mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-06 18:52:58 +00:00
Auto-Update: 2024-10-15T20:00:18.097712+00:00
This commit is contained in:
parent
eb04b9317c
commit
d99b00e1d3
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2015-8963",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2016-11-16T05:59:02.890",
|
||||
"lastModified": "2023-12-14T14:06:01.427",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-15T19:35:01.347",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.0,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.0,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.0,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -78,6 +98,20 @@
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-362"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2016-6817",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2017-08-10T22:29:00.233",
|
||||
"lastModified": "2023-12-08T16:41:18.860",
|
||||
"lastModified": "2024-10-15T19:35:07.040",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -16,6 +16,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
],
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
@ -74,6 +96,16 @@
|
||||
"value": "CWE-119"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-835"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2016-8747",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2017-03-14T09:59:00.253",
|
||||
"lastModified": "2023-12-08T16:41:18.860",
|
||||
"lastModified": "2024-10-15T19:35:07.950",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -16,6 +16,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
],
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2016-9428",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2016-12-12T02:59:17.843",
|
||||
"lastModified": "2023-12-29T18:38:04.570",
|
||||
"lastModified": "2024-10-15T19:35:08.300",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -16,6 +16,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
@ -74,6 +96,16 @@
|
||||
"value": "CWE-119"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2019-13990",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2019-07-26T19:15:11.730",
|
||||
"lastModified": "2023-12-22T16:35:35.523",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-15T19:35:09.210",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -74,6 +94,16 @@
|
||||
"value": "CWE-611"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-611"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2019-17661",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2019-11-08T18:15:13.527",
|
||||
"lastModified": "2024-02-14T17:00:29.027",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-15T19:35:12.793",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -74,6 +94,16 @@
|
||||
"value": "CWE-1236"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-1236"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2019-18279",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2019-11-13T18:15:11.000",
|
||||
"lastModified": "2023-12-08T18:54:42.680",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-15T19:35:14.120",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2020-28049",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2020-11-04T19:15:12.137",
|
||||
"lastModified": "2024-02-03T07:15:14.473",
|
||||
"lastModified": "2024-10-15T18:35:01.473",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.0,
|
||||
"impactScore": 5.2
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.0,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -74,6 +94,16 @@
|
||||
"value": "CWE-362"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-362"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2020-35662",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2021-02-27T05:15:13.753",
|
||||
"lastModified": "2023-12-21T18:22:07.907",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-15T19:35:21.893",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 5.2
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.4,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -74,6 +94,16 @@
|
||||
"value": "CWE-295"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-295"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2020-5529",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2020-02-11T12:15:21.210",
|
||||
"lastModified": "2023-12-07T17:56:27.147",
|
||||
"lastModified": "2024-10-15T19:35:22.773",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -74,6 +94,16 @@
|
||||
"value": "CWE-665"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-28117",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2021-03-20T21:15:11.827",
|
||||
"lastModified": "2023-12-28T16:24:49.047",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-15T18:35:02.437",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-34620",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2021-07-07T13:15:08.463",
|
||||
"lastModified": "2022-11-07T16:37:09.160",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-15T19:35:23.910",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-28136",
|
||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||
"published": "2022-03-29T13:15:08.187",
|
||||
"lastModified": "2023-12-21T01:42:53.653",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-15T19:35:24.497",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -74,6 +94,16 @@
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-30550",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-07-17T19:15:18.540",
|
||||
"lastModified": "2024-01-12T20:47:18.010",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-15T19:35:25.430",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-42716",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-12-12T20:15:10.713",
|
||||
"lastModified": "2023-12-14T20:02:26.400",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-15T19:35:25.727",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-45048",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2023-05-05T08:15:09.080",
|
||||
"lastModified": "2023-05-11T14:26:43.060",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-15T19:35:26.733",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -52,6 +52,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 6.0
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.4,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-45135",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2023-11-30T08:15:07.063",
|
||||
"lastModified": "2023-12-05T18:14:31.810",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-15T18:35:03.893",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-27530",
|
||||
"sourceIdentifier": "support@hackerone.com",
|
||||
"published": "2023-03-10T22:15:10.497",
|
||||
"lastModified": "2023-12-08T22:15:07.603",
|
||||
"lastModified": "2024-10-15T19:35:28.200",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -55,6 +75,16 @@
|
||||
"value": "CWE-400"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-770"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-29075",
|
||||
"sourceIdentifier": "psirt@autodesk.com",
|
||||
"published": "2023-11-23T04:15:07.340",
|
||||
"lastModified": "2023-11-30T02:20:10.977",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-15T18:35:05.263",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-30577",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-07-26T17:15:10.227",
|
||||
"lastModified": "2023-12-03T11:15:09.093",
|
||||
"lastModified": "2024-10-15T19:35:29.413",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-88"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-88"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-31038",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2023-05-08T09:15:09.280",
|
||||
"lastModified": "2023-05-15T16:10:47.323",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-15T19:35:30.310",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-31039",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2023-05-08T09:15:09.637",
|
||||
"lastModified": "2023-05-12T02:03:27.397",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-15T19:35:30.543",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-32007",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2023-05-02T09:15:10.207",
|
||||
"lastModified": "2023-05-10T20:16:41.367",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-15T18:35:05.553",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-36189",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-07-06T14:15:10.707",
|
||||
"lastModified": "2023-12-26T18:15:07.903",
|
||||
"lastModified": "2024-10-15T19:35:31.520",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-37203",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2023-07-05T10:15:09.687",
|
||||
"lastModified": "2024-01-07T11:15:12.023",
|
||||
"lastModified": "2024-10-15T19:35:32.430",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-38408",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-07-20T03:15:10.170",
|
||||
"lastModified": "2024-04-04T06:15:08.430",
|
||||
"lastModified": "2024-10-15T19:35:32.680",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-428"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-428"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-38428",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-07-18T00:15:09.577",
|
||||
"lastModified": "2023-12-15T15:47:05.687",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-15T19:35:33.587",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.2
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.1,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2023-3997",
|
||||
"sourceIdentifier": "prodsec@splunk.com",
|
||||
"published": "2023-07-31T17:15:10.110",
|
||||
"lastModified": "2024-04-10T01:15:15.117",
|
||||
"lastModified": "2024-10-15T19:15:16.200",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Splunk SOAR versions lower than 6.1.0 are indirectly affected by a potential vulnerability accessed through the user\u2019s terminal. A third party can send Splunk SOAR a maliciously crafted web request containing special ANSI characters to cause log file poisoning. When a terminal user attempts to view the poisoned logs, this can tamper with the terminal and cause possible malicious code execution from the terminal user\u2019s action."
|
||||
"value": "Splunk SOAR versions 6.0.2 and earlier are indirectly affected by a potential vulnerability accessed through the user\u2019s terminal. A third party can send Splunk SOAR a maliciously crafted web request containing special ANSI characters to cause log file poisoning. When a terminal user attempts to view the poisoned logs, this can tamper with the terminal and cause possible malicious code execution from the terminal user\u2019s action."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-45363",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-10-09T05:15:09.220",
|
||||
"lastModified": "2023-11-28T13:15:07.313",
|
||||
"lastModified": "2024-10-15T18:35:06.707",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-835"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-835"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-45463",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-10-13T13:15:11.987",
|
||||
"lastModified": "2023-12-08T21:01:43.550",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-15T18:35:08.103",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-45539",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-11-28T20:15:07.817",
|
||||
"lastModified": "2023-12-14T17:15:07.860",
|
||||
"lastModified": "2024-10-15T18:35:08.890",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 4.2
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 8.2,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 4.2
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-116"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-45802",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2023-10-23T07:15:11.330",
|
||||
"lastModified": "2024-10-14T09:15:02.967",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-10-15T18:42:31.357",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -41,7 +41,7 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@apache.org",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
@ -51,12 +51,12 @@
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"source": "security@apache.org",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-770"
|
||||
"value": "CWE-404"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2023-4571",
|
||||
"sourceIdentifier": "prodsec@splunk.com",
|
||||
"published": "2023-08-30T17:15:11.080",
|
||||
"lastModified": "2024-04-10T01:15:17.183",
|
||||
"lastModified": "2024-10-15T19:15:16.617",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In Splunk IT Service Intelligence (ITSI) versions below below 4.13.3, 4.15.3, or 4.17.1, a malicious actor can inject American National Standards Institute (ANSI) escape codes into Splunk ITSI log files that, when a vulnerable terminal application reads them, can run malicious code in the vulnerable application. This attack requires a user to use a terminal application that translates ANSI escape codes to read the malicious log file locally in the vulnerable terminal. The vulnerability also requires additional user interaction to succeed. \n\nThe vulnerability does not directly affect Splunk ITSI. The indirect impact on Splunk ITSI can vary significantly depending on the permissions in the vulnerable terminal application, as well as where and how the user reads the malicious log file. For example, users can copy the malicious file from Splunk ITSI and read it on their local machine."
|
||||
"value": "In Splunk IT Service Intelligence (ITSI) versions below 4.13.3 or 4.15.3, a malicious actor can inject American National Standards Institute (ANSI) escape codes into Splunk ITSI log files that, when a vulnerable terminal application reads them, can run malicious code in the vulnerable application. This attack requires a user to use a terminal application that translates ANSI escape codes to read the malicious log file locally in the vulnerable terminal. The vulnerability also requires additional user interaction to succeed. \n\nThe vulnerability does not directly affect Splunk ITSI. The indirect impact on Splunk ITSI can vary significantly depending on the permissions in the vulnerable terminal application, as well as where and how the user reads the malicious log file. For example, users can copy the malicious file from Splunk ITSI and read it on their local machine."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-46956",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-11-30T23:15:07.717",
|
||||
"lastModified": "2023-12-06T18:39:39.687",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-15T18:35:09.673",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-48655",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-11-17T05:15:12.640",
|
||||
"lastModified": "2024-01-10T00:15:45.530",
|
||||
"lastModified": "2024-10-15T18:35:10.453",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-116"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-48848",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-11-28T17:15:08.417",
|
||||
"lastModified": "2023-12-04T19:05:42.390",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-15T18:35:11.340",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-48910",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-12-04T17:15:07.137",
|
||||
"lastModified": "2023-12-07T21:02:12.637",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-15T18:35:12.120",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-918"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-918"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-1873",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2024-06-06T19:15:51.460",
|
||||
"lastModified": "2024-06-07T14:56:05.647",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-10-15T19:14:09.547",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -16,6 +16,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.1,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
],
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
@ -41,8 +63,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -51,10 +83,30 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:lollms:lollms_web_ui:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E0447480-50CE-4682-B3B1-B8F021C5C731"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://huntr.com/bounties/c1cfc0d9-517a-4d0e-bf1c-6444c1fd195d",
|
||||
"source": "security@huntr.dev"
|
||||
"source": "security@huntr.dev",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-22326",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-06-06T19:15:52.137",
|
||||
"lastModified": "2024-06-07T14:56:05.647",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-10-15T19:51:10.393",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-306"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Secondary",
|
||||
@ -51,14 +81,63 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:ibm:ds8900f_firmware:89.22.19.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A267414E-0859-4553-AD48-D2A64BE3A46B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:ibm:ds8900f_firmware:89.30.68.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9BE006ED-0B99-4246-8F7A-F29766B2972E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:ibm:ds8900f_firmware:89.32.40.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "02F52CB5-DFE0-490B-801A-714B46D03CDA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:ibm:ds8900f_firmware:89.33.48.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6E55E128-B1F1-4E1D-BA57-85DCA7AADEAB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:ibm:ds8900f_firmware:89.40.83.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3ADADE10-E7D1-4FC6-B755-88CE28BFAADE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:ibm:ds8900f_firmware:89.40.93.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "919EDF00-BF73-4EE1-8D7F-2365C872C8E9"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/279518",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"VDB Entry",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7156621",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-24879",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-02-08T12:15:55.973",
|
||||
"lastModified": "2024-02-08T13:44:11.750",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-10-15T19:39:30.157",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ylefebvre:link_library:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "7.5.13",
|
||||
"matchCriteriaId": "8CC556B7-656B-48C5-BF04-F96422CAD4C8"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/link-library/wordpress-link-library-plugin-7-5-13-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-24880",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-02-08T12:15:56.170",
|
||||
"lastModified": "2024-02-08T13:44:11.750",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-10-15T19:41:39.670",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apollo13themes:apollo13_framework_extensions:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "1.9.2",
|
||||
"matchCriteriaId": "8DE78A6F-B113-4964-A903-76C5649B0312"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/apollo13-framework-extensions/wordpress-apollo13-framework-extensions-plugin-1-9-2-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2624",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2024-06-06T19:15:55.437",
|
||||
"lastModified": "2024-06-07T14:56:05.647",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-10-15T18:49:16.667",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -16,6 +16,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
@ -41,8 +63,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -51,14 +83,39 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:lollms:lollms_web_ui:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "9.4",
|
||||
"matchCriteriaId": "E8DA02EF-1A49-47C3-B2E4-5F70C25D8B34"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/parisneo/lollms-webui/commit/aeba79f3ea934331b8ecd625a58bae6e4f7e7d3f",
|
||||
"source": "security@huntr.dev"
|
||||
"source": "security@huntr.dev",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://huntr.com/bounties/39e17897-0e92-4473-91c7-f728322191aa",
|
||||
"source": "security@huntr.dev"
|
||||
"source": "security@huntr.dev",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-29946",
|
||||
"sourceIdentifier": "prodsec@splunk.com",
|
||||
"published": "2024-03-27T17:15:54.273",
|
||||
"lastModified": "2024-08-12T20:35:03.383",
|
||||
"lastModified": "2024-10-15T18:35:13.400",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -79,16 +79,6 @@
|
||||
"value": "CWE-20"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-1287"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2965",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2024-06-06T19:15:55.897",
|
||||
"lastModified": "2024-06-25T11:15:49.873",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-10-15T18:55:04.863",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 4.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.0,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
"type": "Secondary",
|
||||
@ -41,8 +61,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-674"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -51,10 +81,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:langchain:langchain:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "0.2.5",
|
||||
"matchCriteriaId": "9A6F06FB-8127-41C1-A077-6C0B9E45B58E"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://huntr.com/bounties/90b0776d-9fa6-4841-aac4-09fde5918cae",
|
||||
"source": "security@huntr.dev"
|
||||
"source": "security@huntr.dev",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-30373",
|
||||
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||
"published": "2024-06-06T19:15:56.167",
|
||||
"lastModified": "2024-06-07T14:56:05.647",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-10-15T18:23:52.207",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -16,6 +16,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
@ -40,6 +62,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +83,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:tungstenautomation:power_pdf:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "5.0.0.21",
|
||||
"matchCriteriaId": "9A747AB2-C10E-48A0-AD8B-921061C1FEDF"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-557/",
|
||||
"source": "zdi-disclosures@trendmicro.com"
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-32873",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-06-06T19:15:56.390",
|
||||
"lastModified": "2024-06-07T14:56:05.647",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-10-15T19:22:33.647",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-682"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -51,14 +81,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:evmos:evmos:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "18.0.0",
|
||||
"matchCriteriaId": "0A019FA6-35D5-44D6-B008-79D56A86C6B1"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/evmos/evmos/commit/b2a09ca66613d8b04decd3f2dcba8e1e77709dcb",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/evmos/evmos/security/advisories/GHSA-pxv8-qhrh-jc7v",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2024/CVE-2024-355xx/CVE-2024-35584.json
Normal file
29
CVE-2024/CVE-2024-355xx/CVE-2024-35584.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2024-35584",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-15T19:15:16.957",
|
||||
"lastModified": "2024-10-15T19:15:16.957",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SQL injection vulnerability in Ajax.php, ForWindow.php, ForExport.php, Modules.php, functions/HackingLogFnc.php in OpenSis Community Edition 9.1, 8.0, and possibly earlier versions. It is possible for an authenticated user to perform SQL Injection due to the lack to sanitisation. The application takes arbitrary value from \"X-Forwarded-For\" header and appends it to a SQL INSERT statement directly, leading to SQL Injection."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://opensis.com",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://os4ed.com",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/whwhwh96/CVE-2024-35584",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-36264",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-06-12T14:15:11.983",
|
||||
"lastModified": "2024-10-14T09:15:04.000",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-10-15T18:46:46.633",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [
|
||||
{
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
@ -53,7 +53,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-798"
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-36730",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-06-06T19:15:57.840",
|
||||
"lastModified": "2024-06-07T14:56:05.647",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-10-15T19:25:24.773",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,11 +15,66 @@
|
||||
"value": "Validaci\u00f3n de entrada incorrecta en OneFlow-Inc. Oneflow v0.9.1 permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) ingresando valores negativos en el par\u00e1metro oneflow.zeros/ones. "
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-755"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oneflow:oneflow:0.9.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E8058A82-101A-4B97-9169-0EEFDB712EA8"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/Redmept1on/1c530e191fb3c76f034c2ea1d11eb821",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-36735",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-06-06T19:15:58.117",
|
||||
"lastModified": "2024-06-07T14:56:05.647",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-10-15T19:31:49.630",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,11 +15,66 @@
|
||||
"value": "OneFlow-Inc. Oneflow v0.9.1 no muestra un error o advertencia cuando el par\u00e1metro oneflow.eye est\u00e1 flotante."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oneflow:oneflow:0.9.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E8058A82-101A-4B97-9169-0EEFDB712EA8"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/Redmept1on/4998e9b6435448cea07a8b2dbf96eedc",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-36983",
|
||||
"sourceIdentifier": "prodsec@splunk.com",
|
||||
"published": "2024-07-01T17:15:06.257",
|
||||
"lastModified": "2024-07-08T14:18:39.520",
|
||||
"lastModified": "2024-10-15T18:35:13.550",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -49,16 +49,6 @@
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-75"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-36984",
|
||||
"sourceIdentifier": "prodsec@splunk.com",
|
||||
"published": "2024-07-01T17:15:06.480",
|
||||
"lastModified": "2024-07-03T02:03:57.773",
|
||||
"lastModified": "2024-10-15T18:35:13.683",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -49,16 +49,6 @@
|
||||
"value": "CWE-502"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-502"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-36985",
|
||||
"sourceIdentifier": "prodsec@splunk.com",
|
||||
"published": "2024-07-01T17:15:06.703",
|
||||
"lastModified": "2024-07-08T14:18:40.360",
|
||||
"lastModified": "2024-10-15T18:35:13.810",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -49,16 +49,6 @@
|
||||
"value": "CWE-687"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-253"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-36991",
|
||||
"sourceIdentifier": "prodsec@splunk.com",
|
||||
"published": "2024-07-01T17:15:07.860",
|
||||
"lastModified": "2024-07-22T15:00:45.110",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-15T18:35:13.927",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -79,16 +79,6 @@
|
||||
"value": "CWE-35"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-35"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-36997",
|
||||
"sourceIdentifier": "prodsec@splunk.com",
|
||||
"published": "2024-07-01T17:15:09.143",
|
||||
"lastModified": "2024-07-08T14:18:42.053",
|
||||
"lastModified": "2024-10-15T18:35:14.063",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -49,16 +49,6 @@
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-75"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-37153",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-06-06T19:15:58.403",
|
||||
"lastModified": "2024-06-07T14:56:05.647",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-10-15T19:40:12.917",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-670"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -51,14 +81,39 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:evmos:evmos:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "18.1.0",
|
||||
"matchCriteriaId": "86A51586-C030-485C-BD16-98B0B6C30BC1"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/evmos/evmos/commit/478b7a62e7af57a70cf3a01126c7f5a89bee69d7",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/evmos/evmos/security/advisories/GHSA-xgr7-jgq3-mhmc",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-37154",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-06-06T19:15:58.683",
|
||||
"lastModified": "2024-06-07T14:56:05.647",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-10-15T19:43:51.117",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,30 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:evmos:evmos:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1A616824-97B4-4783-9D1D-E06E56D62E6E"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/evmos/evmos/security/advisories/GHSA-7hrh-v6wp-53vw",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-413xx/CVE-2024-41344.json
Normal file
21
CVE-2024/CVE-2024-413xx/CVE-2024-41344.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-41344",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-15T19:15:17.287",
|
||||
"lastModified": "2024-10-15T19:15:17.287",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A Cross-Site Request Forgery (CSRF) in Codeigniter 3.1.13 allows attackers to arbitrarily change the Administrator password and escalate privileges."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/kirilkirkov/Ecommerce-CodeIgniter-Bootstrap/issues/264",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-46468",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-11T21:15:07.040",
|
||||
"lastModified": "2024-10-15T12:57:46.880",
|
||||
"lastModified": "2024-10-15T18:35:14.680",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Existe una vulnerabilidad de Server-Side Request Forgery (SSRF) en jpress <= v5.1.1, que puede ser explotada por un atacante para obtener informaci\u00f3n confidencial, lo que resulta en una divulgaci\u00f3n de informaci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-918"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/ilikeoyt/b396bbb9ef858105c46e999630e7afbe",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-47135",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2024-10-03T03:15:02.697",
|
||||
"lastModified": "2024-10-04T13:50:43.727",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-10-15T18:21:04.813",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "vultures@jpcert.or.jp",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "vultures@jpcert.or.jp",
|
||||
"type": "Secondary",
|
||||
@ -51,18 +81,45 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:jtekt:kostac_plc:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "1.6.15.0",
|
||||
"matchCriteriaId": "4D035F46-CBB8-40BD-B819-DB523E055234"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://jvn.jp/en/vu/JVNVU92808077/",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
"source": "vultures@jpcert.or.jp",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.electronics.jtekt.co.jp/en/topics/202410026928/",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
"source": "vultures@jpcert.or.jp",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.electronics.jtekt.co.jp/jp/topics/2024100217388/",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
"source": "vultures@jpcert.or.jp",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-47136",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2024-10-03T03:15:02.903",
|
||||
"lastModified": "2024-10-04T13:50:43.727",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-10-15T18:20:40.387",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "vultures@jpcert.or.jp",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "vultures@jpcert.or.jp",
|
||||
"type": "Secondary",
|
||||
@ -51,18 +81,45 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:jtekt:kostac_plc:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "1.6.15.0",
|
||||
"matchCriteriaId": "4D035F46-CBB8-40BD-B819-DB523E055234"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://jvn.jp/en/vu/JVNVU92808077/",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
"source": "vultures@jpcert.or.jp",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.electronics.jtekt.co.jp/en/topics/202410026928/",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
"source": "vultures@jpcert.or.jp",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.electronics.jtekt.co.jp/jp/topics/2024100217388/",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
"source": "vultures@jpcert.or.jp",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-48249",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-14T15:15:13.760",
|
||||
"lastModified": "2024-10-15T12:57:46.880",
|
||||
"lastModified": "2024-10-15T18:35:15.607",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Wavelog 1.8.5 permite la inyecci\u00f3n SQL get_band_confirmed de Gridmap_model.php mediante banda, sat\u00e9lite, propagaci\u00f3n o modo."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chiggerlor.substack.com/p/unauthenticated-sql-injection-in",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-48253",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-14T14:15:11.857",
|
||||
"lastModified": "2024-10-15T12:57:46.880",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-15T19:35:37.163",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Cloudlog 2.6.15 permite la inyecci\u00f3n SQL del identificador delete_oqrs_line de Oqrs.php."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chiggerlor.substack.com/p/unauthenticated-sql-injection-in-9a3",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-48259",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-14T15:15:14.033",
|
||||
"lastModified": "2024-10-15T12:57:46.880",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-15T19:35:38.413",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Cloudlog 2.6.15 permite la inyecci\u00f3n SQL de request_form Oqrs.php a trav\u00e9s de station_id o callsign."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chiggerlor.substack.com/p/unauthenticated-sql-injection-in-9a3",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-48624",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-15T16:15:05.840",
|
||||
"lastModified": "2024-10-15T16:15:05.840",
|
||||
"lastModified": "2024-10-15T18:35:16.363",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "In segments\\edit.php of DomainMOD below v4.12.0, the segid parameter in the GET request can be exploited to cause a reflected Cross Site Scripting (XSS) vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/domainmod/domainmod/issues/175",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-48769",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-11T20:15:05.353",
|
||||
"lastModified": "2024-10-15T12:57:46.880",
|
||||
"lastModified": "2024-10-15T19:35:39.423",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Un problema en BURG-WCHTER KG de.burgwachter.keyapp.app 4.5.0 permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s del proceso de actualizaci\u00f3n del firmware."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 9.1,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://burg-wchter.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-48772",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-11T21:15:07.127",
|
||||
"lastModified": "2024-10-15T12:57:46.880",
|
||||
"lastModified": "2024-10-15T19:35:40.267",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Un problema en C-CHIP (com.cchip.cchipamaota) v.1.2.8 permite que un atacante remoto obtenga informaci\u00f3n confidencial a trav\u00e9s del proceso de actualizaci\u00f3n del firmware."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 9.1,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://comcchipcchipamaota.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-48777",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-11T20:15:05.997",
|
||||
"lastModified": "2024-10-15T12:57:46.880",
|
||||
"lastModified": "2024-10-15T19:35:41.067",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "LEDVANCE com.ledvance.smartplus.eu 2.1.10 permite que un atacante remoto obtenga informaci\u00f3n confidencial a trav\u00e9s del proceso de actualizaci\u00f3n del firmware."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-306"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://comledvancesmartpluseu.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-48778",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-11T20:15:06.090",
|
||||
"lastModified": "2024-10-15T12:57:46.880",
|
||||
"lastModified": "2024-10-15T19:35:41.840",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Un problema en GIANT MANUFACTURING CO., LTD RideLink (tw.giant.ridelink) 2.0.7 permite que un atacante remoto obtenga informaci\u00f3n confidencial a trav\u00e9s del proceso de actualizaci\u00f3n del firmware."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 9.1,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://giant.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-48784",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-11T20:15:06.180",
|
||||
"lastModified": "2024-10-15T12:57:46.880",
|
||||
"lastModified": "2024-10-15T19:35:42.627",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Un problema de control de acceso incorrecto en SAMPMAX com.sampmax.homemax 2.1.2.7 permite que un atacante remoto obtenga informaci\u00f3n confidencial a trav\u00e9s del proceso de actualizaci\u00f3n del firmware."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://comsampmaxhomemax.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-48786",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-11T20:15:06.277",
|
||||
"lastModified": "2024-10-15T12:57:46.880",
|
||||
"lastModified": "2024-10-15T19:35:43.413",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Un problema en SWITCHBOT INC SwitchBot (com.theswitchbot.switchbot) 5.0.4 permite que un atacante remoto obtenga informaci\u00f3n confidencial a trav\u00e9s del proceso de actualizaci\u00f3n del firmware."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 9.1,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://switchbot.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-48787",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-11T20:15:06.407",
|
||||
"lastModified": "2024-10-15T12:57:46.880",
|
||||
"lastModified": "2024-10-15T19:35:44.190",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Un problema en Revic Optics Revic Ops (us.revic.revicops) 1.12.5 permite que un atacante remoto obtenga informaci\u00f3n confidencial a trav\u00e9s del proceso de actualizaci\u00f3n del firmware."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 9.1,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://revic.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-48788",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-11T21:15:07.220",
|
||||
"lastModified": "2024-10-15T12:57:46.880",
|
||||
"lastModified": "2024-10-15T19:35:44.980",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Un problema en YESCAM (com.yescom.YesCam.zwave) 1.0.2 permite que un atacante remoto obtenga informaci\u00f3n confidencial a trav\u00e9s del proceso de actualizaci\u00f3n del firmware."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-319"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://yescam.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-48915",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-10-15T17:15:11.943",
|
||||
"lastModified": "2024-10-15T17:15:11.943",
|
||||
"lastModified": "2024-10-15T19:35:45.867",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -55,6 +55,28 @@
|
||||
"baseSeverity": "HIGH"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 0.0,
|
||||
"baseSeverity": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 0.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-48933",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-09T23:15:11.017",
|
||||
"lastModified": "2024-10-11T21:36:45.080",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-10-15T18:56:52.363",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,33 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:lemonldap-ng:lemonldap\\:\\:ng:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "2.19.3",
|
||||
"matchCriteriaId": "1BA4655A-220E-47D6-B393-8F158ADF411F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/issues/3232",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Issue Tracking",
|
||||
"Mitigation",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-4889",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2024-06-06T18:15:18.577",
|
||||
"lastModified": "2024-06-07T14:56:05.647",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-10-15T19:00:09.633",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -16,6 +16,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
@ -51,10 +73,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:litellm:litellm:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "1.44.16",
|
||||
"matchCriteriaId": "C90542D4-7994-47FF-8394-D537FCF72331"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://huntr.com/bounties/be3fda72-a65b-4993-9a0e-7e0f05db51f8",
|
||||
"source": "security@huntr.dev"
|
||||
"source": "security@huntr.dev",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-57xx/CVE-2024-5749.json
Normal file
56
CVE-2024/CVE-2024-57xx/CVE-2024-5749.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-5749",
|
||||
"sourceIdentifier": "hp-security-alert@hp.com",
|
||||
"published": "2024-10-15T18:15:05.997",
|
||||
"lastModified": "2024-10-15T18:15:05.997",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Certain HP DesignJet products may be vulnerable to credential reflection which allow viewing SMTP server credentials."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "hp-security-alert@hp.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "hp-security-alert@hp.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-306"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.hp.com/us-en/document/ish_11428772-11428805-16/hpsbpi03979",
|
||||
"source": "hp-security-alert@hp.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-7038",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2024-10-09T19:15:14.930",
|
||||
"lastModified": "2024-10-10T12:51:56.987",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-10-15T19:04:48.627",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -16,6 +16,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 2.7,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
@ -41,8 +63,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-209"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -51,10 +83,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:openwebui:open_webui:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1233F450-99C2-4F5A-A47E-5F341BEA0E1B"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://huntr.com/bounties/f42cf72a-8015-44a6-81a9-c6332ef05afc",
|
||||
"source": "security@huntr.dev"
|
||||
"source": "security@huntr.dev",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-8690",
|
||||
"sourceIdentifier": "psirt@paloaltonetworks.com",
|
||||
"published": "2024-09-11T17:15:14.487",
|
||||
"lastModified": "2024-10-03T01:29:08.547",
|
||||
"lastModified": "2024-10-15T18:38:32.260",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -107,6 +107,7 @@
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
@ -114,8 +115,19 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:7.9.102-ce:*:*:*:*:windows:*:*",
|
||||
"matchCriteriaId": "F2C371CD-A60B-4DEE-8D83-F240ADA3BB7E"
|
||||
"criteria": "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:7.9.102:*:*:*:critical_environment:*:*:*",
|
||||
"matchCriteriaId": "DAD96F99-F6DD-4310-AC22-23354CB10FF8"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-9341",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-10-01T19:15:09.500",
|
||||
"lastModified": "2024-10-14T15:15:14.373",
|
||||
"lastModified": "2024-10-15T19:15:17.707",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -56,6 +56,10 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:8039",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:8112",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2024-9341",
|
||||
"source": "secalert@redhat.com"
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-9469",
|
||||
"sourceIdentifier": "psirt@paloaltonetworks.com",
|
||||
"published": "2024-10-09T17:15:20.770",
|
||||
"lastModified": "2024-10-10T12:51:56.987",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-10-15T18:38:25.647",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -59,9 +59,41 @@
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-754"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "psirt@paloaltonetworks.com",
|
||||
"type": "Secondary",
|
||||
@ -73,10 +105,54 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:*:*:*:*:critical_environment:*:*:*",
|
||||
"versionStartIncluding": "7.9",
|
||||
"versionEndExcluding": "7.9.102",
|
||||
"matchCriteriaId": "E7510DB5-E41B-484D-8BE8-12F7BECA18C6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:8.3.0:*:*:*:-:*:*:*",
|
||||
"matchCriteriaId": "8632049D-4794-46B0-88A8-D14261C40620"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:8.4.0:*:*:*:-:*:*:*",
|
||||
"matchCriteriaId": "01CDA3EB-9E29-4A07-B9CF-219436C170D4"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.paloaltonetworks.com/CVE-2024-9469",
|
||||
"source": "psirt@paloaltonetworks.com"
|
||||
"source": "psirt@paloaltonetworks.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-9473",
|
||||
"sourceIdentifier": "psirt@paloaltonetworks.com",
|
||||
"published": "2024-10-09T17:15:21.230",
|
||||
"lastModified": "2024-10-10T12:51:56.987",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-10-15T18:54:54.560",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -59,9 +59,41 @@
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "psirt@paloaltonetworks.com",
|
||||
"type": "Secondary",
|
||||
@ -73,10 +105,42 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:windows:*:*",
|
||||
"versionStartIncluding": "5.1",
|
||||
"versionEndExcluding": "6.2.5",
|
||||
"matchCriteriaId": "7E2CBAA4-7E71-4769-BBD6-6AF13714E565"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:paloaltonetworks:globalprotect:6.3.0:*:*:*:*:windows:*:*",
|
||||
"matchCriteriaId": "CF300947-06F7-4027-B57A-1F3388233670"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:paloaltonetworks:globalprotect:6.3.1:*:*:*:*:windows:*:*",
|
||||
"matchCriteriaId": "11061375-2C2C-47B4-A3ED-B1DA70F96642"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.paloaltonetworks.com/CVE-2024-9473",
|
||||
"source": "psirt@paloaltonetworks.com"
|
||||
"source": "psirt@paloaltonetworks.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-9794",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-10-10T16:15:09.350",
|
||||
"lastModified": "2024-10-15T12:58:51.050",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-15T19:12:36.503",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -120,22 +140,56 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:codezips:online_shopping_portal:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "755F393E-3C39-4717-A053-6820CD4965B2"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ppp-src/CVE/issues/7",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.279947",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.279947",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.417583",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-9796",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-10-10T08:15:04.140",
|
||||
"lastModified": "2024-10-10T15:35:16.310",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-10-15T18:46:53.397",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -39,10 +59,44 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:internet-formation:wp-advanced-search:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "3.3.9.2",
|
||||
"matchCriteriaId": "C3DB91B5-A9DD-4476-9012-0FF3AA9C7D8B"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/2ddd6839-6bcb-4bb8-97e0-1516b8c2b99b/",
|
||||
"source": "contact@wpscan.com"
|
||||
"source": "contact@wpscan.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-9797",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-10-10T17:15:16.063",
|
||||
"lastModified": "2024-10-15T12:58:51.050",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-15T19:14:42.600",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -120,26 +140,63 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:code-projects:blood_bank_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CB3CB4C2-E5C6-4136-B3A8-418484B48FD2"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://code-projects.org/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/siyuancn-hub/cve/blob/main/sql4-user.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.279948",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.279948",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.417586",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-9804",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-10-10T18:15:09.150",
|
||||
"lastModified": "2024-10-15T12:58:51.050",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-15T19:17:27.083",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -120,26 +140,63 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:code-projects:blood_bank_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CB3CB4C2-E5C6-4136-B3A8-418484B48FD2"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://code-projects.org/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/sternstundes/cve/blob/main/sql5-campdetails.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.279952",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.279952",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.418618",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-9805",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-10-10T18:15:09.440",
|
||||
"lastModified": "2024-10-15T12:58:51.050",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-15T19:18:27.987",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -120,26 +140,63 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:code-projects:blood_bank_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CB3CB4C2-E5C6-4136-B3A8-418484B48FD2"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://code-projects.org/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/sternstundes/cve/blob/main/xss5.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.279953",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.279953",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.418619",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-9808",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-10-10T20:15:05.003",
|
||||
"lastModified": "2024-10-15T12:58:51.050",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-15T19:19:57.720",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -120,26 +140,63 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oretnom23:online_eyewear_shop:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "464A3580-D632-43EB-93EF-E2A1A5736F14"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/r1ckyL/cve/blob/main/sql.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.279960",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.279960",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.420744",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.sourcecodester.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-9809",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-10-10T20:15:05.267",
|
||||
"lastModified": "2024-10-15T12:58:51.050",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-15T19:21:13.343",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -120,26 +140,63 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oretnom23:online_eyewear_shop:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "464A3580-D632-43EB-93EF-E2A1A5736F14"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/wuyanzu-lab/cve/blob/main/sql.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.279961",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.279961",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.420745",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.sourcecodester.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-9810",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-10-10T20:15:05.517",
|
||||
"lastModified": "2024-10-15T12:58:51.050",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-15T19:22:00.260",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -120,26 +140,63 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:jkev:record_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "457BEE12-29ED-48B8-8C96-E181F0E80B56"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/GangZhou1/VUL/blob/main/Record-Management-System-1.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.279962",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.279962",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.420806",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.sourcecodester.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-9811",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-10-10T21:15:05.383",
|
||||
"lastModified": "2024-10-15T12:58:51.050",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-15T19:22:35.447",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -120,26 +140,63 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:code-projects:restaurant_reservation_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EE12AD85-FC4C-4F66-82E3-7BDCB43D3903"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://code-projects.org/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/ppp-src/a/issues/24",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.279963",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.279963",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.418728",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-9812",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-10-10T21:15:05.677",
|
||||
"lastModified": "2024-10-15T12:58:51.050",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-15T19:22:51.340",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -120,26 +140,63 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:code-projects:crud_operation_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D15BB350-68BE-4E74-B9CE-BC9120B6F230"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://code-projects.org/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/ppp-src/a/issues/25",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.279964",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.279964",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.418729",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-9813",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-10-10T21:15:05.963",
|
||||
"lastModified": "2024-10-15T12:58:51.050",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-15T19:23:28.953",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -120,22 +140,56 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:codezips:pharmacy_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F881269F-6B88-4C78-866B-B408AA5711F1"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ppp-src/CVE/issues/10",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.279965",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.279965",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.418904",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-9859",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2024-10-11T17:15:04.677",
|
||||
"lastModified": "2024-10-15T12:57:46.880",
|
||||
"lastModified": "2024-10-15T19:35:46.273",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,30 @@
|
||||
"value": "La confusi\u00f3n de tipos en WebAssembly en Google Chrome anterior a la versi\u00f3n 126.0.6478.126 permit\u00eda a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de una p\u00e1gina HTML manipulada a medida. (Gravedad de seguridad de Chromium: alta)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
@ -26,6 +49,16 @@
|
||||
"value": "CWE-843"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-843"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-9973",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-10-15T10:15:04.297",
|
||||
"lastModified": "2024-10-15T12:57:46.880",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-15T19:27:44.020",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -120,26 +140,58 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oretnom23:online_eyewear_shop:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "464A3580-D632-43EB-93EF-E2A1A5736F14"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/higordiego/b9699573de61b26f2290e69f38d23fd0",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.280338",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.280338",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.423167",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.sourcecodester.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-9974",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-10-15T10:15:04.777",
|
||||
"lastModified": "2024-10-15T12:57:46.880",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-15T19:28:37.377",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -120,26 +140,59 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oretnom23:online_eyewear_shop:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "464A3580-D632-43EB-93EF-E2A1A5736F14"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/higordiego/2373b9e3e89f03e5f8888efd38eb4b48",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.280339",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.280339",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.423231",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.sourcecodester.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
75
README.md
75
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-10-15T18:00:20.241933+00:00
|
||||
2024-10-15T20:00:18.097712+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-10-15T17:35:51.263000+00:00
|
||||
2024-10-15T19:51:10.393000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,56 +33,47 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
265604
|
||||
265607
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `12`
|
||||
Recently added CVEs: `3`
|
||||
|
||||
- [CVE-2024-47779](CVE-2024/CVE-2024-477xx/CVE-2024-47779.json) (`2024-10-15T16:15:04.963`)
|
||||
- [CVE-2024-47824](CVE-2024/CVE-2024-478xx/CVE-2024-47824.json) (`2024-10-15T16:15:05.120`)
|
||||
- [CVE-2024-47874](CVE-2024/CVE-2024-478xx/CVE-2024-47874.json) (`2024-10-15T16:15:05.260`)
|
||||
- [CVE-2024-47876](CVE-2024/CVE-2024-478xx/CVE-2024-47876.json) (`2024-10-15T16:15:05.420`)
|
||||
- [CVE-2024-48622](CVE-2024/CVE-2024-486xx/CVE-2024-48622.json) (`2024-10-15T16:15:05.680`)
|
||||
- [CVE-2024-48623](CVE-2024/CVE-2024-486xx/CVE-2024-48623.json) (`2024-10-15T16:15:05.767`)
|
||||
- [CVE-2024-48624](CVE-2024/CVE-2024-486xx/CVE-2024-48624.json) (`2024-10-15T16:15:05.840`)
|
||||
- [CVE-2024-48913](CVE-2024/CVE-2024-489xx/CVE-2024-48913.json) (`2024-10-15T16:15:05.960`)
|
||||
- [CVE-2024-48914](CVE-2024/CVE-2024-489xx/CVE-2024-48914.json) (`2024-10-15T16:15:06.270`)
|
||||
- [CVE-2024-48915](CVE-2024/CVE-2024-489xx/CVE-2024-48915.json) (`2024-10-15T17:15:11.943`)
|
||||
- [CVE-2024-9506](CVE-2024/CVE-2024-95xx/CVE-2024-9506.json) (`2024-10-15T16:15:06.650`)
|
||||
- [CVE-2024-9676](CVE-2024/CVE-2024-96xx/CVE-2024-9676.json) (`2024-10-15T16:15:06.933`)
|
||||
- [CVE-2024-35584](CVE-2024/CVE-2024-355xx/CVE-2024-35584.json) (`2024-10-15T19:15:16.957`)
|
||||
- [CVE-2024-41344](CVE-2024/CVE-2024-413xx/CVE-2024-41344.json) (`2024-10-15T19:15:17.287`)
|
||||
- [CVE-2024-5749](CVE-2024/CVE-2024-57xx/CVE-2024-5749.json) (`2024-10-15T18:15:05.997`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `43`
|
||||
Recently modified CVEs: `93`
|
||||
|
||||
- [CVE-2024-45470](CVE-2024/CVE-2024-454xx/CVE-2024-45470.json) (`2024-10-15T17:18:52.227`)
|
||||
- [CVE-2024-45471](CVE-2024/CVE-2024-454xx/CVE-2024-45471.json) (`2024-10-15T17:18:37.377`)
|
||||
- [CVE-2024-45472](CVE-2024/CVE-2024-454xx/CVE-2024-45472.json) (`2024-10-15T17:15:34.937`)
|
||||
- [CVE-2024-45473](CVE-2024/CVE-2024-454xx/CVE-2024-45473.json) (`2024-10-15T17:31:56.830`)
|
||||
- [CVE-2024-45474](CVE-2024/CVE-2024-454xx/CVE-2024-45474.json) (`2024-10-15T17:31:54.730`)
|
||||
- [CVE-2024-45475](CVE-2024/CVE-2024-454xx/CVE-2024-45475.json) (`2024-10-15T17:31:52.313`)
|
||||
- [CVE-2024-45476](CVE-2024/CVE-2024-454xx/CVE-2024-45476.json) (`2024-10-15T17:31:50.310`)
|
||||
- [CVE-2024-45754](CVE-2024/CVE-2024-457xx/CVE-2024-45754.json) (`2024-10-15T16:35:07.827`)
|
||||
- [CVE-2024-45806](CVE-2024/CVE-2024-458xx/CVE-2024-45806.json) (`2024-10-15T16:03:44.943`)
|
||||
- [CVE-2024-46535](CVE-2024/CVE-2024-465xx/CVE-2024-46535.json) (`2024-10-15T16:35:08.740`)
|
||||
- [CVE-2024-47661](CVE-2024/CVE-2024-476xx/CVE-2024-47661.json) (`2024-10-15T16:03:29.260`)
|
||||
- [CVE-2024-47771](CVE-2024/CVE-2024-477xx/CVE-2024-47771.json) (`2024-10-15T16:15:04.860`)
|
||||
- [CVE-2024-47944](CVE-2024/CVE-2024-479xx/CVE-2024-47944.json) (`2024-10-15T16:35:09.410`)
|
||||
- [CVE-2024-47945](CVE-2024/CVE-2024-479xx/CVE-2024-47945.json) (`2024-10-15T17:35:06.870`)
|
||||
- [CVE-2024-48120](CVE-2024/CVE-2024-481xx/CVE-2024-48120.json) (`2024-10-15T16:35:09.650`)
|
||||
- [CVE-2024-48150](CVE-2024/CVE-2024-481xx/CVE-2024-48150.json) (`2024-10-15T16:35:10.450`)
|
||||
- [CVE-2024-48168](CVE-2024/CVE-2024-481xx/CVE-2024-48168.json) (`2024-10-15T16:35:11.240`)
|
||||
- [CVE-2024-48279](CVE-2024/CVE-2024-482xx/CVE-2024-48279.json) (`2024-10-15T16:35:11.997`)
|
||||
- [CVE-2024-48280](CVE-2024/CVE-2024-482xx/CVE-2024-48280.json) (`2024-10-15T16:35:12.753`)
|
||||
- [CVE-2024-48283](CVE-2024/CVE-2024-482xx/CVE-2024-48283.json) (`2024-10-15T16:35:13.517`)
|
||||
- [CVE-2024-48770](CVE-2024/CVE-2024-487xx/CVE-2024-48770.json) (`2024-10-15T17:35:07.440`)
|
||||
- [CVE-2024-48796](CVE-2024/CVE-2024-487xx/CVE-2024-48796.json) (`2024-10-15T16:35:14.433`)
|
||||
- [CVE-2024-48798](CVE-2024/CVE-2024-487xx/CVE-2024-48798.json) (`2024-10-15T16:35:14.783`)
|
||||
- [CVE-2024-9399](CVE-2024/CVE-2024-93xx/CVE-2024-9399.json) (`2024-10-15T16:04:59.350`)
|
||||
- [CVE-2024-9471](CVE-2024/CVE-2024-94xx/CVE-2024-9471.json) (`2024-10-15T16:55:45.090`)
|
||||
- [CVE-2024-48786](CVE-2024/CVE-2024-487xx/CVE-2024-48786.json) (`2024-10-15T19:35:43.413`)
|
||||
- [CVE-2024-48787](CVE-2024/CVE-2024-487xx/CVE-2024-48787.json) (`2024-10-15T19:35:44.190`)
|
||||
- [CVE-2024-48788](CVE-2024/CVE-2024-487xx/CVE-2024-48788.json) (`2024-10-15T19:35:44.980`)
|
||||
- [CVE-2024-4889](CVE-2024/CVE-2024-48xx/CVE-2024-4889.json) (`2024-10-15T19:00:09.633`)
|
||||
- [CVE-2024-48915](CVE-2024/CVE-2024-489xx/CVE-2024-48915.json) (`2024-10-15T19:35:45.867`)
|
||||
- [CVE-2024-48933](CVE-2024/CVE-2024-489xx/CVE-2024-48933.json) (`2024-10-15T18:56:52.363`)
|
||||
- [CVE-2024-7038](CVE-2024/CVE-2024-70xx/CVE-2024-7038.json) (`2024-10-15T19:04:48.627`)
|
||||
- [CVE-2024-8690](CVE-2024/CVE-2024-86xx/CVE-2024-8690.json) (`2024-10-15T18:38:32.260`)
|
||||
- [CVE-2024-9341](CVE-2024/CVE-2024-93xx/CVE-2024-9341.json) (`2024-10-15T19:15:17.707`)
|
||||
- [CVE-2024-9469](CVE-2024/CVE-2024-94xx/CVE-2024-9469.json) (`2024-10-15T18:38:25.647`)
|
||||
- [CVE-2024-9473](CVE-2024/CVE-2024-94xx/CVE-2024-9473.json) (`2024-10-15T18:54:54.560`)
|
||||
- [CVE-2024-9794](CVE-2024/CVE-2024-97xx/CVE-2024-9794.json) (`2024-10-15T19:12:36.503`)
|
||||
- [CVE-2024-9796](CVE-2024/CVE-2024-97xx/CVE-2024-9796.json) (`2024-10-15T18:46:53.397`)
|
||||
- [CVE-2024-9797](CVE-2024/CVE-2024-97xx/CVE-2024-9797.json) (`2024-10-15T19:14:42.600`)
|
||||
- [CVE-2024-9804](CVE-2024/CVE-2024-98xx/CVE-2024-9804.json) (`2024-10-15T19:17:27.083`)
|
||||
- [CVE-2024-9805](CVE-2024/CVE-2024-98xx/CVE-2024-9805.json) (`2024-10-15T19:18:27.987`)
|
||||
- [CVE-2024-9808](CVE-2024/CVE-2024-98xx/CVE-2024-9808.json) (`2024-10-15T19:19:57.720`)
|
||||
- [CVE-2024-9809](CVE-2024/CVE-2024-98xx/CVE-2024-9809.json) (`2024-10-15T19:21:13.343`)
|
||||
- [CVE-2024-9810](CVE-2024/CVE-2024-98xx/CVE-2024-9810.json) (`2024-10-15T19:22:00.260`)
|
||||
- [CVE-2024-9811](CVE-2024/CVE-2024-98xx/CVE-2024-9811.json) (`2024-10-15T19:22:35.447`)
|
||||
- [CVE-2024-9812](CVE-2024/CVE-2024-98xx/CVE-2024-9812.json) (`2024-10-15T19:22:51.340`)
|
||||
- [CVE-2024-9813](CVE-2024/CVE-2024-98xx/CVE-2024-9813.json) (`2024-10-15T19:23:28.953`)
|
||||
- [CVE-2024-9859](CVE-2024/CVE-2024-98xx/CVE-2024-9859.json) (`2024-10-15T19:35:46.273`)
|
||||
- [CVE-2024-9973](CVE-2024/CVE-2024-99xx/CVE-2024-9973.json) (`2024-10-15T19:27:44.020`)
|
||||
- [CVE-2024-9974](CVE-2024/CVE-2024-99xx/CVE-2024-9974.json) (`2024-10-15T19:28:37.377`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
295
_state.csv
295
_state.csv
@ -81627,7 +81627,7 @@ CVE-2015-8959,0,0,e4feb9cdabdb3d786b1dfa0918fb34a014335ebaac4e12d762b5ac36d6b511
|
||||
CVE-2015-8960,0,0,7c8328ad312b06f04169804d632e57e483a9322217f8a9f4911101790603c6d9,2023-01-30T17:33:01.257000
|
||||
CVE-2015-8961,0,0,62da8e87a5071d2e0f607fdea4425d342cf4861fe470d62253a06a5919c78788,2023-01-19T16:05:41.817000
|
||||
CVE-2015-8962,0,0,f36c71c2820159522e0abec4e6fdf1c39415560ab75e38790961bd83bbffc9a1,2023-01-19T16:07:59.687000
|
||||
CVE-2015-8963,0,0,b78230386fe6f82e274b0d58ccebfc58f33cd17686d94c2e2ca84efb9f2a7e82,2023-12-14T14:06:01.427000
|
||||
CVE-2015-8963,0,1,bf0436b5720895d64ce36ae64be1a69b016dfe1c2df3f7685d7f3d693926f78a,2024-10-15T19:35:01.347000
|
||||
CVE-2015-8964,0,0,7cdc86627e7edebae884be5734bc12c0bcc6e8c2d02f379240a1b96595c761c4,2016-11-28T19:50:55.427000
|
||||
CVE-2015-8965,0,0,ad4c6458189f0cbc5fac9dbe6483fc48d3286626361bf61457c9f0b1be368572,2022-07-23T10:33:29.740000
|
||||
CVE-2015-8966,0,0,5d536de20357e58f3a895a5fdc510fced6513d899ad14b0dbe3983c44800b897,2016-12-10T02:59:01.727000
|
||||
@ -89794,7 +89794,7 @@ CVE-2016-6813,0,0,d71885dff5c934e9fbe2ce0b6cf645d1395581af32a5df8b30eb53cb2de53e
|
||||
CVE-2016-6814,0,0,78d3f1533629bf03d80706ee5a160955afae71b11190e65cc31f959c3af7fe56,2020-07-15T03:15:16.327000
|
||||
CVE-2016-6815,0,0,05dae4dce194b7cf3c6884df749bb6be9157d82b2de4c5b4c1a003f3c2269549,2017-11-03T16:02:16.803000
|
||||
CVE-2016-6816,0,0,fdf8c17a5e83d2a7b9ead95cbb8569e4f3ea8dfd3627fff48a8e0b2beaa11c9c,2023-12-08T16:41:18.860000
|
||||
CVE-2016-6817,0,0,163fd93dd71d6c8439d394f92b556b39c3a3266ade2b2ba6cab349b28874a3b8,2023-12-08T16:41:18.860000
|
||||
CVE-2016-6817,0,1,6383961d5d34661cbecfe77c3e7d44850098ca9acd0152fc0aa29fa181027f6e,2024-10-15T19:35:07.040000
|
||||
CVE-2016-6818,0,0,19b81d454ed9c2f69424f0b7b67bb54c2f3a8ceea791ca333d5e075adafd3452,2018-12-10T19:29:18.343000
|
||||
CVE-2016-6820,0,0,3f8c709c5d3168a806fa8d62e56db4812c1f7f337e47884702ba4bee5c134f3a,2017-11-16T02:29:02.160000
|
||||
CVE-2016-6823,0,0,07dedf7f97839e34d5162811295dac0b5453bd99157789695e57347b86b73746,2021-04-28T16:32:48.120000
|
||||
@ -91632,7 +91632,7 @@ CVE-2016-8743,0,0,f0451111dce4bf6ecd69c3f737d2335d19cf4b10905c9e710f3d5b5d37e72a
|
||||
CVE-2016-8744,0,0,c6e5598d487c5114bd3cadfb7da34373326854657ae678e1ee186253346363e1,2023-11-07T02:36:29.397000
|
||||
CVE-2016-8745,0,0,8ad2a0ef338b25421877c6b75cd276010266e3050fc96a80ecadc7ababa8815c,2023-12-08T16:41:18.860000
|
||||
CVE-2016-8746,0,0,5889aac71000974612512cb0e6790af72bbb951d2106c5d46fe379aa79eb3b64,2017-06-19T17:46:50.020000
|
||||
CVE-2016-8747,0,0,a7e91f55c80802c7299e888ffd43c78bebc5bf57b524e177d848caa5da47e37a,2023-12-08T16:41:18.860000
|
||||
CVE-2016-8747,0,1,be8ffe4c1b226b8a463e11b921000732c98b8c7264c7188f6ae715d1632edd17,2024-10-15T19:35:07.950000
|
||||
CVE-2016-8748,0,0,3e276dd3c6ef8a4d3797670441fb6ab06da8cb26204e2ef88c94024529e6f925,2019-05-01T20:20:17.510000
|
||||
CVE-2016-8749,0,0,2d7fa202a1d154018945d0b067a6ee579cb8ac3812f0d9d03c9703e373477e0b,2023-11-07T02:36:29.720000
|
||||
CVE-2016-8750,0,0,e6860de1e44e31a9f9b0d0d6a353c25e0db2660dee4f93c1a4df091975a410e5,2019-04-26T13:16:27.353000
|
||||
@ -92241,7 +92241,7 @@ CVE-2016-9424,0,0,c921bc0be77850a8673b84272f35fdb8c6408a687d5a0cbffb461b0f0c2119
|
||||
CVE-2016-9425,0,0,21ac5ffb65fa37a4f19eaac2eb23ffe0d9ab387470b757bd0d450a7fed4ff11f,2023-12-29T18:38:04.570000
|
||||
CVE-2016-9426,0,0,f90e06f00f1a284b5e29c6e47034aeb0af9e2c01e685adc120981e97d9654a0a,2023-12-29T18:38:04.570000
|
||||
CVE-2016-9427,0,0,5f64bef16cd29b02a500713ca7667b8a7136594873543189f5b7225718ae73f9,2022-06-01T20:41:50.427000
|
||||
CVE-2016-9428,0,0,49f8c4e55ab7837f684a57b71aa880d4a1a95187e0f4ae04f9abbf590a505a5c,2023-12-29T18:38:04.570000
|
||||
CVE-2016-9428,0,1,d4187b3909f84d3995ce136011fd4bc4d1bbc35e89f7f2438de4721ab814ebb5,2024-10-15T19:35:08.300000
|
||||
CVE-2016-9429,0,0,3c897b808e6093d20e69e112f4c8b3c064c4cf0a878f14ca166d2d8c782ef0ef,2023-12-29T18:38:04.570000
|
||||
CVE-2016-9430,0,0,b6a7947bb3a4718d0d1535ed5682928d4f28b19cc1ebc3dcc896b02d35f05be8,2023-12-29T18:38:04.570000
|
||||
CVE-2016-9431,0,0,548d5a77e5dc17c6f5dd662f1ca70dbc4be0bb86e93dd475064ab480bf7e98a7,2023-12-29T18:38:04.570000
|
||||
@ -131856,7 +131856,7 @@ CVE-2019-13984,0,0,7f98f3a0004da7ed72b7ebdac0bbe0ff7cff78d899d1fe51a85bb1a7b6978
|
||||
CVE-2019-13988,0,0,165406adc18203e69dbe506dde2e2eb543be8409e7529f8d48eb53010107166c,2023-01-05T18:16:09.947000
|
||||
CVE-2019-13989,0,0,3b846a7077f2b9ed939690fa0a341892efaf331e91ecfc09cd8f096d32bb4fd8,2020-09-14T14:25:15.073000
|
||||
CVE-2019-1399,0,0,2b4fe3f4727fbe5b64e872792fdc588887f75207e699599add36de26b4f8c94b,2019-11-13T19:16:17.557000
|
||||
CVE-2019-13990,0,0,911b3e9aa71bd7797308e632b0a14335b255cc4d9a6a324b2081c49b76eb03df,2023-12-22T16:35:35.523000
|
||||
CVE-2019-13990,0,1,156692f7736737b9e4694b16d30771e6ad9ceec5419aeb6a9d199f9c188a5afe,2024-10-15T19:35:09.210000
|
||||
CVE-2019-13991,0,0,54dab28f5304ff5e608009a070d2c7aff7076150a2eae51bf736a966afa3d0fa,2020-08-24T17:37:01.140000
|
||||
CVE-2019-13992,0,0,f2d3a4eb5b1a3a0c4f10e9d46c96061dbe6cab7e14ca22a23740339355ffd137,2020-09-11T13:12:49.640000
|
||||
CVE-2019-13993,0,0,5e800f88a111fb74d20aa5625718fdd67e2461cea937d6feea60af587776a517,2023-11-07T03:04:32.543000
|
||||
@ -135243,7 +135243,7 @@ CVE-2019-17657,0,0,3589f959f4c5758fb254c32363b9c26f0e3bce3eb41bdf218b016eb517e32
|
||||
CVE-2019-17658,0,0,e8c785ff740b98e11ca35218a2fb0941207707343437b70f43c39412099d6630,2021-04-29T15:57:36.170000
|
||||
CVE-2019-1766,0,0,dd14365f2fcfad0166daa287f5cc5f8a0c81cbedb69e60f51d08209249804f2a,2023-03-24T18:04:42.353000
|
||||
CVE-2019-17660,0,0,afffbe2474e3465c14e74b0749bae31435ebb7173be1f80009c8f6996eb6d753,2019-10-17T19:53:51.527000
|
||||
CVE-2019-17661,0,0,40a43737276beb09a76ea03e4e6aef7a0e902051b49d708575fa27f9cab4b4a8,2024-02-14T17:00:29.027000
|
||||
CVE-2019-17661,0,1,776bb5d3187d2aac10cb1d211a1359aabc2b0c7f10c6879082385e6ea3eeaa3a,2024-10-15T19:35:12.793000
|
||||
CVE-2019-17662,0,0,94cdcefaea724ba3175dcd7ba3377f2df922b90ae348ba8a3a8b938b5dd04bdb,2020-08-24T17:37:01.140000
|
||||
CVE-2019-17663,0,0,fa58fd6e8bdbcab57c2dc88ca55a0bd3744375f941ea98ef4cf360e747c8216e,2023-04-26T18:55:30.893000
|
||||
CVE-2019-17664,0,0,fe0d4ccd4e4a22211f4362b1de9476d3a3121a1f9309ac1e8020a0fa1b3aba9f,2019-10-21T18:21:57.090000
|
||||
@ -135405,7 +135405,7 @@ CVE-2019-18275,0,0,57b69d578dae91260262ca2cd2de0532d239a1ae9a52c70553642ff54c959
|
||||
CVE-2019-18276,0,0,b1c2c54bf8417368d5d5cbac5e1f69a50dc0eacfec4c242b5d5cba08dda15cb2,2023-11-07T03:06:25.300000
|
||||
CVE-2019-18277,0,0,39618ab26b366044aec57d0ac909f5619853b7a5227e0faf0b837e53ef5f2b9e,2023-11-07T03:06:25.370000
|
||||
CVE-2019-18278,0,0,0fbcfbebd244efebed557714951ceb122b2847400805fc63c53ce8ebada811da,2020-08-24T17:37:01.140000
|
||||
CVE-2019-18279,0,0,f65aa7796cf606c012f8e02da723a5a12bf1067a77afde6191c4fe5526d2e859,2023-12-08T18:54:42.680000
|
||||
CVE-2019-18279,0,1,3af66cf0dc12aefd8f142e007bf0505d54b26886b291199538d45ec7714d1766,2024-10-15T19:35:14.120000
|
||||
CVE-2019-1828,0,0,31629b87d1faf7a4636e0b51380d1ea58a117646471ad0a46eb16e577153dc12,2019-10-09T23:48:16.300000
|
||||
CVE-2019-18280,0,0,baa6ab0d6e8245dd1ba9d7a5a128d52d2cbf7bcfd025dc7cd74462e89fd76c91,2020-09-03T12:12:33.933000
|
||||
CVE-2019-18281,0,0,b30c829839b001df0743fea21d37266d59016cc21077299059e47bfee868e6d1,2020-02-18T20:15:13.527000
|
||||
@ -156603,7 +156603,7 @@ CVE-2020-28044,0,0,9dec248224c84fb3b6d590d43e11c0b90ba0b86f61868c11bc93daa0f6964
|
||||
CVE-2020-28045,0,0,4d5bdfbad3bc00d40489bccbd6fe76b89401563ec9e734cffe1b02141841fc85,2020-11-19T15:57:34.527000
|
||||
CVE-2020-28046,0,0,44d530bddcaff80e6ff5be5fb1f549c7a3ec6e359dd3a9eb3d4698f0f2f81f38,2020-11-17T16:44:06.563000
|
||||
CVE-2020-28047,0,0,595c4a35287db4d8495bb3fc1397c03ef462b6f15a9018a2b47a7fd9589ce955,2020-11-10T18:33:17.353000
|
||||
CVE-2020-28049,0,0,1e4257c8d50c84a4dacbb3eb74262ee73971659a834d7ebbb768a6fbfdcbd61c,2024-02-03T07:15:14.473000
|
||||
CVE-2020-28049,0,1,5198edddb89ec5d57d56adfc7db4108a9a566163236647b3915972ed2f1beebb,2024-10-15T18:35:01.473000
|
||||
CVE-2020-2805,0,0,56417af69fbdb9e62dc00ecf779e6ab849b2ad8db9062ed4b73b559e3c3874c8,2023-11-07T03:21:48.580000
|
||||
CVE-2020-28050,0,0,98d0b33a06934e3e4b0d803cf9a2b485661d9ab4e64e6efc4c140b7a07fed853,2021-07-21T11:39:23.747000
|
||||
CVE-2020-28052,0,0,7e307b15b15b3688430016c0e44640c2a415ca9ab47eae1c3388703b4ddeb8cb,2023-11-07T03:21:07.073000
|
||||
@ -158372,7 +158372,7 @@ CVE-2020-35658,0,0,bac6cf1c7aef565f1a1698a02251a8469c92fa52deab1b2d5ef8b5c883769
|
||||
CVE-2020-35659,0,0,4441c1e1c8903144d64ad9be702d4ee0e77db6bbdf385bea53c34fd5963846e4,2020-12-28T17:40:47.570000
|
||||
CVE-2020-3566,0,0,e1cfa7d5045a3d8ad006162cbffae3fab0acfa5538e71ade5e2b82f9f5feefb3,2024-07-26T19:55:20.327000
|
||||
CVE-2020-35660,0,0,08a734959bf9e43b2dd6309403dbe1b952809996e47a441cf234ac58099c3bae,2021-04-19T19:19:32.800000
|
||||
CVE-2020-35662,0,0,b174392db159d2e0107d1f38fc1a270afb82029d30dd345f455b297c74d48097,2023-12-21T18:22:07.907000
|
||||
CVE-2020-35662,0,1,08e139e9ffe01f10074da1797b766de8003e29d4961f1b3589bd33b9dc383741,2024-10-15T19:35:21.893000
|
||||
CVE-2020-35664,0,0,2cfbaaf1c74c1da117d4d6c1a5ecf1abc90b24b1bfdde941390c8b453f3729f8,2021-02-26T03:38:20.213000
|
||||
CVE-2020-35665,0,0,b9efce5ee44d69e18b56c4b3437609d637cae01537a0e29baae259b6d4e59ef5,2023-06-12T07:15:15.967000
|
||||
CVE-2020-35666,0,0,ba81c5a44fef70aa83376a2a240e5000e6c3bc1d26a02a5a987cff3f2ee8ba6f,2020-12-23T20:29:19.160000
|
||||
@ -160791,7 +160791,7 @@ CVE-2020-5525,0,0,64ea149f46db4ab00cbcbaf4a7491d0fb717f31ef584aba45673e2edd33e8d
|
||||
CVE-2020-5526,0,0,2391ec31a9c89f8c10917bf57865a3050800bba76fb45f94e58f50342e1c04dc,2020-02-10T17:18:20.030000
|
||||
CVE-2020-5527,0,0,57deab79448e5d8a49b236a1811b92dfce87fc11de785b5c45af08454ff51018,2020-04-07T13:49:38.617000
|
||||
CVE-2020-5528,0,0,09a1f1bcbb8bf8319db11603db57e44c757713209f0493810700709ca88c89a5,2020-02-07T19:41:25.013000
|
||||
CVE-2020-5529,0,0,7dad2ef441b0f9956acfb0d6f38cb2eead824c9bd9bfa556739fa80acae46d75,2023-12-07T17:56:27.147000
|
||||
CVE-2020-5529,0,1,010ee382d2cba73e8b4243c8f08192ed01682c1fbd6c1cdfd46e1de191b65925,2024-10-15T19:35:22.773000
|
||||
CVE-2020-5530,0,0,9f3a3ca2c9c8ce7035785f04c73f09960043cdfeb3136eff0c4b88086c8b5a7e,2020-02-19T14:25:37.707000
|
||||
CVE-2020-5531,0,0,606ced651e1449d7c60ba7a6ae044659643c3b15529d957c79a7d7d8ddce2e4f,2020-03-04T18:34:01.613000
|
||||
CVE-2020-5532,0,0,c141ef0177edc1068cb275042d6ac5224a6c000ad19d032ab8c08853e473327a,2020-02-25T17:52:00.583000
|
||||
@ -172960,7 +172960,7 @@ CVE-2021-28113,0,0,574b44645a729a2cfc0695972b78ca1a5bac176730befd5969281862c691a
|
||||
CVE-2021-28114,0,0,05ef0ec0c99eedc9271a931700ea3746450475fa66235fda50736febfd0e8a49,2022-09-23T16:51:39.850000
|
||||
CVE-2021-28115,0,0,91e82c36cae7d5f3d74d62d7d8f6ff66a2ea3752505f53f54a34fbd4c9a458a3,2021-03-13T00:17:55.233000
|
||||
CVE-2021-28116,0,0,af548a84a2f1e0902b418257ac708f44fa2e61c11f413f2ac30024bf58348873,2023-11-07T03:32:03.943000
|
||||
CVE-2021-28117,0,0,877389657aaa05da4b7d900f7f50f42f26dcdc3e2d93942fe30cdffe84b2d2fc,2023-12-28T16:24:49.047000
|
||||
CVE-2021-28117,0,1,1053c6b1d303088252e7acc02380e7dd8095d5124cdfcd02be6fc0718e8146b5,2024-10-15T18:35:02.437000
|
||||
CVE-2021-28119,0,0,b72f04a854999097edc8e43597b3e5bbc09d90dc38eea706ece37c3bbbef8a18,2021-03-18T15:23:23.303000
|
||||
CVE-2021-28121,0,0,a7c57f54b35225b1286132ce4cb9b494f5fd721c4f4f715008a7b89e92edd473,2021-08-23T15:54:19.747000
|
||||
CVE-2021-28122,0,0,ccc8c91f4ed32545ca3abef25c009df7f586fd35d6be52a88f14fb1f7de23a8a,2022-07-12T17:42:04.277000
|
||||
@ -177807,7 +177807,7 @@ CVE-2021-34617,0,0,edc1a64cfeb4c0e2df32b7f7119695d9ef5fa9de6543b6f19ee12d81d14ea
|
||||
CVE-2021-34618,0,0,02a15b639d55b088d597f70410e6357bdac143aa1da1b22c1756034272dfd074,2021-07-29T15:17:34.050000
|
||||
CVE-2021-34619,0,0,18a08322927fecc8a0a27e7875dbb1d65b52a60672691b7e4ef0bf33acdae6b6,2023-07-18T12:34:01.287000
|
||||
CVE-2021-3462,0,0,d40fce269a120c19f17c82297a497adc608152420fd69d261c6bf6924a55bbe9,2022-10-27T12:45:23.963000
|
||||
CVE-2021-34620,0,0,e795de79033c4ac3f1d4d4f80d34e60093db75f8ad51ae54f94acf0095137194,2022-11-07T16:37:09.160000
|
||||
CVE-2021-34620,0,1,ffaac1ce53a97c21b97c4f10941ff5ddfc251828ba52444f4474029615ab4dc0,2024-10-15T19:35:23.910000
|
||||
CVE-2021-34621,0,0,2907591a5a42bf6a0ded9aa9129b81888fa65f401aed577b6a84dd43e4c38456,2023-05-26T19:38:26.543000
|
||||
CVE-2021-34622,0,0,e59444b71cedfed16528b7ab7b6850e6295a4f91f3538a5872e6f49f05b59443,2023-05-26T19:38:26.543000
|
||||
CVE-2021-34623,0,0,92eeb117870210c18f20a043d5700b9eb85cf6960958c6019ccad808a21fa6b5,2023-05-26T19:38:26.543000
|
||||
@ -181871,7 +181871,7 @@ CVE-2021-39945,0,0,d67483f8f0b55fa80688cddeb4b076685e53a47812e5694fddb9a64caee2d
|
||||
CVE-2021-39946,0,0,dafab3df7c87ba6c22f2cd9d671f6939605a9280879df58c9e6fe6d207e80822,2022-01-25T16:35:57.753000
|
||||
CVE-2021-39947,0,0,078ead3be4f1198b7c789cde932f66c430b109f94d58fcac3a8853a0bbbbbda0,2023-08-08T14:22:24.967000
|
||||
CVE-2021-3995,0,0,2ace30b0a6cdb6219249a68e7e36964d12d87e790f3eb5e5380a3bd6ac631e76,2024-01-07T09:15:08.413000
|
||||
CVE-2021-3996,0,1,086fcd4c494524df329d97ae9e6f851a84a2a6d226707e4372456e5f670bc8f4,2024-10-15T16:35:00.963000
|
||||
CVE-2021-3996,0,0,086fcd4c494524df329d97ae9e6f851a84a2a6d226707e4372456e5f670bc8f4,2024-10-15T16:35:00.963000
|
||||
CVE-2021-39966,0,0,651155860e4d6d8fb6f37eb1650af5fb450da83d30e3e15a87554e286f71295c,2022-01-13T16:22:11.833000
|
||||
CVE-2021-39967,0,0,0f58906621f83b67c28bfd477dc988ce5b77b2719cefe28be91c7d12d3a40439,2022-01-13T16:23:38.167000
|
||||
CVE-2021-39968,0,0,2e5e1cb3e038cdcd67bae6f723481408cf6010f2d25f4662133be026ae205966,2022-01-13T16:28:17.993000
|
||||
@ -192327,7 +192327,7 @@ CVE-2022-23092,0,0,feefc35a77dda18a2f3e06f31c3166e7ad94e6732e53343f8ba132e825f2c
|
||||
CVE-2022-23093,0,0,e5e8d34f160f1c848e42f116f1b09f04694af73c06dcb59c1486806997905207,2024-02-15T06:23:39.303000
|
||||
CVE-2022-23094,0,0,853abfd9e10f1c92cadf6f500a7ff4c8d565cd6f2ee990346fdb7cf1ef6d1ba7,2023-11-07T03:44:04.353000
|
||||
CVE-2022-23095,0,0,56b2c39c187f31dbdf4d336d0209e5136c96a4985ccfae139c0ff11e41d1aca3,2023-08-08T14:21:49.707000
|
||||
CVE-2022-23096,0,1,8375f1330dc658c51cceb00c11b969fb503079555e42e0b96f1d5d1574d434be,2024-10-15T16:35:01.440000
|
||||
CVE-2022-23096,0,0,8375f1330dc658c51cceb00c11b969fb503079555e42e0b96f1d5d1574d434be,2024-10-15T16:35:01.440000
|
||||
CVE-2022-23097,0,0,2e80a0f3145a3d4a023304b6af7db5bc77845aedab953e425cff21fd6a4a1953,2023-12-21T20:10:57.727000
|
||||
CVE-2022-23098,0,0,b46eaa36653fb7b1c7ab6b58a1453e672907a363e7ed3890b17d99c7d3afbc56,2023-12-21T19:26:25.640000
|
||||
CVE-2022-23099,0,0,2b56c5422bc8e6379f85d636a980307179a442d05607ad88ed7811eb51196b0b,2022-08-03T12:55:32.697000
|
||||
@ -196522,7 +196522,7 @@ CVE-2022-28132,0,0,514c27b4a8ea5c0424943b0cfe173c5331618c82893416f2cf213bbfb8fac
|
||||
CVE-2022-28133,0,0,c75bcbb4c849156d4d399c0ecd88c51eb6d4670588507cd92fbb96c79c61c69e,2024-01-09T03:20:00.110000
|
||||
CVE-2022-28134,0,0,bc2ace0342df28965d969cd8f2769ae710b40345f2a4b4dd18730e059150d945,2023-12-22T16:23:56.647000
|
||||
CVE-2022-28135,0,0,b4b8f6f12226f9bd9abe358a3d75438cd874c7be98b2d4e7c66102fc4382734d,2023-12-21T21:53:55.317000
|
||||
CVE-2022-28136,0,0,e024342590c921cc046b495ca294bc172a75b3e63ff6a5e1ad236aba683a3315,2023-12-21T01:42:53.653000
|
||||
CVE-2022-28136,0,1,1a0b4ad1d035316504d86e7a22fc1c81e85b0e0c0142d15cfee7ce0634b78ace,2024-10-15T19:35:24.497000
|
||||
CVE-2022-28137,0,0,33a9664335a2d924ba0635bb5f72daca87f4c73942e79edf9e849e9bd56f675e,2023-12-22T16:23:08.167000
|
||||
CVE-2022-28138,0,0,8cdd4c5723fac4c5f9bb47fc37ae9abbe7af931b3c675f2963405008d3549070,2023-11-17T17:23:52.757000
|
||||
CVE-2022-28139,0,0,a042a4d027139319bb06a6a75fe1aa7c8c7543230ea7e0c449dfac57ac2ca2b1,2023-11-17T17:23:59.070000
|
||||
@ -198514,7 +198514,7 @@ CVE-2022-30547,0,0,e8e7999e7671db2ca6b11cbee96ecc0d751be3551ff3689647d6c2b4dc425
|
||||
CVE-2022-30548,0,0,25c7729929701a7cea313660a9ebc63f574e751ed4ce69cffb4226d2a88a716d,2022-11-17T15:07:36.213000
|
||||
CVE-2022-30549,0,0,d6f4715643e475f24cf06963d64cd280b9b9d15402b7e32afa657dc4b03e4654,2022-06-27T17:02:57.287000
|
||||
CVE-2022-3055,0,0,edcbff647a85d58382d336223369defdde2ec6541033cbd064ab4ea17a088a2b,2023-11-07T03:50:44.703000
|
||||
CVE-2022-30550,0,0,0c44032a8c73d90e49b4d60f3a9ad11855aeb846637d3b558a1749392df6961a,2024-01-12T20:47:18.010000
|
||||
CVE-2022-30550,0,1,e8d9d63be4799d75f05930c1889713150096dfa8257d34f771c89927ca440240,2024-10-15T19:35:25.430000
|
||||
CVE-2022-30551,0,0,de75ae1b3ee244c0a837d095169a91ff22d949fb6636f64e09ecf57e2c678180,2022-06-01T19:59:36.657000
|
||||
CVE-2022-30552,0,0,57b63fede45ced57b99e81b338930b2e7dd5f31bcbef5ccae577c540682ae0fc,2022-06-16T13:12:33.857000
|
||||
CVE-2022-30556,0,0,8be0e914ba71b624e4617ee79d0dcf86767caa4b15efac3d0094b316b1e795de,2023-11-07T03:47:15.293000
|
||||
@ -207744,7 +207744,7 @@ CVE-2022-42245,0,0,763d7567ddb2bf1e26ac8d998d442e4e9bdc90a939a9b7be870902e81347f
|
||||
CVE-2022-42246,0,0,0c3ccd2c34b78caedf393cbf8c98ccc53bc77fb78be42941a915d7f80221c5b5,2022-11-17T23:27:17.417000
|
||||
CVE-2022-42247,0,0,cf702ee8aa9bf5f0d453ace1dac1e24f0663f25d899cf34aa27cb3c99953e760,2022-10-05T14:11:37.970000
|
||||
CVE-2022-42248,0,0,a95c2adce99fe559ddd4eb8b9ed97ddf971aab766b82c5d961f797ecd48a2cea,2023-03-13T17:47:01.773000
|
||||
CVE-2022-42249,0,1,67664e2031a3fbd73e77d90c204a4bddd946c6a23d81a0226aebfb517802009b,2024-10-15T16:35:02.270000
|
||||
CVE-2022-42249,0,0,67664e2031a3fbd73e77d90c204a4bddd946c6a23d81a0226aebfb517802009b,2024-10-15T16:35:02.270000
|
||||
CVE-2022-42250,0,0,13e5dfe33cbc6246914c752ec18aea676a3f6686b3b35e4b146adcd28ab8f152,2023-12-28T16:46:19.600000
|
||||
CVE-2022-42252,0,0,56e5bd53a393eed0bd3a6a7148f0ecf3faab2064d317bb1daab6151636594ba0,2023-05-30T06:15:25.967000
|
||||
CVE-2022-42254,0,0,a35c66c5e8ef6c29df181a0454ac11f8d6b731201db9b2da9a93912fe040e5af,2023-10-19T01:21:04.743000
|
||||
@ -208066,7 +208066,7 @@ CVE-2022-4271,0,0,a47ac03d1e87cb1cda38b7ea6127e82ceaa30264351edad1f0e8fca1e20900
|
||||
CVE-2022-42710,0,0,2f897454383e292c38a2fea29c4b5822459c0c24a44f7454dc5f8ba6767830e7,2023-01-10T16:07:38.907000
|
||||
CVE-2022-42711,0,0,5d6a8ca0f143e6cea55ae6ee10cd28d00a969dd3eac34fa6f3d8a6b06e9f46a1,2022-10-13T14:26:34.380000
|
||||
CVE-2022-42715,0,0,ca40d0573c10bedd555693d4ffd55080465faa5da2e2b705115496faffca239f,2022-10-14T17:12:51.110000
|
||||
CVE-2022-42716,0,0,e997a107c61b633a53ecde69fc780f405a16d3870fa74fcc32f647a1268a1723,2023-12-14T20:02:26.400000
|
||||
CVE-2022-42716,0,1,4705fba1711101272961c92c31f81ae01031bbc82880a8e937a9207b6a01fd52,2024-10-15T19:35:25.727000
|
||||
CVE-2022-42717,0,0,e3bcfb08a93365d31eac7cf05e0f3cac57af88081b3bb0ff3d6786373b54159c,2023-08-08T14:21:49.707000
|
||||
CVE-2022-42718,0,0,e7ef3cbe28d70c3eedc059ef27463f0cf13fb05f51fcfbce1be1f4bbc54dec0a,2022-12-06T15:41:52.600000
|
||||
CVE-2022-42719,0,0,de7281539fa9a0fe0876114ee4b4db714a6d64cc5df275662cc25d2bb16cebcc,2023-11-07T03:53:24.857000
|
||||
@ -209735,7 +209735,7 @@ CVE-2022-45044,0,0,803554cd6e7551ef9fe93be947430fa642bd29a9865744e6bbe76fad2a5a9
|
||||
CVE-2022-45045,0,0,0988c9110c5c33a2c170db03acf4107d6887428ae9710864a80db248253cac15,2022-12-06T15:50:37.127000
|
||||
CVE-2022-45046,0,0,1de35eb14a19f7f6f23d1643119c63f0a7099d4349f88737629fa34915974228,2023-11-07T03:54:29.393000
|
||||
CVE-2022-45047,0,0,8d0b7ebca38f0f1369d9ffdda0020ccf5de3b9a7e4f290085fa7a3e0d274f6f3,2024-02-16T13:15:09.513000
|
||||
CVE-2022-45048,0,0,c09c714005001530ca7e61ad623d3e9338f47f23a2c18c87f1683b8b9ebda43b,2023-05-11T14:26:43.060000
|
||||
CVE-2022-45048,0,1,d6b5e4e689837d594642e79790738cd8e0855bf21d6a43431c1e903e9fa71480,2024-10-15T19:35:26.733000
|
||||
CVE-2022-45049,0,0,d98b08f41c9f4c9b8c17761481eb8da8fc31beca12133aa5d1d9a4f2dd4ed2d3,2023-01-11T03:04:59.823000
|
||||
CVE-2022-4505,0,0,80acf6850bff297cdcdcde9e235f2ea50363cd8a843569ae0e7b3ec505ac1090,2023-07-11T08:15:10.283000
|
||||
CVE-2022-45050,0,0,6a37ecc7452e165ad3ae682d972aa78274210ba552c1115ed44bbaf958414280,2023-01-09T17:12:50.767000
|
||||
@ -209808,7 +209808,7 @@ CVE-2022-45129,0,0,e0ac11d7c2ca3a183286127657bef5780bebed5e7e26ad473712e63f12077
|
||||
CVE-2022-4513,0,0,a623e2548c4d198cab3b5e24a7879401cd60e6db3e6750b2a35aac31b8b19e14,2023-11-07T03:58:02.317000
|
||||
CVE-2022-45130,0,0,1be36ef4e68d679c4e5a26f49234d0e7be7af22ec7ccfe192333d6b33618ba9e,2022-11-15T18:18:08.173000
|
||||
CVE-2022-45132,0,0,266cf6e7ca80af05fb82f59632edcd6ff3f2aaf2090d78f0714b9ce6c20da608,2023-11-07T03:54:36.650000
|
||||
CVE-2022-45135,0,0,ba17cc024027c3452790963589aad35f48eedcd67e70bfa2bd3fa557b8cf15c1,2023-12-05T18:14:31.810000
|
||||
CVE-2022-45135,0,1,cd1ebe0ecbe42047ad7d8664cb00d0b1d39df99583598f23d7f932ea73274403,2024-10-15T18:35:03.893000
|
||||
CVE-2022-45136,0,0,dd772858dd7886d445c3529154e08b61532301c2980961e154788a2b9cbdd8ce,2024-08-03T14:15:44.217000
|
||||
CVE-2022-45137,0,0,73f176b2e87fd65174896043f76ee01f9aa425160bf34c9a021bd94852172979,2023-03-08T15:20:05.963000
|
||||
CVE-2022-45138,0,0,56cdcb695833ac94db92e73442425c0756d3b4cb60ec5b71a9bd98ed7d826f47,2023-03-07T22:54:12.070000
|
||||
@ -210682,7 +210682,7 @@ CVE-2022-46360,0,0,4602e6b518b0120944ceca23a9344c907013ecfc3ae840b5afda4360d6d79
|
||||
CVE-2022-46361,0,0,49b554b3a37307342b5a02775f9ce4a190cab7b95b34c7a5a2ffedac72757f07,2023-06-06T14:22:24.033000
|
||||
CVE-2022-46363,0,0,822e9b13de8b999c1faaf71fab1f9b4dc526ba1a6f6cfaa3463b4b83f97c06a7,2023-11-07T03:55:35.590000
|
||||
CVE-2022-46364,0,0,2cbff159f963a77b69c9323f51c0bc7e15122d9c5359c8e1ab6c4ec8a77ad469,2023-11-07T03:55:35.660000
|
||||
CVE-2022-46365,0,1,c15d2b4a04a8a89a9f92c0338cb6b19975945ea38f14691eef23a470aa0c7a3e,2024-10-15T17:35:01.787000
|
||||
CVE-2022-46365,0,0,c15d2b4a04a8a89a9f92c0338cb6b19975945ea38f14691eef23a470aa0c7a3e,2024-10-15T17:35:01.787000
|
||||
CVE-2022-46366,0,0,4390dfb2cb71036922f5d4d8d0094b83142f5d99a119496b7153612fb3e131bd,2024-08-03T15:15:36.180000
|
||||
CVE-2022-46367,0,0,dd20fccca5328181d501e8c7bda047b5e3b1d9a1fa0cb6065ca307ff0839af67,2023-01-20T17:37:26.593000
|
||||
CVE-2022-46368,0,0,ef996c0212d69f3b2b105e50abd25d2ac665fa3f7d85dde4969b8c3c0efc1e18,2023-01-20T17:37:14.357000
|
||||
@ -213758,9 +213758,9 @@ CVE-2023-1214,0,0,59179375a3b2279560ddaaf5b915a98935f23a78c079fa70ad3b0eec98ac9c
|
||||
CVE-2023-1215,0,0,ab14e12eb6b8ffa21e623a0f34cc25d4af2eb9a714f9b8afdee9d43b67dd1c47,2023-03-11T02:40:11.190000
|
||||
CVE-2023-1216,0,0,e0e19bbeb5ea35db350d09457b008dcf8d83249cf843c97cb3620e04daa2ebbd,2024-10-15T15:35:12.380000
|
||||
CVE-2023-1217,0,0,f50a682f8cc1dd1120c48e10fc44ea556304c04753999b045304eb31c2ddcfaa,2023-03-11T02:39:48.537000
|
||||
CVE-2023-1218,0,1,252b76d820dbb797f087fef0170591f698e579a5b5b835522775d369ef05e705,2024-10-15T16:35:03.250000
|
||||
CVE-2023-1219,0,1,37c837357e89ca8214f51e71c705df7226bca05db7e1b708159b67fda83e9751,2024-10-15T16:35:04.020000
|
||||
CVE-2023-1220,0,1,944ede9d55447f193575d8fcd12c1f74d810142cd970fa8f62b851ab890fb999,2024-10-15T16:35:04.880000
|
||||
CVE-2023-1218,0,0,252b76d820dbb797f087fef0170591f698e579a5b5b835522775d369ef05e705,2024-10-15T16:35:03.250000
|
||||
CVE-2023-1219,0,0,37c837357e89ca8214f51e71c705df7226bca05db7e1b708159b67fda83e9751,2024-10-15T16:35:04.020000
|
||||
CVE-2023-1220,0,0,944ede9d55447f193575d8fcd12c1f74d810142cd970fa8f62b851ab890fb999,2024-10-15T16:35:04.880000
|
||||
CVE-2023-1221,0,0,f18e400dfc0680f68802e6939c519c06d9d3cf47fb6439707c672de2d8bf79b4,2023-03-11T02:39:03.177000
|
||||
CVE-2023-1222,0,0,190d0da05e93e72aeeebe8898c45012067f66d519dabac52f25cd78ef25d0d0e,2024-10-11T21:35:37.550000
|
||||
CVE-2023-1223,0,0,948ee91eada12d7d20e5b2b1fb298c9e614c851df4f101d24d278c07dc3fa4af,2023-03-11T02:38:37.183000
|
||||
@ -220656,7 +220656,7 @@ CVE-2023-27526,0,0,90bba01935d8c50e0c427bc10053b381693c1dc56dd7a4e5673aca7143a7e
|
||||
CVE-2023-27527,0,0,51570319ea28f5ce4a1bb5e4f6c5711cb6c95ef9d30e45378de89d53283db5ef,2023-05-16T20:33:27.193000
|
||||
CVE-2023-27529,0,0,6f2ed4737d00f1a28c49b76e39a9e2b76c4e559f222f4b425d71cb3e16dc39ef,2023-06-01T12:59:00.870000
|
||||
CVE-2023-2753,0,0,3ec66932a5bcd9eed3481c511af0697f0ae6e6f569c9b289c3f6bd7b56f89f29,2023-05-24T15:18:44.767000
|
||||
CVE-2023-27530,0,0,c38846978790388683b6ff5664dc0f6fd23da91f30e3112909a3b69ee9e836c1,2023-12-08T22:15:07.603000
|
||||
CVE-2023-27530,0,1,a6b8da34011966b2aae235c9a5d48513cdef95567c0552e96e3b1236493190c0,2024-10-15T19:35:28.200000
|
||||
CVE-2023-27532,0,0,8fe400f7f37baab3522ba179b9f004b37bcc03ae2fe7be01437ae18da205a037,2024-05-09T18:37:54.573000
|
||||
CVE-2023-27533,0,0,ddcf75098269ad247e88d3b9d3ae4eddf0ff197e2c39d7fccf88edcf619ac976,2024-03-27T14:54:51.937000
|
||||
CVE-2023-27534,0,0,8799fd2c76e137ac497a9e25f1c9a67a6eeb13d9dac7a39ee061d3c5fdaf7a86,2024-03-27T14:54:34.810000
|
||||
@ -222048,7 +222048,7 @@ CVE-2023-29069,0,0,7da2f0cc934da7b46c3ba113612a21be795cffa5b852be9cd57cdb7ee23c9
|
||||
CVE-2023-2907,0,0,7a8a7461df46bc3013396fb374fd593f3139f8b31f4f0f4d13e861e1c45881f5,2023-06-29T17:10:00.027000
|
||||
CVE-2023-29073,0,0,09fa9364a43ad1600713f8328c4939940145a5a1646913c5041c0d723065d532,2023-11-30T02:20:48.793000
|
||||
CVE-2023-29074,0,0,30e84416b576d09a4f949476dc99d16dc0944ed6f5c1e4eca872247afa8f398f,2023-11-30T02:20:40.343000
|
||||
CVE-2023-29075,0,0,ddbd0cee6717035488bf97f9008a5e5b7b29d2b13e63c6438865130d31efbeaa,2023-11-30T02:20:10.977000
|
||||
CVE-2023-29075,0,1,51c3e8f462e6ab129d12634335476e6ee026ad8960305699dbe3f16ae63666fd,2024-10-15T18:35:05.263000
|
||||
CVE-2023-29076,0,0,738196ea7eb05a83ccbf166531915bf6e3ecd99a353d13f5c275038287c98598,2023-11-30T02:19:53.027000
|
||||
CVE-2023-29078,0,0,98f0a1df2914b755410c43b843273f3f9d7a3cbd24ceae31c365338749a6c3fd,2023-11-07T04:11:04.110000
|
||||
CVE-2023-29079,0,0,edcf382a38e58cd59b2be67ba719f86a3e8b655dc0fc8f10eed674f74af76c31,2023-11-07T04:11:04.143000
|
||||
@ -223043,7 +223043,7 @@ CVE-2023-30570,0,0,32ae4e1289238527bea45856a5956c2666d0298df11b9014353bed6d1101f
|
||||
CVE-2023-30571,0,0,37bdef63b6140792b75b13cda177804470d747dbf58d1a00e95696797c0e43b8,2023-06-05T16:40:57.930000
|
||||
CVE-2023-30575,0,0,453e9f14721a62fdcce101be7638faa38eafedbce10643f585d34009782ad1ce,2023-06-15T08:15:09.223000
|
||||
CVE-2023-30576,0,0,a7beef98c4aaaa905d0d5c6034ba03cdb4e7ff8c323a7c6da61dd78d972b118d,2023-06-14T14:33:16.713000
|
||||
CVE-2023-30577,0,0,545749b2d6af0de8487bf303128bd274f5cfec0c086fb3a542d149f7fd574f53,2023-12-03T11:15:09.093000
|
||||
CVE-2023-30577,0,1,ca42116783f8ee4be277ed74592a45e2d496562e9eda457efa01613289b2a310,2024-10-15T19:35:29.413000
|
||||
CVE-2023-3058,0,0,9f7c305f8337fa20576361292d1d535cd2135f70c208fde6ed8bf974c1470dc5,2024-05-17T02:27:14.193000
|
||||
CVE-2023-30581,0,0,b156a6b818374eedaecff7e6959cc25150181fbf1ed9a43d050cab8b1b8a4335,2023-12-11T20:49:02.543000
|
||||
CVE-2023-30582,0,0,7764763ecd07c5fb15156b35aae4db9eecddd9d0dcb2778caae4e418824f86ee,2024-09-09T19:35:01.063000
|
||||
@ -223454,8 +223454,8 @@ CVE-2023-31034,0,0,5fa25a427ce0daa80d54b5d167ab61c466dff79ba4104f1a297cee7d9fb5a
|
||||
CVE-2023-31035,0,0,e432bc0ff52bd04f4a521ebde8a42030c8c5b1748e9d5899bfa694370648c5f6,2024-01-19T13:32:06.080000
|
||||
CVE-2023-31036,0,0,dc0d629ead54f3cccdd9157c0a020d8f0e8e35cabf6fe29f2bbb8a2a304e0663,2024-01-18T20:45:53.087000
|
||||
CVE-2023-31037,0,0,b95f45a927f3745dc380a7b2d93c3b4568522ef25775c003ae4515027e079ad5,2024-01-31T20:11:28.867000
|
||||
CVE-2023-31038,0,0,7e7853254f5562040d249c1efcfe96d7c1113fe1c763f02bfaccd2038e539349,2023-05-15T16:10:47.323000
|
||||
CVE-2023-31039,0,0,580351c9d327f03afbf6c1fe033d211ffa5ac33d8f7428255b06f48a7d976c60,2023-05-12T02:03:27.397000
|
||||
CVE-2023-31038,0,1,a278f0f2e81202889e90ede99a7d3e3084a9f40435a2a643087d642eb0cd9fdf,2024-10-15T19:35:30.310000
|
||||
CVE-2023-31039,0,1,b200f78e2a866a9e8f61c044755eeaa2e429914f488f494f2efaa15dd03a5b91,2024-10-15T19:35:30.543000
|
||||
CVE-2023-3104,0,0,8b6f4c6f48b1b62bf61458ce539caf79c30a1810a33592d01a47a4eba574dee9,2024-08-02T07:15:47.150000
|
||||
CVE-2023-31041,0,0,d3f74113b8e24fb7c0c0ea099f9f16d14e383fd28713189dea1c7477de7e468c,2023-08-24T21:26:16.843000
|
||||
CVE-2023-31042,0,0,e9e4089fb29b1dd553ccbf7459726b99b949b96ffd3c665020bf1be4ec17b111,2023-10-05T15:46:26.893000
|
||||
@ -224058,7 +224058,7 @@ CVE-2023-32003,0,0,61aa2cf05fc68219dcd3a0f1788eeefc22cd565c423346515dd9cef18f810
|
||||
CVE-2023-32004,0,0,2f65f459b49d361d9730cc89e29c811cca8e3b0fbe8de40726919f20873ab2fa,2023-09-15T14:15:10.010000
|
||||
CVE-2023-32005,0,0,932d47577f634f904c83223001a6f212bbb60744045087ba240044f21a08c88b,2023-12-22T17:07:29.110000
|
||||
CVE-2023-32006,0,0,c8a5cb8ae876b507e0415003b3ecc178591f6426233c650a4050dca8bc183a38,2023-09-15T14:15:10.087000
|
||||
CVE-2023-32007,0,0,7ed1eb16aa2b0bb30b2a043d48d71f814263ef896be4239fdc02a03ac1af34b4,2023-05-10T20:16:41.367000
|
||||
CVE-2023-32007,0,1,5c35865adee1fe07d55a3b831ef8dd5e1dbf9074f9e57414263b25f2b45df0a7,2024-10-15T18:35:05.553000
|
||||
CVE-2023-32008,0,0,1a7f71b8a1ea61d01db3f32a6c59f55cafb04a1e9f83c9cd16eb172ebe789ba6,2024-05-29T02:15:44.807000
|
||||
CVE-2023-32009,0,0,473230b495c85d07b7366a260b477b20bb42c0c381cff45d66a58d8ba5bd2e80,2024-05-29T02:15:44.973000
|
||||
CVE-2023-3201,0,0,05e9a1198820b29c4fcf047e63c08f3747e0e0f79b2b500047a90f12bcc8d461,2023-11-07T04:18:12.573000
|
||||
@ -227214,7 +227214,7 @@ CVE-2023-36183,0,0,54562b882596582c43463f5c4105d7c02e40d30428cf14d6280e6bdce32ba
|
||||
CVE-2023-36184,0,0,498fe11ffca9cf3bb428a3670da2c8bc5899a2de7f5c6c1fd2b917b8dac3d1b6,2023-11-07T04:16:24.190000
|
||||
CVE-2023-36187,0,0,130002987340aaae852e57d0c6d11a41ac1a90b3fde98b515cdc68bc7a38df5a,2023-09-07T17:05:35.237000
|
||||
CVE-2023-36188,0,0,54930d0be408cfd69be0eac3183f0b9049941734a2d1cb35388d8bd3b36faa63,2023-07-12T18:34:19.300000
|
||||
CVE-2023-36189,0,0,97ad4df4dc014aac9b3d3d86906d9a9a7834b360112eb04a4cc8eaf3a6d34c4c,2023-12-26T18:15:07.903000
|
||||
CVE-2023-36189,0,1,73a815f70f51c8046220523bcb04e8411ffedb80385a832e8de6f8d5211911a9,2024-10-15T19:35:31.520000
|
||||
CVE-2023-3619,0,0,9e5a6671ba246b70b4db8758cf5038a1eb286a0744b4ce51180ad578d887b078,2024-05-17T02:27:38.937000
|
||||
CVE-2023-36191,0,0,00823ae71a62d0bb6e7f2fb1d27dd3732d8062dc7b6b9a8e738d16fe53c35c5c,2023-11-07T04:16:25.153000
|
||||
CVE-2023-36192,0,0,1d8a5dccf4cade4ac929d84234ad33b0556786568b0a7035dab8871dacf1df3f,2023-06-30T16:41:14.160000
|
||||
@ -227261,7 +227261,7 @@ CVE-2023-36272,0,0,b40f5b0a455b9096df3ff383271d067f7a04c5792cad2e87f448c1960a80d
|
||||
CVE-2023-36273,0,0,862b00fa51e6f8f234d86825426ea6dc4831ed884e5f0942c6527d81dbd77a8a,2023-06-27T12:42:21.960000
|
||||
CVE-2023-36274,0,0,0f2d05843a8f7063cc1bdd13b623a0e15f80cafab11dd19ff804b8beaacaa01d,2023-06-27T12:41:05.803000
|
||||
CVE-2023-3628,0,0,92b3fb7cbec239c0b5b2cddfe0679b5d5a416e4b1488bcc89010bb714faecb81,2024-09-16T14:15:11.667000
|
||||
CVE-2023-36281,0,1,2249deb993bac3fb52df9eeea8be068838b049e0df384e0f6ca9856ee84ec4d1,2024-10-15T17:35:03.180000
|
||||
CVE-2023-36281,0,0,2249deb993bac3fb52df9eeea8be068838b049e0df384e0f6ca9856ee84ec4d1,2024-10-15T17:35:03.180000
|
||||
CVE-2023-36284,0,0,c75831a07c181634ec17ed63af6f8bff4c2e6d5d361f74cb14494efba21ab22e,2023-06-30T07:58:35.530000
|
||||
CVE-2023-36287,0,0,f49b835bac714b26ae9739952b8e59ac5c026e80ab82e3ceb7e4b67b223474b5,2023-06-29T20:41:22.900000
|
||||
CVE-2023-36288,0,0,f4afcb6dbfa0585fbaee1ec4fbf9659d3e3df42df99d9bfd68c8b5a595635978,2023-06-29T20:40:42.003000
|
||||
@ -227948,7 +227948,7 @@ CVE-2023-3720,0,0,1ca03330ff4ebdad4c7a09ab89eb29f9b34da48545a17a2785bbb54a336312
|
||||
CVE-2023-37200,0,0,3aad1ead99a8e32d973a13a68cd7a04a88370e22fdf2d9f697aaad7be108a68d,2023-07-20T00:35:09.917000
|
||||
CVE-2023-37201,0,0,6b83bb2cc1f577d3379f8eb875e5ccd49e1a9788df963832fbf7a183ff01a483,2023-07-12T10:15:10.230000
|
||||
CVE-2023-37202,0,0,2aa7aa02c0ba91581e181648a7bcc0c653a449039bd38fc23bedb8890c7ff74d,2023-07-12T10:15:10.350000
|
||||
CVE-2023-37203,0,0,e7ce3ad52c4959a7758db939379675c0107841cdd39c5277394618cefc63b3b6,2024-01-07T11:15:12.023000
|
||||
CVE-2023-37203,0,1,fef459d54677bb7db18ed02ec063c82b5e687c75a9778c5b2bd9b24228fe38fc,2024-10-15T19:35:32.430000
|
||||
CVE-2023-37204,0,0,dd23e9c17c8f6babe82a859b37ccffe74e3eefe9ee11ef10d845e3965beda6cb,2024-01-07T11:15:12.120000
|
||||
CVE-2023-37205,0,0,5d90666504e1d182da1091446956ac113a76c2b14b005aed016a92ea06683737,2024-01-07T11:15:12.190000
|
||||
CVE-2023-37206,0,0,46342560d6b14d815fec53553b775166405fb0a3d0afbfdf0d75cb161aba0357,2024-01-07T11:15:12.283000
|
||||
@ -228991,7 +228991,7 @@ CVE-2023-38404,0,0,902ddf5ac3ca2946c3aa751a963d2fe56e9b643da3d7f28aa15700e00eda6
|
||||
CVE-2023-38405,0,0,eb678e1398b0cc7afc6cadec898dca16e86921fb7075e187826e227511830ad9,2023-07-27T03:46:14.810000
|
||||
CVE-2023-38406,0,0,b4e9fee11e6ca1b95b528449b15c85e7b4af1b868f84535cfe760130604cc642,2024-04-28T07:15:08.367000
|
||||
CVE-2023-38407,0,0,693c501a24fd30d31e2ef38a392256cef1f52bdf566fe136ed9d5ad372f839a0,2024-07-03T01:40:51.010000
|
||||
CVE-2023-38408,0,0,aa067bcc02ee91438beef6886c441906ea0c381190b234c5874efece893144eb,2024-04-04T06:15:08.430000
|
||||
CVE-2023-38408,0,1,8ede47c21e8c8a65641e21bf39fbf7db76eae2d961f2c4f7ab02db10fe0385f1,2024-10-15T19:35:32.680000
|
||||
CVE-2023-38409,0,0,838e08b6ac7468e45b0e0743452ec8eac55d08ae6cebd5146f7b96ce40e80d8e,2023-07-27T03:49:09.943000
|
||||
CVE-2023-3841,0,0,d2f5ee23f09965afeb5d36623db7f402f898f5d6074e3d1a8c3e15639396c726,2024-05-17T02:27:52.550000
|
||||
CVE-2023-38410,0,0,e9274a8c2977bf03cf0d0c7f2c3582424b089bd5b319bd6a98b407cf6ad77a9e,2023-08-01T19:54:15.847000
|
||||
@ -229009,7 +229009,7 @@ CVE-2023-38424,0,0,99fd4ff2cd45804a279009f8e79f45c2460852535d8a9d8c3b2de5ec9e04f
|
||||
CVE-2023-38425,0,0,be85cd1ba5ce4b3dab7a781196e893038fb93c2e7aabf5cf3e9b4428db2d2348,2023-08-03T13:52:43.773000
|
||||
CVE-2023-38426,0,0,8be487c14d40f4026f898666c19e3292110c6d2186b99164ce31fa560af60242,2023-12-22T17:04:16.507000
|
||||
CVE-2023-38427,0,0,f05b1b68284c205ab455c4a149a75bc8fc293184ccf2be2285c37de8eae7eb94,2024-08-27T18:54:08.123000
|
||||
CVE-2023-38428,0,0,f4a809af0e056508b7dfda0d80316548cac1608ce4a052dac3c5396d76d366ce,2023-12-15T15:47:05.687000
|
||||
CVE-2023-38428,0,1,375e75c46a43c6a3875664c4403ac19dd3e6d226b31ffaf168efc17a264f8616,2024-10-15T19:35:33.587000
|
||||
CVE-2023-38429,0,0,806bfaee2c26630261e30d4b617ecf5e71aca09cbfffc25cc02a6c4e45bafa10,2023-12-22T21:34:39.870000
|
||||
CVE-2023-3843,0,0,f3768772f60b965aa9498137bd66ecdccef50ca14144b9e479bd7aa1ea659164,2024-05-17T02:27:52.767000
|
||||
CVE-2023-38430,0,0,f3010dea503abff1cfd675939731309587295c43eef70a09f838c33e10b5b5d8,2024-06-18T15:10:09.290000
|
||||
@ -230179,7 +230179,7 @@ CVE-2023-39966,0,0,c5dd0a6aec9d4aa1d397a8d8e714a2e1c27d86c17c97f295844f17f70a93c
|
||||
CVE-2023-39967,0,0,ae0d31e50c7c32eb189851841b9266bdf847b57a25fec0aa33492f6d0fc62223,2023-09-13T12:42:37.057000
|
||||
CVE-2023-39968,0,0,ba5ffd3a755e803553f689e664ca470d470bf2a69e684828049a9f7ea7ac01b6,2023-09-15T22:15:14.217000
|
||||
CVE-2023-39969,0,0,3a6b8f892432a96e36442551910e26c57b3b61e40eccd9ab8dee84cd4502cc89,2023-08-16T17:12:53.300000
|
||||
CVE-2023-3997,0,0,2e0c03c14e67fb178412e691a72daf3bf289255a682cdc5cd1e7bb51c3591278,2024-04-10T01:15:15.117000
|
||||
CVE-2023-3997,0,1,91ca3eb1595160e2a5d694f6360ea70cb38146af23de50645318c5c37bddcf2d,2024-10-15T19:15:16.200000
|
||||
CVE-2023-39970,0,0,bb21001446f839220f5969dcda80be1e71b8e426712b7408673a0298889a4538,2023-08-23T17:39:56.180000
|
||||
CVE-2023-39971,0,0,a947e48522049e989dfd2207442866b8db610de410f20becba059163cc4c0fb8,2023-12-02T01:15:08.287000
|
||||
CVE-2023-39972,0,0,3be1a709c12904acde874dbe1827101e29037ae95c88070074639e37de5f5cce,2023-08-24T18:05:21.913000
|
||||
@ -233654,7 +233654,7 @@ CVE-2023-4480,0,0,8f720a32700f0dcf88298f81723ae2c513370bf9c361e1a327c21e8404982f
|
||||
CVE-2023-44807,0,0,cc9fa087fd498d5c0142310406c2f8e5ac715823650cae019eedc78dd30884f7,2023-10-10T20:16:41.627000
|
||||
CVE-2023-44808,0,0,c21fe1fd44aeea6fd1f5d97f8e40c85ef4c9aad99cada000af1d2e25b8ea1a26,2023-10-19T11:11:35.753000
|
||||
CVE-2023-44809,0,0,106ef081b5af79dc53d4bc479d0aa2e275e4760b3cc08b2cab3264d7a797d158,2024-09-17T02:35:28.503000
|
||||
CVE-2023-4481,0,1,e5c1dbac6485fdc3f8433d7bacdb081c57e29eadaf2f516d5e233feb4d53a038,2024-10-15T17:33:02
|
||||
CVE-2023-4481,0,0,e5c1dbac6485fdc3f8433d7bacdb081c57e29eadaf2f516d5e233feb4d53a038,2024-10-15T17:33:02
|
||||
CVE-2023-44811,0,0,0fdedc6bc111ea9a02c62f8daaeff83c589b5ca14424d7f2de79dccf9ac38af2,2023-10-11T20:06:27.410000
|
||||
CVE-2023-44812,0,0,54d24d8a8649398546bc69de6f53c9b08c93a76ddc19c43fa225b2d394f3bb24,2023-10-11T20:00:04.033000
|
||||
CVE-2023-44813,0,0,e4aa38d88de0406751f5d82932d7709b2c42f855dfd3b491016e37100dc99415,2023-10-11T19:58:17.857000
|
||||
@ -234030,7 +234030,7 @@ CVE-2023-4536,0,0,69a4fb02e12f51562a4ed02a5feba11f17c9156d60c929fae4f1f4d1a0fcd5
|
||||
CVE-2023-45360,0,0,51f5be670f4820f6554440e90df143b044bbe2fdeab52ce50a1d833e1bcd2b47,2024-07-03T01:41:52.177000
|
||||
CVE-2023-45361,0,0,cbe1837117bae77cfa7c8113ef4bff14da0fe193bd049419020e7f971bbde8da,2024-10-10T12:51:56.987000
|
||||
CVE-2023-45362,0,0,6a324f41b6301bc393e4e53b7fe2d3c213070e5c36f11f2203dcccfc20038a9d,2024-06-10T17:16:14.220000
|
||||
CVE-2023-45363,0,0,728e401caf5de0b2421c163c08fdae2d4e4266b24ff5473d3ccbff70b3694240,2023-11-28T13:15:07.313000
|
||||
CVE-2023-45363,0,1,355fc5f232bf1e41d622931e8e0fa5fff2ffd211e1fe3e75c8946b919ef7f3a9,2024-10-15T18:35:06.707000
|
||||
CVE-2023-45364,0,0,f79b09441be35e30c9a56051fad391b8b7b6b0ac345cea10067065f1c5feb28b,2023-10-12T16:03:43.650000
|
||||
CVE-2023-45367,0,0,ac61fe513de8db0ac0e72342e10d19f9e37057aaece3f3b1a2e37f81f09ae966,2023-10-12T16:04:00.317000
|
||||
CVE-2023-45369,0,0,5f3d7f66c5694839640651e4f0443a7fcea9aecd3143e1a52583a93a833c4cc3,2023-10-12T16:04:12.437000
|
||||
@ -234066,7 +234066,7 @@ CVE-2023-4543,0,0,dc1ba3a33cff31b8fca78e8cb21ccb021964ab63d67083a56dc6088e7b3319
|
||||
CVE-2023-4544,0,0,66678644f5a46dafda162d852e01208919798bc2eea8520b8083f0782a62c9e6,2024-05-17T02:31:38.500000
|
||||
CVE-2023-4545,0,0,5094a10071b5d5056e6f60e262b3febe432e4176bd6515e9eb7db9cc518aaf27,2024-05-17T02:31:38.600000
|
||||
CVE-2023-4546,0,0,fb1125db61b39cbad44dc327e25d0286799298f14003739d8954476eaa2b4478,2024-05-17T02:31:38.700000
|
||||
CVE-2023-45463,0,0,3510bfcdc87a2c6260344eb43bed2dd8b69f04115444704654eb7d4ae4288d45,2023-12-08T21:01:43.550000
|
||||
CVE-2023-45463,0,1,9a78f4d0c8b60857252fea436d15ef84513884af739bee3fed98f637e0f511b0,2024-10-15T18:35:08.103000
|
||||
CVE-2023-45464,0,0,9884346d6a54efd33ad0403f2fae16c7bcf0ac34b9ae12386f58aef94fecf27d,2023-10-19T13:27:25.730000
|
||||
CVE-2023-45465,0,0,11939030ce4eb60d36017d66f280d06015e01b5a936b89674c2cd009eaa75136,2023-10-19T13:18:38.903000
|
||||
CVE-2023-45466,0,0,e19a332c24420755e29bdc00eb4f026cc2eead002eeae82e40fa92694ac9d222,2023-10-16T18:41:36.367000
|
||||
@ -234092,7 +234092,7 @@ CVE-2023-45510,0,0,95ec13089e5a8f1f6f38bec4a800643c30de82e9ef02421078bf52c52538a
|
||||
CVE-2023-45511,0,0,6a83b3b6e8ef3421fb625ab6b3efe4a060ef6fdb1aa115c72fc3336b2273558b,2024-09-19T02:35:26.067000
|
||||
CVE-2023-4552,0,0,f0537603c3e5921898d4c4486b214591cfc8340feaf410d7a71774714a6fb778,2024-02-05T21:59:35.087000
|
||||
CVE-2023-4553,0,0,7f7b3a1004c52632b83f35e4ed5b600ac3f6bf55e8037452043bd49f8b38d638,2024-02-05T21:56:14.073000
|
||||
CVE-2023-45539,0,0,14e5807e2e545a12b44e0f4dc1ccdba533d2f724acf1b5d66372955165f5d45d,2023-12-14T17:15:07.860000
|
||||
CVE-2023-45539,0,1,b9b4ee3af81befee503a260383b848c3b499e8e8720b40b3848220ebe0551075,2024-10-15T18:35:08.890000
|
||||
CVE-2023-4554,0,0,cf6e0493fabcb0eae28fa5204b10744a5f3d57423632a868834aac6bfc68065b,2024-02-05T21:24:36.410000
|
||||
CVE-2023-45540,0,0,f9fa54d48e396850cd644dcfc14b11c3a5b9baa24fe488931741460c67fc5d90,2023-10-20T16:39:15.033000
|
||||
CVE-2023-45542,0,0,b9354eb52840255b735a9b8f8af4d37bbb9c5799afb10666e715844b295ab72c,2023-10-19T17:56:38.130000
|
||||
@ -234238,7 +234238,7 @@ CVE-2023-45703,0,0,070556f7cdea4e2addb11676672b324dd42d5030b84172af518bfffd1b6c3
|
||||
CVE-2023-45705,0,0,d1579cdf15cf92ecd2427576da99f9ba06dccb4858fdaa9197aca556facb2f0b,2024-03-28T16:07:30.893000
|
||||
CVE-2023-45706,0,0,d5dc82953bacdf7e8692c6cee3f5b9e98683974171515533c84fee346772acc6,2024-03-28T16:07:30.893000
|
||||
CVE-2023-45707,0,0,c9b6196c79b5d00c9329a89273abfc5e4f68dd2d284703e16af7a7bd88eb0240,2024-07-03T01:41:54.823000
|
||||
CVE-2023-4571,0,0,92ce5017693d8f76d50711a158af46c583ba7c6561a65e75de43de382d903662,2024-04-10T01:15:17.183000
|
||||
CVE-2023-4571,0,1,8443fc50273dfda29496cebed5d56f9ac194ad2e3c5671055eb503b739aefb15,2024-10-15T19:15:16.617000
|
||||
CVE-2023-45715,0,0,3278c072bd924465dfd9116ec5360f462dea3279fa22b565085ccb5501f7df77,2024-03-28T16:07:30.893000
|
||||
CVE-2023-45716,0,0,db0d44612bd142c520992fd82eb862661776e524392c1075202fb819e27d77c1,2024-02-26T21:22:54.537000
|
||||
CVE-2023-45718,0,0,503b94f26ece1372afe2befc1749228de6ec2a3a2f622ed4183f733f3d6e1b85,2024-09-05T13:14:01.253000
|
||||
@ -234307,7 +234307,7 @@ CVE-2023-45799,0,0,188b0f83d7878ae47b8098f969f768cf869e50e3dea08b261f247126db8b5
|
||||
CVE-2023-4580,0,0,a57c3e7664e688b156820bd4b918e3f8486072b2b6add09845f38021feffdaf5,2023-09-14T03:53:15.150000
|
||||
CVE-2023-45800,0,0,f496ca2530efaf7c1db1169c548eb0572c2c7fa0dc16de92c9d8b65231aa37ad,2023-12-15T18:50:06.017000
|
||||
CVE-2023-45801,0,0,cf65d978a57bbdd5cf197844da19475d7658c7088a3bc16263e469fcf01449d6,2023-12-15T17:12:58.397000
|
||||
CVE-2023-45802,0,0,8b3cdecaad63513060b2cc217b8caa27800f29debb41e85c772f92c84e24b817,2024-10-14T09:15:02.967000
|
||||
CVE-2023-45802,0,1,09b74e4a217ba14073d80c83bfe062d5ee5b7e02e2c72c2e4450da1fa0048906,2024-10-15T18:42:31.357000
|
||||
CVE-2023-45803,0,0,23b8cbd7f626523fc6c08c975e564a6e86c86fc0e31e897720bf93e28c1eefe1,2023-11-03T22:15:11.693000
|
||||
CVE-2023-45804,0,0,dc3dcadd1fa31289495558cbc9b18ddf506c53bed3ec877dd82065d35e3d6f57,2023-11-07T04:21:48.277000
|
||||
CVE-2023-45805,0,0,513f366112bde8fc8e42fbdfa66a39be7b5c9845822dfc13910fb1d740f25275,2023-10-28T03:24:28.190000
|
||||
@ -235186,7 +235186,7 @@ CVE-2023-46951,0,0,a2a1149009673701bfe93ebcee7c48a3a58110ed1168d2bfdf50f80a7f0c0
|
||||
CVE-2023-46952,0,0,4bcf3948e8ecb1744ce911545c8fe6c861e6c40af1d5cc477719602d32e4f796,2024-01-23T21:44:21.433000
|
||||
CVE-2023-46953,0,0,a872c64c0c4c630030a60d7892d6bcb58eb0d3a3b33b50c7787cc33ab267e7ac,2024-01-11T17:06:37.437000
|
||||
CVE-2023-46954,0,0,027d3e8eb2a616e66ceedcb4a181a859da01b616cab639574d99af94762dbf8e,2024-09-06T17:35:01.953000
|
||||
CVE-2023-46956,0,0,31cbd0a04e29ac22bd9f823d3179040618ffc4e9e1a4e90764004517af632bb2,2023-12-06T18:39:39.687000
|
||||
CVE-2023-46956,0,1,2526c98583f5cb1d344e6399b829c1d7032935dea1897c631f9e7d92b2a01108,2024-10-15T18:35:09.673000
|
||||
CVE-2023-46958,0,0,598349dfda94719665577de5fe0aa92d56da1b66528cb3b507f9540b0549c2e6,2024-09-06T14:35:08.110000
|
||||
CVE-2023-4696,0,0,c17d353a65b5fe55231e71fd5dd8d9e90c20a1609f561de61d8d7b05e4fee642,2023-09-01T13:06:59.890000
|
||||
CVE-2023-46960,0,0,60db2322c4a9b765f494d0ebafcd8efdc2e2d2d8adcbfbca9f64c33ec63e600d,2024-08-01T13:45:04.950000
|
||||
@ -236429,7 +236429,7 @@ CVE-2023-48651,0,0,3f057a7afdd285e7554b0b6c284d29d42d3ba941fa604744fc1323c88db54
|
||||
CVE-2023-48652,0,0,30b28f5f6b93a46b2c1ce1f52cf168a633e5c34fa669bcb9ecb58b95d6522d89,2023-12-29T05:55:24.390000
|
||||
CVE-2023-48653,0,0,4fb6e7a0b008e20f51ef4f63111fbf9fd0f0079e0ab2a1dc1103c7b617dc71ee,2024-02-29T13:49:47.277000
|
||||
CVE-2023-48654,0,0,0b3b3102ce95f91c22905aa8f0c132cc56aba7398dff3c49066ba8dfc7f41451,2024-01-03T20:54:40.840000
|
||||
CVE-2023-48655,0,0,32d07d4d98f6f91cf7110695bc0f0d5560deaae915ec1bc7979ae136176088ee,2024-01-10T00:15:45.530000
|
||||
CVE-2023-48655,0,1,3aabd822ee44ed91334c6908392362a5f10f9c820ec96a8071366621f0e3c6b8,2024-10-15T18:35:10.453000
|
||||
CVE-2023-48656,0,0,4491ef8244b3a516fc90d018e6fde5397fdcf13d8bed3ec3a4791b68d1f4b1f8,2024-01-10T00:15:45.627000
|
||||
CVE-2023-48657,0,0,4d5ad332b04fdd82aa860b75ce703a807f1db2387fc2d1d764cadab3e7a52a5c,2024-01-10T00:15:45.697000
|
||||
CVE-2023-48658,0,0,e82fed3d9ed202c99ba234764f4a940d593822fcfe2e74b2ca4a927a3db4f761,2024-01-10T00:15:45.780000
|
||||
@ -236601,7 +236601,7 @@ CVE-2023-4884,0,0,cfbecc9b7cb6cbd0b4b1362ef48e959396e0c75ee9945389f4dfeb8d9f826a
|
||||
CVE-2023-48840,0,0,66507f89762cce8058d30fe903be3d25aa0326032ad749eddab90f58dfe5e1f6,2023-12-09T04:46:03.793000
|
||||
CVE-2023-48841,0,0,a98679f76431dcf6326a4f8961979545584bd793a405fa03c3999d29af747aba,2024-10-09T15:35:09.740000
|
||||
CVE-2023-48842,0,0,99ae820b733e6276d6aa35a1a60ab7d466debfd9a079b7690c967b25c7e87d0d,2023-12-06T18:54:07.467000
|
||||
CVE-2023-48848,0,0,6104d81c07dc162ba8030e44033fb5f9f2b6b25c8fdd6ce70f4501237665e04f,2023-12-04T19:05:42.390000
|
||||
CVE-2023-48848,0,1,e9dca9c0d63c1eb039bf47ed52632a0af1e0c2a089d537841789922521ea6ad0,2024-10-15T18:35:11.340000
|
||||
CVE-2023-48849,0,0,2253543c611d2e3acc680e128d1321413ba686970c36c4ae9ebbfec5b2a9273d,2023-12-11T16:18:06.687000
|
||||
CVE-2023-4885,0,0,b2886bf75dd8aeea5a7e4b1b6590ad94e6642e0e312579090bc490039b601938,2023-10-05T00:57:17.943000
|
||||
CVE-2023-48858,0,0,f7bef58909aa98ac653b8350d9c446ced9ed809586d0f82043ffb04744211c78,2024-01-24T20:16:53.197000
|
||||
@ -236630,7 +236630,7 @@ CVE-2023-48903,0,0,c36eea55d7ebb58b6550658aa069864d729af997931b2f0f1cd8f0bd7c2c2
|
||||
CVE-2023-48906,0,0,dcf61e4baeea39a70a46cf16ef25f7d94c12ff2d2949997b5a61f61056a26263,2024-04-02T12:50:42.233000
|
||||
CVE-2023-48909,0,0,6e26fded8220754411f0b0c0969e60ad89d13528c1e447cb4c30f373b2f2fd1f,2024-01-22T16:33:28.663000
|
||||
CVE-2023-4891,0,0,518501d9fad12c9ba0655a11e9a287ce14b36fbcb904c6e98df8ddbd16b3fc84,2023-11-16T18:01:59.767000
|
||||
CVE-2023-48910,0,0,e96f6ed6022459c2cdcf45f692175ebeba1cadf0d1ce60155df5c2f8b76a1591,2023-12-07T21:02:12.637000
|
||||
CVE-2023-48910,0,1,059e3303b5f5870784eaca4274404a7f4379993c2d106b460273a0c44ee1022e,2024-10-15T18:35:12.120000
|
||||
CVE-2023-48912,0,0,3e44b44d8c36623152dbf778c1bd6b4d6975114ac15e1ef6e92dfb4947cc5a99,2023-12-05T20:07:27.620000
|
||||
CVE-2023-48913,0,0,3113a871c852c204f0705f6536a463b4b18ffc49c61dd56d51083e9768834811,2023-12-05T20:10:04.053000
|
||||
CVE-2023-48914,0,0,f62ce7097dc2f1dc959323c678c29edb1633195083f560ff982632d82d4b0610,2023-12-05T20:08:48.207000
|
||||
@ -242965,7 +242965,7 @@ CVE-2024-1869,0,0,3998fca9aba65da3032051bba49c4c7fbbed3ad27cf86d29260ce751b65a61
|
||||
CVE-2024-1870,0,0,9043a976525f352aaa6c3d9729ba890eb6378250a18455d48857378e562c62f9,2024-03-11T01:32:29.610000
|
||||
CVE-2024-1871,0,0,3febb3fff07b16e51c21f3b87748727e6cb83597ff7d412acb640471d56a308d,2024-05-17T02:35:39.620000
|
||||
CVE-2024-1872,0,0,aa7a68ee0f5f23cfde15f81a4ee68e0aba9fc68928dc131f7d1904269d9689ce,2024-03-29T12:45:02.937000
|
||||
CVE-2024-1873,0,0,f263a4f5306a6c00e4089baff2ff7c677aae5fedd4deda225a2c446b8d585908,2024-06-07T14:56:05.647000
|
||||
CVE-2024-1873,0,1,48ba33ce47bb197174bf426612a0767c59b5459a927dfd6b91332949526c3c92,2024-10-15T19:14:09.547000
|
||||
CVE-2024-1874,0,0,b3d82a78aae87d3aff2d8730cda3de5c4eb1ff6a7a168fbf4393adaad2eb2b3f,2024-06-13T04:15:16.157000
|
||||
CVE-2024-1875,0,0,a69a70937681edd3d5184a4fd13b8b71713c44ac42ff9a8634ede759dab371d6,2024-05-17T02:35:39.780000
|
||||
CVE-2024-1876,0,0,e8e0571c659b0fa787427894c4b874422cd76362527c553c866da3c23dcf7847,2024-05-17T02:35:39.867000
|
||||
@ -244860,7 +244860,7 @@ CVE-2024-22318,0,0,23961be1d55db1add7e5c07e52a10b572ea2445d12113c47c48e0f1ac8215
|
||||
CVE-2024-22319,0,0,ea19cdf9e4072a8b9cfc9502b925f062e7b8a96ab088ba79c4019077bc3c20e6,2024-03-21T02:52:02.483000
|
||||
CVE-2024-2232,0,0,eb55e6d1211c43c7498854b3b8820fe2f01b88d448661718d29c577fdabad9d6,2024-08-07T14:35:01.727000
|
||||
CVE-2024-22320,0,0,ec85534fc104e628cf2f58dee5a98a0a436bfe75ddbc94f8841f4752e5e01ce2,2024-03-21T02:52:02.607000
|
||||
CVE-2024-22326,0,0,b3eaceedec16b8a3de1cf940d604f1e18610d5b396997267a191f16e42ff711e,2024-06-07T14:56:05.647000
|
||||
CVE-2024-22326,0,1,0b9083c74a3b6261928ae256538efe0ffc9696087bfcb2cd57b40a111b96cf5d,2024-10-15T19:51:10.393000
|
||||
CVE-2024-22328,0,0,a39f02e34baf95d793f8f0fc19cf685bee17730011f4e69feb7fe01d897a8992,2024-04-08T18:48:40.217000
|
||||
CVE-2024-22329,0,0,aa0a912726f87ac0fc2f03e4f48cf9b56180a47c1f55734bdb4c9a367e28989d,2024-04-17T12:48:07.510000
|
||||
CVE-2024-2233,0,0,64d5f0d00597a950fc292ee037f4f02af319aec097e9756db9a22b729db28750,2024-07-08T14:18:11.917000
|
||||
@ -246479,9 +246479,9 @@ CVE-2024-24875,0,0,d4175d9d145d2e6aa042e46e11e97f48819e638c38138d0ec209148e9f744
|
||||
CVE-2024-24876,0,0,fd2b02565d60f44ad7f12138fcc8688af9116be3df3cfc2409498788186c00a9,2024-02-22T19:07:27.197000
|
||||
CVE-2024-24877,0,0,9d2f0e7fc46543edf49748fb4f8f8be67b4fb86dc6a0325358bf368765aade7c,2024-02-15T02:53:41.823000
|
||||
CVE-2024-24878,0,0,298a08ab82a5bf3a5e1905d2bd2b0b3a16b15c92c4d573ce5c55312b22ff7afa,2024-02-15T03:01:50.883000
|
||||
CVE-2024-24879,0,0,bf6b13e3233057aaea0d59bba3f9d4b670c9c80198928f79e24fcebaa00a210e,2024-02-08T13:44:11.750000
|
||||
CVE-2024-24879,0,1,1422cad3ad9accd9aa029eb9d1c62dbe9e3a36357966aceb9c265cb2245cb4ff,2024-10-15T19:39:30.157000
|
||||
CVE-2024-2488,0,0,9f9545c282e96006573210a989f186c5df3154a3513e0af714a0d9e2892e8aac,2024-05-17T02:38:15.413000
|
||||
CVE-2024-24880,0,0,70ad5aab83df57ce9217f3bc641d9386a6067eebf334b2d7ba7e24c2c6f354fb,2024-02-08T13:44:11.750000
|
||||
CVE-2024-24880,0,1,417f1620a783691d55294b271631d28b4b974c4f2048f45d9f97fd0cbadb67a0,2024-10-15T19:41:39.670000
|
||||
CVE-2024-24881,0,0,83232d9aad9f81c612eac50a505c74c916726b151a429d494f39905108d0a162,2024-10-09T16:28:32.153000
|
||||
CVE-2024-24882,0,0,381ab78a9a0af97941fd74c6df8e310e9ebd0e71a36f326d7eada32431ec60f2,2024-05-17T18:36:05.263000
|
||||
CVE-2024-24883,0,0,da5a0962c7cfdbb418c545bab7733305dd100d1fcb6e77a25a1017edf709a327,2024-04-11T12:47:44.137000
|
||||
@ -247493,7 +247493,7 @@ CVE-2024-26236,0,0,19d5aae98ae95db4c4d70f418437d84d96fc7ffa6eb3fc6e960d1fb32f039
|
||||
CVE-2024-26237,0,0,4a5a46dfbaa9ee757c266cb06f5bdd3b7c9c9212350e3b3f940b0f5aa28b1fa2,2024-04-10T13:24:00.070000
|
||||
CVE-2024-26238,0,0,f51ff6c77a18790c6e3fbd5916b9e4339c1fbba58d3f9a7dc1403152bf549147,2024-05-14T19:17:55.627000
|
||||
CVE-2024-26239,0,0,b6bef41140cc2fe190d67ae538417b420d577a7d3675c65900e55846e1dc5504,2024-04-10T13:24:00.070000
|
||||
CVE-2024-2624,0,0,9d29efc17e6364740a6798ed3ebc8be6debf3940cacd2e3ec7a7a0de154ad1a1,2024-06-07T14:56:05.647000
|
||||
CVE-2024-2624,0,1,f8883c0ffc3c07e08d49666aeea251af0b4d5d0067045e6b3090117c94be39af,2024-10-15T18:49:16.667000
|
||||
CVE-2024-26240,0,0,469d109d7f6dbe34081d9860472aff3b4e252c2c74e78521b270d4e97c1e526f,2024-04-10T13:24:00.070000
|
||||
CVE-2024-26241,0,0,ad49425919c070a9631331db70a22ebb9d6d5ba3446192474b9ed36e91182f09,2024-04-10T13:24:00.070000
|
||||
CVE-2024-26242,0,0,87be43bdf41cad376dd7ec9618b8c7069b8c8b4a0eda2f8823d78d95a17b33c7,2024-04-10T13:24:00.070000
|
||||
@ -249917,7 +249917,7 @@ CVE-2024-2963,0,0,31d50b8247d27494fa9b9adaa5f17e80a25f74cd25c24e5136f653283814c7
|
||||
CVE-2024-2964,0,0,6af8d38af5c9612485676aa7d2fa3bff7d4d2c725303e86b5f288ee45d8070f9,2024-03-29T12:45:02.937000
|
||||
CVE-2024-29640,0,0,86e865cda03b368a317d7c9a1be400ed630e63c917f88b7400c156c17d9e66f3,2024-08-27T18:35:07.370000
|
||||
CVE-2024-29644,0,0,8f85f2ee54dea78f450e0a34d8d144c380c8a4c7a954f54ad9e505caffbc88b6,2024-08-05T17:35:10.887000
|
||||
CVE-2024-2965,0,0,e178a5677ff509b758e925bb6981e960414ae7e25d8c6ced56d5c9529602efc8,2024-06-25T11:15:49.873000
|
||||
CVE-2024-2965,0,1,33064d8404a1f414503cee7ae4d0f3de7144ff0f58588fb6c3798d949ec71919,2024-10-15T18:55:04.863000
|
||||
CVE-2024-29650,0,0,32230dc7c100b4d45992d9916209ac72d3ba4f4a88f0a390b7772dee0091b547,2024-08-01T16:35:08.160000
|
||||
CVE-2024-29651,0,0,10ced44f5f76b0e20af308caf370e6cc4fceca5031ea22581c3d1437b439d8e2,2024-08-20T14:35:13.967000
|
||||
CVE-2024-2966,0,0,400ebec10c52dfe133448a888edcb5c95faf833eae277c5e987b3dc9ba62c6f2,2024-04-11T12:47:44.137000
|
||||
@ -250164,7 +250164,7 @@ CVE-2024-29941,0,0,5268fd2170dfcdffdb652336d23b2a74b8e628a596ea4475ef9d929015e3f
|
||||
CVE-2024-29943,0,0,77fce75b3b79190c7987459c64d58a0451f9c8cb7178727b76412299d4b63e02,2024-08-12T17:35:03.860000
|
||||
CVE-2024-29944,0,0,0c36a6d1c7372e4eb368749381c53b8250c9da970d136cfa0d6ab703ac139be6,2024-08-27T18:35:09.073000
|
||||
CVE-2024-29945,0,0,545d8d8a5d454680f75ae96bc2bf76a65720f53d27f04c08caf122c1f6350f1e,2024-04-10T01:15:18.693000
|
||||
CVE-2024-29946,0,0,140bcfc073bda94d7ef4639048c1485e5634c470063153e21df7be99b584ee7c,2024-08-12T20:35:03.383000
|
||||
CVE-2024-29946,0,1,fe7659ecbb6ae16d4fdd53bc892e5c7f96cebf8e48eee47ced0bee27647d82e8,2024-10-15T18:35:13.400000
|
||||
CVE-2024-29947,0,0,5ce72939d2768b5ffd8ef75fa59eeac4277e1fd0f98f69cde2fd39c4873b7e51,2024-04-02T12:50:42.233000
|
||||
CVE-2024-29948,0,0,7ed27d99c23307d6fd7f79bc81ee07d6524ce20c9d05b450c959d1b570daca5b,2024-04-02T12:50:42.233000
|
||||
CVE-2024-29949,0,0,8f69a1b2712eb97f7e6695f2c2705447de624d6bcea7462b789eaee89a32183e,2024-08-27T15:35:13.560000
|
||||
@ -250573,7 +250573,7 @@ CVE-2024-30369,0,0,084ebabb6bba6f65e3a665faf08cf2442ac42f59e1585ca47c68653967d4e
|
||||
CVE-2024-3037,0,0,5192283ef3f0b9026a4bd8ad8d1a7b79d0e8030dc3224136afdfcbc8af6dad6b,2024-09-26T02:15:02.277000
|
||||
CVE-2024-30370,0,0,6207ecfb3ab83effd5b69f8ad0454d61dd1c4b620444f7bf5bed75b59a7e9bf2,2024-04-03T12:38:04.840000
|
||||
CVE-2024-30371,0,0,5cb1f88df7d7d6dd29afc1f981808ff71d5fa01260db76282c78c8209c6570fc,2024-04-03T12:38:04.840000
|
||||
CVE-2024-30373,0,0,d55376e4b21a73ffd899f3f3f278ea14c11108d98d740fdf1d6c4014999d9779,2024-06-07T14:56:05.647000
|
||||
CVE-2024-30373,0,1,fd6dad9f528d4b818b9cd3b70c19f394231e81452601d5b071c636fca6b844b9,2024-10-15T18:23:52.207000
|
||||
CVE-2024-30374,0,0,4a829013b3c1a4609a76f5790d534eb221b5942a8caf978bc6991bfee50c426e,2024-09-26T14:22:20.047000
|
||||
CVE-2024-30375,0,0,e38288bbc33b00a1927d2243b199eacbf12e85c7f7703d097b6b791a059430e2,2024-09-26T14:24:26.730000
|
||||
CVE-2024-30378,0,0,b80140413aed971e52d27ba98a46e8aa758cf76f2f094e7fb695d089c0e62074,2024-05-16T18:15:09.407000
|
||||
@ -252398,7 +252398,7 @@ CVE-2024-32869,0,0,69becb8131b51a67986aa1e24b4ccea1d69cd7e659280280f6d26b43d75df
|
||||
CVE-2024-3287,0,0,81c3e92cb525adf74a229ae8f4dc096d97ad8021a63134e1a741f1327c99a33a,2024-05-02T18:00:37.360000
|
||||
CVE-2024-32871,0,0,c0389a284947a3f025a08761a37fdb67fc665da6d219972d0c888cc5d32f0801,2024-06-10T21:07:12.030000
|
||||
CVE-2024-32872,0,0,dd2fffea9672a216dbcdde4c4a274554beaeb36e5143b921e2a822ba0dc44c31,2024-04-24T17:16:50.397000
|
||||
CVE-2024-32873,0,0,f3739c2039d9173c83006ce7450adea489a507dec59c17c0ec72c42eefc719dc,2024-06-07T14:56:05.647000
|
||||
CVE-2024-32873,0,1,0ff9ac0dc6e337547d76cd6798c23a9cd2a1d3d981e083768193a558e753694d,2024-10-15T19:22:33.647000
|
||||
CVE-2024-32874,0,0,addb84ea881ea0feaefba19978b4f9ede845534ba6243cf8c5e6018bc364eb26,2024-05-14T16:12:23.490000
|
||||
CVE-2024-32875,0,0,40aaa75f1201e42c5f0849be8614c0a4d622893733a69b13d08c130e0c9a1074,2024-04-24T13:39:42.883000
|
||||
CVE-2024-32876,0,0,8a2a937b5bb789a06f1b910a6e7251f42791b60b4d46c3846bf785e13f1c5823,2024-04-24T19:58:40.710000
|
||||
@ -254203,6 +254203,7 @@ CVE-2024-35580,0,0,a43fd10e129fd9e146689cfa2d63929069dd287ced1e3cf39c84ed52a8ef4
|
||||
CVE-2024-35581,0,0,f44263214f42e721dd7c3dc00efbb15dd18e867b1fcd80955bdfd7a6cc44bd29,2024-07-03T02:01:55.113000
|
||||
CVE-2024-35582,0,0,2219b5579a19c25f0f78733ea0e4d22e0bdafa0a58bb93c103fdebb267edde75,2024-08-20T15:35:17.183000
|
||||
CVE-2024-35583,0,0,b5c80f126e7aedb5091bd213ec23d58eb7894ac75a15e7c2f39695f5e3fa2ab6,2024-08-01T13:52:43.587000
|
||||
CVE-2024-35584,1,1,c61e0d501e1d989580b5328f300efd5dcd9735c0a7006cd352a8a1802d08769f,2024-10-15T19:15:16.957000
|
||||
CVE-2024-3559,0,0,6795a97a10669b581ec15fc558119e6f23b6f2221caf66e80800086dfa7b2bd5,2024-06-13T18:36:09.013000
|
||||
CVE-2024-35591,0,0,27faac454b8155f287bc6ac35261d2d1913acb4129e9514b657e844f649215b5,2024-08-29T20:36:47.170000
|
||||
CVE-2024-35592,0,0,c1fef65873ac1061d41e08db42afc69241a1ccc24e746aa460028428ca90ae7f,2024-08-20T15:35:17.980000
|
||||
@ -254849,7 +254850,7 @@ CVE-2024-3626,0,0,ecad313ba7341fd9bbe18ef0c6d316a3039cc88d660f7ee647b2392d610dec
|
||||
CVE-2024-36260,0,0,eb0574ced86ce4421ec32797bfb96748b51a8c31102b417db4374d946aa9d144,2024-09-09T12:21:53.383000
|
||||
CVE-2024-36261,0,0,c5e25a6ffc1d9b2b1a542491c796ec9c713e3656e35c75393a1c0c59fce58861,2024-09-23T14:16:44.273000
|
||||
CVE-2024-36263,0,0,b19ce9bdaf5871a0e8a25ce5c3dd3fadaa21375012330812df4d2d32a979172d,2024-08-21T15:35:09.140000
|
||||
CVE-2024-36264,0,0,902f0e415355048d98f149346eaafb6e286e187db1d5026fa72650af847ceca3,2024-10-14T09:15:04
|
||||
CVE-2024-36264,0,1,0a62131b07156b0179f3441bfe77f5b1ed091699b66e5976a0a8c084173d9a24,2024-10-15T18:46:46.633000
|
||||
CVE-2024-36265,0,0,12d738a1b4f63f0028c8f62cfbcac12211bd41f794fc3fcd67344ea579538e2e,2024-09-26T14:35:23.360000
|
||||
CVE-2024-36266,0,0,9d2961d489b0fce568e04e4c1c269f16c8c57dd6d267e14663bd78f27bc7e154,2024-06-11T13:54:12.057000
|
||||
CVE-2024-36267,0,0,66b127f77fa5a54e7fcd6fbeddc446c0aeca670a52e22fd99c771e136e0935f8,2024-07-03T02:03:00.383000
|
||||
@ -255102,10 +255103,10 @@ CVE-2024-3672,0,0,3f4375d3f925965eedd3021149cf89991af4643d3a1e99168ddd0533ac28ff
|
||||
CVE-2024-36728,0,0,685c6307c04e58fb91aa1cd3d8196094b317c76e0e4421d5d65d9f3c42021678,2024-07-03T02:03:33.547000
|
||||
CVE-2024-36729,0,0,d45877829f45f72a36efe808f4ab30639504f5ee409a1f4bbca4482bbbc7cd52,2024-07-03T02:03:34.353000
|
||||
CVE-2024-3673,0,0,793bfe64393173ca9d6fad84c98d57e0015832a693f798ed6c4f8a051964a6cc,2024-08-30T19:35:06.567000
|
||||
CVE-2024-36730,0,0,bde34fb358bb97f482c42e2ac502de0d6a71608d72eee227c2d882aedb55a476,2024-06-07T14:56:05.647000
|
||||
CVE-2024-36730,0,1,47a1048d0cce3bd24213ea634eb12d347f4b856c9821af240d374fe9caf8bcaa,2024-10-15T19:25:24.773000
|
||||
CVE-2024-36732,0,0,89ef79acf914e7fa79f0997bbb77dd27a533cae855c7319e0da9cc89d060d11c,2024-08-01T13:53:14.287000
|
||||
CVE-2024-36734,0,0,37607296c2114d18eb9371884ac39d9c7abe072eefba87ba6dd89607d9b61cc6,2024-08-20T14:35:24.830000
|
||||
CVE-2024-36735,0,0,7e77c1c2f42a7160fedd9f29c2dec0ba326afbd11e438159f9b83ba055e05300,2024-06-07T14:56:05.647000
|
||||
CVE-2024-36735,0,1,616a14bca9c8563a817269ef367a8fc2b8ae8bda780dc4acd9d5028036ab3e05,2024-10-15T19:31:49.630000
|
||||
CVE-2024-36736,0,0,c50cb1cf13d661e9b33a59110518d0f4be71f27e3bfa5afa7ea981ac29d9a915,2024-09-18T15:06:23.837000
|
||||
CVE-2024-36737,0,0,057f118c82edd0aa1d4131fe214e85ce5f2a6c68abed48ab267123bdfcc3df73,2024-08-20T16:35:19.277000
|
||||
CVE-2024-3674,0,0,03b7d2663970c659e666aededf211d9dc4cf0601da686d1d01e4f2350a35269d,2024-05-02T18:00:37.360000
|
||||
@ -255271,21 +255272,21 @@ CVE-2024-3698,0,0,1636f30943e700f62090e4fa161d7d9dd9aa51f3d552ed312bd5146a81f86c
|
||||
CVE-2024-36980,0,0,e49231cf188398c0359917434170af1132681e7b8b4d7cdf62fdadcaa3a55c33,2024-09-26T20:53:57.597000
|
||||
CVE-2024-36981,0,0,692e3253e54d255e568ff73285bb6cacdec70eb91eb30bd794acc0fdb33ebac4,2024-09-26T20:55:39.783000
|
||||
CVE-2024-36982,0,0,aa7c6f6fb5fb0c2be2ff96348e0ea696169b845aaba61abec5ab8d5dad3d35cc,2024-08-02T15:27:14.607000
|
||||
CVE-2024-36983,0,0,e2f2eb32ae3cfffdff5d7dfbfdef5f12a2b42788ca5c6f7f7a02f6e1986f58cd,2024-07-08T14:18:39.520000
|
||||
CVE-2024-36984,0,0,e0e9241900a224e3ad6fe1ba063f84bef1aef3bc909574846a1878b8e10e5d08,2024-07-03T02:03:57.773000
|
||||
CVE-2024-36985,0,0,79ad0407ff845adba2267085ae08be5487982d62becef69388cf8c25525fe83e,2024-07-08T14:18:40.360000
|
||||
CVE-2024-36983,0,1,3d2671e3b6faad6837d39321277c4a087da43bfc9e171858dbd03f44fb9a4b06,2024-10-15T18:35:13.550000
|
||||
CVE-2024-36984,0,1,5ab2ac22a4ff5dc4e74e9156d2e3d10e3aab10ff6f84623eec6fcd6d6201a02d,2024-10-15T18:35:13.683000
|
||||
CVE-2024-36985,0,1,b797a67fe55aeafc6435df22b9723883504e6bd69623593e54049520578cd9da,2024-10-15T18:35:13.810000
|
||||
CVE-2024-36986,0,0,19150827ddb5a5edfc4814b01ab21fdc0631b6b8b842914dd22329d1e779f69a,2024-08-02T15:24:42.677000
|
||||
CVE-2024-36987,0,0,1d55b78de0429e0f9217425a916f7a81cae7e1ecd4aabcd3cf4385f4839c5aca,2024-08-02T15:21:54.573000
|
||||
CVE-2024-36989,0,0,e29df74fff69a124cbba202c433c463e6aee8ba4fb035b75e2a80ecf4b180960,2024-10-10T11:58:28.630000
|
||||
CVE-2024-3699,0,0,30b1531f872c88b7cbea0828fb395914bc791e58c332296f8abe3de89de3423a,2024-06-12T17:53:09.130000
|
||||
CVE-2024-36990,0,0,c6ebb7eedce1b1630f254f51b2ec2bdff0ad362c70cf722357a5198ef0b015f1,2024-08-21T14:29:07.173000
|
||||
CVE-2024-36991,0,0,170802115c918c2bd8567732564fe4924a4eadc0df36a7df6beeafa80b77c812,2024-07-22T15:00:45.110000
|
||||
CVE-2024-36991,0,1,c7d9550d82ccdf9d656e7761cf6e8ead1b939e36f63a32cf976b15c461af5891,2024-10-15T18:35:13.927000
|
||||
CVE-2024-36992,0,0,abecdc4ff7a886a1f65deead5ea9a8254937cde8f8bba6a6817f94c9cd8353cb,2024-08-21T14:30:51.263000
|
||||
CVE-2024-36993,0,0,7f59a560bfa90071fc78d38c16f79210d5ba47a0e83d9bb9c035ff8837c28bcc,2024-08-21T14:31:35.970000
|
||||
CVE-2024-36994,0,0,5bcf467196c1b84a362932fda69af7a594fd1733711aa93db9e3192dd09151ba,2024-08-02T15:07:01.577000
|
||||
CVE-2024-36995,0,0,001f01624b8476726d4d815467edb381482f5d309cf989b89173ce343b404752,2024-08-02T14:55:40.310000
|
||||
CVE-2024-36996,0,0,5b2b9df71831d71bb4824acd46b570122cc17e69d17ce334c08a5d79406aaa97,2024-10-10T12:30:29.247000
|
||||
CVE-2024-36997,0,0,63b805e1c52b85e32c39913d47be0e81c2a81088ce95f6ee3da9b8a1cc881d60,2024-07-08T14:18:42.053000
|
||||
CVE-2024-36997,0,1,d26537886e67e2636705f692175341d9610e08b0875574e3e76efe2c198bbb04,2024-10-15T18:35:14.063000
|
||||
CVE-2024-36999,0,0,734e0568d2623f6b7394de1b2c703cca096721b07c4ba47885bcabdc0e4abb78,2024-07-03T02:03:59.553000
|
||||
CVE-2024-3700,0,0,1f63c1e7ae5862d8303d1df0f80fb7224c65b53b248ffd3fb3ee320fd320cf52,2024-06-12T17:51:52.710000
|
||||
CVE-2024-37000,0,0,eb7342d14f34edf9127b95014f2d19d18d4dda29c980fd9452975dec05564bca,2024-07-03T02:03:59.763000
|
||||
@ -255405,8 +255406,8 @@ CVE-2024-3715,0,0,a3f6e7a82320a6d7e6e6c69e7827898cea9e6e8692b09fe17381d67f1803ba
|
||||
CVE-2024-37150,0,0,ebe86994cf382db2f42db3a67da442aa16fa332cd6f1072a3ddf757a2ef9a966,2024-09-26T14:04:54.867000
|
||||
CVE-2024-37151,0,0,8369ee3c4d467fa86763a95ad47c05c55ab1bf8ab2582315661b340a8d9a5c13,2024-07-12T18:46:55.207000
|
||||
CVE-2024-37152,0,0,ac6f3acf11b3a1f516e05266cf8046e8001605f3fd121de5700d8dfd6dcff917,2024-09-18T12:51:04.430000
|
||||
CVE-2024-37153,0,0,85228309a9dbd3d5cc7023ad5c180dc01a5cb4c16fb418b8df38af81e23fe21d,2024-06-07T14:56:05.647000
|
||||
CVE-2024-37154,0,0,bde5aa6907ca2cb4c0ee9877af8bda5e0bca1361f6566d9f784624692130fad9,2024-06-07T14:56:05.647000
|
||||
CVE-2024-37153,0,1,9f4424de0035ce52fbc12758883da96bd3d6274fe3ec25134b2ea0b426063640,2024-10-15T19:40:12.917000
|
||||
CVE-2024-37154,0,1,dd0ccf9a2b9c80e8d5e5d3b5ee95b70b33aa0e3330c8531821fb592ab05146b2,2024-10-15T19:43:51.117000
|
||||
CVE-2024-37156,0,0,a4629359601329a252e33b03a4ccc833dd9e2ce7a4a6bb980b335d8342668158,2024-10-09T15:08:29.647000
|
||||
CVE-2024-37157,0,0,a07622f963d285fd9e3dcfe8c8c66929285017ffcec83ca71975fa9dd7c880ca,2024-09-18T13:50:23.367000
|
||||
CVE-2024-37158,0,0,d89015f3d5c7061659d9d0607cd8f932d19692ba0c53081aaf8195c4a3e4e008,2024-06-20T12:44:22.977000
|
||||
@ -255991,7 +255992,7 @@ CVE-2024-38037,0,0,6ee6641359a9997141535dc4bf184fc6adae3314eb2141cf63c27cb33bd18
|
||||
CVE-2024-38038,0,0,4aa049265d32d6590c37031d06b9ca2e8eb5e0e6a4aadbb4eb6ba3d0d1ecc8b1,2024-10-15T14:33:46.730000
|
||||
CVE-2024-38039,0,0,e15a0723c4839431a45e7e12b3249cdf72b61c98dd323f1ba61d1cba1e519674,2024-10-15T14:34:00.893000
|
||||
CVE-2024-3804,0,0,670259bb9deba1dd09e2fd5f21b522d9251378214c2f8d4e9a81f125a92ebbc4,2024-06-04T19:20:24.583000
|
||||
CVE-2024-38040,0,1,66148b0a6485bdfd9ee337fe5cd490f45dd2483daedb656eb852e3aa4eb61925,2024-10-15T16:01:44.010000
|
||||
CVE-2024-38040,0,0,66148b0a6485bdfd9ee337fe5cd490f45dd2483daedb656eb852e3aa4eb61925,2024-10-15T16:01:44.010000
|
||||
CVE-2024-38041,0,0,f4a3a12f8b0083cabe34ce18f7650953aa9c869c7e1908b1e136d7159a58fbbc,2024-07-11T16:25:14.153000
|
||||
CVE-2024-38043,0,0,678d7239712daaa20be0694f0d9a87623bf13f4e650f026e0e7dc828486931e4,2024-07-11T16:25:00.517000
|
||||
CVE-2024-38044,0,0,c3503c93ef40bb7d47f5a9bf23be6e47e665166216973f3f0d25fcf29360c08f,2024-07-11T18:11:30.147000
|
||||
@ -258119,6 +258120,7 @@ CVE-2024-41320,0,0,6629b2c1bbc9cd1b160b7b0f9c935334633b6b47708e3a65ad0ff69abde9e
|
||||
CVE-2024-4133,0,0,809a3aebbf4e63405fb2f0740c9908f3dfcf1d711b93379e5d465ea9e56d3cba,2024-05-02T18:00:37.360000
|
||||
CVE-2024-41332,0,0,0c297902d1fd2e33f0ac4f9fcf27ea849083281238ee0df040d97531f7646dbb,2024-08-21T18:53:15.927000
|
||||
CVE-2024-41333,0,0,cddcfe88014fc883d7c26828c1a1c1f213d8d1e951fc2a526ac4569575e77f96,2024-08-07T20:54:44.060000
|
||||
CVE-2024-41344,1,1,ff7648e8ae989269db49eecd8eade2bf67c01c04709c899061f7f40e7351972c,2024-10-15T19:15:17.287000
|
||||
CVE-2024-41345,0,0,ad86d7e7395244aeefb4513ee22ed35e62fdc5af64583f081b4b5d8d7fb51f54,2024-09-04T14:17:57.747000
|
||||
CVE-2024-41346,0,0,1adac0ec66721c6669287245d0fb70166e2ec17c4be292036b9085702109e039,2024-09-04T16:05:09.933000
|
||||
CVE-2024-41347,0,0,89b16501f9998c45192ab464895dbba53a76bd7b2944c225500c1ee4223ff754,2024-09-04T16:05:47.790000
|
||||
@ -259018,7 +259020,7 @@ CVE-2024-42637,0,0,91efd00f3a0c93af0bfc6d360416502bb044589161185dddb1564bcf24f65
|
||||
CVE-2024-42638,0,0,f05422802d125b3ce266da31a9abfdc3602d6bb3aba7eee20387c1a0cbe79fd0,2024-09-11T12:53:03.987000
|
||||
CVE-2024-42639,0,0,1a5c2259211b7b8d7a3c9ad7a85700d339edaffc744195b682680689ea5c39c4,2024-08-19T18:35:13.310000
|
||||
CVE-2024-4264,0,0,aceade487dcdf82d5a23a178a070b3c07d4cce69337175854977fa24341a320c,2024-05-20T13:00:34.807000
|
||||
CVE-2024-42640,0,1,aa9fdc0f8db2e7e48ae8090075d403a2f9c88e4c7abd16509bc27a944cdc3dcd,2024-10-15T17:35:04.623000
|
||||
CVE-2024-42640,0,0,aa9fdc0f8db2e7e48ae8090075d403a2f9c88e4c7abd16509bc27a944cdc3dcd,2024-10-15T17:35:04.623000
|
||||
CVE-2024-42642,0,0,368dc5dc34a16a5f055bfb8f43121adeaf05034c9b1b73657cc5e8228e1781ec,2024-09-10T13:46:25.733000
|
||||
CVE-2024-4265,0,0,674cb78ce8c95e07c05495b52772b5d4a079c608362a6e67c2dfb567e6b8517a,2024-05-02T18:00:37.360000
|
||||
CVE-2024-42657,0,0,7a9e5456dd66d94be3a75e811d67a1de5788317e788930f1ba2e8b5887d23144,2024-08-20T16:13:12.413000
|
||||
@ -260615,21 +260617,21 @@ CVE-2024-45458,0,0,a61716ce0d3fef0ec6cc594d56bae2d0a9a90d5b7d46e3aad6884d33d8f55
|
||||
CVE-2024-45459,0,0,9b179c3f3fb0a5657b063c5e1d95801691f8f9a5515abf4db8b2da6f6597452a,2024-09-27T14:46:32.483000
|
||||
CVE-2024-4546,0,0,b54fd960b0f682682e91f5a439869fe44d7d9c83b2d79e063c1697b7441a9761,2024-05-16T13:03:05.353000
|
||||
CVE-2024-45460,0,0,b05278f65cfdb1f7853ef120543347199a3969bb30d487211ecff7d9eae8c937,2024-09-27T14:51:08.120000
|
||||
CVE-2024-45463,0,1,a9a5f56b759215b2281ec627fe0c607aa07ab62cdff5847ecbdaa1e6768d0035,2024-10-15T17:35:51.263000
|
||||
CVE-2024-45464,0,1,8b929b4e136ea61613724435daa38f3adbab6eb0ab0969f0cee83dc792efc84a,2024-10-15T17:35:33.887000
|
||||
CVE-2024-45465,0,1,810f47d979302bb0c310fa31cc05b9821ef43ec873eb81fa46fb54894361c8d3,2024-10-15T17:35:22.230000
|
||||
CVE-2024-45466,0,1,95f5ac029a8b218e2f70f2e90df726fc14b401f47783cb5bd7054969b8bc85be,2024-10-15T17:35:06.890000
|
||||
CVE-2024-45467,0,1,5fd65ef5c4419b3719d423c16cf15c7939d251f4960abcbd21314c864a1c6ec1,2024-10-15T17:34:51.353000
|
||||
CVE-2024-45468,0,1,03be94a96ff394925e1a30865b1dc768668eb0d484dc2d528f698c2015f801e9,2024-10-15T17:34:32.503000
|
||||
CVE-2024-45469,0,1,c6746822b015becdd0c455845b5943365489ab16cf5f9f46a370137632c48863,2024-10-15T17:34:18.037000
|
||||
CVE-2024-45463,0,0,a9a5f56b759215b2281ec627fe0c607aa07ab62cdff5847ecbdaa1e6768d0035,2024-10-15T17:35:51.263000
|
||||
CVE-2024-45464,0,0,8b929b4e136ea61613724435daa38f3adbab6eb0ab0969f0cee83dc792efc84a,2024-10-15T17:35:33.887000
|
||||
CVE-2024-45465,0,0,810f47d979302bb0c310fa31cc05b9821ef43ec873eb81fa46fb54894361c8d3,2024-10-15T17:35:22.230000
|
||||
CVE-2024-45466,0,0,95f5ac029a8b218e2f70f2e90df726fc14b401f47783cb5bd7054969b8bc85be,2024-10-15T17:35:06.890000
|
||||
CVE-2024-45467,0,0,5fd65ef5c4419b3719d423c16cf15c7939d251f4960abcbd21314c864a1c6ec1,2024-10-15T17:34:51.353000
|
||||
CVE-2024-45468,0,0,03be94a96ff394925e1a30865b1dc768668eb0d484dc2d528f698c2015f801e9,2024-10-15T17:34:32.503000
|
||||
CVE-2024-45469,0,0,c6746822b015becdd0c455845b5943365489ab16cf5f9f46a370137632c48863,2024-10-15T17:34:18.037000
|
||||
CVE-2024-4547,0,0,e03413ba2a3d643e986abd6a70d4989a4412faae98e55cc280c4859673ba647d,2024-05-06T16:00:59.253000
|
||||
CVE-2024-45470,0,1,05ae393936dae2464e7b0417bca670f575905839e441c81b7b53f4226f4b2732,2024-10-15T17:18:52.227000
|
||||
CVE-2024-45471,0,1,08ee5f448c6bdf4af33214fb2172bc9c784a32c01855723bc7198e3f1b97a812,2024-10-15T17:18:37.377000
|
||||
CVE-2024-45472,0,1,99ba6a0dd1a694cc772944067840407aebb63cc1b8de9603bcf4ba7d890c5926,2024-10-15T17:15:34.937000
|
||||
CVE-2024-45473,0,1,865aa159e69490a974a9134607670a0c10ee3f357ea596017add2302228a8767,2024-10-15T17:31:56.830000
|
||||
CVE-2024-45474,0,1,0077a4784ce6e6c47b98449e48d902bd7a576357740b2f012aa0621077fe9ec1,2024-10-15T17:31:54.730000
|
||||
CVE-2024-45475,0,1,ceca83f140e5142ec9e788bac45b6a2b3e6a9f421935b40e9d1d34e5a20ee9c9,2024-10-15T17:31:52.313000
|
||||
CVE-2024-45476,0,1,caca7fe790f916474a7ca41537f465a0ddfe22def297e5b30824f70c2c729b14,2024-10-15T17:31:50.310000
|
||||
CVE-2024-45470,0,0,05ae393936dae2464e7b0417bca670f575905839e441c81b7b53f4226f4b2732,2024-10-15T17:18:52.227000
|
||||
CVE-2024-45471,0,0,08ee5f448c6bdf4af33214fb2172bc9c784a32c01855723bc7198e3f1b97a812,2024-10-15T17:18:37.377000
|
||||
CVE-2024-45472,0,0,99ba6a0dd1a694cc772944067840407aebb63cc1b8de9603bcf4ba7d890c5926,2024-10-15T17:15:34.937000
|
||||
CVE-2024-45473,0,0,865aa159e69490a974a9134607670a0c10ee3f357ea596017add2302228a8767,2024-10-15T17:31:56.830000
|
||||
CVE-2024-45474,0,0,0077a4784ce6e6c47b98449e48d902bd7a576357740b2f012aa0621077fe9ec1,2024-10-15T17:31:54.730000
|
||||
CVE-2024-45475,0,0,ceca83f140e5142ec9e788bac45b6a2b3e6a9f421935b40e9d1d34e5a20ee9c9,2024-10-15T17:31:52.313000
|
||||
CVE-2024-45476,0,0,caca7fe790f916474a7ca41537f465a0ddfe22def297e5b30824f70c2c729b14,2024-10-15T17:31:50.310000
|
||||
CVE-2024-4548,0,0,c312b0154ade9cb7e93b29cf6468875ea09abcdae811bc20c1f6b28cb1f08ef2,2024-05-06T16:00:59.253000
|
||||
CVE-2024-45488,0,0,02812af338aadc4a80122f84f222d800d57fc191e3e2ef216830d55dc271ef45,2024-08-30T19:35:06.870000
|
||||
CVE-2024-45489,0,0,6ea1c310f6732949eac7ded3c08e0687f1be76a01c2bdfe6c41533999acd86e8,2024-09-26T13:32:55.343000
|
||||
@ -260734,7 +260736,7 @@ CVE-2024-4575,0,0,9d22d248e877183fb374174504fab6bfc500414f16c234b88b687abe10cd48
|
||||
CVE-2024-45750,0,0,f86fce6cd4045728a00882dd42402a213a9d23f5fcb44064e442c5967c556b92,2024-09-26T19:35:17.850000
|
||||
CVE-2024-45751,0,0,cc5d68fd09f5f304456a6be90ad821b34bc4a7f1a983b99ed7260cdb2141f184,2024-09-10T12:15:01.857000
|
||||
CVE-2024-45752,0,0,c56d2e99daff13fa264a8e02ee453ba88231a536487b9dd847b13fefb0df4a91,2024-09-25T16:54:27.520000
|
||||
CVE-2024-45754,0,1,27881b9f8c3e60f9d5e35efd217ea03a3a53beb79b5679c0a5048b58d7f60f46,2024-10-15T16:35:07.827000
|
||||
CVE-2024-45754,0,0,27881b9f8c3e60f9d5e35efd217ea03a3a53beb79b5679c0a5048b58d7f60f46,2024-10-15T16:35:07.827000
|
||||
CVE-2024-45758,0,0,e058696ef4ee1e11dde5d7f4a1626a6964f9190aeabab6642796a352a4a3c2cd,2024-09-06T18:35:13.043000
|
||||
CVE-2024-4576,0,0,bef0c1eb81bb0f4c3eef72c993d9a673f04f17bc2d954741979507814d4ccd99,2024-07-02T14:41:30.777000
|
||||
CVE-2024-45769,0,0,8008e87928d7d924cb6edc7a002ab7d174233b35bc221ee2578339101437b36f,2024-09-20T12:30:17.483000
|
||||
@ -260759,7 +260761,7 @@ CVE-2024-45800,0,0,e84cff012b7d4b74db66a83e7b935dc1edfec9ef774b30490760e7407aa53
|
||||
CVE-2024-45801,0,0,4f22389c9c4d2fd289d85319452f0dd4a424809e7db0e4cdef14a74db91bd025,2024-09-20T12:31:20.110000
|
||||
CVE-2024-45803,0,0,a103e4b6ec153497af7929b1abcca6c81c3d6f7a709474f445551e656cc860a0,2024-10-07T17:05:16.440000
|
||||
CVE-2024-45804,0,0,9c3150fd449f47d5e8da1aa073c6ed29687a211817f4370f22049a4ad2a93841,2024-09-17T18:15:05.110000
|
||||
CVE-2024-45806,0,1,1ea4fb4c712bb48146dcc90039539097532217007de9e1bf4affe475258a028d,2024-10-15T16:03:44.943000
|
||||
CVE-2024-45806,0,0,1ea4fb4c712bb48146dcc90039539097532217007de9e1bf4affe475258a028d,2024-10-15T16:03:44.943000
|
||||
CVE-2024-45807,0,0,109f977914214954b1d4c58b77a41ab231481644c3f0d5e0c1a61fe3a8137355,2024-09-25T17:12:38.380000
|
||||
CVE-2024-45808,0,0,e0b8548e8c97a2dbe35aa53aed4f22546b5e8aaa33f6c0d1789ad77d012310d8,2024-09-25T17:18:38.823000
|
||||
CVE-2024-45809,0,0,61a35443140d3227d7a81e1d73cdcea190bec5c7e8b6089514de0625aa5d92ef,2024-09-24T20:12:24.597000
|
||||
@ -260958,7 +260960,7 @@ CVE-2024-46451,0,0,d3a56959d528545e5d37d75143f0c1e0141235a2bd503adf0162594e2e188
|
||||
CVE-2024-46453,0,0,f2e65264e0b1a5c3ff7f710d8d23db018673f8328ef08ecc489a300ea4d9bf1f,2024-10-07T13:53:04.767000
|
||||
CVE-2024-4646,0,0,368f6c8b75aa07d035e1b1b12d3ee4faeb304323401bbcc5aa2596217dc42f5b,2024-06-04T19:20:44.390000
|
||||
CVE-2024-46461,0,0,cc86f5c42464c26c4a36c6d59fbb4ac13932ea21683a14dbd86ef949d78638fc,2024-09-26T13:32:02.803000
|
||||
CVE-2024-46468,0,0,590f99179c67e59eb42f50e717dee3e2d00e317ae2f74cf7e2e6cc04e0418e38,2024-10-15T12:57:46.880000
|
||||
CVE-2024-46468,0,1,d1dabc49a2c8f6666100b3e113a0965ffec605533a3aa178ac1056f150b98c3d,2024-10-15T18:35:14.680000
|
||||
CVE-2024-4647,0,0,abfff49b4d0bc1323cd8c136d2663c14e45b73cbc22df4c684f6d02301cae0cc,2024-06-04T19:20:44.487000
|
||||
CVE-2024-46470,0,0,4aeda2c990e579b9008226e62d5cbdc47a22a0fa6603152064e359fb3aa1bf47,2024-09-30T12:45:57.823000
|
||||
CVE-2024-46471,0,0,470c933b4642dc2897ace8d3fcae6cce28009d5c4dc28b3858aee18cd52a08d7,2024-09-30T12:45:57.823000
|
||||
@ -260979,7 +260981,7 @@ CVE-2024-4652,0,0,8fd7af949b4c89aa1e5f9f8bc7784e47292323116a1f6a56ecb880f3c410a5
|
||||
CVE-2024-46528,0,0,229b9bb15493caebdf3e208d9a8202b04a5b638f9227848df207ebaa53b79ee7,2024-10-15T15:35:16.373000
|
||||
CVE-2024-4653,0,0,7b6d5c0913690c5b51d844fc9718b4208eaa5f352f244fd41eee7be1add5e3bc,2024-06-04T19:20:44.990000
|
||||
CVE-2024-46532,0,0,c6e0d455d21a04879d4eb03cbf11fc55f7b3d1c74ff8ace5dcd3df8ff8b6f824,2024-10-15T12:57:46.880000
|
||||
CVE-2024-46535,0,1,303f432dafe76053288b97daeba04961b685b8c5980dad6e5d762d1f5502c318,2024-10-15T16:35:08.740000
|
||||
CVE-2024-46535,0,0,303f432dafe76053288b97daeba04961b685b8c5980dad6e5d762d1f5502c318,2024-10-15T16:35:08.740000
|
||||
CVE-2024-46539,0,0,2d2c57643421ecf3202df41ca86f61b87e91435ec045a273724c1fd7bed0cf14,2024-10-10T12:56:30.817000
|
||||
CVE-2024-4654,0,0,0088d34096b2578204ff98fe71c1f702e4c8866653411407f72fe940a56448df,2024-06-04T19:20:45.100000
|
||||
CVE-2024-46540,0,0,82bd73e280c5a23d3b35406dd5a042ddc542cc53d99831f15d05d7d862ed5067,2024-10-04T13:51:25.567000
|
||||
@ -261385,8 +261387,8 @@ CVE-2024-47129,0,0,b38b36d9af9ba9097d5f30d3ac794a3599474bb5946ca986d25e9630ca9b2
|
||||
CVE-2024-4713,0,0,a3c96b0a67396332ccb3b3b7da032ec990741228737b0623d292fd0ff6dd150b,2024-06-04T19:20:46.913000
|
||||
CVE-2024-47130,0,0,e7f6fb202a607836b8263c1620a1a5e98a9ca050003113851c771acca23538dd,2024-10-07T17:57:43.347000
|
||||
CVE-2024-47134,0,0,2dc8636e0ee5fd2f97b814bd39f5b4217906ea0a61e539db830c2896b6e052cf,2024-10-04T13:50:43.727000
|
||||
CVE-2024-47135,0,0,447f1b653dd0637b0975f8b2a0589bbfb6986fc90885b0d8c45ddd003e931ff4,2024-10-04T13:50:43.727000
|
||||
CVE-2024-47136,0,0,1a39bed452003009147d69bd8fa96ae4884f50ab47a258dae1ff6b5248f61085,2024-10-04T13:50:43.727000
|
||||
CVE-2024-47135,0,1,59ae1232976c8e51aae73aa97b8d4fb50a4b33eb7aa7372298dfcd77c19c0bd9,2024-10-15T18:21:04.813000
|
||||
CVE-2024-47136,0,1,b3835ea7cec22b9e908913d2c98cbfff753b1b672a4d126777b942724ad7f9c9,2024-10-15T18:20:40.387000
|
||||
CVE-2024-4714,0,0,d7e9d9d95d84a12a856ae94c0b47f221a8b241db6b1f0d94ea74b84fa1b36764,2024-06-04T19:20:47.027000
|
||||
CVE-2024-47145,0,0,1a35765c26b04b61b861cee47b184170021783241b94fd51efafd1127befdb57,2024-09-26T18:42:33.550000
|
||||
CVE-2024-4715,0,0,8280b54df57d141f79c5c5ba7edbd4b8610f06a30ecbd5ba39cd6c268b4b3f05,2024-06-04T19:20:47.130000
|
||||
@ -261670,7 +261672,7 @@ CVE-2024-47658,0,0,7d83d41550ee4896fe2089957fc970e4ffb8e6c30451f535c67b0cffeb69f
|
||||
CVE-2024-47659,0,0,b7c74157edbbfcf6cc191fb9eb6c2e328a941e3c74433eed8f44bf21a8a12312,2024-10-10T12:51:56.987000
|
||||
CVE-2024-4766,0,0,2055f7e2ec48f00fc79991c0efa64507537f075393b9abe23a04ed1e0c30396e,2024-05-14T19:17:55.627000
|
||||
CVE-2024-47660,0,0,accf7b6bc163d236ec224793cf44bab1e91316de88fa320bb4708923ce43fb79,2024-10-10T12:51:56.987000
|
||||
CVE-2024-47661,0,1,0c740796dab368d37558db934f0b4e8bdfdcea457a0f8107f53cd199a836ef43,2024-10-15T16:03:29.260000
|
||||
CVE-2024-47661,0,0,0c740796dab368d37558db934f0b4e8bdfdcea457a0f8107f53cd199a836ef43,2024-10-15T16:03:29.260000
|
||||
CVE-2024-47662,0,0,9592ff301142fec228feda5f28aa5220c1e0fdd0719eedaab776fcd353ec2534,2024-10-10T12:51:56.987000
|
||||
CVE-2024-47663,0,0,38c847c85cb58f1bdc14b2643d340f12f21f2abeb9d0471d3efb10c92740f7a5,2024-10-10T12:51:56.987000
|
||||
CVE-2024-47664,0,0,1c2309f9d69bf8bb4cc3d6eb245972d5a50bf2b31179b3921c4437d37dadd6e5,2024-10-10T12:51:56.987000
|
||||
@ -261703,10 +261705,10 @@ CVE-2024-47767,0,0,9af27c7c3746a91762dbd43bd1bdd93db1f293ef5650b0e96c4aac72ab44c
|
||||
CVE-2024-47768,0,0,f403a0de6ad99844ca2cbb93a58b82a840eb5e868f9e8f1d631547e4814a24ea,2024-10-07T17:48:28.117000
|
||||
CVE-2024-47769,0,0,89e2e7df1b1b68f8d9732f48769437016eda3284d5a81e91e9482d5022e6eda8,2024-10-07T17:48:28.117000
|
||||
CVE-2024-4777,0,0,96d0d896ebb105a32ed437e794c8fc4ba926ad921436ba17bdb49a1a49737be4,2024-06-10T17:16:34.070000
|
||||
CVE-2024-47771,0,1,307639daadadbf3202f674c43a3fb0644dc668cf5b5d367eaa82f2bdc0b500d7,2024-10-15T16:15:04.860000
|
||||
CVE-2024-47771,0,0,307639daadadbf3202f674c43a3fb0644dc668cf5b5d367eaa82f2bdc0b500d7,2024-10-15T16:15:04.860000
|
||||
CVE-2024-47772,0,0,cc6b812a8af17a97a7a1e7281e186f43a2e5e0166a885f7d8c94f126c3b51715,2024-10-10T12:57:21.987000
|
||||
CVE-2024-47773,0,0,9ec3c242835bf576bc0968a82a3b46699041f8e41d118ea66f5704cf28b5d58f,2024-10-10T12:56:30.817000
|
||||
CVE-2024-47779,1,1,3a163337dfc03590a25dadcf99329dac626e059e04e1d823549ab286b0d21437,2024-10-15T16:15:04.963000
|
||||
CVE-2024-47779,0,0,3a163337dfc03590a25dadcf99329dac626e059e04e1d823549ab286b0d21437,2024-10-15T16:15:04.963000
|
||||
CVE-2024-4778,0,0,e3020a287fa6ceae8ff9c78434f10af4d17cf4058dd5bf80208c921b6bc68bef,2024-07-03T02:08:09.053000
|
||||
CVE-2024-47780,0,0,ff94d6824af803f8c7126d802f9a510e2f7e61826db064781dbb229b5b3ef329,2024-10-10T12:56:30.817000
|
||||
CVE-2024-47781,0,0,942905ddf0e252a3fb77e10ba3da26f7a3985ae743d3e1737c070a7332d5f79d,2024-10-10T12:57:21.987000
|
||||
@ -261731,7 +261733,7 @@ CVE-2024-47818,0,0,4d7e5ae8d80cd68e1a4826a976dd1a317a0485050783b2b6d50912171135a
|
||||
CVE-2024-4782,0,0,37dcdb14f7d23ae467b62646ac8eb504448e2a7781e3c175892c72dc54d3aebf,2024-08-19T13:00:23.117000
|
||||
CVE-2024-47822,0,0,659225121d6760adf8eca1f83c834e75b86ebec31d9e1e0ebc639ac3cc87e33f,2024-10-10T12:56:30.817000
|
||||
CVE-2024-47823,0,0,aba6c10bf903d75799cabb92b24bf5cc826ec4b52223e2aab9a9f7d8d8298a07,2024-10-10T12:56:30.817000
|
||||
CVE-2024-47824,1,1,2be970dcd77fedf37b12cf1771315ac50be5119386c01748fc934145cb380c25,2024-10-15T17:35:05.960000
|
||||
CVE-2024-47824,0,0,2be970dcd77fedf37b12cf1771315ac50be5119386c01748fc934145cb380c25,2024-10-15T17:35:05.960000
|
||||
CVE-2024-47826,0,0,e0e92319bd7ff9f0b6142ef26fd12487604c5bd0a7b38d2c0ea52634274a8fe7,2024-10-15T12:57:46.880000
|
||||
CVE-2024-47828,0,0,20037a2831594572185910fec3fa22739c3e04d0ddf5a1652087e64bcac4c0e3,2024-10-10T12:51:56.987000
|
||||
CVE-2024-4783,0,0,413c0436e6758a988a0c847533b21e34b17a9d936626eba8cda1a5d1f87e0181,2024-05-24T01:15:30.977000
|
||||
@ -261759,9 +261761,9 @@ CVE-2024-4787,0,0,6e9b8652de9328ef9248746b2fe52f715cb97566c59048ae6277a1aaed304f
|
||||
CVE-2024-47870,0,0,1cd8b567f779c035bc02695f74b97afb3b466e52ad5fdfb83f9ad4c9d6c2565f,2024-10-15T12:58:51.050000
|
||||
CVE-2024-47871,0,0,c330cbf3bccdc411e72d0c9fdb93f2acf8aa015186f3acc4a33480b7d49f7295,2024-10-15T12:58:51.050000
|
||||
CVE-2024-47872,0,0,fab9cb24e0cb00ac19ee7c8a7191edcbcecc81dc5861aabc369822430797585f,2024-10-15T12:58:51.050000
|
||||
CVE-2024-47874,1,1,b2e984fb0184ca3bd0cbcb3dcc4440ecf205b77628994db1548a308aa19adde1,2024-10-15T17:35:06.347000
|
||||
CVE-2024-47874,0,0,b2e984fb0184ca3bd0cbcb3dcc4440ecf205b77628994db1548a308aa19adde1,2024-10-15T17:35:06.347000
|
||||
CVE-2024-47875,0,0,7d3f699a2dfd28fae24f11f0ffebcb02477b8963ab93d8f474f9ee88d14cf58e,2024-10-15T12:58:51.050000
|
||||
CVE-2024-47876,1,1,0097c0b96f8151854a1f0202f1d9af72dc4b0fea44c712acf5036d788e5de33f,2024-10-15T17:35:06.610000
|
||||
CVE-2024-47876,0,0,0097c0b96f8151854a1f0202f1d9af72dc4b0fea44c712acf5036d788e5de33f,2024-10-15T17:35:06.610000
|
||||
CVE-2024-47877,0,0,42d52e9a067bcb9f8cadc0b4324eaa32d4b8c11c11d62f0e9296f0c93d92bc00,2024-10-15T12:57:46.880000
|
||||
CVE-2024-4788,0,0,036e4ce9e476328c73022572d41365684f416f1f77ea3a1f5e72bdd2454ce2ec,2024-08-05T20:23:52.467000
|
||||
CVE-2024-47884,0,0,4b7292fdbf8233f599cca6380416fda96798ff386a0442d2b37eeea12dd398ed,2024-10-15T12:57:46.880000
|
||||
@ -261776,8 +261778,8 @@ CVE-2024-4792,0,0,d367db616eff60413675ec0cb96dcf5072899c5126e3ab7b85dd0b323d2aa0
|
||||
CVE-2024-4793,0,0,d7ea24a63b045e67640f8521c21cc9fd0113236775183a92ddafb3253726675a,2024-06-04T19:20:49.390000
|
||||
CVE-2024-4794,0,0,ae0da7f20a3f797e26793f17108eae7df40bf3f3b44a06ce135aa4fe4b35db7e,2024-06-04T19:20:49.487000
|
||||
CVE-2024-47943,0,0,d4d5358ab48548c04867b54233602bd267d194af91388df45333461289a48f25,2024-10-15T12:57:46.880000
|
||||
CVE-2024-47944,0,1,8c2dcd259cac2bc345d70afe119d0b88c60fe63597fe98a2528a606f007cae1c,2024-10-15T16:35:09.410000
|
||||
CVE-2024-47945,0,1,0900df5cee0123a45d84da30514678340ec3b514351287898be6de2614710736,2024-10-15T17:35:06.870000
|
||||
CVE-2024-47944,0,0,8c2dcd259cac2bc345d70afe119d0b88c60fe63597fe98a2528a606f007cae1c,2024-10-15T16:35:09.410000
|
||||
CVE-2024-47945,0,0,0900df5cee0123a45d84da30514678340ec3b514351287898be6de2614710736,2024-10-15T17:35:06.870000
|
||||
CVE-2024-47948,0,0,aafd0e8fc979ea94b2b8df4bf3f1f60d1fa5454036169ceb387558bd65bac363,2024-10-11T19:56:44.863000
|
||||
CVE-2024-47949,0,0,8ba4c45c98cb1da5a81b6d150df81b78f598bd9353dce1414e0f42eb2bdd7632,2024-10-11T19:57:06.207000
|
||||
CVE-2024-4795,0,0,2bcc48011ff4ecb8dd1cdbe375174bc480d75b3ad4f0c787cda1ca7cd904e298,2024-06-04T19:20:49.590000
|
||||
@ -261819,14 +261821,14 @@ CVE-2024-4810,0,0,67f5293ce6e2b07ebd74483d90aa4bd648288e3b70a7100b0946bf9b81e900
|
||||
CVE-2024-4811,0,0,8f7cba70fec134bbd5d6693fb99cf5ba1e86f11c73cf50479f15d27ff9c0c5a5,2024-07-25T12:36:39.947000
|
||||
CVE-2024-48119,0,0,91983fb09dc3775c9139671c3c1253717b336036174f5a3aef288d9728dadb3b,2024-10-15T12:57:46.880000
|
||||
CVE-2024-4812,0,0,96f0244e64d02e8b825789000f88a75dd5b3d67c4d6e5fa4b2230b6ad5599e15,2024-06-18T18:49:19.783000
|
||||
CVE-2024-48120,0,1,9504bbf5097a8042aa622e4bcffcd74f79e5a7cbeebb7a1d1951fd43248d522c,2024-10-15T16:35:09.650000
|
||||
CVE-2024-48120,0,0,9504bbf5097a8042aa622e4bcffcd74f79e5a7cbeebb7a1d1951fd43248d522c,2024-10-15T16:35:09.650000
|
||||
CVE-2024-4813,0,0,ffced1bec51c6384e79d75317b856f32e05abf0a3cdd3adf718b586086ffad4a,2024-06-04T19:20:50.970000
|
||||
CVE-2024-4814,0,0,6ed65b628d782e4c0035f27d12907232951228fb5dd63de02df922628089b508,2024-06-04T19:20:51.077000
|
||||
CVE-2024-4815,0,0,a12a3714528f7b768c4c9101b510e3e25b21fa14abf883b4fca5d245888d3088,2024-06-04T19:20:51.183000
|
||||
CVE-2024-48150,0,1,3a74ef17dd937b2ce7ec4baf65ca0a0269cc457ed04e16b8c883126dbac56b6f,2024-10-15T16:35:10.450000
|
||||
CVE-2024-48150,0,0,3a74ef17dd937b2ce7ec4baf65ca0a0269cc457ed04e16b8c883126dbac56b6f,2024-10-15T16:35:10.450000
|
||||
CVE-2024-48153,0,0,0115bd5a7f787b918c5b80970e16ea447bfa931e6c66b1d9675f3a387f3eea27,2024-10-15T12:57:46.880000
|
||||
CVE-2024-4816,0,0,8565abd2d0a6378ede6981ddf7bac1f2251b8eaa5cb7a310b72a2f14c255bb14,2024-06-04T19:20:51.290000
|
||||
CVE-2024-48168,0,1,0fd63dbc86b3cb12d110bd22d9d904e3f3202d39864d2923ce46e572ac34fcfc,2024-10-15T16:35:11.240000
|
||||
CVE-2024-48168,0,0,0fd63dbc86b3cb12d110bd22d9d904e3f3202d39864d2923ce46e572ac34fcfc,2024-10-15T16:35:11.240000
|
||||
CVE-2024-4817,0,0,34b565d993de0f23b2da3e66a459da3d9e976182c7f2db8f77c4f90d033797ec,2024-06-04T19:20:51.393000
|
||||
CVE-2024-4818,0,0,3fe1d5f18f9b194d5b3db8480cedce43b94847211b0e14441f0f1578988c6d95,2024-06-04T19:20:51.510000
|
||||
CVE-2024-4819,0,0,bc26e072d222c9731ee42bb1198fec18f8f3236e713c07e319d531bbf6577caa,2024-06-04T19:20:51.613000
|
||||
@ -261835,20 +261837,20 @@ CVE-2024-4821,0,0,dc7d4132f68a39a1fe6c6bac80c0ac3156e2e90bf5e433ad24749311cb9093
|
||||
CVE-2024-4822,0,0,35737e7a1acb373d4b9b0a7db2a81b8ded4d641f08c88a2e676b684417908472,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4823,0,0,0c5de98ac761e11f69c407a8dbff0028d3fe4b31e8abb3e2bfd72a91e6adb2ed,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4824,0,0,e31432116aed0554c3dc4b1001cfc03d00512889f9f84533cba85f3e0d8e9591,2024-05-14T16:11:39.510000
|
||||
CVE-2024-48249,0,0,4f26a9d3cbe208cbdd9ea727b661bdba3e562618b583ee76b0512b4afadfe7dc,2024-10-15T12:57:46.880000
|
||||
CVE-2024-48249,0,1,da8b8817e37741a9aa47e2e2d74b7c2d9016e75eaeb0e762d84c505d09bf271b,2024-10-15T18:35:15.607000
|
||||
CVE-2024-4825,0,0,155a89a5474625dde1ab63dcac3020c23f71c92d3744c7dbee990f6fffb4feb0,2024-05-14T16:11:39.510000
|
||||
CVE-2024-48251,0,0,4d098db24396007455b29406aa1659eb8d5f46a48fef3576943743462426dc0d,2024-10-15T12:57:46.880000
|
||||
CVE-2024-48253,0,0,608bd21fa837eef2492e5d98929070282bc787c93de4ba72bd7c51001703024e,2024-10-15T12:57:46.880000
|
||||
CVE-2024-48253,0,1,3bf19f22b051acf529017405a1e456dc3273dcf3e1fd7bc187ab36f4f4639f3f,2024-10-15T19:35:37.163000
|
||||
CVE-2024-48255,0,0,313b410d31dd8621f0d7faab3c11bc5341a96c35dca7329f3a83e566161ad534,2024-10-15T12:57:46.880000
|
||||
CVE-2024-48257,0,0,aaadd224a47f274d472be6ce08b5d69075572392f21cee0f372452df54632bb8,2024-10-15T12:57:46.880000
|
||||
CVE-2024-48259,0,0,2a0e952e0f673f38e8090e544a78e235a41eeb6627f4c6a5736da1f86a9b4045,2024-10-15T12:57:46.880000
|
||||
CVE-2024-48259,0,1,510d99d2a12621cee76f94930e2255d64498e13bd360e8917cdd6a12710d1c8e,2024-10-15T19:35:38.413000
|
||||
CVE-2024-4826,0,0,deaf8fdab596ba1219725251282b0367e2dd73462b62b55f2e950ae3725565c5,2024-05-16T13:15:48.163000
|
||||
CVE-2024-48261,0,0,c50173bdf25e4741bc510b2698ace8c3db8c27162251f6faafaff8896241ef72,2024-10-14T15:15:14.130000
|
||||
CVE-2024-48278,0,0,1989401114df78ae2b738db10dc761dd7c87f5042e958dd73b1ad8ae21b3fdde,2024-10-15T15:35:17.077000
|
||||
CVE-2024-48279,0,1,1a7b526d9068600675847ed04f9097557e4f8603cd174863881b3866309b7c1d,2024-10-15T16:35:11.997000
|
||||
CVE-2024-48280,0,1,30bb52dd15fcd1691d30aef0fd2f9da37796443505a0387f8cf8d09c83ed623c,2024-10-15T16:35:12.753000
|
||||
CVE-2024-48279,0,0,1a7b526d9068600675847ed04f9097557e4f8603cd174863881b3866309b7c1d,2024-10-15T16:35:11.997000
|
||||
CVE-2024-48280,0,0,30bb52dd15fcd1691d30aef0fd2f9da37796443505a0387f8cf8d09c83ed623c,2024-10-15T16:35:12.753000
|
||||
CVE-2024-48282,0,0,f31d72254316b2d688a7e6f828feda19722b4bc66e309fa59b8b0531deb88d13,2024-10-15T15:35:18.263000
|
||||
CVE-2024-48283,0,1,5ad0da5ee0e3f610c2e0b4a44dada3daebe4e9c6ee3b0fdabbf955afa11385c7,2024-10-15T16:35:13.517000
|
||||
CVE-2024-48283,0,0,5ad0da5ee0e3f610c2e0b4a44dada3daebe4e9c6ee3b0fdabbf955afa11385c7,2024-10-15T16:35:13.517000
|
||||
CVE-2024-4835,0,0,b63c1e2c2f2232a6ba415444f30303ee4e5ea1a45d737d79b2133d2755ec709c,2024-05-24T01:15:30.977000
|
||||
CVE-2024-4836,0,0,6397d82c08a27dc6d1e4828623f7dccd401e56dd97e62d291cde8c73c9f6f8bd,2024-07-02T12:09:16.907000
|
||||
CVE-2024-4837,0,0,e7f6212a3767856f93e80078aa36a8d58ae9b0d6d87727b0b71ea9bfd6a3b44b,2024-05-15T18:35:11.453000
|
||||
@ -261874,9 +261876,9 @@ CVE-2024-4858,0,0,3cb9bd8b6c75f95328665e9ee04ad5356aa75f69b8a71bb4682aa7bcb86b94
|
||||
CVE-2024-4859,0,0,8383b8e86eb4a4e5b90aae7f1f2380c0c5e94dbe99d2c93d082bf89d93f61e82,2024-05-14T19:17:55.627000
|
||||
CVE-2024-4860,0,0,51415b9207d508daf9b92cfd5981ba904e23fd57e3ad30c10a4a3319cff2429d,2024-05-14T19:17:55.627000
|
||||
CVE-2024-4862,0,0,1615bd8ef961831b9e24202d7c6665df3c0d355a3a7edbddf82c728a6e33bae9,2024-07-09T18:19:14.047000
|
||||
CVE-2024-48622,1,1,980c56ef0d1700c69a05a060c6a491b5f8e60fe341396b57dff705be81d09548,2024-10-15T16:15:05.680000
|
||||
CVE-2024-48623,1,1,e8e3c9332b5c8204410a6fbbe6d65618def700fdad0cf7393579a2c6b88740f9,2024-10-15T16:15:05.767000
|
||||
CVE-2024-48624,1,1,4f54bb230b281f4e5a4f74591a10d3264508152e955f3ed013c29db2bd52623e,2024-10-15T16:15:05.840000
|
||||
CVE-2024-48622,0,0,980c56ef0d1700c69a05a060c6a491b5f8e60fe341396b57dff705be81d09548,2024-10-15T16:15:05.680000
|
||||
CVE-2024-48623,0,0,e8e3c9332b5c8204410a6fbbe6d65618def700fdad0cf7393579a2c6b88740f9,2024-10-15T16:15:05.767000
|
||||
CVE-2024-48624,0,1,f2be1358a87a4e8adff25895a95d7dab79bd042822ea0feed2b936938384ac0d,2024-10-15T18:35:16.363000
|
||||
CVE-2024-4863,0,0,a7452bc03047df9dfe2f17de61b10d1bcd60cf90a2b2dad4486f933b8b326310,2024-06-17T12:42:04.623000
|
||||
CVE-2024-4865,0,0,df8706c5d26e485ec9b623150b314bb58c6338346ba72ce79d78a6dbca58bc77,2024-05-20T13:00:34.807000
|
||||
CVE-2024-4866,0,0,1fd2c3b939730f1522c70c99454a98badb9f05648f1c0fa9438c4abc3e506e92,2024-07-11T13:05:54.930000
|
||||
@ -261890,20 +261892,20 @@ CVE-2024-4874,0,0,4b5967df7915507c9b0020b0ee4984332d2c23e37a57b9a262a2ae6c5b300f
|
||||
CVE-2024-4875,0,0,5a9bf10de46e2f944321ed00fa6d17c799716a219001f5797c9cce4abb6a2b7b,2024-05-21T12:37:59.687000
|
||||
CVE-2024-4876,0,0,6c7ef7cd93a9d659be2199330000de11a6027348fd6a9308e40ba12083e70d2c,2024-05-21T12:37:59.687000
|
||||
CVE-2024-48768,0,0,ca8de8e07b0f4e68695a45f656c413c10b94b260fe52ed672054ce66c06a9fb6,2024-10-15T12:57:46.880000
|
||||
CVE-2024-48769,0,0,987a65bc7023bf5f10fdfa37f57f702552f2716842ca04ff68a0022a049e643d,2024-10-15T12:57:46.880000
|
||||
CVE-2024-48770,0,1,a5f9413e80eaeb5bd8cc7305118d9d871b4a6f4a982e875ef049dbc556cc75cb,2024-10-15T17:35:07.440000
|
||||
CVE-2024-48769,0,1,111cb6e3b59af6f41642c6c2c5b8c53bc420797d62f026a9cd65018ae24e939c,2024-10-15T19:35:39.423000
|
||||
CVE-2024-48770,0,0,a5f9413e80eaeb5bd8cc7305118d9d871b4a6f4a982e875ef049dbc556cc75cb,2024-10-15T17:35:07.440000
|
||||
CVE-2024-48771,0,0,7cc16fb1e7b182ba1707e039c92b376a12b4f5c194ecd59d33b42309a06ec623,2024-10-15T12:57:46.880000
|
||||
CVE-2024-48772,0,0,0bfd137924b2aa589f0b388aa2a4bb6e650e0bed2b66f58add5dd08c77edb7d0,2024-10-15T12:57:46.880000
|
||||
CVE-2024-48772,0,1,976a3e2889a545044e2211b5dd62f039b94e0c74df9ae926e2ac2fb4a96d0f16,2024-10-15T19:35:40.267000
|
||||
CVE-2024-48773,0,0,fb43d7aa77de082965363f581f54c3d061652fad69676731f89ae7cab058f131,2024-10-15T12:57:46.880000
|
||||
CVE-2024-48774,0,0,d20edaaf1d024afe7f584acc048e0777c96bfc6984585e77dc1e01adfd6f8e5c,2024-10-15T12:57:46.880000
|
||||
CVE-2024-48775,0,0,f5669ae425289b72e71d7a60ceabc6022280b7646d6dac15ce5178659cbc0334,2024-10-15T12:57:46.880000
|
||||
CVE-2024-48776,0,0,b89d40e78c84d47e76ba1de04c88609484eadc9d4130b8e88457197ed2b471ee,2024-10-15T12:57:46.880000
|
||||
CVE-2024-48777,0,0,c4fd7419a3ee8a4dc369b6738eac4d7c9ae9e2f6d34315b5881974062a04c73f,2024-10-15T12:57:46.880000
|
||||
CVE-2024-48778,0,0,3adfe5983eab4dfdbe6a86e78e52319129a13c83d51e2776521d179f4e595d91,2024-10-15T12:57:46.880000
|
||||
CVE-2024-48784,0,0,fa927cf3db9565e61ab3bb2bed2d088f6b1d62d2eee7fc3578b18973620e71aa,2024-10-15T12:57:46.880000
|
||||
CVE-2024-48786,0,0,be06c2f94ca958b0210a50f1a2dbe5d1b27730c8a2625e641cf00ec903aaad96,2024-10-15T12:57:46.880000
|
||||
CVE-2024-48787,0,0,b8fcef644dedfdb63d84c8688c4e6efacc4f55e42f9d5bb1eea0f9ffeb39921f,2024-10-15T12:57:46.880000
|
||||
CVE-2024-48788,0,0,7ec1f33a068dd41f1e24941aa0c74f54e34cb2634cb32491fce6c1ee79242159,2024-10-15T12:57:46.880000
|
||||
CVE-2024-48777,0,1,54c3f1ea2e45e8317008bb4fa68d7dedc38bc1a3751236b3d316d88496c43ce3,2024-10-15T19:35:41.067000
|
||||
CVE-2024-48778,0,1,84465a6cd0aeb1f5e7a79a50b406c02904acdaa29d8045952a59d45351acb806,2024-10-15T19:35:41.840000
|
||||
CVE-2024-48784,0,1,b17d7d33d987ccc732abbbed7a19a2cd24322765e46d4a5e12c5048ecd3b3022,2024-10-15T19:35:42.627000
|
||||
CVE-2024-48786,0,1,356725ffde0ce97cc052a45790af4a3778948dfbfe170e13c7ea8d62a13a4603,2024-10-15T19:35:43.413000
|
||||
CVE-2024-48787,0,1,6d2ea7e3a85defa8b6f92bcb4641f0fb3472eedc1d016221be7f4707cb95d1ae,2024-10-15T19:35:44.190000
|
||||
CVE-2024-48788,0,1,d49daeb800740f0e90355e5fab9ca765541a870f5f806cc24938c90cbcb96ed5,2024-10-15T19:35:44.980000
|
||||
CVE-2024-48789,0,0,5f592c36436047d58bf382ebdc10d7cfe3a178af546d803f30cd03c06e0e8ad4,2024-10-15T15:35:19.560000
|
||||
CVE-2024-4879,0,0,49a8b41ea605df8bd1da4063a7058b50435504f1dbecb0dc4bcc8efa8c8e8867,2024-07-30T15:13:39.720000
|
||||
CVE-2024-48790,0,0,ceda703837f83637982efb81eeabebf961c0a8457d3c931aa6c365425a142c37,2024-10-15T12:57:46.880000
|
||||
@ -261911,9 +261913,9 @@ CVE-2024-48791,0,0,cee0a23c7df15be93fddb008f000fe0bf9be40f59d5c9806b782ce26b20a6
|
||||
CVE-2024-48792,0,0,f0468a8723df3ecc044b28f7bf95d6c4f917c9f33598ee95b354cbcc674cafbd,2024-10-15T15:35:20.183000
|
||||
CVE-2024-48793,0,0,dae7e208b54b46b9b3b2ea5a99cfd6703dd4b418e372d8815ac028cc55c60587,2024-10-15T12:57:46.880000
|
||||
CVE-2024-48795,0,0,3ba44c809bccc74424c36040f3837b0bb086ec1f910a55507b2cf216568d50ad,2024-10-15T12:57:46.880000
|
||||
CVE-2024-48796,0,1,1e14f7498f727da73668bbab5fa9c3e26a7526443607be49f5cc1b64f9aed9ca,2024-10-15T16:35:14.433000
|
||||
CVE-2024-48796,0,0,1e14f7498f727da73668bbab5fa9c3e26a7526443607be49f5cc1b64f9aed9ca,2024-10-15T16:35:14.433000
|
||||
CVE-2024-48797,0,0,84ec47d2f0875bb5f244804e75fe25176b42fd271e656bf8a6c457b2cefda79b,2024-10-15T15:35:21.060000
|
||||
CVE-2024-48798,0,1,456e6efd1999d161e08d7d92b829aad7f771e38427be013211a406399a3cd174,2024-10-15T16:35:14.783000
|
||||
CVE-2024-48798,0,0,456e6efd1999d161e08d7d92b829aad7f771e38427be013211a406399a3cd174,2024-10-15T16:35:14.783000
|
||||
CVE-2024-48799,0,0,896d6d04e9dd29e6b7911e8a609c1f9aedfadec2fef931b761998c1ee9dd8f3e,2024-10-15T15:35:21.350000
|
||||
CVE-2024-4881,0,0,70a5432f5c5a777364201296899d588f04c479b317d8edcefa9e35906d6586a3,2024-06-07T14:56:05.647000
|
||||
CVE-2024-48813,0,0,b3275c3656b3f4746c55f236fa34d6d816026c088db796644a052e298f356a4f,2024-10-15T12:58:51.050000
|
||||
@ -261929,18 +261931,18 @@ CVE-2024-4885,0,0,2608f2aa7fb5189467bda7bb610d4e03f1b43256b775a84e60ba9a3b8ac9b2
|
||||
CVE-2024-4886,0,0,d27ca09c7d3a0108a7cfa4692eb479eab6127452085468fbf17d7a45144cc1ee,2024-06-11T17:14:56.323000
|
||||
CVE-2024-4887,0,0,cd16cdbf0d661e24b4ec24b0cab770c7eb42c6fb6d3f727954351a4e0884953b,2024-06-07T14:56:05.647000
|
||||
CVE-2024-4888,0,0,52d3f21edee01fa1b7d50228c23ad770da0e07dcc70157700a078948f8463c9b,2024-06-07T14:56:05.647000
|
||||
CVE-2024-4889,0,0,dc396989938962dc001a5281d191cbfae52fbf722fa7438f9288c8cc16167175,2024-06-07T14:56:05.647000
|
||||
CVE-2024-4889,0,1,98c988bc305180dfde4233cdb25b83940a2a23ecd5fc7825e58f1cc0fbfe5628,2024-10-15T19:00:09.633000
|
||||
CVE-2024-4890,0,0,ee7720239380ab5c638f0803999a779457a74687c16e858d2acf0798605f57a2,2024-10-10T20:11:44.610000
|
||||
CVE-2024-48902,0,0,4705ef2c55813b3d84116179c2f627380e6bdeb3958de084a14cde58a5b57f28,2024-10-10T12:51:56.987000
|
||||
CVE-2024-48909,0,0,9f043bbad446a771de31685005b4aaec51407994137d3dc87a7597202df7de61,2024-10-15T12:57:46.880000
|
||||
CVE-2024-4891,0,0,f3940d673165429e16eea192398cf8ad711af9d91140d48fc15ea6e438b5c077,2024-05-20T13:00:34.807000
|
||||
CVE-2024-48911,0,0,e0b0f376339137788c8f5f310259d6e022437aed42d17513390da35e83b91690,2024-10-15T12:57:46.880000
|
||||
CVE-2024-48913,1,1,37dd6c652ace131411a1e5015973d721dfff292a443bb2cd2e9a123fa40fa498,2024-10-15T16:15:05.960000
|
||||
CVE-2024-48914,1,1,475d5c9171a024fc7321a4edcc7825561f09062c68d4829f0d88af27fe9ab80e,2024-10-15T16:15:06.270000
|
||||
CVE-2024-48915,1,1,a41a27228e8c7be04fdb162c020629f72a9c841436d4d75d0e35bdfe0688a24c,2024-10-15T17:15:11.943000
|
||||
CVE-2024-48913,0,0,37dd6c652ace131411a1e5015973d721dfff292a443bb2cd2e9a123fa40fa498,2024-10-15T16:15:05.960000
|
||||
CVE-2024-48914,0,0,475d5c9171a024fc7321a4edcc7825561f09062c68d4829f0d88af27fe9ab80e,2024-10-15T16:15:06.270000
|
||||
CVE-2024-48915,0,1,436abbcaa0bec3654a766e3739fdf6000c3bf80c7e442d11f7ecd8d059ad5b32,2024-10-15T19:35:45.867000
|
||||
CVE-2024-4892,0,0,86d55410ceaf3ecac0b7906bf27b918d65f0ae499a5475505564f001e752dae0,2024-06-13T18:36:09.013000
|
||||
CVE-2024-4893,0,0,c4900f559bdc4a1c952ec15ffc0a407a7d0fc758594c29af597940962bf437f6,2024-05-15T16:40:19.330000
|
||||
CVE-2024-48933,0,0,26e7fffc7245fc28a7fbe658a2efc943aeace159e18ee8e57ad42a85fc085d33,2024-10-11T21:36:45.080000
|
||||
CVE-2024-48933,0,1,eab55cc4133fd12eb852707496206c0c064cf1bfef188e95346821cf2dadf897,2024-10-15T18:56:52.363000
|
||||
CVE-2024-48937,0,0,fb3aa1360cb042294647ae67e18ab591b2f48004999a7cd6a26f133ca6565fb4,2024-10-15T12:57:46.880000
|
||||
CVE-2024-48938,0,0,3d30d33d5321768a3f65e3940b0730e05bbd4ff5e3d997465431f4cb5c46177b,2024-10-15T12:57:46.880000
|
||||
CVE-2024-4894,0,0,1906244d072f236ffca4e7ab82222b86cb7f201e42e01d4517f3ab933ca907f5,2024-05-15T16:40:19.330000
|
||||
@ -262709,6 +262711,7 @@ CVE-2024-5742,0,0,c310dd28e6218f94af8f7597fa59ff6226be5f6bc18ba1f4cf6bdcb5be3777
|
||||
CVE-2024-5744,0,0,fa6836e3173f8cf048b3a987cfb64279b64d7f456da598f49d9aa4b85f5c51d9,2024-08-01T13:59:58.940000
|
||||
CVE-2024-5745,0,0,45e4cce1990a5332f3fc13a691f25e40551bee96d698b0361d8c0089ac80523d,2024-08-06T14:37:59.943000
|
||||
CVE-2024-5746,0,0,08e42433314420a93bea44176cf4cc0a169742251a575020722ab2e02c28ff80,2024-06-21T11:22:01.687000
|
||||
CVE-2024-5749,1,1,3106234ad189b55b90e3d5371ca0e65ff3bc48acf1c8a0659ef6ef2ef2bf0543,2024-10-15T18:15:05.997000
|
||||
CVE-2024-5750,0,0,476ad6c00a3180d456740d0beb63c2959ea56c746a3fc254c90c1eef52867b01,2024-06-18T14:15:11.383000
|
||||
CVE-2024-5751,0,0,665d058ed530ae61eb83388b4a703659e3453f6012f62fa19adedb27d3fa9b05,2024-09-20T18:01:44.533000
|
||||
CVE-2024-5753,0,0,43c94f3dac782081ffe06f7a7f44ffc012545fd59744b1529ccc7aa1117863e3,2024-07-08T15:49:22.437000
|
||||
@ -263795,7 +263798,7 @@ CVE-2024-7030,0,0,94cdd35d577500e86064e69ea94124eea32b9ff9eeca8589a0c1d45f0f8946
|
||||
CVE-2024-7031,0,0,4808703a4cd0b97f67a773c5f222b01d69a2fff387801423358b3ea99670c83a,2024-08-05T12:41:45.957000
|
||||
CVE-2024-7032,0,0,c9fbd7c25c8986098b0db02c8f6b35abbde59d7f3338b2f6bf6ad9dd6ca45054,2024-08-31T03:02:41.763000
|
||||
CVE-2024-7037,0,0,dd49934fb89a4cd9156479561f4579716c8bbefb475939312544c6bfe1fd2c69,2024-10-10T12:51:56.987000
|
||||
CVE-2024-7038,0,0,50e1a958338e09dd5d29ac761cd7257587d7fbf8d06206d63e71117bb6ca44d7,2024-10-10T12:51:56.987000
|
||||
CVE-2024-7038,0,1,c6c61a8209299a027f404e23e0f880dbd94e569f03cadf08307c0ee843f5816f,2024-10-15T19:04:48.627000
|
||||
CVE-2024-7041,0,0,dcc586a9589d4da0815c96bc2883ae49d30920986ca4c102055deacb752acc00,2024-10-10T12:51:56.987000
|
||||
CVE-2024-7047,0,0,21985a71701c23251b30e756f6f2c4f75baa147c34a8c282b34b811aa42e2336,2024-08-26T16:07:27.837000
|
||||
CVE-2024-7048,0,0,89e7f79a80eda12c2b26c43fb062e41b4f4492714694bac6a9f3919e1af92730,2024-10-10T12:51:56.987000
|
||||
@ -265019,7 +265022,7 @@ CVE-2024-8686,0,0,022931d7d759e19b0434bc52cbdd6347bb39936f99eb55db4994112c6b1c44
|
||||
CVE-2024-8687,0,0,acaaec34cb53b28ae166b73ca3b7beb76d1056832fd2f401fa104cfe417cf027,2024-10-03T00:26:56.110000
|
||||
CVE-2024-8688,0,0,029257a651f738e9f27877382144b226fa4512857c7fc61efd2c2ae6b87c68fd,2024-10-03T00:19:32.047000
|
||||
CVE-2024-8689,0,0,311be2bcbec5a47aa4a45b9bafa6c2540f9b63e228c7b676dc3b423a0ce88bb8,2024-09-12T12:35:54.013000
|
||||
CVE-2024-8690,0,0,67e41d4fc2072d70d0779ce07b487cc96378ea1bcbe929aa92f47f625147a8df,2024-10-03T01:29:08.547000
|
||||
CVE-2024-8690,0,1,eb968451e4e62166b7c59305af1ec818435c2d81bb22259d4694cffd92b8d03d,2024-10-15T18:38:32.260000
|
||||
CVE-2024-8691,0,0,86e4139a64d9b51ddc9d346ef3726cdbb0eca03f25fc24c1e79857eafd0831a5,2024-09-12T12:35:54.013000
|
||||
CVE-2024-8692,0,0,62cd5a24f2f195f456dad2a14bc82086c94059c24620db27bc989fe057273892,2024-10-03T13:17:07.547000
|
||||
CVE-2024-8693,0,0,0bf9bf9fae22897a2e08c32b35e067d4cd5332929319ef0efd3cac78490daee3,2024-09-12T12:35:54.013000
|
||||
@ -265368,7 +265371,7 @@ CVE-2024-9327,0,0,9bb62fae114b1c29588ad2672d640859a17a9f3af7375a799fc34e218e9d39
|
||||
CVE-2024-9328,0,0,a5f7378f6f2f1cd502f7cde1b5f6090c2d79ebec3e3af2aa2eaafb1f04d0c325,2024-10-01T11:34:57.773000
|
||||
CVE-2024-9329,0,0,45383f73609cef2d97bbcc2a37f0da26902c147f00f71a92dd725b6696a1e709,2024-10-07T15:52:47.267000
|
||||
CVE-2024-9333,0,0,29d3d497691b594c7c49948d48e229bbe8c23108f2eef552b2f92cd89acf1f06,2024-10-04T13:50:43.727000
|
||||
CVE-2024-9341,0,0,d189ad1f5a137e8ae5c8357f3191cc9111f21b931f4eff48979046ce5164f4a3,2024-10-14T15:15:14.373000
|
||||
CVE-2024-9341,0,1,dd0e44bc8e2097c098fb36058bfb22e7ad9d27e180476832b369b29945d74b86,2024-10-15T19:15:17.707000
|
||||
CVE-2024-9344,0,0,d870e129ed50c7683cdbbee07d60a73dcd8b852b9805e9d5932c8a41008c379e,2024-10-08T15:06:57.470000
|
||||
CVE-2024-9345,0,0,b08be38bdc65e7df784af6af5cf36510583fc49f8a0ab62bc24aed87f83f55d0,2024-10-08T16:10:17.567000
|
||||
CVE-2024-9346,0,0,62d32d35d45fd426e51a0ed8886468a70178025d3407ee17aee209be78f55958,2024-10-15T12:58:51.050000
|
||||
@ -265396,7 +265399,7 @@ CVE-2024-9395,0,0,5635514233d9ffee7876b8b2143dfc7636f2a12f95a3e319a76e442d8673b9
|
||||
CVE-2024-9396,0,0,530fd74976554bcd60385c13cda51e8c090f8d2168af9c130173451c01d15309,2024-10-04T13:51:25.567000
|
||||
CVE-2024-9397,0,0,eedca49f89627e559465b4c1980d39b3c979416597a1ac9dbc74efac9146189f,2024-10-11T16:07:56.577000
|
||||
CVE-2024-9398,0,0,bdddf943c112a95674b6a5445a1c9aea85241f45d8a7242f5a5f280afd3f7bd6,2024-10-11T16:08:14.577000
|
||||
CVE-2024-9399,0,1,71d350d28d9602a123d1293eb86793568be4f2238424536b634c21711ccc3392,2024-10-15T16:04:59.350000
|
||||
CVE-2024-9399,0,0,71d350d28d9602a123d1293eb86793568be4f2238424536b634c21711ccc3392,2024-10-15T16:04:59.350000
|
||||
CVE-2024-9400,0,0,a07b092a7377838a4bb1e87b4e3b2f09cba515c42895dfa1fbf9dfd7eae19700,2024-10-04T13:51:25.567000
|
||||
CVE-2024-9401,0,0,9842edf4bc941b30860cfd929934eb8ba10b8d9f58d891f69f78bdfbf96f468c,2024-10-04T13:51:25.567000
|
||||
CVE-2024-9402,0,0,04bb4c5739f014caa4b772ec804b7222edbe186c7bb2fe331673658400879b23,2024-10-04T13:51:25.567000
|
||||
@ -265426,16 +265429,16 @@ CVE-2024-9465,0,0,add9f556a2a76282938e69631466c01e7fcb9a0d783603fabcb3a9a8f6f9d5
|
||||
CVE-2024-9466,0,0,4056ea73cc1df707db4f05bb2a6ab96565812ace99f5afd63580b9c827e5636d,2024-10-15T15:08:55.420000
|
||||
CVE-2024-9467,0,0,75d04ab03e69b7f9e1a38d891f6aaa266a750bf286ffd9f476545cea603cc1a5,2024-10-15T15:09:13.297000
|
||||
CVE-2024-9468,0,0,f7accbeda6900e100e8aad354b4e5585f782571ee82a35557f7f3b3ab3e92447,2024-10-10T12:51:56.987000
|
||||
CVE-2024-9469,0,0,8bb9a78228eb26b44d146abb8c36e4dccf96e88c6afa5a6a89dd30c8de19d781,2024-10-10T12:51:56.987000
|
||||
CVE-2024-9469,0,1,bfacd6ae0e951d4d0f806b219fe22ea394e7dcfb5460f334dffa6ddb0a7e18c6,2024-10-15T18:38:25.647000
|
||||
CVE-2024-9470,0,0,6d7d145d5ed6ae4ef4f33928573352f54839c5b9641b899af46f8b3aa4ed69d1,2024-10-10T12:51:56.987000
|
||||
CVE-2024-9471,0,1,2517c360d1e41d9c7ea79e15df7f34465e8f98b985f9011876ffa34a1656df21,2024-10-15T16:55:45.090000
|
||||
CVE-2024-9473,0,0,b488f190917a741efff9ce774060e2242f39c1fd009aabbb1ce12625032617b4,2024-10-10T12:51:56.987000
|
||||
CVE-2024-9471,0,0,2517c360d1e41d9c7ea79e15df7f34465e8f98b985f9011876ffa34a1656df21,2024-10-15T16:55:45.090000
|
||||
CVE-2024-9473,0,1,825f3e5d710ec92d62a1f5ebd2a2dd44d1120fd5e69e5435fa3d2066e6d99e08,2024-10-15T18:54:54.560000
|
||||
CVE-2024-9481,0,0,dce581617d5cf6edbc62a2fe02f71507870c412f67698e0495feb9e6b8ee0972,2024-10-04T13:50:43.727000
|
||||
CVE-2024-9482,0,0,10c3c4a119489ce5d129acd1f72184e55e1f72d2675c976690dcbbc5d407b533,2024-10-04T13:50:43.727000
|
||||
CVE-2024-9483,0,0,6a9a1cfe421d679c621a2969a64278be9b39bdca7774e9b4a3235c5640b6357b,2024-10-04T13:50:43.727000
|
||||
CVE-2024-9484,0,0,3f1e4bdc376cc95b97b5c0150a8d7b1a17051d92adc32b058eb06edb62f443eb,2024-10-04T13:50:43.727000
|
||||
CVE-2024-9487,0,0,e3a385658c66fc500363f16f3c27f6fce25e7b265fffe42414ebb85b7cd7e9a7,2024-10-15T12:58:51.050000
|
||||
CVE-2024-9506,1,1,1b9faa7ea92c6eb294076b1b1dafc59deb1bacd745dcd940153d30384a0a3ce0,2024-10-15T16:15:06.650000
|
||||
CVE-2024-9506,0,0,1b9faa7ea92c6eb294076b1b1dafc59deb1bacd745dcd940153d30384a0a3ce0,2024-10-15T16:15:06.650000
|
||||
CVE-2024-9507,0,0,9477ee329318032ff294d196e1a50966e1c5d89bdb9b9dc24092f58cf1f5f346,2024-10-15T12:58:51.050000
|
||||
CVE-2024-9513,0,0,8bf69fcd896ef2c6d740d4e3fb7359c13bcd3037f3f5c5ca172d72ee575fdaa7,2024-10-07T21:15:19.450000
|
||||
CVE-2024-9514,0,0,a0c385c9cad31170054b57880ea14385102aa94e9ee1a9b5619f4982b4ac92e4,2024-10-09T11:19:25.577000
|
||||
@ -265502,7 +265505,7 @@ CVE-2024-9656,0,0,0baa2843f7043c4ebd829d23f2741f972b762b755442a0f0f83539eb776103
|
||||
CVE-2024-9670,0,0,f306c0fbbcbde1e6a65006fd3bdd50d366f02be816ff2a6f00ef3348b3b76328,2024-10-15T12:57:46.880000
|
||||
CVE-2024-9671,0,0,421f1b0ad6825ff096efd81ac122f33bafcdf7b21693a85f65613389bca55f89,2024-10-10T12:51:56.987000
|
||||
CVE-2024-9675,0,0,cd830de46e01fce71654106f4dc61863debb474230c2cb4969fc123764df58c7,2024-10-10T12:51:56.987000
|
||||
CVE-2024-9676,1,1,adf46a01644c0b5011ec1c0db0d0631e1b3a4d9e1974ae046ccbb83f76e08c4a,2024-10-15T16:15:06.933000
|
||||
CVE-2024-9676,0,0,adf46a01644c0b5011ec1c0db0d0631e1b3a4d9e1974ae046ccbb83f76e08c4a,2024-10-15T16:15:06.933000
|
||||
CVE-2024-9680,0,0,a011127e762167171e169cf1c5c34d37941413b66fef20ba90b60170aec9759f,2024-10-11T13:15:21.013000
|
||||
CVE-2024-9685,0,0,a93c724a8b2ee6ce4a46c54a35028c939ad55b1fb441a5b479f473edc57de420,2024-10-15T14:30:00.483000
|
||||
CVE-2024-9687,0,0,892b3ec492b9f76dc48c1c64fed3d122004a3f16f1ff48bd4dbf12570db9abe9,2024-10-15T12:57:46.880000
|
||||
@ -265525,23 +265528,23 @@ CVE-2024-9789,0,0,0b7e270cf4baeae63b135180c0b00e3345c02df6dc92f399d94198cc5dcc2f
|
||||
CVE-2024-9790,0,0,14c4372898279ac90fde78cce4001f6f1e8b4b9eda1cf1e99e5ebf775cc5b4c6,2024-10-15T12:58:51.050000
|
||||
CVE-2024-9792,0,0,d68aca032770f3ab555b174d9c980d2b9c8b7e1f4d87418bf0969c937a5a85c0,2024-10-15T12:58:51.050000
|
||||
CVE-2024-9793,0,0,0f71c88bb614b0080f91ce00289e6f60c39b1d1486897ebc6c960c3d831b128b,2024-10-15T12:58:51.050000
|
||||
CVE-2024-9794,0,0,3f24c240ccf8d574723ec3c16ceea804867b41065e67eb7dc8dc6908830adede,2024-10-15T12:58:51.050000
|
||||
CVE-2024-9796,0,0,899ce363196ddc68e5b47cda88813fdcdfeceffcc5f5079fa63ff41ce27f0d98,2024-10-10T15:35:16.310000
|
||||
CVE-2024-9797,0,0,3b99b39be435a5eb019ee3dccac3de76ed79cc37733e7af970c6749ada946336,2024-10-15T12:58:51.050000
|
||||
CVE-2024-9794,0,1,2109299c412606589d2d15c7a99f00ade0d69b6b01c343ac91afffa4dccb49fe,2024-10-15T19:12:36.503000
|
||||
CVE-2024-9796,0,1,e9e2b215bb5f3ccc6d7244ebabf60d89574166678e83498211f5060a11c7c349,2024-10-15T18:46:53.397000
|
||||
CVE-2024-9797,0,1,76d0d64f17ede2284b5f27cd006706a5a6cf138e624975afba6fbae8df1636b1,2024-10-15T19:14:42.600000
|
||||
CVE-2024-9798,0,0,3febb0a28d43e578aad44b3750e6bb700172b4872cbf44fcb44e8e31ee8a3f5a,2024-10-10T15:35:16.493000
|
||||
CVE-2024-9799,0,0,7cb01e604d6eac6e5a3859204aba429f0c165ddde47994b62794b11c93d01e84,2024-10-15T12:58:51.050000
|
||||
CVE-2024-9802,0,0,910302f36fb69e8f01391eff3ef481a357455f77408333b222c68051948beb77,2024-10-10T15:35:17.230000
|
||||
CVE-2024-9803,0,0,c198e0f40a9e86d3c4f20656e7a7e2143c76b9f81b8509b1d0c40b2503cd6b64,2024-10-15T12:58:51.050000
|
||||
CVE-2024-9804,0,0,6e0b935f7d4d0bd3e6a861a26d364dc1d0bbd2a1f958a831798b240f7388a4c5,2024-10-15T12:58:51.050000
|
||||
CVE-2024-9805,0,0,728f8ef41df59eb6c440577d1152338661bdb36bd0caa1806c03d834f72ea70e,2024-10-15T12:58:51.050000
|
||||
CVE-2024-9804,0,1,68f5c7e14739a6361e19dd7d813977d666aa17ad23eace3ce2a17d5ea8fdec35,2024-10-15T19:17:27.083000
|
||||
CVE-2024-9805,0,1,ee00c11b4d31e847e0ebd53a130c82f569b78de6fc7dd36fd6219e14679cf80b,2024-10-15T19:18:27.987000
|
||||
CVE-2024-9806,0,0,2a19b98163bbc19db8559bafff0a76ba4932387d3b8511ad3780630baad612c8,2024-10-15T12:58:51.050000
|
||||
CVE-2024-9807,0,0,78a38d043b1962fb3571036d21641177bef4e7c8d56e6b70ccb1a7373eaaec64,2024-10-15T12:58:51.050000
|
||||
CVE-2024-9808,0,0,311d5115d832756e9b44bf5fe7ba9a357d1137429465846f82fc9b575361de88,2024-10-15T12:58:51.050000
|
||||
CVE-2024-9809,0,0,85839514d9e2e34531395152e5827a30d9a81a82feda2b6bf75dd600826a8637,2024-10-15T12:58:51.050000
|
||||
CVE-2024-9810,0,0,dd3b09561c8ce39b0b50eac1926d846f85a1af249d5af07bb373f1e84f72204c,2024-10-15T12:58:51.050000
|
||||
CVE-2024-9811,0,0,43216b70b942216744f7e944e2535e1f9673f3f0f5fcdfbb23c789be8d44cea5,2024-10-15T12:58:51.050000
|
||||
CVE-2024-9812,0,0,32a7aede18aabe98855d3e6f664137855d2bd57fcaaf0e07bab05866e8e1c2e0,2024-10-15T12:58:51.050000
|
||||
CVE-2024-9813,0,0,c30d72a6a117fc5a327572b4f7f1abf516303c5f833d23ab47c0fa5dd3840a48,2024-10-15T12:58:51.050000
|
||||
CVE-2024-9808,0,1,8cb37bc0987e5d1a9cd6e2e2fdc996dda3265bb7143c31d3e644a0c1f12bc2e9,2024-10-15T19:19:57.720000
|
||||
CVE-2024-9809,0,1,6a6378bfa76c432c34db3affd586d6db82005db89ffbb959913ee66d0494ec0e,2024-10-15T19:21:13.343000
|
||||
CVE-2024-9810,0,1,c1986a5d4762fc2b8cf5273afd6cc2193d22cf0f70a679146d48fbe94e3902f2,2024-10-15T19:22:00.260000
|
||||
CVE-2024-9811,0,1,1da541f99caffc6ef33768ad0c7e75efe4945fef39464cf1fdbfee5cf8c9e1bb,2024-10-15T19:22:35.447000
|
||||
CVE-2024-9812,0,1,f7c2d67f254da57e92f97292917f047072a690b4b64d871b69e515fdcb45b363,2024-10-15T19:22:51.340000
|
||||
CVE-2024-9813,0,1,ebf8d991a9c56aa1f46b8a521fcad95d28b775470618a7a18b02317ab25ddfe0,2024-10-15T19:23:28.953000
|
||||
CVE-2024-9814,0,0,909acc5669e0933797959b0f41ad905b48ee6338c8fb12bc92a4d2dcabca5f68,2024-10-15T12:58:51.050000
|
||||
CVE-2024-9815,0,0,3efadeccbd9056fc1482d694efde2ac99851dc1cec21b9808ae962cd6dc508bc,2024-10-15T12:58:51.050000
|
||||
CVE-2024-9816,0,0,cb20564cea99b9db0854ced1c2220742827ad9a1167949cee8f49b0272321d69,2024-10-15T12:58:51.050000
|
||||
@ -265555,7 +265558,7 @@ CVE-2024-9824,0,0,0b6b46e52b34b071e6f48e5304d76a541526a4368e490338503476fca42489
|
||||
CVE-2024-9837,0,0,bb8fbc31e530027dfddbaf6dae2f5d1b4333d91b7cafcea32a3d82a1ea54dea9,2024-10-15T12:57:46.880000
|
||||
CVE-2024-9855,0,0,f4067d5f9739a4a46f27ed071acd023bca1d9a27db9968d98f329af2e8d70e8b,2024-10-15T12:58:51.050000
|
||||
CVE-2024-9856,0,0,531963d8959dcaa0b68edaa5a63ce972541a941d9ad2303b1c288946d989ee89,2024-10-15T12:58:51.050000
|
||||
CVE-2024-9859,0,0,5e0dfd360014bd094ecef0a7ea3370cee2da248303a5356ea1a2ff0850990355,2024-10-15T12:57:46.880000
|
||||
CVE-2024-9859,0,1,144046db89cc7a1614c278bf90f5b4cc56b3ffdbde195acab46c61c2bc1b4092,2024-10-15T19:35:46.273000
|
||||
CVE-2024-9860,0,0,5146b7a0224d680f933516d3f319e5a1a7abd782ae32358fb855e1c62c4df555,2024-10-15T12:57:46.880000
|
||||
CVE-2024-9869,0,0,2195387ef9aab560e210893ad1e9f3295c5808c9d50c0ada4fa1d17778d3d1ae,2024-10-11T15:15:06.500000
|
||||
CVE-2024-9894,0,0,14c1a187244ef98f70dad85c66b4e9e50b1523e45b13c684f05d8920a1d43b87,2024-10-15T12:57:46.880000
|
||||
@ -265590,8 +265593,8 @@ CVE-2024-9969,0,0,b88b6c4d3144ed615cd4311477b588678016590767983c0a36b38fc380f998
|
||||
CVE-2024-9970,0,0,f001ac5abb7acc6ee06697c87a0cadac78ed1edd27d729d7f3d33875ec6b0a19,2024-10-15T12:57:46.880000
|
||||
CVE-2024-9971,0,0,0594322115675ee753da27d556fc98ba9a723e7e04d41180f103320a4dd3f2c8,2024-10-15T12:57:46.880000
|
||||
CVE-2024-9972,0,0,5672d796a3c0672617371b1fdfcdf3d8d1d30983cb269f7a20c96a13095710bc,2024-10-15T12:57:46.880000
|
||||
CVE-2024-9973,0,0,90a4187e6222035204a8094c1c908de4880d8343ba51bb13b56d0fd8dbd825af,2024-10-15T12:57:46.880000
|
||||
CVE-2024-9974,0,0,5c2b24e6ab8d26657f725ff3097d3b75619f11c33939e49479ca469fe5e9a9f8,2024-10-15T12:57:46.880000
|
||||
CVE-2024-9973,0,1,2267d71a3858182cc86abb02ea7f42a8954ae87627f44eaf0eee78687227d7e4,2024-10-15T19:27:44.020000
|
||||
CVE-2024-9974,0,1,a9f33ba1bf43a6581b26a64054dc48f869f96fec31a53cd68d396b83198ee70b,2024-10-15T19:28:37.377000
|
||||
CVE-2024-9975,0,0,19a95b0d8594378de1a658f6110dd6917411d1ac6b44da217f59a38aaf420a6d,2024-10-15T12:57:46.880000
|
||||
CVE-2024-9976,0,0,a0343d2773336f2452d12e06f8ed1c829d33d78887485939f459af0a85f318bf,2024-10-15T12:57:46.880000
|
||||
CVE-2024-9977,0,0,2ff728332776d36f7a0b4f17f71817f48b8215cf8e3f608a790b17fa094fa3ba,2024-10-15T13:15:11.457000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user