mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-08 11:37:26 +00:00
Auto-Update: 2024-11-26T09:01:03.364720+00:00
This commit is contained in:
parent
9b92e06fa4
commit
cf1709fbd5
15
CVE-2018/CVE-2018-118xx/CVE-2018-11881.json
Normal file
15
CVE-2018/CVE-2018-118xx/CVE-2018-11881.json
Normal file
@ -0,0 +1,15 @@
|
||||
{
|
||||
"id": "CVE-2018-11881",
|
||||
"sourceIdentifier": "product-security@qualcomm.com",
|
||||
"published": "2024-11-26T05:15:05.710",
|
||||
"lastModified": "2024-11-26T05:15:05.710",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.\u00a0\n\n\n\n\n\n\n\n\n\n\n\nThis CVE ID is unused and any reference to it should be ignored."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
@ -2,46 +2,14 @@
|
||||
"id": "CVE-2020-11311",
|
||||
"sourceIdentifier": "product-security@qualcomm.com",
|
||||
"published": "2024-11-25T05:15:05.273",
|
||||
"lastModified": "2024-11-25T05:15:05.273",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-11-26T05:15:07.710",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "This record is rejected as duplicate. All references should point to CVE-2021-1904."
|
||||
"value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority\u00a0as duplicate. All references should point to CVE-2021-1904."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "product-security@qualcomm.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 6.2,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-1904",
|
||||
"source": "product-security@qualcomm.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1904",
|
||||
"source": "product-security@qualcomm.com"
|
||||
}
|
||||
]
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
15
CVE-2022/CVE-2022-338xx/CVE-2022-33860.json
Normal file
15
CVE-2022/CVE-2022-338xx/CVE-2022-33860.json
Normal file
@ -0,0 +1,15 @@
|
||||
{
|
||||
"id": "CVE-2022-33860",
|
||||
"sourceIdentifier": "CybersecurityCOE@eaton.com",
|
||||
"published": "2024-11-26T05:15:09.007",
|
||||
"lastModified": "2024-11-26T06:15:07.343",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: ** REJECT ** DO NOT USE THIS CVE RECORD. ConsultIDs: CVE-2023-43775. Reason: This record is a duplicate of CVE-2023-43775. Notes: All CVE users should reference CVE-2023-43775 instead of this record. All references and descriptions in this record have been removed to prevent accidental usage."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
20
CVE-2024/CVE-2024-104xx/CVE-2024-10471.json
Normal file
20
CVE-2024/CVE-2024-104xx/CVE-2024-10471.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-10471",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-11-26T06:15:07.520",
|
||||
"lastModified": "2024-11-26T06:15:07.520",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Everest Forms WordPress plugin before 3.0.4.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/85d590c9-c96d-40c9-aa59-48302ba3d63c/",
|
||||
"source": "contact@wpscan.com"
|
||||
}
|
||||
]
|
||||
}
|
63
CVE-2024/CVE-2024-105xx/CVE-2024-10542.json
Normal file
63
CVE-2024/CVE-2024-105xx/CVE-2024-10542.json
Normal file
@ -0,0 +1,63 @@
|
||||
{
|
||||
"id": "CVE-2024-10542",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-11-26T06:15:07.683",
|
||||
"lastModified": "2024-11-26T06:15:07.683",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Spam protection, Anti-Spam, FireWall by CleanTalk plugin for WordPress is vulnerable to unauthorized Arbitrary Plugin Installation due to an authorization bypass via reverse DNS spoofing on the checkWithoutToken function in all versions up to, and including, 6.43.2. This makes it possible for unauthenticated attackers to install and activate arbitrary plugins which can be leveraged to achieve remote code execution if another vulnerable plugin is installed and activated."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/cleantalk-spam-protect/tags/6.43.2/lib/Cleantalk/ApbctWP/RemoteCalls.php#L41",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3179819/cleantalk-spam-protect#file631",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d7eb5fad-bb62-4f0b-ad52-b16c3e442b62?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2024/CVE-2024-105xx/CVE-2024-10570.json
Normal file
59
CVE-2024/CVE-2024-105xx/CVE-2024-10570.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-10570",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-11-26T06:15:07.880",
|
||||
"lastModified": "2024-11-26T06:15:07.880",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Security & Malware scan by CleanTalk plugin for WordPress is vulnerable to unauthorized SQL Injection due to an authorization bypass via reverse DNS spoofing on the checkWithoutToken function in all versions up to, and including, 2.145, as well as insufficient input sanitization and validation. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/security-malware-firewall/tags/2.145/lib/CleantalkSP/Common/RemoteCalls.php#L59",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2187311d-6651-4eca-806d-aa2ff9fae4e2?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
67
CVE-2024/CVE-2024-107xx/CVE-2024-10781.json
Normal file
67
CVE-2024/CVE-2024-107xx/CVE-2024-10781.json
Normal file
@ -0,0 +1,67 @@
|
||||
{
|
||||
"id": "CVE-2024-10781",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-11-26T06:15:08.057",
|
||||
"lastModified": "2024-11-26T06:15:08.057",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Spam protection, Anti-Spam, FireWall by CleanTalk plugin for WordPress is vulnerable to unauthorized Arbitrary Plugin Installation due to an missing empty value check on the 'api_key' value in the 'perform' function in all versions up to, and including, 6.44. This makes it possible for unauthenticated attackers to install and activate arbitrary plugins which can be leveraged to achieve remote code execution if another vulnerable plugin is installed and activated."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-703"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/cleantalk-spam-protect/tags/6.44/lib/Cleantalk/ApbctWP/RemoteCalls.php#L95",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/cleantalk-spam-protect/tags/6.44/lib/Cleantalk/ApbctWP/RemoteCalls.php#L96",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3188546/cleantalk-spam-protect#file653",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/79ae062c-b084-4045-9407-2d94919993af?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2024/CVE-2024-108xx/CVE-2024-10857.json
Normal file
59
CVE-2024/CVE-2024-108xx/CVE-2024-10857.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-10857",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-11-26T07:15:05.003",
|
||||
"lastModified": "2024-11-26T07:15:05.003",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Product Input Fields for WooCommerce plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 1.9 via the handle_downloads() function due to insufficient file path validation/sanitization. This makes it possible for authenticated attackers, with Contributor-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-35"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3195423/product-input-fields-for-woocommerce/trunk?contextall=1&old=3173573&old_path=%2Fproduct-input-fields-for-woocommerce%2Ftrunk",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e45207af-3886-4d95-9cd8-5ecdc683dc58?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
67
CVE-2024/CVE-2024-110xx/CVE-2024-11002.json
Normal file
67
CVE-2024/CVE-2024-110xx/CVE-2024-11002.json
Normal file
@ -0,0 +1,67 @@
|
||||
{
|
||||
"id": "CVE-2024-11002",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-11-26T07:15:05.413",
|
||||
"lastModified": "2024-11-26T07:15:05.413",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The The InPost Gallery plugin for WordPress is vulnerable to arbitrary shortcode execution via the inpost_gallery_get_shortcode_template AJAX action in all versions up to, and including, 2.1.4.2. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for authenticated attackers, with Subscriber-level access and above, to execute arbitrary shortcodes."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/inpost-gallery/trunk/index.php#L323",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3192113/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://wordpress.org/plugins/inpost-gallery/#developers",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5fbb2dcf-38b8-4ef1-bfea-bf5872cc7e37?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
115
CVE-2024/CVE-2024-112xx/CVE-2024-11202.json
Normal file
115
CVE-2024/CVE-2024-112xx/CVE-2024-11202.json
Normal file
@ -0,0 +1,115 @@
|
||||
{
|
||||
"id": "CVE-2024-11202",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-11-26T08:15:03.710",
|
||||
"lastModified": "2024-11-26T08:15:03.710",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Multiple plugins for WordPress are vulnerable to Reflected Cross-Site Scripting via the cminds_free_guide shortcode in various versions due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/cm-business-directory/trunk/package/cminds-free.php#L1465",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/cm-email-blacklist/trunk/package/cminds-free.php#L1465",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/cm-header-footer-script-loader/trunk/package/cminds-free.php#L1465",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/cm-on-demand-search-and-replace/trunk/package/cminds-free.php#L1469",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/cm-pop-up-banners/trunk/package/cminds-free.php#L1471",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/cm-video-lesson-manager/trunk/package/cminds-free.php#L1465",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/enhanced-tooltipglossary/trunk/package/cminds-free.php#L1465",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3191536/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3192354/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3192381/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3192416/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3192808/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3193808/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3194393/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://wordpress.org/plugins/cm-pop-up-banners/#developers",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/db759c60-9ce9-407d-8d1f-cbbfd09759d5?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,9 +2,8 @@
|
||||
"id": "CVE-2024-25579",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2024-02-28T23:15:09.660",
|
||||
"lastModified": "2024-08-28T16:35:14.267",
|
||||
"lastModified": "2024-11-26T08:15:04.400",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -23,6 +22,8 @@
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 6.8,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
@ -30,9 +31,29 @@
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 0.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "vultures@jpcert.or.jp",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 6.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 0.9,
|
||||
"impactScore": 5.9
|
||||
@ -59,6 +80,14 @@
|
||||
{
|
||||
"url": "https://www.elecom.co.jp/news/security/20240220-01/",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://jvn.jp/en/vu/JVNVU99444194/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
},
|
||||
{
|
||||
"url": "https://www.elecom.co.jp/news/security/20240220-01/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,9 +2,8 @@
|
||||
"id": "CVE-2024-26258",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2024-04-04T00:15:07.047",
|
||||
"lastModified": "2024-09-09T07:15:16.343",
|
||||
"lastModified": "2024-11-26T08:15:04.673",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -23,6 +22,8 @@
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
@ -30,13 +31,33 @@
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH"
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "vultures@jpcert.or.jp",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 6.8,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 0.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
@ -59,6 +80,14 @@
|
||||
{
|
||||
"url": "https://www.elecom.co.jp/news/security/20240326-01/",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://jvn.jp/en/vu/JVNVU95381465/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
},
|
||||
{
|
||||
"url": "https://www.elecom.co.jp/news/security/20240326-01/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
}
|
||||
]
|
||||
}
|
75
CVE-2024/CVE-2024-280xx/CVE-2024-28038.json
Normal file
75
CVE-2024/CVE-2024-280xx/CVE-2024-28038.json
Normal file
@ -0,0 +1,75 @@
|
||||
{
|
||||
"id": "CVE-2024-28038",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2024-11-26T08:15:04.873",
|
||||
"lastModified": "2024-11-26T08:15:04.873",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The web interface of the affected devices processes a cookie value improperly, leading to a stack buffer overflow. More precisely, giving too long character string to MFPSESSIONID parameter results in a stack buffer overflow. As for the details of affected product names, model numbers, and versions, refer to the information provided by the respective vendors listed under [References]."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "vultures@jpcert.or.jp",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
|
||||
"baseScore": 9.0,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "vultures@jpcert.or.jp",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://global.sharp/products/copier/info/info_security_2024-05.html",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://jp.sharp/business/print/information/info_security_2024-05.html",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://jvn.jp/en/vu/JVNVU93051062/",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://pierrekim.github.io/blog/2024-06-27-sharp-mfp-17-vulnerabilities.html",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://www.toshibatec.co.jp/information/20240531_02.html",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://www.toshibatec.com/information/20240531_02.html",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
}
|
||||
]
|
||||
}
|
75
CVE-2024/CVE-2024-289xx/CVE-2024-28955.json
Normal file
75
CVE-2024/CVE-2024-289xx/CVE-2024-28955.json
Normal file
@ -0,0 +1,75 @@
|
||||
{
|
||||
"id": "CVE-2024-28955",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2024-11-26T08:15:05.043",
|
||||
"lastModified": "2024-11-26T08:15:05.043",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Affected devices create coredump files when crashed, storing them with world-readable permission. Any local user of the device can examine the coredump files, and research the memory contents. As for the details of affected product names, model numbers, and versions, refer to the information provided by the respective vendors listed under [References]."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "vultures@jpcert.or.jp",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 5.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "vultures@jpcert.or.jp",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-732"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://global.sharp/products/copier/info/info_security_2024-05.html",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://jp.sharp/business/print/information/info_security_2024-05.html",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://jvn.jp/en/vu/JVNVU93051062/",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://pierrekim.github.io/blog/2024-06-27-sharp-mfp-17-vulnerabilities.html",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://www.toshibatec.co.jp/information/20240531_02.html",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://www.toshibatec.com/information/20240531_02.html",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
}
|
||||
]
|
||||
}
|
75
CVE-2024/CVE-2024-291xx/CVE-2024-29146.json
Normal file
75
CVE-2024/CVE-2024-291xx/CVE-2024-29146.json
Normal file
@ -0,0 +1,75 @@
|
||||
{
|
||||
"id": "CVE-2024-29146",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2024-11-26T08:15:05.203",
|
||||
"lastModified": "2024-11-26T08:15:05.203",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "User passwords are decrypted and stored on memory before any user logged in. Those decrypted passwords can be retrieved from the coredump file. As for the details of affected product names, model numbers, and versions, refer to the information provided by the respective vendors listed under [References]."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "vultures@jpcert.or.jp",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 5.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "vultures@jpcert.or.jp",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-312"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://global.sharp/products/copier/info/info_security_2024-05.html",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://jp.sharp/business/print/information/info_security_2024-05.html",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://jvn.jp/en/vu/JVNVU93051062/",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://pierrekim.github.io/blog/2024-06-27-sharp-mfp-17-vulnerabilities.html",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://www.toshibatec.co.jp/information/20240531_02.html",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://www.toshibatec.com/information/20240531_02.html",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
}
|
||||
]
|
||||
}
|
75
CVE-2024/CVE-2024-299xx/CVE-2024-29978.json
Normal file
75
CVE-2024/CVE-2024-299xx/CVE-2024-29978.json
Normal file
@ -0,0 +1,75 @@
|
||||
{
|
||||
"id": "CVE-2024-29978",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2024-11-26T08:15:05.353",
|
||||
"lastModified": "2024-11-26T08:15:05.353",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "User passwords are decrypted and stored on memory before any user logged in. Those decrypted passwords can be retrieved from the coredump file. As for the details of affected product names, model numbers, and versions, refer to the information provided by the respective vendors listed under [References]."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "vultures@jpcert.or.jp",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 5.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "vultures@jpcert.or.jp",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-256"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://global.sharp/products/copier/info/info_security_2024-05.html",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://jp.sharp/business/print/information/info_security_2024-05.html",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://jvn.jp/en/vu/JVNVU93051062/",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://pierrekim.github.io/blog/2024-06-27-sharp-mfp-17-vulnerabilities.html",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://www.toshibatec.co.jp/information/20240531_02.html",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://www.toshibatec.com/information/20240531_02.html",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
}
|
||||
]
|
||||
}
|
52
CVE-2024/CVE-2024-321xx/CVE-2024-32151.json
Normal file
52
CVE-2024/CVE-2024-321xx/CVE-2024-32151.json
Normal file
@ -0,0 +1,52 @@
|
||||
{
|
||||
"id": "CVE-2024-32151",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2024-11-26T08:15:05.513",
|
||||
"lastModified": "2024-11-26T08:15:05.513",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "User passwords are decrypted and stored on memory before any user logged in. Those decrypted passwords can be retrieved from the coredump file. As for the details of affected product names, model numbers, and versions, refer to the information provided by the respective vendors listed under [References]."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "vultures@jpcert.or.jp",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-257"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://global.sharp/products/copier/info/info_security_2024-05.html",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://jp.sharp/business/print/information/info_security_2024-05.html",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://jvn.jp/en/vu/JVNVU93051062/",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://pierrekim.github.io/blog/2024-06-27-sharp-mfp-17-vulnerabilities.html",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://www.toshibatec.co.jp/information/20240531_02.html",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://www.toshibatec.com/information/20240531_02.html",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
}
|
||||
]
|
||||
}
|
52
CVE-2024/CVE-2024-336xx/CVE-2024-33605.json
Normal file
52
CVE-2024/CVE-2024-336xx/CVE-2024-33605.json
Normal file
@ -0,0 +1,52 @@
|
||||
{
|
||||
"id": "CVE-2024-33605",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2024-11-26T08:15:05.650",
|
||||
"lastModified": "2024-11-26T08:15:05.650",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper processing of some parameters of installed_emanual_list.html leads to a path traversal vulnerability. As for the details of affected product names, model numbers, and versions, refer to the information provided by the respective vendors listed under [References]."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "vultures@jpcert.or.jp",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://global.sharp/products/copier/info/info_security_2024-05.html",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://jp.sharp/business/print/information/info_security_2024-05.html",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://jvn.jp/en/vu/JVNVU93051062/",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://pierrekim.github.io/blog/2024-06-27-sharp-mfp-17-vulnerabilities.html",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://www.toshibatec.co.jp/information/20240531_02.html",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://www.toshibatec.com/information/20240531_02.html",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
}
|
||||
]
|
||||
}
|
75
CVE-2024/CVE-2024-336xx/CVE-2024-33610.json
Normal file
75
CVE-2024/CVE-2024-336xx/CVE-2024-33610.json
Normal file
@ -0,0 +1,75 @@
|
||||
{
|
||||
"id": "CVE-2024-33610",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2024-11-26T08:15:05.810",
|
||||
"lastModified": "2024-11-26T08:15:05.810",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "\"sessionlist.html\" and \"sys_trayentryreboot.html\" are accessible with no authentication. \"sessionlist.html\" provides logged-in users' session information including session cookies, and \"sys_trayentryreboot.html\" allows to reboot the device. As for the details of affected product names, model numbers, and versions, refer to the information provided by the respective vendors listed under [References]."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "vultures@jpcert.or.jp",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
|
||||
"baseScore": 9.1,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "vultures@jpcert.or.jp",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-288"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://global.sharp/products/copier/info/info_security_2024-05.html",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://jp.sharp/business/print/information/info_security_2024-05.html",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://jvn.jp/en/vu/JVNVU93051062/",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://pierrekim.github.io/blog/2024-06-27-sharp-mfp-17-vulnerabilities.html",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://www.toshibatec.co.jp/information/20240531_02.html",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://www.toshibatec.com/information/20240531_02.html",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
}
|
||||
]
|
||||
}
|
63
CVE-2024/CVE-2024-336xx/CVE-2024-33616.json
Normal file
63
CVE-2024/CVE-2024-336xx/CVE-2024-33616.json
Normal file
@ -0,0 +1,63 @@
|
||||
{
|
||||
"id": "CVE-2024-33616",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2024-11-26T08:15:05.987",
|
||||
"lastModified": "2024-11-26T08:15:05.987",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Admin authentication can be bypassed with some specific invalid credentials, which allows logging in with an administrative privilege. Sharp Corporation states the telnet feature is implemented on older models only, and is planning to provide the firmware update to remove the feature. As for the details of affected product names, model numbers, and versions, refer to the information provided by the respective vendors listed under [References]."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "vultures@jpcert.or.jp",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://global.sharp/products/copier/info/info_security_2024-05.html",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://jp.sharp/business/print/information/info_security_2024-05.html",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://jvn.jp/en/vu/JVNVU93051062/",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://pierrekim.github.io/blog/2024-06-27-sharp-mfp-17-vulnerabilities.html",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://www.toshibatec.co.jp/information/20240531_02.html",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://www.toshibatec.com/information/20240531_02.html",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
}
|
||||
]
|
||||
}
|
75
CVE-2024/CVE-2024-341xx/CVE-2024-34162.json
Normal file
75
CVE-2024/CVE-2024-341xx/CVE-2024-34162.json
Normal file
@ -0,0 +1,75 @@
|
||||
{
|
||||
"id": "CVE-2024-34162",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2024-11-26T08:15:06.123",
|
||||
"lastModified": "2024-11-26T08:15:06.123",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The web interface of the affected devices is designed to hide the LDAP credentials even for administrative users. But configuring LDAP authentication to \"SIMPLE\", the device communicates with the LDAP server in clear-text. The LDAP password can be retrieved from this clear-text communication. As for the details of affected product names, model numbers, and versions, refer to the information provided by the respective vendors listed under [References]."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "vultures@jpcert.or.jp",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "vultures@jpcert.or.jp",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-767"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://global.sharp/products/copier/info/info_security_2024-05.html",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://jp.sharp/business/print/information/info_security_2024-05.html",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://jvn.jp/en/vu/JVNVU93051062/",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://pierrekim.github.io/blog/2024-06-27-sharp-mfp-17-vulnerabilities.html",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://www.toshibatec.co.jp/information/20240531_02.html",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://www.toshibatec.com/information/20240531_02.html",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
}
|
||||
]
|
||||
}
|
75
CVE-2024/CVE-2024-352xx/CVE-2024-35244.json
Normal file
75
CVE-2024/CVE-2024-352xx/CVE-2024-35244.json
Normal file
@ -0,0 +1,75 @@
|
||||
{
|
||||
"id": "CVE-2024-35244",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2024-11-26T08:15:06.273",
|
||||
"lastModified": "2024-11-26T08:15:06.273",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "There are several hidden accounts. Some of them are intended for maintenance engineers, and with the knowledge of their passwords (e.g., by examining the coredump), these accounts can be used to re-configure the device. As for the details of affected product names, model numbers, and versions, refer to the information provided by the respective vendors listed under [References]."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "vultures@jpcert.or.jp",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
|
||||
"baseScore": 9.1,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "vultures@jpcert.or.jp",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-798"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://global.sharp/products/copier/info/info_security_2024-05.html",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://jp.sharp/business/print/information/info_security_2024-05.html",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://jvn.jp/en/vu/JVNVU93051062/",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://pierrekim.github.io/blog/2024-06-27-sharp-mfp-17-vulnerabilities.html",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://www.toshibatec.co.jp/information/20240531_02.html",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://www.toshibatec.com/information/20240531_02.html",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
}
|
||||
]
|
||||
}
|
75
CVE-2024/CVE-2024-362xx/CVE-2024-36248.json
Normal file
75
CVE-2024/CVE-2024-362xx/CVE-2024-36248.json
Normal file
@ -0,0 +1,75 @@
|
||||
{
|
||||
"id": "CVE-2024-36248",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2024-11-26T08:15:06.430",
|
||||
"lastModified": "2024-11-26T08:15:06.430",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "API keys for some cloud services are hardcoded in the \"main\" binary. As for the details of affected product names, model numbers, and versions, refer to the information provided by the respective vendors listed under [References]."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "vultures@jpcert.or.jp",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
|
||||
"baseScore": 9.1,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "vultures@jpcert.or.jp",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-798"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://global.sharp/products/copier/info/info_security_2024-05.html",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://jp.sharp/business/print/information/info_security_2024-05.html",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://jvn.jp/en/vu/JVNVU93051062/",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://pierrekim.github.io/blog/2024-06-27-sharp-mfp-17-vulnerabilities.html",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://www.toshibatec.co.jp/information/20240531_02.html",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://www.toshibatec.com/information/20240531_02.html",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
}
|
||||
]
|
||||
}
|
71
CVE-2024/CVE-2024-362xx/CVE-2024-36249.json
Normal file
71
CVE-2024/CVE-2024-362xx/CVE-2024-36249.json
Normal file
@ -0,0 +1,71 @@
|
||||
{
|
||||
"id": "CVE-2024-36249",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2024-11-26T08:15:06.580",
|
||||
"lastModified": "2024-11-26T08:15:06.580",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-site scripting vulnerability exists in Sharp Corporation and Toshiba Tech Corporation multiple MFPs (multifunction printers). If this vulnerability is exploited, an arbitrary script may be executed on the administrative page of the affected MFPs. As for the details of affected product names, model numbers, and versions, refer to the information provided by the respective vendors listed under [References]."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "vultures@jpcert.or.jp",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N",
|
||||
"baseScore": 7.4,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 4.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "vultures@jpcert.or.jp",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://global.sharp/products/copier/info/info_security_2024-05.html",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://jp.sharp/business/print/information/info_security_2024-05.html",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://jvn.jp/en/vu/JVNVU93051062/",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://www.toshibatec.co.jp/information/20240531_02.html",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://www.toshibatec.com/information/20240531_02.html",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
}
|
||||
]
|
||||
}
|
75
CVE-2024/CVE-2024-362xx/CVE-2024-36251.json
Normal file
75
CVE-2024/CVE-2024-362xx/CVE-2024-36251.json
Normal file
@ -0,0 +1,75 @@
|
||||
{
|
||||
"id": "CVE-2024-36251",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2024-11-26T08:15:06.760",
|
||||
"lastModified": "2024-11-26T08:15:06.760",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The web interface of the affected devices process some crafted HTTP requests improperly, leading to a device crash. More precisely, a crafted parameter to billcodedef_sub_sel.html is not processed properly and device-crash happens. As for the details of affected product names, model numbers, and versions, refer to the information provided by the respective vendors listed under [References]."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "vultures@jpcert.or.jp",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "vultures@jpcert.or.jp",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://global.sharp/products/copier/info/info_security_2024-05.html",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://jp.sharp/business/print/information/info_security_2024-05.html",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://jvn.jp/en/vu/JVNVU93051062/",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://pierrekim.github.io/blog/2024-06-27-sharp-mfp-17-vulnerabilities.html",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://www.toshibatec.co.jp/information/20240531_02.html",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://www.toshibatec.com/information/20240531_02.html",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
}
|
||||
]
|
||||
}
|
71
CVE-2024/CVE-2024-362xx/CVE-2024-36254.json
Normal file
71
CVE-2024/CVE-2024-362xx/CVE-2024-36254.json
Normal file
@ -0,0 +1,71 @@
|
||||
{
|
||||
"id": "CVE-2024-36254",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2024-11-26T08:15:06.923",
|
||||
"lastModified": "2024-11-26T08:15:06.923",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Out-of-bounds read vulnerability exists in Sharp Corporation and Toshiba Tec Corporation multiple MFPs (multifunction printers), which may lead to a denial-of-service (DoS) condition."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "vultures@jpcert.or.jp",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "vultures@jpcert.or.jp",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://global.sharp/products/copier/info/info_security_2024-05.html",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://jp.sharp/business/print/information/info_security_2024-05.html",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://jvn.jp/en/vu/JVNVU93051062/",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://www.toshibatec.co.jp/information/20240531_02.html",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://www.toshibatec.com/information/20240531_02.html",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,12 @@
|
||||
"id": "CVE-2024-42412",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2024-08-30T07:15:12.070",
|
||||
"lastModified": "2024-10-27T16:35:00.983",
|
||||
"lastModified": "2024-11-26T08:15:07.073",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-site scripting vulnerability exists in WAB-I1750-PS and WAB-S1167-PS due to improper processing of input values in menu.cgi. If a user views a malicious web page while logged in to the product, an arbitrary script may be executed on the user's web browser."
|
||||
"value": "Cross-site scripting vulnerability exists in ELECOM wireless access points due to improper processing of input values in menu.cgi. If a user views a malicious web page while logged in to the product, an arbitrary script may be executed on the user's web browser."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -23,6 +22,8 @@
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
@ -30,9 +31,7 @@
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
@ -43,6 +42,8 @@
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
@ -50,9 +51,29 @@
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
],
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "vultures@jpcert.or.jp",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
@ -61,7 +82,7 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"source": "vultures@jpcert.or.jp",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
@ -71,7 +92,7 @@
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
@ -79,6 +100,16 @@
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,13 +2,12 @@
|
||||
"id": "CVE-2024-43689",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2024-10-21T02:15:02.680",
|
||||
"lastModified": "2024-10-24T14:02:22.077",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"lastModified": "2024-11-26T08:15:07.347",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Stack-based buffer overflow vulnerability exists in WAB-I1750-PS and WAB-S1167-PS. By processing a specially crafted HTTP request, arbitrary code may be executed."
|
||||
"value": "Stack-based buffer overflow vulnerability exists in ELECOM wireless access points. By processing a specially crafted HTTP request, arbitrary code may be executed."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -23,6 +22,8 @@
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
@ -30,9 +31,7 @@
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
@ -43,6 +42,8 @@
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
@ -50,9 +51,29 @@
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "vultures@jpcert.or.jp",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
@ -60,16 +81,6 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "vultures@jpcert.or.jp",
|
||||
"type": "Secondary",
|
||||
@ -79,6 +90,16 @@
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
55
CVE-2024/CVE-2024-472xx/CVE-2024-47257.json
Normal file
55
CVE-2024/CVE-2024-472xx/CVE-2024-47257.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-47257",
|
||||
"sourceIdentifier": "product-security@axis.com",
|
||||
"published": "2024-11-26T08:15:07.583",
|
||||
"lastModified": "2024-11-26T08:15:07.583",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Florent Thi\u00e9ry has found that selected Axis devices were vulnerable to handling certain ethernet frames which could lead to the Axis device becoming unavailable in the network. \nAxis has released patched AXIS OS versions for the highlighted flaw for products that are still under AXIS OS software support. Please refer to the Axis security advisory for more information and solution."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "product-security@axis.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "product-security@axis.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-1284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.axis.com/dam/public/permalink/231088/cve-2024-47257pdf-en-US_InternalID-231088.pdf",
|
||||
"source": "product-security@axis.com"
|
||||
}
|
||||
]
|
||||
}
|
63
CVE-2024/CVE-2024-532xx/CVE-2024-53278.json
Normal file
63
CVE-2024/CVE-2024-532xx/CVE-2024-53278.json
Normal file
@ -0,0 +1,63 @@
|
||||
{
|
||||
"id": "CVE-2024-53278",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2024-11-26T05:15:10.563",
|
||||
"lastModified": "2024-11-26T05:15:10.563",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-site scripting vulnerability exists in WP Admin UI Customize versions prior to ver 1.5.14. If a malicious admin user customizes the admin screen with some malicious contents, an arbitrary script may be executed on the web browser of the other users who are accessing the admin screen."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "vultures@jpcert.or.jp",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "vultures@jpcert.or.jp",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gqevu6bsiz.chicappa.jp/wp-admin-ui-customize-%E3%82%A2%E3%83%83%E3%83%97%E3%83%87%E3%83%BC%E3%83%881-5-14%E3%82%92%E3%81%97%E3%81%BE%E3%81%97%E3%81%9F/",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://jvn.jp/en/jp/JVN87182660/",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://wordpress.org/plugins/wp-admin-ui-customize/#developers",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-64xx/CVE-2024-6476.json
Normal file
55
CVE-2024/CVE-2024-64xx/CVE-2024-6476.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-6476",
|
||||
"sourceIdentifier": "product-security@axis.com",
|
||||
"published": "2024-11-26T07:15:05.697",
|
||||
"lastModified": "2024-11-26T07:15:05.697",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Gee-netics, member of the AXIS Camera Station Pro Bug Bounty Program has found that it is possible for a non-admin user to gain system privileges by redirecting a file deletion upon service restart. \n Axis has released patched versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "product-security@axis.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:L",
|
||||
"baseScore": 4.2,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 1.1,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "product-security@axis.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-276"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.axis.com/dam/public/e5/24/82/cve-2024-6476pdf-en-US-455104.pdf",
|
||||
"source": "product-security@axis.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-67xx/CVE-2024-6749.json
Normal file
55
CVE-2024/CVE-2024-67xx/CVE-2024-6749.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-6749",
|
||||
"sourceIdentifier": "product-security@axis.com",
|
||||
"published": "2024-11-26T07:15:05.857",
|
||||
"lastModified": "2024-11-26T07:15:05.857",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Seth Fogie, member of the AXIS Camera Station Pro Bug Bounty Program, has found that the Incident report feature may expose sensitive credentials on the AXIS Camera Station windows client. If Incident report is not being used with credentials configured this flaw does not apply. \n\n Axis has released patched versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "product-security@axis.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.0,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "product-security@axis.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-522"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.axis.com/dam/public/e6/e8/1e/cve-2024-6749-en-US-455106.pdf",
|
||||
"source": "product-security@axis.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-68xx/CVE-2024-6831.json
Normal file
55
CVE-2024/CVE-2024-68xx/CVE-2024-6831.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-6831",
|
||||
"sourceIdentifier": "product-security@axis.com",
|
||||
"published": "2024-11-26T08:15:07.747",
|
||||
"lastModified": "2024-11-26T08:15:07.747",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Seth Fogie, member of AXIS Camera Station Pro Bug Bounty Program has found that it is possible to edit and/or remove views without the necessary permission due to a client-side-only check. \nAxis has released patched versions for the highlighted flaw. Please \nrefer to the Axis security advisory for more information and solution."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "product-security@axis.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
|
||||
"baseScore": 4.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "product-security@axis.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-602"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.axis.com/dam/public/a2/9a/41/cve-2024-6831-en-US-455107.pdf",
|
||||
"source": "product-security@axis.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-81xx/CVE-2024-8160.json
Normal file
55
CVE-2024/CVE-2024-81xx/CVE-2024-8160.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-8160",
|
||||
"sourceIdentifier": "product-security@axis.com",
|
||||
"published": "2024-11-26T08:15:07.893",
|
||||
"lastModified": "2024-11-26T08:15:07.893",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Erik de Jong, member of the AXIS OS Bug Bounty Program, has found that the VAPIX API ftptest.cgi did not have a sufficient input validation allowing for a possible command injection leading to being able to transfer files from/to the Axis device. This flaw can only be exploited after authenticating with an administrator-privileged service account. \nAxis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "product-security@axis.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L",
|
||||
"baseScore": 3.8,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "product-security@axis.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-1286"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.axis.com/dam/public/permalink/231071/cve-2024-8160pdf-en-US_InternalID-231071.pdf",
|
||||
"source": "product-security@axis.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-87xx/CVE-2024-8772.json
Normal file
55
CVE-2024/CVE-2024-87xx/CVE-2024-8772.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-8772",
|
||||
"sourceIdentifier": "product-security@axis.com",
|
||||
"published": "2024-11-26T08:15:08.033",
|
||||
"lastModified": "2024-11-26T08:15:08.033",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "51l3nc3, member of the AXIS OS Bug Bounty Program, has found that the VAPIX API managedoverlayimages.cgi was vulnerable to a race condition attack allowing for an attacker to block access to the overlay configuration page in the web interface of the Axis device. This flaw can only be exploited after authenticating with an operator- or administrator-privileged service account. Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "product-security@axis.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "product-security@axis.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-1286"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.axis.com/dam/public/permalink/231072/cve-2024-8772pdf-en-US_InternalID-231072.pdf",
|
||||
"source": "product-security@axis.com"
|
||||
}
|
||||
]
|
||||
}
|
63
CVE-2024/CVE-2024-95xx/CVE-2024-9504.json
Normal file
63
CVE-2024/CVE-2024-95xx/CVE-2024-9504.json
Normal file
@ -0,0 +1,63 @@
|
||||
{
|
||||
"id": "CVE-2024-9504",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-11-26T08:15:08.180",
|
||||
"lastModified": "2024-11-26T08:15:08.180",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Booking calendar, Appointment Booking System plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 3.2.15 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://hacked.be/posts/CVE-2024-9504",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3195800/booking-calendar",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1fb05281-205f-4d9c-aac9-2b37e069a6fb?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
48
README.md
48
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-11-26T05:03:25.994917+00:00
|
||||
2024-11-26T09:01:03.364720+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-11-26T04:15:05.690000+00:00
|
||||
2024-11-26T08:15:08.180000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,27 +33,49 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
271300
|
||||
271331
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `7`
|
||||
Recently added CVEs: `31`
|
||||
|
||||
- [CVE-2024-11342](CVE-2024/CVE-2024-113xx/CVE-2024-11342.json) (`2024-11-26T04:15:04.030`)
|
||||
- [CVE-2024-11418](CVE-2024/CVE-2024-114xx/CVE-2024-11418.json) (`2024-11-26T04:15:05.237`)
|
||||
- [CVE-2024-49351](CVE-2024/CVE-2024-493xx/CVE-2024-49351.json) (`2024-11-26T04:15:05.457`)
|
||||
- [CVE-2024-49353](CVE-2024/CVE-2024-493xx/CVE-2024-49353.json) (`2024-11-26T04:15:05.690`)
|
||||
- [CVE-2024-49595](CVE-2024/CVE-2024-495xx/CVE-2024-49595.json) (`2024-11-26T03:15:06.093`)
|
||||
- [CVE-2024-49596](CVE-2024/CVE-2024-495xx/CVE-2024-49596.json) (`2024-11-26T03:15:06.570`)
|
||||
- [CVE-2024-49597](CVE-2024/CVE-2024-495xx/CVE-2024-49597.json) (`2024-11-26T03:15:06.940`)
|
||||
- [CVE-2024-10857](CVE-2024/CVE-2024-108xx/CVE-2024-10857.json) (`2024-11-26T07:15:05.003`)
|
||||
- [CVE-2024-11002](CVE-2024/CVE-2024-110xx/CVE-2024-11002.json) (`2024-11-26T07:15:05.413`)
|
||||
- [CVE-2024-11202](CVE-2024/CVE-2024-112xx/CVE-2024-11202.json) (`2024-11-26T08:15:03.710`)
|
||||
- [CVE-2024-28038](CVE-2024/CVE-2024-280xx/CVE-2024-28038.json) (`2024-11-26T08:15:04.873`)
|
||||
- [CVE-2024-28955](CVE-2024/CVE-2024-289xx/CVE-2024-28955.json) (`2024-11-26T08:15:05.043`)
|
||||
- [CVE-2024-29146](CVE-2024/CVE-2024-291xx/CVE-2024-29146.json) (`2024-11-26T08:15:05.203`)
|
||||
- [CVE-2024-29978](CVE-2024/CVE-2024-299xx/CVE-2024-29978.json) (`2024-11-26T08:15:05.353`)
|
||||
- [CVE-2024-32151](CVE-2024/CVE-2024-321xx/CVE-2024-32151.json) (`2024-11-26T08:15:05.513`)
|
||||
- [CVE-2024-33605](CVE-2024/CVE-2024-336xx/CVE-2024-33605.json) (`2024-11-26T08:15:05.650`)
|
||||
- [CVE-2024-33610](CVE-2024/CVE-2024-336xx/CVE-2024-33610.json) (`2024-11-26T08:15:05.810`)
|
||||
- [CVE-2024-33616](CVE-2024/CVE-2024-336xx/CVE-2024-33616.json) (`2024-11-26T08:15:05.987`)
|
||||
- [CVE-2024-34162](CVE-2024/CVE-2024-341xx/CVE-2024-34162.json) (`2024-11-26T08:15:06.123`)
|
||||
- [CVE-2024-35244](CVE-2024/CVE-2024-352xx/CVE-2024-35244.json) (`2024-11-26T08:15:06.273`)
|
||||
- [CVE-2024-36248](CVE-2024/CVE-2024-362xx/CVE-2024-36248.json) (`2024-11-26T08:15:06.430`)
|
||||
- [CVE-2024-36249](CVE-2024/CVE-2024-362xx/CVE-2024-36249.json) (`2024-11-26T08:15:06.580`)
|
||||
- [CVE-2024-36251](CVE-2024/CVE-2024-362xx/CVE-2024-36251.json) (`2024-11-26T08:15:06.760`)
|
||||
- [CVE-2024-36254](CVE-2024/CVE-2024-362xx/CVE-2024-36254.json) (`2024-11-26T08:15:06.923`)
|
||||
- [CVE-2024-47257](CVE-2024/CVE-2024-472xx/CVE-2024-47257.json) (`2024-11-26T08:15:07.583`)
|
||||
- [CVE-2024-53278](CVE-2024/CVE-2024-532xx/CVE-2024-53278.json) (`2024-11-26T05:15:10.563`)
|
||||
- [CVE-2024-6476](CVE-2024/CVE-2024-64xx/CVE-2024-6476.json) (`2024-11-26T07:15:05.697`)
|
||||
- [CVE-2024-6749](CVE-2024/CVE-2024-67xx/CVE-2024-6749.json) (`2024-11-26T07:15:05.857`)
|
||||
- [CVE-2024-6831](CVE-2024/CVE-2024-68xx/CVE-2024-6831.json) (`2024-11-26T08:15:07.747`)
|
||||
- [CVE-2024-8160](CVE-2024/CVE-2024-81xx/CVE-2024-8160.json) (`2024-11-26T08:15:07.893`)
|
||||
- [CVE-2024-8772](CVE-2024/CVE-2024-87xx/CVE-2024-8772.json) (`2024-11-26T08:15:08.033`)
|
||||
- [CVE-2024-9504](CVE-2024/CVE-2024-95xx/CVE-2024-9504.json) (`2024-11-26T08:15:08.180`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `1`
|
||||
Recently modified CVEs: `5`
|
||||
|
||||
- [CVE-2023-5685](CVE-2023/CVE-2023-56xx/CVE-2023-5685.json) (`2024-11-26T03:15:03.853`)
|
||||
- [CVE-2020-11311](CVE-2020/CVE-2020-113xx/CVE-2020-11311.json) (`2024-11-26T05:15:07.710`)
|
||||
- [CVE-2024-25579](CVE-2024/CVE-2024-255xx/CVE-2024-25579.json) (`2024-11-26T08:15:04.400`)
|
||||
- [CVE-2024-26258](CVE-2024/CVE-2024-262xx/CVE-2024-26258.json) (`2024-11-26T08:15:04.673`)
|
||||
- [CVE-2024-42412](CVE-2024/CVE-2024-424xx/CVE-2024-42412.json) (`2024-11-26T08:15:07.073`)
|
||||
- [CVE-2024-43689](CVE-2024/CVE-2024-436xx/CVE-2024-43689.json) (`2024-11-26T08:15:07.347`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
57
_state.csv
57
_state.csv
@ -112891,6 +112891,7 @@ CVE-2018-11878,0,0,a7577880f8317e8f6cb5939c708818c2a887b8562ecbec920a08c1f1686e8
|
||||
CVE-2018-11879,0,0,005ea63e1da8f5f6c647549e29c98779ed6d3daa520fcbc9169194bed09b0a4d,2019-04-03T11:29:04.113000
|
||||
CVE-2018-1188,0,0,d02a3f88c911ccac244cd017c7a788b3321fb51f0f9b2d6baef8800cdc1ab7ba,2024-11-21T03:59:21.693000
|
||||
CVE-2018-11880,0,0,627da105a8c393e5ae596adbacb419520e80fa16dfd213f152a8c8b56730b4fd,2019-04-03T11:29:04.177000
|
||||
CVE-2018-11881,1,1,3a755b3f5f2fc9cd8ff346db847e8530466459c765b806a0ccc508687869445f,2024-11-26T05:15:05.710000
|
||||
CVE-2018-11882,0,0,3af8f5703cb0ad8a12381acc51af1ccb69803be80ca51b430f92e26b3e0a8711,2019-04-03T11:29:04.257000
|
||||
CVE-2018-11883,0,0,be94c1c74171b575bb79bd3d4b626fae0b5be0a713fa28e9bf9d5fc23d03b76a,2018-11-09T17:30:56.937000
|
||||
CVE-2018-11884,0,0,73bdf9becc23beaf6ddccb8dff7eedf1e71532059116858acc33fc391c373cdf,2019-04-03T11:29:04.333000
|
||||
@ -146412,7 +146413,7 @@ CVE-2020-11308,0,0,66b4669aa5e5b819ab80edcc6fda2683f4834b645dd0c16ebea4260f308b1
|
||||
CVE-2020-11309,0,0,7980999164868c5bde422ff7b9ccda24962c06a58981e917b64ea5a5a435e8fd,2021-03-25T15:22:09.177000
|
||||
CVE-2020-1131,0,0,a9049866d75f4915e3812e50ea536849d9c01aad152004482ccd64c4b0643a62,2024-11-21T05:09:48.683000
|
||||
CVE-2020-11310,0,0,47d35e42ba3f4a25b280e3fff4a30859cfba407864465e7d2f0b747fd19252fe,2023-11-07T03:14:32.537000
|
||||
CVE-2020-11311,0,0,5ab03956373554e4b6763630083a57c2bb6ee151196d1bab3f750c33cdd99cd0,2024-11-25T05:15:05.273000
|
||||
CVE-2020-11311,0,1,ee2ed034f1d9ed4300caba9ca5c05990183b2110a523713d9157725327b6253f,2024-11-26T05:15:07.710000
|
||||
CVE-2020-11312,0,0,56bf1800f2768291840c5b431a8881b7c8b2647989f6c405ff772d61d14664a3,2023-11-07T03:14:32.840000
|
||||
CVE-2020-11313,0,0,ea35f7cdc0d725fb735ee147cfd4f5a340a5238dd9757cb42588010c057fbcdf,2023-11-07T03:14:33.090000
|
||||
CVE-2020-11314,0,0,aa08505486d8f875594538a34810d4a643b780fe6abf664805df8465b3f90a74,2023-11-07T03:14:33.317000
|
||||
@ -201338,6 +201339,7 @@ CVE-2022-3384,0,0,96fe3cc278e1f3578dbc1d8d62394e5c9eddc659181269d530fc8ac3bbdc5c
|
||||
CVE-2022-3385,0,0,593b498fcb0cd2378f428b865b2c178f379994b53e509b93e0f7adb1190b75c9,2023-11-07T03:51:12.023000
|
||||
CVE-2022-33859,0,0,4f6c46dbd95d2e30f74773ec2fb4175cc8bb5b7e4b617fff9df1ff547df67421,2023-10-18T07:15:08.907000
|
||||
CVE-2022-3386,0,0,90dc1a983cc18883ffe68459fec9534e1c2fd9244045d36ead7ebbc988b2193d,2023-11-07T03:51:12.170000
|
||||
CVE-2022-33860,1,1,58bb4e4204d245cec3c37ca2a717e4a221cdabf8b4b61aacdb04838ab08a5d98,2024-11-26T06:15:07.343000
|
||||
CVE-2022-33861,0,0,03676ee7872a13973444412a633314402e275d9e83b5435637fabe65b0d77f06,2024-11-25T09:15:05.277000
|
||||
CVE-2022-33862,0,0,b22964cc6b97d5cae40bd76583cbd81265427219322bb5cecdbf5ae52396d993,2024-11-25T09:15:05.440000
|
||||
CVE-2022-33869,0,0,951d166efce7f75a6c1edb2c957deb07e0cda49de5698edaa1b40636fa981910,2023-11-07T03:48:22.783000
|
||||
@ -240289,7 +240291,7 @@ CVE-2023-5681,0,0,d7491800836d2388e22440d68a862dd278a82c18bac217a1d7b7b5fd9c0595
|
||||
CVE-2023-5682,0,0,6c4d8f1b67779094e044998a8632d6e355d570ee581670705952e7860caa17b4,2024-05-17T02:33:13.400000
|
||||
CVE-2023-5683,0,0,eb0b32b0ce9a3963660a0f0ab5d192ab16a842927262b341b5da09de23b03195,2024-05-17T02:33:13.503000
|
||||
CVE-2023-5684,0,0,3c315e93340887d948ed19808da0318174ccf3ecaa159f738b444123fbaddfe4,2024-05-17T02:33:13.620000
|
||||
CVE-2023-5685,0,1,118c822d8a774faf91271fc6657bb1a17d0325b3e424df38fb53fdcf18f9dff6,2024-11-26T03:15:03.853000
|
||||
CVE-2023-5685,0,0,118c822d8a774faf91271fc6657bb1a17d0325b3e424df38fb53fdcf18f9dff6,2024-11-26T03:15:03.853000
|
||||
CVE-2023-5686,0,0,0d078c68756896175dead30ab40922e082f7f3a5b5772bce14d9cf4eb796a8c9,2024-01-21T03:20:51.297000
|
||||
CVE-2023-5687,0,0,b43440b744a7afe9bbcecf35486c4aa29c5cc608c95d55fd98b243af67ec6fc5,2023-10-27T18:51:42.730000
|
||||
CVE-2023-5688,0,0,63a2890764448cd6c331d652f191d177448e86b18c19818092bd8bf33157888d,2023-10-27T18:51:36
|
||||
@ -242986,6 +242988,7 @@ CVE-2024-10468,0,0,83bc1c79b32264405aab0075e1e410144135f8ec245c6acd9a90fb3cdcacd
|
||||
CVE-2024-10469,0,0,c023e9dfb8e38961747979c6b3a11e6b64f49a167ced1df26b660ad57b7e9425,2024-11-05T16:51:35.450000
|
||||
CVE-2024-1047,0,0,9e4259d94ff11bf1ad41662d7bc4dfa8d24742c305a04d1b6bfc3e99b49e569b,2024-02-08T14:20:23.387000
|
||||
CVE-2024-10470,0,0,a1e42a94b1ab92bb172948d5f556160411eda471cfe55f94496fa89ac969feb5,2024-11-12T13:56:24.513000
|
||||
CVE-2024-10471,1,1,81f508e378a965ecd5fa34856ea71a3f431854a83b2ebbffe8ceae5e1096ee9d,2024-11-26T06:15:07.520000
|
||||
CVE-2024-10474,0,0,e927def1f3fd2126e99e660d96adf5a931edb32585de89bb5c57d9d2e8d1c817,2024-11-04T13:34:48.513000
|
||||
CVE-2024-10477,0,0,ec5d3377a9eba885093e83f0ffc2c5214a9fc83d05d2bcf419cfa0429899b307,2024-10-29T14:34:04.427000
|
||||
CVE-2024-10478,0,0,a63bf38a8bfa46322ffe79a3260a2e62e4168a517fb088dc75202387c0a46091,2024-10-29T14:34:04.427000
|
||||
@ -243027,6 +243030,7 @@ CVE-2024-10537,0,0,6d7d3981c9a8a70571103d8ad66e6c8952dbf9156b3acdb77755dd3420712
|
||||
CVE-2024-10538,0,0,4258e87072a64a27fee35a0841a3c5095b5fad35eea820564ce6eaffa01f0137,2024-11-14T13:27:00.400000
|
||||
CVE-2024-1054,0,0,f8e7e53b5707aaecdfe1ea6fba53413ba04bed5cdf673762252b510775f984b1,2024-02-29T13:49:29.390000
|
||||
CVE-2024-10540,0,0,d72994b8ce256d6087bbd8c05a3cb9446a5f50c733a3ad70b615c2d8dd4c3c0c,2024-11-04T13:18:27.017000
|
||||
CVE-2024-10542,1,1,89806b1e0a8540c6c58c061f04f69ebafa8231c02ffc8a44e3927b57acbdcdfc,2024-11-26T06:15:07.683000
|
||||
CVE-2024-10543,0,0,78e6de226aa4ccb5cb5b260268ce156b234621147350989dafddd9817bf9323e,2024-11-08T21:19:02.700000
|
||||
CVE-2024-10544,0,0,d84fa7aeaabdc2cfe5861efef74c5b30022ed51487865228c56366868169c4d7,2024-11-01T12:57:03.417000
|
||||
CVE-2024-10546,0,0,fe7c4bb80388357d2012de9abcf9bdb2510a4d8644b958f5e63299c9a417e4c8,2024-11-01T12:57:03.417000
|
||||
@ -243038,6 +243042,7 @@ CVE-2024-10559,0,0,f02de87419b06f79046e87a4e20909e93937f86137fa0aad3ef812234236a
|
||||
CVE-2024-1056,0,0,7aa227b1313326ef7e8b583bc7a3f0e84afbbd1f0f46388543b54cca53251293,2024-09-19T22:06:32.340000
|
||||
CVE-2024-10561,0,0,29b70870967a739c229fbeecbb009b70108489636df3647702a2fd1c0595a0bb,2024-11-01T20:42:12.303000
|
||||
CVE-2024-1057,0,0,afa16fae44234143422d3d8f32f1ab0c34f389c2f0ebb0a7139bb0ca7e4b1769,2024-04-22T13:28:43.747000
|
||||
CVE-2024-10570,1,1,c512ffde6a7106ceaaceffb83d70a1ad2c299d9e7c750445faea3d54adc81ae2,2024-11-26T06:15:07.880000
|
||||
CVE-2024-10571,0,0,764d0722def38a147b3ba290b54cc9e9aebe855b12c99828d9c801c2e02fe1a0,2024-11-19T15:46:52.187000
|
||||
CVE-2024-10573,0,0,9063cc223ea5dcb15427b5dfc605e5a082c0cb2c41a32875a4278d827b140fe0,2024-11-01T12:57:03.417000
|
||||
CVE-2024-10575,0,0,924d12914fd797ca7b437680e7624f960ff1fb4e9a84f0339e46e831bcf19838,2024-11-19T17:28:06.750000
|
||||
@ -243184,6 +243189,7 @@ CVE-2024-10770,0,0,0f5897dd9aba481faece95da66f5bd3d6a2ccff92cbfd04ce22fd4f1ffbf1
|
||||
CVE-2024-10778,0,0,079913d9652b6f58f66290bfdff6b3da5883740d014ac44b1539fe6c742670ea,2024-11-13T17:01:16.850000
|
||||
CVE-2024-10779,0,0,03484221afac3766470b5ced8d3332eee24d28c027104d12405179c89d30afec,2024-11-12T13:56:24.513000
|
||||
CVE-2024-1078,0,0,88568fa2f20f5ea8de25fda48576808429bbc616448df571a879f056db565620,2024-02-14T18:39:51.437000
|
||||
CVE-2024-10781,1,1,525208815751629467d033df5e23d63739a60403cc03b8051f4119b633da5911,2024-11-26T06:15:08.057000
|
||||
CVE-2024-10786,0,0,a76f656d6635ceb4e91d9df4d3549e3d377ef91a9f4fadf29676d949614dad8b,2024-11-18T17:11:17.393000
|
||||
CVE-2024-1079,0,0,0a964f4e43e1a2d85a40a4753c5354fe293facf65d0ebcc06031e68ccad95a0f,2024-02-14T19:33:09.977000
|
||||
CVE-2024-10790,0,0,c5195852541315ac22dd1b614848e72547c3a099e7858697bb9ee4c86225d43f,2024-11-12T13:55:21.227000
|
||||
@ -243229,6 +243235,7 @@ CVE-2024-10852,0,0,f6b203b7b939235aa255ffed248e8cf068dd3b791229b609e430feca6cc83
|
||||
CVE-2024-10853,0,0,02830723c1cfc34942045c33ee361ea42546311dacb0cff9be0a3634be59c448,2024-11-13T17:01:16.850000
|
||||
CVE-2024-10854,0,0,15cfe2e17b56db5e0c11761ae38ecac4069d0ddad2bb05d2f72a443bc2fa6485,2024-11-13T17:01:16.850000
|
||||
CVE-2024-10855,0,0,d7cd537c8ddc42e8b381daa2ada926e04d761570bdc3c7ecb9c761ce484fc4db,2024-11-20T07:15:07.853000
|
||||
CVE-2024-10857,1,1,7fa5b5a886f884eab497f541a0fe9dbbf359fc91d9012b33d55a7533bd76e633,2024-11-26T07:15:05.003000
|
||||
CVE-2024-1086,0,0,3e819e2fff80149e3f377751fd1fb28a52f8791d9e5d08990c549613b15214b2,2024-08-14T19:41:08.673000
|
||||
CVE-2024-10861,0,0,0e475116cbc916b1684eb819921303de89576e8768786550a96cf2c67b7dbecb,2024-11-18T17:11:17.393000
|
||||
CVE-2024-10863,0,0,73ae75d507e7803adc5662733da40a7cb9c2f90ede6e9111ab7b41f9d928dc1d,2024-11-22T16:15:21.257000
|
||||
@ -243316,6 +243323,7 @@ CVE-2024-10998,0,0,c1d0d5576e5b5ac9af53ae18f32585f399df56f20f18f57ee7d18eb4fae4d
|
||||
CVE-2024-10999,0,0,e7ea7377e972e711b7f09c97d1f1904a51f2a45036948c3c337a6d1c65fd2441,2024-11-13T01:05:34.293000
|
||||
CVE-2024-1100,0,0,f004473b9cf0d9d95a81c6b2db685e986de4389d0d38ab5c3537c8bbd36c025b,2024-07-03T01:44:59.517000
|
||||
CVE-2024-11000,0,0,a7e8d5385c553ca345a72fc5358bdef9d69bb9b3c3980e31af7a0cfb92d81a8f,2024-11-13T01:05:49.643000
|
||||
CVE-2024-11002,1,1,b6bf6324987f4073b2c9bfe8ed3afef93af42e688e9e8a0c5fdbab27cca15ed5,2024-11-26T07:15:05.413000
|
||||
CVE-2024-11003,0,0,61bfbb93c4ae10f4af71c16c69643bf462c68ffa94733e59b6f95c78952b7f9b,2024-11-19T21:56:45.533000
|
||||
CVE-2024-11004,0,0,ae81cd254161ae2b32edcbdeb3c8b9257e0a408bd5a5695d4038ccc9e5adaac9,2024-11-13T17:01:58.603000
|
||||
CVE-2024-11005,0,0,11c6f0332fc033e5f19567e3b4704591ec391ce7bb38c717fd45eebf4e8bd80e,2024-11-22T17:15:06.803000
|
||||
@ -243429,6 +243437,7 @@ CVE-2024-11195,0,0,59a97c370771f27b33e51ae1039dc49a821a1858990404541e8309b975c38
|
||||
CVE-2024-11198,0,0,51d6daea956d8949d0eebe7d036d8836a4c8d5c266ea899d7a1d4229a0290103,2024-11-19T21:57:32.967000
|
||||
CVE-2024-11199,0,0,1b252293dc51d6f43d3121b045d01eb3c6301ad12927e01a257a520b4287caef,2024-11-23T10:15:03.897000
|
||||
CVE-2024-1120,0,0,4ae965ad3da5f8a3235e6e58dd82dd504b21e474d229ae465351f9f2ed6318d2,2024-03-01T14:04:04.827000
|
||||
CVE-2024-11202,1,1,51d8d259b86d0f0a0aaf1b7832edde09bf21ffb4ef806afcd5ff2c031b036ac7,2024-11-26T08:15:03.710000
|
||||
CVE-2024-11206,0,0,4dabdbee4189d67c14faab7077a38bbebaaf9a0412b9485b8ea9f96e93b55b84,2024-11-15T13:58:08.913000
|
||||
CVE-2024-11207,0,0,98c51622a761e0f4191d7b9bd2fdd9da6fc0915a6a97cca51529b9e5f809abed,2024-11-15T13:58:08.913000
|
||||
CVE-2024-11208,0,0,eece2216dd32411003d7f73e496d57c02295784efeef0aa80d5e4c5d3e98a4f6,2024-11-19T19:38:51.637000
|
||||
@ -243503,7 +243512,7 @@ CVE-2024-1133,0,0,b8b851364368259dd533f1c71b437f741276dcf99770b03558b5d9cd5d3f09
|
||||
CVE-2024-11330,0,0,1c458fab138aae3f3b89b170e15e7403fdc2fbe304c8cf0cbc41ae122ec08539,2024-11-23T07:15:03.737000
|
||||
CVE-2024-11332,0,0,21d8101c0dd73a7dc8b4a9b045dbbf7a2c40f682ad21bdcbf98ef68d6b970235,2024-11-23T05:15:06.520000
|
||||
CVE-2024-1134,0,0,92ca7b611a6a52333e888fa3a581b5dbc5c29b22a5e7e62eb553cb40e2cb6d77,2024-05-24T13:03:05.093000
|
||||
CVE-2024-11342,1,1,bac43c65bfe7c40167758b1f761e157674244a484facce7f4cc928fc94d88934,2024-11-26T04:15:04.030000
|
||||
CVE-2024-11342,0,0,bac43c65bfe7c40167758b1f761e157674244a484facce7f4cc928fc94d88934,2024-11-26T04:15:04.030000
|
||||
CVE-2024-1135,0,0,c4e807742cebaf6bf696946dfb175a5e42a114f551ef03f8a1a000797bbd864f,2024-06-30T23:15:02.563000
|
||||
CVE-2024-1136,0,0,afecf0ebdd615b0db4af51c2dffb234fe058d5206cf056cda6c9c969b40b0967,2024-02-28T14:06:45.783000
|
||||
CVE-2024-11361,0,0,51b4837c758190b2e89b9741bdbd5713d8df3163c1cfcf1bc7c03ae151745655,2024-11-23T05:15:06.673000
|
||||
@ -243524,7 +243533,7 @@ CVE-2024-11406,0,0,d4abbee85b1f77460ba170fa7cbcf81435244eeb65babfc1772879a68307a
|
||||
CVE-2024-11408,0,0,54146805a36bac284d40e39c15c15c6876d5afc53f160d33d40768ebebc9eab4,2024-11-23T05:15:06.990000
|
||||
CVE-2024-1141,0,0,31012446f41a8e14cd01fac5beb57c8618f6593d63d8f6abd3fca30a025146cd,2024-05-22T22:15:08.627000
|
||||
CVE-2024-11415,0,0,33ba95f5490e63268a39f93ff44091ae19cc0b92e1f270172254ccc6ede1d872,2024-11-23T04:15:08.760000
|
||||
CVE-2024-11418,1,1,1127e4fb83ac3b30a1c36f88e01c5bf8c71390c841aa598dea17c87ce6d3a185,2024-11-26T04:15:05.237000
|
||||
CVE-2024-11418,0,0,1127e4fb83ac3b30a1c36f88e01c5bf8c71390c841aa598dea17c87ce6d3a185,2024-11-26T04:15:05.237000
|
||||
CVE-2024-1142,0,0,444665e5d63ad8c810b6738875a9c2a9c27bc01781467ef31bed70fec17787e6,2024-03-21T12:58:51.093000
|
||||
CVE-2024-11426,0,0,2b83b72f632671d15edef71a2fe1b0898a6bd6d43d5d87a70cb93682f02396e8,2024-11-23T05:15:07.153000
|
||||
CVE-2024-1143,0,0,b8d0c26da5a42e6a02317cbe9672f530b65f02168ce7a3fde71211ebe1a9550d,2024-02-09T19:08:27.423000
|
||||
@ -248587,7 +248596,7 @@ CVE-2024-25574,0,0,65726bda902fec4a9a49461993a5b1f1f19b916c575dd539bf5599a6d815d
|
||||
CVE-2024-25575,0,0,2e4887ee13b995216d77350689726b7532b0325e739fa8baefbe39600a3f9674,2024-04-30T17:52:35.057000
|
||||
CVE-2024-25576,0,0,240625f6b8a88df530eb19373f437c5caaffca27a3660adad03735e0e821105e,2024-09-06T20:17:14.003000
|
||||
CVE-2024-25578,0,0,0d1f2ffd4e03b50b29ccf39cdb2058ba91ae7a7cb01bdc49fe129aadbabc71e4,2024-03-01T14:04:26.010000
|
||||
CVE-2024-25579,0,0,e18a976cb7cc873665c4cde29595232519ed1d6333d6b865b6ffed467db01627,2024-08-28T16:35:14.267000
|
||||
CVE-2024-25579,0,1,2334dc0dfc6a35e1678047efe2f03994b1d1cbd6e7f94352a106476c186b9728,2024-11-26T08:15:04.400000
|
||||
CVE-2024-2558,0,0,4df4f161b02ab0ee082928d86d735f9684058e2b58c51335b3ee6abb912b22ce,2024-05-17T02:38:18.947000
|
||||
CVE-2024-25580,0,0,aae407d3ca56bd796a76b9a34e38ae064cf192b4e3de93c97edbd1466335c748,2024-10-29T20:35:17.633000
|
||||
CVE-2024-25581,0,0,7b661193358cc282ffdeeb44cff665ab8564f25632f9671f041e9f50015c108f,2024-06-10T18:15:27.650000
|
||||
@ -249172,7 +249181,7 @@ CVE-2024-26254,0,0,024245ede1fede2394fca1e326cc18c265676be3657652d8066482f274ba6
|
||||
CVE-2024-26255,0,0,def0d1975fa503fc52bece1a738d7a3d0ac65fd2582e7e57928a6ef65a03e34e,2024-04-10T13:24:00.070000
|
||||
CVE-2024-26256,0,0,3807901f6ac90b4732561ba3ffb11bfe90ae3ad76f283571e61bd6293795a413,2024-10-09T02:15:27.847000
|
||||
CVE-2024-26257,0,0,066b4f8e21f6da31e18bfde8bcbd77b29d1c931685dc4eb216f9777000563c57,2024-04-10T13:24:00.070000
|
||||
CVE-2024-26258,0,0,2a9672d6ed0fd06f71f147874c9f6533f22085e94e3e959706ad13fe0557526a,2024-09-09T07:15:16.343000
|
||||
CVE-2024-26258,0,1,f4248d3e8e928a419f24581b3f206b118893f8adefdd6ccb3d93e9de576bbd15,2024-11-26T08:15:04.673000
|
||||
CVE-2024-2626,0,0,5a6c338629bbaaf7065165299ae412c08d9197fb3cad2770c12e07d226bcbe56,2024-04-01T15:22:37.883000
|
||||
CVE-2024-26260,0,0,65643e0ce4f84c48cec78b438df5085c99da999075d065c3a4c15ac8e9f87e0c,2024-06-28T02:15:03.190000
|
||||
CVE-2024-26261,0,0,513bda7a092399193b5a95cba8191ef907d5160f5f00ea0bdca470614c45d8a0,2024-06-28T02:15:03.423000
|
||||
@ -250638,6 +250647,7 @@ CVE-2024-2803,0,0,22f2c86ca1c88d78ce00e8d709ea3d268b625d199c05ddcd35d56c7f9860f3
|
||||
CVE-2024-28030,0,0,383ba087a7d9e03f3729f2d371b6b408a3b63145fc91da4126609ef755900230,2024-11-15T14:00:09.720000
|
||||
CVE-2024-28033,0,0,b3c00174c596428be92cce453e3547082c3550d2faa9dae834e019420834a8b4,2024-08-02T17:35:33.770000
|
||||
CVE-2024-28034,0,0,1f04dc65f231aba26563c955179bb55e818d7cb96adc110022207010427ec021,2024-11-05T15:35:10.627000
|
||||
CVE-2024-28038,1,1,1ba695407daac557b4b1ebe4cf9c9267208d26dcb4f8a7ee455c49c646848593,2024-11-26T08:15:04.873000
|
||||
CVE-2024-28039,0,0,3a8376c4c37b22221c3249737981025e902f9cb4913edf8d0bc477677335599e,2024-08-01T13:48:56.840000
|
||||
CVE-2024-2804,0,0,f94784ce7208522cdb239257db0640b294e390aa5a8ad545b6674bfcf666c26b,2024-04-10T13:23:38.787000
|
||||
CVE-2024-28040,0,0,21719c3860720b51f714db5e12d335d65a6dfdafe50ecd38637f05a181e13a6d,2024-03-22T12:45:36.130000
|
||||
@ -251218,6 +251228,7 @@ CVE-2024-28950,0,0,d87cf536998f19ca3ea46db1e2a2b6eb63d52069373bbccf1f977f66004b1
|
||||
CVE-2024-28951,0,0,a076a4222e08b02e8cd2b9c67ba4cfaca5bf7589b5e41c98ae39575c74159c6e,2024-04-02T12:50:42.233000
|
||||
CVE-2024-28952,0,0,03ce4d26ea83e91549021668eb00f7a216a1167d8d20f0cad44e8ebe7a2762af,2024-11-15T14:00:09.720000
|
||||
CVE-2024-28953,0,0,bf15e6214517ab8261fa8ae7ceac88b061cfcb90015627f72b13aec9e1761bc6,2024-08-14T17:49:14.177000
|
||||
CVE-2024-28955,1,1,c3ae4f641e2f636ff001fadd7ac5717242b015e25a6ee7a23cb0d8fc07b6d114,2024-11-26T08:15:05.043000
|
||||
CVE-2024-28957,0,0,99432bbf0e2944655d9b3d14025b17e0714441ee50861d2d06b13856968b6443,2024-08-29T20:36:38
|
||||
CVE-2024-2896,0,0,65ede353e34c386898ba2637cfb49ad4710dca05a79d3f20095106470af669ff,2024-06-26T20:15:15.187000
|
||||
CVE-2024-28960,0,0,52abb52a9d4e5bfc8a4202f8cac850702b2036add0599181377d1c9da970c376,2024-07-03T01:51:57.697000
|
||||
@ -251401,6 +251412,7 @@ CVE-2024-29140,0,0,7dfd3d07ac776b1ed3210fc9dc9693191a9a0b78ee052584a7764f3cf46ec
|
||||
CVE-2024-29141,0,0,7df8c5cfc3ead6297dc074977e4d7d2454ed15b4b07a73de90f11f07eb72b8bc,2024-03-19T14:31:27.883000
|
||||
CVE-2024-29142,0,0,061608a60bd309f905f4d19889d6b64bb9b1a0d9d93bbc96f304394814bdd569,2024-03-19T14:31:27.883000
|
||||
CVE-2024-29143,0,0,ed69b2d9180032c6bcf01e4d99bd2a1b22e1518c20ff0cda172d21a651ffdd36,2024-03-19T13:26:46
|
||||
CVE-2024-29146,1,1,d1379564c0c6159afd8169f9dd48944366c0cc9288fe236c2996a59104d1ce79,2024-11-26T08:15:05.203000
|
||||
CVE-2024-29149,0,0,3887e60eeb63bc9cafb3d652beff1219d97a4604919fa5ac1837a650a43ed85b,2024-07-03T01:52:06.800000
|
||||
CVE-2024-2915,0,0,fa39838c2e0ba58063df869e29623fc73b77acf2be583ac3e3fe2de7a06ef37a,2024-10-28T19:35:24.793000
|
||||
CVE-2024-29150,0,0,4924bacfe5857f73b4ac7a824a3a849e6169771413a526f86b266258de89e147,2024-07-03T01:52:07.770000
|
||||
@ -251902,6 +251914,7 @@ CVE-2024-29974,0,0,95c960f3663ca805207b0282e4dd55b7db41b4855a5d3cd2356d3cbb0de9e
|
||||
CVE-2024-29975,0,0,dd90f52c857658c1e55bb6a9eabcbfa685a04e70242168e88b92597613e79ebb,2024-08-02T02:15:17.723000
|
||||
CVE-2024-29976,0,0,2e76e5f749f89d166e8f60e11fac3f53e046bc0b5b2bd2c0bb26a6cb79b733c7,2024-08-02T02:15:17.820000
|
||||
CVE-2024-29977,0,0,5563b7796409ef117337fa79f3e429d4d505556f415621ebfaf7a5a980fdb6af,2024-08-23T14:52:19.923000
|
||||
CVE-2024-29978,1,1,21b8c7a9090a7705f8c7eb2035360bfe887f64f37adff521699fbd66d3246bcf,2024-11-26T08:15:05.353000
|
||||
CVE-2024-2998,0,0,529e4d63a60fb43eff1450ddb35e7521c436b06357cd9f933bf7536e9ff53bd8,2024-05-17T02:38:41.883000
|
||||
CVE-2024-29981,0,0,87a31a61cdf81b98bbc6bd8e79883f9fedc6f421fdbf6cfb239f24353327db62,2024-05-28T23:15:17.270000
|
||||
CVE-2024-29982,0,0,2b0e311c693a5c01164acb4d684911085c875bf98c0b51fd697730431b87aa78,2024-04-10T13:24:00.070000
|
||||
@ -253596,6 +253609,7 @@ CVE-2024-32147,0,0,ed14700cccfb0cda87a633109f0f7bc757ba5c2081f42bfda22f3a7feb6f7
|
||||
CVE-2024-32148,0,0,22eaa682ca57be740d99255c2e5fbd248f14af606d84d6d3c9100973529ff0b8,2024-06-13T18:36:45.417000
|
||||
CVE-2024-32149,0,0,b2b226678f5b6fc3063af16db3df1b1f5beae60c5b5de2cd72494f3a01514fcc,2024-04-15T13:15:31.997000
|
||||
CVE-2024-3215,0,0,e5fb2a5f0603876a47fbaf0581a5b0a27f3e787377440e3d933b055fa124676e,2024-05-02T18:00:37.360000
|
||||
CVE-2024-32151,1,1,8c339ed5932b607ffa17b81066f5ee474a07a6779f814d26ae344849bc4db291,2024-11-26T08:15:05.513000
|
||||
CVE-2024-32152,0,0,df67a1c7620164eaaccbec2e8f2fd9292dea378bf2d693bf6152652954ec5ae3,2024-09-06T17:22:12.383000
|
||||
CVE-2024-3216,0,0,36d9056f12425336af262dd787bf04647621823ca6d005690ab6601a9ec48458,2024-04-08T18:49:25.863000
|
||||
CVE-2024-32161,0,0,aa486a10e1c1e1d4ce96087862c0685a8206cb453d4b368274ea4d3fc4398d92,2024-07-03T01:55:49.600000
|
||||
@ -254646,12 +254660,15 @@ CVE-2024-33601,0,0,1e872276284c72121f6aaeefc175b69e15bd1ff785d0661b2fa91a7a25fea
|
||||
CVE-2024-33602,0,0,86deb6f1e6a3eb7f53cef6d50563acba68abbbbc8944080d8d45f1adacf78d24,2024-07-22T18:15:03.583000
|
||||
CVE-2024-33603,0,0,dd2c640710464d77e12c3cf25cda315c5368032fba1e17806066e822f0955991,2024-11-13T18:39:49
|
||||
CVE-2024-33604,0,0,f300ec136103721a36b6f9e3ad22fcddf48753bfae597ae6d6eb99e8e877fcf5,2024-05-08T17:05:24.083000
|
||||
CVE-2024-33605,1,1,caaa76b86c3ff7492d0a97f280ee5a99cadd68c3613aaec26025156bdea3202c,2024-11-26T08:15:05.650000
|
||||
CVE-2024-33606,0,0,e277f7ddb9a42d3084a4fa02dbc3b1b3d63499186ceb3e463e593da1b13af1f7,2024-06-13T18:36:09.013000
|
||||
CVE-2024-33608,0,0,2634f245511a2ef8bdf0a976af80480a0940742ffc95fa320a1cb750a797cfb7,2024-05-08T17:05:24.083000
|
||||
CVE-2024-3361,0,0,3987591b20407a1c515606479571376257c715748e7334237cf48ed958e6de1a,2024-05-17T02:39:52.620000
|
||||
CVE-2024-33610,1,1,bf6211ed418b7926cc9efc71892371f73adb48d4dea1264ebcb0e4e8e8e8864d,2024-11-26T08:15:05.810000
|
||||
CVE-2024-33611,0,0,cf39a65aaa20c224e34d51f4ed23923edc045062aed1a2cad8c463648c07e8b6,2024-11-15T14:00:09.720000
|
||||
CVE-2024-33612,0,0,74c7c883d3664c00836e065c241cfad127fb1c2fb9de0c3022446dbc1326076a,2024-05-08T17:05:24.083000
|
||||
CVE-2024-33615,0,0,2c0c4d1e8ef406786c1679d725fd5d6b0a90745e47351d773c9f2720f2fe7461,2024-05-16T13:03:05.353000
|
||||
CVE-2024-33616,1,1,44c021151d827b44a79d292bec5e44784b5aaea7b12b92de48886b6072aff323,2024-11-26T08:15:05.987000
|
||||
CVE-2024-33617,0,0,48b1ad41b5cd3e3d5db84d8c4b46a345ab8193d6715efa3057992b1f283e39f6,2024-11-15T14:00:09.720000
|
||||
CVE-2024-33619,0,0,2684fa8fefc27f2e1a5ed51c39fc9579fbba8ac802fe77fdcca9db705628800f,2024-06-21T11:22:01.687000
|
||||
CVE-2024-3362,0,0,d92169c3d8c5742c227b67545a8be3a4af52d45882987a88c4a23c2fb99ad420,2024-05-17T02:39:52.720000
|
||||
@ -255093,6 +255110,7 @@ CVE-2024-34156,0,0,281374624716fc97e73927b0e17fc3ff10c7c3ce10cee8420a8b05daef295
|
||||
CVE-2024-34158,0,0,0fd72fb00224cfe4f9ed8cacfff4aeadb87d2bc96dad7a6b5b064905d0cc5bda,2024-09-09T14:35:01.170000
|
||||
CVE-2024-3416,0,0,a081ed6eeab1f8c610822f30cf17aa2151f535dbb3c22c142c8cc9d4a77c8f63,2024-05-17T02:39:54.337000
|
||||
CVE-2024-34161,0,0,bbdc550af4eb522ba0c0a49b8f0b0f2b8ab2486eb88097c00d555e9de7e4a0b7,2024-06-10T18:15:34.770000
|
||||
CVE-2024-34162,1,1,109242d827d21b07e4ab406abf6737a73fcc105a38ee1f441d43c7fa2b6bfee7,2024-11-26T08:15:06.123000
|
||||
CVE-2024-34163,0,0,2f9be74221a126c780fee9df35c4749361e313e79808498cd64aeaba263e49d6,2024-09-12T18:59:30.753000
|
||||
CVE-2024-34164,0,0,efd8b638f6022da57f6ee2faeaf60e8940a4bab962493112791d300389f055b1,2024-11-15T14:00:09.720000
|
||||
CVE-2024-34165,0,0,5f3c8ad4b4e4d0e5bc71a03e42e033328c198fcf3d84a7a78168501b66f95043,2024-11-15T14:00:09.720000
|
||||
@ -255861,6 +255879,7 @@ CVE-2024-3524,0,0,caaaa672c1583c111467dc987fb30c87160b7f141d39c66ef33b7bd5d6f222
|
||||
CVE-2024-35240,0,0,10f7cfa87efb80189efe3d266bfaf6f2d74876bd1f9be0a2a318dfa5c5196863,2024-05-29T13:02:09.280000
|
||||
CVE-2024-35241,0,0,cb282beda3e169f0ffe5213a46ad14d5235aa62b1613d6fd39f98e381add4a7d,2024-06-20T09:15:11.993000
|
||||
CVE-2024-35242,0,0,582d7cb6c304b8940a8805c990f3fb7ff37dec36204966ddd8a9cce31009f1cf,2024-06-20T09:15:12.140000
|
||||
CVE-2024-35244,1,1,e5696b8f2cafa861e8a2a9f26f22e2ef250e8fa5f22792a3545a1cfe52ae13a1,2024-11-26T08:15:06.273000
|
||||
CVE-2024-35245,0,0,0abf4f6509e66549f5f43f7be33ca478585d0e9b90c24e0597504467160d28c3,2024-11-15T14:00:09.720000
|
||||
CVE-2024-35246,0,0,cc5250190c0b6d05aacf7ab7e1559a6a667a42d50dc12d387326d113c4c39730,2024-06-21T11:22:01.687000
|
||||
CVE-2024-35247,0,0,88bbd7eea3b694f188b138a274c2cc76eba6f7f74ce49816ad3caef11da1dd52,2024-06-24T19:26:47.037000
|
||||
@ -256700,10 +256719,14 @@ CVE-2024-36244,0,0,72ec9199c50b58fba1710bd51385a13f86b624ab2159e939e6a1444afbe8d
|
||||
CVE-2024-36245,0,0,dde3668c508a0a731afb7367784c1ce5e9599c5845e89faea97d8a30d6c66563,2024-11-15T14:00:09.720000
|
||||
CVE-2024-36246,0,0,d22d56b3ac190fbff4b5b820bf9253b2e2f7fd0137ac45e12945d45896804b68,2024-08-15T17:35:07.080000
|
||||
CVE-2024-36247,0,0,16c6efe40503daf1080fcbf6d9a009e1a3c1386098439c6bda19cf80a4941086,2024-09-23T14:16:11.290000
|
||||
CVE-2024-36248,1,1,10e154d0697e3b3bb59a5e52b9d5c72f727d254297b565b97de8210c55805ec5,2024-11-26T08:15:06.430000
|
||||
CVE-2024-36249,1,1,c1e49ed40efbf9d773d33fed7fa8a96841b1e33043c5c2fa81dea76adc39ebd3,2024-11-26T08:15:06.580000
|
||||
CVE-2024-3625,0,0,fb0a948a4b5da0bdab04bf1595a286af67dd68466c0feac9aee7f6c3556ca9e2,2024-04-26T12:58:17.720000
|
||||
CVE-2024-36250,0,0,84e96f986a29ca7154d7560c7f995480a77fe85044db24411c2c6dac77be0279,2024-11-14T17:11:23.913000
|
||||
CVE-2024-36251,1,1,c4c359abbe3af5727346e49a8dd4bdceb8aa86217f56f68e283b85a2583467df,2024-11-26T08:15:06.760000
|
||||
CVE-2024-36252,0,0,4edf18ae557d8c3498076af1a69a7b853e545554a27b9b0b40bcb780d22c50d6,2024-07-03T02:02:59.060000
|
||||
CVE-2024-36253,0,0,440d7b8249c4286c7e09d3a45cabb0a3006bd48cbd66e9aa33e43eb576c7fb12,2024-11-15T14:00:09.720000
|
||||
CVE-2024-36254,1,1,98b54ac8633be29f60d4c555d974ffc595c64932b9e730d2e5da42c1fe779493,2024-11-26T08:15:06.923000
|
||||
CVE-2024-36255,0,0,a469b4be0a60fb4a2e32368cbd9ff1f41eb30d9e30ebf5e64783accfe9b2d73a,2024-05-28T12:39:28.377000
|
||||
CVE-2024-36257,0,0,de59e82b2cc868e7dbd975a3494539da4e2b96eaf9e15fff111a5d725848914c,2024-07-05T17:06:28.517000
|
||||
CVE-2024-3626,0,0,ecad313ba7341fd9bbe18ef0c6d316a3039cc88d660f7ee647b2392d610decc0,2024-05-24T01:15:30.977000
|
||||
@ -260995,7 +261018,7 @@ CVE-2024-42406,0,0,e90d9dcd097bb16d679ffd30ffcb27f45aae84621913c19f8cb847809bb0e
|
||||
CVE-2024-42408,0,0,4d58de4373d6b44540fc0d8799a258082f4b72e8c10ed3de4134395815aaf808,2024-08-29T14:22:45.603000
|
||||
CVE-2024-4241,0,0,1e8cfaace7e8ae3194846b1351a77e14aef6cd3a07b429e780198fa55ccad7c3,2024-05-17T02:40:19.957000
|
||||
CVE-2024-42411,0,0,3fcf900cd705b45045cb94d8edb3d48eeb6b58809490fd9c74760d8ca62aa9ff,2024-08-23T16:04:26.227000
|
||||
CVE-2024-42412,0,0,344e1b37b83fa96ca2162affade3fd39accb3b8f0b9118fec72f076f637c0a9e,2024-10-27T16:35:00.983000
|
||||
CVE-2024-42412,0,1,6a9ffe69049be008b8ff459fef4ab0b338252452e67216fc9502fbd6f637f1b8,2024-11-26T08:15:07.073000
|
||||
CVE-2024-42415,0,0,54b88b1483f9dbb417e72d5eac636a64ce9431f976ae33821cfda8b39e97e793,2024-10-09T16:44:20.360000
|
||||
CVE-2024-42416,0,0,0c0ba6b9334c7e838b8d455f49871ca47f5d5630f34ccb39214f945ba545086b,2024-09-05T21:25:09.273000
|
||||
CVE-2024-42417,0,0,97db2e1cae78c6c5b15ff9e0f09e1c2fc00065af3496103746ac59f2d9475a69,2024-10-08T15:43:05.720000
|
||||
@ -261910,7 +261933,7 @@ CVE-2024-43685,0,0,a89a9c99e0124da64988793c53f10ebfe259e8367a37913b86ec873ac50d0
|
||||
CVE-2024-43686,0,0,57da9b9a959d579b6b38566543c182c3ea32961f0f4f75db16d108202427ec80,2024-10-16T19:20:57.230000
|
||||
CVE-2024-43687,0,0,2d688f9009e177644291437898c6abc2a42e1449965d5242ebc6bc49d96ae3d9,2024-10-16T19:28:09.177000
|
||||
CVE-2024-43688,0,0,f39d1b1cd29869db949f77b65b174936ed5c42e4fb24c070ceb5bc7ef518b2eb,2024-08-26T14:35:06.680000
|
||||
CVE-2024-43689,0,0,6f23e58b4260cafda21579386b8aee6692125d25e44c62a3506c2f2048e021e4,2024-10-24T14:02:22.077000
|
||||
CVE-2024-43689,0,1,aae1d50ee3cc8d9d2d1a04db198f2f42e9f7bb49447e735666ab02d89e4abba2,2024-11-26T08:15:07.347000
|
||||
CVE-2024-4369,0,0,9bcc319f475d5802b53d6dedcfa6ead4761cbf7c42adde8daf6f3ff8c0c17af2,2024-06-19T18:15:11.820000
|
||||
CVE-2024-43690,0,0,d9d35b70595ee9d0c288460e486611e2e8293b6f0702f7c86364e442cd6413d7,2024-09-11T16:26:11.920000
|
||||
CVE-2024-43692,0,0,dd90c0c7ec0961e33104688c3a64f24371b069eba59a503241b07b01ecbb28f7,2024-10-01T16:22:38.197000
|
||||
@ -264056,6 +264079,7 @@ CVE-2024-4725,0,0,038fe38ac4531e61bf3177f0fb7b7333acb4571c75548945a25c993c1898f9
|
||||
CVE-2024-47253,0,0,0c81facaa1aa1f7ae0b0e27b1673e803ebaeec77aef71a1827f37f9dbd7dbd49,2024-11-07T12:15:24.630000
|
||||
CVE-2024-47254,0,0,81bb7fbcf9de24b32604c709597f53a5bfd5dadb66fc238800b57d25b4c1a55f,2024-11-07T12:15:24.747000
|
||||
CVE-2024-47255,0,0,4e4181b499a17b720343878ad776ef93b384b10f1546c28d389a3c7b495a0310,2024-11-07T12:15:24.857000
|
||||
CVE-2024-47257,1,1,6e9aa7aa322707c0902010d343884ecacf2481e3b9bbb41daf700d654b64ad32,2024-11-26T08:15:07.583000
|
||||
CVE-2024-4726,0,0,270a342f16ba50f480fb87849b5e08fe420ac808bade1fd45455bab1f318f402,2024-06-12T20:15:13.070000
|
||||
CVE-2024-4727,0,0,944186dc32a6b9f919ede42bcb555e3e922a4782a833eff4d2f1edc6462e7155,2024-05-17T02:40:35.380000
|
||||
CVE-2024-4728,0,0,4f079b987c555f4e946bc2da0c8ee767b411a220a728ca55c5e58bef9ad4770e,2024-05-17T02:40:35.490000
|
||||
@ -265258,8 +265282,8 @@ CVE-2024-49334,0,0,bcc2db18f40dffe6c4f8472b0ef26870ffad9612f58222d9017252998c694
|
||||
CVE-2024-49335,0,0,64cc1bcb12301e7e8f03bc857d01393c7ba079fd3a08962dcf26c673c0054a8c,2024-10-24T14:50:16.557000
|
||||
CVE-2024-4934,0,0,fd5d4b9709dde517f56a9aae7369c165c45ceba9bcf88bee680213c2fc56b62f,2024-08-01T13:59:37.220000
|
||||
CVE-2024-49340,0,0,ac31e0788e5efdd9e643807e1798bcc72e4ae5b0b8213bfd46baffe09e220ce8,2024-11-08T15:06:21.730000
|
||||
CVE-2024-49351,1,1,61bf934cc2e531cb754499c209e467302d16943993e1ea3a9b8cf8bc0457c2d4,2024-11-26T04:15:05.457000
|
||||
CVE-2024-49353,1,1,9c97812a4579bafd3b230c433431e7d8c5f9373807385b227e5af52ffb4a16e8,2024-11-26T04:15:05.690000
|
||||
CVE-2024-49351,0,0,61bf934cc2e531cb754499c209e467302d16943993e1ea3a9b8cf8bc0457c2d4,2024-11-26T04:15:05.457000
|
||||
CVE-2024-49353,0,0,9c97812a4579bafd3b230c433431e7d8c5f9373807385b227e5af52ffb4a16e8,2024-11-26T04:15:05.690000
|
||||
CVE-2024-49357,0,0,6503b40a74a6613085cacc3815bfdb01e01bab8ce0bff54535ea857ed7d26be9,2024-11-06T15:28:38.160000
|
||||
CVE-2024-49358,0,0,df99e254916c8dff27bc118ecfd140161a54ef4581a6841d720c531a5bf44aba,2024-11-06T15:27:26.637000
|
||||
CVE-2024-49359,0,0,cc09522176dca55ed443e811571748ebfc3f0f5a4f89d4ec44c17a0a8a645881,2024-11-06T15:27:02.347000
|
||||
@ -265355,9 +265379,9 @@ CVE-2024-49580,0,0,89085af96d96dbfcdc87aa1d40157bd1a1b8615e2e8f40b207dbbe916ae15
|
||||
CVE-2024-4959,0,0,862ee7700763d202e5d5dada80050e48cca3b83d56a63673f2017bcf5adb7503,2024-07-03T02:08:22.750000
|
||||
CVE-2024-49592,0,0,c703ea90112e8bcf8bd25130b1345e2b105fcdfcaded2bbe98ade97b760a4e11,2024-11-18T17:11:56.587000
|
||||
CVE-2024-49593,0,0,0790debc03c6d685a8ce9800bcaf05d3a2d51714ee514270485ccb66f44467d5,2024-11-18T19:35:04.960000
|
||||
CVE-2024-49595,1,1,b23fd80b60ac647f05027d85537df31a89ac4114f3b437db461e9c48fece4a35,2024-11-26T03:15:06.093000
|
||||
CVE-2024-49596,1,1,59e71c8fcc49b547b7105baadcec16161b1e8926ccc4ef3d091ff33a55518621,2024-11-26T03:15:06.570000
|
||||
CVE-2024-49597,1,1,0ed9c472548512fdbebd47665245e9475dd32b69328def0424455c0672cbd4c3,2024-11-26T03:15:06.940000
|
||||
CVE-2024-49595,0,0,b23fd80b60ac647f05027d85537df31a89ac4114f3b437db461e9c48fece4a35,2024-11-26T03:15:06.093000
|
||||
CVE-2024-49596,0,0,59e71c8fcc49b547b7105baadcec16161b1e8926ccc4ef3d091ff33a55518621,2024-11-26T03:15:06.570000
|
||||
CVE-2024-49597,0,0,0ed9c472548512fdbebd47665245e9475dd32b69328def0424455c0672cbd4c3,2024-11-26T03:15:06.940000
|
||||
CVE-2024-4960,0,0,1e2962fabc78c9680506fb58bfd339ee733c096965130a77b4df6d334c6fc642,2024-08-01T21:15:53.753000
|
||||
CVE-2024-49604,0,0,4130a6c1f975a0d07098374dd7fb4ff2ab97718728858633e395173b92657205,2024-10-23T15:49:25.567000
|
||||
CVE-2024-49605,0,0,21fbfbd0533f40e566065b86694a265ad75f1074bc1863301e12bf2d3d8773cf,2024-10-24T14:57:49.617000
|
||||
@ -267427,6 +267451,7 @@ CVE-2024-53261,0,0,26d255de57d248944569dc2de87b17d6f9e71a4446cd8213a8b457b4c29b3
|
||||
CVE-2024-53262,0,0,b58ac4cb966f18ebf91dd1e51ed9015ec986a3fab28fed8c4a716894290c935b,2024-11-25T20:15:10.423000
|
||||
CVE-2024-53268,0,0,007aa1474b5fa3204d1321367c5c9ffff4ab0370ad189bb72596a6cd01d88cfa,2024-11-25T20:15:10.583000
|
||||
CVE-2024-5327,0,0,4827791dbb34368c55d6cd06e5ae60d7938f5b7d8da35d37ecd04c9478388419,2024-05-30T13:15:41.297000
|
||||
CVE-2024-53278,1,1,1edc5c251ee4bcfedd995bcbf8c129ae024665a932e08b92e99c76ae653deb38,2024-11-26T05:15:10.563000
|
||||
CVE-2024-5328,0,0,389f7ef980e9d16941bc44acc7d327871d53fb707d54ba8870eb280f34f36d8b,2024-07-23T19:41:49.540000
|
||||
CVE-2024-5329,0,0,455e8737b3d3fdaf4e090dd4445471ebeb638ae4f41003db454e4798dec65f13,2024-10-14T13:43:12.070000
|
||||
CVE-2024-5330,0,0,d052f676e850b1a7538b470735e7fe5f7dfb3046b39fa2778831cd7f8fdd99b2,2024-08-01T12:42:36.933000
|
||||
@ -268485,6 +268510,7 @@ CVE-2024-6470,0,0,c9a33c23ec7370c50b4df58ad71ec5e181cf8d29947a984c43804e0a58dc77
|
||||
CVE-2024-6471,0,0,09d48a1225aac8158aa4c1ca2c8aef77a523ae62ed5b11e34f01b64da625d366,2024-08-23T16:47:32.537000
|
||||
CVE-2024-6472,0,0,06cfc3c26e9764572c1adb3e446cad13cb9599b02c4c47946f6698a134e25867,2024-08-06T16:31:05.780000
|
||||
CVE-2024-6473,0,0,9d329dd670917bde4dfbebd26b87a1f0ac64a0b550d97fba6854ff35150aadd6,2024-09-05T14:19:45.153000
|
||||
CVE-2024-6476,1,1,0370dbdd5727136594c530b872469f044070e5481ffe30d61f2543823a6399da,2024-11-26T07:15:05.697000
|
||||
CVE-2024-6477,0,0,095ad8bec127bb97feb0819e6df5852cd52601b6cc4ba1d92128a3b9897811f6,2024-09-06T17:35:19.087000
|
||||
CVE-2024-6479,0,0,c8f8d548256983f37f1a1f914a4517a4b6525cba3baa0c1cf39c2a4bf229f79d,2024-11-01T12:57:03.417000
|
||||
CVE-2024-6480,0,0,7bcb03d66a5fa0166ee462f7c92d213eea433092d03296e333b90f9f0f0fccdd,2024-11-01T12:57:03.417000
|
||||
@ -268720,6 +268746,7 @@ CVE-2024-6745,0,0,1617c1b62a6985e7cfd1493a4e6106081b5b226c76f4caaa1064224772ef70
|
||||
CVE-2024-6746,0,0,a07904c7ab441e8aefcdf67187efe0701752648d282a9adf495048d9805d0f66,2024-07-19T18:02:29.417000
|
||||
CVE-2024-6747,0,0,0000c09077cd962795fbde814978916c566d78ff452661411d71146a95e7ae22,2024-10-15T13:22:17.563000
|
||||
CVE-2024-6748,0,0,3165cdb659bfb317f070ab6b5ff0ffe08f8676c2d4210e086188fb527771a712,2024-07-30T13:33:30.653000
|
||||
CVE-2024-6749,1,1,2490672c4ffdc39c932708a2faf2859ba2c640b574f81fbe1e209d21778c172a,2024-11-26T07:15:05.857000
|
||||
CVE-2024-6750,0,0,259befaacfd3ee023627d5e60a86696c98cc4bb58920e9f36a409d03ab7792d0,2024-09-03T21:40:22.460000
|
||||
CVE-2024-6751,0,0,65709f0db2fc5964de358cedefb78e4090d836ca670fed7f74fbf34d4a07dbbd,2024-09-03T21:39:06.433000
|
||||
CVE-2024-6752,0,0,3322b8d9a07108b4d7f8844e99ca324d2acf62dd128c8d54e626f384defe9b94,2024-09-03T21:36:58.790000
|
||||
@ -268790,6 +268817,7 @@ CVE-2024-6824,0,0,2b5b10cc415939a34f32e5b37be54f877a179f9144de8a5e8476b884ab80fa
|
||||
CVE-2024-6826,0,0,abddedb129e27da630545079500556677df6390a29a7544ea32b991f1e68fa19,2024-10-25T12:56:07.750000
|
||||
CVE-2024-6828,0,0,5e3bce0050be5ef41f841daf735b80af46e729368278d26d6a7ddc5bbbdee66f,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6830,0,0,aebb528fa5990f215bf59ed6adf1eccff7b523ab0519e4c99385be78311dcd92,2024-10-17T13:33:40.750000
|
||||
CVE-2024-6831,1,1,0d7f0fe79d51f07497188b312e80cf30f5175160127792ebbd3d6981a3eb001b,2024-11-26T08:15:07.747000
|
||||
CVE-2024-6833,0,0,b0ea48d29166f6347ac218b4f9f93d3f7fc599fd932b64c35cfa55e5a1a94672,2024-07-18T12:28:43.707000
|
||||
CVE-2024-6834,0,0,23e85f57c9b7230818a4425261a24fd150d79ea72676d6bce04d47efdd69630e,2024-08-01T14:00:44.750000
|
||||
CVE-2024-6835,0,0,41865b692717ae9a44a610e23697ffc045f0e55e3b334eff49e1f6de97130779,2024-09-11T16:32:16.247000
|
||||
@ -269902,6 +269930,7 @@ CVE-2024-8154,0,0,fbb17f9dd590ac994870ad751b395ff693888a574100db6420d6e8a3b3d34a
|
||||
CVE-2024-8155,0,0,104526467feb0428b2a45114df171b7d6e09efac9bca1bd2f2048b3b33875369,2024-09-12T13:53:23.827000
|
||||
CVE-2024-8158,0,0,33012ddebc769dbb05ad0933fa5ab17b9a29e8fda58104c3b0868628fb6c230f,2024-09-12T21:00:00.573000
|
||||
CVE-2024-8159,0,0,187743c6b0677e5a77406a2f8244c876b899aabb1cac71216ceccd6d74ccce3c,2024-10-04T13:50:43.727000
|
||||
CVE-2024-8160,1,1,8b7a7fe92daa04981b635cf999261099b4066e2c095f85d6a79dda85ed7c340a,2024-11-26T08:15:07.893000
|
||||
CVE-2024-8161,0,0,b695c0171728397a80eb00146225c0169779aabf8de6c566aa00c71a077959b1,2024-08-26T12:47:20.187000
|
||||
CVE-2024-8162,0,0,2f15be70d7b9e402b643053e8cc2849077cf4472f134c84060c0898ffb295f28,2024-08-27T14:28:46.927000
|
||||
CVE-2024-8163,0,0,34076faaf51f1e489aa58346c56061ee9718b828b5ae0365e6c357cdf31c941d,2024-09-06T22:18:19.283000
|
||||
@ -270375,6 +270404,7 @@ CVE-2024-8767,0,0,17744319861b5196f5a63bddf3c3c4ab0c9d11dd531ce1a95816c3c9e2193e
|
||||
CVE-2024-8768,0,0,a982019cb3e87700eba7d9922c696779881e32d71a95f1662a9030bc9b15c0d2,2024-09-20T12:30:51.220000
|
||||
CVE-2024-8770,0,0,092503c78b1ec747d9cd01983ee6d65a49e2eef82871ebe4802ea35253afc2e7,2024-09-27T13:49:29.690000
|
||||
CVE-2024-8771,0,0,8440e358d9ef6f31cf81e66a5a83b441147afe75ee9c3ad99e3f4526f8f30874,2024-09-30T12:46:20.237000
|
||||
CVE-2024-8772,1,1,69fe2194f6f1a272b95a9dfa955e0defecb0d89f2fa80479731934d1afc5a40a,2024-11-26T08:15:08.033000
|
||||
CVE-2024-8775,0,0,b1c934c0f161c282b2ea9c3e55f934218dc75fc137b9f5d065788131a5d3a709,2024-11-06T20:15:06.763000
|
||||
CVE-2024-8776,0,0,5f24148b1f2c0e63f94c4b7c4eb112791a653befffb86dbacf9b6c99ebdd5088,2024-09-20T16:38:51.910000
|
||||
CVE-2024-8777,0,0,abf6497bbb9ed542a83ea295cf446b5b0a64e2a3685378272b7c6e8d7a6d8418,2024-09-20T14:22:19.840000
|
||||
@ -270921,6 +270951,7 @@ CVE-2024-9488,0,0,7160e6226507ff679fbcba733953e2a0c67fe3c2a8e1dee05991bd941a40e8
|
||||
CVE-2024-9489,0,0,da9917eda81b5ad40f78c98d3cdcfaa2ce360118ba030bb2ddb2e149e55b8a8e,2024-11-01T16:27:25.937000
|
||||
CVE-2024-9500,0,0,a3c03f4a2da5e76f37827cc5472849fd1bec52b508254b9d9e4dd8dde68494f7,2024-11-18T17:11:17.393000
|
||||
CVE-2024-9501,0,0,d7be73289096f59e8614142ae5f23da8d3cd042d0cbe3c76d9c725d64a67b604,2024-10-28T13:58:09.230000
|
||||
CVE-2024-9504,1,1,fefa8d0bb3f1d2572b72f6cdfb57ed45074690eac5a6713ab2a18c5e4b2d6493,2024-11-26T08:15:08.180000
|
||||
CVE-2024-9505,0,0,134fdf0964e1ec52ef4b47c0af3083cd4691e60ed884fd2512ddc6dbb615a8df,2024-10-31T16:39:41.193000
|
||||
CVE-2024-9506,0,0,fc042b04aa147d17b390b33fa64fff12c26897968128764931f8bf3b1a3e0722,2024-10-16T16:38:43.170000
|
||||
CVE-2024-9507,0,0,9477ee329318032ff294d196e1a50966e1c5d89bdb9b9dc24092f58cf1f5f346,2024-10-15T12:58:51.050000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user