mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
Auto-Update: 2024-09-26T06:00:16.643037+00:00
This commit is contained in:
parent
8027c564d1
commit
cf112ba5a1
56
CVE-2022/CVE-2022-490xx/CVE-2022-49037.json
Normal file
56
CVE-2022/CVE-2022-490xx/CVE-2022-49037.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2022-49037",
|
||||
"sourceIdentifier": "security@synology.com",
|
||||
"published": "2024-09-26T04:15:03.770",
|
||||
"lastModified": "2024-09-26T04:15:03.770",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Insertion of sensitive information into log file vulnerability in proxy settings component in Synology Drive Client before 3.3.0-15082 allows remote authenticated users to obtain sensitive information via unspecified vectors."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@synology.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@synology.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-532"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.synology.com/en-global/security/advisory/Synology_SA_24_10",
|
||||
"source": "security@synology.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2022/CVE-2022-490xx/CVE-2022-49038.json
Normal file
56
CVE-2022/CVE-2022-490xx/CVE-2022-49038.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2022-49038",
|
||||
"sourceIdentifier": "security@synology.com",
|
||||
"published": "2024-09-26T04:15:04.940",
|
||||
"lastModified": "2024-09-26T04:15:04.940",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Inclusion of functionality from untrusted control sphere vulnerability in OpenSSL DLL component in Synology Drive Client before 3.3.0-15082 allows local users to execute arbitrary code via unspecified vectors."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@synology.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@synology.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-829"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.synology.com/en-global/security/advisory/Synology_SA_24_10",
|
||||
"source": "security@synology.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2022/CVE-2022-490xx/CVE-2022-49039.json
Normal file
56
CVE-2022/CVE-2022-490xx/CVE-2022-49039.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2022-49039",
|
||||
"sourceIdentifier": "security@synology.com",
|
||||
"published": "2024-09-26T04:15:05.187",
|
||||
"lastModified": "2024-09-26T04:15:05.187",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Out-of-bounds write vulnerability in backup task management functionality in Synology Drive Client before 3.4.0-15721 allows local users with administrator privileges to execute arbitrary commands via unspecified vectors."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@synology.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@synology.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.synology.com/en-global/security/advisory/Synology_SA_24_10",
|
||||
"source": "security@synology.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2022/CVE-2022-490xx/CVE-2022-49040.json
Normal file
56
CVE-2022/CVE-2022-490xx/CVE-2022-49040.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2022-49040",
|
||||
"sourceIdentifier": "security@synology.com",
|
||||
"published": "2024-09-26T04:15:05.390",
|
||||
"lastModified": "2024-09-26T04:15:05.390",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Buffer copy without checking size of input ('Classic Buffer Overflow') vulnerability in connection management functionality in Synology Drive Client before 3.4.0-15721 allows local users with administrator privileges to crash the client via unspecified vectors."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@synology.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 4.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@synology.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.synology.com/en-global/security/advisory/Synology_SA_24_10",
|
||||
"source": "security@synology.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2022/CVE-2022-490xx/CVE-2022-49041.json
Normal file
56
CVE-2022/CVE-2022-490xx/CVE-2022-49041.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2022-49041",
|
||||
"sourceIdentifier": "security@synology.com",
|
||||
"published": "2024-09-26T04:15:05.620",
|
||||
"lastModified": "2024-09-26T04:15:05.620",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Buffer copy without checking size of input ('Classic Buffer Overflow') vulnerability in backup task management functionality in Synology Drive Client before 3.4.0-15721 allows local users with administrator privileges to crash the client via unspecified vectors."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@synology.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 4.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@synology.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.synology.com/en-global/security/advisory/Synology_SA_24_10",
|
||||
"source": "security@synology.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2023/CVE-2023-529xx/CVE-2023-52946.json
Normal file
56
CVE-2023/CVE-2023-529xx/CVE-2023-52946.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2023-52946",
|
||||
"sourceIdentifier": "security@synology.com",
|
||||
"published": "2024-09-26T04:15:05.863",
|
||||
"lastModified": "2024-09-26T04:15:05.863",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Buffer copy without checking size of input ('Classic Buffer Overflow') vulnerability in vss service component in Synology Drive Client before 3.5.0-16084 allows remote attackers to overwrite trivial buffers and crash the client via unspecified vectors."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@synology.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.2,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 4.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@synology.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.synology.com/en-global/security/advisory/Synology_SA_24_10",
|
||||
"source": "security@synology.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2023/CVE-2023-529xx/CVE-2023-52947.json
Normal file
56
CVE-2023/CVE-2023-529xx/CVE-2023-52947.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2023-52947",
|
||||
"sourceIdentifier": "security@synology.com",
|
||||
"published": "2024-09-26T04:15:06.110",
|
||||
"lastModified": "2024-09-26T04:15:06.110",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Missing authentication for critical function vulnerability in logout functionality in Synology Active Backup for Business Agent before 2.6.3-3101 allows local users to logout the client via unspecified vectors. The backup functionality will continue to operate and will not be affected by the logout."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@synology.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 4.0,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@synology.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-306"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.synology.com/en-global/security/advisory/Synology_SA_24_11",
|
||||
"source": "security@synology.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2023/CVE-2023-529xx/CVE-2023-52948.json
Normal file
56
CVE-2023/CVE-2023-529xx/CVE-2023-52948.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2023-52948",
|
||||
"sourceIdentifier": "security@synology.com",
|
||||
"published": "2024-09-26T04:15:06.327",
|
||||
"lastModified": "2024-09-26T04:15:06.327",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Missing encryption of sensitive data vulnerability in settings functionality in Synology Active Backup for Business Agent before 2.7.0-3221 allows local users to obtain user credential via unspecified vectors."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@synology.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.0,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.3,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@synology.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-311"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.synology.com/en-global/security/advisory/Synology_SA_24_11",
|
||||
"source": "security@synology.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2023/CVE-2023-529xx/CVE-2023-52949.json
Normal file
56
CVE-2023/CVE-2023-529xx/CVE-2023-52949.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2023-52949",
|
||||
"sourceIdentifier": "security@synology.com",
|
||||
"published": "2024-09-26T04:15:06.550",
|
||||
"lastModified": "2024-09-26T04:15:06.550",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Missing authentication for critical function vulnerability in proxy settings functionality in Synology Active Backup for Business Agent before 2.7.0-3221 allows local users to obtain user credential via unspecified vectors."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@synology.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@synology.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-306"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.synology.com/en-global/security/advisory/Synology_SA_24_11",
|
||||
"source": "security@synology.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2023/CVE-2023-529xx/CVE-2023-52950.json
Normal file
56
CVE-2023/CVE-2023-529xx/CVE-2023-52950.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2023-52950",
|
||||
"sourceIdentifier": "security@synology.com",
|
||||
"published": "2024-09-26T04:15:06.780",
|
||||
"lastModified": "2024-09-26T04:15:06.780",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Missing encryption of sensitive data vulnerability in login component in Synology Active Backup for Business Agent before 2.7.0-3221 allows adjacent man-in-the-middle attackers to obtain user credential via unspecified vectors."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@synology.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@synology.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-311"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.synology.com/en-global/security/advisory/Synology_SA_24_11",
|
||||
"source": "security@synology.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2024-1221",
|
||||
"sourceIdentifier": "eb41dac7-0af8-4f84-9f6d-0272772514f4",
|
||||
"published": "2024-03-14T03:15:06.607",
|
||||
"lastModified": "2024-03-14T12:52:16.723",
|
||||
"lastModified": "2024-09-26T04:15:07.007",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "This vulnerability potentially allows files on a PaperCut NG/MF server to be exposed using a specifically formed payload against the impacted API endpoint. The attacker must carry out some reconnaissance to gain knowledge of a system token. This CVE only affects Linux and macOS PaperCut NG/MF servers.\n"
|
||||
"value": "This vulnerability potentially allows files on a PaperCut NG/MF server to be exposed using a specifically formed payload against the impacted API endpoint. The attacker must carry out some reconnaissance to gain knowledge of a system token. This CVE only affects Linux and macOS PaperCut NG/MF servers."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -46,7 +46,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
"value": "CWE-76"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2024-1222",
|
||||
"sourceIdentifier": "eb41dac7-0af8-4f84-9f6d-0272772514f4",
|
||||
"published": "2024-03-14T03:15:07.090",
|
||||
"lastModified": "2024-03-14T12:52:16.723",
|
||||
"lastModified": "2024-09-26T04:15:07.170",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "This allows attackers to use a maliciously formed API request to gain access to an API authorization level with elevated privileges. This applies to a small subset of PaperCut NG/MF API calls.\n\n"
|
||||
"value": "This allows attackers to use a maliciously formed API request to gain access to an API authorization level with elevated privileges. This applies to a small subset of PaperCut NG/MF API calls."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -46,7 +46,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
"value": "CWE-250"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-1223",
|
||||
"sourceIdentifier": "eb41dac7-0af8-4f84-9f6d-0272772514f4",
|
||||
"published": "2024-03-14T03:15:07.580",
|
||||
"lastModified": "2024-03-14T12:52:09.877",
|
||||
"lastModified": "2024-09-26T04:15:07.270",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -46,7 +46,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
"value": "CWE-488"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2024-1882",
|
||||
"sourceIdentifier": "eb41dac7-0af8-4f84-9f6d-0272772514f4",
|
||||
"published": "2024-03-14T04:15:08.003",
|
||||
"lastModified": "2024-03-14T12:52:09.877",
|
||||
"lastModified": "2024-09-26T04:15:07.377",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "This vulnerability allows an already authenticated admin user to create a malicious payload that could be leveraged for remote code execution on the server hosting the PaperCut NG/MF application server.\n"
|
||||
"value": "This vulnerability allows an already authenticated admin user to create a malicious payload that could be leveraged for remote code execution on the server hosting the PaperCut NG/MF application server."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -46,7 +46,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-74"
|
||||
"value": "CWE-76"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-1883",
|
||||
"sourceIdentifier": "eb41dac7-0af8-4f84-9f6d-0272772514f4",
|
||||
"published": "2024-03-14T04:15:08.353",
|
||||
"lastModified": "2024-03-14T12:52:09.877",
|
||||
"lastModified": "2024-09-26T04:15:07.480",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -46,7 +46,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-74"
|
||||
"value": "CWE-76"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-3727",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-05-14T15:42:07.060",
|
||||
"lastModified": "2024-09-25T01:15:41.470",
|
||||
"lastModified": "2024-09-26T05:15:11.687",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -92,6 +92,10 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:6824",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:7164",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2024-3727",
|
||||
"source": "secalert@redhat.com"
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-40883",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2024-08-01T02:15:02.023",
|
||||
"lastModified": "2024-08-23T16:52:30.277",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-26T05:15:11.973",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -49,6 +49,16 @@
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "vultures@jpcert.or.jp",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
37
CVE-2024/CVE-2024-453xx/CVE-2024-45372.json
Normal file
37
CVE-2024/CVE-2024-453xx/CVE-2024-45372.json
Normal file
@ -0,0 +1,37 @@
|
||||
{
|
||||
"id": "CVE-2024-45372",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2024-09-26T05:15:12.100",
|
||||
"lastModified": "2024-09-26T05:15:12.100",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "MZK-DP300N firmware versions 1.04 and earlier contains a cross-site request forger vulnerability. Viewing a malicious page while logging in to the web management page of the affected product may lead the user to perform unintended operations such as changing the login password, etc."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "vultures@jpcert.or.jp",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://jvn.jp/en/jp/JVN81966868/",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://www.planex.co.jp/support/download/mzk-dp300n/",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
}
|
||||
]
|
||||
}
|
33
CVE-2024/CVE-2024-458xx/CVE-2024-45836.json
Normal file
33
CVE-2024/CVE-2024-458xx/CVE-2024-45836.json
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
"id": "CVE-2024-45836",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2024-09-26T05:15:12.190",
|
||||
"lastModified": "2024-09-26T05:15:12.190",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-site scripting vulnerability exists in the web management page of PLANEX COMMUNICATIONS network cameras. If a logged-in user accesses a specific file, an arbitrary script may be executed on the web browser of the user."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "vultures@jpcert.or.jp",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://jvn.jp/en/jp/JVN81966868/",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
}
|
||||
]
|
||||
}
|
53
CVE-2024/CVE-2024-470xx/CVE-2024-47045.json
Normal file
53
CVE-2024/CVE-2024-470xx/CVE-2024-47045.json
Normal file
@ -0,0 +1,53 @@
|
||||
{
|
||||
"id": "CVE-2024-47045",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2024-09-26T04:15:07.657",
|
||||
"lastModified": "2024-09-26T04:15:07.657",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "User interface (UI) misrepresentation of critical information issue exists in multiple Home GateWay/Hikari Denwa routers provided by NIPPON TELEGRAPH AND TELEPHONE EAST CORPORATION. If this vulnerability is exploited, an attacker who identified WAN-side IPv6 address may access the product's Device Setting page via WAN-side. Note that, affects products are also provided by NIPPON TELEGRAPH AND TELEPHONE WEST CORPORATION, but the vulnerability only affects products subscribed and used in NIPPON TELEGRAPH AND TELEPHONE EAST CORPORATION areas."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "vultures@jpcert.or.jp",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-451"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://jvn.jp/en/jp/JVN78356367/",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://web116.jp/ced/support/version/broadband/500mi/",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://web116.jp/ced/support/version/broadband/600mi/",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://web116.jp/ced/support/version/broadband/pr_400mi/",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://web116.jp/ced/support/version/broadband/rt_400mi/",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://web116.jp/ced/support/version/broadband/rv_440mi/",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2024/CVE-2024-77xx/CVE-2024-7772.json
Normal file
64
CVE-2024/CVE-2024-77xx/CVE-2024-7772.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2024-7772",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-09-26T05:15:12.263",
|
||||
"lastModified": "2024-09-26T05:15:12.263",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Jupiter X Core plugin for WordPress is vulnerable to arbitrary file uploads due to a mishandled file type validation in the 'validate' function in all versions up to, and including, 4.6.5. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/jupiterx-core/trunk/includes/extensions/raven/includes/modules/forms/classes/ajax-handler.php",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3139412/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5b546d24-82c1-4598-8926-6e73a4784b38?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
68
CVE-2024/CVE-2024-77xx/CVE-2024-7781.json
Normal file
68
CVE-2024/CVE-2024-77xx/CVE-2024-7781.json
Normal file
@ -0,0 +1,68 @@
|
||||
{
|
||||
"id": "CVE-2024-7781",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-09-26T05:15:12.470",
|
||||
"lastModified": "2024-09-26T05:15:12.470",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Jupiter X Core plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 4.7.5. This is due to improper authentication via the Social Login widget. This makes it possible for unauthenticated attackers to log in as the first user to have logged in with a social media account, including administrator accounts. Attackers can exploit the vulnerability even if the Social Login element has been disabled, as long as it was previously enabled and used. The vulnerability was partially patched in version 4.7.5, and fully patched in version 4.7.8."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-288"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/jupiterx-core/trunk/includes/extensions/raven/includes/modules/forms/classes/social-login-handler/facebook.php",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/jupiterx-core/trunk/includes/extensions/raven/includes/modules/forms/classes/social-login-handler/google.php",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3153667/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/efd279c2-9e95-45bd-9494-fb53a6333c65?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
42
README.md
42
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-09-26T04:00:17.798479+00:00
|
||||
2024-09-26T06:00:16.643037+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-09-26T03:15:03.640000+00:00
|
||||
2024-09-26T05:15:12.470000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,29 +33,41 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
263791
|
||||
263806
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `6`
|
||||
Recently added CVEs: `15`
|
||||
|
||||
- [CVE-2024-47330](CVE-2024/CVE-2024-473xx/CVE-2024-47330.json) (`2024-09-26T03:15:02.670`)
|
||||
- [CVE-2024-8404](CVE-2024/CVE-2024-84xx/CVE-2024-8404.json) (`2024-09-26T02:15:02.797`)
|
||||
- [CVE-2024-8405](CVE-2024/CVE-2024-84xx/CVE-2024-8405.json) (`2024-09-26T02:15:03.007`)
|
||||
- [CVE-2024-8552](CVE-2024/CVE-2024-85xx/CVE-2024-8552.json) (`2024-09-26T03:15:03.000`)
|
||||
- [CVE-2024-8723](CVE-2024/CVE-2024-87xx/CVE-2024-8723.json) (`2024-09-26T03:15:03.310`)
|
||||
- [CVE-2024-8803](CVE-2024/CVE-2024-88xx/CVE-2024-8803.json) (`2024-09-26T03:15:03.640`)
|
||||
- [CVE-2022-49037](CVE-2022/CVE-2022-490xx/CVE-2022-49037.json) (`2024-09-26T04:15:03.770`)
|
||||
- [CVE-2022-49038](CVE-2022/CVE-2022-490xx/CVE-2022-49038.json) (`2024-09-26T04:15:04.940`)
|
||||
- [CVE-2022-49039](CVE-2022/CVE-2022-490xx/CVE-2022-49039.json) (`2024-09-26T04:15:05.187`)
|
||||
- [CVE-2022-49040](CVE-2022/CVE-2022-490xx/CVE-2022-49040.json) (`2024-09-26T04:15:05.390`)
|
||||
- [CVE-2022-49041](CVE-2022/CVE-2022-490xx/CVE-2022-49041.json) (`2024-09-26T04:15:05.620`)
|
||||
- [CVE-2023-52946](CVE-2023/CVE-2023-529xx/CVE-2023-52946.json) (`2024-09-26T04:15:05.863`)
|
||||
- [CVE-2023-52947](CVE-2023/CVE-2023-529xx/CVE-2023-52947.json) (`2024-09-26T04:15:06.110`)
|
||||
- [CVE-2023-52948](CVE-2023/CVE-2023-529xx/CVE-2023-52948.json) (`2024-09-26T04:15:06.327`)
|
||||
- [CVE-2023-52949](CVE-2023/CVE-2023-529xx/CVE-2023-52949.json) (`2024-09-26T04:15:06.550`)
|
||||
- [CVE-2023-52950](CVE-2023/CVE-2023-529xx/CVE-2023-52950.json) (`2024-09-26T04:15:06.780`)
|
||||
- [CVE-2024-45372](CVE-2024/CVE-2024-453xx/CVE-2024-45372.json) (`2024-09-26T05:15:12.100`)
|
||||
- [CVE-2024-45836](CVE-2024/CVE-2024-458xx/CVE-2024-45836.json) (`2024-09-26T05:15:12.190`)
|
||||
- [CVE-2024-47045](CVE-2024/CVE-2024-470xx/CVE-2024-47045.json) (`2024-09-26T04:15:07.657`)
|
||||
- [CVE-2024-7772](CVE-2024/CVE-2024-77xx/CVE-2024-7772.json) (`2024-09-26T05:15:12.263`)
|
||||
- [CVE-2024-7781](CVE-2024/CVE-2024-77xx/CVE-2024-7781.json) (`2024-09-26T05:15:12.470`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `4`
|
||||
Recently modified CVEs: `7`
|
||||
|
||||
- [CVE-2023-6006](CVE-2023/CVE-2023-60xx/CVE-2023-6006.json) (`2024-09-26T02:15:02.163`)
|
||||
- [CVE-2024-22303](CVE-2024/CVE-2024-223xx/CVE-2024-22303.json) (`2024-09-26T03:15:02.520`)
|
||||
- [CVE-2024-3037](CVE-2024/CVE-2024-30xx/CVE-2024-3037.json) (`2024-09-26T02:15:02.277`)
|
||||
- [CVE-2024-4712](CVE-2024/CVE-2024-47xx/CVE-2024-4712.json) (`2024-09-26T02:15:02.550`)
|
||||
- [CVE-2024-1221](CVE-2024/CVE-2024-12xx/CVE-2024-1221.json) (`2024-09-26T04:15:07.007`)
|
||||
- [CVE-2024-1222](CVE-2024/CVE-2024-12xx/CVE-2024-1222.json) (`2024-09-26T04:15:07.170`)
|
||||
- [CVE-2024-1223](CVE-2024/CVE-2024-12xx/CVE-2024-1223.json) (`2024-09-26T04:15:07.270`)
|
||||
- [CVE-2024-1882](CVE-2024/CVE-2024-18xx/CVE-2024-1882.json) (`2024-09-26T04:15:07.377`)
|
||||
- [CVE-2024-1883](CVE-2024/CVE-2024-18xx/CVE-2024-1883.json) (`2024-09-26T04:15:07.480`)
|
||||
- [CVE-2024-3727](CVE-2024/CVE-2024-37xx/CVE-2024-3727.json) (`2024-09-26T05:15:11.687`)
|
||||
- [CVE-2024-40883](CVE-2024/CVE-2024-408xx/CVE-2024-40883.json) (`2024-09-26T05:15:11.973`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
49
_state.csv
49
_state.csv
@ -212522,7 +212522,12 @@ CVE-2022-4900,0,0,190b62a537516e288099ba80e5f84457dcb946e631ca8348b4310cc8613075
|
||||
CVE-2022-4901,0,0,b216b364f33ab0ef7a0c7606c08559e2c099c064cab5e2ac5756fa24252b7a04,2023-03-09T01:06:23.703000
|
||||
CVE-2022-4902,0,0,287e358bd6e692608595d8f35e480fa1fc0a17dda86b7a57dcb446074ab1fd22,2024-05-17T02:17:02.280000
|
||||
CVE-2022-4903,0,0,cf9430f75554b10fc3063c2d4e895e2575b24650a7af1dc91ee51937fe80926d,2024-05-17T02:17:02.397000
|
||||
CVE-2022-49037,1,1,d0f17a6680d76f32b598a5b1ac231705547ad3b0b2aa4919ad75408e5932d574,2024-09-26T04:15:03.770000
|
||||
CVE-2022-49038,1,1,9b0e6d98fa887fee020b9de1b957093aa3f7b4adcda4e6d6fa7fe97ff0bb0704,2024-09-26T04:15:04.940000
|
||||
CVE-2022-49039,1,1,d421b64986f2b86305bbb290af73adcedb2ff0d9e12505b97ccf432c381646f2,2024-09-26T04:15:05.187000
|
||||
CVE-2022-4904,0,0,7fd91bcfdda485d2d1b99e23faafa981f8e23511627b52ddcbefb9f4810ebc15,2024-01-05T10:15:10.403000
|
||||
CVE-2022-49040,1,1,24fb511e2a9f39a7ff86c67ab72d40a01c1bcddf3912e1571a7aa3f20d18d391,2024-09-26T04:15:05.390000
|
||||
CVE-2022-49041,1,1,f6e22a8f077df8746f3cc0cc4b825ed8ee0f942a2729cb1de2565ae1298f3cc6,2024-09-26T04:15:05.620000
|
||||
CVE-2022-4905,0,0,5ed0102a2ff79a38a818598d42a854f2653bfd1cbf7bd4d44c6202eec6703dca,2024-05-17T02:17:02.537000
|
||||
CVE-2022-4906,0,0,a1c66471618b60e194f3fe4d779a45e5ee2c0bea6e8f8da3c7c0eae7fd768250,2023-08-10T03:15:50.953000
|
||||
CVE-2022-4907,0,0,fccbd9f1017b7c4db6bafd15fa3ee2977587a49756ba66d0760690b5c66f8c42,2023-12-28T15:39:50.990000
|
||||
@ -239451,7 +239456,12 @@ CVE-2023-52916,0,0,bebcac5d0a36cd875bff11f8b42fd7bc5076a3c1c94e9b8c44be74509c12a
|
||||
CVE-2023-5292,0,0,214d7ae5654e29ed0e372211abf39e379cdbd830eab553609e162ffb791fd787,2023-11-07T04:23:48.910000
|
||||
CVE-2023-5293,0,0,37b5570c94c226fac17bbeba13451e285dd87937cebf55577645a70e3fbcf851,2024-05-17T02:32:58.843000
|
||||
CVE-2023-5294,0,0,91871d88408d7e2bcaad4b05fb484ac2315248d3665cd88ba6ae47f2da8d5f16,2024-05-17T02:32:58.950000
|
||||
CVE-2023-52946,1,1,77f4bbfcac293e40894567e5b1963e276ba79f64121a8d26e170c54f643a8342,2024-09-26T04:15:05.863000
|
||||
CVE-2023-52947,1,1,c3c1751f330873ccb77a14cd90d0b453efa84140e5710babc22c116dd14737e8,2024-09-26T04:15:06.110000
|
||||
CVE-2023-52948,1,1,0e093e5629aec7eb19879e6908ecd65a114490de1079efd274865dee509b347e,2024-09-26T04:15:06.327000
|
||||
CVE-2023-52949,1,1,c44ef506bb7954d25248f12df4a207435eb15150b4af1798a12e04e6c9982883,2024-09-26T04:15:06.550000
|
||||
CVE-2023-5295,0,0,41c6baf71065d9210a6020c54df01a479effe3ab43eb4f6a24f246bdbfb6c99e,2023-11-07T04:23:49.733000
|
||||
CVE-2023-52950,1,1,5005745b1dc5fe294b5b104458f2e25431930383a1c58af385780df31ef159c2,2024-09-26T04:15:06.780000
|
||||
CVE-2023-5296,0,0,476d33b024be332ac896dbf35bcf9a4f784c8ee1e5e045f6783134e6c34f6d9c,2024-05-17T02:32:59.083000
|
||||
CVE-2023-5297,0,0,ae358353c2ceed16fa9e9e76c2608b86123b91774a8853eb6bb1140ab0dca019,2024-05-17T02:32:59.190000
|
||||
CVE-2023-5298,0,0,b737514e302eee8d165af79674626b1e30c9fc6b7145814e6b6dce9deaaa8577,2024-05-17T02:32:59.290000
|
||||
@ -240118,7 +240128,7 @@ CVE-2023-6001,0,0,f830330f1f4a77e3940459eae75c184566e1206f51966434ad49fe9f62d1e8
|
||||
CVE-2023-6002,0,0,d850a94d901a7a5b2325e2e9b24b2ac6dbe4a2de7b859aaf98ea9c00bbc1f100,2023-11-15T15:16:24.487000
|
||||
CVE-2023-6004,0,0,a6bd4d0bdc71884f4b048260cf693d607d396a950f8df3925897dea0602faafb,2024-09-16T18:15:53.167000
|
||||
CVE-2023-6005,0,0,3301c705561209053f50b6bec7e6c53a759b655067290560a57ff3b3e19a668c,2024-01-19T14:27:45.383000
|
||||
CVE-2023-6006,0,1,fd752636dfd7fe9a2d58e0f1a26e5e3e499336d3c9b362300abe84d4f3e673ec,2024-09-26T02:15:02.163000
|
||||
CVE-2023-6006,0,0,fd752636dfd7fe9a2d58e0f1a26e5e3e499336d3c9b362300abe84d4f3e673ec,2024-09-26T02:15:02.163000
|
||||
CVE-2023-6007,0,0,bb6ca4c7091c0440becc578eceb68b3d08abac854016d7ee38b11b83593048d5,2023-11-29T19:01:54.823000
|
||||
CVE-2023-6008,0,0,c5d5d46611f153ede6b144f0e2512002ebcc4e83d1650b6ddf6eb0785b967baf,2023-11-29T18:58:44.753000
|
||||
CVE-2023-6009,0,0,037bae6f5584e39b19c3b3f5ba6c45c24d1f2f330c48345ca85e845a49dc7170,2023-11-29T18:54:09.383000
|
||||
@ -242318,9 +242328,9 @@ CVE-2024-1217,0,0,6075c1c30cf8dbd69ffc4f54a2c1be059316219999cb061c49a6d509b11c4d
|
||||
CVE-2024-1218,0,0,453752a0899f8b793ec74c90c12a7ff24c5b2280b6a6b9717bccd3f166c7f71e,2024-02-29T13:49:29.390000
|
||||
CVE-2024-1219,0,0,c458cc72658e7a053403f6629df47005daa64a22965acf0ef87a52df05752215,2024-07-03T01:45:05.720000
|
||||
CVE-2024-1220,0,0,3cf4ec368701eb9f29bed8e0aee16ed45bee1642c821201a62addfd605d76a71,2024-03-06T15:18:08.093000
|
||||
CVE-2024-1221,0,0,a3846f0d74bc0e93008f021f7ea4f9d61233673076d1fd0babbf85eae9dc9458,2024-03-14T12:52:16.723000
|
||||
CVE-2024-1222,0,0,3a35bc7b90636f9c6144a1dd072c09ae016850390cc553a524285cdd34daf975,2024-03-14T12:52:16.723000
|
||||
CVE-2024-1223,0,0,dfcb492742d72665b40f690909df76ea98bbb8a5a9d9d741178f734bdcceb17e,2024-03-14T12:52:09.877000
|
||||
CVE-2024-1221,0,1,f57b38e01f2045763b64023d54cd14b115226519f5b5549123f745e94b8ad6f9,2024-09-26T04:15:07.007000
|
||||
CVE-2024-1222,0,1,5d7d5aee4e7308a5e1ea882d199b9214632e9928d03f04d754209bedd842261e,2024-09-26T04:15:07.170000
|
||||
CVE-2024-1223,0,1,d42314693c58e5b08f0a5ac59bbde9dd4cd508567ac5750cc8416f01d6c1186f,2024-09-26T04:15:07.270000
|
||||
CVE-2024-1224,0,0,5ae6c514ac328cf1da04b8ed0644857500ebf34ce993b80e4e918efec900b252,2024-03-06T15:18:08.093000
|
||||
CVE-2024-1225,0,0,a853f4976fb83c6334355e0444e701230a93393d2963cd320d17d46d82664837,2024-05-17T02:35:19.560000
|
||||
CVE-2024-1226,0,0,8468709c7e5985706a02eafa0534a9ca6154e724547969096693c3d6c6d57a0a,2024-03-12T16:02:33.900000
|
||||
@ -242933,8 +242943,8 @@ CVE-2024-1878,0,0,000003838e237dba5dd43a619ef99a4488543c4c7093fec65257742365e28c
|
||||
CVE-2024-1879,0,0,01f8ee5b9df6ab7642ee2bd3dfb26155544416292db09c2b712346021c0ed07c,2024-09-24T13:54:22.813000
|
||||
CVE-2024-1880,0,0,a638a0a4fe4a06eeb9f755c8ae4735f10d15423b185eb3a04c8edbccbb768c9d,2024-06-07T14:56:05.647000
|
||||
CVE-2024-1881,0,0,a497720a99ff5759c849add098b229c482f6759bc88538b88834b08336954a8e,2024-06-07T14:56:05.647000
|
||||
CVE-2024-1882,0,0,b95eb7832d301218d4e36799cc3e87874eda05a45e80c7ec0e4977e71d4a51c8,2024-03-14T12:52:09.877000
|
||||
CVE-2024-1883,0,0,6bad0a41ab773b8d396c4660f7a331c60eba84b117d5d853cc4c83f64740f329,2024-03-14T12:52:09.877000
|
||||
CVE-2024-1882,0,1,260fd7f45d858edb6f067ba53f534293241a43fbd31baa88c2bd24a370e87eb7,2024-09-26T04:15:07.377000
|
||||
CVE-2024-1883,0,1,7d218b22e2f53c9af6f7c239b17390f5535af26fac5a27a6b90eb23c0d34d99e,2024-09-26T04:15:07.480000
|
||||
CVE-2024-1884,0,0,03291f37ef778374d1edc0cb6ac30d1c4661cca1e0e19501d230b3a99fec893c,2024-03-14T12:52:09.877000
|
||||
CVE-2024-1885,0,0,64f10b6599f04cae2f9099203e080e7ede003ab66594ea9e49fed03312d1f980,2024-02-29T07:15:06.293000
|
||||
CVE-2024-1886,0,0,6a68b7d6586f4beec8de9a568156f7f02fd72e32de3048a5dd1754aaaec026f7,2024-02-29T07:15:06.520000
|
||||
@ -244744,7 +244754,7 @@ CVE-2024-2230,0,0,81b726a6e768be79a74c3dcd4be2a480a2104236725fc7bffdeb7f2fbcd260
|
||||
CVE-2024-22300,0,0,2ccc2ed7d49a64132a7983e9a20d1608e44be91faa8ac853f3fc7e5537921096,2024-03-27T12:29:30.307000
|
||||
CVE-2024-22301,0,0,6ea04ba8fe9617b0d51c2fd6df44a496f80ce215c2c4f5fff80486be4006a269,2024-01-30T17:44:59.847000
|
||||
CVE-2024-22302,0,0,362c5a4f749f18001b8a7dcb225bccd5bc460dbdebe5d9a9ec96a1e36f826c38,2024-02-06T15:03:44.550000
|
||||
CVE-2024-22303,0,1,1767c298d5b2e06cfe98fc4b15c32ef22f9559b9413cdf859faaf6c176b6afb1,2024-09-26T03:15:02.520000
|
||||
CVE-2024-22303,0,0,1767c298d5b2e06cfe98fc4b15c32ef22f9559b9413cdf859faaf6c176b6afb1,2024-09-26T03:15:02.520000
|
||||
CVE-2024-22304,0,0,d67aadb9e2f2a8922ce3f2329d1d83c880e9db8ed9775a858536276b6d2b71fb,2024-02-03T00:21:59.163000
|
||||
CVE-2024-22305,0,0,3299523f3b75290f8ab4191f513bdb6256b216a4956cb61206392c7121abdf41,2024-02-05T20:42:22.943000
|
||||
CVE-2024-22306,0,0,e9e637b40676dc8271792a0690b94850a032bacff223625bec6ea440280c18af,2024-02-06T18:20:46.017000
|
||||
@ -250410,7 +250420,7 @@ CVE-2024-30366,0,0,017638cacc63c5bca1e49a36bd6cf624199b21049716a909c39259050ef5a
|
||||
CVE-2024-30367,0,0,e20ca596e010b38b51bc04c9fe579d6549936485a2ebf8759f46c93b9baf83db,2024-04-03T12:38:04.840000
|
||||
CVE-2024-30368,0,0,955d719f80aef3f3fce89226b635f4c0f3197824431ae3f1b9a52be812680c97,2024-09-24T13:54:11.827000
|
||||
CVE-2024-30369,0,0,084ebabb6bba6f65e3a665faf08cf2442ac42f59e1585ca47c68653967d4e7cb,2024-09-24T13:55:20.847000
|
||||
CVE-2024-3037,0,1,5192283ef3f0b9026a4bd8ad8d1a7b79d0e8030dc3224136afdfcbc8af6dad6b,2024-09-26T02:15:02.277000
|
||||
CVE-2024-3037,0,0,5192283ef3f0b9026a4bd8ad8d1a7b79d0e8030dc3224136afdfcbc8af6dad6b,2024-09-26T02:15:02.277000
|
||||
CVE-2024-30370,0,0,6207ecfb3ab83effd5b69f8ad0454d61dd1c4b620444f7bf5bed75b59a7e9bf2,2024-04-03T12:38:04.840000
|
||||
CVE-2024-30371,0,0,5cb1f88df7d7d6dd29afc1f981808ff71d5fa01260db76282c78c8209c6570fc,2024-04-03T12:38:04.840000
|
||||
CVE-2024-30373,0,0,ac2231546cc34daa74c465f9a9fe35653c0122d2d53839e7bf0cd715536bd357,2024-06-07T14:56:05.647000
|
||||
@ -255272,7 +255282,7 @@ CVE-2024-37265,0,0,15f68b41e4db6ae6ccda7f80b0a70abe19004015dbcf0d1246d37335388c5
|
||||
CVE-2024-37266,0,0,44943b1bec747c3c4ecddbc943aaff365210584d2dac21ff41065ed54e40dcb1,2024-08-29T18:59:40.057000
|
||||
CVE-2024-37267,0,0,0d692f1d5fdd2443078b17f2b54167a732ba33e5479382e14b7e2bd4b6ec49a8,2024-07-25T13:47:43.833000
|
||||
CVE-2024-37268,0,0,32108042cd6042edb5d9a980c4bc9e7e171800cf8a42366d53d95c0b76a50314,2024-08-29T18:56:01.267000
|
||||
CVE-2024-3727,0,0,3798defc36ba380c2f057bb9b97f7313b56bd97a1af4f2969b4c9551071f5400,2024-09-25T01:15:41.470000
|
||||
CVE-2024-3727,0,1,a9642c70bb7fffd7db7e580ee5a64d60dc3c3163454875e2be6049840966600e,2024-09-26T05:15:11.687000
|
||||
CVE-2024-37270,0,0,09adf8729d6feae3191994dc6f2b286449a8e4d910f8c343a3a9496ea050a29f,2024-07-11T13:05:54.930000
|
||||
CVE-2024-37271,0,0,82adde283ff9dacc0f77be200c055ea2f2c58a80387c070880c7d1f2c1068d32,2024-07-25T13:46:39.273000
|
||||
CVE-2024-37273,0,0,2a85b1da0ca6e483bcfb6dea755537146c70a6967cba53f16b02bbb377a77813,2024-08-15T14:35:03.053000
|
||||
@ -257485,7 +257495,7 @@ CVE-2024-4087,0,0,559dc8fcb531eb7d96e390fa33463b50a20c5a688e8dbefeb3187bf1d2c5f7
|
||||
CVE-2024-40872,0,0,61b6054f8d04261e92c08a44feec16dc1d8422a97543a2162e5dea5f0a6c8f9d,2024-07-26T12:38:41.683000
|
||||
CVE-2024-40873,0,0,6df1707815f9f38105b50cd71b6fad1bdaf7a6f3e3c945bc399ab848fdd0a9bf,2024-08-02T19:57:17.407000
|
||||
CVE-2024-4088,0,0,61cc31924b86843bbd20c326ef7465dc1aa394b548458b2e1a9fc62c09ede628,2024-06-11T17:11:30.193000
|
||||
CVE-2024-40883,0,0,779af21aee21250f6c415f2fd0adbd2ff021a48fecfce470c43b9db58f959740,2024-08-23T16:52:30.277000
|
||||
CVE-2024-40883,0,1,8855b9ba6890db3f512189380b135e2bd398db6f2ac8377c169993238c8e17e7,2024-09-26T05:15:11.973000
|
||||
CVE-2024-40884,0,0,c8797b81ca17f130e9b15061a257e8838b29d835c417f35d4ed5fe661f9275fc,2024-08-23T16:18:28.547000
|
||||
CVE-2024-40886,0,0,366f3546e42ed526b269e117ba5fde90b643767db321194ac7a300a3dda42364,2024-08-23T16:09:31.887000
|
||||
CVE-2024-40892,0,0,80f2c69eafcb531435cc671447d237ff8792f374d8c58f10182688d813811ab4,2024-08-21T18:15:09.710000
|
||||
@ -259951,6 +259961,7 @@ CVE-2024-4536,0,0,7a5702ddadcf7f48c7c82ca09978f30e343a6d4f259e12cc6fa88068d17235
|
||||
CVE-2024-45366,0,0,ec78c74ac351c22ffbb4e903d91259c92e90ebafbe4e65694c50f7e794cfe1f6,2024-09-20T12:30:51.220000
|
||||
CVE-2024-45368,0,0,563bfc1ed8b31a23579e2f54c884aca7d778495c2d744e0c86e6262fb50de16f,2024-09-14T11:47:14.677000
|
||||
CVE-2024-4537,0,0,2e530ca2c49a8373646367a8e0c1771a783669d0151f9600cf6b8a99b12e73b9,2024-05-07T13:39:32.710000
|
||||
CVE-2024-45372,1,1,be60f838370f7931c7faf6aec781b6da62d075b035b30971b73ad77228a5b6b8,2024-09-26T05:15:12.100000
|
||||
CVE-2024-45373,0,0,16e8d5e3be32da8efd6c51aba1c4343ad9663f629ea8db5679edd6b7b2c443d9,2024-09-25T01:15:43.930000
|
||||
CVE-2024-4538,0,0,1753f7bd0b59062edc1103b5572b8666a59c2630e5fb59443506518ac4083bd7,2024-05-07T13:39:32.710000
|
||||
CVE-2024-45383,0,0,235a14ef262025a5c45e6e746df2b6dcf33186b99aef4d19b36fdcfc9676da5c,2024-09-18T20:24:29.247000
|
||||
@ -260138,6 +260149,7 @@ CVE-2024-45826,0,0,2e4e2e814a3243265b525b00673b6c60dcd0fbc595ddf4750ccbec98256c5
|
||||
CVE-2024-4583,0,0,80422ff6020fca1720c5a88e28ab76aaa9a918b3afa6700e13782e64857c6739,2024-06-04T19:20:42.857000
|
||||
CVE-2024-45833,0,0,d66bcdb35ef05ab6c240a22f01c308be4dcef309fd562be6507d54a47e85401a,2024-09-23T13:43:42.073000
|
||||
CVE-2024-45835,0,0,2bbb89ffd28b8dc1adee7dde89d168866e6c50e525c50f0b4fc33c67b9ff7524,2024-09-17T12:11:48.833000
|
||||
CVE-2024-45836,1,1,ea61abf99d55de9b0f1ff52c1bd3ff38ea2ef9e4914cda606ea656efc74e12d6,2024-09-26T05:15:12.190000
|
||||
CVE-2024-4584,0,0,4d639afeee5354fec0a7cf3023bb849f2437d78f7cd875e4a49ac03b46b9ec82,2024-06-17T19:15:58.903000
|
||||
CVE-2024-45845,0,0,b549a9e321160df47bcb67d5d4737d4567fe304513c57d25b052b060dcd0ae25,2024-09-12T20:15:05.273000
|
||||
CVE-2024-45846,0,0,782f0b5f63081997ef94c1cb8ba21c320f06f7c0fb7ff9d780e670296be45516,2024-09-16T17:30:06.747000
|
||||
@ -260501,6 +260513,7 @@ CVE-2024-4701,0,0,5f841f0540b46f49c80d409ca526b0c08d190fe4f1f5bc2d7cfb115b5ba386
|
||||
CVE-2024-4702,0,0,dd020b59844aa3c2b904a852a1e5f578b8784127317756ef97f595c083848ea0,2024-05-15T16:40:19.330000
|
||||
CVE-2024-4703,0,0,7e57d47de6048bcd912b4c77aa51d488946887d89315e68305481f1a25780324,2024-06-11T18:06:31.967000
|
||||
CVE-2024-4704,0,0,9637a93e192a5f32142e05687e31ff3688b029254561fc4728d18bbfa1666d6b,2024-07-03T02:07:57.433000
|
||||
CVE-2024-47045,1,1,769d0d82eeeb9b1a11af69d48d3297dd498494947dbb2bcf238f64d3b0be23ca,2024-09-26T04:15:07.657000
|
||||
CVE-2024-47047,0,0,0a4a15ee2fb8d94ee7dbf9b3ee25f3c32a7e76c7b103a0dd6583489587dbacd4,2024-09-20T12:30:51.220000
|
||||
CVE-2024-47048,0,0,265a1bb88f56672fe6fc9d071fab120e6873b45c92f5f41894d8c83d39bca9a8,2024-09-25T01:15:44.810000
|
||||
CVE-2024-47049,0,0,bc768f951de25f2d3b7ee4ed4c1188c49a1568cca5cfdd9dc385ac790402738a,2024-09-20T12:30:51.220000
|
||||
@ -260528,7 +260541,7 @@ CVE-2024-47089,0,0,747d9db580763da5143a0072ff546dab60f08a23733ea114071ab112c2f09
|
||||
CVE-2024-4709,0,0,291d83b7a71e23f3ddf2ffe4b4f9de6c9c89e71bab3de54c457add53e92c99e9,2024-05-20T13:00:34.807000
|
||||
CVE-2024-4710,0,0,bc3d641a4dcd652350f442cdc80714adde1798c9afb82fb5cdb92bbe3aa27b20,2024-05-21T12:37:59.687000
|
||||
CVE-2024-4711,0,0,d363465dc42b9acab3c0c0b87ab6c465a5fbabc481e6b69ff97f983a499169d2,2024-07-18T16:32:23.447000
|
||||
CVE-2024-4712,0,1,3843a22d246b1dcd1f463ab35db131587d98590206b11784167b4cf4df51610c,2024-09-26T02:15:02.550000
|
||||
CVE-2024-4712,0,0,3843a22d246b1dcd1f463ab35db131587d98590206b11784167b4cf4df51610c,2024-09-26T02:15:02.550000
|
||||
CVE-2024-4713,0,0,a3c96b0a67396332ccb3b3b7da032ec990741228737b0623d292fd0ff6dd150b,2024-06-04T19:20:46.913000
|
||||
CVE-2024-4714,0,0,d7e9d9d95d84a12a856ae94c0b47f221a8b241db6b1f0d94ea74b84fa1b36764,2024-06-04T19:20:47.027000
|
||||
CVE-2024-4715,0,0,8280b54df57d141f79c5c5ba7edbd4b8610f06a30ecbd5ba39cd6c268b4b3f05,2024-06-04T19:20:47.130000
|
||||
@ -260564,7 +260577,7 @@ CVE-2024-4731,0,0,ff0f4697afac2eb26d16b700c40cb0a3947b6039ec9b762c8c08a8e49bc998
|
||||
CVE-2024-47315,0,0,806f359f72a06920b81ba1ee4bcc9b7d2863d9202ff1492c78f9ed1c318bb568,2024-09-25T18:15:05.807000
|
||||
CVE-2024-4732,0,0,2f9d1622a74bcf5d144d47d69a297d840c0353e903036f272ef15e7560aa5dbf,2024-06-04T19:20:48.237000
|
||||
CVE-2024-4733,0,0,bab73609d3aaa55dacedcdd69b9c9d83fbc709adf98853b3adb423b13daf2498,2024-05-17T18:36:31.297000
|
||||
CVE-2024-47330,1,1,aee96dfe3b2a24a7a0add2b33c82f3503b8340fef13c82cd4946e8411902491c,2024-09-26T03:15:02.670000
|
||||
CVE-2024-47330,0,0,aee96dfe3b2a24a7a0add2b33c82f3503b8340fef13c82cd4946e8411902491c,2024-09-26T03:15:02.670000
|
||||
CVE-2024-4734,0,0,0eefea1299cd16be8adb4bc3a22d24ee524acae6c15e2191dca2420e7021d6ef,2024-05-15T16:40:19.330000
|
||||
CVE-2024-4735,0,0,74f4fbd101bb46efdc880f338cfb70c8fd3a6ef365bd7732d2107c79fb3d78b8,2024-06-04T19:20:48.397000
|
||||
CVE-2024-4736,0,0,d66d2cb2e0afad57d9d4fb0dd29db1ae480425b093ff5e46c35972ad67bf1599,2024-06-04T19:20:48.497000
|
||||
@ -263062,10 +263075,12 @@ CVE-2024-7756,0,0,1b8e4c66c7bf8f5bb87e6dc0c53f1d7bb597ab897e7e923ca54d526835e888
|
||||
CVE-2024-7757,0,0,ca7d079474a8e4f4b2f55e1721105da3a15a9e1d63f2bd4356eaaa03e8d55f39,2024-08-21T09:15:04.973000
|
||||
CVE-2024-7766,0,0,21ab087797e731198cebf275f86b73f25bbe196d1a159f205b5067baac7450a7,2024-09-12T19:35:21.117000
|
||||
CVE-2024-7770,0,0,050ca25dc9f9b4d1ecb0313871198cecedaeb8fddc305a81bf31aa56f8757cc5,2024-09-10T12:09:50.377000
|
||||
CVE-2024-7772,1,1,272392ac398e738b761d024e48c7cc6ccb810c9ca379731a1b0786892ba22712,2024-09-26T05:15:12.263000
|
||||
CVE-2024-7775,0,0,e75f99322bf942cd40c2d94981e16e48a8ebca7abec8ba8da6e02adea2112f97,2024-08-26T18:18:22.887000
|
||||
CVE-2024-7777,0,0,4a2d78b8605a3d4db2907c7fe28bc447e2c0379246d7b81936de12aa55ddf523,2024-08-26T18:19:19.507000
|
||||
CVE-2024-7778,0,0,3bccf24c2d6c26e9b97b53b6049aaebd5856252add9958ab8944d96a94251b86,2024-08-22T12:48:02.790000
|
||||
CVE-2024-7780,0,0,45e331e41470c18e0d898be4bc1931dca39faf6b7f4d412a460044104575abbc,2024-08-26T18:19:59.907000
|
||||
CVE-2024-7781,1,1,d05db9d0c9f6bfb0d1a4140bf92de2a913ea1802e9a6936175b65893375e22b3,2024-09-26T05:15:12.470000
|
||||
CVE-2024-7782,0,0,9772cfc0cffb104f900f553126e5bb2a4b326e29588ceccc59352666287dfd99,2024-08-26T18:21:12.203000
|
||||
CVE-2024-7784,0,0,a1673633f8befe483b8c481cae0c04073b4df8acf7cf90d7ad7fd806da35778c,2024-09-10T12:09:50.377000
|
||||
CVE-2024-7785,0,0,a72f8e02860a571fa21aeee74639693caaa851e87622e48dd31b51d79a961437,2024-09-20T12:30:17.483000
|
||||
@ -263477,8 +263492,8 @@ CVE-2024-8391,0,0,e4a53876b2b078fcdc3ea9cb2dcdd9122c87a07a74293148b584a5df448e00
|
||||
CVE-2024-8394,0,0,537ec046b9d95c9c611478000abd6dd7551041a1f2ea81cd7e79459ae0e45ad8,2024-09-11T16:25:44.833000
|
||||
CVE-2024-8395,0,0,7904c0b52ace758f0078aaf5623dc08c2f22d70190a82ab855b84d88ee4995e4,2024-09-19T17:53:45.753000
|
||||
CVE-2024-8399,0,0,ff5a0b61b9891ed649233268ce0fa37bd0b7c79ba8aa2863ea2ecc61c35c709c,2024-09-12T19:45:07.347000
|
||||
CVE-2024-8404,1,1,04efd95dbbca50c23535a988c1ac175413ff25f3fc5731fe6d68974837b24c08,2024-09-26T02:15:02.797000
|
||||
CVE-2024-8405,1,1,b7c48015604dbd0f8305b6dfd330b97a61f8cc61cc88313de67331a605dc4c9a,2024-09-26T02:15:03.007000
|
||||
CVE-2024-8404,0,0,04efd95dbbca50c23535a988c1ac175413ff25f3fc5731fe6d68974837b24c08,2024-09-26T02:15:02.797000
|
||||
CVE-2024-8405,0,0,b7c48015604dbd0f8305b6dfd330b97a61f8cc61cc88313de67331a605dc4c9a,2024-09-26T02:15:03.007000
|
||||
CVE-2024-8407,0,0,190893f5b3da05c3b04f6347e8d36e88eb22b5329ec3a82949674ad3abb1a15d,2024-09-05T14:48:28.513000
|
||||
CVE-2024-8408,0,0,9f87fcd812f2a0614c81edf26c59a3fd5158e6ac48b1ed6a5cdb904e931cd196,2024-09-05T14:41:14.603000
|
||||
CVE-2024-8409,0,0,9f46c5adb31a6d87824a8eab48e9d2e947ae9b31368ae468d358816a64d27b2e,2024-09-05T14:20:27.397000
|
||||
@ -263543,7 +263558,7 @@ CVE-2024-8543,0,0,e190cfdf6def9f928d16ce7c20119d5fac7745c9206ec7d9500145321b367e
|
||||
CVE-2024-8544,0,0,b92ed2b51bae3f52bc853d79bde121bda69091c5cde9cc12e546571a35641dfd,2024-09-24T02:15:03.687000
|
||||
CVE-2024-8546,0,0,72dd0e8b3978c165f9beb60b55e8d42aa02c7869febf0ff1b80c593288834bb9,2024-09-25T13:15:04.313000
|
||||
CVE-2024-8549,0,0,fcd242b6ea38a056c01db9880c2a52a409c7d0c95c3a6f9a54b5be14b01f3eaf,2024-09-25T03:15:05.393000
|
||||
CVE-2024-8552,1,1,61ca7efc99bf9ad3fbdf1be012e29a1580bfcdc6cbef8f2a52f1d3e90592e91c,2024-09-26T03:15:03
|
||||
CVE-2024-8552,0,0,61ca7efc99bf9ad3fbdf1be012e29a1580bfcdc6cbef8f2a52f1d3e90592e91c,2024-09-26T03:15:03
|
||||
CVE-2024-8554,0,0,46c32adbe15332664cfc930fe8c32bff96db8190902ab789492b593fa03348f1,2024-09-10T13:52:23.250000
|
||||
CVE-2024-8555,0,0,0c0685cb1cca90ba97dbbe7724af46b71d0ab057cb41b6cc62e81df56a2985b7,2024-09-10T13:53:11.847000
|
||||
CVE-2024-8557,0,0,86ab04a42076aa0fe9f792cba1f27d54b98becfc358809b664a63ce528fde776,2024-09-10T14:19:36.280000
|
||||
@ -263639,7 +263654,7 @@ CVE-2024-8711,0,0,0a0fc486d277b8c36cfb49b6365925dae98dcfc88dd0e7309623a05e1f41ec
|
||||
CVE-2024-8713,0,0,ca0ac042f1c62982fccd7ac5a0424c95d9b030be707adc38aa9969dada509b4b,2024-09-25T03:15:05.840000
|
||||
CVE-2024-8714,0,0,1f87b4efca35fcf892145b4bafa975ef81f515a87b9325943f1ad91188a98b5b,2024-09-13T16:37:22.997000
|
||||
CVE-2024-8716,0,0,a77eb658c493b56b9d7fc45aa1847dc2519991d526a5ee8bd0fb542ca8c95921,2024-09-24T02:15:04.360000
|
||||
CVE-2024-8723,1,1,403f44e84ea509a26e588d9137cd324aa3c3ee738b85c9ce6f64e21da193b6f0,2024-09-26T03:15:03.310000
|
||||
CVE-2024-8723,0,0,403f44e84ea509a26e588d9137cd324aa3c3ee738b85c9ce6f64e21da193b6f0,2024-09-26T03:15:03.310000
|
||||
CVE-2024-8724,0,0,b84c0f858130dbe3d5efee42c723e6b66a5ac84e9dedd508f06aebfed2f7ce86,2024-09-14T11:47:14.677000
|
||||
CVE-2024-8730,0,0,992937a3fe08341c8a8ac293d7e6b47ec1d7e31a336aa4a6af6fc18e9a0019bc,2024-09-13T16:37:22.997000
|
||||
CVE-2024-8731,0,0,736811c720e84a581cf4a6e60c7046f380caf7eabd4dc85e633e03526e4e33b4,2024-09-13T16:37:22.997000
|
||||
@ -263677,7 +263692,7 @@ CVE-2024-8795,0,0,ce1ff4c5af2c658433bac2600921c58ddd4ddeb372cf874bcbce03ebd8a824
|
||||
CVE-2024-8796,0,0,85a6dfb5fb230c10b66238538bd5fe186ab9999598b67e5deda1ed4d1b78b262,2024-09-20T12:30:51.220000
|
||||
CVE-2024-8797,0,0,ba4df0bb11568fe010be4c16334a8844a03d9d0d5268879bae12ea87dcdf4b9f,2024-09-14T11:47:14.677000
|
||||
CVE-2024-8801,0,0,f1edc9c7bb1482d2f7aa53a58527c89ff09517b0d8b72cf3ccbe7bbb09f96d53,2024-09-25T01:15:47.050000
|
||||
CVE-2024-8803,1,1,809586222f389dc5f26d6896a0cd66484a84cd4f430a4ec0aa479ed335f55b36,2024-09-26T03:15:03.640000
|
||||
CVE-2024-8803,0,0,809586222f389dc5f26d6896a0cd66484a84cd4f430a4ec0aa479ed335f55b36,2024-09-26T03:15:03.640000
|
||||
CVE-2024-8850,0,0,60f99c260767f82bf00cc7954ec3e058985003b965020b8d3dac7a45b3ea5f64,2024-09-25T18:49:53.397000
|
||||
CVE-2024-8853,0,0,b5a3b0675f8f2657c7381537f08c47ae3a3694c18acf1b18976370e35c278f0e,2024-09-25T17:49:25.653000
|
||||
CVE-2024-8858,0,0,0d529df68aab7882afa1c5531609cd4c3cd7930c85ebac7f6f37123e0eea3aa1,2024-09-25T11:15:12.730000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user