Auto-Update: 2024-09-19T02:00:17.214499+00:00

This commit is contained in:
cad-safe-bot 2024-09-19 02:03:17 +00:00
parent 8a890e44ec
commit d2b51badbd
23 changed files with 1161 additions and 112 deletions

View File

@ -2,13 +2,13 @@
"id": "CVE-2019-1069",
"sourceIdentifier": "secure@microsoft.com",
"published": "2019-06-12T14:29:04.337",
"lastModified": "2024-09-18T19:35:04.250",
"lastModified": "2024-09-19T01:00:03.107",
"vulnStatus": "Modified",
"cveTags": [],
"cisaExploitAdd": "2022-03-15",
"cisaActionDue": "2022-04-05",
"cisaRequiredAction": "Apply updates per vendor instructions.",
"cisaVulnerabilityName": "Microsoft Task Scheduler Privilege Escalation Vulnerability",
"cisaExploitAdd": "2024-09-18",
"cisaActionDue": "2024-10-09",
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
"cisaVulnerabilityName": "Microsoft Windows Task Scheduler Privilege Escalation Vulnerability",
"descriptions": [
{
"lang": "en",

View File

@ -2,9 +2,13 @@
"id": "CVE-2020-0618",
"sourceIdentifier": "secure@microsoft.com",
"published": "2020-02-11T22:15:13.400",
"lastModified": "2022-01-01T19:59:00.413",
"lastModified": "2024-09-19T01:00:03.107",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2024-09-18",
"cisaActionDue": "2024-10-09",
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
"cisaVulnerabilityName": "Microsoft SQL Server Reporting Services Remote Code Execution Vulnerability",
"descriptions": [
{
"lang": "en",

View File

@ -2,9 +2,13 @@
"id": "CVE-2020-14644",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2020-07-15T18:15:29.457",
"lastModified": "2020-07-20T17:03:11.847",
"lastModified": "2024-09-19T01:00:03.107",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2024-09-18",
"cisaActionDue": "2024-10-09",
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
"cisaVulnerabilityName": "Oracle WebLogic Server Remote Code Execution Vulnerability",
"descriptions": [
{
"lang": "en",

View File

@ -2,9 +2,13 @@
"id": "CVE-2022-21445",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2022-04-19T21:15:15.907",
"lastModified": "2022-04-28T13:17:07.963",
"lastModified": "2024-09-19T01:00:03.107",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2024-09-18",
"cisaActionDue": "2024-10-09",
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
"cisaVulnerabilityName": "Oracle JDeveloper Remote Code Execution Vulnerability",
"descriptions": [
{
"lang": "en",

View File

@ -2,9 +2,13 @@
"id": "CVE-2024-27348",
"sourceIdentifier": "security@apache.org",
"published": "2024-04-22T14:15:07.420",
"lastModified": "2024-08-01T13:48:22.967",
"lastModified": "2024-09-19T01:00:03.120",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"cisaExploitAdd": "2024-09-18",
"cisaActionDue": "2024-10-09",
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
"cisaVulnerabilityName": "Apache HugeGraph-Server Improper Access Control Vulnerability",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-44430",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-13T20:15:02.940",
"lastModified": "2024-09-16T15:35:20.943",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-19T01:38:06.317",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,14 +81,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mayurik:best_free_law_office_management:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7A1CF51F-03EF-4644-BA3E-6454E06BB2B6"
}
]
}
]
}
],
"references": [
{
"url": "https://blog.csdn.net/samwbs/article/details/140954482",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/samwbs/kortexcve/blob/main/xss_register_case/XSS_register_case.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Not Applicable"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-45103",
"sourceIdentifier": "psirt@lenovo.com",
"published": "2024-09-13T18:15:04.760",
"lastModified": "2024-09-14T11:47:14.677",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-19T01:50:12.427",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A valid, authenticated LXCA user may be able to unmanage an LXCA managed device in through the LXCA web interface without sufficient privileges."
},
{
"lang": "es",
"value": "Es posible que un usuario LXCA v\u00e1lido y autenticado pueda cancelar la administraci\u00f3n de un dispositivo administrado por LXCA a trav\u00e9s de la interfaz web de LXCA sin privilegios suficientes."
}
],
"metrics": {
@ -36,6 +40,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "psirt@lenovo.com",
"type": "Secondary",
@ -47,10 +61,53 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:lenovo:xclarity_administrator:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.1.0",
"matchCriteriaId": "C235DE63-F7C5-4EF9-9C06-6CA32EDA3253"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:a:emc:vmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "908C035C-215D-4979-9EA1-949C4B3EE61C"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:redhat:kernel-based_virtual_machine:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F43EB670-614A-4C09-A6D6-78D86279A481"
}
]
}
]
}
],
"references": [
{
"url": "https://support.lenovo.com/us/en/product_security/LEN-154748",
"source": "psirt@lenovo.com"
"source": "psirt@lenovo.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,20 +2,44 @@
"id": "CVE-2024-45104",
"sourceIdentifier": "psirt@lenovo.com",
"published": "2024-09-13T18:15:05.087",
"lastModified": "2024-09-14T11:47:14.677",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-19T01:49:50.870",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A valid, authenticated LXCA user without sufficient privileges may be able to use the device identifier to modify an LXCA managed device through a specially crafted web API call."
},
{
"lang": "es",
"value": "Un usuario LXCA v\u00e1lido y autenticado sin privilegios suficientes puede usar el identificador del dispositivo para modificar un dispositivo administrado por LXCA a trav\u00e9s de una llamada API web especialmente manipulada."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@lenovo.com",
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "psirt@lenovo.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
@ -36,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "psirt@lenovo.com",
"type": "Secondary",
@ -47,10 +81,53 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:lenovo:xclarity_administrator:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.1.0",
"matchCriteriaId": "C235DE63-F7C5-4EF9-9C06-6CA32EDA3253"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:a:emc:vmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "908C035C-215D-4979-9EA1-949C4B3EE61C"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:redhat:kernel-based_virtual_machine:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F43EB670-614A-4C09-A6D6-78D86279A481"
}
]
}
]
}
],
"references": [
{
"url": "https://support.lenovo.com/us/en/product_security/LEN-154748",
"source": "psirt@lenovo.com"
"source": "psirt@lenovo.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,17 +2,41 @@
"id": "CVE-2024-5754",
"sourceIdentifier": "vulnerabilities@zephyrproject.org",
"published": "2024-09-13T19:15:17.597",
"lastModified": "2024-09-14T11:47:14.677",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-19T01:44:29.550",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "BT: Encryption procedure host vulnerability"
},
{
"lang": "es",
"value": "BT: Vulnerabilidad del host del procedimiento de cifrado"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "vulnerabilities@zephyrproject.org",
"type": "Secondary",
@ -36,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "vulnerabilities@zephyrproject.org",
"type": "Secondary",
@ -47,10 +81,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:zephyrproject:zephyr:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.6.0",
"matchCriteriaId": "0C71E782-50A1-4727-B9FC-B20D7BF73A89"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-gvv5-66hw-5qrc",
"source": "vulnerabilities@zephyrproject.org"
"source": "vulnerabilities@zephyrproject.org",
"tags": [
"Exploit",
"Patch"
]
}
]
}

View File

@ -2,17 +2,41 @@
"id": "CVE-2024-5931",
"sourceIdentifier": "vulnerabilities@zephyrproject.org",
"published": "2024-09-13T20:15:03.037",
"lastModified": "2024-09-14T11:47:14.677",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-19T01:35:17.767",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "BT: Unchecked user input in bap_broadcast_assistant"
},
{
"lang": "es",
"value": "BT: Entrada de usuario no verificada en bap_broadcast_assistant"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "vulnerabilities@zephyrproject.org",
"type": "Secondary",
@ -36,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
},
{
"source": "vulnerabilities@zephyrproject.org",
"type": "Secondary",
@ -51,10 +85,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:zephyrproject:zephyr:*:*:*:*:*:*:*:*",
"versionEndIncluding": "3.6.0",
"matchCriteriaId": "8BA5725B-1797-45C0-846C-FE2EC98D6440"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-r8h3-64gp-wv7f",
"source": "vulnerabilities@zephyrproject.org"
"source": "vulnerabilities@zephyrproject.org",
"tags": [
"Exploit",
"Vendor Advisory"
]
}
]
}

View File

@ -2,17 +2,41 @@
"id": "CVE-2024-6135",
"sourceIdentifier": "vulnerabilities@zephyrproject.org",
"published": "2024-09-13T20:15:03.220",
"lastModified": "2024-09-14T11:47:14.677",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-19T01:34:49.397",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "BT:Classic: Multiple missing buf length checks"
},
{
"lang": "es",
"value": "BT:Classic: Faltan varias comprobaciones de longitud de beneficio"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "vulnerabilities@zephyrproject.org",
"type": "Secondary",
@ -36,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-369"
}
]
},
{
"source": "vulnerabilities@zephyrproject.org",
"type": "Secondary",
@ -47,10 +81,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:zephyrproject:zephyr:*:*:*:*:*:*:*:*",
"versionEndIncluding": "3.6.0",
"matchCriteriaId": "8BA5725B-1797-45C0-846C-FE2EC98D6440"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-xcr5-5g98-mchp",
"source": "vulnerabilities@zephyrproject.org"
"source": "vulnerabilities@zephyrproject.org",
"tags": [
"Exploit",
"Vendor Advisory"
]
}
]
}

View File

@ -2,17 +2,41 @@
"id": "CVE-2024-6137",
"sourceIdentifier": "vulnerabilities@zephyrproject.org",
"published": "2024-09-13T20:15:03.403",
"lastModified": "2024-09-14T11:47:14.677",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-19T01:33:12.627",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "BT: Classic: SDP OOB access in get_att_search_list"
},
{
"lang": "es",
"value": "BT: Cl\u00e1sico: acceso SDP OOB en get_att_search_list"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "vulnerabilities@zephyrproject.org",
"type": "Secondary",
@ -36,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
},
{
"source": "vulnerabilities@zephyrproject.org",
"type": "Secondary",
@ -55,10 +89,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:zephyrproject:zephyr:*:*:*:*:*:*:*:*",
"versionEndIncluding": "3.6.0",
"matchCriteriaId": "8BA5725B-1797-45C0-846C-FE2EC98D6440"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-pm38-7g85-cf4f",
"source": "vulnerabilities@zephyrproject.org"
"source": "vulnerabilities@zephyrproject.org",
"tags": [
"Exploit",
"Vendor Advisory"
]
}
]
}

View File

@ -2,17 +2,41 @@
"id": "CVE-2024-6258",
"sourceIdentifier": "vulnerabilities@zephyrproject.org",
"published": "2024-09-13T19:15:17.823",
"lastModified": "2024-09-14T11:47:14.677",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-19T01:40:32.813",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "BT: Missing length checks of net_buf in rfcomm_handle_data"
},
{
"lang": "es",
"value": "BT: Faltan comprobaciones de longitud de net_buf en rfcomm_handle_data"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "vulnerabilities@zephyrproject.org",
"type": "Secondary",
@ -36,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-191"
}
]
},
{
"source": "vulnerabilities@zephyrproject.org",
"type": "Secondary",
@ -55,10 +89,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:zephyrproject:zephyr:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.6.0",
"matchCriteriaId": "0C71E782-50A1-4727-B9FC-B20D7BF73A89"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-7833-fcpm-3ggm",
"source": "vulnerabilities@zephyrproject.org"
"source": "vulnerabilities@zephyrproject.org",
"tags": [
"Exploit",
"Vendor Advisory"
]
}
]
}

View File

@ -2,17 +2,41 @@
"id": "CVE-2024-6259",
"sourceIdentifier": "vulnerabilities@zephyrproject.org",
"published": "2024-09-13T21:15:10.830",
"lastModified": "2024-09-14T11:47:14.677",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-19T01:33:36.477",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "BT: HCI: adv_ext_report Improper discarding in adv_ext_report"
},
{
"lang": "es",
"value": "BT: HCI: adv_ext_report Descarte incorrecto en adv_ext_report"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "vulnerabilities@zephyrproject.org",
"type": "Secondary",
@ -36,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
},
{
"source": "vulnerabilities@zephyrproject.org",
"type": "Secondary",
@ -51,10 +85,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:zephyrproject:zephyr:*:*:*:*:*:*:*:*",
"versionEndIncluding": "3.6.0",
"matchCriteriaId": "8BA5725B-1797-45C0-846C-FE2EC98D6440"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-p5j7-v26w-wmcp",
"source": "vulnerabilities@zephyrproject.org"
"source": "vulnerabilities@zephyrproject.org",
"tags": [
"Exploit",
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,78 @@
{
"id": "CVE-2024-7254",
"sourceIdentifier": "cve-coordination@google.com",
"published": "2024-09-19T01:15:10.963",
"lastModified": "2024-09-19T01:15:10.963",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Any project that parses untrusted Protocol Buffers data\u00a0containing an arbitrary number of nested groups / series of SGROUP\u00a0tags can corrupted by exceeding the stack limit i.e. StackOverflow. Parsing nested groups as unknown fields with DiscardUnknownFieldsParser or Java Protobuf Lite parser, or against Protobuf map fields, creates unbounded recursions that can be abused by an attacker."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cve-coordination@google.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "NONE",
"vulnerableSystemIntegrity": "NONE",
"vulnerableSystemAvailability": "HIGH",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 8.7,
"baseSeverity": "HIGH"
}
}
]
},
"weaknesses": [
{
"source": "cve-coordination@google.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "https://github.com/protocolbuffers/protobuf/commit/cc8b3483a5584b3301e3d43d17eb59704857ffaa",
"source": "cve-coordination@google.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-7960",
"sourceIdentifier": "PSIRT@rockwellautomation.com",
"published": "2024-09-12T21:15:03.153",
"lastModified": "2024-09-12T21:34:55.633",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-19T01:52:55.193",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -59,9 +59,41 @@
"baseSeverity": "HIGH"
}
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 9.1,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "PSIRT@rockwellautomation.com",
"type": "Secondary",
@ -73,10 +105,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:rockwellautomation:pavilion8:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.0",
"matchCriteriaId": "9569FBE7-2B8C-48A7-976A-2CDF1A155FB4"
}
]
}
]
}
],
"references": [
{
"url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1695.html",
"source": "PSIRT@rockwellautomation.com"
"source": "PSIRT@rockwellautomation.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-7961",
"sourceIdentifier": "PSIRT@rockwellautomation.com",
"published": "2024-09-12T21:15:03.357",
"lastModified": "2024-09-12T21:34:55.633",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-19T01:52:24.530",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -59,9 +59,41 @@
"baseSeverity": "HIGH"
}
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
},
{
"source": "PSIRT@rockwellautomation.com",
"type": "Secondary",
@ -73,10 +105,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:rockwellautomation:pavilion8:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.0",
"matchCriteriaId": "9569FBE7-2B8C-48A7-976A-2CDF1A155FB4"
}
]
}
]
}
],
"references": [
{
"url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1695.html",
"source": "PSIRT@rockwellautomation.com"
"source": "PSIRT@rockwellautomation.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-8533",
"sourceIdentifier": "PSIRT@rockwellautomation.com",
"published": "2024-09-12T20:15:05.820",
"lastModified": "2024-09-12T21:34:55.633",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-19T01:57:23.830",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -59,9 +59,41 @@
"baseSeverity": "HIGH"
}
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-276"
}
]
},
{
"source": "PSIRT@rockwellautomation.com",
"type": "Secondary",
@ -73,10 +105,102 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:rockwellautomation:2800c_optixpanel_compact_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.0.0.325",
"versionEndExcluding": "4.0.2.116",
"matchCriteriaId": "F218EB00-8AFC-40D5-BA47-A95EB8788B1B"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:rockwellautomation:2800c_optixpanel_compact:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6122A68F-32E5-47BA-AC46-6E7F47458908"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:rockwellautomation:2800s_optixpanel_standard_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.0.0.350",
"versionEndExcluding": "4.0.2.123",
"matchCriteriaId": "CEE022A0-C5D3-4C01-B2DB-EABA21DC980F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:rockwellautomation:2800s_optixpanel_standard:-:*:*:*:*:*:*:*",
"matchCriteriaId": "17E3A41C-75A5-4CE1-A682-28A24345E312"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:rockwellautomation:embedded_edge_compute_module_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.0.0.347",
"versionEndExcluding": "4.0.2.106",
"matchCriteriaId": "C5651BE1-D935-42BA-8639-77862C560703"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:rockwellautomation:embedded_edge_compute_module:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AAB55941-8559-4BFB-A135-200AD5A7F4AA"
}
]
}
]
}
],
"references": [
{
"url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1964.html",
"source": "PSIRT@rockwellautomation.com"
"source": "PSIRT@rockwellautomation.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-8782",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-09-13T18:15:07.920",
"lastModified": "2024-09-14T11:47:14.677",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-19T01:46:07.003",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in JFinalCMS up to 1.0. It has been rated as critical. This issue affects the function delete of the file /admin/template/edit. The manipulation of the argument name leads to path traversal. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
},
{
"lang": "es",
"value": "Se ha detectado una vulnerabilidad en JFinalCMS hasta la versi\u00f3n 1.0. Se ha calificado como cr\u00edtica. Este problema afecta a la funci\u00f3n delete del archivo /admin/template/edit. La manipulaci\u00f3n del nombre del argumento provoca un path traversal. El ataque puede iniciarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse."
}
],
"metrics": {
@ -57,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -105,6 +129,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -116,26 +150,59 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:heyewei:jfinalcms:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.0",
"matchCriteriaId": "5A45E47D-B346-4CE7-8C41-AC7A898D84B4"
}
]
}
]
}
],
"references": [
{
"url": "https://gitee.com/heyewei/JFinalcms/issues/IAOSJG",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Issue Tracking"
]
},
{
"url": "https://github.com/yhy7612/Seccode/blob/main/README1.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.277433",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.277433",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.405528",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-8783",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-09-13T19:15:18.120",
"lastModified": "2024-09-14T11:47:14.677",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-19T01:38:57.033",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as problematic has been found in OpenTibiaBR MyAAC up to 0.8.16. Affected is an unknown function of the file system/pages/forum/new_post.php of the component Post Reply Handler. The manipulation of the argument post_topic leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The patch is identified as bf6ae3df0d32fa22552bb44ca4f8489a6e78cc1c. It is recommended to apply a patch to fix this issue."
},
{
"lang": "es",
"value": "Se ha encontrado una vulnerabilidad clasificada como problem\u00e1tica en OpenTibiaBR MyAAC hasta la versi\u00f3n 0.8.16. Se ve afectada una funci\u00f3n desconocida del archivo system/pages/forum/new_post.php del componente Post Reply Handler. La manipulaci\u00f3n del argumento post_topic provoca Cross-site Scripting. Es posible lanzar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. El parche se identifica como bf6ae3df0d32fa22552bb44ca4f8489a6e78cc1c. Se recomienda aplicar un parche para solucionar este problema."
}
],
"metrics": {
@ -57,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -116,30 +140,67 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:opentibiabr:myaac:*:*:*:*:*:*:*:*",
"versionEndIncluding": "0.8.16",
"matchCriteriaId": "CA7FFE60-44B1-45E5-9348-8497B55444B1"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/opentibiabr/myaac/issues/121",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit"
]
},
{
"url": "https://github.com/opentibiabr/myaac/pull/122",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Issue Tracking",
"Patch"
]
},
{
"url": "https://github.com/opentibiabr/myaac/pull/122/commits/bf6ae3df0d32fa22552bb44ca4f8489a6e78cc1c",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Patch"
]
},
{
"url": "https://vuldb.com/?ctiid.277434",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.277434",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?submit.406368",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-8784",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-09-13T19:15:18.430",
"lastModified": "2024-09-14T11:47:14.677",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-19T01:38:35.177",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical was found in QDocs Smart School Management System 7.0.0. Affected by this vulnerability is an unknown functionality of the file /user/chat/mynewuser of the component Chat. The manipulation of the argument users[] with the input 1'+AND+(SELECT+3220+FROM+(SELECT(SLEEP(5)))ZNun)+AND+'WwBM'%3d'WwBM as part of POST Request Parameter leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 7.0.1 is able to address this issue. It is recommended to upgrade the affected component."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una vulnerabilidad clasificada como cr\u00edtica en QDocs Smart School Management System 7.0.0. Esta vulnerabilidad afecta una funcionalidad desconocida del archivo /user/chat/mynewuser del componente Chat. La manipulaci\u00f3n del argumento users[] con la entrada 1'+AND+(SELECT+3220+FROM+(SELECT(SLEEP(5)))ZNun)+AND+'WwBM'%3d'WwBM como parte del par\u00e1metro de solicitud POST conduce a una inyecci\u00f3n SQL. El ataque se puede lanzar de forma remota. El exploit se ha divulgado al p\u00fablico y puede utilizarse. La actualizaci\u00f3n a la versi\u00f3n 7.0.1 puede solucionar este problema. Se recomienda actualizar el componente afectado."
}
],
"metrics": {
@ -57,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -116,30 +140,65 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:qdocs:smart_school:7.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E5B45ABC-97CB-47F8-AA78-6585E192BB29"
}
]
}
]
}
],
"references": [
{
"url": "https://codecanyon.net/item/smart-school-school-management-system/19426018",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://github.com/bytium/vulnerability-research/blob/main/Advisory%20for%20Time-Based%20Blind%20SQL%20Injection%20in%20QDocs%20Smart%20School.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://smart-school.in/article/version-7-0-1",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://vuldb.com/?ctiid.277435",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.277435",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.407385",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-09-18T23:55:17.251441+00:00
2024-09-19T02:00:17.214499+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-09-18T23:15:11.427000+00:00
2024-09-19T01:57:23.830000+00:00
```
### Last Data Feed Release
@ -27,33 +27,46 @@ Repository synchronizes with the NVD every 2 hours.
Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest)
```plain
2024-09-18T00:00:08.656111+00:00
2024-09-19T00:00:08.652629+00:00
```
### Total Number of included CVEs
```plain
263420
263421
```
### CVEs added in the last Commit
Recently added CVEs: `4`
Recently added CVEs: `1`
- [CVE-2021-27917](CVE-2021/CVE-2021-279xx/CVE-2021-27917.json) (`2024-09-18T22:15:03.577`)
- [CVE-2022-25770](CVE-2022/CVE-2022-257xx/CVE-2022-25770.json) (`2024-09-18T22:15:03.827`)
- [CVE-2024-37406](CVE-2024/CVE-2024-374xx/CVE-2024-37406.json) (`2024-09-18T22:15:04.573`)
- [CVE-2024-47059](CVE-2024/CVE-2024-470xx/CVE-2024-47059.json) (`2024-09-18T22:15:04.650`)
- [CVE-2024-7254](CVE-2024/CVE-2024-72xx/CVE-2024-7254.json) (`2024-09-19T01:15:10.963`)
### CVEs modified in the last Commit
Recently modified CVEs: `4`
Recently modified CVEs: `20`
- [CVE-2023-31429](CVE-2023/CVE-2023-314xx/CVE-2023-31429.json) (`2024-09-18T22:15:04.270`)
- [CVE-2023-4162](CVE-2023/CVE-2023-41xx/CVE-2023-4162.json) (`2024-09-18T22:15:04.427`)
- [CVE-2024-29964](CVE-2024/CVE-2024-299xx/CVE-2024-29964.json) (`2024-09-18T23:15:11.307`)
- [CVE-2024-29968](CVE-2024/CVE-2024-299xx/CVE-2024-29968.json) (`2024-09-18T23:15:11.427`)
- [CVE-2019-1069](CVE-2019/CVE-2019-10xx/CVE-2019-1069.json) (`2024-09-19T01:00:03.107`)
- [CVE-2020-0618](CVE-2020/CVE-2020-06xx/CVE-2020-0618.json) (`2024-09-19T01:00:03.107`)
- [CVE-2020-14644](CVE-2020/CVE-2020-146xx/CVE-2020-14644.json) (`2024-09-19T01:00:03.107`)
- [CVE-2022-21445](CVE-2022/CVE-2022-214xx/CVE-2022-21445.json) (`2024-09-19T01:00:03.107`)
- [CVE-2024-27348](CVE-2024/CVE-2024-273xx/CVE-2024-27348.json) (`2024-09-19T01:00:03.120`)
- [CVE-2024-44430](CVE-2024/CVE-2024-444xx/CVE-2024-44430.json) (`2024-09-19T01:38:06.317`)
- [CVE-2024-45103](CVE-2024/CVE-2024-451xx/CVE-2024-45103.json) (`2024-09-19T01:50:12.427`)
- [CVE-2024-45104](CVE-2024/CVE-2024-451xx/CVE-2024-45104.json) (`2024-09-19T01:49:50.870`)
- [CVE-2024-5754](CVE-2024/CVE-2024-57xx/CVE-2024-5754.json) (`2024-09-19T01:44:29.550`)
- [CVE-2024-5931](CVE-2024/CVE-2024-59xx/CVE-2024-5931.json) (`2024-09-19T01:35:17.767`)
- [CVE-2024-6135](CVE-2024/CVE-2024-61xx/CVE-2024-6135.json) (`2024-09-19T01:34:49.397`)
- [CVE-2024-6137](CVE-2024/CVE-2024-61xx/CVE-2024-6137.json) (`2024-09-19T01:33:12.627`)
- [CVE-2024-6258](CVE-2024/CVE-2024-62xx/CVE-2024-6258.json) (`2024-09-19T01:40:32.813`)
- [CVE-2024-6259](CVE-2024/CVE-2024-62xx/CVE-2024-6259.json) (`2024-09-19T01:33:36.477`)
- [CVE-2024-7960](CVE-2024/CVE-2024-79xx/CVE-2024-7960.json) (`2024-09-19T01:52:55.193`)
- [CVE-2024-7961](CVE-2024/CVE-2024-79xx/CVE-2024-7961.json) (`2024-09-19T01:52:24.530`)
- [CVE-2024-8533](CVE-2024/CVE-2024-85xx/CVE-2024-8533.json) (`2024-09-19T01:57:23.830`)
- [CVE-2024-8782](CVE-2024/CVE-2024-87xx/CVE-2024-8782.json) (`2024-09-19T01:46:07.003`)
- [CVE-2024-8783](CVE-2024/CVE-2024-87xx/CVE-2024-8783.json) (`2024-09-19T01:38:57.033`)
- [CVE-2024-8784](CVE-2024/CVE-2024-87xx/CVE-2024-8784.json) (`2024-09-19T01:38:35.177`)
## Download and Usage

View File

@ -128928,7 +128928,7 @@ CVE-2019-10686,0,0,071dffbfdea10181bb98b77b81173ea1ee44c0bf3f27125b70455662edc40
CVE-2019-10687,0,0,4d2aa4f6c0463103aef2503f43b6f1e6753450b125b2eb1b959d173389b0f8e1,2019-08-27T15:51:11.620000
CVE-2019-10688,0,0,139389dbc249e8cae439573037005e32285d24298cd9752f9767fbd85f7cada6,2019-06-17T16:15:11.653000
CVE-2019-10689,0,0,3a6ff66e02d9a27391650c9b85af3797719e726b15e08ea64568eab01a8deea0,2019-06-27T17:26:21.897000
CVE-2019-1069,0,0,1dde59bc61cd7fc8ed90278619866c19547de636b4ba84a81da56ad49bb2980c,2024-09-18T19:35:04.250000
CVE-2019-1069,0,1,f31e90e4331009e9da44368d612d680d5b98b6b04c978425b0ce779643dd7237,2024-09-19T01:00:03.107000
CVE-2019-10691,0,0,e8e0d767bb2f3b5e08db6f24e350ea086b46abac68877bbd2cba7819c236f317,2023-11-07T03:02:32.480000
CVE-2019-10692,0,0,8adff711cac0bb2de2edadfdf1000b35b700fb5b209d412cad8743610b43de23,2023-05-23T20:30:59.777000
CVE-2019-10694,0,0,9582148ff7994145825de46f0455936b126d6116ce2adec095540a2cc82c30a9,2022-01-24T16:46:01.133000
@ -144703,7 +144703,7 @@ CVE-2020-0614,0,0,12f15192ab79a8552f13d178102ec7652022e3da6a86c53711d8e500ba5073
CVE-2020-0615,0,0,d07f14370de3daed11c7c6d594a36427cbacc6c9fd65ca574999d63faf287b8b,2021-07-21T11:39:23.747000
CVE-2020-0616,0,0,c7cf38b97cba6d376bc7e32ae8e8661336896c126df03584e279241be5843554,2020-01-17T18:08:11.317000
CVE-2020-0617,0,0,46c1e5b442d22df7cf33b7558eeb7f9d8480b2a605c42c07f73f14e3892fc8fe,2020-01-22T12:26:01.293000
CVE-2020-0618,0,0,b3eacfcf6fb3caa72727be9b5e5bd653448d68af0f33d0f46bebc86f38c4ba73,2022-01-01T19:59:00.413000
CVE-2020-0618,0,1,87c49d279c8e8987042080c9d613a8783a706599315889057700d28a949c34cf,2024-09-19T01:00:03.107000
CVE-2020-0620,0,0,d79dd8798c9b9e07271060e9756056a5063d70500daa6787e2f51708e481c688,2021-07-21T11:39:23.747000
CVE-2020-0621,0,0,6f3caa242e17154a36c663a4072af30dddcfa0e216ec2e9ee2622b228c2ca3ed,2020-01-17T18:24:28.680000
CVE-2020-0622,0,0,a00bce96c66f0c5eb03364841bced6f75f140321d58bc2160521aca980908849,2021-07-21T11:39:23.747000
@ -149396,7 +149396,7 @@ CVE-2020-14640,0,0,a625b80b7f5e18e7a35950b5794b7d7fb6ccf5d93316771918c7e61df0248
CVE-2020-14641,0,0,5434c3e9d3bca8f35e7c9dbb9f09a8afe53a071667fe4357f0eaf79b61b0e16f,2022-04-28T18:57:38.380000
CVE-2020-14642,0,0,104b19d410be569d6ea4bbc8f636508c676065723fe09fd1fa0fcb2ef25b55e2,2020-07-20T15:33:40.177000
CVE-2020-14643,0,0,48434287fd7f64f17cfffcefaed359929b4acedeed60d0404f3e5fc880b7930d,2023-05-18T17:56:31.617000
CVE-2020-14644,0,0,a53d7e696bf53822ce0c0fc75751cdac6513d6432dad80fc734f7d4fd83dd794,2020-07-20T17:03:11.847000
CVE-2020-14644,0,1,ff6d177a9c9658f3f3366ed8fd090021b7246fc99fd8f621ca505a7407bbee38,2024-09-19T01:00:03.107000
CVE-2020-14645,0,0,34ad1a9dce5ce925439479f3cc5bcf6bdbfc6e71065b34f9283cfcf60dc7d8d2,2020-07-20T17:05:27.117000
CVE-2020-14646,0,0,49f4470147098030b4972a5cad02c0e7da7254ab41256ad2383e7addd7b05ee9,2021-02-17T00:04:16.067000
CVE-2020-14647,0,0,b654715d13e9a54e13c7eee9217a7e48ebc3a983089ac10bc27052589bad4fca,2021-02-17T00:08:07.257000
@ -172859,7 +172859,7 @@ CVE-2021-27913,0,0,167d05a43c4b8a3a9a5f9095ae1170cc5f9466459db5849cf91ef768c53d5
CVE-2021-27914,0,0,675b39026c04fc757a33b18eab7c2aa058775623331c1d7c9d085c842a052b1d,2022-06-08T18:45:22.737000
CVE-2021-27915,0,0,e6739f668561cdef24a58498daa5751df6c86b3626a27c94b75427a7bc117641,2024-09-17T14:15:14.100000
CVE-2021-27916,0,0,11da46d91d7831a39cadc8f3c45f95d106ba722e4c9b9cdef6174a228a6f2a61,2024-09-17T15:15:11.967000
CVE-2021-27917,1,1,23dead4ea77fb9410df1ea9d3711c69d5086413d1ee79c8228aff3d570f0bdd2,2024-09-18T22:15:03.577000
CVE-2021-27917,0,0,23dead4ea77fb9410df1ea9d3711c69d5086413d1ee79c8228aff3d570f0bdd2,2024-09-18T22:15:03.577000
CVE-2021-27918,0,0,0518da32da0b62ea5fcb12a67bfb4a45de87702f6745ca2fb1540144faa372aa,2022-12-13T16:28:13.860000
CVE-2021-27919,0,0,ff72fa8dcdbe5235ea458afc8e87af812a5a4a7f37cb1ded6eeda83ce3037733,2023-11-07T03:32:02.603000
CVE-2021-27921,0,0,b11f4653b3d8f81de77297ff4168966513573360c29446471f5cf2f2df9fb5e0,2023-11-07T03:32:02.670000
@ -190731,7 +190731,7 @@ CVE-2022-21441,0,0,bc2ca46e6b7937a154c140b4a5ab92f0fe51eb40dd60d8e39ccd8ee9b50cd
CVE-2022-21442,0,0,257f19bcc8308bc457fa0199ecf1803ecbe3efe979daa70e98bbbd82ecfc0db4,2022-04-28T13:28:05.600000
CVE-2022-21443,0,0,0a55afeb6e47955f04f9d4642999e8ade129ce15078f095634d2e8d92fadc82e,2024-06-21T19:15:22.373000
CVE-2022-21444,0,0,5186be85aad1c4d733889f4a1f5150301ec25d3c487f0e278a98712336303143,2022-05-10T17:46:03.480000
CVE-2022-21445,0,0,5c4f57905b71953a8da97bf6cab21b2c86c622857965b6feaddd34cce61eaa9f,2022-04-28T13:17:07.963000
CVE-2022-21445,0,1,e7b8f1eae1e5149af95f47894fb86edb515f0e6fc2544db4351ba4e3d5c1fd23,2024-09-19T01:00:03.107000
CVE-2022-21446,0,0,6df2d5472ab8a30f78a13d35e05951c925360ed3964b8391492edcb6d5f83424,2022-04-28T13:42:16.247000
CVE-2022-21447,0,0,f80ea28619779d9bdde592cde6cc89b379fc127f0863353efe45deee94a406c5,2022-05-02T12:43:42.497000
CVE-2022-21448,0,0,93c9b9807154fbdebfb139861e1ac56e4abb764f7d6b8097c300b3d4c3ddacdd,2022-05-02T12:53:57.220000
@ -194667,7 +194667,7 @@ CVE-2022-25767,0,0,9c7e47a7f32ad24819f31562ff54850c26f7314d814cab84c6713ce436000
CVE-2022-25768,0,0,2f471eb3838e4e5cd6d600ba0852b92e4b7ebd1fb0df798e844f5f3255c1a409,2024-09-18T21:15:12.860000
CVE-2022-25769,0,0,49c2fe6bbcc4dd18d3ac4c13713a4ad2cfb810bf9c9a1e9e202814edcb46964d,2024-09-18T15:15:13.060000
CVE-2022-2577,0,0,87c803484cf61dec9e54055b4599e6f4b1ddfe755fed9fabbd2408fb332046f5,2023-11-07T03:46:40.493000
CVE-2022-25770,1,1,61d36750ec580fc71c548d57cb5cb4888c2713fab3b6031919aa08220b34c305,2024-09-18T22:15:03.827000
CVE-2022-25770,0,0,61d36750ec580fc71c548d57cb5cb4888c2713fab3b6031919aa08220b34c305,2024-09-18T22:15:03.827000
CVE-2022-25772,0,0,95d681186a9c51133bf3638b33bba1dd8f63cdc4f434660afa0e726ca2c437ec,2023-05-09T19:15:11.413000
CVE-2022-25774,0,0,d128421aa7601ab16044dac15490c25c6c2e690412ad3801950f706eb5056b33,2024-09-18T15:15:13.253000
CVE-2022-25775,0,0,2d1d71ffaee7c477f923babb3051dba7e000633b4437cb8d189bac24751d255c,2024-09-18T15:15:13.440000
@ -223707,7 +223707,7 @@ CVE-2023-31425,0,0,64f9c63c3a00f3a6cca4f0cabc3b6472a44afec528f99b6a94356138c0186
CVE-2023-31426,0,0,6c84f63e63b5a71b1aff3aae71af632f2a0a4866f1dc27dadcf99d9770d6ac1d,2024-02-15T19:52:32.233000
CVE-2023-31427,0,0,f49380a909cbff0e69906de0042a3889363bdbc75498eb6d7bb394853355cecf,2024-02-16T17:35:51.470000
CVE-2023-31428,0,0,030b00fd492b3d7bc947f71f15bfb2cabea59227204eefd805d33fd42ed3af25,2023-11-16T01:08:17.493000
CVE-2023-31429,0,1,69992987796732b8a61ad8dc5d5daa58a12ba1e7563dab45279df1c528181e45,2024-09-18T22:15:04.270000
CVE-2023-31429,0,0,69992987796732b8a61ad8dc5d5daa58a12ba1e7563dab45279df1c528181e45,2024-09-18T22:15:04.270000
CVE-2023-3143,0,0,cc64da36ff76b40d964338f4258d6378f120a80542ea8341a9ead9fecae03612,2024-05-17T02:27:17.983000
CVE-2023-31430,0,0,520f15377e93f11b2a0bd3a18cd0b8b92918b6fa842affdec2b36ff8d3bfed92,2023-12-21T01:37:48.807000
CVE-2023-31431,0,0,4b9b6a67e63b1b0d98be94a28234026d2066638d6a15a23ed617267106203e51,2023-12-21T01:38:25.140000
@ -231455,7 +231455,7 @@ CVE-2023-41615,0,0,9e3b6cba4b67acfbe6486851fe7daec432b9c66a87b8a1c79ccef36619967
CVE-2023-41616,0,0,300ccd9b827c64a55e011b2c414f930409647d26a239a2b90abfdcd303102afe,2023-11-07T04:21:02.180000
CVE-2023-41618,0,0,50e528a7496a46042bea5c01d7200c038dae679b0e613da41b6fa6a14dc4e586,2023-12-19T16:11:02.990000
CVE-2023-41619,0,0,a5db4bcb5169c8dddfe21b075884f02fc79047372ec23c86c9d209343f460186,2024-01-22T19:54:00.837000
CVE-2023-4162,0,1,3d569b536e8053a8f8063fd8f667e4c575ee9a076a95ffb5f9442e0a0894d2f1,2024-09-18T22:15:04.427000
CVE-2023-4162,0,0,3d569b536e8053a8f8063fd8f667e4c575ee9a076a95ffb5f9442e0a0894d2f1,2024-09-18T22:15:04.427000
CVE-2023-41621,0,0,92f8843cfebdd173c8f8dd30de0c81676bdb72b7ae25d2f16164b862edeb0cdb,2023-12-18T19:16:30.327000
CVE-2023-41623,0,0,ea29559c422c117084ae2d2f796e71ed9fbe2542670d9b3f29d0a9e1f3143045,2023-12-14T18:01:27.260000
CVE-2023-41626,0,0,6537ad03f828deb9a3c3780bd05e1a7d5f2105684aa5d481a5b71610a2976b2e,2023-09-19T15:11:54.677000
@ -248270,7 +248270,7 @@ CVE-2024-27344,0,0,f44089be578e3c3f48649a645c31f1e56b7af812f6729ae649c4c888c51a0
CVE-2024-27345,0,0,639d5d88d955f31b68d7ac65a92996a1944759655dec4dc8cdc403f6280e1a1d,2024-04-03T17:24:18.150000
CVE-2024-27346,0,0,8179d23e6ef0789d37a1db2f177021069373bc1f8d521305cdf369e9fa46745f,2024-04-03T17:24:18.150000
CVE-2024-27347,0,0,aa6bb96be7bc41dc2b8b854a600f1bcc7744ab20513fb28f41f361c130b3e452,2024-07-03T01:50:32.683000
CVE-2024-27348,0,0,19a1fc3823345ead5de9b178f23db90fd5b4d62aadcbb9121cf141379ff75cef,2024-08-01T13:48:22.967000
CVE-2024-27348,0,1,add8565b363ebc7d89e1b1994d7f3550469242b7a7f9dbd84c0a9f2f5bcf2bcf,2024-09-19T01:00:03.120000
CVE-2024-27349,0,0,88b94935f18791608992594036627e2f38bf8f66250b8863a7cf3ad8bea894c1,2024-07-03T01:50:32.910000
CVE-2024-2735,0,0,f01bcec823b48d788d322e20cf82a4a7470344ba299463eb0cff5623d9be778d,2024-04-10T13:23:38.787000
CVE-2024-27350,0,0,0fb1d64ef379194a46b064cdf7260ff9ff0ea87fdbd1fcde9fffd1770088e5e3,2024-02-26T16:32:25.577000
@ -249979,11 +249979,11 @@ CVE-2024-29960,0,0,9bc7f426e339c55e2afa40b94b21b5a771b208d17f07743343b3938b63254
CVE-2024-29961,0,0,919f06693aca6f7c36e74c8e8d833c6b0263af57ed9e9600c88f31d859f7a78e,2024-04-19T13:10:25.637000
CVE-2024-29962,0,0,21b9296949eea48deb9c3f226a9f99fb04f6ad73d15be5a4d76fa0beddbc7e3a,2024-04-19T13:10:25.637000
CVE-2024-29963,0,0,e99f1130c9e2ff08d19f53de2500f547c640a4dc907c0be54c37174533733c3d,2024-04-26T23:15:05.857000
CVE-2024-29964,0,1,29793f783c01fb645575040c9f32640f2a1f00a405d6cc119b471e1fd29a29d4,2024-09-18T23:15:11.307000
CVE-2024-29964,0,0,29793f783c01fb645575040c9f32640f2a1f00a405d6cc119b471e1fd29a29d4,2024-09-18T23:15:11.307000
CVE-2024-29965,0,0,e604964709cb3eab78216b1ed2aee27c8bef1b7135dbf6eeb944997838c87300,2024-04-19T13:10:25.637000
CVE-2024-29966,0,0,7a30ee14d90b389a4537d9811ac6da3ab8208e19990e232ac89a4d651f88e509,2024-04-19T13:10:25.637000
CVE-2024-29967,0,0,28d6b7ba5011140853e9c2aca0c230574aab34fbc08f1461c1290739fd4f7389,2024-04-19T13:10:25.637000
CVE-2024-29968,0,1,54c6b469c9cd3054c5ba4fa7e94cdadf07ebad94bbeedd2aa1fd125223ff90d0,2024-09-18T23:15:11.427000
CVE-2024-29968,0,0,54c6b469c9cd3054c5ba4fa7e94cdadf07ebad94bbeedd2aa1fd125223ff90d0,2024-09-18T23:15:11.427000
CVE-2024-29969,0,0,0ea97ad17652e47e59a950d8cd8575fc9bb9f6ceb08f04cc1565a0fa4707f39c,2024-04-19T13:10:25.637000
CVE-2024-2997,0,0,56626b24345bd53a845de0d68552fa8f9c4e4028ad6b01cdd94e1dd54fd4a724,2024-05-17T02:38:41.790000
CVE-2024-29972,0,0,2ca8d5ea63f2785abd1e1e0c373870e46d2175579d2da6911e3b85d61a25caf5,2024-08-02T02:15:17.423000
@ -255329,7 +255329,7 @@ CVE-2024-37399,0,0,308e730bcc199d112d6cfe8bdbdbf7120fa96451bfff020b7962dbf1afddf
CVE-2024-3740,0,0,cf4cd6bcfe639a4f771a19ddc36f820864da86f0d9d9f91c68694d8633fab251,2024-05-17T02:40:06.170000
CVE-2024-37403,0,0,82a2fe28b07e6e9fe5e86dff02fa8c242d19ac626eea029ca875aeaf76338b4d,2024-08-12T18:55:15.890000
CVE-2024-37405,0,0,a7f42023569aa18cbb4863def372451bd6a310533c03fc36f82684a5a0e2908a,2024-08-01T13:53:37.273000
CVE-2024-37406,1,1,3408edc763c0644c3b4724abfd1ea59be7b1cc84b88fdea86ebb1edb513d059b,2024-09-18T22:15:04.573000
CVE-2024-37406,0,0,3408edc763c0644c3b4724abfd1ea59be7b1cc84b88fdea86ebb1edb513d059b,2024-09-18T22:15:04.573000
CVE-2024-37407,0,0,b2071e78ac73cfcd8ee3f67daccfb5fa834666925d4b4867e66acc10a01216e8,2024-07-17T20:16:52.400000
CVE-2024-37408,0,0,31eb8b44dab60578fd668270e5d026543c06afc296d259b359783119f5ef7a55,2024-09-06T19:35:25.460000
CVE-2024-37409,0,0,82c50e49bf5ddfbe2b556ca4db6eaf6873d58da7b8ce0001c708890dc09405da,2024-07-24T02:51:28.287000
@ -259445,7 +259445,7 @@ CVE-2024-44410,0,0,6c57a9bf372d97a29932dc411b42421130ab7221dd0f704bdc840e2d9eac4
CVE-2024-44411,0,0,598fa2c90c1fcb2e76dc9bbaf4d1053ce6ab00db76daa7f3174af16794b4965c,2024-09-10T14:35:06.690000
CVE-2024-4442,0,0,9c1eda6fa3435f8c4d08218c5481ff931fe1467531bf106c3f2c1021638ef5a8,2024-05-21T12:37:59.687000
CVE-2024-4443,0,0,844cc6ae76fc91b0a9b2c7cc836e7c7382ecc4895f252d76709d68a22aac17cb,2024-05-22T12:46:53.887000
CVE-2024-44430,0,0,8dbed207b30dda337ab5a47dac910dd3a5a0d86355eb69a9a4785128c125676c,2024-09-16T15:35:20.943000
CVE-2024-44430,0,1,f640e237da24007d6a0c1a8b89d52bdbc13fc34691f8dcc93f05041c29090cb1,2024-09-19T01:38:06.317000
CVE-2024-4444,0,0,b8ab3a280e1fea7a38298a9a71737680ed9a07734ba58de04ed034a8b48f0be8,2024-05-14T16:11:39.510000
CVE-2024-44445,0,0,08a4fdca954368472940c8c2524ceb7cd04674f0407b4762b892d4168753ab1b,2024-09-16T20:15:47.020000
CVE-2024-4445,0,0,bc137eb49d08335d8d2b32a3f413016c50b301d09f6a742095c80df385aba82a,2024-05-14T19:17:55.627000
@ -259726,8 +259726,8 @@ CVE-2024-45097,0,0,66f33176e0c07f5466116654bcd7c2847267016c1af22914a830c235e4290
CVE-2024-45098,0,0,d99373b3861e761d69e1423a19b397cd3881f87fabdf54ab0162bbecfa72f038,2024-09-06T13:01:44.023000
CVE-2024-4510,0,0,e609022dce213b03ba687f592023f15f3e261f085d88e9ff14f3b7ffe9969d1b,2024-05-17T02:40:26.417000
CVE-2024-45101,0,0,33f1759773ed958698aa92feba49f5c13b8dc323fc39290af0e659cff8a65aa4,2024-09-14T11:47:14.677000
CVE-2024-45103,0,0,01557b83036fab88957ae3997f6f44b8b18df48e60be4bbc26336c9f7e3c5cec,2024-09-14T11:47:14.677000
CVE-2024-45104,0,0,c11d512848cc1e00424cf0e01cec51b6df5974ccbf2d3c5ae43f33bc75522376,2024-09-14T11:47:14.677000
CVE-2024-45103,0,1,01e8c7d7777680c3c907a9b9346c8d516e1c4df3a86a3dfed3c0a030a8c65f44,2024-09-19T01:50:12.427000
CVE-2024-45104,0,1,30db7dcba4a138780d42a329ad568630f0b423c3266582b9f2b058712e15f7a1,2024-09-19T01:49:50.870000
CVE-2024-45105,0,0,dc3af87f0737a3f3d1de2a0dee937e0919dd2759a9bae35a42ba5de5fbd9ce9b,2024-09-14T11:47:14.677000
CVE-2024-45107,0,0,d5e30880270706ae80f98d427d6a3501f7b9d607b88b780b72f90a000a13f3a6,2024-09-06T16:26:03.440000
CVE-2024-45108,0,0,03b1037fb5ccdb261a2f64bd06297f4c212c932af1d9e1d68068742a2f76d080,2024-09-13T17:00:03.120000
@ -260340,7 +260340,7 @@ CVE-2024-47049,0,0,0632fb9d999b7a0f0772c4bcd61e6520e2d1b47f1300e76d8780773c41e65
CVE-2024-4705,0,0,26b272539ad739bf4cdb858b2e8b5e748c64203d796935ad814b34867a2408a1,2024-07-23T21:15:15.147000
CVE-2024-47050,0,0,9fb75eec65018e4d647a95f2333bff20c9711ca8d7d9db03b47fb8b221e40194,2024-09-18T21:15:13.743000
CVE-2024-47058,0,0,531cdfc92f76cf21d508b7b6b64addb62803353166eabe55a6bed18bc21358e2,2024-09-18T21:15:13.923000
CVE-2024-47059,1,1,963e19b9c43cf5c2fc64d99e9fc14f93e8e1c53bf419efc5d22841199e5248e4,2024-09-18T22:15:04.650000
CVE-2024-47059,0,0,963e19b9c43cf5c2fc64d99e9fc14f93e8e1c53bf419efc5d22841199e5248e4,2024-09-18T22:15:04.650000
CVE-2024-4706,0,0,9fb317504579dba9e9851d8ef4d6ad37a71c1b39f231cbe007ab86fbaba76dfc,2024-05-24T01:15:30.977000
CVE-2024-4707,0,0,8435cc27f87132831b9d3f5ec9dd9fe3cf2e85b8b55db14f2e03c7e1023e49fc,2024-07-24T17:59:29.230000
CVE-2024-4708,0,0,c271dbf72bf72946f8191932c0e7ad58bd2ebed6dfb7e2f3f6882e8c7f0da7d3,2024-08-29T19:31:56.517000
@ -261262,7 +261262,7 @@ CVE-2024-5746,0,0,08e42433314420a93bea44176cf4cc0a169742251a575020722ab2e02c28ff
CVE-2024-5750,0,0,476ad6c00a3180d456740d0beb63c2959ea56c746a3fc254c90c1eef52867b01,2024-06-18T14:15:11.383000
CVE-2024-5751,0,0,b021056a2386bbaab3004cd237916090181697c8a0e20dfa0ef7d94a29a0eb73,2024-06-27T19:25:12.067000
CVE-2024-5753,0,0,43c94f3dac782081ffe06f7a7f44ffc012545fd59744b1529ccc7aa1117863e3,2024-07-08T15:49:22.437000
CVE-2024-5754,0,0,46dc8ece328955cc738d452a2649a392e2aacda65407fffee0d07c69d7c2c4ce,2024-09-14T11:47:14.677000
CVE-2024-5754,0,1,c3a5277096f523d353cf673d18bde4e0509750046bdf6f4ab7286ba49c5a6e28,2024-09-19T01:44:29.550000
CVE-2024-5755,0,0,18288403f67281063c09c8ff29d182967f82bf6bbbadea2fe8a94bcd12e5aa16,2024-06-27T19:25:12.067000
CVE-2024-5756,0,0,8f9e9c6b47319f2e6056e0eeab0b95c7967e08ebf1f00846244d8a548a26a9af,2024-07-17T13:52:08.350000
CVE-2024-5757,0,0,5cb8c18a619114307d2634441346064118b79a7aeac4723897e195eaa5132dad,2024-07-02T14:42:05.977000
@ -261413,7 +261413,7 @@ CVE-2024-5927,0,0,1b7b6c83db008ddacf60314208106fd6b62f6e315f688ea9bb13e1efdd6d20
CVE-2024-5928,0,0,065180dc816d6768a80630eb0526fd0ad0770440e65f1ad606ffbf7997d4dae8,2024-08-23T16:47:34.100000
CVE-2024-5929,0,0,547b1d1269945a5f94b9f310fc42040f5b5a64e33b67ca655dd7f52feb9f00d4,2024-08-23T16:48:00.907000
CVE-2024-5930,0,0,801f56bcd1ea0f18ede683739787e6e80ff5c6bc8c67275c0d1547a50c51d174,2024-08-23T16:48:15.103000
CVE-2024-5931,0,0,a799bdd78540ac0d98e89714e84f612e34f9b4ac2a93eee8b19092a88bf330f2,2024-09-14T11:47:14.677000
CVE-2024-5931,0,1,027898fb38960b620f06b019ecce5d300805aa9e919de32efee98ada8f561517,2024-09-19T01:35:17.767000
CVE-2024-5932,0,0,85a9c88bf32b2f92d73d91de74c86aef7b613cc68ab0a8f993cdf293d77a4a89,2024-08-26T18:34:13.787000
CVE-2024-5933,0,0,4b5b8ee984dca52e93a5c74fef0bbbf1e4141af006167bcc3f0d3b5bd5eb1afc,2024-08-19T21:07:56.627000
CVE-2024-5934,0,0,16721403d72b0462a70f000841eb683fbbdcd68e0952cf56add7902c00813b6e,2024-06-14T16:15:14.647000
@ -261590,9 +261590,9 @@ CVE-2024-6130,0,0,f4b647f0047f578fe057faac21db7670b7977afa1d31bb2fa4fd50dc12004c
CVE-2024-6132,0,0,83486b9bda06b2bfd8b6c6e0e87eac1b4d59232f4be914a093590a57da1cf4d5,2024-06-20T12:44:01.637000
CVE-2024-6133,0,0,0fc28a92d2235a170f666cf1f2e7f51d9c2f637a1193a1e8d73b336fc781cd45,2024-08-13T01:18:26.570000
CVE-2024-6134,0,0,c8a0602d6db0f3051b72e96c7e16fe4780a3ce250e242879d4a8baa99538dda9,2024-08-16T17:35:11.413000
CVE-2024-6135,0,0,240ab522b11fde6d01b946d559b93d8ec3d4187954e5978f47a6dd0d9231faa1,2024-09-14T11:47:14.677000
CVE-2024-6135,0,1,54c4e5f1511674e189e7116df40b261780814180ffb04bc57c48ae5f61eb907a,2024-09-19T01:34:49.397000
CVE-2024-6136,0,0,2425dc33d9a66499cd0e61ed788949ec618401c3fdf6a1fd388e70bf34e3cc7e,2024-08-13T01:18:26.820000
CVE-2024-6137,0,0,6bec5224be4662497543d09ef171a9a4da08e70b69d3bc13c287802f2b21dd7a,2024-09-14T11:47:14.677000
CVE-2024-6137,0,1,e58f6c0787a0fe87e16b6d9ce7e652fbe72d3a55d70774470af6282c4fe57c6d,2024-09-19T01:33:12.627000
CVE-2024-6138,0,0,fc35836bd5348e7eb9a778e4240c73e0ce52b6c3e53dfd414d6ee066e94e6acd,2024-07-12T16:54:53.997000
CVE-2024-6139,0,0,5132030314b9a0ca48cecf9e1dd593f9b9cec1db256d0c213c6569e108426fbe,2024-06-27T19:25:12.067000
CVE-2024-6141,0,0,1d5a717ee6e758ce9e5016396a1ddc2e4691c96cb20e6973eb41cca889dc4be3,2024-08-23T16:53:48.270000
@ -261694,8 +261694,8 @@ CVE-2024-6254,0,0,fde0fafe626682898f8bbfd16af33ff0c947c80d91ffee5375f17b755d365a
CVE-2024-6255,0,0,4b23bc0ba79484acd9ec84f5e33767095b874b70e803764459f9fd056777671c,2024-08-30T16:15:10.467000
CVE-2024-6256,0,0,cd0156365b21d4bea53ae3ad70dcec4b1c8c7fe2a610d4e79db68145fb523cc9,2024-07-12T16:53:35.083000
CVE-2024-6257,0,0,9068db2cec3557427b4184684513a4bf48773ad544b747d98a6b6caebef9018b,2024-06-25T18:50:42.040000
CVE-2024-6258,0,0,34d0b5bc07a6a1d363da01ec81cc8eb5cfbd0d068eb9c2cfb97cfdc37e00a310,2024-09-14T11:47:14.677000
CVE-2024-6259,0,0,b37aaf7e06c2bef67bd0ed6901e8cfac01a5a8193a5a6bfcfe5cd01550c3e36d,2024-09-14T11:47:14.677000
CVE-2024-6258,0,1,7e0f99b02d4cfbeccb885ab02d5708f68f53af739c7a7be9bb8028bf64395f1a,2024-09-19T01:40:32.813000
CVE-2024-6259,0,1,1266ded69d419992fec3853ca29c1bc3ce2e1f25643bb03399d365690b3c2d68,2024-09-19T01:33:36.477000
CVE-2024-6262,0,0,295b38dc67b71cbe5bd8be303a870636c7b9e2de2092da87a091242e8bc3623e,2024-06-27T12:47:19.847000
CVE-2024-6263,0,0,ea6dc54bae9a6133bb18ce010b56ac510f28080d60dc0881662f41b01cd3c1ce,2024-07-03T18:24:27.877000
CVE-2024-6264,0,0,ad70cfe4611bfb10e28e7f1e9ab3f1d3972f21098785857aa1fab5f0efe27af2,2024-07-02T17:57:31.737000
@ -262445,6 +262445,7 @@ CVE-2024-7249,0,0,73974231501387b12eacc736781f51c9d8ec8d78fa61d8eb72875d86090b0d
CVE-2024-7250,0,0,2714d196410008034281d23fd2726bb5d251b721e04c2e3643d0ed11cf2d609a,2024-08-20T14:58:56.213000
CVE-2024-7251,0,0,e880a7a9378bf8b927f40852329063562fbba4ad5a97a9957dc1093c25591f2f,2024-08-20T15:00:02.603000
CVE-2024-7252,0,0,490536b1b267bc05e09f33c429c150806f5477f059597f5cad78d37cad62a66a,2024-08-20T15:00:39.470000
CVE-2024-7254,1,1,3688d973c29636dacce7d4506510a3924f445d0d86eedd2628144c1ce48621d0,2024-09-19T01:15:10.963000
CVE-2024-7255,0,0,a4eb887a2aa91b61ced64af6faa636cef124d2fd1032af5abcd1e986918698ff,2024-08-16T15:23:19.167000
CVE-2024-7256,0,0,28c6c5405ca0661376f4706f7e75647b14826bc648847c0c2ef29d4ee5bafea0,2024-08-03T18:35:04.003000
CVE-2024-7257,0,0,e6ef266df52e25692b132cfb6522d79defb5eb3e548daae54be1d69b0c3ab16e,2024-08-05T12:41:45.957000
@ -262971,8 +262972,8 @@ CVE-2024-7950,0,0,b51a61cdc7833f69fe0a174cb3081029b1669ec8306ef6c1fd438a91efe05d
CVE-2024-7954,0,0,3e94915bcd6201b8731c3a5ae345a341f2edda6301e38b26d28e234b0fc15d65,2024-08-23T18:46:31.730000
CVE-2024-7955,0,0,b6d58093d52dbc1693883781c79b3abb54211ad50ad9e0127c4cb8b72bd51a3e,2024-09-10T15:35:13.013000
CVE-2024-7958,0,0,483ea949f242fd0880547068782264d397026329e525a14dcbacca7c22e7bcec,2024-08-19T20:15:08.907000
CVE-2024-7960,0,0,4ff8b39e880c0fcc19ccca0947eeaebb56a7d25eadde87fddd4024fce53f3533,2024-09-12T21:34:55.633000
CVE-2024-7961,0,0,f427d66b184f35e9db20d356d86378f2f0a7bbbe819ff773822ca0cb26bc47d0,2024-09-12T21:34:55.633000
CVE-2024-7960,0,1,6a2bab47d6fb588f4b238853d16e03fdaf4248afb98afbb54a62ccac2359c7cf,2024-09-19T01:52:55.193000
CVE-2024-7961,0,1,54fcb6c11cb4fffe551975ea2c4e2b806861e5ed35f30fcbecfeddbc47fcfbb8,2024-09-19T01:52:24.530000
CVE-2024-7964,0,0,c58a832be87177a31dd0ab059ea0a6d25f3e2935f7b0bca0ed2607ff4388d425,2024-08-27T13:35:00.823000
CVE-2024-7965,0,0,97b62e193bdcda79c7557e9a31668077fb71dcc6db54dee06fbdef6c26c1aa29,2024-09-18T12:40:05.597000
CVE-2024-7966,0,0,f366846d49db9477cb2ea061c491dcdaebf29f4e555fa7612b32a771fd61b7a0,2024-08-27T13:35:02.630000
@ -263275,7 +263276,7 @@ CVE-2024-8521,0,0,65485edaf907369f60ded6330bfa86fc3cb4b0554a8f781a990c000b1998cc
CVE-2024-8522,0,0,2ab431c4f2cf5ab967664e41dd1dc524f59071081def8323632354294bee4f38,2024-09-13T16:12:30.497000
CVE-2024-8523,0,0,97cab60ebb5ec07bfc3fbe69bde3146d8e6846c5d869fc10534b5a2c3c29806e,2024-09-09T13:03:38.303000
CVE-2024-8529,0,0,12671b61ed295efe6d3d38d0b158765da76f16b719201c5bbfb86ca5ed8c38b9,2024-09-13T16:11:25.400000
CVE-2024-8533,0,0,c26ba0ebd43e89f6128db7b1a1b272e7a2d3b48f664882637f9f941ae54673ee,2024-09-12T21:34:55.633000
CVE-2024-8533,0,1,ceba1d609043d018dd2a5c62af783c64aebd2125e63ee811ba18e8a1d6a8510b,2024-09-19T01:57:23.830000
CVE-2024-8538,0,0,cdc95bc68a4038527ba5cf51b0a8358b05e3a1650fc8124f586021fbca5ad9b3,2024-09-09T13:03:38.303000
CVE-2024-8543,0,0,e190cfdf6def9f928d16ce7c20119d5fac7745c9206ec7d9500145321b367e4b,2024-09-10T12:09:50.377000
CVE-2024-8554,0,0,46c32adbe15332664cfc930fe8c32bff96db8190902ab789492b593fa03348f1,2024-09-10T13:52:23.250000
@ -263378,9 +263379,9 @@ CVE-2024-8777,0,0,34a835ea08030c4a5a9203e5f6cc8fd8352bd723c399e4db5ce1a16dac92eb
CVE-2024-8778,0,0,0d58fd097d2cc28bd3d4b4c7283e1fcc9fa1000d69632e9ebf04ab6745434089,2024-09-16T15:30:28.733000
CVE-2024-8779,0,0,265c21235e2afe2292182db580bb12dd49935199c0a514bb7965dfbc0ef67e6b,2024-09-17T11:27:50.290000
CVE-2024-8780,0,0,bd4bd08e2eb72cc17a88ed55f562faebe92fedded2e0fdee3ed50b9263d53a31,2024-09-16T15:30:28.733000
CVE-2024-8782,0,0,07c3a16b8681c9ebf93d105d5b076fbef190c05e8d1e936ffaeb395d86382ca2,2024-09-14T11:47:14.677000
CVE-2024-8783,0,0,289128ea1a51112e2b32da270994bcc7b30231f341b1d787ba1fce34d4218f29,2024-09-14T11:47:14.677000
CVE-2024-8784,0,0,598c58979dfe2b73f976c6898315c02c460b4985a94e2fab78e11f95eb647e6e,2024-09-14T11:47:14.677000
CVE-2024-8782,0,1,ec0da4baac22ae9eceb8ce2507375e0a71b6a51926de3cc40576bcd259fd7175,2024-09-19T01:46:07.003000
CVE-2024-8783,0,1,b434dfc5f50cf2811a1f5688ac574f745dec48e5af54cf5f568ce8560b0e2702,2024-09-19T01:38:57.033000
CVE-2024-8784,0,1,7bc5ed86fd42122481efd27561493828acec6a50cb9d34c0b1c40453c943431f,2024-09-19T01:38:35.177000
CVE-2024-8796,0,0,94e01fa2394b7e3cc5729adcbe04212056eb704ee3dccdfd860de0e7129048a2,2024-09-17T18:15:05.443000
CVE-2024-8797,0,0,b7273f8d72c4c7b82a815cc8357933cfcef5a0b838634eab59479c200615300b,2024-09-14T11:47:14.677000
CVE-2024-8862,0,0,3c0cefe3796a3067716726cae64fd2b6a2a71c4947999e21da2abde8a533c886,2024-09-16T15:30:28.733000

Can't render this file because it is too large.