922da330e8b0355256cea828,2024-09-10T12:09:50.377000
|
||||
CVE-2024-3371,0,0,d2e6ea20ce5eb692a4e48c27aedae40a56c8f7db204eed4d633cbd78a04f68c4,2024-04-26T15:15:49.357000
|
||||
CVE-2024-3372,0,0,a196d1e45ccce196e4deb1ea2387c2fe4f6bf89b27a8a7cd4be5ebcd31c9a0db,2024-05-14T19:17:55.627000
|
||||
CVE-2024-3373,1,1,e3f0b06cda529fba8bd3ac22f4f7ed89f090b30ded0d545b2ba52fbd4a5ce487,2024-09-27T15:15:14.577000
|
||||
CVE-2024-3374,0,0,3ebd1bd07a69ff470e060c4c065f62c59313c2dfc13f260402ece495f026b11b,2024-05-14T19:17:55.627000
|
||||
CVE-2024-33748,0,0,066f13e7dc76dff0529f136e64473f4bf178cc6b6f4c44f335cc233ab954b6f1,2024-07-03T01:58:38.810000
|
||||
CVE-2024-33749,0,0,f9dfa03193fccdb082b9724eae52d9e0afc932b6dd471bafd143ead723900e53,2024-08-14T19:35:22.807000
|
||||
@ -254746,8 +254747,8 @@ CVE-2024-36421,0,0,6377f154589fbee582a888cb89fe433db93fc2d1b9f4ba90a9e9d6ff1a542
|
||||
CVE-2024-36422,0,0,1c8e85fff4389539f30938d98dea0041c583b614c5e1956a8be795decf84cdf1,2024-07-03T15:38:24.297000
|
||||
CVE-2024-36423,0,0,b453cf2ccb776ec471b0bfc211eaab3170432996cec7cbfa7fd53a528b83b04c,2024-08-21T14:35:42.877000
|
||||
CVE-2024-36424,0,0,74bb0bee78ee748646a140004458defb2a792605f4f6efef89113a667494d3ff,2024-08-12T18:45:53.647000
|
||||
CVE-2024-36426,0,0,081cbabfe1f165d2e60c6bf5434c4cea5a1c1465246b1d9713d429b0a41c1ba0,2024-07-03T02:03:11.237000
|
||||
CVE-2024-36427,0,0,10c5dade9c11af5e52239a7a8c18438909a8ea6a201617061be6b7626f49e18c,2024-07-03T02:03:12.033000
|
||||
CVE-2024-36426,0,1,d13926b687beb94abe76e991d41f8690e5a62af7a6ef5a5fe751b1cbb4c88a0c,2024-09-27T15:15:14.377000
|
||||
CVE-2024-36427,0,1,198ab806d20d6a93856952e8ce7e03d21c8322dde85a2e49ab6efeee0fdec5c6,2024-09-27T15:15:14.483000
|
||||
CVE-2024-36428,0,0,c6c858a7f32e69b919beda69f278db495ace99a22a3bcfe62f8ab10abf83409a,2024-08-20T16:35:17.923000
|
||||
CVE-2024-3643,0,0,cd9af5d0727daadece3514e90acd0ed08b562b9573641923b7540cc5c91438f6,2024-08-12T19:35:11.607000
|
||||
CVE-2024-36432,0,0,895a265ff42669ad3221f2038a917555b3971e37a0a09c0a293a796c0338c882,2024-08-01T13:52:48.333000
|
||||
@ -254795,7 +254796,7 @@ CVE-2024-36481,0,0,c20069fe9216cf7ae5e42e62fc886e320b7997d027cb5be79eafe3b725910
|
||||
CVE-2024-36484,0,0,d90e8addbe4310fb59424c1e2209c39c8eeed0a72f79133301d102644feba769,2024-07-29T07:15:03.447000
|
||||
CVE-2024-36489,0,0,2f34b177a387259c170db7b91a53518947ffa720aa7b598baba9b38f62a0e242,2024-09-09T13:32:13.087000
|
||||
CVE-2024-3649,0,0,9d2e0b18ffe30ccf7cbc0e74a77daf1869af9483d0413cb80580942eae7d40a2,2024-05-02T18:00:37.360000
|
||||
CVE-2024-36491,0,0,6efdbfe92fd7b110a7468fc85fb00858571ab2d21b32164f2daefb371e4e6cf2,2024-08-01T13:52:56.787000
|
||||
CVE-2024-36491,0,1,0594f931fd7fcba21d9716595a57f83c241ce75441ab3d963604c9fb9792c871,2024-09-27T14:05:54.037000
|
||||
CVE-2024-36492,0,0,b0eb8123326503998f78707e30820b21ee51107ee551426ea35529c00e38520a,2024-08-23T14:51:08.580000
|
||||
CVE-2024-36495,0,0,10404a83be52d267985f87debff962346c26dcdc9e1b293bd8df22829bd96214,2024-07-08T14:18:38.843000
|
||||
CVE-2024-36496,0,0,9b0852e2079a2b8f81e66f1c652acdc8b58764ac010cd86aadd442eb8de70d88,2024-07-03T02:03:14.090000
|
||||
@ -255599,7 +255600,7 @@ CVE-2024-37768,0,0,870c2e3ce3bd390df1e2f6d00c0b12856feb7e2e88c5200a479a671bc3424
|
||||
CVE-2024-37769,0,0,5d562468fe4e62bf5aa053de70325d9517e92227326a41659856d8da2dd29323,2024-08-01T13:54:15.670000
|
||||
CVE-2024-3777,0,0,0856ef763b1edbec0747809f2f5f1e269fdce9f6160541c599d8c16e527540d3,2024-04-15T13:15:31.997000
|
||||
CVE-2024-37770,0,0,4e93402ad3ed64140e35d7a96007b07c29c5c8b6e92be0f25f51076d1a6ceeef,2024-07-11T15:05:53.090000
|
||||
CVE-2024-37779,0,0,990a40d8d014e97c2e1b665bc00b3d872a24e9aeec410c984b4ce15b677a4054,2024-09-26T13:32:55.343000
|
||||
CVE-2024-37779,0,1,6e59c8529157382fe2940395deacc91d059ba345fa934b0466ef9ccea286d30e,2024-09-27T14:35:03.517000
|
||||
CVE-2024-3778,0,0,2b5fc9c77ae2f993ef971da35cf3870af6c405ab91c786afef1cf6cf11c368d8,2024-04-15T13:15:31.997000
|
||||
CVE-2024-3779,0,0,1a47972c633583c7bae072fbb56beacb2d6111c4ffff8b051890256727892c2f,2024-08-21T17:38:16.057000
|
||||
CVE-2024-37790,0,0,f03d38fcd39f9fc913c999134089e43d5d97a0d5c9124acb1959f0950b818b81,2024-06-21T16:15:12.440000
|
||||
@ -257272,6 +257273,10 @@ CVE-2024-40505,0,0,7ece9bf9b6c0e4a275d20059391eb5add095153a9e53affa19425b4d1ec16
|
||||
CVE-2024-40506,0,0,50ff1b9d534c58546140d019d524853625251e6e08a2d14d7d8fc96e336df5ec,2024-09-26T22:15:03.770000
|
||||
CVE-2024-40507,0,0,613a1bd4f36a99780d11c648a9da0c130a6c3a3c4806b54e25f249d2a4df7639,2024-09-26T22:15:03.880000
|
||||
CVE-2024-40508,0,0,875ef5f24d9ef2a983cc219f8e90c710f4d378b881c294f19d5c6ea699d3675f,2024-09-26T22:15:03.963000
|
||||
CVE-2024-40509,1,1,74f8efd95b2115305b501da3eb0874a04b66109dbae9307a118cb8796d72389c,2024-09-27T15:15:14.740000
|
||||
CVE-2024-40510,1,1,1cd8bae3c191b5c9c2bfb7f84e21a91a9f6f5b24548f0743b8a50e4f9c574a44,2024-09-27T15:15:14.820000
|
||||
CVE-2024-40511,1,1,cf861f5bd7da1a1dffef86e4238a859c655c22e97e9d86b705b0ee6519a75400,2024-09-27T14:15:04.343000
|
||||
CVE-2024-40512,1,1,9063a00c14b517d6f8560c2fe9504dab4d7ab492501c35d08135b5e7027aa03a,2024-09-27T14:15:04.423000
|
||||
CVE-2024-40515,0,0,d91b9531ef5ed5978894d52371df8275215aaf629121566b57a4e661954c33e9,2024-08-01T13:57:33.567000
|
||||
CVE-2024-40516,0,0,aed239a0d38ccfd87fd9b80e3f289cfeb35e1a0ac4b960ecd30c2aa738783f2c,2024-08-01T13:57:34.333000
|
||||
CVE-2024-40518,0,0,bbc8a85aaa975d14f5cd2cd0045fd3aa844f2bf8933730369940256a4cf29a05,2024-08-01T13:57:35.120000
|
||||
@ -257944,7 +257949,7 @@ CVE-2024-41600,0,0,ddd05664b5ee0043272f1a43166002722a6b163ed847eae777be121e2c652
|
||||
CVE-2024-41601,0,0,bbe6fd3c72d7dad8c522d892fc1c0f9bacbb178b64f66555395886f778d90253,2024-08-01T13:58:55.750000
|
||||
CVE-2024-41602,0,0,3aaf8bd0d1359c5ef86792c331ff3b330f01dba788f9b1812b99e2f11e997bba,2024-08-01T13:58:56.507000
|
||||
CVE-2024-41603,0,0,274738d202695ad4f9eeac726dd842b3cdc47fbabba17edb5ee76c87292d7f32,2024-08-01T13:58:57.330000
|
||||
CVE-2024-41605,0,1,9d6196c9cfebf8f4125967f18a39b43ec450c91ace7e30313c5ff6709c3251f8,2024-09-27T13:15:13.227000
|
||||
CVE-2024-41605,0,0,9d6196c9cfebf8f4125967f18a39b43ec450c91ace7e30313c5ff6709c3251f8,2024-09-27T13:15:13.227000
|
||||
CVE-2024-4161,0,0,818606f25cf93cd94814d58a9247fa25de635b9142e537f83382fb857b8b71ef,2024-04-25T13:18:13.537000
|
||||
CVE-2024-41610,0,0,26e6066451c8a71988f997449d51b2538a9517f154afbfa7718a4bd3d7e1adb9,2024-08-01T13:58:58.120000
|
||||
CVE-2024-41611,0,0,8ae08bbc5635b26df3869144a2b3bde07b8fa7e9c586a9249f8dfa55a99d468a,2024-08-01T13:58:58.890000
|
||||
@ -259450,16 +259455,16 @@ CVE-2024-44049,0,0,a80b61b599be073262e16b82147c50606bc71e3542625749162e1fa755b6b
|
||||
CVE-2024-4405,0,0,45cc63f187ac8ca241b3f6f4ea8115546cfb9789c95e5b84e970d2850f40bb92,2024-05-02T18:00:37.360000
|
||||
CVE-2024-44050,0,0,df862c86e0ba11454be8e25a71ae273061d57f333e47daa026b9e702db65954f,2024-09-24T22:04:14.633000
|
||||
CVE-2024-44051,0,0,ce23f411efc73abf32e6098a6d2eb3393f97187dd35f7e27624ea488dc410be4,2024-09-24T22:03:20.933000
|
||||
CVE-2024-44053,0,0,83d8923ba60cf9279e6750cc431daaab1e1e350d146e3f688dad663630566e4b,2024-09-16T15:30:28.733000
|
||||
CVE-2024-44053,0,1,d6b445b5424b0f6829ecd038bfac9705759a6336fec3c16f9c24c9885fec6c0c,2024-09-27T15:32:14.153000
|
||||
CVE-2024-44054,0,0,62964ae8ea338d235cf53912a006b7117e349fb8ebf31f281fb31ac1bdad9e2c,2024-09-23T14:23:19.573000
|
||||
CVE-2024-44056,0,0,756ccfcb6ed9765bed856278bfa95937400729fefe1ccf6c82ec31b630a71046,2024-09-23T14:39:05.047000
|
||||
CVE-2024-44057,0,0,3ef248c0f699cd939b749fb7953cfe71858b347a17cd1b9c323d49d28f2cd62d,2024-09-23T14:33:50.830000
|
||||
CVE-2024-44058,0,0,2a31d13e7c34ecf4ce5a2c39e291bd8b424b5c5c23539a4a1d30676f56f1ca20,2024-09-23T14:28:34.860000
|
||||
CVE-2024-44059,0,0,e50caa564eb7444d516ed124abb6d0fea18607494c8e74465e2dd01a1df7712d,2024-09-16T15:30:28.733000
|
||||
CVE-2024-44059,0,1,3f6c3a8dc5dadae72dc0df667c364ac97c0b5812f742d2c5b5a2597b4b344930,2024-09-27T15:33:52.013000
|
||||
CVE-2024-4406,0,0,4d2edf89174eefb11c1e35948c69459d7b4d6dd1a09c10eb7a0704c1561ef984,2024-05-02T18:00:37.360000
|
||||
CVE-2024-44060,0,0,ea289f0bdc9789c9ec67d1508aa08afeb9f803f52099e34e6af184526da44eb7,2024-09-16T15:30:28.733000
|
||||
CVE-2024-44062,0,0,14538aba5f6d0cee1fffe23d891617a033aae9a8c2411d6855777f0a1a7aba3c,2024-09-16T15:30:28.733000
|
||||
CVE-2024-44063,0,0,d642b3fb89950affe44ef0b88153cbec24d22c27c53a8da8ab9d205a291c0668,2024-09-16T15:30:28.733000
|
||||
CVE-2024-44060,0,1,6924c0c83b583f3e58aed5b3f0343601ab88a5f9325e897d35fa92b3431e95c6,2024-09-27T14:04:50.977000
|
||||
CVE-2024-44062,0,1,d6bef9112163640e773e122d40930de4ecec4777328c835263d4052bfb0847a1,2024-09-27T15:49:46.487000
|
||||
CVE-2024-44063,0,1,8ea7a84a37f53fc26574f2d48b688739bfe3dad8852d642a265a023b1a91cd34,2024-09-27T14:31:05.703000
|
||||
CVE-2024-44064,0,0,4e74c010eb0f0db49dd4385b0641f0bed56c75cde28c530ba6b3d37d998a5b5d,2024-09-24T18:15:30.537000
|
||||
CVE-2024-44067,0,0,f6acc392be4d580c3750239c741db14e9e0b23cb38f1820ef772266e93e1673a,2024-08-20T20:35:34.497000
|
||||
CVE-2024-44069,0,0,2eb956dd06d71bb925b0fe816cbe078cd7c5c9a8647e07e8d081256cc543fa9f,2024-08-19T12:59:59.177000
|
||||
@ -259713,6 +259718,9 @@ CVE-2024-44893,0,0,635f24da6eb74b01d8797a39660e22d01234cd87632ab79dff33aeb2842ca
|
||||
CVE-2024-4490,0,0,46d58037d58f18ff9df6b6b94f91d6beb02adec3983ce96102d15aba21f19fde,2024-05-14T16:11:39.510000
|
||||
CVE-2024-44902,0,0,803913154fc81eaf377836b68ca7807a5abb6fbb4b4d7ccd7271b82f1104776c,2024-09-20T14:55:38.087000
|
||||
CVE-2024-4491,0,0,fec0fa99feb905362d1059ae18d849f25d02b15efc10c179ce136112d1e08871,2024-06-04T19:20:38.950000
|
||||
CVE-2024-44910,1,1,f1f589ed97502e92f7c4f94eafa0ca86ec0ddff2d365d771307164e8c415de39,2024-09-27T15:15:14.907000
|
||||
CVE-2024-44911,1,1,9743596caf9c07be5fca95a11551930914d3a16d6100507de8f5d2846cb8be0e,2024-09-27T15:15:14.990000
|
||||
CVE-2024-44912,1,1,be45a70e189a5066adaad668a77db08b32a30a1414532025964a835bf3592938,2024-09-27T15:15:15.063000
|
||||
CVE-2024-44913,0,0,332529f8a2f25e9795d6a65fec291670cc1d8fe0aef2e9fae357f99f95186d81,2024-08-30T16:01:54.347000
|
||||
CVE-2024-44914,0,0,874292f6168813ddf8fc9647fc65bfb40df31b19e1ea4a9fdcd89de1a66d420b,2024-08-30T16:01:45.013000
|
||||
CVE-2024-44915,0,0,599d20f62f376d9c9860ebd338604a632ba16d7b9219c3aadc9555ff97ab4b9e,2024-08-30T16:01:10.753000
|
||||
@ -260050,9 +260058,9 @@ CVE-2024-45455,0,0,4d27dc502cdc314ca65322205c1992846fdc5d39734d6d904b9bfe916c2c5
|
||||
CVE-2024-45456,0,0,47f416b4ad02b4137088267164d544ec869b0c8806ca776b6a7c643c5eb500b1,2024-09-19T18:38:57.500000
|
||||
CVE-2024-45457,0,0,5900191db09039069fbddda66128c2809bcb929085a84aed28a0c8f708ed46f3,2024-09-19T20:53:46.313000
|
||||
CVE-2024-45458,0,0,a61716ce0d3fef0ec6cc594d56bae2d0a9a90d5b7d46e3aad6884d33d8f55d2d,2024-09-19T18:55:46.513000
|
||||
CVE-2024-45459,0,0,4154d879d23930c356c924ee9751025192ea472198f82d912c4042ce38a9f5ab,2024-09-16T15:30:28.733000
|
||||
CVE-2024-45459,0,1,9b179c3f3fb0a5657b063c5e1d95801691f8f9a5515abf4db8b2da6f6597452a,2024-09-27T14:46:32.483000
|
||||
CVE-2024-4546,0,0,da973c82a9042d639d29e7a0c2ffb48d440dea200e6df21027887041c43a68db,2024-05-16T13:03:05.353000
|
||||
CVE-2024-45460,0,0,7056065a678a74d2d3d00e0fb051b2bcdebb702f17f31078c0bb6fea26b93765,2024-09-16T15:30:28.733000
|
||||
CVE-2024-45460,0,1,b05278f65cfdb1f7853ef120543347199a3969bb30d487211ecff7d9eae8c937,2024-09-27T14:51:08.120000
|
||||
CVE-2024-4547,0,0,e03413ba2a3d643e986abd6a70d4989a4412faae98e55cc280c4859673ba647d,2024-05-06T16:00:59.253000
|
||||
CVE-2024-4548,0,0,c312b0154ade9cb7e93b29cf6468875ea09abcdae811bc20c1f6b28cb1f08ef2,2024-05-06T16:00:59.253000
|
||||
CVE-2024-45488,0,0,02812af338aadc4a80122f84f222d800d57fc191e3e2ef216830d55dc271ef45,2024-08-30T19:35:06.870000
|
||||
@ -260148,6 +260156,7 @@ CVE-2024-45769,0,0,8008e87928d7d924cb6edc7a002ab7d174233b35bc221ee2578339101437b
|
||||
CVE-2024-4577,0,0,b55cac970df35b2daf21f1bc20cfa9dd0965f08c49eae1007fc9a139f9980913,2024-08-14T19:23:47.253000
|
||||
CVE-2024-45770,0,0,e98fab17d907c24beb2a28773665764214c6145643120e7f9304697540dec889,2024-09-20T12:30:17.483000
|
||||
CVE-2024-45771,0,0,754a0f27219aa2eb6179ec627ac31099e8e2882043a643cfa7921ddb03dbb66f,2024-09-09T15:35:11.567000
|
||||
CVE-2024-45773,1,1,e9cdc5014d806c3c3d60272185c9e7326070306ad511fa12380b521b6efff99f,2024-09-27T15:35:02.620000
|
||||
CVE-2024-4578,0,0,de2bf1ab8b65cf8119579f63d8e64a9383c9519828d1fae8ddac21d6dcb5605a,2024-06-27T19:25:12.067000
|
||||
CVE-2024-45786,0,0,1027a4a71b54e4ed926e7c4d82608ed7bf7290e7e8486a1ac94d8f7e4edfad02,2024-09-18T20:12:47.337000
|
||||
CVE-2024-45787,0,0,46f8564066b3f70e712610c0aca9059d9bda6862d53c941af56b2ef72737a51d,2024-09-18T18:15:07.650000
|
||||
@ -260205,6 +260214,7 @@ CVE-2024-45858,0,0,b5441be916d9d638a5a087843bce9f2981a17328a32cafaa10622a0d2ef26
|
||||
CVE-2024-4586,0,0,308ac0f257920a7bf6e50f46839419870b7e733c7917681ea48f64312191a5cb,2024-06-04T19:20:42.953000
|
||||
CVE-2024-45861,0,0,57fe73e3a177e4e17ab3e3d5c857fbcecceae3ffb20171f8b220e3723b40fcc2,2024-09-20T12:30:17.483000
|
||||
CVE-2024-45862,0,0,267d393c40ac4758b5b0d5f00783ff7e60ad200162cab3206861198fe5f922b0,2024-09-20T12:30:17.483000
|
||||
CVE-2024-45863,1,1,fd048866aa707237f5e54143a9d87b2c08dcd9e461d7c79379b8ee0322294442,2024-09-27T15:35:02.800000
|
||||
CVE-2024-4587,0,0,ccb551f2bab92e34c98709c8a5231b1e8778dd90f0d16bd4ac4c665438d47b6c,2024-06-04T19:20:43.057000
|
||||
CVE-2024-4588,0,0,9198a141cbfd67d79271a90e0ce19e828dccb043a1ec84b18e696744e0f31db8,2024-06-04T19:20:43.163000
|
||||
CVE-2024-4589,0,0,4328e8e6c3737b332b5624dfb7ea03e7812e5262794529580dcb4596fe3e40c9,2024-06-04T19:20:43.257000
|
||||
@ -260225,7 +260235,7 @@ CVE-2024-45984,0,0,191e6065bcea691e7d2f212f050b5e86a6bc7b2eba815207627ed9ddd2dc2
|
||||
CVE-2024-45985,0,0,dc45e2ab3de87861a9443117e4cfd6e57b68e9216bd82bc7bd6f3e068d51ccad,2024-09-26T18:35:10.080000
|
||||
CVE-2024-45986,0,0,f61f0e27b2db4ecf52ec82e83c4f905d4703f7b81b7eef8d8ec2e435944bc38e,2024-09-26T21:35:21.760000
|
||||
CVE-2024-45987,0,0,894b34f536a04c93f16834a2446d6c8467b7fe3b94446a5ff31078de5ce6842c,2024-09-26T18:15:08.583000
|
||||
CVE-2024-45989,0,0,47f28385e92f7996071ad52dbab7994cb52cd919960b12dd74242640a06f3dde,2024-09-26T18:15:08.667000
|
||||
CVE-2024-45989,0,1,af7080c89647f989ac2ca7d839fcda290a1db2a2584e5ec2b33ecc9edab6b0e0,2024-09-27T15:35:02.983000
|
||||
CVE-2024-4599,0,0,97a585846a1cde14c82c7df8029410945eada1b1651bcc856b8e29367f63ecca,2024-05-07T13:39:32.710000
|
||||
CVE-2024-4600,0,0,078ff1a3ce0c016ebe4abdef878e85c422e5d3e27f924ee561699d3a699695bb,2024-05-07T13:39:32.710000
|
||||
CVE-2024-4601,0,0,f0cf92b01a71b6ce5239836875c0fea83fe5cefcc9c9a95787d845c600418862,2024-05-07T13:39:32.710000
|
||||
@ -260272,6 +260282,8 @@ CVE-2024-46327,0,0,1109f4d5733337c522b43c688073dbf042a675894632702e5e62b9816340d
|
||||
CVE-2024-46328,0,0,6d725cf49973d0547b531dffd10544f7db3c88f49071ede40d544ac8d4e71635,2024-09-26T15:35:25.783000
|
||||
CVE-2024-46329,0,0,67c3a6b863dc93eeddc6458cdb7ed37a92f231ba9522b51de613709b565f065a,2024-09-26T15:35:27.397000
|
||||
CVE-2024-46330,0,0,5f5561b584280ec21bb45f30f74e33818f7bd5bdd6c0f77a96022667b1fd499f,2024-09-26T15:35:28.713000
|
||||
CVE-2024-46331,1,1,43d83daaaee9613c3495100c50497427e3aa818572b8c3c1bdb2ec8cdbeba7aa,2024-09-27T15:15:15.200000
|
||||
CVE-2024-46333,1,1,d0e6c55e780a5881bf158a3b26702d3f52e11ad4255562de08c6b98bdc6086a0,2024-09-27T15:15:15.283000
|
||||
CVE-2024-4634,0,0,2c56b13392d50c2560d26201cfe4914a1f0ee83080b338e78708abce42a9dd35,2024-05-16T13:03:05.353000
|
||||
CVE-2024-4635,0,0,c975e44d5f71ffee6fe63563ea783b273fe931e5f01b077f7022458b2ef1e222,2024-05-16T13:03:05.353000
|
||||
CVE-2024-4636,0,0,5f6d994195b0d258cedd76eef14490d422ed4d9e1ed2778ad911a6f2ded3ef43,2024-05-15T16:40:19.330000
|
||||
@ -260294,12 +260306,15 @@ CVE-2024-4642,0,0,feffee00bc573269c6a6673aa02a71420853934841cc7ed393cab7b6bdc385
|
||||
CVE-2024-46424,0,0,46898876dcaeac361faa83e092e89c9c35f949e2ef780f98d9a42ea4cbe250aa,2024-09-17T14:35:30.557000
|
||||
CVE-2024-4643,0,0,e0d3f81442e9e4f0746a278d66a7c607383f7f5939cd80bfd5eea7a68cf6b0a2,2024-08-02T12:59:43.990000
|
||||
CVE-2024-4644,0,0,d1e68c64f589f5437d8d9c3d73ea2c78a66dff558140ffcb6e63a6c5713f6378,2024-06-04T19:20:44.287000
|
||||
CVE-2024-46441,1,1,3b6e403c61cc411b3da60642bd1c82efa8fe6eba97439c902c7cb11ad9cd4cfc,2024-09-27T13:15:13.397000
|
||||
CVE-2024-46441,0,1,2418b86253ca00f9dc7f73a4a3e896b30ddde24c4b20f0f372cbb6dbc59ef2a5,2024-09-27T15:35:03.803000
|
||||
CVE-2024-4645,0,0,168f1477081561f078c10d8fc1cf3cc1223bff538993570e41562bd0f1dfcc62,2024-05-29T20:15:13.240000
|
||||
CVE-2024-46451,0,0,d3a56959d528545e5d37d75143f0c1e0141235a2bd503adf0162594e2e188936,2024-09-17T14:35:31.353000
|
||||
CVE-2024-4646,0,0,368f6c8b75aa07d035e1b1b12d3ee4faeb304323401bbcc5aa2596217dc42f5b,2024-06-04T19:20:44.390000
|
||||
CVE-2024-46461,0,0,cc86f5c42464c26c4a36c6d59fbb4ac13932ea21683a14dbd86ef949d78638fc,2024-09-26T13:32:02.803000
|
||||
CVE-2024-4647,0,0,abfff49b4d0bc1323cd8c136d2663c14e45b73cbc22df4c684f6d02301cae0cc,2024-06-04T19:20:44.487000
|
||||
CVE-2024-46470,1,1,ec152bb0f19289f3f62326f74efcef4e95e62ce9c433a95c204c3ec486e35cc6,2024-09-27T15:15:15.393000
|
||||
CVE-2024-46471,1,1,522cc75b1bf2befa7627369323d79181b7c448923d2e221772e14260cc62fa52,2024-09-27T15:15:15.483000
|
||||
CVE-2024-46472,1,1,9fd229e7baa9ea2d5492d76f60c6dd3834e3338560aee71a8dbb7fb9a1d1d9da,2024-09-27T15:15:15.567000
|
||||
CVE-2024-4648,0,0,911dfdcd448576dec5371ac5fe5f3ab9d434d7a73d2296063b028e9785e0deda,2024-06-04T19:20:44.580000
|
||||
CVE-2024-46485,0,0,904850996ff0ccd2e4983d6545a4277eb41afbf1d891eac2f17d8f906616c485,2024-09-26T13:32:02.803000
|
||||
CVE-2024-46488,0,0,3defdc280bdac468f540802333e8c8fef11bc704f85948e63bbf4df7cfe91eb5,2024-09-26T13:32:02.803000
|
||||
@ -260358,7 +260373,7 @@ CVE-2024-4661,0,0,f19406aac3e0e4dd229494d2c7f4a9ae6fd94c8256be755b3955222db7d3bf
|
||||
CVE-2024-46610,0,0,d922b4261099847096d8c683fe0eb8434b2ccb3c0c33dd549b34f19d2b943e06,2024-09-26T13:32:02.803000
|
||||
CVE-2024-46612,0,0,a589f709811c7445ac7df28a3a7782b0e1ab03ae28a72339e484d8d02cc7d048,2024-09-26T13:32:02.803000
|
||||
CVE-2024-4662,0,0,42d3ec88d759fc9bf88fc92972e0c9891830916b90a0cdbb0331ad5486f420dd,2024-05-24T01:15:30.977000
|
||||
CVE-2024-46627,0,0,f47c005b0f44e593b766a01de7d45f47b9c4d8031f58dc755a16f868fd0ea108,2024-09-26T17:15:04.190000
|
||||
CVE-2024-46627,0,1,2d97afaae826c5582be81e574e277b4f6fe41b8dad48517b39b84d283362a60b,2024-09-27T15:35:04.583000
|
||||
CVE-2024-46628,0,0,b9b3a5b65ec5ae34f5ecdb56d9dab97b5151c6b611a9836ba074833ecc1193a1,2024-09-26T21:35:22.537000
|
||||
CVE-2024-4663,0,0,26abfae0d13c9db7079b41941554710f5ceae1c12961c27d4c50148758e145c4,2024-06-20T12:44:01.637000
|
||||
CVE-2024-46632,0,0,49c02e3668d5e881ef006304da2eb6eae159ef85be40315a6a4d9e988cef6e2a,2024-09-26T19:35:22.293000
|
||||
@ -260519,79 +260534,79 @@ CVE-2024-46799,0,0,9272007b77b1874a111bd3818178b47066e5b2d005f81deac8b6b5c2b5db8
|
||||
CVE-2024-4680,0,0,0c8976c1b63cea89edb43ad9d9b81fc90d65237e24435549d62994fa7d6af35d,2024-07-19T18:51:53.003000
|
||||
CVE-2024-46800,0,0,87d1b49029d5e1e7de4c32d994818d53e59bb26db74de770ef90f55c819e5407,2024-09-20T17:18:55.260000
|
||||
CVE-2024-46801,0,0,239d949d680f6da2e86f32ffc06e9b107781e443c485e3945602ddf3b4e94f6c,2024-09-20T17:18:17.810000
|
||||
CVE-2024-46802,1,1,e9f139917d1f7ff6bc7947e33e1bbf87c15a20c520c2d26c4d874ead7ccbfa78,2024-09-27T13:15:13.483000
|
||||
CVE-2024-46803,1,1,b3fcfb3d231601be8c65634e6f78b288f39fa649eb74dfcb459160f458c615dd,2024-09-27T13:15:13.570000
|
||||
CVE-2024-46804,1,1,334690fb38ed7bfd5a78f53f0a3b1ba033c8865cf2d15422a75c925c8f677cdd,2024-09-27T13:15:13.637000
|
||||
CVE-2024-46805,1,1,bec2b82aa25f22a5735a97792596f23efc4ed675414c01d6771246c835479c92,2024-09-27T13:15:13.707000
|
||||
CVE-2024-46806,1,1,5560b74f3e5070b55a9f244d2f06275af64aa76d7a93d6b943a47162abffb710,2024-09-27T13:15:13.773000
|
||||
CVE-2024-46807,1,1,70894da795b0bc31a39b431d1af62b819a9b8fa3cb03591a8fd0ae7d5e59c80b,2024-09-27T13:15:13.840000
|
||||
CVE-2024-46808,1,1,d6a2e7bf81073bb0bedd4129bd3a93e6a707e93048454aa00c3bf5c905b11311,2024-09-27T13:15:13.907000
|
||||
CVE-2024-46809,1,1,e6c1916b524d146a7c6e6f4b333f0bdd09785c3cdad8a05b4f1cdf2a858b26fc,2024-09-27T13:15:13.973000
|
||||
CVE-2024-46802,0,0,e9f139917d1f7ff6bc7947e33e1bbf87c15a20c520c2d26c4d874ead7ccbfa78,2024-09-27T13:15:13.483000
|
||||
CVE-2024-46803,0,0,b3fcfb3d231601be8c65634e6f78b288f39fa649eb74dfcb459160f458c615dd,2024-09-27T13:15:13.570000
|
||||
CVE-2024-46804,0,0,334690fb38ed7bfd5a78f53f0a3b1ba033c8865cf2d15422a75c925c8f677cdd,2024-09-27T13:15:13.637000
|
||||
CVE-2024-46805,0,0,bec2b82aa25f22a5735a97792596f23efc4ed675414c01d6771246c835479c92,2024-09-27T13:15:13.707000
|
||||
CVE-2024-46806,0,0,5560b74f3e5070b55a9f244d2f06275af64aa76d7a93d6b943a47162abffb710,2024-09-27T13:15:13.773000
|
||||
CVE-2024-46807,0,0,70894da795b0bc31a39b431d1af62b819a9b8fa3cb03591a8fd0ae7d5e59c80b,2024-09-27T13:15:13.840000
|
||||
CVE-2024-46808,0,0,d6a2e7bf81073bb0bedd4129bd3a93e6a707e93048454aa00c3bf5c905b11311,2024-09-27T13:15:13.907000
|
||||
CVE-2024-46809,0,0,e6c1916b524d146a7c6e6f4b333f0bdd09785c3cdad8a05b4f1cdf2a858b26fc,2024-09-27T13:15:13.973000
|
||||
CVE-2024-4681,0,0,fe9d790ee9979c1aca5fe28a3e8115d4c327b815a1753595a7df398a95b1856e,2024-06-04T19:20:46.033000
|
||||
CVE-2024-46810,1,1,f06b5ed6e4e57d9440cd1356035324bf3168516128d45f5ed833162a15e26f61,2024-09-27T13:15:14.037000
|
||||
CVE-2024-46811,1,1,9c06cbe983cf0281e42eba97849b4611a6c0b2d318efacae009163eba509674c,2024-09-27T13:15:14.107000
|
||||
CVE-2024-46812,1,1,ca538231b55475d7517cdaeacca9edd93858da44dbc948175f5cd1b98a5d49f1,2024-09-27T13:15:14.163000
|
||||
CVE-2024-46813,1,1,3dc255f99046ece5258ed3bcf8b01348f3f55504bb6e19b6345060f5ecf2fc70,2024-09-27T13:15:14.230000
|
||||
CVE-2024-46814,1,1,f28000dab7af4247743c13ee681bcb793731a3eb937baf961910ddf725759f73,2024-09-27T13:15:14.297000
|
||||
CVE-2024-46815,1,1,b1beb3dbae3607898e3f5adb0992665712715079c3a99aab4feefb9c28cac7fa,2024-09-27T13:15:14.370000
|
||||
CVE-2024-46816,1,1,d1006d0a997be568c964833163a5bfecf77f8efff19a50a5acb948bb349d9443,2024-09-27T13:15:14.433000
|
||||
CVE-2024-46817,1,1,5cc4604d98bfc67e8ebbd371a5ce325e16351c3c8d9a44dcb107a5d4d900539e,2024-09-27T13:15:14.493000
|
||||
CVE-2024-46818,1,1,1702b1609a0fc23fd13330b17748f4ff44ba31d80af3898c888487d1b291f1c4,2024-09-27T13:15:14.563000
|
||||
CVE-2024-46819,1,1,cdc2c2b19527c84de8f6216d9a7222b8d3add79380829866240a5d28d9b0b569,2024-09-27T13:15:14.640000
|
||||
CVE-2024-46810,0,0,f06b5ed6e4e57d9440cd1356035324bf3168516128d45f5ed833162a15e26f61,2024-09-27T13:15:14.037000
|
||||
CVE-2024-46811,0,0,9c06cbe983cf0281e42eba97849b4611a6c0b2d318efacae009163eba509674c,2024-09-27T13:15:14.107000
|
||||
CVE-2024-46812,0,0,ca538231b55475d7517cdaeacca9edd93858da44dbc948175f5cd1b98a5d49f1,2024-09-27T13:15:14.163000
|
||||
CVE-2024-46813,0,0,3dc255f99046ece5258ed3bcf8b01348f3f55504bb6e19b6345060f5ecf2fc70,2024-09-27T13:15:14.230000
|
||||
CVE-2024-46814,0,0,f28000dab7af4247743c13ee681bcb793731a3eb937baf961910ddf725759f73,2024-09-27T13:15:14.297000
|
||||
CVE-2024-46815,0,0,b1beb3dbae3607898e3f5adb0992665712715079c3a99aab4feefb9c28cac7fa,2024-09-27T13:15:14.370000
|
||||
CVE-2024-46816,0,0,d1006d0a997be568c964833163a5bfecf77f8efff19a50a5acb948bb349d9443,2024-09-27T13:15:14.433000
|
||||
CVE-2024-46817,0,0,5cc4604d98bfc67e8ebbd371a5ce325e16351c3c8d9a44dcb107a5d4d900539e,2024-09-27T13:15:14.493000
|
||||
CVE-2024-46818,0,0,1702b1609a0fc23fd13330b17748f4ff44ba31d80af3898c888487d1b291f1c4,2024-09-27T13:15:14.563000
|
||||
CVE-2024-46819,0,0,cdc2c2b19527c84de8f6216d9a7222b8d3add79380829866240a5d28d9b0b569,2024-09-27T13:15:14.640000
|
||||
CVE-2024-4682,0,0,b188d20fdb53d2324882bc38bcdbd4c51d4b6beb562fc8362c2866e7563895e8,2024-06-04T19:20:46.140000
|
||||
CVE-2024-46820,1,1,3ef433eca50b8bd880575b57a9b58c18ffddc5a5a29a46e58c7877eb973fc74c,2024-09-27T13:15:14.707000
|
||||
CVE-2024-46821,1,1,32fb2951ec83a47620f623c9885f71efdb8d75e12224b1ad77812cb21a28fb72,2024-09-27T13:15:14.767000
|
||||
CVE-2024-46822,1,1,f1263b53fab54e020783396758327e9d0e6c9b7c3cf62a5eb0c23b97f90ffe7c,2024-09-27T13:15:14.830000
|
||||
CVE-2024-46823,1,1,ad968e6be2162e32fa37f28af2db1dedd823e343548f0a908d2b6aeb802b54fc,2024-09-27T13:15:14.897000
|
||||
CVE-2024-46824,1,1,8e11bc388ee51b12d3aba87ff77058a91456bfc97cf3ed3834b5741b51cb1a4b,2024-09-27T13:15:14.960000
|
||||
CVE-2024-46825,1,1,dc9d6285049da1f45b87678682b02617dda0c172ebdac120be2d6f420af90752,2024-09-27T13:15:15.027000
|
||||
CVE-2024-46826,1,1,a79263a9942a970ced521484b96b8e8d54879cf827f2fad9c371bf134adccd67,2024-09-27T13:15:15.087000
|
||||
CVE-2024-46827,1,1,839d4960c2a4c7aed872145df3ce93b8155bd816176ff84646919168f458121c,2024-09-27T13:15:15.153000
|
||||
CVE-2024-46828,1,1,73d4c98ad163d106929727032cc2364c3fa94ac5f6af7f2fc5ca9a38c4607c43,2024-09-27T13:15:15.220000
|
||||
CVE-2024-46829,1,1,7513df9dc08d13690238979c00ad51e66c406e53942c6057ed1d8fa9e1776ed4,2024-09-27T13:15:15.300000
|
||||
CVE-2024-46820,0,0,3ef433eca50b8bd880575b57a9b58c18ffddc5a5a29a46e58c7877eb973fc74c,2024-09-27T13:15:14.707000
|
||||
CVE-2024-46821,0,0,32fb2951ec83a47620f623c9885f71efdb8d75e12224b1ad77812cb21a28fb72,2024-09-27T13:15:14.767000
|
||||
CVE-2024-46822,0,0,f1263b53fab54e020783396758327e9d0e6c9b7c3cf62a5eb0c23b97f90ffe7c,2024-09-27T13:15:14.830000
|
||||
CVE-2024-46823,0,0,ad968e6be2162e32fa37f28af2db1dedd823e343548f0a908d2b6aeb802b54fc,2024-09-27T13:15:14.897000
|
||||
CVE-2024-46824,0,0,8e11bc388ee51b12d3aba87ff77058a91456bfc97cf3ed3834b5741b51cb1a4b,2024-09-27T13:15:14.960000
|
||||
CVE-2024-46825,0,0,dc9d6285049da1f45b87678682b02617dda0c172ebdac120be2d6f420af90752,2024-09-27T13:15:15.027000
|
||||
CVE-2024-46826,0,0,a79263a9942a970ced521484b96b8e8d54879cf827f2fad9c371bf134adccd67,2024-09-27T13:15:15.087000
|
||||
CVE-2024-46827,0,0,839d4960c2a4c7aed872145df3ce93b8155bd816176ff84646919168f458121c,2024-09-27T13:15:15.153000
|
||||
CVE-2024-46828,0,0,73d4c98ad163d106929727032cc2364c3fa94ac5f6af7f2fc5ca9a38c4607c43,2024-09-27T13:15:15.220000
|
||||
CVE-2024-46829,0,0,7513df9dc08d13690238979c00ad51e66c406e53942c6057ed1d8fa9e1776ed4,2024-09-27T13:15:15.300000
|
||||
CVE-2024-4683,0,0,f97d6282ccf029728c8ab8e65ca2b64efa101897ef8ccdc22b5456d11d66a8f8,2024-06-04T19:20:46.247000
|
||||
CVE-2024-46830,1,1,555fbd23e90e6a4d8ed9fc3e2eca36a0921cdb43ed2b42ddaef05104c9065f7d,2024-09-27T13:15:15.380000
|
||||
CVE-2024-46831,1,1,3dc39b10de7d65692acfd01caa41762cb48e875e45d7c8e01cf68c9c32e8067e,2024-09-27T13:15:15.457000
|
||||
CVE-2024-46832,1,1,8a1fb9539331fab60df65adb24a11cc6547e8c12c01455cbc70879b717832d56,2024-09-27T13:15:15.517000
|
||||
CVE-2024-46833,1,1,adb5ff85207df54032ae82679b3a2df42bc9c878ec4542ddfe015405ece402bf,2024-09-27T13:15:15.593000
|
||||
CVE-2024-46834,1,1,688c15b693b074e3e8c9eaa1aa90d0b27824550e5cda417a8a3100e5485703c6,2024-09-27T13:15:15.660000
|
||||
CVE-2024-46835,1,1,bd4756ea73ef83edea87ca48ade55fe7fd9d7c9ad2f007d94e4ac9a64fa48807,2024-09-27T13:15:15.720000
|
||||
CVE-2024-46836,1,1,d122e6c84b1df5ab0f643192a6dece9f096e3630c5b46fc1c3ecfe33f629aadd,2024-09-27T13:15:15.780000
|
||||
CVE-2024-46837,1,1,657a60314cbdeb0d214650deab977b47bcd2c3c230a9ab235b55f2a676691232,2024-09-27T13:15:15.850000
|
||||
CVE-2024-46838,1,1,714c00816c1783ceb7c4ab1ce3b3d0ed56f5411141d8872b72ac5a3e6d3aee22,2024-09-27T13:15:15.920000
|
||||
CVE-2024-46839,1,1,50455736c6dd8fe8730b4c3de68b4dae5c09fe48f915e4ea05d48dbb7fa20420,2024-09-27T13:15:15.980000
|
||||
CVE-2024-46830,0,0,555fbd23e90e6a4d8ed9fc3e2eca36a0921cdb43ed2b42ddaef05104c9065f7d,2024-09-27T13:15:15.380000
|
||||
CVE-2024-46831,0,0,3dc39b10de7d65692acfd01caa41762cb48e875e45d7c8e01cf68c9c32e8067e,2024-09-27T13:15:15.457000
|
||||
CVE-2024-46832,0,0,8a1fb9539331fab60df65adb24a11cc6547e8c12c01455cbc70879b717832d56,2024-09-27T13:15:15.517000
|
||||
CVE-2024-46833,0,0,adb5ff85207df54032ae82679b3a2df42bc9c878ec4542ddfe015405ece402bf,2024-09-27T13:15:15.593000
|
||||
CVE-2024-46834,0,0,688c15b693b074e3e8c9eaa1aa90d0b27824550e5cda417a8a3100e5485703c6,2024-09-27T13:15:15.660000
|
||||
CVE-2024-46835,0,0,bd4756ea73ef83edea87ca48ade55fe7fd9d7c9ad2f007d94e4ac9a64fa48807,2024-09-27T13:15:15.720000
|
||||
CVE-2024-46836,0,0,d122e6c84b1df5ab0f643192a6dece9f096e3630c5b46fc1c3ecfe33f629aadd,2024-09-27T13:15:15.780000
|
||||
CVE-2024-46837,0,0,657a60314cbdeb0d214650deab977b47bcd2c3c230a9ab235b55f2a676691232,2024-09-27T13:15:15.850000
|
||||
CVE-2024-46838,0,0,714c00816c1783ceb7c4ab1ce3b3d0ed56f5411141d8872b72ac5a3e6d3aee22,2024-09-27T13:15:15.920000
|
||||
CVE-2024-46839,0,0,50455736c6dd8fe8730b4c3de68b4dae5c09fe48f915e4ea05d48dbb7fa20420,2024-09-27T13:15:15.980000
|
||||
CVE-2024-4684,0,0,76a2bcc81dc9a2c7f19544710090eea770016f263f5b8a63e7b8f826540bfd29,2024-06-04T19:20:46.347000
|
||||
CVE-2024-46840,1,1,6b2fa36be6044c2e6c7390f4b17867705bc01d5d9f8042ad1283c2312c824bce,2024-09-27T13:15:16.057000
|
||||
CVE-2024-46841,1,1,df19dc471a4d283b56f4fc2152cfed78bb6777693c89f01284d2ab648fec09a1,2024-09-27T13:15:16.130000
|
||||
CVE-2024-46842,1,1,7182a8bafa709a3acd8e7be1b39c8c3306260b5f6efd0bc8b8f994ce6a432517,2024-09-27T13:15:16.190000
|
||||
CVE-2024-46843,1,1,fb456a5b80db8d6621d16b8a73d382a8c2703e9783a4da9880da40e45a3acc27,2024-09-27T13:15:16.250000
|
||||
CVE-2024-46844,1,1,da93dce1dd9e9b752304fe37d74bd5feac9b871c3846b3ae9491151ddcac1089,2024-09-27T13:15:16.313000
|
||||
CVE-2024-46845,1,1,58824907706a811a1a09e91eeaf9c2af2e6d29a45cf2298723929cab62e9ca1f,2024-09-27T13:15:16.397000
|
||||
CVE-2024-46846,1,1,9b22315605a2e611e51e7817f4272aec0b9d06c1b21856864d348b2ee6060a2e,2024-09-27T13:15:16.480000
|
||||
CVE-2024-46847,1,1,f403b8e963763ce9d81a628c3e84dcad121b7022281c6fc5382ce58651628d62,2024-09-27T13:15:16.570000
|
||||
CVE-2024-46848,1,1,5d5bc0c9f7ca69b110d37e437fc2b95e88bf0d02189c3a5d3068eaa5fd021983,2024-09-27T13:15:16.657000
|
||||
CVE-2024-46849,1,1,8e00099733b45c4761a725d526666bbfa9c0a5f1159c26f360f3cf422d7dac17,2024-09-27T13:15:16.723000
|
||||
CVE-2024-46840,0,0,6b2fa36be6044c2e6c7390f4b17867705bc01d5d9f8042ad1283c2312c824bce,2024-09-27T13:15:16.057000
|
||||
CVE-2024-46841,0,0,df19dc471a4d283b56f4fc2152cfed78bb6777693c89f01284d2ab648fec09a1,2024-09-27T13:15:16.130000
|
||||
CVE-2024-46842,0,0,7182a8bafa709a3acd8e7be1b39c8c3306260b5f6efd0bc8b8f994ce6a432517,2024-09-27T13:15:16.190000
|
||||
CVE-2024-46843,0,0,fb456a5b80db8d6621d16b8a73d382a8c2703e9783a4da9880da40e45a3acc27,2024-09-27T13:15:16.250000
|
||||
CVE-2024-46844,0,0,da93dce1dd9e9b752304fe37d74bd5feac9b871c3846b3ae9491151ddcac1089,2024-09-27T13:15:16.313000
|
||||
CVE-2024-46845,0,0,58824907706a811a1a09e91eeaf9c2af2e6d29a45cf2298723929cab62e9ca1f,2024-09-27T13:15:16.397000
|
||||
CVE-2024-46846,0,0,9b22315605a2e611e51e7817f4272aec0b9d06c1b21856864d348b2ee6060a2e,2024-09-27T13:15:16.480000
|
||||
CVE-2024-46847,0,0,f403b8e963763ce9d81a628c3e84dcad121b7022281c6fc5382ce58651628d62,2024-09-27T13:15:16.570000
|
||||
CVE-2024-46848,0,0,5d5bc0c9f7ca69b110d37e437fc2b95e88bf0d02189c3a5d3068eaa5fd021983,2024-09-27T13:15:16.657000
|
||||
CVE-2024-46849,0,0,8e00099733b45c4761a725d526666bbfa9c0a5f1159c26f360f3cf422d7dac17,2024-09-27T13:15:16.723000
|
||||
CVE-2024-4685,0,0,38350af74ad68911fd851342727812175d5d39b6f847c1ca12945db68e23926c,2024-06-04T19:20:46.443000
|
||||
CVE-2024-46850,1,1,4f262e2458bf867873395eb1be206dc95131f0ca7899833372d25c463782fe17,2024-09-27T13:15:16.787000
|
||||
CVE-2024-46851,1,1,4ef6a63c49c19f1f0606ad6391b5b8e01536eed259c2d187dfbc5ca66e8ced6f,2024-09-27T13:15:16.850000
|
||||
CVE-2024-46852,1,1,4d57dbe85354a8265bd8961196b2eba9526edfc3a33c74c97081c3e33639523e,2024-09-27T13:15:16.917000
|
||||
CVE-2024-46853,1,1,1a561997e56ca448bc9b9306b8c8f023ce4fa58b91ef7d2bfcf08c8937ff9e94,2024-09-27T13:15:16.997000
|
||||
CVE-2024-46854,1,1,6b4b8e3a1763a75b94fee7079bffa9a836dc1962e35d0c74221e9b3490bf0200,2024-09-27T13:15:17.063000
|
||||
CVE-2024-46855,1,1,367ccc9814a06e060c65f49493361f6016bdb2e0dae7ef3551e1deba3573154c,2024-09-27T13:15:17.133000
|
||||
CVE-2024-46856,1,1,c6de094553adece9d8b4314b32053a86ff4989311778f6efbe882e7b6c6f1151,2024-09-27T13:15:17.210000
|
||||
CVE-2024-46857,1,1,10433c2ba74e2dcaee28f156ebcf8e72dadd20f6f216fb23bd30b126205c3166,2024-09-27T13:15:17.277000
|
||||
CVE-2024-46858,1,1,a2960ce21730d5c76dc962c9159bb0b3a9ba6b7e28e33460f91a80a497a0e168,2024-09-27T13:15:17.353000
|
||||
CVE-2024-46859,1,1,19794ab467d8d430f5ff0af3ddf03ebebbf21aa4cacfd9477037687bfef359d7,2024-09-27T13:15:17.430000
|
||||
CVE-2024-46850,0,0,4f262e2458bf867873395eb1be206dc95131f0ca7899833372d25c463782fe17,2024-09-27T13:15:16.787000
|
||||
CVE-2024-46851,0,0,4ef6a63c49c19f1f0606ad6391b5b8e01536eed259c2d187dfbc5ca66e8ced6f,2024-09-27T13:15:16.850000
|
||||
CVE-2024-46852,0,0,4d57dbe85354a8265bd8961196b2eba9526edfc3a33c74c97081c3e33639523e,2024-09-27T13:15:16.917000
|
||||
CVE-2024-46853,0,0,1a561997e56ca448bc9b9306b8c8f023ce4fa58b91ef7d2bfcf08c8937ff9e94,2024-09-27T13:15:16.997000
|
||||
CVE-2024-46854,0,0,6b4b8e3a1763a75b94fee7079bffa9a836dc1962e35d0c74221e9b3490bf0200,2024-09-27T13:15:17.063000
|
||||
CVE-2024-46855,0,0,367ccc9814a06e060c65f49493361f6016bdb2e0dae7ef3551e1deba3573154c,2024-09-27T13:15:17.133000
|
||||
CVE-2024-46856,0,0,c6de094553adece9d8b4314b32053a86ff4989311778f6efbe882e7b6c6f1151,2024-09-27T13:15:17.210000
|
||||
CVE-2024-46857,0,0,10433c2ba74e2dcaee28f156ebcf8e72dadd20f6f216fb23bd30b126205c3166,2024-09-27T13:15:17.277000
|
||||
CVE-2024-46858,0,0,a2960ce21730d5c76dc962c9159bb0b3a9ba6b7e28e33460f91a80a497a0e168,2024-09-27T13:15:17.353000
|
||||
CVE-2024-46859,0,0,19794ab467d8d430f5ff0af3ddf03ebebbf21aa4cacfd9477037687bfef359d7,2024-09-27T13:15:17.430000
|
||||
CVE-2024-4686,0,0,7fade2d4b0959e1a2b3034c64ee7734431bcab648eb69e4bd96a18330c891096,2024-06-20T20:15:19.483000
|
||||
CVE-2024-46860,1,1,0df983f2eb92cc3b84570b02adb6b4b777d10dcb2dc7082af2b6a5233c6d5e74,2024-09-27T13:15:17.493000
|
||||
CVE-2024-46861,1,1,ff4ce1e67ee5c0143292d9664a0e40d0d03af20384cb8616942a881722ad45d9,2024-09-27T13:15:17.563000
|
||||
CVE-2024-46862,1,1,a37124b1a78b42c293cc5e8694627936a5f2b47374a8359618860d7e55a17b34,2024-09-27T13:15:17.627000
|
||||
CVE-2024-46863,1,1,049de94b0edf7a6cb3a13d19398d8d6c073734c335bcb7575ee8e38866e801dd,2024-09-27T13:15:17.690000
|
||||
CVE-2024-46864,1,1,4c906437925acc01e0722fb1c63950a249a7408d540cc416fbdb0a039a800e92,2024-09-27T13:15:17.747000
|
||||
CVE-2024-46865,1,1,1dbc9b5ba186923b4742e36d49203a434956c8fbe94fcc66757c5dcafc28984e,2024-09-27T13:15:17.820000
|
||||
CVE-2024-46866,1,1,982d7ec829e63761004e72cab06c55eec1acd818ec554d5ba1c8696819c1fdf8,2024-09-27T13:15:17.887000
|
||||
CVE-2024-46867,1,1,fe7c2edcd1c7e392d0823fc3aa8ffeb9c78398713a78de62c1887c286221356e,2024-09-27T13:15:17.937000
|
||||
CVE-2024-46868,1,1,e1f3ecacc97b31ed308f3f47ebdc27c0a1b062ab67d1ce71db8ea81907e1770a,2024-09-27T13:15:18.007000
|
||||
CVE-2024-46860,0,0,0df983f2eb92cc3b84570b02adb6b4b777d10dcb2dc7082af2b6a5233c6d5e74,2024-09-27T13:15:17.493000
|
||||
CVE-2024-46861,0,0,ff4ce1e67ee5c0143292d9664a0e40d0d03af20384cb8616942a881722ad45d9,2024-09-27T13:15:17.563000
|
||||
CVE-2024-46862,0,0,a37124b1a78b42c293cc5e8694627936a5f2b47374a8359618860d7e55a17b34,2024-09-27T13:15:17.627000
|
||||
CVE-2024-46863,0,0,049de94b0edf7a6cb3a13d19398d8d6c073734c335bcb7575ee8e38866e801dd,2024-09-27T13:15:17.690000
|
||||
CVE-2024-46864,0,0,4c906437925acc01e0722fb1c63950a249a7408d540cc416fbdb0a039a800e92,2024-09-27T13:15:17.747000
|
||||
CVE-2024-46865,0,0,1dbc9b5ba186923b4742e36d49203a434956c8fbe94fcc66757c5dcafc28984e,2024-09-27T13:15:17.820000
|
||||
CVE-2024-46866,0,0,982d7ec829e63761004e72cab06c55eec1acd818ec554d5ba1c8696819c1fdf8,2024-09-27T13:15:17.887000
|
||||
CVE-2024-46867,0,0,fe7c2edcd1c7e392d0823fc3aa8ffeb9c78398713a78de62c1887c286221356e,2024-09-27T13:15:17.937000
|
||||
CVE-2024-46868,0,0,e1f3ecacc97b31ed308f3f47ebdc27c0a1b062ab67d1ce71db8ea81907e1770a,2024-09-27T13:15:18.007000
|
||||
CVE-2024-4687,0,0,5435981fd840e586246d5a6c7c954862d5332569f9e647b4965c896a6669b062,2024-06-04T19:20:46.547000
|
||||
CVE-2024-4688,0,0,52289ed8c0286442cd44c00a18386eec964a66f3ff263d13f6b3a47ad78257b2,2024-06-20T20:15:19.617000
|
||||
CVE-2024-4689,0,0,a13cc88d2e9b12d452cf9b42ce57cc1735d851f3f551a07c40e7bb0f2ee113b8,2024-05-14T16:11:39.510000
|
||||
@ -260641,8 +260656,8 @@ CVE-2024-47047,0,0,0a4a15ee2fb8d94ee7dbf9b3ee25f3c32a7e76c7b103a0dd6583489587dba
|
||||
CVE-2024-47048,0,0,3e2f1651277aae0b881ff2293ea5a1adce6f7fca0dbe63c48af088557b921506,2024-09-26T17:12:07.440000
|
||||
CVE-2024-47049,0,0,bc768f951de25f2d3b7ee4ed4c1188c49a1568cca5cfdd9dc385ac790402738a,2024-09-20T12:30:51.220000
|
||||
CVE-2024-4705,0,0,26b272539ad739bf4cdb858b2e8b5e748c64203d796935ad814b34867a2408a1,2024-07-23T21:15:15.147000
|
||||
CVE-2024-47050,0,0,5ddac1f8a8053f0642ae4dbec5cd7e9a4084918d6fb4495768633d435a3f2c23,2024-09-20T12:30:17.483000
|
||||
CVE-2024-47058,0,0,ce9dc8340a8922ed16d37cd23094d408dba7fce77515a97a3b8ba24288e2b02f,2024-09-20T12:30:17.483000
|
||||
CVE-2024-47050,0,1,4296aa963533e4a7521fa22cb8b50e427318f2d783af0da7884f907ad4fc085b,2024-09-27T15:29:21.450000
|
||||
CVE-2024-47058,0,1,1e972d8f0df7a48ab103a834b6d9eb8c181e8f51fba2eb0fd8d68faea4946bf9,2024-09-27T15:31:30.917000
|
||||
CVE-2024-47059,0,0,1ded05aa2ea1e0adbe840bc57816abecb4dbdb9b2a551e659bc55563f7788a30,2024-09-20T12:30:17.483000
|
||||
CVE-2024-4706,0,0,9fb317504579dba9e9851d8ef4d6ad37a71c1b39f231cbe007ab86fbaba76dfc,2024-05-24T01:15:30.977000
|
||||
CVE-2024-47060,0,0,3723bb9e2990e983919d891a0f942a097942693d70a5d147a7a34b2c3bd8fa94,2024-09-25T16:43:47.267000
|
||||
@ -260696,6 +260711,8 @@ CVE-2024-47177,0,0,4693ff070f9f11940b1b6fa608419c33ee06a3d35c330a56c23ddcccb6e86
|
||||
CVE-2024-47179,0,0,9058d44736aa5879fe15ebac05ddf4897c6368571c116083074f73c4d934c6d8,2024-09-26T20:15:06.950000
|
||||
CVE-2024-4718,0,0,2fda56f630ea417950b3260007ed553b407a44c514b05be289e283a21ee915c1,2024-06-06T20:15:14.717000
|
||||
CVE-2024-47180,0,0,d098d674c2c5dd84a239cf91df06907f039b4828c306456dcad3f506e675b516,2024-09-26T20:15:07.310000
|
||||
CVE-2024-47182,1,1,69a16fc9154ea6d7ac97d74655916e8770997f865ecb98299d0d581a01a394b7,2024-09-27T14:15:04.620000
|
||||
CVE-2024-47184,1,1,af8ebb1816d7ba0a039271d512029a4f3a5177b9bc7103f3acf040e130a3146c,2024-09-27T14:15:04.833000
|
||||
CVE-2024-4719,0,0,5f15010ce3da97593d62bd8e5cbd7e4df0db8fec077945fcbb72e898184ff8a0,2024-06-20T20:15:19.763000
|
||||
CVE-2024-47197,0,0,e744485fe82b2c7f5b7c9d650df3296f2a00094efea0a5ed0597ce38048212b5,2024-09-26T13:32:02.803000
|
||||
CVE-2024-4720,0,0,eb5b6c06efbc2e8e5b700d46905e09781ba603e4dc4e18ff8664640e85fa6762,2024-06-04T19:20:47.440000
|
||||
@ -262130,7 +262147,7 @@ CVE-2024-6334,0,0,3daf0dfe09252e7765ca30c739cfcc033a43a657c17c0275e173ac67050452
|
||||
CVE-2024-6336,0,0,d15a7371f14974a83964ccd43d827dda2013bed4e54e361d69b27a97f9fa2a0d,2024-09-17T15:23:02.077000
|
||||
CVE-2024-6337,0,0,2e78350836fa8817ff4aec79c82f6f0f98d78739985b39708ec542654e5f48f4,2024-08-21T12:30:33.697000
|
||||
CVE-2024-6338,0,0,8956384d5cc966970e625ecbde4127bb4f84d940fa059b7aaed0155a833fd98c,2024-07-19T20:24:40.397000
|
||||
CVE-2024-6339,0,0,900c18b99c3b938f801abc6ad5fe5a877c8e068ea7f11186df65574c46246a21,2024-08-21T12:30:33.697000
|
||||
CVE-2024-6339,0,1,3df67bcf844ce237505ce6d6f4a1b23415ac19dce852377f3625a08647b9b177,2024-09-27T14:04:31.700000
|
||||
CVE-2024-6340,0,0,fd12f25a45d92fefbb8c0ec47428250f4f56bb9c686a12a52e54d86e24fec10a,2024-07-03T18:27:40.903000
|
||||
CVE-2024-6341,0,0,528f4fdde1526d72477e90a767b2f2316b168f65b64effeddb9446d8a5cdcaf5,2024-07-02T18:15:03.900000
|
||||
CVE-2024-6342,0,0,fc4f36196431f464caa5a00be2d63e1b0b442bd3ad06196175f1330a8fdfe779,2024-09-10T12:09:50.377000
|
||||
@ -262170,7 +262187,7 @@ CVE-2024-6382,0,0,9f140af24f460b4413fa844f95383cc153754360a136939b8743c2d8327ebf
|
||||
CVE-2024-6383,0,0,4622f4fc90fbde51d6570a14e2ee494e3e71659c68201475e4e4eb659c036ac0,2024-07-05T12:55:51.367000
|
||||
CVE-2024-6384,0,0,69acc14adf4ad2dfa9acf19196e8d21558fac0b5469b1fd3bf540f24a32ab6da,2024-08-16T14:29:24.947000
|
||||
CVE-2024-6385,0,0,13d2095bcd11ed43b6c47262c7b96c8a9e162b20cb975895bc98c3af67d39ff6,2024-07-12T16:49:14.047000
|
||||
CVE-2024-6386,0,1,f7785143a7449c5f4f7c2d61744dd4c93b2b9f3680cfe79b21fc89908b1565bd,2024-09-27T13:25:43.077000
|
||||
CVE-2024-6386,0,0,f7785143a7449c5f4f7c2d61744dd4c93b2b9f3680cfe79b21fc89908b1565bd,2024-09-27T13:25:43.077000
|
||||
CVE-2024-6387,0,0,33e863f5fbdb5ebd28cdb76db79962b7a834a7793cc2d1eb4023a387b3acaea2,2024-09-14T03:15:08.143000
|
||||
CVE-2024-6388,0,0,0ce37f83493b5d79bb3fdc963327390bc09266ac17f5f1de660cf43d4cdce70d,2024-06-27T17:11:52.390000
|
||||
CVE-2024-6389,0,0,97619f937594e57440ea9f8cb3d55fe9ec171c40b4959fd4a8bcfb76e0e63169,2024-09-14T15:10:39.037000
|
||||
@ -262242,7 +262259,7 @@ CVE-2024-6472,0,0,06cfc3c26e9764572c1adb3e446cad13cb9599b02c4c47946f6698a134e258
|
||||
CVE-2024-6473,0,0,9d329dd670917bde4dfbebd26b87a1f0ac64a0b550d97fba6854ff35150aadd6,2024-09-05T14:19:45.153000
|
||||
CVE-2024-6477,0,0,095ad8bec127bb97feb0819e6df5852cd52601b6cc4ba1d92128a3b9897811f6,2024-09-06T17:35:19.087000
|
||||
CVE-2024-6481,0,0,8a6ed16cb15e9b1be7b8ecc3c869a269748ddec5ecbc3504e8d7f068ea116af3,2024-08-08T14:35:14.190000
|
||||
CVE-2024-6482,0,1,72bf8f43b51dedcbd3503b13fb1098e532f5e135aadff3ebc844afe2ce28381d,2024-09-27T13:54:53.837000
|
||||
CVE-2024-6482,0,0,72bf8f43b51dedcbd3503b13fb1098e532f5e135aadff3ebc844afe2ce28381d,2024-09-27T13:54:53.837000
|
||||
CVE-2024-6484,0,0,bc633abd6bfb9da06585afdfb273066dfbc508847026385eb612d46f7c70ed29,2024-07-11T18:09:58.777000
|
||||
CVE-2024-6485,0,0,b143d2f5de1cad2c57f83d18fe64abfe0ba2da69210341aec4863f07cdd850cb,2024-07-11T18:09:58.777000
|
||||
CVE-2024-6487,0,0,ade8feb977b02299075dd869ca65fb48f198290ee8a478009ada36ae91b54213,2024-08-01T14:00:24
|
||||
@ -262747,6 +262764,7 @@ CVE-2024-7144,0,0,57a5a71f7611d2bbf4fd3384e95cd03b39e04b60449356a588f871c88f4479
|
||||
CVE-2024-7145,0,0,09358b8e986da363b6baeebea664dedb137746de39229d5884046e73cf837e28,2024-09-13T14:39:44.490000
|
||||
CVE-2024-7146,0,0,0d097eb41f121dd3c78bcb7ece20b3c3122f8d7908fd573306f5f8009daac9d3,2024-08-19T13:00:23.117000
|
||||
CVE-2024-7147,0,0,d64b7d45d4df4fda891fe044ed5ed11da3adfb67eec103504ae2ce9a34185836,2024-08-19T13:00:23.117000
|
||||
CVE-2024-7149,1,1,db751ba45894771bbe2c7358eb82d0e711876ef9a7845804adf4692a0c8494e5,2024-09-27T14:15:05.043000
|
||||
CVE-2024-7150,0,0,c7aa662c62f137fc9f5e7c2c4fa11d684ce4d74402782286c7770e7f6bcc041e,2024-08-08T13:04:18.753000
|
||||
CVE-2024-7151,0,0,27748e77ac666f37b5ea95444b5871c2d624c12d124d7b3d9588f7bd43672a12,2024-07-29T14:12:08.783000
|
||||
CVE-2024-7152,0,0,dcb2ef4ff482b2e3310b87257a8cfd0ded02bb0f2f9cc18d404e9808150d9dbb,2024-07-29T14:12:08.783000
|
||||
@ -262833,7 +262851,7 @@ CVE-2024-7254,0,0,8400894e8711410825184771bcde9b50c684e58b49dfe4878e8d0a79485e21
|
||||
CVE-2024-7255,0,0,a4eb887a2aa91b61ced64af6faa636cef124d2fd1032af5abcd1e986918698ff,2024-08-16T15:23:19.167000
|
||||
CVE-2024-7256,0,0,28c6c5405ca0661376f4706f7e75647b14826bc648847c0c2ef29d4ee5bafea0,2024-08-03T18:35:04.003000
|
||||
CVE-2024-7257,0,0,e6ef266df52e25692b132cfb6522d79defb5eb3e548daae54be1d69b0c3ab16e,2024-08-05T12:41:45.957000
|
||||
CVE-2024-7258,0,1,d87745b439eb0eec0ee02b318012450e9a5bbd9a1641e9180767ba5e2e2be570,2024-09-27T13:05:06.930000
|
||||
CVE-2024-7258,0,0,d87745b439eb0eec0ee02b318012450e9a5bbd9a1641e9180767ba5e2e2be570,2024-09-27T13:05:06.930000
|
||||
CVE-2024-7259,0,0,06b546cb7425acd940841d9812f3e9ea327d9484b7605f96ad6e03fcd1cd086d,2024-09-26T16:15:08.997000
|
||||
CVE-2024-7260,0,0,7ac5c086a530cf5346822fe722bc0e211467ce336a1543005152dae602c7481a,2024-09-26T15:01:07.803000
|
||||
CVE-2024-7261,0,0,f672393d607443ec498009a9b040ef410e3a579843a04e18027fe16c96a4fd8c,2024-09-13T19:39:40.570000
|
||||
@ -262913,7 +262931,7 @@ CVE-2024-7347,0,0,bf8562cb670939d7931c5691727a53bfc7fe78942e30ee3ed14dd0e17a8cc5
|
||||
CVE-2024-7348,0,0,3d1228f3ad08ea7cfe68d4df8a31a5ae3b9df9b86e858b3756b13b4b2c220a8e,2024-08-12T15:54:52.320000
|
||||
CVE-2024-7349,0,0,1654fb20b3d5b8111af7165700d7dd7fc184ee1783ff4e6ae92268a2f53d23f5,2024-09-12T12:43:32.957000
|
||||
CVE-2024-7350,0,0,d4174556ac92d5e9a2a8dc8d5eec461477866543996df72c5d41b5df846ab0dc,2024-08-08T13:04:18.753000
|
||||
CVE-2024-7351,0,1,a289bf4a77945a66ead7c1b1e012c68ef66822055b6831555c4ba82ee4eaeaa9,2024-09-27T12:48:20.803000
|
||||
CVE-2024-7351,0,0,a289bf4a77945a66ead7c1b1e012c68ef66822055b6831555c4ba82ee4eaeaa9,2024-09-27T12:48:20.803000
|
||||
CVE-2024-7353,0,0,41679b571aeb0f65d12733ad6909f06c490b83d168f3a79e42cd0098d7b4bdde,2024-08-07T15:17:46.717000
|
||||
CVE-2024-7354,0,0,05748d08bcbd17e04b0b98f979c499c8aa6244b799a5028096361dae17757c61,2024-09-03T14:35:08.287000
|
||||
CVE-2024-7355,0,0,071610fbf603e9022aa74d299a7d28ffd46303d85d85cb60c4b41df2eba6145e,2024-08-07T15:17:46.717000
|
||||
@ -262944,7 +262962,7 @@ CVE-2024-7380,0,0,cff48b7b0159d24f65855cb71d23b2ce33ffaef31476b244ab20ece89285d1
|
||||
CVE-2024-7381,0,0,ca7cc8a67702d68f3387a7110e4857f594b40c8a2313eee62c5e57679029037d,2024-09-06T10:44:38.390000
|
||||
CVE-2024-7382,0,0,38dbfd05201dede10e421fed3e3b0d675c062e51a3aa3f6428b06fad8a88c553,2024-08-12T13:41:36.517000
|
||||
CVE-2024-7383,0,0,21277f7530eb9638c0031a3484c43cc9bf1c76998abaa0508791395c60c4cd7b,2024-09-25T01:15:45.270000
|
||||
CVE-2024-7384,0,1,e16089be5aef5f78ca7e6b44ab3843ceb098d29ed31bfeb024ecf87d32c582a0,2024-09-27T13:15:28.443000
|
||||
CVE-2024-7384,0,0,e16089be5aef5f78ca7e6b44ab3843ceb098d29ed31bfeb024ecf87d32c582a0,2024-09-27T13:15:28.443000
|
||||
CVE-2024-7385,0,0,a77c5e9bd92ca25ffb5d5fc3a083bc3c8336b2e231394dd2af48112daf35e0eb,2024-09-26T13:32:02.803000
|
||||
CVE-2024-7386,0,0,73853b6e40a3b4b4a94fcf4c59609f559f6495383ceafa0a1df8f3191c741131,2024-09-26T13:32:02.803000
|
||||
CVE-2024-7387,0,0,de7380b259c5cde0120b2e8a809f8a10a35a7d4a44cb8d5f57cbb1470484b8a0,2024-09-20T12:31:20.110000
|
||||
@ -263284,7 +263302,7 @@ CVE-2024-7832,0,0,d4a13ef09d831987125a8ecb9cb6f57fc4d78d65bea0a84d0e17ca92ee69e7
|
||||
CVE-2024-7833,0,0,b984e9fbf1df09267f07d264c50d0ef7583d91d54c2e1f8dd098a2d9fc6334c8,2024-08-19T16:00:21.393000
|
||||
CVE-2024-7834,0,0,ebe9de8b36536d4820911cd556ba678f6b7b55833622e60cf4b49b06fccd4ac0,2024-09-05T17:52:06.147000
|
||||
CVE-2024-7835,0,0,a98c27e86b496b21f60fe5d08184e2ecc9eaf4566c38f6b900e7048c14c277ba,2024-09-26T13:32:55.343000
|
||||
CVE-2024-7836,0,1,7e60d885d310741686f6c1eeb7bb5889e64eb59bcb33504b8c9e01388f42accf,2024-09-27T12:53:58.200000
|
||||
CVE-2024-7836,0,0,7e60d885d310741686f6c1eeb7bb5889e64eb59bcb33504b8c9e01388f42accf,2024-09-27T12:53:58.200000
|
||||
CVE-2024-7838,0,0,27df02a5cc65e831a93d364f5957ee1462f1aebc7844c7c31edfb410cb0a1545,2024-08-20T19:16:59.373000
|
||||
CVE-2024-7839,0,0,188e96c2e6da74526fb5bd6714aa4962487dce47bff2bfe2c2ee9934d7c43ce6,2024-08-19T21:18:14.097000
|
||||
CVE-2024-7841,0,0,30d01d8bbe3d144bba2b7827240fa327034b88590168a3760f5fd6645e24392a,2024-08-21T14:12:12.943000
|
||||
@ -263320,7 +263338,7 @@ CVE-2024-7884,0,0,785c516d1dabe55fa31f7695706ba6a05f994a8f8d63c46081a0777ad4e173
|
||||
CVE-2024-7885,0,0,b180edc3f841635966345269d0abc3580da7735701efbdcde3f656f6bc9ddf46,2024-09-19T20:15:07.410000
|
||||
CVE-2024-7886,0,0,b8c1f856b8479c6982faa8a2fc4a6d8b2480e045b8b096d9bd3b8640a06eb6f3,2024-08-19T13:00:23.117000
|
||||
CVE-2024-7887,0,0,ba2ac28c88e5c856e9fa78c00b11f37e0df98a3508bf609dc9edbaa04a8fdb8e,2024-08-19T12:59:59.177000
|
||||
CVE-2024-7888,0,1,57ff3b28678f008c2bdd72bf81b6e5b1bbb449b0748e8292d87b9d1342b8d17e,2024-09-27T13:45:33.030000
|
||||
CVE-2024-7888,0,0,57ff3b28678f008c2bdd72bf81b6e5b1bbb449b0748e8292d87b9d1342b8d17e,2024-09-27T13:45:33.030000
|
||||
CVE-2024-7889,0,0,67539a9ea3afa10e1ef371a140e40e7f2e32fcedee02ec133e59e6ef2a347260,2024-09-13T18:35:18.777000
|
||||
CVE-2024-7890,0,0,1dded06d7bba5f894e59f4fd824f843aaf6c5f24e5dfcfedb3ff09adc8671b20,2024-09-13T18:35:19.517000
|
||||
CVE-2024-7891,0,0,5aaf92f1216ccc2cb89b6db2b8f39b542c60dfffb3bd17a4a092f87d2244167e,2024-09-12T20:35:27.267000
|
||||
@ -263674,7 +263692,7 @@ CVE-2024-8417,0,0,8580cbd844a53cf335c90d7b0b427ee4c081c6060c525d72a654406a58e7a0
|
||||
CVE-2024-8418,0,0,45db7c5e32209561e336e52f972f2bde6e59f6364560666284054dcf874b8fe1,2024-09-17T20:15:06.710000
|
||||
CVE-2024-8427,0,0,57dcbf97b68dfdac544ef9faf52bed3587edeaacde16f067da96879677802837,2024-09-11T17:41:18.733000
|
||||
CVE-2024-8428,0,0,224fe311bf12d06d4c690b8d9ea3bc4f42261bcb370dc3457883b86fb932f74d,2024-09-26T21:58:45.393000
|
||||
CVE-2024-8432,0,1,8868d9b36bd238df6f75f7287d6bafac4ff3b898eed233d7b4ed5ce985d677d0,2024-09-27T12:58:58.433000
|
||||
CVE-2024-8432,0,0,8868d9b36bd238df6f75f7287d6bafac4ff3b898eed233d7b4ed5ce985d677d0,2024-09-27T12:58:58.433000
|
||||
CVE-2024-8434,0,0,a7dd938925c560d2c4358a00a748e9c070db95d94d7906c441d33bc026b679c8,2024-09-26T13:32:02.803000
|
||||
CVE-2024-8436,0,0,0d153a053863f3621c53c1e26deb2ddde74385c0ccdd737c792b34eb9af883c1,2024-09-26T13:32:02.803000
|
||||
CVE-2024-8437,0,0,4b506df7175b44ffa93e3ef9b1fdedd8455751a5d7f25e7c7b69c7cd1dfd7636,2024-09-26T13:32:02.803000
|
||||
@ -263721,7 +263739,7 @@ CVE-2024-8529,0,0,12671b61ed295efe6d3d38d0b158765da76f16b719201c5bbfb86ca5ed8c38
|
||||
CVE-2024-8533,0,0,ceba1d609043d018dd2a5c62af783c64aebd2125e63ee811ba18e8a1d6a8510b,2024-09-19T01:57:23.830000
|
||||
CVE-2024-8538,0,0,037a1de419d434bcf3dba0ee797a8b9a465b537393317b1c47cc2bb770ec2f49,2024-09-26T16:28:02.990000
|
||||
CVE-2024-8543,0,0,e190cfdf6def9f928d16ce7c20119d5fac7745c9206ec7d9500145321b367e4b,2024-09-10T12:09:50.377000
|
||||
CVE-2024-8544,0,1,029a23631e96ee15c1045dd3fa22aca85d39405998de7d891aefcd30e632fd70,2024-09-27T12:57:21.617000
|
||||
CVE-2024-8544,0,0,029a23631e96ee15c1045dd3fa22aca85d39405998de7d891aefcd30e632fd70,2024-09-27T12:57:21.617000
|
||||
CVE-2024-8546,0,0,21c437f0d9de25e8960a2d9fbc9927a015111c992509c4b53747f59b9615f4f7,2024-09-26T13:32:02.803000
|
||||
CVE-2024-8549,0,0,26824bba4a7be5d3e1980cceb3f14676382c512f326742b207079a7edab4cb14,2024-09-26T13:32:02.803000
|
||||
CVE-2024-8552,0,0,6594d79506dd28071c715cfa6c7597507b339576bdff1f377ea688092ea69413,2024-09-26T13:32:02.803000
|
||||
@ -263760,9 +263778,9 @@ CVE-2024-8601,0,0,350a6e2c691d4290217990f07e5aa1eab0aea03118253c9c9cd54625cff0b3
|
||||
CVE-2024-8604,0,0,011a82fa33d28627d93910a4b1b240e8b61f649834230335b18a4a93ce8a99bf,2024-09-10T19:14:57.017000
|
||||
CVE-2024-8605,0,0,2abdfde3fad91633012e2fbc4796f8bda82aa939ecbbf9c2890b650d01ffd42b,2024-09-13T15:31:52.140000
|
||||
CVE-2024-8606,0,0,b26561fdb25b431c7769f970473f862e2409b32db7325f6388e5ff10e75450f5,2024-09-26T13:32:55.343000
|
||||
CVE-2024-8607,1,1,2ddb0309fe1197047db89200e1244a0ab07c4cc8c5b67b4ff257922493e74f5b,2024-09-27T12:15:03.617000
|
||||
CVE-2024-8608,1,1,70a6908469f677ff13fb63da61d58f7946f34054726b2ac2f47edb4296c4ca33,2024-09-27T12:15:03.823000
|
||||
CVE-2024-8609,1,1,5a99fdb2093de97963ab5690f22ae5bbf17fb50466c32aba9a5a2535ef0c4ee9,2024-09-27T12:15:03.997000
|
||||
CVE-2024-8607,0,0,2ddb0309fe1197047db89200e1244a0ab07c4cc8c5b67b4ff257922493e74f5b,2024-09-27T12:15:03.617000
|
||||
CVE-2024-8608,0,0,70a6908469f677ff13fb63da61d58f7946f34054726b2ac2f47edb4296c4ca33,2024-09-27T12:15:03.823000
|
||||
CVE-2024-8609,0,0,5a99fdb2093de97963ab5690f22ae5bbf17fb50466c32aba9a5a2535ef0c4ee9,2024-09-27T12:15:03.997000
|
||||
CVE-2024-8610,0,0,9284b474db1beea95bd52a2a34ba37d6ccf26129d36f3b91404a653005c49f87,2024-09-17T18:48:12.130000
|
||||
CVE-2024-8611,0,0,3d63bb09edc11ef6327fe857dfe381551fd3ed233dd119eaa741dce3b9b25e8e,2024-09-18T17:24:34.163000
|
||||
CVE-2024-8612,0,0,7904070a64ce6b0c617a391de31eeccb03d9f0e9421f89781a9fa23b513c6a78,2024-09-26T13:32:55.343000
|
||||
@ -263781,8 +263799,8 @@ CVE-2024-8639,0,0,81b4d237da336d5cfc4eef796e8c69ea1e42ce312224983662ce770673b442
|
||||
CVE-2024-8640,0,0,355c8649c87d5efaa043494b8ec77b10dd7fca0f372cd99c6e0195d9ec1f3b26,2024-09-14T15:37:37.257000
|
||||
CVE-2024-8641,0,0,6714847a0a2d7b4da8f2ecb0f7b3c9e94c4657d9429961f088a44e0537d8381a,2024-09-18T19:12:18.930000
|
||||
CVE-2024-8642,0,0,2aae0632e6322f09814ded77019a17c6bdd3adefc0841a6f6e92e4043db21740,2024-09-19T15:18:47.917000
|
||||
CVE-2024-8643,1,1,abb56bfd0e482e5c7719cb049b85dd605dcd566e9e794a81e21255a1b93e2afd,2024-09-27T12:15:04.210000
|
||||
CVE-2024-8644,1,1,3daab34a01fefef4393191c7f856d42692489d65740ec2fb464a6318ebfac63e,2024-09-27T12:15:04.390000
|
||||
CVE-2024-8643,0,0,abb56bfd0e482e5c7719cb049b85dd605dcd566e9e794a81e21255a1b93e2afd,2024-09-27T12:15:04.210000
|
||||
CVE-2024-8644,0,0,3daab34a01fefef4393191c7f856d42692489d65740ec2fb464a6318ebfac63e,2024-09-27T12:15:04.390000
|
||||
CVE-2024-8645,0,0,a9ec59eb761dcf7b03b051641e3314ff9102e8e55de30e4e3a512e1bddcece61,2024-09-10T12:09:50.377000
|
||||
CVE-2024-8646,0,0,80914337a2bd562d2db1f36aec06ad883cb607d6cc039af494590eb0a0b50d8e,2024-09-18T20:20:51.643000
|
||||
CVE-2024-8651,0,0,98f15bd48d1c12270cdb328a70de9359f32b42ef85efa713989e765f41ce1150,2024-09-23T17:51:13.050000
|
||||
@ -263791,19 +263809,19 @@ CVE-2024-8653,0,0,9ff517ad541f0c9badefd1c8205a26f97eafbec49ef5c58c2bc37d53706b32
|
||||
CVE-2024-8654,0,0,9ff4197fc4fa3acdeeaabf5d042cf9151def7011df3ee9c1e3c9b932ce455541,2024-09-10T15:50:57.713000
|
||||
CVE-2024-8655,0,0,ae8f7bc5241b7c169a5dccbcccc728c3b8a01d5ae62a1e846fce72d64496b2eb,2024-09-11T16:26:11.920000
|
||||
CVE-2024-8656,0,0,0b43c2b98b59dcf4570c061c34339f89be9c45aed9cf9c6799db7e99cd60e1d8,2024-09-26T15:04:41.223000
|
||||
CVE-2024-8657,0,1,ad64a2f776c71acabb5df2c7c03704b8c597e20de250d559c26b9a343246b49c,2024-09-27T12:56:20.197000
|
||||
CVE-2024-8657,0,0,ad64a2f776c71acabb5df2c7c03704b8c597e20de250d559c26b9a343246b49c,2024-09-27T12:56:20.197000
|
||||
CVE-2024-8658,0,0,77ea359923f64bc8a9f672f9257b7ffc4a02979528e9de1aaca429a10565c2d1,2024-09-26T13:32:02.803000
|
||||
CVE-2024-8660,0,0,e1cfacda5ac49937121e76566dcec30a46275de6b23ffe4cf313c4cb8bedeacf,2024-09-23T23:00:00.437000
|
||||
CVE-2024-8661,0,0,5b5eb9186f84a6299e6266b90655b3635cbc98e54795da81756013706cf03752,2024-09-25T16:15:11.420000
|
||||
CVE-2024-8662,0,1,bdaf5d9d59461992195adcbbf3e9aa44ce17d187816fee0d428bb839e927e0fa,2024-09-27T12:54:36.160000
|
||||
CVE-2024-8662,0,0,bdaf5d9d59461992195adcbbf3e9aa44ce17d187816fee0d428bb839e927e0fa,2024-09-27T12:54:36.160000
|
||||
CVE-2024-8663,0,0,95df1e4ddd212aa242aadc3c7cf5dbe906cc5735393ec0be59f396093ac78f31,2024-09-13T14:06:04.777000
|
||||
CVE-2024-8664,0,1,3997b577f06fd6ade8df9705bd2720712ffc514d2a2a019b4c9d40380c5ebba1,2024-09-27T13:48:58.270000
|
||||
CVE-2024-8664,0,0,3997b577f06fd6ade8df9705bd2720712ffc514d2a2a019b4c9d40380c5ebba1,2024-09-27T13:48:58.270000
|
||||
CVE-2024-8665,0,0,09ab15f5f9bd70753d6f594bff7ff364c9764fb90e308cd08c47d778b9a8291f,2024-09-13T14:06:04.777000
|
||||
CVE-2024-8668,0,0,c353986416e0a4c46c78ecf60b727782bfce62870f6e122356299be7e7438e9c,2024-09-26T13:32:02.803000
|
||||
CVE-2024-8669,0,0,d594b1491726b390fde9987d33067f88d20ddc09b39dc05c59acae4af25b456f,2024-09-14T11:47:14.677000
|
||||
CVE-2024-8671,0,0,44eb9fc4ae83bda74c805da6c8f69132f0b0ddef607b7afc290779058022b5c0,2024-09-26T16:38:24.447000
|
||||
CVE-2024-8678,0,0,889d21ef247546a6f2ba4419351284ba9f2f3727a17d89355bbfe7a36fdacaf2,2024-09-26T13:32:02.803000
|
||||
CVE-2024-8680,0,1,f92fa58a804f571c1e7bcf32a74c84f918657d6176f24d169d6d6fd1db54ec14,2024-09-27T13:53:47.910000
|
||||
CVE-2024-8680,0,0,f92fa58a804f571c1e7bcf32a74c84f918657d6176f24d169d6d6fd1db54ec14,2024-09-27T13:53:47.910000
|
||||
CVE-2024-8681,0,0,eb2555a283f92f1304ea04a10441d173f9fe6abf0f05be78151ead97d14620bd,2024-09-27T07:15:05.123000
|
||||
CVE-2024-8686,0,0,ede88dcdbc0e792bd803e1f16895e5a739a1631453b49ef7e6a4fb82c32bd0dd,2024-09-12T12:35:54.013000
|
||||
CVE-2024-8687,0,0,113cfff3abfee2dabf4872656a1085a998928e6c5f0a4785deb63af7b2621db8,2024-09-12T12:35:54.013000
|
||||
@ -263829,7 +263847,7 @@ CVE-2024-8713,0,0,77e6eb32497c4838ab6eff0729860dc19e9280431833bec790cbdd0c191045
|
||||
CVE-2024-8714,0,0,2bf1d2039d26904f97b1e8fc522abe5916905f0e0d26ed18e01afb2d802fce13,2024-09-26T20:06:46.330000
|
||||
CVE-2024-8716,0,0,1bb41aeeebe4e896420adf3cdaff53e3d88a64a7e4d1f07d25f8bcb2da122bf8,2024-09-26T17:03:05.487000
|
||||
CVE-2024-8723,0,0,778d0a0398aed78fe986c3e106c93b2232e3d42b0102981078399ce3c143c0f8,2024-09-26T13:32:02.803000
|
||||
CVE-2024-8724,0,0,b84c0f858130dbe3d5efee42c723e6b66a5ac84e9dedd508f06aebfed2f7ce86,2024-09-14T11:47:14.677000
|
||||
CVE-2024-8724,0,1,41e3dd453fbe3c0072e7ab470e5d529ac122f059bb60a2be671564b989c49676,2024-09-27T15:56:00.073000
|
||||
CVE-2024-8725,0,0,206d33f8ec7dfc1aa0697b16d275da6d2346e0e0b344cb623ce6b9ea7820dd69,2024-09-26T13:32:02.803000
|
||||
CVE-2024-8730,0,0,ff380ede7d530472d7457d72280d0377e58fe499631b78029fd0dcbdd667a7f4,2024-09-26T19:58:33.353000
|
||||
CVE-2024-8731,0,0,17c6adda5eb698d4c05886ce56b7c8d24eb85ac20af08445719f350b3f8c3e38,2024-09-26T19:43:33.110000
|
||||
@ -263845,13 +263863,13 @@ CVE-2024-8750,0,0,6aa000b45a0c694359dda91e7e992492dcd4e93d6e7b8c131ee0a86fa36b56
|
||||
CVE-2024-8751,0,0,dd4f77422f5dc981129a2e765da3e243ee86648b85be15172cd0c4e6601f992a,2024-09-13T14:06:04.777000
|
||||
CVE-2024-8752,0,0,be5f97c0edf8e6ac8b5e8514ff7047e0f4fcd958517cc5377fbff739f62f1969,2024-09-20T22:42:20.367000
|
||||
CVE-2024-8754,0,0,f8a4ca9a3c8c6c9af2a693c6565fade1a53b2c08d2db63ea33e154699f832b1a,2024-09-14T15:40:20.583000
|
||||
CVE-2024-8758,0,0,d85d9a02694712873ead6e5be3bac99f7e62c17fcb6ef0f670284ba6ad822899,2024-09-26T13:32:55.343000
|
||||
CVE-2024-8758,0,1,634aeeda8f9e91934f78e3b64172027c163c387830078a2c36c39ec180a63900,2024-09-27T14:29:23.157000
|
||||
CVE-2024-8761,0,0,3585691f416075376d018cf9f4fcfa97af66b09d60d17a08ef4151ff63a68129,2024-09-20T12:31:20.110000
|
||||
CVE-2024-8762,0,0,2877f4481d10e26d4e6bf50e010d02152cab4d90b2c2329689bb4edd4b768ea9,2024-09-14T15:54:10.687000
|
||||
CVE-2024-8766,0,0,b5c86feebeb7f4c2ef3d57aeff024553a8b8afab58619c1ddcc92e275588dfe2,2024-09-20T12:31:20.110000
|
||||
CVE-2024-8767,0,0,17744319861b5196f5a63bddf3c3c4ab0c9d11dd531ce1a95816c3c9e2193e0e,2024-09-20T12:31:20.110000
|
||||
CVE-2024-8768,0,0,a982019cb3e87700eba7d9922c696779881e32d71a95f1662a9030bc9b15c0d2,2024-09-20T12:30:51.220000
|
||||
CVE-2024-8770,0,1,092503c78b1ec747d9cd01983ee6d65a49e2eef82871ebe4802ea35253afc2e7,2024-09-27T13:49:29.690000
|
||||
CVE-2024-8770,0,0,092503c78b1ec747d9cd01983ee6d65a49e2eef82871ebe4802ea35253afc2e7,2024-09-27T13:49:29.690000
|
||||
CVE-2024-8771,0,0,6bb3cfb2358f20779d30660368175ab098a299aee1188c852547dd80b3c854f6,2024-09-26T16:15:09.293000
|
||||
CVE-2024-8775,0,0,1f8b246503d32d66b42e8fe1d2ca1b6d98900c0e0fb5babb06cd69ea0d0b6cab,2024-09-14T11:47:14.677000
|
||||
CVE-2024-8776,0,0,5f24148b1f2c0e63f94c4b7c4eb112791a653befffb86dbacf9b6c99ebdd5088,2024-09-20T16:38:51.910000
|
||||
@ -263866,7 +263884,7 @@ CVE-2024-8791,0,0,fb5b0ac36efac34bc9b2b46a1f471f8bc629f8b19dafbbe4161ffb4834ecff
|
||||
CVE-2024-8794,0,0,71d6f226610d884ee512fa4051f8594e0cafa29b4878c9ac672c3de2ccd4c022,2024-09-26T16:23:46.740000
|
||||
CVE-2024-8795,0,0,f7b3fc89482c22947a1a26e63d2f04d7dee1f77ad827021897b332709b04072d,2024-09-26T16:46:55.587000
|
||||
CVE-2024-8796,0,0,85a6dfb5fb230c10b66238538bd5fe186ab9999598b67e5deda1ed4d1b78b262,2024-09-20T12:30:51.220000
|
||||
CVE-2024-8797,0,0,ba4df0bb11568fe010be4c16334a8844a03d9d0d5268879bae12ea87dcdf4b9f,2024-09-14T11:47:14.677000
|
||||
CVE-2024-8797,0,1,bc71120ba9c562037001bef5ed49069a2fb96f9263b3c8e2a617e34946a91f4d,2024-09-27T14:02:23.700000
|
||||
CVE-2024-8801,0,0,0819fc7670c97dfdf5903331c0719648e4a950ccf6d74c0e2820e973653fdf95,2024-09-26T13:32:02.803000
|
||||
CVE-2024-8803,0,0,1e21e2187793442a371c4b65c97d90253ace224e18e6d0a30f5421631b4c2a19,2024-09-26T13:32:02.803000
|
||||
CVE-2024-8850,0,0,60f99c260767f82bf00cc7954ec3e058985003b965020b8d3dac7a45b3ea5f64,2024-09-25T18:49:53.397000
|
||||
@ -263942,19 +263960,19 @@ CVE-2024-9024,0,0,a169982dad174bdcc00c2c78e9efcbc44e6a47176e89361fcc86b05c73e552
|
||||
CVE-2024-9025,0,0,4a3763d182986e8a9ef475614c0f7e993d3440f162fb5fd30f9debf5502d2386,2024-09-26T13:32:02.803000
|
||||
CVE-2024-9027,0,0,c409316250f48b36be20429f87c4942220d7d23db3624ffd7bf099b6e997d609,2024-09-26T13:32:02.803000
|
||||
CVE-2024-9028,0,0,066617345a002ab3642d548e56d10899015c968402247f796f72778f556d5654,2024-09-26T13:32:02.803000
|
||||
CVE-2024-9029,0,1,35f447da90177f30c2552d1befa021521534c64f52e07afbe3088997f751fc53,2024-09-27T13:15:18.060000
|
||||
CVE-2024-9029,0,0,35f447da90177f30c2552d1befa021521534c64f52e07afbe3088997f751fc53,2024-09-27T13:15:18.060000
|
||||
CVE-2024-9030,0,0,c11a97e3409538e48c43922920e3ccde8c323ec97995f0c28aa92b45cd65fb6b,2024-09-25T18:01:19.270000
|
||||
CVE-2024-9031,0,0,a2a75f47877f3d25b358bad394fac156601d3202f3a82ad425179531288fce65,2024-09-25T16:52:25.327000
|
||||
CVE-2024-9032,0,0,8becc8e05b7d6005b24bf74218ec0dbc532806e337cd797ce3550c4bccf0a3b2,2024-09-20T17:04:51.490000
|
||||
CVE-2024-9033,0,0,da7ef5ecb80dbcc843ac183ee1f6a075d01dbd21d6d1d99bb293458f75865ab8,2024-09-26T13:32:55.343000
|
||||
CVE-2024-9033,0,1,7be928c299373aac94b8e0b56127ab59524b5bc9208cac30fb16b74e6a6c3108,2024-09-27T15:56:35.317000
|
||||
CVE-2024-9034,0,0,3413fc4a84b9ff7c3619b4d0e0cc27a0a6e18fb3607100ba58325da27d611048,2024-09-26T13:32:55.343000
|
||||
CVE-2024-9035,0,0,ecdd08b9ce66f90d6292d7a1da978c23aae7a52839423bea89ea3accdab800d5,2024-09-26T13:32:55.343000
|
||||
CVE-2024-9036,0,0,8f0f204961acb9a34d32ba51929ff8ed191020e5d897378afa05d39edaf4242d,2024-09-26T13:32:55.343000
|
||||
CVE-2024-9037,0,0,9a12d1407f1a9b206c0d27c0dfa15addf768f061a25ed0110993d5cbf4244f12,2024-09-26T13:32:55.343000
|
||||
CVE-2024-9038,0,0,3d0440795c2ef1d6885f692fbc7fd9751c02e8e583f4df587e49c3c125fd66f2,2024-09-26T13:32:55.343000
|
||||
CVE-2024-9039,0,0,2f676c88a963c1dd302b4d87190c074ff18e6aa14901dc45744470d7d3f40bca,2024-09-26T13:32:55.343000
|
||||
CVE-2024-9040,0,0,79a2716fcea4f161f74af0d7933a358162f310429ebeceda501188d656f9aa7e,2024-09-26T13:32:55.343000
|
||||
CVE-2024-9041,0,0,5062146a1939ae3786c2022f32c7342dc6d8c7a9706af0c6420de20edd9da955,2024-09-26T13:32:55.343000
|
||||
CVE-2024-9039,0,1,2a46914eca39fc29da2da7edd5c8d5e2462d724fc7b13f9f758dbc7e741a3ad4,2024-09-27T15:58:22.493000
|
||||
CVE-2024-9040,0,1,0fb966ef41b73391708aea4bb41bcdf22035487df6b2f9dfc89d7d54ff500837,2024-09-27T15:53:28.333000
|
||||
CVE-2024-9041,0,1,99f9003688843669abe0778fb23af0702d95d6892437f5bbf3a35f1e206f8b48,2024-09-27T15:57:55.073000
|
||||
CVE-2024-9043,0,0,585c2a6b7b38dff44f8f31bab3e4cca50893ebff20d4d599fedd4ef31bc82eef,2024-09-25T17:54:05.297000
|
||||
CVE-2024-9048,0,0,f177060896179d3e548fb6c61961758dc04b1d06da272024e713ebe682f3a80b,2024-09-26T13:32:55.343000
|
||||
CVE-2024-9049,0,0,c2460a86793cc351a3c801748f3c41f8869b146a68262e395de944016c346177,2024-09-27T07:15:06.120000
|
||||
@ -263981,7 +263999,7 @@ CVE-2024-9090,0,0,f4ae7d6bdfee4058437252a7869fea72e1c41a8988dd0263217c62ee380e24
|
||||
CVE-2024-9091,0,0,c9dc03a59153ae93dc02180cc0df8139cf142bac3d810d8b52e76b86bb12d8df,2024-09-26T13:32:55.343000
|
||||
CVE-2024-9092,0,0,91261f691887877cadd7a674bcc9b38df1ed37569442c4381e6926ef3ea0e1cf,2024-09-26T13:32:55.343000
|
||||
CVE-2024-9093,0,0,d6cda4dff1f2f9dda2ab9b9f9d7e2229533818a3415ab85f02c656b5f130c3e2,2024-09-26T13:32:55.343000
|
||||
CVE-2024-9094,0,0,f5ce50f40b1828c6e92401e7f675863a9773a96c6a8d0a8c7fa46fe46d88d6fc,2024-09-26T13:32:55.343000
|
||||
CVE-2024-9094,0,1,0e308d006c94a8d09d0a4caea6001ec02d11744a78c5f3fdfc5f94ed1a0ea22c,2024-09-27T15:54:09.463000
|
||||
CVE-2024-9115,0,0,677b007e44c6a6850476d54cab99d703d388e1f6185b1413799fecf3ba008a07,2024-09-26T13:32:02.803000
|
||||
CVE-2024-9117,0,0,96ff801e5a2869848fd4e3dd25cc9a878f8aef2f8675658f7019828cd326dfe8,2024-09-26T13:32:02.803000
|
||||
CVE-2024-9120,0,0,741803f92bc286dd2201245dc8ffb354e00af92f2ccee9f63963d21a0888db6b,2024-09-26T13:32:02.803000
|
||||
@ -264005,10 +264023,11 @@ CVE-2024-9199,0,0,27e0a64b81e9357b76a0a39a250ac06701e94144499cdd254c52ef2844f973
|
||||
CVE-2024-9202,0,0,5d3f2d6a33ba631f7d073198e169a0e32af3f18d36ba441e4605889790f358ed,2024-09-27T10:15:02.827000
|
||||
CVE-2024-9203,0,0,63881804792b3aed56f72465b329c59bdd2f8e79682e4feb93f16e7c9b49e7f2,2024-09-26T17:15:04.593000
|
||||
CVE-2024-9275,0,0,6bebcdc92872db9a9776b966b7829994144cd16473a7fe0a7c466b08b5f6ad63,2024-09-27T11:15:13.477000
|
||||
CVE-2024-9276,0,1,2cf75b1670ae2606d26d1435cd74bce525bf12e634f531162074c3a9fd3c7c76,2024-09-27T12:15:04.590000
|
||||
CVE-2024-9277,0,1,ec04fe753eee8ed7818abf01b73dcc860c29bf948c4c38797a452fce8113417c,2024-09-27T12:15:04.733000
|
||||
CVE-2024-9276,0,0,2cf75b1670ae2606d26d1435cd74bce525bf12e634f531162074c3a9fd3c7c76,2024-09-27T12:15:04.590000
|
||||
CVE-2024-9277,0,0,ec04fe753eee8ed7818abf01b73dcc860c29bf948c4c38797a452fce8113417c,2024-09-27T12:15:04.733000
|
||||
CVE-2024-9278,0,0,dc87e9b21a88b467ef6951489f3df167a6f2698a87bf34540b6f8d41c1a7f7d0,2024-09-27T11:15:14.877000
|
||||
CVE-2024-9279,1,1,ea949a7d6cfef3252e95b9f876f621c026806686480a2a483245588415753746,2024-09-27T12:15:04.857000
|
||||
CVE-2024-9280,1,1,fd07a0abd60c00c43ea242b9a30c0c6f1ba1b12d0f394c37d752db673f5c0152,2024-09-27T12:15:05.227000
|
||||
CVE-2024-9281,1,1,b14fc5143e6a25d74bc27cc2c4a8f20e853a4566f74d81cd628d720942176920,2024-09-27T13:15:18.153000
|
||||
CVE-2024-9282,1,1,904745e99b02f17fad93e3d4d12dede442ce386a61a1af6532becd6450b367a2,2024-09-27T13:15:18.443000
|
||||
CVE-2024-9279,0,0,ea949a7d6cfef3252e95b9f876f621c026806686480a2a483245588415753746,2024-09-27T12:15:04.857000
|
||||
CVE-2024-9280,0,0,fd07a0abd60c00c43ea242b9a30c0c6f1ba1b12d0f394c37d752db673f5c0152,2024-09-27T12:15:05.227000
|
||||
CVE-2024-9281,0,0,b14fc5143e6a25d74bc27cc2c4a8f20e853a4566f74d81cd628d720942176920,2024-09-27T13:15:18.153000
|
||||
CVE-2024-9282,0,0,904745e99b02f17fad93e3d4d12dede442ce386a61a1af6532becd6450b367a2,2024-09-27T13:15:18.443000
|
||||
CVE-2024-9283,1,1,0dc135be53023bca555d778c9a31c3d6f3a80278eb8a9232d8da6a70571f147e,2024-09-27T14:15:05.330000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user