mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-06 18:52:58 +00:00
Auto-Update: 2024-09-19T02:00:17.214499+00:00
This commit is contained in:
parent
8a890e44ec
commit
d2b51badbd
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2019-1069",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2019-06-12T14:29:04.337",
|
||||
"lastModified": "2024-09-18T19:35:04.250",
|
||||
"lastModified": "2024-09-19T01:00:03.107",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"cisaExploitAdd": "2022-03-15",
|
||||
"cisaActionDue": "2022-04-05",
|
||||
"cisaRequiredAction": "Apply updates per vendor instructions.",
|
||||
"cisaVulnerabilityName": "Microsoft Task Scheduler Privilege Escalation Vulnerability",
|
||||
"cisaExploitAdd": "2024-09-18",
|
||||
"cisaActionDue": "2024-10-09",
|
||||
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
|
||||
"cisaVulnerabilityName": "Microsoft Windows Task Scheduler Privilege Escalation Vulnerability",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,9 +2,13 @@
|
||||
"id": "CVE-2020-0618",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2020-02-11T22:15:13.400",
|
||||
"lastModified": "2022-01-01T19:59:00.413",
|
||||
"lastModified": "2024-09-19T01:00:03.107",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"cisaExploitAdd": "2024-09-18",
|
||||
"cisaActionDue": "2024-10-09",
|
||||
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
|
||||
"cisaVulnerabilityName": "Microsoft SQL Server Reporting Services Remote Code Execution Vulnerability",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,9 +2,13 @@
|
||||
"id": "CVE-2020-14644",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2020-07-15T18:15:29.457",
|
||||
"lastModified": "2020-07-20T17:03:11.847",
|
||||
"lastModified": "2024-09-19T01:00:03.107",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"cisaExploitAdd": "2024-09-18",
|
||||
"cisaActionDue": "2024-10-09",
|
||||
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
|
||||
"cisaVulnerabilityName": "Oracle WebLogic Server Remote Code Execution Vulnerability",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,9 +2,13 @@
|
||||
"id": "CVE-2022-21445",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2022-04-19T21:15:15.907",
|
||||
"lastModified": "2022-04-28T13:17:07.963",
|
||||
"lastModified": "2024-09-19T01:00:03.107",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"cisaExploitAdd": "2024-09-18",
|
||||
"cisaActionDue": "2024-10-09",
|
||||
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
|
||||
"cisaVulnerabilityName": "Oracle JDeveloper Remote Code Execution Vulnerability",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,9 +2,13 @@
|
||||
"id": "CVE-2024-27348",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-04-22T14:15:07.420",
|
||||
"lastModified": "2024-08-01T13:48:22.967",
|
||||
"lastModified": "2024-09-19T01:00:03.120",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"cisaExploitAdd": "2024-09-18",
|
||||
"cisaActionDue": "2024-10-09",
|
||||
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
|
||||
"cisaVulnerabilityName": "Apache HugeGraph-Server Improper Access Control Vulnerability",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-44430",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-13T20:15:02.940",
|
||||
"lastModified": "2024-09-16T15:35:20.943",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-19T01:38:06.317",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -51,14 +81,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mayurik:best_free_law_office_management:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7A1CF51F-03EF-4644-BA3E-6454E06BB2B6"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://blog.csdn.net/samwbs/article/details/140954482",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/samwbs/kortexcve/blob/main/xss_register_case/XSS_register_case.md",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Not Applicable"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-45103",
|
||||
"sourceIdentifier": "psirt@lenovo.com",
|
||||
"published": "2024-09-13T18:15:04.760",
|
||||
"lastModified": "2024-09-14T11:47:14.677",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-19T01:50:12.427",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A valid, authenticated LXCA user may be able to unmanage an LXCA managed device in through the LXCA web interface without sufficient privileges."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Es posible que un usuario LXCA v\u00e1lido y autenticado pueda cancelar la administraci\u00f3n de un dispositivo administrado por LXCA a trav\u00e9s de la interfaz web de LXCA sin privilegios suficientes."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -36,6 +40,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "psirt@lenovo.com",
|
||||
"type": "Secondary",
|
||||
@ -47,10 +61,53 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:lenovo:xclarity_administrator:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "4.1.0",
|
||||
"matchCriteriaId": "C235DE63-F7C5-4EF9-9C06-6CA32EDA3253"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:a:emc:vmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "908C035C-215D-4979-9EA1-949C4B3EE61C"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:redhat:kernel-based_virtual_machine:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F43EB670-614A-4C09-A6D6-78D86279A481"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.lenovo.com/us/en/product_security/LEN-154748",
|
||||
"source": "psirt@lenovo.com"
|
||||
"source": "psirt@lenovo.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,20 +2,44 @@
|
||||
"id": "CVE-2024-45104",
|
||||
"sourceIdentifier": "psirt@lenovo.com",
|
||||
"published": "2024-09-13T18:15:05.087",
|
||||
"lastModified": "2024-09-14T11:47:14.677",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-19T01:49:50.870",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A valid, authenticated LXCA user without sufficient privileges may be able to use the device identifier to modify an LXCA managed device through a specially crafted web API call."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Un usuario LXCA v\u00e1lido y autenticado sin privilegios suficientes puede usar el identificador del dispositivo para modificar un dispositivo administrado por LXCA a trav\u00e9s de una llamada API web especialmente manipulada."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@lenovo.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "psirt@lenovo.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
@ -36,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "psirt@lenovo.com",
|
||||
"type": "Secondary",
|
||||
@ -47,10 +81,53 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:lenovo:xclarity_administrator:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "4.1.0",
|
||||
"matchCriteriaId": "C235DE63-F7C5-4EF9-9C06-6CA32EDA3253"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:a:emc:vmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "908C035C-215D-4979-9EA1-949C4B3EE61C"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:redhat:kernel-based_virtual_machine:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F43EB670-614A-4C09-A6D6-78D86279A481"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.lenovo.com/us/en/product_security/LEN-154748",
|
||||
"source": "psirt@lenovo.com"
|
||||
"source": "psirt@lenovo.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,17 +2,41 @@
|
||||
"id": "CVE-2024-5754",
|
||||
"sourceIdentifier": "vulnerabilities@zephyrproject.org",
|
||||
"published": "2024-09-13T19:15:17.597",
|
||||
"lastModified": "2024-09-14T11:47:14.677",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-19T01:44:29.550",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "BT: Encryption procedure host vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "BT: Vulnerabilidad del host del procedimiento de cifrado"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "vulnerabilities@zephyrproject.org",
|
||||
"type": "Secondary",
|
||||
@ -36,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "vulnerabilities@zephyrproject.org",
|
||||
"type": "Secondary",
|
||||
@ -47,10 +81,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:zephyrproject:zephyr:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "3.6.0",
|
||||
"matchCriteriaId": "0C71E782-50A1-4727-B9FC-B20D7BF73A89"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-gvv5-66hw-5qrc",
|
||||
"source": "vulnerabilities@zephyrproject.org"
|
||||
"source": "vulnerabilities@zephyrproject.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,17 +2,41 @@
|
||||
"id": "CVE-2024-5931",
|
||||
"sourceIdentifier": "vulnerabilities@zephyrproject.org",
|
||||
"published": "2024-09-13T20:15:03.037",
|
||||
"lastModified": "2024-09-14T11:47:14.677",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-19T01:35:17.767",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "BT: Unchecked user input in bap_broadcast_assistant"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "BT: Entrada de usuario no verificada en bap_broadcast_assistant"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "vulnerabilities@zephyrproject.org",
|
||||
"type": "Secondary",
|
||||
@ -36,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "vulnerabilities@zephyrproject.org",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +85,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:zephyrproject:zephyr:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "3.6.0",
|
||||
"matchCriteriaId": "8BA5725B-1797-45C0-846C-FE2EC98D6440"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-r8h3-64gp-wv7f",
|
||||
"source": "vulnerabilities@zephyrproject.org"
|
||||
"source": "vulnerabilities@zephyrproject.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,17 +2,41 @@
|
||||
"id": "CVE-2024-6135",
|
||||
"sourceIdentifier": "vulnerabilities@zephyrproject.org",
|
||||
"published": "2024-09-13T20:15:03.220",
|
||||
"lastModified": "2024-09-14T11:47:14.677",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-19T01:34:49.397",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "BT:Classic: Multiple missing buf length checks"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "BT:Classic: Faltan varias comprobaciones de longitud de beneficio"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "vulnerabilities@zephyrproject.org",
|
||||
"type": "Secondary",
|
||||
@ -36,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-369"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "vulnerabilities@zephyrproject.org",
|
||||
"type": "Secondary",
|
||||
@ -47,10 +81,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:zephyrproject:zephyr:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "3.6.0",
|
||||
"matchCriteriaId": "8BA5725B-1797-45C0-846C-FE2EC98D6440"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-xcr5-5g98-mchp",
|
||||
"source": "vulnerabilities@zephyrproject.org"
|
||||
"source": "vulnerabilities@zephyrproject.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,17 +2,41 @@
|
||||
"id": "CVE-2024-6137",
|
||||
"sourceIdentifier": "vulnerabilities@zephyrproject.org",
|
||||
"published": "2024-09-13T20:15:03.403",
|
||||
"lastModified": "2024-09-14T11:47:14.677",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-19T01:33:12.627",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "BT: Classic: SDP OOB access in get_att_search_list"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "BT: Cl\u00e1sico: acceso SDP OOB en get_att_search_list"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "vulnerabilities@zephyrproject.org",
|
||||
"type": "Secondary",
|
||||
@ -36,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "vulnerabilities@zephyrproject.org",
|
||||
"type": "Secondary",
|
||||
@ -55,10 +89,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:zephyrproject:zephyr:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "3.6.0",
|
||||
"matchCriteriaId": "8BA5725B-1797-45C0-846C-FE2EC98D6440"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-pm38-7g85-cf4f",
|
||||
"source": "vulnerabilities@zephyrproject.org"
|
||||
"source": "vulnerabilities@zephyrproject.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,17 +2,41 @@
|
||||
"id": "CVE-2024-6258",
|
||||
"sourceIdentifier": "vulnerabilities@zephyrproject.org",
|
||||
"published": "2024-09-13T19:15:17.823",
|
||||
"lastModified": "2024-09-14T11:47:14.677",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-19T01:40:32.813",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "BT: Missing length checks of net_buf in rfcomm_handle_data"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "BT: Faltan comprobaciones de longitud de net_buf en rfcomm_handle_data"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "vulnerabilities@zephyrproject.org",
|
||||
"type": "Secondary",
|
||||
@ -36,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-191"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "vulnerabilities@zephyrproject.org",
|
||||
"type": "Secondary",
|
||||
@ -55,10 +89,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:zephyrproject:zephyr:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "3.6.0",
|
||||
"matchCriteriaId": "0C71E782-50A1-4727-B9FC-B20D7BF73A89"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-7833-fcpm-3ggm",
|
||||
"source": "vulnerabilities@zephyrproject.org"
|
||||
"source": "vulnerabilities@zephyrproject.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,17 +2,41 @@
|
||||
"id": "CVE-2024-6259",
|
||||
"sourceIdentifier": "vulnerabilities@zephyrproject.org",
|
||||
"published": "2024-09-13T21:15:10.830",
|
||||
"lastModified": "2024-09-14T11:47:14.677",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-19T01:33:36.477",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "BT: HCI: adv_ext_report Improper discarding in adv_ext_report"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "BT: HCI: adv_ext_report Descarte incorrecto en adv_ext_report"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "vulnerabilities@zephyrproject.org",
|
||||
"type": "Secondary",
|
||||
@ -36,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "vulnerabilities@zephyrproject.org",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +85,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:zephyrproject:zephyr:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "3.6.0",
|
||||
"matchCriteriaId": "8BA5725B-1797-45C0-846C-FE2EC98D6440"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-p5j7-v26w-wmcp",
|
||||
"source": "vulnerabilities@zephyrproject.org"
|
||||
"source": "vulnerabilities@zephyrproject.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
78
CVE-2024/CVE-2024-72xx/CVE-2024-7254.json
Normal file
78
CVE-2024/CVE-2024-72xx/CVE-2024-7254.json
Normal file
@ -0,0 +1,78 @@
|
||||
{
|
||||
"id": "CVE-2024-7254",
|
||||
"sourceIdentifier": "cve-coordination@google.com",
|
||||
"published": "2024-09-19T01:15:10.963",
|
||||
"lastModified": "2024-09-19T01:15:10.963",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Any project that parses untrusted Protocol Buffers data\u00a0containing an arbitrary number of nested groups / series of SGROUP\u00a0tags can corrupted by exceeding the stack limit i.e. StackOverflow. Parsing nested groups as unknown fields with DiscardUnknownFieldsParser or Java Protobuf Lite parser, or against Protobuf map fields, creates unbounded recursions that can be abused by an attacker."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cve-coordination@google.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "NONE",
|
||||
"vulnerableSystemIntegrity": "NONE",
|
||||
"vulnerableSystemAvailability": "HIGH",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 8.7,
|
||||
"baseSeverity": "HIGH"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve-coordination@google.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/protocolbuffers/protobuf/commit/cc8b3483a5584b3301e3d43d17eb59704857ffaa",
|
||||
"source": "cve-coordination@google.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-7960",
|
||||
"sourceIdentifier": "PSIRT@rockwellautomation.com",
|
||||
"published": "2024-09-12T21:15:03.153",
|
||||
"lastModified": "2024-09-12T21:34:55.633",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-19T01:52:55.193",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -59,9 +59,41 @@
|
||||
"baseSeverity": "HIGH"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 9.1,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "PSIRT@rockwellautomation.com",
|
||||
"type": "Secondary",
|
||||
@ -73,10 +105,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:rockwellautomation:pavilion8:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.0",
|
||||
"matchCriteriaId": "9569FBE7-2B8C-48A7-976A-2CDF1A155FB4"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1695.html",
|
||||
"source": "PSIRT@rockwellautomation.com"
|
||||
"source": "PSIRT@rockwellautomation.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-7961",
|
||||
"sourceIdentifier": "PSIRT@rockwellautomation.com",
|
||||
"published": "2024-09-12T21:15:03.357",
|
||||
"lastModified": "2024-09-12T21:34:55.633",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-19T01:52:24.530",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -59,9 +59,41 @@
|
||||
"baseSeverity": "HIGH"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "PSIRT@rockwellautomation.com",
|
||||
"type": "Secondary",
|
||||
@ -73,10 +105,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:rockwellautomation:pavilion8:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.0",
|
||||
"matchCriteriaId": "9569FBE7-2B8C-48A7-976A-2CDF1A155FB4"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1695.html",
|
||||
"source": "PSIRT@rockwellautomation.com"
|
||||
"source": "PSIRT@rockwellautomation.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-8533",
|
||||
"sourceIdentifier": "PSIRT@rockwellautomation.com",
|
||||
"published": "2024-09-12T20:15:05.820",
|
||||
"lastModified": "2024-09-12T21:34:55.633",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-19T01:57:23.830",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -59,9 +59,41 @@
|
||||
"baseSeverity": "HIGH"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-276"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "PSIRT@rockwellautomation.com",
|
||||
"type": "Secondary",
|
||||
@ -73,10 +105,102 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:rockwellautomation:2800c_optixpanel_compact_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.0.0.325",
|
||||
"versionEndExcluding": "4.0.2.116",
|
||||
"matchCriteriaId": "F218EB00-8AFC-40D5-BA47-A95EB8788B1B"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:rockwellautomation:2800c_optixpanel_compact:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6122A68F-32E5-47BA-AC46-6E7F47458908"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:rockwellautomation:2800s_optixpanel_standard_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.0.0.350",
|
||||
"versionEndExcluding": "4.0.2.123",
|
||||
"matchCriteriaId": "CEE022A0-C5D3-4C01-B2DB-EABA21DC980F"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:rockwellautomation:2800s_optixpanel_standard:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "17E3A41C-75A5-4CE1-A682-28A24345E312"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:rockwellautomation:embedded_edge_compute_module_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.0.0.347",
|
||||
"versionEndExcluding": "4.0.2.106",
|
||||
"matchCriteriaId": "C5651BE1-D935-42BA-8639-77862C560703"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:rockwellautomation:embedded_edge_compute_module:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AAB55941-8559-4BFB-A135-200AD5A7F4AA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1964.html",
|
||||
"source": "PSIRT@rockwellautomation.com"
|
||||
"source": "PSIRT@rockwellautomation.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-8782",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-09-13T18:15:07.920",
|
||||
"lastModified": "2024-09-14T11:47:14.677",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-19T01:46:07.003",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in JFinalCMS up to 1.0. It has been rated as critical. This issue affects the function delete of the file /admin/template/edit. The manipulation of the argument name leads to path traversal. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha detectado una vulnerabilidad en JFinalCMS hasta la versi\u00f3n 1.0. Se ha calificado como cr\u00edtica. Este problema afecta a la funci\u00f3n delete del archivo /admin/template/edit. La manipulaci\u00f3n del nombre del argumento provoca un path traversal. El ataque puede iniciarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -57,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -105,6 +129,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -116,26 +150,59 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:heyewei:jfinalcms:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "1.0",
|
||||
"matchCriteriaId": "5A45E47D-B346-4CE7-8C41-AC7A898D84B4"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitee.com/heyewei/JFinalcms/issues/IAOSJG",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yhy7612/Seccode/blob/main/README1.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.277433",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.277433",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.405528",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-8783",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-09-13T19:15:18.120",
|
||||
"lastModified": "2024-09-14T11:47:14.677",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-19T01:38:57.033",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as problematic has been found in OpenTibiaBR MyAAC up to 0.8.16. Affected is an unknown function of the file system/pages/forum/new_post.php of the component Post Reply Handler. The manipulation of the argument post_topic leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The patch is identified as bf6ae3df0d32fa22552bb44ca4f8489a6e78cc1c. It is recommended to apply a patch to fix this issue."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha encontrado una vulnerabilidad clasificada como problem\u00e1tica en OpenTibiaBR MyAAC hasta la versi\u00f3n 0.8.16. Se ve afectada una funci\u00f3n desconocida del archivo system/pages/forum/new_post.php del componente Post Reply Handler. La manipulaci\u00f3n del argumento post_topic provoca Cross-site Scripting. Es posible lanzar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. El parche se identifica como bf6ae3df0d32fa22552bb44ca4f8489a6e78cc1c. Se recomienda aplicar un parche para solucionar este problema."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -57,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -116,30 +140,67 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opentibiabr:myaac:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "0.8.16",
|
||||
"matchCriteriaId": "CA7FFE60-44B1-45E5-9348-8497B55444B1"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/opentibiabr/myaac/issues/121",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/opentibiabr/myaac/pull/122",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Issue Tracking",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/opentibiabr/myaac/pull/122/commits/bf6ae3df0d32fa22552bb44ca4f8489a6e78cc1c",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.277434",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.277434",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.406368",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-8784",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-09-13T19:15:18.430",
|
||||
"lastModified": "2024-09-14T11:47:14.677",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-19T01:38:35.177",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as critical was found in QDocs Smart School Management System 7.0.0. Affected by this vulnerability is an unknown functionality of the file /user/chat/mynewuser of the component Chat. The manipulation of the argument users[] with the input 1'+AND+(SELECT+3220+FROM+(SELECT(SLEEP(5)))ZNun)+AND+'WwBM'%3d'WwBM as part of POST Request Parameter leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 7.0.1 is able to address this issue. It is recommended to upgrade the affected component."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se encontr\u00f3 una vulnerabilidad clasificada como cr\u00edtica en QDocs Smart School Management System 7.0.0. Esta vulnerabilidad afecta una funcionalidad desconocida del archivo /user/chat/mynewuser del componente Chat. La manipulaci\u00f3n del argumento users[] con la entrada 1'+AND+(SELECT+3220+FROM+(SELECT(SLEEP(5)))ZNun)+AND+'WwBM'%3d'WwBM como parte del par\u00e1metro de solicitud POST conduce a una inyecci\u00f3n SQL. El ataque se puede lanzar de forma remota. El exploit se ha divulgado al p\u00fablico y puede utilizarse. La actualizaci\u00f3n a la versi\u00f3n 7.0.1 puede solucionar este problema. Se recomienda actualizar el componente afectado."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -57,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -116,30 +140,65 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:qdocs:smart_school:7.0.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E5B45ABC-97CB-47F8-AA78-6585E192BB29"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://codecanyon.net/item/smart-school-school-management-system/19426018",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/bytium/vulnerability-research/blob/main/Advisory%20for%20Time-Based%20Blind%20SQL%20Injection%20in%20QDocs%20Smart%20School.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://smart-school.in/article/version-7-0-1",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.277435",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.277435",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.407385",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
41
README.md
41
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-09-18T23:55:17.251441+00:00
|
||||
2024-09-19T02:00:17.214499+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-09-18T23:15:11.427000+00:00
|
||||
2024-09-19T01:57:23.830000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -27,33 +27,46 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest)
|
||||
|
||||
```plain
|
||||
2024-09-18T00:00:08.656111+00:00
|
||||
2024-09-19T00:00:08.652629+00:00
|
||||
```
|
||||
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
263420
|
||||
263421
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `4`
|
||||
Recently added CVEs: `1`
|
||||
|
||||
- [CVE-2021-27917](CVE-2021/CVE-2021-279xx/CVE-2021-27917.json) (`2024-09-18T22:15:03.577`)
|
||||
- [CVE-2022-25770](CVE-2022/CVE-2022-257xx/CVE-2022-25770.json) (`2024-09-18T22:15:03.827`)
|
||||
- [CVE-2024-37406](CVE-2024/CVE-2024-374xx/CVE-2024-37406.json) (`2024-09-18T22:15:04.573`)
|
||||
- [CVE-2024-47059](CVE-2024/CVE-2024-470xx/CVE-2024-47059.json) (`2024-09-18T22:15:04.650`)
|
||||
- [CVE-2024-7254](CVE-2024/CVE-2024-72xx/CVE-2024-7254.json) (`2024-09-19T01:15:10.963`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `4`
|
||||
Recently modified CVEs: `20`
|
||||
|
||||
- [CVE-2023-31429](CVE-2023/CVE-2023-314xx/CVE-2023-31429.json) (`2024-09-18T22:15:04.270`)
|
||||
- [CVE-2023-4162](CVE-2023/CVE-2023-41xx/CVE-2023-4162.json) (`2024-09-18T22:15:04.427`)
|
||||
- [CVE-2024-29964](CVE-2024/CVE-2024-299xx/CVE-2024-29964.json) (`2024-09-18T23:15:11.307`)
|
||||
- [CVE-2024-29968](CVE-2024/CVE-2024-299xx/CVE-2024-29968.json) (`2024-09-18T23:15:11.427`)
|
||||
- [CVE-2019-1069](CVE-2019/CVE-2019-10xx/CVE-2019-1069.json) (`2024-09-19T01:00:03.107`)
|
||||
- [CVE-2020-0618](CVE-2020/CVE-2020-06xx/CVE-2020-0618.json) (`2024-09-19T01:00:03.107`)
|
||||
- [CVE-2020-14644](CVE-2020/CVE-2020-146xx/CVE-2020-14644.json) (`2024-09-19T01:00:03.107`)
|
||||
- [CVE-2022-21445](CVE-2022/CVE-2022-214xx/CVE-2022-21445.json) (`2024-09-19T01:00:03.107`)
|
||||
- [CVE-2024-27348](CVE-2024/CVE-2024-273xx/CVE-2024-27348.json) (`2024-09-19T01:00:03.120`)
|
||||
- [CVE-2024-44430](CVE-2024/CVE-2024-444xx/CVE-2024-44430.json) (`2024-09-19T01:38:06.317`)
|
||||
- [CVE-2024-45103](CVE-2024/CVE-2024-451xx/CVE-2024-45103.json) (`2024-09-19T01:50:12.427`)
|
||||
- [CVE-2024-45104](CVE-2024/CVE-2024-451xx/CVE-2024-45104.json) (`2024-09-19T01:49:50.870`)
|
||||
- [CVE-2024-5754](CVE-2024/CVE-2024-57xx/CVE-2024-5754.json) (`2024-09-19T01:44:29.550`)
|
||||
- [CVE-2024-5931](CVE-2024/CVE-2024-59xx/CVE-2024-5931.json) (`2024-09-19T01:35:17.767`)
|
||||
- [CVE-2024-6135](CVE-2024/CVE-2024-61xx/CVE-2024-6135.json) (`2024-09-19T01:34:49.397`)
|
||||
- [CVE-2024-6137](CVE-2024/CVE-2024-61xx/CVE-2024-6137.json) (`2024-09-19T01:33:12.627`)
|
||||
- [CVE-2024-6258](CVE-2024/CVE-2024-62xx/CVE-2024-6258.json) (`2024-09-19T01:40:32.813`)
|
||||
- [CVE-2024-6259](CVE-2024/CVE-2024-62xx/CVE-2024-6259.json) (`2024-09-19T01:33:36.477`)
|
||||
- [CVE-2024-7960](CVE-2024/CVE-2024-79xx/CVE-2024-7960.json) (`2024-09-19T01:52:55.193`)
|
||||
- [CVE-2024-7961](CVE-2024/CVE-2024-79xx/CVE-2024-7961.json) (`2024-09-19T01:52:24.530`)
|
||||
- [CVE-2024-8533](CVE-2024/CVE-2024-85xx/CVE-2024-8533.json) (`2024-09-19T01:57:23.830`)
|
||||
- [CVE-2024-8782](CVE-2024/CVE-2024-87xx/CVE-2024-8782.json) (`2024-09-19T01:46:07.003`)
|
||||
- [CVE-2024-8783](CVE-2024/CVE-2024-87xx/CVE-2024-8783.json) (`2024-09-19T01:38:57.033`)
|
||||
- [CVE-2024-8784](CVE-2024/CVE-2024-87xx/CVE-2024-8784.json) (`2024-09-19T01:38:35.177`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
57
_state.csv
57
_state.csv
@ -128928,7 +128928,7 @@ CVE-2019-10686,0,0,071dffbfdea10181bb98b77b81173ea1ee44c0bf3f27125b70455662edc40
|
||||
CVE-2019-10687,0,0,4d2aa4f6c0463103aef2503f43b6f1e6753450b125b2eb1b959d173389b0f8e1,2019-08-27T15:51:11.620000
|
||||
CVE-2019-10688,0,0,139389dbc249e8cae439573037005e32285d24298cd9752f9767fbd85f7cada6,2019-06-17T16:15:11.653000
|
||||
CVE-2019-10689,0,0,3a6ff66e02d9a27391650c9b85af3797719e726b15e08ea64568eab01a8deea0,2019-06-27T17:26:21.897000
|
||||
CVE-2019-1069,0,0,1dde59bc61cd7fc8ed90278619866c19547de636b4ba84a81da56ad49bb2980c,2024-09-18T19:35:04.250000
|
||||
CVE-2019-1069,0,1,f31e90e4331009e9da44368d612d680d5b98b6b04c978425b0ce779643dd7237,2024-09-19T01:00:03.107000
|
||||
CVE-2019-10691,0,0,e8e0d767bb2f3b5e08db6f24e350ea086b46abac68877bbd2cba7819c236f317,2023-11-07T03:02:32.480000
|
||||
CVE-2019-10692,0,0,8adff711cac0bb2de2edadfdf1000b35b700fb5b209d412cad8743610b43de23,2023-05-23T20:30:59.777000
|
||||
CVE-2019-10694,0,0,9582148ff7994145825de46f0455936b126d6116ce2adec095540a2cc82c30a9,2022-01-24T16:46:01.133000
|
||||
@ -144703,7 +144703,7 @@ CVE-2020-0614,0,0,12f15192ab79a8552f13d178102ec7652022e3da6a86c53711d8e500ba5073
|
||||
CVE-2020-0615,0,0,d07f14370de3daed11c7c6d594a36427cbacc6c9fd65ca574999d63faf287b8b,2021-07-21T11:39:23.747000
|
||||
CVE-2020-0616,0,0,c7cf38b97cba6d376bc7e32ae8e8661336896c126df03584e279241be5843554,2020-01-17T18:08:11.317000
|
||||
CVE-2020-0617,0,0,46c1e5b442d22df7cf33b7558eeb7f9d8480b2a605c42c07f73f14e3892fc8fe,2020-01-22T12:26:01.293000
|
||||
CVE-2020-0618,0,0,b3eacfcf6fb3caa72727be9b5e5bd653448d68af0f33d0f46bebc86f38c4ba73,2022-01-01T19:59:00.413000
|
||||
CVE-2020-0618,0,1,87c49d279c8e8987042080c9d613a8783a706599315889057700d28a949c34cf,2024-09-19T01:00:03.107000
|
||||
CVE-2020-0620,0,0,d79dd8798c9b9e07271060e9756056a5063d70500daa6787e2f51708e481c688,2021-07-21T11:39:23.747000
|
||||
CVE-2020-0621,0,0,6f3caa242e17154a36c663a4072af30dddcfa0e216ec2e9ee2622b228c2ca3ed,2020-01-17T18:24:28.680000
|
||||
CVE-2020-0622,0,0,a00bce96c66f0c5eb03364841bced6f75f140321d58bc2160521aca980908849,2021-07-21T11:39:23.747000
|
||||
@ -149396,7 +149396,7 @@ CVE-2020-14640,0,0,a625b80b7f5e18e7a35950b5794b7d7fb6ccf5d93316771918c7e61df0248
|
||||
CVE-2020-14641,0,0,5434c3e9d3bca8f35e7c9dbb9f09a8afe53a071667fe4357f0eaf79b61b0e16f,2022-04-28T18:57:38.380000
|
||||
CVE-2020-14642,0,0,104b19d410be569d6ea4bbc8f636508c676065723fe09fd1fa0fcb2ef25b55e2,2020-07-20T15:33:40.177000
|
||||
CVE-2020-14643,0,0,48434287fd7f64f17cfffcefaed359929b4acedeed60d0404f3e5fc880b7930d,2023-05-18T17:56:31.617000
|
||||
CVE-2020-14644,0,0,a53d7e696bf53822ce0c0fc75751cdac6513d6432dad80fc734f7d4fd83dd794,2020-07-20T17:03:11.847000
|
||||
CVE-2020-14644,0,1,ff6d177a9c9658f3f3366ed8fd090021b7246fc99fd8f621ca505a7407bbee38,2024-09-19T01:00:03.107000
|
||||
CVE-2020-14645,0,0,34ad1a9dce5ce925439479f3cc5bcf6bdbfc6e71065b34f9283cfcf60dc7d8d2,2020-07-20T17:05:27.117000
|
||||
CVE-2020-14646,0,0,49f4470147098030b4972a5cad02c0e7da7254ab41256ad2383e7addd7b05ee9,2021-02-17T00:04:16.067000
|
||||
CVE-2020-14647,0,0,b654715d13e9a54e13c7eee9217a7e48ebc3a983089ac10bc27052589bad4fca,2021-02-17T00:08:07.257000
|
||||
@ -172859,7 +172859,7 @@ CVE-2021-27913,0,0,167d05a43c4b8a3a9a5f9095ae1170cc5f9466459db5849cf91ef768c53d5
|
||||
CVE-2021-27914,0,0,675b39026c04fc757a33b18eab7c2aa058775623331c1d7c9d085c842a052b1d,2022-06-08T18:45:22.737000
|
||||
CVE-2021-27915,0,0,e6739f668561cdef24a58498daa5751df6c86b3626a27c94b75427a7bc117641,2024-09-17T14:15:14.100000
|
||||
CVE-2021-27916,0,0,11da46d91d7831a39cadc8f3c45f95d106ba722e4c9b9cdef6174a228a6f2a61,2024-09-17T15:15:11.967000
|
||||
CVE-2021-27917,1,1,23dead4ea77fb9410df1ea9d3711c69d5086413d1ee79c8228aff3d570f0bdd2,2024-09-18T22:15:03.577000
|
||||
CVE-2021-27917,0,0,23dead4ea77fb9410df1ea9d3711c69d5086413d1ee79c8228aff3d570f0bdd2,2024-09-18T22:15:03.577000
|
||||
CVE-2021-27918,0,0,0518da32da0b62ea5fcb12a67bfb4a45de87702f6745ca2fb1540144faa372aa,2022-12-13T16:28:13.860000
|
||||
CVE-2021-27919,0,0,ff72fa8dcdbe5235ea458afc8e87af812a5a4a7f37cb1ded6eeda83ce3037733,2023-11-07T03:32:02.603000
|
||||
CVE-2021-27921,0,0,b11f4653b3d8f81de77297ff4168966513573360c29446471f5cf2f2df9fb5e0,2023-11-07T03:32:02.670000
|
||||
@ -190731,7 +190731,7 @@ CVE-2022-21441,0,0,bc2ca46e6b7937a154c140b4a5ab92f0fe51eb40dd60d8e39ccd8ee9b50cd
|
||||
CVE-2022-21442,0,0,257f19bcc8308bc457fa0199ecf1803ecbe3efe979daa70e98bbbd82ecfc0db4,2022-04-28T13:28:05.600000
|
||||
CVE-2022-21443,0,0,0a55afeb6e47955f04f9d4642999e8ade129ce15078f095634d2e8d92fadc82e,2024-06-21T19:15:22.373000
|
||||
CVE-2022-21444,0,0,5186be85aad1c4d733889f4a1f5150301ec25d3c487f0e278a98712336303143,2022-05-10T17:46:03.480000
|
||||
CVE-2022-21445,0,0,5c4f57905b71953a8da97bf6cab21b2c86c622857965b6feaddd34cce61eaa9f,2022-04-28T13:17:07.963000
|
||||
CVE-2022-21445,0,1,e7b8f1eae1e5149af95f47894fb86edb515f0e6fc2544db4351ba4e3d5c1fd23,2024-09-19T01:00:03.107000
|
||||
CVE-2022-21446,0,0,6df2d5472ab8a30f78a13d35e05951c925360ed3964b8391492edcb6d5f83424,2022-04-28T13:42:16.247000
|
||||
CVE-2022-21447,0,0,f80ea28619779d9bdde592cde6cc89b379fc127f0863353efe45deee94a406c5,2022-05-02T12:43:42.497000
|
||||
CVE-2022-21448,0,0,93c9b9807154fbdebfb139861e1ac56e4abb764f7d6b8097c300b3d4c3ddacdd,2022-05-02T12:53:57.220000
|
||||
@ -194667,7 +194667,7 @@ CVE-2022-25767,0,0,9c7e47a7f32ad24819f31562ff54850c26f7314d814cab84c6713ce436000
|
||||
CVE-2022-25768,0,0,2f471eb3838e4e5cd6d600ba0852b92e4b7ebd1fb0df798e844f5f3255c1a409,2024-09-18T21:15:12.860000
|
||||
CVE-2022-25769,0,0,49c2fe6bbcc4dd18d3ac4c13713a4ad2cfb810bf9c9a1e9e202814edcb46964d,2024-09-18T15:15:13.060000
|
||||
CVE-2022-2577,0,0,87c803484cf61dec9e54055b4599e6f4b1ddfe755fed9fabbd2408fb332046f5,2023-11-07T03:46:40.493000
|
||||
CVE-2022-25770,1,1,61d36750ec580fc71c548d57cb5cb4888c2713fab3b6031919aa08220b34c305,2024-09-18T22:15:03.827000
|
||||
CVE-2022-25770,0,0,61d36750ec580fc71c548d57cb5cb4888c2713fab3b6031919aa08220b34c305,2024-09-18T22:15:03.827000
|
||||
CVE-2022-25772,0,0,95d681186a9c51133bf3638b33bba1dd8f63cdc4f434660afa0e726ca2c437ec,2023-05-09T19:15:11.413000
|
||||
CVE-2022-25774,0,0,d128421aa7601ab16044dac15490c25c6c2e690412ad3801950f706eb5056b33,2024-09-18T15:15:13.253000
|
||||
CVE-2022-25775,0,0,2d1d71ffaee7c477f923babb3051dba7e000633b4437cb8d189bac24751d255c,2024-09-18T15:15:13.440000
|
||||
@ -223707,7 +223707,7 @@ CVE-2023-31425,0,0,64f9c63c3a00f3a6cca4f0cabc3b6472a44afec528f99b6a94356138c0186
|
||||
CVE-2023-31426,0,0,6c84f63e63b5a71b1aff3aae71af632f2a0a4866f1dc27dadcf99d9770d6ac1d,2024-02-15T19:52:32.233000
|
||||
CVE-2023-31427,0,0,f49380a909cbff0e69906de0042a3889363bdbc75498eb6d7bb394853355cecf,2024-02-16T17:35:51.470000
|
||||
CVE-2023-31428,0,0,030b00fd492b3d7bc947f71f15bfb2cabea59227204eefd805d33fd42ed3af25,2023-11-16T01:08:17.493000
|
||||
CVE-2023-31429,0,1,69992987796732b8a61ad8dc5d5daa58a12ba1e7563dab45279df1c528181e45,2024-09-18T22:15:04.270000
|
||||
CVE-2023-31429,0,0,69992987796732b8a61ad8dc5d5daa58a12ba1e7563dab45279df1c528181e45,2024-09-18T22:15:04.270000
|
||||
CVE-2023-3143,0,0,cc64da36ff76b40d964338f4258d6378f120a80542ea8341a9ead9fecae03612,2024-05-17T02:27:17.983000
|
||||
CVE-2023-31430,0,0,520f15377e93f11b2a0bd3a18cd0b8b92918b6fa842affdec2b36ff8d3bfed92,2023-12-21T01:37:48.807000
|
||||
CVE-2023-31431,0,0,4b9b6a67e63b1b0d98be94a28234026d2066638d6a15a23ed617267106203e51,2023-12-21T01:38:25.140000
|
||||
@ -231455,7 +231455,7 @@ CVE-2023-41615,0,0,9e3b6cba4b67acfbe6486851fe7daec432b9c66a87b8a1c79ccef36619967
|
||||
CVE-2023-41616,0,0,300ccd9b827c64a55e011b2c414f930409647d26a239a2b90abfdcd303102afe,2023-11-07T04:21:02.180000
|
||||
CVE-2023-41618,0,0,50e528a7496a46042bea5c01d7200c038dae679b0e613da41b6fa6a14dc4e586,2023-12-19T16:11:02.990000
|
||||
CVE-2023-41619,0,0,a5db4bcb5169c8dddfe21b075884f02fc79047372ec23c86c9d209343f460186,2024-01-22T19:54:00.837000
|
||||
CVE-2023-4162,0,1,3d569b536e8053a8f8063fd8f667e4c575ee9a076a95ffb5f9442e0a0894d2f1,2024-09-18T22:15:04.427000
|
||||
CVE-2023-4162,0,0,3d569b536e8053a8f8063fd8f667e4c575ee9a076a95ffb5f9442e0a0894d2f1,2024-09-18T22:15:04.427000
|
||||
CVE-2023-41621,0,0,92f8843cfebdd173c8f8dd30de0c81676bdb72b7ae25d2f16164b862edeb0cdb,2023-12-18T19:16:30.327000
|
||||
CVE-2023-41623,0,0,ea29559c422c117084ae2d2f796e71ed9fbe2542670d9b3f29d0a9e1f3143045,2023-12-14T18:01:27.260000
|
||||
CVE-2023-41626,0,0,6537ad03f828deb9a3c3780bd05e1a7d5f2105684aa5d481a5b71610a2976b2e,2023-09-19T15:11:54.677000
|
||||
@ -248270,7 +248270,7 @@ CVE-2024-27344,0,0,f44089be578e3c3f48649a645c31f1e56b7af812f6729ae649c4c888c51a0
|
||||
CVE-2024-27345,0,0,639d5d88d955f31b68d7ac65a92996a1944759655dec4dc8cdc403f6280e1a1d,2024-04-03T17:24:18.150000
|
||||
CVE-2024-27346,0,0,8179d23e6ef0789d37a1db2f177021069373bc1f8d521305cdf369e9fa46745f,2024-04-03T17:24:18.150000
|
||||
CVE-2024-27347,0,0,aa6bb96be7bc41dc2b8b854a600f1bcc7744ab20513fb28f41f361c130b3e452,2024-07-03T01:50:32.683000
|
||||
CVE-2024-27348,0,0,19a1fc3823345ead5de9b178f23db90fd5b4d62aadcbb9121cf141379ff75cef,2024-08-01T13:48:22.967000
|
||||
CVE-2024-27348,0,1,add8565b363ebc7d89e1b1994d7f3550469242b7a7f9dbd84c0a9f2f5bcf2bcf,2024-09-19T01:00:03.120000
|
||||
CVE-2024-27349,0,0,88b94935f18791608992594036627e2f38bf8f66250b8863a7cf3ad8bea894c1,2024-07-03T01:50:32.910000
|
||||
CVE-2024-2735,0,0,f01bcec823b48d788d322e20cf82a4a7470344ba299463eb0cff5623d9be778d,2024-04-10T13:23:38.787000
|
||||
CVE-2024-27350,0,0,0fb1d64ef379194a46b064cdf7260ff9ff0ea87fdbd1fcde9fffd1770088e5e3,2024-02-26T16:32:25.577000
|
||||
@ -249979,11 +249979,11 @@ CVE-2024-29960,0,0,9bc7f426e339c55e2afa40b94b21b5a771b208d17f07743343b3938b63254
|
||||
CVE-2024-29961,0,0,919f06693aca6f7c36e74c8e8d833c6b0263af57ed9e9600c88f31d859f7a78e,2024-04-19T13:10:25.637000
|
||||
CVE-2024-29962,0,0,21b9296949eea48deb9c3f226a9f99fb04f6ad73d15be5a4d76fa0beddbc7e3a,2024-04-19T13:10:25.637000
|
||||
CVE-2024-29963,0,0,e99f1130c9e2ff08d19f53de2500f547c640a4dc907c0be54c37174533733c3d,2024-04-26T23:15:05.857000
|
||||
CVE-2024-29964,0,1,29793f783c01fb645575040c9f32640f2a1f00a405d6cc119b471e1fd29a29d4,2024-09-18T23:15:11.307000
|
||||
CVE-2024-29964,0,0,29793f783c01fb645575040c9f32640f2a1f00a405d6cc119b471e1fd29a29d4,2024-09-18T23:15:11.307000
|
||||
CVE-2024-29965,0,0,e604964709cb3eab78216b1ed2aee27c8bef1b7135dbf6eeb944997838c87300,2024-04-19T13:10:25.637000
|
||||
CVE-2024-29966,0,0,7a30ee14d90b389a4537d9811ac6da3ab8208e19990e232ac89a4d651f88e509,2024-04-19T13:10:25.637000
|
||||
CVE-2024-29967,0,0,28d6b7ba5011140853e9c2aca0c230574aab34fbc08f1461c1290739fd4f7389,2024-04-19T13:10:25.637000
|
||||
CVE-2024-29968,0,1,54c6b469c9cd3054c5ba4fa7e94cdadf07ebad94bbeedd2aa1fd125223ff90d0,2024-09-18T23:15:11.427000
|
||||
CVE-2024-29968,0,0,54c6b469c9cd3054c5ba4fa7e94cdadf07ebad94bbeedd2aa1fd125223ff90d0,2024-09-18T23:15:11.427000
|
||||
CVE-2024-29969,0,0,0ea97ad17652e47e59a950d8cd8575fc9bb9f6ceb08f04cc1565a0fa4707f39c,2024-04-19T13:10:25.637000
|
||||
CVE-2024-2997,0,0,56626b24345bd53a845de0d68552fa8f9c4e4028ad6b01cdd94e1dd54fd4a724,2024-05-17T02:38:41.790000
|
||||
CVE-2024-29972,0,0,2ca8d5ea63f2785abd1e1e0c373870e46d2175579d2da6911e3b85d61a25caf5,2024-08-02T02:15:17.423000
|
||||
@ -255329,7 +255329,7 @@ CVE-2024-37399,0,0,308e730bcc199d112d6cfe8bdbdbf7120fa96451bfff020b7962dbf1afddf
|
||||
CVE-2024-3740,0,0,cf4cd6bcfe639a4f771a19ddc36f820864da86f0d9d9f91c68694d8633fab251,2024-05-17T02:40:06.170000
|
||||
CVE-2024-37403,0,0,82a2fe28b07e6e9fe5e86dff02fa8c242d19ac626eea029ca875aeaf76338b4d,2024-08-12T18:55:15.890000
|
||||
CVE-2024-37405,0,0,a7f42023569aa18cbb4863def372451bd6a310533c03fc36f82684a5a0e2908a,2024-08-01T13:53:37.273000
|
||||
CVE-2024-37406,1,1,3408edc763c0644c3b4724abfd1ea59be7b1cc84b88fdea86ebb1edb513d059b,2024-09-18T22:15:04.573000
|
||||
CVE-2024-37406,0,0,3408edc763c0644c3b4724abfd1ea59be7b1cc84b88fdea86ebb1edb513d059b,2024-09-18T22:15:04.573000
|
||||
CVE-2024-37407,0,0,b2071e78ac73cfcd8ee3f67daccfb5fa834666925d4b4867e66acc10a01216e8,2024-07-17T20:16:52.400000
|
||||
CVE-2024-37408,0,0,31eb8b44dab60578fd668270e5d026543c06afc296d259b359783119f5ef7a55,2024-09-06T19:35:25.460000
|
||||
CVE-2024-37409,0,0,82c50e49bf5ddfbe2b556ca4db6eaf6873d58da7b8ce0001c708890dc09405da,2024-07-24T02:51:28.287000
|
||||
@ -259445,7 +259445,7 @@ CVE-2024-44410,0,0,6c57a9bf372d97a29932dc411b42421130ab7221dd0f704bdc840e2d9eac4
|
||||
CVE-2024-44411,0,0,598fa2c90c1fcb2e76dc9bbaf4d1053ce6ab00db76daa7f3174af16794b4965c,2024-09-10T14:35:06.690000
|
||||
CVE-2024-4442,0,0,9c1eda6fa3435f8c4d08218c5481ff931fe1467531bf106c3f2c1021638ef5a8,2024-05-21T12:37:59.687000
|
||||
CVE-2024-4443,0,0,844cc6ae76fc91b0a9b2c7cc836e7c7382ecc4895f252d76709d68a22aac17cb,2024-05-22T12:46:53.887000
|
||||
CVE-2024-44430,0,0,8dbed207b30dda337ab5a47dac910dd3a5a0d86355eb69a9a4785128c125676c,2024-09-16T15:35:20.943000
|
||||
CVE-2024-44430,0,1,f640e237da24007d6a0c1a8b89d52bdbc13fc34691f8dcc93f05041c29090cb1,2024-09-19T01:38:06.317000
|
||||
CVE-2024-4444,0,0,b8ab3a280e1fea7a38298a9a71737680ed9a07734ba58de04ed034a8b48f0be8,2024-05-14T16:11:39.510000
|
||||
CVE-2024-44445,0,0,08a4fdca954368472940c8c2524ceb7cd04674f0407b4762b892d4168753ab1b,2024-09-16T20:15:47.020000
|
||||
CVE-2024-4445,0,0,bc137eb49d08335d8d2b32a3f413016c50b301d09f6a742095c80df385aba82a,2024-05-14T19:17:55.627000
|
||||
@ -259726,8 +259726,8 @@ CVE-2024-45097,0,0,66f33176e0c07f5466116654bcd7c2847267016c1af22914a830c235e4290
|
||||
CVE-2024-45098,0,0,d99373b3861e761d69e1423a19b397cd3881f87fabdf54ab0162bbecfa72f038,2024-09-06T13:01:44.023000
|
||||
CVE-2024-4510,0,0,e609022dce213b03ba687f592023f15f3e261f085d88e9ff14f3b7ffe9969d1b,2024-05-17T02:40:26.417000
|
||||
CVE-2024-45101,0,0,33f1759773ed958698aa92feba49f5c13b8dc323fc39290af0e659cff8a65aa4,2024-09-14T11:47:14.677000
|
||||
CVE-2024-45103,0,0,01557b83036fab88957ae3997f6f44b8b18df48e60be4bbc26336c9f7e3c5cec,2024-09-14T11:47:14.677000
|
||||
CVE-2024-45104,0,0,c11d512848cc1e00424cf0e01cec51b6df5974ccbf2d3c5ae43f33bc75522376,2024-09-14T11:47:14.677000
|
||||
CVE-2024-45103,0,1,01e8c7d7777680c3c907a9b9346c8d516e1c4df3a86a3dfed3c0a030a8c65f44,2024-09-19T01:50:12.427000
|
||||
CVE-2024-45104,0,1,30db7dcba4a138780d42a329ad568630f0b423c3266582b9f2b058712e15f7a1,2024-09-19T01:49:50.870000
|
||||
CVE-2024-45105,0,0,dc3af87f0737a3f3d1de2a0dee937e0919dd2759a9bae35a42ba5de5fbd9ce9b,2024-09-14T11:47:14.677000
|
||||
CVE-2024-45107,0,0,d5e30880270706ae80f98d427d6a3501f7b9d607b88b780b72f90a000a13f3a6,2024-09-06T16:26:03.440000
|
||||
CVE-2024-45108,0,0,03b1037fb5ccdb261a2f64bd06297f4c212c932af1d9e1d68068742a2f76d080,2024-09-13T17:00:03.120000
|
||||
@ -260340,7 +260340,7 @@ CVE-2024-47049,0,0,0632fb9d999b7a0f0772c4bcd61e6520e2d1b47f1300e76d8780773c41e65
|
||||
CVE-2024-4705,0,0,26b272539ad739bf4cdb858b2e8b5e748c64203d796935ad814b34867a2408a1,2024-07-23T21:15:15.147000
|
||||
CVE-2024-47050,0,0,9fb75eec65018e4d647a95f2333bff20c9711ca8d7d9db03b47fb8b221e40194,2024-09-18T21:15:13.743000
|
||||
CVE-2024-47058,0,0,531cdfc92f76cf21d508b7b6b64addb62803353166eabe55a6bed18bc21358e2,2024-09-18T21:15:13.923000
|
||||
CVE-2024-47059,1,1,963e19b9c43cf5c2fc64d99e9fc14f93e8e1c53bf419efc5d22841199e5248e4,2024-09-18T22:15:04.650000
|
||||
CVE-2024-47059,0,0,963e19b9c43cf5c2fc64d99e9fc14f93e8e1c53bf419efc5d22841199e5248e4,2024-09-18T22:15:04.650000
|
||||
CVE-2024-4706,0,0,9fb317504579dba9e9851d8ef4d6ad37a71c1b39f231cbe007ab86fbaba76dfc,2024-05-24T01:15:30.977000
|
||||
CVE-2024-4707,0,0,8435cc27f87132831b9d3f5ec9dd9fe3cf2e85b8b55db14f2e03c7e1023e49fc,2024-07-24T17:59:29.230000
|
||||
CVE-2024-4708,0,0,c271dbf72bf72946f8191932c0e7ad58bd2ebed6dfb7e2f3f6882e8c7f0da7d3,2024-08-29T19:31:56.517000
|
||||
@ -261262,7 +261262,7 @@ CVE-2024-5746,0,0,08e42433314420a93bea44176cf4cc0a169742251a575020722ab2e02c28ff
|
||||
CVE-2024-5750,0,0,476ad6c00a3180d456740d0beb63c2959ea56c746a3fc254c90c1eef52867b01,2024-06-18T14:15:11.383000
|
||||
CVE-2024-5751,0,0,b021056a2386bbaab3004cd237916090181697c8a0e20dfa0ef7d94a29a0eb73,2024-06-27T19:25:12.067000
|
||||
CVE-2024-5753,0,0,43c94f3dac782081ffe06f7a7f44ffc012545fd59744b1529ccc7aa1117863e3,2024-07-08T15:49:22.437000
|
||||
CVE-2024-5754,0,0,46dc8ece328955cc738d452a2649a392e2aacda65407fffee0d07c69d7c2c4ce,2024-09-14T11:47:14.677000
|
||||
CVE-2024-5754,0,1,c3a5277096f523d353cf673d18bde4e0509750046bdf6f4ab7286ba49c5a6e28,2024-09-19T01:44:29.550000
|
||||
CVE-2024-5755,0,0,18288403f67281063c09c8ff29d182967f82bf6bbbadea2fe8a94bcd12e5aa16,2024-06-27T19:25:12.067000
|
||||
CVE-2024-5756,0,0,8f9e9c6b47319f2e6056e0eeab0b95c7967e08ebf1f00846244d8a548a26a9af,2024-07-17T13:52:08.350000
|
||||
CVE-2024-5757,0,0,5cb8c18a619114307d2634441346064118b79a7aeac4723897e195eaa5132dad,2024-07-02T14:42:05.977000
|
||||
@ -261413,7 +261413,7 @@ CVE-2024-5927,0,0,1b7b6c83db008ddacf60314208106fd6b62f6e315f688ea9bb13e1efdd6d20
|
||||
CVE-2024-5928,0,0,065180dc816d6768a80630eb0526fd0ad0770440e65f1ad606ffbf7997d4dae8,2024-08-23T16:47:34.100000
|
||||
CVE-2024-5929,0,0,547b1d1269945a5f94b9f310fc42040f5b5a64e33b67ca655dd7f52feb9f00d4,2024-08-23T16:48:00.907000
|
||||
CVE-2024-5930,0,0,801f56bcd1ea0f18ede683739787e6e80ff5c6bc8c67275c0d1547a50c51d174,2024-08-23T16:48:15.103000
|
||||
CVE-2024-5931,0,0,a799bdd78540ac0d98e89714e84f612e34f9b4ac2a93eee8b19092a88bf330f2,2024-09-14T11:47:14.677000
|
||||
CVE-2024-5931,0,1,027898fb38960b620f06b019ecce5d300805aa9e919de32efee98ada8f561517,2024-09-19T01:35:17.767000
|
||||
CVE-2024-5932,0,0,85a9c88bf32b2f92d73d91de74c86aef7b613cc68ab0a8f993cdf293d77a4a89,2024-08-26T18:34:13.787000
|
||||
CVE-2024-5933,0,0,4b5b8ee984dca52e93a5c74fef0bbbf1e4141af006167bcc3f0d3b5bd5eb1afc,2024-08-19T21:07:56.627000
|
||||
CVE-2024-5934,0,0,16721403d72b0462a70f000841eb683fbbdcd68e0952cf56add7902c00813b6e,2024-06-14T16:15:14.647000
|
||||
@ -261590,9 +261590,9 @@ CVE-2024-6130,0,0,f4b647f0047f578fe057faac21db7670b7977afa1d31bb2fa4fd50dc12004c
|
||||
CVE-2024-6132,0,0,83486b9bda06b2bfd8b6c6e0e87eac1b4d59232f4be914a093590a57da1cf4d5,2024-06-20T12:44:01.637000
|
||||
CVE-2024-6133,0,0,0fc28a92d2235a170f666cf1f2e7f51d9c2f637a1193a1e8d73b336fc781cd45,2024-08-13T01:18:26.570000
|
||||
CVE-2024-6134,0,0,c8a0602d6db0f3051b72e96c7e16fe4780a3ce250e242879d4a8baa99538dda9,2024-08-16T17:35:11.413000
|
||||
CVE-2024-6135,0,0,240ab522b11fde6d01b946d559b93d8ec3d4187954e5978f47a6dd0d9231faa1,2024-09-14T11:47:14.677000
|
||||
CVE-2024-6135,0,1,54c4e5f1511674e189e7116df40b261780814180ffb04bc57c48ae5f61eb907a,2024-09-19T01:34:49.397000
|
||||
CVE-2024-6136,0,0,2425dc33d9a66499cd0e61ed788949ec618401c3fdf6a1fd388e70bf34e3cc7e,2024-08-13T01:18:26.820000
|
||||
CVE-2024-6137,0,0,6bec5224be4662497543d09ef171a9a4da08e70b69d3bc13c287802f2b21dd7a,2024-09-14T11:47:14.677000
|
||||
CVE-2024-6137,0,1,e58f6c0787a0fe87e16b6d9ce7e652fbe72d3a55d70774470af6282c4fe57c6d,2024-09-19T01:33:12.627000
|
||||
CVE-2024-6138,0,0,fc35836bd5348e7eb9a778e4240c73e0ce52b6c3e53dfd414d6ee066e94e6acd,2024-07-12T16:54:53.997000
|
||||
CVE-2024-6139,0,0,5132030314b9a0ca48cecf9e1dd593f9b9cec1db256d0c213c6569e108426fbe,2024-06-27T19:25:12.067000
|
||||
CVE-2024-6141,0,0,1d5a717ee6e758ce9e5016396a1ddc2e4691c96cb20e6973eb41cca889dc4be3,2024-08-23T16:53:48.270000
|
||||
@ -261694,8 +261694,8 @@ CVE-2024-6254,0,0,fde0fafe626682898f8bbfd16af33ff0c947c80d91ffee5375f17b755d365a
|
||||
CVE-2024-6255,0,0,4b23bc0ba79484acd9ec84f5e33767095b874b70e803764459f9fd056777671c,2024-08-30T16:15:10.467000
|
||||
CVE-2024-6256,0,0,cd0156365b21d4bea53ae3ad70dcec4b1c8c7fe2a610d4e79db68145fb523cc9,2024-07-12T16:53:35.083000
|
||||
CVE-2024-6257,0,0,9068db2cec3557427b4184684513a4bf48773ad544b747d98a6b6caebef9018b,2024-06-25T18:50:42.040000
|
||||
CVE-2024-6258,0,0,34d0b5bc07a6a1d363da01ec81cc8eb5cfbd0d068eb9c2cfb97cfdc37e00a310,2024-09-14T11:47:14.677000
|
||||
CVE-2024-6259,0,0,b37aaf7e06c2bef67bd0ed6901e8cfac01a5a8193a5a6bfcfe5cd01550c3e36d,2024-09-14T11:47:14.677000
|
||||
CVE-2024-6258,0,1,7e0f99b02d4cfbeccb885ab02d5708f68f53af739c7a7be9bb8028bf64395f1a,2024-09-19T01:40:32.813000
|
||||
CVE-2024-6259,0,1,1266ded69d419992fec3853ca29c1bc3ce2e1f25643bb03399d365690b3c2d68,2024-09-19T01:33:36.477000
|
||||
CVE-2024-6262,0,0,295b38dc67b71cbe5bd8be303a870636c7b9e2de2092da87a091242e8bc3623e,2024-06-27T12:47:19.847000
|
||||
CVE-2024-6263,0,0,ea6dc54bae9a6133bb18ce010b56ac510f28080d60dc0881662f41b01cd3c1ce,2024-07-03T18:24:27.877000
|
||||
CVE-2024-6264,0,0,ad70cfe4611bfb10e28e7f1e9ab3f1d3972f21098785857aa1fab5f0efe27af2,2024-07-02T17:57:31.737000
|
||||
@ -262445,6 +262445,7 @@ CVE-2024-7249,0,0,73974231501387b12eacc736781f51c9d8ec8d78fa61d8eb72875d86090b0d
|
||||
CVE-2024-7250,0,0,2714d196410008034281d23fd2726bb5d251b721e04c2e3643d0ed11cf2d609a,2024-08-20T14:58:56.213000
|
||||
CVE-2024-7251,0,0,e880a7a9378bf8b927f40852329063562fbba4ad5a97a9957dc1093c25591f2f,2024-08-20T15:00:02.603000
|
||||
CVE-2024-7252,0,0,490536b1b267bc05e09f33c429c150806f5477f059597f5cad78d37cad62a66a,2024-08-20T15:00:39.470000
|
||||
CVE-2024-7254,1,1,3688d973c29636dacce7d4506510a3924f445d0d86eedd2628144c1ce48621d0,2024-09-19T01:15:10.963000
|
||||
CVE-2024-7255,0,0,a4eb887a2aa91b61ced64af6faa636cef124d2fd1032af5abcd1e986918698ff,2024-08-16T15:23:19.167000
|
||||
CVE-2024-7256,0,0,28c6c5405ca0661376f4706f7e75647b14826bc648847c0c2ef29d4ee5bafea0,2024-08-03T18:35:04.003000
|
||||
CVE-2024-7257,0,0,e6ef266df52e25692b132cfb6522d79defb5eb3e548daae54be1d69b0c3ab16e,2024-08-05T12:41:45.957000
|
||||
@ -262971,8 +262972,8 @@ CVE-2024-7950,0,0,b51a61cdc7833f69fe0a174cb3081029b1669ec8306ef6c1fd438a91efe05d
|
||||
CVE-2024-7954,0,0,3e94915bcd6201b8731c3a5ae345a341f2edda6301e38b26d28e234b0fc15d65,2024-08-23T18:46:31.730000
|
||||
CVE-2024-7955,0,0,b6d58093d52dbc1693883781c79b3abb54211ad50ad9e0127c4cb8b72bd51a3e,2024-09-10T15:35:13.013000
|
||||
CVE-2024-7958,0,0,483ea949f242fd0880547068782264d397026329e525a14dcbacca7c22e7bcec,2024-08-19T20:15:08.907000
|
||||
CVE-2024-7960,0,0,4ff8b39e880c0fcc19ccca0947eeaebb56a7d25eadde87fddd4024fce53f3533,2024-09-12T21:34:55.633000
|
||||
CVE-2024-7961,0,0,f427d66b184f35e9db20d356d86378f2f0a7bbbe819ff773822ca0cb26bc47d0,2024-09-12T21:34:55.633000
|
||||
CVE-2024-7960,0,1,6a2bab47d6fb588f4b238853d16e03fdaf4248afb98afbb54a62ccac2359c7cf,2024-09-19T01:52:55.193000
|
||||
CVE-2024-7961,0,1,54fcb6c11cb4fffe551975ea2c4e2b806861e5ed35f30fcbecfeddbc47fcfbb8,2024-09-19T01:52:24.530000
|
||||
CVE-2024-7964,0,0,c58a832be87177a31dd0ab059ea0a6d25f3e2935f7b0bca0ed2607ff4388d425,2024-08-27T13:35:00.823000
|
||||
CVE-2024-7965,0,0,97b62e193bdcda79c7557e9a31668077fb71dcc6db54dee06fbdef6c26c1aa29,2024-09-18T12:40:05.597000
|
||||
CVE-2024-7966,0,0,f366846d49db9477cb2ea061c491dcdaebf29f4e555fa7612b32a771fd61b7a0,2024-08-27T13:35:02.630000
|
||||
@ -263275,7 +263276,7 @@ CVE-2024-8521,0,0,65485edaf907369f60ded6330bfa86fc3cb4b0554a8f781a990c000b1998cc
|
||||
CVE-2024-8522,0,0,2ab431c4f2cf5ab967664e41dd1dc524f59071081def8323632354294bee4f38,2024-09-13T16:12:30.497000
|
||||
CVE-2024-8523,0,0,97cab60ebb5ec07bfc3fbe69bde3146d8e6846c5d869fc10534b5a2c3c29806e,2024-09-09T13:03:38.303000
|
||||
CVE-2024-8529,0,0,12671b61ed295efe6d3d38d0b158765da76f16b719201c5bbfb86ca5ed8c38b9,2024-09-13T16:11:25.400000
|
||||
CVE-2024-8533,0,0,c26ba0ebd43e89f6128db7b1a1b272e7a2d3b48f664882637f9f941ae54673ee,2024-09-12T21:34:55.633000
|
||||
CVE-2024-8533,0,1,ceba1d609043d018dd2a5c62af783c64aebd2125e63ee811ba18e8a1d6a8510b,2024-09-19T01:57:23.830000
|
||||
CVE-2024-8538,0,0,cdc95bc68a4038527ba5cf51b0a8358b05e3a1650fc8124f586021fbca5ad9b3,2024-09-09T13:03:38.303000
|
||||
CVE-2024-8543,0,0,e190cfdf6def9f928d16ce7c20119d5fac7745c9206ec7d9500145321b367e4b,2024-09-10T12:09:50.377000
|
||||
CVE-2024-8554,0,0,46c32adbe15332664cfc930fe8c32bff96db8190902ab789492b593fa03348f1,2024-09-10T13:52:23.250000
|
||||
@ -263378,9 +263379,9 @@ CVE-2024-8777,0,0,34a835ea08030c4a5a9203e5f6cc8fd8352bd723c399e4db5ce1a16dac92eb
|
||||
CVE-2024-8778,0,0,0d58fd097d2cc28bd3d4b4c7283e1fcc9fa1000d69632e9ebf04ab6745434089,2024-09-16T15:30:28.733000
|
||||
CVE-2024-8779,0,0,265c21235e2afe2292182db580bb12dd49935199c0a514bb7965dfbc0ef67e6b,2024-09-17T11:27:50.290000
|
||||
CVE-2024-8780,0,0,bd4bd08e2eb72cc17a88ed55f562faebe92fedded2e0fdee3ed50b9263d53a31,2024-09-16T15:30:28.733000
|
||||
CVE-2024-8782,0,0,07c3a16b8681c9ebf93d105d5b076fbef190c05e8d1e936ffaeb395d86382ca2,2024-09-14T11:47:14.677000
|
||||
CVE-2024-8783,0,0,289128ea1a51112e2b32da270994bcc7b30231f341b1d787ba1fce34d4218f29,2024-09-14T11:47:14.677000
|
||||
CVE-2024-8784,0,0,598c58979dfe2b73f976c6898315c02c460b4985a94e2fab78e11f95eb647e6e,2024-09-14T11:47:14.677000
|
||||
CVE-2024-8782,0,1,ec0da4baac22ae9eceb8ce2507375e0a71b6a51926de3cc40576bcd259fd7175,2024-09-19T01:46:07.003000
|
||||
CVE-2024-8783,0,1,b434dfc5f50cf2811a1f5688ac574f745dec48e5af54cf5f568ce8560b0e2702,2024-09-19T01:38:57.033000
|
||||
CVE-2024-8784,0,1,7bc5ed86fd42122481efd27561493828acec6a50cb9d34c0b1c40453c943431f,2024-09-19T01:38:35.177000
|
||||
CVE-2024-8796,0,0,94e01fa2394b7e3cc5729adcbe04212056eb704ee3dccdfd860de0e7129048a2,2024-09-17T18:15:05.443000
|
||||
CVE-2024-8797,0,0,b7273f8d72c4c7b82a815cc8357933cfcef5a0b838634eab59479c200615300b,2024-09-14T11:47:14.677000
|
||||
CVE-2024-8862,0,0,3c0cefe3796a3067716726cae64fd2b6a2a71c4947999e21da2abde8a533c886,2024-09-16T15:30:28.733000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user