Auto-Update: 2024-12-06T21:00:29.499285+00:00

This commit is contained in:
cad-safe-bot 2024-12-06 21:03:40 +00:00
parent 2e7194f5bc
commit c8c92603eb
74 changed files with 4814 additions and 577 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-47024",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-02-28T09:15:39.243",
"lastModified": "2024-02-28T14:06:45.783",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-06T20:53:23.077",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,23 +15,131 @@
"value": "En el kernel de Linux se ha resuelto la siguiente vulnerabilidad: vsock/virtio: paquetes libres en cola al cerrar el socket Seg\u00fan lo informado por syzbot [1], hay una p\u00e9rdida de memoria al cerrar el socket. Resolvimos parcialmente este problema con el compromiso ac03046ece2b (\"vsock/virtio: paquetes libres durante el lanzamiento del socket\"), pero nos olvidamos de vaciar la cola RX cuando el trabajo programado cierra definitivamente el socket. Para evitar problemas futuros, usemos el nuevo virtio_transport_remove_sock() para drenar la cola RX antes de eliminar el socket de las listas af_vsock llamando a vsock_remove_sock(). [1] https://syzkaller.appspot.com/bug?extid=24452624fc4c571eedd9"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-401"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.2",
"versionEndExcluding": "5.10.37",
"matchCriteriaId": "CAD59DAB-9845-41C5-9D7A-EB9C40A85BE5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.11.21",
"matchCriteriaId": "8CBB94EC-EC33-4464-99C5-03E5542715F0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.12",
"versionEndExcluding": "5.12.4",
"matchCriteriaId": "D8C7052F-1B7B-4327-9C2B-84EBF3243838"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/27691665145e74a45034a9dccf1150cf1894763a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/37c38674ef2f8d7e8629e5d433c37d6c1273d16b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/8432b8114957235f42e070a16118a7f750de9d39",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/b605673b523fe33abeafb2136759bcbc9c1e6ebf",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/27691665145e74a45034a9dccf1150cf1894763a",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/37c38674ef2f8d7e8629e5d433c37d6c1273d16b",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/8432b8114957235f42e070a16118a7f750de9d39",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/b605673b523fe33abeafb2136759bcbc9c1e6ebf",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-47028",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-02-28T09:15:39.430",
"lastModified": "2024-02-28T14:06:45.783",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-06T20:53:43.170",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,19 +15,110 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: mt76: mt7915: corrige informes txrate Verifique correctamente rate_info para corregir informes inesperados. [ 1215.161863] Rastreo de llamadas: [ 1215.164307] cfg80211_calculate_bitrate+0x124/0x200 [cfg80211] [ 1215.170139] ieee80211s_update_metric+0x80/0xc0 [mac80211] [ 1215.17562 4] ieee80211_tx_status_ext+0x508/0x838 [mac80211] [1215.181190] mt7915_mcu_get_rx_rate+0x28c/0x8d0 [mt7915e] [ 1215.186580] mt7915_mac_tx_free+0x324/0x7c0 [mt7915e] [ 1215.191623] mt7915_queue_rx_skb+0xa8/0xd0 [mt7915e] [ 1215.196582] mt76_dma_cleanup+0x7b 0/0x11d0 [mt76] [ 1215.201276] __napi_poll+0x38/0xf8 [ 1215.204668] napi_workfn+0x40/0x80 [ 1215.208062] proceso_one_work+0x1fc/0x390 [ 1215.212062] hilo_trabajador+0x48/0x4d0 [ 1215.215715] kthread+0x120/0x128 [ 1215.218935] ret_from_fork+0x10/0x1c"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.8",
"versionEndExcluding": "5.11.21",
"matchCriteriaId": "C929D54B-4901-4DE8-B5BD-53E25B3FCFB8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.12",
"versionEndExcluding": "5.12.4",
"matchCriteriaId": "D8C7052F-1B7B-4327-9C2B-84EBF3243838"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/4bd926e5ca88eac4d95eacb806b229f8729bc62e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/dfc8a71448c7d4fec38fb22bdc8a76d79c14b6da",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/f43b941fd61003659a3f0e039595e5e525917aa8",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/4bd926e5ca88eac4d95eacb806b229f8729bc62e",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/dfc8a71448c7d4fec38fb22bdc8a76d79c14b6da",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/f43b941fd61003659a3f0e039595e5e525917aa8",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-47030",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-02-28T09:15:39.530",
"lastModified": "2024-02-28T14:06:45.783",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-06T20:54:28.907",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,15 +15,89 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: mt76: mt7615: corrige la p\u00e9rdida de memoria en mt7615_coredump_work. Similar al problema solucionado en mt7921_coredump_work, soluciona una posible p\u00e9rdida de memoria en la rutina mt7615_coredump_work."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-401"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.12",
"versionEndExcluding": "5.12.4",
"matchCriteriaId": "D8C7052F-1B7B-4327-9C2B-84EBF3243838"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/49cc85059a2cb656f96ff3693f891e8fe8f669a9",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/54b989653c5531bc4416ced33f146b9cb633d978",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/49cc85059a2cb656f96ff3693f891e8fe8f669a9",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/54b989653c5531bc4416ced33f146b9cb633d978",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-47038",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-02-28T09:15:39.893",
"lastModified": "2024-02-28T14:06:45.783",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-06T20:56:10.230",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,23 +15,131 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: Bluetooth: evitar interbloqueo entre hci_dev->lock y socket lock. el commit eab2404ba798 (\"Bluetooth: Add BT_PHY socket option\") agreg\u00f3 una dependencia entre socket lock y hci_dev->lock que podr\u00eda provocar a un punto muerto. Resulta que hci_conn_get_phy() no depende de ninguna manera de que hdev sea inmutable durante el tiempo de ejecuci\u00f3n de esta funci\u00f3n, ni siquiera mira a ninguno de los miembros de hdev y, como tal, no es necesario mantener ese bloqueo. Esto soluciona el problema de bloqueo a continuaci\u00f3n: ============================================ =========== ADVERTENCIA: posible dependencia de bloqueo circular detectada 5.12.0-rc1-00026-g73d464503354 #10 No contaminado ------------------- ----------------------------------- bluetoothd/1118 est\u00e1 intentando adquirir el bloqueo: ffff8f078383c078 (&hdev->lock ){+.+.}-{3:3}, en: hci_conn_get_phy+0x1c/0x150 [bluetooth] pero la tarea ya est\u00e1 bloqueada: ffff8f07e831d920 (sk_lock-AF_BLUETOOTH-BTPROTO_L2CAP){+.+.}-{0:0 }, en: l2cap_sock_getsockopt+0x8b/0x610 cuyo bloqueo ya depende del nuevo bloqueo. la cadena de dependencia existente (en orden inverso) es: -> #3 (sk_lock-AF_BLUETOOTH-BTPROTO_L2CAP){+.+.}-{0:0}: lock_sock_nested+0x72/0xa0 l2cap_sock_ready_cb+0x18/0x70 [bluetooth] l2cap_config_rsp+ 0x27a/0x520 [bluetooth] l2cap_sig_channel+0x658/0x1330 [bluetooth] l2cap_recv_frame+0x1ba/0x310 [bluetooth] hci_rx_work+0x1cc/0x640 [bluetooth] Process_one_work+0x244/0x5f0 trabajador_thread+0x3c/0x380 kthread+0 x13e/0x160 ret_from_fork+0x22/0x30 -> #2 (&chan->lock#2/1){+.+.}-{3:3}: __mutex_lock+0xa3/0xa10 l2cap_chan_connect+0x33a/0x940 [bluetooth] l2cap_sock_connect+0x141/0x2a0 [bluetooth] __sys_connect+ 0x9b/0xc0 __x64_sys_connect+0x16/0x20 do_syscall_64+0x33/0x80 Entry_SYSCALL_64_after_hwframe+0x44/0xae -> #1 (&conn->chan_lock){+.+.}-{3:3}: __mutex_lock+0xa3/0xa10 l2cap_chan_connect+0 x322/ 0x940 [bluetooth] l2cap_sock_connect+0x141/0x2a0 [bluetooth] __sys_connect+0x9b/0xc0 __x64_sys_connect+0x16/0x20 do_syscall_64+0x33/0x80 Entry_SYSCALL_64_after_hwframe+0x44/0xae -> #0 (&hdev- >bloquear){+.+.}-{ 3:3}: __lock_acquire+0x147a/0x1a50 lock_acquire+0x277/0x3d0 __mutex_lock+0xa3/0xa10 hci_conn_get_phy+0x1c/0x150 [bluetooth] l2cap_sock_getsockopt+0x5a9/0x610 [bluetooth] __sys_getsockopt+0xcc /0x200 __x64_sys_getsockopt+0x20/0x30 do_syscall_64+0x33/ 0x80 Entry_SYSCALL_64_after_hwframe+0x44/0xae otra informaci\u00f3n que podr\u00eda ayudarnos a depurar esto: Existe cadena de: &hdev->lock --> &chan->lock#2/1 --> sk_lock-AF_BLUETOOTH-BTPROTO_L2CAP Posible escenario de bloqueo inseguro: CPU0 CPU1 - --- ---- bloqueo(sk_lock-AF_BLUETOOTH-BTPROTO_L2CAP); bloquear(&chan->bloquear#2/1); bloquear(sk_lock-AF_BLUETOOTH-BTPROTO_L2CAP); bloquear(&hdev->bloquear); *** DEADLOCK *** 1 bloqueo retenido por bluetoothd/1118: #0: ffff8f07e831d920 (sk_lock-AF_BLUETOOTH-BTPROTO_L2CAP){+.+.}-{0:0}, en: l2cap_sock_getsockopt+0x8b/0x610 pila [bluetooth] backtrace: CPU: 3 PID: 1118 Comm: bluetoothd No contaminado 5.12.0-rc1-00026-g73d464503354 #10 Nombre de hardware: LENOVO 20K5S22R00/20K5S22R00, BIOS R0IET38W (1.16) 31/05/2017 Seguimiento de llamadas: dump_stack+0x7 f/0xa1 check_noncircular+0x105/0x120? __lock_acquire+0x147a/0x1a50 __lock_acquire+0x147a/0x1a50 lock_acquire+0x277/0x3d0 ? hci_conn_get_phy+0x1c/0x150 [bluetooth] ? __lock_acquire+0x2e1/0x1a50? lock_is_held_type+0xb4/0x120? hci_conn_get_phy+0x1c/0x150 [bluetooth] __mutex_lock+0xa3/0xa10 ? hci_conn_get_phy+0x1c/0x150 [bluetooth] ? lock_acquire+0x277/0x3d0? mark_held_locks+0x49/0x70? mark_held_locks+0x49/0x70? hci_conn_get_phy+0x1c/0x150 [bluetooth] hci_conn_get_phy+0x ---truncado---"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-667"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.7",
"versionEndExcluding": "5.10.37",
"matchCriteriaId": "FD815E0C-D654-4F05-B0AE-39939D922E39"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.11.21",
"matchCriteriaId": "8CBB94EC-EC33-4464-99C5-03E5542715F0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.12",
"versionEndExcluding": "5.12.4",
"matchCriteriaId": "D8C7052F-1B7B-4327-9C2B-84EBF3243838"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/17486960d79b900c45e0bb8fbcac0262848582ba",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/332e69eb3bd90370f2d9f2c2ca7974ff523dea17",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/7cc0ba67883c6c8d3bddb283f56c167fc837a555",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/fee71f480bc1dec5f6ae3b0b185ff12a62bceabc",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/17486960d79b900c45e0bb8fbcac0262848582ba",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/332e69eb3bd90370f2d9f2c2ca7974ff523dea17",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/7cc0ba67883c6c8d3bddb283f56c167fc837a555",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/fee71f480bc1dec5f6ae3b0b185ff12a62bceabc",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-42792",
"sourceIdentifier": "product-security@apple.com",
"published": "2023-06-23T18:15:10.507",
"lastModified": "2023-06-27T10:56:49.913",
"vulnStatus": "Analyzed",
"lastModified": "2024-12-06T19:15:08.603",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -19,6 +19,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -26,9 +28,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
@ -45,6 +45,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-203"
}
]
}
],
"configurations": [
@ -79,6 +89,14 @@
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT213489",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-42807",
"sourceIdentifier": "product-security@apple.com",
"published": "2023-06-23T18:15:10.553",
"lastModified": "2023-06-30T07:11:19.047",
"vulnStatus": "Analyzed",
"lastModified": "2024-12-06T19:15:09.130",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -19,6 +19,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
@ -26,9 +28,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
@ -45,6 +45,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-640"
}
]
}
],
"configurations": [
@ -73,6 +83,14 @@
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT213488",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-48621",
"sourceIdentifier": "psirt@huawei.com",
"published": "2024-02-18T07:15:07.700",
"lastModified": "2024-02-20T19:50:53.960",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-06T20:06:07.740",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,7 +15,30 @@
"value": "Vulnerabilidad de falta de autenticaci\u00f3n para funciones cr\u00edticas en el m\u00f3dulo Wi-Fi. La explotaci\u00f3n exitosa de esta vulnerabilidad puede afectar la confidencialidad del servicio."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "psirt@huawei.com",
@ -26,16 +49,93 @@
"value": "CWE-306"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-306"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A974CA73-84E8-480B-BB4C-4A81D0C985B2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "353AEAF2-AF46-4835-93E1-4F942D5E2810"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:2.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "20112231-B840-44D3-A061-B9B9F80EE378"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:2.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C01447F1-7F58-4AE3-B403-C01B2575D898"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CB3751C1-7729-41D3-AE50-80B5AF601135"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4D81C4EF-7CAF-4E60-91A4-8CF7B95B2B54"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8198CDB2-4BC5-411A-8736-615A531FC545"
}
]
}
]
}
],
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2024/2/",
"source": "psirt@huawei.com"
"source": "psirt@huawei.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405",
"source": "psirt@huawei.com"
"source": "psirt@huawei.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://consumer.huawei.com/en/support/bulletin/2024/2/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-24261",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-21T21:15:10.867",
"lastModified": "2023-06-28T15:57:40.363",
"vulnStatus": "Analyzed",
"lastModified": "2024-12-06T20:15:20.260",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -19,6 +19,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
@ -26,9 +28,27 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.2,
"baseSeverity": "HIGH"
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
@ -45,6 +65,16 @@
"value": "CWE-78"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"configurations": [
@ -56,9 +86,10 @@
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:gl-inet:gl-e750:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B5C88C24-42C5-4512-83B5-F7DED1D70E86"
"vulnerable": true,
"criteria": "cpe:2.3:o:gl-inet:gl-e750_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.216",
"matchCriteriaId": "1435C66B-38C7-4ECC-993D-F4EDD2853898"
}
]
},
@ -67,10 +98,9 @@
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:gl-inet:gl-e750_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.216",
"matchCriteriaId": "1435C66B-38C7-4ECC-993D-F4EDD2853898"
"vulnerable": false,
"criteria": "cpe:2.3:h:gl-inet:gl-e750:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B5C88C24-42C5-4512-83B5-F7DED1D70E86"
}
]
}
@ -85,6 +115,14 @@
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://justinapplegate.me/2023/glinet-CVE-2023-24261/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-25435",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-21T20:15:10.100",
"lastModified": "2023-06-28T18:51:37.170",
"vulnStatus": "Analyzed",
"lastModified": "2024-12-06T20:15:20.487",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -19,6 +19,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -26,9 +28,27 @@
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
@ -45,6 +65,16 @@
"value": "CWE-120"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"configurations": [
@ -74,6 +104,16 @@
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://gitlab.com/libtiff/libtiff/-/issues/518",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-27243",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-21T16:15:11.347",
"lastModified": "2023-06-28T13:50:19.303",
"vulnStatus": "Analyzed",
"lastModified": "2024-12-06T19:15:09.553",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -19,6 +19,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -26,9 +28,27 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH"
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
@ -45,6 +65,16 @@
"value": "CWE-312"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-312"
}
]
}
],
"configurations": [
@ -90,6 +120,27 @@
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://dcap.com",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Not Applicable"
]
},
{
"url": "http://makves.com",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Not Applicable"
]
},
{
"url": "https://pastebin.com/L5BkBeEE",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-29708",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-22T11:15:09.390",
"lastModified": "2023-06-30T15:36:24.177",
"vulnStatus": "Analyzed",
"lastModified": "2024-12-06T20:15:21.690",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -19,6 +19,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -26,9 +28,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
@ -45,6 +45,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"configurations": [
@ -84,6 +94,21 @@
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/shellpei/WAVLINK-Reset/blob/main/CVE-2023-29708",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://holistic-height-e6d.notion.site/WAVLINK-Wi-Fi-APP-Arbitrary-factory-reset-vulnerability-b2d747693a7442aaa8b045e57bbd8297",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-36369",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-22T14:15:10.023",
"lastModified": "2023-06-29T18:00:21.530",
"vulnStatus": "Analyzed",
"lastModified": "2024-12-06T19:15:10.100",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -19,6 +19,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -26,9 +28,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
@ -45,6 +45,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-770"
}
]
}
],
"configurations": [
@ -79,6 +89,16 @@
"Patch",
"Third Party Advisory"
]
},
{
"url": "https://github.com/MonetDB/MonetDB/issues/7383",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-36370",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-22T14:15:10.067",
"lastModified": "2023-06-29T17:50:13.513",
"vulnStatus": "Analyzed",
"lastModified": "2024-12-06T20:15:22.850",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -19,6 +19,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -26,9 +28,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
@ -45,6 +45,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-770"
}
]
}
],
"configurations": [
@ -79,6 +89,16 @@
"Patch",
"Third Party Advisory"
]
},
{
"url": "https://github.com/MonetDB/MonetDB/issues/7382",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-36371",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-22T14:15:10.117",
"lastModified": "2023-06-29T17:50:18.560",
"vulnStatus": "Analyzed",
"lastModified": "2024-12-06T20:15:23.280",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -19,6 +19,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -26,9 +28,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
@ -45,6 +45,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-770"
}
]
}
],
"configurations": [
@ -79,6 +89,16 @@
"Patch",
"Third Party Advisory"
]
},
{
"url": "https://github.com/MonetDB/MonetDB/issues/7385",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-52357",
"sourceIdentifier": "psirt@huawei.com",
"published": "2024-02-18T03:15:08.590",
"lastModified": "2024-12-05T20:15:21.220",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-12-06T19:31:16.340",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,22 +81,81 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A974CA73-84E8-480B-BB4C-4A81D0C985B2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "353AEAF2-AF46-4835-93E1-4F942D5E2810"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:2.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "20112231-B840-44D3-A061-B9B9F80EE378"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:2.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C01447F1-7F58-4AE3-B403-C01B2575D898"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CB3751C1-7729-41D3-AE50-80B5AF601135"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4D81C4EF-7CAF-4E60-91A4-8CF7B95B2B54"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8198CDB2-4BC5-411A-8736-615A531FC545"
}
]
}
]
}
],
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2024/2/",
"source": "psirt@huawei.com"
"source": "psirt@huawei.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405",
"source": "psirt@huawei.com"
"source": "psirt@huawei.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://consumer.huawei.com/en/support/bulletin/2024/2/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-52361",
"sourceIdentifier": "psirt@huawei.com",
"published": "2024-02-18T03:15:08.730",
"lastModified": "2024-02-20T19:50:53.960",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-06T20:04:02.750",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,15 +15,87 @@
"value": "El m\u00f3dulo VerifiedBoot tiene una vulnerabilidad que puede causar errores de autenticaci\u00f3n. La explotaci\u00f3n exitosa de esta vulnerabilidad puede afectar la integridad."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8198CDB2-4BC5-411A-8736-615A531FC545"
}
]
}
]
}
],
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2024/2/",
"source": "psirt@huawei.com"
"source": "psirt@huawei.com",
"tags": [
"Not Applicable"
]
},
{
"url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405",
"source": "psirt@huawei.com"
"source": "psirt@huawei.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://consumer.huawei.com/en/support/bulletin/2024/2/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Not Applicable"
]
},
{
"url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-52373",
"sourceIdentifier": "psirt@huawei.com",
"published": "2024-02-18T04:15:08.007",
"lastModified": "2024-02-20T19:50:53.960",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-06T20:05:03.750",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,15 +15,117 @@
"value": "Vulnerabilidad de verificaci\u00f3n de permisos en el m\u00f3dulo emergente para compartir contenido. La explotaci\u00f3n exitosa de esta vulnerabilidad puede causar el intercambio de archivos no autorizado."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-281"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A974CA73-84E8-480B-BB4C-4A81D0C985B2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "353AEAF2-AF46-4835-93E1-4F942D5E2810"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:2.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "20112231-B840-44D3-A061-B9B9F80EE378"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:2.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C01447F1-7F58-4AE3-B403-C01B2575D898"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CB3751C1-7729-41D3-AE50-80B5AF601135"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4D81C4EF-7CAF-4E60-91A4-8CF7B95B2B54"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8198CDB2-4BC5-411A-8736-615A531FC545"
}
]
}
]
}
],
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2024/2/",
"source": "psirt@huawei.com"
"source": "psirt@huawei.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405",
"source": "psirt@huawei.com"
"source": "psirt@huawei.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://consumer.huawei.com/en/support/bulletin/2024/2/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-52375",
"sourceIdentifier": "psirt@huawei.com",
"published": "2024-02-18T06:15:07.593",
"lastModified": "2024-02-20T19:50:53.960",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-06T20:05:34.567",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,15 +15,117 @@
"value": "Vulnerabilidad de control de permisos en el m\u00f3dulo WindowManagerServices. La explotaci\u00f3n exitosa de esta vulnerabilidad puede afectar la disponibilidad."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A974CA73-84E8-480B-BB4C-4A81D0C985B2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "353AEAF2-AF46-4835-93E1-4F942D5E2810"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:2.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "20112231-B840-44D3-A061-B9B9F80EE378"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:2.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C01447F1-7F58-4AE3-B403-C01B2575D898"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CB3751C1-7729-41D3-AE50-80B5AF601135"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4D81C4EF-7CAF-4E60-91A4-8CF7B95B2B54"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8198CDB2-4BC5-411A-8736-615A531FC545"
}
]
}
]
}
],
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2024/2/",
"source": "psirt@huawei.com"
"source": "psirt@huawei.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405",
"source": "psirt@huawei.com"
"source": "psirt@huawei.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://consumer.huawei.com/en/support/bulletin/2024/2/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-52378",
"sourceIdentifier": "psirt@huawei.com",
"published": "2024-02-18T07:15:08.793",
"lastModified": "2024-02-20T19:50:53.960",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-06T20:03:29.293",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,15 +15,97 @@
"value": "Vulnerabilidad de l\u00f3gica de servicio incorrecta en el m\u00f3dulo WindowManagerServices. La explotaci\u00f3n exitosa de esta vulnerabilidad puede provocar que las funciones funcionen de manera anormal."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "353AEAF2-AF46-4835-93E1-4F942D5E2810"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CB3751C1-7729-41D3-AE50-80B5AF601135"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4D81C4EF-7CAF-4E60-91A4-8CF7B95B2B54"
}
]
}
]
}
],
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2024/2/",
"source": "psirt@huawei.com"
"source": "psirt@huawei.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405",
"source": "psirt@huawei.com"
"source": "psirt@huawei.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://consumer.huawei.com/en/support/bulletin/2024/2/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-7105",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-02-29T01:42:53.353",
"lastModified": "2024-05-17T02:34:09.983",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-06T19:56:16.997",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -23,6 +23,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
@ -30,12 +32,30 @@
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 4.7,
"baseSeverity": "MEDIUM"
"availabilityImpact": "LOW"
},
"exploitabilityScore": 1.2,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -45,13 +65,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:M/C:P/I:P/A:P",
"baseScore": 5.8,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "MULTIPLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 6.4,
@ -67,7 +87,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -76,18 +96,69 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fabianros:e-commerce_website:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FDE3B6CB-3D17-47F4-B7AC-3BDB090B5AFB"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/h4md153v63n/CVEs/blob/main/E-Commerce_Website/E-Commerce%20Website%20-%20SQL%20Injection%201.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.249000",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.249000",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://github.com/h4md153v63n/CVEs/blob/main/E-Commerce_Website/E-Commerce%20Website%20-%20SQL%20Injection%201.md",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.249000",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.249000",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-7106",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-02-29T01:42:53.563",
"lastModified": "2024-05-17T02:34:10.107",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-06T19:54:34.153",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -23,6 +23,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
@ -30,12 +32,30 @@
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -45,13 +65,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"baseScore": 6.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
@ -67,7 +87,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -76,18 +96,69 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fabianros:e-commerce_website:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FDE3B6CB-3D17-47F4-B7AC-3BDB090B5AFB"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/h4md153v63n/CVEs/blob/main/E-Commerce_Website/E-Commerce%20Website%20-%20SQL%20Injection%202.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.249001",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.249001",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://github.com/h4md153v63n/CVEs/blob/main/E-Commerce_Website/E-Commerce%20Website%20-%20SQL%20Injection%202.md",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.249001",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.249001",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-7107",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-02-29T01:42:53.770",
"lastModified": "2024-05-17T02:34:10.207",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-06T19:53:48.247",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -23,6 +23,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -30,12 +32,30 @@
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH"
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -45,13 +65,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
@ -76,18 +96,69 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fabianros:e-commerce_website:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FDE3B6CB-3D17-47F4-B7AC-3BDB090B5AFB"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/h4md153v63n/CVEs/blob/main/E-Commerce_Website/E-Commerce%20Website%20-%20SQL%20Injection%203.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.249002",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.249002",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://github.com/h4md153v63n/CVEs/blob/main/E-Commerce_Website/E-Commerce%20Website%20-%20SQL%20Injection%203.md",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.249002",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.249002",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-7108",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-02-29T01:42:53.997",
"lastModified": "2024-05-17T02:34:10.297",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-06T19:52:53.580",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -23,6 +23,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -30,12 +32,30 @@
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
],
"cvssMetricV2": [
@ -45,13 +65,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"baseScore": 5.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 5.0
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
@ -67,7 +87,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -76,18 +96,69 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fabianros:e-commerce_website:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FDE3B6CB-3D17-47F4-B7AC-3BDB090B5AFB"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/h4md153v63n/CVEs/blob/main/E-Commerce_Website/E-Commerce%20Website%20-%20Stored%20Cross-site%20Scripting.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.249003",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.249003",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://github.com/h4md153v63n/CVEs/blob/main/E-Commerce_Website/E-Commerce%20Website%20-%20Stored%20Cross-site%20Scripting.md",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.249003",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.249003",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-7109",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-02-29T01:42:54.193",
"lastModified": "2024-05-17T02:34:10.410",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-06T20:01:58.823",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -23,6 +23,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -30,12 +32,30 @@
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH"
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -45,13 +65,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
@ -67,7 +87,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -76,18 +96,69 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fabianros:library_management_system:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "421B1EEE-61E9-48D8-BE67-A8346F3CC55E"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/h4md153v63n/CVEs/blob/main/Library-Management-System/Library-Management-System_SQL_Injection-1.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.249004",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.249004",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://github.com/h4md153v63n/CVEs/blob/main/Library-Management-System/Library-Management-System_SQL_Injection-1.md",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.249004",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.249004",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-7110",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-02-29T01:42:54.400",
"lastModified": "2024-05-17T02:34:10.497",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-06T19:24:33.577",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -23,6 +23,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -30,12 +32,30 @@
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH"
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -45,13 +65,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
@ -67,7 +87,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -76,18 +96,71 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fabianros:library_management_system:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "421B1EEE-61E9-48D8-BE67-A8346F3CC55E"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/h4md153v63n/CVEs/blob/main/Library-Management-System/Library-Management-System_SQL_Injection-2.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.249005",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.249005",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://github.com/h4md153v63n/CVEs/blob/main/Library-Management-System/Library-Management-System_SQL_Injection-2.md",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.249005",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.249005",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-0130",
"sourceIdentifier": "psirt@nvidia.com",
"published": "2024-12-06T20:15:23.543",
"lastModified": "2024-12-06T20:15:23.543",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "NVIDIA UFM Enterprise, UFM Appliance, and UFM CyberAI contain a vulnerability where an attacker can cause an improper authentication issue by sending a malformed request through the Ethernet management interface. A successful exploit of this vulnerability might lead to escalation of privileges, data tampering, denial of service, and information disclosure."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@nvidia.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@nvidia.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
],
"references": [
{
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5584",
"source": "psirt@nvidia.com"
}
]
}

View File

@ -0,0 +1,44 @@
{
"id": "CVE-2024-0139",
"sourceIdentifier": "psirt@nvidia.com",
"published": "2024-12-06T20:15:23.763",
"lastModified": "2024-12-06T20:15:23.763",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "NVIDIA Base Command Manager and Bright Cluster Manager for Linux contain an insecure temporary file vulnerability. A successful exploit of this vulnerability might lead to denial of service."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@nvidia.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 0.8,
"impactScore": 3.6
}
]
},
"references": [
{
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5600",
"source": "psirt@nvidia.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-11155",
"sourceIdentifier": "PSIRT@rockwellautomation.com",
"published": "2024-12-05T18:15:20.933",
"lastModified": "2024-12-05T18:15:20.933",
"lastModified": "2024-12-06T19:15:10.730",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -55,6 +55,28 @@
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-11159",
"sourceIdentifier": "security@mozilla.org",
"published": "2024-11-13T14:15:15.330",
"lastModified": "2024-11-26T22:15:17.720",
"lastModified": "2024-12-06T20:15:23.937",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.6,
"impactScore": 3.6
}
]
},
@ -56,7 +76,7 @@
"description": [
{
"lang": "en",
"value": "CWE-203"
"value": "CWE-312"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-12254",
"sourceIdentifier": "cna@python.org",
"published": "2024-12-06T16:15:20.623",
"lastModified": "2024-12-06T16:15:20.623",
"lastModified": "2024-12-06T19:15:10.983",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -93,6 +93,10 @@
{
"url": "https://mail.python.org/archives/list/security-announce@python.org/thread/H4O3UBAOAQQXGT4RE3E4XQYR5XLROORB/",
"source": "cna@python.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/12/06/1",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1822",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-02-23T16:15:47.817",
"lastModified": "2024-05-17T02:35:37.690",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-06T19:58:10.803",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -23,6 +23,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N",
"baseScore": 2.4,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
@ -30,12 +32,30 @@
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 2.4,
"baseSeverity": "LOW"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 0.9,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
],
"cvssMetricV2": [
@ -45,13 +65,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:M/C:N/I:P/A:N",
"baseScore": 3.3,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "MULTIPLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 3.3
"availabilityImpact": "NONE"
},
"baseSeverity": "LOW",
"exploitabilityScore": 6.4,
@ -67,7 +87,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -76,18 +96,69 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpgurukul:tourism_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E790B49F-53C5-4DD8-AD13-EC40116B221E"
}
]
}
]
}
],
"references": [
{
"url": "https://drive.google.com/file/d/1ulzFlRqsex39dDUOFU2LbmphrQblSAwn/view?usp=drive_link",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?ctiid.254610",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.254610",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://drive.google.com/file/d/1ulzFlRqsex39dDUOFU2LbmphrQblSAwn/view?usp=drive_link",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?ctiid.254610",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.254610",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1834",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-02-23T20:15:52.537",
"lastModified": "2024-05-17T02:35:38.827",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-06T19:59:24.463",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -23,6 +23,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"baseScore": 3.5,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
@ -30,12 +32,30 @@
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"baseSeverity": "LOW"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
],
"cvssMetricV2": [
@ -45,13 +65,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"baseScore": 4.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 4.0
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
@ -67,7 +87,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -76,18 +96,69 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oretnom23:simple_student_attendance_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0907D49A-D649-42A3-BE96-A1EB234C6859"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Simple-Student-Attendance-System.md#2pageattendancexss",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.254625",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.254625",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Simple-Student-Attendance-System.md#2pageattendancexss",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.254625",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.254625",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1923",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-02-27T16:15:46.057",
"lastModified": "2024-05-17T02:35:41.693",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-06T20:00:46.283",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -23,6 +23,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
@ -30,12 +32,30 @@
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -45,13 +65,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"baseScore": 6.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
@ -67,7 +87,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -76,18 +96,69 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oretnom23:simple_student_attendance_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0907D49A-D649-42A3-BE96-A1EB234C6859"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/smurf-reigz/security/blob/main/proof-of-concepts/SOURCECODESTER%20%5BSimple%20Student%20Attendance%20System%20using%20PHP%20and%20MySQL%5D%20SQLi%20on%20ajax-api.php%3Faction=delete_class.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.254858",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.254858",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://github.com/smurf-reigz/security/blob/main/proof-of-concepts/SOURCECODESTER%20%5BSimple%20Student%20Attendance%20System%20using%20PHP%20and%20MySQL%5D%20SQLi%20on%20ajax-api.php%3Faction=delete_class.md",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.254858",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.254858",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-20954",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-04-16T22:15:11.570",
"lastModified": "2024-04-17T12:48:31.863",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-06T19:38:00.843",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -23,6 +23,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 3.7,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
@ -30,19 +32,76 @@
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.7,
"baseSeverity": "LOW"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.2,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:graalvm:20.3.13:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "00EDC8FF-13F2-4218-9EF4-B509364AE7B3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "938A32D1-FBAB-42AE-87A7-AB19402B561A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:graalvm_for_jdk:17.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "880BE1FE-FBFF-4CC1-B0D1-BAF025F58D4A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:graalvm_for_jdk:21.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "27876EF0-E7C0-4B3E-8C8B-009736D1F57C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:graalvm_for_jdk:22:*:*:*:*:*:*:*",
"matchCriteriaId": "EAD84F79-1DAE-4943-8167-861144067B4D"
}
]
}
]
}
],
"references": [
{
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
"source": "secalert_us@oracle.com"
"source": "secalert_us@oracle.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21003",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-04-16T22:15:14.040",
"lastModified": "2024-04-26T09:15:09.823",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-06T20:23:18.453",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,10 +19,12 @@
"cvssMetricV31": [
{
"source": "secalert_us@oracle.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N",
"baseScore": 3.1,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
@ -30,23 +32,125 @@
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 3.1,
"baseSeverity": "LOW"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.6,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:graalvm:20.3.13:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "00EDC8FF-13F2-4218-9EF4-B509364AE7B3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "938A32D1-FBAB-42AE-87A7-AB19402B561A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:jdk:1.8.0:update401:*:*:*:*:*:*",
"matchCriteriaId": "B9155227-6787-4FAA-BB2C-C99D77DD2111"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:jre:1.8.0:update401:*:*:*:*:*:*",
"matchCriteriaId": "FD4CDABD-BC1E-4A23-8022-D7A0E615C9F4"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*",
"matchCriteriaId": "3A756737-1CC4-42C2-A4DF-E1C893B4E2D5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*",
"matchCriteriaId": "B55E8D50-99B4-47EC-86F9-699B67D473CE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:data_infrastructure_insights_acquisition_unit:-:*:*:*:*:*:*:*",
"matchCriteriaId": "51A99795-12EA-4C3F-A3F7-DED89BF6EED3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:data_infrastructure_insights_storage_workload_security_agent:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EB7A9455-165A-42CE-B5D1-648AACB2ED05"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F1BE6C1F-2565-4E97-92AA-16563E5660A5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5735E553-9731-4AAC-BCFF-989377F817B3"
}
]
}
]
}
],
"references": [
{
"url": "https://security.netapp.com/advisory/ntap-20240426-0004/",
"source": "secalert_us@oracle.com"
"source": "secalert_us@oracle.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
"source": "secalert_us@oracle.com"
"source": "secalert_us@oracle.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20240426-0004/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21047",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-04-16T22:15:21.643",
"lastModified": "2024-04-26T09:15:10.500",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-06T19:56:28.687",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,10 +19,12 @@
"cvssMetricV31": [
{
"source": "secalert_us@oracle.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
@ -30,23 +32,114 @@
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.0.0",
"versionEndIncluding": "8.0.36",
"matchCriteriaId": "7E9AB3E2-0EC8-44BE-BBEB-597C05640BE3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.1.0",
"versionEndIncluding": "8.3.0",
"matchCriteriaId": "9D866F18-16AD-4E00-8611-646BBF64A72A"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*",
"matchCriteriaId": "3A756737-1CC4-42C2-A4DF-E1C893B4E2D5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*",
"matchCriteriaId": "B55E8D50-99B4-47EC-86F9-699B67D473CE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F1BE6C1F-2565-4E97-92AA-16563E5660A5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5735E553-9731-4AAC-BCFF-989377F817B3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BDFB1169-41A0-4A86-8E4F-FDA9730B1E94"
}
]
}
]
}
],
"references": [
{
"url": "https://security.netapp.com/advisory/ntap-20240426-0013/",
"source": "secalert_us@oracle.com"
"source": "secalert_us@oracle.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
"source": "secalert_us@oracle.com"
"source": "secalert_us@oracle.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20240426-0013/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21048",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-04-16T22:15:21.810",
"lastModified": "2024-04-17T12:48:31.863",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-06T19:46:40.837",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,10 +19,12 @@
"cvssMetricV31": [
{
"source": "secalert_us@oracle.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
@ -30,19 +32,58 @@
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:web_applications_desktop_integrator:*:*:*:*:*:*:*:*",
"versionStartIncluding": "12.2.3",
"versionEndIncluding": "12.2.13",
"matchCriteriaId": "F91CBAAD-6163-487C-9C7C-D89423E6A6F6"
}
]
}
]
}
],
"references": [
{
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
"source": "secalert_us@oracle.com"
"source": "secalert_us@oracle.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21061",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-04-16T22:15:24.080",
"lastModified": "2024-04-26T09:15:11.143",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-06T19:09:56.543",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,10 +19,12 @@
"cvssMetricV31": [
{
"source": "secalert_us@oracle.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
@ -30,23 +32,114 @@
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.0.0",
"versionEndIncluding": "8.0.35",
"matchCriteriaId": "AA4C99CA-6232-4CAF-97EB-39D1B5C815E4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.1.0",
"versionEndIncluding": "8.2.0",
"matchCriteriaId": "55EB5D47-E7EB-422D-83FA-169FC1A6C265"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*",
"matchCriteriaId": "3A756737-1CC4-42C2-A4DF-E1C893B4E2D5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*",
"matchCriteriaId": "B55E8D50-99B4-47EC-86F9-699B67D473CE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F1BE6C1F-2565-4E97-92AA-16563E5660A5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5735E553-9731-4AAC-BCFF-989377F817B3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BDFB1169-41A0-4A86-8E4F-FDA9730B1E94"
}
]
}
]
}
],
"references": [
{
"url": "https://security.netapp.com/advisory/ntap-20240426-0014/",
"source": "secalert_us@oracle.com"
"source": "secalert_us@oracle.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
"source": "secalert_us@oracle.com"
"source": "secalert_us@oracle.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20240426-0014/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21062",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-04-16T22:15:24.247",
"lastModified": "2024-04-26T09:15:11.213",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-06T19:28:18.863",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,10 +19,12 @@
"cvssMetricV31": [
{
"source": "secalert_us@oracle.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
@ -30,23 +32,114 @@
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.0.0",
"versionEndIncluding": "8.0.36",
"matchCriteriaId": "7E9AB3E2-0EC8-44BE-BBEB-597C05640BE3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.1.0",
"versionEndIncluding": "8.3.0",
"matchCriteriaId": "9D866F18-16AD-4E00-8611-646BBF64A72A"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*",
"matchCriteriaId": "3A756737-1CC4-42C2-A4DF-E1C893B4E2D5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*",
"matchCriteriaId": "B55E8D50-99B4-47EC-86F9-699B67D473CE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F1BE6C1F-2565-4E97-92AA-16563E5660A5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5735E553-9731-4AAC-BCFF-989377F817B3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BDFB1169-41A0-4A86-8E4F-FDA9730B1E94"
}
]
}
]
}
],
"references": [
{
"url": "https://security.netapp.com/advisory/ntap-20240426-0013/",
"source": "secalert_us@oracle.com"
"source": "secalert_us@oracle.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
"source": "secalert_us@oracle.com"
"source": "secalert_us@oracle.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20240426-0013/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21068",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-04-16T22:15:25.307",
"lastModified": "2024-04-26T09:15:11.273",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-06T19:22:57.927",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,10 +19,12 @@
"cvssMetricV31": [
{
"source": "secalert_us@oracle.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
"baseScore": 3.7,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
@ -30,27 +32,206 @@
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 3.7,
"baseSeverity": "LOW"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.2,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "938A32D1-FBAB-42AE-87A7-AB19402B561A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:graalvm_for_jdk:17.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "880BE1FE-FBFF-4CC1-B0D1-BAF025F58D4A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:graalvm_for_jdk:21.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "27876EF0-E7C0-4B3E-8C8B-009736D1F57C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:graalvm_for_jdk:22:*:*:*:*:*:*:*",
"matchCriteriaId": "EAD84F79-1DAE-4943-8167-861144067B4D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:jdk:1.8.0:update401:*:*:enterprise_performance_pack:*:*:*",
"matchCriteriaId": "7E749FF6-64BC-4396-9E47-1879592E1E55"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:jdk:11.0.22:*:*:*:*:*:*:*",
"matchCriteriaId": "C75B6911-F927-4E92-B921-035FA813B211"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:jdk:17.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "F61BF03B-43C2-41FB-BBA2-B2A667AC4236"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:jdk:21.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "773190A6-9504-4BE1-9704-2909DEC25982"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:jdk:22.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3AD2D0EA-694D-4629-A1F7-244C9B154248"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:jre:1.8.0:update401:*:*:enterprise_performance_pack:*:*:*",
"matchCriteriaId": "27909A41-F6F0-4D93-9238-3001C9872140"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:jre:11.0.22:*:*:*:*:*:*:*",
"matchCriteriaId": "FB0D5357-5C3F-412D-8E12-F88745002AFA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:jre:17.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "FD3EDF97-C685-42DD-8279-990332453722"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:jre:21.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7A4D9F78-4BEF-49B1-9C66-EBDE40FF9298"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:jre:22:*:*:*:*:*:*:*",
"matchCriteriaId": "25FED706-84D7-4C1A-8204-7F1277F39B67"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*",
"matchCriteriaId": "3A756737-1CC4-42C2-A4DF-E1C893B4E2D5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*",
"matchCriteriaId": "B55E8D50-99B4-47EC-86F9-699B67D473CE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:data_infrastructure_insights_acquisition_unit:-:*:*:*:*:*:*:*",
"matchCriteriaId": "51A99795-12EA-4C3F-A3F7-DED89BF6EED3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:data_infrastructure_insights_storage_workload_security_agent:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EB7A9455-165A-42CE-B5D1-648AACB2ED05"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F1BE6C1F-2565-4E97-92AA-16563E5660A5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5735E553-9731-4AAC-BCFF-989377F817B3"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
}
]
}
]
}
],
"references": [
{
"url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00014.html",
"source": "secalert_us@oracle.com"
"source": "secalert_us@oracle.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20240426-0004/",
"source": "secalert_us@oracle.com"
"source": "secalert_us@oracle.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
"source": "secalert_us@oracle.com"
"source": "secalert_us@oracle.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00014.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20240426-0004/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21069",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-04-16T22:15:25.473",
"lastModified": "2024-04-26T09:15:11.350",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-06T19:04:31.867",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,10 +19,12 @@
"cvssMetricV31": [
{
"source": "secalert_us@oracle.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
@ -30,23 +32,114 @@
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.0.0",
"versionEndIncluding": "8.0.36",
"matchCriteriaId": "7E9AB3E2-0EC8-44BE-BBEB-597C05640BE3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.1.0",
"versionEndIncluding": "8.3.0",
"matchCriteriaId": "9D866F18-16AD-4E00-8611-646BBF64A72A"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*",
"matchCriteriaId": "3A756737-1CC4-42C2-A4DF-E1C893B4E2D5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*",
"matchCriteriaId": "B55E8D50-99B4-47EC-86F9-699B67D473CE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F1BE6C1F-2565-4E97-92AA-16563E5660A5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5735E553-9731-4AAC-BCFF-989377F817B3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BDFB1169-41A0-4A86-8E4F-FDA9730B1E94"
}
]
}
]
}
],
"references": [
{
"url": "https://security.netapp.com/advisory/ntap-20240426-0013/",
"source": "secalert_us@oracle.com"
"source": "secalert_us@oracle.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
"source": "secalert_us@oracle.com"
"source": "secalert_us@oracle.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20240426-0013/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21081",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-04-16T22:15:27.603",
"lastModified": "2024-04-17T12:48:31.863",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-06T20:59:06.987",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,10 +19,12 @@
"cvssMetricV31": [
{
"source": "secalert_us@oracle.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -30,19 +32,58 @@
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"baseSeverity": "MEDIUM"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:partner_management:*:*:*:*:*:*:*:*",
"versionStartIncluding": "12.2.3",
"versionEndIncluding": "12.2.13",
"matchCriteriaId": "E2D0CA2D-3C26-4D7D-A7D4-D0725698FCF7"
}
]
}
]
}
],
"references": [
{
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
"source": "secalert_us@oracle.com"
"source": "secalert_us@oracle.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21086",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-04-16T22:15:28.463",
"lastModified": "2024-04-17T12:48:31.863",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-06T20:58:09.767",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,10 +19,12 @@
"cvssMetricV31": [
{
"source": "secalert_us@oracle.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -30,19 +32,58 @@
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:customer_relationship_management_technical_foundation:*:*:*:*:*:*:*:*",
"versionStartIncluding": "12.2.3",
"versionEndIncluding": "12.2.13",
"matchCriteriaId": "A52693F3-96EA-416C-BF0B-663AC40EE674"
}
]
}
]
}
],
"references": [
{
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
"source": "secalert_us@oracle.com"
"source": "secalert_us@oracle.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21101",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-04-16T22:15:31.087",
"lastModified": "2024-04-26T09:15:11.750",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-06T20:41:55.317",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,10 +19,12 @@
"cvssMetricV31": [
{
"source": "secalert_us@oracle.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 2.2,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
@ -30,23 +32,128 @@
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.2,
"baseSeverity": "LOW"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 0.7,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.5.0",
"versionEndIncluding": "7.5.33",
"matchCriteriaId": "E9DAFE9D-3432-4F98-8DAC-2089AF47125D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.6.0",
"versionEndIncluding": "7.6.29",
"matchCriteriaId": "D12AA952-D975-4440-A6D1-44049360482D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.0.0",
"versionEndIncluding": "8.0.36",
"matchCriteriaId": "7E9AB3E2-0EC8-44BE-BBEB-597C05640BE3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.1.0",
"versionEndIncluding": "8.3.0",
"matchCriteriaId": "9D866F18-16AD-4E00-8611-646BBF64A72A"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*",
"matchCriteriaId": "3A756737-1CC4-42C2-A4DF-E1C893B4E2D5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*",
"matchCriteriaId": "B55E8D50-99B4-47EC-86F9-699B67D473CE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F1BE6C1F-2565-4E97-92AA-16563E5660A5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5735E553-9731-4AAC-BCFF-989377F817B3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BDFB1169-41A0-4A86-8E4F-FDA9730B1E94"
}
]
}
]
}
],
"references": [
{
"url": "https://security.netapp.com/advisory/ntap-20240426-0015/",
"source": "secalert_us@oracle.com"
"source": "secalert_us@oracle.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
"source": "secalert_us@oracle.com"
"source": "secalert_us@oracle.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20240426-0015/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21102",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-04-16T22:15:31.270",
"lastModified": "2024-04-26T09:15:11.813",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-06T20:40:44.093",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,10 +19,12 @@
"cvssMetricV31": [
{
"source": "secalert_us@oracle.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
@ -30,27 +32,128 @@
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.0.0",
"versionEndIncluding": "8.0.36",
"matchCriteriaId": "7E9AB3E2-0EC8-44BE-BBEB-597C05640BE3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.1.0",
"versionEndIncluding": "8.3.0",
"matchCriteriaId": "9D866F18-16AD-4E00-8611-646BBF64A72A"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*",
"matchCriteriaId": "3A756737-1CC4-42C2-A4DF-E1C893B4E2D5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*",
"matchCriteriaId": "B55E8D50-99B4-47EC-86F9-699B67D473CE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F1BE6C1F-2565-4E97-92AA-16563E5660A5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5735E553-9731-4AAC-BCFF-989377F817B3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BDFB1169-41A0-4A86-8E4F-FDA9730B1E94"
}
]
}
]
}
],
"references": [
{
"url": "https://security.netapp.com/advisory/ntap-20240426-0013/",
"source": "secalert_us@oracle.com"
"source": "secalert_us@oracle.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20240426-0015/",
"source": "secalert_us@oracle.com"
"source": "secalert_us@oracle.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
"source": "secalert_us@oracle.com"
"source": "secalert_us@oracle.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20240426-0013/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20240426-0015/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21103",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-04-16T22:15:31.437",
"lastModified": "2024-04-17T12:48:31.863",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-06T20:34:30.853",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,10 +19,12 @@
"cvssMetricV31": [
{
"source": "secalert_us@oracle.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
@ -30,19 +32,57 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*",
"versionEndExcluding": "7.0.16",
"matchCriteriaId": "B9585A17-FC9D-4451-B2FA-1AD770519E4E"
}
]
}
]
}
],
"references": [
{
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
"source": "secalert_us@oracle.com"
"source": "secalert_us@oracle.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21104",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-04-16T22:15:31.600",
"lastModified": "2024-04-17T12:48:31.863",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-06T20:33:01.633",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,10 +19,12 @@
"cvssMetricV31": [
{
"source": "secalert_us@oracle.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
@ -30,19 +32,56 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 0.6,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*",
"matchCriteriaId": "D3E503FB-6279-4D4A-91D8-E237ECF9D2B0"
}
]
}
]
}
],
"references": [
{
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
"source": "secalert_us@oracle.com"
"source": "secalert_us@oracle.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21118",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-04-16T22:15:34.027",
"lastModified": "2024-04-17T12:48:07.510",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-06T20:29:11.287",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,10 +19,12 @@
"cvssMetricV31": [
{
"source": "secalert_us@oracle.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
@ -30,19 +32,61 @@
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
"availabilityImpact": "LOW"
},
"exploitabilityScore": 1.8,
"impactScore": 3.4
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:outside_in_technology:8.5.6:*:*:*:*:*:*:*",
"matchCriteriaId": "76D6D900-3178-4FB2-980C-5E806933F059"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:outside_in_technology:8.5.7:*:*:*:*:*:*:*",
"matchCriteriaId": "1442CA10-2A38-4149-BC69-59F646DCE434"
}
]
}
]
}
],
"references": [
{
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
"source": "secalert_us@oracle.com"
"source": "secalert_us@oracle.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21119",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-04-16T22:15:34.197",
"lastModified": "2024-04-17T12:48:07.510",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-06T20:26:42.563",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,10 +19,12 @@
"cvssMetricV31": [
{
"source": "secalert_us@oracle.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
@ -30,19 +32,61 @@
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
"availabilityImpact": "LOW"
},
"exploitabilityScore": 1.8,
"impactScore": 3.4
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:outside_in_technology:8.5.6:*:*:*:*:*:*:*",
"matchCriteriaId": "76D6D900-3178-4FB2-980C-5E806933F059"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:outside_in_technology:8.5.7:*:*:*:*:*:*:*",
"matchCriteriaId": "1442CA10-2A38-4149-BC69-59F646DCE434"
}
]
}
]
}
],
"references": [
{
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
"source": "secalert_us@oracle.com"
"source": "secalert_us@oracle.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-21492",
"sourceIdentifier": "report@snyk.io",
"published": "2024-02-17T05:15:08.223",
"lastModified": "2024-02-20T19:50:53.960",
"lastModified": "2024-12-06T19:15:11.520",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -23,6 +23,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
@ -30,9 +32,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.2,
"impactScore": 2.5
@ -49,6 +49,16 @@
"value": "CWE-613"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-613"
}
]
}
],
"references": [
@ -63,6 +73,18 @@
{
"url": "https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGREENPAUCADDYSECURITY-5920787",
"source": "report@snyk.io"
},
{
"url": "https://blog.trailofbits.com/2023/09/18/security-flaws-in-an-sso-plugin-for-caddy/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://github.com/greenpau/caddy-security/issues/272",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGREENPAUCADDYSECURITY-5920787",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-28149",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2024-03-06T17:15:10.450",
"lastModified": "2024-05-01T18:15:16.697",
"lastModified": "2024-12-06T19:15:11.663",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "El complemento Jenkins HTML Publisher 1.16 a 1.32 (ambos inclusive) no sanitizada adecuadamente la entrada, lo que permite a los atacantes con permiso Elemento/Configurar implementar ataques de Cross-Site Scripting (XSS) y determinar si existe una ruta en el sistema de archivos del controlador Jenkins."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/03/06/3",
@ -24,6 +59,14 @@
{
"url": "https://www.jenkins.io/security/advisory/2024-03-06/#SECURITY-3301",
"source": "jenkinsci-cert@googlegroups.com"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/03/06/3",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://www.jenkins.io/security/advisory/2024-03-06/#SECURITY-3301",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-30963",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-12-05T23:15:05.267",
"lastModified": "2024-12-05T23:15:05.267",
"lastModified": "2024-12-06T20:15:24.757",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "Buffer Overflow vulnerability in Open Robotics Robotic Operating System 2 (ROS2) navigation2- ROS2-humble and navigation 2-humble allows a local attacker to execute arbitrary code via a crafted script."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://github.com/GoesM/ROS-CVE-CNVDs",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-30964",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-12-05T23:15:05.390",
"lastModified": "2024-12-05T23:15:05.390",
"lastModified": "2024-12-06T20:15:24.937",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "Insecure Permissions vulnerability in Open Robotics Robotic Operating System 2 (ROS2) navigation2- ROS2-humble and navigation 2-humble allows a local attacker to execute arbitrary code via the initial_pose_sub thread created by nav2_bt_navigator"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://github.com/GoesM/ROS-CVE-CNVDs",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-37476",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-07-04T18:15:10.210",
"lastModified": "2024-11-01T14:35:17.177",
"vulnStatus": "Analyzed",
"lastModified": "2024-12-06T20:15:25.137",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -17,32 +17,14 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
@ -50,12 +32,30 @@
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.3,
"impactScore": 3.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
@ -69,6 +69,16 @@
"value": "CWE-79"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
@ -96,6 +106,13 @@
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://patchstack.com/database/vulnerability/newspack-popups/wordpress-newspack-campaigns-plugin-2-31-1-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-37860",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-12-05T23:15:05.510",
"lastModified": "2024-12-05T23:15:05.510",
"lastModified": "2024-12-06T20:15:25.297",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "Buffer Overflow vulnerability in Open Robotic Operating System 2 ROS2 navigation2- ROS2-humble&& navigation2-humble allows a local attacker to execute arbitrary code via a crafted .yaml file to the nav2_amcl process"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.3,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://github.com/GoesM/ROS-CVE-CNVDs",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-37861",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-12-05T23:15:05.633",
"lastModified": "2024-12-05T23:15:05.633",
"lastModified": "2024-12-06T20:15:25.467",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "Open Robotics Robotic Operating System 2 (ROS2) and Nav2 humble versions were discovered to contain a buffer overflow via the nav2_amcl process. This vulnerability is triggered via sending a crafted .yaml file."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"references": [
{
"url": "https://github.com/GoesM/ROS-CVE-CNVDs",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-37862",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-12-05T23:15:05.767",
"lastModified": "2024-12-05T23:15:05.767",
"lastModified": "2024-12-06T20:15:25.640",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "Buffer Overflow vulnerability in Open Robotic Robotic Operating System 2 ROS2 navigation2- ROS2-humble&& navigation2-humble allows a local attacker to execute arbitrary code via a crafted .yaml file to the nav2_planner process."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.3,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://github.com/GoesM/ROS-CVE-CNVDs",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-37863",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-12-05T23:15:05.903",
"lastModified": "2024-12-05T23:15:05.903",
"lastModified": "2024-12-06T20:15:25.810",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "Open Robotics Robotic Operating System 2 (ROS2) and Nav2 humble versions were discovered to contain a buffer overflow via the nav2_amcl process. This vulnerability is triggered via sending a crafted .yaml file."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"references": [
{
"url": "https://github.com/GoesM/ROS-CVE-CNVDs",

View File

@ -2,12 +2,17 @@
"id": "CVE-2024-38832",
"sourceIdentifier": "security@vmware.com",
"published": "2024-11-26T12:15:18.697",
"lastModified": "2024-11-26T12:15:18.697",
"vulnStatus": "Received",
"lastModified": "2024-12-06T20:15:25.977",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "VMware Aria Operations contains a stored cross-site scripting vulnerability.\u00a0A malicious actor with editing access to views may be able to inject malicious script leading to stored cross-site scripting in the product VMware Aria Operations."
},
{
"lang": "es",
"value": "VMware Aria Operations contiene una vulnerabilidad de cross-site scripting almacenado. Un actor malintencionado con acceso de edici\u00f3n a las vistas podr\u00eda inyectar secuencias de comandos maliciosas que provoquen cross-site scripting almacenado en el producto VMware Aria Operations."
}
],
"metrics": {
@ -34,6 +39,18 @@
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25199",

View File

@ -2,12 +2,17 @@
"id": "CVE-2024-38833",
"sourceIdentifier": "security@vmware.com",
"published": "2024-11-26T12:15:18.800",
"lastModified": "2024-11-26T12:15:18.800",
"vulnStatus": "Received",
"lastModified": "2024-12-06T20:15:26.097",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "VMware Aria Operations contains a stored cross-site scripting vulnerability.\u00a0A malicious actor with editing access to email templates might inject malicious script leading to stored cross-site scripting in the product VMware Aria Operations."
},
{
"lang": "es",
"value": "VMware Aria Operations contiene una vulnerabilidad de cross-site scripting almacenado. Un actor malintencionado con acceso de edici\u00f3n a las plantillas de correo electr\u00f3nico podr\u00eda inyectar una secuencia de comandos maliciosa que provoque cross-site scripting almacenado en el producto VMware Aria Operations."
}
],
"metrics": {
@ -34,6 +39,18 @@
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25199",

View File

@ -2,12 +2,17 @@
"id": "CVE-2024-38834",
"sourceIdentifier": "security@vmware.com",
"published": "2024-11-26T12:15:18.900",
"lastModified": "2024-11-26T12:15:18.900",
"vulnStatus": "Received",
"lastModified": "2024-12-06T20:15:26.207",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "VMware Aria Operations contains a stored cross-site scripting vulnerability.\u00a0A malicious actor with editing access to cloud provider might be able to inject malicious script leading to stored cross-site scripting in the product VMware Aria Operations."
},
{
"lang": "es",
"value": "VMware Aria Operations contiene una vulnerabilidad de cross-site scripting almacenado. Un actor malintencionado con acceso de edici\u00f3n al proveedor de la nube podr\u00eda inyectar secuencias de comandos maliciosas que provoquen cross-site scripting almacenado en el producto VMware Aria Operations."
}
],
"metrics": {
@ -34,6 +39,18 @@
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25199",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-38910",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-12-05T23:15:06.020",
"lastModified": "2024-12-05T23:15:06.020",
"lastModified": "2024-12-06T20:15:26.337",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "Open Robotics Robotic Operating System 2 (ROS2) and Nav2 humble version was discovered to contain a use-after-free in the nav2_amcl process. This vulnerability is triggered via sending a request to change dynamic parameters."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"references": [
{
"url": "https://github.com/GoesM/ROS-CVE-CNVDs",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-38920",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-12-05T23:15:06.163",
"lastModified": "2024-12-05T23:15:06.163",
"lastModified": "2024-12-06T19:15:11.923",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "Open Robotics Robotic Operating System 2 (ROS2) and Nav2 humble versions were discovered to contain a use-after-free via the nav2_amcl process. This vulnerability is triggerd via remotely sending a request for change the value of dynamic-parameter`/amcl max_beams` ."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"references": [
{
"url": "https://github.com/GoesM/ROS-CVE-CNVDs",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-44123",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-10-28T21:15:05.190",
"lastModified": "2024-10-29T17:37:15.990",
"vulnStatus": "Analyzed",
"lastModified": "2024-12-06T19:15:12.117",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -23,6 +23,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 2.3,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
@ -30,9 +32,27 @@
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 0.8,
"impactScore": 1.4
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 2.3,
"baseSeverity": "LOW"
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 0.8,
"impactScore": 1.4

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-45204",
"sourceIdentifier": "support@hackerone.com",
"published": "2024-12-04T02:15:05.233",
"lastModified": "2024-12-04T02:15:05.233",
"vulnStatus": "Received",
"lastModified": "2024-12-06T20:15:26.653",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability exists where a low-privileged user can exploit insufficient permissions in credential handling to leak NTLM hashes of saved credentials. The exploitation involves using retrieved credentials to expose sensitive NTLM hashes, impacting systems beyond the initial target and potentially leading to broader security vulnerabilities."
},
{
"lang": "es",
"value": " Existe una vulnerabilidad en la que un usuario con pocos privilegios puede aprovechar la falta de permisos en el manejo de credenciales para filtrar hashes NTLM de credenciales guardadas. La explotaci\u00f3n implica el uso de credenciales recuperadas para exponer hashes NTLM confidenciales, lo que afecta a sistemas m\u00e1s all\u00e1 del objetivo inicial y puede generar vulnerabilidades de seguridad m\u00e1s amplias."
}
],
"metrics": {
@ -35,6 +39,18 @@
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"references": [
{
"url": "https://www.veeam.com/kb4693",

View File

@ -0,0 +1,100 @@
{
"id": "CVE-2024-45722",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2024-12-06T19:15:12.277",
"lastModified": "2024-12-06T19:15:12.277",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Ruijie Reyee OS versions 2.206.x up to but not including 2.320.x uses weak credential mechanism that could allow an attacker to easily calculate MQTT credentials."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 8.7,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "NONE",
"vulnerableSystemIntegrity": "NONE",
"vulnerableSystemAvailability": "HIGH",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-1391"
}
]
}
],
"references": [
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-338-01",
"source": "ics-cert@hq.dhs.gov"
}
]
}

View File

@ -0,0 +1,100 @@
{
"id": "CVE-2024-46874",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2024-12-06T19:15:12.450",
"lastModified": "2024-12-06T19:15:12.450",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Ruijie Reyee OS versions 2.206.x up to but not including 2.320.x could allow MQTT clients connecting with device credentials to send messages to some topics. Attackers with device credentials could issue commands to other devices on behalf of Ruijie's cloud."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 9.2,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "HIGH",
"vulnerableSystemAvailability": "HIGH",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-280"
}
]
}
],
"references": [
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-338-01",
"source": "ics-cert@hq.dhs.gov"
}
]
}

View File

@ -0,0 +1,100 @@
{
"id": "CVE-2024-47146",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2024-12-06T19:15:12.603",
"lastModified": "2024-12-06T19:15:12.603",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Ruijie Reyee OS versions 2.206.x up to but not including 2.320.x could allow an attacker to obtain the devices serial number if physically adjacent and sniffing the RAW WIFI signal."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "ADJACENT",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "NONE",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-402"
}
]
}
],
"references": [
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-338-01",
"source": "ics-cert@hq.dhs.gov"
}
]
}

View File

@ -0,0 +1,100 @@
{
"id": "CVE-2024-47791",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2024-12-06T19:15:12.750",
"lastModified": "2024-12-06T19:15:12.750",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Ruijie Reyee OS versions 2.206.x up to but not including 2.320.x could allow an attacker to subscribe to partial possible topics in Ruijie MQTT broker, and receive partial messages being sent to and from devices."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 8.7,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "NONE",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-155"
}
]
}
],
"references": [
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-338-01",
"source": "ics-cert@hq.dhs.gov"
}
]
}

View File

@ -0,0 +1,100 @@
{
"id": "CVE-2024-48874",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2024-12-06T19:15:12.933",
"lastModified": "2024-12-06T19:15:12.933",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Ruijie Reyee OS versions 2.206.x up to but not including 2.320.x could give attackers the ability to force Ruijie's proxy servers to perform any request the attackers choose. Using this, attackers could access internal services used by Ruijie and their internal cloud infrastructure via AWS cloud metadata services."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 9.3,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "HIGH",
"vulnerableSystemAvailability": "HIGH",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-918"
}
]
}
],
"references": [
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-338-01",
"source": "ics-cert@hq.dhs.gov"
}
]
}

View File

@ -0,0 +1,100 @@
{
"id": "CVE-2024-52324",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2024-12-06T19:15:13.083",
"lastModified": "2024-12-06T19:15:13.083",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Ruijie Reyee OS versions 2.206.x up to but not including 2.320.x uses an inherently dangerous function which could allow an attacker to send a malicious MQTT message resulting in devices executing arbitrary OS commands."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 9.2,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "HIGH",
"vulnerableSystemAvailability": "HIGH",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-242"
}
]
}
],
"references": [
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-338-01",
"source": "ics-cert@hq.dhs.gov"
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-53672",
"sourceIdentifier": "security-alert@hpe.com",
"published": "2024-12-03T21:15:07.990",
"lastModified": "2024-12-03T21:15:07.990",
"vulnStatus": "Received",
"lastModified": "2024-12-06T20:15:27.883",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the ClearPass Policy Manager web-based management interface allows remote authenticated users to run arbitrary commands on the underlying host. Successful exploit could allow an attacker to execute arbitrary commands as a lower privileged user on the underlying operating system."
},
{
"lang": "es",
"value": " Una vulnerabilidad en la interfaz de administraci\u00f3n basada en web de ClearPass Policy Manager permite que usuarios remotos autenticados ejecuten comandos arbitrarios en el host subyacente. Una explotaci\u00f3n exitosa podr\u00eda permitir que un atacante ejecute comandos arbitrarios como un usuario con privilegios inferiores en el sistema operativo subyacente."
}
],
"metrics": {
@ -35,6 +39,18 @@
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"references": [
{
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04761en_us&docLocale=en_US",

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-12-06T19:00:27.803361+00:00
2024-12-06T21:00:29.499285+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-12-06T18:52:52.237000+00:00
2024-12-06T20:59:06.987000+00:00
```
### Last Data Feed Release
@ -33,69 +33,52 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
272420
272428
```
### CVEs added in the last Commit
Recently added CVEs: `26`
Recently added CVEs: `8`
- [CVE-2024-42494](CVE-2024/CVE-2024-424xx/CVE-2024-42494.json) (`2024-12-06T18:15:24.707`)
- [CVE-2024-47043](CVE-2024/CVE-2024-470xx/CVE-2024-47043.json) (`2024-12-06T18:15:24.853`)
- [CVE-2024-47547](CVE-2024/CVE-2024-475xx/CVE-2024-47547.json) (`2024-12-06T18:15:25.017`)
- [CVE-2024-48703](CVE-2024/CVE-2024-487xx/CVE-2024-48703.json) (`2024-12-06T18:15:25.170`)
- [CVE-2024-48859](CVE-2024/CVE-2024-488xx/CVE-2024-48859.json) (`2024-12-06T17:15:08.350`)
- [CVE-2024-48863](CVE-2024/CVE-2024-488xx/CVE-2024-48863.json) (`2024-12-06T17:15:08.533`)
- [CVE-2024-48865](CVE-2024/CVE-2024-488xx/CVE-2024-48865.json) (`2024-12-06T17:15:08.653`)
- [CVE-2024-48866](CVE-2024/CVE-2024-488xx/CVE-2024-48866.json) (`2024-12-06T17:15:08.800`)
- [CVE-2024-48867](CVE-2024/CVE-2024-488xx/CVE-2024-48867.json) (`2024-12-06T17:15:08.940`)
- [CVE-2024-48868](CVE-2024/CVE-2024-488xx/CVE-2024-48868.json) (`2024-12-06T17:15:09.063`)
- [CVE-2024-48871](CVE-2024/CVE-2024-488xx/CVE-2024-48871.json) (`2024-12-06T18:15:25.267`)
- [CVE-2024-50387](CVE-2024/CVE-2024-503xx/CVE-2024-50387.json) (`2024-12-06T17:15:09.247`)
- [CVE-2024-50388](CVE-2024/CVE-2024-503xx/CVE-2024-50388.json) (`2024-12-06T17:15:09.373`)
- [CVE-2024-50389](CVE-2024/CVE-2024-503xx/CVE-2024-50389.json) (`2024-12-06T17:15:09.510`)
- [CVE-2024-50393](CVE-2024/CVE-2024-503xx/CVE-2024-50393.json) (`2024-12-06T17:15:09.637`)
- [CVE-2024-50402](CVE-2024/CVE-2024-504xx/CVE-2024-50402.json) (`2024-12-06T17:15:09.757`)
- [CVE-2024-50403](CVE-2024/CVE-2024-504xx/CVE-2024-50403.json) (`2024-12-06T17:15:09.900`)
- [CVE-2024-50404](CVE-2024/CVE-2024-504xx/CVE-2024-50404.json) (`2024-12-06T17:15:10.043`)
- [CVE-2024-51727](CVE-2024/CVE-2024-517xx/CVE-2024-51727.json) (`2024-12-06T18:15:25.580`)
- [CVE-2024-52320](CVE-2024/CVE-2024-523xx/CVE-2024-52320.json) (`2024-12-06T18:15:25.737`)
- [CVE-2024-52558](CVE-2024/CVE-2024-525xx/CVE-2024-52558.json) (`2024-12-06T18:15:26.007`)
- [CVE-2024-53691](CVE-2024/CVE-2024-536xx/CVE-2024-53691.json) (`2024-12-06T17:15:10.520`)
- [CVE-2024-54143](CVE-2024/CVE-2024-541xx/CVE-2024-54143.json) (`2024-12-06T17:15:12.687`)
- [CVE-2024-54749](CVE-2024/CVE-2024-547xx/CVE-2024-54749.json) (`2024-12-06T17:15:12.983`)
- [CVE-2024-55268](CVE-2024/CVE-2024-552xx/CVE-2024-55268.json) (`2024-12-06T17:15:13.690`)
- [CVE-2024-0130](CVE-2024/CVE-2024-01xx/CVE-2024-0130.json) (`2024-12-06T20:15:23.543`)
- [CVE-2024-0139](CVE-2024/CVE-2024-01xx/CVE-2024-0139.json) (`2024-12-06T20:15:23.763`)
- [CVE-2024-45722](CVE-2024/CVE-2024-457xx/CVE-2024-45722.json) (`2024-12-06T19:15:12.277`)
- [CVE-2024-46874](CVE-2024/CVE-2024-468xx/CVE-2024-46874.json) (`2024-12-06T19:15:12.450`)
- [CVE-2024-47146](CVE-2024/CVE-2024-471xx/CVE-2024-47146.json) (`2024-12-06T19:15:12.603`)
- [CVE-2024-47791](CVE-2024/CVE-2024-477xx/CVE-2024-47791.json) (`2024-12-06T19:15:12.750`)
- [CVE-2024-48874](CVE-2024/CVE-2024-488xx/CVE-2024-48874.json) (`2024-12-06T19:15:12.933`)
- [CVE-2024-52324](CVE-2024/CVE-2024-523xx/CVE-2024-52324.json) (`2024-12-06T19:15:13.083`)
### CVEs modified in the last Commit
Recently modified CVEs: `43`
Recently modified CVEs: `64`
- [CVE-2023-29709](CVE-2023/CVE-2023-297xx/CVE-2023-29709.json) (`2024-12-06T17:15:07.473`)
- [CVE-2023-33289](CVE-2023/CVE-2023-332xx/CVE-2023-33289.json) (`2024-12-06T18:15:20.427`)
- [CVE-2023-33405](CVE-2023/CVE-2023-334xx/CVE-2023-33405.json) (`2024-12-06T18:15:21.373`)
- [CVE-2023-33591](CVE-2023/CVE-2023-335xx/CVE-2023-33591.json) (`2024-12-06T18:15:21.610`)
- [CVE-2023-33725](CVE-2023/CVE-2023-337xx/CVE-2023-33725.json) (`2024-12-06T18:15:21.850`)
- [CVE-2024-10905](CVE-2024/CVE-2024-109xx/CVE-2024-10905.json) (`2024-12-06T18:15:22.207`)
- [CVE-2024-11158](CVE-2024/CVE-2024-111xx/CVE-2024-11158.json) (`2024-12-06T17:15:07.970`)
- [CVE-2024-11680](CVE-2024/CVE-2024-116xx/CVE-2024-11680.json) (`2024-12-06T18:42:17.390`)
- [CVE-2024-21070](CVE-2024/CVE-2024-210xx/CVE-2024-21070.json) (`2024-12-06T17:08:50.733`)
- [CVE-2024-21093](CVE-2024/CVE-2024-210xx/CVE-2024-21093.json) (`2024-12-06T17:03:13.813`)
- [CVE-2024-26164](CVE-2024/CVE-2024-261xx/CVE-2024-26164.json) (`2024-12-06T17:14:53.333`)
- [CVE-2024-26166](CVE-2024/CVE-2024-261xx/CVE-2024-26166.json) (`2024-12-06T17:13:11.063`)
- [CVE-2024-26198](CVE-2024/CVE-2024-261xx/CVE-2024-26198.json) (`2024-12-06T17:12:07.640`)
- [CVE-2024-26199](CVE-2024/CVE-2024-261xx/CVE-2024-26199.json) (`2024-12-06T17:12:27.343`)
- [CVE-2024-26201](CVE-2024/CVE-2024-262xx/CVE-2024-26201.json) (`2024-12-06T17:02:30.493`)
- [CVE-2024-27223](CVE-2024/CVE-2024-272xx/CVE-2024-27223.json) (`2024-12-06T18:15:24.070`)
- [CVE-2024-27234](CVE-2024/CVE-2024-272xx/CVE-2024-27234.json) (`2024-12-06T18:15:24.243`)
- [CVE-2024-38344](CVE-2024/CVE-2024-383xx/CVE-2024-38344.json) (`2024-12-06T18:15:24.490`)
- [CVE-2024-4456](CVE-2024/CVE-2024-44xx/CVE-2024-4456.json) (`2024-12-06T18:15:25.450`)
- [CVE-2024-50677](CVE-2024/CVE-2024-506xx/CVE-2024-50677.json) (`2024-12-06T17:15:10.180`)
- [CVE-2024-51378](CVE-2024/CVE-2024-513xx/CVE-2024-51378.json) (`2024-12-06T18:17:17.377`)
- [CVE-2024-53907](CVE-2024/CVE-2024-539xx/CVE-2024-53907.json) (`2024-12-06T17:15:12.007`)
- [CVE-2024-53908](CVE-2024/CVE-2024-539xx/CVE-2024-53908.json) (`2024-12-06T17:15:12.350`)
- [CVE-2024-54750](CVE-2024/CVE-2024-547xx/CVE-2024-54750.json) (`2024-12-06T17:15:13.300`)
- [CVE-2024-6601](CVE-2024/CVE-2024-66xx/CVE-2024-6601.json) (`2024-12-06T18:15:27.460`)
- [CVE-2024-21081](CVE-2024/CVE-2024-210xx/CVE-2024-21081.json) (`2024-12-06T20:59:06.987`)
- [CVE-2024-21086](CVE-2024/CVE-2024-210xx/CVE-2024-21086.json) (`2024-12-06T20:58:09.767`)
- [CVE-2024-21101](CVE-2024/CVE-2024-211xx/CVE-2024-21101.json) (`2024-12-06T20:41:55.317`)
- [CVE-2024-21102](CVE-2024/CVE-2024-211xx/CVE-2024-21102.json) (`2024-12-06T20:40:44.093`)
- [CVE-2024-21103](CVE-2024/CVE-2024-211xx/CVE-2024-21103.json) (`2024-12-06T20:34:30.853`)
- [CVE-2024-21104](CVE-2024/CVE-2024-211xx/CVE-2024-21104.json) (`2024-12-06T20:33:01.633`)
- [CVE-2024-21118](CVE-2024/CVE-2024-211xx/CVE-2024-21118.json) (`2024-12-06T20:29:11.287`)
- [CVE-2024-21119](CVE-2024/CVE-2024-211xx/CVE-2024-21119.json) (`2024-12-06T20:26:42.563`)
- [CVE-2024-21492](CVE-2024/CVE-2024-214xx/CVE-2024-21492.json) (`2024-12-06T19:15:11.520`)
- [CVE-2024-28149](CVE-2024/CVE-2024-281xx/CVE-2024-28149.json) (`2024-12-06T19:15:11.663`)
- [CVE-2024-30963](CVE-2024/CVE-2024-309xx/CVE-2024-30963.json) (`2024-12-06T20:15:24.757`)
- [CVE-2024-30964](CVE-2024/CVE-2024-309xx/CVE-2024-30964.json) (`2024-12-06T20:15:24.937`)
- [CVE-2024-37476](CVE-2024/CVE-2024-374xx/CVE-2024-37476.json) (`2024-12-06T20:15:25.137`)
- [CVE-2024-37860](CVE-2024/CVE-2024-378xx/CVE-2024-37860.json) (`2024-12-06T20:15:25.297`)
- [CVE-2024-37861](CVE-2024/CVE-2024-378xx/CVE-2024-37861.json) (`2024-12-06T20:15:25.467`)
- [CVE-2024-37862](CVE-2024/CVE-2024-378xx/CVE-2024-37862.json) (`2024-12-06T20:15:25.640`)
- [CVE-2024-37863](CVE-2024/CVE-2024-378xx/CVE-2024-37863.json) (`2024-12-06T20:15:25.810`)
- [CVE-2024-38832](CVE-2024/CVE-2024-388xx/CVE-2024-38832.json) (`2024-12-06T20:15:25.977`)
- [CVE-2024-38833](CVE-2024/CVE-2024-388xx/CVE-2024-38833.json) (`2024-12-06T20:15:26.097`)
- [CVE-2024-38834](CVE-2024/CVE-2024-388xx/CVE-2024-38834.json) (`2024-12-06T20:15:26.207`)
- [CVE-2024-38910](CVE-2024/CVE-2024-389xx/CVE-2024-38910.json) (`2024-12-06T20:15:26.337`)
- [CVE-2024-38920](CVE-2024/CVE-2024-389xx/CVE-2024-38920.json) (`2024-12-06T19:15:11.923`)
- [CVE-2024-44123](CVE-2024/CVE-2024-441xx/CVE-2024-44123.json) (`2024-12-06T19:15:12.117`)
- [CVE-2024-45204](CVE-2024/CVE-2024-452xx/CVE-2024-45204.json) (`2024-12-06T20:15:26.653`)
- [CVE-2024-53672](CVE-2024/CVE-2024-536xx/CVE-2024-53672.json) (`2024-12-06T20:15:27.883`)
## Download and Usage

View File

@ -97059,7 +97059,7 @@ CVE-2017-13304,0,0,bc01bf9619a2ed9e9969de4c65bf442a5fec6030e332a0ad95cf9c9671c48
CVE-2017-13305,0,0,2acce61b5781c64283da81f61da07d2eadea1d7bd22b7b38dbaaa4a20fc64699,2019-10-03T00:03:26.223000
CVE-2017-13306,0,0,423f74da95b3c89ac4494a0b8267dc23743708bc4de0a0cc92f3a3c6e2cdbb52,2019-10-03T00:03:26.223000
CVE-2017-13307,0,0,e83357c9230d3ea5a0100316af468cc9cffb10b590fc6474a2652e4724796965,2019-10-03T00:03:26.223000
CVE-2017-13308,0,1,8c01ba1d7cf1c49804466aa5eedce51e7f615e69b26861407bb675fe13f6ca51,2024-12-06T17:15:05.390000
CVE-2017-13308,0,0,8c01ba1d7cf1c49804466aa5eedce51e7f615e69b26861407bb675fe13f6ca51,2024-12-06T17:15:05.390000
CVE-2017-13309,0,0,491cd9f7b41a6bb9dabc0009989d6e787b291b96b83a3c335f7bb247a54fd391,2024-11-18T17:11:56.587000
CVE-2017-1331,0,0,fbfa6b4058c65afc0dadcb6abf2b300b566ab5bd4820053710fa36c8414eaba4,2017-08-09T12:43:53.857000
CVE-2017-13310,0,0,7f209153c492fb41fd760d206817d716da1e9c7c4982d2ed8ff14992dd5fbbb0,2024-11-19T17:35:00.887000
@ -126942,10 +126942,10 @@ CVE-2018-9377,0,0,e4a0a8bd1ac9734ae148f92ac66c4e7d1d997837e82ad8c47cc9f88531e107
CVE-2018-9380,0,0,e6fbe63ca9b9f94eed7d3113363726fcbc9fd32f362f8de02b396f07c6dcdef2,2024-12-02T22:15:08.237000
CVE-2018-9381,0,0,6d23302b8a97082a76241d451afb14bf577899eb10a0c0816bc7882dabaf95b5,2024-12-02T22:15:08.493000
CVE-2018-9385,0,0,a04751693f742cd9abca42cb6fa43b673fbcc24bbf305f54b6cb4b8b3d812bd4,2018-12-12T21:37:19.207000
CVE-2018-9386,0,1,2de4337d6884f54e0248984bf28f45bbf3362c0a4bac79ee77b29a0e3b893c2a,2024-12-06T17:15:05.680000
CVE-2018-9388,0,1,8dd94bb70a1039b8e07f52412becf57d66107242cbcb3dddee02abb0cfaa5686,2024-12-06T17:15:06.080000
CVE-2018-9390,0,1,06ab51438e1f675865b14265cdeec47660bced81d1934a7e27b5a76bf466eb97,2024-12-06T17:15:06.543000
CVE-2018-9391,0,1,2a1f31b287467f59c30feede383d25049d6e25da45cde1e367bd77d6f7fe9d75,2024-12-06T17:15:06.967000
CVE-2018-9386,0,0,2de4337d6884f54e0248984bf28f45bbf3362c0a4bac79ee77b29a0e3b893c2a,2024-12-06T17:15:05.680000
CVE-2018-9388,0,0,8dd94bb70a1039b8e07f52412becf57d66107242cbcb3dddee02abb0cfaa5686,2024-12-06T17:15:06.080000
CVE-2018-9390,0,0,06ab51438e1f675865b14265cdeec47660bced81d1934a7e27b5a76bf466eb97,2024-12-06T17:15:06.543000
CVE-2018-9391,0,0,2a1f31b287467f59c30feede383d25049d6e25da45cde1e367bd77d6f7fe9d75,2024-12-06T17:15:06.967000
CVE-2018-9392,0,0,c32dba2c2a98106922261098b9038433eb88bfdab15b7f8a7fa0f36bbfd4c11c,2024-12-05T19:15:05.197000
CVE-2018-9393,0,0,df4b64b8c51b0367567eab39ff6262d599db50bab473af04af8577fd63acfbdb,2024-12-05T19:15:06.160000
CVE-2018-9394,0,0,48a2d54d752724661cb58ac865254bb340812823a8ae32c423c07cbd5c941282,2024-12-05T18:15:19.417000
@ -159487,14 +159487,14 @@ CVE-2020-36774,0,0,63d2af6e1f77f69c592918f611b2831429216f8341a37ec3fc1c1670cc5f4
CVE-2020-36775,0,0,57f8b1cfccf2aab26d73dffa8165b7564de4aa3bb3113b44ae141b4cc4ecf246,2024-04-17T17:32:18.957000
CVE-2020-36776,0,0,95448c982f03576592f62bc1c771f3ada9b048de048bbc46661ad5c33a037c87,2024-04-10T19:34:31.410000
CVE-2020-36777,0,0,049b8813e9bcefe32870c3cf66fa0cd20fdf6be2bd1a3ff587d83ec743eb7201,2024-04-10T19:32:09.210000
CVE-2020-36778,0,1,14964463b56c3f46cf0d7e1681e081ed056ba6255f767b3c58eee346e18635d2,2024-12-06T17:56:05.877000
CVE-2020-36778,0,0,14964463b56c3f46cf0d7e1681e081ed056ba6255f767b3c58eee346e18635d2,2024-12-06T17:56:05.877000
CVE-2020-36779,0,0,b340ce85ed5e7b477f5fb274c0fd8555d5b7508db3f0bf7a88d4f3d3c6028939,2024-12-06T16:14:26.157000
CVE-2020-3678,0,0,06bc52800dd28cf5aa680d8cd1fedbae3c530842e5dcee33fc1506714969812f,2024-11-21T05:31:33.650000
CVE-2020-36780,0,0,56476c1e5cf8e661b5c2e9c8f9aff0a5c950781a316ab7251e767dfc2013dbef,2024-11-06T15:35:01.093000
CVE-2020-36781,0,0,002d82cc7803a268ecca16f3d91e0bf2d619360efb63b1688924453870cba627,2024-12-06T16:19:35.777000
CVE-2020-36782,0,1,7cfa043aa5ddbfe9fc75b67a2d014bf83a9b10b337589bf1682cc032ffbd860c,2024-12-06T18:02:53.493000
CVE-2020-36783,0,1,e286124c61448f7fd51b57f763b347528856a4a1ca56c75478cf046c0bba56c6,2024-12-06T17:37:43.990000
CVE-2020-36784,0,1,14269507ec793103ba5d47be84ea6c5627160c5f1dd2329a2c107e8028183ee0,2024-12-06T17:37:59.973000
CVE-2020-36782,0,0,7cfa043aa5ddbfe9fc75b67a2d014bf83a9b10b337589bf1682cc032ffbd860c,2024-12-06T18:02:53.493000
CVE-2020-36783,0,0,e286124c61448f7fd51b57f763b347528856a4a1ca56c75478cf046c0bba56c6,2024-12-06T17:37:43.990000
CVE-2020-36784,0,0,14269507ec793103ba5d47be84ea6c5627160c5f1dd2329a2c107e8028183ee0,2024-12-06T17:37:59.973000
CVE-2020-36785,0,0,8abd1aefac894fa31fb9663b853815059d0d596e701ab17d0204178beba874a6,2024-12-06T15:59:06.807000
CVE-2020-36786,0,0,0ea15290adb4074d2af998942543822278a7d5c85d7cd142f1bf61d58786e330,2024-12-06T15:59:30.400000
CVE-2020-36787,0,0,a57c8d42032470b06da5d1ceb3e54a3215bc5848719ed8447fde53e2cfc5ba16,2024-02-28T14:06:45.783000
@ -187095,8 +187095,8 @@ CVE-2021-46951,0,0,885c61f9e7da07612d949faded4ceb8afc94f412e675d52bf4d2b2ee3f013
CVE-2021-46952,0,0,9b0db874ec7e3850deaad8426e3b7d3cc0b498036f5c3e78f7383423f408a42e,2024-04-10T20:15:42.153000
CVE-2021-46953,0,0,5b8b163a10423fb772acc2c04e5217817b2f0ad2a781f96947cdc6f9504f8984,2024-04-10T20:15:31.827000
CVE-2021-46954,0,0,cf24145985e4cf1a2de3f03a17cf527c7a09fafaf7801ad9095a1e0bf6cd4e8a,2024-04-10T20:15:05.997000
CVE-2021-46955,0,1,fba2bdea5b92fd2bb608ef13865c7c716d690c748a48c0107fec8f1770dcc976,2024-12-06T17:53:52.043000
CVE-2021-46956,0,1,76c2d7d149a52a4365576d3df8b3754fee5701e4ff7f9a4a2a36c2118984f44d,2024-12-06T17:54:34.117000
CVE-2021-46955,0,0,fba2bdea5b92fd2bb608ef13865c7c716d690c748a48c0107fec8f1770dcc976,2024-12-06T17:53:52.043000
CVE-2021-46956,0,0,76c2d7d149a52a4365576d3df8b3754fee5701e4ff7f9a4a2a36c2118984f44d,2024-12-06T17:54:34.117000
CVE-2021-46957,0,0,0d48587a88ed301685dd5f0286c21432ba833503a137058bce96dfbdaaff8c9f,2024-11-01T15:35:02.377000
CVE-2021-46958,0,0,8f4bb69aad95baa93dc3483f4699d0fa1c7aebd01adedae1bac82d25c41803fa,2024-02-28T14:06:45.783000
CVE-2021-46959,0,0,901fa35a755711bca4c53d9b7deb16151fa1a83386424061f86cbb4d6225ca26,2024-03-01T14:04:26.010000
@ -187106,8 +187106,8 @@ CVE-2021-46962,0,0,89fb9feaa4e3312c65768c88cdc2a5ba734772883375bdffc0c2e21b4afde
CVE-2021-46963,0,0,c5518118a25465b7b9f1602f01c842c3730abbded9ff61b413f7cc545a77d1a0,2024-02-28T14:06:45.783000
CVE-2021-46964,0,0,6b47a45a095abf8dd4c42960fe12d6e359943058d867ffd2013642b6a9dce1db,2024-02-28T14:06:45.783000
CVE-2021-46965,0,0,411d9233d469c88e0a9457e81b9f5b6e2923f544f1548be17957c22aa30cb174,2024-02-28T14:06:45.783000
CVE-2021-46966,0,1,97fed527abc8c179af4ef0cded9357d2e989b82f53f8292e5a23e469eb8ca4e1,2024-12-06T17:55:15.673000
CVE-2021-46967,0,1,0d10ab6c120f6067de586d730b5ff32613097e1f26ae10084ef35df2124ba25e,2024-12-06T17:55:35.723000
CVE-2021-46966,0,0,97fed527abc8c179af4ef0cded9357d2e989b82f53f8292e5a23e469eb8ca4e1,2024-12-06T17:55:15.673000
CVE-2021-46967,0,0,0d10ab6c120f6067de586d730b5ff32613097e1f26ae10084ef35df2124ba25e,2024-12-06T17:55:35.723000
CVE-2021-46968,0,0,255805be10bb7d9d0cdf6929c08ddd7f925de0b242ac255739a7897d01d0ee05,2024-02-28T14:06:45.783000
CVE-2021-46969,0,0,2442b4d168529e6235ad42a19423413c8061f66da3e7a2ea9cdf5ed9cb2e6e27,2024-02-28T14:06:45.783000
CVE-2021-46970,0,0,38ad2dfd3a74fef99034005d7aee5aba8eeae3c676148951accab60b691e8b45,2024-02-28T14:06:45.783000
@ -187164,13 +187164,13 @@ CVE-2021-47020,0,0,3f1513794f9fa6f6d1fa30ced2f58e669fedd6326cd100ce1e37366bca0a5
CVE-2021-47021,0,0,9b358774567fe50179d1f4db93b99a7a3238ac5b927480afdde61a0f7943b664,2024-02-28T14:06:45.783000
CVE-2021-47022,0,0,59be32a3f1a08166e4014ec59d4ebdb524edccbcc930be81506830c6a2855d58,2024-02-28T14:06:45.783000
CVE-2021-47023,0,0,23a1e68a708386cf0880da14cb600d90b0c0f8930ba33d316ee3667c1f90d249,2024-08-01T13:42:29.830000
CVE-2021-47024,0,0,254caea9e85f7939a88cc79b40ef6f81dc077ebaa4e7954e567e3475016cca7c,2024-02-28T14:06:45.783000
CVE-2021-47025,0,1,ee50fde26af33349414069695c5a3e83e5c39b9aeb74c1620ab0889c7d727001,2024-12-06T18:52:52.237000
CVE-2021-47024,0,1,f0888732418df50b2419b52313140681b7bbcdf5356692b89bed55cf02a6c034,2024-12-06T20:53:23.077000
CVE-2021-47025,0,0,ee50fde26af33349414069695c5a3e83e5c39b9aeb74c1620ab0889c7d727001,2024-12-06T18:52:52.237000
CVE-2021-47026,0,0,ee5b52f37088ac43beaa8f41447f70e6b8f156f688f30dd24f1ca587f6d88347,2024-02-28T14:06:45.783000
CVE-2021-47027,0,0,5ae95187a3f142985bf68e0b19617e7b7cea4508ab4f344a46a3c5581a75abc5,2024-02-28T14:06:45.783000
CVE-2021-47028,0,0,4094814a15b845e8f62ee7bfdc0f4cb61ef11ede0d59d3240e7e870e27c18875,2024-02-28T14:06:45.783000
CVE-2021-47028,0,1,8b21cedaac150f13efb7734c2962600b0f8f30d0128d30a32504ba31acf1032f,2024-12-06T20:53:43.170000
CVE-2021-47029,0,0,f65afde344b0d591ca46fc7d8f8e7d151f0737bf38a22726bad577d0cd41255e,2024-02-28T14:06:45.783000
CVE-2021-47030,0,0,191e68acbdbd1c1f0f225e5ebf05b8248fc07d397602f67829f4d47b2c1e83e0,2024-02-28T14:06:45.783000
CVE-2021-47030,0,1,ecad03b4b788e4b50bb95d7a117907eea8bbaefdfbfb5b26d128ef6a75b29a56,2024-12-06T20:54:28.907000
CVE-2021-47031,0,0,df0b02643b6f00619550daeb59462d20c5767225e67e1249b0fdbc7364fb677e,2024-11-13T22:35:02.160000
CVE-2021-47032,0,0,24a70d7664e17ea4744cee3f46b43c182cfcb14b26079b40f7a2c10eb08f11cf,2024-02-28T14:06:45.783000
CVE-2021-47033,0,0,3630460be23c3df4a748886cc7ac2b22d5ad2abfbada15c1d17342058100d2d0,2024-02-28T14:06:45.783000
@ -187178,14 +187178,14 @@ CVE-2021-47034,0,0,cf15843bae82d7cccdf398ec779c95ca86236c9ecba65ead7dc7f841a43da
CVE-2021-47035,0,0,b793e624ff6ee2d195e693bb86587277505f6d3bfc055ec15f6dad7dec3a75f4,2024-02-28T14:06:45.783000
CVE-2021-47036,0,0,f365ffd615ad1aa6b98bd0fe1f9057ad1fcbaec31632cf95f465c6a392a4c45a,2024-02-28T14:06:45.783000
CVE-2021-47037,0,0,846334603095ecf75466453c0700d4a8384cc0d9fdb90f70529b2ee3448a49c8,2024-02-28T14:06:45.783000
CVE-2021-47038,0,0,025e67360a9f572b4902ace2dee7cbbf7fb70e9cf24fbb95db8e519abfa48a50,2024-02-28T14:06:45.783000
CVE-2021-47038,0,1,173970a6c5d44bb723efd6b764e694ea73860ece1a8d9e4523c1041c196f5023,2024-12-06T20:56:10.230000
CVE-2021-47039,0,0,4f42838382af37c13fc22878afd6cfca1df4937c423a67f85fd12850bd812680,2024-02-28T14:06:45.783000
CVE-2021-47040,0,0,84ff3bafb4df71a01a584cf0d1216a5dc4f656f10350ce702f9885829de3d270,2024-02-28T14:06:45.783000
CVE-2021-47041,0,1,6a0f035255b6b042a61f23563d301f0db881f6bc2a7f6d666be6fcd81e6f0e46,2024-12-06T18:41:12.523000
CVE-2021-47042,0,1,f62e43eb2094bfd4929dbf432cc8f4f5e957ec60be7a215df23a5a27bc84c40f,2024-12-06T18:41:24.943000
CVE-2021-47041,0,0,6a0f035255b6b042a61f23563d301f0db881f6bc2a7f6d666be6fcd81e6f0e46,2024-12-06T18:41:12.523000
CVE-2021-47042,0,0,f62e43eb2094bfd4929dbf432cc8f4f5e957ec60be7a215df23a5a27bc84c40f,2024-12-06T18:41:24.943000
CVE-2021-47043,0,0,a30aae0e86cae1f5c5dc4f207b2e3c34cd30973ca644656944c78b3bb7967ca8,2024-02-28T14:06:45.783000
CVE-2021-47044,0,0,1e5d1e4d770c8ee1cc95c9eb8184f91bbfbe0dbc488a180598dbb2e7b19a3d6e,2024-11-04T17:35:01.323000
CVE-2021-47045,0,1,e12b71e92d92cceb4b5bf1346393f1a4c79e1d92869176ced4bfae375468f342,2024-12-06T18:41:37.933000
CVE-2021-47045,0,0,e12b71e92d92cceb4b5bf1346393f1a4c79e1d92869176ced4bfae375468f342,2024-12-06T18:41:37.933000
CVE-2021-47046,0,0,c6e0c7a9d3ccf4567bd445327f70a7b7d6b7a1f8e55d897a4862451a7c7d41ee,2024-02-28T14:06:45.783000
CVE-2021-47047,0,0,a5be49f7ba267bddcbda30bf54b32c88976252fbacf1f803efbd8e0bfc5c96bc,2024-02-28T14:06:45.783000
CVE-2021-47048,0,0,2f7c31fe4dff982a3ddd5f4b873e8a24d48bc4269849eaece40abf460424cc75,2024-02-28T14:06:45.783000
@ -195078,7 +195078,7 @@ CVE-2022-2588,0,0,1834e0ebe2937bbf3392a2abb9a6f9314526d56a18e3c4779029ab2ac2b6e2
CVE-2022-25880,0,0,a1abc59cdded501d3b98383e5c308e69602d3cc70fcaeaab56fa3086a9f505c4,2024-11-21T06:53:09.350000
CVE-2022-25881,0,0,0113241b6a0219133c886d52582facad96711330aa8d36f38f09b4118065ac9a,2023-11-07T03:44:51.800000
CVE-2022-25882,0,0,cc2e9e64fce1daa6e7128976be7a9dd9d17b8df7c338f770ad33ea9d283c4847,2023-11-07T03:44:51.890000
CVE-2022-25883,0,1,6f83b2ca5c014fe212d0f88d9bc2235d7bef4288d21b4a6c7e892fe7db010bb1,2024-12-06T17:15:07.260000
CVE-2022-25883,0,0,6f83b2ca5c014fe212d0f88d9bc2235d7bef4288d21b4a6c7e892fe7db010bb1,2024-12-06T17:15:07.260000
CVE-2022-25885,0,0,ca141c60f6e0ab3b77d3ebf07c9947c4407b54626676108d5dab971ad74067fd,2022-11-01T19:20:57.707000
CVE-2022-25887,0,0,9ceac36e1e21f6ecffab65b62fd2716359ab40185c0d36108bc68a140791b861,2023-08-08T14:22:24.967000
CVE-2022-25888,0,0,098b75af78358995ac297cf351f0e81567a4cfa55560640d751294a738118a02,2022-08-25T20:34:47.787000
@ -208458,7 +208458,7 @@ CVE-2022-42789,0,0,03efa2f46df4deccbf1c9e4fc122ce2c986cfe6182db03aa3831ca1df357b
CVE-2022-4279,0,0,8270270e2257c345d6adf2c5f40d126a5e88b83e47f09ee81e618980c78b0bce,2024-01-25T21:44:33.213000
CVE-2022-42790,0,0,cb9f49febaf251655ef30e5737e3b422080df3e8a0b79e39c7089a7b9ce2b4a0,2022-11-02T19:31:23.297000
CVE-2022-42791,0,0,85640d7829944477756d04c7b9f6b8e84dd82151e5dbcf182e15ff35eec91092,2022-12-08T22:51:07.050000
CVE-2022-42792,0,0,f017129ede981c32fa2478f03a982f1061e45a7b3771e6c9b9c6419ce337f2e2,2023-06-27T10:56:49.913000
CVE-2022-42792,0,1,8730704205a74243a98a75c0c0325dfdb773cdb132a61f3727c226dc82b11dc7,2024-12-06T19:15:08.603000
CVE-2022-42793,0,0,ed36b08eb7f427c5e16203ffee95e000af8b2f21196958f34896af43b11bcc9c,2023-08-08T14:22:24.967000
CVE-2022-42794,0,0,db538cb838099b9eb39900ea31331f5b8abdf5523ab3d3e25cea36c81faa2c0d,2023-11-07T03:53:34.837000
CVE-2022-42795,0,0,5f0e4fbee35897a20a336defc4cfd37daef0953e9f411b0723b0d71b49bdde9f,2022-11-02T19:41:24.537000
@ -208474,7 +208474,7 @@ CVE-2022-42803,0,0,781f563e244a3e4e2d62982bfe99f09fab3a1c3043926fe17c3f307bd5b0e
CVE-2022-42804,0,0,7ad07265a1dbd23848c67cb5f7ae35a783b7bcacb37b71cfb0cfce76be4518db,2023-11-07T03:53:35.837000
CVE-2022-42805,0,0,e78e445f0e74dc0271e0209954c0bbcb08e2f9b2d257e4bef35bf8aab90be7ae,2022-12-20T02:27:31.080000
CVE-2022-42806,0,0,f4b942b79b06ee0e944efde3606b366edf440e1b6793a8029cace6032ac20317,2022-11-03T03:55:02.817000
CVE-2022-42807,0,0,f188c199d0a753440360126a362cb4f5682030072f68347901954058f278c659,2023-06-30T07:11:19.047000
CVE-2022-42807,0,1,a29a0d1e49344c8e051603e50443d8ffa0163fe130ddb3d62de566d6cabd8f27,2024-12-06T19:15:09.130000
CVE-2022-42808,0,0,c04cda05d3ca84b486fd98e6b627470c9259df81b3a289b2487ccf244f490bbd,2022-11-03T03:54:54.173000
CVE-2022-42809,0,0,5f46dd189e9144033300587f9c0ff82d6c9d3d2125dcacac08ffd6843a17a993,2022-11-03T03:54:36.043000
CVE-2022-4281,0,0,f34fc2e3e03d4e07e94d2cb6beb7b7c9e49189bef1b47608cae8d8447481c87e,2024-01-25T20:23:56.527000
@ -212483,7 +212483,7 @@ CVE-2022-48618,0,0,a6eef9a5f4b698c3f9f4220d3055015e15fce5a5eb3c7a14f2b80748deaf5
CVE-2022-48619,0,0,f26c39736beb7aa7b0647551e799c08b4224ce3618497e170167759683b4f6cb,2024-09-03T19:35:01.357000
CVE-2022-4862,0,0,2553413418f6ad24271b84c4b6265dbfaea53531b172d691e897d8db042ae05f,2024-08-28T11:15:13.723000
CVE-2022-48620,0,0,5698c281f8e8068516c8dfe700ee9a98bc0bfd9312d73b253920c8e72d6c9959,2024-03-23T03:15:08.797000
CVE-2022-48621,0,0,1cd5ad66125265477c8dc07522592260d4eec4c99a5ef37987104225c1fc205f,2024-02-20T19:50:53.960000
CVE-2022-48621,0,1,40feab1e435c4021cf7362814535c173787ad0d26ce11ef534b2e34829a57bcc,2024-12-06T20:06:07.740000
CVE-2022-48622,0,0,8603f3223b9efff6b371bdc90b7040dc59471154fa80a88ca2d72860d21139c6,2024-08-26T20:35:01.673000
CVE-2022-48623,0,0,192645b132d5aad78dc224ae0449f296b9736e7b254c3ebd6e8b5afc838e7d11,2024-10-30T14:20:47.597000
CVE-2022-48624,0,0,ea5513f2cbde0a9cdff3d197db7e4adb0a5ac7da8f42a8c9f8ae3134bd040db0,2024-06-10T18:15:19.857000
@ -218513,7 +218513,7 @@ CVE-2023-24253,0,0,672423c6c21b56d4518b03ad6ec99ecddbc68f4e809fa898c2b93b3798bbe
CVE-2023-24256,0,0,d15bb977ff92ba9304d9f4b88c75ea8f0fbc7a255ac878c8baf72dd0365165c6,2023-07-12T13:52:17.237000
CVE-2023-24258,0,0,031210eaed0088023619c1be133e28cf4104080a72198fb41c66f285e82dadc1,2023-03-24T23:15:06.783000
CVE-2023-2426,0,0,e015b0189774c34c173343a57b07a1ffdea955ca3fe267a0e971f2a58e9dd98c,2023-12-23T07:15:49.433000
CVE-2023-24261,0,0,e05b5ec80e8b9fff939968d722ca592031dae542f121d72d75c5416581a402d0,2023-06-28T15:57:40.363000
CVE-2023-24261,0,1,1df1249714b381fb797a02b61181770e71af0c6f3534b72a552b166bc02cf9fa,2024-12-06T20:15:20.260000
CVE-2023-24269,0,0,15e696381c6b0900b97c954e219385f383aadbf737192014cea4c486e06fcee9,2023-05-08T18:00:51.423000
CVE-2023-2427,0,0,22e5ec739045297b6413c9c74b1be42b27fcfac9d4fc7fdd282fbb7e348b1a34,2023-05-10T02:19:43.877000
CVE-2023-24276,0,0,b68b266c7c5f7d661d21585a7d1c3b48d0175c9ab3eb2fd45cc77214b8f4fd5c,2023-02-13T17:24:12.097000
@ -219409,7 +219409,7 @@ CVE-2023-25431,0,0,5aff9066539e5c52768217ae1a8c81835ca0814a5d9d479531843c1983531
CVE-2023-25432,0,0,5b71a9262b1b2566f039fe67d5b11cddf99944ff4dc3f5d7df5d27651a8d28d0,2023-03-06T19:46:49.457000
CVE-2023-25433,0,0,9f9cda66937e1900d118c7d9302a4fbe6c2609aebde0c4ef9c8c0a8fa5502bc4,2023-08-01T02:15:09.910000
CVE-2023-25434,0,0,6164cd59a2032585c65cd40ea23d3190510f57e1b70538f1f3d06a9755f30b67,2023-06-23T16:25:42.077000
CVE-2023-25435,0,0,272466a786e893f01cff2295b567ee0860afa522d75f17effaffab0c00a25c8d,2023-06-28T18:51:37.170000
CVE-2023-25435,0,1,e64f125b4f4c609726ddb2def3a1414ba08ac5b462994bcc312950eb8396d96b,2024-12-06T20:15:20.487000
CVE-2023-25437,0,0,d0173ee555578f84f8c8c71521a20ea7edd19f2f8786edf6590a87479700697b,2023-05-05T18:10:34.587000
CVE-2023-25438,0,0,58bc5dbd78cda15c937174bc0f33abe3377c568bb8999f17862ac17978198b7c,2023-05-10T15:37:47.167000
CVE-2023-25439,0,0,ae5f1cb014a8d24a652827f80cb0b30508e61149a241e2de0a347bbc48215fd3,2023-06-01T01:26:38.750000
@ -220817,7 +220817,7 @@ CVE-2023-2724,0,0,191167da54ef77767ea9e9c0ad85e636eb0bdb3bae693e465055392eac5575
CVE-2023-27240,0,0,dd1a332e9f5736367bbc3ab6210c0dc1613780b8322c71d3fe5909f124506172,2023-03-21T15:04:28.480000
CVE-2023-27241,0,0,0be9807fb01f06b81a50d96e45c1f3794a83c594dc4e37c7838913982ad385a3,2023-03-31T19:06:17.193000
CVE-2023-27242,0,0,12f8d08d97266dc76f5fd05c1505ed206b01d930fe4d92100304b78c8f159032,2024-11-26T20:29:57.070000
CVE-2023-27243,0,0,fbc1114feccec00fd900c27321751a7daa5190f9519421856209ea3904aaf2d0,2023-06-28T13:50:19.303000
CVE-2023-27243,0,1,0a5e9fabc8e5c776a407cf76fe96bd3cb6fbfd19bc31b3abd49fc6f540299215,2024-12-06T19:15:09.553000
CVE-2023-27245,0,0,25f306d33e464404532acde29fabe136caa9c3888170367f3a43a0855be9a0f3,2023-03-31T19:00:52.530000
CVE-2023-27246,0,0,e25c4f462a98f9ff2adce9c1b230cb9922a8a6e023c904a8768146e008cb47d8,2023-04-04T01:16:40.757000
CVE-2023-27247,0,0,93d96b9474415578fed1b96513910268c8bc905472e44180535c4be5efae04b7,2023-04-12T15:15:12.167000
@ -222981,8 +222981,8 @@ CVE-2023-29693,0,0,8b7002f93d760e13d02c0d96cbae6f19f590d7068fec6ce8cdbb4fd3b371b
CVE-2023-29696,0,0,ad47b1017ee3882dda5badb29f8d466021d82ec50670cee3885ecbf5ff0f9715,2023-05-12T19:39:04.933000
CVE-2023-2970,0,0,2b7020bb6c703932449eb5e20f78853da80702e98d8c6e97d9f41d55e7f91662,2024-05-17T02:23:24.100000
CVE-2023-29707,0,0,ade6d9145c8a6668f1be4e824cb2ec45ddf263f919b00bb8b1efeec9e5cd74a5,2023-06-30T14:03:49.057000
CVE-2023-29708,0,0,2ef629bbba32361455e83eeb77c74c9941283b0b7802b7d5259db5da833e264e,2023-06-30T15:36:24.177000
CVE-2023-29709,0,1,1919d1c002a9f96ee0c8c1546cfa07ff60386e39621ffac1bbf1b005f52a1602,2024-12-06T17:15:07.473000
CVE-2023-29708,0,1,80acc91b8ee5fcbbe3c17d679013a51beda91f56ef3302baa2feb6d2bf7e458f,2024-12-06T20:15:21.690000
CVE-2023-29709,0,0,1919d1c002a9f96ee0c8c1546cfa07ff60386e39621ffac1bbf1b005f52a1602,2024-12-06T17:15:07.473000
CVE-2023-2971,0,0,09c2688d8062b1336023fa5f5864b213c7e8b49cb91b2f58bd689f1e380ea4b7,2023-08-24T20:19:37.060000
CVE-2023-29711,0,0,591e483f87a1474275bf4c86b6ff389de838a21b92775df763c50acbd1bb8690,2023-06-28T15:33:24.683000
CVE-2023-29712,0,0,0442ca4dd3114603002d9279c837146613d74a48dc43af16ea80dc6be3703cce,2023-06-16T17:30:06.723000
@ -225734,7 +225734,7 @@ CVE-2023-33284,0,0,0589d43d58da123dbb992aef99776f9f974bf20e01de87297815cc061ff5a
CVE-2023-33285,0,0,346fa2aebff3b26e0dce2415d6b55e51dd2abe88b804a2ec163b1e68a3cbbeee,2024-05-01T01:15:06.050000
CVE-2023-33287,0,0,70d0ca72b61a84f71b61b504883cf3dfcdbe7867b29c7e605eb36ca8df5fefa5,2023-06-08T01:26:27.440000
CVE-2023-33288,0,0,6e9d4ead552c3a0ba41f51c29d0a89ad413f57965894731b38b2e51f2a1622af,2023-11-07T04:14:48.630000
CVE-2023-33289,0,1,81b9a7ccdd1d1899e2a8c8e51b7a3bb58676862a80f4b492e1bfa278e066f540,2024-12-06T18:15:20.427000
CVE-2023-33289,0,0,81b9a7ccdd1d1899e2a8c8e51b7a3bb58676862a80f4b492e1bfa278e066f540,2024-12-06T18:15:20.427000
CVE-2023-3329,0,0,e05aa6061a406908952f348db2436efeb6f700b85bc2d9a87e8c493b2a301257,2024-10-29T18:35:02.750000
CVE-2023-33290,0,0,53581d74a4614054c7e40cff2a64bb5baac85c4040f2c05262fe63d04e3e8a25,2023-06-21T16:06:56.787000
CVE-2023-33291,0,0,e9db5278b53d838c69e38b9c0ca1574d9600832eb966ddf8cf2cff4260f638e5,2023-06-03T04:27:48.593000
@ -225816,7 +225816,7 @@ CVE-2023-3339,0,0,84e78bdfc21d46341e060aaa5cae0e080748624955cf675ab7f45da1c31225
CVE-2023-33394,0,0,affdaeb9897cd90454fadf5508a08d7ae84a4154c7e10c58b57a2b8ae652b0d4,2023-06-02T15:53:51.300000
CVE-2023-3340,0,0,941fbff9b1c2b2a87090788e4b7a5e476037645a41e3075aa6aa091e6248eab5,2024-05-17T02:27:26.817000
CVE-2023-33404,0,0,e12e1740fa125d846db04bf41c3659492b4af42e3ee2d6d989ac32253c1873cf,2023-07-05T17:35:32.947000
CVE-2023-33405,0,1,4ffc9ed6899a82157392aaa5892cf9cb52b24d07dacf07cc60fb49ff4b70c63c,2024-12-06T18:15:21.373000
CVE-2023-33405,0,0,4ffc9ed6899a82157392aaa5892cf9cb52b24d07dacf07cc60fb49ff4b70c63c,2024-12-06T18:15:21.373000
CVE-2023-33408,0,0,ddff4b81e4543af2f850a783f08a1b5650db56187a603fd6da7d175a65aaeafc,2023-06-09T22:47:21.147000
CVE-2023-33409,0,0,0b4fb4674ddd3cf0cb958d0bd999901b16254cac81180fd4f0811b3efcefda9f,2023-06-09T22:45:58.233000
CVE-2023-3341,0,0,2db05ae079a6425ca3a60c465b88b59e78fbf6b262931b9f7d8b6ea9bb17fcd6,2024-02-16T18:39:05.933000
@ -225906,7 +225906,7 @@ CVE-2023-3358,0,0,12e8757394b39f03915a68fdab7c57a08d2dd1a06e5f61eff9ec3fcd54fa48
CVE-2023-33580,0,0,b896a7d26da1c4a99df4635960a09e8061b54d8b1045b27b06cfff27cfdd8bba,2024-05-14T13:14:08.210000
CVE-2023-33584,0,0,a1f261b95d9793aa4dc94db58be1fdcb1978b62cb448302d23854fb5713a34a5,2024-08-01T13:43:52.090000
CVE-2023-3359,0,0,7f349026bdb808074eb0d523a222b94708cd05b6ac1c81f8f322d6dac7c8427f,2023-07-06T16:56:35.407000
CVE-2023-33591,0,1,ff986afc0316a9e18af2b67e930a74090c24895de581e443e4716ade8f2865dd,2024-12-06T18:15:21.610000
CVE-2023-33591,0,0,ff986afc0316a9e18af2b67e930a74090c24895de581e443e4716ade8f2865dd,2024-12-06T18:15:21.610000
CVE-2023-33592,0,0,7c4409bdba2c84ea3ca29a0763e3041ef6a52fd88856d82842982b89ccd016b7,2023-09-25T16:46:20.430000
CVE-2023-33595,0,0,19502ac295e04fcf8d557ffbd986db2151a6dec4a5cefc4c08841ec858587476,2023-12-08T17:03:53.690000
CVE-2023-33599,0,0,575cada57d7e314cc5d44e1e295a6e5cbc363afe311c25b006614746e112f4f0,2023-11-07T04:15:05.850000
@ -225983,7 +225983,7 @@ CVE-2023-33719,0,0,450b3f74d20642955335edfe77816a12bbb2c40a8b1ae774383693d5e2704
CVE-2023-3372,0,0,68d1098617404817f4e5350551062310b0a88bf9ec086161c7a68ef4d7de2adb,2024-01-22T20:46:01.150000
CVE-2023-33720,0,0,bd002ce00d39dff72e37668c224da664c636d40cf75dc74db05d99abe895de9a,2023-06-02T15:59:21.680000
CVE-2023-33722,0,0,0a85402b41d6693e594ee41084f5c08f016dc2f68dc25ae14def187250e40a11,2023-06-08T02:52:01.370000
CVE-2023-33725,0,1,501441fd8c0850dda7db2b5cbc4c50d99063609270f88ed8b5e1f563ad958019,2024-12-06T18:15:21.850000
CVE-2023-33725,0,0,501441fd8c0850dda7db2b5cbc4c50d99063609270f88ed8b5e1f563ad958019,2024-12-06T18:15:21.850000
CVE-2023-3373,0,0,3ae2b2a541f3a9d4488c14796246eb0b42ba0bc51e411beeb51c315f04cdb0d2,2023-08-10T14:59:52.507000
CVE-2023-33730,0,0,4b4bc5fcfc855f4596b2c9d258e91b15fd87fbef42c38e7513620ad5ef2c198c,2023-06-08T01:24:53.397000
CVE-2023-33731,0,0,86c6cfe3520968ad0c151b75214e1695dbbbd8e688c3cb3e3186a1e32ed1f42a,2023-06-09T16:49:46.597000
@ -227786,10 +227786,10 @@ CVE-2023-36365,0,0,3cee1646a92411ae23b58da3264be3882c3ee35cfa85a4db2f58ac1601bb3
CVE-2023-36366,0,0,cffbaf0f33498e58d50fcda5793d9e85b5fef16d30d1ce519a19c604bf7e95f2,2024-12-02T17:15:07.090000
CVE-2023-36367,0,0,ccf739078a731238f1d3bcf2947ff92dafbcfdd82ca9fb37f44d15486d147e6f,2024-12-02T17:15:07.213000
CVE-2023-36368,0,0,06ed99c7c4b2db13bcde5eee55492c7c3d29c8ba6e669450d0841c38994eb9b9,2024-12-02T17:15:07.343000
CVE-2023-36369,0,0,1397030efe1debf1a2c78b87207e3a04ff15859d12f5f46231974de7e2ee8274,2023-06-29T18:00:21.530000
CVE-2023-36369,0,1,541717b82a363ceb2a7ec9eb570391867133a2599698bc15c5eb943b22ce1c42,2024-12-06T19:15:10.100000
CVE-2023-3637,0,0,73ac1481ddc1df889412bda0c2583fec7bc5e2313684ecf116cb691307a3f25b,2023-11-07T04:19:12.810000
CVE-2023-36370,0,0,e114760f1feacab67ceb84869de8d52f3d37062c55d26b2af18b46ed8f63846d,2023-06-29T17:50:13.513000
CVE-2023-36371,0,0,85fbff05efbdffa510806ac10d818efcd2cd22617ee234c522c7afea87b95c72,2023-06-29T17:50:18.560000
CVE-2023-36370,0,1,00ade74a1a6f500421cef40b702854cbcd78996e0698e8815fee91d49625eb55,2024-12-06T20:15:22.850000
CVE-2023-36371,0,1,6ad57d8c8da6f5d0c01a6aed6b1a6f0cbebe6cafe7352d4a51b7cff5e4523f94,2024-12-06T20:15:23.280000
CVE-2023-36375,0,0,26217c0b57aceac3e7a92633827c23f2df348aad8dbc7d7ba1d8ec1d7f90694c,2023-12-22T15:16:04.310000
CVE-2023-36376,0,0,a5c296c885b3bdf8eed2afdf20c275fcebd8bc5fd83f8f8f3e854aa41c2a3d76,2023-12-22T15:14:04.297000
CVE-2023-36377,0,0,3bd700b96fcd8029a7a02a3c6adc2f090c67e8b7994a21783d7889d609922fed,2023-12-23T10:15:10.330000
@ -239404,12 +239404,12 @@ CVE-2023-52353,0,0,c85321a66aa40615f097e7c4b005042b61f142e80160f23edcb6164f85977
CVE-2023-52354,0,0,b83a0ae26910aeb4d8be73792a9bb48b3e532279f0f31aeebd210df1fbcb691b,2024-01-29T16:56:40.830000
CVE-2023-52355,0,0,461ea908f7dd6b61786b879539aa67641b818dbc1dc97626ddbece62684b7542,2024-05-17T17:37:57.793000
CVE-2023-52356,0,0,7dccc26c119ffd507dca45bc259afb8dfb8baea8acfee17fa269d8f7d722129f,2024-09-16T20:15:45.480000
CVE-2023-52357,0,0,b381a8467f1660c45f59b4116a47411eb9cea09a3ba91f746d6740a39df7c6fb,2024-12-05T20:15:21.220000
CVE-2023-52357,0,1,c90b8cf2c9fd4f0bd5f3a1801bd62383f3576028919c434b9e3c4930a49535c4,2024-12-06T19:31:16.340000
CVE-2023-52358,0,0,7c9601112ec312a1dc4d0e883a26142a68f2368228707be8b0f1eb6cd36b27ff,2024-11-14T20:35:09.213000
CVE-2023-52359,0,0,c42a0504fa8d5279c90e2ecc0d752e3045b67971944e9a1090f1657f4d4452b1,2024-04-08T18:48:40.217000
CVE-2023-5236,0,0,fb6c3d46b555cdb6e2e8cfed896e892086c77c4bb29daa7e1e3231fc7a825bf9,2024-09-16T14:15:13.093000
CVE-2023-52360,0,0,ecfeb27a76b3cb4fc769668e2502fbe290543c70b0ad7217d769381a048f79b6,2024-08-01T13:45:37.677000
CVE-2023-52361,0,0,092ab8720c04450fa7a554161bf44d8a64b8cb41e66ca97a56cfbb8a97e57137,2024-02-20T19:50:53.960000
CVE-2023-52361,0,1,ee14ad1baee0a55e572542327c3915c221516ec251f0b3cd438465038322f320,2024-12-06T20:04:02.750000
CVE-2023-52362,0,0,aadb9b831f43c03c0eae2121a7ba2fec206e428f21710d921d509d01fc0b25c6,2024-10-28T21:35:06.843000
CVE-2023-52363,0,0,99d169dd3c72fa3419e618676e8cf0cd222763ee208d2535052bfc2f7a5e1e20,2024-02-20T19:50:53.960000
CVE-2023-52364,0,0,c7c17a9442bb0f25f132e48c58df04ee50f543f7b38bb16c69e298a0a465ff5f,2024-11-01T18:35:02.950000
@ -239422,12 +239422,12 @@ CVE-2023-5237,0,0,db1f0f2f7a19094ea1f9b84a42cb29bd24bfd8de18c9b9f788659e27198cee
CVE-2023-52370,0,0,194d6af6488714fb96d0145469d88cf52f2414a90576119ca3f31777c0e5960f,2024-08-01T13:45:37.880000
CVE-2023-52371,0,0,3ac832a0c7bc01d08055143b4290f71f66ed73b79bd97e7c5b3b8df674620f0e,2024-12-04T17:15:11.513000
CVE-2023-52372,0,0,89a04959475a430166cfe986447280102cdeb0827ad0069ffc27fd93503de355,2024-08-29T20:35:48.080000
CVE-2023-52373,0,0,b688042e235deab3885c2fa0dca42afdbe734d6e8b4da6930a3ca13df8c7b884,2024-02-20T19:50:53.960000
CVE-2023-52373,0,1,9b50836c76e3ae1852fd0250695fbc0e6123ba9caec35a45b558d472a90fdbd3,2024-12-06T20:05:03.750000
CVE-2023-52374,0,0,52468335402d39654c3ca84a90470d895a1b829a09cffd3d0dd10698684bf7b9,2024-11-19T22:35:03.463000
CVE-2023-52375,0,0,8b1124f491eac6a9625ff675ba683400b5b7d3f23a913d0d79196202d05c38ba,2024-02-20T19:50:53.960000
CVE-2023-52375,0,1,0d5dc526bffddf83aa949bfe0c2db81629824be157cd1b1c9e7957a658f0f777,2024-12-06T20:05:34.567000
CVE-2023-52376,0,0,82ffaffed5d356a222f60e9b007e460bc11a76c11349f5aff3a2fc83ab90721c,2024-10-28T21:35:07.687000
CVE-2023-52377,0,0,b7bb8dcb6ccf72aa22b68fe6a7295a9e9583539669264335e5baefdd8fb2b023,2024-02-20T19:50:53.960000
CVE-2023-52378,0,0,7d972f87df9155825bdca8688e6d1bd2426c7da77f9fdbba23cf94fc02560c06,2024-02-20T19:50:53.960000
CVE-2023-52378,0,1,6249926ff32b6ecb8a1d44099a4274d4fe6494a89cf9582e4cded613fcd2961e,2024-12-06T20:03:29.293000
CVE-2023-52379,0,0,93b64dbad4e7209449b731f7d3e953f0a7c364b7d5a6a5a8e4913ba277d5b0b1,2024-08-01T13:45:38.070000
CVE-2023-5238,0,0,44149c37400f2ca89e434bc998cc9876859c66663ced7d38cf2d325a22daea0b,2023-11-08T18:37:35.557000
CVE-2023-52380,0,0,81727e3cfd82360ce7c4eee803bb9ae1f2fe2da42caea09fb398705d334e7ad9,2024-11-01T15:35:06.680000
@ -241644,12 +241644,12 @@ CVE-2023-7101,0,0,a52d0ccfd432cbb1060754fb57c44a602ad90741349189ae9b7d5b202794ba
CVE-2023-7102,0,0,9a5468561dad89031187a12e059f9b94c7d7667fb2058956abdb6d8f897bbe7d,2024-01-09T20:07:12.283000
CVE-2023-7103,0,0,4f36058f67e0a4910111d12b652d8772ac269a0ff69f3c490358d5b1460ad83b,2024-03-05T13:41:01.900000
CVE-2023-7104,0,0,580156c2762935686dbc7d2db71cb02b97d421a7f27927b4d4da0dfd51b77f17,2024-05-17T02:34:09.853000
CVE-2023-7105,0,0,a32e387ba1e34eb4406f99c8d0950913bdb4ddea66a1ab335bdcb7feafe76d23,2024-05-17T02:34:09.983000
CVE-2023-7106,0,0,10f60b1984211d9b96e213cbd29ceb55d9cc8d30d4496455a35a9208e57ebb74,2024-05-17T02:34:10.107000
CVE-2023-7107,0,0,f04662fb10721cb8a63616275c048c714c29f2555a5bb9430de08f91bb9b9fff,2024-05-17T02:34:10.207000
CVE-2023-7108,0,0,bb81f393acebebd78ffd0a1445062a5f3dd9eb11dd56372d3da0dcf59ae69782,2024-05-17T02:34:10.297000
CVE-2023-7109,0,0,b333dc674a395a327c4faabfdd0c73ec17ac80034aba0489e3116ac53ce9bbc0,2024-05-17T02:34:10.410000
CVE-2023-7110,0,0,8705df4596f62ed3041b8961cdcdc97b66da2d5b1b0d3860af3b2ca40d7bca1e,2024-05-17T02:34:10.497000
CVE-2023-7105,0,1,eda4e983aaabf03d314b21d649866328c1404a1a2366ff7ba984d2f2f07808fc,2024-12-06T19:56:16.997000
CVE-2023-7106,0,1,808a001128e07bb41844b5a32096b0e7e009c5a205985a2724adea03e767b939,2024-12-06T19:54:34.153000
CVE-2023-7107,0,1,4182c75db1456d75aa69f59552c85e1cbb94ddcbaf3a80e5018c7fe4017c1f9a,2024-12-06T19:53:48.247000
CVE-2023-7108,0,1,e3a810f8f0eeca4039cfb34ebbaa73961d55c18ea66373dfdb5eecc039ee96bf,2024-12-06T19:52:53.580000
CVE-2023-7109,0,1,9c156973063c49b47b900d4cf5e57868b55ff3a78046500e3e61b1798a4f5d6a,2024-12-06T20:01:58.823000
CVE-2023-7110,0,1,63610daedb6a7e62bc2e5f78b3d1d836bd890da7f6131879ebeb44517edbf6c3,2024-12-06T19:24:33.577000
CVE-2023-7111,0,0,b164301681023a723bd8680125f399c459b8976f1fa8c8d1ceea0f2e114d707b,2024-05-17T02:34:10.590000
CVE-2023-7113,0,0,acc64ae34c4bc08e7e4e96132da3558a5b3211ada6b026867de6dc06d6b90431,2024-01-05T04:56:58.503000
CVE-2023-7114,0,0,3a07c433586079e5ab7da38c56298088831548e6f6483614c796084d72570112,2024-01-05T04:56:36.817000
@ -241918,10 +241918,12 @@ CVE-2024-0126,0,0,e7cdf29432fa61e7db51a1500e6a819c17cfac937818967df5c00ae7b98b6a
CVE-2024-0127,0,0,a1e8c0019dafd112809927e0e47868d343a6e601f9de9f5106b76698f35c0148,2024-10-28T13:58:09.230000
CVE-2024-0128,0,0,b74c421dd43501e0b836aea4fd331a4d8fa2654f8f97b63889c0c6ed9b383b37,2024-10-28T13:58:09.230000
CVE-2024-0129,0,0,6ee18a11e9651964ad7b399b67416cdf4a9a5093784f93cd2ffcf1f8d0cb4c50,2024-11-08T15:33:26.137000
CVE-2024-0130,1,1,d6fdd25a4f059f8775822013176424f69bbc96edcb9229835152a2aa05f1a986,2024-12-06T20:15:23.543000
CVE-2024-0132,0,0,f1d27ee91d38f95f18265c56576359c7b74449c09c2448ac9270cfde0a145c24,2024-10-02T14:45:36.160000
CVE-2024-0133,0,0,1869d101f5a07bee8a308ca6354c7bbc691223866612cf3986da3052ed18f6e1,2024-10-02T14:43:22.433000
CVE-2024-0134,0,0,499fc337c8c1ad3a707e2af6afd2a12120f9f0e6a1399a84b193729cb183e358,2024-11-08T15:53:40.200000
CVE-2024-0138,0,0,9566695699ed2f5b241a90dfc41f91a2e7dbcf591044c936d8a086ee3b18949e,2024-11-23T00:15:04.367000
CVE-2024-0139,1,1,00253909ee4b4592d7ef1aab7bdb55a10c4a2e4ab45c05df31df0fe670a059dc,2024-12-06T20:15:23.763000
CVE-2024-0151,0,0,e688008e47f7f2b2995cf15f9fce74bb525b3898f5e47db0ad5b6ce2aa86a255,2024-08-09T19:35:02.910000
CVE-2024-0153,0,0,27805279095cb051183cab09aac75c2d46b1759d5204833928b95d85cf667e87,2024-07-03T01:44:37.677000
CVE-2024-0154,0,0,e0c538dbc1a8e60b09b037cacd452435c496c209b1106146ca859e110f3efaa6,2024-03-13T18:15:58.530000
@ -243391,7 +243393,7 @@ CVE-2024-10898,0,0,29bba6e208449ebd52631361f4bdc8eca3c372d754cd58876d30ee6c07372
CVE-2024-10899,0,0,3af5ea7b90e5da0230215c5076c9eff9b3749f9f5f947443d89625612842d08a,2024-11-26T21:01:21.643000
CVE-2024-1090,0,0,2d0b80c82d6d153c4e0b5412c3fcf892da86ac73a72da4cbf84bfbb064bdcb0c,2024-02-29T13:49:29.390000
CVE-2024-10900,0,0,5438023601d5947725ce57a2b51b24b31a697395c49ac1553534945223b38a58,2024-11-29T20:58:31.967000
CVE-2024-10905,0,1,98e243c9c6d3626765a0f5bec050b58ca35d0a0d124978428fd582cb710fa7ee,2024-12-06T18:15:22.207000
CVE-2024-10905,0,0,98e243c9c6d3626765a0f5bec050b58ca35d0a0d124978428fd582cb710fa7ee,2024-12-06T18:15:22.207000
CVE-2024-10909,0,0,00227ca76b39b55bef99d9504795505a9497d8e3a535166b14e71132892a99b8,2024-12-06T10:15:05.107000
CVE-2024-1091,0,0,54ee7e9ca708166212a73aaa10e4715176fe17b55fbce1ee0ea8f95d289d46a5,2024-02-29T13:49:29.390000
CVE-2024-10913,0,0,4e9b29333972ed20a30c4eccde2c9645761370bd1f3d0211dcdd27a3f9c3d9cf,2024-11-20T14:15:17.253000
@ -243570,10 +243572,10 @@ CVE-2024-11149,0,0,403739e1100fdbfba21604c94e5cfcecf06b9f64eb12bf3d164a7b1ae5623
CVE-2024-1115,0,0,4dae9d3d8bef65fab3d547368288cc3126446be18b7fc740123f9a96bd6241e2,2024-05-17T02:35:14.880000
CVE-2024-11150,0,0,a42c681646aa4974b2ce83b0b93c5af4c26316891f1e3dd7bf6a226e6b2cf362,2024-11-19T16:57:05.407000
CVE-2024-11154,0,0,9c2f24e5b2c6bb0a1acf0aba74e4e593d635b23a924a1df484d24fc0dc0da623,2024-11-20T14:15:17.500000
CVE-2024-11155,0,0,3141a4c3b16589023c0d58ce63678a7d08b24b7d9f52724b10132ecdbf56081e,2024-12-05T18:15:20.933000
CVE-2024-11155,0,1,2ae027b1b822d4312a275eca4cbf8fb2146c9eaaba682676a0b1ddc277931d12,2024-12-06T19:15:10.730000
CVE-2024-11156,0,0,06cc28f3fdf4eafe724151e70cccd2e253f75b6a4b1a92b35065fa80954c8225,2024-12-05T18:15:21.103000
CVE-2024-11158,0,1,48960fb25d56a6f5fe66ada28bf0702100971a20e78d8e9e7c0b57aea8116164,2024-12-06T17:15:07.970000
CVE-2024-11159,0,0,40c853846b1f5260f445d8196c4d1f6aec01e81777411e7a4839d765e27bfc1a,2024-11-26T22:15:17.720000
CVE-2024-11158,0,0,48960fb25d56a6f5fe66ada28bf0702100971a20e78d8e9e7c0b57aea8116164,2024-12-06T17:15:07.970000
CVE-2024-11159,0,1,8afad29dc7b40793fcd69369c055be5c54db43acf2a2aa9e2c3ac35746277cd8,2024-12-06T20:15:23.937000
CVE-2024-1116,0,0,4196b5c71a0d802f4c1e9b3a43ac71c958f929e96b26e1ebb01241c6bd176fa3,2024-05-17T02:35:14.983000
CVE-2024-11160,0,0,c2a00c83ebfc94083c99410ffbf76862f5cddeb9d6f2530e0ed9a430c75b3087,2024-11-27T18:15:08.620000
CVE-2024-11165,0,0,95fe2b7c203ba5cc9c6e4fb2522e665475ea40e75b68e18a56b9dddf3a00ff2f,2024-11-14T16:35:05.493000
@ -243614,7 +243616,7 @@ CVE-2024-11215,0,0,fb8a71cad5204690d7fc24b1c1787d6360fda1c469df5e0270b5ef3894a49
CVE-2024-11217,0,0,5d4ed802680b391d1dbfc3e3b561791ea824d61f478d755424e831d8c9d2195c,2024-11-18T17:11:56.587000
CVE-2024-11219,0,0,adb818c3439dd08f9efd035590aa0488dddb5fa007778c12bea179a71bd79105,2024-11-27T06:15:18.110000
CVE-2024-1122,0,0,0daea6a9b881beb2ea9e563443c7905c114cf68ea1093ef9f6fd6cdf2c48aad7,2024-02-15T19:17:26.630000
CVE-2024-11220,1,1,8bf258914e007e8314e9874abf0f82d1b435bec757c99ae036914153c845e345,2024-12-06T18:15:22.407000
CVE-2024-11220,0,0,8bf258914e007e8314e9874abf0f82d1b435bec757c99ae036914153c845e345,2024-12-06T18:15:22.407000
CVE-2024-11224,0,0,14b47c721b9a9c90a723c9ae6778fdcb98c55c7926f245bac226fd6a6bd6741b,2024-11-19T21:57:32.967000
CVE-2024-11227,0,0,6d038a3f0b3d06ec6f77c9f28005d0fa682c840cdcdc2f7651d65c97ec36da46,2024-11-23T10:15:04.083000
CVE-2024-11228,0,0,9fc5ec42228f59de6756223b2f66605b831df8cf5121ac71cae8165002d20d23,2024-11-23T12:15:18.577000
@ -243912,7 +243914,7 @@ CVE-2024-11676,0,0,6ef36de52dd97ba26f79b4f6c2236d5c5f7317f446d492a904b809bcb2fcc
CVE-2024-11677,0,0,87a6177c5b391fe3e3720d37e67024bea5a041e744a962c7b6d3c8e2d9ea86f7,2024-12-04T20:33:13.023000
CVE-2024-11678,0,0,fce9fb7e025c917df93cde2de1c865701af156abefa3010e32d19624bfee04c2,2024-12-04T20:39:07.400000
CVE-2024-1168,0,0,b74b0b0c267c02c66f0f474186eac7335d29517290a9638a292d9de8edcd7c5d,2024-07-11T02:52:36.687000
CVE-2024-11680,0,1,413293c09da5679a3e6b3bb9a6bdd26dd9245aca40b801761cabf7d2cf810aa4,2024-12-06T18:42:17.390000
CVE-2024-11680,0,0,413293c09da5679a3e6b3bb9a6bdd26dd9245aca40b801761cabf7d2cf810aa4,2024-12-06T18:42:17.390000
CVE-2024-11684,0,0,9f2fe09eb8e335ba8391a949cbf48c636db8bb7de80a47009590f5cdfa3e8218,2024-11-28T09:15:04.793000
CVE-2024-11685,0,0,2626aaa1c85fe00c7037f15a9af93889a5b226726b04ceaddbef8ece377d16ab,2024-11-28T09:15:04.950000
CVE-2024-11687,0,0,84514bb98732ffc9ca2906ea8e96ab481d88f84c1648da7b939544b1044de35c,2024-12-06T09:15:07.303000
@ -244122,7 +244124,7 @@ CVE-2024-12235,0,0,38f1b3feacaad948f40ac9e8f67e1ff40424da9b6b0097b46c94da1cb9b5c
CVE-2024-1224,0,0,5ae6c514ac328cf1da04b8ed0644857500ebf34ce993b80e4e918efec900b252,2024-03-06T15:18:08.093000
CVE-2024-12247,0,0,d5c2fdaf4ab27cb3f776fad80cd63211a094668755f28e461521a00bf1e54442,2024-12-05T16:15:25.243000
CVE-2024-1225,0,0,a853f4976fb83c6334355e0444e701230a93393d2963cd320d17d46d82664837,2024-05-17T02:35:19.560000
CVE-2024-12254,0,0,72443992ee8f7a657553874aecd90824c4142b4c6567b99a5817df1abf95aba0,2024-12-06T16:15:20.623000
CVE-2024-12254,0,1,16aba32ce9d4d815a3fee785e702a7ee9ee44f9e9eb6813f5f2c2be5aec64142,2024-12-06T19:15:10.983000
CVE-2024-1226,0,0,8468709c7e5985706a02eafa0534a9ca6154e724547969096693c3d6c6d57a0a,2024-03-12T16:02:33.900000
CVE-2024-1227,0,0,3107f30bc54f20049fdac9a8d2aa05cabbd90f7d48a70b5eb8ee4219e193157c,2024-03-12T16:02:33.900000
CVE-2024-1228,0,0,7825d19ed2188a2970b084912b8143b5f7a1bb071f403c915e1ea5b67d97522b,2024-06-12T17:54:10.157000
@ -244682,7 +244684,7 @@ CVE-2024-1818,0,0,f0db66d34ed1bbd1a6da2e1be3a20604cb1f56a7c59aed6520f71e9d35acef
CVE-2024-1819,0,0,62ac63b639c78f9550a931ff46654c8de5e816471f69ca24644a9e7f7a4e019c,2024-05-17T02:35:37.403000
CVE-2024-1820,0,0,2713d72ca083bebe41db6fd6955c5fc85fd2c1f22edbdb4d3b9e50e4701834a6,2024-05-17T02:35:37.497000
CVE-2024-1821,0,0,001bd53445b58573a4f69eca07101a26be5e9f423ab10e8b9d706b56c68f6750,2024-05-17T02:35:37.590000
CVE-2024-1822,0,0,d3338217ebea9fb35a562bced306fdd327dfa4cb5bd43514437e68a1ee06baf3,2024-05-17T02:35:37.690000
CVE-2024-1822,0,1,a57e04c770fb65a345b4ff47921ae4226c1f5d82c41306e3347dd75b4d18f234,2024-12-06T19:58:10.803000
CVE-2024-1823,0,0,bc40ee6def2096397277259f2c87f4cce8e67327f079668d1eed732237ff5870,2024-05-17T02:35:37.780000
CVE-2024-1824,0,0,ad2a7bf090b861f97d4813ba1c9ca7e736c2450e66a5946f4013518d94817777,2024-12-06T14:44:58.437000
CVE-2024-1825,0,0,94224c598383aeea43f74621bfb1622acdf3624bba639eb6baf3398ac6cb0efd,2024-12-06T14:39:05.777000
@ -244694,7 +244696,7 @@ CVE-2024-1830,0,0,d45cda4b1d5ed84f256382444c2274c6c644ab1eafdc8f3894a05d999338ff
CVE-2024-1831,0,0,fe4f04ca4f16299df863c45f808c333b9c936fe3926d83057306e36aa427a769,2024-05-17T02:35:38.537000
CVE-2024-1832,0,0,40b533f1b9e7e762441c8d0b18d62d1866d4ae3b96379e93c2ebc82b48b3a435,2024-05-17T02:35:38.633000
CVE-2024-1833,0,0,8ecca19d319dba1492e91c31d7c82fa386f577400ebaa6011fbdbda7cad95a40,2024-05-17T02:35:38.727000
CVE-2024-1834,0,0,588815bd678da3cf289a768b955e42e603dd9b19891a0162beac89b2529174dd,2024-05-17T02:35:38.827000
CVE-2024-1834,0,1,48b90332f0c6341e9785a8b27fcf738be2841e8ef5a9b23f4fc109fd93604577,2024-12-06T19:59:24.463000
CVE-2024-1839,0,0,45c4b6109e35b9b4bc81aabb18862599f0b4b2e3501b70798e17884277193c00,2024-06-27T12:47:19.847000
CVE-2024-1840,0,0,2c217234ef6e9232faca9e0485a77d91bc4c99c28f130f7085504ad2bb7539a7,2024-05-02T18:00:37.360000
CVE-2024-1841,0,0,f4e8bd74a5fbd12f19dcea0b5dba0f8a2a457d15fb920f05a0a2b61c4b3cffde,2024-05-02T18:00:37.360000
@ -244777,7 +244779,7 @@ CVE-2024-1919,0,0,30e14fda5598ff508e06aed5ba21764c299461a5cea9b625bcc97a12d1b62e
CVE-2024-1920,0,0,bc30fe655a2fdb744e0650e2bd10f7350b5c2ea1729aedbd1252af9a3041af64,2024-05-17T02:35:41.397000
CVE-2024-1921,0,0,2024727a216247dc1f58e48f026253776b6768a694deef0015ac4d009f7560c7,2024-05-17T02:35:41.497000
CVE-2024-1922,0,0,41dce75fe9a237972612d51169b77a90beda79e6207037660466952bed69f0f4,2024-05-17T02:35:41.590000
CVE-2024-1923,0,0,8a8b88332b10e5b750d8c88355b65f014597faabe73149bd7e86ec71e5134e60,2024-05-17T02:35:41.693000
CVE-2024-1923,0,1,1f0997696c4d1a6a4a4e3eaf1876428dbb77c239ecf38407bebee1fdaeff063f,2024-12-06T20:00:46.283000
CVE-2024-1924,0,0,279b8ea0e7a9bf2b95fe0739a6719b154baf8baa30170d49f9a4d0af37bb9b54,2024-05-17T02:35:41.830000
CVE-2024-1925,0,0,338ec34e2a8ad56fc4e1b6b4e16236396612326623b1a753d60edfdaafa9ecef,2024-05-17T02:35:41.930000
CVE-2024-1926,0,0,dc52461756ff0c6845551795f968bdb68ce9a07c5b16193c89986e0937c54a9e,2024-05-17T02:35:42.027000
@ -245633,7 +245635,7 @@ CVE-2024-20950,0,0,a8dcbd8cc1ddfff3d855b715bc3cb1c5e0aab4e149120b29bfe9971dd0c3b
CVE-2024-20951,0,0,23e725bdafd7d3367fba7c07eea777ef136dfd7464fb10144de702713e69b528,2024-11-29T14:07:57.480000
CVE-2024-20952,0,0,ee7670e91d33e31160e61df658911f1f989f8a5d8151285943b5c8af49a8a00e,2024-08-30T16:35:10.593000
CVE-2024-20953,0,0,a3b1b4e0f383af8fc79c967ea17100da30c8b057c63a1edb23f07de9cfb7f270,2024-11-29T14:07:16.767000
CVE-2024-20954,0,0,57a73413d0e3acca6ee4a29e076cb030f710aa01f467c3e7bf98fabced0d9135,2024-04-17T12:48:31.863000
CVE-2024-20954,0,1,25de0cb2ddae64a83b30146a1d050692ad1c4b445ab8cb19ed8c9cdac79463fa,2024-12-06T19:38:00.843000
CVE-2024-20955,0,0,3ef5989170bb1b485154f91fb8591afd4cb71f457c0fd734cc9a4a4e8a7d2a89,2024-02-09T02:26:25.517000
CVE-2024-20956,0,0,78d82b52430d3bd5c36b5846b4138f4e211c247ebf893f680bcabf1f8af52ffe,2024-11-27T16:37:04.993000
CVE-2024-20957,0,0,e93e5f63896ca6389639f28c6915c0999c46dc6fe6eef70f268dfc725114f0ba,2024-01-20T18:31:43.287000
@ -245683,7 +245685,7 @@ CVE-2024-20999,0,0,8bcb3141c521c3778b23e1f32939058ac6a444098cc39214296b0751762d0
CVE-2024-21000,0,0,5046a94a4249afec3f785dd51126c5c8b28718404eba20f1156f4ea76f53b597,2024-11-27T16:36:11.717000
CVE-2024-21001,0,0,416215f17e5ee7b6fd02766a3fe7252d7bc684b3302f3dd4a683e3f6400abefa,2024-11-27T16:36:08.477000
CVE-2024-21002,0,0,7f5c86fdcff82f93225a75a7e73262c6da92b927148218de7deb268aa0c73332,2024-10-31T16:35:04.067000
CVE-2024-21003,0,0,90a06bec930da30c9a00d7e245d95aa433119de047332777b49810dcb3c38582,2024-04-26T09:15:09.823000
CVE-2024-21003,0,1,016e7af6f6f5da242517b5122c4fd80146af89b8f5c29d0732f3ec063d6f6d69,2024-12-06T20:23:18.453000
CVE-2024-21004,0,0,74d75259359885feb58e67b784c7f0a497e76221cd93421bf881ed958c2f234c,2024-10-31T15:35:24.047000
CVE-2024-21005,0,0,b12d0a7c3c205873871a05e86599f19556e7c7b41345074e358578c611af2af9,2024-12-05T21:52:13.690000
CVE-2024-21006,0,0,b66db085bb99aa21625f1949517478b22e3fbdd786db1c25a0e1b28fb3539492,2024-11-27T16:36:05.623000
@ -245730,8 +245732,8 @@ CVE-2024-21043,0,0,34b86fb6bc70d1cb3f2e8b52f242178af3e3c87a06302294640b6969cd919
CVE-2024-21044,0,0,3f45eec1e46b6a448e745da4861f2365c447de08b700b7dafe3a57ef6b615700,2024-12-03T17:15:08.787000
CVE-2024-21045,0,0,918bd035aa1d6211c105c0b035415fa2c831f7eef3679326aa8e323c6a0fd5ac,2024-11-27T16:29:07.300000
CVE-2024-21046,0,0,6cd7417a9fe1dad42e5e390bd73f6c59f847ce1b22a979e6a850a74e46589580,2024-11-05T16:35:11.803000
CVE-2024-21047,0,0,2bc5d014697923ab8f9837dde11c202b28c9635338e1429d1d2707b2d34f9717,2024-04-26T09:15:10.500000
CVE-2024-21048,0,0,0740c7f75430ed630e47ca8538d7654b46da3ebd0ee4b5951500b7c74c4ef781,2024-04-17T12:48:31.863000
CVE-2024-21047,0,1,5e24dbf850365b6d7e28a5392d877c4858a7c8c7bdc83f1cf31ab7e32d6dad7c,2024-12-06T19:56:28.687000
CVE-2024-21048,0,1,258c9de795aad416127f206b5a5da99628fd020e1f565f32a8d951d43891cf56,2024-12-06T19:46:40.837000
CVE-2024-21049,0,0,cf8e525df33a5a24e132d334ba49c1d8589866044b454cf887fd0c37f2d4ee7c,2024-12-06T16:58:16.557000
CVE-2024-21050,0,0,d173dd80a3b3f9296826239fbb7cfc39b495adb10b6903e9be9cef4381abc447,2024-12-06T16:54:42.740000
CVE-2024-21051,0,0,46890b252f7ba446eaade23158ee1163d17c95e1ad5c2ab10a42960a70fec69e,2024-12-06T16:52:07.510000
@ -245745,17 +245747,17 @@ CVE-2024-21058,0,0,95646a257ae328a0139e5511bd8e67fc9779535c8be9025ba07f17d27758c
CVE-2024-21059,0,0,ed97a0e890f735671a9459c7363a548ec82a50c3aae747ff5d1cfaf4b1055cce,2024-12-06T16:35:57.460000
CVE-2024-2106,0,0,213f924b1030e277957ab3251c0a5e0aaf21bb221bf06ebf6920975bdeafa568,2024-03-13T18:15:58.530000
CVE-2024-21060,0,0,5dad82251c69460b0dcc342dbc8fe5f30ffd6435784fefca48a78f953ddd6047,2024-10-31T16:35:05.517000
CVE-2024-21061,0,0,acce4a5f468dca01931c32e50c6611a1e683c3d9c025ec493bafb29e16c7fe5f,2024-04-26T09:15:11.143000
CVE-2024-21062,0,0,f52b903674b0da400a3e3849ca455d776135add7df0354d62dc29d89b7440bac,2024-04-26T09:15:11.213000
CVE-2024-21061,0,1,5ae068859b6b174f585c0aff2e6677bd09c079fafc5b103de95ef4d633cd0bc4,2024-12-06T19:09:56.543000
CVE-2024-21062,0,1,214c451de14e60b8d077d3bd5b5de754004653fb546f539e5aeaf70121c46db1,2024-12-06T19:28:18.863000
CVE-2024-21063,0,0,e23f0197e67d00ef65622e3d434aaacac50777a28da39c1b420993e471f6a1a1,2024-12-03T17:15:09.103000
CVE-2024-21064,0,0,5b2971adc59d71b4aaa5c906c9a4f9e6fc91222b1a769debcd275580759920af,2024-07-03T01:46:28.883000
CVE-2024-21065,0,0,531e06a2890a673e9797a31981c044156cb67f03dd1975a6ce161799ca849b63,2024-12-03T19:15:08.777000
CVE-2024-21066,0,0,7da8187d584810bae1a6bae2212c93de6863858adc6479117a4e458e0f55fedc,2024-11-01T15:35:08.567000
CVE-2024-21067,0,0,3c1db72abc041e4cd640c75884818bbbf8c687caa8093bb33878c33da44b6b4d,2024-08-15T15:35:02.413000
CVE-2024-21068,0,0,5397ed6276bc380474002ef2f826d2dbb33ae28ef93eb95352209ca8f93abe8f,2024-04-26T09:15:11.273000
CVE-2024-21069,0,0,e8fb038125081aee0289d623e5836cee4ae9c0f693a34e8e6777594462628a90,2024-04-26T09:15:11.350000
CVE-2024-21068,0,1,8f8ff287a4e8bb48aaf8a36d674fca48eef95aa1b39e5e63ff12643e880c45bf,2024-12-06T19:22:57.927000
CVE-2024-21069,0,1,4462777604035f6150b08b233d8deaaffa857a5c6f702ca043009981a3a6e779,2024-12-06T19:04:31.867000
CVE-2024-2107,0,0,902766287c54c3e88a205ae58fbc93817b4ac63ce16c76170f3874ff8989f8ce,2024-03-13T12:33:51.697000
CVE-2024-21070,0,1,807e11fcc6c0d1a17c94bd4836d34e814dc45e31d77cf2ffdb260697704a7b3c,2024-12-06T17:08:50.733000
CVE-2024-21070,0,0,807e11fcc6c0d1a17c94bd4836d34e814dc45e31d77cf2ffdb260697704a7b3c,2024-12-06T17:08:50.733000
CVE-2024-21071,0,0,ef4afb1893071bf9afc8d2a6252fd27efdd4f53ba3c0df579c63b35c35843417,2024-04-17T12:48:31.863000
CVE-2024-21072,0,0,7f673ab379e3c8685bed2a1be8717cabd60284c4e7f85a16930c542ef012a340,2024-04-17T12:48:31.863000
CVE-2024-21073,0,0,6fab5dcf6f6b2dd06f1784f0d55406ff6087734f2ac6cbb318793cd2479feb81,2024-12-04T16:28:30.120000
@ -245767,12 +245769,12 @@ CVE-2024-21078,0,0,3c58057f42bbb0adf71d1e55713932139d3788f707e7b7aa7c04496c5abba
CVE-2024-21079,0,0,9f333b5a6668bfc55c617df1ab0b439cf4a721f5b936e07eedb797977ab1060f,2024-12-05T15:17:32.190000
CVE-2024-2108,0,0,9a499dbebde221ddf489f66723ebb5541c2e31460bf0818d8c825cfb43b4c9a0,2024-03-29T12:45:02.937000
CVE-2024-21080,0,0,115dcbf69c74627419ccf4630158e1826dae15574ebcc45a32af2b3a90937c42,2024-04-17T12:48:31.863000
CVE-2024-21081,0,0,e418c554ecd53c605c7c87bdcecced08262c98d27ae2118827b00e82ce34de53,2024-04-17T12:48:31.863000
CVE-2024-21081,0,1,c275c765088537d639dcb600b29c36a28ee5659ea6289cb113dc3e02a6a50648,2024-12-06T20:59:06.987000
CVE-2024-21082,0,0,23528ce4eadc112aa9bc788303822bb833428e0b0c509b154559e37fa226ff61,2024-12-05T15:17:52.217000
CVE-2024-21083,0,0,64c8564082dc81aaed6fbe25b7860e0025083c7b87c1d2d7ba9fd1db0a5d76d8,2024-12-05T15:17:58.973000
CVE-2024-21084,0,0,3ecf39fd228939a2dce5544ec5b78321dcd296bd51eedb006c227a11eff8a7bd,2024-07-03T01:46:30.583000
CVE-2024-21085,0,0,35f35fe8bd121dd226d197202c7e8879f1a74507a7dcab9fe69eee683b63b49a,2024-04-26T09:15:11.447000
CVE-2024-21086,0,0,6968d09fe669a4367750ca8567b719597691a3493bb1bcb4d376ae2557ab644a,2024-04-17T12:48:31.863000
CVE-2024-21086,0,1,39bd54eee314526e926e924592726dc4289ef715007c5f5252db8948f61fdcb8,2024-12-06T20:58:09.767000
CVE-2024-21087,0,0,f22c17e300fd89cdd43bd6bc1adad60f10eeb6246d92b880ac98e54ddab22cbb,2024-04-26T09:15:11.543000
CVE-2024-21088,0,0,44f4aa7f99d194c57665e971a2800175653d07a9f7c8ab39ede03f04ff22008a,2024-11-15T22:35:06.793000
CVE-2024-21089,0,0,a802903839912e6ccd46d3ae2b8aaec7c725ef400dab1e68c738f51ab05539f2,2024-04-17T12:48:31.863000
@ -245780,7 +245782,7 @@ CVE-2024-2109,0,0,94fea5557ca85707a8add26a16c9667c38681a6051b37cb4d81c4a444a805f
CVE-2024-21090,0,0,37a9329ca4ea88e58f19a40c712804df6aad8d3af015ccd127f2e694328d8e16,2024-04-17T12:48:31.863000
CVE-2024-21091,0,0,9a3043aa88572c51cb2bee778e3b5eee6044532371caffcb433155119b6a18eb,2024-07-03T01:46:31.737000
CVE-2024-21092,0,0,d2fdff9310eaf3a230419f3c20427d9eba344e874f04b2824493cef292340925,2024-04-17T12:48:31.863000
CVE-2024-21093,0,1,2fea1427f4d1c2a380d0e5f0866f8b6a1791c0bd93eb8c4d628196af71b84640,2024-12-06T17:03:13.813000
CVE-2024-21093,0,0,2fea1427f4d1c2a380d0e5f0866f8b6a1791c0bd93eb8c4d628196af71b84640,2024-12-06T17:03:13.813000
CVE-2024-21094,0,0,263056239ff6ad0bc667e8c6542629ef5df05fe8ce26e38409cfe58bcbaf0d28,2024-07-03T01:46:32.570000
CVE-2024-21095,0,0,71837bbaf2bea328402990b14e523963606d49d2731911e5f425e34df69f4f33,2024-07-03T01:46:33.287000
CVE-2024-21096,0,0,6aea65a83e2d5b0b6b2c176040905d4617084dd4a49f2855ae52e067c47fcfb6,2024-06-18T02:15:09.823000
@ -245789,10 +245791,10 @@ CVE-2024-21098,0,0,474d349fe791b59a45a4f0ea3b001446503f6f0220c6860a433cd83652825
CVE-2024-21099,0,0,18ee7f90aec4d9c34bf08ab839549123e62f8937c0d3b02741d81fa2e6dfe88e,2024-10-31T19:35:02.343000
CVE-2024-2110,0,0,1270b7a979206100ed725d968c0cf72fd1f82b851f2f2372b42faaa8d203e40d,2024-03-28T12:42:56.150000
CVE-2024-21100,0,0,a46a163d2ef0a0b6b1fddd7395d7d5cb51902aea83a18389f53792a38f659f53,2024-04-17T12:48:31.863000
CVE-2024-21101,0,0,91755928d5ed81eb1c0b6d3faaf85c7a1a9acb13a679b76992a144a90a15ac62,2024-04-26T09:15:11.750000
CVE-2024-21102,0,0,e0c4528cdd1a9369fffd301868d00884311048b2a3539b7313328ec89feb0833,2024-04-26T09:15:11.813000
CVE-2024-21103,0,0,2f3299fda2cbf8e902f3515fd0d48b9d8de5702ec09ff6c5557d6ae05b059de3,2024-04-17T12:48:31.863000
CVE-2024-21104,0,0,eebfe4dd9b21aaa35ec722f534d9449bff2c7a22cb7852b7fed566ff1ff264ce,2024-04-17T12:48:31.863000
CVE-2024-21101,0,1,fcc1f8d95c627a1ea169a9b5dc2a2096dff6fb97eab0a1c16669d187fba712f4,2024-12-06T20:41:55.317000
CVE-2024-21102,0,1,46339957ebe13e36848bbb84c095327a3f2f812e19c5986d51293a175a4eafce,2024-12-06T20:40:44.093000
CVE-2024-21103,0,1,50cb98aeefa788bfc08d1d95dc76248a11578a4062c20eac36777e8f1cf73021,2024-12-06T20:34:30.853000
CVE-2024-21104,0,1,e15d375fa0fd8e83a596da0fcbfba829b5f5e3e099e3c88497bb64346b96249e,2024-12-06T20:33:01.633000
CVE-2024-21105,0,0,fc58e283f6d0e4d970fd8ad2b639eb7f30380b543f0c738a670fbf8a20f2d5da,2024-12-04T21:15:21.417000
CVE-2024-21106,0,0,a30edb35fea21ae503094dc51bdc2a886ed27ec86c93160503156ca074c6a005,2024-12-05T15:15:44.383000
CVE-2024-21107,0,0,8b22c366b8e56e1eace3e0c72769115530475e44eb4f180061f1d02595110799,2024-08-15T15:35:03.743000
@ -245807,8 +245809,8 @@ CVE-2024-21114,0,0,0880b4b822c0833beb112d172fe417240b3cb185b690f6da3505b6f7c4750
CVE-2024-21115,0,0,496a4de74dae60676025a8190e17db1ffb37f7b6383cea5ce028d6646b9ac1d2,2024-12-05T15:16:18.327000
CVE-2024-21116,0,0,530494b4820398a7e8822219c84574822b4caa9ee5be4bfb8cfeeaa311d39227,2024-12-05T15:16:20.707000
CVE-2024-21117,0,0,c00c4008bc12621d52c01b8472214c0be8ae4e9de0cb223458bb38ef939dfb04,2024-04-17T12:48:07.510000
CVE-2024-21118,0,0,f114752b89d9b7c0657ca7ba9e9d4a87c147c0dace0ecb0acd8bb329459af8ce,2024-04-17T12:48:07.510000
CVE-2024-21119,0,0,9381600d4aa69a4373e482e4320b8fc62fa345594208c335b64ab5a7d172dea7,2024-04-17T12:48:07.510000
CVE-2024-21118,0,1,e5accd7b54aa941142bdb365908b8f1383fb4abe371cf99317731e0a206e6dbf,2024-12-06T20:29:11.287000
CVE-2024-21119,0,1,966504a3102f90b81d02a762b9b87f887e832940198e2f2be350359b1c3e69c1,2024-12-06T20:26:42.563000
CVE-2024-2112,0,0,a9796693bf64fe8c1cb1a520a8b14d3b45df38763dca2df6ddc6b2059d00055c,2024-04-10T13:23:38.787000
CVE-2024-21120,0,0,b0038d7950fd54e728ca8204a661eead3f856b119245dfad7d926e5d9d2db135,2024-10-31T13:35:03.740000
CVE-2024-21121,0,0,9ac261a7c1bd85ffa11909e26538fa893d3223e0fe9f63f750076aae3f28b40e,2024-12-05T15:16:24.950000
@ -246181,7 +246183,7 @@ CVE-2024-21489,0,0,1a93dad9018029060119f73b7d19b469e0b7fce768b8d0a11621c573bef6c
CVE-2024-2149,0,0,63aa7f0d2a03697c39fae7a40d96338e0e86a5e57c9276eb9e14dee434e327b9,2024-05-17T02:38:04.480000
CVE-2024-21490,0,0,8fef65cf0f770a0e61ceff38aa6805ccb146d3ccd992f46918345da0115fd835,2024-10-10T13:51:02.213000
CVE-2024-21491,0,0,8b3f805634bd0202a6da1c84d9cc592601351153f9b1f8af4e7e32c9715d19c2,2024-10-16T13:25:47.870000
CVE-2024-21492,0,0,803eb1b38c0a3c364c8ed4dea2bf283518201c6c637d9dcb0eb2c40900b3fc49,2024-02-20T19:50:53.960000
CVE-2024-21492,0,1,41784e48d5d56f935bbe9f5a3d60c45053ca0d5f0bf8670ce081293e9f26c581,2024-12-06T19:15:11.520000
CVE-2024-21493,0,0,8c569f1b0a59292e6c9cf7ec9ce82294e78d1d0805330784c9c6f403ab9b5f07,2024-02-20T19:50:53.960000
CVE-2024-21494,0,0,0bbab6d51758efdfbb0a7b2f9291f8e5deeed39eed0d020b8776487f79305949,2024-02-20T19:50:53.960000
CVE-2024-21495,0,0,d8114eaee60fb319f9f14d9bbb95c01136acc0dc9b681a7e416381982ba11775,2024-02-20T19:50:53.960000
@ -249480,9 +249482,9 @@ CVE-2024-26160,0,0,a5ba5256c33bdbaacb3171d5280616afee8699c566f2ab3b8302aeb6de79c
CVE-2024-26161,0,0,89563409800fbffebcb197091c745615b33e6199d314ab3dd15f0aac42b18b88,2024-12-05T03:13:28.823000
CVE-2024-26162,0,0,6db79e02ea9ccfbdf9b6ec43f0dee2ca0f4b40a961c561698caa8afa95c0a1fd,2024-12-05T23:02:38.947000
CVE-2024-26163,0,0,1cec6fd5081dd6336471bb2c93b29cc598ec8cf690b6a4f047866b54bc86ed44,2024-06-11T16:15:19.610000
CVE-2024-26164,0,1,955f43c621335a0915ed0ccd09771b1791419f5f5b5d2b4566de2ffe6ff42e0d,2024-12-06T17:14:53.333000
CVE-2024-26164,0,0,955f43c621335a0915ed0ccd09771b1791419f5f5b5d2b4566de2ffe6ff42e0d,2024-12-06T17:14:53.333000
CVE-2024-26165,0,0,83eab2c0875e9b88a1f7ce329398a5e0cce759e0512193fa6f5822a067798b74,2024-06-11T16:15:19.780000
CVE-2024-26166,0,1,e18f80ad40f8bc6f793bad005879d5e5b9993daac689d33724d3bc73a70a370a,2024-12-06T17:13:11.063000
CVE-2024-26166,0,0,e18f80ad40f8bc6f793bad005879d5e5b9993daac689d33724d3bc73a70a370a,2024-12-06T17:13:11.063000
CVE-2024-26167,0,0,8855bcc7e86d2bfb321c97571f709e8374a60be9ce3b496dc4c11c762f54238c,2024-11-29T20:40:52.990000
CVE-2024-26168,0,0,79980e86f7902cdfbf2750e2f70229d42c3911a1aa52728ae4a317e89b62a526,2024-04-10T13:24:00.070000
CVE-2024-26169,0,0,1019f2fc447e0f9753156720ba4d1d39073dcb9223b8501955c81cf0a85bd6ec,2024-11-29T16:24:31.767000
@ -249516,11 +249518,11 @@ CVE-2024-26194,0,0,11c479afbc9197da02f6a4aa14d5718e799cccfb9f0ca6804619eeb622290
CVE-2024-26195,0,0,f9685945e615e0cfe189b9bd1c92904f15fea6beba07eb018c4de9659528b4d4,2024-04-10T13:24:00.070000
CVE-2024-26196,0,0,5f4e2e1bad9203c90db925095545affe695f5e0a89ae7500f6ce9ad4c0ae2786,2024-06-11T15:16:04.943000
CVE-2024-26197,0,0,17802ef5eb9da6620279f331b4f31440afdafbfe5f1c96a05e8675951f498bb5,2024-04-11T20:15:35.027000
CVE-2024-26198,0,1,e84246f9a50ce130b577ac09bbb53f0b839bbe0b88ca56ac36c78356e6403593,2024-12-06T17:12:07.640000
CVE-2024-26199,0,1,de92fa6956c0375e1cc6cc07bb193dcb58ea6bd7f5ca90a22b99af62ae11f509,2024-12-06T17:12:27.343000
CVE-2024-26198,0,0,e84246f9a50ce130b577ac09bbb53f0b839bbe0b88ca56ac36c78356e6403593,2024-12-06T17:12:07.640000
CVE-2024-26199,0,0,de92fa6956c0375e1cc6cc07bb193dcb58ea6bd7f5ca90a22b99af62ae11f509,2024-12-06T17:12:27.343000
CVE-2024-2620,0,0,6b28b9b94555efb0bd77a33772efab8d47252168659c55a4b3eb4d7da91e6f3a,2024-05-17T02:38:21.923000
CVE-2024-26200,0,0,9d7a115de166490e50bd5473853818e51a79fb30fc7cb5a97e8a9c7f136c2b8f,2024-04-10T13:24:00.070000
CVE-2024-26201,0,1,b695a22668f344c6a5009b94534cd93f805e4d96d32a3c9c05b50b0be3b8117d,2024-12-06T17:02:30.493000
CVE-2024-26201,0,0,b695a22668f344c6a5009b94534cd93f805e4d96d32a3c9c05b50b0be3b8117d,2024-12-06T17:02:30.493000
CVE-2024-26202,0,0,a5c2e2210ecb762f4f431f8c31a0449def3d4a06e7306daece755d13af1b1911,2024-04-10T13:24:00.070000
CVE-2024-26203,0,0,cf1f7e55a2051c4ba6190287f70eddfceea395e873869918ffc6ade58f52855c,2024-04-11T20:15:35.420000
CVE-2024-26204,0,0,9d80b436c75dd5f1da0507f1090d98f268aec7442d15345801e6673fedf166ad,2024-04-11T20:15:35.527000
@ -250416,7 +250418,7 @@ CVE-2024-2722,0,0,3d547fbfae7104f0dbf6c0b76ddd02751536ed8c09a63381f891ff8e3f28de
CVE-2024-27220,0,0,9e42cc406e1b16ddffbd424b62b76586911d68db1ef5ee823133d22916298517,2024-08-26T16:35:06.173000
CVE-2024-27221,0,0,0b9e9b937a1b9e138bd27417c292991204813b235d6b5129744f85ce4729872d,2024-08-27T21:35:16.047000
CVE-2024-27222,0,0,628d34a7a6bc07d71cb2e1c85581ef034de82cd46a15b7c424080a08ed0a02c0,2024-08-05T18:35:10.287000
CVE-2024-27223,0,1,283aa61b55edbc74ad1b108ccc338916be832878191513c86027a30e87f5829d,2024-12-06T18:15:24.070000
CVE-2024-27223,0,0,283aa61b55edbc74ad1b108ccc338916be832878191513c86027a30e87f5829d,2024-12-06T18:15:24.070000
CVE-2024-27224,0,0,a3ab635f09865455059477937ba40dabd5c75c049ca5d090f69e7a764213aabe,2024-08-01T13:48:20.053000
CVE-2024-27225,0,0,4066fc479d85e41bfc3a21ed1b56d094f7f8c2b2d6dbe050f5934705a2ae1195,2024-11-07T16:35:14.340000
CVE-2024-27226,0,0,09f15816885dbcfaf6362ca8e72640a49144f9653a0b3d4a746337108ce37a78,2024-08-27T15:35:10.130000
@ -250428,7 +250430,7 @@ CVE-2024-27230,0,0,88b39cd1454faf6416d3a6ba7200a6d0a1063eefbd9e9f88e3222f1d6afdc
CVE-2024-27231,0,0,d8b2d97e5660ff4673b72a0d9d6ef48029433941ff7be081ddb1db8348a72ddf,2024-11-25T16:15:12.423000
CVE-2024-27232,0,0,64ecd9a830c9b30b766707b244dd77aa970adc2152fb16fddd12d23820aced02,2024-04-08T18:49:25.863000
CVE-2024-27233,0,0,4f805b66de1371a2d4417bd116c04ac1324a59b0f4fedad25c9d0195537442f4,2024-08-05T18:35:11.120000
CVE-2024-27234,0,1,7ad82767be5d7562c531c72087745b5f3d61bf551f09b828a0cb7c43f3329dd4,2024-12-06T18:15:24.243000
CVE-2024-27234,0,0,7ad82767be5d7562c531c72087745b5f3d61bf551f09b828a0cb7c43f3329dd4,2024-12-06T18:15:24.243000
CVE-2024-27235,0,0,dda2fe44faf4df1b9d613a056bf0fb67b816bf4db9564d1ea4606c019daa6c18,2024-11-06T16:35:13.410000
CVE-2024-27236,0,0,42db3b0d6114a0f284786f77acfa731b447b1bbb3d017aeb40a796e6668e1514,2024-08-27T15:35:10.943000
CVE-2024-27237,0,0,229917a4428117370a5145466e677b0c72a40fdcb37122ac8c08e36ef5d19033,2024-03-12T12:40:13.500000
@ -251140,7 +251142,7 @@ CVE-2024-28137,0,0,f2f24b51a74a8d3642520b293e45073f0e22ba51bdc0fe09073528263c0ef
CVE-2024-2814,0,0,0af22515bc5200d8d89f02962f37a9cfdea681f234f2f44087a1e6fae040f0b9,2024-05-17T02:38:31.880000
CVE-2024-28147,0,0,92446155ccb25743782600497133fac38ce47a2ce1dd03eaddcbbd1b7ac3432d,2024-08-01T13:49:00.167000
CVE-2024-28148,0,0,47049d1db8585c3dde29a9470fb6d684b6da98e633a5abddbaaf1450f69bbb4f,2024-05-08T09:15:08.620000
CVE-2024-28149,0,0,d57757f16645c63e0c9502e4711b42f37419d20f304e87c5cfd79696154e2cc2,2024-05-01T18:15:16.697000
CVE-2024-28149,0,1,57ed6574f074778f026c6cc859bdab33a0e7bd4d9407db0a106e88c4247206d2,2024-12-06T19:15:11.663000
CVE-2024-2815,0,0,e870ad3fa73267b9278cf23f6d2369bdda6a88605b4512a729c5f6d6173abc6e,2024-05-17T02:38:31.990000
CVE-2024-28150,0,0,7ad41ca3ee884b5906efbe9177008dfe2b9b6537749141e1b193f540b662a64e,2024-11-22T21:15:17.663000
CVE-2024-28151,0,0,5283a040a6b8355ef8622825ba855afc3180ed8fc3ecee17c382e830c6c249f4,2024-10-31T16:35:11.500000
@ -253117,8 +253119,8 @@ CVE-2024-30953,0,0,6d921cd6fd90184e6ad5174bce664f22cb22e40d44f91e20fb09119d4bedb
CVE-2024-3096,0,0,08c210d34b66fd02c4ce1db2facd39aba301685ae9b186e10dfb370afa961257,2024-06-10T18:15:36.050000
CVE-2024-30961,0,0,c9ada12a169b61e64c40505812977a00095a0a0f400424d8bd1de2a85b0a9621,2024-12-05T23:15:05.030000
CVE-2024-30962,0,0,b411502f8c7d9c40f2c6322021a8d7f60a27083c329137beecd348089faf4eaa,2024-12-05T23:15:05.147000
CVE-2024-30963,0,0,32d73d73afdb1a6bc53f8ccde49d83e01efdef2d1a0d7a55d22ea356ab652a38,2024-12-05T23:15:05.267000
CVE-2024-30964,0,0,035101400b2fb915f403bd6e8cda476e9c4528498a8879163be30a9eb5b7edba,2024-12-05T23:15:05.390000
CVE-2024-30963,0,1,fb47aff0ed2c815bc469630ead38211697e148fda1c584c6381fe7c58c475400,2024-12-06T20:15:24.757000
CVE-2024-30964,0,1,360be10466f441ad70b0bae466dede38250137bb1f0e25bf624766129856cc0c,2024-12-06T20:15:24.937000
CVE-2024-30965,0,0,50c206e7e4bef60e70ad48eac02d679512969aa3c8f6bd192f7644502caa678d,2024-09-04T16:35:08.693000
CVE-2024-3097,0,0,03b3e7564267ff07f8cace13ef2c68ecb9fd2e91e4d1ffef233c9c406915f0c8,2024-04-26T15:56:40.820000
CVE-2024-30973,0,0,bbddf1428f657ee3dd8694d858bfeebf1e082677ce9eaa5b99522934461dee34,2024-08-09T15:35:03.983000
@ -258051,7 +258053,7 @@ CVE-2024-37471,0,0,d465bdcae3c1ad0d7280b371addcc2292b7e76a7a90d8614a04cd4784c1cb
CVE-2024-37472,0,0,0212378c488764d33b1d17de1bc88a5356a23ba19a78046e8c133cfbba541862,2024-07-19T17:04:42.343000
CVE-2024-37474,0,0,cf61b09860754eb2ef791cdf4ca372725ff10acc72703ca0f7e6cbc23292744a,2024-08-01T03:18:10.487000
CVE-2024-37475,0,0,94f9a2f527e1a4176c7efbb7771a8ea5cb0553ef43e7fe87b09cb3efc372e81f,2024-11-01T20:24:53.730000
CVE-2024-37476,0,0,f4f56020021f539e4e21fd6b1ce7e80b53fd7a48dfe2a10c97d67df688be64bc,2024-11-01T14:35:17.177000
CVE-2024-37476,0,1,70a287032cfd661bff7984072099f8a4cdceab398083881040e461561ca16778,2024-12-06T20:15:25.137000
CVE-2024-37477,0,0,5c146991b75b69a97416386496a8ca1d50253e138692bc76e36011913c6c31c0,2024-11-01T20:24:53.730000
CVE-2024-37479,0,0,b47f15244b7d8bdc435b7b058e1a43515a90d9355fb7c5cb51f1025055601a89,2024-07-02T12:09:16.907000
CVE-2024-3748,0,0,130f91484f33c46b6a8a1b827c41c8bedf887e9f91a42beeaa1df38ecf15e978,2024-07-03T02:06:31.737000
@ -258260,10 +258262,10 @@ CVE-2024-37857,0,0,bbbf66c5ae4e5b03452facf52d12302119ab17f8211a271346d66e2be4704
CVE-2024-37858,0,0,145fe3af0cfa4378739729061c766f5fc42f47de0fdaa3c5429a9c029f707705,2024-08-01T13:54:23.510000
CVE-2024-37859,0,0,f5d379e1ba1283dae4ab2dc1c57e5283f78e28f480e0128f7f21d0c8376c4bed,2024-08-01T13:54:24.283000
CVE-2024-3786,0,0,a963646959871b60ce1ae81d3ccf29669858a2babd4934482c95c06778cfb627,2024-11-06T15:35:17.487000
CVE-2024-37860,0,0,0cdd74cec768f72e5ca0830e81521437e124bfa1d58f0ab8f2db755aeaef4612,2024-12-05T23:15:05.510000
CVE-2024-37861,0,0,fe3f2f690a8e85b64b2406cd8a327fb379466ae3269f8785469eb4e77a9cf1de,2024-12-05T23:15:05.633000
CVE-2024-37862,0,0,dbc2ab75c7c640e30ad941869c38137084cd16f90f7e9d9354086e72153de13e,2024-12-05T23:15:05.767000
CVE-2024-37863,0,0,70b287ffd510c5117f2371350aa187159563653e328366092f47405a4bd13593,2024-12-05T23:15:05.903000
CVE-2024-37860,0,1,95ccdbea940bd74de7d77eaaecad02bb203a034e96ccd58970da85958914665e,2024-12-06T20:15:25.297000
CVE-2024-37861,0,1,6c4fbdb2182e6f899fc5072d6a4cb989830c5c935103b3be7da08b1b80e83edf,2024-12-06T20:15:25.467000
CVE-2024-37862,0,1,0888c2eb8d55ae428139b9bca66ed1349b6a584ded06bab6fd51cd37d90ac852,2024-12-06T20:15:25.640000
CVE-2024-37863,0,1,2177b83d36d7574e8b9ec3c3a97626378dd9493f9f49d3d13fef6ff57c976655,2024-12-06T20:15:25.810000
CVE-2024-37865,0,0,00a1e3f7fea3591aaf817972a94b29032e0211df514cba52a943a6d6522976a1,2024-10-28T21:35:08.833000
CVE-2024-37868,0,0,b200b5b69302bc86aab1201eed9ccbe3a2f0410aa787e7727268399cedaa1ded,2024-10-08T18:16:07.383000
CVE-2024-37869,0,0,dc1a2df6f9aff9d4f42328b451c0fe9131e20530cd415d66856f986d59187a1e,2024-10-08T18:15:54.250000
@ -258706,7 +258708,7 @@ CVE-2024-38329,0,0,515bd4f8a6975d0242eb5160bb598bf35297ce9bdbe7a3832edd58be7833a
CVE-2024-3833,0,0,d8bd7ba32ab0c5df93ed1bc71c84eca78bd804cb628236293c000739d365ad50,2024-08-01T13:56:42.740000
CVE-2024-38330,0,0,33b4b1d171beda816ad627337fb5495a328e7dcd46af2bf62178f6a78527c9e7,2024-07-11T14:53:16.417000
CVE-2024-3834,0,0,a26b5bbbf7ca8a185b9797b4c7859f6535301f1ab4b8908e1c720ae8be2c469e,2024-07-03T02:06:36.447000
CVE-2024-38344,0,1,c3f614f414d62cde3a55726244e500e4dd08719f2cd9a8082171daa986ea9b20,2024-12-06T18:15:24.490000
CVE-2024-38344,0,0,c3f614f414d62cde3a55726244e500e4dd08719f2cd9a8082171daa986ea9b20,2024-12-06T18:15:24.490000
CVE-2024-38345,0,0,52f2293d17b88d6e356144e0e15c86a25194f7d79ea68829ed7fb7a553e8b4d2,2024-07-09T16:22:44.523000
CVE-2024-38346,0,0,689d401df5aa75c70def7483ddda9de7aa5563e129adce9d2b51b58b0f05d227,2024-07-08T15:48:17.710000
CVE-2024-38347,0,0,0d1068ef932ec6d98ae8718125de6f9e1999f5db75d75126f90312b4a6428d62,2024-08-01T13:54:48
@ -259166,9 +259168,9 @@ CVE-2024-38829,0,0,ad4caa79811af6b197cbeb29379706c45076953124b05260a89dc08da6efa
CVE-2024-3883,0,0,e6bda202b9fd54c10f25f29dd8ae0cebb83b1538aee636944c2fd66bf4045fff,2024-05-02T13:27:25.103000
CVE-2024-38830,0,0,25b272dc1cf212b6cf8b44602a3d5cd0c946406c321e913898f69284c3986026,2024-11-26T12:15:18.413000
CVE-2024-38831,0,0,b5e967b8a77db6e3a77f1cd78a29b2905760b9996368a4c348bc11e2fc7704dd,2024-11-26T15:15:31.957000
CVE-2024-38832,0,0,20b1258fe878a5b3f5eaebc1c1c986ff73c4112b6f53f0ee6157f579fa8af73b,2024-11-26T12:15:18.697000
CVE-2024-38833,0,0,835bd940af739843a067d4677be9dfaaf3f1b1e91231a8f8b581ac7dca343dfe,2024-11-26T12:15:18.800000
CVE-2024-38834,0,0,fd2bab78ac4213a2e7e8847a5e2d0557c682fa7f71f78cfdc81702dc9f99d3b0,2024-11-26T12:15:18.900000
CVE-2024-38832,0,1,0493cf9f013d37851e0f742d469726bd8aa192c3712403ff0f7b7890bf101dc5,2024-12-06T20:15:25.977000
CVE-2024-38833,0,1,4362568a75fe4ff6f0b022eb6319bcf28879b08f368dc59d539bcf2b96b0e3c0,2024-12-06T20:15:26.097000
CVE-2024-38834,0,1,d1e4df2457be3688e7ecbb94c62f14ef708bf2a35a15ef98a11a7f707840deba,2024-12-06T20:15:26.207000
CVE-2024-3885,0,0,9b28a2ee85edfe77753e71858fb1438bd68a9b6ee299843f3a5752cca4753d01,2024-05-02T18:00:37.360000
CVE-2024-38856,0,0,cf2c30abb1c3c3e6b03acfa253b7bd98efa464ab76b49fddc2034ce3ce8a3be1,2024-08-28T16:15:58.043000
CVE-2024-38857,0,0,392b260a009bcf153896a24b0ca2ef35f6f5d57e012aa080627851164a4da679,2024-12-04T15:37:16.290000
@ -259216,9 +259218,9 @@ CVE-2024-38902,0,0,1c3e99761119af86bfc08c133d200d98145139b24546fb36382532918e199
CVE-2024-38903,0,0,2b94b77610c8a043c9d0ea06696528fdc7d9d24aef31329270a0121bf4f56367,2024-07-03T02:05:26.943000
CVE-2024-38909,0,0,f6a5b574aebed08039f44fd76bb05493334edfb3318746bc09e1f467a2df0529,2024-10-25T18:35:06.223000
CVE-2024-3891,0,0,f9d0b3848969a1acfea7b9a20331b02cfc9759078e69f46c5576c9e3267f4690,2024-05-02T18:00:37.360000
CVE-2024-38910,0,0,ebc004bc739f1bcbdf6ab2ec006e9516c2efa50e09ef97ce8ed7fab5713a72eb,2024-12-05T23:15:06.020000
CVE-2024-38910,0,1,9b9d56b6ca7b9b2f572abd0d1c91bd1caaf8b4489fac676a0437332f26a4a570,2024-12-06T20:15:26.337000
CVE-2024-3892,0,0,635a0a9dff99d68a800a0815fade3930f3dac436f84c87dcff7c11db25dc6686,2024-05-15T18:35:11.453000
CVE-2024-38920,0,0,ea517e5f8ffa877f4063664386ea05631967cdab9dc731afdb18891d5be134fe,2024-12-05T23:15:06.163000
CVE-2024-38920,0,1,5adb5cc1a488110dfe62e4dd7de52578c77a485f0d0671999f5f3df15147a4ad,2024-12-06T19:15:11.923000
CVE-2024-3893,0,0,8eb90c61219540666d23479f74a65575eaf5c1a0dbea88b697d9ac7cb634e024,2024-07-03T02:06:50.403000
CVE-2024-3894,0,0,ca8cdba6c6957ab6848a65692183a74921d9acddfe51bc85133b173556c88ac8,2024-06-20T12:44:01.637000
CVE-2024-38944,0,0,dc817973495a511f5a7cee16ff0ad58704d237754057f4e6272671315289d41f,2024-08-01T13:55:09.433000
@ -261582,7 +261584,7 @@ CVE-2024-4249,0,0,20dbadf05c38d413ed14f5d424310da5ffa119a0ccbbcb5b690e0c54ceac34
CVE-2024-42490,0,0,c74b5a356197cfdd591b442b14ff2431ae7b9dd31d3d19cabc69311edc084829,2024-08-23T16:18:28.547000
CVE-2024-42491,0,0,f29a442764e941cf16c1143e20ac825cd384b5c08683995678d650efdc59327b,2024-09-06T12:08:21.290000
CVE-2024-42493,0,0,62acde285327354a8bf885be4a4449e2ac155d363ca62a755a0d6560a4377c67,2024-08-29T14:24:14.373000
CVE-2024-42494,1,1,174afee03bc0f6df01c04bdcd464bd5ee2c9a29ff917f7e745d38da74ad1e872,2024-12-06T18:15:24.707000
CVE-2024-42494,0,0,174afee03bc0f6df01c04bdcd464bd5ee2c9a29ff917f7e745d38da74ad1e872,2024-12-06T18:15:24.707000
CVE-2024-42495,0,0,9abc7330eac6d6df1f12abde56401fb389a89e85bdfac6db206d32a19ef64c3e,2024-10-04T14:37:36.703000
CVE-2024-42496,0,0,82629bcd722b8cb6d341bed3916823c994361fb6b4946b9099c29ac012cbc5a4,2024-09-30T12:45:57.823000
CVE-2024-42497,0,0,6c95277a74b4240375f9e65f5c21a104fec038817af68c50a8b421844638164c,2024-10-16T20:05:09.183000
@ -262818,7 +262820,7 @@ CVE-2024-44117,0,0,f5e51fd4c1c072e4ebc183a03cfbd5abdf4c1e3554f96913f31f5eae6bad0
CVE-2024-44120,0,0,e512bb8c5b42763893890ed03b7785da148b231d68bd53abc475cbbb6b528a5f,2024-09-10T12:09:50.377000
CVE-2024-44121,0,0,bad946f7ab72ac1b9d199f1a920dd1390631dbfc9489b17da06c05da204a16aa,2024-09-10T12:09:50.377000
CVE-2024-44122,0,0,1e9fa52c3aa8426c7e5b8d77a9c61659bbf7250c9743ea15e0507a8d110f05fc,2024-10-29T17:38:18.457000
CVE-2024-44123,0,0,88d0bce5752b63476feb00eb01b30d0d91ea73a13fa7bca943baa86634d2287a,2024-10-29T17:37:15.990000
CVE-2024-44123,0,1,5e708718a9103a7844de666b77bb4fcfa45afc7a8f766a253df6e712ace1d189,2024-12-06T19:15:12.117000
CVE-2024-44124,0,0,b949c056982f734366ebf1f4c4aa8cc757f083818be7d4fc7a8adedf42e1b398,2024-09-25T15:14:13.593000
CVE-2024-44125,0,0,2a52003a3bce56ec678ccb08ea5263fde16f13ab11416a9f08770bae07d00ea4,2024-09-25T13:30:11.570000
CVE-2024-44126,0,0,c6c756dad28e92ce53f3cfa209c9ff74e0dccd52d22b87ed3fcf8ac8d7ca2520,2024-10-30T21:35:05.647000
@ -263033,7 +263035,7 @@ CVE-2024-44555,0,0,79d5d49bf1bc4597ba26a6e2f4eac2577a558d608cab5b3b630e57ceed479
CVE-2024-44556,0,0,21b8f75a124871754bd554a0be835972bd8bdd87368ef911fa1d52b55f7f8dc7,2024-08-27T14:28:03.540000
CVE-2024-44557,0,0,86b422667de9a5a113f22597ca61434642bafb87eec96c0dd71c14a0dd05cdc3,2024-08-27T14:30:17.523000
CVE-2024-44558,0,0,6d87f392eda09922944831aa9fc2790f469b514dece92bfccefe48ebd558f473,2024-08-27T14:28:17.290000
CVE-2024-4456,0,1,9e256113ce6b5f434b1029225d9b7c490634452bbac2479c1f026431fd87fe33,2024-12-06T18:15:25.450000
CVE-2024-4456,0,0,9e256113ce6b5f434b1029225d9b7c490634452bbac2479c1f026431fd87fe33,2024-12-06T18:15:25.450000
CVE-2024-44563,0,0,6dbd76e0f089d60e056938eea08be0958b9b4b0e2739be9b2567dba585143e70,2024-08-27T13:43:26.300000
CVE-2024-44565,0,0,e25f465e010d5d48f951ee0faaea27800251f5ba71d3aee72b61ca7f81604b74,2024-08-27T13:43:46.897000
CVE-2024-44570,0,0,f31dd0f16dce6578a9c7f72b7c19d2bcd61b4bcd828f5dded7771736a6590860,2024-09-12T12:35:54.013000
@ -263421,7 +263423,7 @@ CVE-2024-4520,0,0,b2949348c863aeabf77cf8262dadc8a1301ac645ed88723ebde503df8cb28e
CVE-2024-45200,0,0,c755ac93f1b17cd8efb21d298d911a4f5dcab9011db4f75e5e04cf5d33a0f2e5,2024-09-30T18:35:06.983000
CVE-2024-45201,0,0,92b8bd132a22a911d082c4796a5c2704cf98ba27382f9f8c2bc815a661909645,2024-11-25T19:15:10.473000
CVE-2024-45203,0,0,0a34ec3cf21e7526a71f11433fb5593e3ea52ee9638fd0c30ca94a57eb961782,2024-09-16T13:27:19.190000
CVE-2024-45204,0,0,48b569460e625badc45f40d0788f43dad19cb6139194ba9913a20c0d81e6f8ea,2024-12-04T02:15:05.233000
CVE-2024-45204,0,1,adbb71b3835736dd278d0dcaa1f288c0e310f8719c32941f3c17e1917b4052e2,2024-12-06T20:15:26.653000
CVE-2024-45205,0,0,4edb0b7e1f2a82b649444e0c108f731bd2574b59c0a00e0bf332375bb753b133,2024-12-04T17:15:14.330000
CVE-2024-45206,0,0,3c2daa001e3b568c09c6afd9c93d9e8a855292bcb89134693fe65e41abda9c5e,2024-12-04T02:15:05.427000
CVE-2024-45207,0,0,73e5dfa43c01499de889c141920c4cafac14ce910c2fe731c3b0acb56b6619d8,2024-12-04T16:15:25.580000
@ -263740,6 +263742,7 @@ CVE-2024-45717,0,0,39a92933b3c58f83397e6c5dc91b7e234be00faaf987aaf18eef3dfc7499a
CVE-2024-45719,0,0,b755d05d9431d88e340720fc552d851e209c5823abea3fc08fbea1207a8b8083,2024-11-22T21:15:18.130000
CVE-2024-4572,0,0,6754f54e88e479a744a4367c8d1d2577fd697a90d0783dabcb9fc508df61090e,2024-05-14T15:44:06.153000
CVE-2024-45720,0,0,9a958c282ef360c53e2ab2db366594f7b62a7ef8d528ac6998de122fd3a653b0,2024-10-10T12:51:56.987000
CVE-2024-45722,1,1,ae89bb89af203e5f8d0cdf81a432d4f4a79dd51508a5fbb8bfc59fc66405752d,2024-12-06T19:15:12.277000
CVE-2024-45723,0,0,8a64137d2dbeada641823db97f181c3d98d90c2b4b9fa7b4e31376ab6c2ceea5,2024-10-17T17:15:12.110000
CVE-2024-45731,0,0,4dda506c3647f8a5d14d9edcb8510fae60067d56ed0c446cba3d4a31a329a6ae,2024-10-17T13:09:33.017000
CVE-2024-45732,0,0,2876e913548465638fbb383e4d5a666f5e6d891028e7cfeee48d5f9d8c09f0f0,2024-10-17T13:03:52.153000
@ -264368,6 +264371,7 @@ CVE-2024-4687,0,0,5435981fd840e586246d5a6c7c954862d5332569f9e647b4965c896a6669b0
CVE-2024-46870,0,0,652ca601a7652d849ccf9f3fa227a6384ea9072535f4139d45e923bcd7c9f15f,2024-10-23T14:26:28.690000
CVE-2024-46871,0,0,4bbafc222a5b983e7eee48edc0ec35209cfa7a3a04fb16a3dfef1b1e5b5df95d,2024-10-23T16:10:48.077000
CVE-2024-46872,0,0,782a6347112bd8d3e8131c6f94bbde936c76c99b3c4577466eff75a75fa706f5,2024-11-08T15:00:42.473000
CVE-2024-46874,1,1,c0dfc70d8de673812767c6e2bc17c3f8820925917d7cbfbe737b1d17133a2fc5,2024-12-06T19:15:12.450000
CVE-2024-4688,0,0,52289ed8c0286442cd44c00a18386eec964a66f3ff263d13f6b3a47ad78257b2,2024-06-20T20:15:19.617000
CVE-2024-46886,0,0,a928062ae00bc94e4a7abf511f66b23a1126250ea4d99006bdee4b18a22b92db,2024-10-10T12:56:30.817000
CVE-2024-46887,0,0,b7a0812e4d4a8d09f6eb4da630d645c25b0d554f80d4c4a4c7b07d79f22299bd,2024-10-10T12:56:30.817000
@ -264484,7 +264488,7 @@ CVE-2024-47034,0,0,558e2a7d5a936fa44ec7effaff8334ac5e14654558ea39c45a930fd9a21cf
CVE-2024-47035,0,0,4e91a9b948b2436f3e1ce65f21bd6916987ebeb91709f80af87e58910e21de45,2024-10-31T00:05:18.113000
CVE-2024-4704,0,0,9637a93e192a5f32142e05687e31ff3688b029254561fc4728d18bbfa1666d6b,2024-07-03T02:07:57.433000
CVE-2024-47041,0,0,3bc2a3bddc8da3842b6c1f5b193d4833f879c6d95295752a7854f136b776b81b,2024-11-04T22:16:13.793000
CVE-2024-47043,1,1,ff7306b21eb859e0c607701debc2adf8fe538056615ae8e43dc87871d3e434a5,2024-12-06T18:15:24.853000
CVE-2024-47043,0,0,ff7306b21eb859e0c607701debc2adf8fe538056615ae8e43dc87871d3e434a5,2024-12-06T18:15:24.853000
CVE-2024-47044,0,0,ee5fa186fb8ea19ca537298bbe2b5e712b21f44e9ac5aca4b5f7e41e68f91755,2024-10-17T02:15:02.840000
CVE-2024-47045,0,0,f477b3cad8608c11a6f4e2c578041877872bac107a164ee977d83ddf752336b4,2024-09-26T15:35:29.950000
CVE-2024-47046,0,0,7869fbf4e097ddf562d122b002ca5484caa2f32ab0ccc92f893d14cc4f35f687,2024-10-10T12:56:30.817000
@ -264553,6 +264557,7 @@ CVE-2024-47138,0,0,c704721a239bd4cd77698e7525062ca86d6aeedbfb01e577f54af611dd536
CVE-2024-47139,0,0,0f452582d50349cfcaf670d7aa9a268535f2e93bfbde13d87a7977ed414d8f97,2024-10-16T16:38:14.557000
CVE-2024-4714,0,0,d7e9d9d95d84a12a856ae94c0b47f221a8b241db6b1f0d94ea74b84fa1b36764,2024-06-04T19:20:47.027000
CVE-2024-47145,0,0,1a35765c26b04b61b861cee47b184170021783241b94fd51efafd1127befdb57,2024-09-26T18:42:33.550000
CVE-2024-47146,1,1,06979948984679b3425322e0ca99ebcae2c7c6a221b8ac5fcb92e2101cddb172,2024-12-06T19:15:12.603000
CVE-2024-4715,0,0,8280b54df57d141f79c5c5ba7edbd4b8610f06a30ecbd5ba39cd6c268b4b3f05,2024-06-04T19:20:47.130000
CVE-2024-47158,0,0,a89bf72b8da5aa3a4da3668acb53b50c9d8d4b5e480bba3479406a7440c7d561,2024-11-06T17:10:03.857000
CVE-2024-47159,0,0,f629ab8645ae2d3b373e84498ebe22f56e42f569db9052d68376aa856c847502,2024-09-24T18:09:50.877000
@ -264855,7 +264860,7 @@ CVE-2024-47534,0,0,3fdf39e9d60bdd61b891053803d0cdd86e1d9b2f1594fae7730f1f0f0b99a
CVE-2024-47535,0,0,63a4302cce4cbc5b98965ded88b399629f71758bc7b059f3ca8923cf2603f89c,2024-11-13T17:01:58.603000
CVE-2024-47536,0,0,353df15c5abe486c0bd2000eeee4b00375b2403ebe72a10be7f49c66f18c4bd4,2024-10-04T13:51:25.567000
CVE-2024-4754,0,0,43efa3a5287d05b500ecfcf4503ad62e1b41a22939150352bf102c1b98a3511a,2024-06-24T12:57:36.513000
CVE-2024-47547,1,1,081f2a643932182c4582a662d72f550c1782b69dab411145cef30411116f0f4a,2024-12-06T18:15:25.017000
CVE-2024-47547,0,0,081f2a643932182c4582a662d72f550c1782b69dab411145cef30411116f0f4a,2024-12-06T18:15:25.017000
CVE-2024-47549,0,0,113d97e5056ed200778519e504bac77f5b27816ee70d3059de963f972da95681,2024-11-05T19:40:52.070000
CVE-2024-4755,0,0,ca5306e45de4985a027d64d4740785092288eb6abbd1ab6d1fda3377d88d4e7e,2024-07-03T02:08:01.477000
CVE-2024-47553,0,0,2212e0c73d31ee4117260b14c09959b86700d87277dc600c8b069eb02d73b59b,2024-10-11T20:04:08.623000
@ -265069,6 +265074,7 @@ CVE-2024-47783,0,0,5a9cc3d76940a89383ed74c67262d35c051dcce0550c21e752e3852ace3e6
CVE-2024-47789,0,0,5cca8aa9572eb6cd0c059882137f083cb8544427e147bc3f1f0eab6346cef001,2024-10-14T11:15:11.797000
CVE-2024-4779,0,0,7a9d6158e8d260b03b3581dd37b23bd10d59ba6243714ad236ba79968e8d9b16,2024-05-24T01:15:30.977000
CVE-2024-47790,0,0,d4701041e3b7826b48d6d13bc4c86004b58b4b8b272120def31051056a8f0260,2024-10-14T11:15:11.930000
CVE-2024-47791,1,1,0f1fb0dfb1bdffed92b5c0cf9ba2959631a433e7e6d206584d125a84516c87fa,2024-12-06T19:15:12.750000
CVE-2024-47793,0,0,9908766d9802c80c9f07e38bc1dd6d38dc8823614346066184a43b3d9b28a705,2024-10-21T21:25:36.697000
CVE-2024-47797,0,0,33c4997ae4057f3ee3a7a27f532a8c67312598a72be5d687fb49b6e9959476d3,2024-11-06T15:24:53.210000
CVE-2024-47799,0,0,de5bae16ec2678599ddf765fb89319547d13abf6f56de5efb31661988db58076,2024-11-12T13:55:21.227000
@ -265469,7 +265475,7 @@ CVE-2024-4869,0,0,c966893d60f3d2b834063ff6490a8006deca39b71769e89345f5be1133a2f1
CVE-2024-48694,0,0,2e009f14e5cbf39d16504c271f784eb7e84a1c73a35a7c09efc86b05213cdcaa,2024-11-19T21:56:45.533000
CVE-2024-4870,0,0,34dc62fe0d9ee09fd087b0b9ccdcdae4c15125668207018dedb4b3cfd451baf0,2024-06-04T16:57:41.053000
CVE-2024-48700,0,0,498b6c948c1fef5839fe542228c950391a625f976434be0997a68c56eb15e0ef,2024-10-29T19:35:24.643000
CVE-2024-48703,1,1,cbb963c725ee16afc9bb3e0a7bba740b511791c150428794c0c5ac739f44f0d0,2024-12-06T18:15:25.170000
CVE-2024-48703,0,0,cbb963c725ee16afc9bb3e0a7bba740b511791c150428794c0c5ac739f44f0d0,2024-12-06T18:15:25.170000
CVE-2024-48706,0,0,e747f2815f744d2574a2c914482979e92abcb175ce526e54d28ad054b049d395,2024-10-25T18:58:35.380000
CVE-2024-48707,0,0,fd9b1d38f6684577739099dad2b9e541d52b6b52c575d76793119672c0ee0220,2024-10-25T19:11:54.310000
CVE-2024-48708,0,0,117d10f4a9b96b209a6f5e6f3097728d8a65264e256ad998e6bda4d438b21882,2024-10-25T19:10:08.457000
@ -265546,19 +265552,20 @@ CVE-2024-48845,0,0,a9adabe8c1d84c64215d49bf6bd399f5996da7b5bdf7d692f3c99c7e67e80
CVE-2024-48846,0,0,ccc7c46d4f5e64480770367787fe85ce80d70171b9f36ac6d92b68817ba9cc26,2024-12-05T13:15:06.983000
CVE-2024-48847,0,0,21b8361accc5c1e859a7b7eeaa84b6d272d3a8ba5bfec01e1eade8f83592c364,2024-12-05T13:15:07.150000
CVE-2024-4885,0,0,2608f2aa7fb5189467bda7bb610d4e03f1b43256b775a84e60ba9a3b8ac9b260,2024-09-06T22:44:27.840000
CVE-2024-48859,1,1,6dbe7c77c0dd21b21da6ae254d415ac65906e964dbc1b362bf9cec4eb3d58f55,2024-12-06T17:15:08.350000
CVE-2024-48859,0,0,6dbe7c77c0dd21b21da6ae254d415ac65906e964dbc1b362bf9cec4eb3d58f55,2024-12-06T17:15:08.350000
CVE-2024-4886,0,0,d27ca09c7d3a0108a7cfa4692eb479eab6127452085468fbf17d7a45144cc1ee,2024-06-11T17:14:56.323000
CVE-2024-48860,0,0,fce4ab90de3f31aa417781e2a22f57a29767d4462689a48ef32fb1b2a5d6d0ef,2024-11-22T16:15:28.337000
CVE-2024-48861,0,0,50e1cc3bd3f31422b5f2c9e47aa2a056da5a94b30ecf7b586667714f0a5b09dd,2024-11-22T16:15:28.483000
CVE-2024-48862,0,0,76b95a0a77ce0ef631a469fbe3d231a7804e0bfa2c6d983bf85a900faf0f995b,2024-11-22T16:15:28.623000
CVE-2024-48863,1,1,d914642cc6d776659b184189597c528e8d013e4f66705329b05a06774dde5083,2024-12-06T17:15:08.533000
CVE-2024-48865,1,1,748981eb277522820a55c89200ba3381718596b4a6d024a29ae18a13cddf122b,2024-12-06T17:15:08.653000
CVE-2024-48866,1,1,e178d391d79ff60f89e93eb969450b2ca84f2cf3ab5dcdeb44b3ced7f28f9379,2024-12-06T17:15:08.800000
CVE-2024-48867,1,1,c24b894cbb0d9e167e34009f58850fd60856e1c8d3699d6a2cfc3c928b85d3e4,2024-12-06T17:15:08.940000
CVE-2024-48868,1,1,41f17ea2659971b245068f0a103eb545185fe33239be1a650c24f0f5a90d5da2,2024-12-06T17:15:09.063000
CVE-2024-48863,0,0,d914642cc6d776659b184189597c528e8d013e4f66705329b05a06774dde5083,2024-12-06T17:15:08.533000
CVE-2024-48865,0,0,748981eb277522820a55c89200ba3381718596b4a6d024a29ae18a13cddf122b,2024-12-06T17:15:08.653000
CVE-2024-48866,0,0,e178d391d79ff60f89e93eb969450b2ca84f2cf3ab5dcdeb44b3ced7f28f9379,2024-12-06T17:15:08.800000
CVE-2024-48867,0,0,c24b894cbb0d9e167e34009f58850fd60856e1c8d3699d6a2cfc3c928b85d3e4,2024-12-06T17:15:08.940000
CVE-2024-48868,0,0,41f17ea2659971b245068f0a103eb545185fe33239be1a650c24f0f5a90d5da2,2024-12-06T17:15:09.063000
CVE-2024-4887,0,0,a9fcb128c464af9b649411220acdd6815488462c8e19ba3fbbc0069b693c8d04,2024-10-29T19:52:44.863000
CVE-2024-48870,0,0,b84b2a0a996d006ee4f5fea8401898b5086223eb9bced7a7565798c7f43b1d69,2024-11-05T19:34:38.287000
CVE-2024-48871,1,1,d8d57074234f1bf2940ee6f4e89a8459a4126d030b25c54a1289e01a065e9f8e,2024-12-06T18:15:25.267000
CVE-2024-48871,0,0,d8d57074234f1bf2940ee6f4e89a8459a4126d030b25c54a1289e01a065e9f8e,2024-12-06T18:15:25.267000
CVE-2024-48874,1,1,2dbdd0c95248a9e04dd083db72e55dbcae0e439c376f2d82f69a2b10511b4470,2024-12-06T19:15:12.933000
CVE-2024-48878,0,0,2b15f82c5be65c88d261c3882a75397babc580305d6a252ad1dbf2de5b50020f,2024-11-05T19:44:58.650000
CVE-2024-4888,0,0,ad5e456877e6c4225b3f983ebfcea1f0af64a03667e43f1cd6a0842bed4216c0,2024-11-03T17:15:14.137000
CVE-2024-4889,0,0,98c988bc305180dfde4233cdb25b83940a2a23ecd5fc7825e58f1cc0fbfe5628,2024-10-15T19:00:09.633000
@ -266674,11 +266681,11 @@ CVE-2024-50381,0,0,cc4c78182ccb5412150348a074c0f3fe64b48452294aba2fc4de16da81547
CVE-2024-50382,0,0,f0709ea17e5f95032091a174ec66193a9596281fe9af192634610c6cbe74c173,2024-10-25T12:56:36.827000
CVE-2024-50383,0,0,e2190fcc52d7d22ac332b0c05a25a337fdc4e67265af4d4eac38727251637b62,2024-10-25T12:56:36.827000
CVE-2024-50386,0,0,e8a2dfb379d3c33fde3d10d50a34e7ed2697dcee8b987f61d477faa743f65676,2024-11-12T15:48:59.103000
CVE-2024-50387,1,1,6a0b3d908f67c59fbcba406812d1e4c1f6c49049baa6f0c482ebf4caab1da676,2024-12-06T17:15:09.247000
CVE-2024-50388,1,1,9c7c3470c31ad574d772d29b68ded571ac6b9408c223cd85592f4bd226b0f45f,2024-12-06T17:15:09.373000
CVE-2024-50389,1,1,727e4186c62449349a98338cc28c23d49f0a3b834ffa3beaf41a2390bc613459,2024-12-06T17:15:09.510000
CVE-2024-50387,0,0,6a0b3d908f67c59fbcba406812d1e4c1f6c49049baa6f0c482ebf4caab1da676,2024-12-06T17:15:09.247000
CVE-2024-50388,0,0,9c7c3470c31ad574d772d29b68ded571ac6b9408c223cd85592f4bd226b0f45f,2024-12-06T17:15:09.373000
CVE-2024-50389,0,0,727e4186c62449349a98338cc28c23d49f0a3b834ffa3beaf41a2390bc613459,2024-12-06T17:15:09.510000
CVE-2024-5039,0,0,d4eca04aa1b7f16d8be388592f13108d7bb098b959dcbbbcd1cb04ce7429f2b9,2024-05-29T15:18:26.427000
CVE-2024-50393,1,1,8fca2961983dcaf15cf316a1efe7514ec918c4014162f4b5ecb0b9a9d042196c,2024-12-06T17:15:09.637000
CVE-2024-50393,0,0,8fca2961983dcaf15cf316a1efe7514ec918c4014162f4b5ecb0b9a9d042196c,2024-12-06T17:15:09.637000
CVE-2024-50395,0,0,44a8bd55d56964d49e213e43af6eecdeb7e6702f1cb149a4de668a73f48488cd,2024-11-22T16:15:32.417000
CVE-2024-50396,0,0,5adfd4e67a8212c6ecb7ca74d795f06b94f687df693a6423df3758db490e4aa7,2024-11-22T16:15:32.540000
CVE-2024-50397,0,0,46fdbe59e96a8a40ad6c2294fd4c78a24e211f2f4e8facd38f9cc902e850ea8e,2024-11-22T16:15:32.700000
@ -266687,9 +266694,9 @@ CVE-2024-50399,0,0,e903478d441032d0386af5436dbc2525cebc341da32d94ea6898c02580cfd
CVE-2024-5040,0,0,28e80b4d31908c888f58e8aabf481f59f60dc445c02b92b96b8990cba6ed3432,2024-05-22T12:46:53.887000
CVE-2024-50400,0,0,d5226d6dd7648d87c3bc01b3ceb2e3f08d4a06fd73c00bf62c5723c142d1153c,2024-11-22T16:15:33.157000
CVE-2024-50401,0,0,2e298f2fdf993c626b98aceb2b7ca95adafb0e005556bbc0fd766fcc3da02d76,2024-11-22T16:15:33.300000
CVE-2024-50402,1,1,5af30813f384ec4c9d2217c99948a20e3393d4f2e88e5dd47b5ea028324ceb1c,2024-12-06T17:15:09.757000
CVE-2024-50403,1,1,26ed8fdf38b0d4e40dbb2bd2d08a06028e67faaabb7350daf754c787f6d97361,2024-12-06T17:15:09.900000
CVE-2024-50404,1,1,c26246bcc85902f0a605c118b5860ed1f6c78e689fcd0e5666bae790ab4bd108,2024-12-06T17:15:10.043000
CVE-2024-50402,0,0,5af30813f384ec4c9d2217c99948a20e3393d4f2e88e5dd47b5ea028324ceb1c,2024-12-06T17:15:09.757000
CVE-2024-50403,0,0,26ed8fdf38b0d4e40dbb2bd2d08a06028e67faaabb7350daf754c787f6d97361,2024-12-06T17:15:09.900000
CVE-2024-50404,0,0,c26246bcc85902f0a605c118b5860ed1f6c78e689fcd0e5666bae790ab4bd108,2024-12-06T17:15:10.043000
CVE-2024-50407,0,0,4fb5f00a58beefd4cfac77c8419361c961ad849f2db4f958a95f873505b783a5,2024-11-07T20:28:22.860000
CVE-2024-50408,0,0,42895de3e084cedaf6647f131c47bd546b78f0bd37cacbb2a46053fdc5504c96,2024-10-29T16:01:08.447000
CVE-2024-50409,0,0,decf8c1f911e116f8cd8eaed54dfebb80d0d98a1eb5c9f1827ad8919ae8e2e9d,2024-11-07T20:28:43.577000
@ -266910,7 +266917,7 @@ CVE-2024-50667,0,0,0dcbd7b35b311fe7a681d780dcbe2293327603709e31a27594acb760866d0
CVE-2024-5067,0,0,7a5f09523c1a14d6651905f1f8853395c32eebb526caa99a81fddc9a443e16ea,2024-09-05T17:29:32.287000
CVE-2024-50671,0,0,99782c17088a8d91d172d01f5a082085329526fd6f7189288ae0f91a8aaa1a9a,2024-12-04T17:15:14.860000
CVE-2024-50672,0,0,85b0d6db9be373a6fa69359f08bb412793e42f226dea70f6b5078fe3734ab9e1,2024-11-27T17:15:12.563000
CVE-2024-50677,0,1,54ff67392f620dccd9eeb53d31061bc888e708182d6ec73491b20cd570e10405,2024-12-06T17:15:10.180000
CVE-2024-50677,0,0,54ff67392f620dccd9eeb53d31061bc888e708182d6ec73491b20cd570e10405,2024-12-06T17:15:10.180000
CVE-2024-5069,0,0,9472ccb93cc67e368452ccbd7690fcdac2e9c6bf3a0a4c1febdda7b23dc05b96,2024-06-04T19:20:58.080000
CVE-2024-5071,0,0,1e84a840bf7fe6d05a333c61daff03721e2399762594abd260e8b415b74d49eb,2024-10-28T21:35:22.430000
CVE-2024-5072,0,0,85aed93503872c17702aba727bb062c3ccc667233546a70047ce6a70e5d2f498,2024-11-19T22:35:11.960000
@ -267155,7 +267162,7 @@ CVE-2024-51366,0,0,8cb37b642efd94f1ef2cb009c97c3b6b6785b34318fa56f7821210d8849df
CVE-2024-51367,0,0,321834f3c68e231d48212ed0455e22a6133cdcee14f287745838cf2ad31fdf76,2024-11-27T17:15:13.207000
CVE-2024-5137,0,0,1c94e90fa849c62df03c5c4f490c71de8dac579e548f5eda16234216f611cd2a,2024-06-04T19:21:01.370000
CVE-2024-51377,0,0,cf00c0a6e7d0ac48895095961c732d7f23ec2a7e49679df67603156d82aefffb,2024-11-14T23:23:52.997000
CVE-2024-51378,0,1,60b518476e0f52f1f42de1d9edd060a172f8f183ad7a51b636d39c5e7781b145,2024-12-06T18:17:17.377000
CVE-2024-51378,0,0,60b518476e0f52f1f42de1d9edd060a172f8f183ad7a51b636d39c5e7781b145,2024-12-06T18:17:17.377000
CVE-2024-51379,0,0,2ac9e22a4ada4c046a62bb7cfce4898a690b6639726f7e96ec64275e3571bb6f,2024-11-06T18:17:17.287000
CVE-2024-5138,0,0,47c03094386326d2315f3415dc7d3ef94b00cbe65c94e42ace003fc1a8714791,2024-09-06T20:35:18.950000
CVE-2024-51380,0,0,f14cbfd3bfbc558498abdac43f5bd2dd3434adc287319fdcc829b18876bf6370,2024-11-06T18:17:17.287000
@ -267429,7 +267436,7 @@ CVE-2024-51720,0,0,d935c89d678e6c2465c73b44d2acf8e765a514a71ed8384e14cba8904616d
CVE-2024-51721,0,0,180a180febf9a6891635b908522e8114d1418c02626388536e7361dbc23f9485,2024-11-13T17:01:16.850000
CVE-2024-51722,0,0,989ca169c6c454e742dc9963e9f58bdb1051de913d3f85c7e971d36fba8be826,2024-11-13T17:01:16.850000
CVE-2024-51723,0,0,396a4757f193559d2a6f1b55a74b8b296d1e7f05a9e82fc3b3e447007f68add4,2024-11-25T19:15:11.050000
CVE-2024-51727,1,1,2e8cc5de30f7e735c132767cc5298500934c1a30f75e63a8d70cdf72fd95df2a,2024-12-06T18:15:25.580000
CVE-2024-51727,0,0,2e8cc5de30f7e735c132767cc5298500934c1a30f75e63a8d70cdf72fd95df2a,2024-12-06T18:15:25.580000
CVE-2024-5173,0,0,e808cbd0ff507575dfa32503bcc3a2123c9461298f1a4a4ef8cd294367da6464,2024-06-26T12:44:29.693000
CVE-2024-51734,0,0,1cd13d8635d39c437cbb33b350735ec8f4fced2309825670ef2275f584df030b,2024-11-05T20:35:26.167000
CVE-2024-51735,0,0,4d68a755141918a79130284871e942292c9f37924aba0b94103b08a16b1df114,2024-11-06T18:17:17.287000
@ -267755,8 +267762,9 @@ CVE-2024-52316,0,0,ff532393fbb3fe055624e3ec9b4317af0a9f5c80b8d099f274ce380979ad2
CVE-2024-52317,0,0,8dd9cf0b2675d0151da3af6e2ac3dfaef7e6c1fd135283d8e3e44d96c5be783e,2024-11-18T17:11:17.393000
CVE-2024-52318,0,0,2bba437e59239c6e36ab9227be3e173d0f3c7cc38d614e024ac840e507a6b100,2024-11-18T17:11:17.393000
CVE-2024-5232,0,0,8d68905f3b69b3dadb32694d2c73f30dc32ad3c794d56bacf5b1c8bfed3d3bb6,2024-06-04T19:21:02.890000
CVE-2024-52320,1,1,6062509fc208a00daf069ed5c4dcacc7c699ea7bde09213a5af6a89b7e432764,2024-12-06T18:15:25.737000
CVE-2024-52320,0,0,6062509fc208a00daf069ed5c4dcacc7c699ea7bde09213a5af6a89b7e432764,2024-12-06T18:15:25.737000
CVE-2024-52323,0,0,4140a8efee2487f8a0ab9781f1095192b3a647c23a2a9eaba3cf214b9a3b68db,2024-11-27T15:15:26.377000
CVE-2024-52324,1,1,1c9fd5841c1371d044ac7eed6aa97c8a96ef6826454c3d2bf39df9a8738b4dd8,2024-12-06T19:15:13.083000
CVE-2024-5233,0,0,d230ff373762a089849cb791769c151d4d1eb1a364270894bffa0dbac945e679,2024-06-04T19:21:02.993000
CVE-2024-52335,0,0,67cb6fd051960e0d43068da517ea954ddbbef4d3acfef3df39a8dfefdedc4271,2024-12-06T14:15:21.230000
CVE-2024-52336,0,0,dd607d54a19f06d9586ad47f8dcb31a3a661a8cc06227fd4e6ebe7bf5d6da0a8,2024-12-05T14:15:21.663000
@ -267974,7 +267982,7 @@ CVE-2024-52552,0,0,2f96ac448bf9b00ee8139fe2b1f83755e1d5e7ee62e44cc3e0f2925f12d3f
CVE-2024-52553,0,0,11348c28b862f60d8b3c8dc11ab0fb5f1e53e1358b82b1f8a97199c0de1f5907,2024-11-15T14:00:09.720000
CVE-2024-52554,0,0,6589eaee43c4794afc2869f1e1fb69f264d40d3a38b215d2e67a517b5a3abbef,2024-11-15T13:58:08.913000
CVE-2024-52555,0,0,c97d8ff69d857d692c46704b7ff49ed428a5a26328d189c8729b526799d5895f,2024-11-18T17:11:56.587000
CVE-2024-52558,1,1,8cac690cf76c334f27661c083286128d1e25d1df7e898ac18ce84c031446f9fc,2024-12-06T18:15:26.007000
CVE-2024-52558,0,0,8cac690cf76c334f27661c083286128d1e25d1df7e898ac18ce84c031446f9fc,2024-12-06T18:15:26.007000
CVE-2024-5256,0,0,c0c79be075ef53b66bd4c726b840e366d70c6f0c56013178c0440e2e2bf91c1e,2024-09-24T18:41:40.007000
CVE-2024-52564,0,0,18983955880ef907ed28cbb37a105d98746b8b276ab26ada4169cdb5d146ec41,2024-12-05T10:31:40.663000
CVE-2024-52565,0,0,fac10903d391ff827ff014e5a95deca40d1f2e18da523c49b30be0512dcf1829,2024-11-20T14:33:29.197000
@ -268329,14 +268337,14 @@ CVE-2024-5364,0,0,96afe929167b2de1681dda607a064227a5b629af3adb1987caaf0917b62b92
CVE-2024-5365,0,0,4b68a39efcc7d1fdd266d085800e02f841a36aae12ede01463956a125c285501,2024-06-04T19:21:06.587000
CVE-2024-5366,0,0,ebdb50e85f32d3970264d5045d82ce95c8965c12926ca2c779990bb15b24ffc0,2024-06-04T19:21:06.690000
CVE-2024-5367,0,0,e1fb712fa137b32c2cb97597a93996bde7ebc629cee38f14d6c04ed9e1154407,2024-06-04T19:21:06.783000
CVE-2024-53672,0,0,6d3fdada6b3ab91d641b2928f61fe9c334e2d4e70404775528bd633b7420d1ae,2024-12-03T21:15:07.990000
CVE-2024-53672,0,1,c034dac4c4637a95856788fb40ca70c5483331e0a98b00ebbe100e048ed73860,2024-12-06T20:15:27.883000
CVE-2024-53673,0,0,661b6e58e03fb62c2aa1ecc993b2257004bc984a0c70a3930af9e7eaf463bd3b,2024-11-27T16:15:14.783000
CVE-2024-53674,0,0,8a5c79f209c5cbb54f78c6e00b940dec235442e0d5729a2a400739bbcabd981c,2024-11-26T22:15:18.713000
CVE-2024-53675,0,0,01989df42cc3673d2d670cddd166ccee1a501522f5e01720638d33a9f30efa8c,2024-11-26T22:15:18.990000
CVE-2024-53676,0,0,f7ef49b888a4eed0585ba7b9f7899002a769200a6ac0008e5a7b61bb2e49d171,2024-11-27T01:15:05.250000
CVE-2024-5368,0,0,769eef522c880c8dc2093ffee3167938a54b59c296f29ac57c1d46dc08bc9b95,2024-06-04T19:21:06.887000
CVE-2024-5369,0,0,29d3079c2fa6a7da6972686f223f9055b777de966536d115ae3b502886660c79,2024-06-07T20:15:12.487000
CVE-2024-53691,1,1,b02dcac6ac33cf1ecee08a76e847ef09817a29f039984322c9675d4acf93429b,2024-12-06T17:15:10.520000
CVE-2024-53691,0,0,b02dcac6ac33cf1ecee08a76e847ef09817a29f039984322c9675d4acf93429b,2024-12-06T17:15:10.520000
CVE-2024-5370,0,0,8d5901c25d38686248547e2a8832556411ad40480084c4770850db2b44d5a57a,2024-06-04T19:21:06.980000
CVE-2024-53701,0,0,f4abe9649c710b202319e22139a56475c551199e0e3e57f7ccc2eaf6ea401cc5,2024-11-29T06:15:07.327000
CVE-2024-53702,0,0,fefd61abb610cbd4ae8298ddd1a5340c18b419e8dd9d9d4a1829bc4f85421878,2024-12-05T16:15:26.077000
@ -268489,8 +268497,8 @@ CVE-2024-53899,0,0,ca94e39391001349829a2f872ca5d1d0c6ef0f2f07a2a901a4f8c2f87ada2
CVE-2024-5390,0,0,577e03013c579fd5ea5c07b95a092cd4d32be3fa4130d25da9e61ffe468007ab,2024-06-04T19:21:08.020000
CVE-2024-53900,0,0,0f97d412cd34f05b1034ca5cdea562aa28c01c093581f7334d64c64b3b6f83bb,2024-12-04T04:15:04.573000
CVE-2024-53901,0,0,52cbcc170c451b305e90c5f0e2a88558d86a9bc5446c93579e76a9aa43a0081d,2024-11-26T19:52:01.653000
CVE-2024-53907,0,1,680e37726bc304c47af65c929b193be4e85ff36fd833b9d81afa753ed60cff3f,2024-12-06T17:15:12.007000
CVE-2024-53908,0,1,aa03eec4994e72c356aa8b598643fc5257caa885058f4489a446dab5470fbfa2,2024-12-06T17:15:12.350000
CVE-2024-53907,0,0,680e37726bc304c47af65c929b193be4e85ff36fd833b9d81afa753ed60cff3f,2024-12-06T17:15:12.007000
CVE-2024-53908,0,0,aa03eec4994e72c356aa8b598643fc5257caa885058f4489a446dab5470fbfa2,2024-12-06T17:15:12.350000
CVE-2024-53909,0,0,f496b480d61110aca5ba4afaa8506ac48e157eddeacabdc9f46723c429d54992,2024-11-29T20:54:47.700000
CVE-2024-5391,0,0,a7c29f93c1b76aed47351138468a6c5b251b9f9a4ad39cf688118719a36ed1c7,2024-06-07T20:15:12.687000
CVE-2024-53910,0,0,b42cc0f8352ffa3f12c2a867329f0f66efd78292ca02cc30bc8a41459e9297ac,2024-11-29T20:54:55.080000
@ -268567,7 +268575,7 @@ CVE-2024-54137,0,0,c52dc1a700c39db2c2a7dc26eb7ebeb074edff80b1086b0f3730e91009071
CVE-2024-5414,0,0,08acc305e6c9bea4a9589fa3dba157ea62649fb0f8c0ee74aad6ddc09386f1c2,2024-05-28T14:59:09.827000
CVE-2024-54140,0,0,8089c07e8d24ae695a65dc50ad4895d2855db2c27552ab3d877fefc4a4616391,2024-12-05T22:15:20.400000
CVE-2024-54141,0,0,cccdffdc8f5f1070d803102d25f081a5358e87a7ff5e92c23b2c390688c3c88f,2024-12-06T15:15:09.530000
CVE-2024-54143,1,1,0cb9e25bfd6b776e292df2dd338185d8cbf760b38994745321b9c5de3cd5059e,2024-12-06T17:15:12.687000
CVE-2024-54143,0,0,0cb9e25bfd6b776e292df2dd338185d8cbf760b38994745321b9c5de3cd5059e,2024-12-06T17:15:12.687000
CVE-2024-5415,0,0,d8ba178a70f3cfb2a3911a07d12ef045cc2ca261b5b8d85db5edc9c9636eef1e,2024-05-28T14:59:09.827000
CVE-2024-54153,0,0,fe748b404c05f0f3b478581c42b273c9674060ff9a7f772d2c51f053c33a523f,2024-12-04T12:15:19.853000
CVE-2024-54154,0,0,90e5f722e743af34caa289867c96183a78347ae32cd2d8a629d65a02c19e6b39,2024-12-04T12:15:20.047000
@ -268649,9 +268657,9 @@ CVE-2024-5473,0,0,7a9289264d1a834c0b8e9151c353ddcb7a22a22f6b7d360897c02053aaaeb8
CVE-2024-5474,0,0,20b2c41a331598795f754fc38fbdf69c26a3bdc540877e8ec1d3dfd8d963cecf,2024-11-15T17:00:35.697000
CVE-2024-54745,0,0,149e668d67e2ee220311de22f3198ab71254f215d4a9fda2f3e71cc0870cfc51,2024-12-06T16:15:22.787000
CVE-2024-54747,0,0,7f7ac262b9ec7b55931e0937131abeaf8ddbaf8f39f3996b2767aa21818fdec0,2024-12-06T16:15:22.893000
CVE-2024-54749,1,1,60c5d58a38ce5b1b844dc93f7d24310fe1da8cc65902ed7376739adbcef51199,2024-12-06T17:15:12.983000
CVE-2024-54749,0,0,60c5d58a38ce5b1b844dc93f7d24310fe1da8cc65902ed7376739adbcef51199,2024-12-06T17:15:12.983000
CVE-2024-5475,0,0,e09a66bd4d026df38a62a9d0642b82f2a5b9bf49c6a2d9e0e1e141414790fdd3,2024-07-03T02:08:58.050000
CVE-2024-54750,0,1,e8c5c7ee4c0815bc9ca8d745cba9ee22458b717920032c223e5c213761edebc0,2024-12-06T17:15:13.300000
CVE-2024-54750,0,0,e8c5c7ee4c0815bc9ca8d745cba9ee22458b717920032c223e5c213761edebc0,2024-12-06T17:15:13.300000
CVE-2024-5478,0,0,c601a39452cb705e9035daa72131a8a960693dee4deccdae668f9ad5d8466d4f,2024-07-19T18:29:50.137000
CVE-2024-5479,0,0,7bf7a94732a4ce28b83209c9d21f799503dcb5933696ba21b8f4bc98737c6d69,2024-07-09T18:19:14.047000
CVE-2024-5480,0,0,dcddee05a122e48deec7dd054d03a98cfc3767234733af70ab63ade31364815f,2024-10-02T16:15:10.913000
@ -268701,7 +268709,7 @@ CVE-2024-5523,0,0,d7a88b58421b5d1ae546562c97be2066f98eb204a278a9729ed09f63f682e1
CVE-2024-5524,0,0,acc6c718843a634b3681eccc60375ca60bf82b8427b94da2351e444fa46af424,2024-05-31T13:01:46.727000
CVE-2024-5525,0,0,02c49ace47b04c4d76443f16f3ee0a6fe51259c43b6dd84bf29c79a7efe72454,2024-05-31T13:01:46.727000
CVE-2024-5526,0,0,60bf48d4ea40ca252e5afebf1dc1ad6e5a4db01756ddf2bd31cc94e151a8720b,2024-06-11T17:25:55.677000
CVE-2024-55268,1,1,5815256b8e419074b7aab8269ee552c3d91f4b9bc4fce363634cc58739f7ce61,2024-12-06T17:15:13.690000
CVE-2024-55268,0,0,5815256b8e419074b7aab8269ee552c3d91f4b9bc4fce363634cc58739f7ce61,2024-12-06T17:15:13.690000
CVE-2024-5527,0,0,331ae87f67986356dc980ea3627872b6fdf17356300466b2fa99a93693833df1,2024-08-16T20:24:34.470000
CVE-2024-5529,0,0,937974f4dc8452080813e8845278bacd700ec1506795ce300b5e02849590121d,2024-07-25T15:21:02.647000
CVE-2024-5530,0,0,c11f1d7738a3ef2fbe260923ece5c37664d50f681ba992e1f901b970619d3d58,2024-06-11T13:54:12.057000
@ -269669,7 +269677,7 @@ CVE-2024-6596,0,0,8001cefbd18b27b44dffd25d89889cfeadffdcc6d2b877cab97cdf4b131700
CVE-2024-6598,0,0,fb802128b1cfc176540749693b684b4374936099ab1c7948c1ec819266291908,2024-07-09T18:19:14.047000
CVE-2024-6599,0,0,6a69a16a0a8781527f95db9310983c42c357e28a72f780fd79d80c9654364b86,2024-07-18T12:28:43.707000
CVE-2024-6600,0,0,d38b8e15b440ec379e5d4dcf9d0495a2b72fd02b3eb8c13111cb9109e149894f,2024-10-29T20:35:38.603000
CVE-2024-6601,0,1,eded72d3e710f3b0e57e4ae9a4dbc32b9eafdb732a3580497d546896b6e588ae,2024-12-06T18:15:27.460000
CVE-2024-6601,0,0,eded72d3e710f3b0e57e4ae9a4dbc32b9eafdb732a3580497d546896b6e588ae,2024-12-06T18:15:27.460000
CVE-2024-6602,0,0,c299be732b5faae250c40cde3291efaa02e222cbecd5822e3c0ccdb13fb63ebe,2024-11-26T14:15:21.740000
CVE-2024-6603,0,0,69cec991ec6c96faca0e6549878f06a74d4f5b721edfdd20399a8cd286528c4f,2024-07-16T18:15:08.990000
CVE-2024-6604,0,0,9069e1e4303827c6bac2a3f980520353e2df4612754e7a70e6afd1b8541d78f4,2024-11-12T16:35:25.143000

Can't render this file because it is too large.