mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
Auto-Update: 2024-10-17T14:00:53.819888+00:00
This commit is contained in:
parent
39c208b358
commit
cdec5d53af
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2017-18356",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2019-01-15T16:29:00.257",
|
||||
"lastModified": "2019-02-07T19:35:58.877",
|
||||
"lastModified": "2024-10-17T12:32:31.593",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -85,9 +85,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:automattic:woocommerce:*:*:*:*:*:wordpress:*:*",
|
||||
"criteria": "cpe:2.3:a:woocommerce:woocommerce:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "3.2.4",
|
||||
"matchCriteriaId": "155DD7C3-748F-4D46-B6B6-F2BB86760619"
|
||||
"matchCriteriaId": "186F1844-20C8-4475-B801-D713E2FEE425"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2018-13297",
|
||||
"sourceIdentifier": "security@synology.com",
|
||||
"published": "2019-04-01T15:29:00.827",
|
||||
"lastModified": "2019-10-09T23:34:20.980",
|
||||
"lastModified": "2024-10-17T13:54:41.787",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -115,9 +115,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:synology:drive:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:a:synology:drive_server:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "1.1.2-10562",
|
||||
"matchCriteriaId": "A269D287-113A-4504-8B3D-F299B91C1220"
|
||||
"matchCriteriaId": "11EC64B0-74E4-41A0-BED5-1DF5C9E6AB72"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2018-8910",
|
||||
"sourceIdentifier": "security@synology.com",
|
||||
"published": "2018-05-10T13:29:00.343",
|
||||
"lastModified": "2019-10-09T23:43:01.007",
|
||||
"lastModified": "2024-10-17T13:54:41.787",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -115,9 +115,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:synology:drive:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:a:synology:drive_server:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "1.0.1-10253",
|
||||
"matchCriteriaId": "38742A91-29F5-4488-B1BF-33912B49F935"
|
||||
"matchCriteriaId": "463D420A-07E0-442E-979D-9A33F35AE655"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2018-8921",
|
||||
"sourceIdentifier": "security@synology.com",
|
||||
"published": "2018-06-01T13:29:00.267",
|
||||
"lastModified": "2019-10-09T23:43:02.630",
|
||||
"lastModified": "2024-10-17T13:54:41.787",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -115,9 +115,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:synology:drive:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:a:synology:drive_server:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "1.0.2-10275",
|
||||
"matchCriteriaId": "694FCEA4-413A-4819-86BD-30CC4FE64CF6"
|
||||
"matchCriteriaId": "F7B044AC-0FEC-43E9-9DE1-4BA205270B53"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2018-8922",
|
||||
"sourceIdentifier": "security@synology.com",
|
||||
"published": "2018-06-01T13:29:00.313",
|
||||
"lastModified": "2019-10-09T23:43:02.770",
|
||||
"lastModified": "2024-10-17T13:54:41.787",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -115,8 +115,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:synology:drive:1.0.2-10275:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7696CE11-7632-4F2F-9800-8AD88B44E8DE"
|
||||
"criteria": "cpe:2.3:a:synology:drive_server:1.0.2-10275:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DDA59658-D28C-4738-AAD3-02AB8AF74F6C"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2020-28129",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2020-11-17T21:15:12.957",
|
||||
"lastModified": "2020-11-25T15:24:18.097",
|
||||
"lastModified": "2024-10-17T12:39:41.690",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -85,8 +85,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gym_management_system_project:gym_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "53D108B3-1095-42CE-89BC-32C4805EC803"
|
||||
"criteria": "cpe:2.3:a:adrianmercurio:gym_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "19A6E4EB-8256-48FE-BEAC-DFF12DF7D862"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2020-29288",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2020-12-02T22:15:10.790",
|
||||
"lastModified": "2020-12-03T01:34:48.290",
|
||||
"lastModified": "2024-10-17T12:39:41.690",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -85,8 +85,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gym_management_system_project:gym_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "53D108B3-1095-42CE-89BC-32C4805EC803"
|
||||
"criteria": "cpe:2.3:a:adrianmercurio:gym_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "19A6E4EB-8256-48FE-BEAC-DFF12DF7D862"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-36193",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-11-28T13:15:09.970",
|
||||
"lastModified": "2022-11-28T19:15:37.177",
|
||||
"lastModified": "2024-10-17T13:34:09.183",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -60,8 +60,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:school_management_system_project:school_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EB53B758-9EA6-46A4-9497-A93BD8D2F19A"
|
||||
"criteria": "cpe:2.3:a:lahirudanushka:school_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2EA5C3F4-40FB-403D-8E42-D5A2C34C42C3"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
21
CVE-2023/CVE-2023-67xx/CVE-2023-6728.json
Normal file
21
CVE-2023/CVE-2023-67xx/CVE-2023-6728.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2023-6728",
|
||||
"sourceIdentifier": "b48c3b8f-639e-4c16-8725-497bc411dad0",
|
||||
"published": "2024-10-17T13:15:12.077",
|
||||
"lastModified": "2024-10-17T13:15:12.077",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Nokia SR OS bof.cfg file encryption is vulnerable to a brute force attack. This weakness allows an attacker in possession of the encrypted file to decrypt the bof.cfg file and obtain the BOF configuration content."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.nokia.com/about-us/security-and-privacy/product-security-advisory/cve-2023-6728/",
|
||||
"source": "b48c3b8f-639e-4c16-8725-497bc411dad0"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2023/CVE-2023-67xx/CVE-2023-6729.json
Normal file
21
CVE-2023/CVE-2023-67xx/CVE-2023-6729.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2023-6729",
|
||||
"sourceIdentifier": "b48c3b8f-639e-4c16-8725-497bc411dad0",
|
||||
"published": "2024-10-17T13:15:12.170",
|
||||
"lastModified": "2024-10-17T13:15:12.170",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Nokia SR OS routers allow read-write access to the entire file system via SFTP or SCP for users configured with \"access console.\" Consequently, a low privilege authenticated user with \"access console\" can read or replace the router configuration file as well as other files stored in the Compact Flash or SD card without using CLI commands. This type of attack can lead to a compromise or denial of service of the router after the system is rebooted."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.nokia.com/about-us/security-and-privacy/product-security-advisory/cve-2023-6729/",
|
||||
"source": "b48c3b8f-639e-4c16-8725-497bc411dad0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-27136",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-06-24T08:15:09.297",
|
||||
"lastModified": "2024-06-24T12:57:36.513",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-17T13:47:39.417",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,7 +15,30 @@
|
||||
"value": "XSS en la p\u00e1gina de carga en Apache JSPWiki 2.12.1 y versiones anteriores permite al atacante ejecutar javascript en el navegador de la v\u00edctima y obtener informaci\u00f3n confidencial sobre la v\u00edctima. Los usuarios de Apache JSPWiki deben actualizar a 2.12.2 o posterior."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@apache.org",
|
||||
@ -28,14 +51,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:jspwiki:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "2.12.2",
|
||||
"matchCriteriaId": "4FF7A52D-F6D4-4D76-89B4-A2DEF52B4012"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2024-27136",
|
||||
"source": "security@apache.org"
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.apache.org/thread/gfms8gbncqqkj52p861b8fnsypwsl1d5",
|
||||
"source": "security@apache.org"
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-43557",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2024-10-08T18:15:22.063",
|
||||
"lastModified": "2024-10-10T12:56:30.817",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-17T13:31:54.217",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -41,8 +41,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -55,10 +65,134 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.17763.6414",
|
||||
"matchCriteriaId": "EE205A52-173D-44F2-AAD0-A45F5FF4D603"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
|
||||
"versionEndExcluding": "10.0.17763.6414",
|
||||
"matchCriteriaId": "8ED2CAD8-D2E2-4AF5-874A-2938D3C3EA0F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:arm64:*",
|
||||
"versionEndExcluding": "10.0.19044.5011",
|
||||
"matchCriteriaId": "D13B5EE1-0F5A-4DD8-9462-18FC0D2A59EE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.19044.5011",
|
||||
"matchCriteriaId": "857DFFF9-C926-41C5-96E6-7CD3DD86FDD8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x86:*",
|
||||
"versionEndExcluding": "10.0.19044.5011",
|
||||
"matchCriteriaId": "73AD21BF-973F-47E2-8831-A8B9DD066D75"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:arm64:*",
|
||||
"versionEndExcluding": "10.0.19045.5011",
|
||||
"matchCriteriaId": "6DDD519F-4617-4958-A2AA-5E5EC9D6E0E1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.19045.5011",
|
||||
"matchCriteriaId": "FD728A6F-4F70-4407-B19C-92DF529793EC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x86:*",
|
||||
"versionEndExcluding": "10.0.19045.5011",
|
||||
"matchCriteriaId": "11B05B8E-F956-45E2-A735-B3169384178F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:arm64:*",
|
||||
"versionEndExcluding": "10.0.22000.3260",
|
||||
"matchCriteriaId": "FE4A4090-29D6-4B44-9B01-858886DAD93D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.22000.3260",
|
||||
"matchCriteriaId": "41629AD7-FF9A-4C54-9FFE-800F4C1E719B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*",
|
||||
"versionEndExcluding": "10.0.22621.4317",
|
||||
"matchCriteriaId": "89687486-E330-4475-9119-0E0AD18F8129"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.22621.4317",
|
||||
"matchCriteriaId": "0B0F11A8-E14B-4A82-BB09-C4259FC6B0E6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:arm64:*",
|
||||
"versionEndExcluding": "10.0.22631.4317",
|
||||
"matchCriteriaId": "FD22B308-7AB1-4820-8B4F-E79C18DB0FF0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.22631.4317",
|
||||
"matchCriteriaId": "6D7CF880-E057-4694-8DD2-FF62D41A5BB7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:arm64:*",
|
||||
"versionEndExcluding": "10.0.26100.2033",
|
||||
"matchCriteriaId": "1262CACE-C787-4F46-9E12-C9F254225FC5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.26100.2033",
|
||||
"matchCriteriaId": "ED2BB762-C417-4B64-80A2-ED152893FAD7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.17763.6414",
|
||||
"matchCriteriaId": "F003109E-32C0-4044-89D6-2747366E051D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.25398.1189",
|
||||
"matchCriteriaId": "B3B68BF1-40C7-45E9-BD3C-8CEE104054E9"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43557",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-43558",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2024-10-08T18:15:22.260",
|
||||
"lastModified": "2024-10-10T12:56:30.817",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-17T13:31:55.977",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -41,8 +41,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -55,10 +65,134 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.17763.6414",
|
||||
"matchCriteriaId": "EE205A52-173D-44F2-AAD0-A45F5FF4D603"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
|
||||
"versionEndExcluding": "10.0.17763.6414",
|
||||
"matchCriteriaId": "8ED2CAD8-D2E2-4AF5-874A-2938D3C3EA0F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:arm64:*",
|
||||
"versionEndExcluding": "10.0.19044.5011",
|
||||
"matchCriteriaId": "D13B5EE1-0F5A-4DD8-9462-18FC0D2A59EE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.19044.5011",
|
||||
"matchCriteriaId": "857DFFF9-C926-41C5-96E6-7CD3DD86FDD8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x86:*",
|
||||
"versionEndExcluding": "10.0.19044.5011",
|
||||
"matchCriteriaId": "73AD21BF-973F-47E2-8831-A8B9DD066D75"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:arm64:*",
|
||||
"versionEndExcluding": "10.0.19045.5011",
|
||||
"matchCriteriaId": "6DDD519F-4617-4958-A2AA-5E5EC9D6E0E1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.19045.5011",
|
||||
"matchCriteriaId": "FD728A6F-4F70-4407-B19C-92DF529793EC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x86:*",
|
||||
"versionEndExcluding": "10.0.19045.5011",
|
||||
"matchCriteriaId": "11B05B8E-F956-45E2-A735-B3169384178F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:arm64:*",
|
||||
"versionEndExcluding": "10.0.22000.3260",
|
||||
"matchCriteriaId": "FE4A4090-29D6-4B44-9B01-858886DAD93D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.22000.3260",
|
||||
"matchCriteriaId": "41629AD7-FF9A-4C54-9FFE-800F4C1E719B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*",
|
||||
"versionEndExcluding": "10.0.22621.4317",
|
||||
"matchCriteriaId": "89687486-E330-4475-9119-0E0AD18F8129"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.22621.4317",
|
||||
"matchCriteriaId": "0B0F11A8-E14B-4A82-BB09-C4259FC6B0E6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:arm64:*",
|
||||
"versionEndExcluding": "10.0.22631.4317",
|
||||
"matchCriteriaId": "FD22B308-7AB1-4820-8B4F-E79C18DB0FF0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.22631.4317",
|
||||
"matchCriteriaId": "6D7CF880-E057-4694-8DD2-FF62D41A5BB7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:arm64:*",
|
||||
"versionEndExcluding": "10.0.26100.2033",
|
||||
"matchCriteriaId": "1262CACE-C787-4F46-9E12-C9F254225FC5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.26100.2033",
|
||||
"matchCriteriaId": "ED2BB762-C417-4B64-80A2-ED152893FAD7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.17763.6414",
|
||||
"matchCriteriaId": "F003109E-32C0-4044-89D6-2747366E051D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.25398.1189",
|
||||
"matchCriteriaId": "B3B68BF1-40C7-45E9-BD3C-8CEE104054E9"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43558",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-43559",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2024-10-08T18:15:22.450",
|
||||
"lastModified": "2024-10-10T12:56:30.817",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-17T13:31:57.833",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -41,8 +41,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -51,10 +61,134 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.17763.6414",
|
||||
"matchCriteriaId": "EE205A52-173D-44F2-AAD0-A45F5FF4D603"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
|
||||
"versionEndExcluding": "10.0.17763.6414",
|
||||
"matchCriteriaId": "8ED2CAD8-D2E2-4AF5-874A-2938D3C3EA0F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:arm64:*",
|
||||
"versionEndExcluding": "10.0.19044.5011",
|
||||
"matchCriteriaId": "D13B5EE1-0F5A-4DD8-9462-18FC0D2A59EE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.19044.5011",
|
||||
"matchCriteriaId": "857DFFF9-C926-41C5-96E6-7CD3DD86FDD8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x86:*",
|
||||
"versionEndExcluding": "10.0.19044.5011",
|
||||
"matchCriteriaId": "73AD21BF-973F-47E2-8831-A8B9DD066D75"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:arm64:*",
|
||||
"versionEndExcluding": "10.0.19045.5011",
|
||||
"matchCriteriaId": "6DDD519F-4617-4958-A2AA-5E5EC9D6E0E1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.19045.5011",
|
||||
"matchCriteriaId": "FD728A6F-4F70-4407-B19C-92DF529793EC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x86:*",
|
||||
"versionEndExcluding": "10.0.19045.5011",
|
||||
"matchCriteriaId": "11B05B8E-F956-45E2-A735-B3169384178F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:arm64:*",
|
||||
"versionEndExcluding": "10.0.22000.3260",
|
||||
"matchCriteriaId": "FE4A4090-29D6-4B44-9B01-858886DAD93D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.22000.3260",
|
||||
"matchCriteriaId": "41629AD7-FF9A-4C54-9FFE-800F4C1E719B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*",
|
||||
"versionEndExcluding": "10.0.22621.4317",
|
||||
"matchCriteriaId": "89687486-E330-4475-9119-0E0AD18F8129"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.22621.4317",
|
||||
"matchCriteriaId": "0B0F11A8-E14B-4A82-BB09-C4259FC6B0E6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:arm64:*",
|
||||
"versionEndExcluding": "10.0.22631.4317",
|
||||
"matchCriteriaId": "FD22B308-7AB1-4820-8B4F-E79C18DB0FF0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.22631.4317",
|
||||
"matchCriteriaId": "6D7CF880-E057-4694-8DD2-FF62D41A5BB7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:arm64:*",
|
||||
"versionEndExcluding": "10.0.26100.2033",
|
||||
"matchCriteriaId": "1262CACE-C787-4F46-9E12-C9F254225FC5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.26100.2033",
|
||||
"matchCriteriaId": "ED2BB762-C417-4B64-80A2-ED152893FAD7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.17763.6414",
|
||||
"matchCriteriaId": "F003109E-32C0-4044-89D6-2747366E051D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.25398.1189",
|
||||
"matchCriteriaId": "B3B68BF1-40C7-45E9-BD3C-8CEE104054E9"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43559",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-45731",
|
||||
"sourceIdentifier": "prodsec@splunk.com",
|
||||
"published": "2024-10-14T17:15:11.177",
|
||||
"lastModified": "2024-10-15T12:57:46.880",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-17T13:09:33.017",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.0,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "prodsec@splunk.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "prodsec@splunk.com",
|
||||
"type": "Secondary",
|
||||
@ -51,14 +81,63 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*",
|
||||
"versionStartIncluding": "9.1.0",
|
||||
"versionEndExcluding": "9.1.6",
|
||||
"matchCriteriaId": "FB935ACC-3899-47DE-B4C0-CB94CAC79AC2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*",
|
||||
"versionStartIncluding": "9.2.0",
|
||||
"versionEndExcluding": "9.2.3",
|
||||
"matchCriteriaId": "14D07F5E-504B-447B-988B-BF6ADA59F8D1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:splunk:splunk:9.3.0:*:*:*:enterprise:*:*:*",
|
||||
"matchCriteriaId": "11F038B4-1335-4F4E-9013-E6D6152DCD20"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://advisory.splunk.com/advisories/SVD-2024-1001",
|
||||
"source": "prodsec@splunk.com"
|
||||
"source": "prodsec@splunk.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://research.splunk.com/application/c97e0704-d9c6-454d-89ba-1510a987bf72/",
|
||||
"source": "prodsec@splunk.com"
|
||||
"source": "prodsec@splunk.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-45732",
|
||||
"sourceIdentifier": "prodsec@splunk.com",
|
||||
"published": "2024-10-14T17:15:11.410",
|
||||
"lastModified": "2024-10-15T12:57:46.880",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-17T13:03:52.153",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "prodsec@splunk.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "prodsec@splunk.com",
|
||||
"type": "Secondary",
|
||||
@ -51,14 +81,64 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*",
|
||||
"versionStartIncluding": "9.2.0",
|
||||
"versionEndExcluding": "9.2.3",
|
||||
"matchCriteriaId": "14D07F5E-504B-447B-988B-BF6ADA59F8D1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:splunk:splunk:9.3.0:*:*:*:enterprise:*:*:*",
|
||||
"matchCriteriaId": "11F038B4-1335-4F4E-9013-E6D6152DCD20"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:splunk:splunk_cloud_platform:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "9.1.2308.208",
|
||||
"matchCriteriaId": "557AF53F-284F-43D2-9EA1-2E0E628DC303"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:splunk:splunk_cloud_platform:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "9.1.2312.100",
|
||||
"versionEndExcluding": "9.1.2312.110",
|
||||
"matchCriteriaId": "6DAA9B36-48A2-45BF-97B9-E548E80DF83C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:splunk:splunk_cloud_platform:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "9.2.2403.102",
|
||||
"versionEndExcluding": "9.2.2403.103",
|
||||
"matchCriteriaId": "200953F8-DF1D-4C6C-BE36-0866700A5F55"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://advisory.splunk.com/advisories/SVD-2024-1002",
|
||||
"source": "prodsec@splunk.com"
|
||||
"source": "prodsec@splunk.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://research.splunk.com/application/f765c3fe-c3b6-4afe-a932-11dd4f3a024f/",
|
||||
"source": "prodsec@splunk.com"
|
||||
"source": "prodsec@splunk.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-45738",
|
||||
"sourceIdentifier": "prodsec@splunk.com",
|
||||
"published": "2024-10-14T17:15:12.660",
|
||||
"lastModified": "2024-10-15T12:57:46.880",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-17T13:17:37.723",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "prodsec@splunk.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-532"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "prodsec@splunk.com",
|
||||
"type": "Secondary",
|
||||
@ -51,14 +81,51 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*",
|
||||
"versionStartIncluding": "9.1.0",
|
||||
"versionEndExcluding": "9.1.6",
|
||||
"matchCriteriaId": "FB935ACC-3899-47DE-B4C0-CB94CAC79AC2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*",
|
||||
"versionStartIncluding": "9.2.0",
|
||||
"versionEndExcluding": "9.2.3",
|
||||
"matchCriteriaId": "14D07F5E-504B-447B-988B-BF6ADA59F8D1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:splunk:splunk:9.3.0:*:*:*:enterprise:*:*:*",
|
||||
"matchCriteriaId": "11F038B4-1335-4F4E-9013-E6D6152DCD20"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://advisory.splunk.com/advisories/SVD-2024-1008",
|
||||
"source": "prodsec@splunk.com"
|
||||
"source": "prodsec@splunk.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://research.splunk.com/application/93dc7182-c5da-4085-82ec-401abf33d623/",
|
||||
"source": "prodsec@splunk.com"
|
||||
"source": "prodsec@splunk.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-45739",
|
||||
"sourceIdentifier": "prodsec@splunk.com",
|
||||
"published": "2024-10-14T17:15:12.860",
|
||||
"lastModified": "2024-10-15T12:57:46.880",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-17T13:16:36.440",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "prodsec@splunk.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-532"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "prodsec@splunk.com",
|
||||
"type": "Secondary",
|
||||
@ -51,14 +81,51 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*",
|
||||
"versionStartIncluding": "9.1.0",
|
||||
"versionEndExcluding": "9.1.6",
|
||||
"matchCriteriaId": "FB935ACC-3899-47DE-B4C0-CB94CAC79AC2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*",
|
||||
"versionStartIncluding": "9.2.0",
|
||||
"versionEndExcluding": "9.2.3",
|
||||
"matchCriteriaId": "14D07F5E-504B-447B-988B-BF6ADA59F8D1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:splunk:splunk:9.3.1:*:*:*:enterprise:*:*:*",
|
||||
"matchCriteriaId": "ABC6D150-A6A1-4319-9084-B9C683D11200"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://advisory.splunk.com/advisories/SVD-2024-1009",
|
||||
"source": "prodsec@splunk.com"
|
||||
"source": "prodsec@splunk.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://research.splunk.com/application/93dc7182-c5da-4085-82ec-401abf33d623/",
|
||||
"source": "prodsec@splunk.com"
|
||||
"source": "prodsec@splunk.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-45740",
|
||||
"sourceIdentifier": "prodsec@splunk.com",
|
||||
"published": "2024-10-14T17:15:13.047",
|
||||
"lastModified": "2024-10-15T12:57:46.880",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-17T13:14:20.107",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "prodsec@splunk.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "prodsec@splunk.com",
|
||||
"type": "Secondary",
|
||||
@ -51,14 +81,52 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*",
|
||||
"versionStartIncluding": "9.1.0",
|
||||
"versionEndExcluding": "9.1.6",
|
||||
"matchCriteriaId": "FB935ACC-3899-47DE-B4C0-CB94CAC79AC2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*",
|
||||
"versionStartIncluding": "9.2.0",
|
||||
"versionEndExcluding": "9.2.3",
|
||||
"matchCriteriaId": "14D07F5E-504B-447B-988B-BF6ADA59F8D1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:splunk:splunk_cloud_platform:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "9.2.2403.100",
|
||||
"matchCriteriaId": "ED0A2EB5-E488-459C-976B-64D9B30F6A15"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://advisory.splunk.com/advisories/SVD-2024-1010",
|
||||
"source": "prodsec@splunk.com"
|
||||
"source": "prodsec@splunk.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://research.splunk.com/application/d4f55f7c-6518-4122-a197-951fe0f21b25/",
|
||||
"source": "prodsec@splunk.com"
|
||||
"source": "prodsec@splunk.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-45741",
|
||||
"sourceIdentifier": "prodsec@splunk.com",
|
||||
"published": "2024-10-14T17:15:13.250",
|
||||
"lastModified": "2024-10-15T12:57:46.880",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-17T13:12:54.180",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "prodsec@splunk.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "prodsec@splunk.com",
|
||||
"type": "Secondary",
|
||||
@ -51,14 +81,60 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*",
|
||||
"versionStartIncluding": "9.1.0",
|
||||
"versionEndExcluding": "9.1.6",
|
||||
"matchCriteriaId": "FB935ACC-3899-47DE-B4C0-CB94CAC79AC2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*",
|
||||
"versionStartIncluding": "9.2.0",
|
||||
"versionEndExcluding": "9.2.3",
|
||||
"matchCriteriaId": "14D07F5E-504B-447B-988B-BF6ADA59F8D1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:splunk:splunk_cloud_platform:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "9.1.2312",
|
||||
"versionEndExcluding": "9.1.2312.205",
|
||||
"matchCriteriaId": "E07DAB17-BFEC-4A25-A48D-560709D3DAD9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:splunk:splunk_cloud_platform:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "9.2.2403.100",
|
||||
"versionEndExcluding": "9.2.2403.108",
|
||||
"matchCriteriaId": "28B82F6A-EF30-4467-9DA1-D27AD96A326E"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://advisory.splunk.com/advisories/SVD-2024-1011",
|
||||
"source": "prodsec@splunk.com"
|
||||
"source": "prodsec@splunk.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://research.splunk.com/application/d7b5aa71-157f-4359-9c34-e35752b1d0a2/",
|
||||
"source": "prodsec@splunk.com"
|
||||
"source": "prodsec@splunk.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-47766",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-10-14T18:15:04.387",
|
||||
"lastModified": "2024-10-15T12:57:46.880",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-17T13:48:40.240",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -41,8 +61,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-755"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -51,22 +81,69 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*",
|
||||
"versionEndExcluding": "15.12-8",
|
||||
"matchCriteriaId": "7BB42325-937B-4940-9E68-983BA7A1BDD9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:community:*:*:*",
|
||||
"versionEndExcluding": "15.13.99.110",
|
||||
"matchCriteriaId": "CBE37DC9-8561-48FE-BC75-5624DE2309EB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*",
|
||||
"versionStartIncluding": "15.13-0",
|
||||
"versionEndExcluding": "15.13-5",
|
||||
"matchCriteriaId": "49A386EB-18D7-4F4B-A8B9-C26C997C2CDF"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Enalean/tuleap/commit/529d11b70796589767dd27a40ebadf3eaf8f5674",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-qfrh-fv84-93hx",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Patch",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit&h=529d11b70796589767dd27a40ebadf3eaf8f5674",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Issue Tracking",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://tuleap.net/plugins/tracker/?aid=39736",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-47767",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-10-14T18:15:04.593",
|
||||
"lastModified": "2024-10-15T12:57:46.880",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-17T13:50:45.307",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -41,8 +61,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-755"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -51,38 +81,100 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*",
|
||||
"versionEndExcluding": "15.12-8",
|
||||
"matchCriteriaId": "7BB42325-937B-4940-9E68-983BA7A1BDD9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:community:*:*:*",
|
||||
"versionEndExcluding": "15.13.99.113",
|
||||
"matchCriteriaId": "55143981-8C28-4EE7-8593-F1A503C9C8EC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*",
|
||||
"versionStartIncluding": "15.13-0",
|
||||
"versionEndExcluding": "15.13-5",
|
||||
"matchCriteriaId": "49A386EB-18D7-4F4B-A8B9-C26C997C2CDF"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Enalean/tuleap/commit/16d9efccb2fad8e10343be2604e94c9058ef2c89",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/Enalean/tuleap/commit/e5ce81279766115dc0f126a11d6b5065b5db7eec",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/Enalean/tuleap/commit/f89d7093d2c576ad5e2b35a6a096fcdaf563d1df",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-j342-v27q-329v",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Patch",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit&h=16d9efccb2fad8e10343be2604e94c9058ef2c89",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Issue Tracking",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit&h=e5ce81279766115dc0f126a11d6b5065b5db7eec",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Issue Tracking",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit&h=f89d7093d2c576ad5e2b35a6a096fcdaf563d1df",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Issue Tracking",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://tuleap.net/plugins/tracker/?aid=39728",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-47828",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-10-09T19:15:14.423",
|
||||
"lastModified": "2024-10-10T12:51:56.987",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-10-17T13:55:23.577",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ampache:ampache:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "6.6.0",
|
||||
"matchCriteriaId": "9F4439DC-D639-45D5-90FF-5C75C4B00F27"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ampache/ampache/security/advisories/GHSA-p9cq-2qph-55f2",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-480xx/CVE-2024-48021.json
Normal file
56
CVE-2024/CVE-2024-480xx/CVE-2024-48021.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-48021",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-10-17T13:15:12.260",
|
||||
"lastModified": "2024-10-17T13:15:12.260",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Scott Paterson Contact Form 7 \u2013 PayPal & Stripe Add-on allows Reflected XSS.This issue affects Contact Form 7 \u2013 PayPal & Stripe Add-on: from n/a through 2.3."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/contact-form-7-paypal-add-on/wordpress-contact-form-7-paypal-stripe-add-on-plugin-2-3-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-480xx/CVE-2024-48022.json
Normal file
56
CVE-2024/CVE-2024-480xx/CVE-2024-48022.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-48022",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-10-17T13:15:12.513",
|
||||
"lastModified": "2024-10-17T13:15:12.513",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in SysBasics Shortcode For Elementor Templates allows Stored XSS.This issue affects Shortcode For Elementor Templates: from n/a through 1.0.0."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/shortcode-support-for-elementor-templates/wordpress-shortcode-for-elementor-templates-plugin-1-0-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-480xx/CVE-2024-48023.json
Normal file
56
CVE-2024/CVE-2024-480xx/CVE-2024-48023.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-48023",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-10-17T13:15:12.790",
|
||||
"lastModified": "2024-10-17T13:15:12.790",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in RestaurantConnect, Inc Restaurant Reservations Widget allows Reflected XSS.This issue affects Restaurant Reservations Widget: from n/a through 1.0."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/restaurantconnect-reswidget/wordpress-restaurant-reservations-widget-plugin-1-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-480xx/CVE-2024-48024.json
Normal file
56
CVE-2024/CVE-2024-480xx/CVE-2024-48024.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-48024",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-10-17T12:15:02.230",
|
||||
"lastModified": "2024-10-17T12:15:02.230",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": ": Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in Fahad Mahmood Keep Backup Daily allows Retrieve Embedded Sensitive Data.This issue affects Keep Backup Daily: from n/a through 2.0.7."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-497"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/keep-backup-daily/wordpress-keep-backup-daily-plugin-2-0-7-sensitive-data-exposure-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-480xx/CVE-2024-48025.json
Normal file
56
CVE-2024/CVE-2024-480xx/CVE-2024-48025.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-48025",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-10-17T13:15:13.017",
|
||||
"lastModified": "2024-10-17T13:15:13.017",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in DOGROW.NET Simple Baseball Scoreboard allows Stored XSS.This issue affects Simple Baseball Scoreboard: from n/a through 1.3."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/simple-baseball-scoreboard/wordpress-simple-baseball-scoreboard-plugin-1-3-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-480xx/CVE-2024-48031.json
Normal file
56
CVE-2024/CVE-2024-480xx/CVE-2024-48031.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-48031",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-10-17T13:15:13.240",
|
||||
"lastModified": "2024-10-17T13:15:13.240",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Sumit Surai Featured Posts with Multiple Custom Groups (FPMCG) allows Cross Site Request Forgery.This issue affects Featured Posts with Multiple Custom Groups (FPMCG): from n/a through 4.0."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/featured-posts-with-multiple-custom-groups-fpmcg/wordpress-featured-posts-with-multiple-custom-groups-fpmcg-plugin-4-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-480xx/CVE-2024-48032.json
Normal file
56
CVE-2024/CVE-2024-480xx/CVE-2024-48032.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-48032",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-10-17T13:15:13.460",
|
||||
"lastModified": "2024-10-17T13:15:13.460",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Sumit Surai Featured Posts with Multiple Custom Groups (FPMCG) allows Reflected XSS.This issue affects Featured Posts with Multiple Custom Groups (FPMCG): from n/a through 4.0."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/featured-posts-with-multiple-custom-groups-fpmcg/wordpress-featured-posts-with-multiple-custom-groups-fpmcg-plugin-4-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-480xx/CVE-2024-48036.json
Normal file
56
CVE-2024/CVE-2024-480xx/CVE-2024-48036.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-48036",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-10-17T13:15:13.677",
|
||||
"lastModified": "2024-10-17T13:15:13.677",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in SKT Themes SKT Blocks \u2013 Gutenberg based Page Builder allows Stored XSS.This issue affects SKT Blocks \u2013 Gutenberg based Page Builder: from n/a through 1.6."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/skt-blocks/wordpress-skt-blocks-plugin-1-6-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-480xx/CVE-2024-48037.json
Normal file
56
CVE-2024/CVE-2024-480xx/CVE-2024-48037.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-48037",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-10-17T13:15:13.927",
|
||||
"lastModified": "2024-10-17T13:15:13.927",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-Site Request Forgery (CSRF) vulnerability in A WP Life Contact Form Widget allows Cross Site Request Forgery.This issue affects Contact Form Widget: from n/a through 1.4.2."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/new-contact-form-widget/wordpress-contact-form-widget-contact-query-contact-page-form-maker-query-table-plugin-1-4-2-csrf-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-480xx/CVE-2024-48038.json
Normal file
56
CVE-2024/CVE-2024-480xx/CVE-2024-48038.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-48038",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-10-17T12:15:02.457",
|
||||
"lastModified": "2024-10-17T12:15:02.457",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Hans Matzen wp-Monalisa allows Cross Site Request Forgery.This issue affects wp-Monalisa: from n/a through 6.4."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/wp-monalisa/wordpress-wp-monalisa-plugin-6-4-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-480xx/CVE-2024-48043.json
Normal file
56
CVE-2024/CVE-2024-480xx/CVE-2024-48043.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-48043",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-10-17T12:15:02.677",
|
||||
"lastModified": "2024-10-17T12:15:02.677",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in ShortPixel ShortPixel Image Optimizer allows Blind SQL Injection.This issue affects ShortPixel Image Optimizer: from n/a through 5.6.3."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.6,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 4.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/shortpixel-image-optimiser/wordpress-shortpixel-image-optimizer-plugin-5-6-3-sql-injection-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-480xx/CVE-2024-48046.json
Normal file
56
CVE-2024/CVE-2024-480xx/CVE-2024-48046.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-48046",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-10-17T13:15:14.170",
|
||||
"lastModified": "2024-10-17T13:15:14.170",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Supsystic Contact Form by Supsystic allows Stored XSS.This issue affects Contact Form by Supsystic: from n/a through 1.7.28."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 5.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/contact-form-by-supsystic/wordpress-contact-form-by-supsystic-plugin-1-7-28-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-480xx/CVE-2024-48047.json
Normal file
56
CVE-2024/CVE-2024-480xx/CVE-2024-48047.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-48047",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-10-17T12:15:02.880",
|
||||
"lastModified": "2024-10-17T12:15:02.880",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Razon Komar Pal Linked Variation for WooCommerce allows Cross Site Request Forgery.This issue affects Linked Variation for WooCommerce: from n/a through 1.0.5."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/linked-variation-for-woocommerce/wordpress-linked-variation-for-woocommerce-plugin-1-0-5-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-480xx/CVE-2024-48048.json
Normal file
56
CVE-2024/CVE-2024-480xx/CVE-2024-48048.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-48048",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-10-17T13:15:14.390",
|
||||
"lastModified": "2024-10-17T13:15:14.390",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-Site Request Forgery (CSRF) vulnerability in WSIFY \u2013 Sales can fly Wsify Widget allows Stored XSS.This issue affects Wsify Widget: from n/a through 1.0."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/wsify-widget/wordpress-wsify-widget-plugin-1-0-csrf-to-stored-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-493xx/CVE-2024-49320.json
Normal file
56
CVE-2024/CVE-2024-493xx/CVE-2024-49320.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-49320",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-10-17T12:15:03.077",
|
||||
"lastModified": "2024-10-17T12:15:03.077",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Dennis Hoppe Encyclopedia / Glossary / Wiki allows Reflected XSS.This issue affects Encyclopedia / Glossary / Wiki: from n/a through 1.7.60."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/encyclopedia-lexicon-glossary-wiki-dictionary/wordpress-encyclopedia-glossary-wiki-plugin-1-7-60-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-495xx/CVE-2024-49579.json
Normal file
56
CVE-2024/CVE-2024-495xx/CVE-2024-49579.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-49579",
|
||||
"sourceIdentifier": "cve@jetbrains.com",
|
||||
"published": "2024-10-17T13:15:14.613",
|
||||
"lastModified": "2024-10-17T13:15:14.613",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In JetBrains YouTrack before 2024.3.47197 insecure plugin iframe allowed arbitrary JavaScript execution and unauthorized API requests"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@jetbrains.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve@jetbrains.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-940"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
|
||||
"source": "cve@jetbrains.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-495xx/CVE-2024-49580.json
Normal file
56
CVE-2024/CVE-2024-495xx/CVE-2024-49580.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-49580",
|
||||
"sourceIdentifier": "cve@jetbrains.com",
|
||||
"published": "2024-10-17T13:15:14.853",
|
||||
"lastModified": "2024-10-17T13:15:14.853",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In JetBrains Ktor before 3.0.0 improper caching in HttpCache Plugin could lead to response information disclosure"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@jetbrains.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve@jetbrains.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-524"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
|
||||
"source": "cve@jetbrains.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-5278",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2024-06-06T19:16:07.310",
|
||||
"lastModified": "2024-06-07T14:56:05.647",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-10-17T13:56:49.813",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -16,6 +16,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
],
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
@ -51,10 +73,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gaizhenbiao:chuanhuchatgpt:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "20240919",
|
||||
"matchCriteriaId": "00B7707B-42E6-459D-944F-9FF98BC82EF3"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://huntr.com/bounties/ea821d86-941b-40f3-a857-91f758848e05",
|
||||
"source": "security@huntr.dev"
|
||||
"source": "security@huntr.dev",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-6649",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-07-10T19:15:12.070",
|
||||
"lastModified": "2024-07-11T13:05:54.930",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-17T13:42:33.927",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -120,22 +140,52 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oretnom23:employee_and_visitor_gate_pass_logging_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E79823D1-656B-47ED-B919-817CF98B423B"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Xu-Mingming/cve/blob/main/csrf1.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.271057",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.271057",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.370663",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-6652",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-07-10T23:15:15.250",
|
||||
"lastModified": "2024-08-08T16:43:37.053",
|
||||
"lastModified": "2024-10-17T12:39:41.690",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -149,8 +149,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gym_management_system_project:gym_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "53D108B3-1095-42CE-89BC-32C4805EC803"
|
||||
"criteria": "cpe:2.3:a:adrianmercurio:gym_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "19A6E4EB-8256-48FE-BEAC-DFF12DF7D862"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-6830",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-07-17T16:15:05.540",
|
||||
"lastModified": "2024-07-18T12:28:43.707",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-17T13:33:40.750",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -120,22 +140,52 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oretnom23:simple_inventory_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "38F84ACB-01D6-4157-A3E8-736A62294206"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Xu-Mingming/cve/blob/main/sql1.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.271812",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.271812",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.375233",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-9546",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-10-15T00:15:21.763",
|
||||
"lastModified": "2024-10-15T12:57:46.880",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-17T13:34:27.890",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -41,8 +41,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -51,14 +61,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xplodedthemes:wpide:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "3.5.0",
|
||||
"matchCriteriaId": "59F836A0-D2B0-440E-9E52-561BD35F17C5"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/wpide/tags/3.4.9/vendor/nikic/php-parser/grammar/rebuildParsers.php#L77",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e884af8b-c83f-4380-bfaf-f1419fce125c?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-9548",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-10-15T00:15:22.047",
|
||||
"lastModified": "2024-10-15T12:57:46.880",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-17T13:46:07.997",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -18,8 +18,28 @@
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N",
|
||||
@ -51,18 +71,45 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:wp-slimstat:slimstat_analytics:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "5.2.7",
|
||||
"matchCriteriaId": "9BAF5D0B-B01E-43C4-9F97-C81469047D5F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/wp-slimstat/tags/5.2.6",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/wp-slimstat/tags/5.2.6/admin/view/right-now.php#L196",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/fa91912d-5794-4c96-8a13-bd54ce0f1deb?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
68
README.md
68
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-10-17T12:00:22.907012+00:00
|
||||
2024-10-17T14:00:53.819888+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-10-17T11:15:11.087000+00:00
|
||||
2024-10-17T13:56:49.813000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,33 +33,63 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
265944
|
||||
265963
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `11`
|
||||
Recently added CVEs: `19`
|
||||
|
||||
- [CVE-2024-10025](CVE-2024/CVE-2024-100xx/CVE-2024-10025.json) (`2024-10-17T10:15:03.127`)
|
||||
- [CVE-2024-10068](CVE-2024/CVE-2024-100xx/CVE-2024-10068.json) (`2024-10-17T11:15:10.390`)
|
||||
- [CVE-2024-45713](CVE-2024/CVE-2024-457xx/CVE-2024-45713.json) (`2024-10-17T11:15:10.850`)
|
||||
- [CVE-2024-49386](CVE-2024/CVE-2024-493xx/CVE-2024-49386.json) (`2024-10-17T10:15:03.547`)
|
||||
- [CVE-2024-49389](CVE-2024/CVE-2024-493xx/CVE-2024-49389.json) (`2024-10-17T10:15:03.813`)
|
||||
- [CVE-2024-49390](CVE-2024/CVE-2024-493xx/CVE-2024-49390.json) (`2024-10-17T10:15:04.017`)
|
||||
- [CVE-2024-49391](CVE-2024/CVE-2024-493xx/CVE-2024-49391.json) (`2024-10-17T10:15:04.193`)
|
||||
- [CVE-2024-49392](CVE-2024/CVE-2024-493xx/CVE-2024-49392.json) (`2024-10-17T10:15:04.383`)
|
||||
- [CVE-2024-8920](CVE-2024/CVE-2024-89xx/CVE-2024-8920.json) (`2024-10-17T10:15:04.580`)
|
||||
- [CVE-2024-9184](CVE-2024/CVE-2024-91xx/CVE-2024-9184.json) (`2024-10-17T10:15:04.803`)
|
||||
- [CVE-2024-9898](CVE-2024/CVE-2024-98xx/CVE-2024-9898.json) (`2024-10-17T11:15:11.087`)
|
||||
- [CVE-2023-6728](CVE-2023/CVE-2023-67xx/CVE-2023-6728.json) (`2024-10-17T13:15:12.077`)
|
||||
- [CVE-2023-6729](CVE-2023/CVE-2023-67xx/CVE-2023-6729.json) (`2024-10-17T13:15:12.170`)
|
||||
- [CVE-2024-48021](CVE-2024/CVE-2024-480xx/CVE-2024-48021.json) (`2024-10-17T13:15:12.260`)
|
||||
- [CVE-2024-48022](CVE-2024/CVE-2024-480xx/CVE-2024-48022.json) (`2024-10-17T13:15:12.513`)
|
||||
- [CVE-2024-48023](CVE-2024/CVE-2024-480xx/CVE-2024-48023.json) (`2024-10-17T13:15:12.790`)
|
||||
- [CVE-2024-48024](CVE-2024/CVE-2024-480xx/CVE-2024-48024.json) (`2024-10-17T12:15:02.230`)
|
||||
- [CVE-2024-48025](CVE-2024/CVE-2024-480xx/CVE-2024-48025.json) (`2024-10-17T13:15:13.017`)
|
||||
- [CVE-2024-48031](CVE-2024/CVE-2024-480xx/CVE-2024-48031.json) (`2024-10-17T13:15:13.240`)
|
||||
- [CVE-2024-48032](CVE-2024/CVE-2024-480xx/CVE-2024-48032.json) (`2024-10-17T13:15:13.460`)
|
||||
- [CVE-2024-48036](CVE-2024/CVE-2024-480xx/CVE-2024-48036.json) (`2024-10-17T13:15:13.677`)
|
||||
- [CVE-2024-48037](CVE-2024/CVE-2024-480xx/CVE-2024-48037.json) (`2024-10-17T13:15:13.927`)
|
||||
- [CVE-2024-48038](CVE-2024/CVE-2024-480xx/CVE-2024-48038.json) (`2024-10-17T12:15:02.457`)
|
||||
- [CVE-2024-48043](CVE-2024/CVE-2024-480xx/CVE-2024-48043.json) (`2024-10-17T12:15:02.677`)
|
||||
- [CVE-2024-48046](CVE-2024/CVE-2024-480xx/CVE-2024-48046.json) (`2024-10-17T13:15:14.170`)
|
||||
- [CVE-2024-48047](CVE-2024/CVE-2024-480xx/CVE-2024-48047.json) (`2024-10-17T12:15:02.880`)
|
||||
- [CVE-2024-48048](CVE-2024/CVE-2024-480xx/CVE-2024-48048.json) (`2024-10-17T13:15:14.390`)
|
||||
- [CVE-2024-49320](CVE-2024/CVE-2024-493xx/CVE-2024-49320.json) (`2024-10-17T12:15:03.077`)
|
||||
- [CVE-2024-49579](CVE-2024/CVE-2024-495xx/CVE-2024-49579.json) (`2024-10-17T13:15:14.613`)
|
||||
- [CVE-2024-49580](CVE-2024/CVE-2024-495xx/CVE-2024-49580.json) (`2024-10-17T13:15:14.853`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `3`
|
||||
Recently modified CVEs: `27`
|
||||
|
||||
- [CVE-2023-45593](CVE-2023/CVE-2023-455xx/CVE-2023-45593.json) (`2024-10-17T10:15:02.323`)
|
||||
- [CVE-2023-45596](CVE-2023/CVE-2023-455xx/CVE-2023-45596.json) (`2024-10-17T10:15:02.930`)
|
||||
- [CVE-2023-45598](CVE-2023/CVE-2023-455xx/CVE-2023-45598.json) (`2024-10-17T10:15:03.030`)
|
||||
- [CVE-2018-8910](CVE-2018/CVE-2018-89xx/CVE-2018-8910.json) (`2024-10-17T13:54:41.787`)
|
||||
- [CVE-2018-8921](CVE-2018/CVE-2018-89xx/CVE-2018-8921.json) (`2024-10-17T13:54:41.787`)
|
||||
- [CVE-2018-8922](CVE-2018/CVE-2018-89xx/CVE-2018-8922.json) (`2024-10-17T13:54:41.787`)
|
||||
- [CVE-2020-28129](CVE-2020/CVE-2020-281xx/CVE-2020-28129.json) (`2024-10-17T12:39:41.690`)
|
||||
- [CVE-2020-29288](CVE-2020/CVE-2020-292xx/CVE-2020-29288.json) (`2024-10-17T12:39:41.690`)
|
||||
- [CVE-2022-36193](CVE-2022/CVE-2022-361xx/CVE-2022-36193.json) (`2024-10-17T13:34:09.183`)
|
||||
- [CVE-2024-27136](CVE-2024/CVE-2024-271xx/CVE-2024-27136.json) (`2024-10-17T13:47:39.417`)
|
||||
- [CVE-2024-43557](CVE-2024/CVE-2024-435xx/CVE-2024-43557.json) (`2024-10-17T13:31:54.217`)
|
||||
- [CVE-2024-43558](CVE-2024/CVE-2024-435xx/CVE-2024-43558.json) (`2024-10-17T13:31:55.977`)
|
||||
- [CVE-2024-43559](CVE-2024/CVE-2024-435xx/CVE-2024-43559.json) (`2024-10-17T13:31:57.833`)
|
||||
- [CVE-2024-45731](CVE-2024/CVE-2024-457xx/CVE-2024-45731.json) (`2024-10-17T13:09:33.017`)
|
||||
- [CVE-2024-45732](CVE-2024/CVE-2024-457xx/CVE-2024-45732.json) (`2024-10-17T13:03:52.153`)
|
||||
- [CVE-2024-45738](CVE-2024/CVE-2024-457xx/CVE-2024-45738.json) (`2024-10-17T13:17:37.723`)
|
||||
- [CVE-2024-45739](CVE-2024/CVE-2024-457xx/CVE-2024-45739.json) (`2024-10-17T13:16:36.440`)
|
||||
- [CVE-2024-45740](CVE-2024/CVE-2024-457xx/CVE-2024-45740.json) (`2024-10-17T13:14:20.107`)
|
||||
- [CVE-2024-45741](CVE-2024/CVE-2024-457xx/CVE-2024-45741.json) (`2024-10-17T13:12:54.180`)
|
||||
- [CVE-2024-47766](CVE-2024/CVE-2024-477xx/CVE-2024-47766.json) (`2024-10-17T13:48:40.240`)
|
||||
- [CVE-2024-47767](CVE-2024/CVE-2024-477xx/CVE-2024-47767.json) (`2024-10-17T13:50:45.307`)
|
||||
- [CVE-2024-47828](CVE-2024/CVE-2024-478xx/CVE-2024-47828.json) (`2024-10-17T13:55:23.577`)
|
||||
- [CVE-2024-5278](CVE-2024/CVE-2024-52xx/CVE-2024-5278.json) (`2024-10-17T13:56:49.813`)
|
||||
- [CVE-2024-6649](CVE-2024/CVE-2024-66xx/CVE-2024-6649.json) (`2024-10-17T13:42:33.927`)
|
||||
- [CVE-2024-6652](CVE-2024/CVE-2024-66xx/CVE-2024-6652.json) (`2024-10-17T12:39:41.690`)
|
||||
- [CVE-2024-6830](CVE-2024/CVE-2024-68xx/CVE-2024-6830.json) (`2024-10-17T13:33:40.750`)
|
||||
- [CVE-2024-9546](CVE-2024/CVE-2024-95xx/CVE-2024-9546.json) (`2024-10-17T13:34:27.890`)
|
||||
- [CVE-2024-9548](CVE-2024/CVE-2024-95xx/CVE-2024-9548.json) (`2024-10-17T13:46:07.997`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
101
_state.csv
101
_state.csv
@ -101606,7 +101606,7 @@ CVE-2017-18352,0,0,b9ff12e4633b75a9adb870aac567fbd1ab716042fb567ddb6c5f0e79da7f8
|
||||
CVE-2017-18353,0,0,9626f262756d86397f498379342d86c8b9621b8a11050059397079a231a8d33c,2019-10-03T00:03:26.223000
|
||||
CVE-2017-18354,0,0,b4131d006a4373956e9588de911a48f6745d7e2b871b4c1a9077857ce39900b9,2019-01-04T14:57:14.303000
|
||||
CVE-2017-18355,0,0,ff8bae8cead46d3f4afd0d5258e69e9512290c64ad55a6d23616802961045528,2019-02-07T19:17:07.230000
|
||||
CVE-2017-18356,0,0,d09f6de4848ffa43bc9e9869821a59aa4f0343ab150deb91dcd5790670b1fd1c,2019-02-07T19:35:58.877000
|
||||
CVE-2017-18356,0,1,c0ac8dfd941be1312a79652c0101a3da14adf5ca06d953f1eea98f5e2a0e8c53,2024-10-17T12:32:31.593000
|
||||
CVE-2017-18357,0,0,13243c41a6c3b9d74a21783c1248ec1e4c14ab14772e62f6e7f0ac704bc3b250,2019-05-22T03:29:01.300000
|
||||
CVE-2017-18358,0,0,1b2a9917d67515434e9c68678a4f9fea22cde2a744bb5bced41ae5f39e8d2080,2019-01-24T15:42:47.710000
|
||||
CVE-2017-18359,0,0,a7cf3d2c4148547751d6edb4739d2a26051e138fff62037c4e5d4128b609347e,2022-04-06T18:33:34.427000
|
||||
@ -114140,7 +114140,7 @@ CVE-2018-13293,0,0,156c7ad2b2857febacbe23194cacbb7f93d4a4ac5cf05733353435e276571
|
||||
CVE-2018-13294,0,0,12dbc5e82231d66d230d4e8bf2fd80158f642372e01de694376264efe83d0dd8,2019-10-09T23:34:20.543000
|
||||
CVE-2018-13295,0,0,a204e25adfcba2a4d924c7e3570d3628a5b98dfabf441832996a327e2fa65539,2019-10-09T23:34:20.700000
|
||||
CVE-2018-13296,0,0,42d0ceb53ea52d90d3a6e0cf82b419e0fe1f879166cdee09da3c8c52db8c2af4,2019-10-09T23:34:20.840000
|
||||
CVE-2018-13297,0,0,e604b740447f36f90ebe604759f0953f7f35757c13267218cf2f07b0a622f8f8,2019-10-09T23:34:20.980000
|
||||
CVE-2018-13297,0,1,8bde31fd922067c37955de59d2e0e1173e6f10877afdac0214dfd027b426d14d,2024-10-17T13:54:41.787000
|
||||
CVE-2018-13298,0,0,04c0e74ed5416f7c89ab84b5dd3dbbcfc92b086f7db2fb2c6682e3b5a730589f,2019-10-09T23:34:21.153000
|
||||
CVE-2018-13299,0,0,7e4a1e2652b6ba145e114dd909ca8e4a97dba637072bcaf3ece4e17255cee8ac,2019-10-09T23:34:21.293000
|
||||
CVE-2018-1330,0,0,e406c44806cdd9ef7870e09166b1e6dbc65669466844ae279df9d1e22b8b1918,2023-11-07T02:55:58.810000
|
||||
@ -126549,7 +126549,7 @@ CVE-2018-8905,0,0,c2a61b8ae270f3c27e6153295ed39b4306cd2067c5fbb5a1b5da94aa942288
|
||||
CVE-2018-8906,0,0,cf586931301d2675e9ad7bed460e9d28ecc3ff40e0190b37bba458116172f139,2018-04-18T01:29:55.663000
|
||||
CVE-2018-8908,0,0,0e8a179331efa7c9b8b04d63d392f308fe2fd4e0f3e9651b38a4030ebe1b1815,2018-05-09T18:47:58.303000
|
||||
CVE-2018-8909,0,0,d90caf960501effca9e90b4a596a03419ab68e11d940a7e2709745c2c8472394,2018-04-20T16:32:25.650000
|
||||
CVE-2018-8910,0,0,8eea13265109f345491fbb9e6d119b22547c0935e749c29aea3845ec1c7fcd4a,2019-10-09T23:43:01.007000
|
||||
CVE-2018-8910,0,1,fcd8d666566ccede35521a2e45cdaf9ebdabd5f976c283b45e1ce9912a15b047,2024-10-17T13:54:41.787000
|
||||
CVE-2018-8911,0,0,2e5098ab0823818a9183a2adae5498309a147b780d039887f7362ca47e4f055d,2019-10-09T23:43:01.147000
|
||||
CVE-2018-8912,0,0,6d36ed59d04ec304e8b96cea9ae807e5cfae9ffcc3c5d1a8104b59a3a6636f01,2019-10-09T23:43:01.300000
|
||||
CVE-2018-8913,0,0,4958bcccd3fb31a98373c11ad09bfc0557192ca1fbef56bcb04a34b7fd7a0312,2019-10-09T23:43:01.443000
|
||||
@ -126560,8 +126560,8 @@ CVE-2018-8917,0,0,c5c5c58ff0064c01284caf4e3cded386d5531897af95ea5f8fd8535e1f8424
|
||||
CVE-2018-8918,0,0,be534aec95cdf1f32cbcbaf2479d4969d31d70e159a9ce90fef0029f792ba82e,2019-10-09T23:43:02.193000
|
||||
CVE-2018-8919,0,0,d74e2a46c8bd1690b5fcab2e27fd1fc5481047f4fe99c6c6c7f33dd0e3da70ef,2019-10-09T23:43:02.333000
|
||||
CVE-2018-8920,0,0,1496ccdce3143ae584195e3a93a0f5c385d3da940529417b2bf8075ab4016951,2021-05-12T14:15:09.957000
|
||||
CVE-2018-8921,0,0,8b7553989927471148930d4f4dc3d2d33da29e3db2a7296026c6138705a95aab,2019-10-09T23:43:02.630000
|
||||
CVE-2018-8922,0,0,f164c22271a90531579f67e1939e27bd235186170e1e9a186e923cecf150cd4e,2019-10-09T23:43:02.770000
|
||||
CVE-2018-8921,0,1,ddf44974228c94dc63a6ae4cf9c62490d35528e16575ce3718d3ad74245861f3,2024-10-17T13:54:41.787000
|
||||
CVE-2018-8922,0,1,3b8399e0b889cff8dbc6e2aed9c27bd0e51dd212285572d53a28ea212d44db2b,2024-10-17T13:54:41.787000
|
||||
CVE-2018-8923,0,0,34b0ca2982eca079decaad2f2fc8c6453ee1f04790045380fbc950037e7099e5,2019-10-09T23:43:02.897000
|
||||
CVE-2018-8924,0,0,a72c661c89352afd0757f319b4dba0f1741706c78149c215aedfcd9de2e8cdc4,2019-10-09T23:43:03.037000
|
||||
CVE-2018-8925,0,0,df20d4301837d734be742dc7f33ebfc8946d4e3b0d51cad10afe90156b9c2eed,2019-10-09T23:43:03.160000
|
||||
@ -156652,7 +156652,7 @@ CVE-2020-28115,0,0,f836767599e6375187b25813d4ad96e29cea8a15f742bac794840e099ed35
|
||||
CVE-2020-28119,0,0,9b841e4e8ac75e26ac4917c31341aadb8dd86fff1e0caa4acd34c1b103b72eb2,2021-10-08T17:01:37.117000
|
||||
CVE-2020-2812,0,0,b3b73c4742e49a606fd45a829ad8e9899bb80c6813aa1fbd7553df84449503c1,2023-11-07T03:21:48.753000
|
||||
CVE-2020-28124,0,0,e09369e78337bc5432bff6ef9db33c64b1a1fd8499471ec4a653ba3864562bdb,2021-04-19T21:29:54.660000
|
||||
CVE-2020-28129,0,0,0c5fc781d4fff75dffbac7556746f84fc89b723750a458469e66f5fb5061435f,2020-11-25T15:24:18.097000
|
||||
CVE-2020-28129,0,1,977347bbcb39a34cb09647999f05d1e9d279ba04bed99b5de26125c7a8bf4f6f,2024-10-17T12:39:41.690000
|
||||
CVE-2020-2813,0,0,7782629a543ac36286266077835f9b348cf86782029a26343916eb5c21bc9721,2020-04-17T17:03:24.707000
|
||||
CVE-2020-28130,0,0,b18f4eb99da4f5d60c8e9ae83df46ef4d65a432870bf767667232679adaf7d96,2020-11-23T19:47:05.500000
|
||||
CVE-2020-28133,0,0,17b9c4bc91c6d801b76414f90ed315e6d77bdb59d5fef89380709e419c6a04d1,2020-12-01T16:52:29.403000
|
||||
@ -157343,7 +157343,7 @@ CVE-2020-29283,0,0,19a89f63724e20df90324476b463865d8e0874562b8a6899a4a6197f81ab7
|
||||
CVE-2020-29284,0,0,53370db92dfa20bbebb18c51847ef26a1b413a7bc8422eeac870a20c892b3e81,2020-12-04T16:33:28.147000
|
||||
CVE-2020-29285,0,0,e2a1f2d0751d9894c593e394022b4e4de1c31df5c34065e8f2f9c9a35f5b9e30,2020-12-04T16:27:40.360000
|
||||
CVE-2020-29287,0,0,f991d1c000e011d1f4b34ec8cd4086bf3e812fdd087eb34d1b94e2e6ff5186df,2020-12-03T01:34:04.383000
|
||||
CVE-2020-29288,0,0,3793daaf22d55c6e05e62888ab123b967596edc4a21dbeee1cb5c55f5dc5bc91,2020-12-03T01:34:48.290000
|
||||
CVE-2020-29288,0,1,e8fa28de00746f15a114b3958ec6acfece47708c65a9aece04708d9cd6f95004,2024-10-17T12:39:41.690000
|
||||
CVE-2020-2929,0,0,c01218ecff276306c080eae3e5a2e3b9853e272553b68dea4a408f6ad3b7481d,2021-02-22T14:01:18.240000
|
||||
CVE-2020-29292,0,0,4d2583c1058e1c92c6b5c4d574cadd0b47837912ceb703d82ac2ef52ec19d238,2022-01-10T21:11:57.137000
|
||||
CVE-2020-29297,0,0,1901b4b502351611f0ce30a05dc36a94b6a7fa164f19d46b83c9996a95441d7e,2023-11-02T21:15:09.610000
|
||||
@ -203153,7 +203153,7 @@ CVE-2022-36186,0,0,2edc1e43e19f96244dc4d9d74bcbff8cc24f64e963dab7653b4517a3fdd98
|
||||
CVE-2022-3619,0,0,a538eeafa45e631dd57341d3dcf29c61025fcd9bf7401ba7f1dcc24f4f308a23,2023-11-07T03:51:31.450000
|
||||
CVE-2022-36190,0,0,9370e6cb471c77f9978d11df9ecc5f42b000a1a35208db294f4c39b47ddded5b,2023-05-27T04:15:21.467000
|
||||
CVE-2022-36191,0,0,0fc9a1c9cbdabd6ad5a69107e7b3f04bc169a7e2a88e67c899657eededd5c7b6,2023-05-27T04:15:21.550000
|
||||
CVE-2022-36193,0,0,968f57851e6c74b8233ddc0764822ddd177bc77ace03a55e7ea2f79011d63a56,2022-11-28T19:15:37.177000
|
||||
CVE-2022-36193,0,1,0f368fe2753c0229baf1b122f9369aa212807719e161f306d8eaa7724485ca7f,2024-10-17T13:34:09.183000
|
||||
CVE-2022-36194,0,0,1a1a755fe0268f1b8e9cec19f84483c6bd84f2f22cabea1d1304d438b17e208e,2022-09-01T19:57:01.093000
|
||||
CVE-2022-36197,0,0,f4642d80b862805e7f47399956d21d51327131724aba362067a064cf6bb3cba7,2022-08-09T19:39:48.267000
|
||||
CVE-2022-36198,0,0,60ba2affabaa43938e270c752b6077ed36cc29ec654c2343017dd957bfa79823,2023-11-14T20:37:14.673000
|
||||
@ -234177,12 +234177,12 @@ CVE-2023-4559,0,0,72279ca2cfab6cd57c9fd704465552b3f96b18e016e80ed280e6b57992704f
|
||||
CVE-2023-45590,0,0,395cef5e7face59cb12e60aa86968e30b836e974c0902f8b616a140e25f389c2,2024-04-10T13:24:22.187000
|
||||
CVE-2023-45591,0,0,cf9e6a9dffe366c3a101b8946fe672bc4bfd64f91dde328a27c0abc9ecef2a60,2024-03-05T13:41:01.900000
|
||||
CVE-2023-45592,0,0,d0d9e890692c9d2f672638432172eb4b39935c3ec25ecd02679746861a491ed7,2024-03-05T13:41:01.900000
|
||||
CVE-2023-45593,0,1,4d4014bf7cebebe595c19fcbec3e75beba48073c1a59cb12555bbefc25c19dcc,2024-10-17T10:15:02.323000
|
||||
CVE-2023-45593,0,0,4d4014bf7cebebe595c19fcbec3e75beba48073c1a59cb12555bbefc25c19dcc,2024-10-17T10:15:02.323000
|
||||
CVE-2023-45594,0,0,b0393b56950f0e428e7f32464ae14b00c9d8d573fb1c945ee040adcbe0cae423,2024-03-05T13:41:01.900000
|
||||
CVE-2023-45595,0,0,97fdab9361adba6ff516a722307aaf80ac25532bbb8a65ce7e8016865b5b4335,2024-03-05T13:41:01.900000
|
||||
CVE-2023-45596,0,1,f6526d811f59ab1f5d8bf8e0687a80028582194ee2678ff2d3ad4995f8faec8c,2024-10-17T10:15:02.930000
|
||||
CVE-2023-45596,0,0,f6526d811f59ab1f5d8bf8e0687a80028582194ee2678ff2d3ad4995f8faec8c,2024-10-17T10:15:02.930000
|
||||
CVE-2023-45597,0,0,6eda7e849c9a4bdd69829985d8c92fa15c239c694799c3f0f4136c981201e30d,2024-03-05T13:41:01.900000
|
||||
CVE-2023-45598,0,1,0b54371329cc3f857f4923966c54422f03169d9844a43c0912713bacc27d1d05,2024-10-17T10:15:03.030000
|
||||
CVE-2023-45598,0,0,0b54371329cc3f857f4923966c54422f03169d9844a43c0912713bacc27d1d05,2024-10-17T10:15:03.030000
|
||||
CVE-2023-45599,0,0,a63a7d7517b98ea5bbcba86a530677f32fda9d14b1e6ff868e28e88d7ec0b249,2024-03-05T13:41:01.900000
|
||||
CVE-2023-4560,0,0,c374d73c6512c9198ae07844b4a0a2f3fca9714a1a09bfcdc42777875b8a378f,2023-08-29T16:26:23.543000
|
||||
CVE-2023-45600,0,0,fd93772078d54879fff3d7d0b2d712b79d029619c10d19ec9c5685e5f21f76db,2024-03-05T13:41:01.900000
|
||||
@ -240815,6 +240815,8 @@ CVE-2023-6723,0,0,bc516f06b799fd16a153a5db758b99843661b1d7275b56dd1219f1a33cef70
|
||||
CVE-2023-6724,0,0,4a987444faf294be99c3a8b915efad529d52daa579fbc3389c67429b7ef5f31f,2024-02-15T18:44:49.107000
|
||||
CVE-2023-6725,0,0,6ba896a9300f79a0e855968fd521febe22301aa8fa4615d4c4e6bb1264e86ccc,2024-05-22T22:15:08.463000
|
||||
CVE-2023-6727,0,0,55c30cd2b84fe8c26c6d900d04c5581bc0771e597f1756e309a8396bf4e4b0f4,2023-12-15T14:43:08.920000
|
||||
CVE-2023-6728,1,1,49bee4be884b007cd4cbac766baa21b202a92d32d10f2a941a97cce2e88e35ef,2024-10-17T13:15:12.077000
|
||||
CVE-2023-6729,1,1,526202ad123fc3288f60551d1a4e4aad5c39442082d096f12f60437f6c698742,2024-10-17T13:15:12.170000
|
||||
CVE-2023-6730,0,0,d0ffb6838b9a65af4c4905bc6f307ae559cbaec8450c4b0ee798393fc6043da1,2023-12-28T17:15:33.537000
|
||||
CVE-2023-6731,0,0,3d191e2c26a0a3aa0821f60da98004f88d38a1819ac9580185e4501f59332a4d,2024-05-02T18:00:37.360000
|
||||
CVE-2023-6732,0,0,a8cf2e4c4dcc6f1ed4b0c8bd0cc0fcda4e222ce88394800e3628dc6aaf413fbd,2024-01-23T14:59:59.107000
|
||||
@ -242217,13 +242219,13 @@ CVE-2024-10021,0,0,a6b17344f3b8ed69b69af1e4c8072f0ea15408a02fd5537c80b963512d697
|
||||
CVE-2024-10022,0,0,0168cd514401d1be0e849bc27c7e2e366e37ce97ce04620f3f8d342cf2b43281,2024-10-16T16:38:14.557000
|
||||
CVE-2024-10023,0,0,db54ebd532d797f8c44fbc00efc10b60040113385b1a36843228c76d3987b972,2024-10-16T16:38:14.557000
|
||||
CVE-2024-10024,0,0,011fb00487d29d1b355fb7ab9e71d1875a267d231fe8021bcbf0d20089aa0bde,2024-10-16T16:38:14.557000
|
||||
CVE-2024-10025,1,1,a657e3a6cd20a3590296015914b590551c8ff06d45d4d15847982a0af5da7204,2024-10-17T10:15:03.127000
|
||||
CVE-2024-10025,0,0,a657e3a6cd20a3590296015914b590551c8ff06d45d4d15847982a0af5da7204,2024-10-17T10:15:03.127000
|
||||
CVE-2024-1003,0,0,5577a6ad54fba7e1e984add6f75aca7e6ad73817623f9ed150fa33b583cd3fae,2024-05-17T02:35:09.147000
|
||||
CVE-2024-10033,0,0,5f5fac31bbbb873ca41babce49ba5085a90c023337e2ffcbb5946f7099ac45c0,2024-10-16T17:15:13.267000
|
||||
CVE-2024-1004,0,0,be9a3a60f238fd673f4d3f1f166af1f9400f4582d193359c16f232ef2b1c02fa,2024-05-17T02:35:09.263000
|
||||
CVE-2024-1005,0,0,1191b4a20d5b719ff3ba58b8e13bb4278d19f2133e7221e782230a58acb2d18f,2024-05-17T02:35:09.367000
|
||||
CVE-2024-1006,0,0,fe82f3d0065ffa9f2a59eb5b63e144d9442dc24b73dc23626043d548cf903e88,2024-05-17T02:35:09.467000
|
||||
CVE-2024-10068,1,1,edeccdb97d27b9416725ed62091d877abbfc4b3e48df84d0f4d49ab4425c3361,2024-10-17T11:15:10.390000
|
||||
CVE-2024-10068,0,0,edeccdb97d27b9416725ed62091d877abbfc4b3e48df84d0f4d49ab4425c3361,2024-10-17T11:15:10.390000
|
||||
CVE-2024-1007,0,0,bb97efced7fb486712fbb95488bae5086c8742bff2dc7feb7593b966188b1cd7,2024-05-17T02:35:09.577000
|
||||
CVE-2024-1008,0,0,a9b7d9e2e828ed74dc3f97aef993fcfdb7b13561fd219152455ff7524c8067cd,2024-05-17T02:35:09.680000
|
||||
CVE-2024-1009,0,0,97af4237278897e4de60a52c929ac5642d8b709167b278dc1af6a70d4d177e3b,2024-05-17T02:35:09.780000
|
||||
@ -248422,7 +248424,7 @@ CVE-2024-27130,0,0,536ba84e44f1b39ccd708bbac556c22b4a414189a9907fbad36fac1cb7a01
|
||||
CVE-2024-27132,0,0,c5cfdc93a4a30eb4ada1b68dc89dd72224529d7dc99c692ce9a1a016e1ab521d,2024-02-26T13:42:22.567000
|
||||
CVE-2024-27133,0,0,6574fdde089b4683da8bd06069d4a01e27d182b9361898f9a2a8686337a251e3,2024-02-26T13:42:22.567000
|
||||
CVE-2024-27135,0,0,8f681cbd0423d5edcf1af419653a19c055e013668588c5e21fc1acd9f7af97d0,2024-05-01T17:15:30.087000
|
||||
CVE-2024-27136,0,0,95371c097b782a9c3eb2e668bc7e52a3add3a0ca964de3d4fb22468a7d6fe516,2024-06-24T12:57:36.513000
|
||||
CVE-2024-27136,0,1,27208b55e838e26e8744f0daba44f78d1e5c27e433ec8142f38052cb8e098b97,2024-10-17T13:47:39.417000
|
||||
CVE-2024-27138,0,0,1f057fc4a86e32fdd3cbe80da63722cbc73089ddadbb43b1562d5d847b0f5599,2024-08-21T21:35:04.820000
|
||||
CVE-2024-27139,0,0,5ffd1b44abbd3dc84ccc8dc40302ee472c30e7eda7536bd71d562f3fb40cf709,2024-08-02T01:15:30.347000
|
||||
CVE-2024-2714,0,0,fd707009e35b2adf97d47fd45e1287d327a5720e922cfb5f98c6896a9e8b6097,2024-05-17T02:38:26.850000
|
||||
@ -259747,9 +259749,9 @@ CVE-2024-43553,0,0,be4085301235d40e91d496887562a892cb2ac9acd5abfae283a9b8bf314e8
|
||||
CVE-2024-43554,0,0,bb63d28e05ce5050bc162460dbee0728a7bbbc1c0e6998056ea39ab8476a23ad,2024-10-10T12:56:30.817000
|
||||
CVE-2024-43555,0,0,3dca2d145af9e3df52924a3bb0a171f88de7724d682732242b8290bc62fe24e2,2024-10-10T12:56:30.817000
|
||||
CVE-2024-43556,0,0,1257a690ef120eacdd50c7d90529e42eb884704badc5ef7ffaee7894080a7c0f,2024-10-10T12:56:30.817000
|
||||
CVE-2024-43557,0,0,39ec5177018d7c898c695db8d0adc63a2987bce8be1176bc62821e52bc61a2e3,2024-10-10T12:56:30.817000
|
||||
CVE-2024-43558,0,0,cf5a52e5f73cea3137e8ab4fd3a3408bf135e5e46eb2641cdff3a5ae9bf03f47,2024-10-10T12:56:30.817000
|
||||
CVE-2024-43559,0,0,7936ed77077b60aabfbbd5ee22e2dc279ebc950a34c3b2b2bda4b260c44ffd9e,2024-10-10T12:56:30.817000
|
||||
CVE-2024-43557,0,1,784499f81b154449652287778bf4b6ef73c859345b156139f5a3c63419d61f8d,2024-10-17T13:31:54.217000
|
||||
CVE-2024-43558,0,1,c5647f9430efe481a7895b464303db8cbd17dbd8c9bb1bfffb821e1b84ea29ed,2024-10-17T13:31:55.977000
|
||||
CVE-2024-43559,0,1,847bc9789e89e7957dddbd5cf9a77e7f5b9f190ca17a4468bc17be9db417b1e2,2024-10-17T13:31:57.833000
|
||||
CVE-2024-4356,0,0,c314fe1608f5a3b59bb87f88c052e04f3d51ca5a5e09c7b63a9301a39fa91b0f,2024-05-30T13:15:41.297000
|
||||
CVE-2024-43560,0,0,bc69c825b8ed4022c0a791d0ea0f187a67b2728e5a8eeb6b7dc0905da189ae5a,2024-10-10T12:56:30.817000
|
||||
CVE-2024-43561,0,0,eac326be7f3c583f78f6a14846a707a9c45fee20c4f0656c560698a192bede5a,2024-10-10T12:56:30.817000
|
||||
@ -260912,24 +260914,24 @@ CVE-2024-4570,0,0,c1cc5ae154200d1c8cbc554d2bd91b7f0d0e2fb1c25faf550303ad23eb2c10
|
||||
CVE-2024-4571,0,0,76823bb120333d1d68e24e57a18868a62bd826931cb118db3f1630877d1250ae,2024-05-14T15:44:05.750000
|
||||
CVE-2024-45710,0,0,48beaeb67d0c1d06dc62433cdcd6c44cd533da6f6df2eea2b2bc23988485e966,2024-10-16T16:38:14.557000
|
||||
CVE-2024-45711,0,0,19c54833e15f093148fee6da8fb4f01e4e5c3f6c0710fc303f880a75fe725a5f,2024-10-16T16:38:14.557000
|
||||
CVE-2024-45713,1,1,73d370cf3c5f1b6458f547b408d00ac34dfd405116e79a0b7e6a15b32bb06e53,2024-10-17T11:15:10.850000
|
||||
CVE-2024-45713,0,0,73d370cf3c5f1b6458f547b408d00ac34dfd405116e79a0b7e6a15b32bb06e53,2024-10-17T11:15:10.850000
|
||||
CVE-2024-45714,0,0,05df79781d57cb807340d58e5fdb395e7ff3d312e0246779106a95480e9b6b3d,2024-10-16T16:38:14.557000
|
||||
CVE-2024-45715,0,0,6eeb77978f0221f2d797c4955663560bb5f3c3e2030f7e99dea779f5ed5a3be9,2024-10-16T16:38:14.557000
|
||||
CVE-2024-4572,0,0,6754f54e88e479a744a4367c8d1d2577fd697a90d0783dabcb9fc508df61090e,2024-05-14T15:44:06.153000
|
||||
CVE-2024-45720,0,0,9a958c282ef360c53e2ab2db366594f7b62a7ef8d528ac6998de122fd3a653b0,2024-10-10T12:51:56.987000
|
||||
CVE-2024-45723,0,0,63a77b3806467261b762149cf38436dbbeeccf91520557e4f16dba13005bb2d7,2024-10-07T17:43:52.783000
|
||||
CVE-2024-45731,0,0,837f8c79b7a5f9d2dadd8823431576dec7771f04f77c365fcfdf6e96b68488ed,2024-10-15T12:57:46.880000
|
||||
CVE-2024-45732,0,0,58eb38190ddbf3877e15a1f26f2eecfab037a7f76420ec49567111f156e0c36e,2024-10-15T12:57:46.880000
|
||||
CVE-2024-45731,0,1,4dda506c3647f8a5d14d9edcb8510fae60067d56ed0c446cba3d4a31a329a6ae,2024-10-17T13:09:33.017000
|
||||
CVE-2024-45732,0,1,2876e913548465638fbb383e4d5a666f5e6d891028e7cfeee48d5f9d8c09f0f0,2024-10-17T13:03:52.153000
|
||||
CVE-2024-45733,0,0,013b651715fe25de1bac52e6f9a67b63b99043d7651e9ad382158887b81857e5,2024-10-16T22:26:12.937000
|
||||
CVE-2024-45734,0,0,7f9e65c88de7aafe93b35ba6dd662a7e507c35b4ddb7cda82fe62844fcd1fc58,2024-10-16T22:20:57.687000
|
||||
CVE-2024-45735,0,0,c032744a8530a538209a589a2167488998a88ca7d64ac404fc665a8e489ed628,2024-10-16T22:20:32.630000
|
||||
CVE-2024-45736,0,0,bc0577ca51f17488070d116fc0381d26183a6101017b4d47296ed7daaa5571a1,2024-10-16T22:19:44.507000
|
||||
CVE-2024-45737,0,0,ed87eed3b9559d40846243fc8bc5da9433ed7650cb1690988e8039cad1a34bc9,2024-10-16T22:18:17.003000
|
||||
CVE-2024-45738,0,0,91bc78933fad218b7f0821f1540f5679206b638397b93572061a3d4cce361384,2024-10-15T12:57:46.880000
|
||||
CVE-2024-45739,0,0,79f31f89bae88c8aded1413c7f1583ad059ce20c0f043bfef0e2dce3b0399b01,2024-10-15T12:57:46.880000
|
||||
CVE-2024-45738,0,1,5f811e10ea7480a6e916722f29928de278bf90c3e90c73532dc4750cbc3c4717,2024-10-17T13:17:37.723000
|
||||
CVE-2024-45739,0,1,91a48685ef0bee22dcb739ca5937d2d5214f6a65e6cdd0afb8fe5369bf56ec48,2024-10-17T13:16:36.440000
|
||||
CVE-2024-4574,0,0,5bc00996fe57104150ae610f292ff224de65f0948423aca3282fe7d917884520,2024-05-14T16:11:39.510000
|
||||
CVE-2024-45740,0,0,6332ec886f1d3b4a11286b46951405ed44d3d91884b15ede0f3f405ec57a1a73,2024-10-15T12:57:46.880000
|
||||
CVE-2024-45741,0,0,b5015e9a0725134d3a6a4b0d67310b503d318ba2f83754e4d28f43cf49db1735,2024-10-15T12:57:46.880000
|
||||
CVE-2024-45740,0,1,8b02d100709243adc748f8c84eb726ce6016bbe097fb330a6746d5f395d8de08,2024-10-17T13:14:20.107000
|
||||
CVE-2024-45741,0,1,5fb66fbe9131727c07c0f287ec2e0ff4ce8fce9ab201d92c3cc4c526db45ceaa,2024-10-17T13:12:54.180000
|
||||
CVE-2024-45744,0,0,ec4698c6891bd67c723c11e0dc841a026f8c5da574327fdd441b22164fa47c9a,2024-09-30T12:45:57.823000
|
||||
CVE-2024-45745,0,0,095415295fb9e908dbd1bbbd24ecc8e41cf81936c17bbb0aa6290e6785ab228e,2024-09-30T12:45:57.823000
|
||||
CVE-2024-45746,0,0,902861897e83a8721d85c8381c9fc33c107d622749f6a985c29d3f01f324f690,2024-10-11T21:36:34.350000
|
||||
@ -261921,8 +261923,8 @@ CVE-2024-47762,0,0,faf4eb81ce6d805e421dff7a7d50a27f6affd6a56e4bb98171a2180279fc1
|
||||
CVE-2024-47763,0,0,0009d92633a66a995666b904976a3f571897c7b107ff706ed2173ff97f66c3ef,2024-10-10T12:51:56.987000
|
||||
CVE-2024-47764,0,0,b7aba4870e1203663c4fa6abc120a30e41523fde8e72997d929896b167fbbd57,2024-10-07T17:48:28.117000
|
||||
CVE-2024-47765,0,0,a65b089ee1fbe8158413dce3d4bb6a7a005d6b3f8045c2a8b0cf8a91ea4da578,2024-10-07T17:48:28.117000
|
||||
CVE-2024-47766,0,0,421ab38915d5ba49f89a1081cf3d8a3ba6f443d67dad56e6641cfea0dd057b09,2024-10-15T12:57:46.880000
|
||||
CVE-2024-47767,0,0,9af27c7c3746a91762dbd43bd1bdd93db1f293ef5650b0e96c4aac72ab44cf86,2024-10-15T12:57:46.880000
|
||||
CVE-2024-47766,0,1,59d1cafa97bbe3c507ee281e2420a2565da94f1f4cb02db911bf7e696c9937ad,2024-10-17T13:48:40.240000
|
||||
CVE-2024-47767,0,1,f76f72b4bf5318a9be9574bffe5372ec8ef5f4dad0f6382ddd16a807c2769b9e,2024-10-17T13:50:45.307000
|
||||
CVE-2024-47768,0,0,f403a0de6ad99844ca2cbb93a58b82a840eb5e868f9e8f1d631547e4814a24ea,2024-10-07T17:48:28.117000
|
||||
CVE-2024-47769,0,0,89e2e7df1b1b68f8d9732f48769437016eda3284d5a81e91e9482d5022e6eda8,2024-10-07T17:48:28.117000
|
||||
CVE-2024-4777,0,0,96d0d896ebb105a32ed437e794c8fc4ba926ad921436ba17bdb49a1a49737be4,2024-06-10T17:16:34.070000
|
||||
@ -261956,7 +261958,7 @@ CVE-2024-47822,0,0,659225121d6760adf8eca1f83c834e75b86ebec31d9e1e0ebc639ac3cc87e
|
||||
CVE-2024-47823,0,0,aba6c10bf903d75799cabb92b24bf5cc826ec4b52223e2aab9a9f7d8d8298a07,2024-10-10T12:56:30.817000
|
||||
CVE-2024-47824,0,0,60e3e0b82e04fc3016ce5ff7f0485ad8429207cb4be5065515079214bfa51129,2024-10-16T16:38:43.170000
|
||||
CVE-2024-47826,0,0,e0e92319bd7ff9f0b6142ef26fd12487604c5bd0a7b38d2c0ea52634274a8fe7,2024-10-15T12:57:46.880000
|
||||
CVE-2024-47828,0,0,20037a2831594572185910fec3fa22739c3e04d0ddf5a1652087e64bcac4c0e3,2024-10-10T12:51:56.987000
|
||||
CVE-2024-47828,0,1,a6b81ff1073f19581e05e8c790863d706cba88272fb227df996495bf444dca26,2024-10-17T13:55:23.577000
|
||||
CVE-2024-4783,0,0,413c0436e6758a988a0c847533b21e34b17a9d936626eba8cda1a5d1f87e0181,2024-05-24T01:15:30.977000
|
||||
CVE-2024-47830,0,0,457ed410238dd49134235c9291fcb215f555d7bf33b38d5e70e7cf82b4377f0f,2024-10-15T12:58:51.050000
|
||||
CVE-2024-47831,0,0,8378040ad1670275264457c73829ff18d4decae710e794487e001c672444fba8,2024-10-15T12:57:46.880000
|
||||
@ -262032,19 +262034,33 @@ CVE-2024-4800,0,0,46f73cb5132c32f542b67f61b6f2138522f24eb42a7d5cb9e69a7f683ef977
|
||||
CVE-2024-4801,0,0,2bcdaba0a3afa2888c47ef732ae4862e81c0c79cd78d2076198cb242d0df3f0e,2024-06-04T19:20:50.120000
|
||||
CVE-2024-4802,0,0,9f23c738b4e7167dada064b214f9ad2d560e5cec48c7eaa4346088c33abc9143,2024-06-04T19:20:50.247000
|
||||
CVE-2024-48020,0,0,dcbd5af80fa4e0ff77a2481b211c24b4aca48d4b01a6d0de815360ac1c5ff406,2024-10-15T12:57:46.880000
|
||||
CVE-2024-48021,1,1,fae21041619741947cf99a443700f54a7ad1ba2bb663fe73d45937b1439f3bac,2024-10-17T13:15:12.260000
|
||||
CVE-2024-48022,1,1,ac586cf54c90f0601307cf9c1cfe678677cce2fd600d77160a18b091cdb4f96b,2024-10-17T13:15:12.513000
|
||||
CVE-2024-48023,1,1,3cde7566998f80024c1924c7c90415210cac9f50db701b35e3dd906f9a8357fd,2024-10-17T13:15:12.790000
|
||||
CVE-2024-48024,1,1,4f601d407290d85f78e34d82cc71b4261f743c6dc0a8f4bb7b5a34d7ff33df17,2024-10-17T12:15:02.230000
|
||||
CVE-2024-48025,1,1,3ff1a2bf216d5d7e6a3d596c65578f7e86038600f333d14ec80635a644592e32,2024-10-17T13:15:13.017000
|
||||
CVE-2024-48026,0,0,3c2bb88a55c60e17b5998405c29f47ffbdc9b180f9180ef70c87bbb411385b63,2024-10-16T16:38:14.557000
|
||||
CVE-2024-48027,0,0,bf61aef1b4b3ee3680cd0489e8cafb96be0e20eb1a0c26254d11632c0391d4c4,2024-10-16T16:38:14.557000
|
||||
CVE-2024-48028,0,0,70e75ead9267ebb77fec716d49af1ac568d9e786fae6ab0fb210d210ad1411a2,2024-10-16T16:38:14.557000
|
||||
CVE-2024-48029,0,0,e2057f5a9d399e7f4096e73339b7b91540247933d607ca1f14f26dee8c050343,2024-10-16T16:38:14.557000
|
||||
CVE-2024-4803,0,0,9495051e0864e5e76c8973a987e9e6eb1b1cb49bec9a5ab21c9648610125fd4d,2024-06-04T19:20:50.353000
|
||||
CVE-2024-48030,0,0,d2093f554efe94949369ea32c1b62693c34dc11165efe9f0ac1376df958a0274,2024-10-16T16:38:14.557000
|
||||
CVE-2024-48031,1,1,a74fc112c11d14249f2c51d38c7012d9234ca5575813f47f5a11bdf4ca077099,2024-10-17T13:15:13.240000
|
||||
CVE-2024-48032,1,1,73605aacb0f538235e608b4194cac74c0247326fb31b917d60c846dd2a67b194,2024-10-17T13:15:13.460000
|
||||
CVE-2024-48033,0,0,8f5c8e0edb7dcfae09a626cf6444750e299103bc74d1c2eb25573eea6cddec47,2024-10-15T12:57:46.880000
|
||||
CVE-2024-48034,0,0,3c6253bf76357837e82d74b10418d02e10751ff3b719885e87b9afdc07d5b689,2024-10-16T16:38:14.557000
|
||||
CVE-2024-48035,0,0,34b65d3473704d69375474d4e446271e1160e956f1c5bcc3256b28f1386c1f65,2024-10-16T16:38:14.557000
|
||||
CVE-2024-48036,1,1,5b5e72fbb21219c2d718ef318c67b555e544c00883af5e2f167d414216364415,2024-10-17T13:15:13.677000
|
||||
CVE-2024-48037,1,1,7fb1fb4812f5f18dc8294a4560ee88499b51d361e1d658805d1e3688265723d2,2024-10-17T13:15:13.927000
|
||||
CVE-2024-48038,1,1,f6fce07e505eeb461b84308f28dcc56f53364babccb2c5872ba7bf2dcf15570f,2024-10-17T12:15:02.457000
|
||||
CVE-2024-4804,0,0,27889f6e71f31f5b5cb9daf7c221df1ea26a19e5d20319852f304f02b73ccaf6,2024-06-04T19:20:50.450000
|
||||
CVE-2024-48040,0,0,75285ff1778ed53ff4f87c50cadf2623354cdbd73a2ea1e7e03f15540cde1f0e,2024-10-15T12:57:46.880000
|
||||
CVE-2024-48041,0,0,9636470c5937ff2a206ba0bfcba752cadd8615816ee98049f50969b87891e79a,2024-10-15T12:57:46.880000
|
||||
CVE-2024-48042,0,0,1d99a07b4cb191da550409fc88c9e5806251fda5dee41ab744024131ce4135b3,2024-10-16T16:38:14.557000
|
||||
CVE-2024-48043,1,1,734e8941a439cdbab27a817f585c00afb63bf2eccfb8019aa7cf8d0969ad1c59,2024-10-17T12:15:02.677000
|
||||
CVE-2024-48046,1,1,6a234afcfffbcfc282a869548e4ae43282190b05ccee2513fcf29b4b2b396f10,2024-10-17T13:15:14.170000
|
||||
CVE-2024-48047,1,1,765b366d02fa99ba1a7c81b60d28cee44d721a9534c32be3845bc29dae2d9810,2024-10-17T12:15:02.880000
|
||||
CVE-2024-48048,1,1,e32b705f1d5032fc04ff2516d7f72851d3d643c00333e715a0545dac2be012d1,2024-10-17T13:15:14.390000
|
||||
CVE-2024-4805,0,0,a2ff69b1db9dd7c01e8bcdbe532fffb4f68853ea688982e077b1b01529f57c85,2024-06-04T19:20:50.553000
|
||||
CVE-2024-4806,0,0,f8a0e203429c4f99450a15aa6a4b26ee8c7effa68e79948138bc0eccf2af8e7f,2024-06-04T19:20:50.670000
|
||||
CVE-2024-4807,0,0,e5ccc41d46958232939be978f4766518ab72a806619364a653b00c23b63fbc68,2024-06-04T19:20:50.770000
|
||||
@ -262260,6 +262276,7 @@ CVE-2024-4929,0,0,6b801c4c5a7fb7e65ec83572f903c6a563e938f183cb222d57e6a2e2374611
|
||||
CVE-2024-4930,0,0,af679b04f9fd8769c21afbd06a19763f2fe78e9326434dadfeea44855b5d14c8,2024-06-04T19:20:54.437000
|
||||
CVE-2024-4931,0,0,ef61357c988a5b6da4dc964c43221d8effae72407ee13fdf99bc1e0e52699bd9,2024-06-04T19:20:54.543000
|
||||
CVE-2024-4932,0,0,c4279e0e81804cf3f06e3c52edfd706c295877ccc3771ef54ad83261fb500b37,2024-05-17T02:40:43.357000
|
||||
CVE-2024-49320,1,1,1dbbe1a4cc47ca750e811da300b700cbb6549a664128f805e72b29d374034afd,2024-10-17T12:15:03.077000
|
||||
CVE-2024-4933,0,0,4d4c0ec531cab6a4561c767f5a9082d29f26ceefaadcc74bb08507bf05ca5d17,2024-06-04T19:20:54.643000
|
||||
CVE-2024-4934,0,0,fd5d4b9709dde517f56a9aae7369c165c45ceba9bcf88bee680213c2fc56b62f,2024-08-01T13:59:37.220000
|
||||
CVE-2024-49340,0,0,37285f025630fd9eb79c4269f84ef859e190bfac2e34728b5f3d3dbad2273eb0,2024-10-16T16:38:14.557000
|
||||
@ -262267,14 +262284,14 @@ CVE-2024-4936,0,0,51b2c41822c3ce01e84bd55c02328ac3499013d52d632d2af56d406c35d5a6
|
||||
CVE-2024-49382,0,0,cd14c2989a948ff9829f4d119b31d603af2c2c459b5f5d9afd11a73e5c1e5fec,2024-10-16T13:53:45.860000
|
||||
CVE-2024-49383,0,0,8836e7d175d405b86f6d0105b03c4862827296be5b39fe5cde78189dfe892bb0,2024-10-16T13:53:04.380000
|
||||
CVE-2024-49384,0,0,3ee9c94c4e7d62f73d98e9003a41428dea707c45ee737dda67404986a9c936b6,2024-10-16T13:52:19.317000
|
||||
CVE-2024-49386,1,1,88d9ef750dafb5b0f1e1bf92226ed563cc54a08fee3c6b0ca6a1a098368c9965,2024-10-17T10:15:03.547000
|
||||
CVE-2024-49386,0,0,88d9ef750dafb5b0f1e1bf92226ed563cc54a08fee3c6b0ca6a1a098368c9965,2024-10-17T10:15:03.547000
|
||||
CVE-2024-49387,0,0,e70e4e295fee330a123c323f35cb15d527d316ee3f5221af871424ea3c5d431e,2024-10-16T13:58:39.297000
|
||||
CVE-2024-49388,0,0,5d13081edde105848217330e8cc20460dfb42c426e8875787362e8bb17013386,2024-10-16T13:57:58.383000
|
||||
CVE-2024-49389,1,1,e83feddbdc89b6405989836b09f90867e5ac56892252dc8494b48677a3312aec,2024-10-17T10:15:03.813000
|
||||
CVE-2024-49389,0,0,e83feddbdc89b6405989836b09f90867e5ac56892252dc8494b48677a3312aec,2024-10-17T10:15:03.813000
|
||||
CVE-2024-4939,0,0,02ebdbdecbb04fb797cb0e62af7790a7212959b717e5fa68d9d371341b4150c3,2024-06-11T17:08:33.350000
|
||||
CVE-2024-49390,1,1,6baca18107f5cc533462346f5acbf1d2e9fe0404228790e24f98327c0b77b783,2024-10-17T10:15:04.017000
|
||||
CVE-2024-49391,1,1,3d70f3e9114e855c995af50156d159f84f68373950b34c51d590b42839188113,2024-10-17T10:15:04.193000
|
||||
CVE-2024-49392,1,1,d968d38be803f577b28f3ec92283081c0c3e6e79ceb6cb184c7b99e1105fe4a8,2024-10-17T10:15:04.383000
|
||||
CVE-2024-49390,0,0,6baca18107f5cc533462346f5acbf1d2e9fe0404228790e24f98327c0b77b783,2024-10-17T10:15:04.017000
|
||||
CVE-2024-49391,0,0,3d70f3e9114e855c995af50156d159f84f68373950b34c51d590b42839188113,2024-10-17T10:15:04.193000
|
||||
CVE-2024-49392,0,0,d968d38be803f577b28f3ec92283081c0c3e6e79ceb6cb184c7b99e1105fe4a8,2024-10-17T10:15:04.383000
|
||||
CVE-2024-4940,0,0,4accffc853c801fe14d0f801549945291e8d9583e559383dea39b767fc7e6ff0,2024-06-24T12:57:36.513000
|
||||
CVE-2024-4941,0,0,4a44b53eeef21b9bcc4a70f0f12e019011a282ac818fbf5410cd9bce445ce09d,2024-10-09T16:24:24.433000
|
||||
CVE-2024-4942,0,0,ec40ecb2c6f2c92030124cf4a899658443926a41ec90982de736f0fdfba6bcb7,2024-07-23T21:09:15.900000
|
||||
@ -262288,7 +262305,9 @@ CVE-2024-4949,0,0,5c7ef1902f4beea866d1c7d9373440674707dc0a06c9e278c0f4652ccc170a
|
||||
CVE-2024-4950,0,0,e5fcb740f07c681c8eb3b4901aae32c365007c0ebdd7c7b0ee473dbffae68af1,2024-07-03T02:08:22.150000
|
||||
CVE-2024-4956,0,0,319b39cd7f80ef1a8cfcc633b91e7d5f141facd950994947b42a7565c106a7a4,2024-05-17T18:36:31.297000
|
||||
CVE-2024-4957,0,0,e3bb8e47c8dfba146bed7647eff25fc6cc8427bb0bd54429262b4324d627abed,2024-07-03T02:08:22.473000
|
||||
CVE-2024-49579,1,1,105d6e8093ff9aaf051731899a238d3656838aaaf5411829c54bbcb94544112c,2024-10-17T13:15:14.613000
|
||||
CVE-2024-4958,0,0,15591ba73d7708bbd560fadc0281274b5c7c2c12545797826fbf6e13e1222639,2024-06-03T14:46:24.250000
|
||||
CVE-2024-49580,1,1,b0050b9bbf1029563469a5eebee7797227af50dc467f8b9c95199a7500753391,2024-10-17T13:15:14.853000
|
||||
CVE-2024-4959,0,0,862ee7700763d202e5d5dada80050e48cca3b83d56a63673f2017bcf5adb7503,2024-07-03T02:08:22.750000
|
||||
CVE-2024-49593,0,0,f7be142be0bfe72f842162432e1a57f42eae1b6ed09489bac28255b788b80b69,2024-10-17T04:15:03.440000
|
||||
CVE-2024-4960,0,0,1e2962fabc78c9680506fb58bfd339ee733c096965130a77b4df6d334c6fc642,2024-08-01T21:15:53.753000
|
||||
@ -262576,7 +262595,7 @@ CVE-2024-5274,0,0,e7d74c38d2c202c949e1ef012213e640b18c31c48483d84bb8a4761d2997d2
|
||||
CVE-2024-5275,0,0,0a8f92936fd54cfeba80497afbb5044228db5d667d0dcb3a75c34af54c4c0fca,2024-06-20T12:44:01.637000
|
||||
CVE-2024-5276,0,0,b98c8bf623aeff1994feca32cb34066ea8ef6a81fb35099972c112f59613dd44,2024-06-26T12:44:29.693000
|
||||
CVE-2024-5277,0,0,c22b3e398c55d24f660b1a45a3310a9c6b0abef458e72374f87af318fc09202a,2024-10-09T14:49:25.753000
|
||||
CVE-2024-5278,0,0,0137f7f9fca5010dd0e984a18e481a1fdb6c0eef44e397059c3c4ad95b60c95d,2024-06-07T14:56:05.647000
|
||||
CVE-2024-5278,0,1,f0307415163f20adf37f2c92a0ed4578caa6aa4e699bedaa3aae52fa3124b77a,2024-10-17T13:56:49.813000
|
||||
CVE-2024-5279,0,0,2c6d1e53ece85fba55c2b83835d7abf75ca4da167ddbecc0aa984e59d469dd0e,2024-06-04T19:21:04.240000
|
||||
CVE-2024-5280,0,0,86594c27d113c80fe7aa0a775d64720f8f3d823c49f62206ae5f1ae12a324b16,2024-08-01T13:59:43.187000
|
||||
CVE-2024-5281,0,0,d8e0f0c592f3cfcf36fc66f961b905d6afba3d53af3789e65e13042755c0a3cb,2024-08-01T13:59:43.367000
|
||||
@ -263766,10 +263785,10 @@ CVE-2024-6644,0,0,0f2d20ba591a113ddb0330b932f8a246adf881e1931b22ed31564a539ff168
|
||||
CVE-2024-6645,0,0,7709f10426c0d613ccf6f32b2adb3ff90e0557b8221acd969c94e4ad9a6fd54e,2024-07-11T13:05:54.930000
|
||||
CVE-2024-6646,0,0,a88f9e9daa434a5107be71c0c1db1a6acb029566ba77a9e2207d6608da22b1a0,2024-07-11T13:05:54.930000
|
||||
CVE-2024-6647,0,0,09a83ea8e48b51cdfaabb2b40d44883a6e2661cca1813e6ce1c2298d3fc73eb9,2024-08-01T22:15:46.930000
|
||||
CVE-2024-6649,0,0,5cdb5b2e28b9bfeb7fd4f19389db074d98b3a7e19ad14500f164241f41fa57a0,2024-07-11T13:05:54.930000
|
||||
CVE-2024-6649,0,1,b115f00b2e41a60a2a60b38a8a5a019550fc7d148d889c1d14c1a61f6bd9c52f,2024-10-17T13:42:33.927000
|
||||
CVE-2024-6650,0,0,06d380480b3184a2b1dceb59084b40d2dcd977ecfc30eac16df686ef247b8949,2024-08-30T12:53:58.763000
|
||||
CVE-2024-6651,0,0,ea873d27b7e6cf0926f77a6ff240509b7d4aeaa1088e1cf3aab190452e4555ee,2024-08-06T16:30:24.547000
|
||||
CVE-2024-6652,0,0,8978a0baa082505b94e778186034022d155714d2d8ee4e86dbb9cc40d29251d6,2024-08-08T16:43:37.053000
|
||||
CVE-2024-6652,0,1,3ff791c25c8f732c3947124509e73704873817ec6683dce373132d784d769eca,2024-10-17T12:39:41.690000
|
||||
CVE-2024-6653,0,0,d93d31cbf15b722e8213bd0a1f350049b73a325a73fea026c81bdae5013a3c4f,2024-07-11T13:15:10.147000
|
||||
CVE-2024-6654,0,0,33944ebc74d30c3cdd06834dbc588c95f63dc73814119ce0f62926870f548873,2024-10-09T09:15:06.713000
|
||||
CVE-2024-6655,0,0,a32b97bcdf109b29c8d77151fae7b1b28b3012a09ea60dee2c55a3acae47acc7,2024-09-25T01:15:45.070000
|
||||
@ -263906,7 +263925,7 @@ CVE-2024-6814,0,0,de17dadc03a3a7b793b54f2a6cb99adf9aac2d3ddb1fae1587e0c4f510c1fc
|
||||
CVE-2024-6823,0,0,1e2d1c8757819689d6550f5aeeb754dc03b20b4dd91487b47d8b2bbdb01a8e63,2024-08-13T12:58:25.437000
|
||||
CVE-2024-6824,0,0,2b5b10cc415939a34f32e5b37be54f877a179f9144de8a5e8476b884ab80faa8,2024-08-08T13:04:18.753000
|
||||
CVE-2024-6828,0,0,5e3bce0050be5ef41f841daf735b80af46e729368278d26d6a7ddc5bbbdee66f,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6830,0,0,66325e33317c6fde8b929b285667c5104c4ae04492532b5067560968ff36e7fb,2024-07-18T12:28:43.707000
|
||||
CVE-2024-6830,0,1,aebb528fa5990f215bf59ed6adf1eccff7b523ab0519e4c99385be78311dcd92,2024-10-17T13:33:40.750000
|
||||
CVE-2024-6833,0,0,b0ea48d29166f6347ac218b4f9f93d3f7fc599fd932b64c35cfa55e5a1a94672,2024-07-18T12:28:43.707000
|
||||
CVE-2024-6834,0,0,23e85f57c9b7230818a4425261a24fd150d79ea72676d6bce04d47efdd69630e,2024-08-01T14:00:44.750000
|
||||
CVE-2024-6835,0,0,41865b692717ae9a44a610e23697ffc045f0e55e3b334eff49e1f6de97130779,2024-09-11T16:32:16.247000
|
||||
@ -265432,7 +265451,7 @@ CVE-2024-8915,0,0,80988e61f2deb23ce0d3db6a9db0275f7f6c7eec9c9b53e27317ff9faa29da
|
||||
CVE-2024-8917,0,0,32a69b030ac61cd4e144a233fc55362cc6115ccb6ecca5ec236644320a2aecf1,2024-09-30T14:30:38.687000
|
||||
CVE-2024-8918,0,0,a139fa98c762213efbc8dcac6978c26e1be1ed82aa4c6eeed1f671b900ced8c7,2024-10-16T16:38:14.557000
|
||||
CVE-2024-8919,0,0,e01b61fd584c4fffdfd8e5db7a09e1be1033f5c7df5b5418d10948726a2bc540,2024-09-30T15:08:14.077000
|
||||
CVE-2024-8920,1,1,53c655c6d8a52f85bf37b964563db2a6df3b60cec3ba9d6a8f0ac48ff6d579c7,2024-10-17T10:15:04.580000
|
||||
CVE-2024-8920,0,0,53c655c6d8a52f85bf37b964563db2a6df3b60cec3ba9d6a8f0ac48ff6d579c7,2024-10-17T10:15:04.580000
|
||||
CVE-2024-8921,0,0,284c01e369230b6750ee6b9940d65eaadc6d5f92caf4598fee3000ae2f72d29e,2024-10-16T16:38:14.557000
|
||||
CVE-2024-8922,0,0,8e0e34187cf2453e3fbc920fc9b2ec5c27a6978605c90cb2daa5d0ef90213fbe,2024-10-04T19:11:47.217000
|
||||
CVE-2024-8925,0,0,7b6e4b4e016d861119aaef8d6752703732a07441653d2fc6f49b309099d5a5d4,2024-10-16T18:53:39.957000
|
||||
@ -265584,7 +265603,7 @@ CVE-2024-9173,0,0,35b89a81311ca677fe554b85f50232d9274c2631e7208ee1d074802a8dbdb5
|
||||
CVE-2024-9174,0,0,70fba8b83f62f6c4709cde03a07baa90e2b7205b145527e48fd4fbdcbf5b21e3,2024-10-04T13:50:43.727000
|
||||
CVE-2024-9177,0,0,c4277901c0a37ba57d19438c33c0231133f774b6681a96af5a3a31a338af68ef,2024-10-03T14:32:46.150000
|
||||
CVE-2024-9180,0,0,f5e0821b2debc3c255056411f9bf179456f8a11955388738e100a69bfcad1cdd,2024-10-15T12:58:51.050000
|
||||
CVE-2024-9184,1,1,4a2eda2c8bf304ed9e2d3075b2ede5c625318482c442536cd4f36538a0766de8,2024-10-17T10:15:04.803000
|
||||
CVE-2024-9184,0,0,4a2eda2c8bf304ed9e2d3075b2ede5c625318482c442536cd4f36538a0766de8,2024-10-17T10:15:04.803000
|
||||
CVE-2024-9187,0,0,ec7d5f1d630d180582cea6b34ef03e6ee8cc268d8686e0a61f71186e80a87f38,2024-10-15T12:57:46.880000
|
||||
CVE-2024-9189,0,0,589dc859bd1b4dfe4aefe62d286159acb6f430185a125dd81b1568310ee1bb88,2024-10-03T17:26:19.397000
|
||||
CVE-2024-9194,0,0,94d0f5f267ad180c0cf40bc9b87cc59bf3002f59241057e5b89ba1ec25bacf82,2024-10-04T13:51:25.567000
|
||||
@ -265762,8 +265781,8 @@ CVE-2024-9538,0,0,11f6571425b77352661bef56e196d840faf334a919cdd5771fb07fb3f313a4
|
||||
CVE-2024-9539,0,0,a0cbd26a327675fb40fcaea93c0a3ea911dbc683021df526355995459666c7a0,2024-10-15T12:57:46.880000
|
||||
CVE-2024-9540,0,0,155792833f2c3d33a8c6cc679a0bdb6a5ac3f76d67aede19f5592875c2f877b6,2024-10-16T16:38:14.557000
|
||||
CVE-2024-9543,0,0,2a7de8e1e43a15761699f58c8b8bbb57c7e560a2fb555c13127ead0f3f3c7fd9,2024-10-15T12:58:51.050000
|
||||
CVE-2024-9546,0,0,bf353c5a5978f7f8468721bb633c8599b93f34e5026cc20c4dc4e5683c7393da,2024-10-15T12:57:46.880000
|
||||
CVE-2024-9548,0,0,c926d1965d0fc43d341cc5174337c64b2123a47e21014504a2a02f5aaf1cda9c,2024-10-15T12:57:46.880000
|
||||
CVE-2024-9546,0,1,ea5318b51e997216e9c0b4c2992b7385f781b09c9935f9fcf746ecd59aedacb8,2024-10-17T13:34:27.890000
|
||||
CVE-2024-9548,0,1,23f20b2ca80b43ded081582273555d31a6ef11043d80544e9c344a73e21ef886,2024-10-17T13:46:07.997000
|
||||
CVE-2024-9549,0,0,de2015c0f448716988568c7b5dd774c121a80649e44094dfa56d887e4c1906a6,2024-10-10T13:14:51.793000
|
||||
CVE-2024-9550,0,0,910b684d766fc00d3bc835188c16842c5e64a2ca110db17b68c67c53481422d4,2024-10-09T11:15:52.520000
|
||||
CVE-2024-9551,0,0,7b5500ec170a7497f673defff182e65008fa33c1b82ef626dcc76f8e4cb7177b,2024-10-09T11:15:42.060000
|
||||
@ -265883,7 +265902,7 @@ CVE-2024-9891,0,0,53ec4da3ba927732190105b9993cdfaefd46788f3c82dc582d229482b0eb1f
|
||||
CVE-2024-9893,0,0,426d02de035749f6abb2956fee210a61cbcd97da25fe8818e92240a83b0a6b07,2024-10-16T16:38:14.557000
|
||||
CVE-2024-9894,0,0,32055c4142b72d0a3f9c19293b700e4df1192ff16d337368689045e8c50a9c33,2024-10-16T22:13:05.583000
|
||||
CVE-2024-9895,0,0,1804aadc601cefc0a637c4245324ad03665b7298686ff057930daf35aa0b9bfa,2024-10-15T12:57:46.880000
|
||||
CVE-2024-9898,1,1,9484ae257cdb78184616cef75f952c665b82cb2cde3794687ff2c931e23eb0ff,2024-10-17T11:15:11.087000
|
||||
CVE-2024-9898,0,0,9484ae257cdb78184616cef75f952c665b82cb2cde3794687ff2c931e23eb0ff,2024-10-17T11:15:11.087000
|
||||
CVE-2024-9903,0,0,244e0ad624c75743e190bc7da6a1b45fe195aaf738d59f8decfde97c8722448f,2024-10-15T12:57:46.880000
|
||||
CVE-2024-9904,0,0,b8f5bdf1fde920247f061f9c3939c42469f53e3148abd589ac11ba36d4728079,2024-10-15T12:57:46.880000
|
||||
CVE-2024-9905,0,0,09e20420cf063b331c2f2444287faaf461bdb42e483d150bc77bc6c327c543d3,2024-10-16T22:12:18.153000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user